xref: /freebsd/crypto/heimdal/lib/krb5/pkinit.c (revision 38f0b757fd84d17d0fc24739a7cda160c4516d81)
1 /*
2  * Copyright (c) 2003 - 2007 Kungliga Tekniska Högskolan
3  * (Royal Institute of Technology, Stockholm, Sweden).
4  * All rights reserved.
5  *
6  * Portions Copyright (c) 2009 Apple Inc. All rights reserved.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  *
12  * 1. Redistributions of source code must retain the above copyright
13  *    notice, this list of conditions and the following disclaimer.
14  *
15  * 2. Redistributions in binary form must reproduce the above copyright
16  *    notice, this list of conditions and the following disclaimer in the
17  *    documentation and/or other materials provided with the distribution.
18  *
19  * 3. Neither the name of the Institute nor the names of its contributors
20  *    may be used to endorse or promote products derived from this software
21  *    without specific prior written permission.
22  *
23  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
24  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
27  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33  * SUCH DAMAGE.
34  */
35 
36 #include "krb5_locl.h"
37 
38 struct krb5_dh_moduli {
39     char *name;
40     unsigned long bits;
41     heim_integer p;
42     heim_integer g;
43     heim_integer q;
44 };
45 
46 #ifdef PKINIT
47 
48 #include <cms_asn1.h>
49 #include <pkcs8_asn1.h>
50 #include <pkcs9_asn1.h>
51 #include <pkcs12_asn1.h>
52 #include <pkinit_asn1.h>
53 #include <asn1_err.h>
54 
55 #include <der.h>
56 
57 struct krb5_pk_cert {
58     hx509_cert cert;
59 };
60 
61 struct krb5_pk_init_ctx_data {
62     struct krb5_pk_identity *id;
63     enum { USE_RSA, USE_DH, USE_ECDH } keyex;
64     union {
65 	DH *dh;
66 #ifdef HAVE_OPENSSL
67 	EC_KEY *eckey;
68 #endif
69     } u;
70     krb5_data *clientDHNonce;
71     struct krb5_dh_moduli **m;
72     hx509_peer_info peer;
73     enum krb5_pk_type type;
74     unsigned int require_binding:1;
75     unsigned int require_eku:1;
76     unsigned int require_krbtgt_otherName:1;
77     unsigned int require_hostname_match:1;
78     unsigned int trustedCertifiers:1;
79     unsigned int anonymous:1;
80 };
81 
82 static void
83 pk_copy_error(krb5_context context,
84 	      hx509_context hx509ctx,
85 	      int hxret,
86 	      const char *fmt,
87 	      ...)
88     __attribute__ ((format (printf, 4, 5)));
89 
90 /*
91  *
92  */
93 
94 KRB5_LIB_FUNCTION void KRB5_LIB_CALL
95 _krb5_pk_cert_free(struct krb5_pk_cert *cert)
96 {
97     if (cert->cert) {
98 	hx509_cert_free(cert->cert);
99     }
100     free(cert);
101 }
102 
103 static krb5_error_code
104 BN_to_integer(krb5_context context, BIGNUM *bn, heim_integer *integer)
105 {
106     integer->length = BN_num_bytes(bn);
107     integer->data = malloc(integer->length);
108     if (integer->data == NULL) {
109 	krb5_clear_error_message(context);
110 	return ENOMEM;
111     }
112     BN_bn2bin(bn, integer->data);
113     integer->negative = BN_is_negative(bn);
114     return 0;
115 }
116 
117 static BIGNUM *
118 integer_to_BN(krb5_context context, const char *field, const heim_integer *f)
119 {
120     BIGNUM *bn;
121 
122     bn = BN_bin2bn((const unsigned char *)f->data, f->length, NULL);
123     if (bn == NULL) {
124 	krb5_set_error_message(context, ENOMEM,
125 			       N_("PKINIT: parsing BN failed %s", ""), field);
126 	return NULL;
127     }
128     BN_set_negative(bn, f->negative);
129     return bn;
130 }
131 
132 static krb5_error_code
133 select_dh_group(krb5_context context, DH *dh, unsigned long bits,
134 		struct krb5_dh_moduli **moduli)
135 {
136     const struct krb5_dh_moduli *m;
137 
138     if (bits == 0) {
139 	m = moduli[1]; /* XXX */
140 	if (m == NULL)
141 	    m = moduli[0]; /* XXX */
142     } else {
143 	int i;
144 	for (i = 0; moduli[i] != NULL; i++) {
145 	    if (bits < moduli[i]->bits)
146 		break;
147 	}
148 	if (moduli[i] == NULL) {
149 	    krb5_set_error_message(context, EINVAL,
150 				   N_("Did not find a DH group parameter "
151 				      "matching requirement of %lu bits", ""),
152 				   bits);
153 	    return EINVAL;
154 	}
155 	m = moduli[i];
156     }
157 
158     dh->p = integer_to_BN(context, "p", &m->p);
159     if (dh->p == NULL)
160 	return ENOMEM;
161     dh->g = integer_to_BN(context, "g", &m->g);
162     if (dh->g == NULL)
163 	return ENOMEM;
164     dh->q = integer_to_BN(context, "q", &m->q);
165     if (dh->q == NULL)
166 	return ENOMEM;
167 
168     return 0;
169 }
170 
171 struct certfind {
172     const char *type;
173     const heim_oid *oid;
174 };
175 
176 /*
177  * Try searchin the key by to use by first looking for for PK-INIT
178  * EKU, then the Microsoft smart card EKU and last, no special EKU at all.
179  */
180 
181 static krb5_error_code
182 find_cert(krb5_context context, struct krb5_pk_identity *id,
183 	  hx509_query *q, hx509_cert *cert)
184 {
185     struct certfind cf[4] = {
186 	{ "MobileMe EKU" },
187 	{ "PKINIT EKU" },
188 	{ "MS EKU" },
189 	{ "any (or no)" }
190     };
191     int ret = HX509_CERT_NOT_FOUND;
192     size_t i, start = 1;
193     unsigned oids[] = { 1, 2, 840, 113635, 100, 3, 2, 1 };
194     const heim_oid mobileMe = { sizeof(oids)/sizeof(oids[0]), oids };
195 
196 
197     if (id->flags & PKINIT_BTMM)
198 	start = 0;
199 
200     cf[0].oid = &mobileMe;
201     cf[1].oid = &asn1_oid_id_pkekuoid;
202     cf[2].oid = &asn1_oid_id_pkinit_ms_eku;
203     cf[3].oid = NULL;
204 
205     for (i = start; i < sizeof(cf)/sizeof(cf[0]); i++) {
206 	ret = hx509_query_match_eku(q, cf[i].oid);
207 	if (ret) {
208 	    pk_copy_error(context, context->hx509ctx, ret,
209 			  "Failed setting %s OID", cf[i].type);
210 	    return ret;
211 	}
212 
213 	ret = hx509_certs_find(context->hx509ctx, id->certs, q, cert);
214 	if (ret == 0)
215 	    break;
216 	pk_copy_error(context, context->hx509ctx, ret,
217 		      "Failed finding certificate with %s OID", cf[i].type);
218     }
219     return ret;
220 }
221 
222 
223 static krb5_error_code
224 create_signature(krb5_context context,
225 		 const heim_oid *eContentType,
226 		 krb5_data *eContent,
227 		 struct krb5_pk_identity *id,
228 		 hx509_peer_info peer,
229 		 krb5_data *sd_data)
230 {
231     int ret, flags = 0;
232 
233     if (id->cert == NULL)
234 	flags |= HX509_CMS_SIGNATURE_NO_SIGNER;
235 
236     ret = hx509_cms_create_signed_1(context->hx509ctx,
237 				    flags,
238 				    eContentType,
239 				    eContent->data,
240 				    eContent->length,
241 				    NULL,
242 				    id->cert,
243 				    peer,
244 				    NULL,
245 				    id->certs,
246 				    sd_data);
247     if (ret) {
248 	pk_copy_error(context, context->hx509ctx, ret,
249 		      "Create CMS signedData");
250 	return ret;
251     }
252 
253     return 0;
254 }
255 
256 static int
257 cert2epi(hx509_context context, void *ctx, hx509_cert c)
258 {
259     ExternalPrincipalIdentifiers *ids = ctx;
260     ExternalPrincipalIdentifier id;
261     hx509_name subject = NULL;
262     void *p;
263     int ret;
264 
265     if (ids->len > 10)
266 	return 0;
267 
268     memset(&id, 0, sizeof(id));
269 
270     ret = hx509_cert_get_subject(c, &subject);
271     if (ret)
272 	return ret;
273 
274     if (hx509_name_is_null_p(subject) != 0) {
275 
276 	id.subjectName = calloc(1, sizeof(*id.subjectName));
277 	if (id.subjectName == NULL) {
278 	    hx509_name_free(&subject);
279 	    free_ExternalPrincipalIdentifier(&id);
280 	    return ENOMEM;
281 	}
282 
283 	ret = hx509_name_binary(subject, id.subjectName);
284 	if (ret) {
285 	    hx509_name_free(&subject);
286 	    free_ExternalPrincipalIdentifier(&id);
287 	    return ret;
288 	}
289     }
290     hx509_name_free(&subject);
291 
292 
293     id.issuerAndSerialNumber = calloc(1, sizeof(*id.issuerAndSerialNumber));
294     if (id.issuerAndSerialNumber == NULL) {
295 	free_ExternalPrincipalIdentifier(&id);
296 	return ENOMEM;
297     }
298 
299     {
300 	IssuerAndSerialNumber iasn;
301 	hx509_name issuer;
302 	size_t size = 0;
303 
304 	memset(&iasn, 0, sizeof(iasn));
305 
306 	ret = hx509_cert_get_issuer(c, &issuer);
307 	if (ret) {
308 	    free_ExternalPrincipalIdentifier(&id);
309 	    return ret;
310 	}
311 
312 	ret = hx509_name_to_Name(issuer, &iasn.issuer);
313 	hx509_name_free(&issuer);
314 	if (ret) {
315 	    free_ExternalPrincipalIdentifier(&id);
316 	    return ret;
317 	}
318 
319 	ret = hx509_cert_get_serialnumber(c, &iasn.serialNumber);
320 	if (ret) {
321 	    free_IssuerAndSerialNumber(&iasn);
322 	    free_ExternalPrincipalIdentifier(&id);
323 	    return ret;
324 	}
325 
326 	ASN1_MALLOC_ENCODE(IssuerAndSerialNumber,
327 			   id.issuerAndSerialNumber->data,
328 			   id.issuerAndSerialNumber->length,
329 			   &iasn, &size, ret);
330 	free_IssuerAndSerialNumber(&iasn);
331 	if (ret)
332 	    return ret;
333 	if (id.issuerAndSerialNumber->length != size)
334 	    abort();
335     }
336 
337     id.subjectKeyIdentifier = NULL;
338 
339     p = realloc(ids->val, sizeof(ids->val[0]) * (ids->len + 1));
340     if (p == NULL) {
341 	free_ExternalPrincipalIdentifier(&id);
342 	return ENOMEM;
343     }
344 
345     ids->val = p;
346     ids->val[ids->len] = id;
347     ids->len++;
348 
349     return 0;
350 }
351 
352 static krb5_error_code
353 build_edi(krb5_context context,
354 	  hx509_context hx509ctx,
355 	  hx509_certs certs,
356 	  ExternalPrincipalIdentifiers *ids)
357 {
358     return hx509_certs_iter_f(hx509ctx, certs, cert2epi, ids);
359 }
360 
361 static krb5_error_code
362 build_auth_pack(krb5_context context,
363 		unsigned nonce,
364 		krb5_pk_init_ctx ctx,
365 		const KDC_REQ_BODY *body,
366 		AuthPack *a)
367 {
368     size_t buf_size, len = 0;
369     krb5_error_code ret;
370     void *buf;
371     krb5_timestamp sec;
372     int32_t usec;
373     Checksum checksum;
374 
375     krb5_clear_error_message(context);
376 
377     memset(&checksum, 0, sizeof(checksum));
378 
379     krb5_us_timeofday(context, &sec, &usec);
380     a->pkAuthenticator.ctime = sec;
381     a->pkAuthenticator.nonce = nonce;
382 
383     ASN1_MALLOC_ENCODE(KDC_REQ_BODY, buf, buf_size, body, &len, ret);
384     if (ret)
385 	return ret;
386     if (buf_size != len)
387 	krb5_abortx(context, "internal error in ASN.1 encoder");
388 
389     ret = krb5_create_checksum(context,
390 			       NULL,
391 			       0,
392 			       CKSUMTYPE_SHA1,
393 			       buf,
394 			       len,
395 			       &checksum);
396     free(buf);
397     if (ret)
398 	return ret;
399 
400     ALLOC(a->pkAuthenticator.paChecksum, 1);
401     if (a->pkAuthenticator.paChecksum == NULL) {
402 	krb5_set_error_message(context, ENOMEM,
403 			       N_("malloc: out of memory", ""));
404 	return ENOMEM;
405     }
406 
407     ret = krb5_data_copy(a->pkAuthenticator.paChecksum,
408 			 checksum.checksum.data, checksum.checksum.length);
409     free_Checksum(&checksum);
410     if (ret)
411 	return ret;
412 
413     if (ctx->keyex == USE_DH || ctx->keyex == USE_ECDH) {
414 	const char *moduli_file;
415 	unsigned long dh_min_bits;
416 	krb5_data dhbuf;
417 	size_t size = 0;
418 
419 	krb5_data_zero(&dhbuf);
420 
421 
422 
423 	moduli_file = krb5_config_get_string(context, NULL,
424 					     "libdefaults",
425 					     "moduli",
426 					     NULL);
427 
428 	dh_min_bits =
429 	    krb5_config_get_int_default(context, NULL, 0,
430 					"libdefaults",
431 					"pkinit_dh_min_bits",
432 					NULL);
433 
434 	ret = _krb5_parse_moduli(context, moduli_file, &ctx->m);
435 	if (ret)
436 	    return ret;
437 
438 	ctx->u.dh = DH_new();
439 	if (ctx->u.dh == NULL) {
440 	    krb5_set_error_message(context, ENOMEM,
441 				   N_("malloc: out of memory", ""));
442 	    return ENOMEM;
443 	}
444 
445 	ret = select_dh_group(context, ctx->u.dh, dh_min_bits, ctx->m);
446 	if (ret)
447 	    return ret;
448 
449 	if (DH_generate_key(ctx->u.dh) != 1) {
450 	    krb5_set_error_message(context, ENOMEM,
451 				   N_("pkinit: failed to generate DH key", ""));
452 	    return ENOMEM;
453 	}
454 
455 
456 	if (1 /* support_cached_dh */) {
457 	    ALLOC(a->clientDHNonce, 1);
458 	    if (a->clientDHNonce == NULL) {
459 		krb5_clear_error_message(context);
460 		return ENOMEM;
461 	    }
462 	    ret = krb5_data_alloc(a->clientDHNonce, 40);
463 	    if (a->clientDHNonce == NULL) {
464 		krb5_clear_error_message(context);
465 		return ret;
466 	    }
467 	    RAND_bytes(a->clientDHNonce->data, a->clientDHNonce->length);
468 	    ret = krb5_copy_data(context, a->clientDHNonce,
469 				 &ctx->clientDHNonce);
470 	    if (ret)
471 		return ret;
472 	}
473 
474 	ALLOC(a->clientPublicValue, 1);
475 	if (a->clientPublicValue == NULL)
476 	    return ENOMEM;
477 
478 	if (ctx->keyex == USE_DH) {
479 	    DH *dh = ctx->u.dh;
480 	    DomainParameters dp;
481 	    heim_integer dh_pub_key;
482 
483 	    ret = der_copy_oid(&asn1_oid_id_dhpublicnumber,
484 			       &a->clientPublicValue->algorithm.algorithm);
485 	    if (ret)
486 		return ret;
487 
488 	    memset(&dp, 0, sizeof(dp));
489 
490 	    ret = BN_to_integer(context, dh->p, &dp.p);
491 	    if (ret) {
492 		free_DomainParameters(&dp);
493 		return ret;
494 	    }
495 	    ret = BN_to_integer(context, dh->g, &dp.g);
496 	    if (ret) {
497 		free_DomainParameters(&dp);
498 		return ret;
499 	    }
500 	    ret = BN_to_integer(context, dh->q, &dp.q);
501 	    if (ret) {
502 		free_DomainParameters(&dp);
503 		return ret;
504 	    }
505 	    dp.j = NULL;
506 	    dp.validationParms = NULL;
507 
508 	    a->clientPublicValue->algorithm.parameters =
509 		malloc(sizeof(*a->clientPublicValue->algorithm.parameters));
510 	    if (a->clientPublicValue->algorithm.parameters == NULL) {
511 		free_DomainParameters(&dp);
512 		return ret;
513 	    }
514 
515 	    ASN1_MALLOC_ENCODE(DomainParameters,
516 			       a->clientPublicValue->algorithm.parameters->data,
517 			       a->clientPublicValue->algorithm.parameters->length,
518 			       &dp, &size, ret);
519 	    free_DomainParameters(&dp);
520 	    if (ret)
521 		return ret;
522 	    if (size != a->clientPublicValue->algorithm.parameters->length)
523 		krb5_abortx(context, "Internal ASN1 encoder error");
524 
525 	    ret = BN_to_integer(context, dh->pub_key, &dh_pub_key);
526 	    if (ret)
527 		return ret;
528 
529 	    ASN1_MALLOC_ENCODE(DHPublicKey, dhbuf.data, dhbuf.length,
530 			       &dh_pub_key, &size, ret);
531 	    der_free_heim_integer(&dh_pub_key);
532 	    if (ret)
533 		return ret;
534 	    if (size != dhbuf.length)
535 		krb5_abortx(context, "asn1 internal error");
536 	} else if (ctx->keyex == USE_ECDH) {
537 #ifdef HAVE_OPENSSL
538 	    ECParameters ecp;
539 	    unsigned char *p;
540 	    int xlen;
541 
542 	    /* copy in public key, XXX find the best curve that the server support or use the clients curve if possible */
543 
544 	    ecp.element = choice_ECParameters_namedCurve;
545 	    ret = der_copy_oid(&asn1_oid_id_ec_group_secp256r1,
546 			       &ecp.u.namedCurve);
547 	    if (ret)
548 		return ret;
549 
550 	    ALLOC(a->clientPublicValue->algorithm.parameters, 1);
551 	    if (a->clientPublicValue->algorithm.parameters == NULL) {
552 		free_ECParameters(&ecp);
553 		return ENOMEM;
554 	    }
555 	    ASN1_MALLOC_ENCODE(ECParameters, p, xlen, &ecp, &size, ret);
556 	    free_ECParameters(&ecp);
557 	    if (ret)
558 		return ret;
559 	    if ((int)size != xlen)
560 		krb5_abortx(context, "asn1 internal error");
561 
562 	    a->clientPublicValue->algorithm.parameters->data = p;
563 	    a->clientPublicValue->algorithm.parameters->length = size;
564 
565 	    /* copy in public key */
566 
567 	    ret = der_copy_oid(&asn1_oid_id_ecPublicKey,
568 			       &a->clientPublicValue->algorithm.algorithm);
569 	    if (ret)
570 		return ret;
571 
572 	    ctx->u.eckey = EC_KEY_new_by_curve_name(NID_X9_62_prime256v1);
573 	    if (ctx->u.eckey == NULL)
574 		return ENOMEM;
575 
576 	    ret = EC_KEY_generate_key(ctx->u.eckey);
577 	    if (ret != 1)
578 		return EINVAL;
579 
580 	    /* encode onto dhkey */
581 
582 	    xlen = i2o_ECPublicKey(ctx->u.eckey, NULL);
583 	    if (xlen <= 0)
584 		abort();
585 
586 	    dhbuf.data = malloc(xlen);
587 	    if (dhbuf.data == NULL)
588 		abort();
589 	    dhbuf.length = xlen;
590 	    p = dhbuf.data;
591 
592 	    xlen = i2o_ECPublicKey(ctx->u.eckey, &p);
593 	    if (xlen <= 0)
594 		abort();
595 
596 	    /* XXX verify that this is right with RFC3279 */
597 #else
598 	    return EINVAL;
599 #endif
600 	} else
601 	    krb5_abortx(context, "internal error");
602 	a->clientPublicValue->subjectPublicKey.length = dhbuf.length * 8;
603 	a->clientPublicValue->subjectPublicKey.data = dhbuf.data;
604     }
605 
606     {
607 	a->supportedCMSTypes = calloc(1, sizeof(*a->supportedCMSTypes));
608 	if (a->supportedCMSTypes == NULL)
609 	    return ENOMEM;
610 
611 	ret = hx509_crypto_available(context->hx509ctx, HX509_SELECT_ALL,
612 				     ctx->id->cert,
613 				     &a->supportedCMSTypes->val,
614 				     &a->supportedCMSTypes->len);
615 	if (ret)
616 	    return ret;
617     }
618 
619     return ret;
620 }
621 
622 KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
623 _krb5_pk_mk_ContentInfo(krb5_context context,
624 			const krb5_data *buf,
625 			const heim_oid *oid,
626 			struct ContentInfo *content_info)
627 {
628     krb5_error_code ret;
629 
630     ret = der_copy_oid(oid, &content_info->contentType);
631     if (ret)
632 	return ret;
633     ALLOC(content_info->content, 1);
634     if (content_info->content == NULL)
635 	return ENOMEM;
636     content_info->content->data = malloc(buf->length);
637     if (content_info->content->data == NULL)
638 	return ENOMEM;
639     memcpy(content_info->content->data, buf->data, buf->length);
640     content_info->content->length = buf->length;
641     return 0;
642 }
643 
644 static krb5_error_code
645 pk_mk_padata(krb5_context context,
646 	     krb5_pk_init_ctx ctx,
647 	     const KDC_REQ_BODY *req_body,
648 	     unsigned nonce,
649 	     METHOD_DATA *md)
650 {
651     struct ContentInfo content_info;
652     krb5_error_code ret;
653     const heim_oid *oid = NULL;
654     size_t size = 0;
655     krb5_data buf, sd_buf;
656     int pa_type = -1;
657 
658     krb5_data_zero(&buf);
659     krb5_data_zero(&sd_buf);
660     memset(&content_info, 0, sizeof(content_info));
661 
662     if (ctx->type == PKINIT_WIN2K) {
663 	AuthPack_Win2k ap;
664 	krb5_timestamp sec;
665 	int32_t usec;
666 
667 	memset(&ap, 0, sizeof(ap));
668 
669 	/* fill in PKAuthenticator */
670 	ret = copy_PrincipalName(req_body->sname, &ap.pkAuthenticator.kdcName);
671 	if (ret) {
672 	    free_AuthPack_Win2k(&ap);
673 	    krb5_clear_error_message(context);
674 	    goto out;
675 	}
676 	ret = copy_Realm(&req_body->realm, &ap.pkAuthenticator.kdcRealm);
677 	if (ret) {
678 	    free_AuthPack_Win2k(&ap);
679 	    krb5_clear_error_message(context);
680 	    goto out;
681 	}
682 
683 	krb5_us_timeofday(context, &sec, &usec);
684 	ap.pkAuthenticator.ctime = sec;
685 	ap.pkAuthenticator.cusec = usec;
686 	ap.pkAuthenticator.nonce = nonce;
687 
688 	ASN1_MALLOC_ENCODE(AuthPack_Win2k, buf.data, buf.length,
689 			   &ap, &size, ret);
690 	free_AuthPack_Win2k(&ap);
691 	if (ret) {
692 	    krb5_set_error_message(context, ret,
693 				   N_("Failed encoding AuthPackWin: %d", ""),
694 				   (int)ret);
695 	    goto out;
696 	}
697 	if (buf.length != size)
698 	    krb5_abortx(context, "internal ASN1 encoder error");
699 
700 	oid = &asn1_oid_id_pkcs7_data;
701     } else if (ctx->type == PKINIT_27) {
702 	AuthPack ap;
703 
704 	memset(&ap, 0, sizeof(ap));
705 
706 	ret = build_auth_pack(context, nonce, ctx, req_body, &ap);
707 	if (ret) {
708 	    free_AuthPack(&ap);
709 	    goto out;
710 	}
711 
712 	ASN1_MALLOC_ENCODE(AuthPack, buf.data, buf.length, &ap, &size, ret);
713 	free_AuthPack(&ap);
714 	if (ret) {
715 	    krb5_set_error_message(context, ret,
716 				   N_("Failed encoding AuthPack: %d", ""),
717 				   (int)ret);
718 	    goto out;
719 	}
720 	if (buf.length != size)
721 	    krb5_abortx(context, "internal ASN1 encoder error");
722 
723 	oid = &asn1_oid_id_pkauthdata;
724     } else
725 	krb5_abortx(context, "internal pkinit error");
726 
727     ret = create_signature(context, oid, &buf, ctx->id,
728 			   ctx->peer, &sd_buf);
729     krb5_data_free(&buf);
730     if (ret)
731 	goto out;
732 
733     ret = hx509_cms_wrap_ContentInfo(&asn1_oid_id_pkcs7_signedData, &sd_buf, &buf);
734     krb5_data_free(&sd_buf);
735     if (ret) {
736 	krb5_set_error_message(context, ret,
737 			       N_("ContentInfo wrapping of signedData failed",""));
738 	goto out;
739     }
740 
741     if (ctx->type == PKINIT_WIN2K) {
742 	PA_PK_AS_REQ_Win2k winreq;
743 
744 	pa_type = KRB5_PADATA_PK_AS_REQ_WIN;
745 
746 	memset(&winreq, 0, sizeof(winreq));
747 
748 	winreq.signed_auth_pack = buf;
749 
750 	ASN1_MALLOC_ENCODE(PA_PK_AS_REQ_Win2k, buf.data, buf.length,
751 			   &winreq, &size, ret);
752 	free_PA_PK_AS_REQ_Win2k(&winreq);
753 
754     } else if (ctx->type == PKINIT_27) {
755 	PA_PK_AS_REQ req;
756 
757 	pa_type = KRB5_PADATA_PK_AS_REQ;
758 
759 	memset(&req, 0, sizeof(req));
760 	req.signedAuthPack = buf;
761 
762 	if (ctx->trustedCertifiers) {
763 
764 	    req.trustedCertifiers = calloc(1, sizeof(*req.trustedCertifiers));
765 	    if (req.trustedCertifiers == NULL) {
766 		ret = ENOMEM;
767 		krb5_set_error_message(context, ret,
768 				       N_("malloc: out of memory", ""));
769 		free_PA_PK_AS_REQ(&req);
770 		goto out;
771 	    }
772 	    ret = build_edi(context, context->hx509ctx,
773 			    ctx->id->anchors, req.trustedCertifiers);
774 	    if (ret) {
775 		krb5_set_error_message(context, ret,
776 				       N_("pk-init: failed to build "
777 					  "trustedCertifiers", ""));
778 		free_PA_PK_AS_REQ(&req);
779 		goto out;
780 	    }
781 	}
782 	req.kdcPkId = NULL;
783 
784 	ASN1_MALLOC_ENCODE(PA_PK_AS_REQ, buf.data, buf.length,
785 			   &req, &size, ret);
786 
787 	free_PA_PK_AS_REQ(&req);
788 
789     } else
790 	krb5_abortx(context, "internal pkinit error");
791     if (ret) {
792 	krb5_set_error_message(context, ret, "PA-PK-AS-REQ %d", (int)ret);
793 	goto out;
794     }
795     if (buf.length != size)
796 	krb5_abortx(context, "Internal ASN1 encoder error");
797 
798     ret = krb5_padata_add(context, md, pa_type, buf.data, buf.length);
799     if (ret)
800 	free(buf.data);
801 
802     if (ret == 0)
803     	krb5_padata_add(context, md, KRB5_PADATA_PK_AS_09_BINDING, NULL, 0);
804 
805  out:
806     free_ContentInfo(&content_info);
807 
808     return ret;
809 }
810 
811 
812 KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
813 _krb5_pk_mk_padata(krb5_context context,
814 		   void *c,
815 		   int ic_flags,
816 		   int win2k,
817 		   const KDC_REQ_BODY *req_body,
818 		   unsigned nonce,
819 		   METHOD_DATA *md)
820 {
821     krb5_pk_init_ctx ctx = c;
822     int win2k_compat;
823 
824     if (ctx->id->certs == NULL && ctx->anonymous == 0) {
825 	krb5_set_error_message(context, HEIM_PKINIT_NO_PRIVATE_KEY,
826 			       N_("PKINIT: No user certificate given", ""));
827 	return HEIM_PKINIT_NO_PRIVATE_KEY;
828     }
829 
830     win2k_compat = krb5_config_get_bool_default(context, NULL,
831 						win2k,
832 						"realms",
833 						req_body->realm,
834 						"pkinit_win2k",
835 						NULL);
836 
837     if (win2k_compat) {
838 	ctx->require_binding =
839 	    krb5_config_get_bool_default(context, NULL,
840 					 TRUE,
841 					 "realms",
842 					 req_body->realm,
843 					 "pkinit_win2k_require_binding",
844 					 NULL);
845 	ctx->type = PKINIT_WIN2K;
846     } else
847 	ctx->type = PKINIT_27;
848 
849     ctx->require_eku =
850 	krb5_config_get_bool_default(context, NULL,
851 				     TRUE,
852 				     "realms",
853 				     req_body->realm,
854 				     "pkinit_require_eku",
855 				     NULL);
856     if (ic_flags & KRB5_INIT_CREDS_NO_C_NO_EKU_CHECK)
857 	ctx->require_eku = 0;
858     if (ctx->id->flags & PKINIT_BTMM)
859 	ctx->require_eku = 0;
860 
861     ctx->require_krbtgt_otherName =
862 	krb5_config_get_bool_default(context, NULL,
863 				     TRUE,
864 				     "realms",
865 				     req_body->realm,
866 				     "pkinit_require_krbtgt_otherName",
867 				     NULL);
868 
869     ctx->require_hostname_match =
870 	krb5_config_get_bool_default(context, NULL,
871 				     FALSE,
872 				     "realms",
873 				     req_body->realm,
874 				     "pkinit_require_hostname_match",
875 				     NULL);
876 
877     ctx->trustedCertifiers =
878 	krb5_config_get_bool_default(context, NULL,
879 				     TRUE,
880 				     "realms",
881 				     req_body->realm,
882 				     "pkinit_trustedCertifiers",
883 				     NULL);
884 
885     return pk_mk_padata(context, ctx, req_body, nonce, md);
886 }
887 
888 static krb5_error_code
889 pk_verify_sign(krb5_context context,
890 	       const void *data,
891 	       size_t length,
892 	       struct krb5_pk_identity *id,
893 	       heim_oid *contentType,
894 	       krb5_data *content,
895 	       struct krb5_pk_cert **signer)
896 {
897     hx509_certs signer_certs;
898     int ret, flags = 0;
899 
900     /* BTMM is broken in Leo and SnowLeo */
901     if (id->flags & PKINIT_BTMM) {
902 	flags |= HX509_CMS_VS_ALLOW_DATA_OID_MISMATCH;
903 	flags |= HX509_CMS_VS_NO_KU_CHECK;
904 	flags |= HX509_CMS_VS_NO_VALIDATE;
905     }
906 
907     *signer = NULL;
908 
909     ret = hx509_cms_verify_signed(context->hx509ctx,
910 				  id->verify_ctx,
911 				  flags,
912 				  data,
913 				  length,
914 				  NULL,
915 				  id->certpool,
916 				  contentType,
917 				  content,
918 				  &signer_certs);
919     if (ret) {
920 	pk_copy_error(context, context->hx509ctx, ret,
921 		      "CMS verify signed failed");
922 	return ret;
923     }
924 
925     *signer = calloc(1, sizeof(**signer));
926     if (*signer == NULL) {
927 	krb5_clear_error_message(context);
928 	ret = ENOMEM;
929 	goto out;
930     }
931 
932     ret = hx509_get_one_cert(context->hx509ctx, signer_certs, &(*signer)->cert);
933     if (ret) {
934 	pk_copy_error(context, context->hx509ctx, ret,
935 		      "Failed to get on of the signer certs");
936 	goto out;
937     }
938 
939  out:
940     hx509_certs_free(&signer_certs);
941     if (ret) {
942 	if (*signer) {
943 	    hx509_cert_free((*signer)->cert);
944 	    free(*signer);
945 	    *signer = NULL;
946 	}
947     }
948 
949     return ret;
950 }
951 
952 static krb5_error_code
953 get_reply_key_win(krb5_context context,
954 		  const krb5_data *content,
955 		  unsigned nonce,
956 		  krb5_keyblock **key)
957 {
958     ReplyKeyPack_Win2k key_pack;
959     krb5_error_code ret;
960     size_t size;
961 
962     ret = decode_ReplyKeyPack_Win2k(content->data,
963 				    content->length,
964 				    &key_pack,
965 				    &size);
966     if (ret) {
967 	krb5_set_error_message(context, ret,
968 			       N_("PKINIT decoding reply key failed", ""));
969 	free_ReplyKeyPack_Win2k(&key_pack);
970 	return ret;
971     }
972 
973     if ((unsigned)key_pack.nonce != nonce) {
974 	krb5_set_error_message(context, ret,
975 			       N_("PKINIT enckey nonce is wrong", ""));
976 	free_ReplyKeyPack_Win2k(&key_pack);
977 	return KRB5KRB_AP_ERR_MODIFIED;
978     }
979 
980     *key = malloc (sizeof (**key));
981     if (*key == NULL) {
982 	free_ReplyKeyPack_Win2k(&key_pack);
983 	krb5_set_error_message(context, ENOMEM,
984 			       N_("malloc: out of memory", ""));
985 	return ENOMEM;
986     }
987 
988     ret = copy_EncryptionKey(&key_pack.replyKey, *key);
989     free_ReplyKeyPack_Win2k(&key_pack);
990     if (ret) {
991 	krb5_set_error_message(context, ret,
992 			       N_("PKINIT failed copying reply key", ""));
993 	free(*key);
994 	*key = NULL;
995     }
996 
997     return ret;
998 }
999 
1000 static krb5_error_code
1001 get_reply_key(krb5_context context,
1002 	      const krb5_data *content,
1003 	      const krb5_data *req_buffer,
1004 	      krb5_keyblock **key)
1005 {
1006     ReplyKeyPack key_pack;
1007     krb5_error_code ret;
1008     size_t size;
1009 
1010     ret = decode_ReplyKeyPack(content->data,
1011 			      content->length,
1012 			      &key_pack,
1013 			      &size);
1014     if (ret) {
1015 	krb5_set_error_message(context, ret,
1016 			       N_("PKINIT decoding reply key failed", ""));
1017 	free_ReplyKeyPack(&key_pack);
1018 	return ret;
1019     }
1020 
1021     {
1022 	krb5_crypto crypto;
1023 
1024 	/*
1025 	 * XXX Verify kp.replyKey is a allowed enctype in the
1026 	 * configuration file
1027 	 */
1028 
1029 	ret = krb5_crypto_init(context, &key_pack.replyKey, 0, &crypto);
1030 	if (ret) {
1031 	    free_ReplyKeyPack(&key_pack);
1032 	    return ret;
1033 	}
1034 
1035 	ret = krb5_verify_checksum(context, crypto, 6,
1036 				   req_buffer->data, req_buffer->length,
1037 				   &key_pack.asChecksum);
1038 	krb5_crypto_destroy(context, crypto);
1039 	if (ret) {
1040 	    free_ReplyKeyPack(&key_pack);
1041 	    return ret;
1042 	}
1043     }
1044 
1045     *key = malloc (sizeof (**key));
1046     if (*key == NULL) {
1047 	free_ReplyKeyPack(&key_pack);
1048 	krb5_set_error_message(context, ENOMEM,
1049 			       N_("malloc: out of memory", ""));
1050 	return ENOMEM;
1051     }
1052 
1053     ret = copy_EncryptionKey(&key_pack.replyKey, *key);
1054     free_ReplyKeyPack(&key_pack);
1055     if (ret) {
1056 	krb5_set_error_message(context, ret,
1057 			       N_("PKINIT failed copying reply key", ""));
1058 	free(*key);
1059 	*key = NULL;
1060     }
1061 
1062     return ret;
1063 }
1064 
1065 
1066 static krb5_error_code
1067 pk_verify_host(krb5_context context,
1068 	       const char *realm,
1069 	       const krb5_krbhst_info *hi,
1070 	       struct krb5_pk_init_ctx_data *ctx,
1071 	       struct krb5_pk_cert *host)
1072 {
1073     krb5_error_code ret = 0;
1074 
1075     if (ctx->require_eku) {
1076 	ret = hx509_cert_check_eku(context->hx509ctx, host->cert,
1077 				   &asn1_oid_id_pkkdcekuoid, 0);
1078 	if (ret) {
1079 	    krb5_set_error_message(context, ret,
1080 				   N_("No PK-INIT KDC EKU in kdc certificate", ""));
1081 	    return ret;
1082 	}
1083     }
1084     if (ctx->require_krbtgt_otherName) {
1085 	hx509_octet_string_list list;
1086 	size_t i;
1087 
1088 	ret = hx509_cert_find_subjectAltName_otherName(context->hx509ctx,
1089 						       host->cert,
1090 						       &asn1_oid_id_pkinit_san,
1091 						       &list);
1092 	if (ret) {
1093 	    krb5_set_error_message(context, ret,
1094 				   N_("Failed to find the PK-INIT "
1095 				      "subjectAltName in the KDC "
1096 				      "certificate", ""));
1097 
1098 	    return ret;
1099 	}
1100 
1101 	for (i = 0; i < list.len; i++) {
1102 	    KRB5PrincipalName r;
1103 
1104 	    ret = decode_KRB5PrincipalName(list.val[i].data,
1105 					   list.val[i].length,
1106 					   &r,
1107 					   NULL);
1108 	    if (ret) {
1109 		krb5_set_error_message(context, ret,
1110 				       N_("Failed to decode the PK-INIT "
1111 					  "subjectAltName in the "
1112 					  "KDC certificate", ""));
1113 
1114 		break;
1115 	    }
1116 
1117 	    if (r.principalName.name_string.len != 2 ||
1118 		strcmp(r.principalName.name_string.val[0], KRB5_TGS_NAME) != 0 ||
1119 		strcmp(r.principalName.name_string.val[1], realm) != 0 ||
1120 		strcmp(r.realm, realm) != 0)
1121 		{
1122 		    ret = KRB5_KDC_ERR_INVALID_CERTIFICATE;
1123 		    krb5_set_error_message(context, ret,
1124 					   N_("KDC have wrong realm name in "
1125 					      "the certificate", ""));
1126 		}
1127 
1128 	    free_KRB5PrincipalName(&r);
1129 	    if (ret)
1130 		break;
1131 	}
1132 	hx509_free_octet_string_list(&list);
1133     }
1134     if (ret)
1135 	return ret;
1136 
1137     if (hi) {
1138 	ret = hx509_verify_hostname(context->hx509ctx, host->cert,
1139 				    ctx->require_hostname_match,
1140 				    HX509_HN_HOSTNAME,
1141 				    hi->hostname,
1142 				    hi->ai->ai_addr, hi->ai->ai_addrlen);
1143 
1144 	if (ret)
1145 	    krb5_set_error_message(context, ret,
1146 				   N_("Address mismatch in "
1147 				      "the KDC certificate", ""));
1148     }
1149     return ret;
1150 }
1151 
1152 static krb5_error_code
1153 pk_rd_pa_reply_enckey(krb5_context context,
1154 		      int type,
1155 		      const heim_octet_string *indata,
1156 		      const heim_oid *dataType,
1157 		      const char *realm,
1158 		      krb5_pk_init_ctx ctx,
1159 		      krb5_enctype etype,
1160 		      const krb5_krbhst_info *hi,
1161 	       	      unsigned nonce,
1162 		      const krb5_data *req_buffer,
1163 	       	      PA_DATA *pa,
1164 	       	      krb5_keyblock **key)
1165 {
1166     krb5_error_code ret;
1167     struct krb5_pk_cert *host = NULL;
1168     krb5_data content;
1169     heim_oid contentType = { 0, NULL };
1170     int flags = HX509_CMS_UE_DONT_REQUIRE_KU_ENCIPHERMENT;
1171 
1172     if (der_heim_oid_cmp(&asn1_oid_id_pkcs7_envelopedData, dataType)) {
1173 	krb5_set_error_message(context, EINVAL,
1174 			       N_("PKINIT: Invalid content type", ""));
1175 	return EINVAL;
1176     }
1177 
1178     if (ctx->type == PKINIT_WIN2K)
1179 	flags |= HX509_CMS_UE_ALLOW_WEAK;
1180 
1181     ret = hx509_cms_unenvelope(context->hx509ctx,
1182 			       ctx->id->certs,
1183 			       flags,
1184 			       indata->data,
1185 			       indata->length,
1186 			       NULL,
1187 			       0,
1188 			       &contentType,
1189 			       &content);
1190     if (ret) {
1191 	pk_copy_error(context, context->hx509ctx, ret,
1192 		      "Failed to unenvelope CMS data in PK-INIT reply");
1193 	return ret;
1194     }
1195     der_free_oid(&contentType);
1196 
1197     /* win2k uses ContentInfo */
1198     if (type == PKINIT_WIN2K) {
1199 	heim_oid type2;
1200 	heim_octet_string out;
1201 
1202 	ret = hx509_cms_unwrap_ContentInfo(&content, &type2, &out, NULL);
1203 	if (ret) {
1204 	    /* windows LH with interesting CMS packets */
1205 	    size_t ph = 1 + der_length_len(content.length);
1206 	    unsigned char *ptr = malloc(content.length + ph);
1207 	    size_t l;
1208 
1209 	    memcpy(ptr + ph, content.data, content.length);
1210 
1211 	    ret = der_put_length_and_tag (ptr + ph - 1, ph, content.length,
1212 					  ASN1_C_UNIV, CONS, UT_Sequence, &l);
1213 	    if (ret)
1214 		return ret;
1215 	    free(content.data);
1216 	    content.data = ptr;
1217 	    content.length += ph;
1218 
1219 	    ret = hx509_cms_unwrap_ContentInfo(&content, &type2, &out, NULL);
1220 	    if (ret)
1221 		goto out;
1222 	}
1223 	if (der_heim_oid_cmp(&type2, &asn1_oid_id_pkcs7_signedData)) {
1224 	    ret = EINVAL; /* XXX */
1225 	    krb5_set_error_message(context, ret,
1226 				   N_("PKINIT: Invalid content type", ""));
1227 	    der_free_oid(&type2);
1228 	    der_free_octet_string(&out);
1229 	    goto out;
1230 	}
1231 	der_free_oid(&type2);
1232 	krb5_data_free(&content);
1233 	ret = krb5_data_copy(&content, out.data, out.length);
1234 	der_free_octet_string(&out);
1235 	if (ret) {
1236 	    krb5_set_error_message(context, ret,
1237 				   N_("malloc: out of memory", ""));
1238 	    goto out;
1239 	}
1240     }
1241 
1242     ret = pk_verify_sign(context,
1243 			 content.data,
1244 			 content.length,
1245 			 ctx->id,
1246 			 &contentType,
1247 			 &content,
1248 			 &host);
1249     if (ret)
1250 	goto out;
1251 
1252     /* make sure that it is the kdc's certificate */
1253     ret = pk_verify_host(context, realm, hi, ctx, host);
1254     if (ret) {
1255 	goto out;
1256     }
1257 
1258 #if 0
1259     if (type == PKINIT_WIN2K) {
1260 	if (der_heim_oid_cmp(&contentType, &asn1_oid_id_pkcs7_data) != 0) {
1261 	    ret = KRB5KRB_AP_ERR_MSG_TYPE;
1262 	    krb5_set_error_message(context, ret, "PKINIT: reply key, wrong oid");
1263 	    goto out;
1264 	}
1265     } else {
1266 	if (der_heim_oid_cmp(&contentType, &asn1_oid_id_pkrkeydata) != 0) {
1267 	    ret = KRB5KRB_AP_ERR_MSG_TYPE;
1268 	    krb5_set_error_message(context, ret, "PKINIT: reply key, wrong oid");
1269 	    goto out;
1270 	}
1271     }
1272 #endif
1273 
1274     switch(type) {
1275     case PKINIT_WIN2K:
1276 	ret = get_reply_key(context, &content, req_buffer, key);
1277 	if (ret != 0 && ctx->require_binding == 0)
1278 	    ret = get_reply_key_win(context, &content, nonce, key);
1279 	break;
1280     case PKINIT_27:
1281 	ret = get_reply_key(context, &content, req_buffer, key);
1282 	break;
1283     }
1284     if (ret)
1285 	goto out;
1286 
1287     /* XXX compare given etype with key->etype */
1288 
1289  out:
1290     if (host)
1291 	_krb5_pk_cert_free(host);
1292     der_free_oid(&contentType);
1293     krb5_data_free(&content);
1294 
1295     return ret;
1296 }
1297 
1298 static krb5_error_code
1299 pk_rd_pa_reply_dh(krb5_context context,
1300 		  const heim_octet_string *indata,
1301 		  const heim_oid *dataType,
1302 		  const char *realm,
1303 		  krb5_pk_init_ctx ctx,
1304 		  krb5_enctype etype,
1305 		  const krb5_krbhst_info *hi,
1306 		  const DHNonce *c_n,
1307 		  const DHNonce *k_n,
1308                   unsigned nonce,
1309                   PA_DATA *pa,
1310                   krb5_keyblock **key)
1311 {
1312     const unsigned char *p;
1313     unsigned char *dh_gen_key = NULL;
1314     struct krb5_pk_cert *host = NULL;
1315     BIGNUM *kdc_dh_pubkey = NULL;
1316     KDCDHKeyInfo kdc_dh_info;
1317     heim_oid contentType = { 0, NULL };
1318     krb5_data content;
1319     krb5_error_code ret;
1320     int dh_gen_keylen = 0;
1321     size_t size;
1322 
1323     krb5_data_zero(&content);
1324     memset(&kdc_dh_info, 0, sizeof(kdc_dh_info));
1325 
1326     if (der_heim_oid_cmp(&asn1_oid_id_pkcs7_signedData, dataType)) {
1327 	krb5_set_error_message(context, EINVAL,
1328 			       N_("PKINIT: Invalid content type", ""));
1329 	return EINVAL;
1330     }
1331 
1332     ret = pk_verify_sign(context,
1333 			 indata->data,
1334 			 indata->length,
1335 			 ctx->id,
1336 			 &contentType,
1337 			 &content,
1338 			 &host);
1339     if (ret)
1340 	goto out;
1341 
1342     /* make sure that it is the kdc's certificate */
1343     ret = pk_verify_host(context, realm, hi, ctx, host);
1344     if (ret)
1345 	goto out;
1346 
1347     if (der_heim_oid_cmp(&contentType, &asn1_oid_id_pkdhkeydata)) {
1348 	ret = KRB5KRB_AP_ERR_MSG_TYPE;
1349 	krb5_set_error_message(context, ret,
1350 			       N_("pkinit - dh reply contains wrong oid", ""));
1351 	goto out;
1352     }
1353 
1354     ret = decode_KDCDHKeyInfo(content.data,
1355 			      content.length,
1356 			      &kdc_dh_info,
1357 			      &size);
1358 
1359     if (ret) {
1360 	krb5_set_error_message(context, ret,
1361 			       N_("pkinit - failed to decode "
1362 				  "KDC DH Key Info", ""));
1363 	goto out;
1364     }
1365 
1366     if (kdc_dh_info.nonce != nonce) {
1367 	ret = KRB5KRB_AP_ERR_MODIFIED;
1368 	krb5_set_error_message(context, ret,
1369 			       N_("PKINIT: DH nonce is wrong", ""));
1370 	goto out;
1371     }
1372 
1373     if (kdc_dh_info.dhKeyExpiration) {
1374 	if (k_n == NULL) {
1375 	    ret = KRB5KRB_ERR_GENERIC;
1376 	    krb5_set_error_message(context, ret,
1377 				   N_("pkinit; got key expiration "
1378 				      "without server nonce", ""));
1379 	    goto out;
1380 	}
1381 	if (c_n == NULL) {
1382 	    ret = KRB5KRB_ERR_GENERIC;
1383 	    krb5_set_error_message(context, ret,
1384 				   N_("pkinit; got DH reuse but no "
1385 				      "client nonce", ""));
1386 	    goto out;
1387 	}
1388     } else {
1389 	if (k_n) {
1390 	    ret = KRB5KRB_ERR_GENERIC;
1391 	    krb5_set_error_message(context, ret,
1392 				   N_("pkinit: got server nonce "
1393 				      "without key expiration", ""));
1394 	    goto out;
1395 	}
1396 	c_n = NULL;
1397     }
1398 
1399 
1400     p = kdc_dh_info.subjectPublicKey.data;
1401     size = (kdc_dh_info.subjectPublicKey.length + 7) / 8;
1402 
1403     if (ctx->keyex == USE_DH) {
1404 	DHPublicKey k;
1405 	ret = decode_DHPublicKey(p, size, &k, NULL);
1406 	if (ret) {
1407 	    krb5_set_error_message(context, ret,
1408 				   N_("pkinit: can't decode "
1409 				      "without key expiration", ""));
1410 	    goto out;
1411 	}
1412 
1413 	kdc_dh_pubkey = integer_to_BN(context, "DHPublicKey", &k);
1414 	free_DHPublicKey(&k);
1415 	if (kdc_dh_pubkey == NULL) {
1416 	    ret = ENOMEM;
1417 	    goto out;
1418 	}
1419 
1420 
1421 	size = DH_size(ctx->u.dh);
1422 
1423 	dh_gen_key = malloc(size);
1424 	if (dh_gen_key == NULL) {
1425 	    ret = ENOMEM;
1426 	    krb5_set_error_message(context, ret, N_("malloc: out of memory", ""));
1427 	    goto out;
1428 	}
1429 
1430 	dh_gen_keylen = DH_compute_key(dh_gen_key, kdc_dh_pubkey, ctx->u.dh);
1431 	if (dh_gen_keylen == -1) {
1432 	    ret = KRB5KRB_ERR_GENERIC;
1433 	    dh_gen_keylen = 0;
1434 	    krb5_set_error_message(context, ret,
1435 				   N_("PKINIT: Can't compute Diffie-Hellman key", ""));
1436 	    goto out;
1437 	}
1438 	if (dh_gen_keylen < (int)size) {
1439 	    size -= dh_gen_keylen;
1440 	    memmove(dh_gen_key + size, dh_gen_key, dh_gen_keylen);
1441 	    memset(dh_gen_key, 0, size);
1442 	}
1443 
1444     } else {
1445 #ifdef HAVE_OPENSSL
1446 	const EC_GROUP *group;
1447 	EC_KEY *public = NULL;
1448 
1449 	group = EC_KEY_get0_group(ctx->u.eckey);
1450 
1451 	public = EC_KEY_new();
1452 	if (public == NULL) {
1453 	    ret = ENOMEM;
1454 	    goto out;
1455 	}
1456 	if (EC_KEY_set_group(public, group) != 1) {
1457 	    EC_KEY_free(public);
1458 	    ret = ENOMEM;
1459 	    goto out;
1460 	}
1461 
1462 	if (o2i_ECPublicKey(&public, &p, size) == NULL) {
1463 	    EC_KEY_free(public);
1464 	    ret = KRB5KRB_ERR_GENERIC;
1465 	    krb5_set_error_message(context, ret,
1466 				   N_("PKINIT: Can't parse ECDH public key", ""));
1467 	    goto out;
1468 	}
1469 
1470 	size = (EC_GROUP_get_degree(group) + 7) / 8;
1471 	dh_gen_key = malloc(size);
1472 	if (dh_gen_key == NULL) {
1473 	    EC_KEY_free(public);
1474 	    ret = ENOMEM;
1475 	    krb5_set_error_message(context, ret,
1476 				   N_("malloc: out of memory", ""));
1477 	    goto out;
1478 	}
1479 	dh_gen_keylen = ECDH_compute_key(dh_gen_key, size,
1480 					 EC_KEY_get0_public_key(public), ctx->u.eckey, NULL);
1481 	EC_KEY_free(public);
1482 	if (dh_gen_keylen == -1) {
1483 	    ret = KRB5KRB_ERR_GENERIC;
1484 	    dh_gen_keylen = 0;
1485 	    krb5_set_error_message(context, ret,
1486 				   N_("PKINIT: Can't compute ECDH public key", ""));
1487 	    goto out;
1488 	}
1489 #else
1490 	ret = EINVAL;
1491 #endif
1492     }
1493 
1494     if (dh_gen_keylen <= 0) {
1495 	ret = EINVAL;
1496 	krb5_set_error_message(context, ret,
1497 			       N_("PKINIT: resulting DH key <= 0", ""));
1498 	dh_gen_keylen = 0;
1499 	goto out;
1500     }
1501 
1502     *key = malloc (sizeof (**key));
1503     if (*key == NULL) {
1504 	ret = ENOMEM;
1505 	krb5_set_error_message(context, ret,
1506 			       N_("malloc: out of memory", ""));
1507 	goto out;
1508     }
1509 
1510     ret = _krb5_pk_octetstring2key(context,
1511 				   etype,
1512 				   dh_gen_key, dh_gen_keylen,
1513 				   c_n, k_n,
1514 				   *key);
1515     if (ret) {
1516 	krb5_set_error_message(context, ret,
1517 			       N_("PKINIT: can't create key from DH key", ""));
1518 	free(*key);
1519 	*key = NULL;
1520 	goto out;
1521     }
1522 
1523  out:
1524     if (kdc_dh_pubkey)
1525 	BN_free(kdc_dh_pubkey);
1526     if (dh_gen_key) {
1527 	memset(dh_gen_key, 0, dh_gen_keylen);
1528 	free(dh_gen_key);
1529     }
1530     if (host)
1531 	_krb5_pk_cert_free(host);
1532     if (content.data)
1533 	krb5_data_free(&content);
1534     der_free_oid(&contentType);
1535     free_KDCDHKeyInfo(&kdc_dh_info);
1536 
1537     return ret;
1538 }
1539 
1540 KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
1541 _krb5_pk_rd_pa_reply(krb5_context context,
1542 		     const char *realm,
1543 		     void *c,
1544 		     krb5_enctype etype,
1545 		     const krb5_krbhst_info *hi,
1546 		     unsigned nonce,
1547 		     const krb5_data *req_buffer,
1548 		     PA_DATA *pa,
1549 		     krb5_keyblock **key)
1550 {
1551     krb5_pk_init_ctx ctx = c;
1552     krb5_error_code ret;
1553     size_t size;
1554 
1555     /* Check for IETF PK-INIT first */
1556     if (ctx->type == PKINIT_27) {
1557 	PA_PK_AS_REP rep;
1558 	heim_octet_string os, data;
1559 	heim_oid oid;
1560 
1561 	if (pa->padata_type != KRB5_PADATA_PK_AS_REP) {
1562 	    krb5_set_error_message(context, EINVAL,
1563 				   N_("PKINIT: wrong padata recv", ""));
1564 	    return EINVAL;
1565 	}
1566 
1567 	ret = decode_PA_PK_AS_REP(pa->padata_value.data,
1568 				  pa->padata_value.length,
1569 				  &rep,
1570 				  &size);
1571 	if (ret) {
1572 	    krb5_set_error_message(context, ret,
1573 				   N_("Failed to decode pkinit AS rep", ""));
1574 	    return ret;
1575 	}
1576 
1577 	switch (rep.element) {
1578 	case choice_PA_PK_AS_REP_dhInfo:
1579 	    _krb5_debug(context, 5, "krb5_get_init_creds: using pkinit dh");
1580 	    os = rep.u.dhInfo.dhSignedData;
1581 	    break;
1582 	case choice_PA_PK_AS_REP_encKeyPack:
1583 	    _krb5_debug(context, 5, "krb5_get_init_creds: using kinit enc reply key");
1584 	    os = rep.u.encKeyPack;
1585 	    break;
1586 	default: {
1587 	    PA_PK_AS_REP_BTMM btmm;
1588 	    free_PA_PK_AS_REP(&rep);
1589 	    memset(&rep, 0, sizeof(rep));
1590 
1591 	    _krb5_debug(context, 5, "krb5_get_init_creds: using BTMM kinit enc reply key");
1592 
1593 	    ret = decode_PA_PK_AS_REP_BTMM(pa->padata_value.data,
1594 					   pa->padata_value.length,
1595 					   &btmm,
1596 					   &size);
1597 	    if (ret) {
1598 		krb5_set_error_message(context, EINVAL,
1599 				       N_("PKINIT: -27 reply "
1600 					  "invalid content type", ""));
1601 		return EINVAL;
1602 	    }
1603 
1604 	    if (btmm.dhSignedData || btmm.encKeyPack == NULL) {
1605 		free_PA_PK_AS_REP_BTMM(&btmm);
1606 		ret = EINVAL;
1607 		krb5_set_error_message(context, ret,
1608 				       N_("DH mode not supported for BTMM mode", ""));
1609 		return ret;
1610 	    }
1611 
1612 	    /*
1613 	     * Transform to IETF style PK-INIT reply so that free works below
1614 	     */
1615 
1616 	    rep.element = choice_PA_PK_AS_REP_encKeyPack;
1617 	    rep.u.encKeyPack.data = btmm.encKeyPack->data;
1618 	    rep.u.encKeyPack.length = btmm.encKeyPack->length;
1619 	    btmm.encKeyPack->data = NULL;
1620 	    btmm.encKeyPack->length = 0;
1621 	    free_PA_PK_AS_REP_BTMM(&btmm);
1622 	    os = rep.u.encKeyPack;
1623 	}
1624 	}
1625 
1626 	ret = hx509_cms_unwrap_ContentInfo(&os, &oid, &data, NULL);
1627 	if (ret) {
1628 	    free_PA_PK_AS_REP(&rep);
1629 	    krb5_set_error_message(context, ret,
1630 				   N_("PKINIT: failed to unwrap CI", ""));
1631 	    return ret;
1632 	}
1633 
1634 	switch (rep.element) {
1635 	case choice_PA_PK_AS_REP_dhInfo:
1636 	    ret = pk_rd_pa_reply_dh(context, &data, &oid, realm, ctx, etype, hi,
1637 				    ctx->clientDHNonce,
1638 				    rep.u.dhInfo.serverDHNonce,
1639 				    nonce, pa, key);
1640 	    break;
1641 	case choice_PA_PK_AS_REP_encKeyPack:
1642 	    ret = pk_rd_pa_reply_enckey(context, PKINIT_27, &data, &oid, realm,
1643 					ctx, etype, hi, nonce, req_buffer, pa, key);
1644 	    break;
1645 	default:
1646 	    krb5_abortx(context, "pk-init as-rep case not possible to happen");
1647 	}
1648 	der_free_octet_string(&data);
1649 	der_free_oid(&oid);
1650 	free_PA_PK_AS_REP(&rep);
1651 
1652     } else if (ctx->type == PKINIT_WIN2K) {
1653 	PA_PK_AS_REP_Win2k w2krep;
1654 
1655 	/* Check for Windows encoding of the AS-REP pa data */
1656 
1657 #if 0 /* should this be ? */
1658 	if (pa->padata_type != KRB5_PADATA_PK_AS_REP) {
1659 	    krb5_set_error_message(context, EINVAL,
1660 				   "PKINIT: wrong padata recv");
1661 	    return EINVAL;
1662 	}
1663 #endif
1664 
1665 	memset(&w2krep, 0, sizeof(w2krep));
1666 
1667 	ret = decode_PA_PK_AS_REP_Win2k(pa->padata_value.data,
1668 					pa->padata_value.length,
1669 					&w2krep,
1670 					&size);
1671 	if (ret) {
1672 	    krb5_set_error_message(context, ret,
1673 				   N_("PKINIT: Failed decoding windows "
1674 				      "pkinit reply %d", ""), (int)ret);
1675 	    return ret;
1676 	}
1677 
1678 	krb5_clear_error_message(context);
1679 
1680 	switch (w2krep.element) {
1681 	case choice_PA_PK_AS_REP_Win2k_encKeyPack: {
1682 	    heim_octet_string data;
1683 	    heim_oid oid;
1684 
1685 	    ret = hx509_cms_unwrap_ContentInfo(&w2krep.u.encKeyPack,
1686 					       &oid, &data, NULL);
1687 	    free_PA_PK_AS_REP_Win2k(&w2krep);
1688 	    if (ret) {
1689 		krb5_set_error_message(context, ret,
1690 				       N_("PKINIT: failed to unwrap CI", ""));
1691 		return ret;
1692 	    }
1693 
1694 	    ret = pk_rd_pa_reply_enckey(context, PKINIT_WIN2K, &data, &oid, realm,
1695 					ctx, etype, hi, nonce, req_buffer, pa, key);
1696 	    der_free_octet_string(&data);
1697 	    der_free_oid(&oid);
1698 
1699 	    break;
1700 	}
1701 	default:
1702 	    free_PA_PK_AS_REP_Win2k(&w2krep);
1703 	    ret = EINVAL;
1704 	    krb5_set_error_message(context, ret,
1705 				   N_("PKINIT: win2k reply invalid "
1706 				      "content type", ""));
1707 	    break;
1708 	}
1709 
1710     } else {
1711 	ret = EINVAL;
1712 	krb5_set_error_message(context, ret,
1713 			       N_("PKINIT: unknown reply type", ""));
1714     }
1715 
1716     return ret;
1717 }
1718 
1719 struct prompter {
1720     krb5_context context;
1721     krb5_prompter_fct prompter;
1722     void *prompter_data;
1723 };
1724 
1725 static int
1726 hx_pass_prompter(void *data, const hx509_prompt *prompter)
1727 {
1728     krb5_error_code ret;
1729     krb5_prompt prompt;
1730     krb5_data password_data;
1731     struct prompter *p = data;
1732 
1733     password_data.data   = prompter->reply.data;
1734     password_data.length = prompter->reply.length;
1735 
1736     prompt.prompt = prompter->prompt;
1737     prompt.hidden = hx509_prompt_hidden(prompter->type);
1738     prompt.reply  = &password_data;
1739 
1740     switch (prompter->type) {
1741     case HX509_PROMPT_TYPE_INFO:
1742 	prompt.type   = KRB5_PROMPT_TYPE_INFO;
1743 	break;
1744     case HX509_PROMPT_TYPE_PASSWORD:
1745     case HX509_PROMPT_TYPE_QUESTION:
1746     default:
1747 	prompt.type   = KRB5_PROMPT_TYPE_PASSWORD;
1748 	break;
1749     }
1750 
1751     ret = (*p->prompter)(p->context, p->prompter_data, NULL, NULL, 1, &prompt);
1752     if (ret) {
1753 	memset (prompter->reply.data, 0, prompter->reply.length);
1754 	return 1;
1755     }
1756     return 0;
1757 }
1758 
1759 static krb5_error_code
1760 _krb5_pk_set_user_id(krb5_context context,
1761 		     krb5_principal principal,
1762 		     krb5_pk_init_ctx ctx,
1763 		     struct hx509_certs_data *certs)
1764 {
1765     hx509_certs c = hx509_certs_ref(certs);
1766     hx509_query *q = NULL;
1767     int ret;
1768 
1769     if (ctx->id->certs)
1770 	hx509_certs_free(&ctx->id->certs);
1771     if (ctx->id->cert) {
1772 	hx509_cert_free(ctx->id->cert);
1773 	ctx->id->cert = NULL;
1774     }
1775 
1776     ctx->id->certs = c;
1777     ctx->anonymous = 0;
1778 
1779     ret = hx509_query_alloc(context->hx509ctx, &q);
1780     if (ret) {
1781 	pk_copy_error(context, context->hx509ctx, ret,
1782 		      "Allocate query to find signing certificate");
1783 	return ret;
1784     }
1785 
1786     hx509_query_match_option(q, HX509_QUERY_OPTION_PRIVATE_KEY);
1787     hx509_query_match_option(q, HX509_QUERY_OPTION_KU_DIGITALSIGNATURE);
1788 
1789     if (principal && strncmp("LKDC:SHA1.", krb5_principal_get_realm(context, principal), 9) == 0) {
1790 	ctx->id->flags |= PKINIT_BTMM;
1791     }
1792 
1793     ret = find_cert(context, ctx->id, q, &ctx->id->cert);
1794     hx509_query_free(context->hx509ctx, q);
1795 
1796     if (ret == 0 && _krb5_have_debug(context, 2)) {
1797 	hx509_name name;
1798 	char *str, *sn;
1799 	heim_integer i;
1800 
1801 	ret = hx509_cert_get_subject(ctx->id->cert, &name);
1802 	if (ret)
1803 	    goto out;
1804 
1805 	ret = hx509_name_to_string(name, &str);
1806 	hx509_name_free(&name);
1807 	if (ret)
1808 	    goto out;
1809 
1810 	ret = hx509_cert_get_serialnumber(ctx->id->cert, &i);
1811 	if (ret) {
1812 	    free(str);
1813 	    goto out;
1814 	}
1815 
1816 	ret = der_print_hex_heim_integer(&i, &sn);
1817 	der_free_heim_integer(&i);
1818 	if (ret) {
1819 	    free(name);
1820 	    goto out;
1821 	}
1822 
1823 	_krb5_debug(context, 2, "using cert: subject: %s sn: %s", str, sn);
1824 	free(str);
1825 	free(sn);
1826     }
1827  out:
1828 
1829     return ret;
1830 }
1831 
1832 KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
1833 _krb5_pk_load_id(krb5_context context,
1834 		 struct krb5_pk_identity **ret_id,
1835 		 const char *user_id,
1836 		 const char *anchor_id,
1837 		 char * const *chain_list,
1838 		 char * const *revoke_list,
1839 		 krb5_prompter_fct prompter,
1840 		 void *prompter_data,
1841 		 char *password)
1842 {
1843     struct krb5_pk_identity *id = NULL;
1844     struct prompter p;
1845     int ret;
1846 
1847     *ret_id = NULL;
1848 
1849     if (anchor_id == NULL) {
1850 	krb5_set_error_message(context, HEIM_PKINIT_NO_VALID_CA,
1851 			       N_("PKINIT: No anchor given", ""));
1852 	return HEIM_PKINIT_NO_VALID_CA;
1853     }
1854 
1855     /* load cert */
1856 
1857     id = calloc(1, sizeof(*id));
1858     if (id == NULL) {
1859 	krb5_set_error_message(context, ENOMEM,
1860 			       N_("malloc: out of memory", ""));
1861 	return ENOMEM;
1862     }
1863 
1864     if (user_id) {
1865 	hx509_lock lock;
1866 
1867 	ret = hx509_lock_init(context->hx509ctx, &lock);
1868 	if (ret) {
1869 	    pk_copy_error(context, context->hx509ctx, ret, "Failed init lock");
1870 	    goto out;
1871 	}
1872 
1873 	if (password && password[0])
1874 	    hx509_lock_add_password(lock, password);
1875 
1876 	if (prompter) {
1877 	    p.context = context;
1878 	    p.prompter = prompter;
1879 	    p.prompter_data = prompter_data;
1880 
1881 	    ret = hx509_lock_set_prompter(lock, hx_pass_prompter, &p);
1882 	    if (ret) {
1883 		hx509_lock_free(lock);
1884 		goto out;
1885 	    }
1886 	}
1887 
1888 	ret = hx509_certs_init(context->hx509ctx, user_id, 0, lock, &id->certs);
1889         hx509_lock_free(lock);
1890 	if (ret) {
1891 	    pk_copy_error(context, context->hx509ctx, ret,
1892 			  "Failed to init cert certs");
1893 	    goto out;
1894 	}
1895     } else {
1896 	id->certs = NULL;
1897     }
1898 
1899     ret = hx509_certs_init(context->hx509ctx, anchor_id, 0, NULL, &id->anchors);
1900     if (ret) {
1901 	pk_copy_error(context, context->hx509ctx, ret,
1902 		      "Failed to init anchors");
1903 	goto out;
1904     }
1905 
1906     ret = hx509_certs_init(context->hx509ctx, "MEMORY:pkinit-cert-chain",
1907 			   0, NULL, &id->certpool);
1908     if (ret) {
1909 	pk_copy_error(context, context->hx509ctx, ret,
1910 		      "Failed to init chain");
1911 	goto out;
1912     }
1913 
1914     while (chain_list && *chain_list) {
1915 	ret = hx509_certs_append(context->hx509ctx, id->certpool,
1916 				 NULL, *chain_list);
1917 	if (ret) {
1918 	    pk_copy_error(context, context->hx509ctx, ret,
1919 			  "Failed to laod chain %s",
1920 			  *chain_list);
1921 	    goto out;
1922 	}
1923 	chain_list++;
1924     }
1925 
1926     if (revoke_list) {
1927 	ret = hx509_revoke_init(context->hx509ctx, &id->revokectx);
1928 	if (ret) {
1929 	    pk_copy_error(context, context->hx509ctx, ret,
1930 			  "Failed init revoke list");
1931 	    goto out;
1932 	}
1933 
1934 	while (*revoke_list) {
1935 	    ret = hx509_revoke_add_crl(context->hx509ctx,
1936 				       id->revokectx,
1937 				       *revoke_list);
1938 	    if (ret) {
1939 		pk_copy_error(context, context->hx509ctx, ret,
1940 			      "Failed load revoke list");
1941 		goto out;
1942 	    }
1943 	    revoke_list++;
1944 	}
1945     } else
1946 	hx509_context_set_missing_revoke(context->hx509ctx, 1);
1947 
1948     ret = hx509_verify_init_ctx(context->hx509ctx, &id->verify_ctx);
1949     if (ret) {
1950 	pk_copy_error(context, context->hx509ctx, ret,
1951 		      "Failed init verify context");
1952 	goto out;
1953     }
1954 
1955     hx509_verify_attach_anchors(id->verify_ctx, id->anchors);
1956     hx509_verify_attach_revoke(id->verify_ctx, id->revokectx);
1957 
1958  out:
1959     if (ret) {
1960 	hx509_verify_destroy_ctx(id->verify_ctx);
1961 	hx509_certs_free(&id->certs);
1962 	hx509_certs_free(&id->anchors);
1963 	hx509_certs_free(&id->certpool);
1964 	hx509_revoke_free(&id->revokectx);
1965 	free(id);
1966     } else
1967 	*ret_id = id;
1968 
1969     return ret;
1970 }
1971 
1972 /*
1973  *
1974  */
1975 
1976 static void
1977 pk_copy_error(krb5_context context,
1978 	      hx509_context hx509ctx,
1979 	      int hxret,
1980 	      const char *fmt,
1981 	      ...)
1982 {
1983     va_list va;
1984     char *s, *f;
1985     int ret;
1986 
1987     va_start(va, fmt);
1988     ret = vasprintf(&f, fmt, va);
1989     va_end(va);
1990     if (ret == -1 || f == NULL) {
1991 	krb5_clear_error_message(context);
1992 	return;
1993     }
1994 
1995     s = hx509_get_error_string(hx509ctx, hxret);
1996     if (s == NULL) {
1997 	krb5_clear_error_message(context);
1998 	free(f);
1999 	return;
2000     }
2001     krb5_set_error_message(context, hxret, "%s: %s", f, s);
2002     free(s);
2003     free(f);
2004 }
2005 
2006 static int
2007 parse_integer(krb5_context context, char **p, const char *file, int lineno,
2008 	      const char *name, heim_integer *integer)
2009 {
2010     int ret;
2011     char *p1;
2012     p1 = strsep(p, " \t");
2013     if (p1 == NULL) {
2014 	krb5_set_error_message(context, EINVAL,
2015 			       N_("moduli file %s missing %s on line %d", ""),
2016 			       file, name, lineno);
2017 	return EINVAL;
2018     }
2019     ret = der_parse_hex_heim_integer(p1, integer);
2020     if (ret) {
2021 	krb5_set_error_message(context, ret,
2022 			       N_("moduli file %s failed parsing %s "
2023 				  "on line %d", ""),
2024 			       file, name, lineno);
2025 	return ret;
2026     }
2027 
2028     return 0;
2029 }
2030 
2031 krb5_error_code
2032 _krb5_parse_moduli_line(krb5_context context,
2033 			const char *file,
2034 			int lineno,
2035 			char *p,
2036 			struct krb5_dh_moduli **m)
2037 {
2038     struct krb5_dh_moduli *m1;
2039     char *p1;
2040     int ret;
2041 
2042     *m = NULL;
2043 
2044     m1 = calloc(1, sizeof(*m1));
2045     if (m1 == NULL) {
2046 	krb5_set_error_message(context, ENOMEM,
2047 			       N_("malloc: out of memory", ""));
2048 	return ENOMEM;
2049     }
2050 
2051     while (isspace((unsigned char)*p))
2052 	p++;
2053     if (*p  == '#') {
2054         free(m1);
2055 	return 0;
2056     }
2057     ret = EINVAL;
2058 
2059     p1 = strsep(&p, " \t");
2060     if (p1 == NULL) {
2061 	krb5_set_error_message(context, ret,
2062 			       N_("moduli file %s missing name on line %d", ""),
2063 			       file, lineno);
2064 	goto out;
2065     }
2066     m1->name = strdup(p1);
2067     if (m1->name == NULL) {
2068 	ret = ENOMEM;
2069 	krb5_set_error_message(context, ret, N_("malloc: out of memeory", ""));
2070 	goto out;
2071     }
2072 
2073     p1 = strsep(&p, " \t");
2074     if (p1 == NULL) {
2075 	krb5_set_error_message(context, ret,
2076 			       N_("moduli file %s missing bits on line %d", ""),
2077 			       file, lineno);
2078 	goto out;
2079     }
2080 
2081     m1->bits = atoi(p1);
2082     if (m1->bits == 0) {
2083 	krb5_set_error_message(context, ret,
2084 			       N_("moduli file %s have un-parsable "
2085 				  "bits on line %d", ""), file, lineno);
2086 	goto out;
2087     }
2088 
2089     ret = parse_integer(context, &p, file, lineno, "p", &m1->p);
2090     if (ret)
2091 	goto out;
2092     ret = parse_integer(context, &p, file, lineno, "g", &m1->g);
2093     if (ret)
2094 	goto out;
2095     ret = parse_integer(context, &p, file, lineno, "q", &m1->q);
2096     if (ret)
2097 	goto out;
2098 
2099     *m = m1;
2100 
2101     return 0;
2102  out:
2103     free(m1->name);
2104     der_free_heim_integer(&m1->p);
2105     der_free_heim_integer(&m1->g);
2106     der_free_heim_integer(&m1->q);
2107     free(m1);
2108     return ret;
2109 }
2110 
2111 void
2112 _krb5_free_moduli(struct krb5_dh_moduli **moduli)
2113 {
2114     int i;
2115     for (i = 0; moduli[i] != NULL; i++) {
2116 	free(moduli[i]->name);
2117 	der_free_heim_integer(&moduli[i]->p);
2118 	der_free_heim_integer(&moduli[i]->g);
2119 	der_free_heim_integer(&moduli[i]->q);
2120 	free(moduli[i]);
2121     }
2122     free(moduli);
2123 }
2124 
2125 static const char *default_moduli_RFC2412_MODP_group2 =
2126     /* name */
2127     "RFC2412-MODP-group2 "
2128     /* bits */
2129     "1024 "
2130     /* p */
2131     "FFFFFFFF" "FFFFFFFF" "C90FDAA2" "2168C234" "C4C6628B" "80DC1CD1"
2132     "29024E08" "8A67CC74" "020BBEA6" "3B139B22" "514A0879" "8E3404DD"
2133     "EF9519B3" "CD3A431B" "302B0A6D" "F25F1437" "4FE1356D" "6D51C245"
2134     "E485B576" "625E7EC6" "F44C42E9" "A637ED6B" "0BFF5CB6" "F406B7ED"
2135     "EE386BFB" "5A899FA5" "AE9F2411" "7C4B1FE6" "49286651" "ECE65381"
2136     "FFFFFFFF" "FFFFFFFF "
2137     /* g */
2138     "02 "
2139     /* q */
2140     "7FFFFFFF" "FFFFFFFF" "E487ED51" "10B4611A" "62633145" "C06E0E68"
2141     "94812704" "4533E63A" "0105DF53" "1D89CD91" "28A5043C" "C71A026E"
2142     "F7CA8CD9" "E69D218D" "98158536" "F92F8A1B" "A7F09AB6" "B6A8E122"
2143     "F242DABB" "312F3F63" "7A262174" "D31BF6B5" "85FFAE5B" "7A035BF6"
2144     "F71C35FD" "AD44CFD2" "D74F9208" "BE258FF3" "24943328" "F67329C0"
2145     "FFFFFFFF" "FFFFFFFF";
2146 
2147 static const char *default_moduli_rfc3526_MODP_group14 =
2148     /* name */
2149     "rfc3526-MODP-group14 "
2150     /* bits */
2151     "1760 "
2152     /* p */
2153     "FFFFFFFF" "FFFFFFFF" "C90FDAA2" "2168C234" "C4C6628B" "80DC1CD1"
2154     "29024E08" "8A67CC74" "020BBEA6" "3B139B22" "514A0879" "8E3404DD"
2155     "EF9519B3" "CD3A431B" "302B0A6D" "F25F1437" "4FE1356D" "6D51C245"
2156     "E485B576" "625E7EC6" "F44C42E9" "A637ED6B" "0BFF5CB6" "F406B7ED"
2157     "EE386BFB" "5A899FA5" "AE9F2411" "7C4B1FE6" "49286651" "ECE45B3D"
2158     "C2007CB8" "A163BF05" "98DA4836" "1C55D39A" "69163FA8" "FD24CF5F"
2159     "83655D23" "DCA3AD96" "1C62F356" "208552BB" "9ED52907" "7096966D"
2160     "670C354E" "4ABC9804" "F1746C08" "CA18217C" "32905E46" "2E36CE3B"
2161     "E39E772C" "180E8603" "9B2783A2" "EC07A28F" "B5C55DF0" "6F4C52C9"
2162     "DE2BCBF6" "95581718" "3995497C" "EA956AE5" "15D22618" "98FA0510"
2163     "15728E5A" "8AACAA68" "FFFFFFFF" "FFFFFFFF "
2164     /* g */
2165     "02 "
2166     /* q */
2167     "7FFFFFFF" "FFFFFFFF" "E487ED51" "10B4611A" "62633145" "C06E0E68"
2168     "94812704" "4533E63A" "0105DF53" "1D89CD91" "28A5043C" "C71A026E"
2169     "F7CA8CD9" "E69D218D" "98158536" "F92F8A1B" "A7F09AB6" "B6A8E122"
2170     "F242DABB" "312F3F63" "7A262174" "D31BF6B5" "85FFAE5B" "7A035BF6"
2171     "F71C35FD" "AD44CFD2" "D74F9208" "BE258FF3" "24943328" "F6722D9E"
2172     "E1003E5C" "50B1DF82" "CC6D241B" "0E2AE9CD" "348B1FD4" "7E9267AF"
2173     "C1B2AE91" "EE51D6CB" "0E3179AB" "1042A95D" "CF6A9483" "B84B4B36"
2174     "B3861AA7" "255E4C02" "78BA3604" "650C10BE" "19482F23" "171B671D"
2175     "F1CF3B96" "0C074301" "CD93C1D1" "7603D147" "DAE2AEF8" "37A62964"
2176     "EF15E5FB" "4AAC0B8C" "1CCAA4BE" "754AB572" "8AE9130C" "4C7D0288"
2177     "0AB9472D" "45565534" "7FFFFFFF" "FFFFFFFF";
2178 
2179 krb5_error_code
2180 _krb5_parse_moduli(krb5_context context, const char *file,
2181 		   struct krb5_dh_moduli ***moduli)
2182 {
2183     /* name bits P G Q */
2184     krb5_error_code ret;
2185     struct krb5_dh_moduli **m = NULL, **m2;
2186     char buf[4096];
2187     FILE *f;
2188     int lineno = 0, n = 0;
2189 
2190     *moduli = NULL;
2191 
2192     m = calloc(1, sizeof(m[0]) * 3);
2193     if (m == NULL) {
2194 	krb5_set_error_message(context, ENOMEM,
2195 			       N_("malloc: out of memory", ""));
2196 	return ENOMEM;
2197     }
2198 
2199     strlcpy(buf, default_moduli_rfc3526_MODP_group14, sizeof(buf));
2200     ret = _krb5_parse_moduli_line(context, "builtin", 1, buf,  &m[0]);
2201     if (ret) {
2202 	_krb5_free_moduli(m);
2203 	return ret;
2204     }
2205     n++;
2206 
2207     strlcpy(buf, default_moduli_RFC2412_MODP_group2, sizeof(buf));
2208     ret = _krb5_parse_moduli_line(context, "builtin", 1, buf,  &m[1]);
2209     if (ret) {
2210 	_krb5_free_moduli(m);
2211 	return ret;
2212     }
2213     n++;
2214 
2215 
2216     if (file == NULL)
2217 	file = MODULI_FILE;
2218 
2219 #ifdef KRB5_USE_PATH_TOKENS
2220     {
2221         char * exp_file;
2222 
2223         if (_krb5_expand_path_tokens(context, file, &exp_file) == 0) {
2224             f = fopen(exp_file, "r");
2225             krb5_xfree(exp_file);
2226         } else {
2227             f = NULL;
2228         }
2229     }
2230 #else
2231     f = fopen(file, "r");
2232 #endif
2233 
2234     if (f == NULL) {
2235 	*moduli = m;
2236 	return 0;
2237     }
2238     rk_cloexec_file(f);
2239 
2240     while(fgets(buf, sizeof(buf), f) != NULL) {
2241 	struct krb5_dh_moduli *element;
2242 
2243 	buf[strcspn(buf, "\n")] = '\0';
2244 	lineno++;
2245 
2246 	m2 = realloc(m, (n + 2) * sizeof(m[0]));
2247 	if (m2 == NULL) {
2248 	    _krb5_free_moduli(m);
2249 	    krb5_set_error_message(context, ENOMEM,
2250 				   N_("malloc: out of memory", ""));
2251 	    return ENOMEM;
2252 	}
2253 	m = m2;
2254 
2255 	m[n] = NULL;
2256 
2257 	ret = _krb5_parse_moduli_line(context, file, lineno, buf,  &element);
2258 	if (ret) {
2259 	    _krb5_free_moduli(m);
2260 	    return ret;
2261 	}
2262 	if (element == NULL)
2263 	    continue;
2264 
2265 	m[n] = element;
2266 	m[n + 1] = NULL;
2267 	n++;
2268     }
2269     *moduli = m;
2270     return 0;
2271 }
2272 
2273 krb5_error_code
2274 _krb5_dh_group_ok(krb5_context context, unsigned long bits,
2275 		  heim_integer *p, heim_integer *g, heim_integer *q,
2276 		  struct krb5_dh_moduli **moduli,
2277 		  char **name)
2278 {
2279     int i;
2280 
2281     if (name)
2282 	*name = NULL;
2283 
2284     for (i = 0; moduli[i] != NULL; i++) {
2285 	if (der_heim_integer_cmp(&moduli[i]->g, g) == 0 &&
2286 	    der_heim_integer_cmp(&moduli[i]->p, p) == 0 &&
2287 	    (q == NULL || der_heim_integer_cmp(&moduli[i]->q, q) == 0))
2288 	    {
2289 		if (bits && bits > moduli[i]->bits) {
2290 		    krb5_set_error_message(context,
2291 					   KRB5_KDC_ERR_DH_KEY_PARAMETERS_NOT_ACCEPTED,
2292 					   N_("PKINIT: DH group parameter %s "
2293 					      "no accepted, not enough bits "
2294 					      "generated", ""),
2295 					   moduli[i]->name);
2296 		    return KRB5_KDC_ERR_DH_KEY_PARAMETERS_NOT_ACCEPTED;
2297 		}
2298 		if (name)
2299 		    *name = strdup(moduli[i]->name);
2300 		return 0;
2301 	    }
2302     }
2303     krb5_set_error_message(context,
2304 			   KRB5_KDC_ERR_DH_KEY_PARAMETERS_NOT_ACCEPTED,
2305 			   N_("PKINIT: DH group parameter no ok", ""));
2306     return KRB5_KDC_ERR_DH_KEY_PARAMETERS_NOT_ACCEPTED;
2307 }
2308 #endif /* PKINIT */
2309 
2310 KRB5_LIB_FUNCTION void KRB5_LIB_CALL
2311 _krb5_get_init_creds_opt_free_pkinit(krb5_get_init_creds_opt *opt)
2312 {
2313 #ifdef PKINIT
2314     krb5_pk_init_ctx ctx;
2315 
2316     if (opt->opt_private == NULL || opt->opt_private->pk_init_ctx == NULL)
2317 	return;
2318     ctx = opt->opt_private->pk_init_ctx;
2319     switch (ctx->keyex) {
2320     case USE_DH:
2321 	if (ctx->u.dh)
2322 	    DH_free(ctx->u.dh);
2323 	break;
2324     case USE_RSA:
2325 	break;
2326     case USE_ECDH:
2327 #ifdef HAVE_OPENSSL
2328 	if (ctx->u.eckey)
2329 	    EC_KEY_free(ctx->u.eckey);
2330 #endif
2331 	break;
2332     }
2333     if (ctx->id) {
2334 	hx509_verify_destroy_ctx(ctx->id->verify_ctx);
2335 	hx509_certs_free(&ctx->id->certs);
2336 	hx509_cert_free(ctx->id->cert);
2337 	hx509_certs_free(&ctx->id->anchors);
2338 	hx509_certs_free(&ctx->id->certpool);
2339 
2340 	if (ctx->clientDHNonce) {
2341 	    krb5_free_data(NULL, ctx->clientDHNonce);
2342 	    ctx->clientDHNonce = NULL;
2343 	}
2344 	if (ctx->m)
2345 	    _krb5_free_moduli(ctx->m);
2346 	free(ctx->id);
2347 	ctx->id = NULL;
2348     }
2349     free(opt->opt_private->pk_init_ctx);
2350     opt->opt_private->pk_init_ctx = NULL;
2351 #endif
2352 }
2353 
2354 KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
2355 krb5_get_init_creds_opt_set_pkinit(krb5_context context,
2356 				   krb5_get_init_creds_opt *opt,
2357 				   krb5_principal principal,
2358 				   const char *user_id,
2359 				   const char *x509_anchors,
2360 				   char * const * pool,
2361 				   char * const * pki_revoke,
2362 				   int flags,
2363 				   krb5_prompter_fct prompter,
2364 				   void *prompter_data,
2365 				   char *password)
2366 {
2367 #ifdef PKINIT
2368     krb5_error_code ret;
2369     char *anchors = NULL;
2370 
2371     if (opt->opt_private == NULL) {
2372 	krb5_set_error_message(context, EINVAL,
2373 			       N_("PKINIT: on non extendable opt", ""));
2374 	return EINVAL;
2375     }
2376 
2377     opt->opt_private->pk_init_ctx =
2378 	calloc(1, sizeof(*opt->opt_private->pk_init_ctx));
2379     if (opt->opt_private->pk_init_ctx == NULL) {
2380 	krb5_set_error_message(context, ENOMEM,
2381 			       N_("malloc: out of memory", ""));
2382 	return ENOMEM;
2383     }
2384     opt->opt_private->pk_init_ctx->require_binding = 0;
2385     opt->opt_private->pk_init_ctx->require_eku = 1;
2386     opt->opt_private->pk_init_ctx->require_krbtgt_otherName = 1;
2387     opt->opt_private->pk_init_ctx->peer = NULL;
2388 
2389     /* XXX implement krb5_appdefault_strings  */
2390     if (pool == NULL)
2391 	pool = krb5_config_get_strings(context, NULL,
2392 				       "appdefaults",
2393 				       "pkinit_pool",
2394 				       NULL);
2395 
2396     if (pki_revoke == NULL)
2397 	pki_revoke = krb5_config_get_strings(context, NULL,
2398 					     "appdefaults",
2399 					     "pkinit_revoke",
2400 					     NULL);
2401 
2402     if (x509_anchors == NULL) {
2403 	krb5_appdefault_string(context, "kinit",
2404 			       krb5_principal_get_realm(context, principal),
2405 			       "pkinit_anchors", NULL, &anchors);
2406 	x509_anchors = anchors;
2407     }
2408 
2409     if (flags & 4)
2410 	opt->opt_private->pk_init_ctx->anonymous = 1;
2411 
2412     ret = _krb5_pk_load_id(context,
2413 			   &opt->opt_private->pk_init_ctx->id,
2414 			   user_id,
2415 			   x509_anchors,
2416 			   pool,
2417 			   pki_revoke,
2418 			   prompter,
2419 			   prompter_data,
2420 			   password);
2421     if (ret) {
2422 	free(opt->opt_private->pk_init_ctx);
2423 	opt->opt_private->pk_init_ctx = NULL;
2424 	return ret;
2425     }
2426 
2427     if (opt->opt_private->pk_init_ctx->id->certs) {
2428 	_krb5_pk_set_user_id(context,
2429 			     principal,
2430 			     opt->opt_private->pk_init_ctx,
2431 			     opt->opt_private->pk_init_ctx->id->certs);
2432     } else
2433 	opt->opt_private->pk_init_ctx->id->cert = NULL;
2434 
2435     if ((flags & 2) == 0) {
2436 	hx509_context hx509ctx = context->hx509ctx;
2437 	hx509_cert cert = opt->opt_private->pk_init_ctx->id->cert;
2438 
2439 	opt->opt_private->pk_init_ctx->keyex = USE_DH;
2440 
2441 	/*
2442 	 * If its a ECDSA certs, lets select ECDSA as the keyex algorithm.
2443 	 */
2444 	if (cert) {
2445 	    AlgorithmIdentifier alg;
2446 
2447 	    ret = hx509_cert_get_SPKI_AlgorithmIdentifier(hx509ctx, cert, &alg);
2448 	    if (ret == 0) {
2449 		if (der_heim_oid_cmp(&alg.algorithm, &asn1_oid_id_ecPublicKey) == 0)
2450 		    opt->opt_private->pk_init_ctx->keyex = USE_ECDH;
2451 		free_AlgorithmIdentifier(&alg);
2452 	    }
2453 	}
2454 
2455     } else {
2456 	opt->opt_private->pk_init_ctx->keyex = USE_RSA;
2457 
2458 	if (opt->opt_private->pk_init_ctx->id->certs == NULL) {
2459 	    krb5_set_error_message(context, EINVAL,
2460 				   N_("No anonymous pkinit support in RSA mode", ""));
2461 	    return EINVAL;
2462 	}
2463     }
2464 
2465     return 0;
2466 #else
2467     krb5_set_error_message(context, EINVAL,
2468 			   N_("no support for PKINIT compiled in", ""));
2469     return EINVAL;
2470 #endif
2471 }
2472 
2473 krb5_error_code KRB5_LIB_FUNCTION
2474 krb5_get_init_creds_opt_set_pkinit_user_certs(krb5_context context,
2475 					      krb5_get_init_creds_opt *opt,
2476 					      struct hx509_certs_data *certs)
2477 {
2478 #ifdef PKINIT
2479     if (opt->opt_private == NULL) {
2480 	krb5_set_error_message(context, EINVAL,
2481 			       N_("PKINIT: on non extendable opt", ""));
2482 	return EINVAL;
2483     }
2484     if (opt->opt_private->pk_init_ctx == NULL) {
2485 	krb5_set_error_message(context, EINVAL,
2486 			       N_("PKINIT: on pkinit context", ""));
2487 	return EINVAL;
2488     }
2489 
2490     _krb5_pk_set_user_id(context, NULL, opt->opt_private->pk_init_ctx, certs);
2491 
2492     return 0;
2493 #else
2494     krb5_set_error_message(context, EINVAL,
2495 			   N_("no support for PKINIT compiled in", ""));
2496     return EINVAL;
2497 #endif
2498 }
2499 
2500 #ifdef PKINIT
2501 
2502 static int
2503 get_ms_san(hx509_context context, hx509_cert cert, char **upn)
2504 {
2505     hx509_octet_string_list list;
2506     int ret;
2507 
2508     *upn = NULL;
2509 
2510     ret = hx509_cert_find_subjectAltName_otherName(context,
2511 						   cert,
2512 						   &asn1_oid_id_pkinit_ms_san,
2513 						   &list);
2514     if (ret)
2515 	return 0;
2516 
2517     if (list.len > 0 && list.val[0].length > 0)
2518 	ret = decode_MS_UPN_SAN(list.val[0].data, list.val[0].length,
2519 				upn, NULL);
2520     else
2521 	ret = 1;
2522     hx509_free_octet_string_list(&list);
2523 
2524     return ret;
2525 }
2526 
2527 static int
2528 find_ms_san(hx509_context context, hx509_cert cert, void *ctx)
2529 {
2530     char *upn;
2531     int ret;
2532 
2533     ret = get_ms_san(context, cert, &upn);
2534     if (ret == 0)
2535 	free(upn);
2536     return ret;
2537 }
2538 
2539 
2540 
2541 #endif
2542 
2543 /*
2544  * Private since it need to be redesigned using krb5_get_init_creds()
2545  */
2546 
2547 KRB5_LIB_FUNCTION krb5_error_code  KRB5_LIB_CALL
2548 krb5_pk_enterprise_cert(krb5_context context,
2549 			const char *user_id,
2550 			krb5_const_realm realm,
2551 			krb5_principal *principal,
2552 			struct hx509_certs_data **res)
2553 {
2554 #ifdef PKINIT
2555     krb5_error_code ret;
2556     hx509_certs certs, result;
2557     hx509_cert cert = NULL;
2558     hx509_query *q;
2559     char *name;
2560 
2561     *principal = NULL;
2562     if (res)
2563 	*res = NULL;
2564 
2565     if (user_id == NULL) {
2566 	krb5_set_error_message(context, ENOENT, "no user id");
2567 	return ENOENT;
2568     }
2569 
2570     ret = hx509_certs_init(context->hx509ctx, user_id, 0, NULL, &certs);
2571     if (ret) {
2572 	pk_copy_error(context, context->hx509ctx, ret,
2573 		      "Failed to init cert certs");
2574 	goto out;
2575     }
2576 
2577     ret = hx509_query_alloc(context->hx509ctx, &q);
2578     if (ret) {
2579 	krb5_set_error_message(context, ret, "out of memory");
2580 	hx509_certs_free(&certs);
2581 	goto out;
2582     }
2583 
2584     hx509_query_match_option(q, HX509_QUERY_OPTION_PRIVATE_KEY);
2585     hx509_query_match_option(q, HX509_QUERY_OPTION_KU_DIGITALSIGNATURE);
2586     hx509_query_match_eku(q, &asn1_oid_id_pkinit_ms_eku);
2587     hx509_query_match_cmp_func(q, find_ms_san, NULL);
2588 
2589     ret = hx509_certs_filter(context->hx509ctx, certs, q, &result);
2590     hx509_query_free(context->hx509ctx, q);
2591     hx509_certs_free(&certs);
2592     if (ret) {
2593 	pk_copy_error(context, context->hx509ctx, ret,
2594 		      "Failed to find PKINIT certificate");
2595 	return ret;
2596     }
2597 
2598     ret = hx509_get_one_cert(context->hx509ctx, result, &cert);
2599     hx509_certs_free(&result);
2600     if (ret) {
2601 	pk_copy_error(context, context->hx509ctx, ret,
2602 		      "Failed to get one cert");
2603 	goto out;
2604     }
2605 
2606     ret = get_ms_san(context->hx509ctx, cert, &name);
2607     if (ret) {
2608 	pk_copy_error(context, context->hx509ctx, ret,
2609 		      "Failed to get MS SAN");
2610 	goto out;
2611     }
2612 
2613     ret = krb5_make_principal(context, principal, realm, name, NULL);
2614     free(name);
2615     if (ret)
2616 	goto out;
2617 
2618     krb5_principal_set_type(context, *principal, KRB5_NT_ENTERPRISE_PRINCIPAL);
2619 
2620     if (res) {
2621 	ret = hx509_certs_init(context->hx509ctx, "MEMORY:", 0, NULL, res);
2622 	if (ret)
2623 	    goto out;
2624 
2625 	ret = hx509_certs_add(context->hx509ctx, *res, cert);
2626 	if (ret) {
2627 	    hx509_certs_free(res);
2628 	    goto out;
2629 	}
2630     }
2631 
2632  out:
2633     hx509_cert_free(cert);
2634 
2635     return ret;
2636 #else
2637     krb5_set_error_message(context, EINVAL,
2638 			   N_("no support for PKINIT compiled in", ""));
2639     return EINVAL;
2640 #endif
2641 }
2642