1b528cefcSMark Murray /* 2b528cefcSMark Murray * Copyright (c) 1997, 1998, 1999 Kungliga Tekniska H�gskolan 3b528cefcSMark Murray * (Royal Institute of Technology, Stockholm, Sweden). 4b528cefcSMark Murray * All rights reserved. 5b528cefcSMark Murray * 6b528cefcSMark Murray * Redistribution and use in source and binary forms, with or without 7b528cefcSMark Murray * modification, are permitted provided that the following conditions 8b528cefcSMark Murray * are met: 9b528cefcSMark Murray * 10b528cefcSMark Murray * 1. Redistributions of source code must retain the above copyright 11b528cefcSMark Murray * notice, this list of conditions and the following disclaimer. 12b528cefcSMark Murray * 13b528cefcSMark Murray * 2. Redistributions in binary form must reproduce the above copyright 14b528cefcSMark Murray * notice, this list of conditions and the following disclaimer in the 15b528cefcSMark Murray * documentation and/or other materials provided with the distribution. 16b528cefcSMark Murray * 17b528cefcSMark Murray * 3. Neither the name of the Institute nor the names of its contributors 18b528cefcSMark Murray * may be used to endorse or promote products derived from this software 19b528cefcSMark Murray * without specific prior written permission. 20b528cefcSMark Murray * 21b528cefcSMark Murray * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND 22b528cefcSMark Murray * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23b528cefcSMark Murray * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24b528cefcSMark Murray * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE 25b528cefcSMark Murray * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26b528cefcSMark Murray * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27b528cefcSMark Murray * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28b528cefcSMark Murray * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29b528cefcSMark Murray * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30b528cefcSMark Murray * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31b528cefcSMark Murray * SUCH DAMAGE. 32b528cefcSMark Murray */ 33b528cefcSMark Murray 34b528cefcSMark Murray #include "krb5_locl.h" 35b528cefcSMark Murray 36b528cefcSMark Murray RCSID("$Id: sendauth.c,v 1.17 1999/12/02 17:05:12 joda Exp $"); 37b528cefcSMark Murray 38b528cefcSMark Murray /* 39b528cefcSMark Murray * The format seems to be: 40b528cefcSMark Murray * client -> server 41b528cefcSMark Murray * 42b528cefcSMark Murray * 4 bytes - length 43b528cefcSMark Murray * KRB5_SENDAUTH_V1.0 (including zero) 44b528cefcSMark Murray * 4 bytes - length 45b528cefcSMark Murray * protocol string (with terminating zero) 46b528cefcSMark Murray * 47b528cefcSMark Murray * server -> client 48b528cefcSMark Murray * 1 byte - (0 = OK, else some kind of error) 49b528cefcSMark Murray * 50b528cefcSMark Murray * client -> server 51b528cefcSMark Murray * 4 bytes - length 52b528cefcSMark Murray * AP-REQ 53b528cefcSMark Murray * 54b528cefcSMark Murray * server -> client 55b528cefcSMark Murray * 4 bytes - length (0 = OK, else length of error) 56b528cefcSMark Murray * (error) 57b528cefcSMark Murray * 58b528cefcSMark Murray * if(mutual) { 59b528cefcSMark Murray * server -> client 60b528cefcSMark Murray * 4 bytes - length 61b528cefcSMark Murray * AP-REP 62b528cefcSMark Murray * } 63b528cefcSMark Murray */ 64b528cefcSMark Murray 65b528cefcSMark Murray krb5_error_code 66b528cefcSMark Murray krb5_sendauth(krb5_context context, 67b528cefcSMark Murray krb5_auth_context *auth_context, 68b528cefcSMark Murray krb5_pointer p_fd, 69b528cefcSMark Murray const char *appl_version, 70b528cefcSMark Murray krb5_principal client, 71b528cefcSMark Murray krb5_principal server, 72b528cefcSMark Murray krb5_flags ap_req_options, 73b528cefcSMark Murray krb5_data *in_data, 74b528cefcSMark Murray krb5_creds *in_creds, 75b528cefcSMark Murray krb5_ccache ccache, 76b528cefcSMark Murray krb5_error **ret_error, 77b528cefcSMark Murray krb5_ap_rep_enc_part **rep_result, 78b528cefcSMark Murray krb5_creds **out_creds) 79b528cefcSMark Murray { 80b528cefcSMark Murray krb5_error_code ret; 81b528cefcSMark Murray u_int32_t len, net_len; 82b528cefcSMark Murray const char *version = KRB5_SENDAUTH_VERSION; 83b528cefcSMark Murray u_char repl; 84b528cefcSMark Murray krb5_data ap_req, error_data; 85b528cefcSMark Murray krb5_creds this_cred; 86b528cefcSMark Murray krb5_principal this_client = NULL; 87b528cefcSMark Murray krb5_creds *creds; 88b528cefcSMark Murray ssize_t sret; 89b528cefcSMark Murray 90b528cefcSMark Murray len = strlen(version) + 1; 91b528cefcSMark Murray net_len = htonl(len); 92b528cefcSMark Murray if (krb5_net_write (context, p_fd, &net_len, 4) != 4 93b528cefcSMark Murray || krb5_net_write (context, p_fd, version, len) != len) 94b528cefcSMark Murray return errno; 95b528cefcSMark Murray 96b528cefcSMark Murray len = strlen(appl_version) + 1; 97b528cefcSMark Murray net_len = htonl(len); 98b528cefcSMark Murray if (krb5_net_write (context, p_fd, &net_len, 4) != 4 99b528cefcSMark Murray || krb5_net_write (context, p_fd, appl_version, len) != len) 100b528cefcSMark Murray return errno; 101b528cefcSMark Murray 102b528cefcSMark Murray sret = krb5_net_read (context, p_fd, &repl, sizeof(repl)); 103b528cefcSMark Murray if (sret < 0) 104b528cefcSMark Murray return errno; 105b528cefcSMark Murray else if (sret != sizeof(repl)) 106b528cefcSMark Murray return KRB5_SENDAUTH_BADRESPONSE; 107b528cefcSMark Murray 108b528cefcSMark Murray if (repl != 0) 109b528cefcSMark Murray return KRB5_SENDAUTH_REJECTED; 110b528cefcSMark Murray 111b528cefcSMark Murray if (in_creds == NULL) { 112b528cefcSMark Murray if (ccache == NULL) { 113b528cefcSMark Murray ret = krb5_cc_default (context, &ccache); 114b528cefcSMark Murray if (ret) 115b528cefcSMark Murray return ret; 116b528cefcSMark Murray } 117b528cefcSMark Murray 118b528cefcSMark Murray if (client == NULL) { 119b528cefcSMark Murray ret = krb5_cc_get_principal (context, ccache, &this_client); 120b528cefcSMark Murray if (ret) 121b528cefcSMark Murray return ret; 122b528cefcSMark Murray client = this_client; 123b528cefcSMark Murray } 124b528cefcSMark Murray memset(&this_cred, 0, sizeof(this_cred)); 125b528cefcSMark Murray this_cred.client = client; 126b528cefcSMark Murray this_cred.server = server; 127b528cefcSMark Murray this_cred.times.endtime = 0; 128b528cefcSMark Murray this_cred.ticket.length = 0; 129b528cefcSMark Murray in_creds = &this_cred; 130b528cefcSMark Murray } 131b528cefcSMark Murray if (in_creds->ticket.length == 0) { 132b528cefcSMark Murray ret = krb5_get_credentials (context, 0, ccache, in_creds, &creds); 133b528cefcSMark Murray if (ret) 134b528cefcSMark Murray return ret; 135b528cefcSMark Murray } else { 136b528cefcSMark Murray creds = in_creds; 137b528cefcSMark Murray } 138b528cefcSMark Murray ret = krb5_mk_req_extended (context, 139b528cefcSMark Murray auth_context, 140b528cefcSMark Murray ap_req_options, 141b528cefcSMark Murray in_data, 142b528cefcSMark Murray creds, 143b528cefcSMark Murray &ap_req); 144b528cefcSMark Murray 145b528cefcSMark Murray if (out_creds) 146b528cefcSMark Murray *out_creds = creds; 147b528cefcSMark Murray else 148b528cefcSMark Murray krb5_free_creds(context, creds); 149b528cefcSMark Murray if(this_client) 150b528cefcSMark Murray krb5_free_principal(context, this_client); 151b528cefcSMark Murray 152b528cefcSMark Murray if (ret) 153b528cefcSMark Murray return ret; 154b528cefcSMark Murray 155b528cefcSMark Murray ret = krb5_write_message (context, 156b528cefcSMark Murray p_fd, 157b528cefcSMark Murray &ap_req); 158b528cefcSMark Murray if (ret) 159b528cefcSMark Murray return ret; 160b528cefcSMark Murray 161b528cefcSMark Murray krb5_data_free (&ap_req); 162b528cefcSMark Murray 163b528cefcSMark Murray ret = krb5_read_message (context, p_fd, &error_data); 164b528cefcSMark Murray if (ret) 165b528cefcSMark Murray return ret; 166b528cefcSMark Murray 167b528cefcSMark Murray if (error_data.length != 0) { 168b528cefcSMark Murray KRB_ERROR error; 169b528cefcSMark Murray 170b528cefcSMark Murray ret = krb5_rd_error (context, &error_data, &error); 171b528cefcSMark Murray krb5_data_free (&error_data); 172b528cefcSMark Murray if (ret == 0) { 173b528cefcSMark Murray if (ret_error != NULL) { 174b528cefcSMark Murray *ret_error = malloc (sizeof(krb5_error)); 175b528cefcSMark Murray if (*ret_error == NULL) { 176b528cefcSMark Murray free_KRB_ERROR(&error); 177b528cefcSMark Murray } else { 178b528cefcSMark Murray **ret_error = error; 179b528cefcSMark Murray } 180b528cefcSMark Murray } else { 181b528cefcSMark Murray free_KRB_ERROR(&error); 182b528cefcSMark Murray } 183b528cefcSMark Murray return error.error_code; 184b528cefcSMark Murray } else 185b528cefcSMark Murray return ret; 186b528cefcSMark Murray } 187b528cefcSMark Murray 188b528cefcSMark Murray if (ap_req_options & AP_OPTS_MUTUAL_REQUIRED) { 189b528cefcSMark Murray krb5_data ap_rep; 190b528cefcSMark Murray krb5_ap_rep_enc_part *ignore; 191b528cefcSMark Murray 192b528cefcSMark Murray krb5_data_zero (&ap_rep); 193b528cefcSMark Murray ret = krb5_read_message (context, 194b528cefcSMark Murray p_fd, 195b528cefcSMark Murray &ap_rep); 196b528cefcSMark Murray if (ret) 197b528cefcSMark Murray return ret; 198b528cefcSMark Murray 199b528cefcSMark Murray ret = krb5_rd_rep (context, *auth_context, &ap_rep, 200b528cefcSMark Murray rep_result ? rep_result : &ignore); 201b528cefcSMark Murray if (ret) 202b528cefcSMark Murray return ret; 203b528cefcSMark Murray if (rep_result == NULL) 204b528cefcSMark Murray krb5_free_ap_rep_enc_part (context, ignore); 205b528cefcSMark Murray krb5_data_free (&ap_rep); 206b528cefcSMark Murray } 207b528cefcSMark Murray return 0; 208b528cefcSMark Murray } 209