mk_rep.c revision 233294
155682Smarkm/* 2233294Sstas * Copyright (c) 1997 - 2003 Kungliga Tekniska H��gskolan 3233294Sstas * (Royal Institute of Technology, Stockholm, Sweden). 4233294Sstas * All rights reserved. 555682Smarkm * 6233294Sstas * Redistribution and use in source and binary forms, with or without 7233294Sstas * modification, are permitted provided that the following conditions 8233294Sstas * are met: 955682Smarkm * 10233294Sstas * 1. Redistributions of source code must retain the above copyright 11233294Sstas * notice, this list of conditions and the following disclaimer. 1255682Smarkm * 13233294Sstas * 2. Redistributions in binary form must reproduce the above copyright 14233294Sstas * notice, this list of conditions and the following disclaimer in the 15233294Sstas * documentation and/or other materials provided with the distribution. 1655682Smarkm * 17233294Sstas * 3. Neither the name of the Institute nor the names of its contributors 18233294Sstas * may be used to endorse or promote products derived from this software 19233294Sstas * without specific prior written permission. 2055682Smarkm * 21233294Sstas * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND 22233294Sstas * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23233294Sstas * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24233294Sstas * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE 25233294Sstas * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26233294Sstas * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27233294Sstas * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28233294Sstas * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29233294Sstas * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30233294Sstas * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31233294Sstas * SUCH DAMAGE. 3255682Smarkm */ 3355682Smarkm 34233294Sstas#include "krb5_locl.h" 3555682Smarkm 36233294SstasKRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL 3755682Smarkmkrb5_mk_rep(krb5_context context, 3872445Sassar krb5_auth_context auth_context, 3955682Smarkm krb5_data *outbuf) 4055682Smarkm{ 41120945Snectar krb5_error_code ret; 42120945Snectar AP_REP ap; 43120945Snectar EncAPRepPart body; 44120945Snectar u_char *buf = NULL; 45120945Snectar size_t buf_size; 46233294Sstas size_t len = 0; 47120945Snectar krb5_crypto crypto; 4855682Smarkm 49120945Snectar ap.pvno = 5; 50120945Snectar ap.msg_type = krb_ap_rep; 5155682Smarkm 52120945Snectar memset (&body, 0, sizeof(body)); 5355682Smarkm 54120945Snectar body.ctime = auth_context->authenticator->ctime; 55120945Snectar body.cusec = auth_context->authenticator->cusec; 56178825Sdfr if (auth_context->flags & KRB5_AUTH_CONTEXT_USE_SUBKEY) { 57178825Sdfr if (auth_context->local_subkey == NULL) { 58178825Sdfr ret = krb5_auth_con_generatelocalsubkey(context, 59178825Sdfr auth_context, 60178825Sdfr auth_context->keyblock); 61178825Sdfr if(ret) { 62178825Sdfr free_EncAPRepPart(&body); 63178825Sdfr return ret; 64178825Sdfr } 65178825Sdfr } 66178825Sdfr ret = krb5_copy_keyblock(context, auth_context->local_subkey, 67178825Sdfr &body.subkey); 68178825Sdfr if (ret) { 69178825Sdfr free_EncAPRepPart(&body); 70233294Sstas krb5_set_error_message(context, ENOMEM, 71233294Sstas N_("malloc: out of memory", "")); 72178825Sdfr return ENOMEM; 73178825Sdfr } 74178825Sdfr } else 75178825Sdfr body.subkey = NULL; 76120945Snectar if (auth_context->flags & KRB5_AUTH_CONTEXT_DO_SEQUENCE) { 77233294Sstas if(auth_context->local_seqnumber == 0) 78178825Sdfr krb5_generate_seq_number (context, 79178825Sdfr auth_context->keyblock, 80178825Sdfr &auth_context->local_seqnumber); 81178825Sdfr ALLOC(body.seq_number, 1); 82120945Snectar if (body.seq_number == NULL) { 83233294Sstas krb5_set_error_message(context, ENOMEM, "malloc: out of memory"); 84178825Sdfr free_EncAPRepPart(&body); 85120945Snectar return ENOMEM; 86120945Snectar } 87120945Snectar *(body.seq_number) = auth_context->local_seqnumber; 88120945Snectar } else 89120945Snectar body.seq_number = NULL; 9055682Smarkm 91120945Snectar ap.enc_part.etype = auth_context->keyblock->keytype; 92120945Snectar ap.enc_part.kvno = NULL; 9355682Smarkm 94120945Snectar ASN1_MALLOC_ENCODE(EncAPRepPart, buf, buf_size, &body, &len, ret); 95120945Snectar free_EncAPRepPart (&body); 96120945Snectar if(ret) 97120945Snectar return ret; 98178825Sdfr if (buf_size != len) 99178825Sdfr krb5_abortx(context, "internal error in ASN.1 encoder"); 100233294Sstas ret = krb5_crypto_init(context, auth_context->keyblock, 101120945Snectar 0 /* ap.enc_part.etype */, &crypto); 102120945Snectar if (ret) { 103120945Snectar free (buf); 104120945Snectar return ret; 105120945Snectar } 106120945Snectar ret = krb5_encrypt (context, 107120945Snectar crypto, 108120945Snectar KRB5_KU_AP_REQ_ENC_PART, 109233294Sstas buf + buf_size - len, 110120945Snectar len, 111120945Snectar &ap.enc_part.cipher); 112120945Snectar krb5_crypto_destroy(context, crypto); 113120945Snectar free(buf); 114120945Snectar if (ret) 115120945Snectar return ret; 11655682Smarkm 117120945Snectar ASN1_MALLOC_ENCODE(AP_REP, outbuf->data, outbuf->length, &ap, &len, ret); 118178825Sdfr if (ret == 0 && outbuf->length != len) 119178825Sdfr krb5_abortx(context, "internal error in ASN.1 encoder"); 120120945Snectar free_AP_REP (&ap); 121120945Snectar return ret; 12255682Smarkm} 123