155682Smarkm/* 2233294Sstas * Copyright (c) 1997 - 2003 Kungliga Tekniska H��gskolan 3233294Sstas * (Royal Institute of Technology, Stockholm, Sweden). 4233294Sstas * All rights reserved. 555682Smarkm * 6233294Sstas * Redistribution and use in source and binary forms, with or without 7233294Sstas * modification, are permitted provided that the following conditions 8233294Sstas * are met: 955682Smarkm * 10233294Sstas * 1. Redistributions of source code must retain the above copyright 11233294Sstas * notice, this list of conditions and the following disclaimer. 1255682Smarkm * 13233294Sstas * 2. Redistributions in binary form must reproduce the above copyright 14233294Sstas * notice, this list of conditions and the following disclaimer in the 15233294Sstas * documentation and/or other materials provided with the distribution. 1655682Smarkm * 17233294Sstas * 3. Neither the name of the Institute nor the names of its contributors 18233294Sstas * may be used to endorse or promote products derived from this software 19233294Sstas * without specific prior written permission. 2055682Smarkm * 21233294Sstas * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND 22233294Sstas * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23233294Sstas * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24233294Sstas * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE 25233294Sstas * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26233294Sstas * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27233294Sstas * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28233294Sstas * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29233294Sstas * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30233294Sstas * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31233294Sstas * SUCH DAMAGE. 3255682Smarkm */ 3355682Smarkm 34233294Sstas#include "krb5_locl.h" 3555682Smarkm 36233294SstasKRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL 3755682Smarkmkrb5_mk_priv(krb5_context context, 3855682Smarkm krb5_auth_context auth_context, 3955682Smarkm const krb5_data *userdata, 4055682Smarkm krb5_data *outbuf, 41178825Sdfr krb5_replay_data *outdata) 4255682Smarkm{ 43178825Sdfr krb5_error_code ret; 44178825Sdfr KRB_PRIV s; 45178825Sdfr EncKrbPrivPart part; 46178825Sdfr u_char *buf = NULL; 47178825Sdfr size_t buf_size; 48233294Sstas size_t len = 0; 49178825Sdfr krb5_crypto crypto; 50178825Sdfr krb5_keyblock *key; 51178825Sdfr krb5_replay_data rdata; 5255682Smarkm 53233294Sstas if ((auth_context->flags & 54178825Sdfr (KRB5_AUTH_CONTEXT_RET_TIME | KRB5_AUTH_CONTEXT_RET_SEQUENCE)) && 55178825Sdfr outdata == NULL) 56178825Sdfr return KRB5_RC_REQUIRED; /* XXX better error, MIT returns this */ 5755682Smarkm 58178825Sdfr if (auth_context->local_subkey) 59178825Sdfr key = auth_context->local_subkey; 60178825Sdfr else if (auth_context->remote_subkey) 61178825Sdfr key = auth_context->remote_subkey; 62178825Sdfr else 63178825Sdfr key = auth_context->keyblock; 6455682Smarkm 65178825Sdfr memset(&rdata, 0, sizeof(rdata)); 6655682Smarkm 67178825Sdfr part.user_data = *userdata; 6855682Smarkm 69178825Sdfr krb5_us_timeofday (context, &rdata.timestamp, &rdata.usec); 7055682Smarkm 71178825Sdfr if (auth_context->flags & KRB5_AUTH_CONTEXT_DO_TIME) { 72178825Sdfr part.timestamp = &rdata.timestamp; 73178825Sdfr part.usec = &rdata.usec; 74178825Sdfr } else { 75178825Sdfr part.timestamp = NULL; 76178825Sdfr part.usec = NULL; 77178825Sdfr } 7855682Smarkm 79178825Sdfr if (auth_context->flags & KRB5_AUTH_CONTEXT_RET_TIME) { 80178825Sdfr outdata->timestamp = rdata.timestamp; 81178825Sdfr outdata->usec = rdata.usec; 82178825Sdfr } 8355682Smarkm 84178825Sdfr if (auth_context->flags & KRB5_AUTH_CONTEXT_DO_SEQUENCE) { 85178825Sdfr rdata.seq = auth_context->local_seqnumber; 86178825Sdfr part.seq_number = &rdata.seq; 87178825Sdfr } else 88178825Sdfr part.seq_number = NULL; 8955682Smarkm 90178825Sdfr if (auth_context->flags & KRB5_AUTH_CONTEXT_RET_SEQUENCE) 91178825Sdfr outdata->seq = auth_context->local_seqnumber; 92233294Sstas 93178825Sdfr part.s_address = auth_context->local_address; 94178825Sdfr part.r_address = auth_context->remote_address; 9555682Smarkm 96178825Sdfr krb5_data_zero (&s.enc_part.cipher); 9755682Smarkm 98178825Sdfr ASN1_MALLOC_ENCODE(EncKrbPrivPart, buf, buf_size, &part, &len, ret); 99178825Sdfr if (ret) 100178825Sdfr goto fail; 101178825Sdfr if (buf_size != len) 102178825Sdfr krb5_abortx(context, "internal error in ASN.1 encoder"); 10355682Smarkm 104178825Sdfr s.pvno = 5; 105178825Sdfr s.msg_type = krb_priv; 106178825Sdfr s.enc_part.etype = key->keytype; 107178825Sdfr s.enc_part.kvno = NULL; 10855682Smarkm 109178825Sdfr ret = krb5_crypto_init(context, key, 0, &crypto); 110178825Sdfr if (ret) { 111178825Sdfr free (buf); 112178825Sdfr return ret; 113178825Sdfr } 114233294Sstas ret = krb5_encrypt (context, 115178825Sdfr crypto, 116178825Sdfr KRB5_KU_KRB_PRIV, 117233294Sstas buf + buf_size - len, 118178825Sdfr len, 119178825Sdfr &s.enc_part.cipher); 120178825Sdfr krb5_crypto_destroy(context, crypto); 121178825Sdfr if (ret) { 122178825Sdfr free(buf); 123178825Sdfr return ret; 124178825Sdfr } 125178825Sdfr free(buf); 126178825Sdfr 127178825Sdfr 128178825Sdfr ASN1_MALLOC_ENCODE(KRB_PRIV, buf, buf_size, &s, &len, ret); 129178825Sdfr if (ret) 130178825Sdfr goto fail; 131178825Sdfr if (buf_size != len) 132178825Sdfr krb5_abortx(context, "internal error in ASN.1 encoder"); 133178825Sdfr 134178825Sdfr krb5_data_free (&s.enc_part.cipher); 135178825Sdfr 136178825Sdfr ret = krb5_data_copy(outbuf, buf + buf_size - len, len); 137178825Sdfr if (ret) { 138233294Sstas krb5_set_error_message(context, ENOMEM, 139233294Sstas N_("malloc: out of memory", "")); 140178825Sdfr free(buf); 141178825Sdfr return ENOMEM; 142178825Sdfr } 143178825Sdfr free (buf); 144178825Sdfr if (auth_context->flags & KRB5_AUTH_CONTEXT_DO_SEQUENCE) 145178825Sdfr auth_context->local_seqnumber = 146178825Sdfr (auth_context->local_seqnumber + 1) & 0xFFFFFFFF; 147178825Sdfr return 0; 148178825Sdfr 149178825Sdfr fail: 150178825Sdfr free (buf); 151178825Sdfr krb5_data_free (&s.enc_part.cipher); 152178825Sdfr return ret; 15355682Smarkm} 154