155682Smarkm/*
2233294Sstas * Copyright (c) 1997 - 2003 Kungliga Tekniska H��gskolan
3233294Sstas * (Royal Institute of Technology, Stockholm, Sweden).
4233294Sstas * All rights reserved.
555682Smarkm *
6233294Sstas * Redistribution and use in source and binary forms, with or without
7233294Sstas * modification, are permitted provided that the following conditions
8233294Sstas * are met:
955682Smarkm *
10233294Sstas * 1. Redistributions of source code must retain the above copyright
11233294Sstas *    notice, this list of conditions and the following disclaimer.
1255682Smarkm *
13233294Sstas * 2. Redistributions in binary form must reproduce the above copyright
14233294Sstas *    notice, this list of conditions and the following disclaimer in the
15233294Sstas *    documentation and/or other materials provided with the distribution.
1655682Smarkm *
17233294Sstas * 3. Neither the name of the Institute nor the names of its contributors
18233294Sstas *    may be used to endorse or promote products derived from this software
19233294Sstas *    without specific prior written permission.
2055682Smarkm *
21233294Sstas * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22233294Sstas * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23233294Sstas * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24233294Sstas * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25233294Sstas * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26233294Sstas * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27233294Sstas * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28233294Sstas * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29233294Sstas * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30233294Sstas * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31233294Sstas * SUCH DAMAGE.
3255682Smarkm */
3355682Smarkm
34233294Sstas#include "krb5_locl.h"
3555682Smarkm
36233294SstasKRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
3755682Smarkmkrb5_mk_priv(krb5_context context,
3855682Smarkm	     krb5_auth_context auth_context,
3955682Smarkm	     const krb5_data *userdata,
4055682Smarkm	     krb5_data *outbuf,
41178825Sdfr	     krb5_replay_data *outdata)
4255682Smarkm{
43178825Sdfr    krb5_error_code ret;
44178825Sdfr    KRB_PRIV s;
45178825Sdfr    EncKrbPrivPart part;
46178825Sdfr    u_char *buf = NULL;
47178825Sdfr    size_t buf_size;
48233294Sstas    size_t len = 0;
49178825Sdfr    krb5_crypto crypto;
50178825Sdfr    krb5_keyblock *key;
51178825Sdfr    krb5_replay_data rdata;
5255682Smarkm
53233294Sstas    if ((auth_context->flags &
54178825Sdfr	 (KRB5_AUTH_CONTEXT_RET_TIME | KRB5_AUTH_CONTEXT_RET_SEQUENCE)) &&
55178825Sdfr	outdata == NULL)
56178825Sdfr	return KRB5_RC_REQUIRED; /* XXX better error, MIT returns this */
5755682Smarkm
58178825Sdfr    if (auth_context->local_subkey)
59178825Sdfr	key = auth_context->local_subkey;
60178825Sdfr    else if (auth_context->remote_subkey)
61178825Sdfr	key = auth_context->remote_subkey;
62178825Sdfr    else
63178825Sdfr	key = auth_context->keyblock;
6455682Smarkm
65178825Sdfr    memset(&rdata, 0, sizeof(rdata));
6655682Smarkm
67178825Sdfr    part.user_data = *userdata;
6855682Smarkm
69178825Sdfr    krb5_us_timeofday (context, &rdata.timestamp, &rdata.usec);
7055682Smarkm
71178825Sdfr    if (auth_context->flags & KRB5_AUTH_CONTEXT_DO_TIME) {
72178825Sdfr	part.timestamp = &rdata.timestamp;
73178825Sdfr	part.usec      = &rdata.usec;
74178825Sdfr    } else {
75178825Sdfr	part.timestamp = NULL;
76178825Sdfr	part.usec      = NULL;
77178825Sdfr    }
7855682Smarkm
79178825Sdfr    if (auth_context->flags & KRB5_AUTH_CONTEXT_RET_TIME) {
80178825Sdfr	outdata->timestamp = rdata.timestamp;
81178825Sdfr	outdata->usec = rdata.usec;
82178825Sdfr    }
8355682Smarkm
84178825Sdfr    if (auth_context->flags & KRB5_AUTH_CONTEXT_DO_SEQUENCE) {
85178825Sdfr	rdata.seq = auth_context->local_seqnumber;
86178825Sdfr	part.seq_number = &rdata.seq;
87178825Sdfr    } else
88178825Sdfr	part.seq_number = NULL;
8955682Smarkm
90178825Sdfr    if (auth_context->flags & KRB5_AUTH_CONTEXT_RET_SEQUENCE)
91178825Sdfr	outdata->seq = auth_context->local_seqnumber;
92233294Sstas
93178825Sdfr    part.s_address = auth_context->local_address;
94178825Sdfr    part.r_address = auth_context->remote_address;
9555682Smarkm
96178825Sdfr    krb5_data_zero (&s.enc_part.cipher);
9755682Smarkm
98178825Sdfr    ASN1_MALLOC_ENCODE(EncKrbPrivPart, buf, buf_size, &part, &len, ret);
99178825Sdfr    if (ret)
100178825Sdfr	goto fail;
101178825Sdfr    if (buf_size != len)
102178825Sdfr	krb5_abortx(context, "internal error in ASN.1 encoder");
10355682Smarkm
104178825Sdfr    s.pvno = 5;
105178825Sdfr    s.msg_type = krb_priv;
106178825Sdfr    s.enc_part.etype = key->keytype;
107178825Sdfr    s.enc_part.kvno = NULL;
10855682Smarkm
109178825Sdfr    ret = krb5_crypto_init(context, key, 0, &crypto);
110178825Sdfr    if (ret) {
111178825Sdfr	free (buf);
112178825Sdfr	return ret;
113178825Sdfr    }
114233294Sstas    ret = krb5_encrypt (context,
115178825Sdfr			crypto,
116178825Sdfr			KRB5_KU_KRB_PRIV,
117233294Sstas			buf + buf_size - len,
118178825Sdfr			len,
119178825Sdfr			&s.enc_part.cipher);
120178825Sdfr    krb5_crypto_destroy(context, crypto);
121178825Sdfr    if (ret) {
122178825Sdfr	free(buf);
123178825Sdfr	return ret;
124178825Sdfr    }
125178825Sdfr    free(buf);
126178825Sdfr
127178825Sdfr
128178825Sdfr    ASN1_MALLOC_ENCODE(KRB_PRIV, buf, buf_size, &s, &len, ret);
129178825Sdfr    if (ret)
130178825Sdfr	goto fail;
131178825Sdfr    if (buf_size != len)
132178825Sdfr	krb5_abortx(context, "internal error in ASN.1 encoder");
133178825Sdfr
134178825Sdfr    krb5_data_free (&s.enc_part.cipher);
135178825Sdfr
136178825Sdfr    ret = krb5_data_copy(outbuf, buf + buf_size - len, len);
137178825Sdfr    if (ret) {
138233294Sstas	krb5_set_error_message(context, ENOMEM,
139233294Sstas			       N_("malloc: out of memory", ""));
140178825Sdfr	free(buf);
141178825Sdfr	return ENOMEM;
142178825Sdfr    }
143178825Sdfr    free (buf);
144178825Sdfr    if (auth_context->flags & KRB5_AUTH_CONTEXT_DO_SEQUENCE)
145178825Sdfr	auth_context->local_seqnumber =
146178825Sdfr	    (auth_context->local_seqnumber + 1) & 0xFFFFFFFF;
147178825Sdfr    return 0;
148178825Sdfr
149178825Sdfr  fail:
150178825Sdfr    free (buf);
151178825Sdfr    krb5_data_free (&s.enc_part.cipher);
152178825Sdfr    return ret;
15355682Smarkm}
154