155682Smarkm/*
2233294Sstas * Copyright (c) 1997 - 2003 Kungliga Tekniska H��gskolan
3233294Sstas * (Royal Institute of Technology, Stockholm, Sweden).
4233294Sstas * All rights reserved.
555682Smarkm *
6233294Sstas * Redistribution and use in source and binary forms, with or without
7233294Sstas * modification, are permitted provided that the following conditions
8233294Sstas * are met:
955682Smarkm *
10233294Sstas * 1. Redistributions of source code must retain the above copyright
11233294Sstas *    notice, this list of conditions and the following disclaimer.
1255682Smarkm *
13233294Sstas * 2. Redistributions in binary form must reproduce the above copyright
14233294Sstas *    notice, this list of conditions and the following disclaimer in the
15233294Sstas *    documentation and/or other materials provided with the distribution.
1655682Smarkm *
17233294Sstas * 3. Neither the name of the Institute nor the names of its contributors
18233294Sstas *    may be used to endorse or promote products derived from this software
19233294Sstas *    without specific prior written permission.
2055682Smarkm *
21233294Sstas * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22233294Sstas * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23233294Sstas * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24233294Sstas * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25233294Sstas * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26233294Sstas * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27233294Sstas * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28233294Sstas * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29233294Sstas * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30233294Sstas * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31233294Sstas * SUCH DAMAGE.
3255682Smarkm */
3355682Smarkm
34233294Sstas#include "krb5_locl.h"
3555682Smarkm
36233294SstasKRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
3755682Smarkmkrb5_mk_rep(krb5_context context,
3872445Sassar	    krb5_auth_context auth_context,
3955682Smarkm	    krb5_data *outbuf)
4055682Smarkm{
41120945Snectar    krb5_error_code ret;
42120945Snectar    AP_REP ap;
43120945Snectar    EncAPRepPart body;
44120945Snectar    u_char *buf = NULL;
45120945Snectar    size_t buf_size;
46233294Sstas    size_t len = 0;
47120945Snectar    krb5_crypto crypto;
4855682Smarkm
49120945Snectar    ap.pvno = 5;
50120945Snectar    ap.msg_type = krb_ap_rep;
5155682Smarkm
52120945Snectar    memset (&body, 0, sizeof(body));
5355682Smarkm
54120945Snectar    body.ctime = auth_context->authenticator->ctime;
55120945Snectar    body.cusec = auth_context->authenticator->cusec;
56178825Sdfr    if (auth_context->flags & KRB5_AUTH_CONTEXT_USE_SUBKEY) {
57178825Sdfr	if (auth_context->local_subkey == NULL) {
58178825Sdfr	    ret = krb5_auth_con_generatelocalsubkey(context,
59178825Sdfr						    auth_context,
60178825Sdfr						    auth_context->keyblock);
61178825Sdfr	    if(ret) {
62178825Sdfr		free_EncAPRepPart(&body);
63178825Sdfr		return ret;
64178825Sdfr	    }
65178825Sdfr	}
66178825Sdfr	ret = krb5_copy_keyblock(context, auth_context->local_subkey,
67178825Sdfr				 &body.subkey);
68178825Sdfr	if (ret) {
69178825Sdfr	    free_EncAPRepPart(&body);
70233294Sstas	    krb5_set_error_message(context, ENOMEM,
71233294Sstas				   N_("malloc: out of memory", ""));
72178825Sdfr	    return ENOMEM;
73178825Sdfr	}
74178825Sdfr    } else
75178825Sdfr	body.subkey = NULL;
76120945Snectar    if (auth_context->flags & KRB5_AUTH_CONTEXT_DO_SEQUENCE) {
77233294Sstas	if(auth_context->local_seqnumber == 0)
78178825Sdfr	    krb5_generate_seq_number (context,
79178825Sdfr				      auth_context->keyblock,
80178825Sdfr				      &auth_context->local_seqnumber);
81178825Sdfr	ALLOC(body.seq_number, 1);
82120945Snectar	if (body.seq_number == NULL) {
83233294Sstas	    krb5_set_error_message(context, ENOMEM, "malloc: out of memory");
84178825Sdfr	    free_EncAPRepPart(&body);
85120945Snectar	    return ENOMEM;
86120945Snectar	}
87120945Snectar	*(body.seq_number) = auth_context->local_seqnumber;
88120945Snectar    } else
89120945Snectar	body.seq_number = NULL;
9055682Smarkm
91120945Snectar    ap.enc_part.etype = auth_context->keyblock->keytype;
92120945Snectar    ap.enc_part.kvno  = NULL;
9355682Smarkm
94120945Snectar    ASN1_MALLOC_ENCODE(EncAPRepPart, buf, buf_size, &body, &len, ret);
95120945Snectar    free_EncAPRepPart (&body);
96120945Snectar    if(ret)
97120945Snectar	return ret;
98178825Sdfr    if (buf_size != len)
99178825Sdfr	krb5_abortx(context, "internal error in ASN.1 encoder");
100233294Sstas    ret = krb5_crypto_init(context, auth_context->keyblock,
101120945Snectar			   0 /* ap.enc_part.etype */, &crypto);
102120945Snectar    if (ret) {
103120945Snectar	free (buf);
104120945Snectar	return ret;
105120945Snectar    }
106120945Snectar    ret = krb5_encrypt (context,
107120945Snectar			crypto,
108120945Snectar			KRB5_KU_AP_REQ_ENC_PART,
109233294Sstas			buf + buf_size - len,
110120945Snectar			len,
111120945Snectar			&ap.enc_part.cipher);
112120945Snectar    krb5_crypto_destroy(context, crypto);
113120945Snectar    free(buf);
114120945Snectar    if (ret)
115120945Snectar	return ret;
11655682Smarkm
117120945Snectar    ASN1_MALLOC_ENCODE(AP_REP, outbuf->data, outbuf->length, &ap, &len, ret);
118178825Sdfr    if (ret == 0 && outbuf->length != len)
119178825Sdfr	krb5_abortx(context, "internal error in ASN.1 encoder");
120120945Snectar    free_AP_REP (&ap);
121120945Snectar    return ret;
12255682Smarkm}
123