1/*
2 * Copyright (c) 1997 - 2002 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
4 * All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
9 *
10 * 1. Redistributions of source code must retain the above copyright
11 *    notice, this list of conditions and the following disclaimer.
12 *
13 * 2. Redistributions in binary form must reproduce the above copyright
14 *    notice, this list of conditions and the following disclaimer in the
15 *    documentation and/or other materials provided with the distribution.
16 *
17 * 3. Neither the name of the Institute nor the names of its contributors
18 *    may be used to endorse or promote products derived from this software
19 *    without specific prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
32 */
33
34#include "krb5_locl.h"
35
36krb5_error_code
37_krb5_mk_req_internal(krb5_context context,
38		      krb5_auth_context *auth_context,
39		      const krb5_flags ap_req_options,
40		      krb5_data *in_data,
41		      krb5_ccache ccache,
42		      krb5_creds *in_creds,
43		      krb5_data *outbuf,
44		      krb5_key_usage checksum_usage,
45		      krb5_key_usage encrypt_usage)
46{
47    krb5_error_code ret;
48    krb5_data authenticator;
49    Checksum c;
50    Checksum *c_opt;
51    krb5_auth_context ac;
52
53    if(auth_context) {
54	if(*auth_context == NULL)
55	    ret = krb5_auth_con_init(context, auth_context);
56	else
57	    ret = 0;
58	ac = *auth_context;
59    } else
60	ret = krb5_auth_con_init(context, &ac);
61    if(ret)
62	return ret;
63
64    if(ac->local_subkey == NULL && (ap_req_options & AP_OPTS_USE_SUBKEY)) {
65	ret = krb5_auth_con_generatelocalsubkey(context,
66						ac,
67						&in_creds->session);
68	if(ret)
69	    goto out;
70    }
71
72    krb5_free_keyblock(context, ac->keyblock);
73    ret = krb5_copy_keyblock(context, &in_creds->session, &ac->keyblock);
74    if (ret)
75	goto out;
76
77    /* it's unclear what type of checksum we can use.  try the best one, except:
78     * a) if it's configured differently for the current realm, or
79     * b) if the session key is des-cbc-crc
80     */
81
82    if (in_data) {
83	if(ac->keyblock->keytype == ETYPE_DES_CBC_CRC) {
84	    /* this is to make DCE secd (and older MIT kdcs?) happy */
85	    ret = krb5_create_checksum(context,
86				       NULL,
87				       0,
88				       CKSUMTYPE_RSA_MD4,
89				       in_data->data,
90				       in_data->length,
91				       &c);
92	} else if(ac->keyblock->keytype == ETYPE_ARCFOUR_HMAC_MD5 ||
93		  ac->keyblock->keytype == ETYPE_ARCFOUR_HMAC_MD5_56 ||
94		  ac->keyblock->keytype == ETYPE_DES_CBC_MD4 ||
95		  ac->keyblock->keytype == ETYPE_DES_CBC_MD5) {
96	    /* this is to make MS kdc happy */
97	    ret = krb5_create_checksum(context,
98				       NULL,
99				       0,
100				       CKSUMTYPE_RSA_MD5,
101				       in_data->data,
102				       in_data->length,
103				       &c);
104	} else {
105	    krb5_crypto crypto;
106
107	    ret = krb5_crypto_init(context, ac->keyblock, 0, &crypto);
108	    if (ret)
109		goto out;
110	    ret = krb5_create_checksum(context,
111				       crypto,
112				       checksum_usage,
113				       0,
114				       in_data->data,
115				       in_data->length,
116				       &c);
117	    krb5_crypto_destroy(context, crypto);
118	}
119	c_opt = &c;
120    } else {
121	c_opt = NULL;
122    }
123
124    if (ret)
125	goto out;
126
127    ret = _krb5_build_authenticator(context,
128				    ac,
129				    ac->keyblock->keytype,
130				    in_creds,
131				    c_opt,
132				    &authenticator,
133				    encrypt_usage);
134    if (c_opt)
135	free_Checksum (c_opt);
136    if (ret)
137	goto out;
138
139    ret = krb5_build_ap_req (context, ac->keyblock->keytype,
140			     in_creds, ap_req_options, authenticator, outbuf);
141out:
142    if(auth_context == NULL)
143	krb5_auth_con_free(context, ac);
144    return ret;
145}
146
147KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
148krb5_mk_req_extended(krb5_context context,
149		     krb5_auth_context *auth_context,
150		     const krb5_flags ap_req_options,
151		     krb5_data *in_data,
152		     krb5_creds *in_creds,
153		     krb5_data *outbuf)
154{
155    return _krb5_mk_req_internal(context,
156				 auth_context,
157				 ap_req_options,
158				 in_data,
159				 NULL,
160				 in_creds,
161				 outbuf,
162				 KRB5_KU_AP_REQ_AUTH_CKSUM,
163				 KRB5_KU_AP_REQ_AUTH);
164}
165