22#include <winpr/config.h>
31#include <winpr/assert.h>
32#include <winpr/cast.h>
33#include <winpr/asn1.h>
35#include <winpr/interlocked.h>
36#include <winpr/sspi.h>
37#include <winpr/print.h>
38#include <winpr/tchar.h>
39#include <winpr/sysinfo.h>
40#include <winpr/registry.h>
41#include <winpr/endian.h>
42#include <winpr/crypto.h>
43#include <winpr/path.h>
44#include <winpr/wtypes.h>
45#include <winpr/winsock.h>
46#include <winpr/schannel.h>
47#include <winpr/secapi.h>
56#ifdef WITH_KRB5_HEIMDAL
58#include <krb5-protos.h>
63#define TAG WINPR_TAG("sspi.Kerberos")
74 "Kerberos Security Package"
77static WCHAR KERBEROS_SecPkgInfoW_NameBuffer[32] = { 0 };
78static WCHAR KERBEROS_SecPkgInfoW_CommentBuffer[32] = { 0 };
85 KERBEROS_SecPkgInfoW_NameBuffer,
86 KERBEROS_SecPkgInfoW_CommentBuffer
93 KERBEROS_STATE_INITIAL,
94 KERBEROS_STATE_TGT_REQ,
95 KERBEROS_STATE_TGT_REP,
96 KERBEROS_STATE_AP_REQ,
97 KERBEROS_STATE_AP_REP,
101typedef struct KRB_CREDENTIALS_st
103 volatile LONG refCount;
108 krb5_keytab client_keytab;
114 enum KERBEROS_STATE state;
115 KRB_CREDENTIALS* credentials;
116 krb5_auth_context auth_ctx;
126static const WinPrAsn1_OID kerberos_OID = { 9, (
void*)
"\x2a\x86\x48\x86\xf7\x12\x01\x02\x02" };
128 (
void*)
"\x2a\x86\x48\x86\xf7\x12\x01\x02\x02\x03" };
130#define krb_log_exec(fkt, ctx, ...) \
131 kerberos_log_msg(ctx, fkt(ctx, ##__VA_ARGS__), #fkt, __FILE__, __func__, __LINE__)
132#define krb_log_exec_ptr(fkt, ctx, ...) \
133 kerberos_log_msg(*ctx, fkt(ctx, ##__VA_ARGS__), #fkt, __FILE__, __func__, __LINE__)
134static krb5_error_code kerberos_log_msg(krb5_context ctx, krb5_error_code code,
const char* what,
135 const char* file,
const char* fkt,
size_t line)
144 const DWORD level = WLOG_ERROR;
146 wLog* log = WLog_Get(TAG);
147 if (WLog_IsLevelActive(log, level))
149 const char* msg = krb5_get_error_message(ctx, code);
150 WLog_PrintTextMessage(log, level, line, file, fkt,
"%s (%s [%d])", what, msg, code);
151 krb5_free_error_message(ctx, msg);
159static void credentials_unref(KRB_CREDENTIALS* credentials);
161static void kerberos_ContextFree(KRB_CONTEXT* ctx, BOOL allocated)
166 free(ctx->targetHost);
167 ctx->targetHost = NULL;
169 if (ctx->credentials)
171 krb5_context krbctx = ctx->credentials->ctx;
175 krb5_auth_con_free(krbctx, ctx->auth_ctx);
177 krb5glue_keys_free(krbctx, &ctx->keyset);
180 credentials_unref(ctx->credentials);
187static KRB_CONTEXT* kerberos_ContextNew(KRB_CREDENTIALS* credentials)
189 KRB_CONTEXT* context = NULL;
191 context = (KRB_CONTEXT*)calloc(1,
sizeof(KRB_CONTEXT));
195 context->credentials = credentials;
196 InterlockedIncrement(&credentials->refCount);
200static krb5_error_code krb5_prompter(krb5_context context,
void* data,
201 WINPR_ATTR_UNUSED
const char* name,
202 WINPR_ATTR_UNUSED
const char* banner,
int num_prompts,
203 krb5_prompt prompts[])
205 for (
int i = 0; i < num_prompts; i++)
207 krb5_prompt_type type = krb5glue_get_prompt_type(context, prompts, i);
208 if (type && (type == KRB5_PROMPT_TYPE_PREAUTH || type == KRB5_PROMPT_TYPE_PASSWORD) && data)
210 prompts[i].reply->data = _strdup((
const char*)data);
212 const size_t len = strlen((
const char*)data);
213 if (len > UINT32_MAX)
214 return KRB5KRB_ERR_GENERIC;
215 prompts[i].reply->length = (UINT32)len;
223 return keyset->acceptor_key ? keyset->acceptor_key
224 : keyset->initiator_key ? keyset->initiator_key
225 : keyset->session_key;
228static BOOL isValidIPv4(
const char* ipAddress)
230 struct sockaddr_in sa = { 0 };
231 int result = inet_pton(AF_INET, ipAddress, &(sa.sin_addr));
235static BOOL isValidIPv6(
const char* ipAddress)
237 struct sockaddr_in6 sa = { 0 };
238 int result = inet_pton(AF_INET6, ipAddress, &(sa.sin6_addr));
242static BOOL isValidIP(
const char* ipAddress)
244 return isValidIPv4(ipAddress) || isValidIPv6(ipAddress);
247#if defined(WITH_KRB5_MIT)
248WINPR_ATTR_MALLOC(free, 1)
249static
char* get_realm_name(krb5_data realm,
size_t* plen)
253 if ((realm.length <= 0) || (!realm.data))
257 (void)winpr_asprintf(&name, plen,
"krbtgt/%*s@%*s", realm.length, realm.data, realm.length,
261#elif defined(WITH_KRB5_HEIMDAL)
262WINPR_ATTR_MALLOC(free, 1)
263static
char* get_realm_name(Realm realm,
size_t* plen)
271 (void)winpr_asprintf(&name, plen,
"krbtgt/%s@%s", realm, realm);
276static int build_krbtgt(krb5_context ctx, krb5_principal principal, krb5_principal* ptarget)
280 krb5_error_code rv = KRB5_CC_NOMEM;
282 char* name = get_realm_name(principal->realm, &len);
283 if (!name || (len == 0))
287 krb5_principal target = { 0 };
288 rv = krb5_parse_name(ctx, name, &target);
298static SECURITY_STATUS SEC_ENTRY kerberos_AcquireCredentialsHandleA(
299 SEC_CHAR* pszPrincipal, WINPR_ATTR_UNUSED SEC_CHAR* pszPackage, ULONG fCredentialUse,
300 WINPR_ATTR_UNUSED
void* pvLogonID,
void* pAuthData, WINPR_ATTR_UNUSED SEC_GET_KEY_FN pGetKeyFn,
301 WINPR_ATTR_UNUSED
void* pvGetKeyArgument,
PCredHandle phCredential,
306 KRB_CREDENTIALS* credentials = NULL;
307 krb5_context ctx = NULL;
308 krb5_ccache ccache = NULL;
309 krb5_keytab keytab = NULL;
310 krb5_principal principal = NULL;
312 char* username = NULL;
313 char* password = NULL;
314 BOOL own_ccache = FALSE;
315 const char*
const default_ccache_type =
"MEMORY";
319 UINT32 identityFlags = sspi_GetAuthIdentityFlags(pAuthData);
321 if (identityFlags & SEC_WINNT_AUTH_IDENTITY_EXTENDED)
327 WLog_ERR(TAG,
"Failed to copy auth identity fields");
332 pszPrincipal = username;
335 if (krb_log_exec_ptr(krb5_init_context, &ctx))
340 char* udomain = _strdup(domain);
346 krb5_error_code rv = krb_log_exec(krb5_set_default_realm, ctx, udomain);
355 char* cpszPrincipal = _strdup(pszPrincipal);
360 char* p = strchr(cpszPrincipal,
'@');
364 krb5_error_code rv = krb_log_exec(krb5_parse_name, ctx, cpszPrincipal, &principal);
369 WINPR_ASSERT(principal);
372 if (krb_settings && krb_settings->cache)
374 if ((krb_log_exec(krb5_cc_set_default_name, ctx, krb_settings->cache)))
383 if (krb5_cc_cache_match(ctx, principal, &ccache) == KRB5_CC_NOTFOUND)
387 if (krb_log_exec(krb5_cc_new_unique, ctx, default_ccache_type, 0, &ccache))
392 if (krb_log_exec(krb5_cc_resolve, ctx, krb_settings->cache, &ccache))
396 if (krb_log_exec(krb5_cc_initialize, ctx, ccache, principal))
402 else if (fCredentialUse & SECPKG_CRED_OUTBOUND)
405 if (krb_log_exec(krb5_cc_default, ctx, &ccache))
407 if (krb_log_exec(krb5_cc_get_principal, ctx, ccache, &principal))
415 if (krb_log_exec(krb5_cc_new_unique, ctx, default_ccache_type, 0, &ccache))
420 if (krb_log_exec(krb5_cc_resolve, ctx, krb_settings->cache, &ccache))
425 if (krb_settings && krb_settings->keytab)
427 if (krb_log_exec(krb5_kt_resolve, ctx, krb_settings->keytab, &keytab))
432 if (fCredentialUse & SECPKG_CRED_INBOUND)
433 if (krb_log_exec(krb5_kt_default, ctx, &keytab))
438 if (fCredentialUse & SECPKG_CRED_OUTBOUND)
440 krb5_creds creds = { 0 };
441 krb5_creds matchCreds = { 0 };
442 krb5_flags matchFlags = KRB5_TC_MATCH_TIMES;
444 krb5_timeofday(ctx, &matchCreds.times.endtime);
445 matchCreds.times.endtime += 60;
446 matchCreds.client = principal;
448 WINPR_ASSERT(principal);
449 if (krb_log_exec(build_krbtgt, ctx, principal, &matchCreds.server))
452 int rv = krb5_cc_retrieve_cred(ctx, ccache, matchFlags, &matchCreds, &creds);
453 krb5_free_principal(ctx, matchCreds.server);
454 krb5_free_cred_contents(ctx, &creds);
457 if (krb_log_exec(krb5glue_get_init_creds, ctx, principal, ccache, krb5_prompter,
458 password, krb_settings))
463 credentials = calloc(1,
sizeof(KRB_CREDENTIALS));
466 credentials->refCount = 1;
467 credentials->ctx = ctx;
468 credentials->ccache = ccache;
469 credentials->keytab = keytab;
470 credentials->own_ccache = own_ccache;
479 krb5_free_principal(ctx, principal);
487 krb5_cc_destroy(ctx, ccache);
489 krb5_cc_close(ctx, ccache);
492 krb5_kt_close(ctx, keytab);
494 krb5_free_context(ctx);
501 sspi_SecureHandleSetLowerPointer(phCredential, (
void*)credentials);
502 sspi_SecureHandleSetUpperPointer(phCredential, (
void*)KERBEROS_SSP_NAME);
506 return SEC_E_NO_CREDENTIALS;
508 return SEC_E_UNSUPPORTED_FUNCTION;
512static SECURITY_STATUS SEC_ENTRY kerberos_AcquireCredentialsHandleW(
513 SEC_WCHAR* pszPrincipal, SEC_WCHAR* pszPackage, ULONG fCredentialUse,
void* pvLogonID,
514 void* pAuthData, SEC_GET_KEY_FN pGetKeyFn,
void* pvGetKeyArgument,
PCredHandle phCredential,
517 SECURITY_STATUS status = SEC_E_INSUFFICIENT_MEMORY;
518 char* principal = NULL;
519 char*
package = NULL;
523 principal = ConvertWCharToUtf8Alloc(pszPrincipal, NULL);
529 package = ConvertWCharToUtf8Alloc(pszPackage, NULL);
535 kerberos_AcquireCredentialsHandleA(principal, package, fCredentialUse, pvLogonID, pAuthData,
536 pGetKeyFn, pvGetKeyArgument, phCredential, ptsExpiry);
546static void credentials_unref(KRB_CREDENTIALS* credentials)
548 WINPR_ASSERT(credentials);
550 if (InterlockedDecrement(&credentials->refCount))
553 free(credentials->kdc_url);
555 if (credentials->ccache)
557 if (credentials->own_ccache)
558 krb5_cc_destroy(credentials->ctx, credentials->ccache);
560 krb5_cc_close(credentials->ctx, credentials->ccache);
562 if (credentials->keytab)
563 krb5_kt_close(credentials->ctx, credentials->keytab);
565 krb5_free_context(credentials->ctx);
570static SECURITY_STATUS SEC_ENTRY kerberos_FreeCredentialsHandle(
PCredHandle phCredential)
573 KRB_CREDENTIALS* credentials = sspi_SecureHandleGetLowerPointer(phCredential);
575 return SEC_E_INVALID_HANDLE;
577 credentials_unref(credentials);
579 sspi_SecureHandleInvalidate(phCredential);
582 return SEC_E_UNSUPPORTED_FUNCTION;
586static SECURITY_STATUS SEC_ENTRY kerberos_QueryCredentialsAttributesW(
587 WINPR_ATTR_UNUSED
PCredHandle phCredential, ULONG ulAttribute, WINPR_ATTR_UNUSED
void* pBuffer)
592 case SECPKG_CRED_ATTR_NAMES:
595 WLog_ERR(TAG,
"TODO: QueryCredentialsAttributesW, implement ulAttribute=%08" PRIx32,
597 return SEC_E_UNSUPPORTED_FUNCTION;
601 return SEC_E_UNSUPPORTED_FUNCTION;
605static SECURITY_STATUS SEC_ENTRY kerberos_QueryCredentialsAttributesA(
PCredHandle phCredential,
609 return kerberos_QueryCredentialsAttributesW(phCredential, ulAttribute, pBuffer);
614static BOOL kerberos_mk_tgt_token(
SecBuffer* buf,
int msg_type,
char* sname,
char* host,
615 const krb5_data* ticket)
617 WinPrAsn1Encoder* enc = NULL;
626 if (msg_type != KRB_TGT_REQ && msg_type != KRB_TGT_REP)
628 if (msg_type == KRB_TGT_REP && !ticket)
631 enc = WinPrAsn1Encoder_New(WINPR_ASN1_DER);
636 if (!WinPrAsn1EncSeqContainer(enc))
640 if (!WinPrAsn1EncContextualInteger(enc, 0, 5))
644 if (!WinPrAsn1EncContextualInteger(enc, 1, msg_type))
647 if (msg_type == KRB_TGT_REQ && sname)
650 if (!WinPrAsn1EncContextualSeqContainer(enc, 2))
654 if (!WinPrAsn1EncContextualInteger(enc, 0, KRB5_NT_SRV_HST))
658 if (!WinPrAsn1EncContextualSeqContainer(enc, 1))
661 if (!WinPrAsn1EncGeneralString(enc, sname))
664 if (host && !WinPrAsn1EncGeneralString(enc, host))
667 if (!WinPrAsn1EncEndContainer(enc) || !WinPrAsn1EncEndContainer(enc))
670 else if (msg_type == KRB_TGT_REP)
673 data.data = (BYTE*)ticket->data;
674 data.len = ticket->length;
675 if (!WinPrAsn1EncContextualRawContent(enc, 2, &data))
679 if (!WinPrAsn1EncEndContainer(enc))
682 if (!WinPrAsn1EncStreamSize(enc, &len) || len > buf->cbBuffer)
685 Stream_StaticInit(&s, buf->pvBuffer, len);
686 if (!WinPrAsn1EncToStream(enc, &s))
689 token.data = buf->pvBuffer;
690 token.length = (UINT)len;
691 if (sspi_gss_wrap_token(buf, &kerberos_u2u_OID,
692 msg_type == KRB_TGT_REQ ? TOK_ID_TGT_REQ : TOK_ID_TGT_REP, &token))
696 WinPrAsn1Encoder_Free(&enc);
700static BOOL append(
char* dst,
size_t dstSize,
const char* src)
702 const size_t dlen = strnlen(dst, dstSize);
703 const size_t slen = strlen(src);
704 if (dlen + slen >= dstSize)
706 if (!strncat(dst, src, dstSize - dlen))
711static BOOL kerberos_rd_tgt_req_tag2(
WinPrAsn1Decoder* dec,
char* buf,
size_t len)
717 if (!WinPrAsn1DecReadSequence(dec, &seq))
724 WinPrAsn1_INTEGER val = 0;
725 if (!WinPrAsn1DecReadContextualInteger(&seq, 0, &error, &val))
730 if (!WinPrAsn1DecReadContextualSequence(&seq, 1, &error, dec))
735 WinPrAsn1_tag tag = 0;
737 while (WinPrAsn1DecPeekTag(dec, &tag))
739 BOOL success = FALSE;
741 if (!WinPrAsn1DecReadGeneralString(dec, &lstr))
746 if (!append(buf, len,
"/"))
751 if (!append(buf, len, lstr))
767static BOOL kerberos_rd_tgt_req_tag3(
WinPrAsn1Decoder* dec,
char* buf,
size_t len)
771 WinPrAsn1_STRING str = NULL;
772 if (!WinPrAsn1DecReadGeneralString(dec, &str))
775 if (!append(buf, len,
"@"))
777 if (!append(buf, len, str))
794 wStream s = WinPrAsn1DecGetStream(dec);
795 const size_t len = Stream_Length(&s);
800 WinPrAsn1_tagId tag = 0;
801 if (WinPrAsn1DecReadContextualTag(dec, &tag, &dec2) == 0)
804 char* buf = calloc(len + 1,
sizeof(
char));
812 BOOL checkForTag3 = TRUE;
815 rc = kerberos_rd_tgt_req_tag2(&dec2, buf, len);
818 const size_t res = WinPrAsn1DecReadContextualTag(dec, &tag, dec);
820 checkForTag3 = FALSE;
827 rc = kerberos_rd_tgt_req_tag3(&dec2, buf, len);
846 WinPrAsn1_tagId tag = 0;
847 if (WinPrAsn1DecReadContextualTag(dec, &tag, &asnTicket) == 0)
853 wStream s = WinPrAsn1DecGetStream(&asnTicket);
854 ticket->data = Stream_BufferAs(&s,
char);
856 const size_t len = Stream_Length(&s);
857 if (len > UINT32_MAX)
859 ticket->length = (UINT32)len;
863static BOOL kerberos_rd_tgt_token(
const sspi_gss_data* token,
char** target, krb5_data* ticket)
866 WinPrAsn1_INTEGER val = 0;
874 WinPrAsn1Decoder_InitMem(&der, WINPR_ASN1_DER, (BYTE*)token->data, token->length);
878 if (!WinPrAsn1DecReadSequence(&der, &seq))
882 if (!WinPrAsn1DecReadContextualInteger(&seq, 0, &error, &val) || val != 5)
886 if (!WinPrAsn1DecReadContextualInteger(&seq, 1, &error, &val))
892 return kerberos_rd_tgt_req(&seq, target);
894 return kerberos_rd_tgt_rep(&seq, ticket);
903static BOOL kerberos_hash_channel_bindings(WINPR_DIGEST_CTX* md5,
SEC_CHANNEL_BINDINGS* bindings)
907 winpr_Data_Write_UINT32(buf, bindings->dwInitiatorAddrType);
908 if (!winpr_Digest_Update(md5, buf, 4))
911 winpr_Data_Write_UINT32(buf, bindings->cbInitiatorLength);
912 if (!winpr_Digest_Update(md5, buf, 4))
915 if (bindings->cbInitiatorLength &&
916 !winpr_Digest_Update(md5, (BYTE*)bindings + bindings->dwInitiatorOffset,
917 bindings->cbInitiatorLength))
920 winpr_Data_Write_UINT32(buf, bindings->dwAcceptorAddrType);
921 if (!winpr_Digest_Update(md5, buf, 4))
924 winpr_Data_Write_UINT32(buf, bindings->cbAcceptorLength);
925 if (!winpr_Digest_Update(md5, buf, 4))
928 if (bindings->cbAcceptorLength &&
929 !winpr_Digest_Update(md5, (BYTE*)bindings + bindings->dwAcceptorOffset,
930 bindings->cbAcceptorLength))
933 winpr_Data_Write_UINT32(buf, bindings->cbApplicationDataLength);
934 if (!winpr_Digest_Update(md5, buf, 4))
937 if (bindings->cbApplicationDataLength &&
938 !winpr_Digest_Update(md5, (BYTE*)bindings + bindings->dwApplicationDataOffset,
939 bindings->cbApplicationDataLength))
945static SECURITY_STATUS SEC_ENTRY kerberos_InitializeSecurityContextA(
947 WINPR_ATTR_UNUSED ULONG Reserved1, WINPR_ATTR_UNUSED ULONG TargetDataRep,
PSecBufferDesc pInput,
949 WINPR_ATTR_UNUSED ULONG* pfContextAttr, WINPR_ATTR_UNUSED
PTimeStamp ptsExpiry)
955 WINPR_DIGEST_CTX* md5 = NULL;
959 krb5_data input_token = { 0 };
960 krb5_data output_token = { 0 };
961 SECURITY_STATUS status = SEC_E_INTERNAL_ERROR;
964 krb5_ap_rep_enc_part* reply = NULL;
965 krb5_flags ap_flags = AP_OPTS_USE_SUBKEY;
966 char cksum_contents[24] = { 0 };
967 krb5_data cksum = { 0 };
968 krb5_creds in_creds = { 0 };
969 krb5_creds* creds = NULL;
970 BOOL isNewContext = FALSE;
971 KRB_CONTEXT* context = NULL;
972 KRB_CREDENTIALS* credentials = sspi_SecureHandleGetLowerPointer(phCredential);
975 if (phContext && !phContext->dwLower && !phContext->dwUpper)
976 return SEC_E_INVALID_HANDLE;
978 context = sspi_SecureHandleGetLowerPointer(phContext);
981 return SEC_E_NO_CREDENTIALS;
985 input_buffer = sspi_FindSecBuffer(pInput, SECBUFFER_TOKEN);
986 bindings_buffer = sspi_FindSecBuffer(pInput, SECBUFFER_CHANNEL_BINDINGS);
989 output_buffer = sspi_FindSecBuffer(pOutput, SECBUFFER_TOKEN);
991 if (fContextReq & ISC_REQ_MUTUAL_AUTH)
992 ap_flags |= AP_OPTS_MUTUAL_REQUIRED;
994 if (fContextReq & ISC_REQ_USE_SESSION_KEY)
995 ap_flags |= AP_OPTS_USE_SESSION_KEY;
1000 target = _strdup(pszTargetName);
1003 status = SEC_E_INSUFFICIENT_MEMORY;
1006 host = strchr(target,
'/');
1014 if (isValidIP(host))
1016 status = SEC_E_NO_CREDENTIALS;
1023 context = kerberos_ContextNew(credentials);
1026 status = SEC_E_INSUFFICIENT_MEMORY;
1030 isNewContext = TRUE;
1033 context->targetHost = _strdup(host);
1034 if (!context->targetHost)
1036 status = SEC_E_INSUFFICIENT_MEMORY;
1040 if (fContextReq & ISC_REQ_USE_SESSION_KEY)
1042 context->state = KERBEROS_STATE_TGT_REQ;
1043 context->u2u = TRUE;
1046 context->state = KERBEROS_STATE_AP_REQ;
1050 if (!input_buffer || !sspi_gss_unwrap_token(input_buffer, &oid, &tok_id, &input_token))
1052 if ((context->u2u && !sspi_gss_oid_compare(&oid, &kerberos_u2u_OID)) ||
1053 (!context->u2u && !sspi_gss_oid_compare(&oid, &kerberos_OID)))
1058 context->flags |= (fContextReq & 0x1F);
1059 if ((fContextReq & ISC_REQ_INTEGRITY) && !(fContextReq & ISC_REQ_NO_INTEGRITY))
1060 context->flags |= SSPI_GSS_C_INTEG_FLAG;
1062 switch (context->state)
1064 case KERBEROS_STATE_TGT_REQ:
1066 if (!kerberos_mk_tgt_token(output_buffer, KRB_TGT_REQ, sname, host, NULL))
1069 context->state = KERBEROS_STATE_TGT_REP;
1070 status = SEC_I_CONTINUE_NEEDED;
1073 case KERBEROS_STATE_TGT_REP:
1075 if (tok_id != TOK_ID_TGT_REP)
1078 if (!kerberos_rd_tgt_token(&input_token, NULL, &in_creds.second_ticket))
1085 case KERBEROS_STATE_AP_REQ:
1088 if (krb_log_exec(krb5_auth_con_init, credentials->ctx, &context->auth_ctx))
1090 if (krb_log_exec(krb5_auth_con_setflags, credentials->ctx, context->auth_ctx,
1091 KRB5_AUTH_CONTEXT_DO_SEQUENCE | KRB5_AUTH_CONTEXT_USE_SUBKEY))
1093 if (krb_log_exec(krb5glue_auth_con_set_cksumtype, credentials->ctx, context->auth_ctx,
1098 if (krb_log_exec(krb5_sname_to_principal, credentials->ctx, host, sname,
1099 KRB5_NT_SRV_HST, &in_creds.server))
1102 if (krb_log_exec(krb5_cc_get_principal, credentials->ctx, credentials->ccache,
1105 status = SEC_E_WRONG_PRINCIPAL;
1109 if (krb_log_exec(krb5_get_credentials, credentials->ctx,
1110 context->u2u ? KRB5_GC_USER_USER : 0, credentials->ccache, &in_creds,
1113 status = SEC_E_NO_CREDENTIALS;
1118 cksum.data = cksum_contents;
1119 cksum.length =
sizeof(cksum_contents);
1120 winpr_Data_Write_UINT32(cksum_contents, 16);
1121 winpr_Data_Write_UINT32((cksum_contents + 20), context->flags);
1123 if (bindings_buffer)
1129 (bindings->cbInitiatorLength + bindings->dwInitiatorOffset) >
1130 bindings_buffer->cbBuffer ||
1131 (bindings->cbAcceptorLength + bindings->dwAcceptorOffset) >
1132 bindings_buffer->cbBuffer ||
1133 (bindings->cbApplicationDataLength + bindings->dwApplicationDataOffset) >
1134 bindings_buffer->cbBuffer)
1136 status = SEC_E_BAD_BINDINGS;
1140 md5 = winpr_Digest_New();
1144 if (!winpr_Digest_Init(md5, WINPR_MD_MD5))
1147 if (!kerberos_hash_channel_bindings(md5, bindings))
1150 if (!winpr_Digest_Final(md5, (BYTE*)cksum_contents + 4, 16))
1155 if (krb_log_exec(krb5_mk_req_extended, credentials->ctx, &context->auth_ctx, ap_flags,
1156 &cksum, creds, &output_token))
1159 if (!sspi_gss_wrap_token(output_buffer,
1160 context->u2u ? &kerberos_u2u_OID : &kerberos_OID,
1161 TOK_ID_AP_REQ, &output_token))
1164 if (context->flags & SSPI_GSS_C_SEQUENCE_FLAG)
1166 if (krb_log_exec(krb5_auth_con_getlocalseqnumber, credentials->ctx,
1167 context->auth_ctx, (INT32*)&context->local_seq))
1169 context->remote_seq ^= context->local_seq;
1172 if (krb_log_exec(krb5glue_update_keyset, credentials->ctx, context->auth_ctx, FALSE,
1176 context->state = KERBEROS_STATE_AP_REP;
1178 if (context->flags & SSPI_GSS_C_MUTUAL_FLAG)
1179 status = SEC_I_CONTINUE_NEEDED;
1184 case KERBEROS_STATE_AP_REP:
1186 if (tok_id == TOK_ID_AP_REP)
1188 if (krb_log_exec(krb5_rd_rep, credentials->ctx, context->auth_ctx, &input_token,
1191 krb5_free_ap_rep_enc_part(credentials->ctx, reply);
1193 else if (tok_id == TOK_ID_ERROR)
1195 krb5glue_log_error(credentials->ctx, &input_token, TAG);
1201 if (context->flags & SSPI_GSS_C_SEQUENCE_FLAG)
1203 if (krb_log_exec(krb5_auth_con_getremoteseqnumber, credentials->ctx,
1204 context->auth_ctx, (INT32*)&context->remote_seq))
1208 if (krb_log_exec(krb5glue_update_keyset, credentials->ctx, context->auth_ctx, FALSE,
1212 context->state = KERBEROS_STATE_FINAL;
1215 output_buffer->cbBuffer = 0;
1219 case KERBEROS_STATE_FINAL:
1221 WLog_ERR(TAG,
"Kerberos in invalid state!");
1228 krb5_data edata = { 0 };
1229 in_creds.second_ticket = edata;
1230 krb5_free_cred_contents(credentials->ctx, &in_creds);
1233 krb5_free_creds(credentials->ctx, creds);
1234 if (output_token.data)
1235 krb5glue_free_data_contents(credentials->ctx, &output_token);
1237 winpr_Digest_Free(md5);
1246 case SEC_I_CONTINUE_NEEDED:
1247 sspi_SecureHandleSetLowerPointer(phNewContext, context);
1248 sspi_SecureHandleSetUpperPointer(phNewContext, KERBEROS_SSP_NAME);
1251 kerberos_ContextFree(context, TRUE);
1259 status = SEC_E_INVALID_TOKEN;
1262 return SEC_E_UNSUPPORTED_FUNCTION;
1266static SECURITY_STATUS SEC_ENTRY kerberos_InitializeSecurityContextW(
1268 ULONG Reserved1, ULONG TargetDataRep,
PSecBufferDesc pInput, ULONG Reserved2,
1271 SECURITY_STATUS status = 0;
1272 char* target_name = NULL;
1276 target_name = ConvertWCharToUtf8Alloc(pszTargetName, NULL);
1278 return SEC_E_INSUFFICIENT_MEMORY;
1281 status = kerberos_InitializeSecurityContextA(phCredential, phContext, target_name, fContextReq,
1282 Reserved1, TargetDataRep, pInput, Reserved2,
1283 phNewContext, pOutput, pfContextAttr, ptsExpiry);
1292static BOOL retrieveTgtForPrincipal(KRB_CREDENTIALS* credentials, krb5_principal principal,
1296 krb5_kt_cursor cur = { 0 };
1297 krb5_keytab_entry entry = { 0 };
1298 if (krb_log_exec(krb5_kt_start_seq_get, credentials->ctx, credentials->keytab, &cur))
1303 krb5_error_code rv =
1304 krb_log_exec(krb5_kt_next_entry, credentials->ctx, credentials->keytab, &entry, &cur);
1305 if (rv == KRB5_KT_END)
1310 if (krb5_principal_compare(credentials->ctx, principal, entry.principal))
1312 rv = krb_log_exec(krb5glue_free_keytab_entry_contents, credentials->ctx, &entry);
1313 memset(&entry, 0,
sizeof(entry));
1318 if (krb_log_exec(krb5_kt_end_seq_get, credentials->ctx, credentials->keytab, &cur))
1321 if (!entry.principal)
1325 if (krb_log_exec(krb5_get_init_creds_keytab, credentials->ctx, creds, entry.principal,
1326 credentials->keytab, 0, NULL, NULL))
1335static BOOL retrieveSomeTgt(KRB_CREDENTIALS* credentials,
const char* target, krb5_creds* creds)
1338 krb5_principal target_princ = { 0 };
1339 char* default_realm = NULL;
1341 krb5_error_code rv =
1342 krb_log_exec(krb5_parse_name_flags, credentials->ctx, target, 0, &target_princ);
1346#if defined(WITH_KRB5_HEIMDAL)
1347 if (!target_princ->realm)
1349 rv = krb_log_exec(krb5_get_default_realm, credentials->ctx, &default_realm);
1353 target_princ->realm = default_realm;
1356 if (!target_princ->realm.length)
1358 rv = krb_log_exec(krb5_get_default_realm, credentials->ctx, &default_realm);
1362 target_princ->realm.data = default_realm;
1363 target_princ->realm.length = (
unsigned int)strlen(default_realm);
1373 if (retrieveTgtForPrincipal(credentials, target_princ, creds))
1378#if defined(WITH_KRB5_MIT)
1383 char hostDollar[300] = { 0 };
1384 if (target_princ->length < 2)
1387 (void)snprintf(hostDollar,
sizeof(hostDollar) - 1,
"%s$@%s", target_princ->data[1].data,
1388 target_princ->realm.data);
1389 krb5_free_principal(credentials->ctx, target_princ);
1391 rv = krb_log_exec(krb5_parse_name_flags, credentials->ctx, hostDollar, 0, &target_princ);
1395 ret = retrieveTgtForPrincipal(credentials, target_princ, creds);
1400 krb5_free_default_realm(credentials->ctx, default_realm);
1402 krb5_free_principal(credentials->ctx, target_princ);
1407static SECURITY_STATUS SEC_ENTRY kerberos_AcceptSecurityContext(
1409 WINPR_ATTR_UNUSED ULONG fContextReq, WINPR_ATTR_UNUSED ULONG TargetDataRep,
1414 BOOL isNewContext = FALSE;
1418 uint16_t tok_id = 0;
1419 krb5_data input_token = { 0 };
1420 krb5_data output_token = { 0 };
1421 SECURITY_STATUS status = SEC_E_INTERNAL_ERROR;
1422 krb5_flags ap_flags = 0;
1423 krb5glue_authenticator authenticator = NULL;
1424 char* target = NULL;
1425 krb5_keytab_entry entry = { 0 };
1426 krb5_creds creds = { 0 };
1429 if (phContext && !phContext->dwLower && !phContext->dwUpper)
1430 return SEC_E_INVALID_HANDLE;
1432 KRB_CONTEXT* context = sspi_SecureHandleGetLowerPointer(phContext);
1433 KRB_CREDENTIALS* credentials = sspi_SecureHandleGetLowerPointer(phCredential);
1436 input_buffer = sspi_FindSecBuffer(pInput, SECBUFFER_TOKEN);
1438 output_buffer = sspi_FindSecBuffer(pOutput, SECBUFFER_TOKEN);
1441 return SEC_E_INVALID_TOKEN;
1443 if (!sspi_gss_unwrap_token(input_buffer, &oid, &tok_id, &input_token))
1444 return SEC_E_INVALID_TOKEN;
1448 isNewContext = TRUE;
1449 context = kerberos_ContextNew(credentials);
1450 context->acceptor = TRUE;
1452 if (sspi_gss_oid_compare(&oid, &kerberos_u2u_OID))
1454 context->u2u = TRUE;
1455 context->state = KERBEROS_STATE_TGT_REQ;
1457 else if (sspi_gss_oid_compare(&oid, &kerberos_OID))
1458 context->state = KERBEROS_STATE_AP_REQ;
1464 if ((context->u2u && !sspi_gss_oid_compare(&oid, &kerberos_u2u_OID)) ||
1465 (!context->u2u && !sspi_gss_oid_compare(&oid, &kerberos_OID)))
1469 if (context->state == KERBEROS_STATE_TGT_REQ && tok_id == TOK_ID_TGT_REQ)
1471 if (!kerberos_rd_tgt_token(&input_token, &target, NULL))
1474 if (!retrieveSomeTgt(credentials, target, &creds))
1477 if (!kerberos_mk_tgt_token(output_buffer, KRB_TGT_REP, NULL, NULL, &creds.ticket))
1480 if (krb_log_exec(krb5_auth_con_init, credentials->ctx, &context->auth_ctx))
1483 if (krb_log_exec(krb5glue_auth_con_setuseruserkey, credentials->ctx, context->auth_ctx,
1484 &krb5glue_creds_getkey(creds)))
1487 context->state = KERBEROS_STATE_AP_REQ;
1489 else if (context->state == KERBEROS_STATE_AP_REQ && tok_id == TOK_ID_AP_REQ)
1491 if (krb_log_exec(krb5_rd_req, credentials->ctx, &context->auth_ctx, &input_token, NULL,
1492 credentials->keytab, &ap_flags, NULL))
1495 if (krb_log_exec(krb5_auth_con_setflags, credentials->ctx, context->auth_ctx,
1496 KRB5_AUTH_CONTEXT_DO_SEQUENCE | KRB5_AUTH_CONTEXT_USE_SUBKEY))
1500 if (krb_log_exec(krb5_auth_con_getauthenticator, credentials->ctx, context->auth_ctx,
1503 if (!krb5glue_authenticator_validate_chksum(authenticator, GSS_CHECKSUM_TYPE,
1507 if ((ap_flags & AP_OPTS_MUTUAL_REQUIRED) && (context->flags & SSPI_GSS_C_MUTUAL_FLAG))
1511 if (krb_log_exec(krb5_mk_rep, credentials->ctx, context->auth_ctx, &output_token))
1513 if (!sspi_gss_wrap_token(output_buffer,
1514 context->u2u ? &kerberos_u2u_OID : &kerberos_OID,
1515 TOK_ID_AP_REP, &output_token))
1521 output_buffer->cbBuffer = 0;
1524 *pfContextAttr = (context->flags & 0x1F);
1525 if (context->flags & SSPI_GSS_C_INTEG_FLAG)
1526 *pfContextAttr |= ASC_RET_INTEGRITY;
1528 if (context->flags & SSPI_GSS_C_SEQUENCE_FLAG)
1530 if (krb_log_exec(krb5_auth_con_getlocalseqnumber, credentials->ctx, context->auth_ctx,
1531 (INT32*)&context->local_seq))
1533 if (krb_log_exec(krb5_auth_con_getremoteseqnumber, credentials->ctx, context->auth_ctx,
1534 (INT32*)&context->remote_seq))
1538 if (krb_log_exec(krb5glue_update_keyset, credentials->ctx, context->auth_ctx, TRUE,
1542 context->state = KERBEROS_STATE_FINAL;
1548 if (context->state == KERBEROS_STATE_FINAL)
1551 status = SEC_I_CONTINUE_NEEDED;
1555 if (output_token.data)
1556 krb5glue_free_data_contents(credentials->ctx, &output_token);
1557 if (entry.principal)
1558 krb5glue_free_keytab_entry_contents(credentials->ctx, &entry);
1565 case SEC_I_CONTINUE_NEEDED:
1566 sspi_SecureHandleSetLowerPointer(phNewContext, context);
1567 sspi_SecureHandleSetUpperPointer(phNewContext, KERBEROS_SSP_NAME);
1570 kerberos_ContextFree(context, TRUE);
1578 status = SEC_E_INVALID_TOKEN;
1581 return SEC_E_UNSUPPORTED_FUNCTION;
1586static KRB_CONTEXT* get_context(
PCtxtHandle phContext)
1591 TCHAR* name = sspi_SecureHandleGetUpperPointer(phContext);
1595 if (_tcsncmp(KERBEROS_SSP_NAME, name, ARRAYSIZE(KERBEROS_SSP_NAME)) != 0)
1597 return sspi_SecureHandleGetLowerPointer(phContext);
1600static BOOL copy_krb5_data(krb5_data* data, PUCHAR* ptr, ULONG* psize)
1604 WINPR_ASSERT(psize);
1606 *ptr = (PUCHAR)malloc(data->length);
1610 *psize = data->length;
1611 memcpy(*ptr, data->data, data->length);
1616static SECURITY_STATUS SEC_ENTRY kerberos_DeleteSecurityContext(
PCtxtHandle phContext)
1619 KRB_CONTEXT* context = get_context(phContext);
1621 return SEC_E_INVALID_HANDLE;
1623 kerberos_ContextFree(context, TRUE);
1627 return SEC_E_UNSUPPORTED_FUNCTION;
1633static SECURITY_STATUS krb5_error_to_SECURITY_STATUS(krb5_error_code code)
1640 return SEC_E_INTERNAL_ERROR;
1644static SECURITY_STATUS kerberos_ATTR_SIZES(KRB_CONTEXT* context, KRB_CREDENTIALS* credentials,
1650 krb5glue_key key = NULL;
1652 WINPR_ASSERT(context);
1653 WINPR_ASSERT(context->auth_ctx);
1659 ContextSizes->cbMaxToken = KERBEROS_SecPkgInfoA.cbMaxToken;
1660 ContextSizes->cbMaxSignature = 0;
1661 ContextSizes->cbBlockSize = 1;
1662 ContextSizes->cbSecurityTrailer = 0;
1664 key = get_key(&context->keyset);
1666 if (context->flags & SSPI_GSS_C_CONF_FLAG)
1668 krb5_error_code rv = krb_log_exec(krb5glue_crypto_length, credentials->ctx, key,
1669 KRB5_CRYPTO_TYPE_HEADER, &header);
1671 return krb5_error_to_SECURITY_STATUS(rv);
1673 rv = krb_log_exec(krb5glue_crypto_length, credentials->ctx, key, KRB5_CRYPTO_TYPE_PADDING,
1676 return krb5_error_to_SECURITY_STATUS(rv);
1678 rv = krb_log_exec(krb5glue_crypto_length, credentials->ctx, key, KRB5_CRYPTO_TYPE_TRAILER,
1681 return krb5_error_to_SECURITY_STATUS(rv);
1684 ContextSizes->cbSecurityTrailer = header + pad + trailer + 32;
1687 if (context->flags & SSPI_GSS_C_INTEG_FLAG)
1689 krb5_error_code rv = krb_log_exec(krb5glue_crypto_length, credentials->ctx, key,
1690 KRB5_CRYPTO_TYPE_CHECKSUM, &ContextSizes->cbMaxSignature);
1692 return krb5_error_to_SECURITY_STATUS(rv);
1694 ContextSizes->cbMaxSignature += 16;
1700static SECURITY_STATUS kerberos_ATTR_TICKET_LOGON(KRB_CONTEXT* context,
1701 KRB_CREDENTIALS* credentials,
1704 krb5_creds matchCred = { 0 };
1705 krb5_auth_context authContext = NULL;
1706 krb5_flags getCredsFlags = KRB5_GC_CACHED;
1707 BOOL firstRun = TRUE;
1708 krb5_creds* hostCred = NULL;
1709 SECURITY_STATUS ret = SEC_E_INSUFFICIENT_MEMORY;
1710 int rv = krb_log_exec(krb5_sname_to_principal, credentials->ctx, context->targetHost,
"HOST",
1711 KRB5_NT_SRV_HST, &matchCred.server);
1715 rv = krb_log_exec(krb5_cc_get_principal, credentials->ctx, credentials->ccache,
1722 rv = krb_log_exec(krb5_get_credentials, credentials->ctx, getCredsFlags, credentials->ccache,
1723 &matchCred, &hostCred);
1728 case KRB5_CC_NOTFOUND:
1737 WLog_ERR(TAG,
"krb5_get_credentials(hostCreds), rv=%d", rv);
1741 if (krb_log_exec(krb5_auth_con_init, credentials->ctx, &authContext))
1745 krb5_data derOut = { 0 };
1746 if (krb_log_exec(krb5_fwd_tgt_creds, credentials->ctx, authContext, context->targetHost,
1747 matchCred.client, matchCred.server, credentials->ccache, 1, &derOut))
1749 ret = SEC_E_LOGON_DENIED;
1753 ticketLogon->MessageType = KerbTicketLogon;
1754 ticketLogon->Flags = KERB_LOGON_FLAG_REDIRECTED;
1756 if (!copy_krb5_data(&hostCred->ticket, &ticketLogon->ServiceTicket,
1757 &ticketLogon->ServiceTicketLength))
1759 krb5_free_data(credentials->ctx, &derOut);
1763 ticketLogon->TicketGrantingTicketLength = derOut.length;
1764 ticketLogon->TicketGrantingTicket = (PUCHAR)derOut.data;
1769 krb5_auth_con_free(credentials->ctx, authContext);
1770 krb5_free_creds(credentials->ctx, hostCred);
1771 krb5_free_cred_contents(credentials->ctx, &matchCred);
1777static SECURITY_STATUS SEC_ENTRY kerberos_QueryContextAttributesA(
PCtxtHandle phContext,
1778 ULONG ulAttribute,
void* pBuffer)
1781 return SEC_E_INVALID_HANDLE;
1784 return SEC_E_INVALID_PARAMETER;
1787 KRB_CONTEXT* context = get_context(phContext);
1789 return SEC_E_INVALID_PARAMETER;
1791 KRB_CREDENTIALS* credentials = context->credentials;
1793 switch (ulAttribute)
1795 case SECPKG_ATTR_SIZES:
1798 case SECPKG_CRED_ATTR_TICKET_LOGON:
1799 return kerberos_ATTR_TICKET_LOGON(context, credentials, (
KERB_TICKET_LOGON*)pBuffer);
1802 WLog_ERR(TAG,
"TODO: QueryContextAttributes implement ulAttribute=0x%08" PRIx32,
1804 return SEC_E_UNSUPPORTED_FUNCTION;
1807 return SEC_E_UNSUPPORTED_FUNCTION;
1811static SECURITY_STATUS SEC_ENTRY kerberos_QueryContextAttributesW(
PCtxtHandle phContext,
1812 ULONG ulAttribute,
void* pBuffer)
1814 return kerberos_QueryContextAttributesA(phContext, ulAttribute, pBuffer);
1817static SECURITY_STATUS SEC_ENTRY kerberos_SetContextAttributesW(
1818 WINPR_ATTR_UNUSED
PCtxtHandle phContext, WINPR_ATTR_UNUSED ULONG ulAttribute,
1819 WINPR_ATTR_UNUSED
void* pBuffer, WINPR_ATTR_UNUSED ULONG cbBuffer)
1821 return SEC_E_UNSUPPORTED_FUNCTION;
1824static SECURITY_STATUS SEC_ENTRY kerberos_SetContextAttributesA(
1825 WINPR_ATTR_UNUSED
PCtxtHandle phContext, WINPR_ATTR_UNUSED ULONG ulAttribute,
1826 WINPR_ATTR_UNUSED
void* pBuffer, WINPR_ATTR_UNUSED ULONG cbBuffer)
1828 return SEC_E_UNSUPPORTED_FUNCTION;
1831static SECURITY_STATUS SEC_ENTRY kerberos_SetCredentialsAttributesX(
PCredHandle phCredential,
1833 void* pBuffer, ULONG cbBuffer,
1834 WINPR_ATTR_UNUSED BOOL unicode)
1837 KRB_CREDENTIALS* credentials = NULL;
1840 return SEC_E_INVALID_HANDLE;
1842 credentials = sspi_SecureHandleGetLowerPointer(phCredential);
1845 return SEC_E_INVALID_HANDLE;
1848 return SEC_E_INSUFFICIENT_MEMORY;
1850 switch (ulAttribute)
1852 case SECPKG_CRED_ATTR_KDC_PROXY_SETTINGS:
1858 kdc_settings->Version != KDC_PROXY_SETTINGS_V1 ||
1861 kdc_settings->ProxyServerOffset + kdc_settings->ProxyServerLength)
1862 return SEC_E_INVALID_TOKEN;
1864 if (credentials->kdc_url)
1866 free(credentials->kdc_url);
1867 credentials->kdc_url = NULL;
1870 if (kdc_settings->ProxyServerLength > 0)
1872 WCHAR* proxy = (WCHAR*)((BYTE*)pBuffer + kdc_settings->ProxyServerOffset);
1874 credentials->kdc_url = ConvertWCharNToUtf8Alloc(
1875 proxy, kdc_settings->ProxyServerLength /
sizeof(WCHAR), NULL);
1876 if (!credentials->kdc_url)
1877 return SEC_E_INSUFFICIENT_MEMORY;
1882 case SECPKG_CRED_ATTR_NAMES:
1883 case SECPKG_ATTR_SUPPORTED_ALGS:
1885 WLog_ERR(TAG,
"TODO: SetCredentialsAttributesX implement ulAttribute=0x%08" PRIx32,
1887 return SEC_E_UNSUPPORTED_FUNCTION;
1891 return SEC_E_UNSUPPORTED_FUNCTION;
1895static SECURITY_STATUS SEC_ENTRY kerberos_SetCredentialsAttributesW(
PCredHandle phCredential,
1897 void* pBuffer, ULONG cbBuffer)
1899 return kerberos_SetCredentialsAttributesX(phCredential, ulAttribute, pBuffer, cbBuffer, TRUE);
1902static SECURITY_STATUS SEC_ENTRY kerberos_SetCredentialsAttributesA(
PCredHandle phCredential,
1904 void* pBuffer, ULONG cbBuffer)
1906 return kerberos_SetCredentialsAttributesX(phCredential, ulAttribute, pBuffer, cbBuffer, FALSE);
1909static SECURITY_STATUS SEC_ENTRY kerberos_EncryptMessage(
PCtxtHandle phContext, ULONG fQOP,
1914 KRB_CONTEXT* context = get_context(phContext);
1917 char* header = NULL;
1919 krb5glue_key key = NULL;
1920 krb5_keyusage usage = 0;
1921 krb5_crypto_iov encrypt_iov[] = { { KRB5_CRYPTO_TYPE_HEADER, { 0 } },
1922 { KRB5_CRYPTO_TYPE_DATA, { 0 } },
1923 { KRB5_CRYPTO_TYPE_DATA, { 0 } },
1924 { KRB5_CRYPTO_TYPE_PADDING, { 0 } },
1925 { KRB5_CRYPTO_TYPE_TRAILER, { 0 } } };
1928 return SEC_E_INVALID_HANDLE;
1930 if (!(context->flags & SSPI_GSS_C_CONF_FLAG))
1931 return SEC_E_UNSUPPORTED_FUNCTION;
1933 KRB_CREDENTIALS* creds = context->credentials;
1935 sig_buffer = sspi_FindSecBuffer(pMessage, SECBUFFER_TOKEN);
1936 data_buffer = sspi_FindSecBuffer(pMessage, SECBUFFER_DATA);
1938 if (!sig_buffer || !data_buffer)
1939 return SEC_E_INVALID_TOKEN;
1942 return SEC_E_QOP_NOT_SUPPORTED;
1944 flags |= context->acceptor ? FLAG_SENDER_IS_ACCEPTOR : 0;
1945 flags |= FLAG_WRAP_CONFIDENTIAL;
1947 key = get_key(&context->keyset);
1949 return SEC_E_INTERNAL_ERROR;
1951 flags |= context->keyset.acceptor_key == key ? FLAG_ACCEPTOR_SUBKEY : 0;
1953 usage = context->acceptor ? KG_USAGE_ACCEPTOR_SEAL : KG_USAGE_INITIATOR_SEAL;
1956 encrypt_iov[1].data.length = data_buffer->cbBuffer;
1957 encrypt_iov[2].data.length = 16;
1960 if (krb_log_exec(krb5glue_crypto_length_iov, creds->ctx, key, encrypt_iov,
1961 ARRAYSIZE(encrypt_iov)))
1962 return SEC_E_INTERNAL_ERROR;
1963 if (sig_buffer->cbBuffer <
1964 encrypt_iov[0].data.length + encrypt_iov[3].data.length + encrypt_iov[4].data.length + 32)
1965 return SEC_E_INSUFFICIENT_MEMORY;
1968 header = sig_buffer->pvBuffer;
1969 encrypt_iov[2].data.data = header + 16;
1970 encrypt_iov[3].data.data = encrypt_iov[2].data.data + encrypt_iov[2].data.length;
1971 encrypt_iov[4].data.data = encrypt_iov[3].data.data + encrypt_iov[3].data.length;
1972 encrypt_iov[0].data.data = encrypt_iov[4].data.data + encrypt_iov[4].data.length;
1973 encrypt_iov[1].data.data = data_buffer->pvBuffer;
1976 winpr_Data_Write_UINT16_BE(header, TOK_ID_WRAP);
1977 header[2] = WINPR_ASSERTING_INT_CAST(
char, flags);
1978 header[3] = (char)0xFF;
1979 winpr_Data_Write_UINT32(header + 4, 0);
1980 winpr_Data_Write_UINT64_BE(header + 8, (context->local_seq + MessageSeqNo));
1983 CopyMemory(encrypt_iov[2].data.data, header, 16);
1986 const size_t len = 16 + encrypt_iov[3].data.length + encrypt_iov[4].data.length;
1987 winpr_Data_Write_UINT16_BE(header + 6, WINPR_ASSERTING_INT_CAST(UINT16, len));
1989 if (krb_log_exec(krb5glue_encrypt_iov, creds->ctx, key, usage, encrypt_iov,
1990 ARRAYSIZE(encrypt_iov)))
1991 return SEC_E_INTERNAL_ERROR;
1995 return SEC_E_UNSUPPORTED_FUNCTION;
1999static SECURITY_STATUS SEC_ENTRY kerberos_DecryptMessage(
PCtxtHandle phContext,
2001 ULONG MessageSeqNo, ULONG* pfQOP)
2004 KRB_CONTEXT* context = get_context(phContext);
2007 krb5glue_key key = NULL;
2008 krb5_keyusage usage = 0;
2009 uint16_t tok_id = 0;
2013 uint64_t seq_no = 0;
2014 krb5_crypto_iov iov[] = { { KRB5_CRYPTO_TYPE_HEADER, { 0 } },
2015 { KRB5_CRYPTO_TYPE_DATA, { 0 } },
2016 { KRB5_CRYPTO_TYPE_DATA, { 0 } },
2017 { KRB5_CRYPTO_TYPE_PADDING, { 0 } },
2018 { KRB5_CRYPTO_TYPE_TRAILER, { 0 } } };
2021 return SEC_E_INVALID_HANDLE;
2023 if (!(context->flags & SSPI_GSS_C_CONF_FLAG))
2024 return SEC_E_UNSUPPORTED_FUNCTION;
2026 KRB_CREDENTIALS* creds = context->credentials;
2028 sig_buffer = sspi_FindSecBuffer(pMessage, SECBUFFER_TOKEN);
2029 data_buffer = sspi_FindSecBuffer(pMessage, SECBUFFER_DATA);
2031 if (!sig_buffer || !data_buffer || sig_buffer->cbBuffer < 16)
2032 return SEC_E_INVALID_TOKEN;
2035 BYTE* header = sig_buffer->pvBuffer;
2036 tok_id = winpr_Data_Get_UINT16_BE(header);
2038 ec = winpr_Data_Get_UINT16_BE(&header[4]);
2039 rrc = winpr_Data_Get_UINT16_BE(&header[6]);
2040 seq_no = winpr_Data_Get_UINT64_BE(&header[8]);
2043 if ((tok_id != TOK_ID_WRAP) || (header[3] != 0xFF))
2044 return SEC_E_INVALID_TOKEN;
2046 if ((flags & FLAG_SENDER_IS_ACCEPTOR) == context->acceptor)
2047 return SEC_E_INVALID_TOKEN;
2049 if ((context->flags & ISC_REQ_SEQUENCE_DETECT) &&
2050 (seq_no != context->remote_seq + MessageSeqNo))
2051 return SEC_E_OUT_OF_SEQUENCE;
2053 if (!(flags & FLAG_WRAP_CONFIDENTIAL))
2054 return SEC_E_INVALID_TOKEN;
2058 return SEC_E_INVALID_TOKEN;
2061 key = get_key(&context->keyset);
2062 if (!key || ((flags & FLAG_ACCEPTOR_SUBKEY) && (context->keyset.acceptor_key != key)))
2063 return SEC_E_INTERNAL_ERROR;
2064 usage = context->acceptor ? KG_USAGE_INITIATOR_SEAL : KG_USAGE_ACCEPTOR_SEAL;
2067 iov[1].data.length = data_buffer->cbBuffer;
2068 iov[2].data.length = 16;
2069 if (krb_log_exec(krb5glue_crypto_length_iov, creds->ctx, key, iov, ARRAYSIZE(iov)))
2070 return SEC_E_INTERNAL_ERROR;
2073 if (rrc != 16 + iov[3].data.length + iov[4].data.length)
2074 return SEC_E_INVALID_TOKEN;
2075 if (sig_buffer->cbBuffer != 16 + rrc + iov[0].data.length)
2076 return SEC_E_INVALID_TOKEN;
2079 iov[0].data.data = (
char*)&header[16 + rrc + ec];
2080 iov[1].data.data = data_buffer->pvBuffer;
2081 iov[2].data.data = (
char*)&header[16 + ec];
2082 char* data2 = iov[2].data.data;
2083 iov[3].data.data = &data2[iov[2].data.length];
2085 char* data3 = iov[3].data.data;
2086 iov[4].data.data = &data3[iov[3].data.length];
2088 if (krb_log_exec(krb5glue_decrypt_iov, creds->ctx, key, usage, iov, ARRAYSIZE(iov)))
2089 return SEC_E_INTERNAL_ERROR;
2092 winpr_Data_Write_UINT16_BE(iov[2].data.data + 4, ec);
2093 winpr_Data_Write_UINT16_BE(iov[2].data.data + 6, rrc);
2094 if (memcmp(iov[2].data.data, header, 16) != 0)
2095 return SEC_E_MESSAGE_ALTERED;
2101 return SEC_E_UNSUPPORTED_FUNCTION;
2105static SECURITY_STATUS SEC_ENTRY kerberos_MakeSignature(
PCtxtHandle phContext,
2106 WINPR_ATTR_UNUSED ULONG fQOP,
2110 KRB_CONTEXT* context = get_context(phContext);
2113 krb5glue_key key = NULL;
2114 krb5_keyusage usage = 0;
2116 krb5_crypto_iov iov[] = { { KRB5_CRYPTO_TYPE_DATA, { 0 } },
2117 { KRB5_CRYPTO_TYPE_DATA, { 0 } },
2118 { KRB5_CRYPTO_TYPE_CHECKSUM, { 0 } } };
2121 return SEC_E_INVALID_HANDLE;
2123 if (!(context->flags & SSPI_GSS_C_INTEG_FLAG))
2124 return SEC_E_UNSUPPORTED_FUNCTION;
2126 KRB_CREDENTIALS* creds = context->credentials;
2128 sig_buffer = sspi_FindSecBuffer(pMessage, SECBUFFER_TOKEN);
2129 data_buffer = sspi_FindSecBuffer(pMessage, SECBUFFER_DATA);
2131 if (!sig_buffer || !data_buffer)
2132 return SEC_E_INVALID_TOKEN;
2134 flags |= context->acceptor ? FLAG_SENDER_IS_ACCEPTOR : 0;
2136 key = get_key(&context->keyset);
2138 return SEC_E_INTERNAL_ERROR;
2139 usage = context->acceptor ? KG_USAGE_ACCEPTOR_SIGN : KG_USAGE_INITIATOR_SIGN;
2141 flags |= context->keyset.acceptor_key == key ? FLAG_ACCEPTOR_SUBKEY : 0;
2144 iov[0].data.length = data_buffer->cbBuffer;
2145 iov[1].data.length = 16;
2146 if (krb_log_exec(krb5glue_crypto_length_iov, creds->ctx, key, iov, ARRAYSIZE(iov)))
2147 return SEC_E_INTERNAL_ERROR;
2150 if (sig_buffer->cbBuffer < iov[2].data.length + 16)
2151 return SEC_E_INSUFFICIENT_MEMORY;
2154 char* header = sig_buffer->pvBuffer;
2155 winpr_Data_Write_UINT16_BE(header, TOK_ID_MIC);
2156 header[2] = WINPR_ASSERTING_INT_CAST(
char, flags);
2157 memset(header + 3, 0xFF, 5);
2158 winpr_Data_Write_UINT64_BE(header + 8, (context->local_seq + MessageSeqNo));
2161 iov[0].data.data = data_buffer->pvBuffer;
2162 iov[1].data.data = header;
2163 iov[2].data.data = header + 16;
2165 if (krb_log_exec(krb5glue_make_checksum_iov, creds->ctx, key, usage, iov, ARRAYSIZE(iov)))
2166 return SEC_E_INTERNAL_ERROR;
2168 sig_buffer->cbBuffer = iov[2].data.length + 16;
2172 return SEC_E_UNSUPPORTED_FUNCTION;
2176static SECURITY_STATUS SEC_ENTRY kerberos_VerifySignature(
PCtxtHandle phContext,
2179 WINPR_ATTR_UNUSED ULONG* pfQOP)
2184 krb5glue_key key = NULL;
2185 krb5_keyusage usage = 0;
2187 uint16_t tok_id = 0;
2188 uint64_t seq_no = 0;
2189 krb5_boolean is_valid = 0;
2190 krb5_crypto_iov iov[] = { { KRB5_CRYPTO_TYPE_DATA, { 0 } },
2191 { KRB5_CRYPTO_TYPE_DATA, { 0 } },
2192 { KRB5_CRYPTO_TYPE_CHECKSUM, { 0 } } };
2193 BYTE cmp_filler[] = { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF };
2195 KRB_CONTEXT* context = get_context(phContext);
2197 return SEC_E_INVALID_HANDLE;
2199 if (!(context->flags & SSPI_GSS_C_INTEG_FLAG))
2200 return SEC_E_UNSUPPORTED_FUNCTION;
2202 sig_buffer = sspi_FindSecBuffer(pMessage, SECBUFFER_TOKEN);
2203 data_buffer = sspi_FindSecBuffer(pMessage, SECBUFFER_DATA);
2205 if (!sig_buffer || !data_buffer || sig_buffer->cbBuffer < 16)
2206 return SEC_E_INVALID_TOKEN;
2209 BYTE* header = sig_buffer->pvBuffer;
2210 tok_id = winpr_Data_Get_UINT16_BE(header);
2212 seq_no = winpr_Data_Get_UINT64_BE((header + 8));
2215 if (tok_id != TOK_ID_MIC)
2216 return SEC_E_INVALID_TOKEN;
2218 if ((flags & FLAG_SENDER_IS_ACCEPTOR) == context->acceptor || flags & FLAG_WRAP_CONFIDENTIAL)
2219 return SEC_E_INVALID_TOKEN;
2221 if (memcmp(header + 3, cmp_filler,
sizeof(cmp_filler)) != 0)
2222 return SEC_E_INVALID_TOKEN;
2224 if (context->flags & ISC_REQ_SEQUENCE_DETECT && seq_no != context->remote_seq + MessageSeqNo)
2225 return SEC_E_OUT_OF_SEQUENCE;
2228 key = get_key(&context->keyset);
2229 if (!key || (flags & FLAG_ACCEPTOR_SUBKEY && context->keyset.acceptor_key != key))
2230 return SEC_E_INTERNAL_ERROR;
2231 usage = context->acceptor ? KG_USAGE_INITIATOR_SIGN : KG_USAGE_ACCEPTOR_SIGN;
2234 KRB_CREDENTIALS* creds = context->credentials;
2235 iov[0].data.length = data_buffer->cbBuffer;
2236 iov[1].data.length = 16;
2237 if (krb_log_exec(krb5glue_crypto_length_iov, creds->ctx, key, iov, ARRAYSIZE(iov)))
2238 return SEC_E_INTERNAL_ERROR;
2240 if (sig_buffer->cbBuffer != iov[2].data.length + 16)
2241 return SEC_E_INTERNAL_ERROR;
2244 iov[0].data.data = data_buffer->pvBuffer;
2245 iov[1].data.data = (
char*)header;
2246 iov[2].data.data = (
char*)&header[16];
2248 if (krb_log_exec(krb5glue_verify_checksum_iov, creds->ctx, key, usage, iov, ARRAYSIZE(iov),
2250 return SEC_E_INTERNAL_ERROR;
2253 return SEC_E_MESSAGE_ALTERED;
2257 return SEC_E_UNSUPPORTED_FUNCTION;
2264 kerberos_QueryCredentialsAttributesA,
2265 kerberos_AcquireCredentialsHandleA,
2266 kerberos_FreeCredentialsHandle,
2268 kerberos_InitializeSecurityContextA,
2269 kerberos_AcceptSecurityContext,
2271 kerberos_DeleteSecurityContext,
2273 kerberos_QueryContextAttributesA,
2276 kerberos_MakeSignature,
2277 kerberos_VerifySignature,
2287 kerberos_EncryptMessage,
2288 kerberos_DecryptMessage,
2289 kerberos_SetContextAttributesA,
2290 kerberos_SetCredentialsAttributesA,
2296 kerberos_QueryCredentialsAttributesW,
2297 kerberos_AcquireCredentialsHandleW,
2298 kerberos_FreeCredentialsHandle,
2300 kerberos_InitializeSecurityContextW,
2301 kerberos_AcceptSecurityContext,
2303 kerberos_DeleteSecurityContext,
2305 kerberos_QueryContextAttributesW,
2308 kerberos_MakeSignature,
2309 kerberos_VerifySignature,
2319 kerberos_EncryptMessage,
2320 kerberos_DecryptMessage,
2321 kerberos_SetContextAttributesW,
2322 kerberos_SetCredentialsAttributesW,
2325BOOL KERBEROS_init(
void)
2327 InitializeConstWCharFromUtf8(KERBEROS_SecPkgInfoA.Name, KERBEROS_SecPkgInfoW_NameBuffer,
2328 ARRAYSIZE(KERBEROS_SecPkgInfoW_NameBuffer));
2329 InitializeConstWCharFromUtf8(KERBEROS_SecPkgInfoA.Comment, KERBEROS_SecPkgInfoW_CommentBuffer,
2330 ARRAYSIZE(KERBEROS_SecPkgInfoW_CommentBuffer));