22#include <winpr/config.h>
31#include <winpr/assert.h>
32#include <winpr/cast.h>
33#include <winpr/asn1.h>
35#include <winpr/interlocked.h>
36#include <winpr/sspi.h>
37#include <winpr/print.h>
38#include <winpr/tchar.h>
39#include <winpr/sysinfo.h>
40#include <winpr/registry.h>
41#include <winpr/endian.h>
42#include <winpr/crypto.h>
43#include <winpr/path.h>
44#include <winpr/wtypes.h>
45#include <winpr/winsock.h>
46#include <winpr/schannel.h>
47#include <winpr/secapi.h>
56#ifdef WITH_KRB5_HEIMDAL
58#include <krb5-protos.h>
63#define TAG WINPR_TAG("sspi.Kerberos")
74 "Kerberos Security Package"
77static WCHAR KERBEROS_SecPkgInfoW_NameBuffer[32] = { 0 };
78static WCHAR KERBEROS_SecPkgInfoW_CommentBuffer[32] = { 0 };
85 KERBEROS_SecPkgInfoW_NameBuffer,
86 KERBEROS_SecPkgInfoW_CommentBuffer
93 KERBEROS_STATE_INITIAL,
94 KERBEROS_STATE_TGT_REQ,
95 KERBEROS_STATE_TGT_REP,
96 KERBEROS_STATE_AP_REQ,
97 KERBEROS_STATE_AP_REP,
101typedef struct KRB_CREDENTIALS_st
103 volatile LONG refCount;
108 krb5_keytab client_keytab;
114 enum KERBEROS_STATE state;
115 KRB_CREDENTIALS* credentials;
116 krb5_auth_context auth_ctx;
126static const WinPrAsn1_OID kerberos_OID = { 9, (
void*)
"\x2a\x86\x48\x86\xf7\x12\x01\x02\x02" };
128 (
void*)
"\x2a\x86\x48\x86\xf7\x12\x01\x02\x02\x03" };
130#define krb_log_exec(fkt, ctx, ...) \
131 kerberos_log_msg(ctx, fkt(ctx, ##__VA_ARGS__), #fkt, __FILE__, __func__, __LINE__)
132#define krb_log_exec_ptr(fkt, ctx, ...) \
133 kerberos_log_msg(*ctx, fkt(ctx, ##__VA_ARGS__), #fkt, __FILE__, __func__, __LINE__)
134static krb5_error_code kerberos_log_msg(krb5_context ctx, krb5_error_code code,
const char* what,
135 const char* file,
const char* fkt,
size_t line)
144 const DWORD level = WLOG_ERROR;
146 wLog* log = WLog_Get(TAG);
147 if (WLog_IsLevelActive(log, level))
149 const char* msg = krb5_get_error_message(ctx, code);
150 WLog_PrintMessage(log, WLOG_MESSAGE_TEXT, level, line, file, fkt,
"%s (%s [%d])",
152 krb5_free_error_message(ctx, msg);
160static void credentials_unref(KRB_CREDENTIALS* credentials);
162static void kerberos_ContextFree(KRB_CONTEXT* ctx, BOOL allocated)
167 free(ctx->targetHost);
168 ctx->targetHost = NULL;
170 if (ctx->credentials)
172 krb5_context krbctx = ctx->credentials->ctx;
176 krb5_auth_con_free(krbctx, ctx->auth_ctx);
178 krb5glue_keys_free(krbctx, &ctx->keyset);
181 credentials_unref(ctx->credentials);
188static KRB_CONTEXT* kerberos_ContextNew(KRB_CREDENTIALS* credentials)
190 KRB_CONTEXT* context = NULL;
192 context = (KRB_CONTEXT*)calloc(1,
sizeof(KRB_CONTEXT));
196 context->credentials = credentials;
197 InterlockedIncrement(&credentials->refCount);
201static krb5_error_code krb5_prompter(krb5_context context,
void* data,
202 WINPR_ATTR_UNUSED
const char* name,
203 WINPR_ATTR_UNUSED
const char* banner,
int num_prompts,
204 krb5_prompt prompts[])
206 for (
int i = 0; i < num_prompts; i++)
208 krb5_prompt_type type = krb5glue_get_prompt_type(context, prompts, i);
209 if (type && (type == KRB5_PROMPT_TYPE_PREAUTH || type == KRB5_PROMPT_TYPE_PASSWORD) && data)
211 prompts[i].reply->data = _strdup((
const char*)data);
213 const size_t len = strlen((
const char*)data);
214 if (len > UINT32_MAX)
215 return KRB5KRB_ERR_GENERIC;
216 prompts[i].reply->length = (UINT32)len;
224 return keyset->acceptor_key ? keyset->acceptor_key
225 : keyset->initiator_key ? keyset->initiator_key
226 : keyset->session_key;
229static BOOL isValidIPv4(
const char* ipAddress)
231 struct sockaddr_in sa = { 0 };
232 int result = inet_pton(AF_INET, ipAddress, &(sa.sin_addr));
236static BOOL isValidIPv6(
const char* ipAddress)
238 struct sockaddr_in6 sa = { 0 };
239 int result = inet_pton(AF_INET6, ipAddress, &(sa.sin6_addr));
243static BOOL isValidIP(
const char* ipAddress)
245 return isValidIPv4(ipAddress) || isValidIPv6(ipAddress);
248static int build_krbtgt(krb5_context ctx, krb5_data* realm, krb5_principal* ptarget)
253 krb5_error_code rv = KRB5_CC_NOMEM;
255 (void)winpr_asprintf(&name, &len,
"krbtgt/%s@%s", realm->data, realm->data);
256 if (!name || (len == 0))
259 krb5_principal target = { 0 };
260 rv = krb5_parse_name(ctx, name, &target);
269static SECURITY_STATUS SEC_ENTRY kerberos_AcquireCredentialsHandleA(
270 SEC_CHAR* pszPrincipal, WINPR_ATTR_UNUSED SEC_CHAR* pszPackage, ULONG fCredentialUse,
271 WINPR_ATTR_UNUSED
void* pvLogonID,
void* pAuthData, WINPR_ATTR_UNUSED SEC_GET_KEY_FN pGetKeyFn,
272 WINPR_ATTR_UNUSED
void* pvGetKeyArgument,
PCredHandle phCredential,
277 KRB_CREDENTIALS* credentials = NULL;
278 krb5_context ctx = NULL;
279 krb5_ccache ccache = NULL;
280 krb5_keytab keytab = NULL;
281 krb5_principal principal = NULL;
283 char* username = NULL;
284 char* password = NULL;
285 BOOL own_ccache = FALSE;
286 const char*
const default_ccache_type =
"MEMORY";
290 UINT32 identityFlags = sspi_GetAuthIdentityFlags(pAuthData);
292 if (identityFlags & SEC_WINNT_AUTH_IDENTITY_EXTENDED)
298 WLog_ERR(TAG,
"Failed to copy auth identity fields");
303 pszPrincipal = username;
306 if (krb_log_exec_ptr(krb5_init_context, &ctx))
311 char* udomain = _strdup(domain);
317 krb5_error_code rv = krb_log_exec(krb5_set_default_realm, ctx, udomain);
326 char* cpszPrincipal = _strdup(pszPrincipal);
331 char* p = strchr(cpszPrincipal,
'@');
335 krb5_error_code rv = krb_log_exec(krb5_parse_name, ctx, cpszPrincipal, &principal);
342 if (krb_settings && krb_settings->cache)
344 if ((krb_log_exec(krb5_cc_set_default_name, ctx, krb_settings->cache)))
353 if (krb5_cc_cache_match(ctx, principal, &ccache) == KRB5_CC_NOTFOUND)
357 if (krb_log_exec(krb5_cc_new_unique, ctx, default_ccache_type, 0, &ccache))
362 if (krb_log_exec(krb5_cc_resolve, ctx, krb_settings->cache, &ccache))
366 if (krb_log_exec(krb5_cc_initialize, ctx, ccache, principal))
372 else if (fCredentialUse & SECPKG_CRED_OUTBOUND)
375 if (krb_log_exec(krb5_cc_default, ctx, &ccache))
377 if (krb_log_exec(krb5_cc_get_principal, ctx, ccache, &principal))
385 if (krb_log_exec(krb5_cc_new_unique, ctx, default_ccache_type, 0, &ccache))
390 if (krb_log_exec(krb5_cc_resolve, ctx, krb_settings->cache, &ccache))
395 if (krb_settings && krb_settings->keytab)
397 if (krb_log_exec(krb5_kt_resolve, ctx, krb_settings->keytab, &keytab))
402 if (fCredentialUse & SECPKG_CRED_INBOUND)
403 if (krb_log_exec(krb5_kt_default, ctx, &keytab))
408 if (fCredentialUse & SECPKG_CRED_OUTBOUND)
410 krb5_creds creds = { 0 };
411 krb5_creds matchCreds = { 0 };
412 krb5_flags matchFlags = KRB5_TC_MATCH_TIMES;
414 krb5_timeofday(ctx, &matchCreds.times.endtime);
415 matchCreds.times.endtime += 60;
416 matchCreds.client = principal;
418 if (krb_log_exec(build_krbtgt, ctx, &principal->realm, &matchCreds.server))
421 int rv = krb5_cc_retrieve_cred(ctx, ccache, matchFlags, &matchCreds, &creds);
422 krb5_free_principal(ctx, matchCreds.server);
423 krb5_free_cred_contents(ctx, &creds);
426 if (krb_log_exec(krb5glue_get_init_creds, ctx, principal, ccache, krb5_prompter,
427 password, krb_settings))
432 credentials = calloc(1,
sizeof(KRB_CREDENTIALS));
435 credentials->refCount = 1;
436 credentials->ctx = ctx;
437 credentials->ccache = ccache;
438 credentials->keytab = keytab;
439 credentials->own_ccache = own_ccache;
448 krb5_free_principal(ctx, principal);
456 krb5_cc_destroy(ctx, ccache);
458 krb5_cc_close(ctx, ccache);
461 krb5_kt_close(ctx, keytab);
463 krb5_free_context(ctx);
470 sspi_SecureHandleSetLowerPointer(phCredential, (
void*)credentials);
471 sspi_SecureHandleSetUpperPointer(phCredential, (
void*)KERBEROS_SSP_NAME);
475 return SEC_E_NO_CREDENTIALS;
477 return SEC_E_UNSUPPORTED_FUNCTION;
481static SECURITY_STATUS SEC_ENTRY kerberos_AcquireCredentialsHandleW(
482 SEC_WCHAR* pszPrincipal, SEC_WCHAR* pszPackage, ULONG fCredentialUse,
void* pvLogonID,
483 void* pAuthData, SEC_GET_KEY_FN pGetKeyFn,
void* pvGetKeyArgument,
PCredHandle phCredential,
486 SECURITY_STATUS status = SEC_E_INSUFFICIENT_MEMORY;
487 char* principal = NULL;
488 char*
package = NULL;
492 principal = ConvertWCharToUtf8Alloc(pszPrincipal, NULL);
498 package = ConvertWCharToUtf8Alloc(pszPackage, NULL);
504 kerberos_AcquireCredentialsHandleA(principal, package, fCredentialUse, pvLogonID, pAuthData,
505 pGetKeyFn, pvGetKeyArgument, phCredential, ptsExpiry);
515static void credentials_unref(KRB_CREDENTIALS* credentials)
517 WINPR_ASSERT(credentials);
519 if (InterlockedDecrement(&credentials->refCount))
522 free(credentials->kdc_url);
524 if (credentials->ccache)
526 if (credentials->own_ccache)
527 krb5_cc_destroy(credentials->ctx, credentials->ccache);
529 krb5_cc_close(credentials->ctx, credentials->ccache);
531 if (credentials->keytab)
532 krb5_kt_close(credentials->ctx, credentials->keytab);
534 krb5_free_context(credentials->ctx);
539static SECURITY_STATUS SEC_ENTRY kerberos_FreeCredentialsHandle(
PCredHandle phCredential)
542 KRB_CREDENTIALS* credentials = sspi_SecureHandleGetLowerPointer(phCredential);
544 return SEC_E_INVALID_HANDLE;
546 credentials_unref(credentials);
548 sspi_SecureHandleInvalidate(phCredential);
551 return SEC_E_UNSUPPORTED_FUNCTION;
555static SECURITY_STATUS SEC_ENTRY kerberos_QueryCredentialsAttributesW(
556 WINPR_ATTR_UNUSED
PCredHandle phCredential, ULONG ulAttribute, WINPR_ATTR_UNUSED
void* pBuffer)
561 case SECPKG_CRED_ATTR_NAMES:
564 WLog_ERR(TAG,
"TODO: QueryCredentialsAttributesW, implement ulAttribute=%08" PRIx32,
566 return SEC_E_UNSUPPORTED_FUNCTION;
570 return SEC_E_UNSUPPORTED_FUNCTION;
574static SECURITY_STATUS SEC_ENTRY kerberos_QueryCredentialsAttributesA(
PCredHandle phCredential,
578 return kerberos_QueryCredentialsAttributesW(phCredential, ulAttribute, pBuffer);
583static BOOL kerberos_mk_tgt_token(
SecBuffer* buf,
int msg_type,
char* sname,
char* host,
584 const krb5_data* ticket)
586 WinPrAsn1Encoder* enc = NULL;
595 if (msg_type != KRB_TGT_REQ && msg_type != KRB_TGT_REP)
597 if (msg_type == KRB_TGT_REP && !ticket)
600 enc = WinPrAsn1Encoder_New(WINPR_ASN1_DER);
605 if (!WinPrAsn1EncSeqContainer(enc))
609 if (!WinPrAsn1EncContextualInteger(enc, 0, 5))
613 if (!WinPrAsn1EncContextualInteger(enc, 1, msg_type))
616 if (msg_type == KRB_TGT_REQ && sname)
619 if (!WinPrAsn1EncContextualSeqContainer(enc, 2))
623 if (!WinPrAsn1EncContextualInteger(enc, 0, KRB5_NT_SRV_HST))
627 if (!WinPrAsn1EncContextualSeqContainer(enc, 1))
630 if (!WinPrAsn1EncGeneralString(enc, sname))
633 if (host && !WinPrAsn1EncGeneralString(enc, host))
636 if (!WinPrAsn1EncEndContainer(enc) || !WinPrAsn1EncEndContainer(enc))
639 else if (msg_type == KRB_TGT_REP)
642 data.data = (BYTE*)ticket->data;
643 data.len = ticket->length;
644 if (!WinPrAsn1EncContextualRawContent(enc, 2, &data))
648 if (!WinPrAsn1EncEndContainer(enc))
651 if (!WinPrAsn1EncStreamSize(enc, &len) || len > buf->cbBuffer)
654 Stream_StaticInit(&s, buf->pvBuffer, len);
655 if (!WinPrAsn1EncToStream(enc, &s))
658 token.data = buf->pvBuffer;
659 token.length = (UINT)len;
660 if (sspi_gss_wrap_token(buf, &kerberos_u2u_OID,
661 msg_type == KRB_TGT_REQ ? TOK_ID_TGT_REQ : TOK_ID_TGT_REP, &token))
665 WinPrAsn1Encoder_Free(&enc);
669static BOOL append(
char* dst,
size_t dstSize,
const char* src)
671 const size_t dlen = strnlen(dst, dstSize);
672 const size_t slen = strlen(src);
673 if (dlen + slen >= dstSize)
675 if (!strncat(dst, src, dstSize - dlen))
680static BOOL kerberos_rd_tgt_req_tag2(
WinPrAsn1Decoder* dec,
char* buf,
size_t len)
686 if (!WinPrAsn1DecReadSequence(dec, &seq))
691 WinPrAsn1_INTEGER val = 0;
692 if (!WinPrAsn1DecReadContextualInteger(&seq, 0, &error, &val))
696 if (!WinPrAsn1DecReadContextualSequence(&seq, 1, &error, dec))
699 WinPrAsn1_tag tag = 0;
701 while (WinPrAsn1DecPeekTag(dec, &tag))
703 BOOL success = FALSE;
705 if (!WinPrAsn1DecReadGeneralString(dec, &lstr))
710 if (!append(buf, len,
"/"))
715 if (!append(buf, len, lstr))
730static BOOL kerberos_rd_tgt_req_tag3(
WinPrAsn1Decoder* dec,
char* buf,
size_t len)
734 WinPrAsn1_STRING str = NULL;
735 if (!WinPrAsn1DecReadGeneralString(dec, &str))
738 if (!append(buf, len,
"@"))
740 if (!append(buf, len, str))
757 wStream s = WinPrAsn1DecGetStream(dec);
758 const size_t len = Stream_Length(&s);
763 WinPrAsn1_tagId tag = 0;
764 if (WinPrAsn1DecReadContextualTag(dec, &tag, &dec2) == 0)
767 char* buf = calloc(len + 1,
sizeof(
char));
775 BOOL checkForTag3 = TRUE;
778 rc = kerberos_rd_tgt_req_tag2(&dec2, buf, len);
781 const size_t res = WinPrAsn1DecReadContextualTag(dec, &tag, dec);
783 checkForTag3 = FALSE;
790 rc = kerberos_rd_tgt_req_tag3(&dec2, buf, len);
809 WinPrAsn1_tagId tag = 0;
810 if (WinPrAsn1DecReadContextualTag(dec, &tag, &asnTicket) == 0)
816 wStream s = WinPrAsn1DecGetStream(&asnTicket);
817 ticket->data = Stream_BufferAs(&s,
char);
819 const size_t len = Stream_Length(&s);
820 if (len > UINT32_MAX)
822 ticket->length = (UINT32)len;
826static BOOL kerberos_rd_tgt_token(
const sspi_gss_data* token,
char** target, krb5_data* ticket)
829 WinPrAsn1_INTEGER val = 0;
837 WinPrAsn1Decoder_InitMem(&der, WINPR_ASN1_DER, (BYTE*)token->data, token->length);
841 if (!WinPrAsn1DecReadSequence(&der, &seq))
845 if (!WinPrAsn1DecReadContextualInteger(&seq, 0, &error, &val) || val != 5)
849 if (!WinPrAsn1DecReadContextualInteger(&seq, 1, &error, &val))
855 return kerberos_rd_tgt_req(&seq, target);
857 return kerberos_rd_tgt_rep(&seq, ticket);
866static BOOL kerberos_hash_channel_bindings(WINPR_DIGEST_CTX* md5,
SEC_CHANNEL_BINDINGS* bindings)
870 winpr_Data_Write_UINT32(buf, bindings->dwInitiatorAddrType);
871 if (!winpr_Digest_Update(md5, buf, 4))
874 winpr_Data_Write_UINT32(buf, bindings->cbInitiatorLength);
875 if (!winpr_Digest_Update(md5, buf, 4))
878 if (bindings->cbInitiatorLength &&
879 !winpr_Digest_Update(md5, (BYTE*)bindings + bindings->dwInitiatorOffset,
880 bindings->cbInitiatorLength))
883 winpr_Data_Write_UINT32(buf, bindings->dwAcceptorAddrType);
884 if (!winpr_Digest_Update(md5, buf, 4))
887 winpr_Data_Write_UINT32(buf, bindings->cbAcceptorLength);
888 if (!winpr_Digest_Update(md5, buf, 4))
891 if (bindings->cbAcceptorLength &&
892 !winpr_Digest_Update(md5, (BYTE*)bindings + bindings->dwAcceptorOffset,
893 bindings->cbAcceptorLength))
896 winpr_Data_Write_UINT32(buf, bindings->cbApplicationDataLength);
897 if (!winpr_Digest_Update(md5, buf, 4))
900 if (bindings->cbApplicationDataLength &&
901 !winpr_Digest_Update(md5, (BYTE*)bindings + bindings->dwApplicationDataOffset,
902 bindings->cbApplicationDataLength))
908static SECURITY_STATUS SEC_ENTRY kerberos_InitializeSecurityContextA(
910 WINPR_ATTR_UNUSED ULONG Reserved1, WINPR_ATTR_UNUSED ULONG TargetDataRep,
PSecBufferDesc pInput,
912 WINPR_ATTR_UNUSED ULONG* pfContextAttr, WINPR_ATTR_UNUSED
PTimeStamp ptsExpiry)
918 WINPR_DIGEST_CTX* md5 = NULL;
922 krb5_data input_token = { 0 };
923 krb5_data output_token = { 0 };
924 SECURITY_STATUS status = SEC_E_INTERNAL_ERROR;
927 krb5_ap_rep_enc_part* reply = NULL;
928 krb5_flags ap_flags = AP_OPTS_USE_SUBKEY;
929 char cksum_contents[24] = { 0 };
930 krb5_data cksum = { 0 };
931 krb5_creds in_creds = { 0 };
932 krb5_creds* creds = NULL;
933 BOOL isNewContext = FALSE;
934 KRB_CONTEXT* context = NULL;
935 KRB_CREDENTIALS* credentials = sspi_SecureHandleGetLowerPointer(phCredential);
938 if (phContext && !phContext->dwLower && !phContext->dwUpper)
939 return SEC_E_INVALID_HANDLE;
941 context = sspi_SecureHandleGetLowerPointer(phContext);
944 return SEC_E_NO_CREDENTIALS;
948 input_buffer = sspi_FindSecBuffer(pInput, SECBUFFER_TOKEN);
949 bindings_buffer = sspi_FindSecBuffer(pInput, SECBUFFER_CHANNEL_BINDINGS);
952 output_buffer = sspi_FindSecBuffer(pOutput, SECBUFFER_TOKEN);
954 if (fContextReq & ISC_REQ_MUTUAL_AUTH)
955 ap_flags |= AP_OPTS_MUTUAL_REQUIRED;
957 if (fContextReq & ISC_REQ_USE_SESSION_KEY)
958 ap_flags |= AP_OPTS_USE_SESSION_KEY;
963 target = _strdup(pszTargetName);
966 status = SEC_E_INSUFFICIENT_MEMORY;
969 host = strchr(target,
'/');
979 status = SEC_E_NO_CREDENTIALS;
986 context = kerberos_ContextNew(credentials);
989 status = SEC_E_INSUFFICIENT_MEMORY;
996 context->targetHost = _strdup(host);
997 if (!context->targetHost)
999 status = SEC_E_INSUFFICIENT_MEMORY;
1003 if (fContextReq & ISC_REQ_USE_SESSION_KEY)
1005 context->state = KERBEROS_STATE_TGT_REQ;
1006 context->u2u = TRUE;
1009 context->state = KERBEROS_STATE_AP_REQ;
1013 if (!input_buffer || !sspi_gss_unwrap_token(input_buffer, &oid, &tok_id, &input_token))
1015 if ((context->u2u && !sspi_gss_oid_compare(&oid, &kerberos_u2u_OID)) ||
1016 (!context->u2u && !sspi_gss_oid_compare(&oid, &kerberos_OID)))
1021 context->flags |= (fContextReq & 0x1F);
1022 if ((fContextReq & ISC_REQ_INTEGRITY) && !(fContextReq & ISC_REQ_NO_INTEGRITY))
1023 context->flags |= SSPI_GSS_C_INTEG_FLAG;
1025 switch (context->state)
1027 case KERBEROS_STATE_TGT_REQ:
1029 if (!kerberos_mk_tgt_token(output_buffer, KRB_TGT_REQ, sname, host, NULL))
1032 context->state = KERBEROS_STATE_TGT_REP;
1033 status = SEC_I_CONTINUE_NEEDED;
1036 case KERBEROS_STATE_TGT_REP:
1038 if (tok_id != TOK_ID_TGT_REP)
1041 if (!kerberos_rd_tgt_token(&input_token, NULL, &in_creds.second_ticket))
1048 case KERBEROS_STATE_AP_REQ:
1051 if (krb_log_exec(krb5_auth_con_init, credentials->ctx, &context->auth_ctx))
1053 if (krb_log_exec(krb5_auth_con_setflags, credentials->ctx, context->auth_ctx,
1054 KRB5_AUTH_CONTEXT_DO_SEQUENCE | KRB5_AUTH_CONTEXT_USE_SUBKEY))
1056 if (krb_log_exec(krb5glue_auth_con_set_cksumtype, credentials->ctx, context->auth_ctx,
1061 if (krb_log_exec(krb5_sname_to_principal, credentials->ctx, host, sname,
1062 KRB5_NT_SRV_HST, &in_creds.server))
1065 if (krb_log_exec(krb5_cc_get_principal, credentials->ctx, credentials->ccache,
1068 status = SEC_E_WRONG_PRINCIPAL;
1072 if (krb_log_exec(krb5_get_credentials, credentials->ctx,
1073 context->u2u ? KRB5_GC_USER_USER : 0, credentials->ccache, &in_creds,
1076 status = SEC_E_NO_CREDENTIALS;
1081 cksum.data = cksum_contents;
1082 cksum.length =
sizeof(cksum_contents);
1083 winpr_Data_Write_UINT32(cksum_contents, 16);
1084 winpr_Data_Write_UINT32((cksum_contents + 20), context->flags);
1086 if (bindings_buffer)
1092 (bindings->cbInitiatorLength + bindings->dwInitiatorOffset) >
1093 bindings_buffer->cbBuffer ||
1094 (bindings->cbAcceptorLength + bindings->dwAcceptorOffset) >
1095 bindings_buffer->cbBuffer ||
1096 (bindings->cbApplicationDataLength + bindings->dwApplicationDataOffset) >
1097 bindings_buffer->cbBuffer)
1099 status = SEC_E_BAD_BINDINGS;
1103 md5 = winpr_Digest_New();
1107 if (!winpr_Digest_Init(md5, WINPR_MD_MD5))
1110 if (!kerberos_hash_channel_bindings(md5, bindings))
1113 if (!winpr_Digest_Final(md5, (BYTE*)cksum_contents + 4, 16))
1118 if (krb_log_exec(krb5_mk_req_extended, credentials->ctx, &context->auth_ctx, ap_flags,
1119 &cksum, creds, &output_token))
1122 if (!sspi_gss_wrap_token(output_buffer,
1123 context->u2u ? &kerberos_u2u_OID : &kerberos_OID,
1124 TOK_ID_AP_REQ, &output_token))
1127 if (context->flags & SSPI_GSS_C_SEQUENCE_FLAG)
1129 if (krb_log_exec(krb5_auth_con_getlocalseqnumber, credentials->ctx,
1130 context->auth_ctx, (INT32*)&context->local_seq))
1132 context->remote_seq ^= context->local_seq;
1135 if (krb_log_exec(krb5glue_update_keyset, credentials->ctx, context->auth_ctx, FALSE,
1139 context->state = KERBEROS_STATE_AP_REP;
1141 if (context->flags & SSPI_GSS_C_MUTUAL_FLAG)
1142 status = SEC_I_CONTINUE_NEEDED;
1147 case KERBEROS_STATE_AP_REP:
1149 if (tok_id == TOK_ID_AP_REP)
1151 if (krb_log_exec(krb5_rd_rep, credentials->ctx, context->auth_ctx, &input_token,
1154 krb5_free_ap_rep_enc_part(credentials->ctx, reply);
1156 else if (tok_id == TOK_ID_ERROR)
1158 krb5glue_log_error(credentials->ctx, &input_token, TAG);
1164 if (context->flags & SSPI_GSS_C_SEQUENCE_FLAG)
1166 if (krb_log_exec(krb5_auth_con_getremoteseqnumber, credentials->ctx,
1167 context->auth_ctx, (INT32*)&context->remote_seq))
1171 if (krb_log_exec(krb5glue_update_keyset, credentials->ctx, context->auth_ctx, FALSE,
1175 context->state = KERBEROS_STATE_FINAL;
1178 output_buffer->cbBuffer = 0;
1182 case KERBEROS_STATE_FINAL:
1184 WLog_ERR(TAG,
"Kerberos in invalid state!");
1191 krb5_data edata = { 0 };
1192 in_creds.second_ticket = edata;
1193 krb5_free_cred_contents(credentials->ctx, &in_creds);
1196 krb5_free_creds(credentials->ctx, creds);
1197 if (output_token.data)
1198 krb5glue_free_data_contents(credentials->ctx, &output_token);
1200 winpr_Digest_Free(md5);
1209 case SEC_I_CONTINUE_NEEDED:
1210 sspi_SecureHandleSetLowerPointer(phNewContext, context);
1211 sspi_SecureHandleSetUpperPointer(phNewContext, KERBEROS_SSP_NAME);
1214 kerberos_ContextFree(context, TRUE);
1222 status = SEC_E_INVALID_TOKEN;
1225 return SEC_E_UNSUPPORTED_FUNCTION;
1229static SECURITY_STATUS SEC_ENTRY kerberos_InitializeSecurityContextW(
1231 ULONG Reserved1, ULONG TargetDataRep,
PSecBufferDesc pInput, ULONG Reserved2,
1234 SECURITY_STATUS status = 0;
1235 char* target_name = NULL;
1239 target_name = ConvertWCharToUtf8Alloc(pszTargetName, NULL);
1241 return SEC_E_INSUFFICIENT_MEMORY;
1244 status = kerberos_InitializeSecurityContextA(phCredential, phContext, target_name, fContextReq,
1245 Reserved1, TargetDataRep, pInput, Reserved2,
1246 phNewContext, pOutput, pfContextAttr, ptsExpiry);
1254static SECURITY_STATUS SEC_ENTRY kerberos_AcceptSecurityContext(
1256 WINPR_ATTR_UNUSED ULONG fContextReq, WINPR_ATTR_UNUSED ULONG TargetDataRep,
1261 BOOL isNewContext = FALSE;
1265 uint16_t tok_id = 0;
1266 krb5_data input_token = { 0 };
1267 krb5_data output_token = { 0 };
1268 SECURITY_STATUS status = SEC_E_INTERNAL_ERROR;
1269 krb5_flags ap_flags = 0;
1270 krb5glue_authenticator authenticator = NULL;
1271 char* target = NULL;
1274 krb5_kt_cursor cur = { 0 };
1275 krb5_keytab_entry entry = { 0 };
1276 krb5_principal principal = NULL;
1277 krb5_creds creds = { 0 };
1280 if (phContext && !phContext->dwLower && !phContext->dwUpper)
1281 return SEC_E_INVALID_HANDLE;
1283 KRB_CONTEXT* context = sspi_SecureHandleGetLowerPointer(phContext);
1284 KRB_CREDENTIALS* credentials = sspi_SecureHandleGetLowerPointer(phCredential);
1287 input_buffer = sspi_FindSecBuffer(pInput, SECBUFFER_TOKEN);
1289 output_buffer = sspi_FindSecBuffer(pOutput, SECBUFFER_TOKEN);
1292 return SEC_E_INVALID_TOKEN;
1294 if (!sspi_gss_unwrap_token(input_buffer, &oid, &tok_id, &input_token))
1295 return SEC_E_INVALID_TOKEN;
1299 isNewContext = TRUE;
1300 context = kerberos_ContextNew(credentials);
1301 context->acceptor = TRUE;
1303 if (sspi_gss_oid_compare(&oid, &kerberos_u2u_OID))
1305 context->u2u = TRUE;
1306 context->state = KERBEROS_STATE_TGT_REQ;
1308 else if (sspi_gss_oid_compare(&oid, &kerberos_OID))
1309 context->state = KERBEROS_STATE_AP_REQ;
1315 if ((context->u2u && !sspi_gss_oid_compare(&oid, &kerberos_u2u_OID)) ||
1316 (!context->u2u && !sspi_gss_oid_compare(&oid, &kerberos_OID)))
1320 if (context->state == KERBEROS_STATE_TGT_REQ && tok_id == TOK_ID_TGT_REQ)
1322 if (!kerberos_rd_tgt_token(&input_token, &target, NULL))
1338 sname = strchr(target,
'/');
1344 sname = memmove(target, sname, strlen(sname) + 1);
1346 realm = strchr(target,
'@');
1352 size_t len = strlen(realm);
1353 memmove(realm + 1, realm, len + 1);
1360 size_t len = strlen(sname);
1362 target[len + 1] = 0;
1366 if (krb_log_exec(krb5_parse_name_flags, credentials->ctx, sname ? sname :
"",
1367 KRB5_PRINCIPAL_PARSE_NO_REALM, &principal))
1372 if (krb_log_exec(krb5glue_set_principal_realm, credentials->ctx, principal, realm))
1376 if (krb_log_exec(krb5_kt_start_seq_get, credentials->ctx, credentials->keytab, &cur))
1381 krb5_error_code rv = krb_log_exec(krb5_kt_next_entry, credentials->ctx,
1382 credentials->keytab, &entry, &cur);
1383 if (rv == KRB5_KT_END)
1389 krb5_principal_compare_any_realm(credentials->ctx, principal, entry.principal)) &&
1390 (!realm || krb5_realm_compare(credentials->ctx, principal, entry.principal)))
1392 const krb5_error_code res =
1393 krb_log_exec(krb5glue_free_keytab_entry_contents, credentials->ctx, &entry);
1394 memset(&entry, 0,
sizeof(entry));
1399 if (krb_log_exec(krb5_kt_end_seq_get, credentials->ctx, credentials->keytab, &cur))
1402 if (!entry.principal)
1406 if (krb_log_exec(krb5_get_init_creds_keytab, credentials->ctx, &creds, entry.principal,
1407 credentials->keytab, 0, NULL, NULL))
1410 if (!kerberos_mk_tgt_token(output_buffer, KRB_TGT_REP, NULL, NULL, &creds.ticket))
1413 if (krb_log_exec(krb5_auth_con_init, credentials->ctx, &context->auth_ctx))
1416 if (krb_log_exec(krb5glue_auth_con_setuseruserkey, credentials->ctx, context->auth_ctx,
1417 &krb5glue_creds_getkey(creds)))
1420 context->state = KERBEROS_STATE_AP_REQ;
1422 else if (context->state == KERBEROS_STATE_AP_REQ && tok_id == TOK_ID_AP_REQ)
1424 if (krb_log_exec(krb5_rd_req, credentials->ctx, &context->auth_ctx, &input_token, NULL,
1425 credentials->keytab, &ap_flags, NULL))
1428 if (krb_log_exec(krb5_auth_con_setflags, credentials->ctx, context->auth_ctx,
1429 KRB5_AUTH_CONTEXT_DO_SEQUENCE | KRB5_AUTH_CONTEXT_USE_SUBKEY))
1433 if (krb_log_exec(krb5_auth_con_getauthenticator, credentials->ctx, context->auth_ctx,
1436 if (!krb5glue_authenticator_validate_chksum(authenticator, GSS_CHECKSUM_TYPE,
1440 if ((ap_flags & AP_OPTS_MUTUAL_REQUIRED) && (context->flags & SSPI_GSS_C_MUTUAL_FLAG))
1444 if (krb_log_exec(krb5_mk_rep, credentials->ctx, context->auth_ctx, &output_token))
1446 if (!sspi_gss_wrap_token(output_buffer,
1447 context->u2u ? &kerberos_u2u_OID : &kerberos_OID,
1448 TOK_ID_AP_REP, &output_token))
1454 output_buffer->cbBuffer = 0;
1457 *pfContextAttr = (context->flags & 0x1F);
1458 if (context->flags & SSPI_GSS_C_INTEG_FLAG)
1459 *pfContextAttr |= ASC_RET_INTEGRITY;
1461 if (context->flags & SSPI_GSS_C_SEQUENCE_FLAG)
1463 if (krb_log_exec(krb5_auth_con_getlocalseqnumber, credentials->ctx, context->auth_ctx,
1464 (INT32*)&context->local_seq))
1466 if (krb_log_exec(krb5_auth_con_getremoteseqnumber, credentials->ctx, context->auth_ctx,
1467 (INT32*)&context->remote_seq))
1471 if (krb_log_exec(krb5glue_update_keyset, credentials->ctx, context->auth_ctx, TRUE,
1475 context->state = KERBEROS_STATE_FINAL;
1481 if (context->state == KERBEROS_STATE_FINAL)
1484 status = SEC_I_CONTINUE_NEEDED;
1488 if (output_token.data)
1489 krb5glue_free_data_contents(credentials->ctx, &output_token);
1490 if (entry.principal)
1491 krb5glue_free_keytab_entry_contents(credentials->ctx, &entry);
1498 case SEC_I_CONTINUE_NEEDED:
1499 sspi_SecureHandleSetLowerPointer(phNewContext, context);
1500 sspi_SecureHandleSetUpperPointer(phNewContext, KERBEROS_SSP_NAME);
1503 kerberos_ContextFree(context, TRUE);
1511 status = SEC_E_INVALID_TOKEN;
1514 return SEC_E_UNSUPPORTED_FUNCTION;
1519static KRB_CONTEXT* get_context(
PCtxtHandle phContext)
1524 TCHAR* name = sspi_SecureHandleGetUpperPointer(phContext);
1528 if (_tcsncmp(KERBEROS_SSP_NAME, name, ARRAYSIZE(KERBEROS_SSP_NAME)) != 0)
1530 return sspi_SecureHandleGetLowerPointer(phContext);
1533static BOOL copy_krb5_data(krb5_data* data, PUCHAR* ptr, ULONG* psize)
1537 WINPR_ASSERT(psize);
1539 *ptr = (PUCHAR)malloc(data->length);
1543 *psize = data->length;
1544 memcpy(*ptr, data->data, data->length);
1549static SECURITY_STATUS SEC_ENTRY kerberos_DeleteSecurityContext(
PCtxtHandle phContext)
1552 KRB_CONTEXT* context = get_context(phContext);
1554 return SEC_E_INVALID_HANDLE;
1556 kerberos_ContextFree(context, TRUE);
1560 return SEC_E_UNSUPPORTED_FUNCTION;
1566static SECURITY_STATUS krb5_error_to_SECURITY_STATUS(krb5_error_code code)
1573 return SEC_E_INTERNAL_ERROR;
1577static SECURITY_STATUS kerberos_ATTR_SIZES(KRB_CONTEXT* context, KRB_CREDENTIALS* credentials,
1583 krb5glue_key key = NULL;
1585 WINPR_ASSERT(context);
1586 WINPR_ASSERT(context->auth_ctx);
1592 ContextSizes->cbMaxToken = KERBEROS_SecPkgInfoA.cbMaxToken;
1593 ContextSizes->cbMaxSignature = 0;
1594 ContextSizes->cbBlockSize = 1;
1595 ContextSizes->cbSecurityTrailer = 0;
1597 key = get_key(&context->keyset);
1599 if (context->flags & SSPI_GSS_C_CONF_FLAG)
1601 krb5_error_code rv = krb_log_exec(krb5glue_crypto_length, credentials->ctx, key,
1602 KRB5_CRYPTO_TYPE_HEADER, &header);
1604 return krb5_error_to_SECURITY_STATUS(rv);
1606 rv = krb_log_exec(krb5glue_crypto_length, credentials->ctx, key, KRB5_CRYPTO_TYPE_PADDING,
1609 return krb5_error_to_SECURITY_STATUS(rv);
1611 rv = krb_log_exec(krb5glue_crypto_length, credentials->ctx, key, KRB5_CRYPTO_TYPE_TRAILER,
1614 return krb5_error_to_SECURITY_STATUS(rv);
1617 ContextSizes->cbSecurityTrailer = header + pad + trailer + 32;
1620 if (context->flags & SSPI_GSS_C_INTEG_FLAG)
1622 krb5_error_code rv = krb_log_exec(krb5glue_crypto_length, credentials->ctx, key,
1623 KRB5_CRYPTO_TYPE_CHECKSUM, &ContextSizes->cbMaxSignature);
1625 return krb5_error_to_SECURITY_STATUS(rv);
1627 ContextSizes->cbMaxSignature += 16;
1633static SECURITY_STATUS kerberos_ATTR_TICKET_LOGON(KRB_CONTEXT* context,
1634 KRB_CREDENTIALS* credentials,
1637 krb5_creds matchCred = { 0 };
1638 krb5_auth_context authContext = NULL;
1639 krb5_flags getCredsFlags = KRB5_GC_CACHED;
1640 BOOL firstRun = TRUE;
1641 krb5_creds* hostCred = NULL;
1642 SECURITY_STATUS ret = SEC_E_INSUFFICIENT_MEMORY;
1643 int rv = krb_log_exec(krb5_sname_to_principal, credentials->ctx, context->targetHost,
"HOST",
1644 KRB5_NT_SRV_HST, &matchCred.server);
1648 rv = krb_log_exec(krb5_cc_get_principal, credentials->ctx, credentials->ccache,
1655 rv = krb_log_exec(krb5_get_credentials, credentials->ctx, getCredsFlags, credentials->ccache,
1656 &matchCred, &hostCred);
1661 case KRB5_CC_NOTFOUND:
1670 WLog_ERR(TAG,
"krb5_get_credentials(hostCreds), rv=%d", rv);
1674 if (krb_log_exec(krb5_auth_con_init, credentials->ctx, &authContext))
1677 krb5_data derOut = { 0 };
1678 if (krb_log_exec(krb5_fwd_tgt_creds, credentials->ctx, authContext, context->targetHost,
1679 matchCred.client, matchCred.server, credentials->ccache, 1, &derOut))
1681 ret = SEC_E_LOGON_DENIED;
1685 ticketLogon->MessageType = KerbTicketLogon;
1686 ticketLogon->Flags = KERB_LOGON_FLAG_REDIRECTED;
1688 if (!copy_krb5_data(&hostCred->ticket, &ticketLogon->ServiceTicket,
1689 &ticketLogon->ServiceTicketLength))
1691 krb5_free_data(credentials->ctx, &derOut);
1695 ticketLogon->TicketGrantingTicketLength = derOut.length;
1696 ticketLogon->TicketGrantingTicket = (PUCHAR)derOut.data;
1700 krb5_auth_con_free(credentials->ctx, authContext);
1701 krb5_free_creds(credentials->ctx, hostCred);
1702 krb5_free_cred_contents(credentials->ctx, &matchCred);
1708static SECURITY_STATUS SEC_ENTRY kerberos_QueryContextAttributesA(
PCtxtHandle phContext,
1709 ULONG ulAttribute,
void* pBuffer)
1712 return SEC_E_INVALID_HANDLE;
1715 return SEC_E_INVALID_PARAMETER;
1718 KRB_CONTEXT* context = get_context(phContext);
1720 return SEC_E_INVALID_PARAMETER;
1722 KRB_CREDENTIALS* credentials = context->credentials;
1724 switch (ulAttribute)
1726 case SECPKG_ATTR_SIZES:
1729 case SECPKG_CRED_ATTR_TICKET_LOGON:
1730 return kerberos_ATTR_TICKET_LOGON(context, credentials, (
KERB_TICKET_LOGON*)pBuffer);
1733 WLog_ERR(TAG,
"TODO: QueryContextAttributes implement ulAttribute=0x%08" PRIx32,
1735 return SEC_E_UNSUPPORTED_FUNCTION;
1738 return SEC_E_UNSUPPORTED_FUNCTION;
1742static SECURITY_STATUS SEC_ENTRY kerberos_QueryContextAttributesW(
PCtxtHandle phContext,
1743 ULONG ulAttribute,
void* pBuffer)
1745 return kerberos_QueryContextAttributesA(phContext, ulAttribute, pBuffer);
1748static SECURITY_STATUS SEC_ENTRY kerberos_SetContextAttributesW(
1749 WINPR_ATTR_UNUSED
PCtxtHandle phContext, WINPR_ATTR_UNUSED ULONG ulAttribute,
1750 WINPR_ATTR_UNUSED
void* pBuffer, WINPR_ATTR_UNUSED ULONG cbBuffer)
1752 return SEC_E_UNSUPPORTED_FUNCTION;
1755static SECURITY_STATUS SEC_ENTRY kerberos_SetContextAttributesA(
1756 WINPR_ATTR_UNUSED
PCtxtHandle phContext, WINPR_ATTR_UNUSED ULONG ulAttribute,
1757 WINPR_ATTR_UNUSED
void* pBuffer, WINPR_ATTR_UNUSED ULONG cbBuffer)
1759 return SEC_E_UNSUPPORTED_FUNCTION;
1762static SECURITY_STATUS SEC_ENTRY kerberos_SetCredentialsAttributesX(
PCredHandle phCredential,
1764 void* pBuffer, ULONG cbBuffer,
1765 WINPR_ATTR_UNUSED BOOL unicode)
1768 KRB_CREDENTIALS* credentials = NULL;
1771 return SEC_E_INVALID_HANDLE;
1773 credentials = sspi_SecureHandleGetLowerPointer(phCredential);
1776 return SEC_E_INVALID_HANDLE;
1779 return SEC_E_INSUFFICIENT_MEMORY;
1781 switch (ulAttribute)
1783 case SECPKG_CRED_ATTR_KDC_PROXY_SETTINGS:
1789 kdc_settings->Version != KDC_PROXY_SETTINGS_V1 ||
1792 kdc_settings->ProxyServerOffset + kdc_settings->ProxyServerLength)
1793 return SEC_E_INVALID_TOKEN;
1795 if (credentials->kdc_url)
1797 free(credentials->kdc_url);
1798 credentials->kdc_url = NULL;
1801 if (kdc_settings->ProxyServerLength > 0)
1803 WCHAR* proxy = (WCHAR*)((BYTE*)pBuffer + kdc_settings->ProxyServerOffset);
1805 credentials->kdc_url = ConvertWCharNToUtf8Alloc(
1806 proxy, kdc_settings->ProxyServerLength /
sizeof(WCHAR), NULL);
1807 if (!credentials->kdc_url)
1808 return SEC_E_INSUFFICIENT_MEMORY;
1813 case SECPKG_CRED_ATTR_NAMES:
1814 case SECPKG_ATTR_SUPPORTED_ALGS:
1816 WLog_ERR(TAG,
"TODO: SetCredentialsAttributesX implement ulAttribute=0x%08" PRIx32,
1818 return SEC_E_UNSUPPORTED_FUNCTION;
1822 return SEC_E_UNSUPPORTED_FUNCTION;
1826static SECURITY_STATUS SEC_ENTRY kerberos_SetCredentialsAttributesW(
PCredHandle phCredential,
1828 void* pBuffer, ULONG cbBuffer)
1830 return kerberos_SetCredentialsAttributesX(phCredential, ulAttribute, pBuffer, cbBuffer, TRUE);
1833static SECURITY_STATUS SEC_ENTRY kerberos_SetCredentialsAttributesA(
PCredHandle phCredential,
1835 void* pBuffer, ULONG cbBuffer)
1837 return kerberos_SetCredentialsAttributesX(phCredential, ulAttribute, pBuffer, cbBuffer, FALSE);
1840static SECURITY_STATUS SEC_ENTRY kerberos_EncryptMessage(
PCtxtHandle phContext, ULONG fQOP,
1845 KRB_CONTEXT* context = get_context(phContext);
1848 char* header = NULL;
1850 krb5glue_key key = NULL;
1851 krb5_keyusage usage = 0;
1852 krb5_crypto_iov encrypt_iov[] = { { KRB5_CRYPTO_TYPE_HEADER, { 0 } },
1853 { KRB5_CRYPTO_TYPE_DATA, { 0 } },
1854 { KRB5_CRYPTO_TYPE_DATA, { 0 } },
1855 { KRB5_CRYPTO_TYPE_PADDING, { 0 } },
1856 { KRB5_CRYPTO_TYPE_TRAILER, { 0 } } };
1859 return SEC_E_INVALID_HANDLE;
1861 if (!(context->flags & SSPI_GSS_C_CONF_FLAG))
1862 return SEC_E_UNSUPPORTED_FUNCTION;
1864 KRB_CREDENTIALS* creds = context->credentials;
1866 sig_buffer = sspi_FindSecBuffer(pMessage, SECBUFFER_TOKEN);
1867 data_buffer = sspi_FindSecBuffer(pMessage, SECBUFFER_DATA);
1869 if (!sig_buffer || !data_buffer)
1870 return SEC_E_INVALID_TOKEN;
1873 return SEC_E_QOP_NOT_SUPPORTED;
1875 flags |= context->acceptor ? FLAG_SENDER_IS_ACCEPTOR : 0;
1876 flags |= FLAG_WRAP_CONFIDENTIAL;
1878 key = get_key(&context->keyset);
1880 return SEC_E_INTERNAL_ERROR;
1882 flags |= context->keyset.acceptor_key == key ? FLAG_ACCEPTOR_SUBKEY : 0;
1884 usage = context->acceptor ? KG_USAGE_ACCEPTOR_SEAL : KG_USAGE_INITIATOR_SEAL;
1887 encrypt_iov[1].data.length = data_buffer->cbBuffer;
1888 encrypt_iov[2].data.length = 16;
1891 if (krb_log_exec(krb5glue_crypto_length_iov, creds->ctx, key, encrypt_iov,
1892 ARRAYSIZE(encrypt_iov)))
1893 return SEC_E_INTERNAL_ERROR;
1894 if (sig_buffer->cbBuffer <
1895 encrypt_iov[0].data.length + encrypt_iov[3].data.length + encrypt_iov[4].data.length + 32)
1896 return SEC_E_INSUFFICIENT_MEMORY;
1899 header = sig_buffer->pvBuffer;
1900 encrypt_iov[2].data.data = header + 16;
1901 encrypt_iov[3].data.data = encrypt_iov[2].data.data + encrypt_iov[2].data.length;
1902 encrypt_iov[4].data.data = encrypt_iov[3].data.data + encrypt_iov[3].data.length;
1903 encrypt_iov[0].data.data = encrypt_iov[4].data.data + encrypt_iov[4].data.length;
1904 encrypt_iov[1].data.data = data_buffer->pvBuffer;
1907 winpr_Data_Write_UINT16_BE(header, TOK_ID_WRAP);
1908 header[2] = WINPR_ASSERTING_INT_CAST(
char, flags);
1909 header[3] = (char)0xFF;
1910 winpr_Data_Write_UINT32(header + 4, 0);
1911 winpr_Data_Write_UINT64_BE(header + 8, (context->local_seq + MessageSeqNo));
1914 CopyMemory(encrypt_iov[2].data.data, header, 16);
1917 const size_t len = 16 + encrypt_iov[3].data.length + encrypt_iov[4].data.length;
1918 winpr_Data_Write_UINT16_BE(header + 6, WINPR_ASSERTING_INT_CAST(UINT16, len));
1920 if (krb_log_exec(krb5glue_encrypt_iov, creds->ctx, key, usage, encrypt_iov,
1921 ARRAYSIZE(encrypt_iov)))
1922 return SEC_E_INTERNAL_ERROR;
1926 return SEC_E_UNSUPPORTED_FUNCTION;
1930static SECURITY_STATUS SEC_ENTRY kerberos_DecryptMessage(
PCtxtHandle phContext,
1932 ULONG MessageSeqNo, ULONG* pfQOP)
1935 KRB_CONTEXT* context = get_context(phContext);
1938 krb5glue_key key = NULL;
1939 krb5_keyusage usage = 0;
1940 uint16_t tok_id = 0;
1944 uint64_t seq_no = 0;
1945 krb5_crypto_iov iov[] = { { KRB5_CRYPTO_TYPE_HEADER, { 0 } },
1946 { KRB5_CRYPTO_TYPE_DATA, { 0 } },
1947 { KRB5_CRYPTO_TYPE_DATA, { 0 } },
1948 { KRB5_CRYPTO_TYPE_PADDING, { 0 } },
1949 { KRB5_CRYPTO_TYPE_TRAILER, { 0 } } };
1952 return SEC_E_INVALID_HANDLE;
1954 if (!(context->flags & SSPI_GSS_C_CONF_FLAG))
1955 return SEC_E_UNSUPPORTED_FUNCTION;
1957 KRB_CREDENTIALS* creds = context->credentials;
1959 sig_buffer = sspi_FindSecBuffer(pMessage, SECBUFFER_TOKEN);
1960 data_buffer = sspi_FindSecBuffer(pMessage, SECBUFFER_DATA);
1962 if (!sig_buffer || !data_buffer || sig_buffer->cbBuffer < 16)
1963 return SEC_E_INVALID_TOKEN;
1966 BYTE* header = sig_buffer->pvBuffer;
1967 tok_id = winpr_Data_Get_UINT16_BE(header);
1969 ec = winpr_Data_Get_UINT16_BE(&header[4]);
1970 rrc = winpr_Data_Get_UINT16_BE(&header[6]);
1971 seq_no = winpr_Data_Get_UINT64_BE(&header[8]);
1974 if ((tok_id != TOK_ID_WRAP) || (header[3] != 0xFF))
1975 return SEC_E_INVALID_TOKEN;
1977 if ((flags & FLAG_SENDER_IS_ACCEPTOR) == context->acceptor)
1978 return SEC_E_INVALID_TOKEN;
1980 if ((context->flags & ISC_REQ_SEQUENCE_DETECT) &&
1981 (seq_no != context->remote_seq + MessageSeqNo))
1982 return SEC_E_OUT_OF_SEQUENCE;
1984 if (!(flags & FLAG_WRAP_CONFIDENTIAL))
1985 return SEC_E_INVALID_TOKEN;
1989 return SEC_E_INVALID_TOKEN;
1992 key = get_key(&context->keyset);
1993 if (!key || ((flags & FLAG_ACCEPTOR_SUBKEY) && (context->keyset.acceptor_key != key)))
1994 return SEC_E_INTERNAL_ERROR;
1995 usage = context->acceptor ? KG_USAGE_INITIATOR_SEAL : KG_USAGE_ACCEPTOR_SEAL;
1998 iov[1].data.length = data_buffer->cbBuffer;
1999 iov[2].data.length = 16;
2000 if (krb_log_exec(krb5glue_crypto_length_iov, creds->ctx, key, iov, ARRAYSIZE(iov)))
2001 return SEC_E_INTERNAL_ERROR;
2004 if (rrc != 16 + iov[3].data.length + iov[4].data.length)
2005 return SEC_E_INVALID_TOKEN;
2006 if (sig_buffer->cbBuffer != 16 + rrc + iov[0].data.length)
2007 return SEC_E_INVALID_TOKEN;
2010 iov[0].data.data = (
char*)&header[16 + rrc + ec];
2011 iov[1].data.data = data_buffer->pvBuffer;
2012 iov[2].data.data = (
char*)&header[16 + ec];
2013 char* data2 = iov[2].data.data;
2014 iov[3].data.data = &data2[iov[2].data.length];
2016 char* data3 = iov[3].data.data;
2017 iov[4].data.data = &data3[iov[3].data.length];
2019 if (krb_log_exec(krb5glue_decrypt_iov, creds->ctx, key, usage, iov, ARRAYSIZE(iov)))
2020 return SEC_E_INTERNAL_ERROR;
2023 winpr_Data_Write_UINT16_BE(iov[2].data.data + 4, ec);
2024 winpr_Data_Write_UINT16_BE(iov[2].data.data + 6, rrc);
2025 if (memcmp(iov[2].data.data, header, 16) != 0)
2026 return SEC_E_MESSAGE_ALTERED;
2032 return SEC_E_UNSUPPORTED_FUNCTION;
2036static SECURITY_STATUS SEC_ENTRY kerberos_MakeSignature(
PCtxtHandle phContext,
2037 WINPR_ATTR_UNUSED ULONG fQOP,
2041 KRB_CONTEXT* context = get_context(phContext);
2044 krb5glue_key key = NULL;
2045 krb5_keyusage usage = 0;
2047 krb5_crypto_iov iov[] = { { KRB5_CRYPTO_TYPE_DATA, { 0 } },
2048 { KRB5_CRYPTO_TYPE_DATA, { 0 } },
2049 { KRB5_CRYPTO_TYPE_CHECKSUM, { 0 } } };
2052 return SEC_E_INVALID_HANDLE;
2054 if (!(context->flags & SSPI_GSS_C_INTEG_FLAG))
2055 return SEC_E_UNSUPPORTED_FUNCTION;
2057 KRB_CREDENTIALS* creds = context->credentials;
2059 sig_buffer = sspi_FindSecBuffer(pMessage, SECBUFFER_TOKEN);
2060 data_buffer = sspi_FindSecBuffer(pMessage, SECBUFFER_DATA);
2062 if (!sig_buffer || !data_buffer)
2063 return SEC_E_INVALID_TOKEN;
2065 flags |= context->acceptor ? FLAG_SENDER_IS_ACCEPTOR : 0;
2067 key = get_key(&context->keyset);
2069 return SEC_E_INTERNAL_ERROR;
2070 usage = context->acceptor ? KG_USAGE_ACCEPTOR_SIGN : KG_USAGE_INITIATOR_SIGN;
2072 flags |= context->keyset.acceptor_key == key ? FLAG_ACCEPTOR_SUBKEY : 0;
2075 iov[0].data.length = data_buffer->cbBuffer;
2076 iov[1].data.length = 16;
2077 if (krb_log_exec(krb5glue_crypto_length_iov, creds->ctx, key, iov, ARRAYSIZE(iov)))
2078 return SEC_E_INTERNAL_ERROR;
2081 if (sig_buffer->cbBuffer < iov[2].data.length + 16)
2082 return SEC_E_INSUFFICIENT_MEMORY;
2085 char* header = sig_buffer->pvBuffer;
2086 winpr_Data_Write_UINT16_BE(header, TOK_ID_MIC);
2087 header[2] = WINPR_ASSERTING_INT_CAST(
char, flags);
2088 memset(header + 3, 0xFF, 5);
2089 winpr_Data_Write_UINT64_BE(header + 8, (context->local_seq + MessageSeqNo));
2092 iov[0].data.data = data_buffer->pvBuffer;
2093 iov[1].data.data = header;
2094 iov[2].data.data = header + 16;
2096 if (krb_log_exec(krb5glue_make_checksum_iov, creds->ctx, key, usage, iov, ARRAYSIZE(iov)))
2097 return SEC_E_INTERNAL_ERROR;
2099 sig_buffer->cbBuffer = iov[2].data.length + 16;
2103 return SEC_E_UNSUPPORTED_FUNCTION;
2107static SECURITY_STATUS SEC_ENTRY kerberos_VerifySignature(
PCtxtHandle phContext,
2110 WINPR_ATTR_UNUSED ULONG* pfQOP)
2115 krb5glue_key key = NULL;
2116 krb5_keyusage usage = 0;
2118 uint16_t tok_id = 0;
2119 uint64_t seq_no = 0;
2120 krb5_boolean is_valid = 0;
2121 krb5_crypto_iov iov[] = { { KRB5_CRYPTO_TYPE_DATA, { 0 } },
2122 { KRB5_CRYPTO_TYPE_DATA, { 0 } },
2123 { KRB5_CRYPTO_TYPE_CHECKSUM, { 0 } } };
2124 BYTE cmp_filler[] = { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF };
2126 KRB_CONTEXT* context = get_context(phContext);
2128 return SEC_E_INVALID_HANDLE;
2130 if (!(context->flags & SSPI_GSS_C_INTEG_FLAG))
2131 return SEC_E_UNSUPPORTED_FUNCTION;
2133 sig_buffer = sspi_FindSecBuffer(pMessage, SECBUFFER_TOKEN);
2134 data_buffer = sspi_FindSecBuffer(pMessage, SECBUFFER_DATA);
2136 if (!sig_buffer || !data_buffer || sig_buffer->cbBuffer < 16)
2137 return SEC_E_INVALID_TOKEN;
2140 BYTE* header = sig_buffer->pvBuffer;
2141 tok_id = winpr_Data_Get_UINT16_BE(header);
2143 seq_no = winpr_Data_Get_UINT64_BE((header + 8));
2146 if (tok_id != TOK_ID_MIC)
2147 return SEC_E_INVALID_TOKEN;
2149 if ((flags & FLAG_SENDER_IS_ACCEPTOR) == context->acceptor || flags & FLAG_WRAP_CONFIDENTIAL)
2150 return SEC_E_INVALID_TOKEN;
2152 if (memcmp(header + 3, cmp_filler,
sizeof(cmp_filler)) != 0)
2153 return SEC_E_INVALID_TOKEN;
2155 if (context->flags & ISC_REQ_SEQUENCE_DETECT && seq_no != context->remote_seq + MessageSeqNo)
2156 return SEC_E_OUT_OF_SEQUENCE;
2159 key = get_key(&context->keyset);
2160 if (!key || (flags & FLAG_ACCEPTOR_SUBKEY && context->keyset.acceptor_key != key))
2161 return SEC_E_INTERNAL_ERROR;
2162 usage = context->acceptor ? KG_USAGE_INITIATOR_SIGN : KG_USAGE_ACCEPTOR_SIGN;
2165 KRB_CREDENTIALS* creds = context->credentials;
2166 iov[0].data.length = data_buffer->cbBuffer;
2167 iov[1].data.length = 16;
2168 if (krb_log_exec(krb5glue_crypto_length_iov, creds->ctx, key, iov, ARRAYSIZE(iov)))
2169 return SEC_E_INTERNAL_ERROR;
2171 if (sig_buffer->cbBuffer != iov[2].data.length + 16)
2172 return SEC_E_INTERNAL_ERROR;
2175 iov[0].data.data = data_buffer->pvBuffer;
2176 iov[1].data.data = (
char*)header;
2177 iov[2].data.data = (
char*)&header[16];
2179 if (krb_log_exec(krb5glue_verify_checksum_iov, creds->ctx, key, usage, iov, ARRAYSIZE(iov),
2181 return SEC_E_INTERNAL_ERROR;
2184 return SEC_E_MESSAGE_ALTERED;
2188 return SEC_E_UNSUPPORTED_FUNCTION;
2195 kerberos_QueryCredentialsAttributesA,
2196 kerberos_AcquireCredentialsHandleA,
2197 kerberos_FreeCredentialsHandle,
2199 kerberos_InitializeSecurityContextA,
2200 kerberos_AcceptSecurityContext,
2202 kerberos_DeleteSecurityContext,
2204 kerberos_QueryContextAttributesA,
2207 kerberos_MakeSignature,
2208 kerberos_VerifySignature,
2218 kerberos_EncryptMessage,
2219 kerberos_DecryptMessage,
2220 kerberos_SetContextAttributesA,
2221 kerberos_SetCredentialsAttributesA,
2227 kerberos_QueryCredentialsAttributesW,
2228 kerberos_AcquireCredentialsHandleW,
2229 kerberos_FreeCredentialsHandle,
2231 kerberos_InitializeSecurityContextW,
2232 kerberos_AcceptSecurityContext,
2234 kerberos_DeleteSecurityContext,
2236 kerberos_QueryContextAttributesW,
2239 kerberos_MakeSignature,
2240 kerberos_VerifySignature,
2250 kerberos_EncryptMessage,
2251 kerberos_DecryptMessage,
2252 kerberos_SetContextAttributesW,
2253 kerberos_SetCredentialsAttributesW,
2256BOOL KERBEROS_init(
void)
2258 InitializeConstWCharFromUtf8(KERBEROS_SecPkgInfoA.Name, KERBEROS_SecPkgInfoW_NameBuffer,
2259 ARRAYSIZE(KERBEROS_SecPkgInfoW_NameBuffer));
2260 InitializeConstWCharFromUtf8(KERBEROS_SecPkgInfoA.Comment, KERBEROS_SecPkgInfoW_CommentBuffer,
2261 ARRAYSIZE(KERBEROS_SecPkgInfoW_CommentBuffer));