22#include <winpr/config.h>
31#include <winpr/assert.h>
32#include <winpr/cast.h>
33#include <winpr/asn1.h>
35#include <winpr/interlocked.h>
36#include <winpr/sspi.h>
37#include <winpr/print.h>
38#include <winpr/tchar.h>
39#include <winpr/sysinfo.h>
40#include <winpr/registry.h>
41#include <winpr/endian.h>
42#include <winpr/crypto.h>
43#include <winpr/path.h>
44#include <winpr/wtypes.h>
45#include <winpr/winsock.h>
46#include <winpr/schannel.h>
47#include <winpr/secapi.h>
56#ifdef WITH_KRB5_HEIMDAL
58#include <krb5-protos.h>
63#define TAG WINPR_TAG("sspi.Kerberos")
74 "Kerberos Security Package"
77static WCHAR KERBEROS_SecPkgInfoW_NameBuffer[32] = { 0 };
78static WCHAR KERBEROS_SecPkgInfoW_CommentBuffer[32] = { 0 };
85 KERBEROS_SecPkgInfoW_NameBuffer,
86 KERBEROS_SecPkgInfoW_CommentBuffer
93 KERBEROS_STATE_INITIAL,
94 KERBEROS_STATE_TGT_REQ,
95 KERBEROS_STATE_TGT_REP,
96 KERBEROS_STATE_AP_REQ,
97 KERBEROS_STATE_AP_REP,
101typedef struct KRB_CREDENTIALS_st
103 volatile LONG refCount;
108 krb5_keytab client_keytab;
114 enum KERBEROS_STATE state;
115 KRB_CREDENTIALS* credentials;
116 krb5_auth_context auth_ctx;
126static const WinPrAsn1_OID kerberos_OID = { 9, (
void*)
"\x2a\x86\x48\x86\xf7\x12\x01\x02\x02" };
128 (
void*)
"\x2a\x86\x48\x86\xf7\x12\x01\x02\x02\x03" };
130#define krb_log_exec(fkt, ctx, ...) \
131 kerberos_log_msg(ctx, fkt(ctx, ##__VA_ARGS__), #fkt, __FILE__, __func__, __LINE__)
132#define krb_log_exec_ptr(fkt, ctx, ...) \
133 kerberos_log_msg(*ctx, fkt(ctx, ##__VA_ARGS__), #fkt, __FILE__, __func__, __LINE__)
134static krb5_error_code kerberos_log_msg(krb5_context ctx, krb5_error_code code,
const char* what,
135 const char* file,
const char* fkt,
size_t line)
144 const DWORD level = WLOG_ERROR;
146 wLog* log = WLog_Get(TAG);
147 if (WLog_IsLevelActive(log, level))
149 const char* msg = krb5_get_error_message(ctx, code);
150 WLog_PrintTextMessage(log, level, line, file, fkt,
"%s (%s [%d])", what, msg, code);
151 krb5_free_error_message(ctx, msg);
159static void credentials_unref(KRB_CREDENTIALS* credentials);
161static void kerberos_ContextFree(KRB_CONTEXT* ctx, BOOL allocated)
166 free(ctx->targetHost);
167 ctx->targetHost = NULL;
169 if (ctx->credentials)
171 krb5_context krbctx = ctx->credentials->ctx;
175 krb5_auth_con_free(krbctx, ctx->auth_ctx);
177 krb5glue_keys_free(krbctx, &ctx->keyset);
180 credentials_unref(ctx->credentials);
187static KRB_CONTEXT* kerberos_ContextNew(KRB_CREDENTIALS* credentials)
189 KRB_CONTEXT* context = NULL;
191 context = (KRB_CONTEXT*)calloc(1,
sizeof(KRB_CONTEXT));
195 context->credentials = credentials;
196 InterlockedIncrement(&credentials->refCount);
200static krb5_error_code krb5_prompter(krb5_context context,
void* data,
201 WINPR_ATTR_UNUSED
const char* name,
202 WINPR_ATTR_UNUSED
const char* banner,
int num_prompts,
203 krb5_prompt prompts[])
205 for (
int i = 0; i < num_prompts; i++)
207 krb5_prompt_type type = krb5glue_get_prompt_type(context, prompts, i);
208 if (type && (type == KRB5_PROMPT_TYPE_PREAUTH || type == KRB5_PROMPT_TYPE_PASSWORD) && data)
210 prompts[i].reply->data = _strdup((
const char*)data);
212 const size_t len = strlen((
const char*)data);
213 if (len > UINT32_MAX)
214 return KRB5KRB_ERR_GENERIC;
215 prompts[i].reply->length = (UINT32)len;
223 return keyset->acceptor_key ? keyset->acceptor_key
224 : keyset->initiator_key ? keyset->initiator_key
225 : keyset->session_key;
228static BOOL isValidIPv4(
const char* ipAddress)
230 struct sockaddr_in sa = { 0 };
231 int result = inet_pton(AF_INET, ipAddress, &(sa.sin_addr));
235static BOOL isValidIPv6(
const char* ipAddress)
237 struct sockaddr_in6 sa = { 0 };
238 int result = inet_pton(AF_INET6, ipAddress, &(sa.sin6_addr));
242static BOOL isValidIP(
const char* ipAddress)
244 return isValidIPv4(ipAddress) || isValidIPv6(ipAddress);
247#if defined(WITH_KRB5_MIT)
248WINPR_ATTR_MALLOC(free, 1)
249static
char* get_realm_name(krb5_data realm,
size_t* plen)
253 if ((realm.length <= 0) || (!realm.data))
257 (void)winpr_asprintf(&name, plen,
"krbtgt/%*s@%*s", realm.length, realm.data, realm.length,
261#elif defined(WITH_KRB5_HEIMDAL)
262WINPR_ATTR_MALLOC(free, 1)
263static
char* get_realm_name(Realm realm,
size_t* plen)
271 (void)winpr_asprintf(&name, plen,
"krbtgt/%s@%s", realm, realm);
276static int build_krbtgt(krb5_context ctx, krb5_principal principal, krb5_principal* ptarget)
280 krb5_error_code rv = KRB5_CC_NOMEM;
282 char* name = get_realm_name(principal->realm, &len);
283 if (!name || (len == 0))
287 krb5_principal target = { 0 };
288 rv = krb5_parse_name(ctx, name, &target);
298static SECURITY_STATUS SEC_ENTRY kerberos_AcquireCredentialsHandleA(
299 SEC_CHAR* pszPrincipal, WINPR_ATTR_UNUSED SEC_CHAR* pszPackage, ULONG fCredentialUse,
300 WINPR_ATTR_UNUSED
void* pvLogonID,
void* pAuthData, WINPR_ATTR_UNUSED SEC_GET_KEY_FN pGetKeyFn,
301 WINPR_ATTR_UNUSED
void* pvGetKeyArgument,
PCredHandle phCredential,
306 KRB_CREDENTIALS* credentials = NULL;
307 krb5_context ctx = NULL;
308 krb5_ccache ccache = NULL;
309 krb5_keytab keytab = NULL;
310 krb5_principal principal = NULL;
312 char* username = NULL;
313 char* password = NULL;
314 BOOL own_ccache = FALSE;
315 const char*
const default_ccache_type =
"MEMORY";
319 UINT32 identityFlags = sspi_GetAuthIdentityFlags(pAuthData);
321 if (identityFlags & SEC_WINNT_AUTH_IDENTITY_EXTENDED)
327 WLog_ERR(TAG,
"Failed to copy auth identity fields");
332 pszPrincipal = username;
335 if (krb_log_exec_ptr(krb5_init_context, &ctx))
340 char* udomain = _strdup(domain);
346 krb5_error_code rv = krb_log_exec(krb5_set_default_realm, ctx, udomain);
355 char* cpszPrincipal = _strdup(pszPrincipal);
360 char* p = strchr(cpszPrincipal,
'@');
364 krb5_error_code rv = krb_log_exec(krb5_parse_name, ctx, cpszPrincipal, &principal);
369 WINPR_ASSERT(principal);
372 if (krb_settings && krb_settings->cache)
374 if ((krb_log_exec(krb5_cc_set_default_name, ctx, krb_settings->cache)))
383 if (krb5_cc_cache_match(ctx, principal, &ccache) == KRB5_CC_NOTFOUND)
387 if (krb_log_exec(krb5_cc_new_unique, ctx, default_ccache_type, 0, &ccache))
392 if (krb_log_exec(krb5_cc_resolve, ctx, krb_settings->cache, &ccache))
396 if (krb_log_exec(krb5_cc_initialize, ctx, ccache, principal))
401 if (krb_log_exec(krb5_cc_default, ctx, &ccache))
405 WINPR_ASSERT(ccache);
407 else if (fCredentialUse & SECPKG_CRED_OUTBOUND)
410 if (krb_log_exec(krb5_cc_default, ctx, &ccache))
412 if (krb_log_exec(krb5_cc_get_principal, ctx, ccache, &principal))
414 WINPR_ASSERT(ccache);
421 if (krb_log_exec(krb5_cc_new_unique, ctx, default_ccache_type, 0, &ccache))
426 if (krb_log_exec(krb5_cc_resolve, ctx, krb_settings->cache, &ccache))
429 WINPR_ASSERT(ccache);
432 if (krb_settings && krb_settings->keytab)
434 if (krb_log_exec(krb5_kt_resolve, ctx, krb_settings->keytab, &keytab))
439 if (fCredentialUse & SECPKG_CRED_INBOUND)
440 if (krb_log_exec(krb5_kt_default, ctx, &keytab))
445 if (fCredentialUse & SECPKG_CRED_OUTBOUND)
447 krb5_creds creds = { 0 };
448 krb5_creds matchCreds = { 0 };
449 krb5_flags matchFlags = KRB5_TC_MATCH_TIMES;
451 krb5_timeofday(ctx, &matchCreds.times.endtime);
452 matchCreds.times.endtime += 60;
453 matchCreds.client = principal;
455 WINPR_ASSERT(principal);
457 WINPR_ASSERT(ccache);
458 if (krb_log_exec(build_krbtgt, ctx, principal, &matchCreds.server))
461 int rv = krb5_cc_retrieve_cred(ctx, ccache, matchFlags, &matchCreds, &creds);
462 krb5_free_principal(ctx, matchCreds.server);
463 krb5_free_cred_contents(ctx, &creds);
466 if (krb_log_exec(krb5glue_get_init_creds, ctx, principal, ccache, krb5_prompter,
467 password, krb_settings))
472 credentials = calloc(1,
sizeof(KRB_CREDENTIALS));
475 credentials->refCount = 1;
476 credentials->ctx = ctx;
477 credentials->ccache = ccache;
478 credentials->keytab = keytab;
479 credentials->own_ccache = own_ccache;
488 krb5_free_principal(ctx, principal);
496 krb5_cc_destroy(ctx, ccache);
498 krb5_cc_close(ctx, ccache);
501 krb5_kt_close(ctx, keytab);
503 krb5_free_context(ctx);
510 sspi_SecureHandleSetLowerPointer(phCredential, (
void*)credentials);
511 sspi_SecureHandleSetUpperPointer(phCredential, (
void*)KERBEROS_SSP_NAME);
515 return SEC_E_NO_CREDENTIALS;
517 return SEC_E_UNSUPPORTED_FUNCTION;
521static SECURITY_STATUS SEC_ENTRY kerberos_AcquireCredentialsHandleW(
522 SEC_WCHAR* pszPrincipal, SEC_WCHAR* pszPackage, ULONG fCredentialUse,
void* pvLogonID,
523 void* pAuthData, SEC_GET_KEY_FN pGetKeyFn,
void* pvGetKeyArgument,
PCredHandle phCredential,
526 SECURITY_STATUS status = SEC_E_INSUFFICIENT_MEMORY;
527 char* principal = NULL;
528 char*
package = NULL;
532 principal = ConvertWCharToUtf8Alloc(pszPrincipal, NULL);
538 package = ConvertWCharToUtf8Alloc(pszPackage, NULL);
544 kerberos_AcquireCredentialsHandleA(principal, package, fCredentialUse, pvLogonID, pAuthData,
545 pGetKeyFn, pvGetKeyArgument, phCredential, ptsExpiry);
555static void credentials_unref(KRB_CREDENTIALS* credentials)
557 WINPR_ASSERT(credentials);
559 if (InterlockedDecrement(&credentials->refCount))
562 free(credentials->kdc_url);
564 if (credentials->ccache)
566 if (credentials->own_ccache)
567 krb5_cc_destroy(credentials->ctx, credentials->ccache);
569 krb5_cc_close(credentials->ctx, credentials->ccache);
571 if (credentials->keytab)
572 krb5_kt_close(credentials->ctx, credentials->keytab);
574 krb5_free_context(credentials->ctx);
579static SECURITY_STATUS SEC_ENTRY kerberos_FreeCredentialsHandle(
PCredHandle phCredential)
582 KRB_CREDENTIALS* credentials = sspi_SecureHandleGetLowerPointer(phCredential);
584 return SEC_E_INVALID_HANDLE;
586 credentials_unref(credentials);
588 sspi_SecureHandleInvalidate(phCredential);
591 return SEC_E_UNSUPPORTED_FUNCTION;
595static SECURITY_STATUS SEC_ENTRY kerberos_QueryCredentialsAttributesW(
596 WINPR_ATTR_UNUSED
PCredHandle phCredential, ULONG ulAttribute, WINPR_ATTR_UNUSED
void* pBuffer)
601 case SECPKG_CRED_ATTR_NAMES:
604 WLog_ERR(TAG,
"TODO: QueryCredentialsAttributesW, implement ulAttribute=%08" PRIx32,
606 return SEC_E_UNSUPPORTED_FUNCTION;
610 return SEC_E_UNSUPPORTED_FUNCTION;
614static SECURITY_STATUS SEC_ENTRY kerberos_QueryCredentialsAttributesA(
PCredHandle phCredential,
618 return kerberos_QueryCredentialsAttributesW(phCredential, ulAttribute, pBuffer);
623static BOOL kerberos_mk_tgt_token(
SecBuffer* buf,
int msg_type,
char* sname,
char* host,
624 const krb5_data* ticket)
626 WinPrAsn1Encoder* enc = NULL;
635 if (msg_type != KRB_TGT_REQ && msg_type != KRB_TGT_REP)
637 if (msg_type == KRB_TGT_REP && !ticket)
640 enc = WinPrAsn1Encoder_New(WINPR_ASN1_DER);
645 if (!WinPrAsn1EncSeqContainer(enc))
649 if (!WinPrAsn1EncContextualInteger(enc, 0, 5))
653 if (!WinPrAsn1EncContextualInteger(enc, 1, msg_type))
656 if (msg_type == KRB_TGT_REQ && sname)
659 if (!WinPrAsn1EncContextualSeqContainer(enc, 2))
663 if (!WinPrAsn1EncContextualInteger(enc, 0, KRB5_NT_SRV_HST))
667 if (!WinPrAsn1EncContextualSeqContainer(enc, 1))
670 if (!WinPrAsn1EncGeneralString(enc, sname))
673 if (host && !WinPrAsn1EncGeneralString(enc, host))
676 if (!WinPrAsn1EncEndContainer(enc) || !WinPrAsn1EncEndContainer(enc))
679 else if (msg_type == KRB_TGT_REP)
682 data.data = (BYTE*)ticket->data;
683 data.len = ticket->length;
684 if (!WinPrAsn1EncContextualRawContent(enc, 2, &data))
688 if (!WinPrAsn1EncEndContainer(enc))
691 if (!WinPrAsn1EncStreamSize(enc, &len) || len > buf->cbBuffer)
694 Stream_StaticInit(&s, buf->pvBuffer, len);
695 if (!WinPrAsn1EncToStream(enc, &s))
698 token.data = buf->pvBuffer;
699 token.length = (UINT)len;
700 if (sspi_gss_wrap_token(buf, &kerberos_u2u_OID,
701 msg_type == KRB_TGT_REQ ? TOK_ID_TGT_REQ : TOK_ID_TGT_REP, &token))
705 WinPrAsn1Encoder_Free(&enc);
709static BOOL append(
char* dst,
size_t dstSize,
const char* src)
711 const size_t dlen = strnlen(dst, dstSize);
712 const size_t slen = strlen(src);
713 if (dlen + slen >= dstSize)
715 if (!strncat(dst, src, dstSize - dlen))
720static BOOL kerberos_rd_tgt_req_tag2(
WinPrAsn1Decoder* dec,
char* buf,
size_t len)
726 if (!WinPrAsn1DecReadSequence(dec, &seq))
733 WinPrAsn1_INTEGER val = 0;
734 if (!WinPrAsn1DecReadContextualInteger(&seq, 0, &error, &val))
739 if (!WinPrAsn1DecReadContextualSequence(&seq, 1, &error, dec))
744 WinPrAsn1_tag tag = 0;
746 while (WinPrAsn1DecPeekTag(dec, &tag))
748 BOOL success = FALSE;
750 if (!WinPrAsn1DecReadGeneralString(dec, &lstr))
755 if (!append(buf, len,
"/"))
760 if (!append(buf, len, lstr))
776static BOOL kerberos_rd_tgt_req_tag3(
WinPrAsn1Decoder* dec,
char* buf,
size_t len)
780 WinPrAsn1_STRING str = NULL;
781 if (!WinPrAsn1DecReadGeneralString(dec, &str))
784 if (!append(buf, len,
"@"))
786 if (!append(buf, len, str))
803 wStream s = WinPrAsn1DecGetStream(dec);
804 const size_t len = Stream_Length(&s);
809 WinPrAsn1_tagId tag = 0;
810 if (WinPrAsn1DecReadContextualTag(dec, &tag, &dec2) == 0)
813 char* buf = calloc(len + 1,
sizeof(
char));
821 BOOL checkForTag3 = TRUE;
824 rc = kerberos_rd_tgt_req_tag2(&dec2, buf, len);
827 const size_t res = WinPrAsn1DecReadContextualTag(dec, &tag, dec);
829 checkForTag3 = FALSE;
836 rc = kerberos_rd_tgt_req_tag3(&dec2, buf, len);
855 WinPrAsn1_tagId tag = 0;
856 if (WinPrAsn1DecReadContextualTag(dec, &tag, &asnTicket) == 0)
862 wStream s = WinPrAsn1DecGetStream(&asnTicket);
863 ticket->data = Stream_BufferAs(&s,
char);
865 const size_t len = Stream_Length(&s);
866 if (len > UINT32_MAX)
868 ticket->length = (UINT32)len;
872static BOOL kerberos_rd_tgt_token(
const sspi_gss_data* token,
char** target, krb5_data* ticket)
875 WinPrAsn1_INTEGER val = 0;
883 WinPrAsn1Decoder_InitMem(&der, WINPR_ASN1_DER, (BYTE*)token->data, token->length);
887 if (!WinPrAsn1DecReadSequence(&der, &seq))
891 if (!WinPrAsn1DecReadContextualInteger(&seq, 0, &error, &val) || val != 5)
895 if (!WinPrAsn1DecReadContextualInteger(&seq, 1, &error, &val))
901 return kerberos_rd_tgt_req(&seq, target);
903 return kerberos_rd_tgt_rep(&seq, ticket);
912static BOOL kerberos_hash_channel_bindings(WINPR_DIGEST_CTX* md5,
SEC_CHANNEL_BINDINGS* bindings)
916 winpr_Data_Write_UINT32(buf, bindings->dwInitiatorAddrType);
917 if (!winpr_Digest_Update(md5, buf, 4))
920 winpr_Data_Write_UINT32(buf, bindings->cbInitiatorLength);
921 if (!winpr_Digest_Update(md5, buf, 4))
924 if (bindings->cbInitiatorLength &&
925 !winpr_Digest_Update(md5, (BYTE*)bindings + bindings->dwInitiatorOffset,
926 bindings->cbInitiatorLength))
929 winpr_Data_Write_UINT32(buf, bindings->dwAcceptorAddrType);
930 if (!winpr_Digest_Update(md5, buf, 4))
933 winpr_Data_Write_UINT32(buf, bindings->cbAcceptorLength);
934 if (!winpr_Digest_Update(md5, buf, 4))
937 if (bindings->cbAcceptorLength &&
938 !winpr_Digest_Update(md5, (BYTE*)bindings + bindings->dwAcceptorOffset,
939 bindings->cbAcceptorLength))
942 winpr_Data_Write_UINT32(buf, bindings->cbApplicationDataLength);
943 if (!winpr_Digest_Update(md5, buf, 4))
946 if (bindings->cbApplicationDataLength &&
947 !winpr_Digest_Update(md5, (BYTE*)bindings + bindings->dwApplicationDataOffset,
948 bindings->cbApplicationDataLength))
954static SECURITY_STATUS SEC_ENTRY kerberos_InitializeSecurityContextA(
956 WINPR_ATTR_UNUSED ULONG Reserved1, WINPR_ATTR_UNUSED ULONG TargetDataRep,
PSecBufferDesc pInput,
958 WINPR_ATTR_UNUSED ULONG* pfContextAttr, WINPR_ATTR_UNUSED
PTimeStamp ptsExpiry)
964 WINPR_DIGEST_CTX* md5 = NULL;
968 krb5_data input_token = { 0 };
969 krb5_data output_token = { 0 };
970 SECURITY_STATUS status = SEC_E_INTERNAL_ERROR;
973 krb5_ap_rep_enc_part* reply = NULL;
974 krb5_flags ap_flags = AP_OPTS_USE_SUBKEY;
975 char cksum_contents[24] = { 0 };
976 krb5_data cksum = { 0 };
977 krb5_creds in_creds = { 0 };
978 krb5_creds* creds = NULL;
979 BOOL isNewContext = FALSE;
980 KRB_CONTEXT* context = NULL;
981 KRB_CREDENTIALS* credentials = sspi_SecureHandleGetLowerPointer(phCredential);
984 if (phContext && !phContext->dwLower && !phContext->dwUpper)
985 return SEC_E_INVALID_HANDLE;
987 context = sspi_SecureHandleGetLowerPointer(phContext);
990 return SEC_E_NO_CREDENTIALS;
994 input_buffer = sspi_FindSecBuffer(pInput, SECBUFFER_TOKEN);
995 bindings_buffer = sspi_FindSecBuffer(pInput, SECBUFFER_CHANNEL_BINDINGS);
998 output_buffer = sspi_FindSecBuffer(pOutput, SECBUFFER_TOKEN);
1000 if (fContextReq & ISC_REQ_MUTUAL_AUTH)
1001 ap_flags |= AP_OPTS_MUTUAL_REQUIRED;
1003 if (fContextReq & ISC_REQ_USE_SESSION_KEY)
1004 ap_flags |= AP_OPTS_USE_SESSION_KEY;
1009 target = _strdup(pszTargetName);
1012 status = SEC_E_INSUFFICIENT_MEMORY;
1015 host = strchr(target,
'/');
1023 if (isValidIP(host))
1025 status = SEC_E_NO_CREDENTIALS;
1032 context = kerberos_ContextNew(credentials);
1035 status = SEC_E_INSUFFICIENT_MEMORY;
1039 isNewContext = TRUE;
1042 context->targetHost = _strdup(host);
1043 if (!context->targetHost)
1045 status = SEC_E_INSUFFICIENT_MEMORY;
1049 if (fContextReq & ISC_REQ_USE_SESSION_KEY)
1051 context->state = KERBEROS_STATE_TGT_REQ;
1052 context->u2u = TRUE;
1055 context->state = KERBEROS_STATE_AP_REQ;
1059 if (!input_buffer || !sspi_gss_unwrap_token(input_buffer, &oid, &tok_id, &input_token))
1061 if ((context->u2u && !sspi_gss_oid_compare(&oid, &kerberos_u2u_OID)) ||
1062 (!context->u2u && !sspi_gss_oid_compare(&oid, &kerberos_OID)))
1067 context->flags |= (fContextReq & 0x1F);
1068 if ((fContextReq & ISC_REQ_INTEGRITY) && !(fContextReq & ISC_REQ_NO_INTEGRITY))
1069 context->flags |= SSPI_GSS_C_INTEG_FLAG;
1071 switch (context->state)
1073 case KERBEROS_STATE_TGT_REQ:
1075 if (!kerberos_mk_tgt_token(output_buffer, KRB_TGT_REQ, sname, host, NULL))
1078 context->state = KERBEROS_STATE_TGT_REP;
1079 status = SEC_I_CONTINUE_NEEDED;
1082 case KERBEROS_STATE_TGT_REP:
1084 if (tok_id != TOK_ID_TGT_REP)
1087 if (!kerberos_rd_tgt_token(&input_token, NULL, &in_creds.second_ticket))
1094 case KERBEROS_STATE_AP_REQ:
1097 if (krb_log_exec(krb5_auth_con_init, credentials->ctx, &context->auth_ctx))
1099 if (krb_log_exec(krb5_auth_con_setflags, credentials->ctx, context->auth_ctx,
1100 KRB5_AUTH_CONTEXT_DO_SEQUENCE | KRB5_AUTH_CONTEXT_USE_SUBKEY))
1102 if (krb_log_exec(krb5glue_auth_con_set_cksumtype, credentials->ctx, context->auth_ctx,
1107 if (krb_log_exec(krb5_sname_to_principal, credentials->ctx, host, sname,
1108 KRB5_NT_SRV_HST, &in_creds.server))
1111 if (krb_log_exec(krb5_cc_get_principal, credentials->ctx, credentials->ccache,
1114 status = SEC_E_WRONG_PRINCIPAL;
1118 if (krb_log_exec(krb5_get_credentials, credentials->ctx,
1119 context->u2u ? KRB5_GC_USER_USER : 0, credentials->ccache, &in_creds,
1122 status = SEC_E_NO_CREDENTIALS;
1127 cksum.data = cksum_contents;
1128 cksum.length =
sizeof(cksum_contents);
1129 winpr_Data_Write_UINT32(cksum_contents, 16);
1130 winpr_Data_Write_UINT32((cksum_contents + 20), context->flags);
1132 if (bindings_buffer)
1138 (bindings->cbInitiatorLength + bindings->dwInitiatorOffset) >
1139 bindings_buffer->cbBuffer ||
1140 (bindings->cbAcceptorLength + bindings->dwAcceptorOffset) >
1141 bindings_buffer->cbBuffer ||
1142 (bindings->cbApplicationDataLength + bindings->dwApplicationDataOffset) >
1143 bindings_buffer->cbBuffer)
1145 status = SEC_E_BAD_BINDINGS;
1149 md5 = winpr_Digest_New();
1153 if (!winpr_Digest_Init(md5, WINPR_MD_MD5))
1156 if (!kerberos_hash_channel_bindings(md5, bindings))
1159 if (!winpr_Digest_Final(md5, (BYTE*)cksum_contents + 4, 16))
1164 if (krb_log_exec(krb5_mk_req_extended, credentials->ctx, &context->auth_ctx, ap_flags,
1165 &cksum, creds, &output_token))
1168 if (!sspi_gss_wrap_token(output_buffer,
1169 context->u2u ? &kerberos_u2u_OID : &kerberos_OID,
1170 TOK_ID_AP_REQ, &output_token))
1173 if (context->flags & SSPI_GSS_C_SEQUENCE_FLAG)
1175 if (krb_log_exec(krb5_auth_con_getlocalseqnumber, credentials->ctx,
1176 context->auth_ctx, (INT32*)&context->local_seq))
1178 context->remote_seq ^= context->local_seq;
1181 if (krb_log_exec(krb5glue_update_keyset, credentials->ctx, context->auth_ctx, FALSE,
1185 context->state = KERBEROS_STATE_AP_REP;
1187 if (context->flags & SSPI_GSS_C_MUTUAL_FLAG)
1188 status = SEC_I_CONTINUE_NEEDED;
1193 case KERBEROS_STATE_AP_REP:
1195 if (tok_id == TOK_ID_AP_REP)
1197 if (krb_log_exec(krb5_rd_rep, credentials->ctx, context->auth_ctx, &input_token,
1200 krb5_free_ap_rep_enc_part(credentials->ctx, reply);
1202 else if (tok_id == TOK_ID_ERROR)
1204 krb5glue_log_error(credentials->ctx, &input_token, TAG);
1210 if (context->flags & SSPI_GSS_C_SEQUENCE_FLAG)
1212 if (krb_log_exec(krb5_auth_con_getremoteseqnumber, credentials->ctx,
1213 context->auth_ctx, (INT32*)&context->remote_seq))
1217 if (krb_log_exec(krb5glue_update_keyset, credentials->ctx, context->auth_ctx, FALSE,
1221 context->state = KERBEROS_STATE_FINAL;
1224 output_buffer->cbBuffer = 0;
1228 case KERBEROS_STATE_FINAL:
1230 WLog_ERR(TAG,
"Kerberos in invalid state!");
1237 krb5_data edata = { 0 };
1238 in_creds.second_ticket = edata;
1239 krb5_free_cred_contents(credentials->ctx, &in_creds);
1242 krb5_free_creds(credentials->ctx, creds);
1243 if (output_token.data)
1244 krb5glue_free_data_contents(credentials->ctx, &output_token);
1246 winpr_Digest_Free(md5);
1255 case SEC_I_CONTINUE_NEEDED:
1256 sspi_SecureHandleSetLowerPointer(phNewContext, context);
1257 sspi_SecureHandleSetUpperPointer(phNewContext, KERBEROS_SSP_NAME);
1260 kerberos_ContextFree(context, TRUE);
1268 status = SEC_E_INVALID_TOKEN;
1271 return SEC_E_UNSUPPORTED_FUNCTION;
1275static SECURITY_STATUS SEC_ENTRY kerberos_InitializeSecurityContextW(
1277 ULONG Reserved1, ULONG TargetDataRep,
PSecBufferDesc pInput, ULONG Reserved2,
1280 SECURITY_STATUS status = 0;
1281 char* target_name = NULL;
1285 target_name = ConvertWCharToUtf8Alloc(pszTargetName, NULL);
1287 return SEC_E_INSUFFICIENT_MEMORY;
1290 status = kerberos_InitializeSecurityContextA(phCredential, phContext, target_name, fContextReq,
1291 Reserved1, TargetDataRep, pInput, Reserved2,
1292 phNewContext, pOutput, pfContextAttr, ptsExpiry);
1301static BOOL retrieveTgtForPrincipal(KRB_CREDENTIALS* credentials, krb5_principal principal,
1305 krb5_kt_cursor cur = { 0 };
1306 krb5_keytab_entry entry = { 0 };
1307 if (krb_log_exec(krb5_kt_start_seq_get, credentials->ctx, credentials->keytab, &cur))
1312 krb5_error_code rv =
1313 krb_log_exec(krb5_kt_next_entry, credentials->ctx, credentials->keytab, &entry, &cur);
1314 if (rv == KRB5_KT_END)
1319 if (krb5_principal_compare(credentials->ctx, principal, entry.principal))
1321 rv = krb_log_exec(krb5glue_free_keytab_entry_contents, credentials->ctx, &entry);
1322 memset(&entry, 0,
sizeof(entry));
1327 if (krb_log_exec(krb5_kt_end_seq_get, credentials->ctx, credentials->keytab, &cur))
1330 if (!entry.principal)
1334 if (krb_log_exec(krb5_get_init_creds_keytab, credentials->ctx, creds, entry.principal,
1335 credentials->keytab, 0, NULL, NULL))
1344static BOOL retrieveSomeTgt(KRB_CREDENTIALS* credentials,
const char* target, krb5_creds* creds)
1347 krb5_principal target_princ = { 0 };
1348 char* default_realm = NULL;
1350 krb5_error_code rv =
1351 krb_log_exec(krb5_parse_name_flags, credentials->ctx, target, 0, &target_princ);
1355#if defined(WITH_KRB5_HEIMDAL)
1356 if (!target_princ->realm)
1358 rv = krb_log_exec(krb5_get_default_realm, credentials->ctx, &default_realm);
1362 target_princ->realm = default_realm;
1365 if (!target_princ->realm.length)
1367 rv = krb_log_exec(krb5_get_default_realm, credentials->ctx, &default_realm);
1371 target_princ->realm.data = default_realm;
1372 target_princ->realm.length = (
unsigned int)strlen(default_realm);
1382 if (retrieveTgtForPrincipal(credentials, target_princ, creds))
1387#if defined(WITH_KRB5_MIT)
1392 char hostDollar[300] = { 0 };
1393 if (target_princ->length < 2)
1396 (void)snprintf(hostDollar,
sizeof(hostDollar) - 1,
"%s$@%s", target_princ->data[1].data,
1397 target_princ->realm.data);
1398 krb5_free_principal(credentials->ctx, target_princ);
1400 rv = krb_log_exec(krb5_parse_name_flags, credentials->ctx, hostDollar, 0, &target_princ);
1404 ret = retrieveTgtForPrincipal(credentials, target_princ, creds);
1409 krb5_free_default_realm(credentials->ctx, default_realm);
1411 krb5_free_principal(credentials->ctx, target_princ);
1416static SECURITY_STATUS SEC_ENTRY kerberos_AcceptSecurityContext(
1418 WINPR_ATTR_UNUSED ULONG fContextReq, WINPR_ATTR_UNUSED ULONG TargetDataRep,
1423 BOOL isNewContext = FALSE;
1427 uint16_t tok_id = 0;
1428 krb5_data input_token = { 0 };
1429 krb5_data output_token = { 0 };
1430 SECURITY_STATUS status = SEC_E_INTERNAL_ERROR;
1431 krb5_flags ap_flags = 0;
1432 krb5glue_authenticator authenticator = NULL;
1433 char* target = NULL;
1434 krb5_keytab_entry entry = { 0 };
1435 krb5_creds creds = { 0 };
1438 if (phContext && !phContext->dwLower && !phContext->dwUpper)
1439 return SEC_E_INVALID_HANDLE;
1441 KRB_CONTEXT* context = sspi_SecureHandleGetLowerPointer(phContext);
1442 KRB_CREDENTIALS* credentials = sspi_SecureHandleGetLowerPointer(phCredential);
1445 input_buffer = sspi_FindSecBuffer(pInput, SECBUFFER_TOKEN);
1447 output_buffer = sspi_FindSecBuffer(pOutput, SECBUFFER_TOKEN);
1450 return SEC_E_INVALID_TOKEN;
1452 if (!sspi_gss_unwrap_token(input_buffer, &oid, &tok_id, &input_token))
1453 return SEC_E_INVALID_TOKEN;
1457 isNewContext = TRUE;
1458 context = kerberos_ContextNew(credentials);
1459 context->acceptor = TRUE;
1461 if (sspi_gss_oid_compare(&oid, &kerberos_u2u_OID))
1463 context->u2u = TRUE;
1464 context->state = KERBEROS_STATE_TGT_REQ;
1466 else if (sspi_gss_oid_compare(&oid, &kerberos_OID))
1467 context->state = KERBEROS_STATE_AP_REQ;
1473 if ((context->u2u && !sspi_gss_oid_compare(&oid, &kerberos_u2u_OID)) ||
1474 (!context->u2u && !sspi_gss_oid_compare(&oid, &kerberos_OID)))
1478 if (context->state == KERBEROS_STATE_TGT_REQ && tok_id == TOK_ID_TGT_REQ)
1480 if (!kerberos_rd_tgt_token(&input_token, &target, NULL))
1483 if (!retrieveSomeTgt(credentials, target, &creds))
1486 if (!kerberos_mk_tgt_token(output_buffer, KRB_TGT_REP, NULL, NULL, &creds.ticket))
1489 if (krb_log_exec(krb5_auth_con_init, credentials->ctx, &context->auth_ctx))
1492 if (krb_log_exec(krb5glue_auth_con_setuseruserkey, credentials->ctx, context->auth_ctx,
1493 &krb5glue_creds_getkey(creds)))
1496 context->state = KERBEROS_STATE_AP_REQ;
1498 else if (context->state == KERBEROS_STATE_AP_REQ && tok_id == TOK_ID_AP_REQ)
1500 if (krb_log_exec(krb5_rd_req, credentials->ctx, &context->auth_ctx, &input_token, NULL,
1501 credentials->keytab, &ap_flags, NULL))
1504 if (krb_log_exec(krb5_auth_con_setflags, credentials->ctx, context->auth_ctx,
1505 KRB5_AUTH_CONTEXT_DO_SEQUENCE | KRB5_AUTH_CONTEXT_USE_SUBKEY))
1509 if (krb_log_exec(krb5_auth_con_getauthenticator, credentials->ctx, context->auth_ctx,
1512 if (!krb5glue_authenticator_validate_chksum(authenticator, GSS_CHECKSUM_TYPE,
1516 if ((ap_flags & AP_OPTS_MUTUAL_REQUIRED) && (context->flags & SSPI_GSS_C_MUTUAL_FLAG))
1520 if (krb_log_exec(krb5_mk_rep, credentials->ctx, context->auth_ctx, &output_token))
1522 if (!sspi_gss_wrap_token(output_buffer,
1523 context->u2u ? &kerberos_u2u_OID : &kerberos_OID,
1524 TOK_ID_AP_REP, &output_token))
1530 output_buffer->cbBuffer = 0;
1533 *pfContextAttr = (context->flags & 0x1F);
1534 if (context->flags & SSPI_GSS_C_INTEG_FLAG)
1535 *pfContextAttr |= ASC_RET_INTEGRITY;
1537 if (context->flags & SSPI_GSS_C_SEQUENCE_FLAG)
1539 if (krb_log_exec(krb5_auth_con_getlocalseqnumber, credentials->ctx, context->auth_ctx,
1540 (INT32*)&context->local_seq))
1542 if (krb_log_exec(krb5_auth_con_getremoteseqnumber, credentials->ctx, context->auth_ctx,
1543 (INT32*)&context->remote_seq))
1547 if (krb_log_exec(krb5glue_update_keyset, credentials->ctx, context->auth_ctx, TRUE,
1551 context->state = KERBEROS_STATE_FINAL;
1557 if (context->state == KERBEROS_STATE_FINAL)
1560 status = SEC_I_CONTINUE_NEEDED;
1564 if (output_token.data)
1565 krb5glue_free_data_contents(credentials->ctx, &output_token);
1566 if (entry.principal)
1567 krb5glue_free_keytab_entry_contents(credentials->ctx, &entry);
1574 case SEC_I_CONTINUE_NEEDED:
1575 sspi_SecureHandleSetLowerPointer(phNewContext, context);
1576 sspi_SecureHandleSetUpperPointer(phNewContext, KERBEROS_SSP_NAME);
1579 kerberos_ContextFree(context, TRUE);
1587 status = SEC_E_INVALID_TOKEN;
1590 return SEC_E_UNSUPPORTED_FUNCTION;
1595static KRB_CONTEXT* get_context(
PCtxtHandle phContext)
1600 TCHAR* name = sspi_SecureHandleGetUpperPointer(phContext);
1604 if (_tcsncmp(KERBEROS_SSP_NAME, name, ARRAYSIZE(KERBEROS_SSP_NAME)) != 0)
1606 return sspi_SecureHandleGetLowerPointer(phContext);
1609static BOOL copy_krb5_data(krb5_data* data, PUCHAR* ptr, ULONG* psize)
1613 WINPR_ASSERT(psize);
1615 *ptr = (PUCHAR)malloc(data->length);
1619 *psize = data->length;
1620 memcpy(*ptr, data->data, data->length);
1625static SECURITY_STATUS SEC_ENTRY kerberos_DeleteSecurityContext(
PCtxtHandle phContext)
1628 KRB_CONTEXT* context = get_context(phContext);
1630 return SEC_E_INVALID_HANDLE;
1632 kerberos_ContextFree(context, TRUE);
1636 return SEC_E_UNSUPPORTED_FUNCTION;
1642static SECURITY_STATUS krb5_error_to_SECURITY_STATUS(krb5_error_code code)
1649 return SEC_E_INTERNAL_ERROR;
1653static SECURITY_STATUS kerberos_ATTR_SIZES(KRB_CONTEXT* context, KRB_CREDENTIALS* credentials,
1659 krb5glue_key key = NULL;
1661 WINPR_ASSERT(context);
1662 WINPR_ASSERT(context->auth_ctx);
1668 ContextSizes->cbMaxToken = KERBEROS_SecPkgInfoA.cbMaxToken;
1669 ContextSizes->cbMaxSignature = 0;
1670 ContextSizes->cbBlockSize = 1;
1671 ContextSizes->cbSecurityTrailer = 0;
1673 key = get_key(&context->keyset);
1675 if (context->flags & SSPI_GSS_C_CONF_FLAG)
1677 krb5_error_code rv = krb_log_exec(krb5glue_crypto_length, credentials->ctx, key,
1678 KRB5_CRYPTO_TYPE_HEADER, &header);
1680 return krb5_error_to_SECURITY_STATUS(rv);
1682 rv = krb_log_exec(krb5glue_crypto_length, credentials->ctx, key, KRB5_CRYPTO_TYPE_PADDING,
1685 return krb5_error_to_SECURITY_STATUS(rv);
1687 rv = krb_log_exec(krb5glue_crypto_length, credentials->ctx, key, KRB5_CRYPTO_TYPE_TRAILER,
1690 return krb5_error_to_SECURITY_STATUS(rv);
1693 ContextSizes->cbSecurityTrailer = header + pad + trailer + 32;
1696 if (context->flags & SSPI_GSS_C_INTEG_FLAG)
1698 krb5_error_code rv = krb_log_exec(krb5glue_crypto_length, credentials->ctx, key,
1699 KRB5_CRYPTO_TYPE_CHECKSUM, &ContextSizes->cbMaxSignature);
1701 return krb5_error_to_SECURITY_STATUS(rv);
1703 ContextSizes->cbMaxSignature += 16;
1709static SECURITY_STATUS kerberos_ATTR_AUTH_IDENTITY(KRB_CONTEXT* context,
1710 KRB_CREDENTIALS* credentials,
1715 WINPR_ASSERT(context);
1716 WINPR_ASSERT(context->auth_ctx);
1717 WINPR_ASSERT(credentials);
1719 WINPR_ASSERT(AuthIdentity);
1720 *AuthIdentity = empty;
1722 krb5glue_authenticator authenticator = NULL;
1723 krb5_error_code rv = krb_log_exec(krb5_auth_con_getauthenticator, credentials->ctx,
1724 context->auth_ctx, &authenticator);
1731#if defined(WITH_KRB5_HEIMDAL)
1732 const Realm data = authenticator->crealm;
1735 const size_t data_len = length_Realm(&data);
1737 krb5_data* realm_data = krb5_princ_realm(credentials->ctx, authenticator->client);
1740 const char* data = realm_data->data;
1743 const size_t data_len = realm_data->length;
1746 if (data_len > (
sizeof(AuthIdentity->Domain) - 1))
1748 strncpy(AuthIdentity->Domain, data, data_len);
1752#if defined(WITH_KRB5_HEIMDAL)
1753 const PrincipalName* principal = &authenticator->cname;
1754 const size_t name_length = length_PrincipalName(principal);
1755 if (!principal->name_string.val)
1757 const char* name = *principal->name_string.val;
1760 rv = krb_log_exec(krb5_unparse_name_flags, credentials->ctx, authenticator->client,
1761 KRB5_PRINCIPAL_UNPARSE_NO_REALM, &name);
1765 const size_t name_length = strlen(name);
1768 const bool ok = (name_length <= (
sizeof(AuthIdentity->User) - 1));
1770 strncpy(AuthIdentity->User, name, name_length);
1774#if !defined(WITH_KRB5_HEIMDAL)
1775 krb5_free_unparsed_name(credentials->ctx, name);
1780 krb5glue_free_authenticator(credentials->ctx, authenticator);
1781 return krb5_error_to_SECURITY_STATUS(rv);
1784static SECURITY_STATUS kerberos_ATTR_TICKET_LOGON(KRB_CONTEXT* context,
1785 KRB_CREDENTIALS* credentials,
1788 krb5_creds matchCred = { 0 };
1789 krb5_auth_context authContext = NULL;
1790 krb5_flags getCredsFlags = KRB5_GC_CACHED;
1791 BOOL firstRun = TRUE;
1792 krb5_creds* hostCred = NULL;
1793 SECURITY_STATUS ret = SEC_E_INSUFFICIENT_MEMORY;
1794 int rv = krb_log_exec(krb5_sname_to_principal, credentials->ctx, context->targetHost,
"HOST",
1795 KRB5_NT_SRV_HST, &matchCred.server);
1799 rv = krb_log_exec(krb5_cc_get_principal, credentials->ctx, credentials->ccache,
1806 rv = krb_log_exec(krb5_get_credentials, credentials->ctx, getCredsFlags, credentials->ccache,
1807 &matchCred, &hostCred);
1812 case KRB5_CC_NOTFOUND:
1821 WLog_ERR(TAG,
"krb5_get_credentials(hostCreds), rv=%d", rv);
1825 if (krb_log_exec(krb5_auth_con_init, credentials->ctx, &authContext))
1829 krb5_data derOut = { 0 };
1830 if (krb_log_exec(krb5_fwd_tgt_creds, credentials->ctx, authContext, context->targetHost,
1831 matchCred.client, matchCred.server, credentials->ccache, 1, &derOut))
1833 ret = SEC_E_LOGON_DENIED;
1837 ticketLogon->MessageType = KerbTicketLogon;
1838 ticketLogon->Flags = KERB_LOGON_FLAG_REDIRECTED;
1840 if (!copy_krb5_data(&hostCred->ticket, &ticketLogon->ServiceTicket,
1841 &ticketLogon->ServiceTicketLength))
1843 krb5_free_data(credentials->ctx, &derOut);
1847 ticketLogon->TicketGrantingTicketLength = derOut.length;
1848 ticketLogon->TicketGrantingTicket = (PUCHAR)derOut.data;
1853 krb5_auth_con_free(credentials->ctx, authContext);
1854 krb5_free_creds(credentials->ctx, hostCred);
1855 krb5_free_cred_contents(credentials->ctx, &matchCred);
1861static SECURITY_STATUS SEC_ENTRY kerberos_QueryContextAttributesA(
PCtxtHandle phContext,
1862 ULONG ulAttribute,
void* pBuffer)
1865 return SEC_E_INVALID_HANDLE;
1868 return SEC_E_INVALID_PARAMETER;
1871 KRB_CONTEXT* context = get_context(phContext);
1873 return SEC_E_INVALID_PARAMETER;
1875 KRB_CREDENTIALS* credentials = context->credentials;
1877 switch (ulAttribute)
1879 case SECPKG_ATTR_SIZES:
1882 case SECPKG_ATTR_AUTH_IDENTITY:
1883 return kerberos_ATTR_AUTH_IDENTITY(context, credentials,
1886 case SECPKG_CRED_ATTR_TICKET_LOGON:
1887 return kerberos_ATTR_TICKET_LOGON(context, credentials, (
KERB_TICKET_LOGON*)pBuffer);
1890 WLog_ERR(TAG,
"TODO: QueryContextAttributes implement ulAttribute=0x%08" PRIx32,
1892 return SEC_E_UNSUPPORTED_FUNCTION;
1895 return SEC_E_UNSUPPORTED_FUNCTION;
1899static SECURITY_STATUS SEC_ENTRY kerberos_QueryContextAttributesW(
PCtxtHandle phContext,
1900 ULONG ulAttribute,
void* pBuffer)
1902 return kerberos_QueryContextAttributesA(phContext, ulAttribute, pBuffer);
1905static SECURITY_STATUS SEC_ENTRY kerberos_SetContextAttributesW(
1906 WINPR_ATTR_UNUSED
PCtxtHandle phContext, WINPR_ATTR_UNUSED ULONG ulAttribute,
1907 WINPR_ATTR_UNUSED
void* pBuffer, WINPR_ATTR_UNUSED ULONG cbBuffer)
1909 return SEC_E_UNSUPPORTED_FUNCTION;
1912static SECURITY_STATUS SEC_ENTRY kerberos_SetContextAttributesA(
1913 WINPR_ATTR_UNUSED
PCtxtHandle phContext, WINPR_ATTR_UNUSED ULONG ulAttribute,
1914 WINPR_ATTR_UNUSED
void* pBuffer, WINPR_ATTR_UNUSED ULONG cbBuffer)
1916 return SEC_E_UNSUPPORTED_FUNCTION;
1919static SECURITY_STATUS SEC_ENTRY kerberos_SetCredentialsAttributesX(
PCredHandle phCredential,
1921 void* pBuffer, ULONG cbBuffer,
1922 WINPR_ATTR_UNUSED BOOL unicode)
1925 KRB_CREDENTIALS* credentials = NULL;
1928 return SEC_E_INVALID_HANDLE;
1930 credentials = sspi_SecureHandleGetLowerPointer(phCredential);
1933 return SEC_E_INVALID_HANDLE;
1936 return SEC_E_INSUFFICIENT_MEMORY;
1938 switch (ulAttribute)
1940 case SECPKG_CRED_ATTR_KDC_PROXY_SETTINGS:
1946 kdc_settings->Version != KDC_PROXY_SETTINGS_V1 ||
1949 kdc_settings->ProxyServerOffset + kdc_settings->ProxyServerLength)
1950 return SEC_E_INVALID_TOKEN;
1952 if (credentials->kdc_url)
1954 free(credentials->kdc_url);
1955 credentials->kdc_url = NULL;
1958 if (kdc_settings->ProxyServerLength > 0)
1960 WCHAR* proxy = (WCHAR*)((BYTE*)pBuffer + kdc_settings->ProxyServerOffset);
1962 credentials->kdc_url = ConvertWCharNToUtf8Alloc(
1963 proxy, kdc_settings->ProxyServerLength /
sizeof(WCHAR), NULL);
1964 if (!credentials->kdc_url)
1965 return SEC_E_INSUFFICIENT_MEMORY;
1970 case SECPKG_CRED_ATTR_NAMES:
1971 case SECPKG_ATTR_SUPPORTED_ALGS:
1973 WLog_ERR(TAG,
"TODO: SetCredentialsAttributesX implement ulAttribute=0x%08" PRIx32,
1975 return SEC_E_UNSUPPORTED_FUNCTION;
1979 return SEC_E_UNSUPPORTED_FUNCTION;
1983static SECURITY_STATUS SEC_ENTRY kerberos_SetCredentialsAttributesW(
PCredHandle phCredential,
1985 void* pBuffer, ULONG cbBuffer)
1987 return kerberos_SetCredentialsAttributesX(phCredential, ulAttribute, pBuffer, cbBuffer, TRUE);
1990static SECURITY_STATUS SEC_ENTRY kerberos_SetCredentialsAttributesA(
PCredHandle phCredential,
1992 void* pBuffer, ULONG cbBuffer)
1994 return kerberos_SetCredentialsAttributesX(phCredential, ulAttribute, pBuffer, cbBuffer, FALSE);
1997static SECURITY_STATUS SEC_ENTRY kerberos_EncryptMessage(
PCtxtHandle phContext, ULONG fQOP,
2002 KRB_CONTEXT* context = get_context(phContext);
2005 char* header = NULL;
2007 krb5glue_key key = NULL;
2008 krb5_keyusage usage = 0;
2009 krb5_crypto_iov encrypt_iov[] = { { KRB5_CRYPTO_TYPE_HEADER, { 0 } },
2010 { KRB5_CRYPTO_TYPE_DATA, { 0 } },
2011 { KRB5_CRYPTO_TYPE_DATA, { 0 } },
2012 { KRB5_CRYPTO_TYPE_PADDING, { 0 } },
2013 { KRB5_CRYPTO_TYPE_TRAILER, { 0 } } };
2016 return SEC_E_INVALID_HANDLE;
2018 if (!(context->flags & SSPI_GSS_C_CONF_FLAG))
2019 return SEC_E_UNSUPPORTED_FUNCTION;
2021 KRB_CREDENTIALS* creds = context->credentials;
2023 sig_buffer = sspi_FindSecBuffer(pMessage, SECBUFFER_TOKEN);
2024 data_buffer = sspi_FindSecBuffer(pMessage, SECBUFFER_DATA);
2026 if (!sig_buffer || !data_buffer)
2027 return SEC_E_INVALID_TOKEN;
2030 return SEC_E_QOP_NOT_SUPPORTED;
2032 flags |= context->acceptor ? FLAG_SENDER_IS_ACCEPTOR : 0;
2033 flags |= FLAG_WRAP_CONFIDENTIAL;
2035 key = get_key(&context->keyset);
2037 return SEC_E_INTERNAL_ERROR;
2039 flags |= context->keyset.acceptor_key == key ? FLAG_ACCEPTOR_SUBKEY : 0;
2041 usage = context->acceptor ? KG_USAGE_ACCEPTOR_SEAL : KG_USAGE_INITIATOR_SEAL;
2044 encrypt_iov[1].data.length = data_buffer->cbBuffer;
2045 encrypt_iov[2].data.length = 16;
2048 if (krb_log_exec(krb5glue_crypto_length_iov, creds->ctx, key, encrypt_iov,
2049 ARRAYSIZE(encrypt_iov)))
2050 return SEC_E_INTERNAL_ERROR;
2051 if (sig_buffer->cbBuffer <
2052 encrypt_iov[0].data.length + encrypt_iov[3].data.length + encrypt_iov[4].data.length + 32)
2053 return SEC_E_INSUFFICIENT_MEMORY;
2056 header = sig_buffer->pvBuffer;
2057 encrypt_iov[2].data.data = header + 16;
2058 encrypt_iov[3].data.data = encrypt_iov[2].data.data + encrypt_iov[2].data.length;
2059 encrypt_iov[4].data.data = encrypt_iov[3].data.data + encrypt_iov[3].data.length;
2060 encrypt_iov[0].data.data = encrypt_iov[4].data.data + encrypt_iov[4].data.length;
2061 encrypt_iov[1].data.data = data_buffer->pvBuffer;
2064 winpr_Data_Write_UINT16_BE(header, TOK_ID_WRAP);
2065 header[2] = WINPR_ASSERTING_INT_CAST(
char, flags);
2066 header[3] = (char)0xFF;
2067 winpr_Data_Write_UINT32(header + 4, 0);
2068 winpr_Data_Write_UINT64_BE(header + 8, (context->local_seq + MessageSeqNo));
2071 CopyMemory(encrypt_iov[2].data.data, header, 16);
2074 const size_t len = 16 + encrypt_iov[3].data.length + encrypt_iov[4].data.length;
2075 winpr_Data_Write_UINT16_BE(header + 6, WINPR_ASSERTING_INT_CAST(UINT16, len));
2077 if (krb_log_exec(krb5glue_encrypt_iov, creds->ctx, key, usage, encrypt_iov,
2078 ARRAYSIZE(encrypt_iov)))
2079 return SEC_E_INTERNAL_ERROR;
2083 return SEC_E_UNSUPPORTED_FUNCTION;
2087static SECURITY_STATUS SEC_ENTRY kerberos_DecryptMessage(
PCtxtHandle phContext,
2089 ULONG MessageSeqNo, ULONG* pfQOP)
2092 KRB_CONTEXT* context = get_context(phContext);
2095 krb5glue_key key = NULL;
2096 krb5_keyusage usage = 0;
2097 uint16_t tok_id = 0;
2101 uint64_t seq_no = 0;
2102 krb5_crypto_iov iov[] = { { KRB5_CRYPTO_TYPE_HEADER, { 0 } },
2103 { KRB5_CRYPTO_TYPE_DATA, { 0 } },
2104 { KRB5_CRYPTO_TYPE_DATA, { 0 } },
2105 { KRB5_CRYPTO_TYPE_PADDING, { 0 } },
2106 { KRB5_CRYPTO_TYPE_TRAILER, { 0 } } };
2109 return SEC_E_INVALID_HANDLE;
2111 if (!(context->flags & SSPI_GSS_C_CONF_FLAG))
2112 return SEC_E_UNSUPPORTED_FUNCTION;
2114 KRB_CREDENTIALS* creds = context->credentials;
2116 sig_buffer = sspi_FindSecBuffer(pMessage, SECBUFFER_TOKEN);
2117 data_buffer = sspi_FindSecBuffer(pMessage, SECBUFFER_DATA);
2119 if (!sig_buffer || !data_buffer || sig_buffer->cbBuffer < 16)
2120 return SEC_E_INVALID_TOKEN;
2123 BYTE* header = sig_buffer->pvBuffer;
2124 tok_id = winpr_Data_Get_UINT16_BE(header);
2126 ec = winpr_Data_Get_UINT16_BE(&header[4]);
2127 rrc = winpr_Data_Get_UINT16_BE(&header[6]);
2128 seq_no = winpr_Data_Get_UINT64_BE(&header[8]);
2131 if ((tok_id != TOK_ID_WRAP) || (header[3] != 0xFF))
2132 return SEC_E_INVALID_TOKEN;
2134 if ((flags & FLAG_SENDER_IS_ACCEPTOR) == context->acceptor)
2135 return SEC_E_INVALID_TOKEN;
2137 if ((context->flags & ISC_REQ_SEQUENCE_DETECT) &&
2138 (seq_no != context->remote_seq + MessageSeqNo))
2139 return SEC_E_OUT_OF_SEQUENCE;
2141 if (!(flags & FLAG_WRAP_CONFIDENTIAL))
2142 return SEC_E_INVALID_TOKEN;
2146 return SEC_E_INVALID_TOKEN;
2149 key = get_key(&context->keyset);
2150 if (!key || ((flags & FLAG_ACCEPTOR_SUBKEY) && (context->keyset.acceptor_key != key)))
2151 return SEC_E_INTERNAL_ERROR;
2152 usage = context->acceptor ? KG_USAGE_INITIATOR_SEAL : KG_USAGE_ACCEPTOR_SEAL;
2155 iov[1].data.length = data_buffer->cbBuffer;
2156 iov[2].data.length = 16;
2157 if (krb_log_exec(krb5glue_crypto_length_iov, creds->ctx, key, iov, ARRAYSIZE(iov)))
2158 return SEC_E_INTERNAL_ERROR;
2161 if (rrc != 16 + iov[3].data.length + iov[4].data.length)
2162 return SEC_E_INVALID_TOKEN;
2163 if (sig_buffer->cbBuffer != 16 + rrc + iov[0].data.length)
2164 return SEC_E_INVALID_TOKEN;
2167 iov[0].data.data = (
char*)&header[16 + rrc + ec];
2168 iov[1].data.data = data_buffer->pvBuffer;
2169 iov[2].data.data = (
char*)&header[16 + ec];
2170 char* data2 = iov[2].data.data;
2171 iov[3].data.data = &data2[iov[2].data.length];
2173 char* data3 = iov[3].data.data;
2174 iov[4].data.data = &data3[iov[3].data.length];
2176 if (krb_log_exec(krb5glue_decrypt_iov, creds->ctx, key, usage, iov, ARRAYSIZE(iov)))
2177 return SEC_E_INTERNAL_ERROR;
2180 winpr_Data_Write_UINT16_BE(iov[2].data.data + 4, ec);
2181 winpr_Data_Write_UINT16_BE(iov[2].data.data + 6, rrc);
2182 if (memcmp(iov[2].data.data, header, 16) != 0)
2183 return SEC_E_MESSAGE_ALTERED;
2189 return SEC_E_UNSUPPORTED_FUNCTION;
2193static SECURITY_STATUS SEC_ENTRY kerberos_MakeSignature(
PCtxtHandle phContext,
2194 WINPR_ATTR_UNUSED ULONG fQOP,
2198 KRB_CONTEXT* context = get_context(phContext);
2201 krb5glue_key key = NULL;
2202 krb5_keyusage usage = 0;
2204 krb5_crypto_iov iov[] = { { KRB5_CRYPTO_TYPE_DATA, { 0 } },
2205 { KRB5_CRYPTO_TYPE_DATA, { 0 } },
2206 { KRB5_CRYPTO_TYPE_CHECKSUM, { 0 } } };
2209 return SEC_E_INVALID_HANDLE;
2211 if (!(context->flags & SSPI_GSS_C_INTEG_FLAG))
2212 return SEC_E_UNSUPPORTED_FUNCTION;
2214 KRB_CREDENTIALS* creds = context->credentials;
2216 sig_buffer = sspi_FindSecBuffer(pMessage, SECBUFFER_TOKEN);
2217 data_buffer = sspi_FindSecBuffer(pMessage, SECBUFFER_DATA);
2219 if (!sig_buffer || !data_buffer)
2220 return SEC_E_INVALID_TOKEN;
2222 flags |= context->acceptor ? FLAG_SENDER_IS_ACCEPTOR : 0;
2224 key = get_key(&context->keyset);
2226 return SEC_E_INTERNAL_ERROR;
2227 usage = context->acceptor ? KG_USAGE_ACCEPTOR_SIGN : KG_USAGE_INITIATOR_SIGN;
2229 flags |= context->keyset.acceptor_key == key ? FLAG_ACCEPTOR_SUBKEY : 0;
2232 iov[0].data.length = data_buffer->cbBuffer;
2233 iov[1].data.length = 16;
2234 if (krb_log_exec(krb5glue_crypto_length_iov, creds->ctx, key, iov, ARRAYSIZE(iov)))
2235 return SEC_E_INTERNAL_ERROR;
2238 if (sig_buffer->cbBuffer < iov[2].data.length + 16)
2239 return SEC_E_INSUFFICIENT_MEMORY;
2242 char* header = sig_buffer->pvBuffer;
2243 winpr_Data_Write_UINT16_BE(header, TOK_ID_MIC);
2244 header[2] = WINPR_ASSERTING_INT_CAST(
char, flags);
2245 memset(header + 3, 0xFF, 5);
2246 winpr_Data_Write_UINT64_BE(header + 8, (context->local_seq + MessageSeqNo));
2249 iov[0].data.data = data_buffer->pvBuffer;
2250 iov[1].data.data = header;
2251 iov[2].data.data = header + 16;
2253 if (krb_log_exec(krb5glue_make_checksum_iov, creds->ctx, key, usage, iov, ARRAYSIZE(iov)))
2254 return SEC_E_INTERNAL_ERROR;
2256 sig_buffer->cbBuffer = iov[2].data.length + 16;
2260 return SEC_E_UNSUPPORTED_FUNCTION;
2264static SECURITY_STATUS SEC_ENTRY kerberos_VerifySignature(
PCtxtHandle phContext,
2267 WINPR_ATTR_UNUSED ULONG* pfQOP)
2272 krb5glue_key key = NULL;
2273 krb5_keyusage usage = 0;
2275 uint16_t tok_id = 0;
2276 uint64_t seq_no = 0;
2277 krb5_boolean is_valid = 0;
2278 krb5_crypto_iov iov[] = { { KRB5_CRYPTO_TYPE_DATA, { 0 } },
2279 { KRB5_CRYPTO_TYPE_DATA, { 0 } },
2280 { KRB5_CRYPTO_TYPE_CHECKSUM, { 0 } } };
2281 BYTE cmp_filler[] = { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF };
2283 KRB_CONTEXT* context = get_context(phContext);
2285 return SEC_E_INVALID_HANDLE;
2287 if (!(context->flags & SSPI_GSS_C_INTEG_FLAG))
2288 return SEC_E_UNSUPPORTED_FUNCTION;
2290 sig_buffer = sspi_FindSecBuffer(pMessage, SECBUFFER_TOKEN);
2291 data_buffer = sspi_FindSecBuffer(pMessage, SECBUFFER_DATA);
2293 if (!sig_buffer || !data_buffer || sig_buffer->cbBuffer < 16)
2294 return SEC_E_INVALID_TOKEN;
2297 BYTE* header = sig_buffer->pvBuffer;
2298 tok_id = winpr_Data_Get_UINT16_BE(header);
2300 seq_no = winpr_Data_Get_UINT64_BE((header + 8));
2303 if (tok_id != TOK_ID_MIC)
2304 return SEC_E_INVALID_TOKEN;
2306 if ((flags & FLAG_SENDER_IS_ACCEPTOR) == context->acceptor || flags & FLAG_WRAP_CONFIDENTIAL)
2307 return SEC_E_INVALID_TOKEN;
2309 if (memcmp(header + 3, cmp_filler,
sizeof(cmp_filler)) != 0)
2310 return SEC_E_INVALID_TOKEN;
2312 if (context->flags & ISC_REQ_SEQUENCE_DETECT && seq_no != context->remote_seq + MessageSeqNo)
2313 return SEC_E_OUT_OF_SEQUENCE;
2316 key = get_key(&context->keyset);
2317 if (!key || (flags & FLAG_ACCEPTOR_SUBKEY && context->keyset.acceptor_key != key))
2318 return SEC_E_INTERNAL_ERROR;
2319 usage = context->acceptor ? KG_USAGE_INITIATOR_SIGN : KG_USAGE_ACCEPTOR_SIGN;
2322 KRB_CREDENTIALS* creds = context->credentials;
2323 iov[0].data.length = data_buffer->cbBuffer;
2324 iov[1].data.length = 16;
2325 if (krb_log_exec(krb5glue_crypto_length_iov, creds->ctx, key, iov, ARRAYSIZE(iov)))
2326 return SEC_E_INTERNAL_ERROR;
2328 if (sig_buffer->cbBuffer != iov[2].data.length + 16)
2329 return SEC_E_INTERNAL_ERROR;
2332 iov[0].data.data = data_buffer->pvBuffer;
2333 iov[1].data.data = (
char*)header;
2334 iov[2].data.data = (
char*)&header[16];
2336 if (krb_log_exec(krb5glue_verify_checksum_iov, creds->ctx, key, usage, iov, ARRAYSIZE(iov),
2338 return SEC_E_INTERNAL_ERROR;
2341 return SEC_E_MESSAGE_ALTERED;
2345 return SEC_E_UNSUPPORTED_FUNCTION;
2352 kerberos_QueryCredentialsAttributesA,
2353 kerberos_AcquireCredentialsHandleA,
2354 kerberos_FreeCredentialsHandle,
2356 kerberos_InitializeSecurityContextA,
2357 kerberos_AcceptSecurityContext,
2359 kerberos_DeleteSecurityContext,
2361 kerberos_QueryContextAttributesA,
2364 kerberos_MakeSignature,
2365 kerberos_VerifySignature,
2375 kerberos_EncryptMessage,
2376 kerberos_DecryptMessage,
2377 kerberos_SetContextAttributesA,
2378 kerberos_SetCredentialsAttributesA,
2384 kerberos_QueryCredentialsAttributesW,
2385 kerberos_AcquireCredentialsHandleW,
2386 kerberos_FreeCredentialsHandle,
2388 kerberos_InitializeSecurityContextW,
2389 kerberos_AcceptSecurityContext,
2391 kerberos_DeleteSecurityContext,
2393 kerberos_QueryContextAttributesW,
2396 kerberos_MakeSignature,
2397 kerberos_VerifySignature,
2407 kerberos_EncryptMessage,
2408 kerberos_DecryptMessage,
2409 kerberos_SetContextAttributesW,
2410 kerberos_SetCredentialsAttributesW,
2413BOOL KERBEROS_init(
void)
2415 InitializeConstWCharFromUtf8(KERBEROS_SecPkgInfoA.Name, KERBEROS_SecPkgInfoW_NameBuffer,
2416 ARRAYSIZE(KERBEROS_SecPkgInfoW_NameBuffer));
2417 InitializeConstWCharFromUtf8(KERBEROS_SecPkgInfoA.Comment, KERBEROS_SecPkgInfoW_CommentBuffer,
2418 ARRAYSIZE(KERBEROS_SecPkgInfoW_CommentBuffer));