diff options
Diffstat (limited to 'lib/gssapi/krb5/unwrap.c')
| -rw-r--r-- | lib/gssapi/krb5/unwrap.c | 191 | 
1 files changed, 113 insertions, 78 deletions
| diff --git a/lib/gssapi/krb5/unwrap.c b/lib/gssapi/krb5/unwrap.c index d0a33d86fbfc..d6bc20477787 100644 --- a/lib/gssapi/krb5/unwrap.c +++ b/lib/gssapi/krb5/unwrap.c @@ -1,39 +1,39 @@  /* - * Copyright (c) 1997 - 2004 Kungliga Tekniska Högskolan - * (Royal Institute of Technology, Stockholm, Sweden).  - * All rights reserved.  + * Copyright (c) 1997 - 2004 Kungliga Tekniska Högskolan + * (Royal Institute of Technology, Stockholm, Sweden). + * All rights reserved.   * - * Redistribution and use in source and binary forms, with or without  - * modification, are permitted provided that the following conditions  - * are met:  + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met:   * - * 1. Redistributions of source code must retain the above copyright  - *    notice, this list of conditions and the following disclaimer.  + * 1. Redistributions of source code must retain the above copyright + *    notice, this list of conditions and the following disclaimer.   * - * 2. Redistributions in binary form must reproduce the above copyright  - *    notice, this list of conditions and the following disclaimer in the  - *    documentation and/or other materials provided with the distribution.  + * 2. Redistributions in binary form must reproduce the above copyright + *    notice, this list of conditions and the following disclaimer in the + *    documentation and/or other materials provided with the distribution.   * - * 3. Neither the name of the Institute nor the names of its contributors  - *    may be used to endorse or promote products derived from this software  - *    without specific prior written permission.  + * 3. Neither the name of the Institute nor the names of its contributors + *    may be used to endorse or promote products derived from this software + *    without specific prior written permission.   * - * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND  - * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE  - * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE  - * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE  - * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL  - * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS  - * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)  - * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT  - * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY  - * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF  - * SUCH DAMAGE.  + * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND + * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS + * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY + * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + * SUCH DAMAGE.   */ -#include "krb5/gsskrb5_locl.h" +#include "gsskrb5_locl.h" -RCSID("$Id: unwrap.c 19031 2006-11-13 18:02:57Z lha $"); +#ifdef HEIM_WEAK_CRYPTO  static OM_uint32  unwrap_des @@ -48,21 +48,29 @@ unwrap_des  {    u_char *p, *seq;    size_t len; -  MD5_CTX md5; +  EVP_MD_CTX *md5;    u_char hash[16]; +  EVP_CIPHER_CTX des_ctx;    DES_key_schedule schedule;    DES_cblock deskey;    DES_cblock zero; -  int i; +  size_t i;    uint32_t seq_number;    size_t padlength;    OM_uint32 ret;    int cstate;    int cmp; +  int token_len; + +  if (IS_DCE_STYLE(context_handle)) { +     token_len = 22 + 8 + 15; /* 45 */ +  } else { +     token_len = input_message_buffer->length; +  }    p = input_message_buffer->value;    ret = _gsskrb5_verify_header (&p, -				   input_message_buffer->length, +				   token_len,  				   "\x02\x01",  				   GSS_KRB5_MECHANISM);    if (ret) @@ -90,49 +98,56 @@ unwrap_des    if(cstate) {        /* decrypt data */        memcpy (&deskey, key->keyvalue.data, sizeof(deskey)); +      memset (&zero, 0, sizeof(zero));        for (i = 0; i < sizeof(deskey); ++i)  	  deskey[i] ^= 0xf0; -      DES_set_key (&deskey, &schedule); -      memset (&zero, 0, sizeof(zero)); -      DES_cbc_encrypt ((void *)p, -		       (void *)p, -		       input_message_buffer->length - len, -		       &schedule, -		       &zero, -		       DES_DECRYPT); -       -      memset (deskey, 0, sizeof(deskey)); + + +      EVP_CIPHER_CTX_init(&des_ctx); +      EVP_CipherInit_ex(&des_ctx, EVP_des_cbc(), NULL, deskey, zero, 0); +      EVP_Cipher(&des_ctx, p, p, input_message_buffer->length - len); +      EVP_CIPHER_CTX_cleanup(&des_ctx); +        memset (&schedule, 0, sizeof(schedule));    } -  /* check pad */ -  ret = _gssapi_verify_pad(input_message_buffer,  -			   input_message_buffer->length - len, -			   &padlength); -  if (ret) -      return ret; -  MD5_Init (&md5); -  MD5_Update (&md5, p - 24, 8); -  MD5_Update (&md5, p, input_message_buffer->length - len); -  MD5_Final (hash, &md5); +  if (IS_DCE_STYLE(context_handle)) { +    padlength = 0; +  } else { +    /* check pad */ +    ret = _gssapi_verify_pad(input_message_buffer, +			     input_message_buffer->length - len, +			     &padlength); +    if (ret) +        return ret; +  } + +  md5 = EVP_MD_CTX_create(); +  EVP_DigestInit_ex(md5, EVP_md5(), NULL); +  EVP_DigestUpdate(md5, p - 24, 8); +  EVP_DigestUpdate(md5, p, input_message_buffer->length - len); +  EVP_DigestFinal_ex(md5, hash, NULL); +  EVP_MD_CTX_destroy(md5);    memset (&zero, 0, sizeof(zero));    memcpy (&deskey, key->keyvalue.data, sizeof(deskey)); -  DES_set_key (&deskey, &schedule); +  DES_set_key_unchecked (&deskey, &schedule);    DES_cbc_cksum ((void *)hash, (void *)hash, sizeof(hash),  		 &schedule, &zero); -  if (memcmp (p - 8, hash, 8) != 0) +  if (ct_memcmp (p - 8, hash, 8) != 0)      return GSS_S_BAD_MIC;    /* verify sequence number */ -   +    HEIMDAL_MUTEX_lock(&context_handle->ctx_id_mutex);    p -= 16; -  DES_set_key (&deskey, &schedule); -  DES_cbc_encrypt ((void *)p, (void *)p, 8, -		   &schedule, (DES_cblock *)hash, DES_DECRYPT); + +  EVP_CIPHER_CTX_init(&des_ctx); +  EVP_CipherInit_ex(&des_ctx, EVP_des_cbc(), NULL, key->keyvalue.data, hash, 0); +  EVP_Cipher(&des_ctx, p, p, 8); +  EVP_CIPHER_CTX_cleanup(&des_ctx);    memset (deskey, 0, sizeof(deskey));    memset (&schedule, 0, sizeof(schedule)); @@ -141,9 +156,9 @@ unwrap_des    _gsskrb5_decode_om_uint32(seq, &seq_number);    if (context_handle->more_flags & LOCAL) -      cmp = memcmp(&seq[4], "\xff\xff\xff\xff", 4); +      cmp = ct_memcmp(&seq[4], "\xff\xff\xff\xff", 4);    else -      cmp = memcmp(&seq[4], "\x00\x00\x00\x00", 4); +      cmp = ct_memcmp(&seq[4], "\x00\x00\x00\x00", 4);    if (cmp != 0) {      HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex); @@ -170,6 +185,7 @@ unwrap_des  	  output_message_buffer->length);    return GSS_S_COMPLETE;  } +#endif  static OM_uint32  unwrap_des3 @@ -195,10 +211,17 @@ unwrap_des3    krb5_crypto crypto;    Checksum csum;    int cmp; +  int token_len; + +  if (IS_DCE_STYLE(context_handle)) { +     token_len = 34 + 8 + 15; /* 57 */ +  } else { +     token_len = input_message_buffer->length; +  }    p = input_message_buffer->value;    ret = _gsskrb5_verify_header (&p, -				   input_message_buffer->length, +				   token_len,  				   "\x02\x01",  				   GSS_KRB5_MECHANISM);    if (ret) @@ -207,16 +230,16 @@ unwrap_des3    if (memcmp (p, "\x04\x00", 2) != 0) /* HMAC SHA1 DES3_KD */      return GSS_S_BAD_SIG;    p += 2; -  if (memcmp (p, "\x02\x00", 2) == 0) { +  if (ct_memcmp (p, "\x02\x00", 2) == 0) {      cstate = 1; -  } else if (memcmp (p, "\xff\xff", 2) == 0) { +  } else if (ct_memcmp (p, "\xff\xff", 2) == 0) {      cstate = 0;    } else      return GSS_S_BAD_MIC;    p += 2;    if(conf_state != NULL)      *conf_state = cstate; -  if (memcmp (p, "\xff\xff", 2) != 0) +  if (ct_memcmp (p, "\xff\xff", 2) != 0)      return GSS_S_DEFECTIVE_TOKEN;    p += 2;    p += 28; @@ -245,15 +268,20 @@ unwrap_des3        memcpy (p, tmp.data, tmp.length);        krb5_data_free(&tmp);    } -  /* check pad */ -  ret = _gssapi_verify_pad(input_message_buffer,  -			   input_message_buffer->length - len, -			   &padlength); -  if (ret) -      return ret; + +  if (IS_DCE_STYLE(context_handle)) { +    padlength = 0; +  } else { +    /* check pad */ +    ret = _gssapi_verify_pad(input_message_buffer, +			     input_message_buffer->length - len, +			     &padlength); +    if (ret) +        return ret; +  }    /* verify sequence number */ -   +    HEIMDAL_MUTEX_lock(&context_handle->ctx_id_mutex);    p -= 28; @@ -292,10 +320,10 @@ unwrap_des3    _gsskrb5_decode_om_uint32(seq, &seq_number);    if (context_handle->more_flags & LOCAL) -      cmp = memcmp(&seq[4], "\xff\xff\xff\xff", 4); +      cmp = ct_memcmp(&seq[4], "\xff\xff\xff\xff", 4);    else -      cmp = memcmp(&seq[4], "\x00\x00\x00\x00", 4); -   +      cmp = ct_memcmp(&seq[4], "\x00\x00\x00\x00", 4); +    krb5_data_free (&seq_data);    if (cmp != 0) {        *minor_status = 0; @@ -352,7 +380,7 @@ unwrap_des3    return GSS_S_COMPLETE;  } -OM_uint32 _gsskrb5_unwrap +OM_uint32 GSSAPI_CALLCONV _gsskrb5_unwrap             (OM_uint32 * minor_status,              const gss_ctx_id_t context_handle,              const gss_buffer_t input_message_buffer, @@ -369,11 +397,16 @@ OM_uint32 _gsskrb5_unwrap    output_message_buffer->value = NULL;    output_message_buffer->length = 0; +  if (qop_state != NULL) +      *qop_state = GSS_C_QOP_DEFAULT;    GSSAPI_KRB5_INIT (&context); -  if (qop_state != NULL) -      *qop_state = GSS_C_QOP_DEFAULT; +  if (ctx->more_flags & IS_CFX) +      return _gssapi_unwrap_cfx (minor_status, ctx, context, +				 input_message_buffer, output_message_buffer, +				 conf_state, qop_state); +    HEIMDAL_MUTEX_lock(&ctx->ctx_id_mutex);    ret = _gsskrb5i_get_token_key(ctx, context, &key);    HEIMDAL_MUTEX_unlock(&ctx->ctx_id_mutex); @@ -387,9 +420,13 @@ OM_uint32 _gsskrb5_unwrap    switch (keytype) {    case KEYTYPE_DES : +#ifdef HEIM_WEAK_CRYPTO        ret = unwrap_des (minor_status, ctx,  			input_message_buffer, output_message_buffer,  			conf_state, qop_state, key); +#else +      ret = GSS_S_FAILURE; +#endif        break;    case KEYTYPE_DES3 :        ret = unwrap_des3 (minor_status, ctx, context, @@ -403,9 +440,7 @@ OM_uint32 _gsskrb5_unwrap  				    conf_state, qop_state, key);        break;    default : -      ret = _gssapi_unwrap_cfx (minor_status, ctx, context, -				input_message_buffer, output_message_buffer, -				conf_state, qop_state, key); +      abort();        break;    }    krb5_free_keyblock (context, key); | 
