22#include <winpr/config.h>
31#include <winpr/assert.h>
32#include <winpr/cast.h>
33#include <winpr/asn1.h>
35#include <winpr/interlocked.h>
36#include <winpr/sspi.h>
37#include <winpr/print.h>
38#include <winpr/tchar.h>
39#include <winpr/sysinfo.h>
40#include <winpr/registry.h>
41#include <winpr/endian.h>
42#include <winpr/crypto.h>
43#include <winpr/path.h>
44#include <winpr/wtypes.h>
45#include <winpr/winsock.h>
46#include <winpr/schannel.h>
47#include <winpr/secapi.h>
56#ifdef WITH_KRB5_HEIMDAL
58#include <krb5-protos.h>
70 "Kerberos Security Package"
73static WCHAR KERBEROS_SecPkgInfoW_NameBuffer[32] = WINPR_C_ARRAY_INIT;
74static WCHAR KERBEROS_SecPkgInfoW_CommentBuffer[32] = WINPR_C_ARRAY_INIT;
81 KERBEROS_SecPkgInfoW_NameBuffer,
82 KERBEROS_SecPkgInfoW_CommentBuffer
86#define TAG WINPR_TAG("sspi.Kerberos")
93 KERBEROS_STATE_INITIAL,
94 KERBEROS_STATE_TGT_REQ,
95 KERBEROS_STATE_TGT_REP,
96 KERBEROS_STATE_AP_REQ,
97 KERBEROS_STATE_AP_REP,
101typedef struct KRB_CREDENTIALS_st
103 volatile LONG refCount;
108 krb5_keytab client_keytab;
114 enum KERBEROS_STATE state;
115 KRB_CREDENTIALS* credentials;
116 krb5_auth_context auth_ctx;
126static const WinPrAsn1_OID kerberos_OID = { 9, (
void*)
"\x2a\x86\x48\x86\xf7\x12\x01\x02\x02" };
128 (
void*)
"\x2a\x86\x48\x86\xf7\x12\x01\x02\x02\x03" };
130#define krb_log_exec(fkt, ctx, ...) \
131 kerberos_log_msg(ctx, fkt(ctx, ##__VA_ARGS__), #fkt, __FILE__, __func__, __LINE__)
132#define krb_log_exec_ptr(fkt, ctx, ...) \
133 kerberos_log_msg(*ctx, fkt(ctx, ##__VA_ARGS__), #fkt, __FILE__, __func__, __LINE__)
134static krb5_error_code kerberos_log_msg(krb5_context ctx, krb5_error_code code,
const char* what,
135 const char* file,
const char* fkt,
size_t line)
144 const DWORD level = WLOG_ERROR;
146 wLog* log = WLog_Get(TAG);
147 if (WLog_IsLevelActive(log, level))
149 const char* msg = krb5_get_error_message(ctx, code);
150 WLog_PrintTextMessage(log, level, line, file, fkt,
"%s (%s [%d])", what, msg, code);
151 krb5_free_error_message(ctx, msg);
159static void credentials_unref(KRB_CREDENTIALS* credentials);
161static void kerberos_ContextFree(KRB_CONTEXT* ctx, BOOL allocated)
166 free(ctx->targetHost);
167 ctx->targetHost =
nullptr;
169 if (ctx->credentials)
171 krb5_context krbctx = ctx->credentials->ctx;
175 krb5_auth_con_free(krbctx, ctx->auth_ctx);
177 krb5glue_keys_free(krbctx, &ctx->keyset);
180 credentials_unref(ctx->credentials);
187static KRB_CONTEXT* kerberos_ContextNew(KRB_CREDENTIALS* credentials)
189 KRB_CONTEXT* context =
nullptr;
191 context = (KRB_CONTEXT*)calloc(1,
sizeof(KRB_CONTEXT));
195 context->credentials = credentials;
196 InterlockedIncrement(&credentials->refCount);
200static krb5_error_code krb5_prompter(krb5_context context,
void* data,
201 WINPR_ATTR_UNUSED
const char* name,
202 WINPR_ATTR_UNUSED
const char* banner,
int num_prompts,
203 krb5_prompt prompts[])
205 for (
int i = 0; i < num_prompts; i++)
207 krb5_prompt_type type = krb5glue_get_prompt_type(context, prompts, i);
208 if (type && (type == KRB5_PROMPT_TYPE_PREAUTH || type == KRB5_PROMPT_TYPE_PASSWORD) && data)
210 prompts[i].reply->data = _strdup((
const char*)data);
212 const size_t len = strlen((
const char*)data);
213 if (len > UINT32_MAX)
214 return KRB5KRB_ERR_GENERIC;
215 prompts[i].reply->length = (UINT32)len;
223 return keyset->acceptor_key ? keyset->acceptor_key
224 : keyset->initiator_key ? keyset->initiator_key
225 : keyset->session_key;
228static BOOL isValidIPv4(
const char* ipAddress)
230 struct sockaddr_in sa = WINPR_C_ARRAY_INIT;
231 int result = inet_pton(AF_INET, ipAddress, &(sa.sin_addr));
235static BOOL isValidIPv6(
const char* ipAddress)
237 struct sockaddr_in6 sa = WINPR_C_ARRAY_INIT;
238 int result = inet_pton(AF_INET6, ipAddress, &(sa.sin6_addr));
242static BOOL isValidIP(
const char* ipAddress)
244 return isValidIPv4(ipAddress) || isValidIPv6(ipAddress);
247#if defined(WITH_KRB5_MIT)
248WINPR_ATTR_MALLOC(free, 1)
250static
char* get_realm_name(krb5_data realm,
size_t* plen)
254 if ((realm.length <= 0) || (!realm.data))
257 char* name =
nullptr;
258 (void)winpr_asprintf(&name, plen,
"krbtgt/%*s@%*s", realm.length, realm.data, realm.length,
262#elif defined(WITH_KRB5_HEIMDAL)
263WINPR_ATTR_MALLOC(free, 1)
265static
char* get_realm_name(Realm realm,
size_t* plen)
272 char* name =
nullptr;
273 (void)winpr_asprintf(&name, plen,
"krbtgt/%s@%s", realm, realm);
278static int build_krbtgt(krb5_context ctx, krb5_principal principal, krb5_principal* ptarget)
282 krb5_error_code rv = KRB5_CC_NOMEM;
284 char* name = get_realm_name(principal->realm, &len);
285 if (!name || (len == 0))
289 krb5_principal target = WINPR_C_ARRAY_INIT;
290 rv = krb5_parse_name(ctx, name, &target);
300static SECURITY_STATUS SEC_ENTRY kerberos_AcquireCredentialsHandleA(
301 WINPR_ATTR_UNUSED SEC_CHAR* pszPrincipal, WINPR_ATTR_UNUSED SEC_CHAR* pszPackage,
302 WINPR_ATTR_UNUSED ULONG fCredentialUse, WINPR_ATTR_UNUSED
void* pvLogonID,
303 WINPR_ATTR_UNUSED
void* pAuthData, WINPR_ATTR_UNUSED SEC_GET_KEY_FN pGetKeyFn,
304 WINPR_ATTR_UNUSED
void* pvGetKeyArgument, WINPR_ATTR_UNUSED
PCredHandle phCredential,
309 KRB_CREDENTIALS* credentials =
nullptr;
310 krb5_context ctx =
nullptr;
311 krb5_ccache ccache =
nullptr;
312 krb5_keytab keytab =
nullptr;
313 krb5_principal principal =
nullptr;
314 char* domain =
nullptr;
315 char* username =
nullptr;
316 char* password =
nullptr;
317 BOOL own_ccache = FALSE;
318 const char*
const default_ccache_type =
"MEMORY";
322 UINT32 identityFlags = sspi_GetAuthIdentityFlags(pAuthData);
324 if (identityFlags & SEC_WINNT_AUTH_IDENTITY_EXTENDED)
330 WLog_ERR(TAG,
"Failed to copy auth identity fields");
335 pszPrincipal = username;
338 if (krb_log_exec_ptr(krb5_init_context, &ctx))
343 char* udomain = _strdup(domain);
349 krb5_error_code rv = krb_log_exec(krb5_set_default_realm, ctx, udomain);
358 char* cpszPrincipal = _strdup(pszPrincipal);
363 char* p = strchr(cpszPrincipal,
'@');
367 krb5_error_code rv = krb_log_exec(krb5_parse_name, ctx, cpszPrincipal, &principal);
372 WINPR_ASSERT(principal);
375 if (krb_settings && krb_settings->cache)
377 if ((krb_log_exec(krb5_cc_set_default_name, ctx, krb_settings->cache)))
386 if (krb5_cc_cache_match(ctx, principal, &ccache) == KRB5_CC_NOTFOUND)
390 if (krb_log_exec(krb5_cc_new_unique, ctx, default_ccache_type,
nullptr, &ccache))
395 if (krb_log_exec(krb5_cc_resolve, ctx, krb_settings->cache, &ccache))
399 if (krb_log_exec(krb5_cc_initialize, ctx, ccache, principal))
404 if (krb_log_exec(krb5_cc_default, ctx, &ccache))
408 WINPR_ASSERT(ccache);
410 else if (fCredentialUse & SECPKG_CRED_OUTBOUND)
413 if (krb_log_exec(krb5_cc_default, ctx, &ccache))
415 if (krb_log_exec(krb5_cc_get_principal, ctx, ccache, &principal))
417 WINPR_ASSERT(ccache);
424 if (krb_log_exec(krb5_cc_new_unique, ctx, default_ccache_type,
nullptr, &ccache))
429 if (krb_log_exec(krb5_cc_resolve, ctx, krb_settings->cache, &ccache))
432 WINPR_ASSERT(ccache);
435 if (krb_settings && krb_settings->keytab)
437 if (krb_log_exec(krb5_kt_resolve, ctx, krb_settings->keytab, &keytab))
442 if (fCredentialUse & SECPKG_CRED_INBOUND)
443 if (krb_log_exec(krb5_kt_default, ctx, &keytab))
448 if (fCredentialUse & SECPKG_CRED_OUTBOUND)
450 krb5_creds creds = WINPR_C_ARRAY_INIT;
451 krb5_creds matchCreds = WINPR_C_ARRAY_INIT;
452 krb5_flags matchFlags = KRB5_TC_MATCH_TIMES;
454 krb5_timeofday(ctx, &matchCreds.times.endtime);
455 matchCreds.times.endtime += 60;
456 matchCreds.client = principal;
458 WINPR_ASSERT(principal);
460 WINPR_ASSERT(ccache);
461 if (krb_log_exec(build_krbtgt, ctx, principal, &matchCreds.server))
464 int rv = krb5_cc_retrieve_cred(ctx, ccache, matchFlags, &matchCreds, &creds);
465 krb5_free_principal(ctx, matchCreds.server);
466 krb5_free_cred_contents(ctx, &creds);
469 if (krb_log_exec(krb5glue_get_init_creds, ctx, principal, ccache, krb5_prompter,
470 password, krb_settings))
475 credentials = calloc(1,
sizeof(KRB_CREDENTIALS));
478 credentials->refCount = 1;
479 credentials->ctx = ctx;
480 credentials->ccache = ccache;
481 credentials->keytab = keytab;
482 credentials->own_ccache = own_ccache;
491 krb5_free_principal(ctx, principal);
499 krb5_cc_destroy(ctx, ccache);
501 krb5_cc_close(ctx, ccache);
504 krb5_kt_close(ctx, keytab);
506 krb5_free_context(ctx);
513 sspi_SecureHandleSetLowerPointer(phCredential, (
void*)credentials);
514 sspi_SecureHandleSetUpperPointer(phCredential, (
void*)KERBEROS_SSP_NAME);
518 return SEC_E_NO_CREDENTIALS;
520 return SEC_E_UNSUPPORTED_FUNCTION;
524static SECURITY_STATUS SEC_ENTRY kerberos_AcquireCredentialsHandleW(
525 SEC_WCHAR* pszPrincipal, SEC_WCHAR* pszPackage, ULONG fCredentialUse,
void* pvLogonID,
526 void* pAuthData, SEC_GET_KEY_FN pGetKeyFn,
void* pvGetKeyArgument,
PCredHandle phCredential,
529 SECURITY_STATUS status = SEC_E_INSUFFICIENT_MEMORY;
530 char* principal =
nullptr;
531 char*
package = nullptr;
535 principal = ConvertWCharToUtf8Alloc(pszPrincipal,
nullptr);
541 package = ConvertWCharToUtf8Alloc(pszPackage, nullptr);
547 kerberos_AcquireCredentialsHandleA(principal, package, fCredentialUse, pvLogonID, pAuthData,
548 pGetKeyFn, pvGetKeyArgument, phCredential, ptsExpiry);
558static void credentials_unref(KRB_CREDENTIALS* credentials)
560 WINPR_ASSERT(credentials);
562 if (InterlockedDecrement(&credentials->refCount))
565 free(credentials->kdc_url);
567 if (credentials->ccache)
569 if (credentials->own_ccache)
570 krb5_cc_destroy(credentials->ctx, credentials->ccache);
572 krb5_cc_close(credentials->ctx, credentials->ccache);
574 if (credentials->keytab)
575 krb5_kt_close(credentials->ctx, credentials->keytab);
577 krb5_free_context(credentials->ctx);
582static SECURITY_STATUS
583 SEC_ENTRY kerberos_FreeCredentialsHandle(WINPR_ATTR_UNUSED
PCredHandle phCredential)
586 KRB_CREDENTIALS* credentials = sspi_SecureHandleGetLowerPointer(phCredential);
588 return SEC_E_INVALID_HANDLE;
590 credentials_unref(credentials);
592 sspi_SecureHandleInvalidate(phCredential);
595 return SEC_E_UNSUPPORTED_FUNCTION;
599static SECURITY_STATUS SEC_ENTRY kerberos_QueryCredentialsAttributesW(
600 WINPR_ATTR_UNUSED
PCredHandle phCredential, WINPR_ATTR_UNUSED ULONG ulAttribute,
601 WINPR_ATTR_UNUSED
void* pBuffer)
606 case SECPKG_CRED_ATTR_NAMES:
609 WLog_ERR(TAG,
"TODO: QueryCredentialsAttributesW, implement ulAttribute=%08" PRIx32,
611 return SEC_E_UNSUPPORTED_FUNCTION;
615 return SEC_E_UNSUPPORTED_FUNCTION;
619static SECURITY_STATUS SEC_ENTRY kerberos_QueryCredentialsAttributesA(
PCredHandle phCredential,
623 return kerberos_QueryCredentialsAttributesW(phCredential, ulAttribute, pBuffer);
628static BOOL kerberos_mk_tgt_token(
SecBuffer* buf,
int msg_type,
char* sname,
char* host,
629 const krb5_data* ticket)
631 WinPrAsn1Encoder* enc =
nullptr;
640 if (msg_type != KRB_TGT_REQ && msg_type != KRB_TGT_REP)
642 if (msg_type == KRB_TGT_REP && !ticket)
645 enc = WinPrAsn1Encoder_New(WINPR_ASN1_DER);
650 if (!WinPrAsn1EncSeqContainer(enc))
654 if (!WinPrAsn1EncContextualInteger(enc, 0, 5))
658 if (!WinPrAsn1EncContextualInteger(enc, 1, msg_type))
661 if (msg_type == KRB_TGT_REQ && sname)
664 if (!WinPrAsn1EncContextualSeqContainer(enc, 2))
668 if (!WinPrAsn1EncContextualInteger(enc, 0, KRB5_NT_SRV_HST))
672 if (!WinPrAsn1EncContextualSeqContainer(enc, 1))
675 if (!WinPrAsn1EncGeneralString(enc, sname))
678 if (host && !WinPrAsn1EncGeneralString(enc, host))
681 if (!WinPrAsn1EncEndContainer(enc) || !WinPrAsn1EncEndContainer(enc))
684 else if (msg_type == KRB_TGT_REP)
687 data.data = (BYTE*)ticket->data;
688 data.len = ticket->length;
689 if (!WinPrAsn1EncContextualRawContent(enc, 2, &data))
693 if (!WinPrAsn1EncEndContainer(enc))
696 if (!WinPrAsn1EncStreamSize(enc, &len) || len > buf->cbBuffer)
699 Stream_StaticInit(&s, buf->pvBuffer, len);
700 if (!WinPrAsn1EncToStream(enc, &s))
703 token.data = buf->pvBuffer;
704 token.length = (UINT)len;
705 if (sspi_gss_wrap_token(buf, &kerberos_u2u_OID,
706 msg_type == KRB_TGT_REQ ? TOK_ID_TGT_REQ : TOK_ID_TGT_REP, &token))
710 WinPrAsn1Encoder_Free(&enc);
714static BOOL append(
char* dst,
size_t dstSize,
const char* src)
716 const size_t dlen = strnlen(dst, dstSize);
717 const size_t slen = strlen(src);
718 if (dlen + slen >= dstSize)
720 if (!strncat(dst, src, dstSize - dlen))
725static BOOL kerberos_rd_tgt_req_tag2(
WinPrAsn1Decoder* dec,
char* buf,
size_t len)
731 if (!WinPrAsn1DecReadSequence(dec, &seq))
738 WinPrAsn1_INTEGER val = 0;
739 if (!WinPrAsn1DecReadContextualInteger(&seq, 0, &error, &val))
744 if (!WinPrAsn1DecReadContextualSequence(&seq, 1, &error, dec))
749 WinPrAsn1_tag tag = 0;
751 while (WinPrAsn1DecPeekTag(dec, &tag))
753 BOOL success = FALSE;
754 char* lstr =
nullptr;
755 if (!WinPrAsn1DecReadGeneralString(dec, &lstr))
760 if (!append(buf, len,
"/"))
765 if (!append(buf, len, lstr))
781static BOOL kerberos_rd_tgt_req_tag3(
WinPrAsn1Decoder* dec,
char* buf,
size_t len)
785 WinPrAsn1_STRING str =
nullptr;
786 if (!WinPrAsn1DecReadGeneralString(dec, &str))
789 if (!append(buf, len,
"@"))
791 if (!append(buf, len, str))
808 wStream s = WinPrAsn1DecGetStream(dec);
809 const size_t len = Stream_Length(&s);
814 WinPrAsn1_tagId tag = 0;
815 if (WinPrAsn1DecReadContextualTag(dec, &tag, &dec2) == 0)
818 char* buf = calloc(len + 1,
sizeof(
char));
826 BOOL checkForTag3 = TRUE;
829 rc = kerberos_rd_tgt_req_tag2(&dec2, buf, len);
832 const size_t res = WinPrAsn1DecReadContextualTag(dec, &tag, dec);
834 checkForTag3 = FALSE;
841 rc = kerberos_rd_tgt_req_tag3(&dec2, buf, len);
860 WinPrAsn1_tagId tag = 0;
861 if (WinPrAsn1DecReadContextualTag(dec, &tag, &asnTicket) == 0)
867 wStream s = WinPrAsn1DecGetStream(&asnTicket);
868 ticket->data = Stream_BufferAs(&s,
char);
870 const size_t len = Stream_Length(&s);
871 if (len > UINT32_MAX)
873 ticket->length = (UINT32)len;
877static BOOL kerberos_rd_tgt_token(
const sspi_gss_data* token,
char** target, krb5_data* ticket)
880 WinPrAsn1_INTEGER val = 0;
888 WinPrAsn1Decoder_InitMem(&der, WINPR_ASN1_DER, (BYTE*)token->data, token->length);
892 if (!WinPrAsn1DecReadSequence(&der, &seq))
896 if (!WinPrAsn1DecReadContextualInteger(&seq, 0, &error, &val) || val != 5)
900 if (!WinPrAsn1DecReadContextualInteger(&seq, 1, &error, &val))
906 return kerberos_rd_tgt_req(&seq, target);
908 return kerberos_rd_tgt_rep(&seq, ticket);
915static BOOL kerberos_hash_channel_bindings(WINPR_DIGEST_CTX* md5,
SEC_CHANNEL_BINDINGS* bindings)
919 winpr_Data_Write_UINT32(buf, bindings->dwInitiatorAddrType);
920 if (!winpr_Digest_Update(md5, buf, 4))
923 winpr_Data_Write_UINT32(buf, bindings->cbInitiatorLength);
924 if (!winpr_Digest_Update(md5, buf, 4))
927 if (bindings->cbInitiatorLength &&
928 !winpr_Digest_Update(md5, (BYTE*)bindings + bindings->dwInitiatorOffset,
929 bindings->cbInitiatorLength))
932 winpr_Data_Write_UINT32(buf, bindings->dwAcceptorAddrType);
933 if (!winpr_Digest_Update(md5, buf, 4))
936 winpr_Data_Write_UINT32(buf, bindings->cbAcceptorLength);
937 if (!winpr_Digest_Update(md5, buf, 4))
940 if (bindings->cbAcceptorLength &&
941 !winpr_Digest_Update(md5, (BYTE*)bindings + bindings->dwAcceptorOffset,
942 bindings->cbAcceptorLength))
945 winpr_Data_Write_UINT32(buf, bindings->cbApplicationDataLength);
946 if (!winpr_Digest_Update(md5, buf, 4))
949 if (bindings->cbApplicationDataLength &&
950 !winpr_Digest_Update(md5, (BYTE*)bindings + bindings->dwApplicationDataOffset,
951 bindings->cbApplicationDataLength))
959static SECURITY_STATUS SEC_ENTRY kerberos_InitializeSecurityContextA(
961 WINPR_ATTR_UNUSED SEC_CHAR* pszTargetName, WINPR_ATTR_UNUSED ULONG fContextReq,
962 WINPR_ATTR_UNUSED ULONG Reserved1, WINPR_ATTR_UNUSED ULONG TargetDataRep,
963 WINPR_ATTR_UNUSED
PSecBufferDesc pInput, WINPR_ATTR_UNUSED ULONG Reserved2,
965 WINPR_ATTR_UNUSED ULONG* pfContextAttr, WINPR_ATTR_UNUSED
PTimeStamp ptsExpiry)
971 WINPR_DIGEST_CTX* md5 =
nullptr;
972 char* target =
nullptr;
973 char* sname =
nullptr;
974 char* host =
nullptr;
975 krb5_data input_token = WINPR_C_ARRAY_INIT;
976 krb5_data output_token = WINPR_C_ARRAY_INIT;
977 SECURITY_STATUS status = SEC_E_INTERNAL_ERROR;
980 krb5_ap_rep_enc_part* reply =
nullptr;
981 krb5_flags ap_flags = AP_OPTS_USE_SUBKEY;
982 char cksum_contents[24] = WINPR_C_ARRAY_INIT;
983 krb5_data cksum = WINPR_C_ARRAY_INIT;
984 krb5_creds in_creds = WINPR_C_ARRAY_INIT;
985 krb5_creds* creds =
nullptr;
986 BOOL isNewContext = FALSE;
987 KRB_CONTEXT* context =
nullptr;
988 KRB_CREDENTIALS* credentials = sspi_SecureHandleGetLowerPointer(phCredential);
991 if (phContext && !phContext->dwLower && !phContext->dwUpper)
992 return SEC_E_INVALID_HANDLE;
994 context = sspi_SecureHandleGetLowerPointer(phContext);
997 return SEC_E_NO_CREDENTIALS;
1001 input_buffer = sspi_FindSecBuffer(pInput, SECBUFFER_TOKEN);
1002 bindings_buffer = sspi_FindSecBuffer(pInput, SECBUFFER_CHANNEL_BINDINGS);
1005 output_buffer = sspi_FindSecBuffer(pOutput, SECBUFFER_TOKEN);
1007 if (fContextReq & ISC_REQ_MUTUAL_AUTH)
1008 ap_flags |= AP_OPTS_MUTUAL_REQUIRED;
1010 if (fContextReq & ISC_REQ_USE_SESSION_KEY)
1011 ap_flags |= AP_OPTS_USE_SESSION_KEY;
1016 target = _strdup(pszTargetName);
1019 status = SEC_E_INSUFFICIENT_MEMORY;
1022 host = strchr(target,
'/');
1030 if (isValidIP(host))
1032 status = SEC_E_NO_CREDENTIALS;
1039 context = kerberos_ContextNew(credentials);
1042 status = SEC_E_INSUFFICIENT_MEMORY;
1046 isNewContext = TRUE;
1049 context->targetHost = _strdup(host);
1050 if (!context->targetHost)
1052 status = SEC_E_INSUFFICIENT_MEMORY;
1056 if (fContextReq & ISC_REQ_USE_SESSION_KEY)
1058 context->state = KERBEROS_STATE_TGT_REQ;
1059 context->u2u = TRUE;
1062 context->state = KERBEROS_STATE_AP_REQ;
1066 if (!input_buffer || !sspi_gss_unwrap_token(input_buffer, &oid, &tok_id, &input_token))
1068 if ((context->u2u && !sspi_gss_oid_compare(&oid, &kerberos_u2u_OID)) ||
1069 (!context->u2u && !sspi_gss_oid_compare(&oid, &kerberos_OID)))
1074 context->flags |= (fContextReq & 0x1F);
1075 if ((fContextReq & ISC_REQ_INTEGRITY) && !(fContextReq & ISC_REQ_NO_INTEGRITY))
1076 context->flags |= SSPI_GSS_C_INTEG_FLAG;
1078 switch (context->state)
1080 case KERBEROS_STATE_TGT_REQ:
1082 if (!kerberos_mk_tgt_token(output_buffer, KRB_TGT_REQ, sname, host,
nullptr))
1085 context->state = KERBEROS_STATE_TGT_REP;
1086 status = SEC_I_CONTINUE_NEEDED;
1089 case KERBEROS_STATE_TGT_REP:
1091 if (tok_id != TOK_ID_TGT_REP)
1094 if (!kerberos_rd_tgt_token(&input_token,
nullptr, &in_creds.second_ticket))
1101 case KERBEROS_STATE_AP_REQ:
1104 if (krb_log_exec(krb5_auth_con_init, credentials->ctx, &context->auth_ctx))
1106 if (krb_log_exec(krb5_auth_con_setflags, credentials->ctx, context->auth_ctx,
1107 KRB5_AUTH_CONTEXT_DO_SEQUENCE | KRB5_AUTH_CONTEXT_USE_SUBKEY))
1109 if (krb_log_exec(krb5glue_auth_con_set_cksumtype, credentials->ctx, context->auth_ctx,
1114 if (krb_log_exec(krb5_sname_to_principal, credentials->ctx, host, sname,
1115 KRB5_NT_SRV_HST, &in_creds.server))
1118 if (krb_log_exec(krb5_cc_get_principal, credentials->ctx, credentials->ccache,
1121 status = SEC_E_WRONG_PRINCIPAL;
1125 if (krb_log_exec(krb5_get_credentials, credentials->ctx,
1126 context->u2u ? KRB5_GC_USER_USER : 0, credentials->ccache, &in_creds,
1129 status = SEC_E_NO_CREDENTIALS;
1134 cksum.data = cksum_contents;
1135 cksum.length =
sizeof(cksum_contents);
1136 winpr_Data_Write_UINT32(cksum_contents, 16);
1137 winpr_Data_Write_UINT32((cksum_contents + 20), context->flags);
1139 if (bindings_buffer)
1145 (bindings->cbInitiatorLength + bindings->dwInitiatorOffset) >
1146 bindings_buffer->cbBuffer ||
1147 (bindings->cbAcceptorLength + bindings->dwAcceptorOffset) >
1148 bindings_buffer->cbBuffer ||
1149 (bindings->cbApplicationDataLength + bindings->dwApplicationDataOffset) >
1150 bindings_buffer->cbBuffer)
1152 status = SEC_E_BAD_BINDINGS;
1156 md5 = winpr_Digest_New();
1160 if (!winpr_Digest_Init(md5, WINPR_MD_MD5))
1163 if (!kerberos_hash_channel_bindings(md5, bindings))
1166 if (!winpr_Digest_Final(md5, (BYTE*)cksum_contents + 4, 16))
1171 if (krb_log_exec(krb5_mk_req_extended, credentials->ctx, &context->auth_ctx, ap_flags,
1172 &cksum, creds, &output_token))
1175 if (!sspi_gss_wrap_token(output_buffer,
1176 context->u2u ? &kerberos_u2u_OID : &kerberos_OID,
1177 TOK_ID_AP_REQ, &output_token))
1180 if (context->flags & SSPI_GSS_C_SEQUENCE_FLAG)
1182 if (krb_log_exec(krb5_auth_con_getlocalseqnumber, credentials->ctx,
1183 context->auth_ctx, (INT32*)&context->local_seq))
1185 context->remote_seq ^= context->local_seq;
1188 if (krb_log_exec(krb5glue_update_keyset, credentials->ctx, context->auth_ctx, FALSE,
1192 context->state = KERBEROS_STATE_AP_REP;
1194 if (context->flags & SSPI_GSS_C_MUTUAL_FLAG)
1195 status = SEC_I_CONTINUE_NEEDED;
1200 case KERBEROS_STATE_AP_REP:
1202 if (tok_id == TOK_ID_AP_REP)
1204 if (krb_log_exec(krb5_rd_rep, credentials->ctx, context->auth_ctx, &input_token,
1207 krb5_free_ap_rep_enc_part(credentials->ctx, reply);
1209 else if (tok_id == TOK_ID_ERROR)
1211 krb5glue_log_error(credentials->ctx, &input_token, TAG);
1217 if (context->flags & SSPI_GSS_C_SEQUENCE_FLAG)
1219 if (krb_log_exec(krb5_auth_con_getremoteseqnumber, credentials->ctx,
1220 context->auth_ctx, (INT32*)&context->remote_seq))
1224 if (krb_log_exec(krb5glue_update_keyset, credentials->ctx, context->auth_ctx, FALSE,
1228 context->state = KERBEROS_STATE_FINAL;
1231 output_buffer->cbBuffer = 0;
1235 case KERBEROS_STATE_FINAL:
1237 WLog_ERR(TAG,
"Kerberos in invalid state!");
1244 krb5_data edata = WINPR_C_ARRAY_INIT;
1245 in_creds.second_ticket = edata;
1246 krb5_free_cred_contents(credentials->ctx, &in_creds);
1249 krb5_free_creds(credentials->ctx, creds);
1250 if (output_token.data)
1251 krb5glue_free_data_contents(credentials->ctx, &output_token);
1253 winpr_Digest_Free(md5);
1262 case SEC_I_CONTINUE_NEEDED:
1263 sspi_SecureHandleSetLowerPointer(phNewContext, context);
1264 sspi_SecureHandleSetUpperPointer(phNewContext, KERBEROS_SSP_NAME);
1267 kerberos_ContextFree(context, TRUE);
1275 status = SEC_E_INVALID_TOKEN;
1278 return SEC_E_UNSUPPORTED_FUNCTION;
1282static SECURITY_STATUS SEC_ENTRY kerberos_InitializeSecurityContextW(
1284 ULONG Reserved1, ULONG TargetDataRep,
PSecBufferDesc pInput, ULONG Reserved2,
1287 SECURITY_STATUS status = 0;
1288 char* target_name =
nullptr;
1292 target_name = ConvertWCharToUtf8Alloc(pszTargetName,
nullptr);
1294 return SEC_E_INSUFFICIENT_MEMORY;
1297 status = kerberos_InitializeSecurityContextA(phCredential, phContext, target_name, fContextReq,
1298 Reserved1, TargetDataRep, pInput, Reserved2,
1299 phNewContext, pOutput, pfContextAttr, ptsExpiry);
1308static BOOL retrieveTgtForPrincipal(KRB_CREDENTIALS* credentials, krb5_principal principal,
1312 krb5_kt_cursor cur = WINPR_C_ARRAY_INIT;
1313 krb5_keytab_entry entry = WINPR_C_ARRAY_INIT;
1314 if (krb_log_exec(krb5_kt_start_seq_get, credentials->ctx, credentials->keytab, &cur))
1319 krb5_error_code rv =
1320 krb_log_exec(krb5_kt_next_entry, credentials->ctx, credentials->keytab, &entry, &cur);
1321 if (rv == KRB5_KT_END)
1326 if (krb5_principal_compare(credentials->ctx, principal, entry.principal))
1328 rv = krb_log_exec(krb5glue_free_keytab_entry_contents, credentials->ctx, &entry);
1329 memset(&entry, 0,
sizeof(entry));
1334 if (krb_log_exec(krb5_kt_end_seq_get, credentials->ctx, credentials->keytab, &cur))
1337 if (!entry.principal)
1341 if (krb_log_exec(krb5_get_init_creds_keytab, credentials->ctx, creds, entry.principal,
1342 credentials->keytab, 0,
nullptr,
nullptr))
1351static BOOL retrieveSomeTgt(KRB_CREDENTIALS* credentials,
const char* target, krb5_creds* creds)
1354 krb5_principal target_princ = WINPR_C_ARRAY_INIT;
1355 char* default_realm =
nullptr;
1357 krb5_error_code rv =
1358 krb_log_exec(krb5_parse_name_flags, credentials->ctx, target, 0, &target_princ);
1362#if defined(WITH_KRB5_HEIMDAL)
1363 if (!target_princ->realm)
1365 rv = krb_log_exec(krb5_get_default_realm, credentials->ctx, &default_realm);
1369 target_princ->realm = default_realm;
1372 if (!target_princ->realm.length)
1374 rv = krb_log_exec(krb5_get_default_realm, credentials->ctx, &default_realm);
1378 target_princ->realm.data = default_realm;
1379 target_princ->realm.length = (
unsigned int)strlen(default_realm);
1389 if (retrieveTgtForPrincipal(credentials, target_princ, creds))
1394#if defined(WITH_KRB5_MIT)
1399 char hostDollar[300] = WINPR_C_ARRAY_INIT;
1400 if (target_princ->length < 2)
1403 (void)snprintf(hostDollar,
sizeof(hostDollar) - 1,
"%s$@%s", target_princ->data[1].data,
1404 target_princ->realm.data);
1405 krb5_free_principal(credentials->ctx, target_princ);
1407 rv = krb_log_exec(krb5_parse_name_flags, credentials->ctx, hostDollar, 0, &target_princ);
1411 ret = retrieveTgtForPrincipal(credentials, target_princ, creds);
1416 krb5_free_default_realm(credentials->ctx, default_realm);
1418 krb5_free_principal(credentials->ctx, target_princ);
1423static SECURITY_STATUS SEC_ENTRY kerberos_AcceptSecurityContext(
1425 WINPR_ATTR_UNUSED
PSecBufferDesc pInput, WINPR_ATTR_UNUSED ULONG fContextReq,
1426 WINPR_ATTR_UNUSED ULONG TargetDataRep, WINPR_ATTR_UNUSED
PCtxtHandle phNewContext,
1427 WINPR_ATTR_UNUSED
PSecBufferDesc pOutput, WINPR_ATTR_UNUSED ULONG* pfContextAttr,
1431 BOOL isNewContext = FALSE;
1435 uint16_t tok_id = 0;
1436 krb5_data input_token = WINPR_C_ARRAY_INIT;
1437 krb5_data output_token = WINPR_C_ARRAY_INIT;
1438 SECURITY_STATUS status = SEC_E_INTERNAL_ERROR;
1439 krb5_flags ap_flags = 0;
1440 krb5glue_authenticator authenticator =
nullptr;
1441 char* target =
nullptr;
1442 krb5_keytab_entry entry = WINPR_C_ARRAY_INIT;
1443 krb5_creds creds = WINPR_C_ARRAY_INIT;
1446 if (phContext && !phContext->dwLower && !phContext->dwUpper)
1447 return SEC_E_INVALID_HANDLE;
1449 KRB_CONTEXT* context = sspi_SecureHandleGetLowerPointer(phContext);
1450 KRB_CREDENTIALS* credentials = sspi_SecureHandleGetLowerPointer(phCredential);
1453 input_buffer = sspi_FindSecBuffer(pInput, SECBUFFER_TOKEN);
1455 output_buffer = sspi_FindSecBuffer(pOutput, SECBUFFER_TOKEN);
1458 return SEC_E_INVALID_TOKEN;
1460 if (!sspi_gss_unwrap_token(input_buffer, &oid, &tok_id, &input_token))
1461 return SEC_E_INVALID_TOKEN;
1465 isNewContext = TRUE;
1466 context = kerberos_ContextNew(credentials);
1467 context->acceptor = TRUE;
1469 if (sspi_gss_oid_compare(&oid, &kerberos_u2u_OID))
1471 context->u2u = TRUE;
1472 context->state = KERBEROS_STATE_TGT_REQ;
1474 else if (sspi_gss_oid_compare(&oid, &kerberos_OID))
1475 context->state = KERBEROS_STATE_AP_REQ;
1481 if ((context->u2u && !sspi_gss_oid_compare(&oid, &kerberos_u2u_OID)) ||
1482 (!context->u2u && !sspi_gss_oid_compare(&oid, &kerberos_OID)))
1486 if (context->state == KERBEROS_STATE_TGT_REQ && tok_id == TOK_ID_TGT_REQ)
1488 if (!kerberos_rd_tgt_token(&input_token, &target,
nullptr))
1491 if (!retrieveSomeTgt(credentials, target, &creds))
1494 if (!kerberos_mk_tgt_token(output_buffer, KRB_TGT_REP,
nullptr,
nullptr, &creds.ticket))
1497 if (krb_log_exec(krb5_auth_con_init, credentials->ctx, &context->auth_ctx))
1500 if (krb_log_exec(krb5glue_auth_con_setuseruserkey, credentials->ctx, context->auth_ctx,
1501 &krb5glue_creds_getkey(creds)))
1504 context->state = KERBEROS_STATE_AP_REQ;
1506 else if (context->state == KERBEROS_STATE_AP_REQ && tok_id == TOK_ID_AP_REQ)
1508 if (krb_log_exec(krb5_rd_req, credentials->ctx, &context->auth_ctx, &input_token,
nullptr,
1509 credentials->keytab, &ap_flags,
nullptr))
1512 if (krb_log_exec(krb5_auth_con_setflags, credentials->ctx, context->auth_ctx,
1513 KRB5_AUTH_CONTEXT_DO_SEQUENCE | KRB5_AUTH_CONTEXT_USE_SUBKEY))
1517 if (krb_log_exec(krb5_auth_con_getauthenticator, credentials->ctx, context->auth_ctx,
1520 if (!krb5glue_authenticator_validate_chksum(authenticator, GSS_CHECKSUM_TYPE,
1524 if ((ap_flags & AP_OPTS_MUTUAL_REQUIRED) && (context->flags & SSPI_GSS_C_MUTUAL_FLAG))
1528 if (krb_log_exec(krb5_mk_rep, credentials->ctx, context->auth_ctx, &output_token))
1530 if (!sspi_gss_wrap_token(output_buffer,
1531 context->u2u ? &kerberos_u2u_OID : &kerberos_OID,
1532 TOK_ID_AP_REP, &output_token))
1538 output_buffer->cbBuffer = 0;
1541 *pfContextAttr = (context->flags & 0x1F);
1542 if (context->flags & SSPI_GSS_C_INTEG_FLAG)
1543 *pfContextAttr |= ASC_RET_INTEGRITY;
1545 if (context->flags & SSPI_GSS_C_SEQUENCE_FLAG)
1547 if (krb_log_exec(krb5_auth_con_getlocalseqnumber, credentials->ctx, context->auth_ctx,
1548 (INT32*)&context->local_seq))
1550 if (krb_log_exec(krb5_auth_con_getremoteseqnumber, credentials->ctx, context->auth_ctx,
1551 (INT32*)&context->remote_seq))
1555 if (krb_log_exec(krb5glue_update_keyset, credentials->ctx, context->auth_ctx, TRUE,
1559 context->state = KERBEROS_STATE_FINAL;
1565 if (context->state == KERBEROS_STATE_FINAL)
1568 status = SEC_I_CONTINUE_NEEDED;
1572 if (output_token.data)
1573 krb5glue_free_data_contents(credentials->ctx, &output_token);
1574 if (entry.principal)
1575 krb5glue_free_keytab_entry_contents(credentials->ctx, &entry);
1582 case SEC_I_CONTINUE_NEEDED:
1583 sspi_SecureHandleSetLowerPointer(phNewContext, context);
1584 sspi_SecureHandleSetUpperPointer(phNewContext, KERBEROS_SSP_NAME);
1587 kerberos_ContextFree(context, TRUE);
1595 status = SEC_E_INVALID_TOKEN;
1598 return SEC_E_UNSUPPORTED_FUNCTION;
1603static KRB_CONTEXT* get_context(
PCtxtHandle phContext)
1608 TCHAR* name = sspi_SecureHandleGetUpperPointer(phContext);
1612 if (_tcsncmp(KERBEROS_SSP_NAME, name, ARRAYSIZE(KERBEROS_SSP_NAME)) != 0)
1614 return sspi_SecureHandleGetLowerPointer(phContext);
1617static BOOL copy_krb5_data(krb5_data* data, PUCHAR* ptr, ULONG* psize)
1621 WINPR_ASSERT(psize);
1623 *ptr = (PUCHAR)malloc(data->length);
1627 *psize = data->length;
1628 memcpy(*ptr, data->data, data->length);
1633static SECURITY_STATUS
1634 SEC_ENTRY kerberos_DeleteSecurityContext(WINPR_ATTR_UNUSED
PCtxtHandle phContext)
1637 KRB_CONTEXT* context = get_context(phContext);
1639 return SEC_E_INVALID_HANDLE;
1641 kerberos_ContextFree(context, TRUE);
1645 return SEC_E_UNSUPPORTED_FUNCTION;
1651static SECURITY_STATUS krb5_error_to_SECURITY_STATUS(krb5_error_code code)
1658 return SEC_E_INTERNAL_ERROR;
1662static SECURITY_STATUS kerberos_ATTR_SIZES(KRB_CONTEXT* context, KRB_CREDENTIALS* credentials,
1668 krb5glue_key key =
nullptr;
1670 WINPR_ASSERT(context);
1671 WINPR_ASSERT(context->auth_ctx);
1677 ContextSizes->cbMaxToken = KERBEROS_SecPkgInfoA.cbMaxToken;
1678 ContextSizes->cbMaxSignature = 0;
1679 ContextSizes->cbBlockSize = 1;
1680 ContextSizes->cbSecurityTrailer = 0;
1682 key = get_key(&context->keyset);
1684 if (context->flags & SSPI_GSS_C_CONF_FLAG)
1686 krb5_error_code rv = krb_log_exec(krb5glue_crypto_length, credentials->ctx, key,
1687 KRB5_CRYPTO_TYPE_HEADER, &header);
1689 return krb5_error_to_SECURITY_STATUS(rv);
1691 rv = krb_log_exec(krb5glue_crypto_length, credentials->ctx, key, KRB5_CRYPTO_TYPE_PADDING,
1694 return krb5_error_to_SECURITY_STATUS(rv);
1696 rv = krb_log_exec(krb5glue_crypto_length, credentials->ctx, key, KRB5_CRYPTO_TYPE_TRAILER,
1699 return krb5_error_to_SECURITY_STATUS(rv);
1702 ContextSizes->cbSecurityTrailer = header + pad + trailer + 32;
1705 if (context->flags & SSPI_GSS_C_INTEG_FLAG)
1707 krb5_error_code rv = krb_log_exec(krb5glue_crypto_length, credentials->ctx, key,
1708 KRB5_CRYPTO_TYPE_CHECKSUM, &ContextSizes->cbMaxSignature);
1710 return krb5_error_to_SECURITY_STATUS(rv);
1712 ContextSizes->cbMaxSignature += 16;
1718static SECURITY_STATUS kerberos_ATTR_AUTH_IDENTITY(KRB_CONTEXT* context,
1719 KRB_CREDENTIALS* credentials,
1724 WINPR_ASSERT(context);
1725 WINPR_ASSERT(context->auth_ctx);
1726 WINPR_ASSERT(credentials);
1728 WINPR_ASSERT(AuthIdentity);
1729 *AuthIdentity = empty;
1731 krb5glue_authenticator authenticator =
nullptr;
1732 krb5_error_code rv = krb_log_exec(krb5_auth_con_getauthenticator, credentials->ctx,
1733 context->auth_ctx, &authenticator);
1740#if defined(WITH_KRB5_HEIMDAL)
1741 const Realm data = authenticator->crealm;
1744 const size_t data_len = length_Realm(&data);
1746 krb5_data* realm_data = krb5_princ_realm(credentials->ctx, authenticator->client);
1749 const char* data = realm_data->data;
1752 const size_t data_len = realm_data->length;
1755 if (data_len > (
sizeof(AuthIdentity->Domain) - 1))
1757 strncpy(AuthIdentity->Domain, data, data_len);
1761#if defined(WITH_KRB5_HEIMDAL)
1762 const PrincipalName* principal = &authenticator->cname;
1763 const size_t name_length = length_PrincipalName(principal);
1764 if (!principal->name_string.val)
1766 const char* name = *principal->name_string.val;
1768 char* name =
nullptr;
1769 rv = krb_log_exec(krb5_unparse_name_flags, credentials->ctx, authenticator->client,
1770 KRB5_PRINCIPAL_UNPARSE_NO_REALM, &name);
1774 const size_t name_length = strlen(name);
1777 const bool ok = (name_length <= (
sizeof(AuthIdentity->User) - 1));
1779 strncpy(AuthIdentity->User, name, name_length);
1783#if !defined(WITH_KRB5_HEIMDAL)
1784 krb5_free_unparsed_name(credentials->ctx, name);
1789 krb5glue_free_authenticator(credentials->ctx, authenticator);
1790 return krb5_error_to_SECURITY_STATUS(rv);
1793static SECURITY_STATUS kerberos_ATTR_PACKAGE_INFO(WINPR_ATTR_UNUSED KRB_CONTEXT* context,
1794 WINPR_ATTR_UNUSED KRB_CREDENTIALS* credentials,
1799 (
SecPkgInfoA*)sspi_ContextBufferAlloc(QuerySecurityPackageInfoIndex, size);
1802 return SEC_E_INSUFFICIENT_MEMORY;
1804 pPackageInfo->fCapabilities = KERBEROS_SecPkgInfoA.fCapabilities;
1805 pPackageInfo->wVersion = KERBEROS_SecPkgInfoA.wVersion;
1806 pPackageInfo->wRPCID = KERBEROS_SecPkgInfoA.wRPCID;
1807 pPackageInfo->cbMaxToken = KERBEROS_SecPkgInfoA.cbMaxToken;
1808 pPackageInfo->Name = _strdup(KERBEROS_SecPkgInfoA.Name);
1809 pPackageInfo->Comment = _strdup(KERBEROS_SecPkgInfoA.Comment);
1811 if (!pPackageInfo->Name || !pPackageInfo->Comment)
1813 sspi_ContextBufferFree(pPackageInfo);
1814 return SEC_E_INSUFFICIENT_MEMORY;
1816 PackageInfo->PackageInfo = pPackageInfo;
1820static SECURITY_STATUS kerberos_ATTR_TICKET_LOGON(KRB_CONTEXT* context,
1821 KRB_CREDENTIALS* credentials,
1824 krb5_creds matchCred = WINPR_C_ARRAY_INIT;
1825 krb5_auth_context authContext =
nullptr;
1826 krb5_flags getCredsFlags = KRB5_GC_CACHED;
1827 BOOL firstRun = TRUE;
1828 krb5_creds* hostCred =
nullptr;
1829 SECURITY_STATUS ret = SEC_E_INSUFFICIENT_MEMORY;
1830 int rv = krb_log_exec(krb5_sname_to_principal, credentials->ctx, context->targetHost,
"HOST",
1831 KRB5_NT_SRV_HST, &matchCred.server);
1835 rv = krb_log_exec(krb5_cc_get_principal, credentials->ctx, credentials->ccache,
1842 rv = krb_log_exec(krb5_get_credentials, credentials->ctx, getCredsFlags, credentials->ccache,
1843 &matchCred, &hostCred);
1848 case KRB5_CC_NOTFOUND:
1857 WLog_ERR(TAG,
"krb5_get_credentials(hostCreds), rv=%d", rv);
1861 if (krb_log_exec(krb5_auth_con_init, credentials->ctx, &authContext))
1865 krb5_data derOut = WINPR_C_ARRAY_INIT;
1866 if (krb_log_exec(krb5_fwd_tgt_creds, credentials->ctx, authContext, context->targetHost,
1867 matchCred.client, matchCred.server, credentials->ccache, 1, &derOut))
1869 ret = SEC_E_LOGON_DENIED;
1873 ticketLogon->MessageType = KerbTicketLogon;
1874 ticketLogon->Flags = KERB_LOGON_FLAG_REDIRECTED;
1876 if (!copy_krb5_data(&hostCred->ticket, &ticketLogon->ServiceTicket,
1877 &ticketLogon->ServiceTicketLength))
1879 krb5_free_data(credentials->ctx, &derOut);
1883 ticketLogon->TicketGrantingTicketLength = derOut.length;
1884 ticketLogon->TicketGrantingTicket = (PUCHAR)derOut.data;
1889 krb5_auth_con_free(credentials->ctx, authContext);
1890 krb5_free_creds(credentials->ctx, hostCred);
1891 krb5_free_cred_contents(credentials->ctx, &matchCred);
1897static SECURITY_STATUS
1898 SEC_ENTRY kerberos_QueryContextAttributesA(
PCtxtHandle phContext,
1899 WINPR_ATTR_UNUSED ULONG ulAttribute,
void* pBuffer)
1902 return SEC_E_INVALID_HANDLE;
1905 return SEC_E_INVALID_PARAMETER;
1908 KRB_CONTEXT* context = get_context(phContext);
1910 return SEC_E_INVALID_PARAMETER;
1912 KRB_CREDENTIALS* credentials = context->credentials;
1914 switch (ulAttribute)
1916 case SECPKG_ATTR_SIZES:
1919 case SECPKG_ATTR_AUTH_IDENTITY:
1920 return kerberos_ATTR_AUTH_IDENTITY(context, credentials,
1923 case SECPKG_ATTR_PACKAGE_INFO:
1924 return kerberos_ATTR_PACKAGE_INFO(context, credentials,
1927 case SECPKG_CRED_ATTR_TICKET_LOGON:
1928 return kerberos_ATTR_TICKET_LOGON(context, credentials, (
KERB_TICKET_LOGON*)pBuffer);
1931 WLog_ERR(TAG,
"TODO: QueryContextAttributes implement ulAttribute=0x%08" PRIx32,
1933 return SEC_E_UNSUPPORTED_FUNCTION;
1936 return SEC_E_UNSUPPORTED_FUNCTION;
1940static SECURITY_STATUS SEC_ENTRY kerberos_QueryContextAttributesW(
PCtxtHandle phContext,
1941 ULONG ulAttribute,
void* pBuffer)
1943 return kerberos_QueryContextAttributesA(phContext, ulAttribute, pBuffer);
1946static SECURITY_STATUS SEC_ENTRY kerberos_SetContextAttributesW(
1947 WINPR_ATTR_UNUSED
PCtxtHandle phContext, WINPR_ATTR_UNUSED ULONG ulAttribute,
1948 WINPR_ATTR_UNUSED
void* pBuffer, WINPR_ATTR_UNUSED ULONG cbBuffer)
1950 return SEC_E_UNSUPPORTED_FUNCTION;
1953static SECURITY_STATUS SEC_ENTRY kerberos_SetContextAttributesA(
1954 WINPR_ATTR_UNUSED
PCtxtHandle phContext, WINPR_ATTR_UNUSED ULONG ulAttribute,
1955 WINPR_ATTR_UNUSED
void* pBuffer, WINPR_ATTR_UNUSED ULONG cbBuffer)
1957 return SEC_E_UNSUPPORTED_FUNCTION;
1960static SECURITY_STATUS SEC_ENTRY kerberos_SetCredentialsAttributesX(
1961 WINPR_ATTR_UNUSED
PCredHandle phCredential, WINPR_ATTR_UNUSED ULONG ulAttribute,
1962 WINPR_ATTR_UNUSED
void* pBuffer, WINPR_ATTR_UNUSED ULONG cbBuffer,
1963 WINPR_ATTR_UNUSED BOOL unicode)
1966 KRB_CREDENTIALS* credentials =
nullptr;
1969 return SEC_E_INVALID_HANDLE;
1971 credentials = sspi_SecureHandleGetLowerPointer(phCredential);
1974 return SEC_E_INVALID_HANDLE;
1977 return SEC_E_INSUFFICIENT_MEMORY;
1979 switch (ulAttribute)
1981 case SECPKG_CRED_ATTR_KDC_PROXY_SETTINGS:
1987 kdc_settings->Version != KDC_PROXY_SETTINGS_V1 ||
1990 kdc_settings->ProxyServerOffset + kdc_settings->ProxyServerLength)
1991 return SEC_E_INVALID_TOKEN;
1993 if (credentials->kdc_url)
1995 free(credentials->kdc_url);
1996 credentials->kdc_url =
nullptr;
1999 if (kdc_settings->ProxyServerLength > 0)
2001 WCHAR* proxy = (WCHAR*)((BYTE*)pBuffer + kdc_settings->ProxyServerOffset);
2003 credentials->kdc_url = ConvertWCharNToUtf8Alloc(
2004 proxy, kdc_settings->ProxyServerLength /
sizeof(WCHAR),
nullptr);
2005 if (!credentials->kdc_url)
2006 return SEC_E_INSUFFICIENT_MEMORY;
2011 case SECPKG_CRED_ATTR_NAMES:
2012 case SECPKG_ATTR_SUPPORTED_ALGS:
2014 WLog_ERR(TAG,
"TODO: SetCredentialsAttributesX implement ulAttribute=0x%08" PRIx32,
2016 return SEC_E_UNSUPPORTED_FUNCTION;
2020 return SEC_E_UNSUPPORTED_FUNCTION;
2024static SECURITY_STATUS SEC_ENTRY kerberos_SetCredentialsAttributesW(
PCredHandle phCredential,
2026 void* pBuffer, ULONG cbBuffer)
2028 return kerberos_SetCredentialsAttributesX(phCredential, ulAttribute, pBuffer, cbBuffer, TRUE);
2031static SECURITY_STATUS SEC_ENTRY kerberos_SetCredentialsAttributesA(
PCredHandle phCredential,
2033 void* pBuffer, ULONG cbBuffer)
2035 return kerberos_SetCredentialsAttributesX(phCredential, ulAttribute, pBuffer, cbBuffer, FALSE);
2038static SECURITY_STATUS SEC_ENTRY kerberos_EncryptMessage(WINPR_ATTR_UNUSED
PCtxtHandle phContext,
2039 WINPR_ATTR_UNUSED ULONG fQOP,
2041 WINPR_ATTR_UNUSED ULONG MessageSeqNo)
2044 KRB_CONTEXT* context = get_context(phContext);
2047 char* header =
nullptr;
2049 krb5glue_key key =
nullptr;
2050 krb5_keyusage usage = 0;
2051 krb5_crypto_iov encrypt_iov[] = { { KRB5_CRYPTO_TYPE_HEADER, { 0 } },
2052 { KRB5_CRYPTO_TYPE_DATA, { 0 } },
2053 { KRB5_CRYPTO_TYPE_DATA, { 0 } },
2054 { KRB5_CRYPTO_TYPE_PADDING, { 0 } },
2055 { KRB5_CRYPTO_TYPE_TRAILER, { 0 } } };
2058 return SEC_E_INVALID_HANDLE;
2060 if (!(context->flags & SSPI_GSS_C_CONF_FLAG))
2061 return SEC_E_UNSUPPORTED_FUNCTION;
2063 KRB_CREDENTIALS* creds = context->credentials;
2065 sig_buffer = sspi_FindSecBuffer(pMessage, SECBUFFER_TOKEN);
2066 data_buffer = sspi_FindSecBuffer(pMessage, SECBUFFER_DATA);
2068 if (!sig_buffer || !data_buffer)
2069 return SEC_E_INVALID_TOKEN;
2072 return SEC_E_QOP_NOT_SUPPORTED;
2074 flags |= context->acceptor ? FLAG_SENDER_IS_ACCEPTOR : 0;
2075 flags |= FLAG_WRAP_CONFIDENTIAL;
2077 key = get_key(&context->keyset);
2079 return SEC_E_INTERNAL_ERROR;
2081 flags |= context->keyset.acceptor_key == key ? FLAG_ACCEPTOR_SUBKEY : 0;
2083 usage = context->acceptor ? KG_USAGE_ACCEPTOR_SEAL : KG_USAGE_INITIATOR_SEAL;
2086 encrypt_iov[1].data.length = data_buffer->cbBuffer;
2087 encrypt_iov[2].data.length = 16;
2090 if (krb_log_exec(krb5glue_crypto_length_iov, creds->ctx, key, encrypt_iov,
2091 ARRAYSIZE(encrypt_iov)))
2092 return SEC_E_INTERNAL_ERROR;
2093 if (sig_buffer->cbBuffer <
2094 encrypt_iov[0].data.length + encrypt_iov[3].data.length + encrypt_iov[4].data.length + 32)
2095 return SEC_E_INSUFFICIENT_MEMORY;
2098 header = sig_buffer->pvBuffer;
2099 encrypt_iov[2].data.data = header + 16;
2100 encrypt_iov[3].data.data = encrypt_iov[2].data.data + encrypt_iov[2].data.length;
2101 encrypt_iov[4].data.data = encrypt_iov[3].data.data + encrypt_iov[3].data.length;
2102 encrypt_iov[0].data.data = encrypt_iov[4].data.data + encrypt_iov[4].data.length;
2103 encrypt_iov[1].data.data = data_buffer->pvBuffer;
2106 winpr_Data_Write_UINT16_BE(header, TOK_ID_WRAP);
2107 header[2] = WINPR_ASSERTING_INT_CAST(
char, flags);
2108 header[3] = (char)0xFF;
2109 winpr_Data_Write_UINT32(header + 4, 0);
2110 winpr_Data_Write_UINT64_BE(header + 8, (context->local_seq + MessageSeqNo));
2113 CopyMemory(encrypt_iov[2].data.data, header, 16);
2116 const size_t len = 16 + encrypt_iov[3].data.length + encrypt_iov[4].data.length;
2117 winpr_Data_Write_UINT16_BE(header + 6, WINPR_ASSERTING_INT_CAST(UINT16, len));
2119 if (krb_log_exec(krb5glue_encrypt_iov, creds->ctx, key, usage, encrypt_iov,
2120 ARRAYSIZE(encrypt_iov)))
2121 return SEC_E_INTERNAL_ERROR;
2125 return SEC_E_UNSUPPORTED_FUNCTION;
2129static SECURITY_STATUS SEC_ENTRY kerberos_DecryptMessage(WINPR_ATTR_UNUSED
PCtxtHandle phContext,
2131 WINPR_ATTR_UNUSED ULONG MessageSeqNo,
2132 WINPR_ATTR_UNUSED ULONG* pfQOP)
2135 KRB_CONTEXT* context = get_context(phContext);
2138 krb5glue_key key =
nullptr;
2139 krb5_keyusage usage = 0;
2140 uint16_t tok_id = 0;
2144 uint64_t seq_no = 0;
2145 krb5_crypto_iov iov[] = { { KRB5_CRYPTO_TYPE_HEADER, { 0 } },
2146 { KRB5_CRYPTO_TYPE_DATA, { 0 } },
2147 { KRB5_CRYPTO_TYPE_DATA, { 0 } },
2148 { KRB5_CRYPTO_TYPE_PADDING, { 0 } },
2149 { KRB5_CRYPTO_TYPE_TRAILER, { 0 } } };
2152 return SEC_E_INVALID_HANDLE;
2154 if (!(context->flags & SSPI_GSS_C_CONF_FLAG))
2155 return SEC_E_UNSUPPORTED_FUNCTION;
2157 KRB_CREDENTIALS* creds = context->credentials;
2159 sig_buffer = sspi_FindSecBuffer(pMessage, SECBUFFER_TOKEN);
2160 data_buffer = sspi_FindSecBuffer(pMessage, SECBUFFER_DATA);
2162 if (!sig_buffer || !data_buffer || sig_buffer->cbBuffer < 16)
2163 return SEC_E_INVALID_TOKEN;
2166 BYTE* header = sig_buffer->pvBuffer;
2167 tok_id = winpr_Data_Get_UINT16_BE(header);
2169 ec = winpr_Data_Get_UINT16_BE(&header[4]);
2170 rrc = winpr_Data_Get_UINT16_BE(&header[6]);
2171 seq_no = winpr_Data_Get_UINT64_BE(&header[8]);
2174 if ((tok_id != TOK_ID_WRAP) || (header[3] != 0xFF))
2175 return SEC_E_INVALID_TOKEN;
2177 if ((flags & FLAG_SENDER_IS_ACCEPTOR) == context->acceptor)
2178 return SEC_E_INVALID_TOKEN;
2180 if ((context->flags & ISC_REQ_SEQUENCE_DETECT) &&
2181 (seq_no != context->remote_seq + MessageSeqNo))
2182 return SEC_E_OUT_OF_SEQUENCE;
2184 if (!(flags & FLAG_WRAP_CONFIDENTIAL))
2185 return SEC_E_INVALID_TOKEN;
2189 return SEC_E_INVALID_TOKEN;
2192 key = get_key(&context->keyset);
2193 if (!key || ((flags & FLAG_ACCEPTOR_SUBKEY) && (context->keyset.acceptor_key != key)))
2194 return SEC_E_INTERNAL_ERROR;
2195 usage = context->acceptor ? KG_USAGE_INITIATOR_SEAL : KG_USAGE_ACCEPTOR_SEAL;
2198 iov[1].data.length = data_buffer->cbBuffer;
2199 iov[2].data.length = 16;
2200 if (krb_log_exec(krb5glue_crypto_length_iov, creds->ctx, key, iov, ARRAYSIZE(iov)))
2201 return SEC_E_INTERNAL_ERROR;
2204 if (rrc != 16 + iov[3].data.length + iov[4].data.length)
2205 return SEC_E_INVALID_TOKEN;
2206 if (sig_buffer->cbBuffer != 16 + rrc + iov[0].data.length)
2207 return SEC_E_INVALID_TOKEN;
2210 iov[0].data.data = (
char*)&header[16 + rrc + ec];
2211 iov[1].data.data = data_buffer->pvBuffer;
2212 iov[2].data.data = (
char*)&header[16 + ec];
2213 char* data2 = iov[2].data.data;
2214 iov[3].data.data = &data2[iov[2].data.length];
2216 char* data3 = iov[3].data.data;
2217 iov[4].data.data = &data3[iov[3].data.length];
2219 if (krb_log_exec(krb5glue_decrypt_iov, creds->ctx, key, usage, iov, ARRAYSIZE(iov)))
2220 return SEC_E_INTERNAL_ERROR;
2223 winpr_Data_Write_UINT16_BE(iov[2].data.data + 4, ec);
2224 winpr_Data_Write_UINT16_BE(iov[2].data.data + 6, rrc);
2225 if (memcmp(iov[2].data.data, header, 16) != 0)
2226 return SEC_E_MESSAGE_ALTERED;
2232 return SEC_E_UNSUPPORTED_FUNCTION;
2236static SECURITY_STATUS SEC_ENTRY kerberos_MakeSignature(WINPR_ATTR_UNUSED
PCtxtHandle phContext,
2237 WINPR_ATTR_UNUSED ULONG fQOP,
2239 WINPR_ATTR_UNUSED ULONG MessageSeqNo)
2242 KRB_CONTEXT* context = get_context(phContext);
2245 krb5glue_key key =
nullptr;
2246 krb5_keyusage usage = 0;
2248 krb5_crypto_iov iov[] = { { KRB5_CRYPTO_TYPE_DATA, { 0 } },
2249 { KRB5_CRYPTO_TYPE_DATA, { 0 } },
2250 { KRB5_CRYPTO_TYPE_CHECKSUM, { 0 } } };
2253 return SEC_E_INVALID_HANDLE;
2255 if (!(context->flags & SSPI_GSS_C_INTEG_FLAG))
2256 return SEC_E_UNSUPPORTED_FUNCTION;
2258 KRB_CREDENTIALS* creds = context->credentials;
2260 sig_buffer = sspi_FindSecBuffer(pMessage, SECBUFFER_TOKEN);
2261 data_buffer = sspi_FindSecBuffer(pMessage, SECBUFFER_DATA);
2263 if (!sig_buffer || !data_buffer)
2264 return SEC_E_INVALID_TOKEN;
2266 flags |= context->acceptor ? FLAG_SENDER_IS_ACCEPTOR : 0;
2268 key = get_key(&context->keyset);
2270 return SEC_E_INTERNAL_ERROR;
2271 usage = context->acceptor ? KG_USAGE_ACCEPTOR_SIGN : KG_USAGE_INITIATOR_SIGN;
2273 flags |= context->keyset.acceptor_key == key ? FLAG_ACCEPTOR_SUBKEY : 0;
2276 iov[0].data.length = data_buffer->cbBuffer;
2277 iov[1].data.length = 16;
2278 if (krb_log_exec(krb5glue_crypto_length_iov, creds->ctx, key, iov, ARRAYSIZE(iov)))
2279 return SEC_E_INTERNAL_ERROR;
2282 if (sig_buffer->cbBuffer < iov[2].data.length + 16)
2283 return SEC_E_INSUFFICIENT_MEMORY;
2286 char* header = sig_buffer->pvBuffer;
2287 winpr_Data_Write_UINT16_BE(header, TOK_ID_MIC);
2288 header[2] = WINPR_ASSERTING_INT_CAST(
char, flags);
2289 memset(header + 3, 0xFF, 5);
2290 winpr_Data_Write_UINT64_BE(header + 8, (context->local_seq + MessageSeqNo));
2293 iov[0].data.data = data_buffer->pvBuffer;
2294 iov[1].data.data = header;
2295 iov[2].data.data = header + 16;
2297 if (krb_log_exec(krb5glue_make_checksum_iov, creds->ctx, key, usage, iov, ARRAYSIZE(iov)))
2298 return SEC_E_INTERNAL_ERROR;
2300 sig_buffer->cbBuffer = iov[2].data.length + 16;
2304 return SEC_E_UNSUPPORTED_FUNCTION;
2308static SECURITY_STATUS SEC_ENTRY kerberos_VerifySignature(WINPR_ATTR_UNUSED
PCtxtHandle phContext,
2310 WINPR_ATTR_UNUSED ULONG MessageSeqNo,
2311 WINPR_ATTR_UNUSED ULONG* pfQOP)
2316 krb5glue_key key =
nullptr;
2317 krb5_keyusage usage = 0;
2319 uint16_t tok_id = 0;
2320 uint64_t seq_no = 0;
2321 krb5_boolean is_valid = 0;
2322 krb5_crypto_iov iov[] = { { KRB5_CRYPTO_TYPE_DATA, { 0 } },
2323 { KRB5_CRYPTO_TYPE_DATA, { 0 } },
2324 { KRB5_CRYPTO_TYPE_CHECKSUM, { 0 } } };
2325 BYTE cmp_filler[] = { 0xFF, 0xFF, 0xFF, 0xFF, 0xFF };
2327 KRB_CONTEXT* context = get_context(phContext);
2329 return SEC_E_INVALID_HANDLE;
2331 if (!(context->flags & SSPI_GSS_C_INTEG_FLAG))
2332 return SEC_E_UNSUPPORTED_FUNCTION;
2334 sig_buffer = sspi_FindSecBuffer(pMessage, SECBUFFER_TOKEN);
2335 data_buffer = sspi_FindSecBuffer(pMessage, SECBUFFER_DATA);
2337 if (!sig_buffer || !data_buffer || sig_buffer->cbBuffer < 16)
2338 return SEC_E_INVALID_TOKEN;
2341 BYTE* header = sig_buffer->pvBuffer;
2342 tok_id = winpr_Data_Get_UINT16_BE(header);
2344 seq_no = winpr_Data_Get_UINT64_BE((header + 8));
2347 if (tok_id != TOK_ID_MIC)
2348 return SEC_E_INVALID_TOKEN;
2350 if ((flags & FLAG_SENDER_IS_ACCEPTOR) == context->acceptor || flags & FLAG_WRAP_CONFIDENTIAL)
2351 return SEC_E_INVALID_TOKEN;
2353 if (memcmp(header + 3, cmp_filler,
sizeof(cmp_filler)) != 0)
2354 return SEC_E_INVALID_TOKEN;
2356 if (context->flags & ISC_REQ_SEQUENCE_DETECT && seq_no != context->remote_seq + MessageSeqNo)
2357 return SEC_E_OUT_OF_SEQUENCE;
2360 key = get_key(&context->keyset);
2361 if (!key || (flags & FLAG_ACCEPTOR_SUBKEY && context->keyset.acceptor_key != key))
2362 return SEC_E_INTERNAL_ERROR;
2363 usage = context->acceptor ? KG_USAGE_INITIATOR_SIGN : KG_USAGE_ACCEPTOR_SIGN;
2366 KRB_CREDENTIALS* creds = context->credentials;
2367 iov[0].data.length = data_buffer->cbBuffer;
2368 iov[1].data.length = 16;
2369 if (krb_log_exec(krb5glue_crypto_length_iov, creds->ctx, key, iov, ARRAYSIZE(iov)))
2370 return SEC_E_INTERNAL_ERROR;
2372 if (sig_buffer->cbBuffer != iov[2].data.length + 16)
2373 return SEC_E_INTERNAL_ERROR;
2376 iov[0].data.data = data_buffer->pvBuffer;
2377 iov[1].data.data = (
char*)header;
2378 iov[2].data.data = (
char*)&header[16];
2380 if (krb_log_exec(krb5glue_verify_checksum_iov, creds->ctx, key, usage, iov, ARRAYSIZE(iov),
2382 return SEC_E_INTERNAL_ERROR;
2385 return SEC_E_MESSAGE_ALTERED;
2389 return SEC_E_UNSUPPORTED_FUNCTION;
2396 kerberos_QueryCredentialsAttributesA,
2397 kerberos_AcquireCredentialsHandleA,
2398 kerberos_FreeCredentialsHandle,
2400 kerberos_InitializeSecurityContextA,
2401 kerberos_AcceptSecurityContext,
2403 kerberos_DeleteSecurityContext,
2405 kerberos_QueryContextAttributesA,
2408 kerberos_MakeSignature,
2409 kerberos_VerifySignature,
2419 kerberos_EncryptMessage,
2420 kerberos_DecryptMessage,
2421 kerberos_SetContextAttributesA,
2422 kerberos_SetCredentialsAttributesA,
2428 kerberos_QueryCredentialsAttributesW,
2429 kerberos_AcquireCredentialsHandleW,
2430 kerberos_FreeCredentialsHandle,
2432 kerberos_InitializeSecurityContextW,
2433 kerberos_AcceptSecurityContext,
2435 kerberos_DeleteSecurityContext,
2437 kerberos_QueryContextAttributesW,
2440 kerberos_MakeSignature,
2441 kerberos_VerifySignature,
2451 kerberos_EncryptMessage,
2452 kerberos_DecryptMessage,
2453 kerberos_SetContextAttributesW,
2454 kerberos_SetCredentialsAttributesW,
2457BOOL KERBEROS_init(
void)
2459 InitializeConstWCharFromUtf8(KERBEROS_SecPkgInfoA.Name, KERBEROS_SecPkgInfoW_NameBuffer,
2460 ARRAYSIZE(KERBEROS_SecPkgInfoW_NameBuffer));
2461 InitializeConstWCharFromUtf8(KERBEROS_SecPkgInfoA.Comment, KERBEROS_SecPkgInfoW_CommentBuffer,
2462 ARRAYSIZE(KERBEROS_SecPkgInfoW_CommentBuffer));