pkinit_lib.c revision 2
2N/A/* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */
2N/A/*
2N/A * COPYRIGHT (C) 2006,2007
2N/A * THE REGENTS OF THE UNIVERSITY OF MICHIGAN
2N/A * ALL RIGHTS RESERVED
2N/A *
2N/A * Permission is granted to use, copy, create derivative works
2N/A * and redistribute this software and such derivative works
2N/A * for any purpose, so long as the name of The University of
2N/A * Michigan is not used in any advertising or publicity
2N/A * pertaining to the use of distribution of this software
2N/A * without specific, written prior authorization. If the
2N/A * above copyright notice or any other identification of the
2N/A * University of Michigan is included in any copy of any
2N/A * portion of this software, then the disclaimer below must
2N/A * also be included.
2N/A *
2N/A * THIS SOFTWARE IS PROVIDED AS IS, WITHOUT REPRESENTATION
2N/A * FROM THE UNIVERSITY OF MICHIGAN AS TO ITS FITNESS FOR ANY
2N/A * PURPOSE, AND WITHOUT WARRANTY BY THE UNIVERSITY OF
2N/A * MICHIGAN OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING
2N/A * WITHOUT LIMITATION THE IMPLIED WARRANTIES OF
2N/A * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE
2N/A * REGENTS OF THE UNIVERSITY OF MICHIGAN SHALL NOT BE LIABLE
2N/A * FOR ANY DAMAGES, INCLUDING SPECIAL, INDIRECT, INCIDENTAL, OR
2N/A * CONSEQUENTIAL DAMAGES, WITH RESPECT TO ANY CLAIM ARISING
2N/A * OUT OF OR IN CONNECTION WITH THE USE OF THE SOFTWARE, EVEN
2N/A * IF IT HAS BEEN OR IS HEREAFTER ADVISED OF THE POSSIBILITY OF
2N/A * SUCH DAMAGES.
2N/A */
2N/A
2N/A#include <stdio.h>
2N/A#include <stdlib.h>
2N/A#include <errno.h>
2N/A#include <unistd.h>
2N/A#include <string.h>
2N/A#include <ctype.h>
2N/A#include <assert.h>
2N/A
2N/A#include "k5-platform.h"
2N/A
2N/A#include "pkinit.h"
2N/A
2N/A#define FAKECERT
2N/A
2N/Aconst krb5_octet_data
2N/Adh_oid = { 0, 7, (unsigned char *)"\x2A\x86\x48\xce\x3e\x02\x01" };
2N/A
2N/A
2N/Akrb5_error_code
2N/Apkinit_init_req_opts(pkinit_req_opts **reqopts)
2N/A{
2N/A krb5_error_code retval = ENOMEM;
2N/A pkinit_req_opts *opts = NULL;
2N/A
2N/A *reqopts = NULL;
2N/A opts = calloc(1, sizeof(*opts));
2N/A if (opts == NULL)
2N/A return retval;
2N/A
2N/A opts->require_eku = 1;
2N/A opts->accept_secondary_eku = 0;
2N/A opts->allow_upn = 0;
2N/A opts->dh_or_rsa = DH_PROTOCOL;
2N/A opts->require_crl_checking = 0;
2N/A opts->dh_size = PKINIT_DEFAULT_DH_MIN_BITS;
2N/A opts->win2k_target = 0;
2N/A opts->win2k_require_cksum = 0;
2N/A
2N/A *reqopts = opts;
2N/A
2N/A return 0;
2N/A}
2N/A
2N/Avoid
2N/Apkinit_fini_req_opts(pkinit_req_opts *opts)
2N/A{
2N/A free(opts);
2N/A return;
2N/A}
2N/A
2N/Akrb5_error_code
2N/Apkinit_init_plg_opts(pkinit_plg_opts **plgopts)
2N/A{
2N/A krb5_error_code retval = ENOMEM;
2N/A pkinit_plg_opts *opts = NULL;
2N/A
2N/A *plgopts = NULL;
2N/A opts = calloc(1, sizeof(pkinit_plg_opts));
2N/A if (opts == NULL)
2N/A return retval;
2N/A
2N/A opts->require_eku = 1;
2N/A opts->accept_secondary_eku = 0;
2N/A opts->dh_or_rsa = DH_PROTOCOL;
2N/A opts->allow_upn = 0;
2N/A opts->require_crl_checking = 0;
2N/A
2N/A opts->dh_min_bits = PKINIT_DEFAULT_DH_MIN_BITS;
2N/A
2N/A *plgopts = opts;
2N/A
2N/A return 0;
2N/A}
2N/A
2N/Avoid
2N/Apkinit_fini_plg_opts(pkinit_plg_opts *opts)
2N/A{
2N/A free(opts);
2N/A return;
2N/A}
2N/A
2N/Avoid
2N/Afree_krb5_pa_pk_as_req(krb5_pa_pk_as_req **in)
2N/A{
2N/A if (*in == NULL) return;
free((*in)->signedAuthPack.data);
if ((*in)->trustedCertifiers != NULL)
free_krb5_external_principal_identifier(&(*in)->trustedCertifiers);
free((*in)->kdcPkId.data);
free(*in);
}
void
free_krb5_pa_pk_as_req_draft9(krb5_pa_pk_as_req_draft9 **in)
{
if (*in == NULL) return;
free((*in)->signedAuthPack.data);
free((*in)->kdcCert.data);
free((*in)->encryptionCert.data);
if ((*in)->trustedCertifiers != NULL)
free_krb5_trusted_ca(&(*in)->trustedCertifiers);
free(*in);
}
void
free_krb5_reply_key_pack(krb5_reply_key_pack **in)
{
if (*in == NULL) return;
free((*in)->replyKey.contents);
free((*in)->asChecksum.contents);
free(*in);
}
void
free_krb5_reply_key_pack_draft9(krb5_reply_key_pack_draft9 **in)
{
if (*in == NULL) return;
free((*in)->replyKey.contents);
free(*in);
}
void
free_krb5_auth_pack(krb5_auth_pack **in)
{
if ((*in) == NULL) return;
if ((*in)->clientPublicValue != NULL) {
free((*in)->clientPublicValue->algorithm.algorithm.data);
free((*in)->clientPublicValue->algorithm.parameters.data);
free((*in)->clientPublicValue->subjectPublicKey.data);
free((*in)->clientPublicValue);
}
free((*in)->pkAuthenticator.paChecksum.contents);
if ((*in)->supportedCMSTypes != NULL)
free_krb5_algorithm_identifiers(&((*in)->supportedCMSTypes));
free(*in);
}
void
free_krb5_auth_pack_draft9(krb5_context context,
krb5_auth_pack_draft9 **in)
{
if ((*in) == NULL) return;
krb5_free_principal(context, (*in)->pkAuthenticator.kdcName);
free(*in);
}
void
free_krb5_pa_pk_as_rep(krb5_pa_pk_as_rep **in)
{
if (*in == NULL) return;
switch ((*in)->choice) {
case choice_pa_pk_as_rep_dhInfo:
free((*in)->u.dh_Info.dhSignedData.data);
break;
case choice_pa_pk_as_rep_encKeyPack:
free((*in)->u.encKeyPack.data);
break;
default:
break;
}
free(*in);
}
void
free_krb5_pa_pk_as_rep_draft9(krb5_pa_pk_as_rep_draft9 **in)
{
if (*in == NULL) return;
free((*in)->u.encKeyPack.data);
free(*in);
}
void
free_krb5_external_principal_identifier(krb5_external_principal_identifier ***in)
{
int i = 0;
if (*in == NULL) return;
while ((*in)[i] != NULL) {
free((*in)[i]->subjectName.data);
free((*in)[i]->issuerAndSerialNumber.data);
free((*in)[i]->subjectKeyIdentifier.data);
free((*in)[i]);
i++;
}
free(*in);
}
void
free_krb5_trusted_ca(krb5_trusted_ca ***in)
{
int i = 0;
if (*in == NULL) return;
while ((*in)[i] != NULL) {
switch((*in)[i]->choice) {
case choice_trusted_cas_principalName:
break;
case choice_trusted_cas_caName:
free((*in)[i]->u.caName.data);
break;
case choice_trusted_cas_issuerAndSerial:
free((*in)[i]->u.issuerAndSerial.data);
break;
case choice_trusted_cas_UNKNOWN:
break;
}
free((*in)[i]);
i++;
}
free(*in);
}
void
free_krb5_typed_data(krb5_typed_data ***in)
{
int i = 0;
if (*in == NULL) return;
while ((*in)[i] != NULL) {
free((*in)[i]->data);
free((*in)[i]);
i++;
}
free(*in);
}
void
free_krb5_algorithm_identifier(krb5_algorithm_identifier *in)
{
if (in == NULL)
return;
free(in->algorithm.data);
free(in->parameters.data);
free(in);
}
void
free_krb5_algorithm_identifiers(krb5_algorithm_identifier ***in)
{
int i;
if (in == NULL || *in == NULL)
return;
for (i = 0; (*in)[i] != NULL; i++) {
free_krb5_algorithm_identifier((*in)[i]);
}
free(*in);
}
void
free_krb5_subject_pk_info(krb5_subject_pk_info **in)
{
if ((*in) == NULL) return;
free((*in)->algorithm.parameters.data);
free((*in)->subjectPublicKey.data);
free(*in);
}
void
free_krb5_kdc_dh_key_info(krb5_kdc_dh_key_info **in)
{
if (*in == NULL) return;
free((*in)->subjectPublicKey.data);
free(*in);
}
void
init_krb5_pa_pk_as_req(krb5_pa_pk_as_req **in)
{
(*in) = malloc(sizeof(krb5_pa_pk_as_req));
if ((*in) == NULL) return;
(*in)->signedAuthPack.data = NULL;
(*in)->signedAuthPack.length = 0;
(*in)->trustedCertifiers = NULL;
(*in)->kdcPkId.data = NULL;
(*in)->kdcPkId.length = 0;
}
void
init_krb5_pa_pk_as_req_draft9(krb5_pa_pk_as_req_draft9 **in)
{
(*in) = malloc(sizeof(krb5_pa_pk_as_req_draft9));
if ((*in) == NULL) return;
(*in)->signedAuthPack.data = NULL;
(*in)->signedAuthPack.length = 0;
(*in)->trustedCertifiers = NULL;
(*in)->kdcCert.data = NULL;
(*in)->kdcCert.length = 0;
(*in)->encryptionCert.data = NULL;
(*in)->encryptionCert.length = 0;
}
void
init_krb5_reply_key_pack(krb5_reply_key_pack **in)
{
(*in) = malloc(sizeof(krb5_reply_key_pack));
if ((*in) == NULL) return;
(*in)->replyKey.contents = NULL;
(*in)->replyKey.length = 0;
(*in)->asChecksum.contents = NULL;
(*in)->asChecksum.length = 0;
}
void
init_krb5_reply_key_pack_draft9(krb5_reply_key_pack_draft9 **in)
{
(*in) = malloc(sizeof(krb5_reply_key_pack_draft9));
if ((*in) == NULL) return;
(*in)->replyKey.contents = NULL;
(*in)->replyKey.length = 0;
}
void
init_krb5_auth_pack(krb5_auth_pack **in)
{
(*in) = malloc(sizeof(krb5_auth_pack));
if ((*in) == NULL) return;
(*in)->clientPublicValue = NULL;
(*in)->supportedCMSTypes = NULL;
(*in)->clientDHNonce.length = 0;
(*in)->clientDHNonce.data = NULL;
(*in)->pkAuthenticator.paChecksum.contents = NULL;
}
void
init_krb5_auth_pack_draft9(krb5_auth_pack_draft9 **in)
{
(*in) = malloc(sizeof(krb5_auth_pack_draft9));
if ((*in) == NULL) return;
(*in)->clientPublicValue = NULL;
}
void
init_krb5_pa_pk_as_rep(krb5_pa_pk_as_rep **in)
{
(*in) = malloc(sizeof(krb5_pa_pk_as_rep));
if ((*in) == NULL) return;
(*in)->u.dh_Info.serverDHNonce.length = 0;
(*in)->u.dh_Info.serverDHNonce.data = NULL;
(*in)->u.dh_Info.dhSignedData.length = 0;
(*in)->u.dh_Info.dhSignedData.data = NULL;
(*in)->u.encKeyPack.length = 0;
(*in)->u.encKeyPack.data = NULL;
}
void
init_krb5_pa_pk_as_rep_draft9(krb5_pa_pk_as_rep_draft9 **in)
{
(*in) = malloc(sizeof(krb5_pa_pk_as_rep_draft9));
if ((*in) == NULL) return;
(*in)->u.dhSignedData.length = 0;
(*in)->u.dhSignedData.data = NULL;
(*in)->u.encKeyPack.length = 0;
(*in)->u.encKeyPack.data = NULL;
}
void
init_krb5_typed_data(krb5_typed_data **in)
{
(*in) = malloc(sizeof(krb5_typed_data));
if ((*in) == NULL) return;
(*in)->type = 0;
(*in)->length = 0;
(*in)->data = NULL;
}
void
init_krb5_subject_pk_info(krb5_subject_pk_info **in)
{
(*in) = malloc(sizeof(krb5_subject_pk_info));
if ((*in) == NULL) return;
(*in)->algorithm.parameters.data = NULL;
(*in)->algorithm.parameters.length = 0;
(*in)->subjectPublicKey.data = NULL;
(*in)->subjectPublicKey.length = 0;
}
krb5_error_code
pkinit_copy_krb5_octet_data(krb5_octet_data *dst, const krb5_octet_data *src)
{
if (dst == NULL || src == NULL)
return EINVAL;
if (src->data == NULL) {
dst->data = NULL;
dst->length = 0;
return 0;
}
dst->data = malloc(src->length);
if (dst->data == NULL)
return ENOMEM;
memcpy(dst->data, src->data, src->length);
dst->length = src->length;
return 0;
}
/* debugging functions */
/*
* Solaris Kerberos
* Make first argument const to work better with OpenSSL 1.0
*/
void
print_buffer(const unsigned char *buf, unsigned int len)
{
unsigned i = 0;
if (len <= 0)
return;
for (i = 0; i < len; i++)
pkiDebug("%02x ", buf[i]);
pkiDebug("\n");
}
void
print_buffer_bin(const unsigned char *buf, unsigned int len, char *filename)
{
FILE *f = NULL;
unsigned int i = 0;
if (len <= 0 || filename == NULL)
return;
if ((f = fopen(filename, "w")) == NULL)
return;
set_cloexec_file(f);
for (i = 0; i < len; i++)
fputc(buf[i], f);
fclose(f);
}