reorder code so sequence numbers can can be used
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@12371 ec53bebd-3082-4978-b11e-865c3cabbd6b
This commit is contained in:
@@ -71,10 +71,10 @@ unwrap_des
|
|||||||
krb5_keyblock *key
|
krb5_keyblock *key
|
||||||
)
|
)
|
||||||
{
|
{
|
||||||
u_char *p, *pad;
|
u_char *p, *pad, *seq;
|
||||||
size_t len;
|
size_t len;
|
||||||
MD5_CTX md5;
|
MD5_CTX md5;
|
||||||
u_char hash[16], seq_data[8];
|
u_char hash[16];
|
||||||
des_key_schedule schedule;
|
des_key_schedule schedule;
|
||||||
des_cblock deskey;
|
des_cblock deskey;
|
||||||
des_cblock zero;
|
des_cblock zero;
|
||||||
@@ -83,6 +83,7 @@ unwrap_des
|
|||||||
size_t padlength;
|
size_t padlength;
|
||||||
OM_uint32 ret;
|
OM_uint32 ret;
|
||||||
int cstate;
|
int cstate;
|
||||||
|
int cmp;
|
||||||
|
|
||||||
p = input_message_buffer->value;
|
p = input_message_buffer->value;
|
||||||
ret = gssapi_krb5_verify_header (&p,
|
ret = gssapi_krb5_verify_header (&p,
|
||||||
@@ -154,16 +155,6 @@ unwrap_des
|
|||||||
/* verify sequence number */
|
/* verify sequence number */
|
||||||
|
|
||||||
HEIMDAL_MUTEX_lock(&context_handle->ctx_id_mutex);
|
HEIMDAL_MUTEX_lock(&context_handle->ctx_id_mutex);
|
||||||
krb5_auth_getremoteseqnumber (gssapi_krb5_context,
|
|
||||||
context_handle->auth_context,
|
|
||||||
&seq_number);
|
|
||||||
seq_data[0] = (seq_number >> 0) & 0xFF;
|
|
||||||
seq_data[1] = (seq_number >> 8) & 0xFF;
|
|
||||||
seq_data[2] = (seq_number >> 16) & 0xFF;
|
|
||||||
seq_data[3] = (seq_number >> 24) & 0xFF;
|
|
||||||
memset (seq_data + 4,
|
|
||||||
(context_handle->more_flags & LOCAL) ? 0xFF : 0,
|
|
||||||
4);
|
|
||||||
|
|
||||||
p -= 16;
|
p -= 16;
|
||||||
des_set_key (&deskey, schedule);
|
des_set_key (&deskey, schedule);
|
||||||
@@ -173,13 +164,25 @@ unwrap_des
|
|||||||
memset (deskey, 0, sizeof(deskey));
|
memset (deskey, 0, sizeof(deskey));
|
||||||
memset (schedule, 0, sizeof(schedule));
|
memset (schedule, 0, sizeof(schedule));
|
||||||
|
|
||||||
if (memcmp (p, seq_data, 8) != 0) {
|
seq = p;
|
||||||
|
gssapi_decode_om_uint32(seq, &seq_number);
|
||||||
|
|
||||||
|
if (context_handle->more_flags & LOCAL)
|
||||||
|
cmp = memcmp(&seq[4], "\xff\xff\xff\xff", 4);
|
||||||
|
else
|
||||||
|
cmp = memcmp(&seq[4], "\x00\x00\x00\x00", 4);
|
||||||
|
|
||||||
|
if (cmp != 0) {
|
||||||
|
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
||||||
return GSS_S_BAD_MIC;
|
return GSS_S_BAD_MIC;
|
||||||
}
|
}
|
||||||
|
|
||||||
krb5_auth_con_setremoteseqnumber (gssapi_krb5_context,
|
ret = gssapi_msg_order_check(context_handle->order, seq_number);
|
||||||
context_handle->auth_context,
|
if (ret) {
|
||||||
++seq_number);
|
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
||||||
|
|
||||||
/* copy out data */
|
/* copy out data */
|
||||||
@@ -208,7 +211,7 @@ unwrap_des3
|
|||||||
{
|
{
|
||||||
u_char *p, *pad;
|
u_char *p, *pad;
|
||||||
size_t len;
|
size_t len;
|
||||||
u_char seq[8];
|
u_char *seq;
|
||||||
krb5_data seq_data;
|
krb5_data seq_data;
|
||||||
u_char cksum[20];
|
u_char cksum[20];
|
||||||
int i;
|
int i;
|
||||||
@@ -283,16 +286,6 @@ unwrap_des3
|
|||||||
/* verify sequence number */
|
/* verify sequence number */
|
||||||
|
|
||||||
HEIMDAL_MUTEX_lock(&context_handle->ctx_id_mutex);
|
HEIMDAL_MUTEX_lock(&context_handle->ctx_id_mutex);
|
||||||
krb5_auth_getremoteseqnumber (gssapi_krb5_context,
|
|
||||||
context_handle->auth_context,
|
|
||||||
&seq_number);
|
|
||||||
seq[0] = (seq_number >> 0) & 0xFF;
|
|
||||||
seq[1] = (seq_number >> 8) & 0xFF;
|
|
||||||
seq[2] = (seq_number >> 16) & 0xFF;
|
|
||||||
seq[3] = (seq_number >> 24) & 0xFF;
|
|
||||||
memset (seq + 4,
|
|
||||||
(context_handle->more_flags & LOCAL) ? 0xFF : 0,
|
|
||||||
4);
|
|
||||||
|
|
||||||
p -= 28;
|
p -= 28;
|
||||||
|
|
||||||
@@ -301,6 +294,7 @@ unwrap_des3
|
|||||||
if (ret) {
|
if (ret) {
|
||||||
gssapi_krb5_set_error_string ();
|
gssapi_krb5_set_error_string ();
|
||||||
*minor_status = ret;
|
*minor_status = ret;
|
||||||
|
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
||||||
return GSS_S_FAILURE;
|
return GSS_S_FAILURE;
|
||||||
}
|
}
|
||||||
{
|
{
|
||||||
@@ -317,22 +311,38 @@ unwrap_des3
|
|||||||
if (ret) {
|
if (ret) {
|
||||||
gssapi_krb5_set_error_string ();
|
gssapi_krb5_set_error_string ();
|
||||||
*minor_status = ret;
|
*minor_status = ret;
|
||||||
|
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
||||||
return GSS_S_FAILURE;
|
return GSS_S_FAILURE;
|
||||||
}
|
}
|
||||||
if (seq_data.length != 8) {
|
if (seq_data.length != 8) {
|
||||||
krb5_data_free (&seq_data);
|
krb5_data_free (&seq_data);
|
||||||
|
*minor_status = 0;
|
||||||
|
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
||||||
return GSS_S_BAD_MIC;
|
return GSS_S_BAD_MIC;
|
||||||
}
|
}
|
||||||
|
|
||||||
cmp = memcmp (seq, seq_data.data, seq_data.length);
|
seq = seq_data.data;
|
||||||
|
gssapi_decode_om_uint32(seq, &seq_number);
|
||||||
|
|
||||||
|
if (context_handle->more_flags & LOCAL)
|
||||||
|
cmp = memcmp(&seq[4], "\xff\xff\xff\xff", 4);
|
||||||
|
else
|
||||||
|
cmp = memcmp(&seq[4], "\x00\x00\x00\x00", 4);
|
||||||
|
|
||||||
krb5_data_free (&seq_data);
|
krb5_data_free (&seq_data);
|
||||||
if (cmp != 0) {
|
if (cmp != 0) {
|
||||||
|
*minor_status = 0;
|
||||||
|
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
||||||
return GSS_S_BAD_MIC;
|
return GSS_S_BAD_MIC;
|
||||||
}
|
}
|
||||||
|
|
||||||
krb5_auth_con_setremoteseqnumber (gssapi_krb5_context,
|
ret = gssapi_msg_order_check(context_handle->order, seq_number);
|
||||||
context_handle->auth_context,
|
if (ret) {
|
||||||
++seq_number);
|
*minor_status = 0;
|
||||||
|
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
||||||
|
|
||||||
/* verify checksum */
|
/* verify checksum */
|
||||||
@@ -390,6 +400,9 @@ OM_uint32 gss_unwrap
|
|||||||
OM_uint32 ret;
|
OM_uint32 ret;
|
||||||
krb5_keytype keytype;
|
krb5_keytype keytype;
|
||||||
|
|
||||||
|
output_message_buffer->value = NULL;
|
||||||
|
output_message_buffer->length = 0;
|
||||||
|
|
||||||
if (qop_state != NULL)
|
if (qop_state != NULL)
|
||||||
*qop_state = GSS_C_QOP_DEFAULT;
|
*qop_state = GSS_C_QOP_DEFAULT;
|
||||||
ret = gss_krb5_get_remotekey(context_handle, &key);
|
ret = gss_krb5_get_remotekey(context_handle, &key);
|
||||||
|
@@ -48,12 +48,13 @@ verify_mic_des
|
|||||||
{
|
{
|
||||||
u_char *p;
|
u_char *p;
|
||||||
MD5_CTX md5;
|
MD5_CTX md5;
|
||||||
u_char hash[16], seq_data[8];
|
u_char hash[16], *seq;
|
||||||
des_key_schedule schedule;
|
des_key_schedule schedule;
|
||||||
des_cblock zero;
|
des_cblock zero;
|
||||||
des_cblock deskey;
|
des_cblock deskey;
|
||||||
int32_t seq_number;
|
int32_t seq_number;
|
||||||
OM_uint32 ret;
|
OM_uint32 ret;
|
||||||
|
int cmp;
|
||||||
|
|
||||||
p = token_buffer->value;
|
p = token_buffer->value;
|
||||||
ret = gssapi_krb5_verify_header (&p,
|
ret = gssapi_krb5_verify_header (&p,
|
||||||
@@ -92,16 +93,6 @@ verify_mic_des
|
|||||||
/* verify sequence number */
|
/* verify sequence number */
|
||||||
|
|
||||||
HEIMDAL_MUTEX_lock(&context_handle->ctx_id_mutex);
|
HEIMDAL_MUTEX_lock(&context_handle->ctx_id_mutex);
|
||||||
krb5_auth_getremoteseqnumber (gssapi_krb5_context,
|
|
||||||
context_handle->auth_context,
|
|
||||||
&seq_number);
|
|
||||||
seq_data[0] = (seq_number >> 0) & 0xFF;
|
|
||||||
seq_data[1] = (seq_number >> 8) & 0xFF;
|
|
||||||
seq_data[2] = (seq_number >> 16) & 0xFF;
|
|
||||||
seq_data[3] = (seq_number >> 24) & 0xFF;
|
|
||||||
memset (seq_data + 4,
|
|
||||||
(context_handle->more_flags & LOCAL) ? 0xFF : 0,
|
|
||||||
4);
|
|
||||||
|
|
||||||
p -= 16;
|
p -= 16;
|
||||||
des_set_key (&deskey, schedule);
|
des_set_key (&deskey, schedule);
|
||||||
@@ -111,13 +102,25 @@ verify_mic_des
|
|||||||
memset (deskey, 0, sizeof(deskey));
|
memset (deskey, 0, sizeof(deskey));
|
||||||
memset (schedule, 0, sizeof(schedule));
|
memset (schedule, 0, sizeof(schedule));
|
||||||
|
|
||||||
if (memcmp (p, seq_data, 8) != 0) {
|
seq = p;
|
||||||
|
gssapi_decode_om_uint32(seq, &seq_number);
|
||||||
|
|
||||||
|
if (context_handle->more_flags & LOCAL)
|
||||||
|
cmp = memcmp(&seq[4], "\xff\xff\xff\xff", 4);
|
||||||
|
else
|
||||||
|
cmp = memcmp(&seq[4], "\x00\x00\x00\x00", 4);
|
||||||
|
|
||||||
|
if (cmp != 0) {
|
||||||
|
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
||||||
return GSS_S_BAD_MIC;
|
return GSS_S_BAD_MIC;
|
||||||
}
|
}
|
||||||
|
|
||||||
krb5_auth_con_setremoteseqnumber (gssapi_krb5_context,
|
ret = gssapi_msg_order_check(context_handle->order, seq_number);
|
||||||
context_handle->auth_context,
|
if (ret) {
|
||||||
++seq_number);
|
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
||||||
|
|
||||||
return GSS_S_COMPLETE;
|
return GSS_S_COMPLETE;
|
||||||
@@ -135,7 +138,7 @@ verify_mic_des3
|
|||||||
)
|
)
|
||||||
{
|
{
|
||||||
u_char *p;
|
u_char *p;
|
||||||
u_char seq[8];
|
u_char *seq;
|
||||||
int32_t seq_number;
|
int32_t seq_number;
|
||||||
OM_uint32 ret;
|
OM_uint32 ret;
|
||||||
krb5_crypto crypto;
|
krb5_crypto crypto;
|
||||||
@@ -199,24 +202,29 @@ retry:
|
|||||||
}
|
}
|
||||||
|
|
||||||
HEIMDAL_MUTEX_lock(&context_handle->ctx_id_mutex);
|
HEIMDAL_MUTEX_lock(&context_handle->ctx_id_mutex);
|
||||||
krb5_auth_getremoteseqnumber (gssapi_krb5_context,
|
|
||||||
context_handle->auth_context,
|
seq = seq_data.data;
|
||||||
&seq_number);
|
gssapi_decode_om_uint32(seq, &seq_number);
|
||||||
seq[0] = (seq_number >> 0) & 0xFF;
|
|
||||||
seq[1] = (seq_number >> 8) & 0xFF;
|
if (context_handle->more_flags & LOCAL)
|
||||||
seq[2] = (seq_number >> 16) & 0xFF;
|
cmp = memcmp(&seq[4], "\xff\xff\xff\xff", 4);
|
||||||
seq[3] = (seq_number >> 24) & 0xFF;
|
else
|
||||||
memset (seq + 4,
|
cmp = memcmp(&seq[4], "\x00\x00\x00\x00", 4);
|
||||||
(context_handle->more_flags & LOCAL) ? 0xFF : 0,
|
|
||||||
4);
|
|
||||||
cmp = memcmp (seq, seq_data.data, seq_data.length);
|
|
||||||
krb5_data_free (&seq_data);
|
krb5_data_free (&seq_data);
|
||||||
if (cmp != 0) {
|
if (cmp != 0) {
|
||||||
if (docompat++) {
|
krb5_crypto_destroy (gssapi_krb5_context, crypto);
|
||||||
krb5_crypto_destroy (gssapi_krb5_context, crypto);
|
*minor_status = 0;
|
||||||
return GSS_S_BAD_MIC;
|
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
||||||
} else
|
return GSS_S_BAD_MIC;
|
||||||
goto retry;
|
}
|
||||||
|
|
||||||
|
ret = gssapi_msg_order_check(context_handle->order, seq_number);
|
||||||
|
if (ret) {
|
||||||
|
krb5_crypto_destroy (gssapi_krb5_context, crypto);
|
||||||
|
*minor_status = 0;
|
||||||
|
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
||||||
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* verify checksum */
|
/* verify checksum */
|
||||||
@@ -224,6 +232,7 @@ retry:
|
|||||||
tmp = malloc (message_buffer->length + 8);
|
tmp = malloc (message_buffer->length + 8);
|
||||||
if (tmp == NULL) {
|
if (tmp == NULL) {
|
||||||
krb5_crypto_destroy (gssapi_krb5_context, crypto);
|
krb5_crypto_destroy (gssapi_krb5_context, crypto);
|
||||||
|
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
||||||
*minor_status = ENOMEM;
|
*minor_status = ENOMEM;
|
||||||
return GSS_S_FAILURE;
|
return GSS_S_FAILURE;
|
||||||
}
|
}
|
||||||
@@ -244,12 +253,9 @@ retry:
|
|||||||
gssapi_krb5_set_error_string ();
|
gssapi_krb5_set_error_string ();
|
||||||
krb5_crypto_destroy (gssapi_krb5_context, crypto);
|
krb5_crypto_destroy (gssapi_krb5_context, crypto);
|
||||||
*minor_status = ret;
|
*minor_status = ret;
|
||||||
|
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
||||||
return GSS_S_BAD_MIC;
|
return GSS_S_BAD_MIC;
|
||||||
}
|
}
|
||||||
|
|
||||||
krb5_auth_con_setremoteseqnumber (gssapi_krb5_context,
|
|
||||||
context_handle->auth_context,
|
|
||||||
++seq_number);
|
|
||||||
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
||||||
|
|
||||||
krb5_crypto_destroy (gssapi_krb5_context, crypto);
|
krb5_crypto_destroy (gssapi_krb5_context, crypto);
|
||||||
|
@@ -71,10 +71,10 @@ unwrap_des
|
|||||||
krb5_keyblock *key
|
krb5_keyblock *key
|
||||||
)
|
)
|
||||||
{
|
{
|
||||||
u_char *p, *pad;
|
u_char *p, *pad, *seq;
|
||||||
size_t len;
|
size_t len;
|
||||||
MD5_CTX md5;
|
MD5_CTX md5;
|
||||||
u_char hash[16], seq_data[8];
|
u_char hash[16];
|
||||||
des_key_schedule schedule;
|
des_key_schedule schedule;
|
||||||
des_cblock deskey;
|
des_cblock deskey;
|
||||||
des_cblock zero;
|
des_cblock zero;
|
||||||
@@ -83,6 +83,7 @@ unwrap_des
|
|||||||
size_t padlength;
|
size_t padlength;
|
||||||
OM_uint32 ret;
|
OM_uint32 ret;
|
||||||
int cstate;
|
int cstate;
|
||||||
|
int cmp;
|
||||||
|
|
||||||
p = input_message_buffer->value;
|
p = input_message_buffer->value;
|
||||||
ret = gssapi_krb5_verify_header (&p,
|
ret = gssapi_krb5_verify_header (&p,
|
||||||
@@ -154,16 +155,6 @@ unwrap_des
|
|||||||
/* verify sequence number */
|
/* verify sequence number */
|
||||||
|
|
||||||
HEIMDAL_MUTEX_lock(&context_handle->ctx_id_mutex);
|
HEIMDAL_MUTEX_lock(&context_handle->ctx_id_mutex);
|
||||||
krb5_auth_getremoteseqnumber (gssapi_krb5_context,
|
|
||||||
context_handle->auth_context,
|
|
||||||
&seq_number);
|
|
||||||
seq_data[0] = (seq_number >> 0) & 0xFF;
|
|
||||||
seq_data[1] = (seq_number >> 8) & 0xFF;
|
|
||||||
seq_data[2] = (seq_number >> 16) & 0xFF;
|
|
||||||
seq_data[3] = (seq_number >> 24) & 0xFF;
|
|
||||||
memset (seq_data + 4,
|
|
||||||
(context_handle->more_flags & LOCAL) ? 0xFF : 0,
|
|
||||||
4);
|
|
||||||
|
|
||||||
p -= 16;
|
p -= 16;
|
||||||
des_set_key (&deskey, schedule);
|
des_set_key (&deskey, schedule);
|
||||||
@@ -173,13 +164,25 @@ unwrap_des
|
|||||||
memset (deskey, 0, sizeof(deskey));
|
memset (deskey, 0, sizeof(deskey));
|
||||||
memset (schedule, 0, sizeof(schedule));
|
memset (schedule, 0, sizeof(schedule));
|
||||||
|
|
||||||
if (memcmp (p, seq_data, 8) != 0) {
|
seq = p;
|
||||||
|
gssapi_decode_om_uint32(seq, &seq_number);
|
||||||
|
|
||||||
|
if (context_handle->more_flags & LOCAL)
|
||||||
|
cmp = memcmp(&seq[4], "\xff\xff\xff\xff", 4);
|
||||||
|
else
|
||||||
|
cmp = memcmp(&seq[4], "\x00\x00\x00\x00", 4);
|
||||||
|
|
||||||
|
if (cmp != 0) {
|
||||||
|
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
||||||
return GSS_S_BAD_MIC;
|
return GSS_S_BAD_MIC;
|
||||||
}
|
}
|
||||||
|
|
||||||
krb5_auth_con_setremoteseqnumber (gssapi_krb5_context,
|
ret = gssapi_msg_order_check(context_handle->order, seq_number);
|
||||||
context_handle->auth_context,
|
if (ret) {
|
||||||
++seq_number);
|
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
||||||
|
|
||||||
/* copy out data */
|
/* copy out data */
|
||||||
@@ -208,7 +211,7 @@ unwrap_des3
|
|||||||
{
|
{
|
||||||
u_char *p, *pad;
|
u_char *p, *pad;
|
||||||
size_t len;
|
size_t len;
|
||||||
u_char seq[8];
|
u_char *seq;
|
||||||
krb5_data seq_data;
|
krb5_data seq_data;
|
||||||
u_char cksum[20];
|
u_char cksum[20];
|
||||||
int i;
|
int i;
|
||||||
@@ -283,16 +286,6 @@ unwrap_des3
|
|||||||
/* verify sequence number */
|
/* verify sequence number */
|
||||||
|
|
||||||
HEIMDAL_MUTEX_lock(&context_handle->ctx_id_mutex);
|
HEIMDAL_MUTEX_lock(&context_handle->ctx_id_mutex);
|
||||||
krb5_auth_getremoteseqnumber (gssapi_krb5_context,
|
|
||||||
context_handle->auth_context,
|
|
||||||
&seq_number);
|
|
||||||
seq[0] = (seq_number >> 0) & 0xFF;
|
|
||||||
seq[1] = (seq_number >> 8) & 0xFF;
|
|
||||||
seq[2] = (seq_number >> 16) & 0xFF;
|
|
||||||
seq[3] = (seq_number >> 24) & 0xFF;
|
|
||||||
memset (seq + 4,
|
|
||||||
(context_handle->more_flags & LOCAL) ? 0xFF : 0,
|
|
||||||
4);
|
|
||||||
|
|
||||||
p -= 28;
|
p -= 28;
|
||||||
|
|
||||||
@@ -301,6 +294,7 @@ unwrap_des3
|
|||||||
if (ret) {
|
if (ret) {
|
||||||
gssapi_krb5_set_error_string ();
|
gssapi_krb5_set_error_string ();
|
||||||
*minor_status = ret;
|
*minor_status = ret;
|
||||||
|
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
||||||
return GSS_S_FAILURE;
|
return GSS_S_FAILURE;
|
||||||
}
|
}
|
||||||
{
|
{
|
||||||
@@ -317,22 +311,38 @@ unwrap_des3
|
|||||||
if (ret) {
|
if (ret) {
|
||||||
gssapi_krb5_set_error_string ();
|
gssapi_krb5_set_error_string ();
|
||||||
*minor_status = ret;
|
*minor_status = ret;
|
||||||
|
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
||||||
return GSS_S_FAILURE;
|
return GSS_S_FAILURE;
|
||||||
}
|
}
|
||||||
if (seq_data.length != 8) {
|
if (seq_data.length != 8) {
|
||||||
krb5_data_free (&seq_data);
|
krb5_data_free (&seq_data);
|
||||||
|
*minor_status = 0;
|
||||||
|
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
||||||
return GSS_S_BAD_MIC;
|
return GSS_S_BAD_MIC;
|
||||||
}
|
}
|
||||||
|
|
||||||
cmp = memcmp (seq, seq_data.data, seq_data.length);
|
seq = seq_data.data;
|
||||||
|
gssapi_decode_om_uint32(seq, &seq_number);
|
||||||
|
|
||||||
|
if (context_handle->more_flags & LOCAL)
|
||||||
|
cmp = memcmp(&seq[4], "\xff\xff\xff\xff", 4);
|
||||||
|
else
|
||||||
|
cmp = memcmp(&seq[4], "\x00\x00\x00\x00", 4);
|
||||||
|
|
||||||
krb5_data_free (&seq_data);
|
krb5_data_free (&seq_data);
|
||||||
if (cmp != 0) {
|
if (cmp != 0) {
|
||||||
|
*minor_status = 0;
|
||||||
|
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
||||||
return GSS_S_BAD_MIC;
|
return GSS_S_BAD_MIC;
|
||||||
}
|
}
|
||||||
|
|
||||||
krb5_auth_con_setremoteseqnumber (gssapi_krb5_context,
|
ret = gssapi_msg_order_check(context_handle->order, seq_number);
|
||||||
context_handle->auth_context,
|
if (ret) {
|
||||||
++seq_number);
|
*minor_status = 0;
|
||||||
|
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
||||||
|
|
||||||
/* verify checksum */
|
/* verify checksum */
|
||||||
@@ -390,6 +400,9 @@ OM_uint32 gss_unwrap
|
|||||||
OM_uint32 ret;
|
OM_uint32 ret;
|
||||||
krb5_keytype keytype;
|
krb5_keytype keytype;
|
||||||
|
|
||||||
|
output_message_buffer->value = NULL;
|
||||||
|
output_message_buffer->length = 0;
|
||||||
|
|
||||||
if (qop_state != NULL)
|
if (qop_state != NULL)
|
||||||
*qop_state = GSS_C_QOP_DEFAULT;
|
*qop_state = GSS_C_QOP_DEFAULT;
|
||||||
ret = gss_krb5_get_remotekey(context_handle, &key);
|
ret = gss_krb5_get_remotekey(context_handle, &key);
|
||||||
|
@@ -48,12 +48,13 @@ verify_mic_des
|
|||||||
{
|
{
|
||||||
u_char *p;
|
u_char *p;
|
||||||
MD5_CTX md5;
|
MD5_CTX md5;
|
||||||
u_char hash[16], seq_data[8];
|
u_char hash[16], *seq;
|
||||||
des_key_schedule schedule;
|
des_key_schedule schedule;
|
||||||
des_cblock zero;
|
des_cblock zero;
|
||||||
des_cblock deskey;
|
des_cblock deskey;
|
||||||
int32_t seq_number;
|
int32_t seq_number;
|
||||||
OM_uint32 ret;
|
OM_uint32 ret;
|
||||||
|
int cmp;
|
||||||
|
|
||||||
p = token_buffer->value;
|
p = token_buffer->value;
|
||||||
ret = gssapi_krb5_verify_header (&p,
|
ret = gssapi_krb5_verify_header (&p,
|
||||||
@@ -92,16 +93,6 @@ verify_mic_des
|
|||||||
/* verify sequence number */
|
/* verify sequence number */
|
||||||
|
|
||||||
HEIMDAL_MUTEX_lock(&context_handle->ctx_id_mutex);
|
HEIMDAL_MUTEX_lock(&context_handle->ctx_id_mutex);
|
||||||
krb5_auth_getremoteseqnumber (gssapi_krb5_context,
|
|
||||||
context_handle->auth_context,
|
|
||||||
&seq_number);
|
|
||||||
seq_data[0] = (seq_number >> 0) & 0xFF;
|
|
||||||
seq_data[1] = (seq_number >> 8) & 0xFF;
|
|
||||||
seq_data[2] = (seq_number >> 16) & 0xFF;
|
|
||||||
seq_data[3] = (seq_number >> 24) & 0xFF;
|
|
||||||
memset (seq_data + 4,
|
|
||||||
(context_handle->more_flags & LOCAL) ? 0xFF : 0,
|
|
||||||
4);
|
|
||||||
|
|
||||||
p -= 16;
|
p -= 16;
|
||||||
des_set_key (&deskey, schedule);
|
des_set_key (&deskey, schedule);
|
||||||
@@ -111,13 +102,25 @@ verify_mic_des
|
|||||||
memset (deskey, 0, sizeof(deskey));
|
memset (deskey, 0, sizeof(deskey));
|
||||||
memset (schedule, 0, sizeof(schedule));
|
memset (schedule, 0, sizeof(schedule));
|
||||||
|
|
||||||
if (memcmp (p, seq_data, 8) != 0) {
|
seq = p;
|
||||||
|
gssapi_decode_om_uint32(seq, &seq_number);
|
||||||
|
|
||||||
|
if (context_handle->more_flags & LOCAL)
|
||||||
|
cmp = memcmp(&seq[4], "\xff\xff\xff\xff", 4);
|
||||||
|
else
|
||||||
|
cmp = memcmp(&seq[4], "\x00\x00\x00\x00", 4);
|
||||||
|
|
||||||
|
if (cmp != 0) {
|
||||||
|
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
||||||
return GSS_S_BAD_MIC;
|
return GSS_S_BAD_MIC;
|
||||||
}
|
}
|
||||||
|
|
||||||
krb5_auth_con_setremoteseqnumber (gssapi_krb5_context,
|
ret = gssapi_msg_order_check(context_handle->order, seq_number);
|
||||||
context_handle->auth_context,
|
if (ret) {
|
||||||
++seq_number);
|
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
||||||
|
|
||||||
return GSS_S_COMPLETE;
|
return GSS_S_COMPLETE;
|
||||||
@@ -135,7 +138,7 @@ verify_mic_des3
|
|||||||
)
|
)
|
||||||
{
|
{
|
||||||
u_char *p;
|
u_char *p;
|
||||||
u_char seq[8];
|
u_char *seq;
|
||||||
int32_t seq_number;
|
int32_t seq_number;
|
||||||
OM_uint32 ret;
|
OM_uint32 ret;
|
||||||
krb5_crypto crypto;
|
krb5_crypto crypto;
|
||||||
@@ -199,24 +202,29 @@ retry:
|
|||||||
}
|
}
|
||||||
|
|
||||||
HEIMDAL_MUTEX_lock(&context_handle->ctx_id_mutex);
|
HEIMDAL_MUTEX_lock(&context_handle->ctx_id_mutex);
|
||||||
krb5_auth_getremoteseqnumber (gssapi_krb5_context,
|
|
||||||
context_handle->auth_context,
|
seq = seq_data.data;
|
||||||
&seq_number);
|
gssapi_decode_om_uint32(seq, &seq_number);
|
||||||
seq[0] = (seq_number >> 0) & 0xFF;
|
|
||||||
seq[1] = (seq_number >> 8) & 0xFF;
|
if (context_handle->more_flags & LOCAL)
|
||||||
seq[2] = (seq_number >> 16) & 0xFF;
|
cmp = memcmp(&seq[4], "\xff\xff\xff\xff", 4);
|
||||||
seq[3] = (seq_number >> 24) & 0xFF;
|
else
|
||||||
memset (seq + 4,
|
cmp = memcmp(&seq[4], "\x00\x00\x00\x00", 4);
|
||||||
(context_handle->more_flags & LOCAL) ? 0xFF : 0,
|
|
||||||
4);
|
|
||||||
cmp = memcmp (seq, seq_data.data, seq_data.length);
|
|
||||||
krb5_data_free (&seq_data);
|
krb5_data_free (&seq_data);
|
||||||
if (cmp != 0) {
|
if (cmp != 0) {
|
||||||
if (docompat++) {
|
krb5_crypto_destroy (gssapi_krb5_context, crypto);
|
||||||
krb5_crypto_destroy (gssapi_krb5_context, crypto);
|
*minor_status = 0;
|
||||||
return GSS_S_BAD_MIC;
|
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
||||||
} else
|
return GSS_S_BAD_MIC;
|
||||||
goto retry;
|
}
|
||||||
|
|
||||||
|
ret = gssapi_msg_order_check(context_handle->order, seq_number);
|
||||||
|
if (ret) {
|
||||||
|
krb5_crypto_destroy (gssapi_krb5_context, crypto);
|
||||||
|
*minor_status = 0;
|
||||||
|
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
||||||
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* verify checksum */
|
/* verify checksum */
|
||||||
@@ -224,6 +232,7 @@ retry:
|
|||||||
tmp = malloc (message_buffer->length + 8);
|
tmp = malloc (message_buffer->length + 8);
|
||||||
if (tmp == NULL) {
|
if (tmp == NULL) {
|
||||||
krb5_crypto_destroy (gssapi_krb5_context, crypto);
|
krb5_crypto_destroy (gssapi_krb5_context, crypto);
|
||||||
|
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
||||||
*minor_status = ENOMEM;
|
*minor_status = ENOMEM;
|
||||||
return GSS_S_FAILURE;
|
return GSS_S_FAILURE;
|
||||||
}
|
}
|
||||||
@@ -244,12 +253,9 @@ retry:
|
|||||||
gssapi_krb5_set_error_string ();
|
gssapi_krb5_set_error_string ();
|
||||||
krb5_crypto_destroy (gssapi_krb5_context, crypto);
|
krb5_crypto_destroy (gssapi_krb5_context, crypto);
|
||||||
*minor_status = ret;
|
*minor_status = ret;
|
||||||
|
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
||||||
return GSS_S_BAD_MIC;
|
return GSS_S_BAD_MIC;
|
||||||
}
|
}
|
||||||
|
|
||||||
krb5_auth_con_setremoteseqnumber (gssapi_krb5_context,
|
|
||||||
context_handle->auth_context,
|
|
||||||
++seq_number);
|
|
||||||
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
|
||||||
|
|
||||||
krb5_crypto_destroy (gssapi_krb5_context, crypto);
|
krb5_crypto_destroy (gssapi_krb5_context, crypto);
|
||||||
|
Reference in New Issue
Block a user