krb5: make keyed checksums mandatory where possible
Make keyed checksums mandatory when generating and verifying checksums, with the following exceptions: * the checksum is being generated or verified as part of encrypting data for a legacy (DES) encryption type * the KRB5_CRYPTO_FLAG_ALLOW_UNKEYED_CHECKSUM flag was set on the crypto context, used to allow unkeyed checksums in krb5 authenticators By making unkeyed checksums opt-in, we eliminate a class of potential vulnerabilities where callers could pass unkeyed checksums. Any code that uses the mandatory checksum type for a given non-legacy encryption type should not be affected by this change. It could potentially break, say, a client trying to do FAST with DES keys but, that should not be supported (because FAST KDCs also support AES). Closes: #835
This commit is contained in:
		| @@ -809,16 +809,8 @@ tgs_check_authenticator(krb5_context context, | |||||||
| 	ret = KRB5KRB_AP_ERR_INAPP_CKSUM; | 	ret = KRB5KRB_AP_ERR_INAPP_CKSUM; | ||||||
| 	goto out; | 	goto out; | ||||||
|     } |     } | ||||||
|     /* |  | ||||||
|      * according to RFC1510 it doesn't need to be keyed, |     if (!krb5_checksum_is_collision_proof(context, auth->cksum->cksumtype)) { | ||||||
|      * but according to the latest draft it needs to. |  | ||||||
|      */ |  | ||||||
|     if ( |  | ||||||
| #if 0 |  | ||||||
| !krb5_checksum_is_keyed(context, auth->cksum->cksumtype) |  | ||||||
| 	|| |  | ||||||
| #endif |  | ||||||
|  !krb5_checksum_is_collision_proof(context, auth->cksum->cksumtype)) { |  | ||||||
| 	kdc_log(context, config, 4, "Bad checksum type in authenticator: %d", | 	kdc_log(context, config, 4, "Bad checksum type in authenticator: %d", | ||||||
| 		auth->cksum->cksumtype); | 		auth->cksum->cksumtype); | ||||||
| 	ret =  KRB5KRB_AP_ERR_INAPP_CKSUM; | 	ret =  KRB5KRB_AP_ERR_INAPP_CKSUM; | ||||||
| @@ -832,6 +824,12 @@ tgs_check_authenticator(krb5_context context, | |||||||
| 	krb5_free_error_message(context, msg); | 	krb5_free_error_message(context, msg); | ||||||
| 	goto out; | 	goto out; | ||||||
|     } |     } | ||||||
|  |  | ||||||
|  |     /* | ||||||
|  |      * RFC4120 says the checksum must be collision-proof, but it does | ||||||
|  |      * not require it to be keyed (as the authenticator is encrypted). | ||||||
|  |      */ | ||||||
|  |     _krb5_crypto_set_flags(context, crypto, KRB5_CRYPTO_FLAG_ALLOW_UNKEYED_CHECKSUM); | ||||||
|     ret = krb5_verify_checksum(context, |     ret = krb5_verify_checksum(context, | ||||||
| 			       crypto, | 			       crypto, | ||||||
| 			       KRB5_KU_TGS_REQ_AUTH_CKSUM, | 			       KRB5_KU_TGS_REQ_AUTH_CKSUM, | ||||||
|   | |||||||
| @@ -472,6 +472,7 @@ create_checksum_iov(krb5_context context, | |||||||
| 		    unsigned usage, | 		    unsigned usage, | ||||||
| 		    struct krb5_crypto_iov *iov, | 		    struct krb5_crypto_iov *iov, | ||||||
| 		    int niov, | 		    int niov, | ||||||
|  | 		    krb5_flags flags, | ||||||
| 		    Checksum *result) | 		    Checksum *result) | ||||||
| { | { | ||||||
|     krb5_error_code ret; |     krb5_error_code ret; | ||||||
| @@ -485,6 +486,8 @@ create_checksum_iov(krb5_context context, | |||||||
| 	ret = get_checksum_key(context, crypto, usage, ct, &dkey); | 	ret = get_checksum_key(context, crypto, usage, ct, &dkey); | ||||||
| 	if (ret) | 	if (ret) | ||||||
| 	    return ret; | 	    return ret; | ||||||
|  |     } else if ((flags & KRB5_CRYPTO_FLAG_ALLOW_UNKEYED_CHECKSUM) == 0) { | ||||||
|  | 	return EINVAL; | ||||||
|     } else |     } else | ||||||
| 	dkey = NULL; | 	dkey = NULL; | ||||||
|  |  | ||||||
| @@ -500,6 +503,7 @@ create_checksum (krb5_context context, | |||||||
| 		 unsigned usage, | 		 unsigned usage, | ||||||
| 		 void *data, | 		 void *data, | ||||||
| 		 size_t len, | 		 size_t len, | ||||||
|  | 		 krb5_flags flags, | ||||||
| 		 Checksum *result) | 		 Checksum *result) | ||||||
| { | { | ||||||
|     int ret; |     int ret; | ||||||
| @@ -513,7 +517,7 @@ create_checksum (krb5_context context, | |||||||
|     iov[0].data.length = len; |     iov[0].data.length = len; | ||||||
|     iov[0].flags = KRB5_CRYPTO_TYPE_DATA; |     iov[0].flags = KRB5_CRYPTO_TYPE_DATA; | ||||||
|  |  | ||||||
|     return create_checksum_iov(context, ct, crypto, usage, iov, 1, result); |     return create_checksum_iov(context, ct, crypto, usage, iov, 1, flags, result); | ||||||
| } | } | ||||||
|  |  | ||||||
| static int | static int | ||||||
| @@ -523,6 +527,16 @@ arcfour_checksum_p(struct _krb5_checksum_type *ct, krb5_crypto crypto) | |||||||
| 	(crypto->key.key->keytype == KEYTYPE_ARCFOUR); | 	(crypto->key.key->keytype == KEYTYPE_ARCFOUR); | ||||||
| } | } | ||||||
|  |  | ||||||
|  | static inline krb5_flags | ||||||
|  | crypto_flags(krb5_crypto crypto) | ||||||
|  | { | ||||||
|  |     /* If caller didn't specify a key, unkeyed checksums are the only option */ | ||||||
|  |     if (crypto == NULL) | ||||||
|  | 	return KRB5_CRYPTO_FLAG_ALLOW_UNKEYED_CHECKSUM; | ||||||
|  |     else | ||||||
|  | 	return crypto->flags; | ||||||
|  | } | ||||||
|  |  | ||||||
| KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL | KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL | ||||||
| krb5_create_checksum(krb5_context context, | krb5_create_checksum(krb5_context context, | ||||||
| 		     krb5_crypto crypto, | 		     krb5_crypto crypto, | ||||||
| @@ -557,8 +571,8 @@ krb5_create_checksum(krb5_context context, | |||||||
|     } else |     } else | ||||||
| 	keyusage = CHECKSUM_USAGE(usage); | 	keyusage = CHECKSUM_USAGE(usage); | ||||||
|  |  | ||||||
|     return create_checksum(context, ct, crypto, keyusage, |     return create_checksum(context, ct, crypto, keyusage, data, len, | ||||||
| 			   data, len, result); | 			   crypto_flags(crypto), result); | ||||||
| } | } | ||||||
|  |  | ||||||
| static krb5_error_code | static krb5_error_code | ||||||
| @@ -567,6 +581,7 @@ verify_checksum_iov(krb5_context context, | |||||||
| 		    unsigned usage, /* not krb5_key_usage */ | 		    unsigned usage, /* not krb5_key_usage */ | ||||||
| 		    struct krb5_crypto_iov *iov, | 		    struct krb5_crypto_iov *iov, | ||||||
| 		    int niov, | 		    int niov, | ||||||
|  | 		    krb5_flags flags, | ||||||
| 		    Checksum *cksum) | 		    Checksum *cksum) | ||||||
| { | { | ||||||
|     krb5_error_code ret; |     krb5_error_code ret; | ||||||
| @@ -595,6 +610,13 @@ verify_checksum_iov(krb5_context context, | |||||||
| 	ret = get_checksum_key(context, crypto, usage, ct, &dkey); | 	ret = get_checksum_key(context, crypto, usage, ct, &dkey); | ||||||
| 	if (ret) | 	if (ret) | ||||||
| 	    return ret; | 	    return ret; | ||||||
|  |     } else if ((flags & KRB5_CRYPTO_FLAG_ALLOW_UNKEYED_CHECKSUM) == 0) { | ||||||
|  | 	krb5_clear_error_message (context); | ||||||
|  | 	krb5_set_error_message(context, KRB5KRB_AP_ERR_BAD_INTEGRITY, | ||||||
|  | 			       N_("Unkeyed checksum type %s provided where keyed " | ||||||
|  | 				  "checksum was expected", ""), ct->name); | ||||||
|  |  | ||||||
|  | 	return KRB5KRB_AP_ERR_INAPP_CKSUM; | ||||||
|     } else |     } else | ||||||
| 	dkey = NULL; | 	dkey = NULL; | ||||||
|  |  | ||||||
| @@ -642,6 +664,7 @@ verify_checksum(krb5_context context, | |||||||
| 		unsigned usage, /* not krb5_key_usage */ | 		unsigned usage, /* not krb5_key_usage */ | ||||||
| 		void *data, | 		void *data, | ||||||
| 		size_t len, | 		size_t len, | ||||||
|  | 		krb5_flags flags, | ||||||
| 		Checksum *cksum) | 		Checksum *cksum) | ||||||
| { | { | ||||||
|     struct krb5_crypto_iov iov[1]; |     struct krb5_crypto_iov iov[1]; | ||||||
| @@ -650,7 +673,7 @@ verify_checksum(krb5_context context, | |||||||
|     iov[0].data.length = len; |     iov[0].data.length = len; | ||||||
|     iov[0].flags = KRB5_CRYPTO_TYPE_DATA; |     iov[0].flags = KRB5_CRYPTO_TYPE_DATA; | ||||||
|  |  | ||||||
|     return verify_checksum_iov(context, crypto, usage, iov, 1, cksum); |     return verify_checksum_iov(context, crypto, usage, iov, 1, flags, cksum); | ||||||
| } | } | ||||||
|  |  | ||||||
| KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL | KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL | ||||||
| @@ -679,7 +702,7 @@ krb5_verify_checksum(krb5_context context, | |||||||
| 	keyusage = CHECKSUM_USAGE(usage); | 	keyusage = CHECKSUM_USAGE(usage); | ||||||
|  |  | ||||||
|     return verify_checksum(context, crypto, keyusage, |     return verify_checksum(context, crypto, keyusage, | ||||||
| 			   data, len, cksum); | 			   data, len, crypto_flags(crypto), cksum); | ||||||
| } | } | ||||||
|  |  | ||||||
| KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL | KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL | ||||||
| @@ -973,6 +996,7 @@ encrypt_internal_derived(krb5_context context, | |||||||
| 			  INTEGRITY_USAGE(usage), | 			  INTEGRITY_USAGE(usage), | ||||||
| 			  p, | 			  p, | ||||||
| 			  block_sz, | 			  block_sz, | ||||||
|  | 			  0, | ||||||
| 			  &cksum); | 			  &cksum); | ||||||
|     if(ret == 0 && cksum.checksum.length != checksum_sz) { |     if(ret == 0 && cksum.checksum.length != checksum_sz) { | ||||||
| 	free_Checksum (&cksum); | 	free_Checksum (&cksum); | ||||||
| @@ -1060,6 +1084,7 @@ encrypt_internal_enc_then_cksum(krb5_context context, | |||||||
| 			  INTEGRITY_USAGE(usage), | 			  INTEGRITY_USAGE(usage), | ||||||
| 			  ivc, | 			  ivc, | ||||||
| 			  et->blocksize + block_sz, | 			  et->blocksize + block_sz, | ||||||
|  | 			  0, | ||||||
| 			  &cksum); | 			  &cksum); | ||||||
|     if(ret == 0 && cksum.checksum.length != checksum_sz) { |     if(ret == 0 && cksum.checksum.length != checksum_sz) { | ||||||
| 	free_Checksum (&cksum); | 	free_Checksum (&cksum); | ||||||
| @@ -1116,6 +1141,7 @@ encrypt_internal(krb5_context context, | |||||||
| 			  0, | 			  0, | ||||||
| 			  p, | 			  p, | ||||||
| 			  block_sz, | 			  block_sz, | ||||||
|  | 			  KRB5_CRYPTO_FLAG_ALLOW_UNKEYED_CHECKSUM, | ||||||
| 			  &cksum); | 			  &cksum); | ||||||
|     if(ret == 0 && cksum.checksum.length != checksum_sz) { |     if(ret == 0 && cksum.checksum.length != checksum_sz) { | ||||||
| 	krb5_clear_error_message (context); | 	krb5_clear_error_message (context); | ||||||
| @@ -1241,6 +1267,7 @@ decrypt_internal_derived(krb5_context context, | |||||||
| 			  INTEGRITY_USAGE(usage), | 			  INTEGRITY_USAGE(usage), | ||||||
| 			  p, | 			  p, | ||||||
| 			  len, | 			  len, | ||||||
|  | 			  0, | ||||||
| 			  &cksum); | 			  &cksum); | ||||||
|     if(ret) { |     if(ret) { | ||||||
| 	free(p); | 	free(p); | ||||||
| @@ -1308,6 +1335,7 @@ decrypt_internal_enc_then_cksum(krb5_context context, | |||||||
| 			  INTEGRITY_USAGE(usage), | 			  INTEGRITY_USAGE(usage), | ||||||
| 			  p, | 			  p, | ||||||
| 			  et->blocksize + len, | 			  et->blocksize + len, | ||||||
|  | 			  0, | ||||||
| 			  &cksum); | 			  &cksum); | ||||||
|     if(ret) { |     if(ret) { | ||||||
| 	free(p); | 	free(p); | ||||||
| @@ -1389,7 +1417,8 @@ decrypt_internal(krb5_context context, | |||||||
|     } |     } | ||||||
|     memset(p + et->confoundersize, 0, checksum_sz); |     memset(p + et->confoundersize, 0, checksum_sz); | ||||||
|     cksum.cksumtype = CHECKSUMTYPE(et->checksum); |     cksum.cksumtype = CHECKSUMTYPE(et->checksum); | ||||||
|     ret = verify_checksum(context, NULL, 0, p, len, &cksum); |     ret = verify_checksum(context, NULL, 0, p, len, | ||||||
|  | 			  KRB5_CRYPTO_FLAG_ALLOW_UNKEYED_CHECKSUM, &cksum); | ||||||
|     free_Checksum(&cksum); |     free_Checksum(&cksum); | ||||||
|     if(ret) { |     if(ret) { | ||||||
| 	free(p); | 	free(p); | ||||||
| @@ -1739,6 +1768,7 @@ krb5_encrypt_iov_ivec(krb5_context context, | |||||||
|                               INTEGRITY_USAGE(usage), |                               INTEGRITY_USAGE(usage), | ||||||
|                               sign_data.data, |                               sign_data.data, | ||||||
|                               sign_data.length, |                               sign_data.length, | ||||||
|  |                               0, | ||||||
|                               &cksum); |                               &cksum); | ||||||
|  |  | ||||||
|         if(ret == 0 && cksum.checksum.length != trailersz) { |         if(ret == 0 && cksum.checksum.length != trailersz) { | ||||||
| @@ -1761,6 +1791,7 @@ krb5_encrypt_iov_ivec(krb5_context context, | |||||||
|                               INTEGRITY_USAGE(usage), |                               INTEGRITY_USAGE(usage), | ||||||
|                               data, |                               data, | ||||||
|                               num_data, |                               num_data, | ||||||
|  |                               0, | ||||||
|                               &cksum); |                               &cksum); | ||||||
|         if (ret) |         if (ret) | ||||||
|             goto cleanup; |             goto cleanup; | ||||||
| @@ -1902,7 +1933,7 @@ krb5_decrypt_iov_ivec(krb5_context context, | |||||||
| 	cksum.cksumtype       = CHECKSUMTYPE(et->keyed_checksum); | 	cksum.cksumtype       = CHECKSUMTYPE(et->keyed_checksum); | ||||||
|  |  | ||||||
| 	ret = verify_checksum_iov(context, crypto, INTEGRITY_USAGE(usage), | 	ret = verify_checksum_iov(context, crypto, INTEGRITY_USAGE(usage), | ||||||
| 	                          data, num_data, &cksum); | 	                          data, num_data, 0, &cksum); | ||||||
| 	if(ret) | 	if(ret) | ||||||
| 	    goto cleanup; | 	    goto cleanup; | ||||||
|     } else { |     } else { | ||||||
| @@ -1928,6 +1959,7 @@ krb5_decrypt_iov_ivec(krb5_context context, | |||||||
| 			      INTEGRITY_USAGE(usage), | 			      INTEGRITY_USAGE(usage), | ||||||
| 			      sign_data.data, | 			      sign_data.data, | ||||||
| 			      sign_data.length, | 			      sign_data.length, | ||||||
|  | 			      0, | ||||||
| 			      &cksum); | 			      &cksum); | ||||||
| 	if(ret) | 	if(ret) | ||||||
| 	    goto cleanup; | 	    goto cleanup; | ||||||
| @@ -2022,7 +2054,7 @@ krb5_create_checksum_iov(krb5_context context, | |||||||
|  |  | ||||||
|     cksum.checksum = civ->data; |     cksum.checksum = civ->data; | ||||||
|     ret = create_checksum_iov(context, ct, crypto, keyusage, |     ret = create_checksum_iov(context, ct, crypto, keyusage, | ||||||
| 			      data, num_data, &cksum); | 			      data, num_data, crypto_flags(crypto), &cksum); | ||||||
|  |  | ||||||
|     if (ret == 0 && type) |     if (ret == 0 && type) | ||||||
| 	*type = cksum.cksumtype; | 	*type = cksum.cksumtype; | ||||||
| @@ -2081,7 +2113,8 @@ krb5_verify_checksum_iov(krb5_context context, | |||||||
|     } else |     } else | ||||||
| 	keyusage = CHECKSUM_USAGE(usage); | 	keyusage = CHECKSUM_USAGE(usage); | ||||||
|  |  | ||||||
|     ret = verify_checksum_iov(context, crypto, keyusage, data, num_data, &cksum); |     ret = verify_checksum_iov(context, crypto, keyusage, data, num_data, | ||||||
|  | 			      crypto_flags(crypto), &cksum); | ||||||
|  |  | ||||||
|     if (ret == 0 && type) |     if (ret == 0 && type) | ||||||
| 	*type = cksum.cksumtype; | 	*type = cksum.cksumtype; | ||||||
| @@ -2563,6 +2596,7 @@ krb5_crypto_init(krb5_context context, | |||||||
|     (*crypto)->key.schedule = NULL; |     (*crypto)->key.schedule = NULL; | ||||||
|     (*crypto)->num_key_usage = 0; |     (*crypto)->num_key_usage = 0; | ||||||
|     (*crypto)->key_usage = NULL; |     (*crypto)->key_usage = NULL; | ||||||
|  |     (*crypto)->flags = 0; | ||||||
|     return 0; |     return 0; | ||||||
| } | } | ||||||
|  |  | ||||||
| @@ -3132,7 +3166,13 @@ krb5_crypto_fx_cf2(krb5_context context, | |||||||
|     return ret; |     return ret; | ||||||
| } | } | ||||||
|  |  | ||||||
|  | KRB5_LIB_FUNCTION void KRB5_LIB_CALL | ||||||
|  | _krb5_crypto_set_flags(krb5_context context, | ||||||
|  | 		       krb5_crypto crypto, | ||||||
|  | 		       krb5_flags flags) | ||||||
|  | { | ||||||
|  |     crypto->flags |= flags; | ||||||
|  | } | ||||||
|  |  | ||||||
| #ifndef HEIMDAL_SMALLER | #ifndef HEIMDAL_SMALLER | ||||||
|  |  | ||||||
|   | |||||||
| @@ -218,6 +218,13 @@ struct krb5_crypto_data { | |||||||
|     HMAC_CTX *hmacctx; |     HMAC_CTX *hmacctx; | ||||||
|     int num_key_usage; |     int num_key_usage; | ||||||
|     struct _krb5_key_usage *key_usage; |     struct _krb5_key_usage *key_usage; | ||||||
|  |     krb5_flags flags; | ||||||
| }; | }; | ||||||
|  |  | ||||||
|  | /* | ||||||
|  |  * Allow generation and verification of unkeyed checksums even when | ||||||
|  |  * key material is available. | ||||||
|  |  */ | ||||||
|  | #define KRB5_CRYPTO_FLAG_ALLOW_UNKEYED_CHECKSUM		    0x01 | ||||||
|  |  | ||||||
| #endif | #endif | ||||||
|   | |||||||
| @@ -832,6 +832,7 @@ EXPORTS | |||||||
| 	_krb5_put_int | 	_krb5_put_int | ||||||
| 	_krb5_s4u2self_to_checksumdata | 	_krb5_s4u2self_to_checksumdata | ||||||
| 	_krb5_HMAC_MD5_checksum | 	_krb5_HMAC_MD5_checksum | ||||||
|  | 	_krb5_crypto_set_flags | ||||||
| 	_krb5_expand_path_tokens	;! | 	_krb5_expand_path_tokens	;! | ||||||
|  |  | ||||||
|         ; kinit helper |         ; kinit helper | ||||||
|   | |||||||
| @@ -73,48 +73,37 @@ _krb5_mk_req_internal(krb5_context context, | |||||||
|     if (ret) |     if (ret) | ||||||
| 	goto out; | 	goto out; | ||||||
|  |  | ||||||
|     /* it's unclear what type of checksum we can use.  try the best one, except: |     /* | ||||||
|      * a) if it's configured differently for the current realm, or |      * Use the default checksum type except for some interoperability cases | ||||||
|      * b) if the session key is des-cbc-crc |      * with older MIT, DCE and Windows KDCs. | ||||||
|      */ |      */ | ||||||
|  |  | ||||||
|     if (in_data) { |     if (in_data) { | ||||||
| 	if(ac->keyblock->keytype == ETYPE_DES_CBC_CRC) { |  | ||||||
| 	    /* this is to make DCE secd (and older MIT kdcs?) happy */ |  | ||||||
| 	    ret = krb5_create_checksum(context, |  | ||||||
| 				       NULL, |  | ||||||
| 				       0, |  | ||||||
| 				       CKSUMTYPE_RSA_MD4, |  | ||||||
| 				       in_data->data, |  | ||||||
| 				       in_data->length, |  | ||||||
| 				       &c); |  | ||||||
| 	} else if(ac->keyblock->keytype == ETYPE_ARCFOUR_HMAC_MD5 || |  | ||||||
| 		  ac->keyblock->keytype == ETYPE_ARCFOUR_HMAC_MD5_56 || |  | ||||||
| 		  ac->keyblock->keytype == ETYPE_DES_CBC_MD4 || |  | ||||||
| 		  ac->keyblock->keytype == ETYPE_DES_CBC_MD5) { |  | ||||||
| 	    /* this is to make MS kdc happy */ |  | ||||||
| 	    ret = krb5_create_checksum(context, |  | ||||||
| 				       NULL, |  | ||||||
| 				       0, |  | ||||||
| 				       CKSUMTYPE_RSA_MD5, |  | ||||||
| 				       in_data->data, |  | ||||||
| 				       in_data->length, |  | ||||||
| 				       &c); |  | ||||||
| 	} else { |  | ||||||
| 	krb5_crypto crypto; | 	krb5_crypto crypto; | ||||||
|  | 	krb5_cksumtype checksum_type = CKSUMTYPE_NONE; | ||||||
|  |  | ||||||
|  | 	if (ac->keyblock->keytype == ETYPE_DES_CBC_CRC) | ||||||
|  | 	    checksum_type = CKSUMTYPE_RSA_MD4; | ||||||
|  | 	else if (ac->keyblock->keytype == ETYPE_DES_CBC_MD4 || | ||||||
|  | 		 ac->keyblock->keytype == ETYPE_DES_CBC_MD5 || | ||||||
|  | 		 ac->keyblock->keytype == ETYPE_ARCFOUR_HMAC_MD5 || | ||||||
|  | 		 ac->keyblock->keytype == ETYPE_ARCFOUR_HMAC_MD5_56) | ||||||
|  | 	    checksum_type = CKSUMTYPE_RSA_MD5; | ||||||
|  | 	else | ||||||
|  | 	    checksum_type = CKSUMTYPE_NONE; | ||||||
|  |  | ||||||
| 	ret = krb5_crypto_init(context, ac->keyblock, 0, &crypto); | 	ret = krb5_crypto_init(context, ac->keyblock, 0, &crypto); | ||||||
| 	if (ret) | 	if (ret) | ||||||
| 	    goto out; | 	    goto out; | ||||||
|  |  | ||||||
|  | 	_krb5_crypto_set_flags(context, crypto, KRB5_CRYPTO_FLAG_ALLOW_UNKEYED_CHECKSUM); | ||||||
| 	ret = krb5_create_checksum(context, | 	ret = krb5_create_checksum(context, | ||||||
| 				   crypto, | 				   crypto, | ||||||
| 				   checksum_usage, | 				   checksum_usage, | ||||||
| 				       0, | 				   checksum_type, | ||||||
| 				   in_data->data, | 				   in_data->data, | ||||||
| 				   in_data->length, | 				   in_data->length, | ||||||
| 				   &c); | 				   &c); | ||||||
| 	krb5_crypto_destroy(context, crypto); | 	krb5_crypto_destroy(context, crypto); | ||||||
| 	} |  | ||||||
| 	c_opt = &c; | 	c_opt = &c; | ||||||
|     } else { |     } else { | ||||||
| 	c_opt = NULL; | 	c_opt = NULL; | ||||||
|   | |||||||
| @@ -260,6 +260,8 @@ krb5_verify_authenticator_checksum(krb5_context context, | |||||||
|     ret = krb5_crypto_init(context, key, 0, &crypto); |     ret = krb5_crypto_init(context, key, 0, &crypto); | ||||||
|     if (ret) |     if (ret) | ||||||
| 	goto out; | 	goto out; | ||||||
|  |  | ||||||
|  |     _krb5_crypto_set_flags(context, crypto, KRB5_CRYPTO_FLAG_ALLOW_UNKEYED_CHECKSUM); | ||||||
|     ret = krb5_verify_checksum(context, crypto, |     ret = krb5_verify_checksum(context, crypto, | ||||||
|                                KRB5_KU_AP_REQ_AUTH_CKSUM, |                                KRB5_KU_AP_REQ_AUTH_CKSUM, | ||||||
|                                data, len, authenticator->cksum); |                                data, len, authenticator->cksum); | ||||||
|   | |||||||
| @@ -823,6 +823,7 @@ HEIMDAL_KRB5_2.0 { | |||||||
| 		_krb5_put_int; | 		_krb5_put_int; | ||||||
| 		_krb5_s4u2self_to_checksumdata; | 		_krb5_s4u2self_to_checksumdata; | ||||||
| 		_krb5_HMAC_MD5_checksum; | 		_krb5_HMAC_MD5_checksum; | ||||||
|  | 		_krb5_crypto_set_flags; | ||||||
|  |  | ||||||
| 		# kinit helper | 		# kinit helper | ||||||
| 		krb5_get_init_creds_opt_set_pkinit_user_certs; | 		krb5_get_init_creds_opt_set_pkinit_user_certs; | ||||||
|   | |||||||
		Reference in New Issue
	
	Block a user
	 Luke Howard
					Luke Howard