338 lines
		
	
	
		
			8.3 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			338 lines
		
	
	
		
			8.3 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * Copyright (c) 2006 - 2008 Kungliga Tekniska Högskolan
 | |
|  * (Royal Institute of Technology, Stockholm, Sweden).
 | |
|  * All rights reserved.
 | |
|  *
 | |
|  * Redistribution and use in source and binary forms, with or without
 | |
|  * modification, are permitted provided that the following conditions
 | |
|  * are met:
 | |
|  *
 | |
|  * 1. Redistributions of source code must retain the above copyright
 | |
|  *    notice, this list of conditions and the following disclaimer.
 | |
|  *
 | |
|  * 2. Redistributions in binary form must reproduce the above copyright
 | |
|  *    notice, this list of conditions and the following disclaimer in the
 | |
|  *    documentation and/or other materials provided with the distribution.
 | |
|  *
 | |
|  * 3. Neither the name of KTH nor the names of its contributors may be
 | |
|  *    used to endorse or promote products derived from this software without
 | |
|  *    specific prior written permission.
 | |
|  *
 | |
|  * THIS SOFTWARE IS PROVIDED BY KTH AND ITS CONTRIBUTORS ``AS IS'' AND ANY
 | |
|  * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | |
|  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
 | |
|  * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL KTH OR ITS CONTRIBUTORS BE
 | |
|  * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
 | |
|  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
 | |
|  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
 | |
|  * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
 | |
|  * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
 | |
|  * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
 | |
|  * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 | |
|  */
 | |
| 
 | |
| #include "config.h"
 | |
| 
 | |
| #include <roken.h>
 | |
| #include <stdio.h>
 | |
| #include <gssapi.h>
 | |
| #include <err.h>
 | |
| #include <getarg.h>
 | |
| #include "test_common.h"
 | |
| 
 | |
| #include <krb5.h>
 | |
| #include <heimntlm.h>
 | |
| 
 | |
| static int
 | |
| test_libntlm_v1(int flags)
 | |
| {
 | |
|     const char *user = "foo",
 | |
| 	*domain = "mydomain",
 | |
| 	*password = "digestpassword";
 | |
|     OM_uint32 maj_stat, min_stat;
 | |
|     gss_ctx_id_t ctx = GSS_C_NO_CONTEXT;
 | |
|     gss_buffer_desc input, output;
 | |
|     struct ntlm_type1 type1;
 | |
|     struct ntlm_type2 type2;
 | |
|     struct ntlm_type3 type3;
 | |
|     struct ntlm_buf data;
 | |
|     krb5_error_code ret;
 | |
|     gss_name_t src_name = GSS_C_NO_NAME;
 | |
| 
 | |
|     memset(&type1, 0, sizeof(type1));
 | |
|     memset(&type2, 0, sizeof(type2));
 | |
|     memset(&type3, 0, sizeof(type3));
 | |
| 
 | |
|     type1.flags = NTLM_NEG_UNICODE|NTLM_NEG_TARGET|NTLM_NEG_NTLM|flags;
 | |
|     type1.domain = strdup(domain);
 | |
|     type1.hostname = NULL;
 | |
|     type1.os[0] = 0;
 | |
|     type1.os[1] = 0;
 | |
| 
 | |
|     ret = heim_ntlm_encode_type1(&type1, &data);
 | |
|     if (ret)
 | |
| 	errx(1, "heim_ntlm_encode_type1");
 | |
| 
 | |
|     input.value = data.data;
 | |
|     input.length = data.length;
 | |
| 
 | |
|     output.length = 0;
 | |
|     output.value = NULL;
 | |
| 
 | |
|     maj_stat = gss_accept_sec_context(&min_stat,
 | |
| 				      &ctx,
 | |
| 				      GSS_C_NO_CREDENTIAL,
 | |
| 				      &input,
 | |
| 				      GSS_C_NO_CHANNEL_BINDINGS,
 | |
| 				      NULL,
 | |
| 				      NULL,
 | |
| 				      &output,
 | |
| 				      NULL,
 | |
| 				      NULL,
 | |
| 				      NULL);
 | |
|     free(data.data);
 | |
|     if (GSS_ERROR(maj_stat))
 | |
| 	errx(1, "accept_sec_context v1: %s",
 | |
| 	     gssapi_err(maj_stat, min_stat, GSS_C_NO_OID));
 | |
| 
 | |
|     if (output.length == 0)
 | |
| 	errx(1, "output.length == 0");
 | |
| 
 | |
|     data.data = output.value;
 | |
|     data.length = output.length;
 | |
| 
 | |
|     ret = heim_ntlm_decode_type2(&data, &type2);
 | |
|     if (ret)
 | |
| 	errx(1, "heim_ntlm_decode_type2");
 | |
| 
 | |
|     gss_release_buffer(&min_stat, &output);
 | |
| 
 | |
|     type3.flags = type2.flags;
 | |
|     type3.username = rk_UNCONST(user);
 | |
|     type3.targetname = type2.targetname;
 | |
|     type3.ws = rk_UNCONST("workstation");
 | |
| 
 | |
|     {
 | |
| 	struct ntlm_buf key;
 | |
| 
 | |
| 	heim_ntlm_nt_key(password, &key);
 | |
| 
 | |
| 	heim_ntlm_calculate_ntlm1(key.data, key.length,
 | |
| 				  type2.challenge,
 | |
| 				  &type3.ntlm);
 | |
| 
 | |
| 	if (flags & NTLM_NEG_KEYEX) {
 | |
| 	    struct ntlm_buf sessionkey;
 | |
| 	    heim_ntlm_build_ntlm1_master(key.data, key.length,
 | |
| 					 &sessionkey,
 | |
| 				     &type3.sessionkey);
 | |
| 	    free(sessionkey.data);
 | |
| 	}
 | |
| 	free(key.data);
 | |
|     }
 | |
| 
 | |
|     ret = heim_ntlm_encode_type3(&type3, &data, NULL);
 | |
|     if (ret)
 | |
| 	errx(1, "heim_ntlm_encode_type3");
 | |
| 
 | |
|     input.length = data.length;
 | |
|     input.value = data.data;
 | |
| 
 | |
|     maj_stat = gss_accept_sec_context(&min_stat,
 | |
| 				      &ctx,
 | |
| 				      GSS_C_NO_CREDENTIAL,
 | |
| 				      &input,
 | |
| 				      GSS_C_NO_CHANNEL_BINDINGS,
 | |
| 				      &src_name,
 | |
| 				      NULL,
 | |
| 				      &output,
 | |
| 				      NULL,
 | |
| 				      NULL,
 | |
| 				      NULL);
 | |
|     free(input.value);
 | |
|     if (maj_stat != GSS_S_COMPLETE)
 | |
| 	errx(1, "accept_sec_context v1 2 %s",
 | |
| 	     gssapi_err(maj_stat, min_stat, GSS_C_NO_OID));
 | |
| 
 | |
|     gss_release_buffer(&min_stat, &output);
 | |
|     gss_delete_sec_context(&min_stat, &ctx, NULL);
 | |
| 
 | |
|     if (src_name == GSS_C_NO_NAME)
 | |
| 	errx(1, "no source name!");
 | |
| 
 | |
|     gss_display_name(&min_stat, src_name, &output, NULL);
 | |
| 
 | |
|     printf("src_name: %.*s\n", (int)output.length, (char*)output.value);
 | |
| 
 | |
|     gss_release_name(&min_stat, &src_name);
 | |
|     gss_release_buffer(&min_stat, &output);
 | |
| 
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| static int
 | |
| test_libntlm_v2(int flags)
 | |
| {
 | |
|     const char *user = "foo",
 | |
| 	*domain = "mydomain",
 | |
| 	*password = "digestpassword";
 | |
|     OM_uint32 maj_stat, min_stat;
 | |
|     gss_ctx_id_t ctx = GSS_C_NO_CONTEXT;
 | |
|     gss_buffer_desc input, output;
 | |
|     struct ntlm_type1 type1;
 | |
|     struct ntlm_type2 type2;
 | |
|     struct ntlm_type3 type3;
 | |
|     struct ntlm_buf data;
 | |
|     krb5_error_code ret;
 | |
| 
 | |
|     memset(&type1, 0, sizeof(type1));
 | |
|     memset(&type2, 0, sizeof(type2));
 | |
|     memset(&type3, 0, sizeof(type3));
 | |
| 
 | |
|     type1.flags = NTLM_NEG_UNICODE|NTLM_NEG_NTLM|flags;
 | |
|     type1.domain = strdup(domain);
 | |
|     type1.hostname = NULL;
 | |
|     type1.os[0] = 0;
 | |
|     type1.os[1] = 0;
 | |
| 
 | |
|     ret = heim_ntlm_encode_type1(&type1, &data);
 | |
|     if (ret)
 | |
| 	errx(1, "heim_ntlm_encode_type1");
 | |
| 
 | |
|     input.value = data.data;
 | |
|     input.length = data.length;
 | |
| 
 | |
|     output.length = 0;
 | |
|     output.value = NULL;
 | |
| 
 | |
|     maj_stat = gss_accept_sec_context(&min_stat,
 | |
| 				      &ctx,
 | |
| 				      GSS_C_NO_CREDENTIAL,
 | |
| 				      &input,
 | |
| 				      GSS_C_NO_CHANNEL_BINDINGS,
 | |
| 				      NULL,
 | |
| 				      NULL,
 | |
| 				      &output,
 | |
| 				      NULL,
 | |
| 				      NULL,
 | |
| 				      NULL);
 | |
|     free(data.data);
 | |
|     if (GSS_ERROR(maj_stat))
 | |
| 	errx(1, "accept_sec_context v2 %s",
 | |
| 	     gssapi_err(maj_stat, min_stat, GSS_C_NO_OID));
 | |
| 
 | |
|     if (output.length == 0)
 | |
| 	errx(1, "output.length == 0");
 | |
| 
 | |
|     data.data = output.value;
 | |
|     data.length = output.length;
 | |
| 
 | |
|     ret = heim_ntlm_decode_type2(&data, &type2);
 | |
|     if (ret)
 | |
| 	errx(1, "heim_ntlm_decode_type2");
 | |
| 
 | |
|     type3.flags = type2.flags;
 | |
|     type3.username = rk_UNCONST(user);
 | |
|     type3.targetname = type2.targetname;
 | |
|     type3.ws = rk_UNCONST("workstation");
 | |
| 
 | |
|     {
 | |
| 	struct ntlm_buf key;
 | |
| 	unsigned char ntlmv2[16];
 | |
| 
 | |
| 	heim_ntlm_nt_key(password, &key);
 | |
| 
 | |
| 	heim_ntlm_calculate_ntlm2(key.data, key.length,
 | |
| 				  user,
 | |
| 				  type2.targetname,
 | |
| 				  type2.challenge,
 | |
| 				  &type2.targetinfo,
 | |
| 				  ntlmv2,
 | |
| 				  &type3.ntlm);
 | |
| 	free(key.data);
 | |
| 
 | |
| 	if (flags & NTLM_NEG_KEYEX) {
 | |
| 	    struct ntlm_buf sessionkey;
 | |
| 	    heim_ntlm_build_ntlm1_master(ntlmv2, sizeof(ntlmv2),
 | |
| 					 &sessionkey,
 | |
| 					 &type3.sessionkey);
 | |
| 	    free(sessionkey.data);
 | |
| 	}
 | |
|     }
 | |
| 
 | |
|     ret = heim_ntlm_encode_type3(&type3, &data, NULL);
 | |
|     if (ret)
 | |
| 	errx(1, "heim_ntlm_encode_type3");
 | |
| 
 | |
|     input.length = data.length;
 | |
|     input.value = data.data;
 | |
| 
 | |
|     maj_stat = gss_accept_sec_context(&min_stat,
 | |
| 				      &ctx,
 | |
| 				      GSS_C_NO_CREDENTIAL,
 | |
| 				      &input,
 | |
| 				      GSS_C_NO_CHANNEL_BINDINGS,
 | |
| 				      NULL,
 | |
| 				      NULL,
 | |
| 				      &output,
 | |
| 				      NULL,
 | |
| 				      NULL,
 | |
| 				      NULL);
 | |
|     free(input.value);
 | |
|     if (maj_stat != GSS_S_COMPLETE)
 | |
| 	errx(1, "accept_sec_context v2 2 %s",
 | |
| 	     gssapi_err(maj_stat, min_stat, GSS_C_NO_OID));
 | |
| 
 | |
|     gss_delete_sec_context(&min_stat, &ctx, NULL);
 | |
| 
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| 
 | |
| 
 | |
| static int version_flag = 0;
 | |
| static int help_flag	= 0;
 | |
| 
 | |
| static struct getargs args[] = {
 | |
|     {"version",	0,	arg_flag,	&version_flag, "print version", NULL },
 | |
|     {"help",	0,	arg_flag,	&help_flag,  NULL, NULL }
 | |
| };
 | |
| 
 | |
| static void
 | |
| usage (int ret)
 | |
| {
 | |
|     arg_printusage (args, sizeof(args)/sizeof(*args),
 | |
| 		    NULL, "");
 | |
|     exit (ret);
 | |
| }
 | |
| 
 | |
| int
 | |
| main(int argc, char **argv)
 | |
| {
 | |
|     int ret = 0, optidx = 0;
 | |
| 
 | |
|     setprogname(argv[0]);
 | |
| 
 | |
|     if(getarg(args, sizeof(args) / sizeof(args[0]), argc, argv, &optidx))
 | |
| 	usage(1);
 | |
| 
 | |
|     if (help_flag)
 | |
| 	usage (0);
 | |
| 
 | |
|     if(version_flag){
 | |
| 	print_version(NULL);
 | |
| 	exit(0);
 | |
|     }
 | |
| 
 | |
|     argc -= optidx;
 | |
|     argv += optidx;
 | |
| 
 | |
|     ret += test_libntlm_v1(0);
 | |
|     ret += test_libntlm_v1(NTLM_NEG_KEYEX);
 | |
| 
 | |
|     ret += test_libntlm_v2(0);
 | |
|     ret += test_libntlm_v2(NTLM_NEG_KEYEX);
 | |
| 
 | |
|     return 0;
 | |
| }
 | 
