
Status: - And it works! - We have an extensive test based on decoding a rich EK certficate. This test exercises all of: - decoding - encoding with and without decoded open types - copying of decoded values with decoded open types - freeing of decoded values with decoded open types Valgrind finds no memory errors. - Added a manual page for the compiler. - rfc2459.asn1 now has all three primary PKIX types that we care about defined as in RFC5912, with IOS constraints and parameterization: - `Extension` (embeds open type in an `OCTET STRING`) - `OtherName` (embeds open type in an `ANY`-like type) - `SingleAttribute` (embeds open type in an `ANY`-like type) - `AttributeSet` (embeds open type in a `SET OF ANY`-like type) All of these use OIDs as the open type type ID field, but integer open type type ID fields are also supported (and needed, for Kerberos). That will cover every typed hole pattern in all our ASN.1 modules. With this we'll be able to automatically and recursively decode through all subject DN attributes even when the subject DN is a directoryName SAN, and subjectDirectoryAttributes, and all extensions, and all SANs, and all authorization-data elements, and PA-data, and... We're not really using `SingleAttribute` and `AttributeSet` yet because various changes are needed in `lib/hx509` for that. - `asn1_compile` builds and recognizes the subset of X.681/682/683 that we need for, and now use in, rfc2459.asn1. It builds the necessary AST, generates the correct C types, and generates templating for object sets and open types! - See READMEs for details. - Codegen backend not tested; I won't make it implement automatic open type handling, but it should at least not crash by substituting `heim_any` for open types not embedded in `OCTET STRING`. - We're _really_ starting to have problems with the ITU-T ASN.1 grammar and our version of it... Type names have to start with upper-case, value names with lower-case, but it's not enough to disambiguate. The fact the we've allowed value and type names to violate their respective start-with case rules is causing us trouble now that we're adding grammar from X.681/682/683, and we're going to have to undo that. In preparation for that I'm capitalizing the `heim_any` and `heim_any_set` types, and doing some additional cleanup, which requires changes to other parts of Heimdal (all in this same commit for now). Problems we have because of this: - We cannot IMPORT values into modules because we have no idea if a symbol being imported refers to a value or a type because the only clue we would have is the symbol's name, so we assume IMPORTed symbols are for types. This means we can't import OIDs, for example, which is super annoying. One thing we might be able to do here is mark imported symbols as being of an undetermined-but-not-undefined type, then coerce the symbol's type the first time it's used in a context where its type is inferred as type, value, object, object set, or class. (Though since we don't generate C symbols for objects or classes, we won't be able to import them, especially since we need to know them at compile time and cannot defer their handling to link- or run-time.) - The `NULL` type name, and the `NULL` value name now cause two reduce/reduce conflicts via the `FieldSetting` production. - Various shift/reduce conflicts involving `NULL` values in non-top-level contexts (in constraints, for example). - Currently I have a bug where to disambiguate the grammar I have a CLASS_IDENTIFIER token that is all caps, while TYPE_IDENTIFIER must start with a capital but not be all caps, but this breaks Kerberos since all its types are all capitalized -- oof! To fix this I made it so class names have to be all caps and start with an underscore (ick). TBD: - Check all the XXX comments and address them - Apply this treatment to Kerberos! Automatic handling of authz-data sounds useful :) - Apply this treatment to PKCS#10 (CSRs) and other ASN.1 modules too. - Replace various bits of code in `lib/hx509/` with uses of this feature. - Add JER. - Enhance `hxtool` and `asn1_print`. Getting there!
395 lines
10 KiB
C
395 lines
10 KiB
C
/*
|
|
* Copyright (c) 1997-2016 Kungliga Tekniska Högskolan
|
|
* (Royal Institute of Technology, Stockholm, Sweden).
|
|
* All rights reserved.
|
|
*
|
|
* Portions Copyright (c) 2009 Apple Inc. All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
*
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
*
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
*
|
|
* 3. Neither the name of the Institute nor the names of its contributors
|
|
* may be used to endorse or promote products derived from this software
|
|
* without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*/
|
|
|
|
/* $Id$ */
|
|
|
|
#ifndef __KRB5_LOCL_H__
|
|
#define __KRB5_LOCL_H__
|
|
|
|
#include <config.h>
|
|
#include <roken.h>
|
|
|
|
#include <ctype.h>
|
|
|
|
#ifdef HAVE_POLL_H
|
|
#include <sys/poll.h>
|
|
#endif
|
|
|
|
#include <krb5-types.h>
|
|
|
|
#ifdef HAVE_SYS_TYPES_H
|
|
#include <sys/types.h>
|
|
#endif
|
|
#ifdef HAVE_SYS_MMAN_H
|
|
#include <sys/mman.h>
|
|
#endif
|
|
|
|
#if defined(HAVE_SYS_IOCTL_H) && SunOS != 40
|
|
#include <sys/ioctl.h>
|
|
#endif
|
|
#ifdef HAVE_PWD_H
|
|
#undef _POSIX_PTHREAD_SEMANTICS
|
|
/* This gets us the 5-arg getpwnam_r on Solaris 9. */
|
|
#define _POSIX_PTHREAD_SEMANTICS
|
|
#include <pwd.h>
|
|
#endif
|
|
|
|
#ifdef HAVE_SYS_SELECT_H
|
|
#include <sys/select.h>
|
|
#endif
|
|
#ifdef _AIX
|
|
struct mbuf;
|
|
#endif
|
|
#ifdef HAVE_SYS_FILIO_H
|
|
#include <sys/filio.h>
|
|
#endif
|
|
#ifdef HAVE_SYS_FILE_H
|
|
#include <sys/file.h>
|
|
#endif
|
|
|
|
#include <com_err.h>
|
|
|
|
#include <heimbase.h>
|
|
|
|
#define HEIMDAL_TEXTDOMAIN "heimdal_krb5"
|
|
|
|
#ifdef LIBINTL
|
|
#include <libintl.h>
|
|
#define N_(x,y) dgettext(HEIMDAL_TEXTDOMAIN, x)
|
|
#else
|
|
#define N_(x,y) (x)
|
|
#define bindtextdomain(package, localedir)
|
|
#endif
|
|
|
|
|
|
#ifdef HAVE_CRYPT_H
|
|
#undef des_encrypt
|
|
#define des_encrypt wingless_pigs_mostly_fail_to_fly
|
|
#include <crypt.h>
|
|
#undef des_encrypt
|
|
#endif
|
|
|
|
#ifdef HAVE_DOOR_CREATE
|
|
#include <door.h>
|
|
#endif
|
|
|
|
#include <parse_time.h>
|
|
#include <base64.h>
|
|
|
|
#include <wind.h>
|
|
|
|
/*
|
|
* We use OpenSSL for EC, but to do this we need to disable cross-references
|
|
* between OpenSSL and hcrypto bn.h and such. Source files that use OpenSSL EC
|
|
* must define HEIM_NO_CRYPTO_HDRS before including this file.
|
|
*/
|
|
#define HC_DEPRECATED_CRYPTO
|
|
#ifndef HEIM_NO_CRYPTO_HDRS
|
|
#include "crypto-headers.h"
|
|
#endif
|
|
|
|
|
|
#include <krb5_asn1.h>
|
|
typedef Krb5Int32 krb5int32;
|
|
typedef Krb5UInt32 krb5uint32;
|
|
#include <pkinit_asn1.h>
|
|
|
|
struct send_to_kdc;
|
|
|
|
/* XXX glue for pkinit */
|
|
struct hx509_certs_data;
|
|
struct krb5_pk_identity;
|
|
struct krb5_pk_cert;
|
|
struct ContentInfo;
|
|
struct AlgorithmIdentifier;
|
|
typedef struct krb5_pk_init_ctx_data *krb5_pk_init_ctx;
|
|
struct krb5_dh_moduli;
|
|
|
|
/* v4 glue */
|
|
struct _krb5_krb_auth_data;
|
|
|
|
#include <der.h>
|
|
|
|
#include <krb5.h>
|
|
#include <krb5_err.h>
|
|
#include <k5e1_err.h>
|
|
#include <asn1_err.h>
|
|
#ifdef PKINIT
|
|
#include <hx509.h>
|
|
#endif
|
|
|
|
#include "crypto.h"
|
|
|
|
#include <krb5-private.h>
|
|
|
|
#include "heim_threads.h"
|
|
|
|
#define ALLOC(X, N) (X) = calloc((N), sizeof(*(X)))
|
|
#define ALLOC_SEQ(X, N) do { (X)->len = (N); ALLOC((X)->val, (N)); } while(0)
|
|
|
|
#ifndef __func__
|
|
#define __func__ "unknown-function"
|
|
#endif
|
|
|
|
#define krb5_einval(context, argnum) _krb5_einval((context), __func__, (argnum))
|
|
|
|
#ifndef PATH_SEP
|
|
#define PATH_SEP ":"
|
|
#endif
|
|
|
|
/* should this be public? */
|
|
#define KEYTAB_DEFAULT "FILE:" SYSCONFDIR "/krb5.keytab"
|
|
#define KEYTAB_DEFAULT_MODIFY "FILE:" SYSCONFDIR "/krb5.keytab"
|
|
|
|
#ifndef CLIENT_KEYTAB_DEFAULT
|
|
#define CLIENT_KEYTAB_DEFAULT "FILE:" LOCALSTATEDIR "/user/%{euid}/client.keytab";
|
|
#endif
|
|
|
|
#define MODULI_FILE SYSCONFDIR "/krb5.moduli"
|
|
|
|
#ifndef O_BINARY
|
|
#define O_BINARY 0
|
|
#endif
|
|
|
|
#ifndef O_CLOEXEC
|
|
#define O_CLOEXEC 0
|
|
#endif
|
|
|
|
#ifndef SOCK_CLOEXEC
|
|
#define SOCK_CLOEXEC 0
|
|
#endif
|
|
|
|
|
|
#define KRB5_BUFSIZ 2048
|
|
|
|
typedef enum {
|
|
KRB5_INIT_CREDS_TRISTATE_UNSET = 0,
|
|
KRB5_INIT_CREDS_TRISTATE_TRUE,
|
|
KRB5_INIT_CREDS_TRISTATE_FALSE
|
|
} krb5_get_init_creds_tristate;
|
|
|
|
struct _krb5_get_init_creds_opt_private {
|
|
int refcount;
|
|
/* ENC_TIMESTAMP */
|
|
const char *password;
|
|
krb5_s2k_proc key_proc;
|
|
/* PA_PAC_REQUEST */
|
|
krb5_get_init_creds_tristate req_pac;
|
|
/* PKINIT */
|
|
krb5_pk_init_ctx pk_init_ctx;
|
|
krb5_get_init_creds_tristate addressless;
|
|
int flags;
|
|
#define KRB5_INIT_CREDS_CANONICALIZE 1
|
|
#define KRB5_INIT_CREDS_NO_C_CANON_CHECK 2
|
|
#define KRB5_INIT_CREDS_NO_C_NO_EKU_CHECK 4
|
|
#define KRB5_INIT_CREDS_PKINIT_KX_VALID 32
|
|
#define KRB5_INIT_CREDS_PKINIT_NO_KRBTGT_OTHERNAME_CHECK 64
|
|
struct {
|
|
krb5_gic_process_last_req func;
|
|
void *ctx;
|
|
} lr;
|
|
};
|
|
|
|
typedef uint32_t krb5_enctype_set;
|
|
|
|
/*
|
|
* Do not remove or reorder the fields of this structure.
|
|
* Fields that are no longer used should be marked "deprecated".
|
|
* New fields should always be appended to the end of the
|
|
* structure.
|
|
*
|
|
* Although this structure is internal it is shared with
|
|
* plugins and such changes will result in data corruption
|
|
* if plugins are not built with a matching version.
|
|
*/
|
|
typedef struct krb5_context_data {
|
|
heim_context hcontext;
|
|
krb5_enctype *etypes;
|
|
krb5_enctype *cfg_etypes;
|
|
krb5_enctype *etypes_des;/* deprecated */
|
|
krb5_enctype *as_etypes;
|
|
krb5_enctype *tgs_etypes;
|
|
krb5_enctype *permitted_enctypes;
|
|
char **default_realms;
|
|
time_t max_skew;
|
|
time_t kdc_timeout;
|
|
time_t host_timeout;
|
|
unsigned max_retries;
|
|
int32_t kdc_sec_offset;
|
|
int32_t kdc_usec_offset;
|
|
krb5_config_section *cf;
|
|
const krb5_cc_ops **cc_ops;
|
|
int num_cc_ops;
|
|
const char *http_proxy;
|
|
const char *time_fmt;
|
|
krb5_boolean log_utc;
|
|
const char *default_keytab;
|
|
const char *default_keytab_modify;
|
|
krb5_boolean use_admin_kdc;
|
|
krb5_addresses *extra_addresses;
|
|
krb5_boolean scan_interfaces; /* `ifconfig -a' */
|
|
krb5_boolean srv_lookup; /* do SRV lookups */
|
|
krb5_boolean srv_try_txt; /* try TXT records also */
|
|
int32_t fcache_vno; /* create cache files w/ this
|
|
version */
|
|
int num_kt_types; /* # of registered keytab types */
|
|
struct krb5_keytab_data *kt_types; /* registered keytab types */
|
|
const char *date_fmt;
|
|
krb5_error_code error_code;
|
|
krb5_addresses *ignore_addresses;
|
|
char *default_cc_name;
|
|
char *default_cc_name_env;
|
|
char *configured_default_cc_name;
|
|
int default_cc_name_set;
|
|
int large_msg_size;
|
|
int max_msg_size;
|
|
int tgs_negative_timeout; /* timeout for TGS negative cache */
|
|
int flags;
|
|
#define KRB5_CTX_F_DNS_CANONICALIZE_HOSTNAME 1
|
|
#define KRB5_CTX_F_CHECK_PAC 2
|
|
#define KRB5_CTX_F_HOMEDIR_ACCESS 4
|
|
#define KRB5_CTX_F_SOCKETS_INITIALIZED 8
|
|
#define KRB5_CTX_F_RD_REQ_IGNORE 16
|
|
#define KRB5_CTX_F_FCACHE_STRICT_CHECKING 32
|
|
#define KRB5_CTX_F_ENFORCE_OK_AS_DELEGATE 64
|
|
struct send_to_kdc *send_to_kdc;
|
|
#ifdef PKINIT
|
|
hx509_context hx509ctx;
|
|
#endif
|
|
unsigned int num_kdc_requests;
|
|
krb5_name_canon_rule name_canon_rules;
|
|
size_t config_include_depth;
|
|
krb5_boolean no_ticket_store; /* Don't store service tickets */
|
|
} krb5_context_data;
|
|
|
|
#define KRB5_DEFAULT_CCNAME_FILE "FILE:%{TEMP}/krb5cc_%{uid}"
|
|
#define KRB5_DEFAULT_CCNAME_DIR "DIR:%{TEMP}/krb5cc_%{uid}_dir/"
|
|
#define KRB5_DEFAULT_CCNAME_API "API:"
|
|
#define KRB5_DEFAULT_CCNAME_KCM_KCM "KCM:%{uid}"
|
|
#define KRB5_DEFAULT_CCNAME_KCM_API "API:%{uid}"
|
|
|
|
#define EXTRACT_TICKET_ALLOW_CNAME_MISMATCH 1
|
|
#define EXTRACT_TICKET_ALLOW_SERVER_MISMATCH 2
|
|
#define EXTRACT_TICKET_MATCH_REALM 4
|
|
#define EXTRACT_TICKET_AS_REQ 8
|
|
#define EXTRACT_TICKET_TIMESYNC 16
|
|
#define EXTRACT_TICKET_MATCH_ANON 32
|
|
|
|
/*
|
|
* Configurable options
|
|
*/
|
|
|
|
#ifndef KRB5_DEFAULT_CCTYPE
|
|
#ifdef __APPLE__
|
|
#define KRB5_DEFAULT_CCTYPE (&krb5_acc_ops)
|
|
#else
|
|
#define KRB5_DEFAULT_CCTYPE (&krb5_fcc_ops)
|
|
#endif
|
|
#endif
|
|
|
|
#ifndef KRB5_ADDRESSLESS_DEFAULT
|
|
#define KRB5_ADDRESSLESS_DEFAULT TRUE
|
|
#endif
|
|
|
|
#ifndef KRB5_FORWARDABLE_DEFAULT
|
|
#define KRB5_FORWARDABLE_DEFAULT TRUE
|
|
#endif
|
|
|
|
#ifndef KRB5_CONFIGURATION_CHANGE_NOTIFY_NAME
|
|
#define KRB5_CONFIGURATION_CHANGE_NOTIFY_NAME "org.h5l.Kerberos.configuration-changed"
|
|
#endif
|
|
|
|
#ifndef KRB5_FALLBACK_DEFAULT
|
|
#define KRB5_FALLBACK_DEFAULT TRUE
|
|
#endif
|
|
|
|
#ifndef KRB5_TKT_LIFETIME_DEFAULT
|
|
# define KRB5_TKT_LIFETIME_DEFAULT 15778800 /* seconds */
|
|
#endif
|
|
|
|
#ifndef KRB5_TKT_RENEW_LIFETIME_DEFAULT
|
|
# define KRB5_TKT_RENEW_LIFETIME_DEFAULT 15778800 /* seconds */
|
|
#endif
|
|
|
|
#ifdef PKINIT
|
|
|
|
struct krb5_pk_identity {
|
|
hx509_verify_ctx verify_ctx;
|
|
hx509_certs certs;
|
|
hx509_cert cert;
|
|
hx509_certs anchors;
|
|
hx509_certs certpool;
|
|
hx509_revoke_ctx revokectx;
|
|
int flags;
|
|
#define PKINIT_BTMM 1
|
|
};
|
|
|
|
enum krb5_pk_type {
|
|
PKINIT_WIN2K = 1,
|
|
PKINIT_27 = 2
|
|
};
|
|
|
|
enum keyex_enum { USE_RSA, USE_DH, USE_ECDH };
|
|
|
|
struct krb5_pk_init_ctx_data {
|
|
struct krb5_pk_identity *id;
|
|
enum keyex_enum keyex;
|
|
union {
|
|
DH *dh;
|
|
void *eckey;
|
|
} u;
|
|
krb5_data *clientDHNonce;
|
|
struct krb5_dh_moduli **m;
|
|
hx509_peer_info peer;
|
|
enum krb5_pk_type type;
|
|
unsigned int require_binding:1;
|
|
unsigned int require_eku:1;
|
|
unsigned int require_krbtgt_otherName:1;
|
|
unsigned int require_hostname_match:1;
|
|
unsigned int trustedCertifiers:1;
|
|
unsigned int anonymous:1;
|
|
};
|
|
|
|
#endif /* PKINIT */
|
|
|
|
#define ISTILDE(x) (x == '~')
|
|
#ifdef _WIN32
|
|
# define ISPATHSEP(x) (x == '/' || x =='\\')
|
|
#else
|
|
# define ISPATHSEP(x) (x == '/')
|
|
#endif
|
|
|
|
#endif /* __KRB5_LOCL_H__ */
|