freebsd-nq/eBones/krb/mk_req.c
Mark Murray d79d4a7ced Major cleanup of eBones code:
- Get all functions prototyped or at least defined before use.
- Make code compile (Mostly) clean with -Wall set
- Start to reduce the degree to which DES aka libdes is built in.
- get all functions to the same uniform standard of definition:
int
foo(a, b)
int a;
int *b;
{
   :
}
- fix numerous bugs exposed by above processes.

Note - this replaces the previous work which used an unpopular function
 definition style.
1995-09-07 21:39:00 +00:00

199 lines
6.6 KiB
C

/*
* Copyright 1985, 1986, 1987, 1988 by the Massachusetts Institute
* of Technology.
* For copying and distribution information, please see the file
* <Copyright.MIT>.
*
* from: der: mk_req.c,v 4.17 89/07/07 15:20:35 jtkohl Exp $
* $Id: mk_req.c,v 1.3 1995/07/18 16:39:15 mark Exp $
*/
#if 0
#ifndef lint
static char *rcsid =
"$Id: mk_req.c,v 1.3 1995/07/18 16:39:15 mark Exp $";
#endif /* lint */
#endif
#include <krb.h>
#include <prot.h>
#include <des.h>
#include <sys/time.h>
#include <strings.h>
extern int krb_ap_req_debug;
static struct timeval tv_local = { 0, 0 };
static int lifetime = DEFAULT_TKT_LIFE;
/*
* krb_mk_req takes a text structure in which an authenticator is to
* be built, the name of a service, an instance, a realm,
* and a checksum. It then retrieves a ticket for
* the desired service and creates an authenticator in the text
* structure passed as the first argument. krb_mk_req returns
* KSUCCESS on success and a Kerberos error code on failure.
*
* The peer procedure on the other end is krb_rd_req. When making
* any changes to this routine it is important to make corresponding
* changes to krb_rd_req.
*
* The authenticator consists of the following:
*
* authent->dat
*
* unsigned char KRB_PROT_VERSION protocol version no.
* unsigned char AUTH_MSG_APPL_REQUEST message type
* (least significant
* bit of above) HOST_BYTE_ORDER local byte ordering
* unsigned char kvno from ticket server's key version
* string realm server's realm
* unsigned char tl ticket length
* unsigned char idl request id length
* text ticket->dat ticket for server
* text req_id->dat request id
*
* The ticket information is retrieved from the ticket cache or
* fetched from Kerberos. The request id (called the "authenticator"
* in the papers on Kerberos) contains the following:
*
* req_id->dat
*
* string cr.pname {name, instance, and
* string cr.pinst realm of principal
* string myrealm making this request}
* 4 bytes checksum checksum argument given
* unsigned char tv_local.tf_usec time (milliseconds)
* 4 bytes tv_local.tv_sec time (seconds)
*
* req_id->length = 3 strings + 3 terminating nulls + 5 bytes for time,
* all rounded up to multiple of 8.
*/
int
krb_mk_req(authent,service,instance,realm,checksum)
register KTEXT authent; /* Place to build the authenticator */
char *service; /* Name of the service */
char *instance; /* Service instance */
char *realm; /* Authentication domain of service */
long checksum; /* Checksum of data (optional) */
{
static KTEXT_ST req_st; /* Temp storage for req id */
register KTEXT req_id = &req_st;
unsigned char *v = authent->dat; /* Prot version number */
unsigned char *t = (authent->dat+1); /* Message type */
unsigned char *kv = (authent->dat+2); /* Key version no */
unsigned char *tl = (authent->dat+4+strlen(realm)); /* Tkt len */
unsigned char *idl = (authent->dat+5+strlen(realm)); /* Reqid len */
CREDENTIALS cr; /* Credentials used by retr */
register KTEXT ticket = &(cr.ticket_st); /* Pointer to tkt_st */
int retval; /* Returned by krb_get_cred */
static Key_schedule key_s;
char myrealm[REALM_SZ];
/* The fixed parts of the authenticator */
*v = (unsigned char) KRB_PROT_VERSION;
*t = (unsigned char) AUTH_MSG_APPL_REQUEST;
*t |= HOST_BYTE_ORDER;
/* Get the ticket and move it into the authenticator */
if (krb_ap_req_debug)
printf("Realm: %s\n",realm);
/*
* Determine realm of these tickets. We will send this to the
* KDC from which we are requesting tickets so it knows what to
* with our session key.
*/
if ((retval = krb_get_tf_realm(TKT_FILE, myrealm)) != KSUCCESS)
return(retval);
retval = krb_get_cred(service,instance,realm,&cr);
if (retval == RET_NOTKT) {
if ((retval = get_ad_tkt(service,instance,realm,lifetime)))
return(retval);
if ((retval = krb_get_cred(service,instance,realm,&cr)))
return(retval);
}
if (retval != KSUCCESS) return (retval);
if (krb_ap_req_debug)
printf("%s %s %s %s %s\n", service, instance, realm,
cr.pname, cr.pinst);
*kv = (unsigned char) cr.kvno;
(void) strcpy((char *)(authent->dat+3),realm);
*tl = (unsigned char) ticket->length;
bcopy((char *)(ticket->dat),(char *)(authent->dat+6+strlen(realm)),
ticket->length);
authent->length = 6 + strlen(realm) + ticket->length;
if (krb_ap_req_debug)
printf("Ticket->length = %d\n",ticket->length);
if (krb_ap_req_debug)
printf("Issue date: %ld\n",cr.issue_date);
/* Build request id */
(void) strcpy((char *)(req_id->dat),cr.pname); /* Auth name */
req_id->length = strlen(cr.pname)+1;
/* Principal's instance */
(void) strcpy((char *)(req_id->dat+req_id->length),cr.pinst);
req_id->length += strlen(cr.pinst)+1;
/* Authentication domain */
(void) strcpy((char *)(req_id->dat+req_id->length),myrealm);
req_id->length += strlen(myrealm)+1;
/* Checksum */
bcopy((char *)&checksum,(char *)(req_id->dat+req_id->length),4);
req_id->length += 4;
/* Fill in the times on the request id */
(void) gettimeofday(&tv_local,(struct timezone *) 0);
*(req_id->dat+(req_id->length)++) =
(unsigned char) tv_local.tv_usec;
/* Time (coarse) */
bcopy((char *)&(tv_local.tv_sec),
(char *)(req_id->dat+req_id->length), 4);
req_id->length += 4;
/* Fill to a multiple of 8 bytes for DES */
req_id->length = ((req_id->length+7)/8)*8;
#ifndef NOENCRYPTION
key_sched((C_Block *)cr.session,key_s);
pcbc_encrypt((C_Block *)req_id->dat,(C_Block *)req_id->dat,
(long)req_id->length,key_s,(C_Block *)cr.session,ENCRYPT);
bzero((char *) key_s, sizeof(key_s));
#endif /* NOENCRYPTION */
/* Copy it into the authenticator */
bcopy((char *)(req_id->dat),(char *)(authent->dat+authent->length),
req_id->length);
authent->length += req_id->length;
/* And set the id length */
*idl = (unsigned char) req_id->length;
/* clean up */
bzero((char *)req_id, sizeof(*req_id));
if (krb_ap_req_debug)
printf("Authent->length = %d\n",authent->length);
if (krb_ap_req_debug)
printf("idl = %d, tl = %d\n",(int) *idl, (int) *tl);
return(KSUCCESS);
}
/*
* krb_set_lifetime sets the default lifetime for additional tickets
* obtained via krb_mk_req().
*
* It returns the previous value of the default lifetime.
*/
int
krb_set_lifetime(newval)
int newval;
{
int olife = lifetime;
lifetime = newval;
return(olife);
}