2 * Copyright (c) 1997 - 2001 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
17 * 3. Neither the name of the Institute nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34 #include "krb5_locl.h"
35 RCSID("$Id: convert_creds.c,v 1.24 2001/06/20 02:49:21 joda Exp $");
37 static krb5_error_code
38 check_ticket_flags(TicketFlags f)
40 return 0; /* maybe add some more tests here? */
43 /* include this here, to avoid dependencies on libkrb */
45 #define MAX_KTXT_LEN 1250
53 unsigned int length; /* Length of the text */
54 unsigned char dat[MAX_KTXT_LEN]; /* The data itself */
55 u_int32_t mbz; /* zero to catch runaway strings */
59 char service[ANAME_SZ]; /* Service name */
60 char instance[INST_SZ]; /* Instance */
61 char realm[REALM_SZ]; /* Auth domain */
62 des_cblock session; /* Session key */
63 int lifetime; /* Lifetime */
64 int kvno; /* Key version number */
65 struct ktext ticket_st; /* The ticket itself */
66 int32_t issue_date; /* The issue time */
67 char pname[ANAME_SZ]; /* Principal's name */
68 char pinst[INST_SZ]; /* Principal's instance */
72 #define TKTLIFENUMFIXED 64
73 #define TKTLIFEMINFIXED 0x80
74 #define TKTLIFEMAXFIXED 0xBF
75 #define TKTLIFENOEXPIRE 0xFF
76 #define MAXTKTLIFETIME (30*24*3600) /* 30 days */
78 #define NEVERDATE ((time_t)0x7fffffffL)
81 static const int _tkt_lifetimes[TKTLIFENUMFIXED] = {
82 38400, 41055, 43894, 46929, 50174, 53643, 57352, 61318,
83 65558, 70091, 74937, 80119, 85658, 91581, 97914, 104684,
84 111922, 119661, 127935, 136781, 146239, 156350, 167161, 178720,
85 191077, 204289, 218415, 233517, 249664, 266926, 285383, 305116,
86 326213, 348769, 372885, 398668, 426234, 455705, 487215, 520904,
87 556921, 595430, 636601, 680618, 727680, 777995, 831789, 889303,
88 950794, 1016537, 1086825, 1161973, 1242318, 1328218, 1420057, 1518247,
89 1623226, 1735464, 1855462, 1983758, 2120925, 2267576, 2424367, 2592000
93 _krb_time_to_life(time_t start, time_t end)
96 time_t life = end - start;
98 if (life > MAXTKTLIFETIME || life <= 0)
101 if (krb_no_long_lifetimes)
102 return (life + 5*60 - 1)/(5*60);
105 if (end >= NEVERDATE)
106 return TKTLIFENOEXPIRE;
107 if (life < _tkt_lifetimes[0])
108 return (life + 5*60 - 1)/(5*60);
109 for (i=0; i<TKTLIFENUMFIXED; i++)
110 if (life <= _tkt_lifetimes[i])
111 return i + TKTLIFEMINFIXED;
116 /* Convert the v5 credentials in `in_cred' to v4-dito in `v4creds'.
117 * This is done by sending them to the 524 function in the KDC. If
118 * `in_cred' doesn't contain a DES session key, then a new one is
119 * gotten from the KDC and stored in the cred cache `ccache'.
123 krb524_convert_creds_kdc(krb5_context context,
125 struct credentials *v4creds)
132 char realm[REALM_SZ];
133 krb5_creds *v5_creds = in_cred;
135 ret = check_ticket_flags(v5_creds->flags.b);
140 krb5_krbhst_handle handle;
142 ret = krb5_krbhst_init(context,
143 *krb5_princ_realm(context,
150 ret = krb5_sendto (context,
154 krb5_krbhst_free(context, handle);
158 sp = krb5_storage_from_mem(reply.data, reply.length);
161 krb5_set_error_string (context, "malloc: out of memory");
164 krb5_ret_int32(sp, &tmp);
167 memset(v4creds, 0, sizeof(*v4creds));
168 ret = krb5_ret_int32(sp, &tmp);
172 ret = krb5_ret_data(sp, &ticket);
175 v4creds->ticket_st.length = ticket.length;
176 memcpy(v4creds->ticket_st.dat, ticket.data, ticket.length);
177 krb5_data_free(&ticket);
178 ret = krb5_524_conv_principal(context,
185 v4creds->issue_date = v5_creds->times.starttime;
186 v4creds->lifetime = _krb_time_to_life(v4creds->issue_date,
187 v5_creds->times.endtime);
188 ret = krb5_524_conv_principal(context, v5_creds->client,
194 memcpy(v4creds->session, v5_creds->session.keyvalue.data, 8);
196 krb5_set_error_string(context, "converting credentials: %s",
197 krb5_get_err_text(context, ret));
200 krb5_storage_free(sp);
201 krb5_data_free(&reply);
203 if (v5_creds != in_cred)
204 krb5_free_creds (context, v5_creds);
209 krb524_convert_creds_kdc_ccache(krb5_context context,
212 struct credentials *v4creds)
215 krb5_creds *v5_creds = in_cred;
216 krb5_keytype keytype;
218 keytype = v5_creds->session.keytype;
220 if (keytype != ENCTYPE_DES_CBC_CRC) {
221 /* MIT krb524d doesn't like nothing but des-cbc-crc tickets,
225 memset (&template, 0, sizeof(template));
226 template.session.keytype = ENCTYPE_DES_CBC_CRC;
227 ret = krb5_copy_principal (context, in_cred->client, &template.client);
229 krb5_free_creds_contents (context, &template);
232 ret = krb5_copy_principal (context, in_cred->server, &template.server);
234 krb5_free_creds_contents (context, &template);
238 ret = krb5_get_credentials (context, 0, ccache,
239 &template, &v5_creds);
240 krb5_free_creds_contents (context, &template);
245 ret = krb524_convert_creds_kdc(context, v5_creds, v4creds);
247 if (v5_creds != in_cred)
248 krb5_free_creds (context, v5_creds);