/* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */
/* tests/replay.c - test replay cache using libkrb5 functions */
/*
* Copyright (C) 2019 by the Massachusetts Institute of Technology.
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
*
* * Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
*
* * Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in
* the documentation and/or other materials provided with the
* distribution.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
* FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
* COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
* INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
* OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#include "k5-int.h"
int
main(int argc, char **argv)
{
krb5_error_code ret;
krb5_context ctx;
krb5_auth_context c_authcon, s_authcon, s_authcon2;
krb5_rcache rc;
krb5_ccache cc;
krb5_principal client, server;
krb5_creds mcred, *cred, **tmpcreds;
krb5_data der_apreq, der_krbsafe, der_krbpriv, *der_krbcred, tmpdata;
krb5_address addr;
struct in_addr inaddr;
const char *server_name;
assert(argc == 2);
server_name = argv[1];
/* Create client and server auth contexts. (They will use a replay cache
* by default.) */
ret = krb5_init_context(&ctx);
assert(ret == 0);
ret = krb5_auth_con_init(ctx, &c_authcon);
assert(ret == 0);
ret = krb5_auth_con_init(ctx, &s_authcon);
assert(ret == 0);
/* Set dummy addresses for the auth contexts. */
memset(&inaddr, 0, sizeof(inaddr));
addr.addrtype = ADDRTYPE_INET;
addr.length = sizeof(inaddr);
addr.contents = (uint8_t *)&inaddr;
ret = krb5_auth_con_setaddrs(ctx, c_authcon, &addr, &addr);
assert(ret == 0);
ret = krb5_auth_con_setaddrs(ctx, s_authcon, &addr, &addr);
assert(ret == 0);
/* Set up replay caches for the auth contexts. */
tmpdata = string2data("testclient");
ret = krb5_get_server_rcache(ctx, &tmpdata, &rc);
assert(ret == 0);
ret = krb5_auth_con_setrcache(ctx, c_authcon, rc);
assert(ret == 0);
tmpdata = string2data("testserver");
ret = krb5_get_server_rcache(ctx, &tmpdata, &rc);
assert(ret == 0);
ret = krb5_auth_con_setrcache(ctx, s_authcon, rc);
assert(ret == 0);
/* Construct the client and server principal names. */
ret = krb5_cc_default(ctx, &cc);
assert(ret == 0);
ret = krb5_cc_get_principal(ctx, cc, &client);
assert(ret == 0);
ret = krb5_parse_name(ctx, server_name, &server);
assert(ret == 0);
/* Get credentials for the client. */
memset(&mcred, 0, sizeof(mcred));
mcred.client = client;
mcred.server = server;
ret = krb5_get_credentials(ctx, 0, cc, &mcred, &cred);
assert(ret == 0);
/* Send an AP-REP to establish the sessions. */
ret = krb5_mk_req_extended(ctx, &c_authcon, 0, NULL, cred, &der_apreq);
assert(ret == 0);
ret = krb5_rd_req(ctx, &s_authcon, &der_apreq, NULL, NULL, NULL, NULL);
assert(ret == 0);
/* Set up another server auth context with the same rcache name and replay
* the AP-REQ. */
ret = krb5_auth_con_init(ctx, &s_authcon2);
assert(ret == 0);
tmpdata = string2data("testserver");
ret = krb5_get_server_rcache(ctx, &tmpdata, &rc);
assert(ret == 0);
ret = krb5_auth_con_setrcache(ctx, s_authcon2, rc);
assert(ret == 0);
ret = krb5_rd_req(ctx, &s_authcon2, &der_apreq, NULL, NULL, NULL, NULL);
assert(ret == KRB5KRB_AP_ERR_REPEAT);
krb5_auth_con_free(ctx, s_authcon2);
/* Make a KRB-SAFE message with the client auth context. */
tmpdata = string2data("safemsg");
ret = krb5_mk_safe(ctx, c_authcon, &tmpdata, &der_krbsafe, NULL);
assert(ret == 0);
/* Play it back to the client to detect a reflection. */
ret = krb5_rd_safe(ctx, c_authcon, &der_krbsafe, &tmpdata, NULL);
assert(ret == KRB5KRB_AP_ERR_REPEAT);
/* Send it to the server auth context twice, to detect a replay. */
ret = krb5_rd_safe(ctx, s_authcon, &der_krbsafe, &tmpdata, NULL);
assert(ret == 0);
krb5_free_data_contents(ctx, &tmpdata);
ret = krb5_rd_safe(ctx, s_authcon, &der_krbsafe, &tmpdata, NULL);
assert(ret == KRB5KRB_AP_ERR_REPEAT);
/* Make a KRB-PRIV message with the client auth context. */
tmpdata = string2data("safemsg");
ret = krb5_mk_priv(ctx, c_authcon, &tmpdata, &der_krbpriv, NULL);
assert(ret == 0);
/* Play it back to the client to detect a reflection. */
ret = krb5_rd_priv(ctx, c_authcon, &der_krbpriv, &tmpdata, NULL);
assert(ret == KRB5KRB_AP_ERR_REPEAT);
/* Send it to the server auth context twice, to detect a replay. */
ret = krb5_rd_priv(ctx, s_authcon, &der_krbpriv, &tmpdata, NULL);
assert(ret == 0);
krb5_free_data_contents(ctx, &tmpdata);
ret = krb5_rd_priv(ctx, s_authcon, &der_krbpriv, &tmpdata, NULL);
assert(ret == KRB5KRB_AP_ERR_REPEAT);
/* Make a KRB-CRED message with the client auth context. */
tmpdata = string2data("safemsg");
ret = krb5_mk_1cred(ctx, c_authcon, cred, &der_krbcred, NULL);
assert(ret == 0);
/* Play it back to the client to detect a reflection. */
ret = krb5_rd_cred(ctx, c_authcon, der_krbcred, &tmpcreds, NULL);
assert(ret == KRB5KRB_AP_ERR_REPEAT);
/* Send it to the server auth context twice, to detect a replay. */
ret = krb5_rd_cred(ctx, s_authcon, der_krbcred, &tmpcreds, NULL);
assert(ret == 0);
krb5_free_tgt_creds(ctx, tmpcreds);
ret = krb5_rd_cred(ctx, s_authcon, der_krbcred, &tmpcreds, NULL);
assert(ret == KRB5KRB_AP_ERR_REPEAT);
krb5_free_data_contents(ctx, &der_apreq);
krb5_free_data_contents(ctx, &der_krbsafe);
krb5_free_data_contents(ctx, &der_krbpriv);
krb5_free_data(ctx, der_krbcred);
krb5_free_creds(ctx, cred);
krb5_cc_close(ctx, cc);
krb5_free_principal(ctx, client);
krb5_free_principal(ctx, server);
krb5_auth_con_free(ctx, c_authcon);
krb5_auth_con_free(ctx, s_authcon);
krb5_free_context(ctx);
return 0;
}