| package pac |
| |
| import ( |
| "bytes" |
| "errors" |
| "fmt" |
| |
| "gopkg.in/jcmturner/gokrb5.v7/crypto" |
| "gopkg.in/jcmturner/gokrb5.v7/iana/keyusage" |
| "gopkg.in/jcmturner/gokrb5.v7/types" |
| "gopkg.in/jcmturner/rpc.v1/mstypes" |
| "gopkg.in/jcmturner/rpc.v1/ndr" |
| ) |
| |
| // https://msdn.microsoft.com/en-us/library/cc237931.aspx |
| |
| // CredentialsInfo implements https://msdn.microsoft.com/en-us/library/cc237953.aspx |
| type CredentialsInfo struct { |
| Version uint32 // A 32-bit unsigned integer in little-endian format that defines the version. MUST be 0x00000000. |
| EType uint32 |
| PACCredentialDataEncrypted []byte // Key usage number for encryption: KERB_NON_KERB_SALT (16) |
| PACCredentialData CredentialData |
| } |
| |
| // Unmarshal bytes into the CredentialsInfo struct |
| func (c *CredentialsInfo) Unmarshal(b []byte, k types.EncryptionKey) (err error) { |
| //The CredentialsInfo structure is a simple structure that is not NDR-encoded. |
| r := mstypes.NewReader(bytes.NewReader(b)) |
| |
| c.Version, err = r.Uint32() |
| if err != nil { |
| return |
| } |
| if c.Version != 0 { |
| err = errors.New("credentials info version is not zero") |
| return |
| } |
| c.EType, err = r.Uint32() |
| if err != nil { |
| return |
| } |
| c.PACCredentialDataEncrypted, err = r.ReadBytes(len(b) - 8) |
| |
| err = c.DecryptEncPart(k) |
| if err != nil { |
| err = fmt.Errorf("error decrypting PAC Credentials Data: %v", err) |
| return |
| } |
| return |
| } |
| |
| // DecryptEncPart decrypts the encrypted part of the CredentialsInfo. |
| func (c *CredentialsInfo) DecryptEncPart(k types.EncryptionKey) error { |
| if k.KeyType != int32(c.EType) { |
| return fmt.Errorf("key provided is not the correct type. Type needed: %d, type provided: %d", c.EType, k.KeyType) |
| } |
| pt, err := crypto.DecryptMessage(c.PACCredentialDataEncrypted, k, keyusage.KERB_NON_KERB_SALT) |
| if err != nil { |
| return err |
| } |
| err = c.PACCredentialData.Unmarshal(pt) |
| if err != nil { |
| return err |
| } |
| return nil |
| } |
| |
| // CredentialData implements https://msdn.microsoft.com/en-us/library/cc237952.aspx |
| // This structure is encrypted prior to being encoded in any other structures. |
| // Encryption is performed by first serializing the data structure via Network Data Representation (NDR) encoding, as specified in [MS-RPCE]. |
| // Once serialized, the data is encrypted using the key and cryptographic system selected through the AS protocol and the KRB_AS_REP message |
| // Fields (for capturing this information) and cryptographic parameters are specified in PAC_CREDENTIAL_INFO (section 2.6.1). |
| type CredentialData struct { |
| CredentialCount uint32 |
| Credentials []SECPKGSupplementalCred // Size is the value of CredentialCount |
| } |
| |
| // Unmarshal converts the bytes provided into a CredentialData type. |
| func (c *CredentialData) Unmarshal(b []byte) (err error) { |
| dec := ndr.NewDecoder(bytes.NewReader(b)) |
| err = dec.Decode(c) |
| if err != nil { |
| err = fmt.Errorf("error unmarshaling KerbValidationInfo: %v", err) |
| } |
| return |
| } |