2 * Copyright (c) 2010, JANET(UK)
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the name of JANET(UK) nor the names of its contributors
17 * may be used to endorse or promote products derived from this software
18 * without specific prior written permission.
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
21 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 #ifndef _GSSAPIP_EAP_H_
34 #define _GSSAPIP_EAP_H_ 1
45 #include <gssapi/gssapi.h>
46 #include <gssapi/gssapi_krb5.h>
47 #include <gssapi/gssapi_ext.h>
48 #include "gssapi_eap.h"
50 /* Kerberos includes */
56 #include <eap_peer/eap.h>
57 #include <eap_peer/eap_config.h>
58 #include <crypto/tls.h>
62 #include <freeradius-client.h>
63 #include <freeradius/radius.h>
67 /* These name flags are informative and not actually used by anything yet */
68 #define NAME_FLAG_NAI 0x00000001
69 #define NAME_FLAG_SERVICE 0x00000002
70 #define NAME_FLAG_COMPOSITE 0x00000004
72 struct gss_eap_saml_attr_ctx;
73 struct gss_eap_attr_ctx;
75 struct gss_name_struct {
76 GSSEAP_MUTEX mutex; /* mutex protects attrCtx */
78 krb5_principal krbPrincipal; /* this is immutable */
79 struct gss_eap_attr_ctx *attrCtx;
82 #define CRED_FLAG_INITIATE 0x00010000
83 #define CRED_FLAG_ACCEPT 0x00020000
84 #define CRED_FLAG_DEFAULT_IDENTITY 0x00040000
85 #define CRED_FLAG_PASSWORD 0x00080000
86 #define CRED_FLAG_PUBLIC_MASK 0x0000FFFF
88 struct gss_cred_id_struct {
92 gss_buffer_desc password;
93 gss_OID_set mechanisms;
95 char *radiusConfigFile;
96 #ifdef GSSEAP_ENABLE_REAUTH
97 krb5_ccache krbCredCache;
98 gss_cred_id_t krbCred;
102 #define CTX_FLAG_INITIATOR 0x00000001
103 #define CTX_FLAG_KRB_REAUTH_GSS 0x00000002
105 #define CTX_IS_INITIATOR(ctx) (((ctx)->flags & CTX_FLAG_INITIATOR) != 0)
108 EAP_STATE_IDENTITY = 0,
109 EAP_STATE_AUTHENTICATE,
110 EAP_STATE_EXTENSIONS_REQ,
111 EAP_STATE_EXTENSIONS_RESP,
112 EAP_STATE_ESTABLISHED,
113 #ifdef GSSEAP_ENABLE_REAUTH
114 EAP_STATE_KRB_REAUTH_GSS
118 #define CTX_IS_ESTABLISHED(ctx) ((ctx)->state == EAP_STATE_ESTABLISHED)
120 /* Initiator context flags */
121 #define CTX_FLAG_EAP_SUCCESS 0x00010000
122 #define CTX_FLAG_EAP_RESTART 0x00020000
123 #define CTX_FLAG_EAP_FAIL 0x00040000
124 #define CTX_FLAG_EAP_RESP 0x00080000
125 #define CTX_FLAG_EAP_NO_RESP 0x00100000
126 #define CTX_FLAG_EAP_REQ 0x00200000
127 #define CTX_FLAG_EAP_PORT_ENABLED 0x00400000
128 #define CTX_FLAG_EAP_ALT_ACCEPT 0x00800000
129 #define CTX_FLAG_EAP_ALT_REJECT 0x01000000
130 #define CTX_FLAG_EAP_MASK 0xFFFF0000
132 struct gss_eap_initiator_ctx {
133 gss_cred_id_t defaultCred;
134 unsigned int idleWhile;
136 struct eap_peer_config eapPeerConfig;
138 struct wpabuf reqData;
142 struct gss_eap_acceptor_ctx {
143 rc_handle *radHandle;
146 gss_buffer_desc state;
149 struct gss_ctx_id_struct {
151 enum gss_eap_state state;
154 gss_OID mechanismUsed;
155 krb5_cksumtype checksumType;
156 krb5_enctype encryptionType;
157 krb5_keyblock rfc3961Key;
158 gss_name_t initiatorName;
159 gss_name_t acceptorName;
161 uint64_t sendSeq, recvSeq;
164 struct gss_eap_initiator_ctx initiator;
165 #define initiatorCtx ctxU.initiator
166 struct gss_eap_acceptor_ctx acceptor;
167 #define acceptorCtx ctxU.acceptor
168 #ifdef GSSEAP_ENABLE_REAUTH
169 gss_ctx_id_t kerberos;
170 #define kerberosCtx ctxU.kerberos
175 #define TOK_FLAG_SENDER_IS_ACCEPTOR 0x01
176 #define TOK_FLAG_WRAP_CONFIDENTIAL 0x02
177 #define TOK_FLAG_ACCEPTOR_SUBKEY 0x04
179 #define KEY_USAGE_ACCEPTOR_SEAL 22
180 #define KEY_USAGE_ACCEPTOR_SIGN 23
181 #define KEY_USAGE_INITIATOR_SEAL 24
182 #define KEY_USAGE_INITIATOR_SIGN 25
183 #define KEY_USAGE_CHANNEL_BINDINGS 64
187 gssEapWrapOrGetMIC(OM_uint32 *minor,
191 gss_iov_buffer_desc *iov,
193 enum gss_eap_token_type toktype);
196 gssEapUnwrapOrVerifyMIC(OM_uint32 *minor_status,
199 gss_qop_t *qop_state,
200 gss_iov_buffer_desc *iov,
202 enum gss_eap_token_type toktype);
205 gssEapWrapIovLength(OM_uint32 *minor,
210 gss_iov_buffer_desc *iov,
213 gssEapWrap(OM_uint32 *minor,
217 gss_buffer_t input_message_buffer,
219 gss_buffer_t output_message_buffer);
222 rfc4121Flags(gss_ctx_id_t ctx, int receiving);
224 #endif /* _GSSAPIP_EAP_H_ */