/*
- * Copyright (c) 2010, JANET(UK)
+ * Copyright (c) 2011, JANET(UK)
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* or implied warranty.
*/
+/*
+ * Name utility routines.
+ */
+
#include "gssapiP_eap.h"
-static gss_OID_desc gssEapNtPrincipalName = {
+static gss_OID_desc gssEapNtEapName = {
/* 1.3.6.1.4.1.5322.22.2.1 */
10, "\x2B\x06\x01\x04\x01\xA9\x4A\x16\x02\x01"
};
-gss_OID GSS_EAP_NT_PRINCIPAL_NAME = &gssEapNtPrincipalName;
+gss_OID GSS_EAP_NT_EAP_NAME = &gssEapNtEapName;
OM_uint32
gssEapAllocName(OM_uint32 *minor, gss_name_t *pName)
GSSEAP_KRB_INIT(&krbContext);
krb5_free_principal(krbContext, name->krbPrincipal);
+ gssEapReleaseOid(&tmpMinor, &name->mechanismUsed);
gssEapReleaseAttrContext(&tmpMinor, name);
name->krbPrincipal = *principal;
*principal = NULL;
- if (name->krbPrincipal->length > 1) {
+ if (KRB_PRINC_LENGTH(name->krbPrincipal) > 1) {
name->flags |= NAME_FLAG_SERVICE;
} else {
name->flags |= NAME_FLAG_NAI;
return GSS_S_COMPLETE;
}
+static krb5_error_code
+gssEapGetDefaultRealm(krb5_context krbContext, char **defaultRealm)
+{
+ *defaultRealm = NULL;
+
+ krb5_appdefault_string(krbContext, "eap_gss",
+ NULL, "default_realm", "", defaultRealm);
+
+ return (*defaultRealm != NULL) ? 0 : KRB5_CONFIG_NODEFREALM;
+}
+
static OM_uint32
importServiceName(OM_uint32 *minor,
const gss_buffer_t nameBuffer,
gss_name_t *pName)
{
OM_uint32 major;
+ krb5_error_code code;
krb5_context krbContext;
krb5_principal krbPrinc;
- char *service, *host;
+ char *service, *host, *realm = NULL;
GSSEAP_KRB_INIT(&krbContext);
host++;
}
- /* XXX this is probably NOT what we want to be doing */
- if (krb5_sname_to_principal(krbContext, host, service,
- KRB5_NT_SRV_HST, &krbPrinc) != 0) {
- GSSEAP_FREE(service);
- *minor = GSSEAP_BAD_SERVICE_NAME;
- return GSS_S_FAILURE;
- }
+ gssEapGetDefaultRealm(krbContext, &realm);
- major = krbPrincipalToName(minor, &krbPrinc, pName);
- if (GSS_ERROR(major)) {
- krb5_free_principal(krbContext, krbPrinc);
+ code = krb5_build_principal(krbContext,
+ &krbPrinc,
+ realm != NULL ? strlen(realm) : 0,
+ realm != NULL ? realm : "",
+ service,
+ host,
+ NULL);
+
+ if (code == 0) {
+ KRB_PRINC_TYPE(krbPrinc) = KRB5_NT_SRV_HST;
+
+ major = krbPrincipalToName(minor, &krbPrinc, pName);
+ if (GSS_ERROR(major))
+ krb5_free_principal(krbContext, krbPrinc);
+ } else {
+ major = GSS_S_FAILURE;
+ *minor = GSSEAP_BAD_SERVICE_NAME;
}
+ if (realm != NULL)
+ GSSEAP_FREE(realm);
GSSEAP_FREE(service);
+
return major;
}
{
OM_uint32 major;
krb5_context krbContext;
- krb5_principal krbPrinc;
- char *nameString;
+ krb5_principal krbPrinc = NULL;
+ krb5_error_code code;
GSSEAP_KRB_INIT(&krbContext);
if (nameBuffer == GSS_C_NO_BUFFER) {
- *minor = krb5_copy_principal(krbContext,
- krb5_anonymous_principal(), &krbPrinc);
- if (*minor != 0)
+ code = krb5_copy_principal(krbContext,
+ krbAnonymousPrincipal(), &krbPrinc);
+ if (code != 0) {
+ *minor = code;
return GSS_S_FAILURE;
+ }
} else {
+ char *nameString;
+
major = bufferToString(minor, nameBuffer, &nameString);
if (GSS_ERROR(major))
return major;
- *minor = krb5_parse_name(krbContext, nameString, &krbPrinc);
- if (*minor != 0) {
- GSSEAP_FREE(nameString);
+ /*
+ * First, attempt to parse the name on the assumption that it includes
+ * a qualifying realm.
+ */
+ code = krb5_parse_name_flags(krbContext, nameString,
+ KRB5_PRINCIPAL_PARSE_REQUIRE_REALM, &krbPrinc);
+ if (code == KRB5_PARSE_MALFORMED) {
+ char *defaultRealm = NULL;
+ int flags = 0;
+
+ /*
+ * We need an explicit appdefaults check because, at least with MIT
+ * Kerberos, setting the context realm to NULL will reset it to the
+ * default Kerberos realm after the second call to get_default_realm.
+ * We want to make sure that the default Kerberos realm does not end
+ * up accidentally appended to an unqualified name.
+ */
+ gssEapGetDefaultRealm(krbContext, &defaultRealm);
+
+ if (defaultRealm == NULL || defaultRealm[0] == '\0')
+ flags |= KRB5_PRINCIPAL_PARSE_NO_REALM;
+
+ code = krb5_parse_name_flags(krbContext, nameString, flags, &krbPrinc);
+
+ if (defaultRealm != NULL)
+ GSSEAP_FREE(defaultRealm);
+ }
+
+ GSSEAP_FREE(nameString);
+
+ if (code != 0) {
+ *minor = code;
return GSS_S_FAILURE;
}
}
+ assert(krbPrinc != NULL);
+
+ major = krbPrincipalToName(minor, &krbPrinc, pName);
+ if (GSS_ERROR(major))
+ krb5_free_principal(krbContext, krbPrinc);
+
+ return major;
+}
+
+static OM_uint32
+importAnonymousName(OM_uint32 *minor,
+ const gss_buffer_t nameBuffer GSSEAP_UNUSED,
+ gss_name_t *pName)
+{
+ OM_uint32 major;
+ krb5_context krbContext;
+ krb5_principal krbPrinc;
+
+ GSSEAP_KRB_INIT(&krbContext);
+
+ *minor = krb5_copy_principal(krbContext, krbAnonymousPrincipal(),
+ &krbPrinc);
+ if (*minor != 0)
+ return GSS_S_FAILURE;
+
major = krbPrincipalToName(minor, &krbPrinc, pName);
if (GSS_ERROR(major)) {
krb5_free_principal(krbContext, krbPrinc);
}
- GSSEAP_FREE(nameString);
return major;
}
#define CHECK_REMAIN(n) do { \
if (remain < (n)) { \
- *minor = GSSEAP_TOK_TRUNC; \
major = GSS_S_BAD_NAME; \
+ *minor = GSSEAP_TOK_TRUNC; \
goto cleanup; \
} \
} while (0)
gss_buffer_desc buf;
enum gss_eap_token_type tokType;
gss_name_t name = GSS_C_NO_NAME;
+ gss_OID mechanismUsed = GSS_C_NO_OID;
GSSEAP_KRB_INIT(&krbContext);
remain = nameBuffer->length;
if (flags & EXPORT_NAME_FLAG_OID) {
- if (remain < 6 + GSS_EAP_MECHANISM->length + 4)
+ gss_OID_desc mech;
+
+ /* TOK_ID || MECH_OID_LEN || MECH_OID */
+ if (remain < 6)
return GSS_S_BAD_NAME;
if (flags & EXPORT_NAME_FLAG_COMPOSITE)
/* MECH_OID_LEN */
len = load_uint16_be(p);
- if (len != 2 + GSS_EAP_MECHANISM->length)
+ if (len < 2)
return GSS_S_BAD_NAME;
UPDATE_REMAIN(2);
/* MECH_OID */
if (p[0] != 0x06)
return GSS_S_BAD_NAME;
- if (p[1] != GSS_EAP_MECHANISM->length)
- return GSS_S_BAD_MECH;
- if (memcmp(&p[2], GSS_EAP_MECHANISM->elements, GSS_EAP_MECHANISM->length))
- return GSS_S_BAD_MECH;
- UPDATE_REMAIN(2 + GSS_EAP_MECHANISM->length);
+
+ mech.length = p[1];
+ mech.elements = &p[2];
+
+ CHECK_REMAIN(mech.length);
+
+ major = gssEapCanonicalizeOid(minor,
+ &mech,
+ OID_FLAG_FAMILY_MECH_VALID |
+ OID_FLAG_MAP_FAMILY_MECH_TO_NULL,
+ &mechanismUsed);
+ if (GSS_ERROR(major))
+ goto cleanup;
+
+ UPDATE_REMAIN(2 + mech.length);
}
/* NAME_LEN */
+ CHECK_REMAIN(4);
len = load_uint32_be(p);
UPDATE_REMAIN(4);
if (GSS_ERROR(major))
goto cleanup;
+ name->mechanismUsed = mechanismUsed;
+ mechanismUsed = GSS_C_NO_OID;
+
if (flags & EXPORT_NAME_FLAG_COMPOSITE) {
gss_buffer_desc buf;
}
major = GSS_S_COMPLETE;
+ *minor = 0;
cleanup:
- if (GSS_ERROR(major))
+ if (GSS_ERROR(major)) {
+ gssEapReleaseOid(&tmpMinor, &mechanismUsed);
gssEapReleaseName(&tmpMinor, &name);
- else
+ } else {
*pName = name;
+ }
return major;
}
#endif
struct gss_eap_name_import_provider {
- gss_OID oid;
+ gss_const_OID oid;
OM_uint32 (*import)(OM_uint32 *, const gss_buffer_t, gss_name_t *);
};
OM_uint32
gssEapImportName(OM_uint32 *minor,
const gss_buffer_t nameBuffer,
- gss_OID nameType,
- gss_name_t *name)
+ const gss_OID nameType,
+ const gss_OID mechType,
+ gss_name_t *pName)
{
struct gss_eap_name_import_provider nameTypes[] = {
+ { GSS_EAP_NT_EAP_NAME, importUserName },
{ GSS_C_NT_USER_NAME, importUserName },
- { GSS_EAP_NT_PRINCIPAL_NAME, importUserName },
{ GSS_C_NT_HOSTBASED_SERVICE, importServiceName },
{ GSS_C_NT_HOSTBASED_SERVICE_X, importServiceName },
+ { GSS_C_NT_ANONYMOUS, importAnonymousName },
{ GSS_C_NT_EXPORT_NAME, importExportName },
+ { GSS_KRB5_NT_PRINCIPAL_NAME, importUserName },
#ifdef HAVE_GSS_C_NT_COMPOSITE_EXPORT
{ GSS_C_NT_COMPOSITE_EXPORT, importCompositeExportName },
#endif
};
size_t i;
+ OM_uint32 major = GSS_S_BAD_NAMETYPE;
+ OM_uint32 tmpMinor;
+ gss_name_t name = GSS_C_NO_NAME;
- *name = GSS_C_NO_NAME;
+ for (i = 0; i < sizeof(nameTypes) / sizeof(nameTypes[0]); i++) {
+ if (oidEqual(nameTypes[i].oid,
+ nameType == GSS_C_NO_OID ? GSS_EAP_NT_EAP_NAME : nameType)) {
+ major = nameTypes[i].import(minor, nameBuffer, &name);
+ break;
+ }
+ }
- if (nameType == GSS_C_NO_OID)
- nameType = nameTypes[0].oid;
+ if (major == GSS_S_COMPLETE &&
+ mechType != GSS_C_NO_OID) {
+ assert(gssEapIsConcreteMechanismOid(mechType));
+ assert(name->mechanismUsed == GSS_C_NO_OID);
- for (i = 0; i < sizeof(nameTypes) / sizeof(nameTypes[0]); i++) {
- if (oidEqual(nameTypes[i].oid, nameType))
- return nameTypes[i].import(minor, nameBuffer, name);
+ major = gssEapCanonicalizeOid(minor, mechType, 0, &name->mechanismUsed);
}
- return GSS_S_BAD_NAMETYPE;
+ if (GSS_ERROR(major))
+ gssEapReleaseName(&tmpMinor, &name);
+ else
+ *pName = name;
+
+ return major;
}
OM_uint32
size_t krbNameLen, exportedNameLen;
unsigned char *p;
gss_buffer_desc attrs = GSS_C_EMPTY_BUFFER;
+ gss_OID mech;
exportedName->length = 0;
exportedName->value = NULL;
+ if (name->mechanismUsed != GSS_C_NO_OID)
+ mech = name->mechanismUsed;
+ else
+ mech = GSS_EAP_MECHANISM;
+
GSSEAP_KRB_INIT(&krbContext);
*minor = krb5_unparse_name(krbContext, name->krbPrincipal, &krbName);
exportedNameLen = 0;
if (flags & EXPORT_NAME_FLAG_OID) {
- exportedNameLen += 6 + GSS_EAP_MECHANISM->length;
+ exportedNameLen += 6 + mech->length;
}
exportedNameLen += 4 + krbNameLen;
if (flags & EXPORT_NAME_FLAG_COMPOSITE) {
: TOK_TYPE_EXPORT_NAME,
p);
p += 2;
- store_uint16_be(GSS_EAP_MECHANISM->length + 2, p);
+ store_uint16_be(mech->length + 2, p);
p += 2;
/* MECH_OID */
*p++ = 0x06;
- *p++ = GSS_EAP_MECHANISM->length & 0xff;
- memcpy(p, GSS_EAP_MECHANISM->elements, GSS_EAP_MECHANISM->length);
- p += GSS_EAP_MECHANISM->length;
+ *p++ = mech->length & 0xff;
+ memcpy(p, mech->elements, mech->length);
+ p += mech->length;
}
/* NAME_LEN */
assert(p == (unsigned char *)exportedName->value + exportedNameLen);
- *minor = 0;
major = GSS_S_COMPLETE;
+ *minor = 0;
cleanup:
gss_release_buffer(&tmpMinor, &attrs);
}
OM_uint32
-gssEapDuplicateName(OM_uint32 *minor,
- const gss_name_t input_name,
- gss_name_t *dest_name)
+gssEapCanonicalizeName(OM_uint32 *minor,
+ const gss_name_t input_name,
+ const gss_OID mech_type,
+ gss_name_t *dest_name)
{
OM_uint32 major, tmpMinor;
krb5_context krbContext;
gss_name_t name;
+ gss_OID mech_used;
if (input_name == GSS_C_NO_NAME) {
*minor = EINVAL;
return major;
}
+ if (mech_type != GSS_C_NO_OID)
+ mech_used = mech_type;
+ else
+ mech_used = input_name->mechanismUsed;
+
+ major = gssEapCanonicalizeOid(minor,
+ mech_used,
+ OID_FLAG_NULL_VALID,
+ &name->mechanismUsed);
+ if (GSS_ERROR(major))
+ goto cleanup;
+
+ name->flags = input_name->flags;
+
*minor = krb5_copy_principal(krbContext, input_name->krbPrincipal,
&name->krbPrincipal);
if (*minor != 0) {
}
OM_uint32
+gssEapDuplicateName(OM_uint32 *minor,
+ const gss_name_t input_name,
+ gss_name_t *dest_name)
+{
+ return gssEapCanonicalizeName(minor, input_name,
+ GSS_C_NO_OID, dest_name);
+}
+
+OM_uint32
gssEapDisplayName(OM_uint32 *minor,
gss_name_t name,
gss_buffer_t output_name_buffer,
OM_uint32 major;
krb5_context krbContext;
char *krbName;
+ gss_OID name_type;
GSSEAP_KRB_INIT(&krbContext);
krb5_free_unparsed_name(krbContext, krbName);
+ if (KRB_PRINC_TYPE(name->krbPrincipal) == KRB5_NT_WELLKNOWN &&
+ krb5_principal_compare(krbContext,
+ name->krbPrincipal, krbAnonymousPrincipal())) {
+ name_type = GSS_C_NT_ANONYMOUS;
+ } else {
+ name_type = GSS_EAP_NT_EAP_NAME;
+ }
+
if (output_name_type != NULL)
- *output_name_type = GSS_EAP_NT_PRINCIPAL_NAME;
+ *output_name_type = name_type;
return GSS_S_COMPLETE;
}