2 * Copyright (c) 2011, JANET(UK)
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the name of JANET(UK) nor the names of its contributors
17 * may be used to endorse or promote products derived from this software
18 * without specific prior written permission.
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
21 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34 * Deserialise a context handle.
37 #include "gssapiP_eap.h"
39 #define UPDATE_REMAIN(n) do { \
44 #define CHECK_REMAIN(n) do { \
46 *minor = GSSEAP_TOK_TRUNC; \
47 return GSS_S_DEFECTIVE_TOKEN; \
51 #ifdef GSSEAP_ENABLE_ACCEPTOR
53 gssEapImportPartialContext(OM_uint32 *minor,
59 unsigned char *p = *pBuf;
60 size_t remain = *pRemain;
62 size_t ctxLength, serverLen;
64 /* Length of partial RADIUS context */
66 ctxLength = load_uint32_be(p);
69 CHECK_REMAIN(ctxLength);
70 remain = ctxLength; /* check against partial context length */
72 /* Selected RADIUS server */
74 serverLen = load_uint32_be(p);
78 CHECK_REMAIN(serverLen);
80 ctx->acceptorCtx.radServer = GSSEAP_MALLOC(serverLen + 1);
81 if (ctx->acceptorCtx.radServer == NULL) {
85 memcpy(ctx->acceptorCtx.radServer, p, serverLen);
86 ctx->acceptorCtx.radServer[serverLen] = '\0';
88 UPDATE_REMAIN(serverLen);
91 /* RADIUS state blob */
93 buf.length = load_uint32_be(p);
96 if (buf.length != 0) {
97 CHECK_REMAIN(buf.length);
101 major = duplicateBuffer(minor, &buf, &ctx->acceptorCtx.state);
102 if (GSS_ERROR(major))
105 UPDATE_REMAIN(buf.length);
109 GSSEAP_ASSERT(remain == 0);
113 *pRemain -= 4 + ctxLength;
115 return GSS_S_COMPLETE;
117 #endif /* GSSEAP_ENABLE_ACCEPTOR */
120 importMechanismOid(OM_uint32 *minor,
121 unsigned char **pBuf,
126 unsigned char *p = *pBuf;
127 size_t remain = *pRemain;
130 oidBuf.length = load_uint32_be(p);
131 if (remain < 4 + oidBuf.length || oidBuf.length == 0) {
132 *minor = GSSEAP_TOK_TRUNC;
133 return GSS_S_DEFECTIVE_TOKEN;
136 oidBuf.elements = &p[4];
138 major = gssEapCanonicalizeOid(minor, &oidBuf, 0, pOid);
139 if (GSS_ERROR(major))
142 *pBuf += 4 + oidBuf.length;
143 *pRemain -= 4 + oidBuf.length;
146 return GSS_S_COMPLETE;
150 importKerberosKey(OM_uint32 *minor,
151 unsigned char **pBuf,
153 krb5_cksumtype *checksumType,
154 krb5_enctype *pEncryptionType,
157 unsigned char *p = *pBuf;
158 size_t remain = *pRemain;
159 OM_uint32 encryptionType;
161 krb5_context krbContext;
163 krb5_error_code code;
165 GSSEAP_KRB_INIT(&krbContext);
170 *minor = GSSEAP_TOK_TRUNC;
171 return GSS_S_DEFECTIVE_TOKEN;
174 *checksumType = load_uint32_be(&p[0]);
175 encryptionType = load_uint32_be(&p[4]);
176 length = load_uint32_be(&p[8]);
178 if ((length != 0) != (encryptionType != ENCTYPE_NULL)) {
179 *minor = GSSEAP_BAD_CONTEXT_TOKEN;
180 return GSS_S_DEFECTIVE_TOKEN;
183 if (remain - 12 < length) {
184 *minor = GSSEAP_TOK_TRUNC;
185 return GSS_S_DEFECTIVE_TOKEN;
188 if (encryptionType != ENCTYPE_NULL) {
191 KRB_KEY_TYPE(&key) = encryptionType;
192 KRB_KEY_LENGTH(&key) = length;
193 KRB_KEY_DATA(&key) = &p[12];
195 code = krb5_copy_keyblock_contents(krbContext, &key, pKey);
198 return GSS_S_FAILURE;
202 *pBuf += 12 + length;
203 *pRemain -= 12 + length;
204 *pEncryptionType = encryptionType;
207 return GSS_S_COMPLETE;
211 importName(OM_uint32 *minor,
213 unsigned char **pBuf,
217 OM_uint32 major, tmpMinor, flags;
218 unsigned char *p = *pBuf;
219 size_t remain = *pRemain;
223 *minor = GSSEAP_TOK_TRUNC;
224 return GSS_S_DEFECTIVE_TOKEN;
227 tmp.length = load_uint32_be(p);
228 if (tmp.length != 0) {
229 if (remain - 4 < tmp.length) {
230 *minor = GSSEAP_TOK_TRUNC;
231 return GSS_S_DEFECTIVE_TOKEN;
236 flags = EXPORT_NAME_FLAG_COMPOSITE;
237 if (mech == GSS_C_NO_OID)
238 flags |= EXPORT_NAME_FLAG_OID;
240 major = gssEapImportNameInternal(minor, &tmp, pName, flags);
241 if (GSS_ERROR(major))
244 if ((flags & EXPORT_NAME_FLAG_OID) == 0) {
245 major = gssEapCanonicalizeOid(minor, mech, 0, &(*pName)->mechanismUsed);
246 if (GSS_ERROR(major)) {
247 gssEapReleaseName(&tmpMinor, pName);
253 *pBuf += 4 + tmp.length;
254 *pRemain -= 4 + tmp.length;
257 return GSS_S_COMPLETE;
261 gssEapImportContext(OM_uint32 *minor,
266 unsigned char *p = (unsigned char *)token->value;
267 size_t remain = token->length;
270 *minor = GSSEAP_TOK_TRUNC;
271 return GSS_S_DEFECTIVE_TOKEN;
273 if (load_uint32_be(&p[0]) != EAP_EXPORT_CONTEXT_V1) {
274 *minor = GSSEAP_BAD_CONTEXT_TOKEN;
275 return GSS_S_DEFECTIVE_TOKEN;
277 ctx->state = load_uint32_be(&p[4]);
278 ctx->flags = load_uint32_be(&p[8]);
279 ctx->gssFlags = load_uint32_be(&p[12]);
284 if (GSSEAP_SM_STATE(ctx) < GSSEAP_STATE_INITIAL ||
285 GSSEAP_SM_STATE(ctx) > GSSEAP_STATE_ESTABLISHED)
286 return GSS_S_DEFECTIVE_TOKEN;
288 /* Only acceptor can export partial context tokens */
289 if (CTX_IS_INITIATOR(ctx) && !CTX_IS_ESTABLISHED(ctx))
290 return GSS_S_DEFECTIVE_TOKEN;
292 major = importMechanismOid(minor, &p, &remain, &ctx->mechanismUsed);
293 if (GSS_ERROR(major))
296 major = importKerberosKey(minor, &p, &remain,
298 &ctx->encryptionType,
300 if (GSS_ERROR(major))
303 /* Initiator name OID matches the context mechanism, so it's not encoded */
304 major = importName(minor, ctx->mechanismUsed, &p, &remain, &ctx->initiatorName);
305 if (GSS_ERROR(major))
308 major = importName(minor, GSS_C_NO_OID, &p, &remain, &ctx->acceptorName);
309 if (GSS_ERROR(major))
312 /* Check that, if context is established, names are valid */
313 if (CTX_IS_ESTABLISHED(ctx) &&
314 (CTX_IS_INITIATOR(ctx) ? ctx->acceptorName == GSS_C_NO_NAME
315 : ctx->initiatorName == GSS_C_NO_NAME)) {
316 return GSS_S_DEFECTIVE_TOKEN;
319 if (remain < 24 + sequenceSize(ctx->seqState)) {
320 *minor = GSSEAP_TOK_TRUNC;
321 return GSS_S_DEFECTIVE_TOKEN;
323 ctx->expiryTime = (time_t)load_uint64_be(&p[0]);
324 ctx->sendSeq = load_uint64_be(&p[8]);
325 ctx->recvSeq = load_uint64_be(&p[16]);
329 major = sequenceInternalize(minor, &ctx->seqState, &p, &remain);
330 if (GSS_ERROR(major))
333 #ifdef GSSEAP_ENABLE_ACCEPTOR
335 * The partial context should only be expected for unestablished
338 if (!CTX_IS_INITIATOR(ctx) && !CTX_IS_ESTABLISHED(ctx) &&
339 (ctx->flags & CTX_FLAG_KRB_REAUTH) == 0) {
340 major = gssEapImportPartialContext(minor, &p, &remain, ctx);
341 if (GSS_ERROR(major))
346 GSSEAP_ASSERT(remain == 0);
348 #endif /* GSSEAP_ENABLE_ACCEPTOR */
350 major = GSS_S_COMPLETE;
356 OM_uint32 GSSAPI_CALLCONV
357 gss_import_sec_context(OM_uint32 *minor,
358 gss_buffer_t interprocess_token,
359 gss_ctx_id_t *context_handle)
361 OM_uint32 major, tmpMinor;
362 gss_ctx_id_t ctx = GSS_C_NO_CONTEXT;
364 *context_handle = GSS_C_NO_CONTEXT;
366 if (interprocess_token == GSS_C_NO_BUFFER ||
367 interprocess_token->length == 0) {
368 *minor = GSSEAP_TOK_TRUNC;
369 return GSS_S_DEFECTIVE_TOKEN;
372 major = gssEapAllocContext(minor, &ctx);
373 if (GSS_ERROR(major))
376 major = gssEapImportContext(minor, interprocess_token, ctx);
377 if (GSS_ERROR(major))
380 *context_handle = ctx;
383 if (GSS_ERROR(major))
384 gssEapReleaseContext(&tmpMinor, &ctx);