2 * Copyright (c) 2010, JANET(UK)
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the name of JANET(UK) nor the names of its contributors
17 * may be used to endorse or promote products derived from this software
18 * without specific prior written permission.
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
21 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 #include "gssapiP_eap.h"
36 * 1.3.6.1.4.1.5322(padl)
39 * eap-aes128-cts-hmac-sha1-96(17)
40 * eap-aes256-cts-hmac-sha1-96(18)
43 * inquireSecContextByOid(1)
45 * setSecContextOption(3)
50 static gss_OID_desc gssEapMechOids[] = {
51 /* 1.3.6.1.4.1.5322.21.1 */
52 { 9, "\x2B\x06\x01\x04\x01\xA9\x4A\x15\x01" },
53 /* 1.3.6.1.4.1.5322.21.1.17 */
54 { 10, "\x2B\x06\x01\x04\x01\xA9\x4A\x15\x01\x11" },
55 /* 1.3.6.1.4.1.5322.21.1.18 */
56 { 10, "\x2B\x06\x01\x04\x01\xA9\x4A\x15\x01\x12" }
59 gss_OID GSS_EAP_MECHANISM = &gssEapMechOids[0];
60 gss_OID GSS_EAP_AES128_CTS_HMAC_SHA1_96_MECHANISM = &gssEapMechOids[1];
61 gss_OID GSS_EAP_AES256_CTS_HMAC_SHA1_96_MECHANISM = &gssEapMechOids[2];
64 gssEapIsConcreteMechanismOid(const gss_OID oid)
66 return oid->length > GSS_EAP_MECHANISM->length &&
67 memcmp(oid->elements, GSS_EAP_MECHANISM->elements,
68 GSS_EAP_MECHANISM->length) == 0;
72 gssEapIsMechanismOid(const gss_OID oid)
74 return oid == GSS_C_NO_OID ||
75 oidEqual(oid, GSS_EAP_MECHANISM) ||
76 gssEapIsConcreteMechanismOid(oid);
80 gssEapValidateMechs(OM_uint32 *minor,
81 const gss_OID_set mechs)
87 if (mechs == GSS_C_NO_OID_SET) {
88 return GSS_S_COMPLETE;
91 for (i = 0; i < mechs->count; i++) {
92 gss_OID oid = &mechs->elements[i];
94 if (!gssEapIsMechanismOid(oid))
95 return GSS_S_BAD_MECH;
98 return GSS_S_COMPLETE;
102 gssEapOidToEnctype(OM_uint32 *minor,
104 krb5_enctype *enctype)
109 major = decomposeOid(minor,
110 GSS_EAP_MECHANISM->elements,
111 GSS_EAP_MECHANISM->length,
114 if (major == GSS_S_COMPLETE)
121 gssEapEnctypeToOid(OM_uint32 *minor,
122 krb5_enctype enctype,
130 oid = (gss_OID)GSSEAP_MALLOC(sizeof(*oid));
133 return GSS_S_FAILURE;
136 oid->length = GSS_EAP_MECHANISM->length + 1;
137 oid->elements = GSSEAP_MALLOC(oid->length);
138 if (oid->elements == NULL) {
141 return GSS_S_FAILURE;
144 major = composeOid(minor,
145 GSS_EAP_MECHANISM->elements,
146 GSS_EAP_MECHANISM->length,
149 if (major == GSS_S_COMPLETE) {
150 gssEapInternalizeOid(oid, pOid);
153 GSSEAP_FREE(oid->elements);
161 gssEapIndicateMechs(OM_uint32 *minor,
164 krb5_context krbContext;
165 OM_uint32 major, tmpMinor;
166 krb5_enctype *etypes;
169 GSSEAP_KRB_INIT(&krbContext);
171 *minor = krb5_get_permitted_enctypes(krbContext, &etypes);
173 return GSS_S_FAILURE;
176 major = gss_create_empty_oid_set(minor, mechs);
177 if (GSS_ERROR(major)) {
178 GSSEAP_FREE(etypes); /* XXX */
182 for (i = 0; etypes[i] != ENCTYPE_NULL; i++) {
185 /* XXX currently we aren't equipped to encode these enctypes */
186 if (etypes[i] < 0 || etypes[i] > 127)
189 major = gssEapEnctypeToOid(minor, etypes[i], &mechOid);
190 if (GSS_ERROR(major))
193 major = gss_add_oid_set_member(minor, mechOid, mechs);
194 if (GSS_ERROR(major))
197 gss_release_oid(&tmpMinor, &mechOid);
200 GSSEAP_FREE(etypes); /* XXX */
207 gssEapDefaultMech(OM_uint32 *minor,
211 OM_uint32 major, tmpMinor;
213 major = gssEapIndicateMechs(minor, &mechs);
214 if (GSS_ERROR(major)) {
218 if (mechs->count == 0) {
219 gss_release_oid_set(&tmpMinor, &mechs);
220 return GSS_S_BAD_MECH;
223 if (!gssEapInternalizeOid(&mechs->elements[0], oid)) {
224 /* don't double-free if we didn't internalize it */
225 mechs->elements[0].length = 0;
226 mechs->elements[0].elements = NULL;
229 gss_release_oid_set(&tmpMinor, &mechs);
232 return GSS_S_COMPLETE;
236 gssEapInternalizeOid(const gss_OID oid,
237 gss_OID *const pInternalizedOid)
241 *pInternalizedOid = GSS_C_NO_OID;
244 i < sizeof(gssEapMechOids) / sizeof(gssEapMechOids[0]);
246 if (oidEqual(oid, &gssEapMechOids[i])) {
247 *pInternalizedOid = (const gss_OID)&gssEapMechOids[i];
252 if (*pInternalizedOid == GSS_C_NO_OID) {
253 if (oidEqual(oid, GSS_EAP_NT_PRINCIPAL_NAME))
254 *pInternalizedOid = (const gss_OID)GSS_EAP_NT_PRINCIPAL_NAME;
257 if (*pInternalizedOid == GSS_C_NO_OID) {
258 *pInternalizedOid = oid;
265 static gss_buffer_desc gssEapSaslMechs[] = {
266 { sizeof("GS2-EAP"), "GS2-EAP", },
267 { sizeof("GS2-EAP-AES128"), "GS2-EAP-AES128" },
268 { sizeof("GS2-EAP-AES256"), "GS2-EAP-AES256" },
272 gssEapOidToSaslName(const gss_OID oid)
276 for (i = 0; i < sizeof(gssEapMechOids)/sizeof(gssEapMechOids[0]); i++) {
277 if (oidEqual(&gssEapMechOids[i], oid))
278 return &gssEapSaslMechs[i];
281 return GSS_C_NO_BUFFER;
285 gssEapSaslNameToOid(const gss_buffer_t name)
289 for (i = 0; i < sizeof(gssEapSaslMechs)/sizeof(gssEapSaslMechs[0]); i++) {
290 if (bufferEqual(&gssEapSaslMechs[i], name))
291 return &gssEapMechOids[i];