2 * Copyright (c) 2010, JANET(UK)
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the name of JANET(UK) nor the names of its contributors
17 * may be used to endorse or promote products derived from this software
18 * without specific prior written permission.
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
21 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 #include "gssapiP_eap.h"
36 gssEapExportPartialContext(OM_uint32 *minor,
44 * The format of this token awaits definition by libradsec.
46 return GSS_S_COMPLETE;
50 gssEapExportSecContext(OM_uint32 *minor,
54 OM_uint32 major, tmpMinor;
56 gss_buffer_desc initiatorName, acceptorName;
57 gss_buffer_desc partialCtx, key;
60 initiatorName.length = 0;
61 initiatorName.value = NULL;
63 acceptorName.length = 0;
64 acceptorName.value = NULL;
66 partialCtx.length = 0;
67 partialCtx.value = NULL;
69 if ((CTX_IS_INITIATOR(ctx) && !CTX_IS_ESTABLISHED(ctx)) ||
70 ctx->mechanismUsed == GSS_C_NO_OID)
71 return GSS_S_NO_CONTEXT;
73 key.length = KRB_KEY_LENGTH(&ctx->rfc3961Key);
74 key.value = KRB_KEY_DATA(&ctx->rfc3961Key);
76 if (ctx->initiatorName != GSS_C_NO_NAME) {
77 major = gssEapExportName(minor, ctx->initiatorName, &initiatorName, TRUE);
81 if (ctx->acceptorName != GSS_C_NO_NAME) {
82 major = gssEapExportName(minor, ctx->acceptorName, &acceptorName, TRUE);
88 * The partial context is only transmitted for unestablished acceptor
91 if (!CTX_IS_INITIATOR(ctx) && !CTX_IS_ESTABLISHED(ctx)) {
92 major = gssEapExportPartialContext(minor, ctx, &partialCtx);
97 length = 16; /* version, state, flags, etc */
98 length += 4 + ctx->mechanismUsed->length; /* mechanismUsed */
99 length += 12 + key.length; /* rfc3961Key.value */
100 length += 4 + initiatorName.length; /* initiatorName.value */
101 length += 4 + acceptorName.length; /* acceptorName.value */
102 length += 24 + sequenceSize(ctx->seqState); /* seqState */
104 if (partialCtx.value != NULL)
105 length += 4 + partialCtx.length; /* partialCtx.value */
107 token->value = GSSEAP_MALLOC(length);
108 if (token->value == NULL) {
110 major = GSS_S_FAILURE;
113 token->length = length;
115 p = (unsigned char *)token->value;
117 store_uint32_be(EAP_EXPORT_CONTEXT_V1, &p[0]); /* version */
118 store_uint32_be(ctx->state, &p[4]);
119 store_uint32_be(ctx->flags, &p[8]);
120 store_uint32_be(ctx->gssFlags, &p[12]);
121 p = store_oid(ctx->mechanismUsed, &p[16]);
123 store_uint32_be(ctx->checksumType, &p[0]);
124 store_uint32_be(ctx->encryptionType, &p[4]);
125 p = store_buffer(&key, &p[8], FALSE);
127 p = store_buffer(&initiatorName, p, FALSE);
128 p = store_buffer(&acceptorName, p, FALSE);
130 store_uint64_be(ctx->expiryTime, &p[0]);
131 store_uint64_be(ctx->sendSeq, &p[8]);
132 store_uint64_be(ctx->recvSeq, &p[16]);
134 sequenceExternalize(ctx->seqState, &p, &length);
136 if (partialCtx.value != NULL)
137 p = store_buffer(&partialCtx, p, FALSE);
139 assert(p == (unsigned char *)token->value + token->length);
141 major = GSS_S_COMPLETE;
145 if (GSS_ERROR(major))
146 gss_release_buffer(&tmpMinor, token);
147 gss_release_buffer(&tmpMinor, &initiatorName);
148 gss_release_buffer(&tmpMinor, &acceptorName);
149 gss_release_buffer(&tmpMinor, &partialCtx);
155 gss_export_sec_context(OM_uint32 *minor,
156 gss_ctx_id_t *context_handle,
157 gss_buffer_t interprocess_token)
159 OM_uint32 major, tmpMinor;
160 gss_ctx_id_t ctx = *context_handle;
162 if (ctx == GSS_C_NO_CONTEXT)
163 return GSS_S_NO_CONTEXT;
165 GSSEAP_MUTEX_LOCK(&ctx->mutex);
167 major = gssEapExportSecContext(minor, ctx, interprocess_token);
168 if (GSS_ERROR(major)) {
169 GSSEAP_MUTEX_UNLOCK(&ctx->mutex);
173 *context_handle = GSS_C_NO_CONTEXT;
175 GSSEAP_MUTEX_UNLOCK(&ctx->mutex);
177 gssEapReleaseContext(&tmpMinor, &ctx);
179 return GSS_S_COMPLETE;