Refactor
[mech_eap.orig] / init_sec_context.c
1 /*
2  * Copyright (c) 2010, JANET(UK)
3  * All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  *
9  * 1. Redistributions of source code must retain the above copyright
10  *    notice, this list of conditions and the following disclaimer.
11  *
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  *
16  * 3. Neither the name of JANET(UK) nor the names of its contributors
17  *    may be used to endorse or promote products derived from this software
18  *    without specific prior written permission.
19  *
20  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
21  * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23  * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
24  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30  * SUCH DAMAGE.
31  */
32
33 #include "gssapiP_eap.h"
34
35 static OM_uint32
36 policyVariableToFlag(enum eapol_bool_var variable)
37 {
38     OM_uint32 flag = 0;
39
40     switch (variable) {
41     case EAPOL_eapSuccess:
42         flag = CTX_FLAG_EAP_SUCCESS;
43         break;
44     case EAPOL_eapRestart:
45         flag = CTX_FLAG_EAP_RESTART;
46         break;
47     case EAPOL_eapFail:
48         flag = CTX_FLAG_EAP_FAIL;
49         break;
50     case EAPOL_eapResp:
51         flag = CTX_FLAG_EAP_RESP;
52         break;
53     case EAPOL_eapNoResp:
54         flag = CTX_FLAG_EAP_NO_RESP;
55         break;
56     case EAPOL_eapReq:
57         flag = CTX_FLAG_EAP_REQ;
58         break;
59     case EAPOL_portEnabled:
60         flag = CTX_FLAG_EAP_PORT_ENABLED;
61         break;
62     case EAPOL_altAccept:
63         flag = CTX_FLAG_EAP_ALT_ACCEPT;
64         break;
65     case EAPOL_altReject:
66         flag = CTX_FLAG_EAP_ALT_REJECT;
67         break;
68     }
69
70     return flag;
71 }
72
73 static Boolean
74 peerGetBool(void *data, enum eapol_bool_var variable)
75 {
76     gss_ctx_id_t ctx = data;
77     OM_uint32 flag;
78
79     if (ctx == GSS_C_NO_CONTEXT)
80         return FALSE;
81
82     flag = policyVariableToFlag(variable);
83
84     return ((ctx->flags & flag) != 0);
85 }
86
87 static void
88 peerSetBool(void *data, enum eapol_bool_var variable,
89             Boolean value)
90 {
91     gss_ctx_id_t ctx = data;
92     OM_uint32 flag;
93
94     if (ctx == GSS_C_NO_CONTEXT)
95         return;
96
97     flag = policyVariableToFlag(variable);
98
99     if (value)
100         ctx->flags |= flag;
101     else
102         ctx->flags &= ~(flag);
103 }
104
105 static int
106 peerGetInt(void *data, enum eapol_int_var variable)
107 {
108     gss_ctx_id_t ctx = data;
109
110     if (ctx == GSS_C_NO_CONTEXT)
111         return FALSE;
112
113     assert(CTX_IS_INITIATOR(ctx));
114
115     switch (variable) {
116     case EAPOL_idleWhile:
117         return ctx->initiatorCtx.idleWhile;
118         break;
119     }
120
121     return 0;
122 }
123
124 static void
125 peerSetInt(void *data, enum eapol_int_var variable,
126            unsigned int value)
127 {
128     gss_ctx_id_t ctx = data;
129
130     if (ctx == GSS_C_NO_CONTEXT)
131         return;
132
133     assert(CTX_IS_INITIATOR(ctx));
134
135     switch (variable) {
136     case EAPOL_idleWhile:
137         ctx->initiatorCtx.idleWhile = value;
138         break;
139     }
140 }
141
142 static OM_uint32
143 eapGssSmInitAuthenticate(OM_uint32 *minor,
144                          gss_cred_id_t cred,
145                          gss_ctx_id_t ctx,
146                          gss_name_t target,
147                          gss_OID mech,
148                          OM_uint32 reqFlags,
149                          OM_uint32 timeReq,
150                          gss_channel_bindings_t chanBindings,
151                          gss_buffer_t inputToken,
152                          gss_buffer_t outputToken)
153 {
154     OM_uint32 major, tmpMinor;
155     time_t now;
156
157     if (inputToken == GSS_C_NO_BUFFER || inputToken->length == 0) {
158         /* first time */
159         reqFlags &= GSS_C_TRANS_FLAG | GSS_C_REPLAY_FLAG | GSS_C_DCE_STYLE;
160         ctx->gssFlags |= reqFlags;
161
162         time(&now);
163
164         if (timeReq == 0 || timeReq == GSS_C_INDEFINITE)
165             ctx->expiryTime = 0;
166         else
167             ctx->expiryTime = now + timeReq;
168
169         major = gss_duplicate_name(minor, cred->name, &ctx->initiatorName);
170         if (GSS_ERROR(major))
171             goto cleanup;
172
173         major = gss_duplicate_name(minor, target, &ctx->acceptorName);
174         if (GSS_ERROR(major))
175             goto cleanup;
176
177         if (mech == GSS_C_NULL_OID || oidEqual(mech, GSS_EAP_MECHANISM)) {
178             major = gssEapDefaultMech(minor, &ctx->mechanismUsed);
179         } else if (gssEapIsConcreteMechanismOid(mech)) {
180             if (!gssEapInternalizeOid(mech, &ctx->mechanismUsed))
181                 major = duplicateOid(minor, mech, &ctx->mechanismUsed);
182         } else {
183             major = GSS_S_BAD_MECH;
184         }
185         if (GSS_ERROR(major))
186             goto cleanup;
187     }
188
189 cleanup:
190     return major;
191 }
192
193 static struct eap_gss_initiator_sm {
194     enum gss_eap_token_type inputTokenType;
195     enum gss_eap_token_type outputTokenType;
196     OM_uint32 (*processToken)(OM_uint32 *,
197                               gss_cred_id_t,
198                               gss_ctx_id_t,
199                               gss_name_t,
200                               gss_OID,
201                               OM_uint32,
202                               OM_uint32,
203                               gss_channel_bindings_t,
204                               gss_buffer_t,
205                               gss_buffer_t);
206 } eapGssInitiatorSm[] = {
207     { TOK_TYPE_EAP_REQ, TOK_TYPE_EAP_RESP, eapGssSmInitAuthenticate },
208 };
209
210 OM_uint32
211 gss_init_sec_context(OM_uint32 *minor,
212                      gss_cred_id_t cred,
213                      gss_ctx_id_t *context_handle,
214                      gss_name_t target_name,
215                      gss_OID mech_type,
216                      OM_uint32 req_flags,
217                      OM_uint32 time_req,
218                      gss_channel_bindings_t input_chan_bindings,
219                      gss_buffer_t input_token,
220                      gss_OID *actual_mech_type,
221                      gss_buffer_t output_token,
222                      OM_uint32 *ret_flags,
223                      OM_uint32 *time_rec)
224 {
225     OM_uint32 major, tmpMinor;
226     gss_ctx_id_t ctx = *context_handle;
227     struct eap_gss_initiator_sm *sm = NULL;
228     gss_buffer_desc innerInputToken, innerOutputToken;
229
230     *minor = 0;
231
232     innerOutputToken.length = 0;
233     innerOutputToken.value = NULL;
234
235     output_token->length = 0;
236     output_token->value = NULL;
237
238     if (cred != GSS_C_NO_CREDENTIAL && !(cred->flags & CRED_FLAG_INITIATE)) {
239         return GSS_S_NO_CRED;
240     }
241
242     if (ctx == GSS_C_NO_CONTEXT) {
243         if (input_token != GSS_C_NO_BUFFER && input_token->length != 0) {
244             return GSS_S_DEFECTIVE_TOKEN;
245         }
246
247         major = gssEapAllocContext(minor, &ctx);
248         if (GSS_ERROR(major))
249             return major;
250
251         ctx->flags |= CTX_FLAG_INITIATOR;
252
253         *context_handle = ctx;
254     }
255
256     GSSEAP_MUTEX_LOCK(&ctx->mutex);
257
258     sm = &eapGssInitiatorSm[ctx->state];
259
260     if (input_token != GSS_C_NO_BUFFER) {
261         major = gssEapVerifyToken(minor, ctx, input_token,
262                                   sm->inputTokenType, &innerInputToken);
263         if (GSS_ERROR(major))
264             goto cleanup;
265     } else {
266         innerInputToken.length = 0;
267         innerInputToken.value = NULL;
268     }
269
270     major = (sm->processToken)(minor,
271                                cred,
272                                ctx,
273                                target_name,
274                                mech_type,
275                                req_flags,
276                                time_req,
277                                input_chan_bindings,
278                                &innerInputToken,
279                                &innerOutputToken);
280     if (GSS_ERROR(major))
281         goto cleanup;
282
283     if (actual_mech_type != NULL) {
284         if (!gssEapInternalizeOid(ctx->mechanismUsed, actual_mech_type))
285             duplicateOid(&tmpMinor, ctx->mechanismUsed, actual_mech_type);
286     }
287     if (innerOutputToken.length != 0) {
288         major = gssEapMakeToken(minor, ctx, &innerOutputToken,
289                                 sm->outputTokenType, output_token);
290         if (GSS_ERROR(major))
291             goto cleanup;
292     }
293     if (ret_flags != NULL)
294         *ret_flags = ctx->gssFlags;
295     if (time_rec != NULL)
296         gss_context_time(&tmpMinor, ctx, time_rec);
297
298     assert(ctx->state == EAP_STATE_ESTABLISHED || major == GSS_S_CONTINUE_NEEDED);
299
300 cleanup:
301     GSSEAP_MUTEX_UNLOCK(&ctx->mutex);
302
303     if (GSS_ERROR(major))
304         gssEapReleaseContext(&tmpMinor, context_handle);
305
306     gss_release_buffer(&tmpMinor, &innerOutputToken);
307
308     return major;
309 }