GS2 helpers
[mech_eap.orig] / util_mech.c
1 /*
2  * Copyright (c) 2010, JANET(UK)
3  * All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  *
9  * 1. Redistributions of source code must retain the above copyright
10  *    notice, this list of conditions and the following disclaimer.
11  *
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  *
16  * 3. Neither the name of JANET(UK) nor the names of its contributors
17  *    may be used to endorse or promote products derived from this software
18  *    without specific prior written permission.
19  *
20  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
21  * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23  * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
24  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30  * SUCH DAMAGE.
31  */
32
33 #include "gssapiP_eap.h"
34
35 /*
36  * 1.3.6.1.4.1.5322(padl)
37  *      gssEap(21)
38  *       mechanisms(1)
39  *        eap-aes128-cts-hmac-sha1-96(17)
40  *        eap-aes256-cts-hmac-sha1-96(18)
41  *       nameTypes(2)
42  *       apiExtensions(3)
43  *        inquireSecContextByOid(1)
44  *        inquireCredByOid(2)
45  *        setSecContextOption(3)
46  *        setCredOption(4)
47  *        mechInvoke(5)
48  */
49
50 static gss_OID_desc gssEapMechOids[] = {
51     /* 1.3.6.1.4.1.5322.21.1  */
52     { 9, "\x2B\x06\x01\x04\x01\xA9\x4A\x15\x01" },
53     /* 1.3.6.1.4.1.5322.21.1.17 */
54     { 10, "\x2B\x06\x01\x04\x01\xA9\x4A\x15\x01\x11" },
55     /* 1.3.6.1.4.1.5322.21.1.18 */
56     { 10, "\x2B\x06\x01\x04\x01\xA9\x4A\x15\x01\x12" }
57 };
58
59 gss_OID GSS_EAP_MECHANISM                            = &gssEapMechOids[0];
60 gss_OID GSS_EAP_AES128_CTS_HMAC_SHA1_96_MECHANISM    = &gssEapMechOids[1];
61 gss_OID GSS_EAP_AES256_CTS_HMAC_SHA1_96_MECHANISM    = &gssEapMechOids[2];
62
63 int
64 gssEapIsConcreteMechanismOid(const gss_OID oid)
65 {
66     return oid->length > GSS_EAP_MECHANISM->length &&
67            memcmp(oid->elements, GSS_EAP_MECHANISM->elements,
68                   GSS_EAP_MECHANISM->length) == 0;
69 }
70
71 int
72 gssEapIsMechanismOid(const gss_OID oid)
73 {
74     return oid == GSS_C_NO_OID ||
75            oidEqual(oid, GSS_EAP_MECHANISM) ||
76            gssEapIsConcreteMechanismOid(oid);
77 }
78
79 OM_uint32
80 gssEapValidateMechs(OM_uint32 *minor,
81                     const gss_OID_set mechs)
82 {
83     int i;
84
85     *minor = 0;
86
87     if (mechs == GSS_C_NO_OID_SET) {
88         return GSS_S_COMPLETE;
89     }
90
91     for (i = 0; i < mechs->count; i++) {
92         gss_OID oid = &mechs->elements[i];
93
94         if (!gssEapIsMechanismOid(oid))
95             return GSS_S_BAD_MECH;
96     }
97
98     return GSS_S_COMPLETE;
99 }
100
101 OM_uint32
102 gssEapOidToEnctype(OM_uint32 *minor,
103                    const gss_OID oid,
104                    krb5_enctype *enctype)
105 {
106     OM_uint32 major;
107     int suffix;
108
109     major = decomposeOid(minor,
110                          GSS_EAP_MECHANISM->elements,
111                          GSS_EAP_MECHANISM->length,
112                          oid,
113                          &suffix);
114     if (major == GSS_S_COMPLETE)
115         *enctype = suffix;
116
117     return major;
118 }
119
120 OM_uint32
121 gssEapEnctypeToOid(OM_uint32 *minor,
122                    krb5_enctype enctype,
123                    gss_OID *pOid)
124 {
125     OM_uint32 major;
126     gss_OID oid;
127
128     *pOid = NULL;
129
130     oid = (gss_OID)GSSEAP_MALLOC(sizeof(*oid));
131     if (oid == NULL) {
132         *minor = ENOMEM;
133         return GSS_S_FAILURE;
134     }
135
136     oid->length = GSS_EAP_MECHANISM->length + 1;
137     oid->elements = GSSEAP_MALLOC(oid->length);
138     if (oid->elements == NULL) {
139         *minor = ENOMEM;
140         GSSEAP_FREE(oid);
141         return GSS_S_FAILURE;
142     }
143
144     major = composeOid(minor,
145                        GSS_EAP_MECHANISM->elements,
146                        GSS_EAP_MECHANISM->length,
147                        enctype,
148                        oid);
149     if (major == GSS_S_COMPLETE) {
150         gssEapInternalizeOid(oid, pOid);
151         *pOid = oid;
152     } else {
153         GSSEAP_FREE(oid->elements);
154         GSSEAP_FREE(oid);
155     }
156
157     return major;
158 }
159
160 OM_uint32
161 gssEapIndicateMechs(OM_uint32 *minor,
162                     gss_OID_set *mechs)
163 {
164     krb5_context krbContext;
165     OM_uint32 major, tmpMinor;
166     krb5_enctype *etypes;
167     int i;
168
169     GSSEAP_KRB_INIT(&krbContext);
170
171     *minor = krb5_get_permitted_enctypes(krbContext, &etypes);
172     if (*minor != 0) {
173         return GSS_S_FAILURE;
174     }
175
176     major = gss_create_empty_oid_set(minor, mechs);
177     if (GSS_ERROR(major)) {
178         GSSEAP_FREE(etypes); /* XXX */
179         return major;
180     }
181
182     for (i = 0; etypes[i] != ENCTYPE_NULL; i++) {
183         gss_OID mechOid;
184
185         /* XXX currently we aren't equipped to encode these enctypes */
186         if (etypes[i] < 0 || etypes[i] > 127)
187             continue;
188
189         major = gssEapEnctypeToOid(minor, etypes[i], &mechOid);
190         if (GSS_ERROR(major))
191             break;
192
193         major = gss_add_oid_set_member(minor, mechOid, mechs);
194         if (GSS_ERROR(major))
195             break;
196
197         gss_release_oid(&tmpMinor, &mechOid);
198     }
199
200     GSSEAP_FREE(etypes); /* XXX */
201
202     *minor = 0;
203     return major;
204 }
205
206 OM_uint32
207 gssEapDefaultMech(OM_uint32 *minor,
208                   gss_OID *oid)
209 {
210     gss_OID_set mechs;
211     OM_uint32 major, tmpMinor;
212
213     major = gssEapIndicateMechs(minor, &mechs);
214     if (GSS_ERROR(major)) {
215         return major;
216     }
217
218     if (mechs->count == 0) {
219         gss_release_oid_set(&tmpMinor, &mechs);
220         return GSS_S_BAD_MECH;
221     }
222
223     if (!gssEapInternalizeOid(&mechs->elements[0], oid)) {
224         /* don't double-free if we didn't internalize it */
225         mechs->elements[0].length = 0;
226         mechs->elements[0].elements = NULL;
227     }
228
229     gss_release_oid_set(&tmpMinor, &mechs);
230
231     *minor = 0;
232     return GSS_S_COMPLETE;
233 }
234
235 int
236 gssEapInternalizeOid(const gss_OID oid,
237                      gss_OID *const pInternalizedOid)
238 {
239     int i;
240
241     *pInternalizedOid = GSS_C_NO_OID;
242
243     for (i = 0;
244          i < sizeof(gssEapMechOids) / sizeof(gssEapMechOids[0]);
245          i++) {
246         if (oidEqual(oid, &gssEapMechOids[i])) {
247             *pInternalizedOid = (const gss_OID)&gssEapMechOids[i];
248             break;
249         }
250     }
251
252     if (*pInternalizedOid == GSS_C_NO_OID) {
253         if (oidEqual(oid, GSS_EAP_NT_PRINCIPAL_NAME))
254             *pInternalizedOid = (const gss_OID)GSS_EAP_NT_PRINCIPAL_NAME;
255     }
256
257     if (*pInternalizedOid == GSS_C_NO_OID) {
258         *pInternalizedOid = oid;
259         return 0;
260     }
261
262     return 1;
263 }
264
265 static gss_buffer_desc gssEapSaslMechs[] = {
266     { sizeof("GS2-EAP"), "GS2-EAP", },
267     { sizeof("GS2-EAP-AES128"), "GS2-EAP-AES128" },
268     { sizeof("GS2-EAP-AES256"), "GS2-EAP-AES256" },
269 };
270
271 gss_buffer_t
272 gssEapOidToSaslName(const gss_OID oid)
273 {
274     size_t i;
275
276     for (i = 0; i < sizeof(gssEapMechOids)/sizeof(gssEapMechOids[0]); i++) {
277         if (oidEqual(&gssEapMechOids[i], oid))
278             return &gssEapSaslMechs[i];
279     }
280
281     return GSS_C_NO_BUFFER;
282 }
283
284 gss_OID
285 gssEapSaslNameToOid(const gss_buffer_t name)
286 {
287     size_t i;
288
289     for (i = 0; i < sizeof(gssEapSaslMechs)/sizeof(gssEapSaslMechs[0]); i++) {
290         if (bufferEqual(&gssEapSaslMechs[i], name))
291             return &gssEapMechOids[i];
292     }
293
294     return GSS_C_NO_OID;
295 }