2 * Copyright (c) 2011, JANET(UK)
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the name of JANET(UK) nor the names of its contributors
17 * may be used to endorse or promote products derived from this software
18 * without specific prior written permission.
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
21 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 * Portions Copyright 2009 by the Massachusetts Institute of Technology.
34 * All Rights Reserved.
36 * Export of this software from the United States of America may
37 * require a specific license from the United States Government.
38 * It is the responsibility of any person or organization contemplating
39 * export to obtain such a license before exporting.
41 * WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
42 * distribute this software and its documentation for any purpose and
43 * without fee is hereby granted, provided that the above copyright
44 * notice appear in all copies and that both that copyright notice and
45 * this permission notice appear in supporting documentation, and that
46 * the name of M.I.T. not be used in advertising or publicity pertaining
47 * to distribution of the software without specific, written prior
48 * permission. Furthermore if you modify this software you must label
49 * your software as modified software and not distribute it in such a
50 * fashion that it might be confused with the original M.I.T. software.
51 * M.I.T. makes no representations about the suitability of
52 * this software for any purpose. It is provided "as is" without express
53 * or implied warranty.
57 * Name utility routines.
60 #include "gssapiP_eap.h"
62 static gss_OID_desc gssEapNtEapName = {
63 /* 1.3.6.1.4.1.5322.22.2.1 */
64 10, "\x2B\x06\x01\x04\x01\xA9\x4A\x16\x02\x01"
67 gss_OID GSS_EAP_NT_EAP_NAME = &gssEapNtEapName;
70 gssEapAllocName(OM_uint32 *minor, gss_name_t *pName)
75 *pName = GSS_C_NO_NAME;
77 name = (gss_name_t)GSSEAP_CALLOC(1, sizeof(*name));
83 if (GSSEAP_MUTEX_INIT(&name->mutex) != 0) {
85 gssEapReleaseName(&tmpMinor, &name);
91 return GSS_S_COMPLETE;
95 gssEapReleaseName(OM_uint32 *minor, gss_name_t *pName)
98 krb5_context krbContext = NULL;
104 return GSS_S_COMPLETE;
108 if (name == GSS_C_NO_NAME) {
109 return GSS_S_COMPLETE;
112 GSSEAP_KRB_INIT(&krbContext);
113 krb5_free_principal(krbContext, name->krbPrincipal);
114 gssEapReleaseOid(&tmpMinor, &name->mechanismUsed);
116 gssEapReleaseAttrContext(&tmpMinor, name);
118 GSSEAP_MUTEX_DESTROY(&name->mutex);
122 return GSS_S_COMPLETE;
126 krbPrincipalToName(OM_uint32 *minor,
127 krb5_principal *principal,
133 major = gssEapAllocName(minor, &name);
134 if (GSS_ERROR(major))
137 name->krbPrincipal = *principal;
140 if (KRB_PRINC_LENGTH(name->krbPrincipal) > 1) {
141 name->flags |= NAME_FLAG_SERVICE;
143 name->flags |= NAME_FLAG_NAI;
149 return GSS_S_COMPLETE;
152 static krb5_error_code
153 gssEapGetDefaultRealm(krb5_context krbContext, char **defaultRealm)
155 *defaultRealm = NULL;
157 krb5_appdefault_string(krbContext, "eap_gss",
158 NULL, "default_realm", "", defaultRealm);
160 if (*defaultRealm != NULL && (*defaultRealm)[0] == '\0') {
161 GSSEAP_FREE(*defaultRealm);
162 *defaultRealm = NULL;
165 return (*defaultRealm != NULL) ? 0 : KRB5_CONFIG_NODEFREALM;
169 importServiceName(OM_uint32 *minor,
170 const gss_buffer_t nameBuffer,
174 krb5_error_code code;
175 krb5_context krbContext;
176 krb5_principal krbPrinc;
177 char *service, *host, *realm = NULL;
179 GSSEAP_KRB_INIT(&krbContext);
181 major = bufferToString(minor, nameBuffer, &service);
182 if (GSS_ERROR(major))
185 host = strchr(service, '@');
191 gssEapGetDefaultRealm(krbContext, &realm);
193 code = krb5_build_principal(krbContext,
195 realm != NULL ? strlen(realm) : 0,
196 realm != NULL ? realm : "",
202 KRB_PRINC_TYPE(krbPrinc) = KRB5_NT_SRV_HST;
204 major = krbPrincipalToName(minor, &krbPrinc, pName);
205 if (GSS_ERROR(major))
206 krb5_free_principal(krbContext, krbPrinc);
208 major = GSS_S_FAILURE;
209 *minor = GSSEAP_BAD_SERVICE_NAME;
214 GSSEAP_FREE(service);
219 #define IMPORT_FLAG_DEFAULT_REALM 0x1
222 * Import an EAP name, possibly appending the default GSS EAP realm,
223 * and taking care to avoid appending the default Kerberos realm.
226 importEapNameFlags(OM_uint32 *minor,
227 const gss_buffer_t nameBuffer,
228 OM_uint32 importFlags,
232 krb5_context krbContext;
233 krb5_principal krbPrinc = NULL;
234 krb5_error_code code;
236 GSSEAP_KRB_INIT(&krbContext);
238 if (nameBuffer == GSS_C_NO_BUFFER) {
239 code = krb5_copy_principal(krbContext,
240 krbAnonymousPrincipal(), &krbPrinc);
243 return GSS_S_FAILURE;
248 major = bufferToString(minor, nameBuffer, &nameString);
249 if (GSS_ERROR(major))
253 * First, attempt to parse the name on the assumption that it includes
254 * a qualifying realm.
256 code = krb5_parse_name_flags(krbContext, nameString,
257 KRB5_PRINCIPAL_PARSE_REQUIRE_REALM, &krbPrinc);
258 if (code == KRB5_PARSE_MALFORMED) {
259 char *defaultRealm = NULL;
263 * We need an explicit appdefaults check because, at least with MIT
264 * Kerberos, setting the context realm to NULL will reset it to the
265 * default Kerberos realm after the second call to get_default_realm.
266 * We want to make sure that the default Kerberos realm does not end
267 * up accidentally appended to an unqualified name.
269 if (importFlags & IMPORT_FLAG_DEFAULT_REALM)
270 gssEapGetDefaultRealm(krbContext, &defaultRealm);
272 if (defaultRealm == NULL)
273 parseFlags |= KRB5_PRINCIPAL_PARSE_NO_REALM;
275 code = krb5_parse_name_flags(krbContext, nameString, parseFlags, &krbPrinc);
277 if (defaultRealm != NULL)
278 GSSEAP_FREE(defaultRealm);
281 GSSEAP_FREE(nameString);
285 return GSS_S_FAILURE;
289 assert(krbPrinc != NULL);
291 major = krbPrincipalToName(minor, &krbPrinc, pName);
292 if (GSS_ERROR(major))
293 krb5_free_principal(krbContext, krbPrinc);
299 importEapName(OM_uint32 *minor,
300 const gss_buffer_t nameBuffer,
303 return importEapNameFlags(minor, nameBuffer, 0, pName);
307 importUserName(OM_uint32 *minor,
308 const gss_buffer_t nameBuffer,
311 return importEapNameFlags(minor, nameBuffer, IMPORT_FLAG_DEFAULT_REALM, pName);
315 importAnonymousName(OM_uint32 *minor,
316 const gss_buffer_t nameBuffer GSSEAP_UNUSED,
319 return importEapNameFlags(minor, GSS_C_NO_BUFFER, 0, pName);
322 #define UPDATE_REMAIN(n) do { \
327 #define CHECK_REMAIN(n) do { \
328 if (remain < (n)) { \
329 major = GSS_S_BAD_NAME; \
330 *minor = GSSEAP_TOK_TRUNC; \
336 gssEapImportNameInternal(OM_uint32 *minor,
337 const gss_buffer_t nameBuffer,
341 OM_uint32 major, tmpMinor;
342 krb5_context krbContext;
346 enum gss_eap_token_type tokType;
347 gss_name_t name = GSS_C_NO_NAME;
348 gss_OID mechanismUsed = GSS_C_NO_OID;
350 GSSEAP_KRB_INIT(&krbContext);
352 p = (unsigned char *)nameBuffer->value;
353 remain = nameBuffer->length;
355 if (flags & EXPORT_NAME_FLAG_OID) {
358 /* TOK_ID || MECH_OID_LEN || MECH_OID */
360 return GSS_S_BAD_NAME;
362 if (flags & EXPORT_NAME_FLAG_COMPOSITE)
363 tokType = TOK_TYPE_EXPORT_NAME_COMPOSITE;
365 tokType = TOK_TYPE_EXPORT_NAME;
368 if (load_uint16_be(p) != tokType)
369 return GSS_S_BAD_NAME;
373 len = load_uint16_be(p);
375 return GSS_S_BAD_NAME;
380 return GSS_S_BAD_NAME;
383 mech.elements = &p[2];
385 CHECK_REMAIN(mech.length);
387 major = gssEapCanonicalizeOid(minor,
389 OID_FLAG_FAMILY_MECH_VALID |
390 OID_FLAG_MAP_FAMILY_MECH_TO_NULL,
392 if (GSS_ERROR(major))
395 UPDATE_REMAIN(2 + mech.length);
400 len = load_uint32_be(p);
409 major = importEapNameFlags(minor, &buf, 0, &name);
410 if (GSS_ERROR(major))
413 name->mechanismUsed = mechanismUsed;
414 mechanismUsed = GSS_C_NO_OID;
416 if (flags & EXPORT_NAME_FLAG_COMPOSITE) {
422 major = gssEapImportAttrContext(minor, &buf, name);
423 if (GSS_ERROR(major))
427 major = GSS_S_COMPLETE;
431 if (GSS_ERROR(major)) {
432 gssEapReleaseOid(&tmpMinor, &mechanismUsed);
433 gssEapReleaseName(&tmpMinor, &name);
442 importExportName(OM_uint32 *minor,
443 const gss_buffer_t nameBuffer,
446 return gssEapImportNameInternal(minor, nameBuffer, name,
447 EXPORT_NAME_FLAG_OID);
450 #ifdef HAVE_GSS_C_NT_COMPOSITE_EXPORT
452 importCompositeExportName(OM_uint32 *minor,
453 const gss_buffer_t nameBuffer,
456 return gssEapImportNameInternal(minor, nameBuffer, name,
457 EXPORT_NAME_FLAG_OID |
458 EXPORT_NAME_FLAG_COMPOSITE);
462 struct gss_eap_name_import_provider {
464 OM_uint32 (*import)(OM_uint32 *, const gss_buffer_t, gss_name_t *);
468 gssEapImportName(OM_uint32 *minor,
469 const gss_buffer_t nameBuffer,
470 const gss_OID nameType,
471 const gss_OID mechType,
474 struct gss_eap_name_import_provider nameTypes[] = {
475 { GSS_EAP_NT_EAP_NAME, importEapName },
476 { GSS_C_NT_USER_NAME, importUserName },
477 { GSS_C_NT_HOSTBASED_SERVICE, importServiceName },
478 { GSS_C_NT_HOSTBASED_SERVICE_X, importServiceName },
479 { GSS_C_NT_ANONYMOUS, importAnonymousName },
480 { GSS_C_NT_EXPORT_NAME, importExportName },
481 { GSS_KRB5_NT_PRINCIPAL_NAME, importUserName },
482 #ifdef HAVE_GSS_C_NT_COMPOSITE_EXPORT
483 { GSS_C_NT_COMPOSITE_EXPORT, importCompositeExportName },
487 OM_uint32 major = GSS_S_BAD_NAMETYPE;
489 gss_name_t name = GSS_C_NO_NAME;
491 for (i = 0; i < sizeof(nameTypes) / sizeof(nameTypes[0]); i++) {
492 if (oidEqual(nameTypes[i].oid,
493 nameType == GSS_C_NO_OID ? GSS_EAP_NT_EAP_NAME : nameType)) {
494 major = nameTypes[i].import(minor, nameBuffer, &name);
499 if (major == GSS_S_COMPLETE &&
500 mechType != GSS_C_NO_OID) {
501 assert(gssEapIsConcreteMechanismOid(mechType));
502 assert(name->mechanismUsed == GSS_C_NO_OID);
504 major = gssEapCanonicalizeOid(minor, mechType, 0, &name->mechanismUsed);
507 if (GSS_ERROR(major))
508 gssEapReleaseName(&tmpMinor, &name);
516 gssEapExportName(OM_uint32 *minor,
517 const gss_name_t name,
518 gss_buffer_t exportedName)
520 return gssEapExportNameInternal(minor, name, exportedName,
521 EXPORT_NAME_FLAG_OID);
525 gssEapExportNameInternal(OM_uint32 *minor,
526 const gss_name_t name,
527 gss_buffer_t exportedName,
530 OM_uint32 major = GSS_S_FAILURE, tmpMinor;
531 gss_buffer_desc nameBuf = GSS_C_EMPTY_BUFFER;
532 size_t exportedNameLen;
534 gss_buffer_desc attrs = GSS_C_EMPTY_BUFFER;
537 exportedName->length = 0;
538 exportedName->value = NULL;
540 if (name->mechanismUsed != GSS_C_NO_OID)
541 mech = name->mechanismUsed;
543 mech = GSS_EAP_MECHANISM;
545 major = gssEapDisplayName(minor, name, &nameBuf, NULL);
546 if (GSS_ERROR(major))
550 if (flags & EXPORT_NAME_FLAG_OID) {
551 exportedNameLen += 6 + mech->length;
553 exportedNameLen += 4 + nameBuf.length;
554 if (flags & EXPORT_NAME_FLAG_COMPOSITE) {
555 major = gssEapExportAttrContext(minor, name, &attrs);
556 if (GSS_ERROR(major))
558 exportedNameLen += attrs.length;
561 exportedName->value = GSSEAP_MALLOC(exportedNameLen);
562 if (exportedName->value == NULL) {
563 major = GSS_S_FAILURE;
567 exportedName->length = exportedNameLen;
569 p = (unsigned char *)exportedName->value;
571 if (flags & EXPORT_NAME_FLAG_OID) {
572 /* TOK | MECH_OID_LEN */
573 store_uint16_be((flags & EXPORT_NAME_FLAG_COMPOSITE)
574 ? TOK_TYPE_EXPORT_NAME_COMPOSITE
575 : TOK_TYPE_EXPORT_NAME,
578 store_uint16_be(mech->length + 2, p);
583 *p++ = mech->length & 0xff;
584 memcpy(p, mech->elements, mech->length);
589 store_uint32_be(nameBuf.length, p);
593 memcpy(p, nameBuf.value, nameBuf.length);
596 if (flags & EXPORT_NAME_FLAG_COMPOSITE) {
597 memcpy(p, attrs.value, attrs.length);
601 assert(p == (unsigned char *)exportedName->value + exportedNameLen);
603 major = GSS_S_COMPLETE;
607 gss_release_buffer(&tmpMinor, &attrs);
608 gss_release_buffer(&tmpMinor, &nameBuf);
609 if (GSS_ERROR(major))
610 gss_release_buffer(&tmpMinor, exportedName);
616 gssEapCanonicalizeName(OM_uint32 *minor,
617 const gss_name_t input_name,
618 const gss_OID mech_type,
619 gss_name_t *dest_name)
621 OM_uint32 major, tmpMinor;
622 krb5_context krbContext;
626 if (input_name == GSS_C_NO_NAME) {
628 return GSS_S_CALL_INACCESSIBLE_READ | GSS_S_BAD_NAME;
631 GSSEAP_KRB_INIT(&krbContext);
633 major = gssEapAllocName(minor, &name);
634 if (GSS_ERROR(major)) {
638 if (mech_type != GSS_C_NO_OID)
639 mech_used = mech_type;
641 mech_used = input_name->mechanismUsed;
643 major = gssEapCanonicalizeOid(minor,
646 &name->mechanismUsed);
647 if (GSS_ERROR(major))
650 name->flags = input_name->flags;
652 *minor = krb5_copy_principal(krbContext, input_name->krbPrincipal,
653 &name->krbPrincipal);
655 major = GSS_S_FAILURE;
659 if (input_name->attrCtx != NULL) {
660 major = gssEapDuplicateAttrContext(minor, input_name, name);
661 if (GSS_ERROR(major))
668 if (GSS_ERROR(major)) {
669 gssEapReleaseName(&tmpMinor, &name);
676 gssEapDuplicateName(OM_uint32 *minor,
677 const gss_name_t input_name,
678 gss_name_t *dest_name)
680 return gssEapCanonicalizeName(minor, input_name,
681 GSS_C_NO_OID, dest_name);
685 gssEapDisplayName(OM_uint32 *minor,
687 gss_buffer_t output_name_buffer,
688 gss_OID *output_name_type)
691 krb5_context krbContext;
696 GSSEAP_KRB_INIT(&krbContext);
698 output_name_buffer->length = 0;
699 output_name_buffer->value = NULL;
701 if (name == GSS_C_NO_NAME) {
703 return GSS_S_CALL_INACCESSIBLE_READ | GSS_S_BAD_NAME;
707 * According to draft-ietf-abfab-gss-eap-01, when the realm is
708 * absent the trailing '@' is not included.
710 #ifdef HAVE_HEIMDAL_VERSION
711 if (KRB_PRINC_REALM(name->krbPrincipal) == NULL ||
712 KRB_PRINC_REALM(name->krBPrincipal)[0] == '\0')
714 if (KRB_PRINC_REALM(name->krbPrincipal)->length == 0)
716 flags |= KRB5_PRINCIPAL_UNPARSE_NO_REALM;
718 *minor = krb5_unparse_name_flags(krbContext, name->krbPrincipal,
721 return GSS_S_FAILURE;
724 major = makeStringBuffer(minor, krbName, output_name_buffer);
725 if (GSS_ERROR(major)) {
726 krb5_free_unparsed_name(krbContext, krbName);
730 krb5_free_unparsed_name(krbContext, krbName);
732 if (KRB_PRINC_TYPE(name->krbPrincipal) == KRB5_NT_WELLKNOWN &&
733 krb5_principal_compare(krbContext,
734 name->krbPrincipal, krbAnonymousPrincipal())) {
735 name_type = GSS_C_NT_ANONYMOUS;
737 name_type = GSS_EAP_NT_EAP_NAME;
740 if (output_name_type != NULL)
741 *output_name_type = name_type;
743 return GSS_S_COMPLETE;