2 * Copyright (c) 2010, JANET(UK)
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the name of JANET(UK) nor the names of its contributors
17 * may be used to endorse or promote products derived from this software
18 * without specific prior written permission.
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
21 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 * Portions Copyright 2009 by the Massachusetts Institute of Technology.
34 * All Rights Reserved.
36 * Export of this software from the United States of America may
37 * require a specific license from the United States Government.
38 * It is the responsibility of any person or organization contemplating
39 * export to obtain such a license before exporting.
41 * WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
42 * distribute this software and its documentation for any purpose and
43 * without fee is hereby granted, provided that the above copyright
44 * notice appear in all copies and that both that copyright notice and
45 * this permission notice appear in supporting documentation, and that
46 * the name of M.I.T. not be used in advertising or publicity pertaining
47 * to distribution of the software without specific, written prior
48 * permission. Furthermore if you modify this software you must label
49 * your software as modified software and not distribute it in such a
50 * fashion that it might be confused with the original M.I.T. software.
51 * M.I.T. makes no representations about the suitability of
52 * this software for any purpose. It is provided "as is" without express
53 * or implied warranty.
56 #include "gssapiP_eap.h"
58 static gss_OID_desc gssEapNtPrincipalName = {
59 /* 1.3.6.1.4.1.5322.21.2.1 */
60 10, "\x2B\x06\x01\x04\x01\xA9\x4A\x15\x02\x01"
63 gss_OID GSS_EAP_NT_PRINCIPAL_NAME = &gssEapNtPrincipalName;
66 gssEapAllocName(OM_uint32 *minor, gss_name_t *pName)
71 *pName = GSS_C_NO_NAME;
73 name = (gss_name_t)GSSEAP_CALLOC(1, sizeof(*name));
79 if (GSSEAP_MUTEX_INIT(&name->mutex) != 0) {
81 gssEapReleaseName(&tmpMinor, &name);
87 return GSS_S_COMPLETE;
91 gssEapReleaseName(OM_uint32 *minor, gss_name_t *pName)
94 krb5_context krbContext = NULL;
98 return GSS_S_COMPLETE;
102 if (name == GSS_C_NO_NAME) {
103 return GSS_S_COMPLETE;
106 GSSEAP_KRB_INIT(&krbContext);
107 krb5_free_principal(krbContext, name->krbPrincipal);
109 gssEapReleaseAttrContext(&tmpMinor, name);
111 GSSEAP_MUTEX_DESTROY(&name->mutex);
116 return GSS_S_COMPLETE;
120 krbPrincipalToName(OM_uint32 *minor,
121 krb5_principal *principal,
127 major = gssEapAllocName(minor, &name);
128 if (GSS_ERROR(major))
131 name->krbPrincipal = *principal;
134 if (name->krbPrincipal->length == 1) {
135 name->flags |= NAME_FLAG_NAI;
137 name->flags |= NAME_FLAG_SERVICE;
143 return GSS_S_COMPLETE;
147 importServiceName(OM_uint32 *minor,
148 const gss_buffer_t nameBuffer,
152 krb5_context krbContext;
153 krb5_principal krbPrinc;
154 char *service, *host;
156 GSSEAP_KRB_INIT(&krbContext);
158 major = bufferToString(minor, nameBuffer, &service);
159 if (GSS_ERROR(major))
162 host = strchr(service, '@');
168 /* XXX this is probably NOT what we want to be doing */
169 *minor = krb5_sname_to_principal(krbContext, host, service,
170 KRB5_NT_SRV_HST, &krbPrinc);
172 GSSEAP_FREE(service);
173 return GSS_S_FAILURE;
176 major = krbPrincipalToName(minor, &krbPrinc, pName);
177 if (GSS_ERROR(major)) {
178 krb5_free_principal(krbContext, krbPrinc);
181 GSSEAP_FREE(service);
186 importUserName(OM_uint32 *minor,
187 const gss_buffer_t nameBuffer,
191 krb5_context krbContext;
192 krb5_principal krbPrinc;
195 GSSEAP_KRB_INIT(&krbContext);
197 if (nameBuffer == GSS_C_NO_BUFFER) {
198 *minor = krb5_copy_principal(krbContext,
199 krb5_anonymous_principal(), &krbPrinc);
201 return GSS_S_FAILURE;
203 major = bufferToString(minor, nameBuffer, &nameString);
204 if (GSS_ERROR(major))
207 *minor = krb5_parse_name(krbContext, nameString, &krbPrinc);
209 GSSEAP_FREE(nameString);
210 return GSS_S_FAILURE;
214 major = krbPrincipalToName(minor, &krbPrinc, pName);
215 if (GSS_ERROR(major)) {
216 krb5_free_principal(krbContext, krbPrinc);
219 GSSEAP_FREE(nameString);
223 #define UPDATE_REMAIN(n) do { \
228 #define CHECK_REMAIN(n) do { \
229 if (remain < (n)) { \
231 major = GSS_S_BAD_NAME; \
237 gssEapImportNameInternal(OM_uint32 *minor,
238 const gss_buffer_t nameBuffer,
242 OM_uint32 major, tmpMinor;
243 krb5_context krbContext;
247 enum gss_eap_token_type tokType;
248 gss_name_t name = GSS_C_NO_NAME;
250 GSSEAP_KRB_INIT(&krbContext);
252 p = (unsigned char *)nameBuffer->value;
253 remain = nameBuffer->length;
255 if (flags & EXPORT_NAME_FLAG_OID) {
256 if (remain < 6 + GSS_EAP_MECHANISM->length + 4)
257 return GSS_S_BAD_NAME;
259 if (flags & EXPORT_NAME_FLAG_COMPOSITE)
260 tokType = TOK_TYPE_EXPORT_NAME_COMPOSITE;
262 tokType = TOK_TYPE_EXPORT_NAME;
265 if (load_uint16_be(p) != tokType)
266 return GSS_S_BAD_NAME;
270 len = load_uint16_be(p);
271 if (len != 2 + GSS_EAP_MECHANISM->length)
272 return GSS_S_BAD_NAME;
277 return GSS_S_BAD_NAME;
278 if (p[1] != GSS_EAP_MECHANISM->length)
279 return GSS_S_BAD_MECH;
280 if (memcmp(&p[2], GSS_EAP_MECHANISM->elements, GSS_EAP_MECHANISM->length))
281 return GSS_S_BAD_MECH;
282 UPDATE_REMAIN(2 + GSS_EAP_MECHANISM->length);
286 len = load_uint32_be(p);
295 major = importUserName(minor, &buf, &name);
296 if (GSS_ERROR(major))
299 if (flags & EXPORT_NAME_FLAG_COMPOSITE) {
303 buf.length = load_uint32_be(p);
306 CHECK_REMAIN(buf.length);
308 UPDATE_REMAIN(buf.length);
310 major = gssEapImportAttrContext(minor, &buf, name);
311 if (GSS_ERROR(major))
315 major = GSS_S_COMPLETE;
318 if (GSS_ERROR(major))
319 gssEapReleaseName(&tmpMinor, &name);
327 gssEapImportName(OM_uint32 *minor,
328 const gss_buffer_t nameBuffer,
332 OM_uint32 major, tmpMinor;
334 *name = GSS_C_NO_NAME;
336 if (nameType == GSS_C_NULL_OID ||
337 oidEqual(nameType, GSS_C_NT_USER_NAME) ||
338 oidEqual(nameType, GSS_EAP_NT_PRINCIPAL_NAME))
339 major = importUserName(minor, nameBuffer, name);
340 else if (oidEqual(nameType, GSS_C_NT_HOSTBASED_SERVICE) ||
341 oidEqual(nameType, GSS_C_NT_HOSTBASED_SERVICE_X))
342 major = importServiceName(minor, nameBuffer, name);
343 else if (oidEqual(nameType, GSS_C_NT_EXPORT_NAME))
344 major = gssEapImportNameInternal(minor, nameBuffer, name,
345 EXPORT_NAME_FLAG_OID);
346 #ifdef HAVE_GSS_C_NT_COMPOSITE_EXPORT
347 else if (oidEqual(nameType, GSS_C_NT_COMPOSITE_EXPORT))
348 major = gssEapImportNameInternal(minor, nameBuffer, name,
349 EXPORT_NAME_FLAG_OID |
350 EXPORT_NAME_FLAG_COMPOSITE);
353 major = GSS_S_BAD_NAMETYPE;
355 if (GSS_ERROR(major))
356 gssEapReleaseName(&tmpMinor, name);
362 gssEapExportName(OM_uint32 *minor,
363 const gss_name_t name,
364 gss_buffer_t exportedName)
366 return gssEapExportNameInternal(minor, name, exportedName,
367 EXPORT_NAME_FLAG_OID);
371 gssEapExportNameInternal(OM_uint32 *minor,
372 const gss_name_t name,
373 gss_buffer_t exportedName,
376 OM_uint32 major = GSS_S_FAILURE, tmpMinor;
377 krb5_context krbContext;
378 char *krbName = NULL;
379 size_t krbNameLen, exportedNameLen;
381 gss_buffer_desc attrs = GSS_C_EMPTY_BUFFER;
383 exportedName->length = 0;
384 exportedName->value = NULL;
386 GSSEAP_KRB_INIT(&krbContext);
387 GSSEAP_MUTEX_LOCK(&name->mutex);
389 *minor = krb5_unparse_name(krbContext, name->krbPrincipal, &krbName);
391 major = GSS_S_FAILURE;
394 krbNameLen = strlen(krbName);
397 if (flags & EXPORT_NAME_FLAG_OID) {
398 exportedNameLen += 6 + GSS_EAP_MECHANISM->length;
400 exportedNameLen += 4 + krbNameLen;
401 if (flags & EXPORT_NAME_FLAG_COMPOSITE) {
402 major = gssEapExportAttrContext(minor, name, &attrs);
403 if (GSS_ERROR(major))
405 exportedNameLen += 4 + attrs.length;
408 exportedName->value = GSSEAP_MALLOC(exportedNameLen);
409 if (exportedName->value == NULL) {
410 major = GSS_S_FAILURE;
414 exportedName->length = exportedNameLen;
416 p = (unsigned char *)exportedName->value;
418 if (flags & EXPORT_NAME_FLAG_OID) {
419 /* TOK | MECH_OID_LEN */
420 store_uint16_be((flags & EXPORT_NAME_FLAG_COMPOSITE)
421 ? TOK_TYPE_EXPORT_NAME_COMPOSITE
422 : TOK_TYPE_EXPORT_NAME,
425 store_uint16_be(GSS_EAP_MECHANISM->length + 2, p);
430 *p++ = GSS_EAP_MECHANISM->length & 0xff;
431 memcpy(p, GSS_EAP_MECHANISM->elements, GSS_EAP_MECHANISM->length);
432 p += GSS_EAP_MECHANISM->length;
436 store_uint32_be(krbNameLen, p);
440 memcpy(p, krbName, krbNameLen);
443 if (flags & EXPORT_NAME_FLAG_COMPOSITE) {
444 store_uint32_be(attrs.length, p);
445 memcpy(&p[4], attrs.value, attrs.length);
446 p += 4 + attrs.length;
450 major = GSS_S_COMPLETE;
453 GSSEAP_MUTEX_UNLOCK(&name->mutex);
454 gss_release_buffer(&tmpMinor, &attrs);
455 if (GSS_ERROR(major))
456 gss_release_buffer(&tmpMinor, exportedName);
457 krb5_free_unparsed_name(krbContext, krbName);
463 gssEapDuplicateName(OM_uint32 *minor,
464 const gss_name_t input_name,
465 gss_name_t *dest_name)
467 OM_uint32 major, tmpMinor;
468 krb5_context krbContext;
471 if (input_name == GSS_C_NO_NAME) {
473 return GSS_S_CALL_INACCESSIBLE_READ | GSS_S_BAD_NAME;
476 GSSEAP_KRB_INIT(&krbContext);
478 major = gssEapAllocName(minor, &name);
479 if (GSS_ERROR(major)) {
483 /* Lock mutex for copying mutable attributes */
484 GSSEAP_MUTEX_LOCK(&input_name->mutex);
486 *minor = krb5_copy_principal(krbContext, input_name->krbPrincipal,
487 &name->krbPrincipal);
489 major = GSS_S_FAILURE;
493 if (input_name->attrCtx != NULL) {
494 major = gssEapDuplicateAttrContext(minor, input_name, name);
495 if (GSS_ERROR(major))
502 GSSEAP_MUTEX_UNLOCK(&input_name->mutex);
504 if (GSS_ERROR(major)) {
505 gssEapReleaseName(&tmpMinor, &name);
512 gssEapDisplayName(OM_uint32 *minor,
514 gss_buffer_t output_name_buffer,
515 gss_OID *output_name_type)
518 krb5_context krbContext;
521 GSSEAP_KRB_INIT(&krbContext);
523 output_name_buffer->length = 0;
524 output_name_buffer->value = NULL;
526 if (name == GSS_C_NO_NAME) {
528 return GSS_S_CALL_INACCESSIBLE_READ | GSS_S_BAD_NAME;
531 *minor = krb5_unparse_name(krbContext, name->krbPrincipal, &krbName);
533 return GSS_S_FAILURE;
536 major = makeStringBuffer(minor, krbName, output_name_buffer);
537 if (GSS_ERROR(major)) {
538 krb5_free_unparsed_name(krbContext, krbName);
542 krb5_free_unparsed_name(krbContext, krbName);
544 if (output_name_type != NULL)
545 *output_name_type = GSS_EAP_NT_PRINCIPAL_NAME;
547 return GSS_S_COMPLETE;