2 * Copyright (c) 2010, JANET(UK)
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the name of JANET(UK) nor the names of its contributors
17 * may be used to endorse or promote products derived from this software
18 * without specific prior written permission.
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
21 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 * Portions Copyright 2009 by the Massachusetts Institute of Technology.
34 * All Rights Reserved.
36 * Export of this software from the United States of America may
37 * require a specific license from the United States Government.
38 * It is the responsibility of any person or organization contemplating
39 * export to obtain such a license before exporting.
41 * WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
42 * distribute this software and its documentation for any purpose and
43 * without fee is hereby granted, provided that the above copyright
44 * notice appear in all copies and that both that copyright notice and
45 * this permission notice appear in supporting documentation, and that
46 * the name of M.I.T. not be used in advertising or publicity pertaining
47 * to distribution of the software without specific, written prior
48 * permission. Furthermore if you modify this software you must label
49 * your software as modified software and not distribute it in such a
50 * fashion that it might be confused with the original M.I.T. software.
51 * M.I.T. makes no representations about the suitability of
52 * this software for any purpose. It is provided "as is" without express
53 * or implied warranty.
56 #include "gssapiP_eap.h"
58 static gss_OID_desc gssEapNtPrincipalName = {
59 /* 1.3.6.1.4.1.5322.21.2.1 */
60 12, "\x06\x0A\x2B\x06\x01\x04\x01\xA9\x4A\x15\x02\x01"
63 gss_OID GSS_EAP_NT_PRINCIPAL_NAME = &gssEapNtPrincipalName;
66 gssEapAllocName(OM_uint32 *minor, gss_name_t *pName)
71 *pName = GSS_C_NO_NAME;
73 name = (gss_name_t)GSSEAP_CALLOC(1, sizeof(*name));
79 if (GSSEAP_MUTEX_INIT(&name->mutex) != 0) {
81 gssEapReleaseName(&tmpMinor, &name);
87 return GSS_S_COMPLETE;
91 gssEapReleaseName(OM_uint32 *minor, gss_name_t *pName)
94 krb5_context krbContext = NULL;
98 return GSS_S_COMPLETE;
102 if (name == GSS_C_NO_NAME) {
103 return GSS_S_COMPLETE;
106 GSSEAP_KRB_INIT(&krbContext);
107 krb5_free_principal(krbContext, name->krbPrincipal);
109 radiusFreeAVPs(&tmpMinor, name->avps);
110 samlFreeAssertion(&tmpMinor, name->assertion);
112 GSSEAP_MUTEX_DESTROY(&name->mutex);
117 return GSS_S_COMPLETE;
121 krbPrincipalToName(OM_uint32 *minor,
122 krb5_principal *principal,
128 major = gssEapAllocName(minor, &name);
129 if (GSS_ERROR(major))
132 name->krbPrincipal = *principal;
135 if (name->krbPrincipal->length == 1) {
136 name->flags |= NAME_FLAG_NAI;
138 name->flags |= NAME_FLAG_SERVICE;
144 return GSS_S_COMPLETE;
148 importServiceName(OM_uint32 *minor,
149 const gss_buffer_t nameBuffer,
152 OM_uint32 major, tmpMinor;
153 krb5_context krbContext;
154 krb5_principal krbPrinc;
155 char *service, *host;
157 GSSEAP_KRB_INIT(&krbContext);
159 major = bufferToString(minor, nameBuffer, &service);
160 if (GSS_ERROR(major))
163 host = strchr(service, '@');
169 /* XXX this is probably NOT what we want to be doing */
170 *minor = krb5_sname_to_principal(krbContext, host, service,
171 KRB5_NT_SRV_HST, &krbPrinc);
173 GSSEAP_FREE(service);
174 return GSS_S_FAILURE;
177 major = krbPrincipalToName(minor, &krbPrinc, pName);
178 if (GSS_ERROR(major)) {
179 krb5_free_principal(krbContext, krbPrinc);
182 GSSEAP_FREE(service);
187 importUserName(OM_uint32 *minor,
188 const gss_buffer_t nameBuffer,
191 OM_uint32 major, tmpMinor;
192 krb5_context krbContext;
193 krb5_principal krbPrinc;
196 GSSEAP_KRB_INIT(&krbContext);
198 major = bufferToString(minor, nameBuffer, &nameString);
199 if (GSS_ERROR(major))
202 *minor = krb5_parse_name(krbContext, nameString, &krbPrinc);
204 GSSEAP_FREE(nameString);
205 return GSS_S_FAILURE;
208 major = krbPrincipalToName(minor, &krbPrinc, pName);
209 if (GSS_ERROR(major)) {
210 krb5_free_principal(krbContext, krbPrinc);
213 GSSEAP_FREE(nameString);
218 importExportedName(OM_uint32 *minor,
219 const gss_buffer_t nameBuffer,
222 OM_uint32 major, tmpMinor;
223 krb5_context krbContext;
228 enum gss_eap_token_type tok_type;
230 GSSEAP_KRB_INIT(&krbContext);
232 p = (unsigned char *)nameBuffer->value;
233 remain = nameBuffer->length;
235 if (remain < 6 + GSS_EAP_MECHANISM->length + 4)
236 return GSS_S_BAD_NAME;
239 tok_type = load_uint16_be(p);
240 if (tok_type != TOK_TYPE_EXPORT_NAME &&
241 tok_type != TOK_TYPE_EXPORT_NAME_COMPOSITE)
242 return GSS_S_BAD_NAME;
247 len = load_uint16_be(p);
248 if (len != 2 + GSS_EAP_MECHANISM->length)
249 return GSS_S_BAD_NAME;
255 return GSS_S_BAD_NAME;
256 if (p[1] != GSS_EAP_MECHANISM->length)
257 return GSS_S_BAD_MECH;
258 if (memcmp(p, GSS_EAP_MECHANISM->elements, GSS_EAP_MECHANISM->length))
259 return GSS_S_BAD_MECH;
260 p += 2 + GSS_EAP_MECHANISM->length;
261 remain -= 2 + GSS_EAP_MECHANISM->length;
264 len = load_uint32_be(p);
268 return GSS_S_BAD_NAME;
277 if (composite == 0 && remain != 0)
278 return GSS_S_BAD_NAME;
280 major = importUserName(minor, &buf, pName);
281 if (GSS_ERROR(major))
284 /* XXX TODO composite handling */
286 return GSS_S_COMPLETE;
289 OM_uint32 gssEapImportName(OM_uint32 *minor,
290 const gss_buffer_t nameBuffer,
294 OM_uint32 major, tmpMinor;
296 *name = GSS_C_NO_NAME;
298 if (nameType == GSS_C_NULL_OID ||
299 oidEqual(nameType, GSS_C_NT_USER_NAME) ||
300 oidEqual(nameType, GSS_EAP_NT_PRINCIPAL_NAME))
301 major = importUserName(minor, nameBuffer, name);
302 else if (oidEqual(nameType, GSS_C_NT_HOSTBASED_SERVICE) ||
303 oidEqual(nameType, GSS_C_NT_HOSTBASED_SERVICE_X))
304 major = importServiceName(minor, nameBuffer, name);
305 else if (oidEqual(nameType, GSS_C_NT_EXPORT_NAME))
306 major = importExportedName(minor, nameBuffer, name);
308 major = GSS_S_BAD_NAMETYPE;
310 if (GSS_ERROR(major))
311 gssEapReleaseName(&tmpMinor, name);
316 OM_uint32 gssEapExportName(OM_uint32 *minor,
317 const gss_name_t name,
318 gss_buffer_t exportedName,
321 OM_uint32 major = GSS_S_FAILURE, tmpMinor;
322 krb5_context krbContext;
323 char *krbName = NULL;
327 exportedName->length = 0;
328 exportedName->value = NULL;
330 GSSEAP_KRB_INIT(&krbContext);
331 GSSEAP_MUTEX_LOCK(&name->mutex);
334 * Don't export a composite name if we don't have any attributes.
336 if (composite && !NAME_HAS_ATTRIBUTES(name))
339 *minor = krb5_unparse_name(krbContext, name->krbPrincipal, &krbName);
342 krbNameLen = strlen(krbName);
344 exportedName->length = 6 + GSS_EAP_MECHANISM->length + 4 + krbNameLen;
346 /* TODO: export SAML/AVP, this is pending specification */
347 GSSEAP_NOT_IMPLEMENTED;
350 exportedName->value = GSSEAP_MALLOC(exportedName->length);
351 if (exportedName->value == NULL) {
356 /* TOK | MECH_OID_LEN */
357 p = (unsigned char *)exportedName->value;
358 store_uint16_be(composite
359 ? TOK_TYPE_EXPORT_NAME_COMPOSITE
360 : TOK_TYPE_EXPORT_NAME,
363 store_uint16_be(GSS_EAP_MECHANISM->length + 2, p);
368 *p++ = GSS_EAP_MECHANISM->length & 0xff;
369 memcpy(p, GSS_EAP_MECHANISM->elements, GSS_EAP_MECHANISM->length);
370 p += GSS_EAP_MECHANISM->length;
373 store_uint32_be(krbNameLen, p);
377 memcpy(p, krbName, krbNameLen);
381 major = GSS_S_COMPLETE;
384 GSSEAP_MUTEX_UNLOCK(&name->mutex);
385 if (GSS_ERROR(major))
386 gss_release_buffer(&tmpMinor, exportedName);
387 krb5_free_unparsed_name(krbContext, krbName);
392 static gss_buffer_desc attributePrefixes[] = {
399 /* ATTR_TYPE_SAML_AAA_ASSERTION */
400 sizeof("urn:ietf:params:gss-eap:saml-aaa-assertion"),
401 "urn:ietf:params:gss-eap:saml-aaa-assertion"
404 /* ATTR_TYPE_SAML_ATTR */
405 sizeof("urn:ietf:params:gss-eap:saml-attr"),
406 "urn:ietf:params:gss-eap:saml-attr"
409 /* ATTR_TYPE_RADIUS_AVP */
410 sizeof("urn:ietf:params:gss-eap:radius-avp"),
411 "urn:ietf:params:gss-eap:radius-avp",
415 enum gss_eap_attribute_type
416 gssEapAttributePrefixToType(const gss_buffer_t prefix)
418 enum gss_eap_attribute_type i;
420 for (i = ATTR_TYPE_SAML_AAA_ASSERTION;
421 i < sizeof(attributePrefixes) / sizeof(attributePrefixes[0]);
424 gss_buffer_t p = &attributePrefixes[i];
426 if (p->length == prefix->length &&
427 memcmp(p->value, prefix->value, prefix->length) == 0) {
432 return ATTR_TYPE_NONE;
436 gssEapAttributeTypeToPrefix(enum gss_eap_attribute_type type)
438 if (type <= ATTR_TYPE_NONE ||
439 type > ATTR_TYPE_RADIUS_AVP)
440 return GSS_C_NO_BUFFER;
442 return &attributePrefixes[type];
446 decomposeAttributeName(OM_uint32 *minor,
447 const gss_buffer_t attribute,
454 for (i = 0; i < attribute->length; i++) {
455 if (((char *)attribute->value)[i] == ' ') {
456 p = (char *)attribute->value + i + 1;
461 prefix->value = attribute->value;
464 if (p != NULL && *p != '\0') {
465 suffix->length = attribute->length - 1 - prefix->length;
469 suffix->value = NULL;
473 return GSS_S_COMPLETE;
477 composeAttributeName(OM_uint32 *minor,
478 const gss_buffer_t prefix,
479 const gss_buffer_t suffix,
480 gss_buffer_t attribute)
485 attribute->length = 0;
486 attribute->value = NULL;
488 if (prefix == GSS_C_NO_BUFFER || prefix->length == 0)
489 return GSS_S_COMPLETE;
491 len = prefix->length;
492 if (suffix != NULL) {
493 len += 1 + suffix->length;
496 p = attribute->value = GSSEAP_MALLOC(len + 1);
497 if (attribute->value == NULL) {
499 return GSS_S_FAILURE;
501 attribute->length = len;
503 memcpy(p, prefix->value, prefix->length);
504 if (suffix != NULL) {
505 p[prefix->length] = ' ';
506 memcpy(p + prefix->length + 1, suffix->value, suffix->length);
509 p[attribute->length] = '\0';
512 return GSS_S_COMPLETE;