2 * Copyright (c) 2010, JANET(UK)
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the name of JANET(UK) nor the names of its contributors
17 * may be used to endorse or promote products derived from this software
18 * without specific prior written permission.
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
21 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 * Copyright 2008 by the Massachusetts Institute of Technology.
34 * All Rights Reserved.
36 * Export of this software from the United States of America may
37 * require a specific license from the United States Government.
38 * It is the responsibility of any person or organization contemplating
39 * export to obtain such a license before exporting.
41 * WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
42 * distribute this software and its documentation for any purpose and
43 * without fee is hereby granted, provided that the above copyright
44 * notice appear in all copies and that both that copyright notice and
45 * this permission notice appear in supporting documentation, and that
46 * the name of M.I.T. not be used in advertising or publicity pertaining
47 * to distribution of the software without specific, written prior
48 * permission. Furthermore if you modify this software you must label
49 * your software as modified software and not distribute it in such a
50 * fashion that it might be confused with the original M.I.T. software.
51 * M.I.T. makes no representations about the suitability of
52 * this software for any purpose. It is provided "as is" without express
53 * or implied warranty.
57 * Message protection services: determine protected message size.
60 #include "gssapiP_eap.h"
62 #define INIT_IOV_DATA(_iov) do { (_iov)->buffer.value = NULL; \
63 (_iov)->buffer.length = 0; } \
67 gssEapWrapIovLength(OM_uint32 *minor,
72 gss_iov_buffer_desc *iov,
75 gss_iov_buffer_t header, trailer, padding;
76 size_t dataLength, assocDataLength;
77 size_t gssHeaderLen, gssPadLen, gssTrailerLen;
78 unsigned int krbHeaderLen = 0, krbTrailerLen = 0, krbPadLen = 0;
80 krb5_context krbContext;
84 if (qop_req != GSS_C_QOP_DEFAULT) {
85 *minor = GSSEAP_UNKNOWN_QOP;
86 return GSS_S_UNAVAILABLE;
89 if (ctx->encryptionType == ENCTYPE_NULL) {
90 *minor = GSSEAP_KEY_UNAVAILABLE;
91 return GSS_S_UNAVAILABLE;
94 GSSEAP_KRB_INIT(&krbContext);
96 header = gssEapLocateIov(iov, iov_count, GSS_IOV_BUFFER_TYPE_HEADER);
98 *minor = GSSEAP_MISSING_IOV;
101 INIT_IOV_DATA(header);
103 trailer = gssEapLocateIov(iov, iov_count, GSS_IOV_BUFFER_TYPE_TRAILER);
104 if (trailer != NULL) {
105 INIT_IOV_DATA(trailer);
108 dce_style = ((ctx->gssFlags & GSS_C_DCE_STYLE) != 0);
110 /* For CFX, EC is used instead of padding, and is placed in header or trailer */
111 padding = gssEapLocateIov(iov, iov_count, GSS_IOV_BUFFER_TYPE_PADDING);
112 if (padding != NULL) {
113 INIT_IOV_DATA(padding);
116 gssEapIovMessageLength(iov, iov_count, &dataLength, &assocDataLength);
118 if (conf_req_flag && gssEapIsIntegrityOnly(iov, iov_count))
119 conf_req_flag = FALSE;
121 gssHeaderLen = gssPadLen = gssTrailerLen = 0;
123 code = krb5_c_crypto_length(krbContext, ctx->encryptionType,
125 KRB5_CRYPTO_TYPE_TRAILER : KRB5_CRYPTO_TYPE_CHECKSUM,
129 return GSS_S_FAILURE;
133 code = krb5_c_crypto_length(krbContext, ctx->encryptionType,
134 KRB5_CRYPTO_TYPE_HEADER, &krbHeaderLen);
137 return GSS_S_FAILURE;
141 gssHeaderLen = 16; /* Header */
143 gssHeaderLen += krbHeaderLen; /* Kerb-Header */
144 gssTrailerLen = 16 /* E(Header) */ + krbTrailerLen; /* Kerb-Trailer */
146 code = krb5_c_padding_length(krbContext, ctx->encryptionType,
147 dataLength - assocDataLength + 16 /* E(Header) */,
151 return GSS_S_FAILURE;
154 if (krbPadLen == 0 && dce_style) {
155 /* Windows rejects AEAD tokens with non-zero EC */
156 code = krb5_c_block_size(krbContext, ctx->encryptionType, &ec);
159 return GSS_S_FAILURE;
166 gssTrailerLen = krbTrailerLen; /* Kerb-Checksum */
169 dataLength += gssPadLen;
172 gssHeaderLen += gssTrailerLen;
174 trailer->buffer.length = gssTrailerLen;
176 assert(gssPadLen == 0 || padding != NULL);
179 padding->buffer.length = gssPadLen;
181 header->buffer.length = gssHeaderLen;
183 if (conf_state != NULL)
184 *conf_state = conf_req_flag;
187 return GSS_S_COMPLETE;
191 gss_wrap_iov_length(OM_uint32 *minor,
196 gss_iov_buffer_desc *iov,
201 if (ctx == GSS_C_NO_CONTEXT) {
203 return GSS_S_CALL_INACCESSIBLE_READ | GSS_S_NO_CONTEXT;
208 GSSEAP_MUTEX_LOCK(&ctx->mutex);
210 if (!CTX_IS_ESTABLISHED(ctx)) {
211 major = GSS_S_NO_CONTEXT;
212 *minor = GSSEAP_CONTEXT_INCOMPLETE;
216 major = gssEapWrapIovLength(minor, ctx, conf_req_flag, qop_req,
217 conf_state, iov, iov_count);
218 if (GSS_ERROR(major))
222 GSSEAP_MUTEX_UNLOCK(&ctx->mutex);