* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*/
+/*
+ * Portions Copyright 2009 by the Massachusetts Institute of Technology.
+ * All Rights Reserved.
+ *
+ * Export of this software from the United States of America may
+ * require a specific license from the United States Government.
+ * It is the responsibility of any person or organization contemplating
+ * export to obtain such a license before exporting.
+ *
+ * WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
+ * distribute this software and its documentation for any purpose and
+ * without fee is hereby granted, provided that the above copyright
+ * notice appear in all copies and that both that copyright notice and
+ * this permission notice appear in supporting documentation, and that
+ * the name of M.I.T. not be used in advertising or publicity pertaining
+ * to distribution of the software without specific, written prior
+ * permission. Furthermore if you modify this software you must label
+ * your software as modified software and not distribute it in such a
+ * fashion that it might be confused with the original M.I.T. software.
+ * M.I.T. makes no representations about the suitability of
+ * this software for any purpose. It is provided "as is" without express
+ * or implied warranty.
+ */
#include "gssapiP_eap.h"
+static gss_OID_desc gssEapNtPrincipalName = {
+ /* 1.3.6.1.4.1.5322.21.2.1 */
+ 10, "\x2B\x06\x01\x04\x01\xA9\x4A\x15\x02\x01"
+};
+
+gss_OID GSS_EAP_NT_PRINCIPAL_NAME = &gssEapNtPrincipalName;
+
OM_uint32
gssEapAllocName(OM_uint32 *minor, gss_name_t *pName)
{
+ OM_uint32 tmpMinor;
gss_name_t name;
- assert(*pName == GSS_C_NO_NAME);
+ *pName = GSS_C_NO_NAME;
name = (gss_name_t)GSSEAP_CALLOC(1, sizeof(*name));
if (name == NULL) {
return GSS_S_FAILURE;
}
+ if (GSSEAP_MUTEX_INIT(&name->mutex) != 0) {
+ *minor = errno;
+ gssEapReleaseName(&tmpMinor, &name);
+ return GSS_S_FAILURE;
+ }
+
*pName = name;
return GSS_S_COMPLETE;
gssEapReleaseName(OM_uint32 *minor, gss_name_t *pName)
{
gss_name_t name;
- krb5_context kerbCtx = NULL;
+ krb5_context krbContext = NULL;
+ OM_uint32 tmpMinor;
if (pName == NULL) {
return GSS_S_COMPLETE;
return GSS_S_COMPLETE;
}
- krb5_init_context(&kerbCtx);
- krb5_free_principal(kerbCtx, name->kerberosName);
- if (kerbCtx != NULL) {
- krb5_free_context(kerbCtx);
- }
+ GSSEAP_KRB_INIT(&krbContext);
+ krb5_free_principal(krbContext, name->krbPrincipal);
+ gssEapReleaseAttrContext(&tmpMinor, name);
+
+ GSSEAP_MUTEX_DESTROY(&name->mutex);
GSSEAP_FREE(name);
*pName = NULL;
*minor = 0;
return GSS_S_COMPLETE;
}
+
+static OM_uint32
+krbPrincipalToName(OM_uint32 *minor,
+ krb5_principal *principal,
+ gss_name_t *pName)
+{
+ OM_uint32 major;
+ gss_name_t name;
+
+ major = gssEapAllocName(minor, &name);
+ if (GSS_ERROR(major))
+ return major;
+
+ name->krbPrincipal = *principal;
+ *principal = NULL;
+
+ if (name->krbPrincipal->length == 1) {
+ name->flags |= NAME_FLAG_NAI;
+ } else {
+ name->flags |= NAME_FLAG_SERVICE;
+ }
+
+ *pName = name;
+ *minor = 0;
+
+ return GSS_S_COMPLETE;
+}
+
+static OM_uint32
+importServiceName(OM_uint32 *minor,
+ const gss_buffer_t nameBuffer,
+ gss_name_t *pName)
+{
+ OM_uint32 major, tmpMinor;
+ krb5_context krbContext;
+ krb5_principal krbPrinc;
+ char *service, *host;
+
+ GSSEAP_KRB_INIT(&krbContext);
+
+ major = bufferToString(minor, nameBuffer, &service);
+ if (GSS_ERROR(major))
+ return major;
+
+ host = strchr(service, '@');
+ if (host != NULL) {
+ *host = '\0';
+ host++;
+ }
+
+ /* XXX this is probably NOT what we want to be doing */
+ *minor = krb5_sname_to_principal(krbContext, host, service,
+ KRB5_NT_SRV_HST, &krbPrinc);
+ if (*minor != 0) {
+ GSSEAP_FREE(service);
+ return GSS_S_FAILURE;
+ }
+
+ major = krbPrincipalToName(minor, &krbPrinc, pName);
+ if (GSS_ERROR(major)) {
+ krb5_free_principal(krbContext, krbPrinc);
+ }
+
+ GSSEAP_FREE(service);
+ return major;
+}
+
+static OM_uint32
+importUserName(OM_uint32 *minor,
+ const gss_buffer_t nameBuffer,
+ gss_name_t *pName)
+{
+ OM_uint32 major, tmpMinor;
+ krb5_context krbContext;
+ krb5_principal krbPrinc;
+ char *nameString;
+
+ GSSEAP_KRB_INIT(&krbContext);
+
+ major = bufferToString(minor, nameBuffer, &nameString);
+ if (GSS_ERROR(major))
+ return major;
+
+ *minor = krb5_parse_name(krbContext, nameString, &krbPrinc);
+ if (*minor != 0) {
+ GSSEAP_FREE(nameString);
+ return GSS_S_FAILURE;
+ }
+
+ major = krbPrincipalToName(minor, &krbPrinc, pName);
+ if (GSS_ERROR(major)) {
+ krb5_free_principal(krbContext, krbPrinc);
+ }
+
+ GSSEAP_FREE(nameString);
+ return major;
+}
+
+static OM_uint32
+importExportedName(OM_uint32 *minor,
+ const gss_buffer_t nameBuffer,
+ gss_name_t *pName)
+{
+ OM_uint32 major, tmpMinor;
+ krb5_context krbContext;
+ unsigned char *p;
+ size_t len, remain;
+ gss_buffer_desc buf;
+ enum gss_eap_token_type tok_type;
+ gss_name_t name = GSS_C_NO_NAME;
+
+ GSSEAP_KRB_INIT(&krbContext);
+
+ p = (unsigned char *)nameBuffer->value;
+ remain = nameBuffer->length;
+
+ if (remain < 6 + GSS_EAP_MECHANISM->length + 4)
+ return GSS_S_BAD_NAME;
+
+#define UPDATE_REMAIN(n) do { \
+ p += (n); \
+ remain -= (n); \
+ } while (0)
+
+ /* TOK_ID */
+ tok_type = load_uint16_be(p);
+ if (tok_type != TOK_TYPE_EXPORT_NAME &&
+ tok_type != TOK_TYPE_EXPORT_NAME_COMPOSITE)
+ return GSS_S_BAD_NAME;
+ UPDATE_REMAIN(2);
+
+ /* MECH_OID_LEN */
+ len = load_uint16_be(p);
+ if (len != 2 + GSS_EAP_MECHANISM->length)
+ return GSS_S_BAD_NAME;
+ UPDATE_REMAIN(2);
+
+ /* MECH_OID */
+ if (p[0] != 0x06)
+ return GSS_S_BAD_NAME;
+ if (p[1] != GSS_EAP_MECHANISM->length)
+ return GSS_S_BAD_MECH;
+ if (memcmp(&p[2], GSS_EAP_MECHANISM->elements, GSS_EAP_MECHANISM->length))
+ return GSS_S_BAD_MECH;
+ UPDATE_REMAIN(2 + GSS_EAP_MECHANISM->length);
+
+ /* NAME_LEN */
+ len = load_uint32_be(p);
+ UPDATE_REMAIN(4);
+
+#define CHECK_REMAIN(n) do { \
+ if (remain < (n)) { \
+ *minor = ERANGE; \
+ major = GSS_S_BAD_NAME; \
+ goto cleanup; \
+ } \
+ } while (0)
+
+ /* NAME */
+ CHECK_REMAIN(len);
+ buf.length = len;
+ buf.value = p;
+ UPDATE_REMAIN(len);
+
+ major = importUserName(minor, &buf, &name);
+ if (GSS_ERROR(major))
+ goto cleanup;
+
+ if (tok_type == TOK_TYPE_EXPORT_NAME_COMPOSITE) {
+ gss_buffer_desc buf;
+
+ CHECK_REMAIN(4);
+ name->flags = load_uint32_be(p);
+ UPDATE_REMAIN(4);
+
+ CHECK_REMAIN(4);
+ buf.length = load_uint32_be(p);
+ UPDATE_REMAIN(4);
+
+ CHECK_REMAIN(buf.length);
+ buf.value = p;
+ UPDATE_REMAIN(buf.length);
+
+ major = gssEapImportAttrContext(minor, &buf, name);
+ if (GSS_ERROR(major))
+ goto cleanup;
+ }
+
+ major = GSS_S_COMPLETE;
+
+cleanup:
+ if (GSS_ERROR(major))
+ gssEapReleaseName(&tmpMinor, &name);
+ else
+ *pName = name;
+
+ return major;
+}
+
+OM_uint32
+gssEapImportName(OM_uint32 *minor,
+ const gss_buffer_t nameBuffer,
+ gss_OID nameType,
+ gss_name_t *name)
+{
+ OM_uint32 major, tmpMinor;
+
+ *name = GSS_C_NO_NAME;
+
+ if (nameType == GSS_C_NULL_OID ||
+ oidEqual(nameType, GSS_C_NT_USER_NAME) ||
+ oidEqual(nameType, GSS_EAP_NT_PRINCIPAL_NAME))
+ major = importUserName(minor, nameBuffer, name);
+ else if (oidEqual(nameType, GSS_C_NT_HOSTBASED_SERVICE) ||
+ oidEqual(nameType, GSS_C_NT_HOSTBASED_SERVICE_X))
+ major = importServiceName(minor, nameBuffer, name);
+ else if (oidEqual(nameType, GSS_C_NT_EXPORT_NAME))
+ major = importExportedName(minor, nameBuffer, name);
+ else
+ major = GSS_S_BAD_NAMETYPE;
+
+ if (GSS_ERROR(major))
+ gssEapReleaseName(&tmpMinor, name);
+
+ return major;
+}
+
+OM_uint32
+gssEapExportName(OM_uint32 *minor,
+ const gss_name_t name,
+ gss_buffer_t exportedName,
+ int composite)
+{
+ OM_uint32 major = GSS_S_FAILURE, tmpMinor;
+ krb5_context krbContext;
+ char *krbName = NULL;
+ size_t krbNameLen;
+ unsigned char *p;
+ gss_buffer_desc attrs = GSS_C_EMPTY_BUFFER;
+
+ exportedName->length = 0;
+ exportedName->value = NULL;
+
+ GSSEAP_KRB_INIT(&krbContext);
+ GSSEAP_MUTEX_LOCK(&name->mutex);
+
+ *minor = krb5_unparse_name(krbContext, name->krbPrincipal, &krbName);
+ if (*minor != 0) {
+ major = GSS_S_FAILURE;
+ goto cleanup;
+ }
+ krbNameLen = strlen(krbName);
+
+ exportedName->length = 6 + GSS_EAP_MECHANISM->length + 4 + krbNameLen;
+ if (composite) {
+ exportedName->length += 4;
+
+ major = gssEapExportAttrContext(minor, name, &attrs);
+ if (GSS_ERROR(major))
+ goto cleanup;
+ exportedName->length += 4 + attrs.length;
+ }
+
+ exportedName->value = GSSEAP_MALLOC(exportedName->length);
+ if (exportedName->value == NULL) {
+ major = GSS_S_FAILURE;
+ *minor = ENOMEM;
+ goto cleanup;
+ }
+
+ /* TOK | MECH_OID_LEN */
+ p = (unsigned char *)exportedName->value;
+ store_uint16_be(composite
+ ? TOK_TYPE_EXPORT_NAME_COMPOSITE
+ : TOK_TYPE_EXPORT_NAME,
+ p);
+ p += 2;
+ store_uint16_be(GSS_EAP_MECHANISM->length + 2, p);
+ p += 2;
+
+ /* MECH_OID */
+ *p++ = 0x06;
+ *p++ = GSS_EAP_MECHANISM->length & 0xff;
+ memcpy(p, GSS_EAP_MECHANISM->elements, GSS_EAP_MECHANISM->length);
+ p += GSS_EAP_MECHANISM->length;
+
+ /* NAME_LEN */
+ store_uint32_be(krbNameLen, p);
+ p += 4;
+
+ /* NAME */
+ memcpy(p, krbName, krbNameLen);
+ p += krbNameLen;
+
+ if (composite) {
+ store_uint32_be(name->flags, p);
+ p += 4;
+
+ store_uint32_be(attrs.length, p);
+ memcpy(&p[4], attrs.value, attrs.length);
+ p += 4 + attrs.length;
+ }
+
+ *minor = 0;
+ major = GSS_S_COMPLETE;
+
+cleanup:
+ GSSEAP_MUTEX_UNLOCK(&name->mutex);
+ gss_release_buffer(&tmpMinor, &attrs);
+ if (GSS_ERROR(major))
+ gss_release_buffer(&tmpMinor, exportedName);
+ krb5_free_unparsed_name(krbContext, krbName);
+
+ return major;
+}
+