2 * Copyright (c) 2011, JANET(UK)
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the name of JANET(UK) nor the names of its contributors
17 * may be used to endorse or promote products derived from this software
18 * without specific prior written permission.
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
21 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34 * Utility routines for context handles.
37 #include "gssapiP_eap.h"
40 gssEapAllocContext(OM_uint32 *minor,
46 assert(*pCtx == GSS_C_NO_CONTEXT);
48 ctx = (gss_ctx_id_t)GSSEAP_CALLOC(1, sizeof(*ctx));
54 if (GSSEAP_MUTEX_INIT(&ctx->mutex) != 0) {
56 gssEapReleaseContext(&tmpMinor, &ctx);
60 ctx->state = GSSEAP_STATE_INITIAL;
61 ctx->mechanismUsed = GSS_C_NO_OID;
64 * Integrity, confidentiality, sequencing and replay detection are
65 * always available. Regardless of what flags are requested in
66 * GSS_Init_sec_context, implementations MUST set the flag corresponding
67 * to these services in the output of GSS_Init_sec_context and
68 * GSS_Accept_sec_context.
70 ctx->gssFlags = GSS_C_TRANS_FLAG | /* exporting contexts */
71 GSS_C_INTEG_FLAG | /* integrity */
72 GSS_C_CONF_FLAG | /* confidentiality */
73 GSS_C_SEQUENCE_FLAG | /* sequencing */
74 GSS_C_REPLAY_FLAG; /* replay detection */
78 return GSS_S_COMPLETE;
82 releaseInitiatorContext(struct gss_eap_initiator_ctx *ctx)
84 eap_peer_sm_deinit(ctx->eap);
88 releaseAcceptorContext(struct gss_eap_acceptor_ctx *ctx)
92 if (ctx->radConn != NULL)
93 rs_conn_destroy(ctx->radConn);
94 if (ctx->radContext != NULL)
95 rs_context_destroy(ctx->radContext);
96 if (ctx->radServer != NULL)
97 GSSEAP_FREE(ctx->radServer);
98 gss_release_buffer(&tmpMinor, &ctx->state);
100 gssEapRadiusFreeAvps(&tmpMinor, &ctx->vps);
104 gssEapReleaseContext(OM_uint32 *minor,
108 gss_ctx_id_t ctx = *pCtx;
109 krb5_context krbContext = NULL;
111 if (ctx == GSS_C_NO_CONTEXT) {
112 return GSS_S_COMPLETE;
115 gssEapKerberosInit(&tmpMinor, &krbContext);
117 #ifdef GSSEAP_ENABLE_REAUTH
118 if (ctx->flags & CTX_FLAG_KRB_REAUTH) {
119 gssDeleteSecContext(&tmpMinor, &ctx->reauthCtx, GSS_C_NO_BUFFER);
122 if (CTX_IS_INITIATOR(ctx)) {
123 releaseInitiatorContext(&ctx->initiatorCtx);
125 releaseAcceptorContext(&ctx->acceptorCtx);
128 krb5_free_keyblock_contents(krbContext, &ctx->rfc3961Key);
129 gssEapReleaseName(&tmpMinor, &ctx->initiatorName);
130 gssEapReleaseName(&tmpMinor, &ctx->acceptorName);
131 gssEapReleaseOid(&tmpMinor, &ctx->mechanismUsed);
132 sequenceFree(&tmpMinor, &ctx->seqState);
133 gssEapReleaseCred(&tmpMinor, &ctx->cred);
135 GSSEAP_MUTEX_DESTROY(&ctx->mutex);
137 memset(ctx, 0, sizeof(*ctx));
139 *pCtx = GSS_C_NO_CONTEXT;
142 return GSS_S_COMPLETE;
146 gssEapMakeToken(OM_uint32 *minor,
148 const gss_buffer_t innerToken,
149 enum gss_eap_token_type tokenType,
150 gss_buffer_t outputToken)
154 assert(ctx->mechanismUsed != GSS_C_NO_OID);
156 outputToken->length = tokenSize(ctx->mechanismUsed, innerToken->length);
157 outputToken->value = GSSEAP_MALLOC(outputToken->length);
158 if (outputToken->value == NULL) {
160 return GSS_S_FAILURE;
163 p = (unsigned char *)outputToken->value;
164 makeTokenHeader(ctx->mechanismUsed, innerToken->length, &p, tokenType);
165 memcpy(p, innerToken->value, innerToken->length);
168 return GSS_S_COMPLETE;
172 gssEapVerifyToken(OM_uint32 *minor,
174 const gss_buffer_t inputToken,
175 enum gss_eap_token_type *actualToken,
176 gss_buffer_t innerInputToken)
180 unsigned char *p = (unsigned char *)inputToken->value;
184 if (ctx->mechanismUsed != GSS_C_NO_OID) {
185 oid = ctx->mechanismUsed;
187 oidBuf.elements = NULL;
192 major = verifyTokenHeader(minor, oid, &bodySize, &p,
193 inputToken->length, actualToken);
194 if (GSS_ERROR(major))
197 if (ctx->mechanismUsed == GSS_C_NO_OID) {
198 major = gssEapCanonicalizeOid(minor, oid, 0, &ctx->mechanismUsed);
199 if (GSS_ERROR(major))
203 innerInputToken->length = bodySize;
204 innerInputToken->value = p;
207 return GSS_S_COMPLETE;
211 gssEapContextTime(OM_uint32 *minor,
212 gss_ctx_id_t context_handle,
217 if (context_handle->expiryTime == 0) {
218 *time_rec = GSS_C_INDEFINITE;
220 time_t now, lifetime;
223 lifetime = context_handle->expiryTime - now;
226 return GSS_S_CONTEXT_EXPIRED;
228 *time_rec = lifetime;
231 return GSS_S_COMPLETE;
235 gssEapMakeOrVerifyTokenMIC(OM_uint32 *minor,
237 gss_buffer_t tokenMIC,
241 gss_iov_buffer_desc *iov = NULL;
243 enum gss_eap_token_type tokType;
244 OM_uint32 micTokType;
245 unsigned char wireTokType[2];
246 unsigned char *innerTokTypes = NULL, *innerTokLengths = NULL;
247 const struct gss_eap_token_buffer_set *tokens;
249 tokens = verifyMIC ? ctx->inputTokens : ctx->outputTokens;
251 assert(tokens != NULL);
253 iov = GSSEAP_CALLOC(2 + (3 * tokens->buffers.count) + 1, sizeof(*iov));
255 major = GSS_S_FAILURE;
260 innerTokTypes = GSSEAP_MALLOC(4 * tokens->buffers.count);
261 if (innerTokTypes == NULL) {
263 major = GSS_S_FAILURE;
267 innerTokLengths = GSSEAP_MALLOC(4 * tokens->buffers.count);
268 if (innerTokLengths == NULL) {
269 major = GSS_S_FAILURE;
275 assert(ctx->mechanismUsed != GSS_C_NO_OID);
276 iov[i].type = GSS_IOV_BUFFER_TYPE_DATA;
277 iov[i].buffer.length = ctx->mechanismUsed->length;
278 iov[i].buffer.value = ctx->mechanismUsed->elements;
282 if (CTX_IS_INITIATOR(ctx) ^ verifyMIC) {
283 tokType = TOK_TYPE_INITIATOR_CONTEXT;
284 micTokType = ITOK_TYPE_INITIATOR_MIC;
286 tokType = TOK_TYPE_ACCEPTOR_CONTEXT;
287 micTokType = ITOK_TYPE_ACCEPTOR_MIC;
289 store_uint16_be(tokType, wireTokType);
291 iov[i].type = GSS_IOV_BUFFER_TYPE_DATA;
292 iov[i].buffer.length = sizeof(wireTokType);
293 iov[i].buffer.value = wireTokType;
296 for (j = 0; j < tokens->buffers.count; j++) {
298 (tokens->types[j] & ITOK_TYPE_MASK) == micTokType)
299 continue; /* will use this slot for trailer */
301 iov[i].type = GSS_IOV_BUFFER_TYPE_DATA;
302 iov[i].buffer.length = 4;
303 iov[i].buffer.value = &innerTokTypes[j * 4];
304 store_uint32_be(tokens->types[j] & ~(ITOK_FLAG_VERIFIED),
305 iov[i].buffer.value);
308 iov[i].type = GSS_IOV_BUFFER_TYPE_DATA;
309 iov[i].buffer.length = 4;
310 iov[i].buffer.value = &innerTokLengths[j * 4];
311 store_uint32_be(tokens->buffers.elements[j].length,
312 iov[i].buffer.value);
315 iov[i].type = GSS_IOV_BUFFER_TYPE_DATA;
316 iov[i].buffer = tokens->buffers.elements[j];
321 assert(tokenMIC->length >= 16);
323 assert(i < 2 + (3 * tokens->buffers.count));
325 iov[i].type = GSS_IOV_BUFFER_TYPE_HEADER;
326 iov[i].buffer.length = 16;
327 iov[i].buffer.value = tokenMIC->value;
330 iov[i].type = GSS_IOV_BUFFER_TYPE_TRAILER;
331 iov[i].buffer.length = tokenMIC->length - 16;
332 iov[i].buffer.value = (unsigned char *)tokenMIC->value + 16;
335 major = gssEapUnwrapOrVerifyMIC(minor, ctx, NULL, NULL,
336 iov, i, TOK_TYPE_MIC);
338 iov[i++].type = GSS_IOV_BUFFER_TYPE_HEADER | GSS_IOV_BUFFER_FLAG_ALLOCATE;
339 major = gssEapWrapOrGetMIC(minor, ctx, FALSE, NULL,
340 iov, i, TOK_TYPE_MIC);
341 if (!GSS_ERROR(major))
342 *tokenMIC = iov[i - 1].buffer;
347 gssEapReleaseIov(iov, tokens->buffers.count);
348 if (innerTokTypes != NULL)
349 GSSEAP_FREE(innerTokTypes);
350 if (innerTokLengths != NULL)
351 GSSEAP_FREE(innerTokLengths);
357 gssEapMakeTokenMIC(OM_uint32 *minor,
359 gss_buffer_t tokenMIC)
361 tokenMIC->length = 0;
362 tokenMIC->value = NULL;
364 return gssEapMakeOrVerifyTokenMIC(minor, ctx, tokenMIC, FALSE);
368 gssEapVerifyTokenMIC(OM_uint32 *minor,
370 const gss_buffer_t tokenMIC)
372 if (tokenMIC->length < 16) {
373 *minor = GSSEAP_TOK_TRUNC;
374 return GSS_S_BAD_SIG;
377 return gssEapMakeOrVerifyTokenMIC(minor, ctx, tokenMIC, TRUE);