1184588Sdfr/*- 2184588Sdfr * Copyright (c) 2008 Isilon Inc http://www.isilon.com/ 3184588Sdfr * Authors: Doug Rabson <dfr@rabson.org> 4184588Sdfr * Developed with Red Inc: Alfred Perlstein <alfred@freebsd.org> 5184588Sdfr * 6184588Sdfr * Redistribution and use in source and binary forms, with or without 7184588Sdfr * modification, are permitted provided that the following conditions 8184588Sdfr * are met: 9184588Sdfr * 1. Redistributions of source code must retain the above copyright 10184588Sdfr * notice, this list of conditions and the following disclaimer. 11184588Sdfr * 2. Redistributions in binary form must reproduce the above copyright 12184588Sdfr * notice, this list of conditions and the following disclaimer in the 13184588Sdfr * documentation and/or other materials provided with the distribution. 14184588Sdfr * 15184588Sdfr * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 16184588Sdfr * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 17184588Sdfr * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 18184588Sdfr * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 19184588Sdfr * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 20184588Sdfr * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 21184588Sdfr * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 22184588Sdfr * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 23184588Sdfr * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 24184588Sdfr * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 25184588Sdfr * SUCH DAMAGE. 26184588Sdfr */ 27184588Sdfr 28184588Sdfr#include <sys/cdefs.h> 29184588Sdfr__FBSDID("$FreeBSD: releng/11.0/sys/kgssapi/gss_init_sec_context.c 244370 2012-12-18 00:25:48Z rmacklem $"); 30184588Sdfr 31184588Sdfr#include <sys/param.h> 32184588Sdfr#include <sys/kernel.h> 33184588Sdfr#include <sys/kobj.h> 34244370Srmacklem#include <sys/lock.h> 35184588Sdfr#include <sys/malloc.h> 36244370Srmacklem#include <sys/mutex.h> 37184588Sdfr#include <sys/proc.h> 38184588Sdfr 39184588Sdfr#include <kgssapi/gssapi.h> 40184588Sdfr#include <kgssapi/gssapi_impl.h> 41184588Sdfr#include <rpc/rpc.h> 42184588Sdfr 43184588Sdfr#include "gssd.h" 44184588Sdfr#include "kgss_if.h" 45184588Sdfr 46184588SdfrOM_uint32 47184588Sdfrgss_init_sec_context(OM_uint32 * minor_status, 48184588Sdfr const gss_cred_id_t initiator_cred_handle, 49184588Sdfr gss_ctx_id_t * context_handle, 50184588Sdfr const gss_name_t target_name, 51184588Sdfr const gss_OID input_mech_type, 52184588Sdfr OM_uint32 req_flags, 53184588Sdfr OM_uint32 time_req, 54184588Sdfr const gss_channel_bindings_t input_chan_bindings, 55184588Sdfr const gss_buffer_t input_token, 56184588Sdfr gss_OID * actual_mech_type, 57184588Sdfr gss_buffer_t output_token, 58184588Sdfr OM_uint32 * ret_flags, 59184588Sdfr OM_uint32 * time_rec) 60184588Sdfr{ 61184588Sdfr struct init_sec_context_res res; 62184588Sdfr struct init_sec_context_args args; 63184588Sdfr enum clnt_stat stat; 64184588Sdfr gss_ctx_id_t ctx = *context_handle; 65244370Srmacklem CLIENT *cl; 66184588Sdfr 67184588Sdfr *minor_status = 0; 68184588Sdfr 69244370Srmacklem cl = kgss_gssd_client(); 70244370Srmacklem if (cl == NULL) 71184588Sdfr return (GSS_S_FAILURE); 72184588Sdfr 73184588Sdfr args.uid = curthread->td_ucred->cr_uid; 74184588Sdfr if (initiator_cred_handle) 75184588Sdfr args.cred = initiator_cred_handle->handle; 76184588Sdfr else 77184588Sdfr args.cred = 0; 78184588Sdfr if (ctx) 79184588Sdfr args.ctx = ctx->handle; 80184588Sdfr else 81184588Sdfr args.ctx = 0; 82184588Sdfr args.name = target_name->handle; 83184588Sdfr args.mech_type = input_mech_type; 84184588Sdfr args.req_flags = req_flags; 85184588Sdfr args.time_req = time_req; 86184588Sdfr args.input_chan_bindings = input_chan_bindings; 87184588Sdfr if (input_token) 88184588Sdfr args.input_token = *input_token; 89184588Sdfr else { 90184588Sdfr args.input_token.length = 0; 91184588Sdfr args.input_token.value = NULL; 92184588Sdfr } 93184588Sdfr 94184588Sdfr bzero(&res, sizeof(res)); 95244370Srmacklem stat = gssd_init_sec_context_1(&args, &res, cl); 96244370Srmacklem CLNT_RELEASE(cl); 97184588Sdfr if (stat != RPC_SUCCESS) { 98184588Sdfr *minor_status = stat; 99184588Sdfr return (GSS_S_FAILURE); 100184588Sdfr } 101184588Sdfr 102184588Sdfr if (res.major_status != GSS_S_COMPLETE 103184588Sdfr && res.major_status != GSS_S_CONTINUE_NEEDED) { 104184588Sdfr *minor_status = res.minor_status; 105184588Sdfr xdr_free((xdrproc_t) xdr_init_sec_context_res, &res); 106184588Sdfr return (res.major_status); 107184588Sdfr } 108184588Sdfr 109184588Sdfr *minor_status = res.minor_status; 110184588Sdfr 111184588Sdfr if (!ctx) { 112184588Sdfr ctx = kgss_create_context(res.actual_mech_type); 113184588Sdfr if (!ctx) { 114184588Sdfr xdr_free((xdrproc_t) xdr_init_sec_context_res, &res); 115184588Sdfr *minor_status = 0; 116184588Sdfr return (GSS_S_BAD_MECH); 117184588Sdfr } 118184588Sdfr } 119184588Sdfr *context_handle = ctx; 120184588Sdfr ctx->handle = res.ctx; 121184588Sdfr if (actual_mech_type) 122184588Sdfr *actual_mech_type = KGSS_MECH_TYPE(ctx); 123184588Sdfr kgss_copy_buffer(&res.output_token, output_token); 124184588Sdfr if (ret_flags) 125184588Sdfr *ret_flags = res.ret_flags; 126184588Sdfr if (time_rec) 127184588Sdfr *time_rec = res.time_rec; 128184588Sdfr 129184588Sdfr xdr_free((xdrproc_t) xdr_init_sec_context_res, &res); 130184588Sdfr 131184588Sdfr /* 132184588Sdfr * If the context establishment is complete, export it from 133184588Sdfr * userland and hand the result (which includes key material 134184588Sdfr * etc.) to the kernel implementation. 135184588Sdfr */ 136184588Sdfr if (res.major_status == GSS_S_COMPLETE) 137184588Sdfr res.major_status = kgss_transfer_context(ctx); 138184588Sdfr 139184588Sdfr return (res.major_status); 140184588Sdfr} 141