155682Smarkm/* 272445Sassar * Copyright (c) 1997 - 2000 Kungliga Tekniska H�gskolan 355682Smarkm * (Royal Institute of Technology, Stockholm, Sweden). 455682Smarkm * All rights reserved. 555682Smarkm * 655682Smarkm * Redistribution and use in source and binary forms, with or without 755682Smarkm * modification, are permitted provided that the following conditions 855682Smarkm * are met: 955682Smarkm * 1055682Smarkm * 1. Redistributions of source code must retain the above copyright 1155682Smarkm * notice, this list of conditions and the following disclaimer. 1255682Smarkm * 1355682Smarkm * 2. Redistributions in binary form must reproduce the above copyright 1455682Smarkm * notice, this list of conditions and the following disclaimer in the 1555682Smarkm * documentation and/or other materials provided with the distribution. 1655682Smarkm * 1755682Smarkm * 3. Neither the name of the Institute nor the names of its contributors 1855682Smarkm * may be used to endorse or promote products derived from this software 1955682Smarkm * without specific prior written permission. 2055682Smarkm * 2155682Smarkm * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND 2255682Smarkm * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 2355682Smarkm * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 2455682Smarkm * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE 2555682Smarkm * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 2655682Smarkm * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 2755682Smarkm * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 2855682Smarkm * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 2955682Smarkm * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 3055682Smarkm * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 3155682Smarkm * SUCH DAMAGE. 3255682Smarkm */ 3355682Smarkm 3455682Smarkm#include "test_locl.h" 3555682Smarkm#include <gssapi.h> 3655682Smarkm#include <krb5.h> 3755682Smarkm#include "nt_gss_common.h" 3855682Smarkm 39178825SdfrRCSID("$Id: nt_gss_server.c 12323 2003-05-21 15:15:34Z lha $"); 4055682Smarkm 4155682Smarkm/* 4255682Smarkm * This program tries to act as a server for the sample in `Sample 4355682Smarkm * SSPI Code' in Windows 2000 RC1 SDK. 4455682Smarkm * 4572445Sassar * use --dump-auth to get a binary dump of the authorization data in the ticket 4655682Smarkm */ 4755682Smarkm 4855682Smarkmstatic int help_flag; 4955682Smarkmstatic int version_flag; 5055682Smarkmstatic char *port_str; 5155682Smarkmchar *service = SERVICE; 5255682Smarkmstatic char *auth_file; 5355682Smarkm 5455682Smarkmstatic struct getargs args[] = { 5555682Smarkm { "port", 'p', arg_string, &port_str, "port to listen to", "port" }, 5655682Smarkm { "service", 's', arg_string, &service, "service to use", "service" }, 5755682Smarkm { "dump-auth", 0, arg_string, &auth_file, "dump authorization data", 5855682Smarkm "file" }, 5955682Smarkm { "help", 'h', arg_flag, &help_flag }, 6055682Smarkm { "version", 0, arg_flag, &version_flag } 6155682Smarkm}; 6255682Smarkm 6355682Smarkmstatic int num_args = sizeof(args) / sizeof(args[0]); 6455682Smarkm 6555682Smarkmstatic int 6655682Smarkmproto (int sock, const char *service) 6755682Smarkm{ 6855682Smarkm struct sockaddr_in remote, local; 6972445Sassar socklen_t addrlen; 7055682Smarkm gss_ctx_id_t context_hdl = GSS_C_NO_CONTEXT; 7155682Smarkm gss_buffer_t input_token, output_token; 7255682Smarkm gss_buffer_desc real_input_token, real_output_token; 7355682Smarkm OM_uint32 maj_stat, min_stat; 7455682Smarkm gss_name_t client_name; 7555682Smarkm gss_buffer_desc name_token; 7655682Smarkm 7755682Smarkm addrlen = sizeof(local); 7855682Smarkm if (getsockname (sock, (struct sockaddr *)&local, &addrlen) < 0 7955682Smarkm || addrlen != sizeof(local)) 8055682Smarkm err (1, "getsockname)"); 8155682Smarkm 8255682Smarkm addrlen = sizeof(remote); 8355682Smarkm if (getpeername (sock, (struct sockaddr *)&remote, &addrlen) < 0 8455682Smarkm || addrlen != sizeof(remote)) 8555682Smarkm err (1, "getpeername"); 8655682Smarkm 8755682Smarkm input_token = &real_input_token; 8855682Smarkm output_token = &real_output_token; 8955682Smarkm 9055682Smarkm do { 9155682Smarkm nt_read_token (sock, input_token); 9255682Smarkm maj_stat = 9355682Smarkm gss_accept_sec_context (&min_stat, 9455682Smarkm &context_hdl, 9555682Smarkm GSS_C_NO_CREDENTIAL, 9655682Smarkm input_token, 9755682Smarkm GSS_C_NO_CHANNEL_BINDINGS, 9855682Smarkm &client_name, 9955682Smarkm NULL, 10055682Smarkm output_token, 10155682Smarkm NULL, 10255682Smarkm NULL, 10355682Smarkm NULL); 10455682Smarkm if(GSS_ERROR(maj_stat)) 10555682Smarkm gss_err (1, min_stat, "gss_accept_sec_context"); 10655682Smarkm if (output_token->length != 0) 10755682Smarkm nt_write_token (sock, output_token); 10855682Smarkm if (GSS_ERROR(maj_stat)) { 10955682Smarkm if (context_hdl != GSS_C_NO_CONTEXT) 11055682Smarkm gss_delete_sec_context (&min_stat, 11155682Smarkm &context_hdl, 11255682Smarkm GSS_C_NO_BUFFER); 11355682Smarkm break; 11455682Smarkm } 11555682Smarkm } while(maj_stat & GSS_S_CONTINUE_NEEDED); 11655682Smarkm 11755682Smarkm if (auth_file != NULL) { 11855682Smarkm int fd = open (auth_file, O_WRONLY | O_CREAT, 0666); 119178825Sdfr#if 0 120178825Sdfr krb5_ticket *ticket; 121178825Sdfr krb5_data *data; 12255682Smarkm 123178825Sdfr ticket = context_hdl->ticket; 124178825Sdfr data = &ticket->ticket.authorization_data->val[0].ad_data; 125178825Sdfr 12655682Smarkm if(fd < 0) 12755682Smarkm err (1, "open %s", auth_file); 12855682Smarkm if (write (fd, data->data, data->length) != data->length) 12955682Smarkm errx (1, "write to %s failed", auth_file); 130178825Sdfr#endif 13155682Smarkm if (close (fd)) 13255682Smarkm err (1, "close %s", auth_file); 13355682Smarkm } 13455682Smarkm 13555682Smarkm maj_stat = gss_display_name (&min_stat, 13655682Smarkm client_name, 13755682Smarkm &name_token, 13855682Smarkm NULL); 13955682Smarkm if (GSS_ERROR(maj_stat)) 14055682Smarkm gss_err (1, min_stat, "gss_display_name"); 14155682Smarkm 14255682Smarkm fprintf (stderr, "User is `%.*s'\n", (int)name_token.length, 14355682Smarkm (char *)name_token.value); 14455682Smarkm 14555682Smarkm /* write something back */ 14655682Smarkm 14755682Smarkm output_token->value = strdup ("hejsan"); 14855682Smarkm output_token->length = strlen (output_token->value) + 1; 14955682Smarkm nt_write_token (sock, output_token); 15055682Smarkm 15155682Smarkm output_token->value = strdup ("hoppsan"); 15255682Smarkm output_token->length = strlen (output_token->value) + 1; 15355682Smarkm nt_write_token (sock, output_token); 15455682Smarkm 15555682Smarkm return 0; 15655682Smarkm} 15755682Smarkm 15855682Smarkmstatic int 15955682Smarkmdoit (int port, const char *service) 16055682Smarkm{ 16155682Smarkm int sock, sock2; 16255682Smarkm struct sockaddr_in my_addr; 16355682Smarkm int one = 1; 16455682Smarkm 16555682Smarkm sock = socket (AF_INET, SOCK_STREAM, 0); 16655682Smarkm if (sock < 0) 16755682Smarkm err (1, "socket"); 16855682Smarkm 16955682Smarkm memset (&my_addr, 0, sizeof(my_addr)); 17055682Smarkm my_addr.sin_family = AF_INET; 17155682Smarkm my_addr.sin_port = port; 17255682Smarkm my_addr.sin_addr.s_addr = INADDR_ANY; 17355682Smarkm 17455682Smarkm if (setsockopt (sock, SOL_SOCKET, SO_REUSEADDR, 17555682Smarkm (void *)&one, sizeof(one)) < 0) 17655682Smarkm warn ("setsockopt SO_REUSEADDR"); 17755682Smarkm 17855682Smarkm if (bind (sock, (struct sockaddr *)&my_addr, sizeof(my_addr)) < 0) 17955682Smarkm err (1, "bind"); 18055682Smarkm 18155682Smarkm if (listen (sock, 1) < 0) 18255682Smarkm err (1, "listen"); 18355682Smarkm 18455682Smarkm sock2 = accept (sock, NULL, NULL); 18555682Smarkm if (sock2 < 0) 18655682Smarkm err (1, "accept"); 18755682Smarkm 18855682Smarkm return proto (sock2, service); 18955682Smarkm} 19055682Smarkm 19155682Smarkmstatic void 19255682Smarkmusage(int code, struct getargs *args, int num_args) 19355682Smarkm{ 19455682Smarkm arg_printusage(args, num_args, NULL, ""); 19555682Smarkm exit(code); 19655682Smarkm} 19755682Smarkm 19855682Smarkmstatic int 19955682Smarkmcommon_setup(krb5_context *context, int *argc, char **argv, 20055682Smarkm void (*usage)(int, struct getargs*, int)) 20155682Smarkm{ 20255682Smarkm int port = 0; 20355682Smarkm *argc = krb5_program_setup(context, *argc, argv, args, num_args, usage); 20455682Smarkm 20555682Smarkm if(help_flag) 20655682Smarkm (*usage)(0, args, num_args); 20755682Smarkm if(version_flag) { 20855682Smarkm print_version(NULL); 20955682Smarkm exit(0); 21055682Smarkm } 21155682Smarkm 21255682Smarkm if(port_str){ 21355682Smarkm struct servent *s = roken_getservbyname(port_str, "tcp"); 21455682Smarkm if(s) 21555682Smarkm port = s->s_port; 21655682Smarkm else { 21755682Smarkm char *ptr; 21855682Smarkm 21955682Smarkm port = strtol (port_str, &ptr, 10); 22055682Smarkm if (port == 0 && ptr == port_str) 22155682Smarkm errx (1, "Bad port `%s'", port_str); 22255682Smarkm port = htons(port); 22355682Smarkm } 22455682Smarkm } 22555682Smarkm 22655682Smarkm if (port == 0) 22755682Smarkm port = krb5_getportbyname (*context, PORT, "tcp", 4711); 22855682Smarkm 22955682Smarkm return port; 23055682Smarkm} 23155682Smarkm 23255682Smarkmstatic int 23355682Smarkmsetup(krb5_context *context, int argc, char **argv) 23455682Smarkm{ 23555682Smarkm int port = common_setup(context, &argc, argv, usage); 23655682Smarkm if(argv[argc] != NULL) 23755682Smarkm usage(1, args, num_args); 23855682Smarkm return port; 23955682Smarkm} 24055682Smarkm 24155682Smarkmint 24255682Smarkmmain(int argc, char **argv) 24355682Smarkm{ 24455682Smarkm krb5_context context = NULL; /* XXX */ 24555682Smarkm int port = setup(&context, argc, argv); 24655682Smarkm return doit (port, service); 24755682Smarkm} 248