gss_accept_sec_context.c revision 168340
1153838Sdfr/*-
2153838Sdfr * Copyright (c) 2005 Doug Rabson
3153838Sdfr * All rights reserved.
4153838Sdfr *
5153838Sdfr * Redistribution and use in source and binary forms, with or without
6153838Sdfr * modification, are permitted provided that the following conditions
7153838Sdfr * are met:
8153838Sdfr * 1. Redistributions of source code must retain the above copyright
9153838Sdfr *    notice, this list of conditions and the following disclaimer.
10153838Sdfr * 2. Redistributions in binary form must reproduce the above copyright
11153838Sdfr *    notice, this list of conditions and the following disclaimer in the
12153838Sdfr *    documentation and/or other materials provided with the distribution.
13153838Sdfr *
14153838Sdfr * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15153838Sdfr * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16153838Sdfr * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17153838Sdfr * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18153838Sdfr * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19153838Sdfr * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20153838Sdfr * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21153838Sdfr * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22153838Sdfr * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23153838Sdfr * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24153838Sdfr * SUCH DAMAGE.
25153838Sdfr *
26153838Sdfr *	$FreeBSD: head/lib/libgssapi/gss_accept_sec_context.c 168340 2007-04-04 02:40:59Z kan $
27153838Sdfr */
28153838Sdfr
29153838Sdfr#include <gssapi/gssapi.h>
30153838Sdfr#include <stdlib.h>
31168340Skan#include <string.h>
32153838Sdfr#include <errno.h>
33153838Sdfr
34153838Sdfr#include "mech_switch.h"
35153838Sdfr#include "context.h"
36153838Sdfr#include "cred.h"
37153838Sdfr#include "name.h"
38153838Sdfr
39153838SdfrOM_uint32 gss_accept_sec_context(OM_uint32 *minor_status,
40153838Sdfr    gss_ctx_id_t *context_handle,
41153838Sdfr    const gss_cred_id_t acceptor_cred_handle,
42153838Sdfr    const gss_buffer_t input_token,
43153838Sdfr    const gss_channel_bindings_t input_chan_bindings,
44153838Sdfr    gss_name_t *src_name,
45153838Sdfr    gss_OID *mech_type,
46153838Sdfr    gss_buffer_t output_token,
47153838Sdfr    OM_uint32 *ret_flags,
48153838Sdfr    OM_uint32 *time_rec,
49153838Sdfr    gss_cred_id_t *delegated_cred_handle)
50153838Sdfr{
51153838Sdfr	OM_uint32 major_status;
52153838Sdfr	struct _gss_mech_switch *m;
53153838Sdfr	struct _gss_context *ctx = (struct _gss_context *) *context_handle;
54153838Sdfr	struct _gss_cred *cred = (struct _gss_cred *) acceptor_cred_handle;
55153838Sdfr	struct _gss_mechanism_cred *mc;
56153838Sdfr	gss_cred_id_t acceptor_mc, delegated_mc;
57153838Sdfr	gss_name_t src_mn;
58153838Sdfr	int allocated_ctx;
59153838Sdfr
60153838Sdfr	*minor_status = 0;
61153838Sdfr	if (src_name) *src_name = 0;
62153838Sdfr	if (mech_type) *mech_type = 0;
63153838Sdfr	if (ret_flags) *ret_flags = 0;
64153838Sdfr	if (time_rec) *time_rec = 0;
65153838Sdfr	if (delegated_cred_handle) *delegated_cred_handle = 0;
66153838Sdfr	output_token->length = 0;
67153838Sdfr	output_token->value = 0;
68153838Sdfr
69153838Sdfr	/*
70153838Sdfr	 * If this is the first call (*context_handle is NULL), we must
71153838Sdfr	 * parse the input token to figure out the mechanism to use.
72153838Sdfr	 */
73153838Sdfr	if (*context_handle == GSS_C_NO_CONTEXT) {
74153838Sdfr		unsigned char *p = input_token->value;
75153838Sdfr		size_t len = input_token->length;
76153838Sdfr		size_t a, b;
77153838Sdfr		gss_OID_desc mech_oid;
78153838Sdfr
79153838Sdfr		/*
80153838Sdfr		 * Token must start with [APPLICATION 0] SEQUENCE.
81153838Sdfr		 */
82153838Sdfr		if (len == 0 || *p != 0x60)
83153838Sdfr			return (GSS_S_DEFECTIVE_TOKEN);
84153838Sdfr		p++;
85153838Sdfr		len--;
86153838Sdfr
87153838Sdfr		/*
88153838Sdfr		 * Decode the length and make sure it agrees with the
89153838Sdfr		 * token length.
90153838Sdfr		 */
91153838Sdfr		if (len == 0)
92153838Sdfr			return (GSS_S_DEFECTIVE_TOKEN);
93153838Sdfr		if ((*p & 0x80) == 0) {
94153838Sdfr			a = *p;
95153838Sdfr			p++;
96153838Sdfr			len--;
97153838Sdfr		} else {
98153838Sdfr			b = *p & 0x7f;
99153838Sdfr			p++;
100153838Sdfr			len--;
101153838Sdfr			if (len < b)
102153838Sdfr				return (GSS_S_DEFECTIVE_TOKEN);
103153838Sdfr			a = 0;
104153838Sdfr			while (b) {
105153838Sdfr				a = (a << 8) | *p;
106153838Sdfr				p++;
107153838Sdfr				len--;
108153838Sdfr				b--;
109153838Sdfr			}
110153838Sdfr		}
111153838Sdfr		if (a != len)
112153838Sdfr			return (GSS_S_DEFECTIVE_TOKEN);
113153838Sdfr
114153838Sdfr		/*
115153838Sdfr		 * Decode the OID for the mechanism. Simplify life by
116153838Sdfr		 * assuming that the OID length is less than 128 bytes.
117153838Sdfr		 */
118153838Sdfr		if (len < 2 || *p != 0x06)
119153838Sdfr			return (GSS_S_DEFECTIVE_TOKEN);
120153838Sdfr		if ((p[1] & 0x80) || p[1] > (len - 2))
121153838Sdfr			return (GSS_S_DEFECTIVE_TOKEN);
122153838Sdfr		mech_oid.length = p[1];
123153838Sdfr		p += 2;
124153838Sdfr		len -= 2;
125153838Sdfr		mech_oid.elements = p;
126153838Sdfr
127153838Sdfr		/*
128153838Sdfr		 * Now that we have a mechanism, we can find the
129153838Sdfr		 * implementation.
130153838Sdfr		 */
131153838Sdfr		ctx = malloc(sizeof(struct _gss_context));
132153838Sdfr		if (!ctx) {
133153838Sdfr			*minor_status = ENOMEM;
134153838Sdfr			return (GSS_S_DEFECTIVE_TOKEN);
135153838Sdfr		}
136153838Sdfr		memset(ctx, 0, sizeof(struct _gss_context));
137153838Sdfr		m = ctx->gc_mech = _gss_find_mech_switch(&mech_oid);
138153838Sdfr		if (!m) {
139153838Sdfr			free(ctx);
140153838Sdfr			return (GSS_S_BAD_MECH);
141153838Sdfr		}
142153838Sdfr		allocated_ctx = 1;
143153838Sdfr	} else {
144153838Sdfr		m = ctx->gc_mech;
145153838Sdfr		allocated_ctx = 0;
146153838Sdfr	}
147153838Sdfr
148153838Sdfr	if (cred) {
149153838Sdfr		SLIST_FOREACH(mc, &cred->gc_mc, gmc_link)
150153838Sdfr			if (mc->gmc_mech == m)
151153838Sdfr				break;
152153838Sdfr		if (!mc)
153153838Sdfr			return (GSS_S_BAD_MECH);
154153838Sdfr		acceptor_mc = mc->gmc_cred;
155153838Sdfr	} else {
156153838Sdfr		acceptor_mc = GSS_C_NO_CREDENTIAL;
157153838Sdfr	}
158153838Sdfr	delegated_mc = GSS_C_NO_CREDENTIAL;
159153838Sdfr
160153838Sdfr	major_status = m->gm_accept_sec_context(minor_status,
161153838Sdfr	    &ctx->gc_ctx,
162153838Sdfr	    acceptor_mc,
163153838Sdfr	    input_token,
164153838Sdfr	    input_chan_bindings,
165153838Sdfr	    &src_mn,
166153838Sdfr	    mech_type,
167153838Sdfr	    output_token,
168153838Sdfr	    ret_flags,
169153838Sdfr	    time_rec,
170153838Sdfr	    &delegated_mc);
171153838Sdfr	if (major_status != GSS_S_COMPLETE &&
172153838Sdfr	    major_status != GSS_S_CONTINUE_NEEDED)
173153838Sdfr		return (major_status);
174153838Sdfr
175153838Sdfr	if (!src_name) {
176153838Sdfr		m->gm_release_name(minor_status, &src_mn);
177153838Sdfr	} else {
178153838Sdfr		/*
179153838Sdfr		 * Make a new name and mark it as an MN.
180153838Sdfr		 */
181153838Sdfr		struct _gss_name *name = _gss_make_name(m, src_mn);
182153838Sdfr
183153838Sdfr		if (!name) {
184153838Sdfr			m->gm_release_name(minor_status, &src_mn);
185153838Sdfr			return (GSS_S_FAILURE);
186153838Sdfr		}
187153838Sdfr		*src_name = (gss_name_t) name;
188153838Sdfr	}
189153838Sdfr
190153838Sdfr	if (*ret_flags & GSS_C_DELEG_FLAG) {
191153838Sdfr		if (!delegated_cred_handle) {
192153838Sdfr			m->gm_release_cred(minor_status, &delegated_mc);
193153838Sdfr			*ret_flags &= ~GSS_C_DELEG_FLAG;
194153838Sdfr		} else {
195153838Sdfr			struct _gss_cred *cred;
196153838Sdfr			struct _gss_mechanism_cred *mc;
197153838Sdfr
198153838Sdfr			cred = malloc(sizeof(struct _gss_cred));
199153838Sdfr			if (!cred) {
200153838Sdfr				*minor_status = ENOMEM;
201153838Sdfr				return (GSS_S_FAILURE);
202153838Sdfr			}
203153838Sdfr			mc = malloc(sizeof(struct _gss_mechanism_cred));
204153838Sdfr			if (!mc) {
205153838Sdfr				free(cred);
206153838Sdfr				*minor_status = ENOMEM;
207153838Sdfr				return (GSS_S_FAILURE);
208153838Sdfr			}
209153838Sdfr			m->gm_inquire_cred(minor_status, delegated_mc,
210153838Sdfr			    0, 0, &cred->gc_usage, 0);
211153838Sdfr			mc->gmc_mech = m;
212153838Sdfr			mc->gmc_mech_oid = &m->gm_mech_oid;
213153838Sdfr			mc->gmc_cred = delegated_mc;
214153838Sdfr			SLIST_INSERT_HEAD(&cred->gc_mc, mc, gmc_link);
215153838Sdfr
216153838Sdfr			*delegated_cred_handle = (gss_cred_id_t) cred;
217153838Sdfr		}
218153838Sdfr	}
219153838Sdfr
220153838Sdfr	*context_handle = (gss_ctx_id_t) ctx;
221153838Sdfr	return (major_status);
222153838Sdfr}
223