diff options
author | stevel@tonic-gate <none@none> | 2005-06-14 00:00:00 -0700 |
---|---|---|
committer | stevel@tonic-gate <none@none> | 2005-06-14 00:00:00 -0700 |
commit | 7c478bd95313f5f23a4c958a745db2134aa03244 (patch) | |
tree | c871e58545497667cbb4b0a4f2daf204743e1fe7 /usr/src/lib/rpcsec_gss/rpcsec_gss_misc.c | |
download | illumos-joyent-7c478bd95313f5f23a4c958a745db2134aa03244.tar.gz |
OpenSolaris Launch
Diffstat (limited to 'usr/src/lib/rpcsec_gss/rpcsec_gss_misc.c')
-rw-r--r-- | usr/src/lib/rpcsec_gss/rpcsec_gss_misc.c | 346 |
1 files changed, 346 insertions, 0 deletions
diff --git a/usr/src/lib/rpcsec_gss/rpcsec_gss_misc.c b/usr/src/lib/rpcsec_gss/rpcsec_gss_misc.c new file mode 100644 index 0000000000..e9bf848365 --- /dev/null +++ b/usr/src/lib/rpcsec_gss/rpcsec_gss_misc.c @@ -0,0 +1,346 @@ +/* + * CDDL HEADER START + * + * The contents of this file are subject to the terms of the + * Common Development and Distribution License, Version 1.0 only + * (the "License"). You may not use this file except in compliance + * with the License. + * + * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE + * or http://www.opensolaris.org/os/licensing. + * See the License for the specific language governing permissions + * and limitations under the License. + * + * When distributing Covered Code, include this CDDL HEADER in each + * file and include the License file at usr/src/OPENSOLARIS.LICENSE. + * If applicable, add the following below this CDDL HEADER, with the + * fields enclosed by brackets "[]" replaced with your own identifying + * information: Portions Copyright [yyyy] [name of copyright owner] + * + * CDDL HEADER END + */ +/* + * Copyright (c) 1986-1995, 1997, 2001 by Sun Microsystems, Inc. + * All rights reserved. + */ + +#pragma ident "%Z%%M% %I% %E% SMI" + +/* + * Copyright 1993 OpenVision Technologies, Inc., All Rights Reserved. + * + * $Header: + * /afs/gza.com/product/secure/rel-eng/src/1.1/rpc/RCS/auth_gssapi_misc.c,v + * 1.10 1994/10/27 12:39:23 jik Exp $ + */ + +#include <stdlib.h> +#include <gssapi/gssapi.h> +#include <rpc/rpc.h> +#include <rpc/rpcsec_defs.h> + +/* + * Miscellaneous XDR routines. + */ +bool_t +__xdr_gss_buf(xdrs, buf) + XDR *xdrs; + gss_buffer_t buf; +{ + u_int cast_len, bound_len; + + /* + * We go through this contortion because size_t is a now a ulong, + * GSS-API uses ulongs. + */ + + if (xdrs->x_op != XDR_DECODE) { + bound_len = cast_len = (u_int) buf->length; + } else { + bound_len = (u_int)-1; + } + + if (xdr_bytes(xdrs, (char **)&buf->value, &cast_len, + bound_len) == TRUE) { + if (xdrs->x_op == XDR_DECODE) + buf->length = cast_len; + + return (TRUE); + } + + return (FALSE); +} + +bool_t +__xdr_rpc_gss_creds(xdrs, creds) + XDR *xdrs; + rpc_gss_creds *creds; +{ + if (!xdr_u_int(xdrs, &creds->version) || + !xdr_u_int(xdrs, &creds->gss_proc) || + !xdr_u_int(xdrs, &creds->seq_num) || + !xdr_u_int(xdrs, (u_int *)&creds->service) || + !__xdr_gss_buf(xdrs, &creds->ctx_handle)) + return (FALSE); + return (TRUE); +} + +bool_t +__xdr_rpc_gss_init_arg(xdrs, init_arg) + XDR *xdrs; + rpc_gss_init_arg *init_arg; +{ + if (!__xdr_gss_buf(xdrs, init_arg)) + return (FALSE); + return (TRUE); +} + +bool_t +__xdr_rpc_gss_init_res(xdrs, init_res) + XDR *xdrs; + rpc_gss_init_res *init_res; +{ + if (!__xdr_gss_buf(xdrs, &init_res->ctx_handle) || + !xdr_u_int(xdrs, (u_int *)&init_res->gss_major) || + !xdr_u_int(xdrs, (u_int *)&init_res->gss_minor) || + !xdr_u_int(xdrs, (u_int *)&init_res->seq_window) || + !__xdr_gss_buf(xdrs, &init_res->token)) + return (FALSE); + return (TRUE); +} + +/* + * Generic routine to wrap data used by client and server sides. + */ +bool_t +__rpc_gss_wrap_data(service, qop, context, seq_num, out_xdrs, xdr_func, + xdr_ptr) + OM_uint32 qop; + rpc_gss_service_t service; + gss_ctx_id_t context; + u_int seq_num; + XDR *out_xdrs; + bool_t (*xdr_func)(); + caddr_t xdr_ptr; +{ + OM_uint32 minor; + gss_buffer_desc in_buf, out_buf; + XDR temp_xdrs; + bool_t conf_state; + bool_t ret = FALSE; + u_int bufsiz; + char *buf; + + /* + * Create a temporary XDR/buffer to hold the data to be wrapped. + */ + out_buf.length = 0; + bufsiz = xdr_sizeof(xdr_func, xdr_ptr) + + xdr_sizeof(xdr_u_int, &seq_num); + if ((buf = (char *)malloc(bufsiz)) == NULL) { + fprintf(stderr, dgettext(TEXT_DOMAIN, "malloc failed in " + "__rpc_gss_wrap_data\n")); + return (FALSE); + } + xdrmem_create(&temp_xdrs, buf, bufsiz, XDR_ENCODE); + + /* + * serialize the sequence number into tmp memory + */ + if (!xdr_u_int(&temp_xdrs, &seq_num)) + goto fail; + + /* + * serialize the arguments into tmp memory + */ + if (!(*xdr_func)(&temp_xdrs, xdr_ptr)) + goto fail; + + /* + * Data to be wrapped goes in in_buf. If privacy is used, + * out_buf will have wrapped data (in_buf will no longer be + * needed). If integrity is used, out_buf will have checksum + * which will follow the data in in_buf. + */ + in_buf.length = xdr_getpos(&temp_xdrs); + in_buf.value = temp_xdrs.x_base; + + switch (service) { + case rpc_gss_svc_privacy: + if (gss_seal(&minor, context, TRUE, qop, &in_buf, + &conf_state, &out_buf) != GSS_S_COMPLETE) + goto fail; + in_buf.length = 0; /* in_buf not needed */ + if (!conf_state) + goto fail; + break; + case rpc_gss_svc_integrity: + if (gss_sign(&minor, context, qop, &in_buf, + &out_buf) != GSS_S_COMPLETE) + goto fail; + break; + default: + goto fail; + } + + /* + * write out in_buf and out_buf as needed + */ + if (in_buf.length != 0) { + if (!__xdr_gss_buf(out_xdrs, &in_buf)) + goto fail; + } + + if (!__xdr_gss_buf(out_xdrs, &out_buf)) + goto fail; + ret = TRUE; +fail: + XDR_DESTROY(&temp_xdrs); + if (buf) + (void) free(buf); + if (out_buf.length != 0) + (void) gss_release_buffer(&minor, &out_buf); + return (ret); +} + +/* + * Generic routine to unwrap data used by client and server sides. + */ +bool_t +__rpc_gss_unwrap_data(service, context, seq_num, qop_check, in_xdrs, xdr_func, + xdr_ptr) + rpc_gss_service_t service; + gss_ctx_id_t context; + u_int seq_num; + OM_uint32 qop_check; + XDR *in_xdrs; + bool_t (*xdr_func)(); + caddr_t xdr_ptr; +{ + gss_buffer_desc in_buf, out_buf; + XDR temp_xdrs; + u_int seq_num2; + bool_t conf; + OM_uint32 major = GSS_S_COMPLETE, minor = 0; + int qop; + + in_buf.value = NULL; + out_buf.value = NULL; + + /* + * Pull out wrapped data. For privacy service, this is the + * encrypted data. For integrity service, this is the data + * followed by a checksum. + */ + if (!__xdr_gss_buf(in_xdrs, &in_buf)) + return (FALSE); + + if (service == rpc_gss_svc_privacy) { + major = gss_unseal(&minor, context, &in_buf, &out_buf, &conf, + &qop); + free(in_buf.value); + if (major != GSS_S_COMPLETE) + return (FALSE); + /* + * Keep the returned token (unencrypted data) in in_buf. + */ + in_buf.length = out_buf.length; + in_buf.value = out_buf.value; + + /* + * If privacy was not used, or if QOP is not what we are + * expecting, fail. + */ + if (!conf || qop != qop_check) + goto fail; + + } else if (service == rpc_gss_svc_integrity) { + if (!__xdr_gss_buf(in_xdrs, &out_buf)) + return (FALSE); + major = gss_verify(&minor, context, &in_buf, &out_buf, &qop); + free(out_buf.value); + if (major != GSS_S_COMPLETE) { + free(in_buf.value); + return (FALSE); + } + + /* + * If QOP is not what we are expecting, fail. + */ + if (qop != qop_check) + goto fail; + } + + xdrmem_create(&temp_xdrs, in_buf.value, in_buf.length, XDR_DECODE); + + /* + * The data consists of the sequence number followed by the + * arguments. Make sure sequence number is what we are + * expecting (i.e., the value in the header). + */ + if (!xdr_u_int(&temp_xdrs, &seq_num2)) + goto fail; + if (seq_num2 != seq_num) + goto fail; + + /* + * Deserialize the arguments into xdr_ptr, and release in_buf. + */ + if (!(*xdr_func)(&temp_xdrs, xdr_ptr)) + goto fail; + + if (service == rpc_gss_svc_privacy) + (void) gss_release_buffer(&minor, &in_buf); + else + free(in_buf.value); + XDR_DESTROY(&temp_xdrs); + return (TRUE); +fail: + XDR_DESTROY(&temp_xdrs); + if (service == rpc_gss_svc_privacy) + (void) gss_release_buffer(&minor, &in_buf); + else + free(in_buf.value); + return (FALSE); +} + +/*ARGSUSED*/ +int +__find_max_data_length(service, context, qop, max_tp_unit_len) + rpc_gss_service_t service; + gss_ctx_id_t context; + OM_uint32 qop; + int max_tp_unit_len; +{ + int conf; + OM_uint32 maj_stat = GSS_S_COMPLETE, min_stat = 0; + OM_uint32 max_input_size; + int ret_val = 0; + + if (service == rpc_gss_svc_integrity || service == rpc_gss_svc_default) + conf = 0; + else if (service == rpc_gss_svc_privacy) + conf = 1; + else if (service == rpc_gss_svc_none) + return (max_tp_unit_len); + + maj_stat = gss_wrap_size_limit(&min_stat, + context, conf, qop, + max_tp_unit_len, &max_input_size); + + /* + * max_input_size may result in negative value + */ + if (maj_stat == GSS_S_COMPLETE) { + if ((int)max_input_size <= 0) + ret_val = 0; + else + ret_val = (int)(max_input_size); + } else { + fprintf(stderr, dgettext(TEXT_DOMAIN, + "gss_wrap_size_limit failed in " + "__find_max_data_length\n")); + } + + return (ret_val); +} |