gss: GSS_KRB5_IMPORT_RFC4121_CONTEXT_X / _gss_mg_import_rfc4121_context()

Add a new private interface (accessed through _gss_mg_import_rfc4121_context())
through which a skeletal krb5 mechanism context can be created, suitable for
RFC4121 message protection and PRF services.
This commit is contained in:
Luke Howard
2020-04-14 12:36:09 +10:00
parent 9383a88a86
commit 26a69856f6
8 changed files with 245 additions and 0 deletions

View File

@@ -98,6 +98,119 @@ set_int32(OM_uint32 *minor_status,
return GSS_S_COMPLETE;
}
/*
* GSS_KRB5_IMPORT_RFC4121_CONTEXT_X is an internal, private interface
* to allow SAnon to create a skeletal context for using RFC4121 message
* protection services.
*
* rfc4121_args ::= initiator_flag || flags || enctype || session key
*/
static OM_uint32
make_rfc4121_context(OM_uint32 *minor,
krb5_context context,
gss_ctx_id_t *context_handle,
gss_const_buffer_t rfc4121_args)
{
OM_uint32 major = GSS_S_FAILURE, tmp;
krb5_error_code ret;
krb5_storage *sp = NULL;
gsskrb5_ctx ctx = NULL;
uint8_t initiator_flag;
int32_t enctype;
size_t keysize;
krb5_keyblock *key;
*minor = 0;
sp = krb5_storage_from_readonly_mem(rfc4121_args->value, rfc4121_args->length);
if (sp == NULL) {
ret = ENOMEM;
goto out;
}
krb5_storage_set_byteorder(sp, KRB5_STORAGE_BYTEORDER_HOST);
ctx = calloc(1, sizeof(*ctx));
if (ctx == NULL) {
ret = ENOMEM;
goto out;
}
ret = krb5_ret_uint8(sp, &initiator_flag);
if (ret != 0)
goto out;
ret = krb5_ret_uint32(sp, &ctx->flags);
if (ret != 0)
goto out;
ctx->more_flags = IS_CFX | ACCEPTOR_SUBKEY | OPEN;
if (initiator_flag)
ctx->more_flags |= LOCAL;
ctx->state = initiator_flag ? INITIATOR_READY : ACCEPTOR_READY;
ret = krb5_ret_int32(sp, &enctype);
if (ret != 0)
goto out;
ret = krb5_enctype_keysize(context, enctype, &keysize);
if (ret != 0)
goto out;
ctx->auth_context = calloc(1, sizeof(*ctx->auth_context));
if (ctx->auth_context == NULL) {
ret = ENOMEM;
goto out;
}
key = calloc(1, sizeof(*key));
if (key == NULL) {
ret = ENOMEM;
goto out;
}
if (initiator_flag)
ctx->auth_context->remote_subkey = key;
else
ctx->auth_context->local_subkey = key;
key->keytype = enctype;
key->keyvalue.data = malloc(keysize);
if (key->keyvalue.data == NULL) {
ret = ENOMEM;
goto out;
}
if (krb5_storage_read(sp, key->keyvalue.data, keysize) != keysize) {
ret = EINVAL;
goto out;
}
key->keyvalue.length = keysize;
ret = krb5_crypto_init(context, key, 0, &ctx->crypto);
if (ret != 0)
goto out;
major = _gssapi_msg_order_create(minor, &ctx->order,
_gssapi_msg_order_f(ctx->flags),
0, 0, 1);
if (major != GSS_S_COMPLETE)
goto out;
out:
krb5_storage_free(sp);
if (major != GSS_S_COMPLETE) {
if (*minor == 0)
*minor = ret;
_gsskrb5_delete_sec_context(&tmp, (gss_ctx_id_t *)&ctx, GSS_C_NO_BUFFER);
} else {
*context_handle = (gss_ctx_id_t)ctx;
}
return major;
}
OM_uint32 GSSAPI_CALLCONV
_gsskrb5_set_sec_context_option
(OM_uint32 *minor_status,
@@ -239,6 +352,8 @@ _gsskrb5_set_sec_context_option
*minor_status = 0;
return GSS_S_COMPLETE;
} else if (gss_oid_equal(desired_object, GSS_KRB5_IMPORT_RFC4121_CONTEXT_X)) {
return make_rfc4121_context(minor_status, context, context_handle, value);
}
*minor_status = EINVAL;