gss_authorize_localname implementation

This commit is contained in:
Luke Howard
2011-04-08 10:58:57 +10:00
parent 6ec5011d48
commit 6c6e483e00
9 changed files with 103 additions and 85 deletions

View File

@@ -71,7 +71,7 @@ krb5src = \
krb5/set_sec_context_option.c \ krb5/set_sec_context_option.c \
krb5/ticket_flags.c \ krb5/ticket_flags.c \
krb5/unwrap.c \ krb5/unwrap.c \
krb5/userok.c \ krb5/authorize_localname.c \
krb5/verify_mic.c \ krb5/verify_mic.c \
krb5/wrap.c krb5/wrap.c
@@ -142,7 +142,7 @@ mechsrc = \
mech/gss_test_oid_set_member.c \ mech/gss_test_oid_set_member.c \
mech/gss_unseal.c \ mech/gss_unseal.c \
mech/gss_unwrap.c \ mech/gss_unwrap.c \
mech/gss_userok.c \ mech/gss_authorize_localname.c \
mech/gss_utils.c \ mech/gss_utils.c \
mech/gss_verify.c \ mech/gss_verify.c \
mech/gss_verify_mic.c \ mech/gss_verify_mic.c \

View File

@@ -1033,10 +1033,17 @@ gss_pname_to_uid(
uid_t *uidOut); uid_t *uidOut);
GSSAPI_LIB_FUNCTION OM_uint32 GSSAPI_LIB_CALL GSSAPI_LIB_FUNCTION OM_uint32 GSSAPI_LIB_CALL
gss_userok(OM_uint32 *minor, gss_authorize_localname(
OM_uint32 *minor,
const gss_name_t name, const gss_name_t name,
const char *user, const gss_name_t user,
int *user_ok); int *authorized);
GSSAPI_LIB_FUNCTION int GSSAPI_LIB_CALL
gss_userok(const gss_name_t name,
const char *user);
extern GSSAPI_LIB_VARIABLE gss_buffer_t GSS_C_ATTR_LOCAL_LOGIN_USER;
/* /*
* Naming extensions * Naming extensions

View File

@@ -495,11 +495,11 @@ typedef OM_uint32 GSSAPI_CALLCONV _gss_pname_to_uid_t (
uid_t * /* uidOut */ uid_t * /* uidOut */
); );
typedef OM_uint32 GSSAPI_CALLCONV _gss_userok_t ( typedef OM_uint32 GSSAPI_CALLCONV _gss_authorize_localname_t (
OM_uint32 *, /* minor_status */ OM_uint32 *, /* minor_status */
const gss_name_t, /* name */ const gss_name_t, /* name */
const char *, /* user */ gss_const_buffer_t, /* user */
int * /*user_ok */ int * /* user_ok */
); );
/* mechglue internal */ /* mechglue internal */
@@ -565,7 +565,7 @@ typedef struct gssapi_mech_interface_desc {
gss_mo_desc *gm_mo; gss_mo_desc *gm_mo;
size_t gm_mo_num; size_t gm_mo_num;
_gss_pname_to_uid_t *gm_pname_to_uid; _gss_pname_to_uid_t *gm_pname_to_uid;
_gss_userok_t *gm_userok; _gss_authorize_localname_t *gm_authorize_localname;
_gss_display_name_ext_t *gm_display_name_ext; _gss_display_name_ext_t *gm_display_name_ext;
_gss_inquire_name_t *gm_inquire_name; _gss_inquire_name_t *gm_inquire_name;
_gss_get_name_attribute_t *gm_get_name_attribute; _gss_get_name_attribute_t *gm_get_name_attribute;

View File

@@ -33,18 +33,30 @@
#include "gsskrb5_locl.h" #include "gsskrb5_locl.h"
OM_uint32 OM_uint32
_gsskrb5_userok(OM_uint32 *minor_status, _gsskrb5_authorize_localname(OM_uint32 *minor_status,
const gss_name_t input_name, const gss_name_t input_name,
const char *user, gss_const_buffer_t user_name,
int *user_ok) int *user_ok)
{ {
krb5_context context; krb5_context context;
krb5_const_principal princ = (krb5_const_principal)input_name; krb5_principal princ = (krb5_principal)input_name;
char *user;
GSSAPI_KRB5_INIT(&context); GSSAPI_KRB5_INIT(&context);
user = malloc(user_name->length + 1);
if (user == NULL) {
*minor_status = ENOMEM;
return GSS_S_FAILURE;
}
memcpy(user, user_name->value, user_name->length);
user[user_name->length] = '\0';
*minor_status = 0; *minor_status = 0;
*user_ok = krb5_kuserok(context, princ, user); *user_ok = krb5_kuserok(context, princ, user);
free(user);
return GSS_S_COMPLETE; return GSS_S_COMPLETE;
} }

View File

@@ -325,7 +325,7 @@ static gssapi_mech_interface_desc krb5_mech = {
krb5_mo, krb5_mo,
sizeof(krb5_mo) / sizeof(krb5_mo[0]), sizeof(krb5_mo) / sizeof(krb5_mo[0]),
NULL, NULL,
_gsskrb5_userok, _gsskrb5_authorize_localname,
_gsskrb5_pname_to_uid _gsskrb5_pname_to_uid
}; };

View File

@@ -32,12 +32,17 @@
#include "mech_locl.h" #include "mech_locl.h"
static const char localLoginUserAttr[] = "local-login-user"; static gss_buffer_desc localLoginUserAttr = {
sizeof("local-login-user"),
"local-login-user"
};
gss_buffer_t GSSAPI_LIB_VARIABLE GSS_C_ATTR_LOCAL_LOGIN_USER = &localLoginUserAttr;
static OM_uint32 static OM_uint32
mech_userok(OM_uint32 *minor_status, mech_authorize_localname(OM_uint32 *minor_status,
gss_name_t input_name, const gss_name_t input_name,
const char *user, const struct _gss_name *user,
int *user_ok) int *user_ok)
{ {
const struct _gss_name *name = (const struct _gss_name *)input_name; const struct _gss_name *name = (const struct _gss_name *)input_name;
@@ -49,12 +54,12 @@ mech_userok(OM_uint32 *minor_status,
HEIM_SLIST_FOREACH(mn, &name->gn_mn, gmn_link) { HEIM_SLIST_FOREACH(mn, &name->gn_mn, gmn_link) {
gssapi_mech_interface m = mn->gmn_mech; gssapi_mech_interface m = mn->gmn_mech;
if (!m->gm_userok) if (!m->gm_authorize_localname)
continue; continue;
major_status = m->gm_userok(minor_status, major_status = m->gm_authorize_localname(minor_status,
mn->gmn_name, mn->gmn_name,
user, &user->gn_value,
user_ok); user_ok);
if (GSS_ERROR(major_status) || *user_ok) if (GSS_ERROR(major_status) || *user_ok)
break; break;
@@ -67,22 +72,17 @@ mech_userok(OM_uint32 *minor_status,
* Naming extensions based local login authorization. * Naming extensions based local login authorization.
*/ */
static OM_uint32 static OM_uint32
attr_userok(OM_uint32 *minor_status, attr_authorize_localname(OM_uint32 *minor_status,
const gss_name_t name, const gss_name_t name,
const char *user, const struct _gss_name *user,
int *user_ok) int *user_ok)
{ {
OM_uint32 major_status = GSS_S_UNAVAILABLE; OM_uint32 major_status = GSS_S_UNAVAILABLE;
OM_uint32 tmpMinor; OM_uint32 tmpMinor;
size_t userLen = strlen(user);
int more = -1; int more = -1;
gss_buffer_desc attribute;
*user_ok = 0; *user_ok = 0;
attribute.length = sizeof(localLoginUserAttr) - 1;
attribute.value = (void *)localLoginUserAttr;
while (more != 0 && *user_ok == 0) { while (more != 0 && *user_ok == 0) {
gss_buffer_desc value; gss_buffer_desc value;
gss_buffer_desc display_value; gss_buffer_desc display_value;
@@ -90,7 +90,7 @@ attr_userok(OM_uint32 *minor_status,
major_status = gss_get_name_attribute(minor_status, major_status = gss_get_name_attribute(minor_status,
name, name,
&attribute, GSS_C_ATTR_LOCAL_LOGIN_USER,
&authenticated, &authenticated,
&complete, &complete,
&value, &value,
@@ -100,8 +100,8 @@ attr_userok(OM_uint32 *minor_status,
break; break;
if (authenticated && if (authenticated &&
value.length == userLen && value.length == user->gn_value.length &&
memcmp(value.value, user, userLen) == 0) memcmp(value.value, user->gn_value.value, user->gn_value.length) == 0)
*user_ok = 1; *user_ok = 1;
gss_release_buffer(&tmpMinor, &value); gss_release_buffer(&tmpMinor, &value);
@@ -111,63 +111,65 @@ attr_userok(OM_uint32 *minor_status,
return major_status; return major_status;
} }
/*
* Equality based local login authorization.
*/
static OM_uint32
compare_names_userok(OM_uint32 *minor_status,
const gss_name_t name,
const char *user,
int *user_ok)
{
OM_uint32 major_status = GSS_S_UNAVAILABLE;
OM_uint32 tmpMinor;
gss_buffer_desc gssUser;
gss_name_t gssUserName = GSS_C_NO_NAME;
*user_ok = 0;
gssUser.length = strlen(user);
gssUser.value = (void *)user;
major_status = gss_import_name(minor_status, &gssUser,
GSS_C_NT_USER_NAME, &gssUserName);
if (GSS_ERROR(major_status))
return major_status;
major_status = gss_compare_name(minor_status, name,
gssUserName, user_ok);
gss_release_name(&tmpMinor, &gssUserName);
return major_status;
}
OM_uint32 OM_uint32
gss_userok(OM_uint32 *minor_status, gss_authorize_localname(OM_uint32 *minor_status,
const gss_name_t name, const gss_name_t name,
const char *user, const gss_name_t user_name,
int *user_ok) int *user_ok)
{ {
OM_uint32 major_status; OM_uint32 major_status;
const struct _gss_name *user = (const struct _gss_name *) user_name;
*minor_status = 0; *minor_status = 0;
*user_ok = 0; *user_ok = 0;
if (name == GSS_C_NO_NAME || user_name == GSS_C_NO_NAME)
return GSS_S_CALL_INACCESSIBLE_READ;
/* name must not be a MN */
if (HEIM_SLIST_FIRST(&user->gn_mn) != NULL)
return GSS_S_BAD_NAME;
/* If mech returns yes, we return yes */ /* If mech returns yes, we return yes */
major_status = mech_userok(minor_status, name, user, user_ok); major_status = mech_authorize_localname(minor_status,
name, user, user_ok);
if (major_status == GSS_S_COMPLETE && *user_ok) if (major_status == GSS_S_COMPLETE && *user_ok)
return GSS_S_COMPLETE; return GSS_S_COMPLETE;
/* If attribute exists, we evaluate attribute */ /* If attribute exists, we evaluate attribute */
if (attr_userok(minor_status, name, user, user_ok) == GSS_S_COMPLETE) if (attr_authorize_localname(minor_status,
name, user, user_ok) == GSS_S_COMPLETE)
return GSS_S_COMPLETE; return GSS_S_COMPLETE;
/* If mech returns unavail, we compare the local name */ /* If mech returns unavail, we compare the local name */
if (major_status == GSS_S_UNAVAILABLE) if (major_status == GSS_S_UNAVAILABLE)
major_status = compare_names_userok(minor_status, name, major_status = gss_compare_name(minor_status, name, user_name, user_ok);
user, user_ok);
return major_status; return major_status;
} }
int
gss_userok(const gss_name_t name,
const char *user)
{
OM_uint32 major_status, minor_status;
gss_buffer_desc userBuf;
gss_name_t userName;
int user_ok = 0;
userBuf.value = (void *)user;
userBuf.length = strlen(user);
major_status = gss_import_name(&minor_status, &userBuf, GSS_C_NO_OID, &userName);
if (GSS_ERROR(major_status))
return 0;
major_status = gss_authorize_localname(&minor_status, name, userName, &user_ok);
if (GSS_ERROR(major_status))
user_ok = 0;
gss_release_name(&minor_status, &userName);
return user_ok;
}

View File

@@ -360,7 +360,7 @@ _gss_load_mech(void)
OPTSPISYM(acquire_cred_with_password); OPTSPISYM(acquire_cred_with_password);
OPTSYM(add_cred_with_password); OPTSYM(add_cred_with_password);
OPTSYM(pname_to_uid); OPTSYM(pname_to_uid);
OPTSYM(userok); OPTSPISYM(authorize_localname);
mi = dlsym(so, "gss_mo_init"); mi = dlsym(so, "gss_mo_init");
if (mi != NULL) { if (mi != NULL) {

View File

@@ -62,16 +62,12 @@ attr_pname_to_uid(OM_uint32 *minor_status,
OM_uint32 major_status = GSS_S_UNAVAILABLE; OM_uint32 major_status = GSS_S_UNAVAILABLE;
OM_uint32 tmpMinor; OM_uint32 tmpMinor;
int more = -1; int more = -1;
gss_buffer_desc attribute;
*minor_status = 0; *minor_status = 0;
if (mn->gmn_mech->gm_get_name_attribute == NULL) if (mn->gmn_mech->gm_get_name_attribute == NULL)
return GSS_S_UNAVAILABLE; return GSS_S_UNAVAILABLE;
attribute.length = sizeof("local-login-user") - 1;
attribute.value = "local-login-user";
while (more != 0) { while (more != 0) {
gss_buffer_desc value; gss_buffer_desc value;
gss_buffer_desc display_value; gss_buffer_desc display_value;
@@ -86,7 +82,7 @@ attr_pname_to_uid(OM_uint32 *minor_status,
major_status = mn->gmn_mech->gm_get_name_attribute(minor_status, major_status = mn->gmn_mech->gm_get_name_attribute(minor_status,
mn->gmn_name, mn->gmn_name,
&attribute, GSS_C_ATTR_LOCAL_LOGIN_USER,
&authenticated, &authenticated,
&complete, &complete,
&value, &value,

View File

@@ -12,6 +12,7 @@ HEIMDAL_GSS_2.0 {
__gss_c_nt_user_name_oid_desc; __gss_c_nt_user_name_oid_desc;
__gss_krb5_nt_principal_name_oid_desc; __gss_krb5_nt_principal_name_oid_desc;
__gss_c_attr_stream_sizes_oid_desc; __gss_c_attr_stream_sizes_oid_desc;
GSS_C_ATTR_LOCAL_LOGIN_USER;
gss_accept_sec_context; gss_accept_sec_context;
gss_acquire_cred; gss_acquire_cred;
gss_acquire_cred_with_password; gss_acquire_cred_with_password;
@@ -19,6 +20,7 @@ HEIMDAL_GSS_2.0 {
gss_add_cred; gss_add_cred;
gss_add_cred_with_password; gss_add_cred_with_password;
gss_add_oid_set_member; gss_add_oid_set_member;
gss_authorize_localname;
gss_canonicalize_name; gss_canonicalize_name;
gss_compare_name; gss_compare_name;
gss_context_query_attributes; gss_context_query_attributes;
@@ -84,7 +86,6 @@ HEIMDAL_GSS_2.0 {
gss_unseal; gss_unseal;
gss_unwrap; gss_unwrap;
gss_unwrap_iov; gss_unwrap_iov;
gss_userok;
gss_verify; gss_verify;
gss_verify_mic; gss_verify_mic;
gss_wrap; gss_wrap;