
Add a new private interface (accessed through _gss_mg_import_rfc4121_context()) through which a skeletal krb5 mechanism context can be created, suitable for RFC4121 message protection and PRF services.
112 lines
3.4 KiB
C
112 lines
3.4 KiB
C
/*
|
|
* Copyright (c) 2019-2020, AuriStor, Inc.
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
*
|
|
* - Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
*
|
|
* - Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in
|
|
* the documentation and/or other materials provided with the
|
|
* distribution.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
|
|
* FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
|
|
* COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
|
|
* INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
|
|
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
|
|
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
|
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*
|
|
*/
|
|
|
|
#include "mech_locl.h"
|
|
|
|
/*
|
|
* An internal API (for now) to return a mechglue context handle given
|
|
* a session key that can provide RFC 4121 compatible message protection
|
|
* and PRF services. Used by SAnon. The implementation of those services
|
|
* is currently provided by the krb5 GSS mechanism but that is opaque to
|
|
* the caller (minor status codes notwithstanding).
|
|
*/
|
|
OM_uint32
|
|
_gss_mg_import_rfc4121_context(OM_uint32 *minor,
|
|
uint8_t initiator_flag,
|
|
OM_uint32 gss_flags,
|
|
int32_t rfc3961_enctype,
|
|
gss_const_buffer_t session_key,
|
|
gss_ctx_id_t *rfc4121_context_handle)
|
|
{
|
|
OM_uint32 major = GSS_S_FAILURE, tmpMinor;
|
|
krb5_storage *sp;
|
|
krb5_error_code ret;
|
|
krb5_data d;
|
|
gss_buffer_desc rfc4121_args = GSS_C_EMPTY_BUFFER;
|
|
|
|
krb5_data_zero(&d);
|
|
|
|
*minor = 0;
|
|
*rfc4121_context_handle = GSS_C_NO_CONTEXT;
|
|
|
|
sp = krb5_storage_emem();
|
|
if (sp == NULL) {
|
|
ret = ENOMEM;
|
|
goto out;
|
|
}
|
|
|
|
krb5_storage_set_byteorder(sp, KRB5_STORAGE_BYTEORDER_HOST);
|
|
|
|
/*
|
|
* The arguments GSS_KRB5_IMPORT_RFC4121_CONTEXT_X are the serialized
|
|
* form of initiator_flag || flags || keytype || session_key. The session
|
|
* key length is inferred from the keytype.
|
|
*/
|
|
ret = krb5_store_uint8(sp, initiator_flag);
|
|
if (ret != 0)
|
|
goto out;
|
|
|
|
ret = krb5_store_uint32(sp, gss_flags);
|
|
if (ret != 0)
|
|
goto out;
|
|
|
|
ret = krb5_store_int32(sp, rfc3961_enctype);
|
|
if (ret != 0)
|
|
goto out;
|
|
|
|
if (krb5_storage_write(sp, session_key->value, session_key->length)
|
|
!= session_key->length) {
|
|
ret = ENOMEM;
|
|
goto out;
|
|
}
|
|
|
|
ret = krb5_storage_to_data(sp, &d);
|
|
if (ret != 0)
|
|
goto out;
|
|
|
|
rfc4121_args.length = d.length;
|
|
rfc4121_args.value = d.data;
|
|
|
|
major = gss_set_sec_context_option(minor, rfc4121_context_handle,
|
|
GSS_KRB5_IMPORT_RFC4121_CONTEXT_X,
|
|
&rfc4121_args);
|
|
|
|
out:
|
|
_gss_secure_release_buffer(&tmpMinor, &rfc4121_args);
|
|
krb5_storage_free(sp);
|
|
|
|
if (major == GSS_S_FAILURE && *minor == 0)
|
|
*minor = ret;
|
|
|
|
return major;
|
|
}
|
|
|