
SPNEGO was already using union creds. Now make the mechglue know about it, delete all of the cred-related SPNEGO stubs that are now not called (lib/gssapi/spnego/cred_stubs.c), and implement gss_get/set_neg_mechs() by storing the OID set in the union cred. This commit was essentially authored as much if not more by Luke Howard <lukeh at padl.com> as much as by the listed author.
685 lines
18 KiB
C
685 lines
18 KiB
C
/*
|
|
* Copyright (c) 2004, PADL Software Pty Ltd.
|
|
* All rights reserved.
|
|
*
|
|
* Portions Copyright (c) 2009 Apple Inc. All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
*
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
*
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
*
|
|
* 3. Neither the name of PADL Software nor the names of its contributors
|
|
* may be used to endorse or promote products derived from this software
|
|
* without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY PADL SOFTWARE AND CONTRIBUTORS ``AS IS'' AND
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL PADL SOFTWARE OR CONTRIBUTORS BE LIABLE
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*/
|
|
|
|
#include "spnego_locl.h"
|
|
|
|
/*
|
|
* Apparently Microsoft got the OID wrong, and used
|
|
* 1.2.840.48018.1.2.2 instead. We need both this and
|
|
* the correct Kerberos OID here in order to deal with
|
|
* this. Because this is manifest in SPNEGO only I'd
|
|
* prefer to deal with this here rather than inside the
|
|
* Kerberos mechanism.
|
|
*/
|
|
gss_OID_desc _gss_spnego_mskrb_mechanism_oid_desc =
|
|
{9, rk_UNCONST("\x2a\x86\x48\x82\xf7\x12\x01\x02\x02")};
|
|
|
|
/*
|
|
* Allocate a SPNEGO context handle
|
|
*/
|
|
OM_uint32 GSSAPI_CALLCONV
|
|
_gss_spnego_alloc_sec_context (OM_uint32 * minor_status,
|
|
gss_ctx_id_t *context_handle)
|
|
{
|
|
gssspnego_ctx ctx;
|
|
|
|
ctx = calloc(1, sizeof(*ctx));
|
|
if (ctx == NULL) {
|
|
*minor_status = ENOMEM;
|
|
return GSS_S_FAILURE;
|
|
}
|
|
|
|
ctx->NegTokenInit_mech_types.value = NULL;
|
|
ctx->NegTokenInit_mech_types.length = 0;
|
|
|
|
ctx->preferred_mech_type = GSS_C_NO_OID;
|
|
ctx->selected_mech_type = GSS_C_NO_OID;
|
|
ctx->negotiated_mech_type = GSS_C_NO_OID;
|
|
|
|
ctx->negotiated_ctx_id = GSS_C_NO_CONTEXT;
|
|
|
|
ctx->mech_flags = 0;
|
|
ctx->mech_time_rec = 0;
|
|
ctx->mech_src_name = GSS_C_NO_NAME;
|
|
|
|
ctx->flags.open = 0;
|
|
ctx->flags.local = 0;
|
|
ctx->flags.peer_require_mic = 0;
|
|
ctx->flags.require_mic = 0;
|
|
ctx->flags.verified_mic = 0;
|
|
|
|
HEIMDAL_MUTEX_init(&ctx->ctx_id_mutex);
|
|
|
|
ctx->negoex_step = 0;
|
|
ctx->negoex_transcript = NULL;
|
|
ctx->negoex_seqnum = 0;
|
|
HEIM_TAILQ_INIT(&ctx->negoex_mechs);
|
|
memset(ctx->negoex_conv_id, 0, GUID_LENGTH);
|
|
|
|
*context_handle = (gss_ctx_id_t)ctx;
|
|
|
|
return GSS_S_COMPLETE;
|
|
}
|
|
|
|
/*
|
|
* Free a SPNEGO context handle. The caller must have acquired
|
|
* the lock before this is called.
|
|
*/
|
|
OM_uint32 GSSAPI_CALLCONV _gss_spnego_internal_delete_sec_context
|
|
(OM_uint32 *minor_status,
|
|
gss_ctx_id_t *context_handle,
|
|
gss_buffer_t output_token
|
|
)
|
|
{
|
|
gssspnego_ctx ctx;
|
|
OM_uint32 ret, minor;
|
|
|
|
*minor_status = 0;
|
|
|
|
if (context_handle == NULL) {
|
|
return GSS_S_NO_CONTEXT;
|
|
}
|
|
|
|
if (output_token != GSS_C_NO_BUFFER) {
|
|
output_token->length = 0;
|
|
output_token->value = NULL;
|
|
}
|
|
|
|
ctx = (gssspnego_ctx)*context_handle;
|
|
*context_handle = GSS_C_NO_CONTEXT;
|
|
|
|
if (ctx == NULL) {
|
|
return GSS_S_NO_CONTEXT;
|
|
}
|
|
|
|
if (ctx->NegTokenInit_mech_types.value)
|
|
free(ctx->NegTokenInit_mech_types.value);
|
|
|
|
ctx->preferred_mech_type = GSS_C_NO_OID;
|
|
ctx->negotiated_mech_type = GSS_C_NO_OID;
|
|
ctx->selected_mech_type = GSS_C_NO_OID;
|
|
|
|
gss_release_name(&minor, &ctx->target_name);
|
|
gss_release_name(&minor, &ctx->mech_src_name);
|
|
|
|
if (ctx->negotiated_ctx_id != GSS_C_NO_CONTEXT) {
|
|
ret = gss_delete_sec_context(minor_status,
|
|
&ctx->negotiated_ctx_id,
|
|
output_token);
|
|
ctx->negotiated_ctx_id = GSS_C_NO_CONTEXT;
|
|
} else {
|
|
ret = GSS_S_COMPLETE;
|
|
}
|
|
|
|
_gss_negoex_release_context(ctx);
|
|
|
|
HEIMDAL_MUTEX_unlock(&ctx->ctx_id_mutex);
|
|
HEIMDAL_MUTEX_destroy(&ctx->ctx_id_mutex);
|
|
|
|
free(ctx);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static int
|
|
inq_context_by_oid_bool(gssspnego_ctx ctx, gss_OID oid)
|
|
{
|
|
OM_uint32 major, minor;
|
|
gss_buffer_set_t data_set = GSS_C_NO_BUFFER_SET;
|
|
uint8_t ret = 0;
|
|
|
|
major = gss_inquire_sec_context_by_oid(&minor, ctx->negotiated_ctx_id,
|
|
oid, &data_set);
|
|
if (major != GSS_S_COMPLETE)
|
|
return FALSE;
|
|
|
|
if (data_set != GSS_C_NO_BUFFER_SET &&
|
|
data_set->count == 1 &&
|
|
data_set->elements[0].length == 1)
|
|
ret = *((uint8_t *)data_set->elements[0].value);
|
|
|
|
gss_release_buffer_set(&minor, &data_set);
|
|
|
|
return ret != 0;
|
|
}
|
|
|
|
/*
|
|
* Returns TRUE if it is safe to omit mechListMIC.
|
|
*/
|
|
|
|
int
|
|
_gss_spnego_safe_omit_mechlist_mic(gssspnego_ctx ctx)
|
|
{
|
|
int safe_omit = FALSE;
|
|
|
|
if (ctx->flags.peer_require_mic) {
|
|
_gss_mg_log(10, "spnego: mechListMIC required by peer");
|
|
} else if (inq_context_by_oid_bool(ctx, GSS_C_INQ_PEER_HAS_BUGGY_SPNEGO)) {
|
|
/* [MS-SPNG] Appendix A <7> Section 3.1.5.1: may be old peer with buggy SPNEGO */
|
|
safe_omit = TRUE;
|
|
_gss_mg_log(10, "spnego: mechListMIC omitted for legacy interoperability");
|
|
} else if (inq_context_by_oid_bool(ctx, GSS_C_INQ_REQUIRE_MECHLIST_MIC)) {
|
|
/* [MS-SPNG] Appendix A <7> Section 3.1.5.1: allow NTLM to force MIC */
|
|
_gss_mg_log(10, "spnego: mechListMIC required by mechanism");
|
|
} else if (gss_oid_equal(ctx->selected_mech_type, ctx->preferred_mech_type)) {
|
|
safe_omit = TRUE;
|
|
_gss_mg_log(10, "spnego: mechListMIC omitted as preferred mechanism selected");
|
|
} else {
|
|
_gss_mg_log(10, "spnego: mechListMIC required by default");
|
|
}
|
|
|
|
return safe_omit;
|
|
}
|
|
|
|
/*
|
|
* A map between a GSS-API flag and a (mechanism attribute, weight)
|
|
* tuple. The list of mechanisms is re-ordered by aggregate weight
|
|
* (highest weight is more preferred, e.g. if GSS_C_MUTUAL_FLAG and
|
|
* GSS_C_ANON_FLAG are set, we prefer a mechanism that supports
|
|
* mutual authentication over one that only supports anonymous).
|
|
*/
|
|
static struct {
|
|
OM_uint32 flag;
|
|
gss_OID ma;
|
|
int weight;
|
|
} flag_to_ma_map[] = {
|
|
{ GSS_C_MUTUAL_FLAG, GSS_C_MA_AUTH_TARG, 2 },
|
|
{ GSS_C_ANON_FLAG, GSS_C_MA_AUTH_INIT_ANON, 1 },
|
|
};
|
|
|
|
/*
|
|
* Returns a bitmask indicating GSS flags we can sort on.
|
|
*/
|
|
static inline OM_uint32
|
|
mech_flag_mask(void)
|
|
{
|
|
size_t i;
|
|
OM_uint32 mask = 0;
|
|
|
|
for (i = 0; i < sizeof(flag_to_ma_map)/sizeof(flag_to_ma_map[0]); i++)
|
|
mask |= flag_to_ma_map[i].flag;
|
|
|
|
return mask;
|
|
}
|
|
|
|
/*
|
|
* Returns an integer representing the preference weighting for a
|
|
* mechanism, based on the requested GSS flags.
|
|
*/
|
|
static int
|
|
mech_weight(gss_const_OID mech, OM_uint32 req_flags)
|
|
{
|
|
OM_uint32 major, minor;
|
|
gss_OID_set mech_attrs = GSS_C_NO_OID_SET;
|
|
int weight = 0;
|
|
size_t i, j;
|
|
|
|
major = gss_inquire_attrs_for_mech(&minor, mech, &mech_attrs, NULL);
|
|
if (GSS_ERROR(major))
|
|
return 0;
|
|
|
|
for (i = 0; i < sizeof(flag_to_ma_map)/sizeof(flag_to_ma_map[0]); i++) {
|
|
if ((req_flags & flag_to_ma_map[i].flag) == 0)
|
|
continue;
|
|
|
|
for (j = 0; j < mech_attrs->count; j++) {
|
|
if (gss_oid_equal(flag_to_ma_map[i].ma, &mech_attrs->elements[j])) {
|
|
weight += flag_to_ma_map[i].weight;
|
|
continue;
|
|
}
|
|
}
|
|
}
|
|
|
|
gss_release_oid_set(&minor, &mech_attrs);
|
|
|
|
return weight;
|
|
}
|
|
|
|
static int
|
|
mech_compare(const void *mech1, const void *mech2, void *req_flags_p)
|
|
{
|
|
OM_uint32 req_flags = *((OM_uint32 *)req_flags_p);
|
|
int mech1_weight = mech_weight(mech1, req_flags);
|
|
int mech2_weight = mech_weight(mech2, req_flags);
|
|
|
|
return mech2_weight - mech1_weight;
|
|
}
|
|
|
|
/*
|
|
* Order a list of mechanisms by weight based on requested GSS flags.
|
|
*/
|
|
static void
|
|
order_mechs_by_flags(gss_OID_set mechs, OM_uint32 req_flags)
|
|
{
|
|
if (req_flags & mech_flag_mask()) { /* skip if flags irrelevant */
|
|
/*
|
|
* NB: must be a stable sort to preserve the existing order
|
|
* of mechanisms that are equally weighted.
|
|
*/
|
|
mergesort_r(mechs->elements, mechs->count,
|
|
sizeof(gss_OID_desc), mech_compare, &req_flags);
|
|
}
|
|
}
|
|
|
|
static OM_uint32
|
|
add_mech_type(OM_uint32 *minor_status,
|
|
gss_OID mech_type,
|
|
MechTypeList *mechtypelist)
|
|
{
|
|
MechType mech;
|
|
int ret;
|
|
|
|
heim_assert(!gss_oid_equal(mech_type, GSS_SPNEGO_MECHANISM),
|
|
"SPNEGO mechanism not filtered");
|
|
|
|
ret = der_get_oid(mech_type->elements, mech_type->length, &mech, NULL);
|
|
if (ret == 0) {
|
|
ret = add_MechTypeList(mechtypelist, &mech);
|
|
free_MechType(&mech);
|
|
}
|
|
|
|
if (ret) {
|
|
*minor_status = ret;
|
|
return GSS_S_FAILURE;
|
|
}
|
|
|
|
return GSS_S_COMPLETE;
|
|
}
|
|
|
|
static int
|
|
add_mech_if_approved(OM_uint32 *minor_status,
|
|
gss_const_name_t target_name,
|
|
OM_uint32 (*func)(OM_uint32 *, void *, gss_const_name_t, gss_const_cred_id_t, gss_OID),
|
|
void *userptr,
|
|
int includeMSCompatOID,
|
|
gss_const_cred_id_t cred_handle,
|
|
MechTypeList *mechtypelist,
|
|
gss_OID mech_oid,
|
|
gss_OID *first_mech,
|
|
OM_uint32 *first_major,
|
|
OM_uint32 *first_minor,
|
|
int *added_negoex)
|
|
{
|
|
OM_uint32 major, minor;
|
|
|
|
/*
|
|
* Unapproved mechanisms are ignored, but we capture their result
|
|
* code in case we didn't find any other mechanisms, in which case
|
|
* we return that to the caller of _gss_spnego_indicate_mechtypelist().
|
|
*/
|
|
major = (*func)(&minor, userptr, target_name, cred_handle, mech_oid);
|
|
if (major != GSS_S_COMPLETE) {
|
|
if (*first_mech == GSS_C_NO_OID) {
|
|
*first_major = major;
|
|
*first_minor = minor;
|
|
}
|
|
return GSS_S_COMPLETE;
|
|
}
|
|
|
|
if (_gss_negoex_mech_p(mech_oid)) {
|
|
if (*added_negoex == FALSE) {
|
|
major = add_mech_type(minor_status, GSS_NEGOEX_MECHANISM, mechtypelist);
|
|
if (major != GSS_S_COMPLETE)
|
|
return major;
|
|
*added_negoex = TRUE;
|
|
}
|
|
|
|
if (*first_mech == GSS_C_NO_OID)
|
|
*first_mech = GSS_NEGOEX_MECHANISM;
|
|
|
|
/* if NegoEx-only mech, we are done */
|
|
if (!_gss_negoex_and_spnego_mech_p(mech_oid))
|
|
return GSS_S_COMPLETE;
|
|
}
|
|
|
|
if (includeMSCompatOID && gss_oid_equal(mech_oid, GSS_KRB5_MECHANISM)) {
|
|
major = add_mech_type(minor_status,
|
|
&_gss_spnego_mskrb_mechanism_oid_desc,
|
|
mechtypelist);
|
|
if (major != GSS_S_COMPLETE)
|
|
return major;
|
|
}
|
|
|
|
major = add_mech_type(minor_status, mech_oid, mechtypelist);
|
|
if (major != GSS_S_COMPLETE)
|
|
return major;
|
|
|
|
if (*first_mech == GSS_C_NO_OID)
|
|
*first_mech = mech_oid;
|
|
|
|
return GSS_S_COMPLETE;
|
|
}
|
|
|
|
OM_uint32 GSSAPI_CALLCONV
|
|
_gss_spnego_indicate_mechtypelist (OM_uint32 *minor_status,
|
|
gss_const_name_t target_name,
|
|
OM_uint32 req_flags,
|
|
OM_uint32 (*func)(OM_uint32 *, void *, gss_const_name_t, gss_const_cred_id_t, gss_OID),
|
|
void *userptr,
|
|
int includeMSCompatOID,
|
|
gss_const_cred_id_t cred_handle,
|
|
MechTypeList *mechtypelist,
|
|
gss_OID *preferred_mech)
|
|
{
|
|
gss_OID_set supported_mechs = GSS_C_NO_OID_SET;
|
|
gss_OID first_mech = GSS_C_NO_OID;
|
|
OM_uint32 ret, minor;
|
|
OM_uint32 first_major = GSS_S_BAD_MECH, first_minor = 0;
|
|
size_t i;
|
|
int added_negoex = FALSE, canonical_order = FALSE;
|
|
|
|
mechtypelist->len = 0;
|
|
mechtypelist->val = NULL;
|
|
|
|
if (cred_handle != GSS_C_NO_CREDENTIAL)
|
|
ret = _gss_spnego_inquire_cred_mechs(minor_status, cred_handle,
|
|
&supported_mechs, &canonical_order);
|
|
else
|
|
ret = _gss_spnego_indicate_mechs(minor_status, &supported_mechs);
|
|
if (ret != GSS_S_COMPLETE)
|
|
return ret;
|
|
|
|
if (!canonical_order)
|
|
order_mechs_by_flags(supported_mechs, req_flags);
|
|
|
|
heim_assert(supported_mechs != GSS_C_NO_OID_SET,
|
|
"NULL mech set returned by SPNEGO inquire/indicate mechs");
|
|
|
|
/*
|
|
* Previously krb5 was tried explicitly, but now the internal mech
|
|
* list is reordered so that krb5 is first, this should no longer
|
|
* be required. This permits an application to specify another
|
|
* mechanism as preferred over krb5 using gss_set_neg_mechs().
|
|
*/
|
|
for (i = 0; i < supported_mechs->count; i++) {
|
|
ret = add_mech_if_approved(minor_status, target_name,
|
|
func, userptr, includeMSCompatOID,
|
|
cred_handle, mechtypelist,
|
|
&supported_mechs->elements[i],
|
|
&first_mech,
|
|
&first_major, &first_minor,
|
|
&added_negoex);
|
|
if (ret != GSS_S_COMPLETE) {
|
|
gss_release_oid_set(&minor, &supported_mechs);
|
|
return ret;
|
|
}
|
|
}
|
|
|
|
heim_assert(mechtypelist->len == 0 || first_mech != GSS_C_NO_OID,
|
|
"mechtypelist non-empty but no mech selected");
|
|
|
|
if (first_mech != GSS_C_NO_OID)
|
|
ret = _gss_intern_oid(minor_status, first_mech, &first_mech);
|
|
else if (GSS_ERROR(first_major)) {
|
|
ret = first_major;
|
|
*minor_status = first_minor;
|
|
} else
|
|
ret = GSS_S_BAD_MECH;
|
|
|
|
if (preferred_mech != NULL)
|
|
*preferred_mech = first_mech;
|
|
|
|
gss_release_oid_set(&minor, &supported_mechs);
|
|
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
*
|
|
*/
|
|
|
|
OM_uint32
|
|
_gss_spnego_verify_mechtypes_mic(OM_uint32 *minor_status,
|
|
gssspnego_ctx ctx,
|
|
heim_octet_string *mic)
|
|
{
|
|
gss_buffer_desc mic_buf;
|
|
OM_uint32 major_status;
|
|
|
|
if (mic == NULL) {
|
|
*minor_status = 0;
|
|
return gss_mg_set_error_string(GSS_SPNEGO_MECHANISM,
|
|
GSS_S_DEFECTIVE_TOKEN, 0,
|
|
"SPNEGO peer failed to send mechListMIC");
|
|
}
|
|
|
|
if (ctx->flags.verified_mic) {
|
|
/* This doesn't make sense, we've already verified it? */
|
|
*minor_status = 0;
|
|
return GSS_S_DUPLICATE_TOKEN;
|
|
}
|
|
|
|
mic_buf.length = mic->length;
|
|
mic_buf.value = mic->data;
|
|
|
|
major_status = gss_verify_mic(minor_status,
|
|
ctx->negotiated_ctx_id,
|
|
&ctx->NegTokenInit_mech_types,
|
|
&mic_buf,
|
|
NULL);
|
|
if (major_status == GSS_S_COMPLETE) {
|
|
_gss_spnego_ntlm_reset_crypto(minor_status, ctx, TRUE);
|
|
} else if (major_status == GSS_S_UNAVAILABLE) {
|
|
_gss_mg_log(10, "mech doesn't support MIC, allowing anyway");
|
|
} else if (major_status) {
|
|
return gss_mg_set_error_string(GSS_SPNEGO_MECHANISM,
|
|
GSS_S_DEFECTIVE_TOKEN, *minor_status,
|
|
"SPNEGO peer sent invalid mechListMIC");
|
|
}
|
|
ctx->flags.verified_mic = 1;
|
|
|
|
*minor_status = 0;
|
|
|
|
return GSS_S_COMPLETE;
|
|
}
|
|
|
|
/*
|
|
* According to [MS-SPNG] 3.3.5.1 the crypto state for NTLM is reset
|
|
* before the completed context is returned to the application.
|
|
*/
|
|
|
|
OM_uint32
|
|
_gss_spnego_ntlm_reset_crypto(OM_uint32 *minor_status,
|
|
gssspnego_ctx ctx,
|
|
OM_uint32 verify)
|
|
{
|
|
if (gss_oid_equal(ctx->negotiated_mech_type, GSS_NTLM_MECHANISM)) {
|
|
gss_buffer_desc value;
|
|
|
|
value.length = sizeof(verify);
|
|
value.value = &verify;
|
|
|
|
return gss_set_sec_context_option(minor_status,
|
|
&ctx->negotiated_ctx_id,
|
|
GSS_C_NTLM_RESET_CRYPTO,
|
|
&value);
|
|
}
|
|
|
|
return GSS_S_COMPLETE;
|
|
}
|
|
|
|
void
|
|
_gss_spnego_log_mech(const char *prefix, gss_const_OID oid)
|
|
{
|
|
gss_buffer_desc oidbuf = GSS_C_EMPTY_BUFFER;
|
|
OM_uint32 junk;
|
|
const char *name = NULL;
|
|
|
|
if (!_gss_mg_log_level(10))
|
|
return;
|
|
|
|
if (oid == GSS_C_NO_OID ||
|
|
gss_oid_to_str(&junk, (gss_OID)oid, &oidbuf) != GSS_S_COMPLETE) {
|
|
_gss_mg_log(10, "spnego: %s (null)", prefix);
|
|
return;
|
|
}
|
|
|
|
if (gss_oid_equal(oid, GSS_NEGOEX_MECHANISM))
|
|
name = "negoex"; /* not a real mech */
|
|
else if (gss_oid_equal(oid, &_gss_spnego_mskrb_mechanism_oid_desc))
|
|
name = "mskrb";
|
|
else {
|
|
gssapi_mech_interface m = __gss_get_mechanism(oid);
|
|
if (m)
|
|
name = m->gm_name;
|
|
}
|
|
|
|
_gss_mg_log(10, "spnego: %s %s { %.*s }",
|
|
prefix,
|
|
name ? name : "unknown",
|
|
(int)oidbuf.length, (char *)oidbuf.value);
|
|
gss_release_buffer(&junk, &oidbuf);
|
|
}
|
|
|
|
void
|
|
_gss_spnego_log_mechTypes(MechTypeList *mechTypes)
|
|
{
|
|
size_t i;
|
|
char mechbuf[64];
|
|
size_t mech_len;
|
|
gss_OID_desc oid;
|
|
int ret;
|
|
|
|
if (!_gss_mg_log_level(10))
|
|
return;
|
|
|
|
for (i = 0; i < mechTypes->len; i++) {
|
|
ret = der_put_oid ((unsigned char *)mechbuf + sizeof(mechbuf) - 1,
|
|
sizeof(mechbuf),
|
|
&mechTypes->val[i],
|
|
&mech_len);
|
|
if (ret)
|
|
continue;
|
|
|
|
oid.length = (OM_uint32)mech_len;
|
|
oid.elements = mechbuf + sizeof(mechbuf) - mech_len;
|
|
|
|
_gss_spnego_log_mech("initiator proposed mech", &oid);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Indicate mechs negotiable by SPNEGO
|
|
*/
|
|
|
|
OM_uint32
|
|
_gss_spnego_indicate_mechs(OM_uint32 *minor_status,
|
|
gss_OID_set *mechs_p)
|
|
{
|
|
gss_OID_desc oids[3];
|
|
gss_OID_set_desc except;
|
|
|
|
*mechs_p = GSS_C_NO_OID_SET;
|
|
|
|
oids[0] = *GSS_C_MA_DEPRECATED;
|
|
oids[1] = *GSS_C_MA_NOT_DFLT_MECH;
|
|
oids[2] = *GSS_C_MA_MECH_NEGO;
|
|
|
|
except.count = sizeof(oids) / sizeof(oids[0]);
|
|
except.elements = oids;
|
|
|
|
return gss_indicate_mechs_by_attrs(minor_status,
|
|
GSS_C_NO_OID_SET,
|
|
&except,
|
|
GSS_C_NO_OID_SET,
|
|
mechs_p);
|
|
}
|
|
|
|
/*
|
|
* Indicate mechs in cred negotiatble by SPNEGO
|
|
*/
|
|
|
|
OM_uint32
|
|
_gss_spnego_inquire_cred_mechs(OM_uint32 *minor_status,
|
|
gss_const_cred_id_t cred,
|
|
gss_OID_set *mechs_p,
|
|
int *canonical_order)
|
|
{
|
|
OM_uint32 ret, junk;
|
|
gss_OID_set cred_mechs = GSS_C_NO_OID_SET;
|
|
gss_OID_set negotiable_mechs = GSS_C_NO_OID_SET;
|
|
size_t i;
|
|
|
|
*mechs_p = GSS_C_NO_OID_SET;
|
|
*canonical_order = FALSE;
|
|
|
|
heim_assert(cred != GSS_C_NO_CREDENTIAL, "Invalid null credential handle");
|
|
|
|
ret = gss_get_neg_mechs(minor_status, cred, &cred_mechs);
|
|
if (ret == GSS_S_COMPLETE) {
|
|
*canonical_order = TRUE;
|
|
} else {
|
|
ret = gss_inquire_cred(minor_status, cred, NULL, NULL, NULL, &cred_mechs);
|
|
if (ret != GSS_S_COMPLETE)
|
|
goto out;
|
|
}
|
|
|
|
heim_assert(cred_mechs != GSS_C_NO_OID_SET && cred_mechs->count > 0,
|
|
"gss_inquire_cred succeeded but returned no mechanisms");
|
|
|
|
ret = _gss_spnego_indicate_mechs(minor_status, &negotiable_mechs);
|
|
if (ret != GSS_S_COMPLETE)
|
|
goto out;
|
|
|
|
heim_assert(negotiable_mechs != GSS_C_NO_OID_SET,
|
|
"_gss_spnego_indicate_mechs succeeded but returned null OID set");
|
|
|
|
ret = gss_create_empty_oid_set(minor_status, mechs_p);
|
|
if (ret != GSS_S_COMPLETE)
|
|
goto out;
|
|
|
|
/* Filter credential mechs by negotiable mechs, order by credential mechs */
|
|
for (i = 0; i < cred_mechs->count; i++) {
|
|
gss_OID cred_mech = &cred_mechs->elements[i];
|
|
int present = 0;
|
|
|
|
gss_test_oid_set_member(&junk, cred_mech, negotiable_mechs, &present);
|
|
if (!present)
|
|
continue;
|
|
|
|
ret = gss_add_oid_set_member(minor_status, cred_mech, mechs_p);
|
|
if (ret != GSS_S_COMPLETE)
|
|
break;
|
|
}
|
|
|
|
out:
|
|
if (ret != GSS_S_COMPLETE)
|
|
gss_release_oid_set(&junk, mechs_p);
|
|
gss_release_oid_set(&junk, &cred_mechs);
|
|
gss_release_oid_set(&junk, &negotiable_mechs);
|
|
|
|
return ret;
|
|
}
|
|
|