git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@8858 ec53bebd-3082-4978-b11e-865c3cabbd6b
		
			
				
	
	
		
			278 lines
		
	
	
		
			8.4 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			278 lines
		
	
	
		
			8.4 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
/*
 | 
						|
 * Copyright (c) 1997 - 2000 Kungliga Tekniska Högskolan
 | 
						|
 * (Royal Institute of Technology, Stockholm, Sweden). 
 | 
						|
 * All rights reserved. 
 | 
						|
 *
 | 
						|
 * Redistribution and use in source and binary forms, with or without 
 | 
						|
 * modification, are permitted provided that the following conditions 
 | 
						|
 * are met: 
 | 
						|
 *
 | 
						|
 * 1. Redistributions of source code must retain the above copyright 
 | 
						|
 *    notice, this list of conditions and the following disclaimer. 
 | 
						|
 *
 | 
						|
 * 2. Redistributions in binary form must reproduce the above copyright 
 | 
						|
 *    notice, this list of conditions and the following disclaimer in the 
 | 
						|
 *    documentation and/or other materials provided with the distribution. 
 | 
						|
 *
 | 
						|
 * 3. Neither the name of the Institute nor the names of its contributors 
 | 
						|
 *    may be used to endorse or promote products derived from this software 
 | 
						|
 *    without specific prior written permission. 
 | 
						|
 *
 | 
						|
 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND 
 | 
						|
 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 
 | 
						|
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 
 | 
						|
 * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE 
 | 
						|
 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 
 | 
						|
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 
 | 
						|
 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 
 | 
						|
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 
 | 
						|
 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 
 | 
						|
 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 
 | 
						|
 * SUCH DAMAGE. 
 | 
						|
 */
 | 
						|
 | 
						|
#include "test_locl.h"
 | 
						|
#include <gssapi.h>
 | 
						|
#include "gss_common.h"
 | 
						|
RCSID("$Id$");
 | 
						|
 | 
						|
static int
 | 
						|
process_it(int sock,
 | 
						|
	   gss_ctx_id_t context_hdl,
 | 
						|
	   gss_name_t client_name
 | 
						|
	   )
 | 
						|
{
 | 
						|
    OM_uint32 maj_stat, min_stat;
 | 
						|
    gss_buffer_desc name_token;
 | 
						|
    gss_buffer_desc real_input_token, real_output_token;
 | 
						|
    gss_buffer_t input_token = &real_input_token,
 | 
						|
	output_token = &real_output_token;
 | 
						|
 | 
						|
    maj_stat = gss_display_name (&min_stat,
 | 
						|
				 client_name,
 | 
						|
				 &name_token,
 | 
						|
				 NULL);
 | 
						|
    if (GSS_ERROR(maj_stat))
 | 
						|
	gss_err (1, min_stat, "gss_display_name");
 | 
						|
 | 
						|
    fprintf (stderr, "User is `%.*s'\n", (int)name_token.length,
 | 
						|
	    (char *)name_token.value);
 | 
						|
 | 
						|
    gss_release_buffer (&min_stat, &name_token);
 | 
						|
 | 
						|
    /* gss_verify_mic */
 | 
						|
 | 
						|
    read_token (sock, input_token);
 | 
						|
    read_token (sock, output_token);
 | 
						|
 | 
						|
    maj_stat = gss_verify_mic (&min_stat,
 | 
						|
			       context_hdl,
 | 
						|
			       input_token,
 | 
						|
			       output_token,
 | 
						|
			       NULL);
 | 
						|
    if (GSS_ERROR(maj_stat))
 | 
						|
	gss_err (1, min_stat, "gss_verify_mic");
 | 
						|
 | 
						|
    fprintf (stderr, "gss_verify_mic: %.*s\n", (int)input_token->length,
 | 
						|
	    (char *)input_token->value);
 | 
						|
 | 
						|
    gss_release_buffer (&min_stat, input_token);
 | 
						|
    gss_release_buffer (&min_stat, output_token);
 | 
						|
 | 
						|
    /* gss_unwrap */
 | 
						|
 | 
						|
    read_token (sock, input_token);
 | 
						|
 | 
						|
    maj_stat = gss_unwrap (&min_stat,
 | 
						|
			   context_hdl,
 | 
						|
			   input_token,
 | 
						|
			   output_token,
 | 
						|
			   NULL,
 | 
						|
			   NULL);
 | 
						|
    if(GSS_ERROR(maj_stat))
 | 
						|
	gss_err (1, min_stat, "gss_unwrap");
 | 
						|
 | 
						|
    fprintf (stderr, "gss_unwrap: %.*s\n", (int)output_token->length,
 | 
						|
	    (char *)output_token->value);
 | 
						|
 | 
						|
    gss_release_buffer (&min_stat, input_token);
 | 
						|
    gss_release_buffer (&min_stat, output_token);
 | 
						|
 | 
						|
    return 0;
 | 
						|
}
 | 
						|
 | 
						|
static int
 | 
						|
proto (int sock, const char *service)
 | 
						|
{
 | 
						|
    struct sockaddr_in remote, local;
 | 
						|
    int addrlen;
 | 
						|
    gss_ctx_id_t context_hdl = GSS_C_NO_CONTEXT;
 | 
						|
    gss_buffer_desc real_input_token, real_output_token;
 | 
						|
    gss_buffer_t input_token = &real_input_token,
 | 
						|
	output_token = &real_output_token;
 | 
						|
    OM_uint32 maj_stat, min_stat;
 | 
						|
    gss_name_t client_name;
 | 
						|
    struct gss_channel_bindings_struct input_chan_bindings;
 | 
						|
    gss_cred_id_t delegated_cred_handle = NULL;
 | 
						|
    krb5_ccache ccache;
 | 
						|
    u_char init_buf[4];
 | 
						|
    u_char acct_buf[4];
 | 
						|
 | 
						|
    addrlen = sizeof(local);
 | 
						|
    if (getsockname (sock, (struct sockaddr *)&local, &addrlen) < 0
 | 
						|
	|| addrlen != sizeof(local))
 | 
						|
	err (1, "getsockname)");
 | 
						|
 | 
						|
    addrlen = sizeof(remote);
 | 
						|
    if (getpeername (sock, (struct sockaddr *)&remote, &addrlen) < 0
 | 
						|
	|| addrlen != sizeof(remote))
 | 
						|
	err (1, "getpeername");
 | 
						|
 | 
						|
    input_chan_bindings.initiator_addrtype = GSS_C_AF_INET;
 | 
						|
    input_chan_bindings.initiator_address.length = 4;
 | 
						|
    init_buf[0] = (remote.sin_addr.s_addr >> 24) & 0xFF;
 | 
						|
    init_buf[1] = (remote.sin_addr.s_addr >> 16) & 0xFF;
 | 
						|
    init_buf[2] = (remote.sin_addr.s_addr >>  8) & 0xFF;
 | 
						|
    init_buf[3] = (remote.sin_addr.s_addr >>  0) & 0xFF;
 | 
						|
 | 
						|
    input_chan_bindings.initiator_address.value = init_buf;
 | 
						|
    input_chan_bindings.acceptor_addrtype = GSS_C_AF_INET;
 | 
						|
 | 
						|
    input_chan_bindings.acceptor_address.length = 4;
 | 
						|
    acct_buf[0] = (local.sin_addr.s_addr >> 24) & 0xFF;
 | 
						|
    acct_buf[1] = (local.sin_addr.s_addr >> 16) & 0xFF;
 | 
						|
    acct_buf[2] = (local.sin_addr.s_addr >>  8) & 0xFF;
 | 
						|
    acct_buf[3] = (local.sin_addr.s_addr >>  0) & 0xFF;
 | 
						|
    input_chan_bindings.acceptor_address.value = acct_buf;
 | 
						|
    input_chan_bindings.application_data.value = malloc(4);
 | 
						|
#if 0
 | 
						|
    * (unsigned short *)input_chan_bindings.application_data.value =
 | 
						|
                          remote.sin_port;
 | 
						|
    * ((unsigned short *)input_chan_bindings.application_data.value + 1) =
 | 
						|
                          local.sin_port;
 | 
						|
    input_chan_bindings.application_data.length = 4;
 | 
						|
#else
 | 
						|
    input_chan_bindings.application_data.length = 0;
 | 
						|
    input_chan_bindings.application_data.value = NULL;
 | 
						|
#endif
 | 
						|
    
 | 
						|
    delegated_cred_handle = malloc(sizeof(*delegated_cred_handle));
 | 
						|
    memset((char*)delegated_cred_handle, 0, sizeof(*delegated_cred_handle));
 | 
						|
    
 | 
						|
    do {
 | 
						|
	read_token (sock, input_token);
 | 
						|
	maj_stat =
 | 
						|
	    gss_accept_sec_context (&min_stat,
 | 
						|
				    &context_hdl,
 | 
						|
				    GSS_C_NO_CREDENTIAL,
 | 
						|
				    input_token,
 | 
						|
				    &input_chan_bindings,
 | 
						|
				    &client_name,
 | 
						|
				    NULL,
 | 
						|
				    output_token,
 | 
						|
				    NULL,
 | 
						|
				    NULL,
 | 
						|
				    /*&delegated_cred_handle*/ NULL);
 | 
						|
	if(GSS_ERROR(maj_stat))
 | 
						|
	    gss_err (1, min_stat, "gss_accept_sec_context");
 | 
						|
	if (output_token->length != 0)
 | 
						|
	    write_token (sock, output_token);
 | 
						|
	if (GSS_ERROR(maj_stat)) {
 | 
						|
	    if (context_hdl != GSS_C_NO_CONTEXT)
 | 
						|
		gss_delete_sec_context (&min_stat,
 | 
						|
					&context_hdl,
 | 
						|
					GSS_C_NO_BUFFER);
 | 
						|
	    break;
 | 
						|
	}
 | 
						|
    } while(maj_stat & GSS_S_CONTINUE_NEEDED);
 | 
						|
    
 | 
						|
    if (delegated_cred_handle->ccache) {
 | 
						|
       krb5_context context;
 | 
						|
 | 
						|
       maj_stat = krb5_init_context(&context);
 | 
						|
       maj_stat = krb5_cc_resolve(context, "FILE:/tmp/krb5cc_test", &ccache);
 | 
						|
       maj_stat = krb5_cc_copy_cache(context,
 | 
						|
                                      delegated_cred_handle->ccache, ccache);
 | 
						|
       krb5_cc_close(context, ccache);
 | 
						|
       krb5_cc_destroy(context, delegated_cred_handle->ccache);
 | 
						|
    }
 | 
						|
 | 
						|
    if (fork_flag) {
 | 
						|
	pid_t pid;
 | 
						|
	int pipefd[2];
 | 
						|
 | 
						|
	if (pipe (pipefd) < 0)
 | 
						|
	    err (1, "pipe");
 | 
						|
 | 
						|
	pid = fork ();
 | 
						|
	if (pid < 0)
 | 
						|
	    err (1, "fork");
 | 
						|
	if (pid != 0) {
 | 
						|
	    gss_buffer_desc buf;
 | 
						|
 | 
						|
	    maj_stat = gss_export_sec_context (&min_stat,
 | 
						|
					       &context_hdl,
 | 
						|
					       &buf);
 | 
						|
	    if (GSS_ERROR(maj_stat))
 | 
						|
		gss_err (1, min_stat, "gss_export_sec_context");
 | 
						|
	    write_token (pipefd[1], &buf);
 | 
						|
	    exit (0);
 | 
						|
	} else {
 | 
						|
	    gss_ctx_id_t context_hdl;
 | 
						|
	    gss_buffer_desc buf;
 | 
						|
 | 
						|
	    close (pipefd[1]);
 | 
						|
	    read_token (pipefd[0], &buf);
 | 
						|
	    close (pipefd[0]);
 | 
						|
	    maj_stat = gss_import_sec_context (&min_stat, &buf, &context_hdl);
 | 
						|
	    if (GSS_ERROR(maj_stat))
 | 
						|
		gss_err (1, min_stat, "gss_import_sec_context");
 | 
						|
	    gss_release_buffer (&min_stat, &buf);
 | 
						|
	    return process_it (sock, context_hdl, client_name);
 | 
						|
	}
 | 
						|
    } else {
 | 
						|
	return process_it (sock, context_hdl, client_name);
 | 
						|
    }
 | 
						|
}
 | 
						|
 | 
						|
static int
 | 
						|
doit (int port, const char *service)
 | 
						|
{
 | 
						|
    int sock, sock2;
 | 
						|
    struct sockaddr_in my_addr;
 | 
						|
    int one = 1;
 | 
						|
 | 
						|
    sock = socket (AF_INET, SOCK_STREAM, 0);
 | 
						|
    if (sock < 0)
 | 
						|
	err (1, "socket");
 | 
						|
 | 
						|
    memset (&my_addr, 0, sizeof(my_addr));
 | 
						|
    my_addr.sin_family      = AF_INET;
 | 
						|
    my_addr.sin_port        = port;
 | 
						|
    my_addr.sin_addr.s_addr = INADDR_ANY;
 | 
						|
 | 
						|
    if (setsockopt (sock, SOL_SOCKET, SO_REUSEADDR,
 | 
						|
		    (void *)&one, sizeof(one)) < 0)
 | 
						|
	warn ("setsockopt SO_REUSEADDR");
 | 
						|
 | 
						|
    if (bind (sock, (struct sockaddr *)&my_addr, sizeof(my_addr)) < 0)
 | 
						|
	err (1, "bind");
 | 
						|
 | 
						|
    if (listen (sock, 1) < 0)
 | 
						|
	err (1, "listen");
 | 
						|
 | 
						|
    sock2 = accept (sock, NULL, NULL);
 | 
						|
    if (sock2 < 0)
 | 
						|
	err (1, "accept");
 | 
						|
 | 
						|
    return proto (sock2, service);
 | 
						|
}
 | 
						|
 | 
						|
int
 | 
						|
main(int argc, char **argv)
 | 
						|
{
 | 
						|
    krb5_context context = NULL; /* XXX */
 | 
						|
    int port = server_setup(&context, argc, argv);
 | 
						|
    return doit (port, service);
 | 
						|
}
 |