Merge remote-tracking branch 'origin/master'
[unleashed/lotheac.git] / usr / src / uts / common / gssapi / mechs / dummy / dmech.c
blob411a000c63b3b01fdea8049b261893e74a853a0a
1 /*
2 * CDDL HEADER START
4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License, Version 1.0 only
6 * (the "License"). You may not use this file except in compliance
7 * with the License.
9 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
10 * or http://www.opensolaris.org/os/licensing.
11 * See the License for the specific language governing permissions
12 * and limitations under the License.
14 * When distributing Covered Code, include this CDDL HEADER in each
15 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
16 * If applicable, add the following below this CDDL HEADER, with the
17 * fields enclosed by brackets "[]" replaced with your own identifying
18 * information: Portions Copyright [yyyy] [name of copyright owner]
20 * CDDL HEADER END
23 * Copyright 2004 Sun Microsystems, Inc. All rights reserved.
24 * Use is subject to license terms.
25 * Copyright (c) 2011 Bayard G. Bell. All rights reserved.
29 * A module that implements a dummy security mechanism.
30 * It's mainly used to test GSS-API application. Multiple tokens
31 * exchanged during security context establishment can be
32 * specified through dummy_mech.conf located in /etc.
35 #include <sys/types.h>
36 #include <sys/modctl.h>
37 #include <sys/errno.h>
38 #include <gssapiP_dummy.h>
39 #include <gssapi_err_generic.h>
40 #include <mechglueP.h>
41 #include <gssapi/kgssapi_defs.h>
42 #include <sys/debug.h>
44 #ifdef DUMMY_MECH_DEBUG
46 * Kernel kgssd module debugging aid. The global variable "dummy_mech_log"
47 * is a bit mask which allows various types of debugging messages
48 * to be printed out.
50 * dummy_mech_log & 1 will cause actual failures to be printed.
51 * dummy_mech_log & 2 will cause informational messages to be
52 * printed on the client side of kgssd.
53 * dummy_mech_log & 4 will cause informational messages to be
54 * printed on the server side of kgssd.
55 * dummy_mech_log & 8 will cause informational messages to be
56 * printed on both client and server side of kgssd.
59 uint_t dummy_mech_log = 1;
60 #endif
62 /* Local defines */
63 #define MAGIC_TOKEN_NUMBER 12345
64 /* private routines for dummy_mechanism */
65 static gss_buffer_desc make_dummy_token_msg(void *data, int datalen);
67 static int der_length_size(int);
69 static void der_write_length(unsigned char **, int);
70 static int der_read_length(unsigned char **, int *);
71 static int g_token_size(gss_OID mech, unsigned int body_size);
72 static void g_make_token_header(gss_OID mech, int body_size,
73 unsigned char **buf, int tok_type);
74 static int g_verify_token_header(gss_OID mech, int *body_size,
75 unsigned char **buf_in, int tok_type,
76 int toksize);
78 /* private global variables */
79 static int dummy_token_nums;
82 * This OID:
83 * { iso(1) org(3) internet(6) dod(1) private(4) enterprises(1) sun(42)
84 * products(2) gssapi(26) mechtypes(1) dummy(2) }
87 static struct gss_config dummy_mechanism =
88 {{10, "\053\006\001\004\001\052\002\032\001\002"},
89 NULL, /* context */
90 NULL, /* next */
91 TRUE, /* uses_kmod */
92 dummy_gss_unseal,
93 dummy_gss_delete_sec_context,
94 dummy_gss_seal,
95 dummy_gss_import_sec_context,
96 dummy_gss_sign,
97 dummy_gss_verify
100 static gss_mechanism
101 gss_mech_initialize()
103 dprintf("Entering gss_mech_initialize\n");
105 if (dummy_token_nums == 0)
106 dummy_token_nums = 1;
108 dprintf("Leaving gss_mech_initialize\n");
109 return (&dummy_mechanism);
113 * Clean up after a failed mod_install()
115 static void
116 gss_mech_fini()
118 /* Nothing to do */
123 * Module linkage information for the kernel.
125 extern struct mod_ops mod_miscops;
127 static struct modlmisc modlmisc = {
128 &mod_miscops, "in-kernel dummy GSS mechanism"
131 static struct modlinkage modlinkage = {
132 MODREV_1,
133 (void *)&modlmisc,
134 NULL
137 static int dummy_fini_code = EBUSY;
140 _init()
142 int retval;
143 gss_mechanism mech, tmp;
145 mech = gss_mech_initialize();
147 mutex_enter(&__kgss_mech_lock);
148 tmp = __kgss_get_mechanism(&mech->mech_type);
149 if (tmp != NULL) {
150 DUMMY_MECH_LOG0(8,
151 "dummy GSS mechanism: mechanism already in table.\n");
152 if (tmp->uses_kmod == TRUE) {
153 DUMMY_MECH_LOG0(8, "dummy GSS mechanism: mechanism "
154 "table supports kernel operations!\n");
157 * keep us loaded, but let us be unloadable. This
158 * will give the developer time to trouble shoot
160 dummy_fini_code = 0;
161 } else {
162 __kgss_add_mechanism(mech);
163 ASSERT(__kgss_get_mechanism(&mech->mech_type) == mech);
165 mutex_exit(&__kgss_mech_lock);
167 if ((retval = mod_install(&modlinkage)) != 0)
168 gss_mech_fini(); /* clean up */
170 return (retval);
174 _fini()
176 int ret = dummy_fini_code;
178 if (ret == 0) {
179 ret = (mod_remove(&modlinkage));
181 return (ret);
185 _info(struct modinfo *modinfop)
187 return (mod_info(&modlinkage, modinfop));
191 /*ARGSUSED*/
192 static OM_uint32
193 dummy_gss_sign(context, minor_status, context_handle,
194 qop_req, message_buffer, message_token,
195 gssd_ctx_verifier)
196 void *context;
197 OM_uint32 *minor_status;
198 gss_ctx_id_t context_handle;
199 int qop_req;
200 gss_buffer_t message_buffer;
201 gss_buffer_t message_token;
202 OM_uint32 gssd_ctx_verifier;
204 dummy_gss_ctx_id_rec *ctx;
205 char token_string[] = "dummy_gss_sign";
207 dprintf("Entering gss_sign\n");
209 if (context_handle == GSS_C_NO_CONTEXT)
210 return (GSS_S_NO_CONTEXT);
211 ctx = (dummy_gss_ctx_id_rec *) context_handle;
212 ASSERT(ctx->established == 1);
213 ASSERT(ctx->token_number == MAGIC_TOKEN_NUMBER);
215 *message_token = make_dummy_token_msg(
216 token_string, strlen(token_string));
218 dprintf("Leaving gss_sign\n");
219 return (GSS_S_COMPLETE);
222 /*ARGSUSED*/
223 static OM_uint32
224 dummy_gss_verify(context, minor_status, context_handle,
225 message_buffer, token_buffer, qop_state,
226 gssd_ctx_verifier)
227 void *context;
228 OM_uint32 *minor_status;
229 gss_ctx_id_t context_handle;
230 gss_buffer_t message_buffer;
231 gss_buffer_t token_buffer;
232 int *qop_state;
233 OM_uint32 gssd_ctx_verifier;
235 unsigned char *ptr;
236 int bodysize;
237 int err;
238 dummy_gss_ctx_id_rec *ctx;
240 dprintf("Entering gss_verify\n");
242 if (context_handle == GSS_C_NO_CONTEXT)
243 return (GSS_S_NO_CONTEXT);
245 ctx = (dummy_gss_ctx_id_rec *) context_handle;
246 ASSERT(ctx->established == 1);
247 ASSERT(ctx->token_number == MAGIC_TOKEN_NUMBER);
248 /* Check for defective input token. */
250 ptr = (unsigned char *) token_buffer->value;
251 if (err = g_verify_token_header((gss_OID)gss_mech_dummy, &bodysize,
252 &ptr, 0,
253 token_buffer->length)) {
254 *minor_status = err;
255 return (GSS_S_DEFECTIVE_TOKEN);
258 *qop_state = GSS_C_QOP_DEFAULT;
260 dprintf("Leaving gss_verify\n");
261 return (GSS_S_COMPLETE);
264 /*ARGSUSED*/
265 static OM_uint32
266 dummy_gss_seal(context, minor_status, context_handle, conf_req_flag,
267 qop_req, input_message_buffer, conf_state,
268 output_message_buffer, gssd_ctx_verifier)
269 void *context;
270 OM_uint32 *minor_status;
271 gss_ctx_id_t context_handle;
272 int conf_req_flag;
273 int qop_req;
274 gss_buffer_t input_message_buffer;
275 int *conf_state;
276 gss_buffer_t output_message_buffer;
277 OM_uint32 gssd_ctx_verifier;
279 gss_buffer_desc output;
280 dummy_gss_ctx_id_rec *ctx;
281 dprintf("Entering gss_seal\n");
283 if (context_handle == GSS_C_NO_CONTEXT)
284 return (GSS_S_NO_CONTEXT);
285 ctx = (dummy_gss_ctx_id_rec *) context_handle;
286 ASSERT(ctx->established == 1);
287 ASSERT(ctx->token_number == MAGIC_TOKEN_NUMBER);
288 /* Copy the input message to output message */
289 output = make_dummy_token_msg(
290 input_message_buffer->value, input_message_buffer->length);
292 if (conf_state)
293 *conf_state = 1;
295 *output_message_buffer = output;
297 dprintf("Leaving gss_seal\n");
298 return (GSS_S_COMPLETE);
301 /*ARGSUSED*/
302 static OM_uint32
303 dummy_gss_unseal(context, minor_status, context_handle,
304 input_message_buffer, output_message_buffer,
305 conf_state, qop_state, gssd_ctx_verifier)
306 void *context;
307 OM_uint32 *minor_status;
308 gss_ctx_id_t context_handle;
309 gss_buffer_t input_message_buffer;
310 gss_buffer_t output_message_buffer;
311 int *conf_state;
312 int *qop_state;
313 OM_uint32 gssd_ctx_verifier;
315 gss_buffer_desc output;
316 dummy_gss_ctx_id_rec *ctx;
317 unsigned char *ptr;
318 int bodysize;
319 int err;
321 dprintf("Entering gss_unseal\n");
323 if (context_handle == GSS_C_NO_CONTEXT)
324 return (GSS_S_NO_CONTEXT);
326 ctx = (dummy_gss_ctx_id_rec *) context_handle;
327 ASSERT(ctx->established == 1);
328 ASSERT(ctx->token_number == MAGIC_TOKEN_NUMBER);
330 ptr = (unsigned char *) input_message_buffer->value;
331 if (err = g_verify_token_header((gss_OID)gss_mech_dummy, &bodysize,
332 &ptr, 0,
333 input_message_buffer->length)) {
334 *minor_status = err;
335 return (GSS_S_DEFECTIVE_TOKEN);
337 output.length = bodysize;
338 output.value = (void *)MALLOC(output.length);
339 (void) memcpy(output.value, ptr, output.length);
341 *output_message_buffer = output;
342 *qop_state = GSS_C_QOP_DEFAULT;
344 if (conf_state)
345 *conf_state = 1;
347 dprintf("Leaving gss_unseal\n");
348 return (GSS_S_COMPLETE);
351 /*ARGSUSED*/
352 OM_uint32
353 dummy_gss_import_sec_context(ct, minor_status, interprocess_token,
354 context_handle)
355 void *ct;
356 OM_uint32 *minor_status;
357 gss_buffer_t interprocess_token;
358 gss_ctx_id_t *context_handle;
360 unsigned char *ptr;
361 int bodysize;
362 int err;
364 /* Assume that we got ctx from the interprocess token. */
365 dummy_gss_ctx_id_t ctx;
367 dprintf("Entering import_sec_context\n");
368 ptr = (unsigned char *) interprocess_token->value;
369 if (err = g_verify_token_header((gss_OID)gss_mech_dummy, &bodysize,
370 &ptr, 0,
371 interprocess_token->length)) {
372 *minor_status = err;
373 return (GSS_S_DEFECTIVE_TOKEN);
375 ctx = (dummy_gss_ctx_id_t)MALLOC(sizeof (dummy_gss_ctx_id_rec));
376 ctx->token_number = MAGIC_TOKEN_NUMBER;
377 ctx->established = 1;
379 *context_handle = (gss_ctx_id_t)ctx;
381 dprintf("Leaving import_sec_context\n");
382 return (GSS_S_COMPLETE);
385 /*ARGSUSED*/
386 static OM_uint32
387 dummy_gss_delete_sec_context(ct, minor_status,
388 context_handle, output_token,
389 gssd_ctx_verifier)
390 void *ct;
391 OM_uint32 *minor_status;
392 gss_ctx_id_t *context_handle;
393 gss_buffer_t output_token;
394 OM_uint32 gssd_ctx_verifier;
396 dummy_gss_ctx_id_t ctx;
398 dprintf("Entering delete_sec_context\n");
400 /* Make the length to 0, so the output token is not sent to peer */
401 if (output_token) {
402 output_token->length = 0;
403 output_token->value = NULL;
406 if (*context_handle == GSS_C_NO_CONTEXT) {
407 *minor_status = 0;
408 return (GSS_S_COMPLETE);
411 ctx = (dummy_gss_ctx_id_rec *) *context_handle;
412 ASSERT(ctx->established == 1);
413 ASSERT(ctx->token_number == MAGIC_TOKEN_NUMBER);
415 FREE(ctx, sizeof (dummy_gss_ctx_id_rec));
416 *context_handle = GSS_C_NO_CONTEXT;
418 dprintf("Leaving delete_sec_context\n");
419 return (GSS_S_COMPLETE);
422 static int
423 der_length_size(int length)
425 if (length < (1<<7))
426 return (1);
427 else if (length < (1<<8))
428 return (2);
429 else if (length < (1<<16))
430 return (3);
431 else if (length < (1<<24))
432 return (4);
433 else
434 return (5);
437 static void
438 der_write_length(unsigned char ** buf, int length)
440 if (length < (1<<7)) {
441 *(*buf)++ = (unsigned char) length;
442 } else {
443 *(*buf)++ = (unsigned char) (der_length_size(length)+127);
444 if (length >= (1<<24))
445 *(*buf)++ = (unsigned char) (length>>24);
446 if (length >= (1<<16))
447 *(*buf)++ = (unsigned char) ((length>>16)&0xff);
448 if (length >= (1<<8))
449 *(*buf)++ = (unsigned char) ((length>>8)&0xff);
450 *(*buf)++ = (unsigned char) (length&0xff);
454 static int
455 der_read_length(buf, bufsize)
456 unsigned char **buf;
457 int *bufsize;
459 unsigned char sf;
460 int ret;
462 if (*bufsize < 1)
463 return (-1);
464 sf = *(*buf)++;
465 (*bufsize)--;
466 if (sf & 0x80) {
467 if ((sf &= 0x7f) > ((*bufsize)-1))
468 return (-1);
469 if (sf > DUMMY_SIZE_OF_INT)
470 return (-1);
471 ret = 0;
472 for (; sf; sf--) {
473 ret = (ret<<8) + (*(*buf)++);
474 (*bufsize)--;
476 } else {
477 ret = sf;
480 return (ret);
483 static int
484 g_token_size(mech, body_size)
485 gss_OID mech;
486 unsigned int body_size;
488 /* set body_size to sequence contents size */
489 body_size += 4 + (int)mech->length; /* NEED overflow check */
490 return (1 + der_length_size(body_size) + body_size);
493 static void
494 g_make_token_header(mech, body_size, buf, tok_type)
495 gss_OID mech;
496 int body_size;
497 unsigned char **buf;
498 int tok_type;
500 *(*buf)++ = 0x60;
501 der_write_length(buf, 4 + mech->length + body_size);
502 *(*buf)++ = 0x06;
503 *(*buf)++ = (unsigned char) mech->length;
504 TWRITE_STR(*buf, mech->elements, ((int)mech->length));
505 *(*buf)++ = (unsigned char) ((tok_type>>8)&0xff);
506 *(*buf)++ = (unsigned char) (tok_type&0xff);
509 static int
510 g_verify_token_header(mech, body_size, buf_in, tok_type, toksize)
511 gss_OID mech;
512 int *body_size;
513 unsigned char **buf_in;
514 int tok_type;
515 int toksize;
517 unsigned char *buf = *buf_in;
518 int seqsize;
519 gss_OID_desc toid;
520 int ret = 0;
522 if ((toksize -= 1) < 0)
523 return (G_BAD_TOK_HEADER);
524 if (*buf++ != 0x60)
525 return (G_BAD_TOK_HEADER);
527 if ((seqsize = der_read_length(&buf, &toksize)) < 0)
528 return (G_BAD_TOK_HEADER);
530 if (seqsize != toksize)
531 return (G_BAD_TOK_HEADER);
533 if ((toksize -= 1) < 0)
534 return (G_BAD_TOK_HEADER);
535 if (*buf++ != 0x06)
536 return (G_BAD_TOK_HEADER);
538 if ((toksize -= 1) < 0)
539 return (G_BAD_TOK_HEADER);
540 toid.length = *buf++;
542 if ((toksize -= toid.length) < 0)
543 return (G_BAD_TOK_HEADER);
544 toid.elements = buf;
545 buf += toid.length;
547 if (! g_OID_equal(&toid, mech))
548 ret = G_WRONG_MECH;
551 * G_WRONG_MECH is not returned immediately because it's more important
552 * to return G_BAD_TOK_HEADER if the token header is in fact bad
555 if ((toksize -= 2) < 0)
556 return (G_BAD_TOK_HEADER);
558 if ((*buf++ != ((tok_type>>8)&0xff)) ||
559 (*buf++ != (tok_type&0xff)))
560 return (G_BAD_TOK_HEADER);
562 if (!ret) {
563 *buf_in = buf;
564 *body_size = toksize;
567 return (ret);
570 static gss_buffer_desc
571 make_dummy_token_msg(void *data, int dataLen)
573 gss_buffer_desc buffer;
574 int tlen;
575 unsigned char *t;
576 unsigned char *ptr;
578 if (data == NULL) {
579 buffer.length = 0;
580 buffer.value = NULL;
581 return (buffer);
584 tlen = g_token_size((gss_OID)gss_mech_dummy, dataLen);
585 t = (unsigned char *) MALLOC(tlen);
586 ptr = t;
588 g_make_token_header((gss_OID)gss_mech_dummy, dataLen, &ptr, 0);
589 (void) memcpy(ptr, data, dataLen);
591 buffer.length = tlen;
592 buffer.value = (void *) t;
593 return (buffer);