4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License, Version 1.0 only
6 * (the "License"). You may not use this file except in compliance
9 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
10 * or http://www.opensolaris.org/os/licensing.
11 * See the License for the specific language governing permissions
12 * and limitations under the License.
14 * When distributing Covered Code, include this CDDL HEADER in each
15 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
16 * If applicable, add the following below this CDDL HEADER, with the
17 * fields enclosed by brackets "[]" replaced with your own identifying
18 * information: Portions Copyright [yyyy] [name of copyright owner]
25 * Copyright 2004 Sun Microsystems, Inc. All rights reserved.
26 * Use is subject to license terms.
30 #pragma ident "%Z%%M% %I% %E% SMI"
33 #include "dh_gssapi.h"
37 * This module implements the GSS-API entry points gss_sign,
38 * gss_verify, gss_seal, and gss_unseal.
42 * __dh_gss_sign: Sign (Caluculate a check sum as specified by the qop
43 * and encrypt it with a cipher also determined by the qop using the context
44 * session keys). the message with the given qop and return
45 * a Diffie-Hellman DH_MIC token pointed to by token.
49 __dh_gss_sign(void *ctx
, /* Per mechanism context (not used) */
50 OM_uint32
*minor
, /* Mechanism status */
51 gss_ctx_id_t context
, /* GSS context */
52 int qop_req
, /* Requested qop */
53 gss_buffer_t message
, /* Input message */
54 gss_buffer_t token
/* output token */)
57 /* context is a Diffie-Hellman context */
58 dh_gss_context_t cntx
= (dh_gss_context_t
)context
;
60 /* grap a pointer to the mic part of the token */
61 dh_mic_t mic
= &tok
.ver
.dh_version_u
.body
.dh_token_body_desc_u
.sign
;
65 * Make sure we can return the mechanism status an the token
68 if (minor
== 0 || token
== GSS_C_NO_BUFFER
)
69 return (GSS_S_CALL_INACCESSIBLE_WRITE
);
71 /* Make sure the context is valid */
72 if ((*minor
= __dh_validate_context(cntx
)) != DH_SUCCESS
)
73 return (GSS_S_NO_CONTEXT
);
75 /* that it is established, */
76 if (cntx
->state
!= ESTABLISHED
)
77 return (GSS_S_NO_CONTEXT
);
79 /* and that it has not expired */
80 if (cntx
->expire
!= GSS_C_INDEFINITE
&& cntx
->expire
< time(0))
81 return (GSS_S_CONTEXT_EXPIRED
);
83 /* Package the context session keys in a key_set for __make_token */
84 keys
.dh_key_set_len
= cntx
->no_keys
;
85 keys
.dh_key_set_val
= cntx
->keys
;
87 /* Set the token version number and type */
88 tok
.ver
.verno
= cntx
->proto_version
;
89 tok
.ver
.dh_version_u
.body
.type
= DH_MIC
;
91 /* Set the token qop, seq_number and client flag */
94 mic
->seqnum
= __dh_next_seqno(cntx
);
96 mic
->client_flag
= cntx
->initiate
;
99 * Build the the output token from the message the diffie-hellman
100 * non serialized tok and the context keys.
102 if ((*minor
= __make_token(token
, message
, &tok
, &keys
))
104 return (GSS_S_FAILURE
);
107 return (GSS_S_COMPLETE
);
112 * __dh_gss_verify: calculate the signature of the message and compare
113 * it to the signature represented by the DH_MIC token supplied. If the
114 * major return value is GSS_S_COMPLETE, then *qop will be the qop that
119 __dh_gss_verify(void *ctx
, /* Per mechanism context (not used) */
120 OM_uint32
*minor
, /* Mechanism status */
121 gss_ctx_id_t context
, /* GSS context */
122 gss_buffer_t message
, /* The message */
123 gss_buffer_t token
, /* The DH_MIC message token */
124 int *qop
/* qop used */)
126 _NOTE(ARGUNUSED(ctx
))
127 /* context is a Diffie-Hellman context */
128 dh_gss_context_t cntx
= (dh_gss_context_t
)context
;
130 /* Grab the mic of the token */
131 dh_mic_t mic
= &tok
.ver
.dh_version_u
.body
.dh_token_body_desc_u
.sign
;
136 return (GSS_S_CALL_INACCESSIBLE_WRITE
);
138 /* Validate the context */
139 if ((*minor
= __dh_validate_context(cntx
)) != DH_SUCCESS
)
140 return (GSS_S_NO_CONTEXT
);
142 /* Check that the context is established */
143 if (cntx
->state
!= ESTABLISHED
)
144 return (GSS_S_NO_CONTEXT
);
146 /* and that it has not expired */
147 if (cntx
->expire
!= GSS_C_INDEFINITE
&& cntx
->expire
< time(0))
148 return (GSS_S_CONTEXT_EXPIRED
);
150 /* Package up the context session keys in to a key set */
151 keys
.dh_key_set_len
= cntx
->no_keys
;
152 keys
.dh_key_set_val
= cntx
->keys
;
154 /* Deserialize token into tok using messaget and keys */
155 if ((*minor
= __get_token(token
, message
,
156 &tok
, &keys
)) != DH_SUCCESS
) {
158 case DH_DECODE_FAILURE
:
159 return (GSS_S_DEFECTIVE_TOKEN
);
160 case DH_VERIFIER_MISMATCH
:
161 return (GSS_S_BAD_SIG
);
163 return (GSS_S_FAILURE
);
167 /* Check that the tok version is supported */
168 if (tok
.ver
.verno
!= cntx
->proto_version
||
169 tok
.ver
.dh_version_u
.body
.type
!= DH_MIC
) {
170 xdr_free(xdr_dh_token_desc
, (char *)&tok
);
171 return (GSS_S_DEFECTIVE_TOKEN
);
174 /* Set the return qop */
178 /* Sequence & Replay detection here */
179 stat
= __dh_seq_detection(cntx
, mic
->seqnum
);
181 /* free the deserialize token tok */
182 xdr_free(xdr_dh_token_desc
, (char *)&tok
);
185 * If client flag is the same as the initiator flag, we're talking
186 * to our selves or we're being spoofed. We return
187 * GSS_S_DUPLICATE_TOKEN since its the best return code in the
188 * supplementry group.
191 if (mic
->client_flag
== cntx
->initiate
)
192 stat
|= GSS_S_DUPLICATE_TOKEN
;
199 * __dh_gss_seal: Seal a message, i.e, it wraps or embeds a supplied message
200 * in a DH_WRAP token to be delivered to the other side. A message check
201 * over the whole message is include and is selected base on the supplied
202 * qop. If the qop supports privacy and confidentiality was requested, then
203 * the embedded message will be encrypted. A return flag will be set if
204 * the message was encrypted.
206 * NOTE: IN THE CURRENT PRODUCT NO QOP CAN SUPPORT PRIVACY. THE *conf_state
207 * FLAG WILL ALWAYS BE ZERO.
211 __dh_gss_seal(void * ctx
, /* Per mechanism context */
212 OM_uint32
*minor
, /* Mechanism status */
213 gss_ctx_id_t context
, /* GSS context */
214 int conf_req
, /* True to request privacy */
215 int qop_req
, /* Use the requested qop */
216 gss_buffer_t input
, /* Input message to wrap */
217 int *conf_state
, /* True if message was encrypted */
218 gss_buffer_t output
/* Contains the ouputed DH_WRAP token*/)
220 _NOTE(ARGUNUSED(ctx
))
221 /* context is a Diffie-Hellman context */
222 dh_gss_context_t cntx
= (dh_gss_context_t
)context
;
224 /* Get a pointer to the wrap protion of the token */
225 dh_wrap_t wrap
= &tok
.ver
.dh_version_u
.body
.dh_token_body_desc_u
.seal
;
227 gss_buffer_desc body
;
230 return (GSS_S_CALL_INACCESSIBLE_WRITE
);
232 /* See if the context is valid */
233 if ((*minor
= __dh_validate_context(cntx
)) != DH_SUCCESS
)
234 return (GSS_S_NO_CONTEXT
);
236 /* that it is established, */
237 if (cntx
->state
!= ESTABLISHED
)
238 return (GSS_S_NO_CONTEXT
);
240 /* and that it has not expired */
241 if (cntx
->expire
!= GSS_C_INDEFINITE
&& cntx
->expire
< time(0))
242 return (GSS_S_CONTEXT_EXPIRED
);
244 /* Package the session keys in a key_set */
245 keys
.dh_key_set_len
= cntx
->no_keys
;
246 keys
.dh_key_set_val
= cntx
->keys
;
248 /* Set the version and token type */
249 tok
.ver
.verno
= cntx
->proto_version
;
250 tok
.ver
.dh_version_u
.body
.type
= DH_WRAP
;
252 /* Set the qop, initiate flag, and sequence number */
253 wrap
->mic
.qop
= qop_req
;
254 wrap
->mic
.client_flag
= cntx
->initiate
;
255 wrap
->mic
.seqnum
= __dh_next_seqno(cntx
);
258 * Wrap the supplied message and encrypted if it is requested
259 * and allowed. The qop will have to have an associated cipher
260 * routine. NOTE: BECAUSE OF EXPORT CONTROLS, THE MECHANISM
261 * CURRENTLY WILL NOT DO ENCRYPTION AND conf_stat WILL ALWAY BE SET
264 if ((*minor
= __QOPSeal(wrap
->mic
.qop
, input
, conf_req
,
265 &keys
, &body
, conf_state
)) != DH_SUCCESS
) {
266 __free_signature(&tok
.verifier
);
267 return (GSS_S_FAILURE
);
270 /* The body now contains the wrapped orignal message */
271 wrap
->body
.body_len
= body
.length
;
272 wrap
->body
.body_val
= (char *)body
.value
;
275 * Tell the other side if encrypted.
276 * SEE NOTE ABOVE. THIS WILL ALWAYS BE FALSE.
279 wrap
->conf_flag
= *conf_state
;
281 wrap
->conf_flag
= FALSE
;
283 /* Serialize the token tok into output using the session keys */
284 if ((*minor
= __make_token(output
, NULL
, &tok
, &keys
)) != DH_SUCCESS
) {
285 __dh_release_buffer(&body
);
286 return (GSS_S_FAILURE
);
288 /* We're done with the wrapped body */
289 __dh_release_buffer(&body
);
291 return (GSS_S_COMPLETE
);
295 * __dh_gss_unseal: Unwrap a supplied DH_WRAP token extracting the orginal
296 * message, qop_used, and whether privacy was used.
298 * NOTE: BECAUSE OF EXPORT CONTROLS, NO QOP IN THE MECHANISM SUPPORTS
299 * PRIVACY. *conf_state WILL ALWAY BE FALSE.
303 __dh_gss_unseal(void *ctx
, /* Per mechanism context (not used) */
304 OM_uint32
*minor
, /* Mechanism status */
305 gss_ctx_id_t context
, /* GSS context handle */
306 gss_buffer_t input
, /* Wrapped Diffie-Hellman token */
307 gss_buffer_t output
, /* The unwrapped message */
308 int *conf_state
, /* True if the message was encrypted */
309 int *qop_used
/* QOP used in token */)
311 _NOTE(ARGUNUSED(ctx
))
312 /* context is a Diffie-Hellman context */
313 dh_gss_context_t cntx
= (dh_gss_context_t
)context
;
315 /* Grap the wrap portion of the above token */
316 dh_wrap_t wrap
= &tok
.ver
.dh_version_u
.body
.dh_token_body_desc_u
.seal
;
318 gss_buffer_desc message
;
321 if (minor
== 0 || conf_state
== 0 || output
== GSS_C_NO_BUFFER
)
322 return (GSS_S_CALL_INACCESSIBLE_WRITE
);
324 /* Validate context, */
325 if ((*minor
= __dh_validate_context(cntx
)) != DH_SUCCESS
)
326 return (GSS_S_NO_CONTEXT
);
328 /* check if it is established, */
329 if (cntx
->state
!= ESTABLISHED
)
330 return (GSS_S_NO_CONTEXT
);
332 /* and that it has not expired */
333 if (cntx
->expire
!= GSS_C_INDEFINITE
&& cntx
->expire
< time(0))
334 return (GSS_S_CONTEXT_EXPIRED
);
336 /* Package up the session keys in to a key_set */
337 keys
.dh_key_set_len
= cntx
->no_keys
;
338 keys
.dh_key_set_val
= cntx
->keys
;
340 /* Deserialize the input in to tok using keys */
341 if ((*minor
= __get_token(input
, NULL
, &tok
, &keys
)) != DH_SUCCESS
) {
343 case DH_DECODE_FAILURE
:
345 return (GSS_S_DEFECTIVE_TOKEN
);
346 case DH_VERIFIER_MISMATCH
:
347 return (GSS_S_BAD_SIG
);
349 return (GSS_S_FAILURE
);
353 /* Set the qop_used and confidentiality state */
354 if (qop_used
!= NULL
)
355 *qop_used
= wrap
->mic
.qop
;
356 *conf_state
= wrap
->conf_flag
;
358 /* See if this is a version that we can support */
359 if (tok
.ver
.verno
!= cntx
->proto_version
||
360 tok
.ver
.dh_version_u
.body
.type
!= DH_WRAP
) {
361 xdr_free(xdr_dh_token_desc
, (char *)&tok
);
362 return (GSS_S_DEFECTIVE_TOKEN
);
365 /* Put the unwrapped body in to a gss_buffer */
366 message
.length
= wrap
->body
.body_len
;
367 message
.value
= wrap
->body
.body_val
;
370 * Unwrap the message putting the result in output. We use the
371 * qop from the token, the session keys, and set *conf_state if
372 * encryption was used.
374 * NOTE: THIS MECHANISM DOES NOT SUPPORT ENCRYPTION. *conf_state
375 * WILL ALWAY BE FALSE.
377 if ((*minor
= __QOPUnSeal(wrap
->mic
.qop
, &message
,
378 *conf_state
, &keys
, output
))
380 xdr_free(xdr_dh_token_desc
, (char *)&tok
);
381 return (*minor
== DH_UNKNOWN_QOP
?
382 GSS_S_DEFECTIVE_TOKEN
: GSS_S_FAILURE
);
385 /* Sequence & Replay detection here */
386 stat
= __dh_seq_detection(cntx
, wrap
->mic
.seqnum
);
389 * If client flag is the same as the initiator flag, we're talking
390 * to our selves or we're being spoofed. We return
391 * GSS_S_DUPLICATE_TOKEN since its the best return code in the
392 * supplementry group.
395 if (wrap
->mic
.client_flag
== cntx
->initiate
)
396 stat
|= GSS_S_DUPLICATE_TOKEN
;
398 /* Were done with the deserialize token, tok */
399 xdr_free(xdr_dh_token_desc
, (char *)&tok
);