xref: /titanic_44/usr/src/uts/common/gssapi/mechs/dummy/dmech.c (revision 694c35faa87b858ecdadfe4fc592615f4eefbb07)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License, Version 1.0 only
6  * (the "License").  You may not use this file except in compliance
7  * with the License.
8  *
9  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
10  * or http://www.opensolaris.org/os/licensing.
11  * See the License for the specific language governing permissions
12  * and limitations under the License.
13  *
14  * When distributing Covered Code, include this CDDL HEADER in each
15  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
16  * If applicable, add the following below this CDDL HEADER, with the
17  * fields enclosed by brackets "[]" replaced with your own identifying
18  * information: Portions Copyright [yyyy] [name of copyright owner]
19  *
20  * CDDL HEADER END
21  */
22 /*
23  * Copyright 2004 Sun Microsystems, Inc.  All rights reserved.
24  * Use is subject to license terms.
25  * Copyright (c) 2011 Bayard G. Bell. All rights reserved.
26  */
27 
28 /*
29  * A module that implements a dummy security mechanism.
30  * It's mainly used to test GSS-API application. Multiple tokens
31  * exchanged during security context establishment can be
32  * specified through dummy_mech.conf located in /etc.
33  */
34 
35 #include <sys/types.h>
36 #include <sys/modctl.h>
37 #include <sys/errno.h>
38 #include <gssapiP_dummy.h>
39 #include <gssapi_err_generic.h>
40 #include <mechglueP.h>
41 #include <gssapi/kgssapi_defs.h>
42 #include <sys/debug.h>
43 
44 #ifdef DUMMY_MECH_DEBUG
45 /*
46  * Kernel kgssd module debugging aid. The global variable "dummy_mech_log"
47  * is a bit mask which allows various types of debugging messages
48  * to be printed out.
49  *
50  *       dummy_mech_log & 1  will cause actual failures to be printed.
51  *       dummy_mech_log & 2  will cause informational messages to be
52  *                       printed on the client side of kgssd.
53  *       dummy_mech_log & 4  will cause informational messages to be
54  *                       printed on the server side of kgssd.
55  *       dummy_mech_log & 8  will cause informational messages to be
56  *                       printed on both client and server side of kgssd.
57  */
58 
59 uint_t dummy_mech_log = 1;
60 #endif
61 
62 /* Local defines */
63 #define	MAGIC_TOKEN_NUMBER 12345
64 /* private routines for dummy_mechanism */
65 static gss_buffer_desc make_dummy_token_msg(void *data, int datalen);
66 
67 static int der_length_size(int);
68 
69 static void der_write_length(unsigned char **, int);
70 static int der_read_length(unsigned char **, int *);
71 static int g_token_size(gss_OID mech, unsigned int body_size);
72 static void g_make_token_header(gss_OID mech, int body_size,
73 				unsigned char **buf, int tok_type);
74 static int g_verify_token_header(gss_OID mech, int *body_size,
75 				unsigned char **buf_in, int tok_type,
76 				int toksize);
77 
78 /* private global variables */
79 static int dummy_token_nums;
80 
81 /*
82  * This OID:
83  * { iso(1) org(3) internet(6) dod(1) private(4) enterprises(1) sun(42)
84  * products(2) gssapi(26) mechtypes(1) dummy(2) }
85  */
86 
87 static struct gss_config dummy_mechanism =
88 	{{10, "\053\006\001\004\001\052\002\032\001\002"},
89 	NULL,	/* context */
90 	NULL,	/* next */
91 	TRUE,	/* uses_kmod */
92 	dummy_gss_unseal,
93 	dummy_gss_delete_sec_context,
94 	dummy_gss_seal,
95 	dummy_gss_import_sec_context,
96 	dummy_gss_sign,
97 	dummy_gss_verify
98 };
99 
100 static gss_mechanism
gss_mech_initialize()101 gss_mech_initialize()
102 {
103 	dprintf("Entering gss_mech_initialize\n");
104 
105 	if (dummy_token_nums == 0)
106 		dummy_token_nums = 1;
107 
108 	dprintf("Leaving gss_mech_initialize\n");
109 	return (&dummy_mechanism);
110 }
111 
112 /*
113  * Clean up after a failed mod_install()
114  */
115 static void
gss_mech_fini()116 gss_mech_fini()
117 {
118 	/* Nothing to do */
119 }
120 
121 
122 /*
123  * Module linkage information for the kernel.
124  */
125 extern struct mod_ops mod_miscops;
126 
127 static struct modlmisc modlmisc = {
128 	&mod_miscops, "in-kernel dummy GSS mechanism"
129 };
130 
131 static struct modlinkage modlinkage = {
132 	MODREV_1,
133 	(void *)&modlmisc,
134 	NULL
135 };
136 
137 static int dummy_fini_code = EBUSY;
138 
139 int
_init()140 _init()
141 {
142 	int retval;
143 	gss_mechanism mech, tmp;
144 
145 	mech = gss_mech_initialize();
146 
147 	mutex_enter(&__kgss_mech_lock);
148 	tmp = __kgss_get_mechanism(&mech->mech_type);
149 	if (tmp != NULL) {
150 		DUMMY_MECH_LOG0(8,
151 			"dummy GSS mechanism: mechanism already in table.\n");
152 		if (tmp->uses_kmod == TRUE) {
153 			DUMMY_MECH_LOG0(8, "dummy GSS mechanism: mechanism "
154 				"table supports kernel operations!\n");
155 		}
156 		/*
157 		 * keep us loaded, but let us be unloadable. This
158 		 * will give the developer time to trouble shoot
159 		 */
160 		dummy_fini_code = 0;
161 	} else {
162 		__kgss_add_mechanism(mech);
163 		ASSERT(__kgss_get_mechanism(&mech->mech_type) == mech);
164 	}
165 	mutex_exit(&__kgss_mech_lock);
166 
167 	if ((retval = mod_install(&modlinkage)) != 0)
168 		gss_mech_fini();	/* clean up */
169 
170 	return (retval);
171 }
172 
173 int
_fini()174 _fini()
175 {
176 	int ret = dummy_fini_code;
177 
178 	if (ret == 0) {
179 		ret = (mod_remove(&modlinkage));
180 	}
181 	return (ret);
182 }
183 
184 int
_info(struct modinfo * modinfop)185 _info(struct modinfo *modinfop)
186 {
187 	return (mod_info(&modlinkage, modinfop));
188 }
189 
190 
191 /*ARGSUSED*/
192 static OM_uint32
dummy_gss_sign(context,minor_status,context_handle,qop_req,message_buffer,message_token,gssd_ctx_verifier)193 dummy_gss_sign(context, minor_status, context_handle,
194 		qop_req, message_buffer, message_token,
195 		gssd_ctx_verifier)
196 	void *context;
197 	OM_uint32 *minor_status;
198 	gss_ctx_id_t context_handle;
199 	int qop_req;
200 	gss_buffer_t message_buffer;
201 	gss_buffer_t message_token;
202 	OM_uint32 gssd_ctx_verifier;
203 {
204 	dummy_gss_ctx_id_rec	*ctx;
205 	char token_string[] = "dummy_gss_sign";
206 
207 	dprintf("Entering gss_sign\n");
208 
209 	if (context_handle == GSS_C_NO_CONTEXT)
210 		return (GSS_S_NO_CONTEXT);
211 	ctx = (dummy_gss_ctx_id_rec *) context_handle;
212 	ASSERT(ctx->established == 1);
213 	ASSERT(ctx->token_number == MAGIC_TOKEN_NUMBER);
214 
215 	*message_token = make_dummy_token_msg(
216 				token_string, strlen(token_string));
217 
218 	dprintf("Leaving gss_sign\n");
219 	return (GSS_S_COMPLETE);
220 }
221 
222 /*ARGSUSED*/
223 static OM_uint32
dummy_gss_verify(context,minor_status,context_handle,message_buffer,token_buffer,qop_state,gssd_ctx_verifier)224 	dummy_gss_verify(context, minor_status, context_handle,
225 		message_buffer, token_buffer, qop_state,
226 		gssd_ctx_verifier)
227 	void *context;
228 	OM_uint32 *minor_status;
229 	gss_ctx_id_t context_handle;
230 	gss_buffer_t message_buffer;
231 	gss_buffer_t token_buffer;
232 	int *qop_state;
233 	OM_uint32 gssd_ctx_verifier;
234 {
235 	unsigned char *ptr;
236 	int bodysize;
237 	int err;
238 	dummy_gss_ctx_id_rec	*ctx;
239 
240 	dprintf("Entering gss_verify\n");
241 
242 	if (context_handle == GSS_C_NO_CONTEXT)
243 		return (GSS_S_NO_CONTEXT);
244 
245 	ctx = (dummy_gss_ctx_id_rec *) context_handle;
246 	ASSERT(ctx->established == 1);
247 	ASSERT(ctx->token_number == MAGIC_TOKEN_NUMBER);
248 	/* Check for defective input token. */
249 
250 	ptr = (unsigned char *) token_buffer->value;
251 	if (err = g_verify_token_header((gss_OID)gss_mech_dummy, &bodysize,
252 					&ptr, 0,
253 					token_buffer->length)) {
254 		*minor_status = err;
255 		return (GSS_S_DEFECTIVE_TOKEN);
256 	}
257 
258 	*qop_state = GSS_C_QOP_DEFAULT;
259 
260 	dprintf("Leaving gss_verify\n");
261 	return (GSS_S_COMPLETE);
262 }
263 
264 /*ARGSUSED*/
265 static OM_uint32
dummy_gss_seal(context,minor_status,context_handle,conf_req_flag,qop_req,input_message_buffer,conf_state,output_message_buffer,gssd_ctx_verifier)266 dummy_gss_seal(context, minor_status, context_handle, conf_req_flag,
267 		qop_req, input_message_buffer, conf_state,
268 		output_message_buffer, gssd_ctx_verifier)
269 	void *context;
270 	OM_uint32 *minor_status;
271 	gss_ctx_id_t context_handle;
272 	int conf_req_flag;
273 	int qop_req;
274 	gss_buffer_t input_message_buffer;
275 	int *conf_state;
276 	gss_buffer_t output_message_buffer;
277 	OM_uint32 gssd_ctx_verifier;
278 {
279 	gss_buffer_desc	output;
280 	dummy_gss_ctx_id_rec	*ctx;
281 	dprintf("Entering gss_seal\n");
282 
283 	if (context_handle == GSS_C_NO_CONTEXT)
284 		return (GSS_S_NO_CONTEXT);
285 	ctx = (dummy_gss_ctx_id_rec *) context_handle;
286 	ASSERT(ctx->established == 1);
287 	ASSERT(ctx->token_number == MAGIC_TOKEN_NUMBER);
288 	/* Copy the input message to output message */
289 	output = make_dummy_token_msg(
290 		input_message_buffer->value, input_message_buffer->length);
291 
292 	if (conf_state)
293 		*conf_state = 1;
294 
295 	*output_message_buffer = output;
296 
297 	dprintf("Leaving gss_seal\n");
298 	return (GSS_S_COMPLETE);
299 }
300 
301 /*ARGSUSED*/
302 static OM_uint32
dummy_gss_unseal(context,minor_status,context_handle,input_message_buffer,output_message_buffer,conf_state,qop_state,gssd_ctx_verifier)303 dummy_gss_unseal(context, minor_status, context_handle,
304 		input_message_buffer, output_message_buffer,
305 		conf_state, qop_state, gssd_ctx_verifier)
306 	void *context;
307 	OM_uint32 *minor_status;
308 	gss_ctx_id_t context_handle;
309 	gss_buffer_t input_message_buffer;
310 	gss_buffer_t output_message_buffer;
311 	int *conf_state;
312 	int *qop_state;
313 	OM_uint32 gssd_ctx_verifier;
314 {
315 	gss_buffer_desc output;
316 	dummy_gss_ctx_id_rec	*ctx;
317 	unsigned char *ptr;
318 	int bodysize;
319 	int err;
320 
321 	dprintf("Entering gss_unseal\n");
322 
323 	if (context_handle == GSS_C_NO_CONTEXT)
324 		return (GSS_S_NO_CONTEXT);
325 
326 	ctx = (dummy_gss_ctx_id_rec *) context_handle;
327 	ASSERT(ctx->established == 1);
328 	ASSERT(ctx->token_number == MAGIC_TOKEN_NUMBER);
329 
330 	ptr = (unsigned char *) input_message_buffer->value;
331 	if (err = g_verify_token_header((gss_OID)gss_mech_dummy, &bodysize,
332 					&ptr, 0,
333 					input_message_buffer->length)) {
334 		*minor_status = err;
335 		return (GSS_S_DEFECTIVE_TOKEN);
336 	}
337 	output.length = bodysize;
338 	output.value = (void *)MALLOC(output.length);
339 	(void) memcpy(output.value, ptr, output.length);
340 
341 	*output_message_buffer = output;
342 	*qop_state = GSS_C_QOP_DEFAULT;
343 
344 	if (conf_state)
345 		*conf_state = 1;
346 
347 	dprintf("Leaving gss_unseal\n");
348 	return (GSS_S_COMPLETE);
349 }
350 
351 /*ARGSUSED*/
352 OM_uint32
dummy_gss_import_sec_context(ct,minor_status,interprocess_token,context_handle)353 	dummy_gss_import_sec_context(ct, minor_status, interprocess_token,
354 					context_handle)
355 void *ct;
356 OM_uint32 *minor_status;
357 gss_buffer_t interprocess_token;
358 gss_ctx_id_t *context_handle;
359 {
360 	unsigned char *ptr;
361 	int bodysize;
362 	int err;
363 
364 	/* Assume that we got ctx from the interprocess token. */
365 	dummy_gss_ctx_id_t ctx;
366 
367 	dprintf("Entering import_sec_context\n");
368 	ptr = (unsigned char *) interprocess_token->value;
369 	if (err = g_verify_token_header((gss_OID)gss_mech_dummy, &bodysize,
370 					&ptr, 0,
371 					interprocess_token->length)) {
372 		*minor_status = err;
373 		return (GSS_S_DEFECTIVE_TOKEN);
374 	}
375 	ctx = (dummy_gss_ctx_id_t)MALLOC(sizeof (dummy_gss_ctx_id_rec));
376 	ctx->token_number = MAGIC_TOKEN_NUMBER;
377 	ctx->established = 1;
378 
379 	*context_handle = (gss_ctx_id_t)ctx;
380 
381 	dprintf("Leaving import_sec_context\n");
382 	return (GSS_S_COMPLETE);
383 }
384 
385 /*ARGSUSED*/
386 static OM_uint32
dummy_gss_delete_sec_context(ct,minor_status,context_handle,output_token,gssd_ctx_verifier)387 dummy_gss_delete_sec_context(ct, minor_status,
388 			context_handle, output_token,
389 			gssd_ctx_verifier)
390 void *ct;
391 OM_uint32 *minor_status;
392 gss_ctx_id_t *context_handle;
393 gss_buffer_t output_token;
394 OM_uint32 gssd_ctx_verifier;
395 {
396 	dummy_gss_ctx_id_t ctx;
397 
398 	dprintf("Entering delete_sec_context\n");
399 
400 	/* Make the length to 0, so the output token is not sent to peer */
401 	if (output_token) {
402 		output_token->length = 0;
403 		output_token->value = NULL;
404 	}
405 
406 	if (*context_handle == GSS_C_NO_CONTEXT) {
407 		*minor_status = 0;
408 		return (GSS_S_COMPLETE);
409 	}
410 
411 	ctx = (dummy_gss_ctx_id_rec *) *context_handle;
412 	ASSERT(ctx->established == 1);
413 	ASSERT(ctx->token_number == MAGIC_TOKEN_NUMBER);
414 
415 	FREE(ctx, sizeof (dummy_gss_ctx_id_rec));
416 	*context_handle = GSS_C_NO_CONTEXT;
417 
418 	dprintf("Leaving delete_sec_context\n");
419 	return (GSS_S_COMPLETE);
420 }
421 
422 static int
der_length_size(int length)423 der_length_size(int length)
424 {
425 	if (length < (1<<7))
426 		return (1);
427 	else if (length < (1<<8))
428 		return (2);
429 	else if (length < (1<<16))
430 		return (3);
431 	else if (length < (1<<24))
432 		return (4);
433 	else
434 		return (5);
435 }
436 
437 static void
der_write_length(unsigned char ** buf,int length)438 der_write_length(unsigned char ** buf, int length)
439 {
440 	if (length < (1<<7)) {
441 		*(*buf)++ = (unsigned char) length;
442 	} else {
443 		*(*buf)++ = (unsigned char) (der_length_size(length)+127);
444 		if (length >= (1<<24))
445 			*(*buf)++ = (unsigned char) (length>>24);
446 		if (length >= (1<<16))
447 			*(*buf)++ = (unsigned char) ((length>>16)&0xff);
448 		if (length >= (1<<8))
449 			*(*buf)++ = (unsigned char) ((length>>8)&0xff);
450 		*(*buf)++ = (unsigned char) (length&0xff);
451 	}
452 }
453 
454 static int
der_read_length(buf,bufsize)455 der_read_length(buf, bufsize)
456 unsigned char **buf;
457 int *bufsize;
458 {
459 	unsigned char sf;
460 	int ret;
461 
462 	if (*bufsize < 1)
463 		return (-1);
464 	sf = *(*buf)++;
465 	(*bufsize)--;
466 	if (sf & 0x80) {
467 		if ((sf &= 0x7f) > ((*bufsize)-1))
468 			return (-1);
469 		if (sf > DUMMY_SIZE_OF_INT)
470 			return (-1);
471 		ret = 0;
472 		for (; sf; sf--) {
473 			ret = (ret<<8) + (*(*buf)++);
474 			(*bufsize)--;
475 		}
476 	} else {
477 		ret = sf;
478 	}
479 
480 	return (ret);
481 }
482 
483 static int
g_token_size(mech,body_size)484 g_token_size(mech, body_size)
485 	gss_OID mech;
486 	unsigned int body_size;
487 {
488 	/* set body_size to sequence contents size */
489 	body_size += 4 + (int)mech->length;	/* NEED overflow check */
490 	return (1 + der_length_size(body_size) + body_size);
491 }
492 
493 static void
g_make_token_header(mech,body_size,buf,tok_type)494 g_make_token_header(mech, body_size, buf, tok_type)
495 	gss_OID mech;
496 	int body_size;
497 	unsigned char **buf;
498 	int tok_type;
499 {
500 	*(*buf)++ = 0x60;
501 	der_write_length(buf, 4 + mech->length + body_size);
502 	*(*buf)++ = 0x06;
503 	*(*buf)++ = (unsigned char) mech->length;
504 	TWRITE_STR(*buf, mech->elements, ((int)mech->length));
505 	*(*buf)++ = (unsigned char) ((tok_type>>8)&0xff);
506 	*(*buf)++ = (unsigned char) (tok_type&0xff);
507 }
508 
509 static int
g_verify_token_header(mech,body_size,buf_in,tok_type,toksize)510 g_verify_token_header(mech, body_size, buf_in, tok_type, toksize)
511 	gss_OID mech;
512 	int *body_size;
513 	unsigned char **buf_in;
514 	int tok_type;
515 	int toksize;
516 {
517 	unsigned char *buf = *buf_in;
518 	int seqsize;
519 	gss_OID_desc toid;
520 	int ret = 0;
521 
522 	if ((toksize -= 1) < 0)
523 		return (G_BAD_TOK_HEADER);
524 	if (*buf++ != 0x60)
525 		return (G_BAD_TOK_HEADER);
526 
527 	if ((seqsize = der_read_length(&buf, &toksize)) < 0)
528 		return (G_BAD_TOK_HEADER);
529 
530 	if (seqsize != toksize)
531 		return (G_BAD_TOK_HEADER);
532 
533 	if ((toksize -= 1) < 0)
534 		return (G_BAD_TOK_HEADER);
535 	if (*buf++ != 0x06)
536 		return (G_BAD_TOK_HEADER);
537 
538 	if ((toksize -= 1) < 0)
539 		return (G_BAD_TOK_HEADER);
540 	toid.length = *buf++;
541 
542 	if ((toksize -= toid.length) < 0)
543 		return (G_BAD_TOK_HEADER);
544 	toid.elements = buf;
545 	buf += toid.length;
546 
547 	if (! g_OID_equal(&toid, mech))
548 		ret = G_WRONG_MECH;
549 
550 	/*
551 	 * G_WRONG_MECH is not returned immediately because it's more important
552 	 * to return G_BAD_TOK_HEADER if the token header is in fact bad
553 	 */
554 
555 	if ((toksize -= 2) < 0)
556 		return (G_BAD_TOK_HEADER);
557 
558 	if ((*buf++ != ((tok_type>>8)&0xff)) ||
559 	    (*buf++ != (tok_type&0xff)))
560 		return (G_BAD_TOK_HEADER);
561 
562 	if (!ret) {
563 		*buf_in = buf;
564 		*body_size = toksize;
565 	}
566 
567 	return (ret);
568 }
569 
570 static gss_buffer_desc
make_dummy_token_msg(void * data,int dataLen)571 make_dummy_token_msg(void *data, int dataLen)
572 {
573 	gss_buffer_desc buffer;
574 	int tlen;
575 	unsigned char *t;
576 	unsigned char *ptr;
577 
578 	if (data == NULL) {
579 		buffer.length = 0;
580 		buffer.value = NULL;
581 		return (buffer);
582 	}
583 
584 	tlen = g_token_size((gss_OID)gss_mech_dummy, dataLen);
585 	t = (unsigned char *) MALLOC(tlen);
586 	ptr = t;
587 
588 	g_make_token_header((gss_OID)gss_mech_dummy, dataLen, &ptr, 0);
589 	(void) memcpy(ptr, data, dataLen);
590 
591 	buffer.length = tlen;
592 	buffer.value = (void *) t;
593 	return (buffer);
594 }
595