1 /*- 2 * SPDX-License-Identifier: BSD-2-Clause 3 * 4 * Copyright (c) 2008 Isilon Inc http://www.isilon.com/ 5 * Authors: Doug Rabson <dfr@rabson.org> 6 * Developed with Red Inc: Alfred Perlstein <alfred@freebsd.org> 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 1. Redistributions of source code must retain the above copyright 12 * notice, this list of conditions and the following disclaimer. 13 * 2. Redistributions in binary form must reproduce the above copyright 14 * notice, this list of conditions and the following disclaimer in the 15 * documentation and/or other materials provided with the distribution. 16 * 17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 20 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 27 * SUCH DAMAGE. 28 */ 29 30 #include <sys/param.h> 31 #include <sys/kernel.h> 32 #include <sys/kobj.h> 33 #include <sys/lock.h> 34 #include <sys/malloc.h> 35 #include <sys/mutex.h> 36 37 #include <kgssapi/gssapi.h> 38 #include <kgssapi/gssapi_impl.h> 39 #include <rpc/rpc.h> 40 41 #include "gssd.h" 42 #include "kgss_if.h" 43 44 OM_uint32 gss_accept_sec_context(OM_uint32 *minor_status, 45 gss_ctx_id_t *context_handle, 46 const gss_cred_id_t acceptor_cred_handle, 47 const gss_buffer_t input_token, 48 const gss_channel_bindings_t input_chan_bindings, 49 gss_name_t *src_name, 50 gss_OID *mech_type, 51 gss_buffer_t output_token, 52 OM_uint32 *ret_flags, 53 OM_uint32 *time_rec, 54 gss_cred_id_t *delegated_cred_handle) 55 { 56 struct accept_sec_context_res res; 57 struct accept_sec_context_args args; 58 enum clnt_stat stat; 59 gss_ctx_id_t ctx = *context_handle; 60 gss_name_t name; 61 gss_cred_id_t cred; 62 CLIENT *cl; 63 64 cl = kgss_gssd_client(); 65 if (cl == NULL) { 66 *minor_status = 0; 67 return (GSS_S_FAILURE); 68 } 69 70 if (ctx) 71 args.ctx = ctx->handle; 72 else 73 args.ctx = 0; 74 if (acceptor_cred_handle) 75 args.cred = acceptor_cred_handle->handle; 76 else 77 args.cred = 0; 78 args.input_token = *input_token; 79 args.input_chan_bindings = input_chan_bindings; 80 81 bzero(&res, sizeof(res)); 82 stat = gssd_accept_sec_context_1(&args, &res, cl); 83 CLNT_RELEASE(cl); 84 if (stat != RPC_SUCCESS) { 85 *minor_status = stat; 86 return (GSS_S_FAILURE); 87 } 88 89 if (res.major_status != GSS_S_COMPLETE 90 && res.major_status != GSS_S_CONTINUE_NEEDED) { 91 *minor_status = res.minor_status; 92 xdr_free((xdrproc_t) xdr_accept_sec_context_res, &res); 93 return (res.major_status); 94 } 95 96 *minor_status = res.minor_status; 97 98 if (!ctx) { 99 ctx = kgss_create_context(res.mech_type); 100 if (!ctx) { 101 xdr_free((xdrproc_t) xdr_accept_sec_context_res, &res); 102 *minor_status = 0; 103 return (GSS_S_BAD_MECH); 104 } 105 } 106 *context_handle = ctx; 107 108 ctx->handle = res.ctx; 109 name = malloc(sizeof(struct _gss_name_t), M_GSSAPI, M_WAITOK); 110 name->handle = res.src_name; 111 if (src_name) { 112 *src_name = name; 113 } else { 114 OM_uint32 junk; 115 gss_release_name(&junk, &name); 116 } 117 if (mech_type) 118 *mech_type = KGSS_MECH_TYPE(ctx); 119 kgss_copy_buffer(&res.output_token, output_token); 120 if (ret_flags) 121 *ret_flags = res.ret_flags; 122 if (time_rec) 123 *time_rec = res.time_rec; 124 cred = malloc(sizeof(struct _gss_cred_id_t), M_GSSAPI, M_WAITOK); 125 cred->handle = res.delegated_cred_handle; 126 if (delegated_cred_handle) { 127 *delegated_cred_handle = cred; 128 } else { 129 OM_uint32 junk; 130 gss_release_cred(&junk, &cred); 131 } 132 133 xdr_free((xdrproc_t) xdr_accept_sec_context_res, &res); 134 135 /* 136 * If the context establishment is complete, export it from 137 * userland and hand the result (which includes key material 138 * etc.) to the kernel implementation. 139 */ 140 if (res.major_status == GSS_S_COMPLETE) 141 res.major_status = kgss_transfer_context(ctx); 142 143 return (res.major_status); 144 } 145