1 /*- 2 * SPDX-License-Identifier: BSD-2-Clause-FreeBSD 3 * 4 * Copyright (c) 2008 Isilon Inc http://www.isilon.com/ 5 * Authors: Doug Rabson <dfr@rabson.org> 6 * Developed with Red Inc: Alfred Perlstein <alfred@freebsd.org> 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 1. Redistributions of source code must retain the above copyright 12 * notice, this list of conditions and the following disclaimer. 13 * 2. Redistributions in binary form must reproduce the above copyright 14 * notice, this list of conditions and the following disclaimer in the 15 * documentation and/or other materials provided with the distribution. 16 * 17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 20 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 27 * SUCH DAMAGE. 28 */ 29 30 #include <sys/cdefs.h> 31 __FBSDID("$FreeBSD$"); 32 33 #include <sys/param.h> 34 #include <sys/kernel.h> 35 #include <sys/kobj.h> 36 #include <sys/lock.h> 37 #include <sys/malloc.h> 38 #include <sys/mutex.h> 39 40 #include <kgssapi/gssapi.h> 41 #include <kgssapi/gssapi_impl.h> 42 #include <rpc/rpc.h> 43 44 #include "gssd.h" 45 #include "kgss_if.h" 46 47 OM_uint32 gss_accept_sec_context(OM_uint32 *minor_status, 48 gss_ctx_id_t *context_handle, 49 const gss_cred_id_t acceptor_cred_handle, 50 const gss_buffer_t input_token, 51 const gss_channel_bindings_t input_chan_bindings, 52 gss_name_t *src_name, 53 gss_OID *mech_type, 54 gss_buffer_t output_token, 55 OM_uint32 *ret_flags, 56 OM_uint32 *time_rec, 57 gss_cred_id_t *delegated_cred_handle) 58 { 59 struct accept_sec_context_res res; 60 struct accept_sec_context_args args; 61 enum clnt_stat stat; 62 gss_ctx_id_t ctx = *context_handle; 63 gss_name_t name; 64 gss_cred_id_t cred; 65 CLIENT *cl; 66 67 cl = kgss_gssd_client(); 68 if (cl == NULL) { 69 *minor_status = 0; 70 return (GSS_S_FAILURE); 71 } 72 73 if (ctx) 74 args.ctx = ctx->handle; 75 else 76 args.ctx = 0; 77 if (acceptor_cred_handle) 78 args.cred = acceptor_cred_handle->handle; 79 else 80 args.cred = 0; 81 args.input_token = *input_token; 82 args.input_chan_bindings = input_chan_bindings; 83 84 bzero(&res, sizeof(res)); 85 stat = gssd_accept_sec_context_1(&args, &res, cl); 86 CLNT_RELEASE(cl); 87 if (stat != RPC_SUCCESS) { 88 *minor_status = stat; 89 return (GSS_S_FAILURE); 90 } 91 92 if (res.major_status != GSS_S_COMPLETE 93 && res.major_status != GSS_S_CONTINUE_NEEDED) { 94 *minor_status = res.minor_status; 95 xdr_free((xdrproc_t) xdr_accept_sec_context_res, &res); 96 return (res.major_status); 97 } 98 99 *minor_status = res.minor_status; 100 101 if (!ctx) { 102 ctx = kgss_create_context(res.mech_type); 103 if (!ctx) { 104 xdr_free((xdrproc_t) xdr_accept_sec_context_res, &res); 105 *minor_status = 0; 106 return (GSS_S_BAD_MECH); 107 } 108 } 109 *context_handle = ctx; 110 111 ctx->handle = res.ctx; 112 name = malloc(sizeof(struct _gss_name_t), M_GSSAPI, M_WAITOK); 113 name->handle = res.src_name; 114 if (src_name) { 115 *src_name = name; 116 } else { 117 OM_uint32 junk; 118 gss_release_name(&junk, &name); 119 } 120 if (mech_type) 121 *mech_type = KGSS_MECH_TYPE(ctx); 122 kgss_copy_buffer(&res.output_token, output_token); 123 if (ret_flags) 124 *ret_flags = res.ret_flags; 125 if (time_rec) 126 *time_rec = res.time_rec; 127 cred = malloc(sizeof(struct _gss_cred_id_t), M_GSSAPI, M_WAITOK); 128 cred->handle = res.delegated_cred_handle; 129 if (delegated_cred_handle) { 130 *delegated_cred_handle = cred; 131 } else { 132 OM_uint32 junk; 133 gss_release_cred(&junk, &cred); 134 } 135 136 xdr_free((xdrproc_t) xdr_accept_sec_context_res, &res); 137 138 /* 139 * If the context establishment is complete, export it from 140 * userland and hand the result (which includes key material 141 * etc.) to the kernel implementation. 142 */ 143 if (res.major_status == GSS_S_COMPLETE) 144 res.major_status = kgss_transfer_context(ctx); 145 146 return (res.major_status); 147 } 148