1 /*
2 * Copyright 2003 Sun Microsystems, Inc. All rights reserved.
3 * Use is subject to license terms.
4 * Copyright (c) 2016 by Delphix. All rights reserved.
5 */
6
7 /* DIGEST-MD5 SASL plugin
8 * Rob Siemborski
9 * Tim Martin
10 * Alexey Melnikov
11 * $Id: digestmd5.c,v 1.153 2003/03/30 22:17:06 leg Exp $
12 */
13 /*
14 * Copyright (c) 1998-2003 Carnegie Mellon University. All rights reserved.
15 *
16 * Redistribution and use in source and binary forms, with or without
17 * modification, are permitted provided that the following conditions
18 * are met:
19 *
20 * 1. Redistributions of source code must retain the above copyright
21 * notice, this list of conditions and the following disclaimer.
22 *
23 * 2. Redistributions in binary form must reproduce the above copyright
24 * notice, this list of conditions and the following disclaimer in
25 * the documentation and/or other materials provided with the
26 * distribution.
27 *
28 * 3. The name "Carnegie Mellon University" must not be used to
29 * endorse or promote products derived from this software without
30 * prior written permission. For permission or any other legal
31 * details, please contact
32 * Office of Technology Transfer
33 * Carnegie Mellon University
34 * 5000 Forbes Avenue
35 * Pittsburgh, PA 15213-3890
36 * (412) 268-4387, fax: (412) 268-7395
37 * tech-transfer@andrew.cmu.edu
38 *
39 * 4. Redistributions of any form whatsoever must retain the following
40 * acknowledgment:
41 * "This product includes software developed by Computing Services
42 * at Carnegie Mellon University (http://www.cmu.edu/computing/)."
43 *
44 * CARNEGIE MELLON UNIVERSITY DISCLAIMS ALL WARRANTIES WITH REGARD TO
45 * THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
46 * AND FITNESS, IN NO EVENT SHALL CARNEGIE MELLON UNIVERSITY BE LIABLE
47 * FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
48 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
49 * AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
50 * OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
51 */
52
53 #include <config.h>
54
55 #include <stdlib.h>
56 #include <stdio.h>
57 #include <string.h>
58 #ifndef macintosh
59 #include <sys/types.h>
60 #include <sys/stat.h>
61 #endif
62 #include <fcntl.h>
63 #include <ctype.h>
64
65 /* DES support */
66 #ifdef WITH_DES
67 # ifdef WITH_SSL_DES
68 # include <openssl/des.h>
69 # else /* system DES library */
70 # include <des.h>
71 # endif
72 #endif /* WITH_DES */
73
74 #ifdef WIN32
75 # include <winsock.h>
76 #else /* Unix */
77 # include <netinet/in.h>
78 #endif /* WIN32 */
79
80 #ifdef _SUN_SDK_
81 #include <unistd.h>
82 #endif /* _SUN_SDK_ */
83
84 #include <sasl.h>
85 #include <saslplug.h>
86
87 #include "plugin_common.h"
88
89 #if defined _SUN_SDK_ && defined USE_UEF
90 #include <security/cryptoki.h>
91 static int uef_init(const sasl_utils_t *utils);
92 #endif /* _SUN_SDK_ && USE_UEF */
93
94 #ifndef WIN32
95 extern int strcasecmp(const char *s1, const char *s2);
96 #endif /* end WIN32 */
97
98 #ifdef macintosh
99 #include <sasl_md5_plugin_decl.h>
100 #endif
101
102 /* external definitions */
103
104 #ifndef _SUN_SDK_
105 #ifdef sun
106 /* gotta define gethostname ourselves on suns */
107 extern int gethostname(char *, int);
108 #endif
109 #endif /* !_SUN_SDK_ */
110
111 #define bool int
112
113 #ifndef TRUE
114 #define TRUE (1)
115 #define FALSE (0)
116 #endif
117
118 #define DEFAULT_BUFSIZE 0xFFFF
119
120 /***************************** Common Section *****************************/
121
122 #ifndef _SUN_SDK_
123 static const char plugin_id[] = "$Id: digestmd5.c,v 1.153 2003/03/30 22:17:06 leg Exp $";
124 #endif /* !_SUN_SDK_ */
125
126 /* Definitions */
127 #define NONCE_SIZE (32) /* arbitrary */
128
129 /* Layer Flags */
130 #define DIGEST_NOLAYER (1)
131 #define DIGEST_INTEGRITY (2)
132 #define DIGEST_PRIVACY (4)
133
134 /* defines */
135 #define HASHLEN 16
136 typedef unsigned char HASH[HASHLEN + 1];
137 #define HASHHEXLEN 32
138 typedef unsigned char HASHHEX[HASHHEXLEN + 1];
139
140 #define MAC_SIZE 10
141 #define MAC_OFFS 2
142
143 const char *SEALING_CLIENT_SERVER="Digest H(A1) to client-to-server sealing key magic constant";
144 const char *SEALING_SERVER_CLIENT="Digest H(A1) to server-to-client sealing key magic constant";
145
146 const char *SIGNING_CLIENT_SERVER="Digest session key to client-to-server signing key magic constant";
147 const char *SIGNING_SERVER_CLIENT="Digest session key to server-to-client signing key magic constant";
148
149 #define HT (9)
150 #define CR (13)
151 #define LF (10)
152 #define SP (32)
153 #define DEL (127)
154
155 struct context;
156
157 /* function definitions for cipher encode/decode */
158 typedef int cipher_function_t(struct context *,
159 const char *,
160 unsigned,
161 unsigned char[],
162 char *,
163 unsigned *);
164
165 #ifdef _SUN_SDK_
166 typedef int cipher_init_t(struct context *, char [16],
167 char [16]);
168 #else
169 typedef int cipher_init_t(struct context *, unsigned char [16],
170 unsigned char [16]);
171 #endif /* _SUN_SDK_ */
172
173 typedef void cipher_free_t(struct context *);
174
175 enum Context_type { SERVER = 0, CLIENT = 1 };
176
177 typedef struct cipher_context cipher_context_t;
178
179 /* cached auth info used for fast reauth */
180 typedef struct reauth_entry {
181 char *authid;
182 char *realm;
183 unsigned char *nonce;
184 unsigned int nonce_count;
185 unsigned char *cnonce;
186
187 union {
188 struct {
189 time_t timestamp;
190 } s; /* server stuff */
191
192 struct {
193 char *serverFQDN;
194 int protection;
195 struct digest_cipher *cipher;
196 unsigned int server_maxbuf;
197 } c; /* client stuff */
198 } u;
199 } reauth_entry_t;
200
201 typedef struct reauth_cache {
202 /* static stuff */
203 enum Context_type i_am; /* are we the client or server? */
204 time_t timeout;
205 void *mutex;
206 size_t size;
207
208 reauth_entry_t *e; /* fixed-size hash table of entries */
209 } reauth_cache_t;
210
211 /* context that stores info */
212 typedef struct context {
213 int state; /* state in the authentication we are in */
214 enum Context_type i_am; /* are we the client or server? */
215
216 reauth_cache_t *reauth;
217
218 char *authid;
219 char *realm;
220 unsigned char *nonce;
221 unsigned int nonce_count;
222 unsigned char *cnonce;
223
224 char *response_value;
225
226 unsigned int seqnum;
227 unsigned int rec_seqnum; /* for checking integrity */
228
229 HASH Ki_send;
230 HASH Ki_receive;
231
232 HASH HA1; /* Kcc or Kcs */
233
234 /* copy of utils from the params structures */
235 const sasl_utils_t *utils;
236
237 /* For general use */
238 char *out_buf;
239 unsigned out_buf_len;
240
241 /* for encoding/decoding */
242 buffer_info_t *enc_in_buf;
243 char *encode_buf, *decode_buf, *decode_once_buf;
244 unsigned encode_buf_len, decode_buf_len, decode_once_buf_len;
245 char *decode_tmp_buf;
246 unsigned decode_tmp_buf_len;
247 char *MAC_buf;
248 unsigned MAC_buf_len;
249
250 char *buffer;
251 char sizebuf[4];
252 int cursize;
253
254 /* Layer info */
255 unsigned int size; /* Absolute size of buffer */
256 unsigned int needsize; /* How much of the size of the buffer is left */
257
258 /* Server MaxBuf for Client or Client MaxBuf For Server */
259 /* INCOMING */
260 unsigned int in_maxbuf;
261
262 /* if privacy mode is used use these functions for encode and decode */
263 cipher_function_t *cipher_enc;
264 cipher_function_t *cipher_dec;
265 cipher_init_t *cipher_init;
266 cipher_free_t *cipher_free;
267 struct cipher_context *cipher_enc_context;
268 struct cipher_context *cipher_dec_context;
269 } context_t;
270
271 struct digest_cipher {
272 char *name;
273 sasl_ssf_t ssf;
274 int n; /* bits to make privacy key */
275 int flag; /* a bitmask to make things easier for us */
276
277 cipher_function_t *cipher_enc;
278 cipher_function_t *cipher_dec;
279 cipher_init_t *cipher_init;
280 cipher_free_t *cipher_free;
281 };
282
283 #ifdef _SUN_SDK_
284 static const unsigned char *COLON = (unsigned char *)":";
285 #else
286 static const unsigned char *COLON = ":";
287 #endif /* _SUN_SDK_ */
288
289 /* Hashes a string to produce an unsigned short */
hash(const char * str)290 static unsigned hash(const char *str)
291 {
292 unsigned val = 0;
293 int i;
294
295 while (str && *str) {
296 i = (int) *str;
297 val ^= i;
298 val <<= 1;
299 str++;
300 }
301
302 return val;
303 }
304
CvtHex(HASH Bin,HASHHEX Hex)305 static void CvtHex(HASH Bin, HASHHEX Hex)
306 {
307 unsigned short i;
308 unsigned char j;
309
310 for (i = 0; i < HASHLEN; i++) {
311 j = (Bin[i] >> 4) & 0xf;
312 if (j <= 9)
313 Hex[i * 2] = (j + '0');
314 else
315 Hex[i * 2] = (j + 'a' - 10);
316 j = Bin[i] & 0xf;
317 if (j <= 9)
318 Hex[i * 2 + 1] = (j + '0');
319 else
320 Hex[i * 2 + 1] = (j + 'a' - 10);
321 }
322 Hex[HASHHEXLEN] = '\0';
323 }
324
325 /*
326 * calculate request-digest/response-digest as per HTTP Digest spec
327 */
328 void
DigestCalcResponse(const sasl_utils_t * utils,HASHHEX HA1,unsigned char * pszNonce,unsigned int pszNonceCount,unsigned char * pszCNonce,unsigned char * pszQop,unsigned char * pszDigestUri,unsigned char * pszMethod,HASHHEX HEntity,HASHHEX Response)329 DigestCalcResponse(const sasl_utils_t * utils,
330 HASHHEX HA1, /* H(A1) */
331 unsigned char *pszNonce, /* nonce from server */
332 unsigned int pszNonceCount, /* 8 hex digits */
333 unsigned char *pszCNonce, /* client nonce */
334 unsigned char *pszQop, /* qop-value: "", "auth",
335 * "auth-int" */
336 unsigned char *pszDigestUri, /* requested URL */
337 unsigned char *pszMethod,
338 HASHHEX HEntity, /* H(entity body) if qop="auth-int" */
339 HASHHEX Response /* request-digest or response-digest */
340 )
341 {
342 MD5_CTX Md5Ctx;
343 HASH HA2;
344 HASH RespHash;
345 HASHHEX HA2Hex;
346 char ncvalue[10];
347
348 /* calculate H(A2) */
349 utils->MD5Init(&Md5Ctx);
350
351 if (pszMethod != NULL) {
352 utils->MD5Update(&Md5Ctx, pszMethod, strlen((char *) pszMethod));
353 }
354 utils->MD5Update(&Md5Ctx, (unsigned char *) COLON, 1);
355
356 /* utils->MD5Update(&Md5Ctx, (unsigned char *) "AUTHENTICATE:", 13); */
357 utils->MD5Update(&Md5Ctx, pszDigestUri, strlen((char *) pszDigestUri));
358 if (strcasecmp((char *) pszQop, "auth") != 0) {
359 /* append ":00000000000000000000000000000000" */
360 utils->MD5Update(&Md5Ctx, COLON, 1);
361 utils->MD5Update(&Md5Ctx, HEntity, HASHHEXLEN);
362 }
363 utils->MD5Final(HA2, &Md5Ctx);
364 CvtHex(HA2, HA2Hex);
365
366 /* calculate response */
367 utils->MD5Init(&Md5Ctx);
368 utils->MD5Update(&Md5Ctx, HA1, HASHHEXLEN);
369 utils->MD5Update(&Md5Ctx, COLON, 1);
370 utils->MD5Update(&Md5Ctx, pszNonce, strlen((char *) pszNonce));
371 utils->MD5Update(&Md5Ctx, COLON, 1);
372 if (*pszQop) {
373 sprintf(ncvalue, "%08x", pszNonceCount);
374 #ifdef _SUN_SDK_
375 utils->MD5Update(&Md5Ctx, (unsigned char *)ncvalue, strlen(ncvalue));
376 #else
377 utils->MD5Update(&Md5Ctx, ncvalue, strlen(ncvalue));
378 #endif /* _SUN_SDK_ */
379 utils->MD5Update(&Md5Ctx, COLON, 1);
380 utils->MD5Update(&Md5Ctx, pszCNonce, strlen((char *) pszCNonce));
381 utils->MD5Update(&Md5Ctx, COLON, 1);
382 utils->MD5Update(&Md5Ctx, pszQop, strlen((char *) pszQop));
383 utils->MD5Update(&Md5Ctx, COLON, 1);
384 }
385 utils->MD5Update(&Md5Ctx, HA2Hex, HASHHEXLEN);
386 utils->MD5Final(RespHash, &Md5Ctx);
387 CvtHex(RespHash, Response);
388 }
389
UTF8_In_8859_1(const unsigned char * base,int len)390 static bool UTF8_In_8859_1(const unsigned char *base, int len)
391 {
392 const unsigned char *scan, *end;
393
394 end = base + len;
395 for (scan = base; scan < end; ++scan) {
396 if (*scan > 0xC3)
397 break; /* abort if outside 8859-1 */
398 if (*scan >= 0xC0 && *scan <= 0xC3) {
399 if (++scan == end || *scan < 0x80 || *scan > 0xBF)
400 break;
401 }
402 }
403
404 /* if scan >= end, then this is a 8859-1 string. */
405 return (scan >= end);
406 }
407
408 /*
409 * if the string is entirely in the 8859-1 subset of UTF-8, then translate to
410 * 8859-1 prior to MD5
411 */
MD5_UTF8_8859_1(const sasl_utils_t * utils,MD5_CTX * ctx,bool In_ISO_8859_1,const unsigned char * base,int len)412 void MD5_UTF8_8859_1(const sasl_utils_t * utils,
413 MD5_CTX * ctx,
414 bool In_ISO_8859_1,
415 const unsigned char *base,
416 int len)
417 {
418 const unsigned char *scan, *end;
419 unsigned char cbuf;
420
421 end = base + len;
422
423 /* if we found a character outside 8859-1, don't alter string */
424 if (!In_ISO_8859_1) {
425 utils->MD5Update(ctx, base, len);
426 return;
427 }
428 /* convert to 8859-1 prior to applying hash */
429 do {
430 for (scan = base; scan < end && *scan < 0xC0; ++scan);
431 if (scan != base)
432 utils->MD5Update(ctx, base, scan - base);
433 if (scan + 1 >= end)
434 break;
435 cbuf = ((scan[0] & 0x3) << 6) | (scan[1] & 0x3f);
436 utils->MD5Update(ctx, &cbuf, 1);
437 base = scan + 2;
438 }
439 while (base < end);
440 }
441
DigestCalcSecret(const sasl_utils_t * utils,unsigned char * pszUserName,unsigned char * pszRealm,unsigned char * Password,int PasswordLen,HASH HA1)442 static void DigestCalcSecret(const sasl_utils_t * utils,
443 unsigned char *pszUserName,
444 unsigned char *pszRealm,
445 unsigned char *Password,
446 int PasswordLen,
447 HASH HA1)
448 {
449 bool In_8859_1;
450
451 MD5_CTX Md5Ctx;
452
453 /* Chris Newman clarified that the following text in DIGEST-MD5 spec
454 is bogus: "if name and password are both in ISO 8859-1 charset"
455 We shoud use code example instead */
456
457 utils->MD5Init(&Md5Ctx);
458
459 /* We have to convert UTF-8 to ISO-8859-1 if possible */
460 In_8859_1 = UTF8_In_8859_1(pszUserName, strlen((char *) pszUserName));
461 MD5_UTF8_8859_1(utils, &Md5Ctx, In_8859_1,
462 pszUserName, strlen((char *) pszUserName));
463
464 utils->MD5Update(&Md5Ctx, COLON, 1);
465
466 if (pszRealm != NULL && pszRealm[0] != '\0') {
467 /* a NULL realm is equivalent to the empty string */
468 utils->MD5Update(&Md5Ctx, pszRealm, strlen((char *) pszRealm));
469 }
470
471 utils->MD5Update(&Md5Ctx, COLON, 1);
472
473 /* We have to convert UTF-8 to ISO-8859-1 if possible */
474 In_8859_1 = UTF8_In_8859_1(Password, PasswordLen);
475 MD5_UTF8_8859_1(utils, &Md5Ctx, In_8859_1,
476 Password, PasswordLen);
477
478 utils->MD5Final(HA1, &Md5Ctx);
479 }
480
create_nonce(const sasl_utils_t * utils)481 static unsigned char *create_nonce(const sasl_utils_t * utils)
482 {
483 unsigned char *base64buf;
484 int base64len;
485
486 char *ret = (char *) utils->malloc(NONCE_SIZE);
487 if (ret == NULL)
488 return NULL;
489
490 #if defined _DEV_URANDOM && defined _SUN_SDK_
491 {
492 int fd = open(_DEV_URANDOM, O_RDONLY);
493 int nread = 0;
494
495 if (fd != -1) {
496 nread = read(fd, ret, NONCE_SIZE);
497 close(fd);
498 }
499 if (nread != NONCE_SIZE)
500 utils->rand(utils->rpool, (char *) ret, NONCE_SIZE);
501 }
502 #else
503 utils->rand(utils->rpool, (char *) ret, NONCE_SIZE);
504 #endif /* _DEV_URANDOM && _SUN_SDK_ */
505
506 /* base 64 encode it so it has valid chars */
507 base64len = (NONCE_SIZE * 4 / 3) + (NONCE_SIZE % 3 ? 4 : 0);
508
509 base64buf = (unsigned char *) utils->malloc(base64len + 1);
510 if (base64buf == NULL) {
511 #ifdef _SUN_SDK_
512 utils->log(utils->conn, SASL_LOG_ERR,
513 "Unable to allocate final buffer");
514 #else
515 utils->seterror(utils->conn, 0, "Unable to allocate final buffer");
516 #endif /* _SUN_SDK_ */
517 return NULL;
518 }
519
520 /*
521 * Returns SASL_OK on success, SASL_BUFOVER if result won't fit
522 */
523 if (utils->encode64(ret, NONCE_SIZE,
524 (char *) base64buf, base64len, NULL) != SASL_OK) {
525 utils->free(ret);
526 return NULL;
527 }
528 utils->free(ret);
529
530 return base64buf;
531 }
532
add_to_challenge(const sasl_utils_t * utils,char ** str,unsigned * buflen,unsigned * curlen,char * name,unsigned char * value,bool need_quotes)533 static int add_to_challenge(const sasl_utils_t *utils,
534 char **str, unsigned *buflen, unsigned *curlen,
535 char *name,
536 unsigned char *value,
537 bool need_quotes)
538 {
539 int namesize = strlen(name);
540 int valuesize = strlen((char *) value);
541 int ret;
542
543 ret = _plug_buf_alloc(utils, str, buflen,
544 *curlen + 1 + namesize + 2 + valuesize + 2);
545 if(ret != SASL_OK) return ret;
546
547 *curlen = *curlen + 1 + namesize + 2 + valuesize + 2;
548
549 strcat(*str, ",");
550 strcat(*str, name);
551
552 if (need_quotes) {
553 strcat(*str, "=\"");
554 strcat(*str, (char *) value); /* XXX. What about quoting??? */
555 strcat(*str, "\"");
556 } else {
557 strcat(*str, "=");
558 strcat(*str, (char *) value);
559 }
560
561 return SASL_OK;
562 }
563
skip_lws(char * s)564 static char *skip_lws (char *s)
565 {
566 if(!s) return NULL;
567
568 /* skipping spaces: */
569 while (s[0] == ' ' || s[0] == HT || s[0] == CR || s[0] == LF) {
570 if (s[0]=='\0') break;
571 s++;
572 }
573
574 return s;
575 }
576
577 #ifdef __SUN_SDK_
skip_token(char * s,int caseinsensitive)578 static char *skip_token (char *s, int caseinsensitive __attribute__((unused)))
579 #else
580 static char *skip_token (char *s, int caseinsensitive)
581 #endif /* _SUN_SDK_ */
582 {
583 if(!s) return NULL;
584
585 #ifdef __SUN_SDK_
586 while (((unsigned char *)s)[0]>SP) {
587 #else
588 while (s[0]>SP) {
589 #endif /* _SUN_SDK_ */
590 if (s[0]==DEL || s[0]=='(' || s[0]==')' || s[0]=='<' || s[0]=='>' ||
591 s[0]=='@' || s[0]==',' || s[0]==';' || s[0]==':' || s[0]=='\\' ||
592 s[0]=='\'' || s[0]=='/' || s[0]=='[' || s[0]==']' || s[0]== '?' ||
593 s[0]=='=' || s[0]== '{' || s[0]== '}') {
594 #ifdef __SUN_SDK_
595 /* the above chars are never uppercase */
596 break;
597 #else
598 if (caseinsensitive == 1) {
599 if (!isupper((unsigned char) s[0]))
600 break;
601 } else {
602 break;
603 }
604 #endif /* _SUN_SDK_ */
605 }
606 s++;
607 }
608 return s;
609 }
610
611 /* NULL - error (unbalanced quotes),
612 otherwise pointer to the first character after value */
613 static char *unquote (char *qstr)
614 {
615 char *endvalue;
616 int escaped = 0;
617 char *outptr;
618
619 if(!qstr) return NULL;
620
621 if (qstr[0] == '"') {
622 qstr++;
623 outptr = qstr;
624
625 for (endvalue = qstr; endvalue[0] != '\0'; endvalue++, outptr++) {
626 if (escaped) {
627 outptr[0] = endvalue[0];
628 escaped = 0;
629 }
630 else if (endvalue[0] == '\\') {
631 escaped = 1;
632 outptr--; /* Will be incremented at the end of the loop */
633 }
634 else if (endvalue[0] == '"') {
635 break;
636 }
637 else {
638 outptr[0] = endvalue[0];
639 }
640 }
641
642 if (endvalue[0] != '"') {
643 return NULL;
644 }
645
646 while (outptr <= endvalue) {
647 outptr[0] = '\0';
648 outptr++;
649 }
650 endvalue++;
651 }
652 else { /* not qouted value (token) */
653 endvalue = skip_token(qstr,0);
654 };
655
656 return endvalue;
657 }
658
659 static void get_pair(char **in, char **name, char **value)
660 {
661 char *endpair;
662 /* int inQuotes; */
663 char *curp = *in;
664 *name = NULL;
665 *value = NULL;
666
667 if (curp == NULL) return;
668 if (curp[0] == '\0') return;
669
670 /* skipping spaces: */
671 curp = skip_lws(curp);
672
673 *name = curp;
674
675 curp = skip_token(curp,1);
676
677 /* strip wierd chars */
678 if (curp[0] != '=' && curp[0] != '\0') {
679 *curp++ = '\0';
680 };
681
682 curp = skip_lws(curp);
683
684 if (curp[0] != '=') { /* No '=' sign */
685 *name = NULL;
686 return;
687 }
688
689 curp[0] = '\0';
690 curp++;
691
692 curp = skip_lws(curp);
693
694 *value = (curp[0] == '"') ? curp+1 : curp;
695
696 endpair = unquote (curp);
697 if (endpair == NULL) { /* Unbalanced quotes */
698 *name = NULL;
699 return;
700 }
701 if (endpair[0] != ',') {
702 if (endpair[0]!='\0') {
703 *endpair++ = '\0';
704 }
705 }
706
707 endpair = skip_lws(endpair);
708
709 /* syntax check: MUST be '\0' or ',' */
710 if (endpair[0] == ',') {
711 endpair[0] = '\0';
712 endpair++; /* skipping <,> */
713 } else if (endpair[0] != '\0') {
714 *name = NULL;
715 return;
716 }
717
718 *in = endpair;
719 }
720
721 #ifdef WITH_DES
722 struct des_context_s {
723 des_key_schedule keysched; /* key schedule for des initialization */
724 des_cblock ivec; /* initial vector for encoding */
725 des_key_schedule keysched2; /* key schedule for 3des initialization */
726 };
727
728 typedef struct des_context_s des_context_t;
729
730 /* slide the first 7 bytes of 'inbuf' into the high seven bits of the
731 first 8 bytes of 'keybuf'. 'keybuf' better be 8 bytes long or longer. */
732 static void slidebits(unsigned char *keybuf, unsigned char *inbuf)
733 {
734 keybuf[0] = inbuf[0];
735 keybuf[1] = (inbuf[0]<<7) | (inbuf[1]>>1);
736 keybuf[2] = (inbuf[1]<<6) | (inbuf[2]>>2);
737 keybuf[3] = (inbuf[2]<<5) | (inbuf[3]>>3);
738 keybuf[4] = (inbuf[3]<<4) | (inbuf[4]>>4);
739 keybuf[5] = (inbuf[4]<<3) | (inbuf[5]>>5);
740 keybuf[6] = (inbuf[5]<<2) | (inbuf[6]>>6);
741 keybuf[7] = (inbuf[6]<<1);
742 }
743
744 /******************************
745 *
746 * 3DES functions
747 *
748 *****************************/
749
750 static int dec_3des(context_t *text,
751 const char *input,
752 unsigned inputlen,
753 unsigned char digest[16],
754 char *output,
755 unsigned *outputlen)
756 {
757 des_context_t *c = (des_context_t *) text->cipher_dec_context;
758 int padding, p;
759
760 des_ede2_cbc_encrypt((void *) input,
761 (void *) output,
762 inputlen,
763 c->keysched,
764 c->keysched2,
765 &c->ivec,
766 DES_DECRYPT);
767
768 /* now chop off the padding */
769 padding = output[inputlen - 11];
770 if (padding < 1 || padding > 8) {
771 /* invalid padding length */
772 return SASL_FAIL;
773 }
774 /* verify all padding is correct */
775 for (p = 1; p <= padding; p++) {
776 if (output[inputlen - 10 - p] != padding) {
777 return SASL_FAIL;
778 }
779 }
780
781 /* chop off the padding */
782 *outputlen = inputlen - padding - 10;
783
784 /* copy in the HMAC to digest */
785 memcpy(digest, output + inputlen - 10, 10);
786
787 return SASL_OK;
788 }
789
790 static int enc_3des(context_t *text,
791 const char *input,
792 unsigned inputlen,
793 unsigned char digest[16],
794 char *output,
795 unsigned *outputlen)
796 {
797 des_context_t *c = (des_context_t *) text->cipher_enc_context;
798 int len;
799 int paddinglen;
800
801 /* determine padding length */
802 paddinglen = 8 - ((inputlen + 10) % 8);
803
804 /* now construct the full stuff to be ciphered */
805 memcpy(output, input, inputlen); /* text */
806 memset(output+inputlen, paddinglen, paddinglen);/* pad */
807 memcpy(output+inputlen+paddinglen, digest, 10); /* hmac */
808
809 len=inputlen+paddinglen+10;
810
811 des_ede2_cbc_encrypt((void *) output,
812 (void *) output,
813 len,
814 c->keysched,
815 c->keysched2,
816 &c->ivec,
817 DES_ENCRYPT);
818
819 *outputlen=len;
820
821 return SASL_OK;
822 }
823
824 static int init_3des(context_t *text,
825 unsigned char enckey[16],
826 unsigned char deckey[16])
827 {
828 des_context_t *c;
829 unsigned char keybuf[8];
830
831 /* allocate enc & dec context */
832 c = (des_context_t *) text->utils->malloc(2 * sizeof(des_context_t));
833 if (c == NULL) return SASL_NOMEM;
834
835 /* setup enc context */
836 slidebits(keybuf, enckey);
837 if (des_key_sched((des_cblock *) keybuf, c->keysched) < 0)
838 return SASL_FAIL;
839
840 slidebits(keybuf, enckey + 7);
841 if (des_key_sched((des_cblock *) keybuf, c->keysched2) < 0)
842 return SASL_FAIL;
843 memcpy(c->ivec, ((char *) enckey) + 8, 8);
844
845 text->cipher_enc_context = (cipher_context_t *) c;
846
847 /* setup dec context */
848 c++;
849 slidebits(keybuf, deckey);
850 if (des_key_sched((des_cblock *) keybuf, c->keysched) < 0)
851 return SASL_FAIL;
852
853 slidebits(keybuf, deckey + 7);
854 if (des_key_sched((des_cblock *) keybuf, c->keysched2) < 0)
855 return SASL_FAIL;
856
857 memcpy(c->ivec, ((char *) deckey) + 8, 8);
858
859 text->cipher_dec_context = (cipher_context_t *) c;
860
861 return SASL_OK;
862 }
863
864
865 /******************************
866 *
867 * DES functions
868 *
869 *****************************/
870
871 static int dec_des(context_t *text,
872 const char *input,
873 unsigned inputlen,
874 unsigned char digest[16],
875 char *output,
876 unsigned *outputlen)
877 {
878 des_context_t *c = (des_context_t *) text->cipher_dec_context;
879 int p, padding = 0;
880
881 des_cbc_encrypt((void *) input,
882 (void *) output,
883 inputlen,
884 c->keysched,
885 &c->ivec,
886 DES_DECRYPT);
887
888 /* Update the ivec (des_cbc_encrypt implementations tend to be broken in
889 this way) */
890 memcpy(c->ivec, input + (inputlen - 8), 8);
891
892 /* now chop off the padding */
893 padding = output[inputlen - 11];
894 if (padding < 1 || padding > 8) {
895 /* invalid padding length */
896 return SASL_FAIL;
897 }
898 /* verify all padding is correct */
899 for (p = 1; p <= padding; p++) {
900 if (output[inputlen - 10 - p] != padding) {
901 return SASL_FAIL;
902 }
903 }
904
905 /* chop off the padding */
906 *outputlen = inputlen - padding - 10;
907
908 /* copy in the HMAC to digest */
909 memcpy(digest, output + inputlen - 10, 10);
910
911 return SASL_OK;
912 }
913
914 static int enc_des(context_t *text,
915 const char *input,
916 unsigned inputlen,
917 unsigned char digest[16],
918 char *output,
919 unsigned *outputlen)
920 {
921 des_context_t *c = (des_context_t *) text->cipher_enc_context;
922 int len;
923 int paddinglen;
924
925 /* determine padding length */
926 paddinglen = 8 - ((inputlen+10) % 8);
927
928 /* now construct the full stuff to be ciphered */
929 memcpy(output, input, inputlen); /* text */
930 memset(output+inputlen, paddinglen, paddinglen);/* pad */
931 memcpy(output+inputlen+paddinglen, digest, 10); /* hmac */
932
933 len = inputlen + paddinglen + 10;
934
935 des_cbc_encrypt((void *) output,
936 (void *) output,
937 len,
938 c->keysched,
939 &c->ivec,
940 DES_ENCRYPT);
941
942 /* Update the ivec (des_cbc_encrypt implementations tend to be broken in
943 this way) */
944 memcpy(c->ivec, output + (len - 8), 8);
945
946 *outputlen = len;
947
948 return SASL_OK;
949 }
950
951 static int init_des(context_t *text,
952 unsigned char enckey[16],
953 unsigned char deckey[16])
954 {
955 des_context_t *c;
956 unsigned char keybuf[8];
957
958 /* allocate enc context */
959 c = (des_context_t *) text->utils->malloc(2 * sizeof(des_context_t));
960 if (c == NULL) return SASL_NOMEM;
961
962 /* setup enc context */
963 slidebits(keybuf, enckey);
964 des_key_sched((des_cblock *) keybuf, c->keysched);
965
966 memcpy(c->ivec, ((char *) enckey) + 8, 8);
967
968 text->cipher_enc_context = (cipher_context_t *) c;
969
970 /* setup dec context */
971 c++;
972 slidebits(keybuf, deckey);
973 des_key_sched((des_cblock *) keybuf, c->keysched);
974
975 memcpy(c->ivec, ((char *) deckey) + 8, 8);
976
977 text->cipher_dec_context = (cipher_context_t *) c;
978
979 return SASL_OK;
980 }
981
982 static void free_des(context_t *text)
983 {
984 /* free des contextss. only cipher_enc_context needs to be free'd,
985 since cipher_dec_context was allocated at the same time. */
986 if (text->cipher_enc_context) text->utils->free(text->cipher_enc_context);
987 }
988
989 #endif /* WITH_DES */
990
991 #ifdef WITH_RC4
992 /* quick generic implementation of RC4 */
993 struct rc4_context_s {
994 unsigned char sbox[256];
995 int i, j;
996 };
997
998 typedef struct rc4_context_s rc4_context_t;
999
1000 static void rc4_init(rc4_context_t *text,
1001 const unsigned char *key,
1002 unsigned keylen)
1003 {
1004 int i, j;
1005
1006 /* fill in linearly s0=0 s1=1... */
1007 for (i=0;i<256;i++)
1008 text->sbox[i]=i;
1009
1010 j=0;
1011 for (i = 0; i < 256; i++) {
1012 unsigned char tmp;
1013 /* j = (j + Si + Ki) mod 256 */
1014 j = (j + text->sbox[i] + key[i % keylen]) % 256;
1015
1016 /* swap Si and Sj */
1017 tmp = text->sbox[i];
1018 text->sbox[i] = text->sbox[j];
1019 text->sbox[j] = tmp;
1020 }
1021
1022 /* counters initialized to 0 */
1023 text->i = 0;
1024 text->j = 0;
1025 }
1026
1027 static void rc4_encrypt(rc4_context_t *text,
1028 const char *input,
1029 char *output,
1030 unsigned len)
1031 {
1032 int tmp;
1033 int i = text->i;
1034 int j = text->j;
1035 int t;
1036 int K;
1037 const char *input_end = input + len;
1038
1039 while (input < input_end) {
1040 i = (i + 1) % 256;
1041
1042 j = (j + text->sbox[i]) % 256;
1043
1044 /* swap Si and Sj */
1045 tmp = text->sbox[i];
1046 text->sbox[i] = text->sbox[j];
1047 text->sbox[j] = tmp;
1048
1049 t = (text->sbox[i] + text->sbox[j]) % 256;
1050
1051 K = text->sbox[t];
1052
1053 /* byte K is Xor'ed with plaintext */
1054 *output++ = *input++ ^ K;
1055 }
1056
1057 text->i = i;
1058 text->j = j;
1059 }
1060
1061 static void rc4_decrypt(rc4_context_t *text,
1062 const char *input,
1063 char *output,
1064 unsigned len)
1065 {
1066 int tmp;
1067 int i = text->i;
1068 int j = text->j;
1069 int t;
1070 int K;
1071 const char *input_end = input + len;
1072
1073 while (input < input_end) {
1074 i = (i + 1) % 256;
1075
1076 j = (j + text->sbox[i]) % 256;
1077
1078 /* swap Si and Sj */
1079 tmp = text->sbox[i];
1080 text->sbox[i] = text->sbox[j];
1081 text->sbox[j] = tmp;
1082
1083 t = (text->sbox[i] + text->sbox[j]) % 256;
1084
1085 K = text->sbox[t];
1086
1087 /* byte K is Xor'ed with plaintext */
1088 *output++ = *input++ ^ K;
1089 }
1090
1091 text->i = i;
1092 text->j = j;
1093 }
1094
1095 static void free_rc4(context_t *text)
1096 {
1097 /* free rc4 context structures */
1098
1099 if(text->cipher_enc_context) text->utils->free(text->cipher_enc_context);
1100 if(text->cipher_dec_context) text->utils->free(text->cipher_dec_context);
1101 #ifdef _SUN_SDK_
1102 text->cipher_enc_context = NULL;
1103 text->cipher_dec_context = NULL;
1104 #endif /* _SUN_SDK_ */
1105 }
1106
1107 static int init_rc4(context_t *text,
1108 #ifdef _SUN_SDK_
1109 char enckey[16],
1110 char deckey[16])
1111 #else
1112 unsigned char enckey[16],
1113 unsigned char deckey[16])
1114 #endif /* _SUN_SDK_ */
1115 {
1116 /* allocate rc4 context structures */
1117 text->cipher_enc_context=
1118 (cipher_context_t *) text->utils->malloc(sizeof(rc4_context_t));
1119 if (text->cipher_enc_context == NULL) return SASL_NOMEM;
1120
1121 text->cipher_dec_context=
1122 (cipher_context_t *) text->utils->malloc(sizeof(rc4_context_t));
1123 #ifdef _SUN_SDK_
1124 if (text->cipher_dec_context == NULL) {
1125 text->utils->free(text->cipher_enc_context);
1126 text->cipher_enc_context = NULL;
1127 return SASL_NOMEM;
1128 }
1129 #else
1130 if (text->cipher_dec_context == NULL) return SASL_NOMEM;
1131 #endif /* _SUN_SDK_ */
1132
1133 /* initialize them */
1134 rc4_init((rc4_context_t *) text->cipher_enc_context,
1135 (const unsigned char *) enckey, 16);
1136 rc4_init((rc4_context_t *) text->cipher_dec_context,
1137 (const unsigned char *) deckey, 16);
1138
1139 return SASL_OK;
1140 }
1141
1142 static int dec_rc4(context_t *text,
1143 const char *input,
1144 unsigned inputlen,
1145 unsigned char digest[16],
1146 char *output,
1147 unsigned *outputlen)
1148 {
1149 /* decrypt the text part */
1150 rc4_decrypt((rc4_context_t *) text->cipher_dec_context,
1151 input, output, inputlen-10);
1152
1153 /* decrypt the HMAC part */
1154 rc4_decrypt((rc4_context_t *) text->cipher_dec_context,
1155 input+(inputlen-10), (char *) digest, 10);
1156
1157 /* no padding so we just subtract the HMAC to get the text length */
1158 *outputlen = inputlen - 10;
1159
1160 return SASL_OK;
1161 }
1162
1163 static int enc_rc4(context_t *text,
1164 const char *input,
1165 unsigned inputlen,
1166 unsigned char digest[16],
1167 char *output,
1168 unsigned *outputlen)
1169 {
1170 /* pad is zero */
1171 *outputlen = inputlen+10;
1172
1173 /* encrypt the text part */
1174 rc4_encrypt((rc4_context_t *) text->cipher_enc_context,
1175 input,
1176 output,
1177 inputlen);
1178
1179 /* encrypt the HMAC part */
1180 rc4_encrypt((rc4_context_t *) text->cipher_enc_context,
1181 (const char *) digest,
1182 (output)+inputlen, 10);
1183
1184 return SASL_OK;
1185 }
1186
1187 #endif /* WITH_RC4 */
1188
1189 struct digest_cipher available_ciphers[] =
1190 {
1191 #ifdef WITH_RC4
1192 { "rc4-40", 40, 5, 0x01, &enc_rc4, &dec_rc4, &init_rc4, &free_rc4 },
1193 { "rc4-56", 56, 7, 0x02, &enc_rc4, &dec_rc4, &init_rc4, &free_rc4 },
1194 { "rc4", 128, 16, 0x04, &enc_rc4, &dec_rc4, &init_rc4, &free_rc4 },
1195 #endif
1196 #ifdef WITH_DES
1197 { "des", 55, 16, 0x08, &enc_des, &dec_des, &init_des, &free_des },
1198 { "3des", 112, 16, 0x10, &enc_3des, &dec_3des, &init_3des, &free_des },
1199 #endif
1200 { NULL, 0, 0, 0, NULL, NULL, NULL, NULL }
1201 };
1202
1203
1204 #ifdef USE_UEF
1205 DEFINE_STATIC_MUTEX(uef_init_mutex);
1206 #define DES_CIPHER_INDEX 3
1207 #define DES3_CIPHER_INDEX 4
1208
1209 static int got_uef_slot = FALSE;
1210 static sasl_ssf_t uef_max_ssf = 0;
1211 static CK_SLOT_ID rc4_slot_id;
1212 static CK_SLOT_ID des_slot_id;
1213 static CK_SLOT_ID des3_slot_id;
1214
1215 struct uef_context_s {
1216 CK_SESSION_HANDLE hSession;
1217 CK_OBJECT_HANDLE hKey;
1218 };
1219
1220 typedef struct uef_context_s uef_context_t;
1221
1222 /*
1223 * slide the first 7 bytes of 'inbuf' into the high seven bits of the
1224 * first 8 bytes of 'keybuf'. 'inbuf' better be 8 bytes long or longer.
1225 *
1226 * This is used to compute the IV for "des" and "3des" as described in
1227 * draft-ietf-sasl-rfc2831bis-00.txt - The IV for "des"
1228 * and "3des" is the last 8 bytes of Kcc or Kcs - the encryption keys.
1229 */
1230
1231 static void slidebits(unsigned char *keybuf, unsigned char *inbuf)
1232 {
1233 keybuf[0] = inbuf[0];
1234 keybuf[1] = (inbuf[0]<<7) | (inbuf[1]>>1);
1235 keybuf[2] = (inbuf[1]<<6) | (inbuf[2]>>2);
1236 keybuf[3] = (inbuf[2]<<5) | (inbuf[3]>>3);
1237 keybuf[4] = (inbuf[3]<<4) | (inbuf[4]>>4);
1238 keybuf[5] = (inbuf[4]<<3) | (inbuf[5]>>5);
1239 keybuf[6] = (inbuf[5]<<2) | (inbuf[6]>>6);
1240 keybuf[7] = (inbuf[6]<<1);
1241 }
1242
1243 /*
1244 * Create encryption and decryption session handle handles for later use.
1245 * Returns SASL_OK on success - any other return indicates failure.
1246 *
1247 * free_uef is called to release associated resources by
1248 * digestmd5_common_mech_dispose
1249 */
1250
1251 static int init_uef(context_t *text,
1252 CK_KEY_TYPE keyType,
1253 CK_MECHANISM_TYPE mech_type,
1254 CK_SLOT_ID slot_id,
1255 char enckey[16],
1256 char deckey[16])
1257 {
1258 CK_RV rv;
1259 uef_context_t *enc_context;
1260 uef_context_t *dec_context;
1261 CK_OBJECT_CLASS class = CKO_SECRET_KEY;
1262 CK_BBOOL true = TRUE;
1263 static CK_MECHANISM mechanism = {CKM_RC4, NULL, 0};
1264 unsigned char keybuf[24];
1265 CK_ATTRIBUTE template[] = {
1266 {CKA_CLASS, NULL, sizeof (class)},
1267 {CKA_KEY_TYPE, NULL, sizeof (keyType)},
1268 {CKA_ENCRYPT, NULL, sizeof (true)},
1269 {CKA_VALUE, NULL, 16}};
1270
1271 template[0].pValue = &class;
1272 template[1].pValue = &keyType;
1273 template[2].pValue = &true;
1274 if (keyType == CKK_DES || keyType == CKK_DES3) {
1275 slidebits(keybuf, (unsigned char *)enckey);
1276 if (keyType == CKK_DES3) {
1277 slidebits(keybuf + 8, (unsigned char *)enckey + 7);
1278 (void) memcpy(keybuf + 16, keybuf, 8);
1279 template[3].ulValueLen = 24;
1280 } else {
1281 template[3].ulValueLen = 8;
1282 }
1283 template[3].pValue = keybuf;
1284 mechanism.pParameter = enckey + 8;
1285 mechanism.ulParameterLen = 8;
1286 } else {
1287 template[3].pValue = enckey;
1288 }
1289 mechanism.mechanism = mech_type;
1290
1291 /* allocate rc4 context structures */
1292 enc_context = text->utils->malloc(sizeof (uef_context_t));
1293 if (enc_context == NULL)
1294 return SASL_NOMEM;
1295
1296 rv = C_OpenSession(slot_id, CKF_SERIAL_SESSION, NULL_PTR, NULL_PTR,
1297 &enc_context->hSession);
1298 if (rv != CKR_OK) {
1299 text->utils->free(enc_context);
1300 #ifdef DEBUG
1301 text->utils->log(text->utils->conn, SASL_LOG_DEBUG,
1302 "enc C_OpenSession Failed:0x%.8X\n", rv);
1303 #endif
1304 return SASL_FAIL;
1305 }
1306
1307 rv = C_CreateObject(enc_context->hSession, template,
1308 sizeof (template)/sizeof (template[0]), &enc_context->hKey);
1309 if (rv != CKR_OK) {
1310 text->utils->free(enc_context);
1311 (void) C_CloseSession(enc_context->hSession);
1312 #ifdef DEBUG
1313 text->utils->log(text->utils->conn, SASL_LOG_DEBUG,
1314 "enc C_CreateObject: rv = 0x%.8X\n", rv);
1315 #endif
1316 return SASL_FAIL;
1317 }
1318
1319 text->cipher_enc_context = (cipher_context_t *)enc_context;
1320
1321 /* Initialize the encryption operation in the session */
1322 rv = C_EncryptInit(enc_context->hSession, &mechanism, enc_context->hKey);
1323 if (rv != CKR_OK) {
1324 #ifdef DEBUG
1325 text->utils->log(text->utils->conn, SASL_LOG_DEBUG,
1326 "C_EncryptInit: rv = 0x%.8X\n", rv);
1327 #endif
1328 return SASL_FAIL;
1329 }
1330
1331 dec_context = text->utils->malloc(sizeof(uef_context_t));
1332 if (dec_context == NULL)
1333 return SASL_NOMEM;
1334
1335 rv = C_OpenSession(slot_id, CKF_SERIAL_SESSION, NULL_PTR, NULL_PTR,
1336 &dec_context->hSession);
1337 if (rv != CKR_OK) {
1338 #ifdef DEBUG
1339 text->utils->log(text->utils->conn, SASL_LOG_DEBUG,
1340 "dec C_OpenSession Failed:0x%.8X\n", rv);
1341 #endif
1342 text->utils->free(dec_context);
1343 return SASL_FAIL;
1344 }
1345
1346 template[2].type = CKA_DECRYPT;
1347 if (keyType == CKK_DES || keyType == CKK_DES3) {
1348 slidebits(keybuf, (unsigned char *)deckey);
1349 if (keyType == CKK_DES3) {
1350 slidebits(keybuf + 8, (unsigned char *)deckey + 7);
1351 (void) memcpy(keybuf + 16, keybuf, 8);
1352 }
1353 mechanism.pParameter = deckey + 8;
1354 } else {
1355 template[3].pValue = deckey;
1356 }
1357
1358 rv = C_CreateObject(dec_context->hSession, template,
1359 sizeof (template)/sizeof (template[0]), &dec_context->hKey);
1360 if (rv != CKR_OK) {
1361 #ifdef DEBUG
1362 text->utils->log(text->utils->conn, SASL_LOG_DEBUG,
1363 "dec C_CreateObject: rv = 0x%.8X\n", rv);
1364 #endif
1365 (void) C_CloseSession(dec_context->hSession);
1366 text->utils->free(dec_context);
1367 return SASL_FAIL;
1368 }
1369 text->cipher_dec_context = (cipher_context_t *)dec_context;
1370
1371 /* Initialize the decryption operation in the session */
1372 rv = C_DecryptInit(dec_context->hSession, &mechanism, dec_context->hKey);
1373 if (rv != CKR_OK) {
1374 #ifdef DEBUG
1375 text->utils->log(text->utils->conn, SASL_LOG_DEBUG,
1376 "C_DecryptInit: rv = 0x%.8X\n", rv);
1377 #endif
1378 return SASL_FAIL;
1379 }
1380
1381 return SASL_OK;
1382 }
1383
1384 static int init_rc4_uef(context_t *text,
1385 char enckey[16],
1386 char deckey[16])
1387 {
1388 return init_uef(text, CKK_RC4, CKM_RC4, rc4_slot_id, enckey, deckey);
1389 }
1390
1391 static int init_des_uef(context_t *text,
1392 char enckey[16],
1393 char deckey[16])
1394 {
1395 return init_uef(text, CKK_DES, CKM_DES_CBC, des_slot_id, enckey, deckey);
1396 }
1397
1398 static int init_3des_uef(context_t *text,
1399 char enckey[16],
1400 char deckey[16])
1401 {
1402 return init_uef(text, CKK_DES3, CKM_DES3_CBC, des3_slot_id, enckey, deckey);
1403 }
1404
1405 static void
1406 free_uef(context_t *text)
1407 {
1408 uef_context_t *enc_context =
1409 (uef_context_t *)text->cipher_enc_context;
1410 uef_context_t *dec_context =
1411 (uef_context_t *)text->cipher_dec_context;
1412 CK_RV rv;
1413 unsigned char buf[1];
1414 CK_ULONG ulLen = 0;
1415
1416
1417 if (enc_context != NULL) {
1418 rv = C_EncryptFinal(enc_context->hSession, buf, &ulLen);
1419 if (rv != CKR_OK) {
1420 #ifdef DEBUG
1421 text->utils->log(text->utils->conn, SASL_LOG_DEBUG,
1422 "C_EncryptFinal failed:0x%.8X\n", rv);
1423 #endif
1424 }
1425 rv = C_DestroyObject(enc_context->hSession, enc_context->hKey);
1426 if (rv != CKR_OK) {
1427 #ifdef DEBUG
1428 text->utils->log(text->utils->conn, SASL_LOG_DEBUG,
1429 "C_DestroyObject failed:0x%.8X\n", rv);
1430 #endif
1431 }
1432 rv = C_CloseSession(enc_context->hSession);
1433 if (rv != CKR_OK) {
1434 #ifdef DEBUG
1435 text->utils->log(text->utils->conn, SASL_LOG_DEBUG,
1436 "C_CloseSession failed:0x%.8X\n", rv);
1437 #endif
1438 }
1439 text->utils->free(enc_context);
1440 }
1441 if (dec_context != NULL) {
1442 rv = C_DecryptFinal(dec_context->hSession, buf, &ulLen);
1443 if (rv != CKR_OK) {
1444 #ifdef DEBUG
1445 text->utils->log(text->utils->conn, SASL_LOG_DEBUG,
1446 "C_DecryptFinal failed:0x%.8X\n", rv);
1447 #endif
1448 }
1449 rv = C_DestroyObject(dec_context->hSession, dec_context->hKey);
1450 if (rv != CKR_OK) {
1451 #ifdef DEBUG
1452 text->utils->log(text->utils->conn, SASL_LOG_DEBUG,
1453 "C_DestroyObject failed:0x%.8X\n", rv);
1454 #endif
1455 }
1456
1457 rv = C_CloseSession(dec_context->hSession);
1458 if (rv != CKR_OK) {
1459 #ifdef DEBUG
1460 text->utils->log(text->utils->conn, SASL_LOG_DEBUG,
1461 "C_CloseSession failed:0x%.8X\n", rv);
1462 #endif
1463 }
1464 text->utils->free(dec_context);
1465 }
1466 text->cipher_enc_context = NULL;
1467 text->cipher_dec_context = NULL;
1468 }
1469
1470 static int
1471 dec_rc4_uef(context_t *text,
1472 const char *input,
1473 unsigned inputlen,
1474 unsigned char digest[16],
1475 char *output,
1476 unsigned *outputlen)
1477 {
1478 CK_RV rv;
1479 uef_context_t *dec_context =
1480 (uef_context_t *)text->cipher_dec_context;
1481 CK_ULONG ulDataLen = *outputlen - MAC_SIZE;
1482 CK_ULONG ulDigestLen = MAC_SIZE;
1483
1484 rv = C_DecryptUpdate(dec_context->hSession, (CK_BYTE_PTR)input,
1485 inputlen - MAC_SIZE, (CK_BYTE_PTR)output, &ulDataLen);
1486 if (rv != CKR_OK) {
1487 #ifdef DEBUG
1488 text->utils->log(text->utils->conn, SASL_LOG_DEBUG,
1489 "C_DecryptUpdate failed:0x%.8X\n", rv);
1490 #endif
1491 return SASL_FAIL;
1492 }
1493 *outputlen = (unsigned)ulDataLen;
1494
1495 rv = C_DecryptUpdate(dec_context->hSession,
1496 (CK_BYTE_PTR)input+(inputlen-MAC_SIZE), MAC_SIZE, (CK_BYTE_PTR)digest,
1497 &ulDigestLen);
1498 if (rv != CKR_OK || ulDigestLen != MAC_SIZE) {
1499 #ifdef DEBUG
1500 text->utils->log(text->utils->conn, SASL_LOG_DEBUG,
1501 "C_DecryptUpdate:0x%.8X, digestLen:%d\n",
1502 rv, ulDigestLen);
1503 #endif
1504 return SASL_FAIL;
1505 }
1506
1507 return SASL_OK;
1508 }
1509
1510 static int
1511 enc_rc4_uef(context_t *text,
1512 const char *input,
1513 unsigned inputlen,
1514 unsigned char digest[16],
1515 char *output,
1516 unsigned *outputlen)
1517 {
1518 CK_RV rv;
1519 uef_context_t *enc_context =
1520 (uef_context_t *)text->cipher_enc_context;
1521 CK_ULONG ulDataLen = inputlen;
1522 CK_ULONG ulDigestLen = MAC_SIZE;
1523
1524 rv = C_EncryptUpdate(enc_context->hSession, (CK_BYTE_PTR)input, inputlen,
1525 (CK_BYTE_PTR)output, &ulDataLen);
1526 if (rv != CKR_OK) {
1527 #ifdef DEBUG
1528 text->utils->log(text->utils->conn, SASL_LOG_DEBUG,
1529 "C_EncryptUpdate failed: 0x%.8X "
1530 "inputlen:%d outputlen:%d\n",
1531 rv, inputlen, ulDataLen);
1532 #endif
1533 return SASL_FAIL;
1534 }
1535 rv = C_EncryptUpdate(enc_context->hSession, (CK_BYTE_PTR)digest, MAC_SIZE,
1536 (CK_BYTE_PTR)output + inputlen, &ulDigestLen);
1537 if (rv != CKR_OK) {
1538 #ifdef DEBUG
1539 text->utils->log(text->utils->conn, SASL_LOG_DEBUG,
1540 "C_EncryptUpdate failed: 0x%.8X ulDigestLen:%d\n",
1541 rv, ulDigestLen);
1542 #endif
1543 return SASL_FAIL;
1544 }
1545
1546 *outputlen = ulDataLen + ulDigestLen;
1547
1548 return SASL_OK;
1549 }
1550
1551 static int
1552 dec_des_uef(context_t *text,
1553 const char *input,
1554 unsigned inputlen,
1555 unsigned char digest[16],
1556 char *output,
1557 unsigned *outputlen)
1558 {
1559 CK_RV rv;
1560 uef_context_t *dec_context =
1561 (uef_context_t *)text->cipher_dec_context;
1562 CK_ULONG ulDataLen = inputlen;
1563 int padding, p;
1564
1565 rv = C_DecryptUpdate(dec_context->hSession, (CK_BYTE_PTR)input,
1566 inputlen, (CK_BYTE_PTR)output, &ulDataLen);
1567 if (rv != CKR_OK) {
1568 #ifdef DEBUG
1569 text->utils->log(text->utils->conn, SASL_LOG_DEBUG,
1570 "C_DecryptUpdate failed:0x%.8X\n", rv);
1571 #endif
1572 return SASL_FAIL;
1573 }
1574 if (ulDataLen != inputlen) {
1575 #ifdef DEBUG
1576 text->utils->log(text->utils->conn, SASL_LOG_DEBUG,
1577 "C_DecryptUpdate unexpected data len:%d !=%d\n",
1578 inputlen, ulDataLen);
1579 #endif
1580 return SASL_BUFOVER;
1581 }
1582
1583 /* now chop off the padding */
1584 padding = output[inputlen - 11];
1585 if (padding < 1 || padding > 8) {
1586 /* invalid padding length */
1587 return SASL_BADMAC;
1588 }
1589 /* verify all padding is correct */
1590 for (p = 1; p <= padding; p++) {
1591 if (output[inputlen - MAC_SIZE - p] != padding) {
1592 return SASL_BADMAC;
1593 }
1594 }
1595
1596 /* chop off the padding */
1597 *outputlen = inputlen - padding - MAC_SIZE;
1598
1599 /* copy in the HMAC to digest */
1600 memcpy(digest, output + inputlen - MAC_SIZE, MAC_SIZE);
1601
1602 return SASL_OK;
1603 }
1604
1605 static int
1606 enc_des_uef(context_t *text,
1607 const char *input,
1608 unsigned inputlen,
1609 unsigned char digest[16],
1610 char *output,
1611 unsigned *outputlen)
1612 {
1613 CK_RV rv;
1614 uef_context_t *enc_context =
1615 (uef_context_t *)text->cipher_enc_context;
1616 CK_ULONG ulDataLen;
1617 int paddinglen;
1618
1619 /* determine padding length */
1620 paddinglen = 8 - ((inputlen + MAC_SIZE) % 8);
1621
1622 /* now construct the full stuff to be ciphered */
1623 memcpy(output, input, inputlen); /* text */
1624 memset(output+inputlen, paddinglen, paddinglen);/* pad */
1625 memcpy(output+inputlen+paddinglen, digest, MAC_SIZE); /* hmac */
1626
1627 ulDataLen=inputlen+paddinglen+MAC_SIZE;
1628
1629 rv = C_EncryptUpdate(enc_context->hSession, (CK_BYTE_PTR)output, ulDataLen,
1630 (CK_BYTE_PTR)output, &ulDataLen);
1631 if (rv != CKR_OK) {
1632 #ifdef DEBUG
1633 text->utils->log(text->utils->conn, SASL_LOG_DEBUG,
1634 "C_EncryptUpdate failed: 0x%.8X "
1635 "inputlen:%d outputlen:%d\n",
1636 rv, ulDataLen, ulDataLen);
1637 #endif
1638 return SASL_FAIL;
1639 }
1640 *outputlen = (unsigned)ulDataLen;
1641
1642 return SASL_OK;
1643 }
1644
1645 struct digest_cipher uef_ciphers[] =
1646 {
1647 { "rc4-40", 40, 5, 0x01, &enc_rc4_uef, &dec_rc4_uef, &init_rc4_uef,
1648 &free_uef },
1649 { "rc4-56", 56, 7, 0x02, &enc_rc4_uef, &dec_rc4_uef, &init_rc4_uef,
1650 &free_uef },
1651 { "rc4", 128, 16, 0x04, &enc_rc4_uef, &dec_rc4_uef, &init_rc4_uef,
1652 &free_uef },
1653 { "des", 55, 16, 0x08, &enc_des_uef, &dec_des_uef, &init_des_uef,
1654 &free_uef },
1655 { "3des", 112, 16, 0x10, &enc_des_uef, &dec_des_uef, &init_3des_uef,
1656 &free_uef },
1657 { NULL, 0, 0, 0, NULL, NULL, NULL, NULL }
1658 };
1659
1660 struct digest_cipher *available_ciphers1 = uef_ciphers;
1661 #endif /* USE_UEF */
1662
1663 static int create_layer_keys(context_t *text,
1664 const sasl_utils_t *utils,
1665 HASH key, int keylen,
1666 char enckey[16], char deckey[16])
1667 {
1668 MD5_CTX Md5Ctx;
1669
1670 utils->MD5Init(&Md5Ctx);
1671 utils->MD5Update(&Md5Ctx, key, keylen);
1672 if (text->i_am == SERVER) {
1673 utils->MD5Update(&Md5Ctx, (const unsigned char *) SEALING_SERVER_CLIENT,
1674 strlen(SEALING_SERVER_CLIENT));
1675 } else {
1676 utils->MD5Update(&Md5Ctx, (const unsigned char *) SEALING_CLIENT_SERVER,
1677 strlen(SEALING_CLIENT_SERVER));
1678 }
1679 utils->MD5Final((unsigned char *) enckey, &Md5Ctx);
1680
1681 utils->MD5Init(&Md5Ctx);
1682 utils->MD5Update(&Md5Ctx, key, keylen);
1683 if (text->i_am != SERVER) {
1684 utils->MD5Update(&Md5Ctx, (const unsigned char *)SEALING_SERVER_CLIENT,
1685 strlen(SEALING_SERVER_CLIENT));
1686 } else {
1687 utils->MD5Update(&Md5Ctx, (const unsigned char *)SEALING_CLIENT_SERVER,
1688 strlen(SEALING_CLIENT_SERVER));
1689 }
1690 utils->MD5Final((unsigned char *) deckey, &Md5Ctx);
1691
1692 /* create integrity keys */
1693 /* sending */
1694 utils->MD5Init(&Md5Ctx);
1695 utils->MD5Update(&Md5Ctx, text->HA1, HASHLEN);
1696 if (text->i_am == SERVER) {
1697 utils->MD5Update(&Md5Ctx, (const unsigned char *)SIGNING_SERVER_CLIENT,
1698 strlen(SIGNING_SERVER_CLIENT));
1699 } else {
1700 utils->MD5Update(&Md5Ctx, (const unsigned char *)SIGNING_CLIENT_SERVER,
1701 strlen(SIGNING_CLIENT_SERVER));
1702 }
1703 utils->MD5Final(text->Ki_send, &Md5Ctx);
1704
1705 /* receiving */
1706 utils->MD5Init(&Md5Ctx);
1707 utils->MD5Update(&Md5Ctx, text->HA1, HASHLEN);
1708 if (text->i_am != SERVER) {
1709 utils->MD5Update(&Md5Ctx, (const unsigned char *)SIGNING_SERVER_CLIENT,
1710 strlen(SIGNING_SERVER_CLIENT));
1711 } else {
1712 utils->MD5Update(&Md5Ctx, (const unsigned char *)SIGNING_CLIENT_SERVER,
1713 strlen(SIGNING_CLIENT_SERVER));
1714 }
1715 utils->MD5Final(text->Ki_receive, &Md5Ctx);
1716
1717 return SASL_OK;
1718 }
1719
1720 static const unsigned short version = 1;
1721
1722 /* len, CIPHER(Kc, {msg, pag, HMAC(ki, {SeqNum, msg})[0..9]}), x0001, SeqNum */
1723
1724 static int
1725 digestmd5_privacy_encode(void *context,
1726 const struct iovec *invec,
1727 unsigned numiov,
1728 const char **output,
1729 unsigned *outputlen)
1730 {
1731 context_t *text = (context_t *) context;
1732 int tmp;
1733 unsigned int tmpnum;
1734 unsigned short int tmpshort;
1735 int ret;
1736 char *out;
1737 unsigned char digest[16];
1738 struct buffer_info *inblob, bufinfo;
1739
1740 if(!context || !invec || !numiov || !output || !outputlen) {
1741 PARAMERROR(text->utils);
1742 return SASL_BADPARAM;
1743 }
1744
1745 if (numiov > 1) {
1746 ret = _plug_iovec_to_buf(text->utils, invec, numiov, &text->enc_in_buf);
1747 if (ret != SASL_OK) return ret;
1748 inblob = text->enc_in_buf;
1749 } else {
1750 /* avoid the data copy */
1751 bufinfo.data = invec[0].iov_base;
1752 bufinfo.curlen = invec[0].iov_len;
1753 inblob = &bufinfo;
1754 }
1755
1756 /* make sure the output buffer is big enough for this blob */
1757 ret = _plug_buf_alloc(text->utils, &(text->encode_buf),
1758 &(text->encode_buf_len),
1759 (4 + /* for length */
1760 inblob->curlen + /* for content */
1761 10 + /* for MAC */
1762 8 + /* maximum pad */
1763 6 + /* for padding */
1764 1)); /* trailing null */
1765 if(ret != SASL_OK) return ret;
1766
1767 /* skip by the length for now */
1768 out = (text->encode_buf)+4;
1769
1770 /* construct (seqnum, msg) */
1771 /* We can just use the output buffer because it's big enough */
1772 tmpnum = htonl(text->seqnum);
1773 memcpy(text->encode_buf, &tmpnum, 4);
1774 memcpy(text->encode_buf + 4, inblob->data, inblob->curlen);
1775
1776 /* HMAC(ki, (seqnum, msg) ) */
1777 text->utils->hmac_md5((const unsigned char *) text->encode_buf,
1778 inblob->curlen + 4,
1779 text->Ki_send, HASHLEN, digest);
1780
1781 /* calculate the encrypted part */
1782 text->cipher_enc(text, inblob->data, inblob->curlen,
1783 digest, out, outputlen);
1784 out+=(*outputlen);
1785
1786 /* copy in version */
1787 tmpshort = htons(version);
1788 memcpy(out, &tmpshort, 2); /* 2 bytes = version */
1789
1790 out+=2;
1791 (*outputlen)+=2; /* for version */
1792
1793 /* put in seqnum */
1794 tmpnum = htonl(text->seqnum);
1795 memcpy(out, &tmpnum, 4); /* 4 bytes = seq # */
1796
1797 (*outputlen)+=4; /* for seqnum */
1798
1799 /* put the 1st 4 bytes in */
1800 tmp=htonl(*outputlen);
1801 memcpy(text->encode_buf, &tmp, 4);
1802
1803 (*outputlen)+=4;
1804
1805 *output = text->encode_buf;
1806 text->seqnum++;
1807
1808 return SASL_OK;
1809 }
1810
1811 static int
1812 digestmd5_privacy_decode_once(void *context,
1813 const char **input,
1814 unsigned *inputlen,
1815 char **output,
1816 unsigned *outputlen)
1817 {
1818 context_t *text = (context_t *) context;
1819 unsigned int tocopy;
1820 unsigned diff;
1821 int result;
1822 unsigned char digest[16];
1823 int tmpnum;
1824 int lup;
1825
1826 if (text->needsize>0) /* 4 bytes for how long message is */
1827 {
1828 /* if less than 4 bytes just copy those we have into text->size */
1829 if (*inputlen<4)
1830 tocopy=*inputlen;
1831 else
1832 tocopy=4;
1833
1834 if (tocopy>text->needsize)
1835 tocopy=text->needsize;
1836
1837 memcpy(text->sizebuf+4-text->needsize, *input, tocopy);
1838 text->needsize-=tocopy;
1839
1840 *input+=tocopy;
1841 *inputlen-=tocopy;
1842
1843 if (text->needsize==0) /* got all of size */
1844 {
1845 memcpy(&(text->size), text->sizebuf, 4);
1846 text->cursize=0;
1847 text->size=ntohl(text->size);
1848
1849 if (text->size > text->in_maxbuf) {
1850 return SASL_FAIL; /* too big probably error */
1851 }
1852
1853 if(!text->buffer)
1854 text->buffer=text->utils->malloc(text->size+5);
1855 else
1856 text->buffer=text->utils->realloc(text->buffer,
1857 text->size+5);
1858 if (text->buffer == NULL) return SASL_NOMEM;
1859 }
1860
1861 *outputlen=0;
1862 *output=NULL;
1863 if (*inputlen==0) /* have to wait until next time for data */
1864 return SASL_OK;
1865
1866 if (text->size==0) /* should never happen */
1867 return SASL_FAIL;
1868 }
1869
1870 diff=text->size - text->cursize; /* bytes need for full message */
1871
1872 if (! text->buffer)
1873 return SASL_FAIL;
1874
1875 if (*inputlen < diff) /* not enough for a decode */
1876 {
1877 memcpy(text->buffer+text->cursize, *input, *inputlen);
1878 text->cursize+=*inputlen;
1879 *inputlen=0;
1880 *outputlen=0;
1881 *output=NULL;
1882 return SASL_OK;
1883 } else {
1884 memcpy(text->buffer+text->cursize, *input, diff);
1885 *input+=diff;
1886 *inputlen-=diff;
1887 }
1888
1889 {
1890 unsigned short ver;
1891 unsigned int seqnum;
1892 unsigned char checkdigest[16];
1893
1894 result = _plug_buf_alloc(text->utils, &text->decode_once_buf,
1895 &text->decode_once_buf_len,
1896 text->size-6);
1897 if (result != SASL_OK)
1898 return result;
1899
1900 *output = text->decode_once_buf;
1901 *outputlen = *inputlen;
1902
1903 result=text->cipher_dec(text,text->buffer,text->size-6,digest,
1904 *output, outputlen);
1905
1906 if (result!=SASL_OK)
1907 return result;
1908
1909 {
1910 int i;
1911 for(i=10; i; i--) {
1912 memcpy(&ver, text->buffer+text->size-i,2);
1913 ver=ntohs(ver);
1914 }
1915 }
1916
1917 /* check the version number */
1918 memcpy(&ver, text->buffer+text->size-6, 2);
1919 ver=ntohs(ver);
1920 if (ver != version)
1921 {
1922 #ifdef _INTEGRATED_SOLARIS_
1923 text->utils->seterror(text->utils->conn, 0,
1924 gettext("Wrong Version"));
1925 #else
1926 text->utils->seterror(text->utils->conn, 0, "Wrong Version");
1927 #endif /* _INTEGRATED_SOLARIS_ */
1928 return SASL_FAIL;
1929 }
1930
1931 /* check the CMAC */
1932
1933 /* construct (seqnum, msg) */
1934 result = _plug_buf_alloc(text->utils, &text->decode_tmp_buf,
1935 &text->decode_tmp_buf_len, *outputlen + 4);
1936 if(result != SASL_OK) return result;
1937
1938 tmpnum = htonl(text->rec_seqnum);
1939 memcpy(text->decode_tmp_buf, &tmpnum, 4);
1940 memcpy(text->decode_tmp_buf + 4, *output, *outputlen);
1941
1942 /* HMAC(ki, (seqnum, msg) ) */
1943 text->utils->hmac_md5((const unsigned char *) text->decode_tmp_buf,
1944 (*outputlen) + 4,
1945 text->Ki_receive, HASHLEN, checkdigest);
1946
1947 /* now check it */
1948 for (lup=0;lup<10;lup++)
1949 if (checkdigest[lup]!=digest[lup])
1950 {
1951 #ifdef _SUN_SDK_
1952 text->utils->log(text->utils->conn, SASL_LOG_ERR,
1953 "CMAC doesn't match at byte %d!", lup);
1954 return SASL_BADMAC;
1955 #else
1956 text->utils->seterror(text->utils->conn, 0,
1957 "CMAC doesn't match at byte %d!", lup);
1958 return SASL_FAIL;
1959 #endif /* _SUN_SDK_ */
1960 }
1961
1962 /* check the sequence number */
1963 memcpy(&seqnum, text->buffer+text->size-4,4);
1964 seqnum=ntohl(seqnum);
1965
1966 if (seqnum!=text->rec_seqnum)
1967 {
1968 #ifdef _SUN_SDK_
1969 text->utils->log(text->utils->conn, SASL_LOG_ERR,
1970 "Incorrect Sequence Number");
1971 #else
1972 text->utils->seterror(text->utils->conn, 0,
1973 "Incorrect Sequence Number");
1974 #endif /* _SUN_SDK_ */
1975 return SASL_FAIL;
1976 }
1977
1978 text->rec_seqnum++; /* now increment it */
1979 }
1980
1981 text->needsize=4;
1982
1983 return SASL_OK;
1984 }
1985
1986 static int digestmd5_privacy_decode(void *context,
1987 const char *input, unsigned inputlen,
1988 const char **output, unsigned *outputlen)
1989 {
1990 context_t *text = (context_t *) context;
1991 int ret;
1992
1993 ret = _plug_decode(text->utils, context, input, inputlen,
1994 &text->decode_buf, &text->decode_buf_len, outputlen,
1995 digestmd5_privacy_decode_once);
1996
1997 *output = text->decode_buf;
1998
1999 return ret;
2000 }
2001
2002 static int
2003 digestmd5_integrity_encode(void *context,
2004 const struct iovec *invec,
2005 unsigned numiov,
2006 const char **output,
2007 unsigned *outputlen)
2008 {
2009 context_t *text = (context_t *) context;
2010 unsigned char MAC[16];
2011 unsigned int tmpnum;
2012 unsigned short int tmpshort;
2013 struct buffer_info *inblob, bufinfo;
2014 int ret;
2015
2016 if(!context || !invec || !numiov || !output || !outputlen) {
2017 PARAMERROR( text->utils );
2018 return SASL_BADPARAM;
2019 }
2020
2021 if (numiov > 1) {
2022 ret = _plug_iovec_to_buf(text->utils, invec, numiov,
2023 &text->enc_in_buf);
2024 if (ret != SASL_OK) return ret;
2025 inblob = text->enc_in_buf;
2026 } else {
2027 /* avoid the data copy */
2028 bufinfo.data = invec[0].iov_base;
2029 bufinfo.curlen = invec[0].iov_len;
2030 inblob = &bufinfo;
2031 }
2032
2033 /* construct output */
2034 *outputlen = 4 + inblob->curlen + 16;
2035
2036 ret = _plug_buf_alloc(text->utils, &(text->encode_buf),
2037 &(text->encode_buf_len), *outputlen);
2038 if(ret != SASL_OK) return ret;
2039
2040 /* construct (seqnum, msg) */
2041 /* we can just use the output buffer */
2042 tmpnum = htonl(text->seqnum);
2043 memcpy(text->encode_buf, &tmpnum, 4);
2044 memcpy(text->encode_buf + 4, inblob->data, inblob->curlen);
2045
2046 /* HMAC(ki, (seqnum, msg) ) */
2047 #ifdef _SUN_SDK_
2048 text->utils->hmac_md5((unsigned char *)text->encode_buf,
2049 inblob->curlen + 4,
2050 text->Ki_send, HASHLEN, MAC);
2051 #else
2052 text->utils->hmac_md5(text->encode_buf, inblob->curlen + 4,
2053 text->Ki_send, HASHLEN, MAC);
2054 #endif /* _SUN_SDK_ */
2055
2056 /* create MAC */
2057 tmpshort = htons(version);
2058 memcpy(MAC + 10, &tmpshort, MAC_OFFS); /* 2 bytes = version */
2059
2060 tmpnum = htonl(text->seqnum);
2061 memcpy(MAC + 12, &tmpnum, 4); /* 4 bytes = sequence number */
2062
2063 /* copy into output */
2064 tmpnum = htonl((*outputlen) - 4);
2065
2066 /* length of message in network byte order */
2067 memcpy(text->encode_buf, &tmpnum, 4);
2068 /* the message text */
2069 memcpy(text->encode_buf + 4, inblob->data, inblob->curlen);
2070 /* the MAC */
2071 memcpy(text->encode_buf + 4 + inblob->curlen, MAC, 16);
2072
2073 text->seqnum++; /* add one to sequence number */
2074
2075 *output = text->encode_buf;
2076
2077 return SASL_OK;
2078 }
2079
2080 static int
2081 create_MAC(context_t * text,
2082 char *input,
2083 int inputlen,
2084 int seqnum,
2085 unsigned char MAC[16])
2086 {
2087 unsigned int tmpnum;
2088 unsigned short int tmpshort;
2089 int ret;
2090
2091 if (inputlen < 0)
2092 return SASL_FAIL;
2093
2094 ret = _plug_buf_alloc(text->utils, &(text->MAC_buf),
2095 &(text->MAC_buf_len), inputlen + 4);
2096 if(ret != SASL_OK) return ret;
2097
2098 /* construct (seqnum, msg) */
2099 tmpnum = htonl(seqnum);
2100 memcpy(text->MAC_buf, &tmpnum, 4);
2101 memcpy(text->MAC_buf + 4, input, inputlen);
2102
2103 /* HMAC(ki, (seqnum, msg) ) */
2104 #ifdef _SUN_SDK_
2105 text->utils->hmac_md5((unsigned char *)text->MAC_buf, inputlen + 4,
2106 text->Ki_receive, HASHLEN,
2107 MAC);
2108 #else
2109 text->utils->hmac_md5(text->MAC_buf, inputlen + 4,
2110 text->Ki_receive, HASHLEN,
2111 MAC);
2112 #endif /* _SUN_SDK_ */
2113
2114 /* create MAC */
2115 tmpshort = htons(version);
2116 memcpy(MAC + 10, &tmpshort, 2); /* 2 bytes = version */
2117
2118 tmpnum = htonl(seqnum);
2119 memcpy(MAC + 12, &tmpnum, 4); /* 4 bytes = sequence number */
2120
2121 return SASL_OK;
2122 }
2123
2124 static int
2125 check_integrity(context_t * text,
2126 char *buf, int bufsize,
2127 char **output, unsigned *outputlen)
2128 {
2129 unsigned char MAC[16];
2130 int result;
2131
2132 result = create_MAC(text, buf, bufsize - 16, text->rec_seqnum, MAC);
2133 if (result != SASL_OK)
2134 return result;
2135
2136 /* make sure the MAC is right */
2137 if (strncmp((char *) MAC, buf + bufsize - 16, 16) != 0)
2138 {
2139 #ifdef _SUN_SDK_
2140 text->utils->log(text->utils->conn, SASL_LOG_ERR,
2141 "MAC doesn't match");
2142 return SASL_BADMAC;
2143 #else
2144 text->utils->seterror(text->utils->conn, 0, "MAC doesn't match");
2145 return SASL_FAIL;
2146 #endif /* _SUN_SDK_ */
2147 }
2148
2149 text->rec_seqnum++;
2150
2151 /* ok make output message */
2152 result = _plug_buf_alloc(text->utils, &text->decode_once_buf,
2153 &text->decode_once_buf_len,
2154 bufsize - 15);
2155 if (result != SASL_OK)
2156 return result;
2157
2158 *output = text->decode_once_buf;
2159 memcpy(*output, buf, bufsize - 16);
2160 *outputlen = bufsize - 16;
2161 (*output)[*outputlen] = 0;
2162
2163 return SASL_OK;
2164 }
2165
2166 static int
2167 digestmd5_integrity_decode_once(void *context,
2168 const char **input,
2169 unsigned *inputlen,
2170 char **output,
2171 unsigned *outputlen)
2172 {
2173 context_t *text = (context_t *) context;
2174 unsigned int tocopy;
2175 unsigned diff;
2176 int result;
2177
2178 if (text->needsize > 0) { /* 4 bytes for how long message is */
2179 /*
2180 * if less than 4 bytes just copy those we have into text->size
2181 */
2182 if (*inputlen < 4)
2183 tocopy = *inputlen;
2184 else
2185 tocopy = 4;
2186
2187 if (tocopy > text->needsize)
2188 tocopy = text->needsize;
2189
2190 memcpy(text->sizebuf + 4 - text->needsize, *input, tocopy);
2191 text->needsize -= tocopy;
2192
2193 *input += tocopy;
2194 *inputlen -= tocopy;
2195
2196 if (text->needsize == 0) { /* got all of size */
2197 memcpy(&(text->size), text->sizebuf, 4);
2198 text->cursize = 0;
2199 text->size = ntohl(text->size);
2200
2201 if (text->size > text->in_maxbuf)
2202 return SASL_FAIL; /* too big probably error */
2203
2204 if(!text->buffer)
2205 text->buffer=text->utils->malloc(text->size+5);
2206 else
2207 text->buffer=text->utils->realloc(text->buffer,text->size+5);
2208 if (text->buffer == NULL) return SASL_NOMEM;
2209 }
2210 *outputlen = 0;
2211 *output = NULL;
2212 if (*inputlen == 0) /* have to wait until next time for data */
2213 return SASL_OK;
2214
2215 if (text->size == 0) /* should never happen */
2216 return SASL_FAIL;
2217 }
2218 diff = text->size - text->cursize; /* bytes need for full message */
2219
2220 if(! text->buffer)
2221 return SASL_FAIL;
2222
2223 if (*inputlen < diff) { /* not enough for a decode */
2224 memcpy(text->buffer + text->cursize, *input, *inputlen);
2225 text->cursize += *inputlen;
2226 *inputlen = 0;
2227 *outputlen = 0;
2228 *output = NULL;
2229 return SASL_OK;
2230 } else {
2231 memcpy(text->buffer + text->cursize, *input, diff);
2232 *input += diff;
2233 *inputlen -= diff;
2234 }
2235
2236 result = check_integrity(text, text->buffer, text->size,
2237 output, outputlen);
2238 if (result != SASL_OK)
2239 return result;
2240
2241 /* Reset State */
2242 text->needsize = 4;
2243
2244 return SASL_OK;
2245 }
2246
2247 static int digestmd5_integrity_decode(void *context,
2248 const char *input, unsigned inputlen,
2249 const char **output, unsigned *outputlen)
2250 {
2251 context_t *text = (context_t *) context;
2252 int ret;
2253
2254 ret = _plug_decode(text->utils, context, input, inputlen,
2255 &text->decode_buf, &text->decode_buf_len, outputlen,
2256 digestmd5_integrity_decode_once);
2257
2258 *output = text->decode_buf;
2259
2260 return ret;
2261 }
2262
2263 static void
2264 digestmd5_common_mech_dispose(void *conn_context, const sasl_utils_t *utils)
2265 {
2266 context_t *text = (context_t *) conn_context;
2267
2268 if (!text || !utils) return;
2269
2270 if (text->authid) utils->free(text->authid);
2271 if (text->realm) utils->free(text->realm);
2272 if (text->nonce) utils->free(text->nonce);
2273 if (text->cnonce) utils->free(text->cnonce);
2274
2275 if (text->cipher_free) text->cipher_free(text);
2276
2277 /* free the stuff in the context */
2278 if (text->response_value) utils->free(text->response_value);
2279
2280 if (text->buffer) utils->free(text->buffer);
2281 if (text->encode_buf) utils->free(text->encode_buf);
2282 if (text->decode_buf) utils->free(text->decode_buf);
2283 if (text->decode_once_buf) utils->free(text->decode_once_buf);
2284 if (text->decode_tmp_buf) utils->free(text->decode_tmp_buf);
2285 if (text->out_buf) utils->free(text->out_buf);
2286 if (text->MAC_buf) utils->free(text->MAC_buf);
2287
2288 if (text->enc_in_buf) {
2289 if (text->enc_in_buf->data) utils->free(text->enc_in_buf->data);
2290 utils->free(text->enc_in_buf);
2291 }
2292
2293 utils->free(conn_context);
2294 }
2295
2296 static void
2297 clear_reauth_entry(reauth_entry_t *reauth, enum Context_type type,
2298 const sasl_utils_t *utils)
2299 {
2300 if (!reauth) return;
2301
2302 if (reauth->authid) utils->free(reauth->authid);
2303 if (reauth->realm) utils->free(reauth->realm);
2304 if (reauth->nonce) utils->free(reauth->nonce);
2305 if (reauth->cnonce) utils->free(reauth->cnonce);
2306
2307 if (type == CLIENT) {
2308 if (reauth->u.c.serverFQDN) utils->free(reauth->u.c.serverFQDN);
2309 }
2310
2311 memset(reauth, 0, sizeof(reauth_entry_t));
2312 }
2313
2314 static void
2315 digestmd5_common_mech_free(void *glob_context, const sasl_utils_t *utils)
2316 {
2317 reauth_cache_t *reauth_cache = (reauth_cache_t *) glob_context;
2318 size_t n;
2319
2320 if (!reauth_cache) return;
2321
2322 for (n = 0; n < reauth_cache->size; n++)
2323 clear_reauth_entry(&reauth_cache->e[n], reauth_cache->i_am, utils);
2324 if (reauth_cache->e) utils->free(reauth_cache->e);
2325
2326 if (reauth_cache->mutex) utils->mutex_free(reauth_cache->mutex);
2327
2328 utils->free(reauth_cache);
2329 }
2330
2331 /***************************** Server Section *****************************/
2332
2333 typedef struct server_context {
2334 context_t common;
2335
2336 time_t timestamp;
2337 int stale; /* last nonce is stale */
2338 sasl_ssf_t limitssf, requiressf; /* application defined bounds */
2339 } server_context_t;
2340
2341 static void
2342 DigestCalcHA1FromSecret(context_t * text,
2343 const sasl_utils_t * utils,
2344 HASH HA1,
2345 unsigned char *authorization_id,
2346 unsigned char *pszNonce,
2347 unsigned char *pszCNonce,
2348 HASHHEX SessionKey)
2349 {
2350 MD5_CTX Md5Ctx;
2351
2352 /* calculate session key */
2353 utils->MD5Init(&Md5Ctx);
2354 utils->MD5Update(&Md5Ctx, HA1, HASHLEN);
2355 utils->MD5Update(&Md5Ctx, COLON, 1);
2356 utils->MD5Update(&Md5Ctx, pszNonce, strlen((char *) pszNonce));
2357 utils->MD5Update(&Md5Ctx, COLON, 1);
2358 utils->MD5Update(&Md5Ctx, pszCNonce, strlen((char *) pszCNonce));
2359 if (authorization_id != NULL) {
2360 utils->MD5Update(&Md5Ctx, COLON, 1);
2361 utils->MD5Update(&Md5Ctx, authorization_id, strlen((char *) authorization_id));
2362 }
2363 utils->MD5Final(HA1, &Md5Ctx);
2364
2365 CvtHex(HA1, SessionKey);
2366
2367
2368 /* save HA1 because we need it to make the privacy and integrity keys */
2369 memcpy(text->HA1, HA1, sizeof(HASH));
2370 }
2371
2372 static char *create_response(context_t * text,
2373 const sasl_utils_t * utils,
2374 unsigned char *nonce,
2375 unsigned int ncvalue,
2376 unsigned char *cnonce,
2377 char *qop,
2378 char *digesturi,
2379 HASH Secret,
2380 char *authorization_id,
2381 char **response_value)
2382 {
2383 HASHHEX SessionKey;
2384 HASHHEX HEntity = "00000000000000000000000000000000";
2385 HASHHEX Response;
2386 char *result;
2387
2388 if (qop == NULL)
2389 qop = "auth";
2390
2391 DigestCalcHA1FromSecret(text,
2392 utils,
2393 Secret,
2394 (unsigned char *) authorization_id,
2395 nonce,
2396 cnonce,
2397 SessionKey);
2398
2399 DigestCalcResponse(utils,
2400 SessionKey,/* H(A1) */
2401 nonce, /* nonce from server */
2402 ncvalue, /* 8 hex digits */
2403 cnonce, /* client nonce */
2404 (unsigned char *) qop, /* qop-value: "", "auth",
2405 * "auth-int" */
2406 (unsigned char *) digesturi, /* requested URL */
2407 (unsigned char *) "AUTHENTICATE",
2408 HEntity, /* H(entity body) if qop="auth-int" */
2409 Response /* request-digest or response-digest */
2410 );
2411
2412 result = utils->malloc(HASHHEXLEN + 1);
2413 #ifdef _SUN_SDK_
2414 if (result == NULL)
2415 return NULL;
2416 #endif /* _SUN_SDK_ */
2417 /* TODO */
2418 memcpy(result, Response, HASHHEXLEN);
2419 result[HASHHEXLEN] = 0;
2420
2421 /* response_value (used for reauth i think */
2422 if (response_value != NULL) {
2423 DigestCalcResponse(utils,
2424 SessionKey, /* H(A1) */
2425 nonce, /* nonce from server */
2426 ncvalue, /* 8 hex digits */
2427 cnonce, /* client nonce */
2428 (unsigned char *) qop, /* qop-value: "", "auth",
2429 * "auth-int" */
2430 (unsigned char *) digesturi, /* requested URL */
2431 NULL,
2432 HEntity, /* H(entity body) if qop="auth-int" */
2433 Response /* request-digest or response-digest */
2434 );
2435
2436 *response_value = utils->malloc(HASHHEXLEN + 1);
2437 if (*response_value == NULL)
2438 return NULL;
2439 memcpy(*response_value, Response, HASHHEXLEN);
2440 (*response_value)[HASHHEXLEN] = 0;
2441 }
2442 return result;
2443 }
2444
2445 static int
2446 get_server_realm(sasl_server_params_t * params,
2447 char **realm)
2448 {
2449 /* look at user realm first */
2450 if (params->user_realm != NULL) {
2451 if(params->user_realm[0] != '\0') {
2452 *realm = (char *) params->user_realm;
2453 } else {
2454 /* Catch improperly converted apps */
2455 #ifdef _SUN_SDK_
2456 params->utils->log(params->utils->conn, SASL_LOG_ERR,
2457 "user_realm is an empty string!");
2458 #else
2459 params->utils->seterror(params->utils->conn, 0,
2460 "user_realm is an empty string!");
2461 #endif /* _SUN_SDK_ */
2462 return SASL_BADPARAM;
2463 }
2464 } else if (params->serverFQDN != NULL) {
2465 *realm = (char *) params->serverFQDN;
2466 } else {
2467 #ifdef _SUN_SDK_
2468 params->utils->log(params->utils->conn, SASL_LOG_ERR,
2469 "no way to obtain domain");
2470 #else
2471 params->utils->seterror(params->utils->conn, 0,
2472 "no way to obtain domain");
2473 #endif /* _SUN_SDK_ */
2474 return SASL_FAIL;
2475 }
2476
2477 return SASL_OK;
2478 }
2479
2480 /*
2481 * Convert hex string to int
2482 */
2483 static int htoi(unsigned char *hexin, unsigned int *res)
2484 {
2485 int lup, inlen;
2486 inlen = strlen((char *) hexin);
2487
2488 *res = 0;
2489 for (lup = 0; lup < inlen; lup++) {
2490 switch (hexin[lup]) {
2491 case '0':
2492 case '1':
2493 case '2':
2494 case '3':
2495 case '4':
2496 case '5':
2497 case '6':
2498 case '7':
2499 case '8':
2500 case '9':
2501 *res = (*res << 4) + (hexin[lup] - '0');
2502 break;
2503
2504 case 'a':
2505 case 'b':
2506 case 'c':
2507 case 'd':
2508 case 'e':
2509 case 'f':
2510 *res = (*res << 4) + (hexin[lup] - 'a' + 10);
2511 break;
2512
2513 case 'A':
2514 case 'B':
2515 case 'C':
2516 case 'D':
2517 case 'E':
2518 case 'F':
2519 *res = (*res << 4) + (hexin[lup] - 'A' + 10);
2520 break;
2521
2522 default:
2523 return SASL_BADPARAM;
2524 }
2525
2526 }
2527
2528 return SASL_OK;
2529 }
2530
2531 static int digestmd5_server_mech_new(void *glob_context,
2532 sasl_server_params_t * sparams,
2533 const char *challenge __attribute__((unused)),
2534 unsigned challen __attribute__((unused)),
2535 void **conn_context)
2536 {
2537 context_t *text;
2538
2539 /* holds state are in -- allocate server size */
2540 text = sparams->utils->malloc(sizeof(server_context_t));
2541 if (text == NULL)
2542 return SASL_NOMEM;
2543 memset(text, 0, sizeof(server_context_t));
2544
2545 text->state = 1;
2546 text->i_am = SERVER;
2547 text->reauth = glob_context;
2548
2549 *conn_context = text;
2550 return SASL_OK;
2551 }
2552
2553 static int
2554 digestmd5_server_mech_step1(server_context_t *stext,
2555 sasl_server_params_t *sparams,
2556 const char *clientin __attribute__((unused)),
2557 unsigned clientinlen __attribute__((unused)),
2558 const char **serverout,
2559 unsigned *serveroutlen,
2560 sasl_out_params_t * oparams __attribute__((unused)))
2561 {
2562 context_t *text = (context_t *) stext;
2563 int result;
2564 char *realm;
2565 unsigned char *nonce;
2566 char *charset = "utf-8";
2567 char qop[1024], cipheropts[1024];
2568 struct digest_cipher *cipher;
2569 unsigned resplen;
2570 int added_conf = 0;
2571 char maxbufstr[64];
2572
2573 sparams->utils->log(sparams->utils->conn, SASL_LOG_DEBUG,
2574 "DIGEST-MD5 server step 1");
2575
2576 /* get realm */
2577 result = get_server_realm(sparams, &realm);
2578 if(result != SASL_OK) return result;
2579
2580 /* what options should we offer the client? */
2581 qop[0] = '\0';
2582 cipheropts[0] = '\0';
2583 if (stext->requiressf == 0) {
2584 if (*qop) strcat(qop, ",");
2585 strcat(qop, "auth");
2586 }
2587 if (stext->requiressf <= 1 && stext->limitssf >= 1) {
2588 if (*qop) strcat(qop, ",");
2589 strcat(qop, "auth-int");
2590 }
2591
2592 #ifdef USE_UEF_SERVER
2593 cipher = available_ciphers1;
2594 #else
2595 cipher = available_ciphers;
2596 #endif
2597 while (cipher->name) {
2598 /* do we allow this particular cipher? */
2599 if (stext->requiressf <= cipher->ssf &&
2600 stext->limitssf >= cipher->ssf) {
2601 if (!added_conf) {
2602 if (*qop) strcat(qop, ",");
2603 strcat(qop, "auth-conf");
2604 added_conf = 1;
2605 }
2606 #ifdef _SUN_SDK_
2607 if(strlen(cipheropts) + strlen(cipher->name) + 1 >=
2608 sizeof (cipheropts)) {
2609 sparams->utils->log(sparams->utils->conn, SASL_LOG_ERR,
2610 "internal error: cipheropts too big");
2611 return SASL_FAIL;
2612 }
2613 #endif /* _SUN_SDK_ */
2614 if (*cipheropts) strcat(cipheropts, ",");
2615 strcat(cipheropts, cipher->name);
2616 }
2617 cipher++;
2618 }
2619
2620 if (*qop == '\0') {
2621 /* we didn't allow anything?!? we'll return SASL_TOOWEAK, since
2622 that's close enough */
2623 return SASL_TOOWEAK;
2624 }
2625
2626 /*
2627 * digest-challenge = 1#( realm | nonce | qop-options | stale | maxbuf |
2628 * charset | cipher-opts | auth-param )
2629 */
2630
2631 #ifndef _SUN_SDK_
2632 /* FIXME: get nonce XXX have to clean up after self if fail */
2633 #endif /* !_SUN_SDK_ */
2634 nonce = create_nonce(sparams->utils);
2635 if (nonce == NULL) {
2636 #ifdef _SUN_SDK_
2637 /* Note typo below */
2638 sparams->utils->log(sparams->utils->conn, SASL_LOG_ERR,
2639 "internal error: failed creating a nonce");
2640 #else
2641 SETERROR(sparams->utils, "internal erorr: failed creating a nonce");
2642 #endif /* _SUN_SDK_ */
2643 return SASL_FAIL;
2644 }
2645
2646 #ifdef _SUN_SDK_
2647 resplen = strlen((char *)nonce) + strlen("nonce") + 5;
2648 #else
2649 resplen = strlen(nonce) + strlen("nonce") + 5;
2650 #endif /* _SUN_SDK_ */
2651 result = _plug_buf_alloc(sparams->utils, &(text->out_buf),
2652 &(text->out_buf_len), resplen);
2653 #ifdef _SUN_SDK_
2654 if(result != SASL_OK) {
2655 sparams->utils->free(nonce);
2656 return result;
2657 }
2658 #else
2659 if(result != SASL_OK) return result;
2660 #endif /* _SUN_SDK_ */
2661
2662 sprintf(text->out_buf, "nonce=\"%s\"", nonce);
2663
2664 /* add to challenge; if we chose not to specify a realm, we won't
2665 * send one to the client */
2666 if (realm && add_to_challenge(sparams->utils,
2667 &text->out_buf, &text->out_buf_len, &resplen,
2668 "realm", (unsigned char *) realm,
2669 TRUE) != SASL_OK) {
2670 #ifdef _SUN_SDK_
2671 sparams->utils->log(sparams->utils->conn, SASL_LOG_ERR,
2672 "internal error: add_to_challenge failed");
2673 sparams->utils->free(nonce);
2674 #else
2675 SETERROR(sparams->utils, "internal error: add_to_challenge failed");
2676 #endif /* _SUN_SDK_ */
2677 return SASL_FAIL;
2678 }
2679 /*
2680 * qop-options A quoted string of one or more tokens indicating the
2681 * "quality of protection" values supported by the server. The value
2682 * "auth" indicates authentication; the value "auth-int" indicates
2683 * authentication with integrity protection; the value "auth-conf"
2684 * indicates authentication with integrity protection and encryption.
2685 */
2686
2687 /* add qop to challenge */
2688 if (add_to_challenge(sparams->utils,
2689 &text->out_buf, &text->out_buf_len, &resplen,
2690 "qop",
2691 (unsigned char *) qop, TRUE) != SASL_OK) {
2692 #ifdef _SUN_SDK_
2693 sparams->utils->log(sparams->utils->conn, SASL_LOG_ERR,
2694 "internal error: add_to_challenge 3 failed");
2695 sparams->utils->free(nonce);
2696 #else
2697 SETERROR(sparams->utils, "internal error: add_to_challenge 3 failed");
2698 #endif /* _SUN_SDK_ */
2699 return SASL_FAIL;
2700 }
2701
2702 /*
2703 * Cipheropts - list of ciphers server supports
2704 */
2705 /* add cipher-opts to challenge; only add if there are some */
2706 if (strcmp(cipheropts,"")!=0)
2707 {
2708 if (add_to_challenge(sparams->utils,
2709 &text->out_buf, &text->out_buf_len, &resplen,
2710 "cipher", (unsigned char *) cipheropts,
2711 TRUE) != SASL_OK) {
2712 #ifdef _SUN_SDK_
2713 sparams->utils->log(sparams->utils->conn, SASL_LOG_ERR,
2714 "internal error: add_to_challenge 4 failed");
2715 sparams->utils->free(nonce);
2716 #else
2717 SETERROR(sparams->utils,
2718 "internal error: add_to_challenge 4 failed");
2719 #endif /* _SUN_SDK_ */
2720 return SASL_FAIL;
2721 }
2722 }
2723
2724 /* "stale" is true if a reauth failed because of a nonce timeout */
2725 if (stext->stale &&
2726 add_to_challenge(sparams->utils,
2727 &text->out_buf, &text->out_buf_len, &resplen,
2728 #ifdef _SUN_SDK_
2729 "stale", (unsigned char *)"true", FALSE) != SASL_OK) {
2730 sparams->utils->free(nonce);
2731 sparams->utils->log(sparams->utils->conn, SASL_LOG_ERR,
2732 "internal error: add_to_challenge failed");
2733 #else
2734 "stale", "true", FALSE) != SASL_OK) {
2735 SETERROR(sparams->utils, "internal error: add_to_challenge failed");
2736 #endif /* _SUN_SDK_ */
2737 return SASL_FAIL;
2738 }
2739
2740 /*
2741 * maxbuf A number indicating the size of the largest buffer the server
2742 * is able to receive when using "auth-int". If this directive is
2743 * missing, the default value is 65536. This directive may appear at most
2744 * once; if multiple instances are present, the client should abort the
2745 * authentication exchange.
2746 */
2747 if(sparams->props.maxbufsize) {
2748 snprintf(maxbufstr, sizeof(maxbufstr), "%d",
2749 sparams->props.maxbufsize);
2750 if (add_to_challenge(sparams->utils,
2751 &text->out_buf, &text->out_buf_len, &resplen,
2752 "maxbuf",
2753 (unsigned char *) maxbufstr, FALSE) != SASL_OK) {
2754 #ifdef _SUN_SDK_
2755 sparams->utils->log(sparams->utils->conn, SASL_LOG_ERR,
2756 "internal error: add_to_challenge 5 failed");
2757 #else
2758 SETERROR(sparams->utils,
2759 "internal error: add_to_challenge 5 failed");
2760 #endif /* _SUN_SDK_ */
2761 return SASL_FAIL;
2762 }
2763 }
2764
2765
2766 if (add_to_challenge(sparams->utils,
2767 &text->out_buf, &text->out_buf_len, &resplen,
2768 "charset",
2769 (unsigned char *) charset, FALSE) != SASL_OK) {
2770 #ifdef _SUN_SDK_
2771 sparams->utils->log(sparams->utils->conn, SASL_LOG_ERR,
2772 "internal error: add_to_challenge 6 failed");
2773 sparams->utils->free(nonce);
2774 #else
2775 SETERROR(sparams->utils, "internal error: add_to_challenge 6 failed");
2776 #endif /* _SUN_SDK_ */
2777 return SASL_FAIL;
2778 }
2779
2780
2781 /*
2782 * algorithm
2783 * This directive is required for backwards compatibility with HTTP
2784 * Digest., which supports other algorithms. . This directive is
2785 * required and MUST appear exactly once; if not present, or if multiple
2786 * instances are present, the client should abort the authentication
2787 * exchange.
2788 *
2789 * algorithm = "algorithm" "=" "md5-sess"
2790 */
2791
2792 if (add_to_challenge(sparams->utils,
2793 &text->out_buf, &text->out_buf_len, &resplen,
2794 "algorithm",
2795 (unsigned char *) "md5-sess", FALSE)!=SASL_OK) {
2796 #ifdef _SUN_SDK_
2797 sparams->utils->log(sparams->utils->conn, SASL_LOG_ERR,
2798 "internal error: add_to_challenge 7 failed");
2799 sparams->utils->free(nonce);
2800 #else
2801 SETERROR(sparams->utils, "internal error: add_to_challenge 7 failed");
2802 #endif /* _SUN_SDK_ */
2803 return SASL_FAIL;
2804 }
2805
2806 /*
2807 * The size of a digest-challenge MUST be less than 2048 bytes!!!
2808 */
2809 if (*serveroutlen > 2048) {
2810 #ifdef _SUN_SDK_
2811 sparams->utils->free(nonce);
2812 sparams->utils->log(sparams->utils->conn, SASL_LOG_ERR,
2813 "internal error: challenge larger than 2048 bytes");
2814 #else
2815 SETERROR(sparams->utils,
2816 "internal error: challenge larger than 2048 bytes");
2817 #endif /* _SUN_SDK_ */
2818 return SASL_FAIL;
2819 }
2820
2821 text->authid = NULL;
2822 _plug_strdup(sparams->utils, realm, &text->realm, NULL);
2823 text->nonce = nonce;
2824 text->nonce_count = 1;
2825 text->cnonce = NULL;
2826 stext->timestamp = time(0);
2827
2828 *serveroutlen = strlen(text->out_buf);
2829 *serverout = text->out_buf;
2830
2831 text->state = 2;
2832
2833 return SASL_CONTINUE;
2834 }
2835
2836 static int
2837 digestmd5_server_mech_step2(server_context_t *stext,
2838 sasl_server_params_t *sparams,
2839 const char *clientin,
2840 unsigned clientinlen,
2841 const char **serverout,
2842 unsigned *serveroutlen,
2843 sasl_out_params_t * oparams)
2844 {
2845 context_t *text = (context_t *) stext;
2846 /* verify digest */
2847 sasl_secret_t *sec = NULL;
2848 int result;
2849 char *serverresponse = NULL;
2850 char *username = NULL;
2851 char *authorization_id = NULL;
2852 char *realm = NULL;
2853 unsigned char *nonce = NULL, *cnonce = NULL;
2854 unsigned int noncecount = 0;
2855 char *qop = NULL;
2856 char *digesturi = NULL;
2857 char *response = NULL;
2858
2859 /* setting the default value (65536) */
2860 unsigned int client_maxbuf = 65536;
2861 int maxbuf_count = 0; /* How many maxbuf instaces was found */
2862
2863 char *charset = NULL;
2864 char *cipher = NULL;
2865 unsigned int n=0;
2866
2867 HASH A1;
2868
2869 /* password prop_request */
2870 const char *password_request[] = { SASL_AUX_PASSWORD,
2871 "*cmusaslsecretDIGEST-MD5",
2872 NULL };
2873 unsigned len;
2874 struct propval auxprop_values[2];
2875
2876 /* can we mess with clientin? copy it to be safe */
2877 char *in_start = NULL;
2878 char *in = NULL;
2879
2880 sparams->utils->log(sparams->utils->conn, SASL_LOG_DEBUG,
2881 "DIGEST-MD5 server step 2");
2882
2883 in = sparams->utils->malloc(clientinlen + 1);
2884 #ifdef _SUN_SDK_
2885 if (!in) return SASL_NOMEM;
2886 #endif /* _SUN_SDK_ */
2887
2888 memcpy(in, clientin, clientinlen);
2889 in[clientinlen] = 0;
2890
2891 in_start = in;
2892
2893
2894 /* parse what we got */
2895 while (in[0] != '\0') {
2896 char *name = NULL, *value = NULL;
2897 get_pair(&in, &name, &value);
2898
2899 if (name == NULL)
2900 break;
2901
2902 /* Extracting parameters */
2903
2904 /*
2905 * digest-response = 1#( username | realm | nonce | cnonce |
2906 * nonce-count | qop | digest-uri | response | maxbuf | charset |
2907 * cipher | auth-param )
2908 */
2909
2910 if (strcasecmp(name, "username") == 0) {
2911 _plug_strdup(sparams->utils, value, &username, NULL);
2912 } else if (strcasecmp(name, "authzid") == 0) {
2913 _plug_strdup(sparams->utils, value, &authorization_id, NULL);
2914 } else if (strcasecmp(name, "cnonce") == 0) {
2915 _plug_strdup(sparams->utils, value, (char **) &cnonce, NULL);
2916 } else if (strcasecmp(name, "nc") == 0) {
2917 if (htoi((unsigned char *) value, &noncecount) != SASL_OK) {
2918 #ifdef _SUN_SDK_
2919 sparams->utils->log(sparams->utils->conn, SASL_LOG_ERR,
2920 "error converting hex to int");
2921 #else
2922 SETERROR(sparams->utils,
2923 "error converting hex to int");
2924 #endif /* _SUN_SDK_ */
2925 result = SASL_BADAUTH;
2926 goto FreeAllMem;
2927 }
2928 } else if (strcasecmp(name, "realm") == 0) {
2929 if (realm) {
2930 #ifdef _SUN_SDK_
2931 sparams->utils->log(sparams->utils->conn, SASL_LOG_ERR,
2932 "duplicate realm: authentication aborted");
2933 #else
2934 SETERROR(sparams->utils,
2935 "duplicate realm: authentication aborted");
2936 #endif /* _SUN_SDK_ */
2937 result = SASL_FAIL;
2938 goto FreeAllMem;
2939 }
2940 _plug_strdup(sparams->utils, value, &realm, NULL);
2941 } else if (strcasecmp(name, "nonce") == 0) {
2942 _plug_strdup(sparams->utils, value, (char **) &nonce, NULL);
2943 } else if (strcasecmp(name, "qop") == 0) {
2944 _plug_strdup(sparams->utils, value, &qop, NULL);
2945 } else if (strcasecmp(name, "digest-uri") == 0) {
2946 size_t service_len;
2947
2948 /*
2949 * digest-uri-value = serv-type "/" host [ "/" serv-name ]
2950 */
2951
2952 _plug_strdup(sparams->utils, value, &digesturi, NULL);
2953
2954 /* verify digest-uri format */
2955
2956 /* make sure it's the service that we're expecting */
2957 service_len = strlen(sparams->service);
2958 if (strncasecmp(digesturi, sparams->service, service_len) ||
2959 digesturi[service_len] != '/') {
2960 result = SASL_BADAUTH;
2961 #ifdef _SUN_SDK_
2962 sparams->utils->log(sparams->utils->conn, SASL_LOG_ERR,
2963 "bad digest-uri: doesn't match service");
2964 #else
2965 SETERROR(sparams->utils,
2966 "bad digest-uri: doesn't match service");
2967 #endif /* _SUN_SDK_ */
2968 goto FreeAllMem;
2969 }
2970
2971 /* xxx we don't verify the hostname component */
2972
2973 } else if (strcasecmp(name, "response") == 0) {
2974 _plug_strdup(sparams->utils, value, &response, NULL);
2975 } else if (strcasecmp(name, "cipher") == 0) {
2976 _plug_strdup(sparams->utils, value, &cipher, NULL);
2977 } else if (strcasecmp(name, "maxbuf") == 0) {
2978 maxbuf_count++;
2979 if (maxbuf_count != 1) {
2980 result = SASL_BADAUTH;
2981 #ifdef _SUN_SDK_
2982 sparams->utils->log(sparams->utils->conn, SASL_LOG_ERR,
2983 "duplicate maxbuf: authentication aborted");
2984 #else
2985 SETERROR(sparams->utils,
2986 "duplicate maxbuf: authentication aborted");
2987 #endif /* _SUN_SDK_ */
2988 goto FreeAllMem;
2989 } else if (sscanf(value, "%u", &client_maxbuf) != 1) {
2990 result = SASL_BADAUTH;
2991 #ifdef _SUN_SDK_
2992 sparams->utils->log(sparams->utils->conn, SASL_LOG_ERR,
2993 "invalid maxbuf parameter");
2994 #else
2995 SETERROR(sparams->utils, "invalid maxbuf parameter");
2996 #endif /* _SUN_SDK_ */
2997 goto FreeAllMem;
2998 } else {
2999 if (client_maxbuf <= 16) {
3000 result = SASL_BADAUTH;
3001 #ifdef _SUN_SDK_
3002 sparams->utils->log(sparams->utils->conn, SASL_LOG_ERR,
3003 "maxbuf parameter too small");
3004 #else
3005 SETERROR(sparams->utils,
3006 "maxbuf parameter too small");
3007 #endif /* _SUN_SDK_ */
3008 goto FreeAllMem;
3009 }
3010 }
3011 } else if (strcasecmp(name, "charset") == 0) {
3012 if (strcasecmp(value, "utf-8") != 0) {
3013 #ifdef _SUN_SDK_
3014 sparams->utils->log(sparams->utils->conn, SASL_LOG_ERR,
3015 "client doesn't support UTF-8");
3016 #else
3017 SETERROR(sparams->utils, "client doesn't support UTF-8");
3018 #endif /* _SUN_SDK_ */
3019 result = SASL_FAIL;
3020 goto FreeAllMem;
3021 }
3022 _plug_strdup(sparams->utils, value, &charset, NULL);
3023 } else {
3024 sparams->utils->log(sparams->utils->conn, SASL_LOG_DEBUG,
3025 "DIGEST-MD5 unrecognized pair %s/%s: ignoring",
3026 name, value);
3027 }
3028 }
3029
3030 /*
3031 * username = "username" "=" <"> username-value <">
3032 * username-value = qdstr-val cnonce = "cnonce" "=" <">
3033 * cnonce-value <"> cnonce-value = qdstr-val nonce-count = "nc"
3034 * "=" nc-value nc-value = 8LHEX qop = "qop" "="
3035 * qop-value digest-uri = "digest-uri" "=" digest-uri-value
3036 * digest-uri-value = serv-type "/" host [ "/" serv-name ] serv-type
3037 * = 1*ALPHA host = 1*( ALPHA | DIGIT | "-" | "." ) service
3038 * = host response = "response" "=" <"> response-value <">
3039 * response-value = 32LHEX LHEX = "0" | "1" | "2" | "3" | "4" | "5" |
3040 * "6" | "7" | "8" | "9" | "a" | "b" | "c" | "d" | "e" | "f" cipher =
3041 * "cipher" "=" cipher-value
3042 */
3043 /* Verifing that all parameters was defined */
3044 if ((username == NULL) ||
3045 (nonce == NULL) ||
3046 (noncecount == 0) ||
3047 (cnonce == NULL) ||
3048 (digesturi == NULL) ||
3049 (response == NULL)) {
3050 #ifdef _SUN_SDK_
3051 sparams->utils->log(sparams->utils->conn, SASL_LOG_ERR,
3052 "required parameters missing");
3053 #else
3054 SETERROR(sparams->utils, "required parameters missing");
3055 #endif /* _SUN_SDK_ */
3056 result = SASL_BADAUTH;
3057 goto FreeAllMem;
3058 }
3059
3060 if (text->state == 1) {
3061 unsigned val = hash(username) % text->reauth->size;
3062
3063 /* reauth attempt, see if we have any info for this user */
3064 if (sparams->utils->mutex_lock(text->reauth->mutex) == SASL_OK) { /* LOCK */
3065 if (text->reauth->e[val].authid &&
3066 !strcmp(username, text->reauth->e[val].authid)) {
3067
3068 _plug_strdup(sparams->utils, text->reauth->e[val].realm,
3069 &text->realm, NULL);
3070 #ifdef _SUN_SDK_
3071 _plug_strdup(sparams->utils, (char *)text->reauth->e[val].nonce,
3072 (char **) &text->nonce, NULL);
3073 #else
3074 _plug_strdup(sparams->utils, text->reauth->e[val].nonce,
3075 (char **) &text->nonce, NULL);
3076 #endif /* _SUN_SDK_ */
3077 text->nonce_count = ++text->reauth->e[val].nonce_count;
3078 #ifdef _SUN_SDK_
3079 _plug_strdup(sparams->utils, (char *)text->reauth->e[val].cnonce,
3080 (char **) &text->cnonce, NULL);
3081 #else
3082 _plug_strdup(sparams->utils, text->reauth->e[val].cnonce,
3083 (char **) &text->cnonce, NULL);
3084 #endif /* _SUN_SDK_ */
3085 stext->timestamp = text->reauth->e[val].u.s.timestamp;
3086 }
3087 sparams->utils->mutex_unlock(text->reauth->mutex); /* UNLOCK */
3088 }
3089
3090 if (!text->nonce) {
3091 /* we don't have any reauth info, so bail */
3092 result = SASL_FAIL;
3093 goto FreeAllMem;
3094 }
3095 }
3096
3097 /* Sanity check the parameters */
3098 #ifdef _SUN_SDK_
3099 if ((realm != NULL && text->realm != NULL &&
3100 strcmp(realm, text->realm) != 0) ||
3101 (realm == NULL && text->realm != NULL) ||
3102 (realm != NULL && text->realm == NULL)) {
3103 sparams->utils->log(sparams->utils->conn, SASL_LOG_ERR,
3104 "realm changed: authentication aborted");
3105 #else
3106 if (strcmp(realm, text->realm) != 0) {
3107 SETERROR(sparams->utils,
3108 "realm changed: authentication aborted");
3109 #endif /* _SUN_SDK_ */
3110 result = SASL_BADAUTH;
3111 goto FreeAllMem;
3112 }
3113 #ifdef _SUN_SDK_
3114 if (strcmp((char *)nonce, (char *) text->nonce) != 0) {
3115 sparams->utils->log(sparams->utils->conn, SASL_LOG_ERR,
3116 "nonce changed: authentication aborted");
3117 #else
3118 if (strcmp(nonce, (char *) text->nonce) != 0) {
3119 SETERROR(sparams->utils,
3120 "nonce changed: authentication aborted");
3121 #endif /* _SUN_SKD_ */
3122 result = SASL_BADAUTH;
3123 goto FreeAllMem;
3124 }
3125 if (noncecount != text->nonce_count) {
3126 #ifdef _SUN_SDK_
3127 sparams->utils->log(sparams->utils->conn, SASL_LOG_ERR,
3128 "incorrect nonce-count: authentication aborted");
3129 #else
3130 SETERROR(sparams->utils,
3131 "incorrect nonce-count: authentication aborted");
3132 #endif /* _SUN_SDK_ */
3133 result = SASL_BADAUTH;
3134 goto FreeAllMem;
3135 }
3136 #ifdef _SUN_SDK_
3137 if (text->cnonce && strcmp((char *)cnonce, (char *)text->cnonce) != 0) {
3138 sparams->utils->log(sparams->utils->conn, SASL_LOG_ERR,
3139 "cnonce changed: authentication aborted");
3140 #else
3141 if (text->cnonce && strcmp(cnonce, text->cnonce) != 0) {
3142 SETERROR(sparams->utils,
3143 "cnonce changed: authentication aborted");
3144 #endif /* _SUN_SDK_ */
3145 result = SASL_BADAUTH;
3146 goto FreeAllMem;
3147 }
3148
3149 result = sparams->utils->prop_request(sparams->propctx, password_request);
3150 if(result != SASL_OK) {
3151 #ifdef _SUN_SDK_
3152 sparams->utils->log(sparams->utils->conn, SASL_LOG_ERR,
3153 "unable to request user password");
3154 #else
3155 SETERROR(sparams->utils, "unable to resquest user password");
3156 #endif /* _SUN_SDK_ */
3157 goto FreeAllMem;
3158 }
3159
3160 /* this will trigger the getting of the aux properties */
3161 /* Note that if we don't have an authorization id, we don't use it... */
3162 result = sparams->canon_user(sparams->utils->conn,
3163 username, 0, SASL_CU_AUTHID, oparams);
3164 if (result != SASL_OK) {
3165 #ifdef _SUN_SDK_
3166 sparams->utils->log(sparams->utils->conn, SASL_LOG_ERR,
3167 "unable canonify user and get auxprops");
3168 #else
3169 SETERROR(sparams->utils, "unable canonify user and get auxprops");
3170 #endif /* _SUN_SDK_ */
3171 goto FreeAllMem;
3172 }
3173
3174 if (!authorization_id || !*authorization_id) {
3175 result = sparams->canon_user(sparams->utils->conn,
3176 username, 0, SASL_CU_AUTHZID, oparams);
3177 } else {
3178 result = sparams->canon_user(sparams->utils->conn,
3179 authorization_id, 0, SASL_CU_AUTHZID,
3180 oparams);
3181 }
3182
3183 if (result != SASL_OK) {
3184 #ifdef _SUN_SDK_
3185 sparams->utils->log(sparams->utils->conn, SASL_LOG_ERR,
3186 "unable to canonicalize authorization ID");
3187 #else
3188 SETERROR(sparams->utils, "unable authorization ID");
3189 #endif /* _SUN_SDK_ */
3190 goto FreeAllMem;
3191 }
3192
3193 result = sparams->utils->prop_getnames(sparams->propctx, password_request,
3194 auxprop_values);
3195 if (result < 0 ||
3196 ((!auxprop_values[0].name || !auxprop_values[0].values) &&
3197 (!auxprop_values[1].name || !auxprop_values[1].values))) {
3198 /* We didn't find this username */
3199 #ifdef _INTEGRATED_SOLARIS_
3200 sparams->utils->seterror(sparams->utils->conn, 0,
3201 gettext("no secret in database"));
3202 #else
3203 sparams->utils->seterror(sparams->utils->conn, 0,
3204 "no secret in database");
3205 #endif /* _INTEGRATED_SOLARIS_ */
3206 result = SASL_NOUSER;
3207 goto FreeAllMem;
3208 }
3209
3210 if (auxprop_values[0].name && auxprop_values[0].values) {
3211 len = strlen(auxprop_values[0].values[0]);
3212 if (len == 0) {
3213 #ifdef _INTEGRATED_SOLARIS_
3214 sparams->utils->seterror(sparams->utils->conn,0,
3215 gettext("empty secret"));
3216 #else
3217 sparams->utils->seterror(sparams->utils->conn,0,
3218 "empty secret");
3219 #endif /* _INTEGRATED_SOLARIS_ */
3220 result = SASL_FAIL;
3221 goto FreeAllMem;
3222 }
3223
3224 sec = sparams->utils->malloc(sizeof(sasl_secret_t) + len);
3225 if (!sec) {
3226 #ifdef _SUN_SDK_
3227 sparams->utils->log(sparams->utils->conn, SASL_LOG_ERR,
3228 "unable to allocate secret");
3229 #else
3230 SETERROR(sparams->utils, "unable to allocate secret");
3231 #endif /* _SUN_SDK_ */
3232 result = SASL_FAIL;
3233 goto FreeAllMem;
3234 }
3235
3236 sec->len = len;
3237 #ifdef _SUN_SDK_
3238 strncpy((char *)sec->data, auxprop_values[0].values[0], len + 1);
3239 #else
3240 strncpy(sec->data, auxprop_values[0].values[0], len + 1);
3241 #endif /* _SUN_SDK_ */
3242
3243 /*
3244 * Verifying response obtained from client
3245 *
3246 * H_URP = H({ username-value,":",realm-value,":",passwd}) sec->data
3247 * contains H_URP
3248 */
3249
3250 /* Calculate the secret from the plaintext password */
3251 {
3252 HASH HA1;
3253
3254 #ifdef _SUN_SDK_
3255 DigestCalcSecret(sparams->utils, (unsigned char *)username,
3256 (unsigned char *)text->realm, sec->data,
3257 sec->len, HA1);
3258 #else
3259 DigestCalcSecret(sparams->utils, username,
3260 text->realm, sec->data, sec->len, HA1);
3261 #endif /* _SUN_SDK_ */
3262
3263 /*
3264 * A1 = { H( { username-value, ":", realm-value, ":", passwd } ),
3265 * ":", nonce-value, ":", cnonce-value }
3266 */
3267
3268 memcpy(A1, HA1, HASHLEN);
3269 A1[HASHLEN] = '\0';
3270 }
3271
3272 /* We're done with sec now. Let's get rid of it */
3273 _plug_free_secret(sparams->utils, &sec);
3274 } else if (auxprop_values[1].name && auxprop_values[1].values) {
3275 memcpy(A1, auxprop_values[1].values[0], HASHLEN);
3276 A1[HASHLEN] = '\0';
3277 } else {
3278 #ifdef _SUN_SDK_
3279 sparams->utils->log(sparams->utils->conn, SASL_LOG_ERR,
3280 "Have neither type of secret");
3281 #else
3282 sparams->utils->seterror(sparams->utils->conn, 0,
3283 "Have neither type of secret");
3284 #endif /* _SUN_SDK_ */
3285 #ifdef _SUN_SDK_
3286 result = SASL_FAIL;
3287 goto FreeAllMem;
3288 #else
3289 return SASL_FAIL;
3290 #endif /* _SUN_SDK_ */
3291 }
3292
3293 /* defaulting qop to "auth" if not specified */
3294 if (qop == NULL) {
3295 _plug_strdup(sparams->utils, "auth", &qop, NULL);
3296 }
3297
3298 /* check which layer/cipher to use */
3299 if ((!strcasecmp(qop, "auth-conf")) && (cipher != NULL)) {
3300 /* see what cipher was requested */
3301 struct digest_cipher *cptr;
3302
3303 #ifdef USE_UEF_SERVER
3304 cptr = available_ciphers1;
3305 #else
3306 cptr = available_ciphers;
3307 #endif
3308 while (cptr->name) {
3309 /* find the cipher requested & make sure it's one we're happy
3310 with by policy */
3311 if (!strcasecmp(cipher, cptr->name) &&
3312 stext->requiressf <= cptr->ssf &&
3313 stext->limitssf >= cptr->ssf) {
3314 /* found it! */
3315 break;
3316 }
3317 cptr++;
3318 }
3319
3320 if (cptr->name) {
3321 text->cipher_enc = cptr->cipher_enc;
3322 text->cipher_dec = cptr->cipher_dec;
3323 text->cipher_init = cptr->cipher_init;
3324 text->cipher_free = cptr->cipher_free;
3325 oparams->mech_ssf = cptr->ssf;
3326 n = cptr->n;
3327 } else {
3328 /* erg? client requested something we didn't advertise! */
3329 sparams->utils->log(sparams->utils->conn, SASL_LOG_WARN,
3330 "protocol violation: client requested invalid cipher");
3331 #ifndef _SUN_SDK_
3332 SETERROR(sparams->utils, "client requested invalid cipher");
3333 #endif /* !_SUN_SDK_ */
3334 /* Mark that we attempted security layer negotiation */
3335 oparams->mech_ssf = 2;
3336 result = SASL_FAIL;
3337 goto FreeAllMem;
3338 }
3339
3340 oparams->encode=&digestmd5_privacy_encode;
3341 oparams->decode=&digestmd5_privacy_decode;
3342 } else if (!strcasecmp(qop, "auth-int") &&
3343 stext->requiressf <= 1 && stext->limitssf >= 1) {
3344 oparams->encode = &digestmd5_integrity_encode;
3345 oparams->decode = &digestmd5_integrity_decode;
3346 oparams->mech_ssf = 1;
3347 } else if (!strcasecmp(qop, "auth") && stext->requiressf == 0) {
3348 oparams->encode = NULL;
3349 oparams->decode = NULL;
3350 oparams->mech_ssf = 0;
3351 } else {
3352 #ifdef _SUN_SDK_
3353 sparams->utils->log(sparams->utils->conn, SASL_LOG_ERR,
3354 "protocol violation: client requested invalid qop");
3355 #else
3356 SETERROR(sparams->utils,
3357 "protocol violation: client requested invalid qop");
3358 #endif /* _SUN_SDK_ */
3359 result = SASL_FAIL;
3360 goto FreeAllMem;
3361 }
3362
3363 serverresponse = create_response(text,
3364 sparams->utils,
3365 text->nonce,
3366 text->nonce_count,
3367 cnonce,
3368 qop,
3369 digesturi,
3370 A1,
3371 authorization_id,
3372 &text->response_value);
3373
3374 if (serverresponse == NULL) {
3375 #ifndef _SUN_SDK_
3376 SETERROR(sparams->utils, "internal error: unable to create response");
3377 #endif /* !_SUN_SDK_ */
3378 result = SASL_NOMEM;
3379 goto FreeAllMem;
3380 }
3381
3382 /* if ok verified */
3383 if (strcmp(serverresponse, response) != 0) {
3384 #ifdef _INTEGRATED_SOLARIS_
3385 SETERROR(sparams->utils,
3386 gettext("client response doesn't match what we generated"));
3387 #else
3388 SETERROR(sparams->utils,
3389 "client response doesn't match what we generated");
3390 #endif /* _INTEGRATED_SOLARIS_ */
3391 result = SASL_BADAUTH;
3392
3393 goto FreeAllMem;
3394 }
3395
3396 /* see if our nonce expired */
3397 if (text->reauth->timeout &&
3398 time(0) - stext->timestamp > text->reauth->timeout) {
3399 #ifdef _INTEGRATED_SOLARIS_
3400 SETERROR(sparams->utils, gettext("server nonce expired"));
3401 #else
3402 SETERROR(sparams->utils, "server nonce expired");
3403 #endif /* _INTEGRATED_SOLARIS_ */
3404 stext->stale = 1;
3405 result = SASL_BADAUTH;
3406
3407 goto FreeAllMem;
3408 }
3409
3410 /*
3411 * nothing more to do; authenticated set oparams information
3412 */
3413 oparams->doneflag = 1;
3414 oparams->maxoutbuf = client_maxbuf - 4;
3415 if (oparams->mech_ssf > 1) {
3416 #ifdef _SUN_SDK_
3417 if (oparams->maxoutbuf <= 25) {
3418 result = SASL_BADPARAM;
3419 goto FreeAllMem;
3420 }
3421 #endif
3422 /* MAC block (privacy) */
3423 oparams->maxoutbuf -= 25;
3424 } else if(oparams->mech_ssf == 1) {
3425 #ifdef _SUN_SDK_
3426 if (oparams->maxoutbuf <= 16) {
3427 result = SASL_BADPARAM;
3428 goto FreeAllMem;
3429 }
3430 #endif
3431 /* MAC block (integrity) */
3432 oparams->maxoutbuf -= 16;
3433 }
3434
3435 oparams->param_version = 0;
3436
3437 text->seqnum = 0; /* for integrity/privacy */
3438 text->rec_seqnum = 0; /* for integrity/privacy */
3439 text->in_maxbuf =
3440 sparams->props.maxbufsize ? sparams->props.maxbufsize : DEFAULT_BUFSIZE;
3441 text->utils = sparams->utils;
3442
3443 /* used by layers */
3444 text->needsize = 4;
3445 text->buffer = NULL;
3446
3447 if (oparams->mech_ssf > 0) {
3448 char enckey[16];
3449 char deckey[16];
3450
3451 create_layer_keys(text, sparams->utils,text->HA1,n,enckey,deckey);
3452
3453 /* initialize cipher if need be */
3454 #ifdef _SUN_SDK_
3455 if (text->cipher_init) {
3456 if (text->cipher_free)
3457 text->cipher_free(text);
3458 if ((result = text->cipher_init(text, enckey, deckey)) != SASL_OK) {
3459 sparams->utils->log(sparams->utils->conn, SASL_LOG_ERR,
3460 "couldn't init cipher");
3461 goto FreeAllMem;
3462 }
3463 }
3464 #else
3465 if (text->cipher_init)
3466 if (text->cipher_init(text, enckey, deckey) != SASL_OK) {
3467 sparams->utils->seterror(sparams->utils->conn, 0,
3468 "couldn't init cipher");
3469 }
3470 #endif /* _SUN_SDK_ */
3471 }
3472
3473 /*
3474 * The server receives and validates the "digest-response". The server
3475 * checks that the nonce-count is "00000001". If it supports subsequent
3476 * authentication, it saves the value of the nonce and the nonce-count.
3477 */
3478
3479 /*
3480 * The "username-value", "realm-value" and "passwd" are encoded according
3481 * to the value of the "charset" directive. If "charset=UTF-8" is
3482 * present, and all the characters of either "username-value" or "passwd"
3483 * are in the ISO 8859-1 character set, then it must be converted to
3484 * UTF-8 before being hashed. A sample implementation of this conversion
3485 * is in section 8.
3486 */
3487
3488 /* add to challenge */
3489 {
3490 unsigned resplen =
3491 strlen(text->response_value) + strlen("rspauth") + 3;
3492
3493 result = _plug_buf_alloc(sparams->utils, &(text->out_buf),
3494 &(text->out_buf_len), resplen);
3495 if(result != SASL_OK) {
3496 goto FreeAllMem;
3497 }
3498
3499 sprintf(text->out_buf, "rspauth=%s", text->response_value);
3500
3501 /* self check */
3502 if (strlen(text->out_buf) > 2048) {
3503 result = SASL_FAIL;
3504 goto FreeAllMem;
3505 }
3506 }
3507
3508 *serveroutlen = strlen(text->out_buf);
3509 *serverout = text->out_buf;
3510
3511 result = SASL_OK;
3512
3513 FreeAllMem:
3514 if (text->reauth->timeout &&
3515 sparams->utils->mutex_lock(text->reauth->mutex) == SASL_OK) { /* LOCK */
3516 unsigned val = hash(username) % text->reauth->size;
3517
3518 switch (result) {
3519 case SASL_OK:
3520 /* successful auth, setup for future reauth */
3521 if (text->nonce_count == 1) {
3522 /* successful initial auth, create new entry */
3523 clear_reauth_entry(&text->reauth->e[val], SERVER, sparams->utils);
3524 text->reauth->e[val].authid = username; username = NULL;
3525 text->reauth->e[val].realm = text->realm; text->realm = NULL;
3526 text->reauth->e[val].nonce = text->nonce; text->nonce = NULL;
3527 text->reauth->e[val].cnonce = cnonce; cnonce = NULL;
3528 }
3529 if (text->nonce_count <= text->reauth->e[val].nonce_count) {
3530 /* paranoia. prevent replay attacks */
3531 clear_reauth_entry(&text->reauth->e[val], SERVER, sparams->utils);
3532 }
3533 else {
3534 text->reauth->e[val].nonce_count = text->nonce_count;
3535 text->reauth->e[val].u.s.timestamp = time(0);
3536 }
3537 break;
3538 default:
3539 if (text->nonce_count > 1) {
3540 /* failed reauth, clear entry */
3541 clear_reauth_entry(&text->reauth->e[val], SERVER, sparams->utils);
3542 }
3543 else {
3544 /* failed initial auth, leave existing cache */
3545 }
3546 }
3547 sparams->utils->mutex_unlock(text->reauth->mutex); /* UNLOCK */
3548 }
3549
3550 /* free everything */
3551 if (in_start) sparams->utils->free (in_start);
3552
3553 if (username != NULL)
3554 sparams->utils->free (username);
3555 #ifdef _SUN_SDK_
3556 if (authorization_id != NULL)
3557 sparams->utils->free (authorization_id);
3558 #endif /* _SUN_SDK_ */
3559 if (realm != NULL)
3560 sparams->utils->free (realm);
3561 if (nonce != NULL)
3562 sparams->utils->free (nonce);
3563 if (cnonce != NULL)
3564 sparams->utils->free (cnonce);
3565 if (response != NULL)
3566 sparams->utils->free (response);
3567 if (cipher != NULL)
3568 sparams->utils->free (cipher);
3569 if (serverresponse != NULL)
3570 sparams->utils->free(serverresponse);
3571 if (charset != NULL)
3572 sparams->utils->free (charset);
3573 if (digesturi != NULL)
3574 sparams->utils->free (digesturi);
3575 if (qop!=NULL)
3576 sparams->utils->free (qop);
3577 if (sec)
3578 _plug_free_secret(sparams->utils, &sec);
3579
3580 return result;
3581 }
3582
3583 static int
3584 digestmd5_server_mech_step(void *conn_context,
3585 sasl_server_params_t *sparams,
3586 const char *clientin,
3587 unsigned clientinlen,
3588 const char **serverout,
3589 unsigned *serveroutlen,
3590 sasl_out_params_t *oparams)
3591 {
3592 context_t *text = (context_t *) conn_context;
3593 server_context_t *stext = (server_context_t *) conn_context;
3594
3595 if (clientinlen > 4096) return SASL_BADPROT;
3596
3597 *serverout = NULL;
3598 *serveroutlen = 0;
3599
3600 switch (text->state) {
3601
3602 case 1:
3603 /* setup SSF limits */
3604 if (!sparams->props.maxbufsize) {
3605 stext->limitssf = 0;
3606 stext->requiressf = 0;
3607 } else {
3608 if (sparams->props.max_ssf < sparams->external_ssf) {
3609 stext->limitssf = 0;
3610 } else {
3611 stext->limitssf =
3612 sparams->props.max_ssf - sparams->external_ssf;
3613 }
3614 if (sparams->props.min_ssf < sparams->external_ssf) {
3615 stext->requiressf = 0;
3616 } else {
3617 stext->requiressf =
3618 sparams->props.min_ssf - sparams->external_ssf;
3619 }
3620 }
3621
3622 if (clientin && text->reauth->timeout) {
3623 /* here's where we attempt fast reauth if possible */
3624 if (digestmd5_server_mech_step2(stext, sparams,
3625 clientin, clientinlen,
3626 serverout, serveroutlen,
3627 oparams) == SASL_OK) {
3628 return SASL_OK;
3629 }
3630
3631 #ifdef _SUN_SDK_
3632 sparams->utils->log(sparams->utils->conn, SASL_LOG_WARN,
3633 "DIGEST-MD5 reauth failed");
3634 #else
3635 sparams->utils->log(NULL, SASL_LOG_WARN,
3636 "DIGEST-MD5 reauth failed\n");
3637 #endif /* _SUN_SDK_ */
3638
3639 /* re-initialize everything for a fresh start */
3640 memset(oparams, 0, sizeof(sasl_out_params_t));
3641
3642 /* fall through and issue challenge */
3643 }
3644
3645 return digestmd5_server_mech_step1(stext, sparams,
3646 clientin, clientinlen,
3647 serverout, serveroutlen, oparams);
3648
3649 case 2:
3650 return digestmd5_server_mech_step2(stext, sparams,
3651 clientin, clientinlen,
3652 serverout, serveroutlen, oparams);
3653
3654 default:
3655 #ifdef _SUN_SDK_
3656 sparams->utils->log(sparams->utils->conn, SASL_LOG_ERR,
3657 "Invalid DIGEST-MD5 server step %d", text->state);
3658 #else
3659 sparams->utils->log(NULL, SASL_LOG_ERR,
3660 "Invalid DIGEST-MD5 server step %d\n", text->state);
3661 #endif /* _SUN_SDK_ */
3662 return SASL_FAIL;
3663 }
3664
3665 #ifndef _SUN_SDK_
3666 return SASL_FAIL; /* should never get here */
3667 #endif /* !_SUN_SDK_ */
3668 }
3669
3670 static void
3671 digestmd5_server_mech_dispose(void *conn_context, const sasl_utils_t *utils)
3672 {
3673 server_context_t *stext = (server_context_t *) conn_context;
3674
3675 if (!stext || !utils) return;
3676
3677 digestmd5_common_mech_dispose(conn_context, utils);
3678 }
3679
3680 static sasl_server_plug_t digestmd5_server_plugins[] =
3681 {
3682 {
3683 "DIGEST-MD5", /* mech_name */
3684 #ifdef WITH_RC4
3685 128, /* max_ssf */
3686 #elif WITH_DES
3687 112,
3688 #else
3689 0,
3690 #endif
3691 SASL_SEC_NOPLAINTEXT
3692 | SASL_SEC_NOANONYMOUS
3693 | SASL_SEC_MUTUAL_AUTH, /* security_flags */
3694 SASL_FEAT_ALLOWS_PROXY, /* features */
3695 NULL, /* glob_context */
3696 &digestmd5_server_mech_new, /* mech_new */
3697 &digestmd5_server_mech_step, /* mech_step */
3698 &digestmd5_server_mech_dispose, /* mech_dispose */
3699 &digestmd5_common_mech_free, /* mech_free */
3700 NULL, /* setpass */
3701 NULL, /* user_query */
3702 NULL, /* idle */
3703 NULL, /* mech avail */
3704 NULL /* spare */
3705 }
3706 };
3707
3708 int digestmd5_server_plug_init(sasl_utils_t *utils,
3709 int maxversion,
3710 int *out_version,
3711 sasl_server_plug_t **pluglist,
3712 int *plugcount)
3713 {
3714 reauth_cache_t *reauth_cache;
3715 const char *timeout = NULL;
3716 unsigned int len;
3717 #if defined _SUN_SDK_ && defined USE_UEF
3718 int ret;
3719 #endif /* _SUN_SDK_ && USE_UEF */
3720
3721 if (maxversion < SASL_SERVER_PLUG_VERSION)
3722 return SASL_BADVERS;
3723
3724 #if defined _SUN_SDK_ && defined USE_UEF
3725 if ((ret = uef_init(utils)) != SASL_OK)
3726 return ret;
3727 #endif /* _SUN_SDK_ && USE_UEF */
3728
3729 /* reauth cache */
3730 reauth_cache = utils->malloc(sizeof(reauth_cache_t));
3731 if (reauth_cache == NULL)
3732 return SASL_NOMEM;
3733 memset(reauth_cache, 0, sizeof(reauth_cache_t));
3734 reauth_cache->i_am = SERVER;
3735
3736 /* fetch and canonify the reauth_timeout */
3737 utils->getopt(utils->getopt_context, "DIGEST-MD5", "reauth_timeout",
3738 &timeout, &len);
3739 if (timeout)
3740 reauth_cache->timeout = (time_t) 60 * strtol(timeout, NULL, 10);
3741 #ifdef _SUN_SDK_
3742 else
3743 reauth_cache->timeout = 0;
3744 #endif /* _SUN_SDK_ */
3745 if (reauth_cache->timeout < 0)
3746 reauth_cache->timeout = 0;
3747
3748 if (reauth_cache->timeout) {
3749 /* mutex */
3750 reauth_cache->mutex = utils->mutex_alloc();
3751 if (!reauth_cache->mutex)
3752 return SASL_FAIL;
3753
3754 /* entries */
3755 reauth_cache->size = 100;
3756 reauth_cache->e = utils->malloc(reauth_cache->size *
3757 sizeof(reauth_entry_t));
3758 if (reauth_cache->e == NULL)
3759 return SASL_NOMEM;
3760 memset(reauth_cache->e, 0, reauth_cache->size * sizeof(reauth_entry_t));
3761 }
3762
3763 digestmd5_server_plugins[0].glob_context = reauth_cache;
3764
3765 #ifdef _SUN_SDK_
3766 #ifdef USE_UEF_CLIENT
3767 digestmd5_server_plugins[0].max_ssf = uef_max_ssf;
3768 #endif /* USE_UEF_CLIENT */
3769 #endif /* _SUN_SDK_ */
3770
3771 #ifdef _INTEGRATED_SOLARIS_
3772 /*
3773 * Let libsasl know that we are a "Sun" plugin so that privacy
3774 * and integrity will be allowed.
3775 */
3776 REG_PLUG("DIGEST-MD5", digestmd5_server_plugins);
3777 #endif /* _INTEGRATED_SOLARIS_ */
3778
3779 *out_version = SASL_SERVER_PLUG_VERSION;
3780 *pluglist = digestmd5_server_plugins;
3781 *plugcount = 1;
3782
3783 return SASL_OK;
3784 }
3785
3786 /***************************** Client Section *****************************/
3787
3788 typedef struct client_context {
3789 context_t common;
3790
3791 sasl_secret_t *password; /* user password */
3792 unsigned int free_password; /* set if we need to free password */
3793
3794 int protection;
3795 struct digest_cipher *cipher;
3796 unsigned int server_maxbuf;
3797 #ifdef _INTEGRATED_SOLARIS_
3798 void *h;
3799 #endif /* _INTEGRATED_SOLARIS_ */
3800 } client_context_t;
3801
3802 /* calculate H(A1) as per spec */
3803 static void
3804 DigestCalcHA1(context_t * text,
3805 const sasl_utils_t * utils,
3806 unsigned char *pszUserName,
3807 unsigned char *pszRealm,
3808 sasl_secret_t * pszPassword,
3809 unsigned char *pszAuthorization_id,
3810 unsigned char *pszNonce,
3811 unsigned char *pszCNonce,
3812 HASHHEX SessionKey)
3813 {
3814 MD5_CTX Md5Ctx;
3815 HASH HA1;
3816
3817 DigestCalcSecret(utils,
3818 pszUserName,
3819 pszRealm,
3820 (unsigned char *) pszPassword->data,
3821 pszPassword->len,
3822 HA1);
3823
3824 /* calculate the session key */
3825 utils->MD5Init(&Md5Ctx);
3826 utils->MD5Update(&Md5Ctx, HA1, HASHLEN);
3827 utils->MD5Update(&Md5Ctx, COLON, 1);
3828 utils->MD5Update(&Md5Ctx, pszNonce, strlen((char *) pszNonce));
3829 utils->MD5Update(&Md5Ctx, COLON, 1);
3830 utils->MD5Update(&Md5Ctx, pszCNonce, strlen((char *) pszCNonce));
3831 if (pszAuthorization_id != NULL) {
3832 utils->MD5Update(&Md5Ctx, COLON, 1);
3833 utils->MD5Update(&Md5Ctx, pszAuthorization_id,
3834 strlen((char *) pszAuthorization_id));
3835 }
3836 utils->MD5Final(HA1, &Md5Ctx);
3837
3838 CvtHex(HA1, SessionKey);
3839
3840 /* xxx rc-* use different n */
3841
3842 /* save HA1 because we'll need it for the privacy and integrity keys */
3843 memcpy(text->HA1, HA1, sizeof(HASH));
3844
3845 }
3846
3847 static char *calculate_response(context_t * text,
3848 const sasl_utils_t * utils,
3849 unsigned char *username,
3850 unsigned char *realm,
3851 unsigned char *nonce,
3852 unsigned int ncvalue,
3853 unsigned char *cnonce,
3854 char *qop,
3855 unsigned char *digesturi,
3856 sasl_secret_t * passwd,
3857 unsigned char *authorization_id,
3858 char **response_value)
3859 {
3860 HASHHEX SessionKey;
3861 HASHHEX HEntity = "00000000000000000000000000000000";
3862 HASHHEX Response;
3863 char *result;
3864
3865 /* Verifing that all parameters was defined */
3866 if(!username || !cnonce || !nonce || !ncvalue || !digesturi || !passwd) {
3867 PARAMERROR( utils );
3868 return NULL;
3869 }
3870
3871 if (realm == NULL) {
3872 /* a NULL realm is equivalent to the empty string */
3873 realm = (unsigned char *) "";
3874 }
3875
3876 if (qop == NULL) {
3877 /* default to a qop of just authentication */
3878 qop = "auth";
3879 }
3880
3881 DigestCalcHA1(text,
3882 utils,
3883 username,
3884 realm,
3885 passwd,
3886 authorization_id,
3887 nonce,
3888 cnonce,
3889 SessionKey);
3890
3891 DigestCalcResponse(utils,
3892 SessionKey,/* H(A1) */
3893 nonce, /* nonce from server */
3894 ncvalue, /* 8 hex digits */
3895 cnonce, /* client nonce */
3896 (unsigned char *) qop, /* qop-value: "", "auth",
3897 * "auth-int" */
3898 digesturi, /* requested URL */
3899 (unsigned char *) "AUTHENTICATE",
3900 HEntity, /* H(entity body) if qop="auth-int" */
3901 Response /* request-digest or response-digest */
3902 );
3903
3904 result = utils->malloc(HASHHEXLEN + 1);
3905 #ifdef _SUN_SDK_
3906 if (result == NULL)
3907 return NULL;
3908 #endif /* _SUN_SDK_ */
3909 memcpy(result, Response, HASHHEXLEN);
3910 result[HASHHEXLEN] = 0;
3911
3912 if (response_value != NULL) {
3913 DigestCalcResponse(utils,
3914 SessionKey, /* H(A1) */
3915 nonce, /* nonce from server */
3916 ncvalue, /* 8 hex digits */
3917 cnonce, /* client nonce */
3918 (unsigned char *) qop, /* qop-value: "", "auth",
3919 * "auth-int" */
3920 (unsigned char *) digesturi, /* requested URL */
3921 NULL,
3922 HEntity, /* H(entity body) if qop="auth-int" */
3923 Response /* request-digest or response-digest */
3924 );
3925
3926 #ifdef _SUN_SDK_
3927 if (*response_value != NULL)
3928 utils->free(*response_value);
3929 #endif /* _SUN_SDK_ */
3930 *response_value = utils->malloc(HASHHEXLEN + 1);
3931 if (*response_value == NULL)
3932 return NULL;
3933
3934 memcpy(*response_value, Response, HASHHEXLEN);
3935 (*response_value)[HASHHEXLEN] = 0;
3936
3937 }
3938
3939 return result;
3940 }
3941
3942 static int
3943 make_client_response(context_t *text,
3944 sasl_client_params_t *params,
3945 sasl_out_params_t *oparams)
3946 {
3947 client_context_t *ctext = (client_context_t *) text;
3948 char *qop = NULL;
3949 unsigned nbits = 0;
3950 unsigned char *digesturi = NULL;
3951 bool IsUTF8 = FALSE;
3952 char ncvalue[10];
3953 char maxbufstr[64];
3954 char *response = NULL;
3955 unsigned resplen = 0;
3956 int result;
3957
3958 switch (ctext->protection) {
3959 case DIGEST_PRIVACY:
3960 qop = "auth-conf";
3961 oparams->encode = &digestmd5_privacy_encode;
3962 oparams->decode = &digestmd5_privacy_decode;
3963 oparams->mech_ssf = ctext->cipher->ssf;
3964
3965 nbits = ctext->cipher->n;
3966 text->cipher_enc = ctext->cipher->cipher_enc;
3967 text->cipher_dec = ctext->cipher->cipher_dec;
3968 text->cipher_free = ctext->cipher->cipher_free;
3969 text->cipher_init = ctext->cipher->cipher_init;
3970 break;
3971 case DIGEST_INTEGRITY:
3972 qop = "auth-int";
3973 oparams->encode = &digestmd5_integrity_encode;
3974 oparams->decode = &digestmd5_integrity_decode;
3975 oparams->mech_ssf = 1;
3976 break;
3977 case DIGEST_NOLAYER:
3978 default:
3979 qop = "auth";
3980 oparams->encode = NULL;
3981 oparams->decode = NULL;
3982 oparams->mech_ssf = 0;
3983 }
3984
3985 digesturi = params->utils->malloc(strlen(params->service) + 1 +
3986 strlen(params->serverFQDN) + 1 +
3987 1);
3988 if (digesturi == NULL) {
3989 result = SASL_NOMEM;
3990 goto FreeAllocatedMem;
3991 };
3992
3993 /* allocated exactly this. safe */
3994 strcpy((char *) digesturi, params->service);
3995 strcat((char *) digesturi, "/");
3996 strcat((char *) digesturi, params->serverFQDN);
3997 /*
3998 * strcat (digesturi, "/"); strcat (digesturi, params->serverFQDN);
3999 */
4000
4001 /* response */
4002 response =
4003 calculate_response(text,
4004 params->utils,
4005 #ifdef _SUN_SDK_
4006 (unsigned char *) oparams->authid,
4007 #else
4008 (char *) oparams->authid,
4009 #endif /* _SUN_SDK_ */
4010 (unsigned char *) text->realm,
4011 text->nonce,
4012 text->nonce_count,
4013 text->cnonce,
4014 qop,
4015 digesturi,
4016 ctext->password,
4017 strcmp(oparams->user, oparams->authid) ?
4018 #ifdef _SUN_SDK_
4019 (unsigned char *) oparams->user : NULL,
4020 #else
4021 (char *) oparams->user : NULL,
4022 #endif /* _SUN_SDK_ */
4023 &text->response_value);
4024
4025 #ifdef _SUN_SDK_
4026 if (response == NULL) {
4027 result = SASL_NOMEM;
4028 goto FreeAllocatedMem;
4029 }
4030 #endif /* _SUN_SDK_ */
4031
4032 resplen = strlen(oparams->authid) + strlen("username") + 5;
4033 result =_plug_buf_alloc(params->utils, &(text->out_buf),
4034 &(text->out_buf_len),
4035 resplen);
4036 if (result != SASL_OK) goto FreeAllocatedMem;
4037
4038 sprintf(text->out_buf, "username=\"%s\"", oparams->authid);
4039
4040 if (add_to_challenge(params->utils,
4041 &text->out_buf, &text->out_buf_len, &resplen,
4042 "realm", (unsigned char *) text->realm,
4043 TRUE) != SASL_OK) {
4044 result = SASL_FAIL;
4045 goto FreeAllocatedMem;
4046 }
4047 if (strcmp(oparams->user, oparams->authid)) {
4048 if (add_to_challenge(params->utils,
4049 &text->out_buf, &text->out_buf_len, &resplen,
4050 #ifdef _SUN_SDK_
4051 "authzid", (unsigned char *) oparams->user,
4052 TRUE) != SASL_OK) {
4053 #else
4054 "authzid", (char *) oparams->user, TRUE) != SASL_OK) {
4055 #endif /* _SUN_SDK_ */
4056 result = SASL_FAIL;
4057 goto FreeAllocatedMem;
4058 }
4059 }
4060 if (add_to_challenge(params->utils,
4061 &text->out_buf, &text->out_buf_len, &resplen,
4062 "nonce", text->nonce, TRUE) != SASL_OK) {
4063 result = SASL_FAIL;
4064 goto FreeAllocatedMem;
4065 }
4066 if (add_to_challenge(params->utils,
4067 &text->out_buf, &text->out_buf_len, &resplen,
4068 "cnonce", text->cnonce, TRUE) != SASL_OK) {
4069 result = SASL_FAIL;
4070 goto FreeAllocatedMem;
4071 }
4072 snprintf(ncvalue, sizeof(ncvalue), "%08x", text->nonce_count);
4073 if (add_to_challenge(params->utils,
4074 &text->out_buf, &text->out_buf_len, &resplen,
4075 "nc", (unsigned char *) ncvalue, FALSE) != SASL_OK) {
4076 result = SASL_FAIL;
4077 goto FreeAllocatedMem;
4078 }
4079 if (add_to_challenge(params->utils,
4080 &text->out_buf, &text->out_buf_len, &resplen,
4081 "qop", (unsigned char *) qop, FALSE) != SASL_OK) {
4082 result = SASL_FAIL;
4083 goto FreeAllocatedMem;
4084 }
4085 if (ctext->cipher != NULL) {
4086 if (add_to_challenge(params->utils,
4087 &text->out_buf, &text->out_buf_len, &resplen,
4088 "cipher",
4089 (unsigned char *) ctext->cipher->name,
4090 TRUE) != SASL_OK) {
4091 result = SASL_FAIL;
4092 goto FreeAllocatedMem;
4093 }
4094 }
4095
4096 if (params->props.maxbufsize) {
4097 snprintf(maxbufstr, sizeof(maxbufstr), "%d", params->props.maxbufsize);
4098 if (add_to_challenge(params->utils,
4099 &text->out_buf, &text->out_buf_len, &resplen,
4100 "maxbuf", (unsigned char *) maxbufstr,
4101 FALSE) != SASL_OK) {
4102 #ifdef _SUN_SDK_
4103 params->utils->log(params->utils->conn, SASL_LOG_ERR,
4104 "internal error: add_to_challenge maxbuf failed");
4105 #else
4106 SETERROR(params->utils,
4107 "internal error: add_to_challenge maxbuf failed");
4108 #endif /* _SUN_SDK_ */
4109 goto FreeAllocatedMem;
4110 }
4111 }
4112
4113 if (IsUTF8) {
4114 if (add_to_challenge(params->utils,
4115 &text->out_buf, &text->out_buf_len, &resplen,
4116 "charset", (unsigned char *) "utf-8",
4117 FALSE) != SASL_OK) {
4118 result = SASL_FAIL;
4119 goto FreeAllocatedMem;
4120 }
4121 }
4122 if (add_to_challenge(params->utils,
4123 &text->out_buf, &text->out_buf_len, &resplen,
4124 "digest-uri", digesturi, TRUE) != SASL_OK) {
4125 result = SASL_FAIL;
4126 goto FreeAllocatedMem;
4127 }
4128 if (add_to_challenge(params->utils,
4129 &text->out_buf, &text->out_buf_len, &resplen,
4130 "response", (unsigned char *) response,
4131 FALSE) != SASL_OK) {
4132
4133 result = SASL_FAIL;
4134 goto FreeAllocatedMem;
4135 }
4136
4137 /* self check */
4138 if (strlen(text->out_buf) > 2048) {
4139 result = SASL_FAIL;
4140 goto FreeAllocatedMem;
4141 }
4142
4143 /* set oparams */
4144 #ifdef _SUN_SDK_
4145 oparams->maxoutbuf = ctext->server_maxbuf - 4;
4146 #else
4147 oparams->maxoutbuf = ctext->server_maxbuf;
4148 #endif /* _SUN_SDK_ */
4149 if(oparams->mech_ssf > 1) {
4150 #ifdef _SUN_SDK_
4151 if (oparams->maxoutbuf <= 25)
4152 return (SASL_BADPARAM);
4153 #endif
4154 /* MAC block (privacy) */
4155 oparams->maxoutbuf -= 25;
4156 } else if(oparams->mech_ssf == 1) {
4157 #ifdef _SUN_SDK_
4158 if (oparams->maxoutbuf <= 16)
4159 return (SASL_BADPARAM);
4160 #endif
4161 /* MAC block (integrity) */
4162 oparams->maxoutbuf -= 16;
4163 }
4164
4165 text->seqnum = 0; /* for integrity/privacy */
4166 text->rec_seqnum = 0; /* for integrity/privacy */
4167 text->utils = params->utils;
4168
4169 text->in_maxbuf =
4170 params->props.maxbufsize ? params->props.maxbufsize : DEFAULT_BUFSIZE;
4171
4172 /* used by layers */
4173 text->needsize = 4;
4174 text->buffer = NULL;
4175
4176 if (oparams->mech_ssf > 0) {
4177 char enckey[16];
4178 char deckey[16];
4179
4180 create_layer_keys(text, params->utils, text->HA1, nbits,
4181 enckey, deckey);
4182
4183 /* initialize cipher if need be */
4184 #ifdef _SUN_SDK_
4185 if (text->cipher_init) {
4186 if (text->cipher_free)
4187 text->cipher_free(text);
4188 if((result = text->cipher_init(text, enckey, deckey)) != SASL_OK) {
4189 params->utils->log(params->utils->conn, SASL_LOG_ERR,
4190 "couldn't init cipher");
4191 goto FreeAllocatedMem;
4192 }
4193 }
4194 #else
4195 if (text->cipher_init)
4196 text->cipher_init(text, enckey, deckey);
4197 #endif /* _SUN_SDK_ */
4198 }
4199
4200 result = SASL_OK;
4201
4202 FreeAllocatedMem:
4203 if (digesturi) params->utils->free(digesturi);
4204 if (response) params->utils->free(response);
4205
4206 return result;
4207 }
4208
4209 static int parse_server_challenge(client_context_t *ctext,
4210 sasl_client_params_t *params,
4211 const char *serverin, unsigned serverinlen,
4212 char ***outrealms, int *noutrealm)
4213 {
4214 context_t *text = (context_t *) ctext;
4215 int result = SASL_OK;
4216 char *in_start = NULL;
4217 char *in = NULL;
4218 char **realms = NULL;
4219 int nrealm = 0;
4220 sasl_ssf_t limit, musthave = 0;
4221 sasl_ssf_t external;
4222 int protection = 0;
4223 int ciphers = 0;
4224 int maxbuf_count = 0;
4225 #ifndef _SUN_SDK_
4226 bool IsUTF8 = FALSE;
4227 #endif /* !_SUN_SDK_ */
4228 int algorithm_count = 0;
4229
4230 if (!serverin || !serverinlen) {
4231 #ifndef _SUN_SDK_
4232 params->utils->log(params->utils->conn, SASL_LOG_ERR,
4233 "no server challenge");
4234 #else
4235 params->utils->seterror(params->utils->conn, 0,
4236 "no server challenge");
4237 #endif /* _SUN_SDK_ */
4238 return SASL_FAIL;
4239 }
4240
4241 in_start = in = params->utils->malloc(serverinlen + 1);
4242 if (in == NULL) return SASL_NOMEM;
4243
4244 memcpy(in, serverin, serverinlen);
4245 in[serverinlen] = 0;
4246
4247 ctext->server_maxbuf = 65536; /* Default value for maxbuf */
4248
4249 /* create a new cnonce */
4250 text->cnonce = create_nonce(params->utils);
4251 if (text->cnonce == NULL) {
4252 #ifdef _SUN_SDK_
4253 params->utils->log(params->utils->conn, SASL_LOG_ERR,
4254 "failed to create cnonce");
4255 #else
4256 params->utils->seterror(params->utils->conn, 0,
4257 "failed to create cnonce");
4258 #endif /* _SUN_SDK_ */
4259 result = SASL_FAIL;
4260 goto FreeAllocatedMem;
4261 }
4262
4263 /* parse the challenge */
4264 while (in[0] != '\0') {
4265 char *name, *value;
4266
4267 get_pair(&in, &name, &value);
4268
4269 /* if parse error */
4270 if (name == NULL) {
4271 #ifdef _SUN_SDK_
4272 params->utils->log(params->utils->conn, SASL_LOG_ERR,
4273 "Parse error");
4274 #else
4275 params->utils->seterror(params->utils->conn, 0, "Parse error");
4276 #endif /* _SUN_SDK_ */
4277 result = SASL_FAIL;
4278 goto FreeAllocatedMem;
4279 }
4280
4281 if (strcasecmp(name, "realm") == 0) {
4282 nrealm++;
4283
4284 if(!realms)
4285 realms = params->utils->malloc(sizeof(char *) * (nrealm + 1));
4286 else
4287 realms = params->utils->realloc(realms,
4288 sizeof(char *) * (nrealm + 1));
4289
4290 if (realms == NULL) {
4291 result = SASL_NOMEM;
4292 goto FreeAllocatedMem;
4293 }
4294
4295 _plug_strdup(params->utils, value, &realms[nrealm-1], NULL);
4296 realms[nrealm] = NULL;
4297 } else if (strcasecmp(name, "nonce") == 0) {
4298 _plug_strdup(params->utils, value, (char **) &text->nonce,
4299 NULL);
4300 text->nonce_count = 1;
4301 } else if (strcasecmp(name, "qop") == 0) {
4302 while (value && *value) {
4303 char *comma = strchr(value, ',');
4304 if (comma != NULL) {
4305 *comma++ = '\0';
4306 }
4307
4308 if (strcasecmp(value, "auth-conf") == 0) {
4309 protection |= DIGEST_PRIVACY;
4310 } else if (strcasecmp(value, "auth-int") == 0) {
4311 protection |= DIGEST_INTEGRITY;
4312 } else if (strcasecmp(value, "auth") == 0) {
4313 protection |= DIGEST_NOLAYER;
4314 } else {
4315 params->utils->log(params->utils->conn, SASL_LOG_DEBUG,
4316 "Server supports unknown layer: %s\n",
4317 value);
4318 }
4319
4320 value = comma;
4321 }
4322
4323 if (protection == 0) {
4324 result = SASL_BADAUTH;
4325 #ifdef _INTEGRATED_SOLARIS_
4326 params->utils->seterror(params->utils->conn, 0,
4327 gettext("Server doesn't support known qop level"));
4328 #else
4329 params->utils->seterror(params->utils->conn, 0,
4330 "Server doesn't support known qop level");
4331 #endif /* _INTEGRATED_SOLARIS_ */
4332 goto FreeAllocatedMem;
4333 }
4334 } else if (strcasecmp(name, "cipher") == 0) {
4335 while (value && *value) {
4336 char *comma = strchr(value, ',');
4337 #ifdef USE_UEF_CLIENT
4338 struct digest_cipher *cipher = available_ciphers1;
4339 #else
4340 struct digest_cipher *cipher = available_ciphers;
4341 #endif
4342
4343 if (comma != NULL) {
4344 *comma++ = '\0';
4345 }
4346
4347 /* do we support this cipher? */
4348 while (cipher->name) {
4349 if (!strcasecmp(value, cipher->name)) break;
4350 cipher++;
4351 }
4352 if (cipher->name) {
4353 ciphers |= cipher->flag;
4354 } else {
4355 params->utils->log(params->utils->conn, SASL_LOG_DEBUG,
4356 "Server supports unknown cipher: %s\n",
4357 value);
4358 }
4359
4360 value = comma;
4361 }
4362 } else if (strcasecmp(name, "stale") == 0 && ctext->password) {
4363 /* clear any cached password */
4364 if (ctext->free_password)
4365 _plug_free_secret(params->utils, &ctext->password);
4366 ctext->password = NULL;
4367 } else if (strcasecmp(name, "maxbuf") == 0) {
4368 /* maxbuf A number indicating the size of the largest
4369 * buffer the server is able to receive when using
4370 * "auth-int". If this directive is missing, the default
4371 * value is 65536. This directive may appear at most once;
4372 * if multiple instances are present, the client should
4373 * abort the authentication exchange.
4374 */
4375 maxbuf_count++;
4376
4377 if (maxbuf_count != 1) {
4378 result = SASL_BADAUTH;
4379 #ifdef _SUN_SDK_
4380 params->utils->log(params->utils->conn, SASL_LOG_ERR,
4381 "At least two maxbuf directives found."
4382 " Authentication aborted");
4383 #else
4384 params->utils->seterror(params->utils->conn, 0,
4385 "At least two maxbuf directives found. Authentication aborted");
4386 #endif /* _SUN_SDK_ */
4387 goto FreeAllocatedMem;
4388 } else if (sscanf(value, "%u", &ctext->server_maxbuf) != 1) {
4389 result = SASL_BADAUTH;
4390 #ifdef _SUN_SDK_
4391 params->utils->log(params->utils->conn, SASL_LOG_ERR,
4392 "Invalid maxbuf parameter received from server");
4393 #else
4394 params->utils->seterror(params->utils->conn, 0,
4395 "Invalid maxbuf parameter received from server");
4396 #endif /* _SUN_SDK_ */
4397 goto FreeAllocatedMem;
4398 } else {
4399 if (ctext->server_maxbuf<=16) {
4400 result = SASL_BADAUTH;
4401 #ifdef _SUN_SDK_
4402 params->utils->log(params->utils->conn, SASL_LOG_ERR,
4403 "Invalid maxbuf parameter received from server"
4404 " (too small: %s)", value);
4405 #else
4406 params->utils->seterror(params->utils->conn, 0,
4407 "Invalid maxbuf parameter received from server (too small: %s)", value);
4408 #endif /* _SUN_SDK_ */
4409 goto FreeAllocatedMem;
4410 }
4411 }
4412 } else if (strcasecmp(name, "charset") == 0) {
4413 if (strcasecmp(value, "utf-8") != 0) {
4414 result = SASL_BADAUTH;
4415 #ifdef _SUN_SDK_
4416 params->utils->log(params->utils->conn, SASL_LOG_ERR,
4417 "Charset must be UTF-8");
4418 #else
4419 params->utils->seterror(params->utils->conn, 0,
4420 "Charset must be UTF-8");
4421 #endif /* _SUN_SDK_ */
4422 goto FreeAllocatedMem;
4423 } else {
4424 #ifndef _SUN_SDK_
4425 IsUTF8 = TRUE;
4426 #endif /* !_SUN_SDK_ */
4427 }
4428 } else if (strcasecmp(name,"algorithm")==0) {
4429 if (strcasecmp(value, "md5-sess") != 0)
4430 {
4431 #ifdef _SUN_SDK_
4432 params->utils->log(params->utils->conn, SASL_LOG_ERR,
4433 "'algorithm' isn't 'md5-sess'");
4434 #else
4435 params->utils->seterror(params->utils->conn, 0,
4436 "'algorithm' isn't 'md5-sess'");
4437 #endif /* _SUN_SDK_ */
4438 result = SASL_FAIL;
4439 goto FreeAllocatedMem;
4440 }
4441
4442 algorithm_count++;
4443 if (algorithm_count > 1)
4444 {
4445 #ifdef _SUN_SDK_
4446 params->utils->log(params->utils->conn, SASL_LOG_ERR,
4447 "Must see 'algorithm' only once");
4448 #else
4449 params->utils->seterror(params->utils->conn, 0,
4450 "Must see 'algorithm' only once");
4451 #endif /* _SUN_SDK_ */
4452 result = SASL_FAIL;
4453 goto FreeAllocatedMem;
4454 }
4455 } else {
4456 params->utils->log(params->utils->conn, SASL_LOG_DEBUG,
4457 "DIGEST-MD5 unrecognized pair %s/%s: ignoring",
4458 name, value);
4459 }
4460 }
4461
4462 if (algorithm_count != 1) {
4463 #ifdef _SUN_SDK_
4464 params->utils->log(params->utils->conn, SASL_LOG_ERR,
4465 "Must see 'algorithm' once. Didn't see at all");
4466 #else
4467 params->utils->seterror(params->utils->conn, 0,
4468 "Must see 'algorithm' once. Didn't see at all");
4469 #endif /* _SUN_SDK_ */
4470 result = SASL_FAIL;
4471 goto FreeAllocatedMem;
4472 }
4473
4474 /* make sure we have everything we require */
4475 if (text->nonce == NULL) {
4476 #ifdef _SUN_SDK_
4477 params->utils->log(params->utils->conn, SASL_LOG_ERR,
4478 "Don't have nonce.");
4479 #else
4480 params->utils->seterror(params->utils->conn, 0,
4481 "Don't have nonce.");
4482 #endif /* _SUN_SDK_ */
4483 result = SASL_FAIL;
4484 goto FreeAllocatedMem;
4485 }
4486
4487 /* get requested ssf */
4488 external = params->external_ssf;
4489
4490 /* what do we _need_? how much is too much? */
4491 if (params->props.maxbufsize == 0) {
4492 musthave = 0;
4493 limit = 0;
4494 } else {
4495 if (params->props.max_ssf > external) {
4496 limit = params->props.max_ssf - external;
4497 } else {
4498 limit = 0;
4499 }
4500 if (params->props.min_ssf > external) {
4501 musthave = params->props.min_ssf - external;
4502 } else {
4503 musthave = 0;
4504 }
4505 }
4506
4507 /* we now go searching for an option that gives us at least "musthave"
4508 and at most "limit" bits of ssf. */
4509 if ((limit > 1) && (protection & DIGEST_PRIVACY)) {
4510 struct digest_cipher *cipher;
4511
4512 /* let's find an encryption scheme that we like */
4513 #ifdef USE_UEF_CLIENT
4514 cipher = available_ciphers1;
4515 #else
4516 cipher = available_ciphers;
4517 #endif
4518 while (cipher->name) {
4519 /* examine each cipher we support, see if it meets our security
4520 requirements, and see if the server supports it.
4521 choose the best one of these */
4522 if ((limit >= cipher->ssf) && (musthave <= cipher->ssf) &&
4523 (ciphers & cipher->flag) &&
4524 (!ctext->cipher || (cipher->ssf > ctext->cipher->ssf))) {
4525 ctext->cipher = cipher;
4526 }
4527 cipher++;
4528 }
4529
4530 if (ctext->cipher) {
4531 /* we found a cipher we like */
4532 ctext->protection = DIGEST_PRIVACY;
4533 } else {
4534 /* we didn't find any ciphers we like */
4535 #ifdef _INTEGRATED_SOLARIS_
4536 params->utils->seterror(params->utils->conn, 0,
4537 gettext("No good privacy layers"));
4538 #else
4539 params->utils->seterror(params->utils->conn, 0,
4540 "No good privacy layers");
4541 #endif /* _INTEGRATED_SOLARIS_ */
4542 }
4543 }
4544
4545 if (ctext->cipher == NULL) {
4546 /* we failed to find an encryption layer we liked;
4547 can we use integrity or nothing? */
4548
4549 if ((limit >= 1) && (musthave <= 1)
4550 && (protection & DIGEST_INTEGRITY)) {
4551 /* integrity */
4552 ctext->protection = DIGEST_INTEGRITY;
4553 #ifdef _SUN_SDK_
4554 } else if (musthave == 0) {
4555 #else
4556 } else if (musthave <= 0) {
4557 #endif /* _SUN_SDK_ */
4558 /* no layer */
4559 ctext->protection = DIGEST_NOLAYER;
4560
4561 /* See if server supports not having a layer */
4562 if ((protection & DIGEST_NOLAYER) != DIGEST_NOLAYER) {
4563 #ifdef _INTEGRATED_SOLARIS_
4564 params->utils->seterror(params->utils->conn, 0,
4565 gettext("Server doesn't support \"no layer\""));
4566 #else
4567 params->utils->seterror(params->utils->conn, 0,
4568 "Server doesn't support \"no layer\"");
4569 #endif /* _INTEGRATED_SOLARIS_ */
4570 result = SASL_FAIL;
4571 goto FreeAllocatedMem;
4572 }
4573 } else {
4574 #ifdef _INTEGRATED_SOLARIS_
4575 params->utils->seterror(params->utils->conn, 0,
4576 gettext("Can't find an acceptable layer"));
4577 #else
4578 params->utils->seterror(params->utils->conn, 0,
4579 "Can't find an acceptable layer");
4580 #endif /* _INTEGRATED_SOLARIS_ */
4581 result = SASL_TOOWEAK;
4582 goto FreeAllocatedMem;
4583 }
4584 }
4585
4586 *outrealms = realms;
4587 *noutrealm = nrealm;
4588
4589 FreeAllocatedMem:
4590 if (in_start) params->utils->free(in_start);
4591
4592 if (result != SASL_OK && realms) {
4593 int lup;
4594
4595 /* need to free all the realms */
4596 for (lup = 0;lup < nrealm; lup++)
4597 params->utils->free(realms[lup]);
4598
4599 params->utils->free(realms);
4600 }
4601
4602 return result;
4603 }
4604
4605 static int ask_user_info(client_context_t *ctext,
4606 sasl_client_params_t *params,
4607 char **realms, int nrealm,
4608 sasl_interact_t **prompt_need,
4609 sasl_out_params_t *oparams)
4610 {
4611 context_t *text = (context_t *) ctext;
4612 int result = SASL_OK;
4613 const char *authid = NULL, *userid = NULL, *realm = NULL;
4614 char *realm_chal = NULL;
4615 int user_result = SASL_OK;
4616 int auth_result = SASL_OK;
4617 int pass_result = SASL_OK;
4618 int realm_result = SASL_FAIL;
4619
4620 /* try to get the authid */
4621 if (oparams->authid == NULL) {
4622 auth_result = _plug_get_authid(params->utils, &authid, prompt_need);
4623
4624 if ((auth_result != SASL_OK) && (auth_result != SASL_INTERACT)) {
4625 return auth_result;
4626 }
4627 }
4628
4629 /* try to get the userid */
4630 if (oparams->user == NULL) {
4631 user_result = _plug_get_userid(params->utils, &userid, prompt_need);
4632
4633 if ((user_result != SASL_OK) && (user_result != SASL_INTERACT)) {
4634 return user_result;
4635 }
4636 }
4637
4638 /* try to get the password */
4639 if (ctext->password == NULL) {
4640 pass_result = _plug_get_password(params->utils, &ctext->password,
4641 &ctext->free_password, prompt_need);
4642 if ((pass_result != SASL_OK) && (pass_result != SASL_INTERACT)) {
4643 return pass_result;
4644 }
4645 }
4646
4647 /* try to get the realm */
4648 if (text->realm == NULL) {
4649 if (realms) {
4650 if(nrealm == 1) {
4651 /* only one choice */
4652 realm = realms[0];
4653 realm_result = SASL_OK;
4654 } else {
4655 /* ask the user */
4656 realm_result = _plug_get_realm(params->utils,
4657 (const char **) realms,
4658 (const char **) &realm,
4659 prompt_need);
4660 }
4661 }
4662
4663 /* fake the realm if we must */
4664 if ((realm_result != SASL_OK) && (realm_result != SASL_INTERACT)) {
4665 if (params->serverFQDN) {
4666 realm = params->serverFQDN;
4667 } else {
4668 return realm_result;
4669 }
4670 }
4671 }
4672
4673 /* free prompts we got */
4674 if (prompt_need && *prompt_need) {
4675 params->utils->free(*prompt_need);
4676 *prompt_need = NULL;
4677 }
4678
4679 /* if there are prompts not filled in */
4680 if ((user_result == SASL_INTERACT) || (auth_result == SASL_INTERACT) ||
4681 (pass_result == SASL_INTERACT) || (realm_result == SASL_INTERACT)) {
4682
4683 /* make our default realm */
4684 if ((realm_result == SASL_INTERACT) && params->serverFQDN) {
4685 realm_chal = params->utils->malloc(3+strlen(params->serverFQDN));
4686 if (realm_chal) {
4687 sprintf(realm_chal, "{%s}", params->serverFQDN);
4688 } else {
4689 return SASL_NOMEM;
4690 }
4691 }
4692
4693 /* make the prompt list */
4694 result =
4695 #if defined _INTEGRATED_SOLARIS_
4696 _plug_make_prompts(params->utils, &ctext->h, prompt_need,
4697 user_result == SASL_INTERACT ?
4698 convert_prompt(params->utils, &ctext->h,
4699 gettext("Please enter your authorization name"))
4700 : NULL,
4701 NULL,
4702 auth_result == SASL_INTERACT ?
4703 convert_prompt(params->utils, &ctext->h,
4704 gettext("Please enter your authentication name"))
4705 : NULL,
4706 NULL,
4707 pass_result == SASL_INTERACT ?
4708 convert_prompt(params->utils, &ctext->h,
4709 gettext("Please enter your password"))
4710 : NULL, NULL,
4711 NULL, NULL, NULL,
4712 realm_chal ? realm_chal : "{}",
4713 realm_result == SASL_INTERACT ?
4714 convert_prompt(params->utils, &ctext->h,
4715 gettext("Please enter your realm")) : NULL,
4716 params->serverFQDN ? params->serverFQDN : NULL);
4717 #else
4718 _plug_make_prompts(params->utils, prompt_need,
4719 user_result == SASL_INTERACT ?
4720 "Please enter your authorization name" : NULL,
4721 NULL,
4722 auth_result == SASL_INTERACT ?
4723 "Please enter your authentication name" : NULL,
4724 NULL,
4725 pass_result == SASL_INTERACT ?
4726 "Please enter your password" : NULL, NULL,
4727 NULL, NULL, NULL,
4728 realm_chal ? realm_chal : "{}",
4729 realm_result == SASL_INTERACT ?
4730 "Please enter your realm" : NULL,
4731 params->serverFQDN ? params->serverFQDN : NULL);
4732 #endif /* _INTEGRATED_SOLARIS_ */
4733
4734 if (result == SASL_OK) return SASL_INTERACT;
4735
4736 return result;
4737 }
4738
4739 if (oparams->authid == NULL) {
4740 if (!userid || !*userid) {
4741 result = params->canon_user(params->utils->conn, authid, 0,
4742 SASL_CU_AUTHID | SASL_CU_AUTHZID,
4743 oparams);
4744 }
4745 else {
4746 result = params->canon_user(params->utils->conn,
4747 authid, 0, SASL_CU_AUTHID, oparams);
4748 if (result != SASL_OK) return result;
4749
4750 result = params->canon_user(params->utils->conn,
4751 userid, 0, SASL_CU_AUTHZID, oparams);
4752 }
4753 if (result != SASL_OK) return result;
4754 }
4755
4756 /* Get an allocated version of the realm into the structure */
4757 if (realm && text->realm == NULL) {
4758 _plug_strdup(params->utils, realm, (char **) &text->realm, NULL);
4759 }
4760
4761 return result;
4762 }
4763
4764 static int
4765 digestmd5_client_mech_new(void *glob_context,
4766 sasl_client_params_t * params,
4767 void **conn_context)
4768 {
4769 context_t *text;
4770
4771 /* holds state are in -- allocate client size */
4772 text = params->utils->malloc(sizeof(client_context_t));
4773 if (text == NULL)
4774 return SASL_NOMEM;
4775 memset(text, 0, sizeof(client_context_t));
4776
4777 text->state = 1;
4778 text->i_am = CLIENT;
4779 text->reauth = glob_context;
4780
4781 *conn_context = text;
4782
4783 return SASL_OK;
4784 }
4785
4786 static int
4787 digestmd5_client_mech_step1(client_context_t *ctext,
4788 sasl_client_params_t *params,
4789 const char *serverin __attribute__((unused)),
4790 unsigned serverinlen __attribute__((unused)),
4791 sasl_interact_t **prompt_need,
4792 const char **clientout,
4793 unsigned *clientoutlen,
4794 sasl_out_params_t *oparams)
4795 {
4796 context_t *text = (context_t *) ctext;
4797 int result = SASL_FAIL;
4798 unsigned val;
4799
4800 params->utils->log(params->utils->conn, SASL_LOG_DEBUG,
4801 "DIGEST-MD5 client step 1");
4802
4803 result = ask_user_info(ctext, params, NULL, 0, prompt_need, oparams);
4804 if (result != SASL_OK) return result;
4805
4806 /* check if we have cached info for this user on this server */
4807 val = hash(params->serverFQDN) % text->reauth->size;
4808 if (params->utils->mutex_lock(text->reauth->mutex) == SASL_OK) { /* LOCK */
4809 if (text->reauth->e[val].u.c.serverFQDN &&
4810 !strcasecmp(text->reauth->e[val].u.c.serverFQDN,
4811 params->serverFQDN) &&
4812 !strcmp(text->reauth->e[val].authid, oparams->authid)) {
4813
4814 #ifdef _SUN_SDK_
4815 if (text->realm) params->utils->free(text->realm);
4816 if (text->nonce) params->utils->free(text->nonce);
4817 if (text->cnonce) params->utils->free(text->cnonce);
4818 #endif /* _SUN_SDK_ */
4819 /* we have info, so use it */
4820 _plug_strdup(params->utils, text->reauth->e[val].realm,
4821 &text->realm, NULL);
4822 #ifdef _SUN_SDK_
4823 _plug_strdup(params->utils, (char *)text->reauth->e[val].nonce,
4824 (char **) &text->nonce, NULL);
4825 #else
4826 _plug_strdup(params->utils, text->reauth->e[val].nonce,
4827 (char **) &text->nonce, NULL);
4828 #endif /* _SUN_SDK_ */
4829 text->nonce_count = ++text->reauth->e[val].nonce_count;
4830 #ifdef _SUN_SDK_
4831 _plug_strdup(params->utils, (char *)text->reauth->e[val].cnonce,
4832 (char **) &text->cnonce, NULL);
4833 #else
4834 _plug_strdup(params->utils, text->reauth->e[val].cnonce,
4835 (char **) &text->cnonce, NULL);
4836 #endif /* _SUN_SDK_ */
4837 ctext->protection = text->reauth->e[val].u.c.protection;
4838 ctext->cipher = text->reauth->e[val].u.c.cipher;
4839 ctext->server_maxbuf = text->reauth->e[val].u.c.server_maxbuf;
4840 }
4841 params->utils->mutex_unlock(text->reauth->mutex); /* UNLOCK */
4842 }
4843
4844 if (!text->nonce) {
4845 /* we don't have any reauth info, so just return
4846 * that there is no initial client send */
4847 text->state = 2;
4848 return SASL_CONTINUE;
4849 }
4850
4851 /*
4852 * (username | realm | nonce | cnonce | nonce-count | qop digest-uri |
4853 * response | maxbuf | charset | auth-param )
4854 */
4855
4856 result = make_client_response(text, params, oparams);
4857 if (result != SASL_OK) return result;
4858
4859 *clientoutlen = strlen(text->out_buf);
4860 *clientout = text->out_buf;
4861
4862 text->state = 3;
4863 return SASL_CONTINUE;
4864 }
4865
4866 static int
4867 digestmd5_client_mech_step2(client_context_t *ctext,
4868 sasl_client_params_t *params,
4869 const char *serverin,
4870 unsigned serverinlen,
4871 sasl_interact_t **prompt_need,
4872 const char **clientout,
4873 unsigned *clientoutlen,
4874 sasl_out_params_t *oparams)
4875 {
4876 context_t *text = (context_t *) ctext;
4877 int result = SASL_FAIL;
4878 char **realms = NULL;
4879 int nrealm = 0;
4880
4881 params->utils->log(params->utils->conn, SASL_LOG_DEBUG,
4882 "DIGEST-MD5 client step 2");
4883
4884 if (params->props.min_ssf > params->props.max_ssf) {
4885 return SASL_BADPARAM;
4886 }
4887
4888 /* don't bother parsing the challenge more than once */
4889 if (text->nonce == NULL) {
4890 result = parse_server_challenge(ctext, params, serverin, serverinlen,
4891 &realms, &nrealm);
4892 if (result != SASL_OK) goto FreeAllocatedMem;
4893
4894 if (nrealm == 1) {
4895 /* only one choice! */
4896 text->realm = realms[0];
4897
4898 /* free realms */
4899 params->utils->free(realms);
4900 realms = NULL;
4901 }
4902 }
4903
4904 result = ask_user_info(ctext, params, realms, nrealm,
4905 prompt_need, oparams);
4906 if (result != SASL_OK) goto FreeAllocatedMem;
4907
4908 /*
4909 * (username | realm | nonce | cnonce | nonce-count | qop digest-uri |
4910 * response | maxbuf | charset | auth-param )
4911 */
4912
4913 result = make_client_response(text, params, oparams);
4914 if (result != SASL_OK) goto FreeAllocatedMem;
4915
4916 *clientoutlen = strlen(text->out_buf);
4917 *clientout = text->out_buf;
4918
4919 text->state = 3;
4920
4921 result = SASL_CONTINUE;
4922
4923 FreeAllocatedMem:
4924 if (realms) {
4925 int lup;
4926
4927 /* need to free all the realms */
4928 for (lup = 0;lup < nrealm; lup++)
4929 params->utils->free(realms[lup]);
4930
4931 params->utils->free(realms);
4932 }
4933
4934 return result;
4935 }
4936
4937 static int
4938 digestmd5_client_mech_step3(client_context_t *ctext,
4939 sasl_client_params_t *params,
4940 const char *serverin,
4941 unsigned serverinlen,
4942 sasl_interact_t **prompt_need __attribute__((unused)),
4943 const char **clientout __attribute__((unused)),
4944 unsigned *clientoutlen __attribute__((unused)),
4945 sasl_out_params_t *oparams)
4946 {
4947 context_t *text = (context_t *) ctext;
4948 char *in = NULL;
4949 char *in_start;
4950 int result = SASL_FAIL;
4951
4952 params->utils->log(params->utils->conn, SASL_LOG_DEBUG,
4953 "DIGEST-MD5 client step 3");
4954
4955 /* Verify that server is really what they claim to be */
4956 in_start = in = params->utils->malloc(serverinlen + 1);
4957 if (in == NULL) return SASL_NOMEM;
4958
4959 memcpy(in, serverin, serverinlen);
4960 in[serverinlen] = 0;
4961
4962 /* parse the response */
4963 while (in[0] != '\0') {
4964 char *name, *value;
4965 get_pair(&in, &name, &value);
4966
4967 if (name == NULL) {
4968 #ifdef _SUN_SDK_
4969 params->utils->log(params->utils->conn, SASL_LOG_ERR,
4970 "DIGEST-MD5 Received Garbage");
4971 #else
4972 params->utils->seterror(params->utils->conn, 0,
4973 "DIGEST-MD5 Received Garbage");
4974 #endif /* _SUN_SDK_ */
4975 break;
4976 }
4977
4978 if (strcasecmp(name, "rspauth") == 0) {
4979
4980 if (strcmp(text->response_value, value) != 0) {
4981 #ifdef _INTEGRATED_SOLARIS_
4982 params->utils->seterror(params->utils->conn, 0,
4983 gettext("Server authentication failed"));
4984 #else
4985 params->utils->seterror(params->utils->conn, 0,
4986 "DIGEST-MD5: This server wants us to believe that he knows shared secret");
4987 #endif /* _INTEGRATED_SOLARIS_ */
4988 result = SASL_FAIL;
4989 } else {
4990 oparams->doneflag = 1;
4991 oparams->param_version = 0;
4992
4993 result = SASL_OK;
4994 }
4995 break;
4996 } else {
4997 params->utils->log(params->utils->conn, SASL_LOG_DEBUG,
4998 "DIGEST-MD5 unrecognized pair %s/%s: ignoring",
4999 name, value);
5000 }
5001 }
5002
5003 params->utils->free(in_start);
5004
5005 if (params->utils->mutex_lock(text->reauth->mutex) == SASL_OK) { /* LOCK */
5006 unsigned val = hash(params->serverFQDN) % text->reauth->size;
5007 switch (result) {
5008 case SASL_OK:
5009 if (text->nonce_count == 1) {
5010 /* successful initial auth, setup for future reauth */
5011 clear_reauth_entry(&text->reauth->e[val], CLIENT, params->utils);
5012 _plug_strdup(params->utils, oparams->authid,
5013 &text->reauth->e[val].authid, NULL);
5014 text->reauth->e[val].realm = text->realm; text->realm = NULL;
5015 text->reauth->e[val].nonce = text->nonce; text->nonce = NULL;
5016 text->reauth->e[val].nonce_count = text->nonce_count;
5017 text->reauth->e[val].cnonce = text->cnonce; text->cnonce = NULL;
5018 _plug_strdup(params->utils, params->serverFQDN,
5019 &text->reauth->e[val].u.c.serverFQDN, NULL);
5020 text->reauth->e[val].u.c.protection = ctext->protection;
5021 text->reauth->e[val].u.c.cipher = ctext->cipher;
5022 text->reauth->e[val].u.c.server_maxbuf = ctext->server_maxbuf;
5023 }
5024 #ifndef _SUN_SDK_
5025 else {
5026 /* reauth, we already incremented nonce_count */
5027 }
5028 #endif /* !_SUN_SDK_ */
5029 break;
5030 default:
5031 if (text->nonce_count > 1) {
5032 /* failed reauth, clear cache */
5033 clear_reauth_entry(&text->reauth->e[val], CLIENT, params->utils);
5034 }
5035 else {
5036 /* failed initial auth, leave existing cache */
5037 }
5038 }
5039 params->utils->mutex_unlock(text->reauth->mutex); /* UNLOCK */
5040 }
5041
5042 return result;
5043 }
5044
5045 static int
5046 digestmd5_client_mech_step(void *conn_context,
5047 sasl_client_params_t *params,
5048 const char *serverin,
5049 unsigned serverinlen,
5050 sasl_interact_t **prompt_need,
5051 const char **clientout,
5052 unsigned *clientoutlen,
5053 sasl_out_params_t *oparams)
5054 {
5055 context_t *text = (context_t *) conn_context;
5056 client_context_t *ctext = (client_context_t *) conn_context;
5057 unsigned val = hash(params->serverFQDN) % text->reauth->size;
5058
5059 if (serverinlen > 2048) return SASL_BADPROT;
5060
5061 *clientout = NULL;
5062 *clientoutlen = 0;
5063
5064 switch (text->state) {
5065
5066 case 1:
5067 if (!serverin) {
5068 /* here's where we attempt fast reauth if possible */
5069 int reauth = 0;
5070
5071 /* check if we have saved info for this server */
5072 if (params->utils->mutex_lock(text->reauth->mutex) == SASL_OK) { /* LOCK */
5073 reauth = text->reauth->e[val].u.c.serverFQDN &&
5074 !strcasecmp(text->reauth->e[val].u.c.serverFQDN,
5075 params->serverFQDN);
5076 params->utils->mutex_unlock(text->reauth->mutex); /* UNLOCK */
5077 }
5078 if (reauth) {
5079 return digestmd5_client_mech_step1(ctext, params,
5080 serverin, serverinlen,
5081 prompt_need,
5082 clientout, clientoutlen,
5083 oparams);
5084 }
5085 else {
5086 /* we don't have any reauth info, so just return
5087 * that there is no initial client send */
5088 text->state = 2;
5089 return SASL_CONTINUE;
5090 }
5091 }
5092
5093 /* fall through and respond to challenge */
5094 /* FALLTHROUGH */
5095
5096 case 3:
5097 if (serverin && !strncasecmp(serverin, "rspauth=", 8)) {
5098 return digestmd5_client_mech_step3(ctext, params,
5099 serverin, serverinlen,
5100 prompt_need,
5101 clientout, clientoutlen,
5102 oparams);
5103 }
5104
5105 /* fall through and respond to challenge */
5106 text->state = 2;
5107
5108 /* cleanup after a failed reauth attempt */
5109 if (params->utils->mutex_lock(text->reauth->mutex) == SASL_OK) { /* LOCK */
5110 clear_reauth_entry(&text->reauth->e[val], CLIENT, params->utils);
5111
5112 params->utils->mutex_unlock(text->reauth->mutex); /* UNLOCK */
5113 }
5114
5115 if (text->realm) params->utils->free(text->realm);
5116 if (text->nonce) params->utils->free(text->nonce);
5117 if (text->cnonce) params->utils->free(text->cnonce);
5118 #ifdef _SUN_SDK_
5119 text->realm = NULL;
5120 text->nonce = text->cnonce = NULL;
5121 #else
5122 text->realm = text->nonce = text->cnonce = NULL;
5123 #endif /* _SUN_SDK_ */
5124 ctext->cipher = NULL;
5125 /* FALLTHROUGH */
5126
5127 case 2:
5128 return digestmd5_client_mech_step2(ctext, params,
5129 serverin, serverinlen,
5130 prompt_need,
5131 clientout, clientoutlen,
5132 oparams);
5133
5134 default:
5135 #ifdef _SUN_SDK_
5136 params->utils->log(params->utils->conn, SASL_LOG_ERR,
5137 "Invalid DIGEST-MD5 client step %d", text->state);
5138 #else
5139 params->utils->log(NULL, SASL_LOG_ERR,
5140 "Invalid DIGEST-MD5 client step %d\n", text->state);
5141 #endif /* _SUN_SDK_ */
5142 return SASL_FAIL;
5143 }
5144
5145 return SASL_FAIL; /* should never get here */
5146 }
5147
5148 static void
5149 digestmd5_client_mech_dispose(void *conn_context, const sasl_utils_t *utils)
5150 {
5151 client_context_t *ctext = (client_context_t *) conn_context;
5152
5153 if (!ctext || !utils) return;
5154
5155 #ifdef _INTEGRATED_SOLARIS_
5156 convert_prompt(utils, &ctext->h, NULL);
5157 #endif /* _INTEGRATED_SOLARIS_ */
5158
5159 if (ctext->free_password) _plug_free_secret(utils, &ctext->password);
5160
5161 digestmd5_common_mech_dispose(conn_context, utils);
5162 }
5163
5164 static sasl_client_plug_t digestmd5_client_plugins[] =
5165 {
5166 {
5167 "DIGEST-MD5",
5168 #ifdef WITH_RC4 /* mech_name */
5169 128, /* max ssf */
5170 #elif WITH_DES
5171 112,
5172 #else
5173 0,
5174 #endif
5175 SASL_SEC_NOPLAINTEXT
5176 | SASL_SEC_NOANONYMOUS
5177 | SASL_SEC_MUTUAL_AUTH, /* security_flags */
5178 SASL_FEAT_ALLOWS_PROXY, /* features */
5179 NULL, /* required_prompts */
5180 NULL, /* glob_context */
5181 &digestmd5_client_mech_new, /* mech_new */
5182 &digestmd5_client_mech_step, /* mech_step */
5183 &digestmd5_client_mech_dispose, /* mech_dispose */
5184 &digestmd5_common_mech_free, /* mech_free */
5185 NULL, /* idle */
5186 NULL, /* spare1 */
5187 NULL /* spare2 */
5188 }
5189 };
5190
5191 int digestmd5_client_plug_init(sasl_utils_t *utils,
5192 int maxversion,
5193 int *out_version,
5194 sasl_client_plug_t **pluglist,
5195 int *plugcount)
5196 {
5197 reauth_cache_t *reauth_cache;
5198 #if defined _SUN_SDK_ && defined USE_UEF
5199 int ret;
5200 #endif /* _SUN_SDK_ && USE_UEF */
5201
5202 if (maxversion < SASL_CLIENT_PLUG_VERSION)
5203 return SASL_BADVERS;
5204
5205 #if defined _SUN_SDK_ && defined USE_UEF
5206 if ((ret = uef_init(utils)) != SASL_OK)
5207 return ret;
5208 #endif /* _SUN_SDK_ && USE_UEF */
5209
5210 /* reauth cache */
5211 reauth_cache = utils->malloc(sizeof(reauth_cache_t));
5212 if (reauth_cache == NULL)
5213 return SASL_NOMEM;
5214 memset(reauth_cache, 0, sizeof(reauth_cache_t));
5215 reauth_cache->i_am = CLIENT;
5216
5217 /* mutex */
5218 reauth_cache->mutex = utils->mutex_alloc();
5219 if (!reauth_cache->mutex)
5220 return SASL_FAIL;
5221
5222 /* entries */
5223 reauth_cache->size = 10;
5224 reauth_cache->e = utils->malloc(reauth_cache->size *
5225 sizeof(reauth_entry_t));
5226 if (reauth_cache->e == NULL)
5227 return SASL_NOMEM;
5228 memset(reauth_cache->e, 0, reauth_cache->size * sizeof(reauth_entry_t));
5229
5230 digestmd5_client_plugins[0].glob_context = reauth_cache;
5231 #ifdef _SUN_SDK_
5232 #ifdef USE_UEF_CLIENT
5233 digestmd5_client_plugins[0].max_ssf = uef_max_ssf;
5234 #endif /* USE_UEF_CLIENT */
5235 #endif /* _SUN_SDK_ */
5236
5237 #ifdef _INTEGRATED_SOLARIS_
5238 /*
5239 * Let libsasl know that we are a "Sun" plugin so that privacy
5240 * and integrity will be allowed.
5241 */
5242 REG_PLUG("DIGEST-MD5", digestmd5_client_plugins);
5243 #endif /* _INTEGRATED_SOLARIS_ */
5244
5245 *out_version = SASL_CLIENT_PLUG_VERSION;
5246 *pluglist = digestmd5_client_plugins;
5247 *plugcount = 1;
5248
5249 return SASL_OK;
5250 }
5251
5252 #ifdef _SUN_SDK_
5253 #ifdef USE_UEF
5254 /* If we fail here - we should just not offer privacy or integrity */
5255 static int
5256 getSlotID(const sasl_utils_t *utils, CK_MECHANISM_TYPE mech_type,
5257 CK_SLOT_ID *slot_id)
5258 {
5259 CK_RV rv;
5260 CK_ULONG ulSlotCount;
5261 CK_ULONG ulMechTypeCount;
5262 CK_SLOT_ID *pSlotList = NULL;
5263 CK_SLOT_ID slotID;
5264 CK_MECHANISM_TYPE_PTR pMechTypeList = NULL;
5265 int i, m;
5266
5267 rv = C_GetSlotList(CK_FALSE, NULL_PTR, &ulSlotCount);
5268 if (rv != CKR_OK || ulSlotCount == 0) {
5269 #ifdef DEBUG
5270 utils->log(utils->conn, SASL_LOG_DEBUG,
5271 "C_GetSlotList: 0x%.8X count:%d\n", rv, ulSlotCount);
5272 #endif
5273 return SASL_FAIL;
5274 }
5275
5276 pSlotList = utils->calloc(sizeof (CK_SLOT_ID), ulSlotCount);
5277 if (pSlotList == NULL)
5278 return SASL_NOMEM;
5279
5280 rv = C_GetSlotList(CK_FALSE, pSlotList, &ulSlotCount);
5281 if (rv != CKR_OK) {
5282 #ifdef DEBUG
5283 utils->log(utils->conn, SASL_LOG_DEBUG,
5284 "C_GetSlotList: 0x%.8X count:%d\n", rv, ulSlotCount);
5285 #endif
5286 return SASL_FAIL;
5287 }
5288
5289 for (i = 0; i < ulSlotCount; i++) {
5290 slotID = pSlotList[i];
5291 rv = C_GetMechanismList(slotID, NULL_PTR, &ulMechTypeCount);
5292 if (rv != CKR_OK) {
5293 #ifdef DEBUG
5294 utils->log(utils->conn, SASL_LOG_DEBUG,
5295 "C_GetMechanismList returned 0x%.8X count:%d\n", rv,
5296 ulMechTypeCount);
5297 #endif
5298 utils->free(pSlotList);
5299 return SASL_FAIL;
5300 }
5301 pMechTypeList =
5302 utils->calloc(sizeof (CK_MECHANISM_TYPE), ulMechTypeCount);
5303 if (pMechTypeList == NULL_PTR) {
5304 utils->free(pSlotList);
5305 return SASL_NOMEM;
5306 }
5307 rv = C_GetMechanismList(slotID, pMechTypeList, &ulMechTypeCount);
5308 if (rv != CKR_OK) {
5309 #ifdef DEBUG
5310 utils->log(utils->conn, SASL_LOG_DEBUG,
5311 "C_GetMechanismList returned 0x%.8X count:%d\n", rv,
5312 ulMechTypeCount);
5313 #endif
5314 utils->free(pMechTypeList);
5315 utils->free(pSlotList);
5316 return SASL_FAIL;
5317 }
5318
5319 for (m = 0; m < ulMechTypeCount; m++) {
5320 if (pMechTypeList[m] == mech_type)
5321 break;
5322 }
5323 utils->free(pMechTypeList);
5324 pMechTypeList = NULL;
5325 if (m < ulMechTypeCount)
5326 break;
5327 }
5328 utils->free(pSlotList);
5329 if (i < ulSlotCount) {
5330 *slot_id = slotID;
5331 return SASL_OK;
5332 }
5333 return SASL_FAIL;
5334 }
5335
5336 static int
5337 uef_init(const sasl_utils_t *utils)
5338 {
5339 int got_rc4;
5340 int got_des;
5341 int got_3des;
5342 int next_c;
5343 CK_RV rv;
5344
5345 if (got_uef_slot)
5346 return (SASL_OK);
5347
5348 if (LOCK_MUTEX(&uef_init_mutex) < 0)
5349 return (SASL_FAIL);
5350
5351 rv = C_Initialize(NULL_PTR);
5352 if (rv != CKR_OK && rv != CKR_CRYPTOKI_ALREADY_INITIALIZED) {
5353 #ifdef DEBUG
5354 utils->log(utils->conn, SASL_LOG_DEBUG,
5355 "C_Initialize returned 0x%.8X\n", rv);
5356 #endif
5357 return SASL_FAIL;
5358 }
5359
5360 got_rc4 = getSlotID(utils, CKM_RC4, &rc4_slot_id) == SASL_OK;
5361 if (!got_rc4)
5362 utils->log(utils->conn, SASL_LOG_WARN, "Could not get rc4");
5363
5364 got_des = getSlotID(utils, CKM_DES_CBC, &des_slot_id) == SASL_OK;
5365 if (!got_des)
5366 utils->log(utils->conn, SASL_LOG_WARN, "Could not get des");
5367
5368 got_3des = getSlotID(utils, CKM_DES3_CBC, &des3_slot_id) == SASL_OK;
5369 if (!got_3des)
5370 utils->log(utils->conn, SASL_LOG_WARN, "Could not get 3des");
5371
5372 uef_max_ssf = got_rc4 ? 128 : got_3des ? 112 : got_des ? 55 : 0;
5373
5374 /* adjust the available ciphers */
5375 next_c = (got_rc4) ? 3 : 0;
5376
5377 if (got_des) {
5378 uef_ciphers[next_c].name = uef_ciphers[DES_CIPHER_INDEX].name;
5379 uef_ciphers[next_c].ssf = uef_ciphers[DES_CIPHER_INDEX].ssf;
5380 uef_ciphers[next_c].n = uef_ciphers[DES_CIPHER_INDEX].n;
5381 uef_ciphers[next_c].flag = uef_ciphers[DES_CIPHER_INDEX].flag;
5382 uef_ciphers[next_c].cipher_enc =
5383 uef_ciphers[DES_CIPHER_INDEX].cipher_enc;
5384 uef_ciphers[next_c].cipher_dec =
5385 uef_ciphers[DES_CIPHER_INDEX].cipher_dec;
5386 uef_ciphers[next_c].cipher_init =
5387 uef_ciphers[DES_CIPHER_INDEX].cipher_init;
5388 next_c++;
5389 }
5390
5391 if (got_3des) {
5392 uef_ciphers[next_c].name = uef_ciphers[DES3_CIPHER_INDEX].name;
5393 uef_ciphers[next_c].ssf = uef_ciphers[DES3_CIPHER_INDEX].ssf;
5394 uef_ciphers[next_c].n = uef_ciphers[DES3_CIPHER_INDEX].n;
5395 uef_ciphers[next_c].flag = uef_ciphers[DES3_CIPHER_INDEX].flag;
5396 uef_ciphers[next_c].cipher_enc =
5397 uef_ciphers[DES3_CIPHER_INDEX].cipher_enc;
5398 uef_ciphers[next_c].cipher_dec =
5399 uef_ciphers[DES3_CIPHER_INDEX].cipher_dec;
5400 uef_ciphers[next_c].cipher_init =
5401 uef_ciphers[DES3_CIPHER_INDEX].cipher_init;
5402 next_c++;
5403 }
5404 uef_ciphers[next_c].name = NULL;
5405
5406 got_uef_slot = TRUE;
5407 UNLOCK_MUTEX(&uef_init_mutex);
5408
5409 return (SASL_OK);
5410 }
5411 #endif /* USE_UEF */
5412 #endif /* _SUN_SDK_ */
5413