1184588Sdfr/*- 2184588Sdfr * Copyright (c) 2008 Isilon Inc http://www.isilon.com/ 3184588Sdfr * Authors: Doug Rabson <dfr@rabson.org> 4184588Sdfr * Developed with Red Inc: Alfred Perlstein <alfred@freebsd.org> 5184588Sdfr * 6184588Sdfr * Redistribution and use in source and binary forms, with or without 7184588Sdfr * modification, are permitted provided that the following conditions 8184588Sdfr * are met: 9184588Sdfr * 1. Redistributions of source code must retain the above copyright 10184588Sdfr * notice, this list of conditions and the following disclaimer. 11184588Sdfr * 2. Redistributions in binary form must reproduce the above copyright 12184588Sdfr * notice, this list of conditions and the following disclaimer in the 13184588Sdfr * documentation and/or other materials provided with the distribution. 14184588Sdfr * 15184588Sdfr * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 16184588Sdfr * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 17184588Sdfr * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 18184588Sdfr * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 19184588Sdfr * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 20184588Sdfr * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 21184588Sdfr * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 22184588Sdfr * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 23184588Sdfr * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 24184588Sdfr * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 25184588Sdfr * SUCH DAMAGE. 26184588Sdfr */ 27184588Sdfr 28184588Sdfr#include <sys/cdefs.h> 29184588Sdfr__FBSDID("$FreeBSD$"); 30184588Sdfr 31184588Sdfr#include <sys/param.h> 32184588Sdfr#include <sys/kernel.h> 33184588Sdfr#include <sys/kobj.h> 34244370Srmacklem#include <sys/lock.h> 35184588Sdfr#include <sys/malloc.h> 36244370Srmacklem#include <sys/mutex.h> 37184588Sdfr 38184588Sdfr#include <kgssapi/gssapi.h> 39184588Sdfr#include <kgssapi/gssapi_impl.h> 40184588Sdfr#include <rpc/rpc.h> 41184588Sdfr 42184588Sdfr#include "gssd.h" 43184588Sdfr#include "kgss_if.h" 44184588Sdfr 45184588SdfrOM_uint32 gss_accept_sec_context(OM_uint32 *minor_status, 46184588Sdfr gss_ctx_id_t *context_handle, 47184588Sdfr const gss_cred_id_t acceptor_cred_handle, 48184588Sdfr const gss_buffer_t input_token, 49184588Sdfr const gss_channel_bindings_t input_chan_bindings, 50184588Sdfr gss_name_t *src_name, 51184588Sdfr gss_OID *mech_type, 52184588Sdfr gss_buffer_t output_token, 53184588Sdfr OM_uint32 *ret_flags, 54184588Sdfr OM_uint32 *time_rec, 55184588Sdfr gss_cred_id_t *delegated_cred_handle) 56184588Sdfr{ 57184588Sdfr struct accept_sec_context_res res; 58184588Sdfr struct accept_sec_context_args args; 59184588Sdfr enum clnt_stat stat; 60184588Sdfr gss_ctx_id_t ctx = *context_handle; 61184588Sdfr gss_name_t name; 62184588Sdfr gss_cred_id_t cred; 63244370Srmacklem CLIENT *cl; 64184588Sdfr 65244370Srmacklem cl = kgss_gssd_client(); 66244370Srmacklem if (cl == NULL) { 67244370Srmacklem *minor_status = 0; 68184588Sdfr return (GSS_S_FAILURE); 69244370Srmacklem } 70184588Sdfr 71184588Sdfr if (ctx) 72184588Sdfr args.ctx = ctx->handle; 73184588Sdfr else 74184588Sdfr args.ctx = 0; 75184588Sdfr if (acceptor_cred_handle) 76184588Sdfr args.cred = acceptor_cred_handle->handle; 77184588Sdfr else 78184588Sdfr args.cred = 0; 79184588Sdfr args.input_token = *input_token; 80184588Sdfr args.input_chan_bindings = input_chan_bindings; 81184588Sdfr 82184588Sdfr bzero(&res, sizeof(res)); 83244370Srmacklem stat = gssd_accept_sec_context_1(&args, &res, cl); 84244370Srmacklem CLNT_RELEASE(cl); 85184588Sdfr if (stat != RPC_SUCCESS) { 86184588Sdfr *minor_status = stat; 87184588Sdfr return (GSS_S_FAILURE); 88184588Sdfr } 89184588Sdfr 90184588Sdfr if (res.major_status != GSS_S_COMPLETE 91184588Sdfr && res.major_status != GSS_S_CONTINUE_NEEDED) { 92184588Sdfr *minor_status = res.minor_status; 93184588Sdfr xdr_free((xdrproc_t) xdr_accept_sec_context_res, &res); 94184588Sdfr return (res.major_status); 95184588Sdfr } 96184588Sdfr 97184588Sdfr *minor_status = res.minor_status; 98184588Sdfr 99184588Sdfr if (!ctx) { 100184588Sdfr ctx = kgss_create_context(res.mech_type); 101184588Sdfr if (!ctx) { 102184588Sdfr xdr_free((xdrproc_t) xdr_accept_sec_context_res, &res); 103184588Sdfr *minor_status = 0; 104184588Sdfr return (GSS_S_BAD_MECH); 105184588Sdfr } 106184588Sdfr } 107184588Sdfr *context_handle = ctx; 108184588Sdfr 109184588Sdfr ctx->handle = res.ctx; 110184588Sdfr name = malloc(sizeof(struct _gss_name_t), M_GSSAPI, M_WAITOK); 111184588Sdfr name->handle = res.src_name; 112184588Sdfr if (src_name) { 113184588Sdfr *src_name = name; 114184588Sdfr } else { 115184588Sdfr OM_uint32 junk; 116184588Sdfr gss_release_name(&junk, &name); 117184588Sdfr } 118184588Sdfr if (mech_type) 119184588Sdfr *mech_type = KGSS_MECH_TYPE(ctx); 120184588Sdfr kgss_copy_buffer(&res.output_token, output_token); 121184588Sdfr if (ret_flags) 122184588Sdfr *ret_flags = res.ret_flags; 123184588Sdfr if (time_rec) 124184588Sdfr *time_rec = res.time_rec; 125184588Sdfr cred = malloc(sizeof(struct _gss_cred_id_t), M_GSSAPI, M_WAITOK); 126184588Sdfr cred->handle = res.delegated_cred_handle; 127184588Sdfr if (delegated_cred_handle) { 128184588Sdfr *delegated_cred_handle = cred; 129184588Sdfr } else { 130184588Sdfr OM_uint32 junk; 131184588Sdfr gss_release_cred(&junk, &cred); 132184588Sdfr } 133184588Sdfr 134184588Sdfr xdr_free((xdrproc_t) xdr_accept_sec_context_res, &res); 135184588Sdfr 136184588Sdfr /* 137184588Sdfr * If the context establishment is complete, export it from 138184588Sdfr * userland and hand the result (which includes key material 139184588Sdfr * etc.) to the kernel implementation. 140184588Sdfr */ 141184588Sdfr if (res.major_status == GSS_S_COMPLETE) 142184588Sdfr res.major_status = kgss_transfer_context(ctx); 143184588Sdfr 144184588Sdfr return (res.major_status); 145184588Sdfr} 146