external.c revision 7c478bd95313f5f23a4c958a745db2134aa03244
/*
* Copyright 2004 Sun Microsystems, Inc. All rights reserved.
* Use is subject to license terms.
*/
#pragma ident "%Z%%M% %I% %E% SMI"
/* SASL server API implementation
* Rob Siemborski
* Tim Martin
* $Id: external.c,v 1.19 2003/04/08 17:30:54 rjs3 Exp $
*/
/*
* Copyright (c) 1998-2003 Carnegie Mellon University. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
*
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in
* the documentation and/or other materials provided with the
* distribution.
*
* 3. The name "Carnegie Mellon University" must not be used to
* endorse or promote products derived from this software without
* prior written permission. For permission or any other legal
* details, please contact
* Office of Technology Transfer
* Carnegie Mellon University
* 5000 Forbes Avenue
* Pittsburgh, PA 15213-3890
* (412) 268-4387, fax: (412) 268-7395
* tech-transfer@andrew.cmu.edu
*
* 4. Redistributions of any form whatsoever must retain the following
* acknowledgment:
* "This product includes software developed by Computing Services
* at Carnegie Mellon University (http://www.cmu.edu/computing/)."
*
* CARNEGIE MELLON UNIVERSITY DISCLAIMS ALL WARRANTIES WITH REGARD TO
* THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
* AND FITNESS, IN NO EVENT SHALL CARNEGIE MELLON UNIVERSITY BE LIABLE
* FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
* AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
* OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
*/
#include <config.h>
#include <stdio.h>
#include <stdlib.h>
#include <limits.h>
#include <ctype.h>
#include <string.h>
#include <sasl.h>
#include <saslplug.h>
#include "saslint.h"
#include <plugin_common.h>
/***************************** Common Section *****************************/
#ifndef _SUN_SDK_
static const char plugin_id[] = "$Id: external.c,v 1.19 2003/04/08 17:30:54 rjs3 Exp $";
#endif /* !_SUN_SDK_ */
/***************************** Server Section *****************************/
static int
external_server_mech_new(void *glob_context __attribute__((unused)),
sasl_server_params_t *sparams,
const char *challenge __attribute__((unused)),
unsigned challen __attribute__((unused)),
void **conn_context)
{
if (!conn_context
|| !sparams
|| !sparams->utils
|| !sparams->utils->conn)
return SASL_BADPARAM;
if (!sparams->utils->conn->external.auth_id)
return SASL_NOMECH;
*conn_context = NULL;
return SASL_OK;
}
static int
external_server_mech_step(void *conn_context __attribute__((unused)),
sasl_server_params_t *sparams,
const char *clientin,
unsigned clientinlen,
const char **serverout,
unsigned *serveroutlen,
sasl_out_params_t *oparams)
{
int result;
if (!sparams
|| !sparams->utils
|| !sparams->utils->conn
|| !sparams->utils->getcallback
|| !serverout
|| !serveroutlen
|| !oparams)
return SASL_BADPARAM;
if (!sparams->utils->conn->external.auth_id)
return SASL_BADPROT;
if ((sparams->props.security_flags & SASL_SEC_NOANONYMOUS) &&
(!strcmp(sparams->utils->conn->external.auth_id, "anonymous"))) {
#ifdef _INTEGRATED_SOLARIS_
sasl_seterror(sparams->utils->conn,0,
gettext("anonymous login not allowed"));
#else
sasl_seterror(sparams->utils->conn,0,"anonymous login not allowed");
#endif /* _INTEGRATED_SOLARIS_ */
return SASL_NOAUTHZ;
}
*serverout = NULL;
*serveroutlen = 0;
if (!clientin) {
/* No initial data; we're in a protocol which doesn't support it.
* So we let the server app know that we need some... */
return SASL_CONTINUE;
}
if (clientinlen) { /* if we have a non-zero authorization id */
/* The user's trying to authorize as someone they didn't
* authenticate as */
result = sparams->canon_user(sparams->utils->conn,
clientin, 0, SASL_CU_AUTHZID, oparams);
if(result != SASL_OK) return result;
result = sparams->canon_user(sparams->utils->conn,
sparams->utils->conn->external.auth_id, 0,
SASL_CU_AUTHID, oparams);
} else {
result = sparams->canon_user(sparams->utils->conn,
sparams->utils->conn->external.auth_id, 0,
SASL_CU_AUTHID | SASL_CU_AUTHZID, oparams);
}
if (result != SASL_OK) return result;
/* set oparams */
oparams->doneflag = 1;
oparams->mech_ssf = 0;
oparams->maxoutbuf = 0;
oparams->encode_context = NULL;
oparams->encode = NULL;
oparams->decode_context = NULL;
oparams->decode = NULL;
oparams->param_version = 0;
return SASL_OK;
}
static int
external_server_mech_avail(void *glob_context __attribute__((unused)),
sasl_server_params_t *sparams,
void **conn_context __attribute__((unused)))
{
if (!sparams->utils->conn->external.auth_id)
return SASL_NOMECH;
return SASL_OK;
}
static sasl_server_plug_t external_server_plugins[] =
{
{
"EXTERNAL", /* mech_name */
0, /* max_ssf */
SASL_SEC_NOPLAINTEXT
| SASL_SEC_NOANONYMOUS
| SASL_SEC_NODICTIONARY, /* security_flags */
SASL_FEAT_WANT_CLIENT_FIRST
| SASL_FEAT_ALLOWS_PROXY, /* features */
NULL, /* glob_context */
&external_server_mech_new, /* mech_new */
&external_server_mech_step, /* mech_step */
NULL, /* mech_dispose */
NULL, /* mech_free */
NULL, /* setpass */
NULL, /* user_query */
NULL, /* idle */
&external_server_mech_avail, /* mech_avail */
NULL /* spare */
}
};
int external_server_plug_init(const sasl_utils_t *utils,
int max_version,
int *out_version,
sasl_server_plug_t **pluglist,
int *plugcount)
{
if (!out_version || !pluglist || !plugcount)
return SASL_BADPARAM;
if (max_version != SASL_SERVER_PLUG_VERSION) {
#ifdef _SUN_SDK_
utils->log(utils->conn, SASL_LOG_ERR, "EXTERNAL version mismatch");
#else
SETERROR( utils, "EXTERNAL version mismatch" );
#endif /* _SUN_SDK_ */
return SASL_BADVERS;
}
*out_version = SASL_SERVER_PLUG_VERSION;
*pluglist = external_server_plugins;
*plugcount = 1;
return SASL_OK;
}
/***************************** Client Section *****************************/
typedef struct client_context
{
char *out_buf;
#ifdef _SUN_SDK_
unsigned out_buf_len;
#else
size_t out_buf_len;
#endif /* _SUN_SDK_ */
#ifdef _INTEGRATED_SOLARIS_
void *h;
#endif /* _INTEGRATED_SOLARIS_ */
} client_context_t;
static int external_client_mech_new(void *glob_context __attribute__((unused)),
sasl_client_params_t *params,
void **conn_context)
{
client_context_t *text;
if (!params
|| !params->utils
|| !params->utils->conn
|| !conn_context)
return SASL_BADPARAM;
if (!params->utils->conn->external.auth_id)
return SASL_NOMECH;
#ifdef _SUN_SDK_
text = params->utils->malloc(sizeof(client_context_t));
#else
text = sasl_ALLOC(sizeof(client_context_t));
#endif /* _SUN_SDK_ */
if(!text) return SASL_NOMEM;
memset(text, 0, sizeof(client_context_t));
*conn_context = text;
return SASL_OK;
}
static int
external_client_mech_step(void *conn_context,
sasl_client_params_t *params,
const char *serverin __attribute__((unused)),
unsigned serverinlen,
sasl_interact_t **prompt_need,
const char **clientout,
unsigned *clientoutlen,
sasl_out_params_t *oparams)
{
client_context_t *text = (client_context_t *)conn_context;
const char *user = NULL;
int user_result = SASL_OK;
int result;
if (!params
|| !params->utils
|| !params->utils->conn
|| !params->utils->getcallback
|| !clientout
|| !clientoutlen
|| !oparams)
return SASL_BADPARAM;
if (!params->utils->conn->external.auth_id)
return SASL_BADPROT;
if (serverinlen != 0)
return SASL_BADPROT;
*clientout = NULL;
*clientoutlen = 0;
/* try to get the userid */
if (user == NULL) {
user_result = _plug_get_userid(params->utils, &user, prompt_need);
if ((user_result != SASL_OK) && (user_result != SASL_INTERACT))
return user_result;
}
/* free prompts we got */
if (prompt_need && *prompt_need) {
params->utils->free(*prompt_need);
*prompt_need = NULL;
}
/* if there are prompts not filled in */
if (user_result == SASL_INTERACT) {
/* make the prompt list */
int result =
#ifdef _INTEGRATED_SOLARIS_
_plug_make_prompts(params->utils, &text->h, prompt_need,
user_result == SASL_INTERACT ?
convert_prompt(params->utils, &text->h,
gettext("Please enter your authorization name"))
: NULL,
#else
_plug_make_prompts(params->utils, prompt_need,
user_result == SASL_INTERACT ?
"Please enter your authorization name" : NULL,
#endif /* _INTEGRATED_SOLARIS_ */
"",
NULL, NULL,
NULL, NULL,
NULL, NULL, NULL,
NULL, NULL, NULL);
if (result != SASL_OK) return result;
return SASL_INTERACT;
}
*clientoutlen = user ? strlen(user) : 0;
#ifdef _SUN_SDK_
result = _plug_buf_alloc(params->utils, &text->out_buf,
&text->out_buf_len, *clientoutlen + 1);
#else
result = _buf_alloc(&text->out_buf, &text->out_buf_len, *clientoutlen + 1);
#endif /* _SUN_SDK_ */
if (result != SASL_OK) return result;
if (user && *user) {
result = params->canon_user(params->utils->conn,
user, 0, SASL_CU_AUTHZID, oparams);
if (result != SASL_OK) return result;
result = params->canon_user(params->utils->conn,
params->utils->conn->external.auth_id, 0,
SASL_CU_AUTHID, oparams);
if (result != SASL_OK) return result;
memcpy(text->out_buf, user, *clientoutlen);
} else {
result = params->canon_user(params->utils->conn,
params->utils->conn->external.auth_id, 0,
SASL_CU_AUTHID | SASL_CU_AUTHZID, oparams);
if (result != SASL_OK) return result;
}
text->out_buf[*clientoutlen] = '\0';
*clientout = text->out_buf;
/* set oparams */
oparams->doneflag = 1;
oparams->mech_ssf = 0;
oparams->maxoutbuf = 0;
oparams->encode_context = NULL;
oparams->encode = NULL;
oparams->decode_context = NULL;
oparams->decode = NULL;
oparams->param_version = 0;
return SASL_OK;
}
static void
external_client_mech_dispose(void *conn_context,
const sasl_utils_t *utils __attribute__((unused)))
{
client_context_t *text = (client_context_t *) conn_context;
if (!text) return;
#ifdef _INTEGRATED_SOLARIS_
convert_prompt(utils, &text->h, NULL);
#endif /* _INTEGRATED_SOLARIS_ */
#ifdef _SUN_SDK_
if(text->out_buf) utils->free(text->out_buf);
utils->free(text);
#else
if(text->out_buf) sasl_FREE(text->out_buf);
sasl_FREE(text);
#endif /* _SUN_SDK_ */
}
#ifdef _SUN_SDK_
static const unsigned long external_required_prompts[] = {
#else
static const long external_required_prompts[] = {
#endif /* _SUN_SDK_ */
SASL_CB_LIST_END
};
static sasl_client_plug_t external_client_plugins[] =
{
{
"EXTERNAL", /* mech_name */
0, /* max_ssf */
SASL_SEC_NOPLAINTEXT
| SASL_SEC_NOANONYMOUS
| SASL_SEC_NODICTIONARY, /* security_flags */
SASL_FEAT_WANT_CLIENT_FIRST
| SASL_FEAT_ALLOWS_PROXY, /* features */
external_required_prompts, /* required_prompts */
NULL, /* glob_context */
&external_client_mech_new, /* mech_new */
&external_client_mech_step, /* mech_step */
&external_client_mech_dispose, /* mech_dispose */
NULL, /* mech_free */
NULL, /* idle */
NULL, /* spare */
NULL /* spare */
}
};
int external_client_plug_init(const sasl_utils_t *utils,
int max_version,
int *out_version,
sasl_client_plug_t **pluglist,
int *plugcount)
{
if (!utils || !out_version || !pluglist || !plugcount)
return SASL_BADPARAM;
if (max_version != SASL_CLIENT_PLUG_VERSION) {
#ifdef _SUN_SDK_
utils->log(utils->conn, SASL_LOG_ERR, "EXTERNAL version mismatch");
#else
SETERROR( utils, "EXTERNAL version mismatch" );
#endif /* _SUN_SDK_ */
return SASL_BADVERS;
}
*out_version = SASL_CLIENT_PLUG_VERSION;
*pluglist = external_client_plugins;
*plugcount = 1;
return SASL_OK;
}