File: msg.c

package info (click to toggle)
gss 1.0.4-1
  • links: PTS, VCS
  • area: main
  • in suites: bookworm
  • size: 8,168 kB
  • sloc: ansic: 22,018; sh: 7,410; python: 2,873; perl: 861; makefile: 334; xml: 52; sed: 16
file content (330 lines) | stat: -rw-r--r-- 11,442 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
/* msg.c --- Implementation of GSS-API Per-Message functions.
 * Copyright (C) 2003-2022 Simon Josefsson
 *
 * This file is part of the GNU Generic Security Service Library.
 *
 * This file is free software: you can redistribute it and/or modify
 * it under the terms of either:
 *
 *  * the GNU Lesser General Public License as published by the Free
 *    Software Foundation; either version 3 of the License, or (at
 *    your option) any later version.
 *
 * or
 *
 * * the GNU General Public License as published by the Free Software
 *   Foundation; either version 2 of the License, or (at your option)
 *   any later version.
 *
 * or both in parallel, as here.
 *
 * This file is distributed in the hope that it will be useful, but
 * WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * General Public License for more details.
 *
 * You should have received copies of the GNU General Public License
 * and the GNU Lesser General Public License along with this file.  If
 * not, see <http://www.gnu.org/licenses/>.
 *
 */

#include "internal.h"

/* _gss_find_mech */
#include "meta.h"

/**
 * gss_get_mic:
 * @minor_status: (Integer, modify) Mechanism specific status code.
 * @context_handle: (gss_ctx_id_t, read) Identifies the context on
 *   which the message will be sent.
 * @qop_req: (gss_qop_t, read, optional) Specifies requested quality
 *   of protection.  Callers are encouraged, on portability grounds,
 *   to accept the default quality of protection offered by the chosen
 *   mechanism, which may be requested by specifying GSS_C_QOP_DEFAULT
 *   for this parameter.  If an unsupported protection strength is
 *   requested, gss_get_mic will return a major_status of
 *   GSS_S_BAD_QOP.
 * @message_buffer: (buffer, opaque, read) Message to be protected.
 * @message_token: (buffer, opaque, modify) Buffer to receive token.  The
 *   application must free storage associated with this buffer after
 *   use with a call to gss_release_buffer().
 *
 * Generates a cryptographic MIC for the supplied message, and places
 * the MIC in a token for transfer to the peer application. The
 * qop_req parameter allows a choice between several cryptographic
 * algorithms, if supported by the chosen mechanism.
 *
 * Since some application-level protocols may wish to use tokens
 * emitted by gss_wrap() to provide "secure framing", implementations
 * must support derivation of MICs from zero-length messages.
 *
 * Return value:
 *
 * `GSS_S_COMPLETE`: Successful completion.
 *
 * `GSS_S_CONTEXT_EXPIRED`: The context has already expired.
 *
 * `GSS_S_NO_CONTEXT`: The context_handle parameter did not identify a
 * valid context.
 *
 * `GSS_S_BAD_QOP`: The specified QOP is not supported by the
 * mechanism.
 **/
OM_uint32
gss_get_mic (OM_uint32 * minor_status,
	     const gss_ctx_id_t context_handle,
	     gss_qop_t qop_req,
	     const gss_buffer_t message_buffer, gss_buffer_t message_token)
{
  _gss_mech_api_t mech;

  if (!context_handle)
    {
      if (minor_status)
	*minor_status = 0;
      return GSS_S_NO_CONTEXT;
    }

  mech = _gss_find_mech (context_handle->mech);
  if (mech == NULL)
    {
      if (minor_status)
	*minor_status = 0;
      return GSS_S_BAD_MECH;
    }

  return mech->get_mic (minor_status, context_handle, qop_req,
			message_buffer, message_token);
}

/**
 * gss_verify_mic:
 * @minor_status: (Integer, modify) Mechanism specific status code.
 * @context_handle: (gss_ctx_id_t, read) Identifies the context on
 *   which the message arrived.
 * @message_buffer: (buffer, opaque, read) Message to be verified.
 * @token_buffer: (buffer, opaque, read) Token associated with
 *   message.
 * @qop_state: (gss_qop_t, modify, optional) Quality of protection
 *   gained from MIC Specify NULL if not required.
 *
 * Verifies that a cryptographic MIC, contained in the token
 * parameter, fits the supplied message.  The qop_state parameter
 * allows a message recipient to determine the strength of protection
 * that was applied to the message.
 *
 * Since some application-level protocols may wish to use tokens
 * emitted by gss_wrap() to provide "secure framing", implementations
 * must support the calculation and verification of MICs over
 * zero-length messages.
 *
 * Return value:
 *
 * `GSS_S_COMPLETE`: Successful completion.
 *
 * `GSS_S_DEFECTIVE_TOKEN`: The token failed consistency checks.
 *
 * `GSS_S_BAD_SIG`: The MIC was incorrect.
 *
 * `GSS_S_DUPLICATE_TOKEN`: The token was valid, and contained a
 * correct MIC for the message, but it had already been processed.
 *
 * `GSS_S_OLD_TOKEN`: The token was valid, and contained a correct MIC
 * for the message, but it is too old to check for duplication.
 *
 * `GSS_S_UNSEQ_TOKEN`: The token was valid, and contained a correct
 * MIC for the message, but has been verified out of sequence; a later
 * token has already been received.
 *
 * `GSS_S_GAP_TOKEN`: The token was valid, and contained a correct MIC
 * for the message, but has been verified out of sequence; an earlier
 * expected token has not yet been received.
 *
 * `GSS_S_CONTEXT_EXPIRED`: The context has already expired.
 *
 * `GSS_S_NO_CONTEXT`: The context_handle parameter did not identify a
 * valid context.
 **/
OM_uint32
gss_verify_mic (OM_uint32 * minor_status,
		const gss_ctx_id_t context_handle,
		const gss_buffer_t message_buffer,
		const gss_buffer_t token_buffer, gss_qop_t * qop_state)
{
  _gss_mech_api_t mech;

  if (!context_handle)
    {
      if (minor_status)
	*minor_status = 0;
      return GSS_S_NO_CONTEXT;
    }

  mech = _gss_find_mech (context_handle->mech);
  if (mech == NULL)
    {
      if (minor_status)
	*minor_status = 0;
      return GSS_S_BAD_MECH;
    }

  return mech->verify_mic (minor_status, context_handle,
			   message_buffer, token_buffer, qop_state);
}

/**
 * gss_wrap:
 * @minor_status: (Integer, modify) Mechanism specific status code.
 * @context_handle: (gss_ctx_id_t, read) Identifies the context on
 *   which the message will be sent.
 * @conf_req_flag: (boolean, read) Non-zero - Both confidentiality and
 *   integrity services are requested. Zero - Only integrity service is
 *   requested.
 * @qop_req: (gss_qop_t, read, optional) Specifies required quality of
 *   protection.  A mechanism-specific default may be requested by
 *   setting qop_req to GSS_C_QOP_DEFAULT.  If an unsupported
 *   protection strength is requested, gss_wrap will return a
 *   major_status of GSS_S_BAD_QOP.
 * @input_message_buffer: (buffer, opaque, read) Message to be
 *   protected.
 * @conf_state: (boolean, modify, optional) Non-zero -
 *   Confidentiality, data origin authentication and integrity
 *   services have been applied. Zero - Integrity and data origin
 *   services only has been applied.  Specify NULL if not required.
 * @output_message_buffer: (buffer, opaque, modify) Buffer to receive
 *   protected message.  Storage associated with this message must be
 *   freed by the application after use with a call to
 *   gss_release_buffer().
 *
 * Attaches a cryptographic MIC and optionally encrypts the specified
 * input_message.  The output_message contains both the MIC and the
 * message.  The qop_req parameter allows a choice between several
 * cryptographic algorithms, if supported by the chosen mechanism.
 *
 * Since some application-level protocols may wish to use tokens
 * emitted by gss_wrap() to provide "secure framing", implementations
 * must support the wrapping of zero-length messages.
 *
 * Return value:
 *
 * `GSS_S_COMPLETE`: Successful completion.
 *
 * `GSS_S_CONTEXT_EXPIRED`: The context has already expired.
 *
 * `GSS_S_NO_CONTEXT`: The context_handle parameter did not identify a
 *  valid context.
 *
 * `GSS_S_BAD_QOP`: The specified QOP is not supported by the
 * mechanism.
 **/
OM_uint32
gss_wrap (OM_uint32 * minor_status,
	  const gss_ctx_id_t context_handle,
	  int conf_req_flag,
	  gss_qop_t qop_req,
	  const gss_buffer_t input_message_buffer,
	  int *conf_state, gss_buffer_t output_message_buffer)
{
  _gss_mech_api_t mech;

  if (!context_handle)
    {
      if (minor_status)
	*minor_status = 0;
      return GSS_S_NO_CONTEXT;
    }

  mech = _gss_find_mech (context_handle->mech);
  if (mech == NULL)
    {
      if (minor_status)
	*minor_status = 0;
      return GSS_S_BAD_MECH;
    }

  return mech->wrap (minor_status, context_handle, conf_req_flag, qop_req,
		     input_message_buffer, conf_state, output_message_buffer);
}

/**
 * gss_unwrap:
 * @minor_status: (Integer, modify) Mechanism specific status code.
 * @context_handle: (gss_ctx_id_t, read) Identifies the context on
 *   which the message arrived.
 * @input_message_buffer: (buffer, opaque, read) Protected message.
 * @output_message_buffer: (buffer, opaque, modify) Buffer to receive
 *   unwrapped message.  Storage associated with this buffer must be
 *   freed by the application after use use with a call to
 *   gss_release_buffer().
 * @conf_state: (boolean, modify, optional) Non-zero - Confidentiality
 *   and integrity protection were used. Zero - Integrity service only
 *   was used.  Specify NULL if not required.
 * @qop_state: (gss_qop_t, modify, optional) Quality of protection
 *   provided.  Specify NULL if not required.
 *
 * Converts a message previously protected by gss_wrap back to a
 * usable form, verifying the embedded MIC.  The conf_state parameter
 * indicates whether the message was encrypted; the qop_state
 * parameter indicates the strength of protection that was used to
 * provide the confidentiality and integrity services.
 *
 * Since some application-level protocols may wish to use tokens
 * emitted by gss_wrap() to provide "secure framing", implementations
 * must support the wrapping and unwrapping of zero-length messages.
 *
 * Return value:
 *
 * `GSS_S_COMPLETE`: Successful completion.
 *
 * `GSS_S_DEFECTIVE_TOKEN`: The token failed consistency checks.
 *
 * `GSS_S_BAD_SIG`: The MIC was incorrect.
 *
 * `GSS_S_DUPLICATE_TOKEN`: The token was valid, and contained a
 *  correct MIC for the message, but it had already been processed.
 *
 * `GSS_S_OLD_TOKEN`: The token was valid, and contained a correct MIC
 * for the message, but it is too old to check for duplication.
 *
 * `GSS_S_UNSEQ_TOKEN`: The token was valid, and contained a correct
 * MIC for the message, but has been verified out of sequence; a later
 * token has already been received.
 *
 * `GSS_S_GAP_TOKEN`: The token was valid, and contained a correct MIC
 * for the message, but has been verified out of sequence; an earlier
 * expected token has not yet been received.
 *
 * `GSS_S_CONTEXT_EXPIRED`: The context has already expired.
 *
 * `GSS_S_NO_CONTEXT`: The context_handle parameter did not identify a
 * valid context.
 **/
OM_uint32
gss_unwrap (OM_uint32 * minor_status,
	    const gss_ctx_id_t context_handle,
	    const gss_buffer_t input_message_buffer,
	    gss_buffer_t output_message_buffer,
	    int *conf_state, gss_qop_t * qop_state)
{
  _gss_mech_api_t mech;

  if (!context_handle)
    {
      if (minor_status)
	*minor_status = 0;
      return GSS_S_NO_CONTEXT;
    }

  mech = _gss_find_mech (context_handle->mech);
  if (mech == NULL)
    {
      if (minor_status)
	*minor_status = 0;
      return GSS_S_BAD_MECH;
    }

  return mech->unwrap (minor_status, context_handle, input_message_buffer,
		       output_message_buffer, conf_state, qop_state);
}