2 Unix SMB/CIFS implementation.
4 RFC2478 Compliant SPNEGO implementation
6 Copyright (C) Jim McDonough <jmcd@us.ibm.com> 2003
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>.
24 #include "../libcli/auth/spnego.h"
25 #include "../lib/util/asn1.h"
27 static bool read_negTokenInit(struct asn1_data *asn1, TALLOC_CTX *mem_ctx,
28 struct spnego_negTokenInit *token)
32 asn1_start_tag(asn1, ASN1_CONTEXT(0));
33 asn1_start_tag(asn1, ASN1_SEQUENCE(0));
35 while (!asn1->has_error && 0 < asn1_tag_remaining(asn1)) {
38 if (!asn1_peek_uint8(asn1, &context)) {
39 asn1->has_error = true;
46 asn1_start_tag(asn1, ASN1_CONTEXT(0));
47 asn1_start_tag(asn1, ASN1_SEQUENCE(0));
49 token->mechTypes = talloc(mem_ctx, const char *);
50 if (token->mechTypes == NULL) {
51 asn1->has_error = true;
54 for (i = 0; !asn1->has_error &&
55 0 < asn1_tag_remaining(asn1); i++) {
58 p = talloc_realloc(mem_ctx,
62 TALLOC_FREE(token->mechTypes);
63 asn1->has_error = true;
67 asn1_read_OID(asn1, token->mechTypes, &oid);
68 token->mechTypes[i] = oid;
70 token->mechTypes[i] = NULL;
77 asn1_start_tag(asn1, ASN1_CONTEXT(1));
78 asn1_read_BitString(asn1, mem_ctx, &token->reqFlags,
79 &token->reqFlagsPadding);
84 asn1_start_tag(asn1, ASN1_CONTEXT(2));
85 asn1_read_OctetString(asn1, mem_ctx, &token->mechToken);
92 asn1_start_tag(asn1, ASN1_CONTEXT(3));
93 if (!asn1_peek_uint8(asn1, &type_peek)) {
94 asn1->has_error = true;
97 if (type_peek == ASN1_OCTET_STRING) {
98 asn1_read_OctetString(asn1, mem_ctx,
101 /* RFC 2478 says we have an Octet String here,
102 but W2k sends something different... */
104 asn1_start_tag(asn1, ASN1_SEQUENCE(0));
105 asn1_start_tag(asn1, ASN1_CONTEXT(0));
106 asn1_read_GeneralString(asn1, mem_ctx, &mechListMIC);
110 token->targetPrincipal = mechListMIC;
116 asn1->has_error = true;
124 return !asn1->has_error;
127 static bool write_negTokenInit(struct asn1_data *asn1, struct spnego_negTokenInit *token)
129 asn1_push_tag(asn1, ASN1_CONTEXT(0));
130 asn1_push_tag(asn1, ASN1_SEQUENCE(0));
132 /* Write mechTypes */
133 if (token->mechTypes && *token->mechTypes) {
136 asn1_push_tag(asn1, ASN1_CONTEXT(0));
137 asn1_push_tag(asn1, ASN1_SEQUENCE(0));
138 for (i = 0; token->mechTypes[i]; i++) {
139 asn1_write_OID(asn1, token->mechTypes[i]);
146 if (token->reqFlags.length > 0) {
147 asn1_push_tag(asn1, ASN1_CONTEXT(1));
148 asn1_write_BitString(asn1, token->reqFlags.data,
149 token->reqFlags.length,
150 token->reqFlagsPadding);
154 /* write mechToken */
155 if (token->mechToken.data) {
156 asn1_push_tag(asn1, ASN1_CONTEXT(2));
157 asn1_write_OctetString(asn1, token->mechToken.data,
158 token->mechToken.length);
162 /* write mechListMIC */
163 if (token->mechListMIC.data) {
164 asn1_push_tag(asn1, ASN1_CONTEXT(3));
166 /* This is what RFC 2478 says ... */
167 asn1_write_OctetString(asn1, token->mechListMIC.data,
168 token->mechListMIC.length);
170 /* ... but unfortunately this is what Windows
172 asn1_push_tag(asn1, ASN1_SEQUENCE(0));
173 asn1_push_tag(asn1, ASN1_CONTEXT(0));
174 asn1_push_tag(asn1, ASN1_GENERAL_STRING);
175 asn1_write(asn1, token->mechListMIC.data,
176 token->mechListMIC.length);
187 return !asn1->has_error;
190 static bool read_negTokenTarg(struct asn1_data *asn1, TALLOC_CTX *mem_ctx,
191 struct spnego_negTokenTarg *token)
195 asn1_start_tag(asn1, ASN1_CONTEXT(1));
196 asn1_start_tag(asn1, ASN1_SEQUENCE(0));
198 while (!asn1->has_error && 0 < asn1_tag_remaining(asn1)) {
201 if (!asn1_peek_uint8(asn1, &context)) {
202 asn1->has_error = true;
207 case ASN1_CONTEXT(0):
208 asn1_start_tag(asn1, ASN1_CONTEXT(0));
209 asn1_start_tag(asn1, ASN1_ENUMERATED);
210 asn1_read_uint8(asn1, &token->negResult);
214 case ASN1_CONTEXT(1):
215 asn1_start_tag(asn1, ASN1_CONTEXT(1));
216 asn1_read_OID(asn1, mem_ctx, &oid);
217 token->supportedMech = oid;
220 case ASN1_CONTEXT(2):
221 asn1_start_tag(asn1, ASN1_CONTEXT(2));
222 asn1_read_OctetString(asn1, mem_ctx, &token->responseToken);
225 case ASN1_CONTEXT(3):
226 asn1_start_tag(asn1, ASN1_CONTEXT(3));
227 asn1_read_OctetString(asn1, mem_ctx, &token->mechListMIC);
231 asn1->has_error = true;
239 return !asn1->has_error;
242 static bool write_negTokenTarg(struct asn1_data *asn1, struct spnego_negTokenTarg *token)
244 asn1_push_tag(asn1, ASN1_CONTEXT(1));
245 asn1_push_tag(asn1, ASN1_SEQUENCE(0));
247 if (token->negResult != SPNEGO_NONE_RESULT) {
248 asn1_push_tag(asn1, ASN1_CONTEXT(0));
249 asn1_write_enumerated(asn1, token->negResult);
253 if (token->supportedMech) {
254 asn1_push_tag(asn1, ASN1_CONTEXT(1));
255 asn1_write_OID(asn1, token->supportedMech);
259 if (token->responseToken.data) {
260 asn1_push_tag(asn1, ASN1_CONTEXT(2));
261 asn1_write_OctetString(asn1, token->responseToken.data,
262 token->responseToken.length);
266 if (token->mechListMIC.data) {
267 asn1_push_tag(asn1, ASN1_CONTEXT(3));
268 asn1_write_OctetString(asn1, token->mechListMIC.data,
269 token->mechListMIC.length);
276 return !asn1->has_error;
279 ssize_t spnego_read_data(TALLOC_CTX *mem_ctx, DATA_BLOB data, struct spnego_data *token)
281 struct asn1_data *asn1;
287 if (data.length == 0) {
291 asn1 = asn1_init(mem_ctx);
296 asn1_load(asn1, data);
298 if (!asn1_peek_uint8(asn1, &context)) {
299 asn1->has_error = true;
302 case ASN1_APPLICATION(0):
303 asn1_start_tag(asn1, ASN1_APPLICATION(0));
304 asn1_check_OID(asn1, OID_SPNEGO);
305 if (read_negTokenInit(asn1, mem_ctx, &token->negTokenInit)) {
306 token->type = SPNEGO_NEG_TOKEN_INIT;
310 case ASN1_CONTEXT(1):
311 if (read_negTokenTarg(asn1, mem_ctx, &token->negTokenTarg)) {
312 token->type = SPNEGO_NEG_TOKEN_TARG;
316 asn1->has_error = true;
321 if (!asn1->has_error) ret = asn1->ofs;
327 ssize_t spnego_write_data(TALLOC_CTX *mem_ctx, DATA_BLOB *blob, struct spnego_data *spnego)
329 struct asn1_data *asn1 = asn1_init(mem_ctx);
336 switch (spnego->type) {
337 case SPNEGO_NEG_TOKEN_INIT:
338 asn1_push_tag(asn1, ASN1_APPLICATION(0));
339 asn1_write_OID(asn1, OID_SPNEGO);
340 write_negTokenInit(asn1, &spnego->negTokenInit);
343 case SPNEGO_NEG_TOKEN_TARG:
344 write_negTokenTarg(asn1, &spnego->negTokenTarg);
347 asn1->has_error = true;
351 if (!asn1->has_error) {
352 *blob = data_blob_talloc(mem_ctx, asn1->data, asn1->length);
360 bool spnego_free_data(struct spnego_data *spnego)
364 if (!spnego) goto out;
366 switch(spnego->type) {
367 case SPNEGO_NEG_TOKEN_INIT:
368 if (spnego->negTokenInit.mechTypes) {
369 talloc_free(spnego->negTokenInit.mechTypes);
371 data_blob_free(&spnego->negTokenInit.reqFlags);
372 data_blob_free(&spnego->negTokenInit.mechToken);
373 data_blob_free(&spnego->negTokenInit.mechListMIC);
374 talloc_free(spnego->negTokenInit.targetPrincipal);
376 case SPNEGO_NEG_TOKEN_TARG:
377 if (spnego->negTokenTarg.supportedMech) {
378 talloc_free(discard_const(spnego->negTokenTarg.supportedMech));
380 data_blob_free(&spnego->negTokenTarg.responseToken);
381 data_blob_free(&spnego->negTokenTarg.mechListMIC);
387 ZERO_STRUCTP(spnego);
392 bool spnego_write_mech_types(TALLOC_CTX *mem_ctx,
393 const char **mech_types,
396 struct asn1_data *asn1 = asn1_init(mem_ctx);
402 /* Write mechTypes */
403 if (mech_types && *mech_types) {
406 asn1_push_tag(asn1, ASN1_SEQUENCE(0));
407 for (i = 0; mech_types[i]; i++) {
408 asn1_write_OID(asn1, mech_types[i]);
413 if (asn1->has_error) {
418 *blob = data_blob_talloc(mem_ctx, asn1->data, asn1->length);
419 if (blob->length != asn1->length) {