fdae2a8bb9fc474e11c184633c1e209631c641b6
[sfrench/samba-autobuild/.git] / source4 / auth / gensec / gensec_gssapi.c
1 /* 
2    Unix SMB/CIFS implementation.
3
4    Kerberos backend for GENSEC
5    
6    Copyright (C) Andrew Bartlett <abartlet@samba.org> 2004-2005
7    Copyright (C) Stefan Metzmacher <metze@samba.org> 2004-2005
8
9    This program is free software; you can redistribute it and/or modify
10    it under the terms of the GNU General Public License as published by
11    the Free Software Foundation; either version 3 of the License, or
12    (at your option) any later version.
13    
14    This program is distributed in the hope that it will be useful,
15    but WITHOUT ANY WARRANTY; without even the implied warranty of
16    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
17    GNU General Public License for more details.
18
19    
20    You should have received a copy of the GNU General Public License
21    along with this program.  If not, see <http://www.gnu.org/licenses/>.
22 */
23
24 #include "includes.h"
25 #include "lib/events/events.h"
26 #include "system/kerberos.h"
27 #include "system/gssapi.h"
28 #include "auth/kerberos/kerberos.h"
29 #include "librpc/gen_ndr/krb5pac.h"
30 #include "auth/auth.h"
31 #include <ldb.h>
32 #include "auth/auth_sam.h"
33 #include "librpc/gen_ndr/dcerpc.h"
34 #include "auth/credentials/credentials.h"
35 #include "auth/credentials/credentials_krb5.h"
36 #include "auth/gensec/gensec.h"
37 #include "auth/gensec/gensec_internal.h"
38 #include "auth/gensec/gensec_proto.h"
39 #include "auth/gensec/gensec_toplevel_proto.h"
40 #include "param/param.h"
41 #include "auth/session_proto.h"
42 #include "gensec_gssapi.h"
43 #include "lib/util/util_net.h"
44 #include "auth/kerberos/pac_utils.h"
45
46 #ifndef gss_mech_spnego
47 gss_OID_desc spnego_mech_oid_desc =
48                 { 6, discard_const_p(void, "\x2b\x06\x01\x05\x05\x02") };
49 #define gss_mech_spnego (&spnego_mech_oid_desc)
50 #endif
51
52 _PUBLIC_ NTSTATUS gensec_gssapi_init(void);
53
54 static size_t gensec_gssapi_max_input_size(struct gensec_security *gensec_security);
55 static size_t gensec_gssapi_max_wrapped_size(struct gensec_security *gensec_security);
56
57 static int gensec_gssapi_destructor(struct gensec_gssapi_state *gensec_gssapi_state)
58 {
59         OM_uint32 maj_stat, min_stat;
60         
61         if (gensec_gssapi_state->delegated_cred_handle != GSS_C_NO_CREDENTIAL) {
62                 maj_stat = gss_release_cred(&min_stat, 
63                                             &gensec_gssapi_state->delegated_cred_handle);
64         }
65
66         if (gensec_gssapi_state->gssapi_context != GSS_C_NO_CONTEXT) {
67                 maj_stat = gss_delete_sec_context (&min_stat,
68                                                    &gensec_gssapi_state->gssapi_context,
69                                                    GSS_C_NO_BUFFER);
70         }
71
72         if (gensec_gssapi_state->server_name != GSS_C_NO_NAME) {
73                 maj_stat = gss_release_name(&min_stat, &gensec_gssapi_state->server_name);
74         }
75         if (gensec_gssapi_state->client_name != GSS_C_NO_NAME) {
76                 maj_stat = gss_release_name(&min_stat, &gensec_gssapi_state->client_name);
77         }
78
79         if (gensec_gssapi_state->lucid) {
80                 gss_krb5_free_lucid_sec_context(&min_stat, gensec_gssapi_state->lucid);
81         }
82
83         return 0;
84 }
85
86 static NTSTATUS gensec_gssapi_init_lucid(struct gensec_gssapi_state *gensec_gssapi_state)
87 {
88         OM_uint32 maj_stat, min_stat;
89
90         if (gensec_gssapi_state->lucid) {
91                 return NT_STATUS_OK;
92         }
93
94         maj_stat = gss_krb5_export_lucid_sec_context(&min_stat,
95                                                      &gensec_gssapi_state->gssapi_context,
96                                                      1,
97                                                      (void **)&gensec_gssapi_state->lucid);
98         if (maj_stat != GSS_S_COMPLETE) {
99                 DEBUG(0,("gensec_gssapi_init_lucid: %s\n",
100                         gssapi_error_string(gensec_gssapi_state,
101                                             maj_stat, min_stat,
102                                             gensec_gssapi_state->gss_oid)));
103                 return NT_STATUS_INTERNAL_ERROR;
104         }
105
106         if (gensec_gssapi_state->lucid->version != 1) {
107                 DEBUG(0,("gensec_gssapi_init_lucid: lucid version[%d] != 1\n",
108                         gensec_gssapi_state->lucid->version));
109                 gss_krb5_free_lucid_sec_context(&min_stat, gensec_gssapi_state->lucid);
110                 gensec_gssapi_state->lucid = NULL;
111                 return NT_STATUS_INTERNAL_ERROR;
112         }
113
114         return NT_STATUS_OK;
115 }
116
117 static NTSTATUS gensec_gssapi_start(struct gensec_security *gensec_security)
118 {
119         struct gensec_gssapi_state *gensec_gssapi_state;
120         krb5_error_code ret;
121         const char *realm;
122
123         gensec_gssapi_state = talloc_zero(gensec_security, struct gensec_gssapi_state);
124         if (!gensec_gssapi_state) {
125                 return NT_STATUS_NO_MEMORY;
126         }
127
128         gensec_security->private_data = gensec_gssapi_state;
129
130         gensec_gssapi_state->gssapi_context = GSS_C_NO_CONTEXT;
131
132         /* TODO: Fill in channel bindings */
133         gensec_gssapi_state->input_chan_bindings = GSS_C_NO_CHANNEL_BINDINGS;
134
135         gensec_gssapi_state->server_name = GSS_C_NO_NAME;
136         gensec_gssapi_state->client_name = GSS_C_NO_NAME;
137         
138         gensec_gssapi_state->gss_want_flags = 0;
139         gensec_gssapi_state->expire_time = GENSEC_EXPIRE_TIME_INFINITY;
140
141         if (gensec_setting_bool(gensec_security->settings, "gensec_gssapi", "delegation_by_kdc_policy", true)) {
142                 gensec_gssapi_state->gss_want_flags |= GSS_C_DELEG_POLICY_FLAG;
143         }
144         if (gensec_setting_bool(gensec_security->settings, "gensec_gssapi", "mutual", true)) {
145                 gensec_gssapi_state->gss_want_flags |= GSS_C_MUTUAL_FLAG;
146         }
147         if (gensec_setting_bool(gensec_security->settings, "gensec_gssapi", "delegation", true)) {
148                 gensec_gssapi_state->gss_want_flags |= GSS_C_DELEG_FLAG;
149         }
150         if (gensec_setting_bool(gensec_security->settings, "gensec_gssapi", "replay", true)) {
151                 gensec_gssapi_state->gss_want_flags |= GSS_C_REPLAY_FLAG;
152         }
153         if (gensec_setting_bool(gensec_security->settings, "gensec_gssapi", "sequence", true)) {
154                 gensec_gssapi_state->gss_want_flags |= GSS_C_SEQUENCE_FLAG;
155         }
156
157         if (gensec_security->want_features & GENSEC_FEATURE_SIGN) {
158                 gensec_gssapi_state->gss_want_flags |= GSS_C_INTEG_FLAG;
159         }
160         if (gensec_security->want_features & GENSEC_FEATURE_SEAL) {
161                 gensec_gssapi_state->gss_want_flags |= GSS_C_INTEG_FLAG;
162                 gensec_gssapi_state->gss_want_flags |= GSS_C_CONF_FLAG;
163         }
164         if (gensec_security->want_features & GENSEC_FEATURE_DCE_STYLE) {
165                 gensec_gssapi_state->gss_want_flags |= GSS_C_DCE_STYLE;
166         }
167
168         gensec_gssapi_state->gss_got_flags = 0;
169
170         switch (gensec_security->ops->auth_type) {
171         case DCERPC_AUTH_TYPE_SPNEGO:
172                 gensec_gssapi_state->gss_oid = gss_mech_spnego;
173                 break;
174         case DCERPC_AUTH_TYPE_KRB5:
175         default:
176                 gensec_gssapi_state->gss_oid =
177                         discard_const_p(void, gss_mech_krb5);
178                 break;
179         }
180
181         ret = smb_krb5_init_context(gensec_gssapi_state,
182                                     gensec_security->settings->lp_ctx,
183                                     &gensec_gssapi_state->smb_krb5_context);
184         if (ret) {
185                 DEBUG(1,("gensec_gssapi_start: smb_krb5_init_context failed (%s)\n",
186                          error_message(ret)));
187                 talloc_free(gensec_gssapi_state);
188                 return NT_STATUS_INTERNAL_ERROR;
189         }
190
191         gensec_gssapi_state->client_cred = NULL;
192         gensec_gssapi_state->server_cred = NULL;
193
194         gensec_gssapi_state->lucid = NULL;
195
196         gensec_gssapi_state->delegated_cred_handle = GSS_C_NO_CREDENTIAL;
197
198         gensec_gssapi_state->sasl = false;
199         gensec_gssapi_state->sasl_state = STAGE_GSS_NEG;
200         gensec_gssapi_state->sasl_protection = 0;
201
202         gensec_gssapi_state->max_wrap_buf_size
203                 = gensec_setting_int(gensec_security->settings, "gensec_gssapi", "max wrap buf size", 65536);
204         gensec_gssapi_state->gss_exchange_count = 0;
205         gensec_gssapi_state->sig_size = 0;
206
207         talloc_set_destructor(gensec_gssapi_state, gensec_gssapi_destructor);
208
209 #ifdef SAMBA4_USES_HEIMDAL
210         realm = lpcfg_realm(gensec_security->settings->lp_ctx);
211         if (realm != NULL) {
212                 ret = gsskrb5_set_default_realm(realm);
213                 if (ret) {
214                         DEBUG(1,("gensec_gssapi_start: gsskrb5_set_default_realm failed\n"));
215                         talloc_free(gensec_gssapi_state);
216                         return NT_STATUS_INTERNAL_ERROR;
217                 }
218         }
219
220         /* don't do DNS lookups of any kind, it might/will fail for a netbios name */
221         ret = gsskrb5_set_dns_canonicalize(gensec_setting_bool(gensec_security->settings, "krb5", "set_dns_canonicalize", false));
222         if (ret) {
223                 DEBUG(1,("gensec_gssapi_start: gsskrb5_set_dns_canonicalize failed\n"));
224                 talloc_free(gensec_gssapi_state);
225                 return NT_STATUS_INTERNAL_ERROR;
226         }
227 #endif
228         return NT_STATUS_OK;
229 }
230
231 static NTSTATUS gensec_gssapi_server_start(struct gensec_security *gensec_security)
232 {
233         NTSTATUS nt_status;
234         int ret;
235         struct gensec_gssapi_state *gensec_gssapi_state;
236         struct cli_credentials *machine_account;
237         struct gssapi_creds_container *gcc;
238
239         nt_status = gensec_gssapi_start(gensec_security);
240         if (!NT_STATUS_IS_OK(nt_status)) {
241                 return nt_status;
242         }
243
244         gensec_gssapi_state = talloc_get_type(gensec_security->private_data, struct gensec_gssapi_state);
245
246         machine_account = gensec_get_credentials(gensec_security);
247         
248         if (!machine_account) {
249                 DEBUG(3, ("No machine account credentials specified\n"));
250                 return NT_STATUS_CANT_ACCESS_DOMAIN_INFO;
251         } else {
252                 ret = cli_credentials_get_server_gss_creds(machine_account, 
253                                                            gensec_security->settings->lp_ctx, &gcc);
254                 if (ret) {
255                         DEBUG(1, ("Aquiring acceptor credentials failed: %s\n", 
256                                   error_message(ret)));
257                         return NT_STATUS_CANT_ACCESS_DOMAIN_INFO;
258                 }
259         }
260
261         gensec_gssapi_state->server_cred = gcc;
262         return NT_STATUS_OK;
263
264 }
265
266 static NTSTATUS gensec_gssapi_sasl_server_start(struct gensec_security *gensec_security)
267 {
268         NTSTATUS nt_status;
269         struct gensec_gssapi_state *gensec_gssapi_state;
270         nt_status = gensec_gssapi_server_start(gensec_security);
271
272         if (NT_STATUS_IS_OK(nt_status)) {
273                 gensec_gssapi_state = talloc_get_type(gensec_security->private_data, struct gensec_gssapi_state);
274                 gensec_gssapi_state->sasl = true;
275         }
276         return nt_status;
277 }
278
279 static NTSTATUS gensec_gssapi_client_creds(struct gensec_security *gensec_security,
280                                            struct tevent_context *ev)
281 {
282         struct gensec_gssapi_state *gensec_gssapi_state;
283         struct gssapi_creds_container *gcc;
284         struct cli_credentials *creds = gensec_get_credentials(gensec_security);
285         const char *error_string;
286         int ret;
287
288         gensec_gssapi_state = talloc_get_type(gensec_security->private_data, struct gensec_gssapi_state);
289
290         /* Only run this the first time the update() call is made */
291         if (gensec_gssapi_state->client_cred) {
292                 return NT_STATUS_OK;
293         }
294
295         ret = cli_credentials_get_client_gss_creds(creds,
296                                                    ev,
297                                                    gensec_security->settings->lp_ctx, &gcc, &error_string);
298         switch (ret) {
299         case 0:
300                 break;
301         case EINVAL:
302                 DEBUG(3, ("Cannot obtain client GSS credentials we need to contact %s : %s\n", gensec_gssapi_state->target_principal, error_string));
303                 return NT_STATUS_INVALID_PARAMETER;
304         case KRB5KDC_ERR_PREAUTH_FAILED:
305         case KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN:
306                 DEBUG(1, ("Wrong username or password: %s\n", error_string));
307                 return NT_STATUS_LOGON_FAILURE;
308         case KRB5KDC_ERR_CLIENT_REVOKED:
309                 DEBUG(1, ("Account locked out: %s\n", error_string));
310                 return NT_STATUS_ACCOUNT_LOCKED_OUT;
311         case KRB5_KDC_UNREACH:
312                 DEBUG(3, ("Cannot reach a KDC we require to contact %s : %s\n", gensec_gssapi_state->target_principal, error_string));
313                 return NT_STATUS_NO_LOGON_SERVERS;
314         case KRB5_CC_NOTFOUND:
315         case KRB5_CC_END:
316                 DEBUG(2, ("Error obtaining ticket we require to contact %s: (possibly due to clock skew between us and the KDC) %s\n", gensec_gssapi_state->target_principal, error_string));
317                 return NT_STATUS_TIME_DIFFERENCE_AT_DC;
318         default:
319                 DEBUG(1, ("Aquiring initiator credentials failed: %s\n", error_string));
320                 return NT_STATUS_UNSUCCESSFUL;
321         }
322
323         gensec_gssapi_state->client_cred = gcc;
324         if (!talloc_reference(gensec_gssapi_state, gcc)) {
325                 return NT_STATUS_NO_MEMORY;
326         }
327
328         return NT_STATUS_OK;
329 }
330
331 static NTSTATUS gensec_gssapi_client_start(struct gensec_security *gensec_security)
332 {
333         struct gensec_gssapi_state *gensec_gssapi_state;
334         struct cli_credentials *creds = gensec_get_credentials(gensec_security);
335         NTSTATUS nt_status;
336         gss_buffer_desc name_token;
337         gss_OID name_type;
338         OM_uint32 maj_stat, min_stat;
339         const char *hostname = gensec_get_target_hostname(gensec_security);
340
341         if (!hostname) {
342                 DEBUG(3, ("No hostname for target computer passed in, cannot use kerberos for this connection\n"));
343                 return NT_STATUS_INVALID_PARAMETER;
344         }
345         if (is_ipaddress(hostname)) {
346                 DEBUG(2, ("Cannot do GSSAPI to an IP address\n"));
347                 return NT_STATUS_INVALID_PARAMETER;
348         }
349         if (strcmp(hostname, "localhost") == 0) {
350                 DEBUG(2, ("GSSAPI to 'localhost' does not make sense\n"));
351                 return NT_STATUS_INVALID_PARAMETER;
352         }
353
354         nt_status = gensec_gssapi_start(gensec_security);
355         if (!NT_STATUS_IS_OK(nt_status)) {
356                 return nt_status;
357         }
358
359         gensec_gssapi_state = talloc_get_type(gensec_security->private_data, struct gensec_gssapi_state);
360
361         if (cli_credentials_get_impersonate_principal(creds)) {
362                 gensec_gssapi_state->gss_want_flags &= ~(GSS_C_DELEG_FLAG|GSS_C_DELEG_POLICY_FLAG);
363         }
364
365         gensec_gssapi_state->target_principal = gensec_get_target_principal(gensec_security);
366         if (gensec_gssapi_state->target_principal) {
367                 name_type = GSS_C_NULL_OID;
368         } else {
369                 gensec_gssapi_state->target_principal = talloc_asprintf(gensec_gssapi_state, "%s/%s@%s",
370                                             gensec_get_target_service(gensec_security), 
371                                             hostname, lpcfg_realm(gensec_security->settings->lp_ctx));
372
373                 name_type = GSS_C_NT_USER_NAME;
374         }
375         name_token.value  = discard_const_p(uint8_t, gensec_gssapi_state->target_principal);
376         name_token.length = strlen(gensec_gssapi_state->target_principal);
377
378
379         maj_stat = gss_import_name (&min_stat,
380                                     &name_token,
381                                     name_type,
382                                     &gensec_gssapi_state->server_name);
383         if (maj_stat) {
384                 DEBUG(2, ("GSS Import name of %s failed: %s\n",
385                           (char *)name_token.value,
386                           gssapi_error_string(gensec_gssapi_state, maj_stat, min_stat, gensec_gssapi_state->gss_oid)));
387                 return NT_STATUS_INVALID_PARAMETER;
388         }
389
390         return NT_STATUS_OK;
391 }
392
393 static NTSTATUS gensec_gssapi_sasl_client_start(struct gensec_security *gensec_security)
394 {
395         NTSTATUS nt_status;
396         struct gensec_gssapi_state *gensec_gssapi_state;
397         nt_status = gensec_gssapi_client_start(gensec_security);
398
399         if (NT_STATUS_IS_OK(nt_status)) {
400                 gensec_gssapi_state = talloc_get_type(gensec_security->private_data, struct gensec_gssapi_state);
401                 gensec_gssapi_state->sasl = true;
402         }
403         return nt_status;
404 }
405
406
407 /**
408  * Next state function for the GSSAPI GENSEC mechanism
409  * 
410  * @param gensec_gssapi_state GSSAPI State
411  * @param out_mem_ctx The TALLOC_CTX for *out to be allocated on
412  * @param in The request, as a DATA_BLOB
413  * @param out The reply, as an talloc()ed DATA_BLOB, on *out_mem_ctx
414  * @return Error, MORE_PROCESSING_REQUIRED if a reply is sent, 
415  *                or NT_STATUS_OK if the user is authenticated. 
416  */
417
418 static NTSTATUS gensec_gssapi_update(struct gensec_security *gensec_security, 
419                                      TALLOC_CTX *out_mem_ctx,
420                                      struct tevent_context *ev,
421                                      const DATA_BLOB in, DATA_BLOB *out)
422 {
423         struct gensec_gssapi_state *gensec_gssapi_state
424                 = talloc_get_type(gensec_security->private_data, struct gensec_gssapi_state);
425         NTSTATUS nt_status = NT_STATUS_LOGON_FAILURE;
426         OM_uint32 maj_stat, min_stat;
427         OM_uint32 min_stat2;
428         gss_buffer_desc input_token, output_token;
429         gss_OID gss_oid_p = NULL;
430         OM_uint32 time_req = 0;
431         OM_uint32 time_rec = 0;
432         struct timeval tv;
433
434         time_req = gensec_setting_int(gensec_security->settings,
435                                       "gensec_gssapi", "requested_life_time",
436                                       time_req);
437
438         input_token.length = in.length;
439         input_token.value = in.data;
440
441         switch (gensec_gssapi_state->sasl_state) {
442         case STAGE_GSS_NEG:
443         {
444                 switch (gensec_security->gensec_role) {
445                 case GENSEC_CLIENT:
446                 {
447 #ifdef SAMBA4_USES_HEIMDAL
448                         struct gsskrb5_send_to_kdc send_to_kdc;
449 #endif
450                         krb5_error_code ret;
451
452                         nt_status = gensec_gssapi_client_creds(gensec_security, ev);
453                         if (!NT_STATUS_IS_OK(nt_status)) {
454                                 return nt_status;
455                         }
456
457 #ifdef SAMBA4_USES_HEIMDAL
458                         send_to_kdc.func = smb_krb5_send_and_recv_func;
459                         send_to_kdc.ptr = ev;
460
461                         min_stat = gsskrb5_set_send_to_kdc(&send_to_kdc);
462                         if (min_stat) {
463                                 DEBUG(1,("gensec_gssapi_update: gsskrb5_set_send_to_kdc failed\n"));
464                                 return NT_STATUS_INTERNAL_ERROR;
465                         }
466 #endif
467                         maj_stat = gss_init_sec_context(&min_stat, 
468                                                         gensec_gssapi_state->client_cred->creds,
469                                                         &gensec_gssapi_state->gssapi_context, 
470                                                         gensec_gssapi_state->server_name, 
471                                                         gensec_gssapi_state->gss_oid,
472                                                         gensec_gssapi_state->gss_want_flags, 
473                                                         time_req,
474                                                         gensec_gssapi_state->input_chan_bindings,
475                                                         &input_token, 
476                                                         &gss_oid_p,
477                                                         &output_token, 
478                                                         &gensec_gssapi_state->gss_got_flags, /* ret flags */
479                                                         &time_rec);
480                         if (gss_oid_p) {
481                                 gensec_gssapi_state->gss_oid = gss_oid_p;
482                         }
483
484 #ifdef SAMBA4_USES_HEIMDAL
485                         send_to_kdc.func = smb_krb5_send_and_recv_func;
486                         send_to_kdc.ptr = NULL;
487
488                         ret = gsskrb5_set_send_to_kdc(&send_to_kdc);
489                         if (ret) {
490                                 DEBUG(1,("gensec_gssapi_update: gsskrb5_set_send_to_kdc failed\n"));
491                                 return NT_STATUS_INTERNAL_ERROR;
492                         }
493 #endif
494                         break;
495                 }
496                 case GENSEC_SERVER:
497                 {
498                         maj_stat = gss_accept_sec_context(&min_stat, 
499                                                           &gensec_gssapi_state->gssapi_context, 
500                                                           gensec_gssapi_state->server_cred->creds,
501                                                           &input_token, 
502                                                           gensec_gssapi_state->input_chan_bindings,
503                                                           &gensec_gssapi_state->client_name, 
504                                                           &gss_oid_p,
505                                                           &output_token, 
506                                                           &gensec_gssapi_state->gss_got_flags, 
507                                                           &time_rec,
508                                                           &gensec_gssapi_state->delegated_cred_handle);
509                         if (gss_oid_p) {
510                                 gensec_gssapi_state->gss_oid = gss_oid_p;
511                         }
512                         break;
513                 }
514                 default:
515                         return NT_STATUS_INVALID_PARAMETER;
516                         
517                 }
518
519                 gensec_gssapi_state->gss_exchange_count++;
520
521                 if (maj_stat == GSS_S_COMPLETE) {
522                         *out = data_blob_talloc(out_mem_ctx, output_token.value, output_token.length);
523                         gss_release_buffer(&min_stat2, &output_token);
524                         
525                         if (gensec_gssapi_state->gss_got_flags & GSS_C_DELEG_FLAG) {
526                                 DEBUG(5, ("gensec_gssapi: credentials were delegated\n"));
527                         } else {
528                                 DEBUG(5, ("gensec_gssapi: NO credentials were delegated\n"));
529                         }
530
531                         tv = timeval_current_ofs(time_rec, 0);
532                         gensec_gssapi_state->expire_time = timeval_to_nttime(&tv);
533
534                         /* We may have been invoked as SASL, so there
535                          * is more work to do */
536                         if (gensec_gssapi_state->sasl) {
537                                 gensec_gssapi_state->sasl_state = STAGE_SASL_SSF_NEG;
538                                 return NT_STATUS_MORE_PROCESSING_REQUIRED;
539                         } else {
540                                 gensec_gssapi_state->sasl_state = STAGE_DONE;
541
542                                 if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SEAL)) {
543                                         DEBUG(5, ("GSSAPI Connection will be cryptographically sealed\n"));
544                                 } else if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SIGN)) {
545                                         DEBUG(5, ("GSSAPI Connection will be cryptographically signed\n"));
546                                 } else {
547                                         DEBUG(5, ("GSSAPI Connection will have no cryptographic protection\n"));
548                                 }
549
550                                 return NT_STATUS_OK;
551                         }
552                 } else if (maj_stat == GSS_S_CONTINUE_NEEDED) {
553                         *out = data_blob_talloc(out_mem_ctx, output_token.value, output_token.length);
554                         gss_release_buffer(&min_stat2, &output_token);
555                         
556                         return NT_STATUS_MORE_PROCESSING_REQUIRED;
557                 } else if (maj_stat == GSS_S_CONTEXT_EXPIRED) {
558                         gss_cred_id_t creds;
559                         gss_name_t name;
560                         gss_buffer_desc buffer;
561                         OM_uint32 lifetime = 0;
562                         gss_cred_usage_t usage;
563                         const char *role = NULL;
564                         DEBUG(0, ("GSS %s Update(krb5)(%d) Update failed, credentials expired during GSSAPI handshake!\n",
565                                   role,
566                                   gensec_gssapi_state->gss_exchange_count));
567
568                         
569                         switch (gensec_security->gensec_role) {
570                         case GENSEC_CLIENT:
571                                 creds = gensec_gssapi_state->client_cred->creds;
572                                 role = "client";
573                                 break;
574                         case GENSEC_SERVER:
575                                 creds = gensec_gssapi_state->server_cred->creds;
576                                 role = "server";
577                                 break;
578                         }
579
580                         maj_stat = gss_inquire_cred(&min_stat, 
581                                                     creds,
582                                                     &name, &lifetime, &usage, NULL);
583
584                         if (maj_stat == GSS_S_COMPLETE) {
585                                 const char *usage_string;
586                                 switch (usage) {
587                                 case GSS_C_BOTH:
588                                         usage_string = "GSS_C_BOTH";
589                                         break;
590                                 case GSS_C_ACCEPT:
591                                         usage_string = "GSS_C_ACCEPT";
592                                         break;
593                                 case GSS_C_INITIATE:
594                                         usage_string = "GSS_C_INITIATE";
595                                         break;
596                                 }
597                                 maj_stat = gss_display_name(&min_stat, name, &buffer, NULL);
598                                 if (maj_stat) {
599                                         buffer.value = NULL;
600                                         buffer.length = 0;
601                                 }
602                                 if (lifetime > 0) {
603                                         DEBUG(0, ("GSSAPI gss_inquire_cred indicates expiry of %*.*s in %u sec for %s\n", 
604                                                   (int)buffer.length, (int)buffer.length, (char *)buffer.value, 
605                                                   lifetime, usage_string));
606                                 } else {
607                                         DEBUG(0, ("GSSAPI gss_inquire_cred indicates %*.*s has already expired for %s\n", 
608                                                   (int)buffer.length, (int)buffer.length, (char *)buffer.value, 
609                                                   usage_string));
610                                 }
611                                 gss_release_buffer(&min_stat, &buffer);
612                                 gss_release_name(&min_stat, &name);
613                         } else if (maj_stat != GSS_S_COMPLETE) {
614                                 DEBUG(0, ("inquiry of credential lifefime via GSSAPI gss_inquire_cred failed: %s\n",
615                                           gssapi_error_string(out_mem_ctx, maj_stat, min_stat, gensec_gssapi_state->gss_oid)));
616                         }
617                         return NT_STATUS_INVALID_PARAMETER;
618                 } else if (smb_gss_oid_equal(gensec_gssapi_state->gss_oid,
619                                              gss_mech_krb5)) {
620                         switch (min_stat) {
621                         case KRB5KRB_AP_ERR_TKT_NYV:
622                                 DEBUG(1, ("Error with ticket to contact %s: possible clock skew between us and the KDC or target server: %s\n",
623                                           gensec_gssapi_state->target_principal,
624                                           gssapi_error_string(out_mem_ctx, maj_stat, min_stat, gensec_gssapi_state->gss_oid)));
625                                 return NT_STATUS_TIME_DIFFERENCE_AT_DC; /* Make SPNEGO ignore us, we can't go any further here */
626                         case KRB5KRB_AP_ERR_TKT_EXPIRED:
627                                 DEBUG(1, ("Error with ticket to contact %s: ticket is expired, possible clock skew between us and the KDC or target server: %s\n",
628                                           gensec_gssapi_state->target_principal,
629                                           gssapi_error_string(out_mem_ctx, maj_stat, min_stat, gensec_gssapi_state->gss_oid)));
630                                 return NT_STATUS_INVALID_PARAMETER; /* Make SPNEGO ignore us, we can't go any further here */
631                         case KRB5_KDC_UNREACH:
632                                 DEBUG(3, ("Cannot reach a KDC we require in order to obtain a ticetk to %s: %s\n",
633                                           gensec_gssapi_state->target_principal,
634                                           gssapi_error_string(out_mem_ctx, maj_stat, min_stat, gensec_gssapi_state->gss_oid)));
635                                 return NT_STATUS_NO_LOGON_SERVERS; /* Make SPNEGO ignore us, we can't go any further here */
636                         case KRB5KDC_ERR_S_PRINCIPAL_UNKNOWN:
637                                 DEBUG(3, ("Server %s is not registered with our KDC: %s\n",
638                                           gensec_gssapi_state->target_principal,
639                                           gssapi_error_string(out_mem_ctx, maj_stat, min_stat, gensec_gssapi_state->gss_oid)));
640                                 return NT_STATUS_INVALID_PARAMETER; /* Make SPNEGO ignore us, we can't go any further here */
641                         case KRB5KRB_AP_ERR_MSG_TYPE:
642                                 /* garbage input, possibly from the auto-mech detection */
643                                 return NT_STATUS_INVALID_PARAMETER;
644                         default:
645                                 DEBUG(1, ("GSS %s Update(krb5)(%d) Update failed: %s\n",
646                                           gensec_security->gensec_role == GENSEC_CLIENT ? "client" : "server",
647                                           gensec_gssapi_state->gss_exchange_count,
648                                           gssapi_error_string(out_mem_ctx, maj_stat, min_stat, gensec_gssapi_state->gss_oid)));
649                                 return nt_status;
650                         }
651                 } else {
652                         DEBUG(1, ("GSS %s Update(%d) failed: %s\n",
653                                   gensec_security->gensec_role == GENSEC_CLIENT ? "client" : "server",
654                                   gensec_gssapi_state->gss_exchange_count,
655                                   gssapi_error_string(out_mem_ctx, maj_stat, min_stat, gensec_gssapi_state->gss_oid)));
656                         return nt_status;
657                 }
658                 break;
659         }
660
661         /* These last two stages are only done if we were invoked as SASL */
662         case STAGE_SASL_SSF_NEG:
663         {
664                 switch (gensec_security->gensec_role) {
665                 case GENSEC_CLIENT:
666                 {
667                         uint8_t maxlength_proposed[4]; 
668                         uint8_t maxlength_accepted[4]; 
669                         uint8_t security_supported;
670                         int conf_state;
671                         gss_qop_t qop_state;
672                         input_token.length = in.length;
673                         input_token.value = in.data;
674
675                         /* As a client, we have just send a
676                          * zero-length blob to the server (after the
677                          * normal GSSAPI exchange), and it has replied
678                          * with it's SASL negotiation */
679                         
680                         maj_stat = gss_unwrap(&min_stat, 
681                                               gensec_gssapi_state->gssapi_context, 
682                                               &input_token,
683                                               &output_token, 
684                                               &conf_state,
685                                               &qop_state);
686                         if (GSS_ERROR(maj_stat)) {
687                                 DEBUG(1, ("gensec_gssapi_update: GSS UnWrap of SASL protection negotiation failed: %s\n", 
688                                           gssapi_error_string(out_mem_ctx, maj_stat, min_stat, gensec_gssapi_state->gss_oid)));
689                                 return NT_STATUS_ACCESS_DENIED;
690                         }
691                         
692                         if (output_token.length < 4) {
693                                 return NT_STATUS_INVALID_PARAMETER;
694                         }
695
696                         memcpy(maxlength_proposed, output_token.value, 4);
697                         gss_release_buffer(&min_stat, &output_token);
698
699                         /* first byte is the proposed security */
700                         security_supported = maxlength_proposed[0];
701                         maxlength_proposed[0] = '\0';
702                         
703                         /* Rest is the proposed max wrap length */
704                         gensec_gssapi_state->max_wrap_buf_size = MIN(RIVAL(maxlength_proposed, 0), 
705                                                                      gensec_gssapi_state->max_wrap_buf_size);
706                         gensec_gssapi_state->sasl_protection = 0;
707                         if (security_supported & NEG_SEAL) {
708                                 if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SEAL)) {
709                                         gensec_gssapi_state->sasl_protection |= NEG_SEAL;
710                                 }
711                         }
712                         if (security_supported & NEG_SIGN) {
713                                 if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SIGN)) {
714                                         gensec_gssapi_state->sasl_protection |= NEG_SIGN;
715                                 }
716                         }
717                         if (security_supported & NEG_NONE) {
718                                 gensec_gssapi_state->sasl_protection |= NEG_NONE;
719                         }
720                         if (gensec_gssapi_state->sasl_protection == 0) {
721                                 DEBUG(1, ("Remote server does not support unprotected connections\n"));
722                                 return NT_STATUS_ACCESS_DENIED;
723                         }
724
725                         /* Send back the negotiated max length */
726
727                         RSIVAL(maxlength_accepted, 0, gensec_gssapi_state->max_wrap_buf_size);
728
729                         maxlength_accepted[0] = gensec_gssapi_state->sasl_protection;
730                         
731                         input_token.value = maxlength_accepted;
732                         input_token.length = sizeof(maxlength_accepted);
733
734                         maj_stat = gss_wrap(&min_stat, 
735                                             gensec_gssapi_state->gssapi_context, 
736                                             false,
737                                             GSS_C_QOP_DEFAULT,
738                                             &input_token,
739                                             &conf_state,
740                                             &output_token);
741                         if (GSS_ERROR(maj_stat)) {
742                                 DEBUG(1, ("GSS Update(SSF_NEG): GSS Wrap failed: %s\n", 
743                                           gssapi_error_string(out_mem_ctx, maj_stat, min_stat, gensec_gssapi_state->gss_oid)));
744                                 return NT_STATUS_ACCESS_DENIED;
745                         }
746                         
747                         *out = data_blob_talloc(out_mem_ctx, output_token.value, output_token.length);
748                         gss_release_buffer(&min_stat, &output_token);
749
750                         /* quirk:  This changes the value that gensec_have_feature returns, to be that after SASL negotiation */
751                         gensec_gssapi_state->sasl_state = STAGE_DONE;
752
753                         if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SEAL)) {
754                                 DEBUG(3, ("SASL/GSSAPI Connection to server will be cryptographically sealed\n"));
755                         } else if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SIGN)) {
756                                 DEBUG(3, ("SASL/GSSAPI Connection to server will be cryptographically signed\n"));
757                         } else {
758                                 DEBUG(3, ("SASL/GSSAPI Connection to server will have no cryptographically protection\n"));
759                         }
760
761                         return NT_STATUS_OK;
762                 }
763                 case GENSEC_SERVER:
764                 {
765                         uint8_t maxlength_proposed[4]; 
766                         uint8_t security_supported = 0x0;
767                         int conf_state;
768
769                         /* As a server, we have just been sent a zero-length blob (note this, but it isn't fatal) */
770                         if (in.length != 0) {
771                                 DEBUG(1, ("SASL/GSSAPI: client sent non-zero length starting SASL negotiation!\n"));
772                         }
773                         
774                         /* Give the client some idea what we will support */
775                           
776                         RSIVAL(maxlength_proposed, 0, gensec_gssapi_state->max_wrap_buf_size);
777                         /* first byte is the proposed security */
778                         maxlength_proposed[0] = '\0';
779                         
780                         gensec_gssapi_state->sasl_protection = 0;
781                         if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SEAL)) {
782                                 security_supported |= NEG_SEAL;
783                         } 
784                         if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SIGN)) {
785                                 security_supported |= NEG_SIGN;
786                         }
787                         if (security_supported == 0) {
788                                 /* If we don't support anything, this must be 0 */
789                                 RSIVAL(maxlength_proposed, 0, 0x0);
790                         }
791
792                         /* TODO:  We may not wish to support this */
793                         security_supported |= NEG_NONE;
794                         maxlength_proposed[0] = security_supported;
795                         
796                         input_token.value = maxlength_proposed;
797                         input_token.length = sizeof(maxlength_proposed);
798
799                         maj_stat = gss_wrap(&min_stat, 
800                                             gensec_gssapi_state->gssapi_context, 
801                                             false,
802                                             GSS_C_QOP_DEFAULT,
803                                             &input_token,
804                                             &conf_state,
805                                             &output_token);
806                         if (GSS_ERROR(maj_stat)) {
807                                 DEBUG(1, ("GSS Update(SSF_NEG): GSS Wrap failed: %s\n", 
808                                           gssapi_error_string(out_mem_ctx, maj_stat, min_stat, gensec_gssapi_state->gss_oid)));
809                                 return NT_STATUS_ACCESS_DENIED;
810                         }
811                         
812                         *out = data_blob_talloc(out_mem_ctx, output_token.value, output_token.length);
813                         gss_release_buffer(&min_stat, &output_token);
814
815                         gensec_gssapi_state->sasl_state = STAGE_SASL_SSF_ACCEPT;
816                         return NT_STATUS_MORE_PROCESSING_REQUIRED;
817                 }
818                 default:
819                         return NT_STATUS_INVALID_PARAMETER;
820                         
821                 }
822         }
823         /* This is s server-only stage */
824         case STAGE_SASL_SSF_ACCEPT:
825         {
826                 uint8_t maxlength_accepted[4]; 
827                 uint8_t security_accepted;
828                 int conf_state;
829                 gss_qop_t qop_state;
830                 input_token.length = in.length;
831                 input_token.value = in.data;
832                         
833                 maj_stat = gss_unwrap(&min_stat, 
834                                       gensec_gssapi_state->gssapi_context, 
835                                       &input_token,
836                                       &output_token, 
837                                       &conf_state,
838                                       &qop_state);
839                 if (GSS_ERROR(maj_stat)) {
840                         DEBUG(1, ("gensec_gssapi_update: GSS UnWrap of SASL protection negotiation failed: %s\n", 
841                                   gssapi_error_string(out_mem_ctx, maj_stat, min_stat, gensec_gssapi_state->gss_oid)));
842                         return NT_STATUS_ACCESS_DENIED;
843                 }
844                         
845                 if (output_token.length < 4) {
846                         return NT_STATUS_INVALID_PARAMETER;
847                 }
848
849                 memcpy(maxlength_accepted, output_token.value, 4);
850                 gss_release_buffer(&min_stat, &output_token);
851                 
852                 /* first byte is the proposed security */
853                 security_accepted = maxlength_accepted[0];
854                 maxlength_accepted[0] = '\0';
855
856                 /* Rest is the proposed max wrap length */
857                 gensec_gssapi_state->max_wrap_buf_size = MIN(RIVAL(maxlength_accepted, 0), 
858                                                              gensec_gssapi_state->max_wrap_buf_size);
859
860                 gensec_gssapi_state->sasl_protection = 0;
861                 if (security_accepted & NEG_SEAL) {
862                         if (!gensec_have_feature(gensec_security, GENSEC_FEATURE_SEAL)) {
863                                 DEBUG(1, ("Remote client wanted seal, but gensec refused\n"));
864                                 return NT_STATUS_ACCESS_DENIED;
865                         }
866                         gensec_gssapi_state->sasl_protection |= NEG_SEAL;
867                 }
868                 if (security_accepted & NEG_SIGN) {
869                         if (!gensec_have_feature(gensec_security, GENSEC_FEATURE_SIGN)) {
870                                 DEBUG(1, ("Remote client wanted sign, but gensec refused\n"));
871                                 return NT_STATUS_ACCESS_DENIED;
872                         }
873                         gensec_gssapi_state->sasl_protection |= NEG_SIGN;
874                 }
875                 if (security_accepted & NEG_NONE) {
876                         gensec_gssapi_state->sasl_protection |= NEG_NONE;
877                 }
878
879                 /* quirk:  This changes the value that gensec_have_feature returns, to be that after SASL negotiation */
880                 gensec_gssapi_state->sasl_state = STAGE_DONE;
881                 if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SEAL)) {
882                         DEBUG(5, ("SASL/GSSAPI Connection from client will be cryptographically sealed\n"));
883                 } else if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SIGN)) {
884                         DEBUG(5, ("SASL/GSSAPI Connection from client will be cryptographically signed\n"));
885                 } else {
886                         DEBUG(5, ("SASL/GSSAPI Connection from client will have no cryptographic protection\n"));
887                 }
888
889                 *out = data_blob(NULL, 0);
890                 return NT_STATUS_OK;    
891         }
892         default:
893                 return NT_STATUS_INVALID_PARAMETER;
894         }
895 }
896
897 static NTSTATUS gensec_gssapi_wrap(struct gensec_security *gensec_security, 
898                                    TALLOC_CTX *mem_ctx, 
899                                    const DATA_BLOB *in, 
900                                    DATA_BLOB *out)
901 {
902         struct gensec_gssapi_state *gensec_gssapi_state
903                 = talloc_get_type(gensec_security->private_data, struct gensec_gssapi_state);
904         OM_uint32 maj_stat, min_stat;
905         gss_buffer_desc input_token, output_token;
906         int conf_state;
907         input_token.length = in->length;
908         input_token.value = in->data;
909
910         maj_stat = gss_wrap(&min_stat, 
911                             gensec_gssapi_state->gssapi_context, 
912                             gensec_have_feature(gensec_security, GENSEC_FEATURE_SEAL),
913                             GSS_C_QOP_DEFAULT,
914                             &input_token,
915                             &conf_state,
916                             &output_token);
917         if (GSS_ERROR(maj_stat)) {
918                 DEBUG(1, ("gensec_gssapi_wrap: GSS Wrap failed: %s\n", 
919                           gssapi_error_string(mem_ctx, maj_stat, min_stat, gensec_gssapi_state->gss_oid)));
920                 return NT_STATUS_ACCESS_DENIED;
921         }
922
923         *out = data_blob_talloc(mem_ctx, output_token.value, output_token.length);
924         gss_release_buffer(&min_stat, &output_token);
925
926         if (gensec_gssapi_state->sasl) {
927                 size_t max_wrapped_size = gensec_gssapi_max_wrapped_size(gensec_security);
928                 if (max_wrapped_size < out->length) {
929                         DEBUG(1, ("gensec_gssapi_wrap: when wrapped, INPUT data (%u) is grew to be larger than SASL negotiated maximum output size (%u > %u)\n",
930                                   (unsigned)in->length, 
931                                   (unsigned)out->length, 
932                                   (unsigned int)max_wrapped_size));
933                         return NT_STATUS_INVALID_PARAMETER;
934                 }
935         }
936         
937         if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SEAL)
938             && !conf_state) {
939                 return NT_STATUS_ACCESS_DENIED;
940         }
941         return NT_STATUS_OK;
942 }
943
944 static NTSTATUS gensec_gssapi_unwrap(struct gensec_security *gensec_security, 
945                                      TALLOC_CTX *mem_ctx, 
946                                      const DATA_BLOB *in, 
947                                      DATA_BLOB *out)
948 {
949         struct gensec_gssapi_state *gensec_gssapi_state
950                 = talloc_get_type(gensec_security->private_data, struct gensec_gssapi_state);
951         OM_uint32 maj_stat, min_stat;
952         gss_buffer_desc input_token, output_token;
953         int conf_state;
954         gss_qop_t qop_state;
955         input_token.length = in->length;
956         input_token.value = in->data;
957         
958         if (gensec_gssapi_state->sasl) {
959                 size_t max_wrapped_size = gensec_gssapi_max_wrapped_size(gensec_security);
960                 if (max_wrapped_size < in->length) {
961                         DEBUG(1, ("gensec_gssapi_unwrap: WRAPPED data is larger than SASL negotiated maximum size\n"));
962                         return NT_STATUS_INVALID_PARAMETER;
963                 }
964         }
965         
966         maj_stat = gss_unwrap(&min_stat, 
967                               gensec_gssapi_state->gssapi_context, 
968                               &input_token,
969                               &output_token, 
970                               &conf_state,
971                               &qop_state);
972         if (GSS_ERROR(maj_stat)) {
973                 DEBUG(1, ("gensec_gssapi_unwrap: GSS UnWrap failed: %s\n", 
974                           gssapi_error_string(mem_ctx, maj_stat, min_stat, gensec_gssapi_state->gss_oid)));
975                 return NT_STATUS_ACCESS_DENIED;
976         }
977
978         *out = data_blob_talloc(mem_ctx, output_token.value, output_token.length);
979         gss_release_buffer(&min_stat, &output_token);
980         
981         if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SEAL)
982             && !conf_state) {
983                 return NT_STATUS_ACCESS_DENIED;
984         }
985         return NT_STATUS_OK;
986 }
987
988 /* Find out the maximum input size negotiated on this connection */
989
990 static size_t gensec_gssapi_max_input_size(struct gensec_security *gensec_security) 
991 {
992         struct gensec_gssapi_state *gensec_gssapi_state
993                 = talloc_get_type(gensec_security->private_data, struct gensec_gssapi_state);
994         OM_uint32 maj_stat, min_stat;
995         OM_uint32 max_input_size;
996
997         maj_stat = gss_wrap_size_limit(&min_stat, 
998                                        gensec_gssapi_state->gssapi_context,
999                                        gensec_have_feature(gensec_security, GENSEC_FEATURE_SEAL),
1000                                        GSS_C_QOP_DEFAULT,
1001                                        gensec_gssapi_state->max_wrap_buf_size,
1002                                        &max_input_size);
1003         if (GSS_ERROR(maj_stat)) {
1004                 TALLOC_CTX *mem_ctx = talloc_new(NULL); 
1005                 DEBUG(1, ("gensec_gssapi_max_input_size: determining signature size with gss_wrap_size_limit failed: %s\n",
1006                           gssapi_error_string(mem_ctx, maj_stat, min_stat, gensec_gssapi_state->gss_oid)));
1007                 talloc_free(mem_ctx);
1008                 return 0;
1009         }
1010
1011         return max_input_size;
1012 }
1013
1014 /* Find out the maximum output size negotiated on this connection */
1015 static size_t gensec_gssapi_max_wrapped_size(struct gensec_security *gensec_security) 
1016 {
1017         struct gensec_gssapi_state *gensec_gssapi_state = talloc_get_type(gensec_security->private_data, struct gensec_gssapi_state);;
1018         return gensec_gssapi_state->max_wrap_buf_size;
1019 }
1020
1021 static NTSTATUS gensec_gssapi_seal_packet(struct gensec_security *gensec_security, 
1022                                           TALLOC_CTX *mem_ctx, 
1023                                           uint8_t *data, size_t length, 
1024                                           const uint8_t *whole_pdu, size_t pdu_length, 
1025                                           DATA_BLOB *sig)
1026 {
1027         struct gensec_gssapi_state *gensec_gssapi_state
1028                 = talloc_get_type(gensec_security->private_data, struct gensec_gssapi_state);
1029         OM_uint32 maj_stat, min_stat;
1030         gss_buffer_desc input_token, output_token;
1031         int conf_state;
1032         ssize_t sig_length;
1033
1034         if (gensec_security->want_features & GENSEC_FEATURE_SIGN_PKT_HEADER) {
1035                 DEBUG(1, ("gensec_gssapi_seal_packet: "
1036                           "GENSEC_FEATURE_SIGN_PKT_HEADER not supported\n"));
1037                 return NT_STATUS_ACCESS_DENIED;
1038         }
1039
1040         input_token.length = length;
1041         input_token.value = data;
1042         
1043         maj_stat = gss_wrap(&min_stat, 
1044                             gensec_gssapi_state->gssapi_context,
1045                             gensec_have_feature(gensec_security, GENSEC_FEATURE_SEAL),
1046                             GSS_C_QOP_DEFAULT,
1047                             &input_token,
1048                             &conf_state,
1049                             &output_token);
1050         if (GSS_ERROR(maj_stat)) {
1051                 DEBUG(1, ("gensec_gssapi_seal_packet: GSS Wrap failed: %s\n", 
1052                           gssapi_error_string(mem_ctx, maj_stat, min_stat, gensec_gssapi_state->gss_oid)));
1053                 return NT_STATUS_ACCESS_DENIED;
1054         }
1055
1056         if (output_token.length < input_token.length) {
1057                 DEBUG(1, ("gensec_gssapi_seal_packet: GSS Wrap length [%ld] *less* than caller length [%ld]\n", 
1058                           (long)output_token.length, (long)length));
1059                 return NT_STATUS_INTERNAL_ERROR;
1060         }
1061         sig_length = output_token.length - input_token.length;
1062
1063         memcpy(data, ((uint8_t *)output_token.value) + sig_length, length);
1064         *sig = data_blob_talloc(mem_ctx, (uint8_t *)output_token.value, sig_length);
1065
1066         dump_data_pw("gensec_gssapi_seal_packet: sig\n", sig->data, sig->length);
1067         dump_data_pw("gensec_gssapi_seal_packet: clear\n", data, length);
1068         dump_data_pw("gensec_gssapi_seal_packet: sealed\n", ((uint8_t *)output_token.value) + sig_length, output_token.length - sig_length);
1069
1070         gss_release_buffer(&min_stat, &output_token);
1071
1072         if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SEAL)
1073             && !conf_state) {
1074                 return NT_STATUS_ACCESS_DENIED;
1075         }
1076         return NT_STATUS_OK;
1077 }
1078
1079 static NTSTATUS gensec_gssapi_unseal_packet(struct gensec_security *gensec_security, 
1080                                             uint8_t *data, size_t length, 
1081                                             const uint8_t *whole_pdu, size_t pdu_length,
1082                                             const DATA_BLOB *sig)
1083 {
1084         struct gensec_gssapi_state *gensec_gssapi_state
1085                 = talloc_get_type(gensec_security->private_data, struct gensec_gssapi_state);
1086         OM_uint32 maj_stat, min_stat;
1087         gss_buffer_desc input_token, output_token;
1088         int conf_state;
1089         gss_qop_t qop_state;
1090         DATA_BLOB in;
1091
1092         dump_data_pw("gensec_gssapi_unseal_packet: sig\n", sig->data, sig->length);
1093
1094         if (gensec_security->want_features & GENSEC_FEATURE_SIGN_PKT_HEADER) {
1095                 DEBUG(1, ("gensec_gssapi_unseal_packet: "
1096                           "GENSEC_FEATURE_SIGN_PKT_HEADER not supported\n"));
1097                 return NT_STATUS_ACCESS_DENIED;
1098         }
1099
1100         in = data_blob_talloc(gensec_security, NULL, sig->length + length);
1101
1102         memcpy(in.data, sig->data, sig->length);
1103         memcpy(in.data + sig->length, data, length);
1104
1105         input_token.length = in.length;
1106         input_token.value = in.data;
1107         
1108         maj_stat = gss_unwrap(&min_stat, 
1109                               gensec_gssapi_state->gssapi_context, 
1110                               &input_token,
1111                               &output_token, 
1112                               &conf_state,
1113                               &qop_state);
1114         talloc_free(in.data);
1115         if (GSS_ERROR(maj_stat)) {
1116                 char *error_string = gssapi_error_string(NULL, maj_stat, min_stat, gensec_gssapi_state->gss_oid);
1117                 DEBUG(1, ("gensec_gssapi_unseal_packet: GSS UnWrap failed: %s\n", 
1118                           error_string));
1119                 talloc_free(error_string);
1120                 return NT_STATUS_ACCESS_DENIED;
1121         }
1122
1123         if (output_token.length != length) {
1124                 return NT_STATUS_INTERNAL_ERROR;
1125         }
1126
1127         memcpy(data, output_token.value, length);
1128
1129         gss_release_buffer(&min_stat, &output_token);
1130         
1131         if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SEAL)
1132             && !conf_state) {
1133                 return NT_STATUS_ACCESS_DENIED;
1134         }
1135         return NT_STATUS_OK;
1136 }
1137
1138 static NTSTATUS gensec_gssapi_sign_packet(struct gensec_security *gensec_security, 
1139                                           TALLOC_CTX *mem_ctx, 
1140                                           const uint8_t *data, size_t length, 
1141                                           const uint8_t *whole_pdu, size_t pdu_length, 
1142                                           DATA_BLOB *sig)
1143 {
1144         struct gensec_gssapi_state *gensec_gssapi_state
1145                 = talloc_get_type(gensec_security->private_data, struct gensec_gssapi_state);
1146         OM_uint32 maj_stat, min_stat;
1147         gss_buffer_desc input_token, output_token;
1148
1149         if (gensec_security->want_features & GENSEC_FEATURE_SIGN_PKT_HEADER) {
1150                 input_token.length = pdu_length;
1151                 input_token.value = discard_const_p(uint8_t *, whole_pdu);
1152         } else {
1153                 input_token.length = length;
1154                 input_token.value = discard_const_p(uint8_t *, data);
1155         }
1156
1157         maj_stat = gss_get_mic(&min_stat,
1158                             gensec_gssapi_state->gssapi_context,
1159                             GSS_C_QOP_DEFAULT,
1160                             &input_token,
1161                             &output_token);
1162         if (GSS_ERROR(maj_stat)) {
1163                 DEBUG(1, ("GSS GetMic failed: %s\n",
1164                           gssapi_error_string(mem_ctx, maj_stat, min_stat, gensec_gssapi_state->gss_oid)));
1165                 return NT_STATUS_ACCESS_DENIED;
1166         }
1167
1168         *sig = data_blob_talloc(mem_ctx, (uint8_t *)output_token.value, output_token.length);
1169
1170         dump_data_pw("gensec_gssapi_sign_packet: sig\n", sig->data, sig->length);
1171
1172         gss_release_buffer(&min_stat, &output_token);
1173
1174         return NT_STATUS_OK;
1175 }
1176
1177 static NTSTATUS gensec_gssapi_check_packet(struct gensec_security *gensec_security, 
1178                                            const uint8_t *data, size_t length, 
1179                                            const uint8_t *whole_pdu, size_t pdu_length, 
1180                                            const DATA_BLOB *sig)
1181 {
1182         struct gensec_gssapi_state *gensec_gssapi_state
1183                 = talloc_get_type(gensec_security->private_data, struct gensec_gssapi_state);
1184         OM_uint32 maj_stat, min_stat;
1185         gss_buffer_desc input_token;
1186         gss_buffer_desc input_message;
1187         gss_qop_t qop_state;
1188
1189         dump_data_pw("gensec_gssapi_check_packet: sig\n", sig->data, sig->length);
1190
1191         if (gensec_security->want_features & GENSEC_FEATURE_SIGN_PKT_HEADER) {
1192                 input_message.length = pdu_length;
1193                 input_message.value = discard_const(whole_pdu);
1194         } else {
1195                 input_message.length = length;
1196                 input_message.value = discard_const(data);
1197         }
1198
1199         input_token.length = sig->length;
1200         input_token.value = sig->data;
1201
1202         maj_stat = gss_verify_mic(&min_stat,
1203                               gensec_gssapi_state->gssapi_context, 
1204                               &input_message,
1205                               &input_token,
1206                               &qop_state);
1207         if (GSS_ERROR(maj_stat)) {
1208                 char *error_string = gssapi_error_string(NULL, maj_stat, min_stat, gensec_gssapi_state->gss_oid);
1209                 DEBUG(1, ("GSS VerifyMic failed: %s\n", error_string));
1210                 talloc_free(error_string);
1211
1212                 return NT_STATUS_ACCESS_DENIED;
1213         }
1214
1215         return NT_STATUS_OK;
1216 }
1217
1218 /* Try to figure out what features we actually got on the connection */
1219 static bool gensec_gssapi_have_feature(struct gensec_security *gensec_security, 
1220                                        uint32_t feature) 
1221 {
1222         struct gensec_gssapi_state *gensec_gssapi_state
1223                 = talloc_get_type(gensec_security->private_data, struct gensec_gssapi_state);
1224         if (feature & GENSEC_FEATURE_SIGN) {
1225                 /* If we are going GSSAPI SASL, then we honour the second negotiation */
1226                 if (gensec_gssapi_state->sasl 
1227                     && gensec_gssapi_state->sasl_state == STAGE_DONE) {
1228                         return ((gensec_gssapi_state->sasl_protection & NEG_SIGN) 
1229                                 && (gensec_gssapi_state->gss_got_flags & GSS_C_INTEG_FLAG));
1230                 }
1231                 return gensec_gssapi_state->gss_got_flags & GSS_C_INTEG_FLAG;
1232         }
1233         if (feature & GENSEC_FEATURE_SEAL) {
1234                 /* If we are going GSSAPI SASL, then we honour the second negotiation */
1235                 if (gensec_gssapi_state->sasl 
1236                     && gensec_gssapi_state->sasl_state == STAGE_DONE) {
1237                         return ((gensec_gssapi_state->sasl_protection & NEG_SEAL) 
1238                                  && (gensec_gssapi_state->gss_got_flags & GSS_C_CONF_FLAG));
1239                 }
1240                 return gensec_gssapi_state->gss_got_flags & GSS_C_CONF_FLAG;
1241         }
1242         if (feature & GENSEC_FEATURE_SESSION_KEY) {
1243                 /* Only for GSSAPI/Krb5 */
1244                 if (smb_gss_oid_equal(gensec_gssapi_state->gss_oid,
1245                                       gss_mech_krb5)) {
1246                         return true;
1247                 }
1248         }
1249         if (feature & GENSEC_FEATURE_DCE_STYLE) {
1250                 return gensec_gssapi_state->gss_got_flags & GSS_C_DCE_STYLE;
1251         }
1252         if (feature & GENSEC_FEATURE_NEW_SPNEGO) {
1253                 NTSTATUS status;
1254                 uint32_t keytype;
1255
1256                 if (!(gensec_gssapi_state->gss_got_flags & GSS_C_INTEG_FLAG)) {
1257                         return false;
1258                 }
1259
1260                 if (gensec_setting_bool(gensec_security->settings, "gensec_gssapi", "force_new_spnego", false)) {
1261                         return true;
1262                 }
1263                 if (gensec_setting_bool(gensec_security->settings, "gensec_gssapi", "disable_new_spnego", false)) {
1264                         return false;
1265                 }
1266
1267                 status = gssapi_get_session_key(gensec_gssapi_state,
1268                                                 gensec_gssapi_state->gssapi_context, NULL, &keytype);
1269                 /* 
1270                  * We should do a proper sig on the mechListMic unless
1271                  * we know we have to be backwards compatible with
1272                  * earlier windows versions.  
1273                  * 
1274                  * Negotiating a non-krb5
1275                  * mech for example should be regarded as having
1276                  * NEW_SPNEGO
1277                  */
1278                 if (NT_STATUS_IS_OK(status)) {
1279                         switch (keytype) {
1280                         case ENCTYPE_DES_CBC_CRC:
1281                         case ENCTYPE_DES_CBC_MD5:
1282                         case ENCTYPE_ARCFOUR_HMAC:
1283                         case ENCTYPE_DES3_CBC_SHA1:
1284                                 return false;
1285                         }
1286                 }
1287                 return true;
1288         }
1289         /* We can always do async (rather than strict request/reply) packets.  */
1290         if (feature & GENSEC_FEATURE_ASYNC_REPLIES) {
1291                 return true;
1292         }
1293         if (feature & GENSEC_FEATURE_SIGN_PKT_HEADER) {
1294                 if (gensec_security->want_features & GENSEC_FEATURE_SEAL) {
1295                         /* TODO: implement this using gss_wrap_iov() */
1296                         return false;
1297                 }
1298
1299                 if (gensec_security->want_features & GENSEC_FEATURE_SIGN) {
1300                         return true;
1301                 }
1302
1303                 return false;
1304         }
1305         return false;
1306 }
1307
1308 static NTTIME gensec_gssapi_expire_time(struct gensec_security *gensec_security)
1309 {
1310         struct gensec_gssapi_state *gensec_gssapi_state =
1311                 talloc_get_type_abort(gensec_security->private_data,
1312                 struct gensec_gssapi_state);
1313
1314         return gensec_gssapi_state->expire_time;
1315 }
1316
1317 /*
1318  * Extract the 'sesssion key' needed by SMB signing and ncacn_np 
1319  * (for encrypting some passwords).
1320  * 
1321  * This breaks all the abstractions, but what do you expect...
1322  */
1323 static NTSTATUS gensec_gssapi_session_key(struct gensec_security *gensec_security, 
1324                                           TALLOC_CTX *mem_ctx,
1325                                           DATA_BLOB *session_key) 
1326 {
1327         struct gensec_gssapi_state *gensec_gssapi_state
1328                 = talloc_get_type(gensec_security->private_data, struct gensec_gssapi_state);
1329         return gssapi_get_session_key(mem_ctx, gensec_gssapi_state->gssapi_context, session_key, NULL);
1330 }
1331
1332 /* Get some basic (and authorization) information about the user on
1333  * this session.  This uses either the PAC (if present) or a local
1334  * database lookup */
1335 static NTSTATUS gensec_gssapi_session_info(struct gensec_security *gensec_security,
1336                                            TALLOC_CTX *mem_ctx,
1337                                            struct auth_session_info **_session_info) 
1338 {
1339         NTSTATUS nt_status;
1340         TALLOC_CTX *tmp_ctx;
1341         struct gensec_gssapi_state *gensec_gssapi_state
1342                 = talloc_get_type(gensec_security->private_data, struct gensec_gssapi_state);
1343         struct auth_session_info *session_info = NULL;
1344         OM_uint32 maj_stat, min_stat;
1345         DATA_BLOB pac_blob, *pac_blob_ptr = NULL;
1346
1347         gss_buffer_desc name_token;
1348         char *principal_string;
1349         
1350         tmp_ctx = talloc_named(mem_ctx, 0, "gensec_gssapi_session_info context");
1351         NT_STATUS_HAVE_NO_MEMORY(tmp_ctx);
1352
1353         maj_stat = gss_display_name (&min_stat,
1354                                      gensec_gssapi_state->client_name,
1355                                      &name_token,
1356                                      NULL);
1357         if (GSS_ERROR(maj_stat)) {
1358                 DEBUG(1, ("GSS display_name failed: %s\n",
1359                           gssapi_error_string(tmp_ctx, maj_stat, min_stat, gensec_gssapi_state->gss_oid)));
1360                 talloc_free(tmp_ctx);
1361                 return NT_STATUS_FOOBAR;
1362         }
1363
1364         principal_string = talloc_strndup(tmp_ctx,
1365                                           (const char *)name_token.value,
1366                                           name_token.length);
1367
1368         gss_release_buffer(&min_stat, &name_token);
1369
1370         if (!principal_string) {
1371                 talloc_free(tmp_ctx);
1372                 return NT_STATUS_NO_MEMORY;
1373         }
1374
1375         nt_status = gssapi_obtain_pac_blob(tmp_ctx,  gensec_gssapi_state->gssapi_context,
1376                                            gensec_gssapi_state->client_name,
1377                                            &pac_blob);
1378         
1379         /* IF we have the PAC - otherwise we need to get this
1380          * data from elsewere - local ldb, or (TODO) lookup of some
1381          * kind... 
1382          */
1383         if (NT_STATUS_IS_OK(nt_status)) {
1384                 pac_blob_ptr = &pac_blob;
1385         }
1386         nt_status = gensec_generate_session_info_pac(tmp_ctx,
1387                                                      gensec_security,
1388                                                      gensec_gssapi_state->smb_krb5_context,
1389                                                      pac_blob_ptr, principal_string,
1390                                                      gensec_get_remote_address(gensec_security),
1391                                                      &session_info);
1392         if (!NT_STATUS_IS_OK(nt_status)) {
1393                 talloc_free(tmp_ctx);
1394                 return nt_status;
1395         }
1396
1397         nt_status = gensec_gssapi_session_key(gensec_security, session_info, &session_info->session_key);
1398         if (!NT_STATUS_IS_OK(nt_status)) {
1399                 talloc_free(tmp_ctx);
1400                 return nt_status;
1401         }
1402
1403         if (!(gensec_gssapi_state->gss_got_flags & GSS_C_DELEG_FLAG)) {
1404                 DEBUG(10, ("gensec_gssapi: NO delegated credentials supplied by client\n"));
1405         } else {
1406                 krb5_error_code ret;
1407                 const char *error_string;
1408
1409                 DEBUG(10, ("gensec_gssapi: delegated credentials supplied by client\n"));
1410                 session_info->credentials = cli_credentials_init(session_info);
1411                 if (!session_info->credentials) {
1412                         talloc_free(tmp_ctx);
1413                         return NT_STATUS_NO_MEMORY;
1414                 }
1415
1416                 cli_credentials_set_conf(session_info->credentials, gensec_security->settings->lp_ctx);
1417                 /* Just so we don't segfault trying to get at a username */
1418                 cli_credentials_set_anonymous(session_info->credentials);
1419                 
1420                 ret = cli_credentials_set_client_gss_creds(session_info->credentials, 
1421                                                            gensec_security->settings->lp_ctx,
1422                                                            gensec_gssapi_state->delegated_cred_handle,
1423                                                            CRED_SPECIFIED, &error_string);
1424                 if (ret) {
1425                         talloc_free(tmp_ctx);
1426                         DEBUG(2,("Failed to get gss creds: %s\n", error_string));
1427                         return NT_STATUS_NO_MEMORY;
1428                 }
1429                 
1430                 /* This credential handle isn't useful for password authentication, so ensure nobody tries to do that */
1431                 cli_credentials_set_kerberos_state(session_info->credentials, CRED_MUST_USE_KERBEROS);
1432
1433                 /* It has been taken from this place... */
1434                 gensec_gssapi_state->delegated_cred_handle = GSS_C_NO_CREDENTIAL;
1435         }
1436         *_session_info = talloc_steal(mem_ctx, session_info);
1437         talloc_free(tmp_ctx);
1438
1439         return NT_STATUS_OK;
1440 }
1441
1442 static size_t gensec_gssapi_sig_size(struct gensec_security *gensec_security, size_t data_size)
1443 {
1444         struct gensec_gssapi_state *gensec_gssapi_state
1445                 = talloc_get_type(gensec_security->private_data, struct gensec_gssapi_state);
1446         NTSTATUS status;
1447
1448         if (gensec_gssapi_state->sig_size) {
1449                 return gensec_gssapi_state->sig_size;
1450         }
1451
1452         if (gensec_gssapi_state->gss_got_flags & GSS_C_CONF_FLAG) {
1453                 gensec_gssapi_state->sig_size = 45;
1454         } else {
1455                 gensec_gssapi_state->sig_size = 37;
1456         }
1457
1458         status = gensec_gssapi_init_lucid(gensec_gssapi_state);
1459         if (!NT_STATUS_IS_OK(status)) {
1460                 return gensec_gssapi_state->sig_size;
1461         }
1462
1463         if (gensec_gssapi_state->lucid->protocol == 1) {
1464                 if (gensec_gssapi_state->gss_got_flags & GSS_C_CONF_FLAG) {
1465                         /*
1466                          * TODO: windows uses 76 here, but we don't know
1467                          *       gss_wrap works with aes keys yet
1468                          */
1469                         gensec_gssapi_state->sig_size = 76;
1470                 } else {
1471                         gensec_gssapi_state->sig_size = 28;
1472                 }
1473         } else if (gensec_gssapi_state->lucid->protocol == 0) {
1474                 switch (gensec_gssapi_state->lucid->rfc1964_kd.ctx_key.type) {
1475                 case ENCTYPE_DES_CBC_CRC:
1476                 case ENCTYPE_ARCFOUR_HMAC:
1477                 case ENCTYPE_ARCFOUR_HMAC_EXP:
1478                         if (gensec_gssapi_state->gss_got_flags & GSS_C_CONF_FLAG) {
1479                                 gensec_gssapi_state->sig_size = 45;
1480                         } else {
1481                                 gensec_gssapi_state->sig_size = 37;
1482                         }
1483                         break;
1484 #ifdef SAMBA4_USES_HEIMDAL
1485                 case ENCTYPE_OLD_DES3_CBC_SHA1:
1486                         if (gensec_gssapi_state->gss_got_flags & GSS_C_CONF_FLAG) {
1487                                 gensec_gssapi_state->sig_size = 57;
1488                         } else {
1489                                 gensec_gssapi_state->sig_size = 49;
1490                         }
1491                         break;
1492 #endif
1493                 }
1494         }
1495
1496         return gensec_gssapi_state->sig_size;
1497 }
1498
1499 static const char *gensec_gssapi_krb5_oids[] = { 
1500         GENSEC_OID_KERBEROS5_OLD,
1501         GENSEC_OID_KERBEROS5,
1502         NULL 
1503 };
1504
1505 static const char *gensec_gssapi_spnego_oids[] = { 
1506         GENSEC_OID_SPNEGO,
1507         NULL 
1508 };
1509
1510 /* As a server, this could in theory accept any GSSAPI mech */
1511 static const struct gensec_security_ops gensec_gssapi_spnego_security_ops = {
1512         .name           = "gssapi_spnego",
1513         .sasl_name      = "GSS-SPNEGO",
1514         .auth_type      = DCERPC_AUTH_TYPE_SPNEGO,
1515         .oid            = gensec_gssapi_spnego_oids,
1516         .client_start   = gensec_gssapi_client_start,
1517         .server_start   = gensec_gssapi_server_start,
1518         .magic          = gensec_magic_check_krb5_oid,
1519         .update         = gensec_gssapi_update,
1520         .session_key    = gensec_gssapi_session_key,
1521         .session_info   = gensec_gssapi_session_info,
1522         .sign_packet    = gensec_gssapi_sign_packet,
1523         .check_packet   = gensec_gssapi_check_packet,
1524         .seal_packet    = gensec_gssapi_seal_packet,
1525         .unseal_packet  = gensec_gssapi_unseal_packet,
1526         .wrap           = gensec_gssapi_wrap,
1527         .unwrap         = gensec_gssapi_unwrap,
1528         .have_feature   = gensec_gssapi_have_feature,
1529         .expire_time    = gensec_gssapi_expire_time,
1530         .enabled        = false,
1531         .kerberos       = true,
1532         .priority       = GENSEC_GSSAPI
1533 };
1534
1535 /* As a server, this could in theory accept any GSSAPI mech */
1536 static const struct gensec_security_ops gensec_gssapi_krb5_security_ops = {
1537         .name           = "gssapi_krb5",
1538         .auth_type      = DCERPC_AUTH_TYPE_KRB5,
1539         .oid            = gensec_gssapi_krb5_oids,
1540         .client_start   = gensec_gssapi_client_start,
1541         .server_start   = gensec_gssapi_server_start,
1542         .magic          = gensec_magic_check_krb5_oid,
1543         .update         = gensec_gssapi_update,
1544         .session_key    = gensec_gssapi_session_key,
1545         .session_info   = gensec_gssapi_session_info,
1546         .sig_size       = gensec_gssapi_sig_size,
1547         .sign_packet    = gensec_gssapi_sign_packet,
1548         .check_packet   = gensec_gssapi_check_packet,
1549         .seal_packet    = gensec_gssapi_seal_packet,
1550         .unseal_packet  = gensec_gssapi_unseal_packet,
1551         .wrap           = gensec_gssapi_wrap,
1552         .unwrap         = gensec_gssapi_unwrap,
1553         .have_feature   = gensec_gssapi_have_feature,
1554         .expire_time    = gensec_gssapi_expire_time,
1555         .enabled        = true,
1556         .kerberos       = true,
1557         .priority       = GENSEC_GSSAPI
1558 };
1559
1560 /* As a server, this could in theory accept any GSSAPI mech */
1561 static const struct gensec_security_ops gensec_gssapi_sasl_krb5_security_ops = {
1562         .name             = "gssapi_krb5_sasl",
1563         .sasl_name        = "GSSAPI",
1564         .client_start     = gensec_gssapi_sasl_client_start,
1565         .server_start     = gensec_gssapi_sasl_server_start,
1566         .update           = gensec_gssapi_update,
1567         .session_key      = gensec_gssapi_session_key,
1568         .session_info     = gensec_gssapi_session_info,
1569         .max_input_size   = gensec_gssapi_max_input_size,
1570         .max_wrapped_size = gensec_gssapi_max_wrapped_size,
1571         .wrap             = gensec_gssapi_wrap,
1572         .unwrap           = gensec_gssapi_unwrap,
1573         .have_feature     = gensec_gssapi_have_feature,
1574         .expire_time      = gensec_gssapi_expire_time,
1575         .enabled          = true,
1576         .kerberos         = true,
1577         .priority         = GENSEC_GSSAPI
1578 };
1579
1580 _PUBLIC_ NTSTATUS gensec_gssapi_init(void)
1581 {
1582         NTSTATUS ret;
1583
1584         ret = gensec_register(&gensec_gssapi_spnego_security_ops);
1585         if (!NT_STATUS_IS_OK(ret)) {
1586                 DEBUG(0,("Failed to register '%s' gensec backend!\n",
1587                         gensec_gssapi_spnego_security_ops.name));
1588                 return ret;
1589         }
1590
1591         ret = gensec_register(&gensec_gssapi_krb5_security_ops);
1592         if (!NT_STATUS_IS_OK(ret)) {
1593                 DEBUG(0,("Failed to register '%s' gensec backend!\n",
1594                         gensec_gssapi_krb5_security_ops.name));
1595                 return ret;
1596         }
1597
1598         ret = gensec_register(&gensec_gssapi_sasl_krb5_security_ops);
1599         if (!NT_STATUS_IS_OK(ret)) {
1600                 DEBUG(0,("Failed to register '%s' gensec backend!\n",
1601                         gensec_gssapi_sasl_krb5_security_ops.name));
1602                 return ret;
1603         }
1604
1605         return ret;
1606 }