1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
|
/*
* GSSAPIAuthRequestHandler.cpp
*
* Copyright (C) 2008 Matthias Schiffer <matthias@gamezock.de>
*
* This program is free software: you can redistribute it and/or modify it
* under the terms of the GNU General Public License as published by the
* Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
* See the GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License along
* with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#include "GSSAPIAuthRequestHandler.h"
#include <Common/Logger.h>
#include <Net/Exception.h>
#include <cstring>
namespace Mad {
namespace Server {
namespace RequestHandlers {
// TODO Error handling
void GSSAPIAuthRequestHandler::handlePacket(const Common::XmlPacket &packet) {
if(packet.getType() != "AuthGSSAPI") {
Common::Logger::log(Common::Logger::ERROR, "Received an unexpected packet.");
Common::XmlPacket ret;
ret.setType("Error");
ret.add("ErrorCode", Net::Exception::UNEXPECTED_PACKET);
sendPacket(ret);
signalFinished();
return;
}
OM_uint32 majStat, minStat;
gss_buffer_desc recvBuffer, sendBuffer;
// Needs error handling!
if(gssContinue) {
const void *pkgData;
packet["authToken"].getBinaryData(&pkgData, &recvBuffer.length);
recvBuffer.value = std::malloc(recvBuffer.length);
std::memcpy(recvBuffer.value, pkgData, recvBuffer.length);
majStat = gss_accept_sec_context(&minStat, &gssContext, GSS_C_NO_CREDENTIAL, &recvBuffer, GSS_C_NO_CHANNEL_BINDINGS, 0, 0, &sendBuffer, 0, 0, 0);
std::free(recvBuffer.value);
if(majStat == GSS_S_COMPLETE) {
Common::Logger::log(Common::Logger::VERBOSE, "GSS context established.");
gssContinue = false;
}
else if(majStat != GSS_S_CONTINUE_NEEDED) {
gss_release_buffer(&minStat, &sendBuffer);
return;
}
Common::XmlPacket ret;
ret.setType("AuthGSSAPI");
ret.addBinary("authToken", sendBuffer.value, sendBuffer.length);
sendPacket(ret);
gss_release_buffer(&minStat, &sendBuffer);
}
else if(!sentSignature) {
if(!packet["binary"].isEmpty())
return;
/*const gnutls_datum_t *cert = getConnection()->getCertificate();
recvBuffer.length = cert->size;
recvBuffer.value = cert->data;*/
recvBuffer.value = getConnection()->getCertificate(&recvBuffer.length);
majStat = gss_get_mic(&minStat, gssContext, GSS_C_QOP_DEFAULT, &recvBuffer, &sendBuffer);
if(majStat != GSS_S_COMPLETE) {
gss_release_buffer(&minStat, &sendBuffer);
return;
}
Common::XmlPacket ret;
ret.setType("AuthGSSAPI");
ret.addBinary("certMic", sendBuffer.value, sendBuffer.length);
sendPacket(ret);
gss_release_buffer(&minStat, &sendBuffer);
sentSignature = true;
}
else {
const void *pkgData;
packet["authToken"].getBinaryData(&pkgData, &recvBuffer.length);
recvBuffer.value = std::malloc(recvBuffer.length);
std::memcpy(recvBuffer.value, pkgData, recvBuffer.length);
majStat = gss_process_context_token(&minStat, gssContext, &recvBuffer);
std::free(recvBuffer.value);
if(majStat != GSS_S_COMPLETE)
return;
signalFinished();
}
}
}
}
}
|