summaryrefslogtreecommitdiffstats
path: root/src/Server/RequestHandlers/GSSAPIAuthRequestHandler.cpp
blob: dba92c74dfdd9226b4f7822f8dca22fbb0cc6ce4 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
/*
 * GSSAPIAuthRequestHandler.cpp
 *
 * Copyright (C) 2008 Matthias Schiffer <matthias@gamezock.de>
 *
 * This program is free software: you can redistribute it and/or modify it
 * under the terms of the GNU General Public License as published by the
 * Free Software Foundation, either version 3 of the License, or
 * (at your option) any later version.
 *
 * This program is distributed in the hope that it will be useful, but
 * WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
 * See the GNU General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License along
 * with this program. If not, see <http://www.gnu.org/licenses/>.
 */

#include "GSSAPIAuthRequestHandler.h"
#include <Common/Logger.h>
#include <Net/Exception.h>

#include <cstring>

namespace Mad {
namespace Server {
namespace RequestHandlers {

// TODO Error handling

void GSSAPIAuthRequestHandler::handlePacket(const Common::XmlPacket &packet) {
  if(packet.getType() != "AuthGSSAPI") {
    Common::Logger::log(Common::Logger::ERROR, "Received an unexpected packet.");

    Common::XmlPacket ret;
    ret.setType("Error");
    ret.add("ErrorCode", Net::Exception::UNEXPECTED_PACKET);

    sendPacket(ret);

    signalFinished();
    return;
  }

  OM_uint32 majStat, minStat;
  gss_buffer_desc recvBuffer, sendBuffer;

  // Needs error handling!

  if(gssContinue) {
    const void *pkgData;
    packet["authToken"].getBinaryData(&pkgData, &recvBuffer.length);

    recvBuffer.value = std::malloc(recvBuffer.length);
    std::memcpy(recvBuffer.value, pkgData, recvBuffer.length);

    majStat = gss_accept_sec_context(&minStat, &gssContext, GSS_C_NO_CREDENTIAL, &recvBuffer, GSS_C_NO_CHANNEL_BINDINGS, 0, 0, &sendBuffer, 0, 0, 0);

    std::free(recvBuffer.value);

    if(majStat == GSS_S_COMPLETE) {
      Common::Logger::log(Common::Logger::VERBOSE, "GSS context established.");
      gssContinue = false;
    }
    else if(majStat != GSS_S_CONTINUE_NEEDED) {
      gss_release_buffer(&minStat, &sendBuffer);
      return;
    }

    Common::XmlPacket ret;
    ret.setType("AuthGSSAPI");
    ret.addBinary("authToken", sendBuffer.value, sendBuffer.length);

    sendPacket(ret);

    gss_release_buffer(&minStat, &sendBuffer);
  }
  else if(!sentSignature) {
    if(!packet["binary"].isEmpty())
      return;

    /*const gnutls_datum_t *cert = getConnection()->getCertificate();

    recvBuffer.length = cert->size;
    recvBuffer.value = cert->data;*/

    recvBuffer.value = getConnection()->getCertificate(&recvBuffer.length);

    majStat = gss_get_mic(&minStat, gssContext, GSS_C_QOP_DEFAULT, &recvBuffer, &sendBuffer);

    if(majStat != GSS_S_COMPLETE) {
      gss_release_buffer(&minStat, &sendBuffer);
      return;
    }

    Common::XmlPacket ret;
    ret.setType("AuthGSSAPI");
    ret.addBinary("certMic", sendBuffer.value, sendBuffer.length);

    sendPacket(ret);

    gss_release_buffer(&minStat, &sendBuffer);

    sentSignature = true;
  }
  else {
    const void *pkgData;
    packet["authToken"].getBinaryData(&pkgData, &recvBuffer.length);

    recvBuffer.value = std::malloc(recvBuffer.length);
    std::memcpy(recvBuffer.value, pkgData, recvBuffer.length);

    majStat = gss_process_context_token(&minStat, gssContext, &recvBuffer);

    std::free(recvBuffer.value);

    if(majStat != GSS_S_COMPLETE)
      return;

    signalFinished();
  }
}

}
}
}