2013-09-30 22:51:20 +02:00
|
|
|
/*
|
2016-01-28 15:07:31 +01:00
|
|
|
Copyright (c) 2007-2016 Contributors as noted in the AUTHORS file
|
2013-09-30 22:51:20 +02:00
|
|
|
|
2015-06-02 22:33:55 +02:00
|
|
|
This file is part of libzmq, the ZeroMQ core engine in C++.
|
2013-09-30 22:51:20 +02:00
|
|
|
|
2015-06-02 22:33:55 +02:00
|
|
|
libzmq is free software; you can redistribute it and/or modify it under
|
|
|
|
the terms of the GNU Lesser General Public License (LGPL) as published
|
|
|
|
by the Free Software Foundation; either version 3 of the License, or
|
2013-09-30 22:51:20 +02:00
|
|
|
(at your option) any later version.
|
|
|
|
|
2015-06-02 22:33:55 +02:00
|
|
|
As a special exception, the Contributors give you permission to link
|
|
|
|
this library with independent modules to produce an executable,
|
|
|
|
regardless of the license terms of these independent modules, and to
|
|
|
|
copy and distribute the resulting executable under terms of your choice,
|
|
|
|
provided that you also meet, for each linked independent module, the
|
|
|
|
terms and conditions of the license of that module. An independent
|
|
|
|
module is a module which is not derived from or based on this library.
|
|
|
|
If you modify this library, you must extend this exception to your
|
|
|
|
version of the library.
|
|
|
|
|
|
|
|
libzmq is distributed in the hope that it will be useful, but WITHOUT
|
|
|
|
ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
|
|
FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public
|
|
|
|
License for more details.
|
2013-09-30 22:51:20 +02:00
|
|
|
|
|
|
|
You should have received a copy of the GNU Lesser General Public License
|
|
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef __ZMQ_GSSAPI_MECHANISM_BASE_HPP_INCLUDED__
|
|
|
|
#define __ZMQ_GSSAPI_MECHANISM_BASE_HPP_INCLUDED__
|
|
|
|
|
2014-04-25 06:17:07 +02:00
|
|
|
#ifdef HAVE_LIBGSSAPI_KRB5
|
|
|
|
|
2016-03-04 08:38:57 +01:00
|
|
|
#if HAVE_GSSAPI_GSSAPI_GENERIC_H
|
2013-10-03 05:09:36 +02:00
|
|
|
#include <gssapi/gssapi_generic.h>
|
2014-05-05 21:59:11 +02:00
|
|
|
#endif
|
2013-10-03 05:09:36 +02:00
|
|
|
#include <gssapi/gssapi_krb5.h>
|
2013-11-07 20:49:45 +01:00
|
|
|
|
2017-08-19 17:51:01 +02:00
|
|
|
#include "mechanism_base.hpp"
|
2013-11-07 20:49:45 +01:00
|
|
|
#include "options.hpp"
|
2013-10-03 05:09:36 +02:00
|
|
|
|
2013-09-30 22:51:20 +02:00
|
|
|
namespace zmq
|
|
|
|
{
|
|
|
|
class msg_t;
|
|
|
|
|
2013-10-08 07:12:50 +02:00
|
|
|
/// Commonalities between clients and servers are captured here.
|
2013-10-08 07:25:18 +02:00
|
|
|
/// For example, clients and servers both need to produce and
|
|
|
|
/// process context-level GSSAPI tokens (via INITIATE commands)
|
|
|
|
/// and per-message GSSAPI tokens (via MESSAGE commands).
|
2017-08-18 10:04:58 +02:00
|
|
|
class gssapi_mechanism_base_t : public virtual mechanism_base_t
|
2013-09-30 22:51:20 +02:00
|
|
|
{
|
2017-08-18 10:04:58 +02:00
|
|
|
public:
|
|
|
|
gssapi_mechanism_base_t (session_base_t *session_,
|
|
|
|
const options_t &options_);
|
2019-12-24 10:39:26 +01:00
|
|
|
~gssapi_mechanism_base_t () ZMQ_OVERRIDE = 0;
|
2014-04-25 06:17:07 +02:00
|
|
|
|
2017-08-18 10:04:58 +02:00
|
|
|
protected:
|
2013-10-08 07:25:18 +02:00
|
|
|
// Produce a context-level GSSAPI token (INITIATE command)
|
|
|
|
// during security context initialization.
|
2013-10-08 07:12:50 +02:00
|
|
|
int produce_initiate (msg_t *msg_, void *data_, size_t data_len_);
|
2013-11-07 20:49:45 +01:00
|
|
|
|
|
|
|
// Process a context-level GSSAPI token (INITIATE command)
|
|
|
|
// during security context initialization.
|
2014-04-23 21:19:19 +02:00
|
|
|
int process_initiate (msg_t *msg_, void **data_, size_t &data_len_);
|
2013-11-07 20:49:45 +01:00
|
|
|
|
|
|
|
// Produce a metadata ready msg (READY) to conclude handshake
|
|
|
|
int produce_ready (msg_t *msg_);
|
2014-04-25 06:17:07 +02:00
|
|
|
|
2013-10-08 07:25:18 +02:00
|
|
|
// Process a metadata ready msg (READY)
|
2013-10-08 07:12:50 +02:00
|
|
|
int process_ready (msg_t *msg_);
|
2014-04-25 06:17:07 +02:00
|
|
|
|
2013-10-08 07:25:18 +02:00
|
|
|
// Encode a per-message GSSAPI token (MESSAGE command) using
|
|
|
|
// the established security context.
|
2013-10-08 07:12:50 +02:00
|
|
|
int encode_message (msg_t *msg_);
|
2014-04-25 06:17:07 +02:00
|
|
|
|
2017-04-21 01:28:30 +02:00
|
|
|
// Decode a per-message GSSAPI token (MESSAGE command) using
|
|
|
|
// the established security context.
|
|
|
|
int decode_message (msg_t *msg_);
|
|
|
|
|
2013-10-08 07:25:18 +02:00
|
|
|
// Convert ZMQ_GSSAPI_NT values to GSSAPI name_type
|
2017-04-24 22:55:35 +02:00
|
|
|
static const gss_OID convert_nametype (int zmq_name_type_);
|
2013-10-03 20:43:20 +02:00
|
|
|
|
2013-10-08 07:25:18 +02:00
|
|
|
// Acquire security context credentials from the
|
|
|
|
// underlying mechanism.
|
|
|
|
static int acquire_credentials (char *principal_name_,
|
2013-10-03 20:43:20 +02:00
|
|
|
gss_cred_id_t *cred_,
|
|
|
|
gss_OID name_type_);
|
2014-04-25 06:17:07 +02:00
|
|
|
|
2013-10-03 20:43:20 +02:00
|
|
|
protected:
|
2013-10-08 07:25:18 +02:00
|
|
|
// Opaque GSSAPI token for outgoing data
|
2013-10-03 20:43:20 +02:00
|
|
|
gss_buffer_desc send_tok;
|
2014-04-25 06:17:07 +02:00
|
|
|
|
2014-04-23 19:20:22 +02:00
|
|
|
// Opaque GSSAPI token for incoming data
|
2013-10-03 20:43:20 +02:00
|
|
|
gss_buffer_desc recv_tok;
|
2014-04-25 06:17:07 +02:00
|
|
|
|
2013-11-20 23:01:16 +01:00
|
|
|
// Opaque GSSAPI representation of principal
|
2014-04-23 19:20:22 +02:00
|
|
|
gss_name_t target_name;
|
2013-10-08 07:12:50 +02:00
|
|
|
|
2013-10-08 07:25:18 +02:00
|
|
|
// Human-readable principal name
|
2013-10-03 20:43:20 +02:00
|
|
|
char *principal_name;
|
2013-10-08 07:12:50 +02:00
|
|
|
|
2013-10-08 07:25:18 +02:00
|
|
|
// Status code returned by GSSAPI functions
|
2013-10-03 20:43:20 +02:00
|
|
|
OM_uint32 maj_stat;
|
2013-10-08 07:12:50 +02:00
|
|
|
|
2013-10-08 07:25:18 +02:00
|
|
|
// Status code returned by the underlying mechanism
|
2013-10-03 20:43:20 +02:00
|
|
|
OM_uint32 min_stat;
|
2013-10-08 07:12:50 +02:00
|
|
|
|
2013-10-08 07:25:18 +02:00
|
|
|
// Status code returned by the underlying mechanism
|
|
|
|
// during context initialization
|
2013-10-03 20:43:20 +02:00
|
|
|
OM_uint32 init_sec_min_stat;
|
2014-04-25 06:17:07 +02:00
|
|
|
|
2013-10-08 07:25:18 +02:00
|
|
|
// Flags returned by GSSAPI (ignored)
|
2013-10-03 20:43:20 +02:00
|
|
|
OM_uint32 ret_flags;
|
2014-04-25 06:17:07 +02:00
|
|
|
|
2013-10-08 07:25:18 +02:00
|
|
|
// Flags returned by GSSAPI (ignored)
|
2013-10-03 20:43:20 +02:00
|
|
|
OM_uint32 gss_flags;
|
2013-10-08 07:12:50 +02:00
|
|
|
|
2013-10-08 07:25:18 +02:00
|
|
|
// Credentials used to establish security context
|
2013-10-03 20:43:20 +02:00
|
|
|
gss_cred_id_t cred;
|
2014-04-23 20:01:54 +02:00
|
|
|
|
|
|
|
// Opaque GSSAPI representation of the security context
|
|
|
|
gss_ctx_id_t context;
|
2013-09-30 22:51:20 +02:00
|
|
|
|
2014-04-23 20:01:54 +02:00
|
|
|
// If true, use gss to encrypt messages. If false, only utilize gss for auth.
|
|
|
|
bool do_encryption;
|
2018-02-01 11:46:09 +01:00
|
|
|
};
|
2013-09-30 22:51:20 +02:00
|
|
|
}
|
2014-04-25 06:17:07 +02:00
|
|
|
|
2013-09-30 22:51:20 +02:00
|
|
|
#endif
|
2013-10-08 07:12:50 +02:00
|
|
|
|
2014-04-25 06:17:07 +02:00
|
|
|
#endif
|