2013-09-30 22:51:20 +02:00
|
|
|
/*
|
2014-04-24 23:39:29 +02:00
|
|
|
Copyright (c) 2007-2014 Contributors as noted in the AUTHORS file
|
2013-09-30 22:51:20 +02:00
|
|
|
|
|
|
|
This file is part of 0MQ.
|
|
|
|
|
|
|
|
0MQ is free software; you can redistribute it and/or modify it under
|
|
|
|
the terms of the GNU Lesser General Public License as published by
|
|
|
|
the Free Software Foundation; either version 3 of the License, or
|
|
|
|
(at your option) any later version.
|
|
|
|
|
|
|
|
0MQ is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
GNU Lesser General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU Lesser General Public License
|
|
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef __ZMQ_GSSAPI_MECHANISM_BASE_HPP_INCLUDED__
|
|
|
|
#define __ZMQ_GSSAPI_MECHANISM_BASE_HPP_INCLUDED__
|
|
|
|
|
2013-10-03 05:09:36 +02:00
|
|
|
#include <gssapi/gssapi_generic.h>
|
|
|
|
#include <gssapi/gssapi_krb5.h>
|
2013-11-07 20:49:45 +01:00
|
|
|
|
|
|
|
#include "mechanism.hpp"
|
|
|
|
#include "options.hpp"
|
2013-10-03 05:09:36 +02:00
|
|
|
|
2013-09-30 22:51:20 +02:00
|
|
|
namespace zmq
|
|
|
|
{
|
|
|
|
|
|
|
|
class msg_t;
|
|
|
|
|
2013-10-08 07:12:50 +02:00
|
|
|
/// Commonalities between clients and servers are captured here.
|
2013-10-08 07:25:18 +02:00
|
|
|
/// For example, clients and servers both need to produce and
|
|
|
|
/// process context-level GSSAPI tokens (via INITIATE commands)
|
|
|
|
/// and per-message GSSAPI tokens (via MESSAGE commands).
|
2013-11-07 20:49:45 +01:00
|
|
|
class gssapi_mechanism_base_t:
|
|
|
|
public mechanism_t
|
2013-09-30 22:51:20 +02:00
|
|
|
{
|
|
|
|
public:
|
2013-11-07 20:49:45 +01:00
|
|
|
gssapi_mechanism_base_t (const options_t &options_);
|
2013-09-30 22:51:20 +02:00
|
|
|
virtual ~gssapi_mechanism_base_t () = 0;
|
|
|
|
|
|
|
|
protected:
|
2013-10-08 07:25:18 +02:00
|
|
|
// Produce a context-level GSSAPI token (INITIATE command)
|
|
|
|
// during security context initialization.
|
2013-10-08 07:12:50 +02:00
|
|
|
int produce_initiate (msg_t *msg_, void *data_, size_t data_len_);
|
2013-10-08 07:25:18 +02:00
|
|
|
|
|
|
|
// Process a context-level GSSAPI token (INITIATE command)
|
|
|
|
// during security context initialization.
|
2013-10-08 07:12:50 +02:00
|
|
|
int process_initiate (msg_t *msg_, void **data_, size_t &data_len_);
|
2013-11-07 20:49:45 +01:00
|
|
|
|
|
|
|
// Produce a metadata ready msg (READY) to conclude handshake
|
2014-04-23 21:19:19 +02:00
|
|
|
int produce_ready (msg_t *msg_);
|
2013-11-07 20:49:45 +01:00
|
|
|
|
|
|
|
// Process a metadata ready msg (READY)
|
|
|
|
int process_ready (msg_t *msg_);
|
2013-10-08 07:25:18 +02:00
|
|
|
|
|
|
|
// Encode a per-message GSSAPI token (MESSAGE command) using
|
|
|
|
// the established security context.
|
2013-10-08 07:12:50 +02:00
|
|
|
int encode_message (msg_t *msg_);
|
2013-10-08 07:25:18 +02:00
|
|
|
|
|
|
|
// Decode a per-message GSSAPI token (MESSAGE command) using
|
|
|
|
// the established security context.
|
2013-10-08 07:12:50 +02:00
|
|
|
int decode_message (msg_t *msg_);
|
2013-10-08 07:25:18 +02:00
|
|
|
|
|
|
|
// Acquire security context credentials from the
|
|
|
|
// underlying mechanism.
|
2014-04-23 19:20:22 +02:00
|
|
|
static int acquire_credentials (char * principal_name_,
|
2013-10-08 07:12:50 +02:00
|
|
|
gss_cred_id_t * cred_);
|
2013-10-03 20:43:20 +02:00
|
|
|
|
|
|
|
protected:
|
2013-10-08 07:25:18 +02:00
|
|
|
// Opaque GSSAPI token for outgoing data
|
2013-10-03 20:43:20 +02:00
|
|
|
gss_buffer_desc send_tok;
|
2013-10-08 07:12:50 +02:00
|
|
|
|
2013-10-08 07:25:18 +02:00
|
|
|
// Opaque GSSAPI token for incoming data
|
2013-10-03 20:43:20 +02:00
|
|
|
gss_buffer_desc recv_tok;
|
2013-10-08 07:12:50 +02:00
|
|
|
|
2014-04-23 19:20:22 +02:00
|
|
|
// Opaque GSSAPI representation of principal
|
2013-10-03 20:43:20 +02:00
|
|
|
gss_name_t target_name;
|
2013-10-08 07:12:50 +02:00
|
|
|
|
2013-11-20 23:01:16 +01:00
|
|
|
// Human-readable principal name
|
2014-04-23 19:20:22 +02:00
|
|
|
char * principal_name;
|
2013-10-08 07:12:50 +02:00
|
|
|
|
2013-10-08 07:25:18 +02:00
|
|
|
// Status code returned by GSSAPI functions
|
2013-10-03 20:43:20 +02:00
|
|
|
OM_uint32 maj_stat;
|
2013-10-08 07:12:50 +02:00
|
|
|
|
2013-10-08 07:25:18 +02:00
|
|
|
// Status code returned by the underlying mechanism
|
2013-10-03 20:43:20 +02:00
|
|
|
OM_uint32 min_stat;
|
2013-10-08 07:12:50 +02:00
|
|
|
|
2013-10-08 07:25:18 +02:00
|
|
|
// Status code returned by the underlying mechanism
|
|
|
|
// during context initialization
|
2013-10-03 20:43:20 +02:00
|
|
|
OM_uint32 init_sec_min_stat;
|
2013-10-08 07:12:50 +02:00
|
|
|
|
2013-10-08 07:25:18 +02:00
|
|
|
// Flags returned by GSSAPI (ignored)
|
2013-10-03 20:43:20 +02:00
|
|
|
OM_uint32 ret_flags;
|
2013-10-08 07:12:50 +02:00
|
|
|
|
2013-10-08 07:25:18 +02:00
|
|
|
// Flags returned by GSSAPI (ignored)
|
2013-10-03 20:43:20 +02:00
|
|
|
OM_uint32 gss_flags;
|
2013-10-08 07:12:50 +02:00
|
|
|
|
2013-10-08 07:25:18 +02:00
|
|
|
// Credentials used to establish security context
|
2013-10-03 20:43:20 +02:00
|
|
|
gss_cred_id_t cred;
|
2013-10-08 07:12:50 +02:00
|
|
|
|
2013-10-08 07:25:18 +02:00
|
|
|
// Opaque GSSAPI representation of the security context
|
2013-10-03 20:43:20 +02:00
|
|
|
gss_ctx_id_t context;
|
2014-04-23 20:01:54 +02:00
|
|
|
|
|
|
|
// If true, use gss to encrypt messages. If false, only utilize gss for auth.
|
|
|
|
bool do_encryption;
|
2013-09-30 22:51:20 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
}
|
2013-10-08 07:12:50 +02:00
|
|
|
|
2013-09-30 22:51:20 +02:00
|
|
|
#endif
|
2013-10-08 07:12:50 +02:00
|
|
|
|