#include <config.h>
#include <errno.h>
#include <stdio.h>
#include <stdlib.h>
#include <limits.h>
#ifndef macintosh
#include <sys/types.h>
#include <sys/stat.h>
#endif
#include <fcntl.h>
#include <string.h>
#include <ctype.h>
#include "sasl.h"
#include "saslint.h"
#include "saslplug.h"
#include "saslutil.h"
#ifdef sun
extern int gethostname(char *, int);
#endif
#define DEFAULT_CHECKPASS_MECH "auxprop"
static int _sasl_server_active = 0;
int _is_sasl_server_active(void) { return _sasl_server_active; }
static int _sasl_checkpass(sasl_conn_t *conn,
const char *user, unsigned userlen,
const char *pass, unsigned passlen);
static mech_list_t *mechlist = NULL;
static sasl_global_callbacks_t global_callbacks;
int sasl_setpass(sasl_conn_t *conn,
const char *user,
const char *pass, unsigned passlen,
const char *oldpass,
unsigned oldpasslen,
unsigned flags)
{
int result=SASL_OK, tmpresult;
sasl_server_conn_t *s_conn = (sasl_server_conn_t *) conn;
const char *password_request[] = { SASL_AUX_PASSWORD_PROP, NULL };
sasl_server_userdb_setpass_t *setpass_cb = NULL;
void *context = NULL;
int tried_setpass = 0;
mechanism_t *m;
if (!_sasl_server_active || !mechlist) return SASL_NOTINIT;
if (!conn) return SASL_BADPARAM;
if (conn->type != SASL_CONN_SERVER) PARAMERROR(conn);
if ((!(flags & SASL_SET_DISABLE) && passlen == 0)
|| ((flags & SASL_SET_CREATE) && (flags & SASL_SET_DISABLE)))
PARAMERROR(conn);
if ((flags & SASL_SET_DISABLE || !(flags & SASL_SET_NOPLAIN)) &&
sasl_auxprop_store(NULL, NULL, NULL) == SASL_OK) {
tried_setpass++;
if (flags & SASL_SET_DISABLE) {
pass = NULL;
passlen = 0;
}
result = prop_request(s_conn->sparams->propctx, password_request);
if (result == SASL_OK) {
result = prop_set(s_conn->sparams->propctx, SASL_AUX_PASSWORD_PROP,
pass, passlen);
}
if (result == SASL_OK) {
result = sasl_auxprop_store(conn, s_conn->sparams->propctx, user);
}
if (result != SASL_OK) {
_sasl_log(conn, SASL_LOG_ERR,
"setpass failed for %s: %z",
user, result);
} else {
_sasl_log(conn, SASL_LOG_NOTE,
"setpass succeeded for %s", user);
}
}
result = _sasl_getcallback(conn, SASL_CB_SERVER_USERDB_SETPASS,
&setpass_cb, &context);
if(result == SASL_OK && setpass_cb) {
tried_setpass++;
tmpresult = setpass_cb(conn, context, user, pass, passlen,
s_conn->sparams->propctx, flags);
if(tmpresult != SASL_OK) {
_sasl_log(conn, SASL_LOG_ERR,
"setpass callback failed for %s: %z",
user, tmpresult);
} else {
_sasl_log(conn, SASL_LOG_NOTE,
"setpass callback succeeded for %s", user);
}
} else {
result = SASL_OK;
}
for (m = mechlist->mech_list; m; m = m->next) {
if (!m->plug->setpass) {
continue;
}
tried_setpass++;
tmpresult = m->plug->setpass(m->plug->glob_context,
((sasl_server_conn_t *)conn)->sparams,
user,
pass,
passlen,
oldpass, oldpasslen,
flags);
if (tmpresult == SASL_OK) {
_sasl_log(conn, SASL_LOG_NOTE,
"%s: set secret for %s", m->plug->mech_name, user);
m->condition = SASL_OK;
} else if (tmpresult == SASL_NOCHANGE) {
_sasl_log(conn, SASL_LOG_NOTE,
"%s: secret not changed for %s", m->plug->mech_name, user);
} else {
result = tmpresult;
_sasl_log(conn, SASL_LOG_ERR,
"%s: failed to set secret for %s: %z (%m)",
m->plug->mech_name, user, tmpresult,
#ifndef WIN32
errno
#else
GetLastError()
#endif
);
}
}
if (!tried_setpass) {
_sasl_log(conn, SASL_LOG_WARN,
"secret not changed for %s: "
"no writable auxprop plugin or setpass callback found",
user);
}
RETURN(conn, result);
}
static void server_dispose(sasl_conn_t *pconn)
{
sasl_server_conn_t *s_conn= (sasl_server_conn_t *) pconn;
context_list_t *cur, *cur_next;
if (s_conn->mech
&& s_conn->mech->plug->mech_dispose) {
s_conn->mech->plug->mech_dispose(pconn->context,
s_conn->sparams->utils);
}
pconn->context = NULL;
for(cur = s_conn->mech_contexts; cur; cur=cur_next) {
cur_next = cur->next;
if(cur->context)
cur->mech->plug->mech_dispose(cur->context, s_conn->sparams->utils);
sasl_FREE(cur);
}
s_conn->mech_contexts = NULL;
_sasl_free_utils(&s_conn->sparams->utils);
if (s_conn->sparams->propctx)
prop_dispose(&s_conn->sparams->propctx);
if (s_conn->user_realm)
sasl_FREE(s_conn->user_realm);
if (s_conn->sparams)
sasl_FREE(s_conn->sparams);
_sasl_conn_dispose(pconn);
}
static int init_mechlist(void)
{
sasl_utils_t *newutils = NULL;
mechlist->mutex = sasl_MUTEX_ALLOC();
if(!mechlist->mutex) return SASL_FAIL;
newutils = _sasl_alloc_utils(NULL, &global_callbacks);
if (newutils == NULL)
return SASL_NOMEM;
newutils->checkpass = &_sasl_checkpass;
mechlist->utils = newutils;
mechlist->mech_list=NULL;
mechlist->mech_length=0;
return SASL_OK;
}
int sasl_server_add_plugin(const char *plugname,
sasl_server_plug_init_t *p)
{
int plugcount;
sasl_server_plug_t *pluglist;
mechanism_t *mech;
sasl_server_plug_init_t *entry_point;
int result;
int version;
int lupe;
if(!plugname || !p) return SASL_BADPARAM;
entry_point = (sasl_server_plug_init_t *)p;
result = entry_point(mechlist->utils, SASL_SERVER_PLUG_VERSION, &version,
&pluglist, &plugcount);
if ((result != SASL_OK) && (result != SASL_NOUSER)) {
_sasl_log(NULL, SASL_LOG_DEBUG,
"server add_plugin entry_point error %z\n", result);
return result;
}
if (version != SASL_SERVER_PLUG_VERSION)
{
_sasl_log(NULL, SASL_LOG_ERR,
"version mismatch on plugin");
return SASL_BADVERS;
}
for (lupe=0;lupe < plugcount ;lupe++)
{
mech = sasl_ALLOC(sizeof(mechanism_t));
if (! mech) return SASL_NOMEM;
mech->plug=pluglist++;
if(_sasl_strdup(plugname, &mech->plugname, NULL) != SASL_OK) {
sasl_FREE(mech);
return SASL_NOMEM;
}
mech->version = version;
mech->condition = result;
mech->next = mechlist->mech_list;
mechlist->mech_list = mech;
mechlist->mech_length++;
}
return SASL_OK;
}
static int server_done(void) {
mechanism_t *m;
mechanism_t *prevm;
if(_sasl_server_active == 0)
return SASL_NOTINIT;
else
_sasl_server_active--;
if(_sasl_server_active) {
return SASL_CONTINUE;
}
if (mechlist != NULL)
{
m=mechlist->mech_list;
while (m!=NULL)
{
prevm=m;
m=m->next;
if (prevm->plug->mech_free) {
prevm->plug->mech_free(prevm->plug->glob_context,
mechlist->utils);
}
sasl_FREE(prevm->plugname);
sasl_FREE(prevm);
}
_sasl_free_utils(&mechlist->utils);
sasl_MUTEX_FREE(mechlist->mutex);
sasl_FREE(mechlist);
mechlist = NULL;
}
_sasl_auxprop_free();
global_callbacks.callbacks = NULL;
global_callbacks.appname = NULL;
return SASL_OK;
}
static int server_idle(sasl_conn_t *conn)
{
mechanism_t *m;
if (! mechlist)
return 0;
for (m = mechlist->mech_list;
m!=NULL;
m = m->next)
if (m->plug->idle
&& m->plug->idle(m->plug->glob_context,
conn,
conn ? ((sasl_server_conn_t *)conn)->sparams : NULL))
return 1;
return 0;
}
static int load_config(const sasl_callback_t *verifyfile_cb)
{
int result;
const char *path_to_config=NULL;
const char *c;
size_t path_len;
char *config_filename=NULL;
size_t len;
const sasl_callback_t *getpath_cb=NULL;
getpath_cb=_sasl_find_getpath_callback( global_callbacks.callbacks );
if (getpath_cb==NULL) return SASL_BADPARAM;
result = ((sasl_getpath_t *)(getpath_cb->proc))(getpath_cb->context,
&path_to_config);
if (result!=SASL_OK) goto done;
if (path_to_config == NULL) path_to_config = "";
c = strchr(path_to_config, PATHS_DELIMITER);
if(c != NULL)
path_len = c - path_to_config;
else
path_len = strlen(path_to_config);
len = path_len + 2 + strlen(global_callbacks.appname) + 5 + 1;
if (len > PATH_MAX ) {
result = SASL_FAIL;
goto done;
}
config_filename = sasl_ALLOC((unsigned)len);
if (! config_filename) {
result = SASL_NOMEM;
goto done;
}
snprintf(config_filename, len, "%.*s%c%s.conf", path_len, path_to_config,
HIER_DELIMITER, global_callbacks.appname);
result = ((sasl_verifyfile_t *)(verifyfile_cb->proc))(verifyfile_cb->context,
config_filename, SASL_VRFY_CONF);
if (result==SASL_OK)
result=sasl_config_init(config_filename);
done:
if (config_filename) sasl_FREE(config_filename);
return result;
}
static int verify_server_callbacks(const sasl_callback_t *callbacks)
{
if (callbacks == NULL) return SASL_OK;
while (callbacks->id != SASL_CB_LIST_END) {
if (callbacks->proc==NULL) return SASL_FAIL;
callbacks++;
}
return SASL_OK;
}
static char *grab_field(char *line, char **eofield)
{
int d = 0;
char *field;
while (isspace((int) *line)) line++;
while (line[d] && !isspace(((int) line[d]))) d++;
field = sasl_ALLOC(d + 1);
if (!field) { return NULL; }
memcpy(field, line, d);
field[d] = '\0';
*eofield = line + d;
return field;
}
struct secflag_map_s {
char *name;
int value;
};
struct secflag_map_s secflag_map[] = {
{ "noplaintext", SASL_SEC_NOPLAINTEXT },
{ "noactive", SASL_SEC_NOACTIVE },
{ "nodictionary", SASL_SEC_NODICTIONARY },
{ "forward_secrecy", SASL_SEC_FORWARD_SECRECY },
{ "noanonymous", SASL_SEC_NOANONYMOUS },
{ "pass_credentials", SASL_SEC_PASS_CREDENTIALS },
{ "mutual_auth", SASL_SEC_MUTUAL_AUTH },
{ NULL, 0x0 }
};
static int parse_mechlist_file(const char *mechlistfile)
{
FILE *f;
char buf[1024];
char *t, *ptr;
int r = 0;
f = fopen(mechlistfile, "r");
if (!f) return SASL_FAIL;
r = SASL_OK;
while (fgets(buf, sizeof(buf), f) != NULL) {
mechanism_t *n = sasl_ALLOC(sizeof(mechanism_t));
sasl_server_plug_t *nplug;
if (n == NULL) { r = SASL_NOMEM; break; }
n->version = SASL_SERVER_PLUG_VERSION;
n->condition = SASL_CONTINUE;
nplug = sasl_ALLOC(sizeof(sasl_server_plug_t));
if (nplug == NULL) { r = SASL_NOMEM; break; }
memset(nplug, 0, sizeof(sasl_server_plug_t));
n->f = grab_field(buf, &ptr);
nplug->mech_name = grab_field(ptr, &ptr);
nplug->max_ssf = strtol(ptr, &ptr, 10);
while (*ptr != '\n') {
struct secflag_map_s *map;
t = grab_field(ptr, &ptr);
map = secflag_map;
while (map->name) {
if (!strcasecmp(t, map->name)) {
nplug->security_flags |= map->value;
break;
}
map++;
}
if (!map->name) {
_sasl_log(NULL, SASL_LOG_ERR,
"%s: couldn't identify flag '%s'",
nplug->mech_name, t);
}
free(t);
}
n->plug = nplug;
n->next = mechlist->mech_list;
mechlist->mech_list = n;
mechlist->mech_length++;
}
fclose(f);
return r;
}
int sasl_server_init(const sasl_callback_t *callbacks,
const char *appname)
{
int ret;
const sasl_callback_t *vf;
const char *pluginfile = NULL;
#ifdef PIC
sasl_getopt_t *getopt;
void *context;
#endif
const add_plugin_list_t ep_list[] = {
{ "sasl_server_plug_init", (add_plugin_t *)sasl_server_add_plugin },
{ "sasl_auxprop_plug_init", (add_plugin_t *)sasl_auxprop_add_plugin },
{ "sasl_canonuser_init", (add_plugin_t *)sasl_canonuser_add_plugin },
{ NULL, NULL }
};
if (!appname || strlen(appname) >= PATH_MAX)
return SASL_BADPARAM;
if (_sasl_server_active) {
_sasl_server_active++;
return SASL_OK;
}
ret = _sasl_common_init(&global_callbacks);
if (ret != SASL_OK)
return ret;
ret = verify_server_callbacks(callbacks);
if (ret != SASL_OK)
return ret;
global_callbacks.callbacks = callbacks;
global_callbacks.appname = appname;
_sasl_server_active = 1;
mechlist = sasl_ALLOC(sizeof(mech_list_t));
if (mechlist == NULL) {
server_done();
return SASL_NOMEM;
}
ret = init_mechlist();
if (ret != SASL_OK) {
server_done();
return ret;
}
vf = _sasl_find_verifyfile_callback(callbacks);
ret = load_config(vf);
if ((ret != SASL_OK) && (ret != SASL_CONTINUE)) {
server_done();
return ret;
}
sasl_server_add_plugin("EXTERNAL", &external_server_plug_init);
#ifdef PIC
if (_sasl_getcallback(NULL, SASL_CB_GETOPT, &getopt, &context)
== SASL_OK) {
ret = getopt(&global_callbacks, NULL, "plugin_list", &pluginfile, NULL);
}
#endif
if (pluginfile != NULL) {
ret = ((sasl_verifyfile_t *)(vf->proc))(vf->context,
pluginfile,
SASL_VRFY_CONF);
if (ret != SASL_OK) {
_sasl_log(NULL, SASL_LOG_ERR,
"unable to load plugin list %s: %z", pluginfile, ret);
}
if (ret == SASL_OK) {
ret = parse_mechlist_file(pluginfile);
}
} else {
ret = _sasl_load_plugins(ep_list,
_sasl_find_getpath_callback(callbacks),
_sasl_find_verifyfile_callback(callbacks));
}
if (ret == SASL_OK) {
_sasl_server_cleanup_hook = &server_done;
_sasl_server_idle_hook = &server_idle;
ret = _sasl_build_mechlist();
} else {
server_done();
}
return ret;
}
static int
_sasl_transition(sasl_conn_t * conn,
const char * pass,
unsigned passlen)
{
const char *dotrans = "n";
sasl_getopt_t *getopt;
int result = SASL_OK;
void *context;
unsigned flags = 0;
if (! conn)
return SASL_BADPARAM;
if (! conn->oparams.authid)
PARAMERROR(conn);
if (_sasl_getcallback(conn, SASL_CB_GETOPT, &getopt, &context) == SASL_OK)
{
getopt(context, NULL, "auto_transition", &dotrans, NULL);
if (dotrans == NULL) dotrans = "n";
}
if (!strcmp(dotrans, "noplain")) flags |= SASL_SET_NOPLAIN;
if (flags || *dotrans == '1' || *dotrans == 'y' ||
(*dotrans == 'o' && dotrans[1] == 'n') || *dotrans == 't') {
_sasl_log(conn, SASL_LOG_NOTE,
"transitioning user %s to auxprop database",
conn->oparams.authid);
result = sasl_setpass(conn,
conn->oparams.authid,
pass,
passlen,
NULL, 0, SASL_SET_CREATE | flags);
}
RETURN(conn,result);
}
int sasl_server_new(const char *service,
const char *serverFQDN,
const char *user_realm,
const char *iplocalport,
const char *ipremoteport,
const sasl_callback_t *callbacks,
unsigned flags,
sasl_conn_t **pconn)
{
int result;
sasl_server_conn_t *serverconn;
sasl_utils_t *utils;
sasl_getopt_t *getopt;
void *context;
const char *log_level, *auto_trans;
if (_sasl_server_active==0) return SASL_NOTINIT;
if (! pconn) return SASL_FAIL;
if (! service) return SASL_FAIL;
*pconn=sasl_ALLOC(sizeof(sasl_server_conn_t));
if (*pconn==NULL) return SASL_NOMEM;
memset(*pconn, 0, sizeof(sasl_server_conn_t));
serverconn = (sasl_server_conn_t *)*pconn;
serverconn->sparams=sasl_ALLOC(sizeof(sasl_server_params_t));
if (serverconn->sparams==NULL)
MEMERROR(*pconn);
memset(serverconn->sparams, 0, sizeof(sasl_server_params_t));
(*pconn)->destroy_conn = &server_dispose;
result = _sasl_conn_init(*pconn, service, flags, SASL_CONN_SERVER,
&server_idle, serverFQDN,
iplocalport, ipremoteport,
callbacks, &global_callbacks);
if (result != SASL_OK)
goto done_error;
utils=_sasl_alloc_utils(*pconn, &global_callbacks);
if (!utils) {
result = SASL_NOMEM;
goto done_error;
}
utils->checkpass = &_sasl_checkpass;
serverconn->sparams->propctx=prop_new(0);
if(!serverconn->sparams->propctx) {
result = SASL_NOMEM;
goto done_error;
}
serverconn->sparams->service = (*pconn)->service;
serverconn->sparams->servicelen = (unsigned) strlen((*pconn)->service);
serverconn->sparams->appname = global_callbacks.appname;
serverconn->sparams->applen = (unsigned) strlen(global_callbacks.appname);
serverconn->sparams->serverFQDN = (*pconn)->serverFQDN;
serverconn->sparams->slen = (unsigned) strlen((*pconn)->serverFQDN);
if (user_realm) {
result = _sasl_strdup(user_realm, &serverconn->user_realm, NULL);
serverconn->sparams->urlen = (unsigned) strlen(user_realm);
serverconn->sparams->user_realm = serverconn->user_realm;
} else {
serverconn->user_realm = NULL;
}
serverconn->sparams->callbacks = callbacks;
log_level = auto_trans = NULL;
if(_sasl_getcallback(*pconn, SASL_CB_GETOPT, &getopt, &context) == SASL_OK) {
getopt(context, NULL, "log_level", &log_level, NULL);
getopt(context, NULL, "auto_transition", &auto_trans, NULL);
}
serverconn->sparams->log_level = log_level ? atoi(log_level) : SASL_LOG_ERR;
serverconn->sparams->utils = utils;
if (auto_trans &&
(*auto_trans == '1' || *auto_trans == 'y' || *auto_trans == 't' ||
(*auto_trans == 'o' && auto_trans[1] == 'n') ||
!strcmp(auto_trans, "noplain")) &&
sasl_auxprop_store(NULL, NULL, NULL) == SASL_OK) {
serverconn->sparams->transition = &_sasl_transition;
}
serverconn->sparams->canon_user = &_sasl_canon_user;
serverconn->sparams->props = serverconn->base.props;
serverconn->sparams->flags = flags;
if(result == SASL_OK) return SASL_OK;
done_error:
_sasl_conn_dispose(*pconn);
sasl_FREE(*pconn);
*pconn = NULL;
return result;
}
static int mech_permitted(sasl_conn_t *conn,
mechanism_t *mech)
{
sasl_server_conn_t *s_conn = (sasl_server_conn_t *)conn;
const sasl_server_plug_t *plug;
int myflags;
context_list_t *cur;
sasl_getopt_t *getopt;
void *context;
sasl_ssf_t minssf = 0;
if(!conn) return 0;
if(! mech || ! mech->plug) {
PARAMERROR(conn);
return 0;
}
plug = mech->plug;
if (_sasl_getcallback(conn, SASL_CB_GETOPT, &getopt, &context)
== SASL_OK) {
const char *mlist = NULL;
getopt(context, NULL, "mech_list", &mlist, NULL);
if (mlist) {
const char *cp;
while (*mlist) {
for (cp = mlist; *cp && !isspace((int) *cp); cp++);
if (((size_t) (cp - mlist) == strlen(plug->mech_name)) &&
!strncasecmp(mlist, plug->mech_name,
strlen(plug->mech_name))) {
break;
}
mlist = cp;
while (*mlist && isspace((int) *mlist)) mlist++;
}
if (!*mlist) return 0;
}
}
s_conn->sparams->serverFQDN=conn->serverFQDN;
s_conn->sparams->service=conn->service;
s_conn->sparams->user_realm=s_conn->user_realm;
s_conn->sparams->props=conn->props;
s_conn->sparams->external_ssf=conn->external.ssf;
for(cur = s_conn->mech_contexts; cur; cur=cur->next) {
if(cur->mech == mech) {
if(!cur->context) return 0;
break;
}
}
if (conn->props.min_ssf < conn->external.ssf) {
minssf = 0;
} else {
minssf = conn->props.min_ssf - conn->external.ssf;
}
if (plug->max_ssf < minssf) {
sasl_seterror(conn, SASL_NOLOG,
"mech %s is too weak", plug->mech_name);
return 0;
}
context = NULL;
if(plug->mech_avail
&& plug->mech_avail(plug->glob_context,
s_conn->sparams, (void **)&context) != SASL_OK ) {
cur = sasl_ALLOC(sizeof(context_list_t));
if(!cur) {
MEMERROR(conn);
return 0;
}
cur->context = NULL;
cur->mech = mech;
cur->next = s_conn->mech_contexts;
s_conn->mech_contexts = cur;
return 0;
} else if(context) {
cur = sasl_ALLOC(sizeof(context_list_t));
if(!cur) {
MEMERROR(conn);
return 0;
}
cur->context = context;
cur->mech = mech;
cur->next = s_conn->mech_contexts;
s_conn->mech_contexts = cur;
}
if (plug->max_ssf < minssf) {
sasl_seterror(conn, SASL_NOLOG, "too weak");
return 0;
}
if (mech->condition == SASL_NOUSER) {
sasl_seterror(conn, 0, "no users in secrets db");
return 0;
}
if ((conn->flags & SASL_NEED_PROXY) &&
!(plug->features & SASL_FEAT_ALLOWS_PROXY)) {
return 0;
}
myflags = conn->props.security_flags;
if ((conn->props.min_ssf <= conn->external.ssf) &&
(conn->external.ssf > 1)) {
myflags &= ~SASL_SEC_NOPLAINTEXT;
}
if (((myflags ^ plug->security_flags) & myflags) != 0) {
sasl_seterror(conn, SASL_NOLOG,
"security flags do not match required");
return 0;
}
if(plug->features & SASL_FEAT_GETSECRET) {
sasl_seterror(conn, 0,
"mech %s requires unprovided secret facility",
plug->mech_name);
return 0;
}
return 1;
}
static int do_authorization(sasl_server_conn_t *s_conn)
{
int ret;
sasl_authorize_t *authproc;
void *auth_context;
if (_sasl_getcallback(&s_conn->base, SASL_CB_PROXY_POLICY,
&authproc, &auth_context) != SASL_OK) {
INTERROR(&s_conn->base, SASL_NOAUTHZ);
}
ret = authproc(&(s_conn->base), auth_context,
s_conn->base.oparams.user, s_conn->base.oparams.ulen,
s_conn->base.oparams.authid, s_conn->base.oparams.alen,
s_conn->user_realm,
(s_conn->user_realm ? (unsigned) strlen(s_conn->user_realm) : 0),
s_conn->sparams->propctx);
RETURN(&s_conn->base, ret);
}
int sasl_server_start(sasl_conn_t *conn,
const char *mech,
const char *clientin,
unsigned clientinlen,
const char **serverout,
unsigned *serveroutlen)
{
sasl_server_conn_t *s_conn=(sasl_server_conn_t *) conn;
int result;
context_list_t *cur, **prev;
mechanism_t *m;
if (_sasl_server_active==0) return SASL_NOTINIT;
m=mechlist->mech_list;
if(!conn) return SASL_BADPARAM;
if (!mech || ((clientin==NULL) && (clientinlen>0)))
PARAMERROR(conn);
if(serverout) *serverout = NULL;
if(serveroutlen) *serveroutlen = 0;
while (m!=NULL)
{
if ( strcasecmp(mech,m->plug->mech_name)==0)
{
break;
}
m=m->next;
}
if (m==NULL) {
sasl_seterror(conn, 0, "Couldn't find mech %s", mech);
result = SASL_NOMECH;
goto done;
}
if (! mech_permitted(conn, m)) {
result = SASL_NOMECH;
goto done;
}
if (m->condition == SASL_CONTINUE) {
sasl_server_plug_init_t *entry_point;
void *library = NULL;
sasl_server_plug_t *pluglist;
int version, plugcount;
int l = 0;
result = _sasl_get_plugin(m->f,
_sasl_find_verifyfile_callback(global_callbacks.callbacks),
&library);
if (result == SASL_OK) {
result = _sasl_locate_entry(library, "sasl_server_plug_init",
(void **)&entry_point);
}
if (result == SASL_OK) {
result = entry_point(mechlist->utils, SASL_SERVER_PLUG_VERSION,
&version, &pluglist, &plugcount);
}
if (result == SASL_OK) {
for (l = 0; l < plugcount; l++) {
if (!strcasecmp(pluglist[l].mech_name,
m->plug->mech_name)) break;
}
if (l == plugcount) {
result = SASL_NOMECH;
}
}
if (result == SASL_OK) {
if ((pluglist[l].max_ssf != m->plug->max_ssf) ||
(pluglist[l].security_flags != m->plug->security_flags)) {
_sasl_log(conn, SASL_LOG_ERR,
"%s: security parameters don't match mechlist file",
pluglist[l].mech_name);
result = SASL_NOMECH;
}
}
if (result == SASL_OK) {
sasl_FREE((sasl_server_plug_t *) m->plug);
m->plug = &pluglist[l];
m->condition = SASL_OK;
}
if (result != SASL_OK) {
RETURN(conn, result);
}
}
prev = &s_conn->mech_contexts;
for(cur = *prev; cur; prev=&cur->next,cur=cur->next) {
if(cur->mech == m) {
if(!cur->context) {
sasl_seterror(conn, 0,
"Got past mech_permitted with a disallowed mech!");
return SASL_NOMECH;
}
(*prev)->next = cur->next;
conn->context = cur->context;
sasl_FREE(cur);
}
}
s_conn->mech = m;
if(!conn->context) {
result = s_conn->mech->plug->mech_new(s_conn->mech->plug->glob_context,
s_conn->sparams,
NULL,
0,
&(conn->context));
} else {
result = SASL_OK;
}
if (result == SASL_OK) {
if(clientin) {
if(s_conn->mech->plug->features & SASL_FEAT_SERVER_FIRST) {
sasl_seterror(conn, 0,
"Remote sent first but mech does not allow it.");
result = SASL_BADPROT;
} else {
result = sasl_server_step(conn,
clientin, clientinlen,
serverout, serveroutlen);
}
} else {
if(s_conn->mech->plug->features & SASL_FEAT_WANT_CLIENT_FIRST) {
*serverout = "";
*serveroutlen = 0;
result = SASL_CONTINUE;
} else {
result = sasl_server_step(conn,
clientin, clientinlen,
serverout, serveroutlen);
}
}
}
done:
if( result != SASL_OK
&& result != SASL_CONTINUE
&& result != SASL_INTERACT) {
if(conn->context) {
s_conn->mech->plug->mech_dispose(conn->context,
s_conn->sparams->utils);
conn->context = NULL;
}
}
RETURN(conn,result);
}
int sasl_server_step(sasl_conn_t *conn,
const char *clientin,
unsigned clientinlen,
const char **serverout,
unsigned *serveroutlen)
{
int ret;
sasl_server_conn_t *s_conn = (sasl_server_conn_t *) conn;
if (_sasl_server_active==0) return SASL_NOTINIT;
if (!conn) return SASL_BADPARAM;
if ((clientin==NULL) && (clientinlen>0))
PARAMERROR(conn);
if(s_conn->sent_last == 1) {
return SASL_OK;
}
if (conn->oparams.doneflag) {
_sasl_log(conn, SASL_LOG_ERR, "attempting server step after doneflag");
return SASL_FAIL;
}
if(serverout) *serverout = NULL;
if(serveroutlen) *serveroutlen = 0;
ret = s_conn->mech->plug->mech_step(conn->context,
s_conn->sparams,
clientin,
clientinlen,
serverout,
serveroutlen,
&conn->oparams);
if (ret == SASL_OK) {
ret = do_authorization(s_conn);
}
if (ret == SASL_OK) {
if(*serverout && !(conn->flags & SASL_SUCCESS_DATA)) {
s_conn->sent_last = 1;
ret = SASL_CONTINUE;
}
if(!conn->oparams.maxoutbuf) {
conn->oparams.maxoutbuf = conn->props.maxbufsize;
}
if(conn->oparams.user == NULL || conn->oparams.authid == NULL) {
sasl_seterror(conn, 0,
"mech did not call canon_user for both authzid " \
"and authid");
ret = SASL_BADPROT;
}
}
if( ret != SASL_OK
&& ret != SASL_CONTINUE
&& ret != SASL_INTERACT) {
if(conn->context) {
s_conn->mech->plug->mech_dispose(conn->context,
s_conn->sparams->utils);
conn->context = NULL;
}
}
RETURN(conn, ret);
}
static unsigned mech_names_len()
{
mechanism_t *listptr;
unsigned result = 0;
for (listptr = mechlist->mech_list;
listptr;
listptr = listptr->next)
result += (unsigned) strlen(listptr->plug->mech_name);
return result;
}
int _sasl_server_listmech(sasl_conn_t *conn,
const char *user __attribute__((unused)),
const char *prefix,
const char *sep,
const char *suffix,
const char **result,
unsigned *plen,
int *pcount)
{
int lup;
mechanism_t *listptr;
int ret;
size_t resultlen;
int flag;
const char *mysep;
if (_sasl_server_active==0) return SASL_NOTINIT;
if (!conn) return SASL_BADPARAM;
if (conn->type != SASL_CONN_SERVER) PARAMERROR(conn);
if (! result)
PARAMERROR(conn);
if (plen != NULL)
*plen = 0;
if (pcount != NULL)
*pcount = 0;
if (sep) {
mysep = sep;
} else {
mysep = " ";
}
if (! mechlist || mechlist->mech_length <= 0)
INTERROR(conn, SASL_NOMECH);
resultlen = (prefix ? strlen(prefix) : 0)
+ (strlen(mysep) * (mechlist->mech_length - 1))
+ mech_names_len()
+ (suffix ? strlen(suffix) : 0)
+ 1;
ret = _buf_alloc(&conn->mechlist_buf,
&conn->mechlist_buf_len, resultlen);
if(ret != SASL_OK) MEMERROR(conn);
if (prefix)
strcpy (conn->mechlist_buf,prefix);
else
*(conn->mechlist_buf) = '\0';
listptr = mechlist->mech_list;
flag = 0;
for (lup = 0; lup < mechlist->mech_length; lup++) {
if (mech_permitted(conn, listptr)) {
if (pcount != NULL)
(*pcount)++;
if (flag) {
strcat(conn->mechlist_buf, mysep);
} else {
flag = 1;
}
strcat(conn->mechlist_buf, listptr->plug->mech_name);
}
listptr = listptr->next;
}
if (suffix)
strcat(conn->mechlist_buf,suffix);
if (plen!=NULL)
*plen = (unsigned) strlen(conn->mechlist_buf);
*result = conn->mechlist_buf;
return SASL_OK;
}
sasl_string_list_t *_sasl_server_mechs(void)
{
mechanism_t *listptr;
sasl_string_list_t *retval = NULL, *next=NULL;
if(!_sasl_server_active) return NULL;
for (listptr = mechlist->mech_list; listptr; listptr = listptr->next) {
next = sasl_ALLOC(sizeof(sasl_string_list_t));
if(!next && !retval) return NULL;
else if(!next) {
next = retval->next;
do {
sasl_FREE(retval);
retval = next;
next = retval->next;
} while(next);
return NULL;
}
next->d = listptr->plug->mech_name;
if(!retval) {
next->next = NULL;
retval = next;
} else {
next->next = retval;
retval = next;
}
}
return retval;
}
#define EOSTR(s,n) (((s)[n] == '\0') || ((s)[n] == ' ') || ((s)[n] == '\t'))
static int is_mech(const char *t, const char *m)
{
size_t sl = strlen(m);
return ((!strncasecmp(m, t, sl)) && EOSTR(t, sl));
}
static int _sasl_checkpass(sasl_conn_t *conn,
const char *user,
unsigned userlen,
const char *pass,
unsigned passlen)
{
sasl_server_conn_t *s_conn = (sasl_server_conn_t *) conn;
int result;
sasl_getopt_t *getopt;
sasl_server_userdb_checkpass_t *checkpass_cb;
void *context;
const char *mlist = NULL, *mech = NULL;
struct sasl_verify_password_s *v;
const char *service = conn->service;
if (!userlen) userlen = (unsigned) strlen(user);
if (!passlen) passlen = (unsigned) strlen(pass);
result = _sasl_getcallback(conn, SASL_CB_SERVER_USERDB_CHECKPASS,
&checkpass_cb, &context);
if(result == SASL_OK && checkpass_cb) {
result = checkpass_cb(conn, context, user, pass, passlen,
s_conn->sparams->propctx);
if(result == SASL_OK)
return SASL_OK;
}
if (_sasl_getcallback(conn, SASL_CB_GETOPT, &getopt, &context)
== SASL_OK) {
getopt(context, NULL, "pwcheck_method", &mlist, NULL);
}
if(!mlist) mlist = DEFAULT_CHECKPASS_MECH;
result = SASL_NOMECH;
mech = mlist;
while (*mech && result != SASL_OK) {
for (v = _sasl_verify_password; v->name; v++) {
if(is_mech(mech, v->name)) {
result = v->verify(conn, user, pass, service,
s_conn->user_realm);
break;
}
}
if (result != SASL_OK) {
while (*mech && !isspace((int) *mech)) mech++;
while (*mech && isspace((int) *mech)) mech++;
}
else if (!is_mech(mech, "auxprop") && s_conn->sparams->transition) {
s_conn->sparams->transition(conn, pass, passlen);
}
}
if (result == SASL_NOMECH) {
_sasl_log(conn, SASL_LOG_ERR, "unknown password verifier %s", mech);
}
if (result != SASL_OK)
sasl_seterror(conn, SASL_NOLOG, "checkpass failed");
RETURN(conn, result);
}
int sasl_checkpass(sasl_conn_t *conn,
const char *user,
unsigned userlen,
const char *pass,
unsigned passlen)
{
int result;
if (_sasl_server_active==0) return SASL_NOTINIT;
if (!user)
return SASL_OK;
if (!conn) return SASL_BADPARAM;
if (pass == NULL)
PARAMERROR(conn);
result = _sasl_canon_user(conn, user, userlen,
SASL_CU_AUTHID | SASL_CU_AUTHZID,
&(conn->oparams));
if(result != SASL_OK) RETURN(conn, result);
user = conn->oparams.user;
result = _sasl_checkpass(conn, user, userlen, pass, passlen);
if(result == SASL_OK) {
result = do_authorization((sasl_server_conn_t *)conn);
}
RETURN(conn,result);
}
int sasl_user_exists(sasl_conn_t *conn,
const char *service,
const char *user_realm,
const char *user)
{
int result=SASL_NOMECH;
const char *mlist = NULL, *mech = NULL;
void *context;
sasl_getopt_t *getopt;
struct sasl_verify_password_s *v;
if (_sasl_server_active==0) return SASL_NOTINIT;
if (!conn) return SASL_BADPARAM;
if (!user || conn->type != SASL_CONN_SERVER)
PARAMERROR(conn);
if(!service) service = conn->service;
if (_sasl_getcallback(conn, SASL_CB_GETOPT, &getopt, &context)
== SASL_OK) {
getopt(context, NULL, "pwcheck_method", &mlist, NULL);
}
if(!mlist) mlist = DEFAULT_CHECKPASS_MECH;
result = SASL_NOMECH;
mech = mlist;
while (*mech && result != SASL_OK) {
for (v = _sasl_verify_password; v->name; v++) {
if(is_mech(mech, v->name)) {
result = v->verify(conn, user, NULL, service, user_realm);
break;
}
}
if (result != SASL_OK) {
while (*mech && !isspace((int) *mech)) mech++;
while (*mech && isspace((int) *mech)) mech++;
}
}
if(result == SASL_BADPARAM) {
result = SASL_OK;
}
if (result == SASL_NOMECH) {
_sasl_log(conn, SASL_LOG_ERR, "no plaintext password verifier?");
sasl_seterror(conn, SASL_NOLOG, "no plaintext password verifier?");
}
RETURN(conn, result);
}
int sasl_checkapop(sasl_conn_t *conn,
#ifdef DO_SASL_CHECKAPOP
const char *challenge,
unsigned challen __attribute__((unused)),
const char *response,
unsigned resplen __attribute__((unused)))
#else
const char *challenge __attribute__((unused)),
unsigned challen __attribute__((unused)),
const char *response __attribute__((unused)),
unsigned resplen __attribute__((unused)))
#endif
{
#ifdef DO_SASL_CHECKAPOP
sasl_server_conn_t *s_conn = (sasl_server_conn_t *) conn;
char *user, *user_end;
const char *password_request[] = { SASL_AUX_PASSWORD, NULL };
size_t user_len;
int result;
if (_sasl_server_active==0)
return SASL_NOTINIT;
if(!challenge)
return SASL_OK;
if (!conn) return SASL_BADPARAM;
if (!response)
PARAMERROR(conn);
user_end = strrchr(response, ' ');
if (!user_end || strspn(user_end + 1, "0123456789abcdef") != 32)
{
sasl_seterror(conn, 0, "Bad Digest");
RETURN(conn,SASL_BADPROT);
}
user_len = (size_t)(user_end - response);
user = sasl_ALLOC(user_len + 1);
memcpy(user, response, user_len);
user[user_len] = '\0';
result = prop_request(s_conn->sparams->propctx, password_request);
if(result != SASL_OK)
{
sasl_FREE(user);
RETURN(conn, result);
}
result = _sasl_canon_user(conn, user, user_len,
SASL_CU_AUTHID | SASL_CU_AUTHZID,
&(conn->oparams));
sasl_FREE(user);
if(result != SASL_OK) RETURN(conn, result);
result = _sasl_auxprop_verify_apop(conn, conn->oparams.authid,
challenge, user_end + 1, s_conn->user_realm);
if(result != SASL_OK) {
conn->oparams.user = NULL;
conn->oparams.authid = NULL;
}
RETURN(conn, result);
#else
sasl_seterror(conn, SASL_NOLOG,
"sasl_checkapop called, but was disabled at compile time");
RETURN(conn, SASL_NOMECH);
#endif
}