jpayne@69
|
1 /* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */
|
jpayne@69
|
2 /* include/krb5/certauth_plugin.h - certauth plugin header. */
|
jpayne@69
|
3 /*
|
jpayne@69
|
4 * Copyright (C) 2017 by Red Hat, Inc.
|
jpayne@69
|
5 * All rights reserved.
|
jpayne@69
|
6 *
|
jpayne@69
|
7 * Redistribution and use in source and binary forms, with or without
|
jpayne@69
|
8 * modification, are permitted provided that the following conditions
|
jpayne@69
|
9 * are met:
|
jpayne@69
|
10 *
|
jpayne@69
|
11 * * Redistributions of source code must retain the above copyright
|
jpayne@69
|
12 * notice, this list of conditions and the following disclaimer.
|
jpayne@69
|
13 *
|
jpayne@69
|
14 * * Redistributions in binary form must reproduce the above copyright
|
jpayne@69
|
15 * notice, this list of conditions and the following disclaimer in
|
jpayne@69
|
16 * the documentation and/or other materials provided with the
|
jpayne@69
|
17 * distribution.
|
jpayne@69
|
18 *
|
jpayne@69
|
19 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
jpayne@69
|
20 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
jpayne@69
|
21 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
|
jpayne@69
|
22 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
|
jpayne@69
|
23 * COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
|
jpayne@69
|
24 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
|
jpayne@69
|
25 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
|
jpayne@69
|
26 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
jpayne@69
|
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
jpayne@69
|
28 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
jpayne@69
|
29 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
jpayne@69
|
30 * OF THE POSSIBILITY OF SUCH DAMAGE.
|
jpayne@69
|
31 */
|
jpayne@69
|
32
|
jpayne@69
|
33 /*
|
jpayne@69
|
34 * Declarations for certauth plugin module implementors.
|
jpayne@69
|
35 *
|
jpayne@69
|
36 * The certauth pluggable interface currently has only one supported major
|
jpayne@69
|
37 * version, which is 1. Major version 1 has a current minor version number of
|
jpayne@69
|
38 * 1.
|
jpayne@69
|
39 *
|
jpayne@69
|
40 * certauth plugin modules should define a function named
|
jpayne@69
|
41 * certauth_<modulename>_initvt, matching the signature:
|
jpayne@69
|
42 *
|
jpayne@69
|
43 * krb5_error_code
|
jpayne@69
|
44 * certauth_modname_initvt(krb5_context context, int maj_ver, int min_ver,
|
jpayne@69
|
45 * krb5_plugin_vtable vtable);
|
jpayne@69
|
46 *
|
jpayne@69
|
47 * The initvt function should:
|
jpayne@69
|
48 *
|
jpayne@69
|
49 * - Check that the supplied maj_ver number is supported by the module, or
|
jpayne@69
|
50 * return KRB5_PLUGIN_VER_NOTSUPP if it is not.
|
jpayne@69
|
51 *
|
jpayne@69
|
52 * - Cast the vtable pointer as appropriate for maj_ver:
|
jpayne@69
|
53 * maj_ver == 1: Cast to krb5_certauth_vtable
|
jpayne@69
|
54 *
|
jpayne@69
|
55 * - Initialize the methods of the vtable, stopping as appropriate for the
|
jpayne@69
|
56 * supplied min_ver. Optional methods may be left uninitialized.
|
jpayne@69
|
57 *
|
jpayne@69
|
58 * Memory for the vtable is allocated by the caller, not by the module.
|
jpayne@69
|
59 */
|
jpayne@69
|
60
|
jpayne@69
|
61 #ifndef KRB5_CERTAUTH_PLUGIN_H
|
jpayne@69
|
62 #define KRB5_CERTAUTH_PLUGIN_H
|
jpayne@69
|
63
|
jpayne@69
|
64 #include <krb5/krb5.h>
|
jpayne@69
|
65 #include <krb5/plugin.h>
|
jpayne@69
|
66
|
jpayne@69
|
67 /* Abstract module data type. */
|
jpayne@69
|
68 typedef struct krb5_certauth_moddata_st *krb5_certauth_moddata;
|
jpayne@69
|
69
|
jpayne@69
|
70 /* A module can optionally include <kdb.h> to inspect the client principal
|
jpayne@69
|
71 * entry when authorizing a request. */
|
jpayne@69
|
72 struct _krb5_db_entry_new;
|
jpayne@69
|
73
|
jpayne@69
|
74 /*
|
jpayne@69
|
75 * Optional: Initialize module data.
|
jpayne@69
|
76 */
|
jpayne@69
|
77 typedef krb5_error_code
|
jpayne@69
|
78 (*krb5_certauth_init_fn)(krb5_context context,
|
jpayne@69
|
79 krb5_certauth_moddata *moddata_out);
|
jpayne@69
|
80
|
jpayne@69
|
81 /*
|
jpayne@69
|
82 * Optional: Clean up the module data.
|
jpayne@69
|
83 */
|
jpayne@69
|
84 typedef void
|
jpayne@69
|
85 (*krb5_certauth_fini_fn)(krb5_context context, krb5_certauth_moddata moddata);
|
jpayne@69
|
86
|
jpayne@69
|
87 /*
|
jpayne@69
|
88 * Mandatory: decode cert as an X.509 certificate and determine whether it is
|
jpayne@69
|
89 * authorized to authenticate as the requested client principal princ using
|
jpayne@69
|
90 * PKINIT. Return 0 or KRB5_CERTAUTH_HWAUTH if the certificate is authorized.
|
jpayne@69
|
91 * Otherwise return one of the following error codes:
|
jpayne@69
|
92 *
|
jpayne@69
|
93 * - KRB5KDC_ERR_CLIENT_NAME_MISMATCH - incorrect SAN value
|
jpayne@69
|
94 * - KRB5KDC_ERR_INCONSISTENT_KEY_PURPOSE - incorrect EKU
|
jpayne@69
|
95 * - KRB5KDC_ERR_CERTIFICATE_MISMATCH - other extension error
|
jpayne@69
|
96 * - KRB5_PLUGIN_NO_HANDLE or KRB5_CERTAUTH_HWAUTH_PASS - the module has no
|
jpayne@69
|
97 * opinion about whether cert is authorized
|
jpayne@69
|
98 *
|
jpayne@69
|
99 * Returning KRB5_CERTAUTH_HWAUTH will authorize the PKINIT authentication and
|
jpayne@69
|
100 * cause the hw-authent flag to be set in the issued ticket (new in release
|
jpayne@69
|
101 * 1.19). Returning KRB5_CERTAUTH_HWAUTH_PASS does not authorize the PKINIT
|
jpayne@69
|
102 * authentication, but causes the hw-authent flag to be set if another module
|
jpayne@69
|
103 * authorizes it (new in release 1.20)
|
jpayne@69
|
104 *
|
jpayne@69
|
105 * - opts is used by built-in modules to receive internal data, and must be
|
jpayne@69
|
106 * ignored by other modules.
|
jpayne@69
|
107 * - db_entry receives the client principal database entry, and can be ignored
|
jpayne@69
|
108 * by modules that do not link with libkdb5.
|
jpayne@69
|
109 * - *authinds_out optionally returns a null-terminated list of authentication
|
jpayne@69
|
110 * indicator strings upon KRB5_PLUGIN_NO_HANDLE or accepted authorization.
|
jpayne@69
|
111 */
|
jpayne@69
|
112 typedef krb5_error_code
|
jpayne@69
|
113 (*krb5_certauth_authorize_fn)(krb5_context context,
|
jpayne@69
|
114 krb5_certauth_moddata moddata,
|
jpayne@69
|
115 const uint8_t *cert, size_t cert_len,
|
jpayne@69
|
116 krb5_const_principal princ, const void *opts,
|
jpayne@69
|
117 const struct _krb5_db_entry_new *db_entry,
|
jpayne@69
|
118 char ***authinds_out);
|
jpayne@69
|
119
|
jpayne@69
|
120 /*
|
jpayne@69
|
121 * Free indicators allocated by a module. Mandatory if authorize returns
|
jpayne@69
|
122 * authentication indicators.
|
jpayne@69
|
123 */
|
jpayne@69
|
124 typedef void
|
jpayne@69
|
125 (*krb5_certauth_free_indicator_fn)(krb5_context context,
|
jpayne@69
|
126 krb5_certauth_moddata moddata,
|
jpayne@69
|
127 char **authinds);
|
jpayne@69
|
128
|
jpayne@69
|
129 typedef struct krb5_certauth_vtable_st {
|
jpayne@69
|
130 const char *name;
|
jpayne@69
|
131 krb5_certauth_init_fn init;
|
jpayne@69
|
132 krb5_certauth_fini_fn fini;
|
jpayne@69
|
133 krb5_certauth_authorize_fn authorize;
|
jpayne@69
|
134 krb5_certauth_free_indicator_fn free_ind;
|
jpayne@69
|
135 } *krb5_certauth_vtable;
|
jpayne@69
|
136
|
jpayne@69
|
137 #endif /* KRB5_CERTAUTH_PLUGIN_H */
|