/* $NetBSD: inquire_cred.c,v 1.2 2017/01/28 21:31:46 christos Exp $ */ /* * Copyright (c) 1997, 2003 Kungliga Tekniska Högskolan * (Royal Institute of Technology, Stockholm, Sweden). * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * * 3. Neither the name of the Institute nor the names of its contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */ #include "gsskrb5_locl.h" OM_uint32 GSSAPI_CALLCONV _gsskrb5_inquire_cred (OM_uint32 * minor_status, gss_const_cred_id_t cred_handle, gss_name_t * output_name, OM_uint32 * lifetime, gss_cred_usage_t * cred_usage, gss_OID_set * mechanisms ) { krb5_context context; gss_cred_id_t aqcred_init = GSS_C_NO_CREDENTIAL; gss_cred_id_t aqcred_accept = GSS_C_NO_CREDENTIAL; gsskrb5_cred cred = (gsskrb5_cred)cred_handle; gss_OID_set amechs = GSS_C_NO_OID_SET; gss_OID_set imechs = GSS_C_NO_OID_SET; OM_uint32 junk; OM_uint32 aminor; OM_uint32 ret; OM_uint32 aret; OM_uint32 alife = GSS_C_INDEFINITE; OM_uint32 ilife = GSS_C_INDEFINITE; /* * XXX This function is more complex than it has to be. It should call * _gsskrb5_inquire_cred_by_mech() twice and merge the results in the * cred_handle == GSS_C_NO_CREDENTIAL case, but since * _gsskrb5_inquire_cred_by_mech() is implemented in terms of this * function, first we must fix _gsskrb5_inquire_cred_by_mech(). */ *minor_status = 0; if (output_name) *output_name = GSS_C_NO_NAME; if (cred_usage) *cred_usage = GSS_C_BOTH; /* There's no NONE */ if (mechanisms) *mechanisms = GSS_C_NO_OID_SET; GSSAPI_KRB5_INIT (&context); if (cred_handle == GSS_C_NO_CREDENTIAL) { /* * From here to the end of this if we should refactor into a separate * function. */ /* Get the info for the default ACCEPT credential */ aret = _gsskrb5_acquire_cred(&aminor, GSS_C_NO_NAME, GSS_C_INDEFINITE, GSS_C_NO_OID_SET, GSS_C_ACCEPT, &aqcred_accept, NULL, NULL); if (aret == GSS_S_COMPLETE) { aret = _gsskrb5_inquire_cred(&aminor, aqcred_accept, output_name, &alife, NULL, &amechs); (void) _gsskrb5_release_cred(&junk, &aqcred_accept); if (aret == GSS_S_COMPLETE) { output_name = NULL; /* Can't merge names; output only one */ if (cred_usage) *cred_usage = GSS_C_ACCEPT; if (lifetime) *lifetime = alife; if (mechanisms) { *mechanisms = amechs; amechs = GSS_C_NO_OID_SET; } (void) gss_release_oid_set(&junk, &amechs); } else if (aret != GSS_S_NO_CRED) { *minor_status = aminor; return aret; } else { alife = GSS_C_INDEFINITE; } } /* Get the info for the default INITIATE credential */ ret = _gsskrb5_acquire_cred(minor_status, GSS_C_NO_NAME, GSS_C_INDEFINITE, GSS_C_NO_OID_SET, GSS_C_INITIATE, &aqcred_init, NULL, NULL); if (ret == GSS_S_COMPLETE) { ret = _gsskrb5_inquire_cred(minor_status, aqcred_init, output_name, &ilife, NULL, &imechs); (void) _gsskrb5_release_cred(&junk, &aqcred_init); if (ret == GSS_S_COMPLETE) { /* * Merge results for INITIATE with ACCEPT if we had ACCEPT and * for those outputs that are desired. */ if (cred_usage) { *cred_usage = (*cred_usage == GSS_C_ACCEPT) ? GSS_C_BOTH : GSS_C_INITIATE; } if (lifetime) *lifetime = min(alife, ilife); if (mechanisms) { /* * This is just one mechanism (IAKERB and such would live * elsewhere). imechs will be equal to amechs, though not * ==. */ if (aret != GSS_S_COMPLETE) { *mechanisms = imechs; imechs = GSS_C_NO_OID_SET; } } (void) gss_release_oid_set(&junk, &amechs); } else if (ret != GSS_S_NO_CRED) { *minor_status = aminor; return aret; } } if (aret != GSS_S_COMPLETE && ret != GSS_S_COMPLETE) { *minor_status = aminor; return aret; } *minor_status = 0; /* Even though 0 is not specified to be special */ return GSS_S_COMPLETE; } HEIMDAL_MUTEX_lock(&cred->cred_id_mutex); if (output_name != NULL) { if (cred->principal != NULL) { gss_name_t name = (gss_name_t)cred->principal; ret = _gsskrb5_duplicate_name(minor_status, name, output_name); if (ret) goto out; } else if (cred->usage == GSS_C_ACCEPT) { /* * Keytab case, princ may not be set (yet, ever, whatever). * * We used to unconditionally output the krb5_sname_to_principal() * of the host service for the hostname, but we didn't know if we * had keytab entries for it, so it was incorrect. We can't be * breaking anything in tree by outputting GSS_C_NO_NAME, but we * might be breaking other callers. */ *output_name = GSS_C_NO_NAME; } else { /* This shouldn't happen */ *minor_status = KRB5_NOCREDS_SUPPLIED; /* XXX */ ret = GSS_S_NO_CRED; goto out; } } if (lifetime != NULL) { ret = _gsskrb5_lifetime_left(minor_status, context, cred->endtime, lifetime); if (ret) goto out; } if (cred_usage != NULL) *cred_usage = cred->usage; if (mechanisms != NULL) { ret = gss_create_empty_oid_set(minor_status, mechanisms); if (ret) goto out; ret = gss_add_oid_set_member(minor_status, &cred->mechanisms->elements[0], mechanisms); if (ret) goto out; } ret = GSS_S_COMPLETE; out: HEIMDAL_MUTEX_unlock(&cred->cred_id_mutex); return ret; }