]> CyberLeo.Net >> Repos - FreeBSD/releng/10.0.git/blob - crypto/heimdal/lib/gssapi/krb5/inquire_cred.c
- Copy stable/10 (r259064) to releng/10.0 as part of the
[FreeBSD/releng/10.0.git] / crypto / heimdal / lib / gssapi / krb5 / inquire_cred.c
1 /*
2  * Copyright (c) 1997, 2003 Kungliga Tekniska Högskolan
3  * (Royal Institute of Technology, Stockholm, Sweden).
4  * All rights reserved.
5  *
6  * Redistribution and use in source and binary forms, with or without
7  * modification, are permitted provided that the following conditions
8  * are met:
9  *
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  *
13  * 2. Redistributions in binary form must reproduce the above copyright
14  *    notice, this list of conditions and the following disclaimer in the
15  *    documentation and/or other materials provided with the distribution.
16  *
17  * 3. Neither the name of the Institute nor the names of its contributors
18  *    may be used to endorse or promote products derived from this software
19  *    without specific prior written permission.
20  *
21  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31  * SUCH DAMAGE.
32  */
33
34 #include "gsskrb5_locl.h"
35
36 OM_uint32 GSSAPI_CALLCONV _gsskrb5_inquire_cred
37 (OM_uint32 * minor_status,
38  const gss_cred_id_t cred_handle,
39  gss_name_t * output_name,
40  OM_uint32 * lifetime,
41  gss_cred_usage_t * cred_usage,
42  gss_OID_set * mechanisms
43     )
44 {
45     krb5_context context;
46     gss_cred_id_t aqcred_init = GSS_C_NO_CREDENTIAL;
47     gss_cred_id_t aqcred_accept = GSS_C_NO_CREDENTIAL;
48     gsskrb5_cred acred = NULL, icred = NULL;
49     OM_uint32 ret;
50
51     *minor_status = 0;
52
53     if (output_name)
54         *output_name = NULL;
55     if (mechanisms)
56         *mechanisms = GSS_C_NO_OID_SET;
57
58     GSSAPI_KRB5_INIT (&context);
59
60     if (cred_handle == GSS_C_NO_CREDENTIAL) {
61         ret = _gsskrb5_acquire_cred(minor_status,
62                                     GSS_C_NO_NAME,
63                                     GSS_C_INDEFINITE,
64                                     GSS_C_NO_OID_SET,
65                                     GSS_C_ACCEPT,
66                                     &aqcred_accept,
67                                     NULL,
68                                     NULL);
69         if (ret == GSS_S_COMPLETE)
70             acred = (gsskrb5_cred)aqcred_accept;
71
72         ret = _gsskrb5_acquire_cred(minor_status,
73                                     GSS_C_NO_NAME,
74                                     GSS_C_INDEFINITE,
75                                     GSS_C_NO_OID_SET,
76                                     GSS_C_INITIATE,
77                                     &aqcred_init,
78                                     NULL,
79                                     NULL);
80         if (ret == GSS_S_COMPLETE)
81             icred = (gsskrb5_cred)aqcred_init;
82
83         if (icred == NULL && acred == NULL) {
84             *minor_status = 0;
85             return GSS_S_NO_CRED;
86         }
87     } else
88         acred = (gsskrb5_cred)cred_handle;
89
90     if (acred)
91         HEIMDAL_MUTEX_lock(&acred->cred_id_mutex);
92     if (icred)
93         HEIMDAL_MUTEX_lock(&icred->cred_id_mutex);
94
95     if (output_name != NULL) {
96         if (icred && icred->principal != NULL) {
97             gss_name_t name;
98
99             if (acred && acred->principal)
100                 name = (gss_name_t)acred->principal;
101             else
102                 name = (gss_name_t)icred->principal;
103
104             ret = _gsskrb5_duplicate_name(minor_status, name, output_name);
105             if (ret)
106                 goto out;
107         } else if (acred && acred->usage == GSS_C_ACCEPT) {
108             krb5_principal princ;
109             *minor_status = krb5_sname_to_principal(context, NULL,
110                                                     NULL, KRB5_NT_SRV_HST,
111                                                     &princ);
112             if (*minor_status) {
113                 ret = GSS_S_FAILURE;
114                 goto out;
115             }
116             *output_name = (gss_name_t)princ;
117         } else {
118             krb5_principal princ;
119             *minor_status = krb5_get_default_principal(context,
120                                                        &princ);
121             if (*minor_status) {
122                 ret = GSS_S_FAILURE;
123                 goto out;
124             }
125             *output_name = (gss_name_t)princ;
126         }
127     }
128     if (lifetime != NULL) {
129         OM_uint32 alife = GSS_C_INDEFINITE, ilife = GSS_C_INDEFINITE;
130
131         if (acred) alife = acred->lifetime;
132         if (icred) ilife = icred->lifetime;
133
134         ret = _gsskrb5_lifetime_left(minor_status,
135                                      context,
136                                      min(alife,ilife),
137                                      lifetime);
138         if (ret)
139             goto out;
140     }
141     if (cred_usage != NULL) {
142         if (acred && icred)
143             *cred_usage = GSS_C_BOTH;
144         else if (acred)
145             *cred_usage = GSS_C_ACCEPT;
146         else if (icred)
147             *cred_usage = GSS_C_INITIATE;
148         else
149             abort();
150     }
151
152     if (mechanisms != NULL) {
153         ret = gss_create_empty_oid_set(minor_status, mechanisms);
154         if (ret)
155             goto out;
156         if (acred)
157             ret = gss_add_oid_set_member(minor_status,
158                                          &acred->mechanisms->elements[0],
159                                          mechanisms);
160         if (ret == GSS_S_COMPLETE && icred)
161             ret = gss_add_oid_set_member(minor_status,
162                                          &icred->mechanisms->elements[0],
163                                          mechanisms);
164         if (ret)
165             goto out;
166     }
167     ret = GSS_S_COMPLETE;
168 out:
169     if (acred)
170         HEIMDAL_MUTEX_unlock(&acred->cred_id_mutex);
171     if (icred)
172         HEIMDAL_MUTEX_unlock(&icred->cred_id_mutex);
173
174     if (aqcred_init != GSS_C_NO_CREDENTIAL)
175         ret = _gsskrb5_release_cred(minor_status, &aqcred_init);
176     if (aqcred_accept != GSS_C_NO_CREDENTIAL)
177         ret = _gsskrb5_release_cred(minor_status, &aqcred_accept);
178
179     return ret;
180 }