]> CyberLeo.Net >> Repos - FreeBSD/releng/10.0.git/blob - crypto/heimdal/lib/gssapi/ntlm/creds.c
- Copy stable/10 (r259064) to releng/10.0 as part of the
[FreeBSD/releng/10.0.git] / crypto / heimdal / lib / gssapi / ntlm / creds.c
1 /*
2  * Copyright (c) 2006 Kungliga Tekniska Högskolan
3  * (Royal Institute of Technology, Stockholm, Sweden).
4  * All rights reserved.
5  *
6  * Portions Copyright (c) 2009 Apple Inc. All rights reserved.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  *
12  * 1. Redistributions of source code must retain the above copyright
13  *    notice, this list of conditions and the following disclaimer.
14  *
15  * 2. Redistributions in binary form must reproduce the above copyright
16  *    notice, this list of conditions and the following disclaimer in the
17  *    documentation and/or other materials provided with the distribution.
18  *
19  * 3. Neither the name of the Institute nor the names of its contributors
20  *    may be used to endorse or promote products derived from this software
21  *    without specific prior written permission.
22  *
23  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
24  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
27  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33  * SUCH DAMAGE.
34  */
35
36 #include "ntlm.h"
37
38 OM_uint32 GSSAPI_CALLCONV
39 _gss_ntlm_inquire_cred
40            (OM_uint32 * minor_status,
41             const gss_cred_id_t cred_handle,
42             gss_name_t * name,
43             OM_uint32 * lifetime,
44             gss_cred_usage_t * cred_usage,
45             gss_OID_set * mechanisms
46            )
47 {
48     OM_uint32 ret, junk;
49
50     *minor_status = 0;
51
52     if (cred_handle == NULL)
53         return GSS_S_NO_CRED;
54
55     if (name) {
56         ntlm_name n = calloc(1, sizeof(*n));
57         ntlm_cred c = (ntlm_cred)cred_handle;
58         if (n) {
59             n->user = strdup(c->username);
60             n->domain = strdup(c->domain);
61         }
62         if (n == NULL || n->user == NULL || n->domain == NULL) {
63             if (n)
64                 free(n->user);
65             *minor_status = ENOMEM;
66             return GSS_S_FAILURE;
67         }
68         *name = (gss_name_t)n;
69     }
70     if (lifetime)
71         *lifetime = GSS_C_INDEFINITE;
72     if (cred_usage)
73         *cred_usage = 0;
74     if (mechanisms)
75         *mechanisms = GSS_C_NO_OID_SET;
76
77     if (cred_handle == GSS_C_NO_CREDENTIAL)
78         return GSS_S_NO_CRED;
79
80     if (mechanisms) {
81         ret = gss_create_empty_oid_set(minor_status, mechanisms);
82         if (ret)
83             goto out;
84         ret = gss_add_oid_set_member(minor_status,
85                                      GSS_NTLM_MECHANISM,
86                                      mechanisms);
87         if (ret)
88             goto out;
89     }
90
91     return GSS_S_COMPLETE;
92 out:
93     gss_release_oid_set(&junk, mechanisms);
94     return ret;
95 }
96
97 #ifdef HAVE_KCM
98 static OM_uint32
99 _gss_ntlm_destroy_kcm_cred(gss_cred_id_t *cred_handle)
100 {
101     krb5_storage *request, *response;
102     krb5_data response_data;
103     krb5_context context;
104     krb5_error_code ret;
105     ntlm_cred cred;
106
107     cred = (ntlm_cred)*cred_handle;
108
109     ret = krb5_init_context(&context);
110     if (ret)
111         return ret;
112
113     ret = krb5_kcm_storage_request(context, KCM_OP_DEL_NTLM_CRED, &request);
114     if (ret)
115         goto out;
116
117     ret = krb5_store_stringz(request, cred->username);
118     if (ret)
119         goto out;
120
121     ret = krb5_store_stringz(request, cred->domain);
122     if (ret)
123         goto out;
124
125     ret = krb5_kcm_call(context, request, &response, &response_data);
126     if (ret)
127         goto out;
128
129     krb5_storage_free(request);
130     krb5_storage_free(response);
131     krb5_data_free(&response_data);
132
133  out:
134     krb5_free_context(context);
135
136     return ret;
137 }
138 #endif /* HAVE_KCM */
139
140 OM_uint32 GSSAPI_CALLCONV
141 _gss_ntlm_destroy_cred(OM_uint32 *minor_status,
142                        gss_cred_id_t *cred_handle)
143 {
144 #ifdef HAVE_KCM
145     krb5_error_code ret;
146 #endif
147
148     if (cred_handle == NULL || *cred_handle == GSS_C_NO_CREDENTIAL)
149         return GSS_S_COMPLETE;
150
151 #ifdef HAVE_KCM
152     ret = _gss_ntlm_destroy_kcm_cred(cred_handle);
153     if (ret) {
154         *minor_status = ret;
155         return GSS_S_FAILURE;
156     }
157 #endif
158
159     return _gss_ntlm_release_cred(minor_status, cred_handle);
160 }