#include "k5-int.h"
#include "gssapiP_krb5.h"
#ifdef HAVE_STRING_H
#include <string.h>
#else
#include <strings.h>
#endif
static char *krb5_gss_keytab = NULL;
OM_uint32 KRB5_CALLCONV
krb5_gss_register_acceptor_identity(const char *keytab)
{
size_t len;
if (keytab == NULL)
return GSS_S_FAILURE;
if (krb5_gss_keytab != NULL)
free(krb5_gss_keytab);
len = strlen(keytab);
krb5_gss_keytab = malloc(len + 1);
if (krb5_gss_keytab == NULL)
return GSS_S_FAILURE;
strcpy(krb5_gss_keytab, keytab);
return GSS_S_COMPLETE;
}
static OM_uint32
acquire_accept_cred(context, minor_status, desired_name, output_princ, cred)
krb5_context context;
OM_uint32 *minor_status;
gss_name_t desired_name;
krb5_principal *output_princ;
krb5_gss_cred_id_rec *cred;
{
krb5_error_code code;
krb5_principal princ;
krb5_keytab kt;
krb5_keytab_entry entry;
*output_princ = NULL;
cred->keytab = NULL;
if (krb5_gss_keytab != NULL)
code = krb5_kt_resolve(context, krb5_gss_keytab, &kt);
else
code = krb5_kt_default(context, &kt);
if (code) {
*minor_status = code;
return(GSS_S_CRED_UNAVAIL);
}
if (desired_name != GSS_C_NO_NAME) {
princ = (krb5_principal) desired_name;
if ((code = krb5_kt_get_entry(context, kt, princ, 0, 0, &entry))) {
(void) krb5_kt_close(context, kt);
if (code == KRB5_KT_NOTFOUND)
*minor_status = KG_KEYTAB_NOMATCH;
else
*minor_status = code;
return(GSS_S_CRED_UNAVAIL);
}
krb5_kt_free_entry(context, &entry);
if ((code = krb5_get_server_rcache(context,
krb5_princ_component(context, princ, 0),
&cred->rcache))) {
*minor_status = code;
return(GSS_S_FAILURE);
}
}
cred->keytab = kt;
return(GSS_S_COMPLETE);
}
static OM_uint32
acquire_init_cred(context, minor_status, desired_name, output_princ, cred)
krb5_context context;
OM_uint32 *minor_status;
gss_name_t desired_name;
krb5_principal *output_princ;
krb5_gss_cred_id_rec *cred;
{
krb5_error_code code;
krb5_ccache ccache;
krb5_principal princ, tmp_princ;
krb5_flags flags;
krb5_cc_cursor cur;
krb5_creds creds;
int got_endtime;
cred->ccache = NULL;
if ((code = krb5int_cc_default(context, &ccache))) {
*minor_status = code;
return(GSS_S_CRED_UNAVAIL);
}
flags = 0;
if ((code = krb5_cc_set_flags(context, ccache, flags))) {
(void)krb5_cc_close(context, ccache);
*minor_status = code;
return(GSS_S_CRED_UNAVAIL);
}
if ((code = krb5_cc_get_principal(context, ccache, &princ))) {
(void)krb5_cc_close(context, ccache);
*minor_status = code;
return(GSS_S_FAILURE);
}
if (desired_name != (gss_name_t) NULL) {
if (! krb5_principal_compare(context, princ, (krb5_principal) desired_name)) {
(void)krb5_free_principal(context, princ);
(void)krb5_cc_close(context, ccache);
*minor_status = KG_CCACHE_NOMATCH;
return(GSS_S_CRED_UNAVAIL);
}
(void)krb5_free_principal(context, princ);
princ = (krb5_principal) desired_name;
} else {
*output_princ = princ;
}
if ((code = krb5_cc_start_seq_get(context, ccache, &cur))) {
(void)krb5_cc_close(context, ccache);
*minor_status = code;
return(GSS_S_FAILURE);
}
got_endtime = 0;
code = krb5_build_principal_ext(context, &tmp_princ,
krb5_princ_realm(context, princ)->length,
krb5_princ_realm(context, princ)->data,
6, "krbtgt",
krb5_princ_realm(context, princ)->length,
krb5_princ_realm(context, princ)->data,
0);
if (code) {
(void)krb5_cc_close(context, ccache);
*minor_status = code;
return(GSS_S_FAILURE);
}
while (!(code = krb5_cc_next_cred(context, ccache, &cur, &creds))) {
if (krb5_principal_compare(context, tmp_princ, creds.server)) {
cred->tgt_expire = creds.times.endtime;
got_endtime = 1;
*minor_status = 0;
code = 0;
krb5_free_cred_contents(context, &creds);
break;
}
if (got_endtime == 0) {
cred->tgt_expire = creds.times.endtime;
got_endtime = 1;
}
krb5_free_cred_contents(context, &creds);
}
krb5_free_principal(context, tmp_princ);
if (code && code != KRB5_CC_END) {
(void)krb5_cc_end_seq_get(context, ccache, &cur);
(void)krb5_cc_close(context, ccache);
*minor_status = code;
return(GSS_S_FAILURE);
} else if (! got_endtime) {
(void)krb5_cc_end_seq_get(context, ccache, &cur);
(void)krb5_cc_close(context, ccache);
*minor_status = KG_EMPTY_CCACHE;
return(GSS_S_FAILURE);
} else {
if ((code = krb5_cc_end_seq_get(context, ccache, &cur))) {
(void)krb5_cc_close(context, ccache);
*minor_status = code;
return(GSS_S_FAILURE);
}
flags = KRB5_TC_OPENCLOSE;
if ((code = krb5_cc_set_flags(context, ccache, flags))) {
(void)krb5_cc_close(context, ccache);
*minor_status = code;
return(GSS_S_FAILURE);
}
}
cred->ccache = ccache;
return(GSS_S_COMPLETE);
}
OM_uint32
krb5_gss_acquire_cred(minor_status, desired_name, time_req,
desired_mechs, cred_usage, output_cred_handle,
actual_mechs, time_rec)
OM_uint32 *minor_status;
gss_name_t desired_name;
OM_uint32 time_req;
gss_OID_set desired_mechs;
gss_cred_usage_t cred_usage;
gss_cred_id_t *output_cred_handle;
gss_OID_set *actual_mechs;
OM_uint32 *time_rec;
{
krb5_context context;
size_t i;
krb5_gss_cred_id_t cred;
gss_OID_set ret_mechs;
int req_old, req_new;
OM_uint32 ret;
krb5_error_code code;
if (GSS_ERROR(kg_get_context(minor_status, &context)))
return(GSS_S_FAILURE);
*output_cred_handle = NULL;
if (actual_mechs)
*actual_mechs = NULL;
if (time_rec)
*time_rec = 0;
if ((desired_name != (gss_name_t) NULL) &&
(! kg_validate_name(desired_name))) {
*minor_status = (OM_uint32) G_VALIDATE_FAILED;
return(GSS_S_CALL_BAD_STRUCTURE|GSS_S_BAD_NAME);
}
if (desired_mechs == GSS_C_NULL_OID_SET) {
req_old = 1;
req_new = 1;
} else {
req_old = 0;
req_new = 0;
for (i=0; i<desired_mechs->count; i++) {
if (g_OID_equal(gss_mech_krb5_old, &(desired_mechs->elements[i])))
req_old++;
if (g_OID_equal(gss_mech_krb5, &(desired_mechs->elements[i])))
req_new++;
}
if (!req_old && !req_new) {
*minor_status = 0;
return(GSS_S_BAD_MECH);
}
}
if ((cred =
(krb5_gss_cred_id_t) xmalloc(sizeof(krb5_gss_cred_id_rec))) == NULL) {
*minor_status = ENOMEM;
return(GSS_S_FAILURE);
}
memset(cred, 0, sizeof(krb5_gss_cred_id_rec));
cred->usage = cred_usage;
cred->princ = NULL;
cred->prerfc_mech = req_old;
cred->rfc_mech = req_new;
cred->keytab = NULL;
cred->ccache = NULL;
if ((cred_usage != GSS_C_INITIATE) &&
(cred_usage != GSS_C_ACCEPT) &&
(cred_usage != GSS_C_BOTH)) {
xfree(cred);
*minor_status = (OM_uint32) G_BAD_USAGE;
return(GSS_S_FAILURE);
}
if ((cred_usage == GSS_C_ACCEPT) ||
(cred_usage == GSS_C_BOTH))
if ((ret = acquire_accept_cred(context, minor_status, desired_name,
&(cred->princ), cred))
!= GSS_S_COMPLETE) {
if (cred->princ)
krb5_free_principal(context, cred->princ);
xfree(cred);
return(ret);
}
if ((cred_usage == GSS_C_INITIATE) ||
(cred_usage == GSS_C_BOTH))
if ((ret =
acquire_init_cred(context, minor_status,
cred->princ?(gss_name_t)cred->princ:desired_name,
&(cred->princ), cred))
!= GSS_S_COMPLETE) {
if (cred->keytab)
krb5_kt_close(context, cred->keytab);
if (cred->princ)
krb5_free_principal(context, cred->princ);
xfree(cred);
return(ret);
}
if (!cred->princ && (desired_name != GSS_C_NO_CREDENTIAL))
if ((code = krb5_copy_principal(context, (krb5_principal) desired_name,
&(cred->princ)))) {
if (cred->ccache)
(void)krb5_cc_close(context, cred->ccache);
if (cred->keytab)
(void)krb5_kt_close(context, cred->keytab);
xfree(cred);
*minor_status = code;
return(GSS_S_FAILURE);
}
if (cred_usage == GSS_C_ACCEPT) {
if (time_rec)
*time_rec = GSS_C_INDEFINITE;
} else {
krb5_timestamp now;
if ((code = krb5_timeofday(context, &now))) {
if (cred->ccache)
(void)krb5_cc_close(context, cred->ccache);
if (cred->keytab)
(void)krb5_kt_close(context, cred->keytab);
if (cred->princ)
krb5_free_principal(context, cred->princ);
xfree(cred);
*minor_status = code;
return(GSS_S_FAILURE);
}
if (time_rec)
*time_rec = (cred->tgt_expire > now) ? (cred->tgt_expire - now) : 0;
}
if (actual_mechs) {
if (GSS_ERROR(ret = generic_gss_create_empty_oid_set(minor_status,
&ret_mechs)) ||
(cred->prerfc_mech &&
GSS_ERROR(ret = generic_gss_add_oid_set_member(minor_status,
(gss_OID) gss_mech_krb5_old,
&ret_mechs))) ||
(cred->rfc_mech &&
GSS_ERROR(ret = generic_gss_add_oid_set_member(minor_status,
(gss_OID) gss_mech_krb5,
&ret_mechs)))) {
if (cred->ccache)
(void)krb5_cc_close(context, cred->ccache);
if (cred->keytab)
(void)krb5_kt_close(context, cred->keytab);
if (cred->princ)
krb5_free_principal(context, cred->princ);
xfree(cred);
return(ret);
}
}
if (! kg_save_cred_id((gss_cred_id_t) cred)) {
free(ret_mechs->elements);
free(ret_mechs);
if (cred->ccache)
(void)krb5_cc_close(context, cred->ccache);
if (cred->keytab)
(void)krb5_kt_close(context, cred->keytab);
if (cred->princ)
krb5_free_principal(context, cred->princ);
xfree(cred);
*minor_status = (OM_uint32) G_VALIDATE_FAILED;
return(GSS_S_FAILURE);
}
*minor_status = 0;
*output_cred_handle = (gss_cred_id_t) cred;
if (actual_mechs)
*actual_mechs = ret_mechs;
return(GSS_S_COMPLETE);
}