2 * Copyright (c) 2011, JANET(UK)
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the name of JANET(UK) nor the names of its contributors
17 * may be used to endorse or promote products derived from this software
18 * without specific prior written permission.
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
21 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34 * Utility routines for credential handles.
37 #include "gssapiP_eap.h"
46 gssEapAllocCred(OM_uint32 *minor, gss_cred_id_t *pCred)
51 *pCred = GSS_C_NO_CREDENTIAL;
53 cred = (gss_cred_id_t)GSSEAP_CALLOC(1, sizeof(*cred));
59 if (GSSEAP_MUTEX_INIT(&cred->mutex) != 0) {
60 *minor = GSSEAP_GET_LAST_ERROR();
61 gssEapReleaseCred(&tmpMinor, &cred);
68 return GSS_S_COMPLETE;
72 zeroAndReleasePassword(gss_buffer_t password)
74 if (password->value != NULL) {
75 memset(password->value, 0, password->length);
76 GSSEAP_FREE(password->value);
79 password->value = NULL;
84 gssEapReleaseCred(OM_uint32 *minor, gss_cred_id_t *pCred)
87 gss_cred_id_t cred = *pCred;
88 krb5_context krbContext = NULL;
90 if (cred == GSS_C_NO_CREDENTIAL) {
91 return GSS_S_COMPLETE;
94 GSSEAP_KRB_INIT(&krbContext);
96 gssEapReleaseName(&tmpMinor, &cred->name);
97 gssEapReleaseName(&tmpMinor, &cred->target);
99 zeroAndReleasePassword(&cred->password);
101 gss_release_buffer(&tmpMinor, &cred->radiusConfigFile);
102 gss_release_buffer(&tmpMinor, &cred->radiusConfigStanza);
103 gss_release_buffer(&tmpMinor, &cred->caCertificate);
104 gss_release_buffer(&tmpMinor, &cred->subjectNameConstraint);
105 gss_release_buffer(&tmpMinor, &cred->subjectAltNameConstraint);
107 #ifdef GSSEAP_ENABLE_REAUTH
108 if (cred->krbCredCache != NULL) {
109 if (cred->flags & CRED_FLAG_DEFAULT_CCACHE)
110 krb5_cc_close(krbContext, cred->krbCredCache);
112 krb5_cc_destroy(krbContext, cred->krbCredCache);
114 if (cred->reauthCred != GSS_C_NO_CREDENTIAL)
115 gssReleaseCred(&tmpMinor, &cred->reauthCred);
118 GSSEAP_MUTEX_DESTROY(&cred->mutex);
119 memset(cred, 0, sizeof(*cred));
124 return GSS_S_COMPLETE;
128 readStaticIdentityFile(OM_uint32 *minor,
129 gss_buffer_t defaultIdentity,
130 gss_buffer_t defaultPassword)
132 OM_uint32 major, tmpMinor;
138 struct passwd *pw = NULL, pwd;
142 defaultIdentity->length = 0;
143 defaultIdentity->value = NULL;
145 if (defaultPassword != GSS_C_NO_BUFFER) {
146 defaultPassword->length = 0;
147 defaultPassword->value = NULL;
150 ccacheName = getenv("GSSEAP_IDENTITY");
151 if (ccacheName == NULL) {
153 TCHAR szPath[MAX_PATH];
155 if (!SUCCEEDED(SHGetFolderPath(NULL,
156 CSIDL_APPDATA, /* |CSIDL_FLAG_CREATE */
157 NULL, /* User access token */
160 major = GSS_S_CRED_UNAVAIL;
161 *minor = GetLastError();
165 snprintf(buf, sizeof(buf), "%s/.gss_eap_id", szPath);
167 if (getpwuid_r(getuid(), &pwd, pwbuf, sizeof(pwbuf), &pw) != 0 ||
168 pw == NULL || pw->pw_dir == NULL) {
169 major = GSS_S_CRED_UNAVAIL;
170 *minor = GSSEAP_GET_LAST_ERROR();
174 snprintf(buf, sizeof(buf), "%s/.gss_eap_id", pw->pw_dir);
179 fp = fopen(ccacheName, "r");
181 major = GSS_S_CRED_UNAVAIL;
182 *minor = GSSEAP_NO_DEFAULT_CRED;
186 while (fgets(buf, sizeof(buf), fp) != NULL) {
187 gss_buffer_desc src, *dst;
189 src.length = strlen(buf);
195 if (buf[src.length - 1] == '\n') {
196 buf[src.length - 1] = '\0';
197 if (--src.length == 0)
202 dst = defaultIdentity;
204 dst = defaultPassword;
208 if (dst != GSS_C_NO_BUFFER) {
209 major = duplicateBuffer(minor, &src, dst);
210 if (GSS_ERROR(major))
217 if (defaultIdentity->length == 0) {
218 major = GSS_S_CRED_UNAVAIL;
219 *minor = GSSEAP_NO_DEFAULT_CRED;
223 major = GSS_S_COMPLETE;
230 if (GSS_ERROR(major)) {
231 gss_release_buffer(&tmpMinor, defaultIdentity);
232 zeroAndReleasePassword(defaultPassword);
235 memset(buf, 0, sizeof(buf));
241 gssEapPrimaryMechForCred(gss_cred_id_t cred)
243 gss_OID nameMech = GSS_C_NO_OID;
245 if (cred->mechanisms != GSS_C_NO_OID_SET &&
246 cred->mechanisms->count == 1)
247 nameMech = &cred->mechanisms->elements[0];
253 gssEapAcquireCred(OM_uint32 *minor,
254 const gss_name_t desiredName,
255 OM_uint32 timeReq GSSEAP_UNUSED,
256 const gss_OID_set desiredMechs,
258 gss_cred_id_t *pCred,
259 gss_OID_set *pActualMechs,
262 OM_uint32 major, tmpMinor;
265 /* XXX TODO validate with changed set_cred_option API */
266 *pCred = GSS_C_NO_CREDENTIAL;
268 major = gssEapAllocCred(minor, &cred);
269 if (GSS_ERROR(major))
274 cred->flags |= CRED_FLAG_INITIATE | CRED_FLAG_ACCEPT;
277 cred->flags |= CRED_FLAG_INITIATE;
280 cred->flags |= CRED_FLAG_ACCEPT;
283 major = GSS_S_FAILURE;
284 *minor = GSSEAP_BAD_USAGE;
289 major = gssEapValidateMechs(minor, desiredMechs);
290 if (GSS_ERROR(major))
293 major = duplicateOidSet(minor, desiredMechs, &cred->mechanisms);
294 if (GSS_ERROR(major))
297 if (desiredName != GSS_C_NO_NAME) {
298 GSSEAP_MUTEX_LOCK(&desiredName->mutex);
300 major = gssEapDuplicateName(minor, desiredName, &cred->name);
301 if (GSS_ERROR(major)) {
302 GSSEAP_MUTEX_UNLOCK(&desiredName->mutex);
306 GSSEAP_MUTEX_UNLOCK(&desiredName->mutex);
309 if (pActualMechs != NULL) {
310 major = duplicateOidSet(minor, cred->mechanisms, pActualMechs);
311 if (GSS_ERROR(major))
316 *timeRec = GSS_C_INDEFINITE;
320 major = GSS_S_COMPLETE;
324 if (GSS_ERROR(major))
325 gssEapReleaseCred(&tmpMinor, &cred);
331 * Return TRUE if cred available for mechanism. Caller need no acquire
332 * lock because mechanisms list is immutable.
335 gssEapCredAvailable(gss_cred_id_t cred, gss_OID mech)
340 assert(mech != GSS_C_NO_OID);
342 if (cred == GSS_C_NO_CREDENTIAL || cred->mechanisms == GSS_C_NO_OID_SET)
345 gss_test_oid_set_member(&minor, mech, cred->mechanisms, &present);
351 staticIdentityFileResolveDefaultIdentity(OM_uint32 *minor,
352 const gss_cred_id_t cred,
355 OM_uint32 major, tmpMinor;
356 gss_OID nameMech = gssEapPrimaryMechForCred(cred);
357 gss_buffer_desc defaultIdentity = GSS_C_EMPTY_BUFFER;
359 *pName = GSS_C_NO_NAME;
361 major = readStaticIdentityFile(minor, &defaultIdentity, GSS_C_NO_BUFFER);
362 if (major == GSS_S_COMPLETE) {
363 major = gssEapImportName(minor, &defaultIdentity, GSS_C_NT_USER_NAME,
367 gss_release_buffer(&tmpMinor, &defaultIdentity);
373 gssEapResolveCredIdentity(OM_uint32 *minor,
377 gss_OID nameMech = gssEapPrimaryMechForCred(cred);
379 if (cred->name != GSS_C_NO_NAME) {
381 return GSS_S_COMPLETE;
384 if (cred->flags & CRED_FLAG_ACCEPT) {
385 gss_buffer_desc nameBuf = GSS_C_EMPTY_BUFFER;
386 char serviceName[5 + MAXHOSTNAMELEN];
388 /* default host-based service is host@localhost */
389 memcpy(serviceName, "host@", 5);
390 if (gethostname(&serviceName[5], MAXHOSTNAMELEN) != 0) {
391 *minor = GSSEAP_NO_HOSTNAME;
392 return GSS_S_FAILURE;
395 nameBuf.value = serviceName;
396 nameBuf.length = strlen((char *)nameBuf.value);
398 major = gssEapImportName(minor, &nameBuf, GSS_C_NT_HOSTBASED_SERVICE,
399 nameMech, &cred->name);
400 if (GSS_ERROR(major))
402 } else if (cred->flags & CRED_FLAG_INITIATE) {
403 #ifdef HAVE_MOONSHOT_GET_IDENTITY
404 major = libMoonshotResolveDefaultIdentity(minor, cred, &cred->name);
405 if (major == GSS_S_CRED_UNAVAIL)
407 major = staticIdentityFileResolveDefaultIdentity(minor, cred, &cred->name);
408 if (major != GSS_S_CRED_UNAVAIL)
413 return GSS_S_COMPLETE;
417 gssEapInquireCred(OM_uint32 *minor,
420 OM_uint32 *pLifetime,
421 gss_cred_usage_t *cred_usage,
422 gss_OID_set *mechanisms)
425 time_t now, lifetime;
428 major = gssEapResolveCredIdentity(minor, cred);
429 if (GSS_ERROR(major))
432 if (cred->name != GSS_C_NO_NAME) {
433 major = gssEapDuplicateName(minor, cred->name, name);
434 if (GSS_ERROR(major))
437 *name = GSS_C_NO_NAME;
440 if (cred_usage != NULL) {
441 OM_uint32 flags = (cred->flags & (CRED_FLAG_INITIATE | CRED_FLAG_ACCEPT));
444 case CRED_FLAG_INITIATE:
445 *cred_usage = GSS_C_INITIATE;
447 case CRED_FLAG_ACCEPT:
448 *cred_usage = GSS_C_ACCEPT;
451 *cred_usage = GSS_C_BOTH;
456 if (mechanisms != NULL) {
457 if (cred->mechanisms != GSS_C_NO_OID_SET)
458 major = duplicateOidSet(minor, cred->mechanisms, mechanisms);
460 major = gssEapIndicateMechs(minor, mechanisms);
461 if (GSS_ERROR(major))
465 if (cred->expiryTime == 0) {
466 lifetime = GSS_C_INDEFINITE;
469 lifetime = now - cred->expiryTime;
474 if (pLifetime != NULL) {
475 *pLifetime = lifetime;
479 major = GSS_S_CREDENTIALS_EXPIRED;
480 *minor = GSSEAP_CRED_EXPIRED;
484 major = GSS_S_COMPLETE;
492 gssEapSetCredPassword(OM_uint32 *minor,
494 const gss_buffer_t password)
496 OM_uint32 major, tmpMinor;
497 gss_buffer_desc newPassword = GSS_C_EMPTY_BUFFER;
499 if (cred->flags & CRED_FLAG_RESOLVED) {
500 major = GSS_S_FAILURE;
501 *minor = GSSEAP_CRED_RESOLVED;
505 if (password != GSS_C_NO_BUFFER) {
506 major = duplicateBuffer(minor, password, &newPassword);
507 if (GSS_ERROR(major))
510 cred->flags |= CRED_FLAG_PASSWORD;
512 cred->flags &= ~(CRED_FLAG_PASSWORD);
515 gss_release_buffer(&tmpMinor, &cred->password);
516 cred->password = newPassword;
518 major = GSS_S_COMPLETE;
526 gssEapDuplicateCred(OM_uint32 *minor,
527 const gss_cred_id_t src,
530 OM_uint32 major, tmpMinor;
531 gss_cred_id_t dst = GSS_C_NO_CREDENTIAL;
533 *pDst = GSS_C_NO_CREDENTIAL;
535 major = gssEapAllocCred(minor, &dst);
536 if (GSS_ERROR(major))
539 dst->flags = src->flags;
541 if (src->name != GSS_C_NO_NAME) {
542 major = gssEapDuplicateName(minor, src->name, &dst->name);
543 if (GSS_ERROR(major))
547 if (src->target != GSS_C_NO_NAME) {
548 major = gssEapDuplicateName(minor, src->target, &dst->target);
549 if (GSS_ERROR(major))
553 if (src->password.value != NULL) {
554 major = duplicateBuffer(minor, &src->password, &dst->password);
555 if (GSS_ERROR(major))
559 major = duplicateOidSet(minor, src->mechanisms, &dst->mechanisms);
560 if (GSS_ERROR(major))
563 dst->expiryTime = src->expiryTime;
565 if (src->radiusConfigFile.value != NULL)
566 duplicateBufferOrCleanup(&src->radiusConfigFile, &dst->radiusConfigFile);
567 if (src->radiusConfigStanza.value != NULL)
568 duplicateBufferOrCleanup(&src->radiusConfigStanza, &dst->radiusConfigStanza);
569 if (src->caCertificate.value != NULL)
570 duplicateBufferOrCleanup(&src->caCertificate, &dst->caCertificate);
571 if (src->subjectNameConstraint.value != NULL)
572 duplicateBufferOrCleanup(&src->subjectNameConstraint, &dst->subjectNameConstraint);
573 if (src->subjectAltNameConstraint.value != NULL)
574 duplicateBufferOrCleanup(&src->subjectAltNameConstraint, &dst->subjectAltNameConstraint);
576 #ifdef GSSEAP_ENABLE_REAUTH
577 /* XXX krbCredCache, reauthCred */
581 dst = GSS_C_NO_CREDENTIAL;
583 major = GSS_S_COMPLETE;
587 gssEapReleaseCred(&tmpMinor, &dst);
593 staticIdentityFileResolveInitiatorCred(OM_uint32 *minor, gss_cred_id_t cred)
595 OM_uint32 major, tmpMinor;
596 gss_buffer_desc defaultIdentity = GSS_C_EMPTY_BUFFER;
597 gss_name_t defaultIdentityName = GSS_C_NO_NAME;
598 gss_buffer_desc defaultPassword = GSS_C_EMPTY_BUFFER;
599 int isDefaultIdentity = FALSE;
601 major = readStaticIdentityFile(minor, &defaultIdentity, &defaultPassword);
602 if (GSS_ERROR(major))
605 major = gssEapImportName(minor, &defaultIdentity, GSS_C_NT_USER_NAME,
606 gssEapPrimaryMechForCred(cred), &defaultIdentityName);
607 if (GSS_ERROR(major))
610 if (defaultIdentityName == GSS_C_NO_NAME) {
611 if (cred->name == GSS_C_NO_NAME) {
612 major = GSS_S_CRED_UNAVAIL;
613 *minor = GSSEAP_NO_DEFAULT_IDENTITY;
617 if (cred->name == GSS_C_NO_NAME) {
618 cred->name = defaultIdentityName;
619 defaultIdentityName = GSS_C_NO_NAME;
620 isDefaultIdentity = TRUE;
622 major = gssEapCompareName(minor, cred->name,
623 defaultIdentityName, &isDefaultIdentity);
624 if (GSS_ERROR(major))
629 if (isDefaultIdentity &&
630 (cred->flags & CRED_FLAG_PASSWORD) == 0) {
631 major = gssEapSetCredPassword(minor, cred, &defaultPassword);
632 if (GSS_ERROR(major))
637 gssEapReleaseName(&tmpMinor, &defaultIdentityName);
638 zeroAndReleasePassword(&defaultPassword);
639 gss_release_buffer(&tmpMinor, &defaultIdentity);
645 gssEapResolveInitiatorCred(OM_uint32 *minor,
646 const gss_cred_id_t cred,
647 const gss_name_t targetName
648 #ifndef HAVE_MOONSHOT_GET_IDENTITY
652 gss_cred_id_t *pResolvedCred)
654 OM_uint32 major, tmpMinor;
655 gss_cred_id_t resolvedCred = GSS_C_NO_CREDENTIAL;
657 if (cred == GSS_C_NO_CREDENTIAL) {
658 major = gssEapAcquireCred(minor,
666 if (GSS_ERROR(major))
669 if ((cred->flags & CRED_FLAG_INITIATE) == 0) {
670 major = GSS_S_NO_CRED;
671 *minor = GSSEAP_CRED_USAGE_MISMATCH;
675 major = gssEapDuplicateCred(minor, cred, &resolvedCred);
676 if (GSS_ERROR(major))
680 if ((resolvedCred->flags & CRED_FLAG_RESOLVED) == 0) {
681 #ifdef HAVE_MOONSHOT_GET_IDENTITY
682 major = libMoonshotResolveInitiatorCred(minor, resolvedCred, targetName);
683 if (major == GSS_S_CRED_UNAVAIL)
685 major = staticIdentityFileResolveInitiatorCred(minor, resolvedCred);
686 if (GSS_ERROR(major))
689 if ((resolvedCred->flags & CRED_FLAG_PASSWORD) == 0) {
690 major = GSS_S_CRED_UNAVAIL;
691 *minor = GSSEAP_NO_DEFAULT_CRED;
695 resolvedCred->flags |= CRED_FLAG_RESOLVED;
698 *pResolvedCred = resolvedCred;
699 resolvedCred = GSS_C_NO_CREDENTIAL;
701 major = GSS_S_COMPLETE;
705 gssEapReleaseCred(&tmpMinor, &resolvedCred);