2 * Copyright (c) 2011, JANET(UK)
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the name of JANET(UK) nor the names of its contributors
17 * may be used to endorse or promote products derived from this software
18 * without specific prior written permission.
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
21 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34 * Utility routines for credential handles.
37 #include "gssapiP_eap.h"
40 /*This didn't work for me(Alexey) when Visual Studio 2005 Express is used: */
42 /*This didn't work for me(Kevin) when Visual Studio 2010 Express is used: */
43 /*#include <ShFolder.h>*/
45 #if !defined(snprintf)
46 #define snprintf _snprintf
52 #include <stdio.h> /* for BUFSIZ */
55 gssEapAllocCred(OM_uint32 *minor, gss_cred_id_t *pCred)
60 *pCred = GSS_C_NO_CREDENTIAL;
62 cred = (gss_cred_id_t)GSSEAP_CALLOC(1, sizeof(*cred));
68 if (GSSEAP_MUTEX_INIT(&cred->mutex) != 0) {
70 gssEapReleaseCred(&tmpMinor, &cred);
77 return GSS_S_COMPLETE;
81 gssEapReleaseCred(OM_uint32 *minor, gss_cred_id_t *pCred)
84 gss_cred_id_t cred = *pCred;
85 krb5_context krbContext = NULL;
87 if (cred == GSS_C_NO_CREDENTIAL) {
88 return GSS_S_COMPLETE;
91 GSSEAP_KRB_INIT(&krbContext);
93 gssEapReleaseName(&tmpMinor, &cred->name);
95 if (cred->password.value != NULL) {
96 memset(cred->password.value, 0, cred->password.length);
97 GSSEAP_FREE(cred->password.value);
100 if (cred->radiusConfigFile != NULL)
101 GSSEAP_FREE(cred->radiusConfigFile);
102 if (cred->radiusConfigStanza != NULL)
103 GSSEAP_FREE(cred->radiusConfigStanza);
105 #ifdef GSSEAP_ENABLE_REAUTH
106 if (cred->krbCredCache != NULL) {
107 if (cred->flags & CRED_FLAG_DEFAULT_CCACHE)
108 krb5_cc_close(krbContext, cred->krbCredCache);
110 krb5_cc_destroy(krbContext, cred->krbCredCache);
112 if (cred->reauthCred != GSS_C_NO_CREDENTIAL)
113 gssReleaseCred(&tmpMinor, &cred->reauthCred);
116 GSSEAP_MUTEX_DESTROY(&cred->mutex);
117 memset(cred, 0, sizeof(*cred));
122 return GSS_S_COMPLETE;
126 readDefaultIdentityAndCreds(OM_uint32 *minor,
127 gss_buffer_t defaultIdentity,
128 gss_buffer_t defaultCreds)
130 OM_uint32 major, tmpMinor;
136 struct passwd *pw = NULL, pwd;
139 defaultIdentity->length = 0;
140 defaultIdentity->value = NULL;
142 defaultCreds->length = 0;
143 defaultCreds->value = NULL;
145 ccacheName = getenv("GSSEAP_IDENTITY");
146 if (ccacheName == NULL) {
148 if (getpwuid_r(getuid(), &pwd, pwbuf, sizeof(pwbuf), &pw) != 0 ||
149 pw == NULL || pw->pw_dir == NULL) {
150 major = GSS_S_CRED_UNAVAIL;
155 snprintf(buf, sizeof(buf), "%s/.gss_eap_id", pw->pw_dir);
158 TCHAR szPath[MAX_PATH];
160 if(!SUCCEEDED(SHGetFolderPath(NULL,
161 CSIDL_APPDATA, /* |CSIDL_FLAG_CREATE */
162 NULL, /* User access token */
163 0, /* == SHGFP_TYPE_CURRENT from ShlObj.h */
165 major = GSS_S_CRED_UNAVAIL;
166 ////Needs to be correctly converted from the GetLastError();
171 snprintf(buf, sizeof(buf), "%s/.gss_eap_id", szPath);
176 fp = fopen(ccacheName, "r");
178 major = GSS_S_CRED_UNAVAIL;
179 *minor = GSSEAP_NO_DEFAULT_CRED;
183 while (fgets(buf, sizeof(buf), fp) != NULL) {
184 gss_buffer_desc src, *dst;
186 src.length = strlen(buf);
192 if (buf[src.length - 1] == '\n') {
193 buf[src.length - 1] = '\0';
194 if (--src.length == 0)
198 if (defaultIdentity->value == NULL)
199 dst = defaultIdentity;
200 else if (defaultCreds->value == NULL)
205 major = duplicateBuffer(minor, &src, dst);
206 if (GSS_ERROR(major))
210 if (defaultIdentity->length == 0) {
211 major = GSS_S_CRED_UNAVAIL;
212 *minor = GSSEAP_NO_DEFAULT_CRED;
216 major = GSS_S_COMPLETE;
223 if (GSS_ERROR(major)) {
224 gss_release_buffer(&tmpMinor, defaultIdentity);
225 gss_release_buffer(&tmpMinor, defaultCreds);
232 gssEapAcquireCred(OM_uint32 *minor,
233 const gss_name_t desiredName,
234 const gss_buffer_t password,
235 OM_uint32 timeReq GSSEAP_UNUSED,
236 const gss_OID_set desiredMechs,
238 gss_cred_id_t *pCred,
239 gss_OID_set *pActualMechs,
242 OM_uint32 major, tmpMinor;
244 gss_buffer_desc defaultIdentity = GSS_C_EMPTY_BUFFER;
245 gss_name_t defaultIdentityName = GSS_C_NO_NAME;
246 gss_buffer_desc defaultCreds = GSS_C_EMPTY_BUFFER;
247 gss_OID nameMech = GSS_C_NO_OID;
249 /* XXX TODO validate with changed set_cred_option API */
250 *pCred = GSS_C_NO_CREDENTIAL;
252 major = gssEapAllocCred(minor, &cred);
253 if (GSS_ERROR(major))
258 cred->flags |= CRED_FLAG_INITIATE | CRED_FLAG_ACCEPT;
261 cred->flags |= CRED_FLAG_INITIATE;
264 cred->flags |= CRED_FLAG_ACCEPT;
267 major = GSS_S_FAILURE;
268 *minor = GSSEAP_BAD_USAGE;
273 major = gssEapValidateMechs(minor, desiredMechs);
274 if (GSS_ERROR(major))
277 major = duplicateOidSet(minor, desiredMechs, &cred->mechanisms);
278 if (GSS_ERROR(major))
281 if (cred->mechanisms != GSS_C_NO_OID_SET &&
282 cred->mechanisms->count == 1)
283 nameMech = &cred->mechanisms->elements[0];
285 if (cred->flags & CRED_FLAG_INITIATE) {
286 major = readDefaultIdentityAndCreds(minor, &defaultIdentity, &defaultCreds);
287 if (major == GSS_S_COMPLETE) {
288 major = gssEapImportName(minor, &defaultIdentity, GSS_C_NT_USER_NAME,
289 nameMech, &defaultIdentityName);
290 if (GSS_ERROR(major))
292 } else if (major != GSS_S_CRED_UNAVAIL)
296 if (desiredName != GSS_C_NO_NAME) {
297 GSSEAP_MUTEX_LOCK(&desiredName->mutex);
299 major = gssEapDuplicateName(minor, desiredName, &cred->name);
300 if (GSS_ERROR(major)) {
301 GSSEAP_MUTEX_UNLOCK(&desiredName->mutex);
305 GSSEAP_MUTEX_UNLOCK(&desiredName->mutex);
307 if (defaultIdentityName != GSS_C_NO_NAME) {
310 major = gssEapCompareName(minor, desiredName,
311 defaultIdentityName, &nameEqual);
312 if (GSS_ERROR(major))
315 cred->flags |= CRED_FLAG_DEFAULT_IDENTITY;
318 if (cred->flags & CRED_FLAG_ACCEPT) {
319 gss_buffer_desc nameBuf = GSS_C_EMPTY_BUFFER;
320 char serviceName[5 + MAXHOSTNAMELEN];
322 /* default host-based service is host@localhost */
323 memcpy(serviceName, "host@", 5);
324 if (gethostname(&serviceName[5], MAXHOSTNAMELEN) != 0) {
325 major = GSS_S_FAILURE;
326 *minor = GSSEAP_NO_HOSTNAME;
330 nameBuf.value = serviceName;
331 nameBuf.length = strlen((char *)nameBuf.value);
333 major = gssEapImportName(minor, &nameBuf, GSS_C_NT_HOSTBASED_SERVICE,
334 nameMech, &cred->name);
335 if (GSS_ERROR(major))
337 } else if (cred->flags & CRED_FLAG_INITIATE) {
338 if (defaultIdentityName == GSS_C_NO_NAME) {
339 major = GSS_S_CRED_UNAVAIL;
340 *minor = GSSEAP_NO_DEFAULT_IDENTITY;
344 cred->name = defaultIdentityName;
345 defaultIdentityName = GSS_C_NO_NAME;
347 cred->flags |= CRED_FLAG_DEFAULT_IDENTITY;
350 assert(cred->name != GSS_C_NO_NAME);
352 if (password != GSS_C_NO_BUFFER) {
353 major = duplicateBuffer(minor, password, &cred->password);
354 if (GSS_ERROR(major))
357 cred->flags |= CRED_FLAG_PASSWORD;
358 } else if (defaultCreds.value != NULL &&
359 (cred->flags & CRED_FLAG_DEFAULT_IDENTITY)) {
360 cred->password = defaultCreds;
362 defaultCreds.length = 0;
363 defaultCreds.value = NULL;
365 cred->flags |= CRED_FLAG_PASSWORD;
366 } else if (cred->flags & CRED_FLAG_INITIATE) {
368 * OK, here we need to ask the supplicant if we have creds or it
369 * will acquire them, so GS2 can know whether to prompt for a
373 && !gssEapCanReauthP(cred, GSS_C_NO_NAME, timeReq)
375 major = GSS_S_CRED_UNAVAIL;
376 *minor = GSSEAP_NO_DEFAULT_CRED;
380 if (pActualMechs != NULL) {
381 major = duplicateOidSet(minor, cred->mechanisms, pActualMechs);
382 if (GSS_ERROR(major))
387 *timeRec = GSS_C_INDEFINITE;
391 major = GSS_S_COMPLETE;
395 if (GSS_ERROR(major))
396 gssEapReleaseCred(&tmpMinor, &cred);
397 gssEapReleaseName(&tmpMinor, &defaultIdentityName);
398 gss_release_buffer(&tmpMinor, &defaultIdentity);
399 if (defaultCreds.value != NULL) {
400 memset(defaultCreds.value, 0, defaultCreds.length);
401 gss_release_buffer(&tmpMinor, &defaultCreds);
408 * Return TRUE if cred available for mechanism. Caller need no acquire
409 * lock because mechanisms list is immutable.
412 gssEapCredAvailable(gss_cred_id_t cred, gss_OID mech)
417 assert(mech != GSS_C_NO_OID);
419 if (cred == GSS_C_NO_CREDENTIAL || cred->mechanisms == GSS_C_NO_OID_SET)
422 gss_test_oid_set_member(&minor, mech, cred->mechanisms, &present);
428 gssEapInquireCred(OM_uint32 *minor,
431 OM_uint32 *pLifetime,
432 gss_cred_usage_t *cred_usage,
433 gss_OID_set *mechanisms)
436 time_t now, lifetime;
439 major = gssEapDuplicateName(minor, cred->name, name);
440 if (GSS_ERROR(major))
444 if (cred_usage != NULL) {
445 OM_uint32 flags = (cred->flags & (CRED_FLAG_INITIATE | CRED_FLAG_ACCEPT));
448 case CRED_FLAG_INITIATE:
449 *cred_usage = GSS_C_INITIATE;
451 case CRED_FLAG_ACCEPT:
452 *cred_usage = GSS_C_ACCEPT;
455 *cred_usage = GSS_C_BOTH;
460 if (mechanisms != NULL) {
461 if (cred->mechanisms != GSS_C_NO_OID_SET)
462 major = duplicateOidSet(minor, cred->mechanisms, mechanisms);
464 major = gssEapIndicateMechs(minor, mechanisms);
465 if (GSS_ERROR(major))
469 if (cred->expiryTime == 0) {
470 lifetime = GSS_C_INDEFINITE;
473 lifetime = now - cred->expiryTime;
478 if (pLifetime != NULL) {
479 *pLifetime = lifetime;
483 *minor = GSSEAP_CRED_EXPIRED;
484 return GSS_S_CREDENTIALS_EXPIRED;
487 major = GSS_S_COMPLETE;