2 * Copyright (c) 2011, JANET(UK)
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the name of JANET(UK) nor the names of its contributors
17 * may be used to endorse or promote products derived from this software
18 * without specific prior written permission.
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
21 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34 * Utility routines for credential handles.
37 #include "gssapiP_eap.h"
40 # include <shlobj.h> /* may need to use ShFolder.h instead */
47 gssEapAllocCred(OM_uint32 *minor, gss_cred_id_t *pCred)
52 *pCred = GSS_C_NO_CREDENTIAL;
54 cred = (gss_cred_id_t)GSSEAP_CALLOC(1, sizeof(*cred));
60 if (GSSEAP_MUTEX_INIT(&cred->mutex) != 0) {
61 *minor = GSSEAP_GET_LAST_ERROR();
62 gssEapReleaseCred(&tmpMinor, &cred);
69 return GSS_S_COMPLETE;
73 zeroAndReleasePassword(gss_buffer_t password)
75 if (password->value != NULL) {
76 memset(password->value, 0, password->length);
77 GSSEAP_FREE(password->value);
80 password->value = NULL;
85 gssEapReleaseCred(OM_uint32 *minor, gss_cred_id_t *pCred)
88 gss_cred_id_t cred = *pCred;
89 krb5_context krbContext = NULL;
91 if (cred == GSS_C_NO_CREDENTIAL) {
92 return GSS_S_COMPLETE;
95 GSSEAP_KRB_INIT(&krbContext);
97 gssEapReleaseName(&tmpMinor, &cred->name);
98 gssEapReleaseName(&tmpMinor, &cred->target);
100 zeroAndReleasePassword(&cred->password);
102 gss_release_buffer(&tmpMinor, &cred->radiusConfigFile);
103 gss_release_buffer(&tmpMinor, &cred->radiusConfigStanza);
104 gss_release_buffer(&tmpMinor, &cred->caCertificate);
105 gss_release_buffer(&tmpMinor, &cred->subjectNameConstraint);
106 gss_release_buffer(&tmpMinor, &cred->subjectAltNameConstraint);
108 #ifdef GSSEAP_ENABLE_REAUTH
109 if (cred->krbCredCache != NULL) {
110 if (cred->flags & CRED_FLAG_DEFAULT_CCACHE)
111 krb5_cc_close(krbContext, cred->krbCredCache);
113 krb5_cc_destroy(krbContext, cred->krbCredCache);
115 if (cred->reauthCred != GSS_C_NO_CREDENTIAL)
116 gssReleaseCred(&tmpMinor, &cred->reauthCred);
119 GSSEAP_MUTEX_DESTROY(&cred->mutex);
120 memset(cred, 0, sizeof(*cred));
125 return GSS_S_COMPLETE;
129 readStaticIdentityFile(OM_uint32 *minor,
130 gss_buffer_t defaultIdentity,
131 gss_buffer_t defaultPassword)
133 OM_uint32 major, tmpMinor;
139 struct passwd *pw = NULL, pwd;
143 defaultIdentity->length = 0;
144 defaultIdentity->value = NULL;
146 if (defaultPassword != GSS_C_NO_BUFFER) {
147 defaultPassword->length = 0;
148 defaultPassword->value = NULL;
151 ccacheName = getenv("GSSEAP_IDENTITY");
152 if (ccacheName == NULL) {
154 TCHAR szPath[MAX_PATH];
156 if (!SUCCEEDED(SHGetFolderPath(NULL,
157 CSIDL_APPDATA, /* |CSIDL_FLAG_CREATE */
158 NULL, /* User access token */
159 0, /* SHGFP_TYPE_CURRENT */
161 major = GSS_S_CRED_UNAVAIL;
162 *minor = GSSEAP_GET_LAST_ERROR(); /* XXX */
166 snprintf(buf, sizeof(buf), "%s/.gss_eap_id", szPath);
168 if (getpwuid_r(getuid(), &pwd, pwbuf, sizeof(pwbuf), &pw) != 0 ||
169 pw == NULL || pw->pw_dir == NULL) {
170 major = GSS_S_CRED_UNAVAIL;
171 *minor = GSSEAP_GET_LAST_ERROR();
175 snprintf(buf, sizeof(buf), "%s/.gss_eap_id", pw->pw_dir);
180 fp = fopen(ccacheName, "r");
182 major = GSS_S_CRED_UNAVAIL;
183 *minor = GSSEAP_NO_DEFAULT_CRED;
187 while (fgets(buf, sizeof(buf), fp) != NULL) {
188 gss_buffer_desc src, *dst;
190 src.length = strlen(buf);
196 if (buf[src.length - 1] == '\n') {
197 buf[src.length - 1] = '\0';
198 if (--src.length == 0)
203 dst = defaultIdentity;
205 dst = defaultPassword;
209 if (dst != GSS_C_NO_BUFFER) {
210 major = duplicateBuffer(minor, &src, dst);
211 if (GSS_ERROR(major))
218 if (defaultIdentity->length == 0) {
219 major = GSS_S_CRED_UNAVAIL;
220 *minor = GSSEAP_NO_DEFAULT_CRED;
224 major = GSS_S_COMPLETE;
231 if (GSS_ERROR(major)) {
232 gss_release_buffer(&tmpMinor, defaultIdentity);
233 zeroAndReleasePassword(defaultPassword);
236 memset(buf, 0, sizeof(buf));
242 gssEapPrimaryMechForCred(gss_cred_id_t cred)
244 gss_OID credMech = GSS_C_NO_OID;
246 if (cred != GSS_C_NO_CREDENTIAL &&
247 cred->mechanisms != GSS_C_NO_OID_SET &&
248 cred->mechanisms->count == 1)
249 credMech = &cred->mechanisms->elements[0];
255 gssEapAcquireCred(OM_uint32 *minor,
256 const gss_name_t desiredName,
257 OM_uint32 timeReq GSSEAP_UNUSED,
258 const gss_OID_set desiredMechs,
260 gss_cred_id_t *pCred,
261 gss_OID_set *pActualMechs,
264 OM_uint32 major, tmpMinor;
267 /* XXX TODO validate with changed set_cred_option API */
268 *pCred = GSS_C_NO_CREDENTIAL;
270 major = gssEapAllocCred(minor, &cred);
271 if (GSS_ERROR(major))
276 cred->flags |= CRED_FLAG_INITIATE | CRED_FLAG_ACCEPT;
279 cred->flags |= CRED_FLAG_INITIATE;
282 cred->flags |= CRED_FLAG_ACCEPT;
285 major = GSS_S_FAILURE;
286 *minor = GSSEAP_BAD_USAGE;
291 major = gssEapValidateMechs(minor, desiredMechs);
292 if (GSS_ERROR(major))
295 major = duplicateOidSet(minor, desiredMechs, &cred->mechanisms);
296 if (GSS_ERROR(major))
299 if (desiredName != GSS_C_NO_NAME) {
300 GSSEAP_MUTEX_LOCK(&desiredName->mutex);
302 major = gssEapDuplicateName(minor, desiredName, &cred->name);
303 if (GSS_ERROR(major)) {
304 GSSEAP_MUTEX_UNLOCK(&desiredName->mutex);
308 GSSEAP_MUTEX_UNLOCK(&desiredName->mutex);
311 #ifdef GSSEAP_ENABLE_ACCEPTOR
312 if (cred->flags & CRED_FLAG_ACCEPT) {
313 struct rs_context *radContext;
315 major = gssEapCreateRadiusContext(minor, cred, &radContext);
316 if (GSS_ERROR(major))
319 rs_context_destroy(radContext);
323 if (pActualMechs != NULL) {
324 major = duplicateOidSet(minor, cred->mechanisms, pActualMechs);
325 if (GSS_ERROR(major))
330 *timeRec = GSS_C_INDEFINITE;
334 major = GSS_S_COMPLETE;
338 if (GSS_ERROR(major))
339 gssEapReleaseCred(&tmpMinor, &cred);
345 * Return TRUE if cred available for mechanism. Caller need no acquire
346 * lock because mechanisms list is immutable.
349 gssEapCredAvailable(gss_cred_id_t cred, gss_OID mech)
354 GSSEAP_ASSERT(mech != GSS_C_NO_OID);
356 if (cred == GSS_C_NO_CREDENTIAL || cred->mechanisms == GSS_C_NO_OID_SET)
359 gss_test_oid_set_member(&minor, mech, cred->mechanisms, &present);
365 staticIdentityFileResolveDefaultIdentity(OM_uint32 *minor,
366 const gss_cred_id_t cred,
369 OM_uint32 major, tmpMinor;
370 gss_OID nameMech = gssEapPrimaryMechForCred(cred);
371 gss_buffer_desc defaultIdentity = GSS_C_EMPTY_BUFFER;
373 *pName = GSS_C_NO_NAME;
375 major = readStaticIdentityFile(minor, &defaultIdentity, GSS_C_NO_BUFFER);
376 if (major == GSS_S_COMPLETE) {
377 major = gssEapImportName(minor, &defaultIdentity, GSS_C_NT_USER_NAME,
381 gss_release_buffer(&tmpMinor, &defaultIdentity);
387 gssEapResolveCredIdentity(OM_uint32 *minor,
391 gss_OID nameMech = gssEapPrimaryMechForCred(cred);
393 if (cred->name != GSS_C_NO_NAME) {
395 return GSS_S_COMPLETE;
398 if (cred->flags & CRED_FLAG_ACCEPT) {
399 gss_buffer_desc nameBuf = GSS_C_EMPTY_BUFFER;
400 char serviceName[5 + MAXHOSTNAMELEN];
402 /* default host-based service is host@localhost */
403 memcpy(serviceName, "host@", 5);
404 if (gethostname(&serviceName[5], MAXHOSTNAMELEN) != 0) {
405 *minor = GSSEAP_NO_HOSTNAME;
406 return GSS_S_FAILURE;
409 nameBuf.value = serviceName;
410 nameBuf.length = strlen((char *)nameBuf.value);
412 major = gssEapImportName(minor, &nameBuf, GSS_C_NT_HOSTBASED_SERVICE,
413 nameMech, &cred->name);
414 if (GSS_ERROR(major))
416 } else if (cred->flags & CRED_FLAG_INITIATE) {
417 #ifdef HAVE_MOONSHOT_GET_IDENTITY
418 major = libMoonshotResolveDefaultIdentity(minor, cred, &cred->name);
419 if (major == GSS_S_CRED_UNAVAIL)
421 major = staticIdentityFileResolveDefaultIdentity(minor, cred, &cred->name);
422 if (major != GSS_S_CRED_UNAVAIL)
427 return GSS_S_COMPLETE;
431 gssEapInquireCred(OM_uint32 *minor,
434 OM_uint32 *pLifetime,
435 gss_cred_usage_t *cred_usage,
436 gss_OID_set *mechanisms)
439 time_t now, lifetime;
442 major = gssEapResolveCredIdentity(minor, cred);
443 if (GSS_ERROR(major))
446 if (cred->name != GSS_C_NO_NAME) {
447 major = gssEapDuplicateName(minor, cred->name, name);
448 if (GSS_ERROR(major))
451 *name = GSS_C_NO_NAME;
454 if (cred_usage != NULL) {
455 OM_uint32 flags = (cred->flags & (CRED_FLAG_INITIATE | CRED_FLAG_ACCEPT));
458 case CRED_FLAG_INITIATE:
459 *cred_usage = GSS_C_INITIATE;
461 case CRED_FLAG_ACCEPT:
462 *cred_usage = GSS_C_ACCEPT;
465 *cred_usage = GSS_C_BOTH;
470 if (mechanisms != NULL) {
471 if (cred->mechanisms != GSS_C_NO_OID_SET)
472 major = duplicateOidSet(minor, cred->mechanisms, mechanisms);
474 major = gssEapIndicateMechs(minor, mechanisms);
475 if (GSS_ERROR(major))
479 if (cred->expiryTime == 0) {
480 lifetime = GSS_C_INDEFINITE;
483 lifetime = now - cred->expiryTime;
488 if (pLifetime != NULL) {
489 *pLifetime = lifetime;
493 major = GSS_S_CREDENTIALS_EXPIRED;
494 *minor = GSSEAP_CRED_EXPIRED;
498 major = GSS_S_COMPLETE;
506 gssEapSetCredPassword(OM_uint32 *minor,
508 const gss_buffer_t password)
510 OM_uint32 major, tmpMinor;
511 gss_buffer_desc newPassword = GSS_C_EMPTY_BUFFER;
513 if (cred->flags & CRED_FLAG_RESOLVED) {
514 major = GSS_S_FAILURE;
515 *minor = GSSEAP_CRED_RESOLVED;
519 if (password != GSS_C_NO_BUFFER) {
520 major = duplicateBuffer(minor, password, &newPassword);
521 if (GSS_ERROR(major))
524 cred->flags |= CRED_FLAG_PASSWORD;
526 cred->flags &= ~(CRED_FLAG_PASSWORD);
529 gss_release_buffer(&tmpMinor, &cred->password);
530 cred->password = newPassword;
532 major = GSS_S_COMPLETE;
540 gssEapSetCredService(OM_uint32 *minor,
542 const gss_name_t target)
544 OM_uint32 major, tmpMinor;
545 gss_name_t newTarget = GSS_C_NO_NAME;
547 if (cred->flags & CRED_FLAG_RESOLVED) {
548 major = GSS_S_FAILURE;
549 *minor = GSSEAP_CRED_RESOLVED;
553 if (target != GSS_C_NO_NAME) {
554 major = gssEapDuplicateName(minor, target, &newTarget);
555 if (GSS_ERROR(major))
558 cred->flags |= CRED_FLAG_TARGET;
560 cred->flags &= ~(CRED_FLAG_TARGET);
563 gssEapReleaseName(&tmpMinor, &cred->target);
564 cred->target = newTarget;
566 major = GSS_S_COMPLETE;
574 gssEapDuplicateCred(OM_uint32 *minor,
575 const gss_cred_id_t src,
578 OM_uint32 major, tmpMinor;
579 gss_cred_id_t dst = GSS_C_NO_CREDENTIAL;
581 *pDst = GSS_C_NO_CREDENTIAL;
583 major = gssEapAllocCred(minor, &dst);
584 if (GSS_ERROR(major))
587 dst->flags = src->flags;
589 if (src->name != GSS_C_NO_NAME) {
590 major = gssEapDuplicateName(minor, src->name, &dst->name);
591 if (GSS_ERROR(major))
595 if (src->target != GSS_C_NO_NAME) {
596 major = gssEapDuplicateName(minor, src->target, &dst->target);
597 if (GSS_ERROR(major))
601 if (src->password.value != NULL) {
602 major = duplicateBuffer(minor, &src->password, &dst->password);
603 if (GSS_ERROR(major))
607 major = duplicateOidSet(minor, src->mechanisms, &dst->mechanisms);
608 if (GSS_ERROR(major))
611 dst->expiryTime = src->expiryTime;
613 if (src->radiusConfigFile.value != NULL)
614 duplicateBufferOrCleanup(&src->radiusConfigFile, &dst->radiusConfigFile);
615 if (src->radiusConfigStanza.value != NULL)
616 duplicateBufferOrCleanup(&src->radiusConfigStanza, &dst->radiusConfigStanza);
617 if (src->caCertificate.value != NULL)
618 duplicateBufferOrCleanup(&src->caCertificate, &dst->caCertificate);
619 if (src->subjectNameConstraint.value != NULL)
620 duplicateBufferOrCleanup(&src->subjectNameConstraint, &dst->subjectNameConstraint);
621 if (src->subjectAltNameConstraint.value != NULL)
622 duplicateBufferOrCleanup(&src->subjectAltNameConstraint, &dst->subjectAltNameConstraint);
624 #ifdef GSSEAP_ENABLE_REAUTH
625 /* XXX krbCredCache, reauthCred */
629 dst = GSS_C_NO_CREDENTIAL;
631 major = GSS_S_COMPLETE;
635 gssEapReleaseCred(&tmpMinor, &dst);
641 staticIdentityFileResolveInitiatorCred(OM_uint32 *minor, gss_cred_id_t cred)
643 OM_uint32 major, tmpMinor;
644 gss_buffer_desc defaultIdentity = GSS_C_EMPTY_BUFFER;
645 gss_name_t defaultIdentityName = GSS_C_NO_NAME;
646 gss_buffer_desc defaultPassword = GSS_C_EMPTY_BUFFER;
647 int isDefaultIdentity = FALSE;
649 major = readStaticIdentityFile(minor, &defaultIdentity, &defaultPassword);
650 if (GSS_ERROR(major))
653 major = gssEapImportName(minor, &defaultIdentity, GSS_C_NT_USER_NAME,
654 gssEapPrimaryMechForCred(cred), &defaultIdentityName);
655 if (GSS_ERROR(major))
658 if (defaultIdentityName == GSS_C_NO_NAME) {
659 if (cred->name == GSS_C_NO_NAME) {
660 major = GSS_S_CRED_UNAVAIL;
661 *minor = GSSEAP_NO_DEFAULT_IDENTITY;
665 if (cred->name == GSS_C_NO_NAME) {
666 cred->name = defaultIdentityName;
667 defaultIdentityName = GSS_C_NO_NAME;
668 isDefaultIdentity = TRUE;
670 major = gssEapCompareName(minor, cred->name,
671 defaultIdentityName, &isDefaultIdentity);
672 if (GSS_ERROR(major))
677 if (isDefaultIdentity &&
678 (cred->flags & CRED_FLAG_PASSWORD) == 0) {
679 major = gssEapSetCredPassword(minor, cred, &defaultPassword);
680 if (GSS_ERROR(major))
685 gssEapReleaseName(&tmpMinor, &defaultIdentityName);
686 zeroAndReleasePassword(&defaultPassword);
687 gss_release_buffer(&tmpMinor, &defaultIdentity);
693 gssEapResolveInitiatorCred(OM_uint32 *minor,
694 const gss_cred_id_t cred,
695 const gss_name_t targetName
696 #ifndef HAVE_MOONSHOT_GET_IDENTITY
700 gss_cred_id_t *pResolvedCred)
702 OM_uint32 major, tmpMinor;
703 gss_cred_id_t resolvedCred = GSS_C_NO_CREDENTIAL;
705 if (cred == GSS_C_NO_CREDENTIAL) {
706 major = gssEapAcquireCred(minor,
714 if (GSS_ERROR(major))
717 if ((cred->flags & CRED_FLAG_INITIATE) == 0) {
718 major = GSS_S_NO_CRED;
719 *minor = GSSEAP_CRED_USAGE_MISMATCH;
723 major = gssEapDuplicateCred(minor, cred, &resolvedCred);
724 if (GSS_ERROR(major))
728 if ((resolvedCred->flags & CRED_FLAG_RESOLVED) == 0) {
729 #ifdef HAVE_MOONSHOT_GET_IDENTITY
730 major = libMoonshotResolveInitiatorCred(minor, resolvedCred, targetName);
731 if (major == GSS_S_CRED_UNAVAIL)
733 major = staticIdentityFileResolveInitiatorCred(minor, resolvedCred);
734 if (GSS_ERROR(major) && major != GSS_S_CRED_UNAVAIL)
737 /* If we have a caller-supplied password, the credential is resolved. */
738 if ((resolvedCred->flags & CRED_FLAG_PASSWORD) == 0) {
739 major = GSS_S_CRED_UNAVAIL;
740 *minor = GSSEAP_NO_DEFAULT_CRED;
744 resolvedCred->flags |= CRED_FLAG_RESOLVED;
747 *pResolvedCred = resolvedCred;
748 resolvedCred = GSS_C_NO_CREDENTIAL;
750 major = GSS_S_COMPLETE;
754 gssEapReleaseCred(&tmpMinor, &resolvedCred);