2 * Copyright (c) 2011, JANET(UK)
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the name of JANET(UK) nor the names of its contributors
17 * may be used to endorse or promote products derived from this software
18 * without specific prior written permission.
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
21 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34 * Utility routines for credential handles.
37 #include "gssapiP_eap.h"
44 gssEapAllocCred(OM_uint32 *minor, gss_cred_id_t *pCred)
49 *pCred = GSS_C_NO_CREDENTIAL;
51 cred = (gss_cred_id_t)GSSEAP_CALLOC(1, sizeof(*cred));
57 if (GSSEAP_MUTEX_INIT(&cred->mutex) != 0) {
59 gssEapReleaseCred(&tmpMinor, &cred);
66 return GSS_S_COMPLETE;
70 zeroAndReleasePassword(gss_buffer_t password)
72 if (password->value != NULL) {
73 memset(password->value, 0, password->length);
74 GSSEAP_FREE(password->value);
77 password->value = NULL;
82 gssEapReleaseCred(OM_uint32 *minor, gss_cred_id_t *pCred)
85 gss_cred_id_t cred = *pCred;
86 krb5_context krbContext = NULL;
88 if (cred == GSS_C_NO_CREDENTIAL) {
89 return GSS_S_COMPLETE;
92 GSSEAP_KRB_INIT(&krbContext);
94 gssEapReleaseName(&tmpMinor, &cred->name);
95 gssEapReleaseName(&tmpMinor, &cred->target);
97 zeroAndReleasePassword(&cred->password);
99 gss_release_buffer(&tmpMinor, &cred->radiusConfigFile);
100 gss_release_buffer(&tmpMinor, &cred->radiusConfigStanza);
101 gss_release_buffer(&tmpMinor, &cred->caCertificate);
102 gss_release_buffer(&tmpMinor, &cred->subjectNameConstraint);
103 gss_release_buffer(&tmpMinor, &cred->subjectAltNameConstraint);
105 #ifdef GSSEAP_ENABLE_REAUTH
106 if (cred->krbCredCache != NULL) {
107 if (cred->flags & CRED_FLAG_DEFAULT_CCACHE)
108 krb5_cc_close(krbContext, cred->krbCredCache);
110 krb5_cc_destroy(krbContext, cred->krbCredCache);
112 if (cred->reauthCred != GSS_C_NO_CREDENTIAL)
113 gssReleaseCred(&tmpMinor, &cred->reauthCred);
116 GSSEAP_MUTEX_DESTROY(&cred->mutex);
117 memset(cred, 0, sizeof(*cred));
122 return GSS_S_COMPLETE;
126 readStaticIdentityFile(OM_uint32 *minor,
127 gss_buffer_t defaultIdentity,
128 gss_buffer_t defaultPassword)
130 OM_uint32 major, tmpMinor;
132 char pwbuf[BUFSIZ], buf[BUFSIZ];
134 struct passwd *pw = NULL, pwd;
137 defaultIdentity->length = 0;
138 defaultIdentity->value = NULL;
140 if (defaultPassword != GSS_C_NO_BUFFER) {
141 defaultPassword->length = 0;
142 defaultPassword->value = NULL;
145 ccacheName = getenv("GSSEAP_IDENTITY");
146 if (ccacheName == NULL) {
148 TCHAR szPath[MAX_PATH];
150 if (!SUCCEEDED(SHGetFolderPath(NULL,
151 CSIDL_APPDATA, /* |CSIDL_FLAG_CREATE */
152 NULL, /* User access token */
155 major = GSS_S_CRED_UNAVAIL;
156 *minor = GetLastError();
160 snprintf(buf, sizeof(buf), "%s/.gss_eap_id", szPath);
162 if (getpwuid_r(getuid(), &pwd, pwbuf, sizeof(pwbuf), &pw) != 0 ||
163 pw == NULL || pw->pw_dir == NULL) {
164 major = GSS_S_CRED_UNAVAIL;
169 snprintf(buf, sizeof(buf), "%s/.gss_eap_id", pw->pw_dir);
174 fp = fopen(ccacheName, "r");
176 major = GSS_S_CRED_UNAVAIL;
177 *minor = GSSEAP_NO_DEFAULT_CRED;
181 while (fgets(buf, sizeof(buf), fp) != NULL) {
182 gss_buffer_desc src, *dst;
184 src.length = strlen(buf);
190 if (buf[src.length - 1] == '\n') {
191 buf[src.length - 1] = '\0';
192 if (--src.length == 0)
197 dst = defaultIdentity;
199 dst = defaultPassword;
203 if (dst != GSS_C_NO_BUFFER) {
204 major = duplicateBuffer(minor, &src, dst);
205 if (GSS_ERROR(major))
212 if (defaultIdentity->length == 0) {
213 major = GSS_S_CRED_UNAVAIL;
214 *minor = GSSEAP_NO_DEFAULT_CRED;
218 major = GSS_S_COMPLETE;
225 if (GSS_ERROR(major)) {
226 gss_release_buffer(&tmpMinor, defaultIdentity);
227 zeroAndReleasePassword(defaultPassword);
230 memset(buf, 0, sizeof(buf));
236 gssEapPrimaryMechForCred(gss_cred_id_t cred)
238 gss_OID nameMech = GSS_C_NO_OID;
240 if (cred->mechanisms != GSS_C_NO_OID_SET &&
241 cred->mechanisms->count == 1)
242 nameMech = &cred->mechanisms->elements[0];
248 gssEapAcquireCred(OM_uint32 *minor,
249 const gss_name_t desiredName,
250 OM_uint32 timeReq GSSEAP_UNUSED,
251 const gss_OID_set desiredMechs,
253 gss_cred_id_t *pCred,
254 gss_OID_set *pActualMechs,
257 OM_uint32 major, tmpMinor;
260 /* XXX TODO validate with changed set_cred_option API */
261 *pCred = GSS_C_NO_CREDENTIAL;
263 major = gssEapAllocCred(minor, &cred);
264 if (GSS_ERROR(major))
269 cred->flags |= CRED_FLAG_INITIATE | CRED_FLAG_ACCEPT;
272 cred->flags |= CRED_FLAG_INITIATE;
275 cred->flags |= CRED_FLAG_ACCEPT;
278 major = GSS_S_FAILURE;
279 *minor = GSSEAP_BAD_USAGE;
284 major = gssEapValidateMechs(minor, desiredMechs);
285 if (GSS_ERROR(major))
288 major = duplicateOidSet(minor, desiredMechs, &cred->mechanisms);
289 if (GSS_ERROR(major))
292 if (desiredName != GSS_C_NO_NAME) {
293 GSSEAP_MUTEX_LOCK(&desiredName->mutex);
295 major = gssEapDuplicateName(minor, desiredName, &cred->name);
296 if (GSS_ERROR(major)) {
297 GSSEAP_MUTEX_UNLOCK(&desiredName->mutex);
301 GSSEAP_MUTEX_UNLOCK(&desiredName->mutex);
304 if (pActualMechs != NULL) {
305 major = duplicateOidSet(minor, cred->mechanisms, pActualMechs);
306 if (GSS_ERROR(major))
311 *timeRec = GSS_C_INDEFINITE;
315 major = GSS_S_COMPLETE;
319 if (GSS_ERROR(major))
320 gssEapReleaseCred(&tmpMinor, &cred);
326 * Return TRUE if cred available for mechanism. Caller need no acquire
327 * lock because mechanisms list is immutable.
330 gssEapCredAvailable(gss_cred_id_t cred, gss_OID mech)
335 assert(mech != GSS_C_NO_OID);
337 if (cred == GSS_C_NO_CREDENTIAL || cred->mechanisms == GSS_C_NO_OID_SET)
340 gss_test_oid_set_member(&minor, mech, cred->mechanisms, &present);
346 staticIdentityFileResolveDefaultIdentity(OM_uint32 *minor,
347 const gss_cred_id_t cred,
350 OM_uint32 major, tmpMinor;
351 gss_OID nameMech = gssEapPrimaryMechForCred(cred);
352 gss_buffer_desc defaultIdentity = GSS_C_EMPTY_BUFFER;
354 *pName = GSS_C_NO_NAME;
356 major = readStaticIdentityFile(minor, &defaultIdentity, GSS_C_NO_BUFFER);
357 if (major == GSS_S_COMPLETE) {
358 major = gssEapImportName(minor, &defaultIdentity, GSS_C_NT_USER_NAME,
362 gss_release_buffer(&tmpMinor, &defaultIdentity);
368 gssEapResolveCredIdentity(OM_uint32 *minor,
372 gss_OID nameMech = gssEapPrimaryMechForCred(cred);
374 if (cred->name != GSS_C_NO_NAME) {
376 return GSS_S_COMPLETE;
379 if (cred->flags & CRED_FLAG_ACCEPT) {
380 gss_buffer_desc nameBuf = GSS_C_EMPTY_BUFFER;
381 char serviceName[5 + MAXHOSTNAMELEN];
383 /* default host-based service is host@localhost */
384 memcpy(serviceName, "host@", 5);
385 if (gethostname(&serviceName[5], MAXHOSTNAMELEN) != 0) {
386 *minor = GSSEAP_NO_HOSTNAME;
387 return GSS_S_FAILURE;
390 nameBuf.value = serviceName;
391 nameBuf.length = strlen((char *)nameBuf.value);
393 major = gssEapImportName(minor, &nameBuf, GSS_C_NT_HOSTBASED_SERVICE,
394 nameMech, &cred->name);
395 if (GSS_ERROR(major))
397 } else if (cred->flags & CRED_FLAG_INITIATE) {
398 #ifdef HAVE_MOONSHOT_GET_IDENTITY
399 major = libMoonshotResolveDefaultIdentity(minor, cred, &cred->name);
400 if (major == GSS_S_CRED_UNAVAIL)
402 major = staticIdentityFileResolveDefaultIdentity(minor, cred, &cred->name);
403 if (major != GSS_S_CRED_UNAVAIL)
408 return GSS_S_COMPLETE;
412 gssEapInquireCred(OM_uint32 *minor,
415 OM_uint32 *pLifetime,
416 gss_cred_usage_t *cred_usage,
417 gss_OID_set *mechanisms)
420 time_t now, lifetime;
423 major = gssEapResolveCredIdentity(minor, cred);
424 if (GSS_ERROR(major))
427 if (cred->name != GSS_C_NO_NAME) {
428 major = gssEapDuplicateName(minor, cred->name, name);
429 if (GSS_ERROR(major))
432 *name = GSS_C_NO_NAME;
435 if (cred_usage != NULL) {
436 OM_uint32 flags = (cred->flags & (CRED_FLAG_INITIATE | CRED_FLAG_ACCEPT));
439 case CRED_FLAG_INITIATE:
440 *cred_usage = GSS_C_INITIATE;
442 case CRED_FLAG_ACCEPT:
443 *cred_usage = GSS_C_ACCEPT;
446 *cred_usage = GSS_C_BOTH;
451 if (mechanisms != NULL) {
452 if (cred->mechanisms != GSS_C_NO_OID_SET)
453 major = duplicateOidSet(minor, cred->mechanisms, mechanisms);
455 major = gssEapIndicateMechs(minor, mechanisms);
456 if (GSS_ERROR(major))
460 if (cred->expiryTime == 0) {
461 lifetime = GSS_C_INDEFINITE;
464 lifetime = now - cred->expiryTime;
469 if (pLifetime != NULL) {
470 *pLifetime = lifetime;
474 major = GSS_S_CREDENTIALS_EXPIRED;
475 *minor = GSSEAP_CRED_EXPIRED;
479 major = GSS_S_COMPLETE;
487 gssEapSetCredPassword(OM_uint32 *minor,
489 const gss_buffer_t password)
491 OM_uint32 major, tmpMinor;
492 gss_buffer_desc newPassword = GSS_C_EMPTY_BUFFER;
494 if (cred->flags & CRED_FLAG_RESOLVED) {
495 major = GSS_S_FAILURE;
496 *minor = GSSEAP_CRED_RESOLVED;
500 if (password != GSS_C_NO_BUFFER) {
501 major = duplicateBuffer(minor, password, &newPassword);
502 if (GSS_ERROR(major))
505 cred->flags |= CRED_FLAG_PASSWORD;
507 cred->flags &= ~(CRED_FLAG_PASSWORD);
510 gss_release_buffer(&tmpMinor, &cred->password);
511 cred->password = newPassword;
513 major = GSS_S_COMPLETE;
521 gssEapDuplicateCred(OM_uint32 *minor,
522 const gss_cred_id_t src,
525 OM_uint32 major, tmpMinor;
526 gss_cred_id_t dst = GSS_C_NO_CREDENTIAL;
528 *pDst = GSS_C_NO_CREDENTIAL;
530 major = gssEapAllocCred(minor, &dst);
531 if (GSS_ERROR(major))
534 dst->flags = src->flags;
536 if (src->name != GSS_C_NO_NAME) {
537 major = gssEapDuplicateName(minor, src->name, &dst->name);
538 if (GSS_ERROR(major))
542 if (src->target != GSS_C_NO_NAME) {
543 major = gssEapDuplicateName(minor, src->target, &dst->target);
544 if (GSS_ERROR(major))
548 if (src->password.value != NULL) {
549 major = duplicateBuffer(minor, &src->password, &dst->password);
550 if (GSS_ERROR(major))
554 major = duplicateOidSet(minor, src->mechanisms, &dst->mechanisms);
555 if (GSS_ERROR(major))
558 dst->expiryTime = src->expiryTime;
560 if (src->radiusConfigFile.value != NULL)
561 duplicateBufferOrCleanup(&src->radiusConfigFile, &dst->radiusConfigFile);
562 if (src->radiusConfigStanza.value != NULL)
563 duplicateBufferOrCleanup(&src->radiusConfigStanza, &dst->radiusConfigStanza);
564 if (src->caCertificate.value != NULL)
565 duplicateBufferOrCleanup(&src->caCertificate, &dst->caCertificate);
566 if (src->subjectNameConstraint.value != NULL)
567 duplicateBufferOrCleanup(&src->subjectNameConstraint, &dst->subjectNameConstraint);
568 if (src->subjectAltNameConstraint.value != NULL)
569 duplicateBufferOrCleanup(&src->subjectAltNameConstraint, &dst->subjectAltNameConstraint);
571 #ifdef GSSEAP_ENABLE_REAUTH
572 /* XXX krbCredCache, reauthCred */
576 dst = GSS_C_NO_CREDENTIAL;
578 major = GSS_S_COMPLETE;
582 gssEapReleaseCred(&tmpMinor, &dst);
588 staticIdentityFileResolveInitiatorCred(OM_uint32 *minor, gss_cred_id_t cred)
590 OM_uint32 major, tmpMinor;
591 gss_buffer_desc defaultIdentity = GSS_C_EMPTY_BUFFER;
592 gss_name_t defaultIdentityName = GSS_C_NO_NAME;
593 gss_buffer_desc defaultPassword = GSS_C_EMPTY_BUFFER;
594 int isDefaultIdentity = FALSE;
596 major = readStaticIdentityFile(minor, &defaultIdentity, &defaultPassword);
597 if (GSS_ERROR(major))
600 major = gssEapImportName(minor, &defaultIdentity, GSS_C_NT_USER_NAME,
601 gssEapPrimaryMechForCred(cred), &defaultIdentityName);
602 if (GSS_ERROR(major))
605 if (defaultIdentityName == GSS_C_NO_NAME) {
606 if (cred->name == GSS_C_NO_NAME) {
607 major = GSS_S_CRED_UNAVAIL;
608 *minor = GSSEAP_NO_DEFAULT_IDENTITY;
612 if (cred->name == GSS_C_NO_NAME) {
613 cred->name = defaultIdentityName;
614 defaultIdentityName = GSS_C_NO_NAME;
615 isDefaultIdentity = TRUE;
617 major = gssEapCompareName(minor, cred->name,
618 defaultIdentityName, &isDefaultIdentity);
619 if (GSS_ERROR(major))
624 if (isDefaultIdentity &&
625 (cred->flags & CRED_FLAG_PASSWORD) == 0) {
626 major = gssEapSetCredPassword(minor, cred, &defaultPassword);
627 if (GSS_ERROR(major))
632 gssEapReleaseName(&tmpMinor, &defaultIdentityName);
633 zeroAndReleasePassword(&defaultPassword);
634 gss_release_buffer(&tmpMinor, &defaultIdentity);
640 gssEapResolveInitiatorCred(OM_uint32 *minor,
641 const gss_cred_id_t cred,
642 const gss_name_t targetName
643 #ifndef HAVE_MOONSHOT_GET_IDENTITY
647 gss_cred_id_t *pResolvedCred)
649 OM_uint32 major, tmpMinor;
650 gss_cred_id_t resolvedCred = GSS_C_NO_CREDENTIAL;
652 if (cred == GSS_C_NO_CREDENTIAL) {
653 major = gssEapAcquireCred(minor,
661 if (GSS_ERROR(major))
664 if ((cred->flags & CRED_FLAG_INITIATE) == 0) {
665 major = GSS_S_NO_CRED;
666 *minor = GSSEAP_CRED_USAGE_MISMATCH;
670 major = gssEapDuplicateCred(minor, cred, &resolvedCred);
671 if (GSS_ERROR(major))
675 if ((resolvedCred->flags & CRED_FLAG_RESOLVED) == 0) {
676 #ifdef HAVE_MOONSHOT_GET_IDENTITY
677 major = libMoonshotResolveInitiatorCred(minor, resolvedCred, targetName);
678 if (major == GSS_S_CRED_UNAVAIL)
680 major = staticIdentityFileResolveInitiatorCred(minor, resolvedCred);
681 if (GSS_ERROR(major))
684 if ((resolvedCred->flags & CRED_FLAG_PASSWORD) == 0) {
685 major = GSS_S_CRED_UNAVAIL;
686 *minor = GSSEAP_NO_DEFAULT_CRED;
690 resolvedCred->flags |= CRED_FLAG_RESOLVED;
693 *pResolvedCred = resolvedCred;
694 resolvedCred = GSS_C_NO_CREDENTIAL;
696 major = GSS_S_COMPLETE;
700 gssEapReleaseCred(&tmpMinor, &resolvedCred);