a50dc8645618879f52f6719a3486d2cc95c1c4ac
[mech_eap.orig] / util_cred.c
1 /*
2  * Copyright (c) 2011, JANET(UK)
3  * All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  *
9  * 1. Redistributions of source code must retain the above copyright
10  *    notice, this list of conditions and the following disclaimer.
11  *
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  *
16  * 3. Neither the name of JANET(UK) nor the names of its contributors
17  *    may be used to endorse or promote products derived from this software
18  *    without specific prior written permission.
19  *
20  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
21  * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23  * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
24  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30  * SUCH DAMAGE.
31  */
32
33 /*
34  * Utility routines for credential handles.
35  */
36
37 #include "gssapiP_eap.h"
38
39 OM_uint32
40 gssEapAllocCred(OM_uint32 *minor, gss_cred_id_t *pCred)
41 {
42     OM_uint32 tmpMinor;
43     gss_cred_id_t cred;
44
45     *pCred = GSS_C_NO_CREDENTIAL;
46
47     cred = (gss_cred_id_t)GSSEAP_CALLOC(1, sizeof(*cred));
48     if (cred == NULL) {
49         *minor = ENOMEM;
50         return GSS_S_FAILURE;
51     }
52
53     if (GSSEAP_MUTEX_INIT(&cred->mutex) != 0) {
54         *minor = errno;
55         gssEapReleaseCred(&tmpMinor, &cred);
56         return GSS_S_FAILURE;
57     }
58
59     *pCred = cred;
60
61     *minor = 0;
62     return GSS_S_COMPLETE;
63 }
64
65 OM_uint32
66 gssEapReleaseCred(OM_uint32 *minor, gss_cred_id_t *pCred)
67 {
68     OM_uint32 tmpMinor;
69     gss_cred_id_t cred = *pCred;
70     krb5_context krbContext = NULL;
71
72     if (cred == GSS_C_NO_CREDENTIAL) {
73         return GSS_S_COMPLETE;
74     }
75
76     GSSEAP_KRB_INIT(&krbContext);
77
78     gssEapReleaseName(&tmpMinor, &cred->name);
79
80     if (cred->password.value != NULL) {
81         memset(cred->password.value, 0, cred->password.length);
82         GSSEAP_FREE(cred->password.value);
83     }
84
85     if (cred->radiusConfigFile != NULL)
86         GSSEAP_FREE(cred->radiusConfigFile);
87     if (cred->radiusConfigStanza != NULL)
88         GSSEAP_FREE(cred->radiusConfigStanza);
89
90 #ifdef GSSEAP_ENABLE_REAUTH
91     if (cred->krbCredCache != NULL) {
92         if (cred->flags & CRED_FLAG_DEFAULT_CCACHE)
93             krb5_cc_close(krbContext, cred->krbCredCache);
94         else
95             krb5_cc_destroy(krbContext, cred->krbCredCache);
96     }
97     if (cred->krbCred != GSS_C_NO_CREDENTIAL)
98         gssReleaseCred(&tmpMinor, &cred->krbCred);
99 #endif
100
101     GSSEAP_MUTEX_DESTROY(&cred->mutex);
102     memset(cred, 0, sizeof(*cred));
103     GSSEAP_FREE(cred);
104     *pCred = NULL;
105
106     *minor = 0;
107     return GSS_S_COMPLETE;
108 }
109
110 OM_uint32
111 gssEapAcquireCred(OM_uint32 *minor,
112                   const gss_name_t desiredName,
113                   const gss_buffer_t password,
114                   OM_uint32 timeReq GSSEAP_UNUSED,
115                   const gss_OID_set desiredMechs,
116                   int credUsage,
117                   gss_cred_id_t *pCred,
118                   gss_OID_set *pActualMechs,
119                   OM_uint32 *timeRec)
120 {
121     OM_uint32 major, tmpMinor;
122     gss_cred_id_t cred;
123 #ifdef GSSEAP_DEBUG
124     gss_buffer_desc envPassword;
125 #endif
126
127     /* XXX TODO validate with changed set_cred_option API */
128     *pCred = GSS_C_NO_CREDENTIAL;
129
130     major = gssEapAllocCred(minor, &cred);
131     if (GSS_ERROR(major))
132         goto cleanup;
133
134     switch (credUsage) {
135     case GSS_C_BOTH:
136         cred->flags |= CRED_FLAG_INITIATE | CRED_FLAG_ACCEPT;
137         break;
138     case GSS_C_INITIATE:
139         cred->flags |= CRED_FLAG_INITIATE;
140         break;
141     case GSS_C_ACCEPT:
142         cred->flags |= CRED_FLAG_ACCEPT;
143         break;
144     default:
145         major = GSS_S_FAILURE;
146         *minor = GSSEAP_BAD_USAGE;
147         goto cleanup;
148         break;
149     }
150
151     if (desiredName != GSS_C_NO_NAME) {
152         GSSEAP_MUTEX_LOCK(&desiredName->mutex);
153
154         major = gssEapDuplicateName(minor, desiredName, &cred->name);
155         if (GSS_ERROR(major)) {
156             GSSEAP_MUTEX_UNLOCK(&desiredName->mutex);
157             goto cleanup;
158         }
159
160         GSSEAP_MUTEX_UNLOCK(&desiredName->mutex);
161     } else {
162         gss_buffer_desc nameBuf = GSS_C_EMPTY_BUFFER;
163         gss_OID nameType = GSS_C_NO_OID;
164
165         if (cred->flags & CRED_FLAG_ACCEPT) {
166             char serviceName[5 + MAXHOSTNAMELEN] = "host@";
167
168             /* default host-based service is host@localhost */
169             if (gethostname(&serviceName[5], MAXHOSTNAMELEN) != 0) {
170                 major = GSS_S_FAILURE;
171                 *minor = GSSEAP_NO_HOSTNAME;
172                 goto cleanup;
173             }
174
175             nameBuf.value = serviceName;
176             nameBuf.length = strlen((char *)nameBuf.value);
177
178             nameType = GSS_C_NT_HOSTBASED_SERVICE;
179         } else if (cred->flags & CRED_FLAG_INITIATE) {
180             /* XXX FIXME temporary implementation */
181             nameBuf.value = getlogin();
182             nameBuf.length = strlen((char *)nameBuf.value);
183
184             nameType = GSS_C_NT_USER_NAME;
185         }
186
187         if (nameBuf.length != 0) {
188             gss_OID mech = GSS_C_NO_OID;
189
190             if (cred->mechanisms != GSS_C_NO_OID_SET &&
191                 cred->mechanisms->count == 1)
192                 mech = &cred->mechanisms->elements[0];
193
194             major = gssEapImportName(minor, &nameBuf, nameType, mech, &cred->name);
195             if (GSS_ERROR(major))
196                 goto cleanup;
197         }
198
199         cred->flags |= CRED_FLAG_DEFAULT_IDENTITY;
200     }
201
202 #ifdef GSSEAP_DEBUG
203     if (password == GSS_C_NO_BUFFER &&
204         (cred->flags & CRED_FLAG_DEFAULT_IDENTITY) &&
205         (envPassword.value = getenv("GSSEAP_CREDS")) != NULL) {
206         envPassword.length = strlen((char *)envPassword.value);
207         major = duplicateBuffer(minor, &envPassword, &cred->password);
208         if (GSS_ERROR(major))
209             goto cleanup;
210     } else
211 #endif /* GSSEAP_DEBUG */
212     if (password != GSS_C_NO_BUFFER) {
213         major = duplicateBuffer(minor, password, &cred->password);
214         if (GSS_ERROR(major))
215             goto cleanup;
216
217         cred->flags |= CRED_FLAG_PASSWORD;
218     } else if (cred->flags & CRED_FLAG_INITIATE) {
219         /*
220          * OK, here we need to ask the supplicant if we have creds or it
221          * will acquire them, so GS2 can know whether to prompt for a
222          * password or not.
223          */
224 #if 0
225         && !gssEapCanReauthP(cred, GSS_C_NO_NAME, timeReq)
226 #endif
227         major = GSS_S_CRED_UNAVAIL;
228         *minor = GSSEAP_MISSING_PASSWORD;
229         goto cleanup;
230     }
231
232     major = gssEapValidateMechs(minor, desiredMechs);
233     if (GSS_ERROR(major))
234         goto cleanup;
235
236     major = duplicateOidSet(minor, desiredMechs, &cred->mechanisms);
237     if (GSS_ERROR(major))
238         goto cleanup;
239
240     if (pActualMechs != NULL) {
241         major = duplicateOidSet(minor, cred->mechanisms, pActualMechs);
242         if (GSS_ERROR(major))
243             goto cleanup;
244     }
245
246     if (timeRec != NULL)
247         *timeRec = GSS_C_INDEFINITE;
248
249     *pCred = cred;
250
251     major = GSS_S_COMPLETE;
252     *minor = 0;
253
254 cleanup:
255     if (GSS_ERROR(major))
256         gssEapReleaseCred(&tmpMinor, &cred);
257
258     return major;
259 }
260
261 /*
262  * Return TRUE if cred available for mechanism. Caller need no acquire
263  * lock because mechanisms list is immutable.
264  */
265 int
266 gssEapCredAvailable(gss_cred_id_t cred, gss_OID mech)
267 {
268     OM_uint32 minor;
269     int present = 0;
270
271     assert(mech != GSS_C_NO_OID);
272
273     if (cred == GSS_C_NO_CREDENTIAL || cred->mechanisms == GSS_C_NO_OID_SET)
274         return TRUE;
275
276     gss_test_oid_set_member(&minor, mech, cred->mechanisms, &present);
277
278     return present;
279 }