2 * Copyright (c) 2010, JANET(UK)
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the name of JANET(UK) nor the names of its contributors
17 * may be used to endorse or promote products derived from this software
18 * without specific prior written permission.
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
21 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 #include "gssapiP_eap.h"
36 gssEapAllocCred(OM_uint32 *minor, gss_cred_id_t *pCred)
41 *pCred = GSS_C_NO_CREDENTIAL;
43 cred = (gss_cred_id_t)GSSEAP_CALLOC(1, sizeof(*cred));
49 if (GSSEAP_MUTEX_INIT(&cred->mutex) != 0) {
51 gssEapReleaseCred(&tmpMinor, &cred);
58 return GSS_S_COMPLETE;
62 gssEapReleaseCred(OM_uint32 *minor, gss_cred_id_t *pCred)
65 gss_cred_id_t cred = *pCred;
66 krb5_context krbContext = NULL;
68 if (cred == GSS_C_NO_CREDENTIAL) {
69 return GSS_S_COMPLETE;
72 GSSEAP_KRB_INIT(&krbContext);
74 gssEapReleaseName(&tmpMinor, &cred->name);
76 if (cred->password.value != NULL) {
77 memset(cred->password.value, 0, cred->password.length);
78 GSSEAP_FREE(cred->password.value);
81 if (cred->radiusConfigFile != NULL)
82 GSSEAP_FREE(cred->radiusConfigFile);
84 #ifdef GSSEAP_ENABLE_REAUTH
85 if (cred->krbCredCache != NULL) {
86 if (cred->flags & CRED_FLAG_DEFAULT_CCACHE)
87 krb5_cc_close(krbContext, cred->krbCredCache);
89 krb5_cc_destroy(krbContext, cred->krbCredCache);
91 if (cred->krbCred != GSS_C_NO_CREDENTIAL)
92 gssReleaseCred(&tmpMinor, &cred->krbCred);
95 GSSEAP_MUTEX_DESTROY(&cred->mutex);
96 memset(cred, 0, sizeof(*cred));
101 return GSS_S_COMPLETE;
105 gssEapAcquireCred(OM_uint32 *minor,
106 const gss_name_t desiredName,
107 const gss_buffer_t password,
109 const gss_OID_set desiredMechs,
111 gss_cred_id_t *pCred,
112 gss_OID_set *pActualMechs,
115 OM_uint32 major, tmpMinor;
118 /* XXX TODO validate with changed set_cred_option API */
119 *pCred = GSS_C_NO_CREDENTIAL;
121 major = gssEapAllocCred(minor, &cred);
122 if (GSS_ERROR(major))
125 if (desiredName != GSS_C_NO_NAME) {
126 GSSEAP_MUTEX_LOCK(&desiredName->mutex);
128 major = gssEapDuplicateName(minor, desiredName, &cred->name);
129 if (GSS_ERROR(major)) {
130 GSSEAP_MUTEX_UNLOCK(&desiredName->mutex);
134 GSSEAP_MUTEX_UNLOCK(&desiredName->mutex);
136 if (cred->flags & CRED_FLAG_INITIATE) {
139 buf.value = getlogin(); /* XXX */
140 buf.length = strlen((char *)buf.value);
142 major = gssEapImportName(minor, &buf,
143 GSS_C_NT_USER_NAME, &cred->name);
144 if (GSS_ERROR(major))
148 cred->flags |= CRED_FLAG_DEFAULT_IDENTITY;
151 if (password != GSS_C_NO_BUFFER) {
152 major = duplicateBuffer(minor, password, &cred->password);
153 if (GSS_ERROR(major))
156 cred->flags |= CRED_FLAG_PASSWORD;
157 } else if (credUsage == GSS_C_INITIATE) {
159 * OK, here we need to ask the supplicant if we have creds or it
160 * will acquire them, so GS2 can know whether to prompt for a
164 && !gssEapCanReauthP(cred, GSS_C_NO_NAME, timeReq)
166 major = GSS_S_CRED_UNAVAIL;
172 cred->flags |= CRED_FLAG_INITIATE | CRED_FLAG_ACCEPT;
175 cred->flags |= CRED_FLAG_INITIATE;
178 cred->flags |= CRED_FLAG_ACCEPT;
181 major = GSS_S_FAILURE;
186 major = gssEapValidateMechs(minor, desiredMechs);
187 if (GSS_ERROR(major))
190 major = duplicateOidSet(minor, desiredMechs, &cred->mechanisms);
191 if (GSS_ERROR(major))
194 if (pActualMechs != NULL) {
195 major = duplicateOidSet(minor, cred->mechanisms, pActualMechs);
196 if (GSS_ERROR(major))
201 *timeRec = GSS_C_INDEFINITE;
204 major = GSS_S_COMPLETE;
207 if (GSS_ERROR(major))
208 gssEapReleaseCred(&tmpMinor, &cred);
214 * Return TRUE if cred available for mechanism. Caller need no acquire
215 * lock because mechanisms list is immutable.
218 gssEapCredAvailable(gss_cred_id_t cred, gss_OID mech)
223 assert(mech != GSS_C_NO_OID);
225 if (cred == GSS_C_NO_CREDENTIAL || cred->mechanisms == GSS_C_NO_OID_SET)
228 gss_test_oid_set_member(&minor, mech, cred->mechanisms, &present);