Rearrange moonshot to have libeap as a subproject
[moonshot.git] / moonshot / mech_eap / set_cred_option.c
1 /*
2  * Copyright (c) 2011, JANET(UK)
3  * All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  *
9  * 1. Redistributions of source code must retain the above copyright
10  *    notice, this list of conditions and the following disclaimer.
11  *
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  *
16  * 3. Neither the name of JANET(UK) nor the names of its contributors
17  *    may be used to endorse or promote products derived from this software
18  *    without specific prior written permission.
19  *
20  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
21  * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23  * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
24  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30  * SUCH DAMAGE.
31  */
32
33 /*
34  * Set an extended property on a credential handle.
35  */
36
37 #include "gssapiP_eap.h"
38
39 static OM_uint32
40 setCredRadiusConfigFile(OM_uint32 *minor,
41                         gss_cred_id_t cred,
42                         const gss_OID oid GSSEAP_UNUSED,
43                         const gss_buffer_t buffer)
44 {
45     OM_uint32 major;
46     gss_buffer_desc configFileBuffer = GSS_C_EMPTY_BUFFER;
47
48     if (buffer != GSS_C_NO_BUFFER && buffer->length != 0) {
49         major = duplicateBuffer(minor, buffer, &configFileBuffer);
50         if (GSS_ERROR(major))
51             return major;
52     }
53
54     if (cred->radiusConfigFile != NULL)
55         GSSEAP_FREE(cred->radiusConfigFile);
56
57     cred->radiusConfigFile = (char *)configFileBuffer.value;
58
59     *minor = 0;
60     return GSS_S_COMPLETE;
61 }
62
63 static OM_uint32
64 setCredRadiusConfigStanza(OM_uint32 *minor,
65                           gss_cred_id_t cred,
66                           const gss_OID oid GSSEAP_UNUSED,
67                           const gss_buffer_t buffer)
68 {
69     OM_uint32 major;
70     gss_buffer_desc configStanzaBuffer = GSS_C_EMPTY_BUFFER;
71
72     if (buffer != GSS_C_NO_BUFFER && buffer->length != 0) {
73         major = duplicateBuffer(minor, buffer, &configStanzaBuffer);
74         if (GSS_ERROR(major))
75             return major;
76     }
77
78     if (cred->radiusConfigStanza != NULL)
79         GSSEAP_FREE(cred->radiusConfigStanza);
80
81     cred->radiusConfigStanza = (char *)configStanzaBuffer.value;
82
83     *minor = 0;
84     return GSS_S_COMPLETE;
85 }
86
87 static OM_uint32
88 setCredFlag(OM_uint32 *minor,
89             gss_cred_id_t cred,
90             const gss_OID oid GSSEAP_UNUSED,
91             const gss_buffer_t buffer)
92 {
93     OM_uint32 flags;
94     unsigned char *p;
95
96     if (buffer == GSS_C_NO_BUFFER) {
97         *minor = EINVAL;
98         return GSS_S_CALL_INACCESSIBLE_READ | GSS_S_FAILURE;
99     }
100
101     if (buffer->length < 4) {
102         *minor = GSSEAP_WRONG_SIZE;
103         return GSS_S_FAILURE;
104     }
105
106     p = (unsigned char *)buffer->value;
107
108     flags = load_uint32_be(buffer->value) & CRED_FLAG_PUBLIC_MASK;
109
110     if (buffer->length > 4 && p[4])
111         cred->flags &= ~(flags);
112     else
113         cred->flags |= flags;
114
115     *minor = 0;
116     return GSS_S_COMPLETE;
117 }
118
119 static struct {
120     gss_OID_desc oid;
121     OM_uint32 (*setOption)(OM_uint32 *, gss_cred_id_t cred,
122                            const gss_OID, const gss_buffer_t);
123 } setCredOps[] = {
124     /* 1.3.6.1.4.1.5322.22.3.3.1 */
125     {
126         { 11, "\x2B\x06\x01\x04\x01\xA9\x4A\x16\x03\x03\x01" },
127         setCredRadiusConfigFile,
128     },
129     /* 1.3.6.1.4.1.5322.22.3.3.2 */
130     {
131         { 11, "\x2B\x06\x01\x04\x01\xA9\x4A\x16\x03\x03\x02" },
132         setCredRadiusConfigStanza,
133     },
134     /* 1.3.6.1.4.1.5322.22.3.3.3 */
135     {
136         { 11, "\x2B\x06\x01\x04\x01\xA9\x4A\x16\x03\x03\x03" },
137         setCredFlag,
138     },
139 };
140
141 gss_OID GSS_EAP_CRED_SET_RADIUS_CONFIG_FILE     = &setCredOps[0].oid;
142 gss_OID GSS_EAP_CRED_SET_RADIUS_CONFIG_STANZA   = &setCredOps[1].oid;
143 gss_OID GSS_EAP_CRED_SET_CRED_FLAG              = &setCredOps[2].oid;
144
145 OM_uint32
146 gssspi_set_cred_option(OM_uint32 *minor,
147                        gss_cred_id_t *pCred,
148                        const gss_OID desired_object,
149                        const gss_buffer_t value)
150 {
151     OM_uint32 major;
152     gss_cred_id_t cred = *pCred;
153     int i;
154
155     if (cred == GSS_C_NO_CREDENTIAL) {
156         *minor = EINVAL;
157         return GSS_S_UNAVAILABLE;
158     }
159
160     GSSEAP_MUTEX_LOCK(&cred->mutex);
161
162     major = GSS_S_UNAVAILABLE;
163     *minor = GSSEAP_BAD_CRED_OPTION;
164
165     for (i = 0; i < sizeof(setCredOps) / sizeof(setCredOps[0]); i++) {
166         if (oidEqual(&setCredOps[i].oid, desired_object)) {
167             major = (*setCredOps[i].setOption)(minor, cred,
168                                                desired_object, value);
169             break;
170         }
171     }
172
173     GSSEAP_MUTEX_UNLOCK(&cred->mutex);
174
175     return major;
176 }
177
178 #if 0
179 OM_uint32
180 gsseap_set_cred_flag(OM_uint32 *minor,
181                      gss_cred_id_t cred,
182                      OM_uint32 flag,
183                      int clear)
184 {
185     unsigned char buf[5];
186     gss_buffer_desc value;
187
188     value.length = sizeof(buf);
189     value.value = buf;
190
191     store_uint32_be(flag, buf);
192     buf[4] = (clear != 0);
193
194     return gssspi_set_cred_option(minor, &cred,
195                                   GSS_EAP_CRED_SET_CRED_FLAG, &value);
196 }
197 #endif