x
[heimdal.git] / lib / gssapi / krb5 / acquire_cred.c
blobf55891db537be37d6e497b512749e0bcf73412c0
1 /*
2 * Copyright (c) 1997 - 2001 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
4 * All rights reserved.
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
17 * 3. Neither the name of the Institute nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
34 #include "gssapi_locl.h"
36 RCSID("$Id$");
38 OM_uint32 gss_acquire_cred
39 (OM_uint32 * minor_status,
40 const gss_name_t desired_name,
41 OM_uint32 time_req,
42 const gss_OID_set desired_mechs,
43 gss_cred_usage_t cred_usage,
44 gss_cred_id_t * output_cred_handle,
45 gss_OID_set * actual_mechs,
46 OM_uint32 * time_rec
49 gss_cred_id_t handle;
50 OM_uint32 ret;
51 krb5_error_code kret = 0;
52 krb5_ccache ccache;
54 handle = (gss_cred_id_t)malloc(sizeof(*handle));
55 if (handle == GSS_C_NO_CREDENTIAL)
56 return GSS_S_FAILURE;
58 memset(handle, 0, sizeof (*handle));
60 ret = gss_duplicate_name(minor_status, desired_name, &handle->principal);
61 if (ret) {
62 free(handle);
63 return ret;
66 if (krb5_cc_default(gssapi_krb5_context, &ccache) == 0) {
67 krb5_principal def_princ;
69 if (krb5_cc_get_principal(gssapi_krb5_context, ccache,
70 &def_princ) != 0) {
71 krb5_cc_close(gssapi_krb5_context, ccache);
72 goto try_keytab;
74 if (krb5_principal_compare(gssapi_krb5_context, handle->principal,
75 def_princ) == FALSE) {
76 krb5_free_principal(gssapi_krb5_context, def_princ);
77 krb5_cc_close(gssapi_krb5_context, ccache);
78 goto try_keytab;
80 handle->ccache = ccache;
81 handle->keytab = NULL;
82 krb5_free_principal(gssapi_krb5_context, def_princ);
83 } else {
84 krb5_creds cred;
85 krb5_get_init_creds_opt opt;
87 try_keytab:
88 kret = krb5_kt_default(gssapi_krb5_context, &handle->keytab);
89 if (kret != 0)
90 goto krb5_bad;
92 krb5_get_init_creds_opt_init(&opt);
93 memset(&cred, 0, sizeof(cred));
95 kret = krb5_get_init_creds_keytab(gssapi_krb5_context, &cred,
96 handle->principal, handle->keytab,
97 0, NULL, &opt);
98 if (kret != 0)
99 goto krb5_bad;
101 kret = krb5_cc_gen_new(gssapi_krb5_context, &krb5_mcc_ops,
102 &handle->ccache);
103 if (kret != 0) {
104 krb5_free_creds_contents(gssapi_krb5_context, &cred);
105 goto krb5_bad;
108 kret = krb5_cc_initialize(gssapi_krb5_context, handle->ccache,
109 cred.client);
110 if (kret != 0) {
111 krb5_free_creds_contents(gssapi_krb5_context, &cred);
112 goto krb5_bad;
115 kret = krb5_cc_store_cred(gssapi_krb5_context, handle->ccache, &cred);
116 if (kret != 0) {
117 krb5_free_creds_contents(gssapi_krb5_context, &cred);
118 goto krb5_bad;
121 krb5_free_creds_contents(gssapi_krb5_context, &cred);
124 /* XXX */
125 handle->lifetime = time_req;
126 handle->usage = cred_usage;
128 ret = gss_create_empty_oid_set(minor_status, &handle->mechanisms);
129 if (ret)
130 goto gssapi_bad;
132 ret = gss_add_oid_set_member(minor_status, GSS_KRB5_MECHANISM,
133 &handle->mechanisms);
134 if (ret)
135 goto gssapi_bad;
137 ret = gss_inquire_cred(minor_status, handle, NULL, time_rec, NULL,
138 actual_mechs);
139 if (ret)
140 goto gssapi_bad;
142 *output_cred_handle = handle;
143 return (GSS_S_COMPLETE);
145 krb5_bad:
146 ret = GSS_S_FAILURE;
147 *minor_status = kret;
148 gssapi_krb5_set_error_string ();
150 gssapi_bad:
151 krb5_free_principal(gssapi_krb5_context, handle->principal);
152 if (handle->ccache != NULL)
153 krb5_cc_close(gssapi_krb5_context, handle->ccache);
154 if (handle->keytab != NULL)
155 krb5_kt_close(gssapi_krb5_context, handle->keytab);
156 if (handle->mechanisms != NULL)
157 gss_release_oid_set(NULL, &handle->mechanisms);
159 free(handle);
161 return (ret);