s4:torture: Adapt KDC canon test to Heimdal upstream changes
[Samba.git] / source4 / heimdal / lib / gssapi / ntlm / creds.c
blob84a710c69e6019262d7bf4f7f07b247543785d8a
1 /*
2 * Copyright (c) 2006 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
4 * All rights reserved.
6 * Portions Copyright (c) 2009 Apple Inc. All rights reserved.
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
19 * 3. Neither the name of the Institute nor the names of its contributors
20 * may be used to endorse or promote products derived from this software
21 * without specific prior written permission.
23 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
24 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 * SUCH DAMAGE.
36 #include "ntlm.h"
38 OM_uint32 GSSAPI_CALLCONV
39 _gss_ntlm_inquire_cred
40 (OM_uint32 * minor_status,
41 gss_const_cred_id_t cred_handle,
42 gss_name_t * name,
43 OM_uint32 * lifetime,
44 gss_cred_usage_t * cred_usage,
45 gss_OID_set * mechanisms
48 OM_uint32 ret, junk;
50 *minor_status = 0;
52 if (cred_handle == NULL)
53 return GSS_S_NO_CRED;
55 if (name) {
56 ntlm_name n = calloc(1, sizeof(*n));
57 ntlm_cred c = (ntlm_cred)cred_handle;
58 if (n) {
59 n->user = strdup(c->username);
60 n->domain = strdup(c->domain);
62 if (n == NULL || n->user == NULL || n->domain == NULL) {
63 if (n) {
64 free(n->user);
65 free(n->domain);
66 free(n);
68 *minor_status = ENOMEM;
69 return GSS_S_FAILURE;
71 *name = (gss_name_t)n;
73 if (lifetime)
74 *lifetime = GSS_C_INDEFINITE;
75 if (cred_usage)
76 *cred_usage = 0;
77 if (mechanisms)
78 *mechanisms = GSS_C_NO_OID_SET;
80 if (cred_handle == GSS_C_NO_CREDENTIAL)
81 return GSS_S_NO_CRED;
83 if (mechanisms) {
84 ret = gss_create_empty_oid_set(minor_status, mechanisms);
85 if (ret)
86 goto out;
87 ret = gss_add_oid_set_member(minor_status,
88 GSS_NTLM_MECHANISM,
89 mechanisms);
90 if (ret)
91 goto out;
94 return GSS_S_COMPLETE;
95 out:
96 gss_release_oid_set(&junk, mechanisms);
97 return ret;
100 #ifdef HAVE_KCM
101 static OM_uint32
102 _gss_ntlm_destroy_kcm_cred(gss_cred_id_t *cred_handle)
104 krb5_storage *request, *response;
105 krb5_data response_data;
106 krb5_context context;
107 krb5_error_code ret;
108 ntlm_cred cred;
110 cred = (ntlm_cred)*cred_handle;
112 ret = krb5_init_context(&context);
113 if (ret)
114 return ret;
116 ret = krb5_kcm_storage_request(context, KCM_OP_DEL_NTLM_CRED, &request);
117 if (ret)
118 goto out;
120 ret = krb5_store_stringz(request, cred->username);
121 if (ret)
122 goto out;
124 ret = krb5_store_stringz(request, cred->domain);
125 if (ret)
126 goto out;
128 ret = krb5_kcm_call(context, request, &response, &response_data);
129 if (ret)
130 goto out;
132 krb5_storage_free(request);
133 krb5_storage_free(response);
134 krb5_data_free(&response_data);
136 out:
137 krb5_free_context(context);
139 return ret;
141 #endif /* HAVE_KCM */
143 OM_uint32 GSSAPI_CALLCONV
144 _gss_ntlm_destroy_cred(OM_uint32 *minor_status,
145 gss_cred_id_t *cred_handle)
147 #ifdef HAVE_KCM
148 krb5_error_code ret;
149 #endif
151 if (cred_handle == NULL || *cred_handle == GSS_C_NO_CREDENTIAL)
152 return GSS_S_COMPLETE;
154 #ifdef HAVE_KCM
155 ret = _gss_ntlm_destroy_kcm_cred(cred_handle);
156 if (ret) {
157 *minor_status = ret;
158 return GSS_S_FAILURE;
160 #endif
162 return _gss_ntlm_release_cred(minor_status, cred_handle);