r19604: This is a massive commit, and I appologise in advance for it's size.
[Samba.git] / source / heimdal / lib / gssapi / krb5 / copy_ccache.c
blob99aa2ccb434cd470a6c422f6972cd8ad80c5b24a
1 /*
2 * Copyright (c) 2000 - 2001, 2003 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
4 * All rights reserved.
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
17 * 3. Neither the name of the Institute nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
34 #include "krb5/gsskrb5_locl.h"
36 RCSID("$Id: copy_ccache.c,v 1.15 2006/10/07 22:14:22 lha Exp $");
38 #if 0
39 OM_uint32
40 gss_krb5_copy_ccache(OM_uint32 *minor_status,
41 gss_cred_id_t cred,
42 krb5_ccache out)
44 krb5_error_code kret;
46 HEIMDAL_MUTEX_lock(&cred->cred_id_mutex);
48 if (cred->ccache == NULL) {
49 HEIMDAL_MUTEX_unlock(&cred->cred_id_mutex);
50 *minor_status = EINVAL;
51 return GSS_S_FAILURE;
54 kret = krb5_cc_copy_cache(_gsskrb5_context, cred->ccache, out);
55 HEIMDAL_MUTEX_unlock(&cred->cred_id_mutex);
56 if (kret) {
57 *minor_status = kret;
58 _gsskrb5_set_error_string ();
59 return GSS_S_FAILURE;
61 *minor_status = 0;
62 return GSS_S_COMPLETE;
64 #endif
67 OM_uint32
68 _gsskrb5_import_cred(OM_uint32 *minor_status,
69 krb5_ccache id,
70 krb5_principal keytab_principal,
71 krb5_keytab keytab,
72 gss_cred_id_t *cred)
74 krb5_error_code kret;
75 gsskrb5_cred handle;
76 OM_uint32 ret;
78 *cred = NULL;
80 GSSAPI_KRB5_INIT ();
82 handle = calloc(1, sizeof(*handle));
83 if (handle == NULL) {
84 _gsskrb5_clear_status ();
85 *minor_status = ENOMEM;
86 return (GSS_S_FAILURE);
88 HEIMDAL_MUTEX_init(&handle->cred_id_mutex);
90 handle->usage = 0;
92 if (id) {
93 char *str;
95 handle->usage |= GSS_C_INITIATE;
97 kret = krb5_cc_get_principal(_gsskrb5_context, id,
98 &handle->principal);
99 if (kret) {
100 free(handle);
101 _gsskrb5_set_error_string ();
102 *minor_status = kret;
103 return GSS_S_FAILURE;
106 if (keytab_principal) {
107 krb5_boolean match;
109 match = krb5_principal_compare(_gsskrb5_context,
110 handle->principal,
111 keytab_principal);
112 if (match == FALSE) {
113 krb5_free_principal(_gsskrb5_context, handle->principal);
114 free(handle);
115 _gsskrb5_clear_status ();
116 *minor_status = EINVAL;
117 return GSS_S_FAILURE;
121 ret = __gsskrb5_ccache_lifetime(minor_status,
123 handle->principal,
124 &handle->lifetime);
125 if (ret != GSS_S_COMPLETE) {
126 krb5_free_principal(_gsskrb5_context, handle->principal);
127 free(handle);
128 return ret;
132 kret = krb5_cc_get_full_name(_gsskrb5_context, id, &str);
133 if (kret)
134 goto out;
136 kret = krb5_cc_resolve(_gsskrb5_context, str, &handle->ccache);
137 free(str);
138 if (kret)
139 goto out;
143 if (keytab) {
144 char *str;
146 handle->usage |= GSS_C_ACCEPT;
148 if (keytab_principal && handle->principal == NULL) {
149 kret = krb5_copy_principal(_gsskrb5_context,
150 keytab_principal,
151 &handle->principal);
152 if (kret)
153 goto out;
156 kret = krb5_kt_get_full_name(_gsskrb5_context, keytab, &str);
157 if (kret)
158 goto out;
160 kret = krb5_kt_resolve(_gsskrb5_context, str, &handle->keytab);
161 free(str);
162 if (kret)
163 goto out;
167 if (id || keytab) {
168 ret = _gsskrb5_create_empty_oid_set(minor_status, &handle->mechanisms);
169 if (ret == GSS_S_COMPLETE)
170 ret = _gsskrb5_add_oid_set_member(minor_status, GSS_KRB5_MECHANISM,
171 &handle->mechanisms);
172 if (ret != GSS_S_COMPLETE) {
173 kret = *minor_status;
174 goto out;
178 *minor_status = 0;
179 *cred = (gss_cred_id_t)handle;
180 return GSS_S_COMPLETE;
182 out:
183 _gsskrb5_set_error_string ();
184 if (handle->principal)
185 krb5_free_principal(_gsskrb5_context, handle->principal);
186 HEIMDAL_MUTEX_destroy(&handle->cred_id_mutex);
187 free(handle);
188 *minor_status = kret;
189 return GSS_S_FAILURE;