Round #2 of scan-build warnings cleanup
[heimdal.git] / lib / gssapi / ntlm / creds.c
blobb918dd5411b2c562486139989fe7e110c021e607
1 /*
2 * Copyright (c) 2006 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
4 * All rights reserved.
6 * Portions Copyright (c) 2009 Apple Inc. All rights reserved.
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
19 * 3. Neither the name of the Institute nor the names of its contributors
20 * may be used to endorse or promote products derived from this software
21 * without specific prior written permission.
23 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
24 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 * SUCH DAMAGE.
36 #include "ntlm.h"
38 OM_uint32 GSSAPI_CALLCONV
39 _gss_ntlm_inquire_cred
40 (OM_uint32 * minor_status,
41 gss_const_cred_id_t cred_handle,
42 gss_name_t * name,
43 OM_uint32 * lifetime,
44 gss_cred_usage_t * cred_usage,
45 gss_OID_set * mechanisms
48 OM_uint32 ret, junk;
50 *minor_status = 0;
52 if (cred_handle == NULL)
53 return GSS_S_NO_CRED;
55 if (name) {
56 ntlm_name n = calloc(1, sizeof(*n));
57 ntlm_cred c = (ntlm_cred)cred_handle;
58 if (n) {
59 n->user = strdup(c->username);
60 n->domain = strdup(c->domain);
62 if (n == NULL || n->user == NULL || n->domain == NULL) {
63 if (n)
64 free(n->user);
65 free(n);
66 *minor_status = ENOMEM;
67 return GSS_S_FAILURE;
69 *name = (gss_name_t)n;
71 if (lifetime)
72 *lifetime = GSS_C_INDEFINITE;
73 if (cred_usage)
74 *cred_usage = 0;
75 if (mechanisms)
76 *mechanisms = GSS_C_NO_OID_SET;
78 if (cred_handle == GSS_C_NO_CREDENTIAL)
79 return GSS_S_NO_CRED;
81 if (mechanisms) {
82 ret = gss_create_empty_oid_set(minor_status, mechanisms);
83 if (ret)
84 goto out;
85 ret = gss_add_oid_set_member(minor_status,
86 GSS_NTLM_MECHANISM,
87 mechanisms);
88 if (ret)
89 goto out;
92 return GSS_S_COMPLETE;
93 out:
94 gss_release_oid_set(&junk, mechanisms);
95 return ret;
98 #ifdef HAVE_KCM
99 static OM_uint32
100 _gss_ntlm_destroy_kcm_cred(gss_cred_id_t *cred_handle)
102 krb5_storage *request, *response;
103 krb5_data response_data;
104 krb5_context context;
105 krb5_error_code ret;
106 ntlm_cred cred;
108 cred = (ntlm_cred)*cred_handle;
110 ret = krb5_init_context(&context);
111 if (ret)
112 return ret;
114 ret = krb5_kcm_storage_request(context, KCM_OP_DEL_NTLM_CRED, &request);
115 if (ret)
116 goto out;
118 ret = krb5_store_stringz(request, cred->username);
119 if (ret)
120 goto out;
122 ret = krb5_store_stringz(request, cred->domain);
123 if (ret)
124 goto out;
126 ret = krb5_kcm_call(context, request, &response, &response_data);
127 if (ret)
128 goto out;
130 krb5_storage_free(request);
131 krb5_storage_free(response);
132 krb5_data_free(&response_data);
134 out:
135 krb5_free_context(context);
137 return ret;
139 #endif /* HAVE_KCM */
141 OM_uint32 GSSAPI_CALLCONV
142 _gss_ntlm_destroy_cred(OM_uint32 *minor_status,
143 gss_cred_id_t *cred_handle)
145 #ifdef HAVE_KCM
146 krb5_error_code ret;
147 #endif
149 if (cred_handle == NULL || *cred_handle == GSS_C_NO_CREDENTIAL)
150 return GSS_S_COMPLETE;
152 #ifdef HAVE_KCM
153 ret = _gss_ntlm_destroy_kcm_cred(cred_handle);
154 if (ret) {
155 *minor_status = ret;
156 return GSS_S_FAILURE;
158 #endif
160 return _gss_ntlm_release_cred(minor_status, cred_handle);