/* * Copyright (c) 1999, 2010, Oracle and/or its affiliates. All rights reserved. */ /* * Copyright 2000 by the Massachusetts Institute of Technology. * All Rights Reserved. * * Export of this software from the United States of America may * require a specific license from the United States Government. * It is the responsibility of any person or organization contemplating * export to obtain such a license before exporting. * * WITHIN THAT CONSTRAINT, permission to use, copy, modify, and * distribute this software and its documentation for any purpose and * without fee is hereby granted, provided that the above copyright * notice appear in all copies and that both that copyright notice and * this permission notice appear in supporting documentation, and that * the name of M.I.T. not be used in advertising or publicity pertaining * to distribution of the software without specific, written prior * permission. Furthermore if you modify this software you must label * your software as modified software and not distribute it in such a * fashion that it might be confused with the original M.I.T. software. * M.I.T. makes no representations about the suitability of * this software for any purpose. It is provided "as is" without express * or implied warranty. * */ /* * Copyright 1993 by OpenVision Technologies, Inc. * * Permission to use, copy, modify, distribute, and sell this software * and its documentation for any purpose is hereby granted without fee, * provided that the above copyright notice appears in all copies and * that both that copyright notice and this permission notice appear in * supporting documentation, and that the name of OpenVision not be used * in advertising or publicity pertaining to distribution of the software * without specific, written prior permission. OpenVision makes no * representations about the suitability of this software for any * purpose. It is provided "as is" without express or implied warranty. * * OPENVISION DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, * INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO * EVENT SHALL OPENVISION BE LIABLE FOR ANY SPECIAL, INDIRECT OR * CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF * USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR * OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR * PERFORMANCE OF THIS SOFTWARE. */ /* * Copyright (C) 1998 by the FundsXpress, INC. * * All rights reserved. * * Export of this software from the United States of America may require * a specific license from the United States Government. It is the * responsibility of any person or organization contemplating export to * obtain such a license before exporting. * * WITHIN THAT CONSTRAINT, permission to use, copy, modify, and * distribute this software and its documentation for any purpose and * without fee is hereby granted, provided that the above copyright * notice appear in all copies and that both that copyright notice and * this permission notice appear in supporting documentation, and that * the name of FundsXpress. not be used in advertising or publicity pertaining * to distribution of the software without specific, written prior * permission. FundsXpress makes no representations about the suitability of * this software for any purpose. It is provided "as is" without express * or implied warranty. * * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE. */ #include "k5-int.h" #include "gss_libinit.h" #include "gssapiP_krb5.h" #include "mglueP.h" #ifdef HAVE_STRING_H #include #else #include #endif #include #include /* Solaris Kerberos */ #include "file/ktfile.h" /* Solaris Kerberos */ #if defined(USE_LOGIN_LIBRARY) #include #elif defined(USE_LEASH) #ifdef _WIN64 #define LEASH_DLL "leashw64.dll" #else #define LEASH_DLL "leashw32.dll" #endif static void (*pLeash_AcquireInitialTicketsIfNeeded)(krb5_context,krb5_principal,char*,int) = NULL; static HANDLE hLeashDLL = INVALID_HANDLE_VALUE; #endif k5_mutex_t gssint_krb5_keytab_lock = K5_MUTEX_PARTIAL_INITIALIZER; static char *krb5_gss_keytab = NULL; /* Heimdal calls this gsskrb5_register_acceptor_identity. */ OM_uint32 KRB5_CALLCONV krb5_gss_register_acceptor_identity(const char *keytab) { size_t len; char *new, *old; int err; err = gssint_initialize_library(); if (err != 0) return GSS_S_FAILURE; if (keytab == NULL) return GSS_S_FAILURE; len = strlen(keytab); new = malloc(len + 1); if (new == NULL) return GSS_S_FAILURE; strcpy(new, keytab); err = k5_mutex_lock(&gssint_krb5_keytab_lock); if (err) { free(new); return GSS_S_FAILURE; } old = krb5_gss_keytab; krb5_gss_keytab = new; k5_mutex_unlock(&gssint_krb5_keytab_lock); if (old != NULL) free(old); return GSS_S_COMPLETE; } /* get credentials corresponding to a key in the krb5 keytab. If the default name is requested, return the name in output_princ. If output_princ is non-NULL, the caller will use or free it, regardless of the return value. If successful, set the keytab-specific fields in cred */ static OM_uint32 acquire_accept_cred(context, minor_status, desired_name, output_princ, cred) krb5_context context; OM_uint32 *minor_status; gss_name_t desired_name; krb5_principal *output_princ; krb5_gss_cred_id_rec *cred; { krb5_error_code code; krb5_principal princ; krb5_keytab kt; krb5_keytab_entry entry; *output_princ = NULL; cred->keytab = NULL; /* open the default keytab */ code = gssint_initialize_library(); if (code != 0) { *minor_status = code; return GSS_S_FAILURE; } code = k5_mutex_lock(&gssint_krb5_keytab_lock); if (code) { *minor_status = code; return GSS_S_FAILURE; } if (krb5_gss_keytab != NULL) { code = krb5_kt_resolve(context, krb5_gss_keytab, &kt); k5_mutex_unlock(&gssint_krb5_keytab_lock); } else { k5_mutex_unlock(&gssint_krb5_keytab_lock); code = krb5_kt_default(context, &kt); } if (code) { *minor_status = code; /* Solaris Kerb NOTE: GSS_S_CRED_UNAVAIL is not RFC 2743 compliant */ return(GSS_S_NO_CRED); } if (desired_name != GSS_C_NO_NAME) { princ = (krb5_principal) desired_name; if ((code = krb5_kt_get_entry(context, kt, princ, 0, 0, &entry))) { if (code == KRB5_KT_NOTFOUND) { char *s_name; if (krb5_unparse_name(context, princ, &s_name) == 0) { krb5_set_error_message(context, KG_KEYTAB_NOMATCH, dgettext(TEXT_DOMAIN, "No principal in keytab ('%s') matches desired name %s"), KTFILENAME(kt), s_name); krb5_free_unparsed_name(context, s_name); } *minor_status = KG_KEYTAB_NOMATCH; } else *minor_status = code; /* Solaris Kerb NOTE: GSS_S_CRED_UNAVAIL is not RFC 2743 compliant */ (void) krb5_kt_close(context, kt); return(GSS_S_NO_CRED); } krb5_kt_free_entry(context, &entry); /* Open the replay cache for this principal. */ if ((code = krb5_get_server_rcache(context, krb5_princ_component(context, princ, 0), &cred->rcache))) { *minor_status = code; return(GSS_S_FAILURE); } } /* hooray. we made it */ cred->keytab = kt; return(GSS_S_COMPLETE); } /* get credentials corresponding to the default credential cache. If the default name is requested, return the name in output_princ. If output_princ is non-NULL, the caller will use or free it, regardless of the return value. If successful, set the ccache-specific fields in cred. */ static OM_uint32 acquire_init_cred(context, minor_status, desired_name, output_princ, cred) krb5_context context; OM_uint32 *minor_status; gss_name_t desired_name; krb5_principal *output_princ; krb5_gss_cred_id_rec *cred; { krb5_error_code code; krb5_ccache ccache; krb5_principal princ, tmp_princ; krb5_flags flags; krb5_cc_cursor cur; krb5_creds creds; int got_endtime; int caller_provided_ccache_name = 0; cred->ccache = NULL; /* load the GSS ccache name into the kg_context */ if (GSS_ERROR(kg_sync_ccache_name(context, minor_status))) return(GSS_S_FAILURE); /* check to see if the caller provided a ccache name if so * we will just use that and not search the cache collection */ if (GSS_ERROR(kg_caller_provided_ccache_name (minor_status, &caller_provided_ccache_name))) { return(GSS_S_FAILURE); } #if defined(USE_LOGIN_LIBRARY) || defined(USE_LEASH) if (desired_name && !caller_provided_ccache_name) { #if defined(USE_LOGIN_LIBRARY) KLStatus err = klNoErr; char *ccache_name = NULL; KLPrincipal kl_desired_princ = NULL; err = __KLCreatePrincipalFromKerberos5Principal ((krb5_principal) desired_name, &kl_desired_princ); if (!err) { err = KLAcquireInitialTickets (kl_desired_princ, NULL, NULL, &ccache_name); } if (!err) { err = krb5_cc_resolve (context, ccache_name, &ccache); } if (err) { *minor_status = err; return(GSS_S_CRED_UNAVAIL); } if (kl_desired_princ != NULL) { KLDisposePrincipal (kl_desired_princ); } if (ccache_name != NULL) { KLDisposeString (ccache_name); } #elif defined(USE_LEASH) if ( hLeashDLL == INVALID_HANDLE_VALUE ) { hLeashDLL = LoadLibrary(LEASH_DLL); if ( hLeashDLL != INVALID_HANDLE_VALUE ) { (FARPROC) pLeash_AcquireInitialTicketsIfNeeded = GetProcAddress(hLeashDLL, "not_an_API_Leash_AcquireInitialTicketsIfNeeded"); } } if ( pLeash_AcquireInitialTicketsIfNeeded ) { char ccname[256]=""; pLeash_AcquireInitialTicketsIfNeeded(context, (krb5_principal) desired_name, ccname, sizeof(ccname)); if (!ccname[0]) { *minor_status = KRB5_CC_NOTFOUND; return(GSS_S_NO_CRED); } if ((code = krb5_cc_resolve (context, ccname, &ccache))) { *minor_status = code; return(GSS_S_NO_CRED); } } else { /* leash dll not available, open the default credential cache */ if ((code = krb5int_cc_default(context, &ccache))) { *minor_status = code; return(GSS_S_NO_CRED); } } #endif /* USE_LEASH */ } else #endif /* USE_LOGIN_LIBRARY || USE_LEASH */ { /* open the default credential cache */ if ((code = krb5int_cc_default(context, &ccache))) { *minor_status = code; return(GSS_S_NO_CRED); } } /* turn off OPENCLOSE mode while extensive frobbing is going on */ /* * SUNW14resync * Added calls to krb5_cc_set_flags(... KRB5_TC_OPENCLOSE) * on the error returns cuz the 1.4 krb5_cc_close does not always close * the file like it used to and caused STC test gss.27 to fail. */ flags = 0; /* turns off OPENCLOSE mode */ if ((code = krb5_cc_set_flags(context, ccache, flags))) { (void)krb5_cc_close(context, ccache); *minor_status = code; return(GSS_S_NO_CRED); } /* get out the principal name and see if it matches */ if ((code = krb5_cc_get_principal(context, ccache, &princ))) { /* Solaris Kerberos */ (void)krb5_cc_set_flags(context, ccache, KRB5_TC_OPENCLOSE); (void)krb5_cc_close(context, ccache); *minor_status = code; return(GSS_S_FAILURE); } if (desired_name != (gss_name_t) NULL) { if (! krb5_principal_compare(context, princ, (krb5_principal) desired_name)) { (void)krb5_free_principal(context, princ); /* Solaris Kerberos */ (void)krb5_cc_set_flags(context, ccache, KRB5_TC_OPENCLOSE); (void)krb5_cc_close(context, ccache); *minor_status = KG_CCACHE_NOMATCH; return(GSS_S_NO_CRED); } (void)krb5_free_principal(context, princ); princ = (krb5_principal) desired_name; } else { *output_princ = princ; } /* iterate over the ccache, find the tgt */ if ((code = krb5_cc_start_seq_get(context, ccache, &cur))) { /* Solaris Kerberos */ (void)krb5_cc_set_flags(context, ccache, KRB5_TC_OPENCLOSE); (void)krb5_cc_close(context, ccache); *minor_status = code; return(GSS_S_FAILURE); } /* this is hairy. If there's a tgt for the principal's local realm in here, that's what we want for the expire time. But if there's not, then we want to use the first key. */ got_endtime = 0; code = krb5_build_principal_ext(context, &tmp_princ, krb5_princ_realm(context, princ)->length, krb5_princ_realm(context, princ)->data, 6, "krbtgt", krb5_princ_realm(context, princ)->length, krb5_princ_realm(context, princ)->data, 0); if (code) { /* Solaris Kerberos */ (void)krb5_cc_set_flags(context, ccache, KRB5_TC_OPENCLOSE); (void)krb5_cc_close(context, ccache); *minor_status = code; return(GSS_S_FAILURE); } while (!(code = krb5_cc_next_cred(context, ccache, &cur, &creds))) { if (krb5_principal_compare(context, tmp_princ, creds.server)) { cred->tgt_expire = creds.times.endtime; got_endtime = 1; *minor_status = 0; code = 0; krb5_free_cred_contents(context, &creds); break; } if (got_endtime == 0) { cred->tgt_expire = creds.times.endtime; got_endtime = 1; } krb5_free_cred_contents(context, &creds); } krb5_free_principal(context, tmp_princ); if (code && code != KRB5_CC_END) { /* this means some error occurred reading the ccache */ (void)krb5_cc_end_seq_get(context, ccache, &cur); /* Solaris Kerberos */ (void)krb5_cc_set_flags(context, ccache, KRB5_TC_OPENCLOSE); (void)krb5_cc_close(context, ccache); *minor_status = code; return(GSS_S_FAILURE); } else if (! got_endtime) { /* this means the ccache was entirely empty */ (void)krb5_cc_end_seq_get(context, ccache, &cur); /* Solaris Kerberos */ (void)krb5_cc_set_flags(context, ccache, KRB5_TC_OPENCLOSE); (void)krb5_cc_close(context, ccache); *minor_status = KG_EMPTY_CCACHE; return(GSS_S_FAILURE); } else { /* this means that we found an endtime to use. */ if ((code = krb5_cc_end_seq_get(context, ccache, &cur))) { /* Solaris Kerberos */ (void)krb5_cc_set_flags(context, ccache, KRB5_TC_OPENCLOSE); (void)krb5_cc_close(context, ccache); *minor_status = code; return(GSS_S_FAILURE); } flags = KRB5_TC_OPENCLOSE; /* turns on OPENCLOSE mode */ if ((code = krb5_cc_set_flags(context, ccache, flags))) { (void)krb5_cc_close(context, ccache); *minor_status = code; return(GSS_S_FAILURE); } } /* the credentials match and are valid */ cred->ccache = ccache; /* minor_status is set while we are iterating over the ccache */ return(GSS_S_COMPLETE); } /*ARGSUSED*/ OM_uint32 krb5_gss_acquire_cred(minor_status, desired_name, time_req, desired_mechs, cred_usage, output_cred_handle, actual_mechs, time_rec) OM_uint32 *minor_status; gss_name_t desired_name; OM_uint32 time_req; gss_OID_set desired_mechs; gss_cred_usage_t cred_usage; gss_cred_id_t *output_cred_handle; gss_OID_set *actual_mechs; OM_uint32 *time_rec; { krb5_context context; size_t i; krb5_gss_cred_id_t cred; gss_OID_set ret_mechs; int req_old, req_new; OM_uint32 ret; krb5_error_code code; code = gssint_initialize_library(); if (code) { *minor_status = code; return GSS_S_FAILURE; } code = krb5_gss_init_context(&context); if (code) { *minor_status = code; return GSS_S_FAILURE; } /* make sure all outputs are valid */ *output_cred_handle = NULL; if (actual_mechs) *actual_mechs = NULL; if (time_rec) *time_rec = 0; /* validate the name */ /*SUPPRESS 29*/ if ((desired_name != (gss_name_t) NULL) && (! kg_validate_name(desired_name))) { *minor_status = (OM_uint32) G_VALIDATE_FAILED; krb5_free_context(context); return(GSS_S_CALL_BAD_STRUCTURE|GSS_S_BAD_NAME); } /* verify that the requested mechanism set is the default, or contains krb5 */ if (desired_mechs == GSS_C_NULL_OID_SET) { req_old = 1; req_new = 1; } else { req_old = 0; req_new = 0; for (i=0; icount; i++) { if (g_OID_equal(gss_mech_krb5_old, &(desired_mechs->elements[i]))) req_old++; if (g_OID_equal(gss_mech_krb5, &(desired_mechs->elements[i]))) req_new++; } if (!req_old && !req_new) { *minor_status = 0; krb5_free_context(context); return(GSS_S_BAD_MECH); } } /* create the gss cred structure */ if ((cred = (krb5_gss_cred_id_t) xmalloc(sizeof(krb5_gss_cred_id_rec))) == NULL) { *minor_status = ENOMEM; krb5_free_context(context); return(GSS_S_FAILURE); } memset(cred, 0, sizeof(krb5_gss_cred_id_rec)); cred->usage = cred_usage; cred->princ = NULL; cred->prerfc_mech = req_old; cred->rfc_mech = req_new; cred->keytab = NULL; cred->ccache = NULL; code = k5_mutex_init(&cred->lock); if (code) { *minor_status = code; krb5_free_context(context); return GSS_S_FAILURE; } /* Note that we don't need to lock this GSSAPI credential record here, because no other thread can gain access to it until we return it. */ if ((cred_usage != GSS_C_INITIATE) && (cred_usage != GSS_C_ACCEPT) && (cred_usage != GSS_C_BOTH)) { k5_mutex_destroy(&cred->lock); xfree(cred); *minor_status = (OM_uint32) G_BAD_USAGE; krb5_free_context(context); return(GSS_S_FAILURE); } /* if requested, acquire credentials for accepting */ /* this will fill in cred->princ if the desired_name is not specified */ if ((cred_usage == GSS_C_ACCEPT) || (cred_usage == GSS_C_BOTH)) if ((ret = acquire_accept_cred(context, minor_status, desired_name, &(cred->princ), cred)) != GSS_S_COMPLETE) { if (cred->princ) krb5_free_principal(context, cred->princ); k5_mutex_destroy(&cred->lock); xfree(cred); /* minor_status set by acquire_accept_cred() */ save_error_info(*minor_status, context); krb5_free_context(context); return(ret); } /* if requested, acquire credentials for initiation */ /* this will fill in cred->princ if it wasn't set above, and the desired_name is not specified */ if ((cred_usage == GSS_C_INITIATE) || (cred_usage == GSS_C_BOTH)) if ((ret = acquire_init_cred(context, minor_status, cred->princ?(gss_name_t)cred->princ:desired_name, &(cred->princ), cred)) != GSS_S_COMPLETE) { if (cred->keytab) krb5_kt_close(context, cred->keytab); if (cred->princ) krb5_free_principal(context, cred->princ); k5_mutex_destroy(&cred->lock); xfree(cred); /* minor_status set by acquire_init_cred() */ save_error_info(*minor_status, context); krb5_free_context(context); return(ret); } /* Solaris Kerberos: * if the princ wasn't filled in already, fill it in now unless * a cred with no associated princ is requested (will invoke default * behaviour when gss_accept_init_context() is called). * Note MIT 1.4 has GSS_C_NO_CREDENTIAL instead of GSS_C_NO_NAME */ if (!cred->princ && (desired_name != GSS_C_NO_NAME)) if ((code = krb5_copy_principal(context, (krb5_principal) desired_name, &(cred->princ)))) { if (cred->ccache) (void)krb5_cc_close(context, cred->ccache); if (cred->keytab) (void)krb5_kt_close(context, cred->keytab); k5_mutex_destroy(&cred->lock); xfree(cred); *minor_status = code; save_error_info(*minor_status, context); krb5_free_context(context); return(GSS_S_FAILURE); } /*** at this point, the cred structure has been completely created */ /* compute time_rec */ if (cred_usage == GSS_C_ACCEPT) { if (time_rec) *time_rec = GSS_C_INDEFINITE; } else { krb5_timestamp now; if ((code = krb5_timeofday(context, &now))) { if (cred->ccache) (void)krb5_cc_close(context, cred->ccache); if (cred->keytab) (void)krb5_kt_close(context, cred->keytab); if (cred->princ) krb5_free_principal(context, cred->princ); k5_mutex_destroy(&cred->lock); xfree(cred); *minor_status = code; save_error_info(*minor_status, context); krb5_free_context(context); return(GSS_S_FAILURE); } if (time_rec) *time_rec = (cred->tgt_expire > now) ? (cred->tgt_expire - now) : 0; } /* create mechs */ if (actual_mechs) { if (GSS_ERROR(ret = generic_gss_create_empty_oid_set(minor_status, &ret_mechs)) || (cred->prerfc_mech && GSS_ERROR(ret = generic_gss_add_oid_set_member(minor_status, (const gss_OID) gss_mech_krb5_old, &ret_mechs))) || (cred->rfc_mech && GSS_ERROR(ret = generic_gss_add_oid_set_member(minor_status, (const gss_OID) gss_mech_krb5, &ret_mechs)))) { if (cred->ccache) (void)krb5_cc_close(context, cred->ccache); if (cred->keytab) (void)krb5_kt_close(context, cred->keytab); if (cred->princ) krb5_free_principal(context, cred->princ); k5_mutex_destroy(&cred->lock); xfree(cred); /* *minor_status set above */ krb5_free_context(context); return(ret); } } /* intern the credential handle */ if (! kg_save_cred_id((gss_cred_id_t) cred)) { free(ret_mechs->elements); free(ret_mechs); if (cred->ccache) (void)krb5_cc_close(context, cred->ccache); if (cred->keytab) (void)krb5_kt_close(context, cred->keytab); if (cred->princ) krb5_free_principal(context, cred->princ); k5_mutex_destroy(&cred->lock); xfree(cred); *minor_status = (OM_uint32) G_VALIDATE_FAILED; save_error_string(*minor_status, "error saving credentials"); krb5_free_context(context); return(GSS_S_FAILURE); } /* return success */ *minor_status = 0; *output_cred_handle = (gss_cred_id_t) cred; if (actual_mechs) *actual_mechs = ret_mechs; krb5_free_context(context); return(GSS_S_COMPLETE); }