1 /* $NetBSD: copy_ccache.c,v 1.1.1.2 2014/04/24 12:45:29 pettai Exp $ */
4 * Copyright (c) 2000 - 2001, 2003 Kungliga Tekniska Högskolan
5 * (Royal Institute of Technology, Stockholm, Sweden).
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
19 * 3. Neither the name of the Institute nor the names of its contributors
20 * may be used to endorse or promote products derived from this software
21 * without specific prior written permission.
23 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
24 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
36 #include "gsskrb5_locl.h"
40 gss_krb5_copy_ccache(OM_uint32
*minor_status
,
47 HEIMDAL_MUTEX_lock(&cred
->cred_id_mutex
);
49 if (cred
->ccache
== NULL
) {
50 HEIMDAL_MUTEX_unlock(&cred
->cred_id_mutex
);
51 *minor_status
= EINVAL
;
55 kret
= krb5_cc_copy_cache(context
, cred
->ccache
, out
);
56 HEIMDAL_MUTEX_unlock(&cred
->cred_id_mutex
);
62 return GSS_S_COMPLETE
;
68 _gsskrb5_krb5_import_cred(OM_uint32
*minor_status
,
70 krb5_principal keytab_principal
,
81 GSSAPI_KRB5_INIT (&context
);
83 handle
= calloc(1, sizeof(*handle
));
85 _gsskrb5_clear_status ();
86 *minor_status
= ENOMEM
;
87 return (GSS_S_FAILURE
);
89 HEIMDAL_MUTEX_init(&handle
->cred_id_mutex
);
96 handle
->usage
|= GSS_C_INITIATE
;
98 kret
= krb5_cc_get_principal(context
, id
,
102 *minor_status
= kret
;
103 return GSS_S_FAILURE
;
106 if (keytab_principal
) {
109 match
= krb5_principal_compare(context
,
112 if (match
== FALSE
) {
113 krb5_free_principal(context
, handle
->principal
);
115 _gsskrb5_clear_status ();
116 *minor_status
= EINVAL
;
117 return GSS_S_FAILURE
;
121 ret
= __gsskrb5_ccache_lifetime(minor_status
,
126 if (ret
!= GSS_S_COMPLETE
) {
127 krb5_free_principal(context
, handle
->principal
);
133 kret
= krb5_cc_get_full_name(context
, id
, &str
);
137 kret
= krb5_cc_resolve(context
, str
, &handle
->ccache
);
147 handle
->usage
|= GSS_C_ACCEPT
;
149 if (keytab_principal
&& handle
->principal
== NULL
) {
150 kret
= krb5_copy_principal(context
,
157 kret
= krb5_kt_get_full_name(context
, keytab
, &str
);
161 kret
= krb5_kt_resolve(context
, str
, &handle
->keytab
);
169 ret
= gss_create_empty_oid_set(minor_status
, &handle
->mechanisms
);
170 if (ret
== GSS_S_COMPLETE
)
171 ret
= gss_add_oid_set_member(minor_status
, GSS_KRB5_MECHANISM
,
172 &handle
->mechanisms
);
173 if (ret
!= GSS_S_COMPLETE
) {
174 kret
= *minor_status
;
180 *cred
= (gss_cred_id_t
)handle
;
181 return GSS_S_COMPLETE
;
184 gss_release_oid_set(minor_status
, &handle
->mechanisms
);
186 krb5_cc_close(context
, handle
->ccache
);
188 krb5_kt_close(context
, handle
->keytab
);
189 if (handle
->principal
)
190 krb5_free_principal(context
, handle
->principal
);
191 HEIMDAL_MUTEX_destroy(&handle
->cred_id_mutex
);
193 *minor_status
= kret
;
194 return GSS_S_FAILURE
;