1 /* $NetBSD: glue.c,v 1.1.1.2 2014/04/24 12:45:27 pettai Exp $ */
2
3 /*
4 * Copyright (c) 2005, PADL Software Pty Ltd.
5 * All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 *
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 *
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
17 *
18 * 3. Neither the name of PADL Software nor the names of its contributors
19 * may be used to endorse or promote products derived from this software
20 * without specific prior written permission.
21 *
22 * THIS SOFTWARE IS PROVIDED BY PADL SOFTWARE AND CONTRIBUTORS ``AS IS'' AND
23 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25 * ARE DISCLAIMED. IN NO EVENT SHALL PADL SOFTWARE OR CONTRIBUTORS BE LIABLE
26 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 * SUCH DAMAGE.
33 */
34
35 #include "kcm_locl.h"
36
37 __RCSID("NetBSD");
38
39 /*
40 * Server-side loopback glue for credentials cache operations; this
41 * must be initialized with kcm_internal_ccache(), it is not for real
42 * use. This entire file assumes the cache is locked, it does not do
43 * any concurrency checking for multithread applications.
44 */
45
46 #define KCMCACHE(X) ((kcm_ccache)(X)->data.data)
47 #define CACHENAME(X) (KCMCACHE(X)->name)
48
49 static const char *
kcmss_get_name(krb5_context context,krb5_ccache id)50 kcmss_get_name(krb5_context context,
51 krb5_ccache id)
52 {
53 return CACHENAME(id);
54 }
55
56 static krb5_error_code
kcmss_resolve(krb5_context context,krb5_ccache * id,const char * res)57 kcmss_resolve(krb5_context context, krb5_ccache *id, const char *res)
58 {
59 return KRB5_FCC_INTERNAL;
60 }
61
62 static krb5_error_code
kcmss_gen_new(krb5_context context,krb5_ccache * id)63 kcmss_gen_new(krb5_context context, krb5_ccache *id)
64 {
65 return KRB5_FCC_INTERNAL;
66 }
67
68 static krb5_error_code
kcmss_initialize(krb5_context context,krb5_ccache id,krb5_principal primary_principal)69 kcmss_initialize(krb5_context context,
70 krb5_ccache id,
71 krb5_principal primary_principal)
72 {
73 krb5_error_code ret;
74 kcm_ccache c = KCMCACHE(id);
75
76 KCM_ASSERT_VALID(c);
77
78 ret = kcm_zero_ccache_data_internal(context, c);
79 if (ret)
80 return ret;
81
82 ret = krb5_copy_principal(context, primary_principal,
83 &c->client);
84
85 return ret;
86 }
87
88 static krb5_error_code
kcmss_close(krb5_context context,krb5_ccache id)89 kcmss_close(krb5_context context,
90 krb5_ccache id)
91 {
92 kcm_ccache c = KCMCACHE(id);
93
94 KCM_ASSERT_VALID(c);
95
96 id->data.data = NULL;
97 id->data.length = 0;
98
99 return 0;
100 }
101
102 static krb5_error_code
kcmss_destroy(krb5_context context,krb5_ccache id)103 kcmss_destroy(krb5_context context,
104 krb5_ccache id)
105 {
106 krb5_error_code ret;
107 kcm_ccache c = KCMCACHE(id);
108
109 KCM_ASSERT_VALID(c);
110
111 ret = kcm_ccache_destroy(context, CACHENAME(id));
112
113 return ret;
114 }
115
116 static krb5_error_code
kcmss_store_cred(krb5_context context,krb5_ccache id,krb5_creds * creds)117 kcmss_store_cred(krb5_context context,
118 krb5_ccache id,
119 krb5_creds *creds)
120 {
121 krb5_error_code ret;
122 kcm_ccache c = KCMCACHE(id);
123 krb5_creds *tmp;
124
125 KCM_ASSERT_VALID(c);
126
127 ret = kcm_ccache_store_cred_internal(context, c, creds, 1, &tmp);
128
129 return ret;
130 }
131
132 static krb5_error_code
kcmss_retrieve(krb5_context context,krb5_ccache id,krb5_flags which,const krb5_creds * mcred,krb5_creds * creds)133 kcmss_retrieve(krb5_context context,
134 krb5_ccache id,
135 krb5_flags which,
136 const krb5_creds *mcred,
137 krb5_creds *creds)
138 {
139 krb5_error_code ret;
140 kcm_ccache c = KCMCACHE(id);
141 krb5_creds *credp;
142
143 KCM_ASSERT_VALID(c);
144
145 ret = kcm_ccache_retrieve_cred_internal(context, c, which,
146 mcred, &credp);
147 if (ret)
148 return ret;
149
150 ret = krb5_copy_creds_contents(context, credp, creds);
151 if (ret)
152 return ret;
153
154 return 0;
155 }
156
157 static krb5_error_code
kcmss_get_principal(krb5_context context,krb5_ccache id,krb5_principal * principal)158 kcmss_get_principal(krb5_context context,
159 krb5_ccache id,
160 krb5_principal *principal)
161 {
162 krb5_error_code ret;
163 kcm_ccache c = KCMCACHE(id);
164
165 KCM_ASSERT_VALID(c);
166
167 ret = krb5_copy_principal(context, c->client,
168 principal);
169
170 return ret;
171 }
172
173 static krb5_error_code
kcmss_get_first(krb5_context context,krb5_ccache id,krb5_cc_cursor * cursor)174 kcmss_get_first (krb5_context context,
175 krb5_ccache id,
176 krb5_cc_cursor *cursor)
177 {
178 kcm_ccache c = KCMCACHE(id);
179
180 KCM_ASSERT_VALID(c);
181
182 *cursor = c->creds;
183
184 return (*cursor == NULL) ? KRB5_CC_END : 0;
185 }
186
187 static krb5_error_code
kcmss_get_next(krb5_context context,krb5_ccache id,krb5_cc_cursor * cursor,krb5_creds * creds)188 kcmss_get_next (krb5_context context,
189 krb5_ccache id,
190 krb5_cc_cursor *cursor,
191 krb5_creds *creds)
192 {
193 krb5_error_code ret;
194 kcm_ccache c = KCMCACHE(id);
195
196 KCM_ASSERT_VALID(c);
197
198 ret = krb5_copy_creds_contents(context,
199 &((struct kcm_creds *)cursor)->cred,
200 creds);
201 if (ret)
202 return ret;
203
204 *cursor = ((struct kcm_creds *)cursor)->next;
205 if (*cursor == 0)
206 ret = KRB5_CC_END;
207
208 return ret;
209 }
210
211 static krb5_error_code
kcmss_end_get(krb5_context context,krb5_ccache id,krb5_cc_cursor * cursor)212 kcmss_end_get (krb5_context context,
213 krb5_ccache id,
214 krb5_cc_cursor *cursor)
215 {
216 *cursor = NULL;
217 return 0;
218 }
219
220 static krb5_error_code
kcmss_remove_cred(krb5_context context,krb5_ccache id,krb5_flags which,krb5_creds * cred)221 kcmss_remove_cred(krb5_context context,
222 krb5_ccache id,
223 krb5_flags which,
224 krb5_creds *cred)
225 {
226 krb5_error_code ret;
227 kcm_ccache c = KCMCACHE(id);
228
229 KCM_ASSERT_VALID(c);
230
231 ret = kcm_ccache_remove_cred_internal(context, c, which, cred);
232
233 return ret;
234 }
235
236 static krb5_error_code
kcmss_set_flags(krb5_context context,krb5_ccache id,krb5_flags flags)237 kcmss_set_flags(krb5_context context,
238 krb5_ccache id,
239 krb5_flags flags)
240 {
241 return 0;
242 }
243
244 static krb5_error_code
kcmss_get_version(krb5_context context,krb5_ccache id)245 kcmss_get_version(krb5_context context,
246 krb5_ccache id)
247 {
248 return 0;
249 }
250
251 static const krb5_cc_ops krb5_kcmss_ops = {
252 KRB5_CC_OPS_VERSION,
253 "KCM",
254 kcmss_get_name,
255 kcmss_resolve,
256 kcmss_gen_new,
257 kcmss_initialize,
258 kcmss_destroy,
259 kcmss_close,
260 kcmss_store_cred,
261 kcmss_retrieve,
262 kcmss_get_principal,
263 kcmss_get_first,
264 kcmss_get_next,
265 kcmss_end_get,
266 kcmss_remove_cred,
267 kcmss_set_flags,
268 kcmss_get_version
269 };
270
271 krb5_error_code
kcm_internal_ccache(krb5_context context,kcm_ccache c,krb5_ccache id)272 kcm_internal_ccache(krb5_context context,
273 kcm_ccache c,
274 krb5_ccache id)
275 {
276 id->ops = &krb5_kcmss_ops;
277 id->data.length = sizeof(*c);
278 id->data.data = c;
279
280 return 0;
281 }
282
283