1178825Sdfr/* 2233294Sstas * Copyright (c) 2004 - 2007 Kungliga Tekniska H��gskolan 3233294Sstas * (Royal Institute of Technology, Stockholm, Sweden). 4233294Sstas * All rights reserved. 5178825Sdfr * 6233294Sstas * Portions Copyright (c) 2009 Apple Inc. All rights reserved. 7178825Sdfr * 8233294Sstas * Redistribution and use in source and binary forms, with or without 9233294Sstas * modification, are permitted provided that the following conditions 10233294Sstas * are met: 11178825Sdfr * 12233294Sstas * 1. Redistributions of source code must retain the above copyright 13233294Sstas * notice, this list of conditions and the following disclaimer. 14178825Sdfr * 15233294Sstas * 2. Redistributions in binary form must reproduce the above copyright 16233294Sstas * notice, this list of conditions and the following disclaimer in the 17233294Sstas * documentation and/or other materials provided with the distribution. 18178825Sdfr * 19233294Sstas * 3. Neither the name of the Institute nor the names of its contributors 20233294Sstas * may be used to endorse or promote products derived from this software 21233294Sstas * without specific prior written permission. 22233294Sstas * 23233294Sstas * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND 24233294Sstas * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 25233294Sstas * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 26233294Sstas * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE 27233294Sstas * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 28233294Sstas * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 29233294Sstas * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 30233294Sstas * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 31233294Sstas * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 32233294Sstas * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 33233294Sstas * SUCH DAMAGE. 34178825Sdfr */ 35178825Sdfr 36178825Sdfr#include "krb5_locl.h" 37178825Sdfr#include <krb5_ccapi.h> 38178825Sdfr#ifdef HAVE_DLFCN_H 39178825Sdfr#include <dlfcn.h> 40178825Sdfr#endif 41178825Sdfr 42233294Sstas#ifndef KCM_IS_API_CACHE 43178825Sdfr 44178825Sdfrstatic HEIMDAL_MUTEX acc_mutex = HEIMDAL_MUTEX_INITIALIZER; 45178825Sdfrstatic cc_initialize_func init_func; 46233294Sstasstatic void (KRB5_CALLCONV *set_target_uid)(uid_t); 47233294Sstasstatic void (KRB5_CALLCONV *clear_target)(void); 48178825Sdfr 49178825Sdfr#ifdef HAVE_DLOPEN 50233294Sstasstatic void *cc_handle; 51178825Sdfr#endif 52178825Sdfr 53178825Sdfrtypedef struct krb5_acc { 54178825Sdfr char *cache_name; 55178825Sdfr cc_context_t context; 56178825Sdfr cc_ccache_t ccache; 57178825Sdfr} krb5_acc; 58178825Sdfr 59233294Sstasstatic krb5_error_code KRB5_CALLCONV acc_close(krb5_context, krb5_ccache); 60178825Sdfr 61178825Sdfr#define ACACHE(X) ((krb5_acc *)(X)->data.data) 62178825Sdfr 63178825Sdfrstatic const struct { 64178825Sdfr cc_int32 error; 65178825Sdfr krb5_error_code ret; 66178825Sdfr} cc_errors[] = { 67178825Sdfr { ccErrBadName, KRB5_CC_BADNAME }, 68178825Sdfr { ccErrCredentialsNotFound, KRB5_CC_NOTFOUND }, 69178825Sdfr { ccErrCCacheNotFound, KRB5_FCC_NOFILE }, 70178825Sdfr { ccErrContextNotFound, KRB5_CC_NOTFOUND }, 71178825Sdfr { ccIteratorEnd, KRB5_CC_END }, 72178825Sdfr { ccErrNoMem, KRB5_CC_NOMEM }, 73178825Sdfr { ccErrServerUnavailable, KRB5_CC_NOSUPP }, 74233294Sstas { ccErrInvalidCCache, KRB5_CC_BADNAME }, 75178825Sdfr { ccNoError, 0 } 76178825Sdfr}; 77178825Sdfr 78178825Sdfrstatic krb5_error_code 79178825Sdfrtranslate_cc_error(krb5_context context, cc_int32 error) 80178825Sdfr{ 81233294Sstas size_t i; 82233294Sstas krb5_clear_error_message(context); 83178825Sdfr for(i = 0; i < sizeof(cc_errors)/sizeof(cc_errors[0]); i++) 84178825Sdfr if (cc_errors[i].error == error) 85178825Sdfr return cc_errors[i].ret; 86178825Sdfr return KRB5_FCC_INTERNAL; 87178825Sdfr} 88178825Sdfr 89178825Sdfrstatic krb5_error_code 90178825Sdfrinit_ccapi(krb5_context context) 91178825Sdfr{ 92233294Sstas const char *lib = NULL; 93178825Sdfr 94178825Sdfr HEIMDAL_MUTEX_lock(&acc_mutex); 95178825Sdfr if (init_func) { 96178825Sdfr HEIMDAL_MUTEX_unlock(&acc_mutex); 97233294Sstas if (context) 98233294Sstas krb5_clear_error_message(context); 99178825Sdfr return 0; 100178825Sdfr } 101178825Sdfr 102233294Sstas if (context) 103233294Sstas lib = krb5_config_get_string(context, NULL, 104233294Sstas "libdefaults", "ccapi_library", 105233294Sstas NULL); 106178825Sdfr if (lib == NULL) { 107178825Sdfr#ifdef __APPLE__ 108178825Sdfr lib = "/System/Library/Frameworks/Kerberos.framework/Kerberos"; 109233294Sstas#elif defined(KRB5_USE_PATH_TOKENS) && defined(_WIN32) 110233294Sstas lib = "%{LIBDIR}/libkrb5_cc.dll"; 111178825Sdfr#else 112178825Sdfr lib = "/usr/lib/libkrb5_cc.so"; 113178825Sdfr#endif 114178825Sdfr } 115178825Sdfr 116178825Sdfr#ifdef HAVE_DLOPEN 117178825Sdfr 118178825Sdfr#ifndef RTLD_LAZY 119178825Sdfr#define RTLD_LAZY 0 120178825Sdfr#endif 121233294Sstas#ifndef RTLD_LOCAL 122233294Sstas#define RTLD_LOCAL 0 123233294Sstas#endif 124178825Sdfr 125233294Sstas#ifdef KRB5_USE_PATH_TOKENS 126233294Sstas { 127233294Sstas char * explib = NULL; 128233294Sstas if (_krb5_expand_path_tokens(context, lib, &explib) == 0) { 129233294Sstas cc_handle = dlopen(explib, RTLD_LAZY|RTLD_LOCAL); 130233294Sstas free(explib); 131233294Sstas } 132233294Sstas } 133233294Sstas#else 134233294Sstas cc_handle = dlopen(lib, RTLD_LAZY|RTLD_LOCAL); 135233294Sstas#endif 136233294Sstas 137178825Sdfr if (cc_handle == NULL) { 138178825Sdfr HEIMDAL_MUTEX_unlock(&acc_mutex); 139233294Sstas if (context) 140233294Sstas krb5_set_error_message(context, KRB5_CC_NOSUPP, 141233294Sstas N_("Failed to load API cache module %s", "file"), 142233294Sstas lib); 143178825Sdfr return KRB5_CC_NOSUPP; 144178825Sdfr } 145178825Sdfr 146178825Sdfr init_func = (cc_initialize_func)dlsym(cc_handle, "cc_initialize"); 147233294Sstas set_target_uid = (void (KRB5_CALLCONV *)(uid_t)) 148233294Sstas dlsym(cc_handle, "krb5_ipc_client_set_target_uid"); 149233294Sstas clear_target = (void (KRB5_CALLCONV *)(void)) 150233294Sstas dlsym(cc_handle, "krb5_ipc_client_clear_target"); 151178825Sdfr HEIMDAL_MUTEX_unlock(&acc_mutex); 152178825Sdfr if (init_func == NULL) { 153233294Sstas if (context) 154233294Sstas krb5_set_error_message(context, KRB5_CC_NOSUPP, 155233294Sstas N_("Failed to find cc_initialize" 156233294Sstas "in %s: %s", "file, error"), lib, dlerror()); 157178825Sdfr dlclose(cc_handle); 158178825Sdfr return KRB5_CC_NOSUPP; 159178825Sdfr } 160178825Sdfr 161178825Sdfr return 0; 162178825Sdfr#else 163178825Sdfr HEIMDAL_MUTEX_unlock(&acc_mutex); 164233294Sstas if (context) 165233294Sstas krb5_set_error_message(context, KRB5_CC_NOSUPP, 166233294Sstas N_("no support for shared object", "")); 167178825Sdfr return KRB5_CC_NOSUPP; 168178825Sdfr#endif 169233294Sstas} 170178825Sdfr 171233294Sstasvoid 172233294Sstas_heim_krb5_ipc_client_set_target_uid(uid_t uid) 173233294Sstas{ 174233294Sstas init_ccapi(NULL); 175233294Sstas if (set_target_uid != NULL) 176233294Sstas (*set_target_uid)(uid); 177233294Sstas} 178233294Sstas 179233294Sstasvoid 180233294Sstas_heim_krb5_ipc_client_clear_target(void) 181233294Sstas{ 182233294Sstas init_ccapi(NULL); 183233294Sstas if (clear_target != NULL) 184233294Sstas (*clear_target)(); 185233294Sstas} 186233294Sstas 187178825Sdfrstatic krb5_error_code 188178825Sdfrmake_cred_from_ccred(krb5_context context, 189178825Sdfr const cc_credentials_v5_t *incred, 190178825Sdfr krb5_creds *cred) 191178825Sdfr{ 192178825Sdfr krb5_error_code ret; 193233294Sstas unsigned int i; 194178825Sdfr 195178825Sdfr memset(cred, 0, sizeof(*cred)); 196178825Sdfr 197178825Sdfr ret = krb5_parse_name(context, incred->client, &cred->client); 198178825Sdfr if (ret) 199178825Sdfr goto fail; 200178825Sdfr 201178825Sdfr ret = krb5_parse_name(context, incred->server, &cred->server); 202178825Sdfr if (ret) 203178825Sdfr goto fail; 204178825Sdfr 205178825Sdfr cred->session.keytype = incred->keyblock.type; 206178825Sdfr cred->session.keyvalue.length = incred->keyblock.length; 207178825Sdfr cred->session.keyvalue.data = malloc(incred->keyblock.length); 208178825Sdfr if (cred->session.keyvalue.data == NULL) 209178825Sdfr goto nomem; 210178825Sdfr memcpy(cred->session.keyvalue.data, incred->keyblock.data, 211178825Sdfr incred->keyblock.length); 212178825Sdfr 213178825Sdfr cred->times.authtime = incred->authtime; 214178825Sdfr cred->times.starttime = incred->starttime; 215178825Sdfr cred->times.endtime = incred->endtime; 216178825Sdfr cred->times.renew_till = incred->renew_till; 217178825Sdfr 218178825Sdfr ret = krb5_data_copy(&cred->ticket, 219178825Sdfr incred->ticket.data, 220178825Sdfr incred->ticket.length); 221178825Sdfr if (ret) 222178825Sdfr goto nomem; 223178825Sdfr 224178825Sdfr ret = krb5_data_copy(&cred->second_ticket, 225178825Sdfr incred->second_ticket.data, 226178825Sdfr incred->second_ticket.length); 227178825Sdfr if (ret) 228178825Sdfr goto nomem; 229178825Sdfr 230178825Sdfr cred->authdata.val = NULL; 231178825Sdfr cred->authdata.len = 0; 232233294Sstas 233178825Sdfr cred->addresses.val = NULL; 234178825Sdfr cred->addresses.len = 0; 235233294Sstas 236178825Sdfr for (i = 0; incred->authdata && incred->authdata[i]; i++) 237178825Sdfr ; 238233294Sstas 239178825Sdfr if (i) { 240178825Sdfr cred->authdata.val = calloc(i, sizeof(cred->authdata.val[0])); 241178825Sdfr if (cred->authdata.val == NULL) 242178825Sdfr goto nomem; 243178825Sdfr cred->authdata.len = i; 244178825Sdfr for (i = 0; i < cred->authdata.len; i++) { 245178825Sdfr cred->authdata.val[i].ad_type = incred->authdata[i]->type; 246178825Sdfr ret = krb5_data_copy(&cred->authdata.val[i].ad_data, 247178825Sdfr incred->authdata[i]->data, 248178825Sdfr incred->authdata[i]->length); 249178825Sdfr if (ret) 250178825Sdfr goto nomem; 251178825Sdfr } 252178825Sdfr } 253233294Sstas 254178825Sdfr for (i = 0; incred->addresses && incred->addresses[i]; i++) 255178825Sdfr ; 256233294Sstas 257178825Sdfr if (i) { 258178825Sdfr cred->addresses.val = calloc(i, sizeof(cred->addresses.val[0])); 259178825Sdfr if (cred->addresses.val == NULL) 260178825Sdfr goto nomem; 261178825Sdfr cred->addresses.len = i; 262233294Sstas 263178825Sdfr for (i = 0; i < cred->addresses.len; i++) { 264178825Sdfr cred->addresses.val[i].addr_type = incred->addresses[i]->type; 265178825Sdfr ret = krb5_data_copy(&cred->addresses.val[i].address, 266178825Sdfr incred->addresses[i]->data, 267178825Sdfr incred->addresses[i]->length); 268178825Sdfr if (ret) 269178825Sdfr goto nomem; 270178825Sdfr } 271178825Sdfr } 272233294Sstas 273178825Sdfr cred->flags.i = 0; 274178825Sdfr if (incred->ticket_flags & KRB5_CCAPI_TKT_FLG_FORWARDABLE) 275178825Sdfr cred->flags.b.forwardable = 1; 276178825Sdfr if (incred->ticket_flags & KRB5_CCAPI_TKT_FLG_FORWARDED) 277178825Sdfr cred->flags.b.forwarded = 1; 278178825Sdfr if (incred->ticket_flags & KRB5_CCAPI_TKT_FLG_PROXIABLE) 279178825Sdfr cred->flags.b.proxiable = 1; 280178825Sdfr if (incred->ticket_flags & KRB5_CCAPI_TKT_FLG_PROXY) 281178825Sdfr cred->flags.b.proxy = 1; 282178825Sdfr if (incred->ticket_flags & KRB5_CCAPI_TKT_FLG_MAY_POSTDATE) 283178825Sdfr cred->flags.b.may_postdate = 1; 284178825Sdfr if (incred->ticket_flags & KRB5_CCAPI_TKT_FLG_POSTDATED) 285178825Sdfr cred->flags.b.postdated = 1; 286178825Sdfr if (incred->ticket_flags & KRB5_CCAPI_TKT_FLG_INVALID) 287178825Sdfr cred->flags.b.invalid = 1; 288178825Sdfr if (incred->ticket_flags & KRB5_CCAPI_TKT_FLG_RENEWABLE) 289178825Sdfr cred->flags.b.renewable = 1; 290178825Sdfr if (incred->ticket_flags & KRB5_CCAPI_TKT_FLG_INITIAL) 291178825Sdfr cred->flags.b.initial = 1; 292178825Sdfr if (incred->ticket_flags & KRB5_CCAPI_TKT_FLG_PRE_AUTH) 293178825Sdfr cred->flags.b.pre_authent = 1; 294178825Sdfr if (incred->ticket_flags & KRB5_CCAPI_TKT_FLG_HW_AUTH) 295178825Sdfr cred->flags.b.hw_authent = 1; 296178825Sdfr if (incred->ticket_flags & KRB5_CCAPI_TKT_FLG_TRANSIT_POLICY_CHECKED) 297178825Sdfr cred->flags.b.transited_policy_checked = 1; 298178825Sdfr if (incred->ticket_flags & KRB5_CCAPI_TKT_FLG_OK_AS_DELEGATE) 299178825Sdfr cred->flags.b.ok_as_delegate = 1; 300178825Sdfr if (incred->ticket_flags & KRB5_CCAPI_TKT_FLG_ANONYMOUS) 301178825Sdfr cred->flags.b.anonymous = 1; 302178825Sdfr 303178825Sdfr return 0; 304233294Sstas 305178825Sdfrnomem: 306178825Sdfr ret = ENOMEM; 307233294Sstas krb5_set_error_message(context, ret, N_("malloc: out of memory", "malloc")); 308233294Sstas 309178825Sdfrfail: 310178825Sdfr krb5_free_cred_contents(context, cred); 311178825Sdfr return ret; 312178825Sdfr} 313178825Sdfr 314178825Sdfrstatic void 315178825Sdfrfree_ccred(cc_credentials_v5_t *cred) 316178825Sdfr{ 317178825Sdfr int i; 318178825Sdfr 319178825Sdfr if (cred->addresses) { 320178825Sdfr for (i = 0; cred->addresses[i] != 0; i++) { 321178825Sdfr if (cred->addresses[i]->data) 322178825Sdfr free(cred->addresses[i]->data); 323178825Sdfr free(cred->addresses[i]); 324178825Sdfr } 325178825Sdfr free(cred->addresses); 326178825Sdfr } 327178825Sdfr if (cred->server) 328178825Sdfr free(cred->server); 329178825Sdfr if (cred->client) 330178825Sdfr free(cred->client); 331178825Sdfr memset(cred, 0, sizeof(*cred)); 332178825Sdfr} 333178825Sdfr 334178825Sdfrstatic krb5_error_code 335178825Sdfrmake_ccred_from_cred(krb5_context context, 336178825Sdfr const krb5_creds *incred, 337178825Sdfr cc_credentials_v5_t *cred) 338178825Sdfr{ 339178825Sdfr krb5_error_code ret; 340233294Sstas size_t i; 341178825Sdfr 342178825Sdfr memset(cred, 0, sizeof(*cred)); 343178825Sdfr 344178825Sdfr ret = krb5_unparse_name(context, incred->client, &cred->client); 345178825Sdfr if (ret) 346178825Sdfr goto fail; 347178825Sdfr 348178825Sdfr ret = krb5_unparse_name(context, incred->server, &cred->server); 349178825Sdfr if (ret) 350178825Sdfr goto fail; 351178825Sdfr 352178825Sdfr cred->keyblock.type = incred->session.keytype; 353178825Sdfr cred->keyblock.length = incred->session.keyvalue.length; 354178825Sdfr cred->keyblock.data = incred->session.keyvalue.data; 355178825Sdfr 356178825Sdfr cred->authtime = incred->times.authtime; 357178825Sdfr cred->starttime = incred->times.starttime; 358178825Sdfr cred->endtime = incred->times.endtime; 359178825Sdfr cred->renew_till = incred->times.renew_till; 360178825Sdfr 361178825Sdfr cred->ticket.length = incred->ticket.length; 362178825Sdfr cred->ticket.data = incred->ticket.data; 363178825Sdfr 364178825Sdfr cred->second_ticket.length = incred->second_ticket.length; 365178825Sdfr cred->second_ticket.data = incred->second_ticket.data; 366178825Sdfr 367178825Sdfr /* XXX this one should also be filled in */ 368178825Sdfr cred->authdata = NULL; 369233294Sstas 370233294Sstas cred->addresses = calloc(incred->addresses.len + 1, 371178825Sdfr sizeof(cred->addresses[0])); 372178825Sdfr if (cred->addresses == NULL) { 373178825Sdfr 374178825Sdfr ret = ENOMEM; 375178825Sdfr goto fail; 376178825Sdfr } 377178825Sdfr 378178825Sdfr for (i = 0; i < incred->addresses.len; i++) { 379178825Sdfr cc_data *addr; 380178825Sdfr addr = malloc(sizeof(*addr)); 381178825Sdfr if (addr == NULL) { 382178825Sdfr ret = ENOMEM; 383178825Sdfr goto fail; 384178825Sdfr } 385178825Sdfr addr->type = incred->addresses.val[i].addr_type; 386178825Sdfr addr->length = incred->addresses.val[i].address.length; 387178825Sdfr addr->data = malloc(addr->length); 388178825Sdfr if (addr->data == NULL) { 389233294Sstas free(addr); 390178825Sdfr ret = ENOMEM; 391178825Sdfr goto fail; 392178825Sdfr } 393233294Sstas memcpy(addr->data, incred->addresses.val[i].address.data, 394178825Sdfr addr->length); 395178825Sdfr cred->addresses[i] = addr; 396178825Sdfr } 397178825Sdfr cred->addresses[i] = NULL; 398178825Sdfr 399178825Sdfr cred->ticket_flags = 0; 400178825Sdfr if (incred->flags.b.forwardable) 401178825Sdfr cred->ticket_flags |= KRB5_CCAPI_TKT_FLG_FORWARDABLE; 402178825Sdfr if (incred->flags.b.forwarded) 403178825Sdfr cred->ticket_flags |= KRB5_CCAPI_TKT_FLG_FORWARDED; 404178825Sdfr if (incred->flags.b.proxiable) 405178825Sdfr cred->ticket_flags |= KRB5_CCAPI_TKT_FLG_PROXIABLE; 406178825Sdfr if (incred->flags.b.proxy) 407178825Sdfr cred->ticket_flags |= KRB5_CCAPI_TKT_FLG_PROXY; 408178825Sdfr if (incred->flags.b.may_postdate) 409178825Sdfr cred->ticket_flags |= KRB5_CCAPI_TKT_FLG_MAY_POSTDATE; 410178825Sdfr if (incred->flags.b.postdated) 411178825Sdfr cred->ticket_flags |= KRB5_CCAPI_TKT_FLG_POSTDATED; 412178825Sdfr if (incred->flags.b.invalid) 413178825Sdfr cred->ticket_flags |= KRB5_CCAPI_TKT_FLG_INVALID; 414178825Sdfr if (incred->flags.b.renewable) 415178825Sdfr cred->ticket_flags |= KRB5_CCAPI_TKT_FLG_RENEWABLE; 416178825Sdfr if (incred->flags.b.initial) 417178825Sdfr cred->ticket_flags |= KRB5_CCAPI_TKT_FLG_INITIAL; 418178825Sdfr if (incred->flags.b.pre_authent) 419178825Sdfr cred->ticket_flags |= KRB5_CCAPI_TKT_FLG_PRE_AUTH; 420178825Sdfr if (incred->flags.b.hw_authent) 421178825Sdfr cred->ticket_flags |= KRB5_CCAPI_TKT_FLG_HW_AUTH; 422178825Sdfr if (incred->flags.b.transited_policy_checked) 423178825Sdfr cred->ticket_flags |= KRB5_CCAPI_TKT_FLG_TRANSIT_POLICY_CHECKED; 424178825Sdfr if (incred->flags.b.ok_as_delegate) 425178825Sdfr cred->ticket_flags |= KRB5_CCAPI_TKT_FLG_OK_AS_DELEGATE; 426178825Sdfr if (incred->flags.b.anonymous) 427178825Sdfr cred->ticket_flags |= KRB5_CCAPI_TKT_FLG_ANONYMOUS; 428178825Sdfr 429178825Sdfr return 0; 430178825Sdfr 431233294Sstasfail: 432178825Sdfr free_ccred(cred); 433178825Sdfr 434233294Sstas krb5_clear_error_message(context); 435178825Sdfr return ret; 436178825Sdfr} 437178825Sdfr 438233294Sstasstatic cc_int32 439233294Sstasget_cc_name(krb5_acc *a) 440178825Sdfr{ 441178825Sdfr cc_string_t name; 442178825Sdfr cc_int32 error; 443178825Sdfr 444233294Sstas error = (*a->ccache->func->get_name)(a->ccache, &name); 445178825Sdfr if (error) 446233294Sstas return error; 447178825Sdfr 448233294Sstas a->cache_name = strdup(name->data); 449178825Sdfr (*name->func->release)(name); 450233294Sstas if (a->cache_name == NULL) 451233294Sstas return ccErrNoMem; 452233294Sstas return ccNoError; 453178825Sdfr} 454178825Sdfr 455178825Sdfr 456233294Sstasstatic const char* KRB5_CALLCONV 457178825Sdfracc_get_name(krb5_context context, 458178825Sdfr krb5_ccache id) 459178825Sdfr{ 460178825Sdfr krb5_acc *a = ACACHE(id); 461233294Sstas int32_t error; 462178825Sdfr 463233294Sstas if (a->cache_name == NULL) { 464233294Sstas krb5_error_code ret; 465233294Sstas krb5_principal principal; 466233294Sstas char *name; 467233294Sstas 468233294Sstas ret = _krb5_get_default_principal_local(context, &principal); 469233294Sstas if (ret) 470233294Sstas return NULL; 471233294Sstas 472233294Sstas ret = krb5_unparse_name(context, principal, &name); 473233294Sstas krb5_free_principal(context, principal); 474233294Sstas if (ret) 475233294Sstas return NULL; 476233294Sstas 477233294Sstas error = (*a->context->func->create_new_ccache)(a->context, 478233294Sstas cc_credentials_v5, 479233294Sstas name, 480233294Sstas &a->ccache); 481233294Sstas krb5_xfree(name); 482233294Sstas if (error) 483233294Sstas return NULL; 484233294Sstas 485233294Sstas error = get_cc_name(a); 486233294Sstas if (error) 487233294Sstas return NULL; 488178825Sdfr } 489233294Sstas 490233294Sstas return a->cache_name; 491178825Sdfr} 492178825Sdfr 493233294Sstasstatic krb5_error_code KRB5_CALLCONV 494178825Sdfracc_alloc(krb5_context context, krb5_ccache *id) 495178825Sdfr{ 496178825Sdfr krb5_error_code ret; 497178825Sdfr cc_int32 error; 498178825Sdfr krb5_acc *a; 499178825Sdfr 500178825Sdfr ret = init_ccapi(context); 501178825Sdfr if (ret) 502178825Sdfr return ret; 503178825Sdfr 504178825Sdfr ret = krb5_data_alloc(&(*id)->data, sizeof(*a)); 505178825Sdfr if (ret) { 506233294Sstas krb5_clear_error_message(context); 507178825Sdfr return ret; 508178825Sdfr } 509233294Sstas 510178825Sdfr a = ACACHE(*id); 511178825Sdfr 512178825Sdfr error = (*init_func)(&a->context, ccapi_version_3, NULL, NULL); 513178825Sdfr if (error) { 514178825Sdfr krb5_data_free(&(*id)->data); 515178825Sdfr return translate_cc_error(context, error); 516178825Sdfr } 517178825Sdfr 518178825Sdfr a->cache_name = NULL; 519178825Sdfr 520178825Sdfr return 0; 521178825Sdfr} 522178825Sdfr 523233294Sstasstatic krb5_error_code KRB5_CALLCONV 524178825Sdfracc_resolve(krb5_context context, krb5_ccache *id, const char *res) 525178825Sdfr{ 526178825Sdfr krb5_error_code ret; 527178825Sdfr cc_int32 error; 528178825Sdfr krb5_acc *a; 529178825Sdfr 530178825Sdfr ret = acc_alloc(context, id); 531178825Sdfr if (ret) 532178825Sdfr return ret; 533178825Sdfr 534178825Sdfr a = ACACHE(*id); 535178825Sdfr 536233294Sstas error = (*a->context->func->open_ccache)(a->context, res, &a->ccache); 537233294Sstas if (error == ccNoError) { 538233294Sstas cc_time_t offset; 539233294Sstas error = get_cc_name(a); 540233294Sstas if (error != ccNoError) { 541178825Sdfr acc_close(context, *id); 542178825Sdfr *id = NULL; 543233294Sstas return translate_cc_error(context, error); 544178825Sdfr } 545233294Sstas 546233294Sstas error = (*a->ccache->func->get_kdc_time_offset)(a->ccache, 547233294Sstas cc_credentials_v5, 548233294Sstas &offset); 549233294Sstas if (error == 0) 550233294Sstas context->kdc_sec_offset = offset; 551233294Sstas 552178825Sdfr } else if (error == ccErrCCacheNotFound) { 553178825Sdfr a->ccache = NULL; 554178825Sdfr a->cache_name = NULL; 555178825Sdfr } else { 556178825Sdfr *id = NULL; 557178825Sdfr return translate_cc_error(context, error); 558178825Sdfr } 559178825Sdfr 560178825Sdfr return 0; 561178825Sdfr} 562178825Sdfr 563233294Sstasstatic krb5_error_code KRB5_CALLCONV 564178825Sdfracc_gen_new(krb5_context context, krb5_ccache *id) 565178825Sdfr{ 566178825Sdfr krb5_error_code ret; 567178825Sdfr krb5_acc *a; 568178825Sdfr 569178825Sdfr ret = acc_alloc(context, id); 570178825Sdfr if (ret) 571178825Sdfr return ret; 572178825Sdfr 573178825Sdfr a = ACACHE(*id); 574178825Sdfr 575178825Sdfr a->ccache = NULL; 576178825Sdfr a->cache_name = NULL; 577178825Sdfr 578178825Sdfr return 0; 579178825Sdfr} 580178825Sdfr 581233294Sstasstatic krb5_error_code KRB5_CALLCONV 582178825Sdfracc_initialize(krb5_context context, 583178825Sdfr krb5_ccache id, 584178825Sdfr krb5_principal primary_principal) 585178825Sdfr{ 586178825Sdfr krb5_acc *a = ACACHE(id); 587178825Sdfr krb5_error_code ret; 588178825Sdfr int32_t error; 589178825Sdfr char *name; 590178825Sdfr 591178825Sdfr ret = krb5_unparse_name(context, primary_principal, &name); 592178825Sdfr if (ret) 593178825Sdfr return ret; 594178825Sdfr 595233294Sstas if (a->cache_name == NULL) { 596233294Sstas error = (*a->context->func->create_new_ccache)(a->context, 597233294Sstas cc_credentials_v5, 598233294Sstas name, 599233294Sstas &a->ccache); 600233294Sstas free(name); 601233294Sstas if (error == ccNoError) 602233294Sstas error = get_cc_name(a); 603233294Sstas } else { 604233294Sstas cc_credentials_iterator_t iter; 605233294Sstas cc_credentials_t ccred; 606178825Sdfr 607233294Sstas error = (*a->ccache->func->new_credentials_iterator)(a->ccache, &iter); 608233294Sstas if (error) { 609233294Sstas free(name); 610233294Sstas return translate_cc_error(context, error); 611233294Sstas } 612233294Sstas 613233294Sstas while (1) { 614233294Sstas error = (*iter->func->next)(iter, &ccred); 615233294Sstas if (error) 616233294Sstas break; 617233294Sstas (*a->ccache->func->remove_credentials)(a->ccache, ccred); 618233294Sstas (*ccred->func->release)(ccred); 619233294Sstas } 620233294Sstas (*iter->func->release)(iter); 621233294Sstas 622233294Sstas error = (*a->ccache->func->set_principal)(a->ccache, 623233294Sstas cc_credentials_v5, 624233294Sstas name); 625233294Sstas } 626233294Sstas 627233294Sstas if (error == 0 && context->kdc_sec_offset) 628233294Sstas error = (*a->ccache->func->set_kdc_time_offset)(a->ccache, 629233294Sstas cc_credentials_v5, 630233294Sstas context->kdc_sec_offset); 631233294Sstas 632178825Sdfr return translate_cc_error(context, error); 633178825Sdfr} 634178825Sdfr 635233294Sstasstatic krb5_error_code KRB5_CALLCONV 636178825Sdfracc_close(krb5_context context, 637178825Sdfr krb5_ccache id) 638178825Sdfr{ 639178825Sdfr krb5_acc *a = ACACHE(id); 640178825Sdfr 641178825Sdfr if (a->ccache) { 642178825Sdfr (*a->ccache->func->release)(a->ccache); 643178825Sdfr a->ccache = NULL; 644178825Sdfr } 645178825Sdfr if (a->cache_name) { 646178825Sdfr free(a->cache_name); 647178825Sdfr a->cache_name = NULL; 648178825Sdfr } 649233294Sstas if (a->context) { 650233294Sstas (*a->context->func->release)(a->context); 651233294Sstas a->context = NULL; 652233294Sstas } 653178825Sdfr krb5_data_free(&id->data); 654178825Sdfr return 0; 655178825Sdfr} 656178825Sdfr 657233294Sstasstatic krb5_error_code KRB5_CALLCONV 658178825Sdfracc_destroy(krb5_context context, 659178825Sdfr krb5_ccache id) 660178825Sdfr{ 661178825Sdfr krb5_acc *a = ACACHE(id); 662178825Sdfr cc_int32 error = 0; 663178825Sdfr 664178825Sdfr if (a->ccache) { 665178825Sdfr error = (*a->ccache->func->destroy)(a->ccache); 666178825Sdfr a->ccache = NULL; 667178825Sdfr } 668178825Sdfr if (a->context) { 669178825Sdfr error = (a->context->func->release)(a->context); 670178825Sdfr a->context = NULL; 671178825Sdfr } 672178825Sdfr return translate_cc_error(context, error); 673178825Sdfr} 674178825Sdfr 675233294Sstasstatic krb5_error_code KRB5_CALLCONV 676178825Sdfracc_store_cred(krb5_context context, 677178825Sdfr krb5_ccache id, 678178825Sdfr krb5_creds *creds) 679178825Sdfr{ 680178825Sdfr krb5_acc *a = ACACHE(id); 681178825Sdfr cc_credentials_union cred; 682178825Sdfr cc_credentials_v5_t v5cred; 683178825Sdfr krb5_error_code ret; 684178825Sdfr cc_int32 error; 685233294Sstas 686178825Sdfr if (a->ccache == NULL) { 687233294Sstas krb5_set_error_message(context, KRB5_CC_NOTFOUND, 688233294Sstas N_("No API credential found", "")); 689178825Sdfr return KRB5_CC_NOTFOUND; 690178825Sdfr } 691178825Sdfr 692178825Sdfr cred.version = cc_credentials_v5; 693178825Sdfr cred.credentials.credentials_v5 = &v5cred; 694178825Sdfr 695233294Sstas ret = make_ccred_from_cred(context, 696178825Sdfr creds, 697178825Sdfr &v5cred); 698178825Sdfr if (ret) 699178825Sdfr return ret; 700178825Sdfr 701178825Sdfr error = (*a->ccache->func->store_credentials)(a->ccache, &cred); 702178825Sdfr if (error) 703178825Sdfr ret = translate_cc_error(context, error); 704178825Sdfr 705178825Sdfr free_ccred(&v5cred); 706178825Sdfr 707178825Sdfr return ret; 708178825Sdfr} 709178825Sdfr 710233294Sstasstatic krb5_error_code KRB5_CALLCONV 711178825Sdfracc_get_principal(krb5_context context, 712178825Sdfr krb5_ccache id, 713178825Sdfr krb5_principal *principal) 714178825Sdfr{ 715178825Sdfr krb5_acc *a = ACACHE(id); 716178825Sdfr krb5_error_code ret; 717178825Sdfr int32_t error; 718178825Sdfr cc_string_t name; 719178825Sdfr 720178825Sdfr if (a->ccache == NULL) { 721233294Sstas krb5_set_error_message(context, KRB5_CC_NOTFOUND, 722233294Sstas N_("No API credential found", "")); 723178825Sdfr return KRB5_CC_NOTFOUND; 724178825Sdfr } 725178825Sdfr 726178825Sdfr error = (*a->ccache->func->get_principal)(a->ccache, 727178825Sdfr cc_credentials_v5, 728178825Sdfr &name); 729178825Sdfr if (error) 730178825Sdfr return translate_cc_error(context, error); 731233294Sstas 732178825Sdfr ret = krb5_parse_name(context, name->data, principal); 733233294Sstas 734178825Sdfr (*name->func->release)(name); 735178825Sdfr return ret; 736178825Sdfr} 737178825Sdfr 738233294Sstasstatic krb5_error_code KRB5_CALLCONV 739178825Sdfracc_get_first (krb5_context context, 740178825Sdfr krb5_ccache id, 741178825Sdfr krb5_cc_cursor *cursor) 742178825Sdfr{ 743178825Sdfr cc_credentials_iterator_t iter; 744178825Sdfr krb5_acc *a = ACACHE(id); 745178825Sdfr int32_t error; 746233294Sstas 747178825Sdfr if (a->ccache == NULL) { 748233294Sstas krb5_set_error_message(context, KRB5_CC_NOTFOUND, 749233294Sstas N_("No API credential found", "")); 750178825Sdfr return KRB5_CC_NOTFOUND; 751178825Sdfr } 752178825Sdfr 753178825Sdfr error = (*a->ccache->func->new_credentials_iterator)(a->ccache, &iter); 754178825Sdfr if (error) { 755233294Sstas krb5_clear_error_message(context); 756178825Sdfr return ENOENT; 757178825Sdfr } 758178825Sdfr *cursor = iter; 759178825Sdfr return 0; 760178825Sdfr} 761178825Sdfr 762178825Sdfr 763233294Sstasstatic krb5_error_code KRB5_CALLCONV 764178825Sdfracc_get_next (krb5_context context, 765178825Sdfr krb5_ccache id, 766178825Sdfr krb5_cc_cursor *cursor, 767178825Sdfr krb5_creds *creds) 768178825Sdfr{ 769178825Sdfr cc_credentials_iterator_t iter = *cursor; 770178825Sdfr cc_credentials_t cred; 771178825Sdfr krb5_error_code ret; 772178825Sdfr int32_t error; 773178825Sdfr 774178825Sdfr while (1) { 775178825Sdfr error = (*iter->func->next)(iter, &cred); 776178825Sdfr if (error) 777178825Sdfr return translate_cc_error(context, error); 778178825Sdfr if (cred->data->version == cc_credentials_v5) 779178825Sdfr break; 780178825Sdfr (*cred->func->release)(cred); 781178825Sdfr } 782178825Sdfr 783233294Sstas ret = make_cred_from_ccred(context, 784178825Sdfr cred->data->credentials.credentials_v5, 785178825Sdfr creds); 786178825Sdfr (*cred->func->release)(cred); 787178825Sdfr return ret; 788178825Sdfr} 789178825Sdfr 790233294Sstasstatic krb5_error_code KRB5_CALLCONV 791178825Sdfracc_end_get (krb5_context context, 792178825Sdfr krb5_ccache id, 793178825Sdfr krb5_cc_cursor *cursor) 794178825Sdfr{ 795178825Sdfr cc_credentials_iterator_t iter = *cursor; 796178825Sdfr (*iter->func->release)(iter); 797178825Sdfr return 0; 798178825Sdfr} 799178825Sdfr 800233294Sstasstatic krb5_error_code KRB5_CALLCONV 801178825Sdfracc_remove_cred(krb5_context context, 802178825Sdfr krb5_ccache id, 803178825Sdfr krb5_flags which, 804178825Sdfr krb5_creds *cred) 805178825Sdfr{ 806178825Sdfr cc_credentials_iterator_t iter; 807178825Sdfr krb5_acc *a = ACACHE(id); 808178825Sdfr cc_credentials_t ccred; 809178825Sdfr krb5_error_code ret; 810178825Sdfr cc_int32 error; 811178825Sdfr char *client, *server; 812233294Sstas 813178825Sdfr if (a->ccache == NULL) { 814233294Sstas krb5_set_error_message(context, KRB5_CC_NOTFOUND, 815233294Sstas N_("No API credential found", "")); 816178825Sdfr return KRB5_CC_NOTFOUND; 817178825Sdfr } 818178825Sdfr 819178825Sdfr if (cred->client) { 820178825Sdfr ret = krb5_unparse_name(context, cred->client, &client); 821178825Sdfr if (ret) 822178825Sdfr return ret; 823178825Sdfr } else 824178825Sdfr client = NULL; 825178825Sdfr 826178825Sdfr ret = krb5_unparse_name(context, cred->server, &server); 827178825Sdfr if (ret) { 828178825Sdfr free(client); 829178825Sdfr return ret; 830178825Sdfr } 831178825Sdfr 832178825Sdfr error = (*a->ccache->func->new_credentials_iterator)(a->ccache, &iter); 833178825Sdfr if (error) { 834178825Sdfr free(server); 835178825Sdfr free(client); 836178825Sdfr return translate_cc_error(context, error); 837178825Sdfr } 838178825Sdfr 839178825Sdfr ret = KRB5_CC_NOTFOUND; 840178825Sdfr while (1) { 841178825Sdfr cc_credentials_v5_t *v5cred; 842178825Sdfr 843178825Sdfr error = (*iter->func->next)(iter, &ccred); 844178825Sdfr if (error) 845178825Sdfr break; 846178825Sdfr 847178825Sdfr if (ccred->data->version != cc_credentials_v5) 848178825Sdfr goto next; 849178825Sdfr 850178825Sdfr v5cred = ccred->data->credentials.credentials_v5; 851178825Sdfr 852178825Sdfr if (client && strcmp(v5cred->client, client) != 0) 853178825Sdfr goto next; 854178825Sdfr 855178825Sdfr if (strcmp(v5cred->server, server) != 0) 856178825Sdfr goto next; 857178825Sdfr 858178825Sdfr (*a->ccache->func->remove_credentials)(a->ccache, ccred); 859178825Sdfr ret = 0; 860178825Sdfr next: 861178825Sdfr (*ccred->func->release)(ccred); 862178825Sdfr } 863178825Sdfr 864178825Sdfr (*iter->func->release)(iter); 865178825Sdfr 866178825Sdfr if (ret) 867233294Sstas krb5_set_error_message(context, ret, 868233294Sstas N_("Can't find credential %s in cache", 869233294Sstas "principal"), server); 870178825Sdfr free(server); 871178825Sdfr free(client); 872178825Sdfr 873178825Sdfr return ret; 874178825Sdfr} 875178825Sdfr 876233294Sstasstatic krb5_error_code KRB5_CALLCONV 877178825Sdfracc_set_flags(krb5_context context, 878178825Sdfr krb5_ccache id, 879178825Sdfr krb5_flags flags) 880178825Sdfr{ 881178825Sdfr return 0; 882178825Sdfr} 883178825Sdfr 884233294Sstasstatic int KRB5_CALLCONV 885178825Sdfracc_get_version(krb5_context context, 886178825Sdfr krb5_ccache id) 887178825Sdfr{ 888178825Sdfr return 0; 889178825Sdfr} 890233294Sstas 891178825Sdfrstruct cache_iter { 892178825Sdfr cc_context_t context; 893178825Sdfr cc_ccache_iterator_t iter; 894178825Sdfr}; 895178825Sdfr 896233294Sstasstatic krb5_error_code KRB5_CALLCONV 897178825Sdfracc_get_cache_first(krb5_context context, krb5_cc_cursor *cursor) 898178825Sdfr{ 899178825Sdfr struct cache_iter *iter; 900178825Sdfr krb5_error_code ret; 901178825Sdfr cc_int32 error; 902178825Sdfr 903178825Sdfr ret = init_ccapi(context); 904178825Sdfr if (ret) 905178825Sdfr return ret; 906178825Sdfr 907178825Sdfr iter = calloc(1, sizeof(*iter)); 908178825Sdfr if (iter == NULL) { 909233294Sstas krb5_set_error_message(context, ENOMEM, "malloc: out of memory"); 910178825Sdfr return ENOMEM; 911178825Sdfr } 912178825Sdfr 913178825Sdfr error = (*init_func)(&iter->context, ccapi_version_3, NULL, NULL); 914178825Sdfr if (error) { 915178825Sdfr free(iter); 916178825Sdfr return translate_cc_error(context, error); 917178825Sdfr } 918178825Sdfr 919178825Sdfr error = (*iter->context->func->new_ccache_iterator)(iter->context, 920178825Sdfr &iter->iter); 921178825Sdfr if (error) { 922178825Sdfr free(iter); 923233294Sstas krb5_clear_error_message(context); 924178825Sdfr return ENOENT; 925178825Sdfr } 926178825Sdfr *cursor = iter; 927178825Sdfr return 0; 928178825Sdfr} 929178825Sdfr 930233294Sstasstatic krb5_error_code KRB5_CALLCONV 931178825Sdfracc_get_cache_next(krb5_context context, krb5_cc_cursor cursor, krb5_ccache *id) 932178825Sdfr{ 933178825Sdfr struct cache_iter *iter = cursor; 934178825Sdfr cc_ccache_t cache; 935178825Sdfr krb5_acc *a; 936178825Sdfr krb5_error_code ret; 937178825Sdfr int32_t error; 938178825Sdfr 939178825Sdfr error = (*iter->iter->func->next)(iter->iter, &cache); 940178825Sdfr if (error) 941178825Sdfr return translate_cc_error(context, error); 942178825Sdfr 943178825Sdfr ret = _krb5_cc_allocate(context, &krb5_acc_ops, id); 944178825Sdfr if (ret) { 945178825Sdfr (*cache->func->release)(cache); 946178825Sdfr return ret; 947178825Sdfr } 948178825Sdfr 949178825Sdfr ret = acc_alloc(context, id); 950178825Sdfr if (ret) { 951178825Sdfr (*cache->func->release)(cache); 952178825Sdfr free(*id); 953178825Sdfr return ret; 954178825Sdfr } 955178825Sdfr 956178825Sdfr a = ACACHE(*id); 957178825Sdfr a->ccache = cache; 958178825Sdfr 959233294Sstas error = get_cc_name(a); 960233294Sstas if (error) { 961178825Sdfr acc_close(context, *id); 962178825Sdfr *id = NULL; 963233294Sstas return translate_cc_error(context, error); 964233294Sstas } 965178825Sdfr return 0; 966178825Sdfr} 967178825Sdfr 968233294Sstasstatic krb5_error_code KRB5_CALLCONV 969178825Sdfracc_end_cache_get(krb5_context context, krb5_cc_cursor cursor) 970178825Sdfr{ 971178825Sdfr struct cache_iter *iter = cursor; 972178825Sdfr 973178825Sdfr (*iter->iter->func->release)(iter->iter); 974178825Sdfr iter->iter = NULL; 975178825Sdfr (*iter->context->func->release)(iter->context); 976178825Sdfr iter->context = NULL; 977178825Sdfr free(iter); 978178825Sdfr return 0; 979178825Sdfr} 980178825Sdfr 981233294Sstasstatic krb5_error_code KRB5_CALLCONV 982178825Sdfracc_move(krb5_context context, krb5_ccache from, krb5_ccache to) 983178825Sdfr{ 984178825Sdfr krb5_acc *afrom = ACACHE(from); 985178825Sdfr krb5_acc *ato = ACACHE(to); 986178825Sdfr int32_t error; 987178825Sdfr 988178825Sdfr if (ato->ccache == NULL) { 989178825Sdfr cc_string_t name; 990178825Sdfr 991178825Sdfr error = (*afrom->ccache->func->get_principal)(afrom->ccache, 992178825Sdfr cc_credentials_v5, 993178825Sdfr &name); 994178825Sdfr if (error) 995178825Sdfr return translate_cc_error(context, error); 996233294Sstas 997178825Sdfr error = (*ato->context->func->create_new_ccache)(ato->context, 998178825Sdfr cc_credentials_v5, 999178825Sdfr name->data, 1000178825Sdfr &ato->ccache); 1001178825Sdfr (*name->func->release)(name); 1002178825Sdfr if (error) 1003178825Sdfr return translate_cc_error(context, error); 1004178825Sdfr } 1005178825Sdfr 1006233294Sstas error = (*ato->ccache->func->move)(afrom->ccache, ato->ccache); 1007178825Sdfr 1008233294Sstas acc_destroy(context, from); 1009233294Sstas 1010178825Sdfr return translate_cc_error(context, error); 1011178825Sdfr} 1012178825Sdfr 1013233294Sstasstatic krb5_error_code KRB5_CALLCONV 1014233294Sstasacc_get_default_name(krb5_context context, char **str) 1015178825Sdfr{ 1016178825Sdfr krb5_error_code ret; 1017178825Sdfr cc_context_t cc; 1018178825Sdfr cc_string_t name; 1019178825Sdfr int32_t error; 1020178825Sdfr 1021178825Sdfr ret = init_ccapi(context); 1022178825Sdfr if (ret) 1023178825Sdfr return ret; 1024178825Sdfr 1025178825Sdfr error = (*init_func)(&cc, ccapi_version_3, NULL, NULL); 1026178825Sdfr if (error) 1027178825Sdfr return translate_cc_error(context, error); 1028178825Sdfr 1029178825Sdfr error = (*cc->func->get_default_ccache_name)(cc, &name); 1030178825Sdfr if (error) { 1031178825Sdfr (*cc->func->release)(cc); 1032178825Sdfr return translate_cc_error(context, error); 1033178825Sdfr } 1034233294Sstas 1035233294Sstas error = asprintf(str, "API:%s", name->data); 1036178825Sdfr (*name->func->release)(name); 1037178825Sdfr (*cc->func->release)(cc); 1038178825Sdfr 1039233294Sstas if (error < 0 || *str == NULL) { 1040233294Sstas krb5_set_error_message(context, ENOMEM, N_("malloc: out of memory", "")); 1041178825Sdfr return ENOMEM; 1042178825Sdfr } 1043178825Sdfr return 0; 1044178825Sdfr} 1045178825Sdfr 1046233294Sstasstatic krb5_error_code KRB5_CALLCONV 1047233294Sstasacc_set_default(krb5_context context, krb5_ccache id) 1048233294Sstas{ 1049233294Sstas krb5_acc *a = ACACHE(id); 1050233294Sstas cc_int32 error; 1051178825Sdfr 1052233294Sstas if (a->ccache == NULL) { 1053233294Sstas krb5_set_error_message(context, KRB5_CC_NOTFOUND, 1054233294Sstas N_("No API credential found", "")); 1055233294Sstas return KRB5_CC_NOTFOUND; 1056233294Sstas } 1057233294Sstas 1058233294Sstas error = (*a->ccache->func->set_default)(a->ccache); 1059233294Sstas if (error) 1060233294Sstas return translate_cc_error(context, error); 1061233294Sstas 1062233294Sstas return 0; 1063233294Sstas} 1064233294Sstas 1065233294Sstasstatic krb5_error_code KRB5_CALLCONV 1066233294Sstasacc_lastchange(krb5_context context, krb5_ccache id, krb5_timestamp *mtime) 1067233294Sstas{ 1068233294Sstas krb5_acc *a = ACACHE(id); 1069233294Sstas cc_int32 error; 1070233294Sstas cc_time_t t; 1071233294Sstas 1072233294Sstas if (a->ccache == NULL) { 1073233294Sstas krb5_set_error_message(context, KRB5_CC_NOTFOUND, 1074233294Sstas N_("No API credential found", "")); 1075233294Sstas return KRB5_CC_NOTFOUND; 1076233294Sstas } 1077233294Sstas 1078233294Sstas error = (*a->ccache->func->get_change_time)(a->ccache, &t); 1079233294Sstas if (error) 1080233294Sstas return translate_cc_error(context, error); 1081233294Sstas 1082233294Sstas *mtime = t; 1083233294Sstas 1084233294Sstas return 0; 1085233294Sstas} 1086233294Sstas 1087178825Sdfr/** 1088178825Sdfr * Variable containing the API based credential cache implemention. 1089178825Sdfr * 1090178825Sdfr * @ingroup krb5_ccache 1091178825Sdfr */ 1092178825Sdfr 1093233294SstasKRB5_LIB_VARIABLE const krb5_cc_ops krb5_acc_ops = { 1094233294Sstas KRB5_CC_OPS_VERSION, 1095178825Sdfr "API", 1096178825Sdfr acc_get_name, 1097178825Sdfr acc_resolve, 1098178825Sdfr acc_gen_new, 1099178825Sdfr acc_initialize, 1100178825Sdfr acc_destroy, 1101178825Sdfr acc_close, 1102178825Sdfr acc_store_cred, 1103178825Sdfr NULL, /* acc_retrieve */ 1104178825Sdfr acc_get_principal, 1105178825Sdfr acc_get_first, 1106178825Sdfr acc_get_next, 1107178825Sdfr acc_end_get, 1108178825Sdfr acc_remove_cred, 1109178825Sdfr acc_set_flags, 1110178825Sdfr acc_get_version, 1111178825Sdfr acc_get_cache_first, 1112178825Sdfr acc_get_cache_next, 1113178825Sdfr acc_end_cache_get, 1114178825Sdfr acc_move, 1115233294Sstas acc_get_default_name, 1116233294Sstas acc_set_default, 1117233294Sstas acc_lastchange, 1118233294Sstas NULL, 1119233294Sstas NULL, 1120178825Sdfr}; 1121233294Sstas 1122233294Sstas#endif 1123