1181344Sdfr/*-
2181344Sdfr * Copyright (c) 2008 Isilon Inc http://www.isilon.com/
3181344Sdfr * Authors: Doug Rabson <dfr@rabson.org>
4181344Sdfr * Developed with Red Inc: Alfred Perlstein <alfred@freebsd.org>
5181344Sdfr *
6181344Sdfr * Redistribution and use in source and binary forms, with or without
7181344Sdfr * modification, are permitted provided that the following conditions
8181344Sdfr * are met:
9181344Sdfr * 1. Redistributions of source code must retain the above copyright
10181344Sdfr *    notice, this list of conditions and the following disclaimer.
11181344Sdfr * 2. Redistributions in binary form must reproduce the above copyright
12181344Sdfr *    notice, this list of conditions and the following disclaimer in the
13181344Sdfr *    documentation and/or other materials provided with the distribution.
14181344Sdfr *
15181344Sdfr * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
16181344Sdfr * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
17181344Sdfr * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
18181344Sdfr * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
19181344Sdfr * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
20181344Sdfr * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
21181344Sdfr * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
22181344Sdfr * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
23181344Sdfr * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
24181344Sdfr * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
25181344Sdfr * SUCH DAMAGE.
26181344Sdfr */
27181344Sdfr/* $FreeBSD: releng/10.3/kerberos5/lib/libgssapi_krb5/pname_to_uid.c 250177 2013-05-02 12:52:49Z rmacklem $ */
28181344Sdfr
29250177Srmacklem#include <errno.h>
30181344Sdfr#include <pwd.h>
31181344Sdfr
32181344Sdfr#include "krb5/gsskrb5_locl.h"
33181344Sdfr
34181344SdfrOM_uint32
35181344Sdfr_gsskrb5_pname_to_uid(OM_uint32 *minor_status, const gss_name_t pname,
36181344Sdfr    const gss_OID mech, uid_t *uidp)
37181344Sdfr{
38181344Sdfr	krb5_context context;
39181344Sdfr	krb5_const_principal name = (krb5_const_principal) pname;
40181344Sdfr	krb5_error_code kret;
41250177Srmacklem	char lname[MAXLOGNAME + 1], buf[1024], *bufp;
42181344Sdfr	struct passwd pwd, *pw;
43250177Srmacklem	size_t buflen;
44250177Srmacklem	int error;
45250177Srmacklem	OM_uint32 ret;
46250177Srmacklem	static size_t buflen_hint = 1024;
47181344Sdfr
48181344Sdfr	GSSAPI_KRB5_INIT (&context);
49181344Sdfr
50181344Sdfr	kret = krb5_aname_to_localname(context, name, sizeof(lname), lname);
51181344Sdfr	if (kret) {
52181344Sdfr		*minor_status = kret;
53181344Sdfr		return (GSS_S_FAILURE);
54181344Sdfr	}
55181344Sdfr
56181344Sdfr	*minor_status = 0;
57250177Srmacklem	buflen = buflen_hint;
58250177Srmacklem	for (;;) {
59250177Srmacklem		pw = NULL;
60250177Srmacklem		bufp = buf;
61250177Srmacklem		if (buflen > sizeof(buf))
62250177Srmacklem			bufp = malloc(buflen);
63250177Srmacklem		if (bufp == NULL)
64250177Srmacklem			break;
65250177Srmacklem		error = getpwnam_r(lname, &pwd, bufp, buflen, &pw);
66250177Srmacklem		if (error != ERANGE)
67250177Srmacklem			break;
68250177Srmacklem		if (buflen > sizeof(buf))
69250177Srmacklem			free(bufp);
70250177Srmacklem		buflen += 1024;
71250177Srmacklem		if (buflen > buflen_hint)
72250177Srmacklem			buflen_hint = buflen;
73250177Srmacklem	}
74181344Sdfr	if (pw) {
75181344Sdfr		*uidp = pw->pw_uid;
76250177Srmacklem		ret = GSS_S_COMPLETE;
77181344Sdfr	} else {
78250177Srmacklem		ret = GSS_S_FAILURE;
79181344Sdfr	}
80250177Srmacklem	if (bufp != NULL && buflen > sizeof(buf))
81250177Srmacklem		free(bufp);
82250177Srmacklem	return (ret);
83181344Sdfr}
84