1181344Sdfr/*- 2181344Sdfr * Copyright (c) 2008 Isilon Inc http://www.isilon.com/ 3181344Sdfr * Authors: Doug Rabson <dfr@rabson.org> 4181344Sdfr * Developed with Red Inc: Alfred Perlstein <alfred@freebsd.org> 5181344Sdfr * 6181344Sdfr * Redistribution and use in source and binary forms, with or without 7181344Sdfr * modification, are permitted provided that the following conditions 8181344Sdfr * are met: 9181344Sdfr * 1. Redistributions of source code must retain the above copyright 10181344Sdfr * notice, this list of conditions and the following disclaimer. 11181344Sdfr * 2. Redistributions in binary form must reproduce the above copyright 12181344Sdfr * notice, this list of conditions and the following disclaimer in the 13181344Sdfr * documentation and/or other materials provided with the distribution. 14181344Sdfr * 15181344Sdfr * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 16181344Sdfr * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 17181344Sdfr * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 18181344Sdfr * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 19181344Sdfr * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 20181344Sdfr * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 21181344Sdfr * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 22181344Sdfr * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 23181344Sdfr * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 24181344Sdfr * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 25181344Sdfr * SUCH DAMAGE. 26181344Sdfr */ 27181344Sdfr/* $FreeBSD: releng/10.3/kerberos5/lib/libgssapi_krb5/pname_to_uid.c 250177 2013-05-02 12:52:49Z rmacklem $ */ 28181344Sdfr 29250177Srmacklem#include <errno.h> 30181344Sdfr#include <pwd.h> 31181344Sdfr 32181344Sdfr#include "krb5/gsskrb5_locl.h" 33181344Sdfr 34181344SdfrOM_uint32 35181344Sdfr_gsskrb5_pname_to_uid(OM_uint32 *minor_status, const gss_name_t pname, 36181344Sdfr const gss_OID mech, uid_t *uidp) 37181344Sdfr{ 38181344Sdfr krb5_context context; 39181344Sdfr krb5_const_principal name = (krb5_const_principal) pname; 40181344Sdfr krb5_error_code kret; 41250177Srmacklem char lname[MAXLOGNAME + 1], buf[1024], *bufp; 42181344Sdfr struct passwd pwd, *pw; 43250177Srmacklem size_t buflen; 44250177Srmacklem int error; 45250177Srmacklem OM_uint32 ret; 46250177Srmacklem static size_t buflen_hint = 1024; 47181344Sdfr 48181344Sdfr GSSAPI_KRB5_INIT (&context); 49181344Sdfr 50181344Sdfr kret = krb5_aname_to_localname(context, name, sizeof(lname), lname); 51181344Sdfr if (kret) { 52181344Sdfr *minor_status = kret; 53181344Sdfr return (GSS_S_FAILURE); 54181344Sdfr } 55181344Sdfr 56181344Sdfr *minor_status = 0; 57250177Srmacklem buflen = buflen_hint; 58250177Srmacklem for (;;) { 59250177Srmacklem pw = NULL; 60250177Srmacklem bufp = buf; 61250177Srmacklem if (buflen > sizeof(buf)) 62250177Srmacklem bufp = malloc(buflen); 63250177Srmacklem if (bufp == NULL) 64250177Srmacklem break; 65250177Srmacklem error = getpwnam_r(lname, &pwd, bufp, buflen, &pw); 66250177Srmacklem if (error != ERANGE) 67250177Srmacklem break; 68250177Srmacklem if (buflen > sizeof(buf)) 69250177Srmacklem free(bufp); 70250177Srmacklem buflen += 1024; 71250177Srmacklem if (buflen > buflen_hint) 72250177Srmacklem buflen_hint = buflen; 73250177Srmacklem } 74181344Sdfr if (pw) { 75181344Sdfr *uidp = pw->pw_uid; 76250177Srmacklem ret = GSS_S_COMPLETE; 77181344Sdfr } else { 78250177Srmacklem ret = GSS_S_FAILURE; 79181344Sdfr } 80250177Srmacklem if (bufp != NULL && buflen > sizeof(buf)) 81250177Srmacklem free(bufp); 82250177Srmacklem return (ret); 83181344Sdfr} 84