client.c revision 1.1.1.1
1/* $NetBSD: client.c,v 1.1.1.1 2011/04/13 18:14:36 elric Exp $ */ 2 3/* 4 * Copyright (c) 2005, PADL Software Pty Ltd. 5 * All rights reserved. 6 * 7 * Portions Copyright (c) 2009 Apple Inc. All rights reserved. 8 * 9 * Redistribution and use in source and binary forms, with or without 10 * modification, are permitted provided that the following conditions 11 * are met: 12 * 13 * 1. Redistributions of source code must retain the above copyright 14 * notice, this list of conditions and the following disclaimer. 15 * 16 * 2. Redistributions in binary form must reproduce the above copyright 17 * notice, this list of conditions and the following disclaimer in the 18 * documentation and/or other materials provided with the distribution. 19 * 20 * 3. Neither the name of PADL Software nor the names of its contributors 21 * may be used to endorse or promote products derived from this software 22 * without specific prior written permission. 23 * 24 * THIS SOFTWARE IS PROVIDED BY PADL SOFTWARE AND CONTRIBUTORS ``AS IS'' AND 25 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 26 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 27 * ARE DISCLAIMED. IN NO EVENT SHALL PADL SOFTWARE OR CONTRIBUTORS BE LIABLE 28 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 29 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 30 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 31 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 32 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 33 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 34 * SUCH DAMAGE. 35 */ 36 37#include "kcm_locl.h" 38#include <pwd.h> 39 40krb5_error_code 41kcm_ccache_resolve_client(krb5_context context, 42 kcm_client *client, 43 kcm_operation opcode, 44 const char *name, 45 kcm_ccache *ccache) 46{ 47 krb5_error_code ret; 48 49 ret = kcm_ccache_resolve(context, name, ccache); 50 if (ret) { 51 kcm_log(1, "Failed to resolve cache %s: %s", 52 name, krb5_get_err_text(context, ret)); 53 return ret; 54 } 55 56 ret = kcm_access(context, client, opcode, *ccache); 57 if (ret) { 58 ret = KRB5_FCC_NOFILE; /* don't disclose */ 59 kcm_release_ccache(context, *ccache); 60 } 61 62 return ret; 63} 64 65krb5_error_code 66kcm_ccache_destroy_client(krb5_context context, 67 kcm_client *client, 68 const char *name) 69{ 70 krb5_error_code ret; 71 kcm_ccache ccache; 72 73 ret = kcm_ccache_resolve(context, name, &ccache); 74 if (ret) { 75 kcm_log(1, "Failed to resolve cache %s: %s", 76 name, krb5_get_err_text(context, ret)); 77 return ret; 78 } 79 80 ret = kcm_access(context, client, KCM_OP_DESTROY, ccache); 81 kcm_cleanup_events(context, ccache); 82 kcm_release_ccache(context, ccache); 83 if (ret) 84 return ret; 85 86 return kcm_ccache_destroy(context, name); 87} 88 89krb5_error_code 90kcm_ccache_new_client(krb5_context context, 91 kcm_client *client, 92 const char *name, 93 kcm_ccache *ccache_p) 94{ 95 krb5_error_code ret; 96 kcm_ccache ccache; 97 98 /* We insist the ccache name starts with UID or UID: */ 99 if (name_constraints != 0) { 100 char prefix[64]; 101 size_t prefix_len; 102 int bad = 1; 103 104 snprintf(prefix, sizeof(prefix), "%ld:", (long)client->uid); 105 prefix_len = strlen(prefix); 106 107 if (strncmp(name, prefix, prefix_len) == 0) 108 bad = 0; 109 else { 110 prefix[prefix_len - 1] = '\0'; 111 if (strcmp(name, prefix) == 0) 112 bad = 0; 113 } 114 115 /* Allow root to create badly-named ccaches */ 116 if (bad && !CLIENT_IS_ROOT(client)) 117 return KRB5_CC_BADNAME; 118 } 119 120 ret = kcm_ccache_resolve(context, name, &ccache); 121 if (ret == 0) { 122 if ((ccache->uid != client->uid || 123 ccache->gid != client->gid) && !CLIENT_IS_ROOT(client)) 124 return KRB5_FCC_PERM; 125 } else if (ret != KRB5_FCC_NOFILE && !(CLIENT_IS_ROOT(client) && ret == KRB5_FCC_PERM)) { 126 return ret; 127 } 128 129 if (ret == KRB5_FCC_NOFILE) { 130 ret = kcm_ccache_new(context, name, &ccache); 131 if (ret) { 132 kcm_log(1, "Failed to initialize cache %s: %s", 133 name, krb5_get_err_text(context, ret)); 134 return ret; 135 } 136 137 /* bind to current client */ 138 ccache->uid = client->uid; 139 ccache->gid = client->gid; 140 ccache->session = client->session; 141 } else { 142 ret = kcm_zero_ccache_data(context, ccache); 143 if (ret) { 144 kcm_log(1, "Failed to empty cache %s: %s", 145 name, krb5_get_err_text(context, ret)); 146 kcm_release_ccache(context, ccache); 147 return ret; 148 } 149 kcm_cleanup_events(context, ccache); 150 } 151 152 ret = kcm_access(context, client, KCM_OP_INITIALIZE, ccache); 153 if (ret) { 154 kcm_release_ccache(context, ccache); 155 kcm_ccache_destroy(context, name); 156 return ret; 157 } 158 159 /* 160 * Finally, if the user is root and the cache was created under 161 * another user's name, chown the cache to that user and their 162 * default gid. 163 */ 164 if (CLIENT_IS_ROOT(client)) { 165 unsigned long uid; 166 int matches = sscanf(name,"%ld:",&uid); 167 if (matches == 0) 168 matches = sscanf(name,"%ld",&uid); 169 if (matches == 1) { 170 struct passwd *pwd = getpwuid(uid); 171 if (pwd != NULL) { 172 gid_t gid = pwd->pw_gid; 173 kcm_chown(context, client, ccache, uid, gid); 174 } 175 } 176 } 177 178 *ccache_p = ccache; 179 return 0; 180} 181 182