- Formalize the TYPE:collection_name:subsidiary_name naming scheme for
   ccaches in ccache collections
    - KEYRING: ccaches are weird because they have one more optional field: the
      "anchor", so rather than just assume a naming convention everywhere, we
      add new functions as well
 - Add krb5_cc_{resolve,default}_sub() that allows one to specify a
   "subsidiary" ccache name in a collection separately from the
   collection name
 - Add krb5_cc_{resolve,default}_for() which take a principal name,
   unparse it, and use it as the subsidiary ccache name (with colons
   replaced)
 - Make kinit use the new interfaces
 - Add missing DIR ccache iteration functionality
 - Revamps test_cc
 - Add krb5_cc_get_collection() and krb5_cc_get_subsidiary()
 - Bump the ccops SPI version number
 - Add gss_store_cred_into2()
 - Make MEMORY:anonymous not linked into the global MEMORY ccache
   collection, and uses this for delegated cred handles
TBD:
 - Split this up into a krb5 change and gss mech_krb5 change?
 - Add krb5_cc_init_and_store() utility, per Greg's suggestion?
		
	
		
			
				
	
	
		
			220 lines
		
	
	
		
			7.1 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			220 lines
		
	
	
		
			7.1 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
/*
 | 
						|
 * Copyright (c) 2015 Cryptonector LLC.
 | 
						|
 * All rights reserved.
 | 
						|
 *
 | 
						|
 * Redistribution and use in source and binary forms, with or without
 | 
						|
 * modification, are permitted provided that the following conditions
 | 
						|
 * are met:
 | 
						|
 *
 | 
						|
 * 1. Redistributions of source code must retain the above copyright
 | 
						|
 *    notice, this list of conditions and the following disclaimer.
 | 
						|
 *
 | 
						|
 * 2. Redistributions in binary form must reproduce the above copyright
 | 
						|
 *    notice, this list of conditions and the following disclaimer in the
 | 
						|
 *    documentation and/or other materials provided with the distribution.
 | 
						|
 *
 | 
						|
 * 3. The name Cryptonector LLC may not be used to endorse or promote
 | 
						|
 *    products derived from this software without specific prior written
 | 
						|
 *    permission.
 | 
						|
 *
 | 
						|
 * THIS SOFTWARE IS PROVIDED BY KTH AND ITS CONTRIBUTORS ``AS IS'' AND ANY
 | 
						|
 * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | 
						|
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
 | 
						|
 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL KTH OR ITS CONTRIBUTORS BE
 | 
						|
 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
 | 
						|
 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
 | 
						|
 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
 | 
						|
 * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
 | 
						|
 * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
 | 
						|
 * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
 | 
						|
 * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 | 
						|
 */
 | 
						|
 | 
						|
#ifdef HAVE_CONFIG_H
 | 
						|
#include <config.h>
 | 
						|
#endif
 | 
						|
 | 
						|
#include <roken.h>
 | 
						|
#include <stdio.h>
 | 
						|
#include <stdlib.h>
 | 
						|
#include <string.h>
 | 
						|
#include <stdarg.h>
 | 
						|
#include <gssapi.h>
 | 
						|
#include <err.h>
 | 
						|
#include <getarg.h>
 | 
						|
 | 
						|
static void
 | 
						|
print_gss_err(OM_uint32 stat, int status_type, gss_OID mech)
 | 
						|
{
 | 
						|
    gss_buffer_desc str;
 | 
						|
    OM_uint32 maj;
 | 
						|
    OM_uint32 min;
 | 
						|
    OM_uint32 msg_ctx = 0;
 | 
						|
    int first = 1;
 | 
						|
 | 
						|
    do {
 | 
						|
        maj = gss_display_status(&min, stat, status_type, mech, &msg_ctx,
 | 
						|
                                 &str);
 | 
						|
        if (maj != GSS_S_COMPLETE) {
 | 
						|
            fprintf(stderr, "Error displaying GSS %s error (%lu): %lu, %lu",
 | 
						|
                    status_type == GSS_C_GSS_CODE ? "major" : "minor",
 | 
						|
                    (unsigned long)stat, (unsigned long)maj,
 | 
						|
                    (unsigned long)min);
 | 
						|
            return;
 | 
						|
        }
 | 
						|
        if (first) {
 | 
						|
            fprintf(stderr, "GSS %s error: %.*s\n",
 | 
						|
                    status_type == GSS_C_GSS_CODE ? "major" : "minor",
 | 
						|
                    (int)str.length, (char *)str.value);
 | 
						|
            first = 0;
 | 
						|
        } else {
 | 
						|
            fprintf(stderr, "\t%.*s\n", (int)str.length, (char *)str.value);
 | 
						|
        }
 | 
						|
        gss_release_buffer(&min, &str);
 | 
						|
    } while (msg_ctx != 0);
 | 
						|
}
 | 
						|
 | 
						|
static void
 | 
						|
print_gss_errs(OM_uint32 major, OM_uint32 minor, gss_OID mech)
 | 
						|
{
 | 
						|
    print_gss_err(major, GSS_C_GSS_CODE, GSS_C_NO_OID);
 | 
						|
    print_gss_err(major, GSS_C_MECH_CODE, mech);
 | 
						|
}
 | 
						|
 | 
						|
static void
 | 
						|
gss_err(int exitval, OM_uint32 major, OM_uint32 minor, gss_OID mech,
 | 
						|
        const char *fmt, ...)
 | 
						|
{
 | 
						|
    va_list args;
 | 
						|
 | 
						|
    va_start(args, fmt);
 | 
						|
    vwarnx(fmt, args);
 | 
						|
    va_end(args);
 | 
						|
    print_gss_errs(major, minor, mech);
 | 
						|
    exit(exitval);
 | 
						|
}
 | 
						|
 | 
						|
static int version_flag         = 0;
 | 
						|
static int help_flag            = 0;
 | 
						|
static int env_flag             = 0;
 | 
						|
static int def_flag             = 0;
 | 
						|
static int overwrite_flag       = 0;
 | 
						|
 | 
						|
static struct getargs args[] = {
 | 
						|
    {"version", 0,      arg_flag,       &version_flag, "print version", NULL },
 | 
						|
    {"help",    0,      arg_flag,       &help_flag,  NULL, NULL },
 | 
						|
    {"env",     'e',    arg_flag,       &env_flag,
 | 
						|
     "output env settings", NULL },
 | 
						|
    {"default", 0,      arg_flag,       &def_flag,
 | 
						|
     "switch credential store default principal", NULL },
 | 
						|
    {"overwrite", 0,    arg_flag,       &overwrite_flag,
 | 
						|
     "overwrite matching credential", NULL },
 | 
						|
};
 | 
						|
 | 
						|
static void
 | 
						|
usage(int ret)
 | 
						|
{
 | 
						|
    arg_printusage(args, sizeof(args)/sizeof(*args),
 | 
						|
                   NULL, "from_ccache to_ccache");
 | 
						|
    exit(ret);
 | 
						|
}
 | 
						|
 | 
						|
int
 | 
						|
main(int argc, char **argv)
 | 
						|
{
 | 
						|
    OM_uint32 major, minor;
 | 
						|
    gss_cred_id_t from_cred = GSS_C_NO_CREDENTIAL;
 | 
						|
    gss_cred_id_t to_cred = GSS_C_NO_CREDENTIAL;
 | 
						|
    gss_cred_id_t cred = GSS_C_NO_CREDENTIAL;
 | 
						|
    gss_key_value_element_desc from_elements, to_elements;
 | 
						|
    gss_key_value_set_desc from, to;
 | 
						|
    gss_buffer_set_t env = GSS_C_NO_BUFFER_SET;
 | 
						|
    OM_uint32 store_flags = 0;
 | 
						|
    int optidx = 0;
 | 
						|
 | 
						|
    setprogname(argv[0]);
 | 
						|
    if (getarg(args, sizeof(args) / sizeof(args[0]), argc, argv, &optidx))
 | 
						|
        usage(1);
 | 
						|
 | 
						|
    if (help_flag)
 | 
						|
        usage (0);
 | 
						|
 | 
						|
    if (version_flag){
 | 
						|
        print_version(NULL);
 | 
						|
        exit(0);
 | 
						|
    }
 | 
						|
 | 
						|
    if (def_flag)
 | 
						|
        store_flags |= GSS_C_STORE_CRED_DEFAULT;
 | 
						|
    if (overwrite_flag)
 | 
						|
        store_flags |= GSS_C_STORE_CRED_OVERWRITE;
 | 
						|
 | 
						|
    argc -= optidx;
 | 
						|
    argv += optidx;
 | 
						|
 | 
						|
    if (argc < 2)
 | 
						|
        errx(1, "required arguments missing");
 | 
						|
    if (argc > 2)
 | 
						|
        errx(1, "too many arguments");
 | 
						|
 | 
						|
    from_elements.key = "ccache";
 | 
						|
    from_elements.value = argv[0];
 | 
						|
    from.count = 1;
 | 
						|
    from.elements = &from_elements;
 | 
						|
 | 
						|
    to_elements.key = "ccache";
 | 
						|
    to_elements.value = argv[1];
 | 
						|
    to.count = 1;
 | 
						|
    to.elements = &to_elements;
 | 
						|
 | 
						|
    major = gss_add_cred_from(&minor, GSS_C_NO_CREDENTIAL, GSS_C_NO_NAME,
 | 
						|
			      GSS_KRB5_MECHANISM, GSS_C_INITIATE,
 | 
						|
			      GSS_C_INDEFINITE, GSS_C_INDEFINITE,
 | 
						|
			      &from, &from_cred, NULL, NULL, NULL);
 | 
						|
    if (major != GSS_S_COMPLETE)
 | 
						|
        gss_err(1, major, minor, GSS_KRB5_MECHANISM,
 | 
						|
                "failed to acquire creds from %s", argv[0]);
 | 
						|
 | 
						|
    major = gss_store_cred_into2(&minor, from_cred, GSS_C_INITIATE,
 | 
						|
                                 GSS_KRB5_MECHANISM, store_flags, &to, NULL,
 | 
						|
                                 NULL, env_flag ? &env : NULL);
 | 
						|
    if (major != GSS_S_COMPLETE)
 | 
						|
        gss_err(1, major, minor, GSS_KRB5_MECHANISM,
 | 
						|
                "failed to store creds into %s", argv[1]);
 | 
						|
 | 
						|
    if (env_flag) {
 | 
						|
        size_t i;
 | 
						|
        int got_krb5ccname = 0;
 | 
						|
 | 
						|
        if (env == GSS_C_NO_BUFFER_SET)
 | 
						|
            warnx("No environment settings");
 | 
						|
 | 
						|
        for (i = 0; env != GSS_C_NO_BUFFER_SET && i < env->count; i++) {
 | 
						|
            got_krb5ccname = got_krb5ccname ||
 | 
						|
                (env->elements[i].length > sizeof("KRB5CCNAME=") &&
 | 
						|
                 strncmp((const char *)env->elements[i].value, "KRB5CCNAME=",
 | 
						|
                         sizeof("KRB5CCNAME=") - 1) == 0);
 | 
						|
            printf("%.*s\n", (int)env->elements[i].length,
 | 
						|
                   (const char *)env->elements[i].value);
 | 
						|
        }
 | 
						|
        (void) gss_release_buffer_set(&minor, &env);
 | 
						|
 | 
						|
        if (!got_krb5ccname)
 | 
						|
            errx(1, "KRB5CCNAME environment variable not set by "
 | 
						|
                 "gss_store_cred_into2()");
 | 
						|
    }
 | 
						|
 | 
						|
    (void) gss_release_cred(&minor, &from_cred);
 | 
						|
    (void) gss_release_cred(&minor, &to_cred);
 | 
						|
 | 
						|
    major = gss_add_cred(&minor, GSS_C_NO_CREDENTIAL, GSS_C_NO_NAME,
 | 
						|
                         GSS_KRB5_MECHANISM, GSS_C_INITIATE, GSS_C_INDEFINITE,
 | 
						|
                         GSS_C_INDEFINITE, &cred, NULL, NULL, NULL);
 | 
						|
    if (major != GSS_S_COMPLETE)
 | 
						|
        gss_err(1, major, minor, GSS_KRB5_MECHANISM,
 | 
						|
                "failed to acquire creds from %s", argv[1]);
 | 
						|
    (void) gss_release_cred(&minor, &cred);
 | 
						|
 | 
						|
    return 0;
 | 
						|
}
 |