xref: /minix3/crypto/external/bsd/heimdal/dist/lib/gssapi/netlogon/add_cred.c (revision ebfedea0ce5bbe81e252ddf32d732e40fb633fae)
1 /*	$NetBSD: add_cred.c,v 1.1.1.1 2011/04/13 18:14:47 elric Exp $	*/
2 
3 /*
4  * Copyright (c) 2010 Kungliga Tekniska Högskolan
5  * (Royal Institute of Technology, Stockholm, Sweden).
6  * All rights reserved.
7  *
8  * Portions Copyright (c) 2010 Apple Inc. All rights reserved.
9  *
10  * Redistribution and use in source and binary forms, with or without
11  * modification, are permitted provided that the following conditions
12  * are met:
13  *
14  * 1. Redistributions of source code must retain the above copyright
15  *    notice, this list of conditions and the following disclaimer.
16  *
17  * 2. Redistributions in binary form must reproduce the above copyright
18  *    notice, this list of conditions and the following disclaimer in the
19  *    documentation and/or other materials provided with the distribution.
20  *
21  * 3. Neither the name of the Institute nor the names of its contributors
22  *    may be used to endorse or promote products derived from this software
23  *    without specific prior written permission.
24  *
25  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
26  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
27  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
28  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
29  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
30  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
31  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
32  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
33  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
34  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
35  * SUCH DAMAGE.
36  */
37 
38 #include "netlogon.h"
39 
_netlogon_add_cred(OM_uint32 * minor_status,const gss_cred_id_t input_cred_handle,const gss_name_t desired_name,const gss_OID desired_mech,gss_cred_usage_t cred_usage,OM_uint32 initiator_time_req,OM_uint32 acceptor_time_req,gss_cred_id_t * output_cred_handle,gss_OID_set * actual_mechs,OM_uint32 * initiator_time_rec,OM_uint32 * acceptor_time_rec)40 OM_uint32 _netlogon_add_cred (
41      OM_uint32           *minor_status,
42      const gss_cred_id_t input_cred_handle,
43      const gss_name_t    desired_name,
44      const gss_OID       desired_mech,
45      gss_cred_usage_t    cred_usage,
46      OM_uint32           initiator_time_req,
47      OM_uint32           acceptor_time_req,
48      gss_cred_id_t       *output_cred_handle,
49      gss_OID_set         *actual_mechs,
50      OM_uint32           *initiator_time_rec,
51      OM_uint32           *acceptor_time_rec)
52 {
53     OM_uint32 ret;
54     int equal;
55     const gssnetlogon_cred src = (const gssnetlogon_cred)input_cred_handle;
56     gssnetlogon_cred dst;
57 
58     if (desired_name != GSS_C_NO_NAME) {
59         if (input_cred_handle != GSS_C_NO_CREDENTIAL) {
60             ret = _netlogon_compare_name(minor_status, desired_name,
61                                          (gss_name_t)src->Name, &equal);
62             if (GSS_ERROR(ret))
63                 return ret;
64 
65             if (!equal)
66                 return GSS_S_BAD_NAME;
67         }
68     }
69 
70     ret = _netlogon_acquire_cred(minor_status,
71                                  input_cred_handle ? (gss_name_t)src->Name : desired_name,
72                                  initiator_time_req, GSS_C_NO_OID_SET, cred_usage,
73                                  output_cred_handle, actual_mechs, initiator_time_rec);
74     if (GSS_ERROR(ret))
75         return ret;
76 
77     dst = (gssnetlogon_cred)*output_cred_handle;
78 
79     if (src != NULL) {
80         dst->SignatureAlgorithm = src->SignatureAlgorithm;
81         dst->SealAlgorithm = src->SealAlgorithm;
82 
83         memcpy(dst->SessionKey, src->SessionKey, sizeof(src->SessionKey));
84     }
85 
86     if (acceptor_time_rec != NULL)
87         *acceptor_time_rec = 0;
88 
89     return GSS_S_COMPLETE;
90 }
91 
92