HEIMDAL: move code from source4/heimdal* to third_party/heimdal*
[samba.git] / source4 / heimdal / lib / gssapi / krb5 / inquire_cred.c
diff --git a/source4/heimdal/lib/gssapi/krb5/inquire_cred.c b/source4/heimdal/lib/gssapi/krb5/inquire_cred.c
deleted file mode 100644 (file)
index b7b67f7..0000000
+++ /dev/null
@@ -1,225 +0,0 @@
-/*
- * Copyright (c) 1997, 2003 Kungliga Tekniska Högskolan
- * (Royal Institute of Technology, Stockholm, Sweden).
- * All rights reserved.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- *
- * 1. Redistributions of source code must retain the above copyright
- *    notice, this list of conditions and the following disclaimer.
- *
- * 2. Redistributions in binary form must reproduce the above copyright
- *    notice, this list of conditions and the following disclaimer in the
- *    documentation and/or other materials provided with the distribution.
- *
- * 3. Neither the name of the Institute nor the names of its contributors
- *    may be used to endorse or promote products derived from this software
- *    without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
- * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
- * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
- * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
- * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
- * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
- * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
- * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
- * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
- * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
- * SUCH DAMAGE.
- */
-
-#include "gsskrb5_locl.h"
-
-OM_uint32 GSSAPI_CALLCONV _gsskrb5_inquire_cred
-(OM_uint32 * minor_status,
- gss_const_cred_id_t cred_handle,
- gss_name_t * output_name,
- OM_uint32 * lifetime,
- gss_cred_usage_t * cred_usage,
- gss_OID_set * mechanisms
-    )
-{
-    krb5_context context;
-    gss_cred_id_t aqcred_init = GSS_C_NO_CREDENTIAL;
-    gss_cred_id_t aqcred_accept = GSS_C_NO_CREDENTIAL;
-    gsskrb5_cred cred = (gsskrb5_cred)cred_handle;
-    gss_OID_set amechs = GSS_C_NO_OID_SET;
-    gss_OID_set imechs = GSS_C_NO_OID_SET;
-    OM_uint32 junk;
-    OM_uint32 aminor;
-    OM_uint32 ret;
-    OM_uint32 aret;
-    OM_uint32 alife = GSS_C_INDEFINITE;
-    OM_uint32 ilife = GSS_C_INDEFINITE;
-
-    /*
-     * XXX This function is more complex than it has to be.  It should call
-     * _gsskrb5_inquire_cred_by_mech() twice and merge the results in the
-     * cred_handle == GSS_C_NO_CREDENTIAL case, but since
-     * _gsskrb5_inquire_cred_by_mech() is implemented in terms of this
-     * function, first we must fix _gsskrb5_inquire_cred_by_mech().
-     */
-
-    *minor_status = 0;
-
-    if (output_name)
-        *output_name = GSS_C_NO_NAME;
-    if (cred_usage)
-        *cred_usage = GSS_C_BOTH; /* There's no NONE */
-    if (mechanisms)
-        *mechanisms = GSS_C_NO_OID_SET;
-
-    GSSAPI_KRB5_INIT (&context);
-
-    if (cred_handle == GSS_C_NO_CREDENTIAL) {
-        /*
-         * From here to the end of this if we should refactor into a separate
-         * function.
-         */
-        /* Get the info for the default ACCEPT credential */
-        aret = _gsskrb5_acquire_cred_from(&aminor,
-                                         GSS_C_NO_NAME,
-                                         GSS_C_INDEFINITE,
-                                         GSS_C_NO_OID_SET,
-                                         GSS_C_ACCEPT,
-                                         GSS_C_NO_CRED_STORE,
-                                         &aqcred_accept,
-                                         NULL,
-                                         NULL);
-        if (aret == GSS_S_COMPLETE) {
-            aret = _gsskrb5_inquire_cred(&aminor,
-                                        aqcred_accept,
-                                        output_name,
-                                        &alife,
-                                        NULL,
-                                        &amechs);
-            (void) _gsskrb5_release_cred(&junk, &aqcred_accept);
-            if (aret == GSS_S_COMPLETE) {
-                output_name = NULL; /* Can't merge names; output only one */
-                if (cred_usage)
-                    *cred_usage = GSS_C_ACCEPT;
-                if (lifetime)
-                    *lifetime = alife;
-                if (mechanisms) {
-                    *mechanisms = amechs;
-                    amechs = GSS_C_NO_OID_SET;
-                }
-                (void) gss_release_oid_set(&junk, &amechs);
-            } else if (aret != GSS_S_NO_CRED) {
-                *minor_status = aminor;
-                return aret;
-            } else {
-                alife = GSS_C_INDEFINITE;
-            }
-        }
-
-        /* Get the info for the default INITIATE credential */
-        ret = _gsskrb5_acquire_cred_from(minor_status,
-                                        GSS_C_NO_NAME,
-                                        GSS_C_INDEFINITE,
-                                        GSS_C_NO_OID_SET,
-                                        GSS_C_INITIATE,
-                                        GSS_C_NO_CRED_STORE,
-                                        &aqcred_init,
-                                        NULL,
-                                        NULL);
-        if (ret == GSS_S_COMPLETE) {
-            ret = _gsskrb5_inquire_cred(minor_status,
-                                        aqcred_init,
-                                        output_name,
-                                        &ilife,
-                                        NULL,
-                                        &imechs);
-            (void) _gsskrb5_release_cred(&junk, &aqcred_init);
-            if (ret == GSS_S_COMPLETE) {
-                /*
-                 * Merge results for INITIATE with ACCEPT if we had ACCEPT and
-                 * for those outputs that are desired.
-                 */
-                if (cred_usage) {
-                    *cred_usage = (*cred_usage == GSS_C_ACCEPT) ?
-                        GSS_C_BOTH : GSS_C_INITIATE;
-                }
-                if (lifetime)
-                    *lifetime = min(alife, ilife);
-                if (mechanisms) {
-                    /*
-                     * This is just one mechanism (IAKERB and such would live
-                     * elsewhere).  imechs will be equal to amechs, though not
-                     * ==.
-                     */
-                    if (aret != GSS_S_COMPLETE) {
-                        *mechanisms = imechs;
-                        imechs = GSS_C_NO_OID_SET;
-                    }
-                }
-                (void) gss_release_oid_set(&junk, &amechs);
-            } else if (ret != GSS_S_NO_CRED) {
-                *minor_status = aminor;
-                return aret;
-            }
-        }
-
-        if (aret != GSS_S_COMPLETE && ret != GSS_S_COMPLETE) {
-            *minor_status = aminor;
-            return aret;
-        }
-        *minor_status = 0; /* Even though 0 is not specified to be special */
-        return GSS_S_COMPLETE;
-    }
-
-    HEIMDAL_MUTEX_lock(&cred->cred_id_mutex);
-
-    if (output_name != NULL) {
-        if (cred->principal != NULL) {
-            gss_name_t name = (gss_name_t)cred->principal;
-            ret = _gsskrb5_duplicate_name(minor_status, name, output_name);
-            if (ret)
-                goto out;
-        } else if (cred->usage == GSS_C_ACCEPT) {
-            /*
-             * Keytab case, princ may not be set (yet, ever, whatever).
-             *
-             * We used to unconditionally output the krb5_sname_to_principal()
-             * of the host service for the hostname, but we didn't know if we
-             * had keytab entries for it, so it was incorrect.  We can't be
-             * breaking anything in tree by outputting GSS_C_NO_NAME, but we
-             * might be breaking other callers.
-             */
-            *output_name = GSS_C_NO_NAME;
-        } else {
-            /* This shouldn't happen */
-            *minor_status = KRB5_NOCREDS_SUPPLIED; /* XXX */
-            ret = GSS_S_NO_CRED;
-            goto out;
-        }
-    }
-    if (lifetime != NULL) {
-        ret = _gsskrb5_lifetime_left(minor_status,
-                                     context,
-                                     cred->endtime,
-                                     lifetime);
-        if (ret)
-            goto out;
-    }
-    if (cred_usage != NULL)
-        *cred_usage = cred->usage;
-    if (mechanisms != NULL) {
-        ret = gss_create_empty_oid_set(minor_status, mechanisms);
-        if (ret)
-            goto out;
-        ret = gss_add_oid_set_member(minor_status,
-                                     &cred->mechanisms->elements[0],
-                                     mechanisms);
-        if (ret)
-            goto out;
-    }
-    ret = GSS_S_COMPLETE;
-
-out:
-    HEIMDAL_MUTEX_unlock(&cred->cred_id_mutex);
-    return ret;
-}