Blame src/tests/gssapi/t_add_cred.c

Packit fd8b60
/* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */
Packit fd8b60
/* tests/gssapi/t_add_cred.c - gss_add_cred() tests */
Packit fd8b60
/*
Packit fd8b60
 * Copyright (C) 2018 by the Massachusetts Institute of Technology.
Packit fd8b60
 * All rights reserved.
Packit fd8b60
 *
Packit fd8b60
 * Redistribution and use in source and binary forms, with or without
Packit fd8b60
 * modification, are permitted provided that the following conditions
Packit fd8b60
 * are met:
Packit fd8b60
 *
Packit fd8b60
 * * Redistributions of source code must retain the above copyright
Packit fd8b60
 *   notice, this list of conditions and the following disclaimer.
Packit fd8b60
 *
Packit fd8b60
 * * Redistributions in binary form must reproduce the above copyright
Packit fd8b60
 *   notice, this list of conditions and the following disclaimer in
Packit fd8b60
 *   the documentation and/or other materials provided with the
Packit fd8b60
 *   distribution.
Packit fd8b60
 *
Packit fd8b60
 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
Packit fd8b60
 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
Packit fd8b60
 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
Packit fd8b60
 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
Packit fd8b60
 * COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
Packit fd8b60
 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
Packit fd8b60
 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
Packit fd8b60
 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
Packit fd8b60
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
Packit fd8b60
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
Packit fd8b60
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
Packit fd8b60
 * OF THE POSSIBILITY OF SUCH DAMAGE.
Packit fd8b60
 */
Packit fd8b60
Packit fd8b60
/*
Packit fd8b60
 * This program tests the mechglue behavior of gss_add_cred().  It relies on a
Packit fd8b60
 * krb5 keytab and credentials being present so that initiator and acceptor
Packit fd8b60
 * credentials can be acquired, but does not use them to initiate or accept any
Packit fd8b60
 * requests.
Packit fd8b60
 */
Packit fd8b60
Packit fd8b60
#include <stdio.h>
Packit fd8b60
#include <assert.h>
Packit fd8b60
Packit fd8b60
#include "common.h"
Packit fd8b60
Packit fd8b60
int
Packit fd8b60
main()
Packit fd8b60
{
Packit fd8b60
    OM_uint32 minor, major;
Packit fd8b60
    gss_cred_id_t cred1, cred2;
Packit fd8b60
    gss_cred_usage_t usage;
Packit fd8b60
    gss_name_t name;
Packit fd8b60
Packit fd8b60
    /* Check that we get the expected error if we pass neither an input nor an
Packit fd8b60
     * output cred handle. */
Packit fd8b60
    major = gss_add_cred(&minor, GSS_C_NO_CREDENTIAL, GSS_C_NO_NAME,
Packit fd8b60
                         &mech_krb5, GSS_C_INITIATE, GSS_C_INDEFINITE,
Packit fd8b60
                         GSS_C_INDEFINITE, NULL, NULL, NULL, NULL);
Packit fd8b60
    assert(major == (GSS_S_CALL_INACCESSIBLE_WRITE | GSS_S_NO_CRED));
Packit fd8b60
Packit fd8b60
    /* Regression test for #8737: make sure that desired_name is honored when
Packit fd8b60
     * creating a credential by passing in a non-matching name. */
Packit fd8b60
    name = import_name("p:does/not/match@WRONG_REALM");
Packit fd8b60
    major = gss_add_cred(&minor, GSS_C_NO_CREDENTIAL, name, &mech_krb5,
Packit fd8b60
                         GSS_C_INITIATE, GSS_C_INDEFINITE, GSS_C_INDEFINITE,
Packit fd8b60
                         &cred1, NULL, NULL, NULL);
Packit fd8b60
    assert(major == GSS_S_CRED_UNAVAIL);
Packit fd8b60
    gss_release_name(&minor, &name);
Packit fd8b60
Packit fd8b60
    /* Create cred1 with a krb5 initiator cred by passing an output handle but
Packit fd8b60
     * no input handle. */
Packit fd8b60
    major = gss_add_cred(&minor, GSS_C_NO_CREDENTIAL, GSS_C_NO_NAME,
Packit fd8b60
                         &mech_krb5, GSS_C_INITIATE, GSS_C_INDEFINITE,
Packit fd8b60
                         GSS_C_INDEFINITE, &cred1, NULL, NULL, NULL);
Packit fd8b60
    assert(major == GSS_S_COMPLETE);
Packit fd8b60
Packit fd8b60
    /* Verify that cred1 has the expected mechanism creds. */
Packit fd8b60
    major = gss_inquire_cred_by_mech(&minor, cred1, &mech_krb5, NULL, NULL,
Packit fd8b60
                                     NULL, &usage);
Packit fd8b60
    assert(major == GSS_S_COMPLETE && usage == GSS_C_INITIATE);
Packit fd8b60
    major = gss_inquire_cred_by_mech(&minor, cred1, &mech_iakerb, NULL, NULL,
Packit fd8b60
                                     NULL, &usage);
Packit fd8b60
    assert(major == GSS_S_NO_CRED);
Packit fd8b60
Packit fd8b60
    /* Check that we get the expected error if we try to add another krb5 mech
Packit fd8b60
     * cred to cred1. */
Packit fd8b60
    major = gss_add_cred(&minor, cred1, GSS_C_NO_NAME, &mech_krb5,
Packit fd8b60
                         GSS_C_INITIATE, GSS_C_INDEFINITE, GSS_C_INDEFINITE,
Packit fd8b60
                         NULL, NULL, NULL, NULL);
Packit fd8b60
    assert(major == GSS_S_DUPLICATE_ELEMENT);
Packit fd8b60
Packit fd8b60
    /* Add an IAKERB acceptor mech cred to cred1. */
Packit fd8b60
    major = gss_add_cred(&minor, cred1, GSS_C_NO_NAME, &mech_iakerb,
Packit fd8b60
                         GSS_C_ACCEPT, GSS_C_INDEFINITE, GSS_C_INDEFINITE,
Packit fd8b60
                         NULL, NULL, NULL, NULL);
Packit fd8b60
    assert(major == GSS_S_COMPLETE);
Packit fd8b60
Packit fd8b60
    /* Verify cred1 mechanism creds. */
Packit fd8b60
    major = gss_inquire_cred_by_mech(&minor, cred1, &mech_krb5, NULL, NULL,
Packit fd8b60
                                     NULL, &usage);
Packit fd8b60
    assert(major == GSS_S_COMPLETE && usage == GSS_C_INITIATE);
Packit fd8b60
    major = gss_inquire_cred_by_mech(&minor, cred1, &mech_iakerb, NULL, NULL,
Packit fd8b60
                                     NULL, &usage);
Packit fd8b60
    assert(major == GSS_S_COMPLETE && usage == GSS_C_ACCEPT);
Packit fd8b60
Packit fd8b60
    /* Start over with another new cred. */
Packit fd8b60
    gss_release_cred(&minor, &cred1);
Packit fd8b60
    major = gss_add_cred(&minor, GSS_C_NO_CREDENTIAL, GSS_C_NO_NAME,
Packit fd8b60
                         &mech_krb5, GSS_C_ACCEPT, GSS_C_INDEFINITE,
Packit fd8b60
                         GSS_C_INDEFINITE, &cred1, NULL, NULL, NULL);
Packit fd8b60
    assert(major == GSS_S_COMPLETE);
Packit fd8b60
Packit fd8b60
    /* Create an expanded cred by passing both an output handle and an input
Packit fd8b60
     * handle. */
Packit fd8b60
    major = gss_add_cred(&minor, cred1, GSS_C_NO_NAME, &mech_iakerb,
Packit fd8b60
                         GSS_C_INITIATE, GSS_C_INDEFINITE, GSS_C_INDEFINITE,
Packit fd8b60
                         &cred2, NULL, NULL, NULL);
Packit fd8b60
    assert(major == GSS_S_COMPLETE);
Packit fd8b60
Packit fd8b60
    /* Verify mechanism creds in cred1 and cred2. */
Packit fd8b60
    major = gss_inquire_cred_by_mech(&minor, cred1, &mech_krb5, NULL, NULL,
Packit fd8b60
                                     NULL, &usage);
Packit fd8b60
    assert(major == GSS_S_COMPLETE && usage == GSS_C_ACCEPT);
Packit fd8b60
    major = gss_inquire_cred_by_mech(&minor, cred1, &mech_iakerb, NULL, NULL,
Packit fd8b60
                                     NULL, &usage);
Packit fd8b60
    assert(major == GSS_S_NO_CRED);
Packit fd8b60
    major = gss_inquire_cred_by_mech(&minor, cred2, &mech_krb5, NULL, NULL,
Packit fd8b60
                                     NULL, &usage);
Packit fd8b60
    assert(major == GSS_S_COMPLETE && usage == GSS_C_ACCEPT);
Packit fd8b60
    major = gss_inquire_cred_by_mech(&minor, cred2, &mech_iakerb, NULL, NULL,
Packit fd8b60
                                     NULL, &usage);
Packit fd8b60
    assert(major == GSS_S_COMPLETE && usage == GSS_C_INITIATE);
Packit fd8b60
Packit fd8b60
    gss_release_cred(&minor, &cred1);
Packit fd8b60
    gss_release_cred(&minor, &cred2);
Packit fd8b60
Packit fd8b60
    return 0;
Packit fd8b60
}