|
Packit |
fd8b60 |
/* -*- mode: c; indent-tabs-mode: nil -*- */
|
|
Packit |
fd8b60 |
/* tests/gssapi/t_s4u2proxy_deleg.c - Test S4U2Proxy after krb5 auth */
|
|
Packit |
fd8b60 |
/*
|
|
Packit |
fd8b60 |
* Copyright 2011 by the Massachusetts Institute of Technology.
|
|
Packit |
fd8b60 |
* All Rights Reserved.
|
|
Packit |
fd8b60 |
*
|
|
Packit |
fd8b60 |
* Export of this software from the United States of America may
|
|
Packit |
fd8b60 |
* require a specific license from the United States Government.
|
|
Packit |
fd8b60 |
* It is the responsibility of any person or organization contemplating
|
|
Packit |
fd8b60 |
* export to obtain such a license before exporting.
|
|
Packit |
fd8b60 |
*
|
|
Packit |
fd8b60 |
* WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
|
|
Packit |
fd8b60 |
* distribute this software and its documentation for any purpose and
|
|
Packit |
fd8b60 |
* without fee is hereby granted, provided that the above copyright
|
|
Packit |
fd8b60 |
* notice appear in all copies and that both that copyright notice and
|
|
Packit |
fd8b60 |
* this permission notice appear in supporting documentation, and that
|
|
Packit |
fd8b60 |
* the name of M.I.T. not be used in advertising or publicity pertaining
|
|
Packit |
fd8b60 |
* to distribution of the software without specific, written prior
|
|
Packit |
fd8b60 |
* permission. Furthermore if you modify this software you must label
|
|
Packit |
fd8b60 |
* your software as modified software and not distribute it in such a
|
|
Packit |
fd8b60 |
* fashion that it might be confused with the original M.I.T. software.
|
|
Packit |
fd8b60 |
* M.I.T. makes no representations about the suitability of
|
|
Packit |
fd8b60 |
* this software for any purpose. It is provided "as is" without express
|
|
Packit |
fd8b60 |
* or implied warranty.
|
|
Packit |
fd8b60 |
*/
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
#include <stdio.h>
|
|
Packit |
fd8b60 |
#include <stdlib.h>
|
|
Packit |
fd8b60 |
#include <string.h>
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
#include "common.h"
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
/*
|
|
Packit |
fd8b60 |
* Usage: ./t_s4u2proxy_krb5 [--spnego] client_cache storage_cache
|
|
Packit |
fd8b60 |
* [accname|-] service1 service2
|
|
Packit |
fd8b60 |
*
|
|
Packit |
fd8b60 |
* This program performs a regular Kerberos or SPNEGO authentication from the
|
|
Packit |
fd8b60 |
* default principal of client_cache to service1. If that authentication
|
|
Packit |
fd8b60 |
* yields delegated credentials, the program stores those credentials in
|
|
Packit |
fd8b60 |
* sorage_ccache and uses that cache to perform a second authentication to
|
|
Packit |
fd8b60 |
* service2 using S4U2Proxy.
|
|
Packit |
fd8b60 |
*
|
|
Packit |
fd8b60 |
* The default keytab must contain keys for service1 and service2. The default
|
|
Packit |
fd8b60 |
* ccache must contain a TGT for service1. This program assumes that krb5 or
|
|
Packit |
fd8b60 |
* SPNEGO authentication requires only one token exchange.
|
|
Packit |
fd8b60 |
*/
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
int
|
|
Packit |
fd8b60 |
main(int argc, char *argv[])
|
|
Packit |
fd8b60 |
{
|
|
Packit |
fd8b60 |
const char *client_ccname, *storage_ccname, *accname, *service1, *service2;
|
|
Packit |
fd8b60 |
krb5_context context = NULL;
|
|
Packit |
fd8b60 |
krb5_error_code ret;
|
|
Packit |
fd8b60 |
krb5_boolean use_spnego = FALSE;
|
|
Packit |
fd8b60 |
krb5_ccache storage_ccache = NULL;
|
|
Packit |
fd8b60 |
krb5_principal client_princ = NULL;
|
|
Packit |
fd8b60 |
OM_uint32 minor, major, flags;
|
|
Packit |
fd8b60 |
gss_buffer_desc buf = GSS_C_EMPTY_BUFFER;
|
|
Packit |
fd8b60 |
gss_OID mech;
|
|
Packit |
fd8b60 |
gss_OID_set mechs;
|
|
Packit |
fd8b60 |
gss_name_t acceptor_name = GSS_C_NO_NAME, client_name = GSS_C_NO_NAME;
|
|
Packit |
fd8b60 |
gss_name_t service1_name = GSS_C_NO_NAME, service2_name = GSS_C_NO_NAME;
|
|
Packit |
fd8b60 |
gss_cred_id_t service1_cred = GSS_C_NO_CREDENTIAL;
|
|
Packit |
fd8b60 |
gss_cred_id_t deleg_cred = GSS_C_NO_CREDENTIAL;
|
|
Packit |
fd8b60 |
gss_ctx_id_t initiator_context, acceptor_context;
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
/* Parse arguments. */
|
|
Packit |
fd8b60 |
if (argc >= 2 && strcmp(argv[1], "--spnego") == 0) {
|
|
Packit |
fd8b60 |
use_spnego = TRUE;
|
|
Packit |
fd8b60 |
argc--;
|
|
Packit |
fd8b60 |
argv++;
|
|
Packit |
fd8b60 |
}
|
|
Packit |
fd8b60 |
if (argc != 6) {
|
|
Packit |
fd8b60 |
fprintf(stderr, "./t_s4u2proxy_krb5 [--spnego] client_ccache "
|
|
Packit |
fd8b60 |
"storage_ccache [accname|-] service1 service2\n");
|
|
Packit |
fd8b60 |
return 1;
|
|
Packit |
fd8b60 |
}
|
|
Packit |
fd8b60 |
client_ccname = argv[1];
|
|
Packit |
fd8b60 |
storage_ccname = argv[2];
|
|
Packit |
fd8b60 |
accname = argv[3];
|
|
Packit |
fd8b60 |
service1 = argv[4];
|
|
Packit |
fd8b60 |
service2 = argv[5];
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
mech = use_spnego ? &mech_spnego : &mech_krb5;
|
|
Packit |
fd8b60 |
mechs = use_spnego ? &mechset_spnego : &mechset_krb5;
|
|
Packit |
fd8b60 |
ret = krb5_init_context(&context);
|
|
Packit |
fd8b60 |
check_k5err(context, "krb5_init_context", ret);
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
/* Get GSS_C_BOTH acceptor credentials, using the default ccache. */
|
|
Packit |
fd8b60 |
acceptor_name = GSS_C_NO_NAME;
|
|
Packit |
fd8b60 |
if (strcmp(accname, "-") != 0)
|
|
Packit |
fd8b60 |
acceptor_name = import_name(service1);
|
|
Packit |
fd8b60 |
major = gss_acquire_cred(&minor, acceptor_name, GSS_C_INDEFINITE,
|
|
Packit |
fd8b60 |
mechs, GSS_C_BOTH, &service1_cred, NULL, NULL);
|
|
Packit |
fd8b60 |
check_gsserr("gss_acquire_cred(service1)", major, minor);
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
/* Establish contexts using the client ccache. */
|
|
Packit |
fd8b60 |
service1_name = import_name(service1);
|
|
Packit |
fd8b60 |
major = gss_krb5_ccache_name(&minor, client_ccname, NULL);
|
|
Packit |
fd8b60 |
check_gsserr("gss_krb5_ccache_name(1)", major, minor);
|
|
Packit |
fd8b60 |
flags = GSS_C_REPLAY_FLAG | GSS_C_SEQUENCE_FLAG;
|
|
Packit |
fd8b60 |
establish_contexts(mech, GSS_C_NO_CREDENTIAL, service1_cred, service1_name,
|
|
Packit |
fd8b60 |
flags, &initiator_context, &acceptor_context,
|
|
Packit |
fd8b60 |
&client_name, NULL, &deleg_cred);
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
/* Display and remember the client principal. */
|
|
Packit |
fd8b60 |
major = gss_display_name(&minor, client_name, &buf, NULL);
|
|
Packit |
fd8b60 |
check_gsserr("gss_display_name(1)", major, minor);
|
|
Packit |
fd8b60 |
printf("auth1: %.*s\n", (int)buf.length, (char *)buf.value);
|
|
Packit |
fd8b60 |
/* Assumes buffer is null-terminated, which in our implementation it is. */
|
|
Packit |
fd8b60 |
ret = krb5_parse_name(context, buf.value, &client_princ);
|
|
Packit |
fd8b60 |
check_k5err(context, "krb5_parse_name", ret);
|
|
Packit |
fd8b60 |
(void)gss_release_buffer(&minor, &buf;;
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
if (deleg_cred == GSS_C_NO_CREDENTIAL) {
|
|
Packit |
fd8b60 |
printf("no credential delegated.\n");
|
|
Packit |
fd8b60 |
goto cleanup;
|
|
Packit |
fd8b60 |
}
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
/* Take the opportunity to test cred export/import on the synthesized
|
|
Packit |
fd8b60 |
* S4U2Proxy delegated cred. */
|
|
Packit |
fd8b60 |
export_import_cred(&deleg_cred);
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
/* Store the delegated credentials. */
|
|
Packit |
fd8b60 |
ret = krb5_cc_resolve(context, storage_ccname, &storage_ccache);
|
|
Packit |
fd8b60 |
check_k5err(context, "krb5_cc_resolve", ret);
|
|
Packit |
fd8b60 |
ret = krb5_cc_initialize(context, storage_ccache, client_princ);
|
|
Packit |
fd8b60 |
check_k5err(context, "krb5_cc_initialize", ret);
|
|
Packit |
fd8b60 |
major = gss_krb5_copy_ccache(&minor, deleg_cred, storage_ccache);
|
|
Packit |
fd8b60 |
check_gsserr("gss_krb5_copy_ccache", major, minor);
|
|
Packit |
fd8b60 |
ret = krb5_cc_close(context, storage_ccache);
|
|
Packit |
fd8b60 |
check_k5err(context, "krb5_cc_close", ret);
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
(void)gss_delete_sec_context(&minor, &initiator_context, GSS_C_NO_BUFFER);
|
|
Packit |
fd8b60 |
(void)gss_delete_sec_context(&minor, &acceptor_context, GSS_C_NO_BUFFER);
|
|
Packit |
fd8b60 |
(void)gss_release_name(&minor, &client_name);
|
|
Packit |
fd8b60 |
(void)gss_release_cred(&minor, &deleg_cred);
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
/* Establish contexts using the storage ccache. */
|
|
Packit |
fd8b60 |
service2_name = import_name(service2);
|
|
Packit |
fd8b60 |
major = gss_krb5_ccache_name(&minor, storage_ccname, NULL);
|
|
Packit |
fd8b60 |
check_gsserr("gss_krb5_ccache_name(2)", major, minor);
|
|
Packit |
fd8b60 |
establish_contexts(mech, GSS_C_NO_CREDENTIAL, GSS_C_NO_CREDENTIAL,
|
|
Packit |
fd8b60 |
service2_name, flags, &initiator_context,
|
|
Packit |
fd8b60 |
&acceptor_context, &client_name, NULL, &deleg_cred);
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
major = gss_display_name(&minor, client_name, &buf, NULL);
|
|
Packit |
fd8b60 |
check_gsserr("gss_display_name(2)", major, minor);
|
|
Packit |
fd8b60 |
printf("auth2: %.*s\n", (int)buf.length, (char *)buf.value);
|
|
Packit |
fd8b60 |
(void)gss_release_buffer(&minor, &buf;;
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
cleanup:
|
|
Packit |
fd8b60 |
(void)gss_release_name(&minor, &acceptor_name);
|
|
Packit |
fd8b60 |
(void)gss_release_name(&minor, &client_name);
|
|
Packit |
fd8b60 |
(void)gss_release_name(&minor, &service1_name);
|
|
Packit |
fd8b60 |
(void)gss_release_name(&minor, &service2_name);
|
|
Packit |
fd8b60 |
(void)gss_release_cred(&minor, &service1_cred);
|
|
Packit |
fd8b60 |
(void)gss_release_cred(&minor, &deleg_cred);
|
|
Packit |
fd8b60 |
(void)gss_delete_sec_context(&minor, &initiator_context, GSS_C_NO_BUFFER);
|
|
Packit |
fd8b60 |
(void)gss_delete_sec_context(&minor, &acceptor_context, GSS_C_NO_BUFFER);
|
|
Packit |
fd8b60 |
krb5_free_principal(context, client_princ);
|
|
Packit |
fd8b60 |
krb5_free_context(context);
|
|
Packit |
fd8b60 |
return 0;
|
|
Packit |
fd8b60 |
}
|