Signed-off-by: Hans Leidekker <hans(a)codeweavers.com>
---
dlls/kerberos/krb5_ap.c | 428 +++++-----------------------------------
dlls/kerberos/unixlib.c | 164 +++++++++++++++
dlls/kerberos/unixlib.h | 8 +
3 files changed, 219 insertions(+), 381 deletions(-)
diff --git a/dlls/kerberos/krb5_ap.c b/dlls/kerberos/krb5_ap.c
index 8ed4ffd13cf..792ee974983 100644
--- a/dlls/kerberos/krb5_ap.c
+++ b/dlls/kerberos/krb5_ap.c
@@ -21,18 +21,7 @@
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
*/
-#include "config.h"
-#include "wine/port.h"
-
#include <stdarg.h>
-#ifdef HAVE_KRB5_KRB5_H
-#include <krb5/krb5.h>
-#endif
-#ifdef SONAME_LIBGSSAPI_KRB5
-# include <gssapi/gssapi.h>
-# include <gssapi/gssapi_ext.h>
-#endif
-
#include "ntstatus.h"
#define WIN32_NO_STATUS
#include "windef.h"
@@ -88,94 +77,6 @@ static const SecPkgInfoW infoW =
static ULONG kerberos_package_id;
static LSA_DISPATCH_TABLE lsa_dispatch;
-#ifdef SONAME_LIBKRB5
-
-static void *libkrb5_handle;
-
-#define MAKE_FUNCPTR(f) static typeof(f) * p_##f
-MAKE_FUNCPTR(krb5_cc_close);
-MAKE_FUNCPTR(krb5_cc_default);
-MAKE_FUNCPTR(krb5_cc_end_seq_get);
-MAKE_FUNCPTR(krb5_cc_initialize);
-MAKE_FUNCPTR(krb5_cc_next_cred);
-MAKE_FUNCPTR(krb5_cc_start_seq_get);
-MAKE_FUNCPTR(krb5_cc_store_cred);
-MAKE_FUNCPTR(krb5_cccol_cursor_free);
-MAKE_FUNCPTR(krb5_cccol_cursor_new);
-MAKE_FUNCPTR(krb5_cccol_cursor_next);
-MAKE_FUNCPTR(krb5_decode_ticket);
-MAKE_FUNCPTR(krb5_free_context);
-MAKE_FUNCPTR(krb5_free_cred_contents);
-MAKE_FUNCPTR(krb5_free_principal);
-MAKE_FUNCPTR(krb5_free_ticket);
-MAKE_FUNCPTR(krb5_free_unparsed_name);
-MAKE_FUNCPTR(krb5_get_init_creds_opt_alloc);
-MAKE_FUNCPTR(krb5_get_init_creds_opt_free);
-MAKE_FUNCPTR(krb5_get_init_creds_opt_set_out_ccache);
-MAKE_FUNCPTR(krb5_get_init_creds_password);
-MAKE_FUNCPTR(krb5_init_context);
-MAKE_FUNCPTR(krb5_is_config_principal);
-MAKE_FUNCPTR(krb5_parse_name_flags);
-MAKE_FUNCPTR(krb5_unparse_name_flags);
-#undef MAKE_FUNCPTR
-
-static void load_krb5(void)
-{
- if (!(libkrb5_handle = dlopen(SONAME_LIBKRB5, RTLD_NOW)))
- {
- WARN("Failed to load %s, Kerberos support will be disabled\n", SONAME_LIBKRB5);
- return;
- }
-
-#define LOAD_FUNCPTR(f) \
- if (!(p_##f = dlsym(libkrb5_handle, #f))) \
- { \
- ERR("Failed to load %s\n", #f); \
- goto fail; \
- }
-
- LOAD_FUNCPTR(krb5_cc_close)
- LOAD_FUNCPTR(krb5_cc_default)
- LOAD_FUNCPTR(krb5_cc_end_seq_get)
- LOAD_FUNCPTR(krb5_cc_initialize)
- LOAD_FUNCPTR(krb5_cc_next_cred)
- LOAD_FUNCPTR(krb5_cc_start_seq_get)
- LOAD_FUNCPTR(krb5_cc_store_cred)
- LOAD_FUNCPTR(krb5_cccol_cursor_free)
- LOAD_FUNCPTR(krb5_cccol_cursor_new)
- LOAD_FUNCPTR(krb5_cccol_cursor_next)
- LOAD_FUNCPTR(krb5_decode_ticket)
- LOAD_FUNCPTR(krb5_free_context)
- LOAD_FUNCPTR(krb5_free_cred_contents)
- LOAD_FUNCPTR(krb5_free_principal)
- LOAD_FUNCPTR(krb5_free_ticket)
- LOAD_FUNCPTR(krb5_free_unparsed_name)
- LOAD_FUNCPTR(krb5_get_init_creds_opt_alloc)
- LOAD_FUNCPTR(krb5_get_init_creds_opt_free)
- LOAD_FUNCPTR(krb5_get_init_creds_opt_set_out_ccache)
- LOAD_FUNCPTR(krb5_get_init_creds_password)
- LOAD_FUNCPTR(krb5_init_context)
- LOAD_FUNCPTR(krb5_is_config_principal)
- LOAD_FUNCPTR(krb5_parse_name_flags)
- LOAD_FUNCPTR(krb5_unparse_name_flags)
-#undef LOAD_FUNCPTR
-
- return;
-
-fail:
- dlclose(libkrb5_handle);
- libkrb5_handle = NULL;
-}
-
-#else /* SONAME_LIBKRB5 */
-
-static void load_krb5(void)
-{
- WARN("Kerberos support was not provided at compile time\n");
-}
-
-#endif /* SONAME_LIBKRB5 */
-
static const char *debugstr_us( const UNICODE_STRING *us )
{
if (!us) return "<null>";
@@ -187,7 +88,8 @@ static NTSTATUS NTAPI kerberos_LsaApInitializePackage(ULONG package_id, PLSA_DIS
{
char *kerberos_name;
- load_krb5();
+ if (!krb5_funcs && __wine_init_unix_lib( instance, DLL_PROCESS_ATTACH, NULL, &krb5_funcs ))
+ ERR( "no Kerberos support, expect problems\n" );
kerberos_package_id = package_id;
lsa_dispatch = *dispatch;
@@ -209,179 +111,15 @@ static NTSTATUS NTAPI kerberos_LsaApInitializePackage(ULONG package_id, PLSA_DIS
return STATUS_SUCCESS;
}
-#ifdef SONAME_LIBKRB5
-
-struct ticket_info
-{
- ULONG count, allocated;
- KERB_TICKET_CACHE_INFO *info;
-};
-
-static NTSTATUS krb5_error_to_status(krb5_error_code error)
-{
- switch (error)
- {
- case 0: return STATUS_SUCCESS;
- default:
- /* FIXME */
- return STATUS_UNSUCCESSFUL;
- }
-}
-
-static void free_ticket_info(struct ticket_info *info)
+static void free_ticket_list( struct ticket_list *list )
{
ULONG i;
-
- for (i = 0; i < info->count; i++)
+ for (i = 0; i < list->count; i++)
{
- heap_free(info->info[i].RealmName.Buffer);
- heap_free(info->info[i].ServerName.Buffer);
+ RtlFreeHeap( GetProcessHeap(), 0, list->tickets[i].RealmName.Buffer );
+ RtlFreeHeap( GetProcessHeap(), 0, list->tickets[i].ServerName.Buffer );
}
-
- heap_free(info->info);
-}
-
-static WCHAR *utf8_to_wstr(const char *utf8)
-{
- int len;
- WCHAR *wstr;
-
- len = MultiByteToWideChar(CP_UTF8, 0, utf8, -1, NULL, 0);
- wstr = heap_alloc(len * sizeof(WCHAR));
- if (wstr)
- MultiByteToWideChar(CP_UTF8, 0, utf8, -1, wstr, len);
-
- return wstr;
-}
-
-static NTSTATUS copy_tickets_from_cache(krb5_context context, krb5_ccache cache, struct ticket_info *info)
-{
- NTSTATUS status;
- krb5_cc_cursor cursor;
- krb5_error_code error;
- krb5_creds credentials;
- krb5_ticket *ticket;
- char *name_with_realm, *name_without_realm, *realm_name;
- WCHAR *realm_nameW, *name_without_realmW;
-
- error = p_krb5_cc_start_seq_get(context, cache, &cursor);
- if (error) return krb5_error_to_status(error);
-
- for (;;)
- {
- error = p_krb5_cc_next_cred(context, cache, &cursor, &credentials);
- if (error)
- {
- if (error == KRB5_CC_END)
- status = STATUS_SUCCESS;
- else
- status = krb5_error_to_status(error);
- break;
- }
-
- if (p_krb5_is_config_principal(context, credentials.server))
- {
- p_krb5_free_cred_contents(context, &credentials);
- continue;
- }
-
- if (info->count == info->allocated)
- {
- KERB_TICKET_CACHE_INFO *new_info;
- ULONG new_allocated;
-
- if (info->allocated)
- {
- new_allocated = info->allocated * 2;
- new_info = heap_realloc(info->info, sizeof(*new_info) * new_allocated);
- }
- else
- {
- new_allocated = 16;
- new_info = heap_alloc(sizeof(*new_info) * new_allocated);
- }
- if (!new_info)
- {
- p_krb5_free_cred_contents(context, &credentials);
- status = STATUS_NO_MEMORY;
- break;
- }
-
- info->info = new_info;
- info->allocated = new_allocated;
- }
-
- error = p_krb5_unparse_name_flags(context, credentials.server, 0, &name_with_realm);
- if (error)
- {
- p_krb5_free_cred_contents(context, &credentials);
- status = krb5_error_to_status(error);
- break;
- }
-
- TRACE("name_with_realm: %s\n", debugstr_a(name_with_realm));
-
- error = p_krb5_unparse_name_flags(context, credentials.server,
- KRB5_PRINCIPAL_UNPARSE_NO_REALM, &name_without_realm);
- if (error)
- {
- p_krb5_free_unparsed_name(context, name_with_realm);
- p_krb5_free_cred_contents(context, &credentials);
- status = krb5_error_to_status(error);
- break;
- }
-
- TRACE("name_without_realm: %s\n", debugstr_a(name_without_realm));
-
- name_without_realmW = utf8_to_wstr(name_without_realm);
- RtlInitUnicodeString(&info->info[info->count].ServerName, name_without_realmW);
-
- realm_name = strchr(name_with_realm, '@');
- if (!realm_name)
- {
- ERR("wrong name with realm %s\n", debugstr_a(name_with_realm));
- realm_name = name_with_realm;
- }
- else
- realm_name++;
-
- /* realm_name - now contains only realm! */
-
- realm_nameW = utf8_to_wstr(realm_name);
- RtlInitUnicodeString(&info->info[info->count].RealmName, realm_nameW);
-
- if (!credentials.times.starttime)
- credentials.times.starttime = credentials.times.authtime;
-
- /* TODO: if krb5_is_config_principal = true */
- RtlSecondsSince1970ToTime(credentials.times.starttime, &info->info[info->count].StartTime);
- RtlSecondsSince1970ToTime(credentials.times.endtime, &info->info[info->count].EndTime);
- RtlSecondsSince1970ToTime(credentials.times.renew_till, &info->info[info->count].RenewTime);
-
- info->info[info->count].TicketFlags = credentials.ticket_flags;
-
- error = p_krb5_decode_ticket(&credentials.ticket, &ticket);
-
- p_krb5_free_unparsed_name(context, name_with_realm);
- p_krb5_free_unparsed_name(context, name_without_realm);
- p_krb5_free_cred_contents(context, &credentials);
-
- if (error)
- {
- status = krb5_error_to_status(error);
- break;
- }
-
- info->info[info->count].EncryptionType = ticket->enc_part.enctype;
-
- p_krb5_free_ticket(context, ticket);
-
- info->count++;
- }
-
- p_krb5_cc_end_seq_get(context, cache, &cursor);
-
- return status;
+ RtlFreeHeap( GetProcessHeap(), 0, list->tickets );
}
static inline void init_client_us(UNICODE_STRING *dst, void *client_ws, const UNICODE_STRING *src)
@@ -391,7 +129,7 @@ static inline void init_client_us(UNICODE_STRING *dst, void *client_ws, const UN
dst->MaximumLength = src->MaximumLength;
}
-static NTSTATUS copy_to_client(PLSA_CLIENT_REQUEST lsa_req, struct ticket_info *info, void **out, ULONG *out_size)
+static NTSTATUS copy_to_client(PLSA_CLIENT_REQUEST lsa_req, struct ticket_list *list, void **out, ULONG *out_size)
{
NTSTATUS status;
ULONG i;
@@ -399,28 +137,26 @@ static NTSTATUS copy_to_client(PLSA_CLIENT_REQUEST lsa_req, struct ticket_info *
char *client_resp, *client_ticket, *client_str;
KERB_QUERY_TKT_CACHE_RESPONSE resp;
- size = sizeof(KERB_QUERY_TKT_CACHE_RESPONSE);
- if (info->count != 0)
- size += (info->count - 1) * sizeof(KERB_TICKET_CACHE_INFO);
-
+ size = sizeof(resp);
+ if (list->count) size += (list->count - 1) * sizeof(KERB_TICKET_CACHE_INFO);
client_str_off = size;
- for (i = 0; i < info->count; i++)
+ for (i = 0; i < list->count; i++)
{
- size += info->info[i].RealmName.MaximumLength;
- size += info->info[i].ServerName.MaximumLength;
+ size += list->tickets[i].RealmName.MaximumLength;
+ size += list->tickets[i].ServerName.MaximumLength;
}
status = lsa_dispatch.AllocateClientBuffer(lsa_req, size, (void **)&client_resp);
if (status != STATUS_SUCCESS) return status;
resp.MessageType = KerbQueryTicketCacheMessage;
- resp.CountOfTickets = info->count;
+ resp.CountOfTickets = list->count;
size = FIELD_OFFSET(KERB_QUERY_TKT_CACHE_RESPONSE, Tickets);
status = lsa_dispatch.CopyToClientBuffer(lsa_req, size, client_resp, &resp);
if (status != STATUS_SUCCESS) goto fail;
- if (!info->count)
+ if (!list->count)
{
*out = client_resp;
*out_size = sizeof(resp);
@@ -432,24 +168,22 @@ static NTSTATUS copy_to_client(PLSA_CLIENT_REQUEST lsa_req, struct ticket_info *
client_ticket = client_resp + size;
client_str = client_resp + client_str_off;
- for (i = 0; i < info->count; i++)
+ for (i = 0; i < list->count; i++)
{
- KERB_TICKET_CACHE_INFO ticket;
-
- ticket = info->info[i];
+ KERB_TICKET_CACHE_INFO ticket = list->tickets[i];
- init_client_us(&ticket.RealmName, client_str, &info->info[i].RealmName);
+ init_client_us(&ticket.RealmName, client_str, &list->tickets[i].RealmName);
- size = info->info[i].RealmName.MaximumLength;
- status = lsa_dispatch.CopyToClientBuffer(lsa_req, size, client_str, info->info[i].RealmName.Buffer);
+ size = ticket.RealmName.MaximumLength;
+ status = lsa_dispatch.CopyToClientBuffer(lsa_req, size, client_str, list->tickets[i].RealmName.Buffer);
if (status != STATUS_SUCCESS) goto fail;
client_str += size;
*out_size += size;
- init_client_us(&ticket.ServerName, client_str, &info->info[i].ServerName);
+ init_client_us(&ticket.ServerName, client_str, &list->tickets[i].ServerName);
- size = info->info[i].ServerName.MaximumLength;
- status = lsa_dispatch.CopyToClientBuffer(lsa_req, size, client_str, info->info[i].ServerName.Buffer);
+ size = ticket.ServerName.MaximumLength;
+ status = lsa_dispatch.CopyToClientBuffer(lsa_req, size, client_str, list->tickets[i].ServerName.Buffer);
if (status != STATUS_SUCCESS) goto fail;
client_str += size;
*out_size += size;
@@ -469,121 +203,53 @@ fail:
return status;
}
-static NTSTATUS query_ticket_cache(PLSA_CLIENT_REQUEST lsa_req, void *in, ULONG in_len, void **out, ULONG *out_len)
+static NTSTATUS NTAPI kerberos_LsaApCallPackageUntrusted(PLSA_CLIENT_REQUEST req, void *in_buf,
+ void *client_buf_base, ULONG in_buf_len, void **out_buf, ULONG *out_buf_len, NTSTATUS *ret_status)
{
- NTSTATUS status;
- KERB_QUERY_TKT_CACHE_REQUEST *query;
- struct ticket_info info;
- krb5_error_code error;
- krb5_context context = NULL;
- krb5_cccol_cursor cursor = NULL;
- krb5_ccache cache;
-
- if (!in || in_len != sizeof(KERB_QUERY_TKT_CACHE_REQUEST) || !out || !out_len)
- return STATUS_INVALID_PARAMETER;
-
- query = (KERB_QUERY_TKT_CACHE_REQUEST *)in;
+ KERB_PROTOCOL_MESSAGE_TYPE msg;
- if (query->LogonId.HighPart != 0 || query->LogonId.LowPart != 0)
- return STATUS_ACCESS_DENIED;
+ TRACE("%p,%p,%p,%u,%p,%p,%p\n", req, in_buf, client_buf_base, in_buf_len, out_buf, out_buf_len, ret_status);
- info.count = 0;
- info.allocated = 0;
- info.info = NULL;
+ if (!in_buf || in_buf_len < sizeof(msg)) return STATUS_INVALID_PARAMETER;
- error = p_krb5_init_context(&context);
- if (error)
+ msg = *(KERB_PROTOCOL_MESSAGE_TYPE *)in_buf;
+ switch (msg)
{
- status = krb5_error_to_status(error);
- goto done;
- }
-
- error = p_krb5_cccol_cursor_new(context, &cursor);
- if (error)
+ case KerbQueryTicketCacheMessage:
{
- status = krb5_error_to_status(error);
- goto done;
- }
+ KERB_QUERY_TKT_CACHE_REQUEST *query = (KERB_QUERY_TKT_CACHE_REQUEST *)in_buf;
+ struct ticket_list list;
+ NTSTATUS status;
- for (;;)
- {
- error = p_krb5_cccol_cursor_next(context, cursor, &cache);
- if (error)
+ if (!in_buf || in_buf_len != sizeof(*query) || !out_buf || !out_buf_len) return STATUS_INVALID_PARAMETER;
+ if (query->LogonId.HighPart || query->LogonId.LowPart) return STATUS_ACCESS_DENIED;
+
+ status = krb5_funcs->query_ticket_cache(&list);
+ if (!status)
{
- status = krb5_error_to_status(error);
- goto done;
+ status = copy_to_client(req, &list, out_buf, out_buf_len);
+ free_ticket_list(&list);
}
- if (!cache) break;
-
- status = copy_tickets_from_cache(context, cache, &info);
-
- p_krb5_cc_close(context, cache);
-
- if (status != STATUS_SUCCESS)
- goto done;
- }
-
- status = copy_to_client(lsa_req, &info, out, out_len);
-
-done:
- if (cursor)
- p_krb5_cccol_cursor_free(context, &cursor);
-
- if (context)
- p_krb5_free_context(context);
-
- free_ticket_info(&info);
-
- return status;
-}
-
-#else /* SONAME_LIBKRB5 */
-
-static NTSTATUS query_ticket_cache(PLSA_CLIENT_REQUEST lsa_req, void *in, ULONG in_len, void **out, ULONG *out_len)
-{
- FIXME("%p,%p,%u,%p,%p: stub\n", lsa_req, in, in_len, out, out_len);
- return STATUS_NOT_IMPLEMENTED;
-}
-
-#endif /* SONAME_LIBKRB5 */
-
-static NTSTATUS NTAPI kerberos_LsaApCallPackageUntrusted(PLSA_CLIENT_REQUEST request,
- PVOID in_buffer, PVOID client_buffer_base, ULONG in_buffer_length,
- PVOID *out_buffer, PULONG out_buffer_length, PNTSTATUS status)
-{
- KERB_PROTOCOL_MESSAGE_TYPE msg;
-
- TRACE("%p,%p,%p,%u,%p,%p,%p\n", request, in_buffer, client_buffer_base,
- in_buffer_length, out_buffer, out_buffer_length, status);
-
- if (!in_buffer || in_buffer_length < sizeof(msg))
- return STATUS_INVALID_PARAMETER;
-
- msg = *(KERB_PROTOCOL_MESSAGE_TYPE *)in_buffer;
-
- switch (msg)
- {
- case KerbQueryTicketCacheMessage:
- *status = query_ticket_cache(request, in_buffer, in_buffer_length, out_buffer, out_buffer_length);
+ *ret_status = status;
break;
-
+ }
case KerbRetrieveTicketMessage:
FIXME("KerbRetrieveTicketMessage stub\n");
- *status = STATUS_NOT_IMPLEMENTED;
+ *ret_status = STATUS_NOT_IMPLEMENTED;
break;
case KerbPurgeTicketCacheMessage:
FIXME("KerbPurgeTicketCacheMessage stub\n");
- *status = STATUS_NOT_IMPLEMENTED;
+ *ret_status = STATUS_NOT_IMPLEMENTED;
break;
default: /* All other requests should call LsaApCallPackage */
WARN("%u => access denied\n", msg);
- *status = STATUS_ACCESS_DENIED;
+ *ret_status = STATUS_ACCESS_DENIED;
break;
}
- return *status;
+ return *ret_status;
}
static NTSTATUS NTAPI kerberos_SpGetInfo(SecPkgInfoW *info)
diff --git a/dlls/kerberos/unixlib.c b/dlls/kerberos/unixlib.c
index 4e9b90eeccf..6f53609e2ed 100644
--- a/dlls/kerberos/unixlib.c
+++ b/dlls/kerberos/unixlib.c
@@ -148,6 +148,169 @@ static NTSTATUS krb5_error_to_status( krb5_error_code err )
}
}
+static WCHAR *utf8_to_wstr( const char *src )
+{
+ ULONG dstlen, srclen = strlen( src ) + 1;
+ WCHAR *dst;
+
+ RtlUTF8ToUnicodeN( NULL, 0, &dstlen, src, srclen );
+ if ((dst = RtlAllocateHeap( GetProcessHeap(), 0, dstlen )))
+ RtlUTF8ToUnicodeN( dst, dstlen, &dstlen, src, srclen );
+ return dst;
+}
+
+static NTSTATUS copy_tickets_from_cache( krb5_context ctx, krb5_ccache cache, struct ticket_list *list )
+{
+ NTSTATUS status;
+ krb5_cc_cursor cursor;
+ krb5_error_code err;
+ krb5_creds creds;
+ krb5_ticket *ticket;
+ char *name_with_realm, *name_without_realm, *realm_name;
+ WCHAR *realm_nameW, *name_without_realmW;
+
+ if ((err = p_krb5_cc_start_seq_get( ctx, cache, &cursor ))) return krb5_error_to_status( err );
+ for (;;)
+ {
+ if ((err = p_krb5_cc_next_cred( ctx, cache, &cursor, &creds )))
+ {
+ if (err == KRB5_CC_END)
+ status = STATUS_SUCCESS;
+ else
+ status = krb5_error_to_status( err );
+ break;
+ }
+
+ if (p_krb5_is_config_principal( ctx, creds.server ))
+ {
+ p_krb5_free_cred_contents( ctx, &creds );
+ continue;
+ }
+
+ if (list->count == list->allocated)
+ {
+ KERB_TICKET_CACHE_INFO *new_tickets;
+ ULONG new_allocated;
+
+ if (list->allocated)
+ {
+ new_allocated = list->allocated * 2;
+ new_tickets = RtlReAllocateHeap( GetProcessHeap(), 0, list->tickets, sizeof(*new_tickets) * new_allocated );
+ }
+ else
+ {
+ new_allocated = 16;
+ new_tickets = RtlAllocateHeap( GetProcessHeap(), 0, sizeof(*new_tickets) * new_allocated );
+ }
+ if (!new_tickets)
+ {
+ p_krb5_free_cred_contents( ctx, &creds );
+ status = STATUS_NO_MEMORY;
+ break;
+ }
+ list->tickets = new_tickets;
+ list->allocated = new_allocated;
+ }
+
+ if ((err = p_krb5_unparse_name_flags( ctx, creds.server, 0, &name_with_realm )))
+ {
+ p_krb5_free_cred_contents( ctx, &creds );
+ status = krb5_error_to_status( err );
+ break;
+ }
+ TRACE( "name_with_realm: %s\n", debugstr_a(name_with_realm) );
+
+ if ((err = p_krb5_unparse_name_flags( ctx, creds.server, KRB5_PRINCIPAL_UNPARSE_NO_REALM,
+ &name_without_realm )))
+ {
+ p_krb5_free_unparsed_name( ctx, name_with_realm );
+ p_krb5_free_cred_contents( ctx, &creds );
+ status = krb5_error_to_status( err );
+ break;
+ }
+ TRACE( "name_without_realm: %s\n", debugstr_a(name_without_realm) );
+
+ name_without_realmW = utf8_to_wstr( name_without_realm );
+ RtlInitUnicodeString( &list->tickets[list->count].ServerName, name_without_realmW );
+
+ if (!(realm_name = strchr( name_with_realm, '@' )))
+ {
+ ERR( "wrong name with realm %s\n", debugstr_a(name_with_realm) );
+ realm_name = name_with_realm;
+ }
+ else realm_name++;
+
+ /* realm_name - now contains only realm! */
+ realm_nameW = utf8_to_wstr( realm_name );
+ RtlInitUnicodeString( &list->tickets[list->count].RealmName, realm_nameW );
+
+ if (!creds.times.starttime) creds.times.starttime = creds.times.authtime;
+
+ /* TODO: if krb5_is_config_principal = true */
+ RtlSecondsSince1970ToTime( creds.times.starttime, &list->tickets[list->count].StartTime );
+ RtlSecondsSince1970ToTime( creds.times.endtime, &list->tickets[list->count].EndTime );
+ RtlSecondsSince1970ToTime( creds.times.renew_till, &list->tickets[list->count].RenewTime );
+
+ list->tickets[list->count].TicketFlags = creds.ticket_flags;
+
+ err = p_krb5_decode_ticket( &creds.ticket, &ticket );
+ p_krb5_free_unparsed_name( ctx, name_with_realm );
+ p_krb5_free_unparsed_name( ctx, name_without_realm );
+ p_krb5_free_cred_contents( ctx, &creds );
+ if (err)
+ {
+ status = krb5_error_to_status( err );
+ break;
+ }
+
+ list->tickets[list->count].EncryptionType = ticket->enc_part.enctype;
+ p_krb5_free_ticket( ctx, ticket );
+ list->count++;
+ }
+
+ p_krb5_cc_end_seq_get( ctx, cache, &cursor );
+ return status;
+}
+
+static NTSTATUS CDECL query_ticket_cache( struct ticket_list *list )
+{
+ NTSTATUS status;
+ krb5_error_code err;
+ krb5_context ctx;
+ krb5_cccol_cursor cursor = NULL;
+ krb5_ccache cache;
+
+ list->count = 0;
+ list->allocated = 0;
+ list->tickets = NULL;
+
+ if ((err = p_krb5_init_context( &ctx ))) return krb5_error_to_status( err );
+ if ((err = p_krb5_cccol_cursor_new( ctx, &cursor )))
+ {
+ status = krb5_error_to_status( err );
+ goto done;
+ }
+
+ for (;;)
+ {
+ if ((err = p_krb5_cccol_cursor_next( ctx, cursor, &cache )))
+ {
+ status = krb5_error_to_status( err );
+ goto done;
+ }
+ if (!cache) break;
+
+ status = copy_tickets_from_cache( ctx, cache, list );
+ p_krb5_cc_close( ctx, cache );
+ if (status != STATUS_SUCCESS) goto done;
+ }
+
+done:
+ if (cursor) p_krb5_cccol_cursor_free( ctx, &cursor );
+ if (ctx) p_krb5_free_context( ctx );
+ return status;
+}
+
static void *libgssapi_krb5_handle;
#define MAKE_FUNCPTR(f) static typeof(f) * p##f
@@ -841,6 +1004,7 @@ static const struct krb5_funcs funcs =
initialize_context,
make_signature,
query_context_attributes,
+ query_ticket_cache,
seal_message,
unseal_message,
verify_signature,
diff --git a/dlls/kerberos/unixlib.h b/dlls/kerberos/unixlib.h
index 652a6e4f300..da36c59a680 100644
--- a/dlls/kerberos/unixlib.h
+++ b/dlls/kerberos/unixlib.h
@@ -21,6 +21,13 @@
#define KERBEROS_MAX_BUF 12000
+struct ticket_list
+{
+ ULONG count;
+ ULONG allocated;
+ KERB_TICKET_CACHE_INFO *tickets;
+};
+
struct krb5_funcs
{
NTSTATUS (CDECL *accept_context)(LSA_SEC_HANDLE, LSA_SEC_HANDLE, SecBufferDesc *, LSA_SEC_HANDLE *,
@@ -33,6 +40,7 @@ struct krb5_funcs
LSA_SEC_HANDLE *, SecBufferDesc *, ULONG *, TimeStamp *);
NTSTATUS (CDECL *make_signature)(LSA_SEC_HANDLE, SecBufferDesc *);
NTSTATUS (CDECL *query_context_attributes)(LSA_SEC_HANDLE, ULONG, void *);
+ NTSTATUS (CDECL *query_ticket_cache)(struct ticket_list *);
NTSTATUS (CDECL *seal_message)(LSA_SEC_HANDLE, SecBufferDesc *, ULONG);
NTSTATUS (CDECL *unseal_message)(LSA_SEC_HANDLE, SecBufferDesc *, ULONG *);
NTSTATUS (CDECL *verify_signature)(LSA_SEC_HANDLE, SecBufferDesc *, ULONG *);
--
2.30.2