Path: blob/main/crypto/krb5/src/tests/gssapi/t_add_cred.c
34914 views
/* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */1/* tests/gssapi/t_add_cred.c - gss_add_cred() tests */2/*3* Copyright (C) 2018 by the Massachusetts Institute of Technology.4* All rights reserved.5*6* Redistribution and use in source and binary forms, with or without7* modification, are permitted provided that the following conditions8* are met:9*10* * Redistributions of source code must retain the above copyright11* notice, this list of conditions and the following disclaimer.12*13* * Redistributions in binary form must reproduce the above copyright14* notice, this list of conditions and the following disclaimer in15* the documentation and/or other materials provided with the16* distribution.17*18* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS19* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT20* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS21* FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE22* COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,23* INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES24* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR25* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)26* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,27* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)28* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED29* OF THE POSSIBILITY OF SUCH DAMAGE.30*/3132/*33* This program tests the mechglue behavior of gss_add_cred(). It relies on a34* krb5 keytab and credentials being present so that initiator and acceptor35* credentials can be acquired, but does not use them to initiate or accept any36* requests.37*/3839#include <stdio.h>40#include <assert.h>4142#include "common.h"4344int45main(void)46{47OM_uint32 minor, major;48gss_cred_id_t cred1, cred2;49gss_cred_usage_t usage;50gss_name_t name;5152/* Check that we get the expected error if we pass neither an input nor an53* output cred handle. */54major = gss_add_cred(&minor, GSS_C_NO_CREDENTIAL, GSS_C_NO_NAME,55&mech_krb5, GSS_C_INITIATE, GSS_C_INDEFINITE,56GSS_C_INDEFINITE, NULL, NULL, NULL, NULL);57assert(major == (GSS_S_CALL_INACCESSIBLE_WRITE | GSS_S_NO_CRED));5859/* Regression test for #8737: make sure that desired_name is honored when60* creating a credential by passing in a non-matching name. */61name = import_name("p:does/not/match@WRONG_REALM");62major = gss_add_cred(&minor, GSS_C_NO_CREDENTIAL, name, &mech_krb5,63GSS_C_INITIATE, GSS_C_INDEFINITE, GSS_C_INDEFINITE,64&cred1, NULL, NULL, NULL);65assert(major == GSS_S_NO_CRED);66gss_release_name(&minor, &name);6768/* Create cred1 with a krb5 initiator cred by passing an output handle but69* no input handle. */70major = gss_add_cred(&minor, GSS_C_NO_CREDENTIAL, GSS_C_NO_NAME,71&mech_krb5, GSS_C_INITIATE, GSS_C_INDEFINITE,72GSS_C_INDEFINITE, &cred1, NULL, NULL, NULL);73assert(major == GSS_S_COMPLETE);7475/* Verify that cred1 has the expected mechanism creds. */76major = gss_inquire_cred_by_mech(&minor, cred1, &mech_krb5, NULL, NULL,77NULL, &usage);78assert(major == GSS_S_COMPLETE && usage == GSS_C_INITIATE);79major = gss_inquire_cred_by_mech(&minor, cred1, &mech_iakerb, NULL, NULL,80NULL, &usage);81assert(major == GSS_S_NO_CRED);8283/* Check that we get the expected error if we try to add another krb5 mech84* cred to cred1. */85major = gss_add_cred(&minor, cred1, GSS_C_NO_NAME, &mech_krb5,86GSS_C_INITIATE, GSS_C_INDEFINITE, GSS_C_INDEFINITE,87NULL, NULL, NULL, NULL);88assert(major == GSS_S_DUPLICATE_ELEMENT);8990/* Add an IAKERB acceptor mech cred to cred1. */91major = gss_add_cred(&minor, cred1, GSS_C_NO_NAME, &mech_iakerb,92GSS_C_ACCEPT, GSS_C_INDEFINITE, GSS_C_INDEFINITE,93NULL, NULL, NULL, NULL);94assert(major == GSS_S_COMPLETE);9596/* Verify cred1 mechanism creds. */97major = gss_inquire_cred_by_mech(&minor, cred1, &mech_krb5, NULL, NULL,98NULL, &usage);99assert(major == GSS_S_COMPLETE && usage == GSS_C_INITIATE);100major = gss_inquire_cred_by_mech(&minor, cred1, &mech_iakerb, NULL, NULL,101NULL, &usage);102assert(major == GSS_S_COMPLETE && usage == GSS_C_ACCEPT);103104/* Start over with another new cred. */105gss_release_cred(&minor, &cred1);106major = gss_add_cred(&minor, GSS_C_NO_CREDENTIAL, GSS_C_NO_NAME,107&mech_krb5, GSS_C_ACCEPT, GSS_C_INDEFINITE,108GSS_C_INDEFINITE, &cred1, NULL, NULL, NULL);109assert(major == GSS_S_COMPLETE);110111/* Create an expanded cred by passing both an output handle and an input112* handle. */113major = gss_add_cred(&minor, cred1, GSS_C_NO_NAME, &mech_iakerb,114GSS_C_INITIATE, GSS_C_INDEFINITE, GSS_C_INDEFINITE,115&cred2, NULL, NULL, NULL);116assert(major == GSS_S_COMPLETE);117118/* Verify mechanism creds in cred1 and cred2. */119major = gss_inquire_cred_by_mech(&minor, cred1, &mech_krb5, NULL, NULL,120NULL, &usage);121assert(major == GSS_S_COMPLETE && usage == GSS_C_ACCEPT);122major = gss_inquire_cred_by_mech(&minor, cred1, &mech_iakerb, NULL, NULL,123NULL, &usage);124assert(major == GSS_S_NO_CRED);125major = gss_inquire_cred_by_mech(&minor, cred2, &mech_krb5, NULL, NULL,126NULL, &usage);127assert(major == GSS_S_COMPLETE && usage == GSS_C_ACCEPT);128major = gss_inquire_cred_by_mech(&minor, cred2, &mech_iakerb, NULL, NULL,129NULL, &usage);130assert(major == GSS_S_COMPLETE && usage == GSS_C_INITIATE);131132gss_release_cred(&minor, &cred1);133gss_release_cred(&minor, &cred2);134135return 0;136}137138139