1
0
mirror of https://github.com/samba-team/samba.git synced 2025-02-02 09:47:23 +03:00

s3: use shared asn1 code.

Guenther
This commit is contained in:
Günther Deschner 2008-10-22 14:06:08 +02:00
parent cef97c2459
commit d9f1fff5b3
13 changed files with 57 additions and 743 deletions

View File

@ -425,7 +425,7 @@ LIBSAMBA_OBJ = $(LIBSMB_OBJ0) \
CLDAP_OBJ = libads/cldap.o
LIBSMB_OBJ = libsmb/clientgen.o libsmb/cliconnect.o libsmb/clifile.o \
libsmb/clikrb5.o libsmb/clispnego.o libsmb/asn1.o \
libsmb/clikrb5.o libsmb/clispnego.o ../lib/util/asn1.o \
libsmb/clirap.o libsmb/clierror.o libsmb/climessage.o \
libsmb/clireadwrite.o libsmb/clilist.o libsmb/cliprint.o \
libsmb/clitrans.o libsmb/clisecdesc.o libsmb/clidgram.o \
@ -772,7 +772,7 @@ SMBPASSWD_OBJ = utils/smbpasswd.o $(PASSWD_UTIL_OBJ) $(PASSCHANGE_OBJ) \
PDBEDIT_OBJ = utils/pdbedit.o $(PASSWD_UTIL_OBJ) $(PARAM_OBJ) $(PASSDB_OBJ) @LIBWBCLIENT_STATIC@ \
$(LIBSAMBA_OBJ) \
$(LIB_NONSMBD_OBJ) $(GROUPDB_OBJ) \
$(POPT_LIB_OBJ) $(SMBLDAP_OBJ) libsmb/asn1.o \
$(POPT_LIB_OBJ) $(SMBLDAP_OBJ) ../lib/util/asn1.o \
$(LDB_OBJ)
SMBGET_OBJ = utils/smbget.o $(POPT_LIB_OBJ) $(LIBSMBCLIENT_OBJ1) @LIBWBCLIENT_STATIC@
@ -988,7 +988,7 @@ NDRDUMP_OBJ = ../librpc/tools/ndrdump.o \
librpc/gen_ndr/ndr_svcctl.o \
librpc/gen_ndr/tables.o ../librpc/ndr/ndr_table.o \
../librpc/ndr/ndr_krb5pac.o \
librpc/gen_ndr/ndr_krb5pac.o libsmb/asn1.o
librpc/gen_ndr/ndr_krb5pac.o ../lib/util/asn1.o
DEBUG2HTML_OBJ = utils/debug2html.o utils/debugparse.o
@ -1121,7 +1121,7 @@ TDBTORTURE_OBJ = @tdbdir@/tools/tdbtorture.o @LIBTDB_STATIC@ $(LIBREPLACE_OBJ) \
NTLM_AUTH_OBJ1 = utils/ntlm_auth.o utils/ntlm_auth_diagnostics.o
NTLM_AUTH_OBJ = ${NTLM_AUTH_OBJ1} $(LIBSAMBA_OBJ) $(POPT_LIB_OBJ) \
libsmb/asn1.o libsmb/spnego.o libsmb/clikrb5.o libads/kerberos.o \
../lib/util/asn1.o libsmb/spnego.o libsmb/clikrb5.o libads/kerberos.o \
$(SERVER_MUTEX_OBJ) $(LIBADS_SERVER_OBJ) \
$(PASSDB_OBJ) $(GROUPDB_OBJ) \
$(SMBLDAP_OBJ) $(LIBNMB_OBJ) \

View File

@ -1,54 +0,0 @@
/*
Unix SMB/CIFS implementation.
simple ASN1 code
Copyright (C) Andrew Tridgell 2001
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#ifndef _ASN_1_H
#define _ASN_1_H
struct nesting {
off_t start;
size_t taglen; /* for parsing */
struct nesting *next;
};
typedef struct asn1_data {
uint8 *data;
size_t length;
off_t ofs;
struct nesting *nesting;
bool has_error;
} ASN1_DATA;
#define ASN1_APPLICATION(x) ((x)+0x60)
#define ASN1_APPLICATION_SIMPLE(x) ((x)+0x40)
#define ASN1_SEQUENCE(x) ((x)+0x30)
#define ASN1_CONTEXT(x) ((x)+0xa0)
#define ASN1_CONTEXT_SIMPLE(x) ((x)+0x80)
#define ASN1_GENERAL_STRING 0x1b
#define ASN1_OCTET_STRING 0x4
#define ASN1_OID 0x6
#define ASN1_BOOLEAN 0x1
#define ASN1_INTEGER 0x2
#define ASN1_BITFIELD 0x3
#define ASN1_ENUMERATED 0xa
#define ASN1_SET 0x31
#define ASN1_MAX_OIDS 20
#endif /* _ASN_1_H */

View File

@ -584,6 +584,8 @@ struct smb_iconv_convenience *lp_iconv_convenience(void *lp_ctx);
#include "../lib/util/data_blob.h"
#include "../lib/util/time.h"
#include "../lib/util/asn1.h"
/* And a little extension. Abort on type mismatch */
#define talloc_get_type_abort(ptr, type) \
(type *)talloc_check_name_abort(ptr, #type)
@ -643,7 +645,6 @@ struct smb_iconv_convenience *lp_iconv_convenience(void *lp_ctx);
#include "client.h"
#include "session.h"
#include "asn_1.h"
#include "popt.h"
#include "mangle.h"
#include "module.h"

View File

@ -2474,37 +2474,6 @@ _PUBLIC_ NTSTATUS dcerpc_pipe_connect(TALLOC_CTX *parent_ctx, struct dcerpc_pipe
struct cli_credentials *credentials, struct event_context *ev,
struct loadparm_context *lp_ctx);
/* The following definitions come from libsmb/asn1.c */
void asn1_free(ASN1_DATA *data);
bool asn1_write(ASN1_DATA *data, const void *p, int len);
bool asn1_write_uint8(ASN1_DATA *data, uint8 v);
bool asn1_push_tag(ASN1_DATA *data, uint8 tag);
bool asn1_pop_tag(ASN1_DATA *data);
bool asn1_write_Integer(ASN1_DATA *data, int i);
bool asn1_write_OID(ASN1_DATA *data, const char *OID);
bool asn1_write_OctetString(ASN1_DATA *data, const void *p, size_t length);
bool asn1_write_GeneralString(ASN1_DATA *data, const char *s);
bool asn1_write_BOOLEAN(ASN1_DATA *data, bool v);
bool asn1_write_BOOLEAN2(ASN1_DATA *data, bool v);
bool asn1_check_BOOLEAN(ASN1_DATA *data, bool v);
bool asn1_load(ASN1_DATA *data, DATA_BLOB blob);
bool asn1_read(ASN1_DATA *data, void *p, int len);
bool asn1_read_uint8(ASN1_DATA *data, uint8 *v);
bool asn1_check_tag(ASN1_DATA *data, uint8 tag);
bool asn1_start_tag(ASN1_DATA *data, uint8 tag);
bool asn1_end_tag(ASN1_DATA *data);
int asn1_tag_remaining(ASN1_DATA *data);
bool asn1_read_OID(ASN1_DATA *data, char **OID);
bool asn1_check_OID(ASN1_DATA *data, const char *OID);
bool asn1_read_GeneralString(ASN1_DATA *data, char **s);
bool asn1_read_OctetString(ASN1_DATA *data, DATA_BLOB *blob);
bool asn1_read_Integer(ASN1_DATA *data, int *i);
bool asn1_check_enumerated(ASN1_DATA *data, int v);
bool asn1_write_enumerated(ASN1_DATA *data, uint8 v);
bool ber_write_OID_String(DATA_BLOB *blob, const char *OID);
bool ber_read_OID_String(TALLOC_CTX *mem_ctx, DATA_BLOB blob, const char **OID);
/* The following definitions come from libsmb/cliconnect.c */
ADS_STATUS cli_session_setup_spnego(struct cli_state *cli, const char *user,
@ -2966,7 +2935,7 @@ DATA_BLOB spnego_gen_negTokenInit(char guid[16],
const char *principal);
DATA_BLOB gen_negTokenInit(const char *OID, DATA_BLOB blob);
bool spnego_parse_negTokenInit(DATA_BLOB blob,
char *OIDs[ASN1_MAX_OIDS],
char *OIDs[ASN1_MAX_OIDS],
char **principal);
DATA_BLOB gen_negTokenTarg(const char *OIDs[], DATA_BLOB blob);
bool parse_negTokenTarg(DATA_BLOB blob, char *OIDs[ASN1_MAX_OIDS], DATA_BLOB *secblob);

View File

@ -46,7 +46,7 @@ static int send_cldap_netlogon(int sock, const char *domain,
asn1_write_enumerated(&data, 0);
asn1_write_Integer(&data, 0);
asn1_write_Integer(&data, 0);
asn1_write_BOOLEAN2(&data, False);
asn1_write_BOOLEAN(&data, False);
asn1_push_tag(&data, ASN1_CONTEXT(0));
if (domain) {
@ -164,12 +164,12 @@ static int recv_cldap_netlogon(TALLOC_CTX *mem_ctx,
asn1_start_tag(&data, ASN1_SEQUENCE(0));
asn1_read_Integer(&data, &i1);
asn1_start_tag(&data, ASN1_APPLICATION(4));
asn1_read_OctetString(&data, &os1);
asn1_read_OctetString(&data, NULL, &os1);
asn1_start_tag(&data, ASN1_SEQUENCE(0));
asn1_start_tag(&data, ASN1_SEQUENCE(0));
asn1_read_OctetString(&data, &os2);
asn1_read_OctetString(&data, NULL, &os2);
asn1_start_tag(&data, ASN1_SET);
asn1_read_OctetString(&data, &os3);
asn1_read_OctetString(&data, NULL, &os3);
asn1_end_tag(&data);
asn1_end_tag(&data);
asn1_end_tag(&data);

View File

@ -784,7 +784,7 @@ static ADS_STATUS ads_sasl_spnego_bind(ADS_STRUCT *ads)
got_kerberos_mechanism = True;
}
#endif
free(OIDs[i]);
talloc_free(OIDs[i]);
}
DEBUG(3,("ads_sasl_spnego_bind: got server principal name = %s\n", given_principal));
@ -795,7 +795,7 @@ static ADS_STATUS ads_sasl_spnego_bind(ADS_STRUCT *ads)
struct ads_service_principal p;
status = ads_generate_service_principal(ads, given_principal, &p);
SAFE_FREE(given_principal);
TALLOC_FREE(given_principal);
if (!ADS_ERR_OK(status)) {
return status;
}
@ -830,7 +830,7 @@ static ADS_STATUS ads_sasl_spnego_bind(ADS_STRUCT *ads)
} else
#endif
{
SAFE_FREE(given_principal);
TALLOC_FREE(given_principal);
}
/* lets do NTLMSSP ... this has the big advantage that we don't need

View File

@ -1,603 +0,0 @@
/*
Unix SMB/CIFS implementation.
simple SPNEGO routines
Copyright (C) Andrew Tridgell 2001
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#include "includes.h"
/* free an asn1 structure */
void asn1_free(ASN1_DATA *data)
{
struct nesting *nesting = data->nesting;
while (nesting) {
struct nesting *nnext = nesting->next;
free(nesting);
nesting = nnext;
};
data->nesting = NULL;
SAFE_FREE(data->data);
}
/* write to the ASN1 buffer, advancing the buffer pointer */
bool asn1_write(ASN1_DATA *data, const void *p, int len)
{
if (data->has_error) return false;
if (data->length < data->ofs+len) {
data->data = SMB_REALLOC_ARRAY(data->data, unsigned char,
data->ofs+len);
if (!data->data) {
data->has_error = true;
return false;
}
data->length = data->ofs+len;
}
memcpy(data->data + data->ofs, p, len);
data->ofs += len;
return true;
}
/* useful fn for writing a uint8 */
bool asn1_write_uint8(ASN1_DATA *data, uint8 v)
{
return asn1_write(data, &v, 1);
}
/* push a tag onto the asn1 data buffer. Used for nested structures */
bool asn1_push_tag(ASN1_DATA *data, uint8 tag)
{
struct nesting *nesting;
asn1_write_uint8(data, tag);
nesting = SMB_MALLOC_P(struct nesting);
if (!nesting) {
data->has_error = true;
return false;
}
nesting->start = data->ofs;
nesting->next = data->nesting;
data->nesting = nesting;
return asn1_write_uint8(data, 0xff);
}
/* pop a tag */
bool asn1_pop_tag(ASN1_DATA *data)
{
struct nesting *nesting;
size_t len;
if (data->has_error) {
return false;
}
nesting = data->nesting;
if (!nesting) {
data->has_error = true;
return false;
}
len = data->ofs - (nesting->start+1);
/* yes, this is ugly. We don't know in advance how many bytes the length
of a tag will take, so we assumed 1 byte. If we were wrong then we
need to correct our mistake */
if (len > 0xFFFF) {
data->data[nesting->start] = 0x83;
if (!asn1_write_uint8(data, 0)) return false;
if (!asn1_write_uint8(data, 0)) return false;
if (!asn1_write_uint8(data, 0)) return false;
memmove(data->data+nesting->start+4, data->data+nesting->start+1, len);
data->data[nesting->start+1] = (len>>16) & 0xFF;
data->data[nesting->start+2] = (len>>8) & 0xFF;
data->data[nesting->start+3] = len&0xff;
} else if (len > 255) {
data->data[nesting->start] = 0x82;
if (!asn1_write_uint8(data, 0)) return false;
if (!asn1_write_uint8(data, 0)) return false;
memmove(data->data+nesting->start+3, data->data+nesting->start+1, len);
data->data[nesting->start+1] = len>>8;
data->data[nesting->start+2] = len&0xff;
} else if (len > 127) {
data->data[nesting->start] = 0x81;
if (!asn1_write_uint8(data, 0)) return false;
memmove(data->data+nesting->start+2, data->data+nesting->start+1, len);
data->data[nesting->start+1] = len;
} else {
data->data[nesting->start] = len;
}
data->nesting = nesting->next;
free(nesting);
return true;
}
/* write an integer */
bool asn1_write_Integer(ASN1_DATA *data, int i)
{
if (!asn1_push_tag(data, ASN1_INTEGER)) return false;
do {
asn1_write_uint8(data, i);
i = i >> 8;
} while (i);
return asn1_pop_tag(data);
}
/* write an object ID to a ASN1 buffer */
bool asn1_write_OID(ASN1_DATA *data, const char *OID)
{
unsigned v, v2;
const char *p = (const char *)OID;
char *newp;
if (!asn1_push_tag(data, ASN1_OID))
return false;
v = strtol(p, &newp, 10);
p = newp;
v2 = strtol(p, &newp, 10);
p = newp;
if (!asn1_write_uint8(data, 40*v + v2))
return false;
while (*p) {
v = strtol(p, &newp, 10);
p = newp;
if (v >= (1<<28)) asn1_write_uint8(data, 0x80 | ((v>>28)&0xff));
if (v >= (1<<21)) asn1_write_uint8(data, 0x80 | ((v>>21)&0xff));
if (v >= (1<<14)) asn1_write_uint8(data, 0x80 | ((v>>14)&0xff));
if (v >= (1<<7)) asn1_write_uint8(data, 0x80 | ((v>>7)&0xff));
if (!asn1_write_uint8(data, v&0x7f))
return false;
}
return asn1_pop_tag(data);
}
/* write an octet string */
bool asn1_write_OctetString(ASN1_DATA *data, const void *p, size_t length)
{
asn1_push_tag(data, ASN1_OCTET_STRING);
asn1_write(data, p, length);
asn1_pop_tag(data);
return !data->has_error;
}
/* write a general string */
bool asn1_write_GeneralString(ASN1_DATA *data, const char *s)
{
asn1_push_tag(data, ASN1_GENERAL_STRING);
asn1_write(data, s, strlen(s));
asn1_pop_tag(data);
return !data->has_error;
}
/* write a BOOLEAN */
bool asn1_write_BOOLEAN(ASN1_DATA *data, bool v)
{
asn1_write_uint8(data, ASN1_BOOLEAN);
asn1_write_uint8(data, v);
return !data->has_error;
}
/* write a BOOLEAN - hmm, I suspect this one is the correct one, and the
above boolean is bogus. Need to check */
bool asn1_write_BOOLEAN2(ASN1_DATA *data, bool v)
{
asn1_push_tag(data, ASN1_BOOLEAN);
asn1_write_uint8(data, v);
asn1_pop_tag(data);
return !data->has_error;
}
/* check a BOOLEAN */
bool asn1_check_BOOLEAN(ASN1_DATA *data, bool v)
{
uint8 b = 0;
asn1_read_uint8(data, &b);
if (b != ASN1_BOOLEAN) {
data->has_error = true;
return false;
}
asn1_read_uint8(data, &b);
if (b != v) {
data->has_error = true;
return false;
}
return !data->has_error;
}
/* load a ASN1_DATA structure with a lump of data, ready to be parsed */
bool asn1_load(ASN1_DATA *data, DATA_BLOB blob)
{
ZERO_STRUCTP(data);
data->data = (unsigned char *)memdup(blob.data, blob.length);
if (!data->data) {
data->has_error = true;
return false;
}
data->length = blob.length;
return true;
}
/* read from a ASN1 buffer, advancing the buffer pointer */
bool asn1_read(ASN1_DATA *data, void *p, int len)
{
if (data->has_error)
return false;
if (len < 0 || data->ofs + len < data->ofs || data->ofs + len < len) {
data->has_error = true;
return false;
}
if (data->ofs + len > data->length) {
data->has_error = true;
return false;
}
memcpy(p, data->data + data->ofs, len);
data->ofs += len;
return true;
}
/* read a uint8 from a ASN1 buffer */
bool asn1_read_uint8(ASN1_DATA *data, uint8 *v)
{
return asn1_read(data, v, 1);
}
/*
* Check thta the value of the ASN1 buffer at the current offset equals tag.
*/
bool asn1_check_tag(ASN1_DATA *data, uint8 tag)
{
if (data->has_error || data->ofs >= data->length || data->ofs < 0) {
data->has_error = true;
return false;
}
return (tag == data->data[data->ofs]);
}
/* start reading a nested asn1 structure */
bool asn1_start_tag(ASN1_DATA *data, uint8 tag)
{
uint8 b;
struct nesting *nesting;
if (!asn1_read_uint8(data, &b))
return false;
if (b != tag) {
data->has_error = true;
return false;
}
nesting = SMB_MALLOC_P(struct nesting);
if (!nesting) {
data->has_error = true;
return false;
}
if (!asn1_read_uint8(data, &b)) {
SAFE_FREE(nesting);
return false;
}
if (b & 0x80) {
int n = b & 0x7f;
if (!asn1_read_uint8(data, &b)) {
SAFE_FREE(nesting);
return false;
}
nesting->taglen = b;
while (n > 1) {
if (!asn1_read_uint8(data, &b)) {
SAFE_FREE(nesting);
return false;
}
nesting->taglen = (nesting->taglen << 8) | b;
n--;
}
} else {
nesting->taglen = b;
}
nesting->start = data->ofs;
nesting->next = data->nesting;
data->nesting = nesting;
return !data->has_error;
}
/* stop reading a tag */
bool asn1_end_tag(ASN1_DATA *data)
{
struct nesting *nesting;
/* make sure we read it all */
if (asn1_tag_remaining(data) != 0) {
data->has_error = true;
return false;
}
nesting = data->nesting;
if (!nesting) {
data->has_error = true;
return false;
}
data->nesting = nesting->next;
free(nesting);
return true;
}
/* work out how many bytes are left in this nested tag */
int asn1_tag_remaining(ASN1_DATA *data)
{
if (data->has_error)
return 0;
if (!data->nesting) {
data->has_error = true;
return -1;
}
return data->nesting->taglen - (data->ofs - data->nesting->start);
}
/* read an object ID from a ASN1 buffer */
bool asn1_read_OID(ASN1_DATA *data, char **OID)
{
uint8 b = 0;
char *oid_str = NULL;
*OID = NULL;
if (!asn1_start_tag(data, ASN1_OID)) {
return false;
}
asn1_read_uint8(data, &b);
oid_str = talloc_asprintf(NULL,
"%u",
b/40);
if (!oid_str) {
data->has_error = true;
goto out;
}
oid_str = talloc_asprintf_append(oid_str,
" %u",
b%40);
if (!oid_str) {
data->has_error = true;
goto out;
}
while (asn1_tag_remaining(data) > 0) {
unsigned v = 0;
do {
asn1_read_uint8(data, &b);
v = (v<<7) | (b&0x7f);
} while (!data->has_error && b & 0x80);
oid_str = talloc_asprintf_append(oid_str,
" %u",
v);
if (!oid_str) {
data->has_error = true;
goto out;
}
}
out:
asn1_end_tag(data);
if (!data->has_error) {
*OID = SMB_STRDUP(oid_str);
}
TALLOC_FREE(oid_str);
return !data->has_error;
}
/* check that the next object ID is correct */
bool asn1_check_OID(ASN1_DATA *data, const char *OID)
{
char *id;
if (!asn1_read_OID(data, &id)) {
return false;
}
if (strcmp(id, OID) != 0) {
data->has_error = true;
free(id);
return false;
}
free(id);
return true;
}
/* read a GeneralString from a ASN1 buffer */
bool asn1_read_GeneralString(ASN1_DATA *data, char **s)
{
int len;
char *str;
*s = NULL;
if (!asn1_start_tag(data, ASN1_GENERAL_STRING)) {
return false;
}
len = asn1_tag_remaining(data);
if (len < 0) {
data->has_error = true;
return false;
}
str = SMB_MALLOC_ARRAY(char, len+1);
if (!str) {
data->has_error = true;
return false;
}
asn1_read(data, str, len);
str[len] = 0;
asn1_end_tag(data);
if (!data->has_error) {
*s = str;
}
return !data->has_error;
}
/* read a octet string blob */
bool asn1_read_OctetString(ASN1_DATA *data, DATA_BLOB *blob)
{
int len;
ZERO_STRUCTP(blob);
if (!asn1_start_tag(data, ASN1_OCTET_STRING)) return false;
len = asn1_tag_remaining(data);
if (len < 0) {
data->has_error = true;
return false;
}
*blob = data_blob(NULL, len);
asn1_read(data, blob->data, len);
asn1_end_tag(data);
return !data->has_error;
}
/* read an interger */
bool asn1_read_Integer(ASN1_DATA *data, int *i)
{
uint8 b;
*i = 0;
if (!asn1_start_tag(data, ASN1_INTEGER)) return false;
while (asn1_tag_remaining(data)>0) {
asn1_read_uint8(data, &b);
*i = (*i << 8) + b;
}
return asn1_end_tag(data);
}
/* check a enumarted value is correct */
bool asn1_check_enumerated(ASN1_DATA *data, int v)
{
uint8 b;
if (!asn1_start_tag(data, ASN1_ENUMERATED)) return false;
asn1_read_uint8(data, &b);
asn1_end_tag(data);
if (v != b)
data->has_error = false;
return !data->has_error;
}
/* write an enumarted value to the stream */
bool asn1_write_enumerated(ASN1_DATA *data, uint8 v)
{
if (!asn1_push_tag(data, ASN1_ENUMERATED)) return false;
asn1_write_uint8(data, v);
asn1_pop_tag(data);
return !data->has_error;
}
bool ber_write_OID_String(DATA_BLOB *blob, const char *OID)
{
uint_t v, v2;
const char *p = (const char *)OID;
char *newp;
int i;
v = strtoul(p, &newp, 10);
if (newp[0] != '.') return false;
p = newp + 1;
v2 = strtoul(p, &newp, 10);
if (newp[0] != '.') return false;
p = newp + 1;
/*the ber representation can't use more space then the string one */
*blob = data_blob(NULL, strlen(OID));
if (!blob->data) return false;
blob->data[0] = 40*v + v2;
i = 1;
while (*p) {
v = strtoul(p, &newp, 10);
if (newp[0] == '.') {
p = newp + 1;
} else if (newp[0] == '\0') {
p = newp;
} else {
data_blob_free(blob);
return false;
}
if (v >= (1<<28)) blob->data[i++] = (0x80 | ((v>>28)&0x7f));
if (v >= (1<<21)) blob->data[i++] = (0x80 | ((v>>21)&0x7f));
if (v >= (1<<14)) blob->data[i++] = (0x80 | ((v>>14)&0x7f));
if (v >= (1<<7)) blob->data[i++] = (0x80 | ((v>>7)&0x7f));
blob->data[i++] = (v&0x7f);
}
blob->length = i;
return true;
}
/* read an object ID from a data blob */
bool ber_read_OID_String(TALLOC_CTX *mem_ctx, DATA_BLOB blob, const char **OID)
{
int i;
uint8_t *b;
uint_t v;
char *tmp_oid = NULL;
if (blob.length < 2) return false;
b = blob.data;
tmp_oid = talloc_asprintf(mem_ctx, "%u", b[0]/40);
if (!tmp_oid) goto nomem;
tmp_oid = talloc_asprintf_append_buffer(tmp_oid, ".%u", b[0]%40);
if (!tmp_oid) goto nomem;
for(i = 1, v = 0; i < blob.length; i++) {
v = (v<<7) | (b[i]&0x7f);
if ( ! (b[i] & 0x80)) {
tmp_oid = talloc_asprintf_append_buffer(tmp_oid, ".%u", v);
v = 0;
}
if (!tmp_oid) goto nomem;
}
if (v != 0) {
talloc_free(tmp_oid);
return false;
}
*OID = tmp_oid;
return true;
nomem:
return false;
}

View File

@ -833,7 +833,7 @@ ADS_STATUS cli_session_setup_spnego(struct cli_state *cli, const char *user,
strcmp(OIDs[i], OID_KERBEROS5) == 0) {
cli->got_kerberos_mechanism = True;
}
free(OIDs[i]);
talloc_free(OIDs[i]);
}
DEBUG(3,("got principal=%s\n", principal ? principal : "<null>"));
@ -854,7 +854,7 @@ ADS_STATUS cli_session_setup_spnego(struct cli_state *cli, const char *user,
ret = kerberos_kinit_password(user, pass, 0 /* no time correction for now */, NULL);
if (ret){
SAFE_FREE(principal);
TALLOC_FREE(principal);
DEBUG(0, ("Kinit failed: %s\n", error_message(ret)));
if (cli->fallback_after_kerberos)
goto ntlmssp;
@ -866,7 +866,7 @@ ADS_STATUS cli_session_setup_spnego(struct cli_state *cli, const char *user,
we have a valid host NetBIOS name.
*/
if (strequal(principal, ADS_IGNORE_PRINCIPAL)) {
SAFE_FREE(principal);
TALLOC_FREE(principal);
}
if (principal == NULL &&
@ -897,8 +897,9 @@ ADS_STATUS cli_session_setup_spnego(struct cli_state *cli, const char *user,
realm = kerberos_get_default_realm_from_ccache();
}
if (realm && *realm) {
if (asprintf(&principal, "%s$@%s",
machine, realm) < 0) {
principal = talloc_asprintf(NULL, "%s$@%s",
machine, realm);
if (!principal) {
SAFE_FREE(machine);
SAFE_FREE(realm);
return ADS_ERROR_NT(NT_STATUS_NO_MEMORY);
@ -915,14 +916,14 @@ ADS_STATUS cli_session_setup_spnego(struct cli_state *cli, const char *user,
rc = cli_session_setup_kerberos(cli, principal,
dest_realm);
if (ADS_ERR_OK(rc) || !cli->fallback_after_kerberos) {
SAFE_FREE(principal);
TALLOC_FREE(principal);
return rc;
}
}
}
#endif
SAFE_FREE(principal);
TALLOC_FREE(principal);
ntlmssp:

View File

@ -340,7 +340,7 @@ bool unwrap_edata_ntstatus(TALLOC_CTX *mem_ctx,
}
asn1_start_tag(&data, ASN1_CONTEXT(2));
asn1_read_OctetString(&data, &edata_contents);
asn1_read_OctetString(&data, NULL, &edata_contents);
asn1_end_tag(&data);
asn1_end_tag(&data);
asn1_end_tag(&data);
@ -378,7 +378,7 @@ bool unwrap_pac(TALLOC_CTX *mem_ctx, DATA_BLOB *auth_data, DATA_BLOB *unwrapped_
asn1_end_tag(&data);
asn1_start_tag(&data, ASN1_CONTEXT(1));
asn1_read_OctetString(&data, &pac_contents);
asn1_read_OctetString(&data, NULL, &pac_contents);
asn1_end_tag(&data);
asn1_end_tag(&data);
asn1_end_tag(&data);

View File

@ -123,7 +123,7 @@ DATA_BLOB gen_negTokenInit(const char *OID, DATA_BLOB blob)
OIDs (the mechanisms) and a principal name string
*/
bool spnego_parse_negTokenInit(DATA_BLOB blob,
char *OIDs[ASN1_MAX_OIDS],
char *OIDs[ASN1_MAX_OIDS],
char **principal)
{
int i;
@ -140,8 +140,8 @@ bool spnego_parse_negTokenInit(DATA_BLOB blob,
asn1_start_tag(&data,ASN1_CONTEXT(0));
asn1_start_tag(&data,ASN1_SEQUENCE(0));
for (i=0; asn1_tag_remaining(&data) > 0 && i < ASN1_MAX_OIDS-1; i++) {
char *oid_str = NULL;
asn1_read_OID(&data,&oid_str);
const char *oid_str = NULL;
asn1_read_OID(&data,NULL,&oid_str);
OIDs[i] = oid_str;
}
OIDs[i] = NULL;
@ -153,7 +153,7 @@ bool spnego_parse_negTokenInit(DATA_BLOB blob,
asn1_start_tag(&data, ASN1_CONTEXT(3));
asn1_start_tag(&data, ASN1_SEQUENCE(0));
asn1_start_tag(&data, ASN1_CONTEXT(0));
asn1_read_GeneralString(&data,principal);
asn1_read_GeneralString(&data,NULL,principal);
asn1_end_tag(&data);
asn1_end_tag(&data);
asn1_end_tag(&data);
@ -167,9 +167,9 @@ bool spnego_parse_negTokenInit(DATA_BLOB blob,
ret = !data.has_error;
if (data.has_error) {
int j;
SAFE_FREE(*principal);
TALLOC_FREE(*principal);
for(j = 0; j < i && j < ASN1_MAX_OIDS-1; j++) {
SAFE_FREE(OIDs[j]);
TALLOC_FREE(OIDs[j]);
}
}
@ -224,7 +224,7 @@ DATA_BLOB gen_negTokenTarg(const char *OIDs[], DATA_BLOB blob)
/*
parse a negTokenTarg packet giving a list of OIDs and a security blob
*/
bool parse_negTokenTarg(DATA_BLOB blob, char *OIDs[ASN1_MAX_OIDS], DATA_BLOB *secblob)
bool parse_negTokenTarg(DATA_BLOB blob, const char *OIDs[ASN1_MAX_OIDS], DATA_BLOB *secblob)
{
int i;
ASN1_DATA data;
@ -238,8 +238,8 @@ bool parse_negTokenTarg(DATA_BLOB blob, char *OIDs[ASN1_MAX_OIDS], DATA_BLOB *se
asn1_start_tag(&data, ASN1_CONTEXT(0));
asn1_start_tag(&data, ASN1_SEQUENCE(0));
for (i=0; asn1_tag_remaining(&data) > 0 && i < ASN1_MAX_OIDS-1; i++) {
char *oid_str = NULL;
asn1_read_OID(&data,&oid_str);
const char *oid_str = NULL;
asn1_read_OID(&data,NULL,&oid_str);
OIDs[i] = oid_str;
}
OIDs[i] = NULL;
@ -247,7 +247,7 @@ bool parse_negTokenTarg(DATA_BLOB blob, char *OIDs[ASN1_MAX_OIDS], DATA_BLOB *se
asn1_end_tag(&data);
/* Skip any optional req_flags that are sent per RFC 4178 */
if (asn1_check_tag(&data, ASN1_CONTEXT(1))) {
if (asn1_peek_tag(&data, ASN1_CONTEXT(1))) {
uint8 flags;
asn1_start_tag(&data, ASN1_CONTEXT(1));
@ -259,7 +259,7 @@ bool parse_negTokenTarg(DATA_BLOB blob, char *OIDs[ASN1_MAX_OIDS], DATA_BLOB *se
}
asn1_start_tag(&data, ASN1_CONTEXT(2));
asn1_read_OctetString(&data,secblob);
asn1_read_OctetString(&data,NULL,secblob);
asn1_end_tag(&data);
asn1_end_tag(&data);
@ -271,7 +271,7 @@ bool parse_negTokenTarg(DATA_BLOB blob, char *OIDs[ASN1_MAX_OIDS], DATA_BLOB *se
int j;
data_blob_free(secblob);
for(j = 0; j < i && j < ASN1_MAX_OIDS-1; j++) {
SAFE_FREE(OIDs[j]);
TALLOC_FREE(OIDs[j]);
}
DEBUG(1,("Failed to parse negTokenTarg at offset %d\n", (int)data.ofs));
asn1_free(&data);
@ -407,13 +407,13 @@ bool spnego_parse_challenge(const DATA_BLOB blob,
asn1_end_tag(&data);
asn1_start_tag(&data,ASN1_CONTEXT(2));
asn1_read_OctetString(&data, chal1);
asn1_read_OctetString(&data, NULL, chal1);
asn1_end_tag(&data);
/* the second challenge is optional (XP doesn't send it) */
if (asn1_tag_remaining(&data)) {
asn1_start_tag(&data,ASN1_CONTEXT(3));
asn1_read_OctetString(&data, chal2);
asn1_read_OctetString(&data, NULL, chal2);
asn1_end_tag(&data);
}
@ -468,7 +468,7 @@ bool spnego_parse_auth(DATA_BLOB blob, DATA_BLOB *auth)
asn1_start_tag(&data, ASN1_CONTEXT(1));
asn1_start_tag(&data, ASN1_SEQUENCE(0));
asn1_start_tag(&data, ASN1_CONTEXT(2));
asn1_read_OctetString(&data,auth);
asn1_read_OctetString(&data, NULL, auth);
asn1_end_tag(&data);
asn1_end_tag(&data);
asn1_end_tag(&data);
@ -564,7 +564,7 @@ bool spnego_parse_auth_response(DATA_BLOB blob, NTSTATUS nt_status,
if (asn1_tag_remaining(&data)) {
asn1_start_tag(&data,ASN1_CONTEXT(2));
asn1_read_OctetString(&data, auth);
asn1_read_OctetString(&data, NULL, auth);
asn1_end_tag(&data);
}
} else if (negResult == SPNEGO_NEG_RESULT_INCOMPLETE) {
@ -578,7 +578,7 @@ bool spnego_parse_auth_response(DATA_BLOB blob, NTSTATUS nt_status,
if (asn1_tag_remaining(&data)) {
DATA_BLOB mechList = data_blob_null;
asn1_start_tag(&data, ASN1_CONTEXT(3));
asn1_read_OctetString(&data, &mechList);
asn1_read_OctetString(&data, NULL, &mechList);
asn1_end_tag(&data);
data_blob_free(&mechList);
DEBUG(5,("spnego_parse_auth_response received mechListMIC, "

View File

@ -41,17 +41,17 @@ static bool read_negTokenInit(ASN1_DATA *asn1, negTokenInit_t *token)
asn1_start_tag(asn1, ASN1_CONTEXT(0));
asn1_start_tag(asn1, ASN1_SEQUENCE(0));
token->mechTypes = SMB_MALLOC_P(const char *);
token->mechTypes = TALLOC_P(NULL, const char *);
for (i = 0; !asn1->has_error &&
0 < asn1_tag_remaining(asn1); i++) {
char *p_oid = NULL;
const char *p_oid = NULL;
token->mechTypes =
SMB_REALLOC_ARRAY(token->mechTypes, const char *, i + 2);
TALLOC_REALLOC_ARRAY(token->mechTypes, const char *, i + 2);
if (!token->mechTypes) {
asn1->has_error = True;
return False;
}
asn1_read_OID(asn1, &p_oid);
asn1_read_OID(asn1, NULL, &p_oid);
token->mechTypes[i] = p_oid;
}
token->mechTypes[i] = NULL;
@ -69,14 +69,14 @@ static bool read_negTokenInit(ASN1_DATA *asn1, negTokenInit_t *token)
/* Read mechToken */
case ASN1_CONTEXT(2):
asn1_start_tag(asn1, ASN1_CONTEXT(2));
asn1_read_OctetString(asn1, &token->mechToken);
asn1_read_OctetString(asn1, NULL, &token->mechToken);
asn1_end_tag(asn1);
break;
/* Read mecListMIC */
case ASN1_CONTEXT(3):
asn1_start_tag(asn1, ASN1_CONTEXT(3));
if (asn1->data[asn1->ofs] == ASN1_OCTET_STRING) {
asn1_read_OctetString(asn1,
asn1_read_OctetString(asn1, NULL,
&token->mechListMIC);
} else {
/* RFC 2478 says we have an Octet String here,
@ -84,13 +84,13 @@ static bool read_negTokenInit(ASN1_DATA *asn1, negTokenInit_t *token)
char *mechListMIC;
asn1_push_tag(asn1, ASN1_SEQUENCE(0));
asn1_push_tag(asn1, ASN1_CONTEXT(0));
asn1_read_GeneralString(asn1, &mechListMIC);
asn1_read_GeneralString(asn1, NULL, &mechListMIC);
asn1_pop_tag(asn1);
asn1_pop_tag(asn1);
token->mechListMIC =
data_blob(mechListMIC, strlen(mechListMIC));
SAFE_FREE(mechListMIC);
TALLO_FREE(mechListMIC);
}
asn1_end_tag(asn1);
break;
@ -187,17 +187,17 @@ static bool read_negTokenTarg(ASN1_DATA *asn1, negTokenTarg_t *token)
break;
case ASN1_CONTEXT(1):
asn1_start_tag(asn1, ASN1_CONTEXT(1));
asn1_read_OID(asn1, &token->supportedMech);
asn1_read_OID(asn1, NULL, &token->supportedMech);
asn1_end_tag(asn1);
break;
case ASN1_CONTEXT(2):
asn1_start_tag(asn1, ASN1_CONTEXT(2));
asn1_read_OctetString(asn1, &token->responseToken);
asn1_read_OctetString(asn1, NULL, &token->responseToken);
asn1_end_tag(asn1);
break;
case ASN1_CONTEXT(3):
asn1_start_tag(asn1, ASN1_CONTEXT(3));
asn1_read_OctetString(asn1, &token->mechListMIC);
asn1_read_OctetString(asn1, NULL, &token->mechListMIC);
asn1_end_tag(asn1);
break;
default:
@ -322,16 +322,16 @@ bool free_spnego_data(SPNEGO_DATA *spnego)
if (spnego->negTokenInit.mechTypes) {
int i;
for (i = 0; spnego->negTokenInit.mechTypes[i]; i++) {
free(CONST_DISCARD(char *,spnego->negTokenInit.mechTypes[i]));
talloc_free(CONST_DISCARD(char *,spnego->negTokenInit.mechTypes[i]));
}
free(spnego->negTokenInit.mechTypes);
talloc_free(spnego->negTokenInit.mechTypes);
}
data_blob_free(&spnego->negTokenInit.mechToken);
data_blob_free(&spnego->negTokenInit.mechListMIC);
break;
case SPNEGO_NEG_TOKEN_TARG:
if (spnego->negTokenTarg.supportedMech) {
free(spnego->negTokenTarg.supportedMech);
talloc_free(spnego->negTokenTarg.supportedMech);
}
data_blob_free(&spnego->negTokenTarg.responseToken);
data_blob_free(&spnego->negTokenTarg.mechListMIC);

View File

@ -1168,7 +1168,7 @@ static bool pipe_spnego_auth_bind_negotiate(pipes_struct *p, prs_struct *rpc_in_
for (i=0;OIDs[i];i++) {
DEBUG(3,("pipe_spnego_auth_bind_negotiate: Got OID %s\n", OIDs[i]));
SAFE_FREE(OIDs[i]);
TALLOC_FREE(OIDs[i]);
}
DEBUG(3,("pipe_spnego_auth_bind_negotiate: Got secblob of size %lu\n", (unsigned long)secblob.length));

View File

@ -746,7 +746,7 @@ NTSTATUS parse_spnego_mechanisms(DATA_BLOB blob_in,
for (i=0;OIDs[i];i++) {
DEBUG(5,("parse_spnego_mechanisms: Got OID %s\n", OIDs[i]));
free(OIDs[i]);
talloc_free(OIDs[i]);
}
return ret;
}