mirror of
https://github.com/samba-team/samba.git
synced 2024-12-25 23:21:54 +03:00
319 lines
7.2 KiB
C
319 lines
7.2 KiB
C
/*
|
|
* Copyright (c) 1997-2005 Kungliga Tekniska Högskolan
|
|
* (Royal Institute of Technology, Stockholm, Sweden).
|
|
*
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
*
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
*
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
*
|
|
* 3. Neither the name of the Institute nor the names of its contributors
|
|
* may be used to endorse or promote products derived from this software
|
|
* without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*/
|
|
|
|
#include "kdc_locl.h"
|
|
|
|
/*
|
|
*
|
|
*/
|
|
|
|
void
|
|
krb5_kdc_update_time(struct timeval *tv)
|
|
{
|
|
if (tv == NULL)
|
|
gettimeofday(&_kdc_now, NULL);
|
|
else
|
|
_kdc_now = *tv;
|
|
}
|
|
|
|
static krb5_error_code
|
|
kdc_as_req(krb5_context context,
|
|
krb5_kdc_configuration *config,
|
|
krb5_data *req_buffer,
|
|
krb5_data *reply,
|
|
const char *from,
|
|
struct sockaddr *addr,
|
|
int datagram_reply,
|
|
int *claim)
|
|
{
|
|
krb5_error_code ret;
|
|
KDC_REQ req;
|
|
size_t len;
|
|
|
|
ret = decode_AS_REQ(req_buffer->data, req_buffer->length, &req, &len);
|
|
if (ret)
|
|
return ret;
|
|
|
|
*claim = 1;
|
|
|
|
ret = _kdc_as_rep(context, config, &req, req_buffer,
|
|
reply, from, addr, datagram_reply);
|
|
free_AS_REQ(&req);
|
|
return ret;
|
|
}
|
|
|
|
|
|
static krb5_error_code
|
|
kdc_tgs_req(krb5_context context,
|
|
krb5_kdc_configuration *config,
|
|
krb5_data *req_buffer,
|
|
krb5_data *reply,
|
|
const char *from,
|
|
struct sockaddr *addr,
|
|
int datagram_reply,
|
|
int *claim)
|
|
{
|
|
krb5_error_code ret;
|
|
KDC_REQ req;
|
|
size_t len;
|
|
|
|
ret = decode_TGS_REQ(req_buffer->data, req_buffer->length, &req, &len);
|
|
if (ret)
|
|
return ret;
|
|
|
|
*claim = 1;
|
|
|
|
ret = _kdc_tgs_rep(context, config, &req, reply,
|
|
from, addr, datagram_reply);
|
|
free_TGS_REQ(&req);
|
|
return ret;
|
|
}
|
|
|
|
#ifdef DIGEST
|
|
|
|
static krb5_error_code
|
|
kdc_digest(krb5_context context,
|
|
krb5_kdc_configuration *config,
|
|
krb5_data *req_buffer,
|
|
krb5_data *reply,
|
|
const char *from,
|
|
struct sockaddr *addr,
|
|
int datagram_reply,
|
|
int *claim)
|
|
{
|
|
DigestREQ digestreq;
|
|
krb5_error_code ret;
|
|
size_t len;
|
|
|
|
ret = decode_DigestREQ(req_buffer->data, req_buffer->length,
|
|
&digestreq, &len);
|
|
if (ret)
|
|
return ret;
|
|
|
|
*claim = 1;
|
|
|
|
ret = _kdc_do_digest(context, config, &digestreq, reply, from, addr);
|
|
free_DigestREQ(&digestreq);
|
|
return ret;
|
|
}
|
|
|
|
#endif
|
|
|
|
#ifdef KX509
|
|
|
|
static krb5_error_code
|
|
kdc_kx509(krb5_context context,
|
|
krb5_kdc_configuration *config,
|
|
krb5_data *req_buffer,
|
|
krb5_data *reply,
|
|
const char *from,
|
|
struct sockaddr *addr,
|
|
int datagram_reply,
|
|
int *claim)
|
|
{
|
|
Kx509Request kx509req;
|
|
krb5_error_code ret;
|
|
size_t len;
|
|
|
|
ret = _kdc_try_kx509_request(req_buffer->data, req_buffer->length,
|
|
&kx509req, &len);
|
|
if (ret)
|
|
return ret;
|
|
|
|
*claim = 1;
|
|
|
|
ret = _kdc_do_kx509(context, config, &kx509req, reply, from, addr);
|
|
free_Kx509Request(&kx509req);
|
|
return ret;
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
static struct krb5_kdc_service services[] = {
|
|
{ KS_KRB5, kdc_as_req },
|
|
{ KS_KRB5, kdc_tgs_req },
|
|
#ifdef DIGEST
|
|
{ 0, kdc_digest },
|
|
#endif
|
|
#ifdef KX509
|
|
{ 0, kdc_kx509 },
|
|
#endif
|
|
{ 0, NULL }
|
|
};
|
|
|
|
/*
|
|
* handle the request in `buf, len', from `addr' (or `from' as a string),
|
|
* sending a reply in `reply'.
|
|
*/
|
|
|
|
int
|
|
krb5_kdc_process_request(krb5_context context,
|
|
krb5_kdc_configuration *config,
|
|
unsigned char *buf,
|
|
size_t len,
|
|
krb5_data *reply,
|
|
krb5_boolean *prependlength,
|
|
const char *from,
|
|
struct sockaddr *addr,
|
|
int datagram_reply)
|
|
{
|
|
krb5_error_code ret;
|
|
unsigned int i;
|
|
krb5_data req_buffer;
|
|
int claim = 0;
|
|
|
|
req_buffer.data = buf;
|
|
req_buffer.length = len;
|
|
|
|
for (i = 0; services[i].process != NULL; i++) {
|
|
ret = (*services[i].process)(context, config, &req_buffer,
|
|
reply, from, addr, datagram_reply,
|
|
&claim);
|
|
if (claim) {
|
|
if (services[i].flags & KS_NO_LENGTH)
|
|
*prependlength = 0;
|
|
return ret;
|
|
}
|
|
}
|
|
|
|
return -1;
|
|
}
|
|
|
|
/*
|
|
* handle the request in `buf, len', from `addr' (or `from' as a string),
|
|
* sending a reply in `reply'.
|
|
*
|
|
* This only processes krb5 requests
|
|
*/
|
|
|
|
int
|
|
krb5_kdc_process_krb5_request(krb5_context context,
|
|
krb5_kdc_configuration *config,
|
|
unsigned char *buf,
|
|
size_t len,
|
|
krb5_data *reply,
|
|
const char *from,
|
|
struct sockaddr *addr,
|
|
int datagram_reply)
|
|
{
|
|
krb5_error_code ret;
|
|
unsigned int i;
|
|
krb5_data req_buffer;
|
|
int claim = 0;
|
|
|
|
req_buffer.data = buf;
|
|
req_buffer.length = len;
|
|
|
|
for (i = 0; services[i].process != NULL; i++) {
|
|
if ((services[i].flags & KS_KRB5) == 0)
|
|
continue;
|
|
ret = (*services[i].process)(context, config, &req_buffer,
|
|
reply, from, addr, datagram_reply,
|
|
&claim);
|
|
if (claim)
|
|
return ret;
|
|
}
|
|
|
|
return -1;
|
|
}
|
|
|
|
/*
|
|
*
|
|
*/
|
|
|
|
int
|
|
krb5_kdc_save_request(krb5_context context,
|
|
const char *fn,
|
|
const unsigned char *buf,
|
|
size_t len,
|
|
const krb5_data *reply,
|
|
const struct sockaddr *sa)
|
|
{
|
|
krb5_storage *sp;
|
|
krb5_address a;
|
|
int fd, ret;
|
|
uint32_t t;
|
|
krb5_data d;
|
|
|
|
memset(&a, 0, sizeof(a));
|
|
|
|
d.data = rk_UNCONST(buf);
|
|
d.length = len;
|
|
t = _kdc_now.tv_sec;
|
|
|
|
fd = open(fn, O_WRONLY|O_CREAT|O_APPEND, 0600);
|
|
if (fd < 0) {
|
|
int saved_errno = errno;
|
|
krb5_set_error_message(context, saved_errno, "Failed to open: %s", fn);
|
|
return saved_errno;
|
|
}
|
|
|
|
sp = krb5_storage_from_fd(fd);
|
|
close(fd);
|
|
if (sp == NULL) {
|
|
krb5_set_error_message(context, ENOMEM, "Storage failed to open fd");
|
|
return ENOMEM;
|
|
}
|
|
|
|
ret = krb5_sockaddr2address(context, sa, &a);
|
|
if (ret)
|
|
goto out;
|
|
|
|
krb5_store_uint32(sp, 1);
|
|
krb5_store_uint32(sp, t);
|
|
krb5_store_address(sp, a);
|
|
krb5_store_data(sp, d);
|
|
{
|
|
Der_class cl;
|
|
Der_type ty;
|
|
unsigned int tag;
|
|
ret = der_get_tag (reply->data, reply->length,
|
|
&cl, &ty, &tag, NULL);
|
|
if (ret) {
|
|
krb5_store_uint32(sp, 0xffffffff);
|
|
krb5_store_uint32(sp, 0xffffffff);
|
|
} else {
|
|
krb5_store_uint32(sp, MAKE_TAG(cl, ty, 0));
|
|
krb5_store_uint32(sp, tag);
|
|
}
|
|
}
|
|
|
|
krb5_free_address(context, &a);
|
|
out:
|
|
krb5_storage_free(sp);
|
|
|
|
return 0;
|
|
}
|