diff options
Diffstat (limited to '')
-rw-r--r-- | third_party/heimdal/kdc/process.c | 583 |
1 files changed, 583 insertions, 0 deletions
diff --git a/third_party/heimdal/kdc/process.c b/third_party/heimdal/kdc/process.c new file mode 100644 index 0000000..98a405e --- /dev/null +++ b/third_party/heimdal/kdc/process.c @@ -0,0 +1,583 @@ +/* + * Copyright (c) 1997-2005 Kungliga Tekniska Högskolan + * (Royal Institute of Technology, Stockholm, Sweden). + * + * All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in the + * documentation and/or other materials provided with the distribution. + * + * 3. Neither the name of the Institute nor the names of its contributors + * may be used to endorse or promote products derived from this software + * without specific prior written permission. + * + * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND + * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS + * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY + * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + * SUCH DAMAGE. + */ + +#include "kdc_locl.h" +#include <vis.h> + +/* + * + */ + +#undef __attribute__ +#define __attribute__(x) + +KDC_LIB_FUNCTION void KDC_LIB_CALL +kdc_audit_vaddreason(kdc_request_t r, const char *fmt, va_list ap) + __attribute__ ((__format__ (__printf__, 2, 0))) +{ + heim_audit_vaddreason((heim_svc_req_desc)r, fmt, ap); +} + +KDC_LIB_FUNCTION void KDC_LIB_CALL +kdc_audit_addreason(kdc_request_t r, const char *fmt, ...) + __attribute__ ((__format__ (__printf__, 2, 3))) +{ + va_list ap; + + va_start(ap, fmt); + heim_audit_vaddreason((heim_svc_req_desc)r, fmt, ap); + va_end(ap); +} + +/* + * append_token adds a token which is optionally a kv-pair and it + * also optionally eats the whitespace. If k == NULL, then it's + * not a kv-pair. + */ + +KDC_LIB_FUNCTION void KDC_LIB_CALL +kdc_audit_vaddkv(kdc_request_t r, int flags, const char *k, + const char *fmt, va_list ap) + __attribute__ ((__format__ (__printf__, 4, 0))) +{ + heim_audit_vaddkv((heim_svc_req_desc)r, flags, k, fmt, ap); +} + +KDC_LIB_FUNCTION void KDC_LIB_CALL +kdc_audit_addkv(kdc_request_t r, int flags, const char *k, + const char *fmt, ...) + __attribute__ ((__format__ (__printf__, 4, 5))) +{ + va_list ap; + + va_start(ap, fmt); + heim_audit_vaddkv((heim_svc_req_desc)r, flags, k, fmt, ap); + va_end(ap); +} + +KDC_LIB_FUNCTION void KDC_LIB_CALL +kdc_audit_addkv_timediff(kdc_request_t r, const char *k, + const struct timeval *start, + const struct timeval *end) +{ + heim_audit_addkv_timediff((heim_svc_req_desc)r,k, start, end); +} + +KDC_LIB_FUNCTION void KDC_LIB_CALL +kdc_audit_setkv_bool(kdc_request_t r, const char *k, krb5_boolean v) +{ + heim_audit_setkv_bool((heim_svc_req_desc)r, k, (int)v); +} + +KDC_LIB_FUNCTION void KDC_LIB_CALL +kdc_audit_addkv_number(kdc_request_t r, const char *k, int64_t v) +{ + heim_audit_addkv_number((heim_svc_req_desc)r, k, v); +} + +KDC_LIB_FUNCTION void KDC_LIB_CALL +kdc_audit_setkv_number(kdc_request_t r, const char *k, int64_t v) +{ + heim_audit_setkv_number((heim_svc_req_desc)r, k, v); +} + +KDC_LIB_FUNCTION void KDC_LIB_CALL +kdc_audit_addkv_object(kdc_request_t r, const char *k, kdc_object_t obj) +{ + heim_audit_addkv_object((heim_svc_req_desc)r, k, obj); +} + +KDC_LIB_FUNCTION void KDC_LIB_CALL +kdc_audit_setkv_object(kdc_request_t r, const char *k, kdc_object_t obj) +{ + heim_audit_setkv_object((heim_svc_req_desc)r, k, obj); +} + +KDC_LIB_FUNCTION kdc_object_t KDC_LIB_CALL +kdc_audit_getkv(kdc_request_t r, const char *k) +{ + return heim_audit_getkv((heim_svc_req_desc)r, k); +} + +/* + * Add up to 3 key value pairs to record HostAddresses from request body or + * PA-TGS ticket or whatever. + */ +KDC_LIB_FUNCTION void KDC_LIB_CALL +kdc_audit_addaddrs(kdc_request_t r, HostAddresses *a, const char *key) +{ + size_t i; + char buf[128]; + + if (a->len > 3) { + char numkey[32]; + + if (snprintf(numkey, sizeof(numkey), "num%s", key) >= sizeof(numkey)) + numkey[31] = '\0'; + kdc_audit_addkv(r, 0, numkey, "%llu", (unsigned long long)a->len); + } + + for (i = 0; i < 3 && i < a->len; i++) { + if (krb5_print_address(&a->val[i], buf, sizeof(buf), NULL) == 0) + kdc_audit_addkv(r, 0, key, "%s", buf); + } +} + +KDC_LIB_FUNCTION void KDC_LIB_CALL +_kdc_audit_trail(kdc_request_t r, krb5_error_code ret) +{ + const char *retname = NULL; + + /* Get a symbolic name for some error codes */ +#define CASE(x) case x : retname = #x; break + switch (ret ? ret : r->error_code) { + CASE(ENOMEM); + CASE(EACCES); + CASE(HDB_ERR_NOT_FOUND_HERE); + CASE(HDB_ERR_WRONG_REALM); + CASE(HDB_ERR_EXISTS); + CASE(HDB_ERR_KVNO_NOT_FOUND); + CASE(HDB_ERR_NOENTRY); + CASE(HDB_ERR_NO_MKEY); + CASE(KRB5KDC_ERR_BADOPTION); + CASE(KRB5KDC_ERR_CANNOT_POSTDATE); + CASE(KRB5KDC_ERR_CLIENT_NOTYET); + CASE(KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN); + CASE(KRB5KDC_ERR_ETYPE_NOSUPP); + CASE(KRB5KDC_ERR_KEY_EXPIRED); + CASE(KRB5KDC_ERR_NAME_EXP); + CASE(KRB5KDC_ERR_NEVER_VALID); + CASE(KRB5KDC_ERR_NONE); + CASE(KRB5KDC_ERR_NULL_KEY); + CASE(KRB5KDC_ERR_PADATA_TYPE_NOSUPP); + CASE(KRB5KDC_ERR_POLICY); + CASE(KRB5KDC_ERR_PREAUTH_FAILED); + CASE(KRB5KDC_ERR_PREAUTH_REQUIRED); + CASE(KRB5KDC_ERR_SERVER_NOMATCH); + CASE(KRB5KDC_ERR_SERVICE_EXP); + CASE(KRB5KDC_ERR_SERVICE_NOTYET); + CASE(KRB5KDC_ERR_S_PRINCIPAL_UNKNOWN); + CASE(KRB5KDC_ERR_TRTYPE_NOSUPP); + CASE(KRB5KRB_ERR_RESPONSE_TOO_BIG); + case 0: + retname = "SUCCESS"; + break; + default: + retname = NULL; + break; + } + + /* Let's save a few bytes */ +#define PREFIX "KRB5KDC_" + if (retname && strncmp(PREFIX, retname, strlen(PREFIX)) == 0) + retname += strlen(PREFIX); +#undef PREFIX + + heim_audit_trail((heim_svc_req_desc)r, ret, retname); +} + +KDC_LIB_FUNCTION void KDC_LIB_CALL +krb5_kdc_update_time(struct timeval *tv) +{ + if (tv == NULL) + gettimeofday(&_kdc_now, NULL); + else + _kdc_now = *tv; +} + +KDC_LIB_FUNCTION struct timeval KDC_LIB_CALL +krb5_kdc_get_time(void) +{ + return _kdc_now; +} + + +#define EXTEND_REQUEST_T(LHS, RHS) do { \ + RHS = realloc(LHS, sizeof(*RHS)); \ + if (!RHS) \ + return krb5_enomem((LHS)->context); \ + LHS = (void *)RHS; \ + memset(((char *)LHS) + sizeof(*LHS), \ + 0x0, \ + sizeof(*RHS) - sizeof(*LHS)); \ + } while (0) + +static krb5_error_code +kdc_as_req(kdc_request_t *rptr, int *claim) +{ + astgs_request_t r; + krb5_error_code ret; + size_t len; + + /* We must free things in the extensions */ + EXTEND_REQUEST_T(*rptr, r); + + ret = decode_AS_REQ(r->request.data, r->request.length, &r->req, &len); + if (ret) + return ret; + + r->reqtype = "AS-REQ"; + r->use_request_t = 1; + *claim = 1; + + ret = _kdc_as_rep(r); + free_AS_REQ(&r->req); + return ret; +} + + +static krb5_error_code +kdc_tgs_req(kdc_request_t *rptr, int *claim) +{ + astgs_request_t r; + krb5_error_code ret; + size_t len; + + /* We must free things in the extensions */ + EXTEND_REQUEST_T(*rptr, r); + + ret = decode_TGS_REQ(r->request.data, r->request.length, &r->req, &len); + if (ret) + return ret; + + r->reqtype = "TGS-REQ"; + r->use_request_t = 1; + *claim = 1; + + ret = _kdc_tgs_rep(r); + free_TGS_REQ(&r->req); + return ret; +} + +#ifdef DIGEST + +static krb5_error_code +kdc_digest(kdc_request_t *rptr, int *claim) +{ + kdc_request_t r; + DigestREQ digestreq; + krb5_error_code ret; + size_t len; + + r = *rptr; + + ret = decode_DigestREQ(r->request.data, r->request.length, + &digestreq, &len); + if (ret) + return ret; + + r->use_request_t = 0; + *claim = 1; + + ret = _kdc_do_digest(r->context, r->config, &digestreq, + r->reply, r->from, r->addr); + free_DigestREQ(&digestreq); + return ret; +} + +#endif + +#ifdef KX509 + +static krb5_error_code +kdc_kx509(kdc_request_t *rptr, int *claim) +{ + kx509_req_context r; + krb5_error_code ret; + + /* We must free things in the extensions */ + EXTEND_REQUEST_T(*rptr, r); + + ret = _kdc_try_kx509_request(r); + if (ret) + return ret; + + r->use_request_t = 1; + r->reqtype = "KX509"; + *claim = 1; + + return _kdc_do_kx509(r); /* Must clean up the req struct extensions */ +} + +#endif + + +static struct krb5_kdc_service services[] = { + { KS_KRB5, "AS-REQ", kdc_as_req }, + { KS_KRB5, "TGS-REQ", kdc_tgs_req }, +#ifdef DIGEST + { 0, "DIGEST", kdc_digest }, +#endif +#ifdef KX509 + { 0, "KX509", kdc_kx509 }, +#endif + { 0, NULL, NULL } +}; + +static int +process_request(krb5_context context, + krb5_kdc_configuration *config, + unsigned int krb5_only, + unsigned char *buf, + size_t len, + krb5_data *reply, + krb5_boolean *prependlength, + const char *from, + struct sockaddr *addr, + int datagram_reply) +{ + kdc_request_t r; + krb5_error_code ret; + unsigned int i; + int claim = 0; + + r = calloc(sizeof(*r), 1); + if (!r) + return krb5_enomem(context); + + r->context = context; + r->hcontext = context->hcontext; + r->config = config; + r->logf = config->logf; + r->from = from; + r->addr = addr; + r->request.data = buf; + r->request.length = len; + r->datagram_reply = datagram_reply; + r->reply = reply; + r->kv = heim_dict_create(10); + r->attributes = heim_dict_create(1); + if (r->kv == NULL || r->attributes == NULL) { + heim_release(r->kv); + heim_release(r->attributes); + free(r); + return krb5_enomem(context); + } + + gettimeofday(&r->tv_start, NULL); + + for (i = 0; services[i].process != NULL; i++) { + if (krb5_only && (services[i].flags & KS_KRB5) == 0) + continue; + kdc_log(context, config, 7, "Probing for %s", services[i].name); + ret = (*services[i].process)(&r, &claim); + if (claim) { + if (prependlength && services[i].flags & KS_NO_LENGTH) + *prependlength = 0; + + if (r->use_request_t) { + gettimeofday(&r->tv_end, NULL); + _kdc_audit_trail(r, ret); + free(r->cname); + free(r->sname); + free(r->e_text_buf); + } + + heim_release(r->reason); + heim_release(r->kv); + heim_release(r->attributes); + free(r); + return ret; + } + } + + heim_release(r->reason); + heim_release(r->kv); + heim_release(r->attributes); + free(r); + return -1; +} + +/* + * handle the request in `buf, len', from `addr' (or `from' as a string), + * sending a reply in `reply'. + */ + +KDC_LIB_FUNCTION int KDC_LIB_CALL +krb5_kdc_process_request(krb5_context context, + krb5_kdc_configuration *config, + unsigned char *buf, + size_t len, + krb5_data *reply, + krb5_boolean *prependlength, + const char *from, + struct sockaddr *addr, + int datagram_reply) +{ + return process_request(context, config, 0, buf, len, reply, prependlength, + from, addr, datagram_reply); +} + +/* + * handle the request in `buf, len', from `addr' (or `from' as a string), + * sending a reply in `reply'. + * + * This only processes krb5 requests + */ + +KDC_LIB_FUNCTION int KDC_LIB_CALL +krb5_kdc_process_krb5_request(krb5_context context, + krb5_kdc_configuration *config, + unsigned char *buf, + size_t len, + krb5_data *reply, + const char *from, + struct sockaddr *addr, + int datagram_reply) +{ + return process_request(context, config, 1, buf, len, reply, NULL, + from, addr, datagram_reply); +} + + +/* + * + */ + +KDC_LIB_FUNCTION int KDC_LIB_CALL +krb5_kdc_save_request(krb5_context context, + const char *fn, + const unsigned char *buf, + size_t len, + const krb5_data *reply, + const struct sockaddr *sa) +{ + krb5_storage *sp; + krb5_address a; + int fd = -1; + int ret = 0; + uint32_t t; + krb5_data d; + + memset(&a, 0, sizeof(a)); + + d.data = rk_UNCONST(buf); /* do not free here */ + d.length = len; + t = _kdc_now.tv_sec; + + sp = krb5_storage_emem(); + if (sp == NULL) + ret = krb5_enomem(context); + + if (ret == 0) + ret = krb5_sockaddr2address(context, sa, &a); + if (ret == 0) + ret = krb5_store_uint32(sp, 1); + if (ret == 0) + ret = krb5_store_uint32(sp, t); + if (ret == 0) + ret = krb5_store_address(sp, a); + if (ret == 0) + ret = krb5_store_data(sp, d); + d.length = 0; + d.data = NULL; + if (ret == 0) { + Der_class cl; + Der_type ty; + unsigned int tag; + ret = der_get_tag (reply->data, reply->length, + &cl, &ty, &tag, NULL); + if (ret) { + ret = krb5_store_uint32(sp, 0xffffffff); + if (ret == 0) + ret = krb5_store_uint32(sp, 0xffffffff); + } else { + ret = krb5_store_uint32(sp, MAKE_TAG(cl, ty, 0)); + if (ret == 0) + ret = krb5_store_uint32(sp, tag); + } + } + + if (ret == 0) + ret = krb5_storage_to_data(sp, &d); + krb5_storage_free(sp); + sp = NULL; + + /* + * We've got KDC concurrency, so we're going to try to do a single O_APPEND + * write(2). Hopefully we manage to write enough of the header that one + * can skip this request if it fails to write completely. + */ + if (ret == 0) + fd = open(fn, O_WRONLY|O_CREAT|O_APPEND, 0600); + if (fd < 0) + krb5_set_error_message(context, ret = errno, "Failed to open: %s", fn); + if (ret == 0) { + sp = krb5_storage_from_fd(fd); + if (sp == NULL) + krb5_set_error_message(context, ret = ENOMEM, + "Storage failed to open fd"); + } + (void) close(fd); + if (ret == 0) + ret = krb5_store_data(sp, d); + krb5_free_address(context, &a); + /* + * krb5_storage_free() currently always returns 0, but for FDs it sets + * errno to whatever close() set it to if it failed. + */ + errno = 0; + if (ret == 0) + ret = krb5_storage_free(sp); + else + (void) krb5_storage_free(sp); + if (ret == 0 && errno) + ret = errno; + + return ret; +} + +KDC_LIB_FUNCTION krb5_error_code KDC_LIB_CALL +kdc_request_set_attribute(kdc_request_t r, kdc_object_t key, kdc_object_t value) +{ + return heim_dict_set_value(r->attributes, key, value); +} + +KDC_LIB_FUNCTION kdc_object_t KDC_LIB_CALL +kdc_request_get_attribute(kdc_request_t r, kdc_object_t key) +{ + return heim_dict_get_value(r->attributes, key); +} + +KDC_LIB_FUNCTION kdc_object_t KDC_LIB_CALL +kdc_request_copy_attribute(kdc_request_t r, kdc_object_t key) +{ + return heim_dict_copy_value(r->attributes, key); +} + +KDC_LIB_FUNCTION void KDC_LIB_CALL +kdc_request_delete_attribute(kdc_request_t r, kdc_object_t key) +{ + heim_dict_delete_key(r->attributes, key); +} |