diff options
| author | Greg Hudson <ghudson@mit.edu> | 2011-10-24 15:09:32 +0000 |
|---|---|---|
| committer | Greg Hudson <ghudson@mit.edu> | 2011-10-24 15:09:32 +0000 |
| commit | 7fc21c4a4a6ef8a88567f166eda1fe73784686c7 (patch) | |
| tree | c8767e5031b06fa2ccdef9fd5f6cfb8dd9c95fe4 /src/kdc | |
| parent | d8b79bd61501341d9d8a4340c2c7077d302426c4 (diff) | |
| download | krb5-7fc21c4a4a6ef8a88567f166eda1fe73784686c7.tar.gz krb5-7fc21c4a4a6ef8a88567f166eda1fe73784686c7.tar.xz krb5-7fc21c4a4a6ef8a88567f166eda1fe73784686c7.zip | |
Refactor salt computation into libkdb5
Add a new API krb5_dbe_compute_salt() to determine the salt for a key
data entry, and use it in the three places we currently compute salts.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@25410 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/kdc')
| -rw-r--r-- | src/kdc/kdc_preauth.c | 149 | ||||
| -rw-r--r-- | src/kdc/kdc_util.c | 56 | ||||
| -rw-r--r-- | src/kdc/kdc_util.h | 4 |
3 files changed, 52 insertions, 157 deletions
diff --git a/src/kdc/kdc_preauth.c b/src/kdc/kdc_preauth.c index 272980db5..fc7e43bca 100644 --- a/src/kdc/kdc_preauth.c +++ b/src/kdc/kdc_preauth.c @@ -1315,62 +1315,54 @@ request_contains_enctype(krb5_context context, const krb5_kdc_req *request, static krb5_error_code _make_etype_info_entry(krb5_context context, krb5_principal client_princ, krb5_key_data *client_key, - krb5_enctype etype, krb5_etype_info_entry **entry, + krb5_enctype etype, krb5_etype_info_entry **entry_out, int etype_info2) { - krb5_data salt; - krb5_etype_info_entry * tmp_entry; - krb5_error_code retval; + krb5_error_code retval; + krb5_int16 salttype; + krb5_data *salt = NULL; + krb5_etype_info_entry *entry = NULL; - if ((tmp_entry = malloc(sizeof(krb5_etype_info_entry))) == NULL) + *entry_out = NULL; + entry = malloc(sizeof(*entry)); + if (entry == NULL) return ENOMEM; - salt.data = 0; - - tmp_entry->magic = KV5M_ETYPE_INFO_ENTRY; - tmp_entry->etype = etype; - tmp_entry->length = KRB5_ETYPE_NO_SALT; - tmp_entry->salt = 0; - tmp_entry->s2kparams.data = NULL; - tmp_entry->s2kparams.length = 0; - retval = get_salt_from_key(context, client_princ, client_key, &salt); + entry->magic = KV5M_ETYPE_INFO_ENTRY; + entry->etype = etype; + entry->length = KRB5_ETYPE_NO_SALT; + entry->salt = NULL; + entry->s2kparams = empty_data(); + retval = krb5_dbe_compute_salt(context, client_key, client_princ, + &salttype, &salt); if (retval) - goto fail; - if (etype_info2 && client_key->key_data_ver > 1 && - client_key->key_data_type[1] == KRB5_KDB_SALTTYPE_AFS3) { + goto cleanup; + if (etype_info2 && salttype == KRB5_KDB_SALTTYPE_AFS3) { switch (etype) { case ENCTYPE_DES_CBC_CRC: case ENCTYPE_DES_CBC_MD4: case ENCTYPE_DES_CBC_MD5: - tmp_entry->s2kparams.data = malloc(1); - if (tmp_entry->s2kparams.data == NULL) { - retval = ENOMEM; - goto fail; - } - tmp_entry->s2kparams.length = 1; - tmp_entry->s2kparams.data[0] = 1; + retval = alloc_data(&entry->s2kparams, 1); + if (retval) + goto cleanup; + entry->s2kparams.data[0] = 1; break; default: break; } } - if (salt.length >= 0) { - tmp_entry->length = salt.length; - tmp_entry->salt = (unsigned char *) salt.data; - salt.data = 0; - } - *entry = tmp_entry; - return 0; + entry->length = salt->length; + entry->salt = (unsigned char *)salt->data; + salt->data = NULL; + *entry_out = entry; + entry = NULL; -fail: - if (tmp_entry) { - if (tmp_entry->s2kparams.data) - free(tmp_entry->s2kparams.data); - free(tmp_entry); - } - if (salt.data) - free(salt.data); +cleanup: + if (entry != NULL) + krb5_free_data_contents(context, &entry->s2kparams); + free(entry); + krb5_free_data(context, salt); return retval; } @@ -1606,8 +1598,8 @@ return_pw_salt(krb5_context context, krb5_pa_data *in_padata, { krb5_error_code retval; krb5_pa_data * padata; - krb5_data * scratch; - krb5_data salt_data; + krb5_data * salt = NULL; + krb5_int16 salttype; krb5_key_data * client_key = rock->client_key; int i; @@ -1615,74 +1607,37 @@ return_pw_salt(krb5_context context, krb5_pa_data *in_padata, if (enctype_requires_etype_info_2(request->ktype[i])) return 0; } - if (client_key->key_data_ver == 1 || - client_key->key_data_type[1] == KRB5_KDB_SALTTYPE_NORMAL) + retval = krb5_dbe_compute_salt(context, client_key, request->client, + &salttype, &salt); + if (retval) return 0; - if ((padata = malloc(sizeof(krb5_pa_data))) == NULL) - return ENOMEM; + padata = k5alloc(sizeof(*padata), &retval); + if (padata == NULL) + goto cleanup; padata->magic = KV5M_PA_DATA; - padata->pa_type = KRB5_PADATA_PW_SALT; - switch (client_key->key_data_type[1]) { - case KRB5_KDB_SALTTYPE_V4: - /* send an empty (V4) salt */ - padata->contents = 0; - padata->length = 0; - break; - case KRB5_KDB_SALTTYPE_NOREALM: - if ((retval = krb5_principal2salt_norealm(kdc_context, - request->client, - &salt_data))) + if (salttype == KRB5_KDB_SALTTYPE_AFS3) { + padata->contents = k5alloc(salt->length + 1, &retval); + if (padata->contents == NULL) goto cleanup; - padata->contents = (krb5_octet *)salt_data.data; - padata->length = salt_data.length; - break; - case KRB5_KDB_SALTTYPE_AFS3: - /* send an AFS style realm-based salt */ - /* for now, just pass the realm back and let the client - do the work. In the future, add a kdc configuration - variable that specifies the old cell name. */ + memcpy(padata->contents, salt->data, salt->length); padata->pa_type = KRB5_PADATA_AFS3_SALT; - /* it would be just like ONLYREALM, but we need to pass the 0 */ - scratch = krb5_princ_realm(kdc_context, request->client); - if ((padata->contents = malloc(scratch->length+1)) == NULL) { - retval = ENOMEM; - goto cleanup; - } - memcpy(padata->contents, scratch->data, scratch->length); - padata->length = scratch->length+1; - padata->contents[scratch->length] = 0; - break; - case KRB5_KDB_SALTTYPE_ONLYREALM: - scratch = krb5_princ_realm(kdc_context, request->client); - if ((padata->contents = malloc(scratch->length)) == NULL) { - retval = ENOMEM; - goto cleanup; - } - memcpy(padata->contents, scratch->data, scratch->length); - padata->length = scratch->length; - break; - case KRB5_KDB_SALTTYPE_SPECIAL: - if ((padata->contents = malloc(client_key->key_data_length[1])) - == NULL) { - retval = ENOMEM; - goto cleanup; - } - memcpy(padata->contents, client_key->key_data_contents[1], - client_key->key_data_length[1]); - padata->length = client_key->key_data_length[1]; - break; - default: - free(padata); - return 0; + padata->contents[salt->length] = '\0'; + padata->length = salt->length + 1; + } else { + padata->pa_type = KRB5_PADATA_PW_SALT; + padata->length = salt->length; + padata->contents = (krb5_octet *)salt->data; + salt->data = NULL; } *send_pa = padata; - return 0; + padata = NULL; cleanup: free(padata); + krb5_free_data(context, salt); return retval; } diff --git a/src/kdc/kdc_util.c b/src/kdc/kdc_util.c index e03cb27cb..e5c554f1b 100644 --- a/src/kdc/kdc_util.c +++ b/src/kdc/kdc_util.c @@ -1502,62 +1502,6 @@ select_session_keytype(krb5_context context, krb5_db_entry *server, } /* - * This function returns salt information for a particular client_key - */ -krb5_error_code -get_salt_from_key(krb5_context context, krb5_principal client, - krb5_key_data *client_key, krb5_data *salt) -{ - krb5_error_code retval; - krb5_data * realm; - - salt->data = 0; - salt->length = SALT_TYPE_NO_LENGTH; - - if (client_key->key_data_ver == 1) - return 0; - - switch (client_key->key_data_type[1]) { - case KRB5_KDB_SALTTYPE_NORMAL: - /* - * The client could infer the salt from the principal, but - * might use the wrong principal name if this is an alias. So - * it's more reliable to send an explicit salt. - */ - if ((retval = krb5_principal2salt(context, client, salt))) - return retval; - break; - case KRB5_KDB_SALTTYPE_V4: - /* send an empty (V4) salt */ - salt->data = 0; - salt->length = 0; - break; - case KRB5_KDB_SALTTYPE_NOREALM: - if ((retval = krb5_principal2salt_norealm(context, client, salt))) - return retval; - break; - case KRB5_KDB_SALTTYPE_AFS3: - /* send the same salt as with onlyrealm - but with no type info, - we just hope they figure it out on the other end. */ - /* fall through to onlyrealm: */ - case KRB5_KDB_SALTTYPE_ONLYREALM: - realm = krb5_princ_realm(context, client); - salt->length = realm->length; - if ((salt->data = malloc(realm->length)) == NULL) - return ENOMEM; - memcpy(salt->data, realm->data, realm->length); - break; - case KRB5_KDB_SALTTYPE_SPECIAL: - salt->length = client_key->key_data_length[1]; - if ((salt->data = malloc(salt->length)) == NULL) - return ENOMEM; - memcpy(salt->data, client_key->key_data_contents[1], salt->length); - break; - } - return 0; -} - -/* * Limit strings to a "reasonable" length to prevent crowding out of * other useful information in the log entry */ diff --git a/src/kdc/kdc_util.h b/src/kdc/kdc_util.h index bdeaa5f7d..f4773ae4c 100644 --- a/src/kdc/kdc_util.h +++ b/src/kdc/kdc_util.h @@ -105,10 +105,6 @@ select_session_keytype (krb5_context context, int nktypes, krb5_enctype *ktypes); -krb5_error_code -get_salt_from_key (krb5_context, krb5_principal, - krb5_key_data *, krb5_data *); - void limit_string (char *name); void |
