summaryrefslogtreecommitdiffstats
path: root/src/kdc
diff options
context:
space:
mode:
authorGreg Hudson <ghudson@mit.edu>2011-10-24 15:09:32 +0000
committerGreg Hudson <ghudson@mit.edu>2011-10-24 15:09:32 +0000
commit7fc21c4a4a6ef8a88567f166eda1fe73784686c7 (patch)
treec8767e5031b06fa2ccdef9fd5f6cfb8dd9c95fe4 /src/kdc
parentd8b79bd61501341d9d8a4340c2c7077d302426c4 (diff)
downloadkrb5-7fc21c4a4a6ef8a88567f166eda1fe73784686c7.tar.gz
krb5-7fc21c4a4a6ef8a88567f166eda1fe73784686c7.tar.xz
krb5-7fc21c4a4a6ef8a88567f166eda1fe73784686c7.zip
Refactor salt computation into libkdb5
Add a new API krb5_dbe_compute_salt() to determine the salt for a key data entry, and use it in the three places we currently compute salts. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@25410 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/kdc')
-rw-r--r--src/kdc/kdc_preauth.c149
-rw-r--r--src/kdc/kdc_util.c56
-rw-r--r--src/kdc/kdc_util.h4
3 files changed, 52 insertions, 157 deletions
diff --git a/src/kdc/kdc_preauth.c b/src/kdc/kdc_preauth.c
index 272980db5..fc7e43bca 100644
--- a/src/kdc/kdc_preauth.c
+++ b/src/kdc/kdc_preauth.c
@@ -1315,62 +1315,54 @@ request_contains_enctype(krb5_context context, const krb5_kdc_req *request,
static krb5_error_code
_make_etype_info_entry(krb5_context context,
krb5_principal client_princ, krb5_key_data *client_key,
- krb5_enctype etype, krb5_etype_info_entry **entry,
+ krb5_enctype etype, krb5_etype_info_entry **entry_out,
int etype_info2)
{
- krb5_data salt;
- krb5_etype_info_entry * tmp_entry;
- krb5_error_code retval;
+ krb5_error_code retval;
+ krb5_int16 salttype;
+ krb5_data *salt = NULL;
+ krb5_etype_info_entry *entry = NULL;
- if ((tmp_entry = malloc(sizeof(krb5_etype_info_entry))) == NULL)
+ *entry_out = NULL;
+ entry = malloc(sizeof(*entry));
+ if (entry == NULL)
return ENOMEM;
- salt.data = 0;
-
- tmp_entry->magic = KV5M_ETYPE_INFO_ENTRY;
- tmp_entry->etype = etype;
- tmp_entry->length = KRB5_ETYPE_NO_SALT;
- tmp_entry->salt = 0;
- tmp_entry->s2kparams.data = NULL;
- tmp_entry->s2kparams.length = 0;
- retval = get_salt_from_key(context, client_princ, client_key, &salt);
+ entry->magic = KV5M_ETYPE_INFO_ENTRY;
+ entry->etype = etype;
+ entry->length = KRB5_ETYPE_NO_SALT;
+ entry->salt = NULL;
+ entry->s2kparams = empty_data();
+ retval = krb5_dbe_compute_salt(context, client_key, client_princ,
+ &salttype, &salt);
if (retval)
- goto fail;
- if (etype_info2 && client_key->key_data_ver > 1 &&
- client_key->key_data_type[1] == KRB5_KDB_SALTTYPE_AFS3) {
+ goto cleanup;
+ if (etype_info2 && salttype == KRB5_KDB_SALTTYPE_AFS3) {
switch (etype) {
case ENCTYPE_DES_CBC_CRC:
case ENCTYPE_DES_CBC_MD4:
case ENCTYPE_DES_CBC_MD5:
- tmp_entry->s2kparams.data = malloc(1);
- if (tmp_entry->s2kparams.data == NULL) {
- retval = ENOMEM;
- goto fail;
- }
- tmp_entry->s2kparams.length = 1;
- tmp_entry->s2kparams.data[0] = 1;
+ retval = alloc_data(&entry->s2kparams, 1);
+ if (retval)
+ goto cleanup;
+ entry->s2kparams.data[0] = 1;
break;
default:
break;
}
}
- if (salt.length >= 0) {
- tmp_entry->length = salt.length;
- tmp_entry->salt = (unsigned char *) salt.data;
- salt.data = 0;
- }
- *entry = tmp_entry;
- return 0;
+ entry->length = salt->length;
+ entry->salt = (unsigned char *)salt->data;
+ salt->data = NULL;
+ *entry_out = entry;
+ entry = NULL;
-fail:
- if (tmp_entry) {
- if (tmp_entry->s2kparams.data)
- free(tmp_entry->s2kparams.data);
- free(tmp_entry);
- }
- if (salt.data)
- free(salt.data);
+cleanup:
+ if (entry != NULL)
+ krb5_free_data_contents(context, &entry->s2kparams);
+ free(entry);
+ krb5_free_data(context, salt);
return retval;
}
@@ -1606,8 +1598,8 @@ return_pw_salt(krb5_context context, krb5_pa_data *in_padata,
{
krb5_error_code retval;
krb5_pa_data * padata;
- krb5_data * scratch;
- krb5_data salt_data;
+ krb5_data * salt = NULL;
+ krb5_int16 salttype;
krb5_key_data * client_key = rock->client_key;
int i;
@@ -1615,74 +1607,37 @@ return_pw_salt(krb5_context context, krb5_pa_data *in_padata,
if (enctype_requires_etype_info_2(request->ktype[i]))
return 0;
}
- if (client_key->key_data_ver == 1 ||
- client_key->key_data_type[1] == KRB5_KDB_SALTTYPE_NORMAL)
+ retval = krb5_dbe_compute_salt(context, client_key, request->client,
+ &salttype, &salt);
+ if (retval)
return 0;
- if ((padata = malloc(sizeof(krb5_pa_data))) == NULL)
- return ENOMEM;
+ padata = k5alloc(sizeof(*padata), &retval);
+ if (padata == NULL)
+ goto cleanup;
padata->magic = KV5M_PA_DATA;
- padata->pa_type = KRB5_PADATA_PW_SALT;
- switch (client_key->key_data_type[1]) {
- case KRB5_KDB_SALTTYPE_V4:
- /* send an empty (V4) salt */
- padata->contents = 0;
- padata->length = 0;
- break;
- case KRB5_KDB_SALTTYPE_NOREALM:
- if ((retval = krb5_principal2salt_norealm(kdc_context,
- request->client,
- &salt_data)))
+ if (salttype == KRB5_KDB_SALTTYPE_AFS3) {
+ padata->contents = k5alloc(salt->length + 1, &retval);
+ if (padata->contents == NULL)
goto cleanup;
- padata->contents = (krb5_octet *)salt_data.data;
- padata->length = salt_data.length;
- break;
- case KRB5_KDB_SALTTYPE_AFS3:
- /* send an AFS style realm-based salt */
- /* for now, just pass the realm back and let the client
- do the work. In the future, add a kdc configuration
- variable that specifies the old cell name. */
+ memcpy(padata->contents, salt->data, salt->length);
padata->pa_type = KRB5_PADATA_AFS3_SALT;
- /* it would be just like ONLYREALM, but we need to pass the 0 */
- scratch = krb5_princ_realm(kdc_context, request->client);
- if ((padata->contents = malloc(scratch->length+1)) == NULL) {
- retval = ENOMEM;
- goto cleanup;
- }
- memcpy(padata->contents, scratch->data, scratch->length);
- padata->length = scratch->length+1;
- padata->contents[scratch->length] = 0;
- break;
- case KRB5_KDB_SALTTYPE_ONLYREALM:
- scratch = krb5_princ_realm(kdc_context, request->client);
- if ((padata->contents = malloc(scratch->length)) == NULL) {
- retval = ENOMEM;
- goto cleanup;
- }
- memcpy(padata->contents, scratch->data, scratch->length);
- padata->length = scratch->length;
- break;
- case KRB5_KDB_SALTTYPE_SPECIAL:
- if ((padata->contents = malloc(client_key->key_data_length[1]))
- == NULL) {
- retval = ENOMEM;
- goto cleanup;
- }
- memcpy(padata->contents, client_key->key_data_contents[1],
- client_key->key_data_length[1]);
- padata->length = client_key->key_data_length[1];
- break;
- default:
- free(padata);
- return 0;
+ padata->contents[salt->length] = '\0';
+ padata->length = salt->length + 1;
+ } else {
+ padata->pa_type = KRB5_PADATA_PW_SALT;
+ padata->length = salt->length;
+ padata->contents = (krb5_octet *)salt->data;
+ salt->data = NULL;
}
*send_pa = padata;
- return 0;
+ padata = NULL;
cleanup:
free(padata);
+ krb5_free_data(context, salt);
return retval;
}
diff --git a/src/kdc/kdc_util.c b/src/kdc/kdc_util.c
index e03cb27cb..e5c554f1b 100644
--- a/src/kdc/kdc_util.c
+++ b/src/kdc/kdc_util.c
@@ -1502,62 +1502,6 @@ select_session_keytype(krb5_context context, krb5_db_entry *server,
}
/*
- * This function returns salt information for a particular client_key
- */
-krb5_error_code
-get_salt_from_key(krb5_context context, krb5_principal client,
- krb5_key_data *client_key, krb5_data *salt)
-{
- krb5_error_code retval;
- krb5_data * realm;
-
- salt->data = 0;
- salt->length = SALT_TYPE_NO_LENGTH;
-
- if (client_key->key_data_ver == 1)
- return 0;
-
- switch (client_key->key_data_type[1]) {
- case KRB5_KDB_SALTTYPE_NORMAL:
- /*
- * The client could infer the salt from the principal, but
- * might use the wrong principal name if this is an alias. So
- * it's more reliable to send an explicit salt.
- */
- if ((retval = krb5_principal2salt(context, client, salt)))
- return retval;
- break;
- case KRB5_KDB_SALTTYPE_V4:
- /* send an empty (V4) salt */
- salt->data = 0;
- salt->length = 0;
- break;
- case KRB5_KDB_SALTTYPE_NOREALM:
- if ((retval = krb5_principal2salt_norealm(context, client, salt)))
- return retval;
- break;
- case KRB5_KDB_SALTTYPE_AFS3:
- /* send the same salt as with onlyrealm - but with no type info,
- we just hope they figure it out on the other end. */
- /* fall through to onlyrealm: */
- case KRB5_KDB_SALTTYPE_ONLYREALM:
- realm = krb5_princ_realm(context, client);
- salt->length = realm->length;
- if ((salt->data = malloc(realm->length)) == NULL)
- return ENOMEM;
- memcpy(salt->data, realm->data, realm->length);
- break;
- case KRB5_KDB_SALTTYPE_SPECIAL:
- salt->length = client_key->key_data_length[1];
- if ((salt->data = malloc(salt->length)) == NULL)
- return ENOMEM;
- memcpy(salt->data, client_key->key_data_contents[1], salt->length);
- break;
- }
- return 0;
-}
-
-/*
* Limit strings to a "reasonable" length to prevent crowding out of
* other useful information in the log entry
*/
diff --git a/src/kdc/kdc_util.h b/src/kdc/kdc_util.h
index bdeaa5f7d..f4773ae4c 100644
--- a/src/kdc/kdc_util.h
+++ b/src/kdc/kdc_util.h
@@ -105,10 +105,6 @@ select_session_keytype (krb5_context context,
int nktypes,
krb5_enctype *ktypes);
-krb5_error_code
-get_salt_from_key (krb5_context, krb5_principal,
- krb5_key_data *, krb5_data *);
-
void limit_string (char *name);
void