diff options
Diffstat (limited to 'src/lib')
| -rw-r--r-- | src/lib/kadm5/srv/svr_principal.c | 53 | ||||
| -rw-r--r-- | src/lib/kdb/kdb5.c | 111 | ||||
| -rw-r--r-- | src/lib/kdb/kdb5.h | 3 | ||||
| -rw-r--r-- | src/lib/kdb/keytab.c | 12 | ||||
| -rw-r--r-- | src/lib/kdb/libkdb5.exports | 2 |
5 files changed, 96 insertions, 85 deletions
diff --git a/src/lib/kadm5/srv/svr_principal.c b/src/lib/kadm5/srv/svr_principal.c index dc1640643..c1a955aea 100644 --- a/src/lib/kadm5/srv/svr_principal.c +++ b/src/lib/kadm5/srv/svr_principal.c @@ -38,7 +38,7 @@ extern krb5_keylist_node *master_keylist; extern krb5_actkvno_node *active_mkey_list; extern krb5_db_entry master_db; -static int decrypt_key_data(krb5_context context, krb5_keyblock *mkey, +static int decrypt_key_data(krb5_context context, int n_key_data, krb5_key_data *key_data, krb5_keyblock **keyblocks, int *n_keys); @@ -933,17 +933,16 @@ done: */ static kadm5_ret_t check_pw_reuse(krb5_context context, - krb5_keyblock *mkey, krb5_keyblock *hist_keyblock, int n_new_key_data, krb5_key_data *new_key_data, unsigned int n_pw_hist_data, osa_pw_hist_ent *pw_hist_data) { - int x, y, z; + unsigned int x, y, z; krb5_keyblock newkey, histkey; krb5_error_code ret; for (x = 0; x < n_new_key_data; x++) { - ret = krb5_dbe_decrypt_key_data(context, mkey, &(new_key_data[x]), + ret = krb5_dbe_decrypt_key_data(context, NULL, &(new_key_data[x]), &newkey, NULL); if (ret) return(ret); @@ -996,7 +995,7 @@ check_pw_reuse(krb5_context context, * set to n_key_data. */ static -int create_history_entry(krb5_context context, krb5_keyblock *mkey, +int create_history_entry(krb5_context context, krb5_keyblock *hist_key, int n_key_data, krb5_key_data *key_data, osa_pw_hist_ent *hist) { @@ -1010,7 +1009,7 @@ int create_history_entry(krb5_context context, krb5_keyblock *mkey, memset(hist->key_data, 0, n_key_data*sizeof(krb5_key_data)); for (i = 0; i < n_key_data; i++) { - ret = krb5_dbe_decrypt_key_data(context, mkey, &key_data[i], &key, + ret = krb5_dbe_decrypt_key_data(context, NULL, &key_data[i], &key, &salt); if (ret) return ret; @@ -1394,13 +1393,13 @@ kadm5_chpass_principal_3(void *server_handle, goto done; ret = create_history_entry(handle->context, - act_mkey, &hist_keyblock, + &hist_keyblock, kdb_save->n_key_data, kdb_save->key_data, &hist); if (ret) goto done; - ret = check_pw_reuse(handle->context, act_mkey, &hist_keyblock, + ret = check_pw_reuse(handle->context, &hist_keyblock, kdb->n_key_data, kdb->key_data, 1, &hist); if (ret) @@ -1410,7 +1409,7 @@ kadm5_chpass_principal_3(void *server_handle, /* If hist_kvno has changed since the last password change, we * can't check the history. */ if (adb.admin_history_kvno == hist_kvno) { - ret = check_pw_reuse(handle->context, act_mkey, &hist_keyblock, + ret = check_pw_reuse(handle->context, &hist_keyblock, kdb->n_key_data, kdb->key_data, adb.old_key_len, adb.old_keys); if (ret) @@ -1533,7 +1532,7 @@ kadm5_randkey_principal_3(void *server_handle, if (keepold) return KADM5_PROTECT_PRINCIPAL; ks_tuple = n_ks_tuple ? ks_tuple : handle->params.keysalts, - n_ks_tuple = 1; + n_ks_tuple = 1; } if ((ret = kdb_get_entry(handle, principal, &kdb, &adb))) @@ -1598,7 +1597,7 @@ kadm5_randkey_principal_3(void *server_handle, kdb->fail_auth_count = 0; if (keyblocks) { - ret = decrypt_key_data(handle->context, act_mkey, + ret = decrypt_key_data(handle->context, kdb->n_key_data, kdb->key_data, keyblocks, n_keys); if (ret) @@ -2007,7 +2006,6 @@ kadm5_get_principal_keys(void *server_handle /* IN */, osa_princ_ent_rec adb; kadm5_ret_t ret; kadm5_server_handle_t handle = server_handle; - krb5_keyblock *mkey_ptr; if (keyblocks) *keyblocks = NULL; @@ -2021,26 +2019,7 @@ kadm5_get_principal_keys(void *server_handle /* IN */, return(ret); if (keyblocks) { - if ((ret = krb5_dbe_find_mkey(handle->context, master_keylist, kdb, - &mkey_ptr))) { - krb5_keylist_node *tmp_mkey_list; - /* try refreshing master key list */ - /* XXX it would nice if we had the mkvno here for optimization */ - if (krb5_db_fetch_mkey_list(handle->context, master_princ, - &master_keyblock, 0, - &tmp_mkey_list) == 0) { - krb5_dbe_free_key_list(handle->context, master_keylist); - master_keylist = tmp_mkey_list; - if ((ret = krb5_dbe_find_mkey(handle->context, master_keylist, - kdb, &mkey_ptr))) { - goto done; - } - } else { - goto done; - } - } - - ret = decrypt_key_data(handle->context, mkey_ptr, + ret = decrypt_key_data(handle->context, kdb->n_key_data, kdb->key_data, keyblocks, n_keys); if (ret) @@ -2057,11 +2036,11 @@ done: /* * Allocate an array of n_key_data krb5_keyblocks, fill in each - * element with the results of decrypting the nth key in key_data with - * mkey, and if n_keys is not NULL fill it in with the + * element with the results of decrypting the nth key in key_data, + * and if n_keys is not NULL fill it in with the * number of keys decrypted. */ -static int decrypt_key_data(krb5_context context, krb5_keyblock *mkey, +static int decrypt_key_data(krb5_context context, int n_key_data, krb5_key_data *key_data, krb5_keyblock **keyblocks, int *n_keys) { @@ -2074,7 +2053,7 @@ static int decrypt_key_data(krb5_context context, krb5_keyblock *mkey, memset(keys, 0, n_key_data*sizeof(krb5_keyblock)); for (i = 0; i < n_key_data; i++) { - ret = krb5_dbe_decrypt_key_data(context, mkey, &key_data[i], &keys[i], + ret = krb5_dbe_decrypt_key_data(context, NULL, &key_data[i], &keys[i], NULL); if (ret) { for (; i >= 0; i--) { @@ -2171,7 +2150,7 @@ kadm5_ret_t kadm5_decrypt_key(void *server_handle, } } - if ((ret = krb5_dbe_decrypt_key_data(handle->context, mkey_ptr, key_data, + if ((ret = krb5_dbe_decrypt_key_data(handle->context, NULL, key_data, keyblock, keysalt))) return ret; diff --git a/src/lib/kdb/kdb5.c b/src/lib/kdb/kdb5.c index 978650300..c54968987 100644 --- a/src/lib/kdb/kdb5.c +++ b/src/lib/kdb/kdb5.c @@ -1,6 +1,6 @@ /* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */ /* - * Copyright 2006, 2009 by the Massachusetts Institute of Technology. + * Copyright 2006, 2009, 2010 by the Massachusetts Institute of Technology. * All Rights Reserved. * * Export of this software from the United States of America may @@ -549,17 +549,23 @@ static krb5_error_code kdb_free_lib_handle(krb5_context kcontext) { krb5_error_code status = 0; + krb5_keylist_node *old_keylist = kcontext->dal_handle->master_keylist; status = kdb_free_library(kcontext->dal_handle->lib_handle); if (status) return status; - + /* The dal_handle holds an alias to the most recent mkey_list*/ + if (kcontext->dal_handle->free_keylist) { + kcontext->dal_handle->master_keylist = NULL; /*force freeing*/ + krb5_db_free_mkey_list(kcontext, old_keylist); + } + krb5_free_principal(kcontext, kcontext->dal_handle->master_princ); free(kcontext->dal_handle); kcontext->dal_handle = NULL; return 0; } -static krb5_error_code +static krb5_error_code get_vftabl(krb5_context kcontext, kdb_vftabl **vftabl_ptr) { krb5_error_code status; @@ -989,35 +995,6 @@ krb5_db_iterate(krb5_context kcontext, } krb5_error_code -krb5_db_set_mkey_list(krb5_context kcontext, - krb5_keylist_node * keylist) -{ - krb5_error_code status = 0; - kdb_vftabl *v; - - status = get_vftabl(kcontext, &v); - if (status) - return status; - if (v->set_master_key_list == NULL) - return KRB5_PLUGIN_OP_NOTSUPP; - return v->set_master_key_list(kcontext, keylist); -} - -krb5_error_code -krb5_db_get_mkey_list(krb5_context kcontext, krb5_keylist_node ** keylist) -{ - krb5_error_code status = 0; - kdb_vftabl *v; - - status = get_vftabl(kcontext, &v); - if (status) - return status; - if (v->get_master_key_list == NULL) - return KRB5_PLUGIN_OP_NOTSUPP; - return v->get_master_key_list(kcontext, keylist); -} - -krb5_error_code krb5_db_fetch_mkey_list(krb5_context context, krb5_principal mname, const krb5_keyblock * mkey, @@ -1026,11 +1003,28 @@ krb5_db_fetch_mkey_list(krb5_context context, { kdb_vftabl *v; krb5_error_code status = 0; + krb5_keylist_node *local_keylist; status = get_vftabl(context, &v); if (status) return status; - return v->fetch_master_key_list(context, mname, mkey, mkvno, mkey_list); + if (!context->dal_handle->master_princ) { + status = krb5_copy_principal(context, mname, &context->dal_handle->master_princ); + if (status) + return status; + } + if (mkey_list == NULL) + mkey_list = &local_keylist; + status = v->fetch_master_key_list(context, mname, mkey, mkvno, mkey_list); + if (status == 0) { + /* The dal_handle holds an alias to the most recent master_keylist*/ + krb5_keylist_node *old_keylist = context->dal_handle->master_keylist; + context->dal_handle->master_keylist = *mkey_list; + if (context->dal_handle->free_keylist) + krb5_db_free_mkey_list(context, old_keylist); + context->dal_handle->free_keylist = (mkey_list == &local_keylist); + } + return status; } void @@ -1039,6 +1033,19 @@ krb5_db_free_mkey_list(krb5_context context, { krb5_keylist_node *cur, *prev; + /* + * The dal_handle holds onto the most recent master + * keylist that has been fetched throughout the lifetime of the context; if + * this function is called on that keylist, then the dal_handle is updated to + * indicate that the keylist should be freed on next call to + * krb5_db_fetch_mkey_list() or when the database is closed. Otherwise, the + * master_keylist is freed. Either way, the caller must not access this master + * keylist after calling this function. + */ + if (context&& context->dal_handle->master_keylist == mkey_list) { + context->dal_handle->free_keylist = 1; + return; + } for (cur = mkey_list; cur != NULL;) { prev = cur; cur = cur->next; @@ -2177,6 +2184,27 @@ krb5_db_promote(krb5_context kcontext, char **db_args) return status; } +static krb5_error_code +decrypt_iterator(krb5_context kcontext, + const krb5_key_data * key_data, + krb5_keyblock * dbkey, + krb5_keysalt * keysalt) +{ + krb5_error_code status = 0; + kdb_vftabl *v; + krb5_keylist_node *n = kcontext->dal_handle->master_keylist; + status = get_vftabl(kcontext, &v); + if (status) + return status; + for (;n; n = n->next) { + krb5_clear_error_message(kcontext); + status= v->decrypt_key_data(kcontext, &n->keyblock, key_data, dbkey, keysalt); + if (status == 0) + return 0; + } + return status; +} + krb5_error_code krb5_dbe_decrypt_key_data( krb5_context kcontext, const krb5_keyblock * mkey, @@ -2186,11 +2214,24 @@ krb5_dbe_decrypt_key_data( krb5_context kcontext, { krb5_error_code status = 0; kdb_vftabl *v; - + krb5_keylist_node *n = kcontext->dal_handle->master_keylist; status = get_vftabl(kcontext, &v); if (status) return status; - return v->decrypt_key_data(kcontext, mkey, key_data, dbkey, keysalt); + if (mkey ||!n) + return v->decrypt_key_data(kcontext, mkey, key_data, dbkey, keysalt); + status = decrypt_iterator(kcontext, key_data, dbkey, keysalt); + if (status == 0) + return 0; + if (kcontext->dal_handle->master_keylist) { + /* Try reloading master keys*/ + krb5_keyblock *cur_mkey = &kcontext->dal_handle->master_keylist->keyblock; + if (krb5_db_fetch_mkey_list(kcontext, kcontext->dal_handle->master_princ, + cur_mkey, -1, NULL) == 0) { + return decrypt_iterator(kcontext, key_data, dbkey, keysalt); + } + } + return status; } krb5_error_code diff --git a/src/lib/kdb/kdb5.h b/src/lib/kdb/kdb5.h index c1265e704..6d5c0a6cd 100644 --- a/src/lib/kdb/kdb5.h +++ b/src/lib/kdb/kdb5.h @@ -30,6 +30,9 @@ struct _kdb5_dal_handle extent. */ void *db_context; db_library lib_handle; + krb5_keylist_node *master_keylist; + krb5_boolean free_keylist; + krb5_principal master_princ; }; /* typedef kdb5_dal_handle is in k5-int.h now */ diff --git a/src/lib/kdb/keytab.c b/src/lib/kdb/keytab.c index 4d56915b9..dbbbe75cd 100644 --- a/src/lib/kdb/keytab.c +++ b/src/lib/kdb/keytab.c @@ -124,8 +124,6 @@ krb5_ktkdb_get_entry(in_context, id, principal, kvno, enctype, entry) krb5_keytab_entry * entry; { krb5_context context; - krb5_keylist_node * master_keylist; - krb5_keyblock * master_key; krb5_error_code kerror = 0; krb5_key_data * key_data; krb5_db_entry * db_entry; @@ -157,14 +155,6 @@ krb5_ktkdb_get_entry(in_context, id, principal, kvno, enctype, entry) } /* match key */ - kerror = krb5_db_get_mkey_list(context, &master_keylist); - if (kerror) - goto error; - - kerror = krb5_dbe_find_mkey(context, master_keylist, db_entry, &master_key); - if (kerror) - goto error; - /* For cross realm tgts, we match whatever enctype is provided; * for other principals, we only match the first enctype that is * found. Since the TGS and AS code do the same thing, then we @@ -178,7 +168,7 @@ krb5_ktkdb_get_entry(in_context, id, principal, kvno, enctype, entry) goto error; - kerror = krb5_dbe_decrypt_key_data(context, master_key, key_data, + kerror = krb5_dbe_decrypt_key_data(context, NULL, key_data, &entry->key, NULL); if (kerror) goto error; diff --git a/src/lib/kdb/libkdb5.exports b/src/lib/kdb/libkdb5.exports index 6e890478d..f3f6a8021 100644 --- a/src/lib/kdb/libkdb5.exports +++ b/src/lib/kdb/libkdb5.exports @@ -18,7 +18,6 @@ krb5_db_fini krb5_db_free_principal krb5_db_get_age krb5_db_get_key_data_kvno -krb5_db_get_mkey_list krb5_db_get_context krb5_db_get_principal krb5_db_iterate @@ -26,7 +25,6 @@ krb5_db_lock krb5_db_put_principal krb5_db_refresh_config krb5_db_set_context -krb5_db_set_mkey_list krb5_db_setup_mkey_name krb5_db_sign_authdata krb5_db_unlock |
