freebsd-dev/crypto/heimdal/lib/krb5/replay.c

329 lines
8.2 KiB
C
Raw Normal View History

/*
2011-10-05 07:23:29 +00:00
* Copyright (c) 1997-2001 Kungliga Tekniska Högskolan
* (Royal Institute of Technology, Stockholm, Sweden).
* All rights reserved.
*
2011-10-05 07:23:29 +00:00
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
*
2011-10-05 07:23:29 +00:00
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
*
2011-10-05 07:23:29 +00:00
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
2011-10-05 07:23:29 +00:00
* 3. Neither the name of the Institute nor the names of its contributors
* may be used to endorse or promote products derived from this software
* without specific prior written permission.
*
2011-10-05 07:23:29 +00:00
* THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*/
#include "krb5_locl.h"
2001-02-13 16:46:19 +00:00
#include <vis.h>
struct krb5_rcache_data {
char *name;
};
2011-10-05 07:23:29 +00:00
KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
krb5_rc_resolve(krb5_context context,
krb5_rcache id,
const char *name)
{
id->name = strdup(name);
2001-06-21 02:12:07 +00:00
if(id->name == NULL) {
2011-10-05 07:23:29 +00:00
krb5_set_error_message(context, KRB5_RC_MALLOC,
N_("malloc: out of memory", ""));
return KRB5_RC_MALLOC;
2001-06-21 02:12:07 +00:00
}
return 0;
}
2011-10-05 07:23:29 +00:00
KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
krb5_rc_resolve_type(krb5_context context,
krb5_rcache *id,
const char *type)
{
2008-05-07 13:39:42 +00:00
*id = NULL;
2001-06-21 02:12:07 +00:00
if(strcmp(type, "FILE")) {
2011-10-05 07:23:29 +00:00
krb5_set_error_message (context, KRB5_RC_TYPE_NOTFOUND,
N_("replay cache type %s not supported", ""),
type);
return KRB5_RC_TYPE_NOTFOUND;
2001-06-21 02:12:07 +00:00
}
*id = calloc(1, sizeof(**id));
2001-06-21 02:12:07 +00:00
if(*id == NULL) {
2011-10-05 07:23:29 +00:00
krb5_set_error_message(context, KRB5_RC_MALLOC,
N_("malloc: out of memory", ""));
return KRB5_RC_MALLOC;
2001-06-21 02:12:07 +00:00
}
return 0;
}
2011-10-05 07:23:29 +00:00
KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
krb5_rc_resolve_full(krb5_context context,
krb5_rcache *id,
const char *string_name)
{
krb5_error_code ret;
2008-05-07 13:39:42 +00:00
*id = NULL;
2001-06-21 02:12:07 +00:00
if(strncmp(string_name, "FILE:", 5)) {
2011-10-05 07:23:29 +00:00
krb5_set_error_message(context, KRB5_RC_TYPE_NOTFOUND,
N_("replay cache type %s not supported", ""),
2001-06-21 02:12:07 +00:00
string_name);
return KRB5_RC_TYPE_NOTFOUND;
2001-06-21 02:12:07 +00:00
}
ret = krb5_rc_resolve_type(context, id, "FILE");
if(ret)
return ret;
ret = krb5_rc_resolve(context, *id, string_name + 5);
2008-05-07 13:39:42 +00:00
if (ret) {
krb5_rc_close(context, *id);
*id = NULL;
}
return ret;
}
2011-10-05 07:23:29 +00:00
KRB5_LIB_FUNCTION const char* KRB5_LIB_CALL
krb5_rc_default_name(krb5_context context)
{
return "FILE:/var/run/default_rcache";
}
2011-10-05 07:23:29 +00:00
KRB5_LIB_FUNCTION const char* KRB5_LIB_CALL
2001-02-13 16:46:19 +00:00
krb5_rc_default_type(krb5_context context)
{
return "FILE";
}
2011-10-05 07:23:29 +00:00
KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
krb5_rc_default(krb5_context context,
krb5_rcache *id)
{
return krb5_rc_resolve_full(context, id, krb5_rc_default_name(context));
}
struct rc_entry{
time_t stamp;
unsigned char data[16];
};
2011-10-05 07:23:29 +00:00
KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
krb5_rc_initialize(krb5_context context,
krb5_rcache id,
krb5_deltat auth_lifespan)
{
FILE *f = fopen(id->name, "w");
struct rc_entry tmp;
2001-06-21 02:12:07 +00:00
int ret;
if(f == NULL) {
2011-10-05 07:23:29 +00:00
char buf[128];
2001-06-21 02:12:07 +00:00
ret = errno;
2011-10-05 07:23:29 +00:00
rk_strerror_r(ret, buf, sizeof(buf));
krb5_set_error_message(context, ret, "open(%s): %s", id->name, buf);
2001-06-21 02:12:07 +00:00
return ret;
}
tmp.stamp = auth_lifespan;
fwrite(&tmp, 1, sizeof(tmp), f);
fclose(f);
return 0;
}
2011-10-05 07:23:29 +00:00
KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
krb5_rc_recover(krb5_context context,
krb5_rcache id)
{
return 0;
}
2011-10-05 07:23:29 +00:00
KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
krb5_rc_destroy(krb5_context context,
krb5_rcache id)
{
2001-06-21 02:12:07 +00:00
int ret;
if(remove(id->name) < 0) {
2011-10-05 07:23:29 +00:00
char buf[128];
2001-06-21 02:12:07 +00:00
ret = errno;
2011-10-05 07:23:29 +00:00
rk_strerror_r(ret, buf, sizeof(buf));
krb5_set_error_message(context, ret, "remove(%s): %s", id->name, buf);
2001-06-21 02:12:07 +00:00
return ret;
}
return krb5_rc_close(context, id);
}
2011-10-05 07:23:29 +00:00
KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
krb5_rc_close(krb5_context context,
krb5_rcache id)
{
free(id->name);
free(id);
return 0;
}
static void
checksum_authenticator(Authenticator *auth, void *data)
{
2011-10-05 07:23:29 +00:00
EVP_MD_CTX *m = EVP_MD_CTX_create();
unsigned i;
EVP_DigestInit_ex(m, EVP_md5(), NULL);
2000-02-24 11:07:16 +00:00
2011-10-05 07:23:29 +00:00
EVP_DigestUpdate(m, auth->crealm, strlen(auth->crealm));
for(i = 0; i < auth->cname.name_string.len; i++)
2011-10-05 07:23:29 +00:00
EVP_DigestUpdate(m, auth->cname.name_string.val[i],
2001-02-13 16:46:19 +00:00
strlen(auth->cname.name_string.val[i]));
2011-10-05 07:23:29 +00:00
EVP_DigestUpdate(m, &auth->ctime, sizeof(auth->ctime));
EVP_DigestUpdate(m, &auth->cusec, sizeof(auth->cusec));
EVP_DigestFinal_ex(m, data, NULL);
EVP_MD_CTX_destroy(m);
}
2011-10-05 07:23:29 +00:00
KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
krb5_rc_store(krb5_context context,
krb5_rcache id,
2001-02-13 16:46:19 +00:00
krb5_donot_replay *rep)
{
struct rc_entry ent, tmp;
time_t t;
FILE *f;
2001-06-21 02:12:07 +00:00
int ret;
ent.stamp = time(NULL);
checksum_authenticator(rep, ent.data);
f = fopen(id->name, "r");
2001-06-21 02:12:07 +00:00
if(f == NULL) {
2011-10-05 07:23:29 +00:00
char buf[128];
2001-06-21 02:12:07 +00:00
ret = errno;
2011-10-05 07:23:29 +00:00
rk_strerror_r(ret, buf, sizeof(buf));
krb5_set_error_message(context, ret, "open(%s): %s", id->name, buf);
2001-06-21 02:12:07 +00:00
return ret;
}
2011-10-05 07:23:29 +00:00
rk_cloexec_file(f);
fread(&tmp, sizeof(ent), 1, f);
t = ent.stamp - tmp.stamp;
while(fread(&tmp, sizeof(ent), 1, f)){
if(tmp.stamp < t)
continue;
if(memcmp(tmp.data, ent.data, sizeof(ent.data)) == 0){
fclose(f);
2011-10-05 07:23:29 +00:00
krb5_clear_error_message (context);
return KRB5_RC_REPLAY;
}
}
if(ferror(f)){
2011-10-05 07:23:29 +00:00
char buf[128];
2001-06-21 02:12:07 +00:00
ret = errno;
fclose(f);
2011-10-05 07:23:29 +00:00
rk_strerror_r(ret, buf, sizeof(buf));
krb5_set_error_message(context, ret, "%s: %s",
id->name, buf);
2001-06-21 02:12:07 +00:00
return ret;
}
fclose(f);
f = fopen(id->name, "a");
2001-06-21 02:12:07 +00:00
if(f == NULL) {
2011-10-05 07:23:29 +00:00
char buf[128];
rk_strerror_r(errno, buf, sizeof(buf));
krb5_set_error_message(context, KRB5_RC_IO_UNKNOWN,
"open(%s): %s", id->name, buf);
return KRB5_RC_IO_UNKNOWN;
2001-06-21 02:12:07 +00:00
}
fwrite(&ent, 1, sizeof(ent), f);
fclose(f);
return 0;
}
2011-10-05 07:23:29 +00:00
KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
krb5_rc_expunge(krb5_context context,
krb5_rcache id)
{
return 0;
}
2011-10-05 07:23:29 +00:00
KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
krb5_rc_get_lifespan(krb5_context context,
krb5_rcache id,
krb5_deltat *auth_lifespan)
{
FILE *f = fopen(id->name, "r");
int r;
struct rc_entry ent;
r = fread(&ent, sizeof(ent), 1, f);
fclose(f);
if(r){
*auth_lifespan = ent.stamp;
return 0;
}
2011-10-05 07:23:29 +00:00
krb5_clear_error_message (context);
return KRB5_RC_IO_UNKNOWN;
}
2001-02-13 16:46:19 +00:00
2011-10-05 07:23:29 +00:00
KRB5_LIB_FUNCTION const char* KRB5_LIB_CALL
krb5_rc_get_name(krb5_context context,
krb5_rcache id)
{
return id->name;
}
2011-10-05 07:23:29 +00:00
KRB5_LIB_FUNCTION const char* KRB5_LIB_CALL
krb5_rc_get_type(krb5_context context,
krb5_rcache id)
{
return "FILE";
}
2011-10-05 07:23:29 +00:00
KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
krb5_get_server_rcache(krb5_context context,
const krb5_data *piece,
2001-02-13 16:46:19 +00:00
krb5_rcache *id)
{
krb5_rcache rcache;
krb5_error_code ret;
char *tmp = malloc(4 * piece->length + 1);
char *name;
2001-06-21 02:12:07 +00:00
if(tmp == NULL) {
2011-10-05 07:23:29 +00:00
krb5_set_error_message(context, ENOMEM,
N_("malloc: out of memory", ""));
2001-02-13 16:46:19 +00:00
return ENOMEM;
2001-06-21 02:12:07 +00:00
}
2001-02-13 16:46:19 +00:00
strvisx(tmp, piece->data, piece->length, VIS_WHITE | VIS_OCTAL);
#ifdef HAVE_GETEUID
2011-10-05 07:23:29 +00:00
ret = asprintf(&name, "FILE:rc_%s_%u", tmp, (unsigned)geteuid());
2001-02-13 16:46:19 +00:00
#else
2011-10-05 07:23:29 +00:00
ret = asprintf(&name, "FILE:rc_%s", tmp);
2001-02-13 16:46:19 +00:00
#endif
free(tmp);
2011-10-05 07:23:29 +00:00
if(ret < 0 || name == NULL) {
krb5_set_error_message(context, ENOMEM,
N_("malloc: out of memory", ""));
2001-02-13 16:46:19 +00:00
return ENOMEM;
2001-06-21 02:12:07 +00:00
}
2001-02-13 16:46:19 +00:00
ret = krb5_rc_resolve_full(context, &rcache, name);
free(name);
if(ret)
return ret;
*id = rcache;
return ret;
}