예제 #1
0
/*
 * Perform a binary tree search in specified function table
 * for the named function.  Returns index into function table.
 *
 * Example of usage:
 *   fnum = lookup_function(prog->p.i.functions, prog->p.i.tree_r, name);
 */
int lookup_function P3(function_t *, functab, /* function table to search */
                       int, f_index,               /* initially, functab tree's root */
                       char *, funcname)           /* name of function */
{
    SIGNED int i;
    unsigned short index;

    index = (unsigned short) (f_index & 0xffff);

    while ((unsigned short) ~index) {
	i = compare_addrs(funcname, functab[index].name);

	if (i < 0) {
	    index = functab[index].tree_l;
	    continue;
	}
	if (i > 0) {
	    index = functab[index].tree_r;
	    continue;
	}
	/*
	 * We have a match!
	 */
	return (int) index;
    }

    return -1;
}
예제 #2
0
KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
krb5_rd_cred(krb5_context context,
	     krb5_auth_context auth_context,
	     krb5_data *in_data,
	     krb5_creds ***ret_creds,
	     krb5_replay_data *outdata)
{
    krb5_error_code ret;
    size_t len;
    KRB_CRED cred;
    EncKrbCredPart enc_krb_cred_part;
    krb5_data enc_krb_cred_part_data;
    krb5_crypto crypto;
    int i;

    memset(&enc_krb_cred_part, 0, sizeof(enc_krb_cred_part));

    if ((auth_context->flags &
	 (KRB5_AUTH_CONTEXT_RET_TIME | KRB5_AUTH_CONTEXT_RET_SEQUENCE)) &&
	outdata == NULL)
	return KRB5_RC_REQUIRED; /* XXX better error, MIT returns this */

    *ret_creds = NULL;

    ret = decode_KRB_CRED(in_data->data, in_data->length,
			  &cred, &len);
    if(ret) {
	krb5_clear_error_message(context);
	return ret;
    }

    if (cred.pvno != 5) {
	ret = KRB5KRB_AP_ERR_BADVERSION;
	krb5_clear_error_message (context);
	goto out;
    }

    if (cred.msg_type != krb_cred) {
	ret = KRB5KRB_AP_ERR_MSG_TYPE;
	krb5_clear_error_message (context);
	goto out;
    }

    if (cred.enc_part.etype == ETYPE_NULL) {
	/* DK: MIT GSS-API Compatibility */
	enc_krb_cred_part_data.length = cred.enc_part.cipher.length;
	enc_krb_cred_part_data.data   = cred.enc_part.cipher.data;
    } else {
	/* Try both subkey and session key.
	 *
	 * RFC4120 claims we should use the session key, but Heimdal
	 * before 0.8 used the remote subkey if it was send in the
	 * auth_context.
	 */

	if (auth_context->remote_subkey) {
	    ret = krb5_crypto_init(context, auth_context->remote_subkey,
				   0, &crypto);
	    if (ret)
		goto out;

	    ret = krb5_decrypt_EncryptedData(context,
					     crypto,
					     KRB5_KU_KRB_CRED,
					     &cred.enc_part,
					     &enc_krb_cred_part_data);
	
	    krb5_crypto_destroy(context, crypto);
	}

	/*
	 * If there was not subkey, or we failed using subkey,
	 * retry using the session key
	 */
	if (auth_context->remote_subkey == NULL || ret == KRB5KRB_AP_ERR_BAD_INTEGRITY)
	{

	    ret = krb5_crypto_init(context, auth_context->keyblock,
				   0, &crypto);

	    if (ret)
		goto out;
	
	    ret = krb5_decrypt_EncryptedData(context,
					     crypto,
					     KRB5_KU_KRB_CRED,
					     &cred.enc_part,
					     &enc_krb_cred_part_data);
	
	    krb5_crypto_destroy(context, crypto);
	}
	if (ret)
	    goto out;
    }

    ret = decode_EncKrbCredPart(enc_krb_cred_part_data.data,
				enc_krb_cred_part_data.length,
				&enc_krb_cred_part,
				&len);
    if (enc_krb_cred_part_data.data != cred.enc_part.cipher.data)
	krb5_data_free(&enc_krb_cred_part_data);
    if (ret) {
	krb5_set_error_message(context, ret,
			       N_("Failed to decode "
				  "encrypte credential part", ""));
	goto out;
    }

    /* check sender address */

    if (enc_krb_cred_part.s_address
	&& auth_context->remote_address
	&& auth_context->remote_port) {
	krb5_address *a;

	ret = krb5_make_addrport (context, &a,
				  auth_context->remote_address,
				  auth_context->remote_port);
	if (ret)
	    goto out;


	ret = compare_addrs(context, a, enc_krb_cred_part.s_address,
			    N_("sender address is wrong "
			       "in received creds", ""));
	krb5_free_address(context, a);
	free(a);
	if(ret)
	    goto out;
    }

    /* check receiver address */

    if (enc_krb_cred_part.r_address
	&& auth_context->local_address) {
	if(auth_context->local_port &&
	   enc_krb_cred_part.r_address->addr_type == KRB5_ADDRESS_ADDRPORT) {
	    krb5_address *a;
	    ret = krb5_make_addrport (context, &a,
				      auth_context->local_address,
				      auth_context->local_port);
	    if (ret)
		goto out;
	
	    ret = compare_addrs(context, a, enc_krb_cred_part.r_address,
				N_("receiver address is wrong "
				   "in received creds", ""));
	    krb5_free_address(context, a);
	    free(a);
	    if(ret)
		goto out;
	} else {
	    ret = compare_addrs(context, auth_context->local_address,
				enc_krb_cred_part.r_address,
				N_("receiver address is wrong "
				   "in received creds", ""));
	    if(ret)
		goto out;
	}
    }

    /* check timestamp */
    if (auth_context->flags & KRB5_AUTH_CONTEXT_DO_TIME) {
	krb5_timestamp sec;

	krb5_timeofday (context, &sec);

	if (enc_krb_cred_part.timestamp == NULL ||
	    enc_krb_cred_part.usec      == NULL ||
	    abs(*enc_krb_cred_part.timestamp - sec)
	    > context->max_skew) {
	    krb5_clear_error_message (context);
	    ret = KRB5KRB_AP_ERR_SKEW;
	    goto out;
	}
    }

    if ((auth_context->flags &
	 (KRB5_AUTH_CONTEXT_RET_TIME | KRB5_AUTH_CONTEXT_RET_SEQUENCE))) {
	/* if these fields are not present in the cred-part, silently
           return zero */
	memset(outdata, 0, sizeof(*outdata));
	if(enc_krb_cred_part.timestamp)
	    outdata->timestamp = *enc_krb_cred_part.timestamp;
	if(enc_krb_cred_part.usec)
	    outdata->usec = *enc_krb_cred_part.usec;
	if(enc_krb_cred_part.nonce)
	    outdata->seq = *enc_krb_cred_part.nonce;
    }

    /* Convert to NULL terminated list of creds */

    *ret_creds = calloc(enc_krb_cred_part.ticket_info.len + 1,
			sizeof(**ret_creds));

    if (*ret_creds == NULL) {
	ret = ENOMEM;
	krb5_set_error_message(context, ret,
			       N_("malloc: out of memory", ""));
	goto out;
    }

    for (i = 0; i < enc_krb_cred_part.ticket_info.len; ++i) {
	KrbCredInfo *kci = &enc_krb_cred_part.ticket_info.val[i];
	krb5_creds *creds;

	creds = calloc(1, sizeof(*creds));
	if(creds == NULL) {
	    ret = ENOMEM;
	    krb5_set_error_message(context, ret,
				   N_("malloc: out of memory", ""));
	    goto out;
	}

	ASN1_MALLOC_ENCODE(Ticket, creds->ticket.data, creds->ticket.length,
			   &cred.tickets.val[i], &len, ret);
	if (ret) {
	    free(creds);
	    goto out;
	}
	if(creds->ticket.length != len)
	    krb5_abortx(context, "internal error in ASN.1 encoder");
	copy_EncryptionKey (&kci->key, &creds->session);
	if (kci->prealm && kci->pname)
	    _krb5_principalname2krb5_principal (context,
						&creds->client,
						*kci->pname,
						*kci->prealm);
	if (kci->flags)
	    creds->flags.b = *kci->flags;
	if (kci->authtime)
	    creds->times.authtime = *kci->authtime;
	if (kci->starttime)
	    creds->times.starttime = *kci->starttime;
	if (kci->endtime)
	    creds->times.endtime = *kci->endtime;
	if (kci->renew_till)
	    creds->times.renew_till = *kci->renew_till;
	if (kci->srealm && kci->sname)
	    _krb5_principalname2krb5_principal (context,
						&creds->server,
						*kci->sname,
						*kci->srealm);
	if (kci->caddr)
	    krb5_copy_addresses (context,
				 kci->caddr,
				 &creds->addresses);
	
	(*ret_creds)[i] = creds;
	
    }
    (*ret_creds)[i] = NULL;

    free_KRB_CRED (&cred);
    free_EncKrbCredPart(&enc_krb_cred_part);

    return 0;

  out:
    free_EncKrbCredPart(&enc_krb_cred_part);
    free_KRB_CRED (&cred);
    if(*ret_creds) {
	for(i = 0; (*ret_creds)[i]; i++)
	    krb5_free_creds(context, (*ret_creds)[i]);
	free(*ret_creds);
	*ret_creds = NULL;
    }
    return ret;
}
예제 #3
0
/*
 * Do the real work of inserting node and rebalancing tree...
 */
static void functab_tree_add P4(function_t *, functab,
      unsigned short *, root, int, newfunc, SIGNED short *, balance)
{
    SIGNED int i;
    unsigned short p1, p2;	/* temporary "pointers" */

    DEBUG_CHECK(*balance < -1 || *balance > 1, "Balance is garbage.\n");
    DEBUG_CHECK(!balance || !root || !functab, "Null pointer in functab_tree.\n");
    /*
     * Are we at an insertion point? If so, add new node here, rebalance, and
     * exit.
     */
    if ((unsigned short) ~(*root) == 0) {
	*root = (unsigned short) (newfunc & 0xffff);
	*balance = 1;
	return;
    }
    /*
     * Compare data
     */
    i = compare_addrs(functab[newfunc].name, functab[*root].name);

    if (i < 0) {
	functab_tree_add(functab, &functab[*root].tree_l, newfunc, balance);
	if (*balance) {
	    /*
	     * left branch has grown
	     */
	    switch (functab[*root].tree_b) {
	    case 1:
		/*
		 * right branch WAS longer; balance is ok now
		 */
		functab[*root].tree_b = 0;
		*balance = 0;
		break;
	    case 0:
		/*
		 * balance WAS okay; now left branch longer
		 */
		functab[*root].tree_b = -1;
		break;
	    case -1:
		/*
		 * left branch was already too long; rebalance
		 */
		p1 = functab[*root].tree_l;
		if (functab[p1].tree_b == -1) {
		    /*
		     * LL
		     */
		    functab[*root].tree_l = functab[p1].tree_r;
		    functab[p1].tree_r = *root;
		    functab[*root].tree_b = 0;
		    *root = p1;
		} else {
		    /*
		     * double LR
		     */
		    p2 = functab[p1].tree_r;
		    functab[p1].tree_r = functab[p2].tree_l;
		    functab[p2].tree_l = p1;

		    functab[*root].tree_l = functab[p2].tree_r;
		    functab[p2].tree_r = *root;

		    if (functab[p2].tree_b == -1)
			functab[*root].tree_b = 1;
		    else
			functab[*root].tree_b = 0;

		    if (functab[p2].tree_b == 1)
			functab[p1].tree_b = -1;
		    else
			functab[p1].tree_b = 0;

		    *root = p2;
		}
		functab[*root].tree_b = 0;
		*balance = 0;
	    }
	}
	return;
    }
    if (i > 0) {
	functab_tree_add(functab, &functab[*root].tree_r, newfunc, balance);
	if (*balance) {
	    /*
	     * right branch has grown
	     */
	    switch (functab[*root].tree_b) {
	    case -1:
		/*
		 * left branch WAS longer; balance is ok now
		 */
		functab[*root].tree_b = 0;
		*balance = 0;
		break;
	    case 0:
		/*
		 * balance WAS okay; now right branch longer
		 */
		functab[*root].tree_b = 1;
		break;
	    case 1:
		/*
		 * right branch was already too long; rebalance
		 */
		p1 = functab[*root].tree_r;
		if (functab[p1].tree_b == 1) {
		    /*
		     * RR
		     */
		    functab[*root].tree_r = functab[p1].tree_l;
		    functab[p1].tree_l = *root;
		    functab[*root].tree_b = 0;
		    *root = p1;
		} else {
		    /*
		     * double RL
		     */
		    p2 = functab[p1].tree_l;
		    functab[p1].tree_l = functab[p2].tree_r;
		    functab[p2].tree_r = p1;

		    functab[*root].tree_r = functab[p2].tree_l;
		    functab[p2].tree_l = *root;

		    if (functab[p2].tree_b == 1)
			functab[*root].tree_b = -1;
		    else
			functab[*root].tree_b = 0;

		    if (functab[p2].tree_b == -1)
			functab[p1].tree_b = 1;
		    else
			functab[p1].tree_b = 0;

		    *root = p2;
		}
		functab[*root].tree_b = 0;
		*balance = 0;
	    }
	}
	return;
    }
    /*
     * Oh...oh.  This is the same key!  This is not good...
     */
    *balance = 0;

    IF_DEBUG(fatal("Duplicate entry in function table tree [%s].\n", 
		   functab[newfunc].name));
    return;
}