2 * Copyright (c) 2006 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
17 * 3. Neither the name of the Institute nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
36 #ifndef HEIMDAL_KDC_KDC_PLUGIN_H
37 #define HEIMDAL_KDC_KDC_PLUGIN_H 1
41 #include <kdc-accessors.h>
45 * Allocate a PAC for the given client with krb5_pac_init(),
46 * and fill its contents in with krb5_pac_add_buffer().
49 typedef krb5_error_code
50 (KRB5_CALLCONV
*krb5plugin_kdc_pac_generate
)(void *,
52 hdb_entry
*, /* client */
53 hdb_entry
*, /* server */
54 const krb5_keyblock
*, /* pk_replykey */
55 uint64_t, /* pac_attributes */
59 * Verify the PAC KDC signatures by fetching the appropriate TGS key
60 * and calling krb5_pac_verify() with that key. The possibly-NULL
61 * is_trusted may be set by the plugin to indicate that the PAC was
62 * issued by a trusted server, and not, for example, by an RODC.
65 typedef krb5_error_code
66 (KRB5_CALLCONV
*krb5plugin_kdc_pac_verify
)(void *,
68 krb5_const_principal
, /* new ticket client */
69 hdb_entry
*, /* delegation proxy */
70 hdb_entry
*,/* client */
71 hdb_entry
*,/* server */
72 hdb_entry
*,/* krbtgt */
73 EncTicketPart
*, /* ticket */
75 krb5_boolean
*); /* is_trusted */
78 * Update the KDC PAC buffers. This function may be used after verifying the PAC
79 * with a call to krb5plugin_kdc_pac_verify(), and it resembles the latter
80 * function in the parameters it takes. The 'pac' parameter always points to a
84 typedef krb5_error_code
85 (KRB5_CALLCONV
*krb5plugin_kdc_pac_update
)(void *,
87 krb5_const_principal
, /* new ticket client */
88 hdb_entry
*, /* delegation proxy */
89 krb5_const_pac
, /* delegation proxy pac */
90 hdb_entry
*,/* client */
91 hdb_entry
*,/* server */
92 hdb_entry
*,/* krbtgt */
93 krb5_pac
*); /* pac */
96 * Authorize the client principal's access to the Authentication Service (AS).
97 * This function is called after any pre-authentication has completed.
100 typedef krb5_error_code
101 (KRB5_CALLCONV
*krb5plugin_kdc_client_access
)(void *, astgs_request_t
);
104 * A referral policy plugin can either rewrite the server principal
105 * by resetting priv->server_princ, or it can disable referral
106 * processing entirely by returning an error.
108 * The error code from the previous server lookup is available as r->ret.
110 * If the function returns KRB5_PLUGIN_NO_HANDLE, the TGS will continue
111 * with its default referral handling.
113 * Note well: the plugin should free priv->server_princ is replacing.
116 typedef krb5_error_code
117 (KRB5_CALLCONV
*krb5plugin_kdc_referral_policy
)(void *, astgs_request_t
);
120 * Update the AS or TGS reply immediately prior to encoding.
123 typedef krb5_error_code
124 (KRB5_CALLCONV
*krb5plugin_kdc_finalize_reply
)(void *, astgs_request_t
);
127 * Audit an AS or TGS request. This function is called after encoding the
128 * reply (on success), or before encoding the error message. If a HDB audit
129 * function is also present, it is called after this one.
131 * The request should not be modified by the plugin.
134 typedef krb5_error_code
135 (KRB5_CALLCONV
*krb5plugin_kdc_audit
)(void *, astgs_request_t
);
138 * Plugins should carefully check API contract notes for changes
139 * between plugin API versions.
141 #define KRB5_PLUGIN_KDC_VERSION_11 11
143 typedef struct krb5plugin_kdc_ftable
{
144 HEIM_PLUGIN_FTABLE_COMMON_ELEMENTS(krb5_context
);
145 krb5plugin_kdc_pac_generate pac_generate
;
146 krb5plugin_kdc_pac_verify pac_verify
;
147 krb5plugin_kdc_pac_update pac_update
;
148 krb5plugin_kdc_client_access client_access
;
149 krb5plugin_kdc_referral_policy referral_policy
;
150 krb5plugin_kdc_finalize_reply finalize_reply
;
151 krb5plugin_kdc_audit audit
;
152 } krb5plugin_kdc_ftable
;
154 #endif /* HEIMDAL_KDC_KDC_PLUGIN_H */