libtommath: Fix possible integer overflow CVE-2023-36328
[heimdal.git] / kadmin / del.c
blob320fe6e8eabcac03e35d626717758fa931c35a05
1 /*
2 * Copyright (c) 1997 - 2004 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
4 * All rights reserved.
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
17 * 3. Neither the name of the Institute nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
34 #include "kadmin_locl.h"
35 #include "kadmin-commands.h"
37 static int
38 do_del_entry(krb5_principal principal, void *data)
40 return kadm5_delete_principal(data, principal);
43 int
44 del_entry(void *opt, int argc, char **argv)
46 int i;
47 krb5_error_code ret = 0;
48 void *dup_kadm_handle = NULL;
50 ret = kadm5_dup_context(kadm_handle, &dup_kadm_handle);
52 for (i = 0; ret == 0 && i < argc; i++)
53 ret = foreach_principal(argv[i], do_del_entry, "del", dup_kadm_handle);
55 if (dup_kadm_handle)
56 kadm5_destroy(dup_kadm_handle);
57 return ret != 0;
60 static int
61 do_del_ns_entry(krb5_principal nsp, void *data)
63 krb5_error_code ret;
64 krb5_principal p = NULL;
65 const char *comp0 = krb5_principal_get_comp_string(context, nsp, 0);
66 const char *comp1 = krb5_principal_get_comp_string(context, nsp, 1);
68 if (krb5_principal_get_num_comp(context, nsp) != 2) {
69 char *unsp = NULL;
71 ret = krb5_unparse_name(context, nsp, &unsp);
72 krb5_warn(context, ret,
73 "Not a valid namespace name (component count is not 2): %s",
74 unsp ? unsp : "<out of memory>");
75 free(unsp);
76 return EINVAL;
79 ret = krb5_make_principal(context, &p,
80 krb5_principal_get_realm(context, nsp),
81 "WELLKNOWN", HDB_WK_NAMESPACE, NULL);
82 if (ret == 0)
83 ret = krb5_principal_set_comp_string(context, p, 2, comp0);
84 if (ret == 0)
85 ret = krb5_principal_set_comp_string(context, p, 3, comp1);
86 if (ret == 0)
87 ret = kadm5_delete_principal(kadm_handle, p);
88 krb5_free_principal(context, p);
89 return ret;
92 int
93 del_namespace(void *opt, int argc, char **argv)
95 int i;
96 krb5_error_code ret = 0;
97 void *dup_kadm_handle = NULL;
99 ret = kadm5_dup_context(kadm_handle, &dup_kadm_handle);
100 for (i = 0; ret == 0 && i < argc; i++)
101 ret = foreach_principal(argv[i], do_del_ns_entry, "del_ns",
102 dup_kadm_handle);
103 if (dup_kadm_handle)
104 kadm5_destroy(dup_kadm_handle);
105 return ret != 0;
109 del_alias(void *opt, int argc, char **argv)
111 krb5_error_code ret;
112 size_t i;
115 if (argc < 1) {
116 krb5_warnx(context, "No aliases given");
117 return 1;
120 for (; argc; argc--, argv++) {
121 kadm5_principal_ent_rec princ;
122 krb5_principal p;
123 HDB_Ext_Aliases *a;
124 HDB_extension ext;
125 krb5_tl_data *tl;
126 krb5_data d;
128 if ((ret = krb5_parse_name(context, argv[0], &p))) {
129 krb5_warn(context, ret, "Invalid principal: %s", argv[0]);
130 return 1;
133 memset(&princ, 0, sizeof(princ));
134 ret = kadm5_get_principal(kadm_handle, p, &princ,
135 KADM5_PRINCIPAL_NORMAL_MASK | KADM5_TL_DATA);
136 if (ret) {
137 krb5_warn(context, ret, "Principal alias not found %s", argv[0]);
138 continue;
141 if (krb5_principal_compare(context, p, princ.principal)) {
142 krb5_warn(context, ret, "Not deleting principal %s because it is "
143 "not an alias; use 'delete' to delete the principal",
144 argv[0]);
145 continue;
148 a = &ext.data.u.aliases;
149 a->case_insensitive = 0;
150 a->aliases.len = 0;
151 a->aliases.val = 0;
152 if ((tl = get_tl(&princ, KRB5_TL_ALIASES)) == NULL) {
153 krb5_warnx(context, "kadm5_get_principal() found principal %s but "
154 "not its aliases", argv[0]);
155 kadm5_free_principal_ent(kadm_handle, &princ);
156 krb5_free_principal(context, p);
157 return 1;
160 ret = decode_HDB_Ext_Aliases(tl->tl_data_contents, tl->tl_data_length,
161 a, NULL);
162 if (ret) {
163 krb5_warn(context, ret, "Principal alias list could not be decoded");
164 kadm5_free_principal_ent(kadm_handle, &princ);
165 krb5_free_principal(context, p);
166 return 1;
170 * Remove alias, but also, don't assume it appears only once in aliases
171 * list.
173 i = 0;
174 while (i < a->aliases.len) {
175 if (!krb5_principal_compare(context, p, &a->aliases.val[i])) {
176 i++;
177 continue;
179 free_Principal(&a->aliases.val[i]);
180 if (i + 1 < a->aliases.len)
181 memmove(&a->aliases.val[i],
182 &a->aliases.val[i + 1],
183 sizeof(a->aliases.val[i]) * (a->aliases.len - (i + 1)));
184 if (a->aliases.len)
185 a->aliases.len--;
186 continue;
189 krb5_data_zero(&d);
190 ext.data.element = choice_HDB_extension_data_aliases;
191 ext.mandatory = 0;
192 if (ret == 0)
193 ASN1_MALLOC_ENCODE(HDB_extension, d.data, d.length, &ext, &i, ret);
194 free_HDB_Ext_Aliases(a);
195 if (ret == 0) {
196 int16_t len = d.length;
198 if (len < 0 || d.length != (size_t)len) {
199 krb5_warnx(context, "Too many aliases; does not fit in 32767 bytes");
200 ret = EOVERFLOW;
201 } else {
202 add_tl(&princ, KRB5_TL_EXTENSION, &d);
203 krb5_data_zero(&d);
206 if (ret == 0) {
207 ret = kadm5_modify_principal(kadm_handle, &princ,
208 KADM5_PRINCIPAL | KADM5_TL_DATA);
209 if (ret)
210 krb5_warn(context, ret, "kadm5_modify_principal");
213 kadm5_free_principal_ent(kadm_handle, &princ);
214 krb5_free_principal(context, p);
215 krb5_data_free(&d);
216 p = NULL;
219 return ret == 0 ? 0 : 1;