2 * Copyright (c) 1997 - 2001 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
6 * Portions Copyright (c) 2009 Apple Inc. All rights reserved.
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
19 * 3. Neither the name of the Institute nor the names of its contributors
20 * may be used to endorse or promote products derived from this software
21 * without specific prior written permission.
23 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
24 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
36 #define KRB5_KDB_DISALLOW_POSTDATED 0x00000001
37 #define KRB5_KDB_DISALLOW_FORWARDABLE 0x00000002
38 #define KRB5_KDB_DISALLOW_TGT_BASED 0x00000004
39 #define KRB5_KDB_DISALLOW_RENEWABLE 0x00000008
40 #define KRB5_KDB_DISALLOW_PROXIABLE 0x00000010
41 #define KRB5_KDB_DISALLOW_DUP_SKEY 0x00000020
42 #define KRB5_KDB_DISALLOW_ALL_TIX 0x00000040
43 #define KRB5_KDB_REQUIRES_PRE_AUTH 0x00000080
44 #define KRB5_KDB_REQUIRES_HW_AUTH 0x00000100
45 #define KRB5_KDB_REQUIRES_PWCHANGE 0x00000200
46 #define KRB5_KDB_DISALLOW_SVR 0x00001000
47 #define KRB5_KDB_PWCHANGE_SERVICE 0x00002000
48 #define KRB5_KDB_SUPPORT_DESMD5 0x00004000
49 #define KRB5_KDB_NEW_PRINC 0x00008000
53 key: krb5_unparse_name + NUL
58 32: max renewable time
61 32: last successful passwd
62 32: last failed attempt
63 32: num of failed attempts
72 for num key data times
73 16: version (num keyblocks)
84 read-of-data: key-encrypted, key-usage 0, master-key
87 version2 = salt in key_data->key_data_contents[1]
95 attr_to_flags(unsigned attr
, HDBFlags
*flags
)
97 flags
->postdate
= !(attr
& KRB5_KDB_DISALLOW_POSTDATED
);
98 flags
->forwardable
= !(attr
& KRB5_KDB_DISALLOW_FORWARDABLE
);
99 flags
->initial
= !!(attr
& KRB5_KDB_DISALLOW_TGT_BASED
);
100 flags
->renewable
= !(attr
& KRB5_KDB_DISALLOW_RENEWABLE
);
101 flags
->proxiable
= !(attr
& KRB5_KDB_DISALLOW_PROXIABLE
);
103 flags
->invalid
= !!(attr
& KRB5_KDB_DISALLOW_ALL_TIX
);
104 flags
->require_preauth
= !!(attr
& KRB5_KDB_REQUIRES_PRE_AUTH
);
105 flags
->require_hwauth
= !!(attr
& KRB5_KDB_REQUIRES_HW_AUTH
);
106 flags
->server
= !(attr
& KRB5_KDB_DISALLOW_SVR
);
107 flags
->change_pw
= !!(attr
& KRB5_KDB_PWCHANGE_SERVICE
);
108 flags
->client
= 1; /* XXX */
111 #define KDB_V1_BASE_LENGTH 38
113 #define CHECK(x) do { if ((x)) goto out; } while(0)
116 static krb5_error_code
117 mdb_principal2key(krb5_context context
,
118 krb5_const_principal principal
,
124 ret
= krb5_unparse_name(context
, principal
, &str
);
128 key
->length
= strlen(str
) + 1;
131 #endif /* HAVE_DB1 */
133 #define KRB5_KDB_SALTTYPE_NORMAL 0
134 #define KRB5_KDB_SALTTYPE_V4 1
135 #define KRB5_KDB_SALTTYPE_NOREALM 2
136 #define KRB5_KDB_SALTTYPE_ONLYREALM 3
137 #define KRB5_KDB_SALTTYPE_SPECIAL 4
138 #define KRB5_KDB_SALTTYPE_AFS3 5
139 #define KRB5_KDB_SALTTYPE_CERTHASH 6
141 static krb5_error_code
142 fix_salt(krb5_context context
, hdb_entry
*ent
, Key
*k
)
145 Salt
*salt
= k
->salt
;
147 switch((int)salt
->type
) {
148 case KRB5_KDB_SALTTYPE_NORMAL
:
149 salt
->type
= KRB5_PADATA_PW_SALT
;
151 case KRB5_KDB_SALTTYPE_V4
:
152 krb5_data_free(&salt
->salt
);
153 salt
->type
= KRB5_PADATA_PW_SALT
;
155 case KRB5_KDB_SALTTYPE_NOREALM
:
162 for (i
= 0; i
< ent
->principal
->name
.name_string
.len
; ++i
)
163 len
+= strlen(ent
->principal
->name
.name_string
.val
[i
]);
164 ret
= krb5_data_alloc (&salt
->salt
, len
);
168 for (i
= 0; i
< ent
->principal
->name
.name_string
.len
; ++i
) {
170 ent
->principal
->name
.name_string
.val
[i
],
171 strlen(ent
->principal
->name
.name_string
.val
[i
]));
172 p
+= strlen(ent
->principal
->name
.name_string
.val
[i
]);
175 salt
->type
= KRB5_PADATA_PW_SALT
;
178 case KRB5_KDB_SALTTYPE_ONLYREALM
:
179 krb5_data_free(&salt
->salt
);
180 ret
= krb5_data_copy(&salt
->salt
,
181 ent
->principal
->realm
,
182 strlen(ent
->principal
->realm
));
185 salt
->type
= KRB5_PADATA_PW_SALT
;
187 case KRB5_KDB_SALTTYPE_SPECIAL
:
188 salt
->type
= KRB5_PADATA_PW_SALT
;
190 case KRB5_KDB_SALTTYPE_AFS3
:
191 krb5_data_free(&salt
->salt
);
192 ret
= krb5_data_copy(&salt
->salt
,
193 ent
->principal
->realm
,
194 strlen(ent
->principal
->realm
));
197 salt
->type
= KRB5_PADATA_AFS3_SALT
;
199 case KRB5_KDB_SALTTYPE_CERTHASH
:
200 krb5_data_free(&salt
->salt
);
212 * This function takes a key from a krb5_storage from an MIT KDB encoded
213 * entry and places it in the given Key object.
215 * @param context Context
216 * @param entry HDB entry
217 * @param sp krb5_storage with current offset set to the beginning of a
219 * @param version See comments in caller body for the backstory on this
220 * @param k Key * to load the key into
222 static krb5_error_code
223 mdb_keyvalue2key(krb5_context context
, hdb_entry
*entry
, krb5_storage
*sp
, uint16_t version
, Key
*k
)
229 k
->mkvno
= malloc(sizeof(*k
->mkvno
));
230 if (k
->mkvno
== NULL
) {
236 for (i
= 0; i
< version
; i
++) {
237 CHECK(ret
= krb5_ret_uint16(sp
, &type
));
238 CHECK(ret
= krb5_ret_uint16(sp
, &u16
));
240 /* This "version" means we have a key */
241 k
->key
.keytype
= type
;
243 * MIT stores keys encrypted keys as {16-bit length
244 * of plaintext key, {encrypted key}}. The reason
245 * for this is that the Kerberos cryptosystem is not
246 * length-preserving. Heimdal's approach is to
247 * truncate the plaintext to the expected length of
248 * the key given its enctype, so we ignore this
249 * 16-bit length-of-plaintext-key field.
252 krb5_storage_seek(sp
, 2, SEEK_CUR
); /* skip real length */
253 k
->key
.keyvalue
.length
= u16
- 2; /* adjust cipher len */
254 k
->key
.keyvalue
.data
= malloc(k
->key
.keyvalue
.length
);
255 krb5_storage_read(sp
, k
->key
.keyvalue
.data
,
256 k
->key
.keyvalue
.length
);
258 /* We'll ignore this key; see our caller */
259 k
->key
.keyvalue
.length
= 0;
260 k
->key
.keyvalue
.data
= NULL
;
261 krb5_storage_seek(sp
, u16
, SEEK_CUR
); /* skip real length */
264 /* This "version" means we have a salt */
265 k
->salt
= calloc(1, sizeof(*k
->salt
));
266 if (k
->salt
== NULL
) {
270 k
->salt
->type
= type
;
272 k
->salt
->salt
.data
= malloc(u16
);
273 if (k
->salt
->salt
.data
== NULL
) {
277 k
->salt
->salt
.length
= u16
;
278 krb5_storage_read(sp
, k
->salt
->salt
.data
, k
->salt
->salt
.length
);
280 fix_salt(context
, entry
, k
);
283 * Whatever this "version" might be, we skip it
285 * XXX A krb5.conf parameter requesting that we log
286 * about strangeness like this, or return an error
287 * from here, might be nice.
289 krb5_storage_seek(sp
, u16
, SEEK_CUR
);
301 static krb5_error_code
302 add_1des_dup(krb5_context context
, Keys
*keys
, Key
*key
, krb5_keytype keytype
)
304 key
->key
.keytype
= keytype
;
305 return add_Keys(keys
, key
);
309 * This monstrosity is here so we can avoid having to do enctype
310 * similarity checking in the KDC. This helper function dups 1DES keys
311 * in a keyset for all the similar 1DES enctypes for which keys are
312 * missing. And, of course, we do this only if there's any 1DES keys in
313 * the keyset to begin with.
315 static krb5_error_code
316 dup_similar_keys_in_keyset(krb5_context context
, Keys
*keys
)
321 int keyset_has_1des_crc
= 0;
322 int keyset_has_1des_md4
= 0;
323 int keyset_has_1des_md5
= 0;
325 memset(&key
, 0, sizeof (key
));
327 for (i
= 0; i
< keys
->len
; i
++) {
328 if (keys
->val
[i
].key
.keytype
== ETYPE_DES_CBC_CRC
) {
329 keyset_has_1des_crc
= 1;
332 } else if (keys
->val
[i
].key
.keytype
== ETYPE_DES_CBC_MD4
) {
333 keyset_has_1des_crc
= 1;
336 } else if (keys
->val
[i
].key
.keytype
== ETYPE_DES_CBC_MD5
) {
337 keyset_has_1des_crc
= 1;
345 ret
= copy_Key(&keys
->val
[k
], &key
);
348 if (!keyset_has_1des_crc
) {
349 ret
= add_1des_dup(context
, keys
, &key
, ETYPE_DES_CBC_CRC
);
353 if (!keyset_has_1des_md4
) {
354 ret
= add_1des_dup(context
, keys
, &key
, ETYPE_DES_CBC_MD4
);
358 if (!keyset_has_1des_md5
) {
359 ret
= add_1des_dup(context
, keys
, &key
, ETYPE_DES_CBC_MD5
);
370 static krb5_error_code
371 dup_similar_keys(krb5_context context
, hdb_entry
*entry
)
374 HDB_Ext_KeySet
*hist_keys
;
378 ret
= dup_similar_keys_in_keyset(context
, &entry
->keys
);
381 extp
= hdb_find_extension(entry
, choice_HDB_extension_data_hist_keys
);
385 hist_keys
= &extp
->data
.u
.hist_keys
;
386 for (i
= 0; i
< hist_keys
->len
; i
++) {
387 ret
= dup_similar_keys_in_keyset(context
, &hist_keys
->val
[i
].keys
);
396 * This function parses an MIT krb5 encoded KDB entry and fills in the
397 * given HDB entry with it.
399 * @param context krb5_context
400 * @param data Encoded MIT KDB entry
401 * @param target_kvno Desired kvno, or 0 for the entry's current kvno
402 * @param entry Desired kvno, or 0 for the entry's current kvno
405 _hdb_mdb_value2entry(krb5_context context
, krb5_data
*data
,
406 krb5_kvno target_kvno
, hdb_entry
*entry
)
413 uint16_t u16
, num_keys
, num_tl
;
418 memset(&k
, 0, sizeof (k
));
419 memset(entry
, 0, sizeof(*entry
));
421 sp
= krb5_storage_from_data(data
);
423 krb5_set_error_message(context
, ENOMEM
, "out of memory");
427 krb5_storage_set_byteorder(sp
, KRB5_STORAGE_BYTEORDER_LE
);
432 * The story here is that these 16 bits have to be a constant:
433 * KDB_V1_BASE_LENGTH. Once upon a time a different value here
434 * would have been used to indicate the presence of "extra data"
435 * between the "base" contents and the {principal name, TL data,
436 * keys} that follow it. Nothing supports such "extra data"
437 * nowadays, so neither do we here.
439 * XXX But... surely we ought to log about this extra data, or skip
440 * it, or something, in case anyone has MIT KDBs with ancient
441 * entries in them... Logging would allow the admin to know which
442 * entries to dump with MIT krb5's kdb5_util. But logging would be
443 * noisy. For now we do nothing.
445 CHECK(ret
= krb5_ret_uint16(sp
, &u16
));
446 if (u16
!= KDB_V1_BASE_LENGTH
) { ret
= EINVAL
; goto out
; }
448 CHECK(ret
= krb5_ret_uint32(sp
, &u32
));
449 attr_to_flags(u32
, &entry
->flags
);
452 CHECK(ret
= krb5_ret_uint32(sp
, &u32
));
454 entry
->max_life
= malloc(sizeof(*entry
->max_life
));
455 *entry
->max_life
= u32
;
457 /* 32: max renewable time */
458 CHECK(ret
= krb5_ret_uint32(sp
, &u32
));
460 entry
->max_renew
= malloc(sizeof(*entry
->max_renew
));
461 *entry
->max_renew
= u32
;
463 /* 32: client expire */
464 CHECK(ret
= krb5_ret_uint32(sp
, &u32
));
466 entry
->valid_end
= malloc(sizeof(*entry
->valid_end
));
467 *entry
->valid_end
= u32
;
469 /* 32: passwd expire */
470 CHECK(ret
= krb5_ret_uint32(sp
, &u32
));
472 entry
->pw_end
= malloc(sizeof(*entry
->pw_end
));
473 *entry
->pw_end
= u32
;
475 /* 32: last successful passwd */
476 CHECK(ret
= krb5_ret_uint32(sp
, &u32
));
477 /* 32: last failed attempt */
478 CHECK(ret
= krb5_ret_uint32(sp
, &u32
));
479 /* 32: num of failed attempts */
480 CHECK(ret
= krb5_ret_uint32(sp
, &u32
));
481 /* 16: num tl data */
482 CHECK(ret
= krb5_ret_uint16(sp
, &u16
));
484 /* 16: num key data */
485 CHECK(ret
= krb5_ret_uint16(sp
, &u16
));
487 /* 16: principal length */
488 CHECK(ret
= krb5_ret_uint16(sp
, &u16
));
489 /* length: principal */
492 * Note that the principal name includes the NUL in the entry,
493 * but we don't want to take chances, so we add an extra NUL.
500 sz
= krb5_storage_read(sp
, p
, u16
);
502 ret
= EINVAL
; /* XXX */
506 CHECK(ret
= krb5_parse_name(context
, p
, &entry
->principal
));
509 /* for num tl data times
513 #define mit_KRB5_TL_LAST_PWD_CHANGE 1
514 #define mit_KRB5_TL_MOD_PRINC 2
515 for (i
= 0; i
< num_tl
; i
++) {
517 krb5_principal modby
;
518 /* 16: TL data type */
519 CHECK(ret
= krb5_ret_uint16(sp
, &u16
));
521 /* 16: TL data length */
522 CHECK(ret
= krb5_ret_uint16(sp
, &u16
));
524 * For rollback to MIT purposes we really must understand some
527 * XXX Move all this to separate functions, one per-TL type.
530 case mit_KRB5_TL_LAST_PWD_CHANGE
:
531 CHECK(ret
= krb5_ret_uint32(sp
, &u32
));
532 CHECK(ret
= hdb_entry_set_pw_change_time(context
, entry
, u32
));
534 case mit_KRB5_TL_MOD_PRINC
:
536 ret
= EINVAL
; /* XXX */
539 CHECK(ret
= krb5_ret_uint32(sp
, &u32
)); /* mod time */
540 p
= malloc(u16
- 4 + 1);
546 sz
= krb5_storage_read(sp
, p
, u16
- 4);
548 ret
= EINVAL
; /* XXX */
551 CHECK(ret
= krb5_parse_name(context
, p
, &modby
));
552 ret
= hdb_set_last_modified_by(context
, entry
, modby
, u32
);
553 krb5_free_principal(context
, modby
);
557 krb5_storage_seek(sp
, u16
, SEEK_CUR
);
562 * for num key data times
570 * "version" here is really 1 or 2, the first meaning there's only
571 * keys for this kvno, the second meaning there's keys and salt[s?].
572 * That's right... hold that gag reflex, you can do it.
574 for (i
= 0; i
< num_keys
; i
++) {
577 CHECK(ret
= krb5_ret_uint16(sp
, &u16
));
579 CHECK(ret
= krb5_ret_uint16(sp
, &u16
));
582 ret
= mdb_keyvalue2key(context
, entry
, sp
, version
, &k
);
585 if (k
.key
.keytype
== 0 || k
.key
.keyvalue
.length
== 0) {
587 * Older MIT KDBs may have enctype 0 / length 0 keys. We
594 if ((target_kvno
== 0 && entry
->kvno
< key_kvno
) ||
595 (target_kvno
== key_kvno
&& entry
->kvno
!= target_kvno
)) {
597 * MIT's KDB doesn't keep track of kvno. The highest kvno
598 * is the current kvno, and we just found a new highest
599 * kvno or the desired kvno.
601 * Note that there's no guarantee of any key ordering, but
602 * generally MIT KDB entries have keys in strictly
603 * descending kvno order.
605 * XXX We do assume that keys are clustered by kvno. If
606 * not, then bad. It might be possible to construct
607 * non-clustered keys via the kadm5 API. It wouldn't be
608 * hard to cope with this, since if it happens the worst
609 * that will happen is that some of the current keys can be
610 * found in the history extension, and we could just pull
611 * them back out in that case.
613 ret
= hdb_add_current_keys_to_history(context
, entry
);
616 free_Keys(&entry
->keys
);
617 ret
= add_Keys(&entry
->keys
, &k
);
621 entry
->kvno
= key_kvno
;
625 if (entry
->kvno
== key_kvno
) {
627 * Note that if key_kvno == 0 and target_kvno == 0 then we
628 * end up adding those keys here. Yeah, kvno 0 is very
629 * special for us, but just in case, we keep such keys.
631 ret
= add_Keys(&entry
->keys
, &k
);
635 entry
->kvno
= key_kvno
;
637 ret
= hdb_add_history_key(context
, entry
, key_kvno
, &k
);
644 if (target_kvno
!= 0 && entry
->kvno
!= target_kvno
) {
645 ret
= HDB_ERR_KVNO_NOT_FOUND
;
649 krb5_storage_free(sp
);
651 return dup_similar_keys(context
, entry
);
654 krb5_storage_free(sp
);
656 if (ret
== HEIM_ERR_EOF
)
657 /* Better error code than "end of file" */
658 ret
= HEIM_ERR_BAD_HDBENT_ENCODING
;
659 free_hdb_entry(entry
);
665 static krb5_error_code
666 mdb_entry2value(krb5_context context
, hdb_entry
*entry
, krb5_data
*data
)
674 #if defined(HAVE_DB_185_H)
676 #elif defined(HAVE_DB_H)
681 static krb5_error_code
682 mdb_close(krb5_context context
, HDB
*db
)
684 DB
*d
= (DB
*)db
->hdb_db
;
689 static krb5_error_code
690 mdb_destroy(krb5_context context
, HDB
*db
)
694 ret
= hdb_clear_master_key (context
, db
);
700 static krb5_error_code
701 mdb_lock(krb5_context context
, HDB
*db
, int operation
)
703 DB
*d
= (DB
*)db
->hdb_db
;
704 int fd
= (*d
->fd
)(d
);
707 if (db
->lock_count
> 1) {
709 if (db
->lock_type
== HDB_WLOCK
|| db
->lock_count
== operation
)
714 krb5_set_error_message(context
, HDB_ERR_CANT_LOCK_DB
,
715 "Can't lock database: %s", db
->hdb_name
);
716 return HDB_ERR_CANT_LOCK_DB
;
718 ret
= hdb_lock(fd
, operation
);
725 static krb5_error_code
726 mdb_unlock(krb5_context context
, HDB
*db
)
728 DB
*d
= (DB
*)db
->hdb_db
;
729 int fd
= (*d
->fd
)(d
);
731 if (db
->lock_count
> 1) {
735 heim_assert(db
->lock_count
== 1, "HDB lock/unlock sequence does not match");
739 krb5_set_error_message(context
, HDB_ERR_CANT_LOCK_DB
,
740 "Can't unlock database: %s", db
->hdb_name
);
741 return HDB_ERR_CANT_LOCK_DB
;
743 return hdb_unlock(fd
);
747 static krb5_error_code
748 mdb_seq(krb5_context context
, HDB
*db
,
749 unsigned flags
, hdb_entry_ex
*entry
, int flag
)
751 DB
*d
= (DB
*)db
->hdb_db
;
753 krb5_data key_data
, data
;
756 code
= db
->hdb_lock(context
, db
, HDB_RLOCK
);
758 krb5_set_error_message(context
, HDB_ERR_DB_INUSE
, "Database %s in use", db
->hdb_name
);
759 return HDB_ERR_DB_INUSE
;
761 code
= (*d
->seq
)(d
, &key
, &value
, flag
);
762 db
->hdb_unlock(context
, db
); /* XXX check value */
765 krb5_set_error_message(context
, code
, "Database %s seq error: %s",
766 db
->hdb_name
, strerror(code
));
770 krb5_clear_error_message(context
);
771 return HDB_ERR_NOENTRY
;
774 key_data
.data
= key
.data
;
775 key_data
.length
= key
.size
;
776 data
.data
= value
.data
;
777 data
.length
= value
.size
;
778 memset(entry
, 0, sizeof(*entry
));
780 if (_hdb_mdb_value2entry(context
, &data
, 0, &entry
->entry
))
781 return mdb_seq(context
, db
, flags
, entry
, R_NEXT
);
783 if (db
->hdb_master_key_set
&& (flags
& HDB_F_DECRYPT
)) {
784 code
= hdb_unseal_keys (context
, db
, &entry
->entry
);
786 hdb_free_entry (context
, entry
);
793 static krb5_error_code
794 mdb_firstkey(krb5_context context
, HDB
*db
, unsigned flags
, hdb_entry_ex
*entry
)
796 return mdb_seq(context
, db
, flags
, entry
, R_FIRST
);
800 static krb5_error_code
801 mdb_nextkey(krb5_context context
, HDB
*db
, unsigned flags
, hdb_entry_ex
*entry
)
803 return mdb_seq(context
, db
, flags
, entry
, R_NEXT
);
806 static krb5_error_code
807 mdb_rename(krb5_context context
, HDB
*db
, const char *new_name
)
813 if (asprintf(&old
, "%s.db", db
->hdb_name
) < 0)
815 if (asprintf(&new, "%s.db", new_name
) < 0)
817 ret
= rename(old
, new);
822 db
->hdb_name
= strdup(new_name
);
831 static krb5_error_code
832 mdb__get(krb5_context context
, HDB
*db
, krb5_data key
, krb5_data
*reply
)
834 DB
*d
= (DB
*)db
->hdb_db
;
840 code
= db
->hdb_lock(context
, db
, HDB_RLOCK
);
843 code
= (*d
->get
)(d
, &k
, &v
, 0);
844 db
->hdb_unlock(context
, db
);
847 krb5_set_error_message(context
, code
, "Database %s get error: %s",
848 db
->hdb_name
, strerror(code
));
852 krb5_clear_error_message(context
);
853 return HDB_ERR_NOENTRY
;
856 krb5_data_copy(reply
, v
.data
, v
.size
);
860 static krb5_error_code
861 mdb__put(krb5_context context
, HDB
*db
, int replace
,
862 krb5_data key
, krb5_data value
)
864 DB
*d
= (DB
*)db
->hdb_db
;
871 v
.size
= value
.length
;
872 code
= db
->hdb_lock(context
, db
, HDB_WLOCK
);
875 code
= (*d
->put
)(d
, &k
, &v
, replace
? 0 : R_NOOVERWRITE
);
876 db
->hdb_unlock(context
, db
);
879 krb5_set_error_message(context
, code
, "Database %s put error: %s",
880 db
->hdb_name
, strerror(code
));
884 krb5_clear_error_message(context
);
885 return HDB_ERR_EXISTS
;
890 static krb5_error_code
891 mdb__del(krb5_context context
, HDB
*db
, krb5_data key
)
893 DB
*d
= (DB
*)db
->hdb_db
;
895 krb5_error_code code
;
898 code
= db
->hdb_lock(context
, db
, HDB_WLOCK
);
901 code
= (*d
->del
)(d
, &k
, 0);
902 db
->hdb_unlock(context
, db
);
905 krb5_set_error_message(context
, code
, "Database %s put error: %s",
906 db
->hdb_name
, strerror(code
));
914 static krb5_error_code
915 mdb_fetch_kvno(krb5_context context
, HDB
*db
, krb5_const_principal principal
,
916 unsigned flags
, krb5_kvno kvno
, hdb_entry_ex
*entry
)
918 krb5_data key
, value
;
921 ret
= mdb_principal2key(context
, principal
, &key
);
924 ret
= db
->hdb__get(context
, db
, key
, &value
);
925 krb5_data_free(&key
);
928 ret
= _hdb_mdb_value2entry(context
, &value
, kvno
, &entry
->entry
);
929 krb5_data_free(&value
);
933 if (db
->hdb_master_key_set
&& (flags
& HDB_F_DECRYPT
)) {
934 ret
= hdb_unseal_keys (context
, db
, &entry
->entry
);
936 hdb_free_entry(context
, entry
);
944 static krb5_error_code
945 mdb_store(krb5_context context
, HDB
*db
, unsigned flags
, hdb_entry_ex
*entry
)
948 krb5_storage
*sp
= NULL
;
949 krb5_storage
*spent
= NULL
;
950 krb5_data line
= { 0, 0 };
951 krb5_data kdb_ent
= { 0, 0 };
952 krb5_data key
= { 0, 0 };
955 sp
= krb5_storage_emem();
956 if (!sp
) return ENOMEM
;
957 ret
= _hdb_set_master_key_usage(context
, db
, 0); /* MIT KDB uses KU 0 */
958 ret
= hdb_seal_keys(context
, db
, &entry
->entry
);
960 ret
= entry2mit_string_int(context
, sp
, &entry
->entry
);
962 sz
= krb5_storage_write(sp
, "\n", 2); /* NUL-terminate */
964 if (sz
== -1) goto out
;
965 ret
= krb5_storage_to_data(sp
, &line
);
969 spent
= krb5_storage_emem();
970 if (!spent
) goto out
;
971 ret
= _hdb_mit_dump2mitdb_entry(context
, line
.data
, spent
);
973 ret
= krb5_storage_to_data(spent
, &kdb_ent
);
975 ret
= mdb_principal2key(context
, entry
->entry
.principal
, &key
);
977 ret
= mdb__put(context
, db
, 1, key
, kdb_ent
);
981 krb5_storage_free(sp
);
983 krb5_storage_free(spent
);
984 krb5_data_free(&line
);
985 krb5_data_free(&kdb_ent
);
986 krb5_data_free(&key
);
991 static krb5_error_code
992 mdb_remove(krb5_context context
, HDB
*db
, krb5_const_principal principal
)
994 krb5_error_code code
;
997 mdb_principal2key(context
, principal
, &key
);
998 code
= db
->hdb__del(context
, db
, key
);
999 krb5_data_free(&key
);
1003 static krb5_error_code
1004 mdb_open(krb5_context context
, HDB
*db
, int flags
, mode_t mode
)
1008 krb5_error_code ret
;
1011 if (asprintf(&fn
, "%s.db", db
->hdb_name
) < 0) {
1012 krb5_set_error_message(context
, ENOMEM
, "malloc: out of memory");
1016 if (stat(fn
, &st
) == 0)
1019 actual_fn
= db
->hdb_name
;
1020 db
->hdb_db
= dbopen(actual_fn
, flags
, mode
, DB_BTREE
, NULL
);
1021 if (db
->hdb_db
== NULL
) {
1027 db
->hdb_db
= dbopen(actual_fn
, flags
, mode
, DB_HASH
, NULL
);
1032 if (db
->hdb_db
== NULL
) {
1034 krb5_set_error_message(context
, ret
, "dbopen (%s): %s",
1035 db
->hdb_name
, strerror(ret
));
1040 * Don't do this -- MIT won't be able to handle the
1041 * HDB_DB_FORMAT_ENTRY key.
1043 if ((flags
& O_ACCMODE
) != O_RDONLY
)
1044 ret
= hdb_init_db(context
, db
);
1046 ret
= hdb_check_db_format(context
, db
);
1047 if (ret
== HDB_ERR_NOENTRY
) {
1048 krb5_clear_error_message(context
);
1052 mdb_close(context
, db
);
1053 krb5_set_error_message(context
, ret
, "hdb_open: failed %s database %s",
1054 (flags
& O_ACCMODE
) == O_RDONLY
?
1055 "checking format of" : "initialize",
1062 hdb_mitdb_create(krb5_context context
, HDB
**db
,
1063 const char *filename
)
1065 *db
= calloc(1, sizeof(**db
));
1067 krb5_set_error_message(context
, ENOMEM
, "malloc: out of memory");
1071 (*db
)->hdb_db
= NULL
;
1072 (*db
)->hdb_name
= strdup(filename
);
1073 if ((*db
)->hdb_name
== NULL
) {
1076 krb5_set_error_message(context
, ENOMEM
, "malloc: out of memory");
1079 (*db
)->hdb_master_key_set
= 0;
1080 (*db
)->hdb_openp
= 0;
1081 (*db
)->hdb_capability_flags
= 0;
1082 (*db
)->hdb_open
= mdb_open
;
1083 (*db
)->hdb_close
= mdb_close
;
1084 (*db
)->hdb_fetch_kvno
= mdb_fetch_kvno
;
1085 (*db
)->hdb_store
= mdb_store
;
1086 (*db
)->hdb_remove
= mdb_remove
;
1087 (*db
)->hdb_firstkey
= mdb_firstkey
;
1088 (*db
)->hdb_nextkey
= mdb_nextkey
;
1089 (*db
)->hdb_lock
= mdb_lock
;
1090 (*db
)->hdb_unlock
= mdb_unlock
;
1091 (*db
)->hdb_rename
= mdb_rename
;
1092 (*db
)->hdb__get
= mdb__get
;
1093 (*db
)->hdb__put
= mdb__put
;
1094 (*db
)->hdb__del
= mdb__del
;
1095 (*db
)->hdb_destroy
= mdb_destroy
;
1099 #endif /* HAVE_DB1 */
1102 can have any number of princ stanzas.
1103 format is as follows (only \n indicates newlines)
1104 princ\t%d\t (%d is KRB5_KDB_V1_BASE_LENGTH, always 38)
1105 %d\t (strlen of principal e.g. shadow/foo@ANDREW.CMU.EDU)
1106 %d\t (number of tl_data)
1107 %d\t (number of key data, e.g. how many keys for this user)
1108 %d\t (extra data length)
1109 %s\t (principal name)
1111 %d\t (max lifetime, seconds)
1112 %d\t (max renewable life, seconds)
1113 %d\t (expiration, seconds since epoch or 2145830400 for never)
1114 %d\t (password expiration, seconds, 0 for never)
1115 %d\t (last successful auth, seconds since epoch)
1116 %d\t (last failed auth, per above)
1117 %d\t (failed auth count)
1118 foreach tl_data 0 to number of tl_data - 1 as above
1119 %d\t%d\t (data type, data length)
1120 foreach tl_data 0 to length-1
1121 %02x (tl data contents[element n])
1122 except if tl_data length is 0
1125 foreach key 0 to number of keys - 1 as above
1126 %d\t%d\t (key data version, kvno)
1127 foreach version 0 to key data version - 1 (a key or a salt)
1128 %d\t%d\t(data type for this key, data length for this key)
1129 foreach key data length 0 to length-1
1130 %02x (key data contents[element n])
1131 except if key_data length is 0
1134 foreach extra data length 0 to length - 1
1135 %02x (extra data part)
1136 unless no extra data
1143 /* Why ever did we loop? */
1149 q
= strsep(p
, " \t");
1150 } while(q
&& *q
== '\0');
1156 nexttoken(char **p
, size_t len
, const char *what
)
1165 /* Must be followed by a delimiter (right?) */
1166 if (strsep(p
, " \t") != q
+ len
) {
1167 warnx("No tokens left in dump entry while looking for %s", what
);
1171 warnx("Empty last token in dump entry while looking for %s", what
);
1176 getdata(char **p
, unsigned char *buf
, size_t len
, const char *what
)
1180 char *q
= nexttoken(p
, 0, what
);
1182 warnx("Failed to find hex-encoded binary data (%s) in dump", what
);
1184 while(*q
&& i
< len
) {
1185 if(sscanf(q
, "%02x", &v
) != 1)
1194 getint(char **p
, const char *what
)
1197 char *q
= nexttoken(p
, 0, what
);
1199 warnx("Failed to find a signed integer (%s) in dump", what
);
1202 sscanf(q
, "%d", &val
);
1207 getuint(char **p
, const char *what
)
1210 char *q
= nexttoken(p
, 0, what
);
1212 warnx("Failed to find an unsigned integer (%s) in dump", what
);
1215 sscanf(q
, "%u", &val
);
1219 #define KRB5_KDB_SALTTYPE_NORMAL 0
1220 #define KRB5_KDB_SALTTYPE_V4 1
1221 #define KRB5_KDB_SALTTYPE_NOREALM 2
1222 #define KRB5_KDB_SALTTYPE_ONLYREALM 3
1223 #define KRB5_KDB_SALTTYPE_SPECIAL 4
1224 #define KRB5_KDB_SALTTYPE_AFS3 5
1226 #define CHECK_UINT(num) \
1227 if ((num) < 0 || (num) > INT_MAX) return EINVAL
1228 #define CHECK_UINT16(num) \
1229 if ((num) < 0 || (num) > 1<<15) return EINVAL
1230 #define CHECK_NUM(num, maxv) \
1231 if ((num) > (maxv)) return EINVAL
1234 * This utility function converts an MIT dump entry to an MIT on-disk
1235 * encoded entry, which can then be decoded with _hdb_mdb_value2entry().
1236 * This allows us to have a single decoding function (_hdb_mdb_value2entry),
1237 * which makes the code cleaner (less code duplication), if a bit less
1238 * efficient. It also will allow us to have a function to dump an HDB
1239 * entry in MIT format so we can dump HDB into MIT format for rollback
1240 * purposes. And that will allow us to write to MIT KDBs, again
1241 * somewhat inefficiently, also for migration/rollback purposes.
1244 _hdb_mit_dump2mitdb_entry(krb5_context context
, char *line
, krb5_storage
*sp
)
1246 krb5_error_code ret
= EINVAL
;
1252 unsigned int num_tl_data
;
1253 size_t num_key_data
;
1254 unsigned int attributes
;
1257 krb5_storage_set_byteorder(sp
, KRB5_STORAGE_BYTEORDER_LE
);
1259 q
= nexttoken(&p
, 0, "record type (princ or policy)");
1260 if (strcmp(q
, "kdb5_util") == 0 || strcmp(q
, "policy") == 0 ||
1261 strcmp(q
, "princ") != 0) {
1262 warnx("Supposed MIT dump entry does not start with 'kdb5_util', "
1263 "'policy', nor 'princ'");
1266 if (getint(&p
, "constant '38'") != 38) {
1267 warnx("Dump entry does not start with '38<TAB>'");
1270 #define KDB_V1_BASE_LENGTH 38
1271 ret
= krb5_store_int16(sp
, KDB_V1_BASE_LENGTH
);
1272 if (ret
) return ret
;
1274 princ_len
= getuint(&p
, "principal name length");
1275 if (princ_len
> (1<<15) - 1) {
1276 warnx("Principal name in dump entry too long (%llu)",
1277 (unsigned long long)princ_len
);
1280 num_tl_data
= getuint(&p
, "number of TL data");
1281 num_key_data
= getuint(&p
, "number of key data");
1282 getint(&p
, "5th field, length of 'extra data'");
1283 princ
= nexttoken(&p
, (int)princ_len
, "principal name");
1284 if (princ
== NULL
) {
1285 warnx("Failed to read principal name (expected length %llu)",
1286 (unsigned long long)princ_len
);
1290 attributes
= getuint(&p
, "attributes");
1291 ret
= krb5_store_uint32(sp
, attributes
);
1292 if (ret
) return ret
;
1294 tmp
= getint(&p
, "max life");
1296 ret
= krb5_store_uint32(sp
, tmp
);
1297 if (ret
) return ret
;
1299 tmp
= getint(&p
, "max renewable life");
1301 ret
= krb5_store_uint32(sp
, tmp
);
1302 if (ret
) return ret
;
1304 tmp
= getint(&p
, "expiration");
1306 ret
= krb5_store_uint32(sp
, tmp
);
1307 if (ret
) return ret
;
1309 tmp
= getint(&p
, "pw expiration");
1311 ret
= krb5_store_uint32(sp
, tmp
);
1312 if (ret
) return ret
;
1314 tmp
= getint(&p
, "last auth");
1316 ret
= krb5_store_uint32(sp
, tmp
);
1317 if (ret
) return ret
;
1319 tmp
= getint(&p
, "last failed auth");
1321 ret
= krb5_store_uint32(sp
, tmp
);
1322 if (ret
) return ret
;
1324 tmp
= getint(&p
,"fail auth count");
1326 ret
= krb5_store_uint32(sp
, tmp
);
1327 if (ret
) return ret
;
1329 /* add TL data count */
1330 CHECK_NUM(num_tl_data
, 1023);
1331 ret
= krb5_store_uint16(sp
, num_tl_data
);
1332 if (ret
) return ret
;
1335 CHECK_NUM(num_key_data
, 1023);
1336 ret
= krb5_store_uint16(sp
, num_key_data
);
1337 if (ret
) return ret
;
1339 /* add principal unparsed name length and unparsed name */
1340 princ_len
= strlen(princ
);
1341 princ_len
++; /* must count and write the NUL in the on-disk encoding */
1342 ret
= krb5_store_uint16(sp
, princ_len
);
1343 if (ret
) return ret
;
1344 sz
= krb5_storage_write(sp
, princ
, princ_len
);
1345 if (sz
== -1) return ENOMEM
;
1347 /* scan and write TL data */
1348 for (i
= 0; i
< num_tl_data
; i
++) {
1350 int tl_type
, tl_length
;
1353 tl_type
= getint(&p
, "TL data type");
1354 tl_length
= getint(&p
, "data length");
1356 if (asprintf(&reading_what
, "TL data type %d (length %d)",
1357 tl_type
, tl_length
) < 0)
1361 * XXX Leaking reading_what, but only on ENOMEM cases anyways,
1364 CHECK_UINT16(tl_type
);
1365 ret
= krb5_store_uint16(sp
, tl_type
);
1366 if (ret
) return ret
;
1367 CHECK_UINT16(tl_length
);
1368 ret
= krb5_store_uint16(sp
, tl_length
);
1369 if (ret
) return ret
;
1372 buf
= malloc(tl_length
);
1373 if (!buf
) return ENOMEM
;
1374 if (getdata(&p
, buf
, tl_length
, reading_what
) != tl_length
)
1376 sz
= krb5_storage_write(sp
, buf
, tl_length
);
1378 if (sz
== -1) return ENOMEM
;
1380 if (strcmp(nexttoken(&p
, 0, "'-1' field"), "-1") != 0) return EINVAL
;
1385 for (i
= 0; i
< num_key_data
; i
++) {
1393 key_versions
= getint(&p
, "key data 'version'");
1394 CHECK_UINT16(key_versions
);
1395 ret
= krb5_store_int16(sp
, key_versions
);
1396 if (ret
) return ret
;
1398 kvno
= getint(&p
, "kvno");
1400 ret
= krb5_store_int16(sp
, kvno
);
1401 if (ret
) return ret
;
1403 for (k
= 0; k
< key_versions
; k
++) {
1404 keytype
= getint(&p
, "enctype");
1405 CHECK_UINT16(keytype
);
1406 ret
= krb5_store_int16(sp
, keytype
);
1407 if (ret
) return ret
;
1409 keylen
= getint(&p
, "encrypted key length");
1410 CHECK_UINT16(keylen
);
1411 ret
= krb5_store_int16(sp
, keylen
);
1412 if (ret
) return ret
;
1415 buf
= malloc(keylen
);
1416 if (!buf
) return ENOMEM
;
1417 if (getdata(&p
, buf
, keylen
, "key (or salt) data") != keylen
)
1419 sz
= krb5_storage_write(sp
, buf
, keylen
);
1421 if (sz
== -1) return ENOMEM
;
1423 if (strcmp(nexttoken(&p
, 0,
1424 "'-1' zero-length key/salt field"),
1426 warnx("Expected '-1' field because key/salt length is 0");
1433 * The rest is "extra data", but there's never any and we wouldn't
1434 * know what to do with it.
1436 /* nexttoken(&p, 0, "extra data"); */