| 1 | /*
|
|---|
| 2 | * Copyright (c) 1997 - 2007 Kungliga Tekniska Högskolan
|
|---|
| 3 | * (Royal Institute of Technology, Stockholm, Sweden).
|
|---|
| 4 | * All rights reserved.
|
|---|
| 5 | *
|
|---|
| 6 | * Redistribution and use in source and binary forms, with or without
|
|---|
| 7 | * modification, are permitted provided that the following conditions
|
|---|
| 8 | * are met:
|
|---|
| 9 | *
|
|---|
| 10 | * 1. Redistributions of source code must retain the above copyright
|
|---|
| 11 | * notice, this list of conditions and the following disclaimer.
|
|---|
| 12 | *
|
|---|
| 13 | * 2. Redistributions in binary form must reproduce the above copyright
|
|---|
| 14 | * notice, this list of conditions and the following disclaimer in the
|
|---|
| 15 | * documentation and/or other materials provided with the distribution.
|
|---|
| 16 | *
|
|---|
| 17 | * 3. Neither the name of the Institute nor the names of its contributors
|
|---|
| 18 | * may be used to endorse or promote products derived from this software
|
|---|
| 19 | * without specific prior written permission.
|
|---|
| 20 | *
|
|---|
| 21 | * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
|
|---|
| 22 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|---|
| 23 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|---|
| 24 | * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
|
|---|
| 25 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|---|
| 26 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|---|
| 27 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|---|
| 28 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|---|
| 29 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|---|
| 30 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|---|
| 31 | * SUCH DAMAGE.
|
|---|
| 32 | */
|
|---|
| 33 |
|
|---|
| 34 | /* $Id$ */
|
|---|
| 35 |
|
|---|
| 36 | #ifndef __HDB_H__
|
|---|
| 37 | #define __HDB_H__
|
|---|
| 38 |
|
|---|
| 39 | #include <krb5.h>
|
|---|
| 40 |
|
|---|
| 41 | #include <hdb_err.h>
|
|---|
| 42 |
|
|---|
| 43 | #include <heim_asn1.h>
|
|---|
| 44 | #include <hdb_asn1.h>
|
|---|
| 45 |
|
|---|
| 46 | struct hdb_dbinfo;
|
|---|
| 47 |
|
|---|
| 48 | enum hdb_lockop{ HDB_RLOCK, HDB_WLOCK };
|
|---|
| 49 |
|
|---|
| 50 | /* flags for various functions */
|
|---|
| 51 | #define HDB_F_DECRYPT 1 /* decrypt keys */
|
|---|
| 52 | #define HDB_F_REPLACE 2 /* replace entry */
|
|---|
| 53 | #define HDB_F_GET_CLIENT 4 /* fetch client */
|
|---|
| 54 | #define HDB_F_GET_SERVER 8 /* fetch server */
|
|---|
| 55 | #define HDB_F_GET_KRBTGT 16 /* fetch krbtgt */
|
|---|
| 56 | #define HDB_F_GET_ANY 28 /* fetch any of client,server,krbtgt */
|
|---|
| 57 | #define HDB_F_CANON 32 /* want canonicalition */
|
|---|
| 58 | #define HDB_F_ADMIN_DATA 64 /* want data that kdc don't use */
|
|---|
| 59 | #define HDB_F_KVNO_SPECIFIED 128 /* we want a particular KVNO */
|
|---|
| 60 | #define HDB_F_CURRENT_KVNO 256 /* we want the current KVNO */
|
|---|
| 61 | /* 512, 1024, 2048 are reserved for kvno operations that is not part of the 1.5 branch */
|
|---|
| 62 | #define HDB_F_ALL_KVNOS 2048 /* we want all the keys, live or not */
|
|---|
| 63 | #define HDB_F_FOR_AS_REQ 4096 /* fetch is for a AS REQ */
|
|---|
| 64 | #define HDB_F_FOR_TGS_REQ 8192 /* fetch is for a TGS REQ */
|
|---|
| 65 |
|
|---|
| 66 | /* hdb_capability_flags */
|
|---|
| 67 | #define HDB_CAP_F_HANDLE_ENTERPRISE_PRINCIPAL 1
|
|---|
| 68 | #define HDB_CAP_F_HANDLE_PASSWORDS 2
|
|---|
| 69 | #define HDB_CAP_F_PASSWORD_UPDATE_KEYS 4
|
|---|
| 70 |
|
|---|
| 71 | /* auth status values */
|
|---|
| 72 | #define HDB_AUTH_SUCCESS 0
|
|---|
| 73 | #define HDB_AUTH_WRONG_PASSWORD 1
|
|---|
| 74 | #define HDB_AUTH_INVALID_SIGNATURE 2
|
|---|
| 75 |
|
|---|
| 76 | /* key usage for master key */
|
|---|
| 77 | #define HDB_KU_MKEY 0x484442
|
|---|
| 78 |
|
|---|
| 79 | typedef struct hdb_master_key_data *hdb_master_key;
|
|---|
| 80 |
|
|---|
| 81 | /**
|
|---|
| 82 | * hdb_entry_ex is a wrapper structure around the hdb_entry structure
|
|---|
| 83 | * that allows backends to keep a pointer to the backing store, ie in
|
|---|
| 84 | * ->hdb_fetch_kvno(), so that we the kadmin/kpasswd backend gets around to
|
|---|
| 85 | * ->hdb_store(), the backend doesn't need to lookup the entry again.
|
|---|
| 86 | */
|
|---|
| 87 |
|
|---|
| 88 | typedef struct hdb_entry_ex {
|
|---|
| 89 | void *ctx;
|
|---|
| 90 | hdb_entry entry;
|
|---|
| 91 | void (*free_entry)(krb5_context, struct hdb_entry_ex *);
|
|---|
| 92 | } hdb_entry_ex;
|
|---|
| 93 |
|
|---|
| 94 |
|
|---|
| 95 | /**
|
|---|
| 96 | * HDB backend function pointer structure
|
|---|
| 97 | *
|
|---|
| 98 | * The HDB structure is what the KDC and kadmind framework uses to
|
|---|
| 99 | * query the backend database when talking about principals.
|
|---|
| 100 | */
|
|---|
| 101 |
|
|---|
| 102 | typedef struct HDB{
|
|---|
| 103 | void *hdb_db;
|
|---|
| 104 | void *hdb_dbc; /** don't use, only for DB3 */
|
|---|
| 105 | char *hdb_name;
|
|---|
| 106 | int hdb_master_key_set;
|
|---|
| 107 | hdb_master_key hdb_master_key;
|
|---|
| 108 | int hdb_openp;
|
|---|
| 109 | int hdb_capability_flags;
|
|---|
| 110 | /**
|
|---|
| 111 | * Open (or create) the a Kerberos database.
|
|---|
| 112 | *
|
|---|
| 113 | * Open (or create) the a Kerberos database that was resolved with
|
|---|
| 114 | * hdb_create(). The third and fourth flag to the function are the
|
|---|
| 115 | * same as open(), thus passing O_CREAT will create the data base
|
|---|
| 116 | * if it doesn't exists.
|
|---|
| 117 | *
|
|---|
| 118 | * Then done the caller should call hdb_close(), and to release
|
|---|
| 119 | * all resources hdb_destroy().
|
|---|
| 120 | */
|
|---|
| 121 | krb5_error_code (*hdb_open)(krb5_context, struct HDB*, int, mode_t);
|
|---|
| 122 | /**
|
|---|
| 123 | * Close the database for transaction
|
|---|
| 124 | *
|
|---|
| 125 | * Closes the database for further transactions, wont release any
|
|---|
| 126 | * permanant resources. the database can be ->hdb_open-ed again.
|
|---|
| 127 | */
|
|---|
| 128 | krb5_error_code (*hdb_close)(krb5_context, struct HDB*);
|
|---|
| 129 | /**
|
|---|
| 130 | * Free an entry after use.
|
|---|
| 131 | */
|
|---|
| 132 | void (*hdb_free)(krb5_context, struct HDB*, hdb_entry_ex*);
|
|---|
| 133 | /**
|
|---|
| 134 | * Fetch an entry from the backend
|
|---|
| 135 | *
|
|---|
| 136 | * Fetch an entry from the backend, flags are what type of entry
|
|---|
| 137 | * should be fetch: client, server, krbtgt.
|
|---|
| 138 | * knvo (if specified and flags HDB_F_KVNO_SPECIFIED set) is the kvno to get
|
|---|
| 139 | */
|
|---|
| 140 | krb5_error_code (*hdb_fetch_kvno)(krb5_context, struct HDB*,
|
|---|
| 141 | krb5_const_principal, unsigned, krb5_kvno,
|
|---|
| 142 | hdb_entry_ex*);
|
|---|
| 143 | /**
|
|---|
| 144 | * Store an entry to database
|
|---|
| 145 | */
|
|---|
| 146 | krb5_error_code (*hdb_store)(krb5_context, struct HDB*,
|
|---|
| 147 | unsigned, hdb_entry_ex*);
|
|---|
| 148 | /**
|
|---|
| 149 | * Remove an entry from the database.
|
|---|
| 150 | */
|
|---|
| 151 | krb5_error_code (*hdb_remove)(krb5_context, struct HDB*,
|
|---|
| 152 | krb5_const_principal);
|
|---|
| 153 | /**
|
|---|
| 154 | * As part of iteration, fetch one entry
|
|---|
| 155 | */
|
|---|
| 156 | krb5_error_code (*hdb_firstkey)(krb5_context, struct HDB*,
|
|---|
| 157 | unsigned, hdb_entry_ex*);
|
|---|
| 158 | /**
|
|---|
| 159 | * As part of iteration, fetch next entry
|
|---|
| 160 | */
|
|---|
| 161 | krb5_error_code (*hdb_nextkey)(krb5_context, struct HDB*,
|
|---|
| 162 | unsigned, hdb_entry_ex*);
|
|---|
| 163 | /**
|
|---|
| 164 | * Lock database
|
|---|
| 165 | *
|
|---|
| 166 | * A lock can only be held by one consumers. Transaction can still
|
|---|
| 167 | * happen on the database while the lock is held, so the entry is
|
|---|
| 168 | * only useful for syncroning creation of the database and renaming of the database.
|
|---|
| 169 | */
|
|---|
| 170 | krb5_error_code (*hdb_lock)(krb5_context, struct HDB*, int);
|
|---|
| 171 | /**
|
|---|
| 172 | * Unlock database
|
|---|
| 173 | */
|
|---|
| 174 | krb5_error_code (*hdb_unlock)(krb5_context, struct HDB*);
|
|---|
| 175 | /**
|
|---|
| 176 | * Rename the data base.
|
|---|
| 177 | *
|
|---|
| 178 | * Assume that the database is not hdb_open'ed and not locked.
|
|---|
| 179 | */
|
|---|
| 180 | krb5_error_code (*hdb_rename)(krb5_context, struct HDB*, const char*);
|
|---|
| 181 | /**
|
|---|
| 182 | * Get an hdb_entry from a classical DB backend
|
|---|
| 183 | *
|
|---|
| 184 | * If the database is a classical DB (ie BDB, NDBM, GDBM, etc)
|
|---|
| 185 | * backend, this function will take a principal key (krb5_data)
|
|---|
| 186 | * and return all data related to principal in the return
|
|---|
| 187 | * krb5_data. The returned encoded entry is of type hdb_entry or
|
|---|
| 188 | * hdb_entry_alias.
|
|---|
| 189 | */
|
|---|
| 190 | krb5_error_code (*hdb__get)(krb5_context, struct HDB*,
|
|---|
| 191 | krb5_data, krb5_data*);
|
|---|
| 192 | /**
|
|---|
| 193 | * Store an hdb_entry from a classical DB backend
|
|---|
| 194 | *
|
|---|
| 195 | * Same discussion as in @ref HDB::hdb__get
|
|---|
| 196 | */
|
|---|
| 197 | krb5_error_code (*hdb__put)(krb5_context, struct HDB*, int,
|
|---|
| 198 | krb5_data, krb5_data);
|
|---|
| 199 | /**
|
|---|
| 200 | * Delete and hdb_entry from a classical DB backend
|
|---|
| 201 | *
|
|---|
| 202 | * Same discussion as in @ref HDB::hdb__get
|
|---|
| 203 | */
|
|---|
| 204 | krb5_error_code (*hdb__del)(krb5_context, struct HDB*, krb5_data);
|
|---|
| 205 | /**
|
|---|
| 206 | * Destroy the handle to the database.
|
|---|
| 207 | *
|
|---|
| 208 | * Destroy the handle to the database, deallocate all memory and
|
|---|
| 209 | * related resources. Does not remove any permanent data. Its the
|
|---|
| 210 | * logical reverse of hdb_create() function that is the entry
|
|---|
| 211 | * point for the module.
|
|---|
| 212 | */
|
|---|
| 213 | krb5_error_code (*hdb_destroy)(krb5_context, struct HDB*);
|
|---|
| 214 | /**
|
|---|
| 215 | * Get the list of realms this backend handles.
|
|---|
| 216 | * This call is optional to support. The returned realms are used
|
|---|
| 217 | * for announcing the realms over bonjour. Free returned array
|
|---|
| 218 | * with krb5_free_host_realm().
|
|---|
| 219 | */
|
|---|
| 220 | krb5_error_code (*hdb_get_realms)(krb5_context, struct HDB *, krb5_realm **);
|
|---|
| 221 | /**
|
|---|
| 222 | * Change password.
|
|---|
| 223 | *
|
|---|
| 224 | * Will update keys for the entry when given password. The new
|
|---|
| 225 | * keys must be written into the entry and will then later be
|
|---|
| 226 | * ->hdb_store() into the database. The backend will still perform
|
|---|
| 227 | * all other operations, increasing the kvno, and update
|
|---|
| 228 | * modification timestamp.
|
|---|
| 229 | *
|
|---|
| 230 | * The backend needs to call _kadm5_set_keys() and perform password
|
|---|
| 231 | * quality checks.
|
|---|
| 232 | */
|
|---|
| 233 | krb5_error_code (*hdb_password)(krb5_context, struct HDB*, hdb_entry_ex*, const char *, int);
|
|---|
| 234 |
|
|---|
| 235 | /**
|
|---|
| 236 | * Auth feedback
|
|---|
| 237 | *
|
|---|
| 238 | * This is a feedback call that allows backends that provides
|
|---|
| 239 | * lockout functionality to register failure and/or successes.
|
|---|
| 240 | *
|
|---|
| 241 | * In case the entry is locked out, the backend should set the
|
|---|
| 242 | * hdb_entry.flags.locked-out flag.
|
|---|
| 243 | */
|
|---|
| 244 | krb5_error_code (*hdb_auth_status)(krb5_context, struct HDB *, hdb_entry_ex *, int);
|
|---|
| 245 | /**
|
|---|
| 246 | * Check if delegation is allowed.
|
|---|
| 247 | */
|
|---|
| 248 | krb5_error_code (*hdb_check_constrained_delegation)(krb5_context, struct HDB *, hdb_entry_ex *, krb5_const_principal);
|
|---|
| 249 |
|
|---|
| 250 | /**
|
|---|
| 251 | * Check if this name is an alias for the supplied client for PKINIT userPrinicpalName logins
|
|---|
| 252 | */
|
|---|
| 253 | krb5_error_code (*hdb_check_pkinit_ms_upn_match)(krb5_context, struct HDB *, hdb_entry_ex *, krb5_const_principal);
|
|---|
| 254 |
|
|---|
| 255 | /**
|
|---|
| 256 | * Check if s4u2self is allowed from this client to this server
|
|---|
| 257 | */
|
|---|
| 258 | krb5_error_code (*hdb_check_s4u2self)(krb5_context, struct HDB *, hdb_entry_ex *, krb5_const_principal);
|
|---|
| 259 | }HDB;
|
|---|
| 260 |
|
|---|
| 261 | #define HDB_INTERFACE_VERSION 7
|
|---|
| 262 |
|
|---|
| 263 | struct hdb_so_method {
|
|---|
| 264 | int version;
|
|---|
| 265 | const char *prefix;
|
|---|
| 266 | krb5_error_code (*create)(krb5_context, HDB **, const char *filename);
|
|---|
| 267 | };
|
|---|
| 268 |
|
|---|
| 269 | typedef krb5_error_code (*hdb_foreach_func_t)(krb5_context, HDB*,
|
|---|
| 270 | hdb_entry_ex*, void*);
|
|---|
| 271 | extern krb5_kt_ops hdb_kt_ops;
|
|---|
| 272 |
|
|---|
| 273 | struct hdb_method {
|
|---|
| 274 | int interface_version;
|
|---|
| 275 | const char *prefix;
|
|---|
| 276 | krb5_error_code (*create)(krb5_context, HDB **, const char *filename);
|
|---|
| 277 | };
|
|---|
| 278 |
|
|---|
| 279 | extern const int hdb_interface_version;
|
|---|
| 280 |
|
|---|
| 281 | #include <hdb-protos.h>
|
|---|
| 282 |
|
|---|
| 283 | #endif /* __HDB_H__ */
|
|---|