1 | /*
|
---|
2 | * Copyright (c) 1997-2007 Kungliga Tekniska Högskolan
|
---|
3 | * (Royal Institute of Technology, Stockholm, Sweden).
|
---|
4 | * All rights reserved.
|
---|
5 | *
|
---|
6 | * Redistribution and use in source and binary forms, with or without
|
---|
7 | * modification, are permitted provided that the following conditions
|
---|
8 | * are met:
|
---|
9 | *
|
---|
10 | * 1. Redistributions of source code must retain the above copyright
|
---|
11 | * notice, this list of conditions and the following disclaimer.
|
---|
12 | *
|
---|
13 | * 2. Redistributions in binary form must reproduce the above copyright
|
---|
14 | * notice, this list of conditions and the following disclaimer in the
|
---|
15 | * documentation and/or other materials provided with the distribution.
|
---|
16 | *
|
---|
17 | * 3. Neither the name of the Institute nor the names of its contributors
|
---|
18 | * may be used to endorse or promote products derived from this software
|
---|
19 | * without specific prior written permission.
|
---|
20 | *
|
---|
21 | * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
|
---|
22 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
---|
23 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
---|
24 | * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
|
---|
25 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
---|
26 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
---|
27 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
---|
28 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
---|
29 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
---|
30 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
---|
31 | * SUCH DAMAGE.
|
---|
32 | */
|
---|
33 |
|
---|
34 | /**
|
---|
35 | * @page krb5_principal_intro The principal handing functions.
|
---|
36 | *
|
---|
37 | * A Kerberos principal is a email address looking string that
|
---|
38 | * contains to parts separeted by a @. The later part is the kerbero
|
---|
39 | * realm the principal belongs to and the former is a list of 0 or
|
---|
40 | * more components. For example
|
---|
41 | * @verbatim
|
---|
42 | lha@SU.SE
|
---|
43 | host/hummel.it.su.se@SU.SE
|
---|
44 | host/admin@H5L.ORG
|
---|
45 | @endverbatim
|
---|
46 | *
|
---|
47 | * See the library functions here: @ref krb5_principal
|
---|
48 | */
|
---|
49 |
|
---|
50 | #include "krb5_locl.h"
|
---|
51 | #ifdef HAVE_RES_SEARCH
|
---|
52 | #define USE_RESOLVER
|
---|
53 | #endif
|
---|
54 | #ifdef HAVE_ARPA_NAMESER_H
|
---|
55 | #include <arpa/nameser.h>
|
---|
56 | #endif
|
---|
57 | #include <fnmatch.h>
|
---|
58 | #include "resolve.h"
|
---|
59 |
|
---|
60 | #define princ_num_comp(P) ((P)->name.name_string.len)
|
---|
61 | #define princ_type(P) ((P)->name.name_type)
|
---|
62 | #define princ_comp(P) ((P)->name.name_string.val)
|
---|
63 | #define princ_ncomp(P, N) ((P)->name.name_string.val[(N)])
|
---|
64 | #define princ_realm(P) ((P)->realm)
|
---|
65 |
|
---|
66 | /**
|
---|
67 | * Frees a Kerberos principal allocated by the library with
|
---|
68 | * krb5_parse_name(), krb5_make_principal() or any other related
|
---|
69 | * principal functions.
|
---|
70 | *
|
---|
71 | * @param context A Kerberos context.
|
---|
72 | * @param p a principal to free.
|
---|
73 | *
|
---|
74 | * @return An krb5 error code, see krb5_get_error_message().
|
---|
75 | *
|
---|
76 | * @ingroup krb5_principal
|
---|
77 | */
|
---|
78 |
|
---|
79 | KRB5_LIB_FUNCTION void KRB5_LIB_CALL
|
---|
80 | krb5_free_principal(krb5_context context,
|
---|
81 | krb5_principal p)
|
---|
82 | {
|
---|
83 | if(p){
|
---|
84 | free_Principal(p);
|
---|
85 | free(p);
|
---|
86 | }
|
---|
87 | }
|
---|
88 |
|
---|
89 | /**
|
---|
90 | * Set the type of the principal
|
---|
91 | *
|
---|
92 | * @param context A Kerberos context.
|
---|
93 | * @param principal principal to set the type for
|
---|
94 | * @param type the new type
|
---|
95 | *
|
---|
96 | * @return An krb5 error code, see krb5_get_error_message().
|
---|
97 | *
|
---|
98 | * @ingroup krb5_principal
|
---|
99 | */
|
---|
100 |
|
---|
101 | KRB5_LIB_FUNCTION void KRB5_LIB_CALL
|
---|
102 | krb5_principal_set_type(krb5_context context,
|
---|
103 | krb5_principal principal,
|
---|
104 | int type)
|
---|
105 | {
|
---|
106 | princ_type(principal) = type;
|
---|
107 | }
|
---|
108 |
|
---|
109 | /**
|
---|
110 | * Get the type of the principal
|
---|
111 | *
|
---|
112 | * @param context A Kerberos context.
|
---|
113 | * @param principal principal to get the type for
|
---|
114 | *
|
---|
115 | * @return the type of principal
|
---|
116 | *
|
---|
117 | * @ingroup krb5_principal
|
---|
118 | */
|
---|
119 |
|
---|
120 | KRB5_LIB_FUNCTION int KRB5_LIB_CALL
|
---|
121 | krb5_principal_get_type(krb5_context context,
|
---|
122 | krb5_const_principal principal)
|
---|
123 | {
|
---|
124 | return princ_type(principal);
|
---|
125 | }
|
---|
126 |
|
---|
127 | /**
|
---|
128 | * Get the realm of the principal
|
---|
129 | *
|
---|
130 | * @param context A Kerberos context.
|
---|
131 | * @param principal principal to get the realm for
|
---|
132 | *
|
---|
133 | * @return realm of the principal, don't free or use after krb5_principal is freed
|
---|
134 | *
|
---|
135 | * @ingroup krb5_principal
|
---|
136 | */
|
---|
137 |
|
---|
138 | KRB5_LIB_FUNCTION const char* KRB5_LIB_CALL
|
---|
139 | krb5_principal_get_realm(krb5_context context,
|
---|
140 | krb5_const_principal principal)
|
---|
141 | {
|
---|
142 | return princ_realm(principal);
|
---|
143 | }
|
---|
144 |
|
---|
145 | KRB5_LIB_FUNCTION const char* KRB5_LIB_CALL
|
---|
146 | krb5_principal_get_comp_string(krb5_context context,
|
---|
147 | krb5_const_principal principal,
|
---|
148 | unsigned int component)
|
---|
149 | {
|
---|
150 | if(component >= princ_num_comp(principal))
|
---|
151 | return NULL;
|
---|
152 | return princ_ncomp(principal, component);
|
---|
153 | }
|
---|
154 |
|
---|
155 | /**
|
---|
156 | * Get number of component is principal.
|
---|
157 | *
|
---|
158 | * @param context Kerberos 5 context
|
---|
159 | * @param principal principal to query
|
---|
160 | *
|
---|
161 | * @return number of components in string
|
---|
162 | *
|
---|
163 | * @ingroup krb5_principal
|
---|
164 | */
|
---|
165 |
|
---|
166 | KRB5_LIB_FUNCTION unsigned int KRB5_LIB_CALL
|
---|
167 | krb5_principal_get_num_comp(krb5_context context,
|
---|
168 | krb5_const_principal principal)
|
---|
169 | {
|
---|
170 | return princ_num_comp(principal);
|
---|
171 | }
|
---|
172 |
|
---|
173 | /**
|
---|
174 | * Parse a name into a krb5_principal structure, flags controls the behavior.
|
---|
175 | *
|
---|
176 | * @param context Kerberos 5 context
|
---|
177 | * @param name name to parse into a Kerberos principal
|
---|
178 | * @param flags flags to control the behavior
|
---|
179 | * @param principal returned principal, free with krb5_free_principal().
|
---|
180 | *
|
---|
181 | * @return An krb5 error code, see krb5_get_error_message().
|
---|
182 | *
|
---|
183 | * @ingroup krb5_principal
|
---|
184 | */
|
---|
185 |
|
---|
186 | KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
|
---|
187 | krb5_parse_name_flags(krb5_context context,
|
---|
188 | const char *name,
|
---|
189 | int flags,
|
---|
190 | krb5_principal *principal)
|
---|
191 | {
|
---|
192 | krb5_error_code ret;
|
---|
193 | heim_general_string *comp;
|
---|
194 | heim_general_string realm = NULL;
|
---|
195 | int ncomp;
|
---|
196 |
|
---|
197 | const char *p;
|
---|
198 | char *q;
|
---|
199 | char *s;
|
---|
200 | char *start;
|
---|
201 |
|
---|
202 | int n;
|
---|
203 | char c;
|
---|
204 | int got_realm = 0;
|
---|
205 | int first_at = 1;
|
---|
206 | int enterprise = (flags & KRB5_PRINCIPAL_PARSE_ENTERPRISE);
|
---|
207 |
|
---|
208 | *principal = NULL;
|
---|
209 |
|
---|
210 | #define RFLAGS (KRB5_PRINCIPAL_PARSE_NO_REALM|KRB5_PRINCIPAL_PARSE_REQUIRE_REALM)
|
---|
211 |
|
---|
212 | if ((flags & RFLAGS) == RFLAGS) {
|
---|
213 | krb5_set_error_message(context, KRB5_ERR_NO_SERVICE,
|
---|
214 | N_("Can't require both realm and "
|
---|
215 | "no realm at the same time", ""));
|
---|
216 | return KRB5_ERR_NO_SERVICE;
|
---|
217 | }
|
---|
218 | #undef RFLAGS
|
---|
219 |
|
---|
220 | /* count number of component,
|
---|
221 | * enterprise names only have one component
|
---|
222 | */
|
---|
223 | ncomp = 1;
|
---|
224 | if (!enterprise) {
|
---|
225 | for(p = name; *p; p++){
|
---|
226 | if(*p=='\\'){
|
---|
227 | if(!p[1]) {
|
---|
228 | krb5_set_error_message(context, KRB5_PARSE_MALFORMED,
|
---|
229 | N_("trailing \\ in principal name", ""));
|
---|
230 | return KRB5_PARSE_MALFORMED;
|
---|
231 | }
|
---|
232 | p++;
|
---|
233 | } else if(*p == '/')
|
---|
234 | ncomp++;
|
---|
235 | else if(*p == '@')
|
---|
236 | break;
|
---|
237 | }
|
---|
238 | }
|
---|
239 | comp = calloc(ncomp, sizeof(*comp));
|
---|
240 | if (comp == NULL) {
|
---|
241 | krb5_set_error_message(context, ENOMEM,
|
---|
242 | N_("malloc: out of memory", ""));
|
---|
243 | return ENOMEM;
|
---|
244 | }
|
---|
245 |
|
---|
246 | n = 0;
|
---|
247 | p = start = q = s = strdup(name);
|
---|
248 | if (start == NULL) {
|
---|
249 | free (comp);
|
---|
250 | krb5_set_error_message(context, ENOMEM,
|
---|
251 | N_("malloc: out of memory", ""));
|
---|
252 | return ENOMEM;
|
---|
253 | }
|
---|
254 | while(*p){
|
---|
255 | c = *p++;
|
---|
256 | if(c == '\\'){
|
---|
257 | c = *p++;
|
---|
258 | if(c == 'n')
|
---|
259 | c = '\n';
|
---|
260 | else if(c == 't')
|
---|
261 | c = '\t';
|
---|
262 | else if(c == 'b')
|
---|
263 | c = '\b';
|
---|
264 | else if(c == '0')
|
---|
265 | c = '\0';
|
---|
266 | else if(c == '\0') {
|
---|
267 | ret = KRB5_PARSE_MALFORMED;
|
---|
268 | krb5_set_error_message(context, ret,
|
---|
269 | N_("trailing \\ in principal name", ""));
|
---|
270 | goto exit;
|
---|
271 | }
|
---|
272 | }else if(enterprise && first_at) {
|
---|
273 | if (c == '@')
|
---|
274 | first_at = 0;
|
---|
275 | }else if((c == '/' && !enterprise) || c == '@'){
|
---|
276 | if(got_realm){
|
---|
277 | ret = KRB5_PARSE_MALFORMED;
|
---|
278 | krb5_set_error_message(context, ret,
|
---|
279 | N_("part after realm in principal name", ""));
|
---|
280 | goto exit;
|
---|
281 | }else{
|
---|
282 | comp[n] = malloc(q - start + 1);
|
---|
283 | if (comp[n] == NULL) {
|
---|
284 | ret = ENOMEM;
|
---|
285 | krb5_set_error_message(context, ret,
|
---|
286 | N_("malloc: out of memory", ""));
|
---|
287 | goto exit;
|
---|
288 | }
|
---|
289 | memcpy(comp[n], start, q - start);
|
---|
290 | comp[n][q - start] = 0;
|
---|
291 | n++;
|
---|
292 | }
|
---|
293 | if(c == '@')
|
---|
294 | got_realm = 1;
|
---|
295 | start = q;
|
---|
296 | continue;
|
---|
297 | }
|
---|
298 | if(got_realm && (c == '/' || c == '\0')) {
|
---|
299 | ret = KRB5_PARSE_MALFORMED;
|
---|
300 | krb5_set_error_message(context, ret,
|
---|
301 | N_("part after realm in principal name", ""));
|
---|
302 | goto exit;
|
---|
303 | }
|
---|
304 | *q++ = c;
|
---|
305 | }
|
---|
306 | if(got_realm){
|
---|
307 | if (flags & KRB5_PRINCIPAL_PARSE_NO_REALM) {
|
---|
308 | ret = KRB5_PARSE_MALFORMED;
|
---|
309 | krb5_set_error_message(context, ret,
|
---|
310 | N_("realm found in 'short' principal "
|
---|
311 | "expected to be without one", ""));
|
---|
312 | goto exit;
|
---|
313 | }
|
---|
314 | realm = malloc(q - start + 1);
|
---|
315 | if (realm == NULL) {
|
---|
316 | ret = ENOMEM;
|
---|
317 | krb5_set_error_message(context, ret,
|
---|
318 | N_("malloc: out of memory", ""));
|
---|
319 | goto exit;
|
---|
320 | }
|
---|
321 | memcpy(realm, start, q - start);
|
---|
322 | realm[q - start] = 0;
|
---|
323 | }else{
|
---|
324 | if (flags & KRB5_PRINCIPAL_PARSE_REQUIRE_REALM) {
|
---|
325 | ret = KRB5_PARSE_MALFORMED;
|
---|
326 | krb5_set_error_message(context, ret,
|
---|
327 | N_("realm NOT found in principal "
|
---|
328 | "expected to be with one", ""));
|
---|
329 | goto exit;
|
---|
330 | } else if (flags & KRB5_PRINCIPAL_PARSE_NO_REALM) {
|
---|
331 | realm = NULL;
|
---|
332 | } else {
|
---|
333 | ret = krb5_get_default_realm (context, &realm);
|
---|
334 | if (ret)
|
---|
335 | goto exit;
|
---|
336 | }
|
---|
337 |
|
---|
338 | comp[n] = malloc(q - start + 1);
|
---|
339 | if (comp[n] == NULL) {
|
---|
340 | ret = ENOMEM;
|
---|
341 | krb5_set_error_message(context, ret,
|
---|
342 | N_("malloc: out of memory", ""));
|
---|
343 | goto exit;
|
---|
344 | }
|
---|
345 | memcpy(comp[n], start, q - start);
|
---|
346 | comp[n][q - start] = 0;
|
---|
347 | n++;
|
---|
348 | }
|
---|
349 | *principal = malloc(sizeof(**principal));
|
---|
350 | if (*principal == NULL) {
|
---|
351 | ret = ENOMEM;
|
---|
352 | krb5_set_error_message(context, ret,
|
---|
353 | N_("malloc: out of memory", ""));
|
---|
354 | goto exit;
|
---|
355 | }
|
---|
356 | if (enterprise)
|
---|
357 | (*principal)->name.name_type = KRB5_NT_ENTERPRISE_PRINCIPAL;
|
---|
358 | else
|
---|
359 | (*principal)->name.name_type = KRB5_NT_PRINCIPAL;
|
---|
360 | (*principal)->name.name_string.val = comp;
|
---|
361 | princ_num_comp(*principal) = n;
|
---|
362 | (*principal)->realm = realm;
|
---|
363 | free(s);
|
---|
364 | return 0;
|
---|
365 | exit:
|
---|
366 | while(n>0){
|
---|
367 | free(comp[--n]);
|
---|
368 | }
|
---|
369 | free(comp);
|
---|
370 | free(realm);
|
---|
371 | free(s);
|
---|
372 | return ret;
|
---|
373 | }
|
---|
374 |
|
---|
375 | /**
|
---|
376 | * Parse a name into a krb5_principal structure
|
---|
377 | *
|
---|
378 | * @param context Kerberos 5 context
|
---|
379 | * @param name name to parse into a Kerberos principal
|
---|
380 | * @param principal returned principal, free with krb5_free_principal().
|
---|
381 | *
|
---|
382 | * @return An krb5 error code, see krb5_get_error_message().
|
---|
383 | *
|
---|
384 | * @ingroup krb5_principal
|
---|
385 | */
|
---|
386 |
|
---|
387 | KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
|
---|
388 | krb5_parse_name(krb5_context context,
|
---|
389 | const char *name,
|
---|
390 | krb5_principal *principal)
|
---|
391 | {
|
---|
392 | return krb5_parse_name_flags(context, name, 0, principal);
|
---|
393 | }
|
---|
394 |
|
---|
395 | static const char quotable_chars[] = " \n\t\b\\/@";
|
---|
396 | static const char replace_chars[] = " ntb\\/@";
|
---|
397 | static const char nq_chars[] = " \\/@";
|
---|
398 |
|
---|
399 | #define add_char(BASE, INDEX, LEN, C) do { if((INDEX) < (LEN)) (BASE)[(INDEX)++] = (C); }while(0);
|
---|
400 |
|
---|
401 | static size_t
|
---|
402 | quote_string(const char *s, char *out, size_t idx, size_t len, int display)
|
---|
403 | {
|
---|
404 | const char *p, *q;
|
---|
405 | for(p = s; *p && idx < len; p++){
|
---|
406 | q = strchr(quotable_chars, *p);
|
---|
407 | if (q && display) {
|
---|
408 | add_char(out, idx, len, replace_chars[q - quotable_chars]);
|
---|
409 | } else if (q) {
|
---|
410 | add_char(out, idx, len, '\\');
|
---|
411 | add_char(out, idx, len, replace_chars[q - quotable_chars]);
|
---|
412 | }else
|
---|
413 | add_char(out, idx, len, *p);
|
---|
414 | }
|
---|
415 | if(idx < len)
|
---|
416 | out[idx] = '\0';
|
---|
417 | return idx;
|
---|
418 | }
|
---|
419 |
|
---|
420 |
|
---|
421 | static krb5_error_code
|
---|
422 | unparse_name_fixed(krb5_context context,
|
---|
423 | krb5_const_principal principal,
|
---|
424 | char *name,
|
---|
425 | size_t len,
|
---|
426 | int flags)
|
---|
427 | {
|
---|
428 | size_t idx = 0;
|
---|
429 | int i;
|
---|
430 | int short_form = (flags & KRB5_PRINCIPAL_UNPARSE_SHORT) != 0;
|
---|
431 | int no_realm = (flags & KRB5_PRINCIPAL_UNPARSE_NO_REALM) != 0;
|
---|
432 | int display = (flags & KRB5_PRINCIPAL_UNPARSE_DISPLAY) != 0;
|
---|
433 |
|
---|
434 | if (!no_realm && princ_realm(principal) == NULL) {
|
---|
435 | krb5_set_error_message(context, ERANGE,
|
---|
436 | N_("Realm missing from principal, "
|
---|
437 | "can't unparse", ""));
|
---|
438 | return ERANGE;
|
---|
439 | }
|
---|
440 |
|
---|
441 | for(i = 0; i < princ_num_comp(principal); i++){
|
---|
442 | if(i)
|
---|
443 | add_char(name, idx, len, '/');
|
---|
444 | idx = quote_string(princ_ncomp(principal, i), name, idx, len, display);
|
---|
445 | if(idx == len) {
|
---|
446 | krb5_set_error_message(context, ERANGE,
|
---|
447 | N_("Out of space printing principal", ""));
|
---|
448 | return ERANGE;
|
---|
449 | }
|
---|
450 | }
|
---|
451 | /* add realm if different from default realm */
|
---|
452 | if(short_form && !no_realm) {
|
---|
453 | krb5_realm r;
|
---|
454 | krb5_error_code ret;
|
---|
455 | ret = krb5_get_default_realm(context, &r);
|
---|
456 | if(ret)
|
---|
457 | return ret;
|
---|
458 | if(strcmp(princ_realm(principal), r) != 0)
|
---|
459 | short_form = 0;
|
---|
460 | free(r);
|
---|
461 | }
|
---|
462 | if(!short_form && !no_realm) {
|
---|
463 | add_char(name, idx, len, '@');
|
---|
464 | idx = quote_string(princ_realm(principal), name, idx, len, display);
|
---|
465 | if(idx == len) {
|
---|
466 | krb5_set_error_message(context, ERANGE,
|
---|
467 | N_("Out of space printing "
|
---|
468 | "realm of principal", ""));
|
---|
469 | return ERANGE;
|
---|
470 | }
|
---|
471 | }
|
---|
472 | return 0;
|
---|
473 | }
|
---|
474 |
|
---|
475 | /**
|
---|
476 | * Unparse the principal name to a fixed buffer
|
---|
477 | *
|
---|
478 | * @param context A Kerberos context.
|
---|
479 | * @param principal principal to unparse
|
---|
480 | * @param name buffer to write name to
|
---|
481 | * @param len length of buffer
|
---|
482 | *
|
---|
483 | * @return An krb5 error code, see krb5_get_error_message().
|
---|
484 | *
|
---|
485 | * @ingroup krb5_principal
|
---|
486 | */
|
---|
487 |
|
---|
488 | KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
|
---|
489 | krb5_unparse_name_fixed(krb5_context context,
|
---|
490 | krb5_const_principal principal,
|
---|
491 | char *name,
|
---|
492 | size_t len)
|
---|
493 | {
|
---|
494 | return unparse_name_fixed(context, principal, name, len, 0);
|
---|
495 | }
|
---|
496 |
|
---|
497 | /**
|
---|
498 | * Unparse the principal name to a fixed buffer. The realm is skipped
|
---|
499 | * if its a default realm.
|
---|
500 | *
|
---|
501 | * @param context A Kerberos context.
|
---|
502 | * @param principal principal to unparse
|
---|
503 | * @param name buffer to write name to
|
---|
504 | * @param len length of buffer
|
---|
505 | *
|
---|
506 | * @return An krb5 error code, see krb5_get_error_message().
|
---|
507 | *
|
---|
508 | * @ingroup krb5_principal
|
---|
509 | */
|
---|
510 |
|
---|
511 | KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
|
---|
512 | krb5_unparse_name_fixed_short(krb5_context context,
|
---|
513 | krb5_const_principal principal,
|
---|
514 | char *name,
|
---|
515 | size_t len)
|
---|
516 | {
|
---|
517 | return unparse_name_fixed(context, principal, name, len,
|
---|
518 | KRB5_PRINCIPAL_UNPARSE_SHORT);
|
---|
519 | }
|
---|
520 |
|
---|
521 | /**
|
---|
522 | * Unparse the principal name with unparse flags to a fixed buffer.
|
---|
523 | *
|
---|
524 | * @param context A Kerberos context.
|
---|
525 | * @param principal principal to unparse
|
---|
526 | * @param flags unparse flags
|
---|
527 | * @param name buffer to write name to
|
---|
528 | * @param len length of buffer
|
---|
529 | *
|
---|
530 | * @return An krb5 error code, see krb5_get_error_message().
|
---|
531 | *
|
---|
532 | * @ingroup krb5_principal
|
---|
533 | */
|
---|
534 |
|
---|
535 | KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
|
---|
536 | krb5_unparse_name_fixed_flags(krb5_context context,
|
---|
537 | krb5_const_principal principal,
|
---|
538 | int flags,
|
---|
539 | char *name,
|
---|
540 | size_t len)
|
---|
541 | {
|
---|
542 | return unparse_name_fixed(context, principal, name, len, flags);
|
---|
543 | }
|
---|
544 |
|
---|
545 | static krb5_error_code
|
---|
546 | unparse_name(krb5_context context,
|
---|
547 | krb5_const_principal principal,
|
---|
548 | char **name,
|
---|
549 | int flags)
|
---|
550 | {
|
---|
551 | size_t len = 0, plen;
|
---|
552 | int i;
|
---|
553 | krb5_error_code ret;
|
---|
554 | /* count length */
|
---|
555 | if (princ_realm(principal)) {
|
---|
556 | plen = strlen(princ_realm(principal));
|
---|
557 |
|
---|
558 | if(strcspn(princ_realm(principal), quotable_chars) == plen)
|
---|
559 | len += plen;
|
---|
560 | else
|
---|
561 | len += 2*plen;
|
---|
562 | len++; /* '@' */
|
---|
563 | }
|
---|
564 | for(i = 0; i < princ_num_comp(principal); i++){
|
---|
565 | plen = strlen(princ_ncomp(principal, i));
|
---|
566 | if(strcspn(princ_ncomp(principal, i), quotable_chars) == plen)
|
---|
567 | len += plen;
|
---|
568 | else
|
---|
569 | len += 2*plen;
|
---|
570 | len++;
|
---|
571 | }
|
---|
572 | len++; /* '\0' */
|
---|
573 | *name = malloc(len);
|
---|
574 | if(*name == NULL) {
|
---|
575 | krb5_set_error_message(context, ENOMEM,
|
---|
576 | N_("malloc: out of memory", ""));
|
---|
577 | return ENOMEM;
|
---|
578 | }
|
---|
579 | ret = unparse_name_fixed(context, principal, *name, len, flags);
|
---|
580 | if(ret) {
|
---|
581 | free(*name);
|
---|
582 | *name = NULL;
|
---|
583 | }
|
---|
584 | return ret;
|
---|
585 | }
|
---|
586 |
|
---|
587 | /**
|
---|
588 | * Unparse the Kerberos name into a string
|
---|
589 | *
|
---|
590 | * @param context Kerberos 5 context
|
---|
591 | * @param principal principal to query
|
---|
592 | * @param name resulting string, free with krb5_xfree()
|
---|
593 | *
|
---|
594 | * @return An krb5 error code, see krb5_get_error_message().
|
---|
595 | *
|
---|
596 | * @ingroup krb5_principal
|
---|
597 | */
|
---|
598 |
|
---|
599 | KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
|
---|
600 | krb5_unparse_name(krb5_context context,
|
---|
601 | krb5_const_principal principal,
|
---|
602 | char **name)
|
---|
603 | {
|
---|
604 | return unparse_name(context, principal, name, 0);
|
---|
605 | }
|
---|
606 |
|
---|
607 | /**
|
---|
608 | * Unparse the Kerberos name into a string
|
---|
609 | *
|
---|
610 | * @param context Kerberos 5 context
|
---|
611 | * @param principal principal to query
|
---|
612 | * @param flags flag to determine the behavior
|
---|
613 | * @param name resulting string, free with krb5_xfree()
|
---|
614 | *
|
---|
615 | * @return An krb5 error code, see krb5_get_error_message().
|
---|
616 | *
|
---|
617 | * @ingroup krb5_principal
|
---|
618 | */
|
---|
619 |
|
---|
620 | KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
|
---|
621 | krb5_unparse_name_flags(krb5_context context,
|
---|
622 | krb5_const_principal principal,
|
---|
623 | int flags,
|
---|
624 | char **name)
|
---|
625 | {
|
---|
626 | return unparse_name(context, principal, name, flags);
|
---|
627 | }
|
---|
628 |
|
---|
629 | /**
|
---|
630 | * Unparse the principal name to a allocated buffer. The realm is
|
---|
631 | * skipped if its a default realm.
|
---|
632 | *
|
---|
633 | * @param context A Kerberos context.
|
---|
634 | * @param principal principal to unparse
|
---|
635 | * @param name returned buffer, free with krb5_xfree()
|
---|
636 | *
|
---|
637 | * @return An krb5 error code, see krb5_get_error_message().
|
---|
638 | *
|
---|
639 | * @ingroup krb5_principal
|
---|
640 | */
|
---|
641 |
|
---|
642 | KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
|
---|
643 | krb5_unparse_name_short(krb5_context context,
|
---|
644 | krb5_const_principal principal,
|
---|
645 | char **name)
|
---|
646 | {
|
---|
647 | return unparse_name(context, principal, name, KRB5_PRINCIPAL_UNPARSE_SHORT);
|
---|
648 | }
|
---|
649 |
|
---|
650 | /**
|
---|
651 | * Set a new realm for a principal, and as a side-effect free the
|
---|
652 | * previous realm.
|
---|
653 | *
|
---|
654 | * @param context A Kerberos context.
|
---|
655 | * @param principal principal set the realm for
|
---|
656 | * @param realm the new realm to set
|
---|
657 | *
|
---|
658 | * @return An krb5 error code, see krb5_get_error_message().
|
---|
659 | *
|
---|
660 | * @ingroup krb5_principal
|
---|
661 | */
|
---|
662 |
|
---|
663 | KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
|
---|
664 | krb5_principal_set_realm(krb5_context context,
|
---|
665 | krb5_principal principal,
|
---|
666 | krb5_const_realm realm)
|
---|
667 | {
|
---|
668 | if (princ_realm(principal))
|
---|
669 | free(princ_realm(principal));
|
---|
670 |
|
---|
671 | princ_realm(principal) = strdup(realm);
|
---|
672 | if (princ_realm(principal) == NULL) {
|
---|
673 | krb5_set_error_message(context, ENOMEM,
|
---|
674 | N_("malloc: out of memory", ""));
|
---|
675 | return ENOMEM;
|
---|
676 | }
|
---|
677 | return 0;
|
---|
678 | }
|
---|
679 |
|
---|
680 | #ifndef HEIMDAL_SMALLER
|
---|
681 | /**
|
---|
682 | * Build a principal using vararg style building
|
---|
683 | *
|
---|
684 | * @param context A Kerberos context.
|
---|
685 | * @param principal returned principal
|
---|
686 | * @param rlen length of realm
|
---|
687 | * @param realm realm name
|
---|
688 | * @param ... a list of components ended with NULL.
|
---|
689 | *
|
---|
690 | * @return An krb5 error code, see krb5_get_error_message().
|
---|
691 | *
|
---|
692 | * @ingroup krb5_principal
|
---|
693 | */
|
---|
694 |
|
---|
695 | KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
|
---|
696 | krb5_build_principal(krb5_context context,
|
---|
697 | krb5_principal *principal,
|
---|
698 | int rlen,
|
---|
699 | krb5_const_realm realm,
|
---|
700 | ...)
|
---|
701 | {
|
---|
702 | krb5_error_code ret;
|
---|
703 | va_list ap;
|
---|
704 | va_start(ap, realm);
|
---|
705 | ret = krb5_build_principal_va(context, principal, rlen, realm, ap);
|
---|
706 | va_end(ap);
|
---|
707 | return ret;
|
---|
708 | }
|
---|
709 | #endif
|
---|
710 |
|
---|
711 | /**
|
---|
712 | * Build a principal using vararg style building
|
---|
713 | *
|
---|
714 | * @param context A Kerberos context.
|
---|
715 | * @param principal returned principal
|
---|
716 | * @param realm realm name
|
---|
717 | * @param ... a list of components ended with NULL.
|
---|
718 | *
|
---|
719 | * @return An krb5 error code, see krb5_get_error_message().
|
---|
720 | *
|
---|
721 | * @ingroup krb5_principal
|
---|
722 | */
|
---|
723 |
|
---|
724 | KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
|
---|
725 | krb5_make_principal(krb5_context context,
|
---|
726 | krb5_principal *principal,
|
---|
727 | krb5_const_realm realm,
|
---|
728 | ...)
|
---|
729 | {
|
---|
730 | krb5_error_code ret;
|
---|
731 | krb5_realm r = NULL;
|
---|
732 | va_list ap;
|
---|
733 | if(realm == NULL) {
|
---|
734 | ret = krb5_get_default_realm(context, &r);
|
---|
735 | if(ret)
|
---|
736 | return ret;
|
---|
737 | realm = r;
|
---|
738 | }
|
---|
739 | va_start(ap, realm);
|
---|
740 | ret = krb5_build_principal_va(context, principal, strlen(realm), realm, ap);
|
---|
741 | va_end(ap);
|
---|
742 | if(r)
|
---|
743 | free(r);
|
---|
744 | return ret;
|
---|
745 | }
|
---|
746 |
|
---|
747 | static krb5_error_code
|
---|
748 | append_component(krb5_context context, krb5_principal p,
|
---|
749 | const char *comp,
|
---|
750 | size_t comp_len)
|
---|
751 | {
|
---|
752 | heim_general_string *tmp;
|
---|
753 | size_t len = princ_num_comp(p);
|
---|
754 |
|
---|
755 | tmp = realloc(princ_comp(p), (len + 1) * sizeof(*tmp));
|
---|
756 | if(tmp == NULL) {
|
---|
757 | krb5_set_error_message(context, ENOMEM,
|
---|
758 | N_("malloc: out of memory", ""));
|
---|
759 | return ENOMEM;
|
---|
760 | }
|
---|
761 | princ_comp(p) = tmp;
|
---|
762 | princ_ncomp(p, len) = malloc(comp_len + 1);
|
---|
763 | if (princ_ncomp(p, len) == NULL) {
|
---|
764 | krb5_set_error_message(context, ENOMEM,
|
---|
765 | N_("malloc: out of memory", ""));
|
---|
766 | return ENOMEM;
|
---|
767 | }
|
---|
768 | memcpy (princ_ncomp(p, len), comp, comp_len);
|
---|
769 | princ_ncomp(p, len)[comp_len] = '\0';
|
---|
770 | princ_num_comp(p)++;
|
---|
771 | return 0;
|
---|
772 | }
|
---|
773 |
|
---|
774 | static void
|
---|
775 | va_ext_princ(krb5_context context, krb5_principal p, va_list ap)
|
---|
776 | {
|
---|
777 | while(1){
|
---|
778 | const char *s;
|
---|
779 | int len;
|
---|
780 | len = va_arg(ap, int);
|
---|
781 | if(len == 0)
|
---|
782 | break;
|
---|
783 | s = va_arg(ap, const char*);
|
---|
784 | append_component(context, p, s, len);
|
---|
785 | }
|
---|
786 | }
|
---|
787 |
|
---|
788 | static void
|
---|
789 | va_princ(krb5_context context, krb5_principal p, va_list ap)
|
---|
790 | {
|
---|
791 | while(1){
|
---|
792 | const char *s;
|
---|
793 | s = va_arg(ap, const char*);
|
---|
794 | if(s == NULL)
|
---|
795 | break;
|
---|
796 | append_component(context, p, s, strlen(s));
|
---|
797 | }
|
---|
798 | }
|
---|
799 |
|
---|
800 | static krb5_error_code
|
---|
801 | build_principal(krb5_context context,
|
---|
802 | krb5_principal *principal,
|
---|
803 | int rlen,
|
---|
804 | krb5_const_realm realm,
|
---|
805 | void (*func)(krb5_context, krb5_principal, va_list),
|
---|
806 | va_list ap)
|
---|
807 | {
|
---|
808 | krb5_principal p;
|
---|
809 |
|
---|
810 | p = calloc(1, sizeof(*p));
|
---|
811 | if (p == NULL) {
|
---|
812 | krb5_set_error_message(context, ENOMEM,
|
---|
813 | N_("malloc: out of memory", ""));
|
---|
814 | return ENOMEM;
|
---|
815 | }
|
---|
816 | princ_type(p) = KRB5_NT_PRINCIPAL;
|
---|
817 |
|
---|
818 | princ_realm(p) = strdup(realm);
|
---|
819 | if(p->realm == NULL){
|
---|
820 | free(p);
|
---|
821 | krb5_set_error_message(context, ENOMEM,
|
---|
822 | N_("malloc: out of memory", ""));
|
---|
823 | return ENOMEM;
|
---|
824 | }
|
---|
825 |
|
---|
826 | (*func)(context, p, ap);
|
---|
827 | *principal = p;
|
---|
828 | return 0;
|
---|
829 | }
|
---|
830 |
|
---|
831 | KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
|
---|
832 | krb5_build_principal_va(krb5_context context,
|
---|
833 | krb5_principal *principal,
|
---|
834 | int rlen,
|
---|
835 | krb5_const_realm realm,
|
---|
836 | va_list ap)
|
---|
837 | {
|
---|
838 | return build_principal(context, principal, rlen, realm, va_princ, ap);
|
---|
839 | }
|
---|
840 |
|
---|
841 | KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
|
---|
842 | krb5_build_principal_va_ext(krb5_context context,
|
---|
843 | krb5_principal *principal,
|
---|
844 | int rlen,
|
---|
845 | krb5_const_realm realm,
|
---|
846 | va_list ap)
|
---|
847 | {
|
---|
848 | return build_principal(context, principal, rlen, realm, va_ext_princ, ap);
|
---|
849 | }
|
---|
850 |
|
---|
851 |
|
---|
852 | KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
|
---|
853 | krb5_build_principal_ext(krb5_context context,
|
---|
854 | krb5_principal *principal,
|
---|
855 | int rlen,
|
---|
856 | krb5_const_realm realm,
|
---|
857 | ...)
|
---|
858 | {
|
---|
859 | krb5_error_code ret;
|
---|
860 | va_list ap;
|
---|
861 | va_start(ap, realm);
|
---|
862 | ret = krb5_build_principal_va_ext(context, principal, rlen, realm, ap);
|
---|
863 | va_end(ap);
|
---|
864 | return ret;
|
---|
865 | }
|
---|
866 |
|
---|
867 | /**
|
---|
868 | * Copy a principal
|
---|
869 | *
|
---|
870 | * @param context A Kerberos context.
|
---|
871 | * @param inprinc principal to copy
|
---|
872 | * @param outprinc copied principal, free with krb5_free_principal()
|
---|
873 | *
|
---|
874 | * @return An krb5 error code, see krb5_get_error_message().
|
---|
875 | *
|
---|
876 | * @ingroup krb5_principal
|
---|
877 | */
|
---|
878 |
|
---|
879 |
|
---|
880 | KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
|
---|
881 | krb5_copy_principal(krb5_context context,
|
---|
882 | krb5_const_principal inprinc,
|
---|
883 | krb5_principal *outprinc)
|
---|
884 | {
|
---|
885 | krb5_principal p = malloc(sizeof(*p));
|
---|
886 | if (p == NULL) {
|
---|
887 | krb5_set_error_message(context, ENOMEM,
|
---|
888 | N_("malloc: out of memory", ""));
|
---|
889 | return ENOMEM;
|
---|
890 | }
|
---|
891 | if(copy_Principal(inprinc, p)) {
|
---|
892 | free(p);
|
---|
893 | krb5_set_error_message(context, ENOMEM,
|
---|
894 | N_("malloc: out of memory", ""));
|
---|
895 | return ENOMEM;
|
---|
896 | }
|
---|
897 | *outprinc = p;
|
---|
898 | return 0;
|
---|
899 | }
|
---|
900 |
|
---|
901 | /**
|
---|
902 | * Return TRUE iff princ1 == princ2 (without considering the realm)
|
---|
903 | *
|
---|
904 | * @param context Kerberos 5 context
|
---|
905 | * @param princ1 first principal to compare
|
---|
906 | * @param princ2 second principal to compare
|
---|
907 | *
|
---|
908 | * @return non zero if equal, 0 if not
|
---|
909 | *
|
---|
910 | * @ingroup krb5_principal
|
---|
911 | * @see krb5_principal_compare()
|
---|
912 | * @see krb5_realm_compare()
|
---|
913 | */
|
---|
914 |
|
---|
915 | KRB5_LIB_FUNCTION krb5_boolean KRB5_LIB_CALL
|
---|
916 | krb5_principal_compare_any_realm(krb5_context context,
|
---|
917 | krb5_const_principal princ1,
|
---|
918 | krb5_const_principal princ2)
|
---|
919 | {
|
---|
920 | int i;
|
---|
921 | if(princ_num_comp(princ1) != princ_num_comp(princ2))
|
---|
922 | return FALSE;
|
---|
923 | for(i = 0; i < princ_num_comp(princ1); i++){
|
---|
924 | if(strcmp(princ_ncomp(princ1, i), princ_ncomp(princ2, i)) != 0)
|
---|
925 | return FALSE;
|
---|
926 | }
|
---|
927 | return TRUE;
|
---|
928 | }
|
---|
929 |
|
---|
930 | KRB5_LIB_FUNCTION krb5_boolean KRB5_LIB_CALL
|
---|
931 | _krb5_principal_compare_PrincipalName(krb5_context context,
|
---|
932 | krb5_const_principal princ1,
|
---|
933 | PrincipalName *princ2)
|
---|
934 | {
|
---|
935 | int i;
|
---|
936 | if (princ_num_comp(princ1) != princ2->name_string.len)
|
---|
937 | return FALSE;
|
---|
938 | for(i = 0; i < princ_num_comp(princ1); i++){
|
---|
939 | if(strcmp(princ_ncomp(princ1, i), princ2->name_string.val[i]) != 0)
|
---|
940 | return FALSE;
|
---|
941 | }
|
---|
942 | return TRUE;
|
---|
943 | }
|
---|
944 |
|
---|
945 |
|
---|
946 | /**
|
---|
947 | * Compares the two principals, including realm of the principals and returns
|
---|
948 | * TRUE if they are the same and FALSE if not.
|
---|
949 | *
|
---|
950 | * @param context Kerberos 5 context
|
---|
951 | * @param princ1 first principal to compare
|
---|
952 | * @param princ2 second principal to compare
|
---|
953 | *
|
---|
954 | * @ingroup krb5_principal
|
---|
955 | * @see krb5_principal_compare_any_realm()
|
---|
956 | * @see krb5_realm_compare()
|
---|
957 | */
|
---|
958 |
|
---|
959 | /*
|
---|
960 | * return TRUE iff princ1 == princ2
|
---|
961 | */
|
---|
962 |
|
---|
963 | KRB5_LIB_FUNCTION krb5_boolean KRB5_LIB_CALL
|
---|
964 | krb5_principal_compare(krb5_context context,
|
---|
965 | krb5_const_principal princ1,
|
---|
966 | krb5_const_principal princ2)
|
---|
967 | {
|
---|
968 | if(!krb5_realm_compare(context, princ1, princ2))
|
---|
969 | return FALSE;
|
---|
970 | return krb5_principal_compare_any_realm(context, princ1, princ2);
|
---|
971 | }
|
---|
972 |
|
---|
973 | /**
|
---|
974 | * return TRUE iff realm(princ1) == realm(princ2)
|
---|
975 | *
|
---|
976 | * @param context Kerberos 5 context
|
---|
977 | * @param princ1 first principal to compare
|
---|
978 | * @param princ2 second principal to compare
|
---|
979 | *
|
---|
980 | * @ingroup krb5_principal
|
---|
981 | * @see krb5_principal_compare_any_realm()
|
---|
982 | * @see krb5_principal_compare()
|
---|
983 | */
|
---|
984 |
|
---|
985 | KRB5_LIB_FUNCTION krb5_boolean KRB5_LIB_CALL
|
---|
986 | krb5_realm_compare(krb5_context context,
|
---|
987 | krb5_const_principal princ1,
|
---|
988 | krb5_const_principal princ2)
|
---|
989 | {
|
---|
990 | return strcmp(princ_realm(princ1), princ_realm(princ2)) == 0;
|
---|
991 | }
|
---|
992 |
|
---|
993 | /**
|
---|
994 | * return TRUE iff princ matches pattern
|
---|
995 | *
|
---|
996 | * @ingroup krb5_principal
|
---|
997 | */
|
---|
998 |
|
---|
999 | KRB5_LIB_FUNCTION krb5_boolean KRB5_LIB_CALL
|
---|
1000 | krb5_principal_match(krb5_context context,
|
---|
1001 | krb5_const_principal princ,
|
---|
1002 | krb5_const_principal pattern)
|
---|
1003 | {
|
---|
1004 | int i;
|
---|
1005 | if(princ_num_comp(princ) != princ_num_comp(pattern))
|
---|
1006 | return FALSE;
|
---|
1007 | if(fnmatch(princ_realm(pattern), princ_realm(princ), 0) != 0)
|
---|
1008 | return FALSE;
|
---|
1009 | for(i = 0; i < princ_num_comp(princ); i++){
|
---|
1010 | if(fnmatch(princ_ncomp(pattern, i), princ_ncomp(princ, i), 0) != 0)
|
---|
1011 | return FALSE;
|
---|
1012 | }
|
---|
1013 | return TRUE;
|
---|
1014 | }
|
---|
1015 |
|
---|
1016 | /**
|
---|
1017 | * Create a principal for the service running on hostname. If
|
---|
1018 | * KRB5_NT_SRV_HST is used, the hostname is canonization using DNS (or
|
---|
1019 | * some other service), this is potentially insecure.
|
---|
1020 | *
|
---|
1021 | * @param context A Kerberos context.
|
---|
1022 | * @param hostname hostname to use
|
---|
1023 | * @param sname Service name to use
|
---|
1024 | * @param type name type of pricipal, use KRB5_NT_SRV_HST or KRB5_NT_UNKNOWN.
|
---|
1025 | * @param ret_princ return principal, free with krb5_free_principal().
|
---|
1026 | *
|
---|
1027 | * @return An krb5 error code, see krb5_get_error_message().
|
---|
1028 | *
|
---|
1029 | * @ingroup krb5_principal
|
---|
1030 | */
|
---|
1031 |
|
---|
1032 | KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
|
---|
1033 | krb5_sname_to_principal (krb5_context context,
|
---|
1034 | const char *hostname,
|
---|
1035 | const char *sname,
|
---|
1036 | int32_t type,
|
---|
1037 | krb5_principal *ret_princ)
|
---|
1038 | {
|
---|
1039 | krb5_error_code ret;
|
---|
1040 | char localhost[MAXHOSTNAMELEN];
|
---|
1041 | char **realms, *host = NULL;
|
---|
1042 |
|
---|
1043 | if(type != KRB5_NT_SRV_HST && type != KRB5_NT_UNKNOWN) {
|
---|
1044 | krb5_set_error_message(context, KRB5_SNAME_UNSUPP_NAMETYPE,
|
---|
1045 | N_("unsupported name type %d", ""),
|
---|
1046 | (int)type);
|
---|
1047 | return KRB5_SNAME_UNSUPP_NAMETYPE;
|
---|
1048 | }
|
---|
1049 | if(hostname == NULL) {
|
---|
1050 | ret = gethostname(localhost, sizeof(localhost) - 1);
|
---|
1051 | if (ret != 0) {
|
---|
1052 | ret = errno;
|
---|
1053 | krb5_set_error_message(context, ret,
|
---|
1054 | N_("Failed to get local hostname", ""));
|
---|
1055 | return ret;
|
---|
1056 | }
|
---|
1057 | localhost[sizeof(localhost) - 1] = '\0';
|
---|
1058 | hostname = localhost;
|
---|
1059 | }
|
---|
1060 | if(sname == NULL)
|
---|
1061 | sname = "host";
|
---|
1062 | if(type == KRB5_NT_SRV_HST) {
|
---|
1063 | ret = krb5_expand_hostname_realms (context, hostname,
|
---|
1064 | &host, &realms);
|
---|
1065 | if (ret)
|
---|
1066 | return ret;
|
---|
1067 | strlwr(host);
|
---|
1068 | hostname = host;
|
---|
1069 | } else {
|
---|
1070 | ret = krb5_get_host_realm(context, hostname, &realms);
|
---|
1071 | if(ret)
|
---|
1072 | return ret;
|
---|
1073 | }
|
---|
1074 |
|
---|
1075 | ret = krb5_make_principal(context, ret_princ, realms[0], sname,
|
---|
1076 | hostname, NULL);
|
---|
1077 | if(host)
|
---|
1078 | free(host);
|
---|
1079 | krb5_free_host_realm(context, realms);
|
---|
1080 | return ret;
|
---|
1081 | }
|
---|
1082 |
|
---|
1083 | static const struct {
|
---|
1084 | const char *type;
|
---|
1085 | int32_t value;
|
---|
1086 | } nametypes[] = {
|
---|
1087 | { "UNKNOWN", KRB5_NT_UNKNOWN },
|
---|
1088 | { "PRINCIPAL", KRB5_NT_PRINCIPAL },
|
---|
1089 | { "SRV_INST", KRB5_NT_SRV_INST },
|
---|
1090 | { "SRV_HST", KRB5_NT_SRV_HST },
|
---|
1091 | { "SRV_XHST", KRB5_NT_SRV_XHST },
|
---|
1092 | { "UID", KRB5_NT_UID },
|
---|
1093 | { "X500_PRINCIPAL", KRB5_NT_X500_PRINCIPAL },
|
---|
1094 | { "SMTP_NAME", KRB5_NT_SMTP_NAME },
|
---|
1095 | { "ENTERPRISE_PRINCIPAL", KRB5_NT_ENTERPRISE_PRINCIPAL },
|
---|
1096 | { "ENT_PRINCIPAL_AND_ID", KRB5_NT_ENT_PRINCIPAL_AND_ID },
|
---|
1097 | { "MS_PRINCIPAL", KRB5_NT_MS_PRINCIPAL },
|
---|
1098 | { "MS_PRINCIPAL_AND_ID", KRB5_NT_MS_PRINCIPAL_AND_ID },
|
---|
1099 | { NULL }
|
---|
1100 | };
|
---|
1101 |
|
---|
1102 | /**
|
---|
1103 | * Parse nametype string and return a nametype integer
|
---|
1104 | *
|
---|
1105 | * @ingroup krb5_principal
|
---|
1106 | */
|
---|
1107 |
|
---|
1108 | KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
|
---|
1109 | krb5_parse_nametype(krb5_context context, const char *str, int32_t *nametype)
|
---|
1110 | {
|
---|
1111 | size_t i;
|
---|
1112 |
|
---|
1113 | for(i = 0; nametypes[i].type; i++) {
|
---|
1114 | if (strcasecmp(nametypes[i].type, str) == 0) {
|
---|
1115 | *nametype = nametypes[i].value;
|
---|
1116 | return 0;
|
---|
1117 | }
|
---|
1118 | }
|
---|
1119 | krb5_set_error_message(context, KRB5_PARSE_MALFORMED,
|
---|
1120 | N_("Failed to find name type %s", ""), str);
|
---|
1121 | return KRB5_PARSE_MALFORMED;
|
---|
1122 | }
|
---|
1123 |
|
---|
1124 | /**
|
---|
1125 | * Check if the cname part of the principal is a krbtgt principal
|
---|
1126 | *
|
---|
1127 | * @ingroup krb5_principal
|
---|
1128 | */
|
---|
1129 |
|
---|
1130 | KRB5_LIB_FUNCTION krb5_boolean KRB5_LIB_CALL
|
---|
1131 | krb5_principal_is_krbtgt(krb5_context context, krb5_const_principal p)
|
---|
1132 | {
|
---|
1133 | return p->name.name_string.len == 2 &&
|
---|
1134 | strcmp(p->name.name_string.val[0], KRB5_TGS_NAME) == 0;
|
---|
1135 |
|
---|
1136 | }
|
---|