1/* 2 * Copyright (c) 1997 - 2007 Kungliga Tekniska Högskolan 3 * (Royal Institute of Technology, Stockholm, Sweden). 4 * All rights reserved. 5 * 6 * Redistribution and use in source and binary forms, with or without 7 * modification, are permitted provided that the following conditions 8 * are met: 9 * 10 * 1. Redistributions of source code must retain the above copyright 11 * notice, this list of conditions and the following disclaimer. 12 * 13 * 2. Redistributions in binary form must reproduce the above copyright 14 * notice, this list of conditions and the following disclaimer in the 15 * documentation and/or other materials provided with the distribution. 16 * 17 * 3. Neither the name of the Institute nor the names of its contributors 18 * may be used to endorse or promote products derived from this software 19 * without specific prior written permission. 20 * 21 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND 22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE 25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 */ 33 34/* $Id$ */ 35 36#ifndef __HDB_H__ 37#define __HDB_H__ 38 39#include <krb5.h> 40 41#include <hdb_err.h> 42 43#include <heim_asn1.h> 44#include <hdb_asn1.h> 45 46struct hdb_dbinfo; 47 48enum hdb_lockop{ HDB_RLOCK, HDB_WLOCK }; 49 50/* flags for various functions */ 51#define HDB_F_DECRYPT 1 /* decrypt keys */ 52#define HDB_F_REPLACE 2 /* replace entry */ 53#define HDB_F_GET_CLIENT 4 /* fetch client */ 54#define HDB_F_GET_SERVER 8 /* fetch server */ 55#define HDB_F_GET_KRBTGT 16 /* fetch krbtgt */ 56#define HDB_F_GET_ANY 28 /* fetch any of client,server,krbtgt */ 57#define HDB_F_CANON 32 /* want canonicalition */ 58#define HDB_F_ADMIN_DATA 64 /* want data that kdc don't use */ 59#define HDB_F_CHANGE_PASSWORD 128 /* change password store */ 60#define HDB_F_KVNO_SPECIFIED 256 /* we want a particular KVNO */ 61#define HDB_F_CURRENT_KVNO 512 /* we want the current KVNO */ 62#define HDB_F_LIVE_CLNT_KVNOS 1024 /* we want all live keys for pre-auth */ 63#define HDB_F_LIVE_SVC_KVNOS 2048 /* we want all live keys for tix */ 64#define HDB_F_ALL_KVNOS 4096 /* we want all the keys, live or not */ 65#define HDB_F_FOR_AS_REQ 8192 /* fetch is for a AS REQ */ 66#define HDB_F_FOR_TGS_REQ 16384 /* fetch is for a TGS REQ */ 67 68/* hdb_capability_flags */ 69#define HDB_CAP_F_HANDLE_ENTERPRISE_PRINCIPAL 1 70#define HDB_CAP_F_HANDLE_PASSWORDS 2 71#define HDB_CAP_F_PASSWORD_UPDATE_KEYS 4 72 73/* auth status values */ 74#define HDB_AUTH_SUCCESS 0 75#define HDB_AUTH_WRONG_PASSWORD 1 76#define HDB_AUTH_INVALID_SIGNATURE 2 77 78#define HDB_PWD_CONDITIONAL 1 79 80/* key usage for master key */ 81#define HDB_KU_MKEY 0x484442 82 83typedef struct hdb_master_key_data *hdb_master_key; 84 85/** 86 * hdb_entry_ex is a wrapper structure around the hdb_entry structure 87 * that allows backends to keep a pointer to the backing store, ie in 88 * ->hdb_fetch_kvno(), so that we the kadmin/kpasswd backend gets around to 89 * ->hdb_store(), the backend doesn't need to lookup the entry again. 90 */ 91 92typedef struct hdb_entry_ex { 93 void *ctx; 94 hdb_entry entry; 95 void (*free_entry)(krb5_context, struct hdb_entry_ex *); 96} hdb_entry_ex; 97 98 99/** 100 * HDB backend function pointer structure 101 * 102 * The HDB structure is what the KDC and kadmind framework uses to 103 * query the backend database when talking about principals. 104 */ 105 106typedef struct HDB{ 107 void *hdb_db; 108 void *hdb_dbc; /** don't use, only for DB3 */ 109 char *hdb_name; 110 int hdb_master_key_set; 111 hdb_master_key hdb_master_key; 112 int hdb_openp; 113 int hdb_capability_flags; 114 int lock_count; 115 int lock_type; 116 /** 117 * Open (or create) the a Kerberos database. 118 * 119 * Open (or create) the a Kerberos database that was resolved with 120 * hdb_create(). The third and fourth flag to the function are the 121 * same as open(), thus passing O_CREAT will create the data base 122 * if it doesn't exists. 123 * 124 * Then done the caller should call hdb_close(), and to release 125 * all resources hdb_destroy(). 126 */ 127 krb5_error_code (*hdb_open)(krb5_context, struct HDB*, int, mode_t); 128 /** 129 * Close the database for transaction 130 * 131 * Closes the database for further transactions, wont release any 132 * permanant resources. the database can be ->hdb_open-ed again. 133 */ 134 krb5_error_code (*hdb_close)(krb5_context, struct HDB*); 135 /** 136 * Free an entry after use. 137 */ 138 void (*hdb_free)(krb5_context, struct HDB*, hdb_entry_ex*); 139 /** 140 * Fetch an entry from the backend 141 * 142 * Fetch an entry from the backend, flags are what type of entry 143 * should be fetch: client, server, krbtgt. 144 * knvo (if specified and flags HDB_F_KVNO_SPECIFIED set) is the kvno to get 145 */ 146 krb5_error_code (*hdb_fetch_kvno)(krb5_context, struct HDB*, 147 krb5_const_principal, unsigned, krb5_kvno, 148 hdb_entry_ex*); 149 /** 150 * Store an entry to database 151 */ 152 krb5_error_code (*hdb_store)(krb5_context, struct HDB*, 153 unsigned, hdb_entry_ex*); 154 /** 155 * Remove an entry from the database. 156 */ 157 krb5_error_code (*hdb_remove)(krb5_context, struct HDB*, 158 krb5_const_principal); 159 /** 160 * As part of iteration, fetch one entry 161 */ 162 krb5_error_code (*hdb_firstkey)(krb5_context, struct HDB*, 163 unsigned, hdb_entry_ex*); 164 /** 165 * As part of iteration, fetch next entry 166 */ 167 krb5_error_code (*hdb_nextkey)(krb5_context, struct HDB*, 168 unsigned, hdb_entry_ex*); 169 /** 170 * Lock database 171 * 172 * A lock can only be held by one consumers. Transaction can still 173 * happen on the database while the lock is held, so the entry is 174 * only useful for syncroning creation of the database and renaming of the database. 175 */ 176 krb5_error_code (*hdb_lock)(krb5_context, struct HDB*, int); 177 /** 178 * Unlock database 179 */ 180 krb5_error_code (*hdb_unlock)(krb5_context, struct HDB*); 181 /** 182 * Rename the data base. 183 * 184 * Assume that the database is not hdb_open'ed and not locked. 185 */ 186 krb5_error_code (*hdb_rename)(krb5_context, struct HDB*, const char*); 187 /** 188 * Get an hdb_entry from a classical DB backend 189 * 190 * If the database is a classical DB (ie BDB, NDBM, GDBM, etc) 191 * backend, this function will take a principal key (krb5_data) 192 * and return all data related to principal in the return 193 * krb5_data. The returned encoded entry is of type hdb_entry or 194 * hdb_entry_alias. 195 */ 196 krb5_error_code (*hdb__get)(krb5_context, struct HDB*, 197 krb5_data, krb5_data*); 198 /** 199 * Store an hdb_entry from a classical DB backend 200 * 201 * Same discussion as in @ref HDB::hdb__get 202 */ 203 krb5_error_code (*hdb__put)(krb5_context, struct HDB*, int, 204 krb5_data, krb5_data); 205 /** 206 * Delete and hdb_entry from a classical DB backend 207 * 208 * Same discussion as in @ref HDB::hdb__get 209 */ 210 krb5_error_code (*hdb__del)(krb5_context, struct HDB*, krb5_data); 211 /** 212 * Destroy the handle to the database. 213 * 214 * Destroy the handle to the database, deallocate all memory and 215 * related resources. Does not remove any permanent data. Its the 216 * logical reverse of hdb_create() function that is the entry 217 * point for the module. 218 */ 219 krb5_error_code (*hdb_destroy)(krb5_context, struct HDB*); 220 221 /** 222 * Get the list of realms this backend handles. 223 * This call is optional to support. The returned realms are used 224 * for announcing the realms over bonjour. Free returned array 225 * with krb5_free_host_realm(). 226 */ 227 krb5_error_code (*hdb_get_realms)(krb5_context, struct HDB *, krb5_realm **); 228 /** 229 * Change password. 230 * 231 * Will update keys for the entry when given password. The new 232 * keys must be written into the entry and will then later be 233 * ->hdb_store() into the database. The backend will still perform 234 * all other operations, increasing the kvno, and update 235 * modification timestamp. 236 * 237 * The backend needs to call _kadm5_set_keys() and perform 238 * password quality checks. The password quality should only be 239 * performed when the flag argument have HDB_PWD_CONDITIONAL set. 240 */ 241 krb5_error_code (*hdb_password)(krb5_context, struct HDB*, hdb_entry_ex*, const char *, int); 242 243 /** 244 * Auth feedback 245 * 246 * This is a feedback call that allows backends that provides 247 * lockout functionality to register failure and/or successes. 248 * 249 * In case the entry is locked out, the backend should set the 250 * hdb_entry.flags.locked-out flag. 251 */ 252 krb5_error_code (*hdb_auth_status)(krb5_context, struct HDB *, hdb_entry_ex *, int); 253 /** 254 * Check if delegation is allowed. 255 */ 256 krb5_error_code (*hdb_check_constrained_delegation)(krb5_context, struct HDB *, hdb_entry_ex *, krb5_const_principal); 257 258 /** 259 * Check if this name is an alias for the supplied client for PKINIT userPrinicpalName logins 260 */ 261 krb5_error_code (*hdb_check_pkinit_ms_upn_match)(krb5_context, struct HDB *, hdb_entry_ex *, krb5_const_principal); 262 263 /** 264 * Return 0 if this domain support NTLM and return the domain name 265 */ 266 krb5_error_code (*hdb_get_ntlm_domain)(krb5_context, struct HDB *, char **); 267 268 /** 269 * Check if s4u2self is allowed from this client to this server 270 */ 271 krb5_error_code (*hdb_check_s4u2self)(krb5_context, struct HDB *, hdb_entry_ex *, krb5_const_principal); 272}HDB; 273 274#define HDB_INTERFACE_VERSION 7 275 276struct hdb_so_method { 277 int version; 278 const char *prefix; 279 krb5_error_code (*create)(krb5_context, HDB **, const char *filename); 280}; 281 282typedef krb5_error_code (*hdb_foreach_func_t)(krb5_context, HDB*, 283 hdb_entry_ex*, void*); 284extern krb5_kt_ops hdb_kt_ops; 285 286struct hdb_method { 287 int interface_version; 288 const char *prefix; 289 krb5_error_code (*create)(krb5_context, HDB **, const char *filename); 290}; 291 292extern const int hdb_interface_version; 293 294#include <hdb-protos.h> 295 296#endif /* __HDB_H__ */ 297