1/* 2 * Copyright 2008 Sun Microsystems, Inc. All rights reserved. 3 * Use is subject to license terms. 4 */ 5 6 7/* 8 * lib/krb5/keytab/ktbase.c 9 * 10 * Copyright 1990 by the Massachusetts Institute of Technology. 11 * All Rights Reserved. 12 * 13 * Export of this software from the United States of America may 14 * require a specific license from the United States Government. 15 * It is the responsibility of any person or organization contemplating 16 * export to obtain such a license before exporting. 17 * 18 * WITHIN THAT CONSTRAINT, permission to use, copy, modify, and 19 * distribute this software and its documentation for any purpose and 20 * without fee is hereby granted, provided that the above copyright 21 * notice appear in all copies and that both that copyright notice and 22 * this permission notice appear in supporting documentation, and that 23 * the name of M.I.T. not be used in advertising or publicity pertaining 24 * to distribution of the software without specific, written prior 25 * permission. Furthermore if you modify this software you must label 26 * your software as modified software and not distribute it in such a 27 * fashion that it might be confused with the original M.I.T. software. 28 * M.I.T. makes no representations about the suitability of 29 * this software for any purpose. It is provided "as is" without express 30 * or implied warranty. 31 * 32 * 33 * Registration functions for keytab. 34 */ 35 36#include "k5-int.h" 37#include "k5-thread.h" 38#include "kt-int.h" 39 40extern const krb5_kt_ops krb5_ktf_ops; 41extern const krb5_kt_ops krb5_ktf_writable_ops; 42extern const krb5_kt_ops krb5_kts_ops; 43 44struct krb5_kt_typelist { 45 const krb5_kt_ops *ops; 46 const struct krb5_kt_typelist *next; 47}; 48/* Solaris Kerberos */ 49static const struct krb5_kt_typelist krb5_kt_typelist_wrfile = { 50 &krb5_ktf_writable_ops, 51 0 52}; 53/* Solaris Kerberos */ 54static const struct krb5_kt_typelist krb5_kt_typelist_file = { 55 &krb5_ktf_ops, 56 &krb5_kt_typelist_wrfile 57}; 58/* Solaris Kerberos */ 59static const struct krb5_kt_typelist krb5_kt_typelist_srvtab = { 60 &krb5_kts_ops, 61 &krb5_kt_typelist_file 62}; 63static const struct krb5_kt_typelist *kt_typehead = &krb5_kt_typelist_srvtab; 64/* Lock for protecting the type list. */ 65static k5_mutex_t kt_typehead_lock = K5_MUTEX_PARTIAL_INITIALIZER; 66 67int krb5int_kt_initialize(void) 68{ 69 return k5_mutex_finish_init(&kt_typehead_lock); 70} 71 72void 73krb5int_kt_finalize(void) 74{ 75 struct krb5_kt_typelist *t, *t_next; 76 k5_mutex_destroy(&kt_typehead_lock); 77 /* Solaris Kerberos */ 78 for (t = (struct krb5_kt_typelist *)kt_typehead; t != &krb5_kt_typelist_srvtab; 79 t = t_next) { 80 t_next = (struct krb5_kt_typelist *)t->next; 81 free(t); 82 } 83} 84 85 86/* 87 * Register a new key table type 88 * don't replace if it already exists; return an error instead. 89 */ 90/*ARGSUSED*/ 91krb5_error_code KRB5_CALLCONV 92krb5_kt_register(krb5_context context, const krb5_kt_ops *ops) 93{ 94 const struct krb5_kt_typelist *t; 95 struct krb5_kt_typelist *newt; 96 krb5_error_code err; 97 98 err = k5_mutex_lock(&kt_typehead_lock); 99 if (err) 100 return err; 101 for (t = kt_typehead; t && strcmp(t->ops->prefix,ops->prefix);t = t->next) 102 ; 103 if (t) { 104 k5_mutex_unlock(&kt_typehead_lock); 105 return KRB5_KT_TYPE_EXISTS; 106 } 107 if (!(newt = (struct krb5_kt_typelist *) malloc(sizeof(*t)))) { 108 k5_mutex_unlock(&kt_typehead_lock); 109 return ENOMEM; 110 } 111 newt->next = kt_typehead; 112 newt->ops = ops; 113 kt_typehead = newt; 114 k5_mutex_unlock(&kt_typehead_lock); 115 return 0; 116} 117 118/* 119 * Resolve a key table name into a keytab object. 120 * 121 * The name is currently constrained to be of the form "type:residual"; 122 * 123 * The "type" portion corresponds to one of the registered key table 124 * types, while the "residual" portion is specific to the 125 * particular keytab type. 126 */ 127 128#include <ctype.h> 129krb5_error_code KRB5_CALLCONV 130krb5_kt_resolve (krb5_context context, const char *name, krb5_keytab *ktid) 131{ 132 const struct krb5_kt_typelist *tlist; 133 char *pfx; 134 unsigned int pfxlen; 135 const char *cp, *resid; 136 krb5_error_code err; 137 138 cp = strchr (name, ':'); 139 if (!cp) { 140 return (*krb5_kt_dfl_ops.resolve)(context, name, ktid); 141 } 142 143 pfxlen = cp - name; 144 145 if ( pfxlen == 1 && isalpha((unsigned char) name[0]) ) { 146 /* We found a drive letter not a prefix - use FILE */ 147 pfx = strdup("FILE"); 148 if (!pfx) 149 return ENOMEM; 150 151 resid = name; 152 } else { 153 resid = name + pfxlen + 1; 154 155 pfx = malloc (pfxlen+1); 156 if (!pfx) 157 return ENOMEM; 158 159 memcpy (pfx, name, pfxlen); 160 pfx[pfxlen] = '\0'; 161 } 162 163 *ktid = (krb5_keytab) 0; 164 165 err = k5_mutex_lock(&kt_typehead_lock); 166 if (err) 167 return err; 168 tlist = kt_typehead; 169 /* Don't need to hold the lock, since entries are never modified 170 or removed once they're in the list. Just need to protect 171 access to the list head variable itself. */ 172 k5_mutex_unlock(&kt_typehead_lock); 173 for (; tlist; tlist = tlist->next) { 174 if (strcmp (tlist->ops->prefix, pfx) == 0) { 175 free(pfx); 176 return (*tlist->ops->resolve)(context, resid, ktid); 177 } 178 } 179 free(pfx); 180 return KRB5_KT_UNKNOWN_TYPE; 181} 182 183/* 184 * Routines to deal with externalizingt krb5_keytab. 185 * krb5_keytab_size(); 186 * krb5_keytab_externalize(); 187 * krb5_keytab_internalize(); 188 */ 189static krb5_error_code krb5_keytab_size 190 (krb5_context, krb5_pointer, size_t *); 191static krb5_error_code krb5_keytab_externalize 192 (krb5_context, krb5_pointer, krb5_octet **, size_t *); 193static krb5_error_code krb5_keytab_internalize 194 (krb5_context,krb5_pointer *, krb5_octet **, size_t *); 195 196/* 197 * Serialization entry for this type. 198 */ 199static const krb5_ser_entry krb5_keytab_ser_entry = { 200 KV5M_KEYTAB, /* Type */ 201 krb5_keytab_size, /* Sizer routine */ 202 krb5_keytab_externalize, /* Externalize routine */ 203 krb5_keytab_internalize /* Internalize routine */ 204}; 205 206static krb5_error_code 207krb5_keytab_size(krb5_context kcontext, krb5_pointer arg, size_t *sizep) 208{ 209 krb5_error_code kret; 210 krb5_keytab keytab; 211 krb5_ser_handle shandle; 212 213 kret = EINVAL; 214 /* Solaris Kerberos */ 215 keytab = (krb5_keytab) arg; 216 shandle = (krb5_ser_handle) keytab->ops->serializer; 217 if ((keytab != NULL) && (keytab->ops) && 218 (shandle != NULL) && (shandle->sizer)) 219 kret = (*shandle->sizer)(kcontext, arg, sizep); 220 return(kret); 221} 222 223static krb5_error_code 224krb5_keytab_externalize(krb5_context kcontext, krb5_pointer arg, krb5_octet **buffer, size_t *lenremain) 225{ 226 krb5_error_code kret; 227 krb5_keytab keytab; 228 krb5_ser_handle shandle; 229 230 kret = EINVAL; 231 /* Solaris Kerberos */ 232 keytab = (krb5_keytab) arg; 233 shandle = (krb5_ser_handle) keytab->ops->serializer; 234 if ((keytab != NULL) && (keytab->ops) && 235 (shandle != NULL) && (shandle->externalizer)) 236 kret = (*shandle->externalizer)(kcontext, arg, buffer, lenremain); 237 return(kret); 238} 239 240static krb5_error_code 241krb5_keytab_internalize(krb5_context kcontext, krb5_pointer *argp, krb5_octet **buffer, size_t *lenremain) 242{ 243 krb5_error_code kret; 244 krb5_ser_handle shandle; 245 246 kret = EINVAL; 247 /* Solaris Kerberos */ 248 shandle = (krb5_ser_handle) krb5_kt_dfl_ops.serializer; 249 if ((shandle != NULL) && (shandle->internalizer)) 250 kret = (*shandle->internalizer)(kcontext, argp, buffer, lenremain); 251 return(kret); 252} 253 254krb5_error_code KRB5_CALLCONV 255krb5_ser_keytab_init(krb5_context kcontext) 256{ 257 return(krb5_register_serializer(kcontext, &krb5_keytab_ser_entry)); 258} 259