|
|
749169 |
From b3472e687181719dec6561c96aca6036b34865a5 Mon Sep 17 00:00:00 2001
|
|
|
665228 |
From: Greg Hudson <ghudson@mit.edu>
|
|
|
665228 |
Date: Tue, 20 Dec 2016 16:06:24 -0500
|
|
|
665228 |
Subject: [PATCH] Properly scope per-request preauth data
|
|
|
665228 |
|
|
|
665228 |
It should be possible to successfully use multiple initial credentials
|
|
|
665228 |
contexts with the same library context. Create a new internal type
|
|
|
665228 |
krb5_preauth_req_context containing per-request preauth state,
|
|
|
665228 |
including the clpreauth modreq handles and the list of preauth types
|
|
|
665228 |
already tried. Remove this state from clpreauth_handle and
|
|
|
665228 |
krb5_preauth_context.
|
|
|
665228 |
|
|
|
665228 |
ticket: 7877
|
|
|
665228 |
(cherry picked from commit b061f419cfc9653b7549b905e54fbbd78deea49e)
|
|
|
665228 |
---
|
|
|
665228 |
src/include/k5-trace.h | 3 +
|
|
|
665228 |
src/lib/krb5/krb/get_in_tkt.c | 12 +-
|
|
|
665228 |
src/lib/krb5/krb/init_creds_ctx.h | 3 +
|
|
|
665228 |
src/lib/krb5/krb/int-proto.h | 8 +-
|
|
|
665228 |
src/lib/krb5/krb/preauth2.c | 190 +++++++++++++++++++-----------
|
|
|
665228 |
5 files changed, 135 insertions(+), 81 deletions(-)
|
|
|
665228 |
|
|
|
665228 |
diff --git a/src/include/k5-trace.h b/src/include/k5-trace.h
|
|
|
665228 |
index 2885408a2..f44f162d3 100644
|
|
|
665228 |
--- a/src/include/k5-trace.h
|
|
|
665228 |
+++ b/src/include/k5-trace.h
|
|
|
665228 |
@@ -291,6 +291,9 @@ void krb5int_trace(krb5_context context, const char *fmt, ...);
|
|
|
665228 |
TRACE(c, "Preauth tryagain input types: {patypes}", padata)
|
|
|
665228 |
#define TRACE_PREAUTH_TRYAGAIN_OUTPUT(c, padata) \
|
|
|
665228 |
TRACE(c, "Followup preauth for next request: {patypes}", padata)
|
|
|
665228 |
+#define TRACE_PREAUTH_WRONG_CONTEXT(c) \
|
|
|
665228 |
+ TRACE(c, "Wrong context passed to krb5_init_creds_free(); leaking " \
|
|
|
665228 |
+ "modreq objects")
|
|
|
665228 |
|
|
|
665228 |
#define TRACE_PROFILE_ERR(c,subsection, section, retval) \
|
|
|
665228 |
TRACE(c, "Bad value of {str} from [{str}] in conf file: {kerr}", \
|
|
|
665228 |
diff --git a/src/lib/krb5/krb/get_in_tkt.c b/src/lib/krb5/krb/get_in_tkt.c
|
|
|
665228 |
index ed15550f0..80f5e1870 100644
|
|
|
665228 |
--- a/src/lib/krb5/krb/get_in_tkt.c
|
|
|
665228 |
+++ b/src/lib/krb5/krb/get_in_tkt.c
|
|
|
665228 |
@@ -565,7 +565,7 @@ krb5_init_creds_free(krb5_context context,
|
|
|
665228 |
k5_response_items_free(ctx->rctx.items);
|
|
|
665228 |
free(ctx->in_tkt_service);
|
|
|
665228 |
zapfree(ctx->gakpw.storage.data, ctx->gakpw.storage.length);
|
|
|
665228 |
- k5_preauth_request_context_fini(context);
|
|
|
665228 |
+ k5_preauth_request_context_fini(context, ctx);
|
|
|
665228 |
krb5_free_error(context, ctx->err_reply);
|
|
|
665228 |
krb5_free_pa_data(context, ctx->err_padata);
|
|
|
665228 |
krb5_free_cred_contents(context, &ctx->cred);
|
|
|
665228 |
@@ -816,8 +816,8 @@ restart_init_creds_loop(krb5_context context, krb5_init_creds_context ctx,
|
|
|
665228 |
if (fast_upgrade)
|
|
|
665228 |
ctx->fast_state->fast_state_flags |= KRB5INT_FAST_DO_FAST;
|
|
|
665228 |
|
|
|
665228 |
- k5_preauth_request_context_fini(context);
|
|
|
665228 |
- k5_preauth_request_context_init(context);
|
|
|
665228 |
+ k5_preauth_request_context_fini(context, ctx);
|
|
|
665228 |
+ k5_preauth_request_context_init(context, ctx);
|
|
|
665228 |
krb5_free_data(context, ctx->outer_request_body);
|
|
|
665228 |
ctx->outer_request_body = NULL;
|
|
|
665228 |
if (ctx->opt->flags & KRB5_GET_INIT_CREDS_OPT_PREAUTH_LIST) {
|
|
|
665228 |
@@ -1504,7 +1504,7 @@ init_creds_step_reply(krb5_context context,
|
|
|
665228 |
} else if ((reply_code == KDC_ERR_MORE_PREAUTH_DATA_REQUIRED ||
|
|
|
665228 |
reply_code == KDC_ERR_PREAUTH_REQUIRED) && retry) {
|
|
|
665228 |
/* reset the list of preauth types to try */
|
|
|
665228 |
- k5_reset_preauth_types_tried(context);
|
|
|
665228 |
+ k5_reset_preauth_types_tried(ctx);
|
|
|
665228 |
krb5_free_pa_data(context, ctx->preauth_to_use);
|
|
|
665228 |
ctx->preauth_to_use = ctx->err_padata;
|
|
|
665228 |
ctx->err_padata = NULL;
|
|
|
665228 |
@@ -1555,7 +1555,7 @@ init_creds_step_reply(krb5_context context,
|
|
|
665228 |
goto cleanup;
|
|
|
665228 |
|
|
|
665228 |
/* process any preauth data in the as_reply */
|
|
|
665228 |
- k5_reset_preauth_types_tried(context);
|
|
|
665228 |
+ k5_reset_preauth_types_tried(ctx);
|
|
|
665228 |
code = krb5int_fast_process_response(context, ctx->fast_state,
|
|
|
665228 |
ctx->reply, &strengthen_key);
|
|
|
665228 |
if (code != 0)
|
|
|
665228 |
@@ -1640,7 +1640,7 @@ init_creds_step_reply(krb5_context context,
|
|
|
665228 |
k5_prependmsg(context, code, _("Failed to store credentials"));
|
|
|
665228 |
}
|
|
|
665228 |
|
|
|
665228 |
- k5_preauth_request_context_fini(context);
|
|
|
665228 |
+ k5_preauth_request_context_fini(context, ctx);
|
|
|
665228 |
|
|
|
665228 |
/* success */
|
|
|
665228 |
ctx->complete = TRUE;
|
|
|
665228 |
diff --git a/src/lib/krb5/krb/init_creds_ctx.h b/src/lib/krb5/krb/init_creds_ctx.h
|
|
|
665228 |
index 38c01c775..a7cded942 100644
|
|
|
665228 |
--- a/src/lib/krb5/krb/init_creds_ctx.h
|
|
|
665228 |
+++ b/src/lib/krb5/krb/init_creds_ctx.h
|
|
|
665228 |
@@ -6,6 +6,8 @@
|
|
|
665228 |
#include "k5-json.h"
|
|
|
665228 |
#include "int-proto.h"
|
|
|
665228 |
|
|
|
665228 |
+typedef struct krb5_preauth_req_context_st *krb5_preauth_req_context;
|
|
|
665228 |
+
|
|
|
665228 |
struct krb5_responder_context_st {
|
|
|
665228 |
k5_response_items *items;
|
|
|
665228 |
};
|
|
|
665228 |
@@ -67,6 +69,7 @@ struct _krb5_init_creds_context {
|
|
|
665228 |
krb5_timestamp pa_offset;
|
|
|
665228 |
krb5_int32 pa_offset_usec;
|
|
|
665228 |
enum { NO_OFFSET = 0, UNAUTH_OFFSET, AUTH_OFFSET } pa_offset_state;
|
|
|
665228 |
+ krb5_preauth_req_context preauth_reqctx;
|
|
|
665228 |
};
|
|
|
665228 |
|
|
|
665228 |
krb5_error_code
|
|
|
665228 |
diff --git a/src/lib/krb5/krb/int-proto.h b/src/lib/krb5/krb/int-proto.h
|
|
|
665228 |
index 9c746d05b..f1667c238 100644
|
|
|
665228 |
--- a/src/lib/krb5/krb/int-proto.h
|
|
|
665228 |
+++ b/src/lib/krb5/krb/int-proto.h
|
|
|
665228 |
@@ -194,17 +194,19 @@ void
|
|
|
665228 |
k5_free_preauth_context(krb5_context context);
|
|
|
665228 |
|
|
|
665228 |
void
|
|
|
665228 |
-k5_reset_preauth_types_tried(krb5_context context);
|
|
|
665228 |
+k5_reset_preauth_types_tried(krb5_init_creds_context ctx);
|
|
|
665228 |
|
|
|
665228 |
void
|
|
|
665228 |
k5_preauth_prepare_request(krb5_context context, krb5_get_init_creds_opt *opt,
|
|
|
665228 |
krb5_kdc_req *request);
|
|
|
665228 |
|
|
|
665228 |
void
|
|
|
665228 |
-k5_preauth_request_context_init(krb5_context context);
|
|
|
665228 |
+k5_preauth_request_context_init(krb5_context context,
|
|
|
665228 |
+ krb5_init_creds_context ctx);
|
|
|
665228 |
|
|
|
665228 |
void
|
|
|
665228 |
-k5_preauth_request_context_fini(krb5_context context);
|
|
|
665228 |
+k5_preauth_request_context_fini(krb5_context context,
|
|
|
665228 |
+ krb5_init_creds_context ctx);
|
|
|
665228 |
|
|
|
665228 |
krb5_error_code
|
|
|
665228 |
k5_response_items_new(k5_response_items **ri_out);
|
|
|
665228 |
diff --git a/src/lib/krb5/krb/preauth2.c b/src/lib/krb5/krb/preauth2.c
|
|
|
665228 |
index b04d14829..9a178f4e3 100644
|
|
|
665228 |
--- a/src/lib/krb5/krb/preauth2.c
|
|
|
665228 |
+++ b/src/lib/krb5/krb/preauth2.c
|
|
|
665228 |
@@ -46,14 +46,18 @@
|
|
|
665228 |
typedef struct {
|
|
|
665228 |
struct krb5_clpreauth_vtable_st vt;
|
|
|
665228 |
krb5_clpreauth_moddata data;
|
|
|
665228 |
- krb5_clpreauth_modreq req;
|
|
|
665228 |
} *clpreauth_handle;
|
|
|
665228 |
|
|
|
665228 |
struct krb5_preauth_context_st {
|
|
|
665228 |
- krb5_preauthtype *tried;
|
|
|
665228 |
clpreauth_handle *handles;
|
|
|
665228 |
};
|
|
|
665228 |
|
|
|
665228 |
+struct krb5_preauth_req_context_st {
|
|
|
665228 |
+ krb5_context orig_context;
|
|
|
665228 |
+ krb5_preauthtype *tried;
|
|
|
665228 |
+ krb5_clpreauth_modreq *modreqs;
|
|
|
665228 |
+};
|
|
|
665228 |
+
|
|
|
665228 |
/* Release the memory used by a list of handles. */
|
|
|
665228 |
static void
|
|
|
665228 |
free_handles(krb5_context context, clpreauth_handle *handles)
|
|
|
665228 |
@@ -71,21 +75,44 @@ free_handles(krb5_context context, clpreauth_handle *handles)
|
|
|
665228 |
free(handles);
|
|
|
665228 |
}
|
|
|
665228 |
|
|
|
665228 |
-/* Find the handle in handles which can process pa_type. */
|
|
|
665228 |
-static clpreauth_handle
|
|
|
665228 |
-find_module(clpreauth_handle *handles, krb5_preauthtype pa_type)
|
|
|
665228 |
+/* Return an index into handles which can process pa_type, or -1 if none is
|
|
|
665228 |
+ * found found. */
|
|
|
665228 |
+static int
|
|
|
665228 |
+search_module_list(clpreauth_handle *handles, krb5_preauthtype pa_type)
|
|
|
665228 |
{
|
|
|
665228 |
- clpreauth_handle *hp, h;
|
|
|
665228 |
- krb5_preauthtype *tp;
|
|
|
665228 |
+ clpreauth_handle h;
|
|
|
665228 |
+ int i, j;
|
|
|
665228 |
|
|
|
665228 |
- for (hp = handles; *hp != NULL; hp++) {
|
|
|
665228 |
- h = *hp;
|
|
|
665228 |
- for (tp = h->vt.pa_type_list; *tp != 0; tp++) {
|
|
|
665228 |
- if (*tp == pa_type)
|
|
|
665228 |
- return h;
|
|
|
665228 |
+ for (i = 0; handles[i] != NULL; i++) {
|
|
|
665228 |
+ h = handles[i];
|
|
|
665228 |
+ for (j = 0; h->vt.pa_type_list[j] != 0; j++) {
|
|
|
665228 |
+ if (h->vt.pa_type_list[j] == pa_type)
|
|
|
665228 |
+ return i;
|
|
|
665228 |
}
|
|
|
665228 |
}
|
|
|
665228 |
- return FALSE;
|
|
|
665228 |
+ return -1;
|
|
|
665228 |
+}
|
|
|
665228 |
+
|
|
|
665228 |
+/* Find the handle which can process pa_type, or NULL if none is found. On
|
|
|
665228 |
+ * success, set *modreq_out to the corresponding per-request module data. */
|
|
|
665228 |
+static clpreauth_handle
|
|
|
665228 |
+find_module(krb5_context context, krb5_init_creds_context ctx,
|
|
|
665228 |
+ krb5_preauthtype pa_type, krb5_clpreauth_modreq *modreq_out)
|
|
|
665228 |
+{
|
|
|
665228 |
+ krb5_preauth_context pctx = context->preauth_context;
|
|
|
665228 |
+ krb5_preauth_req_context reqctx = ctx->preauth_reqctx;
|
|
|
665228 |
+ int i;
|
|
|
665228 |
+
|
|
|
665228 |
+ *modreq_out = NULL;
|
|
|
665228 |
+ if (pctx == NULL || reqctx == NULL)
|
|
|
665228 |
+ return NULL;
|
|
|
665228 |
+
|
|
|
665228 |
+ i = search_module_list(pctx->handles, pa_type);
|
|
|
665228 |
+ if (i == -1)
|
|
|
665228 |
+ return NULL;
|
|
|
665228 |
+
|
|
|
665228 |
+ *modreq_out = reqctx->modreqs[i];
|
|
|
665228 |
+ return pctx->handles[i];
|
|
|
665228 |
}
|
|
|
665228 |
|
|
|
665228 |
/* Initialize the preauth state for a krb5 context. */
|
|
|
665228 |
@@ -93,7 +120,8 @@ void
|
|
|
665228 |
k5_init_preauth_context(krb5_context context)
|
|
|
665228 |
{
|
|
|
665228 |
krb5_plugin_initvt_fn *modules = NULL, *mod;
|
|
|
665228 |
- clpreauth_handle *list = NULL, h, h2;
|
|
|
665228 |
+ clpreauth_handle *list = NULL, h;
|
|
|
665228 |
+ int i;
|
|
|
665228 |
size_t count;
|
|
|
665228 |
krb5_preauthtype *tp;
|
|
|
665228 |
|
|
|
665228 |
@@ -140,9 +168,10 @@ k5_init_preauth_context(krb5_context context)
|
|
|
665228 |
|
|
|
665228 |
/* Check for a preauth type conflict with an existing module. */
|
|
|
665228 |
for (tp = h->vt.pa_type_list; *tp != 0; tp++) {
|
|
|
665228 |
- h2 = find_module(list, *tp);
|
|
|
665228 |
- if (h2 != NULL) {
|
|
|
665228 |
- TRACE_PREAUTH_CONFLICT(context, h->vt.name, h2->vt.name, *tp);
|
|
|
665228 |
+ i = search_module_list(list, *tp);
|
|
|
665228 |
+ if (i != -1) {
|
|
|
665228 |
+ TRACE_PREAUTH_CONFLICT(context, h->vt.name, list[i]->vt.name,
|
|
|
665228 |
+ *tp);
|
|
|
665228 |
break;
|
|
|
665228 |
}
|
|
|
665228 |
}
|
|
|
665228 |
@@ -164,7 +193,6 @@ k5_init_preauth_context(krb5_context context)
|
|
|
665228 |
context->preauth_context = malloc(sizeof(*context->preauth_context));
|
|
|
665228 |
if (context->preauth_context == NULL)
|
|
|
665228 |
goto cleanup;
|
|
|
665228 |
- context->preauth_context->tried = NULL;
|
|
|
665228 |
context->preauth_context->handles = list;
|
|
|
665228 |
list = NULL;
|
|
|
665228 |
|
|
|
665228 |
@@ -179,14 +207,14 @@ cleanup:
|
|
|
665228 |
* AS-REP).
|
|
|
665228 |
*/
|
|
|
665228 |
void
|
|
|
665228 |
-k5_reset_preauth_types_tried(krb5_context context)
|
|
|
665228 |
+k5_reset_preauth_types_tried(krb5_init_creds_context ctx)
|
|
|
665228 |
{
|
|
|
665228 |
- krb5_preauth_context pctx = context->preauth_context;
|
|
|
665228 |
+ krb5_preauth_req_context reqctx = ctx->preauth_reqctx;
|
|
|
665228 |
|
|
|
665228 |
- if (pctx == NULL)
|
|
|
665228 |
+ if (reqctx == NULL)
|
|
|
665228 |
return;
|
|
|
665228 |
- free(pctx->tried);
|
|
|
665228 |
- pctx->tried = NULL;
|
|
|
665228 |
+ free(reqctx->tried);
|
|
|
665228 |
+ reqctx->tried = NULL;
|
|
|
665228 |
}
|
|
|
665228 |
|
|
|
665228 |
|
|
|
665228 |
@@ -200,7 +228,6 @@ k5_free_preauth_context(krb5_context context)
|
|
|
665228 |
|
|
|
665228 |
if (pctx == NULL)
|
|
|
665228 |
return;
|
|
|
665228 |
- free(pctx->tried);
|
|
|
665228 |
free_handles(context, pctx->handles);
|
|
|
665228 |
free(pctx);
|
|
|
665228 |
context->preauth_context = NULL;
|
|
|
665228 |
@@ -209,10 +236,13 @@ k5_free_preauth_context(krb5_context context)
|
|
|
665228 |
/* Initialize the per-AS-REQ context. This means calling the client_req_init
|
|
|
665228 |
* function to give the plugin a chance to allocate a per-request context. */
|
|
|
665228 |
void
|
|
|
665228 |
-k5_preauth_request_context_init(krb5_context context)
|
|
|
665228 |
+k5_preauth_request_context_init(krb5_context context,
|
|
|
665228 |
+ krb5_init_creds_context ctx)
|
|
|
665228 |
{
|
|
|
665228 |
krb5_preauth_context pctx = context->preauth_context;
|
|
|
665228 |
- clpreauth_handle *hp, h;
|
|
|
665228 |
+ clpreauth_handle h;
|
|
|
665228 |
+ krb5_preauth_req_context reqctx;
|
|
|
665228 |
+ size_t count, i;
|
|
|
665228 |
|
|
|
665228 |
if (pctx == NULL) {
|
|
|
665228 |
k5_init_preauth_context(context);
|
|
|
665228 |
@@ -220,30 +250,50 @@ k5_preauth_request_context_init(krb5_context context)
|
|
|
665228 |
if (pctx == NULL)
|
|
|
665228 |
return;
|
|
|
665228 |
}
|
|
|
665228 |
- k5_reset_preauth_types_tried(context);
|
|
|
665228 |
- for (hp = pctx->handles; *hp != NULL; hp++) {
|
|
|
665228 |
- h = *hp;
|
|
|
665228 |
+
|
|
|
665228 |
+ reqctx = calloc(1, sizeof(*reqctx));
|
|
|
665228 |
+ if (reqctx == NULL)
|
|
|
665228 |
+ return;
|
|
|
665228 |
+ reqctx->orig_context = context;
|
|
|
665228 |
+
|
|
|
665228 |
+ /* Create an array of per-request module data objects corresponding to the
|
|
|
665228 |
+ * preauth context's array of handles. */
|
|
|
665228 |
+ for (count = 0; pctx->handles[count] != NULL; count++);
|
|
|
665228 |
+ reqctx->modreqs = calloc(count, sizeof(*reqctx->modreqs));
|
|
|
665228 |
+ for (i = 0; i < count; i++) {
|
|
|
665228 |
+ h = pctx->handles[i];
|
|
|
665228 |
if (h->vt.request_init != NULL)
|
|
|
665228 |
- h->vt.request_init(context, h->data, &h->req);
|
|
|
665228 |
+ h->vt.request_init(context, h->data, &reqctx->modreqs[i]);
|
|
|
665228 |
}
|
|
|
665228 |
+ ctx->preauth_reqctx = reqctx;
|
|
|
665228 |
}
|
|
|
665228 |
|
|
|
665228 |
/* Free the per-AS-REQ context. This means clearing any request-specific
|
|
|
665228 |
* context which the plugin may have created. */
|
|
|
665228 |
void
|
|
|
665228 |
-k5_preauth_request_context_fini(krb5_context context)
|
|
|
665228 |
+k5_preauth_request_context_fini(krb5_context context,
|
|
|
665228 |
+ krb5_init_creds_context ctx)
|
|
|
665228 |
{
|
|
|
665228 |
krb5_preauth_context pctx = context->preauth_context;
|
|
|
665228 |
- clpreauth_handle *hp, h;
|
|
|
665228 |
+ krb5_preauth_req_context reqctx = ctx->preauth_reqctx;
|
|
|
665228 |
+ size_t i;
|
|
|
665228 |
+ clpreauth_handle h;
|
|
|
665228 |
|
|
|
665228 |
- if (pctx == NULL)
|
|
|
665228 |
+ if (reqctx == NULL)
|
|
|
665228 |
return;
|
|
|
665228 |
- for (hp = pctx->handles; *hp != NULL; hp++) {
|
|
|
665228 |
- h = *hp;
|
|
|
665228 |
- if (h->req != NULL && h->vt.request_fini != NULL)
|
|
|
665228 |
- h->vt.request_fini(context, h->data, h->req);
|
|
|
665228 |
- h->req = NULL;
|
|
|
665228 |
+ if (reqctx->orig_context == context && pctx != NULL) {
|
|
|
665228 |
+ for (i = 0; pctx->handles[i] != NULL; i++) {
|
|
|
665228 |
+ h = pctx->handles[i];
|
|
|
665228 |
+ if (reqctx->modreqs[i] != NULL && h->vt.request_fini != NULL)
|
|
|
665228 |
+ h->vt.request_fini(context, h->data, reqctx->modreqs[i]);
|
|
|
665228 |
+ }
|
|
|
665228 |
+ } else {
|
|
|
665228 |
+ TRACE_PREAUTH_WRONG_CONTEXT(context);
|
|
|
665228 |
}
|
|
|
665228 |
+ free(reqctx->modreqs);
|
|
|
665228 |
+ free(reqctx->tried);
|
|
|
665228 |
+ free(reqctx);
|
|
|
665228 |
+ ctx->preauth_reqctx = NULL;
|
|
|
665228 |
}
|
|
|
665228 |
|
|
|
665228 |
/* Return 1 if pa_type is a real preauthentication mechanism according to the
|
|
|
665228 |
@@ -259,6 +309,7 @@ clpreauth_is_real(krb5_context context, clpreauth_handle h,
|
|
|
665228 |
|
|
|
665228 |
static krb5_error_code
|
|
|
665228 |
clpreauth_prep_questions(krb5_context context, clpreauth_handle h,
|
|
|
665228 |
+ krb5_clpreauth_modreq modreq,
|
|
|
665228 |
krb5_get_init_creds_opt *opt,
|
|
|
665228 |
krb5_clpreauth_callbacks cb, krb5_clpreauth_rock rock,
|
|
|
665228 |
krb5_kdc_req *req, krb5_data *req_body,
|
|
|
665228 |
@@ -266,35 +317,35 @@ clpreauth_prep_questions(krb5_context context, clpreauth_handle h,
|
|
|
665228 |
{
|
|
|
665228 |
if (h->vt.prep_questions == NULL)
|
|
|
665228 |
return 0;
|
|
|
665228 |
- return h->vt.prep_questions(context, h->data, h->req, opt, cb, rock, req,
|
|
|
665228 |
+ return h->vt.prep_questions(context, h->data, modreq, opt, cb, rock, req,
|
|
|
665228 |
req_body, prev_req, pa_data);
|
|
|
665228 |
}
|
|
|
665228 |
|
|
|
665228 |
static krb5_error_code
|
|
|
665228 |
clpreauth_process(krb5_context context, clpreauth_handle h,
|
|
|
665228 |
- krb5_get_init_creds_opt *opt, krb5_clpreauth_callbacks cb,
|
|
|
665228 |
- krb5_clpreauth_rock rock, krb5_kdc_req *req,
|
|
|
665228 |
- krb5_data *req_body, krb5_data *prev_req,
|
|
|
665228 |
+ krb5_clpreauth_modreq modreq, krb5_get_init_creds_opt *opt,
|
|
|
665228 |
+ krb5_clpreauth_callbacks cb, krb5_clpreauth_rock rock,
|
|
|
665228 |
+ krb5_kdc_req *req, krb5_data *req_body, krb5_data *prev_req,
|
|
|
665228 |
krb5_pa_data *pa_data, krb5_prompter_fct prompter,
|
|
|
665228 |
void *prompter_data, krb5_pa_data ***pa_data_out)
|
|
|
665228 |
{
|
|
|
665228 |
- return h->vt.process(context, h->data, h->req, opt, cb, rock, req,
|
|
|
665228 |
+ return h->vt.process(context, h->data, modreq, opt, cb, rock, req,
|
|
|
665228 |
req_body, prev_req, pa_data, prompter, prompter_data,
|
|
|
665228 |
pa_data_out);
|
|
|
665228 |
}
|
|
|
665228 |
|
|
|
665228 |
static krb5_error_code
|
|
|
665228 |
clpreauth_tryagain(krb5_context context, clpreauth_handle h,
|
|
|
665228 |
- krb5_get_init_creds_opt *opt, krb5_clpreauth_callbacks cb,
|
|
|
665228 |
- krb5_clpreauth_rock rock, krb5_kdc_req *req,
|
|
|
665228 |
- krb5_data *req_body, krb5_data *prev_req,
|
|
|
665228 |
+ krb5_clpreauth_modreq modreq, krb5_get_init_creds_opt *opt,
|
|
|
665228 |
+ krb5_clpreauth_callbacks cb, krb5_clpreauth_rock rock,
|
|
|
665228 |
+ krb5_kdc_req *req, krb5_data *req_body, krb5_data *prev_req,
|
|
|
665228 |
krb5_preauthtype pa_type, krb5_error *error,
|
|
|
665228 |
krb5_pa_data **error_padata, krb5_prompter_fct prompter,
|
|
|
665228 |
void *prompter_data, krb5_pa_data ***pa_data_out)
|
|
|
665228 |
{
|
|
|
665228 |
if (h->vt.tryagain == NULL)
|
|
|
665228 |
return 0;
|
|
|
665228 |
- return h->vt.tryagain(context, h->data, h->req, opt, cb, rock, req,
|
|
|
665228 |
+ return h->vt.tryagain(context, h->data, modreq, opt, cb, rock, req,
|
|
|
665228 |
req_body, prev_req, pa_type, error, error_padata,
|
|
|
665228 |
prompter, prompter_data, pa_data_out);
|
|
|
665228 |
}
|
|
|
665228 |
@@ -554,22 +605,22 @@ pa_type_allowed(krb5_init_creds_context ctx, krb5_preauthtype pa_type)
|
|
|
665228 |
* types and return false.
|
|
|
665228 |
*/
|
|
|
665228 |
static krb5_boolean
|
|
|
665228 |
-already_tried(krb5_context context, krb5_preauthtype pa_type)
|
|
|
665228 |
+already_tried(krb5_init_creds_context ctx, krb5_preauthtype pa_type)
|
|
|
665228 |
{
|
|
|
665228 |
- krb5_preauth_context pctx = context->preauth_context;
|
|
|
665228 |
- size_t count;
|
|
|
665228 |
+ krb5_preauth_req_context reqctx = ctx->preauth_reqctx;
|
|
|
665228 |
+ size_t i;
|
|
|
665228 |
krb5_preauthtype *newptr;
|
|
|
665228 |
|
|
|
665228 |
- for (count = 0; pctx->tried != NULL && pctx->tried[count] != 0; count++) {
|
|
|
665228 |
- if (pctx->tried[count] == pa_type)
|
|
|
665228 |
+ for (i = 0; reqctx->tried != NULL && reqctx->tried[i] != 0; i++) {
|
|
|
665228 |
+ if (reqctx->tried[i] == pa_type)
|
|
|
665228 |
return TRUE;
|
|
|
665228 |
}
|
|
|
665228 |
- newptr = realloc(pctx->tried, (count + 2) * sizeof(*newptr));
|
|
|
665228 |
+ newptr = realloc(reqctx->tried, (i + 2) * sizeof(*newptr));
|
|
|
665228 |
if (newptr == NULL)
|
|
|
665228 |
return FALSE;
|
|
|
665228 |
- pctx->tried = newptr;
|
|
|
665228 |
- pctx->tried[count] = pa_type;
|
|
|
665228 |
- pctx->tried[count + 1] = ENCTYPE_NULL;
|
|
|
665228 |
+ reqctx->tried = newptr;
|
|
|
665228 |
+ reqctx->tried[i] = pa_type;
|
|
|
665228 |
+ reqctx->tried[i + 1] = ENCTYPE_NULL;
|
|
|
665228 |
return FALSE;
|
|
|
665228 |
}
|
|
|
665228 |
|
|
|
665228 |
@@ -580,16 +631,13 @@ process_pa_data(krb5_context context, krb5_init_creds_context ctx,
|
|
|
665228 |
krb5_pa_data ***out_pa_list, int *out_pa_list_size,
|
|
|
665228 |
krb5_preauthtype *out_type)
|
|
|
665228 |
{
|
|
|
665228 |
- krb5_preauth_context pctx = context->preauth_context;
|
|
|
665228 |
struct errinfo save = EMPTY_ERRINFO;
|
|
|
665228 |
krb5_pa_data *pa, **pa_ptr, **mod_pa;
|
|
|
665228 |
krb5_error_code ret = 0;
|
|
|
665228 |
+ krb5_clpreauth_modreq modreq;
|
|
|
665228 |
clpreauth_handle h;
|
|
|
665228 |
int real, i;
|
|
|
665228 |
|
|
|
665228 |
- if (pctx == NULL)
|
|
|
665228 |
- return ENOENT;
|
|
|
665228 |
-
|
|
|
665228 |
/* Process all informational padata types, then the first real preauth type
|
|
|
665228 |
* we succeed on. */
|
|
|
665228 |
for (real = 0; real <= 1; real++) {
|
|
|
665228 |
@@ -598,17 +646,17 @@ process_pa_data(krb5_context context, krb5_init_creds_context ctx,
|
|
|
665228 |
/* Restrict real mechanisms to the chosen one if we have one. */
|
|
|
665228 |
if (real && !pa_type_allowed(ctx, pa->pa_type))
|
|
|
665228 |
continue;
|
|
|
665228 |
- h = find_module(pctx->handles, pa->pa_type);
|
|
|
665228 |
+ h = find_module(context, ctx, pa->pa_type, &modreq);
|
|
|
665228 |
if (h == NULL)
|
|
|
665228 |
continue;
|
|
|
665228 |
/* Make sure this type is for the current pass. */
|
|
|
665228 |
if (clpreauth_is_real(context, h, pa->pa_type) != real)
|
|
|
665228 |
continue;
|
|
|
665228 |
/* Only try a real mechanism once per authentication. */
|
|
|
665228 |
- if (real && already_tried(context, pa->pa_type))
|
|
|
665228 |
+ if (real && already_tried(ctx, pa->pa_type))
|
|
|
665228 |
continue;
|
|
|
665228 |
mod_pa = NULL;
|
|
|
665228 |
- ret = clpreauth_process(context, h, ctx->opt, &callbacks,
|
|
|
665228 |
+ ret = clpreauth_process(context, h, modreq, ctx->opt, &callbacks,
|
|
|
665228 |
(krb5_clpreauth_rock)ctx, ctx->request,
|
|
|
665228 |
ctx->inner_request_body,
|
|
|
665228 |
ctx->encoded_previous_request, pa,
|
|
|
665228 |
@@ -858,24 +906,22 @@ krb5_error_code
|
|
|
665228 |
k5_preauth_tryagain(krb5_context context, krb5_init_creds_context ctx,
|
|
|
665228 |
krb5_pa_data **in_padata, krb5_pa_data ***padata_out)
|
|
|
665228 |
{
|
|
|
665228 |
- krb5_preauth_context pctx = context->preauth_context;
|
|
|
665228 |
krb5_error_code ret;
|
|
|
665228 |
krb5_pa_data **mod_pa;
|
|
|
665228 |
+ krb5_clpreauth_modreq modreq;
|
|
|
665228 |
clpreauth_handle h;
|
|
|
665228 |
int i;
|
|
|
665228 |
|
|
|
665228 |
*padata_out = NULL;
|
|
|
665228 |
- if (pctx == NULL)
|
|
|
665228 |
- return KRB5KRB_ERR_GENERIC;
|
|
|
665228 |
|
|
|
665228 |
TRACE_PREAUTH_TRYAGAIN_INPUT(context, in_padata);
|
|
|
665228 |
|
|
|
665228 |
for (i = 0; in_padata[i] != NULL; i++) {
|
|
|
665228 |
- h = find_module(pctx->handles, in_padata[i]->pa_type);
|
|
|
665228 |
+ h = find_module(context, ctx, in_padata[i]->pa_type, &modreq);
|
|
|
665228 |
if (h == NULL)
|
|
|
665228 |
continue;
|
|
|
665228 |
mod_pa = NULL;
|
|
|
665228 |
- ret = clpreauth_tryagain(context, h, ctx->opt, &callbacks,
|
|
|
665228 |
+ ret = clpreauth_tryagain(context, h, modreq, ctx->opt, &callbacks,
|
|
|
665228 |
(krb5_clpreauth_rock)ctx, ctx->request,
|
|
|
665228 |
ctx->inner_request_body,
|
|
|
665228 |
ctx->encoded_previous_request,
|
|
|
665228 |
@@ -897,9 +943,9 @@ static krb5_error_code
|
|
|
665228 |
fill_response_items(krb5_context context, krb5_init_creds_context ctx,
|
|
|
665228 |
krb5_pa_data **in_padata)
|
|
|
665228 |
{
|
|
|
665228 |
- krb5_preauth_context pctx = context->preauth_context;
|
|
|
665228 |
krb5_error_code ret;
|
|
|
665228 |
krb5_pa_data *pa;
|
|
|
665228 |
+ krb5_clpreauth_modreq modreq;
|
|
|
665228 |
clpreauth_handle h;
|
|
|
665228 |
int i;
|
|
|
665228 |
|
|
|
665228 |
@@ -908,11 +954,11 @@ fill_response_items(krb5_context context, krb5_init_creds_context ctx,
|
|
|
665228 |
pa = in_padata[i];
|
|
|
665228 |
if (!pa_type_allowed(ctx, pa->pa_type))
|
|
|
665228 |
continue;
|
|
|
665228 |
- h = find_module(pctx->handles, pa->pa_type);
|
|
|
665228 |
+ h = find_module(context, ctx, pa->pa_type, &modreq);
|
|
|
665228 |
if (h == NULL)
|
|
|
665228 |
continue;
|
|
|
665228 |
- ret = clpreauth_prep_questions(context, h, ctx->opt, &callbacks,
|
|
|
665228 |
- (krb5_clpreauth_rock)ctx,
|
|
|
665228 |
+ ret = clpreauth_prep_questions(context, h, modreq, ctx->opt,
|
|
|
665228 |
+ &callbacks, (krb5_clpreauth_rock)ctx,
|
|
|
665228 |
ctx->request, ctx->inner_request_body,
|
|
|
665228 |
ctx->encoded_previous_request, pa);
|
|
|
665228 |
if (ret)
|