1 /* 2 * Copyright (c) 1997 - 2001 Kungliga Tekniska Högskolan 3 * (Royal Institute of Technology, Stockholm, Sweden). 4 * All rights reserved. 5 * 6 * Portions Copyright (c) 2009 Apple Inc. All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 15 * 2. Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in the 17 * documentation and/or other materials provided with the distribution. 18 * 19 * 3. Neither the name of the Institute nor the names of its contributors 20 * may be used to endorse or promote products derived from this software 21 * without specific prior written permission. 22 * 23 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND 24 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 25 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 26 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE 27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 28 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 29 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 30 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 31 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 32 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 33 * SUCH DAMAGE. 34 */ 35 36 #define KRB5_KDB_DISALLOW_POSTDATED 0x00000001 37 #define KRB5_KDB_DISALLOW_FORWARDABLE 0x00000002 38 #define KRB5_KDB_DISALLOW_TGT_BASED 0x00000004 39 #define KRB5_KDB_DISALLOW_RENEWABLE 0x00000008 40 #define KRB5_KDB_DISALLOW_PROXIABLE 0x00000010 41 #define KRB5_KDB_DISALLOW_DUP_SKEY 0x00000020 42 #define KRB5_KDB_DISALLOW_ALL_TIX 0x00000040 43 #define KRB5_KDB_REQUIRES_PRE_AUTH 0x00000080 44 #define KRB5_KDB_REQUIRES_HW_AUTH 0x00000100 45 #define KRB5_KDB_REQUIRES_PWCHANGE 0x00000200 46 #define KRB5_KDB_DISALLOW_SVR 0x00001000 47 #define KRB5_KDB_PWCHANGE_SERVICE 0x00002000 48 #define KRB5_KDB_SUPPORT_DESMD5 0x00004000 49 #define KRB5_KDB_NEW_PRINC 0x00008000 50 51 /* 52 53 key: krb5_unparse_name + NUL 54 55 16: baselength 56 32: attributes 57 32: max time 58 32: max renewable time 59 32: client expire 60 32: passwd expire 61 32: last successful passwd 62 32: last failed attempt 63 32: num of failed attempts 64 16: num tl data 65 16: num data data 66 16: principal length 67 length: principal 68 for num tl data times 69 16: tl data type 70 16: tl data length 71 length: length 72 for num key data times 73 16: version (num keyblocks) 74 16: kvno 75 for version times: 76 16: type 77 16: length 78 length: keydata 79 80 81 key_data_contents[0] 82 83 int16: length 84 read-of-data: key-encrypted, key-usage 0, master-key 85 86 salt: 87 version2 = salt in key_data->key_data_contents[1] 88 else default salt. 89 90 */ 91 92 #include "hdb_locl.h" 93 94 #define KDB_V1_BASE_LENGTH 38 95 96 #if HAVE_DB1 97 98 #if defined(HAVE_DB_185_H) 99 #include <db_185.h> 100 #elif defined(HAVE_DB_H) 101 #include <db.h> 102 #endif 103 104 #define CHECK(x) do { if ((x)) goto out; } while(0) 105 106 static krb5_error_code 107 mdb_principal2key(krb5_context context, 108 krb5_const_principal principal, 109 krb5_data *key) 110 { 111 krb5_error_code ret; 112 char *str; 113 114 ret = krb5_unparse_name(context, principal, &str); 115 if (ret) 116 return ret; 117 key->data = str; 118 key->length = strlen(str) + 1; 119 return 0; 120 } 121 122 #define KRB5_KDB_SALTTYPE_NORMAL 0 123 #define KRB5_KDB_SALTTYPE_V4 1 124 #define KRB5_KDB_SALTTYPE_NOREALM 2 125 #define KRB5_KDB_SALTTYPE_ONLYREALM 3 126 #define KRB5_KDB_SALTTYPE_SPECIAL 4 127 #define KRB5_KDB_SALTTYPE_AFS3 5 128 #define KRB5_KDB_SALTTYPE_CERTHASH 6 129 130 static krb5_error_code 131 fix_salt(krb5_context context, hdb_entry *ent, int key_num) 132 { 133 krb5_error_code ret; 134 Salt *salt = ent->keys.val[key_num].salt; 135 /* fix salt type */ 136 switch((int)salt->type) { 137 case KRB5_KDB_SALTTYPE_NORMAL: 138 salt->type = KRB5_PADATA_PW_SALT; 139 break; 140 case KRB5_KDB_SALTTYPE_V4: 141 krb5_data_free(&salt->salt); 142 salt->type = KRB5_PADATA_PW_SALT; 143 break; 144 case KRB5_KDB_SALTTYPE_NOREALM: 145 { 146 size_t len; 147 size_t i; 148 char *p; 149 150 len = 0; 151 for (i = 0; i < ent->principal->name.name_string.len; ++i) 152 len += strlen(ent->principal->name.name_string.val[i]); 153 ret = krb5_data_alloc (&salt->salt, len); 154 if (ret) 155 return ret; 156 p = salt->salt.data; 157 for (i = 0; i < ent->principal->name.name_string.len; ++i) { 158 memcpy (p, 159 ent->principal->name.name_string.val[i], 160 strlen(ent->principal->name.name_string.val[i])); 161 p += strlen(ent->principal->name.name_string.val[i]); 162 } 163 164 salt->type = KRB5_PADATA_PW_SALT; 165 break; 166 } 167 case KRB5_KDB_SALTTYPE_ONLYREALM: 168 krb5_data_free(&salt->salt); 169 ret = krb5_data_copy(&salt->salt, 170 ent->principal->realm, 171 strlen(ent->principal->realm)); 172 if(ret) 173 return ret; 174 salt->type = KRB5_PADATA_PW_SALT; 175 break; 176 case KRB5_KDB_SALTTYPE_SPECIAL: 177 salt->type = KRB5_PADATA_PW_SALT; 178 break; 179 case KRB5_KDB_SALTTYPE_AFS3: 180 krb5_data_free(&salt->salt); 181 ret = krb5_data_copy(&salt->salt, 182 ent->principal->realm, 183 strlen(ent->principal->realm)); 184 if(ret) 185 return ret; 186 salt->type = KRB5_PADATA_AFS3_SALT; 187 break; 188 case KRB5_KDB_SALTTYPE_CERTHASH: 189 krb5_data_free(&salt->salt); 190 free(ent->keys.val[key_num].salt); 191 ent->keys.val[key_num].salt = NULL; 192 break; 193 default: 194 abort(); 195 } 196 return 0; 197 } 198 199 200 static krb5_error_code 201 mdb_value2entry(krb5_context context, krb5_data *data, krb5_kvno kvno, hdb_entry *entry) 202 { 203 krb5_error_code ret; 204 krb5_storage *sp; 205 uint32_t u32; 206 uint16_t u16, num_keys, num_tl; 207 size_t i, j; 208 char *p; 209 210 sp = krb5_storage_from_data(data); 211 if (sp == NULL) { 212 krb5_set_error_message(context, ENOMEM, "out of memory"); 213 return ENOMEM; 214 } 215 216 krb5_storage_set_byteorder(sp, KRB5_STORAGE_BYTEORDER_LE); 217 218 /* 219 * 16: baselength 220 * 221 * The story here is that these 16 bits have to be a constant: 222 * KDB_V1_BASE_LENGTH. Once upon a time a different value here 223 * would have been used to indicate the presence of "extra data" 224 * between the "base" contents and the {principal name, TL data, 225 * keys} that follow it. Nothing supports such "extra data" 226 * nowadays, so neither do we here. 227 * 228 * XXX But... surely we ought to log about this extra data, or skip 229 * it, or something, in case anyone has MIT KDBs with ancient 230 * entries in them... Logging would allow the admin to know which 231 * entries to dump with MIT krb5's kdb5_util. 232 */ 233 CHECK(ret = krb5_ret_uint16(sp, &u16)); 234 if (u16 != KDB_V1_BASE_LENGTH) { ret = EINVAL; goto out; } 235 /* 32: attributes */ 236 CHECK(ret = krb5_ret_uint32(sp, &u32)); 237 entry->flags.postdate = !(u32 & KRB5_KDB_DISALLOW_POSTDATED); 238 entry->flags.forwardable = !(u32 & KRB5_KDB_DISALLOW_FORWARDABLE); 239 entry->flags.initial = !!(u32 & KRB5_KDB_DISALLOW_TGT_BASED); 240 entry->flags.renewable = !(u32 & KRB5_KDB_DISALLOW_RENEWABLE); 241 entry->flags.proxiable = !(u32 & KRB5_KDB_DISALLOW_PROXIABLE); 242 /* DUP_SKEY */ 243 entry->flags.invalid = !!(u32 & KRB5_KDB_DISALLOW_ALL_TIX); 244 entry->flags.require_preauth =!!(u32 & KRB5_KDB_REQUIRES_PRE_AUTH); 245 entry->flags.require_hwauth =!!(u32 & KRB5_KDB_REQUIRES_HW_AUTH); 246 entry->flags.server = !(u32 & KRB5_KDB_DISALLOW_SVR); 247 entry->flags.change_pw = !!(u32 & KRB5_KDB_PWCHANGE_SERVICE); 248 entry->flags.client = 1; /* XXX */ 249 250 /* 32: max time */ 251 CHECK(ret = krb5_ret_uint32(sp, &u32)); 252 if (u32) { 253 entry->max_life = malloc(sizeof(*entry->max_life)); 254 *entry->max_life = u32; 255 } 256 /* 32: max renewable time */ 257 CHECK(ret = krb5_ret_uint32(sp, &u32)); 258 if (u32) { 259 entry->max_renew = malloc(sizeof(*entry->max_renew)); 260 *entry->max_renew = u32; 261 } 262 /* 32: client expire */ 263 CHECK(ret = krb5_ret_uint32(sp, &u32)); 264 if (u32) { 265 entry->valid_end = malloc(sizeof(*entry->valid_end)); 266 *entry->valid_end = u32; 267 } 268 /* 32: passwd expire */ 269 CHECK(ret = krb5_ret_uint32(sp, &u32)); 270 if (u32) { 271 entry->pw_end = malloc(sizeof(*entry->pw_end)); 272 *entry->pw_end = u32; 273 } 274 /* 32: last successful passwd */ 275 CHECK(ret = krb5_ret_uint32(sp, &u32)); 276 /* 32: last failed attempt */ 277 CHECK(ret = krb5_ret_uint32(sp, &u32)); 278 /* 32: num of failed attempts */ 279 CHECK(ret = krb5_ret_uint32(sp, &u32)); 280 /* 16: num tl data */ 281 CHECK(ret = krb5_ret_uint16(sp, &u16)); 282 num_tl = u16; 283 /* 16: num key data */ 284 CHECK(ret = krb5_ret_uint16(sp, &u16)); 285 num_keys = u16; 286 /* 16: principal length */ 287 CHECK(ret = krb5_ret_uint16(sp, &u16)); 288 /* length: principal */ 289 { 290 /* 291 * Note that the principal name includes the NUL in the entry, 292 * but we don't want to take chances, so we add an extra NUL. 293 */ 294 p = malloc(u16 + 1); 295 if (p == NULL) { 296 ret = ENOMEM; 297 goto out; 298 } 299 krb5_storage_read(sp, p, u16); 300 p[u16] = '\0'; 301 CHECK(ret = krb5_parse_name(context, p, &entry->principal)); 302 free(p); 303 } 304 /* for num tl data times 305 16: tl data type 306 16: tl data length 307 length: length */ 308 for (i = 0; i < num_tl; i++) { 309 /* 16: TL data type */ 310 CHECK(ret = krb5_ret_uint16(sp, &u16)); 311 /* 16: TL data length */ 312 CHECK(ret = krb5_ret_uint16(sp, &u16)); 313 krb5_storage_seek(sp, u16, SEEK_CUR); 314 } 315 /* 316 * for num key data times 317 * 16: "version" 318 * 16: kvno 319 * for version times: 320 * 16: type 321 * 16: length 322 * length: keydata 323 * 324 * "version" here is really 1 or 2, the first meaning there's only 325 * keys for this kvno, the second meaning there's keys and salt[s?]. 326 * That's right... hold that gag reflex, you can do it. 327 */ 328 for (i = 0; i < num_keys; i++) { 329 int keep = 0; 330 uint16_t version; 331 void *ptr; 332 333 CHECK(ret = krb5_ret_uint16(sp, &u16)); 334 version = u16; 335 CHECK(ret = krb5_ret_uint16(sp, &u16)); 336 337 /* 338 * First time through, and until we find one matching key, 339 * entry->kvno == 0. 340 */ 341 if ((entry->kvno < u16) && (kvno == 0 || kvno == u16)) { 342 keep = 1; 343 entry->kvno = u16; 344 /* 345 * Found a higher kvno than earlier, so free the old highest 346 * kvno keys. 347 * 348 * XXX Of course, we actually want to extract the old kvnos 349 * as well, for some of the kadm5 APIs. We shouldn't free 350 * these keys, but keep them elsewhere. 351 */ 352 for (j = 0; j < entry->keys.len; j++) 353 free_Key(&entry->keys.val[j]); 354 free(entry->keys.val); 355 entry->keys.len = 0; 356 entry->keys.val = NULL; 357 } else if (entry->kvno == u16) 358 /* Accumulate keys */ 359 keep = 1; 360 361 if (keep) { 362 Key *k; 363 364 ptr = realloc(entry->keys.val, sizeof(entry->keys.val[0]) * (entry->keys.len + 1)); 365 if (ptr == NULL) { 366 ret = ENOMEM; 367 goto out; 368 } 369 entry->keys.val = ptr; 370 371 /* k points to current Key */ 372 k = &entry->keys.val[entry->keys.len]; 373 374 memset(k, 0, sizeof(*k)); 375 entry->keys.len += 1; 376 377 k->mkvno = malloc(sizeof(*k->mkvno)); 378 if (k->mkvno == NULL) { 379 ret = ENOMEM; 380 goto out; 381 } 382 *k->mkvno = 1; 383 384 for (j = 0; j < version; j++) { 385 uint16_t type; 386 CHECK(ret = krb5_ret_uint16(sp, &type)); 387 CHECK(ret = krb5_ret_uint16(sp, &u16)); 388 if (j == 0) { 389 /* This "version" means we have a key */ 390 k->key.keytype = type; 391 if (u16 < 2) { 392 ret = EINVAL; 393 goto out; 394 } 395 /* 396 * MIT stores keys encrypted keys as {16-bit length 397 * of plaintext key, {encrypted key}}. The reason 398 * for this is that the Kerberos cryptosystem is not 399 * length-preserving. Heimdal's approach is to 400 * truncate the plaintext to the expected length of 401 * the key given its enctype, so we ignore this 402 * 16-bit length-of-plaintext-key field. 403 */ 404 krb5_storage_seek(sp, 2, SEEK_CUR); /* skip real length */ 405 k->key.keyvalue.length = u16 - 2; /* adjust cipher len */ 406 k->key.keyvalue.data = malloc(k->key.keyvalue.length); 407 krb5_storage_read(sp, k->key.keyvalue.data, 408 k->key.keyvalue.length); 409 } else if (j == 1) { 410 /* This "version" means we have a salt */ 411 k->salt = calloc(1, sizeof(*k->salt)); 412 if (k->salt == NULL) { 413 ret = ENOMEM; 414 goto out; 415 } 416 k->salt->type = type; 417 if (u16 != 0) { 418 k->salt->salt.data = malloc(u16); 419 if (k->salt->salt.data == NULL) { 420 ret = ENOMEM; 421 goto out; 422 } 423 k->salt->salt.length = u16; 424 krb5_storage_read(sp, k->salt->salt.data, k->salt->salt.length); 425 } 426 fix_salt(context, entry, entry->keys.len - 1); 427 } else { 428 /* 429 * Whatever this "version" might be, we skip it 430 * 431 * XXX A krb5.conf parameter requesting that we log 432 * about strangeness like this, or return an error 433 * from here, might be nice. 434 */ 435 krb5_storage_seek(sp, u16, SEEK_CUR); 436 } 437 } 438 } else { 439 /* 440 * XXX For now we skip older kvnos, but we should extract 441 * them... 442 */ 443 for (j = 0; j < version; j++) { 444 /* enctype */ 445 CHECK(ret = krb5_ret_uint16(sp, &u16)); 446 /* encrypted key (or plaintext salt) */ 447 CHECK(ret = krb5_ret_uint16(sp, &u16)); 448 krb5_storage_seek(sp, u16, SEEK_CUR); 449 } 450 } 451 } 452 453 if (entry->kvno == 0 && kvno != 0) { 454 ret = HDB_ERR_NOT_FOUND_HERE; 455 goto out; 456 } 457 458 return 0; 459 out: 460 if (ret == HEIM_ERR_EOF) 461 /* Better error code than "end of file" */ 462 ret = HEIM_ERR_BAD_HDBENT_ENCODING; 463 return ret; 464 } 465 466 #if 0 467 static krb5_error_code 468 mdb_entry2value(krb5_context context, hdb_entry *entry, krb5_data *data) 469 { 470 return EINVAL; 471 } 472 #endif 473 474 475 static krb5_error_code 476 mdb_close(krb5_context context, HDB *db) 477 { 478 DB *d = (DB*)db->hdb_db; 479 (*d->close)(d); 480 return 0; 481 } 482 483 static krb5_error_code 484 mdb_destroy(krb5_context context, HDB *db) 485 { 486 krb5_error_code ret; 487 488 ret = hdb_clear_master_key (context, db); 489 free(db->hdb_name); 490 free(db); 491 return ret; 492 } 493 494 static krb5_error_code 495 mdb_lock(krb5_context context, HDB *db, int operation) 496 { 497 DB *d = (DB*)db->hdb_db; 498 int fd = (*d->fd)(d); 499 if(fd < 0) { 500 krb5_set_error_message(context, HDB_ERR_CANT_LOCK_DB, 501 "Can't lock database: %s", db->hdb_name); 502 return HDB_ERR_CANT_LOCK_DB; 503 } 504 return hdb_lock(fd, operation); 505 } 506 507 static krb5_error_code 508 mdb_unlock(krb5_context context, HDB *db) 509 { 510 DB *d = (DB*)db->hdb_db; 511 int fd = (*d->fd)(d); 512 if(fd < 0) { 513 krb5_set_error_message(context, HDB_ERR_CANT_LOCK_DB, 514 "Can't unlock database: %s", db->hdb_name); 515 return HDB_ERR_CANT_LOCK_DB; 516 } 517 return hdb_unlock(fd); 518 } 519 520 521 static krb5_error_code 522 mdb_seq(krb5_context context, HDB *db, 523 unsigned flags, hdb_entry_ex *entry, int flag) 524 { 525 DB *d = (DB*)db->hdb_db; 526 DBT key, value; 527 krb5_data key_data, data; 528 int code; 529 530 code = db->hdb_lock(context, db, HDB_RLOCK); 531 if(code == -1) { 532 krb5_set_error_message(context, HDB_ERR_DB_INUSE, "Database %s in use", db->hdb_name); 533 return HDB_ERR_DB_INUSE; 534 } 535 code = (*d->seq)(d, &key, &value, flag); 536 db->hdb_unlock(context, db); /* XXX check value */ 537 if(code == -1) { 538 code = errno; 539 krb5_set_error_message(context, code, "Database %s seq error: %s", 540 db->hdb_name, strerror(code)); 541 return code; 542 } 543 if(code == 1) { 544 krb5_clear_error_message(context); 545 return HDB_ERR_NOENTRY; 546 } 547 548 key_data.data = key.data; 549 key_data.length = key.size; 550 data.data = value.data; 551 data.length = value.size; 552 memset(entry, 0, sizeof(*entry)); 553 554 if (mdb_value2entry(context, &data, 0, &entry->entry)) 555 return mdb_seq(context, db, flags, entry, R_NEXT); 556 557 if (db->hdb_master_key_set && (flags & HDB_F_DECRYPT)) { 558 code = hdb_unseal_keys (context, db, &entry->entry); 559 if (code) 560 hdb_free_entry (context, entry); 561 } 562 563 return code; 564 } 565 566 567 static krb5_error_code 568 mdb_firstkey(krb5_context context, HDB *db, unsigned flags, hdb_entry_ex *entry) 569 { 570 return mdb_seq(context, db, flags, entry, R_FIRST); 571 } 572 573 574 static krb5_error_code 575 mdb_nextkey(krb5_context context, HDB *db, unsigned flags, hdb_entry_ex *entry) 576 { 577 return mdb_seq(context, db, flags, entry, R_NEXT); 578 } 579 580 static krb5_error_code 581 mdb_rename(krb5_context context, HDB *db, const char *new_name) 582 { 583 int ret; 584 char *old, *new; 585 586 asprintf(&old, "%s.db", db->hdb_name); 587 asprintf(&new, "%s.db", new_name); 588 ret = rename(old, new); 589 free(old); 590 free(new); 591 if(ret) 592 return errno; 593 594 free(db->hdb_name); 595 db->hdb_name = strdup(new_name); 596 return 0; 597 } 598 599 static krb5_error_code 600 mdb__get(krb5_context context, HDB *db, krb5_data key, krb5_data *reply) 601 { 602 DB *d = (DB*)db->hdb_db; 603 DBT k, v; 604 int code; 605 606 k.data = key.data; 607 k.size = key.length; 608 code = db->hdb_lock(context, db, HDB_RLOCK); 609 if(code) 610 return code; 611 code = (*d->get)(d, &k, &v, 0); 612 db->hdb_unlock(context, db); 613 if(code < 0) { 614 code = errno; 615 krb5_set_error_message(context, code, "Database %s get error: %s", 616 db->hdb_name, strerror(code)); 617 return code; 618 } 619 if(code == 1) { 620 krb5_clear_error_message(context); 621 return HDB_ERR_NOENTRY; 622 } 623 624 krb5_data_copy(reply, v.data, v.size); 625 return 0; 626 } 627 628 static krb5_error_code 629 mdb__put(krb5_context context, HDB *db, int replace, 630 krb5_data key, krb5_data value) 631 { 632 DB *d = (DB*)db->hdb_db; 633 DBT k, v; 634 int code; 635 636 k.data = key.data; 637 k.size = key.length; 638 v.data = value.data; 639 v.size = value.length; 640 code = db->hdb_lock(context, db, HDB_WLOCK); 641 if(code) 642 return code; 643 code = (*d->put)(d, &k, &v, replace ? 0 : R_NOOVERWRITE); 644 db->hdb_unlock(context, db); 645 if(code < 0) { 646 code = errno; 647 krb5_set_error_message(context, code, "Database %s put error: %s", 648 db->hdb_name, strerror(code)); 649 return code; 650 } 651 if(code == 1) { 652 krb5_clear_error_message(context); 653 return HDB_ERR_EXISTS; 654 } 655 return 0; 656 } 657 658 static krb5_error_code 659 mdb__del(krb5_context context, HDB *db, krb5_data key) 660 { 661 DB *d = (DB*)db->hdb_db; 662 DBT k; 663 krb5_error_code code; 664 k.data = key.data; 665 k.size = key.length; 666 code = db->hdb_lock(context, db, HDB_WLOCK); 667 if(code) 668 return code; 669 code = (*d->del)(d, &k, 0); 670 db->hdb_unlock(context, db); 671 if(code == 1) { 672 code = errno; 673 krb5_set_error_message(context, code, "Database %s put error: %s", 674 db->hdb_name, strerror(code)); 675 return code; 676 } 677 if(code < 0) 678 return errno; 679 return 0; 680 } 681 682 static krb5_error_code 683 mdb_fetch_kvno(krb5_context context, HDB *db, krb5_const_principal principal, 684 unsigned flags, krb5_kvno kvno, hdb_entry_ex *entry) 685 { 686 krb5_data key, value; 687 krb5_error_code code; 688 689 code = mdb_principal2key(context, principal, &key); 690 if (code) 691 return code; 692 code = db->hdb__get(context, db, key, &value); 693 krb5_data_free(&key); 694 if(code) 695 return code; 696 code = mdb_value2entry(context, &value, kvno, &entry->entry); 697 krb5_data_free(&value); 698 if (code) 699 return code; 700 701 if (db->hdb_master_key_set && (flags & HDB_F_DECRYPT)) { 702 code = hdb_unseal_keys (context, db, &entry->entry); 703 if (code) 704 hdb_free_entry(context, entry); 705 } 706 707 return 0; 708 } 709 710 static krb5_error_code 711 mdb_store(krb5_context context, HDB *db, unsigned flags, hdb_entry_ex *entry) 712 { 713 krb5_set_error_message(context, EINVAL, "can't set principal in mdb"); 714 return EINVAL; 715 } 716 717 static krb5_error_code 718 mdb_remove(krb5_context context, HDB *db, krb5_const_principal principal) 719 { 720 krb5_error_code code; 721 krb5_data key; 722 723 mdb_principal2key(context, principal, &key); 724 code = db->hdb__del(context, db, key); 725 krb5_data_free(&key); 726 return code; 727 } 728 729 static krb5_error_code 730 mdb_open(krb5_context context, HDB *db, int flags, mode_t mode) 731 { 732 char *fn; 733 krb5_error_code ret; 734 735 asprintf(&fn, "%s.db", db->hdb_name); 736 if (fn == NULL) { 737 krb5_set_error_message(context, ENOMEM, "malloc: out of memory"); 738 return ENOMEM; 739 } 740 db->hdb_db = dbopen(fn, flags, mode, DB_BTREE, NULL); 741 free(fn); 742 743 if (db->hdb_db == NULL) { 744 switch (errno) { 745 #ifdef EFTYPE 746 case EFTYPE: 747 #endif 748 case EINVAL: 749 db->hdb_db = dbopen(fn, flags, mode, DB_BTREE, NULL); 750 } 751 } 752 753 /* try to open without .db extension */ 754 if(db->hdb_db == NULL && errno == ENOENT) 755 db->hdb_db = dbopen(db->hdb_name, flags, mode, DB_BTREE, NULL); 756 if(db->hdb_db == NULL) { 757 ret = errno; 758 krb5_set_error_message(context, ret, "dbopen (%s): %s", 759 db->hdb_name, strerror(ret)); 760 return ret; 761 } 762 if((flags & O_ACCMODE) == O_RDONLY) 763 ret = hdb_check_db_format(context, db); 764 else 765 ret = hdb_init_db(context, db); 766 if(ret == HDB_ERR_NOENTRY) { 767 krb5_clear_error_message(context); 768 return 0; 769 } 770 if (ret) { 771 mdb_close(context, db); 772 krb5_set_error_message(context, ret, "hdb_open: failed %s database %s", 773 (flags & O_ACCMODE) == O_RDONLY ? 774 "checking format of" : "initialize", 775 db->hdb_name); 776 } 777 return ret; 778 } 779 780 krb5_error_code 781 hdb_mdb_create(krb5_context context, HDB **db, 782 const char *filename) 783 { 784 *db = calloc(1, sizeof(**db)); 785 if (*db == NULL) { 786 krb5_set_error_message(context, ENOMEM, "malloc: out of memory"); 787 return ENOMEM; 788 } 789 790 (*db)->hdb_db = NULL; 791 (*db)->hdb_name = strdup(filename); 792 if ((*db)->hdb_name == NULL) { 793 free(*db); 794 *db = NULL; 795 krb5_set_error_message(context, ENOMEM, "malloc: out of memory"); 796 return ENOMEM; 797 } 798 (*db)->hdb_master_key_set = 0; 799 (*db)->hdb_openp = 0; 800 (*db)->hdb_capability_flags = 0; 801 (*db)->hdb_open = mdb_open; 802 (*db)->hdb_close = mdb_close; 803 (*db)->hdb_fetch_kvno = mdb_fetch_kvno; 804 (*db)->hdb_store = mdb_store; 805 (*db)->hdb_remove = mdb_remove; 806 (*db)->hdb_firstkey = mdb_firstkey; 807 (*db)->hdb_nextkey= mdb_nextkey; 808 (*db)->hdb_lock = mdb_lock; 809 (*db)->hdb_unlock = mdb_unlock; 810 (*db)->hdb_rename = mdb_rename; 811 (*db)->hdb__get = mdb__get; 812 (*db)->hdb__put = mdb__put; 813 (*db)->hdb__del = mdb__del; 814 (*db)->hdb_destroy = mdb_destroy; 815 return 0; 816 } 817 818 #endif /* HAVE_DB1 */ 819