/* Unix SMB/CIFS implementation. kerberos utility library Copyright (C) Andrew Tridgell 2001 Copyright (C) Remus Koos 2001 Copyright (C) Nalin Dahyabhai 2004. Copyright (C) Jeremy Allison 2004. Copyright (C) Andrew Bartlett 2004-2005 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */ #include "includes.h" #include "system/network.h" #include "system/kerberos.h" #include "system/time.h" #include "auth/kerberos/kerberos.h" #include "secrets.h" #include "pstring.h" #include "ads.h" #ifdef HAVE_KRB5 #define LIBADS_CCACHE_NAME "MEMORY:libads" /* we use a prompter to avoid a crash bug in the kerberos libs when dealing with empty passwords this prompter is just a string copy ... */ static krb5_error_code kerb_prompter(krb5_context ctx, void *data, const char *name, const char *banner, int num_prompts, krb5_prompt prompts[]) { if (num_prompts == 0) return 0; memset(prompts[0].reply->data, '\0', prompts[0].reply->length); if (prompts[0].reply->length > 0) { if (data) { strncpy(prompts[0].reply->data, data, prompts[0].reply->length-1); prompts[0].reply->length = strlen(prompts[0].reply->data); } else { prompts[0].reply->length = 0; } } return 0; } /* simulate a kinit, putting the tgt in the given credentials cache. Orignally by remus@snapserver.com This version is built to use a keyblock, rather than needing the original password. */ int kerberos_kinit_keyblock_cc(krb5_context ctx, krb5_ccache cc, const char *principal, krb5_keyblock *keyblock, time_t *expire_time, time_t *kdc_time) { krb5_error_code code = 0; krb5_principal me; krb5_creds my_creds; krb5_get_init_creds_opt options; if ((code = krb5_parse_name(ctx, principal, &me))) { return code; } krb5_get_init_creds_opt_init(&options); if ((code = krb5_get_init_creds_keyblock(ctx, &my_creds, me, keyblock, 0, NULL, &options))) { krb5_free_principal(ctx, me); return code; } if ((code = krb5_cc_initialize(ctx, cc, me))) { krb5_free_cred_contents(ctx, &my_creds); krb5_free_principal(ctx, me); return code; } if ((code = krb5_cc_store_cred(ctx, cc, &my_creds))) { krb5_free_cred_contents(ctx, &my_creds); krb5_free_principal(ctx, me); return code; } if (expire_time) { *expire_time = (time_t) my_creds.times.endtime; } if (kdc_time) { *kdc_time = (time_t) my_creds.times.starttime; } krb5_free_cred_contents(ctx, &my_creds); krb5_free_principal(ctx, me); return 0; } /* simulate a kinit, putting the tgt in the given credentials cache. Orignally by remus@snapserver.com */ int kerberos_kinit_password_cc(krb5_context ctx, krb5_ccache cc, const char *principal, const char *password, time_t *expire_time, time_t *kdc_time) { krb5_error_code code = 0; krb5_principal me; krb5_creds my_creds; krb5_get_init_creds_opt options; if ((code = krb5_parse_name(ctx, principal, &me))) { return code; } krb5_get_init_creds_opt_init(&options); if ((code = krb5_get_init_creds_password(ctx, &my_creds, me, password, kerb_prompter, NULL, 0, NULL, &options))) { krb5_free_principal(ctx, me); return code; } if ((code = krb5_cc_initialize(ctx, cc, me))) { krb5_free_cred_contents(ctx, &my_creds); krb5_free_principal(ctx, me); return code; } if ((code = krb5_cc_store_cred(ctx, cc, &my_creds))) { krb5_free_cred_contents(ctx, &my_creds); krb5_free_principal(ctx, me); return code; } if (expire_time) { *expire_time = (time_t) my_creds.times.endtime; } if (kdc_time) { *kdc_time = (time_t) my_creds.times.starttime; } krb5_free_cred_contents(ctx, &my_creds); krb5_free_principal(ctx, me); return 0; } #endif