|
Lines 44-54
Link Here
|
| 44 |
univention_krb5_parameters_t* univention_krb5_new(void) |
44 |
univention_krb5_parameters_t* univention_krb5_new(void) |
| 45 |
{ |
45 |
{ |
| 46 |
univention_krb5_parameters_t* kp; |
46 |
univention_krb5_parameters_t* kp; |
| 47 |
if ((kp = malloc(sizeof(univention_krb5_parameters_t))) == NULL) |
47 |
if ((kp = calloc(1, sizeof(univention_krb5_parameters_t))) == NULL) |
| 48 |
return NULL; |
48 |
return NULL; |
| 49 |
kp->username = NULL; |
|
|
| 50 |
kp->realm = NULL; |
| 51 |
kp->password = NULL; |
| 52 |
return kp; |
49 |
return kp; |
| 53 |
} |
50 |
} |
| 54 |
|
51 |
|
|
Lines 73-140
Link Here
|
| 73 |
|
70 |
|
| 74 |
int univention_krb5_init(univention_krb5_parameters_t *kp) |
71 |
int univention_krb5_init(univention_krb5_parameters_t *kp) |
| 75 |
{ |
72 |
{ |
| 76 |
krb5_error_code rv; |
73 |
krb5_error_code rv = -1; |
| 77 |
char *principal_name; |
74 |
char *principal_name; |
| 78 |
|
75 |
|
| 79 |
if (kp->username == NULL) { |
76 |
if (kp->username == NULL) { |
| 80 |
struct passwd *pwd; |
77 |
struct passwd pwd, *result; |
| 81 |
pwd = getpwuid(getuid()); |
78 |
char *buf; |
| 82 |
if (pwd == NULL) { |
79 |
size_t bufsize; |
| 83 |
return 1; |
80 |
int s; |
|
|
81 |
|
| 82 |
bufsize = sysconf(_SC_GETPW_R_SIZE_MAX); |
| 83 |
if (bufsize == -1) |
| 84 |
bufsize = 16384; |
| 85 |
buf = malloc(bufsize); |
| 86 |
if (buf == NULL) |
| 87 |
goto err; |
| 84 |
} |
88 |
} |
| 85 |
kp->username = strdup(pwd->pw_name); |
89 |
s = getpwnam_r(argv[1], &pwd, buf, bufsize, &result); |
|
|
90 |
if (result != NULL) |
| 91 |
kp->username = strdup(pwd.pw_name); |
| 92 |
free(buf); |
| 86 |
} |
93 |
} |
| 87 |
if (kp->realm == NULL) { |
94 |
|
|
|
95 |
if (kp->realm == NULL) |
| 88 |
kp->realm = univention_config_get_string("kerberos/realm"); |
96 |
kp->realm = univention_config_get_string("kerberos/realm"); |
| 89 |
if (kp->realm == NULL) { |
97 |
|
| 90 |
return 1; |
98 |
if (kp->username == NULL || kp->realm == NULL) |
| 91 |
} |
99 |
goto err; |
| 92 |
} |
|
|
| 93 |
asprintf(&principal_name, "%s@%s", kp->username, kp->realm); |
100 |
asprintf(&principal_name, "%s@%s", kp->username, kp->realm); |
|
|
101 |
if (principal_name == NULL) |
| 102 |
goto err; |
| 94 |
|
103 |
|
| 95 |
univention_debug(UV_DEBUG_KERBEROS, UV_DEBUG_INFO, "receiving Kerberos ticket for %s", principal_name); |
104 |
univention_debug(UV_DEBUG_KERBEROS, UV_DEBUG_INFO, "receiving Kerberos ticket for %s", principal_name); |
| 96 |
|
105 |
|
| 97 |
if ((rv = krb5_init_context(&kp->context))) { |
106 |
if ((rv = krb5_init_context(&kp->context))) |
| 98 |
free(principal_name); |
107 |
goto err1; |
| 99 |
return rv; |
108 |
if ((rv = krb5_cc_default(kp->context, &kp->ccache))) |
| 100 |
} |
109 |
goto err2; |
| 101 |
if ((rv = krb5_cc_default(kp->context, &kp->ccache))) { |
110 |
if ((rv = krb5_parse_name(kp->context, principal_name, &kp->principal))) |
| 102 |
free(principal_name); |
111 |
goto err2; |
| 103 |
krb5_free_context(kp->context); |
|
|
| 104 |
return rv; |
| 105 |
} |
| 106 |
if ((rv = krb5_parse_name(kp->context, principal_name, &kp->principal))) { |
| 107 |
free(principal_name); |
| 108 |
krb5_free_context(kp->context); |
| 109 |
return rv; |
| 110 |
} |
| 111 |
if ((rv = krb5_get_init_creds_password(kp->context, &kp->creds, kp->principal, |
112 |
if ((rv = krb5_get_init_creds_password(kp->context, &kp->creds, kp->principal, |
| 112 |
NULL, kerb_prompter, kp->password, 0, NULL, NULL))) { |
113 |
NULL, kerb_prompter, kp->password, 0, NULL, NULL))) |
| 113 |
free(principal_name); |
114 |
goto err3; |
| 114 |
krb5_free_principal(kp->context, kp->principal); |
115 |
if ((rv = krb5_cc_initialize(kp->context, kp->ccache, kp->principal))) |
| 115 |
krb5_free_context(kp->context); |
116 |
goto err4; |
| 116 |
return rv; |
117 |
if ((rv = krb5_cc_store_cred(kp->context, kp->ccache, &kp->creds))) |
| 117 |
} |
118 |
goto err5; |
| 118 |
if ((rv = krb5_cc_initialize(kp->context, kp->ccache, kp->principal))) { |
|
|
| 119 |
free(principal_name); |
| 120 |
krb5_free_cred_contents(kp->context, &kp->creds); |
| 121 |
krb5_free_principal(kp->context, kp->principal); |
| 122 |
krb5_free_context(kp->context); |
| 123 |
return rv; |
| 124 |
} |
| 125 |
if ((rv = krb5_cc_store_cred(kp->context, kp->ccache, &kp->creds))) { |
| 126 |
free(principal_name); |
| 127 |
krb5_cc_close(kp->context, kp->ccache); |
| 128 |
krb5_free_cred_contents(kp->context, &kp->creds); |
| 129 |
krb5_free_principal(kp->context, kp->principal); |
| 130 |
krb5_free_context(kp->context); |
| 131 |
return rv; |
| 132 |
} |
| 133 |
|
119 |
|
| 134 |
free(principal_name); |
120 |
rv = 0; |
|
|
121 |
|
| 122 |
err5: |
| 135 |
krb5_cc_close(kp->context, kp->ccache); |
123 |
krb5_cc_close(kp->context, kp->ccache); |
|
|
124 |
kp->ccache = NULL; |
| 125 |
err4: |
| 136 |
krb5_free_cred_contents(kp->context, &kp->creds); |
126 |
krb5_free_cred_contents(kp->context, &kp->creds); |
|
|
127 |
kp->creds = NULL; |
| 128 |
err3: |
| 137 |
krb5_free_principal(kp->context, kp->principal); |
129 |
krb5_free_principal(kp->context, kp->principal); |
|
|
130 |
kp->principal = NULL; |
| 131 |
err2: |
| 138 |
krb5_free_context(kp->context); |
132 |
krb5_free_context(kp->context); |
| 139 |
return 0; |
133 |
kp->context = NULL; |
|
|
134 |
err1: |
| 135 |
free(principal_name); |
| 136 |
err: |
| 137 |
return rv; |
| 140 |
} |
138 |
} |