2 Copyright (C) 2003 - 2010 Chaskiel Grundman
5 Redistribution and use in source and binary forms, with or without
6 modification, are permitted provided that the following conditions
9 1. Redistributions of source code must retain the above copyright
10 notice, this list of conditions and the following disclaimer.
12 2. Redistributions in binary form must reproduce the above copyright
13 notice, this list of conditions and the following disclaimer in the
14 documentation and/or other materials provided with the distribution.
16 THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
17 IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
18 OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
19 IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
20 INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
21 NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
22 DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
23 THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
24 (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
25 OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27 #include <afsconfig.h>
28 #include <afs/param.h>
33 #include <afs/cellconfig.h>
34 #ifndef AFSCONF_CLIENTNAME
35 #include <afs/dirpath.h>
36 #define AFSCONF_CLIENTNAME AFSDIR_CLIENT_ETC_DIRPATH
39 #include <rx/rx_null.h>
45 #include "afscp_internal.h"
47 #ifdef HAVE_KRB5_CREDS_KEYBLOCK_ENCTYPE
48 #define Z_keydata(keyblock) ((keyblock)->contents)
49 #define Z_keylen(keyblock) ((keyblock)->length)
50 #define Z_credskey(creds) (&(creds)->keyblock)
51 #define Z_enctype(keyblock) ((keyblock)->enctype)
53 #define Z_keydata(keyblock) ((keyblock)->keyvalue.data)
54 #define Z_keylen(keyblock) ((keyblock)->keyvalue.length)
55 #define Z_credskey(creds) (&(creds)->session)
56 #define Z_enctype(keyblock) ((keyblock)->keytype)
59 static int insecure = 0;
60 static int try_anonymous = 0;
70 afscp_AnonymousAuth(int state)
72 try_anonymous = state;
76 static struct afsconf_dir *confdir;
79 _GetCellInfo(char *cell, struct afsconf_cell *celldata)
83 confdir = afsconf_Open(AFSCONF_CLIENTNAME);
84 if (confdir == NULL) {
87 code = afsconf_GetCellInfo(confdir, cell, AFSCONF_VLDBSERVICE, celldata);
92 _GetNullSecurityObject(struct afscp_cell *cell)
94 cell->security = (struct rx_securityClass *)rxnull_NewClientSecurityObject();
95 cell->scindex = RX_SECIDX_NULL;
100 _GetSecurityObject(struct afscp_cell *cell)
104 krb5_context context;
108 char **realms, *realm;
109 struct afsconf_cell celldata;
110 char localcell[MAXCELLCHARS + 1];
111 struct rx_securityClass *sc;
112 struct ktc_encryptionKey k;
115 code = _GetCellInfo(cell->name, &celldata);
120 code = krb5_init_context(&context); /* see aklog.c main() */
125 if (cell->realm == NULL) {
127 code = krb5_get_host_realm(context, celldata.hostName[0], &realms);
130 strlcpy(localcell, realms[0], sizeof(localcell));
131 krb5_free_host_realm(context, realms);
136 strlcpy(localcell, realm, MAXCELLCHARS + 1);
140 for (i = 0; (i < MAXCELLCHARS && cell->name[i]); i++) {
141 if (isalpha(cell->name[i]))
142 localcell[i] = toupper(cell->name[i]);
144 localcell[i] = cell->name[i];
150 code = krb5_cc_default(context, &cc);
152 memset(&match, 0, sizeof(match));
153 Z_enctype(Z_credskey(&match)) = ENCTYPE_DES_CBC_CRC;
156 code = krb5_cc_get_principal(context, cc, &match.client);
158 code = krb5_build_principal(context, &match.server,
159 strlen(realm), realm,
160 "afs", cell->name, NULL);
163 krb5_free_cred_contents(context, &match);
165 krb5_cc_close(context, cc);
166 krb5_free_context(context);
170 code = krb5_get_credentials(context, 0, cc, &match, &cred);
172 krb5_free_principal(context, match.server);
175 code = krb5_build_principal(context, &match.server,
176 strlen(realm), realm, "afs", (void *)NULL);
178 code = krb5_get_credentials(context, 0, cc, &match, &cred);
180 krb5_free_cred_contents(context, &match);
182 krb5_cc_close(context, cc);
183 krb5_free_context(context);
192 memcpy(&k.data, Z_keydata(Z_credskey(cred)), 8);
193 sc = (struct rx_securityClass *)rxkad_NewClientSecurityObject
194 (l, &k, RXKAD_TKT_TYPE_KERBEROS_V5,
195 cred->ticket.length, cred->ticket.data);
196 krb5_free_creds(context, cred);
197 krb5_free_cred_contents(context, &match);
199 krb5_cc_close(context, cc);
200 krb5_free_context(context);
206 #endif /* HAVE_KERBEROS */
208 return _GetNullSecurityObject(cell);
214 _GetVLservers(struct afscp_cell *cell)
216 struct rx_connection *conns[MAXHOSTSPERCELL + 1];
219 struct afsconf_cell celldata;
221 code = _GetCellInfo(cell->name, &celldata);
226 for (i = 0; i < celldata.numServers; i++) {
227 conns[i] = rx_NewConnection(celldata.hostAddr[i].sin_addr.s_addr,
228 htons(AFSCONF_VLDBPORT),
229 USER_SERVICE_ID, cell->security,
233 return ubik_ClientInit(conns, &cell->vlservers);