xref: /minix3/crypto/external/bsd/heimdal/dist/lib/krb5/keytab_memory.c (revision ebfedea0ce5bbe81e252ddf32d732e40fb633fae)
1*ebfedea0SLionel Sambuc /*	$NetBSD: keytab_memory.c,v 1.1.1.1 2011/04/13 18:15:34 elric Exp $	*/
2*ebfedea0SLionel Sambuc 
3*ebfedea0SLionel Sambuc /*
4*ebfedea0SLionel Sambuc  * Copyright (c) 1997 - 2001 Kungliga Tekniska Högskolan
5*ebfedea0SLionel Sambuc  * (Royal Institute of Technology, Stockholm, Sweden).
6*ebfedea0SLionel Sambuc  * All rights reserved.
7*ebfedea0SLionel Sambuc  *
8*ebfedea0SLionel Sambuc  * Redistribution and use in source and binary forms, with or without
9*ebfedea0SLionel Sambuc  * modification, are permitted provided that the following conditions
10*ebfedea0SLionel Sambuc  * are met:
11*ebfedea0SLionel Sambuc  *
12*ebfedea0SLionel Sambuc  * 1. Redistributions of source code must retain the above copyright
13*ebfedea0SLionel Sambuc  *    notice, this list of conditions and the following disclaimer.
14*ebfedea0SLionel Sambuc  *
15*ebfedea0SLionel Sambuc  * 2. Redistributions in binary form must reproduce the above copyright
16*ebfedea0SLionel Sambuc  *    notice, this list of conditions and the following disclaimer in the
17*ebfedea0SLionel Sambuc  *    documentation and/or other materials provided with the distribution.
18*ebfedea0SLionel Sambuc  *
19*ebfedea0SLionel Sambuc  * 3. Neither the name of the Institute nor the names of its contributors
20*ebfedea0SLionel Sambuc  *    may be used to endorse or promote products derived from this software
21*ebfedea0SLionel Sambuc  *    without specific prior written permission.
22*ebfedea0SLionel Sambuc  *
23*ebfedea0SLionel Sambuc  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
24*ebfedea0SLionel Sambuc  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25*ebfedea0SLionel Sambuc  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26*ebfedea0SLionel Sambuc  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
27*ebfedea0SLionel Sambuc  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28*ebfedea0SLionel Sambuc  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29*ebfedea0SLionel Sambuc  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30*ebfedea0SLionel Sambuc  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31*ebfedea0SLionel Sambuc  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32*ebfedea0SLionel Sambuc  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33*ebfedea0SLionel Sambuc  * SUCH DAMAGE.
34*ebfedea0SLionel Sambuc  */
35*ebfedea0SLionel Sambuc 
36*ebfedea0SLionel Sambuc #include "krb5_locl.h"
37*ebfedea0SLionel Sambuc 
38*ebfedea0SLionel Sambuc /* memory operations -------------------------------------------- */
39*ebfedea0SLionel Sambuc 
40*ebfedea0SLionel Sambuc struct mkt_data {
41*ebfedea0SLionel Sambuc     krb5_keytab_entry *entries;
42*ebfedea0SLionel Sambuc     int num_entries;
43*ebfedea0SLionel Sambuc     char *name;
44*ebfedea0SLionel Sambuc     int refcount;
45*ebfedea0SLionel Sambuc     struct mkt_data *next;
46*ebfedea0SLionel Sambuc };
47*ebfedea0SLionel Sambuc 
48*ebfedea0SLionel Sambuc /* this mutex protects mkt_head, ->refcount, and ->next
49*ebfedea0SLionel Sambuc  * content is not protected (name is static and need no protection)
50*ebfedea0SLionel Sambuc  */
51*ebfedea0SLionel Sambuc static HEIMDAL_MUTEX mkt_mutex = HEIMDAL_MUTEX_INITIALIZER;
52*ebfedea0SLionel Sambuc static struct mkt_data *mkt_head;
53*ebfedea0SLionel Sambuc 
54*ebfedea0SLionel Sambuc 
55*ebfedea0SLionel Sambuc static krb5_error_code KRB5_CALLCONV
mkt_resolve(krb5_context context,const char * name,krb5_keytab id)56*ebfedea0SLionel Sambuc mkt_resolve(krb5_context context, const char *name, krb5_keytab id)
57*ebfedea0SLionel Sambuc {
58*ebfedea0SLionel Sambuc     struct mkt_data *d;
59*ebfedea0SLionel Sambuc 
60*ebfedea0SLionel Sambuc     HEIMDAL_MUTEX_lock(&mkt_mutex);
61*ebfedea0SLionel Sambuc 
62*ebfedea0SLionel Sambuc     for (d = mkt_head; d != NULL; d = d->next)
63*ebfedea0SLionel Sambuc 	if (strcmp(d->name, name) == 0)
64*ebfedea0SLionel Sambuc 	    break;
65*ebfedea0SLionel Sambuc     if (d) {
66*ebfedea0SLionel Sambuc 	if (d->refcount < 1)
67*ebfedea0SLionel Sambuc 	    krb5_abortx(context, "Double close on memory keytab, "
68*ebfedea0SLionel Sambuc 			"refcount < 1 %d", d->refcount);
69*ebfedea0SLionel Sambuc 	d->refcount++;
70*ebfedea0SLionel Sambuc 	id->data = d;
71*ebfedea0SLionel Sambuc 	HEIMDAL_MUTEX_unlock(&mkt_mutex);
72*ebfedea0SLionel Sambuc 	return 0;
73*ebfedea0SLionel Sambuc     }
74*ebfedea0SLionel Sambuc 
75*ebfedea0SLionel Sambuc     d = calloc(1, sizeof(*d));
76*ebfedea0SLionel Sambuc     if(d == NULL) {
77*ebfedea0SLionel Sambuc 	HEIMDAL_MUTEX_unlock(&mkt_mutex);
78*ebfedea0SLionel Sambuc 	krb5_set_error_message(context, ENOMEM,
79*ebfedea0SLionel Sambuc 			       N_("malloc: out of memory", ""));
80*ebfedea0SLionel Sambuc 	return ENOMEM;
81*ebfedea0SLionel Sambuc     }
82*ebfedea0SLionel Sambuc     d->name = strdup(name);
83*ebfedea0SLionel Sambuc     if (d->name == NULL) {
84*ebfedea0SLionel Sambuc 	HEIMDAL_MUTEX_unlock(&mkt_mutex);
85*ebfedea0SLionel Sambuc 	free(d);
86*ebfedea0SLionel Sambuc 	krb5_set_error_message(context, ENOMEM,
87*ebfedea0SLionel Sambuc 			       N_("malloc: out of memory", ""));
88*ebfedea0SLionel Sambuc 	return ENOMEM;
89*ebfedea0SLionel Sambuc     }
90*ebfedea0SLionel Sambuc     d->entries = NULL;
91*ebfedea0SLionel Sambuc     d->num_entries = 0;
92*ebfedea0SLionel Sambuc     d->refcount = 1;
93*ebfedea0SLionel Sambuc     d->next = mkt_head;
94*ebfedea0SLionel Sambuc     mkt_head = d;
95*ebfedea0SLionel Sambuc     HEIMDAL_MUTEX_unlock(&mkt_mutex);
96*ebfedea0SLionel Sambuc     id->data = d;
97*ebfedea0SLionel Sambuc     return 0;
98*ebfedea0SLionel Sambuc }
99*ebfedea0SLionel Sambuc 
100*ebfedea0SLionel Sambuc static krb5_error_code KRB5_CALLCONV
mkt_close(krb5_context context,krb5_keytab id)101*ebfedea0SLionel Sambuc mkt_close(krb5_context context, krb5_keytab id)
102*ebfedea0SLionel Sambuc {
103*ebfedea0SLionel Sambuc     struct mkt_data *d = id->data, **dp;
104*ebfedea0SLionel Sambuc     int i;
105*ebfedea0SLionel Sambuc 
106*ebfedea0SLionel Sambuc     HEIMDAL_MUTEX_lock(&mkt_mutex);
107*ebfedea0SLionel Sambuc     if (d->refcount < 1)
108*ebfedea0SLionel Sambuc 	krb5_abortx(context,
109*ebfedea0SLionel Sambuc 		    "krb5 internal error, memory keytab refcount < 1 on close");
110*ebfedea0SLionel Sambuc 
111*ebfedea0SLionel Sambuc     if (--d->refcount > 0) {
112*ebfedea0SLionel Sambuc 	HEIMDAL_MUTEX_unlock(&mkt_mutex);
113*ebfedea0SLionel Sambuc 	return 0;
114*ebfedea0SLionel Sambuc     }
115*ebfedea0SLionel Sambuc     for (dp = &mkt_head; *dp != NULL; dp = &(*dp)->next) {
116*ebfedea0SLionel Sambuc 	if (*dp == d) {
117*ebfedea0SLionel Sambuc 	    *dp = d->next;
118*ebfedea0SLionel Sambuc 	    break;
119*ebfedea0SLionel Sambuc 	}
120*ebfedea0SLionel Sambuc     }
121*ebfedea0SLionel Sambuc     HEIMDAL_MUTEX_unlock(&mkt_mutex);
122*ebfedea0SLionel Sambuc 
123*ebfedea0SLionel Sambuc     free(d->name);
124*ebfedea0SLionel Sambuc     for(i = 0; i < d->num_entries; i++)
125*ebfedea0SLionel Sambuc 	krb5_kt_free_entry(context, &d->entries[i]);
126*ebfedea0SLionel Sambuc     free(d->entries);
127*ebfedea0SLionel Sambuc     free(d);
128*ebfedea0SLionel Sambuc     return 0;
129*ebfedea0SLionel Sambuc }
130*ebfedea0SLionel Sambuc 
131*ebfedea0SLionel Sambuc static krb5_error_code KRB5_CALLCONV
mkt_get_name(krb5_context context,krb5_keytab id,char * name,size_t namesize)132*ebfedea0SLionel Sambuc mkt_get_name(krb5_context context,
133*ebfedea0SLionel Sambuc 	     krb5_keytab id,
134*ebfedea0SLionel Sambuc 	     char *name,
135*ebfedea0SLionel Sambuc 	     size_t namesize)
136*ebfedea0SLionel Sambuc {
137*ebfedea0SLionel Sambuc     struct mkt_data *d = id->data;
138*ebfedea0SLionel Sambuc     strlcpy(name, d->name, namesize);
139*ebfedea0SLionel Sambuc     return 0;
140*ebfedea0SLionel Sambuc }
141*ebfedea0SLionel Sambuc 
142*ebfedea0SLionel Sambuc static krb5_error_code KRB5_CALLCONV
mkt_start_seq_get(krb5_context context,krb5_keytab id,krb5_kt_cursor * c)143*ebfedea0SLionel Sambuc mkt_start_seq_get(krb5_context context,
144*ebfedea0SLionel Sambuc 		  krb5_keytab id,
145*ebfedea0SLionel Sambuc 		  krb5_kt_cursor *c)
146*ebfedea0SLionel Sambuc {
147*ebfedea0SLionel Sambuc     /* XXX */
148*ebfedea0SLionel Sambuc     c->fd = 0;
149*ebfedea0SLionel Sambuc     return 0;
150*ebfedea0SLionel Sambuc }
151*ebfedea0SLionel Sambuc 
152*ebfedea0SLionel Sambuc static krb5_error_code KRB5_CALLCONV
mkt_next_entry(krb5_context context,krb5_keytab id,krb5_keytab_entry * entry,krb5_kt_cursor * c)153*ebfedea0SLionel Sambuc mkt_next_entry(krb5_context context,
154*ebfedea0SLionel Sambuc 	       krb5_keytab id,
155*ebfedea0SLionel Sambuc 	       krb5_keytab_entry *entry,
156*ebfedea0SLionel Sambuc 	       krb5_kt_cursor *c)
157*ebfedea0SLionel Sambuc {
158*ebfedea0SLionel Sambuc     struct mkt_data *d = id->data;
159*ebfedea0SLionel Sambuc     if(c->fd >= d->num_entries)
160*ebfedea0SLionel Sambuc 	return KRB5_KT_END;
161*ebfedea0SLionel Sambuc     return krb5_kt_copy_entry_contents(context, &d->entries[c->fd++], entry);
162*ebfedea0SLionel Sambuc }
163*ebfedea0SLionel Sambuc 
164*ebfedea0SLionel Sambuc static krb5_error_code KRB5_CALLCONV
mkt_end_seq_get(krb5_context context,krb5_keytab id,krb5_kt_cursor * cursor)165*ebfedea0SLionel Sambuc mkt_end_seq_get(krb5_context context,
166*ebfedea0SLionel Sambuc 		krb5_keytab id,
167*ebfedea0SLionel Sambuc 		krb5_kt_cursor *cursor)
168*ebfedea0SLionel Sambuc {
169*ebfedea0SLionel Sambuc     return 0;
170*ebfedea0SLionel Sambuc }
171*ebfedea0SLionel Sambuc 
172*ebfedea0SLionel Sambuc static krb5_error_code KRB5_CALLCONV
mkt_add_entry(krb5_context context,krb5_keytab id,krb5_keytab_entry * entry)173*ebfedea0SLionel Sambuc mkt_add_entry(krb5_context context,
174*ebfedea0SLionel Sambuc 	      krb5_keytab id,
175*ebfedea0SLionel Sambuc 	      krb5_keytab_entry *entry)
176*ebfedea0SLionel Sambuc {
177*ebfedea0SLionel Sambuc     struct mkt_data *d = id->data;
178*ebfedea0SLionel Sambuc     krb5_keytab_entry *tmp;
179*ebfedea0SLionel Sambuc     tmp = realloc(d->entries, (d->num_entries + 1) * sizeof(*d->entries));
180*ebfedea0SLionel Sambuc     if(tmp == NULL) {
181*ebfedea0SLionel Sambuc 	krb5_set_error_message(context, ENOMEM,
182*ebfedea0SLionel Sambuc 			       N_("malloc: out of memory", ""));
183*ebfedea0SLionel Sambuc 	return ENOMEM;
184*ebfedea0SLionel Sambuc     }
185*ebfedea0SLionel Sambuc     d->entries = tmp;
186*ebfedea0SLionel Sambuc     return krb5_kt_copy_entry_contents(context, entry,
187*ebfedea0SLionel Sambuc 				       &d->entries[d->num_entries++]);
188*ebfedea0SLionel Sambuc }
189*ebfedea0SLionel Sambuc 
190*ebfedea0SLionel Sambuc static krb5_error_code KRB5_CALLCONV
mkt_remove_entry(krb5_context context,krb5_keytab id,krb5_keytab_entry * entry)191*ebfedea0SLionel Sambuc mkt_remove_entry(krb5_context context,
192*ebfedea0SLionel Sambuc 		 krb5_keytab id,
193*ebfedea0SLionel Sambuc 		 krb5_keytab_entry *entry)
194*ebfedea0SLionel Sambuc {
195*ebfedea0SLionel Sambuc     struct mkt_data *d = id->data;
196*ebfedea0SLionel Sambuc     krb5_keytab_entry *e, *end;
197*ebfedea0SLionel Sambuc     int found = 0;
198*ebfedea0SLionel Sambuc 
199*ebfedea0SLionel Sambuc     if (d->num_entries == 0) {
200*ebfedea0SLionel Sambuc 	krb5_clear_error_message(context);
201*ebfedea0SLionel Sambuc         return KRB5_KT_NOTFOUND;
202*ebfedea0SLionel Sambuc     }
203*ebfedea0SLionel Sambuc 
204*ebfedea0SLionel Sambuc     /* do this backwards to minimize copying */
205*ebfedea0SLionel Sambuc     for(end = d->entries + d->num_entries, e = end - 1; e >= d->entries; e--) {
206*ebfedea0SLionel Sambuc 	if(krb5_kt_compare(context, e, entry->principal,
207*ebfedea0SLionel Sambuc 			   entry->vno, entry->keyblock.keytype)) {
208*ebfedea0SLionel Sambuc 	    krb5_kt_free_entry(context, e);
209*ebfedea0SLionel Sambuc 	    memmove(e, e + 1, (end - e - 1) * sizeof(*e));
210*ebfedea0SLionel Sambuc 	    memset(end - 1, 0, sizeof(*end));
211*ebfedea0SLionel Sambuc 	    d->num_entries--;
212*ebfedea0SLionel Sambuc 	    end--;
213*ebfedea0SLionel Sambuc 	    found = 1;
214*ebfedea0SLionel Sambuc 	}
215*ebfedea0SLionel Sambuc     }
216*ebfedea0SLionel Sambuc     if (!found) {
217*ebfedea0SLionel Sambuc 	krb5_clear_error_message (context);
218*ebfedea0SLionel Sambuc 	return KRB5_KT_NOTFOUND;
219*ebfedea0SLionel Sambuc     }
220*ebfedea0SLionel Sambuc     e = realloc(d->entries, d->num_entries * sizeof(*d->entries));
221*ebfedea0SLionel Sambuc     if(e != NULL || d->num_entries == 0)
222*ebfedea0SLionel Sambuc 	d->entries = e;
223*ebfedea0SLionel Sambuc     return 0;
224*ebfedea0SLionel Sambuc }
225*ebfedea0SLionel Sambuc 
226*ebfedea0SLionel Sambuc const krb5_kt_ops krb5_mkt_ops = {
227*ebfedea0SLionel Sambuc     "MEMORY",
228*ebfedea0SLionel Sambuc     mkt_resolve,
229*ebfedea0SLionel Sambuc     mkt_get_name,
230*ebfedea0SLionel Sambuc     mkt_close,
231*ebfedea0SLionel Sambuc     NULL, /* destroy */
232*ebfedea0SLionel Sambuc     NULL, /* get */
233*ebfedea0SLionel Sambuc     mkt_start_seq_get,
234*ebfedea0SLionel Sambuc     mkt_next_entry,
235*ebfedea0SLionel Sambuc     mkt_end_seq_get,
236*ebfedea0SLionel Sambuc     mkt_add_entry,
237*ebfedea0SLionel Sambuc     mkt_remove_entry
238*ebfedea0SLionel Sambuc };
239