remove trailing whitespace
This commit is contained in:
@@ -178,7 +178,7 @@ hdb_remove_aliases(krb5_context context, HDB *db, krb5_data *key)
|
||||
return 0;
|
||||
else if (code)
|
||||
return code;
|
||||
|
||||
|
||||
code = hdb_value2entry(context, &value, &oldentry);
|
||||
krb5_data_free(&value);
|
||||
if (code)
|
||||
@@ -220,7 +220,7 @@ hdb_add_aliases(krb5_context context, HDB *db,
|
||||
for (i = 0; i < aliases->aliases.len; i++) {
|
||||
hdb_entry_alias entryalias;
|
||||
entryalias.principal = entry->entry.principal;
|
||||
|
||||
|
||||
hdb_principal2key(context, &aliases->aliases.val[i], &key);
|
||||
code = hdb_entry_alias2value(context, &entryalias, &value);
|
||||
if (code) {
|
||||
|
@@ -112,7 +112,7 @@ hdb_get_dbinfo(krb5_context context, struct hdb_dbinfo **dbp)
|
||||
if (ret == 0 && di) {
|
||||
databases = di;
|
||||
dt = &di->next;
|
||||
}
|
||||
}
|
||||
|
||||
for ( ; db_binding != NULL; db_binding = db_binding->next) {
|
||||
|
||||
|
@@ -206,7 +206,7 @@ hdb_keytab_create(krb5_context context, HDB ** db, const char *arg)
|
||||
krb5_set_error_message(context, ENOMEM, "malloc: out of memory");
|
||||
return ENOMEM;
|
||||
}
|
||||
|
||||
|
||||
|
||||
(*db)->hdb_db = k;
|
||||
|
||||
|
@@ -407,7 +407,7 @@ LDAP_entry2mods(krb5_context context, HDB * db, hdb_entry_ex * ent,
|
||||
goto out;
|
||||
|
||||
is_new_entry = FALSE;
|
||||
|
||||
|
||||
vals = ldap_get_values_len(HDB2LDAP(db), msg, "objectClass");
|
||||
if (vals) {
|
||||
int num_objectclasses = ldap_count_values_len(vals);
|
||||
@@ -449,7 +449,7 @@ LDAP_entry2mods(krb5_context context, HDB * db, hdb_entry_ex * ent,
|
||||
ret = LDAP_addmod(&mods, LDAP_MOD_ADD, "objectClass", "top");
|
||||
if (ret)
|
||||
goto out;
|
||||
|
||||
|
||||
/* account is the structural object class */
|
||||
if (is_account == FALSE) {
|
||||
ret = LDAP_addmod(&mods, LDAP_MOD_ADD, "objectClass",
|
||||
@@ -628,13 +628,13 @@ LDAP_entry2mods(krb5_context context, HDB * db, hdb_entry_ex * ent,
|
||||
char *ntHexPassword;
|
||||
char *nt;
|
||||
time_t now = time(NULL);
|
||||
|
||||
|
||||
/* the key might have been 'sealed', but samba passwords
|
||||
are clear in the directory */
|
||||
ret = hdb_unseal_key(context, db, &ent->entry.keys.val[i]);
|
||||
if (ret)
|
||||
goto out;
|
||||
|
||||
|
||||
nt = ent->entry.keys.val[i].key.keyvalue.data;
|
||||
/* store in ntPassword, not krb5key */
|
||||
ret = hex_encode(nt, 16, &ntHexPassword);
|
||||
@@ -663,7 +663,7 @@ LDAP_entry2mods(krb5_context context, HDB * db, hdb_entry_ex * ent,
|
||||
if (ret)
|
||||
goto out;
|
||||
}
|
||||
|
||||
|
||||
} else if (is_heimdal_entry) {
|
||||
unsigned char *buf;
|
||||
size_t len, buf_size;
|
||||
@@ -790,9 +790,9 @@ need_quote(unsigned char c)
|
||||
{
|
||||
return (c & 0x80) ||
|
||||
(c < 32) ||
|
||||
(c == '(') ||
|
||||
(c == ')') ||
|
||||
(c == '*') ||
|
||||
(c == '(') ||
|
||||
(c == ')') ||
|
||||
(c == '*') ||
|
||||
(c == '\\') ||
|
||||
(c == 0x7f);
|
||||
}
|
||||
@@ -843,7 +843,7 @@ LDAP__lookup_princ(krb5_context context,
|
||||
if (ret)
|
||||
return ret;
|
||||
|
||||
/*
|
||||
/*
|
||||
* Quote searches that contain filter language, this quote
|
||||
* searches for *@REALM, which takes very long time.
|
||||
*/
|
||||
@@ -885,7 +885,7 @@ LDAP__lookup_princ(krb5_context context,
|
||||
filter = NULL;
|
||||
ldap_msgfree(*msg);
|
||||
*msg = NULL;
|
||||
|
||||
|
||||
ret = escape_value(context, userid, "e);
|
||||
if (ret)
|
||||
goto out;
|
||||
@@ -899,7 +899,7 @@ LDAP__lookup_princ(krb5_context context,
|
||||
krb5_set_error_message(context, ret, "asprintf: out of memory");
|
||||
goto out;
|
||||
}
|
||||
|
||||
|
||||
ret = LDAP_no_size_limit(context, HDB2LDAP(db));
|
||||
if (ret)
|
||||
goto out;
|
||||
@@ -1136,7 +1136,7 @@ LDAP_message2entry(krb5_context context, HDB * db, LDAPMessage * msg,
|
||||
if (etypes == NULL) {
|
||||
ret = ENOMEM;
|
||||
krb5_set_error_message(context, ret, "malloc: out of memory");
|
||||
goto out;
|
||||
goto out;
|
||||
}
|
||||
ent->entry.etypes->val = etypes;
|
||||
ent->entry.etypes->val[ent->entry.etypes->len] =
|
||||
@@ -1248,7 +1248,7 @@ LDAP_message2entry(krb5_context context, HDB * db, LDAPMessage * msg,
|
||||
}
|
||||
}
|
||||
|
||||
delta = krb5_config_get_time_default(context, NULL,
|
||||
delta = krb5_config_get_time_default(context, NULL,
|
||||
365 * 24 * 60 * 60,
|
||||
"kadmin",
|
||||
"password_lifetime",
|
||||
@@ -1318,21 +1318,21 @@ LDAP_message2entry(krb5_context context, HDB * db, LDAPMessage * msg,
|
||||
ret = LDAP_get_string_value(db, msg, "sambaAcctFlags", &samba_acct_flags);
|
||||
if (ret == 0) {
|
||||
/* parse the [UXW...] string:
|
||||
|
||||
'N' No password
|
||||
'D' Disabled
|
||||
'H' Homedir required
|
||||
'T' Temp account.
|
||||
'U' User account (normal)
|
||||
'M' MNS logon user account - what is this ?
|
||||
'W' Workstation account
|
||||
'S' Server account
|
||||
'L' Locked account
|
||||
'X' No Xpiry on password
|
||||
'I' Interdomain trust account
|
||||
|
||||
*/
|
||||
|
||||
|
||||
'N' No password
|
||||
'D' Disabled
|
||||
'H' Homedir required
|
||||
'T' Temp account.
|
||||
'U' User account (normal)
|
||||
'M' MNS logon user account - what is this ?
|
||||
'W' Workstation account
|
||||
'S' Server account
|
||||
'L' Locked account
|
||||
'X' No Xpiry on password
|
||||
'I' Interdomain trust account
|
||||
|
||||
*/
|
||||
|
||||
int i;
|
||||
int flags_len = strlen(samba_acct_flags);
|
||||
|
||||
|
@@ -146,7 +146,7 @@ fix_salt(krb5_context context, hdb_entry *ent, int key_num)
|
||||
size_t len;
|
||||
size_t i;
|
||||
char *p;
|
||||
|
||||
|
||||
len = 0;
|
||||
for (i = 0; i < ent->principal->name.name_string.len; ++i)
|
||||
len += strlen(ent->principal->name.name_string.val[i]);
|
||||
@@ -212,7 +212,7 @@ mdb_value2entry(krb5_context context, krb5_data *data, krb5_kvno kvno, hdb_entry
|
||||
krb5_set_error_message(context, ENOMEM, "out of memory");
|
||||
return ENOMEM;
|
||||
}
|
||||
|
||||
|
||||
krb5_storage_set_byteorder(sp, KRB5_STORAGE_BYTEORDER_LE);
|
||||
|
||||
/*
|
||||
@@ -422,7 +422,7 @@ mdb_value2entry(krb5_context context, krb5_data *data, krb5_kvno kvno, hdb_entry
|
||||
}
|
||||
k->salt->salt.length = u16;
|
||||
krb5_storage_read(sp, k->salt->salt.data, k->salt->salt.length);
|
||||
}
|
||||
}
|
||||
fix_salt(context, entry, entry->keys.len - 1);
|
||||
} else {
|
||||
/*
|
||||
|
@@ -360,13 +360,13 @@ hdb_sqlite_make_database(krb5_context context, HDB *db, const char *filename)
|
||||
if(ret) goto out;
|
||||
|
||||
return 0;
|
||||
|
||||
|
||||
out:
|
||||
if (hsdb->db)
|
||||
sqlite3_close(hsdb->db);
|
||||
if (created_file)
|
||||
unlink(hsdb->db_file);
|
||||
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
@@ -430,7 +430,7 @@ hdb_sqlite_fetch_kvno(krb5_context context, HDB *db, krb5_const_principal princi
|
||||
goto out;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
ret = 0;
|
||||
|
||||
out:
|
||||
@@ -496,12 +496,12 @@ hdb_sqlite_store(krb5_context context, HDB *db, unsigned flags,
|
||||
"BEGIN IMMEDIATE TRANSACTION", EINVAL);
|
||||
if(ret != SQLITE_OK) {
|
||||
ret = EINVAL;
|
||||
krb5_set_error_message(context, ret,
|
||||
krb5_set_error_message(context, ret,
|
||||
"SQLite BEGIN TRANSACTION failed: %s",
|
||||
sqlite3_errmsg(hsdb->db));
|
||||
goto rollback;
|
||||
}
|
||||
|
||||
|
||||
ret = krb5_unparse_name(context,
|
||||
entry->entry.principal, &principal_string);
|
||||
if (ret) {
|
||||
@@ -540,7 +540,7 @@ hdb_sqlite_store(krb5_context context, HDB *db, unsigned flags,
|
||||
goto rollback;
|
||||
|
||||
entry_id = sqlite3_column_int64(get_ids, 1);
|
||||
|
||||
|
||||
} else if(ret == SQLITE_ROW) { /* Found a principal */
|
||||
|
||||
if(! (flags & HDB_F_REPLACE)) /* Not allowed to replace it */
|
||||
@@ -584,7 +584,7 @@ hdb_sqlite_store(krb5_context context, HDB *db, unsigned flags,
|
||||
ret = hdb_sqlite_step_once(context, db, hsdb->add_alias);
|
||||
|
||||
free(alias_string);
|
||||
|
||||
|
||||
if(ret != SQLITE_DONE)
|
||||
goto rollback;
|
||||
}
|
||||
@@ -594,12 +594,12 @@ hdb_sqlite_store(krb5_context context, HDB *db, unsigned flags,
|
||||
commit:
|
||||
|
||||
free(principal_string);
|
||||
|
||||
|
||||
krb5_data_free(&value);
|
||||
|
||||
sqlite3_clear_bindings(get_ids);
|
||||
sqlite3_reset(get_ids);
|
||||
|
||||
|
||||
ret = hdb_sqlite_exec_stmt(context, hsdb->db, "COMMIT", EINVAL);
|
||||
if(ret != SQLITE_OK)
|
||||
krb5_warnx(context, "hdb-sqlite: COMMIT problem: %d: %s",
|
||||
@@ -644,8 +644,8 @@ hdb_sqlite_close(krb5_context context, HDB *db)
|
||||
*
|
||||
* @param context The current krb5 context
|
||||
* @param db Heimdal database handle
|
||||
* @param flags
|
||||
* @param mode_t
|
||||
* @param flags
|
||||
* @param mode_t
|
||||
*
|
||||
* @return Always returns 0
|
||||
*/
|
||||
@@ -678,7 +678,7 @@ hdb_sqlite_destroy(krb5_context context, HDB *db)
|
||||
free(hsdb->db_file);
|
||||
free(db->hdb_db);
|
||||
free(db);
|
||||
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
@@ -793,7 +793,7 @@ hdb_sqlite_remove(krb5_context context, HDB *db,
|
||||
char *principal_string;
|
||||
hdb_sqlite_db *hsdb = (hdb_sqlite_db*)(db->hdb_db);
|
||||
sqlite3_stmt *remove = hsdb->remove;
|
||||
|
||||
|
||||
ret = krb5_unparse_name(context, principal, &principal_string);
|
||||
if (ret) {
|
||||
free(principal_string);
|
||||
@@ -810,7 +810,7 @@ hdb_sqlite_remove(krb5_context context, HDB *db,
|
||||
ret);
|
||||
} else
|
||||
ret = 0;
|
||||
|
||||
|
||||
sqlite3_clear_bindings(remove);
|
||||
sqlite3_reset(remove);
|
||||
|
||||
|
@@ -319,7 +319,7 @@ find_dynamic_method (krb5_context context,
|
||||
|
||||
if (asprintf(&symbol, "hdb_%s_interface", prefix) == -1)
|
||||
krb5_errx(context, 1, "out of memory");
|
||||
|
||||
|
||||
mso = (struct hdb_so_method *) dlsym(dl, symbol);
|
||||
if (mso == NULL) {
|
||||
krb5_warnx(context, "error finding symbol %s in %s: %s\n",
|
||||
@@ -434,7 +434,7 @@ _hdb_keytab2hdb_entry(krb5_context context,
|
||||
|
||||
entry->entry.keys.val[0].mkvno = NULL;
|
||||
entry->entry.keys.val[0].salt = NULL;
|
||||
|
||||
|
||||
return krb5_copy_keyblock_contents(context,
|
||||
&ktentry->keyblock,
|
||||
&entry->entry.keys.val[0].key);
|
||||
|
@@ -153,7 +153,7 @@ typedef struct HDB{
|
||||
/**
|
||||
* As part of iteration, fetch next entry
|
||||
*/
|
||||
krb5_error_code (*hdb_nextkey)(krb5_context, struct HDB*,
|
||||
krb5_error_code (*hdb_nextkey)(krb5_context, struct HDB*,
|
||||
unsigned, hdb_entry_ex*);
|
||||
/**
|
||||
* Lock database
|
||||
@@ -221,7 +221,7 @@ typedef struct HDB{
|
||||
* ->hdb_store() into the database. The backend will still perform
|
||||
* all other operations, increasing the kvno, and update
|
||||
* modification timestamp.
|
||||
*
|
||||
*
|
||||
* The backend needs to call _kadm5_set_keys() and perform password
|
||||
* quality checks.
|
||||
*/
|
||||
|
@@ -221,10 +221,10 @@ add_enctype_to_key_set(Key **key_set, size_t *nkeyset,
|
||||
free_Key(&key);
|
||||
return ENOMEM;
|
||||
}
|
||||
|
||||
|
||||
key.salt->type = salt->salttype;
|
||||
krb5_data_zero (&key.salt->salt);
|
||||
|
||||
|
||||
ret = krb5_data_copy(&key.salt->salt,
|
||||
salt->saltvalue.data,
|
||||
salt->saltvalue.length);
|
||||
@@ -290,7 +290,7 @@ hdb_generate_key_set(krb5_context context, krb5_principal principal,
|
||||
p = "des:afs3-salt";
|
||||
else if (strcmp(p, "arcfour-hmac-md5") == 0)
|
||||
p = "arcfour-hmac-md5:pw-salt";
|
||||
|
||||
|
||||
memset(&salt, 0, sizeof(salt));
|
||||
|
||||
ret = parse_key_set(context, p,
|
||||
|
@@ -37,7 +37,7 @@
|
||||
|
||||
struct hdb_data {
|
||||
char *dbname;
|
||||
char *mkey;
|
||||
char *mkey;
|
||||
};
|
||||
|
||||
struct hdb_cursor {
|
||||
@@ -204,13 +204,13 @@ hdb_get_entry(krb5_context context,
|
||||
(*db->hdb_destroy)(context, db);
|
||||
goto out2;
|
||||
}
|
||||
|
||||
|
||||
ret = (*db->hdb_open)(context, db, O_RDONLY, 0);
|
||||
if (ret) {
|
||||
(*db->hdb_destroy)(context, db);
|
||||
goto out2;
|
||||
}
|
||||
|
||||
|
||||
ret = (*db->hdb_fetch_kvno)(context, db, principal,
|
||||
HDB_F_DECRYPT|HDB_F_KVNO_SPECIFIED|
|
||||
HDB_F_GET_CLIENT|HDB_F_GET_SERVER|HDB_F_GET_KRBTGT,
|
||||
@@ -268,10 +268,10 @@ hdb_start_seq_get(krb5_context context,
|
||||
const char *dbname = d->dbname;
|
||||
const char *mkey = d->mkey;
|
||||
HDB *db;
|
||||
|
||||
|
||||
if (dbname == NULL) {
|
||||
/*
|
||||
* We don't support enumerating without being told what
|
||||
* We don't support enumerating without being told what
|
||||
* backend to enumerate on
|
||||
*/
|
||||
ret = KRB5_KT_NOTFOUND;
|
||||
@@ -286,7 +286,7 @@ hdb_start_seq_get(krb5_context context,
|
||||
(*db->hdb_destroy)(context, db);
|
||||
return ret;
|
||||
}
|
||||
|
||||
|
||||
ret = (*db->hdb_open)(context, db, O_RDONLY, 0);
|
||||
if (ret) {
|
||||
(*db->hdb_destroy)(context, db);
|
||||
@@ -314,16 +314,16 @@ static int KRB5_CALLCONV
|
||||
hdb_next_entry(krb5_context context,
|
||||
krb5_keytab id,
|
||||
krb5_keytab_entry *entry,
|
||||
krb5_kt_cursor *cursor)
|
||||
krb5_kt_cursor *cursor)
|
||||
{
|
||||
struct hdb_cursor *c = cursor->data;
|
||||
krb5_error_code ret;
|
||||
|
||||
|
||||
memset(entry, 0, sizeof(*entry));
|
||||
|
||||
if (c->first) {
|
||||
c->first = FALSE;
|
||||
ret = (c->db->hdb_firstkey)(context, c->db,
|
||||
ret = (c->db->hdb_firstkey)(context, c->db,
|
||||
HDB_F_DECRYPT|
|
||||
HDB_F_GET_CLIENT|HDB_F_GET_SERVER|HDB_F_GET_KRBTGT,
|
||||
&c->hdb_entry);
|
||||
@@ -331,15 +331,15 @@ hdb_next_entry(krb5_context context,
|
||||
return KRB5_KT_END;
|
||||
else if (ret)
|
||||
return ret;
|
||||
|
||||
|
||||
if (c->hdb_entry.entry.keys.len == 0)
|
||||
hdb_free_entry(context, &c->hdb_entry);
|
||||
else
|
||||
c->next = FALSE;
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
while (c->next) {
|
||||
ret = (c->db->hdb_nextkey)(context, c->db,
|
||||
ret = (c->db->hdb_nextkey)(context, c->db,
|
||||
HDB_F_DECRYPT|
|
||||
HDB_F_GET_CLIENT|HDB_F_GET_SERVER|HDB_F_GET_KRBTGT,
|
||||
&c->hdb_entry);
|
||||
@@ -347,21 +347,21 @@ hdb_next_entry(krb5_context context,
|
||||
return KRB5_KT_END;
|
||||
else if (ret)
|
||||
return ret;
|
||||
|
||||
|
||||
/* If no keys on this entry, try again */
|
||||
if (c->hdb_entry.entry.keys.len == 0)
|
||||
hdb_free_entry(context, &c->hdb_entry);
|
||||
else
|
||||
c->next = FALSE;
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* Return next enc type (keytabs are one slot per key, while
|
||||
* hdb is one record per principal.
|
||||
*/
|
||||
|
||||
ret = krb5_copy_principal(context,
|
||||
c->hdb_entry.entry.principal,
|
||||
|
||||
ret = krb5_copy_principal(context,
|
||||
c->hdb_entry.entry.principal,
|
||||
&entry->principal);
|
||||
if (ret)
|
||||
return ret;
|
||||
@@ -376,12 +376,12 @@ hdb_next_entry(krb5_context context,
|
||||
return ret;
|
||||
}
|
||||
c->key_idx++;
|
||||
|
||||
/*
|
||||
|
||||
/*
|
||||
* Once we get to the end of the list, signal that we want the
|
||||
* next entry
|
||||
*/
|
||||
|
||||
|
||||
if ((size_t)c->key_idx == c->hdb_entry.entry.keys.len) {
|
||||
hdb_free_entry(context, &c->hdb_entry);
|
||||
c->next = TRUE;
|
||||
|
@@ -153,7 +153,7 @@ read_master_mit(krb5_context context, const char *filename,
|
||||
krb5_storage *sp;
|
||||
int16_t enctype;
|
||||
krb5_keyblock key;
|
||||
|
||||
|
||||
fd = open(filename, O_RDONLY | O_BINARY);
|
||||
if(fd < 0) {
|
||||
int save_errno = errno;
|
||||
@@ -200,7 +200,7 @@ read_master_encryptionkey(krb5_context context, const char *filename,
|
||||
unsigned char buf[256];
|
||||
ssize_t len;
|
||||
size_t ret_len;
|
||||
|
||||
|
||||
fd = open(filename, O_RDONLY | O_BINARY);
|
||||
if(fd < 0) {
|
||||
int save_errno = errno;
|
||||
@@ -246,7 +246,7 @@ read_master_krb4(krb5_context context, const char *filename,
|
||||
krb5_error_code ret;
|
||||
unsigned char buf[256];
|
||||
ssize_t len;
|
||||
|
||||
|
||||
fd = open(filename, O_RDONLY | O_BINARY);
|
||||
if(fd < 0) {
|
||||
int save_errno = errno;
|
||||
@@ -406,7 +406,7 @@ _hdb_mkey_encrypt(krb5_context context, hdb_master_key key,
|
||||
krb5_error_code
|
||||
hdb_unseal_key_mkey(krb5_context context, Key *k, hdb_master_key mkey)
|
||||
{
|
||||
|
||||
|
||||
krb5_error_code ret;
|
||||
krb5_data res;
|
||||
size_t keysize;
|
||||
@@ -415,7 +415,7 @@ hdb_unseal_key_mkey(krb5_context context, Key *k, hdb_master_key mkey)
|
||||
|
||||
if(k->mkvno == NULL)
|
||||
return 0;
|
||||
|
||||
|
||||
key = _hdb_find_master_key(k->mkvno, mkey);
|
||||
|
||||
if (key == NULL)
|
||||
@@ -519,7 +519,7 @@ hdb_seal_key_mkey(krb5_context context, Key *k, hdb_master_key mkey)
|
||||
return ENOMEM;
|
||||
}
|
||||
*k->mkvno = key->keytab.vno;
|
||||
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
@@ -44,7 +44,7 @@ main(int argc, char **argv)
|
||||
ret = hdb_read_master_key(context, mkey_file, &mkey);
|
||||
if (ret)
|
||||
krb5_err(context, 1, ret, "failed to read master key %s", mkey_file);
|
||||
|
||||
|
||||
hdb_free_master_key(context, mkey);
|
||||
} else
|
||||
krb5_errx(context, 1, "no command option given");
|
||||
|
Reference in New Issue
Block a user