switch to _kdc_r_log

This commit is contained in:
Love Hornquist Astrand
2011-05-11 23:25:02 -07:00
committed by Love Hörnquist Åstrand
parent 68bd6f63e8
commit 1e048065c1

View File

@@ -241,6 +241,17 @@ _kdc_make_anonymous_principalname (PrincipalName *pn)
return 0;
}
static void
_kdc_r_log(kdc_request_t r, int level, const char *fmt, ...)
{
va_list ap;
char *s;
va_start(ap, fmt);
s = kdc_log_msg_va(r->context, r->config, level, fmt, ap);
if(s) free(s);
va_end(ap);
}
static void
_kdc_set_e_text(kdc_request_t r, const char *e_text)
{
@@ -287,16 +298,15 @@ _kdc_log_timestamp(krb5_context context,
static krb5_error_code
pa_pkinit_validate(kdc_request_t r, const PA_DATA *pa)
{
pk_client_params *pkp = NULL;
char *client_cert = NULL;
krb5_error_code ret;
pk_client_params *pkp = NULL;
ret = _kdc_pk_rd_padata(r->context, r->config, &r->req, pa, r->client, &pkp);
if (ret || pkp == NULL) {
ret = KRB5KRB_AP_ERR_BAD_INTEGRITY;
kdc_log(r->context, r->config, 5,
"Failed to decode PKINIT PA-DATA -- %s",
r->client_name);
_kdc_r_log(r, 5, "Failed to decode PKINIT PA-DATA -- %s",
r->client_name);
goto out;
}
@@ -312,9 +322,8 @@ pa_pkinit_validate(kdc_request_t r, const PA_DATA *pa)
goto out;
}
kdc_log(r->context, r->config, 0,
"PKINIT pre-authentication succeeded -- %s using %s",
r->client_name, client_cert);
_kdc_r_log(r, 0, "PKINIT pre-authentication succeeded -- %s using %s",
r->client_name, client_cert);
free(client_cert);
ret = _kdc_pk_mk_pa_reply(r->context, r->config, pkp, r->client,
@@ -414,8 +423,8 @@ pa_enc_chal_validate(kdc_request_t r, const PA_DATA *pa)
&size);
if (ret) {
ret = KRB5KRB_AP_ERR_BAD_INTEGRITY;
kdc_log(r->context, r->config, 5, "Failed to decode PA-DATA -- %s",
r->client_name);
_kdc_r_log(r, 5, "Failed to decode PA-DATA -- %s",
r->client_name);
return ret;
}
@@ -464,9 +473,8 @@ pa_enc_chal_validate(kdc_request_t r, const PA_DATA *pa)
if(ret){
krb5_crypto_destroy(r->context, challangecrypto);
ret = KRB5KDC_ERR_PREAUTH_FAILED;
kdc_log(r->context, r->config,
5, "Failed to decode PA-ENC-TS_ENC -- %s",
r->client_name);
_kdc_r_log(r, 5, "Failed to decode PA-ENC-TS_ENC -- %s",
r->client_name);
continue;
}
@@ -479,13 +487,12 @@ pa_enc_chal_validate(kdc_request_t r, const PA_DATA *pa)
client_time, sizeof(client_time), TRUE);
ret = KRB5KRB_AP_ERR_SKEW;
kdc_log(r->context, r->config, 0,
"Too large time skew, "
"client time %s is out by %u > %u seconds -- %s",
client_time,
(unsigned)abs(kdc_time - p.patimestamp),
r->context->max_skew,
r->client_name);
_kdc_r_log(r, 0, "Too large time skew, "
"client time %s is out by %u > %u seconds -- %s",
client_time,
(unsigned)abs(kdc_time - p.patimestamp),
r->context->max_skew,
r->client_name);
free_PA_ENC_TS_ENC(&p);
goto out;
@@ -537,8 +544,8 @@ pa_enc_ts_validate(kdc_request_t r, const PA_DATA *pa)
&len);
if (ret) {
ret = KRB5KRB_AP_ERR_BAD_INTEGRITY;
kdc_log(r->context, r->config, 5, "Failed to decode PA-DATA -- %s",
r->client_name);
_kdc_r_log(r, 5, "Failed to decode PA-DATA -- %s",
r->client_name);
goto out;
}
@@ -551,13 +558,13 @@ pa_enc_ts_validate(kdc_request_t r, const PA_DATA *pa)
if(krb5_enctype_to_string(r->context, enc_data.etype, &estr))
estr = NULL;
if(estr == NULL)
kdc_log(r->context, r->config, 5,
"No client key matching pa-data (%d) -- %s",
enc_data.etype, r->client_name);
_kdc_r_log(r, 5,
"No client key matching pa-data (%d) -- %s",
enc_data.etype, r->client_name);
else
kdc_log(r->context, r->config, 5,
"No client key matching pa-data (%s) -- %s",
estr, r->client_name);
_kdc_r_log(r, 5,
"No client key matching pa-data (%s) -- %s",
estr, r->client_name);
free(estr);
free_EncryptedData(&enc_data);
goto out;
@@ -567,7 +574,7 @@ pa_enc_ts_validate(kdc_request_t r, const PA_DATA *pa)
ret = krb5_crypto_init(r->context, &pa_key->key, 0, &crypto);
if (ret) {
const char *msg = krb5_get_error_message(r->context, ret);
kdc_log(r->context, r->config, 0, "krb5_crypto_init failed: %s", msg);
_kdc_r_log(r, 0, "krb5_crypto_init failed: %s", msg);
krb5_free_error_message(r->context, msg);
free_EncryptedData(&enc_data);
goto out;
@@ -592,10 +599,9 @@ pa_enc_ts_validate(kdc_request_t r, const PA_DATA *pa)
pa_key->key.keytype, &str);
if (ret2)
str = NULL;
kdc_log(r->context, r->config, 5,
"Failed to decrypt PA-DATA -- %s "
"(enctype %s) error %s",
r->client_name, str ? str : "unknown enctype", msg);
_kdc_r_log(r, 5, "Failed to decrypt PA-DATA -- %s "
"(enctype %s) error %s",
r->client_name, str ? str : "unknown enctype", msg);
krb5_free_error_message(r->context, msg);
free(str);
@@ -620,9 +626,8 @@ pa_enc_ts_validate(kdc_request_t r, const PA_DATA *pa)
krb5_data_free(&ts_data);
if(ret){
ret = KRB5KDC_ERR_PREAUTH_FAILED;
kdc_log(r->context, r->config,
5, "Failed to decode PA-ENC-TS_ENC -- %s",
r->client_name);
_kdc_r_log(r, 5, "Failed to decode PA-ENC-TS_ENC -- %s",
r->client_name);
goto out;
}
if (abs(kdc_time - p.patimestamp) > r->context->max_skew) {
@@ -632,13 +637,12 @@ pa_enc_ts_validate(kdc_request_t r, const PA_DATA *pa)
client_time, sizeof(client_time), TRUE);
ret = KRB5KRB_AP_ERR_SKEW;
kdc_log(r->context, r->config, 0,
"Too large time skew, "
"client time %s is out by %u > %u seconds -- %s",
client_time,
(unsigned)abs(kdc_time - p.patimestamp),
r->context->max_skew,
r->client_name);
_kdc_r_log(r, 0, "Too large time skew, "
"client time %s is out by %u > %u seconds -- %s",
client_time,
(unsigned)abs(kdc_time - p.patimestamp),
r->context->max_skew,
r->client_name);
/*
* The following is needed to make windows clients to
@@ -660,9 +664,8 @@ pa_enc_ts_validate(kdc_request_t r, const PA_DATA *pa)
ret = krb5_enctype_to_string(r->context, pa_key->key.keytype, &str);
if (ret)
str = NULL;
kdc_log(r->context, r->config, 2,
"ENC-TS Pre-authentication succeeded -- %s using %s",
r->client_name, str ? str : "unknown enctype");
_kdc_r_log(r, 2, "ENC-TS Pre-authentication succeeded -- %s using %s",
r->client_name, str ? str : "unknown enctype");
free(str);
ret = 0;