Use the target_name to figure out what username/password to use

git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@19384 ec53bebd-3082-4978-b11e-865c3cabbd6b
This commit is contained in:
Love Hörnquist Åstrand
2006-12-15 22:44:14 +00:00
parent 77666a423c
commit d53618b20e

View File

@@ -36,20 +36,24 @@
RCSID("$Id$"); RCSID("$Id$");
static int static int
from_file(const char *fn, const char *target, from_file(const char *fn, const char *domain,
char **username, char **password) char **username, char **password)
{ {
char *str, buf[1024]; char *str, buf[1024];
FILE *f; FILE *f;
f = fopen(fn, "r"); f = fopen(fn, "r");
if (f == NULL) if (f == NULL)
return ENOENT; return ENOENT;
while (fgets(buf, sizeof(buf), f) != NULL) { while (fgets(buf, sizeof(buf), f) != NULL) {
char *t, *u, *p; char *d, *u, *p;
buf[strcspn(buf, "\r\n")] = '\0'; buf[strcspn(buf, "\r\n")] = '\0';
if (buf[0] == '#')
continue;
str = NULL; str = NULL;
t = strtok_r(buf, ":", &str); d = strtok_r(buf, ":", &str);
if (t && strcasecmp(target, t) != 0) if (d && strcasecmp(domain, d) != 0)
continue; continue;
u = strtok_r(NULL, ":", &str); u = strtok_r(NULL, ":", &str);
p = strtok_r(NULL, ":", &str); p = strtok_r(NULL, ":", &str);
@@ -57,22 +61,23 @@ from_file(const char *fn, const char *target,
continue; continue;
*username = strdup(u); *username = strdup(u);
*password = strdup(p); *password = strdup(p);
memset(buf, 0, sizeof(buf));
fclose(f); fclose(f);
return 0; return 0;
} }
memset(buf, 0, sizeof(buf));
fclose(f); fclose(f);
return ENOENT; return ENOENT;
} }
static int static int
get_userinfo(const gss_name_t target_name, get_userinfo(const char *domain, char **username, char **password)
char **username, char **password)
{ {
const char *fn = NULL; const char *fn = NULL;
if (!issuid()) { if (!issuid()) {
fn = getenv("NTLM_USER_FILE"); fn = getenv("NTLM_USER_FILE");
if (fn != NULL && from_file(fn, "XXX", username, password) == 0) if (fn != NULL && from_file(fn, domain, username, password) == 0)
return 0; return 0;
} }
return ENOENT; return ENOENT;
@@ -97,6 +102,7 @@ _gss_ntlm_init_sec_context
) )
{ {
ntlm_ctx ctx; ntlm_ctx ctx;
ntlm_name name = (ntlm_name)target_name;
*minor_status = 0; *minor_status = 0;
@@ -112,8 +118,6 @@ _gss_ntlm_init_sec_context
struct ntlm_type1 type1; struct ntlm_type1 type1;
struct ntlm_buf data; struct ntlm_buf data;
memset(&type1, 0, sizeof(type1));
ctx = calloc(1, sizeof(*ctx)); ctx = calloc(1, sizeof(*ctx));
if (ctx == NULL) { if (ctx == NULL) {
*minor_status = EINVAL; *minor_status = EINVAL;
@@ -121,6 +125,15 @@ _gss_ntlm_init_sec_context
} }
*context_handle = (gss_ctx_id_t)ctx; *context_handle = (gss_ctx_id_t)ctx;
ret = get_userinfo(name->domain, &ctx->username, &ctx->password);
if (ret) {
_gss_ntlm_delete_sec_context(minor_status, context_handle, NULL);
*minor_status = ret;
return GSS_S_FAILURE;
}
memset(&type1, 0, sizeof(type1));
type1.flags = NTLM_NEG_UNICODE|NTLM_NEG_NTLM; type1.flags = NTLM_NEG_UNICODE|NTLM_NEG_NTLM;
type1.domain = NULL; type1.domain = NULL;
type1.hostname = NULL; type1.hostname = NULL;
@@ -142,7 +155,6 @@ _gss_ntlm_init_sec_context
krb5_error_code ret; krb5_error_code ret;
struct ntlm_type2 type2; struct ntlm_type2 type2;
struct ntlm_type3 type3; struct ntlm_type3 type3;
char *password = NULL;
struct ntlm_buf data; struct ntlm_buf data;
ctx = (ntlm_ctx)*context_handle; ctx = (ntlm_ctx)*context_handle;
@@ -161,22 +173,15 @@ _gss_ntlm_init_sec_context
memset(&type3, 0, sizeof(type3)); memset(&type3, 0, sizeof(type3));
type3.username = ctx->username;
type3.flags = type2.flags; type3.flags = type2.flags;
type3.targetname = type2.targetname; type3.targetname = type2.targetname;
type3.ws = rk_UNCONST("workstation"); type3.ws = rk_UNCONST("workstation");
ret = get_userinfo(target_name, &type3.username, &password);
if (ret) {
_gss_ntlm_delete_sec_context(minor_status, context_handle, NULL);
*minor_status = ret;
return GSS_S_FAILURE;
}
{ {
struct ntlm_buf key; struct ntlm_buf key;
heim_ntlm_nt_key(password, &key); heim_ntlm_nt_key(ctx->password, &key);
memset(password, 0, strlen(password)); memset(ctx->password, 0, strlen(ctx->password));
free(password);
heim_ntlm_calculate_ntlm1(key.data, key.length, heim_ntlm_calculate_ntlm1(key.data, key.length,
type2.challange, type2.challange,
@@ -185,7 +190,6 @@ _gss_ntlm_init_sec_context
} }
ret = heim_ntlm_encode_type3(&type3, &data); ret = heim_ntlm_encode_type3(&type3, &data);
free(type3.username);
if (ret) { if (ret) {
_gss_ntlm_delete_sec_context(minor_status, context_handle, NULL); _gss_ntlm_delete_sec_context(minor_status, context_handle, NULL);
*minor_status = ret; *minor_status = ret;