Since plugins no longer have a way of accessing the 'ek' member of the request structure, this function provides a way for a plugin to add encrypted padata to the response. Signed-off-by: Joseph Sutton <josephsutton@catalyst.net.nz>
		
			
				
	
	
		
			655 lines
		
	
	
		
			16 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			655 lines
		
	
	
		
			16 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * Copyright (c) 2007 Kungliga Tekniska Högskolan
 | |
|  * (Royal Institute of Technology, Stockholm, Sweden).
 | |
|  * All rights reserved.
 | |
|  *
 | |
|  * Portions (c) 2021, 2022 PADL Software Pty Ltd.
 | |
|  *
 | |
|  * Redistribution and use in source and binary forms, with or without
 | |
|  * modification, are permitted provided that the following conditions
 | |
|  * are met:
 | |
|  *
 | |
|  * 1. Redistributions of source code must retain the above copyright
 | |
|  *    notice, this list of conditions and the following disclaimer.
 | |
|  *
 | |
|  * 2. Redistributions in binary form must reproduce the above copyright
 | |
|  *    notice, this list of conditions and the following disclaimer in the
 | |
|  *    documentation and/or other materials provided with the distribution.
 | |
|  *
 | |
|  * 3. Neither the name of the Institute nor the names of its contributors
 | |
|  *    may be used to endorse or promote products derived from this software
 | |
|  *    without specific prior written permission.
 | |
|  *
 | |
|  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
 | |
|  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | |
|  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 | |
|  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
 | |
|  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
 | |
|  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
 | |
|  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 | |
|  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
 | |
|  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
 | |
|  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
 | |
|  * SUCH DAMAGE.
 | |
|  */
 | |
| 
 | |
| #include "kdc_locl.h"
 | |
| 
 | |
| static int have_plugin = 0;
 | |
| 
 | |
| /*
 | |
|  * Pick the first KDC plugin module that we find.
 | |
|  */
 | |
| 
 | |
| static const char *kdc_plugin_deps[] = {
 | |
|     "kdc",
 | |
|     "krb5",
 | |
|     "hdb",
 | |
|     NULL
 | |
| };
 | |
| 
 | |
| static struct heim_plugin_data kdc_plugin_data = {
 | |
|     "krb5",
 | |
|     "kdc",
 | |
|     KRB5_PLUGIN_KDC_VERSION_10,
 | |
|     kdc_plugin_deps,
 | |
|     kdc_get_instance
 | |
| };
 | |
| 
 | |
| static krb5_error_code KRB5_LIB_CALL
 | |
| load(krb5_context context, const void *plug, void *plugctx, void *userctx)
 | |
| {
 | |
|     have_plugin = 1;
 | |
|     return KRB5_PLUGIN_NO_HANDLE;
 | |
| }
 | |
| 
 | |
| KDC_LIB_FUNCTION krb5_error_code KDC_LIB_CALL
 | |
| krb5_kdc_plugin_init(krb5_context context)
 | |
| {
 | |
|     (void)_krb5_plugin_run_f(context, &kdc_plugin_data, 0, NULL, load);
 | |
| 
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| struct generate_uc {
 | |
|     astgs_request_t r;
 | |
|     hdb_entry *client;
 | |
|     hdb_entry *server;
 | |
|     const krb5_keyblock *reply_key;
 | |
|     uint64_t pac_attributes;
 | |
|     krb5_pac *pac;
 | |
| };
 | |
| 
 | |
| static krb5_error_code KRB5_LIB_CALL
 | |
| generate(krb5_context context, const void *plug, void *plugctx, void *userctx)
 | |
| {
 | |
|     const krb5plugin_kdc_ftable *ft = (const krb5plugin_kdc_ftable *)plug;
 | |
|     struct generate_uc *uc = (struct generate_uc *)userctx;    
 | |
| 
 | |
|     if (ft->pac_generate == NULL)
 | |
| 	return KRB5_PLUGIN_NO_HANDLE;
 | |
| 
 | |
|     return ft->pac_generate((void *)plug,
 | |
| 			    uc->r,
 | |
| 			    uc->client,
 | |
| 			    uc->server,
 | |
| 			    uc->reply_key,
 | |
| 			    uc->pac_attributes,
 | |
| 			    uc->pac);
 | |
| }
 | |
| 
 | |
| 
 | |
| krb5_error_code
 | |
| _kdc_pac_generate(astgs_request_t r,
 | |
| 		  hdb_entry *client,
 | |
| 		  hdb_entry *server,
 | |
| 		  const krb5_keyblock *reply_key,
 | |
| 		  uint64_t pac_attributes,
 | |
| 		  krb5_pac *pac)
 | |
| {
 | |
|     krb5_error_code ret = 0;
 | |
|     struct generate_uc uc;
 | |
| 
 | |
|     *pac = NULL;
 | |
| 
 | |
|     if (krb5_config_get_bool_default(r->context, NULL, FALSE, "realms",
 | |
| 				     client->principal->realm,
 | |
| 				     "disable_pac", NULL))
 | |
| 	return 0;
 | |
| 
 | |
|     if (have_plugin) {
 | |
| 	uc.r = r;
 | |
| 	uc.client = client;
 | |
| 	uc.server = server;
 | |
| 	uc.reply_key = reply_key;
 | |
| 	uc.pac = pac;
 | |
| 	uc.pac_attributes = pac_attributes;
 | |
| 
 | |
| 	ret = _krb5_plugin_run_f(r->context, &kdc_plugin_data,
 | |
| 				 0, &uc, generate);
 | |
| 	if (ret != KRB5_PLUGIN_NO_HANDLE)
 | |
| 	    return ret;
 | |
| 	ret = 0;
 | |
|     }
 | |
| 
 | |
|     if (*pac == NULL)
 | |
| 	ret = krb5_pac_init(r->context, pac);
 | |
| 
 | |
|     return ret;
 | |
| }
 | |
| 
 | |
| struct verify_uc {
 | |
|     astgs_request_t r;
 | |
|     krb5_principal client_principal;
 | |
|     krb5_principal delegated_proxy_principal;
 | |
|     hdb_entry *client;
 | |
|     hdb_entry *server;
 | |
|     hdb_entry *krbtgt;
 | |
|     krb5_pac *pac;
 | |
| };
 | |
| 
 | |
| static krb5_error_code KRB5_LIB_CALL
 | |
| verify(krb5_context context, const void *plug, void *plugctx, void *userctx)
 | |
| {
 | |
|     const krb5plugin_kdc_ftable *ft = (const krb5plugin_kdc_ftable *)plug;
 | |
|     struct verify_uc *uc = (struct verify_uc *)userctx;
 | |
|     krb5_error_code ret;
 | |
| 
 | |
|     if (ft->pac_verify == NULL)
 | |
| 	return KRB5_PLUGIN_NO_HANDLE;
 | |
| 
 | |
|     ret = ft->pac_verify((void *)plug,
 | |
| 			 uc->r,
 | |
| 			 uc->client_principal,
 | |
| 			 uc->delegated_proxy_principal,
 | |
| 			 uc->client, uc->server, uc->krbtgt, uc->pac);
 | |
|     return ret;
 | |
| }
 | |
| 
 | |
| krb5_error_code
 | |
| _kdc_pac_verify(astgs_request_t r,
 | |
| 		const krb5_principal client_principal,
 | |
| 		const krb5_principal delegated_proxy_principal,
 | |
| 		hdb_entry *client,
 | |
| 		hdb_entry *server,
 | |
| 		hdb_entry *krbtgt,
 | |
| 		krb5_pac *pac)
 | |
| {
 | |
|     struct verify_uc uc;
 | |
| 
 | |
|     if (!have_plugin)
 | |
| 	return KRB5_PLUGIN_NO_HANDLE;
 | |
| 
 | |
|     uc.r = r;
 | |
|     uc.client_principal = client_principal;
 | |
|     uc.delegated_proxy_principal = delegated_proxy_principal;
 | |
|     uc.client = client;
 | |
|     uc.server = server;
 | |
|     uc.krbtgt = krbtgt;
 | |
|     uc.pac = pac;
 | |
| 
 | |
|     return _krb5_plugin_run_f(r->context, &kdc_plugin_data,
 | |
| 			     0, &uc, verify);
 | |
| }
 | |
| 
 | |
| static krb5_error_code KRB5_LIB_CALL
 | |
| check(krb5_context context, const void *plug, void *plugctx, void *userctx)
 | |
| {
 | |
|     const krb5plugin_kdc_ftable *ft = (const krb5plugin_kdc_ftable *)plug;
 | |
| 
 | |
|     if (ft->client_access == NULL)
 | |
| 	return KRB5_PLUGIN_NO_HANDLE;
 | |
|     return ft->client_access((void *)plug, userctx);
 | |
| }
 | |
| 
 | |
| krb5_error_code
 | |
| _kdc_check_access(astgs_request_t r)
 | |
| {
 | |
|     krb5_error_code ret = KRB5_PLUGIN_NO_HANDLE;
 | |
| 
 | |
|     if (have_plugin) {
 | |
|         ret = _krb5_plugin_run_f(r->context, &kdc_plugin_data,
 | |
|                                  0, r, check);
 | |
|     }
 | |
| 
 | |
|     if (ret == KRB5_PLUGIN_NO_HANDLE)
 | |
|         return kdc_check_flags(r, r->req.msg_type == krb_as_req,
 | |
|                                r->client, r->server);
 | |
|     return ret;
 | |
| }
 | |
| 
 | |
| static krb5_error_code KRB5_LIB_CALL
 | |
| referral_policy(krb5_context context, const void *plug, void *plugctx, void *userctx)
 | |
| {
 | |
|     const krb5plugin_kdc_ftable *ft = (const krb5plugin_kdc_ftable *)plug;
 | |
| 
 | |
|     if (ft->referral_policy == NULL)
 | |
| 	return KRB5_PLUGIN_NO_HANDLE;
 | |
|     return ft->referral_policy((void *)plug, userctx);
 | |
| }
 | |
| 
 | |
| krb5_error_code
 | |
| _kdc_referral_policy(astgs_request_t r)
 | |
| {
 | |
|     krb5_error_code ret = KRB5_PLUGIN_NO_HANDLE;
 | |
| 
 | |
|     if (have_plugin)
 | |
|         ret = _krb5_plugin_run_f(r->context, &kdc_plugin_data, 0, r, referral_policy);
 | |
| 
 | |
|     return ret;
 | |
| }
 | |
| 
 | |
| static krb5_error_code KRB5_LIB_CALL
 | |
| finalize_reply(krb5_context context, const void *plug, void *plugctx, void *userctx)
 | |
| {
 | |
|     const krb5plugin_kdc_ftable *ft = (const krb5plugin_kdc_ftable *)plug;
 | |
| 
 | |
|     if (ft->finalize_reply == NULL)
 | |
| 	return KRB5_PLUGIN_NO_HANDLE;
 | |
|     return ft->finalize_reply((void *)plug, userctx);
 | |
| }
 | |
| 
 | |
| krb5_error_code
 | |
| _kdc_finalize_reply(astgs_request_t r)
 | |
| {
 | |
|     krb5_error_code ret = KRB5_PLUGIN_NO_HANDLE;
 | |
| 
 | |
|     if (have_plugin)
 | |
|         ret = _krb5_plugin_run_f(r->context, &kdc_plugin_data, 0, r, finalize_reply);
 | |
| 
 | |
|     if (ret == KRB5_PLUGIN_NO_HANDLE)
 | |
|         ret = 0;
 | |
| 
 | |
|     return ret;
 | |
| }
 | |
| 
 | |
| static krb5_error_code KRB5_LIB_CALL
 | |
| audit(krb5_context context, const void *plug, void *plugctx, void *userctx)
 | |
| {
 | |
|     const krb5plugin_kdc_ftable *ft = (const krb5plugin_kdc_ftable *)plug;
 | |
| 
 | |
|     if (ft->audit == NULL)
 | |
| 	return KRB5_PLUGIN_NO_HANDLE;
 | |
|     return ft->audit((void *)plug, userctx);
 | |
| }
 | |
| 
 | |
| krb5_error_code
 | |
| _kdc_plugin_audit(astgs_request_t r)
 | |
| {
 | |
|     krb5_error_code ret = KRB5_PLUGIN_NO_HANDLE;
 | |
| 
 | |
|     if (have_plugin)
 | |
|         ret = _krb5_plugin_run_f(r->context, &kdc_plugin_data, 0, r, audit);
 | |
| 
 | |
|     if (ret == KRB5_PLUGIN_NO_HANDLE)
 | |
|         ret = 0;
 | |
| 
 | |
|     return ret;
 | |
| }
 | |
| 
 | |
| KDC_LIB_FUNCTION uintptr_t KDC_LIB_CALL
 | |
| kdc_get_instance(const char *libname)
 | |
| {
 | |
|     static const char *instance = "libkdc";
 | |
| 
 | |
|     if (strcmp(libname, "kdc") == 0)
 | |
|         return (uintptr_t)instance;
 | |
|     else if (strcmp(libname, "hdb") == 0)
 | |
| 	return hdb_get_instance(libname);
 | |
|     else if (strcmp(libname, "krb5") == 0)
 | |
|         return krb5_get_instance(libname);
 | |
| 
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| /*
 | |
|  * Minimum API surface wrapper for libheimbase object types so it
 | |
|  * may remain a private interface, yet plugins can interact with
 | |
|  * objects.
 | |
|  */
 | |
| 
 | |
| KDC_LIB_FUNCTION kdc_object_t KDC_LIB_CALL
 | |
| kdc_object_alloc(size_t size, const char *name, kdc_type_dealloc dealloc)
 | |
| {
 | |
|     return heim_alloc(size, name, dealloc);
 | |
| }
 | |
| 
 | |
| KDC_LIB_FUNCTION kdc_object_t KDC_LIB_CALL
 | |
| kdc_object_retain(kdc_object_t o)
 | |
| {
 | |
|     return heim_retain(o);
 | |
| }
 | |
| 
 | |
| KDC_LIB_FUNCTION void KDC_LIB_CALL
 | |
| kdc_object_release(kdc_object_t o)
 | |
| {
 | |
|     heim_release(o);
 | |
| }
 | |
| 
 | |
| KDC_LIB_FUNCTION kdc_object_t KDC_LIB_CALL
 | |
| kdc_bool_create(krb5_boolean v)
 | |
| {
 | |
|     return heim_bool_create(v);
 | |
| }
 | |
| 
 | |
| KDC_LIB_FUNCTION krb5_boolean KDC_LIB_CALL
 | |
| kdc_bool_get_value(kdc_object_t o)
 | |
| {
 | |
|     return heim_bool_val(o);
 | |
| }
 | |
| 
 | |
| struct kdc_array_iterator_trampoline_data {
 | |
|     kdc_array_iterator_t iter;
 | |
|     void *data;
 | |
| };
 | |
| 
 | |
| /*
 | |
|  * Calling convention shim to avoid needing to update all internal
 | |
|  * consumers of heim_array_iterate_f()
 | |
|  */
 | |
| static void
 | |
| _kdc_array_iterator_trampoline(kdc_object_t o, void *data, int *stop)
 | |
| {
 | |
|     struct kdc_array_iterator_trampoline_data *t = data;
 | |
| 
 | |
|     t->iter(o, t->data, stop);
 | |
| }
 | |
| 
 | |
| KDC_LIB_FUNCTION void KDC_LIB_CALL
 | |
| kdc_array_iterate(kdc_array_t a, void *d, kdc_array_iterator_t iter)
 | |
| {
 | |
|     struct kdc_array_iterator_trampoline_data t;
 | |
| 
 | |
|     t.iter = iter;
 | |
|     t.data = d;
 | |
| 
 | |
|     heim_array_iterate_f((heim_array_t)a, &t, _kdc_array_iterator_trampoline);
 | |
| }
 | |
| 
 | |
| KDC_LIB_FUNCTION size_t KDC_LIB_CALL
 | |
| kdc_array_get_length(kdc_array_t a)
 | |
| {
 | |
|     return heim_array_get_length((heim_array_t)a);
 | |
| }
 | |
| 
 | |
| KDC_LIB_FUNCTION kdc_object_t KDC_LIB_CALL
 | |
| kdc_array_get_value(heim_array_t a, size_t i)
 | |
| {
 | |
|     return heim_array_get_value((heim_array_t)a, i);
 | |
| }
 | |
| 
 | |
| KDC_LIB_FUNCTION kdc_object_t KDC_LIB_CALL
 | |
| kdc_array_copy_value(heim_array_t a, size_t i)
 | |
| {
 | |
|     return heim_array_copy_value((heim_array_t)a, i);
 | |
| }
 | |
| 
 | |
| KDC_LIB_FUNCTION kdc_string_t KDC_LIB_CALL
 | |
| kdc_string_create(const char *s)
 | |
| {
 | |
|     return (kdc_string_t)heim_string_create(s);
 | |
| }
 | |
| 
 | |
| KDC_LIB_FUNCTION const char * KDC_LIB_CALL
 | |
| kdc_string_get_utf8(kdc_string_t s)
 | |
| {
 | |
|     return heim_string_get_utf8((heim_string_t)s);
 | |
| }
 | |
| 
 | |
| KDC_LIB_FUNCTION kdc_data_t
 | |
| kdc_data_create(const void *d, size_t len)
 | |
| {
 | |
|     return (kdc_data_t)heim_data_create(d, len);
 | |
| }
 | |
| 
 | |
| KDC_LIB_FUNCTION const krb5_data * KDC_LIB_CALL
 | |
| kdc_data_get_data(kdc_data_t d)
 | |
| {
 | |
|     return heim_data_get_data((heim_data_t)d);
 | |
| }
 | |
| 
 | |
| KDC_LIB_FUNCTION kdc_number_t KDC_LIB_CALL
 | |
| kdc_number_create(int64_t v)
 | |
| {
 | |
|     return (kdc_number_t)heim_number_create(v);
 | |
| }
 | |
| 
 | |
| KDC_LIB_FUNCTION int64_t KDC_LIB_CALL
 | |
| kdc_number_get_value(kdc_number_t n)
 | |
| {
 | |
|     return heim_number_get_long((heim_number_t)n);
 | |
| }
 | |
| 
 | |
| /*
 | |
|  * Plugin accessors
 | |
|  */
 | |
| 
 | |
| KDC_LIB_FUNCTION krb5_error_code KDC_LIB_CALL
 | |
| kdc_request_add_reply_padata(astgs_request_t r, PA_DATA *md)
 | |
| {
 | |
|     heim_assert(r->rep.padata != NULL, "reply padata not allocated");
 | |
|     return add_METHOD_DATA(r->rep.padata, md);
 | |
| }
 | |
| 
 | |
| KDC_LIB_FUNCTION krb5_error_code KDC_LIB_CALL
 | |
| kdc_request_add_encrypted_padata(astgs_request_t r, PA_DATA *md)
 | |
| {
 | |
|     if (r->ek.encrypted_pa_data == NULL) {
 | |
| 	r->ek.encrypted_pa_data = calloc(1, sizeof *(r->ek.encrypted_pa_data));
 | |
| 	if (r->ek.encrypted_pa_data == NULL) {
 | |
| 	    return ENOMEM;
 | |
| 	}
 | |
|     }
 | |
| 
 | |
|     return add_METHOD_DATA(r->ek.encrypted_pa_data, md);
 | |
| }
 | |
| 
 | |
| KDC_LIB_FUNCTION krb5_error_code KDC_LIB_CALL
 | |
| kdc_request_add_pac_buffer(astgs_request_t r,
 | |
| 			   uint32_t pactype,
 | |
| 			   const krb5_data *d)
 | |
| {
 | |
|     krb5_error_code ret;
 | |
|     krb5_pac pac;
 | |
| 
 | |
|     if (r->pac == NULL) {
 | |
| 	ret = krb5_pac_init(r->context, &pac);
 | |
| 	if (ret)
 | |
| 	    return ret;
 | |
|     } else
 | |
| 	pac = heim_retain(r->pac);
 | |
| 
 | |
|     ret = krb5_pac_add_buffer(r->context, pac, pactype, d);
 | |
|     if (ret == 0 && r->pac == NULL)
 | |
| 	r->pac = pac;
 | |
|     else
 | |
| 	heim_release(pac);
 | |
| 
 | |
|     return ret;
 | |
| }
 | |
| 
 | |
| #undef _KDC_REQUEST_GET_ACCESSOR
 | |
| #define _KDC_REQUEST_GET_ACCESSOR(R, T, f)		    \
 | |
|     KDC_LIB_FUNCTION T KDC_LIB_CALL			    \
 | |
|     kdc_request_get_ ## f(R r)				    \
 | |
|     {							    \
 | |
| 	return r->f;					    \
 | |
|     }
 | |
| 
 | |
| #undef _KDC_REQUEST_SET_ACCESSOR
 | |
| #define _KDC_REQUEST_SET_ACCESSOR(R, T, f)		    \
 | |
|     KDC_LIB_FUNCTION void KDC_LIB_CALL			    \
 | |
|     kdc_request_set_ ## f(R r, T v)			    \
 | |
|     {							    \
 | |
| 	r->f = v;					    \
 | |
|     }
 | |
| 
 | |
| #undef _KDC_REQUEST_GET_ACCESSOR_PTR
 | |
| #define _KDC_REQUEST_GET_ACCESSOR_PTR(R, T,  f)		    \
 | |
|     KDC_LIB_FUNCTION const T KDC_LIB_CALL		    \
 | |
|     kdc_request_get_ ## f(R r)				    \
 | |
|     {							    \
 | |
| 	return r->f;					    \
 | |
|     }
 | |
| 
 | |
| #undef _KDC_REQUEST_SET_ACCESSOR_PTR
 | |
| #define _KDC_REQUEST_SET_ACCESSOR_PTR(R, T, t, f)	    \
 | |
|     KDC_LIB_FUNCTION krb5_error_code KDC_LIB_CALL	    \
 | |
|     kdc_request_set_ ## f(R r, const T v)		    \
 | |
|     {							    \
 | |
| 	krb5_error_code ret;				    \
 | |
| 	T tmp;						    \
 | |
| 							    \
 | |
| 	if (v == r->f)					    \
 | |
| 	    return 0;					    \
 | |
| 	else if (v) {					    \
 | |
| 	    ret = copy_##t(v, &tmp);			    \
 | |
| 	    if (ret)					    \
 | |
| 		return ret;				    \
 | |
| 	} else						    \
 | |
| 	    tmp = NULL;					    \
 | |
| 							    \
 | |
| 	free_##t(r->f);					    \
 | |
| 	r->f = tmp;					    \
 | |
| 							    \
 | |
| 	return 0;					    \
 | |
|     }
 | |
| 
 | |
| #undef _KDC_REQUEST_GET_ACCESSOR_STRUCT
 | |
| #define _KDC_REQUEST_GET_ACCESSOR_STRUCT(R, T, f)	    \
 | |
|     KDC_LIB_FUNCTION const T * KDC_LIB_CALL		    \
 | |
|     kdc_request_get_ ## f(R r)				    \
 | |
|     {							    \
 | |
| 	return &r->f;					    \
 | |
|     }
 | |
| 
 | |
| #undef _KDC_REQUEST_SET_ACCESSOR_STRUCT
 | |
| #define _KDC_REQUEST_SET_ACCESSOR_STRUCT(R, T, t, f)	    \
 | |
|     KDC_LIB_FUNCTION krb5_error_code KDC_LIB_CALL	    \
 | |
|     kdc_request_set_ ## f(R r, const T *v)		    \
 | |
|     {							    \
 | |
| 	krb5_error_code ret;				    \
 | |
| 	T tmp;						    \
 | |
| 							    \
 | |
| 	if (v == NULL)					    \
 | |
| 	    return EINVAL;				    \
 | |
| 	else if (v == &r->f)				    \
 | |
| 	    return 0;					    \
 | |
| 							    \
 | |
| 	ret = copy_##t(v, &tmp);			    \
 | |
| 	if (ret)					    \
 | |
| 	    return ret;					    \
 | |
| 							    \
 | |
| 	free_##t(&r->f);				    \
 | |
| 	r->f = tmp;					    \
 | |
| 							    \
 | |
| 	return 0;					    \
 | |
|     }
 | |
| 
 | |
| static krb5_error_code
 | |
| copy_string_ptr(const char *src, char **dst)
 | |
| {
 | |
|     *dst = strdup(src);
 | |
|     if (*dst == NULL)
 | |
| 	return ENOMEM;
 | |
| 
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| static void
 | |
| free_string_ptr(char *s)
 | |
| {
 | |
|     free(s);
 | |
| }
 | |
| 
 | |
| static krb5_error_code
 | |
| copy_Principal_ptr(krb5_const_principal src, krb5_principal *dst)
 | |
| {
 | |
|     krb5_error_code ret;
 | |
|     krb5_principal p;
 | |
| 
 | |
|     *dst = NULL;
 | |
| 
 | |
|     p = calloc(1, sizeof(*p));
 | |
|     if (p == NULL)
 | |
| 	return ENOMEM;
 | |
| 
 | |
|     ret = copy_Principal(src, p);
 | |
|     if (ret == 0)
 | |
| 	*dst = p;
 | |
|     else
 | |
| 	free(p);
 | |
| 
 | |
|     return ret;
 | |
| }
 | |
| 
 | |
| static void
 | |
| free_Principal_ptr(krb5_principal p)
 | |
| {
 | |
|     if (p) {
 | |
| 	free_Principal(p);
 | |
| 	free(p);
 | |
|     }
 | |
| }
 | |
| 
 | |
| static krb5_error_code
 | |
| copy_pac(const struct krb5_pac_data *src, struct krb5_pac_data **dst)
 | |
| {
 | |
|     /* FIXME use heim_copy() when it exists */
 | |
|     *dst = (krb5_pac)heim_retain((heim_object_t)src);
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| static void
 | |
| free_pac(struct krb5_pac_data *o)
 | |
| {
 | |
|     heim_release(o);
 | |
| }
 | |
| 
 | |
| static krb5_error_code
 | |
| copy_keyblock(const EncryptionKey *src, EncryptionKey *dst)
 | |
| {
 | |
|     return copy_EncryptionKey(src, dst);
 | |
| }
 | |
| 
 | |
| static void
 | |
| free_keyblock(EncryptionKey *key)
 | |
| {
 | |
|     krb5_free_keyblock_contents(NULL, key);
 | |
| }
 | |
| 
 | |
| #undef HEIMDAL_KDC_KDC_ACCESSORS_H
 | |
| #include "kdc-accessors.h"
 | |
| 
 | |
| #undef _KDC_REQUEST_GET_ACCESSOR
 | |
| #undef _KDC_REQUEST_SET_ACCESSOR
 | |
| 
 | |
| #undef _KDC_REQUEST_GET_ACCESSOR_PTR
 | |
| #undef _KDC_REQUEST_SET_ACCESSOR_PTR
 | |
| #define _KDC_REQUEST_SET_ACCESSOR_PTR(R, T, t, f)	    \
 | |
|     void						    \
 | |
|     _kdc_request_set_ ## f ## _nocopy(R r, T *v)	    \
 | |
|     {							    \
 | |
| 	if (*v != r->f) {				    \
 | |
| 	    free_##t(r->f);				    \
 | |
| 	    r->f = *v;					    \
 | |
| 	}						    \
 | |
| 	*v = NULL;					    \
 | |
|     }
 | |
| 
 | |
| #undef _KDC_REQUEST_GET_ACCESSOR_STRUCT
 | |
| #undef _KDC_REQUEST_SET_ACCESSOR_STRUCT
 | |
| #define _KDC_REQUEST_SET_ACCESSOR_STRUCT(R, T, t, f)	    \
 | |
|     void						    \
 | |
|     _kdc_request_set_ ## f ## _nocopy(R r, T *v)	    \
 | |
|     {							    \
 | |
| 	if (v != &r->f) {				    \
 | |
| 	    free_##t(&r->f);				    \
 | |
| 	    r->f = *v;					    \
 | |
| 	}						    \
 | |
| 	memset(v, 0, sizeof(*v));			    \
 | |
|     }
 | |
| 
 | |
| #undef HEIMDAL_KDC_KDC_ACCESSORS_H
 | |
| #include "kdc-accessors.h"
 |