libtommath: Fix possible integer overflow CVE-2023-36328
[heimdal.git] / kdc / kdc-tester.c
blobbeb9e1f4a23e75b100d1f14fac04dec5715e1dc0
1 /*
2 * Copyright (c) 1997-2005 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
4 * All rights reserved.
6 * Portions Copyright (c) 2009 Apple Inc. All rights reserved.
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
19 * 3. Neither the name of the Institute nor the names of its contributors
20 * may be used to endorse or promote products derived from this software
21 * without specific prior written permission.
23 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
24 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 * SUCH DAMAGE.
36 #include "kdc_locl.h"
37 #include "send_to_kdc_plugin.h"
39 struct perf {
40 unsigned long as_req;
41 unsigned long tgs_req;
42 struct timeval start;
43 struct timeval stop;
44 struct perf *next;
45 } *ptop;
47 int detach_from_console = -1;
48 int daemon_child = -1;
49 int do_bonjour = -1;
51 static krb5_kdc_configuration *kdc_config;
52 static krb5_context kdc_context;
54 static struct sockaddr_storage sa;
55 static const char *astr = "0.0.0.0";
57 static void eval_object(heim_object_t);
64 static krb5_error_code
65 plugin_init(krb5_context context, void **pctx)
67 *pctx = NULL;
68 return 0;
71 static void
72 plugin_fini(void *ctx)
76 static krb5_error_code
77 plugin_send_to_kdc(krb5_context context,
78 void *ctx,
79 krb5_krbhst_info *ho,
80 time_t timeout,
81 const krb5_data *in,
82 krb5_data *out)
84 return KRB5_PLUGIN_NO_HANDLE;
87 static krb5_error_code
88 plugin_send_to_realm(krb5_context context,
89 void *ctx,
90 krb5_const_realm realm,
91 time_t timeout,
92 const krb5_data *in,
93 krb5_data *out)
95 int ret;
97 krb5_kdc_update_time(NULL);
99 ret = krb5_kdc_process_request(kdc_context, kdc_config,
100 in->data, in->length,
101 out, NULL, astr,
102 (struct sockaddr *)&sa, 0);
103 if (ret)
104 krb5_err(kdc_context, 1, ret, "krb5_kdc_process_request");
106 return 0;
109 static krb5plugin_send_to_kdc_ftable send_to_kdc = {
110 KRB5_PLUGIN_SEND_TO_KDC_VERSION_2,
111 plugin_init,
112 plugin_fini,
113 plugin_send_to_kdc,
114 plugin_send_to_realm
117 static void
118 perf_start(struct perf *perf)
120 memset(perf, 0, sizeof(*perf));
122 gettimeofday(&perf->start, NULL);
123 perf->next = ptop;
124 ptop = perf;
127 static void
128 perf_stop(struct perf *perf)
130 gettimeofday(&perf->stop, NULL);
131 ptop = perf->next;
133 if (ptop) {
134 ptop->as_req += perf->as_req;
135 ptop->tgs_req += perf->tgs_req;
138 timevalsub(&perf->stop, &perf->start);
139 printf("time: %lu.%06lu\n",
140 (unsigned long)perf->stop.tv_sec,
141 (unsigned long)perf->stop.tv_usec);
143 #define USEC_PER_SEC 1000000
145 if (perf->as_req) {
146 double as_ps = 0.0;
147 as_ps = (perf->as_req * USEC_PER_SEC) / (double)((perf->stop.tv_sec * USEC_PER_SEC) + perf->stop.tv_usec);
148 printf("as-req/s %.2lf (total %lu requests)\n", as_ps, perf->as_req);
151 if (perf->tgs_req) {
152 double tgs_ps = 0.0;
153 tgs_ps = (perf->tgs_req * USEC_PER_SEC) / (double)((perf->stop.tv_sec * USEC_PER_SEC) + perf->stop.tv_usec);
154 printf("tgs-req/s %.2lf (total %lu requests)\n", tgs_ps, perf->tgs_req);
162 static void
163 eval_repeat(heim_dict_t o)
165 heim_object_t or = heim_dict_get_value(o, HSTR("value"));
166 heim_number_t n = heim_dict_get_value(o, HSTR("num"));
167 int i, num;
168 struct perf perf;
170 perf_start(&perf);
172 heim_assert(or != NULL, "value missing");
173 heim_assert(n != NULL, "num missing");
175 num = heim_number_get_int(n);
176 heim_assert(num >= 0, "num >= 0");
178 for (i = 0; i < num; i++)
179 eval_object(or);
181 perf_stop(&perf);
188 static krb5_error_code
189 copy_keytab(krb5_context context, krb5_keytab from, krb5_keytab to)
191 krb5_keytab_entry entry;
192 krb5_kt_cursor cursor;
193 krb5_error_code ret;
195 ret = krb5_kt_start_seq_get(context, from, &cursor);
196 if (ret)
197 return ret;
198 while ((ret = krb5_kt_next_entry(context, from, &entry, &cursor)) == 0){
199 krb5_kt_add_entry(context, to, &entry);
200 krb5_kt_free_entry(context, &entry);
202 (void) krb5_kt_end_seq_get(context, from, &cursor);
203 if (ret == KRB5_KT_END)
204 return 0;
205 return ret;
212 static void
213 eval_kinit(heim_dict_t o)
215 heim_string_t user, password, keytab, fast_armor_cc, pk_user_id, ccache;
216 krb5_get_init_creds_opt *opt;
217 krb5_init_creds_context ctx;
218 krb5_principal client;
219 krb5_keytab ktmem = NULL;
220 krb5_ccache fast_cc = NULL;
221 krb5_error_code ret;
223 if (ptop)
224 ptop->as_req++;
226 user = heim_dict_get_value(o, HSTR("client"));
227 if (user == NULL)
228 krb5_errx(kdc_context, 1, "no client");
230 password = heim_dict_get_value(o, HSTR("password"));
231 keytab = heim_dict_get_value(o, HSTR("keytab"));
232 pk_user_id = heim_dict_get_value(o, HSTR("pkinit-user-cert-id"));
233 if (password == NULL && keytab == NULL && pk_user_id == NULL)
234 krb5_errx(kdc_context, 1, "password, keytab, nor PKINIT user cert ID");
236 ccache = heim_dict_get_value(o, HSTR("ccache"));
238 ret = krb5_parse_name(kdc_context, heim_string_get_utf8(user), &client);
239 if (ret)
240 krb5_err(kdc_context, 1, ret, "krb5_unparse_name");
242 /* PKINIT parts */
243 ret = krb5_get_init_creds_opt_alloc (kdc_context, &opt);
244 if (ret)
245 krb5_err(kdc_context, 1, ret, "krb5_get_init_creds_opt_alloc");
247 if (pk_user_id) {
248 heim_bool_t rsaobj = heim_dict_get_value(o, HSTR("pkinit-use-rsa"));
249 int use_rsa = rsaobj ? heim_bool_val(rsaobj) : 0;
251 ret = krb5_get_init_creds_opt_set_pkinit(kdc_context, opt,
252 client,
253 heim_string_get_utf8(pk_user_id),
254 NULL, NULL, NULL,
255 use_rsa ? 2 : 0,
256 NULL, NULL, NULL);
257 if (ret)
258 krb5_err(kdc_context, 1, ret, "krb5_get_init_creds_opt_set_pkinit");
261 ret = krb5_init_creds_init(kdc_context, client, NULL, NULL, 0, opt, &ctx);
262 if (ret)
263 krb5_err(kdc_context, 1, ret, "krb5_init_creds_init");
265 fast_armor_cc = heim_dict_get_value(o, HSTR("fast-armor-cc"));
266 if (fast_armor_cc) {
268 ret = krb5_cc_resolve(kdc_context, heim_string_get_utf8(fast_armor_cc), &fast_cc);
269 if (ret)
270 krb5_err(kdc_context, 1, ret, "krb5_cc_resolve");
272 ret = krb5_init_creds_set_fast_ccache(kdc_context, ctx, fast_cc);
273 if (ret)
274 krb5_err(kdc_context, 1, ret, "krb5_init_creds_set_fast_ccache");
276 fast_cc = NULL;
279 if (password) {
280 ret = krb5_init_creds_set_password(kdc_context, ctx,
281 heim_string_get_utf8(password));
282 if (ret)
283 krb5_err(kdc_context, 1, ret, "krb5_init_creds_set_password");
285 if (keytab) {
286 krb5_keytab kt = NULL;
288 ret = krb5_kt_resolve(kdc_context, heim_string_get_utf8(keytab), &kt);
289 if (ret)
290 krb5_err(kdc_context, 1, ret, "krb5_kt_resolve");
292 ret = krb5_kt_resolve(kdc_context, "MEMORY:keytab", &ktmem);
293 if (ret)
294 krb5_err(kdc_context, 1, ret, "krb5_kt_resolve(MEMORY)");
296 ret = copy_keytab(kdc_context, kt, ktmem);
297 if (ret)
298 krb5_err(kdc_context, 1, ret, "copy_keytab");
300 krb5_kt_close(kdc_context, kt);
302 ret = krb5_init_creds_set_keytab(kdc_context, ctx, ktmem);
303 if (ret)
304 krb5_err(kdc_context, 1, ret, "krb5_init_creds_set_keytab");
307 ret = krb5_init_creds_get(kdc_context, ctx);
308 if (ret)
309 krb5_err(kdc_context, 1, ret, "krb5_init_creds_get");
311 if (ccache) {
312 const char *name = heim_string_get_utf8(ccache);
313 krb5_creds cred;
314 krb5_ccache cc;
316 ret = krb5_init_creds_get_creds(kdc_context, ctx, &cred);
317 if (ret)
318 krb5_err(kdc_context, 1, ret, "krb5_init_creds_get_creds");
320 ret = krb5_cc_resolve(kdc_context, name, &cc);
321 if (ret)
322 krb5_err(kdc_context, 1, ret, "krb5_cc_resolve");
324 krb5_init_creds_store(kdc_context, ctx, cc);
326 ret = krb5_cc_close(kdc_context, cc);
327 if (ret)
328 krb5_err(kdc_context, 1, ret, "krb5_cc_close");
330 krb5_free_cred_contents(kdc_context, &cred);
333 krb5_init_creds_free(kdc_context, ctx);
335 if (ktmem)
336 krb5_kt_close(kdc_context, ktmem);
337 if (fast_cc)
338 krb5_cc_close(kdc_context, fast_cc);
345 static void
346 eval_kgetcred(heim_dict_t o)
348 heim_string_t server, ccache;
349 krb5_get_creds_opt opt;
350 heim_bool_t nostore;
351 krb5_error_code ret;
352 krb5_ccache cc = NULL;
353 krb5_principal s;
354 krb5_creds *out = NULL;
356 if (ptop)
357 ptop->tgs_req++;
359 server = heim_dict_get_value(o, HSTR("server"));
360 if (server == NULL)
361 krb5_errx(kdc_context, 1, "no server");
363 ccache = heim_dict_get_value(o, HSTR("ccache"));
364 if (ccache == NULL)
365 krb5_errx(kdc_context, 1, "no ccache");
367 nostore = heim_dict_get_value(o, HSTR("nostore"));
368 if (nostore == NULL)
369 nostore = heim_bool_create(1);
371 ret = krb5_cc_resolve(kdc_context, heim_string_get_utf8(ccache), &cc);
372 if (ret)
373 krb5_err(kdc_context, 1, ret, "krb5_cc_resolve");
375 ret = krb5_parse_name(kdc_context, heim_string_get_utf8(server), &s);
376 if (ret)
377 krb5_err(kdc_context, 1, ret, "krb5_parse_name");
379 ret = krb5_get_creds_opt_alloc(kdc_context, &opt);
380 if (ret)
381 krb5_err(kdc_context, 1, ret, "krb5_get_creds_opt_alloc");
383 if (heim_bool_val(nostore))
384 krb5_get_creds_opt_add_options(kdc_context, opt, KRB5_GC_NO_STORE);
386 ret = krb5_get_creds(kdc_context, opt, cc, s, &out);
387 if (ret)
388 krb5_err(kdc_context, 1, ret, "krb5_get_creds");
390 krb5_free_creds(kdc_context, out);
391 krb5_free_principal(kdc_context, s);
392 krb5_get_creds_opt_free(kdc_context, opt);
393 krb5_cc_close(kdc_context, cc);
401 static void
402 eval_kdestroy(heim_dict_t o)
404 heim_string_t ccache = heim_dict_get_value(o, HSTR("ccache"));;
405 krb5_error_code ret;
406 const char *name;
407 krb5_ccache cc;
409 heim_assert(ccache != NULL, "ccache_missing");
411 name = heim_string_get_utf8(ccache);
413 ret = krb5_cc_resolve(kdc_context, name, &cc);
414 if (ret)
415 krb5_err(kdc_context, 1, ret, "krb5_cc_resolve");
417 krb5_cc_destroy(kdc_context, cc);
425 static void
426 eval_array_element(heim_object_t o, void *ptr, int *stop)
428 eval_object(o);
431 static void
432 eval_object(heim_object_t o)
434 heim_tid_t t = heim_get_tid(o);
436 if (t == heim_array_get_type_id()) {
437 heim_array_iterate_f(o, NULL, eval_array_element);
438 } else if (t == heim_dict_get_type_id()) {
439 const char *op = heim_dict_get_value(o, HSTR("op"));
441 heim_assert(op != NULL, "op missing");
443 if (strcmp(op, "repeat") == 0) {
444 eval_repeat(o);
445 } else if (strcmp(op, "kinit") == 0) {
446 eval_kinit(o);
447 } else if (strcmp(op, "kgetcred") == 0) {
448 eval_kgetcred(o);
449 } else if (strcmp(op, "kdestroy") == 0) {
450 eval_kdestroy(o);
451 } else {
452 errx(1, "unsupported ops %s", op);
455 } else
456 errx(1, "unsupported");
461 main(int argc, char **argv)
463 krb5_error_code ret;
464 int optidx = 0;
466 setprogname(argv[0]);
468 ret = krb5_init_context(&kdc_context);
469 if (ret == KRB5_CONFIG_BADFORMAT)
470 errx (1, "krb5_init_context failed to parse configuration file");
471 else if (ret)
472 errx (1, "krb5_init_context failed: %d", ret);
474 ret = krb5_kt_register(kdc_context, &hdb_get_kt_ops);
475 if (ret)
476 errx (1, "krb5_kt_register(HDB) failed: %d", ret);
478 kdc_config = configure(kdc_context, argc, argv, &optidx);
480 argc -= optidx;
481 argv += optidx;
483 if (argc == 0)
484 errx(1, "missing operations");
486 krb5_plugin_register(kdc_context, PLUGIN_TYPE_DATA,
487 KRB5_PLUGIN_SEND_TO_KDC, &send_to_kdc);
490 void *buf;
491 size_t size;
492 heim_object_t o;
494 if (rk_undumpdata(argv[0], &buf, &size))
495 errx(1, "undumpdata: %s", argv[0]);
497 o = heim_json_create_with_bytes(buf, size, 10, 0, NULL);
498 free(buf);
499 if (o == NULL)
500 errx(1, "heim_json");
503 * do the work here
506 eval_object(o);
508 heim_release(o);
511 krb5_free_context(kdc_context);
512 return 0;