[Date Prev][Date Next] [Chronological] [Thread] [Top]

Re: smbk5pwd crash for missing symbol



Love HÃrnquist Ãstrand a Ãcrit :
26 maj 2008 kl. 08.27 skrev Guillaume Rousse:

Hello list(s).

I'm having a crash as soon as I attempt to change my password when smbk5pwd is activating. strace shows an unresolved symbol in smbk5pwd.so: _kadm5_free_keys

Heimdal source code shows this function is defined in libkadm5srv.so (/usr/lib/libkadm5srv.so.8.0.1) for heimdal 1.1. But this seems to be a private symbol, as objdump -T doesn't list it. Looking at heimdal Makefile.am, it seems a special configuration file is used (lib/krb5/version-script.map) to filter exported symbols, if linker support the use of -Wl,--version-script option. I couldn't find any description of this option.

Is this possible smbk5pwd author would have by mistake used a private function, only working because he build heimdal on a host whose linker doesn't support --version-script option ?

I'm using heimdal 1.1 and openldap 2.4.8 on mandriva linux.


I unexported the function since there was no function that returned key set-data.

Same goes for _kadm5_set_keys() that also is an internal function.

Since 1.0 you can use hdb_generate_key_set_password and hdb_free_keys to generate the key data.
I tried this approach (patch attached).

Converting _kadm5_free_keys to hdb_free_keys is trivial, as the former is just a wrapper over the second.

However, converting _kadm5_set_keys to hdb_generate_key_set_password is much more difficult. I first tried to inline all code from _kadm5_set_keys in smbk5pwd.c. However, gcc complains about "request for member âcontextâ in something not a structure or union" because it doesn't have any clue about the nature of kadm_context, which is a void ponter for smbk5pwd. Trying to cast it as a kadm5_server_context pointer fails, as this seems also to be a private heimdal structure...

Given my lack of C knowledge, I'm a bit stuck there.
--
Guillaume Rousse
Moyens Informatiques - INRIA Futurs
Tel: 01 69 35 69 62
--- smbk5pwd.c~	2008-02-12 00:34:15.000000000 +0100
+++ smbk5pwd.c	2008-05-27 10:59:32.000000000 +0200
@@ -368,6 +368,8 @@
 		struct berval *keys;
 		int kvno, i;
 		Attribute *a;
+		Key *local_keys;
+		size_t local_num_keys;
 
 		if ( !SMBK5PWD_DO_KRB5( pi ) ) break;
 
@@ -396,7 +398,27 @@
 				op->o_log_prefix, e->e_name.bv_val, 0 );
 		}
 
-		ret = _kadm5_set_keys(kadm_context, &ent, qpw->rs_new.bv_val);
+		/* _kadm5_set_keys is a private function, inline its code here */
+		ret = hdb_generate_key_set_password(kadm_context->context,
+			ent.principal, qpw->rs_new.bv_val,
+			&local_keys, &local_num_keys);
+		if (ret != 0)
+			break;
+
+		hdb_free_keys(kadm_context->context, ent.keys.len, ent.keys.val);
+		ent.keys.val = local_keys;
+		ent.keys.len = local_num_keys;
+
+		hdb_entry_set_pw_change_time(kadm_context->context, &ent, 0);
+
+		if (krb5_config_get_bool_default(kadm_context->context, NULL, FALSE,
+			"kadmin", "save-password", NULL)) {
+			ret = hdb_entry_set_password(kadm_context->context,
+				kadm_context->db, &ent, qpw->rs_new.bv_val);
+			if (ret != 0)
+				break;
+		}
+
 		hdb_seal_keys(context, db, &ent);
 		krb5_free_principal( context, ent.principal );
 
@@ -415,7 +437,7 @@
 		}
 		BER_BVZERO( &keys[i] );
 
-		_kadm5_free_keys(kadm_context, ent.keys.len, ent.keys.val);
+		hdb_free_keys(kadm_context, ent.keys.len, ent.keys.val);
 
 		if ( i != ent.keys.len ) {
 			ber_bvarray_free( keys );