Blame SOURCES/0019-Calculate-enctypes-in-a-separate-function.patch

2e5ed6
From 9ad1164405e7b4decb7c4ad96fe5ab27d6e53366 Mon Sep 17 00:00:00 2001
2e5ed6
From: Sumit Bose <sbose@redhat.com>
2e5ed6
Date: Wed, 6 Jun 2018 16:31:32 +0200
2e5ed6
Subject: [PATCH 19/23] Calculate enctypes in a separate function
2e5ed6
2e5ed6
Related to https://bugzilla.redhat.com/show_bug.cgi?id=1542354
2e5ed6
---
2e5ed6
 library/adenroll.c | 137 +++++++++++++++++++++++++++++++----------------------
2e5ed6
 1 file changed, 81 insertions(+), 56 deletions(-)
2e5ed6
2e5ed6
diff --git a/library/adenroll.c b/library/adenroll.c
2e5ed6
index 6fdc773..75ac1e4 100644
2e5ed6
--- a/library/adenroll.c
2e5ed6
+++ b/library/adenroll.c
2e5ed6
@@ -542,6 +542,83 @@ calculate_computer_account (adcli_enroll *enroll,
2e5ed6
 	return ADCLI_SUCCESS;
2e5ed6
 }
2e5ed6
 
2e5ed6
+static adcli_result
2e5ed6
+calculate_enctypes (adcli_enroll *enroll, char **enctype)
2e5ed6
+{
2e5ed6
+	char *value = NULL;
2e5ed6
+	krb5_enctype *read_enctypes;
2e5ed6
+	char *new_value = NULL;
2e5ed6
+	int is_2008_or_later;
2e5ed6
+	LDAP *ldap;
2e5ed6
+
2e5ed6
+	*enctype = NULL;
2e5ed6
+	/*
2e5ed6
+	 * Because we're using a keytab we want the server to be aware of the
2e5ed6
+	 * encryption types supported on the client, because we can't dynamically
2e5ed6
+	 * use a new one that's thrown at us.
2e5ed6
+	 *
2e5ed6
+	 * If the encryption types are not explicitly set by the caller of this
2e5ed6
+	 * library, then see if the account already has some encryption types
2e5ed6
+	 * marked on it.
2e5ed6
+	 *
2e5ed6
+	 * If not, write our default set to the account.
2e5ed6
+	 *
2e5ed6
+	 * Note that Windows 2003 and earlier have a standard set of encryption
2e5ed6
+	 * types, and no msDS-supportedEncryptionTypes attribute.
2e5ed6
+	 */
2e5ed6
+
2e5ed6
+	ldap = adcli_conn_get_ldap_connection (enroll->conn);
2e5ed6
+	return_unexpected_if_fail (ldap != NULL);
2e5ed6
+
2e5ed6
+	is_2008_or_later = adcli_conn_server_has_capability (enroll->conn, ADCLI_CAP_V60_OID);
2e5ed6
+
2e5ed6
+	/* In 2008 or later, use the msDS-supportedEncryptionTypes attribute */
2e5ed6
+	if (is_2008_or_later) {
2e5ed6
+		value = _adcli_ldap_parse_value (ldap, enroll->computer_attributes,
2e5ed6
+		                                 "msDS-supportedEncryptionTypes");
2e5ed6
+
2e5ed6
+		if (!enroll->keytab_enctypes_explicit && value != NULL) {
2e5ed6
+			read_enctypes = _adcli_krb5_parse_enctypes (value);
2e5ed6
+			if (read_enctypes == NULL) {
2e5ed6
+				_adcli_warn ("Invalid or unsupported encryption types are set on "
2e5ed6
+				             "the computer account (%s).", value);
2e5ed6
+			} else {
2e5ed6
+				free (enroll->keytab_enctypes);
2e5ed6
+				enroll->keytab_enctypes = read_enctypes;
2e5ed6
+			}
2e5ed6
+		}
2e5ed6
+
2e5ed6
+	/* In 2003 or earlier, standard set of enc types */
2e5ed6
+	} else {
2e5ed6
+		value = _adcli_krb5_format_enctypes (v51_earlier_enctypes);
2e5ed6
+	}
2e5ed6
+
2e5ed6
+	new_value = _adcli_krb5_format_enctypes (adcli_enroll_get_keytab_enctypes (enroll));
2e5ed6
+	if (new_value == NULL) {
2e5ed6
+		free (value);
2e5ed6
+		_adcli_warn ("The encryption types desired are not available in active directory");
2e5ed6
+		return ADCLI_ERR_CONFIG;
2e5ed6
+	}
2e5ed6
+
2e5ed6
+	/* If we already have this value, then don't need to update */
2e5ed6
+	if (value && strcmp (new_value, value) == 0) {
2e5ed6
+		free (value);
2e5ed6
+		free (new_value);
2e5ed6
+		return ADCLI_SUCCESS;
2e5ed6
+	}
2e5ed6
+	free (value);
2e5ed6
+
2e5ed6
+	if (!is_2008_or_later) {
2e5ed6
+		free (new_value);
2e5ed6
+		_adcli_warn ("Server does not support setting encryption types");
2e5ed6
+		return ADCLI_SUCCESS;
2e5ed6
+	}
2e5ed6
+
2e5ed6
+	*enctype = new_value;
2e5ed6
+	return ADCLI_SUCCESS;
2e5ed6
+}
2e5ed6
+
2e5ed6
+
2e5ed6
 static adcli_result
2e5ed6
 create_computer_account (adcli_enroll *enroll,
2e5ed6
                          LDAP *ldap)
2e5ed6
@@ -1053,75 +1130,23 @@ retrieve_computer_account (adcli_enroll *enroll)
2e5ed6
 static adcli_result
2e5ed6
 update_and_calculate_enctypes (adcli_enroll *enroll)
2e5ed6
 {
2e5ed6
-	char *value = NULL;
2e5ed6
-	krb5_enctype *read_enctypes;
2e5ed6
 	char *vals_supportedEncryptionTypes[] = { NULL, NULL };
2e5ed6
 	LDAPMod mod = { LDAP_MOD_REPLACE, "msDS-supportedEncryptionTypes", { vals_supportedEncryptionTypes, } };
2e5ed6
 	LDAPMod *mods[2] = { &mod, NULL };
2e5ed6
-	int is_2008_or_later;
2e5ed6
 	char *new_value;
2e5ed6
 	LDAP *ldap;
2e5ed6
 	int ret;
2e5ed6
 
2e5ed6
-	/*
2e5ed6
-	 * Because we're using a keytab we want the server to be aware of the
2e5ed6
-	 * encryption types supported on the client, because we can't dynamically
2e5ed6
-	 * use a new one that's thrown at us.
2e5ed6
-	 *
2e5ed6
-	 * If the encryption types are not explicitly set by the caller of this
2e5ed6
-	 * library, then see if the account already has some encryption types
2e5ed6
-	 * marked on it.
2e5ed6
-	 *
2e5ed6
-	 * If not, write our default set to the account.
2e5ed6
-	 *
2e5ed6
-	 * Note that Windows 2003 and earlier have a standard set of encryption
2e5ed6
-	 * types, and no msDS-supportedEncryptionTypes attribute.
2e5ed6
-	 */
2e5ed6
-
2e5ed6
 	ldap = adcli_conn_get_ldap_connection (enroll->conn);
2e5ed6
 	return_unexpected_if_fail (ldap != NULL);
2e5ed6
 
2e5ed6
-	is_2008_or_later = adcli_conn_server_has_capability (enroll->conn, ADCLI_CAP_V60_OID);
2e5ed6
-
2e5ed6
-	/* In 2008 or later, use the msDS-supportedEncryptionTypes attribute */
2e5ed6
-	if (is_2008_or_later) {
2e5ed6
-		value = _adcli_ldap_parse_value (ldap, enroll->computer_attributes,
2e5ed6
-		                                 "msDS-supportedEncryptionTypes");
2e5ed6
-
2e5ed6
-		if (!enroll->keytab_enctypes_explicit && value != NULL) {
2e5ed6
-			read_enctypes = _adcli_krb5_parse_enctypes (value);
2e5ed6
-			if (read_enctypes == NULL) {
2e5ed6
-				_adcli_warn ("Invalid or unsupported encryption types are set on "
2e5ed6
-				             "the computer account (%s).", value);
2e5ed6
-			} else {
2e5ed6
-				free (enroll->keytab_enctypes);
2e5ed6
-				enroll->keytab_enctypes = read_enctypes;
2e5ed6
-			}
2e5ed6
-		}
2e5ed6
-
2e5ed6
-	/* In 2003 or earlier, standard set of enc types */
2e5ed6
-	} else {
2e5ed6
-		value = _adcli_krb5_format_enctypes (v51_earlier_enctypes);
2e5ed6
-	}
2e5ed6
-
2e5ed6
-	new_value = _adcli_krb5_format_enctypes (adcli_enroll_get_keytab_enctypes (enroll));
2e5ed6
-	if (new_value == NULL) {
2e5ed6
-		free (value);
2e5ed6
-		_adcli_warn ("The encryption types desired are not available in active directory");
2e5ed6
-		return ADCLI_ERR_CONFIG;
2e5ed6
-	}
2e5ed6
-
2e5ed6
-	/* If we already have this value, then don't need to update */
2e5ed6
-	if (value && strcmp (new_value, value) == 0) {
2e5ed6
-		free (value);
2e5ed6
+	ret = calculate_enctypes (enroll, &new_value);
2e5ed6
+	if (ret != ADCLI_SUCCESS) {
2e5ed6
 		free (new_value);
2e5ed6
-		return ADCLI_SUCCESS;
2e5ed6
+		return ret;
2e5ed6
 	}
2e5ed6
-	free (value);
2e5ed6
 
2e5ed6
-	if (!is_2008_or_later) {
2e5ed6
-		free (new_value);
2e5ed6
-		_adcli_warn ("Server does not support setting encryption types");
2e5ed6
+	if (new_value == NULL) {
2e5ed6
 		return ADCLI_SUCCESS;
2e5ed6
 	}
2e5ed6
 
2e5ed6
-- 
2e5ed6
2.14.4
2e5ed6