krb5 commit [krb5-1.12]: Remove length limit on PKINIT PKCS#12 prompt

Tom Yu tlyu at mit.edu
Mon Feb 9 22:27:38 EST 2015


https://github.com/krb5/krb5/commit/e4c312e505b46b35ab35ce74a8eec153641f95ac
commit e4c312e505b46b35ab35ce74a8eec153641f95ac
Author: Greg Hudson <ghudson at mit.edu>
Date:   Wed Oct 29 12:16:40 2014 -0400

    Remove length limit on PKINIT PKCS#12 prompt
    
    Long pathnames can trigger the 128-byte prompt length limit in
    pkinit_get_certs_pkcs12.  Use asprintf instead of snprintf.  Also
    check the result of the prompter invocation.
    
    (cherry picked from commit 3c330ea5846ca02da36a0cb5a5c879364d28a267)
    
    ticket: 8134 (new)
    version_fixed: 1.12.3
    status: resolved

 src/plugins/preauth/pkinit/pkinit_crypto_openssl.c |   17 ++++++++++-------
 1 files changed, 10 insertions(+), 7 deletions(-)

diff --git a/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c b/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
index f010bd7..02bdcbf 100644
--- a/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
+++ b/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
@@ -4293,6 +4293,7 @@ pkinit_get_certs_pkcs12(krb5_context context,
                         krb5_principal princ)
 {
     krb5_error_code retval = KRB5KDC_ERR_PREAUTH_FAILED;
+    char *prompt_string = NULL;
     X509 *x = NULL;
     PKCS12 *p12 = NULL;
     int ret;
@@ -4333,8 +4334,7 @@ pkinit_get_certs_pkcs12(krb5_context context,
         krb5_data rdat;
         krb5_prompt kprompt;
         krb5_prompt_type prompt_type;
-        int r = 0;
-        char prompt_string[128];
+        krb5_error_code r;
         char prompt_reply[128];
         char *prompt_prefix = _("Pass phrase for");
         char *p12name = reassemble_pkcs12_name(idopts->cert_filename);
@@ -4366,11 +4366,9 @@ pkinit_get_certs_pkcs12(krb5_context context,
             rdat.data = prompt_reply;
             rdat.length = sizeof(prompt_reply);
 
-            r = snprintf(prompt_string, sizeof(prompt_string), "%s %s",
-                         prompt_prefix, idopts->cert_filename);
-            if (r >= (int)sizeof(prompt_string)) {
-                pkiDebug("Prompt string, '%s %s', is too long!\n",
-                         prompt_prefix, idopts->cert_filename);
+            if (asprintf(&prompt_string, "%s %s", prompt_prefix,
+                         idopts->cert_filename) < 0) {
+                prompt_string = NULL;
                 goto cleanup;
             }
             kprompt.prompt = prompt_string;
@@ -4382,6 +4380,10 @@ pkinit_get_certs_pkcs12(krb5_context context,
             r = (*id_cryptoctx->prompter)(context, id_cryptoctx->prompter_data,
                                           NULL, NULL, 1, &kprompt);
             k5int_set_prompt_types(context, 0);
+            if (r) {
+                pkiDebug("Failed to prompt for PKCS12 password");
+                goto cleanup;
+            }
         }
 
         ret = PKCS12_parse(p12, rdat.data, &y, &x, NULL);
@@ -4406,6 +4408,7 @@ pkinit_get_certs_pkcs12(krb5_context context,
     retval = 0;
 
 cleanup:
+    free(prompt_string);
     if (p12)
         PKCS12_free(p12);
     if (retval) {


More information about the cvs-krb5 mailing list