kdc: add success logging to pa_enc_chal_validate()
authorStefan Metzmacher <metze@samba.org>
Fri, 4 Mar 2022 23:24:41 +0000 (00:24 +0100)
committerStefan Metzmacher <metze@samba.org>
Fri, 9 Feb 2024 17:31:21 +0000 (18:31 +0100)
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14054
Upstream: https://github.com/heimdal/heimdal/pull/970

Signed-off-by: Stefan Metzmacher <metze@samba.org>
third_party/heimdal/kdc/kerberos5.c

index fd61791711218ca528200f1b7c1de17002137133..cbba1abdb1ffd941b2263fd014214f71450d3e67 100644 (file)
@@ -901,6 +901,9 @@ pa_enc_chal_validate(astgs_request_t r, const PA_DATA *pa)
     free_EncryptedData(&enc_data);
     if (ret == 0) {
        krb5_crypto challengecrypto;
+       char *estr = NULL;
+       char *astr = NULL;
+       char *kstr = NULL;
 
        ret = krb5_crypto_init(r->context, &KDCchallengekey, 0, &challengecrypto);
        krb5_free_keyblock_contents(r->context, &KDCchallengekey);
@@ -928,6 +931,18 @@ pa_enc_chal_validate(astgs_request_t r, const PA_DATA *pa)
        if (ret)
            return ret;
 
+       if (krb5_enctype_to_string(r->context, (int)aenctype, &astr))
+           astr = NULL;
+       if (krb5_enctype_to_string(r->context, enc_data.etype, &estr))
+           estr = NULL;
+       if (krb5_enctype_to_string(r->context, k->key.keytype, &kstr))
+           kstr = NULL;
+       _kdc_r_log(r, 4, "ENC-CHAL Pre-authentication succeeded -- %s "
+                  "using armor=%s enc=%s key=%s",
+                  r->cname,
+                  astr ? astr : "unknown enctype",
+                  estr ? estr : "unknown enctype",
+                  kstr ? kstr : "unknown enctype");
        kdc_audit_setkv_number((kdc_request_t)r, KDC_REQUEST_KV_AUTH_EVENT,
                               KDC_AUTH_EVENT_VALIDATED_LONG_TERM_KEY);
        return 0;