use DES_set_key_unchecked().
[heimdal.git] / lib / krb5 / test_keytab.c
blob883898192b212741163485b691eb732e402eaea6
1 /*
2 * Copyright (c) 2005 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
4 * All rights reserved.
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
17 * 3. Neither the name of KTH nor the names of its contributors may be
18 * used to endorse or promote products derived from this software without
19 * specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY KTH AND ITS CONTRIBUTORS ``AS IS'' AND ANY
22 * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
24 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL KTH OR ITS CONTRIBUTORS BE
25 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
26 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
27 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
28 * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
29 * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
30 * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
31 * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */
33 #include "krb5_locl.h"
34 #include <err.h>
36 RCSID("$Id$");
39 * Test that removal entry from of empty keytab doesn't corrupts
40 * memory.
43 static void
44 test_empty_keytab(krb5_context context, const char *keytab)
46 krb5_error_code ret;
47 krb5_keytab id;
48 krb5_keytab_entry entry;
50 ret = krb5_kt_resolve(context, keytab, &id);
51 if (ret)
52 krb5_err(context, 1, ret, "krb5_kt_resolve");
54 memset(&entry, 0, sizeof(entry));
56 krb5_kt_remove_entry(context, id, &entry);
58 ret = krb5_kt_close(context, id);
59 if (ret)
60 krb5_err(context, 1, ret, "krb5_kt_close");
64 * Test that memory keytab are refcounted.
67 static void
68 test_memory_keytab(krb5_context context, const char *keytab, const char *keytab2)
70 krb5_error_code ret;
71 krb5_keytab id, id2, id3;
72 krb5_keytab_entry entry, entry2, entry3;
74 ret = krb5_kt_resolve(context, keytab, &id);
75 if (ret)
76 krb5_err(context, 1, ret, "krb5_kt_resolve");
78 memset(&entry, 0, sizeof(entry));
79 ret = krb5_parse_name(context, "lha@SU.SE", &entry.principal);
80 if (ret)
81 krb5_err(context, 1, ret, "krb5_parse_name");
82 entry.vno = 1;
83 ret = krb5_generate_random_keyblock(context,
84 ETYPE_AES256_CTS_HMAC_SHA1_96,
85 &entry.keyblock);
86 if (ret)
87 krb5_err(context, 1, ret, "krb5_generate_random_keyblock");
89 krb5_kt_add_entry(context, id, &entry);
91 ret = krb5_kt_resolve(context, keytab, &id2);
92 if (ret)
93 krb5_err(context, 1, ret, "krb5_kt_resolve");
95 ret = krb5_kt_get_entry(context, id,
96 entry.principal,
98 ETYPE_AES256_CTS_HMAC_SHA1_96,
99 &entry2);
100 if (ret)
101 krb5_err(context, 1, ret, "krb5_kt_get_entry");
102 krb5_kt_free_entry(context, &entry2);
104 ret = krb5_kt_close(context, id);
105 if (ret)
106 krb5_err(context, 1, ret, "krb5_kt_close");
108 ret = krb5_kt_get_entry(context, id2,
109 entry.principal,
111 ETYPE_AES256_CTS_HMAC_SHA1_96,
112 &entry2);
113 if (ret)
114 krb5_err(context, 1, ret, "krb5_kt_get_entry");
115 krb5_kt_free_entry(context, &entry2);
117 ret = krb5_kt_close(context, id2);
118 if (ret)
119 krb5_err(context, 1, ret, "krb5_kt_close");
122 ret = krb5_kt_resolve(context, keytab2, &id3);
123 if (ret)
124 krb5_err(context, 1, ret, "krb5_kt_resolve");
126 memset(&entry3, 0, sizeof(entry3));
127 ret = krb5_parse_name(context, "lha3@SU.SE", &entry3.principal);
128 if (ret)
129 krb5_err(context, 1, ret, "krb5_parse_name");
130 entry3.vno = 1;
131 ret = krb5_generate_random_keyblock(context,
132 ETYPE_AES256_CTS_HMAC_SHA1_96,
133 &entry3.keyblock);
134 if (ret)
135 krb5_err(context, 1, ret, "krb5_generate_random_keyblock");
137 krb5_kt_add_entry(context, id3, &entry3);
140 ret = krb5_kt_resolve(context, keytab, &id);
141 if (ret)
142 krb5_err(context, 1, ret, "krb5_kt_resolve");
144 ret = krb5_kt_get_entry(context, id,
145 entry.principal,
147 ETYPE_AES256_CTS_HMAC_SHA1_96,
148 &entry2);
149 if (ret == 0)
150 krb5_errx(context, 1, "krb5_kt_get_entry when if should fail");
152 krb5_kt_remove_entry(context, id, &entry);
154 ret = krb5_kt_close(context, id);
155 if (ret)
156 krb5_err(context, 1, ret, "krb5_kt_close");
158 krb5_kt_free_entry(context, &entry);
160 krb5_kt_remove_entry(context, id3, &entry3);
162 ret = krb5_kt_close(context, id3);
163 if (ret)
164 krb5_err(context, 1, ret, "krb5_kt_close");
166 krb5_free_principal(context, entry3.principal);
167 krb5_free_keyblock_contents(context, &entry3.keyblock);
171 main(int argc, char **argv)
173 krb5_context context;
174 krb5_error_code ret;
176 setprogname(argv[0]);
178 ret = krb5_init_context(&context);
179 if (ret)
180 errx (1, "krb5_init_context failed: %d", ret);
182 test_empty_keytab(context, "MEMORY:foo");
183 test_empty_keytab(context, "FILE:foo");
184 test_empty_keytab(context, "KRB4:foo");
186 test_memory_keytab(context, "MEMORY:foo", "MEMORY:foo2");
188 krb5_free_context(context);
190 return 0;