gp: Test with binary content for certificate data
[Samba.git] / third_party / heimdal / admin / copy.c
blob8acd6e48ed085558c63d4a52481610cd0c2f4e8a
1 /*
2 * Copyright (c) 1997-2004 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
4 * All rights reserved.
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
17 * 3. Neither the name of the Institute nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
34 #include "ktutil_locl.h"
36 RCSID("$Id$");
39 static krb5_boolean
40 compare_keyblock(const krb5_keyblock *a, const krb5_keyblock *b)
42 if(a->keytype != b->keytype ||
43 a->keyvalue.length != b->keyvalue.length ||
44 memcmp(a->keyvalue.data, b->keyvalue.data, a->keyvalue.length) != 0)
45 return FALSE;
46 return TRUE;
49 int
50 kt_copy (struct copy_options *opt, int argc, char **argv)
52 krb5_error_code ret;
53 krb5_keytab src_keytab, dst_keytab;
54 krb5_kt_cursor cursor;
55 krb5_keytab_entry entry, dummy;
56 const char *from = argv[0];
57 const char *to = argv[1];
59 ret = krb5_kt_resolve (context, from, &src_keytab);
60 if (ret) {
61 krb5_warn (context, ret, "resolving src keytab `%s'", from);
62 return 1;
65 ret = krb5_kt_resolve (context, to, &dst_keytab);
66 if (ret) {
67 krb5_kt_close (context, src_keytab);
68 krb5_warn (context, ret, "resolving dst keytab `%s'", to);
69 return 1;
72 ret = krb5_kt_start_seq_get (context, src_keytab, &cursor);
73 if (ret) {
74 krb5_warn (context, ret, "krb5_kt_start_seq_get %s", keytab_string);
75 goto out;
78 if (verbose_flag)
79 fprintf(stderr, "copying %s to %s\n", from, to);
81 while((ret = krb5_kt_next_entry(context, src_keytab,
82 &entry, &cursor)) == 0) {
83 char *name_str;
84 char *etype_str;
85 ret = krb5_unparse_name (context, entry.principal, &name_str);
86 if(ret) {
87 krb5_warn(context, ret, "krb5_unparse_name");
88 name_str = NULL; /* XXX */
90 ret = krb5_enctype_to_string(context, entry.keyblock.keytype, &etype_str);
91 if(ret) {
92 krb5_warn(context, ret, "krb5_enctype_to_string");
93 etype_str = NULL; /* XXX */
95 ret = krb5_kt_get_entry(context, dst_keytab,
96 entry.principal,
97 entry.vno,
98 entry.keyblock.keytype,
99 &dummy);
100 if(ret == 0) {
101 /* this entry is already in the new keytab, so no need to
102 copy it; if the keyblocks are not the same, something
103 is weird, so complain about that */
104 if(!compare_keyblock(&entry.keyblock, &dummy.keyblock)) {
105 krb5_warnx(context, "entry with different keyvalue "
106 "already exists for %s, keytype %s, kvno %d",
107 name_str, etype_str, entry.vno);
109 if (!opt->copy_duplicates_flag) {
110 krb5_kt_free_entry(context, &dummy);
111 krb5_kt_free_entry (context, &entry);
112 free(name_str);
113 free(etype_str);
114 continue;
117 * Because we can end up trying all keys that match the enctype,
118 * copying entries with duplicate principal, vno, and enctype, but
119 * different keys, can be useful.
121 } else if(ret != KRB5_KT_NOTFOUND) {
122 krb5_warn (context, ret, "%s: fetching %s/%s/%u",
123 to, name_str, etype_str, entry.vno);
124 krb5_kt_free_entry (context, &entry);
125 free(name_str);
126 free(etype_str);
127 break;
129 if (verbose_flag)
130 fprintf (stderr, "copying %s, keytype %s, kvno %d\n", name_str,
131 etype_str, entry.vno);
132 ret = krb5_kt_add_entry (context, dst_keytab, &entry);
133 krb5_kt_free_entry (context, &entry);
134 if (ret) {
135 krb5_warn (context, ret, "%s: adding %s/%s/%u",
136 to, name_str, etype_str, entry.vno);
137 free(name_str);
138 free(etype_str);
139 break;
141 free(name_str);
142 free(etype_str);
144 krb5_kt_end_seq_get (context, src_keytab, &cursor);
146 out:
147 krb5_kt_close (context, src_keytab);
148 krb5_kt_close (context, dst_keytab);
149 return ret != 0;