2 * Copyright (c) 1997-2004 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
17 * 3. Neither the name of the Institute nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34 #include "ktutil_locl.h"
39 open_kadmin_connection(char *principal
,
44 static kadm5_config_params conf
;
47 memset(&conf
, 0, sizeof(conf
));
50 conf
.realm
= strdup(realm
);
51 if (conf
.realm
== NULL
) {
52 krb5_set_error_string(context
, "malloc: out of memory");
55 conf
.mask
|= KADM5_CONFIG_REALM
;
59 conf
.admin_server
= admin_server
;
60 conf
.mask
|= KADM5_CONFIG_ADMIN_SERVER
;
64 conf
.kadmind_port
= htons(server_port
);
65 conf
.mask
|= KADM5_CONFIG_KADMIND_PORT
;
68 /* should get realm from each principal, instead of doing
69 everything with the same (local) realm */
71 ret
= kadm5_init_with_password_ctx(context
,
79 krb5_warn(context
, ret
, "kadm5_init_with_password");
86 kt_get(struct get_options
*opt
, int argc
, char **argv
)
88 krb5_error_code ret
= 0;
90 void *kadm_handle
= NULL
;
91 krb5_enctype
*etypes
= NULL
;
94 unsigned int failed
= 0;
96 if((keytab
= ktutil_open_keytab()) == NULL
)
100 krb5_set_default_realm(context
, opt
->realm_string
);
102 if (opt
->enctypes_strings
.num_strings
!= 0) {
104 etypes
= malloc (opt
->enctypes_strings
.num_strings
* sizeof(*etypes
));
105 if (etypes
== NULL
) {
106 krb5_warnx(context
, "malloc failed");
109 netypes
= opt
->enctypes_strings
.num_strings
;
110 for(i
= 0; i
< netypes
; i
++) {
111 ret
= krb5_string_to_enctype(context
,
112 opt
->enctypes_strings
.strings
[i
],
115 krb5_warnx(context
, "unrecognized enctype: %s",
116 opt
->enctypes_strings
.strings
[i
]);
123 for(i
= 0; i
< argc
; i
++){
124 krb5_principal princ_ent
;
125 kadm5_principal_ent_rec princ
;
130 krb5_keytab_entry entry
;
132 ret
= krb5_parse_name(context
, argv
[i
], &princ_ent
);
134 krb5_warn(context
, ret
, "can't parse principal %s", argv
[i
]);
138 memset(&princ
, 0, sizeof(princ
));
139 princ
.principal
= princ_ent
;
140 mask
|= KADM5_PRINCIPAL
;
141 princ
.attributes
|= KRB5_KDB_DISALLOW_ALL_TIX
;
142 mask
|= KADM5_ATTRIBUTES
;
143 princ
.princ_expire_time
= 0;
144 mask
|= KADM5_PRINC_EXPIRE_TIME
;
146 if(kadm_handle
== NULL
) {
148 if(opt
->realm_string
!= NULL
)
149 r
= opt
->realm_string
;
151 r
= krb5_principal_get_realm(context
, princ_ent
);
152 kadm_handle
= open_kadmin_connection(opt
->principal_string
,
154 opt
->admin_server_string
,
155 opt
->server_port_integer
);
156 if(kadm_handle
== NULL
)
160 ret
= kadm5_create_principal(kadm_handle
, &princ
, mask
, "x");
163 else if(ret
!= KADM5_DUP
) {
164 krb5_warn(context
, ret
, "kadm5_create_principal(%s)", argv
[i
]);
165 krb5_free_principal(context
, princ_ent
);
169 ret
= kadm5_randkey_principal(kadm_handle
, princ_ent
, &keys
, &n_keys
);
171 krb5_warn(context
, ret
, "kadm5_randkey_principal(%s)", argv
[i
]);
172 krb5_free_principal(context
, princ_ent
);
177 ret
= kadm5_get_principal(kadm_handle
, princ_ent
, &princ
,
178 KADM5_PRINCIPAL
| KADM5_KVNO
| KADM5_ATTRIBUTES
);
180 krb5_warn(context
, ret
, "kadm5_get_principal(%s)", argv
[i
]);
181 for (j
= 0; j
< n_keys
; j
++)
182 krb5_free_keyblock_contents(context
, &keys
[j
]);
183 krb5_free_principal(context
, princ_ent
);
187 if(!created
&& (princ
.attributes
& KRB5_KDB_DISALLOW_ALL_TIX
))
188 krb5_warnx(context
, "%s: disallow-all-tix flag set - clearing", argv
[i
]);
189 princ
.attributes
&= (~KRB5_KDB_DISALLOW_ALL_TIX
);
190 mask
= KADM5_ATTRIBUTES
;
195 ret
= kadm5_modify_principal(kadm_handle
, &princ
, mask
);
197 krb5_warn(context
, ret
, "kadm5_modify_principal(%s)", argv
[i
]);
198 for (j
= 0; j
< n_keys
; j
++)
199 krb5_free_keyblock_contents(context
, &keys
[j
]);
200 krb5_free_principal(context
, princ_ent
);
204 for(j
= 0; j
< n_keys
; j
++) {
211 for (k
= 0; k
< netypes
; ++k
)
212 if (keys
[j
].keytype
== etypes
[k
]) {
218 entry
.principal
= princ_ent
;
219 entry
.vno
= princ
.kvno
;
220 entry
.keyblock
= keys
[j
];
221 entry
.timestamp
= time (NULL
);
222 ret
= krb5_kt_add_entry(context
, keytab
, &entry
);
224 krb5_warn(context
, ret
, "krb5_kt_add_entry");
226 krb5_free_keyblock_contents(context
, &keys
[j
]);
229 kadm5_free_principal_ent(kadm_handle
, &princ
);
230 krb5_free_principal(context
, princ_ent
);
235 kadm5_destroy(kadm_handle
);
236 krb5_kt_close(context
, keytab
);
237 return ret
!= 0 || failed
> 0;