kadmind: check for KADM5_PRIV_GET when op GET
[heimdal.git] / kadmin / ext.c
blob90d3328cdea48b075e6aa2cc90bd3cf6bef54778
1 /*
2 * Copyright (c) 1997 - 2006 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
4 * All rights reserved.
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
17 * 3. Neither the name of the Institute nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
34 #include "kadmin_locl.h"
35 #include "kadmin-commands.h"
37 struct ext_keytab_data {
38 krb5_keytab keytab;
41 static int
42 do_ext_keytab(krb5_principal principal, void *data)
44 krb5_error_code ret;
45 kadm5_principal_ent_rec princ;
46 struct ext_keytab_data *e = data;
47 krb5_keytab_entry *keys = NULL;
48 krb5_keyblock *k = NULL;
49 size_t i;
50 int n_k = 0;
51 char *unparsed = NULL;
53 ret = kadm5_get_principal(kadm_handle, principal, &princ,
54 KADM5_PRINCIPAL|KADM5_KVNO|KADM5_KEY_DATA);
55 if (ret)
56 return ret;
58 ret = krb5_unparse_name(context, principal, &unparsed);
59 if (ret)
60 goto out;
62 if (princ.n_key_data) {
63 keys = calloc(sizeof(*keys), princ.n_key_data);
64 if (keys == NULL) {
65 ret = krb5_enomem(context);
66 goto out;
68 for (i = 0; i < princ.n_key_data; i++) {
69 krb5_key_data *kd = &princ.key_data[i];
70 int warned = 0;
73 * If the kadm5 client princ lacks get-keys then it may get
74 * bogus keys four bytes long.
76 if ((kd->key_data_length[0] == sizeof (KADM5_BOGUS_KEY_DATA) - 1)
77 && (ct_memcmp(kd->key_data_contents[0], KADM5_BOGUS_KEY_DATA,
78 kd->key_data_length[0]) == 0)) {
79 if (!warned) {
80 krb5_warnx(context, "user lacks get-keys privilege for %s",
81 unparsed);
82 warned = 1;
84 continue;
87 keys[i].principal = princ.principal;
88 keys[i].vno = kd->key_data_kvno;
89 keys[i].keyblock.keytype = kd->key_data_type[0];
90 keys[i].keyblock.keyvalue.length = kd->key_data_length[0];
91 keys[i].keyblock.keyvalue.data = kd->key_data_contents[0];
92 keys[i].timestamp = time(NULL);
93 n_k++;
97 if (n_k == 0) {
98 /* Probably lack get-keys privilege, but we may be able to set keys */
99 ret = kadm5_randkey_principal(kadm_handle, principal, &k, &n_k);
100 if (ret)
101 goto out;
103 keys = calloc(sizeof(*keys), n_k);
104 if (keys == NULL) {
105 ret = krb5_enomem(context);
106 goto out;
108 for (i = 0; i < n_k; i++) {
109 keys[i].principal = principal;
110 keys[i].vno = princ.kvno + 1; /* XXX get entry again */
111 keys[i].keyblock = k[i];
112 keys[i].timestamp = time(NULL);
116 for (i = 0; i < n_k; i++) {
117 ret = krb5_kt_add_entry(context, e->keytab, &keys[i]);
118 if (ret)
119 krb5_warn(context, ret, "krb5_kt_add_entry(%lu)", (unsigned long)i);
122 out:
123 kadm5_free_principal_ent(kadm_handle, &princ);
124 if (k) {
125 memset(k, 0, n_k * sizeof(*k));
126 free(k);
128 free(unparsed);
129 free(keys);
130 return 0;
134 ext_keytab(struct ext_keytab_options *opt, int argc, char **argv)
136 krb5_error_code ret;
137 int i;
138 struct ext_keytab_data data;
140 if (opt->keytab_string == NULL)
141 ret = krb5_kt_default(context, &data.keytab);
142 else
143 ret = krb5_kt_resolve(context, opt->keytab_string, &data.keytab);
145 if(ret){
146 krb5_warn(context, ret, "krb5_kt_resolve");
147 return 1;
150 for(i = 0; i < argc; i++) {
151 ret = foreach_principal(argv[i], do_ext_keytab, "ext", &data);
152 if (ret)
153 break;
156 krb5_kt_close(context, data.keytab);
158 return ret != 0;