Move kadmin and ktutil to /usr/bin.
[heimdal.git] / lib / krb5 / test_keytab.c
blob134b0f17e693c09439b7c4496a0b9e8397b44c74
1 /*
2 * Copyright (c) 2005 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
4 * All rights reserved.
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
17 * 3. Neither the name of KTH nor the names of its contributors may be
18 * used to endorse or promote products derived from this software without
19 * specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY KTH AND ITS CONTRIBUTORS ``AS IS'' AND ANY
22 * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
24 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL KTH OR ITS CONTRIBUTORS BE
25 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
26 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
27 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
28 * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
29 * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
30 * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
31 * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */
33 #include "krb5_locl.h"
34 #include <err.h>
35 #include <getarg.h>
38 * Test that removal entry from of empty keytab doesn't corrupts
39 * memory.
42 static void
43 test_empty_keytab(krb5_context context, const char *keytab)
45 krb5_error_code ret;
46 krb5_keytab id;
47 krb5_keytab_entry entry;
49 ret = krb5_kt_resolve(context, keytab, &id);
50 if (ret)
51 krb5_err(context, 1, ret, "krb5_kt_resolve");
53 memset(&entry, 0, sizeof(entry));
55 krb5_kt_remove_entry(context, id, &entry);
57 ret = krb5_kt_have_content(context, id);
58 if (ret == 0)
59 krb5_errx(context, 1, "supposed to be empty keytab isn't");
61 ret = krb5_kt_close(context, id);
62 if (ret)
63 krb5_err(context, 1, ret, "krb5_kt_close");
67 * Test that memory keytab are refcounted.
70 static void
71 test_memory_keytab(krb5_context context, const char *keytab, const char *keytab2)
73 krb5_error_code ret;
74 krb5_keytab id, id2, id3;
75 krb5_keytab_entry entry, entry2, entry3;
77 ret = krb5_kt_resolve(context, keytab, &id);
78 if (ret)
79 krb5_err(context, 1, ret, "krb5_kt_resolve");
81 memset(&entry, 0, sizeof(entry));
82 ret = krb5_parse_name(context, "lha@SU.SE", &entry.principal);
83 if (ret)
84 krb5_err(context, 1, ret, "krb5_parse_name");
85 entry.vno = 1;
86 ret = krb5_generate_random_keyblock(context,
87 ETYPE_AES256_CTS_HMAC_SHA1_96,
88 &entry.keyblock);
89 if (ret)
90 krb5_err(context, 1, ret, "krb5_generate_random_keyblock");
92 krb5_kt_add_entry(context, id, &entry);
94 ret = krb5_kt_resolve(context, keytab, &id2);
95 if (ret)
96 krb5_err(context, 1, ret, "krb5_kt_resolve");
98 ret = krb5_kt_get_entry(context, id,
99 entry.principal,
101 ETYPE_AES256_CTS_HMAC_SHA1_96,
102 &entry2);
103 if (ret)
104 krb5_err(context, 1, ret, "krb5_kt_get_entry");
105 krb5_kt_free_entry(context, &entry2);
107 ret = krb5_kt_close(context, id);
108 if (ret)
109 krb5_err(context, 1, ret, "krb5_kt_close");
111 ret = krb5_kt_get_entry(context, id2,
112 entry.principal,
114 ETYPE_AES256_CTS_HMAC_SHA1_96,
115 &entry2);
116 if (ret)
117 krb5_err(context, 1, ret, "krb5_kt_get_entry");
118 krb5_kt_free_entry(context, &entry2);
120 ret = krb5_kt_close(context, id2);
121 if (ret)
122 krb5_err(context, 1, ret, "krb5_kt_close");
125 ret = krb5_kt_resolve(context, keytab2, &id3);
126 if (ret)
127 krb5_err(context, 1, ret, "krb5_kt_resolve");
129 memset(&entry3, 0, sizeof(entry3));
130 ret = krb5_parse_name(context, "lha3@SU.SE", &entry3.principal);
131 if (ret)
132 krb5_err(context, 1, ret, "krb5_parse_name");
133 entry3.vno = 1;
134 ret = krb5_generate_random_keyblock(context,
135 ETYPE_AES256_CTS_HMAC_SHA1_96,
136 &entry3.keyblock);
137 if (ret)
138 krb5_err(context, 1, ret, "krb5_generate_random_keyblock");
140 krb5_kt_add_entry(context, id3, &entry3);
143 ret = krb5_kt_resolve(context, keytab, &id);
144 if (ret)
145 krb5_err(context, 1, ret, "krb5_kt_resolve");
147 ret = krb5_kt_get_entry(context, id,
148 entry.principal,
150 ETYPE_AES256_CTS_HMAC_SHA1_96,
151 &entry2);
152 if (ret == 0)
153 krb5_errx(context, 1, "krb5_kt_get_entry when if should fail");
155 krb5_kt_remove_entry(context, id, &entry);
157 ret = krb5_kt_close(context, id);
158 if (ret)
159 krb5_err(context, 1, ret, "krb5_kt_close");
161 krb5_kt_free_entry(context, &entry);
163 krb5_kt_remove_entry(context, id3, &entry3);
165 ret = krb5_kt_close(context, id3);
166 if (ret)
167 krb5_err(context, 1, ret, "krb5_kt_close");
169 krb5_free_principal(context, entry3.principal);
170 krb5_free_keyblock_contents(context, &entry3.keyblock);
173 static void
174 perf_add(krb5_context context, krb5_keytab id, int times)
178 static void
179 perf_find(krb5_context context, krb5_keytab id, int times)
183 static void
184 perf_delete(krb5_context context, krb5_keytab id, int forward, int times)
189 static int version_flag = 0;
190 static int help_flag = 0;
191 static char *perf_str = NULL;
192 static int times = 1000;
194 static struct getargs args[] = {
195 {"performance", 0, arg_string, &perf_str,
196 "test performance for named keytab", "keytab" },
197 {"times", 0, arg_integer, &times,
198 "number of times to run the perforamce test", "number" },
199 {"version", 0, arg_flag, &version_flag,
200 "print version", NULL },
201 {"help", 0, arg_flag, &help_flag,
202 NULL, NULL }
205 static void
206 usage (int ret)
208 arg_printusage (args,
209 sizeof(args)/sizeof(*args),
210 NULL,
211 "");
212 exit (ret);
216 main(int argc, char **argv)
218 krb5_context context;
219 krb5_error_code ret;
220 int optidx = 0;
222 setprogname(argv[0]);
224 if(getarg(args, sizeof(args) / sizeof(args[0]), argc, argv, &optidx))
225 usage(1);
227 if (help_flag)
228 usage (0);
230 if(version_flag){
231 print_version(NULL);
232 exit(0);
235 argc -= optidx;
236 argv += optidx;
238 if (argc != 0)
239 errx(1, "argc != 0");
241 ret = krb5_init_context(&context);
242 if (ret)
243 errx (1, "krb5_init_context failed: %d", ret);
245 if (perf_str) {
246 krb5_keytab id;
248 ret = krb5_kt_resolve(context, perf_str, &id);
249 if (ret)
250 krb5_err(context, 1, ret, "krb5_kt_resolve: %s", perf_str);
252 /* add, find, delete on keytab */
253 perf_add(context, id, times);
254 perf_find(context, id, times);
255 perf_delete(context, id, 0, times);
257 /* add and find again on used keytab */
258 perf_add(context, id, times);
259 perf_find(context, id, times);
261 ret = krb5_kt_destroy(context, id);
262 if (ret)
263 krb5_err(context, 1, ret, "krb5_kt_destroy: %s", perf_str);
265 ret = krb5_kt_resolve(context, perf_str, &id);
266 if (ret)
267 krb5_err(context, 1, ret, "krb5_kt_resolve: %s", perf_str);
269 /* try delete backwards */
270 #if 0
271 perf_add(context, id, times);
272 perf_delete(context, id, 1, times);
273 #endif
275 ret = krb5_kt_destroy(context, id);
276 if (ret)
277 krb5_err(context, 1, ret, "krb5_kt_destroy");
279 } else {
281 test_empty_keytab(context, "MEMORY:foo");
282 test_empty_keytab(context, "FILE:foo");
284 test_memory_keytab(context, "MEMORY:foo", "MEMORY:foo2");
288 krb5_free_context(context);
290 return 0;