2 * Copyright (c) 1997-2005 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
17 * 3. Neither the name of the Institute nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34 #include "ktutil_locl.h"
38 static krb5_error_code
39 change_entry(krb5_keytab keytab
,
40 krb5_principal principal
,
44 krb5_key_salt_tuple
*kstuple
,
46 const char *admin_server
,
50 kadm5_config_params conf
;
57 ret
= krb5_unparse_name (context
, principal
, &client_name
);
59 krb5_warn (context
, ret
, "krb5_unparse_name");
63 memset (&conf
, 0, sizeof(conf
));
66 realm
= krb5_principal_get_realm(context
, principal
);
67 conf
.realm
= strdup(realm
);
68 if (conf
.realm
== NULL
) {
70 krb5_set_error_message(context
, ENOMEM
, "malloc failed");
73 conf
.mask
|= KADM5_CONFIG_REALM
;
76 conf
.admin_server
= strdup(admin_server
);
77 if (conf
.admin_server
== NULL
) {
80 krb5_set_error_message(context
, ENOMEM
, "malloc failed");
83 conf
.mask
|= KADM5_CONFIG_ADMIN_SERVER
;
87 conf
.kadmind_port
= htons(server_port
);
88 conf
.mask
|= KADM5_CONFIG_KADMIND_PORT
;
91 ret
= kadm5_init_with_skey_ctx (context
,
97 free(conf
.admin_server
);
100 krb5_warn (context
, ret
,
101 "kadm5_c_init_with_skey_ctx: %s:", client_name
);
105 ret
= kadm5_randkey_principal_3(kadm_handle
, principal
, keep
, nkstuple
,
106 kstuple
, &keys
, &num_keys
);
107 kadm5_destroy(kadm_handle
);
109 krb5_warn(context
, ret
, "kadm5_randkey_principal_3: %s:", client_name
);
114 for (i
= 0; i
< num_keys
; ++i
) {
115 krb5_keytab_entry new_entry
;
117 new_entry
.principal
= principal
;
118 new_entry
.timestamp
= time (NULL
);
119 new_entry
.vno
= kvno
+ 1;
120 new_entry
.keyblock
= keys
[i
];
122 ret
= krb5_kt_add_entry (context
, keytab
, &new_entry
);
124 krb5_warn (context
, ret
, "krb5_kt_add_entry");
125 krb5_free_keyblock_contents (context
, &keys
[i
]);
131 * loop over all the entries in the keytab (or those given) and change
132 * their keys, writing the new keys
136 krb5_principal principal
;
141 kt_change(struct change_options
*opt
, int argc
, char **argv
)
145 krb5_kt_cursor cursor
;
146 krb5_keytab_entry entry
;
147 krb5_key_salt_tuple
*kstuple
= NULL
;
149 size_t i
, j
, max
, nkstuple
;
151 struct change_set
*changeset
;
156 if (opt
->keepold_flag
) {
160 if (opt
->keepallold_flag
) {
164 if (opt
->pruneall_flag
) {
169 fprintf(stderr
, "use only one of --keepold, --keepallold, or --pruneall\n");
173 enctype
= opt
->enctype_string
;
174 if (enctype
== NULL
|| enctype
[0] == '\0')
175 enctype
= krb5_config_get_string(context
, NULL
, "libdefaults",
176 "supported_enctypes", NULL
);
177 if (enctype
== NULL
|| enctype
[0] == '\0')
178 enctype
= "aes128-cts-hmac-sha1-96";
179 ret
= krb5_string_to_keysalts2(context
, enctype
, &nkstuple
, &kstuple
);
181 fprintf(stderr
, "enctype(s) unknown\n");
185 /* XXX Parameterize keytab name */
186 if ((keytab
= ktutil_open_keytab()) == NULL
) {
195 ret
= krb5_kt_start_seq_get(context
, keytab
, &cursor
);
197 krb5_warn(context
, ret
, "%s", keytab_string
);
201 while((ret
= krb5_kt_next_entry(context
, keytab
, &entry
, &cursor
)) == 0) {
204 for (i
= 0; i
< j
; ++i
) {
205 if (krb5_principal_compare (context
, changeset
[i
].principal
,
207 if (changeset
[i
].kvno
< entry
.vno
)
208 changeset
[i
].kvno
= entry
.vno
;
213 krb5_kt_free_entry (context
, &entry
);
220 for (i
= 0; i
< argc
; ++i
) {
221 krb5_principal princ
;
223 ret
= krb5_parse_name (context
, argv
[i
], &princ
);
225 krb5_warn (context
, ret
, "%s", argv
[i
]);
228 if (krb5_principal_compare (context
, princ
, entry
.principal
))
231 krb5_free_principal (context
, princ
);
239 max
= max(max
* 2, 1);
240 tmp
= realloc (changeset
, max
* sizeof(*changeset
));
242 krb5_kt_free_entry (context
, &entry
);
243 krb5_warnx (context
, "realloc: out of memory");
249 ret
= krb5_copy_principal (context
, entry
.principal
,
250 &changeset
[j
].principal
);
252 krb5_warn (context
, ret
, "krb5_copy_principal");
253 krb5_kt_free_entry (context
, &entry
);
256 changeset
[j
].kvno
= entry
.vno
;
259 krb5_kt_free_entry (context
, &entry
);
261 krb5_kt_end_seq_get(context
, keytab
, &cursor
);
263 if (ret
== KRB5_KT_END
) {
265 for (i
= 0; i
< j
; i
++) {
269 ret
= krb5_unparse_name (context
, changeset
[i
].principal
,
272 krb5_warn (context
, ret
, "krb5_unparse_name");
274 printf("Changing %s kvno %d\n",
275 client_name
, changeset
[i
].kvno
);
279 ret
= change_entry(keytab
,
280 changeset
[i
].principal
, changeset
[i
].kvno
,
281 keep
, nkstuple
, kstuple
,
283 opt
->admin_server_string
,
284 opt
->server_port_integer
);
290 for (i
= 0; i
< j
; i
++)
291 krb5_free_principal (context
, changeset
[i
].principal
);
296 krb5_kt_close(context
, keytab
);