cf/largefile.m4: Fix build with autoconf-2.72
[heimdal.git] / kpasswd / kpasswd-generator.c
blob4fb49453ec28c28cbd60210086962d7d443f6914
1 /*
2 * Copyright (c) 2000 - 2004 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
4 * All rights reserved.
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
17 * 3. Neither the name of the Institute nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
34 #include "kpasswd_locl.h"
36 RCSID("$Id$");
38 static unsigned
39 read_words(const char *filename, char ***ret_w)
41 unsigned n, alloc;
42 FILE *f;
43 char buf[256];
44 char **w = NULL;
46 f = fopen(filename, "r");
47 if (f == NULL)
48 err(1, "cannot open %s", filename);
49 alloc = n = 0;
50 while (fgets(buf, sizeof(buf), f) != NULL) {
51 buf[strcspn(buf, "\r\n")] = '\0';
52 if (n >= alloc) {
53 alloc += 16;
54 w = erealloc(w, alloc * sizeof(char *));
56 w[n++] = estrdup(buf);
58 *ret_w = w;
59 if (n == 0)
60 errx(1, "%s is an empty file, no words to try", filename);
61 fclose(f);
62 return n;
65 static int
66 nop_prompter(krb5_context context,
67 void *data,
68 const char *name,
69 const char *banner,
70 int num_prompts,
71 krb5_prompt prompts[])
73 return 0;
76 static void
77 generate_requests(const char *filename, unsigned nreq)
79 krb5_context context;
80 krb5_error_code ret;
81 int i;
82 char **words;
83 unsigned nwords, k;
85 ret = krb5_init_context(&context);
86 if (ret)
87 errx (1, "krb5_init_context failed: %d", ret);
89 nwords = read_words(filename, &words);
91 for (i = 0; i < nreq; ++i) {
92 char *name = words[rand() % nwords];
93 krb5_get_init_creds_opt *opt;
94 krb5_creds cred;
95 krb5_principal principal;
96 int result_code;
97 krb5_data result_code_string, result_string;
98 char *old_pwd, *new_pwd;
99 int aret;
101 krb5_get_init_creds_opt_alloc(context, &opt);
102 krb5_get_init_creds_opt_set_tkt_life (opt, 300);
103 krb5_get_init_creds_opt_set_forwardable (opt, FALSE);
104 krb5_get_init_creds_opt_set_proxiable (opt, FALSE);
106 ret = krb5_parse_name(context, name, &principal);
107 if (ret)
108 krb5_err(context, 1, ret, "krb5_parse_name %s", name);
110 aret = asprintf(&old_pwd, "%s", name);
111 if (aret == -1)
112 krb5_errx(context, 1, "out of memory");
113 aret = asprintf(&new_pwd, "%s2", name);
114 if (aret == -1)
115 krb5_errx(context, 1, "out of memory");
117 ret = krb5_get_init_creds_password(context,
118 &cred,
119 principal,
120 old_pwd,
121 nop_prompter,
122 NULL,
124 "kadmin/changepw",
125 opt);
126 if (ret == KRB5KRB_AP_ERR_BAD_INTEGRITY
127 || ret == KRB5KRB_AP_ERR_MODIFIED) {
128 char *tmp;
130 tmp = new_pwd;
131 new_pwd = old_pwd;
132 old_pwd = tmp;
134 ret = krb5_get_init_creds_password(context,
135 &cred,
136 principal,
137 old_pwd,
138 nop_prompter,
139 NULL,
141 "kadmin/changepw",
142 opt);
144 if (ret)
145 krb5_err(context, 1, ret, "krb5_get_init_creds_password");
147 krb5_free_principal(context, principal);
150 ret = krb5_set_password(context,
151 &cred,
152 new_pwd,
153 NULL,
154 &result_code,
155 &result_code_string,
156 &result_string);
157 if (ret)
158 krb5_err(context, 1, ret, "krb5_change_password");
160 free(old_pwd);
161 free(new_pwd);
162 krb5_free_cred_contents(context, &cred);
163 krb5_get_init_creds_opt_free(context, opt);
166 for (k = 0; k < nwords; k++)
167 free(words[k]);
168 free(words);
171 static int version_flag = 0;
172 static int help_flag = 0;
174 static struct getargs args[] = {
175 { "version", 0, arg_flag, &version_flag, NULL, NULL },
176 { "help", 0, arg_flag, &help_flag, NULL, NULL }
179 static void
180 usage(int ret)
182 arg_printusage(args,
183 sizeof(args)/sizeof(*args),
184 NULL,
185 "file [number]");
186 exit (ret);
190 main(int argc, char **argv)
192 int optidx = 0;
193 int nreq;
194 char *end;
196 setprogname(argv[0]);
197 if(getarg(args, sizeof(args) / sizeof(args[0]), argc, argv, &optidx))
198 usage(1);
199 if (help_flag)
200 usage (0);
201 if (version_flag) {
202 print_version(NULL);
203 return 0;
205 argc -= optidx;
206 argv += optidx;
208 if (argc != 2)
209 usage (1);
210 srand (0);
211 nreq = strtol(argv[1], &end, 0);
212 if (argv[1] == end || *end != '\0')
213 usage (1);
214 generate_requests(argv[0], nreq);
215 return 0;