2 * Copyright (c) 1997-2004 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
17 * 3. Neither the name of the Institute nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34 #include "ktutil_locl.h"
39 open_kadmin_connection(char *principal
,
44 static kadm5_config_params conf
;
47 memset(&conf
, 0, sizeof(conf
));
50 conf
.realm
= strdup(realm
);
51 if (conf
.realm
== NULL
) {
52 krb5_set_error_message(context
, 0, "malloc: out of memory");
55 conf
.mask
|= KADM5_CONFIG_REALM
;
59 conf
.admin_server
= admin_server
;
60 conf
.mask
|= KADM5_CONFIG_ADMIN_SERVER
;
64 conf
.kadmind_port
= htons(server_port
);
65 conf
.mask
|= KADM5_CONFIG_KADMIND_PORT
;
68 /* should get realm from each principal, instead of doing
69 everything with the same (local) realm */
71 ret
= kadm5_init_with_password_ctx(context
,
79 krb5_warn(context
, ret
, "kadm5_init_with_password");
86 kt_get(struct get_options
*opt
, int argc
, char **argv
)
88 krb5_error_code ret
= 0;
90 void *kadm_handle
= NULL
;
91 krb5_enctype
*etypes
= NULL
;
95 unsigned int failed
= 0;
97 if((keytab
= ktutil_open_keytab()) == NULL
)
100 if(opt
->realm_string
)
101 krb5_set_default_realm(context
, opt
->realm_string
);
103 if (opt
->enctypes_strings
.num_strings
!= 0) {
105 etypes
= malloc (opt
->enctypes_strings
.num_strings
* sizeof(*etypes
));
106 if (etypes
== NULL
) {
107 krb5_warnx(context
, "malloc failed");
110 netypes
= opt
->enctypes_strings
.num_strings
;
111 for(i
= 0; i
< netypes
; i
++) {
112 ret
= krb5_string_to_enctype(context
,
113 opt
->enctypes_strings
.strings
[i
],
116 krb5_warnx(context
, "unrecognized enctype: %s",
117 opt
->enctypes_strings
.strings
[i
]);
124 for(a
= 0; a
< argc
; a
++){
125 krb5_principal princ_ent
;
126 kadm5_principal_ent_rec princ
;
131 krb5_keytab_entry entry
;
133 ret
= krb5_parse_name(context
, argv
[a
], &princ_ent
);
135 krb5_warn(context
, ret
, "can't parse principal %s", argv
[a
]);
139 memset(&princ
, 0, sizeof(princ
));
140 princ
.principal
= princ_ent
;
141 mask
|= KADM5_PRINCIPAL
;
142 princ
.attributes
|= KRB5_KDB_DISALLOW_ALL_TIX
;
143 mask
|= KADM5_ATTRIBUTES
;
144 princ
.princ_expire_time
= 0;
145 mask
|= KADM5_PRINC_EXPIRE_TIME
;
147 if(kadm_handle
== NULL
) {
149 if(opt
->realm_string
!= NULL
)
150 r
= opt
->realm_string
;
152 r
= krb5_principal_get_realm(context
, princ_ent
);
153 kadm_handle
= open_kadmin_connection(opt
->principal_string
,
155 opt
->admin_server_string
,
156 opt
->server_port_integer
);
157 if(kadm_handle
== NULL
)
161 ret
= kadm5_create_principal(kadm_handle
, &princ
, mask
, "x");
164 else if(ret
!= KADM5_DUP
) {
165 krb5_warn(context
, ret
, "kadm5_create_principal(%s)", argv
[a
]);
166 krb5_free_principal(context
, princ_ent
);
170 ret
= kadm5_randkey_principal(kadm_handle
, princ_ent
, &keys
, &n_keys
);
172 krb5_warn(context
, ret
, "kadm5_randkey_principal(%s)", argv
[a
]);
173 krb5_free_principal(context
, princ_ent
);
178 ret
= kadm5_get_principal(kadm_handle
, princ_ent
, &princ
,
179 KADM5_PRINCIPAL
| KADM5_KVNO
| KADM5_ATTRIBUTES
);
181 krb5_warn(context
, ret
, "kadm5_get_principal(%s)", argv
[a
]);
182 for (j
= 0; j
< n_keys
; j
++)
183 krb5_free_keyblock_contents(context
, &keys
[j
]);
184 krb5_free_principal(context
, princ_ent
);
188 if(!created
&& (princ
.attributes
& KRB5_KDB_DISALLOW_ALL_TIX
))
189 krb5_warnx(context
, "%s: disallow-all-tix flag set - clearing", argv
[a
]);
190 princ
.attributes
&= (~KRB5_KDB_DISALLOW_ALL_TIX
);
191 mask
= KADM5_ATTRIBUTES
;
196 ret
= kadm5_modify_principal(kadm_handle
, &princ
, mask
);
198 krb5_warn(context
, ret
, "kadm5_modify_principal(%s)", argv
[a
]);
199 for (j
= 0; j
< n_keys
; j
++)
200 krb5_free_keyblock_contents(context
, &keys
[j
]);
201 krb5_free_principal(context
, princ_ent
);
205 for(j
= 0; j
< n_keys
; j
++) {
212 for (k
= 0; k
< netypes
; ++k
)
213 if (keys
[j
].keytype
== etypes
[k
]) {
219 entry
.principal
= princ_ent
;
220 entry
.vno
= princ
.kvno
;
221 entry
.keyblock
= keys
[j
];
222 entry
.timestamp
= time (NULL
);
223 ret
= krb5_kt_add_entry(context
, keytab
, &entry
);
225 krb5_warn(context
, ret
, "krb5_kt_add_entry");
227 krb5_free_keyblock_contents(context
, &keys
[j
]);
230 kadm5_free_principal_ent(kadm_handle
, &princ
);
231 krb5_free_principal(context
, princ_ent
);
236 kadm5_destroy(kadm_handle
);
237 krb5_kt_close(context
, keytab
);
238 return ret
!= 0 || failed
> 0;