1*d3273b5bSchristos /* $NetBSD: kdeltkt.c,v 1.2 2017/01/28 21:31:45 christos Exp $ */
2ca1c9b0cSelric
3ca1c9b0cSelric
4ca1c9b0cSelric #include "kuser_locl.h"
5ca1c9b0cSelric
6ca1c9b0cSelric static char *etypestr = 0;
7ca1c9b0cSelric static char *ccachestr = 0;
8ca1c9b0cSelric static char *flagstr = 0;
9b9d004c6Schristos static int exp_only = 0;
10ca1c9b0cSelric static int quiet_flag = 0;
11ca1c9b0cSelric static int help_flag = 0;
12ca1c9b0cSelric static int version_flag = 0;
13ca1c9b0cSelric
14ca1c9b0cSelric struct getargs args[] = {
15ca1c9b0cSelric { "cache", 'c', arg_string, &ccachestr,
16ca1c9b0cSelric "Credentials cache", "cachename" },
17ca1c9b0cSelric { "enctype", 'e', arg_string, &etypestr,
18ca1c9b0cSelric "Encryption type", "enctype" },
19ca1c9b0cSelric { "flags", 'f', arg_string, &flagstr,
20ca1c9b0cSelric "Flags", "flags" },
21b9d004c6Schristos { "expired-only", 'E', arg_flag, &exp_only,
22b9d004c6Schristos "Delete only expired tickets" },
23ca1c9b0cSelric { "quiet", 'q', arg_flag, &quiet_flag, "Quiet" },
24ca1c9b0cSelric { "version", 0, arg_flag, &version_flag },
25ca1c9b0cSelric { "help", 0, arg_flag, &help_flag }
26ca1c9b0cSelric };
27ca1c9b0cSelric
28ca1c9b0cSelric static void
usage(int ret)29ca1c9b0cSelric usage(int ret)
30ca1c9b0cSelric {
31ca1c9b0cSelric arg_printusage(args, sizeof(args)/sizeof(args[0]),
32ca1c9b0cSelric "Usage: ", "service1 [service2 ...]");
33ca1c9b0cSelric exit(ret);
34ca1c9b0cSelric }
35ca1c9b0cSelric
36ca1c9b0cSelric static void do_kdeltkt (int argc, char *argv[], char *ccachestr, char *etypestr, int flags);
37ca1c9b0cSelric
main(int argc,char * argv[])38ca1c9b0cSelric int main(int argc, char *argv[])
39ca1c9b0cSelric {
40ca1c9b0cSelric int optidx = 0;
41ca1c9b0cSelric int flags = 0;
42ca1c9b0cSelric
43ca1c9b0cSelric setprogname(argv[0]);
44ca1c9b0cSelric
45ca1c9b0cSelric if (getarg(args, sizeof(args)/sizeof(args[0]), argc, argv, &optidx))
46ca1c9b0cSelric usage (1);
47ca1c9b0cSelric
48ca1c9b0cSelric if (help_flag)
49ca1c9b0cSelric usage(0);
50ca1c9b0cSelric
51ca1c9b0cSelric if (version_flag) {
52ca1c9b0cSelric print_version(NULL);
53ca1c9b0cSelric exit(0);
54ca1c9b0cSelric }
55ca1c9b0cSelric
56ca1c9b0cSelric argc -= optidx;
57ca1c9b0cSelric argv += optidx;
58ca1c9b0cSelric
59ca1c9b0cSelric if (argc < 1)
60ca1c9b0cSelric usage (1);
61ca1c9b0cSelric
62ca1c9b0cSelric if (flagstr)
63ca1c9b0cSelric flags = atoi(flagstr);
64ca1c9b0cSelric
65ca1c9b0cSelric do_kdeltkt(argc, argv, ccachestr, etypestr, flags);
66ca1c9b0cSelric
67ca1c9b0cSelric return 0;
68ca1c9b0cSelric }
69ca1c9b0cSelric
do_kdeltkt(int count,char * names[],char * ccachestr,char * etypestr,int flags)70ca1c9b0cSelric static void do_kdeltkt (int count, char *names[],
71ca1c9b0cSelric char *ccachestr, char *etypestr, int flags)
72ca1c9b0cSelric {
73ca1c9b0cSelric krb5_context context;
74ca1c9b0cSelric krb5_error_code ret;
75ca1c9b0cSelric int i, errors;
76ca1c9b0cSelric krb5_enctype etype;
77ca1c9b0cSelric krb5_ccache ccache;
78ca1c9b0cSelric krb5_principal me;
79ca1c9b0cSelric krb5_creds in_creds, out_creds;
80ca1c9b0cSelric int retflags;
81ca1c9b0cSelric char *princ;
82ca1c9b0cSelric
83ca1c9b0cSelric ret = krb5_init_context(&context);
84ca1c9b0cSelric if (ret)
85ca1c9b0cSelric errx(1, "krb5_init_context failed: %d", ret);
86ca1c9b0cSelric
87ca1c9b0cSelric if (etypestr) {
88ca1c9b0cSelric ret = krb5_string_to_enctype(context, etypestr, &etype);
89ca1c9b0cSelric if (ret)
90ca1c9b0cSelric krb5_err(context, 1, ret, "Can't convert enctype %s", etypestr);
91ca1c9b0cSelric retflags = KRB5_TC_MATCH_SRV_NAMEONLY | KRB5_TC_MATCH_KEYTYPE;
92ca1c9b0cSelric } else {
93ca1c9b0cSelric etype = 0;
94ca1c9b0cSelric retflags = KRB5_TC_MATCH_SRV_NAMEONLY;
95ca1c9b0cSelric }
96ca1c9b0cSelric
97ca1c9b0cSelric if (ccachestr)
98ca1c9b0cSelric ret = krb5_cc_resolve(context, ccachestr, &ccache);
99ca1c9b0cSelric else
100ca1c9b0cSelric ret = krb5_cc_default(context, &ccache);
101ca1c9b0cSelric if (ret)
102ca1c9b0cSelric krb5_err(context, 1, ret, "Can't open credentials cache");
103ca1c9b0cSelric
104ca1c9b0cSelric ret = krb5_cc_get_principal(context, ccache, &me);
105ca1c9b0cSelric if (ret)
106ca1c9b0cSelric krb5_err(context, 1, ret, "Can't get client principal");
107ca1c9b0cSelric
108ca1c9b0cSelric errors = 0;
109ca1c9b0cSelric
110ca1c9b0cSelric for (i = 0; i < count; i++) {
111ca1c9b0cSelric memset(&in_creds, 0, sizeof(in_creds));
112ca1c9b0cSelric
113ca1c9b0cSelric in_creds.client = me;
114ca1c9b0cSelric
115ca1c9b0cSelric ret = krb5_parse_name(context, names[i], &in_creds.server);
116ca1c9b0cSelric if (ret) {
117ca1c9b0cSelric if (!quiet_flag)
118ca1c9b0cSelric krb5_warn(context, ret, "Can't parse principal name %s", names[i]);
119ca1c9b0cSelric errors++;
120ca1c9b0cSelric continue;
121ca1c9b0cSelric }
122ca1c9b0cSelric
123ca1c9b0cSelric ret = krb5_unparse_name(context, in_creds.server, &princ);
124ca1c9b0cSelric if (ret) {
125ca1c9b0cSelric krb5_warn(context, ret, "Can't unparse principal name %s", names[i]);
126ca1c9b0cSelric errors++;
127ca1c9b0cSelric continue;
128ca1c9b0cSelric }
129ca1c9b0cSelric
130ca1c9b0cSelric in_creds.session.keytype = etype;
131ca1c9b0cSelric
132b9d004c6Schristos if (exp_only) {
133b9d004c6Schristos krb5_timeofday(context, &in_creds.times.endtime);
134b9d004c6Schristos retflags |= KRB5_TC_MATCH_TIMES;
135b9d004c6Schristos }
136b9d004c6Schristos
137ca1c9b0cSelric ret = krb5_cc_retrieve_cred(context, ccache, retflags,
138ca1c9b0cSelric &in_creds, &out_creds);
139ca1c9b0cSelric if (ret) {
140ca1c9b0cSelric krb5_warn(context, ret, "Can't retrieve credentials for %s", princ);
141ca1c9b0cSelric
142ca1c9b0cSelric krb5_free_unparsed_name(context, princ);
143ca1c9b0cSelric
144ca1c9b0cSelric errors++;
145ca1c9b0cSelric continue;
146ca1c9b0cSelric }
147ca1c9b0cSelric
148ca1c9b0cSelric ret = krb5_cc_remove_cred(context, ccache, flags, &out_creds);
149ca1c9b0cSelric
150ca1c9b0cSelric krb5_free_principal(context, in_creds.server);
151ca1c9b0cSelric
152ca1c9b0cSelric if (ret) {
153ca1c9b0cSelric krb5_warn(context, ret, "Can't remove credentials for %s", princ);
154ca1c9b0cSelric
155ca1c9b0cSelric krb5_free_cred_contents(context, &out_creds);
156ca1c9b0cSelric krb5_free_unparsed_name(context, princ);
157ca1c9b0cSelric
158ca1c9b0cSelric errors++;
159ca1c9b0cSelric continue;
160ca1c9b0cSelric }
161ca1c9b0cSelric
162ca1c9b0cSelric krb5_free_unparsed_name(context, princ);
163ca1c9b0cSelric krb5_free_cred_contents(context, &out_creds);
164ca1c9b0cSelric }
165ca1c9b0cSelric
166ca1c9b0cSelric krb5_free_principal(context, me);
167ca1c9b0cSelric krb5_cc_close(context, ccache);
168ca1c9b0cSelric krb5_free_context(context);
169ca1c9b0cSelric
170ca1c9b0cSelric if (errors)
171ca1c9b0cSelric exit(1);
172ca1c9b0cSelric
173ca1c9b0cSelric exit(0);
174ca1c9b0cSelric }
175