xref: /freebsd-src/crypto/heimdal/admin/get.c (revision 6a068746777241722b2b32c5d0bc443a2a64d80b)
1b528cefcSMark Murray /*
2*ae771770SStanislav Sedov  * Copyright (c) 1997-2004 Kungliga Tekniska Högskolan
3b528cefcSMark Murray  * (Royal Institute of Technology, Stockholm, Sweden).
4b528cefcSMark Murray  * All rights reserved.
5b528cefcSMark Murray  *
6b528cefcSMark Murray  * Redistribution and use in source and binary forms, with or without
7b528cefcSMark Murray  * modification, are permitted provided that the following conditions
8b528cefcSMark Murray  * are met:
9b528cefcSMark Murray  *
10b528cefcSMark Murray  * 1. Redistributions of source code must retain the above copyright
11b528cefcSMark Murray  *    notice, this list of conditions and the following disclaimer.
12b528cefcSMark Murray  *
13b528cefcSMark Murray  * 2. Redistributions in binary form must reproduce the above copyright
14b528cefcSMark Murray  *    notice, this list of conditions and the following disclaimer in the
15b528cefcSMark Murray  *    documentation and/or other materials provided with the distribution.
16b528cefcSMark Murray  *
17b528cefcSMark Murray  * 3. Neither the name of the Institute nor the names of its contributors
18b528cefcSMark Murray  *    may be used to endorse or promote products derived from this software
19b528cefcSMark Murray  *    without specific prior written permission.
20b528cefcSMark Murray  *
21b528cefcSMark Murray  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22b528cefcSMark Murray  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23b528cefcSMark Murray  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24b528cefcSMark Murray  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25b528cefcSMark Murray  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26b528cefcSMark Murray  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27b528cefcSMark Murray  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28b528cefcSMark Murray  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29b528cefcSMark Murray  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30b528cefcSMark Murray  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31b528cefcSMark Murray  * SUCH DAMAGE.
32b528cefcSMark Murray  */
33b528cefcSMark Murray 
34b528cefcSMark Murray #include "ktutil_locl.h"
35b528cefcSMark Murray 
36*ae771770SStanislav Sedov RCSID("$Id$");
374137ff4cSJacques Vidrine 
384137ff4cSJacques Vidrine static void*
open_kadmin_connection(char * principal,const char * realm,char * admin_server,int server_port)394137ff4cSJacques Vidrine open_kadmin_connection(char *principal,
404137ff4cSJacques Vidrine 		       const char *realm,
414137ff4cSJacques Vidrine 		       char *admin_server,
424137ff4cSJacques Vidrine 		       int server_port)
434137ff4cSJacques Vidrine {
444137ff4cSJacques Vidrine     static kadm5_config_params conf;
454137ff4cSJacques Vidrine     krb5_error_code ret;
464137ff4cSJacques Vidrine     void *kadm_handle;
474137ff4cSJacques Vidrine     memset(&conf, 0, sizeof(conf));
484137ff4cSJacques Vidrine 
494137ff4cSJacques Vidrine     if(realm) {
50c19800e8SDoug Rabson 	conf.realm = strdup(realm);
51c19800e8SDoug Rabson 	if (conf.realm == NULL) {
52*ae771770SStanislav Sedov 	    krb5_set_error_message(context, 0, "malloc: out of memory");
53c19800e8SDoug Rabson 	    return NULL;
54c19800e8SDoug Rabson 	}
554137ff4cSJacques Vidrine 	conf.mask |= KADM5_CONFIG_REALM;
564137ff4cSJacques Vidrine     }
574137ff4cSJacques Vidrine 
584137ff4cSJacques Vidrine     if (admin_server) {
594137ff4cSJacques Vidrine 	conf.admin_server = admin_server;
604137ff4cSJacques Vidrine 	conf.mask |= KADM5_CONFIG_ADMIN_SERVER;
614137ff4cSJacques Vidrine     }
624137ff4cSJacques Vidrine 
634137ff4cSJacques Vidrine     if (server_port) {
644137ff4cSJacques Vidrine 	conf.kadmind_port = htons(server_port);
654137ff4cSJacques Vidrine 	conf.mask |= KADM5_CONFIG_KADMIND_PORT;
664137ff4cSJacques Vidrine     }
674137ff4cSJacques Vidrine 
684137ff4cSJacques Vidrine     /* should get realm from each principal, instead of doing
694137ff4cSJacques Vidrine        everything with the same (local) realm */
704137ff4cSJacques Vidrine 
714137ff4cSJacques Vidrine     ret = kadm5_init_with_password_ctx(context,
724137ff4cSJacques Vidrine 				       principal,
734137ff4cSJacques Vidrine 				       NULL,
744137ff4cSJacques Vidrine 				       KADM5_ADMIN_SERVICE,
754137ff4cSJacques Vidrine 				       &conf, 0, 0,
764137ff4cSJacques Vidrine 				       &kadm_handle);
77c19800e8SDoug Rabson     free(conf.realm);
784137ff4cSJacques Vidrine     if(ret) {
794137ff4cSJacques Vidrine 	krb5_warn(context, ret, "kadm5_init_with_password");
804137ff4cSJacques Vidrine 	return NULL;
814137ff4cSJacques Vidrine     }
824137ff4cSJacques Vidrine     return kadm_handle;
834137ff4cSJacques Vidrine }
84b528cefcSMark Murray 
85b528cefcSMark Murray int
kt_get(struct get_options * opt,int argc,char ** argv)86c19800e8SDoug Rabson kt_get(struct get_options *opt, int argc, char **argv)
87b528cefcSMark Murray {
88adb0ddaeSAssar Westerlund     krb5_error_code ret = 0;
89adb0ddaeSAssar Westerlund     krb5_keytab keytab;
90adb0ddaeSAssar Westerlund     void *kadm_handle = NULL;
91adb0ddaeSAssar Westerlund     krb5_enctype *etypes = NULL;
92adb0ddaeSAssar Westerlund     size_t netypes = 0;
93*ae771770SStanislav Sedov     size_t i;
94*ae771770SStanislav Sedov     int a, j;
95c19800e8SDoug Rabson     unsigned int failed = 0;
96adb0ddaeSAssar Westerlund 
974137ff4cSJacques Vidrine     if((keytab = ktutil_open_keytab()) == NULL)
98adb0ddaeSAssar Westerlund 	return 1;
994137ff4cSJacques Vidrine 
100c19800e8SDoug Rabson     if(opt->realm_string)
101c19800e8SDoug Rabson 	krb5_set_default_realm(context, opt->realm_string);
102adb0ddaeSAssar Westerlund 
103c19800e8SDoug Rabson     if (opt->enctypes_strings.num_strings != 0) {
104adb0ddaeSAssar Westerlund 
105c19800e8SDoug Rabson 	etypes = malloc (opt->enctypes_strings.num_strings * sizeof(*etypes));
106adb0ddaeSAssar Westerlund 	if (etypes == NULL) {
107adb0ddaeSAssar Westerlund 	    krb5_warnx(context, "malloc failed");
108adb0ddaeSAssar Westerlund 	    goto out;
109adb0ddaeSAssar Westerlund 	}
110c19800e8SDoug Rabson 	netypes = opt->enctypes_strings.num_strings;
111adb0ddaeSAssar Westerlund 	for(i = 0; i < netypes; i++) {
112adb0ddaeSAssar Westerlund 	    ret = krb5_string_to_enctype(context,
113c19800e8SDoug Rabson 					 opt->enctypes_strings.strings[i],
114adb0ddaeSAssar Westerlund 					 &etypes[i]);
115adb0ddaeSAssar Westerlund 	    if(ret) {
116adb0ddaeSAssar Westerlund 		krb5_warnx(context, "unrecognized enctype: %s",
117c19800e8SDoug Rabson 			   opt->enctypes_strings.strings[i]);
118adb0ddaeSAssar Westerlund 		goto out;
119adb0ddaeSAssar Westerlund 	    }
120adb0ddaeSAssar Westerlund 	}
121b528cefcSMark Murray     }
122b528cefcSMark Murray 
123b528cefcSMark Murray 
124*ae771770SStanislav Sedov     for(a = 0; a < argc; a++){
125b528cefcSMark Murray 	krb5_principal princ_ent;
126b528cefcSMark Murray 	kadm5_principal_ent_rec princ;
127b528cefcSMark Murray 	int mask = 0;
128b528cefcSMark Murray 	krb5_keyblock *keys;
129b528cefcSMark Murray 	int n_keys;
130b528cefcSMark Murray 	int created = 0;
131b528cefcSMark Murray 	krb5_keytab_entry entry;
132b528cefcSMark Murray 
133*ae771770SStanislav Sedov 	ret = krb5_parse_name(context, argv[a], &princ_ent);
1348d4ba808SJacques Vidrine 	if (ret) {
135*ae771770SStanislav Sedov 	    krb5_warn(context, ret, "can't parse principal %s", argv[a]);
136c19800e8SDoug Rabson 	    failed++;
1378d4ba808SJacques Vidrine 	    continue;
1388d4ba808SJacques Vidrine 	}
139b528cefcSMark Murray 	memset(&princ, 0, sizeof(princ));
140b528cefcSMark Murray 	princ.principal = princ_ent;
141b528cefcSMark Murray 	mask |= KADM5_PRINCIPAL;
142b528cefcSMark Murray 	princ.attributes |= KRB5_KDB_DISALLOW_ALL_TIX;
143b528cefcSMark Murray 	mask |= KADM5_ATTRIBUTES;
144b528cefcSMark Murray 	princ.princ_expire_time = 0;
145b528cefcSMark Murray 	mask |= KADM5_PRINC_EXPIRE_TIME;
146b528cefcSMark Murray 
1474137ff4cSJacques Vidrine 	if(kadm_handle == NULL) {
1484137ff4cSJacques Vidrine 	    const char *r;
149c19800e8SDoug Rabson 	    if(opt->realm_string != NULL)
150c19800e8SDoug Rabson 		r = opt->realm_string;
1514137ff4cSJacques Vidrine 	    else
1524137ff4cSJacques Vidrine 		r = krb5_principal_get_realm(context, princ_ent);
153c19800e8SDoug Rabson 	    kadm_handle = open_kadmin_connection(opt->principal_string,
1544137ff4cSJacques Vidrine 						 r,
155c19800e8SDoug Rabson 						 opt->admin_server_string,
156c19800e8SDoug Rabson 						 opt->server_port_integer);
157c19800e8SDoug Rabson 	    if(kadm_handle == NULL)
1584137ff4cSJacques Vidrine 		break;
1594137ff4cSJacques Vidrine 	}
1604137ff4cSJacques Vidrine 
161b528cefcSMark Murray 	ret = kadm5_create_principal(kadm_handle, &princ, mask, "x");
162b528cefcSMark Murray 	if(ret == 0)
163c19800e8SDoug Rabson 	    created = 1;
164b528cefcSMark Murray 	else if(ret != KADM5_DUP) {
165*ae771770SStanislav Sedov 	    krb5_warn(context, ret, "kadm5_create_principal(%s)", argv[a]);
166b528cefcSMark Murray 	    krb5_free_principal(context, princ_ent);
167c19800e8SDoug Rabson 	    failed++;
168b528cefcSMark Murray 	    continue;
169b528cefcSMark Murray 	}
170b528cefcSMark Murray 	ret = kadm5_randkey_principal(kadm_handle, princ_ent, &keys, &n_keys);
1715e9cd1aeSAssar Westerlund 	if (ret) {
172*ae771770SStanislav Sedov 	    krb5_warn(context, ret, "kadm5_randkey_principal(%s)", argv[a]);
1735e9cd1aeSAssar Westerlund 	    krb5_free_principal(context, princ_ent);
174c19800e8SDoug Rabson 	    failed++;
1755e9cd1aeSAssar Westerlund 	    continue;
1765e9cd1aeSAssar Westerlund 	}
177b528cefcSMark Murray 
178b528cefcSMark Murray 	ret = kadm5_get_principal(kadm_handle, princ_ent, &princ,
179b528cefcSMark Murray 			      KADM5_PRINCIPAL | KADM5_KVNO | KADM5_ATTRIBUTES);
1805e9cd1aeSAssar Westerlund 	if (ret) {
181*ae771770SStanislav Sedov 	    krb5_warn(context, ret, "kadm5_get_principal(%s)", argv[a]);
1825e9cd1aeSAssar Westerlund 	    for (j = 0; j < n_keys; j++)
1835e9cd1aeSAssar Westerlund 		krb5_free_keyblock_contents(context, &keys[j]);
1845e9cd1aeSAssar Westerlund 	    krb5_free_principal(context, princ_ent);
185c19800e8SDoug Rabson 	    failed++;
1865e9cd1aeSAssar Westerlund 	    continue;
1875e9cd1aeSAssar Westerlund 	}
188c19800e8SDoug Rabson 	if(!created && (princ.attributes & KRB5_KDB_DISALLOW_ALL_TIX))
189*ae771770SStanislav Sedov 	    krb5_warnx(context, "%s: disallow-all-tix flag set - clearing", argv[a]);
190b528cefcSMark Murray 	princ.attributes &= (~KRB5_KDB_DISALLOW_ALL_TIX);
191b528cefcSMark Murray 	mask = KADM5_ATTRIBUTES;
192b528cefcSMark Murray 	if(created) {
193b528cefcSMark Murray 	    princ.kvno = 1;
194b528cefcSMark Murray 	    mask |= KADM5_KVNO;
195b528cefcSMark Murray 	}
196b528cefcSMark Murray 	ret = kadm5_modify_principal(kadm_handle, &princ, mask);
1975e9cd1aeSAssar Westerlund 	if (ret) {
198*ae771770SStanislav Sedov 	    krb5_warn(context, ret, "kadm5_modify_principal(%s)", argv[a]);
1995e9cd1aeSAssar Westerlund 	    for (j = 0; j < n_keys; j++)
2005e9cd1aeSAssar Westerlund 		krb5_free_keyblock_contents(context, &keys[j]);
2015e9cd1aeSAssar Westerlund 	    krb5_free_principal(context, princ_ent);
202c19800e8SDoug Rabson 	    failed++;
2035e9cd1aeSAssar Westerlund 	    continue;
2045e9cd1aeSAssar Westerlund 	}
205b528cefcSMark Murray 	for(j = 0; j < n_keys; j++) {
206adb0ddaeSAssar Westerlund 	    int do_add = TRUE;
207adb0ddaeSAssar Westerlund 
208adb0ddaeSAssar Westerlund 	    if (netypes) {
209*ae771770SStanislav Sedov 		size_t k;
210adb0ddaeSAssar Westerlund 
211adb0ddaeSAssar Westerlund 		do_add = FALSE;
212c19800e8SDoug Rabson 		for (k = 0; k < netypes; ++k)
213c19800e8SDoug Rabson 		    if (keys[j].keytype == etypes[k]) {
214adb0ddaeSAssar Westerlund 			do_add = TRUE;
215adb0ddaeSAssar Westerlund 			break;
216adb0ddaeSAssar Westerlund 		    }
217adb0ddaeSAssar Westerlund 	    }
218adb0ddaeSAssar Westerlund 	    if (do_add) {
219b528cefcSMark Murray 		entry.principal = princ_ent;
220b528cefcSMark Murray 		entry.vno = princ.kvno;
221b528cefcSMark Murray 		entry.keyblock = keys[j];
222b528cefcSMark Murray 		entry.timestamp = time (NULL);
223b528cefcSMark Murray 		ret = krb5_kt_add_entry(context, keytab, &entry);
224adb0ddaeSAssar Westerlund 		if (ret)
225adb0ddaeSAssar Westerlund 		    krb5_warn(context, ret, "krb5_kt_add_entry");
226adb0ddaeSAssar Westerlund 	    }
227b528cefcSMark Murray 	    krb5_free_keyblock_contents(context, &keys[j]);
228b528cefcSMark Murray 	}
229b528cefcSMark Murray 
230b528cefcSMark Murray 	kadm5_free_principal_ent(kadm_handle, &princ);
231b528cefcSMark Murray 	krb5_free_principal(context, princ_ent);
232b528cefcSMark Murray     }
233adb0ddaeSAssar Westerlund  out:
234adb0ddaeSAssar Westerlund     free(etypes);
235adb0ddaeSAssar Westerlund     if (kadm_handle)
236b528cefcSMark Murray 	kadm5_destroy(kadm_handle);
237adb0ddaeSAssar Westerlund     krb5_kt_close(context, keytab);
238c19800e8SDoug Rabson     return ret != 0 || failed > 0;
239b528cefcSMark Murray }
240