No empty .Rs/.Re
[netbsd-mini2440.git] / crypto / dist / heimdal / lib / krb5 / test_keytab.c
blob62bd42a48f62b6f721c4c21bb095fc3cc44816ed
1 /*
2 * Copyright (c) 2005 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
4 * All rights reserved.
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
17 * 3. Neither the name of KTH nor the names of its contributors may be
18 * used to endorse or promote products derived from this software without
19 * specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY KTH AND ITS CONTRIBUTORS ``AS IS'' AND ANY
22 * EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
24 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL KTH OR ITS CONTRIBUTORS BE
25 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
26 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
27 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
28 * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
29 * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
30 * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
31 * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */
33 #include "krb5_locl.h"
34 #include <err.h>
36 __RCSID("$Heimdal: test_keytab.c 18809 2006-10-22 07:11:43Z lha $"
37 "$NetBSD$");
40 * Test that removal entry from of empty keytab doesn't corrupts
41 * memory.
44 static void
45 test_empty_keytab(krb5_context context, const char *keytab)
47 krb5_error_code ret;
48 krb5_keytab id;
49 krb5_keytab_entry entry;
51 ret = krb5_kt_resolve(context, keytab, &id);
52 if (ret)
53 krb5_err(context, 1, ret, "krb5_kt_resolve");
55 memset(&entry, 0, sizeof(entry));
57 krb5_kt_remove_entry(context, id, &entry);
59 ret = krb5_kt_close(context, id);
60 if (ret)
61 krb5_err(context, 1, ret, "krb5_kt_close");
65 * Test that memory keytab are refcounted.
68 static void
69 test_memory_keytab(krb5_context context, const char *keytab, const char *keytab2)
71 krb5_error_code ret;
72 krb5_keytab id, id2, id3;
73 krb5_keytab_entry entry, entry2, entry3;
75 ret = krb5_kt_resolve(context, keytab, &id);
76 if (ret)
77 krb5_err(context, 1, ret, "krb5_kt_resolve");
79 memset(&entry, 0, sizeof(entry));
80 ret = krb5_parse_name(context, "lha@SU.SE", &entry.principal);
81 if (ret)
82 krb5_err(context, 1, ret, "krb5_parse_name");
83 entry.vno = 1;
84 ret = krb5_generate_random_keyblock(context,
85 ETYPE_AES256_CTS_HMAC_SHA1_96,
86 &entry.keyblock);
87 if (ret)
88 krb5_err(context, 1, ret, "krb5_generate_random_keyblock");
90 krb5_kt_add_entry(context, id, &entry);
92 ret = krb5_kt_resolve(context, keytab, &id2);
93 if (ret)
94 krb5_err(context, 1, ret, "krb5_kt_resolve");
96 ret = krb5_kt_get_entry(context, id,
97 entry.principal,
99 ETYPE_AES256_CTS_HMAC_SHA1_96,
100 &entry2);
101 if (ret)
102 krb5_err(context, 1, ret, "krb5_kt_get_entry");
103 krb5_kt_free_entry(context, &entry2);
105 ret = krb5_kt_close(context, id);
106 if (ret)
107 krb5_err(context, 1, ret, "krb5_kt_close");
109 ret = krb5_kt_get_entry(context, id2,
110 entry.principal,
112 ETYPE_AES256_CTS_HMAC_SHA1_96,
113 &entry2);
114 if (ret)
115 krb5_err(context, 1, ret, "krb5_kt_get_entry");
116 krb5_kt_free_entry(context, &entry2);
118 ret = krb5_kt_close(context, id2);
119 if (ret)
120 krb5_err(context, 1, ret, "krb5_kt_close");
123 ret = krb5_kt_resolve(context, keytab2, &id3);
124 if (ret)
125 krb5_err(context, 1, ret, "krb5_kt_resolve");
127 memset(&entry3, 0, sizeof(entry3));
128 ret = krb5_parse_name(context, "lha3@SU.SE", &entry3.principal);
129 if (ret)
130 krb5_err(context, 1, ret, "krb5_parse_name");
131 entry3.vno = 1;
132 ret = krb5_generate_random_keyblock(context,
133 ETYPE_AES256_CTS_HMAC_SHA1_96,
134 &entry3.keyblock);
135 if (ret)
136 krb5_err(context, 1, ret, "krb5_generate_random_keyblock");
138 krb5_kt_add_entry(context, id3, &entry3);
141 ret = krb5_kt_resolve(context, keytab, &id);
142 if (ret)
143 krb5_err(context, 1, ret, "krb5_kt_resolve");
145 ret = krb5_kt_get_entry(context, id,
146 entry.principal,
148 ETYPE_AES256_CTS_HMAC_SHA1_96,
149 &entry2);
150 if (ret == 0)
151 krb5_errx(context, 1, "krb5_kt_get_entry when if should fail");
153 krb5_kt_remove_entry(context, id, &entry);
155 ret = krb5_kt_close(context, id);
156 if (ret)
157 krb5_err(context, 1, ret, "krb5_kt_close");
159 krb5_kt_free_entry(context, &entry);
161 krb5_kt_remove_entry(context, id3, &entry3);
163 ret = krb5_kt_close(context, id3);
164 if (ret)
165 krb5_err(context, 1, ret, "krb5_kt_close");
167 krb5_free_principal(context, entry3.principal);
168 krb5_free_keyblock_contents(context, &entry3.keyblock);
172 main(int argc, char **argv)
174 krb5_context context;
175 krb5_error_code ret;
177 setprogname(argv[0]);
179 ret = krb5_init_context(&context);
180 if (ret)
181 errx (1, "krb5_init_context failed: %d", ret);
183 test_empty_keytab(context, "MEMORY:foo");
184 test_empty_keytab(context, "FILE:foo");
185 test_empty_keytab(context, "KRB4:foo");
187 test_memory_keytab(context, "MEMORY:foo", "MEMORY:foo2");
189 krb5_free_context(context);
191 return 0;