8322 nl: misleading-indentation
[unleashed/tickless.git] / usr / src / cmd / krb5 / kadmin / cli / keytab.c
blob6bb61c1f5be83f7992b9303303f8758a235f74c7
1 /*
2 * Copyright 2008 Sun Microsystems, Inc. All rights reserved.
3 * Use is subject to license terms.
4 */
7 /*
8 * Copyright 1993 OpenVision Technologies, Inc., All Rights Reserved.
10 * $Id: keytab.c,v 1.28 2004/05/31 12:39:16 epeisach Exp $
11 * $Source: /cvs/krbdev/krb5/src/kadmin/cli/keytab.c,v $
15 * Copyright (C) 1998 by the FundsXpress, INC.
17 * All rights reserved.
19 * Export of this software from the United States of America may require
20 * a specific license from the United States Government. It is the
21 * responsibility of any person or organization contemplating export to
22 * obtain such a license before exporting.
24 * WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
25 * distribute this software and its documentation for any purpose and
26 * without fee is hereby granted, provided that the above copyright
27 * notice appear in all copies and that both that copyright notice and
28 * this permission notice appear in supporting documentation, and that
29 * the name of FundsXpress. not be used in advertising or publicity pertaining
30 * to distribution of the software without specific, written prior
31 * permission. FundsXpress makes no representations about the suitability of
32 * this software for any purpose. It is provided "as is" without express
33 * or implied warranty.
35 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
36 * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
37 * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
40 #if !defined(lint) && !defined(__CODECENTER__)
41 static char *rcsid = "$Header: /cvs/krbdev/krb5/src/kadmin/cli/keytab.c,v 1.28 2004/05/31 12:39:16 epeisach Exp $";
42 #endif
44 #include <stdio.h>
45 #include <stdlib.h>
46 #include <string.h>
47 #include <libintl.h>
49 #include <kadm5/admin.h>
50 #include <krb5/adm_proto.h>
51 #include "kadmin.h"
52 #include <krb5.h>
54 static int add_principal(void *lhandle, char *keytab_str, krb5_keytab keytab,
55 krb5_boolean keepold,
56 int n_ks_tuple, krb5_key_salt_tuple *ks_tuple,
57 char *princ_str);
58 static int remove_principal(char *keytab_str, krb5_keytab keytab, char
59 *princ_str, char *kvno_str);
60 static char *etype_string(krb5_enctype enctype);
61 static char *etype_istring(krb5_enctype enctype);
63 static int quiet;
65 static void add_usage()
67 fprintf(stderr, "%s: %s\n", gettext("Usage"),
68 "ktadd [-k[eytab] keytab] [-q] [-e keysaltlist] "
69 "[principal | -glob princ-exp] [...]\n");
72 static void rem_usage()
74 fprintf(stderr, "%s: %s\n",
75 gettext("Usage"),
76 "ktremove [-k[eytab] keytab] [-q] principal "
77 "[kvno|\"all\"|\"old\"]\n");
80 static int process_keytab(krb5_context my_context, char **keytab_str,
81 krb5_keytab *keytab)
83 int code;
84 char buf[BUFSIZ];
86 if (*keytab_str == NULL) {
87 if (code = krb5_kt_default(my_context, keytab)) {
88 com_err(whoami, code, gettext("while opening default keytab"));
89 return 1;
91 if (code = krb5_kt_get_name(my_context, *keytab, buf, BUFSIZ)) {
92 com_err(whoami, code, gettext("while retrieving keytab name"));
93 return 1;
95 if (!(*keytab_str = strdup(buf))) {
96 com_err(whoami, ENOMEM, gettext("while creating keytab name"));
97 return 1;
99 } else {
100 if (strchr(*keytab_str, ':') != NULL) {
101 *keytab_str = strdup(*keytab_str);
102 if (*keytab_str == NULL) {
103 com_err(whoami, ENOMEM,
104 gettext("while creating keytab name"));
105 return 1;
107 } else {
108 char *tmp = *keytab_str;
110 *keytab_str = (char *)
111 malloc(strlen("WRFILE:")+strlen(tmp)+1);
112 if (*keytab_str == NULL) {
113 com_err(whoami, ENOMEM,
114 gettext("while creating keytab name"));
115 return 1;
117 sprintf(*keytab_str, "WRFILE:%s", tmp);
120 code = krb5_kt_resolve(my_context, *keytab_str, keytab);
121 if (code != 0) {
122 com_err(whoami, code,
123 gettext("while resolving keytab %s"), *keytab_str);
124 free(keytab_str);
125 return 1;
129 return 0;
133 void kadmin_keytab_add(int argc, char **argv)
135 krb5_keytab keytab = 0;
136 char *keytab_str = NULL, **princs;
137 int code, num, i;
138 krb5_error_code retval;
139 int n_ks_tuple = 0;
140 krb5_boolean keepold = FALSE;
141 krb5_key_salt_tuple *ks_tuple = NULL;
143 argc--; argv++;
144 quiet = 0;
145 while (argc) {
146 if (strncmp(*argv, "-k", 2) == 0) {
147 argc--; argv++;
148 if (!argc || keytab_str) {
149 add_usage();
150 return;
152 keytab_str = *argv;
153 } else if (strcmp(*argv, "-q") == 0) {
154 quiet++;
155 } else if (strcmp(*argv, "-e") == 0) {
156 argc--;
157 if (argc < 1) {
158 add_usage();
159 return;
161 retval = krb5_string_to_keysalts(*++argv, ", \t", ":.-", 0,
162 &ks_tuple, &n_ks_tuple);
163 if (retval) {
164 com_err("ktadd", retval,
165 gettext("while parsing keysalts %s"),
166 *argv);
168 return;
170 } else
171 break;
172 argc--; argv++;
175 if (argc == 0) {
176 add_usage();
177 return;
180 if (process_keytab(context, &keytab_str, &keytab))
181 return;
183 while (*argv) {
184 if (strcmp(*argv, "-glob") == 0) {
185 if (*++argv == NULL) {
186 add_usage();
187 break;
190 code = kadm5_get_principals(handle, *argv, &princs, &num);
191 if (code) {
192 com_err(whoami, code,
193 gettext("while expanding expression "
194 "\"%s\"."),
195 *argv);
196 argv++;
197 continue;
200 for (i = 0; i < num; i++)
201 (void) add_principal(handle, keytab_str, keytab,
202 keepold, n_ks_tuple, ks_tuple,
203 princs[i]);
204 kadm5_free_name_list(handle, princs, num);
205 } else
206 (void) add_principal(handle, keytab_str, keytab,
207 keepold, n_ks_tuple, ks_tuple,
208 *argv);
209 argv++;
212 code = krb5_kt_close(context, keytab);
213 if (code != 0)
214 com_err(whoami, code, gettext("while closing keytab"));
216 free(keytab_str);
219 void kadmin_keytab_remove(int argc, char **argv)
221 krb5_keytab keytab = 0;
222 char *keytab_str = NULL;
223 int code;
225 argc--; argv++;
226 quiet = 0;
227 while (argc) {
228 if (strncmp(*argv, "-k", 2) == 0) {
229 argc--; argv++;
230 if (!argc || keytab_str) {
231 rem_usage();
232 return;
234 keytab_str = *argv;
235 } else if (strcmp(*argv, "-q") == 0) {
236 quiet++;
237 } else
238 break;
239 argc--; argv++;
242 if (argc != 1 && argc != 2) {
243 rem_usage();
244 return;
246 if (process_keytab(context, &keytab_str, &keytab))
247 return;
249 (void) remove_principal(keytab_str, keytab, argv[0], argv[1]);
251 code = krb5_kt_close(context, keytab);
252 if (code != 0)
253 com_err(whoami, code, gettext("while closing keytab"));
255 free(keytab_str);
258 static
259 int add_principal(void *lhandle, char *keytab_str, krb5_keytab keytab,
260 krb5_boolean keepold, int n_ks_tuple,
261 krb5_key_salt_tuple *ks_tuple,
262 char *princ_str)
264 kadm5_principal_ent_rec princ_rec;
265 krb5_principal princ;
266 krb5_keytab_entry new_entry;
267 krb5_keyblock *keys;
268 int code, nkeys, i;
269 int nktypes = 0;
270 krb5_key_salt_tuple *permitted_etypes = NULL;
272 (void) memset((char *)&princ_rec, 0, sizeof(princ_rec));
274 princ = NULL;
275 keys = NULL;
276 nkeys = 0;
278 code = krb5_parse_name(context, princ_str, &princ);
279 if (code != 0) {
280 com_err(whoami, code,
281 gettext("while parsing -add principal name %s"),
282 princ_str);
283 goto cleanup;
286 if (ks_tuple == NULL) {
287 krb5_enctype *ptr, *ktypes = NULL;
289 code = krb5_get_permitted_enctypes(context, &ktypes);
290 if (!code && ktypes && *ktypes) {
291 krb5_int32 salttype;
293 * Count the results. This is stupid, the API above
294 * should have included an output param to indicate
295 * the size of the list that is returned.
297 for (ptr = ktypes; *ptr; ptr++) nktypes++;
299 /* Allocate a new key-salt tuple set */
300 permitted_etypes = (krb5_key_salt_tuple *)malloc (
301 sizeof (krb5_key_salt_tuple) * nktypes);
302 if (permitted_etypes == NULL) {
303 free(ktypes);
304 return (ENOMEM);
308 * Because the keysalt parameter doesn't matter for
309 * keys stored in the keytab, use the default "normal"
310 * salt for all keys
312 (void) krb5_string_to_salttype("normal", &salttype);
313 for (i = 0; i < nktypes; i++) {
314 permitted_etypes[i].ks_enctype = ktypes[i];
315 permitted_etypes[i].ks_salttype = salttype;
317 free(ktypes);
318 } else {
319 if (ktypes)
320 free(ktypes);
321 goto cleanup;
323 } else {
324 permitted_etypes = ks_tuple;
325 nktypes = n_ks_tuple;
328 code = kadm5_randkey_principal_3(lhandle, princ,
329 keepold, nktypes, permitted_etypes,
330 &keys, &nkeys);
332 #ifndef _KADMIN_LOCAL_
333 /* this block is not needed in the kadmin.local client */
336 * If the above call failed, we may be talking to an older
337 * admin server, so try the older API.
339 if (code == KADM5_RPC_ERROR) {
340 code = kadm5_randkey_principal_old(handle, princ, &keys, &nkeys);
342 #endif /* !KADMIN_LOCAL */
343 if (code != 0) {
344 if (code == KADM5_UNK_PRINC) {
345 fprintf(stderr,
346 gettext("%s: Principal %s does not exist.\n"),
347 whoami, princ_str);
348 /* Solaris Kerberos: Better error messages */
349 } else if (code == KRB5_BAD_ENCTYPE) {
350 int i, et;
351 fprintf(stderr, gettext("%s: Error from the remote system: "
352 "%s while changing %s's key\n"), whoami,
353 error_message(code), princ_str);
354 if (nktypes) {
355 et = permitted_etypes[0].ks_enctype;
356 fprintf(stderr, gettext("%s: Encryption types "
357 "requested: %s (%d)"), whoami,
358 etype_istring(et), et);
360 for (i = 1; i < nktypes; i++) {
361 et = permitted_etypes[i].ks_enctype;
362 fprintf(stderr, ", %s (%d)",
363 etype_istring(et), et);
365 fprintf(stderr, "\n");
367 } else {
368 com_err(whoami, code,
369 gettext("while changing %s's key"),
370 princ_str);
372 goto cleanup;
375 code = kadm5_get_principal(lhandle, princ, &princ_rec,
376 KADM5_PRINCIPAL_NORMAL_MASK);
377 if (code != 0) {
378 com_err(whoami, code, gettext("while retrieving principal"));
379 goto cleanup;
382 for (i = 0; i < nkeys; i++) {
383 memset((char *) &new_entry, 0, sizeof(new_entry));
384 new_entry.principal = princ;
385 new_entry.key = keys[i];
386 new_entry.vno = princ_rec.kvno;
388 code = krb5_kt_add_entry(context, keytab, &new_entry);
389 if (code != 0) {
390 com_err(whoami, code,
391 gettext("while adding key to keytab"));
392 (void) kadm5_free_principal_ent(lhandle, &princ_rec);
393 goto cleanup;
396 if (!quiet)
397 printf(gettext("Entry for principal %s with kvno %d, "
398 "encryption type %s added to keytab %s.\n"),
399 princ_str, princ_rec.kvno,
400 etype_string(keys[i].enctype), keytab_str);
403 code = kadm5_free_principal_ent(lhandle, &princ_rec);
404 if (code != 0) {
405 com_err(whoami, code, gettext("while freeing principal entry"));
406 goto cleanup;
409 cleanup:
410 if (nkeys) {
411 for (i = 0; i < nkeys; i++)
412 krb5_free_keyblock_contents(context, &keys[i]);
413 free(keys);
415 if (princ)
416 krb5_free_principal(context, princ);
418 if (permitted_etypes != NULL && ks_tuple == NULL)
419 free(permitted_etypes);
421 return code;
424 int remove_principal(char *keytab_str, krb5_keytab keytab, char
425 *princ_str, char *kvno_str)
427 krb5_principal princ;
428 krb5_keytab_entry entry;
429 krb5_kt_cursor cursor;
430 enum { UNDEF, SPEC, HIGH, ALL, OLD } mode;
431 int code, did_something;
432 krb5_kvno kvno;
434 code = krb5_parse_name(context, princ_str, &princ);
435 if (code != 0) {
436 com_err(whoami, code,
437 gettext("while parsing principal name %s"),
438 princ_str);
439 return code;
442 mode = UNDEF;
443 if (kvno_str == NULL) {
444 mode = HIGH;
445 kvno = 0;
446 } else if (strcmp(kvno_str, "all") == 0) {
447 mode = ALL;
448 kvno = 0;
449 } else if (strcmp(kvno_str, "old") == 0) {
450 mode = OLD;
451 kvno = 0;
452 } else {
453 mode = SPEC;
454 kvno = atoi(kvno_str);
457 /* kvno is set to specified value for SPEC, 0 otherwise */
458 code = krb5_kt_get_entry(context, keytab, princ, kvno, 0, &entry);
459 if (code != 0) {
460 if (code == ENOENT) {
461 fprintf(stderr,
462 gettext("%s: Keytab %s does not exist.\n"),
463 whoami, keytab_str);
464 } else if (code == KRB5_KT_NOTFOUND) {
465 if (mode != SPEC)
466 fprintf(stderr,
467 gettext("%s: No entry for principal "
468 "%s exists in keytab %s\n"),
469 whoami, princ_str, keytab_str);
470 else
471 fprintf(stderr,
472 gettext("%s: No entry for principal "
473 "%s with kvno %d exists in "
474 "keytab %s.\n"),
475 whoami, princ_str, kvno, keytab_str);
476 } else {
477 com_err(whoami, code,
478 gettext("while retrieving highest "
479 "kvno from keytab"));
481 return code;
484 /* set kvno to spec'ed value for SPEC, highest kvno otherwise */
485 kvno = entry.vno;
486 krb5_kt_free_entry(context, &entry);
488 code = krb5_kt_start_seq_get(context, keytab, &cursor);
489 if (code != 0) {
490 com_err(whoami, code, gettext("while starting keytab scan"));
491 return code;
494 did_something = 0;
495 while ((code = krb5_kt_next_entry(context, keytab, &entry, &cursor)) == 0) {
496 if (krb5_principal_compare(context, princ, entry.principal) &&
497 ((mode == ALL) ||
498 (mode == SPEC && entry.vno == kvno) ||
499 (mode == OLD && entry.vno != kvno) ||
500 (mode == HIGH && entry.vno == kvno))) {
503 * Ack! What a kludge... the scanning functions lock
504 * the keytab so entries cannot be removed while they
505 * are operating.
507 code = krb5_kt_end_seq_get(context, keytab, &cursor);
508 if (code != 0) {
509 com_err(whoami, code,
510 gettext("while temporarily "
511 "ending keytab scan"));
512 return code;
514 code = krb5_kt_remove_entry(context, keytab, &entry);
515 if (code != 0) {
516 com_err(whoami, code,
517 gettext("while deleting entry "
518 "from keytab"));
519 return code;
521 code = krb5_kt_start_seq_get(context, keytab, &cursor);
522 if (code != 0) {
523 com_err(whoami, code,
524 gettext("while restarting keytab scan"));
525 return code;
528 did_something++;
529 if (!quiet)
530 printf(gettext("Entry for principal "
531 "%s with kvno %d "
532 "removed from keytab %s.\n"),
533 princ_str, entry.vno, keytab_str);
535 krb5_kt_free_entry(context, &entry);
537 if (code && code != KRB5_KT_END) {
538 com_err(whoami, code, gettext("while scanning keytab"));
539 return code;
541 if ((code = krb5_kt_end_seq_get(context, keytab, &cursor))) {
542 com_err(whoami, code, gettext("while ending keytab scan"));
543 return code;
547 * If !did_someting then mode must be OLD or we would have
548 * already returned with an error. But check it anyway just to
549 * prevent unexpected error messages...
551 if (!did_something && mode == OLD) {
552 fprintf(stderr,
553 gettext("%s: There is only one entry for principal "
554 "%s in keytab %s\n"),
555 whoami, princ_str, keytab_str);
556 return 1;
559 return 0;
563 * etype_string(enctype): return a string representation of the
564 * encryption type. XXX copied from klist.c; this should be a
565 * library function, or perhaps just #defines
567 static char *etype_string(enctype)
568 krb5_enctype enctype;
570 static char buf[100];
571 krb5_error_code ret;
573 if ((ret = krb5_enctype_to_string(enctype, buf, sizeof(buf))))
574 sprintf(buf, "etype %d", enctype);
576 return buf;
579 /* Solaris Kerberos */
580 static char *etype_istring(krb5_enctype enctype) {
581 static char buf[100];
582 krb5_error_code ret;
584 if ((ret = krb5_enctype_to_istring(enctype, buf, sizeof(buf))))
585 sprintf(buf, "unknown", enctype);
587 return (buf);