xref: /freebsd/crypto/heimdal/admin/add.c (revision 4f29da19bd44f0e99f021510460a81bf754c21d2)
1 /*
2  * Copyright (c) 1997 - 2002 Kungliga Tekniska H�gskolan
3  * (Royal Institute of Technology, Stockholm, Sweden).
4  * All rights reserved.
5  *
6  * Redistribution and use in source and binary forms, with or without
7  * modification, are permitted provided that the following conditions
8  * are met:
9  *
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  *
13  * 2. Redistributions in binary form must reproduce the above copyright
14  *    notice, this list of conditions and the following disclaimer in the
15  *    documentation and/or other materials provided with the distribution.
16  *
17  * 3. Neither the name of the Institute nor the names of its contributors
18  *    may be used to endorse or promote products derived from this software
19  *    without specific prior written permission.
20  *
21  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31  * SUCH DAMAGE.
32  */
33 
34 #include "ktutil_locl.h"
35 
36 RCSID("$Id: add.c,v 1.5 2002/09/10 19:26:52 joda Exp $");
37 
38 int
39 kt_add(int argc, char **argv)
40 {
41     krb5_error_code ret;
42     krb5_keytab keytab;
43     krb5_keytab_entry entry;
44     char buf[128];
45     char *principal_string = NULL;
46     int kvno = -1;
47     char *enctype_string = NULL;
48     krb5_enctype enctype;
49     char *password_string = NULL;
50     int salt_flag = 1;
51     int random_flag = 0;
52     int help_flag = 0;
53     struct getargs args[] = {
54 	{ "principal", 'p', arg_string, NULL, "principal of key", "principal"},
55 	{ "kvno", 'V', arg_integer, NULL, "key version of key" },
56 	{ "enctype", 'e', arg_string, NULL, "encryption type of key" },
57 	{ "password", 'w', arg_string, NULL, "password for key"},
58 	{ "salt", 's',	arg_negative_flag, NULL, "no salt" },
59 	{ "random",  'r', arg_flag, NULL, "generate random key" },
60 	{ "help", 'h', arg_flag, NULL }
61     };
62     int num_args = sizeof(args) / sizeof(args[0]);
63     int optind = 0;
64     int i = 0;
65     args[i++].value = &principal_string;
66     args[i++].value = &kvno;
67     args[i++].value = &enctype_string;
68     args[i++].value = &password_string;
69     args[i++].value = &salt_flag;
70     args[i++].value = &random_flag;
71     args[i++].value = &help_flag;
72 
73     if(getarg(args, num_args, argc, argv, &optind)) {
74 	arg_printusage(args, num_args, "ktutil add", "");
75 	return 1;
76     }
77     if(help_flag) {
78 	arg_printusage(args, num_args, "ktutil add", "");
79 	return 1;
80     }
81     if((keytab = ktutil_open_keytab()) == NULL)
82 	return 1;
83 
84     memset(&entry, 0, sizeof(entry));
85     if(principal_string == NULL) {
86 	printf("Principal: ");
87 	if (fgets(buf, sizeof(buf), stdin) == NULL)
88 	    return 1;
89 	buf[strcspn(buf, "\r\n")] = '\0';
90 	principal_string = buf;
91     }
92     ret = krb5_parse_name(context, principal_string, &entry.principal);
93     if(ret) {
94 	krb5_warn(context, ret, "%s", principal_string);
95 	goto out;
96     }
97     if(enctype_string == NULL) {
98 	printf("Encryption type: ");
99 	if (fgets(buf, sizeof(buf), stdin) == NULL)
100 	    goto out;
101 	buf[strcspn(buf, "\r\n")] = '\0';
102 	enctype_string = buf;
103     }
104     ret = krb5_string_to_enctype(context, enctype_string, &enctype);
105     if(ret) {
106 	int t;
107 	if(sscanf(enctype_string, "%d", &t) == 1)
108 	    enctype = t;
109 	else {
110 	    krb5_warn(context, ret, "%s", enctype_string);
111 	    goto out;
112 	}
113     }
114     if(kvno == -1) {
115 	printf("Key version: ");
116 	if (fgets(buf, sizeof(buf), stdin) == NULL)
117 	    goto out;
118 	buf[strcspn(buf, "\r\n")] = '\0';
119 	kvno = atoi(buf);
120     }
121     if(password_string == NULL && random_flag == 0) {
122 	if(des_read_pw_string(buf, sizeof(buf), "Password: ", 1))
123 	    goto out;
124 	password_string = buf;
125     }
126     if(password_string) {
127 	if (!salt_flag) {
128 	    krb5_salt salt;
129 	    krb5_data pw;
130 
131 	    salt.salttype         = KRB5_PW_SALT;
132 	    salt.saltvalue.data   = NULL;
133 	    salt.saltvalue.length = 0;
134 	    pw.data = (void*)password_string;
135 	    pw.length = strlen(password_string);
136 	    krb5_string_to_key_data_salt(context, enctype, pw, salt,
137 					 &entry.keyblock);
138         } else {
139 	    krb5_string_to_key(context, enctype, password_string,
140 			       entry.principal, &entry.keyblock);
141 	}
142 	memset (password_string, 0, strlen(password_string));
143     } else {
144 	krb5_generate_random_keyblock(context, enctype, &entry.keyblock);
145     }
146     entry.vno = kvno;
147     entry.timestamp = time (NULL);
148     ret = krb5_kt_add_entry(context, keytab, &entry);
149     if(ret)
150 	krb5_warn(context, ret, "add");
151  out:
152     krb5_kt_free_entry(context, &entry);
153     krb5_kt_close(context, keytab);
154     return 0;
155 }
156