1 /* 2 * Copyright (c) 1997 - 2002 Kungliga Tekniska H�gskolan 3 * (Royal Institute of Technology, Stockholm, Sweden). 4 * All rights reserved. 5 * 6 * Redistribution and use in source and binary forms, with or without 7 * modification, are permitted provided that the following conditions 8 * are met: 9 * 10 * 1. Redistributions of source code must retain the above copyright 11 * notice, this list of conditions and the following disclaimer. 12 * 13 * 2. Redistributions in binary form must reproduce the above copyright 14 * notice, this list of conditions and the following disclaimer in the 15 * documentation and/or other materials provided with the distribution. 16 * 17 * 3. Neither the name of the Institute nor the names of its contributors 18 * may be used to endorse or promote products derived from this software 19 * without specific prior written permission. 20 * 21 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND 22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE 25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 */ 33 34 #include "ktutil_locl.h" 35 36 RCSID("$Id: add.c,v 1.5 2002/09/10 19:26:52 joda Exp $"); 37 38 int 39 kt_add(int argc, char **argv) 40 { 41 krb5_error_code ret; 42 krb5_keytab keytab; 43 krb5_keytab_entry entry; 44 char buf[128]; 45 char *principal_string = NULL; 46 int kvno = -1; 47 char *enctype_string = NULL; 48 krb5_enctype enctype; 49 char *password_string = NULL; 50 int salt_flag = 1; 51 int random_flag = 0; 52 int help_flag = 0; 53 struct getargs args[] = { 54 { "principal", 'p', arg_string, NULL, "principal of key", "principal"}, 55 { "kvno", 'V', arg_integer, NULL, "key version of key" }, 56 { "enctype", 'e', arg_string, NULL, "encryption type of key" }, 57 { "password", 'w', arg_string, NULL, "password for key"}, 58 { "salt", 's', arg_negative_flag, NULL, "no salt" }, 59 { "random", 'r', arg_flag, NULL, "generate random key" }, 60 { "help", 'h', arg_flag, NULL } 61 }; 62 int num_args = sizeof(args) / sizeof(args[0]); 63 int optind = 0; 64 int i = 0; 65 args[i++].value = &principal_string; 66 args[i++].value = &kvno; 67 args[i++].value = &enctype_string; 68 args[i++].value = &password_string; 69 args[i++].value = &salt_flag; 70 args[i++].value = &random_flag; 71 args[i++].value = &help_flag; 72 73 if(getarg(args, num_args, argc, argv, &optind)) { 74 arg_printusage(args, num_args, "ktutil add", ""); 75 return 1; 76 } 77 if(help_flag) { 78 arg_printusage(args, num_args, "ktutil add", ""); 79 return 1; 80 } 81 if((keytab = ktutil_open_keytab()) == NULL) 82 return 1; 83 84 memset(&entry, 0, sizeof(entry)); 85 if(principal_string == NULL) { 86 printf("Principal: "); 87 if (fgets(buf, sizeof(buf), stdin) == NULL) 88 return 1; 89 buf[strcspn(buf, "\r\n")] = '\0'; 90 principal_string = buf; 91 } 92 ret = krb5_parse_name(context, principal_string, &entry.principal); 93 if(ret) { 94 krb5_warn(context, ret, "%s", principal_string); 95 goto out; 96 } 97 if(enctype_string == NULL) { 98 printf("Encryption type: "); 99 if (fgets(buf, sizeof(buf), stdin) == NULL) 100 goto out; 101 buf[strcspn(buf, "\r\n")] = '\0'; 102 enctype_string = buf; 103 } 104 ret = krb5_string_to_enctype(context, enctype_string, &enctype); 105 if(ret) { 106 int t; 107 if(sscanf(enctype_string, "%d", &t) == 1) 108 enctype = t; 109 else { 110 krb5_warn(context, ret, "%s", enctype_string); 111 goto out; 112 } 113 } 114 if(kvno == -1) { 115 printf("Key version: "); 116 if (fgets(buf, sizeof(buf), stdin) == NULL) 117 goto out; 118 buf[strcspn(buf, "\r\n")] = '\0'; 119 kvno = atoi(buf); 120 } 121 if(password_string == NULL && random_flag == 0) { 122 if(des_read_pw_string(buf, sizeof(buf), "Password: ", 1)) 123 goto out; 124 password_string = buf; 125 } 126 if(password_string) { 127 if (!salt_flag) { 128 krb5_salt salt; 129 krb5_data pw; 130 131 salt.salttype = KRB5_PW_SALT; 132 salt.saltvalue.data = NULL; 133 salt.saltvalue.length = 0; 134 pw.data = (void*)password_string; 135 pw.length = strlen(password_string); 136 krb5_string_to_key_data_salt(context, enctype, pw, salt, 137 &entry.keyblock); 138 } else { 139 krb5_string_to_key(context, enctype, password_string, 140 entry.principal, &entry.keyblock); 141 } 142 memset (password_string, 0, strlen(password_string)); 143 } else { 144 krb5_generate_random_keyblock(context, enctype, &entry.keyblock); 145 } 146 entry.vno = kvno; 147 entry.timestamp = time (NULL); 148 ret = krb5_kt_add_entry(context, keytab, &entry); 149 if(ret) 150 krb5_warn(context, ret, "add"); 151 out: 152 krb5_kt_free_entry(context, &entry); 153 krb5_kt_close(context, keytab); 154 return 0; 155 } 156