1 /* 2 * Copyright (c) 1997-2005 Kungliga Tekniska Högskolan 3 * (Royal Institute of Technology, Stockholm, Sweden). 4 * All rights reserved. 5 * 6 * Redistribution and use in source and binary forms, with or without 7 * modification, are permitted provided that the following conditions 8 * are met: 9 * 10 * 1. Redistributions of source code must retain the above copyright 11 * notice, this list of conditions and the following disclaimer. 12 * 13 * 2. Redistributions in binary form must reproduce the above copyright 14 * notice, this list of conditions and the following disclaimer in the 15 * documentation and/or other materials provided with the distribution. 16 * 17 * 3. Neither the name of the Institute nor the names of its contributors 18 * may be used to endorse or promote products derived from this software 19 * without specific prior written permission. 20 * 21 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND 22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE 25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 */ 33 34 #include "ktutil_locl.h" 35 36 RCSID("$Id$"); 37 38 static krb5_error_code 39 change_entry (krb5_keytab keytab, 40 krb5_principal principal, krb5_kvno kvno, 41 const char *realm, const char *admin_server, int server_port) 42 { 43 krb5_error_code ret; 44 kadm5_config_params conf; 45 void *kadm_handle; 46 char *client_name; 47 krb5_keyblock *keys; 48 int num_keys; 49 int i; 50 51 ret = krb5_unparse_name (context, principal, &client_name); 52 if (ret) { 53 krb5_warn (context, ret, "krb5_unparse_name"); 54 return ret; 55 } 56 57 memset (&conf, 0, sizeof(conf)); 58 59 if(realm == NULL) 60 realm = krb5_principal_get_realm(context, principal); 61 conf.realm = strdup(realm); 62 if (conf.realm == NULL) { 63 free (client_name); 64 krb5_set_error_message(context, ENOMEM, "malloc failed"); 65 return ENOMEM; 66 } 67 conf.mask |= KADM5_CONFIG_REALM; 68 69 if (admin_server) { 70 conf.admin_server = strdup(admin_server); 71 if (conf.admin_server == NULL) { 72 free(client_name); 73 free(conf.realm); 74 krb5_set_error_message(context, ENOMEM, "malloc failed"); 75 return ENOMEM; 76 } 77 conf.mask |= KADM5_CONFIG_ADMIN_SERVER; 78 } 79 80 if (server_port) { 81 conf.kadmind_port = htons(server_port); 82 conf.mask |= KADM5_CONFIG_KADMIND_PORT; 83 } 84 85 ret = kadm5_init_with_skey_ctx (context, 86 client_name, 87 keytab_string, 88 KADM5_ADMIN_SERVICE, 89 &conf, 0, 0, 90 &kadm_handle); 91 free(conf.admin_server); 92 free(conf.realm); 93 if (ret) { 94 krb5_warn (context, ret, 95 "kadm5_c_init_with_skey_ctx: %s:", client_name); 96 free (client_name); 97 return ret; 98 } 99 ret = kadm5_randkey_principal (kadm_handle, principal, &keys, &num_keys); 100 kadm5_destroy (kadm_handle); 101 if (ret) { 102 krb5_warn(context, ret, "kadm5_randkey_principal: %s:", client_name); 103 free (client_name); 104 return ret; 105 } 106 free (client_name); 107 for (i = 0; i < num_keys; ++i) { 108 krb5_keytab_entry new_entry; 109 110 new_entry.principal = principal; 111 new_entry.timestamp = time (NULL); 112 new_entry.vno = kvno + 1; 113 new_entry.keyblock = keys[i]; 114 115 ret = krb5_kt_add_entry (context, keytab, &new_entry); 116 if (ret) 117 krb5_warn (context, ret, "krb5_kt_add_entry"); 118 krb5_free_keyblock_contents (context, &keys[i]); 119 } 120 return ret; 121 } 122 123 /* 124 * loop over all the entries in the keytab (or those given) and change 125 * their keys, writing the new keys 126 */ 127 128 struct change_set { 129 krb5_principal principal; 130 krb5_kvno kvno; 131 }; 132 133 int 134 kt_change (struct change_options *opt, int argc, char **argv) 135 { 136 krb5_error_code ret; 137 krb5_keytab keytab; 138 krb5_kt_cursor cursor; 139 krb5_keytab_entry entry; 140 int i, j, max; 141 struct change_set *changeset; 142 int errors = 0; 143 144 if((keytab = ktutil_open_keytab()) == NULL) 145 return 1; 146 147 j = 0; 148 max = 0; 149 changeset = NULL; 150 151 ret = krb5_kt_start_seq_get(context, keytab, &cursor); 152 if(ret){ 153 krb5_warn(context, ret, "%s", keytab_string); 154 goto out; 155 } 156 157 while((ret = krb5_kt_next_entry(context, keytab, &entry, &cursor)) == 0) { 158 int add = 0; 159 160 for (i = 0; i < j; ++i) { 161 if (krb5_principal_compare (context, changeset[i].principal, 162 entry.principal)) { 163 if (changeset[i].kvno < entry.vno) 164 changeset[i].kvno = entry.vno; 165 break; 166 } 167 } 168 if (i < j) { 169 krb5_kt_free_entry (context, &entry); 170 continue; 171 } 172 173 if (argc == 0) { 174 add = 1; 175 } else { 176 for (i = 0; i < argc; ++i) { 177 krb5_principal princ; 178 179 ret = krb5_parse_name (context, argv[i], &princ); 180 if (ret) { 181 krb5_warn (context, ret, "%s", argv[i]); 182 continue; 183 } 184 if (krb5_principal_compare (context, princ, entry.principal)) 185 add = 1; 186 187 krb5_free_principal (context, princ); 188 } 189 } 190 191 if (add) { 192 if (j >= max) { 193 void *tmp; 194 195 max = max(max * 2, 1); 196 tmp = realloc (changeset, max * sizeof(*changeset)); 197 if (tmp == NULL) { 198 krb5_kt_free_entry (context, &entry); 199 krb5_warnx (context, "realloc: out of memory"); 200 ret = ENOMEM; 201 break; 202 } 203 changeset = tmp; 204 } 205 ret = krb5_copy_principal (context, entry.principal, 206 &changeset[j].principal); 207 if (ret) { 208 krb5_warn (context, ret, "krb5_copy_principal"); 209 krb5_kt_free_entry (context, &entry); 210 break; 211 } 212 changeset[j].kvno = entry.vno; 213 ++j; 214 } 215 krb5_kt_free_entry (context, &entry); 216 } 217 krb5_kt_end_seq_get(context, keytab, &cursor); 218 219 if (ret == KRB5_KT_END) { 220 ret = 0; 221 for (i = 0; i < j; i++) { 222 if (verbose_flag) { 223 char *client_name; 224 225 ret = krb5_unparse_name (context, changeset[i].principal, 226 &client_name); 227 if (ret) { 228 krb5_warn (context, ret, "krb5_unparse_name"); 229 } else { 230 printf("Changing %s kvno %d\n", 231 client_name, changeset[i].kvno); 232 free(client_name); 233 } 234 } 235 ret = change_entry (keytab, 236 changeset[i].principal, changeset[i].kvno, 237 opt->realm_string, 238 opt->admin_server_string, 239 opt->server_port_integer); 240 if (ret != 0) 241 errors = 1; 242 } 243 } else 244 errors = 1; 245 for (i = 0; i < j; i++) 246 krb5_free_principal (context, changeset[i].principal); 247 free (changeset); 248 249 out: 250 krb5_kt_close(context, keytab); 251 return errors; 252 } 253