1b528cefcSMark Murray /* 25e9cd1aeSAssar Westerlund * Copyright (c) 1997-2001 Kungliga Tekniska H�gskolan 3b528cefcSMark Murray * (Royal Institute of Technology, Stockholm, Sweden). 4b528cefcSMark Murray * All rights reserved. 5b528cefcSMark Murray * 6b528cefcSMark Murray * Redistribution and use in source and binary forms, with or without 7b528cefcSMark Murray * modification, are permitted provided that the following conditions 8b528cefcSMark Murray * are met: 9b528cefcSMark Murray * 10b528cefcSMark Murray * 1. Redistributions of source code must retain the above copyright 11b528cefcSMark Murray * notice, this list of conditions and the following disclaimer. 12b528cefcSMark Murray * 13b528cefcSMark Murray * 2. Redistributions in binary form must reproduce the above copyright 14b528cefcSMark Murray * notice, this list of conditions and the following disclaimer in the 15b528cefcSMark Murray * documentation and/or other materials provided with the distribution. 16b528cefcSMark Murray * 17b528cefcSMark Murray * 3. Neither the name of the Institute nor the names of its contributors 18b528cefcSMark Murray * may be used to endorse or promote products derived from this software 19b528cefcSMark Murray * without specific prior written permission. 20b528cefcSMark Murray * 21b528cefcSMark Murray * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND 22b528cefcSMark Murray * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23b528cefcSMark Murray * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24b528cefcSMark Murray * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE 25b528cefcSMark Murray * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26b528cefcSMark Murray * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27b528cefcSMark Murray * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28b528cefcSMark Murray * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29b528cefcSMark Murray * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30b528cefcSMark Murray * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31b528cefcSMark Murray * SUCH DAMAGE. 32b528cefcSMark Murray */ 33b528cefcSMark Murray 34b528cefcSMark Murray #include "kuser_locl.h" 355e9cd1aeSAssar Westerlund RCSID("$Id: kinit.c,v 1.69 2001/01/05 16:32:55 joda Exp $"); 36b528cefcSMark Murray 375e9cd1aeSAssar Westerlund #ifdef KRB4 385e9cd1aeSAssar Westerlund /* for when the KDC tells us it's a v4 one, we try to talk that */ 395e9cd1aeSAssar Westerlund 405e9cd1aeSAssar Westerlund static int 415e9cd1aeSAssar Westerlund key_to_key(const char *user, 425e9cd1aeSAssar Westerlund char *instance, 435e9cd1aeSAssar Westerlund const char *realm, 445e9cd1aeSAssar Westerlund const void *arg, 455e9cd1aeSAssar Westerlund des_cblock *key) 465e9cd1aeSAssar Westerlund { 475e9cd1aeSAssar Westerlund memcpy(key, arg, sizeof(des_cblock)); 485e9cd1aeSAssar Westerlund return 0; 495e9cd1aeSAssar Westerlund } 505e9cd1aeSAssar Westerlund 515e9cd1aeSAssar Westerlund static int 525e9cd1aeSAssar Westerlund do_v4_fallback (krb5_context context, 535e9cd1aeSAssar Westerlund const krb5_principal principal, 545e9cd1aeSAssar Westerlund int lifetime, 555e9cd1aeSAssar Westerlund int use_srvtab, const char *srvtab_str, 565e9cd1aeSAssar Westerlund char *passwd, size_t passwd_size) 575e9cd1aeSAssar Westerlund { 585e9cd1aeSAssar Westerlund int ret; 595e9cd1aeSAssar Westerlund krb_principal princ; 605e9cd1aeSAssar Westerlund des_cblock key; 615e9cd1aeSAssar Westerlund krb5_error_code kret; 625e9cd1aeSAssar Westerlund 635e9cd1aeSAssar Westerlund if (lifetime == 0) 645e9cd1aeSAssar Westerlund lifetime = DEFAULT_TKT_LIFE; 655e9cd1aeSAssar Westerlund else 665e9cd1aeSAssar Westerlund lifetime = krb_time_to_life (0, lifetime); 675e9cd1aeSAssar Westerlund 685e9cd1aeSAssar Westerlund kret = krb5_524_conv_principal (context, principal, 695e9cd1aeSAssar Westerlund princ.name, 705e9cd1aeSAssar Westerlund princ.instance, 715e9cd1aeSAssar Westerlund princ.realm); 725e9cd1aeSAssar Westerlund if (kret) { 735e9cd1aeSAssar Westerlund krb5_warn (context, kret, "krb5_524_conv_principal"); 745e9cd1aeSAssar Westerlund return 1; 755e9cd1aeSAssar Westerlund } 765e9cd1aeSAssar Westerlund 775e9cd1aeSAssar Westerlund if (use_srvtab || srvtab_str) { 785e9cd1aeSAssar Westerlund if (srvtab_str == NULL) 795e9cd1aeSAssar Westerlund srvtab_str = KEYFILE; 805e9cd1aeSAssar Westerlund 815e9cd1aeSAssar Westerlund ret = read_service_key (princ.name, princ.instance, princ.realm, 825e9cd1aeSAssar Westerlund 0, srvtab_str, (char *)&key); 835e9cd1aeSAssar Westerlund if (ret) { 845e9cd1aeSAssar Westerlund warnx ("read_service_key %s: %s", srvtab_str, 855e9cd1aeSAssar Westerlund krb_get_err_text (ret)); 865e9cd1aeSAssar Westerlund return 1; 875e9cd1aeSAssar Westerlund } 885e9cd1aeSAssar Westerlund ret = krb_get_in_tkt (princ.name, princ.instance, princ.realm, 895e9cd1aeSAssar Westerlund KRB_TICKET_GRANTING_TICKET, princ.realm, 905e9cd1aeSAssar Westerlund lifetime, key_to_key, NULL, key); 915e9cd1aeSAssar Westerlund } else { 925e9cd1aeSAssar Westerlund ret = krb_get_pw_in_tkt2(princ.name, princ.instance, princ.realm, 935e9cd1aeSAssar Westerlund KRB_TICKET_GRANTING_TICKET, princ.realm, 945e9cd1aeSAssar Westerlund lifetime, passwd, &key); 955e9cd1aeSAssar Westerlund } 965e9cd1aeSAssar Westerlund memset (passwd, 0, passwd_size); 975e9cd1aeSAssar Westerlund memset (key, 0, sizeof(key)); 985e9cd1aeSAssar Westerlund if (ret) { 995e9cd1aeSAssar Westerlund warnx ("%s", krb_get_err_text(ret)); 1005e9cd1aeSAssar Westerlund return 1; 1015e9cd1aeSAssar Westerlund } 1025e9cd1aeSAssar Westerlund if (k_hasafs()) { 1035e9cd1aeSAssar Westerlund if ((ret = krb_afslog(NULL, NULL)) != 0 && ret != KDC_PR_UNKNOWN) { 1045e9cd1aeSAssar Westerlund if(ret > 0) 1055e9cd1aeSAssar Westerlund warnx ("%s", krb_get_err_text(ret)); 1065e9cd1aeSAssar Westerlund else 1075e9cd1aeSAssar Westerlund warnx ("failed to store AFS token"); 1085e9cd1aeSAssar Westerlund } 1095e9cd1aeSAssar Westerlund } 1105e9cd1aeSAssar Westerlund return 0; 1115e9cd1aeSAssar Westerlund } 1125e9cd1aeSAssar Westerlund 1135e9cd1aeSAssar Westerlund 1145e9cd1aeSAssar Westerlund /* 1155e9cd1aeSAssar Westerlund * the special version of get_default_principal that takes v4 into account 1165e9cd1aeSAssar Westerlund */ 1175e9cd1aeSAssar Westerlund 1185e9cd1aeSAssar Westerlund static krb5_error_code 1195e9cd1aeSAssar Westerlund kinit_get_default_principal (krb5_context context, 1205e9cd1aeSAssar Westerlund krb5_principal *princ) 1215e9cd1aeSAssar Westerlund { 1225e9cd1aeSAssar Westerlund krb5_error_code ret; 1235e9cd1aeSAssar Westerlund krb5_ccache id; 1245e9cd1aeSAssar Westerlund krb_principal v4_princ; 1255e9cd1aeSAssar Westerlund int kret; 1265e9cd1aeSAssar Westerlund 1275e9cd1aeSAssar Westerlund ret = krb5_cc_default (context, &id); 1285e9cd1aeSAssar Westerlund if (ret == 0) { 1295e9cd1aeSAssar Westerlund ret = krb5_cc_get_principal (context, id, princ); 1305e9cd1aeSAssar Westerlund krb5_cc_close (context, id); 1315e9cd1aeSAssar Westerlund if (ret == 0) 1325e9cd1aeSAssar Westerlund return 0; 1335e9cd1aeSAssar Westerlund } 1345e9cd1aeSAssar Westerlund 1355e9cd1aeSAssar Westerlund kret = krb_get_tf_fullname (tkt_string(), 1365e9cd1aeSAssar Westerlund v4_princ.name, 1375e9cd1aeSAssar Westerlund v4_princ.instance, 1385e9cd1aeSAssar Westerlund v4_princ.realm); 1395e9cd1aeSAssar Westerlund if (kret == KSUCCESS) { 1405e9cd1aeSAssar Westerlund ret = krb5_425_conv_principal (context, 1415e9cd1aeSAssar Westerlund v4_princ.name, 1425e9cd1aeSAssar Westerlund v4_princ.instance, 1435e9cd1aeSAssar Westerlund v4_princ.realm, 1445e9cd1aeSAssar Westerlund princ); 1455e9cd1aeSAssar Westerlund if (ret == 0) 1465e9cd1aeSAssar Westerlund return 0; 1475e9cd1aeSAssar Westerlund } 1485e9cd1aeSAssar Westerlund return krb5_get_default_principal (context, princ); 1495e9cd1aeSAssar Westerlund } 1505e9cd1aeSAssar Westerlund 1515e9cd1aeSAssar Westerlund #else /* !KRB4 */ 1525e9cd1aeSAssar Westerlund 1535e9cd1aeSAssar Westerlund static krb5_error_code 1545e9cd1aeSAssar Westerlund kinit_get_default_principal (krb5_context context, 1555e9cd1aeSAssar Westerlund krb5_principal *princ) 1565e9cd1aeSAssar Westerlund { 1575e9cd1aeSAssar Westerlund return krb5_get_default_principal (context, princ); 1585e9cd1aeSAssar Westerlund } 1595e9cd1aeSAssar Westerlund 1605e9cd1aeSAssar Westerlund #endif /* !KRB4 */ 1615e9cd1aeSAssar Westerlund 1625e9cd1aeSAssar Westerlund int forwardable_flag = -1; 1635e9cd1aeSAssar Westerlund int proxiable_flag = -1; 1645e9cd1aeSAssar Westerlund int renewable_flag = -1; 165b528cefcSMark Murray int renew_flag = 0; 166b528cefcSMark Murray int validate_flag = 0; 167b528cefcSMark Murray int version_flag = 0; 168b528cefcSMark Murray int help_flag = 0; 16913e3f4d6SMark Murray int addrs_flag = 1; 1705e9cd1aeSAssar Westerlund int anonymous_flag = 0; 171b528cefcSMark Murray char *lifetime = NULL; 172b528cefcSMark Murray char *renew_life = NULL; 173b528cefcSMark Murray char *server = NULL; 174b528cefcSMark Murray char *cred_cache = NULL; 175b528cefcSMark Murray char *start_str = NULL; 176b528cefcSMark Murray struct getarg_strings etype_str; 177b528cefcSMark Murray int use_keytab = 0; 178b528cefcSMark Murray char *keytab_str = NULL; 179b528cefcSMark Murray #ifdef KRB4 180b528cefcSMark Murray extern int do_afslog; 181b528cefcSMark Murray extern int get_v4_tgt; 182b528cefcSMark Murray #endif 183b528cefcSMark Murray int fcache_version; 184b528cefcSMark Murray 1855e9cd1aeSAssar Westerlund static struct getargs args[] = { 186b528cefcSMark Murray #ifdef KRB4 187b528cefcSMark Murray { "524init", '4', arg_flag, &get_v4_tgt, 188b528cefcSMark Murray "obtain version 4 TGT" }, 189b528cefcSMark Murray 190b528cefcSMark Murray { "afslog", 0 , arg_flag, &do_afslog, 191b528cefcSMark Murray "obtain afs tokens" }, 192b528cefcSMark Murray #endif 193b528cefcSMark Murray { "cache", 'c', arg_string, &cred_cache, 194b528cefcSMark Murray "credentials cache", "cachename" }, 195b528cefcSMark Murray 1965e9cd1aeSAssar Westerlund { "forwardable", 'f', arg_flag, &forwardable_flag, 197b528cefcSMark Murray "get forwardable tickets"}, 198b528cefcSMark Murray 199b528cefcSMark Murray { "keytab", 't', arg_string, &keytab_str, 200b528cefcSMark Murray "keytab to use", "keytabname" }, 201b528cefcSMark Murray 202b528cefcSMark Murray { "lifetime", 'l', arg_string, &lifetime, 2035e9cd1aeSAssar Westerlund "lifetime of tickets", "time"}, 204b528cefcSMark Murray 2055e9cd1aeSAssar Westerlund { "proxiable", 'p', arg_flag, &proxiable_flag, 206b528cefcSMark Murray "get proxiable tickets" }, 207b528cefcSMark Murray 208b528cefcSMark Murray { "renew", 'R', arg_flag, &renew_flag, 209b528cefcSMark Murray "renew TGT" }, 210b528cefcSMark Murray 2115e9cd1aeSAssar Westerlund { "renewable", 0, arg_flag, &renewable_flag, 212b528cefcSMark Murray "get renewable tickets" }, 213b528cefcSMark Murray 214b528cefcSMark Murray { "renewable-life", 'r', arg_string, &renew_life, 2155e9cd1aeSAssar Westerlund "renewable lifetime of tickets", "time" }, 216b528cefcSMark Murray 217b528cefcSMark Murray { "server", 'S', arg_string, &server, 218b528cefcSMark Murray "server to get ticket for", "principal" }, 219b528cefcSMark Murray 220b528cefcSMark Murray { "start-time", 's', arg_string, &start_str, 2215e9cd1aeSAssar Westerlund "when ticket gets valid", "time" }, 222b528cefcSMark Murray 223b528cefcSMark Murray { "use-keytab", 'k', arg_flag, &use_keytab, 224b528cefcSMark Murray "get key from keytab" }, 225b528cefcSMark Murray 226b528cefcSMark Murray { "validate", 'v', arg_flag, &validate_flag, 227b528cefcSMark Murray "validate TGT" }, 228b528cefcSMark Murray 229b528cefcSMark Murray { "enctypes", 'e', arg_strings, &etype_str, 2305e9cd1aeSAssar Westerlund "encryption types to use", "enctypes" }, 231b528cefcSMark Murray 232b528cefcSMark Murray { "fcache-version", 0, arg_integer, &fcache_version, 233b528cefcSMark Murray "file cache version to create" }, 234b528cefcSMark Murray 23513e3f4d6SMark Murray { "addresses", 0, arg_negative_flag, &addrs_flag, 236b528cefcSMark Murray "request a ticket with no addresses" }, 237b528cefcSMark Murray 2385e9cd1aeSAssar Westerlund { "anonymous", 0, arg_flag, &anonymous_flag, 2395e9cd1aeSAssar Westerlund "request an anonymous ticket" }, 2405e9cd1aeSAssar Westerlund 241b528cefcSMark Murray { "version", 0, arg_flag, &version_flag }, 242b528cefcSMark Murray { "help", 0, arg_flag, &help_flag } 243b528cefcSMark Murray }; 244b528cefcSMark Murray 245b528cefcSMark Murray static void 246b528cefcSMark Murray usage (int ret) 247b528cefcSMark Murray { 248b528cefcSMark Murray arg_printusage (args, 249b528cefcSMark Murray sizeof(args)/sizeof(*args), 250b528cefcSMark Murray NULL, 251b528cefcSMark Murray "[principal]"); 252b528cefcSMark Murray exit (ret); 253b528cefcSMark Murray } 254b528cefcSMark Murray 255b528cefcSMark Murray static int 256b528cefcSMark Murray renew_validate(krb5_context context, 257b528cefcSMark Murray int renew, 258b528cefcSMark Murray int validate, 259b528cefcSMark Murray krb5_ccache cache, 260b528cefcSMark Murray const char *server, 261b528cefcSMark Murray krb5_deltat life) 262b528cefcSMark Murray { 263b528cefcSMark Murray krb5_error_code ret; 264b528cefcSMark Murray krb5_creds in, *out; 265b528cefcSMark Murray krb5_kdc_flags flags; 266b528cefcSMark Murray 267b528cefcSMark Murray memset(&in, 0, sizeof(in)); 268b528cefcSMark Murray 269b528cefcSMark Murray ret = krb5_cc_get_principal(context, cache, &in.client); 270b528cefcSMark Murray if(ret) { 271b528cefcSMark Murray krb5_warn(context, ret, "krb5_cc_get_principal"); 272b528cefcSMark Murray return ret; 273b528cefcSMark Murray } 274b528cefcSMark Murray if(server) { 275b528cefcSMark Murray ret = krb5_parse_name(context, server, &in.server); 276b528cefcSMark Murray if(ret) { 277b528cefcSMark Murray krb5_warn(context, ret, "krb5_parse_name"); 278b528cefcSMark Murray goto out; 279b528cefcSMark Murray } 280b528cefcSMark Murray } else { 281b528cefcSMark Murray krb5_realm *client_realm = krb5_princ_realm (context, in.client); 282b528cefcSMark Murray 283b528cefcSMark Murray ret = krb5_make_principal(context, &in.server, *client_realm, 284b528cefcSMark Murray KRB5_TGS_NAME, *client_realm, NULL); 285b528cefcSMark Murray if(ret) { 286b528cefcSMark Murray krb5_warn(context, ret, "krb5_make_principal"); 287b528cefcSMark Murray goto out; 288b528cefcSMark Murray } 289b528cefcSMark Murray } 290b528cefcSMark Murray flags.i = 0; 291b528cefcSMark Murray flags.b.renewable = flags.b.renew = renew; 292b528cefcSMark Murray flags.b.validate = validate; 2935e9cd1aeSAssar Westerlund flags.b.forwardable = forwardable_flag; 2945e9cd1aeSAssar Westerlund flags.b.proxiable = proxiable_flag; 2955e9cd1aeSAssar Westerlund flags.b.request_anonymous = anonymous_flag; 296b528cefcSMark Murray if(life) 297b528cefcSMark Murray in.times.endtime = time(NULL) + life; 298b528cefcSMark Murray 299b528cefcSMark Murray ret = krb5_get_kdc_cred(context, 300b528cefcSMark Murray cache, 301b528cefcSMark Murray flags, 302b528cefcSMark Murray NULL, 303b528cefcSMark Murray NULL, 304b528cefcSMark Murray &in, 305b528cefcSMark Murray &out); 306b528cefcSMark Murray if(ret) { 307b528cefcSMark Murray krb5_warn(context, ret, "krb5_get_kdc_cred"); 308b528cefcSMark Murray goto out; 309b528cefcSMark Murray } 310b528cefcSMark Murray ret = krb5_cc_initialize(context, cache, in.client); 311b528cefcSMark Murray if(ret) { 312b528cefcSMark Murray krb5_free_creds (context, out); 313b528cefcSMark Murray krb5_warn(context, ret, "krb5_cc_initialize"); 314b528cefcSMark Murray goto out; 315b528cefcSMark Murray } 316b528cefcSMark Murray ret = krb5_cc_store_cred(context, cache, out); 317b528cefcSMark Murray krb5_free_creds (context, out); 318b528cefcSMark Murray if(ret) { 319b528cefcSMark Murray krb5_warn(context, ret, "krb5_cc_store_cred"); 320b528cefcSMark Murray goto out; 321b528cefcSMark Murray } 322b528cefcSMark Murray out: 323b528cefcSMark Murray krb5_free_creds_contents(context, &in); 324b528cefcSMark Murray return ret; 325b528cefcSMark Murray } 326b528cefcSMark Murray 327b528cefcSMark Murray int 328b528cefcSMark Murray main (int argc, char **argv) 329b528cefcSMark Murray { 330b528cefcSMark Murray krb5_error_code ret; 331b528cefcSMark Murray krb5_context context; 332b528cefcSMark Murray krb5_ccache ccache; 333b528cefcSMark Murray krb5_principal principal; 334b528cefcSMark Murray krb5_creds cred; 335b528cefcSMark Murray int optind = 0; 336b528cefcSMark Murray krb5_get_init_creds_opt opt; 337b528cefcSMark Murray krb5_deltat start_time = 0; 338b528cefcSMark Murray krb5_deltat ticket_life = 0; 339b528cefcSMark Murray krb5_addresses no_addrs; 3405e9cd1aeSAssar Westerlund char passwd[256]; 341b528cefcSMark Murray 342b528cefcSMark Murray set_progname (argv[0]); 343b528cefcSMark Murray memset(&cred, 0, sizeof(cred)); 344b528cefcSMark Murray 345b528cefcSMark Murray ret = krb5_init_context (&context); 346b528cefcSMark Murray if (ret) 3475e9cd1aeSAssar Westerlund errx(1, "krb5_init_context failed: %d", ret); 348b528cefcSMark Murray 3495e9cd1aeSAssar Westerlund /* XXX no way to figure out if set without explict test */ 3505e9cd1aeSAssar Westerlund if(krb5_config_get_string(context, NULL, "libdefaults", 3515e9cd1aeSAssar Westerlund "forwardable", NULL)) 3525e9cd1aeSAssar Westerlund forwardable_flag = krb5_config_get_bool (context, NULL, 353b528cefcSMark Murray "libdefaults", 354b528cefcSMark Murray "forwardable", 355b528cefcSMark Murray NULL); 356b528cefcSMark Murray 357b528cefcSMark Murray #ifdef KRB4 358b528cefcSMark Murray get_v4_tgt = krb5_config_get_bool_default (context, NULL, 359b528cefcSMark Murray get_v4_tgt, 360b528cefcSMark Murray "libdefaults", 361b528cefcSMark Murray "krb4_get_tickets", 362b528cefcSMark Murray NULL); 363b528cefcSMark Murray #endif 364b528cefcSMark Murray 365b528cefcSMark Murray if(getarg(args, sizeof(args) / sizeof(args[0]), argc, argv, &optind)) 366b528cefcSMark Murray usage(1); 367b528cefcSMark Murray 368b528cefcSMark Murray if (help_flag) 369b528cefcSMark Murray usage (0); 370b528cefcSMark Murray 371b528cefcSMark Murray if(version_flag) { 372b528cefcSMark Murray print_version(NULL); 373b528cefcSMark Murray exit(0); 374b528cefcSMark Murray } 375b528cefcSMark Murray 3765e9cd1aeSAssar Westerlund argc -= optind; 3775e9cd1aeSAssar Westerlund argv += optind; 3785e9cd1aeSAssar Westerlund 3795e9cd1aeSAssar Westerlund if (argc > 1) 3805e9cd1aeSAssar Westerlund usage (1); 3815e9cd1aeSAssar Westerlund 3825e9cd1aeSAssar Westerlund if (argv[0]) { 3835e9cd1aeSAssar Westerlund ret = krb5_parse_name (context, argv[0], &principal); 3845e9cd1aeSAssar Westerlund if (ret) 3855e9cd1aeSAssar Westerlund krb5_err (context, 1, ret, "krb5_parse_name"); 3865e9cd1aeSAssar Westerlund } else { 3875e9cd1aeSAssar Westerlund ret = kinit_get_default_principal (context, &principal); 3885e9cd1aeSAssar Westerlund if (ret) 3895e9cd1aeSAssar Westerlund krb5_err (context, 1, ret, "krb5_get_default_principal"); 3905e9cd1aeSAssar Westerlund } 3915e9cd1aeSAssar Westerlund 392b528cefcSMark Murray if(fcache_version) 393b528cefcSMark Murray krb5_set_fcache_version(context, fcache_version); 394b528cefcSMark Murray 395b528cefcSMark Murray if(cred_cache) 396b528cefcSMark Murray ret = krb5_cc_resolve(context, cred_cache, &ccache); 397b528cefcSMark Murray else 398b528cefcSMark Murray ret = krb5_cc_default (context, &ccache); 399b528cefcSMark Murray if (ret) 400b528cefcSMark Murray krb5_err (context, 1, ret, "resolving credentials cache"); 401b528cefcSMark Murray 402b528cefcSMark Murray if (lifetime) { 403b528cefcSMark Murray int tmp = parse_time (lifetime, "s"); 404b528cefcSMark Murray if (tmp < 0) 405b528cefcSMark Murray errx (1, "unparsable time: %s", lifetime); 406b528cefcSMark Murray 407b528cefcSMark Murray ticket_life = tmp; 408b528cefcSMark Murray } 409b528cefcSMark Murray if(renew_flag || validate_flag) { 410b528cefcSMark Murray ret = renew_validate(context, renew_flag, validate_flag, 411b528cefcSMark Murray ccache, server, ticket_life); 412b528cefcSMark Murray exit(ret != 0); 413b528cefcSMark Murray } 414b528cefcSMark Murray 415b528cefcSMark Murray krb5_get_init_creds_opt_init (&opt); 416b528cefcSMark Murray 4175e9cd1aeSAssar Westerlund krb5_get_init_creds_opt_set_default_flags(context, "kinit", 4185e9cd1aeSAssar Westerlund /* XXX */principal->realm, &opt); 4195e9cd1aeSAssar Westerlund 4205e9cd1aeSAssar Westerlund if(forwardable_flag != -1) 4215e9cd1aeSAssar Westerlund krb5_get_init_creds_opt_set_forwardable (&opt, forwardable_flag); 4225e9cd1aeSAssar Westerlund if(proxiable_flag != -1) 4235e9cd1aeSAssar Westerlund krb5_get_init_creds_opt_set_proxiable (&opt, proxiable_flag); 4245e9cd1aeSAssar Westerlund if(anonymous_flag != -1) 4255e9cd1aeSAssar Westerlund krb5_get_init_creds_opt_set_anonymous (&opt, anonymous_flag); 426b528cefcSMark Murray 42713e3f4d6SMark Murray if (!addrs_flag) { 428b528cefcSMark Murray no_addrs.len = 0; 429b528cefcSMark Murray no_addrs.val = NULL; 430b528cefcSMark Murray 431b528cefcSMark Murray krb5_get_init_creds_opt_set_address_list (&opt, &no_addrs); 432b528cefcSMark Murray } 433b528cefcSMark Murray 434b528cefcSMark Murray if(renew_life) { 435b528cefcSMark Murray int tmp = parse_time (renew_life, "s"); 436b528cefcSMark Murray if (tmp < 0) 437b528cefcSMark Murray errx (1, "unparsable time: %s", renew_life); 438b528cefcSMark Murray 439b528cefcSMark Murray krb5_get_init_creds_opt_set_renew_life (&opt, tmp); 4405e9cd1aeSAssar Westerlund } else if (renewable_flag) 441b528cefcSMark Murray krb5_get_init_creds_opt_set_renew_life (&opt, 1 << 30); 442b528cefcSMark Murray 443b528cefcSMark Murray if(ticket_life != 0) 444b528cefcSMark Murray krb5_get_init_creds_opt_set_tkt_life (&opt, ticket_life); 445b528cefcSMark Murray 446b528cefcSMark Murray if(start_str) { 447b528cefcSMark Murray int tmp = parse_time (start_str, "s"); 448b528cefcSMark Murray if (tmp < 0) 449b528cefcSMark Murray errx (1, "unparsable time: %s", start_str); 450b528cefcSMark Murray 451b528cefcSMark Murray start_time = tmp; 452b528cefcSMark Murray } 453b528cefcSMark Murray 454b528cefcSMark Murray if(etype_str.num_strings) { 455b528cefcSMark Murray krb5_enctype *enctype = NULL; 456b528cefcSMark Murray int i; 457b528cefcSMark Murray enctype = malloc(etype_str.num_strings * sizeof(*enctype)); 458b528cefcSMark Murray if(enctype == NULL) 459b528cefcSMark Murray errx(1, "out of memory"); 460b528cefcSMark Murray for(i = 0; i < etype_str.num_strings; i++) { 461b528cefcSMark Murray ret = krb5_string_to_enctype(context, 462b528cefcSMark Murray etype_str.strings[i], 463b528cefcSMark Murray &enctype[i]); 464b528cefcSMark Murray if(ret) 465b528cefcSMark Murray errx(1, "unrecognized enctype: %s", etype_str.strings[i]); 466b528cefcSMark Murray } 467b528cefcSMark Murray krb5_get_init_creds_opt_set_etype_list(&opt, enctype, 468b528cefcSMark Murray etype_str.num_strings); 469b528cefcSMark Murray } 470b528cefcSMark Murray 4715e9cd1aeSAssar Westerlund #ifdef KRB4 4725e9cd1aeSAssar Westerlund get_v4_tgt = krb5_config_get_bool_default (context, 4735e9cd1aeSAssar Westerlund NULL, 4745e9cd1aeSAssar Westerlund get_v4_tgt, 4755e9cd1aeSAssar Westerlund "realms", 4765e9cd1aeSAssar Westerlund krb5_princ_realm(context, 4775e9cd1aeSAssar Westerlund principal), 4785e9cd1aeSAssar Westerlund "krb4_get_tickets", 4795e9cd1aeSAssar Westerlund NULL); 4805e9cd1aeSAssar Westerlund #endif 481b528cefcSMark Murray 482b528cefcSMark Murray if(use_keytab || keytab_str) { 483b528cefcSMark Murray krb5_keytab kt; 484b528cefcSMark Murray if(keytab_str) 485b528cefcSMark Murray ret = krb5_kt_resolve(context, keytab_str, &kt); 486b528cefcSMark Murray else 487b528cefcSMark Murray ret = krb5_kt_default(context, &kt); 488b528cefcSMark Murray if (ret) 489b528cefcSMark Murray krb5_err (context, 1, ret, "resolving keytab"); 490b528cefcSMark Murray ret = krb5_get_init_creds_keytab (context, 491b528cefcSMark Murray &cred, 492b528cefcSMark Murray principal, 493b528cefcSMark Murray kt, 494b528cefcSMark Murray start_time, 495b528cefcSMark Murray server, 496b528cefcSMark Murray &opt); 497b528cefcSMark Murray krb5_kt_close(context, kt); 4985e9cd1aeSAssar Westerlund } else { 4995e9cd1aeSAssar Westerlund char *p, *prompt; 5005e9cd1aeSAssar Westerlund 5015e9cd1aeSAssar Westerlund krb5_unparse_name (context, principal, &p); 5025e9cd1aeSAssar Westerlund asprintf (&prompt, "%s's Password: ", p); 5035e9cd1aeSAssar Westerlund free (p); 5045e9cd1aeSAssar Westerlund 5055e9cd1aeSAssar Westerlund if (des_read_pw_string(passwd, sizeof(passwd)-1, prompt, 0)){ 5065e9cd1aeSAssar Westerlund memset(passwd, 0, sizeof(passwd)); 5075e9cd1aeSAssar Westerlund exit(1); 5085e9cd1aeSAssar Westerlund } 5095e9cd1aeSAssar Westerlund 5105e9cd1aeSAssar Westerlund free (prompt); 5115e9cd1aeSAssar Westerlund 512b528cefcSMark Murray ret = krb5_get_init_creds_password (context, 513b528cefcSMark Murray &cred, 514b528cefcSMark Murray principal, 5155e9cd1aeSAssar Westerlund passwd, 516b528cefcSMark Murray krb5_prompter_posix, 517b528cefcSMark Murray NULL, 518b528cefcSMark Murray start_time, 519b528cefcSMark Murray server, 520b528cefcSMark Murray &opt); 5215e9cd1aeSAssar Westerlund } 5225e9cd1aeSAssar Westerlund #ifdef KRB4 5235e9cd1aeSAssar Westerlund if (ret == KRB5KRB_AP_ERR_V4_REPLY || ret == KRB5_KDC_UNREACH) { 5245e9cd1aeSAssar Westerlund int exit_val; 5255e9cd1aeSAssar Westerlund 5265e9cd1aeSAssar Westerlund exit_val = do_v4_fallback (context, principal, ticket_life, 5275e9cd1aeSAssar Westerlund use_keytab, keytab_str, 5285e9cd1aeSAssar Westerlund passwd, sizeof(passwd)); 5295e9cd1aeSAssar Westerlund memset(passwd, 0, sizeof(passwd)); 5305e9cd1aeSAssar Westerlund if (exit_val == 0 || ret == KRB5KRB_AP_ERR_V4_REPLY) { 5315e9cd1aeSAssar Westerlund krb5_free_context (context); 5325e9cd1aeSAssar Westerlund return exit_val; 5335e9cd1aeSAssar Westerlund } 5345e9cd1aeSAssar Westerlund } 5355e9cd1aeSAssar Westerlund #endif 5365e9cd1aeSAssar Westerlund memset(passwd, 0, sizeof(passwd)); 5375e9cd1aeSAssar Westerlund 538b528cefcSMark Murray switch(ret){ 539b528cefcSMark Murray case 0: 540b528cefcSMark Murray break; 541b528cefcSMark Murray case KRB5_LIBOS_PWDINTR: /* don't print anything if it was just C-c:ed */ 5425e9cd1aeSAssar Westerlund memset(passwd, 0, sizeof(passwd)); 543b528cefcSMark Murray exit(1); 544b528cefcSMark Murray case KRB5KRB_AP_ERR_BAD_INTEGRITY: 545b528cefcSMark Murray case KRB5KRB_AP_ERR_MODIFIED: 5465e9cd1aeSAssar Westerlund memset(passwd, 0, sizeof(passwd)); 547b528cefcSMark Murray krb5_errx(context, 1, "Password incorrect"); 548b528cefcSMark Murray break; 549b528cefcSMark Murray default: 550b528cefcSMark Murray krb5_err(context, 1, ret, "krb5_get_init_creds"); 551b528cefcSMark Murray } 552b528cefcSMark Murray 553b528cefcSMark Murray ret = krb5_cc_initialize (context, ccache, cred.client); 554b528cefcSMark Murray if (ret) 555b528cefcSMark Murray krb5_err (context, 1, ret, "krb5_cc_initialize"); 556b528cefcSMark Murray 557b528cefcSMark Murray ret = krb5_cc_store_cred (context, ccache, &cred); 558b528cefcSMark Murray if (ret) 559b528cefcSMark Murray krb5_err (context, 1, ret, "krb5_cc_store_cred"); 560b528cefcSMark Murray 561b528cefcSMark Murray #ifdef KRB4 562b528cefcSMark Murray if(get_v4_tgt) { 563b528cefcSMark Murray CREDENTIALS c; 564b528cefcSMark Murray ret = krb524_convert_creds_kdc(context, ccache, &cred, &c); 565b528cefcSMark Murray if(ret) 566b528cefcSMark Murray krb5_warn(context, ret, "converting creds"); 567b528cefcSMark Murray else 568b528cefcSMark Murray tf_setup(&c, c.pname, c.pinst); 569b528cefcSMark Murray memset(&c, 0, sizeof(c)); 570b528cefcSMark Murray } 571b528cefcSMark Murray if(do_afslog && k_hasafs()) 572b528cefcSMark Murray krb5_afslog(context, ccache, NULL, NULL); 573b528cefcSMark Murray #endif 574b528cefcSMark Murray krb5_free_creds_contents (context, &cred); 575b528cefcSMark Murray krb5_cc_close (context, ccache); 576b528cefcSMark Murray krb5_free_context (context); 577b528cefcSMark Murray return 0; 578b528cefcSMark Murray } 579