xref: /freebsd/crypto/heimdal/kuser/kinit.c (revision 5e9cd1ae3e10592ed70e7575551cba1bbab04d84)
1b528cefcSMark Murray /*
25e9cd1aeSAssar Westerlund  * Copyright (c) 1997-2001 Kungliga Tekniska H�gskolan
3b528cefcSMark Murray  * (Royal Institute of Technology, Stockholm, Sweden).
4b528cefcSMark Murray  * All rights reserved.
5b528cefcSMark Murray  *
6b528cefcSMark Murray  * Redistribution and use in source and binary forms, with or without
7b528cefcSMark Murray  * modification, are permitted provided that the following conditions
8b528cefcSMark Murray  * are met:
9b528cefcSMark Murray  *
10b528cefcSMark Murray  * 1. Redistributions of source code must retain the above copyright
11b528cefcSMark Murray  *    notice, this list of conditions and the following disclaimer.
12b528cefcSMark Murray  *
13b528cefcSMark Murray  * 2. Redistributions in binary form must reproduce the above copyright
14b528cefcSMark Murray  *    notice, this list of conditions and the following disclaimer in the
15b528cefcSMark Murray  *    documentation and/or other materials provided with the distribution.
16b528cefcSMark Murray  *
17b528cefcSMark Murray  * 3. Neither the name of the Institute nor the names of its contributors
18b528cefcSMark Murray  *    may be used to endorse or promote products derived from this software
19b528cefcSMark Murray  *    without specific prior written permission.
20b528cefcSMark Murray  *
21b528cefcSMark Murray  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22b528cefcSMark Murray  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23b528cefcSMark Murray  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24b528cefcSMark Murray  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25b528cefcSMark Murray  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26b528cefcSMark Murray  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27b528cefcSMark Murray  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28b528cefcSMark Murray  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29b528cefcSMark Murray  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30b528cefcSMark Murray  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31b528cefcSMark Murray  * SUCH DAMAGE.
32b528cefcSMark Murray  */
33b528cefcSMark Murray 
34b528cefcSMark Murray #include "kuser_locl.h"
355e9cd1aeSAssar Westerlund RCSID("$Id: kinit.c,v 1.69 2001/01/05 16:32:55 joda Exp $");
36b528cefcSMark Murray 
375e9cd1aeSAssar Westerlund #ifdef KRB4
385e9cd1aeSAssar Westerlund /* for when the KDC tells us it's a v4 one, we try to talk that */
395e9cd1aeSAssar Westerlund 
405e9cd1aeSAssar Westerlund static int
415e9cd1aeSAssar Westerlund key_to_key(const char *user,
425e9cd1aeSAssar Westerlund 	   char *instance,
435e9cd1aeSAssar Westerlund 	   const char *realm,
445e9cd1aeSAssar Westerlund 	   const void *arg,
455e9cd1aeSAssar Westerlund 	   des_cblock *key)
465e9cd1aeSAssar Westerlund {
475e9cd1aeSAssar Westerlund     memcpy(key, arg, sizeof(des_cblock));
485e9cd1aeSAssar Westerlund     return 0;
495e9cd1aeSAssar Westerlund }
505e9cd1aeSAssar Westerlund 
515e9cd1aeSAssar Westerlund static int
525e9cd1aeSAssar Westerlund do_v4_fallback (krb5_context context,
535e9cd1aeSAssar Westerlund 		const krb5_principal principal,
545e9cd1aeSAssar Westerlund 		int lifetime,
555e9cd1aeSAssar Westerlund 		int use_srvtab, const char *srvtab_str,
565e9cd1aeSAssar Westerlund 		char *passwd, size_t passwd_size)
575e9cd1aeSAssar Westerlund {
585e9cd1aeSAssar Westerlund     int ret;
595e9cd1aeSAssar Westerlund     krb_principal princ;
605e9cd1aeSAssar Westerlund     des_cblock key;
615e9cd1aeSAssar Westerlund     krb5_error_code kret;
625e9cd1aeSAssar Westerlund 
635e9cd1aeSAssar Westerlund     if (lifetime == 0)
645e9cd1aeSAssar Westerlund 	lifetime = DEFAULT_TKT_LIFE;
655e9cd1aeSAssar Westerlund     else
665e9cd1aeSAssar Westerlund 	lifetime = krb_time_to_life (0, lifetime);
675e9cd1aeSAssar Westerlund 
685e9cd1aeSAssar Westerlund     kret = krb5_524_conv_principal (context, principal,
695e9cd1aeSAssar Westerlund 				    princ.name,
705e9cd1aeSAssar Westerlund 				    princ.instance,
715e9cd1aeSAssar Westerlund 				    princ.realm);
725e9cd1aeSAssar Westerlund     if (kret) {
735e9cd1aeSAssar Westerlund 	krb5_warn (context, kret, "krb5_524_conv_principal");
745e9cd1aeSAssar Westerlund 	return 1;
755e9cd1aeSAssar Westerlund     }
765e9cd1aeSAssar Westerlund 
775e9cd1aeSAssar Westerlund     if (use_srvtab || srvtab_str) {
785e9cd1aeSAssar Westerlund 	if (srvtab_str == NULL)
795e9cd1aeSAssar Westerlund 	    srvtab_str = KEYFILE;
805e9cd1aeSAssar Westerlund 
815e9cd1aeSAssar Westerlund 	ret = read_service_key (princ.name, princ.instance, princ.realm,
825e9cd1aeSAssar Westerlund 				0, srvtab_str, (char *)&key);
835e9cd1aeSAssar Westerlund 	if (ret) {
845e9cd1aeSAssar Westerlund 	    warnx ("read_service_key %s: %s", srvtab_str,
855e9cd1aeSAssar Westerlund 		   krb_get_err_text (ret));
865e9cd1aeSAssar Westerlund 	    return 1;
875e9cd1aeSAssar Westerlund 	}
885e9cd1aeSAssar Westerlund 	ret = krb_get_in_tkt (princ.name, princ.instance, princ.realm,
895e9cd1aeSAssar Westerlund 			      KRB_TICKET_GRANTING_TICKET, princ.realm,
905e9cd1aeSAssar Westerlund 			      lifetime, key_to_key, NULL, key);
915e9cd1aeSAssar Westerlund     } else {
925e9cd1aeSAssar Westerlund 	ret = krb_get_pw_in_tkt2(princ.name, princ.instance, princ.realm,
935e9cd1aeSAssar Westerlund 				 KRB_TICKET_GRANTING_TICKET, princ.realm,
945e9cd1aeSAssar Westerlund 				 lifetime, passwd, &key);
955e9cd1aeSAssar Westerlund     }
965e9cd1aeSAssar Westerlund     memset (passwd, 0, passwd_size);
975e9cd1aeSAssar Westerlund     memset (key, 0, sizeof(key));
985e9cd1aeSAssar Westerlund     if (ret) {
995e9cd1aeSAssar Westerlund 	warnx ("%s", krb_get_err_text(ret));
1005e9cd1aeSAssar Westerlund 	return 1;
1015e9cd1aeSAssar Westerlund     }
1025e9cd1aeSAssar Westerlund     if (k_hasafs()) {
1035e9cd1aeSAssar Westerlund 	if ((ret = krb_afslog(NULL, NULL)) != 0 && ret != KDC_PR_UNKNOWN) {
1045e9cd1aeSAssar Westerlund 	    if(ret > 0)
1055e9cd1aeSAssar Westerlund 		warnx ("%s", krb_get_err_text(ret));
1065e9cd1aeSAssar Westerlund 	    else
1075e9cd1aeSAssar Westerlund 		warnx ("failed to store AFS token");
1085e9cd1aeSAssar Westerlund 	}
1095e9cd1aeSAssar Westerlund     }
1105e9cd1aeSAssar Westerlund     return 0;
1115e9cd1aeSAssar Westerlund }
1125e9cd1aeSAssar Westerlund 
1135e9cd1aeSAssar Westerlund 
1145e9cd1aeSAssar Westerlund /*
1155e9cd1aeSAssar Westerlund  * the special version of get_default_principal that takes v4 into account
1165e9cd1aeSAssar Westerlund  */
1175e9cd1aeSAssar Westerlund 
1185e9cd1aeSAssar Westerlund static krb5_error_code
1195e9cd1aeSAssar Westerlund kinit_get_default_principal (krb5_context context,
1205e9cd1aeSAssar Westerlund 			     krb5_principal *princ)
1215e9cd1aeSAssar Westerlund {
1225e9cd1aeSAssar Westerlund     krb5_error_code ret;
1235e9cd1aeSAssar Westerlund     krb5_ccache id;
1245e9cd1aeSAssar Westerlund     krb_principal v4_princ;
1255e9cd1aeSAssar Westerlund     int kret;
1265e9cd1aeSAssar Westerlund 
1275e9cd1aeSAssar Westerlund     ret = krb5_cc_default (context, &id);
1285e9cd1aeSAssar Westerlund     if (ret == 0) {
1295e9cd1aeSAssar Westerlund 	ret = krb5_cc_get_principal (context, id, princ);
1305e9cd1aeSAssar Westerlund 	krb5_cc_close (context, id);
1315e9cd1aeSAssar Westerlund 	if (ret == 0)
1325e9cd1aeSAssar Westerlund 	    return 0;
1335e9cd1aeSAssar Westerlund     }
1345e9cd1aeSAssar Westerlund 
1355e9cd1aeSAssar Westerlund     kret = krb_get_tf_fullname (tkt_string(),
1365e9cd1aeSAssar Westerlund 				v4_princ.name,
1375e9cd1aeSAssar Westerlund 				v4_princ.instance,
1385e9cd1aeSAssar Westerlund 				v4_princ.realm);
1395e9cd1aeSAssar Westerlund     if (kret == KSUCCESS) {
1405e9cd1aeSAssar Westerlund 	ret = krb5_425_conv_principal (context,
1415e9cd1aeSAssar Westerlund 				       v4_princ.name,
1425e9cd1aeSAssar Westerlund 				       v4_princ.instance,
1435e9cd1aeSAssar Westerlund 				       v4_princ.realm,
1445e9cd1aeSAssar Westerlund 				       princ);
1455e9cd1aeSAssar Westerlund 	if (ret == 0)
1465e9cd1aeSAssar Westerlund 	    return 0;
1475e9cd1aeSAssar Westerlund     }
1485e9cd1aeSAssar Westerlund     return krb5_get_default_principal (context, princ);
1495e9cd1aeSAssar Westerlund }
1505e9cd1aeSAssar Westerlund 
1515e9cd1aeSAssar Westerlund #else /* !KRB4 */
1525e9cd1aeSAssar Westerlund 
1535e9cd1aeSAssar Westerlund static krb5_error_code
1545e9cd1aeSAssar Westerlund kinit_get_default_principal (krb5_context context,
1555e9cd1aeSAssar Westerlund 			     krb5_principal *princ)
1565e9cd1aeSAssar Westerlund {
1575e9cd1aeSAssar Westerlund     return krb5_get_default_principal (context, princ);
1585e9cd1aeSAssar Westerlund }
1595e9cd1aeSAssar Westerlund 
1605e9cd1aeSAssar Westerlund #endif /* !KRB4 */
1615e9cd1aeSAssar Westerlund 
1625e9cd1aeSAssar Westerlund int forwardable_flag	= -1;
1635e9cd1aeSAssar Westerlund int proxiable_flag	= -1;
1645e9cd1aeSAssar Westerlund int renewable_flag	= -1;
165b528cefcSMark Murray int renew_flag		= 0;
166b528cefcSMark Murray int validate_flag	= 0;
167b528cefcSMark Murray int version_flag	= 0;
168b528cefcSMark Murray int help_flag		= 0;
16913e3f4d6SMark Murray int addrs_flag		= 1;
1705e9cd1aeSAssar Westerlund int anonymous_flag	= 0;
171b528cefcSMark Murray char *lifetime 		= NULL;
172b528cefcSMark Murray char *renew_life	= NULL;
173b528cefcSMark Murray char *server		= NULL;
174b528cefcSMark Murray char *cred_cache	= NULL;
175b528cefcSMark Murray char *start_str		= NULL;
176b528cefcSMark Murray struct getarg_strings etype_str;
177b528cefcSMark Murray int use_keytab		= 0;
178b528cefcSMark Murray char *keytab_str	= NULL;
179b528cefcSMark Murray #ifdef KRB4
180b528cefcSMark Murray extern int do_afslog;
181b528cefcSMark Murray extern int get_v4_tgt;
182b528cefcSMark Murray #endif
183b528cefcSMark Murray int fcache_version;
184b528cefcSMark Murray 
1855e9cd1aeSAssar Westerlund static struct getargs args[] = {
186b528cefcSMark Murray #ifdef KRB4
187b528cefcSMark Murray     { "524init", 	'4', arg_flag, &get_v4_tgt,
188b528cefcSMark Murray       "obtain version 4 TGT" },
189b528cefcSMark Murray 
190b528cefcSMark Murray     { "afslog", 	0  , arg_flag, &do_afslog,
191b528cefcSMark Murray       "obtain afs tokens"  },
192b528cefcSMark Murray #endif
193b528cefcSMark Murray     { "cache", 		'c', arg_string, &cred_cache,
194b528cefcSMark Murray       "credentials cache", "cachename" },
195b528cefcSMark Murray 
1965e9cd1aeSAssar Westerlund     { "forwardable",	'f', arg_flag, &forwardable_flag,
197b528cefcSMark Murray       "get forwardable tickets"},
198b528cefcSMark Murray 
199b528cefcSMark Murray     { "keytab",         't', arg_string, &keytab_str,
200b528cefcSMark Murray       "keytab to use", "keytabname" },
201b528cefcSMark Murray 
202b528cefcSMark Murray     { "lifetime",	'l', arg_string, &lifetime,
2035e9cd1aeSAssar Westerlund       "lifetime of tickets", "time"},
204b528cefcSMark Murray 
2055e9cd1aeSAssar Westerlund     { "proxiable",	'p', arg_flag, &proxiable_flag,
206b528cefcSMark Murray       "get proxiable tickets" },
207b528cefcSMark Murray 
208b528cefcSMark Murray     { "renew",          'R', arg_flag, &renew_flag,
209b528cefcSMark Murray       "renew TGT" },
210b528cefcSMark Murray 
2115e9cd1aeSAssar Westerlund     { "renewable",	0,   arg_flag, &renewable_flag,
212b528cefcSMark Murray       "get renewable tickets" },
213b528cefcSMark Murray 
214b528cefcSMark Murray     { "renewable-life",	'r', arg_string, &renew_life,
2155e9cd1aeSAssar Westerlund       "renewable lifetime of tickets", "time" },
216b528cefcSMark Murray 
217b528cefcSMark Murray     { "server", 	'S', arg_string, &server,
218b528cefcSMark Murray       "server to get ticket for", "principal" },
219b528cefcSMark Murray 
220b528cefcSMark Murray     { "start-time",	's', arg_string, &start_str,
2215e9cd1aeSAssar Westerlund       "when ticket gets valid", "time" },
222b528cefcSMark Murray 
223b528cefcSMark Murray     { "use-keytab",     'k', arg_flag, &use_keytab,
224b528cefcSMark Murray       "get key from keytab" },
225b528cefcSMark Murray 
226b528cefcSMark Murray     { "validate",	'v', arg_flag, &validate_flag,
227b528cefcSMark Murray       "validate TGT" },
228b528cefcSMark Murray 
229b528cefcSMark Murray     { "enctypes",	'e', arg_strings, &etype_str,
2305e9cd1aeSAssar Westerlund       "encryption types to use", "enctypes" },
231b528cefcSMark Murray 
232b528cefcSMark Murray     { "fcache-version", 0,   arg_integer, &fcache_version,
233b528cefcSMark Murray       "file cache version to create" },
234b528cefcSMark Murray 
23513e3f4d6SMark Murray     { "addresses",	0,   arg_negative_flag,	&addrs_flag,
236b528cefcSMark Murray       "request a ticket with no addresses" },
237b528cefcSMark Murray 
2385e9cd1aeSAssar Westerlund     { "anonymous",	0,   arg_flag,	&anonymous_flag,
2395e9cd1aeSAssar Westerlund       "request an anonymous ticket" },
2405e9cd1aeSAssar Westerlund 
241b528cefcSMark Murray     { "version", 	0,   arg_flag, &version_flag },
242b528cefcSMark Murray     { "help",		0,   arg_flag, &help_flag }
243b528cefcSMark Murray };
244b528cefcSMark Murray 
245b528cefcSMark Murray static void
246b528cefcSMark Murray usage (int ret)
247b528cefcSMark Murray {
248b528cefcSMark Murray     arg_printusage (args,
249b528cefcSMark Murray 		    sizeof(args)/sizeof(*args),
250b528cefcSMark Murray 		    NULL,
251b528cefcSMark Murray 		    "[principal]");
252b528cefcSMark Murray     exit (ret);
253b528cefcSMark Murray }
254b528cefcSMark Murray 
255b528cefcSMark Murray static int
256b528cefcSMark Murray renew_validate(krb5_context context,
257b528cefcSMark Murray 	       int renew,
258b528cefcSMark Murray 	       int validate,
259b528cefcSMark Murray 	       krb5_ccache cache,
260b528cefcSMark Murray 	       const char *server,
261b528cefcSMark Murray 	       krb5_deltat life)
262b528cefcSMark Murray {
263b528cefcSMark Murray     krb5_error_code ret;
264b528cefcSMark Murray     krb5_creds in, *out;
265b528cefcSMark Murray     krb5_kdc_flags flags;
266b528cefcSMark Murray 
267b528cefcSMark Murray     memset(&in, 0, sizeof(in));
268b528cefcSMark Murray 
269b528cefcSMark Murray     ret = krb5_cc_get_principal(context, cache, &in.client);
270b528cefcSMark Murray     if(ret) {
271b528cefcSMark Murray 	krb5_warn(context, ret, "krb5_cc_get_principal");
272b528cefcSMark Murray 	return ret;
273b528cefcSMark Murray     }
274b528cefcSMark Murray     if(server) {
275b528cefcSMark Murray 	ret = krb5_parse_name(context, server, &in.server);
276b528cefcSMark Murray 	if(ret) {
277b528cefcSMark Murray 	    krb5_warn(context, ret, "krb5_parse_name");
278b528cefcSMark Murray 	    goto out;
279b528cefcSMark Murray 	}
280b528cefcSMark Murray     } else {
281b528cefcSMark Murray 	krb5_realm *client_realm = krb5_princ_realm (context, in.client);
282b528cefcSMark Murray 
283b528cefcSMark Murray 	ret = krb5_make_principal(context, &in.server, *client_realm,
284b528cefcSMark Murray 				  KRB5_TGS_NAME, *client_realm, NULL);
285b528cefcSMark Murray 	if(ret) {
286b528cefcSMark Murray 	    krb5_warn(context, ret, "krb5_make_principal");
287b528cefcSMark Murray 	    goto out;
288b528cefcSMark Murray 	}
289b528cefcSMark Murray     }
290b528cefcSMark Murray     flags.i = 0;
291b528cefcSMark Murray     flags.b.renewable         = flags.b.renew = renew;
292b528cefcSMark Murray     flags.b.validate          = validate;
2935e9cd1aeSAssar Westerlund     flags.b.forwardable       = forwardable_flag;
2945e9cd1aeSAssar Westerlund     flags.b.proxiable         = proxiable_flag;
2955e9cd1aeSAssar Westerlund     flags.b.request_anonymous = anonymous_flag;
296b528cefcSMark Murray     if(life)
297b528cefcSMark Murray 	in.times.endtime = time(NULL) + life;
298b528cefcSMark Murray 
299b528cefcSMark Murray     ret = krb5_get_kdc_cred(context,
300b528cefcSMark Murray 			    cache,
301b528cefcSMark Murray 			    flags,
302b528cefcSMark Murray 			    NULL,
303b528cefcSMark Murray 			    NULL,
304b528cefcSMark Murray 			    &in,
305b528cefcSMark Murray 			    &out);
306b528cefcSMark Murray     if(ret) {
307b528cefcSMark Murray 	krb5_warn(context, ret, "krb5_get_kdc_cred");
308b528cefcSMark Murray 	goto out;
309b528cefcSMark Murray     }
310b528cefcSMark Murray     ret = krb5_cc_initialize(context, cache, in.client);
311b528cefcSMark Murray     if(ret) {
312b528cefcSMark Murray 	krb5_free_creds (context, out);
313b528cefcSMark Murray 	krb5_warn(context, ret, "krb5_cc_initialize");
314b528cefcSMark Murray 	goto out;
315b528cefcSMark Murray     }
316b528cefcSMark Murray     ret = krb5_cc_store_cred(context, cache, out);
317b528cefcSMark Murray     krb5_free_creds (context, out);
318b528cefcSMark Murray     if(ret) {
319b528cefcSMark Murray 	krb5_warn(context, ret, "krb5_cc_store_cred");
320b528cefcSMark Murray 	goto out;
321b528cefcSMark Murray     }
322b528cefcSMark Murray out:
323b528cefcSMark Murray     krb5_free_creds_contents(context, &in);
324b528cefcSMark Murray     return ret;
325b528cefcSMark Murray }
326b528cefcSMark Murray 
327b528cefcSMark Murray int
328b528cefcSMark Murray main (int argc, char **argv)
329b528cefcSMark Murray {
330b528cefcSMark Murray     krb5_error_code ret;
331b528cefcSMark Murray     krb5_context context;
332b528cefcSMark Murray     krb5_ccache  ccache;
333b528cefcSMark Murray     krb5_principal principal;
334b528cefcSMark Murray     krb5_creds cred;
335b528cefcSMark Murray     int optind = 0;
336b528cefcSMark Murray     krb5_get_init_creds_opt opt;
337b528cefcSMark Murray     krb5_deltat start_time = 0;
338b528cefcSMark Murray     krb5_deltat ticket_life = 0;
339b528cefcSMark Murray     krb5_addresses no_addrs;
3405e9cd1aeSAssar Westerlund     char passwd[256];
341b528cefcSMark Murray 
342b528cefcSMark Murray     set_progname (argv[0]);
343b528cefcSMark Murray     memset(&cred, 0, sizeof(cred));
344b528cefcSMark Murray 
345b528cefcSMark Murray     ret = krb5_init_context (&context);
346b528cefcSMark Murray     if (ret)
3475e9cd1aeSAssar Westerlund 	errx(1, "krb5_init_context failed: %d", ret);
348b528cefcSMark Murray 
3495e9cd1aeSAssar Westerlund     /* XXX no way to figure out if set without explict test */
3505e9cd1aeSAssar Westerlund     if(krb5_config_get_string(context, NULL, "libdefaults",
3515e9cd1aeSAssar Westerlund 			      "forwardable", NULL))
3525e9cd1aeSAssar Westerlund 	forwardable_flag = krb5_config_get_bool (context, NULL,
353b528cefcSMark Murray 						 "libdefaults",
354b528cefcSMark Murray 						 "forwardable",
355b528cefcSMark Murray 						 NULL);
356b528cefcSMark Murray 
357b528cefcSMark Murray #ifdef KRB4
358b528cefcSMark Murray     get_v4_tgt = krb5_config_get_bool_default (context, NULL,
359b528cefcSMark Murray 					       get_v4_tgt,
360b528cefcSMark Murray 					       "libdefaults",
361b528cefcSMark Murray 					       "krb4_get_tickets",
362b528cefcSMark Murray 					       NULL);
363b528cefcSMark Murray #endif
364b528cefcSMark Murray 
365b528cefcSMark Murray     if(getarg(args, sizeof(args) / sizeof(args[0]), argc, argv, &optind))
366b528cefcSMark Murray 	usage(1);
367b528cefcSMark Murray 
368b528cefcSMark Murray     if (help_flag)
369b528cefcSMark Murray 	usage (0);
370b528cefcSMark Murray 
371b528cefcSMark Murray     if(version_flag) {
372b528cefcSMark Murray 	print_version(NULL);
373b528cefcSMark Murray 	exit(0);
374b528cefcSMark Murray     }
375b528cefcSMark Murray 
3765e9cd1aeSAssar Westerlund     argc -= optind;
3775e9cd1aeSAssar Westerlund     argv += optind;
3785e9cd1aeSAssar Westerlund 
3795e9cd1aeSAssar Westerlund     if (argc > 1)
3805e9cd1aeSAssar Westerlund 	usage (1);
3815e9cd1aeSAssar Westerlund 
3825e9cd1aeSAssar Westerlund     if (argv[0]) {
3835e9cd1aeSAssar Westerlund 	ret = krb5_parse_name (context, argv[0], &principal);
3845e9cd1aeSAssar Westerlund 	if (ret)
3855e9cd1aeSAssar Westerlund 	    krb5_err (context, 1, ret, "krb5_parse_name");
3865e9cd1aeSAssar Westerlund     } else {
3875e9cd1aeSAssar Westerlund 	ret = kinit_get_default_principal (context, &principal);
3885e9cd1aeSAssar Westerlund 	if (ret)
3895e9cd1aeSAssar Westerlund 	    krb5_err (context, 1, ret, "krb5_get_default_principal");
3905e9cd1aeSAssar Westerlund     }
3915e9cd1aeSAssar Westerlund 
392b528cefcSMark Murray     if(fcache_version)
393b528cefcSMark Murray 	krb5_set_fcache_version(context, fcache_version);
394b528cefcSMark Murray 
395b528cefcSMark Murray     if(cred_cache)
396b528cefcSMark Murray 	ret = krb5_cc_resolve(context, cred_cache, &ccache);
397b528cefcSMark Murray     else
398b528cefcSMark Murray 	ret = krb5_cc_default (context, &ccache);
399b528cefcSMark Murray     if (ret)
400b528cefcSMark Murray 	krb5_err (context, 1, ret, "resolving credentials cache");
401b528cefcSMark Murray 
402b528cefcSMark Murray     if (lifetime) {
403b528cefcSMark Murray 	int tmp = parse_time (lifetime, "s");
404b528cefcSMark Murray 	if (tmp < 0)
405b528cefcSMark Murray 	    errx (1, "unparsable time: %s", lifetime);
406b528cefcSMark Murray 
407b528cefcSMark Murray 	ticket_life = tmp;
408b528cefcSMark Murray     }
409b528cefcSMark Murray     if(renew_flag || validate_flag) {
410b528cefcSMark Murray 	ret = renew_validate(context, renew_flag, validate_flag,
411b528cefcSMark Murray 			     ccache, server, ticket_life);
412b528cefcSMark Murray 	exit(ret != 0);
413b528cefcSMark Murray     }
414b528cefcSMark Murray 
415b528cefcSMark Murray     krb5_get_init_creds_opt_init (&opt);
416b528cefcSMark Murray 
4175e9cd1aeSAssar Westerlund     krb5_get_init_creds_opt_set_default_flags(context, "kinit",
4185e9cd1aeSAssar Westerlund 					      /* XXX */principal->realm, &opt);
4195e9cd1aeSAssar Westerlund 
4205e9cd1aeSAssar Westerlund     if(forwardable_flag != -1)
4215e9cd1aeSAssar Westerlund 	krb5_get_init_creds_opt_set_forwardable (&opt, forwardable_flag);
4225e9cd1aeSAssar Westerlund     if(proxiable_flag != -1)
4235e9cd1aeSAssar Westerlund 	krb5_get_init_creds_opt_set_proxiable (&opt, proxiable_flag);
4245e9cd1aeSAssar Westerlund     if(anonymous_flag != -1)
4255e9cd1aeSAssar Westerlund 	krb5_get_init_creds_opt_set_anonymous (&opt, anonymous_flag);
426b528cefcSMark Murray 
42713e3f4d6SMark Murray     if (!addrs_flag) {
428b528cefcSMark Murray 	no_addrs.len = 0;
429b528cefcSMark Murray 	no_addrs.val = NULL;
430b528cefcSMark Murray 
431b528cefcSMark Murray 	krb5_get_init_creds_opt_set_address_list (&opt, &no_addrs);
432b528cefcSMark Murray     }
433b528cefcSMark Murray 
434b528cefcSMark Murray     if(renew_life) {
435b528cefcSMark Murray 	int tmp = parse_time (renew_life, "s");
436b528cefcSMark Murray 	if (tmp < 0)
437b528cefcSMark Murray 	    errx (1, "unparsable time: %s", renew_life);
438b528cefcSMark Murray 
439b528cefcSMark Murray 	krb5_get_init_creds_opt_set_renew_life (&opt, tmp);
4405e9cd1aeSAssar Westerlund     } else if (renewable_flag)
441b528cefcSMark Murray 	krb5_get_init_creds_opt_set_renew_life (&opt, 1 << 30);
442b528cefcSMark Murray 
443b528cefcSMark Murray     if(ticket_life != 0)
444b528cefcSMark Murray 	krb5_get_init_creds_opt_set_tkt_life (&opt, ticket_life);
445b528cefcSMark Murray 
446b528cefcSMark Murray     if(start_str) {
447b528cefcSMark Murray 	int tmp = parse_time (start_str, "s");
448b528cefcSMark Murray 	if (tmp < 0)
449b528cefcSMark Murray 	    errx (1, "unparsable time: %s", start_str);
450b528cefcSMark Murray 
451b528cefcSMark Murray 	start_time = tmp;
452b528cefcSMark Murray     }
453b528cefcSMark Murray 
454b528cefcSMark Murray     if(etype_str.num_strings) {
455b528cefcSMark Murray 	krb5_enctype *enctype = NULL;
456b528cefcSMark Murray 	int i;
457b528cefcSMark Murray 	enctype = malloc(etype_str.num_strings * sizeof(*enctype));
458b528cefcSMark Murray 	if(enctype == NULL)
459b528cefcSMark Murray 	    errx(1, "out of memory");
460b528cefcSMark Murray 	for(i = 0; i < etype_str.num_strings; i++) {
461b528cefcSMark Murray 	    ret = krb5_string_to_enctype(context,
462b528cefcSMark Murray 					 etype_str.strings[i],
463b528cefcSMark Murray 					 &enctype[i]);
464b528cefcSMark Murray 	    if(ret)
465b528cefcSMark Murray 		errx(1, "unrecognized enctype: %s", etype_str.strings[i]);
466b528cefcSMark Murray 	}
467b528cefcSMark Murray 	krb5_get_init_creds_opt_set_etype_list(&opt, enctype,
468b528cefcSMark Murray 					       etype_str.num_strings);
469b528cefcSMark Murray     }
470b528cefcSMark Murray 
4715e9cd1aeSAssar Westerlund #ifdef KRB4
4725e9cd1aeSAssar Westerlund     get_v4_tgt = krb5_config_get_bool_default (context,
4735e9cd1aeSAssar Westerlund 					       NULL,
4745e9cd1aeSAssar Westerlund 					       get_v4_tgt,
4755e9cd1aeSAssar Westerlund 					       "realms",
4765e9cd1aeSAssar Westerlund 					       krb5_princ_realm(context,
4775e9cd1aeSAssar Westerlund 								principal),
4785e9cd1aeSAssar Westerlund 					       "krb4_get_tickets",
4795e9cd1aeSAssar Westerlund 					       NULL);
4805e9cd1aeSAssar Westerlund #endif
481b528cefcSMark Murray 
482b528cefcSMark Murray     if(use_keytab || keytab_str) {
483b528cefcSMark Murray 	krb5_keytab kt;
484b528cefcSMark Murray 	if(keytab_str)
485b528cefcSMark Murray 	    ret = krb5_kt_resolve(context, keytab_str, &kt);
486b528cefcSMark Murray 	else
487b528cefcSMark Murray 	    ret = krb5_kt_default(context, &kt);
488b528cefcSMark Murray 	if (ret)
489b528cefcSMark Murray 	    krb5_err (context, 1, ret, "resolving keytab");
490b528cefcSMark Murray 	ret = krb5_get_init_creds_keytab (context,
491b528cefcSMark Murray 					  &cred,
492b528cefcSMark Murray 					  principal,
493b528cefcSMark Murray 					  kt,
494b528cefcSMark Murray 					  start_time,
495b528cefcSMark Murray 					  server,
496b528cefcSMark Murray 					  &opt);
497b528cefcSMark Murray 	krb5_kt_close(context, kt);
4985e9cd1aeSAssar Westerlund     } else {
4995e9cd1aeSAssar Westerlund 	char *p, *prompt;
5005e9cd1aeSAssar Westerlund 
5015e9cd1aeSAssar Westerlund 	krb5_unparse_name (context, principal, &p);
5025e9cd1aeSAssar Westerlund 	asprintf (&prompt, "%s's Password: ", p);
5035e9cd1aeSAssar Westerlund 	free (p);
5045e9cd1aeSAssar Westerlund 
5055e9cd1aeSAssar Westerlund 	if (des_read_pw_string(passwd, sizeof(passwd)-1, prompt, 0)){
5065e9cd1aeSAssar Westerlund 	    memset(passwd, 0, sizeof(passwd));
5075e9cd1aeSAssar Westerlund 	    exit(1);
5085e9cd1aeSAssar Westerlund 	}
5095e9cd1aeSAssar Westerlund 
5105e9cd1aeSAssar Westerlund 	free (prompt);
5115e9cd1aeSAssar Westerlund 
512b528cefcSMark Murray 	ret = krb5_get_init_creds_password (context,
513b528cefcSMark Murray 					    &cred,
514b528cefcSMark Murray 					    principal,
5155e9cd1aeSAssar Westerlund 					    passwd,
516b528cefcSMark Murray 					    krb5_prompter_posix,
517b528cefcSMark Murray 					    NULL,
518b528cefcSMark Murray 					    start_time,
519b528cefcSMark Murray 					    server,
520b528cefcSMark Murray 					    &opt);
5215e9cd1aeSAssar Westerlund     }
5225e9cd1aeSAssar Westerlund #ifdef KRB4
5235e9cd1aeSAssar Westerlund     if (ret == KRB5KRB_AP_ERR_V4_REPLY || ret == KRB5_KDC_UNREACH) {
5245e9cd1aeSAssar Westerlund 	int exit_val;
5255e9cd1aeSAssar Westerlund 
5265e9cd1aeSAssar Westerlund 	exit_val = do_v4_fallback (context, principal, ticket_life,
5275e9cd1aeSAssar Westerlund 				   use_keytab, keytab_str,
5285e9cd1aeSAssar Westerlund 				   passwd, sizeof(passwd));
5295e9cd1aeSAssar Westerlund 	memset(passwd, 0, sizeof(passwd));
5305e9cd1aeSAssar Westerlund 	if (exit_val == 0 || ret == KRB5KRB_AP_ERR_V4_REPLY) {
5315e9cd1aeSAssar Westerlund 	    krb5_free_context (context);
5325e9cd1aeSAssar Westerlund 	    return exit_val;
5335e9cd1aeSAssar Westerlund 	}
5345e9cd1aeSAssar Westerlund     }
5355e9cd1aeSAssar Westerlund #endif
5365e9cd1aeSAssar Westerlund     memset(passwd, 0, sizeof(passwd));
5375e9cd1aeSAssar Westerlund 
538b528cefcSMark Murray     switch(ret){
539b528cefcSMark Murray     case 0:
540b528cefcSMark Murray 	break;
541b528cefcSMark Murray     case KRB5_LIBOS_PWDINTR: /* don't print anything if it was just C-c:ed */
5425e9cd1aeSAssar Westerlund 	memset(passwd, 0, sizeof(passwd));
543b528cefcSMark Murray 	exit(1);
544b528cefcSMark Murray     case KRB5KRB_AP_ERR_BAD_INTEGRITY:
545b528cefcSMark Murray     case KRB5KRB_AP_ERR_MODIFIED:
5465e9cd1aeSAssar Westerlund 	memset(passwd, 0, sizeof(passwd));
547b528cefcSMark Murray 	krb5_errx(context, 1, "Password incorrect");
548b528cefcSMark Murray 	break;
549b528cefcSMark Murray     default:
550b528cefcSMark Murray 	krb5_err(context, 1, ret, "krb5_get_init_creds");
551b528cefcSMark Murray     }
552b528cefcSMark Murray 
553b528cefcSMark Murray     ret = krb5_cc_initialize (context, ccache, cred.client);
554b528cefcSMark Murray     if (ret)
555b528cefcSMark Murray 	krb5_err (context, 1, ret, "krb5_cc_initialize");
556b528cefcSMark Murray 
557b528cefcSMark Murray     ret = krb5_cc_store_cred (context, ccache, &cred);
558b528cefcSMark Murray     if (ret)
559b528cefcSMark Murray 	krb5_err (context, 1, ret, "krb5_cc_store_cred");
560b528cefcSMark Murray 
561b528cefcSMark Murray #ifdef KRB4
562b528cefcSMark Murray     if(get_v4_tgt) {
563b528cefcSMark Murray 	CREDENTIALS c;
564b528cefcSMark Murray 	ret = krb524_convert_creds_kdc(context, ccache, &cred, &c);
565b528cefcSMark Murray 	if(ret)
566b528cefcSMark Murray 	    krb5_warn(context, ret, "converting creds");
567b528cefcSMark Murray 	else
568b528cefcSMark Murray 	    tf_setup(&c, c.pname, c.pinst);
569b528cefcSMark Murray 	memset(&c, 0, sizeof(c));
570b528cefcSMark Murray     }
571b528cefcSMark Murray     if(do_afslog && k_hasafs())
572b528cefcSMark Murray 	krb5_afslog(context, ccache, NULL, NULL);
573b528cefcSMark Murray #endif
574b528cefcSMark Murray     krb5_free_creds_contents (context, &cred);
575b528cefcSMark Murray     krb5_cc_close (context, ccache);
576b528cefcSMark Murray     krb5_free_context (context);
577b528cefcSMark Murray     return 0;
578b528cefcSMark Murray }
579