xref: /titanic_41/usr/src/cmd/keyserv/chkey.c (revision 70911a0d18b2e8e4c70a3878128feb972ad5b552)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License, Version 1.0 only
6  * (the "License").  You may not use this file except in compliance
7  * with the License.
8  *
9  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
10  * or http://www.opensolaris.org/os/licensing.
11  * See the License for the specific language governing permissions
12  * and limitations under the License.
13  *
14  * When distributing Covered Code, include this CDDL HEADER in each
15  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
16  * If applicable, add the following below this CDDL HEADER, with the
17  * fields enclosed by brackets "[]" replaced with your own identifying
18  * information: Portions Copyright [yyyy] [name of copyright owner]
19  *
20  * CDDL HEADER END
21  */
22 /*
23  * Copyright 2005 Sun Microsystems, Inc.  All rights reserved.
24  * Use is subject to license terms.
25  */
26 
27 /*	Copyright (c) 1984, 1986, 1987, 1988, 1989 AT&T	*/
28 /*	  All Rights Reserved  	*/
29 
30 /*
31  * University Copyright- Copyright (c) 1982, 1986, 1988
32  * The Regents of the University of California
33  * All Rights Reserved
34  *
35  * University Acknowledgment- Portions of this document are derived from
36  * software developed by the University of California, Berkeley, and its
37  * contributors.
38  */
39 
40 #pragma ident	"%Z%%M%	%I%	%E% SMI"
41 
42 #include <assert.h>
43 #include <stdio.h>
44 #include <stdlib.h>
45 #include <string.h>
46 #include <pwd.h>
47 #include <shadow.h>
48 #include <crypt.h>
49 #include <sys/types.h>
50 #include <unistd.h>
51 #include <rpc/rpc.h>
52 #include <rpc/key_prot.h>
53 #include <rpcsvc/nis.h>
54 #include <rpcsvc/nis_dhext.h>
55 #include <rpcsvc/ypclnt.h>
56 #include <nsswitch.h>
57 
58 #define	PK_FILES	1
59 #define	PK_YP		2
60 #define	PK_NISPLUS	3
61 #define	PK_LDAP		4
62 
63 #define	CURMECH		mechs[mcount]
64 
65 static char	CRED_TABLE[] = "cred.org_dir";
66 static char	PKMAP[] = "publickey.byname";
67 static char	PKFILE[] = "/etc/publickey";
68 #define	MAXHOSTNAMELEN	256
69 
70 #define	ROOTKEY_FILE		"/etc/.rootkey"
71 #define	ROOTKEY_FILE_BACKUP	"/etc/.rootkey.bak"
72 #define	MAXROOTKEY_LINE_LEN	4224	/* Good upto 16384-bit keys */
73 #define	MAXROOTKEY_LEN		4096
74 
75 /* Should last up to 16384-bit keys */
76 #define	MAXPKENTLEN	8500
77 
78 bool_t		makenew = TRUE;   /* Make new keys or reencrypt existing */
79 bool_t		specmech = FALSE; /* Specific mechs requested */
80 bool_t		force = FALSE;
81 int		dest_service = 0; /* To which nameservice do we store key(s) */
82 
83 char		*program_name;
84 
85 mechanism_t	**mechs = NULL;   /* List of DH mechanisms */
86 char		**plist = NULL;	  /* List of public key(s) */
87 char		**slist = NULL;	  /* List of secret key(s) */
88 char		**clist = NULL;   /* List of encrypted secret key(s) */
89 int		numspecmech = 0;  /* Number of mechanisms specified */
90 
91 struct passwd	*pw = NULL;	  /* passwd entry of user */
92 struct spwd	*spw = NULL;	  /* shadow entry of user */
93 
94 char		*netname = NULL;  /* RPC netname of user */
95 char		local_domain[MAXNETNAMELEN + 1];
96 char		*sec_domain = NULL;
97 
98 char		**rpc_pws = NULL; /* List of S-RPC passwords */
99 int		rpc_pw_count = 0; /* Number of passwords entered by user */
100 char		*login_pw = NULL; /* Unencrypted login password */
101 
102 static int add_cred_obj(nis_object *, char *);
103 static nis_error auth_exists(char *, char *, char *, char *);
104 static void cmp_passwd();
105 static nis_error cred_exists(const char *, const char *, const char *);
106 static void encryptkeys();
107 static void error_msg();
108 static char *fgets_ignorenul();
109 static void getpublics();
110 static void getrpcpws();
111 static void getsecrets();
112 static void initkeylist(bool_t);
113 static void keylogin(keylen_t, algtype_t);
114 static void keylogin_des();
115 static void makenewkeys();
116 static int modify_cred_obj(nis_object *, char *);
117 static int nisplus_update(nis_name, char *, char *, char *);
118 static int sanity_checks(char *, char *, char *);
119 static void storekeys();
120 static void usage();
121 static void write_rootkey();
122 
123 extern char *get_nisplus_principal(char *, uid_t);
124 extern nis_object *init_entry();
125 extern int get_pk_source(char *);
126 extern int localupdate(char *, char *, uint_t, char *);
127 extern int xencrypt();
128 extern int xencrypt_g();
129 extern int __gen_dhkeys();
130 extern int key_setnet();
131 extern int key_setnet_g();
132 extern int key_secretkey_is_set_g();
133 extern int __getnetnamebyuid();
134 extern int getdomainname();
135 extern int ldap_update(char *, char *, char *, char *, char *);
136 
137 
138 static void
139 error_msg()
140 {
141 	if (sec_domain && *sec_domain &&
142 	    strcasecmp(sec_domain, local_domain)) {
143 		fprintf(stderr,
144 "The system default domain '%s' is different from the Secure RPC\n\
145 domain %s where the key is stored.  The Secure RPC domainname is\n\
146 defined by the directory object stored in the /var/nis/NIS_COLD_START file.\n\
147 If you need to change this Secure RPC domainname, please use the nisinit(1M)\n\
148 command with the `-k` option.\n", local_domain, sec_domain);
149 		exit(1);
150 	}
151 }
152 
153 
154 static void
155 usage()
156 {
157 	fprintf(stderr, "usage: %s [-p] [-s ldap | nisplus | nis | files] \n",
158 		program_name);
159 	exit(1);
160 }
161 
162 
163 /* Encrypt secret key(s) with login_pw */
164 static void
165 encryptkeys()
166 {
167 	int	mcount, ccount = 0;
168 
169 	if (mechs) {
170 		for (mcount = 0; CURMECH; mcount++) {
171 			char		*crypt = NULL;
172 
173 			if (!xencrypt_g(slist[mcount], CURMECH->keylen,
174 					CURMECH->algtype, login_pw, netname,
175 					&crypt, TRUE)) {
176 				/* Could not crypt key */
177 				crypt = NULL;
178 			} else
179 				ccount++;
180 			clist[mcount] = crypt;
181 		}
182 	} else {
183 		char		*crypt = NULL;
184 
185 		if (!(crypt =
186 			(char *)malloc(HEXKEYBYTES + KEYCHECKSUMSIZE + 1))) {
187 			fprintf(stderr, "%s: Malloc failure.\n", program_name);
188 			exit(1);
189 		}
190 
191 		memcpy(crypt, slist[0], HEXKEYBYTES);
192 		memcpy(crypt + HEXKEYBYTES, slist[0], KEYCHECKSUMSIZE);
193 		crypt[HEXKEYBYTES + KEYCHECKSUMSIZE] = 0;
194 		xencrypt(crypt, login_pw);
195 
196 		clist[0] = crypt;
197 		ccount++;
198 	}
199 
200 	if (!ccount) {
201 		fprintf(stderr, "%s: Could not encrypt any secret keys.\n",
202 			program_name);
203 		exit(1);
204 	}
205 }
206 
207 
208 /* Initialize the array of public, secret, and encrypted secret keys */
209 static void
210 initkeylist(bool_t nomech)
211 {
212 	int		mcount;
213 
214 	if (!nomech) {
215 		assert(mechs && mechs[0]);
216 		for (mcount = 0; CURMECH; mcount++);
217 	} else
218 		mcount = 1;
219 
220 	if (!(plist = (char **)malloc(sizeof (char *) * mcount))) {
221 		fprintf(stderr, "%s: Malloc failure.\n", program_name);
222 		exit(1);
223 	}
224 	if (!(slist = (char **)malloc(sizeof (char *) * mcount))) {
225 		fprintf(stderr, "%s: Malloc failure.\n", program_name);
226 		exit(1);
227 	}
228 	if (!(clist = (char **)malloc(sizeof (char *) * mcount))) {
229 		fprintf(stderr, "%s: Malloc failure.\n", program_name);
230 		exit(1);
231 	}
232 }
233 
234 
235 /* Retrieve public key(s) */
236 static void
237 getpublics()
238 {
239 	int		mcount;
240 	int		pcount = 0;
241 
242 	if (mechs) {
243 		for (mcount = 0; CURMECH; mcount++) {
244 			char		*public;
245 			size_t		hexkeylen;
246 
247 			hexkeylen = ((CURMECH->keylen / 8) * 2) + 1;
248 			if (!(public = (char *)malloc(hexkeylen))) {
249 				fprintf(stderr, "%s: Malloc failure.\n",
250 					program_name);
251 				exit(1);
252 			}
253 			if (!getpublickey_g(netname, CURMECH->keylen,
254 					    CURMECH->algtype, public,
255 					    hexkeylen)) {
256 				/* Could not get public key */
257 				fprintf(stderr,
258 					"Could not get %s public key.\n",
259 					VALID_ALIAS(CURMECH->alias) ?
260 					CURMECH->alias : "");
261 				free(public);
262 				public = NULL;
263 			} else
264 				pcount++;
265 
266 			plist[mcount] = public;
267 		}
268 	} else {
269 		char		*public;
270 
271 		if (!(public = (char *)malloc(HEXKEYBYTES + 1))) {
272 			fprintf(stderr, "%s: Malloc failure.\n", program_name);
273 			exit(1);
274 		}
275 		if (!getpublickey(netname, public)) {
276 			free(public);
277 			public = NULL;
278 		} else
279 			pcount++;
280 
281 		plist[0] = public;
282 	}
283 
284 	if (!pcount) {
285 		fprintf(stderr, "%s: cannot get any public keys for %s.\n",
286 			program_name, pw->pw_name);
287 		error_msg();
288 		fprintf(stderr,
289 	"Make sure that the public keys are stored in the domain %s.\n",
290 			local_domain);
291 		exit(1);
292 	}
293 }
294 
295 
296 /* Generate a new set of public/secret key pair(s) */
297 static void
298 makenewkeys()
299 {
300 	int		mcount;
301 
302 	if (mechs) {
303 		for (mcount = 0; CURMECH; mcount++) {
304 			char		*public, *secret;
305 			size_t		hexkeylen;
306 
307 			if (slist[mcount])
308 				free(slist[mcount]);
309 
310 			hexkeylen = ((CURMECH->keylen / 8) * 2) + 1;
311 
312 			if (!(public = malloc(hexkeylen))) {
313 				fprintf(stderr, "%s: Malloc failure.\n",
314 					program_name);
315 				exit(1);
316 			}
317 			if (!(secret = malloc(hexkeylen))) {
318 				fprintf(stderr, "%s: Malloc failure.\n",
319 					program_name);
320 				exit(1);
321 			}
322 
323 			if (!(__gen_dhkeys_g(public, secret, CURMECH->keylen,
324 					CURMECH->algtype, login_pw))) {
325 				/* Could not generate key pair */
326 				fprintf(stderr,
327 				"WARNING  Could not generate key pair %s\n",
328 					VALID_ALIAS(CURMECH->alias) ?
329 					CURMECH->alias : "");
330 				free(public);
331 				free(secret);
332 				public = NULL;
333 				secret = NULL;
334 			}
335 
336 			plist[mcount] = public;
337 			slist[mcount] = secret;
338 		}
339 	} else {
340 		char		*public, *secret;
341 		if (slist[0])
342 			free(slist[0]);
343 
344 		if (!(public = malloc(HEXKEYBYTES + 1))) {
345 			fprintf(stderr, "%s: Malloc failure.\n", program_name);
346 			exit(1);
347 		}
348 		if (!(secret = malloc(HEXKEYBYTES + 1))) {
349 			fprintf(stderr, "%s: Malloc failure.\n", program_name);
350 			exit(1);
351 		}
352 
353 		__gen_dhkeys(public, secret, login_pw);
354 
355 		plist[0] = public;
356 		slist[0] = secret;
357 	}
358 }
359 
360 
361 /*
362  * Make sure that the entered Secure-RPC password(s) match the login
363  * password
364  */
365 static void
366 cmp_passwd()
367 {
368 	char	baseprompt[] = "Please enter the login password for";
369 	char	prompt[BUFSIZ];
370 	char	*en_login_pw = spw->sp_pwdp;
371 	char	*try_en_login_pw;
372 	bool_t	pwmatch = FALSE;
373 	int	done = 0, tries = 0, pcount;
374 
375 	snprintf(prompt, BUFSIZ, "%s %s:", baseprompt, pw->pw_name);
376 
377 	if (en_login_pw && (strlen(en_login_pw) != 0)) {
378 		for (pcount = 0; pcount < rpc_pw_count; pcount++) {
379 			char	*try_en_rpc_pw;
380 
381 			try_en_rpc_pw = crypt(rpc_pws[pcount], en_login_pw);
382 			if (strcmp(try_en_rpc_pw, en_login_pw) == 0) {
383 				login_pw = rpc_pws[pcount];
384 				pwmatch = TRUE;
385 				break;
386 			}
387 		}
388 		if (!pwmatch) {
389 			/* pw don't match */
390 			while (!done) {
391 				/* ask for the pw */
392 				login_pw = getpass(prompt);
393 				if (login_pw && strlen(login_pw)) {
394 					/* pw was not empty */
395 					try_en_login_pw = crypt(login_pw,
396 								en_login_pw);
397 					/* compare the pw's */
398 					if (!(strcmp(try_en_login_pw,
399 							en_login_pw))) {
400 						/* pw was correct */
401 						return;
402 					} else {
403 						/* pw was wrong */
404 						if (tries++) {
405 							/* Sorry */
406 							fprintf(stderr,
407 								"Sorry.\n");
408 							exit(1);
409 						} else {
410 							/* Try again */
411 							snprintf(prompt,
412 									BUFSIZ,
413 							"Try again. %s %s:",
414 								baseprompt,
415 								pw->pw_name);
416 						}
417 					}
418 				} else {
419 					/* pw was empty */
420 					if (tries++) {
421 						/* Unchanged */
422 						fprintf(stderr,
423 					"%s: key-pair(s) unchanged for %s.\n",
424 							program_name,
425 							pw->pw_name);
426 						exit(1);
427 					} else {
428 						/* Need a password */
429 						snprintf(prompt, BUFSIZ,
430 						"Need a password. %s %s:",
431 								baseprompt,
432 								pw->pw_name);
433 					}
434 				}
435 			}
436 		}
437 		/* pw match */
438 		return;
439 	} else {
440 		/* no pw found */
441 		fprintf(stderr,
442 		"%s: no passwd found for %s in the shadow passwd entry.\n",
443 			program_name, pw->pw_name);
444 		exit(1);
445 	}
446 }
447 
448 
449 /* Prompt the user for a Secure-RPC password and store it in a cache. */
450 static void
451 getrpcpws(char *flavor)
452 {
453 	char		*cur_pw = NULL;
454 	char		prompt[BUFSIZ + 1];
455 
456 	if (flavor)
457 		snprintf(prompt, BUFSIZ,
458 			"Please enter the %s Secure-RPC password for %s:",
459 			flavor, pw->pw_name);
460 	else
461 		snprintf(prompt, BUFSIZ,
462 				"Please enter the Secure-RPC password for %s:",
463 				pw->pw_name);
464 
465 	cur_pw = getpass(prompt);
466 	if (!cur_pw) {
467 		/* No changes */
468 		fprintf(stderr, "%s: key-pair(s) unchanged for %s.\n",
469 			program_name, pw->pw_name);
470 		exit(1);
471 	}
472 
473 	rpc_pw_count++;
474 	if (!(rpc_pws =
475 		(char **)realloc(rpc_pws, sizeof (char *) * rpc_pw_count))) {
476 		fprintf(stderr, "%s: Realloc failure.\n", program_name);
477 		exit(1);
478 	}
479 rpc_pws[rpc_pw_count - 1] = cur_pw;
480 }
481 
482 
483 /* Retrieve the secret key(s) for the user and attempt to decrypt them */
484 static void
485 getsecrets()
486 {
487 	int		mcount, scount = 0;
488 	int		tries = 0;
489 
490 	getrpcpws(NULL);
491 
492 	if (mechs) {
493 		for (mcount = 0; CURMECH; mcount++) {
494 			char		*secret;
495 			int		pcount;
496 			size_t		hexkeylen;
497 
498 			hexkeylen = ((CURMECH->keylen / 8) * 2) + 1;
499 			if (!(secret = (char *)calloc(hexkeylen,
500 							sizeof (char)))) {
501 				fprintf(stderr, "%s: Malloc failure.\n",
502 					program_name);
503 				exit(1);
504 			}
505 
506 			for (pcount = 0; pcount < rpc_pw_count; pcount++) {
507 				if (!getsecretkey_g(netname, CURMECH->keylen,
508 						    CURMECH->algtype, secret,
509 						    hexkeylen,
510 						    rpc_pws[pcount]))
511 					continue;
512 
513 				if (secret[0] == 0)
514 					continue;
515 				else
516 					break;
517 			}
518 
519 			tries = 0;
520 		getsecrets_tryagain_g:
521 			if (secret[0] == 0) {
522 				if (!tries) {
523 					/*
524 					 * No existing pw can decrypt
525 					 * secret key
526 					 */
527 					getrpcpws(CURMECH->alias);
528 					if (!getsecretkey_g(netname,
529 							    CURMECH->keylen,
530 							    CURMECH->algtype,
531 							    secret,
532 							    hexkeylen,
533 							    rpc_pws[pcount])) {
534 						/*
535 						 * Could not retreive
536 						 * secret key, abort
537 						 */
538 						free(secret);
539 						secret = NULL;
540 						goto getsecrets_abort;
541 					}
542 
543 					if (secret[0] == 0) {
544 						/* Still no go, ask again */
545 						free(rpc_pws[pcount]);
546 						rpc_pw_count--;
547 						tries++;
548 						printf("Try again. ");
549 						fflush(stdout);
550 						goto getsecrets_tryagain_g;
551 					} else
552 						scount++;
553 				} else {
554 					fprintf(stderr,
555 					"%s: key-pair unchanged for %s.\n",
556 						program_name, pw->pw_name);
557 					exit(1);
558 				}
559 			} else
560 				scount++;
561 
562 		getsecrets_abort:
563 			slist[mcount] = secret;
564 		}
565 	} else {
566 		char		*secret = NULL;
567 
568 		if (!(secret = (char *)malloc(HEXKEYBYTES + 1))) {
569 			fprintf(stderr, "%s: Malloc failure.\n", program_name);
570 			exit(1);
571 		}
572 	getsecrets_tryagain:
573 		if (!getsecretkey(netname, secret, rpc_pws[0])) {
574 			fprintf(stderr,
575 				"%s: could not get secret key for '%s'\n",
576 				program_name, netname);
577 			exit(1);
578 		}
579 
580 		if (secret[0] == 0) {
581 			if (!tries) {
582 				free(rpc_pws[0]);
583 				rpc_pw_count = 0;
584 				tries++;
585 				printf("Try again. ");
586 				fflush(stdout);
587 				getrpcpws(NULL);
588 				goto getsecrets_tryagain;
589 			} else {
590 				fprintf(stderr,
591 					"%s: key-pair unchanged for %s.\n",
592 					program_name, pw->pw_name);
593 				exit(1);
594 			}
595 		}
596 
597 		slist[0] = secret;
598 		return;
599 	}
600 
601 	if (!scount) {
602 		(void) fprintf(stderr,
603 		"%s: could not get nor decrypt any secret keys for '%s'\n",
604 					program_name, netname);
605 		error_msg();
606 		exit(1);
607 	}
608 }
609 
610 
611 /* Register AUTH_DES secret key with keyserv */
612 static void
613 keylogin_des()
614 {
615 	char			*secret = slist[0];
616 	struct key_netstarg	netst;
617 
618 	/*
619 	 * try to revoke the existing key/credentials, assuming
620 	 * one exists.  this will effectively mark "stale" any
621 	 * cached credientials...
622 	 */
623 	if (key_setsecret(secret) < 0) {
624 		return;
625 	}
626 
627 #ifdef NFS_AUTH
628 	/*
629 	 * it looks like a credential already existed, so try and
630 	 * revoke any lingering Secure-NFS privledges.
631 	 */
632 
633 	nra.authtype = AUTH_DES;
634 	nra.uid = getuid();
635 
636 	if (_nfssys(NFS_REVAUTH, &nra) < 0)
637 		perror("Warning: NFS credentials not destroyed");
638 #endif /* NFS_AUTH */
639 
640 	memcpy(netst.st_priv_key, secret, HEXKEYBYTES);
641 
642 	netst.st_pub_key[0] = '\0';
643 	netst.st_netname = strdup(netname);
644 
645 	/* do actual key login */
646 	if (key_setnet(&netst) < 0) {
647 		fprintf(stderr, "Could not set %s's secret key\n", netname);
648 		fprintf(stderr, "May be the keyserv is down?\n");
649 	}
650 }
651 
652 
653 /* Register a secret key with the keyserv */
654 static void
655 keylogin(keylen_t keylen, algtype_t algtype)
656 {
657 	int	mcount;
658 
659 	if (mechs) {
660 		for (mcount = 0; CURMECH; mcount++) {
661 			if (keylen == CURMECH->keylen &&
662 			    algtype == CURMECH->algtype) {
663 				if (key_setnet_g(netname, slist[mcount],
664 							CURMECH->keylen,
665 							NULL, 0,
666 							CURMECH->algtype)
667 				    < 0)
668 					fprintf(stderr,
669 					"Could not set %s's %s secret key\n",
670 						netname,
671 					VALID_ALIAS(CURMECH->alias) ?
672 						CURMECH->alias : "");
673 			}
674 		}
675 	} else {
676 		if (keylen == 192 && algtype == 0)
677 			keylogin_des();
678 	}
679 }
680 
681 
682 /*
683  * fgets is "broken" in that if it reads a NUL character it will
684  * always return EOF for all reads, even when there is data left in
685  * the file.  This replacement can deal with NUL's in a calm, rational
686  * manner.
687  */
688 static char *
689 fgets_ignorenul(char *s, int n, FILE *stream)
690 {
691 	int fildes = fileno(stream);
692 	int i = 0;
693 	int rs = 0;
694 	char c;
695 
696 	if (fildes < 0)
697 		return (NULL);
698 
699 	while (i < n - 1) {
700 		rs = read(fildes, &c, 1);
701 		switch (rs) {
702 		case 1:
703 			break;
704 		case 0:
705 			/* EOF */
706 			if (i > 0)
707 				s[i] = '\0';
708 			return (NULL);
709 			break;
710 		default:
711 			return (NULL);
712 		}
713 		switch (c) {
714 		case '\0':
715 			break;
716 		case '\n':
717 			s[i] = c;
718 			s[++i] = '\0';
719 			return (s);
720 		default:
721 		if (c != '\0')
722 			s[i++] = c;
723 		}
724 	}
725 	s[i] = '\0';
726 	return (s);
727 }
728 
729 
730 /* Write unencrypted secret key into root key file */
731 static void
732 write_rootkey(char *secret, char *flavor, keylen_t keylen, algtype_t algtype)
733 {
734 	char		line[MAXROOTKEY_LINE_LEN];
735 	char		keyent[MAXROOTKEY_LEN];
736 	algtype_t	atent;
737 	int		rootfd, bakfd, hexkeybytes;
738 	bool_t		lineone = TRUE;
739 	bool_t		gotit = FALSE;
740 	FILE		*rootfile, *bakfile;
741 
742 	unlink(ROOTKEY_FILE_BACKUP);
743 	if ((rename(ROOTKEY_FILE, ROOTKEY_FILE_BACKUP)) < 0) {
744 		if ((bakfd = creat(ROOTKEY_FILE_BACKUP, 0600)) < 0) {
745 			perror("Could not create /etc/.rootkey.bak");
746 			goto rootkey_err;
747 		}
748 		close(bakfd);
749 	}
750 
751 	if ((rootfd = open(ROOTKEY_FILE, O_WRONLY+O_CREAT, 0600)) < 0) {
752 		perror("Could not open /etc/.rootkey for writing");
753 		fprintf(stderr,
754 			"Attempting to restore original /etc/.rootkey\n");
755 		rename(ROOTKEY_FILE_BACKUP, ROOTKEY_FILE);
756 		goto rootkey_err;
757 	}
758 	if (!(rootfile = fdopen(rootfd, "w"))) {
759 		perror("Could not open /etc/.rootkey for writing");
760 		fprintf(stderr,
761 			"Attempting to restore original /etc/.rootkey\n");
762 		close(rootfd);
763 		unlink(ROOTKEY_FILE);
764 		rename(ROOTKEY_FILE_BACKUP, ROOTKEY_FILE);
765 		goto rootkey_err;
766 	}
767 	if (!(bakfile = fopen(ROOTKEY_FILE_BACKUP, "r"))) {
768 		perror("Could not open /etc/.rootkey.bak for reading");
769 		fprintf(stderr,
770 			"Attempting to restore original /etc/.rootkey\n");
771 		fclose(rootfile);
772 		unlink(ROOTKEY_FILE);
773 		rename(ROOTKEY_FILE_BACKUP, ROOTKEY_FILE);
774 		goto rootkey_err;
775 	}
776 
777 	hexkeybytes = ((keylen + 7) / 8) * 2;
778 
779 	while (fgets_ignorenul(line, MAXROOTKEY_LINE_LEN, bakfile)) {
780 		sscanf(line, "%s %d", keyent, &atent);
781 		/*
782 		 * 192-bit keys always go on the first line
783 		 */
784 		if (lineone) {
785 			lineone = FALSE;
786 			if (keylen == 192) {
787 				gotit = TRUE;
788 				fprintf(rootfile, "%s\n", secret);
789 			} else
790 				fprintf(rootfile, "%s", line);
791 			fflush(rootfile);
792 		} else {
793 			if ((strlen(keyent) == hexkeybytes) &&
794 			    (atent == algtype)) {
795 				/*
796 				 * Silently remove lines with the same
797 				 * keylen/algtype
798 				 */
799 				if (gotit)
800 					continue;
801 				else
802 					gotit = TRUE;
803 
804 				fprintf(rootfile, "%s %d\n", secret, algtype);
805 			} else
806 				fprintf(rootfile, "%s", line);
807 			fflush(rootfile);
808 		}
809 	}
810 
811 	/* Append key to rootkey file */
812 	if (!gotit) {
813 		if (keylen == 192)
814 			fprintf(rootfile, "%s\n", secret);
815 		else {
816 			if (lineone)
817 				fprintf(rootfile, "\n");
818 			fprintf(rootfile, "%s %d\n", secret, algtype);
819 		}
820 	}
821 	fflush(rootfile);
822 	fclose(rootfile);
823 	fclose(bakfile);
824 	unlink(ROOTKEY_FILE_BACKUP);
825 	return;
826 
827 rootkey_err:
828 	fprintf(stderr, "WARNING: Could not write %s key to /etc/.rootkey\n",
829 		flavor);
830 }
831 
832 
833 /* Returns 0 if check fails; 1 if successful. */
834 static int
835 sanity_checks(char *nis_princ, char *domain, char *authtype)
836 {
837 	char	netdomainaux[MAXHOSTNAMELEN+1];
838 	char	*princdomain, *netdomain;
839 	int	len;
840 
841 	/* Sanity check 0. Do we have a nis+ principal name to work with? */
842 	if (nis_princ == NULL) {
843 		(void) fprintf(stderr,
844 		"%s: you must create a \"LOCAL\" credential for '%s' first.\n",
845 			program_name, netname);
846 		(void) fprintf(stderr, "\tSee nisaddcred(1).\n");
847 		return (0);
848 	}
849 
850 	/* Sanity check 0.5.  NIS+ principal names must be dotted. */
851 	len = strlen(nis_princ);
852 	if (nis_princ[len-1] != '.') {
853 		(void) fprintf(stderr,
854 		"%s: invalid principal name: '%s' (forgot ending dot?).\n",
855 			program_name, nis_princ);
856 		return (0);
857 	}
858 
859 	/* Sanity check 1.  We only deal with one type of netnames. */
860 	if (strncmp(netname, "unix", 4) != 0) {
861 		(void) fprintf(stderr,
862 			"%s: unrecognized netname type: '%s'.\n",
863 			program_name, netname);
864 		return (0);
865 	}
866 
867 	/* Sanity check 2.  Should only add DES cred in home domain. */
868 	princdomain = nis_domain_of(nis_princ);
869 	if (strcasecmp(princdomain, domain) != 0) {
870 		(void) fprintf(stderr,
871 "%s: domain of principal '%s' does not match destination domain '%s'.\n",
872 			program_name, nis_princ, domain);
873 		(void) fprintf(stderr,
874 	"Should only add DES credential of principal in its home domain\n");
875 		return (0);
876 	}
877 
878 	/*
879 	 * Sanity check 3:  Make sure netname's domain same as principal's
880 	 * and don't have extraneous dot at the end.
881 	 */
882 	netdomain = (char *)strchr(netname, '@');
883 	if (! netdomain || netname[strlen(netname)-1] == '.') {
884 		(void) fprintf(stderr, "%s: invalid netname: '%s'. \n",
885 			program_name, netname);
886 		return (0);
887 	}
888 	netdomain++; /* skip '@' */
889 
890 	if (strlcpy(netdomainaux, netdomain, sizeof (netdomainaux)) >=
891 	    sizeof (netdomainaux)) {
892 		(void) fprintf(stderr, "%s: net domain name %s is too long\n",
893 			    program_name, netdomain);
894 		return (0);
895 	}
896 
897 	if (netdomainaux[strlen(netdomainaux) - 1] != '.') {
898 		if (strlcat(netdomainaux, ".", sizeof (netdomainaux)) >=
899 		    sizeof (netdomainaux)) {
900 			(void) fprintf(stderr,
901 				    "%s: net domain name %s is too long\n",
902 				    program_name, netdomainaux);
903 			return (0);
904 		}
905 	}
906 
907 	if (strcasecmp(princdomain, netdomainaux) != 0) {
908 		(void) fprintf(stderr,
909 	"%s: domain of netname %s should be same as that of principal %s\n",
910 			program_name, netname, nis_princ);
911 		return (0);
912 	}
913 
914 	/* Another principal owns same credentials? (exits if that happens) */
915 	(void) auth_exists(nis_princ, netname, authtype, domain);
916 
917 	return (1); /* all passed */
918 }
919 
920 
921 /* Store new key information in the specified name service */
922 static void
923 storekeys()
924 {
925 	int		mcount, ucount = 0;
926 	char		*ypmaster, *ypdomain = NULL, pkent[MAXPKENTLEN];
927 	nis_name	nis_princ;
928 
929 
930 	/* Setup */
931 	switch (dest_service) {
932 	case PK_LDAP:
933 		break;
934 	case PK_NISPLUS:
935 		nis_princ = get_nisplus_principal(nis_local_directory(),
936 							geteuid());
937 		break;
938 	case PK_YP:
939 		yp_get_default_domain(&ypdomain);
940 		if (yp_master(ypdomain, PKMAP, &ypmaster) != 0) {
941 			fprintf(stderr,
942 			"%s: cannot find master of NIS publickey database\n",
943 				program_name);
944 			exit(1);
945 		}
946 		fprintf(stdout,
947 			"Sending key change request to %s ...\n", ypmaster);
948 		break;
949 	case PK_FILES:
950 		if (geteuid() != 0) {
951 			fprintf(stderr,
952 		"%s: non-root users cannot change their key-pair in %s\n",
953 				program_name, PKFILE);
954 			exit(1);
955 		}
956 		break;
957 	default:
958 		fprintf(stderr,
959 			"could not update; database %d unknown\n",
960 			dest_service);
961 		exit(1);
962 	}
963 
964 	if (mechs) {
965 		for (mcount = 0; CURMECH; mcount++) {
966 			char		authtype[MECH_MAXATNAME];
967 
968 			if (!plist[mcount] && !clist[mcount])
969 				continue;
970 
971 			__nis_mechalias2authtype(CURMECH->alias, authtype,
972 							MECH_MAXATNAME);
973 			if (!authtype) {
974 				fprintf(stderr,
975 				"Could not generate auth_type for %s.\n",
976 					CURMECH->alias);
977 				continue;
978 			}
979 
980 			snprintf(pkent, MAXPKENTLEN, "%s:%s:%d",
981 					plist[mcount], clist[mcount],
982 					CURMECH->algtype);
983 
984 			switch (dest_service) {
985 			case PK_LDAP:
986 				if (ldap_update(CURMECH->alias, netname,
987 						plist[mcount], clist[mcount],
988 						login_pw))
989 					fprintf(stderr,
990 			"%s: unable to update %s key in LDAP database\n",
991 						program_name, authtype);
992 				else
993 					ucount++;
994 				break;
995 
996 			case PK_NISPLUS:
997 				if (nisplus_update(nis_princ,
998 							authtype,
999 							plist[mcount],
1000 							clist[mcount]))
1001 					fprintf(stderr,
1002 			"%s: unable to update %s key in nisplus database\n",
1003 						program_name, authtype);
1004 				else
1005 					ucount++;
1006 				break;
1007 
1008 			case PK_YP:
1009 				/* Should never get here. */
1010 				break;
1011 
1012 			case PK_FILES:
1013 				/* Should never get here. */
1014 				break;
1015 			}
1016 		}
1017 	} else {
1018 		int	status = 0;
1019 
1020 		assert(plist[0] && clist[0]);
1021 		snprintf(pkent, MAXPKENTLEN, "%s:%s", plist[0], clist[0]);
1022 
1023 		switch (dest_service) {
1024 		case PK_LDAP:
1025 			if (ldap_update("dh192-0", netname,
1026 					plist[0], clist[0],
1027 					login_pw)) {
1028 				fprintf(stderr,
1029 			"%s: unable to update %s key in LDAP database\n",
1030 					program_name);
1031 				exit(1);
1032 			}
1033 			break;
1034 
1035 		case PK_NISPLUS:
1036 			assert(plist[0] && clist[0]);
1037 			if (nisplus_update(nis_princ,
1038 						AUTH_DES_AUTH_TYPE,
1039 						plist[0],
1040 						clist[0])) {
1041 					fprintf(stderr,
1042 			"%s: unable to update nisplus database\n",
1043 						program_name);
1044 					exit(1);
1045 			}
1046 			break;
1047 
1048 		case PK_YP:
1049 			if (status = yp_update(ypdomain, PKMAP,
1050 						YPOP_STORE, netname,
1051 						strlen(netname), pkent,
1052 						strlen(pkent))) {
1053 				fprintf(stderr,
1054 				"%s: unable to update NIS database (%u): %s\n",
1055 					program_name, status,
1056 					yperr_string(status));
1057 				exit(1);
1058 			}
1059 			break;
1060 
1061 		case PK_FILES:
1062 			if (localupdate(netname, PKFILE, YPOP_STORE, pkent)) {
1063 				fprintf(stderr,
1064 			"%s: hence, unable to update publickey database\n",
1065 					program_name);
1066 				exit(1);
1067 			}
1068 			break;
1069 
1070 		default:
1071 			/* Should never get here */
1072 			assert(0);
1073 		}
1074 		return;
1075 	}
1076 	if (!ucount) {
1077 		fprintf(stderr, "%s: unable to update any key-pairs for %s.\n",
1078 			program_name, pw->pw_name);
1079 		exit(1);
1080 	}
1081 }
1082 
1083 /* Check that someone else don't have the same auth information already */
1084 static
1085 nis_error
1086 auth_exists(char *princname, char *auth_name, char *auth_type, char *domain)
1087 {
1088 	char sname[NIS_MAXNAMELEN+1];
1089 	nis_result	*res;
1090 	nis_error status;
1091 	char *foundprinc;
1092 
1093 	(void) sprintf(sname, "[auth_name=%s,auth_type=%s],%s.%s",
1094 		auth_name, auth_type, CRED_TABLE, domain);
1095 	if (sname[strlen(sname)-1] != '.')
1096 		strcat(sname, ".");
1097 	/* Don't want FOLLOW_PATH here */
1098 	res = nis_list(sname,
1099 		MASTER_ONLY+USE_DGRAM+NO_AUTHINFO+FOLLOW_LINKS,
1100 		NULL, NULL);
1101 
1102 	status = res->status;
1103 	switch (res->status) {
1104 	case NIS_NOTFOUND:
1105 		break;
1106 	case NIS_TRYAGAIN:
1107 		(void) fprintf(stderr,
1108 			"%s: NIS+ server busy, try again later.\n",
1109 			program_name);
1110 		exit(1);
1111 		break;
1112 	case NIS_PERMISSION:
1113 		(void) fprintf(stderr,
1114 		"%s: insufficient permission to look up old credentials.\n",
1115 			program_name);
1116 		exit(1);
1117 		break;
1118 	case NIS_SUCCESS:
1119 		foundprinc = ENTRY_VAL(res->objects.objects_val, 0);
1120 		if (nis_dir_cmp(foundprinc, princname) != SAME_NAME) {
1121 			(void) fprintf(stderr,
1122 	"%s: %s credentials with auth_name '%s' already belong to '%s'.\n",
1123 			program_name, auth_type, auth_name, foundprinc);
1124 			exit(1);
1125 		}
1126 		break;
1127 	default:
1128 		(void) fprintf(stderr,
1129 			"%s: error looking at cred table, NIS+ error: %s\n",
1130 			program_name, nis_sperrno(res->status));
1131 		exit(1);
1132 	}
1133 	nis_freeresult(res);
1134 	return (status);
1135 }
1136 
1137 
1138 /* Check whether this principal already has this type of credentials */
1139 static nis_error
1140 cred_exists(const char *nisprinc, const char *flavor, const char *domain)
1141 {
1142 	char sname[NIS_MAXNAMELEN+1];
1143 	nis_result	*res;
1144 	nis_error status;
1145 
1146 	snprintf(sname, NIS_MAXNAMELEN,
1147 			"[cname=\"%s\",auth_type=%s],%s.%s",
1148 			nisprinc, flavor, CRED_TABLE, domain);
1149 	if (sname[strlen(sname)-1] != '.')
1150 		strcat(sname, ".");
1151 
1152 	/* Don't want FOLLOW_PATH here */
1153 	res = nis_list(sname,
1154 				MASTER_ONLY+USE_DGRAM+NO_AUTHINFO+FOLLOW_LINKS,
1155 				NULL, NULL);
1156 
1157 	status = res->status;
1158 	switch (status) {
1159 	case NIS_NOTFOUND:
1160 		break;
1161 	case NIS_TRYAGAIN:
1162 		fprintf(stderr,
1163 			"%s: NIS+ server busy, try again later.\n",
1164 			program_name);
1165 		exit(1);
1166 		break;
1167 	case NIS_PERMISSION:
1168 		(void) fprintf(stderr,
1169 		"%s: insufficient permission to look at credentials table\n",
1170 			program_name);
1171 		exit(1);
1172 		break;
1173 	case NIS_SUCCESS:
1174 	case NIS_S_SUCCESS:
1175 		break;
1176 	default:
1177 		(void) fprintf(stderr,
1178 			"%s: error looking at cred table, NIS+ error: %s\n",
1179 			program_name, nis_sperrno(res->status));
1180 		exit(1);
1181 	}
1182 	nis_freeresult(res);
1183 	return (status);
1184 }
1185 
1186 
1187 static int
1188 modify_cred_obj(nis_object *obj, char *domain)
1189 {
1190 	int status = 0;
1191 	char sname[NIS_MAXNAMELEN+1];
1192 	nis_result	*res;
1193 
1194 	(void) sprintf(sname, "%s.%s", CRED_TABLE, domain);
1195 	res = nis_modify_entry(sname, obj, 0);
1196 	switch (res->status) {
1197 	case NIS_TRYAGAIN:
1198 		(void) fprintf(stderr,
1199 			"%s: NIS+ server busy, try again later.\n",
1200 			program_name);
1201 		exit(1);
1202 		break;
1203 	case NIS_PERMISSION:
1204 		(void) fprintf(stderr,
1205 			"%s: insufficient permission to update credentials.\n",
1206 			program_name);
1207 		exit(1);
1208 		break;
1209 	case NIS_SUCCESS:
1210 		status = 1;
1211 		break;
1212 	default:
1213 		(void) fprintf(stderr,
1214 			"%s: error modifying credential, NIS+ error: %s.\n",
1215 			program_name, nis_sperrno(res->status));
1216 		exit(1);
1217 	}
1218 	nis_freeresult(res);
1219 	return (status);
1220 }
1221 
1222 
1223 static int
1224 add_cred_obj(nis_object *obj, char *domain)
1225 {
1226 	int status = 0;
1227 	char sname[NIS_MAXNAMELEN+1];
1228 	nis_result	*res;
1229 
1230 	/* Assume check for cred_exists performed already */
1231 
1232 	(void) sprintf(sname, "%s.%s", CRED_TABLE, domain);
1233 	res = nis_add_entry(sname, obj, 0);
1234 	switch (res->status) {
1235 	case NIS_TRYAGAIN:
1236 		(void) fprintf(stderr,
1237 			"%s: NIS+ server busy, try again later.\n",
1238 			program_name);
1239 		exit(1);
1240 		break;
1241 	case NIS_PERMISSION:
1242 		(void) fprintf(stderr,
1243 			"%s: insufficient permission to update credentials.\n",
1244 			program_name);
1245 		exit(1);
1246 		break;
1247 	case NIS_SUCCESS:
1248 		status = 1;
1249 		break;
1250 	default:
1251 		(void) fprintf(stderr,
1252 			"%s: error creating credential, NIS+ error: %s.\n",
1253 			program_name, nis_sperrno(res->status));
1254 		exit(1);
1255 	}
1256 	nis_freeresult(res);
1257 	return (status);
1258 }
1259 
1260 
1261 /* Update NIS+ table with new key information */
1262 static int
1263 nisplus_update(nis_name nis_princ, char *authtype, char *public, char *crypt)
1264 {
1265 	nis_object	*obj = init_entry();
1266 	int		status;
1267 	bool_t		addition;
1268 	char		*userdomain, *cmpdomain, *domain;
1269 
1270 	if (!(userdomain = strchr(netname, '@'))) {
1271 		fprintf(stderr, "%s: invalid netname: '%s'.\n",
1272 			program_name, netname);
1273 		exit(1);
1274 	}
1275 	userdomain++;
1276 
1277 	cmpdomain = strdup(userdomain);
1278 	if (cmpdomain[strlen(cmpdomain) - 1] != '.')
1279 		strcat(cmpdomain, ".");
1280 
1281 	domain = nis_domain_of(nis_princ);
1282 	if (strcasecmp(domain, cmpdomain) != 0)
1283 		domain = nis_local_directory();
1284 
1285 	if (!sanity_checks(nis_princ, domain, authtype))
1286 		exit(1);
1287 
1288 	addition = (cred_exists(nis_princ, authtype, domain) == NIS_NOTFOUND);
1289 
1290 	ENTRY_VAL(obj, 0) = nis_princ;
1291 	ENTRY_LEN(obj, 0) = strlen(nis_princ) + 1;
1292 
1293 	ENTRY_VAL(obj, 1) = authtype;
1294 	ENTRY_LEN(obj, 1) = strlen(authtype) + 1;
1295 
1296 	ENTRY_VAL(obj, 2) = netname;
1297 	ENTRY_LEN(obj, 2) = strlen(netname) + 1;
1298 
1299 	ENTRY_VAL(obj, 3) = public;
1300 	ENTRY_LEN(obj, 3) = strlen(public) + 1;
1301 
1302 	ENTRY_VAL(obj, 4) = crypt;
1303 	ENTRY_LEN(obj, 4) = strlen(crypt) + 1;
1304 
1305 	if (addition) {
1306 		obj->zo_owner = nis_princ;
1307 		obj->zo_group = nis_local_group();
1308 		obj->zo_domain = domain;
1309 		/* owner: r, group: rmcd */
1310 		obj->zo_access = ((NIS_READ_ACC<<16)|
1311 				(NIS_READ_ACC|NIS_MODIFY_ACC|NIS_CREATE_ACC|
1312 				NIS_DESTROY_ACC)<<8);
1313 		status = add_cred_obj(obj, domain);
1314 	} else {
1315 		obj->EN_data.en_cols.en_cols_val[3].ec_flags |= EN_MODIFIED;
1316 		obj->EN_data.en_cols.en_cols_val[4].ec_flags |= EN_MODIFIED;
1317 		status = modify_cred_obj(obj, domain);
1318 	}
1319 	return (status == 1 ? 0 : 1);
1320 }
1321 
1322 
1323 void
1324 addmechtolist(char *mechtype)
1325 {
1326 	mechanism_t	**realmechlist;
1327 	int		i;
1328 
1329 	if (realmechlist = __nis_get_mechanisms(FALSE)) {
1330 		/* Match requested mech with list */
1331 		for (i = 0; realmechlist[i]; i++) {
1332 			if (realmechlist[i]->alias)
1333 				if (strcmp(realmechlist[i]->alias, mechtype)
1334 				    == 0) {
1335 					/*
1336 					 * Match, add it to the mechs.
1337 					 * Don't worry about qop or
1338 					 * secserv since they are not
1339 					 * used by chkey.
1340 					 */
1341 					numspecmech++;
1342 					if ((mechs =
1343 						(mechanism_t **)realloc(mechs,
1344 				sizeof (mechanism_t *) * (numspecmech + 1))) ==
1345 					    NULL) {
1346 						perror("Can not change keys");
1347 						exit(1);
1348 					}
1349 
1350 					if ((mechs[numspecmech - 1] =
1351 		(mechanism_t *)malloc(sizeof (mechanism_t))) == NULL) {
1352 						perror("Can not change keys");
1353 						exit(1);
1354 					}
1355 					if (realmechlist[i]->mechname)
1356 					mechs[numspecmech - 1]->mechname =
1357 					strdup(realmechlist[i]->mechname);
1358 					if (realmechlist[i]->alias)
1359 					mechs[numspecmech - 1]->alias =
1360 						strdup(realmechlist[i]->alias);
1361 					mechs[numspecmech - 1]->keylen =
1362 						realmechlist[i]->keylen;
1363 					mechs[numspecmech - 1]->algtype =
1364 						realmechlist[i]->algtype;
1365 					mechs[numspecmech] = NULL;
1366 					__nis_release_mechanisms(realmechlist);
1367 					return;
1368 				}
1369 		}
1370 
1371 		fprintf(stderr,
1372 		"WARNING: Mechanism '%s' not configured, skipping...\n",
1373 			mechtype);
1374 		__nis_release_mechanisms(realmechlist);
1375 		return;
1376 	}
1377 	fprintf(stderr,
1378 		"WARNING: Mechanism '%s' not configured, skipping...\n",
1379 		mechtype);
1380 }
1381 
1382 
1383 int
1384 main(int argc, char **argv)
1385 {
1386 	int		c, mcount;
1387 	uid_t		uid;
1388 	uid_t		orig_euid;
1389 	char		*service = NULL;
1390 	program_name = argv[0];
1391 
1392 	mechs = __nis_get_mechanisms(FALSE);
1393 
1394 	while ((c = getopt(argc, argv, "fps:m:")) != -1) {
1395 		switch (c) {
1396 		case 'f':
1397 			/*
1398 			 * Not documented as of on1093.
1399 			 * Temporarily supported
1400 			 */
1401 			force++;
1402 			break;
1403 		case 'p':
1404 			makenew = FALSE;
1405 			break;
1406 		case 's':
1407 			if (!service)
1408 				service = strdup(optarg);
1409 			else
1410 				usage();
1411 			break;
1412 		case 'm':
1413 			if (mechs && specmech == FALSE) {
1414 				__nis_release_mechanisms(mechs);
1415 				mechs = NULL;
1416 			}
1417 			specmech = TRUE;
1418 			addmechtolist(optarg);
1419 			break;
1420 		default:
1421 			usage();
1422 		}
1423 	}
1424 
1425 	if (optind < argc)
1426 		usage();
1427 
1428 	dest_service = get_pk_source(service);
1429 
1430 	if (!(netname = malloc(MAXNETNAMELEN + 1))) {
1431 		fprintf(stderr, "%s: Malloc failure.\n", program_name);
1432 		exit(1);
1433 	}
1434 	if (!__getnetnamebyuid(netname, uid = getuid())) {
1435 		fprintf(stderr, "%s: cannot generate netname for uid %d\n",
1436 			program_name, uid);
1437 		exit(1);
1438 	}
1439 	sec_domain = strdup(strchr(netname, '@') + 1);
1440 	getdomainname(local_domain, MAXNETNAMELEN);
1441 
1442 	if (makenew)
1443 		fprintf(stdout, "Generating new key for '%s'.\n", netname);
1444 	else
1445 		fprintf(stdout, "Reencrypting key for '%s'.\n", netname);
1446 
1447 	if (mechs) {
1448 		if (dest_service == PK_YP || dest_service == PK_FILES) {
1449 			fprintf(stderr,
1450 		"%s: can not add non-DES public keys to %s, skipping.\n",
1451 				program_name, service);
1452 			__nis_release_mechanisms(mechs);
1453 			mechs = NULL;
1454 			initkeylist(TRUE);
1455 		} else
1456 			initkeylist(FALSE);
1457 	} else
1458 		initkeylist(TRUE);
1459 
1460 	uid = getuid();
1461 	orig_euid = geteuid();
1462 
1463 	/* Get password information */
1464 	if ((pw = getpwuid(uid)) == NULL) {
1465 		fprintf(stderr,
1466 			"%s: Can not find passwd information for %d.\n",
1467 			program_name, uid);
1468 		exit(1);
1469 	}
1470 
1471 	/* Set eUID to user */
1472 	seteuid(uid);
1473 
1474 	/* Obtain a list of decrypted secret keys */
1475 	getsecrets();
1476 
1477 	/* Keylogin user if not already done */
1478 	if (mechs) {
1479 		int mcount;
1480 
1481 		for (mcount = 0; CURMECH; mcount++) {
1482 			keylen_t	keylen = CURMECH->keylen;
1483 			algtype_t	algtype = CURMECH->algtype;
1484 
1485 			if (!key_secretkey_is_set_g(keylen, algtype) &&
1486 			    slist[mcount]) {
1487 				keylogin(CURMECH->keylen, CURMECH->algtype);
1488 				if ((uid == 0) && (makenew == FALSE))
1489 					write_rootkey(slist[mcount],
1490 					VALID_ALIAS(CURMECH->alias) ?
1491 							CURMECH->alias :
1492 							"",
1493 							keylen, algtype);
1494 			}
1495 		}
1496 	} else {
1497 		assert(slist[0]);
1498 		if (!key_secretkey_is_set()) {
1499 			keylogin_des();
1500 			if ((uid == 0) && (makenew == FALSE))
1501 				write_rootkey(slist[0], "des", 192, 0);
1502 		}
1503 	}
1504 
1505 	/* Set eUID back to root */
1506 	(void) seteuid(orig_euid);
1507 
1508 	/*
1509 	 * Call getspnam() after the keylogin has been done so we have
1510 	 * the best chance of having read access to the encrypted pw.
1511 	 *
1512 	 * The eUID must be 0 for the getspnam() so the name service
1513 	 * switch can handle the following eUID sensitive cases:
1514 	 *
1515 	 *	files/compat:	read /etc/shadow
1516 	 *
1517 	 *	nisplus:	try to read the encrypted pw as the root
1518 	 *			principal and if that fails, and if the
1519 	 *			user's secret key is set, seteuid(user)
1520 	 *			and retry the read.
1521 	 */
1522 	if ((spw = getspnam(pw->pw_name)) == 0) {
1523 
1524 		/* Set eUID back to user */
1525 		(void) seteuid(uid);
1526 
1527 		(void) fprintf(stderr,
1528 			"%s: cannot find shadow entry for %s.\n",
1529 			program_name, pw->pw_name);
1530 		exit(1);
1531 	}
1532 
1533 	/* Set eUID back to user */
1534 	(void) seteuid(uid);
1535 
1536 	if (strcmp(spw->sp_pwdp, "*NP*") == 0) {
1537 		(void) fprintf(stderr,
1538 		"%s: do not have read access to the passwd field for %s\n",
1539 				program_name, pw->pw_name);
1540 		exit(1);
1541 	}
1542 
1543 	/*
1544 	 * force will be only supported for a while
1545 	 * 	-- it is NOT documented as of s1093
1546 	 */
1547 	if (force) {
1548 		char	*prompt = "Please enter New password:";
1549 
1550 		login_pw = getpass(prompt);
1551 		if (!login_pw || !(strlen(login_pw))) {
1552 			fprintf(stderr, "%s: key-pair(s) unchanged for %s.\n",
1553 				program_name, pw->pw_name);
1554 			exit(1);
1555 		}
1556 	} else {
1557 		/*
1558 		 * Reconsile rpc_pws and login_pw.
1559 		 *
1560 		 * This function will either return with login_pw == rpc_pw
1561 		 * (and thus, the new pw to encrypt keys) or it will exit.
1562 		 */
1563 		cmp_passwd();
1564 	}
1565 
1566 	if (makenew)
1567 		makenewkeys();
1568 	else
1569 		getpublics();
1570 
1571 	encryptkeys();
1572 
1573 	storekeys();
1574 
1575 	if (makenew) {
1576 		if (uid == 0) {
1577 			if (mechs) {
1578 				for (mcount = 0; CURMECH; mcount++) {
1579 					if (!slist[mcount])
1580 						continue;
1581 					write_rootkey(slist[mcount],
1582 							CURMECH->alias,
1583 							CURMECH->keylen,
1584 							CURMECH->algtype);
1585 				}
1586 			} else {
1587 				assert(slist[0]);
1588 				write_rootkey(slist[0], "des", 192, 0);
1589 			}
1590 		}
1591 		if (mechs) {
1592 			for (mcount = 0; CURMECH; mcount++)
1593 				keylogin(CURMECH->keylen,
1594 						CURMECH->algtype);
1595 		} else
1596 			keylogin_des();
1597 	}
1598 	return (0);
1599 }
1600