17c478bd9Sstevel@tonic-gate /*
27c478bd9Sstevel@tonic-gate * CDDL HEADER START
37c478bd9Sstevel@tonic-gate *
47c478bd9Sstevel@tonic-gate * The contents of this file are subject to the terms of the
5*a0368f78Speteh * Common Development and Distribution License (the "License").
6*a0368f78Speteh * You may not use this file except in compliance with the License.
77c478bd9Sstevel@tonic-gate *
87c478bd9Sstevel@tonic-gate * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
97c478bd9Sstevel@tonic-gate * or http://www.opensolaris.org/os/licensing.
107c478bd9Sstevel@tonic-gate * See the License for the specific language governing permissions
117c478bd9Sstevel@tonic-gate * and limitations under the License.
127c478bd9Sstevel@tonic-gate *
137c478bd9Sstevel@tonic-gate * When distributing Covered Code, include this CDDL HEADER in each
147c478bd9Sstevel@tonic-gate * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
157c478bd9Sstevel@tonic-gate * If applicable, add the following below this CDDL HEADER, with the
167c478bd9Sstevel@tonic-gate * fields enclosed by brackets "[]" replaced with your own identifying
177c478bd9Sstevel@tonic-gate * information: Portions Copyright [yyyy] [name of copyright owner]
187c478bd9Sstevel@tonic-gate *
197c478bd9Sstevel@tonic-gate * CDDL HEADER END
207c478bd9Sstevel@tonic-gate */
217c478bd9Sstevel@tonic-gate /*
22*a0368f78Speteh * Copyright 2006 Sun Microsystems, Inc. All rights reserved.
237c478bd9Sstevel@tonic-gate * Use is subject to license terms.
247c478bd9Sstevel@tonic-gate */
257c478bd9Sstevel@tonic-gate
267c478bd9Sstevel@tonic-gate /* Copyright (c) 1984, 1986, 1987, 1988, 1989 AT&T */
277c478bd9Sstevel@tonic-gate /* All Rights Reserved */
287c478bd9Sstevel@tonic-gate
297c478bd9Sstevel@tonic-gate /*
307c478bd9Sstevel@tonic-gate * University Copyright- Copyright (c) 1982, 1986, 1988
317c478bd9Sstevel@tonic-gate * The Regents of the University of California
327c478bd9Sstevel@tonic-gate * All Rights Reserved
337c478bd9Sstevel@tonic-gate *
347c478bd9Sstevel@tonic-gate * University Acknowledgment- Portions of this document are derived from
357c478bd9Sstevel@tonic-gate * software developed by the University of California, Berkeley, and its
367c478bd9Sstevel@tonic-gate * contributors.
377c478bd9Sstevel@tonic-gate */
387c478bd9Sstevel@tonic-gate
397c478bd9Sstevel@tonic-gate #pragma ident "%Z%%M% %I% %E% SMI"
407c478bd9Sstevel@tonic-gate
417c478bd9Sstevel@tonic-gate /*
427c478bd9Sstevel@tonic-gate * Set secret key on local machine
437c478bd9Sstevel@tonic-gate */
447c478bd9Sstevel@tonic-gate #include <stdio.h>
457c478bd9Sstevel@tonic-gate #include <rpc/rpc.h>
467c478bd9Sstevel@tonic-gate #include <rpc/key_prot.h>
477c478bd9Sstevel@tonic-gate #include <nfs/nfs.h> /* to revoke existing creds */
487c478bd9Sstevel@tonic-gate #include <nfs/nfssys.h>
497c478bd9Sstevel@tonic-gate #include <string.h>
507c478bd9Sstevel@tonic-gate #include <rpcsvc/nis_dhext.h>
517c478bd9Sstevel@tonic-gate
527c478bd9Sstevel@tonic-gate #define ROOTKEY_FILE "/etc/.rootkey"
537c478bd9Sstevel@tonic-gate #define ROOTKEY_FILE_BACKUP "/etc/.rootkey.bak"
547c478bd9Sstevel@tonic-gate /* Should last until 16384-bit DH keys */
557c478bd9Sstevel@tonic-gate #define MAXROOTKEY_LINE_LEN 4224
567c478bd9Sstevel@tonic-gate #define MAXROOTKEY_LEN 4096
577c478bd9Sstevel@tonic-gate
587c478bd9Sstevel@tonic-gate extern int key_setnet_g();
597c478bd9Sstevel@tonic-gate
607c478bd9Sstevel@tonic-gate static void logout_curr_key();
617c478bd9Sstevel@tonic-gate static int mkrootkey;
627c478bd9Sstevel@tonic-gate
637c478bd9Sstevel@tonic-gate static char *sec_domain = NULL;
647c478bd9Sstevel@tonic-gate static char local_domain[MAXNETNAMELEN + 1];
657c478bd9Sstevel@tonic-gate
667c478bd9Sstevel@tonic-gate /*
677c478bd9Sstevel@tonic-gate * fgets is broken in that if it reads a NUL character it will always return
687c478bd9Sstevel@tonic-gate * EOF. This replacement can deal with NULs
697c478bd9Sstevel@tonic-gate */
707c478bd9Sstevel@tonic-gate static char *
fgets_ignorenul(char * s,int n,FILE * stream)717c478bd9Sstevel@tonic-gate fgets_ignorenul(char *s, int n, FILE *stream)
727c478bd9Sstevel@tonic-gate {
737c478bd9Sstevel@tonic-gate int fildes = fileno(stream);
747c478bd9Sstevel@tonic-gate int i = 0;
757c478bd9Sstevel@tonic-gate int rs = 0;
767c478bd9Sstevel@tonic-gate char c;
777c478bd9Sstevel@tonic-gate
787c478bd9Sstevel@tonic-gate if (fildes < 0)
797c478bd9Sstevel@tonic-gate return (NULL);
807c478bd9Sstevel@tonic-gate
817c478bd9Sstevel@tonic-gate while (i < n - 1) {
827c478bd9Sstevel@tonic-gate rs = read(fildes, &c, 1);
837c478bd9Sstevel@tonic-gate switch (rs) {
847c478bd9Sstevel@tonic-gate case 1:
857c478bd9Sstevel@tonic-gate break;
867c478bd9Sstevel@tonic-gate case 0:
877c478bd9Sstevel@tonic-gate /* EOF */
887c478bd9Sstevel@tonic-gate if (i > 0)
897c478bd9Sstevel@tonic-gate s[i] = '\0';
907c478bd9Sstevel@tonic-gate return (NULL);
917c478bd9Sstevel@tonic-gate break;
927c478bd9Sstevel@tonic-gate default:
937c478bd9Sstevel@tonic-gate return (NULL);
947c478bd9Sstevel@tonic-gate }
957c478bd9Sstevel@tonic-gate switch (c) {
967c478bd9Sstevel@tonic-gate case '\0':
977c478bd9Sstevel@tonic-gate break;
987c478bd9Sstevel@tonic-gate case '\n':
997c478bd9Sstevel@tonic-gate s[i] = c;
1007c478bd9Sstevel@tonic-gate s[++i] = '\0';
1017c478bd9Sstevel@tonic-gate return (s);
1027c478bd9Sstevel@tonic-gate default:
1037c478bd9Sstevel@tonic-gate if (c != '\0')
1047c478bd9Sstevel@tonic-gate s[i++] = c;
1057c478bd9Sstevel@tonic-gate }
1067c478bd9Sstevel@tonic-gate }
1077c478bd9Sstevel@tonic-gate s[i] = '\0';
1087c478bd9Sstevel@tonic-gate return (s);
1097c478bd9Sstevel@tonic-gate }
1107c478bd9Sstevel@tonic-gate
1117c478bd9Sstevel@tonic-gate
1127c478bd9Sstevel@tonic-gate /* write unencrypted secret key into root key file */
1137c478bd9Sstevel@tonic-gate static void
write_rootkey(char * secret,char * flavor,keylen_t keylen,algtype_t algtype)1147c478bd9Sstevel@tonic-gate write_rootkey(char *secret, char *flavor, keylen_t keylen, algtype_t algtype)
1157c478bd9Sstevel@tonic-gate {
1167c478bd9Sstevel@tonic-gate char line[MAXROOTKEY_LINE_LEN];
1177c478bd9Sstevel@tonic-gate char keyent[MAXROOTKEY_LEN];
1187c478bd9Sstevel@tonic-gate algtype_t atent;
1197c478bd9Sstevel@tonic-gate int rootfd, bakfd, hexkeybytes;
1207c478bd9Sstevel@tonic-gate bool_t lineone = TRUE;
1217c478bd9Sstevel@tonic-gate bool_t gotit = FALSE;
1227c478bd9Sstevel@tonic-gate FILE *rootfile, *bakfile;
1237c478bd9Sstevel@tonic-gate
1247c478bd9Sstevel@tonic-gate unlink(ROOTKEY_FILE_BACKUP);
1257c478bd9Sstevel@tonic-gate if ((rename(ROOTKEY_FILE, ROOTKEY_FILE_BACKUP)) < 0) {
1267c478bd9Sstevel@tonic-gate if ((bakfd = creat(ROOTKEY_FILE_BACKUP, 0600)) < 0) {
1277c478bd9Sstevel@tonic-gate perror("Could not create /etc/.rootkey.bak");
1287c478bd9Sstevel@tonic-gate goto rootkey_err;
1297c478bd9Sstevel@tonic-gate }
1307c478bd9Sstevel@tonic-gate close(bakfd);
1317c478bd9Sstevel@tonic-gate }
1327c478bd9Sstevel@tonic-gate
1337c478bd9Sstevel@tonic-gate if ((rootfd = open(ROOTKEY_FILE, O_WRONLY+O_CREAT, 0600)) < 0) {
1347c478bd9Sstevel@tonic-gate perror("Could not open /etc/.rootkey for writing");
1357c478bd9Sstevel@tonic-gate fprintf(stderr,
1367c478bd9Sstevel@tonic-gate "Attempting to restore original /etc/.rootkey\n");
1377c478bd9Sstevel@tonic-gate (void) rename(ROOTKEY_FILE_BACKUP, ROOTKEY_FILE);
1387c478bd9Sstevel@tonic-gate goto rootkey_err;
1397c478bd9Sstevel@tonic-gate }
1407c478bd9Sstevel@tonic-gate if (!(rootfile = fdopen(rootfd, "w"))) {
1417c478bd9Sstevel@tonic-gate perror("Could not open /etc/.rootkey for writing");
1427c478bd9Sstevel@tonic-gate fprintf(stderr,
1437c478bd9Sstevel@tonic-gate "Attempting to restore original /etc/.rootkey\n");
1447c478bd9Sstevel@tonic-gate close(rootfd);
1457c478bd9Sstevel@tonic-gate unlink(ROOTKEY_FILE);
1467c478bd9Sstevel@tonic-gate rename(ROOTKEY_FILE_BACKUP, ROOTKEY_FILE);
1477c478bd9Sstevel@tonic-gate goto rootkey_err;
1487c478bd9Sstevel@tonic-gate }
1497c478bd9Sstevel@tonic-gate if (!(bakfile = fopen(ROOTKEY_FILE_BACKUP, "r"))) {
1507c478bd9Sstevel@tonic-gate perror("Could not open /etc/.rootkey.bak for reading");
1517c478bd9Sstevel@tonic-gate fprintf(stderr,
1527c478bd9Sstevel@tonic-gate "Attempting to restore original /etc/.rootkey\n");
1537c478bd9Sstevel@tonic-gate (void) fclose(rootfile);
1547c478bd9Sstevel@tonic-gate unlink(ROOTKEY_FILE);
1557c478bd9Sstevel@tonic-gate rename(ROOTKEY_FILE_BACKUP, ROOTKEY_FILE);
1567c478bd9Sstevel@tonic-gate goto rootkey_err;
1577c478bd9Sstevel@tonic-gate }
1587c478bd9Sstevel@tonic-gate
1597c478bd9Sstevel@tonic-gate hexkeybytes = ((keylen + 7) / 8) * 2;
1607c478bd9Sstevel@tonic-gate
1617c478bd9Sstevel@tonic-gate while (fgets_ignorenul(line, MAXROOTKEY_LINE_LEN, bakfile)) {
162*a0368f78Speteh if (sscanf(line, "%s %d", keyent, &atent) < 2) {
163*a0368f78Speteh /*
164*a0368f78Speteh * No encryption algorithm found in the file
165*a0368f78Speteh * (atent) so default to DES.
166*a0368f78Speteh */
167*a0368f78Speteh atent = AUTH_DES_ALGTYPE;
168*a0368f78Speteh }
1697c478bd9Sstevel@tonic-gate /*
1707c478bd9Sstevel@tonic-gate * 192-bit keys always go on the first line
1717c478bd9Sstevel@tonic-gate */
1727c478bd9Sstevel@tonic-gate if (lineone) {
1737c478bd9Sstevel@tonic-gate lineone = FALSE;
1747c478bd9Sstevel@tonic-gate if (keylen == 192) {
1757c478bd9Sstevel@tonic-gate gotit = TRUE;
1767c478bd9Sstevel@tonic-gate fprintf(rootfile, "%s\n", secret);
1777c478bd9Sstevel@tonic-gate } else
1787c478bd9Sstevel@tonic-gate fprintf(rootfile, "%s", line);
1797c478bd9Sstevel@tonic-gate (void) fflush(rootfile);
1807c478bd9Sstevel@tonic-gate } else {
1817c478bd9Sstevel@tonic-gate if ((strlen(keyent) == hexkeybytes) &&
1827c478bd9Sstevel@tonic-gate (atent == algtype)) {
1837c478bd9Sstevel@tonic-gate /*
1847c478bd9Sstevel@tonic-gate * Silently remove lines with the same
1857c478bd9Sstevel@tonic-gate * keylen/algtype
1867c478bd9Sstevel@tonic-gate */
1877c478bd9Sstevel@tonic-gate if (gotit)
1887c478bd9Sstevel@tonic-gate continue;
1897c478bd9Sstevel@tonic-gate else
1907c478bd9Sstevel@tonic-gate gotit = TRUE;
1917c478bd9Sstevel@tonic-gate
1927c478bd9Sstevel@tonic-gate fprintf(rootfile, "%s %d\n", secret, algtype);
1937c478bd9Sstevel@tonic-gate } else
1947c478bd9Sstevel@tonic-gate fprintf(rootfile, "%s", line);
1957c478bd9Sstevel@tonic-gate (void) fflush(rootfile);
1967c478bd9Sstevel@tonic-gate }
1977c478bd9Sstevel@tonic-gate }
1987c478bd9Sstevel@tonic-gate
1997c478bd9Sstevel@tonic-gate /* Append key to rootkey file */
2007c478bd9Sstevel@tonic-gate if (!gotit) {
2017c478bd9Sstevel@tonic-gate if (keylen == 192)
2027c478bd9Sstevel@tonic-gate fprintf(rootfile, "%s\n", secret);
2037c478bd9Sstevel@tonic-gate else {
2047c478bd9Sstevel@tonic-gate if (lineone)
2057c478bd9Sstevel@tonic-gate fprintf(rootfile, "\n");
2067c478bd9Sstevel@tonic-gate fprintf(rootfile, "%s %d\n", secret, algtype);
2077c478bd9Sstevel@tonic-gate }
2087c478bd9Sstevel@tonic-gate }
2097c478bd9Sstevel@tonic-gate (void) fflush(rootfile);
2107c478bd9Sstevel@tonic-gate fclose(rootfile);
2117c478bd9Sstevel@tonic-gate fclose(bakfile);
2127c478bd9Sstevel@tonic-gate unlink(ROOTKEY_FILE_BACKUP);
2137c478bd9Sstevel@tonic-gate if (keylen == 192)
2147c478bd9Sstevel@tonic-gate fprintf(stderr, "Wrote secret key into %s\n", ROOTKEY_FILE);
2157c478bd9Sstevel@tonic-gate else
2167c478bd9Sstevel@tonic-gate fprintf(stderr, "Wrote %s key into %s\n", flavor,
2177c478bd9Sstevel@tonic-gate ROOTKEY_FILE);
2187c478bd9Sstevel@tonic-gate return;
2197c478bd9Sstevel@tonic-gate
2207c478bd9Sstevel@tonic-gate rootkey_err:
2217c478bd9Sstevel@tonic-gate fprintf(stderr, "WARNING: Could not write %s key to /etc/.rootkey\n",
2227c478bd9Sstevel@tonic-gate flavor);
2237c478bd9Sstevel@tonic-gate }
2247c478bd9Sstevel@tonic-gate
2257c478bd9Sstevel@tonic-gate /* Perform AUTH_DES keylogin */
2267c478bd9Sstevel@tonic-gate static int
oldkeylogin(char * fullname,char * pass)2277c478bd9Sstevel@tonic-gate oldkeylogin(char *fullname, char *pass)
2287c478bd9Sstevel@tonic-gate {
2297c478bd9Sstevel@tonic-gate char secret[HEXKEYBYTES+1];
2307c478bd9Sstevel@tonic-gate struct key_netstarg netst;
2317c478bd9Sstevel@tonic-gate
2327c478bd9Sstevel@tonic-gate if (getsecretkey(fullname, secret, pass) == 0) {
2337c478bd9Sstevel@tonic-gate fprintf(stderr, "Could not find %s's secret key\n",
2347c478bd9Sstevel@tonic-gate fullname);
2357c478bd9Sstevel@tonic-gate if (sec_domain && *sec_domain &&
2367c478bd9Sstevel@tonic-gate strcasecmp(sec_domain, local_domain)) {
2377c478bd9Sstevel@tonic-gate fprintf(stderr,
2387c478bd9Sstevel@tonic-gate "The system default domain '%s' is different from the Secure RPC\n\
2397c478bd9Sstevel@tonic-gate domain %s where the key is stored. The Secure RPC domainname is\n\
2407c478bd9Sstevel@tonic-gate defined by the directory object stored in the /var/nis/NIS_COLD_START file.\n\
2417c478bd9Sstevel@tonic-gate If you need to change this Secure RPC domainname, please use the nisinit(1M)\n\
2427c478bd9Sstevel@tonic-gate command with the `-k` option.\n", local_domain, sec_domain);
2437c478bd9Sstevel@tonic-gate } else {
2447c478bd9Sstevel@tonic-gate fprintf(stderr,
2457c478bd9Sstevel@tonic-gate "Make sure the secret key is stored in domain %s\n",
2467c478bd9Sstevel@tonic-gate local_domain);
2477c478bd9Sstevel@tonic-gate }
2487c478bd9Sstevel@tonic-gate return (1);
2497c478bd9Sstevel@tonic-gate }
2507c478bd9Sstevel@tonic-gate
2517c478bd9Sstevel@tonic-gate if (secret[0] == 0) {
2527c478bd9Sstevel@tonic-gate fprintf(stderr, "Password incorrect for %s\n",
2537c478bd9Sstevel@tonic-gate fullname);
2547c478bd9Sstevel@tonic-gate return (1);
2557c478bd9Sstevel@tonic-gate }
2567c478bd9Sstevel@tonic-gate /* revoke any existing (lingering) credentials... */
2577c478bd9Sstevel@tonic-gate logout_curr_key();
2587c478bd9Sstevel@tonic-gate
2597c478bd9Sstevel@tonic-gate memcpy(netst.st_priv_key, secret, HEXKEYBYTES);
2607c478bd9Sstevel@tonic-gate memset(secret, 0, HEXKEYBYTES);
2617c478bd9Sstevel@tonic-gate
2627c478bd9Sstevel@tonic-gate netst.st_pub_key[0] = 0;
2637c478bd9Sstevel@tonic-gate netst.st_netname = strdup(fullname);
2647c478bd9Sstevel@tonic-gate
2657c478bd9Sstevel@tonic-gate /* do actual key login */
2667c478bd9Sstevel@tonic-gate if (key_setnet(&netst) < 0) {
2677c478bd9Sstevel@tonic-gate fprintf(stderr, "Could not set %s's secret key\n",
2687c478bd9Sstevel@tonic-gate fullname);
2697c478bd9Sstevel@tonic-gate fprintf(stderr, "May be the keyserv is down?\n");
2707c478bd9Sstevel@tonic-gate if (mkrootkey == 0) /* nothing else to do */
2717c478bd9Sstevel@tonic-gate return (1);
2727c478bd9Sstevel@tonic-gate }
2737c478bd9Sstevel@tonic-gate
2747c478bd9Sstevel@tonic-gate /* write unencrypted secret key into root key file */
2757c478bd9Sstevel@tonic-gate if (mkrootkey)
2767c478bd9Sstevel@tonic-gate write_rootkey(netst.st_priv_key, "des", 192, 0);
2777c478bd9Sstevel@tonic-gate
2787c478bd9Sstevel@tonic-gate return (0);
2797c478bd9Sstevel@tonic-gate }
2807c478bd9Sstevel@tonic-gate
2817c478bd9Sstevel@tonic-gate /*
2827c478bd9Sstevel@tonic-gate * Revokes the existing credentials for Secure-RPC and Secure-NFS.
2837c478bd9Sstevel@tonic-gate * This should only be called if the user entered the correct password;
2847c478bd9Sstevel@tonic-gate * sorta like the way "su" doesn't force a login if you enter the wrong
2857c478bd9Sstevel@tonic-gate * password.
2867c478bd9Sstevel@tonic-gate */
2877c478bd9Sstevel@tonic-gate
2887c478bd9Sstevel@tonic-gate static void
logout_curr_key()2897c478bd9Sstevel@tonic-gate logout_curr_key()
2907c478bd9Sstevel@tonic-gate {
2917c478bd9Sstevel@tonic-gate static char secret[HEXKEYBYTES + 1];
2927c478bd9Sstevel@tonic-gate struct nfs_revauth_args nra;
2937c478bd9Sstevel@tonic-gate
2947c478bd9Sstevel@tonic-gate /*
2957c478bd9Sstevel@tonic-gate * try to revoke the existing key/credentials, assuming
2967c478bd9Sstevel@tonic-gate * one exists. this will effectively mark "stale" any
2977c478bd9Sstevel@tonic-gate * cached credientials...
2987c478bd9Sstevel@tonic-gate */
2997c478bd9Sstevel@tonic-gate if (key_setsecret(secret) < 0) {
3007c478bd9Sstevel@tonic-gate return;
3017c478bd9Sstevel@tonic-gate }
3027c478bd9Sstevel@tonic-gate
3037c478bd9Sstevel@tonic-gate /*
3047c478bd9Sstevel@tonic-gate * it looks like a credential already existed, so try and
3057c478bd9Sstevel@tonic-gate * revoke any lingering Secure-NFS privledges.
3067c478bd9Sstevel@tonic-gate */
3077c478bd9Sstevel@tonic-gate
3087c478bd9Sstevel@tonic-gate nra.authtype = AUTH_DES;
3097c478bd9Sstevel@tonic-gate nra.uid = getuid();
3107c478bd9Sstevel@tonic-gate
3117c478bd9Sstevel@tonic-gate (void) _nfssys(NFS_REVAUTH, &nra);
3127c478bd9Sstevel@tonic-gate }
3137c478bd9Sstevel@tonic-gate
3147c478bd9Sstevel@tonic-gate void
usage(cmd)3157c478bd9Sstevel@tonic-gate usage(cmd)
3167c478bd9Sstevel@tonic-gate char *cmd;
3177c478bd9Sstevel@tonic-gate {
3187c478bd9Sstevel@tonic-gate fprintf(stderr, "usage: %s [-r]\n", cmd);
3197c478bd9Sstevel@tonic-gate exit(1);
3207c478bd9Sstevel@tonic-gate }
3217c478bd9Sstevel@tonic-gate
3227c478bd9Sstevel@tonic-gate
32349e7ca49Speteh int
main(int argc,char * argv[])32449e7ca49Speteh main(int argc, char *argv[])
3257c478bd9Sstevel@tonic-gate {
3267c478bd9Sstevel@tonic-gate char secret[4096];
3277c478bd9Sstevel@tonic-gate char fullname[MAXNETNAMELEN + 1];
3287c478bd9Sstevel@tonic-gate char *getpass();
3297c478bd9Sstevel@tonic-gate char *pass;
3307c478bd9Sstevel@tonic-gate int i = 0;
3317c478bd9Sstevel@tonic-gate mechanism_t **mechlist;
3327c478bd9Sstevel@tonic-gate
3337c478bd9Sstevel@tonic-gate if (argc == 1)
3347c478bd9Sstevel@tonic-gate mkrootkey = 0;
3357c478bd9Sstevel@tonic-gate else if (argc == 2 && (strcmp(argv[1], "-r") == 0)) {
3367c478bd9Sstevel@tonic-gate if (geteuid() != 0) {
3377c478bd9Sstevel@tonic-gate fprintf(stderr, "Must be root to use -r option.\n");
3387c478bd9Sstevel@tonic-gate exit(1);
3397c478bd9Sstevel@tonic-gate }
3407c478bd9Sstevel@tonic-gate mkrootkey = 1;
3417c478bd9Sstevel@tonic-gate } else
3427c478bd9Sstevel@tonic-gate usage(argv[0]);
3437c478bd9Sstevel@tonic-gate
3447c478bd9Sstevel@tonic-gate if (getnetname(fullname) == 0) {
3457c478bd9Sstevel@tonic-gate fprintf(stderr, "Could not generate netname\n");
3467c478bd9Sstevel@tonic-gate exit(1);
3477c478bd9Sstevel@tonic-gate }
3487c478bd9Sstevel@tonic-gate sec_domain = strdup(strchr(fullname, '@') + 1);
3497c478bd9Sstevel@tonic-gate getdomainname(local_domain, MAXNETNAMELEN);
3507c478bd9Sstevel@tonic-gate
3517c478bd9Sstevel@tonic-gate if (!(pass = getpass("Password:")))
3527c478bd9Sstevel@tonic-gate exit(1);
3537c478bd9Sstevel@tonic-gate
3547c478bd9Sstevel@tonic-gate if (mechlist = __nis_get_mechanisms(FALSE)) {
3557c478bd9Sstevel@tonic-gate while (mechlist[i]) {
3567c478bd9Sstevel@tonic-gate char *alias;
3577c478bd9Sstevel@tonic-gate
3587c478bd9Sstevel@tonic-gate if (AUTH_DES_COMPAT_CHK(mechlist[i])) {
3597c478bd9Sstevel@tonic-gate (void) oldkeylogin(fullname, pass);
3607c478bd9Sstevel@tonic-gate i++;
3617c478bd9Sstevel@tonic-gate continue;
3627c478bd9Sstevel@tonic-gate }
3637c478bd9Sstevel@tonic-gate
3647c478bd9Sstevel@tonic-gate if (VALID_ALIAS(mechlist[i]->alias))
3657c478bd9Sstevel@tonic-gate alias = mechlist[i]->alias;
3667c478bd9Sstevel@tonic-gate else
3677c478bd9Sstevel@tonic-gate alias = "";
3687c478bd9Sstevel@tonic-gate
3697c478bd9Sstevel@tonic-gate if (getsecretkey_g(fullname, mechlist[i]->keylen,
3707c478bd9Sstevel@tonic-gate mechlist[i]->algtype, secret,
3717c478bd9Sstevel@tonic-gate (((mechlist[i]->keylen / 7) +
3727c478bd9Sstevel@tonic-gate 8) * 2) + 1, pass) == 0) {
3737c478bd9Sstevel@tonic-gate fprintf(stderr,
3747c478bd9Sstevel@tonic-gate "WARNING: Could not find %s's %s secret key\n",
3757c478bd9Sstevel@tonic-gate fullname, alias);
3767c478bd9Sstevel@tonic-gate i++;
3777c478bd9Sstevel@tonic-gate continue;
3787c478bd9Sstevel@tonic-gate }
3797c478bd9Sstevel@tonic-gate
3807c478bd9Sstevel@tonic-gate if (secret[0] == 0) {
3817c478bd9Sstevel@tonic-gate fprintf(stderr,
3827c478bd9Sstevel@tonic-gate "Password incorrect for %s's %s key.\n",
3837c478bd9Sstevel@tonic-gate fullname, alias);
3847c478bd9Sstevel@tonic-gate i++;
3857c478bd9Sstevel@tonic-gate continue;
3867c478bd9Sstevel@tonic-gate }
3877c478bd9Sstevel@tonic-gate
3887c478bd9Sstevel@tonic-gate if (key_setnet_g(fullname, secret,
3897c478bd9Sstevel@tonic-gate mechlist[i]->keylen, NULL, 0,
3907c478bd9Sstevel@tonic-gate mechlist[i]->algtype) < 0) {
3917c478bd9Sstevel@tonic-gate fprintf(stderr,
3927c478bd9Sstevel@tonic-gate "Could not set %s's %s secret key\n",
3937c478bd9Sstevel@tonic-gate fullname, alias);
3947c478bd9Sstevel@tonic-gate fprintf(stderr,
3957c478bd9Sstevel@tonic-gate "May be the keyserv is down?\n");
3967c478bd9Sstevel@tonic-gate exit(1);
3977c478bd9Sstevel@tonic-gate }
3987c478bd9Sstevel@tonic-gate
3997c478bd9Sstevel@tonic-gate if (mkrootkey)
4007c478bd9Sstevel@tonic-gate write_rootkey(secret, mechlist[i]->alias,
4017c478bd9Sstevel@tonic-gate mechlist[i]->keylen,
4027c478bd9Sstevel@tonic-gate mechlist[i]->algtype);
4037c478bd9Sstevel@tonic-gate i++;
4047c478bd9Sstevel@tonic-gate }
4057c478bd9Sstevel@tonic-gate } else
4067c478bd9Sstevel@tonic-gate exit(oldkeylogin(fullname, pass));
4077c478bd9Sstevel@tonic-gate
40849e7ca49Speteh return (0);
4097c478bd9Sstevel@tonic-gate }
410