xref: /titanic_51/usr/src/cmd/krb5/kadmin/cli/kadmin.c (revision bfed486ad8de8b8ebc6345a8e10accae08bf2f45)
1 /*
2  * Copyright 2008 Sun Microsystems, Inc.  All rights reserved.
3  * Use is subject to license terms.
4  */
5 
6 
7 /*
8  * Copyright 1994 by the Massachusetts Institute of Technology.
9  * All Rights Reserved.
10  *
11  * Export of this software from the United States of America may
12  *   require a specific license from the United States Government.
13  *   It is the responsibility of any person or organization contemplating
14  *   export to obtain such a license before exporting.
15  *
16  * WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
17  * distribute this software and its documentation for any purpose and
18  * without fee is hereby granted, provided that the above copyright
19  * notice appear in all copies and that both that copyright notice and
20  * this permission notice appear in supporting documentation, and that
21  * the name of M.I.T. not be used in advertising or publicity pertaining
22  * to distribution of the software without specific, written prior
23  * permission.  Furthermore if you modify this software you must label
24  * your software as modified software and not distribute it in such a
25  * fashion that it might be confused with the original M.I.T. software.
26  * M.I.T. makes no representations about the suitability of
27  * this software for any purpose.  It is provided "as is" without express
28  * or implied warranty.
29  *
30  * kadmin.c: base functions for a kadmin command line interface using
31  * the OVSecure library
32  */
33 
34 #include <kadm5/admin.h>
35 #include <krb5/adm_proto.h>
36 #include <stdio.h>
37 #include <string.h>
38 #include <sys/types.h>
39 #include <math.h>
40 #include <unistd.h>
41 #include <pwd.h>
42 /* #include <sys/timeb.h> */
43 #include <time.h>
44 #include "kadmin.h"
45 #include <libintl.h>
46 #include <krb5.h>
47 
48 /*
49  * Solaris:  the following are needed for paging
50  */
51 #include <signal.h>
52 #include <sys/wait.h>
53 
54 /* command name when called "locally" (i.e. non-networked client ) */
55 #define KADMIN_LOCAL_NAME "kadmin.local"
56 
57 /* functions defined in remote/local specific files */
58 extern void usage(const char *);
59 
60 /* special struct to convert flag names for principals
61    to actual krb5_flags for a principal */
62 struct pflag {
63     char *flagname;		/* name of flag as typed to CLI */
64     int flaglen;		/* length of string (not counting -,+) */
65     krb5_flags theflag;		/* actual principal flag to set/clear */
66     int set;			/* 0 means clear, 1 means set (on '-') */
67 };
68 
69 static struct pflag flags[] = {
70 {"allow_postdated",	15,	KRB5_KDB_DISALLOW_POSTDATED,	1},
71 {"allow_forwardable",	17,	KRB5_KDB_DISALLOW_FORWARDABLE,	1},
72 {"allow_tgs_req",	13,	KRB5_KDB_DISALLOW_TGT_BASED,	1},
73 {"allow_renewable",	15,	KRB5_KDB_DISALLOW_RENEWABLE,	1},
74 {"allow_proxiable",	15,	KRB5_KDB_DISALLOW_PROXIABLE,	1},
75 {"allow_dup_skey",	14,	KRB5_KDB_DISALLOW_DUP_SKEY,	1},
76 {"allow_tix",		9,	KRB5_KDB_DISALLOW_ALL_TIX,	1},
77 {"requires_preauth",	16,	KRB5_KDB_REQUIRES_PRE_AUTH,	0},
78 {"requires_hwauth",	15,	KRB5_KDB_REQUIRES_HW_AUTH,	0},
79 {"needchange", 10,	KRB5_KDB_REQUIRES_PWCHANGE,	0},
80 {"allow_svr", 9,	KRB5_KDB_DISALLOW_SVR, 1},
81 {"password_changing_service",	25,	KRB5_KDB_PWCHANGE_SERVICE,	0 },
82 {"support_desmd5",	14,	KRB5_KDB_SUPPORT_DESMD5,	0 }
83 };
84 
85 static char *prflags[] = {
86     "DISALLOW_POSTDATED",	/* 0x00000001 */
87     "DISALLOW_FORWARDABLE",	/* 0x00000002 */
88     "DISALLOW_TGT_BASED",	/* 0x00000004 */
89     "DISALLOW_RENEWABLE",	/* 0x00000008 */
90     "DISALLOW_PROXIABLE",	/* 0x00000010 */
91     "DISALLOW_DUP_SKEY",	/* 0x00000020 */
92     "DISALLOW_ALL_TIX",		/* 0x00000040 */
93     "REQUIRES_PRE_AUTH",	/* 0x00000080 */
94     "REQUIRES_HW_AUTH",		/* 0x00000100 */
95     "REQUIRES_PWCHANGE",	/* 0x00000200 */
96     "UNKNOWN_0x00000400",	/* 0x00000400 */
97     "UNKNOWN_0x00000800",	/* 0x00000800 */
98     "DISALLOW_SVR",		/* 0x00001000 */
99     "PWCHANGE_SERVICE",		/* 0x00002000 */
100     "SUPPORT_DESMD5",		/* 0x00004000 */
101     "NEW_PRINC",		/* 0x00008000 */
102 };
103 
104 char *getenv();
105 int exit_status = 0;
106 char *def_realm = NULL;
107 char *whoami = NULL;
108 
109 void *handle = NULL;
110 krb5_context context;
111 char *ccache_name = NULL;
112 
113 int locked = 0;
114 static char *strdur(duration)
115     time_t duration;
116 {
117     static char out[50];
118     int neg, days, hours, minutes, seconds;
119 
120     if (duration < 0) {
121 	duration *= -1;
122 	neg = 1;
123     } else
124 	neg = 0;
125     days = duration / (24 * 3600);
126     duration %= 24 * 3600;
127     hours = duration / 3600;
128     duration %= 3600;
129     minutes = duration / 60;
130     duration %= 60;
131     seconds = duration;
132     snprintf(out, sizeof (out), "%s%d %s %02d:%02d:%02d", neg ? "-" : "",
133 	    days, days == 1 ? gettext("day") : gettext("days"),
134 	    hours, minutes, seconds);
135     return out;
136 }
137 
138 static char *strdate(when)
139     krb5_timestamp when;
140 {
141     struct tm *tm;
142     static char out[40];
143 
144     time_t lcltim = when;
145     tm = localtime(&lcltim);
146     strftime(out, sizeof(out), gettext("%a %b %d %H:%M:%S %Z %Y"), tm);
147     return out;
148 }
149 
150 /* this is a wrapper to go around krb5_parse_principal so we can set
151    the default realm up properly */
152 static krb5_error_code
153 kadmin_parse_name(name, principal)
154     char *name;
155     krb5_principal *principal;
156 {
157     char *cp, *fullname;
158     krb5_error_code retval;
159 
160     if (name == NULL)
161 	return (EINVAL);
162 
163     /* assumes def_realm is initialized! */
164     fullname = (char *)malloc(strlen(name) + 1 + strlen(def_realm) + 1);
165     if (fullname == NULL)
166 	return ENOMEM;
167     strcpy(fullname, name);
168     cp = strchr(fullname, '@');
169     while (cp) {
170 	if (cp - fullname && *(cp - 1) != '\\')
171 	    break;
172 	else
173 	    cp = strchr(cp + 1, '@');
174     }
175     if (cp == NULL) {
176 	strcat(fullname, "@");
177 	strcat(fullname, def_realm);
178     }
179     retval = krb5_parse_name(context, fullname, principal);
180     free(fullname);
181     return retval;
182 }
183 
184 static void extended_com_err_fn (const char *myprog, errcode_t code,
185 				 const char *fmt, va_list args)
186 {
187     if (code) {
188 	const char *emsg;
189 	emsg = krb5_get_error_message (context, code);
190 	fprintf (stderr, "%s: %s ", myprog, emsg);
191 	krb5_free_error_message (context, emsg);
192     } else {
193 	fprintf (stderr, "%s: ", myprog);
194     }
195     vfprintf (stderr, fmt, args);
196     fprintf (stderr, "\n");
197 }
198 char *kadmin_startup(argc, argv)
199     int argc;
200     char *argv[];
201 {
202     extern char *optarg;
203     char *princstr = NULL, *keytab_name = NULL, *query = NULL;
204     char *password = NULL;
205     char *luser, *canon, *cp;
206     int optchar, freeprinc = 0, use_keytab = 0;
207     struct passwd *pw;
208     kadm5_ret_t retval;
209     krb5_ccache cc;
210     krb5_principal princ;
211     kadm5_config_params params;
212     char **db_args = NULL;
213     int db_args_size = 0;
214     char *db_name = NULL;
215     char *svcname = NULL;
216 
217     memset((char *) &params, 0, sizeof(params));
218 
219     if (strcmp (whoami, "kadmin.local") == 0)
220 	set_com_err_hook(extended_com_err_fn);
221 
222     retval = kadm5_init_krb5_context(&context);
223     if (retval) {
224 	com_err(whoami, retval, gettext("while initializing krb5 library"));
225 	exit(1);
226     }
227 
228     while ((optchar = getopt(argc, argv, "x:r:p:kq:w:d:s:mc:t:e:ON")) != EOF) {
229 	switch (optchar) {
230 	case 'x':
231 	    db_args_size++;
232 	    {
233 		char **temp = realloc(db_args, sizeof(char*) * (db_args_size+1));
234 		if (temp == NULL) {
235 		    fprintf(stderr, gettext("%s: Cannot initialize. Not enough memory\n"),
236 			    argv[0]);
237 		    exit(1);
238 		}
239 
240 		db_args = temp;
241 	    }
242 	    db_args[db_args_size-1] = optarg;
243 	    db_args[db_args_size]   = NULL;
244 	    break;
245 
246 	case 'r':
247 	    def_realm = optarg;
248 	    break;
249 	case 'p':
250 	    princstr = optarg;
251 	    break;
252 	case 'c':
253 	    ccache_name = optarg;
254 	    break;
255 	case 'k':
256 	    use_keytab++;
257 	    break;
258 	case 't':
259 	    keytab_name = optarg;
260 	    break;
261 	case 'w':
262 	    password = optarg;
263 	    break;
264 	case 'q':
265 	    query = optarg;
266 	    break;
267 	case 'd':
268 	    /* now db_name is not a seperate argument. It has to be passed as part of the db_args */
269 	    if (!db_name) {
270 		db_name = malloc(strlen(optarg) + sizeof("dbname="));
271 	    } else {
272 		db_name = realloc(db_name, strlen(optarg) + sizeof("dbname="));
273 	    }
274 
275 	    strcpy(db_name, "dbname=");
276 	    strcat(db_name, optarg);
277 
278 	    db_args_size++;
279 	    {
280 		char **temp = realloc(db_args, sizeof(char*) * (db_args_size+1)); /* one for NULL */
281 		if (temp == NULL) {
282 		    fprintf(stderr,
283 			    gettext("%s: Cannot initialize. Not enough memory\n"),
284 			    argv[0]);
285 		    exit(1);
286 		}
287 
288 		db_args = temp;
289 	    }
290 	    db_args[db_args_size-1] = db_name;
291 	    db_args[db_args_size]   = NULL;
292 	    break;
293 	case 's':
294 	    params.admin_server = optarg;
295 	    params.mask |= KADM5_CONFIG_ADMIN_SERVER;
296 	    break;
297 	case 'm':
298 	    params.mkey_from_kbd = 1;
299 	    params.mask |= KADM5_CONFIG_MKEY_FROM_KBD;
300 	    break;
301 	case 'e':
302 	    retval = krb5_string_to_keysalts(optarg,
303 					     ", \t",
304 					     ":.-",
305 					     0,
306 					     &params.keysalts,
307 					     &params.num_keysalts);
308 	    if (retval) {
309 		 com_err(whoami, retval,
310 			gettext("while parsing keysalts %s"), optarg);
311 		 exit(1);
312 	    }
313 	    params.mask |= KADM5_CONFIG_ENCTYPES;
314 	    break;
315 	case 'O':	/* Undocumented option for testing only */
316 		svcname = KADM5_ADMIN_SERVICE_P;
317 	    break;
318 	default:
319 	    usage(whoami);
320 	}
321     }
322     if ((ccache_name && use_keytab) ||
323 	(keytab_name && !use_keytab))
324 	 usage(whoami);
325 
326     if (def_realm == NULL && krb5_get_default_realm(context, &def_realm)) {
327 	if (freeprinc)
328 	    free(princstr);
329 	fprintf(stderr,
330 		gettext("%s: unable to get default realm\n"), whoami);
331 	exit(1);
332     }
333 
334     params.mask |= KADM5_CONFIG_REALM;
335     params.realm = def_realm;
336 
337     if (svcname == NULL) {
338 	if (kadm5_get_adm_host_srv_name(context,
339 			       def_realm, &svcname)) {
340 		fprintf(stderr,
341 			gettext("%s: unable to get host based "
342 				"service name for realm %s\n"),
343 			whoami, def_realm);
344 		if (freeprinc)
345 			free(princstr);
346 		exit(1);
347 	}
348     }
349 
350     /*
351      * Set cc to an open credentials cache, either specified by the -c
352      * argument or the default.
353      */
354     if (ccache_name == NULL) {
355 	 if ((retval = krb5_cc_default(context, &cc))) {
356 	      com_err(whoami, retval,
357 				gettext("while opening default "
358 					"credentials cache"));
359 	      exit(1);
360 	 }
361     } else {
362 	 if ((retval = krb5_cc_resolve(context, ccache_name, &cc))) {
363 	      com_err(whoami, retval,
364 			gettext("while opening credentials cache %s"),
365 			ccache_name);
366 	      exit(1);
367 	 }
368     }
369 
370     /*
371      * If no principal name is specified: If a ccache was specified
372      * and its primary principal name can be read, it is used, else if
373      * a keytab was specified, the principal name is host/hostname,
374      * otherwise append "/admin" to the primary name of the default
375      * ccache, $USER, or pw_name.
376      *
377      * Gee, 100+ lines to figure out the client principal name.  This
378      * should be compressed...
379      */
380 
381     if (princstr == NULL) {
382 	if (ccache_name != NULL &&
383 	    !krb5_cc_get_principal(context, cc, &princ)) {
384 	     if ((retval = krb5_unparse_name(context, princ, &princstr))) {
385 		  com_err(whoami, retval,
386 			gettext("while canonicalizing principal name"));
387 		  krb5_free_principal(context, princ);
388 		  exit(1);
389 	     }
390 	     krb5_free_principal(context, princ);
391 	     freeprinc++;
392 	} else if (use_keytab != 0) {
393 	    if ((retval = krb5_sname_to_principal(context, NULL,
394 						  "host",
395 						  KRB5_NT_SRV_HST,
396 						  &princ))) {
397 		com_err(whoami, retval,
398 			gettext("creating host service principal"));
399 		exit(1);
400 	    }
401 	    if ((retval = krb5_unparse_name(context, princ, &princstr))) {
402 		com_err(whoami, retval,
403 			gettext("while canonicalizing principal name"));
404 		krb5_free_principal(context, princ);
405 		exit(1);
406 	    }
407 	    krb5_free_principal(context, princ);
408 	    freeprinc++;
409 	} else if (!krb5_cc_get_principal(context, cc, &princ)) {
410 	    char *realm = NULL;
411 	    if (krb5_unparse_name(context, princ, &canon)) {
412 		fprintf(stderr,
413 			gettext("%s: unable to canonicalize "
414 				"principal\n"), whoami);
415 		krb5_free_principal(context, princ);
416 		exit(1);
417 	    }
418 	    /* strip out realm of principal if it's there */
419 	    realm = strchr(canon, '@');
420 	    while (realm) {
421 		if (realm - canon && *(realm - 1) != '\\')
422 		    break;
423 		else
424 		    realm = strchr(realm+1, '@');
425 	    }
426 	    if (realm)
427 		*realm++ = '\0';
428 	    cp = strchr(canon, '/');
429 	    while (cp) {
430 		if (cp - canon && *(cp - 1) != '\\')
431 		    break;
432 		else
433 		    cp = strchr(cp+1, '/');
434 	    }
435 	    if (cp != NULL)
436 		*cp = '\0';
437 	    princstr = (char*)malloc(strlen(canon) + 6 /* "/admin" */ +
438 				     (realm ? 1 + strlen(realm) : 0) + 1);
439 	    if (princstr == NULL) {
440 		fprintf(stderr,
441 			gettext("%s: out of memory\n"),
442 			whoami);
443 		exit(1);
444 	    }
445 	    strcpy(princstr, canon);
446 	    strcat(princstr, "/admin");
447 	    if (realm) {
448 		strcat(princstr, "@");
449 		strcat(princstr, realm);
450 	    }
451 	    free(canon);
452 	    krb5_free_principal(context, princ);
453 	    freeprinc++;
454 	} else if ((luser = getenv("USER"))) {
455 	    princstr = (char *) malloc(strlen(luser) + 7 /* "/admin@" */
456 				       + strlen(def_realm) + 1);
457 	    if (princstr == NULL) {
458 		fprintf(stderr,
459 			gettext("%s: out of memory\n"),
460 			whoami);
461 		exit(1);
462 	    }
463 	    strcpy(princstr, luser);
464 	    strcat(princstr, "/admin");
465 	    strcat(princstr, "@");
466 	    strcat(princstr, def_realm);
467 	    freeprinc++;
468 	} else if ((pw = getpwuid(getuid()))) {
469 	    princstr = (char *) malloc(strlen(pw->pw_name) + 7 /* "/admin@" */
470 				       + strlen(def_realm) + 1);
471 	    if (princstr == NULL) {
472 		fprintf(stderr,
473 			gettext("%s: out of memory\n"),
474 			whoami);
475 		exit(1);
476 	    }
477 	    strcpy(princstr, pw->pw_name);
478 	    strcat(princstr, "/admin@");
479 	    strcat(princstr, def_realm);
480 	    freeprinc++;
481 	} else {
482 	    fprintf(stderr,
483 			gettext("%s: unable to figure out "
484 				"a principal name\n"),
485 		    whoami);
486 	    exit(1);
487 	}
488     }
489 
490     retval = krb5_klog_init(context, "admin_server", whoami, 0);
491     if (retval) {
492 	com_err(whoami, retval, "while setting up logging");
493 	exit(1);
494     }
495 
496     /*
497      * Initialize the kadm5 connection.  If we were given a ccache,
498      * use it.  Otherwise, use/prompt for the password.
499      */
500 
501     /* Solaris Kerberos:
502      * Send warnings to stderr
503      */
504     if (ccache_name) {
505 	fprintf(stderr, gettext("Authenticating as principal %s with existing credentials.\n"),
506 	       princstr);
507 	retval = kadm5_init_with_creds(princstr, cc,
508 				       svcname,
509 				       &params,
510 				       KADM5_STRUCT_VERSION,
511 				       KADM5_API_VERSION_2,
512 				       db_args,
513 				       &handle);
514     } else if (use_keytab) {
515 	if (keytab_name)
516 	    fprintf(stderr, gettext("Authenticating as principal %s with keytab %s.\n"),
517 		   princstr, keytab_name);
518 	else
519 	    fprintf(stderr, gettext("Authenticating as principal %s with default keytab.\n"),
520 		   princstr);
521 	retval = kadm5_init_with_skey(princstr, keytab_name,
522 				      svcname,
523 				      &params,
524 				      KADM5_STRUCT_VERSION,
525 				      KADM5_API_VERSION_2,
526 				      db_args,
527 				      &handle);
528     } else {
529 	 fprintf(stderr, gettext("Authenticating as principal %s with password.\n"),
530 	       princstr);
531 	retval = kadm5_init_with_password(princstr, password,
532 					  svcname,
533 					  &params,
534 					  KADM5_STRUCT_VERSION,
535 					  KADM5_API_VERSION_2,
536 					  db_args,
537 					  &handle);
538     }
539     if (retval) {
540 	    if (retval == KADM5_RPC_ERROR_CANTENCODEARGS ||
541 		retval == KADM5_RPC_ERROR_CANTDECODEARGS) {
542 		    com_err(whoami, KADM5_RPC_ERROR,
543 			gettext("while initializing %s interface"), whoami);
544 
545 		    /* privacy-enabled mech probably not installed/configed */
546 		    com_err(whoami, retval, gettext("."), whoami);
547 	    } else {
548 		    com_err(whoami, retval,
549 			gettext("while initializing %s interface"), whoami);
550 	if (retval == KADM5_BAD_CLIENT_PARAMS ||
551 	    retval == KADM5_BAD_SERVER_PARAMS)
552 		usage(whoami);
553 	}
554 	exit(1);
555     }
556     if (freeprinc)
557 	free(princstr);
558 
559     if (db_name)
560 	free(db_name), db_name=NULL;
561 
562     if (db_args)
563 	free(db_args), db_args=NULL;
564 
565     if ((retval = krb5_cc_close(context, cc))) {
566 	 com_err(whoami, retval, gettext("while closing ccache %s"),
567 		 ccache_name);
568 	 exit(1);
569     }
570 
571     /* register the WRFILE keytab type and set it as the default */
572     {
573 #define DEFAULT_KEYTAB "WRFILE:/etc/krb5/krb5.keytab"
574 	/* XXX krb5_defkeyname is an internal library global and
575 	   should go away */
576 	extern char *krb5_defkeyname;
577 	krb5_defkeyname = DEFAULT_KEYTAB;
578     }
579 
580     if ((retval = kadm5_init_iprop(handle)) != 0) {
581 	com_err(whoami, retval, gettext("while mapping update log"));
582 	exit(1);
583     }
584 
585     /* Solaris kerberos: fix memory leak */
586     if (svcname)
587 	free(svcname);
588 
589     return query;
590 }
591 
592 int quit()
593 {
594     kadm5_ret_t retval;
595 
596     if (locked) {
597 	retval = kadm5_unlock(handle);
598 	if (retval) {
599 	    com_err("quit", retval, gettext("while unlocking locked database"));
600 	    return 1;
601 	}
602 	locked = 0;
603     }
604 
605      kadm5_destroy(handle);
606      if (ccache_name != NULL) {
607 	  fprintf(stderr,
608 			gettext("\n\a\a\aAdministration credentials "
609 				"NOT DESTROYED.\n"));
610      }
611 
612      /* insert more random cleanup here */
613      krb5_klog_close(context);
614      krb5_free_context(context);
615      context = NULL;
616      return 0;
617 }
618 
619 void kadmin_lock(argc, argv)
620     int argc;
621     char *argv[];
622 {
623     kadm5_ret_t retval;
624 
625     if (locked)
626 	return;
627     retval = kadm5_lock(handle);
628     if (retval) {
629 	com_err("lock", retval, "");
630 	return;
631     }
632     locked = 1;
633 }
634 
635 void kadmin_unlock(argc, argv)
636     int argc;
637     char *argv[];
638 {
639     kadm5_ret_t retval;
640 
641     if (!locked)
642 	return;
643     retval = kadm5_unlock(handle);
644     if (retval) {
645 	com_err("unlock", retval, "");
646 	return;
647     }
648     locked = 0;
649 }
650 
651 void kadmin_delprinc(argc, argv)
652     int argc;
653     char *argv[];
654 {
655     kadm5_ret_t retval;
656     krb5_principal princ;
657     char *canon;
658     char reply[32];
659 
660     if (! (argc == 2 ||
661 	   (argc == 3 && !strcmp("-force", argv[1])))) {
662 	fprintf(stderr, "%s: delete_principal [-force] %s\n",
663 			gettext("usage"), gettext("principal"));
664 	return;
665     }
666     retval = kadmin_parse_name(argv[argc - 1], &princ);
667     if (retval) {
668 	com_err("delete_principal", retval,
669 			gettext("while parsing principal name"));
670 	return;
671     }
672     retval = krb5_unparse_name(context, princ, &canon);
673     if (retval) {
674 	com_err("delete_principal", retval,
675 			gettext("while canonicalizing principal"));
676 	krb5_free_principal(context, princ);
677 	return;
678     }
679     if (argc == 2) {
680 	printf(gettext("Are you sure you want to delete "
681 			    "the principal \"%s\"? (yes/no): "), canon);
682 	fgets(reply, sizeof (reply), stdin);
683 		if (strncmp(gettext("yes\n"), reply, sizeof (reply)) &&
684 			strncmp(gettext("y\n"), reply, sizeof (reply)) &&
685 			strncmp(gettext("Y\n"), reply, sizeof (reply))) {
686 			fprintf(stderr,
687 				gettext("Principal \"%s\" not deleted\n"),
688 				canon);
689 	    free(canon);
690 	    krb5_free_principal(context, princ);
691 	    return;
692 	}
693     }
694     retval = kadm5_delete_principal(handle, princ);
695     krb5_free_principal(context, princ);
696     if (retval) {
697 	com_err("delete_principal", retval,
698 			gettext("while deleting principal \"%s\""), canon);
699 	free(canon);
700 	return;
701     }
702     printf(gettext("Principal \"%s\" deleted.\n"), canon);
703 	printf(gettext("Make sure that you have removed this principal "
704 			"from all ACLs before reusing.\n"));
705     free(canon);
706     return;
707 }
708 
709 void kadmin_cpw(argc, argv)
710     int argc;
711     char *argv[];
712 {
713     kadm5_ret_t retval;
714     static char newpw[1024];
715     static char prompt1[1024], prompt2[1024];
716     char *canon;
717     char *pwarg = NULL;
718     int n_ks_tuple = 0, randkey = 0;
719     krb5_boolean keepold = FALSE;
720     krb5_key_salt_tuple *ks_tuple = NULL;
721     krb5_principal princ;
722     char **db_args = NULL;
723     int db_args_size = 0;
724     int local_kadmin = 0;
725 
726     local_kadmin = (strcmp(whoami, KADMIN_LOCAL_NAME) == 0);
727 
728     if (argc < 2) {
729 	goto usage;
730     }
731     for (argv++, argc--; argc > 1; argc--, argv++) {
732 	if (!strcmp("-x", *argv)) {
733 	    argc--;
734 	    if (argc < 1) {
735 		fprintf(stderr, gettext("change_password: missing db argument\n"));
736 		goto usage;
737 	    }
738 	    db_args_size++;
739 	    {
740 		char **temp = realloc(db_args, sizeof(char*) * (db_args_size+1)); /* one for NULL */
741 		if (temp == NULL) {
742 		    fprintf(stderr, gettext("change_password: Not enough memory\n"));
743 		    free(db_args), db_args = NULL;
744 		    exit(1);
745 		}
746 
747 		db_args = temp;
748 	    }
749 	    db_args[db_args_size-1] = *++argv;
750 	    db_args[db_args_size]   = NULL;
751 	    continue;
752 	}
753 	if (!strcmp("-pw", *argv)) {
754 	    argc--;
755 	    if (argc < 1) {
756 		fprintf(stderr, "change_password: %s",
757 			gettext("missing password arg\n"));
758 		goto usage;
759 	    }
760 	    pwarg = *++argv;
761 	    continue;
762 	}
763 	if (!strcmp("-randkey", *argv)) {
764 	    randkey++;
765 	    continue;
766 	}
767 	if (!strcmp("-keepold", *argv)) {
768 	    keepold = TRUE;
769 	    continue;
770 	}
771 	if (!strcmp("-e", *argv)) {
772 	    argc--;
773 	    if (argc < 1) {
774 		fprintf(stderr, "change_password: %s",
775 			gettext("missing keysaltlist arg\n"));
776 		goto usage;
777 	    }
778 	    retval = krb5_string_to_keysalts(*++argv, ", \t", ":.-", 0,
779 					     &ks_tuple, &n_ks_tuple);
780 	    if (retval) {
781 		com_err("change_password", retval,
782 			gettext("while parsing keysalts %s"), *argv);
783 		return;
784 	    }
785 	    continue;
786 	}
787 	goto usage;
788     }
789     if (*argv == NULL) {
790 	com_err("change_password", 0, "missing principal name");
791 	goto usage;
792     }
793     retval = kadmin_parse_name(*argv, &princ);
794     if (retval) {
795 	com_err("change_password", retval,
796 		gettext("while parsing principal name"));
797 	if (ks_tuple != NULL)
798 	    free(ks_tuple);
799 	if (db_args) free(db_args);
800 	goto usage;
801     }
802     retval = krb5_unparse_name(context, princ, &canon);
803     if (retval) {
804 		com_err("change_password", retval,
805 			gettext("while canonicalizing principal"));
806 	krb5_free_principal(context, princ);
807 	if (ks_tuple != NULL)
808 	    free(ks_tuple);
809 	if (db_args) free(db_args);
810 	return;
811     }
812     if (pwarg != NULL) {
813 	if (keepold || ks_tuple != NULL) {
814 	    retval = kadm5_chpass_principal_3(handle, princ, keepold,
815 					      n_ks_tuple, ks_tuple, pwarg);
816 	    if (ks_tuple != NULL)
817 		free(ks_tuple);
818 	} else {
819 	    retval = kadm5_chpass_principal(handle, princ, pwarg);
820 	}
821 	krb5_free_principal(context, princ);
822 	if (retval) {
823 	    com_err("change_password", retval,
824 				gettext("while changing password for \"%s\"."),
825 				canon);
826 	    free(canon);
827 	    if (db_args) free(db_args);
828 	    return;
829 	}
830 		printf(gettext("Password for \"%s\" changed.\n"), canon);
831 	free(canon);
832 	if (db_args) free(db_args);
833 	return;
834     } else if (randkey) {
835 	if (keepold || ks_tuple != NULL || local_kadmin) {
836 	    retval = kadm5_randkey_principal_3(handle, princ, keepold,
837 					       n_ks_tuple, ks_tuple,
838 					       NULL, NULL);
839 	    if (ks_tuple != NULL)
840 		free(ks_tuple);
841 	} else {
842 	    retval = kadm5_randkey_principal(handle, princ, NULL, NULL);
843 	}
844 	krb5_free_principal(context, princ);
845 	if (retval) {
846 	    com_err("change_password", retval,
847 				gettext("while randomizing key for \"%s\"."),
848 				canon);
849 	    free(canon);
850 	    if (db_args) free(db_args);
851 	    return;
852 	}
853 	printf(gettext("Key for \"%s\" randomized.\n"), canon);
854 	free(canon);
855 	if (db_args) free(db_args);
856 	return;
857     } else if (argc == 1) {
858 	unsigned int i = sizeof (newpw) - 1;
859 
860 		snprintf(prompt1, sizeof (prompt1),
861 			gettext("Enter password for principal \"%.900s\""),
862 			*argv);
863 		snprintf(prompt2, sizeof (prompt2),
864 			gettext("Re-enter password for principal \"%.900s\""),
865 			*argv);
866 	retval = krb5_read_password(context, prompt1, prompt2,
867 				    newpw, &i);
868 	if (retval) {
869 	    com_err("change_password", retval,
870 				gettext("while reading password for \"%s\"."),
871 				canon);
872 	    free(canon);
873 	    if (ks_tuple != NULL)
874 		free(ks_tuple);
875 	    krb5_free_principal(context, princ);
876 	    if (db_args) free(db_args);
877 	    return;
878 	}
879 	if (keepold || ks_tuple != NULL) {
880 	    retval = kadm5_chpass_principal_3(handle, princ, keepold,
881 					      n_ks_tuple, ks_tuple,
882 					      newpw);
883 	    if (ks_tuple != NULL)
884 		free(ks_tuple);
885 	} else {
886 	    retval = kadm5_chpass_principal(handle, princ, newpw);
887 	}
888 	krb5_free_principal(context, princ);
889 	memset(newpw, 0, sizeof (newpw));
890 	if (retval) {
891 	    com_err("change_password", retval,
892 				gettext("while changing password for \"%s\"."),
893 				canon);
894 	    free(canon);
895 	    if (db_args) free(db_args);
896 	    return;
897 	}
898 		printf(gettext("Password for \"%s\" changed.\n"), canon);
899 	free(canon);
900 	if (db_args) free(db_args);
901 	return;
902     } else {
903 	free(canon);
904 	krb5_free_principal(context, princ);
905     usage:
906 	if (ks_tuple != NULL)
907 	    free(ks_tuple);
908 		fprintf(stderr, "%s: change_password [-randkey] [-keepold] "
909 			"[-e keysaltlist] [-pw password] %s\n",
910 			gettext("usage"), gettext("principal"));
911 	return;
912     }
913 }
914 
915 static void
916 kadmin_free_tl_data(kadm5_principal_ent_t princ)
917 {
918     krb5_tl_data *tl_data = princ->tl_data;
919     int n_tl_data         = princ->n_tl_data;
920     int i;
921 
922     princ->n_tl_data = 0;
923     princ->tl_data   = NULL;
924 
925     for (i = 0; tl_data && (i < n_tl_data); i++) {
926 	krb5_tl_data *next = tl_data->tl_data_next;
927 	if (tl_data->tl_data_contents)
928 	    free(tl_data->tl_data_contents);
929 	free(tl_data);
930 	tl_data = next;
931     }
932 }
933 
934 #define KRB5_TL_DB_ARGS 0x7fff
935 static int
936 kadmin_parse_princ_args(argc, argv, oprinc, mask, pass, randkey,
937 			ks_tuple, n_ks_tuple, caller)
938     int argc;
939     char *argv[];
940     kadm5_principal_ent_t oprinc;
941     long *mask;
942     char **pass;
943     int *randkey;
944     krb5_key_salt_tuple **ks_tuple;
945     int *n_ks_tuple;
946     char *caller;
947 {
948     int i, j, attrib_set;
949     time_t date;
950     time_t now;
951     krb5_error_code retval;
952     krb5_tl_data *tl_data, *tail = NULL;
953 
954     *mask = 0;
955     *pass = NULL;
956     *n_ks_tuple = 0;
957     *ks_tuple = NULL;
958     time(&now);
959     *randkey = 0;
960     for (i = 1; i < argc - 1; i++) {
961 	attrib_set = 0;
962 	if (strlen(argv[i]) == 2 &&
963 	    !strcmp("-x",argv[i])) {
964 	    if (++i > argc - 2)
965 		return -1;
966 
967 	    tl_data = malloc(sizeof(krb5_tl_data));
968 	    if (tl_data == NULL) {
969 		fprintf(stderr, gettext("Not enough memory\n"));
970 		return ENOMEM;
971 	    }
972 
973 	    memset(tl_data, 0, sizeof(krb5_tl_data));
974 	    tl_data->tl_data_type = KRB5_TL_DB_ARGS;
975 	    tl_data->tl_data_length  = strlen(argv[i])+1;
976 	    tl_data->tl_data_contents = (unsigned char*)strdup(argv[i]);
977 
978 	    if (tail) {
979 		tail->tl_data_next = tl_data;
980 	    } else {
981 		oprinc->tl_data = tl_data;
982 	    }
983 	    tail = tl_data;
984 	    oprinc->n_tl_data++;
985 
986 	    if (tl_data->tl_data_contents == NULL) {
987 		fprintf(stderr, gettext("Not enough memory\n"));
988 		return ENOMEM;
989 	    }
990 	    *mask |= KADM5_TL_DATA;
991 	    continue;
992 	}
993 	if (strlen(argv[i]) == 7 &&
994 	    !strcmp("-expire", argv[i])) {
995 	    if (++i > argc - 2)
996 		return -1;
997 	    else {
998 		date = get_date(argv[i]);
999  		if (date == (time_t)-1) {
1000 		     fprintf(stderr,
1001 						gettext("Invalid date "
1002 							"specification "
1003 							"\"%s\".\n"),
1004 			     argv[i]);
1005 		     return -1;
1006  		}
1007 		oprinc->princ_expire_time = date;
1008 		*mask |= KADM5_PRINC_EXPIRE_TIME;
1009 		continue;
1010 	    }
1011 	}
1012 	if (strlen(argv[i]) == 9 &&
1013 	    !strcmp("-pwexpire", argv[i])) {
1014 	    if (++i > argc - 2)
1015 		return -1;
1016 	    else {
1017 		date = get_date(argv[i]);
1018  		if (date == (time_t)-1) {
1019 		     fprintf(stderr,
1020 						gettext("Invalid date "
1021 							"specification "
1022 							"\"%s\".\n"),
1023 			     argv[i]);
1024 		     return -1;
1025  		}
1026 		oprinc->pw_expiration = date;
1027 		*mask |= KADM5_PW_EXPIRATION;
1028 		continue;
1029 	    }
1030 	}
1031 	if (strlen(argv[i]) == 8 &&
1032 	    !strcmp("-maxlife", argv[i])) {
1033 	    if (++i > argc - 2)
1034 		return -1;
1035 	    else {
1036 		date = get_date(argv[i]);
1037  		if (date == (time_t)-1) {
1038 					fprintf(stderr,
1039 						gettext("Invalid date "
1040 							"specification "
1041 							"\"%s\".\n"),
1042 			     argv[i]);
1043 		     return -1;
1044  		}
1045 				if (date <= now) {
1046 					fprintf(stderr,
1047 						gettext("Date specified is "
1048 							"in the past "
1049 							"\"%s\".\n"),
1050 						argv[i]);
1051 					return (-1);
1052 				}
1053 		oprinc->max_life = date - now;
1054 		*mask |= KADM5_MAX_LIFE;
1055 		continue;
1056 	    }
1057 	}
1058 	if (strlen(argv[i]) == 13 &&
1059 	    !strcmp("-maxrenewlife", argv[i])) {
1060 	    if (++i > argc - 2)
1061 		return -1;
1062 	    else {
1063 		date = get_date(argv[i]);
1064  		if (date == (time_t)-1) {
1065 					fprintf(stderr,
1066 						gettext("Invalid date "
1067 							"specification "
1068 							"\"%s\".\n"),
1069 			     argv[i]);
1070 		     return -1;
1071  		}
1072 				if (date <= now) {
1073 					fprintf(stderr,
1074 						gettext("Date specified is "
1075 							"in the past "
1076 							"\"%s\".\n"),
1077 						argv[i]);
1078 					return (-1);
1079 				}
1080 		oprinc->max_renewable_life = date - now;
1081 		*mask |= KADM5_MAX_RLIFE;
1082 		continue;
1083 	    }
1084 	}
1085 	if (strlen(argv[i]) == 5 &&
1086 	    !strcmp("-kvno", argv[i])) {
1087 	    if (++i > argc - 2)
1088 		return -1;
1089 	    else {
1090 		oprinc->kvno = atoi(argv[i]);
1091 		*mask |= KADM5_KVNO;
1092 		continue;
1093 	    }
1094 	}
1095 	if (strlen(argv[i]) == 7 &&
1096 	    !strcmp("-policy", argv[i])) {
1097 	    if (++i > argc - 2)
1098 		return -1;
1099 	    else {
1100 		oprinc->policy = argv[i];
1101 		*mask |= KADM5_POLICY;
1102 		continue;
1103 	    }
1104 	}
1105 	if (strlen(argv[i]) == 12 &&
1106 	    !strcmp("-clearpolicy", argv[i])) {
1107 	    oprinc->policy = NULL;
1108 	    *mask |= KADM5_POLICY_CLR;
1109 	    continue;
1110 	}
1111 	if (strlen(argv[i]) == 3 &&
1112 	    !strcmp("-pw", argv[i])) {
1113 	    if (++i > argc - 2)
1114 		return -1;
1115 	    else {
1116 		*pass = argv[i];
1117 		continue;
1118 	    }
1119 	}
1120 	if (strlen(argv[i]) == 8 &&
1121 	    !strcmp("-randkey", argv[i])) {
1122 	    ++*randkey;
1123 	    continue;
1124 	}
1125 	if (!strcmp("-e", argv[i])) {
1126 	    if (++i > argc - 2)
1127 		return -1;
1128 	    else {
1129 		retval = krb5_string_to_keysalts(argv[i], ", \t", ":.-", 0,
1130 						 ks_tuple, n_ks_tuple);
1131 		if (retval) {
1132 		    com_err(caller, retval,
1133 			    gettext("while parsing keysalts %s"), argv[i]);
1134 		    return -1;
1135 		}
1136 	    }
1137 	    continue;
1138 	}
1139 	for (j = 0; j < sizeof (flags) / sizeof (struct pflag); j++) {
1140 	    if (strlen(argv[i]) == flags[j].flaglen + 1 &&
1141 		!strcmp(flags[j].flagname,
1142 			&argv[i][1] /* strip off leading + or - */)) {
1143 		if ((flags[j].set && argv[i][0] == '-') ||
1144 		    (!flags[j].set && argv[i][0] == '+')) {
1145 		    oprinc->attributes |= flags[j].theflag;
1146 		    *mask |= KADM5_ATTRIBUTES;
1147 		    attrib_set++;
1148 		    break;
1149 		} else if ((flags[j].set && argv[i][0] == '+') ||
1150 			   (!flags[j].set && argv[i][0] == '-')) {
1151 		    oprinc->attributes &= ~flags[j].theflag;
1152 		    *mask |= KADM5_ATTRIBUTES;
1153 		    attrib_set++;
1154 		    break;
1155 		} else {
1156 		    return -1;
1157 		}
1158 	    }
1159 	}
1160 	if (!attrib_set)
1161 	    return -1;		/* nothing was parsed */
1162     }
1163     if (i != argc - 1) {
1164 	return -1;
1165     }
1166     retval = kadmin_parse_name(argv[i], &oprinc->principal);
1167     if (retval) {
1168 	com_err(caller, retval, gettext("while parsing principal"));
1169 	return -1;
1170     }
1171     return 0;
1172 }
1173 
1174 static void
1175 kadmin_addprinc_usage(func)
1176     char *func;
1177 {
1178 	fprintf(stderr, "%s: %s %s\n", gettext("usage"), func,
1179 		gettext("[options] principal"));
1180 	fprintf(stderr, gettext("\toptions are:\n"));
1181 	fprintf(stderr, "\t\t[-expire expdate] [-pwexpire pwexpdate] "
1182 		"[-maxlife maxtixlife]\n\t\t[-kvno kvno] [-policy policy] "
1183 		"[-randkey] [-pw password]\n\t\t[-maxrenewlife maxrenewlife] "
1184 		"[-e keysaltlist] [{+|-}attribute]\n");
1185 	fprintf(stderr, gettext("\tattributes are:\n"));
1186      fprintf(stderr, "%s%s%s",
1187 		"\t\tallow_postdated allow_forwardable allow_tgs_req "
1188 		"allow_renewable\n",
1189 		"\t\tallow_proxiable allow_dup_skey allow_tix "
1190 		"requires_preauth\n",
1191 		"\t\trequires_hwauth needchange allow_svr "
1192 		"password_changing_service\n");
1193 }
1194 
1195 static void
1196 kadmin_modprinc_usage(func)
1197     char *func;
1198 {
1199 	fprintf(stderr, "%s: %s %s\n", gettext("usage"), func,
1200 		gettext("[options] principal"));
1201 	fprintf(stderr, gettext("\toptions are:\n"));
1202 	fprintf(stderr, "\t\t[-expire expdate] [-pwexpire pwexpdate] "
1203 		"[-maxlife maxtixlife]\n\t\t[-kvno kvno] [-policy policy] "
1204 		"[-clearpolicy]\n\t\t[-maxrenewlife maxrenewlife] "
1205 		"[{+|-}attribute]\n");
1206 	fprintf(stderr, gettext("\tattributes are:\n"));
1207      fprintf(stderr, "%s%s%s",
1208 		"\t\tallow_postdated allow_forwardable allow_tgs_req "
1209 		"allow_renewable\n",
1210 		"\t\tallow_proxiable allow_dup_skey allow_tix "
1211 		"requires_preauth\n",
1212 		"\t\trequires_hwauth needchange allow_svr "
1213 		"password_changing_service\n");
1214 }
1215 
1216 void kadmin_addprinc(argc, argv)
1217     int argc;
1218     char *argv[];
1219 {
1220     kadm5_principal_ent_rec princ, dprinc;
1221     kadm5_policy_ent_rec defpol;
1222     long mask;
1223     int randkey = 0, i;
1224     int n_ks_tuple;
1225     krb5_key_salt_tuple *ks_tuple;
1226     char *pass, *canon;
1227     krb5_error_code retval;
1228     static char newpw[1024], dummybuf[256];
1229     static char prompt1[1024], prompt2[1024];
1230     int local_kadmin = 0;
1231 
1232     local_kadmin = (strcmp(whoami, KADMIN_LOCAL_NAME) == 0);
1233 
1234     if (dummybuf[0] == 0) {
1235 	for (i = 0; i < 256; i++)
1236 	    dummybuf[i] = (i+1) % 256;
1237     }
1238 
1239     /* Zero all fields in request structure */
1240     memset(&princ, 0, sizeof(princ));
1241     memset(&dprinc, 0, sizeof(dprinc));
1242 
1243     princ.attributes = dprinc.attributes = 0;
1244     if (kadmin_parse_princ_args(argc, argv,
1245 				&princ, &mask, &pass, &randkey,
1246 				&ks_tuple, &n_ks_tuple,
1247 				"add_principal")) {
1248 	kadmin_addprinc_usage("add_principal");
1249 	kadmin_free_tl_data(&princ); /* need to free ks_tuple also??? */
1250 	return;
1251     }
1252 
1253     retval = krb5_unparse_name(context, princ.principal, &canon);
1254     if (retval) {
1255 	com_err("add_principal",
1256 		retval, gettext("while canonicalizing principal"));
1257 	krb5_free_principal(context, princ.principal);
1258 	if (ks_tuple != NULL)
1259 	    free(ks_tuple);
1260 	kadmin_free_tl_data(&princ);
1261 	return;
1262     }
1263 
1264     /*
1265      * If -policy was not specified, and -clearpolicy was not
1266      * specified, and the policy "default" exists, assign it.  If
1267      * -clearpolicy was specified, then KADM5_POLICY_CLR should be
1268      * unset, since it is never valid for kadm5_create_principal.
1269      */
1270     if ((! (mask & KADM5_POLICY)) &&
1271 	(! (mask & KADM5_POLICY_CLR))) {
1272 	if (! kadm5_get_policy(handle, "default", &defpol)) {
1273 	    fprintf(stderr,
1274 		    gettext("NOTICE: no policy specified for %s; assigning \"default\"\n"),
1275 		    canon);
1276 	    princ.policy = "default";
1277 	    mask |= KADM5_POLICY;
1278 	    (void) kadm5_free_policy_ent(handle, &defpol);
1279 	} else
1280 	    fprintf(stderr,
1281 		    gettext("WARNING: no policy specified for %s; defaulting to no policy\n"),
1282 		    canon);
1283     }
1284     mask &= ~KADM5_POLICY_CLR;
1285 
1286     /*
1287      * Set 'notix' for randkey principals and also for principals which have
1288      * specified flag options on the cmdline. This is because we want to apply
1289      * generic flag settings from 'default_principal_flags' first (during
1290      * principal creation), followed by a kadm5_modify_principal() which
1291      * correctly applies the cli flag options. So, we do *not* want any tix
1292      * issued in the interim.
1293      */
1294     if (randkey || (mask & KADM5_ATTRIBUTES))
1295 	princ.attributes |= KRB5_KDB_DISALLOW_ALL_TIX;
1296 
1297     if (randkey) {
1298 	mask |= KADM5_ATTRIBUTES;
1299 	pass = dummybuf;
1300     } else if (pass == NULL) {
1301 	unsigned int sz = sizeof (newpw) - 1;
1302 	snprintf(prompt1, sizeof (prompt1),
1303 		gettext("Enter password for principal \"%.900s\""),
1304 		canon);
1305 	snprintf(prompt2, sizeof (prompt1),
1306 		gettext("Re-enter password for principal \"%.900s\""),
1307 		canon);
1308 	retval = krb5_read_password(context, prompt1, prompt2,
1309 				    newpw, &sz);
1310 	if (retval) {
1311 	    com_err("add_principal", retval,
1312 		gettext("while reading password for \"%s\"."), canon);
1313 	    free(canon);
1314 	    krb5_free_principal(context, princ.principal);
1315 	    kadmin_free_tl_data(&princ);
1316 	    return;
1317 	}
1318 	pass = newpw;
1319     }
1320     mask |= KADM5_PRINCIPAL;
1321 
1322     /*
1323      * If the client being used is local, always use the new
1324      * API so we get the full set of enctype support.
1325      */
1326     if (ks_tuple != NULL || local_kadmin) {
1327 	retval = kadm5_create_principal_3(handle, &princ, mask,
1328 					  n_ks_tuple, ks_tuple, pass);
1329     } else {
1330 	retval = kadm5_create_principal(handle, &princ, mask, pass);
1331     }
1332     if (retval) {
1333 	com_err("add_principal", retval,
1334 		gettext("while creating \"%s\"."), canon);
1335 	krb5_free_principal(context, princ.principal);
1336 	free(canon);
1337 	if (ks_tuple != NULL)
1338 	    free(ks_tuple);
1339 	kadmin_free_tl_data(&princ);
1340 	return;
1341     }
1342     if (randkey) {		/* more special stuff for -randkey */
1343 	if (ks_tuple != NULL || local_kadmin) {
1344 	    retval = kadm5_randkey_principal_3(handle, princ.principal,
1345 					       FALSE,
1346 					       n_ks_tuple, ks_tuple,
1347 					       NULL, NULL);
1348 	} else {
1349 	    retval = kadm5_randkey_principal(handle, princ.principal,
1350 					     NULL, NULL);
1351 	}
1352 	if (retval) {
1353 	    com_err("add_principal", retval,
1354 		gettext("while randomizing key for \"%s\"."), canon);
1355 	    krb5_free_principal(context, princ.principal);
1356 	    free(canon);
1357 	    if (ks_tuple != NULL)
1358 		free(ks_tuple);
1359 	    kadmin_free_tl_data(&princ);
1360 	    return;
1361 	}
1362     }
1363 
1364     /*
1365      * We now retrieve the intersection set of the generic flag settings and
1366      * the ones specified on the cli & re-parse the princ args, just to make
1367      * sure we account for conflicts between 'default_principal_flags' and
1368      * the cmdline flag args. While we are here, also clear 'notix'.
1369      */
1370     if (randkey || (mask & KADM5_ATTRIBUTES)) {
1371 	retval = kadm5_get_principal(handle, princ.principal, &dprinc,
1372 			KADM5_PRINCIPAL_NORMAL_MASK);
1373         if (retval == 0) {
1374 	    if (dprinc.attributes != 0)
1375 		princ.attributes = dprinc.attributes;
1376 	} else {
1377 	    com_err("add_principal", retval,
1378 		gettext("while doing a get_principal on \"%s\"."), canon);
1379 	    printf(gettext("\nWarning: Principal \"%s\" could have incomplete "
1380 		"flag settings, as a result of a failed get_principal.\n"
1381 		"Check the 'default_principal_flags' setting in kdc.conf(4).\n"
1382 		"If there is a mismatch, use modprinc in kadmin(1M) to rectify "
1383 		"the same.\n\n"), canon);
1384 	}
1385 
1386 	/*
1387 	 * Solaris Kerberos: We unset KRB5_KDB_DISALLOW_ALL_TIX before
1388 	 * kadmin_parse_princ_args is called, because -allow_tix may
1389 	 * have been an argument.  We still have to unset here because
1390 	 * kadmin_parse_princ_args will not reset the attribute unless
1391 	 * it is was explicity defined.
1392 	 */
1393 	princ.attributes &= ~KRB5_KDB_DISALLOW_ALL_TIX;
1394 	(void) kadmin_parse_princ_args(argc, argv, &princ, &mask, &pass,
1395 			&randkey, &ks_tuple, &n_ks_tuple, "add_principal");
1396 	mask = KADM5_ATTRIBUTES;
1397 	retval = kadm5_modify_principal(handle, &princ, mask);
1398 	if (retval) {
1399 	    com_err("add_principal", retval,
1400 		gettext("while doing a modify_principal to restore flag "
1401 			"settings for \"%s\"."), canon);
1402 	    krb5_free_principal(context, princ.principal);
1403 	    free(canon);
1404 	    if (ks_tuple != NULL)
1405 		free(ks_tuple);
1406 	    kadmin_free_tl_data(&princ);
1407 	    return;
1408 	}
1409     }
1410     krb5_free_principal(context, princ.principal);
1411 	printf(gettext("Principal \"%s\" created.\n"), canon);
1412     if (ks_tuple != NULL)
1413 	free(ks_tuple);
1414     free(canon);
1415     kadmin_free_tl_data(&princ);
1416 
1417 }
1418 
1419 void kadmin_modprinc(argc, argv)
1420     int argc;
1421     char *argv[];
1422 {
1423     kadm5_principal_ent_rec princ, oldprinc;
1424     krb5_principal kprinc;
1425     long mask;
1426     krb5_error_code retval;
1427     char *pass, *canon;
1428     int randkey = 0;
1429     int n_ks_tuple = 0;
1430     krb5_key_salt_tuple *ks_tuple;
1431 
1432     if (argc < 2) {
1433 	kadmin_modprinc_usage("modify_principal");
1434 	return;
1435     }
1436 
1437     memset(&oldprinc, 0, sizeof(oldprinc));
1438     memset(&princ, 0, sizeof(princ));
1439 
1440     retval = kadmin_parse_name(argv[argc - 1], &kprinc);
1441     if (retval) {
1442 	com_err("modify_principal", retval,
1443 			gettext("while parsing principal"));
1444 	return;
1445     }
1446     retval = krb5_unparse_name(context, kprinc, &canon);
1447     if (retval) {
1448 	com_err("modify_principal", retval,
1449 			gettext("while canonicalizing principal"));
1450 	krb5_free_principal(context, kprinc);
1451 	return;
1452     }
1453     retval = kadm5_get_principal(handle, kprinc, &oldprinc,
1454 				 KADM5_PRINCIPAL_NORMAL_MASK);
1455     krb5_free_principal(context, kprinc);
1456     if (retval) {
1457 	com_err("modify_principal", retval,
1458 			gettext("while getting \"%s\"."), canon);
1459 	free(canon);
1460 	return;
1461     }
1462     princ.attributes = oldprinc.attributes;
1463     kadm5_free_principal_ent(handle, &oldprinc);
1464     retval = kadmin_parse_princ_args(argc, argv,
1465 				     &princ, &mask,
1466 				     &pass, &randkey,
1467 				     &ks_tuple, &n_ks_tuple,
1468 				     "modify_principal");
1469     if (ks_tuple != NULL) {
1470 	free(ks_tuple);
1471 	kadmin_modprinc_usage("modify_principal");
1472 	free(canon);
1473 	kadmin_free_tl_data(&princ);
1474 	return;
1475     }
1476     if (retval) {
1477 	kadmin_modprinc_usage("modify_principal");
1478 	free(canon);
1479 	kadmin_free_tl_data(&princ);
1480 	return;
1481     }
1482     if (randkey) {
1483 		fprintf(stderr, "modify_principal: -randkey %s ",
1484 			gettext("not allowed\n"));
1485 	krb5_free_principal(context, princ.principal);
1486 	free(canon);
1487 	kadmin_free_tl_data(&princ);
1488 	return;
1489     }
1490     if (pass) {
1491 	fprintf(stderr,
1492 		"modify_principal: -pw %s change_password\n",
1493 		gettext("not allowed; use"));
1494 	krb5_free_principal(context, princ.principal);
1495 	free(canon);
1496 	kadmin_free_tl_data(&princ);
1497 	return;
1498     }
1499     retval = kadm5_modify_principal(handle, &princ, mask);
1500     krb5_free_principal(context, princ.principal);
1501     if (retval) {
1502 	com_err("modify_principal", retval,
1503 			gettext("while modifying \"%s\"."), canon);
1504 	free(canon);
1505 	kadmin_free_tl_data(&princ);
1506 	return;
1507     }
1508 	printf(gettext("Principal \"%s\" modified.\n"), canon);
1509     kadmin_free_tl_data(&princ);
1510     free(canon);
1511 }
1512 
1513 void kadmin_getprinc(argc, argv)
1514     int argc;
1515     char *argv[];
1516 {
1517     kadm5_principal_ent_rec dprinc;
1518     krb5_principal princ;
1519     krb5_error_code retval;
1520     char *canon, *modcanon;
1521     int i;
1522 
1523     if (! (argc == 2 ||
1524 	   (argc == 3 && !strcmp("-terse", argv[1])))) {
1525 		fprintf(stderr, "%s: get_principal [-terse] %s\n",
1526 			gettext("usage"), gettext("principal"));
1527 	return;
1528     }
1529 
1530 
1531     memset(&dprinc, 0, sizeof(dprinc));
1532     memset(&princ, 0, sizeof(princ));
1533 
1534     retval = kadmin_parse_name(argv[argc - 1], &princ);
1535     if (retval) {
1536 	com_err("get_principal", retval,
1537 			gettext("while parsing principal"));
1538 	return;
1539     }
1540     retval = krb5_unparse_name(context, princ, &canon);
1541     if (retval) {
1542 	com_err("get_principal", retval,
1543 			gettext("while canonicalizing principal"));
1544 	krb5_free_principal(context, princ);
1545 	return;
1546     }
1547     retval = kadm5_get_principal(handle, princ, &dprinc,
1548 				 KADM5_PRINCIPAL_NORMAL_MASK | KADM5_KEY_DATA);
1549     krb5_free_principal(context, princ);
1550     if (retval) {
1551 	com_err("get_principal", retval,
1552 			gettext("while retrieving \"%s\"."), canon);
1553 	free(canon);
1554 	return;
1555     }
1556     retval = krb5_unparse_name(context, dprinc.mod_name, &modcanon);
1557     if (retval) {
1558 	com_err("get_principal", retval,
1559 			gettext("while unparsing modname"));
1560 	kadm5_free_principal_ent(handle, &dprinc);
1561 	free(canon);
1562 	return;
1563     }
1564     if (argc == 2) {
1565 		printf(gettext("Principal: %s\n"), canon);
1566 		printf(gettext("Expiration date: %s\n"),
1567 		    dprinc.princ_expire_time ?
1568 		    strdate(dprinc.princ_expire_time) :
1569 		    gettext("[never]"));
1570 		printf(gettext("Last password change: %s\n"),
1571 		    dprinc.last_pwd_change ?
1572 		    strdate(dprinc.last_pwd_change) :
1573 		    gettext("[never]"));
1574 		printf(gettext("Password expiration date: %s\n"),
1575 	       dprinc.pw_expiration ?
1576 		    strdate(dprinc.pw_expiration) : gettext("[none]"));
1577 		printf(gettext("Maximum ticket life: %s\n"),
1578 		    strdur(dprinc.max_life));
1579 		printf(gettext("Maximum renewable life: %s\n"),
1580 		    strdur(dprinc.max_renewable_life));
1581 		printf(gettext("Last modified: %s (%s)\n"),
1582 		    strdate(dprinc.mod_date), modcanon);
1583 		printf(gettext("Last successful authentication: %s\n"),
1584 	       dprinc.last_success ? strdate(dprinc.last_success) :
1585 		    gettext("[never]"));
1586 		printf(gettext("Last failed authentication: %s\n"),
1587 	       dprinc.last_failed ? strdate(dprinc.last_failed) :
1588 		    gettext("[never]"));
1589 		printf(gettext("Failed password attempts: %d\n"),
1590 	       dprinc.fail_auth_count);
1591 		printf(gettext("Number of keys: %d\n"), dprinc.n_key_data);
1592 	for (i = 0; i < dprinc.n_key_data; i++) {
1593 	    krb5_key_data *key_data = &dprinc.key_data[i];
1594 	    char enctype[BUFSIZ], salttype[BUFSIZ];
1595 
1596 	    if (krb5_enctype_to_string(key_data->key_data_type[0],
1597 				       enctype, sizeof(enctype)))
1598 		snprintf(enctype, sizeof (enctype), gettext("<Encryption type 0x%x>"),
1599 			key_data->key_data_type[0]);
1600 	    printf("Key: vno %d, %s, ", key_data->key_data_kvno, enctype);
1601 	    if (key_data->key_data_ver > 1) {
1602 		if (krb5_salttype_to_string(key_data->key_data_type[1],
1603 					    salttype, sizeof(salttype)))
1604 		    snprintf(salttype, sizeof(salttype), gettext("<Salt type 0x%x>"),
1605 			    key_data->key_data_type[1]);
1606 		printf("%s\n", salttype);
1607 	    } else
1608 		printf(gettext("no salt\n"));
1609 	}
1610 
1611 	printf(gettext("Attributes:"));
1612 	for (i = 0; i < sizeof (prflags) / sizeof (char *); i++) {
1613 	    if (dprinc.attributes & (krb5_flags) 1 << i)
1614 		printf(" %s", prflags[i]);
1615 	}
1616 	printf("\n");
1617 		printf(gettext("Policy: %s\n"),
1618 		    dprinc.policy ? dprinc.policy : gettext("[none]"));
1619     } else {
1620 	printf("\"%s\"\t%d\t%d\t%d\t%d\t\"%s\"\t%d\t%d\t%d\t%d\t\"%s\""
1621 	       "\t%d\t%d\t%d\t%d\t%d",
1622 	       canon, dprinc.princ_expire_time, dprinc.last_pwd_change,
1623 	       dprinc.pw_expiration, dprinc.max_life, modcanon,
1624 	       dprinc.mod_date, dprinc.attributes, dprinc.kvno,
1625 	       dprinc.mkvno, dprinc.policy ? dprinc.policy : gettext("[none]"),
1626 	       dprinc.max_renewable_life, dprinc.last_success,
1627 	       dprinc.last_failed, dprinc.fail_auth_count,
1628 	       dprinc.n_key_data);
1629 	for (i = 0; i < dprinc.n_key_data; i++)
1630 	    printf("\t%d\t%d\t%d\t%d",
1631 		   dprinc.key_data[i].key_data_ver,
1632 		   dprinc.key_data[i].key_data_kvno,
1633 		   dprinc.key_data[i].key_data_type[0],
1634 		   dprinc.key_data[i].key_data_type[1]);
1635 	printf("\n");
1636     }
1637     free(modcanon);
1638     kadm5_free_principal_ent(handle, &dprinc);
1639     free(canon);
1640 }
1641 
1642 void kadmin_getprincs(argc, argv)
1643     int argc;
1644     char *argv[];
1645 {
1646     krb5_error_code retval;
1647     char *expr, **names;
1648     int i, count;
1649 
1650 	FILE *output;
1651 	int fd;
1652 	struct sigaction nsig, osig;
1653 	sigset_t nmask, omask;
1654 	int waitb;
1655 
1656     expr = NULL;
1657     if (! (argc == 1 || (argc == 2 && (expr = argv[1])))) {
1658 		fprintf(stderr, "%s: get_principals %s\n",
1659 			gettext("usage"), gettext("[expression]"));
1660 	return;
1661     }
1662     retval = kadm5_get_principals(handle, expr, &names, &count);
1663     if (retval) {
1664 	com_err("get_principals", retval,
1665 			gettext("while retrieving list."));
1666 	return;
1667     }
1668 
1669 	/*
1670 	 * Solaris:  the following code is used for paging
1671 	 */
1672 
1673 	sigemptyset(&nmask);
1674 	sigaddset(&nmask, SIGINT);
1675 	sigprocmask(SIG_BLOCK, &nmask, &omask);
1676 
1677 	nsig.sa_handler = SIG_IGN;
1678 	sigemptyset(&nsig.sa_mask);
1679 	nsig.sa_flags = 0;
1680 	sigaction(SIGINT, &nsig, &osig);
1681 
1682 	fd = ss_pager_create();
1683 	output = fdopen(fd, "w");
1684 
1685 	sigprocmask(SIG_SETMASK, &omask, (sigset_t *)0);
1686 
1687     for (i = 0; i < count; i++)
1688 	 fprintf(output, "%s\n", names[i]);
1689 
1690 	fclose(output);
1691 
1692 	wait(&waitb);
1693 
1694 	/* Solaris Kerberos:
1695 	 * Restore the original handler for SIGINT
1696 	 */
1697 	if (sigaction(SIGINT, &osig, (struct sigaction *)0) == -1) {
1698 		perror("sigaction");
1699 	}
1700 
1701     kadm5_free_name_list(handle, names, count);
1702 }
1703 
1704 static int
1705 kadmin_parse_policy_args(argc, argv, policy, mask, caller)
1706     int argc;
1707     char *argv[];
1708     kadm5_policy_ent_t policy;
1709     long *mask;
1710     char *caller;
1711 {
1712     int i;
1713     time_t now;
1714     time_t date;
1715 
1716     time(&now);
1717     *mask = 0;
1718     for (i = 1; i < argc - 1; i++) {
1719 	if (strlen(argv[i]) == 8 &&
1720 	    !strcmp(argv[i], "-maxlife")) {
1721 	    if (++i > argc -2)
1722 		return -1;
1723 	    else {
1724 		date = get_date(argv[i]);
1725 		if (date == (time_t)-1) {
1726 		    fprintf(stderr, gettext("Invalid date specification \"%s\".\n"),
1727 			    argv[i]);
1728 		    return -1;
1729 		}
1730 
1731 				if (date <= now) {
1732 					fprintf(stderr,
1733 						gettext("Date specified is "
1734 							"in the past "
1735 							"\"%s\".\n"),
1736 						argv[i]);
1737 					return (-1);
1738 				}
1739 		policy->pw_max_life = date - now;
1740 		*mask |= KADM5_PW_MAX_LIFE;
1741 		continue;
1742 	    }
1743 	} else if (strlen(argv[i]) == 8 &&
1744 		   !strcmp(argv[i], "-minlife")) {
1745 	    if (++i > argc - 2)
1746 		return -1;
1747 	    else {
1748 		date = get_date(argv[i]);
1749 		if (date == (time_t)-1) {
1750 		    fprintf(stderr, gettext("Invalid date specification \"%s\".\n"),
1751 			    argv[i]);
1752 		    return -1;
1753 		}
1754 
1755 				if (date <= now) {
1756 					fprintf(stderr,
1757 						gettext("Date specified is "
1758 							"in the past "
1759 							"\"%s\".\n"),
1760 						argv[i]);
1761 					return (-1);
1762 				}
1763 		policy->pw_min_life = date - now;
1764 		*mask |= KADM5_PW_MIN_LIFE;
1765 		continue;
1766 	    }
1767 	} else if (strlen(argv[i]) == 10 &&
1768 		   !strcmp(argv[i], "-minlength")) {
1769 	    if (++i > argc - 2)
1770 		return -1;
1771 	    else {
1772 		policy->pw_min_length = atoi(argv[i]);
1773 		*mask |= KADM5_PW_MIN_LENGTH;
1774 		continue;
1775 	    }
1776 	} else if (strlen(argv[i]) == 11 &&
1777 		   !strcmp(argv[i], "-minclasses")) {
1778 	    if (++i > argc - 2)
1779 		return -1;
1780 	    else {
1781 		policy->pw_min_classes = atoi(argv[i]);
1782 		*mask |= KADM5_PW_MIN_CLASSES;
1783 		continue;
1784 	    }
1785 	} else if (strlen(argv[i]) == 8 &&
1786 		   !strcmp(argv[i], "-history")) {
1787 	    if (++i > argc - 2)
1788 		return -1;
1789 	    else {
1790 		policy->pw_history_num = atoi(argv[i]);
1791 		*mask |= KADM5_PW_HISTORY_NUM;
1792 		continue;
1793 	    }
1794 	} else
1795 	    return -1;
1796     }
1797     if (i != argc -1) {
1798 	fprintf(stderr, gettext("%s: parser lost count!\n"), caller);
1799 	return -1;
1800     } else
1801 	return 0;
1802 }
1803 
1804 static void
1805 kadmin_addmodpol_usage(func)
1806     char *func;
1807 {
1808 	fprintf(stderr, "%s: %s %s\n", gettext("usage"), func,
1809 		gettext("[options] policy"));
1810 	fprintf(stderr, gettext("\toptions are:\n"));
1811 	fprintf(stderr, "\t\t[-maxlife time] [-minlife time] "
1812 		"[-minlength length]\n\t\t[-minclasses number] "
1813 		"[-history number]\n");
1814 }
1815 
1816 void kadmin_addpol(argc, argv)
1817     int argc;
1818     char *argv[];
1819 {
1820     krb5_error_code retval;
1821     long mask;
1822     kadm5_policy_ent_rec policy;
1823 
1824     memset(&policy, 0, sizeof(policy));
1825     if (kadmin_parse_policy_args(argc, argv, &policy, &mask, "add_policy")) {
1826 	kadmin_addmodpol_usage("add_policy");
1827 	return;
1828     } else {
1829 	policy.policy = argv[argc - 1];
1830 	mask |= KADM5_POLICY;
1831 	retval = kadm5_create_policy(handle, &policy, mask);
1832 	if (retval) {
1833 			com_err("add_policy", retval,
1834 				gettext("while creating policy \"%s\"."),
1835 		    policy.policy);
1836 	    return;
1837 	}
1838     }
1839     return;
1840 }
1841 
1842 void kadmin_modpol(argc, argv)
1843     int argc;
1844     char *argv[];
1845 {
1846     krb5_error_code retval;
1847     long mask;
1848     kadm5_policy_ent_rec policy;
1849 
1850     memset(&policy, 0, sizeof(policy));
1851     if (kadmin_parse_policy_args(argc, argv, &policy, &mask,
1852 				 "modify_policy")) {
1853 	kadmin_addmodpol_usage("modify_policy");
1854 	return;
1855     } else {
1856 	policy.policy = argv[argc - 1];
1857 	retval = kadm5_modify_policy(handle, &policy, mask);
1858 	if (retval) {
1859 	    com_err("modify_policy", retval, gettext("while modifying policy \"%s\"."),
1860 		    policy.policy);
1861 	    return;
1862 	}
1863     }
1864     return;
1865 }
1866 
1867 void kadmin_delpol(argc, argv)
1868     int argc;
1869     char *argv[];
1870 {
1871     krb5_error_code retval;
1872     char reply[32];
1873 
1874     if (! (argc == 2 ||
1875 	   (argc == 3 && !strcmp("-force", argv[1])))) {
1876 	fprintf(stderr, "%s: delete_policy [-force] %s\n",
1877 			gettext("usage"), gettext("policy"));
1878 	return;
1879     }
1880     if (argc == 2) {
1881 		printf(gettext("Are you sure you want to delete the policy "
1882 			    "\"%s\"? (yes/no): "), argv[1]);
1883 	fgets(reply, sizeof (reply), stdin);
1884 		if (strncmp(gettext("yes\n"), reply, sizeof (reply)) &&
1885 			strncmp(gettext("y\n"), reply, sizeof (reply)) &&
1886 			strncmp(gettext("Y\n"), reply, sizeof (reply))
1887 			) {
1888 			fprintf(stderr,
1889 				gettext("Policy \"%s\" not deleted.\n"),
1890 				argv[1]);
1891 	    return;
1892 	}
1893     }
1894     retval = kadm5_delete_policy(handle, argv[argc - 1]);
1895     if (retval) {
1896 		com_err("delete_policy:", retval,
1897 			gettext("while deleting policy \"%s\""),
1898 		argv[argc - 1]);
1899 	return;
1900     }
1901     return;
1902 }
1903 
1904 void kadmin_getpol(argc, argv)
1905     int argc;
1906     char *argv[];
1907 {
1908     krb5_error_code retval;
1909     kadm5_policy_ent_rec policy;
1910 
1911     if (! (argc == 2 ||
1912 	   (argc == 3 && !strcmp("-terse", argv[1])))) {
1913 		fprintf(stderr, "%s: get_policy [-terse] %s\n",
1914 			gettext("usage"), gettext("policy"));
1915 	return;
1916     }
1917     retval = kadm5_get_policy(handle, argv[argc - 1], &policy);
1918     if (retval) {
1919 		com_err("get_policy", retval,
1920 			gettext("while retrieving policy \"%s\"."),
1921 		argv[argc - 1]);
1922 	return;
1923     }
1924     if (argc == 2) {
1925 		printf(gettext("Policy: %s\n"), policy.policy);
1926 		printf(gettext("Maximum password life: %ld\n"),
1927 		    policy.pw_max_life);
1928 		printf(gettext("Minimum password life: %ld\n"),
1929 		    policy.pw_min_life);
1930 		printf(gettext("Minimum password length: %ld\n"),
1931 		    policy.pw_min_length);
1932 		printf(gettext("Minimum number of password "
1933 			    "character classes: %ld\n"),
1934 	       policy.pw_min_classes);
1935 		printf(gettext("Number of old keys kept: %ld\n"),
1936 		    policy.pw_history_num);
1937 		printf(gettext("Reference count: %ld\n"), policy.policy_refcnt);
1938     } else {
1939 	printf("\"%s\"\t%ld\t%ld\t%ld\t%ld\t%ld\t%ld\n",
1940 	       policy.policy, policy.pw_max_life, policy.pw_min_life,
1941 	       policy.pw_min_length, policy.pw_min_classes,
1942 	       policy.pw_history_num, policy.policy_refcnt);
1943     }
1944     kadm5_free_policy_ent(handle, &policy);
1945     return;
1946 }
1947 
1948 void kadmin_getpols(argc, argv)
1949     int argc;
1950     char *argv[];
1951 {
1952     krb5_error_code retval;
1953     char *expr, **names;
1954     int i, count;
1955 
1956     /* Solaris Kerberos:
1957      * Use a pager for listing policies (similar to listing princs)
1958      */
1959     FILE *output = NULL;
1960     int fd;
1961     struct sigaction nsig, osig;
1962     sigset_t nmask, omask;
1963     int waitb;
1964 
1965     expr = NULL;
1966     if (! (argc == 1 || (argc == 2 && (expr = argv[1])))) {
1967 	fprintf(stderr, "%s: get_policies %s\n",
1968 			gettext("usage"), gettext("[expression]\n"));
1969 	return;
1970     }
1971     retval = kadm5_get_policies(handle, expr, &names, &count);
1972     if (retval) {
1973 	com_err("get_policies", retval,
1974 			gettext("while retrieving list."));
1975 	return;
1976     }
1977 
1978     if (sigemptyset(&nmask) == -1) {
1979         perror("sigemptyset");
1980         kadm5_free_name_list(handle, names, count);
1981         return;
1982     }
1983 
1984     if (sigaddset(&nmask, SIGINT) == -1) {
1985         perror("sigaddset");
1986         kadm5_free_name_list(handle, names, count);
1987         return;
1988     }
1989 
1990     if (sigemptyset(&nsig.sa_mask) == -1) {
1991         perror("sigemptyset");
1992         kadm5_free_name_list(handle, names, count);
1993         return;
1994     }
1995 
1996     if (sigprocmask(SIG_BLOCK, &nmask, &omask) == -1) {
1997         perror("sigprocmask");
1998         kadm5_free_name_list(handle, names, count);
1999         return;
2000     }
2001 
2002     nsig.sa_handler = SIG_IGN;
2003     nsig.sa_flags = 0;
2004     if (sigaction(SIGINT, &nsig, &osig) == -1) {
2005         perror("sigaction");
2006         if (sigprocmask(SIG_SETMASK, &omask, (sigset_t *)0) == -1) {
2007             perror("sigprocmask");
2008         }
2009         kadm5_free_name_list(handle, names, count);
2010         return;
2011     }
2012 
2013     fd = ss_pager_create();
2014     if (fd == -1) {
2015         fprintf(stderr, "%s: failed to create pager\n", whoami);
2016         if (sigprocmask(SIG_SETMASK, &omask, (sigset_t *)0) == -1) {
2017             perror("sigprocmask");
2018         }
2019 
2020         if (sigaction(SIGINT, &osig, (struct sigaction *)0) == -1) {
2021             perror("sigaction");
2022         }
2023 
2024         kadm5_free_name_list(handle, names, count);
2025         return;
2026     }
2027 
2028     output = fdopen(fd, "w");
2029     if (output == NULL) {
2030         perror("fdopen");
2031     }
2032 
2033     if (sigprocmask(SIG_SETMASK, &omask, (sigset_t *)0) == -1) {
2034         perror("sigprocmask");
2035     }
2036 
2037     if (output != NULL) {
2038         for (i = 0; i < count; i++)
2039         fprintf(output, "%s\n", names[i]);
2040     }
2041 
2042     if (output != NULL && fclose(output) != 0) {
2043         perror("fclose");
2044     }
2045 
2046     if (wait(&waitb) == -1) {
2047         perror("wait");
2048     }
2049 
2050     if (sigaction(SIGINT, &osig, (struct sigaction *)0) == -1) {
2051         perror("sigaction");
2052     }
2053     kadm5_free_name_list(handle, names, count);
2054 }
2055