summaryrefslogtreecommitdiff
path: root/crypto/heimdal/kadmin/init.c
diff options
context:
space:
mode:
authorcvs2svn <cvs2svn@FreeBSD.org>2000-03-20 08:47:53 +0000
committercvs2svn <cvs2svn@FreeBSD.org>2000-03-20 08:47:53 +0000
commit7e6cd705f344de2f9f08475a0fa2ef9191f88dd0 (patch)
tree3ce9d5458d0d6e880d50e1e1f1e1ed7521a35ad1 /crypto/heimdal/kadmin/init.c
parent172a0f0d163415e05ea07968167b11145975a6cb (diff)
Diffstat (limited to 'crypto/heimdal/kadmin/init.c')
-rw-r--r--crypto/heimdal/kadmin/init.c210
1 files changed, 0 insertions, 210 deletions
diff --git a/crypto/heimdal/kadmin/init.c b/crypto/heimdal/kadmin/init.c
deleted file mode 100644
index b88913121c249..0000000000000
--- a/crypto/heimdal/kadmin/init.c
+++ /dev/null
@@ -1,210 +0,0 @@
-/*
- * Copyright (c) 1997, 1998, 1999 Kungliga Tekniska Högskolan
- * (Royal Institute of Technology, Stockholm, Sweden).
- * All rights reserved.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- *
- * 1. Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- *
- * 2. Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in the
- * documentation and/or other materials provided with the distribution.
- *
- * 3. Neither the name of the Institute nor the names of its contributors
- * may be used to endorse or promote products derived from this software
- * without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
- * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
- * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
- * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
- * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
- * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
- * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
- * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
- * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
- * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
- * SUCH DAMAGE.
- */
-
-#include "kadmin_locl.h"
-#include <kadm5/private.h>
-
-RCSID("$Id: init.c,v 1.23 1999/12/02 17:04:58 joda Exp $");
-
-static kadm5_ret_t
-create_random_entry(krb5_principal princ,
- unsigned max_life,
- unsigned max_rlife,
- u_int32_t attributes)
-{
- kadm5_principal_ent_rec ent;
- kadm5_ret_t ret;
- int mask = 0;
- krb5_keyblock *keys;
- int n_keys, i;
-
- memset(&ent, 0, sizeof(ent));
- ent.principal = princ;
- mask |= KADM5_PRINCIPAL;
- if (max_life) {
- ent.max_life = max_life;
- mask |= KADM5_MAX_LIFE;
- }
- if (max_rlife) {
- ent.max_renewable_life = max_rlife;
- mask |= KADM5_MAX_RLIFE;
- }
- ent.attributes |= attributes | KRB5_KDB_DISALLOW_ALL_TIX;
- mask |= KADM5_ATTRIBUTES;
-
- ret = kadm5_create_principal(kadm_handle, &ent, mask, "hemlig");
- if(ret)
- return ret;
- ret = kadm5_randkey_principal(kadm_handle, princ, &keys, &n_keys);
- if(ret)
- return ret;
- for(i = 0; i < n_keys; i++)
- krb5_free_keyblock_contents(context, &keys[i]);
- free(keys);
- ret = kadm5_get_principal(kadm_handle, princ, &ent,
- KADM5_PRINCIPAL | KADM5_ATTRIBUTES);
- if(ret)
- return ret;
- ent.attributes &= (~KRB5_KDB_DISALLOW_ALL_TIX);
- ent.kvno = 1;
- ret = kadm5_modify_principal(kadm_handle, &ent,
- KADM5_ATTRIBUTES|KADM5_KVNO);
- kadm5_free_principal_ent (kadm_handle, &ent);
- if(ret)
- return ret;
- return 0;
-}
-
-static struct getargs args[] = {
- { "realm-max-ticket-life", 0, arg_string, NULL,
- "realm max ticket lifetime" },
- { "realm-max-renewable-life", 0, arg_string, NULL,
- "realm max renewable lifetime" },
-};
-
-static int num_args = sizeof(args) / sizeof(args[0]);
-
-static void
-usage(void)
-{
- arg_printusage (args, num_args, "ank", "principal");
-}
-
-int
-init(int argc, char **argv)
-{
- kadm5_ret_t ret;
- int i;
- char *realm_max_life = NULL;
- char *realm_max_rlife = NULL;
- HDB *db;
- int optind = 0;
- krb5_deltat max_life, max_rlife;
-
- args[0].value = &realm_max_life;
- args[1].value = &realm_max_rlife;
-
- if(getarg(args, num_args, argc, argv, &optind)) {
- usage();
- return 0;
- }
-
- if (realm_max_life) {
- if (str2deltat (realm_max_life, &max_life) != 0) {
- krb5_warnx (context, "unable to parse `%s'", realm_max_life);
- return 0;
- }
- }
- if (realm_max_rlife) {
- if (str2deltat (realm_max_rlife, &max_rlife) != 0) {
- krb5_warnx (context, "unable to parse `%s'", realm_max_rlife);
- return 0;
- }
- }
-
- db = _kadm5_s_get_db(kadm_handle);
-
- ret = db->open(context, db, O_RDWR | O_CREAT, 0600);
- if(ret){
- krb5_warn(context, ret, "hdb_open");
- return 0;
- }
- db->close(context, db);
- for(i = optind; i < argc; i++){
- krb5_principal princ;
- const char *realm = argv[i];
-
- /* Create `krbtgt/REALM' */
- krb5_make_principal(context, &princ, realm, "krbtgt", realm, NULL);
- if (realm_max_life == NULL) {
- max_life = 0;
- edit_deltat ("Realm max ticket life", &max_life, NULL, 0);
- }
- if (realm_max_rlife == NULL) {
- max_rlife = 0;
- edit_deltat("Realm max renewable ticket life", &max_rlife,
- NULL, 0);
- }
- create_random_entry(princ, max_life, max_rlife, 0);
- krb5_free_principal(context, princ);
-
- /* Create `kadmin/changepw' */
- krb5_make_principal(context, &princ, realm,
- "kadmin", "changepw", NULL);
- create_random_entry(princ, 5*60, 5*60,
- KRB5_KDB_DISALLOW_TGT_BASED|
- KRB5_KDB_PWCHANGE_SERVICE|
- KRB5_KDB_DISALLOW_POSTDATED|
- KRB5_KDB_DISALLOW_FORWARDABLE|
- KRB5_KDB_DISALLOW_RENEWABLE|
- KRB5_KDB_DISALLOW_PROXIABLE|
- KRB5_KDB_REQUIRES_PRE_AUTH);
- krb5_free_principal(context, princ);
-
- /* Create `kadmin/admin' */
- krb5_make_principal(context, &princ, realm,
- "kadmin", "admin", NULL);
- create_random_entry(princ, 60*60, 60*60, KRB5_KDB_REQUIRES_PRE_AUTH);
- krb5_free_principal(context, princ);
-
- /* Create `changepw/kerberos' (for v4 compat) */
- krb5_make_principal(context, &princ, realm,
- "changepw", "kerberos", NULL);
- create_random_entry(princ, 60*60, 60*60, 0);
- krb5_free_principal(context, princ);
-
- /* Create `default' */
- {
- kadm5_principal_ent_rec ent;
- int mask = 0;
-
- memset (&ent, 0, sizeof(ent));
- mask |= KADM5_PRINCIPAL;
- krb5_make_principal(context, &ent.principal, realm,
- "default", NULL);
- mask |= KADM5_MAX_LIFE;
- ent.max_life = 24 * 60 * 60;
- mask |= KADM5_MAX_RLIFE;
- ent.max_renewable_life = 7 * ent.max_life;
- ent.attributes = KRB5_KDB_DISALLOW_ALL_TIX;
- mask |= KADM5_ATTRIBUTES;
-
- ret = kadm5_create_principal(kadm_handle, &ent, mask, "");
- if (ret)
- krb5_err (context, 1, ret, "kadm5_create_principal");
-
- krb5_free_principal(context, ent.principal);
- }
- }
- return 0;
-}