Remove trailing whitespace.

This commit is contained in:
Rodney W. Grimes 1995-05-30 06:41:30 +00:00
parent 5ebc7e6281
commit 7799f52a32
Notes: svn2git 2020-12-20 02:59:44 +00:00
svn path=/head/; revision=8874
493 changed files with 4096 additions and 4086 deletions

View file

@ -125,7 +125,7 @@ main(argc, argv)
}
if ((ftsp = fts_open(++argv, fts_options , 0)) == NULL)
err(1, NULL);
err(1, NULL);
for (rval = 0; (p = fts_read(ftsp)) != NULL;) {
switch (p->fts_info) {

View file

@ -6,12 +6,12 @@
* <mit-copyright.h>.
*
* from: acl_files.c,v 4.4 89/12/19 13:30:53 jtkohl Exp $
* $Id: acl_files.c,v 1.2 1994/07/19 19:21:18 g89r4222 Exp $
* $Id: acl_files.c,v 1.1.1.1 1994/09/30 14:49:48 csgr Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: acl_files.c,v 1.2 1994/07/19 19:21:18 g89r4222 Exp $";
"$Id: acl_files.c,v 1.1.1.1 1994/09/30 14:49:48 csgr Exp $";
#endif lint
@ -86,7 +86,7 @@ char *canon;
dot = NULL;
}
}
/* No such luck */
end = principal + strlen(principal);
@ -121,7 +121,7 @@ char *canon;
strcpy(canon, KRB_REALM);
}
}
/* Get a lock to modify acl_file */
/* Return new FILE pointer */
/* or NULL if file cannot be modified */
@ -176,7 +176,7 @@ char *acl_file;
/* Closes f */
static int acl_commit(acl_file, f)
char *acl_file;
FILE *f;
FILE *f;
{
char new[LINESIZE];
int ret;
@ -203,7 +203,7 @@ FILE *f;
static int
acl_abort(acl_file, f)
char *acl_file;
FILE *f;
FILE *f;
{
char new[LINESIZE];
int ret;
@ -471,7 +471,7 @@ char *principal;
sprintf(buf, "*.*%s", realm);
if(acl_exact_match(acl, buf) || acl_exact_match(acl, "*.*@*")) return(1);
return(0);
}

View file

@ -1,10 +1,10 @@
# @(#)Makefile 5.4 (Berkeley) 5/7/91
# $Id: Makefile,v 1.4 1994/09/09 21:43:30 g89r4222 Exp $
# $Id: Makefile,v 1.1.1.1 1994/09/30 14:49:50 csgr Exp $
LIB= des
SRCS= cbc_cksm.c cbc_enc.c ecb_enc.c enc_read.c enc_writ.c pcbc_enc.c \
qud_cksm.c rand_key.c read_pwd.c set_key.c str2key.c \
cfb_enc.c 3ecb_enc.c ofb_enc.c 3cbc_enc.c
cfb_enc.c 3ecb_enc.c ofb_enc.c 3cbc_enc.c
#MAN1= des.1
#MAN3= des.3

View file

@ -2,7 +2,7 @@
/* Copyright (C) 1993 Eric Young - see README for more details */
/*-
* $Id: cbc_cksm.c,v 1.2 1994/07/19 19:21:45 g89r4222 Exp $
* $Id: cbc_cksm.c,v 1.1.1.1 1994/09/30 14:49:50 csgr Exp $
*/
#include "des_locl.h"
@ -34,7 +34,7 @@ des_cblock *ivec;
}
else
c2ln(in,tin0,tin1,l);
tin0^=tout0;
tin1^=tout1;
tin[0]=tin0;

View file

@ -2,7 +2,7 @@
/* Copyright (C) 1993 Eric Young - see README for more details */
/*-
* $Id: enc_read.c,v 1.2 1994/07/19 19:21:54 g89r4222 Exp $
* $Id: enc_read.c,v 1.1.1.1 1994/09/30 14:49:50 csgr Exp $
*/
#include <errno.h>
@ -22,7 +22,7 @@ des_cblock *iv;
/* data to be unencrypted */
int net_num=0;
unsigned char net[BSIZE];
/* extra unencrypted data
/* extra unencrypted data
* for when a block of 100 comes in but is des_read one byte at
* a time. */
static char unnet[BSIZE];
@ -61,7 +61,7 @@ des_cblock *iv;
/* first - get the length */
net_num=0;
while (net_num < HDRSIZE)
while (net_num < HDRSIZE)
{
i=read(fd,&(net[net_num]),HDRSIZE-net_num);
if ((i == -1) && (errno == EINTR)) continue;

View file

@ -2,7 +2,7 @@
/* Copyright (C) 1993 Eric Young - see README for more details */
/*-
* $Id: enc_writ.c,v 1.2 1994/07/19 19:21:56 g89r4222 Exp $
* $Id: enc_writ.c,v 1.1.1.1 1994/09/30 14:49:50 csgr Exp $
*/
#include <errno.h>
@ -67,10 +67,10 @@ des_cblock *iv;
if (des_rw_mode & DES_PCBC_MODE)
pcbc_encrypt((des_cblock *)p,(des_cblock *)&(outbuf[HDRSIZE]),
(long)((len<8)?8:len),sched,iv,DES_ENCRYPT);
(long)((len<8)?8:len),sched,iv,DES_ENCRYPT);
else
cbc_encrypt((des_cblock *)p,(des_cblock *)&(outbuf[HDRSIZE]),
(long)((len<8)?8:len),sched,iv,DES_ENCRYPT);
(long)((len<8)?8:len),sched,iv,DES_ENCRYPT);
/* output */
outnum=rnum+HDRSIZE;

View file

@ -2,7 +2,7 @@
/* Copyright (C) 1993 Eric Young - see README for more details */
/*-
* $Id: fcrypt.c,v 1.2 1994/07/19 19:21:58 g89r4222 Exp $
* $Id: fcrypt.c,v 1.1.1.1 1994/09/30 14:49:51 csgr Exp $
*/
#include <stdio.h>
@ -384,7 +384,7 @@ des_key_schedule schedule;
/* table contained 0213 4657 */
*(k++)=((t<<16)|(s&0x0000ffff))&0xffffffff;
s= ((s>>16)|(t&0xffff0000));
s=(s<<4)|(s>>28);
*(k++)=s&0xffffffff;
}
@ -396,7 +396,7 @@ des_key_schedule schedule;
******************************************************************/
/* The changes to this macro may help or hinder, depending on the
* compiler and the achitecture. gcc2 always seems to do well :-).
* compiler and the achitecture. gcc2 always seems to do well :-).
* Inspired by Dana How <how@isl.stanford.edu>
* DO NOT use the alternative version on machines with 8 byte longs.
*/

View file

@ -2,7 +2,7 @@
/* Copyright (C) 1993 Eric Young - see README for more details */
/*-
* $Id: qud_cksm.c,v 1.2 1994/07/19 19:22:02 g89r4222 Exp $
* $Id: qud_cksm.c,v 1.1.1.1 1994/09/30 14:49:51 csgr Exp $
*/
/* From "Message Authentication" R.R. Jueneman, S.M. Matyas, C.H. Meyer
@ -62,7 +62,7 @@ des_cblock *seed;
t1=z1;
/* square, well sort of square */
z0=((((t0*t0)&0xffffffff)+((t1*t1)&0xffffffff))
&0xffffffff)%0x7fffffff;
&0xffffffff)%0x7fffffff;
z1=((t0*((t1+NOISE)&0xffffffff))&0xffffffff)%0x7fffffff;
}
if (lp != NULL)

View file

@ -3,7 +3,7 @@
/* 06-Apr-92 Luke Brennan Support for VMS */
/*-
* $Id: read_pwd.c,v 1.1.1.1 1994/09/30 14:49:51 csgr Exp $
* $Id: read_pwd.c,v 1.2 1995/01/25 02:27:00 ache Exp $
*/
#include "des_locl.h"
@ -249,7 +249,7 @@ int verify;
if ((p=(char *)index(buff,'\n')) != NULL)
*p='\0';
else read_till_nl(tty);
if (strcmp(buf,buff) != 0)
{
fprintf(stderr,"\nVerify failure - try again\n");
@ -272,7 +272,7 @@ int verify;
status = SYS$QIOW(0,channel,IO$_SETMODE,&iosb,0,0
,tty_orig,12,0,0,0,0);
#endif /* VMS */
if (ps >= 1) popsig();
if (stdin != tty) fclose(tty);
#ifdef VMS

View file

@ -9,7 +9,7 @@
*/
/*-
* $Id: set_key.c,v 1.2 1994/07/19 19:22:07 g89r4222 Exp $
* $Id: set_key.c,v 1.1.1.1 1994/09/30 14:49:51 csgr Exp $
*/
#include "des_locl.h"
@ -87,7 +87,7 @@ des_cblock *key;
}
/* NOW DEFINED IN des_local.h
* See ecb_encrypt.c for a pseudo description of these macros.
* See ecb_encrypt.c for a pseudo description of these macros.
* #define PERM_OP(a,b,t,n,m) ((t)=((((a)>>(n))^(b))&(m)),\
* (b)^=(t),\
* (a)=((a)^((t)<<(n))))
@ -126,7 +126,7 @@ des_key_schedule schedule;
c2l(in,c);
c2l(in,d);
/* do PC1 in 60 simple operations */
/* do PC1 in 60 simple operations */
/* PERM_OP(d,c,t,4,0x0f0f0f0f);
HPERM_OP(c,t,-2, 0xcccc0000);
HPERM_OP(c,t,-1, 0xaaaa0000);
@ -175,7 +175,7 @@ des_key_schedule schedule;
/* table contained 0213 4657 */
*(k++)=((t<<16)|(s&0x0000ffff))&0xffffffff;
s= ((s>>16)|(t&0xffff0000));
s=(s<<4)|(s>>28);
*(k++)=s&0xffffffff;
}

View file

@ -362,4 +362,4 @@ unsigned char *p;
ret[16]='\0';
return(ret);
}

View file

@ -1,13 +1,13 @@
/*
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
*
* from: ext_srvtab.c,v 4.1 89/07/18 16:49:30 jtkohl Exp $
* $Id: ext_srvtab.c,v 1.2 1994/07/19 19:22:36 g89r4222 Exp $
* $Id: ext_srvtab.c,v 1.1.1.1 1994/09/30 14:49:53 csgr Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: ext_srvtab.c,v 1.2 1994/07/19 19:22:36 g89r4222 Exp $";
"$Id: ext_srvtab.c,v 1.1.1.1 1994/09/30 14:49:53 csgr Exp $";
#endif lint
#include <stdio.h>
@ -39,12 +39,12 @@ main(argc, argv)
int fopen_errs = 0;
int arg;
Principal princs[40];
int more;
int more;
int prompt = TRUE;
register int n, i;
bzero(realm, sizeof(realm));
/* Parse commandline arguments */
if (argc < 2)
usage();
@ -57,7 +57,7 @@ main(argc, argv)
usage();
else {
strcpy(realm, argv[i]);
/*
/*
* This is to humor the broken way commandline
* argument parsing is done. Later, this
* program ignores everything that starts with -.
@ -118,7 +118,7 @@ main(argc, argv)
bcopy(&princs[i].key_low, session_key, sizeof(long));
bcopy(&princs[i].key_high, session_key + sizeof(long),
sizeof(long));
kdb_encrypt_key (session_key, session_key,
kdb_encrypt_key (session_key, session_key,
master_key, master_key_schedule, DES_DECRYPT);
FWrite(session_key, sizeof session_key, 1, fout);
}
@ -158,7 +158,7 @@ StampOutSecrets()
usage()
{
fprintf(stderr,
fprintf(stderr,
"Usage: %s [-n] [-r realm] instance [instance ...]\n", progname);
exit(1);
}

View file

@ -1,12 +1,12 @@
/*
* Copyright 1987, 1988, 1989 by the Massachusetts Institute of Technology.
* Copyright 1987, 1988, 1989 by the Massachusetts Institute of Technology.
* For copying and distribution information, please see the file
* <Copyright.MIT>.
*
* Include file for address comparison macros.
*
* from: addr_comp.h,v 4.0 89/01/23 09:57:44 jtkohl Exp $
* $Id: addr_comp.h,v 1.2 1994/07/19 19:22:44 g89r4222 Exp $
* $Id: addr_comp.h,v 1.1.1.1 1994/09/30 14:49:53 csgr Exp $
*/
#ifndef ADDR_COMP_DEFS

View file

@ -1,12 +1,12 @@
/*
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
* For copying and distribution information, please see the file
* <Copyright.MIT>.
* <Copyright.MIT>.
*
* Include file for the Kerberos administration server.
* Include file for the Kerberos administration server.
*
* from: admin_server.h,v 4.7 89/01/11 11:59:42 steiner Exp $
* $Id: admin_server.h,v 1.2 1994/07/19 19:22:47 g89r4222 Exp $
* $Id: admin_server.h,v 1.1.1.1 1994/09/30 14:49:53 csgr Exp $
*/
#ifndef ADMIN_SERVER_DEFS

View file

@ -4,7 +4,7 @@
* <Copyright.MIT>.
*
* from: conf-bsdapollo.h,v 4.1 89/01/24 14:26:22 jtkohl Exp $
* $Id: conf-bsdapollo.h,v 1.2 1994/07/19 19:22:50 g89r4222 Exp $
* $Id: conf-bsdapollo.h,v 1.1.1.1 1994/09/30 14:49:53 csgr Exp $
*/
#define BSDUNIX
@ -18,4 +18,4 @@
*/
#define const

View file

@ -6,9 +6,9 @@
* Machine-type definitions: DECstation 3100 (MIPS R2000)
*
* from: conf-ultmips2.h,v 4.0 89/01/23 09:58:32 jtkohl Exp $
* $Id: conf-ultmips2.h,v 1.2 1994/07/19 19:23:03 g89r4222 Exp $
* $Id: conf-ultmips2.h,v 1.1.1.1 1994/09/30 14:49:54 csgr Exp $
*/
#define MIPS2
#define BITS32
#define BIG

View file

@ -5,8 +5,8 @@
*
* Include file for the Data Encryption Standard library.
*
* from: des.h,v 4.11 89/01/17 16:24:57 rfrench Exp $
* $Id: des.h,v 1.2 1994/07/19 19:23:06 g89r4222 Exp $
* from: des.h,v 4.11 89/01/17 16:24:57 rfrench Exp $
* $Id: des.h,v 1.1.1.1 1994/09/30 14:49:54 csgr Exp $
*/
/* only do the whole thing once */

View file

@ -1,12 +1,12 @@
/*
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
* For copying and distribution information, please see the file
* <Copyright.MIT>.
* <Copyright.MIT>.
*
* Include file for the Kerberos Key Distribution Center.
* Include file for the Kerberos Key Distribution Center.
*
* from: kdc.h,v 4.1 89/01/24 17:54:04 jon Exp $
* $Id: kdc.h,v 1.2 1994/07/19 19:23:11 g89r4222 Exp $
* $Id: kdc.h,v 1.1.1.1 1994/09/30 14:49:54 csgr Exp $
*/
#ifndef KDC_DEFS

View file

@ -4,10 +4,10 @@
* <Copyright.MIT>.
*
* This file defines the types of log messages logged by klog. Each
* type of message may be selectively turned on or off.
* type of message may be selectively turned on or off.
*
* from: klog.h,v 4.7 89/01/24 17:55:07 jon Exp $
* $Id: klog.h,v 1.2 1994/07/19 19:23:12 g89r4222 Exp $
* $Id: klog.h,v 1.1.1.1 1994/09/30 14:49:54 csgr Exp $
*/
#ifndef KLOG_DEFS

View file

@ -6,14 +6,14 @@
* Include file for kparse routines.
*
* from: kparse.h,v 4.5 89/01/11 12:05:53 steiner Exp $
* $Id: kparse.h,v 1.2 1994/07/19 19:23:14 g89r4222 Exp $
* $Id: kparse.h,v 1.1.1.1 1994/09/30 14:49:54 csgr Exp $
*/
#ifndef KPARSE_DEFS
#define KPARSE_DEFS
/*
* values returned by fGetParameterSet()
* values returned by fGetParameterSet()
*/
#define PS_BAD_KEYWORD -2 /* unknown or duplicate keyword */
@ -22,7 +22,7 @@
#define PS_EOF 1 /* nothing more in the file */
/*
* values returned by fGetKeywordValue()
* values returned by fGetKeywordValue()
*/
#define KV_SYNTAX -2 /* syntax error */
@ -31,7 +31,7 @@
#define KV_EOL 1 /* nothing more on this line */
/*
* values returned by fGetToken()
* values returned by fGetToken()
*/
#define GTOK_BAD_QSTRING -1 /* newline found in quoted string */
@ -44,7 +44,7 @@
#define GTOK_WHITE 5 /* one or more whitespace chars */
/*
* extended character classification macros
* extended character classification macros
*/
#define ISOCTAL(CH) ( (CH>='0') && (CH<='7') )
@ -54,14 +54,14 @@
/*
* tokens consist of any printable charcacter except comma, equal, or
* whitespace
* whitespace
*/
#define ISTOKENCHAR(C) ((C>040) && (C<0177) && (C != ',') && (C != '='))
/*
* the parameter table defines the keywords that will be recognized by
* fGetParameterSet, and their default values if not specified.
* fGetParameterSet, and their default values if not specified.
*/
typedef struct {

View file

@ -1,12 +1,12 @@
/*
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
* For copying and distribution information, please see the file
* <Copyright.MIT>.
* <Copyright.MIT>.
*
* Include file for the Kerberos library.
* Include file for the Kerberos library.
*
* from: krb.h,v 4.26 89/08/08 17:55:25 jtkohl Exp $
* $Id: krb.h,v 1.4 1994/09/24 14:15:41 g89r4222 Exp $
* from: krb.h,v 4.26 89/08/08 17:55:25 jtkohl Exp $
* $Id: krb.h,v 1.1.1.1 1994/09/30 14:49:54 csgr Exp $
*/
/* Only one time, please */
@ -37,7 +37,7 @@ typedef unsigned short gid_t;
#endif /* NO_UIDGID_T */
/*
* Kerberos specific definitions
* Kerberos specific definitions
*
* KRBLOG is the log file for the kerberos master server. KRB_CONF is
* the configuration file where different host machines running master
@ -47,7 +47,7 @@ typedef unsigned short gid_t;
* requests, which can go to slaves) must go to it. KRB_HOST is the
* default machine * when looking for a kerberos slave server. Other
* possibilities are * in the KRB_CONF file. KRB_REALM is the name of
* the realm.
* the realm.
*/
#ifdef notdef

View file

@ -6,15 +6,15 @@
* This file contains configuration information for the Kerberos library
* which is machine specific; currently, this file contains
* configuration information for the vax, the "ibm032" (RT), and the
* "PC8086" (IBM PC).
* "PC8086" (IBM PC).
*
* Note: cross-compiled targets must appear BEFORE their corresponding
* cross-compiler host. Otherwise, both will be defined when running
* the native compiler on the programs that construct cross-compiled
* sources.
* sources.
*
* from: krb_conf.h,v 4.0 89/01/23 09:59:27 jtkohl Exp $
* $Id: krb_conf.h,v 1.2 1994/07/19 19:23:18 g89r4222 Exp $
* from: krb_conf.h,v 4.0 89/01/23 09:59:27 jtkohl Exp $
* $Id: krb_conf.h,v 1.1.1.1 1994/09/30 14:49:54 csgr Exp $
*/
#ifndef KRB_CONF_DEFS

View file

@ -1,17 +1,17 @@
/*
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
* For copying and distribution information, please see the file
* <Copyright.MIT>.
* <Copyright.MIT>.
*
* spm Project Athena 8/85
* spm Project Athena 8/85
*
* This file defines data structures for the kerberos
* authentication/authorization database.
* authentication/authorization database.
*
* They MUST correspond to those defined in *.rel
* They MUST correspond to those defined in *.rel
*
* from: krb_db.h,v 4.9 89/01/24 17:55:39 jon Exp $
* $Id: krb_db.h,v 1.2 1994/07/19 19:23:19 g89r4222 Exp $
* from: krb_db.h,v 4.9 89/01/24 17:55:39 jon Exp $
* $Id: krb_db.h,v 1.1.1.1 1994/09/30 14:49:54 csgr Exp $
*/
#ifndef KRB_DB_DEFS

View file

@ -1,12 +1,12 @@
/*
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
* For copying and distribution information, please see the file
* <Copyright.MIT>.
* <Copyright.MIT>.
*
* Include file for password server
*
* from: passwd_server.h,v 4.6 89/01/11 15:12:22 steiner Exp $
* $Id: passwd_server.h,v 1.2 1994/07/19 19:23:24 g89r4222 Exp $
* from: passwd_server.h,v 4.6 89/01/11 15:12:22 steiner Exp $
* $Id: passwd_server.h,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $
*/
#ifndef PASSWD_SERVER_DEFS

View file

@ -1,15 +1,15 @@
/*
* $Source: /afs/athena.mit.edu/astaff/project/kerberos/src/kadmin/RCS/kadmin.c,v $
* $Author: qjb $
* $Source: /home/ncvs/src/eBones/kadmin/kadmin.c,v $
* $Author: wollman $
*
* Copyright 1988 by the Massachusetts Institute of Technology.
*
* For copying and distribution information, please see the file
* Copyright.MIT.
*
* Kerberos database administrator's tool.
*
* The default behavior of kadmin is if the -m option is given
* Kerberos database administrator's tool.
*
* The default behavior of kadmin is if the -m option is given
* on the commandline, multiple requests are allowed to be given
* with one entry of the admin password (until the tickets expire).
* If you do not want this to be an available option, compile with
@ -54,7 +54,7 @@ static char default_realm[REALM_SZ]; /* default kerberos realm */
static char krbrlm[REALM_SZ]; /* current realm being administered */
#ifndef NO_MULTIPLE
static int multiple = 0; /* Allow multiple requests per ticket */
#endif
#endif
main(argc, argv)
int argc;
@ -106,18 +106,18 @@ setvals(vals, string)
strcpy(realm, default_realm);
if (strcmp(realm, krbrlm)) {
strcpy(krbrlm, realm);
if ((status = kadm_init_link(PWSERV_NAME, KRB_MASTER, krbrlm))
if ((status = kadm_init_link(PWSERV_NAME, KRB_MASTER, krbrlm))
!= KADM_SUCCESS)
printf("kadm error for realm %s: %s\n",
printf("kadm error for realm %s: %s\n",
krbrlm, error_message(status));
}
if (status)
if (status)
return 1;
else
return KADM_SUCCESS;
}
}
void
void
change_password(argc, argv)
int argc;
char *argv[];
@ -145,7 +145,7 @@ change_password(argc, argv)
/* get the new password */
(void) sprintf(pw_prompt, "New password for %s:", argv[1]);
if (get_password(&new.key_low, &new.key_high,
pw_prompt, SWAP) == GOOD_PW) {
status = kadm_mod(&old, &new);
@ -163,13 +163,13 @@ change_password(argc, argv)
clean_up();
#endif
}
else
else
printf("kadmin: Principal does not exist.\n");
return;
}
/*ARGSUSED*/
void
void
change_admin_password(argc, argv)
int argc;
char *argv[];
@ -206,7 +206,7 @@ change_admin_password(argc, argv)
return;
}
void
void
add_new_key(argc, argv)
int argc;
char *argv[];
@ -228,10 +228,10 @@ add_new_key(argc, argv)
/* get the admin's password */
if (get_admin_password() != GOOD_PW)
return;
/* get the new password */
(void) sprintf(pw_prompt, "Password for %s:", argv[1]);
if (get_password(&new.key_low, &new.key_high,
pw_prompt, SWAP) == GOOD_PW) {
status = kadm_add(&new);
@ -253,7 +253,7 @@ add_new_key(argc, argv)
return;
}
void
void
get_entry(argc, argv)
int argc;
char *argv[];
@ -283,12 +283,12 @@ get_entry(argc, argv)
/* get the admin's password */
if (get_admin_password() != GOOD_PW)
return;
if ((status = kadm_get(&vals, fields)) == KADM_SUCCESS)
prin_vals(&vals);
else
printf("kadm error: %s\n",error_message(status));
#ifndef NO_MULTIPLE
if (!multiple)
clean_up();
@ -300,7 +300,7 @@ get_entry(argc, argv)
}
void
void
help(argc, argv)
int argc;
char *argv[];
@ -435,18 +435,18 @@ do_init(argc, argv)
#else
#define OPTION_STRING "u:r:"
#endif
bzero(myname, sizeof(myname));
if (!inited) {
/*
* This is only as a default/initial realm; we don't care
/*
* This is only as a default/initial realm; we don't care
* about failure.
*/
if (krb_get_lrealm(default_realm, 1) != KSUCCESS)
strcpy(default_realm, KRB_REALM);
/*
/*
* If we can reach the local realm, initialize to it. Otherwise,
* don't initialize.
*/
@ -455,7 +455,7 @@ do_init(argc, argv)
else
strcpy(krbrlm, default_realm);
while ((c = getopt(argc, argv, OPTION_STRING)) != EOF)
while ((c = getopt(argc, argv, OPTION_STRING)) != EOF)
switch (c) {
case 'u':
strncpy(myname, optarg, sizeof(myname) - 1);
@ -508,9 +508,9 @@ get_admin_password()
/* If admin tickets exist and are valid, just exit. */
bzero(&c, sizeof(c));
if (krb_get_cred(PWSERV_NAME, KADM_SINST, krbrlm, &c) == KSUCCESS)
/*
/*
* If time is less than lifetime - FUDGE_VALUE after issue date,
* tickets will probably last long enough for the next
* tickets will probably last long enough for the next
* transaction.
*/
if (time(0) < (c.issue_date + (5 * 60 * c.lifetime) - FUDGE_VALUE))
@ -518,14 +518,14 @@ get_admin_password()
ticket_life = DEFAULT_TKT_LIFE;
}
#endif
if (princ_exists(myname, "admin", krbrlm) != PE_NO) {
if (read_long_pw_string(admin_passwd, sizeof(admin_passwd)-1,
"Admin password:", 0)) {
fprintf(stderr, "Error reading admin password.\n");
goto bad;
}
status = krb_get_pw_in_tkt(myname, "admin", krbrlm, PWSERV_NAME,
status = krb_get_pw_in_tkt(myname, "admin", krbrlm, PWSERV_NAME,
KADM_SINST, ticket_life, admin_passwd);
bzero(admin_passwd, sizeof(admin_passwd));
}
@ -546,7 +546,7 @@ get_admin_password()
"while getting password tickets");
goto bad;
}
bad:
bzero(admin_passwd, sizeof(admin_passwd));
(void) dest_tkt();
@ -560,8 +560,8 @@ clean_up()
return;
}
void
quit()
void
quit()
{
printf("Cleaning up and exiting.\n");
clean_up();

View file

@ -96,7 +96,7 @@ char *argv[];
if (krbrlm[0] == 0)
if (krb_get_lrealm(krbrlm, 0) != KSUCCESS) {
fprintf(stderr,
fprintf(stderr,
"Unable to get local realm. Fix krb.conf or use -r.\n");
exit(1);
}
@ -165,7 +165,7 @@ doexit()
return(0);
#endif /* POSIX */
}
unsigned pidarraysize = 0;
int *pidarray = (int *)0;
@ -217,7 +217,7 @@ kadm_listen()
if (errno != EINTR)
log("select: %s",error_message(errno));
continue;
}
}
if (FD_ISSET(admin_fd, &readfds)) {
/* accept the conn */
addrlen = sizeof(peer);
@ -297,7 +297,7 @@ struct sockaddr_in *who;
/* db locked */
u_long retcode = KADM_DB_INUSE;
char *pdat;
dat_len = KADM_VERSIZE + sizeof(u_long);
dat = (u_char *) malloc((unsigned)dat_len);
pdat = (char *) dat;
@ -352,10 +352,10 @@ struct sockaddr_in *who;
}
if ((retval = kadm_ser_in(&dat,&dat_len)) != KADM_SUCCESS)
log("processing request: %s", error_message(retval));
/* kadm_ser_in did the processing and returned stuff in
dat & dat_len , return the appropriate data */
out:
dlen = (u_short) dat_len;
@ -364,13 +364,13 @@ struct sockaddr_in *who;
abort(); /* XXX */
}
dlen = htons(dlen);
if (krb_net_write(fd, (char *)&dlen, sizeof(u_short)) < 0) {
log("writing dlen to client: %s",error_message(errno));
(void) close(fd);
cleanexit(6);
}
if (krb_net_write(fd, (char *)dat, dat_len) < 0) {
log(LOG_ERR, "writing to client: %s",error_message(errno));
(void) close(fd);
@ -435,7 +435,7 @@ kill_children()
{
register int i;
int osigmask;
osigmask = sigblock(sigmask(SIGCHLD));
for (i = 0; i < pidarraysize; i++) {

View file

@ -13,7 +13,7 @@ static char rcsid_kadm_funcs_c[] =
"Id: kadm_funcs.c,v 4.3 90/03/20 01:39:51 jon Exp ";
#endif
static const char rcsid[] =
"$Id$";
"$Id: kadm_funcs.c,v 1.1 1995/01/20 03:12:55 wollman Exp $";
#endif lint
/*
@ -40,7 +40,7 @@ enum acl_types acltype;
extern char *acldir;
(void) sprintf(checkname, "%s.%s@%s", pname, pinst, prealm);
switch (acltype) {
case ADDACL:
(void) sprintf(filename, "%s%s", acldir, ADD_ACL_FILE);
@ -85,7 +85,7 @@ Kadm_vals *valsout;
rname, rinstance, rrealm, valsin->name, valsin->instance);
return KADM_UNAUTH;
}
/* Need to check here for "legal" name and instance */
if (wildcard(valsin->name) || wildcard(valsin->instance)) {
failadd(KADM_ILL_WILDCARD);
@ -93,7 +93,7 @@ Kadm_vals *valsout;
(void) log("request to add an entry for '%s.%s' from '%s.%s@%s'",
valsin->name, valsin->instance, rname, rinstance, rrealm);
numfound = kerb_get_principal(KERB_DEFAULT_NAME, KERB_DEFAULT_INST,
&default_princ, 1, &more);
if (numfound == -1) {
@ -111,7 +111,7 @@ Kadm_vals *valsout;
if (!IS_FIELD(KADM_ATTR,valsin->fields))
data_i.attributes = default_princ.attributes;
if (!IS_FIELD(KADM_MAXLIFE,valsin->fields))
data_i.max_life = default_princ.max_life;
data_i.max_life = default_princ.max_life;
bzero((char *)&default_princ, sizeof(default_princ));
@ -131,7 +131,7 @@ Kadm_vals *valsout;
bzero((char *)newpw, sizeof(newpw));
data_o = data_i;
numfound = kerb_get_principal(valsin->name, valsin->instance,
numfound = kerb_get_principal(valsin->name, valsin->instance,
&data_o, 1, &more);
if (numfound == -1) {
failadd(KADM_DB_INUSE);
@ -150,7 +150,7 @@ Kadm_vals *valsout;
} else if (numfound) {
failadd(KADM_UK_SERROR);
} else {
numfound = kerb_get_principal(valsin->name, valsin->instance,
numfound = kerb_get_principal(valsin->name, valsin->instance,
&data_o, 1, &more);
if ((numfound!=1) || (more!=0)) {
failadd(KADM_UK_RERROR);
@ -183,22 +183,22 @@ Kadm_vals *valsout; /* what data is there */
int more; /* To point to more name.instances */
Principal data_o; /* Data object to hold Principal */
if (!check_access(rname, rinstance, rrealm, GETACL)) {
(void) log("WARNING: '%s.%s@%s' tried to get '%s.%s's entry",
rname, rinstance, rrealm, valsin->name, valsin->instance);
return KADM_UNAUTH;
}
if (wildcard(valsin->name) || wildcard(valsin->instance)) {
failget(KADM_ILL_WILDCARD);
}
(void) log("retrieve '%s.%s's entry for '%s.%s@%s'",
valsin->name, valsin->instance, rname, rinstance, rrealm);
/* Look up the record in the database */
numfound = kerb_get_principal(valsin->name, valsin->instance,
numfound = kerb_get_principal(valsin->name, valsin->instance,
&data_o, 1, &more);
if (numfound == -1) {
failget(KADM_DB_INUSE);
@ -231,17 +231,17 @@ Kadm_vals *valsout; /* the actual record which is returned */
if (wildcard(valsin1->name) || wildcard(valsin1->instance)) {
failmod(KADM_ILL_WILDCARD);
}
if (!check_access(rname, rinstance, rrealm, MODACL)) {
(void) log("WARNING: '%s.%s@%s' tried to change '%s.%s's entry",
rname, rinstance, rrealm, valsin1->name, valsin1->instance);
return KADM_UNAUTH;
}
(void) log("request to modify '%s.%s's entry from '%s.%s@%s' ",
valsin1->name, valsin1->instance, rname, rinstance, rrealm);
numfound = kerb_get_principal(valsin1->name, valsin1->instance,
numfound = kerb_get_principal(valsin1->name, valsin1->instance,
&data_o, 1, &more);
if (numfound == -1) {
failmod(KADM_DB_INUSE);
@ -254,7 +254,7 @@ Kadm_vals *valsout; /* the actual record which is returned */
if (IS_FIELD(KADM_ATTR,valsin2->fields))
data_o.attributes = temp_key.attributes;
if (IS_FIELD(KADM_MAXLIFE,valsin2->fields))
data_o.max_life = temp_key.max_life;
data_o.max_life = temp_key.max_life;
if (IS_FIELD(KADM_DESKEY,valsin2->fields)) {
data_o.key_version++;
data_o.kdc_key_ver = server_parm.master_key_version;
@ -289,7 +289,7 @@ Kadm_vals *valsout; /* the actual record which is returned */
} else if (more) {
failmod(KADM_UK_SERROR);
} else {
numfound = kerb_get_principal(valsin1->name, valsin1->instance,
numfound = kerb_get_principal(valsin1->name, valsin1->instance,
&data_o, 1, &more);
if ((more!=0)||(numfound!=1)) {
failmod(KADM_UK_RERROR);
@ -335,14 +335,14 @@ des_cblock newpw;
}
(void) log("'%s.%s@%s' wants to change its password",
rname, rinstance, rrealm);
bcopy(newpw, local_pw, sizeof(local_pw));
/* encrypt new key in master key */
kdb_encrypt_key (local_pw, local_pw, server_parm.master_key,
server_parm.master_key_schedule, ENCRYPT);
numfound = kerb_get_principal(rname, rinstance,
numfound = kerb_get_principal(rname, rinstance,
&data_o, 1, &more);
if (numfound == -1) {
failchange(KADM_DB_INUSE);

View file

@ -12,7 +12,7 @@ static char rcsid_module_c[] =
"BonesHeader: /afs/athena.mit.edu/astaff/project/kerberos/src/kadmin/RCS/kadm_ser_wrap.c,v 4.4 89/09/26 09:29:36 jtkohl Exp ";
#endif lint
/*
/*
kadm_ser_wrap.c
unwraps wrapped packets and calls the appropriate server subroutine
*/
@ -28,7 +28,7 @@ unwraps wrapped packets and calls the appropriate server subroutine
Kadm_Server server_parm;
/*
/*
kadm_ser_init
set up the server_parm structure
*/
@ -147,7 +147,7 @@ int *dat_len;
#else
des_key_sched(ad.session, sess_sched);
#endif
if (retc = (int) krb_rd_priv(in_st, r_len, sess_sched, ad.session,
if (retc = (int) krb_rd_priv(in_st, r_len, sess_sched, ad.session,
&server_parm.recv_addr,
&server_parm.admin_addr, &msg_st)) {
clr_cli_secrets();

View file

@ -15,7 +15,7 @@ static char rcsid_kadm_server_c[] =
#include <kadm.h>
#include <kadm_err.h>
/*
/*
kadm_ser_cpw - the server side of the change_password routine
recieves : KTEXT, {key}
returns : CKSUM, RETCODE

View file

@ -1,7 +1,7 @@
/*
* $Source: /afs/athena.mit.edu/astaff/project/kerberos/src/kadmin/RCS/kadm_server.h,v $
* $Author: jtkohl $
* Header: /afs/athena.mit.edu/astaff/project/kerberos/src/kadmin/RCS/kadm_server.h,v 4.1 89/12/21 17:46:51 jtkohl Exp
* $Source: /home/ncvs/src/eBones/kadmind/kadm_server.h,v $
* $Author: wollman $
* Header: /afs/athena.mit.edu/astaff/project/kerberos/src/kadmin/RCS/kadm_server.h,v 4.1 89/12/21 17:46:51 jtkohl Exp
*
* Copyright 1988 by the Massachusetts Institute of Technology.
*

View file

@ -1,17 +1,17 @@
/*
* Copyright 1988 by the Massachusetts Institute of Technology.
* Copyright 1988 by the Massachusetts Institute of Technology.
* For copying and distribution information, please see the file
* <Copyright.MIT>.
*
* This is where a cache would be implemented, if it were necessary.
*
* from: krb_cache.c,v 4.5 89/01/24 18:12:34 jon Exp $
* $Id: krb_cache.c,v 1.2 1994/07/19 19:23:35 g89r4222 Exp $
* $Id: krb_cache.c,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: krb_cache.c,v 1.2 1994/07/19 19:23:35 g89r4222 Exp $";
"$Id: krb_cache.c,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $";
#endif lint
#include <stdio.h>
@ -34,7 +34,7 @@ extern long kerb_debug;
static init = 0;
/*
* initialization routine for cache
* initialization routine for cache
*/
int
@ -45,7 +45,7 @@ kerb_cache_init()
}
/*
* look up a principal in the cache returns number of principals found
* look up a principal in the cache returns number of principals found
*/
int
@ -66,7 +66,7 @@ kerb_cache_get_principal(serv, inst, principal, max)
fprintf(stderr, "cache_get_principal for %s %s max = %d\n",
serv, inst, max);
#endif DEBUG
#ifdef DEBUG
if (kerb_debug & 2) {
if (found) {
@ -83,7 +83,7 @@ kerb_cache_get_principal(serv, inst, principal, max)
/*
* insert/replace a principal in the cache returns number of principals
* inserted
* inserted
*/
int
@ -106,13 +106,13 @@ kerb_cache_put_principal(principal, max)
max);
}
#endif
for (i = 0; i < max; i++) {
#ifdef DEBUG
if (kerb_debug & 2)
fprintf(stderr, "\n %s %s",
principal->name, principal->instance);
#endif
#endif
/* DO IT */
count++;
principal++;
@ -121,7 +121,7 @@ kerb_cache_put_principal(principal, max)
}
/*
* look up a dba in the cache returns number of dbas found
* look up a dba in the cache returns number of dbas found
*/
int
@ -158,7 +158,7 @@ kerb_cache_get_dba(serv, inst, dba, max)
}
/*
* insert/replace a dba in the cache returns number of dbas inserted
* insert/replace a dba in the cache returns number of dbas inserted
*/
int
@ -183,7 +183,7 @@ kerb_cache_put_dba(dba, max)
if (kerb_debug & 2)
fprintf(stderr, "\n %s %s",
dba->name, dba->instance);
#endif
#endif
/* DO IT */
count++;
dba++;

View file

@ -1,15 +1,15 @@
/*
* Copyright 1988 by the Massachusetts Institute of Technology.
* Copyright 1988 by the Massachusetts Institute of Technology.
* For copying and distribution information, please see the file
* <Copyright.MIT>.
* <Copyright.MIT>.
*
* from: krb_dbm.c,v 4.9 89/04/18 16:15:13 wesommer Exp $
* $Id: krb_dbm.c,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $
* $Id: krb_dbm.c,v 1.2 1995/01/25 19:45:25 ache Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: krb_dbm.c,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $";
"$Id: krb_dbm.c,v 1.2 1995/01/25 19:45:25 ache Exp $";
#endif lint
#if defined(__FreeBSD__)
@ -69,14 +69,14 @@ static int non_blocking = 0;
/*
* Locking:
*
*
* There are two distinct locking protocols used. One is designed to
* lock against processes (the admin_server, for one) which make
* incremental changes to the database; the other is designed to lock
* against utilities (kdb_util, kpropd) which replace the entire
* database in one fell swoop.
*
* The first locking protocol is implemented using flock() in the
* The first locking protocol is implemented using flock() in the
* krb_dbl_lock() and krb_dbl_unlock routines.
*
* The second locking protocol is necessary because DBM "files" are
@ -93,12 +93,12 @@ static int non_blocking = 0;
* either time, the reader sleeps for a second to let things
* stabilize, and then tries again; if it does not succeed after
* KERB_DB_MAX_RETRY attempts, it gives up.
*
*
* On update, the semaphore file is deleted (if it exists) before any
* update takes place; at the end of the update, it is replaced, with
* a version number strictly greater than the version number which
* existed at the start of the update.
*
*
* If the system crashes in the middle of an update, the semaphore
* file is not automatically created on reboot; this is a feature, not
* a bug, since the database may be inconsistant. Note that the
@ -140,7 +140,7 @@ static char *gen_dbsuffix(db_name, sfx)
char *sfx;
{
char *dbsuffix;
if (sfx == NULL)
sfx = ".ok";
@ -162,7 +162,7 @@ kerb_db_init()
/*
* gracefully shut down database--must be called by ANY program that does
* a kerb_db_init
* a kerb_db_init
*/
kerb_db_fini()
@ -201,7 +201,7 @@ long kerb_get_db_age()
struct stat st;
char *okname;
long age;
okname = gen_dbsuffix(current_db_name, ".ok");
if (stat (okname, &st) < 0)
@ -226,7 +226,7 @@ static long kerb_start_update(db_name)
{
char *okname = gen_dbsuffix(db_name, ".ok");
long age = kerb_get_db_age();
if (unlink(okname) < 0
&& errno != ENOENT) {
age = -1;
@ -243,7 +243,7 @@ static long kerb_end_update(db_name, age)
int retval = 0;
char *new_okname = gen_dbsuffix(db_name, ".ok#");
char *okname = gen_dbsuffix(db_name, ".ok");
fd = open (new_okname, O_CREAT|O_RDWR|O_TRUNC, 0600);
if (fd < 0)
retval = errno;
@ -355,7 +355,7 @@ kerb_db_rename(from, to)
char *fromok = gen_dbsuffix(from, ".ok");
long trans = kerb_start_update(to);
int ok;
#ifndef __FreeBSD__
if ((rename (fromdir, todir) == 0)
&& (rename (frompag, topag) == 0)) {
@ -384,7 +384,7 @@ kerb_db_rename(from, to)
/*
* look up a principal in the data base returns number of principals
* found , and whether there were more than requested.
* found , and whether there were more than requested.
*/
kerb_db_get_principal(name, inst, principal, max, more)
@ -627,7 +627,7 @@ delta_stat(a, b, c)
/*
* look up a dba in the data base returns number of dbas found , and
* whether there were more than requested.
* whether there were more than requested.
*/
kerb_db_get_dba(dba_name, dba_inst, dba, max, more)
@ -650,7 +650,7 @@ kerb_db_iterate (func, arg)
Principal *principal;
int code;
DBM *db;
kerb_db_init(); /* initialize and open the database */
if ((code = kerb_dbl_lock(KERB_DBL_SHARED)) != 0)
return code;
@ -701,7 +701,7 @@ static int kerb_dbl_lock(mode)
int mode;
{
int flock_mode;
if (!inited)
kerb_dbl_init();
if (mylock) { /* Detect lock call when lock already
@ -723,8 +723,8 @@ static int kerb_dbl_lock(mode)
}
if (non_blocking)
flock_mode |= LOCK_NB;
if (flock(dblfd, flock_mode) < 0)
if (flock(dblfd, flock_mode) < 0)
return errno;
mylock++;
return 0;

View file

@ -10,12 +10,12 @@
* Jon Rochlis, MIT Telecom, March 1988
*
* from: krb_kdb_utils.c,v 4.1 89/07/26 11:01:12 jtkohl Exp $
* $Id: krb_kdb_utils.c,v 1.2 1994/07/19 19:23:38 g89r4222 Exp $
* $Id: krb_kdb_utils.c,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: krb_kdb_utils.c,v 1.2 1994/07/19 19:23:38 g89r4222 Exp $";
"$Id: krb_kdb_utils.c,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $";
#endif lint
#include <des.h>
@ -79,7 +79,7 @@ long kdb_verify_master_key (master_key, master_key_sched, out)
n = kerb_get_principal(KERB_M_NAME, KERB_M_INST, principal_data,
1 /* only one please */, &more);
if ((n != 1) || more) {
if (out != (FILE *) NULL)
if (out != (FILE *) NULL)
fprintf(out,
"verify_master_key: %s, %d found.\n",
"Kerberos error on master key version lookup",
@ -96,11 +96,11 @@ long kdb_verify_master_key (master_key, master_key_sched, out)
/*
* now use the master key to decrypt the key in the db, had better
* be the same!
* be the same!
*/
bcopy(&principal_data[0].key_low, key_from_db, 4);
bcopy(&principal_data[0].key_high, ((long *) key_from_db) + 1, 4);
kdb_encrypt_key (key_from_db, key_from_db,
kdb_encrypt_key (key_from_db, key_from_db,
master_key, master_key_sched, DECRYPT);
/* the decrypted database key had better equal the master key */

View file

@ -1,16 +1,16 @@
/*
* $Source: /home/CVS/src/eBones/kdb/krb_lib.c,v $
* $Author: g89r4222 $
* $Source: /home/ncvs/src/eBones/kdb/krb_lib.c,v $
* $Author: csgr $
*
* Copyright 1988 by the Massachusetts Institute of Technology.
* Copyright 1988 by the Massachusetts Institute of Technology.
*
* For copying and distribution information, please see the file
* <mit-copyright.h>.
* <mit-copyright.h>.
*/
#ifndef lint
static char rcsid[] =
"$Id: krb_lib.c,v 1.2 1994/07/19 19:23:39 g89r4222 Exp $";
"$Id: krb_lib.c,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $";
#endif lint
#include <stdio.h>
@ -37,7 +37,7 @@ extern char *getenv();
static init = 0;
/*
* initialization routine for data base
* initialization routine for data base
*/
int
@ -64,7 +64,7 @@ kerb_init()
/*
* finalization routine for database -- NOTE: MUST be called by any
* program using kerb_init. ALSO will have to be modified to finalize
* caches, if they're ever really implemented.
* caches, if they're ever really implemented.
*/
int
@ -75,7 +75,7 @@ kerb_fini()
/*
* look up a principal in the cache or data base returns number of
* principals found
* principals found
*/
int
@ -99,10 +99,10 @@ kerb_get_principal(name, inst, principal, max, more)
fprintf(stderr, "\n%s: kerb_get_principal for %s %s max = %d\n",
progname, name, inst, max);
#endif
/*
* if this is a request including a wild card, have to go to db
* since the cache may not be exhaustive.
* since the cache may not be exhaustive.
*/
/* clear the principal area */
@ -111,7 +111,7 @@ kerb_get_principal(name, inst, principal, max, more)
#ifdef CACHE
/*
* so check to see if the name contains a wildcard "*" or "?", not
* preceeded by a backslash.
* preceeded by a backslash.
*/
wild = 0;
if (index(name, '*') || index(name, '?') ||
@ -206,7 +206,7 @@ kerb_get_dba(name, inst, dba, max, more)
#endif
/*
* if this is a request including a wild card, have to go to db
* since the cache may not be exhaustive.
* since the cache may not be exhaustive.
*/
/* clear the dba area */
@ -215,7 +215,7 @@ kerb_get_dba(name, inst, dba, max, more)
#ifdef CACHE
/*
* so check to see if the name contains a wildcard "*" or "?", not
* preceeded by a backslash.
* preceeded by a backslash.
*/
wild = 0;

View file

@ -1,15 +1,15 @@
/*
* Copyright 1988 by the Massachusetts Institute of Technology.
* Copyright 1988 by the Massachusetts Institute of Technology.
* For copying and distribution information, please see the file
* <Copyright.MIT>.
* <Copyright.MIT>.
*
* from: $Header: /home/CVS/src/eBones/kdb/print_princ.c,v 1.2 1994/07/19 19:23:41 g89r4222 Exp $
* $Id: print_princ.c,v 1.2 1994/07/19 19:23:41 g89r4222 Exp $
* from: $Header: /home/ncvs/src/eBones/kdb/print_princ.c,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $
* $Id: print_princ.c,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: print_princ.c,v 1.2 1994/07/19 19:23:41 g89r4222 Exp $";
"$Id: print_princ.c,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $";
#endif lint
#include <stdio.h>

View file

@ -5,19 +5,19 @@
* <Copyright.MIT>.
*
* This routine changes the Kerberos encryption keys for principals,
* i.e., users or services.
* i.e., users or services.
*
* from: kdb_edit.c,v 4.2 90/01/09 16:05:09 raeburn Exp $
* $Id: kdb_edit.c,v 1.3 1994/09/09 21:43:46 g89r4222 Exp $
* $Id: kdb_edit.c,v 1.1.1.1 1994/09/30 14:49:56 csgr Exp $
*/
/*
* exit returns 0 ==> success -1 ==> error
* exit returns 0 ==> success -1 ==> error
*/
#ifndef lint
static char rcsid[] =
"$Id: kdb_edit.c,v 1.3 1994/09/09 21:43:46 g89r4222 Exp $";
"$Id: kdb_edit.c,v 1.1.1.1 1994/09/30 14:49:56 csgr Exp $";
#endif lint
#include <stdio.h>
@ -158,7 +158,7 @@ main(argc, argv)
#endif
if (kdb_get_master_key ((nflag == 0),
if (kdb_get_master_key ((nflag == 0),
master_key, master_key_schedule) != 0) {
fprintf (stdout, "Couldn't read master key.\n");
fflush (stdout);
@ -241,7 +241,7 @@ change_principal()
if (!creating) {
/*
* copy the existing data so we can use the old values
* for the qualifier clause of the replace
* for the qualifier clause of the replace
*/
principal_data[i].old = (char *) &old_principal;
bcopy(&principal_data[i], &old_principal,
@ -310,7 +310,7 @@ change_principal()
}
/* seal it under the kerberos master key */
kdb_encrypt_key (new_key, new_key,
kdb_encrypt_key (new_key, new_key,
master_key, master_key_schedule,
ENCRYPT);
bcopy(new_key, &principal_data[i].key_low, 4);
@ -398,7 +398,7 @@ change_principal()
/*
* remaining fields -- key versions and mod info, should
* not be directly manipulated
* not be directly manipulated
*/
if (changed) {
if (kerb_put_principal(&principal_data[i], 1)) {

View file

@ -1,18 +1,18 @@
/*
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
* For copying and distribution information, please see the file
* <Copyright.MIT>.
* <Copyright.MIT>.
*
* program to initialize the database, reports error if database file
* already exists.
* already exists.
*
* from: kdb_init.c,v 4.0 89/01/24 21:50:45 jtkohl Exp $
* $Id: kdb_init.c,v 1.3 1994/09/24 14:04:17 g89r4222 Exp $
* $Id: kdb_init.c,v 1.1.1.1 1994/09/30 14:49:56 csgr Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: kdb_init.c,v 1.3 1994/09/24 14:04:17 g89r4222 Exp $";
"$Id: kdb_init.c,v 1.1.1.1 1994/09/30 14:49:56 csgr Exp $";
#endif lint
#include <stdio.h>
@ -44,7 +44,7 @@ main(argc, argv)
char *cp;
int code;
char *database;
progname = (cp = rindex(*argv, '/')) ? cp + 1 : *argv;
if (argc > 3) {
@ -96,7 +96,7 @@ main(argc, argv)
add_principal(KERB_M_NAME, KERB_M_INST, MASTER_KEY) ||
add_principal(KERB_DEFAULT_NAME, KERB_DEFAULT_INST, NULL_KEY) ||
add_principal("krbtgt", realm, RANDOM_KEY) ||
add_principal("changepw", KRB_MASTER, RANDOM_KEY)
add_principal("changepw", KRB_MASTER, RANDOM_KEY)
) {
fprintf(stderr, "\n%s: couldn't initialize database.\n",
progname);
@ -169,7 +169,7 @@ add_principal(name, instance, aap_op)
principal.old = 0;
kerb_db_put_principal(&principal, 1);
/* let's play it safe */
bzero (new_key, sizeof (C_Block));
bzero (&principal.key_low, 4);

View file

@ -7,17 +7,17 @@
* dump a kerberos database to an ascii readable file and load this
* file into the database. Read locking of the database is done during a
* dump operation. NO LOCKING is done during a load operation. Loads
* should happen with other processes shutdown.
* should happen with other processes shutdown.
*
* Written July 9, 1987 by Jeffrey I. Schiller
*
* from: kdb_util.c,v 4.4 90/01/09 15:57:20 raeburn Exp $
* $Id: kdb_util.c,v 1.3 1994/09/24 14:04:21 g89r4222 Exp $
* $Id: kdb_util.c,v 1.1.1.1 1994/09/30 14:49:57 csgr Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: kdb_util.c,v 1.3 1994/09/24 14:04:21 g89r4222 Exp $";
"$Id: kdb_util.c,v 1.1.1.1 1994/09/30 14:49:57 csgr Exp $";
#endif lint
#include <stdio.h>
@ -62,7 +62,7 @@ main(argc, argv)
char *db_name;
progname = prog;
if (argc != 3 && argc != 4) {
fprintf(stderr, "Usage: %s operation file-name [database name].\n",
argv[0]);
@ -77,7 +77,7 @@ main(argc, argv)
perror("Can't open database");
exit(1);
}
if (!strcmp(argv[1], "load"))
op = OP_LOAD;
else if (!strcmp(argv[1], "dump"))
@ -134,7 +134,7 @@ main(argc, argv)
break;
case OP_CONVERT_OLD_DB:
convert_old_format_db (db_name, file);
printf("Don't forget to do a `kdb_util load %s' to reload the database!\n", file_name);
printf("Don't forget to do a `kdb_util load %s' to reload the database!\n", file_name);
break;
}
exit(0);
@ -148,7 +148,7 @@ clear_secrets ()
bzero((char *)new_master_key_schedule, sizeof (Key_schedule));
}
/* cv_key is a procedure which takes a principle and changes its key,
/* cv_key is a procedure which takes a principle and changes its key,
either for a new method of encrypting the keys, or a new master key.
if cv_key is null no transformation of key is done (other than net byte
order). */
@ -163,7 +163,7 @@ static int dump_db_1(arg, principal)
Principal *principal;
{ /* replace null strings with "*" */
struct callback_args *a = (struct callback_args *)arg;
if (principal->instance[0] == '\0') {
principal->instance[0] = '*';
principal->instance[1] = '\0';
@ -205,7 +205,7 @@ dump_db (db_file, output_file, cv_key)
a.cv_key = cv_key;
a.output_file = output_file;
kerb_db_iterate (dump_db_1, (char *)&a);
return fflush(output_file);
}
@ -432,7 +432,7 @@ convert_old_format_db (db_file, out)
/*
* now use the master key to decrypt (old style) the key in the db, had better
* be the same!
* be the same!
*/
bcopy((char *)&principal_data[0].key_low, (char *)key_from_db, 4);
bcopy((char *)&principal_data[0].key_high,
@ -451,7 +451,7 @@ convert_old_format_db (db_file, out)
fprintf(stderr, "does not match database.\n");
exit (-1);
}
fprintf(stderr, "Master key verified.\n");
(void) fflush(stderr);
@ -468,14 +468,14 @@ register char *cp;
int local;
zaptime(&tp); /* clear out the struct */
if (strlen(cp) > 10) { /* new format */
(void) strncpy(wbuf, cp, 4);
wbuf[4] = 0;
tp.tm_year = atoi(wbuf);
cp += 4; /* step over the year */
local = 0; /* GMT */
} else { /* old format: local time,
} else { /* old format: local time,
year is 2 digits, assuming 19xx */
wbuf[0] = *cp++;
wbuf[1] = *cp++;
@ -492,11 +492,11 @@ register char *cp;
wbuf[0] = *cp++;
wbuf[1] = *cp++;
tp.tm_mday = atoi(wbuf);
wbuf[0] = *cp++;
wbuf[1] = *cp++;
tp.tm_hour = atoi(wbuf);
wbuf[0] = *cp++;
wbuf[1] = *cp++;
tp.tm_min = atoi(wbuf);

View file

@ -1,21 +1,21 @@
/*
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
* For copying and distribution information, please see the file
* <Copyright.MIT>.
* <Copyright.MIT>.
*
* This program causes Kerberos tickets to be destroyed.
* Options are:
* Options are:
*
* -q[uiet] - no bell even if tickets not destroyed
* -f[orce] - no message printed at all
* -f[orce] - no message printed at all
*
* from: kdestroy.c,v 4.5 88/03/18 15:16:02 steiner Exp $
* $Id: kdestroy.c,v 1.2 1994/07/19 19:24:16 g89r4222 Exp $
* $Id: kdestroy.c,v 1.1.1.1 1994/09/30 14:49:57 csgr Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: kdestroy.c,v 1.2 1994/07/19 19:24:16 g89r4222 Exp $";
"$Id: kdestroy.c,v 1.1.1.1 1994/09/30 14:49:57 csgr Exp $";
#endif lint
#include <stdio.h>

View file

@ -1,9 +1,9 @@
# From: @(#)Makefile 5.1 (Berkeley) 6/25/90
# $Id: Makefile,v 1.2 1994/07/19 19:24:22 g89r4222 Exp $
# $Id: Makefile,v 1.1.1.1 1994/09/30 14:49:57 csgr Exp $
PROG= kerberos
SRCS= kerberos.c cr_err_reply.c
CFLAGS+=-DKERBEROS -DDEBUG -I${.CURDIR}/../include
CFLAGS+=-DKERBEROS -DDEBUG -I${.CURDIR}/../include
DPADD= ${LIBKDB} ${LIBKRB} ${LIBDES}
LDADD= -L${KDBOBJDIR} -lkdb -L${KRBOBJDIR} -lkrb -L${DESOBJDIR} -ldes
NOMAN= noman

View file

@ -5,12 +5,12 @@
* <Copyright.MIT>.
*
* from: cr_err_reply.c,v 4.10 89/01/10 11:34:42 steiner Exp $
* $Id: cr_err_reply.c,v 1.1 1994/07/19 19:24:24 g89r4222 Exp $
* $Id: cr_err_reply.c,v 1.1.1.1 1994/09/30 14:49:57 csgr Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: cr_err_reply.c,v 1.1 1994/07/19 19:24:24 g89r4222 Exp $";
"$Id: cr_err_reply.c,v 1.1.1.1 1994/09/30 14:49:57 csgr Exp $";
#endif /* lint */
#include <sys/types.h>
@ -30,28 +30,28 @@ extern int req_act_vno; /* this is defined in the kerberos
* and an error string as arguments. Its return value is undefined.
*
* The packet is built in the following format:
*
*
* type variable data
* or constant
* ---- ----------- ----
*
* unsigned char req_ack_vno protocol version number
*
*
* unsigned char AUTH_MSG_ERR_REPLY protocol message type
*
*
* [least significant HOST_BYTE_ORDER sender's (server's) byte
* bit of above field] order
*
*
* string pname principal's name
*
*
* string pinst principal's instance
*
*
* string prealm principal's realm
*
*
* unsigned long time_ws client's timestamp
*
*
* unsigned long e error code
*
*
* string e_string error text
*/

View file

@ -5,12 +5,12 @@
* <Copyright.MIT>.
*
* from: kerberos.c,v 4.19 89/11/01 17:18:07 qjb Exp $
* $Id: kerberos.c,v 1.3 1994/09/09 21:43:51 g89r4222 Exp $
* $Id: kerberos.c,v 1.1.1.1 1994/09/30 14:49:57 csgr Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: kerberos.c,v 1.3 1994/09/09 21:43:51 g89r4222 Exp $";
"$Id: kerberos.c,v 1.1.1.1 1994/09/30 14:49:57 csgr Exp $";
#endif lint
#include <stdio.h>
@ -97,7 +97,7 @@ static void hang();
*/
static void usage()
{
fprintf(stderr, "Usage: %s [-s] [-m] [-n] [-p pause_seconds]%s%s\n", progname,
fprintf(stderr, "Usage: %s [-s] [-m] [-n] [-p pause_seconds]%s%s\n", progname,
" [-a max_age] [-l log_file] [-r realm]"
," [database_pathname]"
);
@ -160,7 +160,7 @@ main(argc, argv)
break;
case 'a':
/* Set max age. */
if (!isdigit(optarg[0]))
if (!isdigit(optarg[0]))
usage();
max_age = atoi(optarg);
if ((max_age < ONE_HOUR) || (max_age > THREE_DAYS)) {
@ -194,9 +194,9 @@ main(argc, argv)
if (optind != argc)
usage();
printf("Kerberos server starting\n");
if ((!nflag) && (max_age != -1))
printf("\tMaximum database age: %d seconds\n", max_age);
if (pause_int != -1)
@ -205,12 +205,12 @@ main(argc, argv)
printf("\tSleep forever on error\n");
if (mflag)
printf("\tMaster key will be entered manually\n");
printf("\tLog file is %s\n", lflag ? log_file : KRBLOG);
if (lflag)
kset_logfile(log_file);
/* find our hostname, and use it as the instance */
if (gethostname(k_instance, INST_SZ)) {
fprintf(stderr, "%s: gethostname error\n", progname);
@ -249,7 +249,7 @@ main(argc, argv)
/* Make sure database isn't stale */
check_db_age();
/* setup master key */
if (kdb_get_master_key (mflag, master_key, master_key_schedule) != 0) {
klog (L_KRB_PERR, "kerberos: couldn't get master key.\n");
@ -449,7 +449,7 @@ kerberos(client, pkt)
/*
* get the user's key, unseal it from the server's key, and
* use it to seal the cipher
* use it to seal the cipher
*/
/* a_name_data.key_low a_name_data.key_high */
@ -457,7 +457,7 @@ kerberos(client, pkt)
bcopy(&a_name_data.key_high, ((long *) key) + 1, 4);
/* unseal the a_name key from the master key */
kdb_encrypt_key(key, key, master_key,
kdb_encrypt_key(key, key, master_key,
master_key_schedule, DECRYPT);
create_ciph(ciph, session_key, s_name_data.name,
@ -616,10 +616,10 @@ kerberos(client, pkt)
/*
* setup_disc
* setup_disc
*
* disconnect all descriptors, remove ourself from the process
* group that spawned us.
* group that spawned us.
*/
setup_disc()
@ -648,7 +648,7 @@ setup_disc()
/*
* kerb_er_reply creates an error reply packet and sends it to the
* client.
* client.
*/
kerb_err_reply(client, pkt, err, string)
@ -680,7 +680,7 @@ kerb_err_reply(client, pkt, err, string)
static void check_db_age()
{
long age;
if (max_age != -1) {
/* Requires existance of kerb_get_db_age() */
gettimeofday(&kerb_time, 0);
@ -712,16 +712,16 @@ check_princ(p_name, instance, lifetime, p)
klog(L_ALL_REQ,
"Principal: \"%s\", Instance: \"%s\" Lifetime = %d n = %d",
p_name, instance, lifetime, n, 0);
if (n < 0) {
lt = klog(L_KRB_PERR, "Database unavailable!");
hang();
}
/*
* if more than one p_name, pick one, randomly create a session key,
* compute maximum lifetime, lookup authorizations if applicable,
* and stuff into cipher.
* and stuff into cipher.
*/
if (n == 0) {
/* service unknown, log error, skip to next request */

View file

@ -1,13 +1,13 @@
/*
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
* For copying and distribution information, please see the file
* <Copyright.MIT>.
* <Copyright.MIT>.
*
* Routine to initialize user to Kerberos. Prompts optionally for
* user, instance and realm. Authenticates user and gets a ticket
* for the Kerberos ticket-granting service for future use.
* for the Kerberos ticket-granting service for future use.
*
* Options are:
* Options are:
*
* -i[instance]
* -r[realm]
@ -15,12 +15,12 @@
* -l[ifetime]
*
* from: kinit.c,v 4.12 90/03/20 16:11:15 jon Exp $
* $Id: kinit.c,v 1.2 1994/07/19 19:24:33 g89r4222 Exp $
* $Id: kinit.c,v 1.1.1.1 1994/09/30 14:49:58 csgr Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: kinit.c,v 1.2 1994/07/19 19:24:33 g89r4222 Exp $";
"$Id: kinit.c,v 1.1.1.1 1994/09/30 14:49:58 csgr Exp $";
#endif lint
#include <stdio.h>
@ -151,7 +151,7 @@ main(argc, argv)
strncpy(aname, pwd->pw_name, sizeof(aname));
}
}
if (!*aname)
exit(0);
if (!k_isname(aname)) {

View file

@ -1,18 +1,18 @@
/*
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
* For copying and distribution information, please see the file
* <Copyright.MIT>.
* <Copyright.MIT>.
*
* Lists your current Kerberos tickets.
* Written by Bill Sommerfeld, MIT Project Athena.
*
* from: klist.c,v 4.15 89/08/30 11:19:16 jtkohl Exp $
* $Id: klist.c,v 1.2 1994/07/19 19:24:38 g89r4222 Exp $
* $Id: klist.c,v 1.1.1.1 1994/09/30 14:49:58 csgr Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: klist.c,v 1.2 1994/07/19 19:24:38 g89r4222 Exp $";
"$Id: klist.c,v 1.1.1.1 1994/09/30 14:49:58 csgr Exp $";
#endif lint
#include <stdio.h>
@ -97,11 +97,11 @@ int tgt_test, long_form;
if (long_form)
printf("Ticket file: %s\n", file);
/*
* Since krb_get_tf_realm will return a ticket_file error,
/*
* Since krb_get_tf_realm will return a ticket_file error,
* we will call tf_init and tf_close first to filter out
* things like no ticket file. Otherwise, the error that
* the user would see would be
* things like no ticket file. Otherwise, the error that
* the user would see would be
* klist: can't find realm of ticket file: No ticket file (tf_util)
* instead of
* klist: No ticket file (tf_util)
@ -116,7 +116,7 @@ int tgt_test, long_form;
/* Close ticket file */
(void) tf_close();
/*
/*
* We must find the realm of the ticket file here before calling
* tf_init because since the realm of the ticket file is not
* really stored in the principal section of the file, the
@ -143,13 +143,13 @@ int tgt_test, long_form;
exit(1);
}
/*
/*
* You may think that this is the obvious place to get the
* realm of the ticket file, but it can't be done here as the
* routine to do this must open the ticket file. This is why
* routine to do this must open the ticket file. This is why
* it was done before tf_init.
*/
if (!tgt_test && long_form)
printf("Principal:\t%s%s%s%s%s\n\n", pname,
(pinst[0] ? "." : ""), pinst,
@ -218,7 +218,7 @@ char *file;
int count;
printf("Server key file: %s\n", file);
if ((stab = open(file, O_RDONLY, 0400)) < 0) {
perror(file);
exit(1);

View file

@ -5,12 +5,12 @@
* <Copyright.MIT>.
*
* from: create_auth_reply.c,v 4.10 89/01/13 17:47:38 steiner Exp $
* $Id: create_auth_reply.c,v 1.2 1994/07/19 19:24:56 g89r4222 Exp $
* $Id: create_auth_reply.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $
*/
#ifndef lint
static char *rcsid =
"$Id: create_auth_reply.c,v 1.2 1994/07/19 19:24:56 g89r4222 Exp $";
"$Id: create_auth_reply.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $";
#endif /* lint */
#include <krb.h>
@ -30,34 +30,34 @@ static char *rcsid =
* must copy it elsewhere.
*
* The packet is built in the following format:
*
*
* variable
* type or constant data
* ---- ----------- ----
*
*
* unsigned char KRB_PROT_VERSION protocol version number
*
*
* unsigned char AUTH_MSG_KDC_REPLY protocol message type
*
*
* [least significant HOST_BYTE_ORDER sender's (server's) byte
* bit of above field] order
*
*
* string pname principal's name
*
*
* string pinst principal's instance
*
*
* string prealm principal's realm
*
*
* unsigned long time_ws client's timestamp
*
*
* unsigned char n number of tickets
*
*
* unsigned long x_date expiration date
*
*
* unsigned char kvno master key version
*
*
* short w_1 cipher length
*
*
* --- cipher->dat cipher data
*/

View file

@ -5,12 +5,12 @@
* <Copyright.MIT>.
*
* from: create_ciph.c,v 4.8 89/05/18 21:24:26 jis Exp $
* $Id: create_ciph.c,v 1.2 1994/07/19 19:24:58 g89r4222 Exp $
* $Id: create_ciph.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $
*/
#ifndef lint
static char *rcsid =
"$Id: create_ciph.c,v 1.2 1994/07/19 19:24:58 g89r4222 Exp $";
"$Id: create_ciph.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $";
#endif /* lint */
#include <krb.h>
@ -30,24 +30,24 @@ static char *rcsid =
* variable
* type or constant data
* ---- ----------- ----
*
*
*
*
* 8 bytes session session key for client, service
*
*
* string service service name
*
*
* string instance service instance
*
*
* string realm KDC realm
*
*
* unsigned char life ticket lifetime
*
*
* unsigned char kvno service key version number
*
*
* unsigned char tkt->length length of following ticket
*
*
* data tkt->dat ticket for service
*
*
* 4 bytes kdc_time KDC's timestamp
*
* <=7 bytes null null pad to 8 byte multiple

View file

@ -5,12 +5,12 @@
* <Copyright.MIT>.
*
* from: create_death_packet.c,v 4.9 89/01/17 16:05:59 rfrench Exp $
* $Id: create_death_packet.c,v 1.2 1994/07/19 19:24:59 g89r4222 Exp $
* $Id: create_death_packet.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $
*/
#ifndef lint
static char *rcsid =
"$Id: create_death_packet.c,v 1.2 1994/07/19 19:24:59 g89r4222 Exp $";
"$Id: create_death_packet.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $";
#endif /* lint */
#include <krb.h>
@ -32,12 +32,12 @@ static char *rcsid =
* ---- ----------- ----
*
* unsigned char KRB_PROT_VERSION protocol version number
*
*
* unsigned char AUTH_MSG_DIE message type
*
*
* [least significant HOST_BYTE_ORDER byte order of sender
* bit of above field]
*
*
* string a_name presumably, name of
* principal sending killer
* packet

View file

@ -1,16 +1,16 @@
/*
/*
* Copyright 1985, 1986, 1987, 1988 by the Massachusetts Institute
* of Technology.
* For copying and distribution information, please see the file
* <Copyright.MIT>.
*
* from: create_ticket.c,v 4.11 89/03/22 14:43:23 jtkohl Exp $
* $Id: create_ticket.c,v 1.2 1994/07/19 19:25:01 g89r4222 Exp $
* $Id: create_ticket.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: create_ticket.c,v 1.2 1994/07/19 19:25:01 g89r4222 Exp $";
"$Id: create_ticket.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $";
#endif /* lint */
#include <stdio.h>
@ -35,35 +35,35 @@ static char rcsid[] =
* corresponding changes should also be made to that file.
*
* The packet is built in the following format:
*
*
* variable
* type or constant data
* ---- ----------- ----
*
* tkt->length length of ticket (multiple of 8 bytes)
*
*
* tkt->dat:
*
*
* unsigned char flags namely, HOST_BYTE_ORDER
*
*
* string pname client's name
*
*
* string pinstance client's instance
*
*
* string prealm client's realm
*
*
* 4 bytes paddress client's address
*
*
* 8 bytes session session key
*
*
* 1 byte life ticket lifetime
*
*
* 4 bytes time_sec KDC timestamp
*
*
* string sname service's name
*
*
* string sinstance service's instance
*
*
* <=7 bytes null null pad to 8 byte multiple
*
*/

View file

@ -11,7 +11,7 @@
* are met:
* 1. Redistributions of source code must retain the entire comment,
* including the above copyright notice, this list of conditions
* and the following disclaimer, verbatim, at the beginning of
* and the following disclaimer, verbatim, at the beginning of
* the source file.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
@ -35,7 +35,7 @@
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
* $Id: des_rw.c,v 1.5 1994/09/24 18:54:41 g89r4222 Exp $
* $Id: des_rw.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $
*/
/*
@ -61,11 +61,11 @@
* +--+--+--+--+--+--+--+--+
* | garbage | data |
* | |
* +-----------------------+----> des_pcbc_encrypt() -->
* +-----------------------+----> des_pcbc_encrypt() -->
*
* (Note that the length field sent before the actual message specifies
* the number of data bytes, not the length of the entire padded message.
*
*
* When data is read, if the message received is longer than the number
* of bytes requested, then the remaining bytes are stored until the
* following call to des_read(). If the number of bytes received is
@ -160,7 +160,7 @@ int des_read(fd, buf, len)
stored -= len;
buff_ptr += len;
return(len);
} else {
} else {
if (stored) {
bcopy(buff_ptr, buf, stored);
nreturned = stored;
@ -184,11 +184,11 @@ int des_read(fd, buf, len)
if(nread != pad_length)
return(0);
des_pcbc_encrypt((des_cblock*) des_buff, (des_cblock*) buff_ptr,
des_pcbc_encrypt((des_cblock*) des_buff, (des_cblock*) buff_ptr,
(msg_length < 8 ? 8 : msg_length),
key_sched, (des_cblock*) &des_key, DES_DECRYPT);
if(msg_length < 8)
buff_ptr += (8 - msg_length);
stored = msg_length;
@ -237,7 +237,7 @@ int des_write(fd, buf, len)
for(i = 0 ; i < 8 ; i+= sizeof(long)) {
rnd = random();
bcopy(&rnd, garbage+i,
bcopy(&rnd, garbage+i,
(i <= (8 - sizeof(long)))?sizeof(long):(8-i));
}
bcopy(buf, garbage + 8 - len, len);
@ -253,7 +253,7 @@ int des_write(fd, buf, len)
write_len = htonl(len);
if(write(fd, &write_len, sizeof(write_len)) != sizeof(write_len))
if(write(fd, &write_len, sizeof(write_len)) != sizeof(write_len))
return(-1);
if(write(fd, des_buff, pad_len) != pad_len)
return(-1);

View file

@ -5,12 +5,12 @@
* <Copyright.MIT>.
*
* from: dest_tkt.c,v 4.9 89/10/02 16:23:07 jtkohl Exp $
* $Id: dest_tkt.c,v 1.2 1994/07/19 19:25:07 g89r4222 Exp $
* $Id: dest_tkt.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $
*/
#ifndef lint
static char *rcsid =
"$Id: dest_tkt.c,v 1.2 1994/07/19 19:25:07 g89r4222 Exp $";
"$Id: dest_tkt.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $";
#endif /* lint */
#include <stdio.h>
@ -75,8 +75,8 @@ dest_tkt()
if (errno == ENOENT) return RET_TKFIL;
else if (errno != 0) return KFAILURE;
#ifdef TKT_SHMEM
/*
* handle the shared memory case
/*
* handle the shared memory case
*/
(void) strcpy(shmidname, file);
(void) strcat(shmidname, ".shm");

View file

@ -1,15 +1,15 @@
/*
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
* For copying and distribution information, please see the file
* <Copyright.MIT>.
* <Copyright.MIT>.
*
* from: fgetst.c,v 4.0 89/01/23 10:08:31 jtkohl Exp $
* $Id: fgetst.c,v 1.2 1994/07/19 19:25:10 g89r4222 Exp $
* $Id: fgetst.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: fgetst.c,v 1.2 1994/07/19 19:25:10 g89r4222 Exp $";
"$Id: fgetst.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $";
#endif /* lint */
#include <stdio.h>
@ -20,7 +20,7 @@ static char rcsid[] =
* until it reads a null byte. When finished, what has been read exists
* in "s". If "count" characters were actually read, the last is changed
* to a null, so the returned string is always null-terminated. fgetst
* returns the number of characters read, including the null terminator.
* returns the number of characters read, including the null terminator.
*/
fgetst(f, s, n)

View file

@ -5,12 +5,12 @@
* <Copyright.MIT>.
*
* from: get_ad_tkt.c,v 4.15 89/07/07 15:18:51 jtkohl Exp $
* $Id: get_ad_tkt.c,v 1.2 1994/07/19 19:25:11 g89r4222 Exp $
* $Id: get_ad_tkt.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: get_ad_tkt.c,v 1.2 1994/07/19 19:25:11 g89r4222 Exp $";
"$Id: get_ad_tkt.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $";
#endif /* lint */
#include <krb.h>
@ -55,7 +55,7 @@ unsigned long rep_err_code;
*
* TEXT original contents of authenticator+ticket
* pkt->dat built in krb_mk_req call
*
*
* 4 bytes time_ws always 0 (?)
* char lifetime lifetime argument passed
* string service service name argument
@ -106,12 +106,12 @@ get_ad_tkt(service,sinstance,realm,lifetime)
/*
* Look for the session key (and other stuff we don't need)
* in the ticket file for krbtgt.realm@lrealm where "realm"
* is the service's realm (passed in "realm" argument) and
* lrealm is the realm of our initial ticket. If we don't
* in the ticket file for krbtgt.realm@lrealm where "realm"
* is the service's realm (passed in "realm" argument) and
* lrealm is the realm of our initial ticket. If we don't
* have this, we will try to get it.
*/
if ((kerror = krb_get_cred("krbtgt",realm,lrealm,&cr)) != KSUCCESS) {
/*
* If realm == lrealm, we have no hope, so let's not even try.
@ -119,20 +119,20 @@ get_ad_tkt(service,sinstance,realm,lifetime)
if ((strncmp(realm, lrealm, REALM_SZ)) == 0)
return(AD_NOTGT);
else{
if ((kerror =
if ((kerror =
get_ad_tkt("krbtgt",realm,lrealm,lifetime)) != KSUCCESS)
return(kerror);
if ((kerror = krb_get_cred("krbtgt",realm,lrealm,&cr)) != KSUCCESS)
return(kerror);
}
}
/*
* Make up a request packet to the "krbtgt.realm@lrealm".
* Start by calling krb_mk_req() which puts ticket+authenticator
* into "pkt". Then tack other stuff on the end.
*/
kerror = krb_mk_req(pkt,"krbtgt",realm,lrealm,0L);
if (kerror)

View file

@ -5,12 +5,12 @@
* <Copyright.MIT>.
*
* from: get_cred.c,v 4.10 89/05/31 17:46:22 jtkohl Exp $
* $Id: get_cred.c,v 1.2 1994/07/19 19:25:14 g89r4222 Exp $
* $Id: get_cred.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $
*/
#ifndef lint
static char *rcsid =
"$Id: get_cred.c,v 1.2 1994/07/19 19:25:14 g89r4222 Exp $";
"$Id: get_cred.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $";
#endif /* lint */
#include <stdio.h>
@ -44,7 +44,7 @@ krb_get_cred(service,instance,realm,c)
return (tf_status);
/* Search for requested service credentials and copy into c */
while ((tf_status = tf_get_cred(c)) == KSUCCESS) {
/* Is this the right ticket? */
if ((strcmp(c->service,service) == 0) &&

View file

@ -4,12 +4,12 @@
* <Copyright.MIT>.
*
* from: get_in_tkt.c,v 4.12 89/07/18 16:32:56 jtkohl Exp $
* $Id: get_in_tkt.c,v 1.2 1994/07/19 19:25:16 g89r4222 Exp $
* $Id: get_in_tkt.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: get_in_tkt.c,v 1.2 1994/07/19 19:25:16 g89r4222 Exp $";
"$Id: get_in_tkt.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $";
#endif /* lint */
#include <krb.h>
@ -69,7 +69,7 @@ static int passwd_to_key(user,instance,realm,passwd,key)
* krb_get_pw_in_tkt() passes two additional arguments to krb_get_in_tkt():
* the name of a routine (passwd_to_key()) to be used to get the
* password in case the "password" argument is null and NULL for the
* decryption procedure indicating that krb_get_in_tkt should use the
* decryption procedure indicating that krb_get_in_tkt should use the
* default method of decrypting the response from the KDC.
*
* The result of the call to krb_get_in_tkt() is returned.
@ -86,8 +86,8 @@ krb_get_pw_in_tkt(user,instance,realm,service,sinstance,life,password)
#ifdef NOENCRYPTION
/*
* $Source: /home/CVS/src/eBones/krb/get_in_tkt.c,v $
* $Author: g89r4222 $
* $Source: /home/ncvs/src/eBones/krb/get_in_tkt.c,v $
* $Author: csgr $
*
* Copyright 1985, 1986, 1987, 1988 by the Massachusetts Institute
* of Technology.
@ -102,7 +102,7 @@ krb_get_pw_in_tkt(user,instance,realm,service,sinstance,life,password)
#ifndef lint
static char rcsid_read_password_c[] =
"Bones$Header: /home/CVS/src/eBones/krb/get_in_tkt.c,v 1.2 1994/07/19 19:25:16 g89r4222 Exp $";
"Bones$Header: /home/ncvs/src/eBones/krb/get_in_tkt.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $";
#endif lint
#include <des.h>
@ -170,7 +170,7 @@ placebo_read_pw_string(s,max,prompt,verify)
{
int ok = 0;
char *ptr;
#ifdef BSDUNIX
jmp_buf old_env;
struct sgttyb tty_state;
@ -187,7 +187,7 @@ placebo_read_pw_string(s,max,prompt,verify)
goto lose;
/* save terminal state*/
if (ioctl(0,TIOCGETP,&tty_state) == -1)
if (ioctl(0,TIOCGETP,&tty_state) == -1)
return -1;
push_signals();

View file

@ -5,12 +5,12 @@
* <Copyright.MIT>.
*
* from: get_krbhst.c,v 4.8 89/01/22 20:00:29 rfrench Exp $
* $Id: get_krbhst.c,v 1.2 1994/07/19 19:25:17 g89r4222 Exp $
* $Id: get_krbhst.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $
*/
#ifndef lint
static char *rcsid =
"$Id: get_krbhst.c,v 1.2 1994/07/19 19:25:17 g89r4222 Exp $";
"$Id: get_krbhst.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $";
#endif /* lint */
#include <stdio.h>
@ -33,7 +33,7 @@ static char *rcsid =
*
* The KRB_CONF file contains the name of the local realm in the first
* line (not used by this routine), followed by lines indicating realm/host
* entries. The words "admin server" following the hostname indicate that
* entries. The words "admin server" following the hostname indicate that
* the host provides an administrative database server.
*
* For example:

View file

@ -4,12 +4,12 @@
* <Copyright.MIT>.
*
* from: get_svc_in_tkt.c,v 4.9 89/07/18 16:33:34 jtkohl Exp $
* $Id: get_svc_in_tkt.c,v 1.2 1994/07/19 19:25:26 g89r4222 Exp $
* $Id: get_svc_in_tkt.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: get_svc_in_tkt.c,v 1.2 1994/07/19 19:25:26 g89r4222 Exp $";
"$Id: get_svc_in_tkt.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $";
#endif /* lint */
#include <krb.h>
@ -57,7 +57,7 @@ static int srvtab_to_key(user, instance, realm, srvtab, key)
* krb_get_svc_in_tkt() passes its arguments on to krb_get_in_tkt(),
* plus two additional arguments: a pointer to the srvtab_to_key()
* function to be used to get the key from the key file and a NULL
* for the decryption procedure indicating that krb_get_in_tkt should
* for the decryption procedure indicating that krb_get_in_tkt should
* use the default method of decrypting the response from the KDC.
*
* It returns the return value of the krb_get_in_tkt() call.

View file

@ -4,12 +4,12 @@
* <Copyright.MIT>.
*
* from: get_tf_fullname.c,v 4.3 90/03/10 22:40:20 jon Exp $
* $Id: get_tf_fullname.c,v 1.2 1994/07/19 19:25:28 g89r4222 Exp $
* $Id: get_tf_fullname.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: get_tf_fullname.c,v 1.2 1994/07/19 19:25:28 g89r4222 Exp $";
"$Id: get_tf_fullname.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $";
#endif /* lint */
#include <krb.h>
@ -22,10 +22,10 @@ static char rcsid[] =
*/
/*
* krb_get_tf_fullname() takes four arguments: the name of the
* krb_get_tf_fullname() takes four arguments: the name of the
* ticket file, and variables for name, instance, and realm to be
* returned in. Since the realm of a ticket file is not really fully
* supported, the realm used will be that of the the first ticket in
* returned in. Since the realm of a ticket file is not really fully
* supported, the realm used will be that of the the first ticket in
* the file as this is the one that was obtained with a password by
* krb_get_in_tkt().
*/
@ -45,7 +45,7 @@ krb_get_tf_fullname(ticket_file, name, instance, realm)
if (((tf_status = tf_get_pname(c.pname)) != KSUCCESS) ||
((tf_status = tf_get_pinst(c.pinst)) != KSUCCESS))
return (tf_status);
if (name)
strcpy(name, c.pname);
if (instance)
@ -59,8 +59,8 @@ krb_get_tf_fullname(ticket_file, name, instance, realm)
return(KFAILURE);
else
return(tf_status);
}
}
(void) tf_close();
return(tf_status);
}

View file

@ -4,12 +4,12 @@
* <Copyright.MIT>.
*
* from: get_tf_realm.c,v 4.2 90/01/02 13:40:19 jtkohl Exp $
* $Id: get_tf_realm.c,v 1.2 1994/07/19 19:25:30 g89r4222 Exp $
* $Id: get_tf_realm.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: get_tf_realm.c,v 1.2 1994/07/19 19:25:30 g89r4222 Exp $";
"$Id: get_tf_realm.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $";
#endif /* lint */
#include <krb.h>
@ -21,9 +21,9 @@ static char rcsid[] =
*/
/*
* krb_get_tf_realm() takes two arguments: the name of a ticket
* krb_get_tf_realm() takes two arguments: the name of a ticket
* and a variable to store the name of the realm in.
*
*
*/
krb_get_tf_realm(ticket_file, realm)

View file

@ -6,12 +6,12 @@
* routine to convert hostname into realm name.
*
* from: getrealm.c,v 4.6 90/01/02 13:35:56 jtkohl Exp $
* $Id: getrealm.c,v 1.2 1994/07/19 19:25:31 g89r4222 Exp $
* $Id: getrealm.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: getrealm.c,v 1.2 1994/07/19 19:25:31 g89r4222 Exp $";
"$Id: getrealm.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $";
#endif lint
#include <strings.h>
@ -92,7 +92,7 @@ char *host;
fclose(trans_file);
return(ret_realm);
}
if ((trans_host[0] == '.') && domain) {
if ((trans_host[0] == '.') && domain) {
/* this is a domain match */
if (!strcasecmp(trans_host, domain)) {
/* domain match, save for later */

View file

@ -5,12 +5,12 @@
* <Copyright.MIT>.
*
* from: kt.c,v 4.9 89/10/25 19:03:35 qjb Exp $
* $Id: in_tkt.c,v 1.5 1994/09/24 14:30:09 g89r4222 Exp $
* $Id: in_tkt.c,v 1.1.1.1 1994/09/30 14:50:01 csgr Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: in_tkt.c,v 1.5 1994/09/24 14:30:09 g89r4222 Exp $";
"$Id: in_tkt.c,v 1.1.1.1 1994/09/30 14:50:01 csgr Exp $";
#endif /* lint */
#include <unistd.h>
@ -73,7 +73,7 @@ in_tkt(pname,pinst)
(void) close(fd);
goto out;
}
(void) fsync(fd);
(void) close(fd);
}

View file

@ -5,12 +5,12 @@
* <Copyright.MIT>.
*
* from: der: krb_get_in_tkt.c,v 4.19 89/07/18 16:31:31 jtkohl Exp $
* $Id: krb_get_in_tkt.c,v 1.2 1994/07/19 19:25:47 g89r4222 Exp $
* $Id: krb_get_in_tkt.c,v 1.1.1.1 1994/09/30 14:50:02 csgr Exp $
*/
#ifndef lint
static char *rcsid =
"$Id: krb_get_in_tkt.c,v 1.2 1994/07/19 19:25:47 g89r4222 Exp $";
"$Id: krb_get_in_tkt.c,v 1.1.1.1 1994/09/30 14:50:02 csgr Exp $";
#endif /* lint */
#include <krb.h>
@ -48,16 +48,16 @@ static int decrypt_tkt(user, instance, realm, arg, key_proc, cipp)
#ifndef NOENCRYPTION
/* Attempt to decrypt it */
#endif
/* generate a key */
{
register int rc;
rc = (*key_proc)(user,instance,realm,arg,key);
if (rc)
return(rc);
}
#ifndef NOENCRYPTION
key_sched(key,key_s);
pcbc_encrypt((C_Block *)cip->dat,(C_Block *)cip->dat,
@ -259,7 +259,7 @@ krb_get_in_tkt(user, instance, realm, service, sinstance, life,
kvno = (unsigned char) ptr[1];
tkt->length = (unsigned char) ptr[2];
ptr += 3;
if ((tkt->length < 0) ||
((tkt->length + (ptr - (char *) cip->dat)) > cip->length))
return(INTK_BADPW);

View file

@ -7,12 +7,12 @@
* access to a local account
*
* from: kuserok.c,v 4.5 89/01/23 09:25:21 jtkohl Exp $
* $Id: kuserok.c,v 1.2 1994/07/19 19:25:50 g89r4222 Exp $
* $Id: kuserok.c,v 1.1.1.1 1994/09/30 14:50:02 csgr Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: kuserok.c,v 1.2 1994/07/19 19:25:50 g89r4222 Exp $";
"$Id: kuserok.c,v 1.1.1.1 1994/09/30 14:50:02 csgr Exp $";
#endif lint
#include <krb.h>
@ -60,9 +60,9 @@ static char rcsid[] =
* The parmtable defines the keywords we will recognize with their
* default values, and keeps a pointer to the found value. The found
* value should be filled in with strsave(), since FreeParameterSet()
* will release memory for all non-NULL found strings.
* will release memory for all non-NULL found strings.
*
*** NOTE WELL! ***
*** NOTE WELL! ***
*
* The table below is very nice, but we cannot hard-code a default for the
* realm: we have to get the realm via krb_get_lrealm(). Even though the
@ -70,7 +70,7 @@ static char rcsid[] =
* kuserok to whatever krb_get_lrealm() tells us. That code assumes that
* the realm will be the entry number in the table below, so if you
* change the order of the entries below, you have to change the
* #definition of REALM_SCRIPT to reflect it.
* #definition of REALM_SCRIPT to reflect it.
*/
#define REALM_SUBSCRIPT 1
parmtable kparm[] = {
@ -113,7 +113,7 @@ kuserok(kdata, luser)
* if he's trying to log in as himself, and there is no .klogin file,
* let him. To find out, call
* krb_kntoln to convert the triple in kdata to a name which we can
* string compare.
* string compare.
*/
if (!krb_kntoln(kdata, kuser) && (strcmp(kuser, luser) == 0)) {
return(OK);
@ -141,7 +141,7 @@ kuserok(kdata, luser)
/*
* change the default realm from the hard-coded value to the
* accepted realm that Kerberos specifies.
* accepted realm that Kerberos specifies.
*/
rc = krb_get_lrealm(local_realm, 1);
if (rc == KSUCCESS)

View file

@ -16,12 +16,12 @@
* Steve Miller Project Athena MIT/DEC
*
* from: mk_priv.c,v 4.13 89/03/22 14:48:59 jtkohl Exp $
* $Id: mk_priv.c,v 1.2 1994/07/19 19:25:56 g89r4222 Exp $
* $Id: mk_priv.c,v 1.1.1.1 1994/09/30 14:50:02 csgr Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: mk_priv.c,v 1.2 1994/07/19 19:25:56 g89r4222 Exp $";
"$Id: mk_priv.c,v 1.1.1.1 1994/09/30 14:50:02 csgr Exp $";
#endif /* lint */
/* system include files */
@ -80,7 +80,7 @@ static long msg_time_sec;
#ifndef NOENCRYPT
* we encrypt from here with pcbc_encrypt
#endif
*
*
* 4 bytes length length of user data
* length in user data
* 1 byte msg_time_5ms timestamp milliseconds
@ -154,15 +154,15 @@ long krb_mk_priv(in,out,length,schedule,key,sender,receiver)
* direction bit is the sign bit of the timestamp. Ok
* until 2038??
*/
/* For compatibility with broken old code, compares are done in VAX
byte order (LSBFIRST) */
if (lsb_net_ulong_less(sender->sin_addr.s_addr, /* src < recv */
receiver->sin_addr.s_addr)==-1)
msg_time_sec = -msg_time_sec;
else if (lsb_net_ulong_less(sender->sin_addr.s_addr,
receiver->sin_addr.s_addr)==0)
if (lsb_net_ushort_less(sender->sin_port,receiver->sin_port) == -1)
msg_time_sec = -msg_time_sec;
/* For compatibility with broken old code, compares are done in VAX
byte order (LSBFIRST) */
if (lsb_net_ulong_less(sender->sin_addr.s_addr, /* src < recv */
receiver->sin_addr.s_addr)==-1)
msg_time_sec = -msg_time_sec;
else if (lsb_net_ulong_less(sender->sin_addr.s_addr,
receiver->sin_addr.s_addr)==0)
if (lsb_net_ushort_less(sender->sin_port,receiver->sin_port) == -1)
msg_time_sec = -msg_time_sec;
/* stuff time sec */
bcopy((char *)&msg_time_sec,(char *)p,sizeof(msg_time_sec));
p += sizeof(msg_time_sec);

View file

@ -5,12 +5,12 @@
* <Copyright.MIT>.
*
* from: der: mk_req.c,v 4.17 89/07/07 15:20:35 jtkohl Exp $
* $Id: mk_req.c,v 1.2 1994/07/19 19:25:57 g89r4222 Exp $
* $Id: mk_req.c,v 1.1.1.1 1994/09/30 14:50:02 csgr Exp $
*/
#ifndef lint
static char *rcsid =
"$Id: mk_req.c,v 1.2 1994/07/19 19:25:57 g89r4222 Exp $";
"$Id: mk_req.c,v 1.1.1.1 1994/09/30 14:50:02 csgr Exp $";
#endif /* lint */
#include <krb.h>
@ -95,14 +95,14 @@ krb_mk_req(authent,service,instance,realm,checksum)
/* Get the ticket and move it into the authenticator */
if (krb_ap_req_debug)
printf("Realm: %s\n",realm);
/*
/*
* Determine realm of these tickets. We will send this to the
* KDC from which we are requesting tickets so it knows what to
* with our session key.
*/
if ((retval = krb_get_tf_realm(TKT_FILE, myrealm)) != KSUCCESS)
return(retval);
retval = krb_get_cred(service,instance,realm,&cr);
if (retval == RET_NOTKT) {
@ -177,10 +177,10 @@ krb_mk_req(authent,service,instance,realm,checksum)
return(KSUCCESS);
}
/*
/*
* krb_set_lifetime sets the default lifetime for additional tickets
* obtained via krb_mk_req().
*
*
* It returns the previous value of the default lifetime.
*/

View file

@ -15,12 +15,12 @@
* Steve Miller Project Athena MIT/DEC
*
* from: mk_safe.c,v 4.12 89/03/22 14:50:49 jtkohl Exp $
* $Id: mk_safe.c,v 1.2 1994/07/19 19:25:59 g89r4222 Exp $
* $Id: mk_safe.c,v 1.1.1.1 1994/09/30 14:50:02 csgr Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: mk_safe.c,v 1.2 1994/07/19 19:25:59 g89r4222 Exp $";
"$Id: mk_safe.c,v 1.1.1.1 1994/09/30 14:50:02 csgr Exp $";
#endif /* lint */
/* system include files */
@ -65,7 +65,7 @@ static long msg_time_sec;
* HOST_BYTE_ORDER byte order in low bit
*
* ===================== begin checksum ================================
*
*
* 4 bytes length length of user data
* length in user data
* 1 byte msg_time_5ms timestamp milliseconds
@ -132,15 +132,15 @@ long krb_mk_safe(in,out,length,key,sender,receiver)
* direction bit is the sign bit of the timestamp. Ok until
* 2038??
*/
/* For compatibility with broken old code, compares are done in VAX
byte order (LSBFIRST) */
if (lsb_net_ulong_less(sender->sin_addr.s_addr, /* src < recv */
receiver->sin_addr.s_addr)==-1)
msg_time_sec = -msg_time_sec;
else if (lsb_net_ulong_less(sender->sin_addr.s_addr,
receiver->sin_addr.s_addr)==0)
if (lsb_net_ushort_less(sender->sin_port,receiver->sin_port) == -1)
msg_time_sec = -msg_time_sec;
/* For compatibility with broken old code, compares are done in VAX
byte order (LSBFIRST) */
if (lsb_net_ulong_less(sender->sin_addr.s_addr, /* src < recv */
receiver->sin_addr.s_addr)==-1)
msg_time_sec = -msg_time_sec;
else if (lsb_net_ulong_less(sender->sin_addr.s_addr,
receiver->sin_addr.s_addr)==0)
if (lsb_net_ushort_less(sender->sin_port,receiver->sin_port) == -1)
msg_time_sec = -msg_time_sec;
/*
* all that for one tiny bit! Heaven help those that talk to
* themselves.

View file

@ -15,12 +15,12 @@
* Steve Miller Project Athena MIT/DEC
*
* from: rd_priv.c,v 4.14 89/04/28 11:59:42 jtkohl Exp $
* $Id: rd_priv.c,v 1.2 1994/07/19 19:26:11 g89r4222 Exp $
* $Id: rd_priv.c,v 1.1.1.1 1994/09/30 14:50:03 csgr Exp $
*/
#ifndef lint
static char rcsid[]=
"$Id: rd_priv.c,v 1.2 1994/07/19 19:26:11 g89r4222 Exp $";
"$Id: rd_priv.c,v 1.1.1.1 1994/09/30 14:50:03 csgr Exp $";
#endif /* lint */
/* system include files */
@ -154,17 +154,17 @@ long krb_rd_priv(in,in_length,schedule,key,sender,receiver,m_data)
p += sizeof(m_data->time_sec);
/* check direction bit is the sign bit */
/* For compatibility with broken old code, compares are done in VAX
byte order (LSBFIRST) */
/* For compatibility with broken old code, compares are done in VAX
byte order (LSBFIRST) */
if (lsb_net_ulong_less(sender->sin_addr.s_addr,
receiver->sin_addr.s_addr)==-1)
/* src < recv */
m_data->time_sec = - m_data->time_sec;
else if (lsb_net_ulong_less(sender->sin_addr.s_addr,
receiver->sin_addr.s_addr)==0)
receiver->sin_addr.s_addr)==-1)
/* src < recv */
m_data->time_sec = - m_data->time_sec;
else if (lsb_net_ulong_less(sender->sin_addr.s_addr,
receiver->sin_addr.s_addr)==0)
if (lsb_net_ushort_less(sender->sin_port,receiver->sin_port)==-1)
/* src < recv */
m_data->time_sec = - m_data->time_sec;
m_data->time_sec = - m_data->time_sec;
/*
* all that for one tiny bit!
* Heaven help those that talk to themselves.

View file

@ -13,12 +13,12 @@
* Steve Miller Project Athena MIT/DEC
*
* from: rd_safe.c,v 4.12 89/01/23 15:16:16 steiner Exp $
* $Id: rd_safe.c,v 1.2 1994/07/19 19:26:15 g89r4222 Exp $
* $Id: rd_safe.c,v 1.1.1.1 1994/09/30 14:50:03 csgr Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: rd_safe.c,v 1.2 1994/07/19 19:26:15 g89r4222 Exp $";
"$Id: rd_safe.c,v 1.1.1.1 1994/09/30 14:50:03 csgr Exp $";
#endif /* lint */
/* system include files */
@ -134,17 +134,17 @@ krb_rd_safe protocol err sizeof(u_long) != sizeof(struct in_addr)");
p += sizeof(m_data->time_sec);
/* check direction bit is the sign bit */
/* For compatibility with broken old code, compares are done in VAX
byte order (LSBFIRST) */
/* For compatibility with broken old code, compares are done in VAX
byte order (LSBFIRST) */
if (lsb_net_ulong_less(sender->sin_addr.s_addr,
receiver->sin_addr.s_addr)==-1)
/* src < recv */
m_data->time_sec = - m_data->time_sec;
else if (lsb_net_ulong_less(sender->sin_addr.s_addr,
receiver->sin_addr.s_addr)==0)
receiver->sin_addr.s_addr)==-1)
/* src < recv */
m_data->time_sec = - m_data->time_sec;
else if (lsb_net_ulong_less(sender->sin_addr.s_addr,
receiver->sin_addr.s_addr)==0)
if (lsb_net_ushort_less(sender->sin_port,receiver->sin_port)==-1)
/* src < recv */
m_data->time_sec = - m_data->time_sec;
m_data->time_sec = - m_data->time_sec;
/*
* All that for one tiny bit! Heaven help those that talk to

View file

@ -5,12 +5,12 @@
* <Copyright.MIT>.
*
* from: _service_key.c,v 4.10 90/03/10 19:06:56 jon Exp $
* $Id: read_service_key.c,v 1.2 1994/07/19 19:26:16 g89r4222 Exp $
* $Id: read_service_key.c,v 1.1.1.1 1994/09/30 14:50:03 csgr Exp $
*/
#ifndef lint
static char *rcsid =
"$Id: read_service_key.c,v 1.2 1994/07/19 19:26:16 g89r4222 Exp $";
"$Id: read_service_key.c,v 1.1.1.1 1994/09/30 14:50:03 csgr Exp $";
#endif /* lint */
#include <krb.h>
@ -26,7 +26,7 @@ static char *rcsid =
* and "realm" and a key version number "kvno", and looks in the given
* "file" for the corresponding entry, and if found, returns the entry's
* key field in "key".
*
*
* If "instance" contains the string "*", then it will match
* any instance, and the chosen instance will be copied to that
* string. For this reason it is important that the there is enough
@ -102,7 +102,7 @@ read_service_key(service,instance,realm,kvno,file,key)
strcmp(realm,"ATHENA.MIT.EDU")))
continue;
#else /* ! ATHENA_COMPAT */
if (strcmp(rlm,realm))
if (strcmp(rlm,realm))
continue;
#endif /* ATHENA_COMPAT */

View file

@ -4,12 +4,12 @@
* <Copyright.MIT>.
*
* from: recvauth.c,v 4.4 90/03/10 19:03:08 jon Exp $";
* $Id: recvauth.c,v 1.2 1994/07/19 19:26:18 g89r4222 Exp $
* $Id: recvauth.c,v 1.1.1.1 1994/09/30 14:50:03 csgr Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: recvauth.c,v 1.2 1994/07/19 19:26:18 g89r4222 Exp $";
"$Id: recvauth.c,v 1.1.1.1 1994/09/30 14:50:03 csgr Exp $";
#endif lint
#include <krb.h>
@ -214,7 +214,7 @@ char *version; /* version string (filled in) */
if (krb_net_read(fd, (char *)&tkt_len, sizeof(tkt_len)) !=
sizeof(tkt_len))
return(errno);
/* sanity check */
ticket->length = ntohl((unsigned long)tkt_len);
if ((ticket->length <= 0) || (ticket->length > MAX_KTXT_LEN)) {

View file

@ -4,7 +4,7 @@
* <Copyright.MIT>.
*
* from: send_to_kdc.c,v 4.20 90/01/02 13:40:37 jtkohl Exp $
* $Id: send_to_kdc.c,v 1.2 1995/01/25 05:40:00 gibbs Exp $
* $Id: send_to_kdc.c,v 1.3 1995/01/25 06:37:33 gibbs Exp $
*/
#ifndef lint
@ -257,7 +257,7 @@ static send_recv(pkt,rpkt,f,_to,addrs)
printf("Sending message...");
(void) fflush(stdout);
}
if ((numsent = sendto(f,(char *)(pkt->dat), pkt->length, 0,
if ((numsent = sendto(f,(char *)(pkt->dat), pkt->length, 0,
(struct sockaddr *)_to,
S_AD_SZ)) != pkt->length) {
if (krb_debug)

View file

@ -7,12 +7,12 @@
* contributed by Dan Kolkowitz (kolk@jessica.stanford.edu).
*
* from: tf_shm.c,v 4.2 89/10/25 23:26:46 qjb Exp $
* $Id: tf_shm.c,v 1.2 1994/07/19 19:26:26 g89r4222 Exp $
* $Id: tf_shm.c,v 1.1.1.1 1994/09/30 14:50:04 csgr Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: tf_shm.c,v 1.2 1994/07/19 19:26:26 g89r4222 Exp $";
"$Id: tf_shm.c,v 1.1.1.1 1994/09/30 14:50:04 csgr Exp $";
#endif lint
#include <stdio.h>
@ -51,15 +51,15 @@ char *file_name;
don't slowly lose memory. */
shmid = shmget((long)IPC_PRIVATE,MAX_BUFF, IPC_CREAT);
if (shmid == -1) {
if (shmid == -1) {
if (krb_debug)
perror("krb_shm_create shmget");
return(KFAILURE); /* XXX */
}
me = getuid();
metoo = geteuid();
/*
* now set up the buffer so that we can modify it
/*
* now set up the buffer so that we can modify it
*/
shm_buf.shm_perm.uid = me;
shm_buf.shm_perm.gid = getgid();
@ -89,13 +89,13 @@ char *file_name;
perror("krb_shm_create file");
(void) shmctl(shmid, IPC_RMID, 0);
return(KFAILURE); /* XXX */
}
}
if (fchmod(fileno(sfile),0600) < 0) {
if (krb_debug)
perror("krb_shm_create fchmod");
(void) shmctl(shmid, IPC_RMID, 0);
return(KFAILURE); /* XXX */
}
}
if (me != metoo) {
if (setreuid(me, metoo) < 0) {
/* can't switch??? barf! */
@ -126,11 +126,11 @@ char *file_name;
int krb_is_diskless()
{
struct stat buf;
if (stat("/.diskless",&buf) < 0)
if (stat("/.diskless",&buf) < 0)
return(0);
else return(1);
}
/*
* krb_shm_dest: destroy shared memory segment with session keys, and remove
* file pointing to it.
@ -156,7 +156,7 @@ char *file;
perror("krb_shm_dest: cannot delete shm segment");
(void) fclose(sfile);
return(KFAILURE); /* XXX */
}
}
} else {
if (krb_debug)
fprintf(stderr, "bad format in shmid file\n");
@ -170,5 +170,5 @@ char *file;
return(RET_TKFIL); /* XXX */
}

View file

@ -4,12 +4,12 @@
* <Copyright.MIT>.
*
* from: tf_util.c,v 4.9 90/03/10 19:19:45 jon Exp $
* $Id: tf_util.c,v 1.2 1994/07/19 19:26:28 g89r4222 Exp $
* $Id: tf_util.c,v 1.1.1.1 1994/09/30 14:50:04 csgr Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: tf_util.c,v 1.2 1994/07/19 19:26:28 g89r4222 Exp $";
"$Id: tf_util.c,v 1.1.1.1 1994/09/30 14:50:04 csgr Exp $";
#endif /* lint */
#include <stdio.h>
@ -51,7 +51,7 @@ char *shmat();
* are invalid (ie. when deciding whether tf_init has been
* called.)
* c. In tf_close, be sure it gets reinitialized to a negative
* number.
* number.
*/
static fd = -1;
static curpos; /* Position in tfbfr */
@ -109,13 +109,13 @@ static tf_gets(), tf_read();
/*
* tf_init() should be called before the other ticket file routines.
* It takes the name of the ticket file to use, "tf_name", and a
* read/write flag "rw" as arguments.
* read/write flag "rw" as arguments.
*
* It tries to open the ticket file, checks the mode, and if everything
* is okay, locks the file. If it's opened for reading, the lock is
* shared. If it's opened for writing, the lock is exclusive.
* shared. If it's opened for writing, the lock is exclusive.
*
* Returns KSUCCESS if all went well, otherwise one of the following:
* Returns KSUCCESS if all went well, otherwise one of the following:
*
* NO_TKT_FIL - file wasn't there
* TKT_FIL_ACC - file was in wrong mode, etc.
@ -129,7 +129,7 @@ tf_init(tf_name, rw)
uid_t me, getuid();
struct stat stat_buf;
#ifdef TKT_SHMEM
char shmidname[MAXPATHLEN];
char shmidname[MAXPATHLEN];
FILE *sfp;
int shmid;
#endif
@ -170,7 +170,7 @@ tf_init(tf_name, rw)
* If "wflag" is set, open the ticket file in append-writeonly mode
* and lock the ticket file in exclusive mode. If unable to lock
* the file, sleep and try again. If we fail again, return with the
* proper error message.
* proper error message.
*/
curpos = sizeof(tfbfr);
@ -214,7 +214,7 @@ tf_init(tf_name, rw)
}
tmp_shm_addr = krb_shm_addr;
#endif /* TKT_SHMEM */
if (wflag) {
fd = open(tf_name, O_RDWR, 0600);
if (fd < 0) {
@ -232,7 +232,7 @@ tf_init(tf_name, rw)
}
/*
* Otherwise "wflag" is not set and the ticket file should be opened
* for read-only operations and locked for shared access.
* for read-only operations and locked for shared access.
*/
fd = open(tf_name, O_RDONLY, 0600);
@ -256,7 +256,7 @@ tf_init(tf_name, rw)
* principal's name is filled into the "p" parameter. If all goes well,
* KSUCCESS is returned. If tf_init() wasn't called, TKT_FIL_INI is
* returned. If the name was null, or EOF was encountered, or the name
* was longer than ANAME_SZ, TKT_FIL_FMT is returned.
* was longer than ANAME_SZ, TKT_FIL_FMT is returned.
*/
tf_get_pname(p)
@ -279,7 +279,7 @@ tf_get_pname(p)
* goes well, KSUCCESS is returned. If tf_init() wasn't called,
* TKT_FIL_INI is returned. If EOF was encountered, or the instance
* was longer than ANAME_SZ, TKT_FIL_FMT is returned. Note that the
* instance may be null.
* instance may be null.
*/
tf_get_pinst(inst)
@ -299,7 +299,7 @@ tf_get_pinst(inst)
* tf_get_cred() reads a CREDENTIALS record from a ticket file and fills
* in the given structure "c". It should only be called after tf_init(),
* tf_get_pname(), and tf_get_pinst() have been called. If all goes well,
* KSUCCESS is returned. Possible error codes are:
* KSUCCESS is returned. Possible error codes are:
*
* TKT_FIL_INI - tf_init wasn't called first
* TKT_FIL_FMT - bad format
@ -394,7 +394,7 @@ tf_close()
* tf_gets() is an internal routine. It takes a string "s" and a count
* "n", and reads from the file until either it has read "n" characters,
* or until it reads a null byte. When finished, what has been read exists
* in "s". If it encounters EOF or an error, it closes the ticket file.
* in "s". If it encounters EOF or an error, it closes the ticket file.
*
* Possible return values are:
*
@ -408,7 +408,7 @@ tf_close()
* file is seriously ill.
*/
static
static
tf_gets(s, n)
register char *s;
{
@ -455,7 +455,7 @@ tf_read(s, n)
register n;
{
register count;
for (count = n; count > 0; --count) {
if (curpos >= sizeof(tfbfr)) {
lastpos = read(fd, tfbfr, sizeof(tfbfr));
@ -469,7 +469,7 @@ tf_read(s, n)
}
return n;
}
char *tkt_string();
/*

View file

@ -1,18 +1,18 @@
/*
* Copyright 1988 by the Massachusetts Institute of Technology.
* Copyright 1988 by the Massachusetts Institute of Technology.
* For copying and distribution information, please see the file
* <Copyright.MIT>.
* <Copyright.MIT>.
*
* Get a ticket-granting-ticket given a service key file (srvtab)
* The lifetime is the shortest allowed [1 five-minute interval]
*
* from: ksrvtgt.c,v 4.3 89/07/28 10:17:28 jtkohl Exp $
* $Id: ksrvtgt.c,v 1.2 1994/07/19 19:26:56 g89r4222 Exp $
* $Id: ksrvtgt.c,v 1.1.1.1 1994/09/30 14:50:04 csgr Exp $
*/
#ifndef lint
const char rcsid[] =
"$Id: ksrvtgt.c,v 1.2 1994/07/19 19:26:56 g89r4222 Exp $";
"$Id: ksrvtgt.c,v 1.1.1.1 1994/09/30 14:50:04 csgr Exp $";
#endif /* lint */
#include <stdio.h>
@ -36,10 +36,10 @@ main(argc,argv)
argv[0]);
exit(1);
}
if (argc == 4)
(void) strncpy(srvtab, argv[3], sizeof(srvtab) -1);
if (argc == 5) {
(void) strncpy(realm, argv[3], sizeof(realm) - 1);
(void) strncpy(srvtab, argv[4], sizeof(srvtab) -1);

View file

@ -13,7 +13,7 @@ static char rcsid_ksrvutil_c[] =
"BonesHeader: /afs/athena.mit.edu/astaff/project/kerberos/src/kadmin/RCS/ksrvutil.c,v 4.1 89/09/26 09:33:49 jtkohl Exp ";
#endif
static const char rcsid[] =
"$Id: ksrvutil.c,v 1.1 1995/01/20 22:38:30 wollman Exp $";
"$Id: ksrvutil.c,v 1.2 1995/01/23 22:54:08 wollman Exp $";
#endif lint
/*
@ -72,9 +72,9 @@ copy_keyfile(progname, keyfile, backup_keyfile)
char buf[BUFSIZ]; /* for copying keyfiles */
int rcount; /* for copying keyfiles */
int try_again;
(void) bzero((char *)buf, sizeof(buf));
do {
try_again = FALSE;
if ((keyfile_fd = open(keyfile, O_RDONLY, 0)) < 0) {
@ -83,8 +83,8 @@ copy_keyfile(progname, keyfile, backup_keyfile)
}
else {
try_again = TRUE;
if ((keyfile_fd =
open(keyfile,
if ((keyfile_fd =
open(keyfile,
O_WRONLY | O_TRUNC | O_CREAT, SRVTAB_MODE)) < 0) {
err(1, "unable to create %s", keyfile);
}
@ -98,8 +98,8 @@ copy_keyfile(progname, keyfile, backup_keyfile)
keyfile_mode = get_mode(keyfile);
if ((backup_keyfile_fd =
open(backup_keyfile, O_WRONLY | O_TRUNC | O_CREAT,
if ((backup_keyfile_fd =
open(backup_keyfile, O_WRONLY | O_TRUNC | O_CREAT,
keyfile_mode)) < 0) {
err(1, "unable to write %s", backup_keyfile);
}
@ -134,8 +134,8 @@ safe_read_stdin(prompt, buf, size)
}
fflush(stdin);
buf[strlen(buf)-1] = 0;
}
}
void
safe_write(progname, filename, fd, buf, len)
@ -150,7 +150,7 @@ safe_write(progname, filename, fd, buf, len)
close(fd);
leave("In progress srvtab in this file.", 1);
}
}
}
int
yn(string)
@ -161,7 +161,7 @@ yn(string)
(void) printf("%s (y,n) [y] ", string);
for (;;) {
safe_read_stdin("", ynbuf, sizeof(ynbuf));
if ((ynbuf[0] == 'n') || (ynbuf[0] == 'N'))
return(0);
else if ((ynbuf[0] == 'y') || (ynbuf[0] == 'Y') || (ynbuf[0] == 0))
@ -174,7 +174,7 @@ yn(string)
}
void
append_srvtab(progname, filename, fd, sname, sinst,
append_srvtab(progname, filename, fd, sname, sinst,
srealm, key_vno, key)
char *progname;
char *filename;
@ -192,7 +192,7 @@ append_srvtab(progname, filename, fd, sname, sinst,
safe_write(progname, filename, fd, (char *)&key_vno, 1);
safe_write(progname, filename, fd, (char *)key, sizeof(des_cblock));
(void) fsync(fd);
}
}
unsigned short
get_mode(filename)
@ -202,8 +202,8 @@ get_mode(filename)
unsigned short mode;
(void) bzero((char *)&statbuf, sizeof(statbuf));
if (stat(filename, &statbuf) < 0)
if (stat(filename, &statbuf) < 0)
mode = SRVTAB_MODE;
else
mode = statbuf.st_mode;
@ -240,33 +240,33 @@ main(argc,argv)
int change_this_key = FALSE;
char databuf[BUFSIZ];
int first_printed = FALSE; /* have we printed the first item? */
int get_svc_new_key();
void get_key_from_password();
void print_key();
void print_name();
(void) bzero((char *)sname, sizeof(sname));
(void) bzero((char *)sinst, sizeof(sinst));
(void) bzero((char *)srealm, sizeof(srealm));
(void) bzero((char *)change_tkt, sizeof(change_tkt));
(void) bzero((char *)keyfile, sizeof(keyfile));
(void) bzero((char *)work_keyfile, sizeof(work_keyfile));
(void) bzero((char *)backup_keyfile, sizeof(backup_keyfile));
(void) bzero((char *)local_realm, sizeof(local_realm));
(void) sprintf(change_tkt, "/tmp/tkt_ksrvutil.%d", getpid());
krb_set_tkt_string(change_tkt);
/* This is used only as a default for adding keys */
if (krb_get_lrealm(local_realm, 1) != KSUCCESS)
(void) strcpy(local_realm, KRB_REALM);
for (i = 1; i < argc; i++) {
if (strcmp(argv[i], "-i") == 0)
if (strcmp(argv[i], "-i") == 0)
interactive++;
else if (strcmp(argv[i], "-k") == 0)
else if (strcmp(argv[i], "-k") == 0)
key++;
else if (strcmp(argv[i], "list") == 0) {
if (arg_entered)
@ -301,23 +301,23 @@ main(argc,argv)
else
usage();
}
if (!arg_entered)
usage();
if (!keyfile[0])
(void) strcpy(keyfile, KEYFILE);
(void) strcpy(work_keyfile, keyfile);
(void) strcpy(backup_keyfile, keyfile);
if (change || add) {
(void) strcat(work_keyfile, ".work");
(void) strcat(backup_keyfile, ".old");
copy_keyfile(argv[0], keyfile, backup_keyfile);
}
if (add)
copy_keyfile(argv[0], backup_keyfile, work_keyfile);
@ -330,8 +330,8 @@ main(argc,argv)
}
if (change) {
if ((work_keyfile_fd =
open(work_keyfile, O_WRONLY | O_CREAT | O_TRUNC,
if ((work_keyfile_fd =
open(work_keyfile, O_WRONLY | O_CREAT | O_TRUNC,
SRVTAB_MODE)) < 0) {
err(1, "unable to write %s", work_keyfile);
}
@ -342,7 +342,7 @@ main(argc,argv)
err(1, "unable to append to %s", work_keyfile);
}
}
if (change || list) {
while ((getst(backup_keyfile_fd, sname, SNAME_SZ) > 0) &&
(getst(backup_keyfile_fd, sinst, INST_SZ) > 0) &&
@ -379,19 +379,19 @@ main(argc,argv)
change_this_key = 1;
else
change_this_key = 0;
if (change_this_key)
(void) printf("Changing to version %d.\n", key_vno + 1);
else if (change)
(void) printf("Not changing this key.\n");
if (change_this_key) {
/*
/*
* Pick a new key and determine whether or not
* it is safe to change
*/
if ((status =
get_svc_new_key(new_key, sname, sinst,
if ((status =
get_svc_new_key(new_key, sname, sinst,
srealm, keyfile)) == KADM_SUCCESS)
key_vno++;
else {
@ -400,9 +400,9 @@ main(argc,argv)
change_this_key = FALSE;
}
}
else
else
(void) bcopy(old_key, new_key, sizeof(new_key));
append_srvtab(argv[0], work_keyfile, work_keyfile_fd,
append_srvtab(argv[0], work_keyfile, work_keyfile_fd,
sname, sinst, srealm, key_vno, new_key);
if (key && change_this_key) {
(void) printf("Old key: ");
@ -417,7 +417,7 @@ main(argc,argv)
(void) dest_tkt();
}
else {
com_err(argv[0], status,
com_err(argv[0], status,
" attempting to change password.");
(void) dest_tkt();
/* XXX This knows the format of a keyfile */
@ -464,17 +464,17 @@ main(argc,argv)
print_key(new_key);
(void) printf("\n");
}
append_srvtab(argv[0], work_keyfile, work_keyfile_fd,
append_srvtab(argv[0], work_keyfile, work_keyfile_fd,
sname, sinst, srealm, key_vno, new_key);
(void) printf("Key successfully added.\n");
} while (yn("Would you like to add another key?"));
}
if (change || list)
if (change || list)
if (close(backup_keyfile_fd) < 0) {
warn("failure closing %s, continuing", backup_keyfile);
}
if (change || add) {
if (close(work_keyfile_fd) < 0) {
err(1, "failure closing %s", work_keyfile);
@ -525,7 +525,7 @@ get_svc_new_key(new_key, sname, sinst, srealm, keyfile)
if (((status = krb_get_svc_in_tkt(sname, sinst, srealm, PWSERV_NAME,
KADM_SINST, 1, keyfile)) == KSUCCESS) &&
((status = kadm_init_link("changepw", KRB_MASTER, srealm)) ==
((status = kadm_init_link("changepw", KRB_MASTER, srealm)) ==
KADM_SUCCESS)) {
#ifdef NOENCRYPTION
(void) bzero((char *) new_key, sizeof(des_cblock));
@ -535,7 +535,7 @@ get_svc_new_key(new_key, sname, sinst, srealm, keyfile)
#endif /* NOENCRYPTION */
return(KADM_SUCCESS);
}
return(status);
}
@ -555,7 +555,7 @@ get_key_from_password(key)
(void) des_string_to_key(password, key);
#endif /* NOENCRYPTION */
(void) bzero((char *)password, sizeof(password));
}
}
usage()
{

View file

@ -1,10 +1,10 @@
# From: @(#)Makefile 5.2 (Berkeley) 3/5/91
# $Id: Makefile,v 1.2 1994/07/19 19:27:04 g89r4222 Exp $
# $Id: Makefile,v 1.1.1.1 1994/09/30 14:50:04 csgr Exp $
PROG= kstash
CFLAGS+=-DKERBEROS -DDEBUG -I${.CURDIR}/../include
DPADD= ${LIBKDB} ${LIBKRB} ${LIBDES}
LDADD= -L${KDBOBJDIR} -lkdb -L${KRBOBJDIR} -lkrb -L${DESOBJDIR} -ldes
LDADD= -L${KDBOBJDIR} -lkdb -L${KRBOBJDIR} -lkrb -L${DESOBJDIR} -ldes
NOMAN= noman
.include <bsd.prog.mk>

View file

@ -1,16 +1,16 @@
/*
* Copyright 1985, 1986, 1987, 1988 by the Massachusetts Institute
* of Technology
* of Technology
* For copying and distribution information, please see the file
* <Copyright.MIT>.
*
* from: kstash.c,v 4.0 89/01/23 09:45:43 jtkohl Exp $
* $Id: kstash.c,v 1.2 1994/07/19 19:27:05 g89r4222 Exp $
* $Id: kstash.c,v 1.1.1.1 1994/09/30 14:50:05 csgr Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: kstash.c,v 1.2 1994/07/19 19:27:05 g89r4222 Exp $";
"$Id: kstash.c,v 1.1.1.1 1994/09/30 14:50:05 csgr Exp $";
#endif lint
#include <stdio.h>
@ -84,7 +84,7 @@ main(argc, argv)
clear_secrets();
}
static void
static void
clear_secrets()
{
bzero(master_key_schedule, sizeof(master_key_schedule));

View file

@ -6,12 +6,12 @@
* <mit-copyright.h>.
*
* from: acl_files.c,v 4.4 89/12/19 13:30:53 jtkohl Exp $
* $Id: acl_files.c,v 1.2 1994/07/19 19:21:18 g89r4222 Exp $
* $Id: acl_files.c,v 1.1.1.1 1994/09/30 14:49:48 csgr Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: acl_files.c,v 1.2 1994/07/19 19:21:18 g89r4222 Exp $";
"$Id: acl_files.c,v 1.1.1.1 1994/09/30 14:49:48 csgr Exp $";
#endif lint
@ -86,7 +86,7 @@ char *canon;
dot = NULL;
}
}
/* No such luck */
end = principal + strlen(principal);
@ -121,7 +121,7 @@ char *canon;
strcpy(canon, KRB_REALM);
}
}
/* Get a lock to modify acl_file */
/* Return new FILE pointer */
/* or NULL if file cannot be modified */
@ -176,7 +176,7 @@ char *acl_file;
/* Closes f */
static int acl_commit(acl_file, f)
char *acl_file;
FILE *f;
FILE *f;
{
char new[LINESIZE];
int ret;
@ -203,7 +203,7 @@ FILE *f;
static int
acl_abort(acl_file, f)
char *acl_file;
FILE *f;
FILE *f;
{
char new[LINESIZE];
int ret;
@ -471,7 +471,7 @@ char *principal;
sprintf(buf, "*.*%s", realm);
if(acl_exact_match(acl, buf) || acl_exact_match(acl, "*.*@*")) return(1);
return(0);
}

View file

@ -1,7 +1,7 @@
/*
* $Source: /afs/athena.mit.edu/astaff/project/kerberos/src/include/RCS/kadm.h,v $
* $Author: jtkohl $
* Header: /afs/athena.mit.edu/astaff/project/kerberos/src/include/RCS/kadm.h,v 4.2 89/09/26 09:15:20 jtkohl Exp
* $Source: /home/ncvs/src/eBones/libkadm/kadm.h,v $
* $Author: wollman $
* Header: /afs/athena.mit.edu/astaff/project/kerberos/src/include/RCS/kadm.h,v 4.2 89/09/26 09:15:20 jtkohl Exp
*
* Copyright 1988 by the Massachusetts Institute of Technology.
*

View file

@ -13,11 +13,11 @@ static char rcsid_kadm_cli_wrap_c[] =
"from: Id: kadm_cli_wrap.c,v 4.6 89/12/30 20:09:45 qjb Exp";
#endif
static const char rcsid[] =
"$Id$";
"$Id: kadm_cli_wrap.c,v 1.1 1995/01/20 02:02:51 wollman Exp $";
#endif lint
/*
* kadm_cli_wrap.c the client side wrapping of the calls to the admin server
* kadm_cli_wrap.c the client side wrapping of the calls to the admin server
*/
#include <sys/types.h>
@ -26,7 +26,7 @@ static const char rcsid[] =
#include <netdb.h>
#include <sys/socket.h>
#include <kadm.h>
#include <kadm_err.h>
#include <kadm_err.h>
#include <krb_err.h>
#ifndef NULL
@ -42,7 +42,7 @@ static Kadm_Client client_parm;
static des_cblock sess_key; /* to be filled in by kadm_cli_keyd */
static Key_schedule sess_sched;
static
static
clear_secrets()
{
bzero((char *)sess_key, sizeof(sess_key));
@ -54,9 +54,9 @@ clear_secrets()
* kadm_init_link
* receives : name, inst, realm
*
* initializes client parm, the Kadm_Client structure which holds the
* data about the connection between the server and client, the services
* used, the locations and other fun things
* initializes client parm, the Kadm_Client structure which holds the
* data about the connection between the server and client, the services
* used, the locations and other fun things
*/
kadm_init_link(n, i, r)
char n[];
@ -94,11 +94,11 @@ char r[];
/*
* kadm_change_pw
* recieves : key
* recieves : key
*
* Replaces the password (i.e. des key) of the caller with that specified in
* key. Returns no actual data from the master server, since this is called
* by a user
* by a user
*/
kadm_change_pw(newkey)
des_cblock newkey; /* The DES form of the users key */
@ -126,7 +126,7 @@ des_cblock newkey; /* The DES form of the users key */
bcopy((char *) newkey, (char *) &keytmp, 4);
keytmp = htonl(keytmp);
stsize += vts_long(keytmp, &send_st, stsize);
retc = kadm_cli_send(send_st, stsize, &ret_st, &ret_sz);
free((char *)send_st);
if (retc == KADM_SUCCESS) {
@ -139,11 +139,11 @@ des_cblock newkey; /* The DES form of the users key */
/*
* kadm_add
* receives : vals
* returns : vals
* returns : vals
*
* Adds and entry containing values to the database returns the values of the
* entry, so if you leave certain fields blank you will be able to determine
* the default values they are set to
* the default values they are set to
*/
kadm_add(vals)
Kadm_vals *vals;
@ -176,8 +176,8 @@ Kadm_vals *vals;
/*
* kadm_mod
* receives : KTEXT, {values, values}
* returns : CKSUM, RETCODE, {values}
* acl : su, sms (as register or dealloc)
* returns : CKSUM, RETCODE, {values}
* acl : su, sms (as register or dealloc)
*
* Modifies all entries corresponding to the first values so they match the
* second values. returns the values for the changed entries in vals2
@ -220,13 +220,13 @@ Kadm_vals *vals2;
/*
* kadm_get
* receives : KTEXT, {values, flags}
* receives : KTEXT, {values, flags}
* returns : CKSUM, RETCODE, {count, values, values, values}
* acl : su
* acl : su
*
* gets the fields requested by flags from all entries matching values returns
* this data for each matching recipient, after a count of how many such
* matches there were
* matches there were
*/
kadm_get(vals, fl)
Kadm_vals *vals;
@ -265,7 +265,7 @@ u_char fl[4];
* kadm_cli_send
* recieves : opcode, packet, packet length, serv_name, serv_inst
* returns : return code from the packet build, the server, or
* something else
* something else
*
* It assembles a packet as follows:
* 8 bytes : VERSION STRING
@ -273,11 +273,11 @@ u_char fl[4];
* : KTEXT
* : OPCODE \
* : DATA > Encrypted (with make priv)
* : ...... /
* : ...... /
*
* If it builds the packet and it is small enough, then it attempts to open the
* connection to the admin server. If the connection is succesfully open
* then it sends the data and waits for a reply.
* then it sends the data and waits for a reply.
*/
kadm_cli_send(st_dat, st_siz, ret_dat, ret_siz)
u_char *st_dat; /* the actual data */

View file

@ -13,7 +13,7 @@ static char rcsid_kadm_stream_c[] =
"Header: /afs/athena.mit.edu/astaff/project/kerberos/src/lib/kadm/RCS/kadm_stream.c,v 4.2 89/09/26 09:20:48 jtkohl Exp ";
#endif
static const char rcsid[] =
"$Id$";
"$Id: kadm_stream.c,v 1.1 1995/01/20 02:02:53 wollman Exp $";
#endif lint
/*
@ -32,11 +32,11 @@ static const char rcsid[] =
#define min(a,b) (((a) < (b)) ? (a) : (b))
/*
/*
vals_to_stream
recieves : kadm_vals *, u_char *
returns : a realloced and filled in u_char *
this function creates a byte-stream representation of the kadm_vals structure
*/
vals_to_stream(dt_in, dt_out)
@ -64,16 +64,16 @@ u_char **dt_out;
case KADM_MAXLIFE:
stsize+=vts_char(dt_in->max_life, dt_out, stsize);
break;
case KADM_DESKEY:
stsize+=vts_long(dt_in->key_high, dt_out, stsize);
stsize+=vts_long(dt_in->key_low, dt_out, stsize);
case KADM_DESKEY:
stsize+=vts_long(dt_in->key_high, dt_out, stsize);
stsize+=vts_long(dt_in->key_low, dt_out, stsize);
break;
default:
break;
}
}
return(stsize);
}
}
build_field_header(cont, st)
u_char *cont; /* container for fields data */
@ -120,7 +120,7 @@ int loc; /* offset into the stream for current data */
return sizeof(u_long);
}
vts_char(dat, st, loc)
u_char dat; /* the attributes field */
u_char **st; /* a base pointer to the stream */
@ -130,12 +130,12 @@ int loc; /* offset into the stream for current data */
(*st)[loc] = (u_char) dat;
return 1;
}
/*
/*
stream_to_vals
recieves : u_char *, kadm_vals *
returns : a kadm_vals filled in according to u_char *
this decodes a byte stream represntation of a vals struct into kadm_vals
*/
stream_to_vals(dt_in, dt_out, maxlen)
@ -198,7 +198,7 @@ int maxlen; /* max length to use */
break;
}
return stsize;
}
}
check_field_header(st, cont, maxlen)
u_char *st; /* stream */
@ -258,7 +258,7 @@ int maxlen; /* maximum length of st */
*dat = ntohl(temp); /* convert to network order */
return sizeof(u_long);
}
stv_char(st, dat, loc, maxlen)
u_char *st; /* a base pointer to the stream */
u_char *dat; /* the attributes field */

View file

@ -13,7 +13,7 @@ static char rcsid_kadm_supp_c[] =
"Header: /afs/athena.mit.edu/astaff/project/kerberos/src/lib/kadm/RCS/kadm_supp.c,v 4.1 89/09/26 09:21:07 jtkohl Exp ";
#endif
static const char rcsid[] =
"$Id$";
"$Id: kadm_supp.c,v 1.1 1995/01/20 02:02:54 wollman Exp $";
#endif lint
/*
@ -28,7 +28,7 @@ static const char rcsid[] =
#include "kadm.h"
#include "krb_db.h"
/*
prin_vals:
recieves : a vals structure
@ -37,7 +37,7 @@ prin_vals(vals)
Kadm_vals *vals;
{
printf("Info in Database for %s.%s:\n", vals->name, vals->instance);
printf(" Max Life: %d Exp Date: %s\n",vals->max_life,
printf(" Max Life: %d Exp Date: %s\n",vals->max_life,
asctime(localtime((long *)&vals->exp_date)));
printf(" Attribs: %.2x key: %u %u\n",vals->attributes,
vals->key_low, vals->key_high);
@ -54,7 +54,7 @@ int s;
#endif
/* kadm_prin_to_vals takes a fields arguments, a Kadm_vals and a Principal,
it copies the fields in Principal specified by fields into Kadm_vals,
it copies the fields in Principal specified by fields into Kadm_vals,
i.e from old to new */
kadm_prin_to_vals(fields, new, old)
@ -64,28 +64,28 @@ Principal *old;
{
bzero((char *)new, sizeof(*new));
if (IS_FIELD(KADM_NAME,fields)) {
(void) strncpy(new->name, old->name, ANAME_SZ);
(void) strncpy(new->name, old->name, ANAME_SZ);
SET_FIELD(KADM_NAME, new->fields);
}
if (IS_FIELD(KADM_INST,fields)) {
(void) strncpy(new->instance, old->instance, INST_SZ);
(void) strncpy(new->instance, old->instance, INST_SZ);
SET_FIELD(KADM_INST, new->fields);
}
}
if (IS_FIELD(KADM_EXPDATE,fields)) {
new->exp_date = old->exp_date;
new->exp_date = old->exp_date;
SET_FIELD(KADM_EXPDATE, new->fields);
}
}
if (IS_FIELD(KADM_ATTR,fields)) {
new->attributes = old->attributes;
new->attributes = old->attributes;
SET_FIELD(KADM_MAXLIFE, new->fields);
}
}
if (IS_FIELD(KADM_MAXLIFE,fields)) {
new->max_life = old->max_life;
new->max_life = old->max_life;
SET_FIELD(KADM_MAXLIFE, new->fields);
}
}
if (IS_FIELD(KADM_DESKEY,fields)) {
new->key_low = old->key_low;
new->key_high = old->key_high;
new->key_low = old->key_low;
new->key_high = old->key_high;
SET_FIELD(KADM_DESKEY, new->fields);
}
}
@ -98,17 +98,17 @@ Kadm_vals *old;
bzero((char *)new, sizeof(*new));
if (IS_FIELD(KADM_NAME,fields))
(void) strncpy(new->name, old->name, ANAME_SZ);
(void) strncpy(new->name, old->name, ANAME_SZ);
if (IS_FIELD(KADM_INST,fields))
(void) strncpy(new->instance, old->instance, INST_SZ);
(void) strncpy(new->instance, old->instance, INST_SZ);
if (IS_FIELD(KADM_EXPDATE,fields))
new->exp_date = old->exp_date;
new->exp_date = old->exp_date;
if (IS_FIELD(KADM_ATTR,fields))
new->attributes = old->attributes;
new->attributes = old->attributes;
if (IS_FIELD(KADM_MAXLIFE,fields))
new->max_life = old->max_life;
new->max_life = old->max_life;
if (IS_FIELD(KADM_DESKEY,fields)) {
new->key_low = old->key_low;
new->key_high = old->key_high;
new->key_low = old->key_low;
new->key_high = old->key_high;
}
}

View file

@ -1,17 +1,17 @@
/*
* Copyright 1988 by the Massachusetts Institute of Technology.
* Copyright 1988 by the Massachusetts Institute of Technology.
* For copying and distribution information, please see the file
* <Copyright.MIT>.
*
* This is where a cache would be implemented, if it were necessary.
*
* from: krb_cache.c,v 4.5 89/01/24 18:12:34 jon Exp $
* $Id: krb_cache.c,v 1.2 1994/07/19 19:23:35 g89r4222 Exp $
* $Id: krb_cache.c,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: krb_cache.c,v 1.2 1994/07/19 19:23:35 g89r4222 Exp $";
"$Id: krb_cache.c,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $";
#endif lint
#include <stdio.h>
@ -34,7 +34,7 @@ extern long kerb_debug;
static init = 0;
/*
* initialization routine for cache
* initialization routine for cache
*/
int
@ -45,7 +45,7 @@ kerb_cache_init()
}
/*
* look up a principal in the cache returns number of principals found
* look up a principal in the cache returns number of principals found
*/
int
@ -66,7 +66,7 @@ kerb_cache_get_principal(serv, inst, principal, max)
fprintf(stderr, "cache_get_principal for %s %s max = %d\n",
serv, inst, max);
#endif DEBUG
#ifdef DEBUG
if (kerb_debug & 2) {
if (found) {
@ -83,7 +83,7 @@ kerb_cache_get_principal(serv, inst, principal, max)
/*
* insert/replace a principal in the cache returns number of principals
* inserted
* inserted
*/
int
@ -106,13 +106,13 @@ kerb_cache_put_principal(principal, max)
max);
}
#endif
for (i = 0; i < max; i++) {
#ifdef DEBUG
if (kerb_debug & 2)
fprintf(stderr, "\n %s %s",
principal->name, principal->instance);
#endif
#endif
/* DO IT */
count++;
principal++;
@ -121,7 +121,7 @@ kerb_cache_put_principal(principal, max)
}
/*
* look up a dba in the cache returns number of dbas found
* look up a dba in the cache returns number of dbas found
*/
int
@ -158,7 +158,7 @@ kerb_cache_get_dba(serv, inst, dba, max)
}
/*
* insert/replace a dba in the cache returns number of dbas inserted
* insert/replace a dba in the cache returns number of dbas inserted
*/
int
@ -183,7 +183,7 @@ kerb_cache_put_dba(dba, max)
if (kerb_debug & 2)
fprintf(stderr, "\n %s %s",
dba->name, dba->instance);
#endif
#endif
/* DO IT */
count++;
dba++;

View file

@ -1,15 +1,15 @@
/*
* Copyright 1988 by the Massachusetts Institute of Technology.
* Copyright 1988 by the Massachusetts Institute of Technology.
* For copying and distribution information, please see the file
* <Copyright.MIT>.
* <Copyright.MIT>.
*
* from: krb_dbm.c,v 4.9 89/04/18 16:15:13 wesommer Exp $
* $Id: krb_dbm.c,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $
* $Id: krb_dbm.c,v 1.2 1995/01/25 19:45:25 ache Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: krb_dbm.c,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $";
"$Id: krb_dbm.c,v 1.2 1995/01/25 19:45:25 ache Exp $";
#endif lint
#if defined(__FreeBSD__)
@ -69,14 +69,14 @@ static int non_blocking = 0;
/*
* Locking:
*
*
* There are two distinct locking protocols used. One is designed to
* lock against processes (the admin_server, for one) which make
* incremental changes to the database; the other is designed to lock
* against utilities (kdb_util, kpropd) which replace the entire
* database in one fell swoop.
*
* The first locking protocol is implemented using flock() in the
* The first locking protocol is implemented using flock() in the
* krb_dbl_lock() and krb_dbl_unlock routines.
*
* The second locking protocol is necessary because DBM "files" are
@ -93,12 +93,12 @@ static int non_blocking = 0;
* either time, the reader sleeps for a second to let things
* stabilize, and then tries again; if it does not succeed after
* KERB_DB_MAX_RETRY attempts, it gives up.
*
*
* On update, the semaphore file is deleted (if it exists) before any
* update takes place; at the end of the update, it is replaced, with
* a version number strictly greater than the version number which
* existed at the start of the update.
*
*
* If the system crashes in the middle of an update, the semaphore
* file is not automatically created on reboot; this is a feature, not
* a bug, since the database may be inconsistant. Note that the
@ -140,7 +140,7 @@ static char *gen_dbsuffix(db_name, sfx)
char *sfx;
{
char *dbsuffix;
if (sfx == NULL)
sfx = ".ok";
@ -162,7 +162,7 @@ kerb_db_init()
/*
* gracefully shut down database--must be called by ANY program that does
* a kerb_db_init
* a kerb_db_init
*/
kerb_db_fini()
@ -201,7 +201,7 @@ long kerb_get_db_age()
struct stat st;
char *okname;
long age;
okname = gen_dbsuffix(current_db_name, ".ok");
if (stat (okname, &st) < 0)
@ -226,7 +226,7 @@ static long kerb_start_update(db_name)
{
char *okname = gen_dbsuffix(db_name, ".ok");
long age = kerb_get_db_age();
if (unlink(okname) < 0
&& errno != ENOENT) {
age = -1;
@ -243,7 +243,7 @@ static long kerb_end_update(db_name, age)
int retval = 0;
char *new_okname = gen_dbsuffix(db_name, ".ok#");
char *okname = gen_dbsuffix(db_name, ".ok");
fd = open (new_okname, O_CREAT|O_RDWR|O_TRUNC, 0600);
if (fd < 0)
retval = errno;
@ -355,7 +355,7 @@ kerb_db_rename(from, to)
char *fromok = gen_dbsuffix(from, ".ok");
long trans = kerb_start_update(to);
int ok;
#ifndef __FreeBSD__
if ((rename (fromdir, todir) == 0)
&& (rename (frompag, topag) == 0)) {
@ -384,7 +384,7 @@ kerb_db_rename(from, to)
/*
* look up a principal in the data base returns number of principals
* found , and whether there were more than requested.
* found , and whether there were more than requested.
*/
kerb_db_get_principal(name, inst, principal, max, more)
@ -627,7 +627,7 @@ delta_stat(a, b, c)
/*
* look up a dba in the data base returns number of dbas found , and
* whether there were more than requested.
* whether there were more than requested.
*/
kerb_db_get_dba(dba_name, dba_inst, dba, max, more)
@ -650,7 +650,7 @@ kerb_db_iterate (func, arg)
Principal *principal;
int code;
DBM *db;
kerb_db_init(); /* initialize and open the database */
if ((code = kerb_dbl_lock(KERB_DBL_SHARED)) != 0)
return code;
@ -701,7 +701,7 @@ static int kerb_dbl_lock(mode)
int mode;
{
int flock_mode;
if (!inited)
kerb_dbl_init();
if (mylock) { /* Detect lock call when lock already
@ -723,8 +723,8 @@ static int kerb_dbl_lock(mode)
}
if (non_blocking)
flock_mode |= LOCK_NB;
if (flock(dblfd, flock_mode) < 0)
if (flock(dblfd, flock_mode) < 0)
return errno;
mylock++;
return 0;

View file

@ -10,12 +10,12 @@
* Jon Rochlis, MIT Telecom, March 1988
*
* from: krb_kdb_utils.c,v 4.1 89/07/26 11:01:12 jtkohl Exp $
* $Id: krb_kdb_utils.c,v 1.2 1994/07/19 19:23:38 g89r4222 Exp $
* $Id: krb_kdb_utils.c,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: krb_kdb_utils.c,v 1.2 1994/07/19 19:23:38 g89r4222 Exp $";
"$Id: krb_kdb_utils.c,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $";
#endif lint
#include <des.h>
@ -79,7 +79,7 @@ long kdb_verify_master_key (master_key, master_key_sched, out)
n = kerb_get_principal(KERB_M_NAME, KERB_M_INST, principal_data,
1 /* only one please */, &more);
if ((n != 1) || more) {
if (out != (FILE *) NULL)
if (out != (FILE *) NULL)
fprintf(out,
"verify_master_key: %s, %d found.\n",
"Kerberos error on master key version lookup",
@ -96,11 +96,11 @@ long kdb_verify_master_key (master_key, master_key_sched, out)
/*
* now use the master key to decrypt the key in the db, had better
* be the same!
* be the same!
*/
bcopy(&principal_data[0].key_low, key_from_db, 4);
bcopy(&principal_data[0].key_high, ((long *) key_from_db) + 1, 4);
kdb_encrypt_key (key_from_db, key_from_db,
kdb_encrypt_key (key_from_db, key_from_db,
master_key, master_key_sched, DECRYPT);
/* the decrypted database key had better equal the master key */

View file

@ -1,16 +1,16 @@
/*
* $Source: /home/CVS/src/eBones/kdb/krb_lib.c,v $
* $Author: g89r4222 $
* $Source: /home/ncvs/src/eBones/kdb/krb_lib.c,v $
* $Author: csgr $
*
* Copyright 1988 by the Massachusetts Institute of Technology.
* Copyright 1988 by the Massachusetts Institute of Technology.
*
* For copying and distribution information, please see the file
* <mit-copyright.h>.
* <mit-copyright.h>.
*/
#ifndef lint
static char rcsid[] =
"$Id: krb_lib.c,v 1.2 1994/07/19 19:23:39 g89r4222 Exp $";
"$Id: krb_lib.c,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $";
#endif lint
#include <stdio.h>
@ -37,7 +37,7 @@ extern char *getenv();
static init = 0;
/*
* initialization routine for data base
* initialization routine for data base
*/
int
@ -64,7 +64,7 @@ kerb_init()
/*
* finalization routine for database -- NOTE: MUST be called by any
* program using kerb_init. ALSO will have to be modified to finalize
* caches, if they're ever really implemented.
* caches, if they're ever really implemented.
*/
int
@ -75,7 +75,7 @@ kerb_fini()
/*
* look up a principal in the cache or data base returns number of
* principals found
* principals found
*/
int
@ -99,10 +99,10 @@ kerb_get_principal(name, inst, principal, max, more)
fprintf(stderr, "\n%s: kerb_get_principal for %s %s max = %d\n",
progname, name, inst, max);
#endif
/*
* if this is a request including a wild card, have to go to db
* since the cache may not be exhaustive.
* since the cache may not be exhaustive.
*/
/* clear the principal area */
@ -111,7 +111,7 @@ kerb_get_principal(name, inst, principal, max, more)
#ifdef CACHE
/*
* so check to see if the name contains a wildcard "*" or "?", not
* preceeded by a backslash.
* preceeded by a backslash.
*/
wild = 0;
if (index(name, '*') || index(name, '?') ||
@ -206,7 +206,7 @@ kerb_get_dba(name, inst, dba, max, more)
#endif
/*
* if this is a request including a wild card, have to go to db
* since the cache may not be exhaustive.
* since the cache may not be exhaustive.
*/
/* clear the dba area */
@ -215,7 +215,7 @@ kerb_get_dba(name, inst, dba, max, more)
#ifdef CACHE
/*
* so check to see if the name contains a wildcard "*" or "?", not
* preceeded by a backslash.
* preceeded by a backslash.
*/
wild = 0;

View file

@ -1,15 +1,15 @@
/*
* Copyright 1988 by the Massachusetts Institute of Technology.
* Copyright 1988 by the Massachusetts Institute of Technology.
* For copying and distribution information, please see the file
* <Copyright.MIT>.
* <Copyright.MIT>.
*
* from: $Header: /home/CVS/src/eBones/kdb/print_princ.c,v 1.2 1994/07/19 19:23:41 g89r4222 Exp $
* $Id: print_princ.c,v 1.2 1994/07/19 19:23:41 g89r4222 Exp $
* from: $Header: /home/ncvs/src/eBones/kdb/print_princ.c,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $
* $Id: print_princ.c,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: print_princ.c,v 1.2 1994/07/19 19:23:41 g89r4222 Exp $";
"$Id: print_princ.c,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $";
#endif lint
#include <stdio.h>

View file

@ -5,12 +5,12 @@
* <Copyright.MIT>.
*
* from: create_auth_reply.c,v 4.10 89/01/13 17:47:38 steiner Exp $
* $Id: create_auth_reply.c,v 1.2 1994/07/19 19:24:56 g89r4222 Exp $
* $Id: create_auth_reply.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $
*/
#ifndef lint
static char *rcsid =
"$Id: create_auth_reply.c,v 1.2 1994/07/19 19:24:56 g89r4222 Exp $";
"$Id: create_auth_reply.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $";
#endif /* lint */
#include <krb.h>
@ -30,34 +30,34 @@ static char *rcsid =
* must copy it elsewhere.
*
* The packet is built in the following format:
*
*
* variable
* type or constant data
* ---- ----------- ----
*
*
* unsigned char KRB_PROT_VERSION protocol version number
*
*
* unsigned char AUTH_MSG_KDC_REPLY protocol message type
*
*
* [least significant HOST_BYTE_ORDER sender's (server's) byte
* bit of above field] order
*
*
* string pname principal's name
*
*
* string pinst principal's instance
*
*
* string prealm principal's realm
*
*
* unsigned long time_ws client's timestamp
*
*
* unsigned char n number of tickets
*
*
* unsigned long x_date expiration date
*
*
* unsigned char kvno master key version
*
*
* short w_1 cipher length
*
*
* --- cipher->dat cipher data
*/

View file

@ -5,12 +5,12 @@
* <Copyright.MIT>.
*
* from: create_ciph.c,v 4.8 89/05/18 21:24:26 jis Exp $
* $Id: create_ciph.c,v 1.2 1994/07/19 19:24:58 g89r4222 Exp $
* $Id: create_ciph.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $
*/
#ifndef lint
static char *rcsid =
"$Id: create_ciph.c,v 1.2 1994/07/19 19:24:58 g89r4222 Exp $";
"$Id: create_ciph.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $";
#endif /* lint */
#include <krb.h>
@ -30,24 +30,24 @@ static char *rcsid =
* variable
* type or constant data
* ---- ----------- ----
*
*
*
*
* 8 bytes session session key for client, service
*
*
* string service service name
*
*
* string instance service instance
*
*
* string realm KDC realm
*
*
* unsigned char life ticket lifetime
*
*
* unsigned char kvno service key version number
*
*
* unsigned char tkt->length length of following ticket
*
*
* data tkt->dat ticket for service
*
*
* 4 bytes kdc_time KDC's timestamp
*
* <=7 bytes null null pad to 8 byte multiple

View file

@ -5,12 +5,12 @@
* <Copyright.MIT>.
*
* from: create_death_packet.c,v 4.9 89/01/17 16:05:59 rfrench Exp $
* $Id: create_death_packet.c,v 1.2 1994/07/19 19:24:59 g89r4222 Exp $
* $Id: create_death_packet.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $
*/
#ifndef lint
static char *rcsid =
"$Id: create_death_packet.c,v 1.2 1994/07/19 19:24:59 g89r4222 Exp $";
"$Id: create_death_packet.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $";
#endif /* lint */
#include <krb.h>
@ -32,12 +32,12 @@ static char *rcsid =
* ---- ----------- ----
*
* unsigned char KRB_PROT_VERSION protocol version number
*
*
* unsigned char AUTH_MSG_DIE message type
*
*
* [least significant HOST_BYTE_ORDER byte order of sender
* bit of above field]
*
*
* string a_name presumably, name of
* principal sending killer
* packet

View file

@ -1,16 +1,16 @@
/*
/*
* Copyright 1985, 1986, 1987, 1988 by the Massachusetts Institute
* of Technology.
* For copying and distribution information, please see the file
* <Copyright.MIT>.
*
* from: create_ticket.c,v 4.11 89/03/22 14:43:23 jtkohl Exp $
* $Id: create_ticket.c,v 1.2 1994/07/19 19:25:01 g89r4222 Exp $
* $Id: create_ticket.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: create_ticket.c,v 1.2 1994/07/19 19:25:01 g89r4222 Exp $";
"$Id: create_ticket.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $";
#endif /* lint */
#include <stdio.h>
@ -35,35 +35,35 @@ static char rcsid[] =
* corresponding changes should also be made to that file.
*
* The packet is built in the following format:
*
*
* variable
* type or constant data
* ---- ----------- ----
*
* tkt->length length of ticket (multiple of 8 bytes)
*
*
* tkt->dat:
*
*
* unsigned char flags namely, HOST_BYTE_ORDER
*
*
* string pname client's name
*
*
* string pinstance client's instance
*
*
* string prealm client's realm
*
*
* 4 bytes paddress client's address
*
*
* 8 bytes session session key
*
*
* 1 byte life ticket lifetime
*
*
* 4 bytes time_sec KDC timestamp
*
*
* string sname service's name
*
*
* string sinstance service's instance
*
*
* <=7 bytes null null pad to 8 byte multiple
*
*/

View file

@ -11,7 +11,7 @@
* are met:
* 1. Redistributions of source code must retain the entire comment,
* including the above copyright notice, this list of conditions
* and the following disclaimer, verbatim, at the beginning of
* and the following disclaimer, verbatim, at the beginning of
* the source file.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
@ -35,7 +35,7 @@
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
* $Id: des_rw.c,v 1.5 1994/09/24 18:54:41 g89r4222 Exp $
* $Id: des_rw.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $
*/
/*
@ -61,11 +61,11 @@
* +--+--+--+--+--+--+--+--+
* | garbage | data |
* | |
* +-----------------------+----> des_pcbc_encrypt() -->
* +-----------------------+----> des_pcbc_encrypt() -->
*
* (Note that the length field sent before the actual message specifies
* the number of data bytes, not the length of the entire padded message.
*
*
* When data is read, if the message received is longer than the number
* of bytes requested, then the remaining bytes are stored until the
* following call to des_read(). If the number of bytes received is
@ -160,7 +160,7 @@ int des_read(fd, buf, len)
stored -= len;
buff_ptr += len;
return(len);
} else {
} else {
if (stored) {
bcopy(buff_ptr, buf, stored);
nreturned = stored;
@ -184,11 +184,11 @@ int des_read(fd, buf, len)
if(nread != pad_length)
return(0);
des_pcbc_encrypt((des_cblock*) des_buff, (des_cblock*) buff_ptr,
des_pcbc_encrypt((des_cblock*) des_buff, (des_cblock*) buff_ptr,
(msg_length < 8 ? 8 : msg_length),
key_sched, (des_cblock*) &des_key, DES_DECRYPT);
if(msg_length < 8)
buff_ptr += (8 - msg_length);
stored = msg_length;
@ -237,7 +237,7 @@ int des_write(fd, buf, len)
for(i = 0 ; i < 8 ; i+= sizeof(long)) {
rnd = random();
bcopy(&rnd, garbage+i,
bcopy(&rnd, garbage+i,
(i <= (8 - sizeof(long)))?sizeof(long):(8-i));
}
bcopy(buf, garbage + 8 - len, len);
@ -253,7 +253,7 @@ int des_write(fd, buf, len)
write_len = htonl(len);
if(write(fd, &write_len, sizeof(write_len)) != sizeof(write_len))
if(write(fd, &write_len, sizeof(write_len)) != sizeof(write_len))
return(-1);
if(write(fd, des_buff, pad_len) != pad_len)
return(-1);

View file

@ -5,12 +5,12 @@
* <Copyright.MIT>.
*
* from: dest_tkt.c,v 4.9 89/10/02 16:23:07 jtkohl Exp $
* $Id: dest_tkt.c,v 1.2 1994/07/19 19:25:07 g89r4222 Exp $
* $Id: dest_tkt.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $
*/
#ifndef lint
static char *rcsid =
"$Id: dest_tkt.c,v 1.2 1994/07/19 19:25:07 g89r4222 Exp $";
"$Id: dest_tkt.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $";
#endif /* lint */
#include <stdio.h>
@ -75,8 +75,8 @@ dest_tkt()
if (errno == ENOENT) return RET_TKFIL;
else if (errno != 0) return KFAILURE;
#ifdef TKT_SHMEM
/*
* handle the shared memory case
/*
* handle the shared memory case
*/
(void) strcpy(shmidname, file);
(void) strcat(shmidname, ".shm");

View file

@ -1,15 +1,15 @@
/*
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
* For copying and distribution information, please see the file
* <Copyright.MIT>.
* <Copyright.MIT>.
*
* from: fgetst.c,v 4.0 89/01/23 10:08:31 jtkohl Exp $
* $Id: fgetst.c,v 1.2 1994/07/19 19:25:10 g89r4222 Exp $
* $Id: fgetst.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: fgetst.c,v 1.2 1994/07/19 19:25:10 g89r4222 Exp $";
"$Id: fgetst.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $";
#endif /* lint */
#include <stdio.h>
@ -20,7 +20,7 @@ static char rcsid[] =
* until it reads a null byte. When finished, what has been read exists
* in "s". If "count" characters were actually read, the last is changed
* to a null, so the returned string is always null-terminated. fgetst
* returns the number of characters read, including the null terminator.
* returns the number of characters read, including the null terminator.
*/
fgetst(f, s, n)

View file

@ -5,12 +5,12 @@
* <Copyright.MIT>.
*
* from: get_ad_tkt.c,v 4.15 89/07/07 15:18:51 jtkohl Exp $
* $Id: get_ad_tkt.c,v 1.2 1994/07/19 19:25:11 g89r4222 Exp $
* $Id: get_ad_tkt.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: get_ad_tkt.c,v 1.2 1994/07/19 19:25:11 g89r4222 Exp $";
"$Id: get_ad_tkt.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $";
#endif /* lint */
#include <krb.h>
@ -55,7 +55,7 @@ unsigned long rep_err_code;
*
* TEXT original contents of authenticator+ticket
* pkt->dat built in krb_mk_req call
*
*
* 4 bytes time_ws always 0 (?)
* char lifetime lifetime argument passed
* string service service name argument
@ -106,12 +106,12 @@ get_ad_tkt(service,sinstance,realm,lifetime)
/*
* Look for the session key (and other stuff we don't need)
* in the ticket file for krbtgt.realm@lrealm where "realm"
* is the service's realm (passed in "realm" argument) and
* lrealm is the realm of our initial ticket. If we don't
* in the ticket file for krbtgt.realm@lrealm where "realm"
* is the service's realm (passed in "realm" argument) and
* lrealm is the realm of our initial ticket. If we don't
* have this, we will try to get it.
*/
if ((kerror = krb_get_cred("krbtgt",realm,lrealm,&cr)) != KSUCCESS) {
/*
* If realm == lrealm, we have no hope, so let's not even try.
@ -119,20 +119,20 @@ get_ad_tkt(service,sinstance,realm,lifetime)
if ((strncmp(realm, lrealm, REALM_SZ)) == 0)
return(AD_NOTGT);
else{
if ((kerror =
if ((kerror =
get_ad_tkt("krbtgt",realm,lrealm,lifetime)) != KSUCCESS)
return(kerror);
if ((kerror = krb_get_cred("krbtgt",realm,lrealm,&cr)) != KSUCCESS)
return(kerror);
}
}
/*
* Make up a request packet to the "krbtgt.realm@lrealm".
* Start by calling krb_mk_req() which puts ticket+authenticator
* into "pkt". Then tack other stuff on the end.
*/
kerror = krb_mk_req(pkt,"krbtgt",realm,lrealm,0L);
if (kerror)

View file

@ -5,12 +5,12 @@
* <Copyright.MIT>.
*
* from: get_cred.c,v 4.10 89/05/31 17:46:22 jtkohl Exp $
* $Id: get_cred.c,v 1.2 1994/07/19 19:25:14 g89r4222 Exp $
* $Id: get_cred.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $
*/
#ifndef lint
static char *rcsid =
"$Id: get_cred.c,v 1.2 1994/07/19 19:25:14 g89r4222 Exp $";
"$Id: get_cred.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $";
#endif /* lint */
#include <stdio.h>
@ -44,7 +44,7 @@ krb_get_cred(service,instance,realm,c)
return (tf_status);
/* Search for requested service credentials and copy into c */
while ((tf_status = tf_get_cred(c)) == KSUCCESS) {
/* Is this the right ticket? */
if ((strcmp(c->service,service) == 0) &&

View file

@ -4,12 +4,12 @@
* <Copyright.MIT>.
*
* from: get_in_tkt.c,v 4.12 89/07/18 16:32:56 jtkohl Exp $
* $Id: get_in_tkt.c,v 1.2 1994/07/19 19:25:16 g89r4222 Exp $
* $Id: get_in_tkt.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: get_in_tkt.c,v 1.2 1994/07/19 19:25:16 g89r4222 Exp $";
"$Id: get_in_tkt.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $";
#endif /* lint */
#include <krb.h>
@ -69,7 +69,7 @@ static int passwd_to_key(user,instance,realm,passwd,key)
* krb_get_pw_in_tkt() passes two additional arguments to krb_get_in_tkt():
* the name of a routine (passwd_to_key()) to be used to get the
* password in case the "password" argument is null and NULL for the
* decryption procedure indicating that krb_get_in_tkt should use the
* decryption procedure indicating that krb_get_in_tkt should use the
* default method of decrypting the response from the KDC.
*
* The result of the call to krb_get_in_tkt() is returned.
@ -86,8 +86,8 @@ krb_get_pw_in_tkt(user,instance,realm,service,sinstance,life,password)
#ifdef NOENCRYPTION
/*
* $Source: /home/CVS/src/eBones/krb/get_in_tkt.c,v $
* $Author: g89r4222 $
* $Source: /home/ncvs/src/eBones/krb/get_in_tkt.c,v $
* $Author: csgr $
*
* Copyright 1985, 1986, 1987, 1988 by the Massachusetts Institute
* of Technology.
@ -102,7 +102,7 @@ krb_get_pw_in_tkt(user,instance,realm,service,sinstance,life,password)
#ifndef lint
static char rcsid_read_password_c[] =
"Bones$Header: /home/CVS/src/eBones/krb/get_in_tkt.c,v 1.2 1994/07/19 19:25:16 g89r4222 Exp $";
"Bones$Header: /home/ncvs/src/eBones/krb/get_in_tkt.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $";
#endif lint
#include <des.h>
@ -170,7 +170,7 @@ placebo_read_pw_string(s,max,prompt,verify)
{
int ok = 0;
char *ptr;
#ifdef BSDUNIX
jmp_buf old_env;
struct sgttyb tty_state;
@ -187,7 +187,7 @@ placebo_read_pw_string(s,max,prompt,verify)
goto lose;
/* save terminal state*/
if (ioctl(0,TIOCGETP,&tty_state) == -1)
if (ioctl(0,TIOCGETP,&tty_state) == -1)
return -1;
push_signals();

View file

@ -5,12 +5,12 @@
* <Copyright.MIT>.
*
* from: get_krbhst.c,v 4.8 89/01/22 20:00:29 rfrench Exp $
* $Id: get_krbhst.c,v 1.2 1994/07/19 19:25:17 g89r4222 Exp $
* $Id: get_krbhst.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $
*/
#ifndef lint
static char *rcsid =
"$Id: get_krbhst.c,v 1.2 1994/07/19 19:25:17 g89r4222 Exp $";
"$Id: get_krbhst.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $";
#endif /* lint */
#include <stdio.h>
@ -33,7 +33,7 @@ static char *rcsid =
*
* The KRB_CONF file contains the name of the local realm in the first
* line (not used by this routine), followed by lines indicating realm/host
* entries. The words "admin server" following the hostname indicate that
* entries. The words "admin server" following the hostname indicate that
* the host provides an administrative database server.
*
* For example:

View file

@ -4,12 +4,12 @@
* <Copyright.MIT>.
*
* from: get_svc_in_tkt.c,v 4.9 89/07/18 16:33:34 jtkohl Exp $
* $Id: get_svc_in_tkt.c,v 1.2 1994/07/19 19:25:26 g89r4222 Exp $
* $Id: get_svc_in_tkt.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: get_svc_in_tkt.c,v 1.2 1994/07/19 19:25:26 g89r4222 Exp $";
"$Id: get_svc_in_tkt.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $";
#endif /* lint */
#include <krb.h>
@ -57,7 +57,7 @@ static int srvtab_to_key(user, instance, realm, srvtab, key)
* krb_get_svc_in_tkt() passes its arguments on to krb_get_in_tkt(),
* plus two additional arguments: a pointer to the srvtab_to_key()
* function to be used to get the key from the key file and a NULL
* for the decryption procedure indicating that krb_get_in_tkt should
* for the decryption procedure indicating that krb_get_in_tkt should
* use the default method of decrypting the response from the KDC.
*
* It returns the return value of the krb_get_in_tkt() call.

View file

@ -4,12 +4,12 @@
* <Copyright.MIT>.
*
* from: get_tf_fullname.c,v 4.3 90/03/10 22:40:20 jon Exp $
* $Id: get_tf_fullname.c,v 1.2 1994/07/19 19:25:28 g89r4222 Exp $
* $Id: get_tf_fullname.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: get_tf_fullname.c,v 1.2 1994/07/19 19:25:28 g89r4222 Exp $";
"$Id: get_tf_fullname.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $";
#endif /* lint */
#include <krb.h>
@ -22,10 +22,10 @@ static char rcsid[] =
*/
/*
* krb_get_tf_fullname() takes four arguments: the name of the
* krb_get_tf_fullname() takes four arguments: the name of the
* ticket file, and variables for name, instance, and realm to be
* returned in. Since the realm of a ticket file is not really fully
* supported, the realm used will be that of the the first ticket in
* returned in. Since the realm of a ticket file is not really fully
* supported, the realm used will be that of the the first ticket in
* the file as this is the one that was obtained with a password by
* krb_get_in_tkt().
*/
@ -45,7 +45,7 @@ krb_get_tf_fullname(ticket_file, name, instance, realm)
if (((tf_status = tf_get_pname(c.pname)) != KSUCCESS) ||
((tf_status = tf_get_pinst(c.pinst)) != KSUCCESS))
return (tf_status);
if (name)
strcpy(name, c.pname);
if (instance)
@ -59,8 +59,8 @@ krb_get_tf_fullname(ticket_file, name, instance, realm)
return(KFAILURE);
else
return(tf_status);
}
}
(void) tf_close();
return(tf_status);
}

View file

@ -4,12 +4,12 @@
* <Copyright.MIT>.
*
* from: get_tf_realm.c,v 4.2 90/01/02 13:40:19 jtkohl Exp $
* $Id: get_tf_realm.c,v 1.2 1994/07/19 19:25:30 g89r4222 Exp $
* $Id: get_tf_realm.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $
*/
#ifndef lint
static char rcsid[] =
"$Id: get_tf_realm.c,v 1.2 1994/07/19 19:25:30 g89r4222 Exp $";
"$Id: get_tf_realm.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $";
#endif /* lint */
#include <krb.h>
@ -21,9 +21,9 @@ static char rcsid[] =
*/
/*
* krb_get_tf_realm() takes two arguments: the name of a ticket
* krb_get_tf_realm() takes two arguments: the name of a ticket
* and a variable to store the name of the realm in.
*
*
*/
krb_get_tf_realm(ticket_file, realm)

Some files were not shown because too many files have changed in this diff Show more