mirror of
https://github.com/freebsd/freebsd-src
synced 2024-07-22 10:48:02 +00:00
Remove trailing whitespace.
This commit is contained in:
parent
5ebc7e6281
commit
7799f52a32
Notes:
svn2git
2020-12-20 02:59:44 +00:00
svn path=/head/; revision=8874
|
@ -125,7 +125,7 @@ main(argc, argv)
|
|||
}
|
||||
|
||||
if ((ftsp = fts_open(++argv, fts_options , 0)) == NULL)
|
||||
err(1, NULL);
|
||||
err(1, NULL);
|
||||
|
||||
for (rval = 0; (p = fts_read(ftsp)) != NULL;) {
|
||||
switch (p->fts_info) {
|
||||
|
|
|
@ -6,12 +6,12 @@
|
|||
* <mit-copyright.h>.
|
||||
*
|
||||
* from: acl_files.c,v 4.4 89/12/19 13:30:53 jtkohl Exp $
|
||||
* $Id: acl_files.c,v 1.2 1994/07/19 19:21:18 g89r4222 Exp $
|
||||
* $Id: acl_files.c,v 1.1.1.1 1994/09/30 14:49:48 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: acl_files.c,v 1.2 1994/07/19 19:21:18 g89r4222 Exp $";
|
||||
"$Id: acl_files.c,v 1.1.1.1 1994/09/30 14:49:48 csgr Exp $";
|
||||
#endif lint
|
||||
|
||||
|
||||
|
@ -86,7 +86,7 @@ char *canon;
|
|||
dot = NULL;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
/* No such luck */
|
||||
end = principal + strlen(principal);
|
||||
|
||||
|
@ -121,7 +121,7 @@ char *canon;
|
|||
strcpy(canon, KRB_REALM);
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
/* Get a lock to modify acl_file */
|
||||
/* Return new FILE pointer */
|
||||
/* or NULL if file cannot be modified */
|
||||
|
@ -176,7 +176,7 @@ char *acl_file;
|
|||
/* Closes f */
|
||||
static int acl_commit(acl_file, f)
|
||||
char *acl_file;
|
||||
FILE *f;
|
||||
FILE *f;
|
||||
{
|
||||
char new[LINESIZE];
|
||||
int ret;
|
||||
|
@ -203,7 +203,7 @@ FILE *f;
|
|||
static int
|
||||
acl_abort(acl_file, f)
|
||||
char *acl_file;
|
||||
FILE *f;
|
||||
FILE *f;
|
||||
{
|
||||
char new[LINESIZE];
|
||||
int ret;
|
||||
|
@ -471,7 +471,7 @@ char *principal;
|
|||
|
||||
sprintf(buf, "*.*%s", realm);
|
||||
if(acl_exact_match(acl, buf) || acl_exact_match(acl, "*.*@*")) return(1);
|
||||
|
||||
|
||||
return(0);
|
||||
}
|
||||
|
||||
|
|
|
@ -1,10 +1,10 @@
|
|||
# @(#)Makefile 5.4 (Berkeley) 5/7/91
|
||||
# $Id: Makefile,v 1.4 1994/09/09 21:43:30 g89r4222 Exp $
|
||||
# $Id: Makefile,v 1.1.1.1 1994/09/30 14:49:50 csgr Exp $
|
||||
|
||||
LIB= des
|
||||
SRCS= cbc_cksm.c cbc_enc.c ecb_enc.c enc_read.c enc_writ.c pcbc_enc.c \
|
||||
qud_cksm.c rand_key.c read_pwd.c set_key.c str2key.c \
|
||||
cfb_enc.c 3ecb_enc.c ofb_enc.c 3cbc_enc.c
|
||||
cfb_enc.c 3ecb_enc.c ofb_enc.c 3cbc_enc.c
|
||||
#MAN1= des.1
|
||||
#MAN3= des.3
|
||||
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
/* Copyright (C) 1993 Eric Young - see README for more details */
|
||||
|
||||
/*-
|
||||
* $Id: cbc_cksm.c,v 1.2 1994/07/19 19:21:45 g89r4222 Exp $
|
||||
* $Id: cbc_cksm.c,v 1.1.1.1 1994/09/30 14:49:50 csgr Exp $
|
||||
*/
|
||||
|
||||
#include "des_locl.h"
|
||||
|
@ -34,7 +34,7 @@ des_cblock *ivec;
|
|||
}
|
||||
else
|
||||
c2ln(in,tin0,tin1,l);
|
||||
|
||||
|
||||
tin0^=tout0;
|
||||
tin1^=tout1;
|
||||
tin[0]=tin0;
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
/* Copyright (C) 1993 Eric Young - see README for more details */
|
||||
|
||||
/*-
|
||||
* $Id: enc_read.c,v 1.2 1994/07/19 19:21:54 g89r4222 Exp $
|
||||
* $Id: enc_read.c,v 1.1.1.1 1994/09/30 14:49:50 csgr Exp $
|
||||
*/
|
||||
|
||||
#include <errno.h>
|
||||
|
@ -22,7 +22,7 @@ des_cblock *iv;
|
|||
/* data to be unencrypted */
|
||||
int net_num=0;
|
||||
unsigned char net[BSIZE];
|
||||
/* extra unencrypted data
|
||||
/* extra unencrypted data
|
||||
* for when a block of 100 comes in but is des_read one byte at
|
||||
* a time. */
|
||||
static char unnet[BSIZE];
|
||||
|
@ -61,7 +61,7 @@ des_cblock *iv;
|
|||
|
||||
/* first - get the length */
|
||||
net_num=0;
|
||||
while (net_num < HDRSIZE)
|
||||
while (net_num < HDRSIZE)
|
||||
{
|
||||
i=read(fd,&(net[net_num]),HDRSIZE-net_num);
|
||||
if ((i == -1) && (errno == EINTR)) continue;
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
/* Copyright (C) 1993 Eric Young - see README for more details */
|
||||
|
||||
/*-
|
||||
* $Id: enc_writ.c,v 1.2 1994/07/19 19:21:56 g89r4222 Exp $
|
||||
* $Id: enc_writ.c,v 1.1.1.1 1994/09/30 14:49:50 csgr Exp $
|
||||
*/
|
||||
|
||||
#include <errno.h>
|
||||
|
@ -67,10 +67,10 @@ des_cblock *iv;
|
|||
|
||||
if (des_rw_mode & DES_PCBC_MODE)
|
||||
pcbc_encrypt((des_cblock *)p,(des_cblock *)&(outbuf[HDRSIZE]),
|
||||
(long)((len<8)?8:len),sched,iv,DES_ENCRYPT);
|
||||
(long)((len<8)?8:len),sched,iv,DES_ENCRYPT);
|
||||
else
|
||||
cbc_encrypt((des_cblock *)p,(des_cblock *)&(outbuf[HDRSIZE]),
|
||||
(long)((len<8)?8:len),sched,iv,DES_ENCRYPT);
|
||||
(long)((len<8)?8:len),sched,iv,DES_ENCRYPT);
|
||||
|
||||
/* output */
|
||||
outnum=rnum+HDRSIZE;
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
/* Copyright (C) 1993 Eric Young - see README for more details */
|
||||
|
||||
/*-
|
||||
* $Id: fcrypt.c,v 1.2 1994/07/19 19:21:58 g89r4222 Exp $
|
||||
* $Id: fcrypt.c,v 1.1.1.1 1994/09/30 14:49:51 csgr Exp $
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
|
@ -384,7 +384,7 @@ des_key_schedule schedule;
|
|||
/* table contained 0213 4657 */
|
||||
*(k++)=((t<<16)|(s&0x0000ffff))&0xffffffff;
|
||||
s= ((s>>16)|(t&0xffff0000));
|
||||
|
||||
|
||||
s=(s<<4)|(s>>28);
|
||||
*(k++)=s&0xffffffff;
|
||||
}
|
||||
|
@ -396,7 +396,7 @@ des_key_schedule schedule;
|
|||
******************************************************************/
|
||||
|
||||
/* The changes to this macro may help or hinder, depending on the
|
||||
* compiler and the achitecture. gcc2 always seems to do well :-).
|
||||
* compiler and the achitecture. gcc2 always seems to do well :-).
|
||||
* Inspired by Dana How <how@isl.stanford.edu>
|
||||
* DO NOT use the alternative version on machines with 8 byte longs.
|
||||
*/
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
/* Copyright (C) 1993 Eric Young - see README for more details */
|
||||
|
||||
/*-
|
||||
* $Id: qud_cksm.c,v 1.2 1994/07/19 19:22:02 g89r4222 Exp $
|
||||
* $Id: qud_cksm.c,v 1.1.1.1 1994/09/30 14:49:51 csgr Exp $
|
||||
*/
|
||||
|
||||
/* From "Message Authentication" R.R. Jueneman, S.M. Matyas, C.H. Meyer
|
||||
|
@ -62,7 +62,7 @@ des_cblock *seed;
|
|||
t1=z1;
|
||||
/* square, well sort of square */
|
||||
z0=((((t0*t0)&0xffffffff)+((t1*t1)&0xffffffff))
|
||||
&0xffffffff)%0x7fffffff;
|
||||
&0xffffffff)%0x7fffffff;
|
||||
z1=((t0*((t1+NOISE)&0xffffffff))&0xffffffff)%0x7fffffff;
|
||||
}
|
||||
if (lp != NULL)
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
/* 06-Apr-92 Luke Brennan Support for VMS */
|
||||
|
||||
/*-
|
||||
* $Id: read_pwd.c,v 1.1.1.1 1994/09/30 14:49:51 csgr Exp $
|
||||
* $Id: read_pwd.c,v 1.2 1995/01/25 02:27:00 ache Exp $
|
||||
*/
|
||||
|
||||
#include "des_locl.h"
|
||||
|
@ -249,7 +249,7 @@ int verify;
|
|||
if ((p=(char *)index(buff,'\n')) != NULL)
|
||||
*p='\0';
|
||||
else read_till_nl(tty);
|
||||
|
||||
|
||||
if (strcmp(buf,buff) != 0)
|
||||
{
|
||||
fprintf(stderr,"\nVerify failure - try again\n");
|
||||
|
@ -272,7 +272,7 @@ int verify;
|
|||
status = SYS$QIOW(0,channel,IO$_SETMODE,&iosb,0,0
|
||||
,tty_orig,12,0,0,0,0);
|
||||
#endif /* VMS */
|
||||
|
||||
|
||||
if (ps >= 1) popsig();
|
||||
if (stdin != tty) fclose(tty);
|
||||
#ifdef VMS
|
||||
|
|
|
@ -9,7 +9,7 @@
|
|||
*/
|
||||
|
||||
/*-
|
||||
* $Id: set_key.c,v 1.2 1994/07/19 19:22:07 g89r4222 Exp $
|
||||
* $Id: set_key.c,v 1.1.1.1 1994/09/30 14:49:51 csgr Exp $
|
||||
*/
|
||||
|
||||
#include "des_locl.h"
|
||||
|
@ -87,7 +87,7 @@ des_cblock *key;
|
|||
}
|
||||
|
||||
/* NOW DEFINED IN des_local.h
|
||||
* See ecb_encrypt.c for a pseudo description of these macros.
|
||||
* See ecb_encrypt.c for a pseudo description of these macros.
|
||||
* #define PERM_OP(a,b,t,n,m) ((t)=((((a)>>(n))^(b))&(m)),\
|
||||
* (b)^=(t),\
|
||||
* (a)=((a)^((t)<<(n))))
|
||||
|
@ -126,7 +126,7 @@ des_key_schedule schedule;
|
|||
c2l(in,c);
|
||||
c2l(in,d);
|
||||
|
||||
/* do PC1 in 60 simple operations */
|
||||
/* do PC1 in 60 simple operations */
|
||||
/* PERM_OP(d,c,t,4,0x0f0f0f0f);
|
||||
HPERM_OP(c,t,-2, 0xcccc0000);
|
||||
HPERM_OP(c,t,-1, 0xaaaa0000);
|
||||
|
@ -175,7 +175,7 @@ des_key_schedule schedule;
|
|||
/* table contained 0213 4657 */
|
||||
*(k++)=((t<<16)|(s&0x0000ffff))&0xffffffff;
|
||||
s= ((s>>16)|(t&0xffff0000));
|
||||
|
||||
|
||||
s=(s<<4)|(s>>28);
|
||||
*(k++)=s&0xffffffff;
|
||||
}
|
||||
|
|
|
@ -362,4 +362,4 @@ unsigned char *p;
|
|||
ret[16]='\0';
|
||||
return(ret);
|
||||
}
|
||||
|
||||
|
||||
|
|
|
@ -1,13 +1,13 @@
|
|||
/*
|
||||
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
|
||||
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
|
||||
*
|
||||
* from: ext_srvtab.c,v 4.1 89/07/18 16:49:30 jtkohl Exp $
|
||||
* $Id: ext_srvtab.c,v 1.2 1994/07/19 19:22:36 g89r4222 Exp $
|
||||
* $Id: ext_srvtab.c,v 1.1.1.1 1994/09/30 14:49:53 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: ext_srvtab.c,v 1.2 1994/07/19 19:22:36 g89r4222 Exp $";
|
||||
"$Id: ext_srvtab.c,v 1.1.1.1 1994/09/30 14:49:53 csgr Exp $";
|
||||
#endif lint
|
||||
|
||||
#include <stdio.h>
|
||||
|
@ -39,12 +39,12 @@ main(argc, argv)
|
|||
int fopen_errs = 0;
|
||||
int arg;
|
||||
Principal princs[40];
|
||||
int more;
|
||||
int more;
|
||||
int prompt = TRUE;
|
||||
register int n, i;
|
||||
|
||||
|
||||
bzero(realm, sizeof(realm));
|
||||
|
||||
|
||||
/* Parse commandline arguments */
|
||||
if (argc < 2)
|
||||
usage();
|
||||
|
@ -57,7 +57,7 @@ main(argc, argv)
|
|||
usage();
|
||||
else {
|
||||
strcpy(realm, argv[i]);
|
||||
/*
|
||||
/*
|
||||
* This is to humor the broken way commandline
|
||||
* argument parsing is done. Later, this
|
||||
* program ignores everything that starts with -.
|
||||
|
@ -118,7 +118,7 @@ main(argc, argv)
|
|||
bcopy(&princs[i].key_low, session_key, sizeof(long));
|
||||
bcopy(&princs[i].key_high, session_key + sizeof(long),
|
||||
sizeof(long));
|
||||
kdb_encrypt_key (session_key, session_key,
|
||||
kdb_encrypt_key (session_key, session_key,
|
||||
master_key, master_key_schedule, DES_DECRYPT);
|
||||
FWrite(session_key, sizeof session_key, 1, fout);
|
||||
}
|
||||
|
@ -158,7 +158,7 @@ StampOutSecrets()
|
|||
|
||||
usage()
|
||||
{
|
||||
fprintf(stderr,
|
||||
fprintf(stderr,
|
||||
"Usage: %s [-n] [-r realm] instance [instance ...]\n", progname);
|
||||
exit(1);
|
||||
}
|
||||
|
|
|
@ -1,12 +1,12 @@
|
|||
/*
|
||||
* Copyright 1987, 1988, 1989 by the Massachusetts Institute of Technology.
|
||||
* Copyright 1987, 1988, 1989 by the Massachusetts Institute of Technology.
|
||||
* For copying and distribution information, please see the file
|
||||
* <Copyright.MIT>.
|
||||
*
|
||||
* Include file for address comparison macros.
|
||||
*
|
||||
* from: addr_comp.h,v 4.0 89/01/23 09:57:44 jtkohl Exp $
|
||||
* $Id: addr_comp.h,v 1.2 1994/07/19 19:22:44 g89r4222 Exp $
|
||||
* $Id: addr_comp.h,v 1.1.1.1 1994/09/30 14:49:53 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef ADDR_COMP_DEFS
|
||||
|
|
|
@ -1,12 +1,12 @@
|
|||
/*
|
||||
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
|
||||
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
|
||||
* For copying and distribution information, please see the file
|
||||
* <Copyright.MIT>.
|
||||
* <Copyright.MIT>.
|
||||
*
|
||||
* Include file for the Kerberos administration server.
|
||||
* Include file for the Kerberos administration server.
|
||||
*
|
||||
* from: admin_server.h,v 4.7 89/01/11 11:59:42 steiner Exp $
|
||||
* $Id: admin_server.h,v 1.2 1994/07/19 19:22:47 g89r4222 Exp $
|
||||
* $Id: admin_server.h,v 1.1.1.1 1994/09/30 14:49:53 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef ADMIN_SERVER_DEFS
|
||||
|
|
|
@ -4,7 +4,7 @@
|
|||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: conf-bsdapollo.h,v 4.1 89/01/24 14:26:22 jtkohl Exp $
|
||||
* $Id: conf-bsdapollo.h,v 1.2 1994/07/19 19:22:50 g89r4222 Exp $
|
||||
* $Id: conf-bsdapollo.h,v 1.1.1.1 1994/09/30 14:49:53 csgr Exp $
|
||||
*/
|
||||
|
||||
#define BSDUNIX
|
||||
|
@ -18,4 +18,4 @@
|
|||
*/
|
||||
#define const
|
||||
|
||||
|
||||
|
||||
|
|
|
@ -6,9 +6,9 @@
|
|||
* Machine-type definitions: DECstation 3100 (MIPS R2000)
|
||||
*
|
||||
* from: conf-ultmips2.h,v 4.0 89/01/23 09:58:32 jtkohl Exp $
|
||||
* $Id: conf-ultmips2.h,v 1.2 1994/07/19 19:23:03 g89r4222 Exp $
|
||||
* $Id: conf-ultmips2.h,v 1.1.1.1 1994/09/30 14:49:54 csgr Exp $
|
||||
*/
|
||||
|
||||
|
||||
#define MIPS2
|
||||
#define BITS32
|
||||
#define BIG
|
||||
|
|
|
@ -5,8 +5,8 @@
|
|||
*
|
||||
* Include file for the Data Encryption Standard library.
|
||||
*
|
||||
* from: des.h,v 4.11 89/01/17 16:24:57 rfrench Exp $
|
||||
* $Id: des.h,v 1.2 1994/07/19 19:23:06 g89r4222 Exp $
|
||||
* from: des.h,v 4.11 89/01/17 16:24:57 rfrench Exp $
|
||||
* $Id: des.h,v 1.1.1.1 1994/09/30 14:49:54 csgr Exp $
|
||||
*/
|
||||
|
||||
/* only do the whole thing once */
|
||||
|
|
|
@ -1,12 +1,12 @@
|
|||
/*
|
||||
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
|
||||
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
|
||||
* For copying and distribution information, please see the file
|
||||
* <Copyright.MIT>.
|
||||
* <Copyright.MIT>.
|
||||
*
|
||||
* Include file for the Kerberos Key Distribution Center.
|
||||
* Include file for the Kerberos Key Distribution Center.
|
||||
*
|
||||
* from: kdc.h,v 4.1 89/01/24 17:54:04 jon Exp $
|
||||
* $Id: kdc.h,v 1.2 1994/07/19 19:23:11 g89r4222 Exp $
|
||||
* $Id: kdc.h,v 1.1.1.1 1994/09/30 14:49:54 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef KDC_DEFS
|
||||
|
|
|
@ -4,10 +4,10 @@
|
|||
* <Copyright.MIT>.
|
||||
*
|
||||
* This file defines the types of log messages logged by klog. Each
|
||||
* type of message may be selectively turned on or off.
|
||||
* type of message may be selectively turned on or off.
|
||||
*
|
||||
* from: klog.h,v 4.7 89/01/24 17:55:07 jon Exp $
|
||||
* $Id: klog.h,v 1.2 1994/07/19 19:23:12 g89r4222 Exp $
|
||||
* $Id: klog.h,v 1.1.1.1 1994/09/30 14:49:54 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef KLOG_DEFS
|
||||
|
|
|
@ -6,14 +6,14 @@
|
|||
* Include file for kparse routines.
|
||||
*
|
||||
* from: kparse.h,v 4.5 89/01/11 12:05:53 steiner Exp $
|
||||
* $Id: kparse.h,v 1.2 1994/07/19 19:23:14 g89r4222 Exp $
|
||||
* $Id: kparse.h,v 1.1.1.1 1994/09/30 14:49:54 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef KPARSE_DEFS
|
||||
#define KPARSE_DEFS
|
||||
|
||||
/*
|
||||
* values returned by fGetParameterSet()
|
||||
* values returned by fGetParameterSet()
|
||||
*/
|
||||
|
||||
#define PS_BAD_KEYWORD -2 /* unknown or duplicate keyword */
|
||||
|
@ -22,7 +22,7 @@
|
|||
#define PS_EOF 1 /* nothing more in the file */
|
||||
|
||||
/*
|
||||
* values returned by fGetKeywordValue()
|
||||
* values returned by fGetKeywordValue()
|
||||
*/
|
||||
|
||||
#define KV_SYNTAX -2 /* syntax error */
|
||||
|
@ -31,7 +31,7 @@
|
|||
#define KV_EOL 1 /* nothing more on this line */
|
||||
|
||||
/*
|
||||
* values returned by fGetToken()
|
||||
* values returned by fGetToken()
|
||||
*/
|
||||
|
||||
#define GTOK_BAD_QSTRING -1 /* newline found in quoted string */
|
||||
|
@ -44,7 +44,7 @@
|
|||
#define GTOK_WHITE 5 /* one or more whitespace chars */
|
||||
|
||||
/*
|
||||
* extended character classification macros
|
||||
* extended character classification macros
|
||||
*/
|
||||
|
||||
#define ISOCTAL(CH) ( (CH>='0') && (CH<='7') )
|
||||
|
@ -54,14 +54,14 @@
|
|||
|
||||
/*
|
||||
* tokens consist of any printable charcacter except comma, equal, or
|
||||
* whitespace
|
||||
* whitespace
|
||||
*/
|
||||
|
||||
#define ISTOKENCHAR(C) ((C>040) && (C<0177) && (C != ',') && (C != '='))
|
||||
|
||||
/*
|
||||
* the parameter table defines the keywords that will be recognized by
|
||||
* fGetParameterSet, and their default values if not specified.
|
||||
* fGetParameterSet, and their default values if not specified.
|
||||
*/
|
||||
|
||||
typedef struct {
|
||||
|
|
|
@ -1,12 +1,12 @@
|
|||
/*
|
||||
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
|
||||
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
|
||||
* For copying and distribution information, please see the file
|
||||
* <Copyright.MIT>.
|
||||
* <Copyright.MIT>.
|
||||
*
|
||||
* Include file for the Kerberos library.
|
||||
* Include file for the Kerberos library.
|
||||
*
|
||||
* from: krb.h,v 4.26 89/08/08 17:55:25 jtkohl Exp $
|
||||
* $Id: krb.h,v 1.4 1994/09/24 14:15:41 g89r4222 Exp $
|
||||
* from: krb.h,v 4.26 89/08/08 17:55:25 jtkohl Exp $
|
||||
* $Id: krb.h,v 1.1.1.1 1994/09/30 14:49:54 csgr Exp $
|
||||
*/
|
||||
|
||||
/* Only one time, please */
|
||||
|
@ -37,7 +37,7 @@ typedef unsigned short gid_t;
|
|||
#endif /* NO_UIDGID_T */
|
||||
|
||||
/*
|
||||
* Kerberos specific definitions
|
||||
* Kerberos specific definitions
|
||||
*
|
||||
* KRBLOG is the log file for the kerberos master server. KRB_CONF is
|
||||
* the configuration file where different host machines running master
|
||||
|
@ -47,7 +47,7 @@ typedef unsigned short gid_t;
|
|||
* requests, which can go to slaves) must go to it. KRB_HOST is the
|
||||
* default machine * when looking for a kerberos slave server. Other
|
||||
* possibilities are * in the KRB_CONF file. KRB_REALM is the name of
|
||||
* the realm.
|
||||
* the realm.
|
||||
*/
|
||||
|
||||
#ifdef notdef
|
||||
|
|
|
@ -6,15 +6,15 @@
|
|||
* This file contains configuration information for the Kerberos library
|
||||
* which is machine specific; currently, this file contains
|
||||
* configuration information for the vax, the "ibm032" (RT), and the
|
||||
* "PC8086" (IBM PC).
|
||||
* "PC8086" (IBM PC).
|
||||
*
|
||||
* Note: cross-compiled targets must appear BEFORE their corresponding
|
||||
* cross-compiler host. Otherwise, both will be defined when running
|
||||
* the native compiler on the programs that construct cross-compiled
|
||||
* sources.
|
||||
* sources.
|
||||
*
|
||||
* from: krb_conf.h,v 4.0 89/01/23 09:59:27 jtkohl Exp $
|
||||
* $Id: krb_conf.h,v 1.2 1994/07/19 19:23:18 g89r4222 Exp $
|
||||
* from: krb_conf.h,v 4.0 89/01/23 09:59:27 jtkohl Exp $
|
||||
* $Id: krb_conf.h,v 1.1.1.1 1994/09/30 14:49:54 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef KRB_CONF_DEFS
|
||||
|
|
|
@ -1,17 +1,17 @@
|
|||
/*
|
||||
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
|
||||
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
|
||||
* For copying and distribution information, please see the file
|
||||
* <Copyright.MIT>.
|
||||
* <Copyright.MIT>.
|
||||
*
|
||||
* spm Project Athena 8/85
|
||||
* spm Project Athena 8/85
|
||||
*
|
||||
* This file defines data structures for the kerberos
|
||||
* authentication/authorization database.
|
||||
* authentication/authorization database.
|
||||
*
|
||||
* They MUST correspond to those defined in *.rel
|
||||
* They MUST correspond to those defined in *.rel
|
||||
*
|
||||
* from: krb_db.h,v 4.9 89/01/24 17:55:39 jon Exp $
|
||||
* $Id: krb_db.h,v 1.2 1994/07/19 19:23:19 g89r4222 Exp $
|
||||
* from: krb_db.h,v 4.9 89/01/24 17:55:39 jon Exp $
|
||||
* $Id: krb_db.h,v 1.1.1.1 1994/09/30 14:49:54 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef KRB_DB_DEFS
|
||||
|
|
|
@ -1,12 +1,12 @@
|
|||
/*
|
||||
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
|
||||
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
|
||||
* For copying and distribution information, please see the file
|
||||
* <Copyright.MIT>.
|
||||
* <Copyright.MIT>.
|
||||
*
|
||||
* Include file for password server
|
||||
*
|
||||
* from: passwd_server.h,v 4.6 89/01/11 15:12:22 steiner Exp $
|
||||
* $Id: passwd_server.h,v 1.2 1994/07/19 19:23:24 g89r4222 Exp $
|
||||
* from: passwd_server.h,v 4.6 89/01/11 15:12:22 steiner Exp $
|
||||
* $Id: passwd_server.h,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef PASSWD_SERVER_DEFS
|
||||
|
|
|
@ -1,15 +1,15 @@
|
|||
/*
|
||||
* $Source: /afs/athena.mit.edu/astaff/project/kerberos/src/kadmin/RCS/kadmin.c,v $
|
||||
* $Author: qjb $
|
||||
* $Source: /home/ncvs/src/eBones/kadmin/kadmin.c,v $
|
||||
* $Author: wollman $
|
||||
*
|
||||
* Copyright 1988 by the Massachusetts Institute of Technology.
|
||||
*
|
||||
* For copying and distribution information, please see the file
|
||||
* Copyright.MIT.
|
||||
*
|
||||
* Kerberos database administrator's tool.
|
||||
*
|
||||
* The default behavior of kadmin is if the -m option is given
|
||||
* Kerberos database administrator's tool.
|
||||
*
|
||||
* The default behavior of kadmin is if the -m option is given
|
||||
* on the commandline, multiple requests are allowed to be given
|
||||
* with one entry of the admin password (until the tickets expire).
|
||||
* If you do not want this to be an available option, compile with
|
||||
|
@ -54,7 +54,7 @@ static char default_realm[REALM_SZ]; /* default kerberos realm */
|
|||
static char krbrlm[REALM_SZ]; /* current realm being administered */
|
||||
#ifndef NO_MULTIPLE
|
||||
static int multiple = 0; /* Allow multiple requests per ticket */
|
||||
#endif
|
||||
#endif
|
||||
|
||||
main(argc, argv)
|
||||
int argc;
|
||||
|
@ -106,18 +106,18 @@ setvals(vals, string)
|
|||
strcpy(realm, default_realm);
|
||||
if (strcmp(realm, krbrlm)) {
|
||||
strcpy(krbrlm, realm);
|
||||
if ((status = kadm_init_link(PWSERV_NAME, KRB_MASTER, krbrlm))
|
||||
if ((status = kadm_init_link(PWSERV_NAME, KRB_MASTER, krbrlm))
|
||||
!= KADM_SUCCESS)
|
||||
printf("kadm error for realm %s: %s\n",
|
||||
printf("kadm error for realm %s: %s\n",
|
||||
krbrlm, error_message(status));
|
||||
}
|
||||
if (status)
|
||||
if (status)
|
||||
return 1;
|
||||
else
|
||||
return KADM_SUCCESS;
|
||||
}
|
||||
}
|
||||
|
||||
void
|
||||
void
|
||||
change_password(argc, argv)
|
||||
int argc;
|
||||
char *argv[];
|
||||
|
@ -145,7 +145,7 @@ change_password(argc, argv)
|
|||
|
||||
/* get the new password */
|
||||
(void) sprintf(pw_prompt, "New password for %s:", argv[1]);
|
||||
|
||||
|
||||
if (get_password(&new.key_low, &new.key_high,
|
||||
pw_prompt, SWAP) == GOOD_PW) {
|
||||
status = kadm_mod(&old, &new);
|
||||
|
@ -163,13 +163,13 @@ change_password(argc, argv)
|
|||
clean_up();
|
||||
#endif
|
||||
}
|
||||
else
|
||||
else
|
||||
printf("kadmin: Principal does not exist.\n");
|
||||
return;
|
||||
}
|
||||
|
||||
/*ARGSUSED*/
|
||||
void
|
||||
void
|
||||
change_admin_password(argc, argv)
|
||||
int argc;
|
||||
char *argv[];
|
||||
|
@ -206,7 +206,7 @@ change_admin_password(argc, argv)
|
|||
return;
|
||||
}
|
||||
|
||||
void
|
||||
void
|
||||
add_new_key(argc, argv)
|
||||
int argc;
|
||||
char *argv[];
|
||||
|
@ -228,10 +228,10 @@ add_new_key(argc, argv)
|
|||
/* get the admin's password */
|
||||
if (get_admin_password() != GOOD_PW)
|
||||
return;
|
||||
|
||||
|
||||
/* get the new password */
|
||||
(void) sprintf(pw_prompt, "Password for %s:", argv[1]);
|
||||
|
||||
|
||||
if (get_password(&new.key_low, &new.key_high,
|
||||
pw_prompt, SWAP) == GOOD_PW) {
|
||||
status = kadm_add(&new);
|
||||
|
@ -253,7 +253,7 @@ add_new_key(argc, argv)
|
|||
return;
|
||||
}
|
||||
|
||||
void
|
||||
void
|
||||
get_entry(argc, argv)
|
||||
int argc;
|
||||
char *argv[];
|
||||
|
@ -283,12 +283,12 @@ get_entry(argc, argv)
|
|||
/* get the admin's password */
|
||||
if (get_admin_password() != GOOD_PW)
|
||||
return;
|
||||
|
||||
|
||||
if ((status = kadm_get(&vals, fields)) == KADM_SUCCESS)
|
||||
prin_vals(&vals);
|
||||
else
|
||||
printf("kadm error: %s\n",error_message(status));
|
||||
|
||||
|
||||
#ifndef NO_MULTIPLE
|
||||
if (!multiple)
|
||||
clean_up();
|
||||
|
@ -300,7 +300,7 @@ get_entry(argc, argv)
|
|||
}
|
||||
|
||||
|
||||
void
|
||||
void
|
||||
help(argc, argv)
|
||||
int argc;
|
||||
char *argv[];
|
||||
|
@ -435,18 +435,18 @@ do_init(argc, argv)
|
|||
#else
|
||||
#define OPTION_STRING "u:r:"
|
||||
#endif
|
||||
|
||||
|
||||
bzero(myname, sizeof(myname));
|
||||
|
||||
if (!inited) {
|
||||
/*
|
||||
* This is only as a default/initial realm; we don't care
|
||||
/*
|
||||
* This is only as a default/initial realm; we don't care
|
||||
* about failure.
|
||||
*/
|
||||
if (krb_get_lrealm(default_realm, 1) != KSUCCESS)
|
||||
strcpy(default_realm, KRB_REALM);
|
||||
|
||||
/*
|
||||
/*
|
||||
* If we can reach the local realm, initialize to it. Otherwise,
|
||||
* don't initialize.
|
||||
*/
|
||||
|
@ -455,7 +455,7 @@ do_init(argc, argv)
|
|||
else
|
||||
strcpy(krbrlm, default_realm);
|
||||
|
||||
while ((c = getopt(argc, argv, OPTION_STRING)) != EOF)
|
||||
while ((c = getopt(argc, argv, OPTION_STRING)) != EOF)
|
||||
switch (c) {
|
||||
case 'u':
|
||||
strncpy(myname, optarg, sizeof(myname) - 1);
|
||||
|
@ -508,9 +508,9 @@ get_admin_password()
|
|||
/* If admin tickets exist and are valid, just exit. */
|
||||
bzero(&c, sizeof(c));
|
||||
if (krb_get_cred(PWSERV_NAME, KADM_SINST, krbrlm, &c) == KSUCCESS)
|
||||
/*
|
||||
/*
|
||||
* If time is less than lifetime - FUDGE_VALUE after issue date,
|
||||
* tickets will probably last long enough for the next
|
||||
* tickets will probably last long enough for the next
|
||||
* transaction.
|
||||
*/
|
||||
if (time(0) < (c.issue_date + (5 * 60 * c.lifetime) - FUDGE_VALUE))
|
||||
|
@ -518,14 +518,14 @@ get_admin_password()
|
|||
ticket_life = DEFAULT_TKT_LIFE;
|
||||
}
|
||||
#endif
|
||||
|
||||
|
||||
if (princ_exists(myname, "admin", krbrlm) != PE_NO) {
|
||||
if (read_long_pw_string(admin_passwd, sizeof(admin_passwd)-1,
|
||||
"Admin password:", 0)) {
|
||||
fprintf(stderr, "Error reading admin password.\n");
|
||||
goto bad;
|
||||
}
|
||||
status = krb_get_pw_in_tkt(myname, "admin", krbrlm, PWSERV_NAME,
|
||||
status = krb_get_pw_in_tkt(myname, "admin", krbrlm, PWSERV_NAME,
|
||||
KADM_SINST, ticket_life, admin_passwd);
|
||||
bzero(admin_passwd, sizeof(admin_passwd));
|
||||
}
|
||||
|
@ -546,7 +546,7 @@ get_admin_password()
|
|||
"while getting password tickets");
|
||||
goto bad;
|
||||
}
|
||||
|
||||
|
||||
bad:
|
||||
bzero(admin_passwd, sizeof(admin_passwd));
|
||||
(void) dest_tkt();
|
||||
|
@ -560,8 +560,8 @@ clean_up()
|
|||
return;
|
||||
}
|
||||
|
||||
void
|
||||
quit()
|
||||
void
|
||||
quit()
|
||||
{
|
||||
printf("Cleaning up and exiting.\n");
|
||||
clean_up();
|
||||
|
|
|
@ -96,7 +96,7 @@ char *argv[];
|
|||
|
||||
if (krbrlm[0] == 0)
|
||||
if (krb_get_lrealm(krbrlm, 0) != KSUCCESS) {
|
||||
fprintf(stderr,
|
||||
fprintf(stderr,
|
||||
"Unable to get local realm. Fix krb.conf or use -r.\n");
|
||||
exit(1);
|
||||
}
|
||||
|
@ -165,7 +165,7 @@ doexit()
|
|||
return(0);
|
||||
#endif /* POSIX */
|
||||
}
|
||||
|
||||
|
||||
unsigned pidarraysize = 0;
|
||||
int *pidarray = (int *)0;
|
||||
|
||||
|
@ -217,7 +217,7 @@ kadm_listen()
|
|||
if (errno != EINTR)
|
||||
log("select: %s",error_message(errno));
|
||||
continue;
|
||||
}
|
||||
}
|
||||
if (FD_ISSET(admin_fd, &readfds)) {
|
||||
/* accept the conn */
|
||||
addrlen = sizeof(peer);
|
||||
|
@ -297,7 +297,7 @@ struct sockaddr_in *who;
|
|||
/* db locked */
|
||||
u_long retcode = KADM_DB_INUSE;
|
||||
char *pdat;
|
||||
|
||||
|
||||
dat_len = KADM_VERSIZE + sizeof(u_long);
|
||||
dat = (u_char *) malloc((unsigned)dat_len);
|
||||
pdat = (char *) dat;
|
||||
|
@ -352,10 +352,10 @@ struct sockaddr_in *who;
|
|||
}
|
||||
if ((retval = kadm_ser_in(&dat,&dat_len)) != KADM_SUCCESS)
|
||||
log("processing request: %s", error_message(retval));
|
||||
|
||||
|
||||
/* kadm_ser_in did the processing and returned stuff in
|
||||
dat & dat_len , return the appropriate data */
|
||||
|
||||
|
||||
out:
|
||||
dlen = (u_short) dat_len;
|
||||
|
||||
|
@ -364,13 +364,13 @@ struct sockaddr_in *who;
|
|||
abort(); /* XXX */
|
||||
}
|
||||
dlen = htons(dlen);
|
||||
|
||||
|
||||
if (krb_net_write(fd, (char *)&dlen, sizeof(u_short)) < 0) {
|
||||
log("writing dlen to client: %s",error_message(errno));
|
||||
(void) close(fd);
|
||||
cleanexit(6);
|
||||
}
|
||||
|
||||
|
||||
if (krb_net_write(fd, (char *)dat, dat_len) < 0) {
|
||||
log(LOG_ERR, "writing to client: %s",error_message(errno));
|
||||
(void) close(fd);
|
||||
|
@ -435,7 +435,7 @@ kill_children()
|
|||
{
|
||||
register int i;
|
||||
int osigmask;
|
||||
|
||||
|
||||
osigmask = sigblock(sigmask(SIGCHLD));
|
||||
|
||||
for (i = 0; i < pidarraysize; i++) {
|
||||
|
|
|
@ -13,7 +13,7 @@ static char rcsid_kadm_funcs_c[] =
|
|||
"Id: kadm_funcs.c,v 4.3 90/03/20 01:39:51 jon Exp ";
|
||||
#endif
|
||||
static const char rcsid[] =
|
||||
"$Id$";
|
||||
"$Id: kadm_funcs.c,v 1.1 1995/01/20 03:12:55 wollman Exp $";
|
||||
#endif lint
|
||||
|
||||
/*
|
||||
|
@ -40,7 +40,7 @@ enum acl_types acltype;
|
|||
extern char *acldir;
|
||||
|
||||
(void) sprintf(checkname, "%s.%s@%s", pname, pinst, prealm);
|
||||
|
||||
|
||||
switch (acltype) {
|
||||
case ADDACL:
|
||||
(void) sprintf(filename, "%s%s", acldir, ADD_ACL_FILE);
|
||||
|
@ -85,7 +85,7 @@ Kadm_vals *valsout;
|
|||
rname, rinstance, rrealm, valsin->name, valsin->instance);
|
||||
return KADM_UNAUTH;
|
||||
}
|
||||
|
||||
|
||||
/* Need to check here for "legal" name and instance */
|
||||
if (wildcard(valsin->name) || wildcard(valsin->instance)) {
|
||||
failadd(KADM_ILL_WILDCARD);
|
||||
|
@ -93,7 +93,7 @@ Kadm_vals *valsout;
|
|||
|
||||
(void) log("request to add an entry for '%s.%s' from '%s.%s@%s'",
|
||||
valsin->name, valsin->instance, rname, rinstance, rrealm);
|
||||
|
||||
|
||||
numfound = kerb_get_principal(KERB_DEFAULT_NAME, KERB_DEFAULT_INST,
|
||||
&default_princ, 1, &more);
|
||||
if (numfound == -1) {
|
||||
|
@ -111,7 +111,7 @@ Kadm_vals *valsout;
|
|||
if (!IS_FIELD(KADM_ATTR,valsin->fields))
|
||||
data_i.attributes = default_princ.attributes;
|
||||
if (!IS_FIELD(KADM_MAXLIFE,valsin->fields))
|
||||
data_i.max_life = default_princ.max_life;
|
||||
data_i.max_life = default_princ.max_life;
|
||||
|
||||
bzero((char *)&default_princ, sizeof(default_princ));
|
||||
|
||||
|
@ -131,7 +131,7 @@ Kadm_vals *valsout;
|
|||
bzero((char *)newpw, sizeof(newpw));
|
||||
|
||||
data_o = data_i;
|
||||
numfound = kerb_get_principal(valsin->name, valsin->instance,
|
||||
numfound = kerb_get_principal(valsin->name, valsin->instance,
|
||||
&data_o, 1, &more);
|
||||
if (numfound == -1) {
|
||||
failadd(KADM_DB_INUSE);
|
||||
|
@ -150,7 +150,7 @@ Kadm_vals *valsout;
|
|||
} else if (numfound) {
|
||||
failadd(KADM_UK_SERROR);
|
||||
} else {
|
||||
numfound = kerb_get_principal(valsin->name, valsin->instance,
|
||||
numfound = kerb_get_principal(valsin->name, valsin->instance,
|
||||
&data_o, 1, &more);
|
||||
if ((numfound!=1) || (more!=0)) {
|
||||
failadd(KADM_UK_RERROR);
|
||||
|
@ -183,22 +183,22 @@ Kadm_vals *valsout; /* what data is there */
|
|||
int more; /* To point to more name.instances */
|
||||
Principal data_o; /* Data object to hold Principal */
|
||||
|
||||
|
||||
|
||||
if (!check_access(rname, rinstance, rrealm, GETACL)) {
|
||||
(void) log("WARNING: '%s.%s@%s' tried to get '%s.%s's entry",
|
||||
rname, rinstance, rrealm, valsin->name, valsin->instance);
|
||||
return KADM_UNAUTH;
|
||||
}
|
||||
|
||||
|
||||
if (wildcard(valsin->name) || wildcard(valsin->instance)) {
|
||||
failget(KADM_ILL_WILDCARD);
|
||||
}
|
||||
|
||||
(void) log("retrieve '%s.%s's entry for '%s.%s@%s'",
|
||||
valsin->name, valsin->instance, rname, rinstance, rrealm);
|
||||
|
||||
|
||||
/* Look up the record in the database */
|
||||
numfound = kerb_get_principal(valsin->name, valsin->instance,
|
||||
numfound = kerb_get_principal(valsin->name, valsin->instance,
|
||||
&data_o, 1, &more);
|
||||
if (numfound == -1) {
|
||||
failget(KADM_DB_INUSE);
|
||||
|
@ -231,17 +231,17 @@ Kadm_vals *valsout; /* the actual record which is returned */
|
|||
if (wildcard(valsin1->name) || wildcard(valsin1->instance)) {
|
||||
failmod(KADM_ILL_WILDCARD);
|
||||
}
|
||||
|
||||
|
||||
if (!check_access(rname, rinstance, rrealm, MODACL)) {
|
||||
(void) log("WARNING: '%s.%s@%s' tried to change '%s.%s's entry",
|
||||
rname, rinstance, rrealm, valsin1->name, valsin1->instance);
|
||||
return KADM_UNAUTH;
|
||||
}
|
||||
|
||||
|
||||
(void) log("request to modify '%s.%s's entry from '%s.%s@%s' ",
|
||||
valsin1->name, valsin1->instance, rname, rinstance, rrealm);
|
||||
|
||||
numfound = kerb_get_principal(valsin1->name, valsin1->instance,
|
||||
|
||||
numfound = kerb_get_principal(valsin1->name, valsin1->instance,
|
||||
&data_o, 1, &more);
|
||||
if (numfound == -1) {
|
||||
failmod(KADM_DB_INUSE);
|
||||
|
@ -254,7 +254,7 @@ Kadm_vals *valsout; /* the actual record which is returned */
|
|||
if (IS_FIELD(KADM_ATTR,valsin2->fields))
|
||||
data_o.attributes = temp_key.attributes;
|
||||
if (IS_FIELD(KADM_MAXLIFE,valsin2->fields))
|
||||
data_o.max_life = temp_key.max_life;
|
||||
data_o.max_life = temp_key.max_life;
|
||||
if (IS_FIELD(KADM_DESKEY,valsin2->fields)) {
|
||||
data_o.key_version++;
|
||||
data_o.kdc_key_ver = server_parm.master_key_version;
|
||||
|
@ -289,7 +289,7 @@ Kadm_vals *valsout; /* the actual record which is returned */
|
|||
} else if (more) {
|
||||
failmod(KADM_UK_SERROR);
|
||||
} else {
|
||||
numfound = kerb_get_principal(valsin1->name, valsin1->instance,
|
||||
numfound = kerb_get_principal(valsin1->name, valsin1->instance,
|
||||
&data_o, 1, &more);
|
||||
if ((more!=0)||(numfound!=1)) {
|
||||
failmod(KADM_UK_RERROR);
|
||||
|
@ -335,14 +335,14 @@ des_cblock newpw;
|
|||
}
|
||||
(void) log("'%s.%s@%s' wants to change its password",
|
||||
rname, rinstance, rrealm);
|
||||
|
||||
|
||||
bcopy(newpw, local_pw, sizeof(local_pw));
|
||||
|
||||
|
||||
/* encrypt new key in master key */
|
||||
kdb_encrypt_key (local_pw, local_pw, server_parm.master_key,
|
||||
server_parm.master_key_schedule, ENCRYPT);
|
||||
|
||||
numfound = kerb_get_principal(rname, rinstance,
|
||||
numfound = kerb_get_principal(rname, rinstance,
|
||||
&data_o, 1, &more);
|
||||
if (numfound == -1) {
|
||||
failchange(KADM_DB_INUSE);
|
||||
|
|
|
@ -12,7 +12,7 @@ static char rcsid_module_c[] =
|
|||
"BonesHeader: /afs/athena.mit.edu/astaff/project/kerberos/src/kadmin/RCS/kadm_ser_wrap.c,v 4.4 89/09/26 09:29:36 jtkohl Exp ";
|
||||
#endif lint
|
||||
|
||||
/*
|
||||
/*
|
||||
kadm_ser_wrap.c
|
||||
unwraps wrapped packets and calls the appropriate server subroutine
|
||||
*/
|
||||
|
@ -28,7 +28,7 @@ unwraps wrapped packets and calls the appropriate server subroutine
|
|||
|
||||
Kadm_Server server_parm;
|
||||
|
||||
/*
|
||||
/*
|
||||
kadm_ser_init
|
||||
set up the server_parm structure
|
||||
*/
|
||||
|
@ -147,7 +147,7 @@ int *dat_len;
|
|||
#else
|
||||
des_key_sched(ad.session, sess_sched);
|
||||
#endif
|
||||
if (retc = (int) krb_rd_priv(in_st, r_len, sess_sched, ad.session,
|
||||
if (retc = (int) krb_rd_priv(in_st, r_len, sess_sched, ad.session,
|
||||
&server_parm.recv_addr,
|
||||
&server_parm.admin_addr, &msg_st)) {
|
||||
clr_cli_secrets();
|
||||
|
|
|
@ -15,7 +15,7 @@ static char rcsid_kadm_server_c[] =
|
|||
#include <kadm.h>
|
||||
#include <kadm_err.h>
|
||||
|
||||
/*
|
||||
/*
|
||||
kadm_ser_cpw - the server side of the change_password routine
|
||||
recieves : KTEXT, {key}
|
||||
returns : CKSUM, RETCODE
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
/*
|
||||
* $Source: /afs/athena.mit.edu/astaff/project/kerberos/src/kadmin/RCS/kadm_server.h,v $
|
||||
* $Author: jtkohl $
|
||||
* Header: /afs/athena.mit.edu/astaff/project/kerberos/src/kadmin/RCS/kadm_server.h,v 4.1 89/12/21 17:46:51 jtkohl Exp
|
||||
* $Source: /home/ncvs/src/eBones/kadmind/kadm_server.h,v $
|
||||
* $Author: wollman $
|
||||
* Header: /afs/athena.mit.edu/astaff/project/kerberos/src/kadmin/RCS/kadm_server.h,v 4.1 89/12/21 17:46:51 jtkohl Exp
|
||||
*
|
||||
* Copyright 1988 by the Massachusetts Institute of Technology.
|
||||
*
|
||||
|
|
|
@ -1,17 +1,17 @@
|
|||
/*
|
||||
* Copyright 1988 by the Massachusetts Institute of Technology.
|
||||
* Copyright 1988 by the Massachusetts Institute of Technology.
|
||||
* For copying and distribution information, please see the file
|
||||
* <Copyright.MIT>.
|
||||
*
|
||||
* This is where a cache would be implemented, if it were necessary.
|
||||
*
|
||||
* from: krb_cache.c,v 4.5 89/01/24 18:12:34 jon Exp $
|
||||
* $Id: krb_cache.c,v 1.2 1994/07/19 19:23:35 g89r4222 Exp $
|
||||
* $Id: krb_cache.c,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: krb_cache.c,v 1.2 1994/07/19 19:23:35 g89r4222 Exp $";
|
||||
"$Id: krb_cache.c,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $";
|
||||
#endif lint
|
||||
|
||||
#include <stdio.h>
|
||||
|
@ -34,7 +34,7 @@ extern long kerb_debug;
|
|||
static init = 0;
|
||||
|
||||
/*
|
||||
* initialization routine for cache
|
||||
* initialization routine for cache
|
||||
*/
|
||||
|
||||
int
|
||||
|
@ -45,7 +45,7 @@ kerb_cache_init()
|
|||
}
|
||||
|
||||
/*
|
||||
* look up a principal in the cache returns number of principals found
|
||||
* look up a principal in the cache returns number of principals found
|
||||
*/
|
||||
|
||||
int
|
||||
|
@ -66,7 +66,7 @@ kerb_cache_get_principal(serv, inst, principal, max)
|
|||
fprintf(stderr, "cache_get_principal for %s %s max = %d\n",
|
||||
serv, inst, max);
|
||||
#endif DEBUG
|
||||
|
||||
|
||||
#ifdef DEBUG
|
||||
if (kerb_debug & 2) {
|
||||
if (found) {
|
||||
|
@ -83,7 +83,7 @@ kerb_cache_get_principal(serv, inst, principal, max)
|
|||
|
||||
/*
|
||||
* insert/replace a principal in the cache returns number of principals
|
||||
* inserted
|
||||
* inserted
|
||||
*/
|
||||
|
||||
int
|
||||
|
@ -106,13 +106,13 @@ kerb_cache_put_principal(principal, max)
|
|||
max);
|
||||
}
|
||||
#endif
|
||||
|
||||
|
||||
for (i = 0; i < max; i++) {
|
||||
#ifdef DEBUG
|
||||
if (kerb_debug & 2)
|
||||
fprintf(stderr, "\n %s %s",
|
||||
principal->name, principal->instance);
|
||||
#endif
|
||||
#endif
|
||||
/* DO IT */
|
||||
count++;
|
||||
principal++;
|
||||
|
@ -121,7 +121,7 @@ kerb_cache_put_principal(principal, max)
|
|||
}
|
||||
|
||||
/*
|
||||
* look up a dba in the cache returns number of dbas found
|
||||
* look up a dba in the cache returns number of dbas found
|
||||
*/
|
||||
|
||||
int
|
||||
|
@ -158,7 +158,7 @@ kerb_cache_get_dba(serv, inst, dba, max)
|
|||
}
|
||||
|
||||
/*
|
||||
* insert/replace a dba in the cache returns number of dbas inserted
|
||||
* insert/replace a dba in the cache returns number of dbas inserted
|
||||
*/
|
||||
|
||||
int
|
||||
|
@ -183,7 +183,7 @@ kerb_cache_put_dba(dba, max)
|
|||
if (kerb_debug & 2)
|
||||
fprintf(stderr, "\n %s %s",
|
||||
dba->name, dba->instance);
|
||||
#endif
|
||||
#endif
|
||||
/* DO IT */
|
||||
count++;
|
||||
dba++;
|
||||
|
|
|
@ -1,15 +1,15 @@
|
|||
/*
|
||||
* Copyright 1988 by the Massachusetts Institute of Technology.
|
||||
* Copyright 1988 by the Massachusetts Institute of Technology.
|
||||
* For copying and distribution information, please see the file
|
||||
* <Copyright.MIT>.
|
||||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: krb_dbm.c,v 4.9 89/04/18 16:15:13 wesommer Exp $
|
||||
* $Id: krb_dbm.c,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $
|
||||
* $Id: krb_dbm.c,v 1.2 1995/01/25 19:45:25 ache Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: krb_dbm.c,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $";
|
||||
"$Id: krb_dbm.c,v 1.2 1995/01/25 19:45:25 ache Exp $";
|
||||
#endif lint
|
||||
|
||||
#if defined(__FreeBSD__)
|
||||
|
@ -69,14 +69,14 @@ static int non_blocking = 0;
|
|||
|
||||
/*
|
||||
* Locking:
|
||||
*
|
||||
*
|
||||
* There are two distinct locking protocols used. One is designed to
|
||||
* lock against processes (the admin_server, for one) which make
|
||||
* incremental changes to the database; the other is designed to lock
|
||||
* against utilities (kdb_util, kpropd) which replace the entire
|
||||
* database in one fell swoop.
|
||||
*
|
||||
* The first locking protocol is implemented using flock() in the
|
||||
* The first locking protocol is implemented using flock() in the
|
||||
* krb_dbl_lock() and krb_dbl_unlock routines.
|
||||
*
|
||||
* The second locking protocol is necessary because DBM "files" are
|
||||
|
@ -93,12 +93,12 @@ static int non_blocking = 0;
|
|||
* either time, the reader sleeps for a second to let things
|
||||
* stabilize, and then tries again; if it does not succeed after
|
||||
* KERB_DB_MAX_RETRY attempts, it gives up.
|
||||
*
|
||||
*
|
||||
* On update, the semaphore file is deleted (if it exists) before any
|
||||
* update takes place; at the end of the update, it is replaced, with
|
||||
* a version number strictly greater than the version number which
|
||||
* existed at the start of the update.
|
||||
*
|
||||
*
|
||||
* If the system crashes in the middle of an update, the semaphore
|
||||
* file is not automatically created on reboot; this is a feature, not
|
||||
* a bug, since the database may be inconsistant. Note that the
|
||||
|
@ -140,7 +140,7 @@ static char *gen_dbsuffix(db_name, sfx)
|
|||
char *sfx;
|
||||
{
|
||||
char *dbsuffix;
|
||||
|
||||
|
||||
if (sfx == NULL)
|
||||
sfx = ".ok";
|
||||
|
||||
|
@ -162,7 +162,7 @@ kerb_db_init()
|
|||
|
||||
/*
|
||||
* gracefully shut down database--must be called by ANY program that does
|
||||
* a kerb_db_init
|
||||
* a kerb_db_init
|
||||
*/
|
||||
|
||||
kerb_db_fini()
|
||||
|
@ -201,7 +201,7 @@ long kerb_get_db_age()
|
|||
struct stat st;
|
||||
char *okname;
|
||||
long age;
|
||||
|
||||
|
||||
okname = gen_dbsuffix(current_db_name, ".ok");
|
||||
|
||||
if (stat (okname, &st) < 0)
|
||||
|
@ -226,7 +226,7 @@ static long kerb_start_update(db_name)
|
|||
{
|
||||
char *okname = gen_dbsuffix(db_name, ".ok");
|
||||
long age = kerb_get_db_age();
|
||||
|
||||
|
||||
if (unlink(okname) < 0
|
||||
&& errno != ENOENT) {
|
||||
age = -1;
|
||||
|
@ -243,7 +243,7 @@ static long kerb_end_update(db_name, age)
|
|||
int retval = 0;
|
||||
char *new_okname = gen_dbsuffix(db_name, ".ok#");
|
||||
char *okname = gen_dbsuffix(db_name, ".ok");
|
||||
|
||||
|
||||
fd = open (new_okname, O_CREAT|O_RDWR|O_TRUNC, 0600);
|
||||
if (fd < 0)
|
||||
retval = errno;
|
||||
|
@ -355,7 +355,7 @@ kerb_db_rename(from, to)
|
|||
char *fromok = gen_dbsuffix(from, ".ok");
|
||||
long trans = kerb_start_update(to);
|
||||
int ok;
|
||||
|
||||
|
||||
#ifndef __FreeBSD__
|
||||
if ((rename (fromdir, todir) == 0)
|
||||
&& (rename (frompag, topag) == 0)) {
|
||||
|
@ -384,7 +384,7 @@ kerb_db_rename(from, to)
|
|||
|
||||
/*
|
||||
* look up a principal in the data base returns number of principals
|
||||
* found , and whether there were more than requested.
|
||||
* found , and whether there were more than requested.
|
||||
*/
|
||||
|
||||
kerb_db_get_principal(name, inst, principal, max, more)
|
||||
|
@ -627,7 +627,7 @@ delta_stat(a, b, c)
|
|||
|
||||
/*
|
||||
* look up a dba in the data base returns number of dbas found , and
|
||||
* whether there were more than requested.
|
||||
* whether there were more than requested.
|
||||
*/
|
||||
|
||||
kerb_db_get_dba(dba_name, dba_inst, dba, max, more)
|
||||
|
@ -650,7 +650,7 @@ kerb_db_iterate (func, arg)
|
|||
Principal *principal;
|
||||
int code;
|
||||
DBM *db;
|
||||
|
||||
|
||||
kerb_db_init(); /* initialize and open the database */
|
||||
if ((code = kerb_dbl_lock(KERB_DBL_SHARED)) != 0)
|
||||
return code;
|
||||
|
@ -701,7 +701,7 @@ static int kerb_dbl_lock(mode)
|
|||
int mode;
|
||||
{
|
||||
int flock_mode;
|
||||
|
||||
|
||||
if (!inited)
|
||||
kerb_dbl_init();
|
||||
if (mylock) { /* Detect lock call when lock already
|
||||
|
@ -723,8 +723,8 @@ static int kerb_dbl_lock(mode)
|
|||
}
|
||||
if (non_blocking)
|
||||
flock_mode |= LOCK_NB;
|
||||
|
||||
if (flock(dblfd, flock_mode) < 0)
|
||||
|
||||
if (flock(dblfd, flock_mode) < 0)
|
||||
return errno;
|
||||
mylock++;
|
||||
return 0;
|
||||
|
|
|
@ -10,12 +10,12 @@
|
|||
* Jon Rochlis, MIT Telecom, March 1988
|
||||
*
|
||||
* from: krb_kdb_utils.c,v 4.1 89/07/26 11:01:12 jtkohl Exp $
|
||||
* $Id: krb_kdb_utils.c,v 1.2 1994/07/19 19:23:38 g89r4222 Exp $
|
||||
* $Id: krb_kdb_utils.c,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: krb_kdb_utils.c,v 1.2 1994/07/19 19:23:38 g89r4222 Exp $";
|
||||
"$Id: krb_kdb_utils.c,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $";
|
||||
#endif lint
|
||||
|
||||
#include <des.h>
|
||||
|
@ -79,7 +79,7 @@ long kdb_verify_master_key (master_key, master_key_sched, out)
|
|||
n = kerb_get_principal(KERB_M_NAME, KERB_M_INST, principal_data,
|
||||
1 /* only one please */, &more);
|
||||
if ((n != 1) || more) {
|
||||
if (out != (FILE *) NULL)
|
||||
if (out != (FILE *) NULL)
|
||||
fprintf(out,
|
||||
"verify_master_key: %s, %d found.\n",
|
||||
"Kerberos error on master key version lookup",
|
||||
|
@ -96,11 +96,11 @@ long kdb_verify_master_key (master_key, master_key_sched, out)
|
|||
|
||||
/*
|
||||
* now use the master key to decrypt the key in the db, had better
|
||||
* be the same!
|
||||
* be the same!
|
||||
*/
|
||||
bcopy(&principal_data[0].key_low, key_from_db, 4);
|
||||
bcopy(&principal_data[0].key_high, ((long *) key_from_db) + 1, 4);
|
||||
kdb_encrypt_key (key_from_db, key_from_db,
|
||||
kdb_encrypt_key (key_from_db, key_from_db,
|
||||
master_key, master_key_sched, DECRYPT);
|
||||
|
||||
/* the decrypted database key had better equal the master key */
|
||||
|
|
|
@ -1,16 +1,16 @@
|
|||
/*
|
||||
* $Source: /home/CVS/src/eBones/kdb/krb_lib.c,v $
|
||||
* $Author: g89r4222 $
|
||||
* $Source: /home/ncvs/src/eBones/kdb/krb_lib.c,v $
|
||||
* $Author: csgr $
|
||||
*
|
||||
* Copyright 1988 by the Massachusetts Institute of Technology.
|
||||
* Copyright 1988 by the Massachusetts Institute of Technology.
|
||||
*
|
||||
* For copying and distribution information, please see the file
|
||||
* <mit-copyright.h>.
|
||||
* <mit-copyright.h>.
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: krb_lib.c,v 1.2 1994/07/19 19:23:39 g89r4222 Exp $";
|
||||
"$Id: krb_lib.c,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $";
|
||||
#endif lint
|
||||
|
||||
#include <stdio.h>
|
||||
|
@ -37,7 +37,7 @@ extern char *getenv();
|
|||
static init = 0;
|
||||
|
||||
/*
|
||||
* initialization routine for data base
|
||||
* initialization routine for data base
|
||||
*/
|
||||
|
||||
int
|
||||
|
@ -64,7 +64,7 @@ kerb_init()
|
|||
/*
|
||||
* finalization routine for database -- NOTE: MUST be called by any
|
||||
* program using kerb_init. ALSO will have to be modified to finalize
|
||||
* caches, if they're ever really implemented.
|
||||
* caches, if they're ever really implemented.
|
||||
*/
|
||||
|
||||
int
|
||||
|
@ -75,7 +75,7 @@ kerb_fini()
|
|||
|
||||
/*
|
||||
* look up a principal in the cache or data base returns number of
|
||||
* principals found
|
||||
* principals found
|
||||
*/
|
||||
|
||||
int
|
||||
|
@ -99,10 +99,10 @@ kerb_get_principal(name, inst, principal, max, more)
|
|||
fprintf(stderr, "\n%s: kerb_get_principal for %s %s max = %d\n",
|
||||
progname, name, inst, max);
|
||||
#endif
|
||||
|
||||
|
||||
/*
|
||||
* if this is a request including a wild card, have to go to db
|
||||
* since the cache may not be exhaustive.
|
||||
* since the cache may not be exhaustive.
|
||||
*/
|
||||
|
||||
/* clear the principal area */
|
||||
|
@ -111,7 +111,7 @@ kerb_get_principal(name, inst, principal, max, more)
|
|||
#ifdef CACHE
|
||||
/*
|
||||
* so check to see if the name contains a wildcard "*" or "?", not
|
||||
* preceeded by a backslash.
|
||||
* preceeded by a backslash.
|
||||
*/
|
||||
wild = 0;
|
||||
if (index(name, '*') || index(name, '?') ||
|
||||
|
@ -206,7 +206,7 @@ kerb_get_dba(name, inst, dba, max, more)
|
|||
#endif
|
||||
/*
|
||||
* if this is a request including a wild card, have to go to db
|
||||
* since the cache may not be exhaustive.
|
||||
* since the cache may not be exhaustive.
|
||||
*/
|
||||
|
||||
/* clear the dba area */
|
||||
|
@ -215,7 +215,7 @@ kerb_get_dba(name, inst, dba, max, more)
|
|||
#ifdef CACHE
|
||||
/*
|
||||
* so check to see if the name contains a wildcard "*" or "?", not
|
||||
* preceeded by a backslash.
|
||||
* preceeded by a backslash.
|
||||
*/
|
||||
|
||||
wild = 0;
|
||||
|
|
|
@ -1,15 +1,15 @@
|
|||
/*
|
||||
* Copyright 1988 by the Massachusetts Institute of Technology.
|
||||
* Copyright 1988 by the Massachusetts Institute of Technology.
|
||||
* For copying and distribution information, please see the file
|
||||
* <Copyright.MIT>.
|
||||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: $Header: /home/CVS/src/eBones/kdb/print_princ.c,v 1.2 1994/07/19 19:23:41 g89r4222 Exp $
|
||||
* $Id: print_princ.c,v 1.2 1994/07/19 19:23:41 g89r4222 Exp $
|
||||
* from: $Header: /home/ncvs/src/eBones/kdb/print_princ.c,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $
|
||||
* $Id: print_princ.c,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: print_princ.c,v 1.2 1994/07/19 19:23:41 g89r4222 Exp $";
|
||||
"$Id: print_princ.c,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $";
|
||||
#endif lint
|
||||
|
||||
#include <stdio.h>
|
||||
|
|
|
@ -5,19 +5,19 @@
|
|||
* <Copyright.MIT>.
|
||||
*
|
||||
* This routine changes the Kerberos encryption keys for principals,
|
||||
* i.e., users or services.
|
||||
* i.e., users or services.
|
||||
*
|
||||
* from: kdb_edit.c,v 4.2 90/01/09 16:05:09 raeburn Exp $
|
||||
* $Id: kdb_edit.c,v 1.3 1994/09/09 21:43:46 g89r4222 Exp $
|
||||
* $Id: kdb_edit.c,v 1.1.1.1 1994/09/30 14:49:56 csgr Exp $
|
||||
*/
|
||||
|
||||
/*
|
||||
* exit returns 0 ==> success -1 ==> error
|
||||
* exit returns 0 ==> success -1 ==> error
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: kdb_edit.c,v 1.3 1994/09/09 21:43:46 g89r4222 Exp $";
|
||||
"$Id: kdb_edit.c,v 1.1.1.1 1994/09/30 14:49:56 csgr Exp $";
|
||||
#endif lint
|
||||
|
||||
#include <stdio.h>
|
||||
|
@ -158,7 +158,7 @@ main(argc, argv)
|
|||
|
||||
#endif
|
||||
|
||||
if (kdb_get_master_key ((nflag == 0),
|
||||
if (kdb_get_master_key ((nflag == 0),
|
||||
master_key, master_key_schedule) != 0) {
|
||||
fprintf (stdout, "Couldn't read master key.\n");
|
||||
fflush (stdout);
|
||||
|
@ -241,7 +241,7 @@ change_principal()
|
|||
if (!creating) {
|
||||
/*
|
||||
* copy the existing data so we can use the old values
|
||||
* for the qualifier clause of the replace
|
||||
* for the qualifier clause of the replace
|
||||
*/
|
||||
principal_data[i].old = (char *) &old_principal;
|
||||
bcopy(&principal_data[i], &old_principal,
|
||||
|
@ -310,7 +310,7 @@ change_principal()
|
|||
}
|
||||
|
||||
/* seal it under the kerberos master key */
|
||||
kdb_encrypt_key (new_key, new_key,
|
||||
kdb_encrypt_key (new_key, new_key,
|
||||
master_key, master_key_schedule,
|
||||
ENCRYPT);
|
||||
bcopy(new_key, &principal_data[i].key_low, 4);
|
||||
|
@ -398,7 +398,7 @@ change_principal()
|
|||
|
||||
/*
|
||||
* remaining fields -- key versions and mod info, should
|
||||
* not be directly manipulated
|
||||
* not be directly manipulated
|
||||
*/
|
||||
if (changed) {
|
||||
if (kerb_put_principal(&principal_data[i], 1)) {
|
||||
|
|
|
@ -1,18 +1,18 @@
|
|||
/*
|
||||
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
|
||||
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
|
||||
* For copying and distribution information, please see the file
|
||||
* <Copyright.MIT>.
|
||||
* <Copyright.MIT>.
|
||||
*
|
||||
* program to initialize the database, reports error if database file
|
||||
* already exists.
|
||||
* already exists.
|
||||
*
|
||||
* from: kdb_init.c,v 4.0 89/01/24 21:50:45 jtkohl Exp $
|
||||
* $Id: kdb_init.c,v 1.3 1994/09/24 14:04:17 g89r4222 Exp $
|
||||
* $Id: kdb_init.c,v 1.1.1.1 1994/09/30 14:49:56 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: kdb_init.c,v 1.3 1994/09/24 14:04:17 g89r4222 Exp $";
|
||||
"$Id: kdb_init.c,v 1.1.1.1 1994/09/30 14:49:56 csgr Exp $";
|
||||
#endif lint
|
||||
|
||||
#include <stdio.h>
|
||||
|
@ -44,7 +44,7 @@ main(argc, argv)
|
|||
char *cp;
|
||||
int code;
|
||||
char *database;
|
||||
|
||||
|
||||
progname = (cp = rindex(*argv, '/')) ? cp + 1 : *argv;
|
||||
|
||||
if (argc > 3) {
|
||||
|
@ -96,7 +96,7 @@ main(argc, argv)
|
|||
add_principal(KERB_M_NAME, KERB_M_INST, MASTER_KEY) ||
|
||||
add_principal(KERB_DEFAULT_NAME, KERB_DEFAULT_INST, NULL_KEY) ||
|
||||
add_principal("krbtgt", realm, RANDOM_KEY) ||
|
||||
add_principal("changepw", KRB_MASTER, RANDOM_KEY)
|
||||
add_principal("changepw", KRB_MASTER, RANDOM_KEY)
|
||||
) {
|
||||
fprintf(stderr, "\n%s: couldn't initialize database.\n",
|
||||
progname);
|
||||
|
@ -169,7 +169,7 @@ add_principal(name, instance, aap_op)
|
|||
principal.old = 0;
|
||||
|
||||
kerb_db_put_principal(&principal, 1);
|
||||
|
||||
|
||||
/* let's play it safe */
|
||||
bzero (new_key, sizeof (C_Block));
|
||||
bzero (&principal.key_low, 4);
|
||||
|
|
|
@ -7,17 +7,17 @@
|
|||
* dump a kerberos database to an ascii readable file and load this
|
||||
* file into the database. Read locking of the database is done during a
|
||||
* dump operation. NO LOCKING is done during a load operation. Loads
|
||||
* should happen with other processes shutdown.
|
||||
* should happen with other processes shutdown.
|
||||
*
|
||||
* Written July 9, 1987 by Jeffrey I. Schiller
|
||||
*
|
||||
* from: kdb_util.c,v 4.4 90/01/09 15:57:20 raeburn Exp $
|
||||
* $Id: kdb_util.c,v 1.3 1994/09/24 14:04:21 g89r4222 Exp $
|
||||
* $Id: kdb_util.c,v 1.1.1.1 1994/09/30 14:49:57 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: kdb_util.c,v 1.3 1994/09/24 14:04:21 g89r4222 Exp $";
|
||||
"$Id: kdb_util.c,v 1.1.1.1 1994/09/30 14:49:57 csgr Exp $";
|
||||
#endif lint
|
||||
|
||||
#include <stdio.h>
|
||||
|
@ -62,7 +62,7 @@ main(argc, argv)
|
|||
char *db_name;
|
||||
|
||||
progname = prog;
|
||||
|
||||
|
||||
if (argc != 3 && argc != 4) {
|
||||
fprintf(stderr, "Usage: %s operation file-name [database name].\n",
|
||||
argv[0]);
|
||||
|
@ -77,7 +77,7 @@ main(argc, argv)
|
|||
perror("Can't open database");
|
||||
exit(1);
|
||||
}
|
||||
|
||||
|
||||
if (!strcmp(argv[1], "load"))
|
||||
op = OP_LOAD;
|
||||
else if (!strcmp(argv[1], "dump"))
|
||||
|
@ -134,7 +134,7 @@ main(argc, argv)
|
|||
break;
|
||||
case OP_CONVERT_OLD_DB:
|
||||
convert_old_format_db (db_name, file);
|
||||
printf("Don't forget to do a `kdb_util load %s' to reload the database!\n", file_name);
|
||||
printf("Don't forget to do a `kdb_util load %s' to reload the database!\n", file_name);
|
||||
break;
|
||||
}
|
||||
exit(0);
|
||||
|
@ -148,7 +148,7 @@ clear_secrets ()
|
|||
bzero((char *)new_master_key_schedule, sizeof (Key_schedule));
|
||||
}
|
||||
|
||||
/* cv_key is a procedure which takes a principle and changes its key,
|
||||
/* cv_key is a procedure which takes a principle and changes its key,
|
||||
either for a new method of encrypting the keys, or a new master key.
|
||||
if cv_key is null no transformation of key is done (other than net byte
|
||||
order). */
|
||||
|
@ -163,7 +163,7 @@ static int dump_db_1(arg, principal)
|
|||
Principal *principal;
|
||||
{ /* replace null strings with "*" */
|
||||
struct callback_args *a = (struct callback_args *)arg;
|
||||
|
||||
|
||||
if (principal->instance[0] == '\0') {
|
||||
principal->instance[0] = '*';
|
||||
principal->instance[1] = '\0';
|
||||
|
@ -205,7 +205,7 @@ dump_db (db_file, output_file, cv_key)
|
|||
|
||||
a.cv_key = cv_key;
|
||||
a.output_file = output_file;
|
||||
|
||||
|
||||
kerb_db_iterate (dump_db_1, (char *)&a);
|
||||
return fflush(output_file);
|
||||
}
|
||||
|
@ -432,7 +432,7 @@ convert_old_format_db (db_file, out)
|
|||
|
||||
/*
|
||||
* now use the master key to decrypt (old style) the key in the db, had better
|
||||
* be the same!
|
||||
* be the same!
|
||||
*/
|
||||
bcopy((char *)&principal_data[0].key_low, (char *)key_from_db, 4);
|
||||
bcopy((char *)&principal_data[0].key_high,
|
||||
|
@ -451,7 +451,7 @@ convert_old_format_db (db_file, out)
|
|||
fprintf(stderr, "does not match database.\n");
|
||||
exit (-1);
|
||||
}
|
||||
|
||||
|
||||
fprintf(stderr, "Master key verified.\n");
|
||||
(void) fflush(stderr);
|
||||
|
||||
|
@ -468,14 +468,14 @@ register char *cp;
|
|||
int local;
|
||||
|
||||
zaptime(&tp); /* clear out the struct */
|
||||
|
||||
|
||||
if (strlen(cp) > 10) { /* new format */
|
||||
(void) strncpy(wbuf, cp, 4);
|
||||
wbuf[4] = 0;
|
||||
tp.tm_year = atoi(wbuf);
|
||||
cp += 4; /* step over the year */
|
||||
local = 0; /* GMT */
|
||||
} else { /* old format: local time,
|
||||
} else { /* old format: local time,
|
||||
year is 2 digits, assuming 19xx */
|
||||
wbuf[0] = *cp++;
|
||||
wbuf[1] = *cp++;
|
||||
|
@ -492,11 +492,11 @@ register char *cp;
|
|||
wbuf[0] = *cp++;
|
||||
wbuf[1] = *cp++;
|
||||
tp.tm_mday = atoi(wbuf);
|
||||
|
||||
|
||||
wbuf[0] = *cp++;
|
||||
wbuf[1] = *cp++;
|
||||
tp.tm_hour = atoi(wbuf);
|
||||
|
||||
|
||||
wbuf[0] = *cp++;
|
||||
wbuf[1] = *cp++;
|
||||
tp.tm_min = atoi(wbuf);
|
||||
|
|
|
@ -1,21 +1,21 @@
|
|||
/*
|
||||
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
|
||||
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
|
||||
* For copying and distribution information, please see the file
|
||||
* <Copyright.MIT>.
|
||||
* <Copyright.MIT>.
|
||||
*
|
||||
* This program causes Kerberos tickets to be destroyed.
|
||||
* Options are:
|
||||
* Options are:
|
||||
*
|
||||
* -q[uiet] - no bell even if tickets not destroyed
|
||||
* -f[orce] - no message printed at all
|
||||
* -f[orce] - no message printed at all
|
||||
*
|
||||
* from: kdestroy.c,v 4.5 88/03/18 15:16:02 steiner Exp $
|
||||
* $Id: kdestroy.c,v 1.2 1994/07/19 19:24:16 g89r4222 Exp $
|
||||
* $Id: kdestroy.c,v 1.1.1.1 1994/09/30 14:49:57 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: kdestroy.c,v 1.2 1994/07/19 19:24:16 g89r4222 Exp $";
|
||||
"$Id: kdestroy.c,v 1.1.1.1 1994/09/30 14:49:57 csgr Exp $";
|
||||
#endif lint
|
||||
|
||||
#include <stdio.h>
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
# From: @(#)Makefile 5.1 (Berkeley) 6/25/90
|
||||
# $Id: Makefile,v 1.2 1994/07/19 19:24:22 g89r4222 Exp $
|
||||
# $Id: Makefile,v 1.1.1.1 1994/09/30 14:49:57 csgr Exp $
|
||||
|
||||
PROG= kerberos
|
||||
SRCS= kerberos.c cr_err_reply.c
|
||||
CFLAGS+=-DKERBEROS -DDEBUG -I${.CURDIR}/../include
|
||||
CFLAGS+=-DKERBEROS -DDEBUG -I${.CURDIR}/../include
|
||||
DPADD= ${LIBKDB} ${LIBKRB} ${LIBDES}
|
||||
LDADD= -L${KDBOBJDIR} -lkdb -L${KRBOBJDIR} -lkrb -L${DESOBJDIR} -ldes
|
||||
NOMAN= noman
|
||||
|
|
|
@ -5,12 +5,12 @@
|
|||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: cr_err_reply.c,v 4.10 89/01/10 11:34:42 steiner Exp $
|
||||
* $Id: cr_err_reply.c,v 1.1 1994/07/19 19:24:24 g89r4222 Exp $
|
||||
* $Id: cr_err_reply.c,v 1.1.1.1 1994/09/30 14:49:57 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: cr_err_reply.c,v 1.1 1994/07/19 19:24:24 g89r4222 Exp $";
|
||||
"$Id: cr_err_reply.c,v 1.1.1.1 1994/09/30 14:49:57 csgr Exp $";
|
||||
#endif /* lint */
|
||||
|
||||
#include <sys/types.h>
|
||||
|
@ -30,28 +30,28 @@ extern int req_act_vno; /* this is defined in the kerberos
|
|||
* and an error string as arguments. Its return value is undefined.
|
||||
*
|
||||
* The packet is built in the following format:
|
||||
*
|
||||
*
|
||||
* type variable data
|
||||
* or constant
|
||||
* ---- ----------- ----
|
||||
*
|
||||
* unsigned char req_ack_vno protocol version number
|
||||
*
|
||||
*
|
||||
* unsigned char AUTH_MSG_ERR_REPLY protocol message type
|
||||
*
|
||||
*
|
||||
* [least significant HOST_BYTE_ORDER sender's (server's) byte
|
||||
* bit of above field] order
|
||||
*
|
||||
*
|
||||
* string pname principal's name
|
||||
*
|
||||
*
|
||||
* string pinst principal's instance
|
||||
*
|
||||
*
|
||||
* string prealm principal's realm
|
||||
*
|
||||
*
|
||||
* unsigned long time_ws client's timestamp
|
||||
*
|
||||
*
|
||||
* unsigned long e error code
|
||||
*
|
||||
*
|
||||
* string e_string error text
|
||||
*/
|
||||
|
||||
|
|
|
@ -5,12 +5,12 @@
|
|||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: kerberos.c,v 4.19 89/11/01 17:18:07 qjb Exp $
|
||||
* $Id: kerberos.c,v 1.3 1994/09/09 21:43:51 g89r4222 Exp $
|
||||
* $Id: kerberos.c,v 1.1.1.1 1994/09/30 14:49:57 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: kerberos.c,v 1.3 1994/09/09 21:43:51 g89r4222 Exp $";
|
||||
"$Id: kerberos.c,v 1.1.1.1 1994/09/30 14:49:57 csgr Exp $";
|
||||
#endif lint
|
||||
|
||||
#include <stdio.h>
|
||||
|
@ -97,7 +97,7 @@ static void hang();
|
|||
*/
|
||||
static void usage()
|
||||
{
|
||||
fprintf(stderr, "Usage: %s [-s] [-m] [-n] [-p pause_seconds]%s%s\n", progname,
|
||||
fprintf(stderr, "Usage: %s [-s] [-m] [-n] [-p pause_seconds]%s%s\n", progname,
|
||||
" [-a max_age] [-l log_file] [-r realm]"
|
||||
," [database_pathname]"
|
||||
);
|
||||
|
@ -160,7 +160,7 @@ main(argc, argv)
|
|||
break;
|
||||
case 'a':
|
||||
/* Set max age. */
|
||||
if (!isdigit(optarg[0]))
|
||||
if (!isdigit(optarg[0]))
|
||||
usage();
|
||||
max_age = atoi(optarg);
|
||||
if ((max_age < ONE_HOUR) || (max_age > THREE_DAYS)) {
|
||||
|
@ -194,9 +194,9 @@ main(argc, argv)
|
|||
|
||||
if (optind != argc)
|
||||
usage();
|
||||
|
||||
|
||||
printf("Kerberos server starting\n");
|
||||
|
||||
|
||||
if ((!nflag) && (max_age != -1))
|
||||
printf("\tMaximum database age: %d seconds\n", max_age);
|
||||
if (pause_int != -1)
|
||||
|
@ -205,12 +205,12 @@ main(argc, argv)
|
|||
printf("\tSleep forever on error\n");
|
||||
if (mflag)
|
||||
printf("\tMaster key will be entered manually\n");
|
||||
|
||||
|
||||
printf("\tLog file is %s\n", lflag ? log_file : KRBLOG);
|
||||
|
||||
if (lflag)
|
||||
kset_logfile(log_file);
|
||||
|
||||
|
||||
/* find our hostname, and use it as the instance */
|
||||
if (gethostname(k_instance, INST_SZ)) {
|
||||
fprintf(stderr, "%s: gethostname error\n", progname);
|
||||
|
@ -249,7 +249,7 @@ main(argc, argv)
|
|||
|
||||
/* Make sure database isn't stale */
|
||||
check_db_age();
|
||||
|
||||
|
||||
/* setup master key */
|
||||
if (kdb_get_master_key (mflag, master_key, master_key_schedule) != 0) {
|
||||
klog (L_KRB_PERR, "kerberos: couldn't get master key.\n");
|
||||
|
@ -449,7 +449,7 @@ kerberos(client, pkt)
|
|||
|
||||
/*
|
||||
* get the user's key, unseal it from the server's key, and
|
||||
* use it to seal the cipher
|
||||
* use it to seal the cipher
|
||||
*/
|
||||
|
||||
/* a_name_data.key_low a_name_data.key_high */
|
||||
|
@ -457,7 +457,7 @@ kerberos(client, pkt)
|
|||
bcopy(&a_name_data.key_high, ((long *) key) + 1, 4);
|
||||
|
||||
/* unseal the a_name key from the master key */
|
||||
kdb_encrypt_key(key, key, master_key,
|
||||
kdb_encrypt_key(key, key, master_key,
|
||||
master_key_schedule, DECRYPT);
|
||||
|
||||
create_ciph(ciph, session_key, s_name_data.name,
|
||||
|
@ -616,10 +616,10 @@ kerberos(client, pkt)
|
|||
|
||||
|
||||
/*
|
||||
* setup_disc
|
||||
* setup_disc
|
||||
*
|
||||
* disconnect all descriptors, remove ourself from the process
|
||||
* group that spawned us.
|
||||
* group that spawned us.
|
||||
*/
|
||||
|
||||
setup_disc()
|
||||
|
@ -648,7 +648,7 @@ setup_disc()
|
|||
|
||||
/*
|
||||
* kerb_er_reply creates an error reply packet and sends it to the
|
||||
* client.
|
||||
* client.
|
||||
*/
|
||||
|
||||
kerb_err_reply(client, pkt, err, string)
|
||||
|
@ -680,7 +680,7 @@ kerb_err_reply(client, pkt, err, string)
|
|||
static void check_db_age()
|
||||
{
|
||||
long age;
|
||||
|
||||
|
||||
if (max_age != -1) {
|
||||
/* Requires existance of kerb_get_db_age() */
|
||||
gettimeofday(&kerb_time, 0);
|
||||
|
@ -712,16 +712,16 @@ check_princ(p_name, instance, lifetime, p)
|
|||
klog(L_ALL_REQ,
|
||||
"Principal: \"%s\", Instance: \"%s\" Lifetime = %d n = %d",
|
||||
p_name, instance, lifetime, n, 0);
|
||||
|
||||
|
||||
if (n < 0) {
|
||||
lt = klog(L_KRB_PERR, "Database unavailable!");
|
||||
hang();
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* if more than one p_name, pick one, randomly create a session key,
|
||||
* compute maximum lifetime, lookup authorizations if applicable,
|
||||
* and stuff into cipher.
|
||||
* and stuff into cipher.
|
||||
*/
|
||||
if (n == 0) {
|
||||
/* service unknown, log error, skip to next request */
|
||||
|
|
|
@ -1,13 +1,13 @@
|
|||
/*
|
||||
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
|
||||
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
|
||||
* For copying and distribution information, please see the file
|
||||
* <Copyright.MIT>.
|
||||
* <Copyright.MIT>.
|
||||
*
|
||||
* Routine to initialize user to Kerberos. Prompts optionally for
|
||||
* user, instance and realm. Authenticates user and gets a ticket
|
||||
* for the Kerberos ticket-granting service for future use.
|
||||
* for the Kerberos ticket-granting service for future use.
|
||||
*
|
||||
* Options are:
|
||||
* Options are:
|
||||
*
|
||||
* -i[instance]
|
||||
* -r[realm]
|
||||
|
@ -15,12 +15,12 @@
|
|||
* -l[ifetime]
|
||||
*
|
||||
* from: kinit.c,v 4.12 90/03/20 16:11:15 jon Exp $
|
||||
* $Id: kinit.c,v 1.2 1994/07/19 19:24:33 g89r4222 Exp $
|
||||
* $Id: kinit.c,v 1.1.1.1 1994/09/30 14:49:58 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: kinit.c,v 1.2 1994/07/19 19:24:33 g89r4222 Exp $";
|
||||
"$Id: kinit.c,v 1.1.1.1 1994/09/30 14:49:58 csgr Exp $";
|
||||
#endif lint
|
||||
|
||||
#include <stdio.h>
|
||||
|
@ -151,7 +151,7 @@ main(argc, argv)
|
|||
strncpy(aname, pwd->pw_name, sizeof(aname));
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
if (!*aname)
|
||||
exit(0);
|
||||
if (!k_isname(aname)) {
|
||||
|
|
|
@ -1,18 +1,18 @@
|
|||
/*
|
||||
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
|
||||
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
|
||||
* For copying and distribution information, please see the file
|
||||
* <Copyright.MIT>.
|
||||
* <Copyright.MIT>.
|
||||
*
|
||||
* Lists your current Kerberos tickets.
|
||||
* Written by Bill Sommerfeld, MIT Project Athena.
|
||||
*
|
||||
* from: klist.c,v 4.15 89/08/30 11:19:16 jtkohl Exp $
|
||||
* $Id: klist.c,v 1.2 1994/07/19 19:24:38 g89r4222 Exp $
|
||||
* $Id: klist.c,v 1.1.1.1 1994/09/30 14:49:58 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: klist.c,v 1.2 1994/07/19 19:24:38 g89r4222 Exp $";
|
||||
"$Id: klist.c,v 1.1.1.1 1994/09/30 14:49:58 csgr Exp $";
|
||||
#endif lint
|
||||
|
||||
#include <stdio.h>
|
||||
|
@ -97,11 +97,11 @@ int tgt_test, long_form;
|
|||
if (long_form)
|
||||
printf("Ticket file: %s\n", file);
|
||||
|
||||
/*
|
||||
* Since krb_get_tf_realm will return a ticket_file error,
|
||||
/*
|
||||
* Since krb_get_tf_realm will return a ticket_file error,
|
||||
* we will call tf_init and tf_close first to filter out
|
||||
* things like no ticket file. Otherwise, the error that
|
||||
* the user would see would be
|
||||
* things like no ticket file. Otherwise, the error that
|
||||
* the user would see would be
|
||||
* klist: can't find realm of ticket file: No ticket file (tf_util)
|
||||
* instead of
|
||||
* klist: No ticket file (tf_util)
|
||||
|
@ -116,7 +116,7 @@ int tgt_test, long_form;
|
|||
/* Close ticket file */
|
||||
(void) tf_close();
|
||||
|
||||
/*
|
||||
/*
|
||||
* We must find the realm of the ticket file here before calling
|
||||
* tf_init because since the realm of the ticket file is not
|
||||
* really stored in the principal section of the file, the
|
||||
|
@ -143,13 +143,13 @@ int tgt_test, long_form;
|
|||
exit(1);
|
||||
}
|
||||
|
||||
/*
|
||||
/*
|
||||
* You may think that this is the obvious place to get the
|
||||
* realm of the ticket file, but it can't be done here as the
|
||||
* routine to do this must open the ticket file. This is why
|
||||
* routine to do this must open the ticket file. This is why
|
||||
* it was done before tf_init.
|
||||
*/
|
||||
|
||||
|
||||
if (!tgt_test && long_form)
|
||||
printf("Principal:\t%s%s%s%s%s\n\n", pname,
|
||||
(pinst[0] ? "." : ""), pinst,
|
||||
|
@ -218,7 +218,7 @@ char *file;
|
|||
int count;
|
||||
|
||||
printf("Server key file: %s\n", file);
|
||||
|
||||
|
||||
if ((stab = open(file, O_RDONLY, 0400)) < 0) {
|
||||
perror(file);
|
||||
exit(1);
|
||||
|
|
|
@ -5,12 +5,12 @@
|
|||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: create_auth_reply.c,v 4.10 89/01/13 17:47:38 steiner Exp $
|
||||
* $Id: create_auth_reply.c,v 1.2 1994/07/19 19:24:56 g89r4222 Exp $
|
||||
* $Id: create_auth_reply.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char *rcsid =
|
||||
"$Id: create_auth_reply.c,v 1.2 1994/07/19 19:24:56 g89r4222 Exp $";
|
||||
"$Id: create_auth_reply.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $";
|
||||
#endif /* lint */
|
||||
|
||||
#include <krb.h>
|
||||
|
@ -30,34 +30,34 @@ static char *rcsid =
|
|||
* must copy it elsewhere.
|
||||
*
|
||||
* The packet is built in the following format:
|
||||
*
|
||||
*
|
||||
* variable
|
||||
* type or constant data
|
||||
* ---- ----------- ----
|
||||
*
|
||||
*
|
||||
* unsigned char KRB_PROT_VERSION protocol version number
|
||||
*
|
||||
*
|
||||
* unsigned char AUTH_MSG_KDC_REPLY protocol message type
|
||||
*
|
||||
*
|
||||
* [least significant HOST_BYTE_ORDER sender's (server's) byte
|
||||
* bit of above field] order
|
||||
*
|
||||
*
|
||||
* string pname principal's name
|
||||
*
|
||||
*
|
||||
* string pinst principal's instance
|
||||
*
|
||||
*
|
||||
* string prealm principal's realm
|
||||
*
|
||||
*
|
||||
* unsigned long time_ws client's timestamp
|
||||
*
|
||||
*
|
||||
* unsigned char n number of tickets
|
||||
*
|
||||
*
|
||||
* unsigned long x_date expiration date
|
||||
*
|
||||
*
|
||||
* unsigned char kvno master key version
|
||||
*
|
||||
*
|
||||
* short w_1 cipher length
|
||||
*
|
||||
*
|
||||
* --- cipher->dat cipher data
|
||||
*/
|
||||
|
||||
|
|
|
@ -5,12 +5,12 @@
|
|||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: create_ciph.c,v 4.8 89/05/18 21:24:26 jis Exp $
|
||||
* $Id: create_ciph.c,v 1.2 1994/07/19 19:24:58 g89r4222 Exp $
|
||||
* $Id: create_ciph.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char *rcsid =
|
||||
"$Id: create_ciph.c,v 1.2 1994/07/19 19:24:58 g89r4222 Exp $";
|
||||
"$Id: create_ciph.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $";
|
||||
#endif /* lint */
|
||||
|
||||
#include <krb.h>
|
||||
|
@ -30,24 +30,24 @@ static char *rcsid =
|
|||
* variable
|
||||
* type or constant data
|
||||
* ---- ----------- ----
|
||||
*
|
||||
*
|
||||
*
|
||||
*
|
||||
* 8 bytes session session key for client, service
|
||||
*
|
||||
*
|
||||
* string service service name
|
||||
*
|
||||
*
|
||||
* string instance service instance
|
||||
*
|
||||
*
|
||||
* string realm KDC realm
|
||||
*
|
||||
*
|
||||
* unsigned char life ticket lifetime
|
||||
*
|
||||
*
|
||||
* unsigned char kvno service key version number
|
||||
*
|
||||
*
|
||||
* unsigned char tkt->length length of following ticket
|
||||
*
|
||||
*
|
||||
* data tkt->dat ticket for service
|
||||
*
|
||||
*
|
||||
* 4 bytes kdc_time KDC's timestamp
|
||||
*
|
||||
* <=7 bytes null null pad to 8 byte multiple
|
||||
|
|
|
@ -5,12 +5,12 @@
|
|||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: create_death_packet.c,v 4.9 89/01/17 16:05:59 rfrench Exp $
|
||||
* $Id: create_death_packet.c,v 1.2 1994/07/19 19:24:59 g89r4222 Exp $
|
||||
* $Id: create_death_packet.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char *rcsid =
|
||||
"$Id: create_death_packet.c,v 1.2 1994/07/19 19:24:59 g89r4222 Exp $";
|
||||
"$Id: create_death_packet.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $";
|
||||
#endif /* lint */
|
||||
|
||||
#include <krb.h>
|
||||
|
@ -32,12 +32,12 @@ static char *rcsid =
|
|||
* ---- ----------- ----
|
||||
*
|
||||
* unsigned char KRB_PROT_VERSION protocol version number
|
||||
*
|
||||
*
|
||||
* unsigned char AUTH_MSG_DIE message type
|
||||
*
|
||||
*
|
||||
* [least significant HOST_BYTE_ORDER byte order of sender
|
||||
* bit of above field]
|
||||
*
|
||||
*
|
||||
* string a_name presumably, name of
|
||||
* principal sending killer
|
||||
* packet
|
||||
|
|
|
@ -1,16 +1,16 @@
|
|||
/*
|
||||
/*
|
||||
* Copyright 1985, 1986, 1987, 1988 by the Massachusetts Institute
|
||||
* of Technology.
|
||||
* For copying and distribution information, please see the file
|
||||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: create_ticket.c,v 4.11 89/03/22 14:43:23 jtkohl Exp $
|
||||
* $Id: create_ticket.c,v 1.2 1994/07/19 19:25:01 g89r4222 Exp $
|
||||
* $Id: create_ticket.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: create_ticket.c,v 1.2 1994/07/19 19:25:01 g89r4222 Exp $";
|
||||
"$Id: create_ticket.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $";
|
||||
#endif /* lint */
|
||||
|
||||
#include <stdio.h>
|
||||
|
@ -35,35 +35,35 @@ static char rcsid[] =
|
|||
* corresponding changes should also be made to that file.
|
||||
*
|
||||
* The packet is built in the following format:
|
||||
*
|
||||
*
|
||||
* variable
|
||||
* type or constant data
|
||||
* ---- ----------- ----
|
||||
*
|
||||
* tkt->length length of ticket (multiple of 8 bytes)
|
||||
*
|
||||
*
|
||||
* tkt->dat:
|
||||
*
|
||||
*
|
||||
* unsigned char flags namely, HOST_BYTE_ORDER
|
||||
*
|
||||
*
|
||||
* string pname client's name
|
||||
*
|
||||
*
|
||||
* string pinstance client's instance
|
||||
*
|
||||
*
|
||||
* string prealm client's realm
|
||||
*
|
||||
*
|
||||
* 4 bytes paddress client's address
|
||||
*
|
||||
*
|
||||
* 8 bytes session session key
|
||||
*
|
||||
*
|
||||
* 1 byte life ticket lifetime
|
||||
*
|
||||
*
|
||||
* 4 bytes time_sec KDC timestamp
|
||||
*
|
||||
*
|
||||
* string sname service's name
|
||||
*
|
||||
*
|
||||
* string sinstance service's instance
|
||||
*
|
||||
*
|
||||
* <=7 bytes null null pad to 8 byte multiple
|
||||
*
|
||||
*/
|
||||
|
|
|
@ -11,7 +11,7 @@
|
|||
* are met:
|
||||
* 1. Redistributions of source code must retain the entire comment,
|
||||
* including the above copyright notice, this list of conditions
|
||||
* and the following disclaimer, verbatim, at the beginning of
|
||||
* and the following disclaimer, verbatim, at the beginning of
|
||||
* the source file.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
|
@ -35,7 +35,7 @@
|
|||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* $Id: des_rw.c,v 1.5 1994/09/24 18:54:41 g89r4222 Exp $
|
||||
* $Id: des_rw.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $
|
||||
*/
|
||||
|
||||
/*
|
||||
|
@ -61,11 +61,11 @@
|
|||
* +--+--+--+--+--+--+--+--+
|
||||
* | garbage | data |
|
||||
* | |
|
||||
* +-----------------------+----> des_pcbc_encrypt() -->
|
||||
* +-----------------------+----> des_pcbc_encrypt() -->
|
||||
*
|
||||
* (Note that the length field sent before the actual message specifies
|
||||
* the number of data bytes, not the length of the entire padded message.
|
||||
*
|
||||
*
|
||||
* When data is read, if the message received is longer than the number
|
||||
* of bytes requested, then the remaining bytes are stored until the
|
||||
* following call to des_read(). If the number of bytes received is
|
||||
|
@ -160,7 +160,7 @@ int des_read(fd, buf, len)
|
|||
stored -= len;
|
||||
buff_ptr += len;
|
||||
return(len);
|
||||
} else {
|
||||
} else {
|
||||
if (stored) {
|
||||
bcopy(buff_ptr, buf, stored);
|
||||
nreturned = stored;
|
||||
|
@ -184,11 +184,11 @@ int des_read(fd, buf, len)
|
|||
if(nread != pad_length)
|
||||
return(0);
|
||||
|
||||
des_pcbc_encrypt((des_cblock*) des_buff, (des_cblock*) buff_ptr,
|
||||
des_pcbc_encrypt((des_cblock*) des_buff, (des_cblock*) buff_ptr,
|
||||
(msg_length < 8 ? 8 : msg_length),
|
||||
key_sched, (des_cblock*) &des_key, DES_DECRYPT);
|
||||
|
||||
|
||||
|
||||
if(msg_length < 8)
|
||||
buff_ptr += (8 - msg_length);
|
||||
stored = msg_length;
|
||||
|
@ -237,7 +237,7 @@ int des_write(fd, buf, len)
|
|||
|
||||
for(i = 0 ; i < 8 ; i+= sizeof(long)) {
|
||||
rnd = random();
|
||||
bcopy(&rnd, garbage+i,
|
||||
bcopy(&rnd, garbage+i,
|
||||
(i <= (8 - sizeof(long)))?sizeof(long):(8-i));
|
||||
}
|
||||
bcopy(buf, garbage + 8 - len, len);
|
||||
|
@ -253,7 +253,7 @@ int des_write(fd, buf, len)
|
|||
|
||||
|
||||
write_len = htonl(len);
|
||||
if(write(fd, &write_len, sizeof(write_len)) != sizeof(write_len))
|
||||
if(write(fd, &write_len, sizeof(write_len)) != sizeof(write_len))
|
||||
return(-1);
|
||||
if(write(fd, des_buff, pad_len) != pad_len)
|
||||
return(-1);
|
||||
|
|
|
@ -5,12 +5,12 @@
|
|||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: dest_tkt.c,v 4.9 89/10/02 16:23:07 jtkohl Exp $
|
||||
* $Id: dest_tkt.c,v 1.2 1994/07/19 19:25:07 g89r4222 Exp $
|
||||
* $Id: dest_tkt.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char *rcsid =
|
||||
"$Id: dest_tkt.c,v 1.2 1994/07/19 19:25:07 g89r4222 Exp $";
|
||||
"$Id: dest_tkt.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $";
|
||||
#endif /* lint */
|
||||
|
||||
#include <stdio.h>
|
||||
|
@ -75,8 +75,8 @@ dest_tkt()
|
|||
if (errno == ENOENT) return RET_TKFIL;
|
||||
else if (errno != 0) return KFAILURE;
|
||||
#ifdef TKT_SHMEM
|
||||
/*
|
||||
* handle the shared memory case
|
||||
/*
|
||||
* handle the shared memory case
|
||||
*/
|
||||
(void) strcpy(shmidname, file);
|
||||
(void) strcat(shmidname, ".shm");
|
||||
|
|
|
@ -1,15 +1,15 @@
|
|||
/*
|
||||
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
|
||||
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
|
||||
* For copying and distribution information, please see the file
|
||||
* <Copyright.MIT>.
|
||||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: fgetst.c,v 4.0 89/01/23 10:08:31 jtkohl Exp $
|
||||
* $Id: fgetst.c,v 1.2 1994/07/19 19:25:10 g89r4222 Exp $
|
||||
* $Id: fgetst.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: fgetst.c,v 1.2 1994/07/19 19:25:10 g89r4222 Exp $";
|
||||
"$Id: fgetst.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $";
|
||||
#endif /* lint */
|
||||
|
||||
#include <stdio.h>
|
||||
|
@ -20,7 +20,7 @@ static char rcsid[] =
|
|||
* until it reads a null byte. When finished, what has been read exists
|
||||
* in "s". If "count" characters were actually read, the last is changed
|
||||
* to a null, so the returned string is always null-terminated. fgetst
|
||||
* returns the number of characters read, including the null terminator.
|
||||
* returns the number of characters read, including the null terminator.
|
||||
*/
|
||||
|
||||
fgetst(f, s, n)
|
||||
|
|
|
@ -5,12 +5,12 @@
|
|||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: get_ad_tkt.c,v 4.15 89/07/07 15:18:51 jtkohl Exp $
|
||||
* $Id: get_ad_tkt.c,v 1.2 1994/07/19 19:25:11 g89r4222 Exp $
|
||||
* $Id: get_ad_tkt.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: get_ad_tkt.c,v 1.2 1994/07/19 19:25:11 g89r4222 Exp $";
|
||||
"$Id: get_ad_tkt.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $";
|
||||
#endif /* lint */
|
||||
|
||||
#include <krb.h>
|
||||
|
@ -55,7 +55,7 @@ unsigned long rep_err_code;
|
|||
*
|
||||
* TEXT original contents of authenticator+ticket
|
||||
* pkt->dat built in krb_mk_req call
|
||||
*
|
||||
*
|
||||
* 4 bytes time_ws always 0 (?)
|
||||
* char lifetime lifetime argument passed
|
||||
* string service service name argument
|
||||
|
@ -106,12 +106,12 @@ get_ad_tkt(service,sinstance,realm,lifetime)
|
|||
|
||||
/*
|
||||
* Look for the session key (and other stuff we don't need)
|
||||
* in the ticket file for krbtgt.realm@lrealm where "realm"
|
||||
* is the service's realm (passed in "realm" argument) and
|
||||
* lrealm is the realm of our initial ticket. If we don't
|
||||
* in the ticket file for krbtgt.realm@lrealm where "realm"
|
||||
* is the service's realm (passed in "realm" argument) and
|
||||
* lrealm is the realm of our initial ticket. If we don't
|
||||
* have this, we will try to get it.
|
||||
*/
|
||||
|
||||
|
||||
if ((kerror = krb_get_cred("krbtgt",realm,lrealm,&cr)) != KSUCCESS) {
|
||||
/*
|
||||
* If realm == lrealm, we have no hope, so let's not even try.
|
||||
|
@ -119,20 +119,20 @@ get_ad_tkt(service,sinstance,realm,lifetime)
|
|||
if ((strncmp(realm, lrealm, REALM_SZ)) == 0)
|
||||
return(AD_NOTGT);
|
||||
else{
|
||||
if ((kerror =
|
||||
if ((kerror =
|
||||
get_ad_tkt("krbtgt",realm,lrealm,lifetime)) != KSUCCESS)
|
||||
return(kerror);
|
||||
if ((kerror = krb_get_cred("krbtgt",realm,lrealm,&cr)) != KSUCCESS)
|
||||
return(kerror);
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* Make up a request packet to the "krbtgt.realm@lrealm".
|
||||
* Start by calling krb_mk_req() which puts ticket+authenticator
|
||||
* into "pkt". Then tack other stuff on the end.
|
||||
*/
|
||||
|
||||
|
||||
kerror = krb_mk_req(pkt,"krbtgt",realm,lrealm,0L);
|
||||
|
||||
if (kerror)
|
||||
|
|
|
@ -5,12 +5,12 @@
|
|||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: get_cred.c,v 4.10 89/05/31 17:46:22 jtkohl Exp $
|
||||
* $Id: get_cred.c,v 1.2 1994/07/19 19:25:14 g89r4222 Exp $
|
||||
* $Id: get_cred.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char *rcsid =
|
||||
"$Id: get_cred.c,v 1.2 1994/07/19 19:25:14 g89r4222 Exp $";
|
||||
"$Id: get_cred.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $";
|
||||
#endif /* lint */
|
||||
|
||||
#include <stdio.h>
|
||||
|
@ -44,7 +44,7 @@ krb_get_cred(service,instance,realm,c)
|
|||
return (tf_status);
|
||||
|
||||
/* Search for requested service credentials and copy into c */
|
||||
|
||||
|
||||
while ((tf_status = tf_get_cred(c)) == KSUCCESS) {
|
||||
/* Is this the right ticket? */
|
||||
if ((strcmp(c->service,service) == 0) &&
|
||||
|
|
|
@ -4,12 +4,12 @@
|
|||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: get_in_tkt.c,v 4.12 89/07/18 16:32:56 jtkohl Exp $
|
||||
* $Id: get_in_tkt.c,v 1.2 1994/07/19 19:25:16 g89r4222 Exp $
|
||||
* $Id: get_in_tkt.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: get_in_tkt.c,v 1.2 1994/07/19 19:25:16 g89r4222 Exp $";
|
||||
"$Id: get_in_tkt.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $";
|
||||
#endif /* lint */
|
||||
|
||||
#include <krb.h>
|
||||
|
@ -69,7 +69,7 @@ static int passwd_to_key(user,instance,realm,passwd,key)
|
|||
* krb_get_pw_in_tkt() passes two additional arguments to krb_get_in_tkt():
|
||||
* the name of a routine (passwd_to_key()) to be used to get the
|
||||
* password in case the "password" argument is null and NULL for the
|
||||
* decryption procedure indicating that krb_get_in_tkt should use the
|
||||
* decryption procedure indicating that krb_get_in_tkt should use the
|
||||
* default method of decrypting the response from the KDC.
|
||||
*
|
||||
* The result of the call to krb_get_in_tkt() is returned.
|
||||
|
@ -86,8 +86,8 @@ krb_get_pw_in_tkt(user,instance,realm,service,sinstance,life,password)
|
|||
|
||||
#ifdef NOENCRYPTION
|
||||
/*
|
||||
* $Source: /home/CVS/src/eBones/krb/get_in_tkt.c,v $
|
||||
* $Author: g89r4222 $
|
||||
* $Source: /home/ncvs/src/eBones/krb/get_in_tkt.c,v $
|
||||
* $Author: csgr $
|
||||
*
|
||||
* Copyright 1985, 1986, 1987, 1988 by the Massachusetts Institute
|
||||
* of Technology.
|
||||
|
@ -102,7 +102,7 @@ krb_get_pw_in_tkt(user,instance,realm,service,sinstance,life,password)
|
|||
|
||||
#ifndef lint
|
||||
static char rcsid_read_password_c[] =
|
||||
"Bones$Header: /home/CVS/src/eBones/krb/get_in_tkt.c,v 1.2 1994/07/19 19:25:16 g89r4222 Exp $";
|
||||
"Bones$Header: /home/ncvs/src/eBones/krb/get_in_tkt.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $";
|
||||
#endif lint
|
||||
|
||||
#include <des.h>
|
||||
|
@ -170,7 +170,7 @@ placebo_read_pw_string(s,max,prompt,verify)
|
|||
{
|
||||
int ok = 0;
|
||||
char *ptr;
|
||||
|
||||
|
||||
#ifdef BSDUNIX
|
||||
jmp_buf old_env;
|
||||
struct sgttyb tty_state;
|
||||
|
@ -187,7 +187,7 @@ placebo_read_pw_string(s,max,prompt,verify)
|
|||
goto lose;
|
||||
|
||||
/* save terminal state*/
|
||||
if (ioctl(0,TIOCGETP,&tty_state) == -1)
|
||||
if (ioctl(0,TIOCGETP,&tty_state) == -1)
|
||||
return -1;
|
||||
|
||||
push_signals();
|
||||
|
|
|
@ -5,12 +5,12 @@
|
|||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: get_krbhst.c,v 4.8 89/01/22 20:00:29 rfrench Exp $
|
||||
* $Id: get_krbhst.c,v 1.2 1994/07/19 19:25:17 g89r4222 Exp $
|
||||
* $Id: get_krbhst.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char *rcsid =
|
||||
"$Id: get_krbhst.c,v 1.2 1994/07/19 19:25:17 g89r4222 Exp $";
|
||||
"$Id: get_krbhst.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $";
|
||||
#endif /* lint */
|
||||
|
||||
#include <stdio.h>
|
||||
|
@ -33,7 +33,7 @@ static char *rcsid =
|
|||
*
|
||||
* The KRB_CONF file contains the name of the local realm in the first
|
||||
* line (not used by this routine), followed by lines indicating realm/host
|
||||
* entries. The words "admin server" following the hostname indicate that
|
||||
* entries. The words "admin server" following the hostname indicate that
|
||||
* the host provides an administrative database server.
|
||||
*
|
||||
* For example:
|
||||
|
|
|
@ -4,12 +4,12 @@
|
|||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: get_svc_in_tkt.c,v 4.9 89/07/18 16:33:34 jtkohl Exp $
|
||||
* $Id: get_svc_in_tkt.c,v 1.2 1994/07/19 19:25:26 g89r4222 Exp $
|
||||
* $Id: get_svc_in_tkt.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: get_svc_in_tkt.c,v 1.2 1994/07/19 19:25:26 g89r4222 Exp $";
|
||||
"$Id: get_svc_in_tkt.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $";
|
||||
#endif /* lint */
|
||||
|
||||
#include <krb.h>
|
||||
|
@ -57,7 +57,7 @@ static int srvtab_to_key(user, instance, realm, srvtab, key)
|
|||
* krb_get_svc_in_tkt() passes its arguments on to krb_get_in_tkt(),
|
||||
* plus two additional arguments: a pointer to the srvtab_to_key()
|
||||
* function to be used to get the key from the key file and a NULL
|
||||
* for the decryption procedure indicating that krb_get_in_tkt should
|
||||
* for the decryption procedure indicating that krb_get_in_tkt should
|
||||
* use the default method of decrypting the response from the KDC.
|
||||
*
|
||||
* It returns the return value of the krb_get_in_tkt() call.
|
||||
|
|
|
@ -4,12 +4,12 @@
|
|||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: get_tf_fullname.c,v 4.3 90/03/10 22:40:20 jon Exp $
|
||||
* $Id: get_tf_fullname.c,v 1.2 1994/07/19 19:25:28 g89r4222 Exp $
|
||||
* $Id: get_tf_fullname.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: get_tf_fullname.c,v 1.2 1994/07/19 19:25:28 g89r4222 Exp $";
|
||||
"$Id: get_tf_fullname.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $";
|
||||
#endif /* lint */
|
||||
|
||||
#include <krb.h>
|
||||
|
@ -22,10 +22,10 @@ static char rcsid[] =
|
|||
*/
|
||||
|
||||
/*
|
||||
* krb_get_tf_fullname() takes four arguments: the name of the
|
||||
* krb_get_tf_fullname() takes four arguments: the name of the
|
||||
* ticket file, and variables for name, instance, and realm to be
|
||||
* returned in. Since the realm of a ticket file is not really fully
|
||||
* supported, the realm used will be that of the the first ticket in
|
||||
* returned in. Since the realm of a ticket file is not really fully
|
||||
* supported, the realm used will be that of the the first ticket in
|
||||
* the file as this is the one that was obtained with a password by
|
||||
* krb_get_in_tkt().
|
||||
*/
|
||||
|
@ -45,7 +45,7 @@ krb_get_tf_fullname(ticket_file, name, instance, realm)
|
|||
if (((tf_status = tf_get_pname(c.pname)) != KSUCCESS) ||
|
||||
((tf_status = tf_get_pinst(c.pinst)) != KSUCCESS))
|
||||
return (tf_status);
|
||||
|
||||
|
||||
if (name)
|
||||
strcpy(name, c.pname);
|
||||
if (instance)
|
||||
|
@ -59,8 +59,8 @@ krb_get_tf_fullname(ticket_file, name, instance, realm)
|
|||
return(KFAILURE);
|
||||
else
|
||||
return(tf_status);
|
||||
}
|
||||
}
|
||||
(void) tf_close();
|
||||
|
||||
|
||||
return(tf_status);
|
||||
}
|
||||
|
|
|
@ -4,12 +4,12 @@
|
|||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: get_tf_realm.c,v 4.2 90/01/02 13:40:19 jtkohl Exp $
|
||||
* $Id: get_tf_realm.c,v 1.2 1994/07/19 19:25:30 g89r4222 Exp $
|
||||
* $Id: get_tf_realm.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: get_tf_realm.c,v 1.2 1994/07/19 19:25:30 g89r4222 Exp $";
|
||||
"$Id: get_tf_realm.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $";
|
||||
#endif /* lint */
|
||||
|
||||
#include <krb.h>
|
||||
|
@ -21,9 +21,9 @@ static char rcsid[] =
|
|||
*/
|
||||
|
||||
/*
|
||||
* krb_get_tf_realm() takes two arguments: the name of a ticket
|
||||
* krb_get_tf_realm() takes two arguments: the name of a ticket
|
||||
* and a variable to store the name of the realm in.
|
||||
*
|
||||
*
|
||||
*/
|
||||
|
||||
krb_get_tf_realm(ticket_file, realm)
|
||||
|
|
|
@ -6,12 +6,12 @@
|
|||
* routine to convert hostname into realm name.
|
||||
*
|
||||
* from: getrealm.c,v 4.6 90/01/02 13:35:56 jtkohl Exp $
|
||||
* $Id: getrealm.c,v 1.2 1994/07/19 19:25:31 g89r4222 Exp $
|
||||
* $Id: getrealm.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: getrealm.c,v 1.2 1994/07/19 19:25:31 g89r4222 Exp $";
|
||||
"$Id: getrealm.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $";
|
||||
#endif lint
|
||||
|
||||
#include <strings.h>
|
||||
|
@ -92,7 +92,7 @@ char *host;
|
|||
fclose(trans_file);
|
||||
return(ret_realm);
|
||||
}
|
||||
if ((trans_host[0] == '.') && domain) {
|
||||
if ((trans_host[0] == '.') && domain) {
|
||||
/* this is a domain match */
|
||||
if (!strcasecmp(trans_host, domain)) {
|
||||
/* domain match, save for later */
|
||||
|
|
|
@ -5,12 +5,12 @@
|
|||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: kt.c,v 4.9 89/10/25 19:03:35 qjb Exp $
|
||||
* $Id: in_tkt.c,v 1.5 1994/09/24 14:30:09 g89r4222 Exp $
|
||||
* $Id: in_tkt.c,v 1.1.1.1 1994/09/30 14:50:01 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: in_tkt.c,v 1.5 1994/09/24 14:30:09 g89r4222 Exp $";
|
||||
"$Id: in_tkt.c,v 1.1.1.1 1994/09/30 14:50:01 csgr Exp $";
|
||||
#endif /* lint */
|
||||
|
||||
#include <unistd.h>
|
||||
|
@ -73,7 +73,7 @@ in_tkt(pname,pinst)
|
|||
(void) close(fd);
|
||||
goto out;
|
||||
}
|
||||
|
||||
|
||||
(void) fsync(fd);
|
||||
(void) close(fd);
|
||||
}
|
||||
|
|
|
@ -5,12 +5,12 @@
|
|||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: der: krb_get_in_tkt.c,v 4.19 89/07/18 16:31:31 jtkohl Exp $
|
||||
* $Id: krb_get_in_tkt.c,v 1.2 1994/07/19 19:25:47 g89r4222 Exp $
|
||||
* $Id: krb_get_in_tkt.c,v 1.1.1.1 1994/09/30 14:50:02 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char *rcsid =
|
||||
"$Id: krb_get_in_tkt.c,v 1.2 1994/07/19 19:25:47 g89r4222 Exp $";
|
||||
"$Id: krb_get_in_tkt.c,v 1.1.1.1 1994/09/30 14:50:02 csgr Exp $";
|
||||
#endif /* lint */
|
||||
|
||||
#include <krb.h>
|
||||
|
@ -48,16 +48,16 @@ static int decrypt_tkt(user, instance, realm, arg, key_proc, cipp)
|
|||
#ifndef NOENCRYPTION
|
||||
/* Attempt to decrypt it */
|
||||
#endif
|
||||
|
||||
|
||||
/* generate a key */
|
||||
|
||||
|
||||
{
|
||||
register int rc;
|
||||
rc = (*key_proc)(user,instance,realm,arg,key);
|
||||
if (rc)
|
||||
return(rc);
|
||||
}
|
||||
|
||||
|
||||
#ifndef NOENCRYPTION
|
||||
key_sched(key,key_s);
|
||||
pcbc_encrypt((C_Block *)cip->dat,(C_Block *)cip->dat,
|
||||
|
@ -259,7 +259,7 @@ krb_get_in_tkt(user, instance, realm, service, sinstance, life,
|
|||
kvno = (unsigned char) ptr[1];
|
||||
tkt->length = (unsigned char) ptr[2];
|
||||
ptr += 3;
|
||||
|
||||
|
||||
if ((tkt->length < 0) ||
|
||||
((tkt->length + (ptr - (char *) cip->dat)) > cip->length))
|
||||
return(INTK_BADPW);
|
||||
|
|
|
@ -7,12 +7,12 @@
|
|||
* access to a local account
|
||||
*
|
||||
* from: kuserok.c,v 4.5 89/01/23 09:25:21 jtkohl Exp $
|
||||
* $Id: kuserok.c,v 1.2 1994/07/19 19:25:50 g89r4222 Exp $
|
||||
* $Id: kuserok.c,v 1.1.1.1 1994/09/30 14:50:02 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: kuserok.c,v 1.2 1994/07/19 19:25:50 g89r4222 Exp $";
|
||||
"$Id: kuserok.c,v 1.1.1.1 1994/09/30 14:50:02 csgr Exp $";
|
||||
#endif lint
|
||||
|
||||
#include <krb.h>
|
||||
|
@ -60,9 +60,9 @@ static char rcsid[] =
|
|||
* The parmtable defines the keywords we will recognize with their
|
||||
* default values, and keeps a pointer to the found value. The found
|
||||
* value should be filled in with strsave(), since FreeParameterSet()
|
||||
* will release memory for all non-NULL found strings.
|
||||
* will release memory for all non-NULL found strings.
|
||||
*
|
||||
*** NOTE WELL! ***
|
||||
*** NOTE WELL! ***
|
||||
*
|
||||
* The table below is very nice, but we cannot hard-code a default for the
|
||||
* realm: we have to get the realm via krb_get_lrealm(). Even though the
|
||||
|
@ -70,7 +70,7 @@ static char rcsid[] =
|
|||
* kuserok to whatever krb_get_lrealm() tells us. That code assumes that
|
||||
* the realm will be the entry number in the table below, so if you
|
||||
* change the order of the entries below, you have to change the
|
||||
* #definition of REALM_SCRIPT to reflect it.
|
||||
* #definition of REALM_SCRIPT to reflect it.
|
||||
*/
|
||||
#define REALM_SUBSCRIPT 1
|
||||
parmtable kparm[] = {
|
||||
|
@ -113,7 +113,7 @@ kuserok(kdata, luser)
|
|||
* if he's trying to log in as himself, and there is no .klogin file,
|
||||
* let him. To find out, call
|
||||
* krb_kntoln to convert the triple in kdata to a name which we can
|
||||
* string compare.
|
||||
* string compare.
|
||||
*/
|
||||
if (!krb_kntoln(kdata, kuser) && (strcmp(kuser, luser) == 0)) {
|
||||
return(OK);
|
||||
|
@ -141,7 +141,7 @@ kuserok(kdata, luser)
|
|||
|
||||
/*
|
||||
* change the default realm from the hard-coded value to the
|
||||
* accepted realm that Kerberos specifies.
|
||||
* accepted realm that Kerberos specifies.
|
||||
*/
|
||||
rc = krb_get_lrealm(local_realm, 1);
|
||||
if (rc == KSUCCESS)
|
||||
|
|
|
@ -16,12 +16,12 @@
|
|||
* Steve Miller Project Athena MIT/DEC
|
||||
*
|
||||
* from: mk_priv.c,v 4.13 89/03/22 14:48:59 jtkohl Exp $
|
||||
* $Id: mk_priv.c,v 1.2 1994/07/19 19:25:56 g89r4222 Exp $
|
||||
* $Id: mk_priv.c,v 1.1.1.1 1994/09/30 14:50:02 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: mk_priv.c,v 1.2 1994/07/19 19:25:56 g89r4222 Exp $";
|
||||
"$Id: mk_priv.c,v 1.1.1.1 1994/09/30 14:50:02 csgr Exp $";
|
||||
#endif /* lint */
|
||||
|
||||
/* system include files */
|
||||
|
@ -80,7 +80,7 @@ static long msg_time_sec;
|
|||
#ifndef NOENCRYPT
|
||||
* we encrypt from here with pcbc_encrypt
|
||||
#endif
|
||||
*
|
||||
*
|
||||
* 4 bytes length length of user data
|
||||
* length in user data
|
||||
* 1 byte msg_time_5ms timestamp milliseconds
|
||||
|
@ -154,15 +154,15 @@ long krb_mk_priv(in,out,length,schedule,key,sender,receiver)
|
|||
* direction bit is the sign bit of the timestamp. Ok
|
||||
* until 2038??
|
||||
*/
|
||||
/* For compatibility with broken old code, compares are done in VAX
|
||||
byte order (LSBFIRST) */
|
||||
if (lsb_net_ulong_less(sender->sin_addr.s_addr, /* src < recv */
|
||||
receiver->sin_addr.s_addr)==-1)
|
||||
msg_time_sec = -msg_time_sec;
|
||||
else if (lsb_net_ulong_less(sender->sin_addr.s_addr,
|
||||
receiver->sin_addr.s_addr)==0)
|
||||
if (lsb_net_ushort_less(sender->sin_port,receiver->sin_port) == -1)
|
||||
msg_time_sec = -msg_time_sec;
|
||||
/* For compatibility with broken old code, compares are done in VAX
|
||||
byte order (LSBFIRST) */
|
||||
if (lsb_net_ulong_less(sender->sin_addr.s_addr, /* src < recv */
|
||||
receiver->sin_addr.s_addr)==-1)
|
||||
msg_time_sec = -msg_time_sec;
|
||||
else if (lsb_net_ulong_less(sender->sin_addr.s_addr,
|
||||
receiver->sin_addr.s_addr)==0)
|
||||
if (lsb_net_ushort_less(sender->sin_port,receiver->sin_port) == -1)
|
||||
msg_time_sec = -msg_time_sec;
|
||||
/* stuff time sec */
|
||||
bcopy((char *)&msg_time_sec,(char *)p,sizeof(msg_time_sec));
|
||||
p += sizeof(msg_time_sec);
|
||||
|
|
|
@ -5,12 +5,12 @@
|
|||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: der: mk_req.c,v 4.17 89/07/07 15:20:35 jtkohl Exp $
|
||||
* $Id: mk_req.c,v 1.2 1994/07/19 19:25:57 g89r4222 Exp $
|
||||
* $Id: mk_req.c,v 1.1.1.1 1994/09/30 14:50:02 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char *rcsid =
|
||||
"$Id: mk_req.c,v 1.2 1994/07/19 19:25:57 g89r4222 Exp $";
|
||||
"$Id: mk_req.c,v 1.1.1.1 1994/09/30 14:50:02 csgr Exp $";
|
||||
#endif /* lint */
|
||||
|
||||
#include <krb.h>
|
||||
|
@ -95,14 +95,14 @@ krb_mk_req(authent,service,instance,realm,checksum)
|
|||
/* Get the ticket and move it into the authenticator */
|
||||
if (krb_ap_req_debug)
|
||||
printf("Realm: %s\n",realm);
|
||||
/*
|
||||
/*
|
||||
* Determine realm of these tickets. We will send this to the
|
||||
* KDC from which we are requesting tickets so it knows what to
|
||||
* with our session key.
|
||||
*/
|
||||
if ((retval = krb_get_tf_realm(TKT_FILE, myrealm)) != KSUCCESS)
|
||||
return(retval);
|
||||
|
||||
|
||||
retval = krb_get_cred(service,instance,realm,&cr);
|
||||
|
||||
if (retval == RET_NOTKT) {
|
||||
|
@ -177,10 +177,10 @@ krb_mk_req(authent,service,instance,realm,checksum)
|
|||
return(KSUCCESS);
|
||||
}
|
||||
|
||||
/*
|
||||
/*
|
||||
* krb_set_lifetime sets the default lifetime for additional tickets
|
||||
* obtained via krb_mk_req().
|
||||
*
|
||||
*
|
||||
* It returns the previous value of the default lifetime.
|
||||
*/
|
||||
|
||||
|
|
|
@ -15,12 +15,12 @@
|
|||
* Steve Miller Project Athena MIT/DEC
|
||||
*
|
||||
* from: mk_safe.c,v 4.12 89/03/22 14:50:49 jtkohl Exp $
|
||||
* $Id: mk_safe.c,v 1.2 1994/07/19 19:25:59 g89r4222 Exp $
|
||||
* $Id: mk_safe.c,v 1.1.1.1 1994/09/30 14:50:02 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: mk_safe.c,v 1.2 1994/07/19 19:25:59 g89r4222 Exp $";
|
||||
"$Id: mk_safe.c,v 1.1.1.1 1994/09/30 14:50:02 csgr Exp $";
|
||||
#endif /* lint */
|
||||
|
||||
/* system include files */
|
||||
|
@ -65,7 +65,7 @@ static long msg_time_sec;
|
|||
* HOST_BYTE_ORDER byte order in low bit
|
||||
*
|
||||
* ===================== begin checksum ================================
|
||||
*
|
||||
*
|
||||
* 4 bytes length length of user data
|
||||
* length in user data
|
||||
* 1 byte msg_time_5ms timestamp milliseconds
|
||||
|
@ -132,15 +132,15 @@ long krb_mk_safe(in,out,length,key,sender,receiver)
|
|||
* direction bit is the sign bit of the timestamp. Ok until
|
||||
* 2038??
|
||||
*/
|
||||
/* For compatibility with broken old code, compares are done in VAX
|
||||
byte order (LSBFIRST) */
|
||||
if (lsb_net_ulong_less(sender->sin_addr.s_addr, /* src < recv */
|
||||
receiver->sin_addr.s_addr)==-1)
|
||||
msg_time_sec = -msg_time_sec;
|
||||
else if (lsb_net_ulong_less(sender->sin_addr.s_addr,
|
||||
receiver->sin_addr.s_addr)==0)
|
||||
if (lsb_net_ushort_less(sender->sin_port,receiver->sin_port) == -1)
|
||||
msg_time_sec = -msg_time_sec;
|
||||
/* For compatibility with broken old code, compares are done in VAX
|
||||
byte order (LSBFIRST) */
|
||||
if (lsb_net_ulong_less(sender->sin_addr.s_addr, /* src < recv */
|
||||
receiver->sin_addr.s_addr)==-1)
|
||||
msg_time_sec = -msg_time_sec;
|
||||
else if (lsb_net_ulong_less(sender->sin_addr.s_addr,
|
||||
receiver->sin_addr.s_addr)==0)
|
||||
if (lsb_net_ushort_less(sender->sin_port,receiver->sin_port) == -1)
|
||||
msg_time_sec = -msg_time_sec;
|
||||
/*
|
||||
* all that for one tiny bit! Heaven help those that talk to
|
||||
* themselves.
|
||||
|
|
|
@ -15,12 +15,12 @@
|
|||
* Steve Miller Project Athena MIT/DEC
|
||||
*
|
||||
* from: rd_priv.c,v 4.14 89/04/28 11:59:42 jtkohl Exp $
|
||||
* $Id: rd_priv.c,v 1.2 1994/07/19 19:26:11 g89r4222 Exp $
|
||||
* $Id: rd_priv.c,v 1.1.1.1 1994/09/30 14:50:03 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[]=
|
||||
"$Id: rd_priv.c,v 1.2 1994/07/19 19:26:11 g89r4222 Exp $";
|
||||
"$Id: rd_priv.c,v 1.1.1.1 1994/09/30 14:50:03 csgr Exp $";
|
||||
#endif /* lint */
|
||||
|
||||
/* system include files */
|
||||
|
@ -154,17 +154,17 @@ long krb_rd_priv(in,in_length,schedule,key,sender,receiver,m_data)
|
|||
p += sizeof(m_data->time_sec);
|
||||
|
||||
/* check direction bit is the sign bit */
|
||||
/* For compatibility with broken old code, compares are done in VAX
|
||||
byte order (LSBFIRST) */
|
||||
/* For compatibility with broken old code, compares are done in VAX
|
||||
byte order (LSBFIRST) */
|
||||
if (lsb_net_ulong_less(sender->sin_addr.s_addr,
|
||||
receiver->sin_addr.s_addr)==-1)
|
||||
/* src < recv */
|
||||
m_data->time_sec = - m_data->time_sec;
|
||||
else if (lsb_net_ulong_less(sender->sin_addr.s_addr,
|
||||
receiver->sin_addr.s_addr)==0)
|
||||
receiver->sin_addr.s_addr)==-1)
|
||||
/* src < recv */
|
||||
m_data->time_sec = - m_data->time_sec;
|
||||
else if (lsb_net_ulong_less(sender->sin_addr.s_addr,
|
||||
receiver->sin_addr.s_addr)==0)
|
||||
if (lsb_net_ushort_less(sender->sin_port,receiver->sin_port)==-1)
|
||||
/* src < recv */
|
||||
m_data->time_sec = - m_data->time_sec;
|
||||
m_data->time_sec = - m_data->time_sec;
|
||||
/*
|
||||
* all that for one tiny bit!
|
||||
* Heaven help those that talk to themselves.
|
||||
|
|
|
@ -13,12 +13,12 @@
|
|||
* Steve Miller Project Athena MIT/DEC
|
||||
*
|
||||
* from: rd_safe.c,v 4.12 89/01/23 15:16:16 steiner Exp $
|
||||
* $Id: rd_safe.c,v 1.2 1994/07/19 19:26:15 g89r4222 Exp $
|
||||
* $Id: rd_safe.c,v 1.1.1.1 1994/09/30 14:50:03 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: rd_safe.c,v 1.2 1994/07/19 19:26:15 g89r4222 Exp $";
|
||||
"$Id: rd_safe.c,v 1.1.1.1 1994/09/30 14:50:03 csgr Exp $";
|
||||
#endif /* lint */
|
||||
|
||||
/* system include files */
|
||||
|
@ -134,17 +134,17 @@ krb_rd_safe protocol err sizeof(u_long) != sizeof(struct in_addr)");
|
|||
p += sizeof(m_data->time_sec);
|
||||
|
||||
/* check direction bit is the sign bit */
|
||||
/* For compatibility with broken old code, compares are done in VAX
|
||||
byte order (LSBFIRST) */
|
||||
/* For compatibility with broken old code, compares are done in VAX
|
||||
byte order (LSBFIRST) */
|
||||
if (lsb_net_ulong_less(sender->sin_addr.s_addr,
|
||||
receiver->sin_addr.s_addr)==-1)
|
||||
/* src < recv */
|
||||
m_data->time_sec = - m_data->time_sec;
|
||||
else if (lsb_net_ulong_less(sender->sin_addr.s_addr,
|
||||
receiver->sin_addr.s_addr)==0)
|
||||
receiver->sin_addr.s_addr)==-1)
|
||||
/* src < recv */
|
||||
m_data->time_sec = - m_data->time_sec;
|
||||
else if (lsb_net_ulong_less(sender->sin_addr.s_addr,
|
||||
receiver->sin_addr.s_addr)==0)
|
||||
if (lsb_net_ushort_less(sender->sin_port,receiver->sin_port)==-1)
|
||||
/* src < recv */
|
||||
m_data->time_sec = - m_data->time_sec;
|
||||
m_data->time_sec = - m_data->time_sec;
|
||||
|
||||
/*
|
||||
* All that for one tiny bit! Heaven help those that talk to
|
||||
|
|
|
@ -5,12 +5,12 @@
|
|||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: _service_key.c,v 4.10 90/03/10 19:06:56 jon Exp $
|
||||
* $Id: read_service_key.c,v 1.2 1994/07/19 19:26:16 g89r4222 Exp $
|
||||
* $Id: read_service_key.c,v 1.1.1.1 1994/09/30 14:50:03 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char *rcsid =
|
||||
"$Id: read_service_key.c,v 1.2 1994/07/19 19:26:16 g89r4222 Exp $";
|
||||
"$Id: read_service_key.c,v 1.1.1.1 1994/09/30 14:50:03 csgr Exp $";
|
||||
#endif /* lint */
|
||||
|
||||
#include <krb.h>
|
||||
|
@ -26,7 +26,7 @@ static char *rcsid =
|
|||
* and "realm" and a key version number "kvno", and looks in the given
|
||||
* "file" for the corresponding entry, and if found, returns the entry's
|
||||
* key field in "key".
|
||||
*
|
||||
*
|
||||
* If "instance" contains the string "*", then it will match
|
||||
* any instance, and the chosen instance will be copied to that
|
||||
* string. For this reason it is important that the there is enough
|
||||
|
@ -102,7 +102,7 @@ read_service_key(service,instance,realm,kvno,file,key)
|
|||
strcmp(realm,"ATHENA.MIT.EDU")))
|
||||
continue;
|
||||
#else /* ! ATHENA_COMPAT */
|
||||
if (strcmp(rlm,realm))
|
||||
if (strcmp(rlm,realm))
|
||||
continue;
|
||||
#endif /* ATHENA_COMPAT */
|
||||
|
||||
|
|
|
@ -4,12 +4,12 @@
|
|||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: recvauth.c,v 4.4 90/03/10 19:03:08 jon Exp $";
|
||||
* $Id: recvauth.c,v 1.2 1994/07/19 19:26:18 g89r4222 Exp $
|
||||
* $Id: recvauth.c,v 1.1.1.1 1994/09/30 14:50:03 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: recvauth.c,v 1.2 1994/07/19 19:26:18 g89r4222 Exp $";
|
||||
"$Id: recvauth.c,v 1.1.1.1 1994/09/30 14:50:03 csgr Exp $";
|
||||
#endif lint
|
||||
|
||||
#include <krb.h>
|
||||
|
@ -214,7 +214,7 @@ char *version; /* version string (filled in) */
|
|||
if (krb_net_read(fd, (char *)&tkt_len, sizeof(tkt_len)) !=
|
||||
sizeof(tkt_len))
|
||||
return(errno);
|
||||
|
||||
|
||||
/* sanity check */
|
||||
ticket->length = ntohl((unsigned long)tkt_len);
|
||||
if ((ticket->length <= 0) || (ticket->length > MAX_KTXT_LEN)) {
|
||||
|
|
|
@ -4,7 +4,7 @@
|
|||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: send_to_kdc.c,v 4.20 90/01/02 13:40:37 jtkohl Exp $
|
||||
* $Id: send_to_kdc.c,v 1.2 1995/01/25 05:40:00 gibbs Exp $
|
||||
* $Id: send_to_kdc.c,v 1.3 1995/01/25 06:37:33 gibbs Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
|
@ -257,7 +257,7 @@ static send_recv(pkt,rpkt,f,_to,addrs)
|
|||
printf("Sending message...");
|
||||
(void) fflush(stdout);
|
||||
}
|
||||
if ((numsent = sendto(f,(char *)(pkt->dat), pkt->length, 0,
|
||||
if ((numsent = sendto(f,(char *)(pkt->dat), pkt->length, 0,
|
||||
(struct sockaddr *)_to,
|
||||
S_AD_SZ)) != pkt->length) {
|
||||
if (krb_debug)
|
||||
|
|
|
@ -7,12 +7,12 @@
|
|||
* contributed by Dan Kolkowitz (kolk@jessica.stanford.edu).
|
||||
*
|
||||
* from: tf_shm.c,v 4.2 89/10/25 23:26:46 qjb Exp $
|
||||
* $Id: tf_shm.c,v 1.2 1994/07/19 19:26:26 g89r4222 Exp $
|
||||
* $Id: tf_shm.c,v 1.1.1.1 1994/09/30 14:50:04 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: tf_shm.c,v 1.2 1994/07/19 19:26:26 g89r4222 Exp $";
|
||||
"$Id: tf_shm.c,v 1.1.1.1 1994/09/30 14:50:04 csgr Exp $";
|
||||
#endif lint
|
||||
|
||||
#include <stdio.h>
|
||||
|
@ -51,15 +51,15 @@ char *file_name;
|
|||
don't slowly lose memory. */
|
||||
|
||||
shmid = shmget((long)IPC_PRIVATE,MAX_BUFF, IPC_CREAT);
|
||||
if (shmid == -1) {
|
||||
if (shmid == -1) {
|
||||
if (krb_debug)
|
||||
perror("krb_shm_create shmget");
|
||||
return(KFAILURE); /* XXX */
|
||||
}
|
||||
me = getuid();
|
||||
metoo = geteuid();
|
||||
/*
|
||||
* now set up the buffer so that we can modify it
|
||||
/*
|
||||
* now set up the buffer so that we can modify it
|
||||
*/
|
||||
shm_buf.shm_perm.uid = me;
|
||||
shm_buf.shm_perm.gid = getgid();
|
||||
|
@ -89,13 +89,13 @@ char *file_name;
|
|||
perror("krb_shm_create file");
|
||||
(void) shmctl(shmid, IPC_RMID, 0);
|
||||
return(KFAILURE); /* XXX */
|
||||
}
|
||||
}
|
||||
if (fchmod(fileno(sfile),0600) < 0) {
|
||||
if (krb_debug)
|
||||
perror("krb_shm_create fchmod");
|
||||
(void) shmctl(shmid, IPC_RMID, 0);
|
||||
return(KFAILURE); /* XXX */
|
||||
}
|
||||
}
|
||||
if (me != metoo) {
|
||||
if (setreuid(me, metoo) < 0) {
|
||||
/* can't switch??? barf! */
|
||||
|
@ -126,11 +126,11 @@ char *file_name;
|
|||
int krb_is_diskless()
|
||||
{
|
||||
struct stat buf;
|
||||
if (stat("/.diskless",&buf) < 0)
|
||||
if (stat("/.diskless",&buf) < 0)
|
||||
return(0);
|
||||
else return(1);
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* krb_shm_dest: destroy shared memory segment with session keys, and remove
|
||||
* file pointing to it.
|
||||
|
@ -156,7 +156,7 @@ char *file;
|
|||
perror("krb_shm_dest: cannot delete shm segment");
|
||||
(void) fclose(sfile);
|
||||
return(KFAILURE); /* XXX */
|
||||
}
|
||||
}
|
||||
} else {
|
||||
if (krb_debug)
|
||||
fprintf(stderr, "bad format in shmid file\n");
|
||||
|
@ -170,5 +170,5 @@ char *file;
|
|||
return(RET_TKFIL); /* XXX */
|
||||
}
|
||||
|
||||
|
||||
|
||||
|
||||
|
|
|
@ -4,12 +4,12 @@
|
|||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: tf_util.c,v 4.9 90/03/10 19:19:45 jon Exp $
|
||||
* $Id: tf_util.c,v 1.2 1994/07/19 19:26:28 g89r4222 Exp $
|
||||
* $Id: tf_util.c,v 1.1.1.1 1994/09/30 14:50:04 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: tf_util.c,v 1.2 1994/07/19 19:26:28 g89r4222 Exp $";
|
||||
"$Id: tf_util.c,v 1.1.1.1 1994/09/30 14:50:04 csgr Exp $";
|
||||
#endif /* lint */
|
||||
|
||||
#include <stdio.h>
|
||||
|
@ -51,7 +51,7 @@ char *shmat();
|
|||
* are invalid (ie. when deciding whether tf_init has been
|
||||
* called.)
|
||||
* c. In tf_close, be sure it gets reinitialized to a negative
|
||||
* number.
|
||||
* number.
|
||||
*/
|
||||
static fd = -1;
|
||||
static curpos; /* Position in tfbfr */
|
||||
|
@ -109,13 +109,13 @@ static tf_gets(), tf_read();
|
|||
/*
|
||||
* tf_init() should be called before the other ticket file routines.
|
||||
* It takes the name of the ticket file to use, "tf_name", and a
|
||||
* read/write flag "rw" as arguments.
|
||||
* read/write flag "rw" as arguments.
|
||||
*
|
||||
* It tries to open the ticket file, checks the mode, and if everything
|
||||
* is okay, locks the file. If it's opened for reading, the lock is
|
||||
* shared. If it's opened for writing, the lock is exclusive.
|
||||
* shared. If it's opened for writing, the lock is exclusive.
|
||||
*
|
||||
* Returns KSUCCESS if all went well, otherwise one of the following:
|
||||
* Returns KSUCCESS if all went well, otherwise one of the following:
|
||||
*
|
||||
* NO_TKT_FIL - file wasn't there
|
||||
* TKT_FIL_ACC - file was in wrong mode, etc.
|
||||
|
@ -129,7 +129,7 @@ tf_init(tf_name, rw)
|
|||
uid_t me, getuid();
|
||||
struct stat stat_buf;
|
||||
#ifdef TKT_SHMEM
|
||||
char shmidname[MAXPATHLEN];
|
||||
char shmidname[MAXPATHLEN];
|
||||
FILE *sfp;
|
||||
int shmid;
|
||||
#endif
|
||||
|
@ -170,7 +170,7 @@ tf_init(tf_name, rw)
|
|||
* If "wflag" is set, open the ticket file in append-writeonly mode
|
||||
* and lock the ticket file in exclusive mode. If unable to lock
|
||||
* the file, sleep and try again. If we fail again, return with the
|
||||
* proper error message.
|
||||
* proper error message.
|
||||
*/
|
||||
|
||||
curpos = sizeof(tfbfr);
|
||||
|
@ -214,7 +214,7 @@ tf_init(tf_name, rw)
|
|||
}
|
||||
tmp_shm_addr = krb_shm_addr;
|
||||
#endif /* TKT_SHMEM */
|
||||
|
||||
|
||||
if (wflag) {
|
||||
fd = open(tf_name, O_RDWR, 0600);
|
||||
if (fd < 0) {
|
||||
|
@ -232,7 +232,7 @@ tf_init(tf_name, rw)
|
|||
}
|
||||
/*
|
||||
* Otherwise "wflag" is not set and the ticket file should be opened
|
||||
* for read-only operations and locked for shared access.
|
||||
* for read-only operations and locked for shared access.
|
||||
*/
|
||||
|
||||
fd = open(tf_name, O_RDONLY, 0600);
|
||||
|
@ -256,7 +256,7 @@ tf_init(tf_name, rw)
|
|||
* principal's name is filled into the "p" parameter. If all goes well,
|
||||
* KSUCCESS is returned. If tf_init() wasn't called, TKT_FIL_INI is
|
||||
* returned. If the name was null, or EOF was encountered, or the name
|
||||
* was longer than ANAME_SZ, TKT_FIL_FMT is returned.
|
||||
* was longer than ANAME_SZ, TKT_FIL_FMT is returned.
|
||||
*/
|
||||
|
||||
tf_get_pname(p)
|
||||
|
@ -279,7 +279,7 @@ tf_get_pname(p)
|
|||
* goes well, KSUCCESS is returned. If tf_init() wasn't called,
|
||||
* TKT_FIL_INI is returned. If EOF was encountered, or the instance
|
||||
* was longer than ANAME_SZ, TKT_FIL_FMT is returned. Note that the
|
||||
* instance may be null.
|
||||
* instance may be null.
|
||||
*/
|
||||
|
||||
tf_get_pinst(inst)
|
||||
|
@ -299,7 +299,7 @@ tf_get_pinst(inst)
|
|||
* tf_get_cred() reads a CREDENTIALS record from a ticket file and fills
|
||||
* in the given structure "c". It should only be called after tf_init(),
|
||||
* tf_get_pname(), and tf_get_pinst() have been called. If all goes well,
|
||||
* KSUCCESS is returned. Possible error codes are:
|
||||
* KSUCCESS is returned. Possible error codes are:
|
||||
*
|
||||
* TKT_FIL_INI - tf_init wasn't called first
|
||||
* TKT_FIL_FMT - bad format
|
||||
|
@ -394,7 +394,7 @@ tf_close()
|
|||
* tf_gets() is an internal routine. It takes a string "s" and a count
|
||||
* "n", and reads from the file until either it has read "n" characters,
|
||||
* or until it reads a null byte. When finished, what has been read exists
|
||||
* in "s". If it encounters EOF or an error, it closes the ticket file.
|
||||
* in "s". If it encounters EOF or an error, it closes the ticket file.
|
||||
*
|
||||
* Possible return values are:
|
||||
*
|
||||
|
@ -408,7 +408,7 @@ tf_close()
|
|||
* file is seriously ill.
|
||||
*/
|
||||
|
||||
static
|
||||
static
|
||||
tf_gets(s, n)
|
||||
register char *s;
|
||||
{
|
||||
|
@ -455,7 +455,7 @@ tf_read(s, n)
|
|||
register n;
|
||||
{
|
||||
register count;
|
||||
|
||||
|
||||
for (count = n; count > 0; --count) {
|
||||
if (curpos >= sizeof(tfbfr)) {
|
||||
lastpos = read(fd, tfbfr, sizeof(tfbfr));
|
||||
|
@ -469,7 +469,7 @@ tf_read(s, n)
|
|||
}
|
||||
return n;
|
||||
}
|
||||
|
||||
|
||||
char *tkt_string();
|
||||
|
||||
/*
|
||||
|
|
|
@ -1,18 +1,18 @@
|
|||
/*
|
||||
* Copyright 1988 by the Massachusetts Institute of Technology.
|
||||
* Copyright 1988 by the Massachusetts Institute of Technology.
|
||||
* For copying and distribution information, please see the file
|
||||
* <Copyright.MIT>.
|
||||
* <Copyright.MIT>.
|
||||
*
|
||||
* Get a ticket-granting-ticket given a service key file (srvtab)
|
||||
* The lifetime is the shortest allowed [1 five-minute interval]
|
||||
*
|
||||
* from: ksrvtgt.c,v 4.3 89/07/28 10:17:28 jtkohl Exp $
|
||||
* $Id: ksrvtgt.c,v 1.2 1994/07/19 19:26:56 g89r4222 Exp $
|
||||
* $Id: ksrvtgt.c,v 1.1.1.1 1994/09/30 14:50:04 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
const char rcsid[] =
|
||||
"$Id: ksrvtgt.c,v 1.2 1994/07/19 19:26:56 g89r4222 Exp $";
|
||||
"$Id: ksrvtgt.c,v 1.1.1.1 1994/09/30 14:50:04 csgr Exp $";
|
||||
#endif /* lint */
|
||||
|
||||
#include <stdio.h>
|
||||
|
@ -36,10 +36,10 @@ main(argc,argv)
|
|||
argv[0]);
|
||||
exit(1);
|
||||
}
|
||||
|
||||
|
||||
if (argc == 4)
|
||||
(void) strncpy(srvtab, argv[3], sizeof(srvtab) -1);
|
||||
|
||||
|
||||
if (argc == 5) {
|
||||
(void) strncpy(realm, argv[3], sizeof(realm) - 1);
|
||||
(void) strncpy(srvtab, argv[4], sizeof(srvtab) -1);
|
||||
|
|
|
@ -13,7 +13,7 @@ static char rcsid_ksrvutil_c[] =
|
|||
"BonesHeader: /afs/athena.mit.edu/astaff/project/kerberos/src/kadmin/RCS/ksrvutil.c,v 4.1 89/09/26 09:33:49 jtkohl Exp ";
|
||||
#endif
|
||||
static const char rcsid[] =
|
||||
"$Id: ksrvutil.c,v 1.1 1995/01/20 22:38:30 wollman Exp $";
|
||||
"$Id: ksrvutil.c,v 1.2 1995/01/23 22:54:08 wollman Exp $";
|
||||
#endif lint
|
||||
|
||||
/*
|
||||
|
@ -72,9 +72,9 @@ copy_keyfile(progname, keyfile, backup_keyfile)
|
|||
char buf[BUFSIZ]; /* for copying keyfiles */
|
||||
int rcount; /* for copying keyfiles */
|
||||
int try_again;
|
||||
|
||||
|
||||
(void) bzero((char *)buf, sizeof(buf));
|
||||
|
||||
|
||||
do {
|
||||
try_again = FALSE;
|
||||
if ((keyfile_fd = open(keyfile, O_RDONLY, 0)) < 0) {
|
||||
|
@ -83,8 +83,8 @@ copy_keyfile(progname, keyfile, backup_keyfile)
|
|||
}
|
||||
else {
|
||||
try_again = TRUE;
|
||||
if ((keyfile_fd =
|
||||
open(keyfile,
|
||||
if ((keyfile_fd =
|
||||
open(keyfile,
|
||||
O_WRONLY | O_TRUNC | O_CREAT, SRVTAB_MODE)) < 0) {
|
||||
err(1, "unable to create %s", keyfile);
|
||||
}
|
||||
|
@ -98,8 +98,8 @@ copy_keyfile(progname, keyfile, backup_keyfile)
|
|||
|
||||
keyfile_mode = get_mode(keyfile);
|
||||
|
||||
if ((backup_keyfile_fd =
|
||||
open(backup_keyfile, O_WRONLY | O_TRUNC | O_CREAT,
|
||||
if ((backup_keyfile_fd =
|
||||
open(backup_keyfile, O_WRONLY | O_TRUNC | O_CREAT,
|
||||
keyfile_mode)) < 0) {
|
||||
err(1, "unable to write %s", backup_keyfile);
|
||||
}
|
||||
|
@ -134,8 +134,8 @@ safe_read_stdin(prompt, buf, size)
|
|||
}
|
||||
fflush(stdin);
|
||||
buf[strlen(buf)-1] = 0;
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
|
||||
void
|
||||
safe_write(progname, filename, fd, buf, len)
|
||||
|
@ -150,7 +150,7 @@ safe_write(progname, filename, fd, buf, len)
|
|||
close(fd);
|
||||
leave("In progress srvtab in this file.", 1);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
int
|
||||
yn(string)
|
||||
|
@ -161,7 +161,7 @@ yn(string)
|
|||
(void) printf("%s (y,n) [y] ", string);
|
||||
for (;;) {
|
||||
safe_read_stdin("", ynbuf, sizeof(ynbuf));
|
||||
|
||||
|
||||
if ((ynbuf[0] == 'n') || (ynbuf[0] == 'N'))
|
||||
return(0);
|
||||
else if ((ynbuf[0] == 'y') || (ynbuf[0] == 'Y') || (ynbuf[0] == 0))
|
||||
|
@ -174,7 +174,7 @@ yn(string)
|
|||
}
|
||||
|
||||
void
|
||||
append_srvtab(progname, filename, fd, sname, sinst,
|
||||
append_srvtab(progname, filename, fd, sname, sinst,
|
||||
srealm, key_vno, key)
|
||||
char *progname;
|
||||
char *filename;
|
||||
|
@ -192,7 +192,7 @@ append_srvtab(progname, filename, fd, sname, sinst,
|
|||
safe_write(progname, filename, fd, (char *)&key_vno, 1);
|
||||
safe_write(progname, filename, fd, (char *)key, sizeof(des_cblock));
|
||||
(void) fsync(fd);
|
||||
}
|
||||
}
|
||||
|
||||
unsigned short
|
||||
get_mode(filename)
|
||||
|
@ -202,8 +202,8 @@ get_mode(filename)
|
|||
unsigned short mode;
|
||||
|
||||
(void) bzero((char *)&statbuf, sizeof(statbuf));
|
||||
|
||||
if (stat(filename, &statbuf) < 0)
|
||||
|
||||
if (stat(filename, &statbuf) < 0)
|
||||
mode = SRVTAB_MODE;
|
||||
else
|
||||
mode = statbuf.st_mode;
|
||||
|
@ -240,33 +240,33 @@ main(argc,argv)
|
|||
int change_this_key = FALSE;
|
||||
char databuf[BUFSIZ];
|
||||
int first_printed = FALSE; /* have we printed the first item? */
|
||||
|
||||
|
||||
int get_svc_new_key();
|
||||
void get_key_from_password();
|
||||
void print_key();
|
||||
void print_name();
|
||||
|
||||
|
||||
(void) bzero((char *)sname, sizeof(sname));
|
||||
(void) bzero((char *)sinst, sizeof(sinst));
|
||||
(void) bzero((char *)srealm, sizeof(srealm));
|
||||
|
||||
|
||||
(void) bzero((char *)change_tkt, sizeof(change_tkt));
|
||||
(void) bzero((char *)keyfile, sizeof(keyfile));
|
||||
(void) bzero((char *)work_keyfile, sizeof(work_keyfile));
|
||||
(void) bzero((char *)backup_keyfile, sizeof(backup_keyfile));
|
||||
(void) bzero((char *)local_realm, sizeof(local_realm));
|
||||
|
||||
|
||||
(void) sprintf(change_tkt, "/tmp/tkt_ksrvutil.%d", getpid());
|
||||
krb_set_tkt_string(change_tkt);
|
||||
|
||||
/* This is used only as a default for adding keys */
|
||||
if (krb_get_lrealm(local_realm, 1) != KSUCCESS)
|
||||
(void) strcpy(local_realm, KRB_REALM);
|
||||
|
||||
|
||||
for (i = 1; i < argc; i++) {
|
||||
if (strcmp(argv[i], "-i") == 0)
|
||||
if (strcmp(argv[i], "-i") == 0)
|
||||
interactive++;
|
||||
else if (strcmp(argv[i], "-k") == 0)
|
||||
else if (strcmp(argv[i], "-k") == 0)
|
||||
key++;
|
||||
else if (strcmp(argv[i], "list") == 0) {
|
||||
if (arg_entered)
|
||||
|
@ -301,23 +301,23 @@ main(argc,argv)
|
|||
else
|
||||
usage();
|
||||
}
|
||||
|
||||
|
||||
if (!arg_entered)
|
||||
usage();
|
||||
|
||||
if (!keyfile[0])
|
||||
(void) strcpy(keyfile, KEYFILE);
|
||||
|
||||
|
||||
(void) strcpy(work_keyfile, keyfile);
|
||||
(void) strcpy(backup_keyfile, keyfile);
|
||||
|
||||
|
||||
if (change || add) {
|
||||
(void) strcat(work_keyfile, ".work");
|
||||
(void) strcat(backup_keyfile, ".old");
|
||||
|
||||
|
||||
copy_keyfile(argv[0], keyfile, backup_keyfile);
|
||||
}
|
||||
|
||||
|
||||
if (add)
|
||||
copy_keyfile(argv[0], backup_keyfile, work_keyfile);
|
||||
|
||||
|
@ -330,8 +330,8 @@ main(argc,argv)
|
|||
}
|
||||
|
||||
if (change) {
|
||||
if ((work_keyfile_fd =
|
||||
open(work_keyfile, O_WRONLY | O_CREAT | O_TRUNC,
|
||||
if ((work_keyfile_fd =
|
||||
open(work_keyfile, O_WRONLY | O_CREAT | O_TRUNC,
|
||||
SRVTAB_MODE)) < 0) {
|
||||
err(1, "unable to write %s", work_keyfile);
|
||||
}
|
||||
|
@ -342,7 +342,7 @@ main(argc,argv)
|
|||
err(1, "unable to append to %s", work_keyfile);
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
if (change || list) {
|
||||
while ((getst(backup_keyfile_fd, sname, SNAME_SZ) > 0) &&
|
||||
(getst(backup_keyfile_fd, sinst, INST_SZ) > 0) &&
|
||||
|
@ -379,19 +379,19 @@ main(argc,argv)
|
|||
change_this_key = 1;
|
||||
else
|
||||
change_this_key = 0;
|
||||
|
||||
|
||||
if (change_this_key)
|
||||
(void) printf("Changing to version %d.\n", key_vno + 1);
|
||||
else if (change)
|
||||
(void) printf("Not changing this key.\n");
|
||||
|
||||
|
||||
if (change_this_key) {
|
||||
/*
|
||||
/*
|
||||
* Pick a new key and determine whether or not
|
||||
* it is safe to change
|
||||
*/
|
||||
if ((status =
|
||||
get_svc_new_key(new_key, sname, sinst,
|
||||
if ((status =
|
||||
get_svc_new_key(new_key, sname, sinst,
|
||||
srealm, keyfile)) == KADM_SUCCESS)
|
||||
key_vno++;
|
||||
else {
|
||||
|
@ -400,9 +400,9 @@ main(argc,argv)
|
|||
change_this_key = FALSE;
|
||||
}
|
||||
}
|
||||
else
|
||||
else
|
||||
(void) bcopy(old_key, new_key, sizeof(new_key));
|
||||
append_srvtab(argv[0], work_keyfile, work_keyfile_fd,
|
||||
append_srvtab(argv[0], work_keyfile, work_keyfile_fd,
|
||||
sname, sinst, srealm, key_vno, new_key);
|
||||
if (key && change_this_key) {
|
||||
(void) printf("Old key: ");
|
||||
|
@ -417,7 +417,7 @@ main(argc,argv)
|
|||
(void) dest_tkt();
|
||||
}
|
||||
else {
|
||||
com_err(argv[0], status,
|
||||
com_err(argv[0], status,
|
||||
" attempting to change password.");
|
||||
(void) dest_tkt();
|
||||
/* XXX This knows the format of a keyfile */
|
||||
|
@ -464,17 +464,17 @@ main(argc,argv)
|
|||
print_key(new_key);
|
||||
(void) printf("\n");
|
||||
}
|
||||
append_srvtab(argv[0], work_keyfile, work_keyfile_fd,
|
||||
append_srvtab(argv[0], work_keyfile, work_keyfile_fd,
|
||||
sname, sinst, srealm, key_vno, new_key);
|
||||
(void) printf("Key successfully added.\n");
|
||||
} while (yn("Would you like to add another key?"));
|
||||
}
|
||||
|
||||
if (change || list)
|
||||
if (change || list)
|
||||
if (close(backup_keyfile_fd) < 0) {
|
||||
warn("failure closing %s, continuing", backup_keyfile);
|
||||
}
|
||||
|
||||
|
||||
if (change || add) {
|
||||
if (close(work_keyfile_fd) < 0) {
|
||||
err(1, "failure closing %s", work_keyfile);
|
||||
|
@ -525,7 +525,7 @@ get_svc_new_key(new_key, sname, sinst, srealm, keyfile)
|
|||
|
||||
if (((status = krb_get_svc_in_tkt(sname, sinst, srealm, PWSERV_NAME,
|
||||
KADM_SINST, 1, keyfile)) == KSUCCESS) &&
|
||||
((status = kadm_init_link("changepw", KRB_MASTER, srealm)) ==
|
||||
((status = kadm_init_link("changepw", KRB_MASTER, srealm)) ==
|
||||
KADM_SUCCESS)) {
|
||||
#ifdef NOENCRYPTION
|
||||
(void) bzero((char *) new_key, sizeof(des_cblock));
|
||||
|
@ -535,7 +535,7 @@ get_svc_new_key(new_key, sname, sinst, srealm, keyfile)
|
|||
#endif /* NOENCRYPTION */
|
||||
return(KADM_SUCCESS);
|
||||
}
|
||||
|
||||
|
||||
return(status);
|
||||
}
|
||||
|
||||
|
@ -555,7 +555,7 @@ get_key_from_password(key)
|
|||
(void) des_string_to_key(password, key);
|
||||
#endif /* NOENCRYPTION */
|
||||
(void) bzero((char *)password, sizeof(password));
|
||||
}
|
||||
}
|
||||
|
||||
usage()
|
||||
{
|
||||
|
|
|
@ -1,10 +1,10 @@
|
|||
# From: @(#)Makefile 5.2 (Berkeley) 3/5/91
|
||||
# $Id: Makefile,v 1.2 1994/07/19 19:27:04 g89r4222 Exp $
|
||||
# $Id: Makefile,v 1.1.1.1 1994/09/30 14:50:04 csgr Exp $
|
||||
|
||||
PROG= kstash
|
||||
CFLAGS+=-DKERBEROS -DDEBUG -I${.CURDIR}/../include
|
||||
DPADD= ${LIBKDB} ${LIBKRB} ${LIBDES}
|
||||
LDADD= -L${KDBOBJDIR} -lkdb -L${KRBOBJDIR} -lkrb -L${DESOBJDIR} -ldes
|
||||
LDADD= -L${KDBOBJDIR} -lkdb -L${KRBOBJDIR} -lkrb -L${DESOBJDIR} -ldes
|
||||
NOMAN= noman
|
||||
|
||||
.include <bsd.prog.mk>
|
||||
|
|
|
@ -1,16 +1,16 @@
|
|||
/*
|
||||
* Copyright 1985, 1986, 1987, 1988 by the Massachusetts Institute
|
||||
* of Technology
|
||||
* of Technology
|
||||
* For copying and distribution information, please see the file
|
||||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: kstash.c,v 4.0 89/01/23 09:45:43 jtkohl Exp $
|
||||
* $Id: kstash.c,v 1.2 1994/07/19 19:27:05 g89r4222 Exp $
|
||||
* $Id: kstash.c,v 1.1.1.1 1994/09/30 14:50:05 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: kstash.c,v 1.2 1994/07/19 19:27:05 g89r4222 Exp $";
|
||||
"$Id: kstash.c,v 1.1.1.1 1994/09/30 14:50:05 csgr Exp $";
|
||||
#endif lint
|
||||
|
||||
#include <stdio.h>
|
||||
|
@ -84,7 +84,7 @@ main(argc, argv)
|
|||
clear_secrets();
|
||||
}
|
||||
|
||||
static void
|
||||
static void
|
||||
clear_secrets()
|
||||
{
|
||||
bzero(master_key_schedule, sizeof(master_key_schedule));
|
||||
|
|
|
@ -6,12 +6,12 @@
|
|||
* <mit-copyright.h>.
|
||||
*
|
||||
* from: acl_files.c,v 4.4 89/12/19 13:30:53 jtkohl Exp $
|
||||
* $Id: acl_files.c,v 1.2 1994/07/19 19:21:18 g89r4222 Exp $
|
||||
* $Id: acl_files.c,v 1.1.1.1 1994/09/30 14:49:48 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: acl_files.c,v 1.2 1994/07/19 19:21:18 g89r4222 Exp $";
|
||||
"$Id: acl_files.c,v 1.1.1.1 1994/09/30 14:49:48 csgr Exp $";
|
||||
#endif lint
|
||||
|
||||
|
||||
|
@ -86,7 +86,7 @@ char *canon;
|
|||
dot = NULL;
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
/* No such luck */
|
||||
end = principal + strlen(principal);
|
||||
|
||||
|
@ -121,7 +121,7 @@ char *canon;
|
|||
strcpy(canon, KRB_REALM);
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
/* Get a lock to modify acl_file */
|
||||
/* Return new FILE pointer */
|
||||
/* or NULL if file cannot be modified */
|
||||
|
@ -176,7 +176,7 @@ char *acl_file;
|
|||
/* Closes f */
|
||||
static int acl_commit(acl_file, f)
|
||||
char *acl_file;
|
||||
FILE *f;
|
||||
FILE *f;
|
||||
{
|
||||
char new[LINESIZE];
|
||||
int ret;
|
||||
|
@ -203,7 +203,7 @@ FILE *f;
|
|||
static int
|
||||
acl_abort(acl_file, f)
|
||||
char *acl_file;
|
||||
FILE *f;
|
||||
FILE *f;
|
||||
{
|
||||
char new[LINESIZE];
|
||||
int ret;
|
||||
|
@ -471,7 +471,7 @@ char *principal;
|
|||
|
||||
sprintf(buf, "*.*%s", realm);
|
||||
if(acl_exact_match(acl, buf) || acl_exact_match(acl, "*.*@*")) return(1);
|
||||
|
||||
|
||||
return(0);
|
||||
}
|
||||
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
/*
|
||||
* $Source: /afs/athena.mit.edu/astaff/project/kerberos/src/include/RCS/kadm.h,v $
|
||||
* $Author: jtkohl $
|
||||
* Header: /afs/athena.mit.edu/astaff/project/kerberos/src/include/RCS/kadm.h,v 4.2 89/09/26 09:15:20 jtkohl Exp
|
||||
* $Source: /home/ncvs/src/eBones/libkadm/kadm.h,v $
|
||||
* $Author: wollman $
|
||||
* Header: /afs/athena.mit.edu/astaff/project/kerberos/src/include/RCS/kadm.h,v 4.2 89/09/26 09:15:20 jtkohl Exp
|
||||
*
|
||||
* Copyright 1988 by the Massachusetts Institute of Technology.
|
||||
*
|
||||
|
|
|
@ -13,11 +13,11 @@ static char rcsid_kadm_cli_wrap_c[] =
|
|||
"from: Id: kadm_cli_wrap.c,v 4.6 89/12/30 20:09:45 qjb Exp";
|
||||
#endif
|
||||
static const char rcsid[] =
|
||||
"$Id$";
|
||||
"$Id: kadm_cli_wrap.c,v 1.1 1995/01/20 02:02:51 wollman Exp $";
|
||||
#endif lint
|
||||
|
||||
/*
|
||||
* kadm_cli_wrap.c the client side wrapping of the calls to the admin server
|
||||
* kadm_cli_wrap.c the client side wrapping of the calls to the admin server
|
||||
*/
|
||||
|
||||
#include <sys/types.h>
|
||||
|
@ -26,7 +26,7 @@ static const char rcsid[] =
|
|||
#include <netdb.h>
|
||||
#include <sys/socket.h>
|
||||
#include <kadm.h>
|
||||
#include <kadm_err.h>
|
||||
#include <kadm_err.h>
|
||||
#include <krb_err.h>
|
||||
|
||||
#ifndef NULL
|
||||
|
@ -42,7 +42,7 @@ static Kadm_Client client_parm;
|
|||
static des_cblock sess_key; /* to be filled in by kadm_cli_keyd */
|
||||
static Key_schedule sess_sched;
|
||||
|
||||
static
|
||||
static
|
||||
clear_secrets()
|
||||
{
|
||||
bzero((char *)sess_key, sizeof(sess_key));
|
||||
|
@ -54,9 +54,9 @@ clear_secrets()
|
|||
* kadm_init_link
|
||||
* receives : name, inst, realm
|
||||
*
|
||||
* initializes client parm, the Kadm_Client structure which holds the
|
||||
* data about the connection between the server and client, the services
|
||||
* used, the locations and other fun things
|
||||
* initializes client parm, the Kadm_Client structure which holds the
|
||||
* data about the connection between the server and client, the services
|
||||
* used, the locations and other fun things
|
||||
*/
|
||||
kadm_init_link(n, i, r)
|
||||
char n[];
|
||||
|
@ -94,11 +94,11 @@ char r[];
|
|||
|
||||
/*
|
||||
* kadm_change_pw
|
||||
* recieves : key
|
||||
* recieves : key
|
||||
*
|
||||
* Replaces the password (i.e. des key) of the caller with that specified in
|
||||
* key. Returns no actual data from the master server, since this is called
|
||||
* by a user
|
||||
* by a user
|
||||
*/
|
||||
kadm_change_pw(newkey)
|
||||
des_cblock newkey; /* The DES form of the users key */
|
||||
|
@ -126,7 +126,7 @@ des_cblock newkey; /* The DES form of the users key */
|
|||
bcopy((char *) newkey, (char *) &keytmp, 4);
|
||||
keytmp = htonl(keytmp);
|
||||
stsize += vts_long(keytmp, &send_st, stsize);
|
||||
|
||||
|
||||
retc = kadm_cli_send(send_st, stsize, &ret_st, &ret_sz);
|
||||
free((char *)send_st);
|
||||
if (retc == KADM_SUCCESS) {
|
||||
|
@ -139,11 +139,11 @@ des_cblock newkey; /* The DES form of the users key */
|
|||
/*
|
||||
* kadm_add
|
||||
* receives : vals
|
||||
* returns : vals
|
||||
* returns : vals
|
||||
*
|
||||
* Adds and entry containing values to the database returns the values of the
|
||||
* entry, so if you leave certain fields blank you will be able to determine
|
||||
* the default values they are set to
|
||||
* the default values they are set to
|
||||
*/
|
||||
kadm_add(vals)
|
||||
Kadm_vals *vals;
|
||||
|
@ -176,8 +176,8 @@ Kadm_vals *vals;
|
|||
/*
|
||||
* kadm_mod
|
||||
* receives : KTEXT, {values, values}
|
||||
* returns : CKSUM, RETCODE, {values}
|
||||
* acl : su, sms (as register or dealloc)
|
||||
* returns : CKSUM, RETCODE, {values}
|
||||
* acl : su, sms (as register or dealloc)
|
||||
*
|
||||
* Modifies all entries corresponding to the first values so they match the
|
||||
* second values. returns the values for the changed entries in vals2
|
||||
|
@ -220,13 +220,13 @@ Kadm_vals *vals2;
|
|||
|
||||
/*
|
||||
* kadm_get
|
||||
* receives : KTEXT, {values, flags}
|
||||
* receives : KTEXT, {values, flags}
|
||||
* returns : CKSUM, RETCODE, {count, values, values, values}
|
||||
* acl : su
|
||||
* acl : su
|
||||
*
|
||||
* gets the fields requested by flags from all entries matching values returns
|
||||
* this data for each matching recipient, after a count of how many such
|
||||
* matches there were
|
||||
* matches there were
|
||||
*/
|
||||
kadm_get(vals, fl)
|
||||
Kadm_vals *vals;
|
||||
|
@ -265,7 +265,7 @@ u_char fl[4];
|
|||
* kadm_cli_send
|
||||
* recieves : opcode, packet, packet length, serv_name, serv_inst
|
||||
* returns : return code from the packet build, the server, or
|
||||
* something else
|
||||
* something else
|
||||
*
|
||||
* It assembles a packet as follows:
|
||||
* 8 bytes : VERSION STRING
|
||||
|
@ -273,11 +273,11 @@ u_char fl[4];
|
|||
* : KTEXT
|
||||
* : OPCODE \
|
||||
* : DATA > Encrypted (with make priv)
|
||||
* : ...... /
|
||||
* : ...... /
|
||||
*
|
||||
* If it builds the packet and it is small enough, then it attempts to open the
|
||||
* connection to the admin server. If the connection is succesfully open
|
||||
* then it sends the data and waits for a reply.
|
||||
* then it sends the data and waits for a reply.
|
||||
*/
|
||||
kadm_cli_send(st_dat, st_siz, ret_dat, ret_siz)
|
||||
u_char *st_dat; /* the actual data */
|
||||
|
|
|
@ -13,7 +13,7 @@ static char rcsid_kadm_stream_c[] =
|
|||
"Header: /afs/athena.mit.edu/astaff/project/kerberos/src/lib/kadm/RCS/kadm_stream.c,v 4.2 89/09/26 09:20:48 jtkohl Exp ";
|
||||
#endif
|
||||
static const char rcsid[] =
|
||||
"$Id$";
|
||||
"$Id: kadm_stream.c,v 1.1 1995/01/20 02:02:53 wollman Exp $";
|
||||
#endif lint
|
||||
|
||||
/*
|
||||
|
@ -32,11 +32,11 @@ static const char rcsid[] =
|
|||
|
||||
#define min(a,b) (((a) < (b)) ? (a) : (b))
|
||||
|
||||
/*
|
||||
/*
|
||||
vals_to_stream
|
||||
recieves : kadm_vals *, u_char *
|
||||
returns : a realloced and filled in u_char *
|
||||
|
||||
|
||||
this function creates a byte-stream representation of the kadm_vals structure
|
||||
*/
|
||||
vals_to_stream(dt_in, dt_out)
|
||||
|
@ -64,16 +64,16 @@ u_char **dt_out;
|
|||
case KADM_MAXLIFE:
|
||||
stsize+=vts_char(dt_in->max_life, dt_out, stsize);
|
||||
break;
|
||||
case KADM_DESKEY:
|
||||
stsize+=vts_long(dt_in->key_high, dt_out, stsize);
|
||||
stsize+=vts_long(dt_in->key_low, dt_out, stsize);
|
||||
case KADM_DESKEY:
|
||||
stsize+=vts_long(dt_in->key_high, dt_out, stsize);
|
||||
stsize+=vts_long(dt_in->key_low, dt_out, stsize);
|
||||
break;
|
||||
default:
|
||||
break;
|
||||
}
|
||||
}
|
||||
return(stsize);
|
||||
}
|
||||
}
|
||||
|
||||
build_field_header(cont, st)
|
||||
u_char *cont; /* container for fields data */
|
||||
|
@ -120,7 +120,7 @@ int loc; /* offset into the stream for current data */
|
|||
return sizeof(u_long);
|
||||
}
|
||||
|
||||
|
||||
|
||||
vts_char(dat, st, loc)
|
||||
u_char dat; /* the attributes field */
|
||||
u_char **st; /* a base pointer to the stream */
|
||||
|
@ -130,12 +130,12 @@ int loc; /* offset into the stream for current data */
|
|||
(*st)[loc] = (u_char) dat;
|
||||
return 1;
|
||||
}
|
||||
|
||||
/*
|
||||
|
||||
/*
|
||||
stream_to_vals
|
||||
recieves : u_char *, kadm_vals *
|
||||
returns : a kadm_vals filled in according to u_char *
|
||||
|
||||
|
||||
this decodes a byte stream represntation of a vals struct into kadm_vals
|
||||
*/
|
||||
stream_to_vals(dt_in, dt_out, maxlen)
|
||||
|
@ -198,7 +198,7 @@ int maxlen; /* max length to use */
|
|||
break;
|
||||
}
|
||||
return stsize;
|
||||
}
|
||||
}
|
||||
|
||||
check_field_header(st, cont, maxlen)
|
||||
u_char *st; /* stream */
|
||||
|
@ -258,7 +258,7 @@ int maxlen; /* maximum length of st */
|
|||
*dat = ntohl(temp); /* convert to network order */
|
||||
return sizeof(u_long);
|
||||
}
|
||||
|
||||
|
||||
stv_char(st, dat, loc, maxlen)
|
||||
u_char *st; /* a base pointer to the stream */
|
||||
u_char *dat; /* the attributes field */
|
||||
|
|
|
@ -13,7 +13,7 @@ static char rcsid_kadm_supp_c[] =
|
|||
"Header: /afs/athena.mit.edu/astaff/project/kerberos/src/lib/kadm/RCS/kadm_supp.c,v 4.1 89/09/26 09:21:07 jtkohl Exp ";
|
||||
#endif
|
||||
static const char rcsid[] =
|
||||
"$Id$";
|
||||
"$Id: kadm_supp.c,v 1.1 1995/01/20 02:02:54 wollman Exp $";
|
||||
#endif lint
|
||||
|
||||
/*
|
||||
|
@ -28,7 +28,7 @@ static const char rcsid[] =
|
|||
|
||||
#include "kadm.h"
|
||||
#include "krb_db.h"
|
||||
|
||||
|
||||
/*
|
||||
prin_vals:
|
||||
recieves : a vals structure
|
||||
|
@ -37,7 +37,7 @@ prin_vals(vals)
|
|||
Kadm_vals *vals;
|
||||
{
|
||||
printf("Info in Database for %s.%s:\n", vals->name, vals->instance);
|
||||
printf(" Max Life: %d Exp Date: %s\n",vals->max_life,
|
||||
printf(" Max Life: %d Exp Date: %s\n",vals->max_life,
|
||||
asctime(localtime((long *)&vals->exp_date)));
|
||||
printf(" Attribs: %.2x key: %u %u\n",vals->attributes,
|
||||
vals->key_low, vals->key_high);
|
||||
|
@ -54,7 +54,7 @@ int s;
|
|||
#endif
|
||||
|
||||
/* kadm_prin_to_vals takes a fields arguments, a Kadm_vals and a Principal,
|
||||
it copies the fields in Principal specified by fields into Kadm_vals,
|
||||
it copies the fields in Principal specified by fields into Kadm_vals,
|
||||
i.e from old to new */
|
||||
|
||||
kadm_prin_to_vals(fields, new, old)
|
||||
|
@ -64,28 +64,28 @@ Principal *old;
|
|||
{
|
||||
bzero((char *)new, sizeof(*new));
|
||||
if (IS_FIELD(KADM_NAME,fields)) {
|
||||
(void) strncpy(new->name, old->name, ANAME_SZ);
|
||||
(void) strncpy(new->name, old->name, ANAME_SZ);
|
||||
SET_FIELD(KADM_NAME, new->fields);
|
||||
}
|
||||
if (IS_FIELD(KADM_INST,fields)) {
|
||||
(void) strncpy(new->instance, old->instance, INST_SZ);
|
||||
(void) strncpy(new->instance, old->instance, INST_SZ);
|
||||
SET_FIELD(KADM_INST, new->fields);
|
||||
}
|
||||
}
|
||||
if (IS_FIELD(KADM_EXPDATE,fields)) {
|
||||
new->exp_date = old->exp_date;
|
||||
new->exp_date = old->exp_date;
|
||||
SET_FIELD(KADM_EXPDATE, new->fields);
|
||||
}
|
||||
}
|
||||
if (IS_FIELD(KADM_ATTR,fields)) {
|
||||
new->attributes = old->attributes;
|
||||
new->attributes = old->attributes;
|
||||
SET_FIELD(KADM_MAXLIFE, new->fields);
|
||||
}
|
||||
}
|
||||
if (IS_FIELD(KADM_MAXLIFE,fields)) {
|
||||
new->max_life = old->max_life;
|
||||
new->max_life = old->max_life;
|
||||
SET_FIELD(KADM_MAXLIFE, new->fields);
|
||||
}
|
||||
}
|
||||
if (IS_FIELD(KADM_DESKEY,fields)) {
|
||||
new->key_low = old->key_low;
|
||||
new->key_high = old->key_high;
|
||||
new->key_low = old->key_low;
|
||||
new->key_high = old->key_high;
|
||||
SET_FIELD(KADM_DESKEY, new->fields);
|
||||
}
|
||||
}
|
||||
|
@ -98,17 +98,17 @@ Kadm_vals *old;
|
|||
|
||||
bzero((char *)new, sizeof(*new));
|
||||
if (IS_FIELD(KADM_NAME,fields))
|
||||
(void) strncpy(new->name, old->name, ANAME_SZ);
|
||||
(void) strncpy(new->name, old->name, ANAME_SZ);
|
||||
if (IS_FIELD(KADM_INST,fields))
|
||||
(void) strncpy(new->instance, old->instance, INST_SZ);
|
||||
(void) strncpy(new->instance, old->instance, INST_SZ);
|
||||
if (IS_FIELD(KADM_EXPDATE,fields))
|
||||
new->exp_date = old->exp_date;
|
||||
new->exp_date = old->exp_date;
|
||||
if (IS_FIELD(KADM_ATTR,fields))
|
||||
new->attributes = old->attributes;
|
||||
new->attributes = old->attributes;
|
||||
if (IS_FIELD(KADM_MAXLIFE,fields))
|
||||
new->max_life = old->max_life;
|
||||
new->max_life = old->max_life;
|
||||
if (IS_FIELD(KADM_DESKEY,fields)) {
|
||||
new->key_low = old->key_low;
|
||||
new->key_high = old->key_high;
|
||||
new->key_low = old->key_low;
|
||||
new->key_high = old->key_high;
|
||||
}
|
||||
}
|
||||
|
|
|
@ -1,17 +1,17 @@
|
|||
/*
|
||||
* Copyright 1988 by the Massachusetts Institute of Technology.
|
||||
* Copyright 1988 by the Massachusetts Institute of Technology.
|
||||
* For copying and distribution information, please see the file
|
||||
* <Copyright.MIT>.
|
||||
*
|
||||
* This is where a cache would be implemented, if it were necessary.
|
||||
*
|
||||
* from: krb_cache.c,v 4.5 89/01/24 18:12:34 jon Exp $
|
||||
* $Id: krb_cache.c,v 1.2 1994/07/19 19:23:35 g89r4222 Exp $
|
||||
* $Id: krb_cache.c,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: krb_cache.c,v 1.2 1994/07/19 19:23:35 g89r4222 Exp $";
|
||||
"$Id: krb_cache.c,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $";
|
||||
#endif lint
|
||||
|
||||
#include <stdio.h>
|
||||
|
@ -34,7 +34,7 @@ extern long kerb_debug;
|
|||
static init = 0;
|
||||
|
||||
/*
|
||||
* initialization routine for cache
|
||||
* initialization routine for cache
|
||||
*/
|
||||
|
||||
int
|
||||
|
@ -45,7 +45,7 @@ kerb_cache_init()
|
|||
}
|
||||
|
||||
/*
|
||||
* look up a principal in the cache returns number of principals found
|
||||
* look up a principal in the cache returns number of principals found
|
||||
*/
|
||||
|
||||
int
|
||||
|
@ -66,7 +66,7 @@ kerb_cache_get_principal(serv, inst, principal, max)
|
|||
fprintf(stderr, "cache_get_principal for %s %s max = %d\n",
|
||||
serv, inst, max);
|
||||
#endif DEBUG
|
||||
|
||||
|
||||
#ifdef DEBUG
|
||||
if (kerb_debug & 2) {
|
||||
if (found) {
|
||||
|
@ -83,7 +83,7 @@ kerb_cache_get_principal(serv, inst, principal, max)
|
|||
|
||||
/*
|
||||
* insert/replace a principal in the cache returns number of principals
|
||||
* inserted
|
||||
* inserted
|
||||
*/
|
||||
|
||||
int
|
||||
|
@ -106,13 +106,13 @@ kerb_cache_put_principal(principal, max)
|
|||
max);
|
||||
}
|
||||
#endif
|
||||
|
||||
|
||||
for (i = 0; i < max; i++) {
|
||||
#ifdef DEBUG
|
||||
if (kerb_debug & 2)
|
||||
fprintf(stderr, "\n %s %s",
|
||||
principal->name, principal->instance);
|
||||
#endif
|
||||
#endif
|
||||
/* DO IT */
|
||||
count++;
|
||||
principal++;
|
||||
|
@ -121,7 +121,7 @@ kerb_cache_put_principal(principal, max)
|
|||
}
|
||||
|
||||
/*
|
||||
* look up a dba in the cache returns number of dbas found
|
||||
* look up a dba in the cache returns number of dbas found
|
||||
*/
|
||||
|
||||
int
|
||||
|
@ -158,7 +158,7 @@ kerb_cache_get_dba(serv, inst, dba, max)
|
|||
}
|
||||
|
||||
/*
|
||||
* insert/replace a dba in the cache returns number of dbas inserted
|
||||
* insert/replace a dba in the cache returns number of dbas inserted
|
||||
*/
|
||||
|
||||
int
|
||||
|
@ -183,7 +183,7 @@ kerb_cache_put_dba(dba, max)
|
|||
if (kerb_debug & 2)
|
||||
fprintf(stderr, "\n %s %s",
|
||||
dba->name, dba->instance);
|
||||
#endif
|
||||
#endif
|
||||
/* DO IT */
|
||||
count++;
|
||||
dba++;
|
||||
|
|
|
@ -1,15 +1,15 @@
|
|||
/*
|
||||
* Copyright 1988 by the Massachusetts Institute of Technology.
|
||||
* Copyright 1988 by the Massachusetts Institute of Technology.
|
||||
* For copying and distribution information, please see the file
|
||||
* <Copyright.MIT>.
|
||||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: krb_dbm.c,v 4.9 89/04/18 16:15:13 wesommer Exp $
|
||||
* $Id: krb_dbm.c,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $
|
||||
* $Id: krb_dbm.c,v 1.2 1995/01/25 19:45:25 ache Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: krb_dbm.c,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $";
|
||||
"$Id: krb_dbm.c,v 1.2 1995/01/25 19:45:25 ache Exp $";
|
||||
#endif lint
|
||||
|
||||
#if defined(__FreeBSD__)
|
||||
|
@ -69,14 +69,14 @@ static int non_blocking = 0;
|
|||
|
||||
/*
|
||||
* Locking:
|
||||
*
|
||||
*
|
||||
* There are two distinct locking protocols used. One is designed to
|
||||
* lock against processes (the admin_server, for one) which make
|
||||
* incremental changes to the database; the other is designed to lock
|
||||
* against utilities (kdb_util, kpropd) which replace the entire
|
||||
* database in one fell swoop.
|
||||
*
|
||||
* The first locking protocol is implemented using flock() in the
|
||||
* The first locking protocol is implemented using flock() in the
|
||||
* krb_dbl_lock() and krb_dbl_unlock routines.
|
||||
*
|
||||
* The second locking protocol is necessary because DBM "files" are
|
||||
|
@ -93,12 +93,12 @@ static int non_blocking = 0;
|
|||
* either time, the reader sleeps for a second to let things
|
||||
* stabilize, and then tries again; if it does not succeed after
|
||||
* KERB_DB_MAX_RETRY attempts, it gives up.
|
||||
*
|
||||
*
|
||||
* On update, the semaphore file is deleted (if it exists) before any
|
||||
* update takes place; at the end of the update, it is replaced, with
|
||||
* a version number strictly greater than the version number which
|
||||
* existed at the start of the update.
|
||||
*
|
||||
*
|
||||
* If the system crashes in the middle of an update, the semaphore
|
||||
* file is not automatically created on reboot; this is a feature, not
|
||||
* a bug, since the database may be inconsistant. Note that the
|
||||
|
@ -140,7 +140,7 @@ static char *gen_dbsuffix(db_name, sfx)
|
|||
char *sfx;
|
||||
{
|
||||
char *dbsuffix;
|
||||
|
||||
|
||||
if (sfx == NULL)
|
||||
sfx = ".ok";
|
||||
|
||||
|
@ -162,7 +162,7 @@ kerb_db_init()
|
|||
|
||||
/*
|
||||
* gracefully shut down database--must be called by ANY program that does
|
||||
* a kerb_db_init
|
||||
* a kerb_db_init
|
||||
*/
|
||||
|
||||
kerb_db_fini()
|
||||
|
@ -201,7 +201,7 @@ long kerb_get_db_age()
|
|||
struct stat st;
|
||||
char *okname;
|
||||
long age;
|
||||
|
||||
|
||||
okname = gen_dbsuffix(current_db_name, ".ok");
|
||||
|
||||
if (stat (okname, &st) < 0)
|
||||
|
@ -226,7 +226,7 @@ static long kerb_start_update(db_name)
|
|||
{
|
||||
char *okname = gen_dbsuffix(db_name, ".ok");
|
||||
long age = kerb_get_db_age();
|
||||
|
||||
|
||||
if (unlink(okname) < 0
|
||||
&& errno != ENOENT) {
|
||||
age = -1;
|
||||
|
@ -243,7 +243,7 @@ static long kerb_end_update(db_name, age)
|
|||
int retval = 0;
|
||||
char *new_okname = gen_dbsuffix(db_name, ".ok#");
|
||||
char *okname = gen_dbsuffix(db_name, ".ok");
|
||||
|
||||
|
||||
fd = open (new_okname, O_CREAT|O_RDWR|O_TRUNC, 0600);
|
||||
if (fd < 0)
|
||||
retval = errno;
|
||||
|
@ -355,7 +355,7 @@ kerb_db_rename(from, to)
|
|||
char *fromok = gen_dbsuffix(from, ".ok");
|
||||
long trans = kerb_start_update(to);
|
||||
int ok;
|
||||
|
||||
|
||||
#ifndef __FreeBSD__
|
||||
if ((rename (fromdir, todir) == 0)
|
||||
&& (rename (frompag, topag) == 0)) {
|
||||
|
@ -384,7 +384,7 @@ kerb_db_rename(from, to)
|
|||
|
||||
/*
|
||||
* look up a principal in the data base returns number of principals
|
||||
* found , and whether there were more than requested.
|
||||
* found , and whether there were more than requested.
|
||||
*/
|
||||
|
||||
kerb_db_get_principal(name, inst, principal, max, more)
|
||||
|
@ -627,7 +627,7 @@ delta_stat(a, b, c)
|
|||
|
||||
/*
|
||||
* look up a dba in the data base returns number of dbas found , and
|
||||
* whether there were more than requested.
|
||||
* whether there were more than requested.
|
||||
*/
|
||||
|
||||
kerb_db_get_dba(dba_name, dba_inst, dba, max, more)
|
||||
|
@ -650,7 +650,7 @@ kerb_db_iterate (func, arg)
|
|||
Principal *principal;
|
||||
int code;
|
||||
DBM *db;
|
||||
|
||||
|
||||
kerb_db_init(); /* initialize and open the database */
|
||||
if ((code = kerb_dbl_lock(KERB_DBL_SHARED)) != 0)
|
||||
return code;
|
||||
|
@ -701,7 +701,7 @@ static int kerb_dbl_lock(mode)
|
|||
int mode;
|
||||
{
|
||||
int flock_mode;
|
||||
|
||||
|
||||
if (!inited)
|
||||
kerb_dbl_init();
|
||||
if (mylock) { /* Detect lock call when lock already
|
||||
|
@ -723,8 +723,8 @@ static int kerb_dbl_lock(mode)
|
|||
}
|
||||
if (non_blocking)
|
||||
flock_mode |= LOCK_NB;
|
||||
|
||||
if (flock(dblfd, flock_mode) < 0)
|
||||
|
||||
if (flock(dblfd, flock_mode) < 0)
|
||||
return errno;
|
||||
mylock++;
|
||||
return 0;
|
||||
|
|
|
@ -10,12 +10,12 @@
|
|||
* Jon Rochlis, MIT Telecom, March 1988
|
||||
*
|
||||
* from: krb_kdb_utils.c,v 4.1 89/07/26 11:01:12 jtkohl Exp $
|
||||
* $Id: krb_kdb_utils.c,v 1.2 1994/07/19 19:23:38 g89r4222 Exp $
|
||||
* $Id: krb_kdb_utils.c,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: krb_kdb_utils.c,v 1.2 1994/07/19 19:23:38 g89r4222 Exp $";
|
||||
"$Id: krb_kdb_utils.c,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $";
|
||||
#endif lint
|
||||
|
||||
#include <des.h>
|
||||
|
@ -79,7 +79,7 @@ long kdb_verify_master_key (master_key, master_key_sched, out)
|
|||
n = kerb_get_principal(KERB_M_NAME, KERB_M_INST, principal_data,
|
||||
1 /* only one please */, &more);
|
||||
if ((n != 1) || more) {
|
||||
if (out != (FILE *) NULL)
|
||||
if (out != (FILE *) NULL)
|
||||
fprintf(out,
|
||||
"verify_master_key: %s, %d found.\n",
|
||||
"Kerberos error on master key version lookup",
|
||||
|
@ -96,11 +96,11 @@ long kdb_verify_master_key (master_key, master_key_sched, out)
|
|||
|
||||
/*
|
||||
* now use the master key to decrypt the key in the db, had better
|
||||
* be the same!
|
||||
* be the same!
|
||||
*/
|
||||
bcopy(&principal_data[0].key_low, key_from_db, 4);
|
||||
bcopy(&principal_data[0].key_high, ((long *) key_from_db) + 1, 4);
|
||||
kdb_encrypt_key (key_from_db, key_from_db,
|
||||
kdb_encrypt_key (key_from_db, key_from_db,
|
||||
master_key, master_key_sched, DECRYPT);
|
||||
|
||||
/* the decrypted database key had better equal the master key */
|
||||
|
|
|
@ -1,16 +1,16 @@
|
|||
/*
|
||||
* $Source: /home/CVS/src/eBones/kdb/krb_lib.c,v $
|
||||
* $Author: g89r4222 $
|
||||
* $Source: /home/ncvs/src/eBones/kdb/krb_lib.c,v $
|
||||
* $Author: csgr $
|
||||
*
|
||||
* Copyright 1988 by the Massachusetts Institute of Technology.
|
||||
* Copyright 1988 by the Massachusetts Institute of Technology.
|
||||
*
|
||||
* For copying and distribution information, please see the file
|
||||
* <mit-copyright.h>.
|
||||
* <mit-copyright.h>.
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: krb_lib.c,v 1.2 1994/07/19 19:23:39 g89r4222 Exp $";
|
||||
"$Id: krb_lib.c,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $";
|
||||
#endif lint
|
||||
|
||||
#include <stdio.h>
|
||||
|
@ -37,7 +37,7 @@ extern char *getenv();
|
|||
static init = 0;
|
||||
|
||||
/*
|
||||
* initialization routine for data base
|
||||
* initialization routine for data base
|
||||
*/
|
||||
|
||||
int
|
||||
|
@ -64,7 +64,7 @@ kerb_init()
|
|||
/*
|
||||
* finalization routine for database -- NOTE: MUST be called by any
|
||||
* program using kerb_init. ALSO will have to be modified to finalize
|
||||
* caches, if they're ever really implemented.
|
||||
* caches, if they're ever really implemented.
|
||||
*/
|
||||
|
||||
int
|
||||
|
@ -75,7 +75,7 @@ kerb_fini()
|
|||
|
||||
/*
|
||||
* look up a principal in the cache or data base returns number of
|
||||
* principals found
|
||||
* principals found
|
||||
*/
|
||||
|
||||
int
|
||||
|
@ -99,10 +99,10 @@ kerb_get_principal(name, inst, principal, max, more)
|
|||
fprintf(stderr, "\n%s: kerb_get_principal for %s %s max = %d\n",
|
||||
progname, name, inst, max);
|
||||
#endif
|
||||
|
||||
|
||||
/*
|
||||
* if this is a request including a wild card, have to go to db
|
||||
* since the cache may not be exhaustive.
|
||||
* since the cache may not be exhaustive.
|
||||
*/
|
||||
|
||||
/* clear the principal area */
|
||||
|
@ -111,7 +111,7 @@ kerb_get_principal(name, inst, principal, max, more)
|
|||
#ifdef CACHE
|
||||
/*
|
||||
* so check to see if the name contains a wildcard "*" or "?", not
|
||||
* preceeded by a backslash.
|
||||
* preceeded by a backslash.
|
||||
*/
|
||||
wild = 0;
|
||||
if (index(name, '*') || index(name, '?') ||
|
||||
|
@ -206,7 +206,7 @@ kerb_get_dba(name, inst, dba, max, more)
|
|||
#endif
|
||||
/*
|
||||
* if this is a request including a wild card, have to go to db
|
||||
* since the cache may not be exhaustive.
|
||||
* since the cache may not be exhaustive.
|
||||
*/
|
||||
|
||||
/* clear the dba area */
|
||||
|
@ -215,7 +215,7 @@ kerb_get_dba(name, inst, dba, max, more)
|
|||
#ifdef CACHE
|
||||
/*
|
||||
* so check to see if the name contains a wildcard "*" or "?", not
|
||||
* preceeded by a backslash.
|
||||
* preceeded by a backslash.
|
||||
*/
|
||||
|
||||
wild = 0;
|
||||
|
|
|
@ -1,15 +1,15 @@
|
|||
/*
|
||||
* Copyright 1988 by the Massachusetts Institute of Technology.
|
||||
* Copyright 1988 by the Massachusetts Institute of Technology.
|
||||
* For copying and distribution information, please see the file
|
||||
* <Copyright.MIT>.
|
||||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: $Header: /home/CVS/src/eBones/kdb/print_princ.c,v 1.2 1994/07/19 19:23:41 g89r4222 Exp $
|
||||
* $Id: print_princ.c,v 1.2 1994/07/19 19:23:41 g89r4222 Exp $
|
||||
* from: $Header: /home/ncvs/src/eBones/kdb/print_princ.c,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $
|
||||
* $Id: print_princ.c,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: print_princ.c,v 1.2 1994/07/19 19:23:41 g89r4222 Exp $";
|
||||
"$Id: print_princ.c,v 1.1.1.1 1994/09/30 14:49:55 csgr Exp $";
|
||||
#endif lint
|
||||
|
||||
#include <stdio.h>
|
||||
|
|
|
@ -5,12 +5,12 @@
|
|||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: create_auth_reply.c,v 4.10 89/01/13 17:47:38 steiner Exp $
|
||||
* $Id: create_auth_reply.c,v 1.2 1994/07/19 19:24:56 g89r4222 Exp $
|
||||
* $Id: create_auth_reply.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char *rcsid =
|
||||
"$Id: create_auth_reply.c,v 1.2 1994/07/19 19:24:56 g89r4222 Exp $";
|
||||
"$Id: create_auth_reply.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $";
|
||||
#endif /* lint */
|
||||
|
||||
#include <krb.h>
|
||||
|
@ -30,34 +30,34 @@ static char *rcsid =
|
|||
* must copy it elsewhere.
|
||||
*
|
||||
* The packet is built in the following format:
|
||||
*
|
||||
*
|
||||
* variable
|
||||
* type or constant data
|
||||
* ---- ----------- ----
|
||||
*
|
||||
*
|
||||
* unsigned char KRB_PROT_VERSION protocol version number
|
||||
*
|
||||
*
|
||||
* unsigned char AUTH_MSG_KDC_REPLY protocol message type
|
||||
*
|
||||
*
|
||||
* [least significant HOST_BYTE_ORDER sender's (server's) byte
|
||||
* bit of above field] order
|
||||
*
|
||||
*
|
||||
* string pname principal's name
|
||||
*
|
||||
*
|
||||
* string pinst principal's instance
|
||||
*
|
||||
*
|
||||
* string prealm principal's realm
|
||||
*
|
||||
*
|
||||
* unsigned long time_ws client's timestamp
|
||||
*
|
||||
*
|
||||
* unsigned char n number of tickets
|
||||
*
|
||||
*
|
||||
* unsigned long x_date expiration date
|
||||
*
|
||||
*
|
||||
* unsigned char kvno master key version
|
||||
*
|
||||
*
|
||||
* short w_1 cipher length
|
||||
*
|
||||
*
|
||||
* --- cipher->dat cipher data
|
||||
*/
|
||||
|
||||
|
|
|
@ -5,12 +5,12 @@
|
|||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: create_ciph.c,v 4.8 89/05/18 21:24:26 jis Exp $
|
||||
* $Id: create_ciph.c,v 1.2 1994/07/19 19:24:58 g89r4222 Exp $
|
||||
* $Id: create_ciph.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char *rcsid =
|
||||
"$Id: create_ciph.c,v 1.2 1994/07/19 19:24:58 g89r4222 Exp $";
|
||||
"$Id: create_ciph.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $";
|
||||
#endif /* lint */
|
||||
|
||||
#include <krb.h>
|
||||
|
@ -30,24 +30,24 @@ static char *rcsid =
|
|||
* variable
|
||||
* type or constant data
|
||||
* ---- ----------- ----
|
||||
*
|
||||
*
|
||||
*
|
||||
*
|
||||
* 8 bytes session session key for client, service
|
||||
*
|
||||
*
|
||||
* string service service name
|
||||
*
|
||||
*
|
||||
* string instance service instance
|
||||
*
|
||||
*
|
||||
* string realm KDC realm
|
||||
*
|
||||
*
|
||||
* unsigned char life ticket lifetime
|
||||
*
|
||||
*
|
||||
* unsigned char kvno service key version number
|
||||
*
|
||||
*
|
||||
* unsigned char tkt->length length of following ticket
|
||||
*
|
||||
*
|
||||
* data tkt->dat ticket for service
|
||||
*
|
||||
*
|
||||
* 4 bytes kdc_time KDC's timestamp
|
||||
*
|
||||
* <=7 bytes null null pad to 8 byte multiple
|
||||
|
|
|
@ -5,12 +5,12 @@
|
|||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: create_death_packet.c,v 4.9 89/01/17 16:05:59 rfrench Exp $
|
||||
* $Id: create_death_packet.c,v 1.2 1994/07/19 19:24:59 g89r4222 Exp $
|
||||
* $Id: create_death_packet.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char *rcsid =
|
||||
"$Id: create_death_packet.c,v 1.2 1994/07/19 19:24:59 g89r4222 Exp $";
|
||||
"$Id: create_death_packet.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $";
|
||||
#endif /* lint */
|
||||
|
||||
#include <krb.h>
|
||||
|
@ -32,12 +32,12 @@ static char *rcsid =
|
|||
* ---- ----------- ----
|
||||
*
|
||||
* unsigned char KRB_PROT_VERSION protocol version number
|
||||
*
|
||||
*
|
||||
* unsigned char AUTH_MSG_DIE message type
|
||||
*
|
||||
*
|
||||
* [least significant HOST_BYTE_ORDER byte order of sender
|
||||
* bit of above field]
|
||||
*
|
||||
*
|
||||
* string a_name presumably, name of
|
||||
* principal sending killer
|
||||
* packet
|
||||
|
|
|
@ -1,16 +1,16 @@
|
|||
/*
|
||||
/*
|
||||
* Copyright 1985, 1986, 1987, 1988 by the Massachusetts Institute
|
||||
* of Technology.
|
||||
* For copying and distribution information, please see the file
|
||||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: create_ticket.c,v 4.11 89/03/22 14:43:23 jtkohl Exp $
|
||||
* $Id: create_ticket.c,v 1.2 1994/07/19 19:25:01 g89r4222 Exp $
|
||||
* $Id: create_ticket.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: create_ticket.c,v 1.2 1994/07/19 19:25:01 g89r4222 Exp $";
|
||||
"$Id: create_ticket.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $";
|
||||
#endif /* lint */
|
||||
|
||||
#include <stdio.h>
|
||||
|
@ -35,35 +35,35 @@ static char rcsid[] =
|
|||
* corresponding changes should also be made to that file.
|
||||
*
|
||||
* The packet is built in the following format:
|
||||
*
|
||||
*
|
||||
* variable
|
||||
* type or constant data
|
||||
* ---- ----------- ----
|
||||
*
|
||||
* tkt->length length of ticket (multiple of 8 bytes)
|
||||
*
|
||||
*
|
||||
* tkt->dat:
|
||||
*
|
||||
*
|
||||
* unsigned char flags namely, HOST_BYTE_ORDER
|
||||
*
|
||||
*
|
||||
* string pname client's name
|
||||
*
|
||||
*
|
||||
* string pinstance client's instance
|
||||
*
|
||||
*
|
||||
* string prealm client's realm
|
||||
*
|
||||
*
|
||||
* 4 bytes paddress client's address
|
||||
*
|
||||
*
|
||||
* 8 bytes session session key
|
||||
*
|
||||
*
|
||||
* 1 byte life ticket lifetime
|
||||
*
|
||||
*
|
||||
* 4 bytes time_sec KDC timestamp
|
||||
*
|
||||
*
|
||||
* string sname service's name
|
||||
*
|
||||
*
|
||||
* string sinstance service's instance
|
||||
*
|
||||
*
|
||||
* <=7 bytes null null pad to 8 byte multiple
|
||||
*
|
||||
*/
|
||||
|
|
|
@ -11,7 +11,7 @@
|
|||
* are met:
|
||||
* 1. Redistributions of source code must retain the entire comment,
|
||||
* including the above copyright notice, this list of conditions
|
||||
* and the following disclaimer, verbatim, at the beginning of
|
||||
* and the following disclaimer, verbatim, at the beginning of
|
||||
* the source file.
|
||||
* 2. Redistributions in binary form must reproduce the above copyright
|
||||
* notice, this list of conditions and the following disclaimer in the
|
||||
|
@ -35,7 +35,7 @@
|
|||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||
* SUCH DAMAGE.
|
||||
*
|
||||
* $Id: des_rw.c,v 1.5 1994/09/24 18:54:41 g89r4222 Exp $
|
||||
* $Id: des_rw.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $
|
||||
*/
|
||||
|
||||
/*
|
||||
|
@ -61,11 +61,11 @@
|
|||
* +--+--+--+--+--+--+--+--+
|
||||
* | garbage | data |
|
||||
* | |
|
||||
* +-----------------------+----> des_pcbc_encrypt() -->
|
||||
* +-----------------------+----> des_pcbc_encrypt() -->
|
||||
*
|
||||
* (Note that the length field sent before the actual message specifies
|
||||
* the number of data bytes, not the length of the entire padded message.
|
||||
*
|
||||
*
|
||||
* When data is read, if the message received is longer than the number
|
||||
* of bytes requested, then the remaining bytes are stored until the
|
||||
* following call to des_read(). If the number of bytes received is
|
||||
|
@ -160,7 +160,7 @@ int des_read(fd, buf, len)
|
|||
stored -= len;
|
||||
buff_ptr += len;
|
||||
return(len);
|
||||
} else {
|
||||
} else {
|
||||
if (stored) {
|
||||
bcopy(buff_ptr, buf, stored);
|
||||
nreturned = stored;
|
||||
|
@ -184,11 +184,11 @@ int des_read(fd, buf, len)
|
|||
if(nread != pad_length)
|
||||
return(0);
|
||||
|
||||
des_pcbc_encrypt((des_cblock*) des_buff, (des_cblock*) buff_ptr,
|
||||
des_pcbc_encrypt((des_cblock*) des_buff, (des_cblock*) buff_ptr,
|
||||
(msg_length < 8 ? 8 : msg_length),
|
||||
key_sched, (des_cblock*) &des_key, DES_DECRYPT);
|
||||
|
||||
|
||||
|
||||
if(msg_length < 8)
|
||||
buff_ptr += (8 - msg_length);
|
||||
stored = msg_length;
|
||||
|
@ -237,7 +237,7 @@ int des_write(fd, buf, len)
|
|||
|
||||
for(i = 0 ; i < 8 ; i+= sizeof(long)) {
|
||||
rnd = random();
|
||||
bcopy(&rnd, garbage+i,
|
||||
bcopy(&rnd, garbage+i,
|
||||
(i <= (8 - sizeof(long)))?sizeof(long):(8-i));
|
||||
}
|
||||
bcopy(buf, garbage + 8 - len, len);
|
||||
|
@ -253,7 +253,7 @@ int des_write(fd, buf, len)
|
|||
|
||||
|
||||
write_len = htonl(len);
|
||||
if(write(fd, &write_len, sizeof(write_len)) != sizeof(write_len))
|
||||
if(write(fd, &write_len, sizeof(write_len)) != sizeof(write_len))
|
||||
return(-1);
|
||||
if(write(fd, des_buff, pad_len) != pad_len)
|
||||
return(-1);
|
||||
|
|
|
@ -5,12 +5,12 @@
|
|||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: dest_tkt.c,v 4.9 89/10/02 16:23:07 jtkohl Exp $
|
||||
* $Id: dest_tkt.c,v 1.2 1994/07/19 19:25:07 g89r4222 Exp $
|
||||
* $Id: dest_tkt.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char *rcsid =
|
||||
"$Id: dest_tkt.c,v 1.2 1994/07/19 19:25:07 g89r4222 Exp $";
|
||||
"$Id: dest_tkt.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $";
|
||||
#endif /* lint */
|
||||
|
||||
#include <stdio.h>
|
||||
|
@ -75,8 +75,8 @@ dest_tkt()
|
|||
if (errno == ENOENT) return RET_TKFIL;
|
||||
else if (errno != 0) return KFAILURE;
|
||||
#ifdef TKT_SHMEM
|
||||
/*
|
||||
* handle the shared memory case
|
||||
/*
|
||||
* handle the shared memory case
|
||||
*/
|
||||
(void) strcpy(shmidname, file);
|
||||
(void) strcat(shmidname, ".shm");
|
||||
|
|
|
@ -1,15 +1,15 @@
|
|||
/*
|
||||
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
|
||||
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
|
||||
* For copying and distribution information, please see the file
|
||||
* <Copyright.MIT>.
|
||||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: fgetst.c,v 4.0 89/01/23 10:08:31 jtkohl Exp $
|
||||
* $Id: fgetst.c,v 1.2 1994/07/19 19:25:10 g89r4222 Exp $
|
||||
* $Id: fgetst.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: fgetst.c,v 1.2 1994/07/19 19:25:10 g89r4222 Exp $";
|
||||
"$Id: fgetst.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $";
|
||||
#endif /* lint */
|
||||
|
||||
#include <stdio.h>
|
||||
|
@ -20,7 +20,7 @@ static char rcsid[] =
|
|||
* until it reads a null byte. When finished, what has been read exists
|
||||
* in "s". If "count" characters were actually read, the last is changed
|
||||
* to a null, so the returned string is always null-terminated. fgetst
|
||||
* returns the number of characters read, including the null terminator.
|
||||
* returns the number of characters read, including the null terminator.
|
||||
*/
|
||||
|
||||
fgetst(f, s, n)
|
||||
|
|
|
@ -5,12 +5,12 @@
|
|||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: get_ad_tkt.c,v 4.15 89/07/07 15:18:51 jtkohl Exp $
|
||||
* $Id: get_ad_tkt.c,v 1.2 1994/07/19 19:25:11 g89r4222 Exp $
|
||||
* $Id: get_ad_tkt.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: get_ad_tkt.c,v 1.2 1994/07/19 19:25:11 g89r4222 Exp $";
|
||||
"$Id: get_ad_tkt.c,v 1.1.1.1 1994/09/30 14:49:59 csgr Exp $";
|
||||
#endif /* lint */
|
||||
|
||||
#include <krb.h>
|
||||
|
@ -55,7 +55,7 @@ unsigned long rep_err_code;
|
|||
*
|
||||
* TEXT original contents of authenticator+ticket
|
||||
* pkt->dat built in krb_mk_req call
|
||||
*
|
||||
*
|
||||
* 4 bytes time_ws always 0 (?)
|
||||
* char lifetime lifetime argument passed
|
||||
* string service service name argument
|
||||
|
@ -106,12 +106,12 @@ get_ad_tkt(service,sinstance,realm,lifetime)
|
|||
|
||||
/*
|
||||
* Look for the session key (and other stuff we don't need)
|
||||
* in the ticket file for krbtgt.realm@lrealm where "realm"
|
||||
* is the service's realm (passed in "realm" argument) and
|
||||
* lrealm is the realm of our initial ticket. If we don't
|
||||
* in the ticket file for krbtgt.realm@lrealm where "realm"
|
||||
* is the service's realm (passed in "realm" argument) and
|
||||
* lrealm is the realm of our initial ticket. If we don't
|
||||
* have this, we will try to get it.
|
||||
*/
|
||||
|
||||
|
||||
if ((kerror = krb_get_cred("krbtgt",realm,lrealm,&cr)) != KSUCCESS) {
|
||||
/*
|
||||
* If realm == lrealm, we have no hope, so let's not even try.
|
||||
|
@ -119,20 +119,20 @@ get_ad_tkt(service,sinstance,realm,lifetime)
|
|||
if ((strncmp(realm, lrealm, REALM_SZ)) == 0)
|
||||
return(AD_NOTGT);
|
||||
else{
|
||||
if ((kerror =
|
||||
if ((kerror =
|
||||
get_ad_tkt("krbtgt",realm,lrealm,lifetime)) != KSUCCESS)
|
||||
return(kerror);
|
||||
if ((kerror = krb_get_cred("krbtgt",realm,lrealm,&cr)) != KSUCCESS)
|
||||
return(kerror);
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* Make up a request packet to the "krbtgt.realm@lrealm".
|
||||
* Start by calling krb_mk_req() which puts ticket+authenticator
|
||||
* into "pkt". Then tack other stuff on the end.
|
||||
*/
|
||||
|
||||
|
||||
kerror = krb_mk_req(pkt,"krbtgt",realm,lrealm,0L);
|
||||
|
||||
if (kerror)
|
||||
|
|
|
@ -5,12 +5,12 @@
|
|||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: get_cred.c,v 4.10 89/05/31 17:46:22 jtkohl Exp $
|
||||
* $Id: get_cred.c,v 1.2 1994/07/19 19:25:14 g89r4222 Exp $
|
||||
* $Id: get_cred.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char *rcsid =
|
||||
"$Id: get_cred.c,v 1.2 1994/07/19 19:25:14 g89r4222 Exp $";
|
||||
"$Id: get_cred.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $";
|
||||
#endif /* lint */
|
||||
|
||||
#include <stdio.h>
|
||||
|
@ -44,7 +44,7 @@ krb_get_cred(service,instance,realm,c)
|
|||
return (tf_status);
|
||||
|
||||
/* Search for requested service credentials and copy into c */
|
||||
|
||||
|
||||
while ((tf_status = tf_get_cred(c)) == KSUCCESS) {
|
||||
/* Is this the right ticket? */
|
||||
if ((strcmp(c->service,service) == 0) &&
|
||||
|
|
|
@ -4,12 +4,12 @@
|
|||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: get_in_tkt.c,v 4.12 89/07/18 16:32:56 jtkohl Exp $
|
||||
* $Id: get_in_tkt.c,v 1.2 1994/07/19 19:25:16 g89r4222 Exp $
|
||||
* $Id: get_in_tkt.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: get_in_tkt.c,v 1.2 1994/07/19 19:25:16 g89r4222 Exp $";
|
||||
"$Id: get_in_tkt.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $";
|
||||
#endif /* lint */
|
||||
|
||||
#include <krb.h>
|
||||
|
@ -69,7 +69,7 @@ static int passwd_to_key(user,instance,realm,passwd,key)
|
|||
* krb_get_pw_in_tkt() passes two additional arguments to krb_get_in_tkt():
|
||||
* the name of a routine (passwd_to_key()) to be used to get the
|
||||
* password in case the "password" argument is null and NULL for the
|
||||
* decryption procedure indicating that krb_get_in_tkt should use the
|
||||
* decryption procedure indicating that krb_get_in_tkt should use the
|
||||
* default method of decrypting the response from the KDC.
|
||||
*
|
||||
* The result of the call to krb_get_in_tkt() is returned.
|
||||
|
@ -86,8 +86,8 @@ krb_get_pw_in_tkt(user,instance,realm,service,sinstance,life,password)
|
|||
|
||||
#ifdef NOENCRYPTION
|
||||
/*
|
||||
* $Source: /home/CVS/src/eBones/krb/get_in_tkt.c,v $
|
||||
* $Author: g89r4222 $
|
||||
* $Source: /home/ncvs/src/eBones/krb/get_in_tkt.c,v $
|
||||
* $Author: csgr $
|
||||
*
|
||||
* Copyright 1985, 1986, 1987, 1988 by the Massachusetts Institute
|
||||
* of Technology.
|
||||
|
@ -102,7 +102,7 @@ krb_get_pw_in_tkt(user,instance,realm,service,sinstance,life,password)
|
|||
|
||||
#ifndef lint
|
||||
static char rcsid_read_password_c[] =
|
||||
"Bones$Header: /home/CVS/src/eBones/krb/get_in_tkt.c,v 1.2 1994/07/19 19:25:16 g89r4222 Exp $";
|
||||
"Bones$Header: /home/ncvs/src/eBones/krb/get_in_tkt.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $";
|
||||
#endif lint
|
||||
|
||||
#include <des.h>
|
||||
|
@ -170,7 +170,7 @@ placebo_read_pw_string(s,max,prompt,verify)
|
|||
{
|
||||
int ok = 0;
|
||||
char *ptr;
|
||||
|
||||
|
||||
#ifdef BSDUNIX
|
||||
jmp_buf old_env;
|
||||
struct sgttyb tty_state;
|
||||
|
@ -187,7 +187,7 @@ placebo_read_pw_string(s,max,prompt,verify)
|
|||
goto lose;
|
||||
|
||||
/* save terminal state*/
|
||||
if (ioctl(0,TIOCGETP,&tty_state) == -1)
|
||||
if (ioctl(0,TIOCGETP,&tty_state) == -1)
|
||||
return -1;
|
||||
|
||||
push_signals();
|
||||
|
|
|
@ -5,12 +5,12 @@
|
|||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: get_krbhst.c,v 4.8 89/01/22 20:00:29 rfrench Exp $
|
||||
* $Id: get_krbhst.c,v 1.2 1994/07/19 19:25:17 g89r4222 Exp $
|
||||
* $Id: get_krbhst.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char *rcsid =
|
||||
"$Id: get_krbhst.c,v 1.2 1994/07/19 19:25:17 g89r4222 Exp $";
|
||||
"$Id: get_krbhst.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $";
|
||||
#endif /* lint */
|
||||
|
||||
#include <stdio.h>
|
||||
|
@ -33,7 +33,7 @@ static char *rcsid =
|
|||
*
|
||||
* The KRB_CONF file contains the name of the local realm in the first
|
||||
* line (not used by this routine), followed by lines indicating realm/host
|
||||
* entries. The words "admin server" following the hostname indicate that
|
||||
* entries. The words "admin server" following the hostname indicate that
|
||||
* the host provides an administrative database server.
|
||||
*
|
||||
* For example:
|
||||
|
|
|
@ -4,12 +4,12 @@
|
|||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: get_svc_in_tkt.c,v 4.9 89/07/18 16:33:34 jtkohl Exp $
|
||||
* $Id: get_svc_in_tkt.c,v 1.2 1994/07/19 19:25:26 g89r4222 Exp $
|
||||
* $Id: get_svc_in_tkt.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: get_svc_in_tkt.c,v 1.2 1994/07/19 19:25:26 g89r4222 Exp $";
|
||||
"$Id: get_svc_in_tkt.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $";
|
||||
#endif /* lint */
|
||||
|
||||
#include <krb.h>
|
||||
|
@ -57,7 +57,7 @@ static int srvtab_to_key(user, instance, realm, srvtab, key)
|
|||
* krb_get_svc_in_tkt() passes its arguments on to krb_get_in_tkt(),
|
||||
* plus two additional arguments: a pointer to the srvtab_to_key()
|
||||
* function to be used to get the key from the key file and a NULL
|
||||
* for the decryption procedure indicating that krb_get_in_tkt should
|
||||
* for the decryption procedure indicating that krb_get_in_tkt should
|
||||
* use the default method of decrypting the response from the KDC.
|
||||
*
|
||||
* It returns the return value of the krb_get_in_tkt() call.
|
||||
|
|
|
@ -4,12 +4,12 @@
|
|||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: get_tf_fullname.c,v 4.3 90/03/10 22:40:20 jon Exp $
|
||||
* $Id: get_tf_fullname.c,v 1.2 1994/07/19 19:25:28 g89r4222 Exp $
|
||||
* $Id: get_tf_fullname.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: get_tf_fullname.c,v 1.2 1994/07/19 19:25:28 g89r4222 Exp $";
|
||||
"$Id: get_tf_fullname.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $";
|
||||
#endif /* lint */
|
||||
|
||||
#include <krb.h>
|
||||
|
@ -22,10 +22,10 @@ static char rcsid[] =
|
|||
*/
|
||||
|
||||
/*
|
||||
* krb_get_tf_fullname() takes four arguments: the name of the
|
||||
* krb_get_tf_fullname() takes four arguments: the name of the
|
||||
* ticket file, and variables for name, instance, and realm to be
|
||||
* returned in. Since the realm of a ticket file is not really fully
|
||||
* supported, the realm used will be that of the the first ticket in
|
||||
* returned in. Since the realm of a ticket file is not really fully
|
||||
* supported, the realm used will be that of the the first ticket in
|
||||
* the file as this is the one that was obtained with a password by
|
||||
* krb_get_in_tkt().
|
||||
*/
|
||||
|
@ -45,7 +45,7 @@ krb_get_tf_fullname(ticket_file, name, instance, realm)
|
|||
if (((tf_status = tf_get_pname(c.pname)) != KSUCCESS) ||
|
||||
((tf_status = tf_get_pinst(c.pinst)) != KSUCCESS))
|
||||
return (tf_status);
|
||||
|
||||
|
||||
if (name)
|
||||
strcpy(name, c.pname);
|
||||
if (instance)
|
||||
|
@ -59,8 +59,8 @@ krb_get_tf_fullname(ticket_file, name, instance, realm)
|
|||
return(KFAILURE);
|
||||
else
|
||||
return(tf_status);
|
||||
}
|
||||
}
|
||||
(void) tf_close();
|
||||
|
||||
|
||||
return(tf_status);
|
||||
}
|
||||
|
|
|
@ -4,12 +4,12 @@
|
|||
* <Copyright.MIT>.
|
||||
*
|
||||
* from: get_tf_realm.c,v 4.2 90/01/02 13:40:19 jtkohl Exp $
|
||||
* $Id: get_tf_realm.c,v 1.2 1994/07/19 19:25:30 g89r4222 Exp $
|
||||
* $Id: get_tf_realm.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char rcsid[] =
|
||||
"$Id: get_tf_realm.c,v 1.2 1994/07/19 19:25:30 g89r4222 Exp $";
|
||||
"$Id: get_tf_realm.c,v 1.1.1.1 1994/09/30 14:50:00 csgr Exp $";
|
||||
#endif /* lint */
|
||||
|
||||
#include <krb.h>
|
||||
|
@ -21,9 +21,9 @@ static char rcsid[] =
|
|||
*/
|
||||
|
||||
/*
|
||||
* krb_get_tf_realm() takes two arguments: the name of a ticket
|
||||
* krb_get_tf_realm() takes two arguments: the name of a ticket
|
||||
* and a variable to store the name of the realm in.
|
||||
*
|
||||
*
|
||||
*/
|
||||
|
||||
krb_get_tf_realm(ticket_file, realm)
|
||||
|
|
Some files were not shown because too many files have changed in this diff Show more
Loading…
Reference in a new issue