Add tool for printing tickets.
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@18102 ec53bebd-3082-4978-b11e-865c3cabbd6b
This commit is contained in:
@@ -4,12 +4,12 @@ include $(top_srcdir)/Makefile.am.common
|
|||||||
|
|
||||||
AM_CPPFLAGS += $(INCLUDE_krb4) $(INCLUDE_des) -I$(srcdir)/../lib/krb5
|
AM_CPPFLAGS += $(INCLUDE_krb4) $(INCLUDE_des) -I$(srcdir)/../lib/krb5
|
||||||
|
|
||||||
man_MANS = kinit.1 klist.1 kdestroy.1 kgetcred.1
|
man_MANS = kinit.1 klist.1 kdestroy.1 kgetcred.1 kimpersonate.1
|
||||||
|
|
||||||
SLC = $(top_builddir)/lib/sl/slc
|
SLC = $(top_builddir)/lib/sl/slc
|
||||||
|
|
||||||
bin_PROGRAMS = kinit klist kdestroy kgetcred
|
bin_PROGRAMS = kinit klist kdestroy kgetcred
|
||||||
libexec_PROGRAMS = kdigest
|
libexec_PROGRAMS = kdigest kimpersonate
|
||||||
|
|
||||||
noinst_PROGRAMS = kverify kdecode_ticket generate-requests copy_cred_cache
|
noinst_PROGRAMS = kverify kdecode_ticket generate-requests copy_cred_cache
|
||||||
noinst_MANS = copy_cred_cache.1
|
noinst_MANS = copy_cred_cache.1
|
||||||
@@ -26,6 +26,8 @@ kdestroy_LDADD = $(kinit_LDADD)
|
|||||||
|
|
||||||
klist_LDADD = $(kinit_LDADD)
|
klist_LDADD = $(kinit_LDADD)
|
||||||
|
|
||||||
|
kimpersonate_LDADD = $(kinit_LDADD)
|
||||||
|
|
||||||
kdigest_SOURCES = \
|
kdigest_SOURCES = \
|
||||||
kdigest.c \
|
kdigest.c \
|
||||||
kdigest-commands.c
|
kdigest-commands.c
|
||||||
|
152
kuser/kimpersonate.1
Normal file
152
kuser/kimpersonate.1
Normal file
@@ -0,0 +1,152 @@
|
|||||||
|
.\" Copyright (c) 2002 - 2004, 2006 Kungliga Tekniska H<>gskolan
|
||||||
|
.\" (Royal Institute of Technology, Stockholm, Sweden).
|
||||||
|
.\" All rights reserved.
|
||||||
|
.\"
|
||||||
|
.\" Redistribution and use in source and binary forms, with or without
|
||||||
|
.\" modification, are permitted provided that the following conditions
|
||||||
|
.\" are met:
|
||||||
|
.\"
|
||||||
|
.\" 1. Redistributions of source code must retain the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer.
|
||||||
|
.\"
|
||||||
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
.\" notice, this list of conditions and the following disclaimer in the
|
||||||
|
.\" documentation and/or other materials provided with the distribution.
|
||||||
|
.\"
|
||||||
|
.\" 3. Neither the name of the Institute nor the names of its contributors
|
||||||
|
.\" may be used to endorse or promote products derived from this software
|
||||||
|
.\" without specific prior written permission.
|
||||||
|
.\"
|
||||||
|
.\" THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
|
||||||
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
|
||||||
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||||
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||||
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||||
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||||
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
|
.\" SUCH DAMAGE.
|
||||||
|
.\"
|
||||||
|
.\" $Id$
|
||||||
|
.\"
|
||||||
|
.Dd September 18, 2006
|
||||||
|
.Dt KERBEROS SECTION
|
||||||
|
.Os Heimdal
|
||||||
|
.Sh NAME
|
||||||
|
.Nm kimpersonate
|
||||||
|
.Nd
|
||||||
|
impersonate a user when there exist a srvtab, keyfile or KeyFile
|
||||||
|
.Sh SYNOPSIS
|
||||||
|
.Nm
|
||||||
|
.Oo Fl s Ar string \*(Ba Xo
|
||||||
|
.Fl -server= Ns Ar string Oc
|
||||||
|
.Xc
|
||||||
|
.Oo Fl c Ar string \*(Ba Xo
|
||||||
|
.Fl -client= Ns Ar string Oc
|
||||||
|
.Xc
|
||||||
|
.Oo Fl k Ar string \*(Ba Xo
|
||||||
|
.Fl -keytab= Ns Ar string Oc
|
||||||
|
.Xc
|
||||||
|
.Op Fl 5 | Fl -krb5
|
||||||
|
.Oo Fl e Ar integer \*(Ba Xo
|
||||||
|
.Fl -expire-time= Ns Ar integer Oc
|
||||||
|
.Xc
|
||||||
|
.Oo Fl a Ar string \*(Ba Xo
|
||||||
|
.Fl -client-address= Ns Ar string Oc
|
||||||
|
.Xc
|
||||||
|
.Oo Fl t Ar string \*(Ba Xo
|
||||||
|
.Fl -enc-type= Ns Ar string Oc
|
||||||
|
.Xc
|
||||||
|
.Oo Fl f Ar string \*(Ba Xo
|
||||||
|
.Fl -ticket-flags= Ns Ar string Oc
|
||||||
|
.Xc
|
||||||
|
.Op Fl -verbose
|
||||||
|
.Op Fl -version
|
||||||
|
.Op Fl -help
|
||||||
|
.Sh DESCRIPTION
|
||||||
|
The
|
||||||
|
.Nm
|
||||||
|
program create a "fake" ticket using the service-key of the service,
|
||||||
|
the service key can be read from a Kerberos 5 keytab, AFS KeyFile or
|
||||||
|
(if compiled with support for Kerberos 4) a Kerberos 4 srvtab.
|
||||||
|
Supported options:
|
||||||
|
.Bl -tag -width Ds
|
||||||
|
.It Xo
|
||||||
|
.Fl s Ar string Ns ,
|
||||||
|
.Fl -server= Ns Ar string
|
||||||
|
.Xc
|
||||||
|
name of server principal
|
||||||
|
.It Xo
|
||||||
|
.Fl c Ar string Ns ,
|
||||||
|
.Fl -client= Ns Ar string
|
||||||
|
.Xc
|
||||||
|
name of client principal
|
||||||
|
.It Xo
|
||||||
|
.Fl k Ar string Ns ,
|
||||||
|
.Fl -keytab= Ns Ar string
|
||||||
|
.Xc
|
||||||
|
name of keytab file
|
||||||
|
.It Xo
|
||||||
|
.Fl 5 Ns ,
|
||||||
|
.Fl -krb5
|
||||||
|
.Xc
|
||||||
|
create a kerberos 5 ticket
|
||||||
|
.It Xo
|
||||||
|
.Fl e Ar integer Ns ,
|
||||||
|
.Fl -expire-time= Ns Ar integer
|
||||||
|
.Xc
|
||||||
|
lifetime of ticket in seconds
|
||||||
|
.It Xo
|
||||||
|
.Fl a Ar string Ns ,
|
||||||
|
.Fl -client-address= Ns Ar string
|
||||||
|
.Xc
|
||||||
|
address of client
|
||||||
|
.It Xo
|
||||||
|
.Fl t Ar string Ns ,
|
||||||
|
.Fl -enc-type= Ns Ar string
|
||||||
|
.Xc
|
||||||
|
encryption type
|
||||||
|
.It Xo
|
||||||
|
.Fl f Ar string Ns ,
|
||||||
|
.Fl -ticket-flags= Ns Ar string
|
||||||
|
.Xc
|
||||||
|
ticket flags for krb5 ticket
|
||||||
|
.It Xo
|
||||||
|
.Fl -verbose
|
||||||
|
.Xc
|
||||||
|
Verbose output
|
||||||
|
.It Xo
|
||||||
|
.Fl -version
|
||||||
|
.Xc
|
||||||
|
Print version
|
||||||
|
.It Xo
|
||||||
|
.Fl -help
|
||||||
|
.Xc
|
||||||
|
.El
|
||||||
|
.Sh FILES
|
||||||
|
Uses
|
||||||
|
.Pa /etc/krb5.keytab,
|
||||||
|
.Pa /etc/srvtab
|
||||||
|
and
|
||||||
|
.Pa /usr/afs/etc/KeyFile
|
||||||
|
when avalible and the the
|
||||||
|
.Fl k
|
||||||
|
is used with appropriate prefix.
|
||||||
|
.Sh EXAMPLES
|
||||||
|
.Nm
|
||||||
|
can be used in
|
||||||
|
.Nm samba
|
||||||
|
root preexec option
|
||||||
|
or for debugging.
|
||||||
|
.Nm
|
||||||
|
-s host/hummel.e.kth.se@E.KTH.SE -c lha@E.KTH.SE -5
|
||||||
|
will create a Kerberos 5 ticket for lha@E.KTH.SE for the host
|
||||||
|
hummel.e.kth.se if there exist a keytab entry for it in
|
||||||
|
.Pa /etc/krb5.keytab
|
||||||
|
.Sh SEE ALSO
|
||||||
|
.Xr kinit 1 ,
|
||||||
|
.Xr klist 1
|
||||||
|
.Sh AUTHORS
|
||||||
|
Love H<>rnquist <20>strand <lha@kth.se>
|
331
kuser/kimpersonate.c
Normal file
331
kuser/kimpersonate.c
Normal file
@@ -0,0 +1,331 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (c) 2000 - 2003 Kungliga Tekniska H<>gskolan
|
||||||
|
* (Royal Institute of Technology, Stockholm, Sweden).
|
||||||
|
* All rights reserved.
|
||||||
|
*
|
||||||
|
* Redistribution and use in source and binary forms, with or without
|
||||||
|
* modification, are permitted provided that the following conditions
|
||||||
|
* are met:
|
||||||
|
*
|
||||||
|
* 1. Redistributions of source code must retain the above copyright
|
||||||
|
* notice, this list of conditions and the following disclaimer.
|
||||||
|
*
|
||||||
|
* 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
* notice, this list of conditions and the following disclaimer in the
|
||||||
|
* documentation and/or other materials provided with the distribution.
|
||||||
|
*
|
||||||
|
* 3. Neither the name of the Institute nor the names of its contributors
|
||||||
|
* may be used to endorse or promote products derived from this software
|
||||||
|
* without specific prior written permission.
|
||||||
|
*
|
||||||
|
* THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
|
||||||
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
|
||||||
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||||||
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||||||
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||||
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||||||
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
|
* SUCH DAMAGE.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include "kuser_locl.h"
|
||||||
|
RCSID("$Id$");
|
||||||
|
#include <parse_units.h>
|
||||||
|
|
||||||
|
static char *client_principal_str = NULL;
|
||||||
|
static krb5_principal client_principal;
|
||||||
|
static char *server_principal_str = NULL;
|
||||||
|
static krb5_principal server_principal;
|
||||||
|
|
||||||
|
static char *ccache_str = NULL;
|
||||||
|
|
||||||
|
static char *ticket_flags_str = NULL;
|
||||||
|
static TicketFlags ticket_flags;
|
||||||
|
static char *keytab_file = NULL;
|
||||||
|
static char *enc_type = "des-cbc-md5";
|
||||||
|
static int expiration_time = 3600;
|
||||||
|
static struct getarg_strings client_addresses;
|
||||||
|
static int version_flag = 0;
|
||||||
|
static int help_flag = 0;
|
||||||
|
static int use_krb5 = 1;
|
||||||
|
|
||||||
|
/*
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
|
||||||
|
static void
|
||||||
|
encode_ticket (krb5_context context,
|
||||||
|
EncryptionKey *skey,
|
||||||
|
krb5_enctype etype,
|
||||||
|
int skvno,
|
||||||
|
krb5_creds *cred)
|
||||||
|
{
|
||||||
|
size_t len, size;
|
||||||
|
char *buf;
|
||||||
|
krb5_error_code ret;
|
||||||
|
krb5_crypto crypto;
|
||||||
|
EncryptedData enc_part;
|
||||||
|
EncTicketPart et;
|
||||||
|
Ticket ticket;
|
||||||
|
|
||||||
|
memset (&enc_part, 0, sizeof(enc_part));
|
||||||
|
memset (&ticket, 0, sizeof(ticket));
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Set up `enc_part'
|
||||||
|
*/
|
||||||
|
|
||||||
|
et.flags = cred->flags.b;
|
||||||
|
et.key = cred->session;
|
||||||
|
et.crealm = *krb5_princ_realm (context, cred->client);
|
||||||
|
copy_PrincipalName(&cred->client->name, &et.cname);
|
||||||
|
{
|
||||||
|
krb5_data empty_string;
|
||||||
|
|
||||||
|
krb5_data_zero(&empty_string);
|
||||||
|
et.transited.tr_type = DOMAIN_X500_COMPRESS;
|
||||||
|
et.transited.contents = empty_string;
|
||||||
|
}
|
||||||
|
et.authtime = cred->times.authtime;
|
||||||
|
et.starttime = NULL;
|
||||||
|
et.endtime = cred->times.endtime;
|
||||||
|
et.renew_till = NULL;
|
||||||
|
et.caddr = &cred->addresses;
|
||||||
|
et.authorization_data = NULL; /* XXX allow random authorization_data */
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Encrypt `enc_part' of ticket with service key
|
||||||
|
*/
|
||||||
|
|
||||||
|
ASN1_MALLOC_ENCODE(EncTicketPart, buf, len, &et, &size, ret);
|
||||||
|
if (ret)
|
||||||
|
krb5_err(context, 1, ret, "EncTicketPart");
|
||||||
|
|
||||||
|
krb5_crypto_init(context, skey, etype, &crypto);
|
||||||
|
krb5_encrypt_EncryptedData (context,
|
||||||
|
crypto,
|
||||||
|
KRB5_KU_TICKET,
|
||||||
|
buf,
|
||||||
|
len,
|
||||||
|
skvno,
|
||||||
|
&ticket.enc_part);
|
||||||
|
free(buf);
|
||||||
|
krb5_crypto_destroy(context, crypto);
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Encode ticket
|
||||||
|
*/
|
||||||
|
|
||||||
|
ticket.tkt_vno = 5;
|
||||||
|
ticket.tkt_vno = skvno;
|
||||||
|
ticket.realm = *krb5_princ_realm (context, cred->server);
|
||||||
|
copy_PrincipalName(&cred->server->name, &ticket.sname);
|
||||||
|
|
||||||
|
ASN1_MALLOC_ENCODE(Ticket, buf, len, &ticket, &size, ret);
|
||||||
|
if(ret)
|
||||||
|
krb5_err (context, 1, ret, "encode_Ticket");
|
||||||
|
|
||||||
|
krb5_data_copy(&cred->ticket, buf, len);
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
|
||||||
|
static int
|
||||||
|
create_krb5_tickets (krb5_context context, krb5_keytab kt)
|
||||||
|
{
|
||||||
|
krb5_error_code ret;
|
||||||
|
krb5_keytab_entry entry;
|
||||||
|
krb5_creds cred;
|
||||||
|
krb5_enctype etype;
|
||||||
|
krb5_ccache ccache;
|
||||||
|
|
||||||
|
memset (&cred, 0, sizeof(cred));
|
||||||
|
|
||||||
|
ret = krb5_string_to_enctype (context, enc_type, &etype);
|
||||||
|
if (ret)
|
||||||
|
krb5_err (context, 1, ret, "krb5_string_to_enctype");
|
||||||
|
ret = krb5_kt_get_entry (context, kt, server_principal,
|
||||||
|
0, etype, &entry);
|
||||||
|
if (ret)
|
||||||
|
krb5_err (context, 1, ret, "krb5_kt_get_entry");
|
||||||
|
|
||||||
|
/*
|
||||||
|
* setup cred
|
||||||
|
*/
|
||||||
|
|
||||||
|
|
||||||
|
ret = krb5_copy_principal (context, client_principal, &cred.client);
|
||||||
|
if (ret)
|
||||||
|
krb5_err (context, 1, ret, "krb5_copy_principal");
|
||||||
|
ret = krb5_copy_principal (context, server_principal, &cred.server);
|
||||||
|
if (ret)
|
||||||
|
krb5_err (context, 1, ret, "krb5_copy_principal");
|
||||||
|
krb5_generate_random_keyblock(context, etype, &cred.session);
|
||||||
|
|
||||||
|
cred.times.authtime = time(NULL);
|
||||||
|
cred.times.starttime = time(NULL);
|
||||||
|
cred.times.endtime = time(NULL) + expiration_time;
|
||||||
|
cred.times.renew_till = 0;
|
||||||
|
krb5_data_zero(&cred.second_ticket);
|
||||||
|
|
||||||
|
ret = krb5_get_all_client_addrs (context, &cred.addresses);
|
||||||
|
if (ret)
|
||||||
|
krb5_err (context, 1, ret, "krb5_get_all_client_addrs");
|
||||||
|
cred.flags.b = ticket_flags;
|
||||||
|
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Encode encrypted part of ticket
|
||||||
|
*/
|
||||||
|
|
||||||
|
encode_ticket (context, &entry.keyblock, etype, entry.vno, &cred);
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Write to cc
|
||||||
|
*/
|
||||||
|
|
||||||
|
if (ccache_str) {
|
||||||
|
ret = krb5_cc_resolve(context, ccache_str, &ccache);
|
||||||
|
if (ret)
|
||||||
|
krb5_err (context, 1, ret, "krb5_cc_resolve");
|
||||||
|
} else {
|
||||||
|
ret = krb5_cc_default (context, &ccache);
|
||||||
|
if (ret)
|
||||||
|
krb5_err (context, 1, ret, "krb5_cc_default");
|
||||||
|
}
|
||||||
|
|
||||||
|
ret = krb5_cc_initialize (context, ccache, cred.client);
|
||||||
|
if (ret)
|
||||||
|
krb5_err (context, 1, ret, "krb5_cc_initialize");
|
||||||
|
|
||||||
|
ret = krb5_cc_store_cred (context, ccache, &cred);
|
||||||
|
if (ret)
|
||||||
|
krb5_err (context, 1, ret, "krb5_cc_store_cred");
|
||||||
|
|
||||||
|
krb5_free_creds_contents (context, &cred);
|
||||||
|
krb5_cc_close (context, ccache);
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
|
||||||
|
static void
|
||||||
|
setup_env (krb5_context context, krb5_keytab *kt)
|
||||||
|
{
|
||||||
|
krb5_error_code ret;
|
||||||
|
|
||||||
|
if (keytab_file)
|
||||||
|
ret = krb5_kt_resolve (context, keytab_file, kt);
|
||||||
|
else
|
||||||
|
ret = krb5_kt_default (context, kt);
|
||||||
|
if (ret)
|
||||||
|
krb5_err (context, 1, ret, "resolving keytab");
|
||||||
|
|
||||||
|
if (client_principal_str == NULL)
|
||||||
|
krb5_errx (context, 1, "missing client principal");
|
||||||
|
ret = krb5_parse_name (context, client_principal_str, &client_principal);
|
||||||
|
if (ret)
|
||||||
|
krb5_err (context, 1, ret, "resolvning client name");
|
||||||
|
|
||||||
|
if (server_principal_str == NULL)
|
||||||
|
krb5_errx (context, 1, "missing server principal");
|
||||||
|
ret = krb5_parse_name (context, server_principal_str, &server_principal);
|
||||||
|
if (ret)
|
||||||
|
krb5_err (context, 1, ret, "resolvning client name");
|
||||||
|
|
||||||
|
if (ticket_flags_str) {
|
||||||
|
int ticket_flags_int;
|
||||||
|
|
||||||
|
ticket_flags_int = parse_flags(ticket_flags_str,
|
||||||
|
asn1_TicketFlags_units(), 0);
|
||||||
|
if (ticket_flags_int <= 0) {
|
||||||
|
krb5_warnx (context, "bad ticket flags: `%s'", ticket_flags_str);
|
||||||
|
print_flags_table (asn1_TicketFlags_units(), stderr);
|
||||||
|
exit (1);
|
||||||
|
}
|
||||||
|
if (ticket_flags_int)
|
||||||
|
ticket_flags = int2TicketFlags (ticket_flags_int);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
|
||||||
|
struct getargs args[] = {
|
||||||
|
{ "ccache", 0, arg_string, &ccache_str,
|
||||||
|
"name of kerberos 5 credential cache", "cache-name"},
|
||||||
|
{ "server", 's', arg_string, &server_principal_str,
|
||||||
|
"name of server principal" },
|
||||||
|
{ "client", 'c', arg_string, &client_principal_str,
|
||||||
|
"name of client principal" },
|
||||||
|
{ "keytab", 'k', arg_string, &keytab_file,
|
||||||
|
"name of keytab file" },
|
||||||
|
{ "krb5", '5', arg_flag, &use_krb5,
|
||||||
|
"create a kerberos 5 ticket"},
|
||||||
|
{ "expire-time", 'e', arg_integer, &expiration_time,
|
||||||
|
"lifetime of ticket in seconds" },
|
||||||
|
{ "client-addresses", 'a', arg_strings, &client_addresses,
|
||||||
|
"addresses of client" },
|
||||||
|
{ "enc-type", 't', arg_string, &enc_type,
|
||||||
|
"encryption type" },
|
||||||
|
{ "ticket-flags", 'f', arg_string, &ticket_flags_str,
|
||||||
|
"ticket flags for krb5 ticket" },
|
||||||
|
{ "version", 0, arg_flag, &version_flag, "Print version",
|
||||||
|
NULL },
|
||||||
|
{ "help", 0, arg_flag, &help_flag, NULL,
|
||||||
|
NULL }
|
||||||
|
};
|
||||||
|
|
||||||
|
static void
|
||||||
|
usage (int ret)
|
||||||
|
{
|
||||||
|
arg_printusage (args,
|
||||||
|
sizeof(args) / sizeof(args[0]),
|
||||||
|
NULL,
|
||||||
|
"");
|
||||||
|
exit (ret);
|
||||||
|
}
|
||||||
|
|
||||||
|
int
|
||||||
|
main (int argc, char **argv)
|
||||||
|
{
|
||||||
|
int optind = 0;
|
||||||
|
krb5_error_code ret;
|
||||||
|
krb5_context context;
|
||||||
|
krb5_keytab kt;
|
||||||
|
|
||||||
|
setprogname (argv[0]);
|
||||||
|
|
||||||
|
ret = krb5_init_context (&context);
|
||||||
|
if (ret)
|
||||||
|
errx(1, "krb5_init_context failed: %u", ret);
|
||||||
|
|
||||||
|
if (getarg (args, sizeof(args) / sizeof(args[0]), argc, argv,
|
||||||
|
&optind))
|
||||||
|
usage (1);
|
||||||
|
|
||||||
|
if (help_flag)
|
||||||
|
usage (0);
|
||||||
|
|
||||||
|
if (version_flag) {
|
||||||
|
print_version(NULL);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
setup_env (context, &kt);
|
||||||
|
|
||||||
|
if (use_krb5)
|
||||||
|
create_krb5_tickets (context, kt);
|
||||||
|
|
||||||
|
krb5_kt_close (context, kt);
|
||||||
|
return 0;
|
||||||
|
}
|
Reference in New Issue
Block a user