Remove support dumping to a kerberos 4 database.

git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@18957 ec53bebd-3082-4978-b11e-865c3cabbd6b
This commit is contained in:
Love Hörnquist Åstrand
2006-11-08 18:48:36 +00:00
parent 6740e9a944
commit e6e22c2bbd

View File

@@ -35,139 +35,6 @@
RCSID("$Id$"); RCSID("$Id$");
#ifdef KRB4
#include <krb.h>
#include <prot.h>
#define Principal Principal4
#include <krb_db.h>
static des_cblock mkey4;
static des_key_schedule msched4;
static char *
time2str(time_t t)
{
static char buf[128];
strftime(buf, sizeof(buf), "%Y%m%d%H%M", gmtime(&t));
return buf;
}
static int
dump_krb4(krb5_context context, hdb_entry *ent, int fd)
{
char name[ANAME_SZ];
char instance[INST_SZ];
char realm[REALM_SZ];
char buf[1024];
char *p;
int i;
int ret;
char *princ_name;
Event *modifier;
krb5_realm *realms;
int cmp;
ret = krb5_524_conv_principal(context, ent->principal,
name, instance, realm);
if (ret) {
ret = krb5_unparse_name(context, ent->principal, &princ_name);
if (ret == 0) {
krb5_warn(context, ret, "%s", princ_name);
free(princ_name);
}
return -1;
}
ret = krb5_get_default_realms (context, &realms);
if (ret) {
krb5_warn(context, ret, "krb5_get_default_realms");
return -1;
}
cmp = strcmp (realms[0], ent->principal->realm);
krb5_free_host_realm (context, realms);
if (cmp != 0)
return -1;
snprintf (buf, sizeof(buf), "%s %s ", name,
(strlen(instance) != 0) ? instance : "*");
if (ent->max_life) {
asprintf(&p, "%d", krb_time_to_life(0, *ent->max_life));
strlcat(buf, p, sizeof(buf));
free(p);
} else
strlcat(buf, "255", sizeof(buf));
strlcat(buf, " ", sizeof(buf));
i = 0;
while (i < ent->keys.len &&
ent->keys.val[i].key.keytype != KEYTYPE_DES)
++i;
if (i == ent->keys.len) {
krb5_warnx(context, "No DES key for %s.%s", name, instance);
return -1;
}
if (ent->keys.val[i].mkvno)
asprintf(&p, "%d ", *ent->keys.val[i].mkvno);
else
asprintf(&p, "%d ", 1);
strlcat(buf, p, sizeof(buf));
free(p);
asprintf(&p, "%d ", ent->kvno);
strlcat(buf, p, sizeof(buf));
free(p);
asprintf(&p, "%d ", 0); /* Attributes are always 0*/
strlcat(buf, p, sizeof(buf));
free(p);
{
uint32_t *key = ent->keys.val[i].key.keyvalue.data;
kdb_encrypt_key((des_cblock*)key, (des_cblock*)key,
&mkey4, msched4, DES_ENCRYPT);
asprintf(&p, "%x %x ", (int)htonl(*key), (int)htonl(*(key+1)));
strlcat(buf, p, sizeof(buf));
free(p);
}
if (ent->valid_end == NULL)
strlcat(buf, time2str(60*60*24*365*50), sizeof(buf)); /*no expiration*/
else
strlcat(buf, time2str(*ent->valid_end), sizeof(buf));
strlcat(buf, " ", sizeof(buf));
if (ent->modified_by == NULL)
modifier = &ent->created_by;
else
modifier = ent->modified_by;
ret = krb5_524_conv_principal(context, modifier->principal,
name, instance, realm);
if (ret) {
ret = krb5_unparse_name(context, modifier->principal, &princ_name);
if (ret == 0) {
krb5_warn(context, ret, "%s", princ_name);
free(princ_name);
}
return -1;
}
asprintf(&p, "%s %s %s\n", time2str(modifier->time),
(strlen(name) != 0) ? name : "*",
(strlen(instance) != 0) ? instance : "*");
strlcat(buf, p, sizeof(buf));
free(p);
ret = write(fd, buf, strlen(buf));
if (ret == -1)
krb5_warnx(context, "write");
return 0;
}
#endif /* KRB4 */
static int inetd_flag = -1; static int inetd_flag = -1;
static int help_flag; static int help_flag;
static int version_flag; static int version_flag;
@@ -175,9 +42,6 @@ static int print_dump;
static const char *database = HDB_DEFAULT_DB; static const char *database = HDB_DEFAULT_DB;
static int from_stdin; static int from_stdin;
static char *local_realm; static char *local_realm;
#ifdef KRB4
static int v4dump;
#endif
static char *ktname = NULL; static char *ktname = NULL;
struct getargs args[] = { struct getargs args[] = {
@@ -188,9 +52,6 @@ struct getargs args[] = {
"Not started from inetd" }, "Not started from inetd" },
{ "keytab", 'k', arg_string, &ktname, "keytab to use for authentication", "keytab" }, { "keytab", 'k', arg_string, &ktname, "keytab to use for authentication", "keytab" },
{ "realm", 'r', arg_string, &local_realm, "realm to use" }, { "realm", 'r', arg_string, &local_realm, "realm to use" },
#ifdef KRB4
{ "v4dump", '4', arg_flag, &v4dump, "create v4 type DB" },
#endif
{ "version", 0, arg_flag, &version_flag, NULL, NULL }, { "version", 0, arg_flag, &version_flag, NULL, NULL },
{ "help", 'h', arg_flag, &help_flag, NULL, NULL} { "help", 'h', arg_flag, &help_flag, NULL, NULL}
}; };
@@ -219,10 +80,6 @@ main(int argc, char **argv)
char *tmp_db; char *tmp_db;
krb5_log_facility *fac; krb5_log_facility *fac;
int nprincs; int nprincs;
#ifdef KRB4
int e;
int fd_out = -1;
#endif
setprogname(argv[0]); setprogname(argv[0]);
@@ -238,11 +95,6 @@ main(int argc, char **argv)
if(getarg(args, num_args, argc, argv, &optidx)) if(getarg(args, num_args, argc, argv, &optidx))
usage(1); usage(1);
#ifdef KRB4
if (v4dump && database == HDB_DEFAULT_DB)
database = "/var/kerberos/524_dump";
#endif /* KRB4 */
if(local_realm != NULL) if(local_realm != NULL)
krb5_set_default_realm(context, local_realm); krb5_set_default_realm(context, local_realm);
@@ -289,7 +141,7 @@ main(int argc, char **argv)
addr_name, addr_name,
sizeof(addr_name)) == NULL) sizeof(addr_name)) == NULL)
strlcpy (addr_name, "unknown address", strlcpy (addr_name, "unknown address",
sizeof(addr_name)); sizeof(addr_name));
krb5_log(context, fac, 0, "Connection from %s", addr_name); krb5_log(context, fac, 0, "Connection from %s", addr_name);
@@ -347,32 +199,14 @@ main(int argc, char **argv)
if(!print_dump) { if(!print_dump) {
asprintf(&tmp_db, "%s~", database); asprintf(&tmp_db, "%s~", database);
#ifdef KRB4
if (v4dump) {
fd_out = open(tmp_db, O_WRONLY | O_CREAT | O_TRUNC, 0600);
if (fd_out == -1)
krb5_errx(context, 1, "%s", strerror(errno));
}
else
#endif /* KRB4 */
{
ret = hdb_create(context, &db, tmp_db);
if(ret)
krb5_err(context, 1, ret, "hdb_create(%s)", tmp_db);
ret = db->hdb_open(context, db, O_RDWR | O_CREAT | O_TRUNC, 0600);
if(ret)
krb5_err(context, 1, ret, "hdb_open(%s)", tmp_db);
}
}
#ifdef KRB4 ret = hdb_create(context, &db, tmp_db);
if (v4dump) { if(ret)
e = kdb_get_master_key(0, &mkey4, msched4); krb5_err(context, 1, ret, "hdb_create(%s)", tmp_db);
if(e) ret = db->hdb_open(context, db, O_RDWR | O_CREAT | O_TRUNC, 0600);
krb5_errx(context, 1, "kdb_get_master_key: %s", if(ret)
krb_get_err_text(e)); krb5_err(context, 1, ret, "hdb_open(%s)", tmp_db);
} }
#endif /* KRB4 */
nprincs = 0; nprincs = 0;
while(1){ while(1){
@@ -396,24 +230,12 @@ main(int argc, char **argv)
krb5_write_priv_message(context, ac, &fd, &data); krb5_write_priv_message(context, ac, &fd, &data);
} }
if(!print_dump) { if(!print_dump) {
#ifdef KRB4 ret = db->hdb_rename(context, db, database);
if (v4dump) { if(ret)
ret = rename(tmp_db, database); krb5_err(context, 1, ret, "db_rename");
if (ret) ret = db->hdb_close(context, db);
krb5_errx(context, 1, "rename"); if(ret)
ret = close(fd_out); krb5_err(context, 1, ret, "db_close");
if (ret)
krb5_errx(context, 1, "close");
} else
#endif /* KRB4 */
{
ret = db->hdb_rename(context, db, database);
if(ret)
krb5_err(context, 1, ret, "db_rename");
ret = db->hdb_close(context, db);
if(ret)
krb5_err(context, 1, ret, "db_close");
}
} }
break; break;
} }
@@ -424,27 +246,18 @@ main(int argc, char **argv)
if(print_dump) if(print_dump)
hdb_print_entry(context, db, &entry, stdout); hdb_print_entry(context, db, &entry, stdout);
else { else {
#ifdef KRB4 ret = db->hdb_store(context, db, 0, &entry);
if (v4dump) { if(ret == HDB_ERR_EXISTS) {
ret = dump_krb4(context, &entry, fd_out); char *s;
if(!ret) nprincs++; ret = krb5_unparse_name(context, entry.entry.principal, &s);
} if (ret)
s = strdup("unparseable name");
krb5_warnx(context, "Entry exists: %s", s);
free(s);
} else if(ret)
krb5_err(context, 1, ret, "db_store");
else else
#endif /* KRB4 */ nprincs++;
{
ret = db->hdb_store(context, db, 0, &entry);
if(ret == HDB_ERR_EXISTS) {
char *s;
ret = krb5_unparse_name(context, entry.entry.principal, &s);
if (ret)
s = strdup("unparseable name");
krb5_warnx(context, "Entry exists: %s", s);
free(s);
} else if(ret)
krb5_err(context, 1, ret, "db_store");
else
nprincs++;
}
} }
hdb_free_entry(context, &entry); hdb_free_entry(context, &entry);
} }