summaryrefslogtreecommitdiffstats
path: root/src/tests/hammer
diff options
context:
space:
mode:
authorJohn Kohl <jtkohl@mit.edu>1991-02-20 14:46:30 +0000
committerJohn Kohl <jtkohl@mit.edu>1991-02-20 14:46:30 +0000
commitc9290698eb986daed9b720eb16c478b56f2fe6ff (patch)
treeece98f9228d48ee1a0bb7beeda74bf20b5ff6294 /src/tests/hammer
parentc766638c540e641cfc6c2d45f6e8424168eb05bb (diff)
*** empty log message ***
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@1736 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/tests/hammer')
-rw-r--r--src/tests/hammer/Imakefile13
-rw-r--r--src/tests/hammer/kdc5_hammer.c407
2 files changed, 420 insertions, 0 deletions
diff --git a/src/tests/hammer/Imakefile b/src/tests/hammer/Imakefile
new file mode 100644
index 000000000..3c31b4645
--- /dev/null
+++ b/src/tests/hammer/Imakefile
@@ -0,0 +1,13 @@
+# $Source$
+# $Author$
+# $Id$
+#
+# Copyright 1990 by the Massachusetts Institute of Technology.
+#
+# For copying and distribution information, please see the file
+# <krb5/copyright.h>.
+#
+ DEPLIBS = $(DEPKLIB)
+LOCAL_LIBRARIES = $(KLIB)
+
+SimpleProgramTarget(kdc5_hammer)
diff --git a/src/tests/hammer/kdc5_hammer.c b/src/tests/hammer/kdc5_hammer.c
new file mode 100644
index 000000000..0da45b287
--- /dev/null
+++ b/src/tests/hammer/kdc5_hammer.c
@@ -0,0 +1,407 @@
+/*
+ * $Source$
+ * $Author$
+ *
+ * Copyright 1990,1991 by the Massachusetts Institute of Technology.
+ * All Rights Reserved.
+ *
+ * For copying and distribution information, please see the file
+ * <krb5/copyright.h>.
+ *
+ * Initialize a credentials cache.
+ */
+
+#if !defined(lint) && !defined(SABER)
+static char rcsid_hammer_c [] =
+"$Id$";
+#endif /* !lint & !SABER */
+
+#include <stdio.h>
+
+#include <krb5/copyright.h>
+#include <krb5/osconf.h>
+#include <krb5/krb5.h>
+#include <krb5/kdb.h> /* for TGTNAME */
+#include <krb5/ext-proto.h>
+#include <krb5/libos-proto.h>
+
+#include <com_err.h>
+
+#define KRB5_DEFAULT_OPTIONS 0
+#define KRB5_DEFAULT_LIFE 60*60*8 /* 8 hours */
+#define KRB5_RENEWABLE_LIFE 60*60*2 /* 2 hours */
+
+extern int optind;
+extern char *optarg;
+char *prog;
+
+static int brief;
+
+krb5_error_code
+krb5_parse_lifetime (time, len)
+ char *time;
+ long *len;
+{
+ *len = atoi (time) * 60 * 60; /* XXX stub version */
+ return 0;
+}
+
+krb5_data tgtname = {
+ sizeof(TGTNAME)-1,
+ TGTNAME
+};
+
+int verify_cs_pair(char *, krb5_principal, char *, int, int, int, krb5_ccache);
+int get_tgt (char *, krb5_principal *, krb5_ccache);
+
+static void
+usage(who, status)
+char *who;
+int status;
+{
+ fprintf(stderr,
+ "usage: %s -p prefix -n num_to_check [-d dbpathname] [-r realmname]\n",
+ who);
+ fprintf(stderr, "\t [-D depth] [-k keytype] [-e etype] [-M mkeyname]\n");
+ fprintf(stderr, "\t [-r repeat_count]\n");
+
+ exit(status);
+}
+
+static krb5_enctype etype = 0xffff;
+static krb5_keytype keytype;
+
+void
+main(argc, argv)
+ int argc;
+ char **argv;
+{
+ krb5_ccache ccache = NULL;
+ char *cache_name = NULL; /* -f option */
+ int option;
+ int errflg = 0;
+ krb5_error_code code;
+ int num_to_check, n, i, j, repeat_count, counter;
+ int n_tried, errors, keytypedone;
+ char prefix[BUFSIZ], *client, *server;
+ int depth;
+ char ctmp[4096], ctmp2[BUFSIZ], stmp[4096], stmp2[BUFSIZ];
+ krb5_principal client_princ;
+
+ krb5_init_ets();
+
+ if (strrchr(argv[0], '/'))
+ prog = strrchr(argv[0], '/')+1;
+
+ num_to_check = 0;
+ depth = 1;
+ repeat_count = 1;
+ brief = 0;
+ n_tried = 0;
+ errors = 0;
+ keytypedone = 0;
+
+ while ((option = getopt(argc, argv, "D:p:n:c:r:k:e:bv")) != EOF) {
+ switch (option) {
+ case 'b':
+ brief = 1;
+ break;
+ case 'v':
+ brief = 0;
+ break;
+ case 'r':
+ repeat_count = atoi(optarg); /* how many times? */
+ break;
+ case 'D':
+ depth = atoi(optarg); /* how deep to go */
+ break;
+ case 'p': /* prefix name to check */
+ strcpy(prefix, optarg);
+ break;
+ case 'n': /* how many to check */
+ num_to_check = atoi(optarg);
+ break;
+ case 'k':
+ keytype = atoi(optarg);
+ keytypedone++;
+ break;
+ case 'e':
+ etype = atoi(optarg);
+ break;
+ case 'c':
+ if (ccache == NULL) {
+ cache_name = optarg;
+
+ code = krb5_cc_resolve (cache_name, &ccache);
+ if (code != 0) {
+ com_err (prog, code, "resolving %s", cache_name);
+ errflg++;
+ }
+ } else {
+ fprintf(stderr, "Only one -c option allowed\n");
+ errflg++;
+ }
+ break;
+ case '?':
+ default:
+ errflg++;
+ break;
+ }
+ }
+
+ if (!(num_to_check && prefix[0])) usage(prog, 1);
+
+ if (!keytypedone)
+ keytype = DEFAULT_KDC_KEYTYPE;
+
+ if (!valid_keytype(keytype)) {
+ com_err(prog, KRB5_PROG_KEYTYPE_NOSUPP,
+ "while setting up keytype %d", keytype);
+ exit(1);
+ }
+
+ if (etype == 0xffff)
+ etype = krb5_keytype_array[keytype]->system->proto_enctype;
+
+ if (!valid_etype(etype)) {
+ com_err(prog, KRB5_PROG_ETYPE_NOSUPP,
+ "while setting up etype %d", etype);
+ exit(1);
+ }
+
+ if (ccache == NULL) {
+ if (code = krb5_cc_default(&ccache)) {
+ com_err(prog, code, "while getting default ccache");
+ exit(1);
+ }
+ }
+
+ memset(ctmp, 0, sizeof(ctmp));
+ memset(stmp, 0, sizeof(stmp));
+
+ for (counter = 0; counter < repeat_count; counter++) {
+ fprintf(stderr, "\nRound %d\n", counter);
+
+ for (n = 1; n <= num_to_check; n++) {
+ /* build the new principal name */
+ /* we can't pick random names because we need to generate all the names
+ again given a prefix and count to test the db lib and kdb */
+ ctmp[0] = '\0';
+ for (i = 1; i <= depth; i++) {
+ ctmp2[0] = '\0';
+ (void) sprintf(ctmp2, "%s%s%d-DEPTH-%d", (i != 1) ? "/" : "",
+ prefix, n, i);
+ strcat(ctmp, ctmp2);
+ client = ctmp;
+
+ if ((counter != 0) && (n != 1)) krb5_free_principal(client_princ);
+ if (get_tgt (client, &client_princ, ccache)) {
+ errors++;
+ n_tried++;
+ continue;
+ }
+ n_tried++;
+
+ stmp[0] = '\0';
+ for (j = 1; j <= depth; j++) {
+ stmp2[0] = '\0';
+ (void) sprintf(stmp2, "%s%s%d-DEPTH-%d", (j != 1) ? "/" : "",
+ prefix, n, j);
+ strcat(stmp, stmp2);
+ server = stmp;
+ if (verify_cs_pair(client, client_princ, server, n, i, j, ccache))
+ errors++;
+ n_tried++;
+ }
+ }
+ }
+ }
+ fprintf (stderr, "\n%Tried %d. Got %d errors.\n", n_tried, errors);
+ }
+
+
+krb5_error_code get_server_key(keyprocarg, princ, vno, key)
+ krb5_pointer keyprocarg;
+ krb5_principal princ;
+ krb5_kvno vno;
+ krb5_keyblock **key;
+{
+ krb5_data pwd, salt;
+ char *princ_str, *at;
+ krb5_error_code code;
+ /* Does this belong here or in libos or something? */
+
+ code = krb5_unparse_name(princ, &princ_str);
+ if (code) {
+ com_err (prog, code, "while unparsing server name");
+ return(code);
+ }
+
+ /* The kdb5_create does not include realm names in the password ...
+ this is ugly */
+ at = index(princ_str, '@');
+ if (at) *at = NULL;
+
+ pwd.data = princ_str;
+ pwd.length = strlen(princ_str);
+
+ if (code = krb5_principal2salt(princ, &salt)) {
+ com_err(prog, code, "while converting principal to salt for '%s'", princ_str);
+ goto errout;
+ }
+
+ *key = (krb5_keyblock *)malloc(sizeof(**key));
+ if (!*key) {
+ code = ENOMEM;
+ com_err(prog, code, "while allocating key for server %s", princ_str);
+ goto errout;
+ }
+ if (code = (*krb5_keytype_array[keytype]->system->
+ string_to_key)(keytype,
+ *key,
+ &pwd,
+ &salt))
+ goto errout;
+
+out:
+ if (princ_str) free(princ_str);
+ if (salt.data) free(salt.data);
+ return(code);
+
+ errout:
+ if (*key) xfree(*key);
+ goto out;
+
+}
+
+int verify_cs_pair(p_client_str, p_client, p_server_str, p_num,
+ c_depth, s_depth, ccache)
+ char *p_client_str;
+ krb5_principal p_client;
+ char *p_server_str;
+ int p_num, c_depth, s_depth;
+ krb5_ccache ccache;
+{
+ krb5_error_code code;
+ krb5_principal server;
+ krb5_data request_data;
+ char *returned_client;
+ krb5_tkt_authent authdat;
+
+ if (brief)
+ fprintf(stderr, "\tprinc (%d) client (%d) for server (%d)\n",
+ p_num, c_depth, s_depth);
+ else
+ fprintf(stderr, "\tclient %s for server %s\n", p_client_str,
+ p_server_str);
+
+ if (code = krb5_parse_name (p_server_str, &server)) {
+ com_err (prog, code, "when parsing name %s", p_server_str);
+ return(-1);
+ }
+
+ /* test the checksum stuff? */
+ if (code = krb5_mk_req(server, 0, 0, ccache, &request_data)) {
+ com_err(prog, code, "while preparing AP_REQ for %s", p_server_str);
+ return(-1);
+ }
+
+ if (code = krb5_rd_req(&request_data, server, 0, 0, get_server_key, 0, 0,
+ &authdat)) {
+ com_err(prog, code, "while decoding AP_REQ for %s", p_server_str);
+ return(-1);
+ }
+
+ if (!krb5_principal_compare(authdat.authenticator->client, p_client)) {
+ code = krb5_unparse_name(authdat.authenticator->client, &returned_client);
+ if (code)
+ com_err (prog, code,
+ "Client not as expected, but cannot unparse client name");
+ else
+ com_err (prog, 0, "Client not as expected (%s).", returned_client);
+ if (authdat.ticket) xfree(authdat.ticket);
+ if (authdat.authenticator) xfree(authdat.authenticator);
+ free(returned_client);
+ return(-1);
+ }
+
+ if (authdat.ticket) xfree(authdat.ticket);
+ if (authdat.authenticator) xfree(authdat.authenticator);
+ krb5_free_principal(server);
+ if (request_data.data) xfree(request_data.data);
+
+ return(0);
+}
+
+int get_tgt (p_client_str, p_client, ccache)
+ char *p_client_str;
+ krb5_principal *p_client;
+ krb5_ccache ccache;
+{
+ char *cache_name = NULL; /* -f option */
+ long lifetime = KRB5_DEFAULT_LIFE; /* -l option */
+ int options = KRB5_DEFAULT_OPTIONS;
+ krb5_address **my_addresses;
+ krb5_error_code code;
+ krb5_creds my_creds;
+ krb5_timestamp start;
+ krb5_data *tgt_server[4];
+
+ if (!brief)
+ fprintf(stderr, "\tgetting TGT for %s\n", p_client_str);
+
+ if (code = krb5_timeofday(&start)) {
+ com_err(prog, code, "while getting time of day");
+ return(-1);
+ }
+
+ memset((char *)&my_creds, 0, sizeof(my_creds));
+
+ if (code = krb5_parse_name (p_client_str, p_client)) {
+ com_err (prog, code, "when parsing name %s", p_client_str);
+ return(-1);
+ }
+
+ my_creds.server = tgt_server;
+
+ tgt_server[0] = *p_client[0]; /* realm name */
+ tgt_server[1] = &tgtname;
+ tgt_server[2] = *p_client[0];
+ tgt_server[3] = 0;
+
+ code = krb5_os_localaddr(&my_addresses);
+ if (code != 0) {
+ com_err (prog, code, "when getting my address");
+ exit(1);
+ }
+
+ my_creds.client = *p_client;
+ my_creds.server = tgt_server;
+
+ krb5_cc_destroy(ccache); /* ugh, I'd much rather just delete the credential */
+
+ code = krb5_cc_initialize (ccache, *p_client);
+ if (code != 0) {
+ com_err (prog, code, "when initializing cache %s",
+ cache_name?cache_name:"");
+ return(-1);
+ }
+
+ my_creds.times.starttime = 0; /* start timer when request
+ gets to KDC */
+ my_creds.times.endtime = start + lifetime;
+ my_creds.times.renew_till = 0;
+
+ code = krb5_get_in_tkt_with_password(options, my_addresses,
+ etype,
+ keytype,
+ p_client_str,
+ ccache,
+ &my_creds);
+ if (code != 0) {
+ com_err (prog, code, "while getting initial credentials");
+ return(-1);
+ }
+
+ return(0);
+}