diff options
Diffstat (limited to 'src/admin/edit/kdb5_edit.c')
-rw-r--r-- | src/admin/edit/kdb5_edit.c | 293 |
1 files changed, 148 insertions, 145 deletions
diff --git a/src/admin/edit/kdb5_edit.c b/src/admin/edit/kdb5_edit.c index c105d3cac..ab9390547 100644 --- a/src/admin/edit/kdb5_edit.c +++ b/src/admin/edit/kdb5_edit.c @@ -69,10 +69,12 @@ static char *mkey_password = 0; int exit_status = 0; +krb5_context edit_context; + static void usage(who, status) -char *who; -int status; + char *who; + int status; { fprintf(stderr, "usage: %s [-d dbpathname] [-r realmname] [-R request ]\n", @@ -111,7 +113,8 @@ char *kdb5_edit_Init(argc, argv) extern krb5_kt_ops krb5_ktf_writable_ops; char *request = NULL; - krb5_init_ets(); + krb5_init_context(&edit_context); + krb5_init_ets(edit_context); if (strrchr(argv[0], '/')) argv[0] = strrchr(argv[0], '/')+1; @@ -164,7 +167,7 @@ char *kdb5_edit_Init(argc, argv) interface will have umask = 77 but that is not a serious problem. */ (void) umask(077); - if (retval = krb5_kt_register(&krb5_ktf_writable_ops)) { + if (retval = krb5_kt_register(edit_context, &krb5_ktf_writable_ops)) { com_err(progname, retval, "while registering writable key table functions"); exit(1); @@ -184,9 +187,9 @@ char *kdb5_edit_Init(argc, argv) "while setting up etype %d", etype); exit(1); } - krb5_use_cstype(&master_encblock, etype); + krb5_use_cstype(edit_context, &master_encblock, etype); if (!cur_realm) { - if (retval = krb5_get_default_realm(&defrealm)) { + if (retval = krb5_get_default_realm(edit_context, &defrealm)) { com_err(progname, retval, "while retrieving default realm name"); exit(1); } @@ -206,8 +209,8 @@ char *kdb5_edit_Init(argc, argv) krb5_kvno princ_exists(pname, principal) -char *pname; -krb5_principal principal; + char *pname; + krb5_principal principal; { int nprincs = 1; krb5_db_entry entry; @@ -215,19 +218,21 @@ krb5_principal principal; krb5_error_code retval; krb5_kvno vno; - if (retval = krb5_db_get_principal(principal, &entry, &nprincs, &more)) { - com_err(pname, retval, "while attempting to verify principal's existence"); + if (retval = krb5_db_get_principal(edit_context, principal, &entry, + &nprincs, &more)) { + com_err(pname, retval, + "while attempting to verify principal's existence"); exit_status++; return 0; } if (!nprincs) return NO_PRINC; vno = entry.kvno; - krb5_db_free_principal(&entry, nprincs); + krb5_db_free_principal(edit_context, &entry, nprincs); return(vno); } -int create_db_entry(principal, newentry) +int create_db_entry( principal, newentry) krb5_principal principal; krb5_db_entry *newentry; { @@ -235,51 +240,46 @@ int create_db_entry(principal, newentry) memset(newentry, 0, sizeof(krb5_db_entry)); - if (retval = krb5_copy_principal(principal, &newentry->principal)) + if (retval = krb5_copy_principal(edit_context, principal, &newentry->principal)) return retval; newentry->kvno = 1; newentry->max_life = mblock.max_life; newentry->max_renewable_life = mblock.max_rlife; newentry->mkvno = mblock.mkvno; newentry->expiration = mblock.expiration; - if (retval = krb5_copy_principal(master_princ, &newentry->mod_name)) + if (retval = krb5_copy_principal(edit_context, master_princ,&newentry->mod_name)) goto errout; newentry->attributes = mblock.flags; newentry->salt_type = KRB5_KDB_SALTTYPE_NORMAL; - if (retval = krb5_timeofday(&newentry->mod_date)) + if (retval = krb5_timeofday(edit_context, &newentry->mod_date)) goto errout; return 0; errout: if (newentry->principal) - krb5_free_principal(newentry->principal); + krb5_free_principal(edit_context, newentry->principal); memset(newentry, 0, sizeof(krb5_db_entry)); return retval; } void -add_key(DECLARG(char const *, cmdname), - DECLARG(char const *, newprinc), - DECLARG(krb5_const_principal, principal), - DECLARG(const krb5_keyblock *, key), - DECLARG(krb5_kvno, vno), - DECLARG(struct saltblock *, salt)) -OLDDECLARG(char const *, cmdname) -OLDDECLARG(char const *, newprinc) -OLDDECLARG(krb5_const_principal, principal) -OLDDECLARG(const krb5_keyblock *, key) -OLDDECLARG(krb5_kvno, vno) -OLDDECLARG(struct saltblock *, salt) +add_key(cmdname, newprinc, principal, key, vno, salt) + char const * cmdname; + char const * newprinc; + krb5_const_principal principal; + const krb5_keyblock * key; + krb5_kvno vno; + struct saltblock * salt; { krb5_error_code retval; krb5_db_entry newentry; int one = 1; memset((char *) &newentry, 0, sizeof(newentry)); - retval = krb5_kdb_encrypt_key(&master_encblock, + retval = krb5_kdb_encrypt_key(edit_context, &master_encblock, key, &newentry.key); if (retval) { @@ -294,7 +294,7 @@ OLDDECLARG(struct saltblock *, salt) newentry.mkvno = mblock.mkvno; newentry.expiration = mblock.expiration; newentry.mod_name = master_princ; - if (retval = krb5_timeofday(&newentry.mod_date)) { + if (retval = krb5_timeofday(edit_context, &newentry.mod_date)) { com_err(cmdname, retval, "while fetching date"); exit_status++; memset((char *)newentry.key.contents, 0, newentry.key.length); @@ -312,7 +312,7 @@ OLDDECLARG(struct saltblock *, salt) newentry.salt = 0; } - retval = krb5_db_put_principal(&newentry, &one); + retval = krb5_db_put_principal(edit_context, &newentry, &one); memset((char *)newentry.key.contents, 0, newentry.key.length); krb5_xfree(newentry.key.contents); if (retval) { @@ -329,8 +329,8 @@ OLDDECLARG(struct saltblock *, salt) void set_dbname(argc, argv) -int argc; -char *argv[]; + int argc; + char *argv[]; { krb5_error_code retval; @@ -341,14 +341,14 @@ char *argv[]; return; } if (dbactive) { - if ((retval = krb5_db_fini()) && retval != KRB5_KDB_DBNOTINITED) { + if ((retval = krb5_db_fini(edit_context)) && retval!= KRB5_KDB_DBNOTINITED) { com_err(argv[0], retval, "while closing previous database"); exit_status++; return; } if (valid_master_key) { - (void) krb5_finish_key(&master_encblock); - (void) krb5_finish_random_key(&master_encblock, + (void) krb5_finish_key(edit_context, &master_encblock); + (void) krb5_finish_random_key(edit_context, &master_encblock, &master_random); memset((char *)master_keyblock.contents, 0, master_keyblock.length); @@ -356,7 +356,7 @@ char *argv[]; master_keyblock.contents = NULL; valid_master_key = 0; } - krb5_free_principal(master_princ); + krb5_free_principal(edit_context, master_princ); dbactive = FALSE; } if (cur_realm) @@ -373,8 +373,8 @@ char *argv[]; int set_dbname_help(pname, dbname) -char *pname; -char *dbname; + char *pname; + char *dbname; { krb5_error_code retval; int nentries; @@ -388,13 +388,13 @@ char *dbname; exit(1); } strcpy(current_dbname, dbname); - if (retval = krb5_db_set_name(current_dbname)) { + if (retval = krb5_db_set_name(edit_context, current_dbname)) { com_err(pname, retval, "while setting active database to '%s'", dbname); exit_status++; return(1); } - if (retval = krb5_db_init()) { + if (retval = krb5_db_init(edit_context)) { com_err(pname, retval, "while initializing database"); exit_status++; return(1); @@ -402,29 +402,29 @@ char *dbname; /* assemble & parse the master key name */ - if (retval = krb5_db_setup_mkey_name(mkey_name, cur_realm, 0, + if (retval = krb5_db_setup_mkey_name(edit_context, mkey_name, cur_realm, 0, &master_princ)) { com_err(pname, retval, "while setting up master key name"); exit_status++; return(1); } nentries = 1; - if (retval = krb5_db_get_principal(master_princ, &master_entry, &nentries, - &more)) { + if (retval = krb5_db_get_principal(edit_context, master_princ, &master_entry, + &nentries, &more)) { com_err(pname, retval, "while retrieving master entry"); exit_status++; - (void) krb5_db_fini(); + (void) krb5_db_fini(edit_context); return(1); } else if (more) { com_err(pname, KRB5KDC_ERR_PRINCIPAL_NOT_UNIQUE, "while retrieving master entry"); exit_status++; - (void) krb5_db_fini(); + (void) krb5_db_fini(edit_context); return(1); } else if (!nentries) { com_err(pname, KRB5_KDB_NOENTRY, "while retrieving master entry"); exit_status++; - (void) krb5_db_fini(); + (void) krb5_db_fini(edit_context); return(1); } mblock.max_life = master_entry.max_life; @@ -433,16 +433,17 @@ char *dbname; /* don't set flags, master has some extra restrictions */ mblock.mkvno = master_entry.kvno; - krb5_db_free_principal(&master_entry, nentries); + krb5_db_free_principal(edit_context, &master_entry, nentries); if (mkey_password) { pwd.data = mkey_password; pwd.length = strlen(mkey_password); - retval = krb5_principal2salt(master_princ, &scratch); + retval = krb5_principal2salt(edit_context, master_princ, &scratch); if (retval) { com_err(pname, retval, "while calculated master key salt"); return(1); } - retval = krb5_string_to_key(&master_encblock, master_keyblock.keytype, + retval = krb5_string_to_key(edit_context, &master_encblock, + master_keyblock.keytype, &master_keyblock, &pwd, &scratch); if (retval) { com_err(pname, retval, @@ -451,9 +452,9 @@ char *dbname; } free(scratch.data); mkey_password = 0; - } else if (retval = krb5_db_fetch_mkey(master_princ, &master_encblock, - manual_mkey, FALSE, 0, - &master_keyblock)) { + } else if (retval = krb5_db_fetch_mkey(edit_context, master_princ, + &master_encblock, manual_mkey, + FALSE, 0, &master_keyblock)) { com_err(pname, retval, "while reading master key"); com_err(pname, 0, "Warning: proceeding without master key"); exit_status++; @@ -462,8 +463,8 @@ char *dbname; return(0); } valid_master_key = 1; - if (retval = krb5_db_verify_master_key(master_princ, &master_keyblock, - &master_encblock)) { + if (retval = krb5_db_verify_master_key(edit_context, master_princ, + &master_keyblock,&master_encblock)) { com_err(pname, retval, "while verifying master key"); exit_status++; memset((char *)master_keyblock.contents, 0, master_keyblock.length); @@ -472,7 +473,7 @@ char *dbname; dbactive = TRUE; return(1); } - if (retval = krb5_process_key(&master_encblock, + if (retval = krb5_process_key(edit_context, &master_encblock, &master_keyblock)) { com_err(pname, retval, "while processing master key"); exit_status++; @@ -482,12 +483,12 @@ char *dbname; dbactive = TRUE; return(1); } - if (retval = krb5_init_random_key(&master_encblock, + if (retval = krb5_init_random_key(edit_context, &master_encblock, &master_keyblock, &master_random)) { com_err(pname, retval, "while initializing random key generator"); exit_status++; - (void) krb5_finish_key(&master_encblock); + (void) krb5_finish_key(edit_context, &master_encblock); memset((char *)master_keyblock.contents, 0, master_keyblock.length); krb5_xfree(master_keyblock.contents); valid_master_key = 0; @@ -499,8 +500,8 @@ char *dbname; } void enter_master_key(argc, argv) - int argc; - char *argv[]; + int argc; + char *argv[]; { char *pname = argv[0]; krb5_error_code retval; @@ -511,38 +512,39 @@ void enter_master_key(argc, argv) return; } if (valid_master_key) { - (void) krb5_finish_key(&master_encblock); - (void) krb5_finish_random_key(&master_encblock, + (void) krb5_finish_key(edit_context, &master_encblock); + (void) krb5_finish_random_key(edit_context, &master_encblock, &master_random); memset((char *)master_keyblock.contents, 0, master_keyblock.length); krb5_xfree(master_keyblock.contents); master_keyblock.contents = NULL; } - if (retval = krb5_db_fetch_mkey(master_princ, &master_encblock, + if (retval = krb5_db_fetch_mkey(edit_context, master_princ, &master_encblock, TRUE, FALSE, 0, &master_keyblock)) { com_err(pname, retval, "while reading master key"); exit_status++; return; } - if (retval = krb5_db_verify_master_key(master_princ, &master_keyblock, + if (retval = krb5_db_verify_master_key(edit_context, master_princ, + &master_keyblock, &master_encblock)) { com_err(pname, retval, "while verifying master key"); exit_status++; return; } - if (retval = krb5_process_key(&master_encblock, + if (retval = krb5_process_key(edit_context, &master_encblock, &master_keyblock)) { com_err(pname, retval, "while processing master key"); exit_status++; return; } - if (retval = krb5_init_random_key(&master_encblock, + if (retval = krb5_init_random_key(edit_context, &master_encblock, &master_keyblock, &master_random)) { com_err(pname, retval, "while initializing random key generator"); exit_status++; - (void) krb5_finish_key(&master_encblock); + (void) krb5_finish_key(edit_context, &master_encblock); return; } valid_master_key = 1; @@ -603,7 +605,7 @@ void extract_srvtab(argc, argv) strcat(ktname, argv[1]); strcat(ktname, "-new-srvtab"); - if (retval = krb5_kt_resolve(ktname, &ktid)) { + if (retval = krb5_kt_resolve(edit_context, ktname, &ktid)) { com_err(argv[0], retval, "while resolving keytab name '%s'", ktname); exit_status++; return; @@ -627,14 +629,14 @@ void extract_srvtab(argc, argv) strcat(pname, cur_realm); } - if (retval = krb5_parse_name(pname, &princ)) { + if (retval = krb5_parse_name(edit_context, pname, &princ)) { com_err(argv[0], retval, "while parsing %s", pname); exit_status++; free(pname); continue; } nentries = 1; - if (retval = krb5_db_get_principal(princ, &dbentry, &nentries, + if (retval = krb5_db_get_principal(edit_context, princ, &dbentry, &nentries, &more)) { com_err(argv[0], retval, "while retrieving %s", pname); exit_status++; @@ -644,14 +646,14 @@ void extract_srvtab(argc, argv) "while retrieving %s", pname); exit_status++; if (nentries) - krb5_db_free_principal(&dbentry, nentries); + krb5_db_free_principal(edit_context, &dbentry, nentries); goto cleanmost; } else if (!nentries) { com_err(argv[0], KRB5_KDB_NOENTRY, "while retrieving %s", pname); exit_status++; goto cleanmost; } - if (retval = krb5_kdb_decrypt_key(&master_encblock, + if (retval = krb5_kdb_decrypt_key(edit_context, &master_encblock, &dbentry.key, &newentry.key)) { com_err(argv[0], retval, "while decrypting key for '%s'", pname); @@ -660,7 +662,7 @@ void extract_srvtab(argc, argv) } newentry.principal = princ; newentry.vno = dbentry.kvno; - if (retval = krb5_kt_add_entry(ktid, &newentry)) { + if (retval = krb5_kt_add_entry(edit_context, ktid, &newentry)) { com_err(argv[0], retval, "while adding key to keytab '%s'", ktname); exit_status++; @@ -670,12 +672,12 @@ void extract_srvtab(argc, argv) memset((char *)newentry.key.contents, 0, newentry.key.length); krb5_xfree(newentry.key.contents); cleanall: - krb5_db_free_principal(&dbentry, nentries); + krb5_db_free_principal(edit_context, &dbentry, nentries); cleanmost: free(pname); - krb5_free_principal(princ); + krb5_free_principal(edit_context, princ); } - if (retval = krb5_kt_close(ktid)) { + if (retval = krb5_kt_close(edit_context, ktid)) { com_err(argv[0], retval, "while closing keytab"); exit_status++; } @@ -747,14 +749,14 @@ void extract_v4_srvtab(argc, argv) strcat(pname, cur_realm); } - if (retval = krb5_parse_name(pname, &princ)) { + if (retval = krb5_parse_name(edit_context, pname, &princ)) { com_err(argv[0], retval, "while parsing %s", pname); exit_status++; free(pname); continue; } nentries = 1; - if (retval = krb5_db_get_principal(princ, &dbentry, &nentries, + if (retval = krb5_db_get_principal(edit_context, princ, &dbentry, &nentries, &more)) { com_err(argv[0], retval, "while retrieving %s", pname); exit_status++; @@ -764,14 +766,14 @@ void extract_v4_srvtab(argc, argv) "while retrieving %s", pname); exit_status++; if (nentries) - krb5_db_free_principal(&dbentry, nentries); + krb5_db_free_principal(edit_context, &dbentry, nentries); goto cleanmost; } else if (!nentries) { com_err(argv[0], KRB5_KDB_NOENTRY, "while retrieving %s", pname); exit_status++; goto cleanmost; } - if (retval = krb5_kdb_decrypt_key(&master_encblock, + if (retval = krb5_kdb_decrypt_key(edit_context, &master_encblock, &dbentry.key, &key)) { com_err(argv[0], retval, "while decrypting key for '%s'", pname); @@ -794,10 +796,10 @@ void extract_v4_srvtab(argc, argv) memset((char *)key.contents, 0, key.length); krb5_xfree(key.contents); cleanall: - krb5_db_free_principal(&dbentry, nentries); + krb5_db_free_principal(edit_context, &dbentry, nentries); cleanmost: free(pname); - krb5_free_principal(princ); + krb5_free_principal(edit_context, princ); } fclose(fout); return; @@ -805,7 +807,7 @@ void extract_v4_srvtab(argc, argv) int check_print(chk_entry) -krb5_db_entry *chk_entry; + krb5_db_entry *chk_entry; { int names = 0; int instances = 1; @@ -818,13 +820,13 @@ krb5_db_entry *chk_entry; return(check_for_match(search_name, must_be_first[0], chk_entry, num_name_tokens, names)); - if ((krb5_princ_size(chk_entry->principal) > 1) && + if ((krb5_princ_size(edit_context, chk_entry->principal) > 1) && (num_name_tokens == 0) && (num_instance_tokens > 0)) return(check_for_match(search_instance, must_be_first[1], chk_entry, num_instance_tokens, instances)); - if ((krb5_princ_size(chk_entry->principal) > 1) && + if ((krb5_princ_size(edit_context, chk_entry->principal) > 1) && (num_name_tokens > 0) && (num_instance_tokens > 0)) { check1 = check_for_match(search_name, must_be_first[0], chk_entry, @@ -843,14 +845,14 @@ struct list_iterator_struct { krb5_error_code list_iterator(ptr, entry) -krb5_pointer ptr; -krb5_db_entry *entry; + krb5_pointer ptr; + krb5_db_entry *entry; { krb5_error_code retval; struct list_iterator_struct *lis = (struct list_iterator_struct *)ptr; char *name; - if (retval = krb5_unparse_name(entry->principal, &name)) { + if (retval = krb5_unparse_name(edit_context, entry->principal, &name)) { com_err(lis->cmdname, retval, "while unparsing principal"); exit_status++; return retval; @@ -912,7 +914,7 @@ void list_db(argc, argv) parse_token(argbuf, &must_be_first[0], &num_name_tokens, search_name); } - (void) krb5_db_iterate(list_iterator, argv[0]); + (void) krb5_db_iterate(edit_context, list_iterator, argv[0]); } void delete_entry(argc, argv) @@ -940,7 +942,7 @@ void delete_entry(argc, argv) exit_status++; return; } - if (retval = krb5_parse_name(argv[1], &newprinc)) { + if (retval = krb5_parse_name(edit_context, argv[1], &newprinc)) { com_err(argv[0], retval, "while parsing '%s'", argv[1]); exit_status++; return; @@ -948,7 +950,7 @@ void delete_entry(argc, argv) if (princ_exists(argv[0], newprinc) == NO_PRINC) { com_err(argv[0], 0, "principal '%s' is not in the database", argv[1]); exit_status++; - krb5_free_principal(newprinc); + krb5_free_principal(edit_context, newprinc); return; } printf("Are you sure you want to delete '%s'?\nType 'yes' to confirm:", @@ -956,11 +958,11 @@ void delete_entry(argc, argv) if ((fgets(yesno, sizeof(yesno), stdin) == NULL) || strcmp(yesno, "yes\n")) { printf("NOT removing '%s'\n", argv[1]); - krb5_free_principal(newprinc); + krb5_free_principal(edit_context, newprinc); return; } printf("OK, deleting '%s'\n", argv[1]); - if (retval = krb5_db_delete_principal(newprinc, &one)) { + if (retval = krb5_db_delete_principal(edit_context, newprinc, &one)) { com_err(argv[0], retval, "while deleting '%s'", argv[1]); exit_status++; } else if (one != 1) { @@ -973,7 +975,7 @@ void delete_entry(argc, argv) printf("\007\007\007WARNING: Be sure to take '%s' off all access control lists\n\tbefore reallocating the name\n", argv[1]); #endif - krb5_free_principal(newprinc); + krb5_free_principal(edit_context, newprinc); return; } @@ -1009,12 +1011,13 @@ enter_rnd_key(argc, argv, change) exit_status++; return; } - if (retval = krb5_parse_name(argv[1], &newprinc)) { + if (retval = krb5_parse_name(edit_context, argv[1], &newprinc)) { com_err(argv[0], retval, "while parsing '%s'", argv[1]); exit_status++; return; } - if (retval = krb5_db_get_principal(newprinc, &entry, &nprincs, &more)) { + if (retval = krb5_db_get_principal(edit_context, newprinc, &entry, + &nprincs, &more)) { com_err(argv[0], retval, "while trying to get principal's database entry"); exit_status++; return; @@ -1040,7 +1043,8 @@ enter_rnd_key(argc, argv, change) nprincs = 1; } - if (retval = krb5_random_key(&master_encblock, master_random, &tempkey)) { + if (retval = krb5_random_key(edit_context, &master_encblock, + master_random, &tempkey)) { com_err(argv[0], retval, "while generating random key"); exit_status++; return; @@ -1071,15 +1075,16 @@ enter_rnd_key(argc, argv, change) entry.salt_type = entry.alt_salt_type = 0; entry.salt_length = entry.alt_salt_length = 0; - retval = krb5_kdb_encrypt_key(&master_encblock, tempkey, &entry.key); - krb5_free_keyblock(tempkey); + retval = krb5_kdb_encrypt_key(edit_context, &master_encblock, + tempkey, &entry.key); + krb5_free_keyblock(edit_context, tempkey); if (retval) { com_err(argv[0], retval, "while encrypting key for '%s'", argv[1]); exit_status++; goto errout; } - if (retval = krb5_db_put_principal(&entry, &nprincs)) { + if (retval = krb5_db_put_principal(edit_context, &entry, &nprincs)) { com_err(argv[0], retval, "while storing entry for '%s'\n", argv[1]); exit_status++; goto errout; @@ -1091,9 +1096,9 @@ enter_rnd_key(argc, argv, change) } errout: - krb5_free_principal(newprinc); + krb5_free_principal(edit_context, newprinc); if (nprincs) - krb5_db_free_principal(&entry, nprincs); + krb5_db_free_principal(edit_context, &entry, nprincs); return; } @@ -1142,7 +1147,7 @@ void add_new_key(argc, argv) exit_status++; return; } - if (retval = krb5_parse_name(argv[1], &newprinc)) { + if (retval = krb5_parse_name(edit_context, argv[1], &newprinc)) { com_err(cmdname, retval, "while parsing '%s'", argv[1]); exit_status++; return; @@ -1150,11 +1155,11 @@ void add_new_key(argc, argv) if (princ_exists(cmdname, newprinc) != NO_PRINC) { com_err(cmdname, 0, "principal '%s' already exists", argv[1]); exit_status++; - krb5_free_principal(newprinc); + krb5_free_principal(edit_context, newprinc); return; } enter_pwd_key(cmdname, argv[1], newprinc, newprinc, 0, salttype); - krb5_free_principal(newprinc); + krb5_free_principal(edit_context, newprinc); return; } @@ -1176,7 +1181,7 @@ void add_v4_key(argc, argv) exit_status++; return; } - if (retval = krb5_parse_name(argv[1], &newprinc)) { + if (retval = krb5_parse_name(edit_context, argv[1], &newprinc)) { com_err(argv[0], retval, "while parsing '%s'", argv[1]); exit_status++; return; @@ -1184,12 +1189,12 @@ void add_v4_key(argc, argv) if (princ_exists(argv[0], newprinc) != NO_PRINC) { com_err(argv[0], 0, "principal '%s' already exists", argv[1]); exit_status++; - krb5_free_principal(newprinc); + krb5_free_principal(edit_context, newprinc); return; } enter_pwd_key(argv[0], argv[1], newprinc, newprinc, 0, KRB5_KDB_SALTTYPE_V4); - krb5_free_principal(newprinc); + krb5_free_principal(edit_context, newprinc); return; } @@ -1230,7 +1235,7 @@ void change_pwd_key(argc, argv) exit_status++; return; } - if (retval = krb5_parse_name(argv[1], &newprinc)) { + if (retval = krb5_parse_name(edit_context, argv[1], &newprinc)) { com_err(cmdname, retval, "while parsing '%s'", argv[1]); exit_status++; return; @@ -1238,11 +1243,11 @@ void change_pwd_key(argc, argv) if ((vno = princ_exists(argv[0], newprinc)) == NO_PRINC) { com_err(cmdname, 0, "No principal '%s' exists!", argv[1]); exit_status++; - krb5_free_principal(newprinc); + krb5_free_principal(edit_context, newprinc); return; } enter_pwd_key(cmdname, argv[1], newprinc, newprinc, vno, salttype); - krb5_free_principal(newprinc); + krb5_free_principal(edit_context, newprinc); return; } @@ -1270,7 +1275,7 @@ void change_v4_key(argc, argv) exit_status++; return; } - if (retval = krb5_parse_name(argv[1], &newprinc)) { + if (retval = krb5_parse_name(edit_context, argv[1], &newprinc)) { com_err(argv[0], retval, "while parsing '%s'", argv[1]); exit_status++; return; @@ -1278,28 +1283,23 @@ void change_v4_key(argc, argv) if ((vno = princ_exists(argv[0], newprinc)) == NO_PRINC) { com_err(argv[0], 0, "No principal '%s' exists!", argv[1]); exit_status++; - krb5_free_principal(newprinc); + krb5_free_principal(edit_context, newprinc); return; } enter_pwd_key(argv[0], argv[1], newprinc, newprinc, vno, KRB5_KDB_SALTTYPE_V4); - krb5_free_principal(newprinc); + krb5_free_principal(edit_context, newprinc); return; } void -enter_pwd_key(DECLARG(char *, cmdname), - DECLARG(char *, newprinc), - DECLARG(krb5_const_principal, princ), - DECLARG(krb5_const_principal, string_princ), - DECLARG(krb5_kvno, vno), - DECLARG(int, salttype)) -OLDDECLARG(char *, cmdname) -OLDDECLARG(char *, newprinc) -OLDDECLARG(krb5_const_principal, princ) -OLDDECLARG(krb5_const_principal, string_princ) -OLDDECLARG(krb5_kvno, vno) -OLDDECLARG(int, salttype) +enter_pwd_key(cmdname, newprinc, princ, string_princ, vno, salttype) + char * cmdname; + char * newprinc; + krb5_const_principal princ; + krb5_const_principal string_princ; + krb5_kvno vno; + int salttype; { krb5_error_code retval; char password[BUFSIZ]; @@ -1308,7 +1308,7 @@ OLDDECLARG(int, salttype) krb5_data pwd; struct saltblock salt; - if (retval = krb5_read_password(krb5_default_pwd_prompt1, + if (retval = krb5_read_password(edit_context, krb5_default_pwd_prompt1, krb5_default_pwd_prompt2, password, &pwsize)) { com_err(cmdname, retval, "while reading password for '%s'", newprinc); @@ -1322,7 +1322,7 @@ OLDDECLARG(int, salttype) switch (salttype) { case KRB5_KDB_SALTTYPE_NORMAL: - if (retval = krb5_principal2salt(string_princ, &salt.saltdata)) { + if (retval = krb5_principal2salt(edit_context,string_princ,&salt.saltdata)) { com_err(cmdname, retval, "while converting principal to salt for '%s'", newprinc); exit_status++; @@ -1334,7 +1334,7 @@ OLDDECLARG(int, salttype) salt.saltdata.length = 0; break; case KRB5_KDB_SALTTYPE_NOREALM: - if (retval = krb5_principal2salt_norealm(string_princ, + if (retval = krb5_principal2salt_norealm(edit_context, string_princ, &salt.saltdata)) { com_err(cmdname, retval, "while converting principal to salt for '%s'", newprinc); @@ -1345,7 +1345,8 @@ OLDDECLARG(int, salttype) case KRB5_KDB_SALTTYPE_ONLYREALM: { krb5_data *foo; - if (retval = krb5_copy_data(krb5_princ_realm(string_princ), + if (retval = krb5_copy_data(edit_context, + krb5_princ_realm(edit_context, string_princ), &foo)) { com_err(cmdname, retval, "while converting principal to salt for '%s'", newprinc); @@ -1361,10 +1362,9 @@ OLDDECLARG(int, salttype) exit_status++; return; } - retval = krb5_string_to_key(&master_encblock, master_keyblock.keytype, - &tempkey, - &pwd, - &salt.saltdata); + retval = krb5_string_to_key(edit_context, &master_encblock, + master_keyblock.keytype, &tempkey, + &pwd, &salt.saltdata); memset(password, 0, sizeof(password)); /* erase it */ if (retval) { com_err(cmdname, retval, "while converting password to key for '%s'", @@ -1413,14 +1413,15 @@ void show_principal(argc, argv) exit_status++; return; } - if (retval = krb5_parse_name(argv[1], &princ)) { + if (retval = krb5_parse_name(edit_context, argv[1], &princ)) { com_err(argv[0], retval, "while parsing '%s'", argv[1]); exit_status++; return; } - if (retval = krb5_db_get_principal(princ, &entry, &nprincs, &more)) { - com_err(argv[0], retval, "while trying to get principal's database entry"); + if (retval = krb5_db_get_principal(edit_context,princ,&entry,&nprincs,&more)) { + com_err(argv[0], retval, + "while trying to get principal's database entry"); exit_status++; goto errout; } @@ -1431,13 +1432,13 @@ void show_principal(argc, argv) goto errout; } - if (retval = krb5_unparse_name(entry.principal, &pr_name)) { + if (retval = krb5_unparse_name(edit_context, entry.principal, &pr_name)) { com_err(argv[0], retval, "while unparsing principal"); exit_status++; goto errout; } - if (retval = krb5_unparse_name(entry.mod_name, &pr_mod)) { + if (retval = krb5_unparse_name(edit_context, entry.mod_name, &pr_mod)) { com_err(argv[0], retval, "while unparsing 'modified by' principal"); exit_status++; goto errout; @@ -1456,9 +1457,9 @@ void show_principal(argc, argv) } errout: - krb5_free_principal(princ); + krb5_free_principal(edit_context, princ); if (nprincs) - krb5_db_free_principal(&entry, nprincs); + krb5_db_free_principal(edit_context, &entry, nprincs); } void change_working_dir(argc, argv) @@ -1500,7 +1501,8 @@ void print_working_dir(argc, argv) #undef getwd #endif -int quit() +int +quit() { krb5_error_code retval; static krb5_boolean finished = 0; @@ -1508,10 +1510,11 @@ int quit() if (finished) return 0; if (valid_master_key) { - (void) krb5_finish_key(&master_encblock); - (void) krb5_finish_random_key(&master_encblock, &master_random); + (void) krb5_finish_key(edit_context, &master_encblock); + (void) krb5_finish_random_key(edit_context, &master_encblock, + &master_random); } - retval = krb5_db_fini(); + retval = krb5_db_fini(edit_context); memset((char *)master_keyblock.contents, 0, master_keyblock.length); finished = TRUE; if (retval && retval != KRB5_KDB_DBNOTINITED) { |