1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
|
/* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */
/*
* kdc/rtest.c
*
* Copyright 1991 by the Massachusetts Institute of Technology.
* All Rights Reserved.
*
* Export of this software from the United States of America may
* require a specific license from the United States Government.
* It is the responsibility of any person or organization contemplating
* export to obtain such a license before exporting.
*
* WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
* distribute this software and its documentation for any purpose and
* without fee is hereby granted, provided that the above copyright
* notice appear in all copies and that both that copyright notice and
* this permission notice appear in supporting documentation, and that
* the name of M.I.T. not be used in advertising or publicity pertaining
* to distribution of the software without specific, written prior
* permission. Furthermore if you modify this software you must label
* your software as modified software and not distribute it in such a
* fashion that it might be confused with the original M.I.T. software.
* M.I.T. makes no representations about the suitability of
* this software for any purpose. It is provided "as is" without express
* or implied warranty.
*
*
*/
#include "k5-int.h"
#include <stdio.h>
#include "kdc_util.h"
#include "extern.h"
void krb5_klog_syslog(void);
static krb5_principal
make_princ(krb5_context ctx, const char *str, const char *prog)
{
krb5_principal ret;
char *dat;
if(!(ret = (krb5_principal) malloc(sizeof(krb5_principal_data)))) {
com_err(prog, ENOMEM, "while allocating principal data");
exit(3);
}
memset(ret, 0, sizeof(krb5_principal_data));
/* We do not include the null... */
if(!(dat = (char *) malloc(strlen(str)))) {
com_err(prog, ENOMEM, "while allocating principal realm data");
exit(3);
}
memcpy(dat, str, strlen(str));
krb5_princ_set_realm_data(ctx, ret, dat);
krb5_princ_set_realm_length(ctx, ret, strlen(str));
return ret;
}
int
main(int argc, char **argv)
{
krb5_data otrans;
krb5_data ntrans;
krb5_principal tgs, cl, sv;
krb5_error_code kret;
kdc_realm_t kdc_realm;
if (argc < 4) {
fprintf(stderr, "not enough args\n");
exit(1);
}
/* Get a context */
kret = krb5int_init_context_kdc(&kdc_realm.realm_context);
if (kret) {
com_err(argv[0], kret, "while getting krb5 context");
exit(2);
}
/* Needed so kdc_context will work */
kdc_active_realm = &kdc_realm;
ntrans.length = 0;
ntrans.data = 0;
otrans.length = strlen(argv[1]);
if (otrans.length)
otrans.data = (char *) malloc(otrans.length);
else
otrans.data = 0;
memcpy(otrans.data,argv[1], otrans.length);
tgs = make_princ(kdc_context, argv[2], argv[0]);
cl = make_princ(kdc_context, argv[3], argv[0]);
sv = make_princ(kdc_context, argv[4], argv[0]);
add_to_transited(&otrans,&ntrans,tgs,cl,sv);
printf("%s\n",ntrans.data);
/* Free up all memory so we can profile for leaks */
if (otrans.data)
free(otrans.data);
free(ntrans.data);
krb5_free_principal(kdc_realm.realm_context, tgs);
krb5_free_principal(kdc_realm.realm_context, cl);
krb5_free_principal(kdc_realm.realm_context, sv);
krb5_free_context(kdc_realm.realm_context);
exit(0);
}
void krb5_klog_syslog(void) {}
kdc_realm_t *find_realm_data (char *rname, krb5_ui_4 rsize) { return 0; }
|