155682Smarkm/*
2233294Sstas * Copyright (c) 1997 - 2004 Kungliga Tekniska H��gskolan
3233294Sstas * (Royal Institute of Technology, Stockholm, Sweden).
4233294Sstas * All rights reserved.
555682Smarkm *
6233294Sstas * Redistribution and use in source and binary forms, with or without
7233294Sstas * modification, are permitted provided that the following conditions
8233294Sstas * are met:
955682Smarkm *
10233294Sstas * 1. Redistributions of source code must retain the above copyright
11233294Sstas *    notice, this list of conditions and the following disclaimer.
1255682Smarkm *
13233294Sstas * 2. Redistributions in binary form must reproduce the above copyright
14233294Sstas *    notice, this list of conditions and the following disclaimer in the
15233294Sstas *    documentation and/or other materials provided with the distribution.
1655682Smarkm *
17233294Sstas * 3. Neither the name of the Institute nor the names of its contributors
18233294Sstas *    may be used to endorse or promote products derived from this software
19233294Sstas *    without specific prior written permission.
2055682Smarkm *
21233294Sstas * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22233294Sstas * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23233294Sstas * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24233294Sstas * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25233294Sstas * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26233294Sstas * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27233294Sstas * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28233294Sstas * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29233294Sstas * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30233294Sstas * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31233294Sstas * SUCH DAMAGE.
3255682Smarkm */
3355682Smarkm
3455682Smarkm#include "kadmin_locl.h"
35178825Sdfr#include "kadmin-commands.h"
3655682Smarkm
3755682Smarkmstruct cpw_entry_data {
3855682Smarkm    int random_key;
3955682Smarkm    int random_password;
4055682Smarkm    char *password;
4172445Sassar    krb5_key_data *key_data;
4255682Smarkm};
4355682Smarkm
4455682Smarkmstatic int
4555682Smarkmset_random_key (krb5_principal principal)
4655682Smarkm{
4755682Smarkm    krb5_error_code ret;
4855682Smarkm    int i;
4955682Smarkm    krb5_keyblock *keys;
5055682Smarkm    int num_keys;
5155682Smarkm
5255682Smarkm    ret = kadm5_randkey_principal(kadm_handle, principal, &keys, &num_keys);
5355682Smarkm    if(ret)
5455682Smarkm	return ret;
5555682Smarkm    for(i = 0; i < num_keys; i++)
5655682Smarkm	krb5_free_keyblock_contents(context, &keys[i]);
5755682Smarkm    free(keys);
5855682Smarkm    return 0;
5955682Smarkm}
6055682Smarkm
6155682Smarkmstatic int
6255682Smarkmset_random_password (krb5_principal principal)
6355682Smarkm{
6455682Smarkm    krb5_error_code ret;
6555682Smarkm    char pw[128];
6655682Smarkm
6755682Smarkm    random_password (pw, sizeof(pw));
6855682Smarkm    ret = kadm5_chpass_principal(kadm_handle, principal, pw);
6955682Smarkm    if (ret == 0) {
7055682Smarkm	char *princ_name;
7155682Smarkm
7255682Smarkm	krb5_unparse_name(context, principal, &princ_name);
7355682Smarkm
74178825Sdfr	printf ("%s's password set to \"%s\"\n", princ_name, pw);
7555682Smarkm	free (princ_name);
7655682Smarkm    }
7755682Smarkm    memset (pw, 0, sizeof(pw));
7855682Smarkm    return ret;
7955682Smarkm}
8055682Smarkm
8155682Smarkmstatic int
8255682Smarkmset_password (krb5_principal principal, char *password)
8355682Smarkm{
8455682Smarkm    krb5_error_code ret = 0;
8555682Smarkm    char pwbuf[128];
8655682Smarkm
8755682Smarkm    if(password == NULL) {
8855682Smarkm	char *princ_name;
8955682Smarkm	char *prompt;
9055682Smarkm
9155682Smarkm	krb5_unparse_name(context, principal, &princ_name);
9255682Smarkm	asprintf(&prompt, "%s's Password: ", princ_name);
9355682Smarkm	free (princ_name);
94178825Sdfr	ret = UI_UTIL_read_pw_string(pwbuf, sizeof(pwbuf), prompt, 1);
9555682Smarkm	free (prompt);
9655682Smarkm	if(ret){
9755682Smarkm	    return 0; /* XXX error code? */
9855682Smarkm	}
9955682Smarkm	password = pwbuf;
10055682Smarkm    }
10155682Smarkm    if(ret == 0)
10255682Smarkm	ret = kadm5_chpass_principal(kadm_handle, principal, password);
10355682Smarkm    memset(pwbuf, 0, sizeof(pwbuf));
10455682Smarkm    return ret;
10555682Smarkm}
10655682Smarkm
10755682Smarkmstatic int
10872445Sassarset_key_data (krb5_principal principal, krb5_key_data *key_data)
10972445Sassar{
11072445Sassar    krb5_error_code ret;
11172445Sassar
11272445Sassar    ret = kadm5_chpass_principal_with_key (kadm_handle, principal,
11372445Sassar					   3, key_data);
11472445Sassar    return ret;
11572445Sassar}
11672445Sassar
11772445Sassarstatic int
11855682Smarkmdo_cpw_entry(krb5_principal principal, void *data)
11955682Smarkm{
12055682Smarkm    struct cpw_entry_data *e = data;
121233294Sstas
12255682Smarkm    if (e->random_key)
12355682Smarkm	return set_random_key (principal);
12455682Smarkm    else if (e->random_password)
12555682Smarkm	return set_random_password (principal);
12672445Sassar    else if (e->key_data)
12772445Sassar	return set_key_data (principal, e->key_data);
12855682Smarkm    else
12955682Smarkm	return set_password (principal, e->password);
13055682Smarkm}
13155682Smarkm
13255682Smarkmint
133178825Sdfrcpw_entry(struct passwd_options *opt, int argc, char **argv)
13455682Smarkm{
135178825Sdfr    krb5_error_code ret = 0;
13655682Smarkm    int i;
13755682Smarkm    struct cpw_entry_data data;
13855682Smarkm    int num;
13972445Sassar    krb5_key_data key_data[3];
14055682Smarkm
141178825Sdfr    data.random_key = opt->random_key_flag;
142178825Sdfr    data.random_password = opt->random_password_flag;
143178825Sdfr    data.password = opt->password_string;
14472445Sassar    data.key_data	 = NULL;
14555682Smarkm
14655682Smarkm    num = 0;
14755682Smarkm    if (data.random_key)
14855682Smarkm	++num;
14955682Smarkm    if (data.random_password)
15055682Smarkm	++num;
15155682Smarkm    if (data.password)
15255682Smarkm	++num;
153178825Sdfr    if (opt->key_string)
15472445Sassar	++num;
15555682Smarkm
15655682Smarkm    if (num > 1) {
157178825Sdfr	fprintf (stderr, "give only one of "
15872445Sassar		"--random-key, --random-password, --password, --key\n");
159178825Sdfr	return 1;
16055682Smarkm    }
161233294Sstas
162178825Sdfr    if (opt->key_string) {
16372445Sassar	const char *error;
16472445Sassar
165178825Sdfr	if (parse_des_key (opt->key_string, key_data, &error)) {
166233294Sstas	    fprintf (stderr, "failed parsing key \"%s\": %s\n",
167178825Sdfr		     opt->key_string, error);
168178825Sdfr	    return 1;
16972445Sassar	}
17072445Sassar	data.key_data = key_data;
17172445Sassar    }
17272445Sassar
17355682Smarkm    for(i = 0; i < argc; i++)
17478527Sassar	ret = foreach_principal(argv[i], do_cpw_entry, "cpw", &data);
17555682Smarkm
17672445Sassar    if (data.key_data) {
17772445Sassar	int16_t dummy;
17872445Sassar	kadm5_free_key_data (kadm_handle, &dummy, key_data);
17972445Sassar    }
18072445Sassar
181178825Sdfr    return ret != 0;
18255682Smarkm}
183