Home | History | Annotate | Line # | Download | only in hdb
      1 /*	$NetBSD: test_hdbkeys.c,v 1.3 2019/12/15 22:50:49 christos Exp $	*/
      2 
      3 /*
      4  * Copyright (c) 2005 Kungliga Tekniska Hgskolan
      5  * (Royal Institute of Technology, Stockholm, Sweden).
      6  * All rights reserved.
      7  *
      8  * Redistribution and use in source and binary forms, with or without
      9  * modification, are permitted provided that the following conditions
     10  * are met:
     11  *
     12  * 1. Redistributions of source code must retain the above copyright
     13  *    notice, this list of conditions and the following disclaimer.
     14  *
     15  * 2. Redistributions in binary form must reproduce the above copyright
     16  *    notice, this list of conditions and the following disclaimer in the
     17  *    documentation and/or other materials provided with the distribution.
     18  *
     19  * 3. Neither the name of the Institute nor the names of its contributors
     20  *    may be used to endorse or promote products derived from this software
     21  *    without specific prior written permission.
     22  *
     23  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
     24  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     25  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     26  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
     27  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     28  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     29  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     30  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     31  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     32  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     33  * SUCH DAMAGE.
     34  */
     35 
     36 #include "hdb_locl.h"
     37 #include <krb5/getarg.h>
     38 #include <krb5/base64.h>
     39 
     40 static int help_flag;
     41 static int version_flag;
     42 static int kvno_integer = 1;
     43 
     44 struct getargs args[] = {
     45     { "kvno",		'd',	arg_integer, &kvno_integer, NULL, NULL },
     46     { "help",		'h',	arg_flag,    &help_flag,    NULL, NULL },
     47     { "version",	0,	arg_flag,    &version_flag, NULL, NULL }
     48 };
     49 
     50 static int num_args = sizeof(args) / sizeof(args[0]);
     51 
     52 int
     53 main(int argc, char **argv)
     54 {
     55     krb5_principal principal;
     56     krb5_context context;
     57     char *principal_str, *password_str, *str;
     58     int ret, o = 0;
     59     hdb_keyset keyset;
     60     size_t length, len;
     61     void *data;
     62 
     63     setprogname(argv[0]);
     64 
     65     if(getarg(args, num_args, argc, argv, &o))
     66 	krb5_std_usage(1, args, num_args);
     67 
     68     if(help_flag)
     69 	krb5_std_usage(0, args, num_args);
     70 
     71     if(version_flag){
     72 	print_version(NULL);
     73 	exit(0);
     74     }
     75 
     76     ret = krb5_init_context(&context);
     77     if (ret)
     78 	errx (1, "krb5_init_context failed: %d", ret);
     79 
     80     if (argc != 3)
     81 	errx(1, "username and password missing");
     82 
     83     principal_str = argv[1];
     84     password_str = argv[2];
     85 
     86     ret = krb5_parse_name (context, principal_str, &principal);
     87     if (ret)
     88 	krb5_err (context, 1, ret, "krb5_parse_name %s", principal_str);
     89 
     90     memset(&keyset, 0, sizeof(keyset));
     91 
     92     keyset.kvno = kvno_integer;
     93     keyset.set_time = malloc(sizeof (*keyset.set_time));
     94     if (keyset.set_time == NULL)
     95 	errx(1, "couldn't allocate set_time field of keyset");
     96     *keyset.set_time = time(NULL);
     97 
     98     ret = hdb_generate_key_set_password(context, principal, password_str,
     99 					&keyset.keys.val, &len);
    100     if (ret)
    101 	krb5_err(context, 1, ret, "hdb_generate_key_set_password");
    102     keyset.keys.len = len;
    103 
    104     if (keyset.keys.len == 0)
    105 	krb5_errx (context, 1, "hdb_generate_key_set_password length 0");
    106 
    107     krb5_free_principal (context, principal);
    108 
    109     ASN1_MALLOC_ENCODE(hdb_keyset, data, length, &keyset, &len, ret);
    110     if (ret)
    111 	krb5_errx(context, 1, "encode keyset");
    112     if (len != length)
    113 	krb5_abortx(context, "foo");
    114 
    115     krb5_free_context(context);
    116 
    117     ret = rk_base64_encode(data, length, &str);
    118     if (ret < 0)
    119 	errx(1, "base64_encode");
    120 
    121     printf("keyset: %s\n", str);
    122 
    123     free(data);
    124 
    125     return 0;
    126 }
    127