📄 get_in_tkt.c
字号:
/* * * $Source: /usr/src/kerberosIV/krb/RCS/get_in_tkt.c,v $ * $Author: kfall $ * * Copyright 1987, 1988 by the Massachusetts Institute of Technology. * * For copying and distribution information, please see the file * <mit-copyright.h>. */#ifndef lintstatic char rcsid_get_in_tkt_c[] ="$Header: /usr/src/kerberosIV/krb/RCS/get_in_tkt.c,v 4.13 90/06/23 03:10:32 kfall Exp $";#endif /* lint */#include <mit-copyright.h>#include <des.h>#include <krb.h>#include <prot.h>#ifndef NULL#define NULL 0#endif/* * This file contains two routines: passwd_to_key() converts * a password into a DES key (prompting for the password if * not supplied), and krb_get_pw_in_tkt() gets an initial ticket for * a user. *//* * passwd_to_key(): given a password, return a DES key. * There are extra arguments here which (used to be?) * used by srvtab_to_key(). * * If the "passwd" argument is not null, generate a DES * key from it, using string_to_key(). * * If the "passwd" argument is null, call des_read_password() * to prompt for a password and then convert it into a DES key. * * In either case, the resulting key is put in the "key" argument, * and 0 is returned. *//*ARGSUSED */static int passwd_to_key(user,instance,realm,passwd,key) char *user, *instance, *realm, *passwd; C_Block key;{#ifdef NOENCRYPTION if (!passwd) placebo_read_password(key, "Password: ", 0);#else /* Do encyryption */ if (passwd) string_to_key(passwd, key); else { des_read_password(key, "Kerberos Password: ", 0); }#endif /* NOENCRYPTION */ return (0);}/* * krb_get_pw_in_tkt() takes the name of the server for which the initial * ticket is to be obtained, the name of the principal the ticket is * for, the desired lifetime of the ticket, and the user's password. * It passes its arguments on to krb_get_in_tkt(), which contacts * Kerberos to get the ticket, decrypts it using the password provided, * and stores it away for future use. * * krb_get_pw_in_tkt() passes two additional arguments to krb_get_in_tkt(): * the name of a routine (passwd_to_key()) to be used to get the * password in case the "password" argument is null and NULL for the * decryption procedure indicating that krb_get_in_tkt should use the * default method of decrypting the response from the KDC. * * The result of the call to krb_get_in_tkt() is returned. */krb_get_pw_in_tkt(user,instance,realm,service,sinstance,life,password) char *user, *instance, *realm, *service, *sinstance; int life; char *password;{ return(krb_get_in_tkt(user,instance,realm,service,sinstance,life, passwd_to_key, NULL, password));}#ifdef NOENCRYPTION/* * $Source: /usr/src/kerberosIV/krb/RCS/get_in_tkt.c,v $ * $Author: kfall $ * * Copyright 1985, 1986, 1987, 1988 by the Massachusetts Institute * of Technology. * * For copying and distribution information, please see the file * <mit-copyright.h>. * * This routine prints the supplied string to standard * output as a prompt, and reads a password string without * echoing. */#ifndef lintstatic char rcsid_read_password_c[] ="$Header: /usr/src/kerberosIV/krb/RCS/get_in_tkt.c,v 4.13 90/06/23 03:10:32 kfall Exp $";#endif lint#include <des.h>#include "conf.h"#include <stdio.h>#ifdef BSDUNIX#include <strings.h>#include <sys/ioctl.h>#include <signal.h>#include <setjmp.h>#elsechar *strcpy();int strcmp();#endif#ifdef BSDUNIXstatic jmp_buf env;#endif#ifdef BSDUNIXstatic void sig_restore();static push_signals(), pop_signals();int placebo_read_pw_string();#endif/*** Routines ****************************************************** */intplacebo_read_password(k,prompt,verify) des_cblock *k; char *prompt; int verify;{ int ok; char key_string[BUFSIZ];#ifdef BSDUNIX if (setjmp(env)) { ok = -1; goto lose; }#endif ok = placebo_read_pw_string(key_string, BUFSIZ, prompt, verify); if (ok == 0) bzero(k, sizeof(C_Block));lose: bzero(key_string, sizeof (key_string)); return ok;}/* * This version just returns the string, doesn't map to key. * * Returns 0 on success, non-zero on failure. */intplacebo_read_pw_string(s,max,prompt,verify) char *s; int max; char *prompt; int verify;{ int ok = 0; char *ptr; #ifdef BSDUNIX jmp_buf old_env; struct sgttyb tty_state;#endif char key_string[BUFSIZ]; if (max > BUFSIZ) { return -1; }#ifdef BSDUNIX bcopy(old_env, env, sizeof(env)); if (setjmp(env)) goto lose; /* save terminal state*/ if (ioctl(0,TIOCGETP,&tty_state) == -1) return -1; push_signals(); /* Turn off echo */ tty_state.sg_flags &= ~ECHO; if (ioctl(0,TIOCSETP,&tty_state) == -1) return -1;#endif while (!ok) { printf(prompt); fflush(stdout);#ifdef CROSSMSDOS h19line(s,sizeof(s),0); if (!strlen(s)) continue;#else if (!fgets(s, max, stdin)) { clearerr(stdin); continue; } if ((ptr = index(s, '\n'))) *ptr = '\0';#endif if (verify) { printf("\nVerifying, please re-enter %s",prompt); fflush(stdout);#ifdef CROSSMSDOS h19line(key_string,sizeof(key_string),0); if (!strlen(key_string)) continue;#else if (!fgets(key_string, sizeof(key_string), stdin)) { clearerr(stdin); continue; } if ((ptr = index(key_string, '\n'))) *ptr = '\0';#endif if (strcmp(s,key_string)) { printf("\n\07\07Mismatch - try again\n"); fflush(stdout); continue; } } ok = 1; }#ifdef BSDUNIXlose: if (!ok) bzero(s, max); printf("\n"); /* turn echo back on */ tty_state.sg_flags |= ECHO; if (ioctl(0,TIOCSETP,&tty_state)) ok = 0; pop_signals(); bcopy(env, old_env, sizeof(env));#endif if (verify) bzero(key_string, sizeof (key_string)); s[max-1] = 0; /* force termination */ return !ok; /* return nonzero if not okay */}#ifdef BSDUNIX/* * this can be static since we should never have more than * one set saved.... */#ifdef POSIXstatic void (*old_sigfunc[NSIG])();#elsestatic int (*old_sigfunc[NSIG])();#endif POSIXstatic push_signals(){ register i; for (i = 0; i < NSIG; i++) old_sigfunc[i] = signal(i,sig_restore);}static pop_signals(){ register i; for (i = 0; i < NSIG; i++) signal(i,old_sigfunc[i]);}static void sig_restore(sig,code,scp) int sig,code; struct sigcontext *scp;{ longjmp(env,1);}#endif#endif /* NOENCRYPTION */
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -