2 * Sun RPC is a product of Sun Microsystems, Inc. and is provided for
3 * unrestricted use provided that this legend is included on all tape
4 * media and as a part of the software program in whole or part. Users
5 * may copy or modify Sun RPC without charge, but are not authorized
6 * to license or distribute it to anyone else except as part of a product or
7 * program developed by the user or with the express written consent of
8 * Sun Microsystems, Inc.
10 * SUN RPC IS PROVIDED AS IS WITH NO WARRANTIES OF ANY KIND INCLUDING THE
11 * WARRANTIES OF DESIGN, MERCHANTIBILITY AND FITNESS FOR A PARTICULAR
12 * PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE.
14 * Sun RPC is provided with no support and without any obligation on the
15 * part of Sun Microsystems, Inc. to assist in its use, correction,
16 * modification or enhancement.
18 * SUN MICROSYSTEMS, INC. SHALL HAVE NO LIABILITY WITH RESPECT TO THE
19 * INFRINGEMENT OF COPYRIGHTS, TRADE SECRETS OR ANY PATENTS BY SUN RPC
20 * OR ANY PART THEREOF.
22 * In no event will Sun Microsystems, Inc. be liable for any lost revenue
23 * or profits or other special, indirect and consequential damages, even if
24 * Sun has been advised of the possibility of such damages.
26 * Sun Microsystems, Inc.
28 * Mountain View, California 94043
31 static char sccsid[] = "@(#)chkey.c 1.7 91/03/11 Copyr 1986 Sun Micro";
34 * Copyright (C) 1986, Sun Microsystems, Inc.
38 * Command to change one's public key in the public key database
42 #include <rpc/key_prot.h>
44 #include <rpcsvc/yp_prot.h>
45 #include <rpcsvc/ypclnt.h>
51 #include <sys/fcntl.h>
53 extern char *getpass();
57 struct passwd *ypgetpwuid();
62 static char PKMAP[] = "publickey.byname";
64 static char PKFILE[] = "/etc/publickey";
66 static char ROOTKEY[] = "/etc/.rootkey";
72 char name[MAXNETNAMELEN+1];
73 char public[HEXKEYBYTES + 1];
74 char secret[HEXKEYBYTES + 1];
75 char crypt1[HEXKEYBYTES + KEYCHECKSUMSIZE + 1];
76 char crypt2[HEXKEYBYTES + KEYCHECKSUMSIZE + 1];
88 for (argc--, argv++; argc > 0 && **argv == '-'; argc--, argv++) {
89 if (argv[0][2] != 0) {
105 (void)yp_get_default_domain(&domain);
106 if (yp_master(domain, PKMAP, &master) != 0) {
107 (void)fprintf(stderr,
108 "can't find master of publickey database\n");
112 uid = getuid() /*geteuid()*/;
114 if (host2netname(name, NULL, NULL) == 0) {
115 (void)fprintf(stderr,
116 "chkey: cannot convert hostname to netname\n");
120 if (user2netname(name, uid, NULL) == 0) {
121 (void)fprintf(stderr,
122 "chkey: cannot convert username to netname\n");
126 (void)printf("Generating new key for %s.\n", name);
131 pw = ypgetpwuid(uid);
137 (void)fprintf(stderr,
138 "No NIS password entry found: can't change key.\n");
140 (void)fprintf(stderr,
141 "No password entry found: can't change key.\n");
148 (void)fprintf(stderr,
149 "No password entry found: can't change key.\n");
154 pass = getpass("Password:");
157 if (strcmp(crypt(pass, pw->pw_passwd), pw->pw_passwd) != 0) {
158 (void)fprintf(stderr, "Invalid password.\n");
163 force = 1; /* Make this mandatory */
165 genkeys(public, secret, pass);
167 memcpy(crypt1, secret, HEXKEYBYTES);
168 memcpy(crypt1 + HEXKEYBYTES, secret, KEYCHECKSUMSIZE);
169 crypt1[HEXKEYBYTES + KEYCHECKSUMSIZE] = 0;
170 xencrypt(crypt1, pass);
173 memcpy(crypt2, crypt1, HEXKEYBYTES + KEYCHECKSUMSIZE + 1);
174 xdecrypt(crypt2, getpass("Retype password:"));
175 if (memcmp(crypt2, crypt2 + HEXKEYBYTES, KEYCHECKSUMSIZE) != 0 ||
176 memcmp(crypt2, secret, HEXKEYBYTES) != 0) {
177 (void)fprintf(stderr, "Password incorrect.\n");
183 (void)printf("Sending key change request to %s...\n", master);
185 status = setpublicmap(name, public, crypt1);
188 (void)fprintf(stderr,
189 "%s: unable to update NIS database (%u): %s\n",
190 self, status, yperr_string(status));
192 (void)fprintf(stderr,
193 "%s: unable to update publickey database\n", self);
200 * Root users store their key in /etc/$ROOTKEY so
201 * that they can auto reboot without having to be
202 * around to type a password. Storing this in a file
203 * is rather dubious: it should really be in the EEPROM
204 * so it does not go over the net.
208 fd = open(ROOTKEY, O_WRONLY|O_TRUNC|O_CREAT, 0);
214 if (write(fd, secret, strlen(secret)) < 0 ||
215 write(fd, &newline, sizeof(newline)) < 0) {
216 (void)fprintf(stderr, "%s: ", ROOTKEY);
222 if (key_setsecret(secret) < 0) {
223 (void)printf("Unable to login with new secret key.\n");
226 (void)printf("Done.\n");
234 (void)fprintf(stderr, "usage: %s [-f]\n", name);
241 * Set the entry in the public key file
243 setpublicmap(name, public, secret)
250 (void)sprintf(pkent,"%s:%s", public, secret);
252 return (yp_update(domain, PKMAP, YPOP_STORE,
253 name, strlen(name), pkent, strlen(pkent)));
255 return (localupdate(name, PKFILE, YPOP_STORE,
256 strlen(name), name, strlen(pkent), pkent));
268 static struct passwd pw;
271 (void)sprintf(uidstr, "%d", uid);
272 if (yp_match(domain, "passwd.byuid", uidstr, strlen(uidstr),
273 &val, &vallen) != 0) {
280 pw.pw_passwd = p + 1;
281 p = index(pw.pw_passwd, ':');
288 #endif /* YPPASSWD */