2 * Sun RPC is a product of Sun Microsystems, Inc. and is provided for
3 * unrestricted use provided that this legend is included on all tape
4 * media and as a part of the software program in whole or part. Users
5 * may copy or modify Sun RPC without charge, but are not authorized
6 * to license or distribute it to anyone else except as part of a product or
7 * program developed by the user or with the express written consent of
8 * Sun Microsystems, Inc.
10 * SUN RPC IS PROVIDED AS IS WITH NO WARRANTIES OF ANY KIND INCLUDING THE
11 * WARRANTIES OF DESIGN, MERCHANTIBILITY AND FITNESS FOR A PARTICULAR
12 * PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE.
14 * Sun RPC is provided with no support and without any obligation on the
15 * part of Sun Microsystems, Inc. to assist in its use, correction,
16 * modification or enhancement.
18 * SUN MICROSYSTEMS, INC. SHALL HAVE NO LIABILITY WITH RESPECT TO THE
19 * INFRINGEMENT OF COPYRIGHTS, TRADE SECRETS OR ANY PATENTS BY SUN RPC
20 * OR ANY PART THEREOF.
22 * In no event will Sun Microsystems, Inc. be liable for any lost revenue
23 * or profits or other special, indirect and consequential damages, even if
24 * Sun has been advised of the possibility of such damages.
26 * Sun Microsystems, Inc.
28 * Mountain View, California 94043
30 * @(#)chkey.c 1.7 91/03/11 Copyr 1986 Sun Micro
33 * Copyright (C) 1986, Sun Microsystems, Inc.
37 * Command to change one's public key in the public key database
41 #include <rpc/key_prot.h>
43 #include <rpcsvc/yp_prot.h>
44 #include <rpcsvc/ypclnt.h>
50 #include <sys/fcntl.h>
52 extern char *getpass();
56 struct passwd *ypgetpwuid();
61 static char PKMAP[] = "publickey.byname";
63 static char PKFILE[] = "/etc/publickey";
65 static char ROOTKEY[] = "/etc/.rootkey";
71 char name[MAXNETNAMELEN+1];
72 char public[HEXKEYBYTES + 1];
73 char secret[HEXKEYBYTES + 1];
74 char crypt1[HEXKEYBYTES + KEYCHECKSUMSIZE + 1];
75 char crypt2[HEXKEYBYTES + KEYCHECKSUMSIZE + 1];
87 for (argc--, argv++; argc > 0 && **argv == '-'; argc--, argv++) {
88 if (argv[0][2] != 0) {
104 (void)yp_get_default_domain(&domain);
105 if (yp_master(domain, PKMAP, &master) != 0) {
106 (void)fprintf(stderr,
107 "can't find master of publickey database\n");
111 uid = getuid() /*geteuid()*/;
113 if (host2netname(name, NULL, NULL) == 0) {
114 (void)fprintf(stderr,
115 "chkey: cannot convert hostname to netname\n");
119 if (user2netname(name, uid, NULL) == 0) {
120 (void)fprintf(stderr,
121 "chkey: cannot convert username to netname\n");
125 (void)printf("Generating new key for %s.\n", name);
130 pw = ypgetpwuid(uid);
136 (void)fprintf(stderr,
137 "No NIS password entry found: can't change key.\n");
139 (void)fprintf(stderr,
140 "No password entry found: can't change key.\n");
147 (void)fprintf(stderr,
148 "No password entry found: can't change key.\n");
153 pass = getpass("Password:");
156 if (strcmp(crypt(pass, pw->pw_passwd), pw->pw_passwd) != 0) {
157 (void)fprintf(stderr, "Invalid password.\n");
162 force = 1; /* Make this mandatory */
164 genkeys(public, secret, pass);
166 memcpy(crypt1, secret, HEXKEYBYTES);
167 memcpy(crypt1 + HEXKEYBYTES, secret, KEYCHECKSUMSIZE);
168 crypt1[HEXKEYBYTES + KEYCHECKSUMSIZE] = 0;
169 xencrypt(crypt1, pass);
172 memcpy(crypt2, crypt1, HEXKEYBYTES + KEYCHECKSUMSIZE + 1);
173 xdecrypt(crypt2, getpass("Retype password:"));
174 if (memcmp(crypt2, crypt2 + HEXKEYBYTES, KEYCHECKSUMSIZE) != 0 ||
175 memcmp(crypt2, secret, HEXKEYBYTES) != 0) {
176 (void)fprintf(stderr, "Password incorrect.\n");
182 (void)printf("Sending key change request to %s...\n", master);
184 status = setpublicmap(name, public, crypt1);
187 (void)fprintf(stderr,
188 "%s: unable to update NIS database (%u): %s\n",
189 self, status, yperr_string(status));
191 (void)fprintf(stderr,
192 "%s: unable to update publickey database\n", self);
199 * Root users store their key in /etc/$ROOTKEY so
200 * that they can auto reboot without having to be
201 * around to type a password. Storing this in a file
202 * is rather dubious: it should really be in the EEPROM
203 * so it does not go over the net.
207 fd = open(ROOTKEY, O_WRONLY|O_TRUNC|O_CREAT, 0);
213 if (write(fd, secret, strlen(secret)) < 0 ||
214 write(fd, &newline, sizeof(newline)) < 0) {
215 (void)fprintf(stderr, "%s: ", ROOTKEY);
221 if (key_setsecret(secret) < 0) {
222 (void)printf("Unable to login with new secret key.\n");
225 (void)printf("Done.\n");
233 (void)fprintf(stderr, "usage: %s [-f]\n", name);
240 * Set the entry in the public key file
242 setpublicmap(name, public, secret)
249 (void)sprintf(pkent,"%s:%s", public, secret);
251 return (yp_update(domain, PKMAP, YPOP_STORE,
252 name, strlen(name), pkent, strlen(pkent)));
254 return (localupdate(name, PKFILE, YPOP_STORE,
255 strlen(name), name, strlen(pkent), pkent));
267 static struct passwd pw;
270 (void)sprintf(uidstr, "%d", uid);
271 if (yp_match(domain, "passwd.byuid", uidstr, strlen(uidstr),
272 &val, &vallen) != 0) {
279 pw.pw_passwd = p + 1;
280 p = index(pw.pw_passwd, ':');
287 #endif /* YPPASSWD */