freebsd-nq/usr.bin/keyinit/skeyinit.c
1995-05-30 06:41:30 +00:00

192 lines
4.3 KiB
C

/* change password or add user to S/KEY authentication system.
* S/KEY is a tradmark of Bellcore */
#include <stdio.h>
#include <string.h>
#include <pwd.h>
#include <time.h>
#include <skey.h>
extern int optind;
extern char *optarg;
#define NAMELEN 2
int
main(argc,argv)
int argc;
char *argv[];
{
struct skey skey;
int rval,n,nn,i,defaultsetup;
char seed[18],tmp[80],key[8];
struct passwd *ppuser,*pp;
char defaultseed[17], passwd[256],passwd2[256] ;
time_t now;
struct tm *tm;
char tbuf[27],buf[60];
char lastc, me[80];
int l;
time(&now);
#if 0 /* Choose a more random seed */
tm = localtime(&now);
strftime(tbuf, sizeof(tbuf), "%M%j", tm);
#else
sprintf(tbuf, "%05ld", (long) (now % 100000));
#endif
gethostname(defaultseed,NAMELEN);
strcpy(&defaultseed[NAMELEN],tbuf);
pp = ppuser = getpwuid(getuid());
strcpy(me,pp->pw_name);
defaultsetup = 1;
if( argc > 1){
if(strcmp("-s", argv[1]) == 0)
defaultsetup = 0;
else
pp = getpwnam(argv[1]);
if(argc > 2)
pp = getpwnam(argv[2]);
}
if(pp == NULL){
printf("User unknown\n");
return 1;
}
if(strcmp( pp->pw_name,me) != 0){
if(getuid() != 0){
/* Only root can change other's passwds */
printf("Permission denied.\n");
return(1);
}
}
rval = skeylookup(&skey,pp->pw_name);
switch(rval){
case -1:
perror("error in opening database");
return 1;
case 0:
printf("Updating %s:\n",pp->pw_name);
printf("Old key: %s\n",skey.seed);
/* lets be nice if they have a skey.seed that ends in 0-8 just add one*/
l = strlen(skey.seed);
if( l > 0){
lastc = skey.seed[l-1];
if( isdigit(lastc) && lastc != '9' ){
strcpy(defaultseed, skey.seed);
defaultseed[l-1] = lastc + 1;
}
if( isdigit(lastc) && lastc == '9' && l < 16){
strcpy(defaultseed, skey.seed);
defaultseed[l-1] = '0';
defaultseed[l] = '0';
defaultseed[l+1] = '\0';
}
}
break;
case 1:
skey.val = 0; /* XXX */
printf("Adding %s:\n",pp->pw_name);
break;
}
n = 99;
if( ! defaultsetup){
printf("Reminder you need the 6 english words from the skey command.\n");
for(i=0;;i++){
if(i >= 2) exit(1);
printf("Enter sequence count from 1 to 9999: ");
fgets(tmp,sizeof(tmp),stdin);
n = atoi(tmp);
if(n > 0 && n < 10000)
break; /* Valid range */
printf("Count must be > 0 and < 10000\n");
}
}
if( !defaultsetup){
printf("Enter new key [default %s]: ", defaultseed);
fflush(stdout);
fgets(seed,sizeof(seed),stdin);
rip(seed);
if(strlen(seed) > 16){
printf("Seed truncated to 16 chars\n");
seed[16] = '\0';
}
if( seed[0] == '\0') strcpy(seed,defaultseed);
for(i=0;;i++){
if(i >= 2) exit(1);
printf("s/key %d %s\ns/key access password: ",n,seed);
fgets(tmp,sizeof(tmp),stdin);
rip(tmp);
if(tmp[0] == '?'){
printf("Enter 6 English words from secure S/Key calculation.\n");
continue;
}
if(tmp[0] == '\0'){
exit(1);
}
if(etob(key,tmp) == 1 || atob8(key,tmp) == 0)
break; /* Valid format */
printf("Invalid format, try again with 6 English words.\n");
}
} else {
/* Get user's secret password */
fprintf(stderr,"Reminder - Only use this method if you are directly connected.\n");
fprintf(stderr,"If you are using telnet or rlogin exit with no password and use keyinit -s.\n");
for(i=0;;i++){
if(i >= 2) exit(1);
fprintf(stderr,"Enter secret password: ");
readpass(passwd,sizeof(passwd));
if(passwd[0] == '\0'){
exit(1);
}
fprintf(stderr,"Again secret password: ");
readpass(passwd2,sizeof(passwd));
if(passwd2[0] == '\0'){
exit(1);
}
if(strlen(passwd) < 4 && strlen(passwd2) < 4) {
fprintf(stderr, "Sorry your password must be longer\n\r");
exit(1);
}
if(strcmp(passwd,passwd2) == 0) break;
fprintf(stderr, "Sorry no match\n");
}
strcpy(seed,defaultseed);
/* Crunch seed and password into starting key */
if(keycrunch(key,seed,passwd) != 0){
fprintf(stderr,"%s: key crunch failed\n",argv[0]);
return 1;
}
nn = n;
while(nn-- != 0)
f(key);
}
time(&now);
tm = localtime(&now);
strftime(tbuf, sizeof(tbuf), " %b %d,%Y %T", tm);
if (skey.val == NULL)
skey.val = (char *) malloc(16+1);
btoa8(skey.val,key);
fprintf(skey.keyfile,"%s %04d %-16s %s %-21s\n",pp->pw_name,n,
seed,skey.val, tbuf);
fclose(skey.keyfile);
printf("\nID %s s/key is %d %s\n",pp->pw_name,n,seed);
printf("%s\n",btoe(buf,key));
#ifdef HEXIN
printf("%s\n",put8(buf,key));
#endif
return 0;
}