diff options
Diffstat (limited to 'eBones/passwd/HOW-TO')
-rw-r--r-- | eBones/passwd/HOW-TO | 247 |
1 files changed, 0 insertions, 247 deletions
diff --git a/eBones/passwd/HOW-TO b/eBones/passwd/HOW-TO deleted file mode 100644 index aad3b9c..0000000 --- a/eBones/passwd/HOW-TO +++ /dev/null @@ -1,247 +0,0 @@ -Here's how to regenerate this from the original eBones: - -1) Copy kpasswd.c from the admin directory. -2) perl -spi.bak -e 's/\$(Header[^\$]*)\$/$1/g' *.[ch] -3) Apply the following patch: - -*** /home/wollman/kpasswd.orig/kpasswd.c Fri Jan 20 16:01:36 1995 ---- kpasswd.c Fri Jan 20 16:29:57 1995 -*************** -*** 1,10 **** - /* -- * $Source: /afs/athena.mit.edu/astaff/project/kerberos/src/kadmin/RCS/kpasswd.c,v $ -- * $Author: jtkohl $ -- * - * Copyright 1988 by the Massachusetts Institute of Technology. - * - * For copying and distribution information, please see the file -! * <mit-copyright.h>. - * - * change your password with kerberos ---- 1,7 ---- - /* - * Copyright 1988 by the Massachusetts Institute of Technology. - * - * For copying and distribution information, please see the file -! * Copyright.MIT. - * - * change your password with kerberos -*************** -*** 12,20 **** - - #ifndef lint - static char rcsid_kpasswd_c[] = - "BonesHeader: /afs/athena.mit.edu/astaff/project/kerberos/src/kadmin/RCS/kpasswd.c,v 4.3 89/09/26 09:33:02 jtkohl Exp "; - #endif lint - -- #include <mit-copyright.h> - /* - * kpasswd ---- 9,20 ---- - - #ifndef lint -+ #if 0 - static char rcsid_kpasswd_c[] = - "BonesHeader: /afs/athena.mit.edu/astaff/project/kerberos/src/kadmin/RCS/kpasswd.c,v 4.3 89/09/26 09:33:02 jtkohl Exp "; -+ #endif -+ static const char rcsid[] = -+ "$Id$"; - #endif lint - - /* - * kpasswd -*************** -*** 28,36 **** - #include "kadm.h" - - extern void krb_set_tkt_string(); - -! main(argc,argv) -! int argc; -! char *argv[]; - { - char name[ANAME_SZ]; /* name of user */ ---- 28,38 ---- - #include "kadm.h" - -+ #include "extern.h" -+ - extern void krb_set_tkt_string(); -+ static void go_home(char *, int); - -! -! int krb_passwd(char *uname, char *iflag, char *rflag, char *uflag) - { - char name[ANAME_SZ]; /* name of user */ -*************** -*** 66,74 **** - default_realm) != KSUCCESS) { - pw = getpwuid((int) getuid()); -! if (pw) -! (void) strcpy(default_name, pw->pw_name); -! else - /* seems like a null name is kinda silly */ -! (void) strcpy(default_name, ""); - strcpy(default_inst, ""); - if (krb_get_lrealm(default_realm, 1) != KSUCCESS) ---- 68,77 ---- - default_realm) != KSUCCESS) { - pw = getpwuid((int) getuid()); -! if (pw) { -! strcpy(default_name, pw->pw_name); -! } else { - /* seems like a null name is kinda silly */ -! strcpy(default_name, ""); -! } - strcpy(default_inst, ""); - if (krb_get_lrealm(default_realm, 1) != KSUCCESS) -*************** -*** 76,85 **** - } - -! while ((c = getopt(argc, argv, "u:n:i:r:h")) != EOF) { -! switch (c) { -! case 'u': -! if (status = kname_parse(name, inst, realm, optarg)) { -! fprintf(stderr, "Kerberos error: %s\n", krb_err_txt[status]); -! exit(2); - } - if (realm[0]) ---- 79,85 ---- - } - -! if(uflag) { -! if (status = kname_parse(name, inst, realm, uflag)) { -! errx(2, "Kerberos error: %s", krb_err_txt[status]); - } - if (realm[0]) -*************** -*** 88,130 **** - if (krb_get_lrealm(realm, 1) != KSUCCESS) - strcpy(realm, KRB_REALM); -! break; -! case 'n': -! if (k_isname(optarg)) -! (void) strncpy(name, optarg, sizeof(name) - 1); -! else { -! fprintf(stderr, "Bad name: %s\n", optarg); -! usage(1); -! } -! break; -! case 'i': -! if (k_isinst(optarg)) -! (void) strncpy(inst, optarg, sizeof(inst) - 1); -! else { -! fprintf(stderr, "Bad instance: %s\n", optarg); -! usage(1); - } -! (void) strcpy(inst, optarg); -! break; -! case 'r': -! if (k_isrealm(optarg)) { -! (void) strncpy(realm, optarg, sizeof(realm) - 1); -! realm_given++; - } -! else { -! fprintf(stderr, "Bad realm: %s\n", optarg); -! usage(1); - } -- break; -- case 'h': -- usage(0); -- break; -- default: -- usage(1); -- break; -- } -- use_default = 0; - } -! if (optind < argc) -! usage(1); - - if (use_default) { ---- 88,119 ---- - if (krb_get_lrealm(realm, 1) != KSUCCESS) - strcpy(realm, KRB_REALM); -! } -! -! if(uname) { -! if (k_isname(uname)) { -! strncpy(name, uname, sizeof(name) - 1); -! } else { -! errx(1, "bad name: %s", uname); - } -! } -! -! if(iflag) { -! if (k_isinst(iflag)) { -! strncpy(inst, iflag, sizeof(inst) - 1); -! } else { -! errx(1, "bad instance: %s", iflag); - } -! } -! -! if(rflag) { -! if (k_isrealm(rflag)) { -! strncpy(realm, rflag, sizeof(realm) - 1); -! realm_given++; -! } else { -! errx(1, "bad realm: %s", rflag); - } - } -! -! if(uname || iflag || rflag || uflag) use_default = 0; - - if (use_default) { -*************** -*** 132,137 **** - strcpy(inst, default_inst); - strcpy(realm, default_realm); -! } -! else { - if (!name[0]) - strcpy(name, default_name); ---- 121,125 ---- - strcpy(inst, default_inst); - strcpy(realm, default_realm); -! } else { - if (!name[0]) - strcpy(name, default_name); -*************** -*** 147,153 **** - if ((status = kadm_init_link("changepw", KRB_MASTER, realm)) - != KADM_SUCCESS) -! com_err(argv[0], status, "while initializing"); - else if ((status = kadm_change_pw(new_key)) != KADM_SUCCESS) -! com_err(argv[0], status, " attempting to change password."); - - if (status != KADM_SUCCESS) ---- 135,141 ---- - if ((status = kadm_init_link("changepw", KRB_MASTER, realm)) - != KADM_SUCCESS) -! com_err("kpasswd", status, "while initializing"); - else if ((status = kadm_change_pw(new_key)) != KADM_SUCCESS) -! com_err("kpasswd", status, " attempting to change password."); - - if (status != KADM_SUCCESS) -*************** -*** 225,237 **** - } - -! usage(value) -! int value; -! { -! fprintf(stderr, "Usage: "); -! fprintf(stderr, "kpasswd [-h ] [-n user] [-i instance] [-r realm] "); -! fprintf(stderr, "[-u fullname]\n"); -! exit(value); -! } -! - go_home(str,x) - char *str; ---- 213,217 ---- - } - -! static void - go_home(str,x) - char *str; |