* directory or online at http://www.openafs.org/dl/license10.html
*/
-#include <afs/vldbint.h>
#include <afsconfig.h>
#include <afs/param.h>
-
-#include <stdio.h>
-#include <string.h>
-
-#ifdef AFS_AIX32_ENV
-#include <signal.h>
-#endif
+#include <roken.h>
#include <ctype.h>
-#include <sys/types.h>
+
+#include <afs/auth.h>
#include <afs/cmd.h>
#include <afs/cellconfig.h>
#include <afs/afsint.h>
#include <afs/vlserver.h>
#include <rx/rx.h>
#include <rx/xdr.h>
-
#include <ubik.h>
#include <afs/kauth.h>
#include <afs/afsutil.h>
-
-#include <sys/socket.h>
-#include <netinet/in.h>
-#include <arpa/inet.h>
+#include <afs/vldbint.h>
/*
File servers in NW byte order.
static struct ubik_client *client;
-static struct rx_securityClass *junk;
+static struct rx_securityClass *sc;
+static int scindex;
/*
Obtain list of file servers as known to VLDB. These may
err = 1;
continue;
}
- conn = rx_NewConnection(server_id[i], htons(port), 1, junk, 0);
+ conn = rx_NewConnection(server_id[i], htons(port), 1, sc, scindex);
if (!conn) {
printf("Informational: could not connect to \
file server %s\n", afs_inet_ntoa_r(server_id[i], hoststr));
struct afsconf_cell info;
struct rx_connection *serverconns[MAXSERVERS];
afs_int32 code, i;
+ struct rx_securityClass *scnull;
+ rxkad_level sclevel = rxkad_auth;
sprintf(confdir, "%s", AFSDIR_CLIENT_ETC_DIRPATH);
+ if (as->parms[4].items) { /* -localauth */
+ sprintf(confdir, "%s", AFSDIR_SERVER_ETC_DIRPATH);
+ }
+
+ if (as->parms[5].items) { /* -encrypt */
+ sclevel = rxkad_crypt;
+ }
+
/* setup to talk to servers */
code = rx_Init(0);
if (code) {
return 1;
}
- junk = rxnull_NewClientSecurityObject();
+ scnull = sc = rxnull_NewClientSecurityObject();
+ scindex = 0;
+
tdir = afsconf_Open(confdir);
if (!tdir) {
printf("Warning: could not get cell configuration.\n");
return 1;
}
+ if (as->parms[4].items) { /* -localauth */
+ if (sclevel == rxkad_crypt) {
+ code = afsconf_ClientAuthSecure(tdir, &sc, &scindex);
+ } else {
+ code = afsconf_ClientAuth(tdir, &sc, &scindex);
+ }
+ if (code || scindex == 0) {
+ afsconf_Close(tdir);
+ fprintf(stderr, "Could not get security object for -localauth (code: %d)\n",
+ code);
+ return -1;
+ }
+
+ } else if (!as->parms[3].items) { /* not -noauth */
+ struct ktc_principal sname;
+ struct ktc_token ttoken;
+
+ strcpy(sname.cell, info.name);
+ sname.instance[0] = '\0';
+ strcpy(sname.name, "afs");
+
+ code = ktc_GetToken(&sname, &ttoken, sizeof(ttoken), NULL);
+ if (code) {
+ fprintf(stderr, "Could not get afs tokens, running unauthenticated\n");
+ } else {
+ scindex = 2;
+ sc = rxkad_NewClientSecurityObject(sclevel, &ttoken.sessionKey,
+ ttoken.kvno, ttoken.ticketLen,
+ ttoken.ticket);
+ }
+ }
+
for (i = 0; i < info.numServers; ++i)
serverconns[i] =
rx_NewConnection(info.hostAddr[i].sin_addr.s_addr,
- info.hostAddr[i].sin_port, USER_SERVICE_ID, junk,
+ info.hostAddr[i].sin_port, USER_SERVICE_ID, scnull,
0);
for (; i < MAXSERVERS; ++i) {
serverconns[i] = (struct rx_connection *)0;
cmd_AddParm(ts, "-ip", CMD_LIST, CMD_OPTIONAL, "IP address");
cmd_CreateAlias(ts, "ic");
cmd_AddParm(ts, "-cell", CMD_SINGLE, CMD_OPTIONAL, "cell name");
+ cmd_AddParm(ts, "-noauth", CMD_FLAG, CMD_OPTIONAL, "don't authenticate");
+ cmd_AddParm(ts, "-localauth", CMD_FLAG, CMD_OPTIONAL, "user server tickets");
+ cmd_AddParm(ts, "-encrypt", CMD_FLAG, CMD_OPTIONAL, "encrypt commands");
ts = cmd_CreateSyntax("listservers", GetServerList, NULL,
"list servers in the cell");