xref: /netbsd-src/crypto/external/bsd/heimdal/dist/lib/kadm5/chpass_c.c (revision d3273b5b76f5afaafe308cead5511dbb8df8c5e9)
1 /*	$NetBSD: chpass_c.c,v 1.2 2017/01/28 21:31:49 christos Exp $	*/
2 
3 /*
4  * Copyright (c) 1997-2000, 2005-2006 Kungliga Tekniska Högskolan
5  * (Royal Institute of Technology, Stockholm, Sweden).
6  * All rights reserved.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  *
12  * 1. Redistributions of source code must retain the above copyright
13  *    notice, this list of conditions and the following disclaimer.
14  *
15  * 2. Redistributions in binary form must reproduce the above copyright
16  *    notice, this list of conditions and the following disclaimer in the
17  *    documentation and/or other materials provided with the distribution.
18  *
19  * 3. Neither the name of the Institute nor the names of its contributors
20  *    may be used to endorse or promote products derived from this software
21  *    without specific prior written permission.
22  *
23  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
24  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
27  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33  * SUCH DAMAGE.
34  */
35 
36 #include "kadm5_locl.h"
37 
38 __RCSID("$NetBSD: chpass_c.c,v 1.2 2017/01/28 21:31:49 christos Exp $");
39 
40 kadm5_ret_t
kadm5_c_chpass_principal(void * server_handle,krb5_principal princ,int keepold,int n_ks_tuple,krb5_key_salt_tuple * ks_tuple,const char * password)41 kadm5_c_chpass_principal(void *server_handle,
42 			 krb5_principal princ,
43 			 int keepold,
44 			 int n_ks_tuple,
45 			 krb5_key_salt_tuple *ks_tuple,
46 			 const char *password)
47 {
48     kadm5_client_context *context = server_handle;
49     kadm5_ret_t ret;
50     krb5_storage *sp;
51     unsigned char buf[1024];
52     int32_t tmp;
53     krb5_data reply;
54 
55     /*
56      * We should get around to implementing this...  At the moment, the
57      * the server side API is implemented but the wire protocol has not
58      * been updated.
59      */
60     if (n_ks_tuple > 0)
61        return KADM5_KS_TUPLE_NOSUPP;
62 
63     ret = _kadm5_connect(server_handle);
64     if(ret)
65 	return ret;
66 
67     sp = krb5_storage_from_mem(buf, sizeof(buf));
68     if (sp == NULL) {
69 	krb5_clear_error_message(context->context);
70 	return ENOMEM;
71     }
72     krb5_store_int32(sp, kadm_chpass);
73     krb5_store_principal(sp, princ);
74     krb5_store_string(sp, password);
75     krb5_store_int32(sp, keepold); /* extension */
76     ret = _kadm5_client_send(context, sp);
77     krb5_storage_free(sp);
78     if (ret)
79 	return ret;
80     ret = _kadm5_client_recv(context, &reply);
81     if(ret)
82 	return ret;
83     sp = krb5_storage_from_data (&reply);
84     if (sp == NULL) {
85 	krb5_clear_error_message(context->context);
86 	krb5_data_free (&reply);
87 	return ENOMEM;
88     }
89     krb5_ret_int32(sp, &tmp);
90     krb5_clear_error_message(context->context);
91     krb5_storage_free(sp);
92     krb5_data_free (&reply);
93     return tmp;
94 }
95 
96 kadm5_ret_t
kadm5_c_chpass_principal_with_key(void * server_handle,krb5_principal princ,int keepold,int n_key_data,krb5_key_data * key_data)97 kadm5_c_chpass_principal_with_key(void *server_handle,
98 				  krb5_principal princ,
99 				  int keepold,
100 				  int n_key_data,
101 				  krb5_key_data *key_data)
102 {
103     kadm5_client_context *context = server_handle;
104     kadm5_ret_t ret;
105     krb5_storage *sp;
106     unsigned char buf[1024];
107     int32_t tmp;
108     krb5_data reply;
109     int i;
110 
111     ret = _kadm5_connect(server_handle);
112     if(ret)
113 	return ret;
114 
115     sp = krb5_storage_from_mem(buf, sizeof(buf));
116     if (sp == NULL) {
117 	krb5_clear_error_message(context->context);
118 	return ENOMEM;
119     }
120     krb5_store_int32(sp, kadm_chpass_with_key);
121     krb5_store_principal(sp, princ);
122     krb5_store_int32(sp, n_key_data);
123     for (i = 0; i < n_key_data; ++i)
124 	kadm5_store_key_data (sp, &key_data[i]);
125     krb5_store_int32(sp, keepold); /* extension */
126     ret = _kadm5_client_send(context, sp);
127     krb5_storage_free(sp);
128     if (ret)
129 	return ret;
130     ret = _kadm5_client_recv(context, &reply);
131     if(ret)
132 	return ret;
133     sp = krb5_storage_from_data (&reply);
134     if (sp == NULL) {
135 	krb5_clear_error_message(context->context);
136 	krb5_data_free (&reply);
137 	return ENOMEM;
138     }
139     krb5_ret_int32(sp, &tmp);
140     krb5_clear_error_message(context->context);
141     krb5_storage_free(sp);
142     krb5_data_free (&reply);
143     return tmp;
144 }
145