1*d3273b5bSchristos /* $NetBSD: chpass_c.c,v 1.2 2017/01/28 21:31:49 christos Exp $ */
2ca1c9b0cSelric
3ca1c9b0cSelric /*
4ca1c9b0cSelric * Copyright (c) 1997-2000, 2005-2006 Kungliga Tekniska Högskolan
5ca1c9b0cSelric * (Royal Institute of Technology, Stockholm, Sweden).
6ca1c9b0cSelric * All rights reserved.
7ca1c9b0cSelric *
8ca1c9b0cSelric * Redistribution and use in source and binary forms, with or without
9ca1c9b0cSelric * modification, are permitted provided that the following conditions
10ca1c9b0cSelric * are met:
11ca1c9b0cSelric *
12ca1c9b0cSelric * 1. Redistributions of source code must retain the above copyright
13ca1c9b0cSelric * notice, this list of conditions and the following disclaimer.
14ca1c9b0cSelric *
15ca1c9b0cSelric * 2. Redistributions in binary form must reproduce the above copyright
16ca1c9b0cSelric * notice, this list of conditions and the following disclaimer in the
17ca1c9b0cSelric * documentation and/or other materials provided with the distribution.
18ca1c9b0cSelric *
19ca1c9b0cSelric * 3. Neither the name of the Institute nor the names of its contributors
20ca1c9b0cSelric * may be used to endorse or promote products derived from this software
21ca1c9b0cSelric * without specific prior written permission.
22ca1c9b0cSelric *
23ca1c9b0cSelric * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
24ca1c9b0cSelric * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25ca1c9b0cSelric * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26ca1c9b0cSelric * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
27ca1c9b0cSelric * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28ca1c9b0cSelric * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29ca1c9b0cSelric * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30ca1c9b0cSelric * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31ca1c9b0cSelric * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32ca1c9b0cSelric * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33ca1c9b0cSelric * SUCH DAMAGE.
34ca1c9b0cSelric */
35ca1c9b0cSelric
36ca1c9b0cSelric #include "kadm5_locl.h"
37ca1c9b0cSelric
38*d3273b5bSchristos __RCSID("$NetBSD: chpass_c.c,v 1.2 2017/01/28 21:31:49 christos Exp $");
39ca1c9b0cSelric
40ca1c9b0cSelric kadm5_ret_t
kadm5_c_chpass_principal(void * server_handle,krb5_principal princ,int keepold,int n_ks_tuple,krb5_key_salt_tuple * ks_tuple,const char * password)41ca1c9b0cSelric kadm5_c_chpass_principal(void *server_handle,
42ca1c9b0cSelric krb5_principal princ,
43b9d004c6Schristos int keepold,
44b9d004c6Schristos int n_ks_tuple,
45b9d004c6Schristos krb5_key_salt_tuple *ks_tuple,
46ca1c9b0cSelric const char *password)
47ca1c9b0cSelric {
48ca1c9b0cSelric kadm5_client_context *context = server_handle;
49ca1c9b0cSelric kadm5_ret_t ret;
50ca1c9b0cSelric krb5_storage *sp;
51ca1c9b0cSelric unsigned char buf[1024];
52ca1c9b0cSelric int32_t tmp;
53ca1c9b0cSelric krb5_data reply;
54ca1c9b0cSelric
55b9d004c6Schristos /*
56b9d004c6Schristos * We should get around to implementing this... At the moment, the
57b9d004c6Schristos * the server side API is implemented but the wire protocol has not
58b9d004c6Schristos * been updated.
59b9d004c6Schristos */
60b9d004c6Schristos if (n_ks_tuple > 0)
61b9d004c6Schristos return KADM5_KS_TUPLE_NOSUPP;
62b9d004c6Schristos
63ca1c9b0cSelric ret = _kadm5_connect(server_handle);
64ca1c9b0cSelric if(ret)
65ca1c9b0cSelric return ret;
66ca1c9b0cSelric
67ca1c9b0cSelric sp = krb5_storage_from_mem(buf, sizeof(buf));
68ca1c9b0cSelric if (sp == NULL) {
69ca1c9b0cSelric krb5_clear_error_message(context->context);
70ca1c9b0cSelric return ENOMEM;
71ca1c9b0cSelric }
72ca1c9b0cSelric krb5_store_int32(sp, kadm_chpass);
73ca1c9b0cSelric krb5_store_principal(sp, princ);
74ca1c9b0cSelric krb5_store_string(sp, password);
75b9d004c6Schristos krb5_store_int32(sp, keepold); /* extension */
76ca1c9b0cSelric ret = _kadm5_client_send(context, sp);
77ca1c9b0cSelric krb5_storage_free(sp);
78ca1c9b0cSelric if (ret)
79ca1c9b0cSelric return ret;
80ca1c9b0cSelric ret = _kadm5_client_recv(context, &reply);
81ca1c9b0cSelric if(ret)
82ca1c9b0cSelric return ret;
83ca1c9b0cSelric sp = krb5_storage_from_data (&reply);
84ca1c9b0cSelric if (sp == NULL) {
85ca1c9b0cSelric krb5_clear_error_message(context->context);
86ca1c9b0cSelric krb5_data_free (&reply);
87ca1c9b0cSelric return ENOMEM;
88ca1c9b0cSelric }
89ca1c9b0cSelric krb5_ret_int32(sp, &tmp);
90ca1c9b0cSelric krb5_clear_error_message(context->context);
91ca1c9b0cSelric krb5_storage_free(sp);
92ca1c9b0cSelric krb5_data_free (&reply);
93ca1c9b0cSelric return tmp;
94ca1c9b0cSelric }
95ca1c9b0cSelric
96ca1c9b0cSelric kadm5_ret_t
kadm5_c_chpass_principal_with_key(void * server_handle,krb5_principal princ,int keepold,int n_key_data,krb5_key_data * key_data)97ca1c9b0cSelric kadm5_c_chpass_principal_with_key(void *server_handle,
98ca1c9b0cSelric krb5_principal princ,
99b9d004c6Schristos int keepold,
100ca1c9b0cSelric int n_key_data,
101ca1c9b0cSelric krb5_key_data *key_data)
102ca1c9b0cSelric {
103ca1c9b0cSelric kadm5_client_context *context = server_handle;
104ca1c9b0cSelric kadm5_ret_t ret;
105ca1c9b0cSelric krb5_storage *sp;
106ca1c9b0cSelric unsigned char buf[1024];
107ca1c9b0cSelric int32_t tmp;
108ca1c9b0cSelric krb5_data reply;
109ca1c9b0cSelric int i;
110ca1c9b0cSelric
111ca1c9b0cSelric ret = _kadm5_connect(server_handle);
112ca1c9b0cSelric if(ret)
113ca1c9b0cSelric return ret;
114ca1c9b0cSelric
115ca1c9b0cSelric sp = krb5_storage_from_mem(buf, sizeof(buf));
116ca1c9b0cSelric if (sp == NULL) {
117ca1c9b0cSelric krb5_clear_error_message(context->context);
118ca1c9b0cSelric return ENOMEM;
119ca1c9b0cSelric }
120ca1c9b0cSelric krb5_store_int32(sp, kadm_chpass_with_key);
121ca1c9b0cSelric krb5_store_principal(sp, princ);
122ca1c9b0cSelric krb5_store_int32(sp, n_key_data);
123ca1c9b0cSelric for (i = 0; i < n_key_data; ++i)
124ca1c9b0cSelric kadm5_store_key_data (sp, &key_data[i]);
125b9d004c6Schristos krb5_store_int32(sp, keepold); /* extension */
126ca1c9b0cSelric ret = _kadm5_client_send(context, sp);
127ca1c9b0cSelric krb5_storage_free(sp);
128ca1c9b0cSelric if (ret)
129ca1c9b0cSelric return ret;
130ca1c9b0cSelric ret = _kadm5_client_recv(context, &reply);
131ca1c9b0cSelric if(ret)
132ca1c9b0cSelric return ret;
133ca1c9b0cSelric sp = krb5_storage_from_data (&reply);
134ca1c9b0cSelric if (sp == NULL) {
135ca1c9b0cSelric krb5_clear_error_message(context->context);
136ca1c9b0cSelric krb5_data_free (&reply);
137ca1c9b0cSelric return ENOMEM;
138ca1c9b0cSelric }
139ca1c9b0cSelric krb5_ret_int32(sp, &tmp);
140ca1c9b0cSelric krb5_clear_error_message(context->context);
141ca1c9b0cSelric krb5_storage_free(sp);
142ca1c9b0cSelric krb5_data_free (&reply);
143ca1c9b0cSelric return tmp;
144ca1c9b0cSelric }
145