1 /* $NetBSD: chpass_c.c,v 1.1.1.2 2014/04/24 12:45:48 pettai Exp $ */ 2 3 /* 4 * Copyright (c) 1997-2000, 2005-2006 Kungliga Tekniska Högskolan 5 * (Royal Institute of Technology, Stockholm, Sweden). 6 * All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 15 * 2. Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in the 17 * documentation and/or other materials provided with the distribution. 18 * 19 * 3. Neither the name of the Institute nor the names of its contributors 20 * may be used to endorse or promote products derived from this software 21 * without specific prior written permission. 22 * 23 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND 24 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 25 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 26 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE 27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 28 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 29 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 30 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 31 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 32 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 33 * SUCH DAMAGE. 34 */ 35 36 #include "kadm5_locl.h" 37 38 __RCSID("NetBSD"); 39 40 kadm5_ret_t 41 kadm5_c_chpass_principal(void *server_handle, 42 krb5_principal princ, 43 const char *password) 44 { 45 kadm5_client_context *context = server_handle; 46 kadm5_ret_t ret; 47 krb5_storage *sp; 48 unsigned char buf[1024]; 49 int32_t tmp; 50 krb5_data reply; 51 52 ret = _kadm5_connect(server_handle); 53 if(ret) 54 return ret; 55 56 sp = krb5_storage_from_mem(buf, sizeof(buf)); 57 if (sp == NULL) { 58 krb5_clear_error_message(context->context); 59 return ENOMEM; 60 } 61 krb5_store_int32(sp, kadm_chpass); 62 krb5_store_principal(sp, princ); 63 krb5_store_string(sp, password); 64 ret = _kadm5_client_send(context, sp); 65 krb5_storage_free(sp); 66 if (ret) 67 return ret; 68 ret = _kadm5_client_recv(context, &reply); 69 if(ret) 70 return ret; 71 sp = krb5_storage_from_data (&reply); 72 if (sp == NULL) { 73 krb5_clear_error_message(context->context); 74 krb5_data_free (&reply); 75 return ENOMEM; 76 } 77 krb5_ret_int32(sp, &tmp); 78 krb5_clear_error_message(context->context); 79 krb5_storage_free(sp); 80 krb5_data_free (&reply); 81 return tmp; 82 } 83 84 kadm5_ret_t 85 kadm5_c_chpass_principal_with_key(void *server_handle, 86 krb5_principal princ, 87 int n_key_data, 88 krb5_key_data *key_data) 89 { 90 kadm5_client_context *context = server_handle; 91 kadm5_ret_t ret; 92 krb5_storage *sp; 93 unsigned char buf[1024]; 94 int32_t tmp; 95 krb5_data reply; 96 int i; 97 98 ret = _kadm5_connect(server_handle); 99 if(ret) 100 return ret; 101 102 sp = krb5_storage_from_mem(buf, sizeof(buf)); 103 if (sp == NULL) { 104 krb5_clear_error_message(context->context); 105 return ENOMEM; 106 } 107 krb5_store_int32(sp, kadm_chpass_with_key); 108 krb5_store_principal(sp, princ); 109 krb5_store_int32(sp, n_key_data); 110 for (i = 0; i < n_key_data; ++i) 111 kadm5_store_key_data (sp, &key_data[i]); 112 ret = _kadm5_client_send(context, sp); 113 krb5_storage_free(sp); 114 if (ret) 115 return ret; 116 ret = _kadm5_client_recv(context, &reply); 117 if(ret) 118 return ret; 119 sp = krb5_storage_from_data (&reply); 120 if (sp == NULL) { 121 krb5_clear_error_message(context->context); 122 krb5_data_free (&reply); 123 return ENOMEM; 124 } 125 krb5_ret_int32(sp, &tmp); 126 krb5_clear_error_message(context->context); 127 krb5_storage_free(sp); 128 krb5_data_free (&reply); 129 return tmp; 130 } 131