1*241bea01Schristos /* $NetBSD: init_s.c,v 1.3 2019/12/15 22:50:50 christos Exp $ */
2ca1c9b0cSelric
3ca1c9b0cSelric /*
4ca1c9b0cSelric * Copyright (c) 1997 - 2000 Kungliga Tekniska Högskolan
5ca1c9b0cSelric * (Royal Institute of Technology, Stockholm, Sweden).
6ca1c9b0cSelric * All rights reserved.
7ca1c9b0cSelric *
8ca1c9b0cSelric * Redistribution and use in source and binary forms, with or without
9ca1c9b0cSelric * modification, are permitted provided that the following conditions
10ca1c9b0cSelric * are met:
11ca1c9b0cSelric *
12ca1c9b0cSelric * 1. Redistributions of source code must retain the above copyright
13ca1c9b0cSelric * notice, this list of conditions and the following disclaimer.
14ca1c9b0cSelric *
15ca1c9b0cSelric * 2. Redistributions in binary form must reproduce the above copyright
16ca1c9b0cSelric * notice, this list of conditions and the following disclaimer in the
17ca1c9b0cSelric * documentation and/or other materials provided with the distribution.
18ca1c9b0cSelric *
19ca1c9b0cSelric * 3. Neither the name of the Institute nor the names of its contributors
20ca1c9b0cSelric * may be used to endorse or promote products derived from this software
21ca1c9b0cSelric * without specific prior written permission.
22ca1c9b0cSelric *
23ca1c9b0cSelric * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
24ca1c9b0cSelric * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25ca1c9b0cSelric * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26ca1c9b0cSelric * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
27ca1c9b0cSelric * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28ca1c9b0cSelric * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29ca1c9b0cSelric * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30ca1c9b0cSelric * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31ca1c9b0cSelric * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32ca1c9b0cSelric * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33ca1c9b0cSelric * SUCH DAMAGE.
34ca1c9b0cSelric */
35ca1c9b0cSelric
36ca1c9b0cSelric #include "kadm5_locl.h"
37b9d004c6Schristos #include <fcntl.h>
38ca1c9b0cSelric
39ca1c9b0cSelric
40ca1c9b0cSelric static kadm5_ret_t
kadm5_s_init_with_context(krb5_context context,const char * client_name,const char * service_name,kadm5_config_params * realm_params,unsigned long struct_version,unsigned long api_version,void ** server_handle)41ca1c9b0cSelric kadm5_s_init_with_context(krb5_context context,
42ca1c9b0cSelric const char *client_name,
43ca1c9b0cSelric const char *service_name,
44ca1c9b0cSelric kadm5_config_params *realm_params,
45ca1c9b0cSelric unsigned long struct_version,
46ca1c9b0cSelric unsigned long api_version,
47ca1c9b0cSelric void **server_handle)
48ca1c9b0cSelric {
49ca1c9b0cSelric kadm5_ret_t ret;
50ca1c9b0cSelric kadm5_server_context *ctx;
51b9d004c6Schristos char *dbname;
52b9d004c6Schristos char *stash_file;
53b9d004c6Schristos
54b9d004c6Schristos *server_handle = NULL;
55ca1c9b0cSelric ret = _kadm5_s_init_context(&ctx, realm_params, context);
56ca1c9b0cSelric if (ret)
57ca1c9b0cSelric return ret;
58ca1c9b0cSelric
59b9d004c6Schristos if (realm_params->mask & KADM5_CONFIG_DBNAME)
60b9d004c6Schristos dbname = realm_params->dbname;
61b9d004c6Schristos else
62b9d004c6Schristos dbname = ctx->config.dbname;
63b9d004c6Schristos
64b9d004c6Schristos if (realm_params->mask & KADM5_CONFIG_STASH_FILE)
65b9d004c6Schristos stash_file = realm_params->stash_file;
66b9d004c6Schristos else
67b9d004c6Schristos stash_file = ctx->config.stash_file;
68b9d004c6Schristos
69b9d004c6Schristos assert(dbname != NULL);
70b9d004c6Schristos assert(stash_file != NULL);
71ca1c9b0cSelric assert(ctx->config.acl_file != NULL);
72ca1c9b0cSelric assert(ctx->log_context.log_file != NULL);
73ca1c9b0cSelric #ifndef NO_UNIX_SOCKETS
74ca1c9b0cSelric assert(ctx->log_context.socket_name.sun_path[0] != '\0');
75ca1c9b0cSelric #else
76ca1c9b0cSelric assert(ctx->log_context.socket_info != NULL);
77ca1c9b0cSelric #endif
78ca1c9b0cSelric
79b9d004c6Schristos ret = hdb_create(ctx->context, &ctx->db, dbname);
80b9d004c6Schristos if (ret == 0)
81ca1c9b0cSelric ret = hdb_set_master_keyfile(ctx->context,
82b9d004c6Schristos ctx->db, stash_file);
83b9d004c6Schristos if (ret) {
84b9d004c6Schristos kadm5_s_destroy(ctx);
85ca1c9b0cSelric return ret;
86b9d004c6Schristos }
87ca1c9b0cSelric
88ca1c9b0cSelric ctx->log_context.log_fd = -1;
89ca1c9b0cSelric
90ca1c9b0cSelric #ifndef NO_UNIX_SOCKETS
91ca1c9b0cSelric ctx->log_context.socket_fd = socket(AF_UNIX, SOCK_DGRAM, 0);
92ca1c9b0cSelric #else
93ca1c9b0cSelric ctx->log_context.socket_fd = socket(ctx->log_context.socket_info->ai_family,
94ca1c9b0cSelric ctx->log_context.socket_info->ai_socktype,
95ca1c9b0cSelric ctx->log_context.socket_info->ai_protocol);
96ca1c9b0cSelric #endif
97ca1c9b0cSelric
98b9d004c6Schristos if (ctx->log_context.socket_fd != rk_INVALID_SOCKET)
99b9d004c6Schristos socket_set_nonblocking(ctx->log_context.socket_fd, 1);
100ca1c9b0cSelric
101b9d004c6Schristos ret = krb5_parse_name(ctx->context, client_name, &ctx->caller);
102b9d004c6Schristos if (ret == 0)
103ca1c9b0cSelric ret = _kadm5_acl_init(ctx);
104ca1c9b0cSelric if (ret)
105b9d004c6Schristos kadm5_s_destroy(ctx);
106b9d004c6Schristos else
107ca1c9b0cSelric *server_handle = ctx;
108*241bea01Schristos return ret;
109ca1c9b0cSelric }
110ca1c9b0cSelric
111ca1c9b0cSelric kadm5_ret_t
kadm5_s_init_with_password_ctx(krb5_context context,const char * client_name,const char * password,const char * service_name,kadm5_config_params * realm_params,unsigned long struct_version,unsigned long api_version,void ** server_handle)112ca1c9b0cSelric kadm5_s_init_with_password_ctx(krb5_context context,
113ca1c9b0cSelric const char *client_name,
114ca1c9b0cSelric const char *password,
115ca1c9b0cSelric const char *service_name,
116ca1c9b0cSelric kadm5_config_params *realm_params,
117ca1c9b0cSelric unsigned long struct_version,
118ca1c9b0cSelric unsigned long api_version,
119ca1c9b0cSelric void **server_handle)
120ca1c9b0cSelric {
121ca1c9b0cSelric return kadm5_s_init_with_context(context,
122ca1c9b0cSelric client_name,
123ca1c9b0cSelric service_name,
124ca1c9b0cSelric realm_params,
125ca1c9b0cSelric struct_version,
126ca1c9b0cSelric api_version,
127ca1c9b0cSelric server_handle);
128ca1c9b0cSelric }
129ca1c9b0cSelric
130ca1c9b0cSelric kadm5_ret_t
kadm5_s_init_with_password(const char * client_name,const char * password,const char * service_name,kadm5_config_params * realm_params,unsigned long struct_version,unsigned long api_version,void ** server_handle)131ca1c9b0cSelric kadm5_s_init_with_password(const char *client_name,
132ca1c9b0cSelric const char *password,
133ca1c9b0cSelric const char *service_name,
134ca1c9b0cSelric kadm5_config_params *realm_params,
135ca1c9b0cSelric unsigned long struct_version,
136ca1c9b0cSelric unsigned long api_version,
137ca1c9b0cSelric void **server_handle)
138ca1c9b0cSelric {
139ca1c9b0cSelric krb5_context context;
140ca1c9b0cSelric kadm5_ret_t ret;
141ca1c9b0cSelric kadm5_server_context *ctx;
142ca1c9b0cSelric
143ca1c9b0cSelric ret = krb5_init_context(&context);
144ca1c9b0cSelric if (ret)
145ca1c9b0cSelric return ret;
146ca1c9b0cSelric ret = kadm5_s_init_with_password_ctx(context,
147ca1c9b0cSelric client_name,
148ca1c9b0cSelric password,
149ca1c9b0cSelric service_name,
150ca1c9b0cSelric realm_params,
151ca1c9b0cSelric struct_version,
152ca1c9b0cSelric api_version,
153ca1c9b0cSelric server_handle);
154ca1c9b0cSelric if(ret){
155ca1c9b0cSelric krb5_free_context(context);
156ca1c9b0cSelric return ret;
157ca1c9b0cSelric }
158ca1c9b0cSelric ctx = *server_handle;
159ca1c9b0cSelric ctx->my_context = 1;
160ca1c9b0cSelric return 0;
161ca1c9b0cSelric }
162ca1c9b0cSelric
163ca1c9b0cSelric kadm5_ret_t
kadm5_s_init_with_skey_ctx(krb5_context context,const char * client_name,const char * keytab,const char * service_name,kadm5_config_params * realm_params,unsigned long struct_version,unsigned long api_version,void ** server_handle)164ca1c9b0cSelric kadm5_s_init_with_skey_ctx(krb5_context context,
165ca1c9b0cSelric const char *client_name,
166ca1c9b0cSelric const char *keytab,
167ca1c9b0cSelric const char *service_name,
168ca1c9b0cSelric kadm5_config_params *realm_params,
169ca1c9b0cSelric unsigned long struct_version,
170ca1c9b0cSelric unsigned long api_version,
171ca1c9b0cSelric void **server_handle)
172ca1c9b0cSelric {
173ca1c9b0cSelric return kadm5_s_init_with_context(context,
174ca1c9b0cSelric client_name,
175ca1c9b0cSelric service_name,
176ca1c9b0cSelric realm_params,
177ca1c9b0cSelric struct_version,
178ca1c9b0cSelric api_version,
179ca1c9b0cSelric server_handle);
180ca1c9b0cSelric }
181ca1c9b0cSelric
182ca1c9b0cSelric kadm5_ret_t
kadm5_s_init_with_skey(const char * client_name,const char * keytab,const char * service_name,kadm5_config_params * realm_params,unsigned long struct_version,unsigned long api_version,void ** server_handle)183ca1c9b0cSelric kadm5_s_init_with_skey(const char *client_name,
184ca1c9b0cSelric const char *keytab,
185ca1c9b0cSelric const char *service_name,
186ca1c9b0cSelric kadm5_config_params *realm_params,
187ca1c9b0cSelric unsigned long struct_version,
188ca1c9b0cSelric unsigned long api_version,
189ca1c9b0cSelric void **server_handle)
190ca1c9b0cSelric {
191ca1c9b0cSelric krb5_context context;
192ca1c9b0cSelric kadm5_ret_t ret;
193ca1c9b0cSelric kadm5_server_context *ctx;
194ca1c9b0cSelric
195ca1c9b0cSelric ret = krb5_init_context(&context);
196ca1c9b0cSelric if (ret)
197ca1c9b0cSelric return ret;
198ca1c9b0cSelric ret = kadm5_s_init_with_skey_ctx(context,
199ca1c9b0cSelric client_name,
200ca1c9b0cSelric keytab,
201ca1c9b0cSelric service_name,
202ca1c9b0cSelric realm_params,
203ca1c9b0cSelric struct_version,
204ca1c9b0cSelric api_version,
205ca1c9b0cSelric server_handle);
206ca1c9b0cSelric if(ret){
207ca1c9b0cSelric krb5_free_context(context);
208ca1c9b0cSelric return ret;
209ca1c9b0cSelric }
210ca1c9b0cSelric ctx = *server_handle;
211ca1c9b0cSelric ctx->my_context = 1;
212ca1c9b0cSelric return 0;
213ca1c9b0cSelric }
214ca1c9b0cSelric
215ca1c9b0cSelric kadm5_ret_t
kadm5_s_init_with_creds_ctx(krb5_context context,const char * client_name,krb5_ccache ccache,const char * service_name,kadm5_config_params * realm_params,unsigned long struct_version,unsigned long api_version,void ** server_handle)216ca1c9b0cSelric kadm5_s_init_with_creds_ctx(krb5_context context,
217ca1c9b0cSelric const char *client_name,
218ca1c9b0cSelric krb5_ccache ccache,
219ca1c9b0cSelric const char *service_name,
220ca1c9b0cSelric kadm5_config_params *realm_params,
221ca1c9b0cSelric unsigned long struct_version,
222ca1c9b0cSelric unsigned long api_version,
223ca1c9b0cSelric void **server_handle)
224ca1c9b0cSelric {
225ca1c9b0cSelric return kadm5_s_init_with_context(context,
226ca1c9b0cSelric client_name,
227ca1c9b0cSelric service_name,
228ca1c9b0cSelric realm_params,
229ca1c9b0cSelric struct_version,
230ca1c9b0cSelric api_version,
231ca1c9b0cSelric server_handle);
232ca1c9b0cSelric }
233ca1c9b0cSelric
234ca1c9b0cSelric kadm5_ret_t
kadm5_s_init_with_creds(const char * client_name,krb5_ccache ccache,const char * service_name,kadm5_config_params * realm_params,unsigned long struct_version,unsigned long api_version,void ** server_handle)235ca1c9b0cSelric kadm5_s_init_with_creds(const char *client_name,
236ca1c9b0cSelric krb5_ccache ccache,
237ca1c9b0cSelric const char *service_name,
238ca1c9b0cSelric kadm5_config_params *realm_params,
239ca1c9b0cSelric unsigned long struct_version,
240ca1c9b0cSelric unsigned long api_version,
241ca1c9b0cSelric void **server_handle)
242ca1c9b0cSelric {
243ca1c9b0cSelric krb5_context context;
244ca1c9b0cSelric kadm5_ret_t ret;
245ca1c9b0cSelric kadm5_server_context *ctx;
246ca1c9b0cSelric
247ca1c9b0cSelric ret = krb5_init_context(&context);
248ca1c9b0cSelric if (ret)
249ca1c9b0cSelric return ret;
250ca1c9b0cSelric ret = kadm5_s_init_with_creds_ctx(context,
251ca1c9b0cSelric client_name,
252ca1c9b0cSelric ccache,
253ca1c9b0cSelric service_name,
254ca1c9b0cSelric realm_params,
255ca1c9b0cSelric struct_version,
256ca1c9b0cSelric api_version,
257ca1c9b0cSelric server_handle);
258ca1c9b0cSelric if(ret){
259ca1c9b0cSelric krb5_free_context(context);
260ca1c9b0cSelric return ret;
261ca1c9b0cSelric }
262ca1c9b0cSelric ctx = *server_handle;
263ca1c9b0cSelric ctx->my_context = 1;
264ca1c9b0cSelric return 0;
265ca1c9b0cSelric }
266