xref: /netbsd-src/crypto/external/bsd/heimdal/dist/lib/kadm5/init_s.c (revision 241bea01a19bbb306af27777a870b86d41cb3fda)
1*241bea01Schristos /*	$NetBSD: init_s.c,v 1.3 2019/12/15 22:50:50 christos Exp $	*/
2ca1c9b0cSelric 
3ca1c9b0cSelric /*
4ca1c9b0cSelric  * Copyright (c) 1997 - 2000 Kungliga Tekniska Högskolan
5ca1c9b0cSelric  * (Royal Institute of Technology, Stockholm, Sweden).
6ca1c9b0cSelric  * All rights reserved.
7ca1c9b0cSelric  *
8ca1c9b0cSelric  * Redistribution and use in source and binary forms, with or without
9ca1c9b0cSelric  * modification, are permitted provided that the following conditions
10ca1c9b0cSelric  * are met:
11ca1c9b0cSelric  *
12ca1c9b0cSelric  * 1. Redistributions of source code must retain the above copyright
13ca1c9b0cSelric  *    notice, this list of conditions and the following disclaimer.
14ca1c9b0cSelric  *
15ca1c9b0cSelric  * 2. Redistributions in binary form must reproduce the above copyright
16ca1c9b0cSelric  *    notice, this list of conditions and the following disclaimer in the
17ca1c9b0cSelric  *    documentation and/or other materials provided with the distribution.
18ca1c9b0cSelric  *
19ca1c9b0cSelric  * 3. Neither the name of the Institute nor the names of its contributors
20ca1c9b0cSelric  *    may be used to endorse or promote products derived from this software
21ca1c9b0cSelric  *    without specific prior written permission.
22ca1c9b0cSelric  *
23ca1c9b0cSelric  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
24ca1c9b0cSelric  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25ca1c9b0cSelric  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26ca1c9b0cSelric  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
27ca1c9b0cSelric  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28ca1c9b0cSelric  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29ca1c9b0cSelric  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30ca1c9b0cSelric  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31ca1c9b0cSelric  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32ca1c9b0cSelric  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33ca1c9b0cSelric  * SUCH DAMAGE.
34ca1c9b0cSelric  */
35ca1c9b0cSelric 
36ca1c9b0cSelric #include "kadm5_locl.h"
37b9d004c6Schristos #include <fcntl.h>
38ca1c9b0cSelric 
39ca1c9b0cSelric 
40ca1c9b0cSelric static kadm5_ret_t
kadm5_s_init_with_context(krb5_context context,const char * client_name,const char * service_name,kadm5_config_params * realm_params,unsigned long struct_version,unsigned long api_version,void ** server_handle)41ca1c9b0cSelric kadm5_s_init_with_context(krb5_context context,
42ca1c9b0cSelric 			  const char *client_name,
43ca1c9b0cSelric 			  const char *service_name,
44ca1c9b0cSelric 			  kadm5_config_params *realm_params,
45ca1c9b0cSelric 			  unsigned long struct_version,
46ca1c9b0cSelric 			  unsigned long api_version,
47ca1c9b0cSelric 			  void **server_handle)
48ca1c9b0cSelric {
49ca1c9b0cSelric     kadm5_ret_t ret;
50ca1c9b0cSelric     kadm5_server_context *ctx;
51b9d004c6Schristos     char *dbname;
52b9d004c6Schristos     char *stash_file;
53b9d004c6Schristos 
54b9d004c6Schristos     *server_handle = NULL;
55ca1c9b0cSelric     ret = _kadm5_s_init_context(&ctx, realm_params, context);
56ca1c9b0cSelric     if (ret)
57ca1c9b0cSelric 	return ret;
58ca1c9b0cSelric 
59b9d004c6Schristos     if (realm_params->mask & KADM5_CONFIG_DBNAME)
60b9d004c6Schristos 	dbname = realm_params->dbname;
61b9d004c6Schristos     else
62b9d004c6Schristos 	dbname = ctx->config.dbname;
63b9d004c6Schristos 
64b9d004c6Schristos     if (realm_params->mask & KADM5_CONFIG_STASH_FILE)
65b9d004c6Schristos 	stash_file = realm_params->stash_file;
66b9d004c6Schristos     else
67b9d004c6Schristos 	stash_file = ctx->config.stash_file;
68b9d004c6Schristos 
69b9d004c6Schristos     assert(dbname != NULL);
70b9d004c6Schristos     assert(stash_file != NULL);
71ca1c9b0cSelric     assert(ctx->config.acl_file != NULL);
72ca1c9b0cSelric     assert(ctx->log_context.log_file != NULL);
73ca1c9b0cSelric #ifndef NO_UNIX_SOCKETS
74ca1c9b0cSelric     assert(ctx->log_context.socket_name.sun_path[0] != '\0');
75ca1c9b0cSelric #else
76ca1c9b0cSelric     assert(ctx->log_context.socket_info != NULL);
77ca1c9b0cSelric #endif
78ca1c9b0cSelric 
79b9d004c6Schristos     ret = hdb_create(ctx->context, &ctx->db, dbname);
80b9d004c6Schristos     if (ret == 0)
81ca1c9b0cSelric         ret = hdb_set_master_keyfile(ctx->context,
82b9d004c6Schristos                                      ctx->db, stash_file);
83b9d004c6Schristos     if (ret) {
84b9d004c6Schristos         kadm5_s_destroy(ctx);
85ca1c9b0cSelric 	return ret;
86b9d004c6Schristos     }
87ca1c9b0cSelric 
88ca1c9b0cSelric     ctx->log_context.log_fd = -1;
89ca1c9b0cSelric 
90ca1c9b0cSelric #ifndef NO_UNIX_SOCKETS
91ca1c9b0cSelric     ctx->log_context.socket_fd = socket(AF_UNIX, SOCK_DGRAM, 0);
92ca1c9b0cSelric #else
93ca1c9b0cSelric     ctx->log_context.socket_fd = socket(ctx->log_context.socket_info->ai_family,
94ca1c9b0cSelric 					ctx->log_context.socket_info->ai_socktype,
95ca1c9b0cSelric 					ctx->log_context.socket_info->ai_protocol);
96ca1c9b0cSelric #endif
97ca1c9b0cSelric 
98b9d004c6Schristos     if (ctx->log_context.socket_fd != rk_INVALID_SOCKET)
99b9d004c6Schristos         socket_set_nonblocking(ctx->log_context.socket_fd, 1);
100ca1c9b0cSelric 
101b9d004c6Schristos     ret = krb5_parse_name(ctx->context, client_name, &ctx->caller);
102b9d004c6Schristos     if (ret == 0)
103ca1c9b0cSelric         ret = _kadm5_acl_init(ctx);
104ca1c9b0cSelric     if (ret)
105b9d004c6Schristos         kadm5_s_destroy(ctx);
106b9d004c6Schristos     else
107ca1c9b0cSelric         *server_handle = ctx;
108*241bea01Schristos     return ret;
109ca1c9b0cSelric }
110ca1c9b0cSelric 
111ca1c9b0cSelric kadm5_ret_t
kadm5_s_init_with_password_ctx(krb5_context context,const char * client_name,const char * password,const char * service_name,kadm5_config_params * realm_params,unsigned long struct_version,unsigned long api_version,void ** server_handle)112ca1c9b0cSelric kadm5_s_init_with_password_ctx(krb5_context context,
113ca1c9b0cSelric 			       const char *client_name,
114ca1c9b0cSelric 			       const char *password,
115ca1c9b0cSelric 			       const char *service_name,
116ca1c9b0cSelric 			       kadm5_config_params *realm_params,
117ca1c9b0cSelric 			       unsigned long struct_version,
118ca1c9b0cSelric 			       unsigned long api_version,
119ca1c9b0cSelric 			       void **server_handle)
120ca1c9b0cSelric {
121ca1c9b0cSelric     return kadm5_s_init_with_context(context,
122ca1c9b0cSelric 				     client_name,
123ca1c9b0cSelric 				     service_name,
124ca1c9b0cSelric 				     realm_params,
125ca1c9b0cSelric 				     struct_version,
126ca1c9b0cSelric 				     api_version,
127ca1c9b0cSelric 				     server_handle);
128ca1c9b0cSelric }
129ca1c9b0cSelric 
130ca1c9b0cSelric kadm5_ret_t
kadm5_s_init_with_password(const char * client_name,const char * password,const char * service_name,kadm5_config_params * realm_params,unsigned long struct_version,unsigned long api_version,void ** server_handle)131ca1c9b0cSelric kadm5_s_init_with_password(const char *client_name,
132ca1c9b0cSelric 			   const char *password,
133ca1c9b0cSelric 			   const char *service_name,
134ca1c9b0cSelric 			   kadm5_config_params *realm_params,
135ca1c9b0cSelric 			   unsigned long struct_version,
136ca1c9b0cSelric 			   unsigned long api_version,
137ca1c9b0cSelric 			   void **server_handle)
138ca1c9b0cSelric {
139ca1c9b0cSelric     krb5_context context;
140ca1c9b0cSelric     kadm5_ret_t ret;
141ca1c9b0cSelric     kadm5_server_context *ctx;
142ca1c9b0cSelric 
143ca1c9b0cSelric     ret = krb5_init_context(&context);
144ca1c9b0cSelric     if (ret)
145ca1c9b0cSelric 	return ret;
146ca1c9b0cSelric     ret = kadm5_s_init_with_password_ctx(context,
147ca1c9b0cSelric 					 client_name,
148ca1c9b0cSelric 					 password,
149ca1c9b0cSelric 					 service_name,
150ca1c9b0cSelric 					 realm_params,
151ca1c9b0cSelric 					 struct_version,
152ca1c9b0cSelric 					 api_version,
153ca1c9b0cSelric 					 server_handle);
154ca1c9b0cSelric     if(ret){
155ca1c9b0cSelric 	krb5_free_context(context);
156ca1c9b0cSelric 	return ret;
157ca1c9b0cSelric     }
158ca1c9b0cSelric     ctx = *server_handle;
159ca1c9b0cSelric     ctx->my_context = 1;
160ca1c9b0cSelric     return 0;
161ca1c9b0cSelric }
162ca1c9b0cSelric 
163ca1c9b0cSelric kadm5_ret_t
kadm5_s_init_with_skey_ctx(krb5_context context,const char * client_name,const char * keytab,const char * service_name,kadm5_config_params * realm_params,unsigned long struct_version,unsigned long api_version,void ** server_handle)164ca1c9b0cSelric kadm5_s_init_with_skey_ctx(krb5_context context,
165ca1c9b0cSelric 			   const char *client_name,
166ca1c9b0cSelric 			   const char *keytab,
167ca1c9b0cSelric 			   const char *service_name,
168ca1c9b0cSelric 			   kadm5_config_params *realm_params,
169ca1c9b0cSelric 			   unsigned long struct_version,
170ca1c9b0cSelric 			   unsigned long api_version,
171ca1c9b0cSelric 			   void **server_handle)
172ca1c9b0cSelric {
173ca1c9b0cSelric     return kadm5_s_init_with_context(context,
174ca1c9b0cSelric 				     client_name,
175ca1c9b0cSelric 				     service_name,
176ca1c9b0cSelric 				     realm_params,
177ca1c9b0cSelric 				     struct_version,
178ca1c9b0cSelric 				     api_version,
179ca1c9b0cSelric 				     server_handle);
180ca1c9b0cSelric }
181ca1c9b0cSelric 
182ca1c9b0cSelric kadm5_ret_t
kadm5_s_init_with_skey(const char * client_name,const char * keytab,const char * service_name,kadm5_config_params * realm_params,unsigned long struct_version,unsigned long api_version,void ** server_handle)183ca1c9b0cSelric kadm5_s_init_with_skey(const char *client_name,
184ca1c9b0cSelric 		       const char *keytab,
185ca1c9b0cSelric 		       const char *service_name,
186ca1c9b0cSelric 		       kadm5_config_params *realm_params,
187ca1c9b0cSelric 		       unsigned long struct_version,
188ca1c9b0cSelric 		       unsigned long api_version,
189ca1c9b0cSelric 		       void **server_handle)
190ca1c9b0cSelric {
191ca1c9b0cSelric     krb5_context context;
192ca1c9b0cSelric     kadm5_ret_t ret;
193ca1c9b0cSelric     kadm5_server_context *ctx;
194ca1c9b0cSelric 
195ca1c9b0cSelric     ret = krb5_init_context(&context);
196ca1c9b0cSelric     if (ret)
197ca1c9b0cSelric 	return ret;
198ca1c9b0cSelric     ret = kadm5_s_init_with_skey_ctx(context,
199ca1c9b0cSelric 				     client_name,
200ca1c9b0cSelric 				     keytab,
201ca1c9b0cSelric 				     service_name,
202ca1c9b0cSelric 				     realm_params,
203ca1c9b0cSelric 				     struct_version,
204ca1c9b0cSelric 				     api_version,
205ca1c9b0cSelric 				     server_handle);
206ca1c9b0cSelric     if(ret){
207ca1c9b0cSelric 	krb5_free_context(context);
208ca1c9b0cSelric 	return ret;
209ca1c9b0cSelric     }
210ca1c9b0cSelric     ctx = *server_handle;
211ca1c9b0cSelric     ctx->my_context = 1;
212ca1c9b0cSelric     return 0;
213ca1c9b0cSelric }
214ca1c9b0cSelric 
215ca1c9b0cSelric kadm5_ret_t
kadm5_s_init_with_creds_ctx(krb5_context context,const char * client_name,krb5_ccache ccache,const char * service_name,kadm5_config_params * realm_params,unsigned long struct_version,unsigned long api_version,void ** server_handle)216ca1c9b0cSelric kadm5_s_init_with_creds_ctx(krb5_context context,
217ca1c9b0cSelric 			    const char *client_name,
218ca1c9b0cSelric 			    krb5_ccache ccache,
219ca1c9b0cSelric 			    const char *service_name,
220ca1c9b0cSelric 			    kadm5_config_params *realm_params,
221ca1c9b0cSelric 			    unsigned long struct_version,
222ca1c9b0cSelric 			    unsigned long api_version,
223ca1c9b0cSelric 			    void **server_handle)
224ca1c9b0cSelric {
225ca1c9b0cSelric     return kadm5_s_init_with_context(context,
226ca1c9b0cSelric 				     client_name,
227ca1c9b0cSelric 				     service_name,
228ca1c9b0cSelric 				     realm_params,
229ca1c9b0cSelric 				     struct_version,
230ca1c9b0cSelric 				     api_version,
231ca1c9b0cSelric 				     server_handle);
232ca1c9b0cSelric }
233ca1c9b0cSelric 
234ca1c9b0cSelric kadm5_ret_t
kadm5_s_init_with_creds(const char * client_name,krb5_ccache ccache,const char * service_name,kadm5_config_params * realm_params,unsigned long struct_version,unsigned long api_version,void ** server_handle)235ca1c9b0cSelric kadm5_s_init_with_creds(const char *client_name,
236ca1c9b0cSelric 			krb5_ccache ccache,
237ca1c9b0cSelric 			const char *service_name,
238ca1c9b0cSelric 			kadm5_config_params *realm_params,
239ca1c9b0cSelric 			unsigned long struct_version,
240ca1c9b0cSelric 			unsigned long api_version,
241ca1c9b0cSelric 			void **server_handle)
242ca1c9b0cSelric {
243ca1c9b0cSelric     krb5_context context;
244ca1c9b0cSelric     kadm5_ret_t ret;
245ca1c9b0cSelric     kadm5_server_context *ctx;
246ca1c9b0cSelric 
247ca1c9b0cSelric     ret = krb5_init_context(&context);
248ca1c9b0cSelric     if (ret)
249ca1c9b0cSelric 	return ret;
250ca1c9b0cSelric     ret = kadm5_s_init_with_creds_ctx(context,
251ca1c9b0cSelric 				      client_name,
252ca1c9b0cSelric 				      ccache,
253ca1c9b0cSelric 				      service_name,
254ca1c9b0cSelric 				      realm_params,
255ca1c9b0cSelric 				      struct_version,
256ca1c9b0cSelric 				      api_version,
257ca1c9b0cSelric 				      server_handle);
258ca1c9b0cSelric     if(ret){
259ca1c9b0cSelric 	krb5_free_context(context);
260ca1c9b0cSelric 	return ret;
261ca1c9b0cSelric     }
262ca1c9b0cSelric     ctx = *server_handle;
263ca1c9b0cSelric     ctx->my_context = 1;
264ca1c9b0cSelric     return 0;
265ca1c9b0cSelric }
266