1 /* $NetBSD: modify_s.c,v 1.2 2017/01/28 21:31:49 christos Exp $ */ 2 3 /* 4 * Copyright (c) 1997-2001, 2003, 2005-2006 Kungliga Tekniska Högskolan 5 * (Royal Institute of Technology, Stockholm, Sweden). 6 * All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 15 * 2. Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in the 17 * documentation and/or other materials provided with the distribution. 18 * 19 * 3. Neither the name of the Institute nor the names of its contributors 20 * may be used to endorse or promote products derived from this software 21 * without specific prior written permission. 22 * 23 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND 24 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 25 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 26 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE 27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 28 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 29 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 30 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 31 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 32 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 33 * SUCH DAMAGE. 34 */ 35 36 #include "kadm5_locl.h" 37 38 __RCSID("$NetBSD: modify_s.c,v 1.2 2017/01/28 21:31:49 christos Exp $"); 39 40 static kadm5_ret_t 41 modify_principal(void *server_handle, 42 kadm5_principal_ent_t princ, 43 uint32_t mask, 44 uint32_t forbidden_mask) 45 { 46 kadm5_server_context *context = server_handle; 47 hdb_entry_ex ent; 48 kadm5_ret_t ret; 49 50 memset(&ent, 0, sizeof(ent)); 51 52 if((mask & forbidden_mask)) 53 return KADM5_BAD_MASK; 54 if((mask & KADM5_POLICY) && strcmp(princ->policy, "default")) 55 return KADM5_UNK_POLICY; 56 57 if (!context->keep_open) { 58 ret = context->db->hdb_open(context->context, context->db, O_RDWR, 0); 59 if(ret) 60 return ret; 61 } 62 63 ret = kadm5_log_init(context); 64 if (ret) 65 goto out; 66 67 ret = context->db->hdb_fetch_kvno(context->context, context->db, 68 princ->principal, HDB_F_GET_ANY|HDB_F_ADMIN_DATA, 0, &ent); 69 if (ret) 70 goto out2; 71 ret = _kadm5_setup_entry(context, &ent, mask, princ, mask, NULL, 0); 72 if (ret) 73 goto out3; 74 ret = _kadm5_set_modifier(context, &ent.entry); 75 if (ret) 76 goto out3; 77 78 /* 79 * If any keys are bogus, disallow the modify. If the keys were 80 * bogus as stored in the HDB we could allow those through, but 81 * distinguishing that case from a pre-1.6 client using add_enctype 82 * without the get-keys privilege requires more work (mainly: checking that 83 * the bogus keys in princ->key_data[] have corresponding bogus keys in ent 84 * before calling _kadm5_setup_entry()). 85 */ 86 if ((mask & KADM5_KEY_DATA) && 87 kadm5_some_keys_are_bogus(princ->n_key_data, princ->key_data)) { 88 ret = KADM5_AUTH_GET_KEYS; /* Not quite appropriate, but it'll do */ 89 goto out3; 90 } 91 92 ret = hdb_seal_keys(context->context, context->db, &ent.entry); 93 if (ret) 94 goto out3; 95 96 if ((mask & KADM5_POLICY)) { 97 HDB_extension ext; 98 99 memset(&ext, 0, sizeof(ext)); 100 /* XXX should be TRUE, but we don't yet support policies */ 101 ext.mandatory = FALSE; 102 ext.data.element = choice_HDB_extension_data_policy; 103 ext.data.u.policy = strdup(princ->policy); 104 if (ext.data.u.policy == NULL) { 105 ret = ENOMEM; 106 goto out3; 107 } 108 /* This calls free_HDB_extension(), freeing ext.data.u.policy */ 109 ret = hdb_replace_extension(context->context, &ent.entry, &ext); 110 free(ext.data.u.policy); 111 if (ret) 112 goto out3; 113 } 114 115 /* This logs the change for iprop and writes to the HDB */ 116 ret = kadm5_log_modify(context, &ent.entry, 117 mask | KADM5_MOD_NAME | KADM5_MOD_TIME); 118 119 out3: 120 hdb_free_entry(context->context, &ent); 121 out2: 122 (void) kadm5_log_end(context); 123 out: 124 if (!context->keep_open) { 125 kadm5_ret_t ret2; 126 ret2 = context->db->hdb_close(context->context, context->db); 127 if (ret == 0 && ret2 != 0) 128 ret = ret2; 129 } 130 return _kadm5_error_code(ret); 131 } 132 133 134 kadm5_ret_t 135 kadm5_s_modify_principal(void *server_handle, 136 kadm5_principal_ent_t princ, 137 uint32_t mask) 138 { 139 return modify_principal(server_handle, princ, mask, 140 KADM5_LAST_PWD_CHANGE | KADM5_MOD_TIME 141 | KADM5_MOD_NAME | KADM5_MKVNO 142 | KADM5_AUX_ATTRIBUTES | KADM5_LAST_SUCCESS 143 | KADM5_LAST_FAILED); 144 } 145