1*d3273b5bSchristos /* $NetBSD: randkey_c.c,v 1.2 2017/01/28 21:31:49 christos Exp $ */
2ca1c9b0cSelric
3ca1c9b0cSelric /*
4ca1c9b0cSelric * Copyright (c) 1997 - 1999 Kungliga Tekniska Högskolan
5ca1c9b0cSelric * (Royal Institute of Technology, Stockholm, Sweden).
6ca1c9b0cSelric * All rights reserved.
7ca1c9b0cSelric *
8ca1c9b0cSelric * Redistribution and use in source and binary forms, with or without
9ca1c9b0cSelric * modification, are permitted provided that the following conditions
10ca1c9b0cSelric * are met:
11ca1c9b0cSelric *
12ca1c9b0cSelric * 1. Redistributions of source code must retain the above copyright
13ca1c9b0cSelric * notice, this list of conditions and the following disclaimer.
14ca1c9b0cSelric *
15ca1c9b0cSelric * 2. Redistributions in binary form must reproduce the above copyright
16ca1c9b0cSelric * notice, this list of conditions and the following disclaimer in the
17ca1c9b0cSelric * documentation and/or other materials provided with the distribution.
18ca1c9b0cSelric *
19ca1c9b0cSelric * 3. Neither the name of the Institute nor the names of its contributors
20ca1c9b0cSelric * may be used to endorse or promote products derived from this software
21ca1c9b0cSelric * without specific prior written permission.
22ca1c9b0cSelric *
23ca1c9b0cSelric * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
24ca1c9b0cSelric * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25ca1c9b0cSelric * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26ca1c9b0cSelric * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
27ca1c9b0cSelric * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28ca1c9b0cSelric * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29ca1c9b0cSelric * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30ca1c9b0cSelric * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31ca1c9b0cSelric * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32ca1c9b0cSelric * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33ca1c9b0cSelric * SUCH DAMAGE.
34ca1c9b0cSelric */
35ca1c9b0cSelric
36ca1c9b0cSelric #include "kadm5_locl.h"
37ca1c9b0cSelric
38*d3273b5bSchristos __RCSID("$NetBSD: randkey_c.c,v 1.2 2017/01/28 21:31:49 christos Exp $");
39ca1c9b0cSelric
40ca1c9b0cSelric kadm5_ret_t
kadm5_c_randkey_principal(void * server_handle,krb5_principal princ,krb5_boolean keepold,int n_ks_tuple,krb5_key_salt_tuple * ks_tuple,krb5_keyblock ** new_keys,int * n_keys)41ca1c9b0cSelric kadm5_c_randkey_principal(void *server_handle,
42ca1c9b0cSelric krb5_principal princ,
43b9d004c6Schristos krb5_boolean keepold,
44b9d004c6Schristos int n_ks_tuple,
45b9d004c6Schristos krb5_key_salt_tuple *ks_tuple,
46ca1c9b0cSelric krb5_keyblock **new_keys,
47ca1c9b0cSelric int *n_keys)
48ca1c9b0cSelric {
49ca1c9b0cSelric kadm5_client_context *context = server_handle;
50ca1c9b0cSelric kadm5_ret_t ret;
51ca1c9b0cSelric krb5_storage *sp;
52b9d004c6Schristos unsigned char buf[1536];
53ca1c9b0cSelric int32_t tmp;
54b9d004c6Schristos size_t i;
55ca1c9b0cSelric krb5_data reply;
56ca1c9b0cSelric
57ca1c9b0cSelric ret = _kadm5_connect(server_handle);
58ca1c9b0cSelric if(ret)
59ca1c9b0cSelric return ret;
60ca1c9b0cSelric
61ca1c9b0cSelric sp = krb5_storage_from_mem(buf, sizeof(buf));
62ca1c9b0cSelric if (sp == NULL) {
63ca1c9b0cSelric krb5_clear_error_message(context->context);
64ca1c9b0cSelric return ENOMEM;
65ca1c9b0cSelric }
66b9d004c6Schristos
67b9d004c6Schristos /*
68b9d004c6Schristos * NOTE WELL: This message is extensible. It currently consists of:
69b9d004c6Schristos *
70b9d004c6Schristos * - opcode (kadm_randkey)
71b9d004c6Schristos * - principal name (princ)
72b9d004c6Schristos *
73b9d004c6Schristos * followed by optional items, each of which must be present if
74b9d004c6Schristos * there are any items following them that are also present:
75b9d004c6Schristos *
76b9d004c6Schristos * - keepold boolean (whether to delete old kvnos)
77b9d004c6Schristos * - number of key/salt type tuples
78b9d004c6Schristos * - array of {enctype, salttype}
79b9d004c6Schristos *
80b9d004c6Schristos * Eventually we may add:
81b9d004c6Schristos *
82b9d004c6Schristos * - opaque string2key parameters (salt, rounds, ...)
83b9d004c6Schristos */
84b9d004c6Schristos ret = krb5_store_int32(sp, kadm_randkey);
85b9d004c6Schristos if (ret == 0)
86b9d004c6Schristos ret = krb5_store_principal(sp, princ);
87b9d004c6Schristos
88b9d004c6Schristos if (ret == 0 && (keepold == TRUE || n_ks_tuple > 0))
89b9d004c6Schristos ret = krb5_store_uint32(sp, keepold);
90b9d004c6Schristos if (ret == 0 && n_ks_tuple > 0)
91b9d004c6Schristos ret = krb5_store_uint32(sp, n_ks_tuple);
92b9d004c6Schristos for (i = 0; ret == 0 && i < n_ks_tuple; i++) {
93b9d004c6Schristos ret = krb5_store_int32(sp, ks_tuple[i].ks_enctype);
94b9d004c6Schristos if (ret == 0)
95b9d004c6Schristos krb5_store_int32(sp, ks_tuple[i].ks_salttype);
96b9d004c6Schristos }
97b9d004c6Schristos if (ret)
98b9d004c6Schristos return ret;
99b9d004c6Schristos /* Future extensions go here */
100b9d004c6Schristos
101ca1c9b0cSelric ret = _kadm5_client_send(context, sp);
102ca1c9b0cSelric krb5_storage_free(sp);
103ca1c9b0cSelric if (ret)
104ca1c9b0cSelric return ret;
105ca1c9b0cSelric ret = _kadm5_client_recv(context, &reply);
106ca1c9b0cSelric if(ret)
107ca1c9b0cSelric return ret;
108ca1c9b0cSelric sp = krb5_storage_from_data(&reply);
109ca1c9b0cSelric if (sp == NULL) {
110ca1c9b0cSelric krb5_clear_error_message(context->context);
111ca1c9b0cSelric krb5_data_free (&reply);
112ca1c9b0cSelric return ENOMEM;
113ca1c9b0cSelric }
114ca1c9b0cSelric krb5_clear_error_message(context->context);
115b9d004c6Schristos ret = krb5_ret_int32(sp, &tmp);
116b9d004c6Schristos if (ret == 0)
117ca1c9b0cSelric ret = tmp;
118ca1c9b0cSelric if (ret == 0){
119ca1c9b0cSelric krb5_keyblock *k;
120ca1c9b0cSelric
121b9d004c6Schristos ret = krb5_ret_int32(sp, &tmp);
122b9d004c6Schristos if (ret)
123b9d004c6Schristos goto out;
124b9d004c6Schristos if (tmp < 0) {
125b9d004c6Schristos ret = EOVERFLOW;
126b9d004c6Schristos goto out;
127b9d004c6Schristos }
128b9d004c6Schristos k = calloc(tmp, sizeof(*k));
129ca1c9b0cSelric if (k == NULL) {
130ca1c9b0cSelric ret = ENOMEM;
131ca1c9b0cSelric goto out;
132ca1c9b0cSelric }
133b9d004c6Schristos for(i = 0; ret == 0 && i < tmp; i++)
134b9d004c6Schristos ret = krb5_ret_keyblock(sp, &k[i]);
135b9d004c6Schristos if (ret == 0 && n_keys && new_keys) {
136ca1c9b0cSelric *n_keys = tmp;
137ca1c9b0cSelric *new_keys = k;
138b9d004c6Schristos } else {
139b9d004c6Schristos krb5_free_keyblock_contents(context->context, &k[i]);
140b9d004c6Schristos for (; i > 0; i--)
141b9d004c6Schristos krb5_free_keyblock_contents(context->context, &k[i - 1]);
142b9d004c6Schristos free(k);
143b9d004c6Schristos }
144ca1c9b0cSelric }
145ca1c9b0cSelric out:
146ca1c9b0cSelric krb5_storage_free(sp);
147ca1c9b0cSelric krb5_data_free (&reply);
148ca1c9b0cSelric return ret;
149ca1c9b0cSelric }
150