freebsd_amp_hwpstate/crypto/heimdal/lib/kadm5/admin.h

699 lines
17 KiB
C

/*
* Copyright (c) 1997-1999 Kungliga Tekniska Högskolan
* (Royal Institute of Technology, Stockholm, Sweden).
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
*
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* 3. Neither the name of the Institute nor the names of its contributors
* may be used to endorse or promote products derived from this software
* without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*/
/* $Id: admin.h,v 1.15 1999/12/02 17:05:05 joda Exp $ */
#ifndef __KADM5_ADMIN_H__
#define __KADM5_ADMIN_H__
#define KADM5_API_VERSION_1 1
#define KADM5_API_VERSION_2 2
#ifndef USE_KADM5_API_VERSION
#define USE_KADM5_API_VERSION KADM5_API_VERSION_2
#endif
#if USE_KADM5_API_VERSION != KADM5_API_VERSION_2
#error No support for API versions other than 2
#endif
#define KADM5_STRUCT_VERSION 0
#include <krb5.h>
#define KRB5_KDB_DISALLOW_POSTDATED 0x00000001
#define KRB5_KDB_DISALLOW_FORWARDABLE 0x00000002
#define KRB5_KDB_DISALLOW_TGT_BASED 0x00000004
#define KRB5_KDB_DISALLOW_RENEWABLE 0x00000008
#define KRB5_KDB_DISALLOW_PROXIABLE 0x00000010
#define KRB5_KDB_DISALLOW_DUP_SKEY 0x00000020
#define KRB5_KDB_DISALLOW_ALL_TIX 0x00000040
#define KRB5_KDB_REQUIRES_PRE_AUTH 0x00000080
#define KRB5_KDB_REQUIRES_HW_AUTH 0x00000100
#define KRB5_KDB_REQUIRES_PWCHANGE 0x00000200
#define KRB5_KDB_DISALLOW_SVR 0x00001000
#define KRB5_KDB_PWCHANGE_SERVICE 0x00002000
#define KRB5_KDB_SUPPORT_DESMD5 0x00004000
#define KRB5_KDB_NEW_PRINC 0x00008000
#define KADM5_PRINCIPAL 0x000001
#define KADM5_PRINC_EXPIRE_TIME 0x000002
#define KADM5_PW_EXPIRATION 0x000004
#define KADM5_LAST_PWD_CHANGE 0x000008
#define KADM5_ATTRIBUTES 0x000010
#define KADM5_MAX_LIFE 0x000020
#define KADM5_MOD_TIME 0x000040
#define KADM5_MOD_NAME 0x000080
#define KADM5_KVNO 0x000100
#define KADM5_MKVNO 0x000200
#define KADM5_AUX_ATTRIBUTES 0x000400
#define KADM5_POLICY 0x000800
#define KADM5_POLICY_CLR 0x001000
#define KADM5_MAX_RLIFE 0x002000
#define KADM5_LAST_SUCCESS 0x004000
#define KADM5_LAST_FAILED 0x008000
#define KADM5_FAIL_AUTH_COUNT 0x010000
#define KADM5_KEY_DATA 0x020000
#define KADM5_TL_DATA 0x040000
#define KADM5_PRINCIPAL_NORMAL_MASK (~(KADM5_KEY_DATA | KADM5_TL_DATA))
#define KADM5_PW_MAX_LIFE 0x004000
#define KADM5_PW_MIN_LIFE 0x008000
#define KADM5_PW_MIN_LENGTH 0x010000
#define KADM5_PW_MIN_CLASSES 0x020000
#define KADM5_PW_HISTORY_NUM 0x040000
#define KADM5_REF_COUNT 0x080000
#define KADM5_POLICY_NORMAL_MASK (~0)
#define KADM5_ADMIN_SERVICE "kadmin/admin"
#define KADM5_HIST_PRINCIPAL "kadmin/history"
#define KADM5_CHANGEPW_SERVICE "kadmin/changepw"
typedef struct _krb5_key_data {
int16_t key_data_ver; /* Version */
int16_t key_data_kvno; /* Key Version */
int16_t key_data_type[2]; /* Array of types */
int16_t key_data_length[2]; /* Array of lengths */
void** key_data_contents[2];/* Array of pointers */
} krb5_key_data;
typedef struct _krb5_tl_data {
struct _krb5_tl_data* tl_data_next;
int16_t tl_data_type;
int16_t tl_data_length;
void **tl_data_contents;
} krb5_tl_data;
typedef struct _kadm5_principal_ent_t {
krb5_principal principal;
krb5_timestamp princ_expire_time;
krb5_timestamp last_pwd_change;
krb5_timestamp pw_expiration;
krb5_deltat max_life;
krb5_principal mod_name;
krb5_timestamp mod_date;
krb5_flags attributes;
krb5_kvno kvno;
krb5_kvno mkvno;
char * policy;
u_int32_t aux_attributes;
krb5_deltat max_renewable_life;
krb5_timestamp last_success;
krb5_timestamp last_failed;
krb5_kvno fail_auth_count;
int16_t n_key_data;
int16_t n_tl_data;
krb5_tl_data *tl_data;
krb5_key_data *key_data;
} kadm5_principal_ent_rec, *kadm5_principal_ent_t;
typedef struct _kadm5_policy_ent_t {
char *policy;
u_int32_t pw_min_life;
u_int32_t pw_max_life;
u_int32_t pw_min_length;
u_int32_t pw_min_classes;
u_int32_t pw_history_num;
u_int32_t policy_refcnt;
} kadm5_policy_ent_rec, *kadm5_policy_ent_t;
#define KADM5_CONFIG_REALM (1 << 0)
#define KADM5_CONFIG_PROFILE (1 << 1)
#define KADM5_CONFIG_KADMIND_PORT (1 << 2)
#define KADM5_CONFIG_ADMIN_SERVER (1 << 3)
#define KADM5_CONFIG_DBNAME (1 << 4)
#define KADM5_CONFIG_ADBNAME (1 << 5)
#define KADM5_CONFIG_ADB_LOCKFILE (1 << 6)
#define KADM5_CONFIG_ACL_FILE (1 << 7)
#define KADM5_CONFIG_DICT_FILE (1 << 8)
#define KADM5_CONFIG_ADMIN_KEYTAB (1 << 9)
#define KADM5_CONFIG_MKEY_FROM_KEYBOARD (1 << 10)
#define KADM5_CONFIG_STASH_FILE (1 << 11)
#define KADM5_CONFIG_MKEY_NAME (1 << 12)
#define KADM5_CONFIG_ENCTYPE (1 << 13)
#define KADM5_CONFIG_MAX_LIFE (1 << 14)
#define KADM5_CONFIG_MAX_RLIFE (1 << 15)
#define KADM5_CONFIG_EXPIRATION (1 << 16)
#define KADM5_CONFIG_FLAGS (1 << 17)
#define KADM5_CONFIG_ENCTYPES (1 << 18)
#define KADM5_PRIV_GET (1 << 0)
#define KADM5_PRIV_ADD (1 << 1)
#define KADM5_PRIV_MODIFY (1 << 2)
#define KADM5_PRIV_DELETE (1 << 3)
#define KADM5_PRIV_LIST (1 << 4)
#define KADM5_PRIV_CPW (1 << 5)
#define KADM5_PRIV_ALL (KADM5_PRIV_GET | KADM5_PRIV_ADD | KADM5_PRIV_MODIFY | KADM5_PRIV_DELETE | KADM5_PRIV_LIST | KADM5_PRIV_CPW)
typedef struct {
int XXX;
}krb5_key_salt_tuple;
typedef struct _kadm5_config_params {
u_int32_t mask;
/* Client and server fields */
char *realm;
int kadmind_port;
/* client fields */
char *admin_server;
/* server fields */
char *dbname;
char *acl_file;
/* server library (database) fields */
char *stash_file;
} kadm5_config_params;
typedef krb5_error_code kadm5_ret_t;
kadm5_ret_t
kadm5_c_chpass_principal __P((
void *server_handle,
krb5_principal princ,
char *password));
kadm5_ret_t
kadm5_c_create_principal __P((
void *server_handle,
kadm5_principal_ent_t princ,
u_int32_t mask,
char *password));
kadm5_ret_t
kadm5_c_delete_principal __P((
void *server_handle,
krb5_principal princ));
kadm5_ret_t
kadm5_c_destroy __P((void *server_handle));
kadm5_ret_t
kadm5_c_flush __P((void *server_handle));
kadm5_ret_t
kadm5_c_get_principal __P((
void *server_handle,
krb5_principal princ,
kadm5_principal_ent_t out,
u_int32_t mask));
kadm5_ret_t
kadm5_c_get_principals __P((
void *server_handle,
const char *exp,
char ***princs,
int *count));
kadm5_ret_t
kadm5_c_get_privs __P((
void *server_handle,
u_int32_t *privs));
kadm5_ret_t
kadm5_c_init_with_creds __P((
const char *client_name,
krb5_ccache ccache,
const char *service_name,
kadm5_config_params *realm_params,
unsigned long struct_version,
unsigned long api_version,
void **server_handle));
kadm5_ret_t
kadm5_c_init_with_creds_ctx __P((
krb5_context context,
const char *client_name,
krb5_ccache ccache,
const char *service_name,
kadm5_config_params *realm_params,
unsigned long struct_version,
unsigned long api_version,
void **server_handle));
kadm5_ret_t
kadm5_c_init_with_password __P((
const char *client_name,
const char *password,
const char *service_name,
kadm5_config_params *realm_params,
unsigned long struct_version,
unsigned long api_version,
void **server_handle));
kadm5_ret_t
kadm5_c_init_with_password_ctx __P((
krb5_context context,
const char *client_name,
const char *password,
const char *service_name,
kadm5_config_params *realm_params,
unsigned long struct_version,
unsigned long api_version,
void **server_handle));
kadm5_ret_t
kadm5_c_init_with_skey __P((
const char *client_name,
const char *keytab,
const char *service_name,
kadm5_config_params *realm_params,
unsigned long struct_version,
unsigned long api_version,
void **server_handle));
kadm5_ret_t
kadm5_c_init_with_skey_ctx __P((
krb5_context context,
const char *client_name,
const char *keytab,
const char *service_name,
kadm5_config_params *realm_params,
unsigned long struct_version,
unsigned long api_version,
void **server_handle));
kadm5_ret_t
kadm5_c_modify_principal __P((
void *server_handle,
kadm5_principal_ent_t princ,
u_int32_t mask));
kadm5_ret_t
kadm5_c_randkey_principal __P((
void *server_handle,
krb5_principal princ,
krb5_keyblock **new_keys,
int *n_keys));
kadm5_ret_t
kadm5_c_rename_principal __P((
void *server_handle,
krb5_principal source,
krb5_principal target));
kadm5_ret_t
kadm5_chpass_principal __P((
void *server_handle,
krb5_principal princ,
char *password));
kadm5_ret_t
kadm5_create_principal __P((
void *server_handle,
kadm5_principal_ent_t princ,
u_int32_t mask,
char *password));
kadm5_ret_t
kadm5_delete_principal __P((
void *server_handle,
krb5_principal princ));
kadm5_ret_t
kadm5_destroy __P((void *server_handle));
kadm5_ret_t
kadm5_flush __P((void *server_handle));
void
kadm5_free_key_data __P((
void *server_handle,
int16_t *n_key_data,
krb5_key_data *key_data));
void
kadm5_free_name_list __P((
void *server_handle,
char **names,
int *count));
void
kadm5_free_principal_ent __P((
void *server_handle,
kadm5_principal_ent_t princ));
kadm5_ret_t
kadm5_get_principal __P((
void *server_handle,
krb5_principal princ,
kadm5_principal_ent_t out,
u_int32_t mask));
kadm5_ret_t
kadm5_get_principals __P((
void *server_handle,
const char *exp,
char ***princs,
int *count));
kadm5_ret_t
kadm5_get_privs __P((
void *server_handle,
u_int32_t *privs));
kadm5_ret_t
kadm5_init_with_creds __P((
const char *client_name,
krb5_ccache ccache,
const char *service_name,
kadm5_config_params *realm_params,
unsigned long struct_version,
unsigned long api_version,
void **server_handle));
kadm5_ret_t
kadm5_init_with_creds_ctx __P((
krb5_context context,
const char *client_name,
krb5_ccache ccache,
const char *service_name,
kadm5_config_params *realm_params,
unsigned long struct_version,
unsigned long api_version,
void **server_handle));
kadm5_ret_t
kadm5_init_with_password __P((
const char *client_name,
const char *password,
const char *service_name,
kadm5_config_params *realm_params,
unsigned long struct_version,
unsigned long api_version,
void **server_handle));
kadm5_ret_t
kadm5_init_with_password_ctx __P((
krb5_context context,
const char *client_name,
const char *password,
const char *service_name,
kadm5_config_params *realm_params,
unsigned long struct_version,
unsigned long api_version,
void **server_handle));
kadm5_ret_t
kadm5_init_with_skey __P((
const char *client_name,
const char *keytab,
const char *service_name,
kadm5_config_params *realm_params,
unsigned long struct_version,
unsigned long api_version,
void **server_handle));
kadm5_ret_t
kadm5_init_with_skey_ctx __P((
krb5_context context,
const char *client_name,
const char *keytab,
const char *service_name,
kadm5_config_params *realm_params,
unsigned long struct_version,
unsigned long api_version,
void **server_handle));
kadm5_ret_t
kadm5_modify_principal __P((
void *server_handle,
kadm5_principal_ent_t princ,
u_int32_t mask));
kadm5_ret_t
kadm5_randkey_principal __P((
void *server_handle,
krb5_principal princ,
krb5_keyblock **new_keys,
int *n_keys));
kadm5_ret_t
kadm5_rename_principal __P((
void *server_handle,
krb5_principal source,
krb5_principal target));
kadm5_ret_t
kadm5_ret_key_data __P((
krb5_storage *sp,
krb5_key_data *key));
kadm5_ret_t
kadm5_ret_principal_ent __P((
krb5_storage *sp,
kadm5_principal_ent_t princ));
kadm5_ret_t
kadm5_ret_principal_ent_mask __P((
krb5_storage *sp,
kadm5_principal_ent_t princ,
u_int32_t *mask));
kadm5_ret_t
kadm5_ret_tl_data __P((
krb5_storage *sp,
krb5_tl_data *tl));
kadm5_ret_t
kadm5_s_chpass_principal __P((
void *server_handle,
krb5_principal princ,
char *password));
kadm5_ret_t
kadm5_s_chpass_principal_with_key __P((
void *server_handle,
krb5_principal princ,
int n_key_data,
krb5_key_data *key_data));
kadm5_ret_t
kadm5_s_create_principal __P((
void *server_handle,
kadm5_principal_ent_t princ,
u_int32_t mask,
char *password));
kadm5_ret_t
kadm5_s_create_principal_with_key __P((
void *server_handle,
kadm5_principal_ent_t princ,
u_int32_t mask));
kadm5_ret_t
kadm5_s_delete_principal __P((
void *server_handle,
krb5_principal princ));
kadm5_ret_t
kadm5_s_destroy __P((void *server_handle));
kadm5_ret_t
kadm5_s_flush __P((void *server_handle));
kadm5_ret_t
kadm5_s_get_principal __P((
void *server_handle,
krb5_principal princ,
kadm5_principal_ent_t out,
u_int32_t mask));
kadm5_ret_t
kadm5_s_get_principals __P((
void *server_handle,
const char *exp,
char ***princs,
int *count));
kadm5_ret_t
kadm5_s_get_privs __P((
void *server_handle,
u_int32_t *privs));
kadm5_ret_t
kadm5_s_init_with_creds __P((
const char *client_name,
krb5_ccache ccache,
const char *service_name,
kadm5_config_params *realm_params,
unsigned long struct_version,
unsigned long api_version,
void **server_handle));
kadm5_ret_t
kadm5_s_init_with_creds_ctx __P((
krb5_context context,
const char *client_name,
krb5_ccache ccache,
const char *service_name,
kadm5_config_params *realm_params,
unsigned long struct_version,
unsigned long api_version,
void **server_handle));
kadm5_ret_t
kadm5_s_init_with_password __P((
const char *client_name,
const char *password,
const char *service_name,
kadm5_config_params *realm_params,
unsigned long struct_version,
unsigned long api_version,
void **server_handle));
kadm5_ret_t
kadm5_s_init_with_password_ctx __P((
krb5_context context,
const char *client_name,
const char *password,
const char *service_name,
kadm5_config_params *realm_params,
unsigned long struct_version,
unsigned long api_version,
void **server_handle));
kadm5_ret_t
kadm5_s_init_with_skey __P((
const char *client_name,
const char *keytab,
const char *service_name,
kadm5_config_params *realm_params,
unsigned long struct_version,
unsigned long api_version,
void **server_handle));
kadm5_ret_t
kadm5_s_init_with_skey_ctx __P((
krb5_context context,
const char *client_name,
const char *keytab,
const char *service_name,
kadm5_config_params *realm_params,
unsigned long struct_version,
unsigned long api_version,
void **server_handle));
kadm5_ret_t
kadm5_s_modify_principal __P((
void *server_handle,
kadm5_principal_ent_t princ,
u_int32_t mask));
kadm5_ret_t
kadm5_s_randkey_principal __P((
void *server_handle,
krb5_principal princ,
krb5_keyblock **new_keys,
int *n_keys));
kadm5_ret_t
kadm5_s_rename_principal __P((
void *server_handle,
krb5_principal source,
krb5_principal target));
kadm5_ret_t
kadm5_store_key_data __P((
krb5_storage *sp,
krb5_key_data *key));
kadm5_ret_t
kadm5_store_principal_ent __P((
krb5_storage *sp,
kadm5_principal_ent_t princ));
kadm5_ret_t
kadm5_store_principal_ent_mask __P((
krb5_storage *sp,
kadm5_principal_ent_t princ,
u_int32_t mask));
kadm5_ret_t
kadm5_store_tl_data __P((
krb5_storage *sp,
krb5_tl_data *tl));
void
kadm5_setup_passwd_quality_check(krb5_context context,
const char *check_library,
const char *check_function);
const char *
kadm5_check_password_quality (krb5_context context,
krb5_principal principal,
krb5_data *pwd_data);
#if 0
/* unimplemented functions */
kadm5_ret_t
kadm5_decrypt_key(void *server_handle,
kadm5_principal_ent_t entry, int32_t
ktype, int32_t stype, int32_t
kvno, krb5_keyblock *keyblock,
krb5_keysalt *keysalt, int *kvnop);
kadm5_ret_t
kadm5_create_policy(void *server_handle,
kadm5_policy_ent_t policy, u_int32_t mask);
kadm5_ret_t
kadm5_delete_policy(void *server_handle, char *policy);
kadm5_ret_t
kadm5_modify_policy(void *server_handle,
kadm5_policy_ent_t policy,
u_int32_t mask);
kadm5_ret_t
kadm5_get_policy(void *server_handle, char *policy, kadm5_policy_ent_t ent);
kadm5_ret_t
kadm5_get_policies(void *server_handle, char *exp,
char ***pols, int *count);
void
kadm5_free_policy_ent(kadm5_policy_ent_t policy);
#endif
#endif /* __KADM5_ADMIN_H__ */