cf/largefile.m4: Fix build with autoconf-2.72
[heimdal.git] / lib / kadm5 / chpass_c.c
blob103691874388f6dc007f8c8b5e2cebb163c9c78e
1 /*
2 * Copyright (c) 1997-2000, 2005-2006 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
4 * All rights reserved.
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
17 * 3. Neither the name of the Institute nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
34 #include "kadm5_locl.h"
36 RCSID("$Id$");
38 kadm5_ret_t
39 kadm5_c_chpass_principal(void *server_handle,
40 krb5_principal princ,
41 int keepold,
42 int n_ks_tuple,
43 krb5_key_salt_tuple *ks_tuple,
44 const char *password)
46 kadm5_client_context *context = server_handle;
47 kadm5_ret_t ret;
48 krb5_storage *sp;
49 unsigned char buf[1024];
50 int32_t tmp;
51 krb5_data reply;
54 * We should get around to implementing this... At the moment, the
55 * the server side API is implemented but the wire protocol has not
56 * been updated.
58 if (n_ks_tuple > 0)
59 return KADM5_KS_TUPLE_NOSUPP;
61 ret = _kadm5_connect(server_handle, 1 /* want_write */);
62 if (ret)
63 return ret;
65 krb5_data_zero(&reply);
67 sp = krb5_storage_from_mem(buf, sizeof(buf));
68 if (sp == NULL) {
69 ret = krb5_enomem(context->context);
70 goto out_keep_error;
72 ret = krb5_store_int32(sp, kadm_chpass);
73 if (ret)
74 goto out;
75 ret = krb5_store_principal(sp, princ);
76 if (ret)
77 goto out;
78 ret = krb5_store_string(sp, password);
79 if (ret)
80 goto out;
81 ret = krb5_store_int32(sp, keepold); /* extension */
82 if (ret)
83 goto out;
84 ret = _kadm5_client_send(context, sp);
85 if (ret)
86 goto out_keep_error;
87 ret = _kadm5_client_recv(context, &reply);
88 if (ret)
89 goto out_keep_error;
90 krb5_storage_free(sp);
91 sp = krb5_storage_from_data(&reply);
92 if (sp == NULL) {
93 ret = krb5_enomem(context->context);
94 goto out_keep_error;
96 ret = krb5_ret_int32(sp, &tmp);
97 if (ret == 0)
98 ret = tmp;
100 out:
101 krb5_clear_error_message(context->context);
103 out_keep_error:
104 krb5_storage_free(sp);
105 krb5_data_free(&reply);
106 return ret;
109 kadm5_ret_t
110 kadm5_c_chpass_principal_with_key(void *server_handle,
111 krb5_principal princ,
112 int keepold,
113 int n_key_data,
114 krb5_key_data *key_data)
116 kadm5_client_context *context = server_handle;
117 kadm5_ret_t ret;
118 krb5_storage *sp;
119 unsigned char buf[1024];
120 int32_t tmp;
121 krb5_data reply;
122 int i;
124 ret = _kadm5_connect(server_handle, 1 /* want_write */);
125 if (ret)
126 return ret;
128 krb5_data_zero(&reply);
130 sp = krb5_storage_from_mem(buf, sizeof(buf));
131 if (sp == NULL) {
132 ret = krb5_enomem(context->context);
133 goto out_keep_error;
135 ret = krb5_store_int32(sp, kadm_chpass_with_key);
136 if (ret)
137 goto out;
138 ret = krb5_store_principal(sp, princ);
139 if (ret)
140 goto out;
141 ret = krb5_store_int32(sp, n_key_data);
142 if (ret)
143 goto out;
144 for (i = 0; i < n_key_data; ++i) {
145 ret = kadm5_store_key_data (sp, &key_data[i]);
146 if (ret)
147 goto out;
149 ret = krb5_store_int32(sp, keepold); /* extension */
150 if (ret)
151 goto out;
152 ret = _kadm5_client_send(context, sp);
153 if (ret)
154 goto out_keep_error;
155 ret = _kadm5_client_recv(context, &reply);
156 if (ret)
157 goto out_keep_error;
158 krb5_storage_free(sp);
159 sp = krb5_storage_from_data (&reply);
160 if (sp == NULL) {
161 ret = krb5_enomem(context->context);
162 goto out_keep_error;
164 ret = krb5_ret_int32(sp, &tmp);
165 if (ret == 0)
166 ret = tmp;
168 out:
169 krb5_clear_error_message(context->context);
171 out_keep_error:
172 krb5_storage_free(sp);
173 krb5_data_free(&reply);
174 return ret;