2 * Copyright (c) 1997 - 1999 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
17 * 3. Neither the name of the Institute nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34 #include "kadm5_locl.h"
39 kadm5_c_randkey_principal(void *server_handle
,
43 krb5_key_salt_tuple
*ks_tuple
,
44 krb5_keyblock
**new_keys
,
47 kadm5_client_context
*context
= server_handle
;
50 unsigned char buf
[1536];
55 ret
= _kadm5_connect(server_handle
);
59 sp
= krb5_storage_from_mem(buf
, sizeof(buf
));
61 krb5_clear_error_message(context
->context
);
66 * NOTE WELL: This message is extensible. It currently consists of:
68 * - opcode (kadm_randkey)
69 * - principal name (princ)
71 * followed by optional items, each of which must be present if
72 * there are any items following them that are also present:
74 * - keepold boolean (whether to delete old kvnos)
75 * - number of key/salt type tuples
76 * - array of {enctype, salttype}
78 * Eventually we may add:
80 * - opaque string2key parameters (salt, rounds, ...)
82 krb5_store_int32(sp
, kadm_randkey
);
83 krb5_store_principal(sp
, princ
);
85 if (keepold
== TRUE
|| n_ks_tuple
> 0)
86 krb5_store_uint32(sp
, keepold
);
88 krb5_store_uint32(sp
, n_ks_tuple
);
89 for (i
= 0; i
< n_ks_tuple
; i
++) {
90 krb5_store_int32(sp
, ks_tuple
[i
].ks_enctype
);
91 krb5_store_int32(sp
, ks_tuple
[i
].ks_salttype
);
93 /* Future extensions go here */
95 ret
= _kadm5_client_send(context
, sp
);
96 krb5_storage_free(sp
);
99 ret
= _kadm5_client_recv(context
, &reply
);
102 sp
= krb5_storage_from_data(&reply
);
104 krb5_clear_error_message(context
->context
);
105 krb5_data_free (&reply
);
108 krb5_clear_error_message(context
->context
);
109 krb5_ret_int32(sp
, &tmp
);
114 krb5_ret_int32(sp
, &tmp
);
119 k
= malloc(tmp
* sizeof(*k
));
124 for(i
= 0; i
< tmp
; i
++)
125 krb5_ret_keyblock(sp
, &k
[i
]);
126 if (n_keys
&& new_keys
) {
132 krb5_storage_free(sp
);
133 krb5_data_free (&reply
);