1 /* 2 * Copyright (c) 1997-2001 Kungliga Tekniska H�gskolan 3 * (Royal Institute of Technology, Stockholm, Sweden). 4 * All rights reserved. 5 * 6 * Redistribution and use in source and binary forms, with or without 7 * modification, are permitted provided that the following conditions 8 * are met: 9 * 10 * 1. Redistributions of source code must retain the above copyright 11 * notice, this list of conditions and the following disclaimer. 12 * 13 * 2. Redistributions in binary form must reproduce the above copyright 14 * notice, this list of conditions and the following disclaimer in the 15 * documentation and/or other materials provided with the distribution. 16 * 17 * 3. Neither the name of the Institute nor the names of its contributors 18 * may be used to endorse or promote products derived from this software 19 * without specific prior written permission. 20 * 21 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND 22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE 25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 */ 33 34 #include "kadm5_locl.h" 35 36 RCSID("$Id: chpass_s.c,v 1.13.8.1 2003/12/30 15:59:58 lha Exp $"); 37 38 static kadm5_ret_t 39 change(void *server_handle, 40 krb5_principal princ, 41 char *password, 42 int cond) 43 { 44 kadm5_server_context *context = server_handle; 45 hdb_entry ent; 46 kadm5_ret_t ret; 47 Key *keys; 48 size_t num_keys; 49 int cmp = 1; 50 51 ent.principal = princ; 52 ret = context->db->open(context->context, context->db, O_RDWR, 0); 53 if(ret) 54 return ret; 55 ret = context->db->fetch(context->context, context->db, 56 HDB_F_DECRYPT, &ent); 57 if(ret == HDB_ERR_NOENTRY) 58 goto out; 59 60 num_keys = ent.keys.len; 61 keys = ent.keys.val; 62 63 ent.keys.len = 0; 64 ent.keys.val = NULL; 65 66 ret = _kadm5_set_keys(context, &ent, password); 67 if(ret) { 68 _kadm5_free_keys (server_handle, num_keys, keys); 69 goto out2; 70 } 71 if (cond) 72 cmp = _kadm5_cmp_keys (ent.keys.val, ent.keys.len, 73 keys, num_keys); 74 _kadm5_free_keys (server_handle, num_keys, keys); 75 76 if (cmp == 0) { 77 krb5_set_error_string(context->context, "Password reuse forbidden"); 78 ret = KADM5_PASS_REUSE; 79 goto out2; 80 } 81 ret = _kadm5_set_modifier(context, &ent); 82 if(ret) 83 goto out2; 84 85 ret = _kadm5_bump_pw_expire(context, &ent); 86 if (ret) 87 goto out2; 88 89 ret = hdb_seal_keys(context->context, context->db, &ent); 90 if (ret) 91 goto out2; 92 93 kadm5_log_modify (context, 94 &ent, 95 KADM5_PRINCIPAL | KADM5_MOD_NAME | KADM5_MOD_TIME | 96 KADM5_KEY_DATA | KADM5_KVNO | KADM5_PW_EXPIRATION); 97 98 ret = context->db->store(context->context, context->db, 99 HDB_F_REPLACE, &ent); 100 out2: 101 hdb_free_entry(context->context, &ent); 102 out: 103 context->db->close(context->context, context->db); 104 return _kadm5_error_code(ret); 105 } 106 107 108 109 /* 110 * change the password of `princ' to `password' if it's not already that. 111 */ 112 113 kadm5_ret_t 114 kadm5_s_chpass_principal_cond(void *server_handle, 115 krb5_principal princ, 116 char *password) 117 { 118 return change (server_handle, princ, password, 1); 119 } 120 121 /* 122 * change the password of `princ' to `password' 123 */ 124 125 kadm5_ret_t 126 kadm5_s_chpass_principal(void *server_handle, 127 krb5_principal princ, 128 char *password) 129 { 130 return change (server_handle, princ, password, 0); 131 } 132 133 /* 134 * change keys for `princ' to `keys' 135 */ 136 137 kadm5_ret_t 138 kadm5_s_chpass_principal_with_key(void *server_handle, 139 krb5_principal princ, 140 int n_key_data, 141 krb5_key_data *key_data) 142 { 143 kadm5_server_context *context = server_handle; 144 hdb_entry ent; 145 kadm5_ret_t ret; 146 ent.principal = princ; 147 ret = context->db->open(context->context, context->db, O_RDWR, 0); 148 if(ret) 149 return ret; 150 ret = context->db->fetch(context->context, context->db, 0, &ent); 151 if(ret == HDB_ERR_NOENTRY) 152 goto out; 153 ret = _kadm5_set_keys2(context, &ent, n_key_data, key_data); 154 if(ret) 155 goto out2; 156 ret = _kadm5_set_modifier(context, &ent); 157 if(ret) 158 goto out2; 159 ret = _kadm5_bump_pw_expire(context, &ent); 160 if (ret) 161 goto out2; 162 163 ret = hdb_seal_keys(context->context, context->db, &ent); 164 if (ret) 165 goto out2; 166 167 kadm5_log_modify (context, 168 &ent, 169 KADM5_PRINCIPAL | KADM5_MOD_NAME | KADM5_MOD_TIME | 170 KADM5_KEY_DATA | KADM5_KVNO | KADM5_PW_EXPIRATION); 171 172 ret = context->db->store(context->context, context->db, 173 HDB_F_REPLACE, &ent); 174 out2: 175 hdb_free_entry(context->context, &ent); 176 out: 177 context->db->close(context->context, context->db); 178 return _kadm5_error_code(ret); 179 } 180