xref: /freebsd/crypto/heimdal/lib/kadm5/create_s.c (revision 5e9cd1ae3e10592ed70e7575551cba1bbab04d84)
1b528cefcSMark Murray /*
25e9cd1aeSAssar Westerlund  * Copyright (c) 1997-2001 Kungliga Tekniska H�gskolan
3b528cefcSMark Murray  * (Royal Institute of Technology, Stockholm, Sweden).
4b528cefcSMark Murray  * All rights reserved.
5b528cefcSMark Murray  *
6b528cefcSMark Murray  * Redistribution and use in source and binary forms, with or without
7b528cefcSMark Murray  * modification, are permitted provided that the following conditions
8b528cefcSMark Murray  * are met:
9b528cefcSMark Murray  *
10b528cefcSMark Murray  * 1. Redistributions of source code must retain the above copyright
11b528cefcSMark Murray  *    notice, this list of conditions and the following disclaimer.
12b528cefcSMark Murray  *
13b528cefcSMark Murray  * 2. Redistributions in binary form must reproduce the above copyright
14b528cefcSMark Murray  *    notice, this list of conditions and the following disclaimer in the
15b528cefcSMark Murray  *    documentation and/or other materials provided with the distribution.
16b528cefcSMark Murray  *
17b528cefcSMark Murray  * 3. Neither the name of the Institute nor the names of its contributors
18b528cefcSMark Murray  *    may be used to endorse or promote products derived from this software
19b528cefcSMark Murray  *    without specific prior written permission.
20b528cefcSMark Murray  *
21b528cefcSMark Murray  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22b528cefcSMark Murray  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23b528cefcSMark Murray  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24b528cefcSMark Murray  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25b528cefcSMark Murray  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26b528cefcSMark Murray  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27b528cefcSMark Murray  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28b528cefcSMark Murray  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29b528cefcSMark Murray  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30b528cefcSMark Murray  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31b528cefcSMark Murray  * SUCH DAMAGE.
32b528cefcSMark Murray  */
33b528cefcSMark Murray 
34b528cefcSMark Murray #include "kadm5_locl.h"
35b528cefcSMark Murray 
365e9cd1aeSAssar Westerlund RCSID("$Id: create_s.c,v 1.19 2001/01/30 01:24:28 assar Exp $");
37b528cefcSMark Murray 
38b528cefcSMark Murray static kadm5_ret_t
39b528cefcSMark Murray get_default(kadm5_server_context *context, krb5_principal princ,
40b528cefcSMark Murray 	    kadm5_principal_ent_t def)
41b528cefcSMark Murray {
42b528cefcSMark Murray     kadm5_ret_t ret;
43b528cefcSMark Murray     krb5_principal def_principal;
44b528cefcSMark Murray     krb5_realm *realm = krb5_princ_realm(context->context, princ);
45b528cefcSMark Murray 
46b528cefcSMark Murray     ret = krb5_make_principal(context->context, &def_principal,
47b528cefcSMark Murray 			      *realm, "default", NULL);
48b528cefcSMark Murray     if (ret)
49b528cefcSMark Murray 	return ret;
50b528cefcSMark Murray     ret = kadm5_s_get_principal(context, def_principal, def,
51b528cefcSMark Murray 				KADM5_PRINCIPAL_NORMAL_MASK);
52b528cefcSMark Murray     krb5_free_principal (context->context, def_principal);
53b528cefcSMark Murray     return ret;
54b528cefcSMark Murray }
55b528cefcSMark Murray 
56b528cefcSMark Murray static kadm5_ret_t
57b528cefcSMark Murray create_principal(kadm5_server_context *context,
58b528cefcSMark Murray 		 kadm5_principal_ent_t princ,
59b528cefcSMark Murray 		 u_int32_t mask,
60b528cefcSMark Murray 		 hdb_entry *ent,
61b528cefcSMark Murray 		 u_int32_t required_mask,
62b528cefcSMark Murray 		 u_int32_t forbidden_mask)
63b528cefcSMark Murray {
64b528cefcSMark Murray     kadm5_ret_t ret;
65b528cefcSMark Murray     kadm5_principal_ent_rec defrec, *defent;
66b528cefcSMark Murray     u_int32_t def_mask;
67b528cefcSMark Murray 
68b528cefcSMark Murray     if((mask & required_mask) != required_mask)
69b528cefcSMark Murray 	return KADM5_BAD_MASK;
70b528cefcSMark Murray     if((mask & forbidden_mask))
71b528cefcSMark Murray 	return KADM5_BAD_MASK;
72b528cefcSMark Murray     if((mask & KADM5_POLICY) && strcmp(princ->policy, "default"))
73b528cefcSMark Murray 	/* XXX no real policies for now */
74b528cefcSMark Murray 	return KADM5_UNK_POLICY;
75b528cefcSMark Murray     memset(ent, 0, sizeof(*ent));
76b528cefcSMark Murray     ret  = krb5_copy_principal(context->context, princ->principal,
77b528cefcSMark Murray 			       &ent->principal);
78b528cefcSMark Murray     if(ret)
79b528cefcSMark Murray 	return ret;
80b528cefcSMark Murray 
81b528cefcSMark Murray     defent = &defrec;
82b528cefcSMark Murray     ret = get_default(context, princ->principal, defent);
83b528cefcSMark Murray     if(ret) {
84b528cefcSMark Murray 	defent   = NULL;
85b528cefcSMark Murray 	def_mask = 0;
86b528cefcSMark Murray     } else {
87b528cefcSMark Murray 	def_mask = KADM5_ATTRIBUTES | KADM5_MAX_LIFE | KADM5_MAX_RLIFE;
88b528cefcSMark Murray     }
89b528cefcSMark Murray 
905e9cd1aeSAssar Westerlund     ret = _kadm5_setup_entry(context,
915e9cd1aeSAssar Westerlund 			     ent, mask | def_mask,
92b528cefcSMark Murray 			     princ, mask,
93b528cefcSMark Murray 			     defent, def_mask);
94b528cefcSMark Murray     if(defent)
95b528cefcSMark Murray 	kadm5_free_principal_ent(context, defent);
96b528cefcSMark Murray 
97b528cefcSMark Murray     ent->created_by.time = time(NULL);
98b528cefcSMark Murray     ret = krb5_copy_principal(context->context, context->caller,
99b528cefcSMark Murray 			      &ent->created_by.principal);
100b528cefcSMark Murray 
101b528cefcSMark Murray     return ret;
102b528cefcSMark Murray }
103b528cefcSMark Murray 
104b528cefcSMark Murray kadm5_ret_t
105b528cefcSMark Murray kadm5_s_create_principal_with_key(void *server_handle,
106b528cefcSMark Murray 				  kadm5_principal_ent_t princ,
107b528cefcSMark Murray 				  u_int32_t mask)
108b528cefcSMark Murray {
109b528cefcSMark Murray     kadm5_ret_t ret;
110b528cefcSMark Murray     hdb_entry ent;
111b528cefcSMark Murray     kadm5_server_context *context = server_handle;
112b528cefcSMark Murray 
113b528cefcSMark Murray     ret = create_principal(context, princ, mask, &ent,
114b528cefcSMark Murray 			   KADM5_PRINCIPAL | KADM5_KEY_DATA,
115b528cefcSMark Murray 			   KADM5_LAST_PWD_CHANGE | KADM5_MOD_TIME
116b528cefcSMark Murray 			   | KADM5_MOD_NAME | KADM5_MKVNO
117b528cefcSMark Murray 			   | KADM5_AUX_ATTRIBUTES
118b528cefcSMark Murray 			   | KADM5_POLICY_CLR | KADM5_LAST_SUCCESS
119b528cefcSMark Murray 			   | KADM5_LAST_FAILED | KADM5_FAIL_AUTH_COUNT);
120b528cefcSMark Murray     if(ret)
121b528cefcSMark Murray 	goto out;
122b528cefcSMark Murray 
1235e9cd1aeSAssar Westerlund     ret = _kadm5_set_keys2(context, &ent, princ->n_key_data, princ->key_data);
124b528cefcSMark Murray     if(ret)
125b528cefcSMark Murray 	goto out;
126b528cefcSMark Murray 
1275e9cd1aeSAssar Westerlund     ret = hdb_seal_keys(context->context, context->db, &ent);
1285e9cd1aeSAssar Westerlund     if (ret)
1295e9cd1aeSAssar Westerlund 	goto out;
130b528cefcSMark Murray 
131b528cefcSMark Murray     kadm5_log_create (context, &ent);
132b528cefcSMark Murray 
133b528cefcSMark Murray     ret = context->db->open(context->context, context->db, O_RDWR, 0);
134b528cefcSMark Murray     if(ret)
135b528cefcSMark Murray 	goto out;
136b528cefcSMark Murray     ret = context->db->store(context->context, context->db, 0, &ent);
137b528cefcSMark Murray     context->db->close(context->context, context->db);
138b528cefcSMark Murray out:
139b528cefcSMark Murray     hdb_free_entry(context->context, &ent);
140b528cefcSMark Murray     return _kadm5_error_code(ret);
141b528cefcSMark Murray }
142b528cefcSMark Murray 
143b528cefcSMark Murray 
144b528cefcSMark Murray kadm5_ret_t
145b528cefcSMark Murray kadm5_s_create_principal(void *server_handle,
146b528cefcSMark Murray 			 kadm5_principal_ent_t princ,
147b528cefcSMark Murray 			 u_int32_t mask,
148b528cefcSMark Murray 			 char *password)
149b528cefcSMark Murray {
150b528cefcSMark Murray     kadm5_ret_t ret;
151b528cefcSMark Murray     hdb_entry ent;
152b528cefcSMark Murray     kadm5_server_context *context = server_handle;
153b528cefcSMark Murray 
154b528cefcSMark Murray     ret = create_principal(context, princ, mask, &ent,
155b528cefcSMark Murray 			   KADM5_PRINCIPAL,
156b528cefcSMark Murray 			   KADM5_LAST_PWD_CHANGE | KADM5_MOD_TIME
157b528cefcSMark Murray 			   | KADM5_MOD_NAME | KADM5_MKVNO
158b528cefcSMark Murray 			   | KADM5_AUX_ATTRIBUTES | KADM5_KEY_DATA
159b528cefcSMark Murray 			   | KADM5_POLICY_CLR | KADM5_LAST_SUCCESS
160b528cefcSMark Murray 			   | KADM5_LAST_FAILED | KADM5_FAIL_AUTH_COUNT);
161b528cefcSMark Murray     if(ret)
162b528cefcSMark Murray 	goto out;
163b528cefcSMark Murray 
164b528cefcSMark Murray     /* XXX this should be fixed */
165b528cefcSMark Murray     ent.keys.len = 4;
166b528cefcSMark Murray     ent.keys.val = calloc(ent.keys.len, sizeof(*ent.keys.val));
167b528cefcSMark Murray     ent.keys.val[0].key.keytype = ETYPE_DES_CBC_CRC;
168b528cefcSMark Murray     /* flag as version 4 compatible salt; ignored by _kadm5_set_keys
169b528cefcSMark Murray        if we don't want to be compatible */
170b528cefcSMark Murray     ent.keys.val[0].salt = calloc(1, sizeof(*ent.keys.val[0].salt));
171b528cefcSMark Murray     ent.keys.val[0].salt->type = hdb_pw_salt;
172b528cefcSMark Murray     ent.keys.val[1].key.keytype = ETYPE_DES_CBC_MD4;
173b528cefcSMark Murray     ent.keys.val[1].salt = calloc(1, sizeof(*ent.keys.val[1].salt));
174b528cefcSMark Murray     ent.keys.val[1].salt->type = hdb_pw_salt;
175b528cefcSMark Murray     ent.keys.val[2].key.keytype = ETYPE_DES_CBC_MD5;
176b528cefcSMark Murray     ent.keys.val[2].salt = calloc(1, sizeof(*ent.keys.val[2].salt));
177b528cefcSMark Murray     ent.keys.val[2].salt->type = hdb_pw_salt;
178b528cefcSMark Murray     ent.keys.val[3].key.keytype = ETYPE_DES3_CBC_SHA1;
179b528cefcSMark Murray     ret = _kadm5_set_keys(context, &ent, password);
1805e9cd1aeSAssar Westerlund     if (ret)
1815e9cd1aeSAssar Westerlund 	goto out;
182b528cefcSMark Murray 
1835e9cd1aeSAssar Westerlund     ret = hdb_seal_keys(context->context, context->db, &ent);
1845e9cd1aeSAssar Westerlund     if (ret)
1855e9cd1aeSAssar Westerlund 	goto out;
186b528cefcSMark Murray 
187b528cefcSMark Murray     kadm5_log_create (context, &ent);
188b528cefcSMark Murray 
189b528cefcSMark Murray     ret = context->db->open(context->context, context->db, O_RDWR, 0);
190b528cefcSMark Murray     if(ret)
191b528cefcSMark Murray 	goto out;
192b528cefcSMark Murray     ret = context->db->store(context->context, context->db, 0, &ent);
193b528cefcSMark Murray     context->db->close(context->context, context->db);
194b528cefcSMark Murray out:
195b528cefcSMark Murray     hdb_free_entry(context->context, &ent);
196b528cefcSMark Murray     return _kadm5_error_code(ret);
197b528cefcSMark Murray }
198b528cefcSMark Murray 
199