1 /* 2 * Copyright 2008 Sun Microsystems, Inc. All rights reserved. 3 * Use is subject to license terms. 4 */ 5 6 #pragma ident "%Z%%M% %I% %E% SMI" 7 8 /* 9 * WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING 10 * 11 * Openvision retains the copyright to derivative works of 12 * this source code. Do *NOT* create a derivative of this 13 * source code before consulting with your legal department. 14 * Do *NOT* integrate *ANY* of this source code into another 15 * product before consulting with your legal department. 16 * 17 * For further information, read the top-level Openvision 18 * copyright which is contained in the top-level MIT Kerberos 19 * copyright. 20 * 21 * WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING 22 * 23 */ 24 25 26 /* 27 * Copyright 1993 OpenVision Technologies, Inc., All Rights Reserved 28 * 29 */ 30 31 #include <gssapi/gssapi.h> 32 #include <gssapi_krb5.h> /* for gss_nt_krb5_name */ 33 #include <krb5.h> 34 #include <kadm5/admin.h> 35 #include <kadm5/kadm_rpc.h> 36 #include <kadm5/server_internal.h> 37 #include <kadm5/srv/server_acl.h> 38 #include <security/pam_appl.h> 39 40 #include <syslog.h> 41 #include <arpa/inet.h> /* inet_ntoa */ 42 #include <krb5/adm_proto.h> /* krb5_klog_syslog */ 43 #include <libintl.h> 44 #include "misc.h" 45 46 #define LOG_UNAUTH gettext("Unauthorized request: %s, %s, " \ 47 "client=%s, service=%s, addr=%s") 48 #define LOG_DONE gettext("Request: %s, %s, %s, client=%s, " \ 49 "service=%s, addr=%s") 50 51 extern gss_name_t gss_changepw_name; 52 extern gss_name_t gss_oldchangepw_name; 53 extern void * global_server_handle; 54 extern short l_port; 55 56 char buf[33]; 57 58 #define CHANGEPW_SERVICE(rqstp) \ 59 (cmp_gss_names_rel_1(acceptor_name(rqstp), gss_changepw_name) |\ 60 (gss_oldchangepw_name && \ 61 cmp_gss_names_rel_1(acceptor_name(rqstp), \ 62 gss_oldchangepw_name))) 63 64 65 static int gss_to_krb5_name(kadm5_server_handle_t handle, 66 gss_name_t gss_name, krb5_principal *princ); 67 68 static int gss_name_to_string(gss_name_t gss_name, gss_buffer_desc *str); 69 70 static gss_name_t acceptor_name(struct svc_req * rqstp); 71 72 kadm5_ret_t 73 kadm5_get_priv(void *server_handle, 74 long *privs, gss_name_t clnt); 75 76 gss_name_t 77 get_clnt_name(struct svc_req * rqstp) 78 { 79 OM_uint32 maj_stat, min_stat; 80 gss_name_t name; 81 rpc_gss_rawcred_t *raw_cred; 82 void *cookie; 83 gss_buffer_desc name_buff; 84 85 rpc_gss_getcred(rqstp, &raw_cred, NULL, &cookie); 86 name_buff.value = raw_cred->client_principal->name; 87 name_buff.length = raw_cred->client_principal->len; 88 maj_stat = gss_import_name(&min_stat, &name_buff, 89 (gss_OID) GSS_C_NT_EXPORT_NAME, &name); 90 if (maj_stat != GSS_S_COMPLETE) { 91 return (NULL); 92 } 93 return (name); 94 } 95 96 char * 97 client_addr(struct svc_req * req, char *buf) 98 { 99 struct sockaddr *ca; 100 u_char *b; 101 char *frontspace = " "; 102 103 /* 104 * Convert the caller's IP address to a dotted string 105 */ 106 ca = (struct sockaddr *) 107 svc_getrpccaller(req->rq_xprt)->buf; 108 109 if (ca->sa_family == AF_INET) { 110 b = (u_char *) & ((struct sockaddr_in *) ca)->sin_addr; 111 (void) sprintf(buf, "%s(%d.%d.%d.%d) ", frontspace, 112 b[0] & 0xFF, b[1] & 0xFF, b[2] & 0xFF, b[3] & 0xFF); 113 } else { 114 /* 115 * No IP address to print. If there was a host name 116 * printed, then we print a space. 117 */ 118 (void) sprintf(buf, frontspace); 119 } 120 121 return (buf); 122 } 123 124 static int cmp_gss_names(gss_name_t n1, gss_name_t n2) 125 { 126 OM_uint32 emaj, emin; 127 int equal; 128 129 if (GSS_ERROR(emaj = gss_compare_name(&emin, n1, n2, &equal))) 130 return(0); 131 132 return(equal); 133 } 134 135 /* Does a comparison of the names and then releases the first entity */ 136 /* For use above in CHANGEPW_SERVICE */ 137 static int cmp_gss_names_rel_1(gss_name_t n1, gss_name_t n2) 138 { 139 OM_uint32 min_stat; 140 int ret; 141 142 ret = cmp_gss_names(n1, n2); 143 if (n1) (void) gss_release_name(&min_stat, &n1); 144 return ret; 145 } 146 147 /* 148 * Function check_handle 149 * 150 * Purpose: Check a server handle and return a com_err code if it is 151 * invalid or 0 if it is valid. 152 * 153 * Arguments: 154 * 155 * handle The server handle. 156 */ 157 158 static int check_handle(void *handle) 159 { 160 CHECK_HANDLE(handle); 161 return 0; 162 } 163 164 /* 165 * Function: new_server_handle 166 * 167 * Purpose: Constructs a server handle suitable for passing into the 168 * server library API functions, by folding the client's API version 169 * and calling principal into the server handle returned by 170 * kadm5_init. 171 * 172 * Arguments: 173 * api_version (input) The API version specified by the client 174 * rqstp (input) The RPC request 175 * handle (output) The returned handle 176 * <return value> (output) An error code, or 0 if no error occurred 177 * 178 * Effects: 179 * Returns a pointer to allocated storage containing the server 180 * handle. If an error occurs, then no allocated storage is 181 * returned, and the return value of the function will be a 182 * non-zero com_err code. 183 * 184 * The allocated storage for the handle should be freed with 185 * free_server_handle (see below) when it is no longer needed. 186 */ 187 188 static kadm5_ret_t new_server_handle(krb5_ui_4 api_version, 189 struct svc_req *rqstp, 190 kadm5_server_handle_t 191 *out_handle) 192 { 193 kadm5_server_handle_t handle; 194 gss_name_t name; 195 OM_uint32 min_stat; 196 197 if (! (handle = (kadm5_server_handle_t) 198 malloc(sizeof(*handle)))) 199 return ENOMEM; 200 201 *handle = *(kadm5_server_handle_t)global_server_handle; 202 handle->api_version = api_version; 203 204 if (!(name = get_clnt_name(rqstp))) { 205 free(handle); 206 return KADM5_FAILURE; 207 } 208 if (! gss_to_krb5_name(handle, name, &handle->current_caller)) { 209 free(handle); 210 gss_release_name(&min_stat, &name); 211 return KADM5_FAILURE; 212 } 213 gss_release_name(&min_stat, &name); 214 215 *out_handle = handle; 216 return 0; 217 } 218 219 /* 220 * Function: free_server_handle 221 * 222 * Purpose: Free handle memory allocated by new_server_handle 223 * 224 * Arguments: 225 * handle (input/output) The handle to free 226 */ 227 static void free_server_handle(kadm5_server_handle_t handle) 228 { 229 krb5_free_principal(handle->context, handle->current_caller); 230 free(handle); 231 } 232 233 /* 234 * Function: setup_gss_names 235 * 236 * Purpose: Create printable representations of the client and server 237 * names. 238 * 239 * Arguments: 240 * rqstp (r) the RPC request 241 * client_name (w) pointer to client_name string 242 * server_name (w) pointer to server_name string 243 * 244 * Effects: 245 * 246 * Unparses the client and server names into client_name and 247 * server_name, both of which must be freed by the caller. Returns 0 248 * on success and -1 on failure. On failure client_name and server_name 249 * will point to null. 250 */ 251 /* SUNW14resync */ 252 int setup_gss_names(struct svc_req *rqstp, 253 char **client_name, char **server_name) 254 { 255 OM_uint32 maj_stat, min_stat; 256 rpc_gss_rawcred_t *raw_cred; 257 gss_buffer_desc name_buf; 258 char *tmp, *val; 259 size_t len; 260 gss_name_t name; 261 262 *client_name = NULL; 263 264 rpc_gss_getcred(rqstp, &raw_cred, NULL, NULL); 265 266 /* Return a copy of the service principal from the raw_cred */ 267 *server_name = strdup(raw_cred->svc_principal); 268 269 if (*server_name == NULL) 270 return (-1); 271 272 if (!(name = get_clnt_name(rqstp))) { 273 free(*server_name); 274 *server_name = NULL; 275 return (-1); 276 } 277 maj_stat = gss_display_name(&min_stat, name, &name_buf, NULL); 278 if (maj_stat != GSS_S_COMPLETE) { 279 free(*server_name); 280 gss_release_name(&min_stat, &name); 281 *server_name = NULL; 282 return (-1); 283 } 284 gss_release_name(&min_stat, &name); 285 286 /* 287 * Allocate space to copy the client principal. We allocate an 288 * extra byte to make the string null terminated if we need to. 289 */ 290 291 val = name_buf.value; 292 len = name_buf.length + (val[name_buf.length - 1] != '\0'); 293 294 /* len is the length including the null terminating byte. */ 295 296 tmp = malloc(len); 297 if (tmp) { 298 memcpy(tmp, val, len - 1); 299 tmp[len - 1] = '\0'; 300 } else { 301 free(*server_name); 302 *server_name = NULL; 303 } 304 305 /* Were done with the GSS buffer */ 306 (void) gss_release_buffer(&min_stat, &name_buf); 307 308 *client_name = tmp; 309 310 return (tmp ? 0 : -1); 311 } 312 313 static gss_name_t acceptor_name(struct svc_req * rqstp) 314 { 315 OM_uint32 maj_stat, min_stat; 316 gss_name_t name; 317 rpc_gss_rawcred_t *raw_cred; 318 void *cookie; 319 gss_buffer_desc name_buff; 320 321 rpc_gss_getcred(rqstp, &raw_cred, NULL, &cookie); 322 name_buff.value = raw_cred->svc_principal; 323 name_buff.length = strlen(raw_cred->svc_principal); 324 maj_stat = gss_import_name(&min_stat, &name_buff, 325 (gss_OID) gss_nt_krb5_name, &name); 326 if (maj_stat != GSS_S_COMPLETE) { 327 gss_release_buffer(&min_stat, &name_buff); 328 return (NULL); 329 } 330 maj_stat = gss_display_name(&min_stat, name, &name_buff, NULL); 331 if (maj_stat != GSS_S_COMPLETE) { 332 gss_release_buffer(&min_stat, &name_buff); 333 return (NULL); 334 } 335 gss_release_buffer(&min_stat, &name_buff); 336 337 return name; 338 } 339 340 static int cmp_gss_krb5_name(kadm5_server_handle_t handle, 341 gss_name_t gss_name, krb5_principal princ) 342 { 343 krb5_principal princ2; 344 int status; 345 346 if (! gss_to_krb5_name(handle, gss_name, &princ2)) 347 return 0; 348 status = krb5_principal_compare(handle->context, princ, princ2); 349 krb5_free_principal(handle->context, princ2); 350 return status; 351 } 352 353 354 /* 355 * This routine primarily validates the username and password 356 * of the principal to be created, if a prior acl check for 357 * the 'u' privilege succeeds. Validation is done using 358 * the PAM `k5migrate' service. k5migrate normally stacks 359 * pam_unix_auth.so and pam_unix_account.so in its auth and 360 * account stacks respectively. 361 * 362 * Returns 1 (true), if validation is successful, 363 * else returns 0 (false). 364 */ 365 int verify_pam_pw(char *userdata, char *pwd) { 366 pam_handle_t *pamh; 367 int err = 0; 368 int result = 1; 369 char *user = NULL; 370 char *ptr = NULL; 371 372 ptr = strchr(userdata, '@'); 373 if (ptr != NULL) { 374 user = (char *)malloc(ptr - userdata + 1); 375 (void) strlcpy(user, userdata, (ptr - userdata) + 1); 376 } else { 377 user = (char *)strdup(userdata); 378 } 379 380 err = pam_start("k5migrate", user, NULL, &pamh); 381 if (err != PAM_SUCCESS) { 382 syslog(LOG_ERR, "verify_pam_pw: pam_start() failed, %s\n", 383 pam_strerror(pamh, err)); 384 if (user) 385 free(user); 386 return (0); 387 } 388 if (user) 389 free(user); 390 391 err = pam_set_item(pamh, PAM_AUTHTOK, (void *)pwd); 392 if (err != PAM_SUCCESS) { 393 syslog(LOG_ERR, "verify_pam_pw: pam_set_item() failed, %s\n", 394 pam_strerror(pamh, err)); 395 (void) pam_end(pamh, err); 396 return (0); 397 } 398 399 err = pam_authenticate(pamh, PAM_SILENT); 400 if (err != PAM_SUCCESS) { 401 syslog(LOG_ERR, "verify_pam_pw: pam_authenticate() " 402 "failed, %s\n", pam_strerror(pamh, err)); 403 (void) pam_end(pamh, err); 404 return (0); 405 } 406 407 err = pam_acct_mgmt(pamh, PAM_SILENT); 408 if (err != PAM_SUCCESS) { 409 syslog(LOG_ERR, "verify_pam_pw: pam_acct_mgmt() failed, %s\n", 410 pam_strerror(pamh, err)); 411 (void) pam_end(pamh, err); 412 return (0); 413 } 414 415 (void) pam_end(pamh, PAM_SUCCESS); 416 return (result); 417 } 418 419 static int gss_to_krb5_name(kadm5_server_handle_t handle, 420 gss_name_t gss_name, krb5_principal *princ) 421 { 422 OM_uint32 status, minor_stat; 423 gss_buffer_desc gss_str; 424 gss_OID gss_type; 425 int success; 426 427 status = gss_display_name(&minor_stat, gss_name, &gss_str, &gss_type); 428 if ((status != GSS_S_COMPLETE) || (!g_OID_equal(gss_type, gss_nt_krb5_name))) 429 return 0; 430 success = (krb5_parse_name(handle->context, gss_str.value, princ) == 0); 431 gss_release_buffer(&minor_stat, &gss_str); 432 return success; 433 } 434 435 static int 436 gss_name_to_string(gss_name_t gss_name, gss_buffer_desc *str) 437 { 438 OM_uint32 status, minor_stat; 439 gss_OID gss_type; 440 441 status = gss_display_name(&minor_stat, gss_name, str, &gss_type); 442 if ((status != GSS_S_COMPLETE) || (gss_type != gss_nt_krb5_name)) 443 return 1; 444 return 0; 445 } 446 447 static int 448 log_unauth( 449 char *op, 450 char *target, 451 char *client, 452 char *server, 453 char *addr) 454 { 455 size_t tlen, clen, slen; 456 char *tdots, *cdots, *sdots; 457 458 tlen = strlen(target); 459 trunc_name(&tlen, &tdots); 460 clen = strlen(client); 461 trunc_name(&clen, &cdots); 462 slen = strlen(server); 463 trunc_name(&slen, &sdots); 464 465 return krb5_klog_syslog(LOG_NOTICE, 466 "Unauthorized request: %s, %.*s%s, " 467 "client=%.*s%s, service=%.*s%s, addr=%s", 468 op, tlen, target, tdots, 469 clen, client, cdots, 470 slen, server, sdots, 471 addr); 472 } 473 474 static int 475 log_done( 476 char *op, 477 char *target, 478 const char *errmsg, 479 char *client, 480 char *server, 481 char *addr) 482 { 483 size_t tlen, clen, slen; 484 char *tdots, *cdots, *sdots; 485 486 tlen = strlen(target); 487 trunc_name(&tlen, &tdots); 488 clen = strlen(client); 489 trunc_name(&clen, &cdots); 490 slen = strlen(server); 491 trunc_name(&slen, &sdots); 492 493 return krb5_klog_syslog(LOG_NOTICE, 494 "Request: %s, %.*s%s, %s, " 495 "client=%.*s%s, service=%.*s%s, addr=%s", 496 op, tlen, target, tdots, errmsg, 497 clen, client, cdots, 498 slen, server, sdots, 499 addr); 500 } 501 502 generic_ret * 503 create_principal_1_svc(cprinc_arg *arg, struct svc_req *rqstp) 504 { 505 static generic_ret ret; 506 char *prime_arg = NULL; 507 char *client_name = NULL, *service_name = NULL; 508 int policy_migrate = 0; 509 510 OM_uint32 minor_stat; 511 kadm5_server_handle_t handle; 512 kadm5_ret_t retval; 513 restriction_t *rp; 514 gss_name_t name = NULL; 515 516 xdr_free(xdr_generic_ret, (char *) &ret); 517 518 if ((ret.code = new_server_handle(arg->api_version, rqstp, &handle))) 519 return &ret; 520 521 if ((ret.code = check_handle((void *)handle))) 522 goto error; 523 ret.api_version = handle->api_version; 524 525 if (setup_gss_names(rqstp, &client_name, &service_name) < 0) { 526 ret.code = KADM5_FAILURE; 527 goto error; 528 } 529 if (krb5_unparse_name(handle->context, arg->rec.principal, &prime_arg)) { 530 ret.code = KADM5_BAD_PRINCIPAL; 531 goto error; 532 } 533 if (!(name = get_clnt_name(rqstp))) { 534 ret.code = KADM5_FAILURE; 535 goto error; 536 } 537 538 if (kadm5int_acl_check(handle->context, name, ACL_MIGRATE, 539 arg->rec.principal, &rp) && 540 verify_pam_pw(prime_arg, arg->passwd)) { 541 policy_migrate = 1; 542 } 543 544 if (CHANGEPW_SERVICE(rqstp) 545 || (!kadm5int_acl_check(handle->context, name, ACL_ADD, 546 arg->rec.principal, &rp) && 547 !(policy_migrate)) 548 || kadm5int_acl_impose_restrictions(handle->context, 549 &arg->rec, &arg->mask, rp)) { 550 ret.code = KADM5_AUTH_ADD; 551 552 audit_kadmind_unauth(rqstp->rq_xprt, l_port, 553 "kadm5_create_principal", 554 prime_arg, client_name); 555 log_unauth("kadm5_create_principal", prime_arg, 556 client_name, service_name, client_addr(rqstp, buf)); 557 } else { 558 ret.code = kadm5_create_principal((void *)handle, 559 &arg->rec, arg->mask, 560 arg->passwd); 561 562 audit_kadmind_auth(rqstp->rq_xprt, l_port, 563 "kadm5_create_principal", 564 prime_arg, client_name, ret.code); 565 log_done("kadm5_create_principal", prime_arg, 566 ((ret.code == 0) ? "success" : error_message(ret.code)), 567 client_name, service_name, client_addr(rqstp, buf)); 568 569 if (policy_migrate && (ret.code == 0)) { 570 arg->rec.policy = strdup("default"); 571 if ((arg->mask & KADM5_PW_EXPIRATION)) { 572 arg->mask = 0; 573 arg->mask |= KADM5_POLICY; 574 arg->mask |= KADM5_PW_EXPIRATION; 575 } else { 576 arg->mask = 0; 577 arg->mask |= KADM5_POLICY; 578 } 579 580 retval = kadm5_modify_principal((void *)handle, 581 &arg->rec, arg->mask); 582 log_done("kadm5_modify_principal", 583 prime_arg, ((retval == 0) ? "success" : 584 error_message(retval)), client_name, 585 service_name, client_addr(rqstp, buf)); 586 } 587 } 588 589 error: 590 if (name) 591 gss_release_name(&minor_stat, &name); 592 free_server_handle(handle); 593 if (prime_arg) 594 free(prime_arg); 595 if (client_name) 596 free(client_name); 597 if (service_name) 598 free(service_name); 599 return (&ret); 600 } 601 602 generic_ret * 603 create_principal3_1_svc(cprinc3_arg *arg, struct svc_req *rqstp) 604 { 605 static generic_ret ret; 606 char *prime_arg = NULL; 607 char *client_name = NULL, *service_name = NULL; 608 int policy_migrate = 0; 609 610 OM_uint32 minor_stat; 611 kadm5_server_handle_t handle; 612 kadm5_ret_t retval; 613 restriction_t *rp; 614 gss_name_t name = NULL; 615 616 xdr_free(xdr_generic_ret, (char *) &ret); 617 618 if ((ret.code = new_server_handle(arg->api_version, rqstp, &handle))) 619 return &ret; 620 621 if ((ret.code = check_handle((void *)handle))) 622 goto error; 623 ret.api_version = handle->api_version; 624 625 if (setup_gss_names(rqstp, &client_name, &service_name) < 0) { 626 ret.code = KADM5_FAILURE; 627 goto error; 628 } 629 if (krb5_unparse_name(handle->context, arg->rec.principal, &prime_arg)) { 630 ret.code = KADM5_BAD_PRINCIPAL; 631 goto error; 632 } 633 if (!(name = get_clnt_name(rqstp))) { 634 ret.code = KADM5_FAILURE; 635 goto error; 636 } 637 638 if (kadm5int_acl_check(handle->context, name, ACL_MIGRATE, 639 arg->rec.principal, &rp) && 640 verify_pam_pw(prime_arg, arg->passwd)) { 641 policy_migrate = 1; 642 } 643 644 if (CHANGEPW_SERVICE(rqstp) 645 || (!kadm5int_acl_check(handle->context, name, ACL_ADD, 646 arg->rec.principal, &rp) && 647 !(policy_migrate)) 648 || kadm5int_acl_impose_restrictions(handle->context, 649 &arg->rec, &arg->mask, rp)) { 650 ret.code = KADM5_AUTH_ADD; 651 log_unauth("kadm5_create_principal", prime_arg, 652 client_name, service_name, client_addr(rqstp, buf)); 653 } else { 654 ret.code = kadm5_create_principal_3((void *)handle, 655 &arg->rec, arg->mask, 656 arg->n_ks_tuple, 657 arg->ks_tuple, 658 arg->passwd); 659 log_done("kadm5_create_principal", prime_arg, 660 ((ret.code == 0) ? "success" : error_message(ret.code)), 661 client_name, service_name, client_addr(rqstp, buf)); 662 663 if (policy_migrate && (ret.code == 0)) { 664 arg->rec.policy = strdup("default"); 665 if ((arg->mask & KADM5_PW_EXPIRATION)) { 666 arg->mask = 0; 667 arg->mask |= KADM5_POLICY; 668 arg->mask |= KADM5_PW_EXPIRATION; 669 } else { 670 arg->mask = 0; 671 arg->mask |= KADM5_POLICY; 672 } 673 674 retval = kadm5_modify_principal((void *)handle, 675 &arg->rec, arg->mask); 676 log_done("kadm5_modify_principal", prime_arg, 677 ((retval == 0) ? "success" : error_message(retval)), 678 client_name, service_name, client_addr(rqstp, buf)); 679 } 680 } 681 682 error: 683 if (name) 684 gss_release_name(&minor_stat, &name); 685 free_server_handle(handle); 686 if (client_name) 687 free(client_name); 688 if (service_name) 689 free(service_name); 690 if (prime_arg) 691 free(prime_arg); 692 return &ret; 693 } 694 695 generic_ret * 696 delete_principal_1_svc(dprinc_arg *arg, struct svc_req *rqstp) 697 { 698 static generic_ret ret; 699 char *prime_arg = NULL; 700 char *client_name = NULL, *service_name = NULL; 701 OM_uint32 min_stat; 702 kadm5_server_handle_t handle; 703 gss_name_t name = NULL; 704 705 xdr_free(xdr_generic_ret, (char *) &ret); 706 707 if ((ret.code = new_server_handle(arg->api_version, rqstp, &handle))) 708 return &ret; 709 710 if ((ret.code = check_handle((void *)handle))) 711 goto error; 712 ret.api_version = handle->api_version; 713 714 if (setup_gss_names(rqstp, &client_name, &service_name) < 0) { 715 ret.code = KADM5_FAILURE; 716 goto error; 717 } 718 if (krb5_unparse_name(handle->context, arg->princ, &prime_arg)) { 719 ret.code = KADM5_BAD_PRINCIPAL; 720 goto error; 721 } 722 if (!(name = get_clnt_name(rqstp))) { 723 ret.code = KADM5_FAILURE; 724 goto error; 725 } 726 727 if (CHANGEPW_SERVICE(rqstp) 728 || !kadm5int_acl_check(handle->context, name, ACL_DELETE, 729 arg->princ, NULL)) { 730 ret.code = KADM5_AUTH_DELETE; 731 732 audit_kadmind_unauth(rqstp->rq_xprt, l_port, 733 "kadm5_delete_principal", 734 prime_arg, client_name); 735 log_unauth("kadm5_delete_principal", prime_arg, client_name, 736 service_name, client_addr(rqstp, buf)); 737 } else { 738 ret.code = kadm5_delete_principal((void *)handle, arg->princ); 739 740 audit_kadmind_auth(rqstp->rq_xprt, l_port, 741 "kadm5_delete_principal", 742 prime_arg, client_name, ret.code); 743 log_done("kadm5_delete_principal", prime_arg, 744 ((ret.code == 0) ? "success" : error_message(ret.code)), 745 client_name, service_name, client_addr(rqstp, buf)); 746 } 747 748 error: 749 if (name) 750 gss_release_name(&min_stat, &name); 751 if (prime_arg) 752 free(prime_arg); 753 free_server_handle(handle); 754 if (client_name) 755 free(client_name); 756 if (service_name) 757 free(service_name); 758 return &ret; 759 } 760 761 generic_ret * 762 modify_principal_1_svc(mprinc_arg *arg, struct svc_req *rqstp) 763 { 764 static generic_ret ret; 765 char *prime_arg = NULL; 766 char *client_name = NULL, *service_name = NULL; 767 OM_uint32 min_stat; 768 kadm5_server_handle_t handle; 769 restriction_t *rp; 770 gss_name_t name = NULL; 771 772 xdr_free(xdr_generic_ret, (char *) &ret); 773 774 if ((ret.code = new_server_handle(arg->api_version, rqstp, &handle))) 775 return &ret; 776 777 if ((ret.code = check_handle((void *)handle))) 778 goto error; 779 if (setup_gss_names(rqstp, &client_name, &service_name) < 0) { 780 ret.code = KADM5_FAILURE; 781 goto error; 782 } 783 if (krb5_unparse_name(handle->context, arg->rec.principal, &prime_arg)) { 784 ret.code = KADM5_BAD_PRINCIPAL; 785 goto error; 786 } 787 if (!(name = get_clnt_name(rqstp))) { 788 ret.code = KADM5_FAILURE; 789 goto error; 790 } 791 792 if (CHANGEPW_SERVICE(rqstp) 793 || !kadm5int_acl_check(handle->context, name, ACL_MODIFY, 794 arg->rec.principal, &rp) 795 || kadm5int_acl_impose_restrictions(handle->context, 796 &arg->rec, &arg->mask, rp)) { 797 ret.code = KADM5_AUTH_MODIFY; 798 799 audit_kadmind_unauth(rqstp->rq_xprt, l_port, 800 "kadm5_modify_principal", 801 prime_arg, client_name); 802 log_unauth("kadm5_modify_principal", prime_arg, client_name, 803 service_name, client_addr(rqstp, buf)); 804 } else { 805 ret.code = kadm5_modify_principal((void *)handle, &arg->rec, 806 arg->mask); 807 808 audit_kadmind_auth(rqstp->rq_xprt, l_port, 809 "kadm5_modify_principal", 810 prime_arg, client_name, ret.code); 811 log_done("kadm5_modify_principal", prime_arg, 812 ((ret.code == 0) ? "success" : error_message(ret.code)), 813 client_name, service_name, client_addr(rqstp, buf)); 814 } 815 816 error: 817 if (name) 818 gss_release_name(&min_stat, &name); 819 free_server_handle(handle); 820 if (prime_arg) 821 free(prime_arg); 822 if (client_name) 823 free(client_name); 824 if (service_name) 825 free(service_name); 826 return &ret; 827 } 828 829 generic_ret * 830 rename_principal_1_svc(rprinc_arg *arg, struct svc_req *rqstp) 831 { 832 static generic_ret ret; 833 char *prime_arg1 = NULL, *prime_arg2 = NULL; 834 char prime_arg[BUFSIZ]; 835 char *client_name = NULL, *service_name = NULL; 836 OM_uint32 min_stat; 837 kadm5_server_handle_t handle; 838 restriction_t *rp; 839 gss_name_t name = NULL; 840 size_t tlen1, tlen2, clen, slen; 841 char *tdots1, *tdots2, *cdots, *sdots; 842 843 xdr_free(xdr_generic_ret, (char *) &ret); 844 845 if ((ret.code = new_server_handle(arg->api_version, rqstp, &handle))) 846 return &ret; 847 848 if ((ret.code = check_handle((void *)handle))) 849 goto error; 850 if (setup_gss_names(rqstp, &client_name, &service_name) < 0) { 851 ret.code = KADM5_FAILURE; 852 goto error; 853 } 854 if (krb5_unparse_name(handle->context, arg->src, &prime_arg1) || 855 krb5_unparse_name(handle->context, arg->dest, &prime_arg2)) { 856 ret.code = KADM5_BAD_PRINCIPAL; 857 goto error; 858 } 859 tlen1 = strlen(prime_arg1); 860 trunc_name(&tlen1, &tdots1); 861 tlen2 = strlen(prime_arg2); 862 trunc_name(&tlen2, &tdots2); 863 clen = strlen(client_name); 864 trunc_name(&clen, &cdots); 865 slen = strlen(service_name); 866 trunc_name(&slen, &sdots); 867 868 (void) snprintf(prime_arg, sizeof (prime_arg), "%.*s%s to %.*s*s", 869 tlen1, prime_arg1, tdots1, 870 tlen2, prime_arg2, tdots2); 871 ret.code = KADM5_OK; 872 873 if (!(name = get_clnt_name(rqstp))) { 874 ret.code = KADM5_FAILURE; 875 goto error; 876 } 877 878 if (! CHANGEPW_SERVICE(rqstp)) { 879 if (!kadm5int_acl_check(handle->context, name, 880 ACL_DELETE, arg->src, NULL)) 881 ret.code = KADM5_AUTH_DELETE; 882 /* any restrictions at all on the ADD kills the RENAME */ 883 if (!kadm5int_acl_check(handle->context, name, 884 ACL_ADD, arg->dest, &rp)) { 885 if (ret.code == KADM5_AUTH_DELETE) 886 ret.code = KADM5_AUTH_INSUFFICIENT; 887 else 888 ret.code = KADM5_AUTH_ADD; 889 } 890 } else 891 ret.code = KADM5_AUTH_INSUFFICIENT; 892 if (ret.code != KADM5_OK) { 893 894 audit_kadmind_unauth(rqstp->rq_xprt, l_port, 895 "kadm5_rename_principal", 896 prime_arg, client_name); 897 krb5_klog_syslog(LOG_NOTICE, 898 "Unauthorized request: kadm5_rename_principal, " 899 "%.*s%s to %.*s%s, " 900 "client=%.*s%s, service=%.*s%s, addr=%s", 901 tlen1, prime_arg1, tdots1, 902 tlen2, prime_arg2, tdots2, 903 clen, client_name, cdots, 904 slen, service_name, sdots, 905 client_addr(rqstp, buf)); 906 } else { 907 ret.code = kadm5_rename_principal((void *)handle, arg->src, 908 arg->dest); 909 910 audit_kadmind_auth(rqstp->rq_xprt, l_port, 911 "kadm5_rename_principal", 912 prime_arg, client_name, ret.code); 913 krb5_klog_syslog(LOG_NOTICE, 914 "Request: kadm5_rename_principal, " 915 "%.*s%s to %.*s%s, %s, " 916 "client=%.*s%s, service=%.*s%s, addr=%s", 917 tlen1, prime_arg1, tdots1, 918 tlen2, prime_arg2, tdots2, 919 clen, client_name, cdots, 920 slen, service_name, sdots, 921 client_addr(rqstp, buf)); 922 } 923 924 error: 925 if (name) 926 gss_release_name(&min_stat, &name); 927 free_server_handle(handle); 928 if (prime_arg1) 929 free(prime_arg1); 930 if (prime_arg2) 931 free(prime_arg2); 932 if (client_name) 933 free(client_name); 934 if (service_name) 935 free(service_name); 936 return &ret; 937 } 938 939 gprinc_ret * 940 get_principal_1_svc(gprinc_arg *arg, struct svc_req *rqstp) 941 { 942 static gprinc_ret ret; 943 kadm5_principal_ent_t_v1 e; 944 char *prime_arg = NULL, *funcname; 945 char *client_name = NULL, *service_name = NULL; 946 OM_uint32 min_stat; 947 kadm5_server_handle_t handle; 948 gss_name_t name = NULL; 949 950 xdr_free(xdr_gprinc_ret, (char *) &ret); 951 952 if ((ret.code = new_server_handle(arg->api_version, rqstp, &handle))) 953 return &ret; 954 955 if ((ret.code = check_handle((void *)handle))) 956 goto error; 957 ret.api_version = handle->api_version; 958 959 funcname = handle->api_version == KADM5_API_VERSION_1 ? 960 "kadm5_get_principal (V1)" : "kadm5_get_principal"; 961 962 if (setup_gss_names(rqstp, &client_name, &service_name) < 0) { 963 ret.code = KADM5_FAILURE; 964 goto error; 965 } 966 if (krb5_unparse_name(handle->context, arg->princ, &prime_arg)) { 967 ret.code = KADM5_BAD_PRINCIPAL; 968 goto error; 969 } 970 if (!(name = get_clnt_name(rqstp))) { 971 ret.code = KADM5_FAILURE; 972 goto error; 973 } 974 975 if (! cmp_gss_krb5_name(handle, name, arg->princ) && 976 (CHANGEPW_SERVICE(rqstp) || !kadm5int_acl_check(handle->context, 977 name, 978 ACL_INQUIRE, 979 arg->princ, 980 NULL))) { 981 ret.code = KADM5_AUTH_GET; 982 983 audit_kadmind_unauth(rqstp->rq_xprt, l_port, 984 funcname, 985 prime_arg, client_name); 986 log_unauth(funcname, prime_arg, client_name, service_name, 987 client_addr(rqstp, buf)); 988 } else { 989 if (handle->api_version == KADM5_API_VERSION_1) { 990 ret.code = kadm5_get_principal_v1((void *)handle, 991 arg->princ, &e); 992 if(ret.code == KADM5_OK) { 993 memcpy(&ret.rec, e, sizeof(kadm5_principal_ent_rec_v1)); 994 free(e); 995 } 996 } else { 997 ret.code = kadm5_get_principal((void *)handle, 998 arg->princ, &ret.rec, 999 arg->mask); 1000 } 1001 1002 audit_kadmind_auth(rqstp->rq_xprt, l_port, 1003 funcname, 1004 prime_arg, client_name, ret.code); 1005 log_done(funcname, prime_arg, 1006 ((ret.code == 0) ? "success" : error_message(ret.code)), 1007 client_name, service_name, client_addr(rqstp, buf)); 1008 } 1009 1010 error: 1011 if (name) 1012 gss_release_name(&min_stat, &name); 1013 free_server_handle(handle); 1014 if (prime_arg) 1015 free(prime_arg); 1016 if (client_name) 1017 free(client_name); 1018 if (service_name) 1019 free(service_name); 1020 return &ret; 1021 } 1022 1023 gprincs_ret * 1024 get_princs_1_svc(gprincs_arg *arg, struct svc_req *rqstp) 1025 { 1026 static gprincs_ret ret; 1027 char *prime_arg = NULL; 1028 char *client_name = NULL, *service_name = NULL; 1029 OM_uint32 min_stat; 1030 kadm5_server_handle_t handle; 1031 gss_name_t name = NULL; 1032 1033 xdr_free(xdr_gprincs_ret, (char *) &ret); 1034 1035 if ((ret.code = new_server_handle(arg->api_version, rqstp, &handle))) 1036 return &ret; 1037 1038 if ((ret.code = check_handle((void *)handle))) 1039 goto error; 1040 ret.api_version = handle->api_version; 1041 1042 if (setup_gss_names(rqstp, &client_name, &service_name) < 0) { 1043 ret.code = KADM5_FAILURE; 1044 goto error; 1045 } 1046 prime_arg = arg->exp; 1047 if (prime_arg == NULL) 1048 prime_arg = "*"; 1049 1050 if (!(name = get_clnt_name(rqstp))) { 1051 ret.code = KADM5_FAILURE; 1052 goto error; 1053 } 1054 1055 if (CHANGEPW_SERVICE(rqstp) || !kadm5int_acl_check(handle->context, 1056 name, 1057 ACL_LIST, 1058 NULL, 1059 NULL)) { 1060 ret.code = KADM5_AUTH_LIST; 1061 1062 audit_kadmind_unauth(rqstp->rq_xprt, l_port, 1063 "kadm5_get_principals", 1064 prime_arg, client_name); 1065 log_unauth("kadm5_get_principals", prime_arg, client_name, 1066 service_name, client_addr(rqstp, buf)); 1067 } else { 1068 ret.code = kadm5_get_principals((void *)handle, 1069 arg->exp, &ret.princs, 1070 &ret.count); 1071 1072 audit_kadmind_auth(rqstp->rq_xprt, l_port, 1073 "kadm5_get_principals", 1074 prime_arg, client_name, ret.code); 1075 log_done("kadm5_get_principals", prime_arg, 1076 ((ret.code == 0) ? "success" : error_message(ret.code)), 1077 client_name, service_name, client_addr(rqstp, buf)); 1078 } 1079 1080 error: 1081 if (name) 1082 gss_release_name(&min_stat, &name); 1083 free_server_handle(handle); 1084 if (client_name) 1085 free(client_name); 1086 if (service_name) 1087 free(service_name); 1088 return (&ret); 1089 } 1090 1091 generic_ret * 1092 chpass_principal_1_svc(chpass_arg *arg, struct svc_req *rqstp) 1093 { 1094 static generic_ret ret; 1095 char *prime_arg = NULL; 1096 char *client_name = NULL, *service_name = NULL; 1097 OM_uint32 min_stat; 1098 kadm5_server_handle_t handle; 1099 gss_name_t name = NULL; 1100 1101 xdr_free(xdr_generic_ret, (char *) &ret); 1102 1103 if ((ret.code = new_server_handle(arg->api_version, rqstp, &handle))) 1104 return &ret; 1105 1106 if ((ret.code = check_handle((void *)handle))) 1107 goto error; 1108 ret.api_version = handle->api_version; 1109 1110 if (setup_gss_names(rqstp, &client_name, &service_name) < 0) { 1111 ret.code = KADM5_FAILURE; 1112 goto error; 1113 } 1114 if (krb5_unparse_name(handle->context, arg->princ, &prime_arg)) { 1115 ret.code = KADM5_BAD_PRINCIPAL; 1116 goto error; 1117 } 1118 if (!(name = get_clnt_name(rqstp))) { 1119 ret.code = KADM5_FAILURE; 1120 goto error; 1121 } 1122 1123 if (cmp_gss_krb5_name(handle, name, arg->princ)) { 1124 ret.code = chpass_principal_wrapper_3((void *)handle, arg->princ, 1125 FALSE, 0, NULL, arg->pass); 1126 } else if (!(CHANGEPW_SERVICE(rqstp)) && 1127 kadm5int_acl_check(handle->context, name, 1128 ACL_CHANGEPW, arg->princ, NULL)) { 1129 ret.code = kadm5_chpass_principal((void *)handle, arg->princ, 1130 arg->pass); 1131 } else { 1132 audit_kadmind_unauth(rqstp->rq_xprt, l_port, 1133 "kadm5_chpass_principal", 1134 prime_arg, client_name); 1135 log_unauth("kadm5_chpass_principal", prime_arg, client_name, 1136 service_name, client_addr(rqstp, buf)); 1137 ret.code = KADM5_AUTH_CHANGEPW; 1138 } 1139 1140 if(ret.code != KADM5_AUTH_CHANGEPW) { 1141 audit_kadmind_auth(rqstp->rq_xprt, l_port, 1142 "kadm5_chpass_principal", 1143 prime_arg, client_name, ret.code); 1144 log_done("kadm5_chpass_principal", prime_arg, 1145 ((ret.code == 0) ? "success" : error_message(ret.code)), 1146 client_name, service_name, client_addr(rqstp, buf)); 1147 } 1148 1149 error: 1150 if (name) 1151 gss_release_name(&min_stat, &name); 1152 free_server_handle(handle); 1153 if (prime_arg) 1154 free(prime_arg); 1155 if (client_name) 1156 free(client_name); 1157 if (service_name) 1158 free(service_name); 1159 return (&ret); 1160 } 1161 1162 generic_ret * 1163 chpass_principal3_1_svc(chpass3_arg *arg, struct svc_req *rqstp) 1164 { 1165 static generic_ret ret; 1166 char *prime_arg = NULL; 1167 char *client_name = NULL, 1168 *service_name = NULL; 1169 OM_uint32 min_stat; 1170 kadm5_server_handle_t handle; 1171 gss_name_t name = NULL; 1172 1173 xdr_free(xdr_generic_ret, (char *) &ret); 1174 1175 if ((ret.code = new_server_handle(arg->api_version, rqstp, &handle))) 1176 return &ret; 1177 1178 if ((ret.code = check_handle((void *)handle))) 1179 goto error; 1180 ret.api_version = handle->api_version; 1181 1182 if (setup_gss_names(rqstp, &client_name, &service_name) < 0) { 1183 ret.code = KADM5_FAILURE; 1184 goto error; 1185 } 1186 if (krb5_unparse_name(handle->context, arg->princ, &prime_arg)) { 1187 ret.code = KADM5_BAD_PRINCIPAL; 1188 goto error; 1189 } 1190 if (!(name = get_clnt_name(rqstp))) { 1191 ret.code = KADM5_FAILURE; 1192 goto error; 1193 } 1194 1195 if (cmp_gss_krb5_name(handle, name, arg->princ)) { 1196 ret.code = chpass_principal_wrapper_3((void *)handle, arg->princ, 1197 arg->keepold, 1198 arg->n_ks_tuple, 1199 arg->ks_tuple, 1200 arg->pass); 1201 } else if (!(CHANGEPW_SERVICE(rqstp)) && 1202 kadm5int_acl_check(handle->context, name, 1203 ACL_CHANGEPW, arg->princ, NULL)) { 1204 ret.code = kadm5_chpass_principal_3((void *)handle, arg->princ, 1205 arg->keepold, 1206 arg->n_ks_tuple, 1207 arg->ks_tuple, 1208 arg->pass); 1209 } else { 1210 log_unauth("kadm5_chpass_principal", prime_arg, 1211 client_name, service_name, client_addr(rqstp, buf)); 1212 ret.code = KADM5_AUTH_CHANGEPW; 1213 } 1214 1215 if(ret.code != KADM5_AUTH_CHANGEPW) { 1216 log_done("kadm5_chpass_principal", prime_arg, 1217 ((ret.code == 0) ? "success" : error_message(ret.code)), 1218 client_name, service_name, client_addr(rqstp, buf)); 1219 } 1220 1221 error: 1222 if (name) 1223 gss_release_name(&min_stat, &name); 1224 free_server_handle(handle); 1225 if (client_name) 1226 free(client_name); 1227 if (service_name) 1228 free(service_name); 1229 if (prime_arg) 1230 free(prime_arg); 1231 return (&ret); 1232 } 1233 1234 #ifdef SUNWOFF 1235 generic_ret * 1236 setv4key_principal_1_svc(setv4key_arg *arg, struct svc_req *rqstp) 1237 { 1238 static generic_ret ret; 1239 char *prime_arg = NULL; 1240 char *client_name = NULL, 1241 *service_name = NULL; 1242 OM_uint32 min_stat; 1243 kadm5_server_handle_t handle; 1244 gss_name_t name = NULL; 1245 1246 xdr_free(xdr_generic_ret, (char *) &ret); 1247 1248 if ((ret.code = new_server_handle(arg->api_version, rqstp, &handle))) 1249 return &ret; 1250 1251 if ((ret.code = check_handle((void *)handle))) 1252 goto error; 1253 ret.api_version = handle->api_version; 1254 1255 if (setup_gss_names(rqstp, &client_name, &service_name) < 0) { 1256 ret.code = KADM5_FAILURE; 1257 goto error; 1258 } 1259 if (krb5_unparse_name(handle->context, arg->princ, &prime_arg)) { 1260 ret.code = KADM5_BAD_PRINCIPAL; 1261 goto error; 1262 } 1263 if (!(name = get_clnt_name(rqstp))) { 1264 ret.code = KADM5_FAILURE; 1265 goto error; 1266 } 1267 1268 if (!(CHANGEPW_SERVICE(rqstp)) && 1269 kadm5int_acl_check(handle->context, name, 1270 ACL_SETKEY, arg->princ, NULL)) { 1271 ret.code = kadm5_setv4key_principal((void *)handle, arg->princ, 1272 arg->keyblock); 1273 } else { 1274 log_unauth("kadm5_setv4key_principal", prime_arg, 1275 client_name, service_name, client_addr(rqstp, buf)); 1276 ret.code = KADM5_AUTH_SETKEY; 1277 } 1278 1279 if(ret.code != KADM5_AUTH_SETKEY) { 1280 log_done("kadm5_setv4key_principal", prime_arg, 1281 ((ret.code == 0) ? "success" : error_message(ret.code)), 1282 client_name, service_name, client_addr(rqstp, buf)); 1283 } 1284 1285 error: 1286 if (name) 1287 gss_release_name(&min_stat, &name); 1288 free_server_handle(handle); 1289 if (client_name) 1290 free(client_name); 1291 if (service_name) 1292 free(service_name); 1293 if (prime_arg) 1294 free(prime_arg); 1295 return (&ret); 1296 } 1297 #endif 1298 1299 generic_ret * 1300 setkey_principal_1_svc(setkey_arg *arg, struct svc_req *rqstp) 1301 { 1302 static generic_ret ret; 1303 char *prime_arg; 1304 char *client_name, 1305 *service_name; 1306 OM_uint32 min_stat; 1307 kadm5_server_handle_t handle; 1308 gss_name_t name; 1309 1310 xdr_free(xdr_generic_ret, (char *) &ret); 1311 1312 if ((ret.code = new_server_handle(arg->api_version, rqstp, &handle))) 1313 return &ret; 1314 1315 if ((ret.code = check_handle((void *)handle))) 1316 goto error; 1317 ret.api_version = handle->api_version; 1318 1319 if (setup_gss_names(rqstp, &client_name, &service_name) < 0) { 1320 ret.code = KADM5_FAILURE; 1321 goto error; 1322 } 1323 if (krb5_unparse_name(handle->context, arg->princ, &prime_arg)) { 1324 ret.code = KADM5_BAD_PRINCIPAL; 1325 goto error; 1326 } 1327 if (!(name = get_clnt_name(rqstp))) { 1328 ret.code = KADM5_FAILURE; 1329 goto error; 1330 } 1331 1332 if (!(CHANGEPW_SERVICE(rqstp)) && 1333 kadm5int_acl_check(handle->context, name, ACL_SETKEY, arg->princ, NULL)) { 1334 ret.code = kadm5_setkey_principal((void *)handle, arg->princ, 1335 arg->keyblocks, arg->n_keys); 1336 } else { 1337 log_unauth("kadm5_setkey_principal", prime_arg, 1338 client_name, service_name, client_addr(rqstp, buf)); 1339 ret.code = KADM5_AUTH_SETKEY; 1340 } 1341 1342 if(ret.code != KADM5_AUTH_SETKEY) { 1343 log_done("kadm5_setkey_principal", prime_arg, 1344 ((ret.code == 0) ? "success" : error_message(ret.code)), 1345 client_name, service_name, client_addr(rqstp, buf)); 1346 } 1347 1348 error: 1349 if (name) 1350 gss_release_name(&min_stat, &name); 1351 free_server_handle(handle); 1352 if (client_name) 1353 free(client_name); 1354 if (service_name) 1355 free(service_name); 1356 if (prime_arg) 1357 free(prime_arg); 1358 return (&ret); 1359 } 1360 1361 generic_ret * 1362 setkey_principal3_1_svc(setkey3_arg *arg, struct svc_req *rqstp) 1363 { 1364 static generic_ret ret; 1365 char *prime_arg = NULL; 1366 char *client_name = NULL, 1367 *service_name = NULL; 1368 OM_uint32 min_stat; 1369 kadm5_server_handle_t handle; 1370 gss_name_t name = NULL; 1371 1372 xdr_free(xdr_generic_ret, (char *) &ret); 1373 1374 if ((ret.code = new_server_handle(arg->api_version, rqstp, &handle))) 1375 return &ret; 1376 1377 if ((ret.code = check_handle((void *)handle))) 1378 goto error; 1379 ret.api_version = handle->api_version; 1380 1381 if (setup_gss_names(rqstp, &client_name, &service_name) < 0) { 1382 ret.code = KADM5_FAILURE; 1383 goto error; 1384 } 1385 if (krb5_unparse_name(handle->context, arg->princ, &prime_arg)) { 1386 ret.code = KADM5_BAD_PRINCIPAL; 1387 goto error; 1388 } 1389 if (!(name = get_clnt_name(rqstp))) { 1390 ret.code = KADM5_FAILURE; 1391 goto error; 1392 } 1393 1394 if (!(CHANGEPW_SERVICE(rqstp)) && 1395 kadm5int_acl_check(handle->context, name, 1396 ACL_SETKEY, arg->princ, NULL)) { 1397 ret.code = kadm5_setkey_principal_3((void *)handle, arg->princ, 1398 arg->keepold, 1399 arg->n_ks_tuple, 1400 arg->ks_tuple, 1401 arg->keyblocks, arg->n_keys); 1402 } else { 1403 log_unauth("kadm5_setkey_principal", prime_arg, 1404 client_name, service_name, client_addr(rqstp, buf)); 1405 ret.code = KADM5_AUTH_SETKEY; 1406 } 1407 1408 if(ret.code != KADM5_AUTH_SETKEY) { 1409 log_done("kadm5_setkey_principal", prime_arg, 1410 ((ret.code == 0) ? "success" : error_message(ret.code)), 1411 client_name, service_name, client_addr(rqstp, buf)); 1412 } 1413 1414 error: 1415 if (name) 1416 gss_release_name(&min_stat, &name); 1417 free_server_handle(handle); 1418 if (client_name) 1419 free(client_name); 1420 if (service_name) 1421 free(service_name); 1422 if (prime_arg) 1423 free(prime_arg); 1424 return &ret; 1425 } 1426 1427 chrand_ret * 1428 chrand_principal_1_svc(chrand_arg *arg, struct svc_req *rqstp) 1429 { 1430 static chrand_ret ret; 1431 krb5_keyblock *k; 1432 int nkeys; 1433 char *prime_arg = NULL, *funcname; 1434 char *client_name = NULL, *service_name = NULL; 1435 OM_uint32 min_stat; 1436 kadm5_server_handle_t handle; 1437 gss_name_t name = NULL; 1438 1439 xdr_free(xdr_chrand_ret, (char *) &ret); 1440 1441 if ((ret.code = new_server_handle(arg->api_version, rqstp, &handle))) 1442 return &ret; 1443 1444 if ((ret.code = check_handle((void *)handle))) 1445 goto error; 1446 1447 ret.api_version = handle->api_version; 1448 1449 funcname = handle->api_version == KADM5_API_VERSION_1 ? 1450 "kadm5_randkey_principal (V1)" : "kadm5_randkey_principal"; 1451 1452 if (setup_gss_names(rqstp, &client_name, &service_name) < 0) { 1453 ret.code = KADM5_FAILURE; 1454 goto error; 1455 } 1456 if (krb5_unparse_name(handle->context, arg->princ, &prime_arg)) { 1457 ret.code = KADM5_BAD_PRINCIPAL; 1458 goto error; 1459 } 1460 if (!(name = get_clnt_name(rqstp))) { 1461 ret.code = KADM5_FAILURE; 1462 goto error; 1463 } 1464 1465 if (cmp_gss_krb5_name(handle, name, arg->princ)) { 1466 ret.code = randkey_principal_wrapper((void *)handle, arg->princ, &k, 1467 &nkeys); 1468 } else if (!(CHANGEPW_SERVICE(rqstp)) && 1469 kadm5int_acl_check(handle->context, name, 1470 ACL_CHANGEPW, arg->princ, NULL)) { 1471 ret.code = kadm5_randkey_principal((void *)handle, arg->princ, 1472 &k, &nkeys); 1473 } else { 1474 audit_kadmind_unauth(rqstp->rq_xprt, l_port, 1475 funcname, prime_arg, client_name); 1476 log_unauth(funcname, prime_arg, 1477 client_name, service_name, client_addr(rqstp, buf)); 1478 ret.code = KADM5_AUTH_CHANGEPW; 1479 } 1480 1481 if(ret.code == KADM5_OK) { 1482 if (handle->api_version == KADM5_API_VERSION_1) { 1483 krb5_copy_keyblock_contents(handle->context, k, &ret.key); 1484 krb5_free_keyblock(handle->context, k); 1485 } else { 1486 ret.keys = k; 1487 ret.n_keys = nkeys; 1488 } 1489 } 1490 1491 if(ret.code != KADM5_AUTH_CHANGEPW) { 1492 audit_kadmind_auth(rqstp->rq_xprt, l_port, 1493 funcname, prime_arg, client_name, ret.code); 1494 log_done(funcname, prime_arg, 1495 ((ret.code == 0) ? "success" : error_message(ret.code)), 1496 client_name, service_name, client_addr(rqstp, buf)); 1497 } 1498 1499 error: 1500 if (name) 1501 gss_release_name(&min_stat, &name); 1502 free_server_handle(handle); 1503 if (prime_arg) 1504 free(prime_arg); 1505 if (client_name) 1506 free(client_name); 1507 if (service_name) 1508 free(service_name); 1509 return &ret; 1510 } 1511 1512 chrand_ret * 1513 chrand_principal3_1_svc(chrand3_arg *arg, struct svc_req *rqstp) 1514 { 1515 static chrand_ret ret; 1516 krb5_keyblock *k; 1517 int nkeys; 1518 char *prime_arg = NULL, *funcname; 1519 char *client_name = NULL, 1520 *service_name = NULL; 1521 OM_uint32 min_stat; 1522 kadm5_server_handle_t handle; 1523 gss_name_t name = NULL; 1524 1525 xdr_free(xdr_chrand_ret, (char *) &ret); 1526 1527 if ((ret.code = new_server_handle(arg->api_version, rqstp, &handle))) 1528 return &ret; 1529 1530 if ((ret.code = check_handle((void *)handle))) 1531 goto error; 1532 ret.api_version = handle->api_version; 1533 1534 funcname = handle->api_version == KADM5_API_VERSION_1 ? 1535 "kadm5_randkey_principal (V1)" : "kadm5_randkey_principal"; 1536 1537 if (setup_gss_names(rqstp, &client_name, &service_name) < 0) { 1538 ret.code = KADM5_FAILURE; 1539 goto error; 1540 } 1541 if (krb5_unparse_name(handle->context, arg->princ, &prime_arg)) { 1542 ret.code = KADM5_BAD_PRINCIPAL; 1543 goto error; 1544 } 1545 if (!(name = get_clnt_name(rqstp))) { 1546 ret.code = KADM5_FAILURE; 1547 goto error; 1548 } 1549 1550 if (cmp_gss_krb5_name(handle, name, arg->princ)) { 1551 ret.code = randkey_principal_wrapper_3((void *)handle, arg->princ, 1552 arg->keepold, 1553 arg->n_ks_tuple, 1554 arg->ks_tuple, 1555 &k, &nkeys); 1556 } else if (!(CHANGEPW_SERVICE(rqstp)) && 1557 kadm5int_acl_check(handle->context, name, 1558 ACL_CHANGEPW, arg->princ, NULL)) { 1559 ret.code = kadm5_randkey_principal_3((void *)handle, arg->princ, 1560 arg->keepold, 1561 arg->n_ks_tuple, 1562 arg->ks_tuple, 1563 &k, &nkeys); 1564 } else { 1565 log_unauth(funcname, prime_arg, 1566 client_name, service_name, client_addr(rqstp, buf)); 1567 ret.code = KADM5_AUTH_CHANGEPW; 1568 } 1569 1570 if(ret.code == KADM5_OK) { 1571 if (handle->api_version == KADM5_API_VERSION_1) { 1572 krb5_copy_keyblock_contents(handle->context, k, &ret.key); 1573 krb5_free_keyblock(handle->context, k); 1574 } else { 1575 ret.keys = k; 1576 ret.n_keys = nkeys; 1577 } 1578 } 1579 1580 if(ret.code != KADM5_AUTH_CHANGEPW) { 1581 /* Solaris Kerberos: Better error messages */ 1582 log_done(funcname, prime_arg, ((ret.code == 0) ? "success" : 1583 krb5_get_error_message(handle->context, ret.code)), 1584 client_name, service_name, client_addr(rqstp, buf)); 1585 } 1586 1587 error: 1588 if (name) 1589 gss_release_name(&min_stat, &name); 1590 free_server_handle(handle); 1591 if (client_name) 1592 free(client_name); 1593 if (service_name) 1594 free(service_name); 1595 if (prime_arg) 1596 free(prime_arg); 1597 return (&ret); 1598 } 1599 1600 generic_ret * 1601 create_policy_1_svc(cpol_arg *arg, struct svc_req *rqstp) 1602 { 1603 static generic_ret ret; 1604 char *prime_arg = NULL; 1605 char *client_name = NULL, *service_name = NULL; 1606 OM_uint32 min_stat; 1607 kadm5_server_handle_t handle; 1608 gss_name_t name = NULL; 1609 1610 xdr_free(xdr_generic_ret, (char *) &ret); 1611 1612 if ((ret.code = new_server_handle(arg->api_version, rqstp, &handle))) 1613 return &ret; 1614 1615 if ((ret.code = check_handle((void *)handle))) 1616 goto error; 1617 1618 ret.api_version = handle->api_version; 1619 1620 if (setup_gss_names(rqstp, &client_name, &service_name) < 0) { 1621 ret.code = KADM5_FAILURE; 1622 goto error; 1623 } 1624 prime_arg = arg->rec.policy; 1625 1626 if (!(name = get_clnt_name(rqstp))) { 1627 ret.code = KADM5_FAILURE; 1628 goto error; 1629 } 1630 1631 if (CHANGEPW_SERVICE(rqstp) || !kadm5int_acl_check(handle->context, 1632 name, 1633 ACL_ADD, NULL, NULL)) { 1634 ret.code = KADM5_AUTH_ADD; 1635 1636 audit_kadmind_unauth(rqstp->rq_xprt, l_port, 1637 "kadm5_create_policy", 1638 prime_arg, client_name); 1639 log_unauth("kadm5_create_policy", prime_arg, 1640 client_name, service_name, client_addr(rqstp, buf)); 1641 1642 } else { 1643 ret.code = kadm5_create_policy((void *)handle, &arg->rec, 1644 arg->mask); 1645 1646 audit_kadmind_auth(rqstp->rq_xprt, l_port, 1647 "kadm5_create_policy", 1648 prime_arg, client_name, ret.code); 1649 log_done("kadm5_create_policy", 1650 ((prime_arg == NULL) ? "(null)" : prime_arg), 1651 ((ret.code == 0) ? "success" : error_message(ret.code)), 1652 client_name, service_name, client_addr(rqstp, buf)); 1653 } 1654 1655 error: 1656 if (name) 1657 gss_release_name(&min_stat, &name); 1658 free_server_handle(handle); 1659 if (client_name) 1660 free(client_name); 1661 if (service_name) 1662 free(service_name); 1663 return &ret; 1664 } 1665 1666 generic_ret * 1667 delete_policy_1_svc(dpol_arg *arg, struct svc_req *rqstp) 1668 { 1669 static generic_ret ret; 1670 char *prime_arg = NULL; 1671 char *client_name = NULL, *service_name = NULL; 1672 OM_uint32 min_stat; 1673 kadm5_server_handle_t handle; 1674 gss_name_t name = NULL; 1675 1676 xdr_free(xdr_generic_ret, (char *) &ret); 1677 1678 if ((ret.code = new_server_handle(arg->api_version, rqstp, &handle))) 1679 return &ret; 1680 1681 if ((ret.code = check_handle((void *)handle))) 1682 goto error; 1683 ret.api_version = handle->api_version; 1684 1685 if (setup_gss_names(rqstp, &client_name, &service_name) < 0) { 1686 ret.code = KADM5_FAILURE; 1687 goto error; 1688 } 1689 prime_arg = arg->name; 1690 1691 if (!(name = get_clnt_name(rqstp))) { 1692 ret.code = KADM5_FAILURE; 1693 goto error; 1694 } 1695 1696 if (CHANGEPW_SERVICE(rqstp) || !kadm5int_acl_check(handle->context, 1697 name, 1698 ACL_DELETE, NULL, NULL)) { 1699 1700 audit_kadmind_unauth(rqstp->rq_xprt, l_port, 1701 "kadm5_delete_policy", 1702 prime_arg, client_name); 1703 log_unauth("kadm5_delete_policy", prime_arg, 1704 client_name, service_name, client_addr(rqstp, buf)); 1705 ret.code = KADM5_AUTH_DELETE; 1706 } else { 1707 ret.code = kadm5_delete_policy((void *)handle, arg->name); 1708 1709 audit_kadmind_auth(rqstp->rq_xprt, l_port, 1710 "kadm5_delete_policy", 1711 prime_arg, client_name, ret.code); 1712 log_done("kadm5_delete_policy", 1713 ((prime_arg == NULL) ? "(null)" : prime_arg), 1714 ((ret.code == 0) ? "success" : error_message(ret.code)), 1715 client_name, service_name, client_addr(rqstp, buf)); 1716 } 1717 1718 error: 1719 if (name) 1720 gss_release_name(&min_stat, &name); 1721 free_server_handle(handle); 1722 if (client_name) 1723 free(client_name); 1724 if (service_name) 1725 free(service_name); 1726 return &ret; 1727 } 1728 1729 generic_ret * 1730 modify_policy_1_svc(mpol_arg *arg, struct svc_req *rqstp) 1731 { 1732 static generic_ret ret; 1733 char *prime_arg = NULL; 1734 char *client_name = NULL, *service_name = NULL; 1735 OM_uint32 min_stat; 1736 kadm5_server_handle_t handle; 1737 gss_name_t name = NULL; 1738 1739 xdr_free(xdr_generic_ret, (char *) &ret); 1740 1741 if ((ret.code = new_server_handle(arg->api_version, rqstp, &handle))) 1742 return &ret; 1743 1744 if ((ret.code = check_handle((void *)handle))) 1745 goto error; 1746 ret.api_version = handle->api_version; 1747 1748 if (setup_gss_names(rqstp, &client_name, &service_name) < 0) { 1749 ret.code = KADM5_FAILURE; 1750 goto error; 1751 } 1752 prime_arg = arg->rec.policy; 1753 1754 if (!(name = get_clnt_name(rqstp))) { 1755 ret.code = KADM5_FAILURE; 1756 goto error; 1757 } 1758 1759 if (CHANGEPW_SERVICE(rqstp) || !kadm5int_acl_check(handle->context, 1760 name, 1761 ACL_MODIFY, NULL, NULL)) { 1762 1763 audit_kadmind_unauth(rqstp->rq_xprt, l_port, 1764 "kadm5_modify_policy", 1765 prime_arg, client_name); 1766 log_unauth("kadm5_modify_policy", prime_arg, 1767 client_name, service_name, client_addr(rqstp, buf)); 1768 ret.code = KADM5_AUTH_MODIFY; 1769 } else { 1770 ret.code = kadm5_modify_policy((void *)handle, &arg->rec, 1771 arg->mask); 1772 1773 audit_kadmind_auth(rqstp->rq_xprt, l_port, 1774 "kadm5_modify_policy", 1775 prime_arg, client_name, ret.code); 1776 log_done("kadm5_modify_policy", 1777 ((prime_arg == NULL) ? "(null)" : prime_arg), 1778 ((ret.code == 0) ? "success" : error_message(ret.code)), 1779 client_name, service_name, client_addr(rqstp, buf)); 1780 } 1781 1782 error: 1783 if (name) 1784 gss_release_name(&min_stat, &name); 1785 free_server_handle(handle); 1786 if (client_name) 1787 free(client_name); 1788 if (service_name) 1789 free(service_name); 1790 return (&ret); 1791 } 1792 1793 gpol_ret * 1794 get_policy_1_svc(gpol_arg *arg, struct svc_req *rqstp) 1795 { 1796 static gpol_ret ret; 1797 kadm5_ret_t ret2; 1798 char *prime_arg = NULL, *funcname; 1799 char *client_name = NULL, *service_name = NULL; 1800 OM_uint32 min_stat; 1801 kadm5_policy_ent_t e; 1802 kadm5_principal_ent_rec caller_ent; 1803 krb5_principal caller; 1804 kadm5_server_handle_t handle; 1805 gss_name_t name = NULL; 1806 1807 xdr_free(xdr_gpol_ret, (char *) &ret); 1808 1809 if ((ret.code = new_server_handle(arg->api_version, rqstp, &handle))) 1810 return &ret; 1811 1812 if ((ret.code = check_handle((void *) handle))) 1813 goto error; 1814 1815 ret.api_version = handle->api_version; 1816 1817 funcname = handle->api_version == KADM5_API_VERSION_1 ? 1818 "kadm5_get_policy (V1)" : "kadm5_get_policy"; 1819 1820 if (setup_gss_names(rqstp, &client_name, &service_name) < 0) { 1821 ret.code = KADM5_FAILURE; 1822 goto error; 1823 } 1824 prime_arg = arg->name; 1825 ret.code = KADM5_AUTH_GET; 1826 1827 if (!(name = get_clnt_name(rqstp))) { 1828 ret.code = KADM5_FAILURE; 1829 goto error; 1830 } 1831 1832 if (!CHANGEPW_SERVICE(rqstp) && kadm5int_acl_check(handle->context, 1833 name, 1834 ACL_INQUIRE, NULL, NULL)) 1835 ret.code = KADM5_OK; 1836 else { 1837 ret.code = kadm5_get_principal(handle->lhandle, 1838 handle->current_caller, 1839 &caller_ent, 1840 KADM5_PRINCIPAL_NORMAL_MASK); 1841 if (ret.code == KADM5_OK) { 1842 if (caller_ent.aux_attributes & KADM5_POLICY && 1843 strcmp(caller_ent.policy, arg->name) == 0) { 1844 ret.code = KADM5_OK; 1845 } else ret.code = KADM5_AUTH_GET; 1846 ret2 = kadm5_free_principal_ent(handle->lhandle, 1847 &caller_ent); 1848 ret.code = ret.code ? ret.code : ret2; 1849 } 1850 } 1851 1852 if (ret.code == KADM5_OK) { 1853 if (handle->api_version == KADM5_API_VERSION_1) { 1854 ret.code = kadm5_get_policy_v1((void *)handle, arg->name, &e); 1855 if(ret.code == KADM5_OK) { 1856 memcpy(&ret.rec, e, sizeof(kadm5_policy_ent_rec)); 1857 free(e); 1858 } 1859 } else { 1860 ret.code = kadm5_get_policy((void *)handle, arg->name, 1861 &ret.rec); 1862 } 1863 1864 audit_kadmind_auth(rqstp->rq_xprt, l_port, 1865 funcname, prime_arg, client_name, ret.code); 1866 log_done(funcname, ((prime_arg == NULL) ? "(null)" : prime_arg), 1867 ((ret.code == 0) ? "success" : error_message(ret.code)), 1868 client_name, service_name, client_addr(rqstp, buf)); 1869 } else { 1870 audit_kadmind_unauth(rqstp->rq_xprt, l_port, 1871 funcname, prime_arg, client_name); 1872 log_unauth(funcname, prime_arg, client_name, 1873 service_name, client_addr(rqstp, buf)); 1874 } 1875 1876 error: 1877 if (name) 1878 gss_release_name(&min_stat, &name); 1879 free_server_handle(handle); 1880 if (client_name) 1881 free(client_name); 1882 if (service_name) 1883 free(service_name); 1884 return (&ret); 1885 1886 } 1887 1888 gpols_ret * 1889 get_pols_1_svc(gpols_arg *arg, struct svc_req *rqstp) 1890 { 1891 static gpols_ret ret; 1892 char *prime_arg = NULL; 1893 char *client_name = NULL, *service_name = NULL; 1894 OM_uint32 min_stat; 1895 kadm5_server_handle_t handle; 1896 gss_name_t name = NULL; 1897 1898 xdr_free(xdr_gpols_ret, (char *) &ret); 1899 1900 if ((ret.code = new_server_handle(arg->api_version, rqstp, &handle))) 1901 return &ret; 1902 1903 if ((ret.code = check_handle((void *)handle))) 1904 goto error; 1905 1906 ret.api_version = handle->api_version; 1907 1908 if (setup_gss_names(rqstp, &client_name, &service_name) < 0) { 1909 ret.code = KADM5_FAILURE; 1910 goto error; 1911 } 1912 prime_arg = arg->exp; 1913 if (prime_arg == NULL) 1914 prime_arg = "*"; 1915 1916 if (!(name = get_clnt_name(rqstp))) { 1917 ret.code = KADM5_FAILURE; 1918 goto error; 1919 } 1920 1921 if (CHANGEPW_SERVICE(rqstp) || !kadm5int_acl_check(handle->context, 1922 name, 1923 ACL_LIST, NULL, NULL)) { 1924 ret.code = KADM5_AUTH_LIST; 1925 1926 audit_kadmind_unauth(rqstp->rq_xprt, l_port, 1927 "kadm5_get_policies", 1928 prime_arg, client_name); 1929 log_unauth("kadm5_get_policies", prime_arg, 1930 client_name, service_name, client_addr(rqstp, buf)); 1931 } else { 1932 ret.code = kadm5_get_policies((void *)handle, 1933 arg->exp, &ret.pols, 1934 &ret.count); 1935 1936 audit_kadmind_auth(rqstp->rq_xprt, l_port, 1937 "kadm5_get_policies", 1938 prime_arg, client_name, ret.code); 1939 log_done("kadm5_get_policies", prime_arg, 1940 ((ret.code == 0) ? "success" : error_message(ret.code)), 1941 client_name, service_name, client_addr(rqstp, buf)); 1942 } 1943 1944 error: 1945 if (name) 1946 gss_release_name(&min_stat, &name); 1947 free_server_handle(handle); 1948 if (client_name) 1949 free(client_name); 1950 if (service_name) 1951 free(service_name); 1952 return (&ret); 1953 } 1954 1955 getprivs_ret * get_privs_1_svc(krb5_ui_4 *arg, struct svc_req *rqstp) 1956 { 1957 static getprivs_ret ret; 1958 char *client_name = NULL, *service_name = NULL; 1959 OM_uint32 min_stat; 1960 kadm5_server_handle_t handle; 1961 gss_name_t name = NULL; 1962 1963 xdr_free(xdr_getprivs_ret, (char *) &ret); 1964 1965 if ((ret.code = new_server_handle(*arg, rqstp, &handle))) 1966 return &ret; 1967 1968 if ((ret.code = check_handle((void *)handle))) 1969 goto error; 1970 1971 ret.api_version = handle->api_version; 1972 1973 if (setup_gss_names(rqstp, &client_name, &service_name) < 0) { 1974 ret.code = KADM5_FAILURE; 1975 goto error; 1976 } 1977 if (!(name = get_clnt_name(rqstp))) { 1978 ret.code = KADM5_FAILURE; 1979 goto error; 1980 } 1981 1982 ret.code = __kadm5_get_priv((void *) handle, &ret.privs, name); 1983 1984 audit_kadmind_auth(rqstp->rq_xprt, l_port, 1985 "kadm5_get_privs", NULL, client_name, 1986 ret.code); 1987 log_done("kadm5_get_privs", client_name, 1988 ((ret.code == 0) ? "success" : error_message(ret.code)), 1989 client_name, service_name, client_addr(rqstp, buf)); 1990 1991 error: 1992 if (name) 1993 gss_release_name(&min_stat, &name); 1994 free_server_handle(handle); 1995 if (client_name) 1996 free(client_name); 1997 if (service_name) 1998 free(service_name); 1999 return (&ret); 2000 } 2001 2002 generic_ret *init_1_svc(krb5_ui_4 *arg, struct svc_req *rqstp) 2003 { 2004 static generic_ret ret; 2005 char *client_name, *service_name; 2006 kadm5_server_handle_t handle; 2007 size_t clen, slen; 2008 char *cdots, *sdots; 2009 2010 xdr_free(xdr_generic_ret, (char *) &ret); 2011 2012 if ((ret.code = new_server_handle(*arg, rqstp, &handle))) 2013 return &ret; 2014 if (! (ret.code = check_handle((void *)handle))) { 2015 ret.api_version = handle->api_version; 2016 } 2017 2018 free_server_handle(handle); 2019 2020 if (setup_gss_names(rqstp, &client_name, &service_name) < 0) { 2021 ret.code = KADM5_FAILURE; 2022 return &ret; 2023 } 2024 2025 audit_kadmind_auth(rqstp->rq_xprt, l_port, 2026 (ret.api_version == KADM5_API_VERSION_1 ? 2027 "kadm5_init (V1)" : "kadm5_init"), 2028 NULL, client_name, ret.code); 2029 2030 clen = strlen(client_name); 2031 trunc_name(&clen, &cdots); 2032 slen = strlen(service_name); 2033 trunc_name(&slen, &sdots); 2034 krb5_klog_syslog(LOG_NOTICE, "Request %s, %.*s%s, %s, " 2035 "client=%.*s%s, service=%.*s%s, addr=%s, flavor=%d", 2036 (ret.api_version == KADM5_API_VERSION_1 ? 2037 "kadm5_init (V1)" : "kadm5_init"), 2038 clen, client_name, cdots, 2039 (ret.code == 0) ? "success" : error_message(ret.code), 2040 clen, client_name, cdots, 2041 slen, service_name, sdots, 2042 client_addr(rqstp, buf), 2043 rqstp->rq_cred.oa_flavor); 2044 free(client_name); 2045 free(service_name); 2046 2047 return (&ret); 2048 } 2049