admin.h revision 55682
1/*
2 * Copyright (c) 1997-1999 Kungliga Tekniska H�gskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
4 * All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
9 *
10 * 1. Redistributions of source code must retain the above copyright
11 *    notice, this list of conditions and the following disclaimer.
12 *
13 * 2. Redistributions in binary form must reproduce the above copyright
14 *    notice, this list of conditions and the following disclaimer in the
15 *    documentation and/or other materials provided with the distribution.
16 *
17 * 3. Neither the name of the Institute nor the names of its contributors
18 *    may be used to endorse or promote products derived from this software
19 *    without specific prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
32 */
33/* $Id: admin.h,v 1.15 1999/12/02 17:05:05 joda Exp $ */
34
35#ifndef __KADM5_ADMIN_H__
36#define __KADM5_ADMIN_H__
37
38#define KADM5_API_VERSION_1 1
39#define KADM5_API_VERSION_2 2
40
41#ifndef USE_KADM5_API_VERSION
42#define USE_KADM5_API_VERSION KADM5_API_VERSION_2
43#endif
44
45#if USE_KADM5_API_VERSION != KADM5_API_VERSION_2
46#error No support for API versions other than 2
47#endif
48
49#define KADM5_STRUCT_VERSION 0
50
51#include <krb5.h>
52
53#define KRB5_KDB_DISALLOW_POSTDATED	0x00000001
54#define KRB5_KDB_DISALLOW_FORWARDABLE	0x00000002
55#define KRB5_KDB_DISALLOW_TGT_BASED	0x00000004
56#define KRB5_KDB_DISALLOW_RENEWABLE	0x00000008
57#define KRB5_KDB_DISALLOW_PROXIABLE	0x00000010
58#define KRB5_KDB_DISALLOW_DUP_SKEY	0x00000020
59#define KRB5_KDB_DISALLOW_ALL_TIX	0x00000040
60#define KRB5_KDB_REQUIRES_PRE_AUTH	0x00000080
61#define KRB5_KDB_REQUIRES_HW_AUTH	0x00000100
62#define KRB5_KDB_REQUIRES_PWCHANGE	0x00000200
63#define KRB5_KDB_DISALLOW_SVR		0x00001000
64#define KRB5_KDB_PWCHANGE_SERVICE	0x00002000
65#define KRB5_KDB_SUPPORT_DESMD5		0x00004000
66#define KRB5_KDB_NEW_PRINC		0x00008000
67
68#define KADM5_PRINCIPAL		0x000001
69#define KADM5_PRINC_EXPIRE_TIME	0x000002
70#define KADM5_PW_EXPIRATION	0x000004
71#define KADM5_LAST_PWD_CHANGE	0x000008
72#define KADM5_ATTRIBUTES	0x000010
73#define KADM5_MAX_LIFE		0x000020
74#define KADM5_MOD_TIME		0x000040
75#define KADM5_MOD_NAME		0x000080
76#define KADM5_KVNO		0x000100
77#define KADM5_MKVNO		0x000200
78#define KADM5_AUX_ATTRIBUTES	0x000400
79#define KADM5_POLICY		0x000800
80#define KADM5_POLICY_CLR	0x001000
81#define KADM5_MAX_RLIFE		0x002000
82#define KADM5_LAST_SUCCESS	0x004000
83#define KADM5_LAST_FAILED	0x008000
84#define KADM5_FAIL_AUTH_COUNT	0x010000
85#define KADM5_KEY_DATA		0x020000
86#define KADM5_TL_DATA		0x040000
87
88#define KADM5_PRINCIPAL_NORMAL_MASK (~(KADM5_KEY_DATA | KADM5_TL_DATA))
89
90#define KADM5_PW_MAX_LIFE 	0x004000
91#define KADM5_PW_MIN_LIFE	0x008000
92#define KADM5_PW_MIN_LENGTH 	0x010000
93#define KADM5_PW_MIN_CLASSES	0x020000
94#define KADM5_PW_HISTORY_NUM	0x040000
95#define KADM5_REF_COUNT		0x080000
96
97#define KADM5_POLICY_NORMAL_MASK (~0)
98
99#define KADM5_ADMIN_SERVICE	"kadmin/admin"
100#define KADM5_HIST_PRINCIPAL	"kadmin/history"
101#define KADM5_CHANGEPW_SERVICE	"kadmin/changepw"
102
103typedef struct _krb5_key_data {
104    int16_t key_data_ver;	/* Version */
105    int16_t key_data_kvno;	/* Key Version */
106    int16_t key_data_type[2];	/* Array of types */
107    int16_t key_data_length[2];	/* Array of lengths */
108    void** key_data_contents[2];/* Array of pointers */
109} krb5_key_data;
110
111typedef struct _krb5_tl_data {
112    struct _krb5_tl_data* tl_data_next;
113    int16_t tl_data_type;
114    int16_t tl_data_length;
115    void **tl_data_contents;
116} krb5_tl_data;
117
118typedef struct _kadm5_principal_ent_t {
119    krb5_principal principal;
120
121    krb5_timestamp princ_expire_time;
122    krb5_timestamp last_pwd_change;
123    krb5_timestamp pw_expiration;
124    krb5_deltat max_life;
125    krb5_principal mod_name;
126    krb5_timestamp mod_date;
127    krb5_flags attributes;
128    krb5_kvno kvno;
129    krb5_kvno mkvno;
130
131    char * policy;
132    u_int32_t aux_attributes;
133
134    krb5_deltat max_renewable_life;
135    krb5_timestamp last_success;
136    krb5_timestamp last_failed;
137    krb5_kvno fail_auth_count;
138    int16_t n_key_data;
139    int16_t n_tl_data;
140    krb5_tl_data *tl_data;
141    krb5_key_data *key_data;
142} kadm5_principal_ent_rec, *kadm5_principal_ent_t;
143
144typedef struct _kadm5_policy_ent_t {
145    char *policy;
146
147    u_int32_t pw_min_life;
148    u_int32_t pw_max_life;
149    u_int32_t pw_min_length;
150    u_int32_t pw_min_classes;
151    u_int32_t pw_history_num;
152    u_int32_t policy_refcnt;
153} kadm5_policy_ent_rec, *kadm5_policy_ent_t;
154
155#define KADM5_CONFIG_REALM			(1 << 0)
156#define KADM5_CONFIG_PROFILE			(1 << 1)
157#define KADM5_CONFIG_KADMIND_PORT		(1 << 2)
158#define KADM5_CONFIG_ADMIN_SERVER		(1 << 3)
159#define KADM5_CONFIG_DBNAME			(1 << 4)
160#define KADM5_CONFIG_ADBNAME			(1 << 5)
161#define KADM5_CONFIG_ADB_LOCKFILE		(1 << 6)
162#define KADM5_CONFIG_ACL_FILE			(1 << 7)
163#define KADM5_CONFIG_DICT_FILE			(1 << 8)
164#define KADM5_CONFIG_ADMIN_KEYTAB		(1 << 9)
165#define KADM5_CONFIG_MKEY_FROM_KEYBOARD		(1 << 10)
166#define KADM5_CONFIG_STASH_FILE			(1 << 11)
167#define KADM5_CONFIG_MKEY_NAME			(1 << 12)
168#define KADM5_CONFIG_ENCTYPE			(1 << 13)
169#define KADM5_CONFIG_MAX_LIFE			(1 << 14)
170#define KADM5_CONFIG_MAX_RLIFE			(1 << 15)
171#define KADM5_CONFIG_EXPIRATION			(1 << 16)
172#define KADM5_CONFIG_FLAGS			(1 << 17)
173#define KADM5_CONFIG_ENCTYPES			(1 << 18)
174
175#define KADM5_PRIV_GET		(1 << 0)
176#define KADM5_PRIV_ADD 		(1 << 1)
177#define KADM5_PRIV_MODIFY	(1 << 2)
178#define KADM5_PRIV_DELETE	(1 << 3)
179#define KADM5_PRIV_LIST		(1 << 4)
180#define KADM5_PRIV_CPW		(1 << 5)
181#define KADM5_PRIV_ALL		(KADM5_PRIV_GET | KADM5_PRIV_ADD | KADM5_PRIV_MODIFY | KADM5_PRIV_DELETE | KADM5_PRIV_LIST | KADM5_PRIV_CPW)
182
183typedef struct {
184    int XXX;
185}krb5_key_salt_tuple;
186
187typedef struct _kadm5_config_params {
188    u_int32_t mask;
189
190    /* Client and server fields */
191    char *realm;
192    int kadmind_port;
193
194    /* client fields */
195    char *admin_server;
196
197    /* server fields */
198    char *dbname;
199    char *acl_file;
200
201    /* server library (database) fields */
202    char *stash_file;
203} kadm5_config_params;
204
205typedef krb5_error_code kadm5_ret_t;
206
207kadm5_ret_t
208kadm5_c_chpass_principal __P((
209	void *server_handle,
210	krb5_principal princ,
211	char *password));
212
213kadm5_ret_t
214kadm5_c_create_principal __P((
215	void *server_handle,
216	kadm5_principal_ent_t princ,
217	u_int32_t mask,
218	char *password));
219
220kadm5_ret_t
221kadm5_c_delete_principal __P((
222	void *server_handle,
223	krb5_principal princ));
224
225kadm5_ret_t
226kadm5_c_destroy __P((void *server_handle));
227
228kadm5_ret_t
229kadm5_c_flush __P((void *server_handle));
230
231kadm5_ret_t
232kadm5_c_get_principal __P((
233	void *server_handle,
234	krb5_principal princ,
235	kadm5_principal_ent_t out,
236	u_int32_t mask));
237
238kadm5_ret_t
239kadm5_c_get_principals __P((
240	void *server_handle,
241	const char *exp,
242	char ***princs,
243	int *count));
244
245kadm5_ret_t
246kadm5_c_get_privs __P((
247	void *server_handle,
248	u_int32_t *privs));
249
250kadm5_ret_t
251kadm5_c_init_with_creds __P((
252	const char *client_name,
253	krb5_ccache ccache,
254	const char *service_name,
255	kadm5_config_params *realm_params,
256	unsigned long struct_version,
257	unsigned long api_version,
258	void **server_handle));
259
260kadm5_ret_t
261kadm5_c_init_with_creds_ctx __P((
262	krb5_context context,
263	const char *client_name,
264	krb5_ccache ccache,
265	const char *service_name,
266	kadm5_config_params *realm_params,
267	unsigned long struct_version,
268	unsigned long api_version,
269	void **server_handle));
270
271kadm5_ret_t
272kadm5_c_init_with_password __P((
273	const char *client_name,
274	const char *password,
275	const char *service_name,
276	kadm5_config_params *realm_params,
277	unsigned long struct_version,
278	unsigned long api_version,
279	void **server_handle));
280
281kadm5_ret_t
282kadm5_c_init_with_password_ctx __P((
283	krb5_context context,
284	const char *client_name,
285	const char *password,
286	const char *service_name,
287	kadm5_config_params *realm_params,
288	unsigned long struct_version,
289	unsigned long api_version,
290	void **server_handle));
291
292kadm5_ret_t
293kadm5_c_init_with_skey __P((
294	const char *client_name,
295	const char *keytab,
296	const char *service_name,
297	kadm5_config_params *realm_params,
298	unsigned long struct_version,
299	unsigned long api_version,
300	void **server_handle));
301
302kadm5_ret_t
303kadm5_c_init_with_skey_ctx __P((
304	krb5_context context,
305	const char *client_name,
306	const char *keytab,
307	const char *service_name,
308	kadm5_config_params *realm_params,
309	unsigned long struct_version,
310	unsigned long api_version,
311	void **server_handle));
312
313kadm5_ret_t
314kadm5_c_modify_principal __P((
315	void *server_handle,
316	kadm5_principal_ent_t princ,
317	u_int32_t mask));
318
319kadm5_ret_t
320kadm5_c_randkey_principal __P((
321	void *server_handle,
322	krb5_principal princ,
323	krb5_keyblock **new_keys,
324	int *n_keys));
325
326kadm5_ret_t
327kadm5_c_rename_principal __P((
328	void *server_handle,
329	krb5_principal source,
330	krb5_principal target));
331
332kadm5_ret_t
333kadm5_chpass_principal __P((
334	void *server_handle,
335	krb5_principal princ,
336	char *password));
337
338kadm5_ret_t
339kadm5_create_principal __P((
340	void *server_handle,
341	kadm5_principal_ent_t princ,
342	u_int32_t mask,
343	char *password));
344
345kadm5_ret_t
346kadm5_delete_principal __P((
347	void *server_handle,
348	krb5_principal princ));
349
350kadm5_ret_t
351kadm5_destroy __P((void *server_handle));
352
353kadm5_ret_t
354kadm5_flush __P((void *server_handle));
355
356void
357kadm5_free_key_data __P((
358	void *server_handle,
359	int16_t *n_key_data,
360	krb5_key_data *key_data));
361
362void
363kadm5_free_name_list __P((
364	void *server_handle,
365	char **names,
366	int *count));
367
368void
369kadm5_free_principal_ent __P((
370	void *server_handle,
371	kadm5_principal_ent_t princ));
372
373kadm5_ret_t
374kadm5_get_principal __P((
375	void *server_handle,
376	krb5_principal princ,
377	kadm5_principal_ent_t out,
378	u_int32_t mask));
379
380kadm5_ret_t
381kadm5_get_principals __P((
382	void *server_handle,
383	const char *exp,
384	char ***princs,
385	int *count));
386
387kadm5_ret_t
388kadm5_get_privs __P((
389	void *server_handle,
390	u_int32_t *privs));
391
392kadm5_ret_t
393kadm5_init_with_creds __P((
394	const char *client_name,
395	krb5_ccache ccache,
396	const char *service_name,
397	kadm5_config_params *realm_params,
398	unsigned long struct_version,
399	unsigned long api_version,
400	void **server_handle));
401
402kadm5_ret_t
403kadm5_init_with_creds_ctx __P((
404	krb5_context context,
405	const char *client_name,
406	krb5_ccache ccache,
407	const char *service_name,
408	kadm5_config_params *realm_params,
409	unsigned long struct_version,
410	unsigned long api_version,
411	void **server_handle));
412
413kadm5_ret_t
414kadm5_init_with_password __P((
415	const char *client_name,
416	const char *password,
417	const char *service_name,
418	kadm5_config_params *realm_params,
419	unsigned long struct_version,
420	unsigned long api_version,
421	void **server_handle));
422
423kadm5_ret_t
424kadm5_init_with_password_ctx __P((
425	krb5_context context,
426	const char *client_name,
427	const char *password,
428	const char *service_name,
429	kadm5_config_params *realm_params,
430	unsigned long struct_version,
431	unsigned long api_version,
432	void **server_handle));
433
434kadm5_ret_t
435kadm5_init_with_skey __P((
436	const char *client_name,
437	const char *keytab,
438	const char *service_name,
439	kadm5_config_params *realm_params,
440	unsigned long struct_version,
441	unsigned long api_version,
442	void **server_handle));
443
444kadm5_ret_t
445kadm5_init_with_skey_ctx __P((
446	krb5_context context,
447	const char *client_name,
448	const char *keytab,
449	const char *service_name,
450	kadm5_config_params *realm_params,
451	unsigned long struct_version,
452	unsigned long api_version,
453	void **server_handle));
454
455kadm5_ret_t
456kadm5_modify_principal __P((
457	void *server_handle,
458	kadm5_principal_ent_t princ,
459	u_int32_t mask));
460
461kadm5_ret_t
462kadm5_randkey_principal __P((
463	void *server_handle,
464	krb5_principal princ,
465	krb5_keyblock **new_keys,
466	int *n_keys));
467
468kadm5_ret_t
469kadm5_rename_principal __P((
470	void *server_handle,
471	krb5_principal source,
472	krb5_principal target));
473
474kadm5_ret_t
475kadm5_ret_key_data __P((
476	krb5_storage *sp,
477	krb5_key_data *key));
478
479kadm5_ret_t
480kadm5_ret_principal_ent __P((
481	krb5_storage *sp,
482	kadm5_principal_ent_t princ));
483
484kadm5_ret_t
485kadm5_ret_principal_ent_mask __P((
486	krb5_storage *sp,
487	kadm5_principal_ent_t princ,
488	u_int32_t *mask));
489
490kadm5_ret_t
491kadm5_ret_tl_data __P((
492	krb5_storage *sp,
493	krb5_tl_data *tl));
494
495kadm5_ret_t
496kadm5_s_chpass_principal __P((
497	void *server_handle,
498	krb5_principal princ,
499	char *password));
500
501kadm5_ret_t
502kadm5_s_chpass_principal_with_key __P((
503	void *server_handle,
504	krb5_principal princ,
505	int n_key_data,
506	krb5_key_data *key_data));
507
508kadm5_ret_t
509kadm5_s_create_principal __P((
510	void *server_handle,
511	kadm5_principal_ent_t princ,
512	u_int32_t mask,
513	char *password));
514
515kadm5_ret_t
516kadm5_s_create_principal_with_key __P((
517	void *server_handle,
518	kadm5_principal_ent_t princ,
519	u_int32_t mask));
520
521kadm5_ret_t
522kadm5_s_delete_principal __P((
523	void *server_handle,
524	krb5_principal princ));
525
526kadm5_ret_t
527kadm5_s_destroy __P((void *server_handle));
528
529kadm5_ret_t
530kadm5_s_flush __P((void *server_handle));
531
532kadm5_ret_t
533kadm5_s_get_principal __P((
534	void *server_handle,
535	krb5_principal princ,
536	kadm5_principal_ent_t out,
537	u_int32_t mask));
538
539kadm5_ret_t
540kadm5_s_get_principals __P((
541	void *server_handle,
542	const char *exp,
543	char ***princs,
544	int *count));
545
546kadm5_ret_t
547kadm5_s_get_privs __P((
548	void *server_handle,
549	u_int32_t *privs));
550
551kadm5_ret_t
552kadm5_s_init_with_creds __P((
553	const char *client_name,
554	krb5_ccache ccache,
555	const char *service_name,
556	kadm5_config_params *realm_params,
557	unsigned long struct_version,
558	unsigned long api_version,
559	void **server_handle));
560
561kadm5_ret_t
562kadm5_s_init_with_creds_ctx __P((
563	krb5_context context,
564	const char *client_name,
565	krb5_ccache ccache,
566	const char *service_name,
567	kadm5_config_params *realm_params,
568	unsigned long struct_version,
569	unsigned long api_version,
570	void **server_handle));
571
572kadm5_ret_t
573kadm5_s_init_with_password __P((
574	const char *client_name,
575	const char *password,
576	const char *service_name,
577	kadm5_config_params *realm_params,
578	unsigned long struct_version,
579	unsigned long api_version,
580	void **server_handle));
581
582kadm5_ret_t
583kadm5_s_init_with_password_ctx __P((
584	krb5_context context,
585	const char *client_name,
586	const char *password,
587	const char *service_name,
588	kadm5_config_params *realm_params,
589	unsigned long struct_version,
590	unsigned long api_version,
591	void **server_handle));
592
593kadm5_ret_t
594kadm5_s_init_with_skey __P((
595	const char *client_name,
596	const char *keytab,
597	const char *service_name,
598	kadm5_config_params *realm_params,
599	unsigned long struct_version,
600	unsigned long api_version,
601	void **server_handle));
602
603kadm5_ret_t
604kadm5_s_init_with_skey_ctx __P((
605	krb5_context context,
606	const char *client_name,
607	const char *keytab,
608	const char *service_name,
609	kadm5_config_params *realm_params,
610	unsigned long struct_version,
611	unsigned long api_version,
612	void **server_handle));
613
614kadm5_ret_t
615kadm5_s_modify_principal __P((
616	void *server_handle,
617	kadm5_principal_ent_t princ,
618	u_int32_t mask));
619
620kadm5_ret_t
621kadm5_s_randkey_principal __P((
622	void *server_handle,
623	krb5_principal princ,
624	krb5_keyblock **new_keys,
625	int *n_keys));
626
627kadm5_ret_t
628kadm5_s_rename_principal __P((
629	void *server_handle,
630	krb5_principal source,
631	krb5_principal target));
632
633kadm5_ret_t
634kadm5_store_key_data __P((
635	krb5_storage *sp,
636	krb5_key_data *key));
637
638kadm5_ret_t
639kadm5_store_principal_ent __P((
640	krb5_storage *sp,
641	kadm5_principal_ent_t princ));
642
643kadm5_ret_t
644kadm5_store_principal_ent_mask __P((
645	krb5_storage *sp,
646	kadm5_principal_ent_t princ,
647	u_int32_t mask));
648
649kadm5_ret_t
650kadm5_store_tl_data __P((
651	krb5_storage *sp,
652	krb5_tl_data *tl));
653
654void
655kadm5_setup_passwd_quality_check(krb5_context context,
656				 const char *check_library,
657				 const char *check_function);
658
659const char *
660kadm5_check_password_quality (krb5_context context,
661			      krb5_principal principal,
662			      krb5_data *pwd_data);
663
664#if 0
665/* unimplemented functions */
666kadm5_ret_t
667kadm5_decrypt_key(void *server_handle,
668		  kadm5_principal_ent_t entry, int32_t
669		  ktype, int32_t stype, int32_t
670		  kvno, krb5_keyblock *keyblock,
671		  krb5_keysalt *keysalt, int *kvnop);
672
673kadm5_ret_t
674kadm5_create_policy(void *server_handle,
675		    kadm5_policy_ent_t policy, u_int32_t mask);
676
677kadm5_ret_t
678kadm5_delete_policy(void *server_handle, char *policy);
679
680
681kadm5_ret_t
682kadm5_modify_policy(void *server_handle,
683		    kadm5_policy_ent_t policy,
684		    u_int32_t mask);
685
686kadm5_ret_t
687kadm5_get_policy(void *server_handle, char *policy, kadm5_policy_ent_t ent);
688
689kadm5_ret_t
690kadm5_get_policies(void *server_handle, char *exp,
691		   char ***pols, int *count);
692
693void
694kadm5_free_policy_ent(kadm5_policy_ent_t policy);
695
696#endif
697
698#endif /* __KADM5_ADMIN_H__ */
699