 3258e4eaa9
			
		
	
	3258e4eaa9
	
	
	
		
			
			git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@6078 ec53bebd-3082-4978-b11e-865c3cabbd6b
		
			
				
	
	
		
			714 lines
		
	
	
		
			17 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			714 lines
		
	
	
		
			17 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * Copyright (c) 1997-1999 Kungliga Tekniska Högskolan
 | |
|  * (Royal Institute of Technology, Stockholm, Sweden). 
 | |
|  * All rights reserved. 
 | |
|  *
 | |
|  * Redistribution and use in source and binary forms, with or without 
 | |
|  * modification, are permitted provided that the following conditions 
 | |
|  * are met: 
 | |
|  *
 | |
|  * 1. Redistributions of source code must retain the above copyright 
 | |
|  *    notice, this list of conditions and the following disclaimer. 
 | |
|  *
 | |
|  * 2. Redistributions in binary form must reproduce the above copyright 
 | |
|  *    notice, this list of conditions and the following disclaimer in the 
 | |
|  *    documentation and/or other materials provided with the distribution. 
 | |
|  *
 | |
|  * 3. All advertising materials mentioning features or use of this software 
 | |
|  *    must display the following acknowledgement: 
 | |
|  *      This product includes software developed by Kungliga Tekniska 
 | |
|  *      Högskolan and its contributors. 
 | |
|  *
 | |
|  * 4. Neither the name of the Institute nor the names of its contributors 
 | |
|  *    may be used to endorse or promote products derived from this software 
 | |
|  *    without specific prior written permission. 
 | |
|  *
 | |
|  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND 
 | |
|  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 
 | |
|  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 
 | |
|  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE 
 | |
|  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 
 | |
|  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 
 | |
|  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 
 | |
|  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 
 | |
|  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 
 | |
|  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 
 | |
|  * SUCH DAMAGE. 
 | |
|  */
 | |
| /* $Id$ */
 | |
| 
 | |
| #ifndef __KADM5_ADMIN_H__
 | |
| #define __KADM5_ADMIN_H__
 | |
| 
 | |
| #define KADM5_API_VERSION_1 1
 | |
| #define KADM5_API_VERSION_2 2
 | |
| 
 | |
| #ifndef USE_KADM5_API_VERSION
 | |
| #define USE_KADM5_API_VERSION KADM5_API_VERSION_2
 | |
| #endif
 | |
| 
 | |
| #if USE_KADM5_API_VERSION != KADM5_API_VERSION_2
 | |
| #error No support for API versions other than 2
 | |
| #endif
 | |
| 
 | |
| #define KADM5_STRUCT_VERSION 0
 | |
| 
 | |
| #include <krb5.h>
 | |
| 
 | |
| #define KRB5_KDB_DISALLOW_POSTDATED	0x00000001
 | |
| #define KRB5_KDB_DISALLOW_FORWARDABLE	0x00000002
 | |
| #define KRB5_KDB_DISALLOW_TGT_BASED	0x00000004
 | |
| #define KRB5_KDB_DISALLOW_RENEWABLE	0x00000008
 | |
| #define KRB5_KDB_DISALLOW_PROXIABLE	0x00000010
 | |
| #define KRB5_KDB_DISALLOW_DUP_SKEY	0x00000020
 | |
| #define KRB5_KDB_DISALLOW_ALL_TIX	0x00000040
 | |
| #define KRB5_KDB_REQUIRES_PRE_AUTH	0x00000080
 | |
| #define KRB5_KDB_REQUIRES_HW_AUTH	0x00000100
 | |
| #define KRB5_KDB_REQUIRES_PWCHANGE	0x00000200
 | |
| #define KRB5_KDB_DISALLOW_SVR		0x00001000
 | |
| #define KRB5_KDB_PWCHANGE_SERVICE	0x00002000
 | |
| #define KRB5_KDB_SUPPORT_DESMD5		0x00004000
 | |
| #define KRB5_KDB_NEW_PRINC		0x00008000
 | |
| 
 | |
| #define KADM5_PRINCIPAL		0x000001
 | |
| #define KADM5_PRINC_EXPIRE_TIME	0x000002
 | |
| #define KADM5_PW_EXPIRATION	0x000004
 | |
| #define KADM5_LAST_PWD_CHANGE	0x000008
 | |
| #define KADM5_ATTRIBUTES	0x000010
 | |
| #define KADM5_MAX_LIFE		0x000020
 | |
| #define KADM5_MOD_TIME		0x000040
 | |
| #define KADM5_MOD_NAME		0x000080
 | |
| #define KADM5_KVNO		0x000100
 | |
| #define KADM5_MKVNO		0x000200
 | |
| #define KADM5_AUX_ATTRIBUTES	0x000400
 | |
| #define KADM5_POLICY		0x000800
 | |
| #define KADM5_POLICY_CLR	0x001000
 | |
| #define KADM5_MAX_RLIFE		0x002000
 | |
| #define KADM5_LAST_SUCCESS	0x004000
 | |
| #define KADM5_LAST_FAILED	0x008000
 | |
| #define KADM5_FAIL_AUTH_COUNT	0x010000
 | |
| #define KADM5_KEY_DATA		0x020000
 | |
| #define KADM5_TL_DATA		0x040000
 | |
| 
 | |
| #define KADM5_PRINCIPAL_NORMAL_MASK (~(KADM5_KEY_DATA | KADM5_TL_DATA))
 | |
| 
 | |
| #define KADM5_PW_MAX_LIFE 	0x004000
 | |
| #define KADM5_PW_MIN_LIFE	0x008000
 | |
| #define KADM5_PW_MIN_LENGTH 	0x010000
 | |
| #define KADM5_PW_MIN_CLASSES	0x020000
 | |
| #define KADM5_PW_HISTORY_NUM	0x040000
 | |
| #define KADM5_REF_COUNT		0x080000
 | |
| 
 | |
| #define KADM5_POLICY_NORMAL_MASK (~0)
 | |
| 
 | |
| #define KADM5_ADMIN_SERVICE	"kadmin/admin"
 | |
| #define KADM5_HIST_PRINCIPAL	"kadmin/history"
 | |
| #define KADM5_CHANGEPW_SERVICE	"kadmin/changepw"
 | |
| 
 | |
| typedef struct _krb5_key_data {
 | |
|     int16_t key_data_ver;	/* Version */
 | |
|     int16_t key_data_kvno;	/* Key Version */
 | |
|     int16_t key_data_type[2];	/* Array of types */
 | |
|     int16_t key_data_length[2];	/* Array of lengths */
 | |
|     void** key_data_contents[2];/* Array of pointers */
 | |
| } krb5_key_data;
 | |
| 
 | |
| typedef struct _krb5_tl_data {
 | |
|     struct _krb5_tl_data* tl_data_next;
 | |
|     int16_t tl_data_type;         
 | |
|     int16_t tl_data_length;       
 | |
|     void **tl_data_contents;     
 | |
| } krb5_tl_data;
 | |
| 
 | |
| typedef struct _kadm5_principal_ent_t {
 | |
|     krb5_principal principal;
 | |
| 
 | |
|     krb5_timestamp princ_expire_time;
 | |
|     krb5_timestamp last_pwd_change;
 | |
|     krb5_timestamp pw_expiration;
 | |
|     krb5_deltat max_life;
 | |
|     krb5_principal mod_name;
 | |
|     krb5_timestamp mod_date;
 | |
|     krb5_flags attributes;
 | |
|     krb5_kvno kvno;
 | |
|     krb5_kvno mkvno;
 | |
| 
 | |
|     char * policy;
 | |
|     u_int32_t aux_attributes;
 | |
| 
 | |
|     krb5_deltat max_renewable_life;
 | |
|     krb5_timestamp last_success;
 | |
|     krb5_timestamp last_failed;
 | |
|     krb5_kvno fail_auth_count;
 | |
|     int16_t n_key_data;
 | |
|     int16_t n_tl_data;
 | |
|     krb5_tl_data *tl_data;
 | |
|     krb5_key_data *key_data;
 | |
| } kadm5_principal_ent_rec, *kadm5_principal_ent_t;
 | |
| 
 | |
| typedef struct _kadm5_policy_ent_t {
 | |
|     char *policy;
 | |
| 
 | |
|     u_int32_t pw_min_life;
 | |
|     u_int32_t pw_max_life;
 | |
|     u_int32_t pw_min_length;
 | |
|     u_int32_t pw_min_classes;
 | |
|     u_int32_t pw_history_num;
 | |
|     u_int32_t policy_refcnt;
 | |
| } kadm5_policy_ent_rec, *kadm5_policy_ent_t;
 | |
| 
 | |
| #define KADM5_CONFIG_REALM			(1 << 0)
 | |
| #define KADM5_CONFIG_PROFILE			(1 << 1)
 | |
| #define KADM5_CONFIG_KADMIND_PORT		(1 << 2)
 | |
| #define KADM5_CONFIG_ADMIN_SERVER		(1 << 3)
 | |
| #define KADM5_CONFIG_DBNAME			(1 << 4)
 | |
| #define KADM5_CONFIG_ADBNAME			(1 << 5)
 | |
| #define KADM5_CONFIG_ADB_LOCKFILE		(1 << 6)
 | |
| #define KADM5_CONFIG_ACL_FILE			(1 << 7)
 | |
| #define KADM5_CONFIG_DICT_FILE			(1 << 8)
 | |
| #define KADM5_CONFIG_ADMIN_KEYTAB		(1 << 9)
 | |
| #define KADM5_CONFIG_MKEY_FROM_KEYBOARD		(1 << 10)
 | |
| #define KADM5_CONFIG_STASH_FILE			(1 << 11)
 | |
| #define KADM5_CONFIG_MKEY_NAME			(1 << 12)
 | |
| #define KADM5_CONFIG_ENCTYPE			(1 << 13)
 | |
| #define KADM5_CONFIG_MAX_LIFE			(1 << 14)
 | |
| #define KADM5_CONFIG_MAX_RLIFE			(1 << 15)
 | |
| #define KADM5_CONFIG_EXPIRATION			(1 << 16)
 | |
| #define KADM5_CONFIG_FLAGS			(1 << 17)
 | |
| #define KADM5_CONFIG_ENCTYPES			(1 << 18)
 | |
| 
 | |
| #define KADM5_PRIV_GET		(1 << 0)
 | |
| #define KADM5_PRIV_ADD 		(1 << 1)
 | |
| #define KADM5_PRIV_MODIFY	(1 << 2)
 | |
| #define KADM5_PRIV_DELETE	(1 << 3)
 | |
| #define KADM5_PRIV_LIST		(1 << 4)
 | |
| #define KADM5_PRIV_CPW		(1 << 5)
 | |
| #define KADM5_PRIV_ALL		(KADM5_PRIV_GET | KADM5_PRIV_ADD | KADM5_PRIV_MODIFY | KADM5_PRIV_DELETE | KADM5_PRIV_LIST | KADM5_PRIV_CPW)
 | |
| 
 | |
| typedef struct {
 | |
|     int XXX;
 | |
| }krb5_key_salt_tuple;
 | |
| 
 | |
| typedef struct _kadm5_config_params {
 | |
|     u_int32_t mask;
 | |
| 
 | |
|     /* Client and server fields */
 | |
|     char *realm;
 | |
|     char *profile;
 | |
|     int kadmind_port;
 | |
| 
 | |
|     /* client fields */
 | |
|     char *admin_server;
 | |
| 
 | |
|     /* server fields */
 | |
|     char *dbname;
 | |
|     char *admin_dbname;
 | |
|     char *admin_lockfile;
 | |
|     char *acl_file;
 | |
|     char *dict_file;
 | |
|     char *admin_keytab;
 | |
| 
 | |
|     /* server library (database) fields */
 | |
|     int mkey_from_kbd;
 | |
|     char *stash_file;
 | |
|     char *mkey_name;
 | |
|     krb5_enctype enctype;
 | |
|     krb5_deltat max_life;
 | |
|     krb5_deltat max_rlife;
 | |
|     krb5_timestamp expiration;
 | |
|     krb5_flags flags;
 | |
|     krb5_key_salt_tuple *keysalts;
 | |
|     int32_t num_keysalts;
 | |
| } kadm5_config_params;
 | |
| 
 | |
| typedef krb5_error_code kadm5_ret_t;
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_c_chpass_principal __P((
 | |
| 	void *server_handle,
 | |
| 	krb5_principal princ,
 | |
| 	char *password));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_c_create_principal __P((
 | |
| 	void *server_handle,
 | |
| 	kadm5_principal_ent_t princ,
 | |
| 	u_int32_t mask,
 | |
| 	char *password));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_c_delete_principal __P((
 | |
| 	void *server_handle,
 | |
| 	krb5_principal princ));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_c_destroy __P((void *server_handle));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_c_flush __P((void *server_handle));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_c_get_principal __P((
 | |
| 	void *server_handle,
 | |
| 	krb5_principal princ,
 | |
| 	kadm5_principal_ent_t out,
 | |
| 	u_int32_t mask));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_c_get_principals __P((
 | |
| 	void *server_handle,
 | |
| 	const char *exp,
 | |
| 	char ***princs,
 | |
| 	int *count));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_c_get_privs __P((
 | |
| 	void *server_handle,
 | |
| 	u_int32_t *privs));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_c_init_with_creds __P((
 | |
| 	const char *client_name,
 | |
| 	krb5_ccache ccache,
 | |
| 	const char *service_name,
 | |
| 	kadm5_config_params *realm_params,
 | |
| 	unsigned long struct_version,
 | |
| 	unsigned long api_version,
 | |
| 	void **server_handle));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_c_init_with_creds_ctx __P((
 | |
| 	krb5_context context,
 | |
| 	const char *client_name,
 | |
| 	krb5_ccache ccache,
 | |
| 	const char *service_name,
 | |
| 	kadm5_config_params *realm_params,
 | |
| 	unsigned long struct_version,
 | |
| 	unsigned long api_version,
 | |
| 	void **server_handle));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_c_init_with_password __P((
 | |
| 	const char *client_name,
 | |
| 	const char *password,
 | |
| 	const char *service_name,
 | |
| 	kadm5_config_params *realm_params,
 | |
| 	unsigned long struct_version,
 | |
| 	unsigned long api_version,
 | |
| 	void **server_handle));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_c_init_with_password_ctx __P((
 | |
| 	krb5_context context,
 | |
| 	const char *client_name,
 | |
| 	const char *password,
 | |
| 	const char *service_name,
 | |
| 	kadm5_config_params *realm_params,
 | |
| 	unsigned long struct_version,
 | |
| 	unsigned long api_version,
 | |
| 	void **server_handle));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_c_init_with_skey __P((
 | |
| 	const char *client_name,
 | |
| 	const char *keytab,
 | |
| 	const char *service_name,
 | |
| 	kadm5_config_params *realm_params,
 | |
| 	unsigned long struct_version,
 | |
| 	unsigned long api_version,
 | |
| 	void **server_handle));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_c_init_with_skey_ctx __P((
 | |
| 	krb5_context context,
 | |
| 	const char *client_name,
 | |
| 	const char *keytab,
 | |
| 	const char *service_name,
 | |
| 	kadm5_config_params *realm_params,
 | |
| 	unsigned long struct_version,
 | |
| 	unsigned long api_version,
 | |
| 	void **server_handle));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_c_modify_principal __P((
 | |
| 	void *server_handle,
 | |
| 	kadm5_principal_ent_t princ,
 | |
| 	u_int32_t mask));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_c_randkey_principal __P((
 | |
| 	void *server_handle,
 | |
| 	krb5_principal princ,
 | |
| 	krb5_keyblock **new_keys,
 | |
| 	int *n_keys));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_c_rename_principal __P((
 | |
| 	void *server_handle,
 | |
| 	krb5_principal source,
 | |
| 	krb5_principal target));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_chpass_principal __P((
 | |
| 	void *server_handle,
 | |
| 	krb5_principal princ,
 | |
| 	char *password));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_create_principal __P((
 | |
| 	void *server_handle,
 | |
| 	kadm5_principal_ent_t princ,
 | |
| 	u_int32_t mask,
 | |
| 	char *password));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_delete_principal __P((
 | |
| 	void *server_handle,
 | |
| 	krb5_principal princ));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_destroy __P((void *server_handle));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_flush __P((void *server_handle));
 | |
| 
 | |
| void
 | |
| kadm5_free_key_data __P((
 | |
| 	void *server_handle,
 | |
| 	int16_t *n_key_data,
 | |
| 	krb5_key_data *key_data));
 | |
| 
 | |
| void
 | |
| kadm5_free_name_list __P((
 | |
| 	void *server_handle,
 | |
| 	char **names,
 | |
| 	int *count));
 | |
| 
 | |
| void
 | |
| kadm5_free_principal_ent __P((
 | |
| 	void *server_handle,
 | |
| 	kadm5_principal_ent_t princ));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_get_principal __P((
 | |
| 	void *server_handle,
 | |
| 	krb5_principal princ,
 | |
| 	kadm5_principal_ent_t out,
 | |
| 	u_int32_t mask));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_get_principals __P((
 | |
| 	void *server_handle,
 | |
| 	const char *exp,
 | |
| 	char ***princs,
 | |
| 	int *count));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_get_privs __P((
 | |
| 	void *server_handle,
 | |
| 	u_int32_t *privs));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_init_with_creds __P((
 | |
| 	const char *client_name,
 | |
| 	krb5_ccache ccache,
 | |
| 	const char *service_name,
 | |
| 	kadm5_config_params *realm_params,
 | |
| 	unsigned long struct_version,
 | |
| 	unsigned long api_version,
 | |
| 	void **server_handle));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_init_with_creds_ctx __P((
 | |
| 	krb5_context context,
 | |
| 	const char *client_name,
 | |
| 	krb5_ccache ccache,
 | |
| 	const char *service_name,
 | |
| 	kadm5_config_params *realm_params,
 | |
| 	unsigned long struct_version,
 | |
| 	unsigned long api_version,
 | |
| 	void **server_handle));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_init_with_password __P((
 | |
| 	const char *client_name,
 | |
| 	const char *password,
 | |
| 	const char *service_name,
 | |
| 	kadm5_config_params *realm_params,
 | |
| 	unsigned long struct_version,
 | |
| 	unsigned long api_version,
 | |
| 	void **server_handle));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_init_with_password_ctx __P((
 | |
| 	krb5_context context,
 | |
| 	const char *client_name,
 | |
| 	const char *password,
 | |
| 	const char *service_name,
 | |
| 	kadm5_config_params *realm_params,
 | |
| 	unsigned long struct_version,
 | |
| 	unsigned long api_version,
 | |
| 	void **server_handle));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_init_with_skey __P((
 | |
| 	const char *client_name,
 | |
| 	const char *keytab,
 | |
| 	const char *service_name,
 | |
| 	kadm5_config_params *realm_params,
 | |
| 	unsigned long struct_version,
 | |
| 	unsigned long api_version,
 | |
| 	void **server_handle));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_init_with_skey_ctx __P((
 | |
| 	krb5_context context,
 | |
| 	const char *client_name,
 | |
| 	const char *keytab,
 | |
| 	const char *service_name,
 | |
| 	kadm5_config_params *realm_params,
 | |
| 	unsigned long struct_version,
 | |
| 	unsigned long api_version,
 | |
| 	void **server_handle));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_modify_principal __P((
 | |
| 	void *server_handle,
 | |
| 	kadm5_principal_ent_t princ,
 | |
| 	u_int32_t mask));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_randkey_principal __P((
 | |
| 	void *server_handle,
 | |
| 	krb5_principal princ,
 | |
| 	krb5_keyblock **new_keys,
 | |
| 	int *n_keys));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_rename_principal __P((
 | |
| 	void *server_handle,
 | |
| 	krb5_principal source,
 | |
| 	krb5_principal target));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_ret_key_data __P((
 | |
| 	krb5_storage *sp,
 | |
| 	krb5_key_data *key));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_ret_principal_ent __P((
 | |
| 	krb5_storage *sp,
 | |
| 	kadm5_principal_ent_t princ));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_ret_principal_ent_mask __P((
 | |
| 	krb5_storage *sp,
 | |
| 	kadm5_principal_ent_t princ,
 | |
| 	u_int32_t *mask));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_ret_tl_data __P((
 | |
| 	krb5_storage *sp,
 | |
| 	krb5_tl_data *tl));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_s_chpass_principal __P((
 | |
| 	void *server_handle,
 | |
| 	krb5_principal princ,
 | |
| 	char *password));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_s_chpass_principal_with_key __P((
 | |
| 	void *server_handle,
 | |
| 	krb5_principal princ,
 | |
| 	int n_key_data,
 | |
| 	krb5_key_data *key_data));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_s_create_principal __P((
 | |
| 	void *server_handle,
 | |
| 	kadm5_principal_ent_t princ,
 | |
| 	u_int32_t mask,
 | |
| 	char *password));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_s_create_principal_with_key __P((
 | |
| 	void *server_handle,
 | |
| 	kadm5_principal_ent_t princ,
 | |
| 	u_int32_t mask));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_s_delete_principal __P((
 | |
| 	void *server_handle,
 | |
| 	krb5_principal princ));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_s_destroy __P((void *server_handle));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_s_flush __P((void *server_handle));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_s_get_principal __P((
 | |
| 	void *server_handle,
 | |
| 	krb5_principal princ,
 | |
| 	kadm5_principal_ent_t out,
 | |
| 	u_int32_t mask));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_s_get_principals __P((
 | |
| 	void *server_handle,
 | |
| 	const char *exp,
 | |
| 	char ***princs,
 | |
| 	int *count));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_s_get_privs __P((
 | |
| 	void *server_handle,
 | |
| 	u_int32_t *privs));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_s_init_with_creds __P((
 | |
| 	const char *client_name,
 | |
| 	krb5_ccache ccache,
 | |
| 	const char *service_name,
 | |
| 	kadm5_config_params *realm_params,
 | |
| 	unsigned long struct_version,
 | |
| 	unsigned long api_version,
 | |
| 	void **server_handle));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_s_init_with_creds_ctx __P((
 | |
| 	krb5_context context,
 | |
| 	const char *client_name,
 | |
| 	krb5_ccache ccache,
 | |
| 	const char *service_name,
 | |
| 	kadm5_config_params *realm_params,
 | |
| 	unsigned long struct_version,
 | |
| 	unsigned long api_version,
 | |
| 	void **server_handle));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_s_init_with_password __P((
 | |
| 	const char *client_name,
 | |
| 	const char *password,
 | |
| 	const char *service_name,
 | |
| 	kadm5_config_params *realm_params,
 | |
| 	unsigned long struct_version,
 | |
| 	unsigned long api_version,
 | |
| 	void **server_handle));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_s_init_with_password_ctx __P((
 | |
| 	krb5_context context,
 | |
| 	const char *client_name,
 | |
| 	const char *password,
 | |
| 	const char *service_name,
 | |
| 	kadm5_config_params *realm_params,
 | |
| 	unsigned long struct_version,
 | |
| 	unsigned long api_version,
 | |
| 	void **server_handle));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_s_init_with_skey __P((
 | |
| 	const char *client_name,
 | |
| 	const char *keytab,
 | |
| 	const char *service_name,
 | |
| 	kadm5_config_params *realm_params,
 | |
| 	unsigned long struct_version,
 | |
| 	unsigned long api_version,
 | |
| 	void **server_handle));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_s_init_with_skey_ctx __P((
 | |
| 	krb5_context context,
 | |
| 	const char *client_name,
 | |
| 	const char *keytab,
 | |
| 	const char *service_name,
 | |
| 	kadm5_config_params *realm_params,
 | |
| 	unsigned long struct_version,
 | |
| 	unsigned long api_version,
 | |
| 	void **server_handle));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_s_modify_principal __P((
 | |
| 	void *server_handle,
 | |
| 	kadm5_principal_ent_t princ,
 | |
| 	u_int32_t mask));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_s_modify_principal_with_key __P((
 | |
| 	void *server_handle,
 | |
| 	kadm5_principal_ent_t princ,
 | |
| 	u_int32_t mask));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_s_randkey_principal __P((
 | |
| 	void *server_handle,
 | |
| 	krb5_principal princ,
 | |
| 	krb5_keyblock **new_keys,
 | |
| 	int *n_keys));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_s_rename_principal __P((
 | |
| 	void *server_handle,
 | |
| 	krb5_principal source,
 | |
| 	krb5_principal target));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_store_key_data __P((
 | |
| 	krb5_storage *sp,
 | |
| 	krb5_key_data *key));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_store_principal_ent __P((
 | |
| 	krb5_storage *sp,
 | |
| 	kadm5_principal_ent_t princ));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_store_principal_ent_mask __P((
 | |
| 	krb5_storage *sp,
 | |
| 	kadm5_principal_ent_t princ,
 | |
| 	u_int32_t mask));
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_store_tl_data __P((
 | |
| 	krb5_storage *sp,
 | |
| 	krb5_tl_data *tl));
 | |
| 
 | |
| #if 0
 | |
| /* unimplemented functions */
 | |
| kadm5_ret_t 
 | |
| kadm5_decrypt_key(void *server_handle,
 | |
| 		  kadm5_principal_ent_t entry, int32_t
 | |
| 		  ktype, int32_t stype, int32_t
 | |
| 		  kvno, krb5_keyblock *keyblock,
 | |
| 		  krb5_keysalt *keysalt, int *kvnop);
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_create_policy(void *server_handle,
 | |
| 		    kadm5_policy_ent_t policy, u_int32_t mask); 
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_delete_policy(void *server_handle, char *policy);
 | |
| 
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_modify_policy(void *server_handle,
 | |
| 		    kadm5_policy_ent_t policy, 
 | |
| 		    u_int32_t mask);
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_get_policy(void *server_handle, char *policy, kadm5_policy_ent_t ent); 
 | |
| 
 | |
| kadm5_ret_t
 | |
| kadm5_get_policies(void *server_handle, char *exp,
 | |
| 		   char ***pols, int *count);
 | |
| 
 | |
| void 
 | |
| kadm5_free_policy_ent(kadm5_policy_ent_t policy);
 | |
| 
 | |
| #endif
 | |
| 
 | |
| #endif /* __KADM5_ADMIN_H__ */
 |