17c478bd9Sstevel@tonic-gate /*
2661b8ac7SPeter Shoults  * Copyright (c) 2001, 2010, Oracle and/or its affiliates. All rights reserved.
37c478bd9Sstevel@tonic-gate  */
47c478bd9Sstevel@tonic-gate 
57c478bd9Sstevel@tonic-gate /*
6*55fea89dSDan Cross  * WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING
77c478bd9Sstevel@tonic-gate  *
87c478bd9Sstevel@tonic-gate  *	Openvision retains the copyright to derivative works of
97c478bd9Sstevel@tonic-gate  *	this source code.  Do *NOT* create a derivative of this
107c478bd9Sstevel@tonic-gate  *	source code before consulting with your legal department.
117c478bd9Sstevel@tonic-gate  *	Do *NOT* integrate *ANY* of this source code into another
127c478bd9Sstevel@tonic-gate  *	product before consulting with your legal department.
137c478bd9Sstevel@tonic-gate  *
147c478bd9Sstevel@tonic-gate  *	For further information, read the top-level Openvision
157c478bd9Sstevel@tonic-gate  *	copyright which is contained in the top-level MIT Kerberos
167c478bd9Sstevel@tonic-gate  *	copyright.
177c478bd9Sstevel@tonic-gate  *
187c478bd9Sstevel@tonic-gate  * WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING
197c478bd9Sstevel@tonic-gate  *
207c478bd9Sstevel@tonic-gate  */
217c478bd9Sstevel@tonic-gate 
227c478bd9Sstevel@tonic-gate /*
237c478bd9Sstevel@tonic-gate  * Copyright 1993 OpenVision Technologies, Inc., All Rights Reserved
247c478bd9Sstevel@tonic-gate  */
257c478bd9Sstevel@tonic-gate 
267c478bd9Sstevel@tonic-gate #include	<sys/types.h>
277c478bd9Sstevel@tonic-gate #include	<sys/time.h>
28159d09a2SMark Phalan #include	<errno.h>
29159d09a2SMark Phalan #include	"server_internal.h"
307c478bd9Sstevel@tonic-gate #include	<kadm5/admin.h>
3154925bf6Swillf #include	<kdb.h>
327c478bd9Sstevel@tonic-gate #include	<stdio.h>
337c478bd9Sstevel@tonic-gate #include	<string.h>
347c478bd9Sstevel@tonic-gate #include	<stdarg.h>
357c478bd9Sstevel@tonic-gate #include	<stdlib.h>
36661b8ac7SPeter Shoults #include	<k5-int.h>
37661b8ac7SPeter Shoults #include	<kadm5/server_internal.h>
38661b8ac7SPeter Shoults #include	<kadm5/admin.h>
3956a424ccSmp #ifdef USE_PASSWORD_SERVER
4056a424ccSmp #include	<sys/wait.h>
4156a424ccSmp #endif
427c478bd9Sstevel@tonic-gate 
437c478bd9Sstevel@tonic-gate extern	krb5_principal	    master_princ;
447c478bd9Sstevel@tonic-gate extern	krb5_principal	    hist_princ;
457c478bd9Sstevel@tonic-gate extern	krb5_keyblock	    hist_key;
467c478bd9Sstevel@tonic-gate extern	krb5_db_entry	    master_db;
477c478bd9Sstevel@tonic-gate extern	krb5_db_entry	    hist_db;
487c478bd9Sstevel@tonic-gate extern  krb5_kvno	    hist_kvno;
497c478bd9Sstevel@tonic-gate 
507c478bd9Sstevel@tonic-gate static int decrypt_key_data(krb5_context context,
5156a424ccSmp 			    krb5_keyblock *, int n_key_data, krb5_key_data *key_data,
5256a424ccSmp 			    krb5_keyblock **keyblocks, int *n_keys);
537c478bd9Sstevel@tonic-gate 
54*55fea89dSDan Cross static krb5_error_code
kadm5_copy_principal(krb5_context context,krb5_const_principal inprinc,krb5_principal * outprinc)5554925bf6Swillf kadm5_copy_principal(krb5_context context, krb5_const_principal inprinc, krb5_principal *outprinc)
5654925bf6Swillf {
5754925bf6Swillf     register krb5_principal tempprinc;
5854925bf6Swillf     register int i, nelems;
59*55fea89dSDan Cross 
6054925bf6Swillf     tempprinc = (krb5_principal)krb5_db_alloc(context, NULL, sizeof(krb5_principal_data));
61*55fea89dSDan Cross 
6254925bf6Swillf     if (tempprinc == 0)
6354925bf6Swillf         return ENOMEM;
64*55fea89dSDan Cross 
6554925bf6Swillf     memcpy(tempprinc, inprinc, sizeof(krb5_principal_data));
66*55fea89dSDan Cross 
6754925bf6Swillf     nelems = (int) krb5_princ_size(context, inprinc);
6854925bf6Swillf     tempprinc->data = krb5_db_alloc(context, NULL, nelems * sizeof(krb5_data));
69*55fea89dSDan Cross 
7054925bf6Swillf     if (tempprinc->data == 0) {
7154925bf6Swillf 	krb5_db_free(context, (char *)tempprinc);
7254925bf6Swillf         return ENOMEM;
7354925bf6Swillf     }
74*55fea89dSDan Cross 
7554925bf6Swillf     for (i = 0; i < nelems; i++) {
7654925bf6Swillf         unsigned int len = krb5_princ_component(context, inprinc, i)->length;
7754925bf6Swillf         krb5_princ_component(context, tempprinc, i)->length = len;
7854925bf6Swillf         if (((krb5_princ_component(context, tempprinc, i)->data =
7954925bf6Swillf               krb5_db_alloc(context, NULL, len)) == 0) && len) {
8054925bf6Swillf             while (--i >= 0)
8154925bf6Swillf                 krb5_db_free(context, krb5_princ_component(context, tempprinc, i)->data);
8254925bf6Swillf             krb5_db_free (context, tempprinc->data);
8354925bf6Swillf             krb5_db_free (context, tempprinc);
8454925bf6Swillf             return ENOMEM;
8554925bf6Swillf         }
8654925bf6Swillf         if (len)
8754925bf6Swillf             memcpy(krb5_princ_component(context, tempprinc, i)->data,
8854925bf6Swillf                    krb5_princ_component(context, inprinc, i)->data, len);
8954925bf6Swillf     }
90*55fea89dSDan Cross 
9154925bf6Swillf     tempprinc->realm.data =
9254925bf6Swillf 	krb5_db_alloc(context, NULL, tempprinc->realm.length = inprinc->realm.length);
9354925bf6Swillf     if (!tempprinc->realm.data && tempprinc->realm.length) {
9454925bf6Swillf             for (i = 0; i < nelems; i++)
9554925bf6Swillf 		krb5_db_free(context, krb5_princ_component(context, tempprinc, i)->data);
9654925bf6Swillf             krb5_db_free(context, tempprinc->data);
9754925bf6Swillf             krb5_db_free(context, tempprinc);
9854925bf6Swillf             return ENOMEM;
9954925bf6Swillf     }
10054925bf6Swillf     if (tempprinc->realm.length)
10154925bf6Swillf         memcpy(tempprinc->realm.data, inprinc->realm.data,
10254925bf6Swillf                inprinc->realm.length);
103*55fea89dSDan Cross 
10454925bf6Swillf     *outprinc = tempprinc;
10554925bf6Swillf     return 0;
10654925bf6Swillf }
107*55fea89dSDan Cross 
10854925bf6Swillf static void
kadm5_free_principal(krb5_context context,krb5_principal val)10954925bf6Swillf kadm5_free_principal(krb5_context context, krb5_principal val)
11054925bf6Swillf {
11154925bf6Swillf     register krb5_int32 i;
112*55fea89dSDan Cross 
11354925bf6Swillf     if (!val)
11454925bf6Swillf         return;
115*55fea89dSDan Cross 
11654925bf6Swillf     if (val->data) {
11754925bf6Swillf         i = krb5_princ_size(context, val);
11854925bf6Swillf         while(--i >= 0)
11954925bf6Swillf             krb5_db_free(context, krb5_princ_component(context, val, i)->data);
12054925bf6Swillf         krb5_db_free(context, val->data);
12154925bf6Swillf     }
12254925bf6Swillf     if (val->realm.data)
12354925bf6Swillf         krb5_db_free(context, val->realm.data);
12454925bf6Swillf     krb5_db_free(context, val);
12554925bf6Swillf }
12654925bf6Swillf 
1277c478bd9Sstevel@tonic-gate /*
1287c478bd9Sstevel@tonic-gate  * XXX Functions that ought to be in libkrb5.a, but aren't.
1297c478bd9Sstevel@tonic-gate  */
krb5_copy_key_data_contents(context,from,to)1307c478bd9Sstevel@tonic-gate kadm5_ret_t krb5_copy_key_data_contents(context, from, to)
1317c478bd9Sstevel@tonic-gate    krb5_context context;
1327c478bd9Sstevel@tonic-gate    krb5_key_data *from, *to;
1337c478bd9Sstevel@tonic-gate {
1347c478bd9Sstevel@tonic-gate      int i, idx;
135*55fea89dSDan Cross 
1367c478bd9Sstevel@tonic-gate      *to = *from;
1377c478bd9Sstevel@tonic-gate 
1387c478bd9Sstevel@tonic-gate      idx = (from->key_data_ver == 1 ? 1 : 2);
1397c478bd9Sstevel@tonic-gate 
1407c478bd9Sstevel@tonic-gate      for (i = 0; i < idx; i++) {
1417c478bd9Sstevel@tonic-gate        if ( from->key_data_length[i] ) {
1427c478bd9Sstevel@tonic-gate 	 to->key_data_contents[i] = malloc(from->key_data_length[i]);
1437c478bd9Sstevel@tonic-gate 	 if (to->key_data_contents[i] == NULL) {
1447c478bd9Sstevel@tonic-gate 	   for (i = 0; i < idx; i++) {
1457c478bd9Sstevel@tonic-gate 	     if (to->key_data_contents[i]) {
1467c478bd9Sstevel@tonic-gate 	       memset(to->key_data_contents[i], 0,
1477c478bd9Sstevel@tonic-gate 		      to->key_data_length[i]);
1487c478bd9Sstevel@tonic-gate 	       free(to->key_data_contents[i]);
1497c478bd9Sstevel@tonic-gate 	     }
1507c478bd9Sstevel@tonic-gate 	   }
1517c478bd9Sstevel@tonic-gate 	   return ENOMEM;
1527c478bd9Sstevel@tonic-gate 	 }
1537c478bd9Sstevel@tonic-gate 	 memcpy(to->key_data_contents[i], from->key_data_contents[i],
1547c478bd9Sstevel@tonic-gate 		from->key_data_length[i]);
1557c478bd9Sstevel@tonic-gate        }
1567c478bd9Sstevel@tonic-gate      }
1577c478bd9Sstevel@tonic-gate      return 0;
1587c478bd9Sstevel@tonic-gate }
1597c478bd9Sstevel@tonic-gate 
dup_tl_data(krb5_tl_data * tl)1607c478bd9Sstevel@tonic-gate static krb5_tl_data *dup_tl_data(krb5_tl_data *tl)
1617c478bd9Sstevel@tonic-gate {
1627c478bd9Sstevel@tonic-gate      krb5_tl_data *n;
1637c478bd9Sstevel@tonic-gate 
1647c478bd9Sstevel@tonic-gate      n = (krb5_tl_data *) malloc(sizeof(krb5_tl_data));
1657c478bd9Sstevel@tonic-gate      if (n == NULL)
1667c478bd9Sstevel@tonic-gate 	  return NULL;
1677c478bd9Sstevel@tonic-gate      n->tl_data_contents = malloc(tl->tl_data_length);
1687c478bd9Sstevel@tonic-gate      if (n->tl_data_contents == NULL) {
1697c478bd9Sstevel@tonic-gate 	  free(n);
1707c478bd9Sstevel@tonic-gate 	  return NULL;
1717c478bd9Sstevel@tonic-gate      }
1727c478bd9Sstevel@tonic-gate      memcpy(n->tl_data_contents, tl->tl_data_contents, tl->tl_data_length);
1737c478bd9Sstevel@tonic-gate      n->tl_data_type = tl->tl_data_type;
1747c478bd9Sstevel@tonic-gate      n->tl_data_length = tl->tl_data_length;
1757c478bd9Sstevel@tonic-gate      n->tl_data_next = NULL;
1767c478bd9Sstevel@tonic-gate      return n;
1777c478bd9Sstevel@tonic-gate }
1787c478bd9Sstevel@tonic-gate 
1797c478bd9Sstevel@tonic-gate /* This is in lib/kdb/kdb_cpw.c, but is static */
cleanup_key_data(context,count,data)1807c478bd9Sstevel@tonic-gate static void cleanup_key_data(context, count, data)
1817c478bd9Sstevel@tonic-gate    krb5_context	  context;
1827c478bd9Sstevel@tonic-gate    int			  count;
1837c478bd9Sstevel@tonic-gate    krb5_key_data	* data;
1847c478bd9Sstevel@tonic-gate {
1857c478bd9Sstevel@tonic-gate      int i, j;
186*55fea89dSDan Cross 
1877c478bd9Sstevel@tonic-gate      for (i = 0; i < count; i++)
1887c478bd9Sstevel@tonic-gate 	  for (j = 0; j < data[i].key_data_ver; j++)
1897c478bd9Sstevel@tonic-gate 	       if (data[i].key_data_length[j])
19054925bf6Swillf 		   krb5_db_free(context, data[i].key_data_contents[j]);
19154925bf6Swillf      krb5_db_free(context, data);
1927c478bd9Sstevel@tonic-gate }
1937c478bd9Sstevel@tonic-gate 
1947c478bd9Sstevel@tonic-gate kadm5_ret_t
kadm5_create_principal(void * server_handle,kadm5_principal_ent_t entry,long mask,char * password)1957c478bd9Sstevel@tonic-gate kadm5_create_principal(void *server_handle,
1967c478bd9Sstevel@tonic-gate 			    kadm5_principal_ent_t entry, long mask,
1977c478bd9Sstevel@tonic-gate 			    char *password)
1987c478bd9Sstevel@tonic-gate {
19956a424ccSmp     return
20056a424ccSmp 	kadm5_create_principal_3(server_handle, entry, mask,
20156a424ccSmp 				 0, NULL, password);
2027c478bd9Sstevel@tonic-gate }
2037c478bd9Sstevel@tonic-gate kadm5_ret_t
kadm5_create_principal_3(void * server_handle,kadm5_principal_ent_t entry,long mask,int n_ks_tuple,krb5_key_salt_tuple * ks_tuple,char * password)2047c478bd9Sstevel@tonic-gate kadm5_create_principal_3(void *server_handle,
2057c478bd9Sstevel@tonic-gate 			 kadm5_principal_ent_t entry, long mask,
2067c478bd9Sstevel@tonic-gate 			 int n_ks_tuple, krb5_key_salt_tuple *ks_tuple,
2077c478bd9Sstevel@tonic-gate 			 char *password)
2087c478bd9Sstevel@tonic-gate {
2097c478bd9Sstevel@tonic-gate     krb5_db_entry		kdb;
2107c478bd9Sstevel@tonic-gate     osa_princ_ent_rec		adb;
2117c478bd9Sstevel@tonic-gate     kadm5_policy_ent_rec	polent;
2127c478bd9Sstevel@tonic-gate     krb5_int32			now;
21338f33a76SToomas Soome     krb5_tl_data		*tl_data_tail;
2147c478bd9Sstevel@tonic-gate     unsigned int		ret;
2157c478bd9Sstevel@tonic-gate     kadm5_server_handle_t handle = server_handle;
2167c478bd9Sstevel@tonic-gate 
2177c478bd9Sstevel@tonic-gate     CHECK_HANDLE(server_handle);
2187c478bd9Sstevel@tonic-gate 
21954925bf6Swillf     krb5_clear_error_message(handle->context);
22054925bf6Swillf 
2217c478bd9Sstevel@tonic-gate     /*
2227c478bd9Sstevel@tonic-gate      * Argument sanity checking, and opening up the DB
2237c478bd9Sstevel@tonic-gate      */
2247c478bd9Sstevel@tonic-gate     if(!(mask & KADM5_PRINCIPAL) || (mask & KADM5_MOD_NAME) ||
2257c478bd9Sstevel@tonic-gate        (mask & KADM5_MOD_TIME) || (mask & KADM5_LAST_PWD_CHANGE) ||
2267c478bd9Sstevel@tonic-gate        (mask & KADM5_MKVNO) || (mask & KADM5_POLICY_CLR) ||
2277c478bd9Sstevel@tonic-gate        (mask & KADM5_AUX_ATTRIBUTES) || (mask & KADM5_KEY_DATA) ||
2287c478bd9Sstevel@tonic-gate        (mask & KADM5_LAST_SUCCESS) || (mask & KADM5_LAST_FAILED) ||
2297c478bd9Sstevel@tonic-gate        (mask & KADM5_FAIL_AUTH_COUNT))
2307c478bd9Sstevel@tonic-gate 	return KADM5_BAD_MASK;
2317c478bd9Sstevel@tonic-gate     if((mask & ~ALL_PRINC_MASK))
2327c478bd9Sstevel@tonic-gate 	return KADM5_BAD_MASK;
2337c478bd9Sstevel@tonic-gate     if (entry == (kadm5_principal_ent_t) NULL || password == NULL)
2347c478bd9Sstevel@tonic-gate 	return EINVAL;
2357c478bd9Sstevel@tonic-gate 
2367c478bd9Sstevel@tonic-gate     /*
2377c478bd9Sstevel@tonic-gate      * Check to see if the principal exists
2387c478bd9Sstevel@tonic-gate      */
2397c478bd9Sstevel@tonic-gate     ret = kdb_get_entry(handle, entry->principal, &kdb, &adb);
2407c478bd9Sstevel@tonic-gate 
2417c478bd9Sstevel@tonic-gate     switch(ret) {
2427c478bd9Sstevel@tonic-gate     case KADM5_UNK_PRINC:
243159d09a2SMark Phalan 	/* Solaris Kerberos */
24454925bf6Swillf 	memset(&kdb, 0, sizeof(krb5_db_entry));
24554925bf6Swillf 	memset(&adb, 0, sizeof(osa_princ_ent_rec));
2467c478bd9Sstevel@tonic-gate 	break;
2477c478bd9Sstevel@tonic-gate     case 0:
24854925bf6Swillf 	/*
24954925bf6Swillf 	 * Solaris Kerberos: this allows an addprinc to be done on a mix-in
25054925bf6Swillf 	 * princ which has no keys initially.
25154925bf6Swillf 	 */
25254925bf6Swillf 	if (kdb.n_key_data != 0) {
25354925bf6Swillf 		/* have a princ with keys, return dupe princ error */
25454925bf6Swillf 		kdb_free_entry(handle, &kdb, &adb);
25554925bf6Swillf 		return KADM5_DUP;
25654925bf6Swillf 	} else {
25754925bf6Swillf 		/*
25854925bf6Swillf 		 * have a princ with no keys, let's replace it.  Note, want to
25954925bf6Swillf 		 * keep the existing kdb tl_data (specifically the LDAP plugin
26054925bf6Swillf 		 * adds the DN to the tl_data which is needed to locate the dir.
26154925bf6Swillf 		 * entry).
26254925bf6Swillf 		 */
26354925bf6Swillf 		kdb_free_entry(handle, NULL, &adb);
26454925bf6Swillf 		memset(&adb, 0, sizeof(osa_princ_ent_rec));
26554925bf6Swillf 	}
26654925bf6Swillf 	break;
2677c478bd9Sstevel@tonic-gate     default:
2687c478bd9Sstevel@tonic-gate 	return ret;
2697c478bd9Sstevel@tonic-gate     }
2707c478bd9Sstevel@tonic-gate 
2717c478bd9Sstevel@tonic-gate     /*
2727c478bd9Sstevel@tonic-gate      * If a policy was specified, load it.
2737c478bd9Sstevel@tonic-gate      * If we can not find the one specified return an error
2747c478bd9Sstevel@tonic-gate      */
2757c478bd9Sstevel@tonic-gate     if ((mask & KADM5_POLICY)) {
2767c478bd9Sstevel@tonic-gate 	 if ((ret = kadm5_get_policy(handle->lhandle, entry->policy,
2777c478bd9Sstevel@tonic-gate 				     &polent)) != KADM5_OK) {
278*55fea89dSDan Cross 	    if(ret == EINVAL)
2797c478bd9Sstevel@tonic-gate 		return KADM5_BAD_POLICY;
2807c478bd9Sstevel@tonic-gate 	    else
2817c478bd9Sstevel@tonic-gate 		return ret;
2827c478bd9Sstevel@tonic-gate 	}
2837c478bd9Sstevel@tonic-gate     }
28456a424ccSmp     if ((ret = passwd_check(handle, password, (mask & KADM5_POLICY),
28556a424ccSmp 			    &polent, entry->principal))) {
2867c478bd9Sstevel@tonic-gate 	if (mask & KADM5_POLICY)
2877c478bd9Sstevel@tonic-gate 	     (void) kadm5_free_policy_ent(handle->lhandle, &polent);
2887c478bd9Sstevel@tonic-gate 	return ret;
2897c478bd9Sstevel@tonic-gate     }
2907c478bd9Sstevel@tonic-gate     /*
2917c478bd9Sstevel@tonic-gate      * Start populating the various DB fields, using the
2927c478bd9Sstevel@tonic-gate      * "defaults" for fields that were not specified by the
2937c478bd9Sstevel@tonic-gate      * mask.
2947c478bd9Sstevel@tonic-gate      */
29556a424ccSmp     if ((ret = krb5_timeofday(handle->context, &now))) {
29656a424ccSmp 	 if (mask & KADM5_POLICY)
29756a424ccSmp 	      (void) kadm5_free_policy_ent(handle->lhandle, &polent);
29856a424ccSmp 	 return ret;
2997c478bd9Sstevel@tonic-gate     }
3007c478bd9Sstevel@tonic-gate 
3017c478bd9Sstevel@tonic-gate     kdb.magic = KRB5_KDB_MAGIC_NUMBER;
3027c478bd9Sstevel@tonic-gate     kdb.len = KRB5_KDB_V1_BASE_LENGTH; /* gag me with a chainsaw */
3037c478bd9Sstevel@tonic-gate 
3047c478bd9Sstevel@tonic-gate     /*
305159d09a2SMark Phalan      * Solaris Kerberos:
3067c478bd9Sstevel@tonic-gate      * If KADM5_ATTRIBUTES is set, we want to rope in not only
3077c478bd9Sstevel@tonic-gate      * entry->attributes, but also the generic params.flags
3087c478bd9Sstevel@tonic-gate      * obtained previously via kadm5_get_config_params.
3097c478bd9Sstevel@tonic-gate      */
3107c478bd9Sstevel@tonic-gate     if ((mask & KADM5_ATTRIBUTES)) {
3117c478bd9Sstevel@tonic-gate 	kdb.attributes = handle->params.flags;
3127c478bd9Sstevel@tonic-gate 	kdb.attributes |= entry->attributes;
3137c478bd9Sstevel@tonic-gate     } else {
31454925bf6Swillf 	kdb.attributes = handle->params.flags;
3157c478bd9Sstevel@tonic-gate     }
3167c478bd9Sstevel@tonic-gate 
3177c478bd9Sstevel@tonic-gate     if ((mask & KADM5_MAX_LIFE))
318*55fea89dSDan Cross 	kdb.max_life = entry->max_life;
319*55fea89dSDan Cross     else
3207c478bd9Sstevel@tonic-gate 	kdb.max_life = handle->params.max_life;
3217c478bd9Sstevel@tonic-gate 
3227c478bd9Sstevel@tonic-gate     if (mask & KADM5_MAX_RLIFE)
3237c478bd9Sstevel@tonic-gate 	 kdb.max_renewable_life = entry->max_renewable_life;
3247c478bd9Sstevel@tonic-gate     else
3257c478bd9Sstevel@tonic-gate 	 kdb.max_renewable_life = handle->params.max_rlife;
3267c478bd9Sstevel@tonic-gate 
3277c478bd9Sstevel@tonic-gate     if ((mask & KADM5_PRINC_EXPIRE_TIME))
3287c478bd9Sstevel@tonic-gate 	kdb.expiration = entry->princ_expire_time;
3297c478bd9Sstevel@tonic-gate     else
3307c478bd9Sstevel@tonic-gate 	kdb.expiration = handle->params.expiration;
3317c478bd9Sstevel@tonic-gate 
3327c478bd9Sstevel@tonic-gate     kdb.pw_expiration = 0;
3337c478bd9Sstevel@tonic-gate     if ((mask & KADM5_POLICY)) {
3347c478bd9Sstevel@tonic-gate 	if(polent.pw_max_life)
3357c478bd9Sstevel@tonic-gate 	    kdb.pw_expiration = now + polent.pw_max_life;
3367c478bd9Sstevel@tonic-gate 	else
3377c478bd9Sstevel@tonic-gate 	    kdb.pw_expiration = 0;
3387c478bd9Sstevel@tonic-gate     }
3397c478bd9Sstevel@tonic-gate     if ((mask & KADM5_PW_EXPIRATION))
3407c478bd9Sstevel@tonic-gate 	 kdb.pw_expiration = entry->pw_expiration;
341*55fea89dSDan Cross 
3427c478bd9Sstevel@tonic-gate     kdb.last_success = 0;
3437c478bd9Sstevel@tonic-gate     kdb.last_failed = 0;
3447c478bd9Sstevel@tonic-gate     kdb.fail_auth_count = 0;
3457c478bd9Sstevel@tonic-gate 
3467c478bd9Sstevel@tonic-gate     /* this is kind of gross, but in order to free the tl data, I need
3477c478bd9Sstevel@tonic-gate        to free the entire kdb entry, and that will try to free the
3487c478bd9Sstevel@tonic-gate        principal. */
3497c478bd9Sstevel@tonic-gate 
35054925bf6Swillf     if ((ret = kadm5_copy_principal(handle->context,
35154925bf6Swillf 				    entry->principal, &(kdb.princ)))) {
3527c478bd9Sstevel@tonic-gate 	if (mask & KADM5_POLICY)
3537c478bd9Sstevel@tonic-gate 	     (void) kadm5_free_policy_ent(handle->lhandle, &polent);
3547c478bd9Sstevel@tonic-gate 	return(ret);
3557c478bd9Sstevel@tonic-gate     }
3567c478bd9Sstevel@tonic-gate 
35756a424ccSmp     if ((ret = krb5_dbe_update_last_pwd_change(handle->context, &kdb, now))) {
35854925bf6Swillf          krb5_db_free_principal(handle->context, &kdb, 1);
35956a424ccSmp 	 if (mask & KADM5_POLICY)
3607c478bd9Sstevel@tonic-gate 	     (void) kadm5_free_policy_ent(handle->lhandle, &polent);
36156a424ccSmp 	 return(ret);
3627c478bd9Sstevel@tonic-gate     }
3637c478bd9Sstevel@tonic-gate 
36454925bf6Swillf     if (mask & KADM5_TL_DATA) {
36554925bf6Swillf 	/* splice entry->tl_data onto the front of kdb.tl_data */
36654925bf6Swillf 	for (tl_data_tail = entry->tl_data; tl_data_tail;
36754925bf6Swillf 	     tl_data_tail = tl_data_tail->tl_data_next)
36854925bf6Swillf 	{
36954925bf6Swillf 	    ret = krb5_dbe_update_tl_data(handle->context, &kdb, tl_data_tail);
37054925bf6Swillf 	    if( ret )
37154925bf6Swillf 	    {
37254925bf6Swillf 		krb5_db_free_principal(handle->context, &kdb, 1);
37354925bf6Swillf 		if (mask & KADM5_POLICY)
37454925bf6Swillf 		    (void) kadm5_free_policy_ent(handle->lhandle, &polent);
37554925bf6Swillf 		return ret;
37654925bf6Swillf 	    }
37754925bf6Swillf 	}
37854925bf6Swillf     }
37954925bf6Swillf 
3807c478bd9Sstevel@tonic-gate     /* initialize the keys */
3817c478bd9Sstevel@tonic-gate 
38256a424ccSmp     if ((ret = krb5_dbe_cpw(handle->context, &handle->master_keyblock,
38356a424ccSmp 			    n_ks_tuple?ks_tuple:handle->params.keysalts,
38456a424ccSmp 			    n_ks_tuple?n_ks_tuple:handle->params.num_keysalts,
38556a424ccSmp 			    password,
38656a424ccSmp 			    (mask & KADM5_KVNO)?entry->kvno:1,
38756a424ccSmp 			    FALSE, &kdb))) {
38854925bf6Swillf 	krb5_db_free_principal(handle->context, &kdb, 1);
3897c478bd9Sstevel@tonic-gate 	if (mask & KADM5_POLICY)
3907c478bd9Sstevel@tonic-gate 	     (void) kadm5_free_policy_ent(handle->lhandle, &polent);
3917c478bd9Sstevel@tonic-gate 	return(ret);
3927c478bd9Sstevel@tonic-gate     }
3937c478bd9Sstevel@tonic-gate 
3947c478bd9Sstevel@tonic-gate     /* populate the admin-server-specific fields.  In the OV server,
3957c478bd9Sstevel@tonic-gate        this used to be in a separate database.  Since there's already
3967c478bd9Sstevel@tonic-gate        marshalling code for the admin fields, to keep things simple,
3977c478bd9Sstevel@tonic-gate        I'm going to keep it, and make all the admin stuff occupy a
3987c478bd9Sstevel@tonic-gate        single tl_data record, */
3997c478bd9Sstevel@tonic-gate 
4007c478bd9Sstevel@tonic-gate     adb.admin_history_kvno = hist_kvno;
4017c478bd9Sstevel@tonic-gate     if ((mask & KADM5_POLICY)) {
4027c478bd9Sstevel@tonic-gate 	adb.aux_attributes = KADM5_POLICY;
4037c478bd9Sstevel@tonic-gate 
4047c478bd9Sstevel@tonic-gate 	/* this does *not* need to be strdup'ed, because adb is xdr */
4057c478bd9Sstevel@tonic-gate 	/* encoded in osa_adb_create_princ, and not ever freed */
4067c478bd9Sstevel@tonic-gate 
4077c478bd9Sstevel@tonic-gate 	adb.policy = entry->policy;
4087c478bd9Sstevel@tonic-gate     }
4097c478bd9Sstevel@tonic-gate 
4107c478bd9Sstevel@tonic-gate     /* increment the policy ref count, if any */
4117c478bd9Sstevel@tonic-gate 
4127c478bd9Sstevel@tonic-gate     if ((mask & KADM5_POLICY)) {
4137c478bd9Sstevel@tonic-gate 	polent.policy_refcnt++;
4147c478bd9Sstevel@tonic-gate 	if ((ret = kadm5_modify_policy_internal(handle->lhandle, &polent,
4157c478bd9Sstevel@tonic-gate 						    KADM5_REF_COUNT))
4167c478bd9Sstevel@tonic-gate 	    != KADM5_OK) {
41754925bf6Swillf 	    krb5_db_free_principal(handle->context, &kdb, 1);
4187c478bd9Sstevel@tonic-gate 	    if (mask & KADM5_POLICY)
4197c478bd9Sstevel@tonic-gate 		 (void) kadm5_free_policy_ent(handle->lhandle, &polent);
4207c478bd9Sstevel@tonic-gate 	    return(ret);
4217c478bd9Sstevel@tonic-gate 	}
4227c478bd9Sstevel@tonic-gate     }
4237c478bd9Sstevel@tonic-gate 
42454925bf6Swillf     /* In all cases key and the principal data is set, let the database provider know */
42554925bf6Swillf     kdb.mask = mask | KADM5_KEY_DATA | KADM5_PRINCIPAL ;
4267c478bd9Sstevel@tonic-gate 
4277c478bd9Sstevel@tonic-gate     /* store the new db entry */
4287c478bd9Sstevel@tonic-gate     ret = kdb_put_entry(handle, &kdb, &adb);
4297c478bd9Sstevel@tonic-gate 
43054925bf6Swillf     krb5_db_free_principal(handle->context, &kdb, 1);
4317c478bd9Sstevel@tonic-gate 
4327c478bd9Sstevel@tonic-gate     if (ret) {
4337c478bd9Sstevel@tonic-gate 	if ((mask & KADM5_POLICY)) {
4347c478bd9Sstevel@tonic-gate 	    /* decrement the policy ref count */
4357c478bd9Sstevel@tonic-gate 
4367c478bd9Sstevel@tonic-gate 	    polent.policy_refcnt--;
4377c478bd9Sstevel@tonic-gate 	    /*
4387c478bd9Sstevel@tonic-gate 	     * if this fails, there's nothing we can do anyway.  the
4397c478bd9Sstevel@tonic-gate 	     * policy refcount wil be too high.
4407c478bd9Sstevel@tonic-gate 	     */
4417c478bd9Sstevel@tonic-gate 	    (void) kadm5_modify_policy_internal(handle->lhandle, &polent,
4427c478bd9Sstevel@tonic-gate 						     KADM5_REF_COUNT);
4437c478bd9Sstevel@tonic-gate 	}
4447c478bd9Sstevel@tonic-gate 
4457c478bd9Sstevel@tonic-gate 	if (mask & KADM5_POLICY)
4467c478bd9Sstevel@tonic-gate 	     (void) kadm5_free_policy_ent(handle->lhandle, &polent);
4477c478bd9Sstevel@tonic-gate 	return(ret);
4487c478bd9Sstevel@tonic-gate     }
4497c478bd9Sstevel@tonic-gate 
4507c478bd9Sstevel@tonic-gate     if (mask & KADM5_POLICY)
4517c478bd9Sstevel@tonic-gate 	 (void) kadm5_free_policy_ent(handle->lhandle, &polent);
4527c478bd9Sstevel@tonic-gate 
4537c478bd9Sstevel@tonic-gate     return KADM5_OK;
4547c478bd9Sstevel@tonic-gate }
4557c478bd9Sstevel@tonic-gate 
456*55fea89dSDan Cross 
4577c478bd9Sstevel@tonic-gate kadm5_ret_t
kadm5_delete_principal(void * server_handle,krb5_principal principal)4587c478bd9Sstevel@tonic-gate kadm5_delete_principal(void *server_handle, krb5_principal principal)
4597c478bd9Sstevel@tonic-gate {
4607c478bd9Sstevel@tonic-gate     unsigned int		ret;
4617c478bd9Sstevel@tonic-gate     kadm5_policy_ent_rec	polent;
4627c478bd9Sstevel@tonic-gate     krb5_db_entry		kdb;
4637c478bd9Sstevel@tonic-gate     osa_princ_ent_rec		adb;
4647c478bd9Sstevel@tonic-gate     kadm5_server_handle_t handle = server_handle;
4657c478bd9Sstevel@tonic-gate 
4667c478bd9Sstevel@tonic-gate     CHECK_HANDLE(server_handle);
4677c478bd9Sstevel@tonic-gate 
46854925bf6Swillf     krb5_clear_error_message(handle->context);
46954925bf6Swillf 
4707c478bd9Sstevel@tonic-gate     if (principal == NULL)
4717c478bd9Sstevel@tonic-gate 	return EINVAL;
4727c478bd9Sstevel@tonic-gate 
47356a424ccSmp     if ((ret = kdb_get_entry(handle, principal, &kdb, &adb)))
4747c478bd9Sstevel@tonic-gate 	return(ret);
4757c478bd9Sstevel@tonic-gate 
4767c478bd9Sstevel@tonic-gate     if ((adb.aux_attributes & KADM5_POLICY)) {
4777c478bd9Sstevel@tonic-gate 	if ((ret = kadm5_get_policy(handle->lhandle,
4787c478bd9Sstevel@tonic-gate 				    adb.policy, &polent))
4797c478bd9Sstevel@tonic-gate 	    == KADM5_OK) {
4807c478bd9Sstevel@tonic-gate 	    polent.policy_refcnt--;
4817c478bd9Sstevel@tonic-gate 	    if ((ret = kadm5_modify_policy_internal(handle->lhandle, &polent,
4827c478bd9Sstevel@tonic-gate 							 KADM5_REF_COUNT))
4837c478bd9Sstevel@tonic-gate 		!= KADM5_OK) {
4847c478bd9Sstevel@tonic-gate 		(void) kadm5_free_policy_ent(handle->lhandle, &polent);
4857c478bd9Sstevel@tonic-gate 		kdb_free_entry(handle, &kdb, &adb);
4867c478bd9Sstevel@tonic-gate 		return(ret);
4877c478bd9Sstevel@tonic-gate 	    }
4887c478bd9Sstevel@tonic-gate 	}
48956a424ccSmp 	if ((ret = kadm5_free_policy_ent(handle->lhandle, &polent))) {
49056a424ccSmp 	     kdb_free_entry(handle, &kdb, &adb);
49156a424ccSmp 	     return ret;
4927c478bd9Sstevel@tonic-gate 	}
4937c478bd9Sstevel@tonic-gate     }
4947c478bd9Sstevel@tonic-gate 
4957c478bd9Sstevel@tonic-gate     ret = kdb_delete_entry(handle, principal);
4967c478bd9Sstevel@tonic-gate 
4977c478bd9Sstevel@tonic-gate     kdb_free_entry(handle, &kdb, &adb);
4987c478bd9Sstevel@tonic-gate 
4997c478bd9Sstevel@tonic-gate     return ret;
5007c478bd9Sstevel@tonic-gate }
5017c478bd9Sstevel@tonic-gate 
5027c478bd9Sstevel@tonic-gate kadm5_ret_t
kadm5_modify_principal(void * server_handle,kadm5_principal_ent_t entry,long mask)5037c478bd9Sstevel@tonic-gate kadm5_modify_principal(void *server_handle,
5047c478bd9Sstevel@tonic-gate 			    kadm5_principal_ent_t entry, long mask)
5057c478bd9Sstevel@tonic-gate {
5067c478bd9Sstevel@tonic-gate     int			    ret, ret2, i;
5077c478bd9Sstevel@tonic-gate     kadm5_policy_ent_rec    npol, opol;
5087c478bd9Sstevel@tonic-gate     int			    have_npol = 0, have_opol = 0;
5097c478bd9Sstevel@tonic-gate     krb5_db_entry	    kdb;
51056a424ccSmp     krb5_tl_data	    *tl_data_orig;
5117c478bd9Sstevel@tonic-gate     osa_princ_ent_rec	    adb;
5127c478bd9Sstevel@tonic-gate     kadm5_server_handle_t handle = server_handle;
5137c478bd9Sstevel@tonic-gate 
5147c478bd9Sstevel@tonic-gate     CHECK_HANDLE(server_handle);
5157c478bd9Sstevel@tonic-gate 
51654925bf6Swillf     krb5_clear_error_message(handle->context);
51754925bf6Swillf 
5187c478bd9Sstevel@tonic-gate     if((mask & KADM5_PRINCIPAL) || (mask & KADM5_LAST_PWD_CHANGE) ||
5197c478bd9Sstevel@tonic-gate        (mask & KADM5_MOD_TIME) || (mask & KADM5_MOD_NAME) ||
5207c478bd9Sstevel@tonic-gate        (mask & KADM5_MKVNO) || (mask & KADM5_AUX_ATTRIBUTES) ||
5217c478bd9Sstevel@tonic-gate        (mask & KADM5_KEY_DATA) || (mask & KADM5_LAST_SUCCESS) ||
5227c478bd9Sstevel@tonic-gate        (mask & KADM5_LAST_FAILED))
5237c478bd9Sstevel@tonic-gate 	return KADM5_BAD_MASK;
5247c478bd9Sstevel@tonic-gate     if((mask & ~ALL_PRINC_MASK))
5257c478bd9Sstevel@tonic-gate 	return KADM5_BAD_MASK;
5267c478bd9Sstevel@tonic-gate     if((mask & KADM5_POLICY) && (mask & KADM5_POLICY_CLR))
5277c478bd9Sstevel@tonic-gate 	return KADM5_BAD_MASK;
5287c478bd9Sstevel@tonic-gate     if(entry == (kadm5_principal_ent_t) NULL)
5297c478bd9Sstevel@tonic-gate 	return EINVAL;
5307c478bd9Sstevel@tonic-gate     if (mask & KADM5_TL_DATA) {
5317c478bd9Sstevel@tonic-gate 	 tl_data_orig = entry->tl_data;
5327c478bd9Sstevel@tonic-gate 	 while (tl_data_orig) {
5337c478bd9Sstevel@tonic-gate 	      if (tl_data_orig->tl_data_type < 256)
5347c478bd9Sstevel@tonic-gate 		   return KADM5_BAD_TL_TYPE;
5357c478bd9Sstevel@tonic-gate 	      tl_data_orig = tl_data_orig->tl_data_next;
5367c478bd9Sstevel@tonic-gate 	 }
5377c478bd9Sstevel@tonic-gate     }
5387c478bd9Sstevel@tonic-gate 
53956a424ccSmp     ret = kdb_get_entry(handle, entry->principal, &kdb, &adb);
54056a424ccSmp     if (ret)
5417c478bd9Sstevel@tonic-gate 	return(ret);
5427c478bd9Sstevel@tonic-gate 
5437c478bd9Sstevel@tonic-gate     /*
5447c478bd9Sstevel@tonic-gate      * This is pretty much the same as create ...
5457c478bd9Sstevel@tonic-gate      */
5467c478bd9Sstevel@tonic-gate 
5477c478bd9Sstevel@tonic-gate     if ((mask & KADM5_POLICY)) {
5487c478bd9Sstevel@tonic-gate 	 /* get the new policy */
5497c478bd9Sstevel@tonic-gate 	 ret = kadm5_get_policy(handle->lhandle, entry->policy, &npol);
5507c478bd9Sstevel@tonic-gate 	 if (ret) {
5517c478bd9Sstevel@tonic-gate 	      switch (ret) {
5527c478bd9Sstevel@tonic-gate 	      case EINVAL:
5537c478bd9Sstevel@tonic-gate 		   ret = KADM5_BAD_POLICY;
5547c478bd9Sstevel@tonic-gate 		   break;
5557c478bd9Sstevel@tonic-gate 	      case KADM5_UNK_POLICY:
5567c478bd9Sstevel@tonic-gate 	      case KADM5_BAD_POLICY:
5577c478bd9Sstevel@tonic-gate 		   ret =  KADM5_UNK_POLICY;
5587c478bd9Sstevel@tonic-gate 		   break;
5597c478bd9Sstevel@tonic-gate 	      }
5607c478bd9Sstevel@tonic-gate 	      goto done;
5617c478bd9Sstevel@tonic-gate 	 }
5627c478bd9Sstevel@tonic-gate 	 have_npol = 1;
5637c478bd9Sstevel@tonic-gate 
5647c478bd9Sstevel@tonic-gate 	 /* if we already have a policy, get it to decrement the refcnt */
5657c478bd9Sstevel@tonic-gate 	 if(adb.aux_attributes & KADM5_POLICY) {
5667c478bd9Sstevel@tonic-gate 	      /* ... but not if the old and new are the same */
5677c478bd9Sstevel@tonic-gate 	      if(strcmp(adb.policy, entry->policy)) {
5687c478bd9Sstevel@tonic-gate 		   ret = kadm5_get_policy(handle->lhandle,
5697c478bd9Sstevel@tonic-gate 					  adb.policy, &opol);
5707c478bd9Sstevel@tonic-gate 		   switch(ret) {
5717c478bd9Sstevel@tonic-gate 		   case EINVAL:
5727c478bd9Sstevel@tonic-gate 		   case KADM5_BAD_POLICY:
5737c478bd9Sstevel@tonic-gate 		   case KADM5_UNK_POLICY:
5747c478bd9Sstevel@tonic-gate 			break;
5757c478bd9Sstevel@tonic-gate 		   case KADM5_OK:
5767c478bd9Sstevel@tonic-gate 			have_opol = 1;
5777c478bd9Sstevel@tonic-gate 			opol.policy_refcnt--;
5787c478bd9Sstevel@tonic-gate 			break;
5797c478bd9Sstevel@tonic-gate 		   default:
5807c478bd9Sstevel@tonic-gate 			goto done;
58156a424ccSmp 			break;
5827c478bd9Sstevel@tonic-gate 		   }
5837c478bd9Sstevel@tonic-gate 		   npol.policy_refcnt++;
5847c478bd9Sstevel@tonic-gate 	      }
5857c478bd9Sstevel@tonic-gate 	 } else npol.policy_refcnt++;
5867c478bd9Sstevel@tonic-gate 
5877c478bd9Sstevel@tonic-gate 	 /* set us up to use the new policy */
5887c478bd9Sstevel@tonic-gate 	 adb.aux_attributes |= KADM5_POLICY;
5897c478bd9Sstevel@tonic-gate 	 if (adb.policy)
5907c478bd9Sstevel@tonic-gate 	      free(adb.policy);
5917c478bd9Sstevel@tonic-gate 	 adb.policy = strdup(entry->policy);
5927c478bd9Sstevel@tonic-gate 
5937c478bd9Sstevel@tonic-gate 	 /* set pw_max_life based on new policy */
5947c478bd9Sstevel@tonic-gate 	 if (npol.pw_max_life) {
59556a424ccSmp 	     ret = krb5_dbe_lookup_last_pwd_change(handle->context, &kdb,
59656a424ccSmp 						   &(kdb.pw_expiration));
59756a424ccSmp 	     if (ret)
59856a424ccSmp 		 goto done;
59956a424ccSmp 	     kdb.pw_expiration += npol.pw_max_life;
6007c478bd9Sstevel@tonic-gate 	 } else {
60156a424ccSmp 	     kdb.pw_expiration = 0;
6027c478bd9Sstevel@tonic-gate 	 }
6037c478bd9Sstevel@tonic-gate     }
6047c478bd9Sstevel@tonic-gate 
6057c478bd9Sstevel@tonic-gate     if ((mask & KADM5_POLICY_CLR) &&
6067c478bd9Sstevel@tonic-gate 	(adb.aux_attributes & KADM5_POLICY)) {
6077c478bd9Sstevel@tonic-gate 	 ret = kadm5_get_policy(handle->lhandle, adb.policy, &opol);
6087c478bd9Sstevel@tonic-gate 	 switch(ret) {
6097c478bd9Sstevel@tonic-gate 	 case EINVAL:
6107c478bd9Sstevel@tonic-gate 	 case KADM5_BAD_POLICY:
6117c478bd9Sstevel@tonic-gate 	 case KADM5_UNK_POLICY:
6127c478bd9Sstevel@tonic-gate 	      ret = KADM5_BAD_DB;
6137c478bd9Sstevel@tonic-gate 	      goto done;
61456a424ccSmp 	      break;
6157c478bd9Sstevel@tonic-gate 	 case KADM5_OK:
6167c478bd9Sstevel@tonic-gate 	      have_opol = 1;
6177c478bd9Sstevel@tonic-gate 	      if (adb.policy)
6187c478bd9Sstevel@tonic-gate 		   free(adb.policy);
6197c478bd9Sstevel@tonic-gate 	      adb.policy = NULL;
6207c478bd9Sstevel@tonic-gate 	      adb.aux_attributes &= ~KADM5_POLICY;
6217c478bd9Sstevel@tonic-gate 	      kdb.pw_expiration = 0;
6227c478bd9Sstevel@tonic-gate 	      opol.policy_refcnt--;
6237c478bd9Sstevel@tonic-gate 	      break;
6247c478bd9Sstevel@tonic-gate 	 default:
6257c478bd9Sstevel@tonic-gate 	      goto done;
62656a424ccSmp 	      break;
6277c478bd9Sstevel@tonic-gate 	 }
6287c478bd9Sstevel@tonic-gate     }
6297c478bd9Sstevel@tonic-gate 
6307c478bd9Sstevel@tonic-gate     if (((mask & KADM5_POLICY) || (mask & KADM5_POLICY_CLR)) &&
6317c478bd9Sstevel@tonic-gate 	(((have_opol) &&
6327c478bd9Sstevel@tonic-gate 	  (ret =
6337c478bd9Sstevel@tonic-gate 	   kadm5_modify_policy_internal(handle->lhandle, &opol,
6347c478bd9Sstevel@tonic-gate 					     KADM5_REF_COUNT))) ||
6357c478bd9Sstevel@tonic-gate 	 ((have_npol) &&
6367c478bd9Sstevel@tonic-gate 	  (ret =
6377c478bd9Sstevel@tonic-gate 	   kadm5_modify_policy_internal(handle->lhandle, &npol,
6387c478bd9Sstevel@tonic-gate 					     KADM5_REF_COUNT)))))
6397c478bd9Sstevel@tonic-gate 	goto done;
6407c478bd9Sstevel@tonic-gate 
641*55fea89dSDan Cross     if ((mask & KADM5_ATTRIBUTES))
6427c478bd9Sstevel@tonic-gate 	kdb.attributes = entry->attributes;
6437c478bd9Sstevel@tonic-gate     if ((mask & KADM5_MAX_LIFE))
6447c478bd9Sstevel@tonic-gate 	kdb.max_life = entry->max_life;
6457c478bd9Sstevel@tonic-gate     if ((mask & KADM5_PRINC_EXPIRE_TIME))
6467c478bd9Sstevel@tonic-gate 	kdb.expiration = entry->princ_expire_time;
6477c478bd9Sstevel@tonic-gate     if (mask & KADM5_PW_EXPIRATION)
6487c478bd9Sstevel@tonic-gate 	 kdb.pw_expiration = entry->pw_expiration;
6497c478bd9Sstevel@tonic-gate     if (mask & KADM5_MAX_RLIFE)
6507c478bd9Sstevel@tonic-gate 	 kdb.max_renewable_life = entry->max_renewable_life;
6517c478bd9Sstevel@tonic-gate     if (mask & KADM5_FAIL_AUTH_COUNT)
6527c478bd9Sstevel@tonic-gate 	 kdb.fail_auth_count = entry->fail_auth_count;
653*55fea89dSDan Cross 
6547c478bd9Sstevel@tonic-gate     if((mask & KADM5_KVNO)) {
6557c478bd9Sstevel@tonic-gate 	 for (i = 0; i < kdb.n_key_data; i++)
6567c478bd9Sstevel@tonic-gate 	      kdb.key_data[i].key_data_kvno = entry->kvno;
6577c478bd9Sstevel@tonic-gate     }
6587c478bd9Sstevel@tonic-gate 
6597c478bd9Sstevel@tonic-gate     if (mask & KADM5_TL_DATA) {
66054925bf6Swillf 	 krb5_tl_data *tl;
66154925bf6Swillf 
66254925bf6Swillf 	 /* may have to change the version number of the API. Updates the list with the given tl_data rather than over-writting */
6637c478bd9Sstevel@tonic-gate 
66454925bf6Swillf 	 for (tl = entry->tl_data; tl;
66554925bf6Swillf 	      tl = tl->tl_data_next)
66654925bf6Swillf 	 {
66754925bf6Swillf 	     ret = krb5_dbe_update_tl_data(handle->context, &kdb, tl);
66854925bf6Swillf 	     if( ret )
66954925bf6Swillf 	     {
67054925bf6Swillf 		 goto done;
67154925bf6Swillf 	     }
6727c478bd9Sstevel@tonic-gate 	 }
6737c478bd9Sstevel@tonic-gate     }
6747c478bd9Sstevel@tonic-gate 
67554925bf6Swillf     /* let the mask propagate to the database provider */
67654925bf6Swillf     kdb.mask = mask;
67754925bf6Swillf 
6787c478bd9Sstevel@tonic-gate     ret = kdb_put_entry(handle, &kdb, &adb);
6797c478bd9Sstevel@tonic-gate     if (ret) goto done;
6807c478bd9Sstevel@tonic-gate 
6817c478bd9Sstevel@tonic-gate     ret = KADM5_OK;
6827c478bd9Sstevel@tonic-gate done:
6837c478bd9Sstevel@tonic-gate     if (have_opol) {
6847c478bd9Sstevel@tonic-gate 	 ret2 = kadm5_free_policy_ent(handle->lhandle, &opol);
6857c478bd9Sstevel@tonic-gate 	 ret = ret ? ret : ret2;
6867c478bd9Sstevel@tonic-gate     }
6877c478bd9Sstevel@tonic-gate     if (have_npol) {
6887c478bd9Sstevel@tonic-gate 	 ret2 = kadm5_free_policy_ent(handle->lhandle, &npol);
6897c478bd9Sstevel@tonic-gate 	 ret = ret ? ret : ret2;
6907c478bd9Sstevel@tonic-gate     }
6917c478bd9Sstevel@tonic-gate     kdb_free_entry(handle, &kdb, &adb);
6927c478bd9Sstevel@tonic-gate     return ret;
6937c478bd9Sstevel@tonic-gate }
694*55fea89dSDan Cross 
6957c478bd9Sstevel@tonic-gate kadm5_ret_t
kadm5_rename_principal(void * server_handle,krb5_principal source,krb5_principal target)6967c478bd9Sstevel@tonic-gate kadm5_rename_principal(void *server_handle,
6977c478bd9Sstevel@tonic-gate 			    krb5_principal source, krb5_principal target)
6987c478bd9Sstevel@tonic-gate {
6997c478bd9Sstevel@tonic-gate     krb5_db_entry	kdb;
7007c478bd9Sstevel@tonic-gate     osa_princ_ent_rec	adb;
7017c478bd9Sstevel@tonic-gate     int			ret, i;
7027c478bd9Sstevel@tonic-gate     kadm5_server_handle_t handle = server_handle;
7037c478bd9Sstevel@tonic-gate 
7047c478bd9Sstevel@tonic-gate     CHECK_HANDLE(server_handle);
7057c478bd9Sstevel@tonic-gate 
70654925bf6Swillf     krb5_clear_error_message(handle->context);
70754925bf6Swillf 
7087c478bd9Sstevel@tonic-gate     if (source == NULL || target == NULL)
7097c478bd9Sstevel@tonic-gate 	return EINVAL;
7107c478bd9Sstevel@tonic-gate 
7117c478bd9Sstevel@tonic-gate     if ((ret = kdb_get_entry(handle, target, &kdb, &adb)) == 0) {
7127c478bd9Sstevel@tonic-gate 	kdb_free_entry(handle, &kdb, &adb);
7137c478bd9Sstevel@tonic-gate 	return(KADM5_DUP);
7147c478bd9Sstevel@tonic-gate     }
7157c478bd9Sstevel@tonic-gate 
7167c478bd9Sstevel@tonic-gate     if ((ret = kdb_get_entry(handle, source, &kdb, &adb)))
7177c478bd9Sstevel@tonic-gate 	return ret;
7187c478bd9Sstevel@tonic-gate 
7197c478bd9Sstevel@tonic-gate     /* this is kinda gross, but unavoidable */
7207c478bd9Sstevel@tonic-gate 
7217c478bd9Sstevel@tonic-gate     for (i=0; i<kdb.n_key_data; i++) {
7227c478bd9Sstevel@tonic-gate 	if ((kdb.key_data[i].key_data_ver == 1) ||
7237c478bd9Sstevel@tonic-gate 	    (kdb.key_data[i].key_data_type[1] == KRB5_KDB_SALTTYPE_NORMAL)) {
7247c478bd9Sstevel@tonic-gate 	    ret = KADM5_NO_RENAME_SALT;
7257c478bd9Sstevel@tonic-gate 	    goto done;
7267c478bd9Sstevel@tonic-gate 	}
7277c478bd9Sstevel@tonic-gate     }
7287c478bd9Sstevel@tonic-gate 
72954925bf6Swillf     kadm5_free_principal(handle->context, kdb.princ);
73054925bf6Swillf     ret = kadm5_copy_principal(handle->context, target, &kdb.princ);
73156a424ccSmp     if (ret) {
7327c478bd9Sstevel@tonic-gate 	kdb.princ = NULL; /* so freeing the dbe doesn't lose */
7337c478bd9Sstevel@tonic-gate 	goto done;
7347c478bd9Sstevel@tonic-gate     }
7357c478bd9Sstevel@tonic-gate 
7367c478bd9Sstevel@tonic-gate     if ((ret = kdb_put_entry(handle, &kdb, &adb)))
7377c478bd9Sstevel@tonic-gate 	goto done;
7387c478bd9Sstevel@tonic-gate 
7397c478bd9Sstevel@tonic-gate     ret = kdb_delete_entry(handle, source);
7407c478bd9Sstevel@tonic-gate 
7417c478bd9Sstevel@tonic-gate done:
7427c478bd9Sstevel@tonic-gate     kdb_free_entry(handle, &kdb, &adb);
7437c478bd9Sstevel@tonic-gate     return ret;
7447c478bd9Sstevel@tonic-gate }
7457c478bd9Sstevel@tonic-gate 
7467c478bd9Sstevel@tonic-gate kadm5_ret_t
kadm5_get_principal(void * server_handle,krb5_principal principal,kadm5_principal_ent_t entry,long in_mask)7477c478bd9Sstevel@tonic-gate kadm5_get_principal(void *server_handle, krb5_principal principal,
7487c478bd9Sstevel@tonic-gate 		    kadm5_principal_ent_t entry,
7497c478bd9Sstevel@tonic-gate 		    long in_mask)
7507c478bd9Sstevel@tonic-gate {
7517c478bd9Sstevel@tonic-gate     krb5_db_entry		kdb;
7527c478bd9Sstevel@tonic-gate     osa_princ_ent_rec		adb;
75354925bf6Swillf     krb5_error_code		ret = 0;
7547c478bd9Sstevel@tonic-gate     long			mask;
7557c478bd9Sstevel@tonic-gate     int i;
7567c478bd9Sstevel@tonic-gate     kadm5_server_handle_t handle = server_handle;
7577c478bd9Sstevel@tonic-gate     kadm5_principal_ent_rec	entry_local, *entry_orig;
7587c478bd9Sstevel@tonic-gate 
7597c478bd9Sstevel@tonic-gate     CHECK_HANDLE(server_handle);
7607c478bd9Sstevel@tonic-gate 
76154925bf6Swillf     krb5_clear_error_message(handle->context);
76254925bf6Swillf 
7637c478bd9Sstevel@tonic-gate     /*
7647c478bd9Sstevel@tonic-gate      * In version 1, all the defined fields are always returned.
7657c478bd9Sstevel@tonic-gate      * entry is a pointer to a kadm5_principal_ent_t_v1 that should be
7667c478bd9Sstevel@tonic-gate      * filled with allocated memory.
7677c478bd9Sstevel@tonic-gate      */
7687c478bd9Sstevel@tonic-gate     if (handle->api_version == KADM5_API_VERSION_1) {
7697c478bd9Sstevel@tonic-gate 	 mask = KADM5_PRINCIPAL_NORMAL_MASK;
7707c478bd9Sstevel@tonic-gate 	 entry_orig = entry;
7717c478bd9Sstevel@tonic-gate 	 entry = &entry_local;
7727c478bd9Sstevel@tonic-gate     } else {
7737c478bd9Sstevel@tonic-gate 	 mask = in_mask;
7747c478bd9Sstevel@tonic-gate     }
7757c478bd9Sstevel@tonic-gate 
7767c478bd9Sstevel@tonic-gate     memset((char *) entry, 0, sizeof(*entry));
7777c478bd9Sstevel@tonic-gate 
7787c478bd9Sstevel@tonic-gate     if (principal == NULL)
7797c478bd9Sstevel@tonic-gate 	return EINVAL;
7807c478bd9Sstevel@tonic-gate 
7817c478bd9Sstevel@tonic-gate     if ((ret = kdb_get_entry(handle, principal, &kdb, &adb)))
7827c478bd9Sstevel@tonic-gate 	return ret;
7837c478bd9Sstevel@tonic-gate 
7847c478bd9Sstevel@tonic-gate     if ((mask & KADM5_POLICY) &&
7857c478bd9Sstevel@tonic-gate 	adb.policy && (adb.aux_attributes & KADM5_POLICY)) {
7867c478bd9Sstevel@tonic-gate 	if ((entry->policy = (char *) malloc(strlen(adb.policy) + 1)) == NULL) {
7877c478bd9Sstevel@tonic-gate 	    ret = ENOMEM;
7887c478bd9Sstevel@tonic-gate 	    goto done;
7897c478bd9Sstevel@tonic-gate 	}
7907c478bd9Sstevel@tonic-gate 	strcpy(entry->policy, adb.policy);
7917c478bd9Sstevel@tonic-gate     }
7927c478bd9Sstevel@tonic-gate 
7937c478bd9Sstevel@tonic-gate     if (mask & KADM5_AUX_ATTRIBUTES)
7947c478bd9Sstevel@tonic-gate 	 entry->aux_attributes = adb.aux_attributes;
7957c478bd9Sstevel@tonic-gate 
7967c478bd9Sstevel@tonic-gate     if ((mask & KADM5_PRINCIPAL) &&
7977c478bd9Sstevel@tonic-gate 	(ret = krb5_copy_principal(handle->context, principal,
798*55fea89dSDan Cross 				   &entry->principal))) {
7997c478bd9Sstevel@tonic-gate 	goto done;
8007c478bd9Sstevel@tonic-gate     }
8017c478bd9Sstevel@tonic-gate 
8027c478bd9Sstevel@tonic-gate     if (mask & KADM5_PRINC_EXPIRE_TIME)
8037c478bd9Sstevel@tonic-gate 	 entry->princ_expire_time = kdb.expiration;
8047c478bd9Sstevel@tonic-gate 
8057c478bd9Sstevel@tonic-gate     if ((mask & KADM5_LAST_PWD_CHANGE) &&
8067c478bd9Sstevel@tonic-gate 	(ret = krb5_dbe_lookup_last_pwd_change(handle->context, &kdb,
8077c478bd9Sstevel@tonic-gate 					       &(entry->last_pwd_change)))) {
8087c478bd9Sstevel@tonic-gate 	goto done;
8097c478bd9Sstevel@tonic-gate     }
8107c478bd9Sstevel@tonic-gate 
8117c478bd9Sstevel@tonic-gate     if (mask & KADM5_PW_EXPIRATION)
8127c478bd9Sstevel@tonic-gate 	 entry->pw_expiration = kdb.pw_expiration;
8137c478bd9Sstevel@tonic-gate     if (mask & KADM5_MAX_LIFE)
8147c478bd9Sstevel@tonic-gate 	 entry->max_life = kdb.max_life;
8157c478bd9Sstevel@tonic-gate 
8167c478bd9Sstevel@tonic-gate     /* this is a little non-sensical because the function returns two */
8177c478bd9Sstevel@tonic-gate     /* values that must be checked separately against the mask */
8187c478bd9Sstevel@tonic-gate     if ((mask & KADM5_MOD_NAME) || (mask & KADM5_MOD_TIME)) {
81956a424ccSmp 	ret = krb5_dbe_lookup_mod_princ_data(handle->context, &kdb,
820*55fea89dSDan Cross 					     &(entry->mod_date),
82156a424ccSmp 					     &(entry->mod_name));
82256a424ccSmp 	if (ret) {
82356a424ccSmp 	    goto done;
82456a424ccSmp 	}
825*55fea89dSDan Cross 
82656a424ccSmp 	if (! (mask & KADM5_MOD_TIME))
82756a424ccSmp 	    entry->mod_date = 0;
82856a424ccSmp 	if (! (mask & KADM5_MOD_NAME)) {
82956a424ccSmp 	    krb5_free_principal(handle->context, entry->principal);
83056a424ccSmp 	    entry->principal = NULL;
83156a424ccSmp 	}
8327c478bd9Sstevel@tonic-gate     }
8337c478bd9Sstevel@tonic-gate 
8347c478bd9Sstevel@tonic-gate     if (mask & KADM5_ATTRIBUTES)
8357c478bd9Sstevel@tonic-gate 	 entry->attributes = kdb.attributes;
8367c478bd9Sstevel@tonic-gate 
8377c478bd9Sstevel@tonic-gate     if (mask & KADM5_KVNO)
8387c478bd9Sstevel@tonic-gate 	 for (entry->kvno = 0, i=0; i<kdb.n_key_data; i++)
8397c478bd9Sstevel@tonic-gate 	      if (kdb.key_data[i].key_data_kvno > entry->kvno)
8407c478bd9Sstevel@tonic-gate 		   entry->kvno = kdb.key_data[i].key_data_kvno;
841*55fea89dSDan Cross 
8427c478bd9Sstevel@tonic-gate     if (handle->api_version == KADM5_API_VERSION_2)
8437c478bd9Sstevel@tonic-gate 	 entry->mkvno = 0;
8447c478bd9Sstevel@tonic-gate     else {
8457c478bd9Sstevel@tonic-gate 	 /* XXX I'll be damned if I know how to deal with this one --marc */
8467c478bd9Sstevel@tonic-gate 	 entry->mkvno = 1;
8477c478bd9Sstevel@tonic-gate     }
8487c478bd9Sstevel@tonic-gate 
8497c478bd9Sstevel@tonic-gate     /*
8507c478bd9Sstevel@tonic-gate      * The new fields that only exist in version 2 start here
8517c478bd9Sstevel@tonic-gate      */
8527c478bd9Sstevel@tonic-gate     if (handle->api_version == KADM5_API_VERSION_2) {
8537c478bd9Sstevel@tonic-gate 	 if (mask & KADM5_MAX_RLIFE)
8547c478bd9Sstevel@tonic-gate 	      entry->max_renewable_life = kdb.max_renewable_life;
8557c478bd9Sstevel@tonic-gate 	 if (mask & KADM5_LAST_SUCCESS)
8567c478bd9Sstevel@tonic-gate 	      entry->last_success = kdb.last_success;
8577c478bd9Sstevel@tonic-gate 	 if (mask & KADM5_LAST_FAILED)
8587c478bd9Sstevel@tonic-gate 	      entry->last_failed = kdb.last_failed;
8597c478bd9Sstevel@tonic-gate 	 if (mask & KADM5_FAIL_AUTH_COUNT)
8607c478bd9Sstevel@tonic-gate 	      entry->fail_auth_count = kdb.fail_auth_count;
8617c478bd9Sstevel@tonic-gate 	 if (mask & KADM5_TL_DATA) {
86256a424ccSmp 	      krb5_tl_data *tl, *tl2;
8637c478bd9Sstevel@tonic-gate 
8647c478bd9Sstevel@tonic-gate 	      entry->tl_data = NULL;
865*55fea89dSDan Cross 
8667c478bd9Sstevel@tonic-gate 	      tl = kdb.tl_data;
8677c478bd9Sstevel@tonic-gate 	      while (tl) {
8687c478bd9Sstevel@tonic-gate 		   if (tl->tl_data_type > 255) {
8697c478bd9Sstevel@tonic-gate 			if ((tl2 = dup_tl_data(tl)) == NULL) {
8707c478bd9Sstevel@tonic-gate 			     ret = ENOMEM;
8717c478bd9Sstevel@tonic-gate 			     goto done;
8727c478bd9Sstevel@tonic-gate 			}
8737c478bd9Sstevel@tonic-gate 			tl2->tl_data_next = entry->tl_data;
8747c478bd9Sstevel@tonic-gate 			entry->tl_data = tl2;
8757c478bd9Sstevel@tonic-gate 			entry->n_tl_data++;
8767c478bd9Sstevel@tonic-gate 		   }
877*55fea89dSDan Cross 
8787c478bd9Sstevel@tonic-gate 		   tl = tl->tl_data_next;
8797c478bd9Sstevel@tonic-gate 	      }
8807c478bd9Sstevel@tonic-gate 	 }
8817c478bd9Sstevel@tonic-gate 	 if (mask & KADM5_KEY_DATA) {
8827c478bd9Sstevel@tonic-gate 	      entry->n_key_data = kdb.n_key_data;
8837c478bd9Sstevel@tonic-gate 	      if(entry->n_key_data) {
8847c478bd9Sstevel@tonic-gate 		      entry->key_data = (krb5_key_data *)
8857c478bd9Sstevel@tonic-gate 			      malloc(entry->n_key_data*sizeof(krb5_key_data));
8867c478bd9Sstevel@tonic-gate 		      if (entry->key_data == NULL) {
8877c478bd9Sstevel@tonic-gate 			      ret = ENOMEM;
8887c478bd9Sstevel@tonic-gate 			      goto done;
8897c478bd9Sstevel@tonic-gate 		      }
890*55fea89dSDan Cross 	      } else
8917c478bd9Sstevel@tonic-gate 		      entry->key_data = NULL;
8927c478bd9Sstevel@tonic-gate 
8937c478bd9Sstevel@tonic-gate 	      for (i = 0; i < entry->n_key_data; i++)
89456a424ccSmp 		  ret = krb5_copy_key_data_contents(handle->context,
89556a424ccSmp 						    &kdb.key_data[i],
89656a424ccSmp 						    &entry->key_data[i]);
89756a424ccSmp 		   if (ret)
8987c478bd9Sstevel@tonic-gate 			goto done;
8997c478bd9Sstevel@tonic-gate 	 }
9007c478bd9Sstevel@tonic-gate     }
9017c478bd9Sstevel@tonic-gate 
9027c478bd9Sstevel@tonic-gate     /*
9037c478bd9Sstevel@tonic-gate      * If KADM5_API_VERSION_1, we return an allocated structure, and
9047c478bd9Sstevel@tonic-gate      * we need to convert the new structure back into the format the
9057c478bd9Sstevel@tonic-gate      * caller is expecting.
9067c478bd9Sstevel@tonic-gate      */
9077c478bd9Sstevel@tonic-gate     if (handle->api_version == KADM5_API_VERSION_1) {
9087c478bd9Sstevel@tonic-gate 	 kadm5_principal_ent_t_v1 newv1;
9097c478bd9Sstevel@tonic-gate 
9107c478bd9Sstevel@tonic-gate 	 newv1 = ((kadm5_principal_ent_t_v1) calloc(1, sizeof(*newv1)));
9117c478bd9Sstevel@tonic-gate 	 if (newv1 == NULL) {
9127c478bd9Sstevel@tonic-gate 	      ret = ENOMEM;
9137c478bd9Sstevel@tonic-gate 	      goto done;
9147c478bd9Sstevel@tonic-gate 	 }
915*55fea89dSDan Cross 
9167c478bd9Sstevel@tonic-gate 	 newv1->principal = entry->principal;
9177c478bd9Sstevel@tonic-gate 	 newv1->princ_expire_time = entry->princ_expire_time;
9187c478bd9Sstevel@tonic-gate 	 newv1->last_pwd_change = entry->last_pwd_change;
9197c478bd9Sstevel@tonic-gate 	 newv1->pw_expiration = entry->pw_expiration;
9207c478bd9Sstevel@tonic-gate 	 newv1->max_life = entry->max_life;
9217c478bd9Sstevel@tonic-gate 	 newv1->mod_name = entry->mod_name;
9227c478bd9Sstevel@tonic-gate 	 newv1->mod_date = entry->mod_date;
9237c478bd9Sstevel@tonic-gate 	 newv1->attributes = entry->attributes;
9247c478bd9Sstevel@tonic-gate 	 newv1->kvno = entry->kvno;
9257c478bd9Sstevel@tonic-gate 	 newv1->mkvno = entry->mkvno;
9267c478bd9Sstevel@tonic-gate 	 newv1->policy = entry->policy;
9277c478bd9Sstevel@tonic-gate 	 newv1->aux_attributes = entry->aux_attributes;
9287c478bd9Sstevel@tonic-gate 
9297c478bd9Sstevel@tonic-gate 	 *((kadm5_principal_ent_t_v1 *) entry_orig) = newv1;
9307c478bd9Sstevel@tonic-gate     }
9317c478bd9Sstevel@tonic-gate 
9327c478bd9Sstevel@tonic-gate     ret = KADM5_OK;
9337c478bd9Sstevel@tonic-gate 
9347c478bd9Sstevel@tonic-gate done:
9357c478bd9Sstevel@tonic-gate     if (ret && entry->principal)
9367c478bd9Sstevel@tonic-gate 	 krb5_free_principal(handle->context, entry->principal);
9377c478bd9Sstevel@tonic-gate     kdb_free_entry(handle, &kdb, &adb);
9387c478bd9Sstevel@tonic-gate 
9397c478bd9Sstevel@tonic-gate     return ret;
9407c478bd9Sstevel@tonic-gate }
9417c478bd9Sstevel@tonic-gate 
9427c478bd9Sstevel@tonic-gate /*
9437c478bd9Sstevel@tonic-gate  * Function: check_pw_reuse
9447c478bd9Sstevel@tonic-gate  *
9457c478bd9Sstevel@tonic-gate  * Purpose: Check if a key appears in a list of keys, in order to
9467c478bd9Sstevel@tonic-gate  * enforce password history.
9477c478bd9Sstevel@tonic-gate  *
9487c478bd9Sstevel@tonic-gate  * Arguments:
9497c478bd9Sstevel@tonic-gate  *
9507c478bd9Sstevel@tonic-gate  *	context			(r) the krb5 context
9517c478bd9Sstevel@tonic-gate  *	hist_keyblock		(r) the key that hist_key_data is
9527c478bd9Sstevel@tonic-gate  *				encrypted in
9537c478bd9Sstevel@tonic-gate  *	n_new_key_data		(r) length of new_key_data
9547c478bd9Sstevel@tonic-gate  *	new_key_data		(r) keys to check against
9557c478bd9Sstevel@tonic-gate  *				pw_hist_data, encrypted in hist_keyblock
9567c478bd9Sstevel@tonic-gate  *	n_pw_hist_data		(r) length of pw_hist_data
9577c478bd9Sstevel@tonic-gate  *	pw_hist_data		(r) passwords to check new_key_data against
9587c478bd9Sstevel@tonic-gate  *
9597c478bd9Sstevel@tonic-gate  * Effects:
9607c478bd9Sstevel@tonic-gate  * For each new_key in new_key_data:
9617c478bd9Sstevel@tonic-gate  * 	decrypt new_key with the master_keyblock
9627c478bd9Sstevel@tonic-gate  * 	for each password in pw_hist_data:
9637c478bd9Sstevel@tonic-gate  *		for each hist_key in password:
9647c478bd9Sstevel@tonic-gate  *			decrypt hist_key with hist_keyblock
9657c478bd9Sstevel@tonic-gate  *			compare the new_key and hist_key
9667c478bd9Sstevel@tonic-gate  *
9677c478bd9Sstevel@tonic-gate  * Returns krb5 errors, KADM5_PASS_RESUSE if a key in
9687c478bd9Sstevel@tonic-gate  * new_key_data is the same as a key in pw_hist_data, or 0.
9697c478bd9Sstevel@tonic-gate  */
9707c478bd9Sstevel@tonic-gate static kadm5_ret_t
check_pw_reuse(krb5_context context,krb5_keyblock * master_keyblock,krb5_keyblock * hist_keyblock,int n_new_key_data,krb5_key_data * new_key_data,unsigned int n_pw_hist_data,osa_pw_hist_ent * pw_hist_data)9717c478bd9Sstevel@tonic-gate check_pw_reuse(krb5_context context,
9727c478bd9Sstevel@tonic-gate 	       krb5_keyblock *master_keyblock,
9737c478bd9Sstevel@tonic-gate 	       krb5_keyblock *hist_keyblock,
9747c478bd9Sstevel@tonic-gate 	       int n_new_key_data, krb5_key_data *new_key_data,
97556a424ccSmp 	       unsigned int n_pw_hist_data, osa_pw_hist_ent *pw_hist_data)
9767c478bd9Sstevel@tonic-gate {
9777c478bd9Sstevel@tonic-gate     int x, y, z;
9787c478bd9Sstevel@tonic-gate     krb5_keyblock newkey, histkey;
9797c478bd9Sstevel@tonic-gate     krb5_error_code ret;
9807c478bd9Sstevel@tonic-gate 
9817c478bd9Sstevel@tonic-gate     for (x = 0; x < n_new_key_data; x++) {
98256a424ccSmp 	ret = krb5_dbekd_decrypt_key_data(context,
98356a424ccSmp 					  master_keyblock,
98456a424ccSmp 					  &(new_key_data[x]),
98556a424ccSmp 					  &newkey, NULL);
98656a424ccSmp 	if (ret)
9877c478bd9Sstevel@tonic-gate 	    return(ret);
9887c478bd9Sstevel@tonic-gate 	for (y = 0; y < n_pw_hist_data; y++) {
9897c478bd9Sstevel@tonic-gate 	     for (z = 0; z < pw_hist_data[y].n_key_data; z++) {
99056a424ccSmp 		 ret = krb5_dbekd_decrypt_key_data(context,
99156a424ccSmp 						   hist_keyblock,
99256a424ccSmp 						   &pw_hist_data[y].key_data[z],
99356a424ccSmp 						   &histkey, NULL);
99456a424ccSmp 		 if (ret)
995*55fea89dSDan Cross 		     return(ret);
996*55fea89dSDan Cross 
99756a424ccSmp 		 if ((newkey.length == histkey.length) &&
99856a424ccSmp 		     (newkey.enctype == histkey.enctype) &&
99956a424ccSmp 		     (memcmp(newkey.contents, histkey.contents,
100056a424ccSmp 			     histkey.length) == 0)) {
100156a424ccSmp 		     krb5_free_keyblock_contents(context, &histkey);
100256a424ccSmp 		     krb5_free_keyblock_contents(context, &newkey);
1003*55fea89dSDan Cross 
100456a424ccSmp 		     return(KADM5_PASS_REUSE);
100556a424ccSmp 		 }
100656a424ccSmp 		 krb5_free_keyblock_contents(context, &histkey);
10077c478bd9Sstevel@tonic-gate 	     }
10087c478bd9Sstevel@tonic-gate 	}
10097c478bd9Sstevel@tonic-gate 	krb5_free_keyblock_contents(context, &newkey);
10107c478bd9Sstevel@tonic-gate     }
10117c478bd9Sstevel@tonic-gate 
10127c478bd9Sstevel@tonic-gate     return(0);
10137c478bd9Sstevel@tonic-gate }
10147c478bd9Sstevel@tonic-gate 
10157c478bd9Sstevel@tonic-gate /*
10167c478bd9Sstevel@tonic-gate  * Function: create_history_entry
10177c478bd9Sstevel@tonic-gate  *
10187c478bd9Sstevel@tonic-gate  * Purpose: Creates a password history entry from an array of
10197c478bd9Sstevel@tonic-gate  * key_data.
10207c478bd9Sstevel@tonic-gate  *
10217c478bd9Sstevel@tonic-gate  * Arguments:
10227c478bd9Sstevel@tonic-gate  *
10237c478bd9Sstevel@tonic-gate  *	context		(r) krb5_context to use
10247c478bd9Sstevel@tonic-gate  *      master_keyblcok (r) master key block
10257c478bd9Sstevel@tonic-gate  *	n_key_data	(r) number of elements in key_data
10267c478bd9Sstevel@tonic-gate  *	key_data	(r) keys to add to the history entry
10277c478bd9Sstevel@tonic-gate  *	hist		(w) history entry to fill in
10287c478bd9Sstevel@tonic-gate  *
10297c478bd9Sstevel@tonic-gate  * Effects:
10307c478bd9Sstevel@tonic-gate  *
10317c478bd9Sstevel@tonic-gate  * hist->key_data is allocated to store n_key_data key_datas.  Each
10327c478bd9Sstevel@tonic-gate  * element of key_data is decrypted with master_keyblock, re-encrypted
10337c478bd9Sstevel@tonic-gate  * in hist_key, and added to hist->key_data.  hist->n_key_data is
10347c478bd9Sstevel@tonic-gate  * set to n_key_data.
10357c478bd9Sstevel@tonic-gate  */
10367c478bd9Sstevel@tonic-gate static
create_history_entry(krb5_context context,krb5_keyblock * master_keyblock,int n_key_data,krb5_key_data * key_data,osa_pw_hist_ent * hist)1037*55fea89dSDan Cross int create_history_entry(krb5_context context,
10387c478bd9Sstevel@tonic-gate 	krb5_keyblock *master_keyblock,	int n_key_data,
10397c478bd9Sstevel@tonic-gate 	krb5_key_data *key_data, osa_pw_hist_ent *hist)
10407c478bd9Sstevel@tonic-gate {
10417c478bd9Sstevel@tonic-gate      int i, ret;
10427c478bd9Sstevel@tonic-gate      krb5_keyblock key;
10437c478bd9Sstevel@tonic-gate      krb5_keysalt salt;
1044*55fea89dSDan Cross 
10457c478bd9Sstevel@tonic-gate      hist->key_data = (krb5_key_data*)malloc(n_key_data*sizeof(krb5_key_data));
10467c478bd9Sstevel@tonic-gate      if (hist->key_data == NULL)
10477c478bd9Sstevel@tonic-gate 	  return ENOMEM;
10487c478bd9Sstevel@tonic-gate      memset(hist->key_data, 0, n_key_data*sizeof(krb5_key_data));
10497c478bd9Sstevel@tonic-gate 
10507c478bd9Sstevel@tonic-gate      for (i = 0; i < n_key_data; i++) {
105156a424ccSmp 	 ret = krb5_dbekd_decrypt_key_data(context,
105256a424ccSmp 					   master_keyblock,
105356a424ccSmp 					   &key_data[i],
105456a424ccSmp 					   &key, &salt);
105556a424ccSmp 	 if (ret)
105656a424ccSmp 	     return ret;
105756a424ccSmp 
105856a424ccSmp 	 ret = krb5_dbekd_encrypt_key_data(context, &hist_key,
105956a424ccSmp 					   &key, &salt,
106056a424ccSmp 					   key_data[i].key_data_kvno,
106156a424ccSmp 					   &hist->key_data[i]);
106256a424ccSmp 	 if (ret)
106356a424ccSmp 	     return ret;
1064*55fea89dSDan Cross 
106556a424ccSmp 	 krb5_free_keyblock_contents(context, &key);
106656a424ccSmp 	 /* krb5_free_keysalt(context, &salt); */
10677c478bd9Sstevel@tonic-gate      }
10687c478bd9Sstevel@tonic-gate 
10697c478bd9Sstevel@tonic-gate      hist->n_key_data = n_key_data;
10707c478bd9Sstevel@tonic-gate      return 0;
10717c478bd9Sstevel@tonic-gate }
10727c478bd9Sstevel@tonic-gate 
107356a424ccSmp static
free_history_entry(krb5_context context,osa_pw_hist_ent * hist)10747c478bd9Sstevel@tonic-gate void free_history_entry(krb5_context context, osa_pw_hist_ent *hist)
10757c478bd9Sstevel@tonic-gate {
10767c478bd9Sstevel@tonic-gate      int i;
10777c478bd9Sstevel@tonic-gate 
10787c478bd9Sstevel@tonic-gate      for (i = 0; i < hist->n_key_data; i++)
10797c478bd9Sstevel@tonic-gate 	  krb5_free_key_data_contents(context, &hist->key_data[i]);
10807c478bd9Sstevel@tonic-gate      free(hist->key_data);
10817c478bd9Sstevel@tonic-gate }
10827c478bd9Sstevel@tonic-gate 
10837c478bd9Sstevel@tonic-gate /*
10847c478bd9Sstevel@tonic-gate  * Function: add_to_history
10857c478bd9Sstevel@tonic-gate  *
10867c478bd9Sstevel@tonic-gate  * Purpose: Adds a password to a principal's password history.
10877c478bd9Sstevel@tonic-gate  *
10887c478bd9Sstevel@tonic-gate  * Arguments:
10897c478bd9Sstevel@tonic-gate  *
10907c478bd9Sstevel@tonic-gate  *	context		(r) krb5_context to use
10917c478bd9Sstevel@tonic-gate  *	adb		(r/w) admin principal entry to add keys to
10927c478bd9Sstevel@tonic-gate  *	pol		(r) adb's policy
10937c478bd9Sstevel@tonic-gate  *	pw		(r) keys for the password to add to adb's key history
10947c478bd9Sstevel@tonic-gate  *
10957c478bd9Sstevel@tonic-gate  * Effects:
10967c478bd9Sstevel@tonic-gate  *
10977c478bd9Sstevel@tonic-gate  * add_to_history adds a single password to adb's password history.
10987c478bd9Sstevel@tonic-gate  * pw contains n_key_data keys in its key_data, in storage should be
10997c478bd9Sstevel@tonic-gate  * allocated but not freed by the caller (XXX blech!).
11007c478bd9Sstevel@tonic-gate  *
11017c478bd9Sstevel@tonic-gate  * This function maintains adb->old_keys as a circular queue.  It
11027c478bd9Sstevel@tonic-gate  * starts empty, and grows each time this function is called until it
11037c478bd9Sstevel@tonic-gate  * is pol->pw_history_num items long.  adb->old_key_len holds the
11047c478bd9Sstevel@tonic-gate  * number of allocated entries in the array, and must therefore be [0,
11057c478bd9Sstevel@tonic-gate  * pol->pw_history_num).  adb->old_key_next is the index into the
11067c478bd9Sstevel@tonic-gate  * array where the next element should be written, and must be [0,
11077c478bd9Sstevel@tonic-gate  * adb->old_key_len).
11087c478bd9Sstevel@tonic-gate  */
11097c478bd9Sstevel@tonic-gate #define	KADM_MOD(x)	(x + adb->old_key_next) % adb->old_key_len
add_to_history(krb5_context context,osa_princ_ent_t adb,kadm5_policy_ent_t pol,osa_pw_hist_ent * pw)111056a424ccSmp static kadm5_ret_t add_to_history(krb5_context context,
111156a424ccSmp 				  osa_princ_ent_t adb,
111256a424ccSmp 				  kadm5_policy_ent_t pol,
111356a424ccSmp 				  osa_pw_hist_ent *pw)
11147c478bd9Sstevel@tonic-gate {
111556a424ccSmp      osa_pw_hist_ent *histp;
1116159d09a2SMark Phalan      uint32_t nhist;
1117159d09a2SMark Phalan      unsigned int i, knext, nkeys;
1118159d09a2SMark Phalan 
1119159d09a2SMark Phalan      nhist = pol->pw_history_num;
1120159d09a2SMark Phalan      /* A history of 1 means just check the current password */
1121159d09a2SMark Phalan      if (nhist <= 1)
1122159d09a2SMark Phalan 	  return 0;
1123159d09a2SMark Phalan 
1124159d09a2SMark Phalan      nkeys = adb->old_key_len;
1125159d09a2SMark Phalan      knext = adb->old_key_next;
1126159d09a2SMark Phalan      /* resize the adb->old_keys array if necessary */
1127159d09a2SMark Phalan      if (nkeys + 1 < nhist) {
1128159d09a2SMark Phalan 	  if (adb->old_keys == NULL) {
1129159d09a2SMark Phalan 	       adb->old_keys = (osa_pw_hist_ent *)
1130159d09a2SMark Phalan 		    malloc((nkeys + 1) * sizeof (osa_pw_hist_ent));
1131159d09a2SMark Phalan 	  } else {
1132159d09a2SMark Phalan 	       adb->old_keys = (osa_pw_hist_ent *)
1133159d09a2SMark Phalan 		    realloc(adb->old_keys,
1134159d09a2SMark Phalan 			    (nkeys + 1) * sizeof (osa_pw_hist_ent));
1135159d09a2SMark Phalan 	  }
1136159d09a2SMark Phalan 	  if (adb->old_keys == NULL)
1137159d09a2SMark Phalan 	       return(ENOMEM);
1138*55fea89dSDan Cross 
1139159d09a2SMark Phalan 	  memset(&adb->old_keys[nkeys], 0, sizeof(osa_pw_hist_ent));
1140159d09a2SMark Phalan      	  nkeys = ++adb->old_key_len;
1141159d09a2SMark Phalan 	  /*
1142159d09a2SMark Phalan 	   * To avoid losing old keys, shift forward each entry after
1143159d09a2SMark Phalan 	   * knext.
1144159d09a2SMark Phalan 	   */
1145159d09a2SMark Phalan 	  for (i = nkeys - 1; i > knext; i--) {
1146159d09a2SMark Phalan 	      adb->old_keys[i] = adb->old_keys[i - 1];
1147159d09a2SMark Phalan 	  }
1148159d09a2SMark Phalan 	  memset(&adb->old_keys[knext], 0, sizeof(osa_pw_hist_ent));
1149159d09a2SMark Phalan      } else if (nkeys + 1 > nhist) {
1150159d09a2SMark Phalan 	 /*
1151159d09a2SMark Phalan 	  * The policy must have changed!  Shrink the array.
1152159d09a2SMark Phalan 	  * Can't simply realloc() down, since it might be wrapped.
1153159d09a2SMark Phalan 	  * To understand the arithmetic below, note that we are
1154159d09a2SMark Phalan 	  * copying into new positions 0 .. N-1 from old positions
1155159d09a2SMark Phalan 	  * old_key_next-N .. old_key_next-1, modulo old_key_len,
1156159d09a2SMark Phalan 	  * where N = pw_history_num - 1 is the length of the
1157159d09a2SMark Phalan 	  * shortened list.        Matt Crawford, FNAL
1158159d09a2SMark Phalan 	  */
1159159d09a2SMark Phalan 	 /*
1160159d09a2SMark Phalan 	  * M = adb->old_key_len, N = pol->pw_history_num - 1
1161159d09a2SMark Phalan 	  *
1162159d09a2SMark Phalan 	  * tmp[0] .. tmp[N-1] = old[(knext-N)%M] .. old[(knext-1)%M]
1163159d09a2SMark Phalan 	  */
1164159d09a2SMark Phalan 	 int j;
1165159d09a2SMark Phalan 	 osa_pw_hist_t tmp;
1166159d09a2SMark Phalan 
1167159d09a2SMark Phalan 	 tmp = (osa_pw_hist_ent *)
1168159d09a2SMark Phalan 	     malloc((nhist - 1) * sizeof (osa_pw_hist_ent));
1169159d09a2SMark Phalan 	 if (tmp == NULL)
1170159d09a2SMark Phalan 	     return ENOMEM;
1171159d09a2SMark Phalan 	 for (i = 0; i < nhist - 1; i++) {
1172159d09a2SMark Phalan 	     /*
1173159d09a2SMark Phalan 	      * Add nkeys once before taking remainder to avoid
1174159d09a2SMark Phalan 	      * negative values.
1175159d09a2SMark Phalan 	      */
1176159d09a2SMark Phalan 	     j = (i + nkeys + knext - (nhist - 1)) % nkeys;
1177159d09a2SMark Phalan 	     tmp[i] = adb->old_keys[j];
1178159d09a2SMark Phalan 	 }
1179159d09a2SMark Phalan 	 /* Now free the ones we don't keep (the oldest ones) */
1180159d09a2SMark Phalan 	 for (i = 0; i < nkeys - (nhist - 1); i++) {
1181159d09a2SMark Phalan 	     j = (i + nkeys + knext) % nkeys;
1182159d09a2SMark Phalan 	     histp = &adb->old_keys[j];
1183159d09a2SMark Phalan 	     for (j = 0; j < histp->n_key_data; j++) {
1184159d09a2SMark Phalan 		 krb5_free_key_data_contents(context, &histp->key_data[j]);
1185159d09a2SMark Phalan 	     }
1186159d09a2SMark Phalan 	     free(histp->key_data);
1187159d09a2SMark Phalan 	 }
1188159d09a2SMark Phalan 	 free((void *)adb->old_keys);
1189159d09a2SMark Phalan 	 adb->old_keys = tmp;
1190159d09a2SMark Phalan 	 nkeys = adb->old_key_len = nhist - 1;
1191159d09a2SMark Phalan 	 knext = adb->old_key_next = 0;
1192159d09a2SMark Phalan      }
11937c478bd9Sstevel@tonic-gate 
1194159d09a2SMark Phalan      /*
1195159d09a2SMark Phalan       * If nhist decreased since the last password change, and nkeys+1
1196159d09a2SMark Phalan       * is less than the previous nhist, it is possible for knext to
1197159d09a2SMark Phalan       * index into unallocated space.  This condition would not be
1198159d09a2SMark Phalan       * caught by the resizing code above.
1199159d09a2SMark Phalan       */
1200159d09a2SMark Phalan      if (knext + 1 > nkeys)
1201159d09a2SMark Phalan 	 knext = adb->old_key_next = 0;
1202159d09a2SMark Phalan      /* free the old pw history entry if it contains data */
1203159d09a2SMark Phalan      histp = &adb->old_keys[knext];
1204159d09a2SMark Phalan      for (i = 0; i < histp->n_key_data; i++)
1205159d09a2SMark Phalan 	  krb5_free_key_data_contents(context, &histp->key_data[i]);
1206159d09a2SMark Phalan      free(histp->key_data);
1207159d09a2SMark Phalan 
1208159d09a2SMark Phalan      /* store the new entry */
1209159d09a2SMark Phalan      adb->old_keys[knext] = *pw;
1210159d09a2SMark Phalan 
1211159d09a2SMark Phalan      /* update the next pointer */
1212159d09a2SMark Phalan      if (++adb->old_key_next == nhist - 1)
1213159d09a2SMark Phalan 	 adb->old_key_next = 0;
1214159d09a2SMark Phalan 
1215159d09a2SMark Phalan      return(0);
1216159d09a2SMark Phalan }
1217159d09a2SMark Phalan #undef KADM_MOD
1218159d09a2SMark Phalan 
1219159d09a2SMark Phalan #ifdef USE_PASSWORD_SERVER
1220159d09a2SMark Phalan /* FIXME: don't use global variable for this */
1221159d09a2SMark Phalan krb5_boolean use_password_server = 0;
12227c478bd9Sstevel@tonic-gate 
1223159d09a2SMark Phalan static krb5_boolean
kadm5_use_password_server(void)1224159d09a2SMark Phalan kadm5_use_password_server (void)
1225159d09a2SMark Phalan {
1226159d09a2SMark Phalan     return use_password_server;
1227159d09a2SMark Phalan }
12287c478bd9Sstevel@tonic-gate 
1229159d09a2SMark Phalan void
kadm5_set_use_password_server(void)1230159d09a2SMark Phalan kadm5_set_use_password_server (void)
1231159d09a2SMark Phalan {
1232159d09a2SMark Phalan     use_password_server = 1;
1233159d09a2SMark Phalan }
1234159d09a2SMark Phalan #endif
12357c478bd9Sstevel@tonic-gate 
1236159d09a2SMark Phalan #ifdef USE_PASSWORD_SERVER
12377c478bd9Sstevel@tonic-gate 
1238159d09a2SMark Phalan /*
1239*55fea89dSDan Cross  * kadm5_launch_task () runs a program (task_path) to synchronize the
1240159d09a2SMark Phalan  * Apple password server with the Kerberos database.  Password server
1241159d09a2SMark Phalan  * programs can receive arguments on the command line (task_argv)
1242159d09a2SMark Phalan  * and a block of data via stdin (data_buffer).
1243159d09a2SMark Phalan  *
1244159d09a2SMark Phalan  * Because a failure to communicate with the tool results in the
1245159d09a2SMark Phalan  * password server falling out of sync with the database,
1246159d09a2SMark Phalan  * kadm5_launch_task() always fails if it can't talk to the tool.
1247159d09a2SMark Phalan  */
12487c478bd9Sstevel@tonic-gate 
1249159d09a2SMark Phalan static kadm5_ret_t
kadm5_launch_task(krb5_context context,const char * task_path,char * const task_argv[],const char * data_buffer)1250159d09a2SMark Phalan kadm5_launch_task (krb5_context context,
1251159d09a2SMark Phalan                    const char *task_path, char * const task_argv[],
1252*55fea89dSDan Cross                    const char *data_buffer)
1253159d09a2SMark Phalan {
1254159d09a2SMark Phalan     kadm5_ret_t ret = 0;
1255159d09a2SMark Phalan     int data_pipe[2];
1256*55fea89dSDan Cross 
1257159d09a2SMark Phalan     if (data_buffer != NULL) {
1258159d09a2SMark Phalan         ret = pipe (data_pipe);
1259159d09a2SMark Phalan         if (ret) { ret = errno; }
1260159d09a2SMark Phalan     }
1261159d09a2SMark Phalan 
1262159d09a2SMark Phalan     if (!ret) {
1263159d09a2SMark Phalan         pid_t pid = fork ();
1264159d09a2SMark Phalan         if (pid == -1) {
1265159d09a2SMark Phalan             ret = errno;
1266159d09a2SMark Phalan         } else if (pid == 0) {
1267159d09a2SMark Phalan             /* The child: */
1268*55fea89dSDan Cross 
1269159d09a2SMark Phalan             if (data_buffer != NULL) {
1270159d09a2SMark Phalan                 if (dup2 (data_pipe[0], STDIN_FILENO) == -1) {
1271159d09a2SMark Phalan                     _exit (1);
1272159d09a2SMark Phalan                 }
1273159d09a2SMark Phalan             } else {
1274159d09a2SMark Phalan                 close (data_pipe[0]);
1275159d09a2SMark Phalan             }
1276159d09a2SMark Phalan 
1277159d09a2SMark Phalan             close (data_pipe[1]);
1278*55fea89dSDan Cross 
1279159d09a2SMark Phalan             execv (task_path, task_argv);
1280*55fea89dSDan Cross 
1281159d09a2SMark Phalan             _exit (1); /* Fail if execv fails */
1282159d09a2SMark Phalan         } else {
1283159d09a2SMark Phalan             /* The parent: */
1284159d09a2SMark Phalan             int status;
1285*55fea89dSDan Cross 
1286159d09a2SMark Phalan             if (data_buffer != NULL) {
1287159d09a2SMark Phalan                 /* Write out the buffer to the child */
1288159d09a2SMark Phalan                 if (krb5_net_write (context, data_pipe[1],
1289159d09a2SMark Phalan                                     data_buffer, strlen (data_buffer)) < 0) {
1290159d09a2SMark Phalan                     /* kill the child to make sure waitpid() won't hang later */
1291159d09a2SMark Phalan                     ret = errno;
1292159d09a2SMark Phalan                     kill (pid, SIGKILL);
1293159d09a2SMark Phalan                 }
1294159d09a2SMark Phalan             }
1295159d09a2SMark Phalan 
1296159d09a2SMark Phalan             close (data_buffer[0]);
1297159d09a2SMark Phalan             close (data_buffer[1]);
1298159d09a2SMark Phalan 
1299159d09a2SMark Phalan             waitpid (pid, &status, 0);
1300159d09a2SMark Phalan 
1301159d09a2SMark Phalan             if (!ret) {
1302159d09a2SMark Phalan                 if (WIFEXITED (status)) {
1303159d09a2SMark Phalan                     /* child read password and exited.  Check the return value. */
1304159d09a2SMark Phalan                     if ((WEXITSTATUS (status) != 0) && (WEXITSTATUS (status) != 252)) {
1305159d09a2SMark Phalan                        ret = KRB5KDC_ERR_POLICY; /* password change rejected */
1306159d09a2SMark Phalan                     }
1307159d09a2SMark Phalan                 } else {
1308159d09a2SMark Phalan                     /* child read password but crashed or was killed */
1309159d09a2SMark Phalan                     ret = KRB5KRB_ERR_GENERIC; /* FIXME: better error */
1310159d09a2SMark Phalan                 }
1311159d09a2SMark Phalan             }
1312159d09a2SMark Phalan         }
1313159d09a2SMark Phalan     }
1314159d09a2SMark Phalan 
1315159d09a2SMark Phalan     return ret;
13167c478bd9Sstevel@tonic-gate }
1317159d09a2SMark Phalan 
1318159d09a2SMark Phalan #endif
13197c478bd9Sstevel@tonic-gate 
13207c478bd9Sstevel@tonic-gate kadm5_ret_t
kadm5_chpass_principal(void * server_handle,krb5_principal principal,char * password)13217c478bd9Sstevel@tonic-gate kadm5_chpass_principal(void *server_handle,
13227c478bd9Sstevel@tonic-gate 			    krb5_principal principal, char *password)
13237c478bd9Sstevel@tonic-gate {
132456a424ccSmp     return
132556a424ccSmp 	kadm5_chpass_principal_3(server_handle, principal, FALSE,
132656a424ccSmp 				 0, NULL, password);
13277c478bd9Sstevel@tonic-gate }
13287c478bd9Sstevel@tonic-gate 
13297c478bd9Sstevel@tonic-gate kadm5_ret_t
kadm5_chpass_principal_3(void * server_handle,krb5_principal principal,krb5_boolean keepold,int n_ks_tuple,krb5_key_salt_tuple * ks_tuple,char * password)13307c478bd9Sstevel@tonic-gate kadm5_chpass_principal_3(void *server_handle,
13317c478bd9Sstevel@tonic-gate 			 krb5_principal principal, krb5_boolean keepold,
13327c478bd9Sstevel@tonic-gate 			 int n_ks_tuple, krb5_key_salt_tuple *ks_tuple,
13337c478bd9Sstevel@tonic-gate 			 char *password)
13347c478bd9Sstevel@tonic-gate {
13357c478bd9Sstevel@tonic-gate     krb5_int32			now;
13367c478bd9Sstevel@tonic-gate     kadm5_policy_ent_rec	pol;
13377c478bd9Sstevel@tonic-gate     osa_princ_ent_rec		adb;
13387c478bd9Sstevel@tonic-gate     krb5_db_entry		kdb, kdb_save;
133956a424ccSmp     int				ret, ret2, last_pwd, hist_added;
13407c478bd9Sstevel@tonic-gate     int				have_pol = 0;
13417c478bd9Sstevel@tonic-gate     kadm5_server_handle_t	handle = server_handle;
13427c478bd9Sstevel@tonic-gate     osa_pw_hist_ent		hist;
13437c478bd9Sstevel@tonic-gate 
13447c478bd9Sstevel@tonic-gate     CHECK_HANDLE(server_handle);
13457c478bd9Sstevel@tonic-gate 
1346661b8ac7SPeter Shoults     /* Solaris Kerberos - kadm5_check_min_life checks for null principal. */
1347661b8ac7SPeter Shoults     ret = kadm5_check_min_life(server_handle,principal,NULL,0);
1348661b8ac7SPeter Shoults     if (ret)
1349661b8ac7SPeter Shoults 	return (ret);
135054925bf6Swillf     krb5_clear_error_message(handle->context);
135154925bf6Swillf 
13527c478bd9Sstevel@tonic-gate     hist_added = 0;
13537c478bd9Sstevel@tonic-gate     memset(&hist, 0, sizeof(hist));
13547c478bd9Sstevel@tonic-gate 
13557c478bd9Sstevel@tonic-gate     if (principal == NULL || password == NULL)
13567c478bd9Sstevel@tonic-gate 	return EINVAL;
13577c478bd9Sstevel@tonic-gate     if ((krb5_principal_compare(handle->context,
13587c478bd9Sstevel@tonic-gate 				principal, hist_princ)) == TRUE)
13597c478bd9Sstevel@tonic-gate 	return KADM5_PROTECT_PRINCIPAL;
13607c478bd9Sstevel@tonic-gate 
13617c478bd9Sstevel@tonic-gate     if ((ret = kdb_get_entry(handle, principal, &kdb, &adb)))
13627c478bd9Sstevel@tonic-gate        return(ret);
13637c478bd9Sstevel@tonic-gate 
13647c478bd9Sstevel@tonic-gate     /* we are going to need the current keys after the new keys are set */
13657c478bd9Sstevel@tonic-gate     if ((ret = kdb_get_entry(handle, principal, &kdb_save, NULL))) {
13667c478bd9Sstevel@tonic-gate 	 kdb_free_entry(handle, &kdb, &adb);
13677c478bd9Sstevel@tonic-gate 	 return(ret);
13687c478bd9Sstevel@tonic-gate     }
1369*55fea89dSDan Cross 
13707c478bd9Sstevel@tonic-gate     if ((adb.aux_attributes & KADM5_POLICY)) {
13717c478bd9Sstevel@tonic-gate 	if ((ret = kadm5_get_policy(handle->lhandle, adb.policy, &pol)))
13727c478bd9Sstevel@tonic-gate 	     goto done;
13737c478bd9Sstevel@tonic-gate 	have_pol = 1;
13747c478bd9Sstevel@tonic-gate     }
13757c478bd9Sstevel@tonic-gate 
13767c478bd9Sstevel@tonic-gate     if ((ret = passwd_check(handle, password, adb.aux_attributes &
13777c478bd9Sstevel@tonic-gate 			    KADM5_POLICY, &pol, principal)))
13787c478bd9Sstevel@tonic-gate 	 goto done;
13797c478bd9Sstevel@tonic-gate 
138056a424ccSmp     ret = krb5_dbe_cpw(handle->context, &handle->master_keyblock,
138156a424ccSmp 		       n_ks_tuple?ks_tuple:handle->params.keysalts,
138256a424ccSmp 		       n_ks_tuple?n_ks_tuple:handle->params.num_keysalts,
138356a424ccSmp 		       password, 0 /* increment kvno */,
138456a424ccSmp 		       keepold, &kdb);
138556a424ccSmp     if (ret)
13867c478bd9Sstevel@tonic-gate 	goto done;
13877c478bd9Sstevel@tonic-gate 
13887c478bd9Sstevel@tonic-gate     kdb.attributes &= ~KRB5_KDB_REQUIRES_PWCHANGE;
13897c478bd9Sstevel@tonic-gate 
139056a424ccSmp     ret = krb5_timeofday(handle->context, &now);
139156a424ccSmp     if (ret)
13927c478bd9Sstevel@tonic-gate 	 goto done;
1393*55fea89dSDan Cross 
13947c478bd9Sstevel@tonic-gate     if ((adb.aux_attributes & KADM5_POLICY)) {
13957c478bd9Sstevel@tonic-gate        /* the policy was loaded before */
13967c478bd9Sstevel@tonic-gate 
139756a424ccSmp 	ret = krb5_dbe_lookup_last_pwd_change(handle->context,
139856a424ccSmp 					      &kdb, &last_pwd);
139956a424ccSmp 	if (ret)
140056a424ccSmp 	    goto done;
14017c478bd9Sstevel@tonic-gate 
14027c478bd9Sstevel@tonic-gate #if 0
14037c478bd9Sstevel@tonic-gate 	 /*
14047c478bd9Sstevel@tonic-gate 	  * The spec says this check is overridden if the caller has
14057c478bd9Sstevel@tonic-gate 	  * modify privilege.  The admin server therefore makes this
14067c478bd9Sstevel@tonic-gate 	  * check itself (in chpass_principal_wrapper, misc.c). A
14077c478bd9Sstevel@tonic-gate 	  * local caller implicitly has all authorization bits.
14087c478bd9Sstevel@tonic-gate 	  */
14097c478bd9Sstevel@tonic-gate 	if ((now - last_pwd) < pol.pw_min_life &&
14107c478bd9Sstevel@tonic-gate 	    !(kdb.attributes & KRB5_KDB_REQUIRES_PWCHANGE)) {
14117c478bd9Sstevel@tonic-gate 	     ret = KADM5_PASS_TOOSOON;
14127c478bd9Sstevel@tonic-gate 	     goto done;
14137c478bd9Sstevel@tonic-gate 	}
14147c478bd9Sstevel@tonic-gate #endif
14157c478bd9Sstevel@tonic-gate 
141656a424ccSmp 	ret = create_history_entry(handle->context,
141756a424ccSmp 				   &handle->master_keyblock, kdb_save.n_key_data,
141856a424ccSmp 				   kdb_save.key_data, &hist);
141956a424ccSmp 	if (ret)
142056a424ccSmp 	    goto done;
14217c478bd9Sstevel@tonic-gate 
142256a424ccSmp 	ret = check_pw_reuse(handle->context,
142356a424ccSmp 			     &handle->master_keyblock,
142456a424ccSmp 			     &hist_key,
142556a424ccSmp 			     kdb.n_key_data, kdb.key_data,
142656a424ccSmp 			     1, &hist);
142756a424ccSmp 	if (ret)
142856a424ccSmp 	    goto done;
1429*55fea89dSDan Cross 
14307c478bd9Sstevel@tonic-gate 	if (pol.pw_history_num > 1) {
14317c478bd9Sstevel@tonic-gate 	    if (adb.admin_history_kvno != hist_kvno) {
14327c478bd9Sstevel@tonic-gate 		ret = KADM5_BAD_HIST_KEY;
14337c478bd9Sstevel@tonic-gate 		goto done;
14347c478bd9Sstevel@tonic-gate 	    }
14357c478bd9Sstevel@tonic-gate 
143656a424ccSmp 	    ret = check_pw_reuse(handle->context,
14377c478bd9Sstevel@tonic-gate 				&handle->master_keyblock,
14387c478bd9Sstevel@tonic-gate 				     &hist_key,
143956a424ccSmp 				 kdb.n_key_data, kdb.key_data,
144056a424ccSmp 				 adb.old_key_len, adb.old_keys);
144156a424ccSmp 	    if (ret)
14427c478bd9Sstevel@tonic-gate 		goto done;
14437c478bd9Sstevel@tonic-gate 
144456a424ccSmp 	    ret = add_to_history(handle->context, &adb, &pol, &hist);
144556a424ccSmp 	    if (ret)
144656a424ccSmp 		goto done;
14477c478bd9Sstevel@tonic-gate 	    hist_added = 1;
14487c478bd9Sstevel@tonic-gate        }
14497c478bd9Sstevel@tonic-gate 
14507c478bd9Sstevel@tonic-gate 	if (pol.pw_max_life)
14517c478bd9Sstevel@tonic-gate 	   kdb.pw_expiration = now + pol.pw_max_life;
14527c478bd9Sstevel@tonic-gate 	else
14537c478bd9Sstevel@tonic-gate 	   kdb.pw_expiration = 0;
14547c478bd9Sstevel@tonic-gate     } else {
14557c478bd9Sstevel@tonic-gate 	kdb.pw_expiration = 0;
14567c478bd9Sstevel@tonic-gate     }
14577c478bd9Sstevel@tonic-gate 
1458159d09a2SMark Phalan #ifdef USE_PASSWORD_SERVER
1459159d09a2SMark Phalan     if (kadm5_use_password_server () &&
1460159d09a2SMark Phalan         (krb5_princ_size (handle->context, principal) == 1)) {
1461159d09a2SMark Phalan         krb5_data *princ = krb5_princ_component (handle->context, principal, 0);
1462159d09a2SMark Phalan         const char *path = "/usr/sbin/mkpassdb";
1463159d09a2SMark Phalan         char *argv[] = { "mkpassdb", "-setpassword", NULL, NULL };
1464159d09a2SMark Phalan         char *pstring = NULL;
1465159d09a2SMark Phalan         char pwbuf[256];
1466159d09a2SMark Phalan         int pwlen = strlen (password);
1467159d09a2SMark Phalan 
1468159d09a2SMark Phalan         if (pwlen > 254) pwlen = 254;
1469159d09a2SMark Phalan         strncpy (pwbuf, password, pwlen);
1470159d09a2SMark Phalan         pwbuf[pwlen] = '\n';
1471159d09a2SMark Phalan         pwbuf[pwlen + 1] = '\0';
1472159d09a2SMark Phalan 
1473159d09a2SMark Phalan         if (!ret) {
1474159d09a2SMark Phalan             pstring = malloc ((princ->length + 1) * sizeof (char));
1475159d09a2SMark Phalan             if (pstring == NULL) { ret = errno; }
1476159d09a2SMark Phalan         }
1477159d09a2SMark Phalan 
1478159d09a2SMark Phalan         if (!ret) {
1479159d09a2SMark Phalan             memcpy (pstring, princ->data, princ->length);
1480159d09a2SMark Phalan             pstring [princ->length] = '\0';
1481159d09a2SMark Phalan             argv[2] = pstring;
1482159d09a2SMark Phalan 
1483159d09a2SMark Phalan             ret = kadm5_launch_task (handle->context, path, argv, pwbuf);
1484159d09a2SMark Phalan         }
1485*55fea89dSDan Cross 
1486159d09a2SMark Phalan         if (pstring != NULL)
1487159d09a2SMark Phalan             free (pstring);
1488*55fea89dSDan Cross 
1489159d09a2SMark Phalan         if (ret)
1490159d09a2SMark Phalan             goto done;
1491159d09a2SMark Phalan     }
1492159d09a2SMark Phalan #endif
1493159d09a2SMark Phalan 
149456a424ccSmp     ret = krb5_dbe_update_last_pwd_change(handle->context, &kdb, now);
149556a424ccSmp     if (ret)
14967c478bd9Sstevel@tonic-gate 	goto done;
14977c478bd9Sstevel@tonic-gate 
149854925bf6Swillf     /* key data and attributes changed, let the database provider know */
14992dd2efa5Swillf     /* Solaris Kerberos: adding support for key history in LDAP KDB */
15002dd2efa5Swillf     if (hist_added == 1)
15012dd2efa5Swillf 	kdb.mask = KADM5_KEY_DATA | KADM5_ATTRIBUTES | KADM5_KEY_HIST
15022dd2efa5Swillf 	    /* | KADM5_CPW_FUNCTION */;
15032dd2efa5Swillf     else
15042dd2efa5Swillf 	kdb.mask = KADM5_KEY_DATA | KADM5_ATTRIBUTES /* | KADM5_CPW_FUNCTION */;
150554925bf6Swillf 
15067c478bd9Sstevel@tonic-gate     if ((ret = kdb_put_entry(handle, &kdb, &adb)))
15077c478bd9Sstevel@tonic-gate 	goto done;
15087c478bd9Sstevel@tonic-gate 
15097c478bd9Sstevel@tonic-gate     ret = KADM5_OK;
15107c478bd9Sstevel@tonic-gate done:
15117c478bd9Sstevel@tonic-gate     if (!hist_added && hist.key_data)
15127c478bd9Sstevel@tonic-gate 	 free_history_entry(handle->context, &hist);
15137c478bd9Sstevel@tonic-gate     kdb_free_entry(handle, &kdb, &adb);
15147c478bd9Sstevel@tonic-gate     kdb_free_entry(handle, &kdb_save, NULL);
151554925bf6Swillf     krb5_db_free_principal(handle->context, &kdb, 1);
15167c478bd9Sstevel@tonic-gate 
15177c478bd9Sstevel@tonic-gate     if (have_pol && (ret2 = kadm5_free_policy_ent(handle->lhandle, &pol))
1518*55fea89dSDan Cross 	&& !ret)
15197c478bd9Sstevel@tonic-gate 	 ret = ret2;
15207c478bd9Sstevel@tonic-gate 
15217c478bd9Sstevel@tonic-gate     return ret;
15227c478bd9Sstevel@tonic-gate }
15237c478bd9Sstevel@tonic-gate 
15247c478bd9Sstevel@tonic-gate kadm5_ret_t
kadm5_randkey_principal(void * server_handle,krb5_principal principal,krb5_keyblock ** keyblocks,int * n_keys)15257c478bd9Sstevel@tonic-gate kadm5_randkey_principal(void *server_handle,
15267c478bd9Sstevel@tonic-gate 			krb5_principal principal,
15277c478bd9Sstevel@tonic-gate 			krb5_keyblock **keyblocks,
15287c478bd9Sstevel@tonic-gate 			int *n_keys)
15297c478bd9Sstevel@tonic-gate {
1530159d09a2SMark Phalan 	 /* Solaris Kerberos: */
15317c478bd9Sstevel@tonic-gate 	krb5_key_salt_tuple keysalts[2];
15327c478bd9Sstevel@tonic-gate 
15337c478bd9Sstevel@tonic-gate 	/*
15347c478bd9Sstevel@tonic-gate 	 * Anyone calling this routine is forced to use only DES
15357c478bd9Sstevel@tonic-gate 	 * enctypes to be compatible with earlier releases that
15367c478bd9Sstevel@tonic-gate 	 * did not support stronger crypto.
15377c478bd9Sstevel@tonic-gate 	 *
15387c478bd9Sstevel@tonic-gate 	 * S10 (and later) kadmin clients will not use this API,
15397c478bd9Sstevel@tonic-gate 	 * so we can assume the request is from an older version.
15407c478bd9Sstevel@tonic-gate 	 */
15417c478bd9Sstevel@tonic-gate 	keysalts[0].ks_enctype = ENCTYPE_DES_CBC_MD5;
15427c478bd9Sstevel@tonic-gate 	keysalts[0].ks_salttype = KRB5_KDB_SALTTYPE_NORMAL;
15437c478bd9Sstevel@tonic-gate 	keysalts[1].ks_enctype = ENCTYPE_DES_CBC_CRC;
15447c478bd9Sstevel@tonic-gate 	keysalts[1].ks_salttype = KRB5_KDB_SALTTYPE_NORMAL;
15457c478bd9Sstevel@tonic-gate 
15467c478bd9Sstevel@tonic-gate 	return (kadm5_randkey_principal_3(server_handle, principal,
15477c478bd9Sstevel@tonic-gate 			FALSE, 2, keysalts, keyblocks, n_keys));
15487c478bd9Sstevel@tonic-gate }
15497c478bd9Sstevel@tonic-gate kadm5_ret_t
kadm5_randkey_principal_3(void * server_handle,krb5_principal principal,krb5_boolean keepold,int n_ks_tuple,krb5_key_salt_tuple * ks_tuple,krb5_keyblock ** keyblocks,int * n_keys)15507c478bd9Sstevel@tonic-gate kadm5_randkey_principal_3(void *server_handle,
15517c478bd9Sstevel@tonic-gate 			krb5_principal principal,
15527c478bd9Sstevel@tonic-gate 			krb5_boolean keepold,
15537c478bd9Sstevel@tonic-gate 			int n_ks_tuple, krb5_key_salt_tuple *ks_tuple,
15547c478bd9Sstevel@tonic-gate 			krb5_keyblock **keyblocks,
15557c478bd9Sstevel@tonic-gate 			int *n_keys)
15567c478bd9Sstevel@tonic-gate {
15577c478bd9Sstevel@tonic-gate     krb5_db_entry		kdb;
15587c478bd9Sstevel@tonic-gate     osa_princ_ent_rec		adb;
15597c478bd9Sstevel@tonic-gate     krb5_int32			now;
15607c478bd9Sstevel@tonic-gate     kadm5_policy_ent_rec	pol;
15617c478bd9Sstevel@tonic-gate     krb5_key_data		*key_data;
15627c478bd9Sstevel@tonic-gate     int				ret, last_pwd, have_pol = 0;
15637c478bd9Sstevel@tonic-gate     kadm5_server_handle_t	handle = server_handle;
15647c478bd9Sstevel@tonic-gate 
15657c478bd9Sstevel@tonic-gate     if (keyblocks)
15667c478bd9Sstevel@tonic-gate 	 *keyblocks = NULL;
15677c478bd9Sstevel@tonic-gate 
15687c478bd9Sstevel@tonic-gate     CHECK_HANDLE(server_handle);
15697c478bd9Sstevel@tonic-gate 
157054925bf6Swillf     krb5_clear_error_message(handle->context);
157154925bf6Swillf 
15727c478bd9Sstevel@tonic-gate     if (principal == NULL)
15737c478bd9Sstevel@tonic-gate 	return EINVAL;
15747c478bd9Sstevel@tonic-gate     if (hist_princ && /* this will be NULL when initializing the databse */
15757c478bd9Sstevel@tonic-gate 	((krb5_principal_compare(handle->context,
15767c478bd9Sstevel@tonic-gate 				 principal, hist_princ)) == TRUE))
15777c478bd9Sstevel@tonic-gate 	return KADM5_PROTECT_PRINCIPAL;
15787c478bd9Sstevel@tonic-gate 
15797c478bd9Sstevel@tonic-gate     if ((ret = kdb_get_entry(handle, principal, &kdb, &adb)))
15807c478bd9Sstevel@tonic-gate        return(ret);
15817c478bd9Sstevel@tonic-gate 
158256a424ccSmp     ret = krb5_dbe_crk(handle->context, &handle->master_keyblock,
158356a424ccSmp 		       n_ks_tuple?ks_tuple:handle->params.keysalts,
158456a424ccSmp 		       n_ks_tuple?n_ks_tuple:handle->params.num_keysalts,
158556a424ccSmp 		       keepold,
158656a424ccSmp 		       &kdb);
158756a424ccSmp     if (ret)
158856a424ccSmp 	goto done;
15897c478bd9Sstevel@tonic-gate 
15907c478bd9Sstevel@tonic-gate     kdb.attributes &= ~KRB5_KDB_REQUIRES_PWCHANGE;
15917c478bd9Sstevel@tonic-gate 
159256a424ccSmp     ret = krb5_timeofday(handle->context, &now);
159356a424ccSmp     if (ret)
15947c478bd9Sstevel@tonic-gate 	goto done;
15957c478bd9Sstevel@tonic-gate 
15967c478bd9Sstevel@tonic-gate     if ((adb.aux_attributes & KADM5_POLICY)) {
15977c478bd9Sstevel@tonic-gate 	if ((ret = kadm5_get_policy(handle->lhandle, adb.policy,
1598*55fea89dSDan Cross 				    &pol)) != KADM5_OK)
15997c478bd9Sstevel@tonic-gate 	   goto done;
16007c478bd9Sstevel@tonic-gate 	have_pol = 1;
16017c478bd9Sstevel@tonic-gate 
160256a424ccSmp 	ret = krb5_dbe_lookup_last_pwd_change(handle->context,
160356a424ccSmp 					      &kdb, &last_pwd);
160456a424ccSmp 	if (ret)
16057c478bd9Sstevel@tonic-gate 	     goto done;
16067c478bd9Sstevel@tonic-gate 
16077c478bd9Sstevel@tonic-gate #if 0
16087c478bd9Sstevel@tonic-gate 	 /*
16097c478bd9Sstevel@tonic-gate 	  * The spec says this check is overridden if the caller has
16107c478bd9Sstevel@tonic-gate 	  * modify privilege.  The admin server therefore makes this
16117c478bd9Sstevel@tonic-gate 	  * check itself (in chpass_principal_wrapper, misc.c).  A
16127c478bd9Sstevel@tonic-gate 	  * local caller implicitly has all authorization bits.
16137c478bd9Sstevel@tonic-gate 	  */
16147c478bd9Sstevel@tonic-gate 	if((now - last_pwd) < pol.pw_min_life &&
16157c478bd9Sstevel@tonic-gate 	   !(kdb.attributes & KRB5_KDB_REQUIRES_PWCHANGE)) {
16167c478bd9Sstevel@tonic-gate 	     ret = KADM5_PASS_TOOSOON;
16177c478bd9Sstevel@tonic-gate 	     goto done;
16187c478bd9Sstevel@tonic-gate 	}
16197c478bd9Sstevel@tonic-gate #endif
16207c478bd9Sstevel@tonic-gate 
16217c478bd9Sstevel@tonic-gate 	if(pol.pw_history_num > 1) {
16227c478bd9Sstevel@tonic-gate 	    if(adb.admin_history_kvno != hist_kvno) {
16237c478bd9Sstevel@tonic-gate 		ret = KADM5_BAD_HIST_KEY;
16247c478bd9Sstevel@tonic-gate 		goto done;
16257c478bd9Sstevel@tonic-gate 	    }
16267c478bd9Sstevel@tonic-gate 
162756a424ccSmp 	    ret = check_pw_reuse(handle->context,
162856a424ccSmp 				 &handle->master_keyblock,
162956a424ccSmp 				 &hist_key,
163056a424ccSmp 				 kdb.n_key_data, kdb.key_data,
163156a424ccSmp 				 adb.old_key_len, adb.old_keys);
163256a424ccSmp 	    if (ret)
16337c478bd9Sstevel@tonic-gate 		goto done;
16347c478bd9Sstevel@tonic-gate 	}
16357c478bd9Sstevel@tonic-gate 	if (pol.pw_max_life)
16367c478bd9Sstevel@tonic-gate 	   kdb.pw_expiration = now + pol.pw_max_life;
16377c478bd9Sstevel@tonic-gate 	else
16387c478bd9Sstevel@tonic-gate 	   kdb.pw_expiration = 0;
16397c478bd9Sstevel@tonic-gate     } else {
16407c478bd9Sstevel@tonic-gate 	kdb.pw_expiration = 0;
16417c478bd9Sstevel@tonic-gate     }
16427c478bd9Sstevel@tonic-gate 
164356a424ccSmp     ret = krb5_dbe_update_last_pwd_change(handle->context, &kdb, now);
164456a424ccSmp     if (ret)
16457c478bd9Sstevel@tonic-gate 	 goto done;
16467c478bd9Sstevel@tonic-gate 
16477c478bd9Sstevel@tonic-gate     if (keyblocks) {
16487c478bd9Sstevel@tonic-gate 	 if (handle->api_version == KADM5_API_VERSION_1) {
16497c478bd9Sstevel@tonic-gate 	      /* Version 1 clients will expect to see a DES_CRC enctype. */
165056a424ccSmp 	     ret = krb5_dbe_find_enctype(handle->context, &kdb,
165156a424ccSmp 					 ENCTYPE_DES_CBC_CRC,
165256a424ccSmp 					 -1, -1, &key_data);
165356a424ccSmp 	     if (ret)
165456a424ccSmp 		 goto done;
1655*55fea89dSDan Cross 
165656a424ccSmp 	     ret = decrypt_key_data(handle->context,
16577c478bd9Sstevel@tonic-gate 				&handle->master_keyblock, 1, key_data,
165856a424ccSmp 				     keyblocks, NULL);
165956a424ccSmp 	     if (ret)
166056a424ccSmp 		 goto done;
16617c478bd9Sstevel@tonic-gate 	 } else {
166256a424ccSmp 	     ret = decrypt_key_data(handle->context,
166356a424ccSmp 				     &handle->master_keyblock,
166456a424ccSmp 				     kdb.n_key_data, kdb.key_data,
166556a424ccSmp 				     keyblocks, n_keys);
166656a424ccSmp 	     if (ret)
166756a424ccSmp 		 goto done;
16687c478bd9Sstevel@tonic-gate 	 }
1669*55fea89dSDan Cross     }
1670*55fea89dSDan Cross 
167154925bf6Swillf     /* key data changed, let the database provider know */
167254925bf6Swillf     kdb.mask = KADM5_KEY_DATA /* | KADM5_RANDKEY_USED */;
167354925bf6Swillf 
16747c478bd9Sstevel@tonic-gate     if ((ret = kdb_put_entry(handle, &kdb, &adb)))
16757c478bd9Sstevel@tonic-gate 	goto done;
16767c478bd9Sstevel@tonic-gate 
16777c478bd9Sstevel@tonic-gate     ret = KADM5_OK;
16787c478bd9Sstevel@tonic-gate done:
16797c478bd9Sstevel@tonic-gate     kdb_free_entry(handle, &kdb, &adb);
16807c478bd9Sstevel@tonic-gate     if (have_pol)
16817c478bd9Sstevel@tonic-gate 	 kadm5_free_policy_ent(handle->lhandle, &pol);
16827c478bd9Sstevel@tonic-gate 
16837c478bd9Sstevel@tonic-gate     return ret;
16847c478bd9Sstevel@tonic-gate }
16857c478bd9Sstevel@tonic-gate 
1686159d09a2SMark Phalan #if 0 /* Solaris Kerberos */
1687159d09a2SMark Phalan /*
1688159d09a2SMark Phalan  * kadm5_setv4key_principal:
1689159d09a2SMark Phalan  *
1690159d09a2SMark Phalan  * Set only ONE key of the principal, removing all others.  This key
1691159d09a2SMark Phalan  * must have the DES_CBC_CRC enctype and is entered as having the
1692159d09a2SMark Phalan  * krb4 salttype.  This is to enable things like kadmind4 to work.
1693159d09a2SMark Phalan  */
1694159d09a2SMark Phalan kadm5_ret_t
1695159d09a2SMark Phalan kadm5_setv4key_principal(void *server_handle,
1696159d09a2SMark Phalan 		       krb5_principal principal,
1697159d09a2SMark Phalan 		       krb5_keyblock *keyblock)
1698159d09a2SMark Phalan {
1699159d09a2SMark Phalan     krb5_db_entry		kdb;
1700159d09a2SMark Phalan     osa_princ_ent_rec		adb;
1701159d09a2SMark Phalan     krb5_int32			now;
1702159d09a2SMark Phalan     kadm5_policy_ent_rec	pol;
1703159d09a2SMark Phalan     krb5_keysalt		keysalt;
1704159d09a2SMark Phalan     int				i, k, kvno, ret, have_pol = 0;
1705159d09a2SMark Phalan #if 0
1706159d09a2SMark Phalan     int                         last_pwd;
1707159d09a2SMark Phalan #endif
1708159d09a2SMark Phalan     kadm5_server_handle_t	handle = server_handle;
1709159d09a2SMark Phalan     krb5_key_data               tmp_key_data;
1710159d09a2SMark Phalan 
1711159d09a2SMark Phalan     memset( &tmp_key_data, 0, sizeof(tmp_key_data));
1712159d09a2SMark Phalan 
1713159d09a2SMark Phalan     CHECK_HANDLE(server_handle);
1714159d09a2SMark Phalan 
1715159d09a2SMark Phalan     krb5_clear_error_message(handle->context);
1716159d09a2SMark Phalan 
1717159d09a2SMark Phalan     if (principal == NULL || keyblock == NULL)
1718159d09a2SMark Phalan 	return EINVAL;
1719159d09a2SMark Phalan     if (hist_princ && /* this will be NULL when initializing the databse */
1720159d09a2SMark Phalan 	((krb5_principal_compare(handle->context,
1721159d09a2SMark Phalan 				 principal, hist_princ)) == TRUE))
1722159d09a2SMark Phalan 	return KADM5_PROTECT_PRINCIPAL;
1723159d09a2SMark Phalan 
1724159d09a2SMark Phalan     if (keyblock->enctype != ENCTYPE_DES_CBC_CRC)
1725159d09a2SMark Phalan 	return KADM5_SETV4KEY_INVAL_ENCTYPE;
1726*55fea89dSDan Cross 
1727159d09a2SMark Phalan     if ((ret = kdb_get_entry(handle, principal, &kdb, &adb)))
1728159d09a2SMark Phalan        return(ret);
1729159d09a2SMark Phalan 
1730159d09a2SMark Phalan     for (kvno = 0, i=0; i<kdb.n_key_data; i++)
1731159d09a2SMark Phalan 	 if (kdb.key_data[i].key_data_kvno > kvno)
1732159d09a2SMark Phalan 	      kvno = kdb.key_data[i].key_data_kvno;
1733159d09a2SMark Phalan 
1734159d09a2SMark Phalan     if (kdb.key_data != NULL)
1735159d09a2SMark Phalan 	 cleanup_key_data(handle->context, kdb.n_key_data, kdb.key_data);
1736*55fea89dSDan Cross 
1737159d09a2SMark Phalan     kdb.key_data = (krb5_key_data*)krb5_db_alloc(handle->context, NULL, sizeof(krb5_key_data));
1738159d09a2SMark Phalan     if (kdb.key_data == NULL)
1739159d09a2SMark Phalan 	 return ENOMEM;
1740159d09a2SMark Phalan     memset(kdb.key_data, 0, sizeof(krb5_key_data));
1741159d09a2SMark Phalan     kdb.n_key_data = 1;
1742159d09a2SMark Phalan     keysalt.type = KRB5_KDB_SALTTYPE_V4;
1743159d09a2SMark Phalan     /* XXX data.magic? */
1744159d09a2SMark Phalan     keysalt.data.length = 0;
1745159d09a2SMark Phalan     keysalt.data.data = NULL;
1746159d09a2SMark Phalan 
1747159d09a2SMark Phalan     /* use tmp_key_data as temporary location and reallocate later */
1748159d09a2SMark Phalan     ret = krb5_dbekd_encrypt_key_data(handle->context, &master_keyblock,
1749159d09a2SMark Phalan 				      keyblock, &keysalt, kvno + 1,
1750159d09a2SMark Phalan 				      &tmp_key_data);
1751159d09a2SMark Phalan     if (ret) {
1752159d09a2SMark Phalan 	goto done;
1753159d09a2SMark Phalan     }
1754159d09a2SMark Phalan 
1755159d09a2SMark Phalan     for (k = 0; k < tmp_key_data.key_data_ver; k++) {
1756159d09a2SMark Phalan 	kdb.key_data->key_data_type[k] = tmp_key_data.key_data_type[k];
1757159d09a2SMark Phalan 	kdb.key_data->key_data_length[k] = tmp_key_data.key_data_length[k];
1758159d09a2SMark Phalan 	if (tmp_key_data.key_data_contents[k]) {
1759159d09a2SMark Phalan 	    kdb.key_data->key_data_contents[k] = krb5_db_alloc(handle->context, NULL, tmp_key_data.key_data_length[k]);
1760159d09a2SMark Phalan 	    if (kdb.key_data->key_data_contents[k] == NULL) {
1761159d09a2SMark Phalan 		cleanup_key_data(handle->context, kdb.n_key_data, kdb.key_data);
1762159d09a2SMark Phalan 		kdb.key_data = NULL;
1763159d09a2SMark Phalan 		kdb.n_key_data = 0;
1764159d09a2SMark Phalan 		ret = ENOMEM;
1765159d09a2SMark Phalan 		goto done;
1766159d09a2SMark Phalan 	    }
1767159d09a2SMark Phalan 	    memcpy (kdb.key_data->key_data_contents[k], tmp_key_data.key_data_contents[k], tmp_key_data.key_data_length[k]);
1768159d09a2SMark Phalan 
1769159d09a2SMark Phalan 	    memset (tmp_key_data.key_data_contents[k], 0, tmp_key_data.key_data_length[k]);
1770159d09a2SMark Phalan 	    free (tmp_key_data.key_data_contents[k]);
1771159d09a2SMark Phalan 	    tmp_key_data.key_data_contents[k] = NULL;
1772159d09a2SMark Phalan 	}
1773159d09a2SMark Phalan     }
1774159d09a2SMark Phalan 
1775159d09a2SMark Phalan 
1776159d09a2SMark Phalan 
1777159d09a2SMark Phalan     kdb.attributes &= ~KRB5_KDB_REQUIRES_PWCHANGE;
1778159d09a2SMark Phalan 
1779159d09a2SMark Phalan     ret = krb5_timeofday(handle->context, &now);
1780159d09a2SMark Phalan     if (ret)
1781159d09a2SMark Phalan 	goto done;
1782159d09a2SMark Phalan 
1783159d09a2SMark Phalan     if ((adb.aux_attributes & KADM5_POLICY)) {
1784159d09a2SMark Phalan 	if ((ret = kadm5_get_policy(handle->lhandle, adb.policy,
1785*55fea89dSDan Cross 				    &pol)) != KADM5_OK)
1786159d09a2SMark Phalan 	   goto done;
1787159d09a2SMark Phalan 	have_pol = 1;
1788159d09a2SMark Phalan 
1789159d09a2SMark Phalan #if 0
1790159d09a2SMark Phalan 	/*
1791159d09a2SMark Phalan 	  * The spec says this check is overridden if the caller has
1792159d09a2SMark Phalan 	  * modify privilege.  The admin server therefore makes this
1793159d09a2SMark Phalan 	  * check itself (in chpass_principal_wrapper, misc.c).  A
1794159d09a2SMark Phalan 	  * local caller implicitly has all authorization bits.
1795159d09a2SMark Phalan 	  */
1796159d09a2SMark Phalan 	if (ret = krb5_dbe_lookup_last_pwd_change(handle->context,
1797159d09a2SMark Phalan 						  &kdb, &last_pwd))
1798159d09a2SMark Phalan 	     goto done;
1799159d09a2SMark Phalan 	if((now - last_pwd) < pol.pw_min_life &&
1800159d09a2SMark Phalan 	   !(kdb.attributes & KRB5_KDB_REQUIRES_PWCHANGE)) {
1801159d09a2SMark Phalan 	     ret = KADM5_PASS_TOOSOON;
1802159d09a2SMark Phalan 	     goto done;
1803159d09a2SMark Phalan 	}
1804159d09a2SMark Phalan #endif
1805159d09a2SMark Phalan #if 0
1806159d09a2SMark Phalan 	/*
1807159d09a2SMark Phalan 	 * Should we be checking/updating pw history here?
1808159d09a2SMark Phalan 	 */
1809159d09a2SMark Phalan 	if(pol.pw_history_num > 1) {
1810159d09a2SMark Phalan 	    if(adb.admin_history_kvno != hist_kvno) {
1811159d09a2SMark Phalan 		ret = KADM5_BAD_HIST_KEY;
1812159d09a2SMark Phalan 		goto done;
1813159d09a2SMark Phalan 	    }
1814159d09a2SMark Phalan 
1815159d09a2SMark Phalan 	    if (ret = check_pw_reuse(handle->context,
1816159d09a2SMark Phalan 				     &hist_key,
1817159d09a2SMark Phalan 				     kdb.n_key_data, kdb.key_data,
1818159d09a2SMark Phalan 				     adb.old_key_len, adb.old_keys))
1819159d09a2SMark Phalan 		goto done;
1820159d09a2SMark Phalan 	}
1821159d09a2SMark Phalan #endif
1822*55fea89dSDan Cross 
1823159d09a2SMark Phalan 	if (pol.pw_max_life)
1824159d09a2SMark Phalan 	   kdb.pw_expiration = now + pol.pw_max_life;
1825159d09a2SMark Phalan 	else
1826159d09a2SMark Phalan 	   kdb.pw_expiration = 0;
1827159d09a2SMark Phalan     } else {
1828159d09a2SMark Phalan 	kdb.pw_expiration = 0;
1829159d09a2SMark Phalan     }
1830159d09a2SMark Phalan 
1831159d09a2SMark Phalan     ret = krb5_dbe_update_last_pwd_change(handle->context, &kdb, now);
1832159d09a2SMark Phalan     if (ret)
1833159d09a2SMark Phalan 	 goto done;
1834159d09a2SMark Phalan 
1835159d09a2SMark Phalan     if ((ret = kdb_put_entry(handle, &kdb, &adb)))
1836159d09a2SMark Phalan 	goto done;
1837159d09a2SMark Phalan 
1838159d09a2SMark Phalan     ret = KADM5_OK;
1839159d09a2SMark Phalan done:
1840159d09a2SMark Phalan     for (i = 0; i < tmp_key_data.key_data_ver; i++) {
1841159d09a2SMark Phalan 	if (tmp_key_data.key_data_contents[i]) {
1842159d09a2SMark Phalan 	    memset (tmp_key_data.key_data_contents[i], 0, tmp_key_data.key_data_length[i]);
1843159d09a2SMark Phalan 	    free (tmp_key_data.key_data_contents[i]);
1844159d09a2SMark Phalan 	}
1845159d09a2SMark Phalan     }
1846159d09a2SMark Phalan 
1847159d09a2SMark Phalan     kdb_free_entry(handle, &kdb, &adb);
1848159d09a2SMark Phalan     if (have_pol)
1849159d09a2SMark Phalan 	 kadm5_free_policy_ent(handle->lhandle, &pol);
1850159d09a2SMark Phalan 
1851159d09a2SMark Phalan     return ret;
1852159d09a2SMark Phalan }
1853159d09a2SMark Phalan #endif
1854159d09a2SMark Phalan 
18557c478bd9Sstevel@tonic-gate kadm5_ret_t
kadm5_setkey_principal(void * server_handle,krb5_principal principal,krb5_keyblock * keyblocks,int n_keys)18567c478bd9Sstevel@tonic-gate kadm5_setkey_principal(void *server_handle,
18577c478bd9Sstevel@tonic-gate 		       krb5_principal principal,
18587c478bd9Sstevel@tonic-gate 		       krb5_keyblock *keyblocks,
18597c478bd9Sstevel@tonic-gate 		       int n_keys)
18607c478bd9Sstevel@tonic-gate {
186156a424ccSmp     return
186256a424ccSmp 	kadm5_setkey_principal_3(server_handle, principal,
186356a424ccSmp 				 FALSE, 0, NULL,
186456a424ccSmp 				 keyblocks, n_keys);
18657c478bd9Sstevel@tonic-gate }
18667c478bd9Sstevel@tonic-gate 
18677c478bd9Sstevel@tonic-gate kadm5_ret_t
kadm5_setkey_principal_3(void * server_handle,krb5_principal principal,krb5_boolean keepold,int n_ks_tuple,krb5_key_salt_tuple * ks_tuple,krb5_keyblock * keyblocks,int n_keys)18687c478bd9Sstevel@tonic-gate kadm5_setkey_principal_3(void *server_handle,
18697c478bd9Sstevel@tonic-gate 			 krb5_principal principal,
18707c478bd9Sstevel@tonic-gate 			 krb5_boolean keepold,
18717c478bd9Sstevel@tonic-gate 			 int n_ks_tuple, krb5_key_salt_tuple *ks_tuple,
18727c478bd9Sstevel@tonic-gate 			 krb5_keyblock *keyblocks,
18737c478bd9Sstevel@tonic-gate 			 int n_keys)
18747c478bd9Sstevel@tonic-gate {
18757c478bd9Sstevel@tonic-gate     krb5_db_entry		kdb;
18767c478bd9Sstevel@tonic-gate     osa_princ_ent_rec		adb;
18777c478bd9Sstevel@tonic-gate     krb5_int32			now;
18787c478bd9Sstevel@tonic-gate     kadm5_policy_ent_rec	pol;
18797c478bd9Sstevel@tonic-gate     krb5_key_data		*old_key_data;
18807c478bd9Sstevel@tonic-gate     int				n_old_keys;
188154925bf6Swillf     int				i, j, k, kvno, ret, have_pol = 0;
188254925bf6Swillf #if 0
188354925bf6Swillf     int                         last_pwd;
188454925bf6Swillf #endif
18857c478bd9Sstevel@tonic-gate     kadm5_server_handle_t	handle = server_handle;
18867c478bd9Sstevel@tonic-gate     krb5_boolean		similar;
18877c478bd9Sstevel@tonic-gate     krb5_keysalt		keysalt;
188854925bf6Swillf     krb5_key_data         tmp_key_data;
188954925bf6Swillf     krb5_key_data        *tptr;
18907c478bd9Sstevel@tonic-gate 
18917c478bd9Sstevel@tonic-gate     CHECK_HANDLE(server_handle);
18927c478bd9Sstevel@tonic-gate 
189354925bf6Swillf     krb5_clear_error_message(handle->context);
189454925bf6Swillf 
18957c478bd9Sstevel@tonic-gate     if (principal == NULL || keyblocks == NULL)
18967c478bd9Sstevel@tonic-gate 	return EINVAL;
18977c478bd9Sstevel@tonic-gate     if (hist_princ && /* this will be NULL when initializing the databse */
18987c478bd9Sstevel@tonic-gate 	((krb5_principal_compare(handle->context,
18997c478bd9Sstevel@tonic-gate 				 principal, hist_princ)) == TRUE))
19007c478bd9Sstevel@tonic-gate 	return KADM5_PROTECT_PRINCIPAL;
19017c478bd9Sstevel@tonic-gate 
19027c478bd9Sstevel@tonic-gate     for (i = 0; i < n_keys; i++) {
19037c478bd9Sstevel@tonic-gate 	for (j = i+1; j < n_keys; j++) {
190456a424ccSmp 	    if ((ret = krb5_c_enctype_compare(handle->context,
190556a424ccSmp 					      keyblocks[i].enctype,
190656a424ccSmp 					      keyblocks[j].enctype,
190756a424ccSmp 					      &similar)))
19087c478bd9Sstevel@tonic-gate 		return(ret);
190956a424ccSmp 	    if (similar) {
19107c478bd9Sstevel@tonic-gate 		if (n_ks_tuple) {
19117c478bd9Sstevel@tonic-gate 		    if (ks_tuple[i].ks_salttype == ks_tuple[j].ks_salttype)
19127c478bd9Sstevel@tonic-gate 			return KADM5_SETKEY_DUP_ENCTYPES;
19137c478bd9Sstevel@tonic-gate 		} else
19147c478bd9Sstevel@tonic-gate 		    return KADM5_SETKEY_DUP_ENCTYPES;
191556a424ccSmp 	    }
19167c478bd9Sstevel@tonic-gate 	}
19177c478bd9Sstevel@tonic-gate     }
19187c478bd9Sstevel@tonic-gate 
191956a424ccSmp     if (n_ks_tuple && n_ks_tuple != n_keys)
19207c478bd9Sstevel@tonic-gate 	return KADM5_SETKEY3_ETYPE_MISMATCH;
19217c478bd9Sstevel@tonic-gate 
19227c478bd9Sstevel@tonic-gate     if ((ret = kdb_get_entry(handle, principal, &kdb, &adb)))
19237c478bd9Sstevel@tonic-gate        return(ret);
1924*55fea89dSDan Cross 
19257c478bd9Sstevel@tonic-gate     for (kvno = 0, i=0; i<kdb.n_key_data; i++)
19267c478bd9Sstevel@tonic-gate 	 if (kdb.key_data[i].key_data_kvno > kvno)
19277c478bd9Sstevel@tonic-gate 	      kvno = kdb.key_data[i].key_data_kvno;
19287c478bd9Sstevel@tonic-gate 
19297c478bd9Sstevel@tonic-gate     if (keepold) {
19307c478bd9Sstevel@tonic-gate 	old_key_data = kdb.key_data;
19317c478bd9Sstevel@tonic-gate 	n_old_keys = kdb.n_key_data;
19327c478bd9Sstevel@tonic-gate     } else {
19337c478bd9Sstevel@tonic-gate 	if (kdb.key_data != NULL)
19347c478bd9Sstevel@tonic-gate 	    cleanup_key_data(handle->context, kdb.n_key_data, kdb.key_data);
19357c478bd9Sstevel@tonic-gate 	n_old_keys = 0;
19367c478bd9Sstevel@tonic-gate 	old_key_data = NULL;
19377c478bd9Sstevel@tonic-gate     }
1938*55fea89dSDan Cross 
193954925bf6Swillf     kdb.key_data = (krb5_key_data*)krb5_db_alloc(handle->context, NULL, (n_keys+n_old_keys)
194054925bf6Swillf 						 *sizeof(krb5_key_data));
194154925bf6Swillf     if (kdb.key_data == NULL) {
194254925bf6Swillf 	ret = ENOMEM;
194354925bf6Swillf 	goto done;
194454925bf6Swillf     }
194554925bf6Swillf 
19467c478bd9Sstevel@tonic-gate     memset(kdb.key_data, 0, (n_keys+n_old_keys)*sizeof(krb5_key_data));
19477c478bd9Sstevel@tonic-gate     kdb.n_key_data = 0;
19487c478bd9Sstevel@tonic-gate 
19497c478bd9Sstevel@tonic-gate     for (i = 0; i < n_keys; i++) {
19507c478bd9Sstevel@tonic-gate 	if (n_ks_tuple) {
19517c478bd9Sstevel@tonic-gate 	    keysalt.type = ks_tuple[i].ks_salttype;
19527c478bd9Sstevel@tonic-gate 	    keysalt.data.length = 0;
19537c478bd9Sstevel@tonic-gate 	    keysalt.data.data = NULL;
19547c478bd9Sstevel@tonic-gate 	    if (ks_tuple[i].ks_enctype != keyblocks[i].enctype) {
195554925bf6Swillf 		ret = KADM5_SETKEY3_ETYPE_MISMATCH;
195654925bf6Swillf 		goto done;
19577c478bd9Sstevel@tonic-gate 	    }
19587c478bd9Sstevel@tonic-gate 	}
195954925bf6Swillf 	memset (&tmp_key_data, 0, sizeof(tmp_key_data));
196054925bf6Swillf 
19617c478bd9Sstevel@tonic-gate 	ret = krb5_dbekd_encrypt_key_data(handle->context,
19627c478bd9Sstevel@tonic-gate 					  &handle->master_keyblock,
19637c478bd9Sstevel@tonic-gate 					  &keyblocks[i],
19647c478bd9Sstevel@tonic-gate 					  n_ks_tuple ? &keysalt : NULL,
19657c478bd9Sstevel@tonic-gate 					  kvno + 1,
196654925bf6Swillf 					  &tmp_key_data);
19677c478bd9Sstevel@tonic-gate 	if (ret) {
196854925bf6Swillf 	    goto done;
196954925bf6Swillf 	}
197054925bf6Swillf 	tptr = &kdb.key_data[i];
197154925bf6Swillf 	for (k = 0; k < tmp_key_data.key_data_ver; k++) {
197254925bf6Swillf 	    tptr->key_data_type[k] = tmp_key_data.key_data_type[k];
197354925bf6Swillf 	    tptr->key_data_length[k] = tmp_key_data.key_data_length[k];
197454925bf6Swillf 	    if (tmp_key_data.key_data_contents[k]) {
197554925bf6Swillf 		tptr->key_data_contents[k] = krb5_db_alloc(handle->context, NULL, tmp_key_data.key_data_length[k]);
197654925bf6Swillf 		if (tptr->key_data_contents[k] == NULL) {
197754925bf6Swillf 		    int i1;
197854925bf6Swillf 		    for (i1 = k; i1 < tmp_key_data.key_data_ver; i1++) {
197954925bf6Swillf 			if (tmp_key_data.key_data_contents[i1]) {
198054925bf6Swillf 			    memset (tmp_key_data.key_data_contents[i1], 0, tmp_key_data.key_data_length[i1]);
198154925bf6Swillf 			    free (tmp_key_data.key_data_contents[i1]);
198254925bf6Swillf 			}
198354925bf6Swillf 		    }
198454925bf6Swillf 
198554925bf6Swillf 		    ret =  ENOMEM;
198654925bf6Swillf 		    goto done;
198754925bf6Swillf 		}
198854925bf6Swillf 		memcpy (tptr->key_data_contents[k], tmp_key_data.key_data_contents[k], tmp_key_data.key_data_length[k]);
198954925bf6Swillf 
199054925bf6Swillf 		memset (tmp_key_data.key_data_contents[k], 0, tmp_key_data.key_data_length[k]);
199154925bf6Swillf 		free (tmp_key_data.key_data_contents[k]);
199254925bf6Swillf 		tmp_key_data.key_data_contents[k] = NULL;
199354925bf6Swillf 	    }
19947c478bd9Sstevel@tonic-gate 	}
19957c478bd9Sstevel@tonic-gate 	kdb.n_key_data++;
19967c478bd9Sstevel@tonic-gate     }
19977c478bd9Sstevel@tonic-gate 
19987c478bd9Sstevel@tonic-gate     /* copy old key data if necessary */
19997c478bd9Sstevel@tonic-gate     for (i = 0; i < n_old_keys; i++) {
20007c478bd9Sstevel@tonic-gate 	kdb.key_data[i+n_keys] = old_key_data[i];
20017c478bd9Sstevel@tonic-gate 	memset(&old_key_data[i], 0, sizeof (krb5_key_data));
20027c478bd9Sstevel@tonic-gate 	kdb.n_key_data++;
20037c478bd9Sstevel@tonic-gate     }
200454925bf6Swillf 
200554925bf6Swillf     if (old_key_data)
200654925bf6Swillf 	krb5_db_free(handle->context, old_key_data);
200754925bf6Swillf 
20087c478bd9Sstevel@tonic-gate     /* assert(kdb.n_key_data == n_keys + n_old_keys) */
20097c478bd9Sstevel@tonic-gate     kdb.attributes &= ~KRB5_KDB_REQUIRES_PWCHANGE;
20107c478bd9Sstevel@tonic-gate 
201156a424ccSmp     if ((ret = krb5_timeofday(handle->context, &now)))
20127c478bd9Sstevel@tonic-gate 	goto done;
20137c478bd9Sstevel@tonic-gate 
20147c478bd9Sstevel@tonic-gate     if ((adb.aux_attributes & KADM5_POLICY)) {
20157c478bd9Sstevel@tonic-gate 	if ((ret = kadm5_get_policy(handle->lhandle, adb.policy,
2016*55fea89dSDan Cross 				    &pol)) != KADM5_OK)
20177c478bd9Sstevel@tonic-gate 	   goto done;
20187c478bd9Sstevel@tonic-gate 	have_pol = 1;
20197c478bd9Sstevel@tonic-gate 
20207c478bd9Sstevel@tonic-gate #if 0
20217c478bd9Sstevel@tonic-gate 	/*
20227c478bd9Sstevel@tonic-gate 	  * The spec says this check is overridden if the caller has
20237c478bd9Sstevel@tonic-gate 	  * modify privilege.  The admin server therefore makes this
20247c478bd9Sstevel@tonic-gate 	  * check itself (in chpass_principal_wrapper, misc.c).  A
20257c478bd9Sstevel@tonic-gate 	  * local caller implicitly has all authorization bits.
20267c478bd9Sstevel@tonic-gate 	  */
20277c478bd9Sstevel@tonic-gate 	if (ret = krb5_dbe_lookup_last_pwd_change(handle->context,
20287c478bd9Sstevel@tonic-gate 						  &kdb, &last_pwd))
20297c478bd9Sstevel@tonic-gate 	     goto done;
20307c478bd9Sstevel@tonic-gate 	if((now - last_pwd) < pol.pw_min_life &&
20317c478bd9Sstevel@tonic-gate 	   !(kdb.attributes & KRB5_KDB_REQUIRES_PWCHANGE)) {
20327c478bd9Sstevel@tonic-gate 	     ret = KADM5_PASS_TOOSOON;
20337c478bd9Sstevel@tonic-gate 	     goto done;
20347c478bd9Sstevel@tonic-gate 	}
20357c478bd9Sstevel@tonic-gate #endif
20367c478bd9Sstevel@tonic-gate #if 0
20377c478bd9Sstevel@tonic-gate 	/*
20387c478bd9Sstevel@tonic-gate 	 * Should we be checking/updating pw history here?
20397c478bd9Sstevel@tonic-gate 	 */
204054925bf6Swillf 	if (pol.pw_history_num > 1) {
20417c478bd9Sstevel@tonic-gate 	    if(adb.admin_history_kvno != hist_kvno) {
20427c478bd9Sstevel@tonic-gate 		ret = KADM5_BAD_HIST_KEY;
20437c478bd9Sstevel@tonic-gate 		goto done;
20447c478bd9Sstevel@tonic-gate 	    }
20457c478bd9Sstevel@tonic-gate 
20467c478bd9Sstevel@tonic-gate 	    if (ret = check_pw_reuse(handle->context,
20477c478bd9Sstevel@tonic-gate 				&handle->master_keyblock,
20487c478bd9Sstevel@tonic-gate 				     &hist_key,
20497c478bd9Sstevel@tonic-gate 				     kdb.n_key_data, kdb.key_data,
20507c478bd9Sstevel@tonic-gate 				     adb.old_key_len, adb.old_keys))
20517c478bd9Sstevel@tonic-gate 		goto done;
20527c478bd9Sstevel@tonic-gate 	}
20537c478bd9Sstevel@tonic-gate #endif
2054*55fea89dSDan Cross 
20557c478bd9Sstevel@tonic-gate 	if (pol.pw_max_life)
20567c478bd9Sstevel@tonic-gate 	   kdb.pw_expiration = now + pol.pw_max_life;
20577c478bd9Sstevel@tonic-gate 	else
20587c478bd9Sstevel@tonic-gate 	   kdb.pw_expiration = 0;
20597c478bd9Sstevel@tonic-gate     } else {
20607c478bd9Sstevel@tonic-gate 	kdb.pw_expiration = 0;
20617c478bd9Sstevel@tonic-gate     }
20627c478bd9Sstevel@tonic-gate 
206356a424ccSmp     if ((ret = krb5_dbe_update_last_pwd_change(handle->context, &kdb, now)))
206456a424ccSmp         goto done;
20657c478bd9Sstevel@tonic-gate 
20667c478bd9Sstevel@tonic-gate     if ((ret = kdb_put_entry(handle, &kdb, &adb)))
20677c478bd9Sstevel@tonic-gate 	goto done;
20687c478bd9Sstevel@tonic-gate 
20697c478bd9Sstevel@tonic-gate     ret = KADM5_OK;
20707c478bd9Sstevel@tonic-gate done:
20717c478bd9Sstevel@tonic-gate     kdb_free_entry(handle, &kdb, &adb);
20727c478bd9Sstevel@tonic-gate     if (have_pol)
20737c478bd9Sstevel@tonic-gate 	 kadm5_free_policy_ent(handle->lhandle, &pol);
20747c478bd9Sstevel@tonic-gate 
20757c478bd9Sstevel@tonic-gate     return ret;
20767c478bd9Sstevel@tonic-gate }
20777c478bd9Sstevel@tonic-gate 
20787c478bd9Sstevel@tonic-gate /*
20797c478bd9Sstevel@tonic-gate  * Allocate an array of n_key_data krb5_keyblocks, fill in each
20807c478bd9Sstevel@tonic-gate  * element with the results of decrypting the nth key in key_data with
20817c478bd9Sstevel@tonic-gate  * master_keyblock, and if n_keys is not NULL fill it in with the
20827c478bd9Sstevel@tonic-gate  * number of keys decrypted.
20837c478bd9Sstevel@tonic-gate  */
decrypt_key_data(krb5_context context,krb5_keyblock * master_keyblock,int n_key_data,krb5_key_data * key_data,krb5_keyblock ** keyblocks,int * n_keys)20847c478bd9Sstevel@tonic-gate static int decrypt_key_data(krb5_context context,
208556a424ccSmp 			    krb5_keyblock *master_keyblock,
208656a424ccSmp 			    int n_key_data, krb5_key_data *key_data,
208756a424ccSmp 			    krb5_keyblock **keyblocks, int *n_keys)
20887c478bd9Sstevel@tonic-gate {
20897c478bd9Sstevel@tonic-gate      krb5_keyblock *keys;
20907c478bd9Sstevel@tonic-gate      int ret, i;
20917c478bd9Sstevel@tonic-gate 
20927c478bd9Sstevel@tonic-gate      keys = (krb5_keyblock *) malloc(n_key_data*sizeof(krb5_keyblock));
20937c478bd9Sstevel@tonic-gate      if (keys == NULL)
20947c478bd9Sstevel@tonic-gate 	  return ENOMEM;
20957c478bd9Sstevel@tonic-gate      memset((char *) keys, 0, n_key_data*sizeof(krb5_keyblock));
20967c478bd9Sstevel@tonic-gate 
20977c478bd9Sstevel@tonic-gate      for (i = 0; i < n_key_data; i++) {
209856a424ccSmp           ret = krb5_dbekd_decrypt_key_data(context,
209956a424ccSmp 					    master_keyblock,
2100*55fea89dSDan Cross 					    &key_data[i],
210156a424ccSmp 					    &keys[i], NULL);
210256a424ccSmp 	  if (ret) {
210354925bf6Swillf 	       for (; i >= 0; i--) {
210454925bf6Swillf 		   if (keys[i].contents) {
210554925bf6Swillf 		       memset (keys[i].contents, 0, keys[i].length);
210654925bf6Swillf 		       free( keys[i].contents );
210754925bf6Swillf 		   }
210854925bf6Swillf 	       }
21097c478bd9Sstevel@tonic-gate 
21107c478bd9Sstevel@tonic-gate 	       memset((char *) keys, 0, n_key_data*sizeof(krb5_keyblock));
21117c478bd9Sstevel@tonic-gate 	       free(keys);
21127c478bd9Sstevel@tonic-gate 	       return ret;
21137c478bd9Sstevel@tonic-gate 	  }
21147c478bd9Sstevel@tonic-gate      }
21157c478bd9Sstevel@tonic-gate 
21167c478bd9Sstevel@tonic-gate      *keyblocks = keys;
21177c478bd9Sstevel@tonic-gate      if (n_keys)
21187c478bd9Sstevel@tonic-gate 	  *n_keys = n_key_data;
21197c478bd9Sstevel@tonic-gate 
21207c478bd9Sstevel@tonic-gate      return 0;
21217c478bd9Sstevel@tonic-gate }
21227c478bd9Sstevel@tonic-gate 
21237c478bd9Sstevel@tonic-gate /*
21247c478bd9Sstevel@tonic-gate  * Function: kadm5_decrypt_key
21257c478bd9Sstevel@tonic-gate  *
21267c478bd9Sstevel@tonic-gate  * Purpose: Retrieves and decrypts a principal key.
21277c478bd9Sstevel@tonic-gate  *
21287c478bd9Sstevel@tonic-gate  * Arguments:
21297c478bd9Sstevel@tonic-gate  *
21307c478bd9Sstevel@tonic-gate  *	server_handle	(r) kadm5 handle
21317c478bd9Sstevel@tonic-gate  *	entry		(r) principal retrieved with kadm5_get_principal
21327c478bd9Sstevel@tonic-gate  *	ktype		(r) enctype to search for, or -1 to ignore
21337c478bd9Sstevel@tonic-gate  *	stype		(r) salt type to search for, or -1 to ignore
21347c478bd9Sstevel@tonic-gate  *	kvno		(r) kvno to search for, -1 for max, 0 for max
21357c478bd9Sstevel@tonic-gate  *			only if it also matches ktype and stype
21367c478bd9Sstevel@tonic-gate  *	keyblock	(w) keyblock to fill in
21377c478bd9Sstevel@tonic-gate  *	keysalt		(w) keysalt to fill in, or NULL
21387c478bd9Sstevel@tonic-gate  *	kvnop		(w) kvno to fill in, or NULL
21397c478bd9Sstevel@tonic-gate  *
21407c478bd9Sstevel@tonic-gate  * Effects: Searches the key_data array of entry, which must have been
21417c478bd9Sstevel@tonic-gate  * retrived with kadm5_get_principal with the KADM5_KEY_DATA mask, to
21427c478bd9Sstevel@tonic-gate  * find a key with a specified enctype, salt type, and kvno in a
21437c478bd9Sstevel@tonic-gate  * principal entry.  If not found, return ENOENT.  Otherwise, decrypt
21447c478bd9Sstevel@tonic-gate  * it with the master key, and return the key in keyblock, the salt
21457c478bd9Sstevel@tonic-gate  * in salttype, and the key version number in kvno.
21467c478bd9Sstevel@tonic-gate  *
21477c478bd9Sstevel@tonic-gate  * If ktype or stype is -1, it is ignored for the search.  If kvno is
21487c478bd9Sstevel@tonic-gate  * -1, ktype and stype are ignored and the key with the max kvno is
21497c478bd9Sstevel@tonic-gate  * returned.  If kvno is 0, only the key with the max kvno is returned
21507c478bd9Sstevel@tonic-gate  * and only if it matches the ktype and stype; otherwise, ENOENT is
21517c478bd9Sstevel@tonic-gate  * returned.
21527c478bd9Sstevel@tonic-gate  */
kadm5_decrypt_key(void * server_handle,kadm5_principal_ent_t entry,krb5_int32 ktype,krb5_int32 stype,krb5_int32 kvno,krb5_keyblock * keyblock,krb5_keysalt * keysalt,int * kvnop)21537c478bd9Sstevel@tonic-gate kadm5_ret_t kadm5_decrypt_key(void *server_handle,
21547c478bd9Sstevel@tonic-gate 			      kadm5_principal_ent_t entry, krb5_int32
21557c478bd9Sstevel@tonic-gate 			      ktype, krb5_int32 stype, krb5_int32
21567c478bd9Sstevel@tonic-gate 			      kvno, krb5_keyblock *keyblock,
21577c478bd9Sstevel@tonic-gate 			      krb5_keysalt *keysalt, int *kvnop)
21587c478bd9Sstevel@tonic-gate {
21597c478bd9Sstevel@tonic-gate     kadm5_server_handle_t handle = server_handle;
21607c478bd9Sstevel@tonic-gate     krb5_db_entry dbent;
21617c478bd9Sstevel@tonic-gate     krb5_key_data *key_data;
21627c478bd9Sstevel@tonic-gate     int ret;
21637c478bd9Sstevel@tonic-gate 
21647c478bd9Sstevel@tonic-gate     CHECK_HANDLE(server_handle);
21657c478bd9Sstevel@tonic-gate 
21667c478bd9Sstevel@tonic-gate     if (entry->n_key_data == 0 || entry->key_data == NULL)
21677c478bd9Sstevel@tonic-gate 	 return EINVAL;
21687c478bd9Sstevel@tonic-gate 
21697c478bd9Sstevel@tonic-gate     /* find_enctype only uses these two fields */
21707c478bd9Sstevel@tonic-gate     dbent.n_key_data = entry->n_key_data;
21717c478bd9Sstevel@tonic-gate     dbent.key_data = entry->key_data;
217256a424ccSmp     if ((ret = krb5_dbe_find_enctype(handle->context, &dbent, ktype,
217356a424ccSmp 				    stype, kvno, &key_data)))
21747c478bd9Sstevel@tonic-gate 	 return ret;
21757c478bd9Sstevel@tonic-gate 
217656a424ccSmp     if ((ret = krb5_dbekd_decrypt_key_data(handle->context,
217756a424ccSmp 					   &handle->master_keyblock, key_data,
217856a424ccSmp 					   keyblock, keysalt)))
21797c478bd9Sstevel@tonic-gate 	 return ret;
21807c478bd9Sstevel@tonic-gate 
2181159d09a2SMark Phalan     /*
2182159d09a2SMark Phalan      * Coerce the enctype of the output keyblock in case we got an
2183159d09a2SMark Phalan      * inexact match on the enctype; this behavior will go away when
2184159d09a2SMark Phalan      * the key storage architecture gets redesigned for 1.3.
2185159d09a2SMark Phalan      */
2186159d09a2SMark Phalan     keyblock->enctype = ktype;
2187159d09a2SMark Phalan 
21887c478bd9Sstevel@tonic-gate     if (kvnop)
21897c478bd9Sstevel@tonic-gate 	 *kvnop = key_data->key_data_kvno;
21907c478bd9Sstevel@tonic-gate 
21917c478bd9Sstevel@tonic-gate     return KADM5_OK;
21927c478bd9Sstevel@tonic-gate }
219354925bf6Swillf 
2194661b8ac7SPeter Shoults /* Solaris Kerberos */
2195661b8ac7SPeter Shoults kadm5_ret_t
kadm5_check_min_life(void * server_handle,krb5_principal principal,char * msg_ret,unsigned int msg_len)2196661b8ac7SPeter Shoults kadm5_check_min_life(void *server_handle, krb5_principal principal,
2197661b8ac7SPeter Shoults 	       char *msg_ret, unsigned int msg_len)
2198661b8ac7SPeter Shoults {
2199661b8ac7SPeter Shoults     krb5_int32			now;
2200661b8ac7SPeter Shoults     kadm5_ret_t			ret;
2201661b8ac7SPeter Shoults     kadm5_policy_ent_rec	pol;
2202661b8ac7SPeter Shoults     kadm5_principal_ent_rec	princ;
2203661b8ac7SPeter Shoults     kadm5_server_handle_t	handle = server_handle;
2204661b8ac7SPeter Shoults 
2205661b8ac7SPeter Shoults     if (msg_ret != NULL)
2206661b8ac7SPeter Shoults 	*msg_ret = '\0';
2207661b8ac7SPeter Shoults 
2208661b8ac7SPeter Shoults     ret = krb5_timeofday(handle->context, &now);
2209661b8ac7SPeter Shoults     if (ret)
2210661b8ac7SPeter Shoults 	return ret;
2211661b8ac7SPeter Shoults 
2212*55fea89dSDan Cross     ret = kadm5_get_principal(handle->lhandle, principal,
2213661b8ac7SPeter Shoults 			      &princ, KADM5_PRINCIPAL_NORMAL_MASK);
2214*55fea89dSDan Cross     if(ret)
2215661b8ac7SPeter Shoults 	 return ret;
2216661b8ac7SPeter Shoults     if(princ.aux_attributes & KADM5_POLICY) {
2217661b8ac7SPeter Shoults 	if((ret=kadm5_get_policy(handle->lhandle,
2218661b8ac7SPeter Shoults 				 princ.policy, &pol)) != KADM5_OK) {
2219661b8ac7SPeter Shoults 	    (void) kadm5_free_principal_ent(handle->lhandle, &princ);
2220661b8ac7SPeter Shoults 	    return ret;
2221661b8ac7SPeter Shoults 	}
2222661b8ac7SPeter Shoults 	if((now - princ.last_pwd_change) < pol.pw_min_life &&
2223661b8ac7SPeter Shoults 	   !(princ.attributes & KRB5_KDB_REQUIRES_PWCHANGE)) {
2224661b8ac7SPeter Shoults 	    if (msg_ret != NULL) {
2225661b8ac7SPeter Shoults 		time_t until;
2226661b8ac7SPeter Shoults 		char *time_string, *ptr, *errstr;
2227661b8ac7SPeter Shoults 
2228661b8ac7SPeter Shoults 		until = princ.last_pwd_change + pol.pw_min_life;
2229661b8ac7SPeter Shoults 
2230661b8ac7SPeter Shoults 		time_string = ctime(&until);
2231661b8ac7SPeter Shoults 		errstr = (char *)error_message(CHPASS_UTIL_PASSWORD_TOO_SOON);
2232661b8ac7SPeter Shoults 
2233661b8ac7SPeter Shoults 		if (strlen(errstr) + strlen(time_string) >= msg_len) {
2234661b8ac7SPeter Shoults 		    *errstr = '\0';
2235661b8ac7SPeter Shoults 		} else {
2236661b8ac7SPeter Shoults 		    if (*(ptr = &time_string[strlen(time_string)-1]) == '\n')
2237661b8ac7SPeter Shoults 			*ptr = '\0';
2238661b8ac7SPeter Shoults 		    sprintf(msg_ret, errstr, time_string);
2239661b8ac7SPeter Shoults 		}
2240661b8ac7SPeter Shoults 	    }
2241661b8ac7SPeter Shoults 
2242661b8ac7SPeter Shoults 	    (void) kadm5_free_policy_ent(handle->lhandle, &pol);
2243661b8ac7SPeter Shoults 	    (void) kadm5_free_principal_ent(handle->lhandle, &princ);
2244661b8ac7SPeter Shoults 	    return KADM5_PASS_TOOSOON;
2245661b8ac7SPeter Shoults 	}
2246661b8ac7SPeter Shoults 
2247661b8ac7SPeter Shoults 	ret = kadm5_free_policy_ent(handle->lhandle, &pol);
2248661b8ac7SPeter Shoults 	if (ret) {
2249661b8ac7SPeter Shoults 	    (void) kadm5_free_principal_ent(handle->lhandle, &princ);
2250661b8ac7SPeter Shoults 	    return ret;
2251661b8ac7SPeter Shoults         }
2252661b8ac7SPeter Shoults     }
2253661b8ac7SPeter Shoults 
2254661b8ac7SPeter Shoults     return kadm5_free_principal_ent(handle->lhandle, &princ);
2255661b8ac7SPeter Shoults }
2256