003 File Manager
Current Path:
/usr/src/crypto/heimdal/lib/kadm5
usr
/
src
/
crypto
/
heimdal
/
lib
/
kadm5
/
π
..
π
ChangeLog
(38.93 KB)
π
Makefile.am
(4.54 KB)
π
Makefile.in
(52.12 KB)
π
acl.c
(5.6 KB)
π
ad.c
(32.74 KB)
π
admin.h
(7.96 KB)
π
bump_pw_expire.c
(2.05 KB)
π
check-cracklib.pl
(2.79 KB)
π
chpass_c.c
(3.88 KB)
π
chpass_s.c
(5.58 KB)
π
client_glue.c
(4.39 KB)
π
common_glue.c
(3.82 KB)
π
context_s.c
(5.49 KB)
π
create_c.c
(2.76 KB)
π
create_s.c
(5.7 KB)
π
default_keys.c
(3.34 KB)
π
delete_c.c
(2.63 KB)
π
delete_s.c
(2.67 KB)
π
destroy_c.c
(2.11 KB)
π
destroy_s.c
(2.6 KB)
π
ent_setup.c
(6.71 KB)
π
error.c
(1.82 KB)
π
flush.c
(1.77 KB)
π
flush_c.c
(1.68 KB)
π
flush_s.c
(1.68 KB)
π
free.c
(2.93 KB)
π
get_c.c
(2.79 KB)
π
get_princs_c.c
(2.87 KB)
π
get_princs_s.c
(3.42 KB)
π
get_s.c
(9.63 KB)
π
init_c.c
(18.89 KB)
π
init_s.c
(6.66 KB)
π
iprop-commands.in
(3.28 KB)
π
iprop-log.8
(3.79 KB)
π
iprop-log.c
(12.01 KB)
π
iprop.8
(5.43 KB)
π
iprop.h
(2.17 KB)
π
ipropd_common.c
(2.21 KB)
π
ipropd_master.c
(26.06 KB)
π
ipropd_slave.c
(20.02 KB)
π
kadm5-private.h
(10.7 KB)
π
kadm5-protos.h
(5.09 KB)
π
kadm5-pwcheck.h
(2.48 KB)
π
kadm5_err.et
(3.43 KB)
π
kadm5_locl.h
(2.43 KB)
π
kadm5_pwcheck.3
(5.21 KB)
π
keys.c
(3.03 KB)
π
log.c
(24.91 KB)
π
marshall.c
(9.05 KB)
π
modify_c.c
(2.69 KB)
π
modify_s.c
(3.28 KB)
π
password_quality.c
(12.52 KB)
π
private.h
(4.47 KB)
π
privs_c.c
(2.66 KB)
π
privs_s.c
(1.81 KB)
π
randkey_c.c
(2.95 KB)
π
randkey_s.c
(3.29 KB)
π
rename_c.c
(2.57 KB)
π
rename_s.c
(3.64 KB)
π
sample_passwd_check.c
(2.94 KB)
π
send_recv.c
(3.14 KB)
π
server_glue.c
(4.39 KB)
π
set_keys.c
(6.81 KB)
π
set_modifier.c
(2.08 KB)
π
test_pw_quality.c
(3.08 KB)
π
version-script.map
(1.55 KB)
Editing: set_keys.c
/* * Copyright (c) 1997 - 2001, 2003 Kungliga Tekniska HΓΆgskolan * (Royal Institute of Technology, Stockholm, Sweden). * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * * 3. Neither the name of the Institute nor the names of its contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */ #include "kadm5_locl.h" RCSID("$Id$"); /* * Set the keys of `ent' to the string-to-key of `password' */ kadm5_ret_t _kadm5_set_keys(kadm5_server_context *context, hdb_entry *ent, const char *password) { Key *keys; size_t num_keys; kadm5_ret_t ret; ret = hdb_generate_key_set_password(context->context, ent->principal, password, &keys, &num_keys); if (ret) return ret; _kadm5_free_keys (context->context, ent->keys.len, ent->keys.val); ent->keys.val = keys; ent->keys.len = num_keys; hdb_entry_set_pw_change_time(context->context, ent, 0); if (krb5_config_get_bool_default(context->context, NULL, FALSE, "kadmin", "save-password", NULL)) { ret = hdb_entry_set_password(context->context, context->db, ent, password); if (ret) return ret; } return 0; } /* * Set the keys of `ent' to (`n_key_data', `key_data') */ kadm5_ret_t _kadm5_set_keys2(kadm5_server_context *context, hdb_entry *ent, int16_t n_key_data, krb5_key_data *key_data) { krb5_error_code ret; int i; unsigned len; Key *keys; len = n_key_data; keys = malloc (len * sizeof(*keys)); if (keys == NULL && len != 0) return ENOMEM; _kadm5_init_keys (keys, len); for(i = 0; i < n_key_data; i++) { keys[i].mkvno = NULL; keys[i].key.keytype = key_data[i].key_data_type[0]; ret = krb5_data_copy(&keys[i].key.keyvalue, key_data[i].key_data_contents[0], key_data[i].key_data_length[0]); if(ret) goto out; if(key_data[i].key_data_ver == 2) { Salt *salt; salt = calloc(1, sizeof(*salt)); if(salt == NULL) { ret = ENOMEM; goto out; } keys[i].salt = salt; salt->type = key_data[i].key_data_type[1]; krb5_data_copy(&salt->salt, key_data[i].key_data_contents[1], key_data[i].key_data_length[1]); } else keys[i].salt = NULL; } _kadm5_free_keys (context->context, ent->keys.len, ent->keys.val); ent->keys.len = len; ent->keys.val = keys; hdb_entry_set_pw_change_time(context->context, ent, 0); hdb_entry_clear_password(context->context, ent); return 0; out: _kadm5_free_keys (context->context, len, keys); return ret; } /* * Set the keys of `ent' to `n_keys, keys' */ kadm5_ret_t _kadm5_set_keys3(kadm5_server_context *context, hdb_entry *ent, int n_keys, krb5_keyblock *keyblocks) { krb5_error_code ret; int i; unsigned len; Key *keys; len = n_keys; keys = malloc (len * sizeof(*keys)); if (keys == NULL && len != 0) return ENOMEM; _kadm5_init_keys (keys, len); for(i = 0; i < n_keys; i++) { keys[i].mkvno = NULL; ret = krb5_copy_keyblock_contents (context->context, &keyblocks[i], &keys[i].key); if(ret) goto out; keys[i].salt = NULL; } _kadm5_free_keys (context->context, ent->keys.len, ent->keys.val); ent->keys.len = len; ent->keys.val = keys; hdb_entry_set_pw_change_time(context->context, ent, 0); hdb_entry_clear_password(context->context, ent); return 0; out: _kadm5_free_keys (context->context, len, keys); return ret; } /* * */ static int is_des_key_p(int keytype) { return keytype == ETYPE_DES_CBC_CRC || keytype == ETYPE_DES_CBC_MD4 || keytype == ETYPE_DES_CBC_MD5; } /* * Set the keys of `ent' to random keys and return them in `n_keys' * and `new_keys'. */ kadm5_ret_t _kadm5_set_keys_randomly (kadm5_server_context *context, hdb_entry *ent, krb5_keyblock **new_keys, int *n_keys) { krb5_keyblock *kblock = NULL; kadm5_ret_t ret = 0; int des_keyblock; size_t i, num_keys; Key *keys; ret = hdb_generate_key_set(context->context, ent->principal, &keys, &num_keys, 1); if (ret) return ret; kblock = malloc(num_keys * sizeof(kblock[0])); if (kblock == NULL) { ret = ENOMEM; _kadm5_free_keys (context->context, num_keys, keys); return ret; } memset(kblock, 0, num_keys * sizeof(kblock[0])); des_keyblock = -1; for (i = 0; i < num_keys; i++) { /* * To make sure all des keys are the the same we generate only * the first one and then copy key to all other des keys. */ if (des_keyblock != -1 && is_des_key_p(keys[i].key.keytype)) { ret = krb5_copy_keyblock_contents (context->context, &kblock[des_keyblock], &kblock[i]); if (ret) goto out; kblock[i].keytype = keys[i].key.keytype; } else { ret = krb5_generate_random_keyblock (context->context, keys[i].key.keytype, &kblock[i]); if (ret) goto out; if (is_des_key_p(keys[i].key.keytype)) des_keyblock = i; } ret = krb5_copy_keyblock_contents (context->context, &kblock[i], &keys[i].key); if (ret) goto out; } out: if(ret) { for (i = 0; i < num_keys; ++i) krb5_free_keyblock_contents (context->context, &kblock[i]); free(kblock); _kadm5_free_keys (context->context, num_keys, keys); return ret; } _kadm5_free_keys (context->context, ent->keys.len, ent->keys.val); ent->keys.val = keys; ent->keys.len = num_keys; *new_keys = kblock; *n_keys = num_keys; hdb_entry_set_pw_change_time(context->context, ent, 0); hdb_entry_clear_password(context->context, ent); return 0; }
Upload File
Create Folder