2 * Copyright (c) 1997-2000, 2005-2006 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
17 * 3. Neither the name of the Institute nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34 #include "kadm5_locl.h"
39 kadm5_c_create_principal(void *server_handle
,
40 kadm5_principal_ent_t princ
,
43 krb5_key_salt_tuple
*ks_tuple
,
46 kadm5_client_context
*context
= server_handle
;
49 unsigned char buf
[1024];
54 * We should get around to implementing this... At the moment, the
55 * the server side API is implemented but the wire protocol has not
58 * Well, we have the etypes extension, which the kadmin ank command now
59 * adds, but that doesn't include salt types. We could, perhaps, make it
60 * so if the password is "" or NULL, we send the etypes but not the salt
61 * type, and then have the server side create random keys of just the
65 return KADM5_KS_TUPLE_NOSUPP
;
67 ret
= _kadm5_connect(server_handle
, 1 /* want_write */);
71 krb5_data_zero(&reply
);
73 sp
= krb5_storage_from_mem(buf
, sizeof(buf
));
75 ret
= krb5_enomem(context
->context
);
78 ret
= krb5_store_int32(sp
, kadm_create
);
81 ret
= kadm5_store_principal_ent(sp
, princ
);
84 ret
= krb5_store_int32(sp
, mask
);
87 ret
= krb5_store_string(sp
, password
);
90 ret
= _kadm5_client_send(context
, sp
);
93 ret
= _kadm5_client_recv(context
, &reply
);
96 krb5_storage_free(sp
);
97 sp
= krb5_storage_from_data(&reply
);
99 ret
= krb5_enomem(context
->context
);
102 ret
= krb5_ret_int32(sp
, &tmp
);
107 krb5_clear_error_message(context
->context
);
110 krb5_storage_free(sp
);
111 krb5_data_free(&reply
);