No empty .Rs/.Re
[netbsd-mini2440.git] / crypto / dist / heimdal / lib / kadm5 / admin.h
blob4dae1613b6c36ab910fca3befcc433bd455a92e1
1 /*
2 * Copyright (c) 1997-2000 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
4 * All rights reserved.
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
17 * 3. Neither the name of the Institute nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
33 /* $Heimdal: admin.h 20237 2007-02-16 23:54:34Z lha $
34 $NetBSD$ */
36 #ifndef __KADM5_ADMIN_H__
37 #define __KADM5_ADMIN_H__
39 #define KADM5_API_VERSION_1 1
40 #define KADM5_API_VERSION_2 2
42 #ifndef USE_KADM5_API_VERSION
43 #define USE_KADM5_API_VERSION KADM5_API_VERSION_2
44 #endif
46 #if USE_KADM5_API_VERSION != KADM5_API_VERSION_2
47 #error No support for API versions other than 2
48 #endif
50 #define KADM5_STRUCT_VERSION 0
52 #include <krb5.h>
54 #define KRB5_KDB_DISALLOW_POSTDATED 0x00000001
55 #define KRB5_KDB_DISALLOW_FORWARDABLE 0x00000002
56 #define KRB5_KDB_DISALLOW_TGT_BASED 0x00000004
57 #define KRB5_KDB_DISALLOW_RENEWABLE 0x00000008
58 #define KRB5_KDB_DISALLOW_PROXIABLE 0x00000010
59 #define KRB5_KDB_DISALLOW_DUP_SKEY 0x00000020
60 #define KRB5_KDB_DISALLOW_ALL_TIX 0x00000040
61 #define KRB5_KDB_REQUIRES_PRE_AUTH 0x00000080
62 #define KRB5_KDB_REQUIRES_HW_AUTH 0x00000100
63 #define KRB5_KDB_REQUIRES_PWCHANGE 0x00000200
64 #define KRB5_KDB_DISALLOW_SVR 0x00001000
65 #define KRB5_KDB_PWCHANGE_SERVICE 0x00002000
66 #define KRB5_KDB_SUPPORT_DESMD5 0x00004000
67 #define KRB5_KDB_NEW_PRINC 0x00008000
68 #define KRB5_KDB_OK_AS_DELEGATE 0x00010000
69 #define KRB5_KDB_TRUSTED_FOR_DELEGATION 0x00020000
70 #define KRB5_KDB_ALLOW_KERBEROS4 0x00040000
71 #define KRB5_KDB_ALLOW_DIGEST 0x00080000
73 #define KADM5_PRINCIPAL 0x000001
74 #define KADM5_PRINC_EXPIRE_TIME 0x000002
75 #define KADM5_PW_EXPIRATION 0x000004
76 #define KADM5_LAST_PWD_CHANGE 0x000008
77 #define KADM5_ATTRIBUTES 0x000010
78 #define KADM5_MAX_LIFE 0x000020
79 #define KADM5_MOD_TIME 0x000040
80 #define KADM5_MOD_NAME 0x000080
81 #define KADM5_KVNO 0x000100
82 #define KADM5_MKVNO 0x000200
83 #define KADM5_AUX_ATTRIBUTES 0x000400
84 #define KADM5_POLICY 0x000800
85 #define KADM5_POLICY_CLR 0x001000
86 #define KADM5_MAX_RLIFE 0x002000
87 #define KADM5_LAST_SUCCESS 0x004000
88 #define KADM5_LAST_FAILED 0x008000
89 #define KADM5_FAIL_AUTH_COUNT 0x010000
90 #define KADM5_KEY_DATA 0x020000
91 #define KADM5_TL_DATA 0x040000
93 #define KADM5_PRINCIPAL_NORMAL_MASK (~(KADM5_KEY_DATA | KADM5_TL_DATA))
95 #define KADM5_PW_MAX_LIFE 0x004000
96 #define KADM5_PW_MIN_LIFE 0x008000
97 #define KADM5_PW_MIN_LENGTH 0x010000
98 #define KADM5_PW_MIN_CLASSES 0x020000
99 #define KADM5_PW_HISTORY_NUM 0x040000
100 #define KADM5_REF_COUNT 0x080000
102 #define KADM5_POLICY_NORMAL_MASK (~0)
104 #define KADM5_ADMIN_SERVICE "kadmin/admin"
105 #define KADM5_HIST_PRINCIPAL "kadmin/history"
106 #define KADM5_CHANGEPW_SERVICE "kadmin/changepw"
108 typedef struct _krb5_key_data {
109 int16_t key_data_ver; /* Version */
110 int16_t key_data_kvno; /* Key Version */
111 int16_t key_data_type[2]; /* Array of types */
112 int16_t key_data_length[2]; /* Array of lengths */
113 void* key_data_contents[2];/* Array of pointers */
114 } krb5_key_data;
116 typedef struct _krb5_tl_data {
117 struct _krb5_tl_data* tl_data_next;
118 int16_t tl_data_type;
119 int16_t tl_data_length;
120 void* tl_data_contents;
121 } krb5_tl_data;
123 #define KRB5_TL_LAST_PWD_CHANGE 0x0001
124 #define KRB5_TL_MOD_PRINC 0x0002
125 #define KRB5_TL_KADM_DATA 0x0003
126 #define KRB5_TL_KADM5_E_DATA 0x0004
127 #define KRB5_TL_RB1_CHALLENGE 0x0005
128 #define KRB5_TL_SECURID_STATE 0x0006
129 #define KRB5_TL_PASSWORD 0x0007
130 #define KRB5_TL_EXTENSION 0x0008
131 #define KRB5_TL_PKINIT_ACL 0x0009
132 #define KRB5_TL_ALIASES 0x000a
134 typedef struct _kadm5_principal_ent_t {
135 krb5_principal principal;
137 krb5_timestamp princ_expire_time;
138 krb5_timestamp last_pwd_change;
139 krb5_timestamp pw_expiration;
140 krb5_deltat max_life;
141 krb5_principal mod_name;
142 krb5_timestamp mod_date;
143 krb5_flags attributes;
144 krb5_kvno kvno;
145 krb5_kvno mkvno;
147 char * policy;
148 uint32_t aux_attributes;
150 krb5_deltat max_renewable_life;
151 krb5_timestamp last_success;
152 krb5_timestamp last_failed;
153 krb5_kvno fail_auth_count;
154 int16_t n_key_data;
155 int16_t n_tl_data;
156 krb5_tl_data *tl_data;
157 krb5_key_data *key_data;
158 } kadm5_principal_ent_rec, *kadm5_principal_ent_t;
160 typedef struct _kadm5_policy_ent_t {
161 char *policy;
163 uint32_t pw_min_life;
164 uint32_t pw_max_life;
165 uint32_t pw_min_length;
166 uint32_t pw_min_classes;
167 uint32_t pw_history_num;
168 uint32_t policy_refcnt;
169 } kadm5_policy_ent_rec, *kadm5_policy_ent_t;
171 #define KADM5_CONFIG_REALM (1 << 0)
172 #define KADM5_CONFIG_PROFILE (1 << 1)
173 #define KADM5_CONFIG_KADMIND_PORT (1 << 2)
174 #define KADM5_CONFIG_ADMIN_SERVER (1 << 3)
175 #define KADM5_CONFIG_DBNAME (1 << 4)
176 #define KADM5_CONFIG_ADBNAME (1 << 5)
177 #define KADM5_CONFIG_ADB_LOCKFILE (1 << 6)
178 #define KADM5_CONFIG_ACL_FILE (1 << 7)
179 #define KADM5_CONFIG_DICT_FILE (1 << 8)
180 #define KADM5_CONFIG_ADMIN_KEYTAB (1 << 9)
181 #define KADM5_CONFIG_MKEY_FROM_KEYBOARD (1 << 10)
182 #define KADM5_CONFIG_STASH_FILE (1 << 11)
183 #define KADM5_CONFIG_MKEY_NAME (1 << 12)
184 #define KADM5_CONFIG_ENCTYPE (1 << 13)
185 #define KADM5_CONFIG_MAX_LIFE (1 << 14)
186 #define KADM5_CONFIG_MAX_RLIFE (1 << 15)
187 #define KADM5_CONFIG_EXPIRATION (1 << 16)
188 #define KADM5_CONFIG_FLAGS (1 << 17)
189 #define KADM5_CONFIG_ENCTYPES (1 << 18)
191 #define KADM5_PRIV_GET (1 << 0)
192 #define KADM5_PRIV_ADD (1 << 1)
193 #define KADM5_PRIV_MODIFY (1 << 2)
194 #define KADM5_PRIV_DELETE (1 << 3)
195 #define KADM5_PRIV_LIST (1 << 4)
196 #define KADM5_PRIV_CPW (1 << 5)
197 #define KADM5_PRIV_ALL (KADM5_PRIV_GET | KADM5_PRIV_ADD | KADM5_PRIV_MODIFY | KADM5_PRIV_DELETE | KADM5_PRIV_LIST | KADM5_PRIV_CPW)
199 typedef struct {
200 int XXX;
201 }krb5_key_salt_tuple;
203 typedef struct _kadm5_config_params {
204 uint32_t mask;
206 /* Client and server fields */
207 char *realm;
208 int kadmind_port;
210 /* client fields */
211 char *admin_server;
213 /* server fields */
214 char *dbname;
215 char *acl_file;
217 /* server library (database) fields */
218 char *stash_file;
219 } kadm5_config_params;
221 typedef krb5_error_code kadm5_ret_t;
223 #include "kadm5-protos.h"
225 #if 0
226 /* unimplemented functions */
227 kadm5_ret_t
228 kadm5_decrypt_key(void *server_handle,
229 kadm5_principal_ent_t entry, int32_t
230 ktype, int32_t stype, int32_t
231 kvno, krb5_keyblock *keyblock,
232 krb5_keysalt *keysalt, int *kvnop);
234 kadm5_ret_t
235 kadm5_create_policy(void *server_handle,
236 kadm5_policy_ent_t policy, uint32_t mask);
238 kadm5_ret_t
239 kadm5_delete_policy(void *server_handle, char *policy);
242 kadm5_ret_t
243 kadm5_modify_policy(void *server_handle,
244 kadm5_policy_ent_t policy,
245 uint32_t mask);
247 kadm5_ret_t
248 kadm5_get_policy(void *server_handle, char *policy, kadm5_policy_ent_t ent);
250 kadm5_ret_t
251 kadm5_get_policies(void *server_handle, char *exp,
252 char ***pols, int *count);
254 void
255 kadm5_free_policy_ent(kadm5_policy_ent_t policy);
257 #endif
259 #endif /* __KADM5_ADMIN_H__ */