1 /* $NetBSD: common_glue.c,v 1.1.1.2 2014/04/24 12:45:48 pettai Exp $ */
2
3 /*
4 * Copyright (c) 1997 - 2000 Kungliga Tekniska Högskolan
5 * (Royal Institute of Technology, Stockholm, Sweden).
6 * All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 *
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 *
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
18 *
19 * 3. Neither the name of the Institute nor the names of its contributors
20 * may be used to endorse or promote products derived from this software
21 * without specific prior written permission.
22 *
23 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
24 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 * SUCH DAMAGE.
34 */
35
36 #include "kadm5_locl.h"
37
38 __RCSID("NetBSD");
39
40 #define __CALL(F, P) (*((kadm5_common_context*)server_handle)->funcs.F)P;
41
42 kadm5_ret_t
kadm5_chpass_principal(void * server_handle,krb5_principal princ,const char * password)43 kadm5_chpass_principal(void *server_handle,
44 krb5_principal princ,
45 const char *password)
46 {
47 return __CALL(chpass_principal, (server_handle, princ, password));
48 }
49
50 kadm5_ret_t
kadm5_chpass_principal_with_key(void * server_handle,krb5_principal princ,int n_key_data,krb5_key_data * key_data)51 kadm5_chpass_principal_with_key(void *server_handle,
52 krb5_principal princ,
53 int n_key_data,
54 krb5_key_data *key_data)
55 {
56 return __CALL(chpass_principal_with_key,
57 (server_handle, princ, n_key_data, key_data));
58 }
59
60 kadm5_ret_t
kadm5_create_principal(void * server_handle,kadm5_principal_ent_t princ,uint32_t mask,const char * password)61 kadm5_create_principal(void *server_handle,
62 kadm5_principal_ent_t princ,
63 uint32_t mask,
64 const char *password)
65 {
66 return __CALL(create_principal, (server_handle, princ, mask, password));
67 }
68
69 kadm5_ret_t
kadm5_delete_principal(void * server_handle,krb5_principal princ)70 kadm5_delete_principal(void *server_handle,
71 krb5_principal princ)
72 {
73 return __CALL(delete_principal, (server_handle, princ));
74 }
75
76 kadm5_ret_t
kadm5_destroy(void * server_handle)77 kadm5_destroy (void *server_handle)
78 {
79 return __CALL(destroy, (server_handle));
80 }
81
82 kadm5_ret_t
kadm5_flush(void * server_handle)83 kadm5_flush (void *server_handle)
84 {
85 return __CALL(flush, (server_handle));
86 }
87
88 kadm5_ret_t
kadm5_get_principal(void * server_handle,krb5_principal princ,kadm5_principal_ent_t out,uint32_t mask)89 kadm5_get_principal(void *server_handle,
90 krb5_principal princ,
91 kadm5_principal_ent_t out,
92 uint32_t mask)
93 {
94 return __CALL(get_principal, (server_handle, princ, out, mask));
95 }
96
97 kadm5_ret_t
kadm5_modify_principal(void * server_handle,kadm5_principal_ent_t princ,uint32_t mask)98 kadm5_modify_principal(void *server_handle,
99 kadm5_principal_ent_t princ,
100 uint32_t mask)
101 {
102 return __CALL(modify_principal, (server_handle, princ, mask));
103 }
104
105 kadm5_ret_t
kadm5_randkey_principal(void * server_handle,krb5_principal princ,krb5_keyblock ** new_keys,int * n_keys)106 kadm5_randkey_principal(void *server_handle,
107 krb5_principal princ,
108 krb5_keyblock **new_keys,
109 int *n_keys)
110 {
111 return __CALL(randkey_principal, (server_handle, princ, new_keys, n_keys));
112 }
113
114 kadm5_ret_t
kadm5_rename_principal(void * server_handle,krb5_principal source,krb5_principal target)115 kadm5_rename_principal(void *server_handle,
116 krb5_principal source,
117 krb5_principal target)
118 {
119 return __CALL(rename_principal, (server_handle, source, target));
120 }
121
122 kadm5_ret_t
kadm5_get_principals(void * server_handle,const char * expression,char *** princs,int * count)123 kadm5_get_principals(void *server_handle,
124 const char *expression,
125 char ***princs,
126 int *count)
127 {
128 return __CALL(get_principals, (server_handle, expression, princs, count));
129 }
130
131 kadm5_ret_t
kadm5_get_privs(void * server_handle,uint32_t * privs)132 kadm5_get_privs(void *server_handle,
133 uint32_t *privs)
134 {
135 return __CALL(get_privs, (server_handle, privs));
136 }
137