1 /*	$NetBSD: common_glue.c,v 1.1.1.2 2014/04/24 12:45:48 pettai Exp $	*/
2 
3 /*
4  * Copyright (c) 1997 - 2000 Kungliga Tekniska Högskolan
5  * (Royal Institute of Technology, Stockholm, Sweden).
6  * All rights reserved.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  *
12  * 1. Redistributions of source code must retain the above copyright
13  *    notice, this list of conditions and the following disclaimer.
14  *
15  * 2. Redistributions in binary form must reproduce the above copyright
16  *    notice, this list of conditions and the following disclaimer in the
17  *    documentation and/or other materials provided with the distribution.
18  *
19  * 3. Neither the name of the Institute nor the names of its contributors
20  *    may be used to endorse or promote products derived from this software
21  *    without specific prior written permission.
22  *
23  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
24  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
27  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33  * SUCH DAMAGE.
34  */
35 
36 #include "kadm5_locl.h"
37 
38 __RCSID("NetBSD");
39 
40 #define __CALL(F, P) (*((kadm5_common_context*)server_handle)->funcs.F)P;
41 
42 kadm5_ret_t
kadm5_chpass_principal(void * server_handle,krb5_principal princ,const char * password)43 kadm5_chpass_principal(void *server_handle,
44 		       krb5_principal princ,
45 		       const char *password)
46 {
47     return __CALL(chpass_principal, (server_handle, princ, password));
48 }
49 
50 kadm5_ret_t
kadm5_chpass_principal_with_key(void * server_handle,krb5_principal princ,int n_key_data,krb5_key_data * key_data)51 kadm5_chpass_principal_with_key(void *server_handle,
52 				krb5_principal princ,
53 				int n_key_data,
54 				krb5_key_data *key_data)
55 {
56     return __CALL(chpass_principal_with_key,
57 		  (server_handle, princ, n_key_data, key_data));
58 }
59 
60 kadm5_ret_t
kadm5_create_principal(void * server_handle,kadm5_principal_ent_t princ,uint32_t mask,const char * password)61 kadm5_create_principal(void *server_handle,
62 		       kadm5_principal_ent_t princ,
63 		       uint32_t mask,
64 		       const char *password)
65 {
66     return __CALL(create_principal, (server_handle, princ, mask, password));
67 }
68 
69 kadm5_ret_t
kadm5_delete_principal(void * server_handle,krb5_principal princ)70 kadm5_delete_principal(void *server_handle,
71 		       krb5_principal princ)
72 {
73     return __CALL(delete_principal, (server_handle, princ));
74 }
75 
76 kadm5_ret_t
kadm5_destroy(void * server_handle)77 kadm5_destroy (void *server_handle)
78 {
79     return __CALL(destroy, (server_handle));
80 }
81 
82 kadm5_ret_t
kadm5_flush(void * server_handle)83 kadm5_flush (void *server_handle)
84 {
85     return __CALL(flush, (server_handle));
86 }
87 
88 kadm5_ret_t
kadm5_get_principal(void * server_handle,krb5_principal princ,kadm5_principal_ent_t out,uint32_t mask)89 kadm5_get_principal(void *server_handle,
90 		    krb5_principal princ,
91 		    kadm5_principal_ent_t out,
92 		    uint32_t mask)
93 {
94     return __CALL(get_principal, (server_handle, princ, out, mask));
95 }
96 
97 kadm5_ret_t
kadm5_modify_principal(void * server_handle,kadm5_principal_ent_t princ,uint32_t mask)98 kadm5_modify_principal(void *server_handle,
99 		       kadm5_principal_ent_t princ,
100 		       uint32_t mask)
101 {
102     return __CALL(modify_principal, (server_handle, princ, mask));
103 }
104 
105 kadm5_ret_t
kadm5_randkey_principal(void * server_handle,krb5_principal princ,krb5_keyblock ** new_keys,int * n_keys)106 kadm5_randkey_principal(void *server_handle,
107 			krb5_principal princ,
108 			krb5_keyblock **new_keys,
109 			int *n_keys)
110 {
111     return __CALL(randkey_principal, (server_handle, princ, new_keys, n_keys));
112 }
113 
114 kadm5_ret_t
kadm5_rename_principal(void * server_handle,krb5_principal source,krb5_principal target)115 kadm5_rename_principal(void *server_handle,
116 		       krb5_principal source,
117 		       krb5_principal target)
118 {
119     return __CALL(rename_principal, (server_handle, source, target));
120 }
121 
122 kadm5_ret_t
kadm5_get_principals(void * server_handle,const char * expression,char *** princs,int * count)123 kadm5_get_principals(void *server_handle,
124 		     const char *expression,
125 		     char ***princs,
126 		     int *count)
127 {
128     return __CALL(get_principals, (server_handle, expression, princs, count));
129 }
130 
131 kadm5_ret_t
kadm5_get_privs(void * server_handle,uint32_t * privs)132 kadm5_get_privs(void *server_handle,
133 		uint32_t *privs)
134 {
135     return __CALL(get_privs, (server_handle, privs));
136 }
137