kerberos 0.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- data/README +11 -0
- data/bin/example.rb +55 -0
- data/ext/admin.h +517 -0
- data/ext/extconf.rb +12 -0
- data/ext/krb5.h +3011 -0
- data/ext/ruby_kerberos.c +362 -0
- data/ext/ruby_kerberos.h +25 -0
- data/lib/kerberos.rb +18 -0
- metadata +52 -0
data/README
ADDED
@@ -0,0 +1,11 @@
|
|
1
|
+
|
2
|
+
To install find out where your kerberos libraries and header files are, then do the following:
|
3
|
+
|
4
|
+
ruby extconf.rb --with-kerberos-dir=/kerberos/install/path (/usr/local,/usr,etc..)
|
5
|
+
make
|
6
|
+
make install
|
7
|
+
|
8
|
+
|
9
|
+
If the compile fails make sure you have the libraries and krb5.h on your system, and that krb5.h is the MIT version, NOT Heimdal.
|
10
|
+
|
11
|
+
|
data/bin/example.rb
ADDED
@@ -0,0 +1,55 @@
|
|
1
|
+
|
2
|
+
require 'kerberos'
|
3
|
+
include Kerberos
|
4
|
+
|
5
|
+
krb5 = Krb5.new
|
6
|
+
kadm5 = Kadm5.new
|
7
|
+
|
8
|
+
adminuser = 'test/admin'
|
9
|
+
adminpass = 'mypass'
|
10
|
+
user='test'
|
11
|
+
pass='pass'
|
12
|
+
pass2='pass2'
|
13
|
+
|
14
|
+
# Login as an administrative user
|
15
|
+
if kadm5.init_with_password(adminuser,adminpass)
|
16
|
+
p "Authenticated"
|
17
|
+
else
|
18
|
+
p kadm5.errstr
|
19
|
+
end
|
20
|
+
|
21
|
+
# Delete the principal if it exists
|
22
|
+
if kadm5.delete_principal(user)
|
23
|
+
p "User deleted"
|
24
|
+
else
|
25
|
+
p kadm5.errstr
|
26
|
+
p "User not deleted"
|
27
|
+
end
|
28
|
+
|
29
|
+
# Create a user, change their password, authenticate to the new password, then delete it when we are done.
|
30
|
+
|
31
|
+
#options = {'policy' =>'mypolicy'}
|
32
|
+
options = {'attributes' => Kadm5::KRB5_KDB_DISALLOW_PROXIABLE|Kadm5::KRB5_KDB_PWCHANGE_SERVICE}
|
33
|
+
if kadm5.create_principal(user,pass,options)
|
34
|
+
p "User created"
|
35
|
+
res = nil
|
36
|
+
if krb5.change_password(user,pass,pass2)
|
37
|
+
p "Password changed"
|
38
|
+
if krb5.get_init_creds_password(user,pass2)
|
39
|
+
p "Authenticated with new password"
|
40
|
+
end
|
41
|
+
else
|
42
|
+
p krb5.errstr
|
43
|
+
p "Password not changed"
|
44
|
+
end
|
45
|
+
if kadm5.delete_principal(user)
|
46
|
+
p "User deleted"
|
47
|
+
else
|
48
|
+
p kadm5.errstr
|
49
|
+
p "User not deleted"
|
50
|
+
end
|
51
|
+
else
|
52
|
+
p "User not created"
|
53
|
+
p kadm5.errstr
|
54
|
+
end
|
55
|
+
|
data/ext/admin.h
ADDED
@@ -0,0 +1,517 @@
|
|
1
|
+
/*
|
2
|
+
* Copyright 2001 by the Massachusetts Institute of Technology.
|
3
|
+
* All Rights Reserved.
|
4
|
+
*
|
5
|
+
* Export of this software from the United States of America may
|
6
|
+
* require a specific license from the United States Government.
|
7
|
+
* It is the responsibility of any person or organization contemplating
|
8
|
+
* export to obtain such a license before exporting.
|
9
|
+
*
|
10
|
+
* WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
|
11
|
+
* distribute this software and its documentation for any purpose and
|
12
|
+
* without fee is hereby granted, provided that the above copyright
|
13
|
+
* notice appear in all copies and that both that copyright notice and
|
14
|
+
* this permission notice appear in supporting documentation, and that
|
15
|
+
* the name of M.I.T. not be used in advertising or publicity pertaining
|
16
|
+
* to distribution of the software without specific, written prior
|
17
|
+
* permission. Furthermore if you modify this software you must label
|
18
|
+
* your software as modified software and not distribute it in such a
|
19
|
+
* fashion that it might be confused with the original M.I.T. software.
|
20
|
+
* M.I.T. makes no representations about the suitability of
|
21
|
+
* this software for any purpose. It is provided "as is" without express
|
22
|
+
* or implied warranty.
|
23
|
+
*
|
24
|
+
* $Id: admin.h,v 1.6 2003/01/30 13:28:36 ajk Exp $
|
25
|
+
*
|
26
|
+
* Header file for Perl interface to libkadm5clnt
|
27
|
+
*
|
28
|
+
* The file admin.h from the MIT Kerberos 5 distribution does not get
|
29
|
+
* installed by default and it depends on other header files that
|
30
|
+
* don't get installed. This file contains only what we need from
|
31
|
+
* admin.h, kadm_err.h, and k5-int.h.
|
32
|
+
*/
|
33
|
+
|
34
|
+
#if !defined(USE_KADM5_API_VERSION)
|
35
|
+
#define USE_KADM5_API_VERSION 2
|
36
|
+
#endif
|
37
|
+
|
38
|
+
/* only what we need from k5-int.h */
|
39
|
+
|
40
|
+
/*
|
41
|
+
* Note --- these structures cannot be modified without changing the
|
42
|
+
* database version number in libkdb.a, but should be expandable by
|
43
|
+
* adding new tl_data types.
|
44
|
+
*/
|
45
|
+
typedef struct _krb5_tl_data {
|
46
|
+
struct _krb5_tl_data* tl_data_next; /* NOT saved */
|
47
|
+
krb5_int16 tl_data_type;
|
48
|
+
krb5_int16 tl_data_length;
|
49
|
+
krb5_octet * tl_data_contents;
|
50
|
+
} krb5_tl_data;
|
51
|
+
|
52
|
+
/*
|
53
|
+
* If this ever changes up the version number and make the arrays be as
|
54
|
+
* big as necessary.
|
55
|
+
*
|
56
|
+
* Currently the first type is the enctype and the second is the salt type.
|
57
|
+
*/
|
58
|
+
typedef struct _krb5_key_data {
|
59
|
+
krb5_int16 key_data_ver; /* Version */
|
60
|
+
krb5_int16 key_data_kvno; /* Key Version */
|
61
|
+
krb5_int16 key_data_type[2]; /* Array of types */
|
62
|
+
krb5_int16 key_data_length[2]; /* Array of lengths */
|
63
|
+
krb5_octet * key_data_contents[2]; /* Array of pointers */
|
64
|
+
} krb5_key_data;
|
65
|
+
|
66
|
+
/* only what we need from admin.h */
|
67
|
+
|
68
|
+
#define KADM5_ADMIN_SERVICE "kadmin/admin"
|
69
|
+
#define KADM5_CHANGEPW_SERVICE "kadmin/changepw"
|
70
|
+
#define KADM5_HIST_PRINCIPAL "kadmin/history"
|
71
|
+
|
72
|
+
typedef char *kadm5_policy_t;
|
73
|
+
typedef long kadm5_ret_t;
|
74
|
+
|
75
|
+
/*
|
76
|
+
* Succsessfull return code
|
77
|
+
*/
|
78
|
+
#define KADM5_OK 0
|
79
|
+
|
80
|
+
/*
|
81
|
+
* Field masks
|
82
|
+
*/
|
83
|
+
|
84
|
+
/* kadm5_principal_ent_t */
|
85
|
+
#define KADM5_PRINCIPAL 0x000001
|
86
|
+
#define KADM5_PRINC_EXPIRE_TIME 0x000002
|
87
|
+
#define KADM5_PW_EXPIRATION 0x000004
|
88
|
+
#define KADM5_LAST_PWD_CHANGE 0x000008
|
89
|
+
#define KADM5_ATTRIBUTES 0x000010
|
90
|
+
#define KADM5_MAX_LIFE 0x000020
|
91
|
+
#define KADM5_MOD_TIME 0x000040
|
92
|
+
#define KADM5_MOD_NAME 0x000080
|
93
|
+
#define KADM5_KVNO 0x000100
|
94
|
+
#define KADM5_MKVNO 0x000200
|
95
|
+
#define KADM5_AUX_ATTRIBUTES 0x000400
|
96
|
+
#define KADM5_POLICY 0x000800
|
97
|
+
#define KADM5_POLICY_CLR 0x001000
|
98
|
+
/* version 2 masks */
|
99
|
+
#define KADM5_MAX_RLIFE 0x002000
|
100
|
+
#define KADM5_LAST_SUCCESS 0x004000
|
101
|
+
#define KADM5_LAST_FAILED 0x008000
|
102
|
+
#define KADM5_FAIL_AUTH_COUNT 0x010000
|
103
|
+
#define KADM5_KEY_DATA 0x020000
|
104
|
+
#define KADM5_TL_DATA 0x040000
|
105
|
+
/* all but KEY_DATA and TL_DATA */
|
106
|
+
#define KADM5_PRINCIPAL_NORMAL_MASK 0x01ffff
|
107
|
+
|
108
|
+
/* kadm5_policy_ent_t */
|
109
|
+
#define KADM5_PW_MAX_LIFE 0x004000
|
110
|
+
#define KADM5_PW_MIN_LIFE 0x008000
|
111
|
+
#define KADM5_PW_MIN_LENGTH 0x010000
|
112
|
+
#define KADM5_PW_MIN_CLASSES 0x020000
|
113
|
+
#define KADM5_PW_HISTORY_NUM 0x040000
|
114
|
+
#define KADM5_REF_COUNT 0x080000
|
115
|
+
|
116
|
+
/* kadm5_config_params */
|
117
|
+
#define KADM5_CONFIG_REALM 0x000001
|
118
|
+
#define KADM5_CONFIG_DBNAME 0x000002
|
119
|
+
#define KADM5_CONFIG_MKEY_NAME 0x000004
|
120
|
+
#define KADM5_CONFIG_MAX_LIFE 0x000008
|
121
|
+
#define KADM5_CONFIG_MAX_RLIFE 0x000010
|
122
|
+
#define KADM5_CONFIG_EXPIRATION 0x000020
|
123
|
+
#define KADM5_CONFIG_FLAGS 0x000040
|
124
|
+
#define KADM5_CONFIG_ADMIN_KEYTAB 0x000080
|
125
|
+
#define KADM5_CONFIG_STASH_FILE 0x000100
|
126
|
+
#define KADM5_CONFIG_ENCTYPE 0x000200
|
127
|
+
#define KADM5_CONFIG_ADBNAME 0x000400
|
128
|
+
#define KADM5_CONFIG_ADB_LOCKFILE 0x000800
|
129
|
+
#define KADM5_CONFIG_PROFILE 0x001000
|
130
|
+
#define KADM5_CONFIG_ACL_FILE 0x002000
|
131
|
+
#define KADM5_CONFIG_KADMIND_PORT 0x004000
|
132
|
+
#define KADM5_CONFIG_ENCTYPES 0x008000
|
133
|
+
#define KADM5_CONFIG_ADMIN_SERVER 0x010000
|
134
|
+
#define KADM5_CONFIG_DICT_FILE 0x020000
|
135
|
+
#define KADM5_CONFIG_MKEY_FROM_KBD 0x040000
|
136
|
+
#define KADM5_CONFIG_KPASSWD_PORT 0x080000
|
137
|
+
|
138
|
+
/*
|
139
|
+
* permission bits
|
140
|
+
*/
|
141
|
+
#define KADM5_PRIV_GET 0x01
|
142
|
+
#define KADM5_PRIV_ADD 0x02
|
143
|
+
#define KADM5_PRIV_MODIFY 0x04
|
144
|
+
#define KADM5_PRIV_DELETE 0x08
|
145
|
+
|
146
|
+
/*
|
147
|
+
* API versioning constants
|
148
|
+
*/
|
149
|
+
|
150
|
+
#define KADM5_MASK_BITS 0xffffff00
|
151
|
+
|
152
|
+
#define KADM5_STRUCT_VERSION_MASK 0x12345600
|
153
|
+
#define KADM5_STRUCT_VERSION_1 (KADM5_STRUCT_VERSION_MASK|0x01)
|
154
|
+
#define KADM5_STRUCT_VERSION KADM5_STRUCT_VERSION_1
|
155
|
+
|
156
|
+
#define KADM5_API_VERSION_MASK 0x12345700
|
157
|
+
#define KADM5_API_VERSION_1 (KADM5_API_VERSION_MASK|0x01)
|
158
|
+
#define KADM5_API_VERSION_2 (KADM5_API_VERSION_MASK|0x02)
|
159
|
+
|
160
|
+
typedef struct _kadm5_principal_ent_t_v2 {
|
161
|
+
krb5_principal principal;
|
162
|
+
krb5_timestamp princ_expire_time;
|
163
|
+
krb5_timestamp last_pwd_change;
|
164
|
+
krb5_timestamp pw_expiration;
|
165
|
+
krb5_deltat max_life;
|
166
|
+
krb5_principal mod_name;
|
167
|
+
krb5_timestamp mod_date;
|
168
|
+
krb5_flags attributes;
|
169
|
+
krb5_kvno kvno;
|
170
|
+
krb5_kvno mkvno;
|
171
|
+
char *policy;
|
172
|
+
long aux_attributes;
|
173
|
+
|
174
|
+
/* version 2 fields */
|
175
|
+
krb5_deltat max_renewable_life;
|
176
|
+
krb5_timestamp last_success;
|
177
|
+
krb5_timestamp last_failed;
|
178
|
+
krb5_kvno fail_auth_count;
|
179
|
+
krb5_int16 n_key_data;
|
180
|
+
krb5_int16 n_tl_data;
|
181
|
+
krb5_tl_data *tl_data;
|
182
|
+
krb5_key_data *key_data;
|
183
|
+
} kadm5_principal_ent_rec_v2, *kadm5_principal_ent_t_v2;
|
184
|
+
|
185
|
+
typedef struct _kadm5_principal_ent_t_v1 {
|
186
|
+
krb5_principal principal;
|
187
|
+
krb5_timestamp princ_expire_time;
|
188
|
+
krb5_timestamp last_pwd_change;
|
189
|
+
krb5_timestamp pw_expiration;
|
190
|
+
krb5_deltat max_life;
|
191
|
+
krb5_principal mod_name;
|
192
|
+
krb5_timestamp mod_date;
|
193
|
+
krb5_flags attributes;
|
194
|
+
krb5_kvno kvno;
|
195
|
+
krb5_kvno mkvno;
|
196
|
+
char *policy;
|
197
|
+
long aux_attributes;
|
198
|
+
} kadm5_principal_ent_rec_v1, *kadm5_principal_ent_t_v1;
|
199
|
+
|
200
|
+
#if USE_KADM5_API_VERSION == 1
|
201
|
+
typedef struct _kadm5_principal_ent_t_v1
|
202
|
+
kadm5_principal_ent_rec, *kadm5_principal_ent_t;
|
203
|
+
#else
|
204
|
+
typedef struct _kadm5_principal_ent_t_v2
|
205
|
+
kadm5_principal_ent_rec, *kadm5_principal_ent_t;
|
206
|
+
#endif
|
207
|
+
|
208
|
+
typedef struct _kadm5_policy_ent_t {
|
209
|
+
char *policy;
|
210
|
+
long pw_min_life;
|
211
|
+
long pw_max_life;
|
212
|
+
long pw_min_length;
|
213
|
+
long pw_min_classes;
|
214
|
+
long pw_history_num;
|
215
|
+
long policy_refcnt;
|
216
|
+
} kadm5_policy_ent_rec, *kadm5_policy_ent_t;
|
217
|
+
|
218
|
+
typedef struct __krb5_key_salt_tuple {
|
219
|
+
krb5_enctype ks_enctype;
|
220
|
+
krb5_int32 ks_salttype;
|
221
|
+
} krb5_key_salt_tuple;
|
222
|
+
|
223
|
+
/*
|
224
|
+
* Data structure returned by kadm5_get_config_params()
|
225
|
+
*/
|
226
|
+
typedef struct _kadm5_config_params {
|
227
|
+
long mask;
|
228
|
+
char *realm;
|
229
|
+
char *profile;
|
230
|
+
int kadmind_port;
|
231
|
+
int kpasswd_port;
|
232
|
+
|
233
|
+
char *admin_server;
|
234
|
+
|
235
|
+
char *dbname;
|
236
|
+
char *admin_dbname;
|
237
|
+
char *admin_lockfile;
|
238
|
+
char *admin_keytab;
|
239
|
+
char *acl_file;
|
240
|
+
char *dict_file;
|
241
|
+
|
242
|
+
int mkey_from_kbd;
|
243
|
+
char *stash_file;
|
244
|
+
char *mkey_name;
|
245
|
+
krb5_enctype enctype;
|
246
|
+
krb5_deltat max_life;
|
247
|
+
krb5_deltat max_rlife;
|
248
|
+
krb5_timestamp expiration;
|
249
|
+
krb5_flags flags;
|
250
|
+
krb5_key_salt_tuple *keysalts;
|
251
|
+
krb5_int32 num_keysalts;
|
252
|
+
} kadm5_config_params;
|
253
|
+
|
254
|
+
/* Salt types */
|
255
|
+
#define KRB5_KDB_SALTTYPE_NORMAL 0
|
256
|
+
#define KRB5_KDB_SALTTYPE_V4 1
|
257
|
+
#define KRB5_KDB_SALTTYPE_NOREALM 2
|
258
|
+
#define KRB5_KDB_SALTTYPE_ONLYREALM 3
|
259
|
+
#define KRB5_KDB_SALTTYPE_SPECIAL 4
|
260
|
+
#define KRB5_KDB_SALTTYPE_AFS3 5
|
261
|
+
|
262
|
+
/* Database attributes */
|
263
|
+
#define KRB5_KDB_DISALLOW_POSTDATED 0x00000001
|
264
|
+
#define KRB5_KDB_DISALLOW_FORWARDABLE 0x00000002
|
265
|
+
#define KRB5_KDB_DISALLOW_TGT_BASED 0x00000004
|
266
|
+
#define KRB5_KDB_DISALLOW_RENEWABLE 0x00000008
|
267
|
+
#define KRB5_KDB_DISALLOW_PROXIABLE 0x00000010
|
268
|
+
#define KRB5_KDB_DISALLOW_DUP_SKEY 0x00000020
|
269
|
+
#define KRB5_KDB_DISALLOW_ALL_TIX 0x00000040
|
270
|
+
#define KRB5_KDB_REQUIRES_PRE_AUTH 0x00000080
|
271
|
+
#define KRB5_KDB_REQUIRES_HW_AUTH 0x00000100
|
272
|
+
#define KRB5_KDB_REQUIRES_PWCHANGE 0x00000200
|
273
|
+
#define KRB5_KDB_DISALLOW_SVR 0x00001000
|
274
|
+
#define KRB5_KDB_PWCHANGE_SERVICE 0x00002000
|
275
|
+
#define KRB5_KDB_SUPPORT_DESMD5 0x00004000
|
276
|
+
#define KRB5_KDB_NEW_PRINC 0x00008000
|
277
|
+
|
278
|
+
/* Error table values */
|
279
|
+
#define KADM5_FAILURE (43787520L)
|
280
|
+
#define KADM5_AUTH_GET (43787521L)
|
281
|
+
#define KADM5_AUTH_ADD (43787522L)
|
282
|
+
#define KADM5_AUTH_MODIFY (43787523L)
|
283
|
+
#define KADM5_AUTH_DELETE (43787524L)
|
284
|
+
#define KADM5_AUTH_INSUFFICIENT (43787525L)
|
285
|
+
#define KADM5_BAD_DB (43787526L)
|
286
|
+
#define KADM5_DUP (43787527L)
|
287
|
+
#define KADM5_RPC_ERROR (43787528L)
|
288
|
+
#define KADM5_NO_SRV (43787529L)
|
289
|
+
#define KADM5_BAD_HIST_KEY (43787530L)
|
290
|
+
#define KADM5_NOT_INIT (43787531L)
|
291
|
+
#define KADM5_UNK_PRINC (43787532L)
|
292
|
+
#define KADM5_UNK_POLICY (43787533L)
|
293
|
+
#define KADM5_BAD_MASK (43787534L)
|
294
|
+
#define KADM5_BAD_CLASS (43787535L)
|
295
|
+
#define KADM5_BAD_LENGTH (43787536L)
|
296
|
+
#define KADM5_BAD_POLICY (43787537L)
|
297
|
+
#define KADM5_BAD_PRINCIPAL (43787538L)
|
298
|
+
#define KADM5_BAD_AUX_ATTR (43787539L)
|
299
|
+
#define KADM5_BAD_HISTORY (43787540L)
|
300
|
+
#define KADM5_BAD_MIN_PASS_LIFE (43787541L)
|
301
|
+
#define KADM5_PASS_Q_TOOSHORT (43787542L)
|
302
|
+
#define KADM5_PASS_Q_CLASS (43787543L)
|
303
|
+
#define KADM5_PASS_Q_DICT (43787544L)
|
304
|
+
#define KADM5_PASS_REUSE (43787545L)
|
305
|
+
#define KADM5_PASS_TOOSOON (43787546L)
|
306
|
+
#define KADM5_POLICY_REF (43787547L)
|
307
|
+
#define KADM5_INIT (43787548L)
|
308
|
+
#define KADM5_BAD_PASSWORD (43787549L)
|
309
|
+
#define KADM5_PROTECT_PRINCIPAL (43787550L)
|
310
|
+
#define KADM5_BAD_SERVER_HANDLE (43787551L)
|
311
|
+
#define KADM5_BAD_STRUCT_VERSION (43787552L)
|
312
|
+
#define KADM5_OLD_STRUCT_VERSION (43787553L)
|
313
|
+
#define KADM5_NEW_STRUCT_VERSION (43787554L)
|
314
|
+
#define KADM5_BAD_API_VERSION (43787555L)
|
315
|
+
#define KADM5_OLD_LIB_API_VERSION (43787556L)
|
316
|
+
#define KADM5_OLD_SERVER_API_VERSION (43787557L)
|
317
|
+
#define KADM5_NEW_LIB_API_VERSION (43787558L)
|
318
|
+
#define KADM5_NEW_SERVER_API_VERSION (43787559L)
|
319
|
+
#define KADM5_SECURE_PRINC_MISSING (43787560L)
|
320
|
+
#define KADM5_NO_RENAME_SALT (43787561L)
|
321
|
+
#define KADM5_BAD_CLIENT_PARAMS (43787562L)
|
322
|
+
#define KADM5_BAD_SERVER_PARAMS (43787563L)
|
323
|
+
#define KADM5_AUTH_LIST (43787564L)
|
324
|
+
#define KADM5_AUTH_CHANGEPW (43787565L)
|
325
|
+
#define KADM5_GSS_ERROR (43787566L)
|
326
|
+
#define KADM5_BAD_TL_TYPE (43787567L)
|
327
|
+
#define KADM5_MISSING_CONF_PARAMS (43787568L)
|
328
|
+
#define KADM5_BAD_SERVER_NAME (43787569L)
|
329
|
+
#define KADM5_AUTH_SETKEY (43787570L)
|
330
|
+
#define KADM5_SETKEY_DUP_ENCTYPES (43787571L)
|
331
|
+
#define KADM5_SETV4KEY_INVAL_ENCTYPE (43787572L)
|
332
|
+
#define KADM5_SETKEY3_ETYPE_MISMATCH (43787573L)
|
333
|
+
|
334
|
+
|
335
|
+
|
336
|
+
/*
|
337
|
+
* functions
|
338
|
+
*/
|
339
|
+
|
340
|
+
#if USE_KADM5_API_VERSION > 1
|
341
|
+
krb5_error_code kadm5_get_config_params(krb5_context context,
|
342
|
+
char *kdcprofile, char *kdcenv,
|
343
|
+
kadm5_config_params *params_in,
|
344
|
+
kadm5_config_params *params_out);
|
345
|
+
|
346
|
+
krb5_error_code kadm5_free_config_params(krb5_context context,
|
347
|
+
kadm5_config_params *params);
|
348
|
+
|
349
|
+
krb5_error_code kadm5_free_realm_params(krb5_context kcontext,
|
350
|
+
kadm5_config_params *params);
|
351
|
+
|
352
|
+
krb5_error_code kadm5_get_admin_service_name(krb5_context, char *,
|
353
|
+
char *, size_t);
|
354
|
+
#endif
|
355
|
+
|
356
|
+
kadm5_ret_t kadm5_init(char *client_name, char *pass,
|
357
|
+
char *service_name,
|
358
|
+
#if USE_KADM5_API_VERSION == 1
|
359
|
+
char *realm,
|
360
|
+
#else
|
361
|
+
kadm5_config_params *params,
|
362
|
+
#endif
|
363
|
+
krb5_ui_4 struct_version,
|
364
|
+
krb5_ui_4 api_version,
|
365
|
+
void **server_handle);
|
366
|
+
kadm5_ret_t kadm5_init_with_password(char *client_name,
|
367
|
+
char *pass,
|
368
|
+
char *service_name,
|
369
|
+
#if USE_KADM5_API_VERSION == 1
|
370
|
+
char *realm,
|
371
|
+
#else
|
372
|
+
kadm5_config_params *params,
|
373
|
+
#endif
|
374
|
+
krb5_ui_4 struct_version,
|
375
|
+
krb5_ui_4 api_version,
|
376
|
+
void **server_handle);
|
377
|
+
kadm5_ret_t kadm5_init_with_skey(char *client_name,
|
378
|
+
char *keytab,
|
379
|
+
char *service_name,
|
380
|
+
#if USE_KADM5_API_VERSION == 1
|
381
|
+
char *realm,
|
382
|
+
#else
|
383
|
+
kadm5_config_params *params,
|
384
|
+
#endif
|
385
|
+
krb5_ui_4 struct_version,
|
386
|
+
krb5_ui_4 api_version,
|
387
|
+
void **server_handle);
|
388
|
+
#if USE_KADM5_API_VERSION > 1
|
389
|
+
kadm5_ret_t kadm5_init_with_creds(char *client_name,
|
390
|
+
krb5_ccache cc,
|
391
|
+
char *service_name,
|
392
|
+
kadm5_config_params *params,
|
393
|
+
krb5_ui_4 struct_version,
|
394
|
+
krb5_ui_4 api_version,
|
395
|
+
void **server_handle);
|
396
|
+
#endif
|
397
|
+
kadm5_ret_t kadm5_lock(void *server_handle);
|
398
|
+
kadm5_ret_t kadm5_unlock(void *server_handle);
|
399
|
+
kadm5_ret_t kadm5_flush(void *server_handle);
|
400
|
+
kadm5_ret_t kadm5_destroy(void *server_handle);
|
401
|
+
kadm5_ret_t kadm5_create_principal(void *server_handle,
|
402
|
+
kadm5_principal_ent_t ent,
|
403
|
+
long mask, char *pass);
|
404
|
+
kadm5_ret_t kadm5_create_principal_3(void *server_handle,
|
405
|
+
kadm5_principal_ent_t ent,
|
406
|
+
long mask,
|
407
|
+
int n_ks_tuple,
|
408
|
+
krb5_key_salt_tuple *ks_tuple,
|
409
|
+
char *pass);
|
410
|
+
kadm5_ret_t kadm5_delete_principal(void *server_handle,
|
411
|
+
krb5_principal principal);
|
412
|
+
kadm5_ret_t kadm5_modify_principal(void *server_handle,
|
413
|
+
kadm5_principal_ent_t ent,
|
414
|
+
long mask);
|
415
|
+
kadm5_ret_t kadm5_rename_principal(void *server_handle,
|
416
|
+
krb5_principal,krb5_principal);
|
417
|
+
#if USE_KADM5_API_VERSION == 1
|
418
|
+
kadm5_ret_t kadm5_get_principal(void *server_handle,
|
419
|
+
krb5_principal principal,
|
420
|
+
kadm5_principal_ent_t *ent);
|
421
|
+
#else
|
422
|
+
kadm5_ret_t kadm5_get_principal(void *server_handle,
|
423
|
+
krb5_principal principal,
|
424
|
+
kadm5_principal_ent_t ent,
|
425
|
+
long mask);
|
426
|
+
#endif
|
427
|
+
kadm5_ret_t kadm5_chpass_principal(void *server_handle,
|
428
|
+
krb5_principal principal,
|
429
|
+
char *pass);
|
430
|
+
kadm5_ret_t kadm5_chpass_principal_3(void *server_handle,
|
431
|
+
krb5_principal principal,
|
432
|
+
krb5_boolean keepold,
|
433
|
+
int n_ks_tuple,
|
434
|
+
krb5_key_salt_tuple *ks_tuple,
|
435
|
+
char *pass);
|
436
|
+
#if USE_KADM5_API_VERSION == 1
|
437
|
+
kadm5_ret_t kadm5_randkey_principal(void *server_handle,
|
438
|
+
krb5_principal principal,
|
439
|
+
krb5_keyblock **keyblock);
|
440
|
+
#else
|
441
|
+
kadm5_ret_t kadm5_randkey_principal(void *server_handle,
|
442
|
+
krb5_principal principal,
|
443
|
+
krb5_keyblock **keyblocks,
|
444
|
+
int *n_keys);
|
445
|
+
kadm5_ret_t kadm5_randkey_principal_3(void *server_handle,
|
446
|
+
krb5_principal principal,
|
447
|
+
krb5_boolean keepold,
|
448
|
+
int n_ks_tuple,
|
449
|
+
krb5_key_salt_tuple *ks_tuple,
|
450
|
+
krb5_keyblock **keyblocks,
|
451
|
+
int *n_keys);
|
452
|
+
#endif
|
453
|
+
kadm5_ret_t kadm5_setv4key_principal(void *server_handle,
|
454
|
+
krb5_principal principal,
|
455
|
+
krb5_keyblock *keyblock);
|
456
|
+
|
457
|
+
kadm5_ret_t kadm5_setkey_principal(void *server_handle,
|
458
|
+
krb5_principal principal,
|
459
|
+
krb5_keyblock *keyblocks,
|
460
|
+
int n_keys);
|
461
|
+
|
462
|
+
kadm5_ret_t kadm5_setkey_principal_3(void *server_handle,
|
463
|
+
krb5_principal principal,
|
464
|
+
krb5_boolean keepold,
|
465
|
+
int n_ks_tuple,
|
466
|
+
krb5_key_salt_tuple *ks_tuple,
|
467
|
+
krb5_keyblock *keyblocks,
|
468
|
+
int n_keys);
|
469
|
+
|
470
|
+
kadm5_ret_t kadm5_create_policy(void *server_handle,
|
471
|
+
kadm5_policy_ent_t ent,
|
472
|
+
long mask);
|
473
|
+
|
474
|
+
kadm5_ret_t kadm5_delete_policy(void *server_handle,
|
475
|
+
kadm5_policy_t policy);
|
476
|
+
kadm5_ret_t kadm5_modify_policy(void *server_handle,
|
477
|
+
kadm5_policy_ent_t ent,
|
478
|
+
long mask);
|
479
|
+
|
480
|
+
#if USE_KADM5_API_VERSION == 1
|
481
|
+
kadm5_ret_t kadm5_get_policy(void *server_handle,
|
482
|
+
kadm5_policy_t policy,
|
483
|
+
kadm5_policy_ent_t *ent);
|
484
|
+
#else
|
485
|
+
kadm5_ret_t kadm5_get_policy(void *server_handle,
|
486
|
+
kadm5_policy_t policy,
|
487
|
+
kadm5_policy_ent_t ent);
|
488
|
+
#endif
|
489
|
+
kadm5_ret_t kadm5_get_privs(void *server_handle,
|
490
|
+
long *privs);
|
491
|
+
|
492
|
+
kadm5_ret_t kadm5_chpass_principal_util(void *server_handle,
|
493
|
+
krb5_principal princ,
|
494
|
+
char *new_pw,
|
495
|
+
char **ret_pw,
|
496
|
+
char *msg_ret,
|
497
|
+
unsigned int msg_len);
|
498
|
+
|
499
|
+
kadm5_ret_t kadm5_free_principal_ent(void *server_handle,
|
500
|
+
kadm5_principal_ent_t
|
501
|
+
ent);
|
502
|
+
kadm5_ret_t kadm5_free_policy_ent(void *server_handle,
|
503
|
+
kadm5_policy_ent_t ent);
|
504
|
+
|
505
|
+
kadm5_ret_t kadm5_get_principals(void *server_handle,
|
506
|
+
char *exp, char ***princs,
|
507
|
+
int *count);
|
508
|
+
|
509
|
+
kadm5_ret_t kadm5_get_policies(void *server_handle,
|
510
|
+
char *exp, char ***pols,
|
511
|
+
int *count);
|
512
|
+
|
513
|
+
|
514
|
+
kadm5_ret_t kadm5_free_name_list(void *server_handle, char **names,
|
515
|
+
int count);
|
516
|
+
|
517
|
+
|
data/ext/extconf.rb
ADDED
@@ -0,0 +1,12 @@
|
|
1
|
+
|
2
|
+
require 'mkmf'
|
3
|
+
extension_name = 'kerberos'
|
4
|
+
dir_config(extension_name)
|
5
|
+
have_header("krb5.h")
|
6
|
+
have_header("admin.h")
|
7
|
+
have_header("ruby_kerberos.h")
|
8
|
+
have_library("c", "main")
|
9
|
+
have_library("krb5","krb5_init_context")
|
10
|
+
have_library("kadm5clnt","kadm5_init_with_password")
|
11
|
+
create_makefile('ruby_kerberos')
|
12
|
+
|