]> CyberLeo.Net >> Repos - FreeBSD/releng/10.0.git/blob - crypto/heimdal/lib/kadm5/common_glue.c
- Copy stable/10 (r259064) to releng/10.0 as part of the
[FreeBSD/releng/10.0.git] / crypto / heimdal / lib / kadm5 / common_glue.c
1 /*
2  * Copyright (c) 1997 - 2000 Kungliga Tekniska Högskolan
3  * (Royal Institute of Technology, Stockholm, Sweden).
4  * All rights reserved.
5  *
6  * Redistribution and use in source and binary forms, with or without
7  * modification, are permitted provided that the following conditions
8  * are met:
9  *
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  *
13  * 2. Redistributions in binary form must reproduce the above copyright
14  *    notice, this list of conditions and the following disclaimer in the
15  *    documentation and/or other materials provided with the distribution.
16  *
17  * 3. Neither the name of the Institute nor the names of its contributors
18  *    may be used to endorse or promote products derived from this software
19  *    without specific prior written permission.
20  *
21  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31  * SUCH DAMAGE.
32  */
33
34 #include "kadm5_locl.h"
35
36 RCSID("$Id$");
37
38 #define __CALL(F, P) (*((kadm5_common_context*)server_handle)->funcs.F)P;
39
40 kadm5_ret_t
41 kadm5_chpass_principal(void *server_handle,
42                        krb5_principal princ,
43                        const char *password)
44 {
45     return __CALL(chpass_principal, (server_handle, princ, password));
46 }
47
48 kadm5_ret_t
49 kadm5_chpass_principal_with_key(void *server_handle,
50                                 krb5_principal princ,
51                                 int n_key_data,
52                                 krb5_key_data *key_data)
53 {
54     return __CALL(chpass_principal_with_key,
55                   (server_handle, princ, n_key_data, key_data));
56 }
57
58 kadm5_ret_t
59 kadm5_create_principal(void *server_handle,
60                        kadm5_principal_ent_t princ,
61                        uint32_t mask,
62                        const char *password)
63 {
64     return __CALL(create_principal, (server_handle, princ, mask, password));
65 }
66
67 kadm5_ret_t
68 kadm5_delete_principal(void *server_handle,
69                        krb5_principal princ)
70 {
71     return __CALL(delete_principal, (server_handle, princ));
72 }
73
74 kadm5_ret_t
75 kadm5_destroy (void *server_handle)
76 {
77     return __CALL(destroy, (server_handle));
78 }
79
80 kadm5_ret_t
81 kadm5_flush (void *server_handle)
82 {
83     return __CALL(flush, (server_handle));
84 }
85
86 kadm5_ret_t
87 kadm5_get_principal(void *server_handle,
88                     krb5_principal princ,
89                     kadm5_principal_ent_t out,
90                     uint32_t mask)
91 {
92     return __CALL(get_principal, (server_handle, princ, out, mask));
93 }
94
95 kadm5_ret_t
96 kadm5_modify_principal(void *server_handle,
97                        kadm5_principal_ent_t princ,
98                        uint32_t mask)
99 {
100     return __CALL(modify_principal, (server_handle, princ, mask));
101 }
102
103 kadm5_ret_t
104 kadm5_randkey_principal(void *server_handle,
105                         krb5_principal princ,
106                         krb5_keyblock **new_keys,
107                         int *n_keys)
108 {
109     return __CALL(randkey_principal, (server_handle, princ, new_keys, n_keys));
110 }
111
112 kadm5_ret_t
113 kadm5_rename_principal(void *server_handle,
114                        krb5_principal source,
115                        krb5_principal target)
116 {
117     return __CALL(rename_principal, (server_handle, source, target));
118 }
119
120 kadm5_ret_t
121 kadm5_get_principals(void *server_handle,
122                      const char *expression,
123                      char ***princs,
124                      int *count)
125 {
126     return __CALL(get_principals, (server_handle, expression, princs, count));
127 }
128
129 kadm5_ret_t
130 kadm5_get_privs(void *server_handle,
131                 uint32_t *privs)
132 {
133     return __CALL(get_privs, (server_handle, privs));
134 }