HardenedBSD/eBones/kadmind/kadm_server.h
Mark Murray d79d4a7ced Major cleanup of eBones code:
- Get all functions prototyped or at least defined before use.
- Make code compile (Mostly) clean with -Wall set
- Start to reduce the degree to which DES aka libdes is built in.
- get all functions to the same uniform standard of definition:
int
foo(a, b)
int a;
int *b;
{
   :
}
- fix numerous bugs exposed by above processes.

Note - this replaces the previous work which used an unpopular function
 definition style.
1995-09-07 21:39:00 +00:00

71 lines
2.2 KiB
C

/*
* $Source: /usr/cvs/src/eBones/kadmind/kadm_server.h,v $
* $Author: mark $
* Header: /afs/athena.mit.edu/astaff/project/kerberos/src/kadmin/RCS/kadm_server.h,v 4.1 89/12/21 17:46:51 jtkohl Exp
*
* Copyright 1988 by the Massachusetts Institute of Technology.
*
* For copying and distribution information, please see the file
* Copyright.MIT.
*
* Definitions for Kerberos administration server & client
*/
#ifndef KADM_SERVER_DEFS
#define KADM_SERVER_DEFS
/*
* kadm_server.h
* Header file for the fourth attempt at an admin server
* Doug Church, December 28, 1989, MIT Project Athena
* ps. Yes that means this code belongs to athena etc...
* as part of our ongoing attempt to copyright all greek names
*/
#include <sys/types.h>
#include <krb.h>
#include <des.h>
typedef struct {
struct sockaddr_in admin_addr;
struct sockaddr_in recv_addr;
int recv_addr_len;
int admin_fd; /* our link to clients */
char sname[ANAME_SZ];
char sinst[INST_SZ];
char krbrlm[REALM_SZ];
C_Block master_key;
C_Block session_key;
Key_schedule master_key_schedule;
long master_key_version;
} Kadm_Server;
/* the default syslog file */
#define KADM_SYSLOG "/var/log/kadmind.syslog"
#define DEFAULT_ACL_DIR "/etc/kerberosIV"
#define ADD_ACL_FILE "/admin_acl.add"
#define GET_ACL_FILE "/admin_acl.get"
#define MOD_ACL_FILE "/admin_acl.mod"
int kadm_ser_in(unsigned char **dat, int *dat_len);
int kadm_ser_init(int inter, char realm[]);
int kadm_ser_cpw(u_char *dat, int len, AUTH_DAT *ad, u_char **datout,
int *outlen);
int kadm_ser_add(u_char *dat, int len, AUTH_DAT *ad, u_char **datout,
int *outlen);
int kadm_ser_mod(u_char *dat, int len, AUTH_DAT *ad, u_char **datout,
int *outlen);
int kadm_ser_get(u_char *dat, int len, AUTH_DAT *ad, u_char **datout,
int *outlen);
int kadm_change (char *rname, char *rinstance, char *rrealm,
des_cblock newpw);
int kadm_add_entry(char *rname, char *rinstance, char *rrealm,
Kadm_vals *valsin, Kadm_vals *valsout);
int kadm_mod_entry(char *rname, char *rinstance, char *rrealm,
Kadm_vals *valsin1, Kadm_vals *valsin2, Kadm_vals *valsout);
int kadm_get_entry(char *rname, char *rinstance, char *rrealm,
Kadm_vals *valsin, u_char *flags, Kadm_vals *valsout);
#endif KADM_SERVER_DEFS