1 #define LDAP_AUTH_OTHERKIND 0x86L
2 #define LDAP_AUTH_NEGOTIATE (LDAP_AUTH_OTHERKIND | 0x0400)
5 THIS CODE AND INFORMATION IS PROVIDED "AS IS" WITHOUT WARRANTY OF
6 ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED
7 TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND/OR FITNESS FOR A
10 Copyright (C) 1999 Microsoft Corporation. All rights reserved.
18 Set a user's password using the
19 Kerberos Change Password Protocol (I-D) variant for Windows 2000
23 * lib/krb5/os/changepw.c
25 * Copyright 1990 by the Massachusetts Institute of Technology.
26 * All Rights Reserved.
28 * Export of this software from the United States of America may
29 * require a specific license from the United States Government.
30 * It is the responsibility of any person or organization contemplating
31 * export to obtain such a license before exporting.
33 * WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
34 * distribute this software and its documentation for any purpose and
35 * without fee is hereby granted, provided that the above copyright
36 * notice appear in all copies and that both that copyright notice and
37 * this permission notice appear in supporting documentation, and that
38 * the name of M.I.T. not be used in advertising or publicity pertaining
39 * to distribution of the software without specific, written prior
40 * permission. M.I.T. makes no representations about the suitability of
41 * this software for any purpose. It is provided "as is" without express
42 * or implied warranty.
49 #include "port-sockets.h"
60 #include <sys/socket.h>
62 #include <sys/select.h>
68 #include <sys/timeb.h>
76 #define ULONG unsigned long
78 #ifndef krb5_is_krb_error
79 #define krb5_is_krb_error(dat)\
80 ((dat) && (dat)->length && ((dat)->data[0] == 0x7e ||\
81 (dat)->data[0] == 0x5e))
85 extern krb5_error_code decode_krb5_error
86 (const krb5_data *output, krb5_error **rep);
87 #define sleep(Seconds) Sleep(Seconds * 1000)
88 #define gethostbyname(Server) rgethostbyname(Server)
92 #if defined(_WIN32) && !defined(__CYGWIN32__)
94 #define ECONNABORTED WSAECONNABORTED
97 #define ECONNREFUSED WSAECONNREFUSED
100 #define EHOSTUNREACH WSAEHOSTUNREACH
102 #endif /* _WIN32 && !__CYGWIN32__ */
104 static const char rcsid[] = "$Id$";
106 static int frequency[26][26] =
107 { {4, 20, 28, 52, 2, 11, 28, 4, 32, 4, 6, 62, 23, 167, 2, 14, 0, 83, 76,
108 127, 7, 25, 8, 1, 9, 1}, /* aa - az */
109 {13, 0, 0, 0, 55, 0, 0, 0, 8, 2, 0, 22, 0, 0, 11, 0, 0, 15, 4, 2, 13, 0,
110 0, 0, 15, 0}, /* ba - bz */
111 {32, 0, 7, 1, 69, 0, 0, 33, 17, 0, 10, 9, 1, 0, 50, 3, 0, 10, 0, 28, 11,
112 0, 0, 0, 3, 0}, /* ca - cz */
113 {40, 16, 9, 5, 65, 18, 3, 9, 56, 0, 1, 4, 15, 6, 16, 4, 0, 21, 18, 53,
114 19, 5, 15, 0, 3, 0}, /* da - dz */
115 {84, 20, 55, 125, 51, 40, 19, 16, 50, 1, 4, 55, 54, 146, 35, 37, 6, 191,
116 149, 65, 9, 26, 21, 12, 5, 0}, /* ea - ez */
117 {19, 3, 5, 1, 19, 21, 1, 3, 30, 2, 0, 11, 1, 0, 51, 0, 0, 26, 8, 47, 6,
118 3, 3, 0, 2, 0}, /* fa - fz */
119 {20, 4, 3, 2, 35, 1, 3, 15, 18, 0, 0, 5, 1, 4, 21, 1, 1, 20, 9, 21, 9,
120 0, 5, 0, 1, 0}, /* ga - gz */
121 {101, 1, 3, 0, 270, 5, 1, 6, 57, 0, 0, 0, 3, 2, 44, 1, 0, 3, 10, 18, 6,
122 0, 5, 0, 3, 0}, /* ha - hz */
123 {40, 7, 51, 23, 25, 9, 11, 3, 0, 0, 2, 38, 25, 202, 56, 12, 1, 46, 79,
124 117, 1, 22, 0, 4, 0, 3}, /* ia - iz */
125 {3, 0, 0, 0, 5, 0, 0, 0, 1, 0, 0, 0, 0, 0, 4, 0, 0, 0, 0, 0, 3, 0, 0, 0,
127 {1, 0, 0, 0, 11, 0, 0, 0, 13, 0, 0, 0, 0, 2, 0, 0, 0, 0, 6, 2, 1, 0, 2,
128 0, 1, 0}, /* ka - kz */
129 {44, 2, 5, 12, 62, 7, 5, 2, 42, 1, 1, 53, 2, 2, 25, 1, 1, 2, 16, 23, 9,
130 0, 1, 0, 33, 0}, /* la - lz */
131 {52, 14, 1, 0, 64, 0, 0, 3, 37, 0, 0, 0, 7, 1, 17, 18, 1, 2, 12, 3, 8,
132 0, 1, 0, 2, 0}, /* ma - mz */
133 {42, 10, 47, 122, 63, 19, 106, 12, 30, 1, 6, 6, 9, 7, 54, 7, 1, 7, 44,
134 124, 6, 1, 15, 0, 12, 0}, /* na - nz */
135 {7, 12, 14, 17, 5, 95, 3, 5, 14, 0, 0, 19, 41, 134, 13, 23, 0, 91, 23,
136 42, 55, 16, 28, 0, 4, 1}, /* oa - oz */
137 {19, 1, 0, 0, 37, 0, 0, 4, 8, 0, 0, 15, 1, 0, 27, 9, 0, 33, 14, 7, 6, 0,
138 0, 0, 0, 0}, /* pa - pz */
139 {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 17, 0, 0,
140 0, 0, 0}, /* qa - qz */
141 {83, 8, 16, 23, 169, 4, 8, 8, 77, 1, 10, 5, 26, 16, 60, 4, 0, 24, 37,
142 55, 6, 11, 4, 0, 28, 0}, /* ra - rz */
143 {65, 9, 17, 9, 73, 13, 1, 47, 75, 3, 0, 7, 11, 12, 56, 17, 6, 9, 48,
144 116, 35, 1, 28, 0, 4, 0}, /* sa - sz */
145 {57, 22, 3, 1, 76, 5, 2, 330, 126, 1, 0, 14, 10, 6, 79, 7, 0, 49, 50,
146 56, 21, 2, 27, 0, 24, 0}, /* ta - tz */
147 {11, 5, 9, 6, 9, 1, 6, 0, 9, 0, 1, 19, 5, 31, 1, 15, 0, 47, 39, 31, 0,
148 3, 0, 0, 0, 0}, /* ua - uz */
149 {7, 0, 0, 0, 72, 0, 0, 0, 28, 0, 0, 0, 0, 0, 5, 0, 0, 0, 0, 0, 0, 0, 0,
150 0, 3, 0}, /* va - vz */
151 {36, 1, 1, 0, 38, 0, 0, 33, 36, 0, 0, 4, 1, 8, 15, 0, 0, 0, 4, 2, 0, 0,
152 1, 0, 0, 0}, /* wa - wz */
153 {1, 0, 2, 0, 0, 1, 0, 0, 3, 0, 0, 0, 0, 0, 1, 5, 0, 0, 0, 3, 0, 0, 1, 0,
155 {14, 5, 4, 2, 7, 12, 12, 6, 10, 0, 0, 3, 7, 5, 17, 3, 0, 4, 16, 30, 0,
156 0, 5, 0, 0, 0}, /* ya - yz */
157 {1, 0, 0, 0, 4, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
158 0, 0}}; /* za - zz */
161 * This MUST be equal to the sum of the equivalent rows above.
164 static int row_sums[26] =
165 {796,160,284,401,1276,262,199,539,777,
166 16,39,351,243,751,662,181,17,683,
167 662,968,248,115,180,17,162,5};
170 * Frequencies of starting characters
173 static int start_freq [26] =
174 {1299,425,725,271,375,470,93,223,1009,
175 24,20,355,379,319,823,618,21,317,
176 962,1991,271,104,516,6,16,14};
179 * This MUST be equal to the sum of all elements in the above array.
182 struct sockaddr_in kdc_server;
184 krb5_context context;
186 krb5_auth_context auth_context = NULL;
188 krb5_creds *credsp = NULL;
190 char connected_server[128];
192 static int total_sum = 11646;
194 int get_krb5_error(krb5_error_code rc, char *in, char *out);
195 int ad_connect(LDAP **ldap_handle, char *ldap_domain, char *dn_path,
196 char *Win2kPassword, char *Win2kUser, char *default_server,
197 int connect_to_kdc, char **ServerList, char *ldap_realm,
199 int ad_kdc_connect(char *connectedServer);
200 int ad_server_connect(char *connectedServer, char *domain);
201 void ad_kdc_disconnect();
202 int compare_elements(const void *arg1, const void *arg2);
203 int convert_domain_to_dn(char *domain, char *dnp);
204 int set_password(char *user, char *password, char *domain);
206 int locate_ldap_server(char *domain, char **server_name);
209 void generate_password(char *password);
212 krb5_error_code encode_krb5_setpw
213 PROTOTYPE((const krb5_setpw *rep, krb5_data ** code));
216 krb5_error_code make_setpw_req(krb5_context context, krb5_auth_context auth_context,
217 krb5_data *ap_req, krb5_principal targprinc,
218 char *passwd, krb5_data *packet)
223 krb5_data *encoded_setpw;
224 krb5_replay_data replay;
226 register int count = 2;
228 memset(&setpw, 0, sizeof(krb5_setpw));
229 if (ret = krb5_auth_con_setflags(context, auth_context,
230 KRB5_AUTH_CONTEXT_DO_SEQUENCE))
232 setpw.targprinc = targprinc;
233 setpw.newpasswd.length = strlen(passwd);
234 setpw.newpasswd.data = passwd;
235 if ((ret = encode_krb5_setpw(&setpw, &encoded_setpw)))
237 if (ret = krb5_mk_priv(context, auth_context,
238 encoded_setpw, &cipherpw, &replay))
240 packet->length = 6 + ap_req->length + cipherpw.length;
241 packet->data = (char *) malloc(packet->length);
244 *ptr++ = (packet->length>>8) & 0xff;
245 *ptr++ = packet->length & 0xff;
249 /* ap_req length, big-endian */
250 *ptr++ = (ap_req->length>>8) & 0xff;
251 *ptr++ = ap_req->length & 0xff;
253 memcpy(ptr, ap_req->data, ap_req->length);
254 ptr += ap_req->length;
255 /* krb-priv of password */
256 memcpy(ptr, cipherpw.data, cipherpw.length);
258 /* krb5_free_data_contents(context, &cipherpw);*/
259 krb5_free_data(context, encoded_setpw);
263 krb5_error_code get_setpw_rep(krb5_context context, krb5_auth_context auth_context,
264 krb5_data *packet, int *result_code,
265 krb5_data *result_data)
272 krb5_data cipherresult;
273 krb5_data clearresult;
274 krb5_error *krberror;
275 krb5_replay_data replay;
276 krb5_ap_rep_enc_part *ap_rep_enc;
278 if (packet->length < 4)
279 return(KRB5KRB_AP_ERR_MODIFIED);
281 if (krb5_is_krb_error(packet))
283 ret = decode_krb5_error(packet, &krberror);
286 ret = krberror->error;
287 krb5_free_error(context, krberror);
291 plen = (*ptr++ & 0xff);
292 plen = (plen<<8) | (*ptr++ & 0xff);
293 if (plen != (int)packet->length)
294 return(KRB5KRB_AP_ERR_MODIFIED);
295 vno = (*ptr++ & 0xff);
296 vno = (vno<<8) | (*ptr++ & 0xff);
297 if (vno != KRB5_KPASSWD_VERS_SETPW && vno != KRB5_KPASSWD_VERS_CHANGEPW)
298 return(KRB5KDC_ERR_BAD_PVNO);
299 /* read, check ap-rep length */
300 ap_rep.length = (*ptr++ & 0xff);
301 ap_rep.length = (ap_rep.length<<8) | (*ptr++ & 0xff);
302 if (ptr + ap_rep.length >= packet->data + packet->length)
303 return(KRB5KRB_AP_ERR_MODIFIED);
308 ptr += ap_rep.length;
309 if (ret = krb5_rd_rep(context, auth_context, &ap_rep, &ap_rep_enc))
311 krb5_free_ap_rep_enc_part(context, ap_rep_enc);
312 /* extract and decrypt the result */
313 cipherresult.data = ptr;
314 cipherresult.length = (packet->data + packet->length) - ptr;
315 /* XXX there's no api to do this right. The problem is that
316 if there's a remote subkey, it will be used. This is
317 not what the spec requires */
318 ret = krb5_rd_priv(context, auth_context, &cipherresult, &clearresult,
325 cipherresult.data = ptr;
326 cipherresult.length = (packet->data + packet->length) - ptr;
328 if (ret = krb5_rd_error(context, &cipherresult, &krberror))
331 clearresult = krberror->e_data;
333 if (clearresult.length < 2)
335 ret = KRB5KRB_AP_ERR_MODIFIED;
338 ptr = clearresult.data;
339 *result_code = (*ptr++ & 0xff);
340 *result_code = (*result_code<<8) | (*ptr++ & 0xff);
341 if ((*result_code < KRB5_KPASSWD_SUCCESS) ||
342 (*result_code > KRB5_KPASSWD_ACCESSDENIED))
344 ret = KRB5KRB_AP_ERR_MODIFIED;
347 /* all success replies should be authenticated/encrypted */
348 if ((ap_rep.length == 0) && (*result_code == KRB5_KPASSWD_SUCCESS))
350 ret = KRB5KRB_AP_ERR_MODIFIED;
353 result_data->length = (clearresult.data + clearresult.length) - ptr;
354 if (result_data->length)
356 result_data->data = (char *) malloc(result_data->length);
357 memcpy(result_data->data, ptr, result_data->length);
360 result_data->data = NULL;
364 free(clearresult.data);
366 krb5_free_error(context, krberror);
370 krb5_error_code kdc_set_password(krb5_context context, krb5_ccache ccache,
371 char *newpw, char *user, char *domain,
376 krb5_data result_string;
377 krb5_address local_kaddr;
378 krb5_address remote_kaddr;
381 krb5_error_code code;
382 struct sockaddr local_addr;
383 struct sockaddr remote_addr;
387 int local_result_code;
389 krb5_principal targprinc;
390 struct timeval TimeVal;
393 memset(&local_addr, 0, sizeof(local_addr));
394 memset(&local_kaddr, 0, sizeof(local_kaddr));
395 memset(&result_string, 0, sizeof(result_string));
396 memset(&remote_kaddr, 0, sizeof(remote_kaddr));
397 memset(&chpw_snd, 0, sizeof(krb5_data));
398 memset(&chpw_rcv, 0, sizeof(krb5_data));
399 memset(userrealm, '\0', sizeof(userrealm));
402 chpw_rcv.length = 1500;
403 chpw_rcv.data = (char *) calloc(1, chpw_rcv.length);
405 for (i = 0; i < (int)strlen(domain); i++)
406 userrealm[i] = toupper(domain[i]);
408 sprintf(temp, "%s@%s", user, userrealm);
409 krb5_parse_name(context, temp, &targprinc);
413 memset(&creds, 0, sizeof(creds));
414 memset(&ap_req, 0, sizeof(krb5_data));
415 sprintf(temp, "%s@%s", "kadmin/changepw", userrealm);
416 if (code = krb5_parse_name(context, temp, &creds.server))
418 if (code = krb5_cc_get_principal(context, ccache, &creds.client))
420 if (code = krb5_get_credentials(context, 0, ccache, &creds, &credsp))
422 if (code = krb5_mk_req_extended(context, &auth_context, AP_OPTS_USE_SUBKEY,
423 NULL, credsp, &ap_req))
427 addrlen = sizeof(local_addr);
428 if (getsockname(kdc_socket, &local_addr, &addrlen) < 0)
430 code = KDC_GETSOCKNAME_ERROR;
433 if (((struct sockaddr_in *)&local_addr)->sin_addr.s_addr != 0)
435 local_kaddr.addrtype = ADDRTYPE_INET;
437 sizeof(((struct sockaddr_in *) &local_addr)->sin_addr);
438 local_kaddr.contents =
439 (char *) &(((struct sockaddr_in *) &local_addr)->sin_addr);
443 krb5_address **addrs;
444 krb5_os_localaddr(context, &addrs);
445 local_kaddr.magic = addrs[0]->magic;
446 local_kaddr.addrtype = addrs[0]->addrtype;
447 local_kaddr.length = addrs[0]->length;
448 local_kaddr.contents = calloc(1, addrs[0]->length);
449 memcpy(local_kaddr.contents, addrs[0]->contents, addrs[0]->length);
450 krb5_free_addresses(context, addrs);
453 addrlen = sizeof(remote_addr);
454 if (getpeername(kdc_socket, &remote_addr, &addrlen) < 0)
456 code = KDC_GETPEERNAME_ERROR;
459 remote_kaddr.addrtype = ADDRTYPE_INET;
460 remote_kaddr.length = sizeof(((struct sockaddr_in *) &remote_addr)->sin_addr);
461 remote_kaddr.contents = (char *) &(((struct sockaddr_in *) &remote_addr)->sin_addr);
463 if (code = krb5_auth_con_setaddrs(context, auth_context, &local_kaddr, NULL))
465 if (code = make_setpw_req(context, auth_context, &ap_req,
466 targprinc, newpw, &chpw_snd))
469 for (i = 0; i < 3; i++)
471 if ((cc = sendto(kdc_socket, chpw_snd.data, chpw_snd.length, 0,
473 0)) != (int)chpw_snd.length)
475 code = KDC_SEND_ERROR;
483 FD_SET(kdc_socket, &readfds);
484 nfds = kdc_socket + 1;
485 code = select(nfds, &readfds, NULL, NULL, &TimeVal);
486 if ((code == 0) || (code == SOCKET_ERROR))
488 code = KDC_RECEIVE_TIMEOUT;
493 if ((cc = recvfrom(kdc_socket, chpw_rcv.data, chpw_rcv.length, 0,
496 code = KDC_RECEIVE_TIMEOUT;
500 chpw_rcv.length = cc;
501 if (code = krb5_auth_con_setaddrs(context, auth_context, NULL, &remote_kaddr))
506 local_result_code = 0;
507 code = get_setpw_rep(context, auth_context, &chpw_rcv,
508 &local_result_code, &result_string);
510 if (local_result_code)
512 if (local_result_code == KRB5_KPASSWD_SOFTERROR)
513 local_result_code = KRB5_KPASSWD_SUCCESS;
514 *result_code = local_result_code;
516 if ((code == 0) && (local_result_code == 0))
522 if (chpw_snd.data != NULL)
524 if (chpw_rcv.data != NULL)
526 if (targprinc != NULL)
527 krb5_free_principal(context, targprinc);
531 int set_password(char *user, char *password, char *domain)
534 krb5_error_code retval;
535 char pw[PW_LENGTH+1];
537 memset(pw, '\0', sizeof(pw));
538 if (strlen(password) != 0)
539 strcpy(pw, password);
541 generate_password(pw);
543 retval = kdc_set_password(context, ccache, pw, user, domain, &res_code);
550 void generate_password(char *password)
561 for (line = 22; line; --line)
563 for (word = 7; word; --word)
565 position = myrandom()%total_sum;
566 for(row_position = 0, j = 0; position >= row_position; row_position += start_freq[j], j++)
568 *(pwp = password) = j + 'a' - 1;
569 for (nchars = PW_LENGTH-1; nchars; --nchars)
573 position = myrandom()%row_sums[i];
574 for (row_position = 0, j = 0; position >= row_position; row_position += frequency[i][j], j++)
590 struct _timeb timebuffer;
601 srand(timebuffer.time ^ timebuffer.millitm ^ pid);
603 gettimeofday(&tv, (struct timezone *) NULL);
604 srandom(tv.tv_sec ^ tv.tv_usec ^ pid);
610 int get_krb5_error(krb5_error_code rc, char *in, char *out)
619 krb5Error = ((int)(rc & 255));
620 sprintf(out, "%s: %s(%ld)", in, error_message(rc), krb5Error);
626 case KDC_RECEIVE_TIMEOUT:
629 sprintf(out, "%s: %s(%d)", in, "Receive timeout", rc);
632 case KDC_RECEIVE_ERROR:
635 sprintf(out, "%s: %s(%d)", in, "Receive error", rc);
638 case KRB5_KPASSWD_MALFORMED:
640 sprintf(out, "%s: %s(%d)", in, "malformed password", rc);
643 case KRB5_KPASSWD_HARDERROR:
645 sprintf(out, "%s: %s(%d)", in, "hard error", rc);
648 case KRB5_KPASSWD_AUTHERROR:
651 sprintf(out, "%s: %s(%d)", in, "authentication error", rc);
654 case KRB5_KPASSWD_SOFTERROR:
657 sprintf(out, "%s: %s(%d)", in, "soft error", rc);
660 case KRB5_KPASSWD_ACCESSDENIED:
662 sprintf(out, "%s: %s(%d)", in, "Access denied", rc);
668 sprintf(out, "%s: %s(%d)", in, "Send error", rc);
671 case KDC_GETSOCKNAME_ERROR:
674 sprintf(out, "%s: %s(%d)", in, "Socket error - getsockname", rc);
677 case KDC_GETPEERNAME_ERROR:
680 sprintf(out, "%s: %s(%d)", in, "Socket error - getpeername", rc);
685 sprintf(out, "%s: %s(%d)", in, "unknown error", rc);
693 int ad_connect(LDAP **ldap_handle, char *ldap_domain, char *dn_path,
694 char *Win2kPassword, char *Win2kUser, char *default_server,
695 int connect_to_kdc, char **ServerList, char *ldap_realm,
701 char *server_name[MAX_SERVER_NAMES];
702 static char temp[128];
703 ULONG version = LDAP_VERSION3;
705 int Max_wait_time = 1000;
706 int Max_size_limit = LDAP_NO_LIMIT;
708 if (strlen(ldap_domain) == 0)
711 if (strlen(ldap_port) == 0)
714 convert_domain_to_dn(ldap_domain, dn_path);
715 if (strlen(dn_path) == 0)
719 while (ServerList[Count] != NULL)
722 if ((Count == 0) && (connect_to_kdc))
725 for (i = 0; i < Count; i++)
727 if (ServerList[i] == NULL)
730 if (((*ldap_handle) = ldap_open(ServerList[i], atoi(ldap_port))) != NULL)
732 rc = ldap_set_option((*ldap_handle), LDAP_OPT_PROTOCOL_VERSION,
734 rc = ldap_set_option((*ldap_handle), LDAP_OPT_TIMELIMIT,
735 (void *)&Max_wait_time);
736 rc = ldap_set_option((*ldap_handle), LDAP_OPT_SIZELIMIT,
737 (void *)&Max_size_limit);
738 rc = ldap_set_option((*ldap_handle), LDAP_OPT_REFERRALS,
740 rc = ldap_adgssapi_bind((*ldap_handle), "",
741 GSSSASL_NO_SECURITY_LAYER, ldap_domain,
742 ldap_realm, ServerList[i]);
743 if (rc == LDAP_SUCCESS)
747 if (!ad_server_connect(ServerList[i], ldap_domain))
749 ldap_unbind_s((*ldap_handle));
750 (*ldap_handle) = NULL;
754 if (strlen(default_server) == 0)
755 strcpy(default_server, ServerList[i]);
756 strcpy(connected_server, ServerList[i]);
761 (*ldap_handle) = NULL;
765 if ((*ldap_handle) == NULL)
770 int ad_server_connect(char *connectedServer, char *domain)
778 unsigned short port = KDC_PORT;
782 memset(&ccache, 0, sizeof(ccache));
783 memset(&creds, 0, sizeof(creds));
784 memset(userrealm, '\0', sizeof(userrealm));
787 if (krb5_init_context(&context))
789 if (krb5_cc_default(context, &ccache))
792 for (i = 0; i < (int)strlen(domain); i++)
793 userrealm[i] = toupper(domain[i]);
794 sprintf(temp, "%s@%s", "kadmin/changepw", userrealm);
795 if (krb5_parse_name(context, temp, &creds.server))
797 if (krb5_cc_get_principal(context, ccache, &creds.client))
799 if (krb5_get_credentials(context, 0, ccache, &creds, &credsp))
802 rc = ad_kdc_connect(connectedServer);
808 krb5_cc_close(context, ccache);
809 krb5_free_context(context);
811 krb5_free_cred_contents(context, &creds);
813 krb5_free_creds(context, credsp);
818 int ad_kdc_connect(char *connectedServer)
824 hp = gethostbyname(connectedServer);
827 memset(&kdc_server, 0, sizeof(kdc_server));
828 memcpy(&(kdc_server.sin_addr),hp->h_addr_list[0],hp->h_length);
829 kdc_server.sin_family = hp->h_addrtype;
830 kdc_server.sin_port = htons(KDC_PORT);
832 if ((kdc_socket = socket(AF_INET, SOCK_DGRAM, 0)) == INVALID_SOCKET)
834 if (connect(kdc_socket, (struct sockaddr*)&kdc_server, sizeof(kdc_server)) == SOCKET_ERROR)
842 void ad_kdc_disconnect()
845 if (auth_context != NULL)
847 krb5_auth_con_free(context, auth_context);
848 if (ap_req.data != NULL)
850 krb5_free_cred_contents(context, &creds);
852 krb5_free_creds(context, credsp);
858 krb5_cc_close(context, ccache);
859 krb5_free_context(context);
861 closesocket(kdc_socket);
865 int convert_domain_to_dn(char *domain, char *dnp)
871 memset(dn, '\0', sizeof(dn));
874 for (fp = domain; *fp; fp++)
889 int compare_elements(const void *arg1, const void *arg2)
893 rc = strcmp((char*)arg1, (char*)arg2);