r19598: Ahead of a merge to current lorikeet-heimdal:
[Samba.git] / source / libnet / libnet_samdump_keytab.c
blobb61469ea002349ae56bb7bc3d6e21f41557deb3e
1 /*
2 Unix SMB/CIFS implementation.
4 Extract kerberos keys from a remote SamSync server
6 Copyright (C) Andrew Bartlett <abartlet@samba.org> 2004-2005
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
20 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
24 #include "includes.h"
25 #include "libnet/libnet.h"
26 #include "system/kerberos.h"
27 #include "auth/credentials/credentials.h"
28 #include "auth/credentials/credentials_krb5.h"
30 static NTSTATUS samdump_keytab_handle_user(TALLOC_CTX *mem_ctx,
31 const char *keytab_name,
32 struct netr_DELTA_ENUM *delta)
34 struct netr_DELTA_USER *user = delta->delta_union.user;
35 const char *username = user->account_name.string;
36 struct cli_credentials *credentials;
37 int ret;
39 if (!user->nt_password_present) {
40 /* We can't do anything here */
41 return NT_STATUS_OK;
44 credentials = cli_credentials_init(mem_ctx);
45 if (!credentials) {
46 return NT_STATUS_NO_MEMORY;
48 cli_credentials_set_conf(credentials);
49 cli_credentials_set_username(credentials, username, CRED_SPECIFIED);
51 /* We really should consult ldap in the main SamSync code, and
52 * pass a value in here */
53 cli_credentials_set_kvno(credentials, 0);
54 cli_credentials_set_nt_hash(credentials, &user->ntpassword, CRED_SPECIFIED);
55 ret = cli_credentials_set_keytab_name(credentials, keytab_name, CRED_SPECIFIED);
56 if (ret) {
57 return NT_STATUS_UNSUCCESSFUL;
60 ret = cli_credentials_update_keytab(credentials);
61 if (ret) {
62 return NT_STATUS_UNSUCCESSFUL;
65 return NT_STATUS_OK;
68 static NTSTATUS libnet_samdump_keytab_fn(TALLOC_CTX *mem_ctx,
69 void *private,
70 enum netr_SamDatabaseID database,
71 struct netr_DELTA_ENUM *delta,
72 char **error_string)
74 NTSTATUS nt_status = NT_STATUS_OK;
75 const char *keytab_name = private;
77 *error_string = NULL;
78 switch (delta->delta_type) {
79 case NETR_DELTA_USER:
81 /* not interested in builtin users */
82 if (database == SAM_DATABASE_DOMAIN) {
83 nt_status = samdump_keytab_handle_user(mem_ctx,
84 keytab_name,
85 delta);
86 break;
89 default:
90 /* Can't dump them all right now */
91 break;
93 return nt_status;
96 NTSTATUS libnet_SamDump_keytab(struct libnet_context *ctx, TALLOC_CTX *mem_ctx, struct libnet_SamDump_keytab *r)
98 NTSTATUS nt_status;
99 struct libnet_SamSync r2;
101 r2.out.error_string = NULL;
102 r2.in.binding_string = r->in.binding_string;
103 r2.in.init_fn = NULL;
104 r2.in.delta_fn = libnet_samdump_keytab_fn;
105 r2.in.fn_ctx = discard_const(r->in.keytab_name);
106 r2.in.machine_account = r->in.machine_account;
107 nt_status = libnet_SamSync_netlogon(ctx, mem_ctx, &r2);
108 r->out.error_string = r2.out.error_string;
109 talloc_steal(mem_ctx, r->out.error_string);
111 if (!NT_STATUS_IS_OK(nt_status)) {
112 return nt_status;
115 return nt_status;