2 Unix SMB/CIFS implementation.
4 Extract kerberos keys from a remote SamSync server
6 Copyright (C) Andrew Bartlett <abartlet@samba.org> 2004-2005
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program. If not, see <http://www.gnu.org/licenses/>.
24 #include "libnet/libnet.h"
25 #include "system/kerberos.h"
26 #include "auth/credentials/credentials.h"
27 #include "auth/credentials/credentials_krb5.h"
28 #include "param/param.h"
29 #include "lib/events/events.h"
31 static NTSTATUS
samdump_keytab_handle_user(TALLOC_CTX
*mem_ctx
,
32 struct tevent_context
*event_ctx
,
33 struct loadparm_context
*lp_ctx
,
34 const char *keytab_name
,
35 struct netr_DELTA_ENUM
*delta
)
37 struct netr_DELTA_USER
*user
= delta
->delta_union
.user
;
38 const char *username
= user
->account_name
.string
;
39 struct cli_credentials
*credentials
;
42 if (!user
->nt_password_present
) {
43 /* We can't do anything here */
47 credentials
= cli_credentials_init(mem_ctx
);
49 return NT_STATUS_NO_MEMORY
;
51 cli_credentials_set_conf(credentials
, lp_ctx
);
52 cli_credentials_set_username(credentials
, username
, CRED_SPECIFIED
);
54 /* We really should consult ldap in the main SamSync code, and
55 * pass a value in here */
56 cli_credentials_set_kvno(credentials
, 0);
57 cli_credentials_set_nt_hash(credentials
, &user
->ntpassword
, CRED_SPECIFIED
);
58 ret
= cli_credentials_set_keytab_name(credentials
, event_ctx
, lp_ctx
, keytab_name
, CRED_SPECIFIED
);
60 return NT_STATUS_UNSUCCESSFUL
;
63 ret
= cli_credentials_update_keytab(credentials
, event_ctx
, lp_ctx
);
65 return NT_STATUS_UNSUCCESSFUL
;
71 struct libnet_samdump_keytab_data
{
72 const char *keytab_name
;
73 struct tevent_context
*ev_ctx
;
74 struct loadparm_context
*lp_ctx
;
77 static NTSTATUS
libnet_samdump_keytab_fn(TALLOC_CTX
*mem_ctx
,
79 enum netr_SamDatabaseID database
,
80 struct netr_DELTA_ENUM
*delta
,
83 NTSTATUS nt_status
= NT_STATUS_OK
;
84 struct libnet_samdump_keytab_data
*data
= private_data
;
86 switch (delta
->delta_type
) {
89 /* not interested in builtin users */
90 if (database
== SAM_DATABASE_DOMAIN
) {
91 nt_status
= samdump_keytab_handle_user(mem_ctx
,
100 /* Can't dump them all right now */
106 NTSTATUS
libnet_SamDump_keytab(struct libnet_context
*ctx
, TALLOC_CTX
*mem_ctx
, struct libnet_SamDump_keytab
*r
)
109 struct libnet_samdump_keytab_data data
;
110 struct libnet_SamSync r2
;
112 data
.keytab_name
= r
->in
.keytab_name
;
113 data
.ev_ctx
= ctx
->event_ctx
;
114 data
.lp_ctx
= ctx
->lp_ctx
;
116 r2
.out
.error_string
= NULL
;
117 r2
.in
.binding_string
= r
->in
.binding_string
;
118 r2
.in
.init_fn
= NULL
;
119 r2
.in
.delta_fn
= libnet_samdump_keytab_fn
;
120 r2
.in
.fn_ctx
= &data
;
121 r2
.in
.machine_account
= r
->in
.machine_account
;
122 nt_status
= libnet_SamSync_netlogon(ctx
, mem_ctx
, &r2
);
123 r
->out
.error_string
= r2
.out
.error_string
;
124 talloc_steal(mem_ctx
, r
->out
.error_string
);
126 if (!NT_STATUS_IS_OK(nt_status
)) {