selftest/flapping: more samba4.rpc.samr.large-dc.two subtests are flakey
[Samba/bb.git] / source3 / passdb / secrets_lsa.c
bloba40942cf7be3a72c6a1add3d048d095b5ed29407
1 /*
2 Unix SMB/CIFS implementation.
3 Copyright (C) Guenther Deschner 2009
5 This program is free software; you can redistribute it and/or modify
6 it under the terms of the GNU General Public License as published by
7 the Free Software Foundation; either version 3 of the License, or
8 (at your option) any later version.
10 This program is distributed in the hope that it will be useful,
11 but WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 GNU General Public License for more details.
15 You should have received a copy of the GNU General Public License
16 along with this program. If not, see <http://www.gnu.org/licenses/>.
19 #include "includes.h"
20 #include "librpc/gen_ndr/ndr_secrets.h"
21 #include "secrets.h"
23 /******************************************************************************
24 *******************************************************************************/
26 static char *lsa_secret_key(TALLOC_CTX *mem_ctx,
27 const char *secret_name)
29 return talloc_asprintf_strupper_m(mem_ctx, "SECRETS/LSA/%s",
30 secret_name);
33 /******************************************************************************
34 *******************************************************************************/
36 static NTSTATUS lsa_secret_get_common(TALLOC_CTX *mem_ctx,
37 const char *secret_name,
38 struct lsa_secret *secret)
40 char *key;
41 DATA_BLOB blob;
42 enum ndr_err_code ndr_err;
44 ZERO_STRUCTP(secret);
46 key = lsa_secret_key(mem_ctx, secret_name);
47 if (!key) {
48 return NT_STATUS_NO_MEMORY;
51 blob.data = (uint8_t *)secrets_fetch(key, &blob.length);
52 talloc_free(key);
54 if (!blob.data) {
55 return NT_STATUS_OBJECT_NAME_NOT_FOUND;
58 ndr_err = ndr_pull_struct_blob(&blob, mem_ctx, secret,
59 (ndr_pull_flags_fn_t)ndr_pull_lsa_secret);
60 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
61 SAFE_FREE(blob.data);
62 return ndr_map_error2ntstatus(ndr_err);
65 SAFE_FREE(blob.data);
67 return NT_STATUS_OK;
70 /******************************************************************************
71 *******************************************************************************/
73 NTSTATUS lsa_secret_get(TALLOC_CTX *mem_ctx,
74 const char *secret_name,
75 DATA_BLOB *secret_current,
76 NTTIME *secret_current_lastchange,
77 DATA_BLOB *secret_old,
78 NTTIME *secret_old_lastchange,
79 struct security_descriptor **sd)
81 NTSTATUS status;
82 struct lsa_secret secret;
84 status = lsa_secret_get_common(mem_ctx, secret_name, &secret);
85 if (!NT_STATUS_IS_OK(status)) {
86 return status;
89 if (secret_current) {
90 *secret_current = data_blob_null;
91 if (secret.secret_current) {
92 *secret_current = *secret.secret_current;
95 if (secret_current_lastchange) {
96 *secret_current_lastchange = secret.secret_current_lastchange;
98 if (secret_old) {
99 *secret_old = data_blob_null;
100 if (secret.secret_old) {
101 *secret_old = *secret.secret_old;
104 if (secret_old_lastchange) {
105 *secret_old_lastchange = secret.secret_old_lastchange;
107 if (sd) {
108 *sd = secret.sd;
111 return NT_STATUS_OK;
114 /******************************************************************************
115 *******************************************************************************/
117 static NTSTATUS lsa_secret_set_common(TALLOC_CTX *mem_ctx,
118 const char *key,
119 struct lsa_secret *secret,
120 DATA_BLOB *secret_current,
121 DATA_BLOB *secret_old,
122 struct security_descriptor *sd)
124 enum ndr_err_code ndr_err;
125 DATA_BLOB blob;
126 struct timeval now = timeval_current();
128 if (!secret) {
129 secret = talloc_zero(mem_ctx, struct lsa_secret);
132 if (!secret) {
133 return NT_STATUS_NO_MEMORY;
136 if (secret_old) {
137 secret->secret_old = secret_old;
138 secret->secret_old_lastchange = timeval_to_nttime(&now);
139 } else {
140 if (secret->secret_current) {
141 secret->secret_old = secret->secret_current;
142 secret->secret_old_lastchange = secret->secret_current_lastchange;
143 } else {
144 secret->secret_old = NULL;
145 secret->secret_old_lastchange = timeval_to_nttime(&now);
148 if (secret_current) {
149 secret->secret_current = secret_current;
150 secret->secret_current_lastchange = timeval_to_nttime(&now);
151 } else {
152 secret->secret_current = NULL;
153 secret->secret_current_lastchange = timeval_to_nttime(&now);
155 if (sd) {
156 secret->sd = sd;
159 ndr_err = ndr_push_struct_blob(&blob, mem_ctx, secret,
160 (ndr_push_flags_fn_t)ndr_push_lsa_secret);
161 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
162 return ndr_map_error2ntstatus(ndr_err);
165 if (!secrets_store(key, blob.data, blob.length)) {
166 return NT_STATUS_ACCESS_DENIED;
169 return NT_STATUS_OK;
172 /******************************************************************************
173 *******************************************************************************/
175 NTSTATUS lsa_secret_set(const char *secret_name,
176 DATA_BLOB *secret_current,
177 DATA_BLOB *secret_old,
178 struct security_descriptor *sd)
180 char *key;
181 struct lsa_secret secret;
182 NTSTATUS status;
184 key = lsa_secret_key(talloc_tos(), secret_name);
185 if (!key) {
186 return NT_STATUS_NO_MEMORY;
189 status = lsa_secret_get_common(talloc_tos(), secret_name, &secret);
190 if (!NT_STATUS_IS_OK(status) &&
191 !NT_STATUS_EQUAL(status, NT_STATUS_OBJECT_NAME_NOT_FOUND)) {
192 talloc_free(key);
193 return status;
196 status = lsa_secret_set_common(talloc_tos(), key,
197 &secret,
198 secret_current,
199 secret_old,
200 sd);
201 talloc_free(key);
203 return status;
206 /******************************************************************************
207 *******************************************************************************/
209 NTSTATUS lsa_secret_delete(const char *secret_name)
211 char *key;
212 struct lsa_secret secret;
213 NTSTATUS status;
215 key = lsa_secret_key(talloc_tos(), secret_name);
216 if (!key) {
217 return NT_STATUS_NO_MEMORY;
220 status = lsa_secret_get_common(talloc_tos(), secret_name, &secret);
221 if (!NT_STATUS_IS_OK(status)) {
222 talloc_free(key);
223 return status;
226 if (!secrets_delete(key)) {
227 talloc_free(key);
228 return NT_STATUS_ACCESS_DENIED;
231 talloc_free(key);
233 return NT_STATUS_OK;