2 Unix SMB/Netbios implementation.
4 Samba registry functions
5 Copyright (C) Andrew Tridgell 1992-1998
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
22 /* the Samba secrets database stores any generated, private information
23 such as the local SID and machine trust password */
27 static TDB_CONTEXT
*tdb
;
29 /* open up the secrets database */
30 BOOL
secrets_init(void)
37 pstrcpy(fname
, lp_private_dir());
38 pstrcat(fname
,"/secrets.tdb");
40 tdb
= tdb_open(fname
, 0, 0, O_RDWR
|O_CREAT
, 0600);
43 DEBUG(0,("Failed to open %s\n", fname
));
49 /* read a entry from the secrets database - the caller must free the result
50 if size is non-null then the size of the entry is put in there
52 void *secrets_fetch(char *key
, size_t *size
)
55 if (!tdb
) return False
;
57 kbuf
.dsize
= strlen(key
);
58 dbuf
= tdb_fetch(tdb
, kbuf
);
59 if (size
) *size
= dbuf
.dsize
;
63 /* store a secrets entry
65 BOOL
secrets_store(char *key
, void *data
, size_t size
)
68 if (!tdb
) return False
;
70 kbuf
.dsize
= strlen(key
);
73 return tdb_store(tdb
, kbuf
, dbuf
, TDB_REPLACE
) == 0;
77 /* delete a secets database entry
79 BOOL
secrets_delete(char *key
)
82 if (!tdb
) return False
;
84 kbuf
.dsize
= strlen(key
);
85 return tdb_delete(tdb
, kbuf
) == 0;
88 BOOL
secrets_store_domain_sid(char *domain
, DOM_SID
*sid
)
92 slprintf(key
, sizeof(key
), "%s/%s", SECRETS_DOMAIN_SID
, domain
);
93 return secrets_store(key
, sid
, sizeof(DOM_SID
));
96 BOOL
secrets_fetch_domain_sid(char *domain
, DOM_SID
*sid
)
102 slprintf(key
, sizeof(key
), "%s/%s", SECRETS_DOMAIN_SID
, domain
);
103 dyn_sid
= (DOM_SID
*)secrets_fetch(key
, &size
);
108 if (size
!= sizeof(DOM_SID
))
120 /************************************************************************
121 form a key for fetching a domain trust password
122 ************************************************************************/
123 static char *trust_keystr(char *domain
)
125 static fstring keystr
;
126 slprintf(keystr
,sizeof(keystr
),"%s/%s", SECRETS_MACHINE_ACCT_PASS
, domain
);
130 /************************************************************************
131 Routine to get the trust account password for a domain.
132 The user of this function must have locked the trust password file.
133 ************************************************************************/
134 BOOL
secrets_fetch_trust_account_password(char *domain
, uint8 ret_pwd
[16],
135 time_t *pass_last_set_time
)
137 struct machine_acct_pass
*pass
;
140 if (!(pass
= secrets_fetch(trust_keystr(domain
), &size
)) ||
141 size
!= sizeof(*pass
)) return False
;
143 if (pass_last_set_time
) *pass_last_set_time
= pass
->mod_time
;
144 memcpy(ret_pwd
, pass
->hash
, 16);
150 /************************************************************************
151 Routine to set the trust account password for a domain.
152 ************************************************************************/
153 BOOL
secrets_store_trust_account_password(char *domain
, uint8 new_pwd
[16])
155 struct machine_acct_pass pass
;
157 pass
.mod_time
= time(NULL
);
158 memcpy(pass
.hash
, new_pwd
, 16);
160 return secrets_store(trust_keystr(domain
), (void *)&pass
, sizeof(pass
));