#include "includes.h"
static TDB_CONTEXT *tdb;
BOOL secrets_init(void)
{
pstring fname;
if (tdb)
return True;
get_private_directory(fname);
pstrcat(fname,"/secrets.tdb");
tdb = tdb_open_log(fname, 0, TDB_DEFAULT, O_RDWR|O_CREAT, 0600);
if (!tdb) {
DEBUG(0,("Failed to open %s\n", fname));
return False;
}
return True;
}
void *secrets_fetch(char *key, size_t *size)
{
TDB_DATA kbuf, dbuf;
if (!tdb)
return False;
kbuf.dptr = key;
kbuf.dsize = strlen(key);
dbuf = tdb_fetch(tdb, kbuf);
if (size)
*size = dbuf.dsize;
return dbuf.dptr;
}
BOOL secrets_store(char *key, void *data, size_t size)
{
TDB_DATA kbuf, dbuf;
if (!tdb)
return False;
kbuf.dptr = key;
kbuf.dsize = strlen(key);
dbuf.dptr = data;
dbuf.dsize = size;
return tdb_store(tdb, kbuf, dbuf, TDB_REPLACE) == 0;
}
BOOL secrets_delete(char *key)
{
TDB_DATA kbuf;
if (!tdb)
return False;
kbuf.dptr = key;
kbuf.dsize = strlen(key);
return tdb_delete(tdb, kbuf) == 0;
}
BOOL secrets_store_domain_sid(char *domain, DOM_SID *sid)
{
fstring key;
slprintf(key, sizeof(key)-1, "%s/%s", SECRETS_DOMAIN_SID, domain);
return secrets_store(key, sid, sizeof(DOM_SID));
}
BOOL secrets_fetch_domain_sid(char *domain, DOM_SID *sid)
{
DOM_SID *dyn_sid;
fstring key;
size_t size;
slprintf(key, sizeof(key)-1, "%s/%s", SECRETS_DOMAIN_SID, domain);
dos_to_unix(key, True);
dyn_sid = (DOM_SID *)secrets_fetch(key, &size);
if (dyn_sid == NULL)
return False;
if (size != sizeof(DOM_SID))
{
SAFE_FREE(dyn_sid);
return False;
}
*sid = *dyn_sid;
SAFE_FREE(dyn_sid);
return True;
}
char *trust_keystr(char *domain)
{
static fstring keystr;
fstring dos_domain;
fstrcpy(dos_domain, domain);
unix_to_dos(dos_domain, True);
slprintf(keystr,sizeof(keystr)-1,"%s/%s",
SECRETS_MACHINE_ACCT_PASS, dos_domain);
return keystr;
}
BOOL secrets_fetch_trust_account_password(char *domain, uint8 ret_pwd[16],
time_t *pass_last_set_time)
{
struct machine_acct_pass *pass;
size_t size;
if (!(pass = secrets_fetch(trust_keystr(domain), &size)) ||
size != sizeof(*pass))
return False;
if (pass_last_set_time) *pass_last_set_time = pass->mod_time;
memcpy(ret_pwd, pass->hash, 16);
SAFE_FREE(pass);
return True;
}
BOOL secrets_store_trust_account_password(char *domain, uint8 new_pwd[16])
{
struct machine_acct_pass pass;
pass.mod_time = time(NULL);
memcpy(pass.hash, new_pwd, 16);
return secrets_store(trust_keystr(domain), (void *)&pass, sizeof(pass));
}
BOOL trust_password_delete(char *domain)
{
return secrets_delete(trust_keystr(domain));
}
void reset_globals_after_fork(void)
{
unsigned char dummy;
if (tdb) {
int32 initial_val = sys_getpid();
tdb_change_int32_atomic(tdb, "INFO/random_seed", (int *)&initial_val, 1);
set_rand_reseed_data((unsigned char *)&initial_val, sizeof(initial_val));
}
generate_random_buffer( &dummy, 1, True);
}
BOOL secrets_store_ldap_pw(char* dn, char* pw)
{
fstring key;
char *p;
pstrcpy(key, dn);
for (p=key; *p; p++)
if (*p == ',') *p = '/';
return secrets_store(key, pw, strlen(pw));
}
BOOL fetch_ldap_pw(char *dn, char* pw, int len)
{
fstring key;
char *p;
void *data = NULL;
size_t size;
pstrcpy(key, dn);
for (p=key; *p; p++)
if (*p == ',') *p = '/';
data=secrets_fetch(key, &size);
if (!size) {
DEBUG(0,("fetch_ldap_pw: no ldap secret retrieved!\n"));
return False;
}
if (size > len-1)
{
DEBUG(0,("fetch_ldap_pw: ldap secret is too long (%d > %d)!\n", size, len-1));
return False;
}
memcpy(pw, data, size);
pw[size] = '\0';
return True;
}