2001-12-20 07:46:24 +00:00
/*
2002-01-30 06:08:46 +00:00
Unix SMB / CIFS implementation .
2001-12-20 07:46:24 +00:00
krb5 set password implementation
Copyright ( C ) Remus Koos 2001 ( remuskoos @ yahoo . com )
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation ; either version 2 of the License , or
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
along with this program ; if not , write to the Free Software
Foundation , Inc . , 675 Mass Ave , Cambridge , MA 0213 9 , USA .
*/
# include "includes.h"
# ifdef HAVE_KRB5
ADS_STATUS ads_change_trust_account_password ( ADS_STRUCT * ads , char * host_principal )
{
2004-11-02 02:21:26 +00:00
char * password ;
char * new_password ;
char * service_principal ;
ADS_STATUS ret ;
uint32 sec_channel_type ;
2003-04-21 14:09:03 +00:00
2004-11-02 02:21:26 +00:00
if ( ( password = secrets_fetch_machine_password ( lp_workgroup ( ) , NULL , & sec_channel_type ) ) = = NULL ) {
DEBUG ( 1 , ( " Failed to retrieve password for principal %s \n " , host_principal ) ) ;
return ADS_ERROR_SYSTEM ( ENOENT ) ;
}
2001-12-20 07:46:24 +00:00
2004-11-02 02:21:26 +00:00
new_password = generate_random_str ( DEFAULT_TRUST_ACCOUNT_PASSWORD_LENGTH ) ;
2003-04-21 14:09:03 +00:00
2004-11-02 02:21:26 +00:00
asprintf ( & service_principal , " HOST/%s " , host_principal ) ;
2003-02-24 02:55:00 +00:00
2004-11-02 02:21:26 +00:00
ret = kerberos_set_password ( ads - > auth . kdc_server , service_principal , password , service_principal , new_password , ads - > auth . time_offset ) ;
2003-02-24 02:55:00 +00:00
2004-11-02 02:21:26 +00:00
if ( ! ADS_ERR_OK ( ret ) ) {
goto failed ;
}
2001-12-20 07:46:24 +00:00
2004-11-02 02:21:26 +00:00
if ( ! secrets_store_machine_password ( new_password , lp_workgroup ( ) , sec_channel_type ) ) {
DEBUG ( 1 , ( " Failed to save machine password \n " ) ) ;
ret = ADS_ERROR_SYSTEM ( EACCES ) ;
goto failed ;
}
2001-12-20 07:46:24 +00:00
2004-11-02 02:21:26 +00:00
/* Determine if the KDC is salting keys for this principal in a
* non - obvious way . */
if ( ! kerberos_derive_salting_principal ( service_principal ) ) {
DEBUG ( 1 , ( " Failed to determine correct salting principal for %s \n " , service_principal ) ) ;
ret = ADS_ERROR_SYSTEM ( EACCES ) ;
goto failed ;
}
2001-12-20 07:46:24 +00:00
2004-11-02 02:21:26 +00:00
failed :
SAFE_FREE ( service_principal ) ;
SAFE_FREE ( password ) ;
return ret ;
2001-12-20 07:46:24 +00:00
}
# endif