1996-05-04 11:50:46 +04:00
/*
1999-12-13 16:27:58 +03:00
* Unix SMB / Netbios implementation . Version 1.9 . smbpasswd module . Copyright
* ( C ) Jeremy Allison 1995 - 1998
1996-05-04 11:50:46 +04:00
*
* This program is free software ; you can redistribute it and / or modify it under
* the terms of the GNU General Public License as published by the Free
* Software Foundation ; either version 2 of the License , or ( at your option )
* any later version .
*
* This program is distributed in the hope that it will be useful , but WITHOUT
* ANY WARRANTY ; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE . See the GNU General Public License for
* more details .
*
* You should have received a copy of the GNU General Public License along with
* this program ; if not , write to the Free Software Foundation , Inc . , 675
* Mass Ave , Cambridge , MA 0213 9 , USA .
*/
# include "includes.h"
1998-04-25 05:12:08 +04:00
extern pstring global_myname ;
1998-11-12 09:12:19 +03:00
extern int DEBUGLEVEL ;
1998-04-30 02:27:26 +04:00
1998-11-19 01:04:24 +03:00
/*
* Next two lines needed for SunOS and don ' t
* hurt anything else . . .
*/
extern char * optarg ;
extern int optind ;
1998-04-25 05:12:08 +04:00
1998-03-25 00:04:36 +03:00
/*********************************************************
1998-11-12 09:12:19 +03:00
a strdup with exit
1998-03-25 00:04:36 +03:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1998-11-12 09:12:19 +03:00
static char * xstrdup ( char * s )
{
s = strdup ( s ) ;
if ( ! s ) {
fprintf ( stderr , " out of memory \n " ) ;
exit ( 1 ) ;
}
return s ;
}
1998-03-25 00:04:36 +03:00
1998-11-12 09:12:19 +03:00
/*********************************************************
Print command usage on stderr and die .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static void usage ( void )
1996-05-04 11:50:46 +04:00
{
1998-11-12 09:12:19 +03:00
if ( getuid ( ) = = 0 ) {
printf ( " smbpasswd [options] [username] [password] \n " ) ;
} else {
printf ( " smbpasswd [options] [password] \n " ) ;
}
printf ( " options: \n " ) ;
printf ( " -s use stdin for password prompt \n " ) ;
printf ( " -D LEVEL debug level \n " ) ;
printf ( " -U USER remote username \n " ) ;
printf ( " -r MACHINE remote machine \n " ) ;
if ( getuid ( ) = = 0 ) {
printf ( " -R ORDER name resolve order \n " ) ;
printf ( " -j DOMAIN join domain name \n " ) ;
printf ( " -a add user \n " ) ;
2000-02-26 01:25:25 +03:00
printf ( " -x delete user \n " ) ;
1998-11-12 23:22:11 +03:00
printf ( " -d disable user \n " ) ;
1998-11-12 09:12:19 +03:00
printf ( " -e enable user \n " ) ;
printf ( " -n set no password \n " ) ;
1999-12-13 16:27:58 +03:00
printf ( " -m machine trust account \n " ) ;
1998-11-12 09:12:19 +03:00
}
1996-05-04 11:50:46 +04:00
exit ( 1 ) ;
}
1999-11-21 00:59:16 +03:00
/*********************************************************
Join a domain .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1999-12-13 16:27:58 +03:00
static int join_domain ( char * domain , char * remote )
1999-11-21 00:59:16 +03:00
{
1999-12-13 16:27:58 +03:00
pstring remote_machine ;
1999-11-21 00:59:16 +03:00
fstring trust_passwd ;
1999-12-13 16:27:58 +03:00
unsigned char orig_trust_passwd_hash [ 16 ] ;
BOOL ret ;
pstrcpy ( remote_machine , remote ? remote : " " ) ;
fstrcpy ( trust_passwd , global_myname ) ;
strlower ( trust_passwd ) ;
E_md4hash ( ( uchar * ) trust_passwd , orig_trust_passwd_hash ) ;
1999-11-21 00:59:16 +03:00
1999-12-13 16:27:58 +03:00
/* Ensure that we are not trying to join a
domain if we are locally set up as a domain
controller . */
1999-11-21 00:59:16 +03:00
1999-12-13 16:27:58 +03:00
if ( strequal ( remote , global_myname ) ) {
fprintf ( stderr , " Cannot join domain %s as the domain controller name is our own. We cannot be a domain controller for a domain and also be a domain member. \n " , domain ) ;
1999-11-21 00:59:16 +03:00
return 1 ;
}
1999-12-13 16:27:58 +03:00
/*
* Write the old machine account password .
*/
1999-11-21 00:59:16 +03:00
2000-06-03 10:34:40 +04:00
if ( ! secrets_store_trust_account_password ( domain , orig_trust_passwd_hash ) ) {
1999-12-13 16:27:58 +03:00
fprintf ( stderr , " Unable to write the machine account password for \
machine % s in domain % s . \ n " , global_myname, domain);
1999-11-21 00:59:16 +03:00
return 1 ;
}
1999-12-13 16:27:58 +03:00
/*
* If we are given a remote machine assume this is the PDC .
*/
if ( remote = = NULL ) {
pstrcpy ( remote_machine , lp_passwordserver ( ) ) ;
1998-11-12 09:12:19 +03:00
}
1999-12-13 16:27:58 +03:00
if ( ! * remote_machine ) {
fprintf ( stderr , " No password server list given in smb.conf - \
unable to join domain . \ n " );
1999-07-22 14:55:41 +04:00
return 1 ;
}
1999-12-13 16:27:58 +03:00
ret = change_trust_account_password ( domain , remote_machine ) ;
1998-11-12 09:12:19 +03:00
1999-12-13 16:27:58 +03:00
if ( ! ret ) {
2000-05-08 14:42:21 +04:00
trust_password_delete ( domain ) ;
1998-11-12 09:12:19 +03:00
fprintf ( stderr , " Unable to join domain %s. \n " , domain ) ;
1999-12-13 16:27:58 +03:00
} else {
printf ( " Joined domain %s. \n " , domain ) ;
1998-11-12 09:12:19 +03:00
}
1999-12-13 16:27:58 +03:00
return ( int ) ret ;
1998-11-12 09:12:19 +03:00
}
1998-04-30 02:27:26 +04:00
1998-11-12 09:12:19 +03:00
static void set_line_buffering ( FILE * f )
1998-04-30 02:27:26 +04:00
{
1998-11-12 09:12:19 +03:00
setvbuf ( f , NULL , _IOLBF , 0 ) ;
1998-04-30 02:27:26 +04:00
}
1998-11-04 03:57:00 +03:00
/*************************************************************
Utility function to prompt for passwords from stdin . Each
password entered must end with a newline .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static char * stdin_new_passwd ( void )
{
1998-11-12 09:12:19 +03:00
static fstring new_passwd ;
size_t len ;
1998-11-13 06:37:01 +03:00
ZERO_ARRAY ( new_passwd ) ;
1998-11-12 09:12:19 +03:00
/*
* if no error is reported from fgets ( ) and string at least contains
* the newline that ends the password , then replace the newline with
* a null terminator .
*/
if ( fgets ( new_passwd , sizeof ( new_passwd ) , stdin ) ! = NULL ) {
if ( ( len = strlen ( new_passwd ) ) > 0 ) {
if ( new_passwd [ len - 1 ] = = ' \n ' )
new_passwd [ len - 1 ] = 0 ;
}
}
return ( new_passwd ) ;
1998-11-04 03:57:00 +03:00
}
1998-11-12 09:12:19 +03:00
1998-11-04 03:57:00 +03:00
/*************************************************************
Utility function to get passwords via tty or stdin
Used if the ' - s ' option is set to silently get passwords
to enable scripting .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static char * get_pass ( char * prompt , BOOL stdin_get )
{
1998-11-12 09:12:19 +03:00
char * p ;
if ( stdin_get ) {
p = stdin_new_passwd ( ) ;
} else {
p = getpass ( prompt ) ;
}
return xstrdup ( p ) ;
1998-11-04 03:57:00 +03:00
}
1998-09-25 02:33:13 +04:00
/*************************************************************
Utility function to prompt for new password .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1998-11-12 09:12:19 +03:00
static char * prompt_for_new_password ( BOOL stdin_get )
1998-09-25 02:33:13 +04:00
{
1998-11-12 09:12:19 +03:00
char * p ;
fstring new_passwd ;
1998-09-25 02:33:13 +04:00
1998-11-13 06:37:01 +03:00
ZERO_ARRAY ( new_passwd ) ;
1998-11-04 03:57:00 +03:00
1998-11-12 09:12:19 +03:00
p = get_pass ( " New SMB password: " , stdin_get ) ;
1998-09-25 02:33:13 +04:00
1998-11-12 09:12:19 +03:00
fstrcpy ( new_passwd , p ) ;
1998-09-25 02:33:13 +04:00
1998-11-12 09:12:19 +03:00
p = get_pass ( " Retype new SMB password: " , stdin_get ) ;
1998-09-25 02:33:13 +04:00
1998-11-12 09:12:19 +03:00
if ( strcmp ( p , new_passwd ) ) {
fprintf ( stderr , " Mismatch - password unchanged. \n " ) ;
1999-12-13 16:27:58 +03:00
ZERO_ARRAY ( new_passwd ) ;
1998-11-12 09:12:19 +03:00
return NULL ;
}
1998-09-25 02:33:13 +04:00
1998-11-12 09:12:19 +03:00
return xstrdup ( p ) ;
1998-09-25 02:33:13 +04:00
}
1998-03-25 00:04:36 +03:00
1998-11-12 09:12:19 +03:00
/*************************************************************
2000-02-26 01:25:25 +03:00
Change a password either locally or remotely .
1998-11-12 09:12:19 +03:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2000-02-26 01:25:25 +03:00
1998-11-12 09:12:19 +03:00
static BOOL password_change ( const char * remote_machine , char * user_name ,
2000-02-26 01:25:25 +03:00
char * old_passwd , char * new_passwd , int local_flags )
1998-11-12 09:12:19 +03:00
{
1998-11-13 02:49:32 +03:00
BOOL ret ;
pstring err_str ;
pstring msg_str ;
1999-12-13 16:27:58 +03:00
if ( remote_machine ! = NULL ) {
2000-02-26 01:25:25 +03:00
if ( local_flags & ( LOCAL_ADD_USER | LOCAL_DELETE_USER | LOCAL_DISABLE_USER | LOCAL_ENABLE_USER |
LOCAL_TRUST_ACCOUNT | LOCAL_SET_NO_PASSWORD ) ) {
1998-11-12 09:12:19 +03:00
/* these things can't be done remotely yet */
return False ;
}
1998-11-13 02:49:32 +03:00
ret = remote_password_change ( remote_machine , user_name ,
1999-12-13 16:27:58 +03:00
old_passwd , new_passwd , err_str , sizeof ( err_str ) ) ;
if ( * err_str )
1998-11-13 02:49:32 +03:00
fprintf ( stderr , err_str ) ;
return ret ;
1998-11-12 09:12:19 +03:00
}
2000-02-26 01:25:25 +03:00
ret = local_password_change ( user_name , local_flags , new_passwd ,
1999-12-13 16:27:58 +03:00
err_str , sizeof ( err_str ) , msg_str , sizeof ( msg_str ) ) ;
1998-11-13 02:49:32 +03:00
1999-12-13 16:27:58 +03:00
if ( * msg_str )
1998-11-13 02:49:32 +03:00
printf ( msg_str ) ;
1999-12-13 16:27:58 +03:00
if ( * err_str )
1998-11-13 02:49:32 +03:00
fprintf ( stderr , err_str ) ;
return ret ;
1998-11-12 09:12:19 +03:00
}
/*************************************************************
2000-02-26 01:25:25 +03:00
Handle password changing for root .
1998-11-12 09:12:19 +03:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2000-02-26 01:25:25 +03:00
1998-11-12 09:12:19 +03:00
static int process_root ( int argc , char * argv [ ] )
{
struct passwd * pwd ;
int ch ;
BOOL joining_domain = False ;
2000-02-26 01:25:25 +03:00
int local_flags = 0 ;
1998-11-12 09:12:19 +03:00
BOOL stdin_passwd_get = False ;
char * user_name = NULL ;
char * new_domain = NULL ;
char * new_passwd = NULL ;
char * old_passwd = NULL ;
char * remote_machine = NULL ;
1999-12-13 16:27:58 +03:00
2000-03-01 21:58:50 +03:00
while ( ( ch = getopt ( argc , argv , " ax:d:e:mnj:r:sR:D:U: " ) ) ! = EOF ) {
1999-12-13 16:27:58 +03:00
switch ( ch ) {
case ' a ' :
2000-02-26 01:25:25 +03:00
local_flags | = LOCAL_ADD_USER ;
break ;
case ' x ' :
local_flags | = LOCAL_DELETE_USER ;
user_name = optarg ;
new_passwd = " XXXXXX " ;
1999-12-13 16:27:58 +03:00
break ;
case ' d ' :
2000-02-26 01:25:25 +03:00
local_flags | = LOCAL_DISABLE_USER ;
user_name = optarg ;
1999-12-13 16:27:58 +03:00
new_passwd = " XXXXXX " ;
break ;
case ' e ' :
2000-02-26 01:25:25 +03:00
local_flags | = LOCAL_ENABLE_USER ;
user_name = optarg ;
1999-12-13 16:27:58 +03:00
break ;
2000-02-26 01:25:25 +03:00
case ' m ' :
local_flags | = LOCAL_TRUST_ACCOUNT ;
1999-12-13 16:27:58 +03:00
break ;
case ' n ' :
2000-02-26 01:25:25 +03:00
local_flags | = LOCAL_SET_NO_PASSWORD ;
1999-12-13 16:27:58 +03:00
new_passwd = " NO PASSWORD " ;
2000-03-01 21:58:50 +03:00
break ;
2000-02-26 01:25:25 +03:00
case ' j ' :
new_domain = optarg ;
strupper ( new_domain ) ;
joining_domain = True ;
break ;
1999-12-13 16:27:58 +03:00
case ' r ' :
remote_machine = optarg ;
break ;
case ' s ' :
set_line_buffering ( stdin ) ;
set_line_buffering ( stdout ) ;
set_line_buffering ( stderr ) ;
stdin_passwd_get = True ;
break ;
case ' R ' :
lp_set_name_resolve_order ( optarg ) ;
break ;
2000-02-26 01:25:25 +03:00
case ' D ' :
DEBUGLEVEL = atoi ( optarg ) ;
1999-12-13 16:27:58 +03:00
break ;
case ' U ' :
user_name = optarg ;
break ;
default :
usage ( ) ;
1998-11-12 09:12:19 +03:00
}
}
argc - = optind ;
argv + = optind ;
/*
2000-02-26 01:25:25 +03:00
* Ensure add / delete user and either remote machine or join domain are
1998-11-12 09:12:19 +03:00
* not both set .
*/
2000-02-26 01:25:25 +03:00
if ( ( local_flags & ( LOCAL_ADD_USER | LOCAL_DELETE_USER ) ) & & ( ( remote_machine ! = NULL ) | | joining_domain ) ) {
1998-11-12 09:12:19 +03:00
usage ( ) ;
}
1999-12-13 16:27:58 +03:00
if ( joining_domain ) {
2000-02-26 01:25:25 +03:00
if ( argc ! = 0 )
usage ( ) ;
1999-12-13 16:27:58 +03:00
return join_domain ( new_domain , remote_machine ) ;
1998-11-12 09:12:19 +03:00
}
/*
* Deal with root - can add a user , but only locally .
*/
switch ( argc ) {
case 0 :
break ;
case 1 :
user_name = argv [ 0 ] ;
break ;
case 2 :
user_name = argv [ 0 ] ;
new_passwd = argv [ 1 ] ;
break ;
default :
usage ( ) ;
}
1999-12-13 16:27:58 +03:00
if ( ! user_name & & ( pwd = sys_getpwuid ( 0 ) ) ) {
1998-11-12 09:12:19 +03:00
user_name = xstrdup ( pwd - > pw_name ) ;
}
if ( ! user_name ) {
fprintf ( stderr , " You must specify a username \n " ) ;
exit ( 1 ) ;
}
2000-02-26 01:25:25 +03:00
if ( local_flags & LOCAL_TRUST_ACCOUNT ) {
1998-11-12 09:12:19 +03:00
/* add the $ automatically */
static fstring buf ;
1998-11-16 23:19:57 +03:00
/*
* Remove any trailing ' $ ' before we
* generate the initial machine password .
*/
if ( user_name [ strlen ( user_name ) - 1 ] = = ' $ ' ) {
user_name [ strlen ( user_name ) - 1 ] = 0 ;
}
2000-02-26 01:25:25 +03:00
if ( local_flags & LOCAL_ADD_USER ) {
1998-11-12 09:12:19 +03:00
new_passwd = xstrdup ( user_name ) ;
strlower ( new_passwd ) ;
}
1998-11-16 23:19:57 +03:00
/*
* Now ensure the username ends in ' $ ' for
* the machine add .
*/
1998-11-12 09:12:19 +03:00
slprintf ( buf , sizeof ( buf ) - 1 , " %s$ " , user_name ) ;
user_name = buf ;
}
if ( remote_machine ! = NULL ) {
old_passwd = get_pass ( " Old SMB password: " , stdin_passwd_get ) ;
}
1999-12-13 16:27:58 +03:00
if ( ! new_passwd ) {
1998-11-12 23:22:11 +03:00
/*
* If we are trying to enable a user , first we need to find out
* if they are using a modern version of the smbpasswd file that
* disables a user by just writing a flag into the file . If so
* then we can re - enable a user without prompting for a new
* password . If not ( ie . they have a no stored password in the
* smbpasswd file ) then we need to prompt for a new password .
*/
2000-02-26 01:25:25 +03:00
if ( local_flags & LOCAL_ENABLE_USER ) {
1998-11-12 23:22:11 +03:00
struct smb_passwd * smb_pass = getsmbpwnam ( user_name ) ;
1999-12-13 16:27:58 +03:00
if ( ( smb_pass ! = NULL ) & & ( smb_pass - > smb_passwd ! = NULL ) ) {
1998-11-12 23:22:11 +03:00
new_passwd = " XXXX " ; /* Don't care. */
}
}
if ( ! new_passwd )
new_passwd = prompt_for_new_password ( stdin_passwd_get ) ;
1999-03-09 04:21:57 +03:00
1999-12-13 16:27:58 +03:00
if ( ! new_passwd ) {
fprintf ( stderr , " Unable to get new password. \n " ) ;
exit ( 1 ) ;
}
1999-03-19 08:00:39 +03:00
}
2000-02-26 01:25:25 +03:00
if ( ! password_change ( remote_machine , user_name , old_passwd , new_passwd , local_flags ) ) {
fprintf ( stderr , " Failed to modify password entry for user %s \n " , user_name ) ;
1998-11-12 09:12:19 +03:00
return 1 ;
}
2000-02-26 01:25:25 +03:00
if ( ! ( local_flags & ( LOCAL_ADD_USER | LOCAL_DISABLE_USER | LOCAL_ENABLE_USER | LOCAL_DELETE_USER | LOCAL_SET_NO_PASSWORD ) ) ) {
1999-12-13 16:27:58 +03:00
struct smb_passwd * smb_pass = getsmbpwnam ( user_name ) ;
printf ( " Password changed for user %s. " , user_name ) ;
if ( ( smb_pass ! = NULL ) & & ( smb_pass - > acct_ctrl & ACB_DISABLED ) )
printf ( " User has disabled flag set. " ) ;
if ( ( smb_pass ! = NULL ) & & ( smb_pass - > acct_ctrl & ACB_PWNOTREQ ) )
printf ( " User has no password flag set. " ) ;
printf ( " \n " ) ;
1998-11-12 09:12:19 +03:00
}
return 0 ;
}
/*************************************************************
handle password changing for non - root
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static int process_nonroot ( int argc , char * argv [ ] )
{
struct passwd * pwd = NULL ;
int ch ;
BOOL stdin_passwd_get = False ;
char * old_passwd = NULL ;
char * remote_machine = NULL ;
char * user_name = NULL ;
char * new_passwd = NULL ;
1999-12-13 16:27:58 +03:00
while ( ( ch = getopt ( argc , argv , " hD:r:sU: " ) ) ! = EOF ) {
switch ( ch ) {
1998-11-12 09:12:19 +03:00
case ' D ' :
DEBUGLEVEL = atoi ( optarg ) ;
break ;
case ' r ' :
remote_machine = optarg ;
break ;
case ' s ' :
set_line_buffering ( stdin ) ;
set_line_buffering ( stdout ) ;
set_line_buffering ( stderr ) ;
stdin_passwd_get = True ;
break ;
case ' U ' :
user_name = optarg ;
break ;
default :
usage ( ) ;
}
}
argc - = optind ;
argv + = optind ;
if ( argc > 1 ) {
usage ( ) ;
}
if ( argc = = 1 ) {
new_passwd = argv [ 0 ] ;
}
if ( ! user_name ) {
1999-12-13 16:27:58 +03:00
pwd = sys_getpwuid ( getuid ( ) ) ;
1998-11-12 09:12:19 +03:00
if ( pwd ) {
user_name = xstrdup ( pwd - > pw_name ) ;
} else {
fprintf ( stderr , " you don't exist - go away \n " ) ;
exit ( 1 ) ;
}
}
/*
* A non - root user is always setting a password
* via a remote machine ( even if that machine is
* localhost ) .
*/
if ( remote_machine = = NULL ) {
remote_machine = " 127.0.0.1 " ;
}
1999-12-13 16:27:58 +03:00
1998-11-12 09:12:19 +03:00
if ( remote_machine ! = NULL ) {
old_passwd = get_pass ( " Old SMB password: " , stdin_passwd_get ) ;
}
if ( ! new_passwd ) {
new_passwd = prompt_for_new_password ( stdin_passwd_get ) ;
}
if ( ! new_passwd ) {
1999-12-13 16:27:58 +03:00
fprintf ( stderr , " Unable to get new password. \n " ) ;
exit ( 1 ) ;
1998-11-12 09:12:19 +03:00
}
2000-02-26 01:25:25 +03:00
if ( ! password_change ( remote_machine , user_name , old_passwd , new_passwd , 0 ) ) {
1998-11-12 09:12:19 +03:00
fprintf ( stderr , " Failed to change password for %s \n " , user_name ) ;
return 1 ;
}
printf ( " Password changed for user %s \n " , user_name ) ;
return 0 ;
}
/*********************************************************
Start here .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
int main ( int argc , char * * argv )
{
static pstring servicesf = CONFIGFILE ;
1999-12-13 16:27:58 +03:00
# if defined(HAVE_SET_AUTH_PARAMETERS)
set_auth_parameters ( argc , argv ) ;
# endif /* HAVE_SET_AUTH_PARAMETERS */
1998-11-12 09:12:19 +03:00
TimeInit ( ) ;
setup_logging ( " smbpasswd " , True ) ;
charset_initialise ( ) ;
1999-12-13 16:27:58 +03:00
if ( ! initialize_password_db ( ) ) {
fprintf ( stderr , " Can't setup password database vectors. \n " ) ;
1998-11-12 09:12:19 +03:00
exit ( 1 ) ;
}
1999-12-13 16:27:58 +03:00
if ( ! lp_load ( servicesf , True , False , False ) ) {
fprintf ( stderr , " Can't load %s - run testparm to debug it \n " ,
servicesf ) ;
1998-11-12 09:12:19 +03:00
exit ( 1 ) ;
}
/*
* Set the machine NETBIOS name if not already
* set from the config file .
*/
if ( ! * global_myname ) {
char * p ;
1999-12-13 16:27:58 +03:00
fstrcpy ( global_myname , myhostname ( ) ) ;
1998-11-12 09:12:19 +03:00
p = strchr ( global_myname , ' . ' ) ;
if ( p ) * p = 0 ;
}
strupper ( global_myname ) ;
codepage_initialise ( lp_client_code_page ( ) ) ;
1999-01-18 04:32:45 +03:00
load_interfaces ( ) ;
2000-05-08 14:42:21 +04:00
secrets_init ( ) ;
1999-01-18 04:32:45 +03:00
1998-11-12 09:12:19 +03:00
/* Check the effective uid - make sure we are not setuid */
if ( ( geteuid ( ) = = ( uid_t ) 0 ) & & ( getuid ( ) ! = ( uid_t ) 0 ) ) {
fprintf ( stderr , " smbpasswd must *NOT* be setuid root. \n " ) ;
exit ( 1 ) ;
}
if ( getuid ( ) = = 0 ) {
return process_root ( argc , argv ) ;
}
return process_nonroot ( argc , argv ) ;
1996-05-04 11:50:46 +04:00
}