2001-12-20 10:46:24 +03:00
/*
2002-01-30 09:08:46 +03:00
Unix SMB / CIFS implementation .
2001-12-20 10:46:24 +03:00
krb5 set password implementation
Copyright ( C ) Remus Koos 2001 ( remuskoos @ yahoo . com )
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
2007-07-09 23:25:36 +04:00
the Free Software Foundation ; either version 3 of the License , or
2001-12-20 10:46:24 +03:00
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
2007-07-10 04:52:41 +04:00
along with this program . If not , see < http : //www.gnu.org/licenses/>.
2001-12-20 10:46:24 +03:00
*/
# include "includes.h"
2010-07-02 02:32:52 +04:00
# include "ads.h"
2010-08-05 04:25:37 +04:00
# include "secrets.h"
2001-12-20 10:46:24 +03:00
# ifdef HAVE_KRB5
ADS_STATUS ads_change_trust_account_password ( ADS_STRUCT * ads , char * host_principal )
{
2004-11-02 05:21:26 +03:00
char * password ;
char * new_password ;
ADS_STATUS ret ;
2009-10-13 12:15:34 +04:00
enum netr_SchannelType sec_channel_type ;
2003-04-21 18:09:03 +04:00
2004-11-02 05:21:26 +03:00
if ( ( password = secrets_fetch_machine_password ( lp_workgroup ( ) , NULL , & sec_channel_type ) ) = = NULL ) {
DEBUG ( 1 , ( " Failed to retrieve password for principal %s \n " , host_principal ) ) ;
return ADS_ERROR_SYSTEM ( ENOENT ) ;
}
2001-12-20 10:46:24 +03:00
2013-02-01 16:14:05 +04:00
new_password = generate_random_password ( talloc_tos ( ) ,
DEFAULT_TRUST_ACCOUNT_PASSWORD_LENGTH ,
DEFAULT_TRUST_ACCOUNT_PASSWORD_LENGTH ) ;
2006-06-09 14:50:28 +04:00
ret = kerberos_set_password ( ads - > auth . kdc_server , host_principal , password , host_principal , new_password , ads - > auth . time_offset ) ;
2003-02-24 05:55:00 +03:00
2004-11-02 05:21:26 +03:00
if ( ! ADS_ERR_OK ( ret ) ) {
goto failed ;
}
2001-12-20 10:46:24 +03:00
2007-03-13 23:53:38 +03:00
if ( ! secrets_store_machine_password ( new_password , lp_workgroup ( ) , sec_channel_type ) ) {
2004-11-02 05:21:26 +03:00
DEBUG ( 1 , ( " Failed to save machine password \n " ) ) ;
ret = ADS_ERROR_SYSTEM ( EACCES ) ;
goto failed ;
}
2001-12-20 10:46:24 +03:00
2004-11-02 05:21:26 +03:00
failed :
SAFE_FREE ( password ) ;
return ret ;
2001-12-20 10:46:24 +03:00
}
# endif