1
0
mirror of https://github.com/samba-team/samba.git synced 2025-08-26 01:49:31 +03:00

Someone :-) forgot to add secrets.c to HEAD.

Jeremy.
This commit is contained in:
Jeremy Allison
-
parent 88ad00b82a
commit ac40971f30
2 changed files with 91 additions and 1 deletions

View File

@ -154,7 +154,7 @@ RPC_CLIENT_OBJ = \
LOCKING_OBJ = locking/locking.o locking/brlock.o locking/posix.o
PASSDB_OBJ = passdb/passdb.o passdb/smbpassfile.o passdb/smbpass.o \
PASSDB_OBJ = passdb/passdb.o passdb/smbpassfile.o passdb/smbpass.o passdb/secrets.o \
passdb/pass_check.o passdb/ldap.o passdb/nispass.o passdb/smbpasschange.o
PROFILE_OBJ = profile/profile.o

90
source/passdb/secrets.c Normal file
View File

@ -0,0 +1,90 @@
/*
Unix SMB/Netbios implementation.
Version 3.0.
Samba registry functions
Copyright (C) Andrew Tridgell 1992-1998
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
*/
/* the Samba secrets database stores any geerated, private information
such as the local SID and machine trust password */
#include "includes.h"
static TDB_CONTEXT *tdb;
/* open up the secrets database */
BOOL secrets_init(void)
{
pstring fname;
char *p;
if (tdb) return True;
pstrcpy(fname, lp_smb_passwd_file());
p = strrchr(fname, '/');
if(!p) return False;
*p = 0;
pstrcat(fname,"/secrets.tdb");
tdb = tdb_open(fname, 0, 0, O_RDWR|O_CREAT, 0600);
if (!tdb) {
DEBUG(0,("Failed to open %s\n", fname));
return False;
}
return True;
}
/* read a entry from the secrets database - the caller must free the result
if size is non-null then the size of the entry is put in there
*/
void *secrets_fetch(char *key, size_t *size)
{
TDB_DATA kbuf, dbuf;
if (!tdb) return False;
kbuf.dptr = key;
kbuf.dsize = strlen(key);
dbuf = tdb_fetch(tdb, kbuf);
if (size) *size = dbuf.dsize;
return dbuf.dptr;
}
/* store a secrets entry
*/
BOOL secrets_store(char *key, void *data, size_t size)
{
TDB_DATA kbuf, dbuf;
if (!tdb) return False;
kbuf.dptr = key;
kbuf.dsize = strlen(key);
dbuf.dptr = data;
dbuf.dsize = size;
return tdb_store(tdb, kbuf, dbuf, TDB_REPLACE) == 0;
}
/* delete a secets database entry
*/
BOOL secrets_delete(char *key)
{
TDB_DATA kbuf;
if (!tdb) return False;
kbuf.dptr = key;
kbuf.dsize = strlen(key);
return tdb_delete(tdb, kbuf) == 0;
}