mirror of
https://github.com/samba-team/samba.git
synced 2024-12-27 03:21:53 +03:00
1c38391c70
This implements some kind of improved AFS support for Samba on Linux with
OpenAFS 1.2.10. ./configure --with-fake-kaserver assumes that you have
OpenAFS on your machine. To use this, you have to put the AFS server's KeyFile
into secrets.tdb with 'net afskey'. If this is done, on each tree connect
smbd creates a Kerberos V4 ticket suitable for use by the AFS client and
gives it to the kernel via the AFS syscall. This is meant to be very
light-weight, so I did not link in a whole lot of libraries to be more
platform-independent using the ka_SetToken function call.
Volker
(This used to be commit 5775690ee8
)
99 lines
2.9 KiB
C
99 lines
2.9 KiB
C
/*
|
|
* Unix SMB/CIFS implementation.
|
|
* secrets.tdb file format info
|
|
* Copyright (C) Andrew Tridgell 2000
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify it
|
|
* under the terms of the GNU General Public License as published by the
|
|
* Free Software Foundation; either version 2 of the License, or (at your
|
|
* option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful, but WITHOUT
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
|
|
* more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License along with
|
|
* this program; if not, write to the Free Software Foundation, Inc., 675
|
|
* Mass Ave, Cambridge, MA 02139, USA.
|
|
*/
|
|
|
|
#ifndef _SECRETS_H
|
|
#define _SECRETS_H
|
|
|
|
/* the first one is for the hashed password (NT4 style) the latter
|
|
for plaintext (ADS)
|
|
*/
|
|
#define SECRETS_MACHINE_ACCT_PASS "SECRETS/$MACHINE.ACC"
|
|
#define SECRETS_MACHINE_PASSWORD "SECRETS/MACHINE_PASSWORD"
|
|
#define SECRETS_MACHINE_LAST_CHANGE_TIME "SECRETS/MACHINE_LAST_CHANGE_TIME"
|
|
#define SECRETS_MACHINE_SEC_CHANNEL_TYPE "SECRETS/MACHINE_SEC_CHANNEL_TYPE"
|
|
#define SECRETS_MACHINE_TRUST_ACCOUNT_NAME "SECRETS/SECRETS_MACHINE_TRUST_ACCOUNT_NAME"
|
|
/* this one is for storing trusted domain account password */
|
|
#define SECRETS_DOMTRUST_ACCT_PASS "SECRETS/$DOMTRUST.ACC"
|
|
|
|
/* The domain sid and our sid are stored here even though they aren't
|
|
really secret. */
|
|
#define SECRETS_DOMAIN_SID "SECRETS/SID"
|
|
#define SECRETS_SAM_SID "SAM/SID"
|
|
|
|
/* The domain GUID and server GUID (NOT the same) are also not secret */
|
|
#define SECRETS_DOMAIN_GUID "SECRETS/DOMGUID"
|
|
#define SECRETS_SERVER_GUID "SECRETS/GUID"
|
|
|
|
#define SECRETS_LDAP_BIND_PW "SECRETS/LDAP_BIND_PW"
|
|
|
|
/* Authenticated user info is stored in secrets.tdb under these keys */
|
|
|
|
#define SECRETS_AUTH_USER "SECRETS/AUTH_USER"
|
|
#define SECRETS_AUTH_DOMAIN "SECRETS/AUTH_DOMAIN"
|
|
#define SECRETS_AUTH_PASSWORD "SECRETS/AUTH_PASSWORD"
|
|
|
|
/* structure for storing machine account password
|
|
(ie. when samba server is member of a domain */
|
|
struct machine_acct_pass {
|
|
uint8 hash[16];
|
|
time_t mod_time;
|
|
};
|
|
|
|
/*
|
|
* storage structure for trusted domain
|
|
*/
|
|
typedef struct trusted_dom_pass {
|
|
size_t uni_name_len;
|
|
smb_ucs2_t uni_name[32]; /* unicode domain name */
|
|
size_t pass_len;
|
|
fstring pass; /* trust relationship's password */
|
|
time_t mod_time;
|
|
DOM_SID domain_sid; /* remote domain's sid */
|
|
} TRUSTED_DOM_PASS;
|
|
|
|
/*
|
|
* trusted domain entry/entries returned by secrets_get_trusted_domains
|
|
* (used in _lsa_enum_trust_dom call)
|
|
*/
|
|
typedef struct trustdom {
|
|
smb_ucs2_t *name;
|
|
DOM_SID sid;
|
|
} TRUSTDOM;
|
|
|
|
/*
|
|
* Format of an OpenAFS keyfile
|
|
*/
|
|
|
|
#define SECRETS_AFS_MAXKEYS 8
|
|
|
|
struct afs_key {
|
|
uint32 kvno;
|
|
char key[8];
|
|
};
|
|
|
|
struct afs_keyfile {
|
|
uint32 nkeys;
|
|
struct afs_key entry[SECRETS_AFS_MAXKEYS];
|
|
};
|
|
|
|
#define SECRETS_AFS_KEYFILE "SECRETS/AFS_KEYFILE"
|
|
|
|
#endif /* _SECRETS_H */
|