1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
|
/*
Unix SMB/Netbios implementation.
Version 3.0.
Samba registry functions
Copyright (C) Andrew Tridgell 1992-1998
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
*/
/* the Samba secrets database stores any geerated, private information
such as the local SID and machine trust password */
#include "includes.h"
static TDB_CONTEXT *tdb;
/* open up the secrets database */
BOOL secrets_init(void)
{
pstring fname;
char *p;
if (tdb) return True;
pstrcpy(fname, lp_smb_passwd_file());
p = strrchr(fname, '/');
if(!p) return False;
*p = 0;
pstrcat(fname,"/secrets.tdb");
tdb = tdb_open(fname, 0, 0, O_RDWR|O_CREAT, 0600);
if (!tdb) {
DEBUG(0,("Failed to open %s\n", fname));
return False;
}
return True;
}
/* read a entry from the secrets database - the caller must free the result
if size is non-null then the size of the entry is put in there
*/
void *secrets_fetch(char *key, size_t *size)
{
TDB_DATA kbuf, dbuf;
if (!tdb) return False;
kbuf.dptr = key;
kbuf.dsize = strlen(key);
dbuf = tdb_fetch(tdb, kbuf);
if (size) *size = dbuf.dsize;
return dbuf.dptr;
}
/* store a secrets entry
*/
BOOL secrets_store(char *key, void *data, size_t size)
{
TDB_DATA kbuf, dbuf;
if (!tdb) return False;
kbuf.dptr = key;
kbuf.dsize = strlen(key);
dbuf.dptr = data;
dbuf.dsize = size;
return tdb_store(tdb, kbuf, dbuf, TDB_REPLACE) == 0;
}
/* delete a secets database entry
*/
BOOL secrets_delete(char *key)
{
TDB_DATA kbuf;
if (!tdb) return False;
kbuf.dptr = key;
kbuf.dsize = strlen(key);
return tdb_delete(tdb, kbuf) == 0;
}
|