summaryrefslogtreecommitdiff
path: root/source3/rpc_client/cli_netlogon_sync.c
blob: a56e37a8ed0a1e131a2fb63b317e89d49af302fe (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
/* 
 *  Unix SMB/Netbios implementation.
 *  Version 1.9.
 *  RPC Pipe client / server routines
 *  Copyright (C) Andrew Tridgell              1992-1999,
 *  Copyright (C) Luke Kenneth Casson Leighton 1996-1999,
 *  Copyright (C) Matthew Chapman                   1999,
 *
 *  This program is free software; you can redistribute it and/or modify
 *  it under the terms of the GNU General Public License as published by
 *  the Free Software Foundation; either version 2 of the License, or
 *  (at your option) any later version.
 *  
 *  This program is distributed in the hope that it will be useful,
 *  but WITHOUT ANY WARRANTY; without even the implied warranty of
 *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 *  GNU General Public License for more details.
 *  
 *  You should have received a copy of the GNU General Public License
 *  along with this program; if not, write to the Free Software
 *  Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
 */


#ifdef SYSLOG
#undef SYSLOG
#endif

#include "includes.h"

extern int DEBUGLEVEL;
extern pstring global_myname;

BOOL synchronise_passdb(void)
{
	SAM_DELTA_HDR hdr_deltas[MAX_SAM_DELTAS];
	SAM_DELTA_CTR deltas[MAX_SAM_DELTAS];
	uint32 num;

	SAM_ACCOUNT_INFO *acc;
	struct smb_passwd pwd;
	fstring nt_name;
	unsigned char smb_passwd[16];
	unsigned char smb_nt_passwd[16];
	uchar trust_passwd[16];
	fstring trust_acct;

	char *mode;
	BOOL success;
	BOOL ret;
	int i;

	fstrcpy(trust_acct, global_myname);
	fstrcat(trust_acct, "$");

	if (!trust_get_passwd(trust_passwd, lp_workgroup(), global_myname))
	{
		return False;
	}

	ret = net_sam_sync(lp_passwordserver(), global_myname, trust_acct,
	                  trust_passwd,
	                  hdr_deltas, deltas, &num);

	if (ret)
	{
		for (i = 0; i < num; i++)
		{
			/* Currently only interested in accounts */
			if (hdr_deltas[i].type != 5)
			{
				continue;
			}

			acc = &deltas[i].account_info;
			pwdb_init_smb(&pwd);

			pwd.user_rid = acc->user_rid;
			unistr2_to_ascii(nt_name, &(acc->uni_acct_name), sizeof(fstring)-1);
			pwd.nt_name = nt_name;
			pwd.acct_ctrl = acc->acb_info;
			pwd.pass_last_set_time = nt_time_to_unix(&(acc->pwd_last_set_time));
			
			sam_pwd_hash(acc->user_rid, smb_passwd, acc->pass.buf_lm_pwd, 0);
			sam_pwd_hash(acc->user_rid, smb_nt_passwd, acc->pass.buf_nt_pwd, 0);
			pwd.smb_passwd = smb_passwd;
			pwd.smb_nt_passwd = smb_nt_passwd;

			mode = "modify";
			success = mod_smbpwd_entry(&pwd, True);

			if (!success)
			{
				mode = "add";
				success = add_smbpwd_entry(&pwd);
			}

			DEBUG(0, ("Attempted to %s account for %s: %s\n", mode,
				  nt_name, success ? "OK" : "FAILED"));
		}
	}

	return ret;
}