1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
|
/*
* Unix SMB/Netbios implementation.
* Version 1.9.
* RPC Pipe client / server routines
* Copyright (C) Andrew Tridgell 1992-1999,
* Copyright (C) Luke Kenneth Casson Leighton 1996-1999,
* Copyright (C) Matthew Chapman 1999,
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
*/
#ifdef SYSLOG
#undef SYSLOG
#endif
#include "includes.h"
extern int DEBUGLEVEL;
extern pstring global_myname;
BOOL synchronise_passdb(void)
{
struct cli_state cli;
SAM_DELTA_HDR hdr_deltas[MAX_SAM_DELTAS];
SAM_DELTA_CTR deltas[MAX_SAM_DELTAS];
uint32 num;
SAM_ACCOUNT_INFO *acc;
struct smb_passwd pwd;
fstring nt_name;
unsigned char smb_passwd[16];
unsigned char smb_nt_passwd[16];
uchar trust_passwd[16];
fstring trust_acct;
fstring srv_name;
char *mode;
BOOL success;
BOOL ret;
int i;
DEBUG(0,("cannot make connection to multi-list of servers yet!\n"));
if (!cli_connect_serverlist(&cli, lp_passwordserver()))
{
return False;
}
fstrcpy(srv_name, "\\\\");
fstrcat(srv_name, lp_passwordserver()); /* LKCL XXXX oops! */
strupper(srv_name);
fstrcpy(trust_acct, global_myname);
fstrcat(trust_acct, "$");
if (!trust_get_passwd(trust_passwd, lp_workgroup(), global_myname))
{
return False;
}
ret = net_sam_sync(srv_name, global_myname, trust_acct, trust_passwd,
hdr_deltas, deltas, &num);
if (ret)
{
for (i = 0; i < num; i++)
{
/* Currently only interested in accounts */
if (hdr_deltas[i].type != 5)
{
continue;
}
acc = &deltas[i].account_info;
pwdb_init_smb(&pwd);
pwd.user_rid = acc->user_rid;
unistr2_to_ascii(nt_name, &(acc->uni_acct_name), sizeof(fstring)-1);
pwd.nt_name = nt_name;
pwd.acct_ctrl = acc->acb_info;
pwd.pass_last_set_time = nt_time_to_unix(&(acc->pwd_last_set_time));
sam_pwd_hash(acc->user_rid, smb_passwd, acc->pass.buf_lm_pwd, 0);
sam_pwd_hash(acc->user_rid, smb_nt_passwd, acc->pass.buf_nt_pwd, 0);
pwd.smb_passwd = smb_passwd;
pwd.smb_nt_passwd = smb_nt_passwd;
mode = "modify";
success = mod_smbpwd_entry(&pwd, True);
if (!success)
{
mode = "add";
success = add_smbpwd_entry(&pwd);
}
DEBUG(0, ("Attempted to %s account for %s: %s\n", mode,
nt_name, success ? "OK" : "FAILED"));
}
}
cli_ulogoff(&cli);
cli_shutdown(&cli);
return ret;
}
|