[SCM] Samba Shared Repository - branch v3-2-test updated -
release-3-2-0pre2-182-g3ac4f93
Volker Lendecke
vlendec at samba.org
Mon Mar 10 09:13:45 GMT 2008
The branch, v3-2-test has been updated
via 3ac4f935c074af768d0b83514f86d010c387817a (commit)
via 8725dbc8888cf7a1d3d9d1205678fcd3ca3c6350 (commit)
via 27065382d9b692b5885265c9d60ffb7ec7748c38 (commit)
from 2ce76ce2bccefb4a072bed039a4837ae334dea55 (commit)
http://gitweb.samba.org/?p=samba.git;a=shortlog;h=v3-2-test
- Log -----------------------------------------------------------------
commit 3ac4f935c074af768d0b83514f86d010c387817a
Author: Volker Lendecke <vl at samba.org>
Date: Sun Mar 9 11:26:50 2008 +0100
Make use of talloc_asprintf_strupper_m in secrets.c
commit 8725dbc8888cf7a1d3d9d1205678fcd3ca3c6350
Author: Volker Lendecke <vl at samba.org>
Date: Sun Mar 9 11:21:08 2008 +0100
Avoid some pointless checks
secrets_init() makes sure that the tdb is initialized
commit 27065382d9b692b5885265c9d60ffb7ec7748c38
Author: Volker Lendecke <vl at samba.org>
Date: Sun Mar 9 11:17:48 2008 +0100
Use talloc_tos() in secrets_init
-----------------------------------------------------------------------
Summary of changes:
source/passdb/secrets.c | 87 ++++++++++++++---------------------------------
1 files changed, 26 insertions(+), 61 deletions(-)
Changeset truncated at 500 lines:
diff --git a/source/passdb/secrets.c b/source/passdb/secrets.c
index 6c5375e..2ef8f43 100644
--- a/source/passdb/secrets.c
+++ b/source/passdb/secrets.c
@@ -51,22 +51,15 @@ static void get_rand_seed(int *new_seed)
/* open up the secrets database */
bool secrets_init(void)
{
- TALLOC_CTX *ctx;
char *fname = NULL;
unsigned char dummy;
if (tdb)
return True;
- ctx = talloc_init("secrets_init");
- if (!ctx) {
- return false;
- }
- fname = talloc_asprintf(ctx,
- "%s/secrets.tdb",
- lp_private_dir());
- if (!fname) {
- TALLOC_FREE(ctx);
+ fname = talloc_asprintf(talloc_tos(), "%s/secrets.tdb",
+ lp_private_dir());
+ if (fname == NULL) {
return false;
}
@@ -74,11 +67,11 @@ bool secrets_init(void)
if (!tdb) {
DEBUG(0,("Failed to open %s\n", fname));
- TALLOC_FREE(ctx);
+ TALLOC_FREE(fname);
return False;
}
- TALLOC_FREE(ctx);
+ TALLOC_FREE(fname);
/**
* Set a reseed function for the crypto random generator
@@ -118,10 +111,6 @@ void *secrets_fetch(const char *key, size_t *size)
return NULL;
}
- if (!tdb) {
- return NULL;
- }
-
dbuf = tdb_fetch(tdb, string_tdb_data(key));
if (size) {
*size = dbuf.dsize;
@@ -138,10 +127,6 @@ bool secrets_store(const char *key, const void *data, size_t size)
return false;
}
- if (!tdb) {
- return false;
- }
-
return tdb_trans_store(tdb, string_tdb_data(key),
make_tdb_data((const uint8 *)data, size),
TDB_REPLACE) == 0;
@@ -156,10 +141,6 @@ bool secrets_delete(const char *key)
return false;
}
- if (!tdb) {
- return false;
- }
-
return tdb_trans_delete(tdb, string_tdb_data(key)) == 0;
}
@@ -174,12 +155,9 @@ static const char *domain_sid_keystr(const char *domain)
{
char *keystr;
- keystr = talloc_asprintf(talloc_tos(), "%s/%s",
- SECRETS_DOMAIN_SID, domain);
+ keystr = talloc_asprintf_strupper_m(talloc_tos(), "%s/%s",
+ SECRETS_DOMAIN_SID, domain);
SMB_ASSERT(keystr != NULL);
-
- strupper_m(keystr);
-
return keystr;
}
@@ -269,12 +247,10 @@ static const char *machine_sec_channel_type_keystr(const char *domain)
{
char *keystr;
- keystr = talloc_asprintf(talloc_tos(), "%s/%s",
- SECRETS_MACHINE_SEC_CHANNEL_TYPE, domain);
+ keystr = talloc_asprintf_strupper_m(talloc_tos(), "%s/%s",
+ SECRETS_MACHINE_SEC_CHANNEL_TYPE,
+ domain);
SMB_ASSERT(keystr != NULL);
-
- strupper_m(keystr);
-
return keystr;
}
@@ -289,12 +265,10 @@ static const char *machine_last_change_time_keystr(const char *domain)
{
char *keystr;
- keystr = talloc_asprintf(talloc_tos(), "%s/%s",
- SECRETS_MACHINE_LAST_CHANGE_TIME, domain);
+ keystr = talloc_asprintf_strupper_m(talloc_tos(), "%s/%s",
+ SECRETS_MACHINE_LAST_CHANGE_TIME,
+ domain);
SMB_ASSERT(keystr != NULL);
-
- strupper_m(keystr);
-
return keystr;
}
@@ -310,12 +284,9 @@ static const char *machine_password_keystr(const char *domain)
{
char *keystr;
- keystr = talloc_asprintf(talloc_tos(), "%s/%s",
- SECRETS_MACHINE_PASSWORD, domain);
+ keystr = talloc_asprintf_strupper_m(talloc_tos(), "%s/%s",
+ SECRETS_MACHINE_PASSWORD, domain);
SMB_ASSERT(keystr != NULL);
-
- strupper_m(keystr);
-
return keystr;
}
@@ -330,12 +301,9 @@ static const char *trust_keystr(const char *domain)
{
char *keystr;
- keystr = talloc_asprintf(talloc_tos(), "%s/%s",
- SECRETS_MACHINE_ACCT_PASS, domain);
+ keystr = talloc_asprintf_strupper_m(talloc_tos(), "%s/%s",
+ SECRETS_MACHINE_ACCT_PASS, domain);
SMB_ASSERT(keystr != NULL);
-
- strupper_m(keystr);
-
return keystr;
}
@@ -350,11 +318,10 @@ static char *trustdom_keystr(const char *domain)
{
char *keystr;
- keystr = talloc_asprintf(talloc_tos(), "%s/%s",
- SECRETS_DOMTRUST_ACCT_PASS, domain);
+ keystr = talloc_asprintf_strupper_m(talloc_tos(), "%s/%s",
+ SECRETS_DOMTRUST_ACCT_PASS,
+ domain);
SMB_ASSERT(keystr != NULL);
- strupper_m(keystr);
-
return keystr;
}
@@ -1230,14 +1197,13 @@ bool secrets_store_schannel_session_info(TALLOC_CTX *mem_ctx,
TDB_CONTEXT *tdb_sc = NULL;
TDB_DATA value;
bool ret;
- char *keystr = talloc_asprintf(mem_ctx, "%s/%s", SECRETS_SCHANNEL_STATE,
- remote_machine);
+ char *keystr = talloc_asprintf_strupper_m(mem_ctx, "%s/%s",
+ SECRETS_SCHANNEL_STATE,
+ remote_machine);
if (!keystr) {
return False;
}
- strupper_m(keystr);
-
/* Work out how large the record is. */
value.dsize = tdb_pack(NULL, 0, "dBBBBBfff",
pdc->sequence,
@@ -1304,8 +1270,9 @@ bool secrets_restore_schannel_session_info(TALLOC_CTX *mem_ctx,
uint32 l1, l2, l3, l4, l5;
int ret;
struct dcinfo *pdc = NULL;
- char *keystr = talloc_asprintf(mem_ctx, "%s/%s", SECRETS_SCHANNEL_STATE,
- remote_machine);
+ char *keystr = talloc_asprintf_strupper_m(mem_ctx, "%s/%s",
+ SECRETS_SCHANNEL_STATE,
+ remote_machine);
*ppdc = NULL;
@@ -1313,8 +1280,6 @@ bool secrets_restore_schannel_session_info(TALLOC_CTX *mem_ctx,
return False;
}
- strupper_m(keystr);
-
tdb_sc = open_schannel_session_store(mem_ctx);
if (!tdb_sc) {
TALLOC_FREE(keystr);
--
Samba Shared Repository
More information about the samba-cvs
mailing list