void secrets_shutdown(void);
void *secrets_fetch(const char *key, size_t *size);
bool secrets_store(const char *key, const void *data, size_t size);
-bool secrets_delete(const char *key);
+bool secrets_delete_entry(const char *key);
/* The following definitions come from passdb/machine_account_secrets.c */
bool secrets_mark_domain_protected(const char *domain);
if (protection) {
SAFE_FREE(protection);
- ret = secrets_delete(protect_ids_keystr(domain));
+ ret = secrets_delete_entry(protect_ids_keystr(domain));
if (!ret) {
DEBUG(0, ("Failed to remove Domain IDs protection\n"));
}
return true;
}
SAFE_FREE(oldpass);
- return secrets_delete(machine_prev_password_keystr(domain));
+ return secrets_delete_entry(machine_prev_password_keystr(domain));
}
/************************************************************************
if (!secrets_delete_prev_machine_password(domain)) {
return false;
}
- if (!secrets_delete(machine_password_keystr(domain))) {
+ if (!secrets_delete_entry(machine_password_keystr(domain))) {
return false;
}
- if (!secrets_delete(machine_sec_channel_type_keystr(domain))) {
+ if (!secrets_delete_entry(machine_sec_channel_type_keystr(domain))) {
return false;
}
- return secrets_delete(machine_last_change_time_keystr(domain));
+ return secrets_delete_entry(machine_last_change_time_keystr(domain));
}
/************************************************************************
bool secrets_delete_domain_sid(const char *domain)
{
- return secrets_delete(domain_sid_keystr(domain));
+ return secrets_delete_entry(domain_sid_keystr(domain));
}
/************************************************************************
value = secrets_fetch(machine_sec_channel_type_keystr(domain), NULL);
if (value) {
SAFE_FREE(value);
- ret = secrets_delete(machine_sec_channel_type_keystr(domain));
+ ret = secrets_delete_entry(machine_sec_channel_type_keystr(domain));
if (!ret) {
TALLOC_FREE(frame);
return ret;
if ( !salt ) {
DEBUG(8,("kerberos_secrets_store_des_salt: deleting salt\n"));
- secrets_delete( key );
+ secrets_delete_entry( key );
return True;
}
/* delete a secets database entry
*/
-bool secrets_delete(const char *key)
+bool secrets_delete_entry(const char *key)
{
NTSTATUS status;
if (!secrets_init()) {
bool trusted_domain_password_delete(const char *domain)
{
- return secrets_delete(trustdom_keystr(domain));
+ return secrets_delete_entry(trustdom_keystr(domain));
}
bool secrets_store_ldap_pw(const char* dn, char* pw)
SAFE_FREE(*dn);
return False;
}
- if (!secrets_delete(old_style_key)) {
+ if (!secrets_delete_entry(old_style_key)) {
DEBUG(0,("fetch_ldap_pw: old ldap secret could not be deleted!\n"));
}
return status;
}
- if (!secrets_delete(key)) {
+ if (!secrets_delete_entry(key)) {
talloc_free(key);
return NT_STATUS_ACCESS_DENIED;
}
" Delete the auth user setting.\n"));
return 1;
}
- secrets_delete(SECRETS_AUTH_USER);
- secrets_delete(SECRETS_AUTH_DOMAIN);
- secrets_delete(SECRETS_AUTH_PASSWORD);
+ secrets_delete_entry(SECRETS_AUTH_USER);
+ secrets_delete_entry(SECRETS_AUTH_DOMAIN);
+ secrets_delete_entry(SECRETS_AUTH_PASSWORD);
return 0;
}