diff options
Diffstat (limited to 'source3/auth/user_info.c')
-rw-r--r-- | source3/auth/user_info.c | 169 |
1 files changed, 169 insertions, 0 deletions
diff --git a/source3/auth/user_info.c b/source3/auth/user_info.c new file mode 100644 index 0000000..81192a5 --- /dev/null +++ b/source3/auth/user_info.c @@ -0,0 +1,169 @@ +/* + Unix SMB/CIFS implementation. + Authentication utility functions + Copyright (C) Volker Lendecke 2010 + + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 3 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program. If not, see <http://www.gnu.org/licenses/>. +*/ + +#include "includes.h" +#include "auth.h" +#include "librpc/gen_ndr/samr.h" +#include "../lib/tsocket/tsocket.h" + +#undef DBGC_CLASS +#define DBGC_CLASS DBGC_AUTH + +static int clear_samr_Password(struct samr_Password *password) +{ + memset(password->hash, '\0', sizeof(password->hash)); + return 0; +} + +static int clear_string(char *password) +{ + memset(password, '\0', strlen(password)); + return 0; +} + +/**************************************************************************** + Create an auth_usersupplied_data structure +****************************************************************************/ + +NTSTATUS make_user_info(TALLOC_CTX *mem_ctx, + struct auth_usersupplied_info **ret_user_info, + const char *smb_name, + const char *internal_username, + const char *client_domain, + const char *domain, + const char *workstation_name, + const struct tsocket_address *remote_address, + const struct tsocket_address *local_address, + const char *service_description, + const DATA_BLOB *lm_pwd, + const DATA_BLOB *nt_pwd, + const struct samr_Password *lm_interactive_pwd, + const struct samr_Password *nt_interactive_pwd, + const char *plaintext_password, + enum auth_password_state password_state) +{ + struct auth_usersupplied_info *user_info; + *ret_user_info = NULL; + + DEBUG(5,("attempting to make a user_info for %s (%s)\n", internal_username, smb_name)); + + user_info = talloc_zero(mem_ctx, struct auth_usersupplied_info); + if (user_info == NULL) { + DEBUG(0,("talloc failed for user_info\n")); + return NT_STATUS_NO_MEMORY; + } + + DEBUG(5,("making strings for %s's user_info struct\n", internal_username)); + + user_info->client.account_name = talloc_strdup(user_info, smb_name); + if (user_info->client.account_name == NULL) { + goto nomem; + } + + user_info->mapped.account_name = talloc_strdup(user_info, internal_username); + if (user_info->mapped.account_name == NULL) { + goto nomem; + } + + user_info->mapped.domain_name = talloc_strdup(user_info, domain); + if (user_info->mapped.domain_name == NULL) { + goto nomem; + } + + user_info->client.domain_name = talloc_strdup(user_info, client_domain); + if (user_info->client.domain_name == NULL) { + goto nomem; + } + + user_info->workstation_name = talloc_strdup(user_info, workstation_name); + if (user_info->workstation_name == NULL) { + goto nomem; + } + + user_info->remote_host = tsocket_address_copy(remote_address, user_info); + if (user_info->remote_host == NULL) { + goto nomem; + } + + if (local_address != NULL) { + user_info->local_host = tsocket_address_copy(local_address, + user_info); + if (user_info->local_host == NULL) { + goto nomem; + } + } + + user_info->service_description = talloc_strdup(user_info, service_description); + if (user_info->service_description == NULL) { + goto nomem; + } + + DEBUG(5,("making blobs for %s's user_info struct\n", internal_username)); + + if (lm_pwd && lm_pwd->data) { + user_info->password.response.lanman = data_blob_talloc(user_info, lm_pwd->data, lm_pwd->length); + if (user_info->password.response.lanman.data == NULL) { + goto nomem; + } + } + if (nt_pwd && nt_pwd->data) { + user_info->password.response.nt = data_blob_talloc(user_info, nt_pwd->data, nt_pwd->length); + if (user_info->password.response.nt.data == NULL) { + goto nomem; + } + } + if (lm_interactive_pwd) { + user_info->password.hash.lanman = talloc(user_info, struct samr_Password); + if (user_info->password.hash.lanman == NULL) { + goto nomem; + } + memcpy(user_info->password.hash.lanman->hash, lm_interactive_pwd->hash, + sizeof(user_info->password.hash.lanman->hash)); + talloc_set_destructor(user_info->password.hash.lanman, clear_samr_Password); + } + + if (nt_interactive_pwd) { + user_info->password.hash.nt = talloc(user_info, struct samr_Password); + if (user_info->password.hash.nt == NULL) { + goto nomem; + } + memcpy(user_info->password.hash.nt->hash, nt_interactive_pwd->hash, + sizeof(user_info->password.hash.nt->hash)); + talloc_set_destructor(user_info->password.hash.nt, clear_samr_Password); + } + + if (plaintext_password) { + user_info->password.plaintext = talloc_strdup(user_info, plaintext_password); + if (user_info->password.plaintext == NULL) { + goto nomem; + } + talloc_set_destructor(user_info->password.plaintext, clear_string); + } + + user_info->password_state = password_state; + + user_info->logon_parameters = 0; + + DEBUG(10,("made a user_info for %s (%s)\n", internal_username, smb_name)); + *ret_user_info = user_info; + return NT_STATUS_OK; +nomem: + TALLOC_FREE(user_info); + return NT_STATUS_NO_MEMORY; +} |