1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
|
/*
Unix SMB/CIFS implementation.
Low-level sessionid.tdb access functions
Copyright (C) Volker Lendecke 2010
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#include "includes.h"
#include "system/filesys.h"
#include "dbwrap/dbwrap.h"
#include "dbwrap/dbwrap_open.h"
#include "session.h"
#include "util_tdb.h"
#include "smbd/globals.h"
#include "../libcli/security/session.h"
struct sessionid_traverse_read_state {
int (*fn)(const char *key, struct sessionid *session,
void *private_data);
void *private_data;
};
static int sessionid_traverse_read_fn(struct smbXsrv_session_global0 *global,
void *private_data)
{
struct sessionid_traverse_read_state *state =
(struct sessionid_traverse_read_state *)private_data;
struct auth_session_info *session_info = global->auth_session_info;
struct sessionid session = {
.uid = -1,
.gid = -1,
.id_num = global->session_global_id,
.connect_start = nt_time_to_unix(global->creation_time),
.pid = global->channels[0].server_id,
.connection_dialect = global->connection_dialect,
.global = global,
};
if (session_info != NULL) {
enum security_user_level ul;
session.uid = session_info->unix_token->uid;
session.gid = session_info->unix_token->gid;
strncpy(session.username,
session_info->unix_info->unix_name,
sizeof(fstring)-1);
ul = security_session_user_level(session_info, NULL);
if (ul >= SECURITY_USER) {
session.authenticated = true;
}
}
strncpy(session.remote_machine,
global->channels[0].remote_name,
sizeof(fstring)-1);
strncpy(session.hostname,
global->channels[0].remote_address,
sizeof(fstring)-1);
strncpy(session.netbios_name,
global->channels[0].remote_name,
sizeof(fstring)-1);
snprintf(session.id_str, sizeof(fstring)-1,
"smb/%u", global->session_global_id);
strncpy(session.ip_addr_str,
global->channels[0].remote_address,
sizeof(fstring)-1);
session.encryption_flags = global->encryption_flags;
session.cipher = global->channels[0].encryption_cipher;
session.signing_flags = global->signing_flags;
session.signing = global->channels[0].signing_algo;
return state->fn(NULL, &session, state->private_data);
}
NTSTATUS sessionid_traverse_read(int (*fn)(const char *key,
struct sessionid *session,
void *private_data),
void *private_data)
{
struct sessionid_traverse_read_state state;
NTSTATUS status;
state.fn = fn;
state.private_data = private_data;
status = smbXsrv_session_global_traverse(sessionid_traverse_read_fn,
&state);
return status;
}
|