2 Unix SMB/CIFS implementation.
3 async implementation of WINBINDD_PAM_AUTH
4 Copyright (C) Volker Lendecke 2010
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program. If not, see <http://www.gnu.org/licenses/>.
22 #include "libcli/security/dom_sid.h"
24 struct winbindd_pam_auth_state
{
25 struct winbindd_request
*request
;
26 struct winbindd_response
*response
;
29 static void winbindd_pam_auth_done(struct tevent_req
*subreq
);
31 struct tevent_req
*winbindd_pam_auth_send(TALLOC_CTX
*mem_ctx
,
32 struct tevent_context
*ev
,
33 struct winbindd_cli_state
*cli
,
34 struct winbindd_request
*request
)
36 struct tevent_req
*req
, *subreq
;
37 struct winbindd_pam_auth_state
*state
;
38 struct winbindd_domain
*domain
;
39 fstring name_namespace
, name_domain
, name_user
;
44 req
= tevent_req_create(mem_ctx
, &state
,
45 struct winbindd_pam_auth_state
);
49 state
->request
= request
;
51 /* Ensure null termination */
52 request
->data
.auth
.user
[sizeof(request
->data
.auth
.user
)-1] = '\0';
53 request
->data
.auth
.pass
[sizeof(request
->data
.auth
.pass
)-1] = '\0';
55 DBG_NOTICE("[%s (%u)]: pam auth %s\n",
57 (unsigned int)cli
->pid
,
58 request
->data
.auth
.user
);
60 if (!check_request_flags(request
->flags
)) {
61 tevent_req_nterror(req
, NT_STATUS_INVALID_PARAMETER_MIX
);
62 return tevent_req_post(req
, ev
);
65 /* Parse domain and username */
67 status
= normalize_name_unmap(state
, request
->data
.auth
.user
, &mapped
);
69 /* If the name normalization changed something, copy it over the given
72 if (NT_STATUS_IS_OK(status
)
73 || NT_STATUS_EQUAL(status
, NT_STATUS_FILE_RENAMED
)) {
74 fstrcpy(request
->data
.auth
.user
, mapped
);
77 ok
= canonicalize_username(request
->data
.auth
.user
,
82 tevent_req_nterror(req
, NT_STATUS_NO_SUCH_USER
);
83 return tevent_req_post(req
, ev
);
86 domain
= find_auth_domain(request
->flags
, name_namespace
);
88 tevent_req_nterror(req
, NT_STATUS_NO_SUCH_USER
);
89 return tevent_req_post(req
, ev
);
92 subreq
= wb_domain_request_send(state
, global_event_context(), domain
,
94 if (tevent_req_nomem(subreq
, req
)) {
95 return tevent_req_post(req
, ev
);
97 tevent_req_set_callback(subreq
, winbindd_pam_auth_done
, req
);
101 static void winbindd_pam_auth_done(struct tevent_req
*subreq
)
103 struct tevent_req
*req
= tevent_req_callback_data(
104 subreq
, struct tevent_req
);
105 struct winbindd_pam_auth_state
*state
= tevent_req_data(
106 req
, struct winbindd_pam_auth_state
);
109 res
= wb_domain_request_recv(subreq
, state
, &state
->response
, &err
);
112 tevent_req_nterror(req
, map_nt_error_from_unix(err
));
115 tevent_req_done(req
);
118 NTSTATUS
winbindd_pam_auth_recv(struct tevent_req
*req
,
119 struct winbindd_response
*response
)
121 struct winbindd_pam_auth_state
*state
= tevent_req_data(
122 req
, struct winbindd_pam_auth_state
);
125 if (tevent_req_is_nterror(req
, &status
)) {
126 set_auth_errors(response
, status
);
129 *response
= *state
->response
;
130 response
->result
= WINBINDD_PENDING
;
131 state
->response
= talloc_move(response
, &state
->response
);
133 status
= NT_STATUS(response
->data
.auth
.nt_status
);
134 if (!NT_STATUS_IS_OK(status
)) {
138 if (state
->request
->flags
& WBFLAG_PAM_INFO3_TEXT
) {
141 ok
= add_trusted_domain_from_auth(
142 state
->response
->data
.auth
.validation_level
,
143 &state
->response
->data
.auth
.info3
,
144 &state
->response
->data
.auth
.info6
);
146 DBG_ERR("add_trusted_domain_from_auth failed\n");
147 set_auth_errors(response
, NT_STATUS_LOGON_FAILURE
);
148 return NT_STATUS_LOGON_FAILURE
;
152 if (state
->request
->flags
& WBFLAG_PAM_CACHED_LOGIN
) {
154 /* Store in-memory creds for single-signon using ntlm_auth. */
156 status
= winbindd_add_memory_creds(
157 state
->request
->data
.auth
.user
,
158 get_uid_from_request(state
->request
),
159 state
->request
->data
.auth
.pass
);
160 DEBUG(10, ("winbindd_add_memory_creds returned: %s\n",