2 Unix SMB/CIFS implementation.
3 Password and authentication handling
4 Copyright (C) Andrew Bartlett 2002
5 Copyright (C) Jelmer Vernooij 2002
6 Copyright (C) Simo Sorce 2003
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
20 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
26 #define DBGC_CLASS DBGC_PASSDB
28 static struct pdb_init_function_entry
*backends
= NULL
;
30 static void lazy_initialize_passdb(void)
32 static BOOL initialized
= False
;
33 if(initialized
)return;
38 static struct pdb_init_function_entry
*pdb_find_backend_entry(const char *name
);
40 /*******************************************************************
41 Clean up uninitialised passwords. The only way to tell
42 that these values are not 'real' is that they do not
43 have a valid last set time. Instead, the value is fixed at 0.
44 Therefore we use that as the key for 'is this a valid password'.
45 However, it is perfectly valid to have a 'default' last change
46 time, such LDAP with a missing attribute would produce.
47 ********************************************************************/
49 static void pdb_force_pw_initialization(SAM_ACCOUNT
*pass
)
51 const uint8
*lm_pwd
, *nt_pwd
;
53 /* only reset a password if the last set time has been
54 explicitly been set to zero. A default last set time
57 if ( (pdb_get_init_flags(pass
, PDB_PASSLASTSET
) != PDB_DEFAULT
)
58 && (pdb_get_pass_last_set_time(pass
) == 0) )
61 if (pdb_get_init_flags(pass
, PDB_LMPASSWD
) != PDB_DEFAULT
)
63 lm_pwd
= pdb_get_lanman_passwd(pass
);
65 pdb_set_lanman_passwd(pass
, NULL
, PDB_CHANGED
);
67 if (pdb_get_init_flags(pass
, PDB_NTPASSWD
) != PDB_DEFAULT
)
69 nt_pwd
= pdb_get_nt_passwd(pass
);
71 pdb_set_nt_passwd(pass
, NULL
, PDB_CHANGED
);
78 NTSTATUS
smb_register_passdb(int version
, const char *name
, pdb_init_function init
)
80 struct pdb_init_function_entry
*entry
= backends
;
82 if(version
!= PASSDB_INTERFACE_VERSION
) {
83 DEBUG(0,("Can't register passdb backend!\n"
84 "You tried to register a passdb module with PASSDB_INTERFACE_VERSION %d, "
85 "while this version of samba uses version %d\n",
86 version
,PASSDB_INTERFACE_VERSION
));
87 return NT_STATUS_OBJECT_TYPE_MISMATCH
;
91 return NT_STATUS_INVALID_PARAMETER
;
94 DEBUG(5,("Attempting to register passdb backend %s\n", name
));
96 /* Check for duplicates */
97 if (pdb_find_backend_entry(name
)) {
98 DEBUG(0,("There already is a passdb backend registered with the name %s!\n", name
));
99 return NT_STATUS_OBJECT_NAME_COLLISION
;
102 entry
= SMB_XMALLOC_P(struct pdb_init_function_entry
);
103 entry
->name
= smb_xstrdup(name
);
106 DLIST_ADD(backends
, entry
);
107 DEBUG(5,("Successfully added passdb backend '%s'\n", name
));
111 static struct pdb_init_function_entry
*pdb_find_backend_entry(const char *name
)
113 struct pdb_init_function_entry
*entry
= backends
;
116 if (strcmp(entry
->name
, name
)==0) return entry
;
123 static NTSTATUS
context_setsampwent(struct pdb_context
*context
, BOOL update
, uint16 acb_mask
)
125 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
128 DEBUG(0, ("invalid pdb_context specified!\n"));
132 context
->pwent_methods
= context
->pdb_methods
;
134 if (!context
->pwent_methods
) {
135 /* No passdbs at all */
139 while (NT_STATUS_IS_ERR(ret
= context
->pwent_methods
->setsampwent(context
->pwent_methods
, update
, acb_mask
))) {
140 context
->pwent_methods
= context
->pwent_methods
->next
;
141 if (context
->pwent_methods
== NULL
)
142 return NT_STATUS_UNSUCCESSFUL
;
147 static void context_endsampwent(struct pdb_context
*context
)
150 DEBUG(0, ("invalid pdb_context specified!\n"));
154 if (context
->pwent_methods
&& context
->pwent_methods
->endsampwent
)
155 context
->pwent_methods
->endsampwent(context
->pwent_methods
);
157 /* So we won't get strange data when calling getsampwent now */
158 context
->pwent_methods
= NULL
;
161 static NTSTATUS
context_getsampwent(struct pdb_context
*context
, SAM_ACCOUNT
*user
)
163 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
165 if ((!context
) || (!context
->pwent_methods
)) {
166 DEBUG(0, ("invalid pdb_context specified!\n"));
169 /* Loop until we find something useful */
170 while (NT_STATUS_IS_ERR(ret
= context
->pwent_methods
->getsampwent(context
->pwent_methods
, user
))) {
172 context
->pwent_methods
->endsampwent(context
->pwent_methods
);
174 context
->pwent_methods
= context
->pwent_methods
->next
;
176 /* All methods are checked now. There are no more entries */
177 if (context
->pwent_methods
== NULL
)
180 context
->pwent_methods
->setsampwent(context
->pwent_methods
, False
, 0);
182 user
->methods
= context
->pwent_methods
;
183 pdb_force_pw_initialization(user
);
187 static NTSTATUS
context_getsampwnam(struct pdb_context
*context
, SAM_ACCOUNT
*sam_acct
, const char *username
)
189 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
191 struct pdb_methods
*curmethods
;
193 DEBUG(0, ("invalid pdb_context specified!\n"));
196 curmethods
= context
->pdb_methods
;
198 if (NT_STATUS_IS_OK(ret
= curmethods
->getsampwnam(curmethods
, sam_acct
, username
))) {
199 pdb_force_pw_initialization(sam_acct
);
200 sam_acct
->methods
= curmethods
;
203 curmethods
= curmethods
->next
;
209 static NTSTATUS
context_getsampwsid(struct pdb_context
*context
, SAM_ACCOUNT
*sam_acct
, const DOM_SID
*sid
)
211 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
213 struct pdb_methods
*curmethods
;
215 DEBUG(0, ("invalid pdb_context specified!\n"));
219 curmethods
= context
->pdb_methods
;
222 if (NT_STATUS_IS_OK(ret
= curmethods
->getsampwsid(curmethods
, sam_acct
, sid
))) {
223 pdb_force_pw_initialization(sam_acct
);
224 sam_acct
->methods
= curmethods
;
227 curmethods
= curmethods
->next
;
233 static NTSTATUS
context_add_sam_account(struct pdb_context
*context
, SAM_ACCOUNT
*sam_acct
)
235 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
236 const uint8
*lm_pw
, *nt_pw
;
239 if ((!context
) || (!context
->pdb_methods
)) {
240 DEBUG(0, ("invalid pdb_context specified!\n"));
244 /* disable acccounts with no passwords (that has not
245 been allowed by the ACB_PWNOTREQ bit */
247 lm_pw
= pdb_get_lanman_passwd( sam_acct
);
248 nt_pw
= pdb_get_nt_passwd( sam_acct
);
249 acb_flags
= pdb_get_acct_ctrl( sam_acct
);
250 if ( !lm_pw
&& !nt_pw
&& !(acb_flags
&ACB_PWNOTREQ
) ) {
251 acb_flags
|= ACB_DISABLED
;
252 pdb_set_acct_ctrl( sam_acct
, acb_flags
, PDB_CHANGED
);
255 /** @todo This is where a 're-read on add' should be done */
256 /* We now add a new account to the first database listed.
259 return context
->pdb_methods
->add_sam_account(context
->pdb_methods
, sam_acct
);
262 static NTSTATUS
context_update_sam_account(struct pdb_context
*context
, SAM_ACCOUNT
*sam_acct
)
264 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
265 const uint8
*lm_pw
, *nt_pw
;
269 DEBUG(0, ("invalid pdb_context specified!\n"));
273 if (!sam_acct
|| !sam_acct
->methods
){
274 DEBUG(0, ("invalid sam_acct specified\n"));
278 /* disable acccounts with no passwords (that has not
279 been allowed by the ACB_PWNOTREQ bit */
281 lm_pw
= pdb_get_lanman_passwd( sam_acct
);
282 nt_pw
= pdb_get_nt_passwd( sam_acct
);
283 acb_flags
= pdb_get_acct_ctrl( sam_acct
);
284 if ( !lm_pw
&& !nt_pw
&& !(acb_flags
&ACB_PWNOTREQ
) ) {
285 acb_flags
|= ACB_DISABLED
;
286 pdb_set_acct_ctrl( sam_acct
, acb_flags
, PDB_CHANGED
);
289 /** @todo This is where a 're-read on update' should be done */
291 return sam_acct
->methods
->update_sam_account(sam_acct
->methods
, sam_acct
);
294 static NTSTATUS
context_delete_sam_account(struct pdb_context
*context
, SAM_ACCOUNT
*sam_acct
)
296 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
298 struct pdb_methods
*pdb_selected
;
300 DEBUG(0, ("invalid pdb_context specified!\n"));
304 if (!sam_acct
->methods
){
305 pdb_selected
= context
->pdb_methods
;
306 /* There's no passdb backend specified for this account.
307 * Try to delete it in every passdb available
308 * Needed to delete accounts in smbpasswd that are not
311 while (pdb_selected
){
312 if (NT_STATUS_IS_OK(ret
= pdb_selected
->delete_sam_account(pdb_selected
, sam_acct
))) {
315 pdb_selected
= pdb_selected
->next
;
320 if (!sam_acct
->methods
->delete_sam_account
){
321 DEBUG(0,("invalid sam_acct->methods->delete_sam_account\n"));
325 return sam_acct
->methods
->delete_sam_account(sam_acct
->methods
, sam_acct
);
328 static NTSTATUS
context_update_login_attempts(struct pdb_context
*context
,
329 SAM_ACCOUNT
*sam_acct
, BOOL success
)
331 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
334 DEBUG(0, ("invalid pdb_context specified!\n"));
338 if (!sam_acct
|| !sam_acct
->methods
){
339 DEBUG(0, ("invalid sam_acct specified\n"));
343 return sam_acct
->methods
->update_login_attempts(sam_acct
->methods
, sam_acct
, success
);
346 static NTSTATUS
context_getgrsid(struct pdb_context
*context
,
347 GROUP_MAP
*map
, DOM_SID sid
)
349 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
351 struct pdb_methods
*curmethods
;
353 DEBUG(0, ("invalid pdb_context specified!\n"));
356 curmethods
= context
->pdb_methods
;
358 ret
= curmethods
->getgrsid(curmethods
, map
, sid
);
359 if (NT_STATUS_IS_OK(ret
)) {
360 map
->methods
= curmethods
;
363 curmethods
= curmethods
->next
;
369 static NTSTATUS
context_getgrgid(struct pdb_context
*context
,
370 GROUP_MAP
*map
, gid_t gid
)
372 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
374 struct pdb_methods
*curmethods
;
376 DEBUG(0, ("invalid pdb_context specified!\n"));
379 curmethods
= context
->pdb_methods
;
381 ret
= curmethods
->getgrgid(curmethods
, map
, gid
);
382 if (NT_STATUS_IS_OK(ret
)) {
383 map
->methods
= curmethods
;
386 curmethods
= curmethods
->next
;
392 static NTSTATUS
context_getgrnam(struct pdb_context
*context
,
393 GROUP_MAP
*map
, const char *name
)
395 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
397 struct pdb_methods
*curmethods
;
399 DEBUG(0, ("invalid pdb_context specified!\n"));
402 curmethods
= context
->pdb_methods
;
404 ret
= curmethods
->getgrnam(curmethods
, map
, name
);
405 if (NT_STATUS_IS_OK(ret
)) {
406 map
->methods
= curmethods
;
409 curmethods
= curmethods
->next
;
415 static NTSTATUS
context_add_group_mapping_entry(struct pdb_context
*context
,
418 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
420 if ((!context
) || (!context
->pdb_methods
)) {
421 DEBUG(0, ("invalid pdb_context specified!\n"));
425 return context
->pdb_methods
->add_group_mapping_entry(context
->pdb_methods
,
429 static NTSTATUS
context_update_group_mapping_entry(struct pdb_context
*context
,
432 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
434 if ((!context
) || (!context
->pdb_methods
)) {
435 DEBUG(0, ("invalid pdb_context specified!\n"));
440 pdb_methods
->update_group_mapping_entry(context
->pdb_methods
, map
);
443 static NTSTATUS
context_delete_group_mapping_entry(struct pdb_context
*context
,
446 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
448 if ((!context
) || (!context
->pdb_methods
)) {
449 DEBUG(0, ("invalid pdb_context specified!\n"));
454 pdb_methods
->delete_group_mapping_entry(context
->pdb_methods
, sid
);
457 static NTSTATUS
context_enum_group_mapping(struct pdb_context
*context
,
458 enum SID_NAME_USE sid_name_use
,
459 GROUP_MAP
**rmap
, int *num_entries
,
462 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
464 if ((!context
) || (!context
->pdb_methods
)) {
465 DEBUG(0, ("invalid pdb_context specified!\n"));
469 return context
->pdb_methods
->enum_group_mapping(context
->pdb_methods
,
471 num_entries
, unix_only
);
474 static NTSTATUS
context_enum_group_members(struct pdb_context
*context
,
476 const DOM_SID
*group
,
477 uint32
**member_rids
,
480 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
482 if ((!context
) || (!context
->pdb_methods
)) {
483 DEBUG(0, ("invalid pdb_context specified!\n"));
487 return context
->pdb_methods
->enum_group_members(context
->pdb_methods
,
493 static NTSTATUS
context_enum_group_memberships(struct pdb_context
*context
,
494 const char *username
,
496 DOM_SID
**sids
, gid_t
**gids
,
499 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
501 if ((!context
) || (!context
->pdb_methods
)) {
502 DEBUG(0, ("invalid pdb_context specified!\n"));
506 return context
->pdb_methods
->
507 enum_group_memberships(context
->pdb_methods
, username
,
508 primary_gid
, sids
, gids
, num_groups
);
511 static NTSTATUS
context_find_alias(struct pdb_context
*context
,
512 const char *name
, DOM_SID
*sid
)
514 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
516 if ((!context
) || (!context
->pdb_methods
)) {
517 DEBUG(0, ("invalid pdb_context specified!\n"));
521 return context
->pdb_methods
->find_alias(context
->pdb_methods
,
525 static NTSTATUS
context_create_alias(struct pdb_context
*context
,
526 const char *name
, uint32
*rid
)
528 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
530 if ((!context
) || (!context
->pdb_methods
)) {
531 DEBUG(0, ("invalid pdb_context specified!\n"));
535 return context
->pdb_methods
->create_alias(context
->pdb_methods
,
539 static NTSTATUS
context_delete_alias(struct pdb_context
*context
,
542 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
544 if ((!context
) || (!context
->pdb_methods
)) {
545 DEBUG(0, ("invalid pdb_context specified!\n"));
549 return context
->pdb_methods
->delete_alias(context
->pdb_methods
, sid
);
552 static NTSTATUS
context_get_aliasinfo(struct pdb_context
*context
,
554 struct acct_info
*info
)
556 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
558 if ((!context
) || (!context
->pdb_methods
)) {
559 DEBUG(0, ("invalid pdb_context specified!\n"));
563 return context
->pdb_methods
->get_aliasinfo(context
->pdb_methods
,
567 static NTSTATUS
context_set_aliasinfo(struct pdb_context
*context
,
569 struct acct_info
*info
)
571 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
573 if ((!context
) || (!context
->pdb_methods
)) {
574 DEBUG(0, ("invalid pdb_context specified!\n"));
578 return context
->pdb_methods
->set_aliasinfo(context
->pdb_methods
,
582 static NTSTATUS
context_add_aliasmem(struct pdb_context
*context
,
583 const DOM_SID
*alias
,
584 const DOM_SID
*member
)
586 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
588 if ((!context
) || (!context
->pdb_methods
)) {
589 DEBUG(0, ("invalid pdb_context specified!\n"));
593 return context
->pdb_methods
->add_aliasmem(context
->pdb_methods
,
597 static NTSTATUS
context_del_aliasmem(struct pdb_context
*context
,
598 const DOM_SID
*alias
,
599 const DOM_SID
*member
)
601 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
603 if ((!context
) || (!context
->pdb_methods
)) {
604 DEBUG(0, ("invalid pdb_context specified!\n"));
608 return context
->pdb_methods
->del_aliasmem(context
->pdb_methods
,
612 static NTSTATUS
context_enum_aliasmem(struct pdb_context
*context
,
613 const DOM_SID
*alias
, DOM_SID
**members
,
616 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
618 if ((!context
) || (!context
->pdb_methods
)) {
619 DEBUG(0, ("invalid pdb_context specified!\n"));
623 return context
->pdb_methods
->enum_aliasmem(context
->pdb_methods
,
624 alias
, members
, num
);
627 static NTSTATUS
context_enum_alias_memberships(struct pdb_context
*context
,
629 const DOM_SID
*domain_sid
,
630 const DOM_SID
*members
,
635 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
637 if ((!context
) || (!context
->pdb_methods
)) {
638 DEBUG(0, ("invalid pdb_context specified!\n"));
642 return context
->pdb_methods
->
643 enum_alias_memberships(context
->pdb_methods
, mem_ctx
,
644 domain_sid
, members
, num_members
,
645 alias_rids
, num_alias_rids
);
648 static NTSTATUS
context_lookup_rids(struct pdb_context
*context
,
650 const DOM_SID
*domain_sid
,
656 NTSTATUS ret
= NT_STATUS_UNSUCCESSFUL
;
658 if ((!context
) || (!context
->pdb_methods
)) {
659 DEBUG(0, ("invalid pdb_context specified!\n"));
663 return context
->pdb_methods
->lookup_rids(context
->pdb_methods
,
664 mem_ctx
, domain_sid
, num_rids
,
668 static BOOL
context_search_users(struct pdb_context
*context
,
669 struct pdb_search
*search
, uint16 acct_flags
)
671 if ((!context
) || (!context
->pdb_methods
)) {
672 DEBUG(0, ("invalid pdb_context specified!\n"));
676 return context
->pdb_methods
->search_users(context
->pdb_methods
,
680 static BOOL
context_search_groups(struct pdb_context
*context
,
681 struct pdb_search
*search
)
683 if ((!context
) || (!context
->pdb_methods
)) {
684 DEBUG(0, ("invalid pdb_context specified!\n"));
688 return context
->pdb_methods
->search_groups(context
->pdb_methods
,
692 static BOOL
context_search_aliases(struct pdb_context
*context
,
693 struct pdb_search
*search
,
696 if ((!context
) || (!context
->pdb_methods
)) {
697 DEBUG(0, ("invalid pdb_context specified!\n"));
701 return context
->pdb_methods
->search_aliases(context
->pdb_methods
,
705 /******************************************************************
706 Free and cleanup a pdb context, any associated data and anything
707 that the attached modules might have associated.
708 *******************************************************************/
710 static void free_pdb_context(struct pdb_context
**context
)
712 struct pdb_methods
*pdb_selected
= (*context
)->pdb_methods
;
714 while (pdb_selected
){
715 if(pdb_selected
->free_private_data
)
716 pdb_selected
->free_private_data(&(pdb_selected
->private_data
));
717 pdb_selected
= pdb_selected
->next
;
720 talloc_destroy((*context
)->mem_ctx
);
724 /******************************************************************
725 Make a pdb_methods from scratch
726 *******************************************************************/
728 static NTSTATUS
make_pdb_methods_name(struct pdb_methods
**methods
, struct pdb_context
*context
, const char *selected
)
730 char *module_name
= smb_xstrdup(selected
);
731 char *module_location
= NULL
, *p
;
732 struct pdb_init_function_entry
*entry
;
733 NTSTATUS nt_status
= NT_STATUS_UNSUCCESSFUL
;
735 lazy_initialize_passdb();
737 p
= strchr(module_name
, ':');
741 module_location
= p
+1;
742 trim_char(module_location
, ' ', ' ');
745 trim_char(module_name
, ' ', ' ');
748 DEBUG(5,("Attempting to find an passdb backend to match %s (%s)\n", selected
, module_name
));
750 entry
= pdb_find_backend_entry(module_name
);
752 /* Try to find a module that contains this module */
754 DEBUG(2,("No builtin backend found, trying to load plugin\n"));
755 if(NT_STATUS_IS_OK(smb_probe_module("pdb", module_name
)) && !(entry
= pdb_find_backend_entry(module_name
))) {
756 DEBUG(0,("Plugin is available, but doesn't register passdb backend %s\n", module_name
));
757 SAFE_FREE(module_name
);
758 return NT_STATUS_UNSUCCESSFUL
;
762 /* No such backend found */
764 DEBUG(0,("No builtin nor plugin backend for %s found\n", module_name
));
765 SAFE_FREE(module_name
);
766 return NT_STATUS_INVALID_PARAMETER
;
769 DEBUG(5,("Found pdb backend %s\n", module_name
));
770 nt_status
= entry
->init(context
, methods
, module_location
);
771 if (NT_STATUS_IS_OK(nt_status
)) {
772 DEBUG(5,("pdb backend %s has a valid init\n", selected
));
774 DEBUG(0,("pdb backend %s did not correctly init (error was %s)\n", selected
, nt_errstr(nt_status
)));
776 SAFE_FREE(module_name
);
780 /******************************************************************
781 Make a pdb_context from scratch.
782 *******************************************************************/
784 static NTSTATUS
make_pdb_context(struct pdb_context
**context
)
788 mem_ctx
= talloc_init("pdb_context internal allocation context");
791 DEBUG(0, ("make_pdb_context: talloc init failed!\n"));
792 return NT_STATUS_NO_MEMORY
;
795 *context
= TALLOC_P(mem_ctx
, struct pdb_context
);
797 DEBUG(0, ("make_pdb_context: talloc failed!\n"));
798 return NT_STATUS_NO_MEMORY
;
801 ZERO_STRUCTP(*context
);
803 (*context
)->mem_ctx
= mem_ctx
;
805 (*context
)->pdb_setsampwent
= context_setsampwent
;
806 (*context
)->pdb_endsampwent
= context_endsampwent
;
807 (*context
)->pdb_getsampwent
= context_getsampwent
;
808 (*context
)->pdb_getsampwnam
= context_getsampwnam
;
809 (*context
)->pdb_getsampwsid
= context_getsampwsid
;
810 (*context
)->pdb_add_sam_account
= context_add_sam_account
;
811 (*context
)->pdb_update_sam_account
= context_update_sam_account
;
812 (*context
)->pdb_delete_sam_account
= context_delete_sam_account
;
813 (*context
)->pdb_update_login_attempts
= context_update_login_attempts
;
814 (*context
)->pdb_getgrsid
= context_getgrsid
;
815 (*context
)->pdb_getgrgid
= context_getgrgid
;
816 (*context
)->pdb_getgrnam
= context_getgrnam
;
817 (*context
)->pdb_add_group_mapping_entry
= context_add_group_mapping_entry
;
818 (*context
)->pdb_update_group_mapping_entry
= context_update_group_mapping_entry
;
819 (*context
)->pdb_delete_group_mapping_entry
= context_delete_group_mapping_entry
;
820 (*context
)->pdb_enum_group_mapping
= context_enum_group_mapping
;
821 (*context
)->pdb_enum_group_members
= context_enum_group_members
;
822 (*context
)->pdb_enum_group_memberships
= context_enum_group_memberships
;
824 (*context
)->pdb_find_alias
= context_find_alias
;
825 (*context
)->pdb_create_alias
= context_create_alias
;
826 (*context
)->pdb_delete_alias
= context_delete_alias
;
827 (*context
)->pdb_get_aliasinfo
= context_get_aliasinfo
;
828 (*context
)->pdb_set_aliasinfo
= context_set_aliasinfo
;
829 (*context
)->pdb_add_aliasmem
= context_add_aliasmem
;
830 (*context
)->pdb_del_aliasmem
= context_del_aliasmem
;
831 (*context
)->pdb_enum_aliasmem
= context_enum_aliasmem
;
832 (*context
)->pdb_enum_alias_memberships
= context_enum_alias_memberships
;
833 (*context
)->pdb_lookup_rids
= context_lookup_rids
;
835 (*context
)->pdb_search_users
= context_search_users
;
836 (*context
)->pdb_search_groups
= context_search_groups
;
837 (*context
)->pdb_search_aliases
= context_search_aliases
;
839 (*context
)->free_fn
= free_pdb_context
;
845 /******************************************************************
846 Make a pdb_context, given an array of strings
847 *******************************************************************/
849 NTSTATUS
make_pdb_context_list(struct pdb_context
**context
, const char **selected
)
852 struct pdb_methods
*curmethods
, *tmpmethods
;
853 NTSTATUS nt_status
= NT_STATUS_UNSUCCESSFUL
;
854 BOOL have_guest
= False
;
856 if (!NT_STATUS_IS_OK(nt_status
= make_pdb_context(context
))) {
861 DEBUG(0, ("ERROR: empty passdb backend list!\n"));
866 if (strcmp(selected
[i
], "guest") == 0) {
869 /* Try to initialise pdb */
870 DEBUG(5,("Trying to load: %s\n", selected
[i
]));
871 if (!NT_STATUS_IS_OK(nt_status
= make_pdb_methods_name(&curmethods
, *context
, selected
[i
]))) {
872 DEBUG(1, ("Loading %s failed!\n", selected
[i
]));
873 free_pdb_context(context
);
876 curmethods
->parent
= *context
;
877 DLIST_ADD_END((*context
)->pdb_methods
, curmethods
, tmpmethods
);
884 if ( (lp_guestaccount() == NULL
) ||
885 (*lp_guestaccount() == '\0') ) {
886 /* We explicitly don't want guest access. No idea what
887 else that breaks, but be it that way. */
891 if (!NT_STATUS_IS_OK(nt_status
= make_pdb_methods_name(&curmethods
,
894 DEBUG(1, ("Loading guest module failed!\n"));
895 free_pdb_context(context
);
899 curmethods
->parent
= *context
;
900 DLIST_ADD_END((*context
)->pdb_methods
, curmethods
, tmpmethods
);
905 /******************************************************************
906 Make a pdb_context, given a text string.
907 *******************************************************************/
909 NTSTATUS
make_pdb_context_string(struct pdb_context
**context
, const char *selected
)
912 char **newsel
= str_list_make(selected
, NULL
);
913 ret
= make_pdb_context_list(context
, (const char **)newsel
);
914 str_list_free(&newsel
);
918 /******************************************************************
919 Return an already initialised pdb_context, to facilitate backward
920 compatibility (see functions below).
921 *******************************************************************/
923 static struct pdb_context
*pdb_get_static_context(BOOL reload
)
925 static struct pdb_context
*pdb_context
= NULL
;
927 if ((pdb_context
) && (reload
)) {
928 pdb_context
->free_fn(&pdb_context
);
929 if (!NT_STATUS_IS_OK(make_pdb_context_list(&pdb_context
, lp_passdb_backend()))) {
935 if (!NT_STATUS_IS_OK(make_pdb_context_list(&pdb_context
, lp_passdb_backend()))) {
943 /******************************************************************
944 Backward compatibility functions for the original passdb interface
945 *******************************************************************/
947 BOOL
pdb_setsampwent(BOOL update
, uint16 acb_mask
)
949 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
955 return NT_STATUS_IS_OK(pdb_context
->pdb_setsampwent(pdb_context
, update
, acb_mask
));
958 void pdb_endsampwent(void)
960 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
966 pdb_context
->pdb_endsampwent(pdb_context
);
969 BOOL
pdb_getsampwent(SAM_ACCOUNT
*user
)
971 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
977 return NT_STATUS_IS_OK(pdb_context
->pdb_getsampwent(pdb_context
, user
));
980 static SAM_ACCOUNT
*sam_account_cache
= NULL
;
982 BOOL
pdb_getsampwnam(SAM_ACCOUNT
*sam_acct
, const char *username
)
984 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
990 if (!NT_STATUS_IS_OK(pdb_context
->pdb_getsampwnam(pdb_context
,
991 sam_acct
, username
)))
994 if (sam_account_cache
!= NULL
) {
995 pdb_free_sam(&sam_account_cache
);
996 sam_account_cache
= NULL
;
999 pdb_copy_sam_account(sam_acct
, &sam_account_cache
);
1003 BOOL
pdb_getsampwsid(SAM_ACCOUNT
*sam_acct
, const DOM_SID
*sid
)
1005 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1011 if ((sam_account_cache
!= NULL
) &&
1012 (sid_equal(sid
, pdb_get_user_sid(sam_account_cache
))))
1013 return pdb_copy_sam_account(sam_account_cache
, &sam_acct
);
1015 return NT_STATUS_IS_OK(pdb_context
->pdb_getsampwsid(pdb_context
, sam_acct
, sid
));
1018 BOOL
pdb_add_sam_account(SAM_ACCOUNT
*sam_acct
)
1020 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1026 return NT_STATUS_IS_OK(pdb_context
->pdb_add_sam_account(pdb_context
, sam_acct
));
1029 BOOL
pdb_update_sam_account(SAM_ACCOUNT
*sam_acct
)
1031 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1037 if (sam_account_cache
!= NULL
) {
1038 pdb_free_sam(&sam_account_cache
);
1039 sam_account_cache
= NULL
;
1042 return NT_STATUS_IS_OK(pdb_context
->pdb_update_sam_account(pdb_context
, sam_acct
));
1045 BOOL
pdb_delete_sam_account(SAM_ACCOUNT
*sam_acct
)
1047 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1053 if (sam_account_cache
!= NULL
) {
1054 pdb_free_sam(&sam_account_cache
);
1055 sam_account_cache
= NULL
;
1058 return NT_STATUS_IS_OK(pdb_context
->pdb_delete_sam_account(pdb_context
, sam_acct
));
1061 NTSTATUS
pdb_update_login_attempts(SAM_ACCOUNT
*sam_acct
, BOOL success
)
1063 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1066 return NT_STATUS_NOT_IMPLEMENTED
;
1069 return pdb_context
->pdb_update_login_attempts(pdb_context
, sam_acct
, success
);
1072 BOOL
pdb_getgrsid(GROUP_MAP
*map
, DOM_SID sid
)
1074 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1080 return NT_STATUS_IS_OK(pdb_context
->
1081 pdb_getgrsid(pdb_context
, map
, sid
));
1084 BOOL
pdb_getgrgid(GROUP_MAP
*map
, gid_t gid
)
1086 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1092 return NT_STATUS_IS_OK(pdb_context
->
1093 pdb_getgrgid(pdb_context
, map
, gid
));
1096 BOOL
pdb_getgrnam(GROUP_MAP
*map
, const char *name
)
1098 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1104 return NT_STATUS_IS_OK(pdb_context
->
1105 pdb_getgrnam(pdb_context
, map
, name
));
1108 BOOL
pdb_add_group_mapping_entry(GROUP_MAP
*map
)
1110 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1116 return NT_STATUS_IS_OK(pdb_context
->
1117 pdb_add_group_mapping_entry(pdb_context
, map
));
1120 BOOL
pdb_update_group_mapping_entry(GROUP_MAP
*map
)
1122 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1128 return NT_STATUS_IS_OK(pdb_context
->
1129 pdb_update_group_mapping_entry(pdb_context
, map
));
1132 BOOL
pdb_delete_group_mapping_entry(DOM_SID sid
)
1134 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1140 return NT_STATUS_IS_OK(pdb_context
->
1141 pdb_delete_group_mapping_entry(pdb_context
, sid
));
1144 BOOL
pdb_enum_group_mapping(enum SID_NAME_USE sid_name_use
, GROUP_MAP
**rmap
,
1145 int *num_entries
, BOOL unix_only
)
1147 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1153 return NT_STATUS_IS_OK(pdb_context
->
1154 pdb_enum_group_mapping(pdb_context
, sid_name_use
,
1155 rmap
, num_entries
, unix_only
));
1158 NTSTATUS
pdb_enum_group_members(TALLOC_CTX
*mem_ctx
,
1160 uint32
**member_rids
,
1163 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1166 return NT_STATUS_UNSUCCESSFUL
;
1169 return pdb_context
->pdb_enum_group_members(pdb_context
, mem_ctx
, sid
,
1170 member_rids
, num_members
);
1173 NTSTATUS
pdb_enum_group_memberships(const char *username
, gid_t primary_gid
,
1174 DOM_SID
**sids
, gid_t
**gids
,
1177 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1180 return NT_STATUS_UNSUCCESSFUL
;
1183 return pdb_context
->pdb_enum_group_memberships(pdb_context
, username
,
1184 primary_gid
, sids
, gids
,
1188 BOOL
pdb_find_alias(const char *name
, DOM_SID
*sid
)
1190 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1196 return NT_STATUS_IS_OK(pdb_context
->pdb_find_alias(pdb_context
,
1200 NTSTATUS
pdb_create_alias(const char *name
, uint32
*rid
)
1202 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1205 return NT_STATUS_NOT_IMPLEMENTED
;
1208 return pdb_context
->pdb_create_alias(pdb_context
, name
, rid
);
1211 BOOL
pdb_delete_alias(const DOM_SID
*sid
)
1213 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1219 return NT_STATUS_IS_OK(pdb_context
->pdb_delete_alias(pdb_context
,
1224 BOOL
pdb_get_aliasinfo(const DOM_SID
*sid
, struct acct_info
*info
)
1226 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1232 return NT_STATUS_IS_OK(pdb_context
->pdb_get_aliasinfo(pdb_context
, sid
,
1236 BOOL
pdb_set_aliasinfo(const DOM_SID
*sid
, struct acct_info
*info
)
1238 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1244 return NT_STATUS_IS_OK(pdb_context
->pdb_set_aliasinfo(pdb_context
, sid
,
1248 BOOL
pdb_add_aliasmem(const DOM_SID
*alias
, const DOM_SID
*member
)
1250 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1256 return NT_STATUS_IS_OK(pdb_context
->
1257 pdb_add_aliasmem(pdb_context
, alias
, member
));
1260 BOOL
pdb_del_aliasmem(const DOM_SID
*alias
, const DOM_SID
*member
)
1262 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1268 return NT_STATUS_IS_OK(pdb_context
->
1269 pdb_del_aliasmem(pdb_context
, alias
, member
));
1272 BOOL
pdb_enum_aliasmem(const DOM_SID
*alias
,
1273 DOM_SID
**members
, int *num_members
)
1275 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1281 return NT_STATUS_IS_OK(pdb_context
->
1282 pdb_enum_aliasmem(pdb_context
, alias
,
1283 members
, num_members
));
1286 BOOL
pdb_enum_alias_memberships(TALLOC_CTX
*mem_ctx
, const DOM_SID
*domain_sid
,
1287 const DOM_SID
*members
, int num_members
,
1288 uint32
**alias_rids
, int *num_alias_rids
)
1290 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1296 return NT_STATUS_IS_OK(pdb_context
->
1297 pdb_enum_alias_memberships(pdb_context
, mem_ctx
,
1299 members
, num_members
,
1304 NTSTATUS
pdb_lookup_rids(TALLOC_CTX
*mem_ctx
,
1305 const DOM_SID
*domain_sid
,
1308 const char ***names
,
1311 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1314 return NT_STATUS_NOT_IMPLEMENTED
;
1317 return pdb_context
->pdb_lookup_rids(pdb_context
, mem_ctx
, domain_sid
,
1318 num_rids
, rids
, names
, attrs
);
1321 /***************************************************************
1322 Initialize the static context (at smbd startup etc).
1324 If uninitialised, context will auto-init on first use.
1325 ***************************************************************/
1327 BOOL
initialize_password_db(BOOL reload
)
1329 return (pdb_get_static_context(reload
) != NULL
);
1333 /***************************************************************************
1334 Default implementations of some functions.
1335 ****************************************************************************/
1337 static NTSTATUS
pdb_default_getsampwnam (struct pdb_methods
*methods
, SAM_ACCOUNT
*user
, const char *sname
)
1339 return NT_STATUS_NO_SUCH_USER
;
1342 static NTSTATUS
pdb_default_getsampwsid(struct pdb_methods
*my_methods
, SAM_ACCOUNT
* user
, const DOM_SID
*sid
)
1344 return NT_STATUS_NO_SUCH_USER
;
1347 static NTSTATUS
pdb_default_add_sam_account (struct pdb_methods
*methods
, SAM_ACCOUNT
*newpwd
)
1349 DEBUG(0,("this backend (%s) should not be listed as the first passdb backend! You can't add users to it.\n", methods
->name
));
1350 return NT_STATUS_NOT_IMPLEMENTED
;
1353 static NTSTATUS
pdb_default_update_sam_account (struct pdb_methods
*methods
, SAM_ACCOUNT
*newpwd
)
1355 return NT_STATUS_NOT_IMPLEMENTED
;
1358 static NTSTATUS
pdb_default_delete_sam_account (struct pdb_methods
*methods
, SAM_ACCOUNT
*pwd
)
1360 return NT_STATUS_NOT_IMPLEMENTED
;
1363 static NTSTATUS
pdb_default_update_login_attempts (struct pdb_methods
*methods
, SAM_ACCOUNT
*newpwd
, BOOL success
)
1365 return NT_STATUS_OK
;
1368 static NTSTATUS
pdb_default_setsampwent(struct pdb_methods
*methods
, BOOL update
, uint16 acb_mask
)
1370 return NT_STATUS_NOT_IMPLEMENTED
;
1373 static NTSTATUS
pdb_default_getsampwent(struct pdb_methods
*methods
, SAM_ACCOUNT
*user
)
1375 return NT_STATUS_NOT_IMPLEMENTED
;
1378 static void pdb_default_endsampwent(struct pdb_methods
*methods
)
1380 return; /* NT_STATUS_NOT_IMPLEMENTED; */
1383 static void add_uid_to_array_unique(TALLOC_CTX
*mem_ctx
,
1384 uid_t uid
, uid_t
**uids
, int *num
)
1388 for (i
=0; i
<*num
; i
++) {
1389 if ((*uids
)[i
] == uid
)
1393 *uids
= TALLOC_REALLOC_ARRAY(mem_ctx
, *uids
, uid_t
, *num
+1);
1398 (*uids
)[*num
] = uid
;
1402 static BOOL
get_memberuids(TALLOC_CTX
*mem_ctx
, gid_t gid
, uid_t
**uids
,
1407 struct sys_pwent
*userlist
, *user
;
1412 /* We only look at our own sam, so don't care about imported stuff */
1416 if ((grp
= getgrgid(gid
)) == NULL
) {
1421 /* Primary group members */
1423 userlist
= getpwent_list();
1425 for (user
= userlist
; user
!= NULL
; user
= user
->next
) {
1426 if (user
->pw_gid
!= gid
)
1428 add_uid_to_array_unique(mem_ctx
, user
->pw_uid
, uids
, num
);
1431 pwent_free(userlist
);
1433 /* Secondary group members */
1435 for (gr
= grp
->gr_mem
; (*gr
!= NULL
) && ((*gr
)[0] != '\0'); gr
+= 1) {
1436 struct passwd
*pw
= getpwnam(*gr
);
1440 add_uid_to_array_unique(mem_ctx
, pw
->pw_uid
, uids
, num
);
1448 NTSTATUS
pdb_default_enum_group_members(struct pdb_methods
*methods
,
1449 TALLOC_CTX
*mem_ctx
,
1450 const DOM_SID
*group
,
1451 uint32
**member_rids
,
1458 *member_rids
= NULL
;
1461 if (!NT_STATUS_IS_OK(sid_to_gid(group
, &gid
)))
1462 return NT_STATUS_NO_SUCH_GROUP
;
1464 if(!get_memberuids(mem_ctx
, gid
, &uids
, &num_uids
))
1465 return NT_STATUS_NO_SUCH_GROUP
;
1468 return NT_STATUS_OK
;
1470 *member_rids
= TALLOC_ZERO_ARRAY(mem_ctx
, uint32
, num_uids
);
1472 for (i
=0; i
<num_uids
; i
++) {
1475 if (!NT_STATUS_IS_OK(uid_to_sid(&sid
, uids
[i
]))) {
1476 DEBUG(1, ("Could not map member uid to SID\n"));
1480 if (!sid_check_is_in_our_domain(&sid
)) {
1481 DEBUG(1, ("Inconsistent SAM -- group member uid not "
1482 "in our domain\n"));
1486 sid_peek_rid(&sid
, &(*member_rids
)[*num_members
]);
1490 return NT_STATUS_OK
;
1493 NTSTATUS
pdb_default_lookup_rids(struct pdb_methods
*methods
,
1494 TALLOC_CTX
*mem_ctx
,
1495 const DOM_SID
*domain_sid
,
1498 const char ***names
,
1503 BOOL have_mapped
= False
;
1504 BOOL have_unmapped
= False
;
1506 (*names
) = TALLOC_ZERO_ARRAY(mem_ctx
, const char *, num_rids
);
1507 (*attrs
) = TALLOC_ZERO_ARRAY(mem_ctx
, uint32
, num_rids
);
1509 if ((num_rids
!= 0) && (((*names
) == NULL
) || ((*attrs
) == NULL
)))
1510 return NT_STATUS_NO_MEMORY
;
1512 if (!sid_equal(domain_sid
, get_global_sam_sid())) {
1513 /* TODO: Sooner or later we need to look up BUILTIN rids as
1518 for (i
= 0; i
< num_rids
; i
++) {
1522 enum SID_NAME_USE type
;
1524 (*attrs
)[i
] = SID_NAME_UNKNOWN
;
1526 sid_copy(&sid
, domain_sid
);
1527 sid_append_rid(&sid
, rids
[i
]);
1529 if (lookup_sid(&sid
, domname
, tmpname
, &type
)) {
1530 (*attrs
)[i
] = (uint32
)type
;
1531 (*names
)[i
] = talloc_strdup(mem_ctx
, tmpname
);
1532 if ((*names
)[i
] == NULL
)
1533 return NT_STATUS_NO_MEMORY
;
1534 DEBUG(5,("lookup_rids: %s:%d\n", (*names
)[i
],
1538 have_unmapped
= True
;
1544 result
= NT_STATUS_NONE_MAPPED
;
1547 result
= have_unmapped
? STATUS_SOME_UNMAPPED
: NT_STATUS_OK
;
1552 static struct pdb_search
*pdb_search_init(enum pdb_search_type type
)
1554 TALLOC_CTX
*mem_ctx
;
1555 struct pdb_search
*result
;
1557 mem_ctx
= talloc_init("pdb_search");
1558 if (mem_ctx
== NULL
) {
1559 DEBUG(0, ("talloc_init failed\n"));
1563 result
= TALLOC_P(mem_ctx
, struct pdb_search
);
1564 if (result
== NULL
) {
1565 DEBUG(0, ("talloc failed\n"));
1569 result
->mem_ctx
= mem_ctx
;
1570 result
->type
= type
;
1571 result
->cache
= NULL
;
1572 result
->num_entries
= 0;
1573 result
->cache_size
= 0;
1574 result
->search_ended
= False
;
1576 /* Segfault appropriately if not initialized */
1577 result
->next_entry
= NULL
;
1578 result
->search_end
= NULL
;
1583 static void fill_displayentry(TALLOC_CTX
*mem_ctx
, uint32 rid
,
1585 const char *account_name
,
1586 const char *fullname
,
1587 const char *description
,
1588 struct samr_displayentry
*entry
)
1591 entry
->acct_flags
= acct_flags
;
1593 if (account_name
!= NULL
)
1594 entry
->account_name
= talloc_strdup(mem_ctx
, account_name
);
1596 entry
->account_name
= "";
1598 if (fullname
!= NULL
)
1599 entry
->fullname
= talloc_strdup(mem_ctx
, fullname
);
1601 entry
->fullname
= "";
1603 if (description
!= NULL
)
1604 entry
->description
= talloc_strdup(mem_ctx
, description
);
1606 entry
->description
= "";
1609 static BOOL user_search_in_progress
= False
;
1610 struct user_search
{
1614 static BOOL
next_entry_users(struct pdb_search
*s
,
1615 struct samr_displayentry
*entry
)
1617 struct user_search
*state
= s
->private_data
;
1618 SAM_ACCOUNT
*user
= NULL
;
1622 status
= pdb_init_sam(&user
);
1623 if (!NT_STATUS_IS_OK(status
)) {
1624 DEBUG(0, ("Could not pdb_init_sam\n"));
1628 if (!pdb_getsampwent(user
)) {
1629 pdb_free_sam(&user
);
1633 if ((state
->acct_flags
!= 0) &&
1634 ((pdb_get_acct_ctrl(user
) & state
->acct_flags
) == 0)) {
1635 pdb_free_sam(&user
);
1639 fill_displayentry(s
->mem_ctx
, pdb_get_user_rid(user
),
1640 pdb_get_acct_ctrl(user
), pdb_get_username(user
),
1641 pdb_get_fullname(user
), pdb_get_acct_desc(user
),
1644 pdb_free_sam(&user
);
1648 static void search_end_users(struct pdb_search
*search
)
1651 user_search_in_progress
= False
;
1654 static BOOL
pdb_default_search_users(struct pdb_methods
*methods
,
1655 struct pdb_search
*search
,
1658 struct user_search
*state
;
1660 if (user_search_in_progress
) {
1661 DEBUG(1, ("user search in progress\n"));
1665 if (!pdb_setsampwent(False
, acct_flags
)) {
1666 DEBUG(5, ("Could not start search\n"));
1670 user_search_in_progress
= True
;
1672 state
= TALLOC_P(search
->mem_ctx
, struct user_search
);
1673 if (state
== NULL
) {
1674 DEBUG(0, ("talloc failed\n"));
1678 state
->acct_flags
= acct_flags
;
1680 search
->private_data
= state
;
1681 search
->next_entry
= next_entry_users
;
1682 search
->search_end
= search_end_users
;
1686 struct group_search
{
1688 int num_groups
, current_group
;
1691 static BOOL
next_entry_groups(struct pdb_search
*s
,
1692 struct samr_displayentry
*entry
)
1694 struct group_search
*state
= s
->private_data
;
1696 GROUP_MAP
*map
= &state
->groups
[state
->current_group
];
1698 if (state
->current_group
== state
->num_groups
)
1701 sid_peek_rid(&map
->sid
, &rid
);
1703 fill_displayentry(s
->mem_ctx
, rid
, 0, map
->nt_name
, NULL
, map
->comment
,
1706 state
->current_group
+= 1;
1710 static void search_end_groups(struct pdb_search
*search
)
1712 struct group_search
*state
= search
->private_data
;
1713 SAFE_FREE(state
->groups
);
1716 static BOOL
pdb_search_grouptype(struct pdb_search
*search
,
1717 enum SID_NAME_USE type
)
1719 struct group_search
*state
;
1721 state
= TALLOC_P(search
->mem_ctx
, struct group_search
);
1722 if (state
== NULL
) {
1723 DEBUG(0, ("talloc failed\n"));
1727 if (!pdb_enum_group_mapping(type
, &state
->groups
, &state
->num_groups
,
1729 DEBUG(0, ("Could not enum groups\n"));
1733 state
->current_group
= 0;
1734 search
->private_data
= state
;
1735 search
->next_entry
= next_entry_groups
;
1736 search
->search_end
= search_end_groups
;
1740 static BOOL
pdb_default_search_groups(struct pdb_methods
*methods
,
1741 struct pdb_search
*search
)
1743 return pdb_search_grouptype(search
, SID_NAME_DOM_GRP
);
1746 static BOOL
pdb_default_search_aliases(struct pdb_methods
*methods
,
1747 struct pdb_search
*search
,
1751 if (sid_equal(sid
, get_global_sam_sid()))
1752 return pdb_search_grouptype(search
, SID_NAME_ALIAS
);
1754 if (sid_equal(sid
, &global_sid_Builtin
))
1755 return pdb_search_grouptype(search
, SID_NAME_WKN_GRP
);
1757 DEBUG(3, ("unknown domain sid: %s\n", sid_string_static(sid
)));
1761 static struct samr_displayentry
*pdb_search_getentry(struct pdb_search
*search
,
1764 if (idx
< search
->num_entries
)
1765 return &search
->cache
[idx
];
1767 if (search
->search_ended
)
1770 while (idx
>= search
->num_entries
) {
1771 struct samr_displayentry entry
;
1773 if (!search
->next_entry(search
, &entry
)) {
1774 search
->search_end(search
);
1775 search
->search_ended
= True
;
1779 ADD_TO_LARGE_ARRAY(search
->mem_ctx
, struct samr_displayentry
,
1780 entry
, &search
->cache
, &search
->num_entries
,
1781 &search
->cache_size
);
1784 return (search
->num_entries
> idx
) ? &search
->cache
[idx
] : NULL
;
1787 struct pdb_search
*pdb_search_users(uint16 acct_flags
)
1789 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1790 struct pdb_search
*result
;
1792 if (pdb_context
== NULL
) return NULL
;
1794 result
= pdb_search_init(PDB_USER_SEARCH
);
1795 if (result
== NULL
) return NULL
;
1797 if (!pdb_context
->pdb_search_users(pdb_context
, result
, acct_flags
)) {
1798 talloc_destroy(result
->mem_ctx
);
1804 struct pdb_search
*pdb_search_groups(void)
1806 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1807 struct pdb_search
*result
;
1809 if (pdb_context
== NULL
) return NULL
;
1811 result
= pdb_search_init(PDB_GROUP_SEARCH
);
1812 if (result
== NULL
) return NULL
;
1814 if (!pdb_context
->pdb_search_groups(pdb_context
, result
)) {
1815 talloc_destroy(result
->mem_ctx
);
1821 struct pdb_search
*pdb_search_aliases(const DOM_SID
*sid
)
1823 struct pdb_context
*pdb_context
= pdb_get_static_context(False
);
1824 struct pdb_search
*result
;
1826 if (pdb_context
== NULL
) return NULL
;
1828 result
= pdb_search_init(PDB_ALIAS_SEARCH
);
1829 if (result
== NULL
) return NULL
;
1831 if (!pdb_context
->pdb_search_aliases(pdb_context
, result
, sid
)) {
1832 talloc_destroy(result
->mem_ctx
);
1838 uint32
pdb_search_entries(struct pdb_search
*search
,
1839 uint32 start_idx
, uint32 max_entries
,
1840 struct samr_displayentry
**result
)
1842 struct samr_displayentry
*end_entry
;
1843 uint32 end_idx
= start_idx
+max_entries
-1;
1845 /* The first entry needs to be searched after the last. Otherwise the
1846 * first entry might have moved due to a realloc during the search for
1847 * the last entry. */
1849 end_entry
= pdb_search_getentry(search
, end_idx
);
1850 *result
= pdb_search_getentry(search
, start_idx
);
1852 if (end_entry
!= NULL
)
1855 if (start_idx
>= search
->num_entries
)
1858 return search
->num_entries
- start_idx
;
1861 void pdb_search_destroy(struct pdb_search
*search
)
1866 if (!search
->search_ended
)
1867 search
->search_end(search
);
1869 talloc_destroy(search
->mem_ctx
);
1872 NTSTATUS
make_pdb_methods(TALLOC_CTX
*mem_ctx
, PDB_METHODS
**methods
)
1874 *methods
= TALLOC_P(mem_ctx
, struct pdb_methods
);
1877 return NT_STATUS_NO_MEMORY
;
1880 ZERO_STRUCTP(*methods
);
1882 (*methods
)->setsampwent
= pdb_default_setsampwent
;
1883 (*methods
)->endsampwent
= pdb_default_endsampwent
;
1884 (*methods
)->getsampwent
= pdb_default_getsampwent
;
1885 (*methods
)->getsampwnam
= pdb_default_getsampwnam
;
1886 (*methods
)->getsampwsid
= pdb_default_getsampwsid
;
1887 (*methods
)->add_sam_account
= pdb_default_add_sam_account
;
1888 (*methods
)->update_sam_account
= pdb_default_update_sam_account
;
1889 (*methods
)->delete_sam_account
= pdb_default_delete_sam_account
;
1890 (*methods
)->update_login_attempts
= pdb_default_update_login_attempts
;
1892 (*methods
)->getgrsid
= pdb_default_getgrsid
;
1893 (*methods
)->getgrgid
= pdb_default_getgrgid
;
1894 (*methods
)->getgrnam
= pdb_default_getgrnam
;
1895 (*methods
)->add_group_mapping_entry
= pdb_default_add_group_mapping_entry
;
1896 (*methods
)->update_group_mapping_entry
= pdb_default_update_group_mapping_entry
;
1897 (*methods
)->delete_group_mapping_entry
= pdb_default_delete_group_mapping_entry
;
1898 (*methods
)->enum_group_mapping
= pdb_default_enum_group_mapping
;
1899 (*methods
)->enum_group_members
= pdb_default_enum_group_members
;
1900 (*methods
)->enum_group_memberships
= pdb_default_enum_group_memberships
;
1901 (*methods
)->find_alias
= pdb_default_find_alias
;
1902 (*methods
)->create_alias
= pdb_default_create_alias
;
1903 (*methods
)->delete_alias
= pdb_default_delete_alias
;
1904 (*methods
)->get_aliasinfo
= pdb_default_get_aliasinfo
;
1905 (*methods
)->set_aliasinfo
= pdb_default_set_aliasinfo
;
1906 (*methods
)->add_aliasmem
= pdb_default_add_aliasmem
;
1907 (*methods
)->del_aliasmem
= pdb_default_del_aliasmem
;
1908 (*methods
)->enum_aliasmem
= pdb_default_enum_aliasmem
;
1909 (*methods
)->enum_alias_memberships
= pdb_default_alias_memberships
;
1910 (*methods
)->lookup_rids
= pdb_default_lookup_rids
;
1911 (*methods
)->search_users
= pdb_default_search_users
;
1912 (*methods
)->search_groups
= pdb_default_search_groups
;
1913 (*methods
)->search_aliases
= pdb_default_search_aliases
;
1915 return NT_STATUS_OK
;