2 Unix SMB/CIFS implementation.
3 Authentication utility functions
4 Copyright (C) Volker Lendecke 2010
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program. If not, see <http://www.gnu.org/licenses/>.
22 #include "librpc/gen_ndr/samr.h"
23 #include "../lib/tsocket/tsocket.h"
26 #define DBGC_CLASS DBGC_AUTH
28 static int clear_samr_Password(struct samr_Password
*password
)
30 memset(password
->hash
, '\0', sizeof(password
->hash
));
34 static int clear_string(char *password
)
36 memset(password
, '\0', strlen(password
));
40 /****************************************************************************
41 Create an auth_usersupplied_data structure
42 ****************************************************************************/
44 NTSTATUS
make_user_info(TALLOC_CTX
*mem_ctx
,
45 struct auth_usersupplied_info
**ret_user_info
,
47 const char *internal_username
,
48 const char *client_domain
,
50 const char *workstation_name
,
51 const struct tsocket_address
*remote_address
,
52 const struct tsocket_address
*local_address
,
53 const char *service_description
,
54 const DATA_BLOB
*lm_pwd
,
55 const DATA_BLOB
*nt_pwd
,
56 const struct samr_Password
*lm_interactive_pwd
,
57 const struct samr_Password
*nt_interactive_pwd
,
58 const char *plaintext_password
,
59 enum auth_password_state password_state
)
61 struct auth_usersupplied_info
*user_info
;
62 *ret_user_info
= NULL
;
64 DEBUG(5,("attempting to make a user_info for %s (%s)\n", internal_username
, smb_name
));
66 user_info
= talloc_zero(mem_ctx
, struct auth_usersupplied_info
);
67 if (user_info
== NULL
) {
68 DEBUG(0,("talloc failed for user_info\n"));
69 return NT_STATUS_NO_MEMORY
;
72 DEBUG(5,("making strings for %s's user_info struct\n", internal_username
));
74 user_info
->client
.account_name
= talloc_strdup(user_info
, smb_name
);
75 if (user_info
->client
.account_name
== NULL
) {
76 TALLOC_FREE(user_info
);
77 return NT_STATUS_NO_MEMORY
;
80 user_info
->mapped
.account_name
= talloc_strdup(user_info
, internal_username
);
81 if (user_info
->mapped
.account_name
== NULL
) {
82 TALLOC_FREE(user_info
);
83 return NT_STATUS_NO_MEMORY
;
86 user_info
->mapped
.domain_name
= talloc_strdup(user_info
, domain
);
87 if (user_info
->mapped
.domain_name
== NULL
) {
88 TALLOC_FREE(user_info
);
89 return NT_STATUS_NO_MEMORY
;
92 user_info
->client
.domain_name
= talloc_strdup(user_info
, client_domain
);
93 if (user_info
->client
.domain_name
== NULL
) {
94 TALLOC_FREE(user_info
);
95 return NT_STATUS_NO_MEMORY
;
98 user_info
->workstation_name
= talloc_strdup(user_info
, workstation_name
);
99 if (user_info
->workstation_name
== NULL
) {
100 TALLOC_FREE(user_info
);
101 return NT_STATUS_NO_MEMORY
;
104 user_info
->remote_host
= tsocket_address_copy(remote_address
, user_info
);
105 if (user_info
->remote_host
== NULL
) {
106 TALLOC_FREE(user_info
);
107 return NT_STATUS_NO_MEMORY
;
110 if (local_address
!= NULL
) {
111 user_info
->local_host
= tsocket_address_copy(local_address
,
113 if (user_info
->local_host
== NULL
) {
114 TALLOC_FREE(user_info
);
115 return NT_STATUS_NO_MEMORY
;
119 user_info
->service_description
= talloc_strdup(user_info
, service_description
);
120 if (user_info
->service_description
== NULL
) {
121 TALLOC_FREE(user_info
);
122 return NT_STATUS_NO_MEMORY
;
125 DEBUG(5,("making blobs for %s's user_info struct\n", internal_username
));
127 if (lm_pwd
&& lm_pwd
->data
) {
128 user_info
->password
.response
.lanman
= data_blob_talloc(user_info
, lm_pwd
->data
, lm_pwd
->length
);
129 if (user_info
->password
.response
.lanman
.data
== NULL
) {
130 TALLOC_FREE(user_info
);
131 return NT_STATUS_NO_MEMORY
;
134 if (nt_pwd
&& nt_pwd
->data
) {
135 user_info
->password
.response
.nt
= data_blob_talloc(user_info
, nt_pwd
->data
, nt_pwd
->length
);
136 if (user_info
->password
.response
.nt
.data
== NULL
) {
137 TALLOC_FREE(user_info
);
138 return NT_STATUS_NO_MEMORY
;
141 if (lm_interactive_pwd
) {
142 user_info
->password
.hash
.lanman
= talloc(user_info
, struct samr_Password
);
143 if (user_info
->password
.hash
.lanman
== NULL
) {
144 TALLOC_FREE(user_info
);
145 return NT_STATUS_NO_MEMORY
;
147 memcpy(user_info
->password
.hash
.lanman
->hash
, lm_interactive_pwd
->hash
,
148 sizeof(user_info
->password
.hash
.lanman
->hash
));
149 talloc_set_destructor(user_info
->password
.hash
.lanman
, clear_samr_Password
);
152 if (nt_interactive_pwd
) {
153 user_info
->password
.hash
.nt
= talloc(user_info
, struct samr_Password
);
154 if (user_info
->password
.hash
.nt
== NULL
) {
155 TALLOC_FREE(user_info
);
156 return NT_STATUS_NO_MEMORY
;
158 memcpy(user_info
->password
.hash
.nt
->hash
, nt_interactive_pwd
->hash
,
159 sizeof(user_info
->password
.hash
.nt
->hash
));
160 talloc_set_destructor(user_info
->password
.hash
.nt
, clear_samr_Password
);
163 if (plaintext_password
) {
164 user_info
->password
.plaintext
= talloc_strdup(user_info
, plaintext_password
);
165 if (user_info
->password
.plaintext
== NULL
) {
166 TALLOC_FREE(user_info
);
167 return NT_STATUS_NO_MEMORY
;
169 talloc_set_destructor(user_info
->password
.plaintext
, clear_string
);
172 user_info
->password_state
= password_state
;
174 user_info
->logon_parameters
= 0;
176 DEBUG(10,("made a user_info for %s (%s)\n", internal_username
, smb_name
));
177 *ret_user_info
= user_info
;