2 Unix SMB/Netbios implementation.
5 Copyright (C) Andrew Tridgell 1992-1998
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
23 extern int DEBUGLEVEL
;
25 /* internal functions */
26 static struct passwd
*uname_string_combinations(char *s
, struct passwd
* (*fn
) (char *), int N
);
27 static struct passwd
*uname_string_combinations2(char *s
, int offset
, struct passwd
* (*fn
) (char *), int N
);
29 /****************************************************************************
30 Get a users home directory.
31 ****************************************************************************/
33 char *get_user_home_dir(char *user
)
35 static struct passwd
*pass
;
37 pass
= Get_Pwnam(user
, False
);
39 if (!pass
) return(NULL
);
44 /*******************************************************************
45 Map a username from a dos name to a unix name by looking in the username
46 map. Note that this modifies the name in place.
47 This is the main function that should be called *once* on
48 any incoming or new username - in order to canonicalize the name.
49 This is being done to de-couple the case conversions from the user mapping
50 function. Previously, the map_username was being called
51 every time Get_Pwnam was called.
52 Returns True if username was changed, false otherwise.
53 ********************************************************************/
55 BOOL
map_username(char *user
)
57 static BOOL initialised
=False
;
58 static fstring last_from
,last_to
;
60 char *mapfile
= lp_username_map();
63 BOOL mapped_user
= False
;
72 *last_from
= *last_to
= 0;
76 if (strequal(user
,last_to
))
79 if (strequal(user
,last_from
)) {
80 DEBUG(3,("Mapped user %s to %s\n",user
,last_to
));
81 fstrcpy(user
,last_to
);
85 f
= sys_fopen(mapfile
,"r");
87 DEBUG(0,("can't open username map %s\n",mapfile
));
91 DEBUG(4,("Scanning username map %s\n",mapfile
));
93 while((s
=fgets_slash(buf
,sizeof(buf
),f
))!=NULL
) {
95 char *dosname
= strchr(unixname
,'=');
96 BOOL return_if_mapped
= False
;
103 while (isspace(*unixname
))
105 if ('!' == *unixname
) {
106 return_if_mapped
= True
;
108 while (*unixname
&& isspace(*unixname
))
112 if (!*unixname
|| strchr("#;",*unixname
))
116 int l
= strlen(unixname
);
117 while (l
&& isspace(unixname
[l
-1])) {
123 if (strchr(dosname
,'*') || user_in_list(user
,dosname
)) {
124 DEBUG(3,("Mapped user %s to %s\n",user
,unixname
));
126 fstrcpy(last_from
,user
);
127 sscanf(unixname
,"%s",user
);
128 fstrcpy(last_to
,user
);
129 if(return_if_mapped
) {
139 * Setup the last_from and last_to as an optimization so
140 * that we don't scan the file again for the same user.
142 fstrcpy(last_from
,user
);
143 fstrcpy(last_to
,user
);
148 /****************************************************************************
150 ****************************************************************************/
152 static struct passwd
*_Get_Pwnam(char *s
)
156 ret
= sys_getpwnam(s
);
158 #ifdef HAVE_GETPWANAM
159 struct passwd_adjunct
*pwret
;
160 pwret
= getpwanam(s
);
161 if (pwret
&& pwret
->pwa_passwd
) {
162 pstrcpy(ret
->pw_passwd
,pwret
->pwa_passwd
);
171 /****************************************************************************
172 A wrapper for getpwnam() that tries with all lower and all upper case
173 if the initial name fails. Also tried with first letter capitalised
174 Note that this can change user!
175 ****************************************************************************/
177 struct passwd
*Get_Pwnam(char *user
,BOOL allow_change
)
181 int usernamelevel
= lp_usernamelevel();
185 if (!user
|| !(*user
))
188 StrnCpy(user2
,user
,sizeof(user2
)-1);
194 ret
= _Get_Pwnam(user
);
199 ret
= _Get_Pwnam(user
);
204 ret
= _Get_Pwnam(user
);
208 /* Try with first letter capitalised. */
209 if (strlen(user
) > 1)
211 ret
= _Get_Pwnam(user
);
215 /* try with last letter capitalised */
217 last_char
= strlen(user
)-1;
218 user
[last_char
] = toupper(user
[last_char
]);
219 ret
= _Get_Pwnam(user
);
223 /* Try all combinations up to usernamelevel. */
225 ret
= uname_string_combinations(user
, _Get_Pwnam
, usernamelevel
);
235 /****************************************************************************
236 Check if a user is in a netgroup user list.
237 ****************************************************************************/
239 static BOOL
user_in_netgroup_list(char *user
,char *ngname
)
242 static char *mydomain
= NULL
;
243 if (mydomain
== NULL
)
244 yp_get_default_domain(&mydomain
);
246 if(mydomain
== NULL
) {
247 DEBUG(5,("Unable to get default yp domain\n"));
249 DEBUG(5,("looking for user %s of domain %s in netgroup %s\n",
250 user
, mydomain
, ngname
));
251 DEBUG(5,("innetgr is %s\n",
252 innetgr(ngname
, NULL
, user
, mydomain
)
253 ? "TRUE" : "FALSE"));
255 if (innetgr(ngname
, NULL
, user
, mydomain
))
258 #endif /* HAVE_NETGROUP */
262 /****************************************************************************
263 Check if a user is in a UNIX user list.
264 ****************************************************************************/
266 static BOOL
user_in_group_list(char *user
,char *gname
)
271 struct passwd
*pass
= Get_Pwnam(user
,False
);
274 gptr
= getgrgid(pass
->pw_gid
);
275 if (gptr
&& strequal(gptr
->gr_name
,gname
))
279 while ((gptr
= (struct group
*)getgrent())) {
280 if (!strequal(gptr
->gr_name
,gname
))
282 member
= gptr
->gr_mem
;
283 while (member
&& *member
) {
284 if (strequal(*member
,user
)) {
293 #endif /* HAVE_GETGRNAM */
297 /****************************************************************************
298 Check if a user is in a user list - can check combinations of UNIX
300 ****************************************************************************/
302 BOOL
user_in_list(char *user
,char *list
)
307 while (next_token(&p
,tok
,LIST_SEP
, sizeof(tok
))) {
309 * Check raw username.
311 if (strequal(user
,tok
))
315 * Now check to see if any combination
316 * of UNIX and netgroups has been specified.
321 * Old behaviour. Check netgroup list
322 * followed by UNIX list.
324 if(user_in_netgroup_list(user
,&tok
[1]))
326 if(user_in_group_list(user
,&tok
[1]))
328 } else if (*tok
== '+') {
332 * Search UNIX list followed by netgroup.
334 if(user_in_group_list(user
,&tok
[2]))
336 if(user_in_netgroup_list(user
,&tok
[2]))
342 * Just search UNIX list.
345 if(user_in_group_list(user
,&tok
[1]))
349 } else if (*tok
== '&') {
353 * Search netgroup list followed by UNIX list.
355 if(user_in_netgroup_list(user
,&tok
[2]))
357 if(user_in_group_list(user
,&tok
[2]))
361 * Just search netgroup list.
363 if(user_in_netgroup_list(user
,&tok
[1]))
371 /* The functions below have been taken from password.c and slightly modified */
372 /****************************************************************************
373 Apply a function to upper/lower case combinations
374 of a string and return true if one of them returns true.
375 Try all combinations with N uppercase letters.
376 offset is the first char to try and change (start with 0)
377 it assumes the string starts lowercased
378 ****************************************************************************/
380 static struct passwd
*uname_string_combinations2(char *s
,int offset
,struct passwd
*(*fn
)(char *),int N
)
382 ssize_t len
= (ssize_t
)strlen(s
);
386 #ifdef PASSWORD_LENGTH
387 len
= MIN(len
,PASSWORD_LENGTH
);
390 if (N
<= 0 || offset
>= len
)
393 for (i
=offset
;i
<(len
-(N
-1));i
++) {
398 ret
= uname_string_combinations2(s
,i
+1,fn
,N
-1);
406 /****************************************************************************
407 Apply a function to upper/lower case combinations
408 of a string and return true if one of them returns true.
409 Try all combinations with up to N uppercase letters.
410 offset is the first char to try and change (start with 0)
411 it assumes the string starts lowercased
412 ****************************************************************************/
414 static struct passwd
* uname_string_combinations(char *s
,struct passwd
* (*fn
)(char *),int N
)
420 ret
= uname_string_combinations2(s
,0,fn
,n
);
428 /****************************************************************************
429 these wrappers allow appliance mode to work. In appliance mode the username
430 takes the form DOMAIN/user
431 ****************************************************************************/
432 struct passwd
*smb_getpwnam(char *user
, BOOL allow_change
)
437 extern pstring global_myname
;
439 pw
= Get_Pwnam(user
, allow_change
);
442 /* if it is a domain qualified name and it isn't in our password
443 database but the domain portion matches our local machine name then
444 lookup just the username portion locally */
445 sep
= lp_winbind_separator();
446 if (!sep
|| !*sep
) sep
= "\\";
447 p
= strchr(user
,*sep
);
449 strncasecmp(global_myname
, user
, strlen(global_myname
))==0) {
450 return Get_Pwnam(p
+1, allow_change
);