CVE-2023-0614 s4-acl: Split out logic to remove access checking attributes
[Samba.git] / nsswitch / winbind_nss_linux.c
blob1d647ca25e58c54ff752eb84aa81a12501e901fa
1 /*
2 Unix SMB/CIFS implementation.
4 Windows NT Domain nsswitch module
6 Copyright (C) Tim Potter 2000
8 This library is free software; you can redistribute it and/or
9 modify it under the terms of the GNU Lesser General Public
10 License as published by the Free Software Foundation; either
11 version 3 of the License, or (at your option) any later version.
13 This library is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 Library General Public License for more details.
18 You should have received a copy of the GNU Lesser General Public License
19 along with this program. If not, see <http://www.gnu.org/licenses/>.
22 #include "winbind_client.h"
24 #ifdef HAVE_PTHREAD_H
25 #include <pthread.h>
26 #endif
28 #ifdef HAVE_PTHREAD
29 static pthread_mutex_t winbind_nss_mutex = PTHREAD_MUTEX_INITIALIZER;
30 #endif
32 /* Maximum number of users to pass back over the unix domain socket
33 per call. This is not a static limit on the total number of users
34 or groups returned in total. */
36 #define MAX_GETPWENT_USERS 250
37 #define MAX_GETGRENT_USERS 250
39 /*************************************************************************
40 ************************************************************************/
42 #ifdef DEBUG_NSS
43 static const char *nss_err_str(NSS_STATUS ret)
45 switch (ret) {
46 case NSS_STATUS_TRYAGAIN:
47 return "NSS_STATUS_TRYAGAIN";
48 case NSS_STATUS_SUCCESS:
49 return "NSS_STATUS_SUCCESS";
50 case NSS_STATUS_NOTFOUND:
51 return "NSS_STATUS_NOTFOUND";
52 case NSS_STATUS_UNAVAIL:
53 return "NSS_STATUS_UNAVAIL";
54 #ifdef NSS_STATUS_RETURN
55 case NSS_STATUS_RETURN:
56 return "NSS_STATUS_RETURN";
57 #endif
58 default:
59 return "UNKNOWN RETURN CODE!!!!!!!";
62 #endif
64 /* Prototypes from wb_common.c */
66 /* Allocate some space from the nss static buffer. The buffer and buflen
67 are the pointers passed in by the C library to the _nss_ntdom_*
68 functions. */
70 static char *get_static(char **buffer, size_t *buflen, size_t len)
72 char *result;
74 /* Error check. We return false if things aren't set up right, or
75 there isn't enough buffer space left. */
77 if ((buffer == NULL) || (buflen == NULL) || (*buflen < len)) {
78 return NULL;
81 /* Return an index into the static buffer */
83 result = *buffer;
84 *buffer += len;
85 *buflen -= len;
87 return result;
90 /* I've copied the strtok() replacement function next_token_Xalloc() from
91 lib/util_str.c as I really don't want to have to link in any other
92 objects if I can possibly avoid it. */
94 static bool next_token_alloc(const char **ptr,
95 char **pp_buff,
96 const char *sep)
98 const char *s;
99 const char *saved_s;
100 char *pbuf;
101 bool quoted;
102 size_t len=1;
104 *pp_buff = NULL;
105 if (!ptr) {
106 return(false);
109 s = *ptr;
111 /* default to simple separators */
112 if (!sep) {
113 sep = " \t\n\r";
116 /* find the first non sep char */
117 while (*s && strchr(sep,*s)) {
118 s++;
121 /* nothing left? */
122 if (!*s) {
123 return false;
126 /* When restarting we need to go from here. */
127 saved_s = s;
129 /* Work out the length needed. */
130 for (quoted = false; *s &&
131 (quoted || !strchr(sep,*s)); s++) {
132 if (*s == '\"') {
133 quoted = !quoted;
134 } else {
135 len++;
139 /* We started with len = 1 so we have space for the nul. */
140 *pp_buff = (char *)malloc(len);
141 if (!*pp_buff) {
142 return false;
145 /* copy over the token */
146 pbuf = *pp_buff;
147 s = saved_s;
148 for (quoted = false; *s &&
149 (quoted || !strchr(sep,*s)); s++) {
150 if ( *s == '\"' ) {
151 quoted = !quoted;
152 } else {
153 *pbuf++ = *s;
157 *ptr = (*s) ? s+1 : s;
158 *pbuf = 0;
160 return true;
163 /* Fill a pwent structure from a winbindd_response structure. We use
164 the static data passed to us by libc to put strings and stuff in.
165 Return NSS_STATUS_TRYAGAIN if we run out of memory. */
167 static NSS_STATUS fill_pwent(struct passwd *result,
168 struct winbindd_pw *pw,
169 char **buffer, size_t *buflen)
171 size_t len;
173 /* User name */
174 len = strlen(pw->pw_name) + 1;
176 if ((result->pw_name =
177 get_static(buffer, buflen, len)) == NULL) {
179 /* Out of memory */
181 return NSS_STATUS_TRYAGAIN;
184 memcpy(result->pw_name, pw->pw_name, len);
186 /* Password */
187 len = strlen(pw->pw_passwd) + 1;
189 if ((result->pw_passwd =
190 get_static(buffer, buflen, len)) == NULL) {
192 /* Out of memory */
194 return NSS_STATUS_TRYAGAIN;
197 memcpy(result->pw_passwd, pw->pw_passwd, len);
199 /* [ug]id */
201 result->pw_uid = pw->pw_uid;
202 result->pw_gid = pw->pw_gid;
204 /* GECOS */
205 len = strlen(pw->pw_gecos) + 1;
207 if ((result->pw_gecos =
208 get_static(buffer, buflen, len)) == NULL) {
210 /* Out of memory */
212 return NSS_STATUS_TRYAGAIN;
215 memcpy(result->pw_gecos, pw->pw_gecos, len);
217 /* Home directory */
218 len = strlen(pw->pw_dir) + 1;
220 if ((result->pw_dir =
221 get_static(buffer, buflen, len)) == NULL) {
223 /* Out of memory */
225 return NSS_STATUS_TRYAGAIN;
228 memcpy(result->pw_dir, pw->pw_dir, len);
230 /* Logon shell */
231 len = strlen(pw->pw_shell) + 1;
233 if ((result->pw_shell =
234 get_static(buffer, buflen, len)) == NULL) {
236 /* Out of memory */
238 return NSS_STATUS_TRYAGAIN;
241 memcpy(result->pw_shell, pw->pw_shell, len);
243 /* The struct passwd for Solaris has some extra fields which must
244 be initialised or nscd crashes. */
246 #ifdef HAVE_PASSWD_PW_COMMENT
247 result->pw_comment = "";
248 #endif
250 #ifdef HAVE_PASSWD_PW_AGE
251 result->pw_age = "";
252 #endif
254 return NSS_STATUS_SUCCESS;
257 /* Fill a grent structure from a winbindd_response structure. We use
258 the static data passed to us by libc to put strings and stuff in.
259 Return NSS_STATUS_TRYAGAIN if we run out of memory. */
261 static NSS_STATUS fill_grent(struct group *result, struct winbindd_gr *gr,
262 const char *gr_mem, char **buffer, size_t *buflen)
264 char *name;
265 int i;
266 char *tst;
267 size_t len;
269 /* Group name */
270 len = strlen(gr->gr_name) + 1;
272 if ((result->gr_name =
273 get_static(buffer, buflen, len)) == NULL) {
275 /* Out of memory */
277 return NSS_STATUS_TRYAGAIN;
280 memcpy(result->gr_name, gr->gr_name, len);
282 /* Password */
283 len = strlen(gr->gr_passwd) + 1;
285 if ((result->gr_passwd =
286 get_static(buffer, buflen, len)) == NULL) {
288 /* Out of memory */
289 return NSS_STATUS_TRYAGAIN;
292 memcpy(result->gr_passwd, gr->gr_passwd, len);
294 /* gid */
296 result->gr_gid = gr->gr_gid;
298 /* Group membership */
300 if (!gr_mem) {
301 gr->num_gr_mem = 0;
304 /* this next value is a pointer to a pointer so let's align it */
306 /* Calculate number of extra bytes needed to align on pointer size boundry */
307 if ((i = (unsigned long)(*buffer) % sizeof(char*)) != 0)
308 i = sizeof(char*) - i;
310 if ((tst = get_static(buffer, buflen, ((gr->num_gr_mem + 1) *
311 sizeof(char *)+i))) == NULL) {
313 /* Out of memory */
315 return NSS_STATUS_TRYAGAIN;
317 result->gr_mem = (char **)(tst + i);
319 if (gr->num_gr_mem == 0) {
321 /* Group is empty */
323 *(result->gr_mem) = NULL;
324 return NSS_STATUS_SUCCESS;
327 /* Start looking at extra data */
329 i = 0;
331 while(next_token_alloc((const char **)&gr_mem, &name, ",")) {
332 /* Allocate space for member */
333 len = strlen(name) + 1;
335 if (((result->gr_mem)[i] =
336 get_static(buffer, buflen, len)) == NULL) {
337 free(name);
338 /* Out of memory */
339 return NSS_STATUS_TRYAGAIN;
341 memcpy((result->gr_mem)[i], name, len);
342 free(name);
343 i++;
346 /* Terminate list */
348 (result->gr_mem)[i] = NULL;
350 return NSS_STATUS_SUCCESS;
354 * NSS user functions
357 static struct winbindd_response getpwent_response;
359 static int ndx_pw_cache; /* Current index into pwd cache */
360 static int num_pw_cache; /* Current size of pwd cache */
362 /* Rewind "file pointer" to start of ntdom password database */
364 _PUBLIC_ON_LINUX_
365 NSS_STATUS
366 _nss_winbind_setpwent(void)
368 NSS_STATUS ret;
369 #ifdef DEBUG_NSS
370 fprintf(stderr, "[%5d]: setpwent\n", getpid());
371 #endif
373 #ifdef HAVE_PTHREAD
374 pthread_mutex_lock(&winbind_nss_mutex);
375 #endif
377 if (num_pw_cache > 0) {
378 ndx_pw_cache = num_pw_cache = 0;
379 winbindd_free_response(&getpwent_response);
382 winbind_set_client_name("nss_winbind");
383 ret = winbindd_request_response(NULL, WINBINDD_SETPWENT, NULL, NULL);
384 #ifdef DEBUG_NSS
385 fprintf(stderr, "[%5d]: setpwent returns %s (%d)\n", getpid(),
386 nss_err_str(ret), ret);
387 #endif
389 #ifdef HAVE_PTHREAD
390 pthread_mutex_unlock(&winbind_nss_mutex);
391 #endif
392 return ret;
395 /* Close ntdom password database "file pointer" */
397 _PUBLIC_ON_LINUX_
398 NSS_STATUS
399 _nss_winbind_endpwent(void)
401 NSS_STATUS ret;
402 #ifdef DEBUG_NSS
403 fprintf(stderr, "[%5d]: endpwent\n", getpid());
404 #endif
406 #ifdef HAVE_PTHREAD
407 pthread_mutex_lock(&winbind_nss_mutex);
408 #endif
410 if (num_pw_cache > 0) {
411 ndx_pw_cache = num_pw_cache = 0;
412 winbindd_free_response(&getpwent_response);
415 winbind_set_client_name("nss_winbind");
416 ret = winbindd_request_response(NULL, WINBINDD_ENDPWENT, NULL, NULL);
417 #ifdef DEBUG_NSS
418 fprintf(stderr, "[%5d]: endpwent returns %s (%d)\n", getpid(),
419 nss_err_str(ret), ret);
420 #endif
422 #ifdef HAVE_PTHREAD
423 pthread_mutex_unlock(&winbind_nss_mutex);
424 #endif
426 return ret;
429 /* Fetch the next password entry from ntdom password database */
431 _PUBLIC_ON_LINUX_
432 NSS_STATUS
433 _nss_winbind_getpwent_r(struct passwd *result, char *buffer,
434 size_t buflen, int *errnop)
436 NSS_STATUS ret;
437 struct winbindd_request request;
438 static int called_again;
440 #ifdef DEBUG_NSS
441 fprintf(stderr, "[%5d]: getpwent\n", getpid());
442 #endif
444 #ifdef HAVE_PTHREAD
445 pthread_mutex_lock(&winbind_nss_mutex);
446 #endif
448 /* Return an entry from the cache if we have one, or if we are
449 called again because we exceeded our static buffer. */
451 if ((ndx_pw_cache < num_pw_cache) || called_again) {
452 goto return_result;
455 /* Else call winbindd to get a bunch of entries */
457 if (num_pw_cache > 0) {
458 winbindd_free_response(&getpwent_response);
461 ZERO_STRUCT(request);
462 ZERO_STRUCT(getpwent_response);
464 request.data.num_entries = MAX_GETPWENT_USERS;
466 winbind_set_client_name("nss_winbind");
467 ret = winbindd_request_response(NULL, WINBINDD_GETPWENT, &request,
468 &getpwent_response);
470 if (ret == NSS_STATUS_SUCCESS) {
471 struct winbindd_pw *pw_cache;
473 /* Fill cache */
475 ndx_pw_cache = 0;
476 num_pw_cache = getpwent_response.data.num_entries;
478 /* Return a result */
480 return_result:
482 pw_cache = (struct winbindd_pw *)
483 getpwent_response.extra_data.data;
485 /* Check data is valid */
487 if (pw_cache == NULL) {
488 ret = NSS_STATUS_NOTFOUND;
489 goto done;
492 ret = fill_pwent(result, &pw_cache[ndx_pw_cache],
493 &buffer, &buflen);
495 /* Out of memory - try again */
497 if (ret == NSS_STATUS_TRYAGAIN) {
498 called_again = true;
499 *errnop = errno = ERANGE;
500 goto done;
503 *errnop = errno = 0;
504 called_again = false;
505 ndx_pw_cache++;
507 /* If we've finished with this lot of results free cache */
509 if (ndx_pw_cache == num_pw_cache) {
510 ndx_pw_cache = num_pw_cache = 0;
511 winbindd_free_response(&getpwent_response);
514 done:
515 #ifdef DEBUG_NSS
516 fprintf(stderr, "[%5d]: getpwent returns %s (%d)\n", getpid(),
517 nss_err_str(ret), ret);
518 #endif
520 #ifdef HAVE_PTHREAD
521 pthread_mutex_unlock(&winbind_nss_mutex);
522 #endif
523 return ret;
526 /* Return passwd struct from uid */
528 _PUBLIC_ON_LINUX_
529 NSS_STATUS
530 _nss_winbind_getpwuid_r(uid_t uid, struct passwd *result, char *buffer,
531 size_t buflen, int *errnop)
533 NSS_STATUS ret;
534 static struct winbindd_response response;
535 struct winbindd_request request;
536 static int keep_response;
538 #ifdef DEBUG_NSS
539 fprintf(stderr, "[%5d]: getpwuid_r %d\n", getpid(), (unsigned int)uid);
540 #endif
542 #ifdef HAVE_PTHREAD
543 pthread_mutex_lock(&winbind_nss_mutex);
544 #endif
546 /* If our static buffer needs to be expanded we are called again */
547 if (!keep_response || uid != response.data.pw.pw_uid) {
549 /* Call for the first time */
551 response = (struct winbindd_response) {
552 .length = 0,
554 request = (struct winbindd_request) {
555 .wb_flags = WBFLAG_FROM_NSS,
556 .data = {
557 .uid = uid,
561 winbind_set_client_name("nss_winbind");
562 ret = winbindd_request_response(NULL, WINBINDD_GETPWUID, &request, &response);
564 if (ret == NSS_STATUS_SUCCESS) {
565 ret = fill_pwent(result, &response.data.pw,
566 &buffer, &buflen);
568 if (ret == NSS_STATUS_TRYAGAIN) {
569 keep_response = true;
570 *errnop = errno = ERANGE;
571 goto done;
575 } else {
577 /* We've been called again */
579 ret = fill_pwent(result, &response.data.pw, &buffer, &buflen);
581 if (ret == NSS_STATUS_TRYAGAIN) {
582 *errnop = errno = ERANGE;
583 goto done;
586 keep_response = false;
587 *errnop = errno = 0;
590 winbindd_free_response(&response);
592 done:
594 #ifdef DEBUG_NSS
595 fprintf(stderr, "[%5d]: getpwuid %d returns %s (%d)\n", getpid(),
596 (unsigned int)uid, nss_err_str(ret), ret);
597 #endif
599 #ifdef HAVE_PTHREAD
600 pthread_mutex_unlock(&winbind_nss_mutex);
601 #endif
603 return ret;
606 /* Return passwd struct from username */
607 _PUBLIC_ON_LINUX_
608 NSS_STATUS
609 _nss_winbind_getpwnam_r(const char *name, struct passwd *result, char *buffer,
610 size_t buflen, int *errnop)
612 NSS_STATUS ret;
613 static struct winbindd_response response;
614 struct winbindd_request request;
615 static int keep_response;
617 #ifdef DEBUG_NSS
618 fprintf(stderr, "[%5d]: getpwnam_r %s\n", getpid(), name);
619 #endif
621 #ifdef HAVE_PTHREAD
622 pthread_mutex_lock(&winbind_nss_mutex);
623 #endif
625 /* If our static buffer needs to be expanded we are called again */
627 if (!keep_response || strcmp(name,response.data.pw.pw_name) != 0) {
629 /* Call for the first time */
631 response = (struct winbindd_response) {
632 .length = 0,
634 request = (struct winbindd_request) {
635 .wb_flags = WBFLAG_FROM_NSS,
638 strncpy(request.data.username, name,
639 sizeof(request.data.username) - 1);
640 request.data.username
641 [sizeof(request.data.username) - 1] = '\0';
643 winbind_set_client_name("nss_winbind");
644 ret = winbindd_request_response(NULL, WINBINDD_GETPWNAM, &request, &response);
646 if (ret == NSS_STATUS_SUCCESS) {
647 ret = fill_pwent(result, &response.data.pw, &buffer,
648 &buflen);
650 if (ret == NSS_STATUS_TRYAGAIN) {
651 keep_response = true;
652 *errnop = errno = ERANGE;
653 goto done;
657 } else {
659 /* We've been called again */
661 ret = fill_pwent(result, &response.data.pw, &buffer, &buflen);
663 if (ret == NSS_STATUS_TRYAGAIN) {
664 keep_response = true;
665 *errnop = errno = ERANGE;
666 goto done;
669 keep_response = false;
670 *errnop = errno = 0;
673 winbindd_free_response(&response);
674 done:
675 #ifdef DEBUG_NSS
676 fprintf(stderr, "[%5d]: getpwnam %s returns %s (%d)\n", getpid(),
677 name, nss_err_str(ret), ret);
678 #endif
680 #ifdef HAVE_PTHREAD
681 pthread_mutex_unlock(&winbind_nss_mutex);
682 #endif
684 return ret;
688 * NSS group functions
691 static struct winbindd_response getgrent_response;
693 static int ndx_gr_cache; /* Current index into grp cache */
694 static int num_gr_cache; /* Current size of grp cache */
696 /* Rewind "file pointer" to start of ntdom group database */
698 _PUBLIC_ON_LINUX_
699 NSS_STATUS
700 _nss_winbind_setgrent(void)
702 NSS_STATUS ret;
703 #ifdef DEBUG_NSS
704 fprintf(stderr, "[%5d]: setgrent\n", getpid());
705 #endif
707 #ifdef HAVE_PTHREAD
708 pthread_mutex_lock(&winbind_nss_mutex);
709 #endif
711 if (num_gr_cache > 0) {
712 ndx_gr_cache = num_gr_cache = 0;
713 winbindd_free_response(&getgrent_response);
716 winbind_set_client_name("nss_winbind");
717 ret = winbindd_request_response(NULL, WINBINDD_SETGRENT, NULL, NULL);
718 #ifdef DEBUG_NSS
719 fprintf(stderr, "[%5d]: setgrent returns %s (%d)\n", getpid(),
720 nss_err_str(ret), ret);
721 #endif
723 #ifdef HAVE_PTHREAD
724 pthread_mutex_unlock(&winbind_nss_mutex);
725 #endif
727 return ret;
730 /* Close "file pointer" for ntdom group database */
732 _PUBLIC_ON_LINUX_
733 NSS_STATUS
734 _nss_winbind_endgrent(void)
736 NSS_STATUS ret;
737 #ifdef DEBUG_NSS
738 fprintf(stderr, "[%5d]: endgrent\n", getpid());
739 #endif
741 #ifdef HAVE_PTHREAD
742 pthread_mutex_lock(&winbind_nss_mutex);
743 #endif
745 if (num_gr_cache > 0) {
746 ndx_gr_cache = num_gr_cache = 0;
747 winbindd_free_response(&getgrent_response);
750 winbind_set_client_name("nss_winbind");
751 ret = winbindd_request_response(NULL, WINBINDD_ENDGRENT, NULL, NULL);
752 #ifdef DEBUG_NSS
753 fprintf(stderr, "[%5d]: endgrent returns %s (%d)\n", getpid(),
754 nss_err_str(ret), ret);
755 #endif
757 #ifdef HAVE_PTHREAD
758 pthread_mutex_unlock(&winbind_nss_mutex);
759 #endif
761 return ret;
764 /* Get next entry from ntdom group database */
766 static NSS_STATUS
767 winbind_getgrent(enum winbindd_cmd cmd,
768 struct group *result,
769 char *buffer, size_t buflen, int *errnop)
771 NSS_STATUS ret;
772 static struct winbindd_request request;
773 static int called_again;
776 #ifdef DEBUG_NSS
777 fprintf(stderr, "[%5d]: getgrent\n", getpid());
778 #endif
780 #ifdef HAVE_PTHREAD
781 pthread_mutex_lock(&winbind_nss_mutex);
782 #endif
784 /* Return an entry from the cache if we have one, or if we are
785 called again because we exceeded our static buffer. */
787 if ((ndx_gr_cache < num_gr_cache) || called_again) {
788 goto return_result;
791 /* Else call winbindd to get a bunch of entries */
793 if (num_gr_cache > 0) {
794 winbindd_free_response(&getgrent_response);
797 ZERO_STRUCT(request);
798 ZERO_STRUCT(getgrent_response);
800 request.data.num_entries = MAX_GETGRENT_USERS;
802 winbind_set_client_name("nss_winbind");
803 ret = winbindd_request_response(NULL, cmd, &request,
804 &getgrent_response);
806 if (ret == NSS_STATUS_SUCCESS) {
807 struct winbindd_gr *gr_cache;
808 int mem_ofs;
810 /* Fill cache */
812 ndx_gr_cache = 0;
813 num_gr_cache = getgrent_response.data.num_entries;
815 /* Return a result */
817 return_result:
819 gr_cache = (struct winbindd_gr *)
820 getgrent_response.extra_data.data;
822 /* Check data is valid */
824 if (gr_cache == NULL) {
825 ret = NSS_STATUS_NOTFOUND;
826 goto done;
829 /* Fill group membership. The offset into the extra data
830 for the group membership is the reported offset plus the
831 size of all the winbindd_gr records returned. */
833 mem_ofs = gr_cache[ndx_gr_cache].gr_mem_ofs +
834 num_gr_cache * sizeof(struct winbindd_gr);
836 ret = fill_grent(result, &gr_cache[ndx_gr_cache],
837 ((char *)getgrent_response.extra_data.data)+mem_ofs,
838 &buffer, &buflen);
840 /* Out of memory - try again */
842 if (ret == NSS_STATUS_TRYAGAIN) {
843 called_again = true;
844 *errnop = errno = ERANGE;
845 goto done;
848 *errnop = 0;
849 called_again = false;
850 ndx_gr_cache++;
852 /* If we've finished with this lot of results free cache */
854 if (ndx_gr_cache == num_gr_cache) {
855 ndx_gr_cache = num_gr_cache = 0;
856 winbindd_free_response(&getgrent_response);
859 done:
860 #ifdef DEBUG_NSS
861 fprintf(stderr, "[%5d]: getgrent returns %s (%d)\n", getpid(),
862 nss_err_str(ret), ret);
863 #endif
865 #ifdef HAVE_PTHREAD
866 pthread_mutex_unlock(&winbind_nss_mutex);
867 #endif
869 return ret;
873 _PUBLIC_ON_LINUX_
874 NSS_STATUS
875 _nss_winbind_getgrent_r(struct group *result,
876 char *buffer, size_t buflen, int *errnop)
878 return winbind_getgrent(WINBINDD_GETGRENT, result, buffer, buflen, errnop);
881 _PUBLIC_ON_LINUX_
882 NSS_STATUS
883 _nss_winbind_getgrlst_r(struct group *result,
884 char *buffer, size_t buflen, int *errnop)
886 return winbind_getgrent(WINBINDD_GETGRLST, result, buffer, buflen, errnop);
889 /* Return group struct from group name */
891 _PUBLIC_ON_LINUX_
892 NSS_STATUS
893 _nss_winbind_getgrnam_r(const char *name,
894 struct group *result, char *buffer,
895 size_t buflen, int *errnop)
897 NSS_STATUS ret;
898 static struct winbindd_response response;
899 struct winbindd_request request;
900 static int keep_response;
902 #ifdef DEBUG_NSS
903 fprintf(stderr, "[%5d]: getgrnam %s\n", getpid(), name);
904 #endif
906 #ifdef HAVE_PTHREAD
907 pthread_mutex_lock(&winbind_nss_mutex);
908 #endif
910 /* If our static buffer needs to be expanded we are called again */
911 /* Or if the stored response group name differs from the request. */
913 if (!keep_response || strcmp(name,response.data.gr.gr_name) != 0) {
915 /* Call for the first time */
917 response = (struct winbindd_response) {
918 .length = 0,
920 request = (struct winbindd_request) {
921 .wb_flags = WBFLAG_FROM_NSS,
924 strncpy(request.data.groupname, name,
925 sizeof(request.data.groupname));
926 request.data.groupname
927 [sizeof(request.data.groupname) - 1] = '\0';
929 winbind_set_client_name("nss_winbind");
930 ret = winbindd_request_response(NULL, WINBINDD_GETGRNAM,
931 &request, &response);
933 if (ret == NSS_STATUS_SUCCESS) {
934 ret = fill_grent(result, &response.data.gr,
935 (char *)response.extra_data.data,
936 &buffer, &buflen);
938 if (ret == NSS_STATUS_TRYAGAIN) {
939 keep_response = true;
940 *errnop = errno = ERANGE;
941 goto done;
945 } else {
947 /* We've been called again */
949 ret = fill_grent(result, &response.data.gr,
950 (char *)response.extra_data.data, &buffer,
951 &buflen);
953 if (ret == NSS_STATUS_TRYAGAIN) {
954 keep_response = true;
955 *errnop = errno = ERANGE;
956 goto done;
959 keep_response = false;
960 *errnop = 0;
963 winbindd_free_response(&response);
964 done:
965 #ifdef DEBUG_NSS
966 fprintf(stderr, "[%5d]: getgrnam %s returns %s (%d)\n", getpid(),
967 name, nss_err_str(ret), ret);
968 #endif
970 #ifdef HAVE_PTHREAD
971 pthread_mutex_unlock(&winbind_nss_mutex);
972 #endif
974 return ret;
977 /* Return group struct from gid */
979 _PUBLIC_ON_LINUX_
980 NSS_STATUS
981 _nss_winbind_getgrgid_r(gid_t gid,
982 struct group *result, char *buffer,
983 size_t buflen, int *errnop)
985 NSS_STATUS ret;
986 static struct winbindd_response response;
987 struct winbindd_request request;
988 static int keep_response;
990 #ifdef DEBUG_NSS
991 fprintf(stderr, "[%5d]: getgrgid %d\n", getpid(), gid);
992 #endif
994 #ifdef HAVE_PTHREAD
995 pthread_mutex_lock(&winbind_nss_mutex);
996 #endif
998 /* If our static buffer needs to be expanded we are called again */
999 /* Or if the stored response group name differs from the request. */
1001 if (!keep_response || gid != response.data.gr.gr_gid) {
1003 /* Call for the first time */
1005 response = (struct winbindd_response) {
1006 .length = 0,
1008 request = (struct winbindd_request) {
1009 .wb_flags = WBFLAG_FROM_NSS,
1013 request.data.gid = gid;
1015 winbind_set_client_name("nss_winbind");
1016 ret = winbindd_request_response(NULL, WINBINDD_GETGRGID,
1017 &request, &response);
1019 if (ret == NSS_STATUS_SUCCESS) {
1021 ret = fill_grent(result, &response.data.gr,
1022 (char *)response.extra_data.data,
1023 &buffer, &buflen);
1025 if (ret == NSS_STATUS_TRYAGAIN) {
1026 keep_response = true;
1027 *errnop = errno = ERANGE;
1028 goto done;
1032 } else {
1034 /* We've been called again */
1036 ret = fill_grent(result, &response.data.gr,
1037 (char *)response.extra_data.data, &buffer,
1038 &buflen);
1040 if (ret == NSS_STATUS_TRYAGAIN) {
1041 keep_response = true;
1042 *errnop = errno = ERANGE;
1043 goto done;
1046 keep_response = false;
1047 *errnop = 0;
1050 winbindd_free_response(&response);
1051 done:
1052 #ifdef DEBUG_NSS
1053 fprintf(stderr, "[%5d]: getgrgid %d returns %s (%d)\n", getpid(),
1054 (unsigned int)gid, nss_err_str(ret), ret);
1055 #endif
1057 #ifdef HAVE_PTHREAD
1058 pthread_mutex_unlock(&winbind_nss_mutex);
1059 #endif
1060 return ret;
1063 /* Initialise supplementary groups */
1065 _PUBLIC_ON_LINUX_
1066 NSS_STATUS
1067 _nss_winbind_initgroups_dyn(const char *user, gid_t group, long int *start,
1068 long int *size, gid_t **groups, long int limit,
1069 int *errnop)
1071 NSS_STATUS ret;
1072 struct winbindd_request request;
1073 struct winbindd_response response;
1074 int i;
1076 #ifdef DEBUG_NSS
1077 fprintf(stderr, "[%5d]: initgroups %s (%d)\n", getpid(),
1078 user, group);
1079 #endif
1081 #ifdef HAVE_PTHREAD
1082 pthread_mutex_lock(&winbind_nss_mutex);
1083 #endif
1085 ZERO_STRUCT(request);
1086 ZERO_STRUCT(response);
1088 strncpy(request.data.username, user,
1089 sizeof(request.data.username) - 1);
1091 winbind_set_client_name("nss_winbind");
1092 ret = winbindd_request_response(NULL, WINBINDD_GETGROUPS,
1093 &request, &response);
1095 if (ret == NSS_STATUS_SUCCESS) {
1096 int num_gids = response.data.num_entries;
1097 gid_t *gid_list = (gid_t *)response.extra_data.data;
1099 #ifdef DEBUG_NSS
1100 fprintf(stderr, "[%5d]: initgroups %s: got NSS_STATUS_SUCCESS "
1101 "and %d gids\n", getpid(),
1102 user, num_gids);
1103 #endif
1104 if (gid_list == NULL) {
1105 ret = NSS_STATUS_NOTFOUND;
1106 goto done;
1109 /* Copy group list to client */
1111 for (i = 0; i < num_gids; i++) {
1113 #ifdef DEBUG_NSS
1114 fprintf(stderr, "[%5d]: initgroups %s (%d): "
1115 "processing gid %d \n", getpid(),
1116 user, group, gid_list[i]);
1117 #endif
1119 /* Skip primary group */
1121 if (gid_list[i] == group) {
1122 continue;
1125 /* Skip groups without a mapping */
1126 if (gid_list[i] == (uid_t)-1) {
1127 continue;
1130 /* Filled buffer ? If so, resize. */
1132 if (*start == *size) {
1133 long int newsize;
1134 gid_t *newgroups;
1136 newsize = 2 * (*size);
1137 if (limit > 0) {
1138 if (*size == limit) {
1139 goto done;
1141 if (newsize > limit) {
1142 newsize = limit;
1146 newgroups = (gid_t *)
1147 realloc((*groups),
1148 newsize * sizeof(**groups));
1149 if (!newgroups) {
1150 *errnop = ENOMEM;
1151 ret = NSS_STATUS_NOTFOUND;
1152 goto done;
1154 *groups = newgroups;
1155 *size = newsize;
1158 /* Add to buffer */
1160 (*groups)[*start] = gid_list[i];
1161 *start += 1;
1165 /* Back to your regularly scheduled programming */
1167 done:
1168 #ifdef DEBUG_NSS
1169 fprintf(stderr, "[%5d]: initgroups %s returns %s (%d)\n", getpid(),
1170 user, nss_err_str(ret), ret);
1171 #endif
1173 #ifdef HAVE_PTHREAD
1174 pthread_mutex_unlock(&winbind_nss_mutex);
1175 #endif
1177 return ret;