r5965: Apply Volker's patch for "ldapsam trusted = yes" for samr_lookup_rids. Gives us
[Samba.git] / source / passdb / pdb_interface.c
blob949ee83dcd7818a9fc48b3850e0e4f3b390f430d
1 /*
2 Unix SMB/CIFS implementation.
3 Password and authentication handling
4 Copyright (C) Andrew Bartlett 2002
5 Copyright (C) Jelmer Vernooij 2002
6 Copyright (C) Simo Sorce 2003
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
20 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
23 #include "includes.h"
25 #undef DBGC_CLASS
26 #define DBGC_CLASS DBGC_PASSDB
28 static struct pdb_init_function_entry *backends = NULL;
30 static void lazy_initialize_passdb(void)
32 static BOOL initialized = False;
33 if(initialized)return;
34 static_init_pdb;
35 initialized = True;
38 static struct pdb_init_function_entry *pdb_find_backend_entry(const char *name);
40 /*******************************************************************
41 Clean up uninitialised passwords. The only way to tell
42 that these values are not 'real' is that they do not
43 have a valid last set time. Instead, the value is fixed at 0.
44 Therefore we use that as the key for 'is this a valid password'.
45 However, it is perfectly valid to have a 'default' last change
46 time, such LDAP with a missing attribute would produce.
47 ********************************************************************/
49 static void pdb_force_pw_initialization(SAM_ACCOUNT *pass)
51 const uint8 *lm_pwd, *nt_pwd;
53 /* only reset a password if the last set time has been
54 explicitly been set to zero. A default last set time
55 is ignored */
57 if ( (pdb_get_init_flags(pass, PDB_PASSLASTSET) != PDB_DEFAULT)
58 && (pdb_get_pass_last_set_time(pass) == 0) )
61 if (pdb_get_init_flags(pass, PDB_LMPASSWD) != PDB_DEFAULT)
63 lm_pwd = pdb_get_lanman_passwd(pass);
64 if (lm_pwd)
65 pdb_set_lanman_passwd(pass, NULL, PDB_CHANGED);
67 if (pdb_get_init_flags(pass, PDB_NTPASSWD) != PDB_DEFAULT)
69 nt_pwd = pdb_get_nt_passwd(pass);
70 if (nt_pwd)
71 pdb_set_nt_passwd(pass, NULL, PDB_CHANGED);
75 return;
78 NTSTATUS smb_register_passdb(int version, const char *name, pdb_init_function init)
80 struct pdb_init_function_entry *entry = backends;
82 if(version != PASSDB_INTERFACE_VERSION) {
83 DEBUG(0,("Can't register passdb backend!\n"
84 "You tried to register a passdb module with PASSDB_INTERFACE_VERSION %d, "
85 "while this version of samba uses version %d\n",
86 version,PASSDB_INTERFACE_VERSION));
87 return NT_STATUS_OBJECT_TYPE_MISMATCH;
90 if (!name || !init) {
91 return NT_STATUS_INVALID_PARAMETER;
94 DEBUG(5,("Attempting to register passdb backend %s\n", name));
96 /* Check for duplicates */
97 if (pdb_find_backend_entry(name)) {
98 DEBUG(0,("There already is a passdb backend registered with the name %s!\n", name));
99 return NT_STATUS_OBJECT_NAME_COLLISION;
102 entry = SMB_XMALLOC_P(struct pdb_init_function_entry);
103 entry->name = smb_xstrdup(name);
104 entry->init = init;
106 DLIST_ADD(backends, entry);
107 DEBUG(5,("Successfully added passdb backend '%s'\n", name));
108 return NT_STATUS_OK;
111 static struct pdb_init_function_entry *pdb_find_backend_entry(const char *name)
113 struct pdb_init_function_entry *entry = backends;
115 while(entry) {
116 if (strcmp(entry->name, name)==0) return entry;
117 entry = entry->next;
120 return NULL;
123 static NTSTATUS context_setsampwent(struct pdb_context *context, BOOL update, uint16 acb_mask)
125 NTSTATUS ret = NT_STATUS_UNSUCCESSFUL;
127 if (!context) {
128 DEBUG(0, ("invalid pdb_context specified!\n"));
129 return ret;
132 context->pwent_methods = context->pdb_methods;
134 if (!context->pwent_methods) {
135 /* No passdbs at all */
136 return ret;
139 while (NT_STATUS_IS_ERR(ret = context->pwent_methods->setsampwent(context->pwent_methods, update, acb_mask))) {
140 context->pwent_methods = context->pwent_methods->next;
141 if (context->pwent_methods == NULL)
142 return NT_STATUS_UNSUCCESSFUL;
144 return ret;
147 static void context_endsampwent(struct pdb_context *context)
149 if ((!context)){
150 DEBUG(0, ("invalid pdb_context specified!\n"));
151 return;
154 if (context->pwent_methods && context->pwent_methods->endsampwent)
155 context->pwent_methods->endsampwent(context->pwent_methods);
157 /* So we won't get strange data when calling getsampwent now */
158 context->pwent_methods = NULL;
161 static NTSTATUS context_getsampwent(struct pdb_context *context, SAM_ACCOUNT *user)
163 NTSTATUS ret = NT_STATUS_UNSUCCESSFUL;
165 if ((!context) || (!context->pwent_methods)) {
166 DEBUG(0, ("invalid pdb_context specified!\n"));
167 return ret;
169 /* Loop until we find something useful */
170 while (NT_STATUS_IS_ERR(ret = context->pwent_methods->getsampwent(context->pwent_methods, user))) {
172 context->pwent_methods->endsampwent(context->pwent_methods);
174 context->pwent_methods = context->pwent_methods->next;
176 /* All methods are checked now. There are no more entries */
177 if (context->pwent_methods == NULL)
178 return ret;
180 context->pwent_methods->setsampwent(context->pwent_methods, False, 0);
182 user->methods = context->pwent_methods;
183 pdb_force_pw_initialization(user);
184 return ret;
187 static NTSTATUS context_getsampwnam(struct pdb_context *context, SAM_ACCOUNT *sam_acct, const char *username)
189 NTSTATUS ret = NT_STATUS_UNSUCCESSFUL;
191 struct pdb_methods *curmethods;
192 if ((!context)) {
193 DEBUG(0, ("invalid pdb_context specified!\n"));
194 return ret;
196 curmethods = context->pdb_methods;
197 while (curmethods){
198 if (NT_STATUS_IS_OK(ret = curmethods->getsampwnam(curmethods, sam_acct, username))) {
199 pdb_force_pw_initialization(sam_acct);
200 sam_acct->methods = curmethods;
201 return ret;
203 curmethods = curmethods->next;
206 return ret;
209 static NTSTATUS context_getsampwsid(struct pdb_context *context, SAM_ACCOUNT *sam_acct, const DOM_SID *sid)
211 NTSTATUS ret = NT_STATUS_UNSUCCESSFUL;
213 struct pdb_methods *curmethods;
214 if ((!context)) {
215 DEBUG(0, ("invalid pdb_context specified!\n"));
216 return ret;
219 curmethods = context->pdb_methods;
221 while (curmethods){
222 if (NT_STATUS_IS_OK(ret = curmethods->getsampwsid(curmethods, sam_acct, sid))) {
223 pdb_force_pw_initialization(sam_acct);
224 sam_acct->methods = curmethods;
225 return ret;
227 curmethods = curmethods->next;
230 return ret;
233 static NTSTATUS context_add_sam_account(struct pdb_context *context, SAM_ACCOUNT *sam_acct)
235 NTSTATUS ret = NT_STATUS_UNSUCCESSFUL;
236 const uint8 *lm_pw, *nt_pw;
237 uint16 acb_flags;
239 if ((!context) || (!context->pdb_methods)) {
240 DEBUG(0, ("invalid pdb_context specified!\n"));
241 return ret;
244 /* disable acccounts with no passwords (that has not
245 been allowed by the ACB_PWNOTREQ bit */
247 lm_pw = pdb_get_lanman_passwd( sam_acct );
248 nt_pw = pdb_get_nt_passwd( sam_acct );
249 acb_flags = pdb_get_acct_ctrl( sam_acct );
250 if ( !lm_pw && !nt_pw && !(acb_flags&ACB_PWNOTREQ) ) {
251 acb_flags |= ACB_DISABLED;
252 pdb_set_acct_ctrl( sam_acct, acb_flags, PDB_CHANGED );
255 /** @todo This is where a 're-read on add' should be done */
256 /* We now add a new account to the first database listed.
257 * Should we? */
259 return context->pdb_methods->add_sam_account(context->pdb_methods, sam_acct);
262 static NTSTATUS context_update_sam_account(struct pdb_context *context, SAM_ACCOUNT *sam_acct)
264 NTSTATUS ret = NT_STATUS_UNSUCCESSFUL;
265 const uint8 *lm_pw, *nt_pw;
266 uint16 acb_flags;
268 if (!context) {
269 DEBUG(0, ("invalid pdb_context specified!\n"));
270 return ret;
273 if (!sam_acct || !sam_acct->methods){
274 DEBUG(0, ("invalid sam_acct specified\n"));
275 return ret;
278 /* disable acccounts with no passwords (that has not
279 been allowed by the ACB_PWNOTREQ bit */
281 lm_pw = pdb_get_lanman_passwd( sam_acct );
282 nt_pw = pdb_get_nt_passwd( sam_acct );
283 acb_flags = pdb_get_acct_ctrl( sam_acct );
284 if ( !lm_pw && !nt_pw && !(acb_flags&ACB_PWNOTREQ) ) {
285 acb_flags |= ACB_DISABLED;
286 pdb_set_acct_ctrl( sam_acct, acb_flags, PDB_CHANGED );
289 /** @todo This is where a 're-read on update' should be done */
291 return sam_acct->methods->update_sam_account(sam_acct->methods, sam_acct);
294 static NTSTATUS context_delete_sam_account(struct pdb_context *context, SAM_ACCOUNT *sam_acct)
296 NTSTATUS ret = NT_STATUS_UNSUCCESSFUL;
298 struct pdb_methods *pdb_selected;
299 if (!context) {
300 DEBUG(0, ("invalid pdb_context specified!\n"));
301 return ret;
304 if (!sam_acct->methods){
305 pdb_selected = context->pdb_methods;
306 /* There's no passdb backend specified for this account.
307 * Try to delete it in every passdb available
308 * Needed to delete accounts in smbpasswd that are not
309 * in /etc/passwd.
311 while (pdb_selected){
312 if (NT_STATUS_IS_OK(ret = pdb_selected->delete_sam_account(pdb_selected, sam_acct))) {
313 return ret;
315 pdb_selected = pdb_selected->next;
317 return ret;
320 if (!sam_acct->methods->delete_sam_account){
321 DEBUG(0,("invalid sam_acct->methods->delete_sam_account\n"));
322 return ret;
325 return sam_acct->methods->delete_sam_account(sam_acct->methods, sam_acct);
328 static NTSTATUS context_update_login_attempts(struct pdb_context *context,
329 SAM_ACCOUNT *sam_acct, BOOL success)
331 NTSTATUS ret = NT_STATUS_UNSUCCESSFUL;
333 if (!context) {
334 DEBUG(0, ("invalid pdb_context specified!\n"));
335 return ret;
338 if (!sam_acct || !sam_acct->methods){
339 DEBUG(0, ("invalid sam_acct specified\n"));
340 return ret;
343 return sam_acct->methods->update_login_attempts(sam_acct->methods, sam_acct, success);
346 static NTSTATUS context_getgrsid(struct pdb_context *context,
347 GROUP_MAP *map, DOM_SID sid)
349 NTSTATUS ret = NT_STATUS_UNSUCCESSFUL;
351 struct pdb_methods *curmethods;
352 if ((!context)) {
353 DEBUG(0, ("invalid pdb_context specified!\n"));
354 return ret;
356 curmethods = context->pdb_methods;
357 while (curmethods){
358 ret = curmethods->getgrsid(curmethods, map, sid);
359 if (NT_STATUS_IS_OK(ret)) {
360 map->methods = curmethods;
361 return ret;
363 curmethods = curmethods->next;
366 return ret;
369 static NTSTATUS context_getgrgid(struct pdb_context *context,
370 GROUP_MAP *map, gid_t gid)
372 NTSTATUS ret = NT_STATUS_UNSUCCESSFUL;
374 struct pdb_methods *curmethods;
375 if ((!context)) {
376 DEBUG(0, ("invalid pdb_context specified!\n"));
377 return ret;
379 curmethods = context->pdb_methods;
380 while (curmethods){
381 ret = curmethods->getgrgid(curmethods, map, gid);
382 if (NT_STATUS_IS_OK(ret)) {
383 map->methods = curmethods;
384 return ret;
386 curmethods = curmethods->next;
389 return ret;
392 static NTSTATUS context_getgrnam(struct pdb_context *context,
393 GROUP_MAP *map, const char *name)
395 NTSTATUS ret = NT_STATUS_UNSUCCESSFUL;
397 struct pdb_methods *curmethods;
398 if ((!context)) {
399 DEBUG(0, ("invalid pdb_context specified!\n"));
400 return ret;
402 curmethods = context->pdb_methods;
403 while (curmethods){
404 ret = curmethods->getgrnam(curmethods, map, name);
405 if (NT_STATUS_IS_OK(ret)) {
406 map->methods = curmethods;
407 return ret;
409 curmethods = curmethods->next;
412 return ret;
415 static NTSTATUS context_add_group_mapping_entry(struct pdb_context *context,
416 GROUP_MAP *map)
418 NTSTATUS ret = NT_STATUS_UNSUCCESSFUL;
420 if ((!context) || (!context->pdb_methods)) {
421 DEBUG(0, ("invalid pdb_context specified!\n"));
422 return ret;
425 return context->pdb_methods->add_group_mapping_entry(context->pdb_methods,
426 map);
429 static NTSTATUS context_update_group_mapping_entry(struct pdb_context *context,
430 GROUP_MAP *map)
432 NTSTATUS ret = NT_STATUS_UNSUCCESSFUL;
434 if ((!context) || (!context->pdb_methods)) {
435 DEBUG(0, ("invalid pdb_context specified!\n"));
436 return ret;
439 return context->
440 pdb_methods->update_group_mapping_entry(context->pdb_methods, map);
443 static NTSTATUS context_delete_group_mapping_entry(struct pdb_context *context,
444 DOM_SID sid)
446 NTSTATUS ret = NT_STATUS_UNSUCCESSFUL;
448 if ((!context) || (!context->pdb_methods)) {
449 DEBUG(0, ("invalid pdb_context specified!\n"));
450 return ret;
453 return context->
454 pdb_methods->delete_group_mapping_entry(context->pdb_methods, sid);
457 static NTSTATUS context_enum_group_mapping(struct pdb_context *context,
458 enum SID_NAME_USE sid_name_use,
459 GROUP_MAP **rmap, int *num_entries,
460 BOOL unix_only)
462 NTSTATUS ret = NT_STATUS_UNSUCCESSFUL;
464 if ((!context) || (!context->pdb_methods)) {
465 DEBUG(0, ("invalid pdb_context specified!\n"));
466 return ret;
469 return context->pdb_methods->enum_group_mapping(context->pdb_methods,
470 sid_name_use, rmap,
471 num_entries, unix_only);
474 static NTSTATUS context_enum_group_members(struct pdb_context *context,
475 TALLOC_CTX *mem_ctx,
476 const DOM_SID *group,
477 uint32 **member_rids,
478 int *num_members)
480 NTSTATUS ret = NT_STATUS_UNSUCCESSFUL;
482 if ((!context) || (!context->pdb_methods)) {
483 DEBUG(0, ("invalid pdb_context specified!\n"));
484 return ret;
487 return context->pdb_methods->enum_group_members(context->pdb_methods,
488 mem_ctx, group,
489 member_rids,
490 num_members);
493 static NTSTATUS context_enum_group_memberships(struct pdb_context *context,
494 const char *username,
495 gid_t primary_gid,
496 DOM_SID **sids, gid_t **gids,
497 int *num_groups)
499 NTSTATUS ret = NT_STATUS_UNSUCCESSFUL;
501 if ((!context) || (!context->pdb_methods)) {
502 DEBUG(0, ("invalid pdb_context specified!\n"));
503 return ret;
506 return context->pdb_methods->
507 enum_group_memberships(context->pdb_methods, username,
508 primary_gid, sids, gids, num_groups);
511 static NTSTATUS context_find_alias(struct pdb_context *context,
512 const char *name, DOM_SID *sid)
514 NTSTATUS ret = NT_STATUS_UNSUCCESSFUL;
516 if ((!context) || (!context->pdb_methods)) {
517 DEBUG(0, ("invalid pdb_context specified!\n"));
518 return ret;
521 return context->pdb_methods->find_alias(context->pdb_methods,
522 name, sid);
525 static NTSTATUS context_create_alias(struct pdb_context *context,
526 const char *name, uint32 *rid)
528 NTSTATUS ret = NT_STATUS_UNSUCCESSFUL;
530 if ((!context) || (!context->pdb_methods)) {
531 DEBUG(0, ("invalid pdb_context specified!\n"));
532 return ret;
535 return context->pdb_methods->create_alias(context->pdb_methods,
536 name, rid);
539 static NTSTATUS context_delete_alias(struct pdb_context *context,
540 const DOM_SID *sid)
542 NTSTATUS ret = NT_STATUS_UNSUCCESSFUL;
544 if ((!context) || (!context->pdb_methods)) {
545 DEBUG(0, ("invalid pdb_context specified!\n"));
546 return ret;
549 return context->pdb_methods->delete_alias(context->pdb_methods, sid);
552 static NTSTATUS context_enum_aliases(struct pdb_context *context,
553 const DOM_SID *sid,
554 uint32 start_idx, uint32 max_entries,
555 uint32 *num_aliases,
556 struct acct_info **info)
558 NTSTATUS ret = NT_STATUS_UNSUCCESSFUL;
560 if ((!context) || (!context->pdb_methods)) {
561 DEBUG(0, ("invalid pdb_context specified!\n"));
562 return ret;
565 return context->pdb_methods->enum_aliases(context->pdb_methods,
566 sid, start_idx, max_entries,
567 num_aliases, info);
570 static NTSTATUS context_get_aliasinfo(struct pdb_context *context,
571 const DOM_SID *sid,
572 struct acct_info *info)
574 NTSTATUS ret = NT_STATUS_UNSUCCESSFUL;
576 if ((!context) || (!context->pdb_methods)) {
577 DEBUG(0, ("invalid pdb_context specified!\n"));
578 return ret;
581 return context->pdb_methods->get_aliasinfo(context->pdb_methods,
582 sid, info);
585 static NTSTATUS context_set_aliasinfo(struct pdb_context *context,
586 const DOM_SID *sid,
587 struct acct_info *info)
589 NTSTATUS ret = NT_STATUS_UNSUCCESSFUL;
591 if ((!context) || (!context->pdb_methods)) {
592 DEBUG(0, ("invalid pdb_context specified!\n"));
593 return ret;
596 return context->pdb_methods->set_aliasinfo(context->pdb_methods,
597 sid, info);
600 static NTSTATUS context_add_aliasmem(struct pdb_context *context,
601 const DOM_SID *alias,
602 const DOM_SID *member)
604 NTSTATUS ret = NT_STATUS_UNSUCCESSFUL;
606 if ((!context) || (!context->pdb_methods)) {
607 DEBUG(0, ("invalid pdb_context specified!\n"));
608 return ret;
611 return context->pdb_methods->add_aliasmem(context->pdb_methods,
612 alias, member);
615 static NTSTATUS context_del_aliasmem(struct pdb_context *context,
616 const DOM_SID *alias,
617 const DOM_SID *member)
619 NTSTATUS ret = NT_STATUS_UNSUCCESSFUL;
621 if ((!context) || (!context->pdb_methods)) {
622 DEBUG(0, ("invalid pdb_context specified!\n"));
623 return ret;
626 return context->pdb_methods->del_aliasmem(context->pdb_methods,
627 alias, member);
630 static NTSTATUS context_enum_aliasmem(struct pdb_context *context,
631 const DOM_SID *alias, DOM_SID **members,
632 int *num)
634 NTSTATUS ret = NT_STATUS_UNSUCCESSFUL;
636 if ((!context) || (!context->pdb_methods)) {
637 DEBUG(0, ("invalid pdb_context specified!\n"));
638 return ret;
641 return context->pdb_methods->enum_aliasmem(context->pdb_methods,
642 alias, members, num);
645 static NTSTATUS context_enum_alias_memberships(struct pdb_context *context,
646 const DOM_SID *members,
647 int num_members,
648 DOM_SID **aliases, int *num)
650 NTSTATUS ret = NT_STATUS_UNSUCCESSFUL;
652 if ((!context) || (!context->pdb_methods)) {
653 DEBUG(0, ("invalid pdb_context specified!\n"));
654 return ret;
657 return context->pdb_methods->
658 enum_alias_memberships(context->pdb_methods, members,
659 num_members, aliases, num);
662 static NTSTATUS context_lookup_rids(struct pdb_context *context,
663 TALLOC_CTX *mem_ctx,
664 const DOM_SID *domain_sid,
665 int num_rids,
666 uint32 *rids,
667 const char ***names,
668 uint32 **attrs)
670 NTSTATUS ret = NT_STATUS_UNSUCCESSFUL;
672 if ((!context) || (!context->pdb_methods)) {
673 DEBUG(0, ("invalid pdb_context specified!\n"));
674 return ret;
677 return context->pdb_methods->lookup_rids(context->pdb_methods,
678 mem_ctx, domain_sid, num_rids,
679 rids, names, attrs);
682 /******************************************************************
683 Free and cleanup a pdb context, any associated data and anything
684 that the attached modules might have associated.
685 *******************************************************************/
687 static void free_pdb_context(struct pdb_context **context)
689 struct pdb_methods *pdb_selected = (*context)->pdb_methods;
691 while (pdb_selected){
692 if(pdb_selected->free_private_data)
693 pdb_selected->free_private_data(&(pdb_selected->private_data));
694 pdb_selected = pdb_selected->next;
697 talloc_destroy((*context)->mem_ctx);
698 *context = NULL;
701 /******************************************************************
702 Make a pdb_methods from scratch
703 *******************************************************************/
705 static NTSTATUS make_pdb_methods_name(struct pdb_methods **methods, struct pdb_context *context, const char *selected)
707 char *module_name = smb_xstrdup(selected);
708 char *module_location = NULL, *p;
709 struct pdb_init_function_entry *entry;
710 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
712 lazy_initialize_passdb();
714 p = strchr(module_name, ':');
716 if (p) {
717 *p = 0;
718 module_location = p+1;
719 trim_char(module_location, ' ', ' ');
722 trim_char(module_name, ' ', ' ');
725 DEBUG(5,("Attempting to find an passdb backend to match %s (%s)\n", selected, module_name));
727 entry = pdb_find_backend_entry(module_name);
729 /* Try to find a module that contains this module */
730 if (!entry) {
731 DEBUG(2,("No builtin backend found, trying to load plugin\n"));
732 if(NT_STATUS_IS_OK(smb_probe_module("pdb", module_name)) && !(entry = pdb_find_backend_entry(module_name))) {
733 DEBUG(0,("Plugin is available, but doesn't register passdb backend %s\n", module_name));
734 SAFE_FREE(module_name);
735 return NT_STATUS_UNSUCCESSFUL;
739 /* No such backend found */
740 if(!entry) {
741 DEBUG(0,("No builtin nor plugin backend for %s found\n", module_name));
742 SAFE_FREE(module_name);
743 return NT_STATUS_INVALID_PARAMETER;
746 DEBUG(5,("Found pdb backend %s\n", module_name));
747 nt_status = entry->init(context, methods, module_location);
748 if (NT_STATUS_IS_OK(nt_status)) {
749 DEBUG(5,("pdb backend %s has a valid init\n", selected));
750 } else {
751 DEBUG(0,("pdb backend %s did not correctly init (error was %s)\n", selected, nt_errstr(nt_status)));
753 SAFE_FREE(module_name);
754 return nt_status;
757 /******************************************************************
758 Make a pdb_context from scratch.
759 *******************************************************************/
761 static NTSTATUS make_pdb_context(struct pdb_context **context)
763 TALLOC_CTX *mem_ctx;
765 mem_ctx = talloc_init("pdb_context internal allocation context");
767 if (!mem_ctx) {
768 DEBUG(0, ("make_pdb_context: talloc init failed!\n"));
769 return NT_STATUS_NO_MEMORY;
772 *context = TALLOC_P(mem_ctx, struct pdb_context);
773 if (!*context) {
774 DEBUG(0, ("make_pdb_context: talloc failed!\n"));
775 return NT_STATUS_NO_MEMORY;
778 ZERO_STRUCTP(*context);
780 (*context)->mem_ctx = mem_ctx;
782 (*context)->pdb_setsampwent = context_setsampwent;
783 (*context)->pdb_endsampwent = context_endsampwent;
784 (*context)->pdb_getsampwent = context_getsampwent;
785 (*context)->pdb_getsampwnam = context_getsampwnam;
786 (*context)->pdb_getsampwsid = context_getsampwsid;
787 (*context)->pdb_add_sam_account = context_add_sam_account;
788 (*context)->pdb_update_sam_account = context_update_sam_account;
789 (*context)->pdb_delete_sam_account = context_delete_sam_account;
790 (*context)->pdb_update_login_attempts = context_update_login_attempts;
791 (*context)->pdb_getgrsid = context_getgrsid;
792 (*context)->pdb_getgrgid = context_getgrgid;
793 (*context)->pdb_getgrnam = context_getgrnam;
794 (*context)->pdb_add_group_mapping_entry = context_add_group_mapping_entry;
795 (*context)->pdb_update_group_mapping_entry = context_update_group_mapping_entry;
796 (*context)->pdb_delete_group_mapping_entry = context_delete_group_mapping_entry;
797 (*context)->pdb_enum_group_mapping = context_enum_group_mapping;
798 (*context)->pdb_enum_group_members = context_enum_group_members;
799 (*context)->pdb_enum_group_memberships = context_enum_group_memberships;
801 (*context)->pdb_find_alias = context_find_alias;
802 (*context)->pdb_create_alias = context_create_alias;
803 (*context)->pdb_delete_alias = context_delete_alias;
804 (*context)->pdb_enum_aliases = context_enum_aliases;
805 (*context)->pdb_get_aliasinfo = context_get_aliasinfo;
806 (*context)->pdb_set_aliasinfo = context_set_aliasinfo;
807 (*context)->pdb_add_aliasmem = context_add_aliasmem;
808 (*context)->pdb_del_aliasmem = context_del_aliasmem;
809 (*context)->pdb_enum_aliasmem = context_enum_aliasmem;
810 (*context)->pdb_enum_alias_memberships = context_enum_alias_memberships;
811 (*context)->pdb_lookup_rids = context_lookup_rids;
813 (*context)->free_fn = free_pdb_context;
815 return NT_STATUS_OK;
819 /******************************************************************
820 Make a pdb_context, given an array of strings
821 *******************************************************************/
823 NTSTATUS make_pdb_context_list(struct pdb_context **context, const char **selected)
825 int i = 0;
826 struct pdb_methods *curmethods, *tmpmethods;
827 NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL;
828 BOOL have_guest = False;
830 if (!NT_STATUS_IS_OK(nt_status = make_pdb_context(context))) {
831 return nt_status;
834 if (!selected) {
835 DEBUG(0, ("ERROR: empty passdb backend list!\n"));
836 return nt_status;
839 while (selected[i]){
840 if (strcmp(selected[i], "guest") == 0) {
841 have_guest = True;
843 /* Try to initialise pdb */
844 DEBUG(5,("Trying to load: %s\n", selected[i]));
845 if (!NT_STATUS_IS_OK(nt_status = make_pdb_methods_name(&curmethods, *context, selected[i]))) {
846 DEBUG(1, ("Loading %s failed!\n", selected[i]));
847 free_pdb_context(context);
848 return nt_status;
850 curmethods->parent = *context;
851 DLIST_ADD_END((*context)->pdb_methods, curmethods, tmpmethods);
852 i++;
855 if (have_guest)
856 return NT_STATUS_OK;
858 if ( (lp_guestaccount() == NULL) ||
859 (*lp_guestaccount() == '\0') ) {
860 /* We explicitly don't want guest access. No idea what
861 else that breaks, but be it that way. */
862 return NT_STATUS_OK;
865 if (!NT_STATUS_IS_OK(nt_status = make_pdb_methods_name(&curmethods,
866 *context,
867 "guest"))) {
868 DEBUG(1, ("Loading guest module failed!\n"));
869 free_pdb_context(context);
870 return nt_status;
873 curmethods->parent = *context;
874 DLIST_ADD_END((*context)->pdb_methods, curmethods, tmpmethods);
876 return NT_STATUS_OK;
879 /******************************************************************
880 Make a pdb_context, given a text string.
881 *******************************************************************/
883 NTSTATUS make_pdb_context_string(struct pdb_context **context, const char *selected)
885 NTSTATUS ret;
886 char **newsel = str_list_make(selected, NULL);
887 ret = make_pdb_context_list(context, (const char **)newsel);
888 str_list_free(&newsel);
889 return ret;
892 /******************************************************************
893 Return an already initialised pdb_context, to facilitate backward
894 compatibility (see functions below).
895 *******************************************************************/
897 static struct pdb_context *pdb_get_static_context(BOOL reload)
899 static struct pdb_context *pdb_context = NULL;
901 if ((pdb_context) && (reload)) {
902 pdb_context->free_fn(&pdb_context);
903 if (!NT_STATUS_IS_OK(make_pdb_context_list(&pdb_context, lp_passdb_backend()))) {
904 return NULL;
908 if (!pdb_context) {
909 if (!NT_STATUS_IS_OK(make_pdb_context_list(&pdb_context, lp_passdb_backend()))) {
910 return NULL;
914 return pdb_context;
917 /******************************************************************
918 Backward compatibility functions for the original passdb interface
919 *******************************************************************/
921 BOOL pdb_setsampwent(BOOL update, uint16 acb_mask)
923 struct pdb_context *pdb_context = pdb_get_static_context(False);
925 if (!pdb_context) {
926 return False;
929 return NT_STATUS_IS_OK(pdb_context->pdb_setsampwent(pdb_context, update, acb_mask));
932 void pdb_endsampwent(void)
934 struct pdb_context *pdb_context = pdb_get_static_context(False);
936 if (!pdb_context) {
937 return;
940 pdb_context->pdb_endsampwent(pdb_context);
943 BOOL pdb_getsampwent(SAM_ACCOUNT *user)
945 struct pdb_context *pdb_context = pdb_get_static_context(False);
947 if (!pdb_context) {
948 return False;
951 return NT_STATUS_IS_OK(pdb_context->pdb_getsampwent(pdb_context, user));
954 static SAM_ACCOUNT *sam_account_cache = NULL;
956 BOOL pdb_getsampwnam(SAM_ACCOUNT *sam_acct, const char *username)
958 struct pdb_context *pdb_context = pdb_get_static_context(False);
960 if (!pdb_context) {
961 return False;
964 if (!NT_STATUS_IS_OK(pdb_context->pdb_getsampwnam(pdb_context,
965 sam_acct, username)))
966 return False;
968 if (sam_account_cache != NULL) {
969 pdb_free_sam(&sam_account_cache);
970 sam_account_cache = NULL;
973 pdb_copy_sam_account(sam_acct, &sam_account_cache);
974 return True;
977 BOOL pdb_getsampwsid(SAM_ACCOUNT *sam_acct, const DOM_SID *sid)
979 struct pdb_context *pdb_context = pdb_get_static_context(False);
981 if (!pdb_context) {
982 return False;
985 if ((sam_account_cache != NULL) &&
986 (sid_equal(sid, pdb_get_user_sid(sam_account_cache))))
987 return pdb_copy_sam_account(sam_account_cache, &sam_acct);
989 return NT_STATUS_IS_OK(pdb_context->pdb_getsampwsid(pdb_context, sam_acct, sid));
992 BOOL pdb_add_sam_account(SAM_ACCOUNT *sam_acct)
994 struct pdb_context *pdb_context = pdb_get_static_context(False);
996 if (!pdb_context) {
997 return False;
1000 return NT_STATUS_IS_OK(pdb_context->pdb_add_sam_account(pdb_context, sam_acct));
1003 BOOL pdb_update_sam_account(SAM_ACCOUNT *sam_acct)
1005 struct pdb_context *pdb_context = pdb_get_static_context(False);
1007 if (!pdb_context) {
1008 return False;
1011 if (sam_account_cache != NULL) {
1012 pdb_free_sam(&sam_account_cache);
1013 sam_account_cache = NULL;
1016 return NT_STATUS_IS_OK(pdb_context->pdb_update_sam_account(pdb_context, sam_acct));
1019 BOOL pdb_delete_sam_account(SAM_ACCOUNT *sam_acct)
1021 struct pdb_context *pdb_context = pdb_get_static_context(False);
1023 if (!pdb_context) {
1024 return False;
1027 if (sam_account_cache != NULL) {
1028 pdb_free_sam(&sam_account_cache);
1029 sam_account_cache = NULL;
1032 return NT_STATUS_IS_OK(pdb_context->pdb_delete_sam_account(pdb_context, sam_acct));
1035 NTSTATUS pdb_update_login_attempts(SAM_ACCOUNT *sam_acct, BOOL success)
1037 struct pdb_context *pdb_context = pdb_get_static_context(False);
1039 if (!pdb_context) {
1040 return NT_STATUS_NOT_IMPLEMENTED;
1043 return pdb_context->pdb_update_login_attempts(pdb_context, sam_acct, success);
1046 BOOL pdb_getgrsid(GROUP_MAP *map, DOM_SID sid)
1048 struct pdb_context *pdb_context = pdb_get_static_context(False);
1050 if (!pdb_context) {
1051 return False;
1054 return NT_STATUS_IS_OK(pdb_context->
1055 pdb_getgrsid(pdb_context, map, sid));
1058 BOOL pdb_getgrgid(GROUP_MAP *map, gid_t gid)
1060 struct pdb_context *pdb_context = pdb_get_static_context(False);
1062 if (!pdb_context) {
1063 return False;
1066 return NT_STATUS_IS_OK(pdb_context->
1067 pdb_getgrgid(pdb_context, map, gid));
1070 BOOL pdb_getgrnam(GROUP_MAP *map, const char *name)
1072 struct pdb_context *pdb_context = pdb_get_static_context(False);
1074 if (!pdb_context) {
1075 return False;
1078 return NT_STATUS_IS_OK(pdb_context->
1079 pdb_getgrnam(pdb_context, map, name));
1082 BOOL pdb_add_group_mapping_entry(GROUP_MAP *map)
1084 struct pdb_context *pdb_context = pdb_get_static_context(False);
1086 if (!pdb_context) {
1087 return False;
1090 return NT_STATUS_IS_OK(pdb_context->
1091 pdb_add_group_mapping_entry(pdb_context, map));
1094 BOOL pdb_update_group_mapping_entry(GROUP_MAP *map)
1096 struct pdb_context *pdb_context = pdb_get_static_context(False);
1098 if (!pdb_context) {
1099 return False;
1102 return NT_STATUS_IS_OK(pdb_context->
1103 pdb_update_group_mapping_entry(pdb_context, map));
1106 BOOL pdb_delete_group_mapping_entry(DOM_SID sid)
1108 struct pdb_context *pdb_context = pdb_get_static_context(False);
1110 if (!pdb_context) {
1111 return False;
1114 return NT_STATUS_IS_OK(pdb_context->
1115 pdb_delete_group_mapping_entry(pdb_context, sid));
1118 BOOL pdb_enum_group_mapping(enum SID_NAME_USE sid_name_use, GROUP_MAP **rmap,
1119 int *num_entries, BOOL unix_only)
1121 struct pdb_context *pdb_context = pdb_get_static_context(False);
1123 if (!pdb_context) {
1124 return False;
1127 return NT_STATUS_IS_OK(pdb_context->
1128 pdb_enum_group_mapping(pdb_context, sid_name_use,
1129 rmap, num_entries, unix_only));
1132 NTSTATUS pdb_enum_group_members(TALLOC_CTX *mem_ctx,
1133 const DOM_SID *sid,
1134 uint32 **member_rids,
1135 int *num_members)
1137 struct pdb_context *pdb_context = pdb_get_static_context(False);
1139 if (!pdb_context) {
1140 return NT_STATUS_UNSUCCESSFUL;
1143 return pdb_context->pdb_enum_group_members(pdb_context, mem_ctx, sid,
1144 member_rids, num_members);
1147 NTSTATUS pdb_enum_group_memberships(const char *username, gid_t primary_gid,
1148 DOM_SID **sids, gid_t **gids,
1149 int *num_groups)
1151 struct pdb_context *pdb_context = pdb_get_static_context(False);
1153 if (!pdb_context) {
1154 return NT_STATUS_UNSUCCESSFUL;
1157 return pdb_context->pdb_enum_group_memberships(pdb_context, username,
1158 primary_gid, sids, gids,
1159 num_groups);
1162 BOOL pdb_find_alias(const char *name, DOM_SID *sid)
1164 struct pdb_context *pdb_context = pdb_get_static_context(False);
1166 if (!pdb_context) {
1167 return False;
1170 return NT_STATUS_IS_OK(pdb_context->pdb_find_alias(pdb_context,
1171 name, sid));
1174 NTSTATUS pdb_create_alias(const char *name, uint32 *rid)
1176 struct pdb_context *pdb_context = pdb_get_static_context(False);
1178 if (!pdb_context) {
1179 return NT_STATUS_NOT_IMPLEMENTED;
1182 return pdb_context->pdb_create_alias(pdb_context, name, rid);
1185 BOOL pdb_delete_alias(const DOM_SID *sid)
1187 struct pdb_context *pdb_context = pdb_get_static_context(False);
1189 if (!pdb_context) {
1190 return False;
1193 return NT_STATUS_IS_OK(pdb_context->pdb_delete_alias(pdb_context,
1194 sid));
1198 BOOL pdb_enum_aliases(const DOM_SID *sid, uint32 start_idx, uint32 max_entries,
1199 uint32 *num_aliases, struct acct_info **info)
1201 struct pdb_context *pdb_context = pdb_get_static_context(False);
1203 if (!pdb_context) {
1204 return False;
1207 return NT_STATUS_IS_OK(pdb_context->pdb_enum_aliases(pdb_context, sid,
1208 start_idx,
1209 max_entries,
1210 num_aliases,
1211 info));
1214 BOOL pdb_get_aliasinfo(const DOM_SID *sid, struct acct_info *info)
1216 struct pdb_context *pdb_context = pdb_get_static_context(False);
1218 if (!pdb_context) {
1219 return False;
1222 return NT_STATUS_IS_OK(pdb_context->pdb_get_aliasinfo(pdb_context, sid,
1223 info));
1226 BOOL pdb_set_aliasinfo(const DOM_SID *sid, struct acct_info *info)
1228 struct pdb_context *pdb_context = pdb_get_static_context(False);
1230 if (!pdb_context) {
1231 return False;
1234 return NT_STATUS_IS_OK(pdb_context->pdb_set_aliasinfo(pdb_context, sid,
1235 info));
1238 BOOL pdb_add_aliasmem(const DOM_SID *alias, const DOM_SID *member)
1240 struct pdb_context *pdb_context = pdb_get_static_context(False);
1242 if (!pdb_context) {
1243 return False;
1246 return NT_STATUS_IS_OK(pdb_context->
1247 pdb_add_aliasmem(pdb_context, alias, member));
1250 BOOL pdb_del_aliasmem(const DOM_SID *alias, const DOM_SID *member)
1252 struct pdb_context *pdb_context = pdb_get_static_context(False);
1254 if (!pdb_context) {
1255 return False;
1258 return NT_STATUS_IS_OK(pdb_context->
1259 pdb_del_aliasmem(pdb_context, alias, member));
1262 BOOL pdb_enum_aliasmem(const DOM_SID *alias,
1263 DOM_SID **members, int *num_members)
1265 struct pdb_context *pdb_context = pdb_get_static_context(False);
1267 if (!pdb_context) {
1268 return False;
1271 return NT_STATUS_IS_OK(pdb_context->
1272 pdb_enum_aliasmem(pdb_context, alias,
1273 members, num_members));
1276 BOOL pdb_enum_alias_memberships(const DOM_SID *members, int num_members,
1277 DOM_SID **aliases, int *num)
1279 struct pdb_context *pdb_context = pdb_get_static_context(False);
1281 if (!pdb_context) {
1282 return False;
1285 return NT_STATUS_IS_OK(pdb_context->
1286 pdb_enum_alias_memberships(pdb_context, members,
1287 num_members,
1288 aliases, num));
1291 NTSTATUS pdb_lookup_rids(TALLOC_CTX *mem_ctx,
1292 const DOM_SID *domain_sid,
1293 int num_rids,
1294 uint32 *rids,
1295 const char ***names,
1296 uint32 **attrs)
1298 struct pdb_context *pdb_context = pdb_get_static_context(False);
1300 if (!pdb_context) {
1301 return NT_STATUS_NOT_IMPLEMENTED;
1304 return pdb_context->pdb_lookup_rids(pdb_context, mem_ctx, domain_sid,
1305 num_rids, rids, names, attrs);
1308 /***************************************************************
1309 Initialize the static context (at smbd startup etc).
1311 If uninitialised, context will auto-init on first use.
1312 ***************************************************************/
1314 BOOL initialize_password_db(BOOL reload)
1316 return (pdb_get_static_context(reload) != NULL);
1320 /***************************************************************************
1321 Default implementations of some functions.
1322 ****************************************************************************/
1324 static NTSTATUS pdb_default_getsampwnam (struct pdb_methods *methods, SAM_ACCOUNT *user, const char *sname)
1326 return NT_STATUS_NO_SUCH_USER;
1329 static NTSTATUS pdb_default_getsampwsid(struct pdb_methods *my_methods, SAM_ACCOUNT * user, const DOM_SID *sid)
1331 return NT_STATUS_NO_SUCH_USER;
1334 static NTSTATUS pdb_default_add_sam_account (struct pdb_methods *methods, SAM_ACCOUNT *newpwd)
1336 DEBUG(0,("this backend (%s) should not be listed as the first passdb backend! You can't add users to it.\n", methods->name));
1337 return NT_STATUS_NOT_IMPLEMENTED;
1340 static NTSTATUS pdb_default_update_sam_account (struct pdb_methods *methods, SAM_ACCOUNT *newpwd)
1342 return NT_STATUS_NOT_IMPLEMENTED;
1345 static NTSTATUS pdb_default_delete_sam_account (struct pdb_methods *methods, SAM_ACCOUNT *pwd)
1347 return NT_STATUS_NOT_IMPLEMENTED;
1350 static NTSTATUS pdb_default_update_login_attempts (struct pdb_methods *methods, SAM_ACCOUNT *newpwd, BOOL success)
1352 return NT_STATUS_OK;
1355 static NTSTATUS pdb_default_setsampwent(struct pdb_methods *methods, BOOL update, uint16 acb_mask)
1357 return NT_STATUS_NOT_IMPLEMENTED;
1360 static NTSTATUS pdb_default_getsampwent(struct pdb_methods *methods, SAM_ACCOUNT *user)
1362 return NT_STATUS_NOT_IMPLEMENTED;
1365 static void pdb_default_endsampwent(struct pdb_methods *methods)
1367 return; /* NT_STATUS_NOT_IMPLEMENTED; */
1370 static void add_uid_to_array_unique(TALLOC_CTX *mem_ctx,
1371 uid_t uid, uid_t **uids, int *num)
1373 int i;
1375 for (i=0; i<*num; i++) {
1376 if ((*uids)[i] == uid)
1377 return;
1380 *uids = TALLOC_REALLOC_ARRAY(mem_ctx, *uids, uid_t, *num+1);
1382 if (*uids == NULL)
1383 return;
1385 (*uids)[*num] = uid;
1386 *num += 1;
1389 static BOOL get_memberuids(TALLOC_CTX *mem_ctx, gid_t gid, uid_t **uids,
1390 int *num)
1392 struct group *grp;
1393 char **gr;
1394 struct sys_pwent *userlist, *user;
1396 *uids = NULL;
1397 *num = 0;
1399 /* We only look at our own sam, so don't care about imported stuff */
1401 winbind_off();
1403 if ((grp = getgrgid(gid)) == NULL) {
1404 winbind_on();
1405 return False;
1408 /* Primary group members */
1410 userlist = getpwent_list();
1412 for (user = userlist; user != NULL; user = user->next) {
1413 if (user->pw_gid != gid)
1414 continue;
1415 add_uid_to_array_unique(mem_ctx, user->pw_uid, uids, num);
1418 pwent_free(userlist);
1420 /* Secondary group members */
1422 for (gr = grp->gr_mem; (*gr != NULL) && ((*gr)[0] != '\0'); gr += 1) {
1423 struct passwd *pw = getpwnam(*gr);
1425 if (pw == NULL)
1426 continue;
1427 add_uid_to_array_unique(mem_ctx, pw->pw_uid, uids, num);
1430 winbind_on();
1432 return True;
1435 NTSTATUS pdb_default_enum_group_members(struct pdb_methods *methods,
1436 TALLOC_CTX *mem_ctx,
1437 const DOM_SID *group,
1438 uint32 **member_rids,
1439 int *num_members)
1441 gid_t gid;
1442 uid_t *uids;
1443 int i, num_uids;
1445 *member_rids = NULL;
1446 *num_members = 0;
1448 if (!NT_STATUS_IS_OK(sid_to_gid(group, &gid)))
1449 return NT_STATUS_NO_SUCH_GROUP;
1451 if(!get_memberuids(mem_ctx, gid, &uids, &num_uids))
1452 return NT_STATUS_NO_SUCH_GROUP;
1454 if (num_uids == 0)
1455 return NT_STATUS_OK;
1457 *member_rids = TALLOC_ZERO_ARRAY(mem_ctx, uint32, num_uids);
1459 for (i=0; i<num_uids; i++) {
1460 DOM_SID sid;
1462 if (!NT_STATUS_IS_OK(uid_to_sid(&sid, uids[i]))) {
1463 DEBUG(1, ("Could not map member uid to SID\n"));
1464 continue;
1467 if (!sid_check_is_in_our_domain(&sid)) {
1468 DEBUG(1, ("Inconsistent SAM -- group member uid not "
1469 "in our domain\n"));
1470 continue;
1473 sid_peek_rid(&sid, &(*member_rids)[*num_members]);
1474 *num_members += 1;
1477 return NT_STATUS_OK;
1480 NTSTATUS pdb_default_lookup_rids(struct pdb_methods *methods,
1481 TALLOC_CTX *mem_ctx,
1482 const DOM_SID *domain_sid,
1483 int num_rids,
1484 uint32 *rids,
1485 const char ***names,
1486 uint32 **attrs)
1488 int i;
1489 NTSTATUS result;
1490 BOOL have_mapped = False;
1491 BOOL have_unmapped = False;
1493 (*names) = TALLOC_ZERO_ARRAY(mem_ctx, const char *, num_rids);
1494 (*attrs) = TALLOC_ZERO_ARRAY(mem_ctx, uint32, num_rids);
1496 if ((num_rids != 0) && (((*names) == NULL) || ((*attrs) == NULL)))
1497 return NT_STATUS_NO_MEMORY;
1499 if (!sid_equal(domain_sid, get_global_sam_sid())) {
1500 /* TODO: Sooner or later we need to look up BUILTIN rids as
1501 * well. -- vl */
1502 goto done;
1505 for (i = 0; i < num_rids; i++) {
1506 fstring tmpname;
1507 fstring domname;
1508 DOM_SID sid;
1509 enum SID_NAME_USE type;
1511 (*attrs)[i] = SID_NAME_UNKNOWN;
1513 sid_copy(&sid, domain_sid);
1514 sid_append_rid(&sid, rids[i]);
1516 if (lookup_sid(&sid, domname, tmpname, &type)) {
1517 (*attrs)[i] = (uint32)type;
1518 (*names)[i] = talloc_strdup(mem_ctx, tmpname);
1519 if ((*names)[i] == NULL)
1520 return NT_STATUS_NO_MEMORY;
1521 DEBUG(5,("lookup_rids: %s:%d\n", (*names)[i],
1522 (*attrs)[i]));
1523 have_mapped = True;
1524 } else {
1525 have_unmapped = True;
1529 done:
1531 result = NT_STATUS_NONE_MAPPED;
1533 if (have_mapped)
1534 result = have_unmapped ? STATUS_SOME_UNMAPPED : NT_STATUS_OK;
1536 return result;
1539 NTSTATUS make_pdb_methods(TALLOC_CTX *mem_ctx, PDB_METHODS **methods)
1541 *methods = TALLOC_P(mem_ctx, struct pdb_methods);
1543 if (!*methods) {
1544 return NT_STATUS_NO_MEMORY;
1547 ZERO_STRUCTP(*methods);
1549 (*methods)->setsampwent = pdb_default_setsampwent;
1550 (*methods)->endsampwent = pdb_default_endsampwent;
1551 (*methods)->getsampwent = pdb_default_getsampwent;
1552 (*methods)->getsampwnam = pdb_default_getsampwnam;
1553 (*methods)->getsampwsid = pdb_default_getsampwsid;
1554 (*methods)->add_sam_account = pdb_default_add_sam_account;
1555 (*methods)->update_sam_account = pdb_default_update_sam_account;
1556 (*methods)->delete_sam_account = pdb_default_delete_sam_account;
1557 (*methods)->update_login_attempts = pdb_default_update_login_attempts;
1559 (*methods)->getgrsid = pdb_default_getgrsid;
1560 (*methods)->getgrgid = pdb_default_getgrgid;
1561 (*methods)->getgrnam = pdb_default_getgrnam;
1562 (*methods)->add_group_mapping_entry = pdb_default_add_group_mapping_entry;
1563 (*methods)->update_group_mapping_entry = pdb_default_update_group_mapping_entry;
1564 (*methods)->delete_group_mapping_entry = pdb_default_delete_group_mapping_entry;
1565 (*methods)->enum_group_mapping = pdb_default_enum_group_mapping;
1566 (*methods)->enum_group_members = pdb_default_enum_group_members;
1567 (*methods)->enum_group_memberships = pdb_default_enum_group_memberships;
1568 (*methods)->find_alias = pdb_default_find_alias;
1569 (*methods)->create_alias = pdb_default_create_alias;
1570 (*methods)->delete_alias = pdb_default_delete_alias;
1571 (*methods)->enum_aliases = pdb_default_enum_aliases;
1572 (*methods)->get_aliasinfo = pdb_default_get_aliasinfo;
1573 (*methods)->set_aliasinfo = pdb_default_set_aliasinfo;
1574 (*methods)->add_aliasmem = pdb_default_add_aliasmem;
1575 (*methods)->del_aliasmem = pdb_default_del_aliasmem;
1576 (*methods)->enum_aliasmem = pdb_default_enum_aliasmem;
1577 (*methods)->enum_alias_memberships = pdb_default_alias_memberships;
1578 (*methods)->lookup_rids = pdb_default_lookup_rids;
1580 return NT_STATUS_OK;