2 Unix SMB/CIFS implementation.
4 Call out to a shell script for an authentication check.
6 Copyright (C) Jeremy Allison 2005.
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program. If not, see <http://www.gnu.org/licenses/>.
28 #define DBGC_CLASS DBGC_AUTH
30 /* Create a string containing the supplied :
33 * ascii hex challenge\n
34 * ascii hex LM response\n
35 * ascii hex NT response\n\0
36 * and execute a shell script to check this.
37 * Allows external programs to create users on demand.
38 * Script returns zero on success, non-zero on fail.
41 static NTSTATUS
script_check_user_credentials(const struct auth_context
*auth_context
,
42 void *my_private_data
,
44 const struct auth_usersupplied_info
*user_info
,
45 struct auth_serversupplied_info
**server_info
)
47 const char *script
= lp_parm_const_string( GLOBAL_SECTION_SNUM
, "auth_script", "script", NULL
);
49 size_t secret_str_len
;
54 return NT_STATUS_INVALID_PARAMETER
;
58 return NT_STATUS_INVALID_PARAMETER
;
62 DEBUG(3,("script_check_user_credentials: no auth_info !\n"));
63 return NT_STATUS_INVALID_PARAMETER
;
66 secret_str_len
= strlen(user_info
->mapped
.domain_name
) + 1 +
67 strlen(user_info
->client
.account_name
) + 1 +
68 16 + 1 + /* 8 bytes of challenge going to 16 */
69 48 + 1 + /* 24 bytes of challenge going to 48 */
72 secret_str
= (char *)malloc(secret_str_len
);
74 return NT_STATUS_NO_MEMORY
;
77 if (strlcpy( secret_str
, user_info
->mapped
.domain_name
, secret_str_len
) >= secret_str_len
) {
81 if (strlcat( secret_str
, "\n", secret_str_len
) >= secret_str_len
) {
85 if (strlcat( secret_str
, user_info
->client
.account_name
, secret_str_len
) >= secret_str_len
) {
89 if (strlcat( secret_str
, "\n", secret_str_len
) >= secret_str_len
) {
94 for (i
= 0; i
< 8; i
++) {
95 slprintf(&hex_str
[i
*2], 3, "%02X", auth_context
->challenge
.data
[i
]);
97 if (strlcat( secret_str
, hex_str
, secret_str_len
) >= secret_str_len
) {
101 if (strlcat( secret_str
, "\n", secret_str_len
) >= secret_str_len
) {
106 if (user_info
->password
.response
.lanman
.data
) {
107 for (i
= 0; i
< 24; i
++) {
108 slprintf(&hex_str
[i
*2], 3, "%02X", user_info
->password
.response
.lanman
.data
[i
]);
110 if (strlcat( secret_str
, hex_str
, secret_str_len
) >= secret_str_len
) {
115 if (strlcat( secret_str
, "\n", secret_str_len
) >= secret_str_len
) {
120 if (user_info
->password
.response
.nt
.data
) {
121 for (i
= 0; i
< 24; i
++) {
122 slprintf(&hex_str
[i
*2], 3, "%02X", user_info
->password
.response
.nt
.data
[i
]);
124 if (strlcat( secret_str
, hex_str
, secret_str_len
) >= secret_str_len
) {
129 if (strlcat( secret_str
, "\n", secret_str_len
) >= secret_str_len
) {
134 DEBUG(10,("script_check_user_credentials: running %s with parameters:\n%s\n",
135 script
, secret_str
));
137 ret
= smbrunsecret( script
, secret_str
);
139 SAFE_FREE(secret_str
);
142 DEBUG(1,("script_check_user_credentials: failed to authenticate %s\\%s\n",
143 user_info
->mapped
.domain_name
, user_info
->client
.account_name
));
145 return NT_STATUS_NO_SUCH_USER
;
148 /* Cause the auth system to keep going.... */
149 return NT_STATUS_NOT_IMPLEMENTED
;
153 SAFE_FREE(secret_str
);
154 return NT_STATUS_NO_MEMORY
;
157 /* module initialisation */
158 static NTSTATUS
auth_init_script(struct auth_context
*auth_context
, const char *param
, auth_methods
**auth_method
)
160 struct auth_methods
*result
;
162 result
= talloc_zero(auth_context
, struct auth_methods
);
163 if (result
== NULL
) {
164 return NT_STATUS_NO_MEMORY
;
166 result
->name
= "script";
167 result
->auth
= script_check_user_credentials
;
169 if (param
&& *param
) {
170 /* we load the 'fallback' module - if script isn't here, call this
173 if (!load_auth_module(auth_context
, param
, &priv
)) {
174 return NT_STATUS_UNSUCCESSFUL
;
176 result
->private_data
= (void *)priv
;
179 *auth_method
= result
;
183 NTSTATUS
auth_script_init(void);
184 NTSTATUS
auth_script_init(void)
186 return smb_register_auth(AUTH_INTERFACE_VERSION
, "script", auth_init_script
);