idmap: Store negative cache entries if the backend fails
[Samba/bjacke.git] / source3 / auth / user_info.c
blob6b9841220f3844ba730fcf565b0488efacb318cd
1 /*
2 Unix SMB/CIFS implementation.
3 Authentication utility functions
4 Copyright (C) Volker Lendecke 2010
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program. If not, see <http://www.gnu.org/licenses/>.
20 #include "includes.h"
21 #include "auth.h"
22 #include "librpc/gen_ndr/samr.h"
23 #include "../lib/tsocket/tsocket.h"
25 #undef DBGC_CLASS
26 #define DBGC_CLASS DBGC_AUTH
28 static int clear_samr_Password(struct samr_Password *password)
30 memset(password->hash, '\0', sizeof(password->hash));
31 return 0;
34 static int clear_string(char *password)
36 memset(password, '\0', strlen(password));
37 return 0;
40 /****************************************************************************
41 Create an auth_usersupplied_data structure
42 ****************************************************************************/
44 NTSTATUS make_user_info(struct auth_usersupplied_info **ret_user_info,
45 const char *smb_name,
46 const char *internal_username,
47 const char *client_domain,
48 const char *domain,
49 const char *workstation_name,
50 const struct tsocket_address *remote_address,
51 const DATA_BLOB *lm_pwd,
52 const DATA_BLOB *nt_pwd,
53 const struct samr_Password *lm_interactive_pwd,
54 const struct samr_Password *nt_interactive_pwd,
55 const char *plaintext_password,
56 enum auth_password_state password_state)
58 struct auth_usersupplied_info *user_info;
59 *ret_user_info = NULL;
61 DEBUG(5,("attempting to make a user_info for %s (%s)\n", internal_username, smb_name));
63 /* FIXME: Have the caller provide a talloc context of the
64 * correct lifetime (possibly talloc_tos(), but it depends on
65 * the caller) */
66 user_info = talloc_zero(NULL, struct auth_usersupplied_info);
67 if (user_info == NULL) {
68 DEBUG(0,("talloc failed for user_info\n"));
69 return NT_STATUS_NO_MEMORY;
72 DEBUG(5,("making strings for %s's user_info struct\n", internal_username));
74 user_info->client.account_name = talloc_strdup(user_info, smb_name);
75 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(user_info->client.account_name, user_info);
77 user_info->mapped.account_name = talloc_strdup(user_info, internal_username);
78 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(user_info->mapped.account_name, user_info);
80 user_info->mapped.domain_name = talloc_strdup(user_info, domain);
81 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(user_info->mapped.domain_name, user_info);
83 user_info->client.domain_name = talloc_strdup(user_info, client_domain);
84 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(user_info->client.domain_name, user_info);
86 user_info->workstation_name = talloc_strdup(user_info, workstation_name);
87 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(user_info->workstation_name, user_info);
89 user_info->remote_host = tsocket_address_copy(remote_address, user_info);
90 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(user_info->remote_host, user_info);
92 DEBUG(5,("making blobs for %s's user_info struct\n", internal_username));
94 if (lm_pwd && lm_pwd->data) {
95 user_info->password.response.lanman = data_blob_talloc(user_info, lm_pwd->data, lm_pwd->length);
96 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(user_info->password.response.lanman.data, user_info);
98 if (nt_pwd && nt_pwd->data) {
99 user_info->password.response.nt = data_blob_talloc(user_info, nt_pwd->data, nt_pwd->length);
100 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(user_info->password.response.nt.data, user_info);
102 if (lm_interactive_pwd) {
103 user_info->password.hash.lanman = talloc(user_info, struct samr_Password);
104 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(user_info->password.hash.lanman, user_info);
105 memcpy(user_info->password.hash.lanman->hash, lm_interactive_pwd->hash,
106 sizeof(user_info->password.hash.lanman->hash));
107 talloc_set_destructor(user_info->password.hash.lanman, clear_samr_Password);
110 if (nt_interactive_pwd) {
111 user_info->password.hash.nt = talloc(user_info, struct samr_Password);
112 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(user_info->password.hash.nt, user_info);
113 memcpy(user_info->password.hash.nt->hash, nt_interactive_pwd->hash,
114 sizeof(user_info->password.hash.nt->hash));
115 talloc_set_destructor(user_info->password.hash.nt, clear_samr_Password);
118 if (plaintext_password) {
119 user_info->password.plaintext = talloc_strdup(user_info, plaintext_password);
120 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(user_info->password.plaintext, user_info);
121 talloc_set_destructor(user_info->password.plaintext, clear_string);
124 user_info->password_state = password_state;
126 user_info->logon_parameters = 0;
128 DEBUG(10,("made a user_info for %s (%s)\n", internal_username, smb_name));
129 *ret_user_info = user_info;
130 return NT_STATUS_OK;
133 /***************************************************************************
134 Free a user_info struct
135 ***************************************************************************/
137 void free_user_info(struct auth_usersupplied_info **user_info)
139 TALLOC_FREE(*user_info);