2 Unix SMB/CIFS implementation.
3 Authentication utility functions
4 Copyright (C) Volker Lendecke 2010
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program. If not, see <http://www.gnu.org/licenses/>.
22 #include "librpc/gen_ndr/samr.h"
23 #include "../lib/tsocket/tsocket.h"
26 #define DBGC_CLASS DBGC_AUTH
28 static int clear_samr_Password(struct samr_Password
*password
)
30 memset(password
->hash
, '\0', sizeof(password
->hash
));
34 static int clear_string(char *password
)
36 memset(password
, '\0', strlen(password
));
40 /****************************************************************************
41 Create an auth_usersupplied_data structure
42 ****************************************************************************/
44 NTSTATUS
make_user_info(struct auth_usersupplied_info
**ret_user_info
,
46 const char *internal_username
,
47 const char *client_domain
,
49 const char *workstation_name
,
50 const struct tsocket_address
*remote_address
,
51 const DATA_BLOB
*lm_pwd
,
52 const DATA_BLOB
*nt_pwd
,
53 const struct samr_Password
*lm_interactive_pwd
,
54 const struct samr_Password
*nt_interactive_pwd
,
55 const char *plaintext_password
,
56 enum auth_password_state password_state
)
58 struct auth_usersupplied_info
*user_info
;
59 *ret_user_info
= NULL
;
61 DEBUG(5,("attempting to make a user_info for %s (%s)\n", internal_username
, smb_name
));
63 /* FIXME: Have the caller provide a talloc context of the
64 * correct lifetime (possibly talloc_tos(), but it depends on
66 user_info
= talloc_zero(NULL
, struct auth_usersupplied_info
);
67 if (user_info
== NULL
) {
68 DEBUG(0,("talloc failed for user_info\n"));
69 return NT_STATUS_NO_MEMORY
;
72 DEBUG(5,("making strings for %s's user_info struct\n", internal_username
));
74 user_info
->client
.account_name
= talloc_strdup(user_info
, smb_name
);
75 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(user_info
->client
.account_name
, user_info
);
77 user_info
->mapped
.account_name
= talloc_strdup(user_info
, internal_username
);
78 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(user_info
->mapped
.account_name
, user_info
);
80 user_info
->mapped
.domain_name
= talloc_strdup(user_info
, domain
);
81 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(user_info
->mapped
.domain_name
, user_info
);
83 user_info
->client
.domain_name
= talloc_strdup(user_info
, client_domain
);
84 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(user_info
->client
.domain_name
, user_info
);
86 user_info
->workstation_name
= talloc_strdup(user_info
, workstation_name
);
87 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(user_info
->workstation_name
, user_info
);
89 user_info
->remote_host
= tsocket_address_copy(remote_address
, user_info
);
90 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(user_info
->remote_host
, user_info
);
92 DEBUG(5,("making blobs for %s's user_info struct\n", internal_username
));
94 if (lm_pwd
&& lm_pwd
->data
) {
95 user_info
->password
.response
.lanman
= data_blob_talloc(user_info
, lm_pwd
->data
, lm_pwd
->length
);
96 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(user_info
->password
.response
.lanman
.data
, user_info
);
98 if (nt_pwd
&& nt_pwd
->data
) {
99 user_info
->password
.response
.nt
= data_blob_talloc(user_info
, nt_pwd
->data
, nt_pwd
->length
);
100 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(user_info
->password
.response
.nt
.data
, user_info
);
102 if (lm_interactive_pwd
) {
103 user_info
->password
.hash
.lanman
= talloc(user_info
, struct samr_Password
);
104 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(user_info
->password
.hash
.lanman
, user_info
);
105 memcpy(user_info
->password
.hash
.lanman
->hash
, lm_interactive_pwd
->hash
,
106 sizeof(user_info
->password
.hash
.lanman
->hash
));
107 talloc_set_destructor(user_info
->password
.hash
.lanman
, clear_samr_Password
);
110 if (nt_interactive_pwd
) {
111 user_info
->password
.hash
.nt
= talloc(user_info
, struct samr_Password
);
112 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(user_info
->password
.hash
.nt
, user_info
);
113 memcpy(user_info
->password
.hash
.nt
->hash
, nt_interactive_pwd
->hash
,
114 sizeof(user_info
->password
.hash
.nt
->hash
));
115 talloc_set_destructor(user_info
->password
.hash
.nt
, clear_samr_Password
);
118 if (plaintext_password
) {
119 user_info
->password
.plaintext
= talloc_strdup(user_info
, plaintext_password
);
120 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(user_info
->password
.plaintext
, user_info
);
121 talloc_set_destructor(user_info
->password
.plaintext
, clear_string
);
124 user_info
->password_state
= password_state
;
126 user_info
->logon_parameters
= 0;
128 DEBUG(10,("made a user_info for %s (%s)\n", internal_username
, smb_name
));
129 *ret_user_info
= user_info
;
133 /***************************************************************************
134 Free a user_info struct
135 ***************************************************************************/
137 void free_user_info(struct auth_usersupplied_info
**user_info
)
139 TALLOC_FREE(*user_info
);