2 * Unix SMB/Netbios implementation.
4 * RPC Pipe client / server routines
5 * Copyright (C) Andrew Tridgell 1992-1999,
6 * Copyright (C) Luke Kenneth Casson Leighton 1996-1999,
7 * Copyright (C) Paul Ashton 1997-1999.
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 2 of the License, or
12 * (at your option) any later version.
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
19 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, write to the Free Software
21 * Foundation, Inc., 675 Mass Ave, Cambgrpsge, MA 02139, USA.
27 extern int DEBUGLEVEL;
30 /*******************************************************************
31 makes a CREDS_UNIX structure.
32 ********************************************************************/
33 BOOL make_creds_unix(CREDS_UNIX *r_u, const char* user_name,
34 const char* requested_name,
35 const char* real_name,
38 if (r_u == NULL) return False;
40 DEBUG(5,("make_creds_unix\n"));
42 fstrcpy(r_u->user_name , user_name);
43 fstrcpy(r_u->requested_name, requested_name);
44 fstrcpy(r_u->real_name , real_name);
50 /*******************************************************************
51 reads or writes a structure.
52 ********************************************************************/
53 BOOL creds_io_unix(char *desc, CREDS_UNIX *r_u, prs_struct *ps, int depth)
55 if (r_u == NULL) return False;
57 prs_debug(ps, depth, desc, "creds_io_unix");
61 prs_string("user_name", ps, depth, r_u->user_name, strlen(r_u->user_name), sizeof(r_u->user_name));
63 prs_string("requested_name", ps, depth, r_u->requested_name, strlen(r_u->requested_name), sizeof(r_u->requested_name));
65 prs_string("real_name", ps, depth, r_u->real_name, strlen(r_u->real_name), sizeof(r_u->real_name));
67 prs_uint32("guest", ps, depth, (uint32 *)&(r_u->guest));
72 /*******************************************************************
74 ********************************************************************/
75 void creds_free_unix(CREDS_UNIX *r_u)
79 /*******************************************************************
80 makes a CREDS_UNIX_SEC structure.
81 ********************************************************************/
82 BOOL make_creds_unix_sec(CREDS_UNIX_SEC *r_u,
83 uint32 uid, uint32 gid, uint32 num_grps, gid_t *grps)
86 if (r_u == NULL) return False;
88 DEBUG(5,("make_creds_unix_sec\n"));
92 r_u->num_grps = num_grps;
93 r_u->grps = (uint32*)malloc(sizeof(r_u->grps[0]) * r_u->num_grps);
94 if (r_u->grps == NULL && num_grps != 0)
98 for (i = 0; i < num_grps; i++)
100 r_u->grps[i] = (gid_t)grps[i];
106 /*******************************************************************
107 reads or writes a structure.
108 ********************************************************************/
109 BOOL creds_io_unix_sec(char *desc, CREDS_UNIX_SEC *r_u, prs_struct *ps, int depth)
113 if (r_u == NULL) return False;
115 prs_debug(ps, depth, desc, "creds_io_unix_sec");
120 prs_uint32("uid", ps, depth, &(r_u->uid));
121 prs_uint32("gid", ps, depth, &(r_u->gid));
122 prs_uint32("num_grps", ps, depth, (uint32 *)&(r_u->num_grps));
123 if (r_u->num_grps != 0)
127 tgr = (uint32*)Realloc(r_u->grps,
128 sizeof(r_u->grps[0]) *
132 creds_free_unix_sec(r_u);
135 else r_u->grps = tgr;
137 for (i = 0; i < r_u->num_grps; i++)
139 prs_uint32("", ps, depth, &(r_u->grps[i]));
145 /*******************************************************************
147 ********************************************************************/
148 void creds_free_unix_sec(CREDS_UNIX_SEC *r_u)
150 SAFE_FREE(r_u->grps);
153 /*******************************************************************
154 makes a CREDS_NT_SEC structure.
155 ********************************************************************/
156 BOOL make_creds_nt_sec(CREDS_NT_SEC *r_u,
157 DOM_SID *sid, uint32 num_grps, uint32 *grps)
160 if (r_u == NULL) return False;
162 DEBUG(5,("make_creds_unix_sec\n"));
164 sid_copy(&r_u->sid, sid);
165 r_u->num_grps = num_grps;
166 r_u->grp_rids = (uint32*)malloc(sizeof(r_u->grp_rids[0]) * r_u->num_grps);
168 if (r_u->grp_rids == NULL && num_grps != 0)
172 for (i = 0; i < num_grps; i++)
174 r_u->grp_rids[i] = grps[i];
180 /*******************************************************************
181 reads or writes a structure.
182 ********************************************************************/
183 BOOL creds_io_nt_sec(char *desc, CREDS_NT_SEC *r_u, prs_struct *ps, int depth)
186 if (r_u == NULL) return False;
188 prs_debug(ps, depth, desc, "creds_io_nt");
193 smb_io_dom_sid ("sid", &r_u->sid, ps, depth);
196 prs_uint32("num_grps", ps, depth, &(r_u->num_grps));
197 if (r_u->num_grps != 0)
201 tgrid = (uint32*)Realloc(r_u->grp_rids,
202 sizeof(r_u->grp_rids[0]) *
206 creds_free_nt_sec(r_u);
209 else r_u->grp_rids = tgrid;
211 for (i = 0; i < r_u->num_grps; i++)
213 prs_uint32("", ps, depth, &(r_u->grp_rids[i]));
219 /*******************************************************************
221 ********************************************************************/
222 void creds_free_nt_sec(CREDS_NT_SEC *r_u)
224 SAFE_FREE(r_u->grp_rids);
227 /*******************************************************************
228 reads or writes a structure.
229 ********************************************************************/
230 BOOL creds_io_pwd_info(char *desc, struct pwd_info *pwd, prs_struct *ps, int depth)
232 if (pwd == NULL) return False;
234 prs_debug(ps, depth, desc, "creds_io_pwd_info");
239 prs_uint32("nullpwd", ps, depth, (uint32 *)&(pwd->null_pwd));
245 prs_uint32("cleartext", ps, depth, (uint32 *)&(pwd->cleartext));
248 prs_string("password", ps, depth, pwd->password, strlen(pwd->password), sizeof(pwd->password));
252 prs_uint32("crypted", ps, depth, (uint32 *)&(pwd->crypted));
254 prs_uint8s(False, "smb_lm_pwd", ps, depth, (unsigned char*)&pwd->smb_lm_pwd, sizeof(pwd->smb_lm_pwd));
256 prs_uint8s(False, "smb_nt_pwd", ps, depth, (unsigned char*)&pwd->smb_nt_pwd, sizeof(pwd->smb_nt_pwd));
259 prs_uint8s(False, "smb_lm_owf", ps, depth, (unsigned char*)&pwd->smb_lm_owf, sizeof(pwd->smb_lm_owf));
261 prs_uint32("nt_owf_len", ps, depth, &(pwd->nt_owf_len));
262 if (pwd->nt_owf_len > sizeof(pwd->smb_nt_owf))
266 prs_uint8s(False, "smb_nt_owf", ps, depth, (unsigned char*)&pwd->smb_nt_owf, pwd->nt_owf_len);
269 prs_uint8s(False, "lm_cli_chal", ps, depth, (unsigned char*)&pwd->lm_cli_chal, sizeof(pwd->lm_cli_chal));
271 prs_uint32("nt_cli_chal_len", ps, depth, &(pwd->nt_cli_chal_len));
273 if (pwd->nt_cli_chal_len > sizeof(pwd->nt_cli_chal))
277 prs_uint8s(False, "nt_cli_chal", ps, depth, (unsigned char*)&pwd->nt_cli_chal, pwd->nt_cli_chal_len);
283 /*******************************************************************
284 reads or writes a structure.
285 ********************************************************************/
286 BOOL creds_io_nt(char *desc, CREDS_NT *r_u, prs_struct *ps, int depth)
288 if (r_u == NULL) return False;
290 prs_debug(ps, depth, desc, "creds_io_nt");
295 /* lkclXXXX CHEAT!!!!!!!! */
296 prs_string("user_name", ps, depth, r_u->user_name, strlen(r_u->user_name), sizeof(r_u->user_name));
298 prs_string("domain", ps, depth, r_u->domain, strlen(r_u->domain), sizeof(r_u->domain));
301 creds_io_pwd_info("pwd", &r_u->pwd, ps, depth);
304 prs_uint32("ntlmssp", ps, depth, &(r_u->ntlmssp_flags));
309 /*******************************************************************
311 ********************************************************************/
312 void creds_free_nt(CREDS_NT *r_u)
316 /*******************************************************************
317 reads or writes a structure.
318 ********************************************************************/
319 BOOL creds_io_hybrid(char *desc, CREDS_HYBRID *r_u, prs_struct *ps, int depth)
321 if (r_u == NULL) return False;
323 prs_debug(ps, depth, desc, "creds_io_hybrid");
328 prs_uint32("reuse", ps, depth, (uint32 *)&(r_u->reuse));
330 prs_uint32("ptr_ntc", ps, depth, &(r_u->ptr_ntc));
331 prs_uint32("ptr_uxc", ps, depth, &(r_u->ptr_uxc));
332 prs_uint32("ptr_nts", ps, depth, &(r_u->ptr_nts));
333 prs_uint32("ptr_uxs", ps, depth, &(r_u->ptr_uxs));
334 prs_uint32("ptr_ssk", ps, depth, &(r_u->ptr_ssk));
335 if (r_u->ptr_ntc != 0)
337 if (!creds_io_nt ("ntc", &r_u->ntc, ps, depth)) return False;
339 if (r_u->ptr_uxc != 0)
341 if (!creds_io_unix("uxc", &r_u->uxc, ps, depth)) return False;
343 if (r_u->ptr_nts != 0)
345 if (!creds_io_nt_sec ("nts", &r_u->nts, ps, depth)) return False;
347 if (r_u->ptr_uxs != 0)
349 if (!creds_io_unix_sec("uxs", &r_u->uxs, ps, depth)) return False;
351 if (r_u->ptr_ssk != 0)
353 prs_uint8s(False, "usr_sess_key", ps, depth, (unsigned char*)&r_u->usr_sess_key, sizeof(r_u->usr_sess_key));
357 memset(r_u->usr_sess_key, 0, sizeof(r_u->usr_sess_key));
362 void copy_unix_creds(CREDS_UNIX *to, const CREDS_UNIX *from)
366 to->user_name[0] = 0;
369 fstrcpy(to->user_name, from->user_name);
372 void copy_nt_sec_creds(CREDS_NT_SEC *to, const CREDS_NT_SEC *from)
379 sid_copy(&to->sid, &from->sid);
383 if (from->num_grps != 0)
385 size_t size = from->num_grps * sizeof(from->grp_rids[0]);
386 to->grp_rids = (uint32*)malloc(size);
387 if (to->grp_rids == NULL)
391 to->num_grps = from->num_grps;
392 memcpy(to->grp_rids, from->grp_rids, size);
396 void copy_unix_sec_creds(CREDS_UNIX_SEC *to, const CREDS_UNIX_SEC *from)
411 if (from->num_grps != 0)
413 size_t size = from->num_grps * sizeof(from->grps[0]);
414 to->grps = (uint32*)malloc(size);
415 if (to->grps == NULL)
419 to->num_grps = from->num_grps;
420 memcpy(to->grps, from->grps, size);
424 void create_ntc_from_cli_state (CREDS_NT *to, const struct cli_state *cli_from)
427 * NULL credentials --
428 * if this gets executed, it is a programming error.
429 * fall through to copy_nt_creds()
431 if (cli_from == NULL)
433 copy_nt_creds (to, NULL);
437 safe_strcpy(to->domain , cli_from->domain , sizeof(cli_from->domain )-1);
438 safe_strcpy(to->user_name, cli_from->user_name, sizeof(cli_from->user_name)-1);
439 memcpy(&to->pwd, &cli_from->pwd, sizeof(cli_from->pwd));
440 to->ntlmssp_flags = cli_from->ntlmssp_flags;
441 DEBUG(10,("create_ntc_fromcli_state: user %s domain %s flgs: %x\n",
442 to->user_name, to->domain,
448 void copy_nt_creds(struct ntuser_creds *to,
449 const struct ntuser_creds *from)
453 DEBUG(10,("copy_nt_creds: null creds\n"));
455 to->user_name[0] = 0;
456 pwd_set_nullpwd(&to->pwd);
457 to->ntlmssp_flags = 0;
461 safe_strcpy(to->domain , from->domain , sizeof(from->domain )-1);
462 safe_strcpy(to->user_name, from->user_name, sizeof(from->user_name)-1);
463 memcpy(&to->pwd, &from->pwd, sizeof(from->pwd));
464 to->ntlmssp_flags = from->ntlmssp_flags;
465 DEBUG(10,("copy_nt_creds: user %s domain %s flgs: %x\n",
466 to->user_name, to->domain,
470 void copy_user_creds(struct user_creds *to,
471 const struct user_creds *from)
481 copy_nt_creds(&to->ntc, NULL);
482 copy_unix_creds(&to->uxc, NULL);
483 copy_nt_sec_creds(&to->nts, NULL);
484 copy_unix_sec_creds(&to->uxs, NULL);
489 to->reuse = from->reuse;
491 to->ptr_nts = from->ptr_nts;
492 to->ptr_uxs = from->ptr_uxs;
493 to->ptr_ntc = from->ptr_ntc;
494 to->ptr_uxc = from->ptr_uxc;
495 to->ptr_ssk = from->ptr_ssk;
497 if (to->ptr_ntc != 0)
499 copy_nt_creds(&to->ntc, &from->ntc);
501 if (to->ptr_uxc != 0)
503 copy_unix_creds(&to->uxc, &from->uxc);
505 if (to->ptr_nts != 0)
507 copy_nt_sec_creds(&to->nts, &from->nts);
509 if (to->ptr_uxs != 0)
511 copy_unix_sec_creds(&to->uxs, &from->uxs);
513 if (to->ptr_ssk != 0)
515 memcpy(to->usr_sess_key, from->usr_sess_key,
516 sizeof(to->usr_sess_key));
520 void free_user_creds(struct user_creds *creds)
522 creds_free_unix(&creds->uxc);
523 creds_free_nt (&creds->ntc);
524 creds_free_unix_sec(&creds->uxs);
525 creds_free_nt_sec (&creds->nts);
528 /*******************************************************************
529 reads or writes a structure.
530 ********************************************************************/
531 BOOL creds_io_cmd(char *desc, CREDS_CMD *r_u, prs_struct *ps, int depth)
533 if (r_u == NULL) return False;
535 prs_debug(ps, depth, desc, "creds_io_cmd");
540 prs_uint16("version", ps, depth, &(r_u->version));
541 prs_uint16("command", ps, depth, &(r_u->command));
542 prs_uint32("pid ", ps, depth, &(r_u->pid ));
544 prs_string("name ", ps, depth, r_u->name, strlen(r_u->name), sizeof(r_u->name));
547 prs_uint32("ptr_creds", ps, depth, &(r_u->ptr_creds));
548 if (r_u->ptr_creds != 0)
550 if (!creds_io_hybrid("creds", r_u->cred, ps, depth))
561 BOOL create_ntuser_creds( prs_struct *ps,
563 uint16 version, uint16 command,
565 const struct ntuser_creds *ntu,
569 struct user_creds usr;
574 DEBUG(10,("create_user_creds: %s %d %d\n",
575 name, version, command));
579 fstrcpy(cmd.name, name);
580 cmd.version = version;
581 cmd.command = command;
583 cmd.ptr_creds = ntu != NULL ? 1 : 0;
588 copy_nt_creds(&usr.ntc, ntu);
596 prs_init(ps, 1024, NULL, MARSHALL);
599 return creds_io_cmd("creds", &cmd, ps, 0);
602 BOOL create_user_creds( prs_struct *ps,
604 uint16 version, uint16 command,
606 struct user_creds *usr)
612 DEBUG(10,("create_user_creds: %s %d %d\n",
613 name, version, command));
615 fstrcpy(cmd.name, name);
616 cmd.version = version;
617 cmd.command = command;
619 cmd.ptr_creds = usr != NULL ? 1 : 0;
622 prs_init(ps, 1024, NULL, MARSHALL);
625 return creds_io_cmd("creds", &cmd, ps, 0);