2 Unix SMB/CIFS implementation.
3 Authentication utility functions
4 Copyright (C) Volker Lendecke 2010
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program. If not, see <http://www.gnu.org/licenses/>.
22 #include "librpc/gen_ndr/samr.h"
23 #include "../lib/tsocket/tsocket.h"
26 #define DBGC_CLASS DBGC_AUTH
28 static int clear_samr_Password(struct samr_Password
*password
)
30 memset(password
->hash
, '\0', sizeof(password
->hash
));
34 static int clear_string(char *password
)
36 memset(password
, '\0', strlen(password
));
40 /****************************************************************************
41 Create an auth_usersupplied_data structure
42 ****************************************************************************/
44 NTSTATUS
make_user_info(TALLOC_CTX
*mem_ctx
,
45 struct auth_usersupplied_info
**ret_user_info
,
47 const char *internal_username
,
48 const char *client_domain
,
50 const char *workstation_name
,
51 const struct tsocket_address
*remote_address
,
52 const struct tsocket_address
*local_address
,
53 const char *service_description
,
54 const DATA_BLOB
*lm_pwd
,
55 const DATA_BLOB
*nt_pwd
,
56 const struct samr_Password
*lm_interactive_pwd
,
57 const struct samr_Password
*nt_interactive_pwd
,
58 const char *plaintext_password
,
59 enum auth_password_state password_state
)
61 struct auth_usersupplied_info
*user_info
;
62 *ret_user_info
= NULL
;
64 DEBUG(5,("attempting to make a user_info for %s (%s)\n", internal_username
, smb_name
));
66 user_info
= talloc_zero(mem_ctx
, struct auth_usersupplied_info
);
67 if (user_info
== NULL
) {
68 DEBUG(0,("talloc failed for user_info\n"));
69 return NT_STATUS_NO_MEMORY
;
72 DEBUG(5,("making strings for %s's user_info struct\n", internal_username
));
74 user_info
->client
.account_name
= talloc_strdup(user_info
, smb_name
);
75 if (user_info
->client
.account_name
== NULL
) {
79 user_info
->mapped
.account_name
= talloc_strdup(user_info
, internal_username
);
80 if (user_info
->mapped
.account_name
== NULL
) {
84 user_info
->mapped
.domain_name
= talloc_strdup(user_info
, domain
);
85 if (user_info
->mapped
.domain_name
== NULL
) {
89 user_info
->client
.domain_name
= talloc_strdup(user_info
, client_domain
);
90 if (user_info
->client
.domain_name
== NULL
) {
94 user_info
->workstation_name
= talloc_strdup(user_info
, workstation_name
);
95 if (user_info
->workstation_name
== NULL
) {
99 user_info
->remote_host
= tsocket_address_copy(remote_address
, user_info
);
100 if (user_info
->remote_host
== NULL
) {
104 if (local_address
!= NULL
) {
105 user_info
->local_host
= tsocket_address_copy(local_address
,
107 if (user_info
->local_host
== NULL
) {
112 user_info
->service_description
= talloc_strdup(user_info
, service_description
);
113 if (user_info
->service_description
== NULL
) {
117 DEBUG(5,("making blobs for %s's user_info struct\n", internal_username
));
119 if (lm_pwd
&& lm_pwd
->data
) {
120 user_info
->password
.response
.lanman
= data_blob_talloc(user_info
, lm_pwd
->data
, lm_pwd
->length
);
121 if (user_info
->password
.response
.lanman
.data
== NULL
) {
125 if (nt_pwd
&& nt_pwd
->data
) {
126 user_info
->password
.response
.nt
= data_blob_talloc(user_info
, nt_pwd
->data
, nt_pwd
->length
);
127 if (user_info
->password
.response
.nt
.data
== NULL
) {
131 if (lm_interactive_pwd
) {
132 user_info
->password
.hash
.lanman
= talloc(user_info
, struct samr_Password
);
133 if (user_info
->password
.hash
.lanman
== NULL
) {
136 memcpy(user_info
->password
.hash
.lanman
->hash
, lm_interactive_pwd
->hash
,
137 sizeof(user_info
->password
.hash
.lanman
->hash
));
138 talloc_set_destructor(user_info
->password
.hash
.lanman
, clear_samr_Password
);
141 if (nt_interactive_pwd
) {
142 user_info
->password
.hash
.nt
= talloc(user_info
, struct samr_Password
);
143 if (user_info
->password
.hash
.nt
== NULL
) {
146 memcpy(user_info
->password
.hash
.nt
->hash
, nt_interactive_pwd
->hash
,
147 sizeof(user_info
->password
.hash
.nt
->hash
));
148 talloc_set_destructor(user_info
->password
.hash
.nt
, clear_samr_Password
);
151 if (plaintext_password
) {
152 user_info
->password
.plaintext
= talloc_strdup(user_info
, plaintext_password
);
153 if (user_info
->password
.plaintext
== NULL
) {
156 talloc_set_destructor(user_info
->password
.plaintext
, clear_string
);
159 user_info
->password_state
= password_state
;
161 user_info
->logon_parameters
= 0;
163 DEBUG(10,("made a user_info for %s (%s)\n", internal_username
, smb_name
));
164 *ret_user_info
= user_info
;
167 TALLOC_FREE(user_info
);
168 return NT_STATUS_NO_MEMORY
;