2000-05-09 15:43:00 +04:00
/*
2002-01-30 09:08:46 +03:00
Unix SMB / CIFS implementation .
2000-05-09 15:43:00 +04:00
2001-12-10 02:59:42 +03:00
Winbind cache backend functions
2000-05-09 15:43:00 +04:00
2001-12-10 02:59:42 +03:00
Copyright ( C ) Andrew Tridgell 2001
2007-05-06 22:39:31 +04:00
Copyright ( C ) Gerald Carter 2003 - 2007
2005-01-15 22:00:18 +03:00
Copyright ( C ) Volker Lendecke 2005
2006-02-04 01:19:41 +03:00
Copyright ( C ) Guenther Deschner 2005
2007-05-14 16:57:24 +04:00
Copyright ( C ) Michael Adam 2007
2008-05-31 10:49:36 +04:00
2000-05-09 15:43:00 +04:00
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
2007-07-09 23:25:36 +04:00
the Free Software Foundation ; either version 3 of the License , or
2000-05-09 15:43:00 +04:00
( at your option ) any later version .
2009-07-27 01:20:54 +04:00
2000-05-09 15:43:00 +04:00
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
2009-07-27 01:20:54 +04:00
2000-05-09 15:43:00 +04:00
You should have received a copy of the GNU General Public License
2007-07-10 04:52:41 +04:00
along with this program . If not , see < http : //www.gnu.org/licenses/>.
2000-05-09 15:43:00 +04:00
*/
2003-11-12 04:51:10 +03:00
# include "includes.h"
2011-02-26 01:20:06 +03:00
# include "system/filesys.h"
2000-05-09 15:43:00 +04:00
# include "winbindd.h"
2009-01-28 10:52:53 +03:00
# include "tdb_validate.h"
2009-03-16 13:27:58 +03:00
# include "../libcli/auth/libcli_auth.h"
2014-05-08 04:17:32 +04:00
# include "../librpc/gen_ndr/ndr_winbind.h"
2010-07-02 02:32:52 +04:00
# include "ads.h"
2010-07-01 02:44:15 +04:00
# include "nss_info.h"
2010-10-12 08:27:50 +04:00
# include "../libcli/security/security.h"
2011-03-22 18:50:02 +03:00
# include "passdb/machine_sid.h"
2011-05-05 13:25:29 +04:00
# include "util_tdb.h"
2016-11-29 18:41:27 +03:00
# include "libsmb/samlogon_cache.h"
2017-08-06 19:13:10 +03:00
# include "lib/namemap_cache.h"
2020-08-07 21:17:34 +03:00
# include "lib/util/string_wrappers.h"
2000-05-09 15:43:00 +04:00
2019-11-18 12:24:56 +03:00
# include "lib/crypto/gnutls_helpers.h"
# include <gnutls/crypto.h>
2002-07-15 14:35:28 +04:00
# undef DBGC_CLASS
# define DBGC_CLASS DBGC_WINBIND
2011-12-03 04:19:34 +04:00
# define WINBINDD_CACHE_VER1 1 /* initial db version */
# define WINBINDD_CACHE_VER2 2 /* second version with timeouts for NDR entries */
# define WINBINDD_CACHE_VERSION WINBINDD_CACHE_VER2
2007-04-14 02:29:50 +04:00
# define WINBINDD_CACHE_VERSION_KEYSTR "WINBINDD_CACHE_VERSION"
2006-12-12 20:38:42 +03:00
extern struct winbindd_methods reconnect_methods ;
# ifdef HAVE_ADS
2016-01-06 00:37:30 +03:00
extern struct winbindd_methods reconnect_ads_methods ;
2006-12-12 20:38:42 +03:00
# endif
2008-05-31 10:49:36 +04:00
extern struct winbindd_methods builtin_passdb_methods ;
2010-07-06 14:50:48 +04:00
extern struct winbindd_methods sam_passdb_methods ;
2006-12-12 20:38:42 +03:00
2017-07-12 13:40:29 +03:00
static void wcache_flush_cache ( void ) ;
2007-04-14 02:29:50 +04:00
/*
* JRA . KEEP THIS LIST UP TO DATE IF YOU ADD CACHE ENTRIES .
* Here are the list of entry types that are * not * stored
* as form struct cache_entry in the cache .
*/
static const char * non_centry_keys [ ] = {
" SEQNUM/ " ,
" WINBINDD_OFFLINE " ,
WINBINDD_CACHE_VERSION_KEYSTR ,
NULL
} ;
/************************************************************************
Is this key a non - centry type ?
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2007-10-19 04:40:25 +04:00
static bool is_non_centry_key ( TDB_DATA kbuf )
2007-04-14 02:29:50 +04:00
{
int i ;
if ( kbuf . dptr = = NULL | | kbuf . dsize = = 0 ) {
2008-01-07 13:27:54 +03:00
return false ;
2007-04-14 02:29:50 +04:00
}
for ( i = 0 ; non_centry_keys [ i ] ! = NULL ; i + + ) {
size_t namelen = strlen ( non_centry_keys [ i ] ) ;
2007-04-14 02:42:21 +04:00
if ( kbuf . dsize < namelen ) {
2007-04-14 02:29:50 +04:00
continue ;
}
if ( strncmp ( non_centry_keys [ i ] , ( const char * ) kbuf . dptr , namelen ) = = 0 ) {
2008-01-07 13:27:54 +03:00
return true ;
2007-04-14 02:29:50 +04:00
}
}
2008-01-07 13:27:54 +03:00
return false ;
2007-04-14 02:29:50 +04:00
}
2006-02-04 01:19:41 +03:00
/* Global online/offline state - False when online. winbindd starts up online
and sets this to true if the first query fails and there ' s an entry in
the cache tdb telling us to stay offline . */
2007-10-19 04:40:25 +04:00
static bool global_winbindd_offline_state ;
2006-02-04 01:19:41 +03:00
2001-12-10 02:59:42 +03:00
struct winbind_cache {
TDB_CONTEXT * tdb ;
2000-05-09 15:43:00 +04:00
} ;
2001-12-10 02:59:42 +03:00
struct cache_entry {
NTSTATUS status ;
2015-04-24 05:04:23 +03:00
uint32_t sequence_number ;
2010-11-08 13:50:51 +03:00
uint64_t timeout ;
2015-04-24 05:04:23 +03:00
uint8_t * data ;
uint32_t len , ofs ;
2001-12-10 02:59:42 +03:00
} ;
2000-05-09 15:43:00 +04:00
2007-04-13 04:39:06 +04:00
void ( * smb_panic_fn ) ( const char * const why ) = smb_panic ;
2001-12-10 02:59:42 +03:00
static struct winbind_cache * wcache ;
2001-10-14 12:26:45 +04:00
2016-08-19 00:01:50 +03:00
static char * wcache_path ( void )
{
/*
* Data needs to be kept persistent in state directory for
* running with " winbindd offline logon " .
*/
2018-08-16 11:51:44 +03:00
return state_path ( talloc_tos ( ) , " winbindd_cache.tdb " ) ;
2016-08-19 00:01:50 +03:00
}
2017-08-06 19:11:02 +03:00
static void winbindd_domain_init_backend ( struct winbindd_domain * domain )
2000-05-09 15:43:00 +04:00
{
2017-08-06 19:11:02 +03:00
if ( domain - > backend ! = NULL ) {
return ;
}
2005-08-16 19:47:52 +04:00
2008-03-27 15:00:23 +03:00
if ( domain - > internal ) {
2008-05-31 10:49:36 +04:00
domain - > backend = & builtin_passdb_methods ;
2014-05-16 10:10:23 +04:00
}
if ( dom_sid_equal ( & domain - > sid , & global_sid_Builtin ) ) {
domain - > initialized = true ;
2008-03-27 15:00:23 +03:00
}
2010-07-06 14:50:48 +04:00
if ( strequal ( domain - > name , get_global_sam_name ( ) ) & &
2017-03-16 19:51:29 +03:00
sid_check_is_our_sam ( & domain - > sid ) )
{
2010-07-06 14:50:48 +04:00
domain - > backend = & sam_passdb_methods ;
}
2017-03-16 19:51:29 +03:00
if ( ! domain - > initialized ) {
2014-05-26 03:58:38 +04:00
/* We do not need a connection to an RW DC for cache operation */
init_dc_connection ( domain , false ) ;
2006-12-07 02:14:15 +03:00
}
2005-08-16 19:47:52 +04:00
2003-06-10 07:50:38 +04:00
# ifdef HAVE_ADS
2017-03-16 12:36:14 +03:00
if ( domain - > backend = = NULL ) {
2007-06-03 01:12:47 +04:00
struct winbindd_domain * our_domain = domain ;
2017-03-16 19:52:50 +03:00
/* find our domain first so we can figure out if we
2005-11-10 22:50:09 +03:00
are joined to a kerberized domain */
2017-03-16 19:51:29 +03:00
if ( ! domain - > primary ) {
2005-11-10 22:50:09 +03:00
our_domain = find_our_domain ( ) ;
2017-03-16 19:51:29 +03:00
}
2005-11-10 22:50:09 +03:00
2007-06-01 22:39:50 +04:00
if ( ( our_domain - > active_directory | | IS_DC )
& & domain - > active_directory
2017-03-16 19:51:29 +03:00
& & ! lp_winbind_rpc_only ( ) )
{
2017-03-16 19:45:36 +03:00
DBG_INFO ( " Setting ADS methods for domain %s \n " ,
domain - > name ) ;
2016-01-06 00:37:30 +03:00
domain - > backend = & reconnect_ads_methods ;
2003-06-10 07:50:38 +04:00
}
2017-03-16 12:36:14 +03:00
}
2005-11-10 22:50:09 +03:00
# endif /* HAVE_ADS */
2017-03-16 12:36:14 +03:00
if ( domain - > backend = = NULL ) {
2017-03-16 19:45:36 +03:00
DBG_INFO ( " Setting MS-RPC methods for domain %s \n " , domain - > name ) ;
2017-03-16 12:36:14 +03:00
domain - > backend = & reconnect_methods ;
2003-06-10 07:50:38 +04:00
}
2017-08-06 19:11:02 +03:00
}
/* get the winbind_cache structure */
static struct winbind_cache * get_cache ( struct winbindd_domain * domain )
{
struct winbind_cache * ret = wcache ;
winbindd_domain_init_backend ( domain ) ;
2003-06-10 07:50:38 +04:00
2017-03-16 19:51:29 +03:00
if ( ret ! = NULL ) {
2003-06-10 04:49:43 +04:00
return ret ;
2017-03-16 19:51:29 +03:00
}
2009-07-27 01:20:54 +04:00
2004-12-07 21:25:53 +03:00
ret = SMB_XMALLOC_P ( struct winbind_cache ) ;
2001-12-10 02:59:42 +03:00
ZERO_STRUCTP ( ret ) ;
wcache = ret ;
wcache_flush_cache ( ) ;
2001-10-14 12:26:45 +04:00
2001-12-10 02:59:42 +03:00
return ret ;
2000-05-09 15:43:00 +04:00
}
2001-12-10 02:59:42 +03:00
/*
free a centry structure
*/
static void centry_free ( struct cache_entry * centry )
2000-05-09 15:43:00 +04:00
{
2003-06-10 04:49:43 +04:00
if ( ! centry )
return ;
2001-12-10 02:59:42 +03:00
SAFE_FREE ( centry - > data ) ;
free ( centry ) ;
}
2001-05-07 08:32:40 +04:00
2007-10-19 04:40:25 +04:00
static bool centry_check_bytes ( struct cache_entry * centry , size_t nbytes )
2007-04-13 04:39:06 +04:00
{
if ( centry - > len - centry - > ofs < nbytes ) {
DEBUG ( 0 , ( " centry corruption? needed %u bytes, have %d \n " ,
( unsigned int ) nbytes ,
centry - > len - centry - > ofs ) ) ;
2008-01-07 13:27:54 +03:00
return false ;
2007-04-13 04:39:06 +04:00
}
2008-01-07 13:27:54 +03:00
return true ;
2007-04-13 04:39:06 +04:00
}
2010-11-04 19:10:25 +03:00
/*
2010-11-08 13:50:51 +03:00
pull a uint64_t from a cache entry
2010-11-04 19:10:25 +03:00
*/
2010-11-08 13:50:51 +03:00
static uint64_t centry_uint64_t ( struct cache_entry * centry )
2010-11-04 19:10:25 +03:00
{
2010-11-08 13:50:51 +03:00
uint64_t ret ;
2010-11-04 19:10:25 +03:00
if ( ! centry_check_bytes ( centry , 8 ) ) {
2010-11-08 13:50:51 +03:00
smb_panic_fn ( " centry_uint64_t " ) ;
2010-11-04 19:10:25 +03:00
}
ret = BVAL ( centry - > data , centry - > ofs ) ;
centry - > ofs + = 8 ;
return ret ;
}
2001-12-10 02:59:42 +03:00
/*
2015-04-24 05:04:23 +03:00
pull a uint32_t from a cache entry
2001-12-10 02:59:42 +03:00
*/
2015-04-24 05:04:23 +03:00
static uint32_t centry_uint32 ( struct cache_entry * centry )
2001-12-10 02:59:42 +03:00
{
2015-04-24 05:04:23 +03:00
uint32_t ret ;
2007-04-13 04:39:06 +04:00
2007-05-02 19:44:05 +04:00
if ( ! centry_check_bytes ( centry , 4 ) ) {
2007-04-13 04:39:06 +04:00
smb_panic_fn ( " centry_uint32 " ) ;
2001-12-10 02:59:42 +03:00
}
ret = IVAL ( centry - > data , centry - > ofs ) ;
centry - > ofs + = 4 ;
return ret ;
2000-05-09 15:43:00 +04:00
}
2006-02-04 01:19:41 +03:00
/*
2015-04-24 05:04:23 +03:00
pull a uint16_t from a cache entry
2006-02-04 01:19:41 +03:00
*/
2015-04-24 05:04:23 +03:00
static uint16_t centry_uint16 ( struct cache_entry * centry )
2006-02-04 01:19:41 +03:00
{
2015-04-24 05:04:23 +03:00
uint16_t ret ;
2007-05-02 19:44:05 +04:00
if ( ! centry_check_bytes ( centry , 2 ) ) {
2007-04-13 04:39:06 +04:00
smb_panic_fn ( " centry_uint16 " ) ;
2006-02-04 01:19:41 +03:00
}
2011-04-01 10:40:38 +04:00
ret = SVAL ( centry - > data , centry - > ofs ) ;
2006-02-04 01:19:41 +03:00
centry - > ofs + = 2 ;
return ret ;
}
2001-12-10 08:20:55 +03:00
/*
2015-04-24 05:04:23 +03:00
pull a uint8_t from a cache entry
2001-12-10 08:20:55 +03:00
*/
2015-04-24 05:04:23 +03:00
static uint8_t centry_uint8 ( struct cache_entry * centry )
2001-12-10 08:20:55 +03:00
{
2015-04-24 05:04:23 +03:00
uint8_t ret ;
2007-05-02 19:44:05 +04:00
if ( ! centry_check_bytes ( centry , 1 ) ) {
2007-04-13 04:39:06 +04:00
smb_panic_fn ( " centry_uint8 " ) ;
2001-12-10 08:20:55 +03:00
}
ret = CVAL ( centry - > data , centry - > ofs ) ;
centry - > ofs + = 1 ;
return ret ;
}
2006-02-04 01:19:41 +03:00
/*
pull a NTTIME from a cache entry
*/
static NTTIME centry_nttime ( struct cache_entry * centry )
{
NTTIME ret ;
2007-05-02 19:44:05 +04:00
if ( ! centry_check_bytes ( centry , 8 ) ) {
2007-04-13 04:39:06 +04:00
smb_panic_fn ( " centry_nttime " ) ;
2006-02-04 01:19:41 +03:00
}
2006-09-06 22:32:20 +04:00
ret = IVAL ( centry - > data , centry - > ofs ) ;
2006-02-04 01:19:41 +03:00
centry - > ofs + = 4 ;
2015-05-15 17:38:04 +03:00
ret + = ( uint64_t ) IVAL ( centry - > data , centry - > ofs ) < < 32 ;
2006-02-04 01:19:41 +03:00
centry - > ofs + = 4 ;
return ret ;
}
/*
2007-04-14 02:29:50 +04:00
pull a time_t from a cache entry . time_t stored portably as a 64 - bit time .
2006-02-04 01:19:41 +03:00
*/
static time_t centry_time ( struct cache_entry * centry )
{
2007-04-14 02:29:50 +04:00
return ( time_t ) centry_nttime ( centry ) ;
2006-02-04 01:19:41 +03:00
}
2001-12-10 02:59:42 +03:00
/* pull a string from a cache entry, using the supplied
talloc context
*/
static char * centry_string ( struct cache_entry * centry , TALLOC_CTX * mem_ctx )
2000-05-09 15:43:00 +04:00
{
2015-04-24 05:04:23 +03:00
uint32_t len ;
2001-12-10 02:59:42 +03:00
char * ret ;
2001-12-10 08:20:55 +03:00
len = centry_uint8 ( centry ) ;
2001-12-10 03:07:51 +03:00
2001-12-10 08:20:55 +03:00
if ( len = = 0xFF ) {
2001-12-10 03:07:51 +03:00
/* a deliberate NULL string */
return NULL ;
}
2007-05-02 19:44:05 +04:00
if ( ! centry_check_bytes ( centry , ( size_t ) len ) ) {
2007-04-13 04:39:06 +04:00
smb_panic_fn ( " centry_string " ) ;
2001-12-10 02:59:42 +03:00
}
2001-05-07 08:32:40 +04:00
2011-06-07 05:30:12 +04:00
ret = talloc_array ( mem_ctx , char , len + 1 ) ;
2001-12-10 02:59:42 +03:00
if ( ! ret ) {
2007-04-13 04:39:06 +04:00
smb_panic_fn ( " centry_string out of memory \n " ) ;
2001-12-10 02:59:42 +03:00
}
memcpy ( ret , centry - > data + centry - > ofs , len ) ;
ret [ len ] = 0 ;
centry - > ofs + = len ;
return ret ;
2000-05-09 15:43:00 +04:00
}
2006-08-09 00:35:17 +04:00
/* pull a hash16 from a cache entry, using the supplied
talloc context
*/
static char * centry_hash16 ( struct cache_entry * centry , TALLOC_CTX * mem_ctx )
{
2015-04-24 05:04:23 +03:00
uint32_t len ;
2006-08-09 00:35:17 +04:00
char * ret ;
len = centry_uint8 ( centry ) ;
if ( len ! = 16 ) {
DEBUG ( 0 , ( " centry corruption? hash len (%u) != 16 \n " ,
len ) ) ;
2006-09-13 18:54:55 +04:00
return NULL ;
2006-08-09 00:35:17 +04:00
}
2007-05-02 19:44:05 +04:00
if ( ! centry_check_bytes ( centry , 16 ) ) {
2006-09-13 18:54:55 +04:00
return NULL ;
2006-08-09 00:35:17 +04:00
}
2011-06-07 05:30:12 +04:00
ret = talloc_array ( mem_ctx , char , 16 ) ;
2006-08-09 00:35:17 +04:00
if ( ! ret ) {
2007-04-13 04:39:06 +04:00
smb_panic_fn ( " centry_hash out of memory \n " ) ;
2006-08-09 00:35:17 +04:00
}
memcpy ( ret , centry - > data + centry - > ofs , 16 ) ;
centry - > ofs + = 16 ;
return ret ;
}
/* pull a sid from a cache entry, using the supplied
2003-04-23 15:54:56 +04:00
talloc context
*/
2009-08-01 01:48:39 +04:00
static bool centry_sid ( struct cache_entry * centry , struct dom_sid * sid )
2003-04-23 15:54:56 +04:00
{
char * sid_string ;
2009-08-01 01:48:39 +04:00
bool ret ;
sid_string = centry_string ( centry , talloc_tos ( ) ) ;
if ( sid_string = = NULL ) {
2008-01-07 13:27:54 +03:00
return false ;
2003-04-23 15:54:56 +04:00
}
2009-08-01 01:48:39 +04:00
ret = string_to_sid ( sid , sid_string ) ;
TALLOC_FREE ( sid_string ) ;
return ret ;
2003-04-23 15:54:56 +04:00
}
2007-09-06 15:07:58 +04:00
/*
pull a NTSTATUS from a cache entry
*/
static NTSTATUS centry_ntstatus ( struct cache_entry * centry )
{
NTSTATUS status ;
status = NT_STATUS ( centry_uint32 ( centry ) ) ;
return status ;
}
2001-12-10 02:59:42 +03:00
/* the server is considered down if it can't give us a sequence number */
2007-10-19 04:40:25 +04:00
static bool wcache_server_down ( struct winbindd_domain * domain )
2000-05-09 15:43:00 +04:00
{
2007-10-19 04:40:25 +04:00
bool ret ;
2003-06-10 04:49:43 +04:00
if ( ! wcache - > tdb )
2008-01-07 13:27:54 +03:00
return false ;
2003-06-10 04:49:43 +04:00
ret = ( domain - > sequence_number = = DOM_SEQUENCE_NONE ) ;
if ( ret )
DEBUG ( 10 , ( " wcache_server_down: server for Domain %s down \n " ,
domain - > name ) ) ;
return ret ;
2001-12-10 02:59:42 +03:00
}
2000-05-09 15:43:00 +04:00
2015-04-14 13:06:55 +03:00
struct wcache_seqnum_state {
uint32_t * seqnum ;
uint32_t * last_seq_check ;
} ;
static int wcache_seqnum_parser ( TDB_DATA key , TDB_DATA data ,
void * private_data )
{
struct wcache_seqnum_state * state = private_data ;
if ( data . dsize ! = 8 ) {
DEBUG ( 10 , ( " wcache_fetch_seqnum: invalid data size %d \n " ,
( int ) data . dsize ) ) ;
return - 1 ;
}
* state - > seqnum = IVAL ( data . dptr , 0 ) ;
* state - > last_seq_check = IVAL ( data . dptr , 4 ) ;
return 0 ;
}
2009-08-24 02:08:14 +04:00
static bool wcache_fetch_seqnum ( const char * domain_name , uint32_t * seqnum ,
uint32_t * last_seq_check )
2003-06-03 20:02:33 +04:00
{
2015-04-14 13:06:55 +03:00
struct wcache_seqnum_state state = {
. seqnum = seqnum , . last_seq_check = last_seq_check
} ;
2015-04-14 13:17:20 +03:00
size_t len = strlen ( domain_name ) ;
char keystr [ len + 8 ] ;
TDB_DATA key = { . dptr = ( uint8_t * ) keystr , . dsize = sizeof ( keystr ) } ;
2015-04-14 13:06:55 +03:00
int ret ;
2009-07-27 01:20:54 +04:00
2009-08-24 02:08:14 +04:00
if ( wcache - > tdb = = NULL ) {
DEBUG ( 10 , ( " wcache_fetch_seqnum: tdb == NULL \n " ) ) ;
return false ;
2003-06-10 04:49:43 +04:00
}
2009-07-27 01:20:54 +04:00
2015-04-14 13:17:20 +03:00
snprintf ( keystr , sizeof ( keystr ) , " SEQNUM/%s " , domain_name ) ;
2009-07-27 01:20:54 +04:00
2015-04-14 13:06:55 +03:00
ret = tdb_parse_record ( wcache - > tdb , key , wcache_seqnum_parser ,
& state ) ;
return ( ret = = 0 ) ;
2009-08-24 02:08:14 +04:00
}
static NTSTATUS fetch_cache_seqnum ( struct winbindd_domain * domain , time_t now )
{
2015-04-24 05:04:23 +03:00
uint32_t last_check , time_diff ;
2009-08-24 02:08:14 +04:00
if ( ! wcache_fetch_seqnum ( domain - > name , & domain - > sequence_number ,
& last_check ) ) {
return NT_STATUS_UNSUCCESSFUL ;
}
domain - > last_seq_check = last_check ;
2003-06-03 20:02:33 +04:00
/* have we expired? */
2009-07-27 01:20:54 +04:00
2003-06-03 20:02:33 +04:00
time_diff = now - domain - > last_seq_check ;
2017-08-06 19:04:12 +03:00
if ( ( int ) time_diff > lp_winbind_cache_time ( ) ) {
2003-06-10 04:49:43 +04:00
DEBUG ( 10 , ( " fetch_cache_seqnum: timeout [%s][%u @ %u] \n " ,
domain - > name , domain - > sequence_number ,
2015-04-24 05:04:23 +03:00
( uint32_t ) domain - > last_seq_check ) ) ;
2003-06-03 20:02:33 +04:00
return NT_STATUS_UNSUCCESSFUL ;
2003-06-10 04:49:43 +04:00
}
2003-06-03 20:02:33 +04:00
DEBUG ( 10 , ( " fetch_cache_seqnum: success [%s][%u @ %u] \n " ,
domain - > name , domain - > sequence_number ,
2015-04-24 05:04:23 +03:00
( uint32_t ) domain - > last_seq_check ) ) ;
2003-06-03 20:02:33 +04:00
return NT_STATUS_OK ;
}
2009-08-25 13:26:14 +04:00
bool wcache_store_seqnum ( const char * domain_name , uint32_t seqnum ,
time_t last_seq_check )
2003-06-03 20:02:33 +04:00
{
2015-04-14 13:17:20 +03:00
size_t len = strlen ( domain_name ) ;
char keystr [ len + 8 ] ;
TDB_DATA key = { . dptr = ( uint8_t * ) keystr , . dsize = sizeof ( keystr ) } ;
2009-08-25 13:26:14 +04:00
uint8_t buf [ 8 ] ;
int ret ;
2009-07-27 01:20:54 +04:00
2009-08-25 13:26:14 +04:00
if ( wcache - > tdb = = NULL ) {
DEBUG ( 10 , ( " wcache_store_seqnum: wcache->tdb == NULL \n " ) ) ;
return false ;
2003-06-10 04:49:43 +04:00
}
2009-07-27 01:20:54 +04:00
2015-04-14 13:17:20 +03:00
snprintf ( keystr , sizeof ( keystr ) , " SEQNUM/%s " , domain_name ) ;
2009-07-27 01:20:54 +04:00
2009-08-25 13:26:14 +04:00
SIVAL ( buf , 0 , seqnum ) ;
SIVAL ( buf , 4 , last_seq_check ) ;
2009-07-27 01:20:54 +04:00
2015-04-14 13:17:20 +03:00
ret = tdb_store ( wcache - > tdb , key , make_tdb_data ( buf , sizeof ( buf ) ) ,
TDB_REPLACE ) ;
2011-06-20 13:10:33 +04:00
if ( ret ! = 0 ) {
2009-08-25 13:26:14 +04:00
DEBUG ( 10 , ( " tdb_store_bystring failed: %s \n " ,
2015-03-12 17:19:02 +03:00
tdb_errorstr ( wcache - > tdb ) ) ) ;
2009-08-25 13:26:14 +04:00
return false ;
2003-06-10 04:49:43 +04:00
}
2003-06-03 20:02:33 +04:00
2009-08-25 13:26:14 +04:00
DEBUG ( 10 , ( " wcache_store_seqnum: success [%s][%u @ %u] \n " ,
domain_name , seqnum , ( unsigned ) last_seq_check ) ) ;
2009-07-27 01:20:54 +04:00
2009-08-25 13:26:14 +04:00
return true ;
}
static bool store_cache_seqnum ( struct winbindd_domain * domain )
{
return wcache_store_seqnum ( domain - > name , domain - > sequence_number ,
domain - > last_seq_check ) ;
2003-06-03 20:02:33 +04:00
}
2001-12-10 02:59:42 +03:00
/*
2016-09-28 20:12:36 +03:00
refresh the domain sequence number on timeout .
2001-12-10 02:59:42 +03:00
*/
2003-06-03 20:02:33 +04:00
2016-09-28 20:12:36 +03:00
static void refresh_sequence_number ( struct winbindd_domain * domain )
2001-12-10 02:59:42 +03:00
{
NTSTATUS status ;
2002-01-11 13:05:34 +03:00
unsigned time_diff ;
2003-06-03 20:02:33 +04:00
time_t t = time ( NULL ) ;
2002-07-15 14:35:28 +04:00
unsigned cache_time = lp_winbind_cache_time ( ) ;
2009-12-24 14:52:24 +03:00
if ( is_domain_offline ( domain ) ) {
2007-05-07 01:34:24 +04:00
return ;
}
2009-07-27 01:20:54 +04:00
2003-08-02 22:15:33 +04:00
get_cache ( domain ) ;
2004-03-23 01:50:27 +03:00
#if 0 /* JERRY -- disable as the default cache time is now 5 minutes */
2002-07-15 14:35:28 +04:00
/* trying to reconnect is expensive, don't do it too often */
if ( domain - > sequence_number = = DOM_SEQUENCE_NONE ) {
cache_time * = 8 ;
}
2004-03-23 01:50:27 +03:00
# endif
2002-01-11 13:05:34 +03:00
2003-06-03 20:02:33 +04:00
time_diff = t - domain - > last_seq_check ;
2001-10-14 12:26:45 +04:00
2001-12-10 02:59:42 +03:00
/* see if we have to refetch the domain sequence number */
2016-09-28 20:12:36 +03:00
if ( ( time_diff < cache_time ) & &
2009-01-07 22:02:04 +03:00
( domain - > sequence_number ! = DOM_SEQUENCE_NONE ) & &
NT_STATUS_IS_OK ( domain - > last_status ) ) {
2003-06-10 04:49:43 +04:00
DEBUG ( 10 , ( " refresh_sequence_number: %s time ok \n " , domain - > name ) ) ;
2003-06-25 03:07:26 +04:00
goto done ;
2001-12-10 02:59:42 +03:00
}
2009-07-27 01:20:54 +04:00
2003-06-03 20:02:33 +04:00
/* try to get the sequence number from the tdb cache first */
/* this will update the timestamp as well */
2009-07-27 01:20:54 +04:00
2003-06-03 20:02:33 +04:00
status = fetch_cache_seqnum ( domain , t ) ;
2009-01-07 22:02:04 +03:00
if ( NT_STATUS_IS_OK ( status ) & &
( domain - > sequence_number ! = DOM_SEQUENCE_NONE ) & &
NT_STATUS_IS_OK ( domain - > last_status ) ) {
goto done ;
}
2000-05-09 15:43:00 +04:00
2004-06-03 22:00:22 +04:00
/* important! make sure that we know if this is a native
2007-05-07 00:16:12 +04:00
mode domain or not . And that we can contact it . */
if ( winbindd_can_contact_domain ( domain ) ) {
status = domain - > backend - > sequence_number ( domain ,
& domain - > sequence_number ) ;
} else {
/* just use the current time */
status = NT_STATUS_OK ;
domain - > sequence_number = time ( NULL ) ;
}
2004-06-03 22:00:22 +04:00
2001-05-07 08:32:40 +04:00
2006-10-18 18:22:08 +04:00
/* the above call could have set our domain->backend to NULL when
* coming from offline to online mode , make sure to reinitialize the
* backend - Guenther */
get_cache ( domain ) ;
2001-12-10 02:59:42 +03:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2006-09-06 16:21:13 +04:00
DEBUG ( 10 , ( " refresh_sequence_number: failed with %s \n " , nt_errstr ( status ) ) ) ;
2001-12-10 02:59:42 +03:00
domain - > sequence_number = DOM_SEQUENCE_NONE ;
}
2009-07-27 01:20:54 +04:00
2003-06-21 08:05:01 +04:00
domain - > last_status = status ;
2001-12-10 02:59:42 +03:00
domain - > last_seq_check = time ( NULL ) ;
2009-07-27 01:20:54 +04:00
2008-05-22 07:16:33 +04:00
/* save the new sequence number in the cache */
2003-06-03 20:02:33 +04:00
store_cache_seqnum ( domain ) ;
done :
2003-06-10 04:49:43 +04:00
DEBUG ( 10 , ( " refresh_sequence_number: %s seq number is now %d \n " ,
domain - > name , domain - > sequence_number ) ) ;
2003-06-03 20:02:33 +04:00
return ;
2000-05-09 15:43:00 +04:00
}
2001-12-10 02:59:42 +03:00
/*
decide if a cache entry has expired
*/
2007-10-19 04:40:25 +04:00
static bool centry_expired ( struct winbindd_domain * domain , const char * keystr , struct cache_entry * centry )
2000-05-09 15:43:00 +04:00
{
2006-02-04 01:19:41 +03:00
/* If we've been told to be offline - stay in that state... */
if ( lp_winbind_offline_logon ( ) & & global_winbindd_offline_state ) {
DEBUG ( 10 , ( " centry_expired: Key %s for domain %s valid as winbindd is globally offline. \n " ,
keystr , domain - > name ) ) ;
2008-01-07 13:27:54 +03:00
return false ;
2006-02-04 01:19:41 +03:00
}
2006-09-07 01:43:31 +04:00
/* when the domain is offline return the cached entry.
2006-02-04 01:19:41 +03:00
* This deals with transient offline states . . . */
2006-09-07 01:43:31 +04:00
if ( ! domain - > online ) {
2006-02-04 01:19:41 +03:00
DEBUG ( 10 , ( " centry_expired: Key %s for domain %s valid as domain is offline. \n " ,
keystr , domain - > name ) ) ;
2008-01-07 13:27:54 +03:00
return false ;
2006-02-04 01:19:41 +03:00
}
2001-12-10 02:59:42 +03:00
/* if the server is OK and our cache entry came from when it was down then
the entry is invalid */
2006-02-04 01:19:41 +03:00
if ( ( domain - > sequence_number ! = DOM_SEQUENCE_NONE ) & &
( centry - > sequence_number = = DOM_SEQUENCE_NONE ) ) {
2003-06-10 04:49:43 +04:00
DEBUG ( 10 , ( " centry_expired: Key %s for domain %s invalid sequence. \n " ,
keystr , domain - > name ) ) ;
2008-01-07 13:27:54 +03:00
return true ;
2001-12-10 02:59:42 +03:00
}
2000-05-09 15:43:00 +04:00
2001-12-10 02:59:42 +03:00
/* if the server is down or the cache entry is not older than the
2010-11-04 19:10:25 +03:00
current sequence number or it did not timeout then it is OK */
if ( wcache_server_down ( domain )
2010-11-08 13:55:07 +03:00
| | ( ( centry - > sequence_number = = domain - > sequence_number )
2017-08-06 19:04:12 +03:00
& & ( ( time_t ) centry - > timeout > time ( NULL ) ) ) ) {
2003-06-10 04:49:43 +04:00
DEBUG ( 10 , ( " centry_expired: Key %s for domain %s is good. \n " ,
keystr , domain - > name ) ) ;
2008-01-07 13:27:54 +03:00
return false ;
2001-12-10 02:59:42 +03:00
}
2001-05-07 08:32:40 +04:00
2003-06-10 04:49:43 +04:00
DEBUG ( 10 , ( " centry_expired: Key %s for domain %s expired \n " ,
keystr , domain - > name ) ) ;
2001-12-10 02:59:42 +03:00
/* it's expired */
2008-01-07 13:27:54 +03:00
return true ;
2000-05-09 15:43:00 +04:00
}
2006-02-04 01:19:41 +03:00
static struct cache_entry * wcache_fetch_raw ( char * kstr )
2000-05-09 15:43:00 +04:00
{
2001-12-10 02:59:42 +03:00
TDB_DATA data ;
struct cache_entry * centry ;
2001-12-10 08:20:55 +03:00
TDB_DATA key ;
2000-05-09 15:43:00 +04:00
2007-03-27 14:59:03 +04:00
key = string_tdb_data ( kstr ) ;
2015-03-12 17:23:17 +03:00
data = tdb_fetch ( wcache - > tdb , key ) ;
2001-12-10 02:59:42 +03:00
if ( ! data . dptr ) {
/* a cache miss */
return NULL ;
}
2000-05-09 15:43:00 +04:00
2004-12-07 21:25:53 +03:00
centry = SMB_XMALLOC_P ( struct cache_entry ) ;
2003-08-15 08:42:05 +04:00
centry - > data = ( unsigned char * ) data . dptr ;
2001-12-10 02:59:42 +03:00
centry - > len = data . dsize ;
centry - > ofs = 0 ;
2001-11-21 11:36:43 +03:00
2010-11-04 19:10:25 +03:00
if ( centry - > len < 16 ) {
2001-12-10 02:59:42 +03:00
/* huh? corrupt cache? */
2010-11-04 19:10:25 +03:00
DEBUG ( 10 , ( " wcache_fetch_raw: Corrupt cache for key %s "
" (len < 16)? \n " , kstr ) ) ;
2001-12-10 02:59:42 +03:00
centry_free ( centry ) ;
return NULL ;
}
2009-07-27 01:20:54 +04:00
2007-09-06 15:07:58 +04:00
centry - > status = centry_ntstatus ( centry ) ;
2001-12-10 02:59:42 +03:00
centry - > sequence_number = centry_uint32 ( centry ) ;
2010-11-08 13:50:51 +03:00
centry - > timeout = centry_uint64_t ( centry ) ;
2001-11-21 11:36:43 +03:00
2006-02-04 01:19:41 +03:00
return centry ;
}
2010-07-13 17:37:13 +04:00
static bool is_my_own_sam_domain ( struct winbindd_domain * domain )
{
if ( strequal ( domain - > name , get_global_sam_name ( ) ) & &
2012-07-12 17:55:21 +04:00
sid_check_is_our_sam ( & domain - > sid ) ) {
2010-07-13 17:37:13 +04:00
return true ;
}
return false ;
}
static bool is_builtin_domain ( struct winbindd_domain * domain )
{
if ( strequal ( domain - > name , " BUILTIN " ) & &
2010-11-23 00:22:32 +03:00
sid_check_is_builtin ( & domain - > sid ) ) {
2010-07-13 17:37:13 +04:00
return true ;
}
return false ;
}
2006-02-04 01:19:41 +03:00
/*
fetch an entry from the cache , with a varargs key . auto - fetch the sequence
number and return status
*/
static struct cache_entry * wcache_fetch ( struct winbind_cache * cache ,
struct winbindd_domain * domain ,
const char * format , . . . ) PRINTF_ATTRIBUTE ( 3 , 4 ) ;
static struct cache_entry * wcache_fetch ( struct winbind_cache * cache ,
struct winbindd_domain * domain ,
const char * format , . . . )
{
va_list ap ;
char * kstr ;
struct cache_entry * centry ;
2019-11-27 21:00:26 +03:00
int ret ;
2006-02-04 01:19:41 +03:00
2010-07-13 17:37:13 +04:00
if ( ! winbindd_use_cache ( ) | |
is_my_own_sam_domain ( domain ) | |
is_builtin_domain ( domain ) ) {
2006-04-25 12:24:50 +04:00
return NULL ;
}
2016-09-28 20:12:36 +03:00
refresh_sequence_number ( domain ) ;
2006-02-04 01:19:41 +03:00
va_start ( ap , format ) ;
2019-11-27 21:00:26 +03:00
ret = vasprintf ( & kstr , format , ap ) ;
2006-02-04 01:19:41 +03:00
va_end ( ap ) ;
2019-11-27 21:00:26 +03:00
if ( ret = = - 1 ) {
return NULL ;
}
2006-02-04 01:19:41 +03:00
centry = wcache_fetch_raw ( kstr ) ;
if ( centry = = NULL ) {
free ( kstr ) ;
return NULL ;
}
2003-06-10 04:49:43 +04:00
if ( centry_expired ( domain , kstr , centry ) ) {
2005-09-30 21:13:37 +04:00
2003-06-10 04:49:43 +04:00
DEBUG ( 10 , ( " wcache_fetch: entry %s expired for domain %s \n " ,
kstr , domain - > name ) ) ;
2005-08-17 01:15:41 +04:00
centry_free ( centry ) ;
free ( kstr ) ;
return NULL ;
2001-12-10 02:59:42 +03:00
}
2001-11-21 11:36:43 +03:00
2003-06-10 04:49:43 +04:00
DEBUG ( 10 , ( " wcache_fetch: returning entry %s for domain %s \n " ,
kstr , domain - > name ) ) ;
free ( kstr ) ;
2001-12-10 02:59:42 +03:00
return centry ;
2001-11-21 11:36:43 +03:00
}
2006-09-13 18:54:55 +04:00
static void wcache_delete ( const char * format , . . . ) PRINTF_ATTRIBUTE ( 1 , 2 ) ;
static void wcache_delete ( const char * format , . . . )
{
va_list ap ;
char * kstr ;
TDB_DATA key ;
2019-11-27 21:00:26 +03:00
int ret ;
2006-09-13 18:54:55 +04:00
va_start ( ap , format ) ;
2019-11-27 21:00:26 +03:00
ret = vasprintf ( & kstr , format , ap ) ;
2006-09-13 18:54:55 +04:00
va_end ( ap ) ;
2019-11-27 21:00:26 +03:00
if ( ret = = - 1 ) {
return ;
}
2007-03-27 14:59:03 +04:00
key = string_tdb_data ( kstr ) ;
2006-09-13 18:54:55 +04:00
tdb_delete ( wcache - > tdb , key ) ;
free ( kstr ) ;
}
2001-12-10 02:59:42 +03:00
/*
make sure we have at least len bytes available in a centry
*/
2015-04-24 05:04:23 +03:00
static void centry_expand ( struct cache_entry * centry , uint32_t len )
2001-11-21 11:36:43 +03:00
{
2003-06-10 04:49:43 +04:00
if ( centry - > len - centry - > ofs > = len )
return ;
2001-12-10 02:59:42 +03:00
centry - > len * = 2 ;
2006-07-11 22:01:26 +04:00
centry - > data = SMB_REALLOC_ARRAY ( centry - > data , unsigned char ,
centry - > len ) ;
r13915: Fixed a very interesting class of realloc() bugs found by Coverity.
realloc can return NULL in one of two cases - (1) the realloc failed,
(2) realloc succeeded but the new size requested was zero, in which
case this is identical to a free() call.
The error paths dealing with these two cases should be different,
but mostly weren't. Secondly the standard idiom for dealing with
realloc when you know the new size is non-zero is the following :
tmp = realloc(p, size);
if (!tmp) {
SAFE_FREE(p);
return error;
} else {
p = tmp;
}
However, there were *many* *many* places in Samba where we were
using the old (broken) idiom of :
p = realloc(p, size)
if (!p) {
return error;
}
which will leak the memory pointed to by p on realloc fail.
This commit (hopefully) fixes all these cases by moving to
a standard idiom of :
p = SMB_REALLOC(p, size)
if (!p) {
return error;
}
Where if the realloc returns null due to the realloc failing
or size == 0 we *guarentee* that the storage pointed to by p
has been freed. This allows me to remove a lot of code that
was dealing with the standard (more verbose) method that required
a tmp pointer. This is almost always what you want. When a
realloc fails you never usually want the old memory, you
want to free it and get into your error processing asap.
For the 11 remaining cases where we really do need to keep the
old pointer I have invented the new macro SMB_REALLOC_KEEP_OLD_ON_ERROR,
which can be used as follows :
tmp = SMB_REALLOC_KEEP_OLD_ON_ERROR(p, size);
if (!tmp) {
SAFE_FREE(p);
return error;
} else {
p = tmp;
}
SMB_REALLOC_KEEP_OLD_ON_ERROR guarentees never to free the
pointer p, even on size == 0 or realloc fail. All this is
done by a hidden extra argument to Realloc(), BOOL free_old_on_error
which is set appropriately by the SMB_REALLOC and SMB_REALLOC_KEEP_OLD_ON_ERROR
macros (and their array counterparts).
It remains to be seen what this will do to our Coverity bug count :-).
Jeremy.
(This used to be commit 1d710d06a214f3f1740e80e0bffd6aab44aac2b0)
2006-03-07 09:31:04 +03:00
if ( ! centry - > data ) {
2001-12-10 02:59:42 +03:00
DEBUG ( 0 , ( " out of memory: needed %d bytes in centry_expand \n " , centry - > len ) ) ;
2007-04-13 04:39:06 +04:00
smb_panic_fn ( " out of memory in centry_expand " ) ;
2001-12-10 02:59:42 +03:00
}
2001-11-21 11:36:43 +03:00
}
2010-11-04 19:10:25 +03:00
/*
2010-11-08 13:50:51 +03:00
push a uint64_t into a centry
2010-11-04 19:10:25 +03:00
*/
2010-11-08 13:50:51 +03:00
static void centry_put_uint64_t ( struct cache_entry * centry , uint64_t v )
2010-11-04 19:10:25 +03:00
{
centry_expand ( centry , 8 ) ;
SBVAL ( centry - > data , centry - > ofs , v ) ;
centry - > ofs + = 8 ;
}
2001-12-10 02:59:42 +03:00
/*
2015-04-24 05:04:23 +03:00
push a uint32_t into a centry
2001-12-10 02:59:42 +03:00
*/
2015-04-24 05:04:23 +03:00
static void centry_put_uint32 ( struct cache_entry * centry , uint32_t v )
2000-05-09 15:43:00 +04:00
{
2001-12-10 02:59:42 +03:00
centry_expand ( centry , 4 ) ;
SIVAL ( centry - > data , centry - > ofs , v ) ;
centry - > ofs + = 4 ;
2000-05-09 15:43:00 +04:00
}
2006-02-04 01:19:41 +03:00
/*
2015-04-24 05:04:23 +03:00
push a uint16_t into a centry
2006-02-04 01:19:41 +03:00
*/
2015-04-24 05:04:23 +03:00
static void centry_put_uint16 ( struct cache_entry * centry , uint16_t v )
2006-02-04 01:19:41 +03:00
{
centry_expand ( centry , 2 ) ;
2011-04-01 10:40:38 +04:00
SSVAL ( centry - > data , centry - > ofs , v ) ;
2006-02-04 01:19:41 +03:00
centry - > ofs + = 2 ;
}
2001-12-10 08:20:55 +03:00
/*
2015-04-24 05:04:23 +03:00
push a uint8_t into a centry
2001-12-10 08:20:55 +03:00
*/
2015-04-24 05:04:23 +03:00
static void centry_put_uint8 ( struct cache_entry * centry , uint8_t v )
2001-12-10 08:20:55 +03:00
{
centry_expand ( centry , 1 ) ;
SCVAL ( centry - > data , centry - > ofs , v ) ;
centry - > ofs + = 1 ;
}
2001-12-10 02:59:42 +03:00
/*
push a string into a centry
*/
static void centry_put_string ( struct cache_entry * centry , const char * s )
2000-05-09 15:43:00 +04:00
{
2001-12-10 03:07:51 +03:00
int len ;
if ( ! s ) {
/* null strings are marked as len 0xFFFF */
2001-12-10 08:20:55 +03:00
centry_put_uint8 ( centry , 0xFF ) ;
2001-12-10 03:07:51 +03:00
return ;
}
len = strlen ( s ) ;
2001-12-10 08:20:55 +03:00
/* can't handle more than 254 char strings. Truncating is probably best */
2005-12-19 06:02:56 +03:00
if ( len > 254 ) {
DEBUG ( 10 , ( " centry_put_string: truncating len (%d) to: 254 \n " , len ) ) ;
2003-06-10 04:49:43 +04:00
len = 254 ;
2005-12-19 06:02:56 +03:00
}
2001-12-10 08:20:55 +03:00
centry_put_uint8 ( centry , len ) ;
2001-12-10 02:59:42 +03:00
centry_expand ( centry , len ) ;
memcpy ( centry - > data + centry - > ofs , s , len ) ;
centry - > ofs + = len ;
2000-05-09 15:43:00 +04:00
}
2006-08-09 00:35:17 +04:00
/*
push a 16 byte hash into a centry - treat as 16 byte string .
*/
2015-04-24 05:04:23 +03:00
static void centry_put_hash16 ( struct cache_entry * centry , const uint8_t val [ 16 ] )
2006-08-09 00:35:17 +04:00
{
centry_put_uint8 ( centry , 16 ) ;
centry_expand ( centry , 16 ) ;
memcpy ( centry - > data + centry - > ofs , val , 16 ) ;
centry - > ofs + = 16 ;
}
2010-05-21 05:25:01 +04:00
static void centry_put_sid ( struct cache_entry * centry , const struct dom_sid * sid )
2003-04-23 15:54:56 +04:00
{
2018-10-26 09:25:14 +03:00
struct dom_sid_buf sid_string ;
centry_put_string ( centry , dom_sid_str_buf ( sid , & sid_string ) ) ;
2003-04-23 15:54:56 +04:00
}
2007-09-06 15:07:58 +04:00
/*
put NTSTATUS into a centry
*/
static void centry_put_ntstatus ( struct cache_entry * centry , NTSTATUS status )
{
2015-04-24 05:04:23 +03:00
uint32_t status_value = NT_STATUS_V ( status ) ;
2007-09-06 15:07:58 +04:00
centry_put_uint32 ( centry , status_value ) ;
}
2006-02-04 01:19:41 +03:00
/*
push a NTTIME into a centry
*/
static void centry_put_nttime ( struct cache_entry * centry , NTTIME nt )
{
centry_expand ( centry , 8 ) ;
2006-09-06 22:32:20 +04:00
SIVAL ( centry - > data , centry - > ofs , nt & 0xFFFFFFFF ) ;
2006-02-04 01:19:41 +03:00
centry - > ofs + = 4 ;
2006-09-06 22:32:20 +04:00
SIVAL ( centry - > data , centry - > ofs , nt > > 32 ) ;
2006-02-04 01:19:41 +03:00
centry - > ofs + = 4 ;
}
/*
2007-04-14 02:29:50 +04:00
push a time_t into a centry - use a 64 bit size .
NTTIME here is being used as a convenient 64 - bit size .
2006-02-04 01:19:41 +03:00
*/
static void centry_put_time ( struct cache_entry * centry , time_t t )
{
2007-04-14 02:29:50 +04:00
NTTIME nt = ( NTTIME ) t ;
2007-04-14 02:56:27 +04:00
centry_put_nttime ( centry , nt ) ;
2006-02-04 01:19:41 +03:00
}
2001-12-10 02:59:42 +03:00
/*
start a centry for output . When finished , call centry_end ( )
*/
2013-11-14 22:49:03 +04:00
static struct cache_entry * centry_start ( struct winbindd_domain * domain ,
NTSTATUS status )
2000-05-09 15:43:00 +04:00
{
2001-12-10 02:59:42 +03:00
struct cache_entry * centry ;
2001-05-07 08:32:40 +04:00
2003-06-10 04:49:43 +04:00
if ( ! wcache - > tdb )
return NULL ;
2000-05-09 15:43:00 +04:00
2004-12-07 21:25:53 +03:00
centry = SMB_XMALLOC_P ( struct cache_entry ) ;
2001-05-07 08:32:40 +04:00
2001-12-10 02:59:42 +03:00
centry - > len = 8192 ; /* reasonable default */
2015-05-03 07:07:06 +03:00
centry - > data = SMB_XMALLOC_ARRAY ( uint8_t , centry - > len ) ;
2001-12-10 02:59:42 +03:00
centry - > ofs = 0 ;
centry - > sequence_number = domain - > sequence_number ;
2010-11-04 19:10:25 +03:00
centry - > timeout = lp_winbind_cache_time ( ) + time ( NULL ) ;
2007-09-06 15:07:58 +04:00
centry_put_ntstatus ( centry , status ) ;
2001-12-10 02:59:42 +03:00
centry_put_uint32 ( centry , centry - > sequence_number ) ;
2010-11-08 13:50:51 +03:00
centry_put_uint64_t ( centry , centry - > timeout ) ;
2001-12-10 02:59:42 +03:00
return centry ;
2000-05-09 15:43:00 +04:00
}
2001-12-10 02:59:42 +03:00
/*
finish a centry and write it to the tdb
*/
2003-04-23 15:54:56 +04:00
static void centry_end ( struct cache_entry * centry , const char * format , . . . ) PRINTF_ATTRIBUTE ( 2 , 3 ) ;
2001-12-10 02:59:42 +03:00
static void centry_end ( struct cache_entry * centry , const char * format , . . . )
2000-05-09 15:43:00 +04:00
{
2001-12-10 02:59:42 +03:00
va_list ap ;
char * kstr ;
2001-12-10 08:20:55 +03:00
TDB_DATA key , data ;
2019-11-27 21:00:26 +03:00
int ret ;
2000-05-09 15:43:00 +04:00
2009-03-12 12:12:58 +03:00
if ( ! winbindd_use_cache ( ) ) {
2007-08-30 15:26:17 +04:00
return ;
}
2001-12-10 02:59:42 +03:00
va_start ( ap , format ) ;
2019-11-27 21:00:26 +03:00
ret = vasprintf ( & kstr , format , ap ) ;
2001-12-10 02:59:42 +03:00
va_end ( ap ) ;
2001-05-07 08:32:40 +04:00
2019-11-27 21:00:26 +03:00
if ( ret = = - 1 ) {
return ;
}
2007-03-27 14:59:03 +04:00
key = string_tdb_data ( kstr ) ;
2007-03-29 13:35:51 +04:00
data . dptr = centry - > data ;
2001-12-10 08:20:55 +03:00
data . dsize = centry - > ofs ;
tdb_store ( wcache - > tdb , key , data , TDB_REPLACE ) ;
2001-12-10 02:59:42 +03:00
free ( kstr ) ;
2000-05-09 15:43:00 +04:00
}
2003-04-23 15:54:56 +04:00
static void wcache_save_name_to_sid ( struct winbindd_domain * domain ,
2004-04-20 06:37:49 +04:00
NTSTATUS status , const char * domain_name ,
2010-05-21 05:25:01 +04:00
const char * name , const struct dom_sid * sid ,
2006-09-08 18:28:06 +04:00
enum lsa_SidType type )
2001-12-10 09:05:21 +03:00
{
2017-08-06 19:13:10 +03:00
bool ok ;
2001-12-10 09:05:21 +03:00
2017-08-06 19:13:10 +03:00
ok = namemap_cache_set_name2sid ( domain_name , name , sid , type ,
time ( NULL ) + lp_winbind_cache_time ( ) ) ;
if ( ! ok ) {
DBG_DEBUG ( " namemap_cache_set_name2sid failed \n " ) ;
2013-04-04 14:18:25 +04:00
}
2017-08-06 19:13:10 +03:00
/*
* Don ' t store the reverse mapping . The name came from user
* input , and we might not have the correct capitalization ,
* which is important for nsswitch .
*/
2001-12-10 09:05:21 +03:00
}
static void wcache_save_sid_to_name ( struct winbindd_domain * domain , NTSTATUS status ,
2010-05-21 05:25:01 +04:00
const struct dom_sid * sid , const char * domain_name , const char * name , enum lsa_SidType type )
2001-12-10 09:05:21 +03:00
{
2017-08-06 19:13:10 +03:00
bool ok ;
2007-09-06 15:07:58 +04:00
2017-08-06 19:13:10 +03:00
ok = namemap_cache_set_sid2name ( sid , domain_name , name , type ,
time ( NULL ) + lp_winbind_cache_time ( ) ) ;
if ( ! ok ) {
DBG_DEBUG ( " namemap_cache_set_sid2name failed \n " ) ;
2013-04-04 14:18:25 +04:00
}
2017-08-06 19:13:10 +03:00
if ( type ! = SID_NAME_UNKNOWN ) {
ok = namemap_cache_set_name2sid (
domain_name , name , sid , type ,
time ( NULL ) + lp_winbind_cache_time ( ) ) ;
if ( ! ok ) {
DBG_DEBUG ( " namemap_cache_set_name2sid failed \n " ) ;
}
2001-12-10 09:05:21 +03:00
}
}
2008-02-05 19:25:07 +03:00
static void wcache_save_lockout_policy ( struct winbindd_domain * domain ,
NTSTATUS status ,
struct samr_DomInfo12 * lockout_policy )
2006-02-04 01:19:41 +03:00
{
struct cache_entry * centry ;
centry = centry_start ( domain , status ) ;
if ( ! centry )
return ;
2008-02-05 19:25:07 +03:00
centry_put_nttime ( centry , lockout_policy - > lockout_duration ) ;
centry_put_nttime ( centry , lockout_policy - > lockout_window ) ;
centry_put_uint16 ( centry , lockout_policy - > lockout_threshold ) ;
2006-02-04 01:19:41 +03:00
centry_end ( centry , " LOC_POL/%s " , domain - > name ) ;
2008-02-05 19:25:07 +03:00
2006-02-04 01:19:41 +03:00
DEBUG ( 10 , ( " wcache_save_lockout_policy: %s \n " , domain - > name ) ) ;
centry_free ( centry ) ;
}
2008-09-16 00:41:37 +04:00
2008-02-05 19:25:07 +03:00
static void wcache_save_password_policy ( struct winbindd_domain * domain ,
NTSTATUS status ,
struct samr_DomInfo1 * policy )
2007-05-14 17:36:14 +04:00
{
2006-02-04 01:19:41 +03:00
struct cache_entry * centry ;
centry = centry_start ( domain , status ) ;
if ( ! centry )
return ;
2008-02-05 19:25:07 +03:00
centry_put_uint16 ( centry , policy - > min_password_length ) ;
centry_put_uint16 ( centry , policy - > password_history_length ) ;
2006-04-19 17:14:14 +04:00
centry_put_uint32 ( centry , policy - > password_properties ) ;
2008-02-05 19:25:07 +03:00
centry_put_nttime ( centry , policy - > max_password_age ) ;
centry_put_nttime ( centry , policy - > min_password_age ) ;
2006-02-04 01:19:41 +03:00
centry_end ( centry , " PWD_POL/%s " , domain - > name ) ;
2008-02-05 19:25:07 +03:00
2006-02-04 01:19:41 +03:00
DEBUG ( 10 , ( " wcache_save_password_policy: %s \n " , domain - > name ) ) ;
centry_free ( centry ) ;
}
2008-09-16 00:41:37 +04:00
/***************************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static void wcache_save_username_alias ( struct winbindd_domain * domain ,
NTSTATUS status ,
const char * name , const char * alias )
{
struct cache_entry * centry ;
fstring uname ;
if ( ( centry = centry_start ( domain , status ) ) = = NULL )
return ;
centry_put_string ( centry , alias ) ;
fstrcpy ( uname , name ) ;
2012-08-09 02:35:28 +04:00
( void ) strupper_m ( uname ) ;
2008-09-16 00:41:37 +04:00
centry_end ( centry , " NSS/NA/%s " , uname ) ;
DEBUG ( 10 , ( " wcache_save_username_alias: %s -> %s \n " , name , alias ) ) ;
centry_free ( centry ) ;
}
static void wcache_save_alias_username ( struct winbindd_domain * domain ,
NTSTATUS status ,
const char * alias , const char * name )
{
struct cache_entry * centry ;
fstring uname ;
if ( ( centry = centry_start ( domain , status ) ) = = NULL )
return ;
centry_put_string ( centry , name ) ;
fstrcpy ( uname , alias ) ;
2012-08-09 02:35:28 +04:00
( void ) strupper_m ( uname ) ;
2008-09-16 00:41:37 +04:00
centry_end ( centry , " NSS/AN/%s " , uname ) ;
DEBUG ( 10 , ( " wcache_save_alias_username: %s -> %s \n " , alias , name ) ) ;
centry_free ( centry ) ;
}
/***************************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
NTSTATUS resolve_username_to_alias ( TALLOC_CTX * mem_ctx ,
struct winbindd_domain * domain ,
const char * name , char * * alias )
{
struct winbind_cache * cache = get_cache ( domain ) ;
struct cache_entry * centry = NULL ;
NTSTATUS status ;
char * upper_name ;
if ( domain - > internal )
return NT_STATUS_NOT_SUPPORTED ;
if ( ! cache - > tdb )
goto do_query ;
2017-03-08 12:17:16 +03:00
upper_name = talloc_strdup_upper ( mem_ctx , name ) ;
2012-12-06 14:40:35 +04:00
if ( upper_name = = NULL ) {
2008-09-16 00:41:37 +04:00
return NT_STATUS_NO_MEMORY ;
2012-12-06 14:40:35 +04:00
}
2008-09-16 00:41:37 +04:00
centry = wcache_fetch ( cache , domain , " NSS/NA/%s " , upper_name ) ;
2012-12-06 14:40:35 +04:00
talloc_free ( upper_name ) ;
2008-09-16 00:41:37 +04:00
if ( ! centry )
goto do_query ;
status = centry - > status ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
centry_free ( centry ) ;
return status ;
}
* alias = centry_string ( centry , mem_ctx ) ;
centry_free ( centry ) ;
DEBUG ( 10 , ( " resolve_username_to_alias: [Cached] - mapped %s to %s \n " ,
name , * alias ? * alias : " (none) " ) ) ;
return ( * alias ) ? NT_STATUS_OK : NT_STATUS_OBJECT_NAME_NOT_FOUND ;
do_query :
/* If its not in cache and we are offline, then fail */
2018-05-18 17:15:06 +03:00
if ( is_domain_offline ( domain ) ) {
2008-09-16 00:41:37 +04:00
DEBUG ( 8 , ( " resolve_username_to_alias: rejecting query "
" in offline mode \n " ) ) ;
return NT_STATUS_NOT_FOUND ;
}
status = nss_map_to_alias ( mem_ctx , domain - > name , name , alias ) ;
if ( NT_STATUS_IS_OK ( status ) ) {
wcache_save_username_alias ( domain , status , name , * alias ) ;
}
if ( NT_STATUS_EQUAL ( status , NT_STATUS_NONE_MAPPED ) ) {
wcache_save_username_alias ( domain , status , name , " (NULL) " ) ;
}
DEBUG ( 5 , ( " resolve_username_to_alias: backend query returned %s \n " ,
nt_errstr ( status ) ) ) ;
if ( NT_STATUS_EQUAL ( status , NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND ) ) {
set_domain_offline ( domain ) ;
}
return status ;
}
/***************************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
NTSTATUS resolve_alias_to_username ( TALLOC_CTX * mem_ctx ,
struct winbindd_domain * domain ,
const char * alias , char * * name )
{
struct winbind_cache * cache = get_cache ( domain ) ;
struct cache_entry * centry = NULL ;
NTSTATUS status ;
char * upper_name ;
if ( domain - > internal )
return NT_STATUS_NOT_SUPPORTED ;
if ( ! cache - > tdb )
goto do_query ;
2012-12-06 14:24:17 +04:00
upper_name = talloc_strdup ( mem_ctx , alias ) ;
if ( upper_name = = NULL ) {
2008-09-16 00:41:37 +04:00
return NT_STATUS_NO_MEMORY ;
2012-12-06 14:24:17 +04:00
}
2012-08-09 02:35:28 +04:00
if ( ! strupper_m ( upper_name ) ) {
2012-12-06 14:24:17 +04:00
talloc_free ( upper_name ) ;
2012-08-09 02:35:28 +04:00
return NT_STATUS_INVALID_PARAMETER ;
}
2008-09-16 00:41:37 +04:00
centry = wcache_fetch ( cache , domain , " NSS/AN/%s " , upper_name ) ;
2012-12-06 14:24:17 +04:00
talloc_free ( upper_name ) ;
2008-09-16 00:41:37 +04:00
if ( ! centry )
goto do_query ;
status = centry - > status ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
centry_free ( centry ) ;
return status ;
}
* name = centry_string ( centry , mem_ctx ) ;
centry_free ( centry ) ;
DEBUG ( 10 , ( " resolve_alias_to_username: [Cached] - mapped %s to %s \n " ,
alias , * name ? * name : " (none) " ) ) ;
return ( * name ) ? NT_STATUS_OK : NT_STATUS_OBJECT_NAME_NOT_FOUND ;
do_query :
/* If its not in cache and we are offline, then fail */
2018-05-18 17:15:06 +03:00
if ( is_domain_offline ( domain ) ) {
2008-09-16 00:41:37 +04:00
DEBUG ( 8 , ( " resolve_alias_to_username: rejecting query "
" in offline mode \n " ) ) ;
return NT_STATUS_NOT_FOUND ;
}
/* an alias cannot contain a domain prefix or '@' */
if ( strchr ( alias , ' \\ ' ) | | strchr ( alias , ' @ ' ) ) {
DEBUG ( 10 , ( " resolve_alias_to_username: skipping fully "
" qualified name %s \n " , alias ) ) ;
return NT_STATUS_OBJECT_NAME_INVALID ;
}
status = nss_map_from_alias ( mem_ctx , domain - > name , alias , name ) ;
if ( NT_STATUS_IS_OK ( status ) ) {
wcache_save_alias_username ( domain , status , alias , * name ) ;
}
if ( NT_STATUS_EQUAL ( status , NT_STATUS_NONE_MAPPED ) ) {
wcache_save_alias_username ( domain , status , alias , " (NULL) " ) ;
}
DEBUG ( 5 , ( " resolve_alias_to_username: backend query returned %s \n " ,
nt_errstr ( status ) ) ) ;
if ( NT_STATUS_EQUAL ( status , NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND ) ) {
set_domain_offline ( domain ) ;
}
return status ;
}
2010-05-21 05:25:01 +04:00
NTSTATUS wcache_cached_creds_exist ( struct winbindd_domain * domain , const struct dom_sid * sid )
2006-02-04 01:19:41 +03:00
{
struct winbind_cache * cache = get_cache ( domain ) ;
2017-07-13 16:52:35 +03:00
int ret ;
2018-12-06 20:25:02 +03:00
struct dom_sid_buf tmp ;
fstring key_str ;
2015-04-24 05:04:23 +03:00
uint32_t rid ;
2006-02-04 01:19:41 +03:00
if ( ! cache - > tdb ) {
return NT_STATUS_INTERNAL_DB_ERROR ;
}
2006-03-23 16:22:54 +03:00
if ( is_null_sid ( sid ) ) {
return NT_STATUS_INVALID_SID ;
}
if ( ! ( sid_peek_rid ( sid , & rid ) ) | | ( rid = = 0 ) ) {
return NT_STATUS_INVALID_SID ;
}
2018-12-06 20:25:02 +03:00
fstr_sprintf ( key_str , " CRED/%s " , dom_sid_str_buf ( sid , & tmp ) ) ;
2006-02-04 01:19:41 +03:00
2017-07-13 16:52:35 +03:00
ret = tdb_exists ( cache - > tdb , string_tdb_data ( key_str ) ) ;
2017-11-18 17:14:15 +03:00
if ( ret ! = 1 ) {
2006-02-04 01:19:41 +03:00
return NT_STATUS_OBJECT_NAME_NOT_FOUND ;
}
return NT_STATUS_OK ;
}
2006-08-20 07:53:42 +04:00
/* Lookup creds for a SID - copes with old (unsalted) creds as well
as new salted ones . */
2006-02-04 01:19:41 +03:00
NTSTATUS wcache_get_creds ( struct winbindd_domain * domain ,
TALLOC_CTX * mem_ctx ,
2010-05-21 05:25:01 +04:00
const struct dom_sid * sid ,
2015-04-24 05:04:23 +03:00
const uint8_t * * cached_nt_pass ,
const uint8_t * * cached_salt )
2006-02-04 01:19:41 +03:00
{
struct winbind_cache * cache = get_cache ( domain ) ;
struct cache_entry * centry = NULL ;
NTSTATUS status ;
2015-04-24 05:04:23 +03:00
uint32_t rid ;
2018-12-14 23:09:51 +03:00
struct dom_sid_buf sidstr ;
2006-02-04 01:19:41 +03:00
if ( ! cache - > tdb ) {
return NT_STATUS_INTERNAL_DB_ERROR ;
}
2006-03-23 16:22:54 +03:00
if ( is_null_sid ( sid ) ) {
return NT_STATUS_INVALID_SID ;
}
if ( ! ( sid_peek_rid ( sid , & rid ) ) | | ( rid = = 0 ) ) {
return NT_STATUS_INVALID_SID ;
}
2006-08-20 07:53:42 +04:00
/* Try and get a salted cred first. If we can't
fall back to an unsalted cred . */
2007-12-16 00:00:39 +03:00
centry = wcache_fetch ( cache , domain , " CRED/%s " ,
2018-12-14 23:09:51 +03:00
dom_sid_str_buf ( sid , & sidstr ) ) ;
2006-02-04 01:19:41 +03:00
if ( ! centry ) {
DEBUG ( 10 , ( " wcache_get_creds: entry for [CRED/%s] not found \n " ,
2018-12-14 23:09:51 +03:00
dom_sid_str_buf ( sid , & sidstr ) ) ) ;
2006-02-04 01:19:41 +03:00
return NT_STATUS_OBJECT_NAME_NOT_FOUND ;
}
2012-11-01 17:41:56 +04:00
/*
* We don ' t use the time element at this moment ,
* but we have to consume it , so that we don ' t
* neet to change the disk format of the cache .
*/
( void ) centry_time ( centry ) ;
2006-08-20 07:53:42 +04:00
/* In the salted case this isn't actually the nt_hash itself,
but the MD5 of the salt + nt_hash . Let the caller
sort this out . It can tell as we only return the cached_salt
if we are returning a salted cred . */
2015-04-24 05:04:23 +03:00
* cached_nt_pass = ( const uint8_t * ) centry_hash16 ( centry , mem_ctx ) ;
2006-09-13 18:54:55 +04:00
if ( * cached_nt_pass = = NULL ) {
2007-12-15 23:11:36 +03:00
2018-12-06 20:25:02 +03:00
dom_sid_str_buf ( sid , & sidstr ) ;
2006-09-13 18:54:55 +04:00
/* Bad (old) cred cache. Delete and pretend we
don ' t have it . */
DEBUG ( 0 , ( " wcache_get_creds: bad entry for [CRED/%s] - deleting \n " ,
2018-12-06 20:25:02 +03:00
sidstr . buf ) ) ;
wcache_delete ( " CRED/%s " , sidstr . buf ) ;
2006-09-15 10:14:50 +04:00
centry_free ( centry ) ;
2006-09-13 18:54:55 +04:00
return NT_STATUS_OBJECT_NAME_NOT_FOUND ;
}
2006-02-04 01:19:41 +03:00
2006-08-20 07:53:42 +04:00
/* We only have 17 bytes more data in the salted cred case. */
if ( centry - > len - centry - > ofs = = 17 ) {
2015-04-24 05:04:23 +03:00
* cached_salt = ( const uint8_t * ) centry_hash16 ( centry , mem_ctx ) ;
2006-08-20 07:53:42 +04:00
} else {
* cached_salt = NULL ;
}
2007-08-15 00:43:02 +04:00
dump_data_pw ( " cached_nt_pass " , * cached_nt_pass , NT_HASH_LEN ) ;
2006-08-20 07:53:42 +04:00
if ( * cached_salt ) {
2007-08-15 00:43:02 +04:00
dump_data_pw ( " cached_salt " , * cached_salt , NT_HASH_LEN ) ;
2006-08-20 07:53:42 +04:00
}
2007-08-15 00:43:02 +04:00
2006-02-04 01:19:41 +03:00
status = centry - > status ;
2006-06-14 18:38:59 +04:00
DEBUG ( 10 , ( " wcache_get_creds: [Cached] - cached creds for user %s status: %s \n " ,
2018-12-14 23:09:51 +03:00
dom_sid_str_buf ( sid , & sidstr ) ,
nt_errstr ( status ) ) ) ;
2006-02-04 01:19:41 +03:00
centry_free ( centry ) ;
return status ;
}
2006-08-20 07:53:42 +04:00
/* Store creds for a SID - only writes out new salted ones. */
2006-02-04 01:19:41 +03:00
NTSTATUS wcache_save_creds ( struct winbindd_domain * domain ,
2010-05-21 05:25:01 +04:00
const struct dom_sid * sid ,
2015-04-24 05:04:23 +03:00
const uint8_t nt_pass [ NT_HASH_LEN ] )
2006-02-04 01:19:41 +03:00
{
struct cache_entry * centry ;
2018-12-06 20:25:02 +03:00
struct dom_sid_buf sid_str ;
2015-04-24 05:04:23 +03:00
uint32_t rid ;
uint8_t cred_salt [ NT_HASH_LEN ] ;
uint8_t salted_hash [ NT_HASH_LEN ] ;
2019-11-18 12:24:56 +03:00
gnutls_hash_hd_t hash_hnd = NULL ;
int rc ;
2006-02-04 01:19:41 +03:00
2006-03-23 16:22:54 +03:00
if ( is_null_sid ( sid ) ) {
return NT_STATUS_INVALID_SID ;
}
if ( ! ( sid_peek_rid ( sid , & rid ) ) | | ( rid = = 0 ) ) {
return NT_STATUS_INVALID_SID ;
}
centry = centry_start ( domain , NT_STATUS_OK ) ;
2006-02-04 01:19:41 +03:00
if ( ! centry ) {
return NT_STATUS_INTERNAL_DB_ERROR ;
}
2007-08-15 00:43:02 +04:00
dump_data_pw ( " nt_pass " , nt_pass , NT_HASH_LEN ) ;
2006-02-04 01:19:41 +03:00
centry_put_time ( centry , time ( NULL ) ) ;
2006-08-20 07:53:42 +04:00
/* Create a salt and then salt the hash. */
generate_random_buffer ( cred_salt , NT_HASH_LEN ) ;
2019-11-18 12:24:56 +03:00
rc = gnutls_hash_init ( & hash_hnd , GNUTLS_DIG_MD5 ) ;
if ( rc < 0 ) {
2019-11-19 16:20:14 +03:00
centry_free ( centry ) ;
2019-11-18 12:24:56 +03:00
return gnutls_error_to_ntstatus ( rc , NT_STATUS_HASH_NOT_SUPPORTED ) ;
}
rc = gnutls_hash ( hash_hnd , cred_salt , 16 ) ;
if ( rc < 0 ) {
gnutls_hash_deinit ( hash_hnd , NULL ) ;
2019-11-19 16:20:14 +03:00
centry_free ( centry ) ;
2019-11-18 12:24:56 +03:00
return gnutls_error_to_ntstatus ( rc , NT_STATUS_HASH_NOT_SUPPORTED ) ;
}
rc = gnutls_hash ( hash_hnd , nt_pass , 16 ) ;
if ( rc < 0 ) {
gnutls_hash_deinit ( hash_hnd , NULL ) ;
2019-11-19 16:20:14 +03:00
centry_free ( centry ) ;
2019-11-18 12:24:56 +03:00
return gnutls_error_to_ntstatus ( rc , NT_STATUS_HASH_NOT_SUPPORTED ) ;
}
gnutls_hash_deinit ( hash_hnd , salted_hash ) ;
2006-08-20 07:53:42 +04:00
centry_put_hash16 ( centry , salted_hash ) ;
centry_put_hash16 ( centry , cred_salt ) ;
2018-12-06 20:25:02 +03:00
centry_end ( centry , " CRED/%s " , dom_sid_str_buf ( sid , & sid_str ) ) ;
2006-02-04 01:19:41 +03:00
2018-12-06 20:25:02 +03:00
DEBUG ( 10 , ( " wcache_save_creds: %s \n " , sid_str . buf ) ) ;
2006-02-04 01:19:41 +03:00
centry_free ( centry ) ;
return NT_STATUS_OK ;
}
2001-12-10 09:05:21 +03:00
2001-12-10 02:59:42 +03:00
/* Query display info. This is the basic user list fn */
2016-10-08 02:19:07 +03:00
NTSTATUS wb_cache_query_user_list ( struct winbindd_domain * domain ,
TALLOC_CTX * mem_ctx ,
2017-01-03 15:11:30 +03:00
uint32_t * * prids )
2000-05-09 15:43:00 +04:00
{
2001-12-10 02:59:42 +03:00
struct winbind_cache * cache = get_cache ( domain ) ;
struct cache_entry * centry = NULL ;
2017-01-03 15:11:30 +03:00
uint32_t num_rids = 0 ;
uint32_t * rids = NULL ;
2001-12-10 02:59:42 +03:00
NTSTATUS status ;
2003-06-11 02:11:30 +04:00
unsigned int i , retry ;
2010-01-06 14:13:59 +03:00
bool old_status = domain - > online ;
2000-05-09 15:43:00 +04:00
2017-01-03 15:11:30 +03:00
* prids = NULL ;
2003-06-10 04:49:43 +04:00
if ( ! cache - > tdb )
goto do_query ;
2001-10-14 12:26:45 +04:00
2001-12-11 03:03:58 +03:00
centry = wcache_fetch ( cache , domain , " UL/%s " , domain - > name ) ;
2003-06-10 04:49:43 +04:00
if ( ! centry )
goto do_query ;
2001-10-14 12:26:45 +04:00
2010-01-06 10:05:20 +03:00
do_fetch_cache :
2017-01-03 15:11:30 +03:00
num_rids = centry_uint32 ( centry ) ;
2009-07-27 01:20:54 +04:00
2017-01-03 15:11:30 +03:00
if ( num_rids = = 0 ) {
2003-06-10 04:49:43 +04:00
goto do_cached ;
2017-01-03 15:11:30 +03:00
}
2001-12-10 02:59:42 +03:00
2017-01-03 15:11:30 +03:00
rids = talloc_array ( mem_ctx , uint32_t , num_rids ) ;
if ( rids = = NULL ) {
2017-01-10 16:29:38 +03:00
centry_free ( centry ) ;
2017-01-03 15:11:30 +03:00
return NT_STATUS_NO_MEMORY ;
2007-04-13 04:39:06 +04:00
}
2017-01-03 15:11:30 +03:00
for ( i = 0 ; i < num_rids ; i + + ) {
rids [ i ] = centry_uint32 ( centry ) ;
2001-12-10 02:59:42 +03:00
}
2001-10-14 12:26:45 +04:00
2001-12-10 02:59:42 +03:00
do_cached :
status = centry - > status ;
2003-06-10 04:49:43 +04:00
2006-06-14 18:38:59 +04:00
DEBUG ( 10 , ( " query_user_list: [Cached] - cached list for domain %s status: %s \n " ,
domain - > name , nt_errstr ( status ) ) ) ;
2003-06-10 04:49:43 +04:00
2001-12-10 02:59:42 +03:00
centry_free ( centry ) ;
return status ;
2001-10-14 12:26:45 +04:00
2001-12-10 02:59:42 +03:00
do_query :
2001-12-19 11:44:23 +03:00
2003-06-21 08:05:01 +04:00
/* Return status value returned by seq number check */
if ( ! NT_STATUS_IS_OK ( domain - > last_status ) )
return domain - > last_status ;
2000-05-09 15:43:00 +04:00
2003-06-11 02:11:30 +04:00
/* Put the query_user_list() in a retry loop. There appears to be
* some bug either with Windows 2000 or Samba ' s handling of large
* rpc replies . This manifests itself as sudden disconnection
* at a random point in the enumeration of a large ( 60 k ) user list .
* The retry loop simply tries the operation again . ) - : It ' s not
* pretty but an acceptable workaround until we work out what the
* real problem is . */
retry = 0 ;
do {
DEBUG ( 10 , ( " query_user_list: [Cached] - doing backend query for list for domain %s \n " ,
domain - > name ) ) ;
2017-01-03 15:11:30 +03:00
rids = NULL ;
status = domain - > backend - > query_user_list ( domain , mem_ctx ,
& rids ) ;
num_rids = talloc_array_length ( rids ) ;
2007-08-27 22:26:40 +04:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2005-06-09 02:10:34 +04:00
DEBUG ( 3 , ( " query_user_list: returned 0x%08x, "
" retrying \n " , NT_STATUS_V ( status ) ) ) ;
2007-08-27 22:26:40 +04:00
}
if ( NT_STATUS_EQUAL ( status , NT_STATUS_UNSUCCESSFUL ) ) {
DEBUG ( 3 , ( " query_user_list: flushing "
" connection cache \n " ) ) ;
2014-09-23 21:35:21 +04:00
invalidate_cm_connection ( domain ) ;
2007-08-27 22:26:40 +04:00
}
2010-01-06 10:05:20 +03:00
if ( NT_STATUS_EQUAL ( status , NT_STATUS_IO_TIMEOUT ) | |
NT_STATUS_EQUAL ( status , NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND ) ) {
2010-01-06 14:13:59 +03:00
if ( ! domain - > internal & & old_status ) {
2010-01-06 10:05:20 +03:00
set_domain_offline ( domain ) ;
}
/* store partial response. */
2017-01-03 15:11:30 +03:00
if ( num_rids > 0 ) {
2010-01-06 10:05:20 +03:00
/*
* humm , what about the status used for cache ?
* Should it be NT_STATUS_OK ?
*/
break ;
}
/*
* domain is offline now , and there is no user entries ,
* try to fetch from cache again .
*/
2010-01-06 14:13:59 +03:00
if ( cache - > tdb & & ! domain - > online & & ! domain - > internal & & old_status ) {
2010-01-06 10:05:20 +03:00
centry = wcache_fetch ( cache , domain , " UL/%s " , domain - > name ) ;
/* partial response... */
if ( ! centry ) {
goto skip_save ;
} else {
goto do_fetch_cache ;
}
} else {
goto skip_save ;
}
}
2003-06-10 04:49:43 +04:00
2003-06-21 08:05:01 +04:00
} while ( NT_STATUS_V ( status ) = = NT_STATUS_V ( NT_STATUS_UNSUCCESSFUL ) & &
( retry + + < 5 ) ) ;
2001-12-10 02:59:42 +03:00
/* and save it */
2016-09-28 20:12:36 +03:00
refresh_sequence_number ( domain ) ;
2010-01-06 10:05:20 +03:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
return status ;
}
2001-12-10 02:59:42 +03:00
centry = centry_start ( domain , status ) ;
2003-06-10 04:49:43 +04:00
if ( ! centry )
goto skip_save ;
2017-01-03 15:11:30 +03:00
centry_put_uint32 ( centry , num_rids ) ;
for ( i = 0 ; i < num_rids ; i + + ) {
centry_put_uint32 ( centry , rids [ i ] ) ;
2001-12-10 02:59:42 +03:00
}
2001-12-11 03:03:58 +03:00
centry_end ( centry , " UL/%s " , domain - > name ) ;
2001-12-10 02:59:42 +03:00
centry_free ( centry ) ;
2017-01-03 15:11:30 +03:00
* prids = rids ;
2001-12-10 02:59:42 +03:00
skip_save :
return status ;
2000-05-09 15:43:00 +04:00
}
2001-12-10 02:59:42 +03:00
/* list all domain groups */
2016-10-08 02:19:07 +03:00
NTSTATUS wb_cache_enum_dom_groups ( struct winbindd_domain * domain ,
TALLOC_CTX * mem_ctx ,
uint32_t * num_entries ,
struct wb_acct_info * * info )
2000-05-09 15:43:00 +04:00
{
2001-12-10 02:59:42 +03:00
struct winbind_cache * cache = get_cache ( domain ) ;
struct cache_entry * centry = NULL ;
NTSTATUS status ;
2003-04-23 15:54:56 +04:00
unsigned int i ;
2010-01-06 14:13:59 +03:00
bool old_status ;
2001-05-07 08:32:40 +04:00
2010-01-06 14:13:59 +03:00
old_status = domain - > online ;
2003-06-10 04:49:43 +04:00
if ( ! cache - > tdb )
goto do_query ;
2000-05-09 15:43:00 +04:00
2002-10-08 22:32:42 +04:00
centry = wcache_fetch ( cache , domain , " GL/%s/domain " , domain - > name ) ;
2003-06-10 04:49:43 +04:00
if ( ! centry )
goto do_query ;
2001-05-07 08:32:40 +04:00
2010-01-06 10:05:20 +03:00
do_fetch_cache :
2001-12-10 02:59:42 +03:00
* num_entries = centry_uint32 ( centry ) ;
2009-07-27 01:20:54 +04:00
2003-06-10 04:49:43 +04:00
if ( * num_entries = = 0 )
goto do_cached ;
2001-12-10 02:59:42 +03:00
2011-06-07 05:30:12 +04:00
( * info ) = talloc_array ( mem_ctx , struct wb_acct_info , * num_entries ) ;
2007-04-13 04:39:06 +04:00
if ( ! ( * info ) ) {
smb_panic_fn ( " enum_dom_groups out of memory " ) ;
}
2001-12-10 02:59:42 +03:00
for ( i = 0 ; i < ( * num_entries ) ; i + + ) {
2018-10-30 20:47:16 +03:00
( * info ) [ i ] . acct_name = centry_string ( centry , ( * info ) ) ;
( * info ) [ i ] . acct_desc = centry_string ( centry , ( * info ) ) ;
2001-12-10 02:59:42 +03:00
( * info ) [ i ] . rid = centry_uint32 ( centry ) ;
}
2001-05-07 08:32:40 +04:00
2001-12-10 02:59:42 +03:00
do_cached :
status = centry - > status ;
2003-06-10 04:49:43 +04:00
2006-06-14 18:38:59 +04:00
DEBUG ( 10 , ( " enum_dom_groups: [Cached] - cached list for domain %s status: %s \n " ,
domain - > name , nt_errstr ( status ) ) ) ;
2003-06-10 04:49:43 +04:00
2001-12-10 02:59:42 +03:00
centry_free ( centry ) ;
return status ;
2001-05-07 08:32:40 +04:00
2001-12-10 02:59:42 +03:00
do_query :
2001-12-19 11:44:23 +03:00
* num_entries = 0 ;
* info = NULL ;
2003-06-21 08:05:01 +04:00
/* Return status value returned by seq number check */
if ( ! NT_STATUS_IS_OK ( domain - > last_status ) )
return domain - > last_status ;
2001-05-07 08:32:40 +04:00
2003-06-10 04:49:43 +04:00
DEBUG ( 10 , ( " enum_dom_groups: [Cached] - doing backend query for list for domain %s \n " ,
domain - > name ) ) ;
2003-06-10 07:50:38 +04:00
status = domain - > backend - > enum_dom_groups ( domain , mem_ctx , num_entries , info ) ;
2001-12-10 02:59:42 +03:00
2010-01-06 10:05:20 +03:00
if ( NT_STATUS_EQUAL ( status , NT_STATUS_IO_TIMEOUT ) | |
NT_STATUS_EQUAL ( status , NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND ) ) {
2010-01-06 14:13:59 +03:00
if ( ! domain - > internal & & old_status ) {
2010-01-06 10:05:20 +03:00
set_domain_offline ( domain ) ;
}
if ( cache - > tdb & &
! domain - > online & &
2010-01-06 14:13:59 +03:00
! domain - > internal & &
old_status ) {
2010-01-06 10:05:20 +03:00
centry = wcache_fetch ( cache , domain , " GL/%s/domain " , domain - > name ) ;
if ( centry ) {
goto do_fetch_cache ;
}
}
}
2001-12-10 02:59:42 +03:00
/* and save it */
2016-09-28 20:12:36 +03:00
refresh_sequence_number ( domain ) ;
2010-01-06 10:05:20 +03:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
return status ;
}
2001-12-10 02:59:42 +03:00
centry = centry_start ( domain , status ) ;
2003-06-10 04:49:43 +04:00
if ( ! centry )
goto skip_save ;
2001-12-10 02:59:42 +03:00
centry_put_uint32 ( centry , * num_entries ) ;
for ( i = 0 ; i < ( * num_entries ) ; i + + ) {
centry_put_string ( centry , ( * info ) [ i ] . acct_name ) ;
centry_put_string ( centry , ( * info ) [ i ] . acct_desc ) ;
centry_put_uint32 ( centry , ( * info ) [ i ] . rid ) ;
}
2002-10-08 22:32:42 +04:00
centry_end ( centry , " GL/%s/domain " , domain - > name ) ;
2001-12-10 02:59:42 +03:00
centry_free ( centry ) ;
skip_save :
return status ;
2000-05-09 15:43:00 +04:00
}
2002-10-08 22:32:42 +04:00
/* list all domain groups */
2016-10-08 02:19:07 +03:00
NTSTATUS wb_cache_enum_local_groups ( struct winbindd_domain * domain ,
TALLOC_CTX * mem_ctx ,
uint32_t * num_entries ,
struct wb_acct_info * * info )
2002-10-08 22:32:42 +04:00
{
struct winbind_cache * cache = get_cache ( domain ) ;
struct cache_entry * centry = NULL ;
NTSTATUS status ;
2003-04-23 15:54:56 +04:00
unsigned int i ;
2010-01-06 14:13:59 +03:00
bool old_status ;
2002-10-08 22:32:42 +04:00
2010-01-06 14:13:59 +03:00
old_status = domain - > online ;
2003-06-10 04:49:43 +04:00
if ( ! cache - > tdb )
goto do_query ;
2002-10-08 22:32:42 +04:00
centry = wcache_fetch ( cache , domain , " GL/%s/local " , domain - > name ) ;
2003-06-10 04:49:43 +04:00
if ( ! centry )
goto do_query ;
2002-10-08 22:32:42 +04:00
2010-01-06 10:05:20 +03:00
do_fetch_cache :
2002-10-08 22:32:42 +04:00
* num_entries = centry_uint32 ( centry ) ;
2009-07-27 01:20:54 +04:00
2003-06-10 04:49:43 +04:00
if ( * num_entries = = 0 )
goto do_cached ;
2002-10-08 22:32:42 +04:00
2011-06-07 05:30:12 +04:00
( * info ) = talloc_array ( mem_ctx , struct wb_acct_info , * num_entries ) ;
2007-04-13 04:39:06 +04:00
if ( ! ( * info ) ) {
smb_panic_fn ( " enum_dom_groups out of memory " ) ;
}
2002-10-08 22:32:42 +04:00
for ( i = 0 ; i < ( * num_entries ) ; i + + ) {
2018-10-30 20:47:16 +03:00
( * info ) [ i ] . acct_name = centry_string ( centry , ( * info ) ) ;
( * info ) [ i ] . acct_desc = centry_string ( centry , ( * info ) ) ;
2002-10-08 22:32:42 +04:00
( * info ) [ i ] . rid = centry_uint32 ( centry ) ;
}
do_cached :
/* If we are returning cached data and the domain controller
is down then we don ' t know whether the data is up to date
or not . Return NT_STATUS_MORE_PROCESSING_REQUIRED to
indicate this . */
if ( wcache_server_down ( domain ) ) {
2003-06-10 04:49:43 +04:00
DEBUG ( 10 , ( " enum_local_groups: returning cached user list and server was down \n " ) ) ;
2002-10-08 22:32:42 +04:00
status = NT_STATUS_MORE_PROCESSING_REQUIRED ;
} else
status = centry - > status ;
2006-06-14 18:38:59 +04:00
DEBUG ( 10 , ( " enum_local_groups: [Cached] - cached list for domain %s status: %s \n " ,
domain - > name , nt_errstr ( status ) ) ) ;
2003-06-10 04:49:43 +04:00
2002-10-08 22:32:42 +04:00
centry_free ( centry ) ;
return status ;
do_query :
* num_entries = 0 ;
* info = NULL ;
2003-06-21 08:05:01 +04:00
/* Return status value returned by seq number check */
if ( ! NT_STATUS_IS_OK ( domain - > last_status ) )
return domain - > last_status ;
2002-10-08 22:32:42 +04:00
2003-06-10 04:49:43 +04:00
DEBUG ( 10 , ( " enum_local_groups: [Cached] - doing backend query for list for domain %s \n " ,
domain - > name ) ) ;
2003-06-10 07:50:38 +04:00
status = domain - > backend - > enum_local_groups ( domain , mem_ctx , num_entries , info ) ;
2002-10-08 22:32:42 +04:00
2010-01-06 10:05:20 +03:00
if ( NT_STATUS_EQUAL ( status , NT_STATUS_IO_TIMEOUT ) | |
NT_STATUS_EQUAL ( status , NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND ) ) {
2010-01-06 14:13:59 +03:00
if ( ! domain - > internal & & old_status ) {
2010-01-06 10:05:20 +03:00
set_domain_offline ( domain ) ;
}
if ( cache - > tdb & &
! domain - > internal & &
2010-01-06 14:13:59 +03:00
! domain - > online & &
old_status ) {
2010-01-06 10:05:20 +03:00
centry = wcache_fetch ( cache , domain , " GL/%s/local " , domain - > name ) ;
if ( centry ) {
goto do_fetch_cache ;
}
}
}
2002-10-08 22:32:42 +04:00
/* and save it */
2016-09-28 20:12:36 +03:00
refresh_sequence_number ( domain ) ;
2010-01-06 10:05:20 +03:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
return status ;
}
2002-10-08 22:32:42 +04:00
centry = centry_start ( domain , status ) ;
2003-06-10 04:49:43 +04:00
if ( ! centry )
goto skip_save ;
2002-10-08 22:32:42 +04:00
centry_put_uint32 ( centry , * num_entries ) ;
for ( i = 0 ; i < ( * num_entries ) ; i + + ) {
centry_put_string ( centry , ( * info ) [ i ] . acct_name ) ;
centry_put_string ( centry , ( * info ) [ i ] . acct_desc ) ;
centry_put_uint32 ( centry , ( * info ) [ i ] . rid ) ;
2003-04-23 15:54:56 +04:00
}
2002-10-08 22:32:42 +04:00
centry_end ( centry , " GL/%s/local " , domain - > name ) ;
centry_free ( centry ) ;
skip_save :
return status ;
}
2001-10-14 12:26:45 +04:00
2017-08-06 19:13:10 +03:00
struct wcache_name_to_sid_state {
struct dom_sid * sid ;
enum lsa_SidType * type ;
bool offline ;
bool found ;
} ;
static void wcache_name_to_sid_fn ( const struct dom_sid * sid ,
2018-10-13 13:01:41 +03:00
enum lsa_SidType type ,
bool expired ,
2017-08-06 19:13:10 +03:00
void * private_data )
{
struct wcache_name_to_sid_state * state = private_data ;
* state - > sid = * sid ;
* state - > type = type ;
2018-10-13 13:01:41 +03:00
state - > found = ( ! expired | | state - > offline ) ;
2017-08-06 19:13:10 +03:00
}
2017-07-12 14:12:45 +03:00
static NTSTATUS wcache_name_to_sid ( struct winbindd_domain * domain ,
const char * domain_name ,
const char * name ,
struct dom_sid * sid ,
enum lsa_SidType * type )
2001-11-21 11:36:43 +03:00
{
2017-08-06 19:13:10 +03:00
struct wcache_name_to_sid_state state = {
. sid = sid , . type = type , . found = false ,
. offline = is_domain_offline ( domain ) ,
} ;
bool ok ;
2001-11-21 11:36:43 +03:00
2017-08-06 19:13:10 +03:00
ok = namemap_cache_find_name ( domain_name , name , wcache_name_to_sid_fn ,
& state ) ;
if ( ! ok ) {
DBG_DEBUG ( " namemap_cache_find_name failed \n " ) ;
2009-08-01 02:10:46 +04:00
return NT_STATUS_NOT_FOUND ;
}
2017-08-06 19:13:10 +03:00
if ( ! state . found ) {
DBG_DEBUG ( " cache entry not found \n " ) ;
2009-08-01 02:10:46 +04:00
return NT_STATUS_NOT_FOUND ;
}
2017-08-06 19:13:10 +03:00
if ( * type = = SID_NAME_UNKNOWN ) {
return NT_STATUS_NONE_MAPPED ;
2006-02-03 22:24:52 +03:00
}
2003-06-10 04:49:43 +04:00
2017-08-06 19:13:10 +03:00
return NT_STATUS_OK ;
2009-08-01 02:10:46 +04:00
}
/* convert a single name to a sid in a domain */
2016-10-08 02:19:07 +03:00
NTSTATUS wb_cache_name_to_sid ( struct winbindd_domain * domain ,
TALLOC_CTX * mem_ctx ,
const char * domain_name ,
const char * name ,
uint32_t flags ,
struct dom_sid * sid ,
enum lsa_SidType * type )
2009-08-01 02:10:46 +04:00
{
NTSTATUS status ;
2010-01-06 14:13:59 +03:00
bool old_status ;
2019-03-12 02:14:02 +03:00
const char * dom_name ;
2010-01-06 14:13:59 +03:00
old_status = domain - > online ;
2009-08-01 02:10:46 +04:00
status = wcache_name_to_sid ( domain , domain_name , name , sid , type ) ;
if ( ! NT_STATUS_EQUAL ( status , NT_STATUS_NOT_FOUND ) ) {
return status ;
}
2001-11-21 11:36:43 +03:00
2001-12-19 11:44:23 +03:00
ZERO_STRUCTP ( sid ) ;
2003-06-21 08:05:01 +04:00
/* If the seq number check indicated that there is a problem
* with this DC , then return that status . . . except for
* access_denied . This is special because the dc may be in
* " restrict anonymous = 1 " mode , in which case it will deny
* most unauthenticated operations , but * will * allow the LSA
* name - to - sid that we try as a fallback . */
if ( ! ( NT_STATUS_IS_OK ( domain - > last_status )
| | NT_STATUS_EQUAL ( domain - > last_status , NT_STATUS_ACCESS_DENIED ) ) )
return domain - > last_status ;
2003-06-10 04:49:43 +04:00
DEBUG ( 10 , ( " name_to_sid: [Cached] - doing backend query for name for domain %s \n " ,
domain - > name ) ) ;
2017-08-06 19:13:10 +03:00
winbindd_domain_init_backend ( domain ) ;
2009-08-02 12:43:05 +04:00
status = domain - > backend - > name_to_sid ( domain , mem_ctx , domain_name ,
2019-03-12 02:14:02 +03:00
name , flags , & dom_name , sid , type ) ;
2001-12-10 02:59:42 +03:00
2010-01-06 10:05:20 +03:00
if ( NT_STATUS_EQUAL ( status , NT_STATUS_IO_TIMEOUT ) | |
NT_STATUS_EQUAL ( status , NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND ) ) {
2010-01-06 14:13:59 +03:00
if ( ! domain - > internal & & old_status ) {
2010-01-06 10:05:20 +03:00
set_domain_offline ( domain ) ;
}
if ( ! domain - > internal & &
2010-01-06 14:13:59 +03:00
! domain - > online & &
old_status ) {
2010-01-06 10:05:20 +03:00
NTSTATUS cache_status ;
cache_status = wcache_name_to_sid ( domain , domain_name , name , sid , type ) ;
return cache_status ;
}
}
2001-12-10 02:59:42 +03:00
/* and save it */
2006-10-17 16:41:24 +04:00
2007-09-06 15:07:58 +04:00
if ( domain - > online & &
( NT_STATUS_IS_OK ( status ) | | NT_STATUS_EQUAL ( status , NT_STATUS_NONE_MAPPED ) ) ) {
2017-08-06 19:13:10 +03:00
enum lsa_SidType save_type = * type ;
if ( NT_STATUS_EQUAL ( status , NT_STATUS_NONE_MAPPED ) ) {
save_type = SID_NAME_UNKNOWN ;
}
wcache_save_name_to_sid ( domain , status , domain_name , name , sid ,
save_type ) ;
2001-12-10 02:59:42 +03:00
2008-07-01 12:34:22 +04:00
/* Only save the reverse mapping if this was not a UPN */
if ( ! strchr ( name , ' @ ' ) ) {
2012-08-09 02:35:28 +04:00
if ( ! strupper_m ( discard_const_p ( char , domain_name ) ) ) {
return NT_STATUS_INVALID_PARAMETER ;
}
2012-08-09 04:01:00 +04:00
( void ) strlower_m ( discard_const_p ( char , name ) ) ;
2017-08-06 19:13:10 +03:00
wcache_save_sid_to_name ( domain , status , sid ,
2019-03-12 02:14:02 +03:00
dom_name , name , save_type ) ;
2008-07-01 12:34:22 +04:00
}
2006-01-09 15:59:41 +03:00
}
2009-07-27 01:20:54 +04:00
2001-12-10 02:59:42 +03:00
return status ;
2001-11-21 11:36:43 +03:00
}
2017-08-06 19:13:10 +03:00
struct wcache_sid_to_name_state {
TALLOC_CTX * mem_ctx ;
char * * domain_name ;
char * * name ;
enum lsa_SidType * type ;
bool offline ;
bool found ;
} ;
2018-10-13 13:01:41 +03:00
static void wcache_sid_to_name_fn ( const char * domain ,
const char * name ,
enum lsa_SidType type ,
bool expired ,
2017-08-06 19:13:10 +03:00
void * private_data )
{
struct wcache_sid_to_name_state * state = private_data ;
* state - > domain_name = talloc_strdup ( state - > mem_ctx , domain ) ;
if ( * state - > domain_name = = NULL ) {
return ;
}
* state - > name = talloc_strdup ( state - > mem_ctx , name ) ;
if ( * state - > name = = NULL ) {
return ;
}
* state - > type = type ;
2018-10-13 13:01:41 +03:00
state - > found = ( ! expired | | state - > offline ) ;
2017-08-06 19:13:10 +03:00
}
2014-08-30 05:05:43 +04:00
static NTSTATUS wcache_sid_to_name ( struct winbindd_domain * domain ,
const struct dom_sid * sid ,
TALLOC_CTX * mem_ctx ,
char * * domain_name ,
char * * name ,
enum lsa_SidType * type )
2001-11-21 11:36:43 +03:00
{
2017-08-06 19:13:10 +03:00
struct wcache_sid_to_name_state state = {
. mem_ctx = mem_ctx , . found = false ,
. domain_name = domain_name , . name = name , . type = type ,
. offline = is_domain_offline ( domain )
} ;
bool ok ;
2001-11-21 11:36:43 +03:00
2017-08-06 19:13:10 +03:00
ok = namemap_cache_find_sid ( sid , wcache_sid_to_name_fn , & state ) ;
if ( ! ok ) {
DBG_DEBUG ( " namemap_cache_find_name failed \n " ) ;
2009-08-01 14:16:11 +04:00
return NT_STATUS_NOT_FOUND ;
}
2017-08-06 19:13:10 +03:00
if ( ! state . found ) {
DBG_DEBUG ( " cache entry not found \n " ) ;
2009-08-01 14:16:11 +04:00
return NT_STATUS_NOT_FOUND ;
}
2017-08-06 19:13:10 +03:00
if ( * type = = SID_NAME_UNKNOWN ) {
return NT_STATUS_NONE_MAPPED ;
2001-12-10 02:59:42 +03:00
}
2003-06-10 04:49:43 +04:00
2017-08-06 19:13:10 +03:00
return NT_STATUS_OK ;
2009-08-01 14:16:11 +04:00
}
/* convert a sid to a user or group name. The sid is guaranteed to be in the domain
given */
2016-10-08 02:19:07 +03:00
NTSTATUS wb_cache_sid_to_name ( struct winbindd_domain * domain ,
TALLOC_CTX * mem_ctx ,
const struct dom_sid * sid ,
char * * domain_name ,
char * * name ,
enum lsa_SidType * type )
2009-08-01 14:16:11 +04:00
{
NTSTATUS status ;
2010-01-06 14:13:59 +03:00
bool old_status ;
2009-08-01 14:16:11 +04:00
2010-01-06 14:13:59 +03:00
old_status = domain - > online ;
2009-08-01 14:16:11 +04:00
status = wcache_sid_to_name ( domain , sid , mem_ctx , domain_name , name ,
type ) ;
if ( ! NT_STATUS_EQUAL ( status , NT_STATUS_NOT_FOUND ) ) {
return status ;
}
2001-12-10 02:59:42 +03:00
2001-12-19 11:44:23 +03:00
* name = NULL ;
2004-04-20 06:37:49 +04:00
* domain_name = NULL ;
2001-12-19 11:44:23 +03:00
2003-06-21 08:05:01 +04:00
/* If the seq number check indicated that there is a problem
* with this DC , then return that status . . . except for
* access_denied . This is special because the dc may be in
* " restrict anonymous = 1 " mode , in which case it will deny
* most unauthenticated operations , but * will * allow the LSA
* sid - to - name that we try as a fallback . */
if ( ! ( NT_STATUS_IS_OK ( domain - > last_status )
| | NT_STATUS_EQUAL ( domain - > last_status , NT_STATUS_ACCESS_DENIED ) ) )
return domain - > last_status ;
2003-06-10 04:49:43 +04:00
DEBUG ( 10 , ( " sid_to_name: [Cached] - doing backend query for name for domain %s \n " ,
domain - > name ) ) ;
2017-08-06 19:13:10 +03:00
winbindd_domain_init_backend ( domain ) ;
2004-04-20 06:37:49 +04:00
status = domain - > backend - > sid_to_name ( domain , mem_ctx , sid , domain_name , name , type ) ;
2001-12-10 02:59:42 +03:00
2010-01-06 10:05:20 +03:00
if ( NT_STATUS_EQUAL ( status , NT_STATUS_IO_TIMEOUT ) | |
NT_STATUS_EQUAL ( status , NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND ) ) {
2010-01-06 14:13:59 +03:00
if ( ! domain - > internal & & old_status ) {
2010-01-06 10:05:20 +03:00
set_domain_offline ( domain ) ;
}
if ( ! domain - > internal & &
2010-01-06 14:13:59 +03:00
! domain - > online & &
old_status ) {
2010-01-06 10:05:20 +03:00
NTSTATUS cache_status ;
cache_status = wcache_sid_to_name ( domain , sid , mem_ctx ,
domain_name , name , type ) ;
return cache_status ;
}
}
2001-12-10 02:59:42 +03:00
/* and save it */
2010-01-06 10:05:20 +03:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
return status ;
}
2004-04-20 06:37:49 +04:00
wcache_save_sid_to_name ( domain , status , sid , * domain_name , * name , * type ) ;
2004-08-23 17:25:10 +04:00
/* We can't save the name to sid mapping here, as with sid history a
* later name2sid would give the wrong sid . */
2001-11-21 11:36:43 +03:00
2001-12-10 02:59:42 +03:00
return status ;
2001-11-21 11:36:43 +03:00
}
2016-10-08 02:19:07 +03:00
NTSTATUS wb_cache_rids_to_names ( struct winbindd_domain * domain ,
TALLOC_CTX * mem_ctx ,
const struct dom_sid * domain_sid ,
uint32_t * rids ,
size_t num_rids ,
char * * domain_name ,
char * * * names ,
enum lsa_SidType * * types )
2006-07-11 22:01:26 +04:00
{
struct winbind_cache * cache = get_cache ( domain ) ;
size_t i ;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
2007-10-19 04:40:25 +04:00
bool have_mapped ;
bool have_unmapped ;
2010-01-06 14:13:59 +03:00
bool old_status ;
2006-07-11 22:01:26 +04:00
2010-01-06 14:13:59 +03:00
old_status = domain - > online ;
2006-07-11 22:01:26 +04:00
* domain_name = NULL ;
* names = NULL ;
* types = NULL ;
if ( ! cache - > tdb ) {
goto do_query ;
}
if ( num_rids = = 0 ) {
return NT_STATUS_OK ;
}
2011-06-07 05:30:12 +04:00
* names = talloc_array ( mem_ctx , char * , num_rids ) ;
* types = talloc_array ( mem_ctx , enum lsa_SidType , num_rids ) ;
2006-07-11 22:01:26 +04:00
if ( ( * names = = NULL ) | | ( * types = = NULL ) ) {
result = NT_STATUS_NO_MEMORY ;
goto error ;
}
2008-01-07 13:27:54 +03:00
have_mapped = have_unmapped = false ;
2006-07-11 22:01:26 +04:00
for ( i = 0 ; i < num_rids ; i + + ) {
2010-05-21 05:25:01 +04:00
struct dom_sid sid ;
2017-08-06 19:13:10 +03:00
NTSTATUS status ;
enum lsa_SidType type ;
char * dom , * name ;
2006-07-11 22:01:26 +04:00
if ( ! sid_compose ( & sid , domain_sid , rids [ i ] ) ) {
result = NT_STATUS_INTERNAL_ERROR ;
goto error ;
}
2017-08-06 19:13:10 +03:00
status = wcache_sid_to_name ( domain , & sid , * names , & dom ,
& name , & type ) ;
2006-07-11 22:01:26 +04:00
( * types ) [ i ] = SID_NAME_UNKNOWN ;
( * names ) [ i ] = talloc_strdup ( * names , " " ) ;
2017-08-06 19:13:10 +03:00
if ( NT_STATUS_EQUAL ( status , NT_STATUS_NOT_FOUND ) ) {
/* not cached */
goto do_query ;
}
if ( NT_STATUS_IS_OK ( status ) ) {
2008-01-07 13:27:54 +03:00
have_mapped = true ;
2017-08-06 19:13:10 +03:00
( * types ) [ i ] = type ;
2007-09-06 15:07:58 +04:00
2006-07-11 22:01:26 +04:00
if ( * domain_name = = NULL ) {
* domain_name = dom ;
} else {
2017-08-06 19:13:10 +03:00
TALLOC_FREE ( dom ) ;
2006-07-11 22:01:26 +04:00
}
2007-09-06 15:07:58 +04:00
2017-08-06 19:13:10 +03:00
( * names ) [ i ] = name ;
2007-09-06 15:07:58 +04:00
2017-08-06 19:13:10 +03:00
} else if ( NT_STATUS_EQUAL ( status , NT_STATUS_NONE_MAPPED ) ) {
2008-01-07 13:27:54 +03:00
have_unmapped = true ;
2007-09-06 15:07:58 +04:00
} else {
/* something's definitely wrong */
2017-08-06 19:13:10 +03:00
result = status ;
2007-09-06 15:07:58 +04:00
goto error ;
2006-07-11 22:01:26 +04:00
}
}
if ( ! have_mapped ) {
return NT_STATUS_NONE_MAPPED ;
}
if ( ! have_unmapped ) {
return NT_STATUS_OK ;
}
return STATUS_SOME_UNMAPPED ;
do_query :
TALLOC_FREE ( * names ) ;
TALLOC_FREE ( * types ) ;
result = domain - > backend - > rids_to_names ( domain , mem_ctx , domain_sid ,
rids , num_rids , domain_name ,
names , types ) ;
2010-01-06 10:05:20 +03:00
if ( NT_STATUS_EQUAL ( result , NT_STATUS_IO_TIMEOUT ) | |
2016-12-29 18:34:41 +03:00
NT_STATUS_EQUAL ( result , NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND ) ) {
2010-01-06 14:13:59 +03:00
if ( ! domain - > internal & & old_status ) {
2010-01-06 10:05:20 +03:00
set_domain_offline ( domain ) ;
}
if ( cache - > tdb & &
! domain - > internal & &
2010-01-06 14:13:59 +03:00
! domain - > online & &
old_status ) {
2010-01-06 10:05:20 +03:00
have_mapped = have_unmapped = false ;
2013-09-16 15:18:17 +04:00
* names = talloc_array ( mem_ctx , char * , num_rids ) ;
2014-07-02 07:27:11 +04:00
if ( * names = = NULL ) {
2013-09-16 15:18:17 +04:00
result = NT_STATUS_NO_MEMORY ;
goto error ;
}
* types = talloc_array ( mem_ctx , enum lsa_SidType ,
num_rids ) ;
2014-07-02 07:27:11 +04:00
if ( * types = = NULL ) {
2013-09-16 15:18:17 +04:00
result = NT_STATUS_NO_MEMORY ;
goto error ;
}
2010-01-06 10:05:20 +03:00
for ( i = 0 ; i < num_rids ; i + + ) {
2010-05-21 05:25:01 +04:00
struct dom_sid sid ;
2017-08-06 19:13:10 +03:00
NTSTATUS status ;
enum lsa_SidType type ;
char * dom , * name ;
2010-01-06 10:05:20 +03:00
if ( ! sid_compose ( & sid , domain_sid , rids [ i ] ) ) {
result = NT_STATUS_INTERNAL_ERROR ;
goto error ;
}
2017-08-06 19:13:10 +03:00
status = wcache_sid_to_name ( domain , & sid ,
* names , & dom ,
& name , & type ) ;
2010-01-06 10:05:20 +03:00
( * types ) [ i ] = SID_NAME_UNKNOWN ;
( * names ) [ i ] = talloc_strdup ( * names , " " ) ;
2017-08-06 19:13:10 +03:00
if ( NT_STATUS_IS_OK ( status ) ) {
2010-01-06 10:05:20 +03:00
have_mapped = true ;
2017-08-06 19:13:10 +03:00
( * types ) [ i ] = type ;
2010-01-06 10:05:20 +03:00
if ( * domain_name = = NULL ) {
* domain_name = dom ;
} else {
2017-08-06 19:13:10 +03:00
TALLOC_FREE ( dom ) ;
2010-01-06 10:05:20 +03:00
}
2017-08-06 19:13:10 +03:00
( * names ) [ i ] = name ;
2010-01-06 10:05:20 +03:00
2017-08-06 19:13:10 +03:00
} else if ( NT_STATUS_EQUAL (
status ,
NT_STATUS_NONE_MAPPED ) ) {
2010-01-06 10:05:20 +03:00
have_unmapped = true ;
} else {
/* something's definitely wrong */
2017-08-06 19:13:10 +03:00
result = status ;
2010-01-06 10:05:20 +03:00
goto error ;
}
}
if ( ! have_mapped ) {
return NT_STATUS_NONE_MAPPED ;
}
if ( ! have_unmapped ) {
return NT_STATUS_OK ;
}
return STATUS_SOME_UNMAPPED ;
}
}
2007-09-06 15:07:58 +04:00
/*
None of the queried rids has been found so save all negative entries
*/
if ( NT_STATUS_EQUAL ( result , NT_STATUS_NONE_MAPPED ) ) {
for ( i = 0 ; i < num_rids ; i + + ) {
2010-05-21 05:25:01 +04:00
struct dom_sid sid ;
2007-09-06 15:07:58 +04:00
const char * name = " " ;
const enum lsa_SidType type = SID_NAME_UNKNOWN ;
NTSTATUS status = NT_STATUS_NONE_MAPPED ;
2009-07-27 01:20:54 +04:00
2007-09-06 15:07:58 +04:00
if ( ! sid_compose ( & sid , domain_sid , rids [ i ] ) ) {
return NT_STATUS_INTERNAL_ERROR ;
}
wcache_save_sid_to_name ( domain , status , & sid , * domain_name ,
name , type ) ;
}
return result ;
}
/*
Some or all of the queried rids have been found .
*/
2006-07-11 22:01:26 +04:00
if ( ! NT_STATUS_IS_OK ( result ) & &
! NT_STATUS_EQUAL ( result , STATUS_SOME_UNMAPPED ) ) {
return result ;
}
2016-09-28 20:12:36 +03:00
refresh_sequence_number ( domain ) ;
2006-07-11 22:01:26 +04:00
for ( i = 0 ; i < num_rids ; i + + ) {
2010-05-21 05:25:01 +04:00
struct dom_sid sid ;
2006-07-11 22:01:26 +04:00
NTSTATUS status ;
if ( ! sid_compose ( & sid , domain_sid , rids [ i ] ) ) {
result = NT_STATUS_INTERNAL_ERROR ;
goto error ;
}
status = ( * types ) [ i ] = = SID_NAME_UNKNOWN ?
NT_STATUS_NONE_MAPPED : NT_STATUS_OK ;
wcache_save_sid_to_name ( domain , status , & sid , * domain_name ,
( * names ) [ i ] , ( * types ) [ i ] ) ;
}
return result ;
error :
TALLOC_FREE ( * names ) ;
TALLOC_FREE ( * types ) ;
return result ;
}
2017-08-01 16:11:09 +03:00
static NTSTATUS wcache_query_user ( struct winbindd_domain * domain ,
TALLOC_CTX * mem_ctx ,
const struct dom_sid * user_sid ,
struct wbint_userinfo * info )
2000-05-09 15:43:00 +04:00
{
2001-12-10 02:59:42 +03:00
struct winbind_cache * cache = get_cache ( domain ) ;
struct cache_entry * centry = NULL ;
NTSTATUS status ;
2018-10-27 23:01:03 +03:00
struct dom_sid_buf sid_string ;
2001-12-10 02:59:42 +03:00
2009-08-01 18:20:13 +04:00
if ( cache - > tdb = = NULL ) {
return NT_STATUS_NOT_FOUND ;
}
2001-12-10 02:59:42 +03:00
2018-10-27 23:01:03 +03:00
centry = wcache_fetch (
cache , domain , " U/%s " , dom_sid_str_buf ( user_sid , & sid_string ) ) ;
2009-08-01 18:20:13 +04:00
if ( centry = = NULL ) {
return NT_STATUS_NOT_FOUND ;
}
/*
* If we have an access denied cache entry and a cached info3
* in the samlogon cache then do a query . This will force the
* rpc back end to return the info3 data .
*/
2005-11-10 23:28:23 +03:00
2009-08-01 18:20:13 +04:00
if ( NT_STATUS_EQUAL ( domain - > last_status , NT_STATUS_ACCESS_DENIED ) & &
2005-11-10 23:28:23 +03:00
netsamlogon_cache_have ( user_sid ) ) {
2009-08-01 18:20:13 +04:00
DEBUG ( 10 , ( " query_user: cached access denied and have cached "
" info3 \n " ) ) ;
2005-11-10 23:28:23 +03:00
domain - > last_status = NT_STATUS_OK ;
centry_free ( centry ) ;
2009-08-01 18:20:13 +04:00
return NT_STATUS_NOT_FOUND ;
2005-11-10 23:28:23 +03:00
}
2009-07-27 01:20:54 +04:00
2007-09-06 15:07:58 +04:00
/* if status is not ok then this is a negative hit
and the rest of the data doesn ' t matter */
2001-12-10 02:59:42 +03:00
status = centry - > status ;
2007-09-06 15:07:58 +04:00
if ( NT_STATUS_IS_OK ( status ) ) {
2016-12-30 13:57:50 +03:00
info - > domain_name = centry_string ( centry , mem_ctx ) ;
2007-09-06 15:07:58 +04:00
info - > acct_name = centry_string ( centry , mem_ctx ) ;
info - > full_name = centry_string ( centry , mem_ctx ) ;
info - > homedir = centry_string ( centry , mem_ctx ) ;
info - > shell = centry_string ( centry , mem_ctx ) ;
2016-12-30 13:57:50 +03:00
info - > uid = centry_uint32 ( centry ) ;
2007-09-06 15:07:58 +04:00
info - > primary_gid = centry_uint32 ( centry ) ;
2016-12-30 13:57:50 +03:00
info - > primary_group_name = centry_string ( centry , mem_ctx ) ;
2009-08-01 01:48:39 +04:00
centry_sid ( centry , & info - > user_sid ) ;
centry_sid ( centry , & info - > group_sid ) ;
2007-09-06 15:07:58 +04:00
}
2003-06-10 04:49:43 +04:00
2009-08-01 18:20:13 +04:00
DEBUG ( 10 , ( " query_user: [Cached] - cached info for domain %s status: "
" %s \n " , domain - > name , nt_errstr ( status ) ) ) ;
2003-06-10 04:49:43 +04:00
2001-12-10 02:59:42 +03:00
centry_free ( centry ) ;
return status ;
2009-08-01 18:20:13 +04:00
}
2014-07-07 19:14:37 +04:00
/**
* @ brief Query a fullname from the username cache ( for further gecos processing )
*
* @ param domain A pointer to the winbindd_domain struct .
* @ param mem_ctx The talloc context .
* @ param user_sid The user sid .
* @ param full_name A pointer to the full_name string .
*
* @ return NTSTATUS code
*/
NTSTATUS wcache_query_user_fullname ( struct winbindd_domain * domain ,
TALLOC_CTX * mem_ctx ,
const struct dom_sid * user_sid ,
const char * * full_name )
{
NTSTATUS status ;
struct wbint_userinfo info ;
status = wcache_query_user ( domain , mem_ctx , user_sid , & info ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
return status ;
}
if ( info . full_name ! = NULL ) {
* full_name = talloc_strdup ( mem_ctx , info . full_name ) ;
if ( * full_name = = NULL ) {
return NT_STATUS_NO_MEMORY ;
}
}
return NT_STATUS_OK ;
}
2017-07-12 15:56:32 +03:00
static NTSTATUS wcache_lookup_usergroups ( struct winbindd_domain * domain ,
TALLOC_CTX * mem_ctx ,
const struct dom_sid * user_sid ,
uint32_t * pnum_sids ,
struct dom_sid * * psids )
2017-03-02 16:54:23 +03:00
{
struct winbind_cache * cache = get_cache ( domain ) ;
struct cache_entry * centry = NULL ;
NTSTATUS status ;
uint32_t i , num_sids ;
struct dom_sid * sids ;
2018-10-27 23:01:03 +03:00
struct dom_sid_buf sid_string ;
2017-03-02 16:54:23 +03:00
if ( cache - > tdb = = NULL ) {
return NT_STATUS_NOT_FOUND ;
}
2018-10-27 23:01:03 +03:00
centry = wcache_fetch (
cache ,
domain ,
" UG/%s " ,
dom_sid_str_buf ( user_sid , & sid_string ) ) ;
2017-03-02 16:54:23 +03:00
if ( centry = = NULL ) {
return NT_STATUS_NOT_FOUND ;
}
/* If we have an access denied cache entry and a cached info3 in the
samlogon cache then do a query . This will force the rpc back end
to return the info3 data . */
if ( NT_STATUS_EQUAL ( domain - > last_status , NT_STATUS_ACCESS_DENIED )
& & netsamlogon_cache_have ( user_sid ) ) {
DEBUG ( 10 , ( " lookup_usergroups: cached access denied and have "
" cached info3 \n " ) ) ;
domain - > last_status = NT_STATUS_OK ;
centry_free ( centry ) ;
return NT_STATUS_NOT_FOUND ;
}
num_sids = centry_uint32 ( centry ) ;
sids = talloc_array ( mem_ctx , struct dom_sid , num_sids ) ;
if ( sids = = NULL ) {
centry_free ( centry ) ;
return NT_STATUS_NO_MEMORY ;
}
for ( i = 0 ; i < num_sids ; i + + ) {
centry_sid ( centry , & sids [ i ] ) ;
}
status = centry - > status ;
DEBUG ( 10 , ( " lookup_usergroups: [Cached] - cached info for domain %s "
" status: %s \n " , domain - > name , nt_errstr ( status ) ) ) ;
centry_free ( centry ) ;
* pnum_sids = num_sids ;
* psids = sids ;
return status ;
}
2017-03-02 16:54:46 +03:00
/* Lookup groups a user is a member of. */
NTSTATUS wb_cache_lookup_usergroups ( struct winbindd_domain * domain ,
TALLOC_CTX * mem_ctx ,
const struct dom_sid * user_sid ,
uint32_t * num_groups ,
struct dom_sid * * user_gids )
{
struct cache_entry * centry = NULL ;
NTSTATUS status ;
unsigned int i ;
2018-10-27 23:01:03 +03:00
struct dom_sid_buf sid_string ;
2017-03-02 16:54:46 +03:00
bool old_status ;
old_status = domain - > online ;
status = wcache_lookup_usergroups ( domain , mem_ctx , user_sid ,
num_groups , user_gids ) ;
if ( ! NT_STATUS_EQUAL ( status , NT_STATUS_NOT_FOUND ) ) {
return status ;
}
( * num_groups ) = 0 ;
( * user_gids ) = NULL ;
/* Return status value returned by seq number check */
if ( ! NT_STATUS_IS_OK ( domain - > last_status ) )
return domain - > last_status ;
DEBUG ( 10 , ( " lookup_usergroups: [Cached] - doing backend query for info for domain %s \n " ,
domain - > name ) ) ;
status = domain - > backend - > lookup_usergroups ( domain , mem_ctx , user_sid , num_groups , user_gids ) ;
if ( NT_STATUS_EQUAL ( status , NT_STATUS_IO_TIMEOUT ) | |
NT_STATUS_EQUAL ( status , NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND ) ) {
if ( ! domain - > internal & & old_status ) {
set_domain_offline ( domain ) ;
}
if ( ! domain - > internal & &
! domain - > online & &
old_status ) {
NTSTATUS cache_status ;
cache_status = wcache_lookup_usergroups ( domain , mem_ctx , user_sid ,
num_groups , user_gids ) ;
return cache_status ;
}
}
if ( NT_STATUS_EQUAL ( status , NT_STATUS_SYNCHRONIZATION_REQUIRED ) )
goto skip_save ;
/* and save it */
refresh_sequence_number ( domain ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
return status ;
}
centry = centry_start ( domain , status ) ;
if ( ! centry )
goto skip_save ;
centry_put_uint32 ( centry , * num_groups ) ;
for ( i = 0 ; i < ( * num_groups ) ; i + + ) {
centry_put_sid ( centry , & ( * user_gids ) [ i ] ) ;
}
2018-10-27 23:01:03 +03:00
centry_end ( centry , " UG/%s " , dom_sid_str_buf ( user_sid , & sid_string ) ) ;
2017-03-02 16:54:46 +03:00
centry_free ( centry ) ;
skip_save :
return status ;
}
2009-08-02 18:52:19 +04:00
static char * wcache_make_sidlist ( TALLOC_CTX * mem_ctx , uint32_t num_sids ,
const struct dom_sid * sids )
{
uint32_t i ;
char * sidlist ;
sidlist = talloc_strdup ( mem_ctx , " " ) ;
if ( sidlist = = NULL ) {
return NULL ;
}
for ( i = 0 ; i < num_sids ; i + + ) {
2018-12-06 20:25:02 +03:00
struct dom_sid_buf tmp ;
2009-08-02 18:52:19 +04:00
sidlist = talloc_asprintf_append_buffer (
2018-12-06 20:25:02 +03:00
sidlist ,
" /%s " ,
dom_sid_str_buf ( & sids [ i ] , & tmp ) ) ;
2009-08-02 18:52:19 +04:00
if ( sidlist = = NULL ) {
return NULL ;
}
}
return sidlist ;
}
2017-07-12 14:14:44 +03:00
static NTSTATUS wcache_lookup_useraliases ( struct winbindd_domain * domain ,
TALLOC_CTX * mem_ctx ,
uint32_t num_sids ,
const struct dom_sid * sids ,
uint32_t * pnum_aliases ,
uint32_t * * paliases )
2005-01-15 22:00:18 +03:00
{
struct winbind_cache * cache = get_cache ( domain ) ;
struct cache_entry * centry = NULL ;
2017-07-12 14:30:02 +03:00
uint32_t i , num_aliases ;
2009-08-02 18:52:19 +04:00
uint32_t * aliases ;
2005-01-15 22:00:18 +03:00
NTSTATUS status ;
2009-08-02 18:52:19 +04:00
char * sidlist ;
2005-01-15 22:00:18 +03:00
2009-08-02 18:52:19 +04:00
if ( cache - > tdb = = NULL ) {
return NT_STATUS_NOT_FOUND ;
}
2005-01-15 22:00:18 +03:00
if ( num_sids = = 0 ) {
2009-08-02 18:52:19 +04:00
* pnum_aliases = 0 ;
* paliases = NULL ;
2005-01-15 22:00:18 +03:00
return NT_STATUS_OK ;
}
/* We need to cache indexed by the whole list of SIDs, the aliases
* resulting might come from any of the SIDs . */
2009-08-02 18:52:19 +04:00
sidlist = wcache_make_sidlist ( talloc_tos ( ) , num_sids , sids ) ;
if ( sidlist = = NULL ) {
return NT_STATUS_NO_MEMORY ;
2005-01-15 22:00:18 +03:00
}
centry = wcache_fetch ( cache , domain , " UA%s " , sidlist ) ;
2009-08-02 18:52:19 +04:00
TALLOC_FREE ( sidlist ) ;
if ( centry = = NULL ) {
return NT_STATUS_NOT_FOUND ;
}
2005-01-15 22:00:18 +03:00
2009-08-02 18:52:19 +04:00
num_aliases = centry_uint32 ( centry ) ;
aliases = talloc_array ( mem_ctx , uint32_t , num_aliases ) ;
if ( aliases = = NULL ) {
centry_free ( centry ) ;
return NT_STATUS_NO_MEMORY ;
2006-03-07 23:32:08 +03:00
}
2005-01-15 22:00:18 +03:00
2009-08-02 18:52:19 +04:00
for ( i = 0 ; i < num_aliases ; i + + ) {
aliases [ i ] = centry_uint32 ( centry ) ;
}
2005-01-15 22:00:18 +03:00
status = centry - > status ;
2006-06-14 18:38:59 +04:00
DEBUG ( 10 , ( " lookup_useraliases: [Cached] - cached info for domain: %s "
" status %s \n " , domain - > name , nt_errstr ( status ) ) ) ;
2005-01-15 22:00:18 +03:00
centry_free ( centry ) ;
2009-08-02 18:52:19 +04:00
* pnum_aliases = num_aliases ;
* paliases = aliases ;
2005-01-15 22:00:18 +03:00
return status ;
2009-08-02 18:52:19 +04:00
}
2016-10-08 02:19:07 +03:00
NTSTATUS wb_cache_lookup_useraliases ( struct winbindd_domain * domain ,
TALLOC_CTX * mem_ctx ,
uint32_t num_sids ,
const struct dom_sid * sids ,
uint32_t * num_aliases ,
uint32_t * * alias_rids )
2009-08-02 18:52:19 +04:00
{
struct cache_entry * centry = NULL ;
NTSTATUS status ;
char * sidlist ;
2017-07-12 14:30:02 +03:00
uint32_t i ;
2010-01-06 14:13:59 +03:00
bool old_status ;
2009-08-02 18:52:19 +04:00
2010-01-06 14:13:59 +03:00
old_status = domain - > online ;
2009-08-02 18:52:19 +04:00
status = wcache_lookup_useraliases ( domain , mem_ctx , num_sids , sids ,
num_aliases , alias_rids ) ;
if ( ! NT_STATUS_EQUAL ( status , NT_STATUS_NOT_FOUND ) ) {
return status ;
}
2005-01-15 22:00:18 +03:00
( * num_aliases ) = 0 ;
( * alias_rids ) = NULL ;
if ( ! NT_STATUS_IS_OK ( domain - > last_status ) )
return domain - > last_status ;
2005-06-09 02:10:34 +04:00
DEBUG ( 10 , ( " lookup_usergroups: [Cached] - doing backend query for info "
2005-01-15 22:00:18 +03:00
" for domain %s \n " , domain - > name ) ) ;
2009-08-02 18:52:19 +04:00
sidlist = wcache_make_sidlist ( talloc_tos ( ) , num_sids , sids ) ;
if ( sidlist = = NULL ) {
return NT_STATUS_NO_MEMORY ;
}
2005-01-15 22:00:18 +03:00
status = domain - > backend - > lookup_useraliases ( domain , mem_ctx ,
num_sids , sids ,
num_aliases , alias_rids ) ;
2010-01-06 10:05:20 +03:00
if ( NT_STATUS_EQUAL ( status , NT_STATUS_IO_TIMEOUT ) | |
NT_STATUS_EQUAL ( status , NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND ) ) {
2010-01-06 14:13:59 +03:00
if ( ! domain - > internal & & old_status ) {
2010-01-06 10:05:20 +03:00
set_domain_offline ( domain ) ;
}
if ( ! domain - > internal & &
2010-01-06 14:13:59 +03:00
! domain - > online & &
old_status ) {
2010-01-06 10:05:20 +03:00
NTSTATUS cache_status ;
cache_status = wcache_lookup_useraliases ( domain , mem_ctx , num_sids ,
sids , num_aliases , alias_rids ) ;
return cache_status ;
}
}
2005-01-15 22:00:18 +03:00
/* and save it */
2016-09-28 20:12:36 +03:00
refresh_sequence_number ( domain ) ;
2010-01-06 10:05:20 +03:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
return status ;
}
2005-01-15 22:00:18 +03:00
centry = centry_start ( domain , status ) ;
if ( ! centry )
goto skip_save ;
centry_put_uint32 ( centry , * num_aliases ) ;
for ( i = 0 ; i < ( * num_aliases ) ; i + + )
centry_put_uint32 ( centry , ( * alias_rids ) [ i ] ) ;
centry_end ( centry , " UA%s " , sidlist ) ;
centry_free ( centry ) ;
skip_save :
return status ;
}
2017-07-12 13:40:29 +03:00
static NTSTATUS wcache_lookup_groupmem ( struct winbindd_domain * domain ,
TALLOC_CTX * mem_ctx ,
const struct dom_sid * group_sid ,
uint32_t * num_names ,
struct dom_sid * * sid_mem , char * * * names ,
uint32_t * * name_types )
2000-05-09 15:43:00 +04:00
{
2001-12-10 02:59:42 +03:00
struct winbind_cache * cache = get_cache ( domain ) ;
struct cache_entry * centry = NULL ;
NTSTATUS status ;
2003-04-23 15:54:56 +04:00
unsigned int i ;
2018-10-27 23:01:03 +03:00
struct dom_sid_buf sid_string ;
2001-05-07 08:32:40 +04:00
2009-08-08 18:24:29 +04:00
if ( cache - > tdb = = NULL ) {
return NT_STATUS_NOT_FOUND ;
}
2000-05-09 15:43:00 +04:00
2018-10-27 23:01:03 +03:00
centry = wcache_fetch (
cache ,
domain ,
" GM/%s " ,
dom_sid_str_buf ( group_sid , & sid_string ) ) ;
2009-08-08 18:24:29 +04:00
if ( centry = = NULL ) {
return NT_STATUS_NOT_FOUND ;
}
2009-07-27 01:20:54 +04:00
2009-08-08 18:24:29 +04:00
* sid_mem = NULL ;
* names = NULL ;
* name_types = NULL ;
2001-05-07 08:32:40 +04:00
2009-08-08 18:24:29 +04:00
* num_names = centry_uint32 ( centry ) ;
if ( * num_names = = 0 ) {
2009-08-26 20:20:06 +04:00
centry_free ( centry ) ;
2009-08-08 18:24:29 +04:00
return NT_STATUS_OK ;
}
2000-05-09 15:43:00 +04:00
2010-05-21 05:25:01 +04:00
* sid_mem = talloc_array ( mem_ctx , struct dom_sid , * num_names ) ;
2009-08-08 18:24:29 +04:00
* names = talloc_array ( mem_ctx , char * , * num_names ) ;
2015-05-03 07:07:06 +03:00
* name_types = talloc_array ( mem_ctx , uint32_t , * num_names ) ;
2009-08-08 18:24:29 +04:00
if ( ( * sid_mem = = NULL ) | | ( * names = = NULL ) | | ( * name_types = = NULL ) ) {
TALLOC_FREE ( * sid_mem ) ;
TALLOC_FREE ( * names ) ;
TALLOC_FREE ( * name_types ) ;
2009-08-26 20:20:06 +04:00
centry_free ( centry ) ;
2009-08-08 18:24:29 +04:00
return NT_STATUS_NO_MEMORY ;
2001-12-10 02:59:42 +03:00
}
2000-05-09 15:43:00 +04:00
2001-12-10 02:59:42 +03:00
for ( i = 0 ; i < ( * num_names ) ; i + + ) {
2009-08-01 01:48:39 +04:00
centry_sid ( centry , & ( * sid_mem ) [ i ] ) ;
2001-12-10 02:59:42 +03:00
( * names ) [ i ] = centry_string ( centry , mem_ctx ) ;
( * name_types ) [ i ] = centry_uint32 ( centry ) ;
}
2001-10-14 12:26:45 +04:00
2001-12-10 02:59:42 +03:00
status = centry - > status ;
2003-06-10 04:49:43 +04:00
2009-08-08 18:24:29 +04:00
DEBUG ( 10 , ( " lookup_groupmem: [Cached] - cached info for domain %s "
" status: %s \n " , domain - > name , nt_errstr ( status ) ) ) ;
2003-06-10 04:49:43 +04:00
2001-12-10 02:59:42 +03:00
centry_free ( centry ) ;
return status ;
2009-08-08 18:24:29 +04:00
}
2016-10-08 02:19:07 +03:00
NTSTATUS wb_cache_lookup_groupmem ( struct winbindd_domain * domain ,
TALLOC_CTX * mem_ctx ,
const struct dom_sid * group_sid ,
enum lsa_SidType type ,
uint32_t * num_names ,
struct dom_sid * * sid_mem ,
char * * * names ,
uint32_t * * name_types )
2009-08-08 18:24:29 +04:00
{
struct cache_entry * centry = NULL ;
NTSTATUS status ;
unsigned int i ;
2018-10-27 23:01:03 +03:00
struct dom_sid_buf sid_string ;
2010-01-06 14:13:59 +03:00
bool old_status ;
2009-08-08 18:24:29 +04:00
2010-01-06 14:13:59 +03:00
old_status = domain - > online ;
2009-08-08 18:24:29 +04:00
status = wcache_lookup_groupmem ( domain , mem_ctx , group_sid , num_names ,
sid_mem , names , name_types ) ;
if ( ! NT_STATUS_EQUAL ( status , NT_STATUS_NOT_FOUND ) ) {
return status ;
}
2001-10-14 12:26:45 +04:00
2001-12-19 11:44:23 +03:00
( * num_names ) = 0 ;
2003-04-23 15:54:56 +04:00
( * sid_mem ) = NULL ;
2001-12-19 11:44:23 +03:00
( * names ) = NULL ;
( * name_types ) = NULL ;
2009-07-27 01:20:54 +04:00
2003-06-21 08:05:01 +04:00
/* Return status value returned by seq number check */
2001-12-19 11:44:23 +03:00
2003-06-21 08:05:01 +04:00
if ( ! NT_STATUS_IS_OK ( domain - > last_status ) )
return domain - > last_status ;
2003-06-10 04:49:43 +04:00
DEBUG ( 10 , ( " lookup_groupmem: [Cached] - doing backend query for info for domain %s \n " ,
domain - > name ) ) ;
2009-08-28 16:25:11 +04:00
status = domain - > backend - > lookup_groupmem ( domain , mem_ctx , group_sid ,
type , num_names ,
2003-06-10 07:50:38 +04:00
sid_mem , names , name_types ) ;
2001-12-10 02:59:42 +03:00
2010-01-06 10:05:20 +03:00
if ( NT_STATUS_EQUAL ( status , NT_STATUS_IO_TIMEOUT ) | |
NT_STATUS_EQUAL ( status , NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND ) ) {
2010-01-06 14:13:59 +03:00
if ( ! domain - > internal & & old_status ) {
2010-01-06 10:05:20 +03:00
set_domain_offline ( domain ) ;
}
if ( ! domain - > internal & &
2010-01-06 14:13:59 +03:00
! domain - > online & &
old_status ) {
2010-01-06 10:05:20 +03:00
NTSTATUS cache_status ;
cache_status = wcache_lookup_groupmem ( domain , mem_ctx , group_sid ,
num_names , sid_mem , names ,
name_types ) ;
return cache_status ;
}
}
2001-12-10 02:59:42 +03:00
/* and save it */
2016-09-28 20:12:36 +03:00
refresh_sequence_number ( domain ) ;
2010-01-06 10:05:20 +03:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
return status ;
}
2001-12-10 02:59:42 +03:00
centry = centry_start ( domain , status ) ;
2003-06-10 04:49:43 +04:00
if ( ! centry )
goto skip_save ;
2001-12-10 02:59:42 +03:00
centry_put_uint32 ( centry , * num_names ) ;
for ( i = 0 ; i < ( * num_names ) ; i + + ) {
2005-06-09 02:10:34 +04:00
centry_put_sid ( centry , & ( * sid_mem ) [ i ] ) ;
2001-12-10 02:59:42 +03:00
centry_put_string ( centry , ( * names ) [ i ] ) ;
centry_put_uint32 ( centry , ( * name_types ) [ i ] ) ;
}
2018-10-27 23:01:03 +03:00
centry_end ( centry ,
" GM/%s " ,
dom_sid_str_buf ( group_sid , & sid_string ) ) ;
2001-12-10 02:59:42 +03:00
centry_free ( centry ) ;
skip_save :
return status ;
2000-05-09 15:43:00 +04:00
}
2001-12-10 02:59:42 +03:00
/* find the sequence number for a domain */
2016-10-08 02:19:07 +03:00
NTSTATUS wb_cache_sequence_number ( struct winbindd_domain * domain ,
uint32_t * seq )
2000-05-09 15:43:00 +04:00
{
2016-09-28 20:12:36 +03:00
refresh_sequence_number ( domain ) ;
2000-05-09 15:43:00 +04:00
2001-12-10 02:59:42 +03:00
* seq = domain - > sequence_number ;
2001-10-14 12:26:45 +04:00
2001-12-10 02:59:42 +03:00
return NT_STATUS_OK ;
2000-05-09 15:43:00 +04:00
}
2006-02-04 01:19:41 +03:00
/* enumerate trusted domains
* ( we need to have the list of trustdoms in the cache when we go offline ) -
* Guenther */
2016-10-08 02:19:07 +03:00
NTSTATUS wb_cache_trusted_domains ( struct winbindd_domain * domain ,
TALLOC_CTX * mem_ctx ,
struct netr_DomainTrustList * trusts )
2001-12-10 05:25:19 +03:00
{
2006-02-04 01:19:41 +03:00
NTSTATUS status ;
2010-01-06 14:13:59 +03:00
struct winbind_cache * cache ;
struct winbindd_tdc_domain * dom_list = NULL ;
size_t num_domains = 0 ;
bool retval = false ;
2017-07-12 14:30:02 +03:00
size_t i ;
2010-01-06 14:13:59 +03:00
bool old_status ;
old_status = domain - > online ;
trusts - > count = 0 ;
trusts - > array = NULL ;
cache = get_cache ( domain ) ;
if ( ! cache | | ! cache - > tdb ) {
goto do_query ;
}
2010-01-13 14:20:26 +03:00
if ( domain - > online ) {
goto do_query ;
}
2010-01-06 14:13:59 +03:00
retval = wcache_tdc_fetch_list ( & dom_list , & num_domains ) ;
if ( ! retval | | ! num_domains | | ! dom_list ) {
TALLOC_FREE ( dom_list ) ;
goto do_query ;
}
do_fetch_cache :
2011-06-07 05:58:39 +04:00
trusts - > array = talloc_zero_array ( mem_ctx , struct netr_DomainTrust , num_domains ) ;
2010-01-06 14:13:59 +03:00
if ( ! trusts - > array ) {
TALLOC_FREE ( dom_list ) ;
return NT_STATUS_NO_MEMORY ;
}
2009-07-27 01:20:54 +04:00
2010-01-06 14:13:59 +03:00
for ( i = 0 ; i < num_domains ; i + + ) {
struct netr_DomainTrust * trust ;
struct dom_sid * sid ;
struct winbindd_domain * dom ;
dom = find_domain_from_name_noinit ( dom_list [ i ] . domain_name ) ;
if ( dom & & dom - > internal ) {
continue ;
}
trust = & trusts - > array [ trusts - > count ] ;
trust - > netbios_name = talloc_strdup ( trusts - > array , dom_list [ i ] . domain_name ) ;
trust - > dns_name = talloc_strdup ( trusts - > array , dom_list [ i ] . dns_name ) ;
sid = talloc ( trusts - > array , struct dom_sid ) ;
if ( ! trust - > netbios_name | | ! trust - > dns_name | |
! sid ) {
TALLOC_FREE ( dom_list ) ;
TALLOC_FREE ( trusts - > array ) ;
return NT_STATUS_NO_MEMORY ;
}
trust - > trust_flags = dom_list [ i ] . trust_flags ;
trust - > trust_attributes = dom_list [ i ] . trust_attribs ;
trust - > trust_type = dom_list [ i ] . trust_type ;
sid_copy ( sid , & dom_list [ i ] . sid ) ;
trust - > sid = sid ;
trusts - > count + + ;
}
TALLOC_FREE ( dom_list ) ;
return NT_STATUS_OK ;
do_query :
2006-02-04 01:19:41 +03:00
/* Return status value returned by seq number check */
if ( ! NT_STATUS_IS_OK ( domain - > last_status ) )
return domain - > last_status ;
2009-07-27 01:20:54 +04:00
2003-06-10 04:49:43 +04:00
DEBUG ( 10 , ( " trusted_domains: [Cached] - doing backend query for info for domain %s \n " ,
domain - > name ) ) ;
2009-07-27 01:20:54 +04:00
2009-12-28 17:51:36 +03:00
status = domain - > backend - > trusted_domains ( domain , mem_ctx , trusts ) ;
2006-03-09 19:08:15 +03:00
2010-01-06 14:13:59 +03:00
if ( NT_STATUS_EQUAL ( status , NT_STATUS_IO_TIMEOUT ) | |
NT_STATUS_EQUAL ( status , NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND ) ) {
if ( ! domain - > internal & & old_status ) {
set_domain_offline ( domain ) ;
}
if ( ! domain - > internal & &
! domain - > online & &
old_status ) {
retval = wcache_tdc_fetch_list ( & dom_list , & num_domains ) ;
if ( retval & & num_domains & & dom_list ) {
TALLOC_FREE ( trusts - > array ) ;
trusts - > count = 0 ;
goto do_fetch_cache ;
}
}
}
2006-03-09 19:08:15 +03:00
/* no trusts gives NT_STATUS_NO_MORE_ENTRIES resetting to NT_STATUS_OK
* so that the generic centry handling still applies correctly -
* Guenther */
if ( ! NT_STATUS_IS_ERR ( status ) ) {
status = NT_STATUS_OK ;
}
2006-02-04 01:19:41 +03:00
return status ;
}
/* get lockout policy */
2016-10-08 02:19:07 +03:00
NTSTATUS wb_cache_lockout_policy ( struct winbindd_domain * domain ,
TALLOC_CTX * mem_ctx ,
struct samr_DomInfo12 * policy )
2008-02-05 19:25:07 +03:00
{
2006-02-04 01:19:41 +03:00
struct winbind_cache * cache = get_cache ( domain ) ;
struct cache_entry * centry = NULL ;
NTSTATUS status ;
2010-01-06 14:13:59 +03:00
bool old_status ;
2008-02-05 19:25:07 +03:00
2010-01-06 14:13:59 +03:00
old_status = domain - > online ;
2006-02-04 01:19:41 +03:00
if ( ! cache - > tdb )
goto do_query ;
2008-02-05 19:25:07 +03:00
2006-02-04 01:19:41 +03:00
centry = wcache_fetch ( cache , domain , " LOC_POL/%s " , domain - > name ) ;
2008-02-05 19:25:07 +03:00
2006-02-04 01:19:41 +03:00
if ( ! centry )
goto do_query ;
2008-02-05 19:25:07 +03:00
2010-01-06 10:05:20 +03:00
do_fetch_cache :
2008-02-05 19:25:07 +03:00
policy - > lockout_duration = centry_nttime ( centry ) ;
policy - > lockout_window = centry_nttime ( centry ) ;
policy - > lockout_threshold = centry_uint16 ( centry ) ;
2006-02-04 01:19:41 +03:00
status = centry - > status ;
2008-02-05 19:25:07 +03:00
2006-06-14 18:38:59 +04:00
DEBUG ( 10 , ( " lockout_policy: [Cached] - cached info for domain %s status: %s \n " ,
domain - > name , nt_errstr ( status ) ) ) ;
2008-02-05 19:25:07 +03:00
2006-02-04 01:19:41 +03:00
centry_free ( centry ) ;
return status ;
2008-02-05 19:25:07 +03:00
2006-02-04 01:19:41 +03:00
do_query :
2006-04-19 17:14:14 +04:00
ZERO_STRUCTP ( policy ) ;
2008-02-05 19:25:07 +03:00
2006-02-04 01:19:41 +03:00
/* Return status value returned by seq number check */
if ( ! NT_STATUS_IS_OK ( domain - > last_status ) )
return domain - > last_status ;
2008-02-05 19:25:07 +03:00
2006-02-04 01:19:41 +03:00
DEBUG ( 10 , ( " lockout_policy: [Cached] - doing backend query for info for domain %s \n " ,
domain - > name ) ) ;
2008-02-05 19:25:07 +03:00
status = domain - > backend - > lockout_policy ( domain , mem_ctx , policy ) ;
2010-01-06 10:05:20 +03:00
if ( NT_STATUS_EQUAL ( status , NT_STATUS_IO_TIMEOUT ) | |
NT_STATUS_EQUAL ( status , NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND ) ) {
2010-01-06 14:13:59 +03:00
if ( ! domain - > internal & & old_status ) {
2010-01-06 10:05:20 +03:00
set_domain_offline ( domain ) ;
}
if ( cache - > tdb & &
! domain - > internal & &
2010-01-06 14:13:59 +03:00
! domain - > online & &
old_status ) {
2010-01-06 10:05:20 +03:00
centry = wcache_fetch ( cache , domain , " LOC_POL/%s " , domain - > name ) ;
if ( centry ) {
goto do_fetch_cache ;
}
}
}
2006-02-04 01:19:41 +03:00
/* and save it */
2016-09-28 20:12:36 +03:00
refresh_sequence_number ( domain ) ;
2010-01-06 10:05:20 +03:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
return status ;
}
2006-04-19 17:14:14 +04:00
wcache_save_lockout_policy ( domain , status , policy ) ;
2008-02-05 19:25:07 +03:00
2006-02-04 01:19:41 +03:00
return status ;
}
2008-02-05 19:25:07 +03:00
2006-02-04 01:19:41 +03:00
/* get password policy */
2016-10-08 02:19:07 +03:00
NTSTATUS wb_cache_password_policy ( struct winbindd_domain * domain ,
TALLOC_CTX * mem_ctx ,
struct samr_DomInfo1 * policy )
2006-02-04 01:19:41 +03:00
{
struct winbind_cache * cache = get_cache ( domain ) ;
struct cache_entry * centry = NULL ;
NTSTATUS status ;
2010-01-06 14:13:59 +03:00
bool old_status ;
2006-02-04 01:19:41 +03:00
2010-01-06 14:13:59 +03:00
old_status = domain - > online ;
2006-02-04 01:19:41 +03:00
if ( ! cache - > tdb )
goto do_query ;
2008-02-05 19:25:07 +03:00
2006-02-04 01:19:41 +03:00
centry = wcache_fetch ( cache , domain , " PWD_POL/%s " , domain - > name ) ;
2008-02-05 19:25:07 +03:00
2006-02-04 01:19:41 +03:00
if ( ! centry )
goto do_query ;
2010-01-06 10:05:20 +03:00
do_fetch_cache :
2008-02-05 19:25:07 +03:00
policy - > min_password_length = centry_uint16 ( centry ) ;
policy - > password_history_length = centry_uint16 ( centry ) ;
2006-04-19 17:14:14 +04:00
policy - > password_properties = centry_uint32 ( centry ) ;
2008-02-05 19:25:07 +03:00
policy - > max_password_age = centry_nttime ( centry ) ;
policy - > min_password_age = centry_nttime ( centry ) ;
2006-02-04 01:19:41 +03:00
status = centry - > status ;
2006-06-14 18:38:59 +04:00
DEBUG ( 10 , ( " lockout_policy: [Cached] - cached info for domain %s status: %s \n " ,
domain - > name , nt_errstr ( status ) ) ) ;
2006-02-04 01:19:41 +03:00
centry_free ( centry ) ;
return status ;
do_query :
2006-04-19 17:14:14 +04:00
ZERO_STRUCTP ( policy ) ;
2006-02-04 01:19:41 +03:00
/* Return status value returned by seq number check */
if ( ! NT_STATUS_IS_OK ( domain - > last_status ) )
return domain - > last_status ;
2008-02-05 19:25:07 +03:00
2006-02-04 01:19:41 +03:00
DEBUG ( 10 , ( " password_policy: [Cached] - doing backend query for info for domain %s \n " ,
domain - > name ) ) ;
2008-02-05 19:25:07 +03:00
status = domain - > backend - > password_policy ( domain , mem_ctx , policy ) ;
2006-02-04 01:19:41 +03:00
2010-01-06 10:05:20 +03:00
if ( NT_STATUS_EQUAL ( status , NT_STATUS_IO_TIMEOUT ) | |
NT_STATUS_EQUAL ( status , NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND ) ) {
2010-01-06 14:13:59 +03:00
if ( ! domain - > internal & & old_status ) {
2010-01-06 10:05:20 +03:00
set_domain_offline ( domain ) ;
}
if ( cache - > tdb & &
! domain - > internal & &
2010-01-06 14:13:59 +03:00
! domain - > online & &
old_status ) {
2010-01-06 10:05:20 +03:00
centry = wcache_fetch ( cache , domain , " PWD_POL/%s " , domain - > name ) ;
if ( centry ) {
goto do_fetch_cache ;
}
}
}
2006-02-04 01:19:41 +03:00
/* and save it */
2016-09-28 20:12:36 +03:00
refresh_sequence_number ( domain ) ;
2010-01-06 10:05:20 +03:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
return status ;
2008-04-07 17:51:42 +04:00
}
2010-01-06 10:05:20 +03:00
wcache_save_password_policy ( domain , status , policy ) ;
2003-06-10 04:49:43 +04:00
2006-02-04 01:19:41 +03:00
return status ;
2001-12-10 05:25:19 +03:00
}
2006-02-04 01:19:41 +03:00
2003-06-21 08:05:01 +04:00
/* Invalidate cached user and group lists coherently */
static int traverse_fn ( TDB_CONTEXT * the_tdb , TDB_DATA kbuf , TDB_DATA dbuf ,
void * state )
{
2007-03-29 13:35:51 +04:00
if ( strncmp ( ( const char * ) kbuf . dptr , " UL/ " , 3 ) = = 0 | |
strncmp ( ( const char * ) kbuf . dptr , " GL/ " , 3 ) = = 0 )
2003-06-21 08:05:01 +04:00
tdb_delete ( the_tdb , kbuf ) ;
return 0 ;
}
2005-11-10 23:28:23 +03:00
/* Invalidate the getpwnam and getgroups entries for a winbindd domain */
void wcache_invalidate_samlogon ( struct winbindd_domain * domain ,
2010-12-11 16:27:54 +03:00
const struct dom_sid * sid )
2005-11-10 23:28:23 +03:00
{
2018-10-27 23:01:03 +03:00
fstring key_str ;
struct dom_sid_buf sid_string ;
2005-11-10 23:28:23 +03:00
struct winbind_cache * cache ;
2007-05-03 15:44:18 +04:00
2015-07-27 00:02:57 +03:00
/* don't clear cached U/SID and UG/SID entries when we want to logon
2007-05-03 15:44:18 +04:00
* offline - gd */
if ( lp_winbind_offline_logon ( ) ) {
return ;
}
2005-11-10 23:28:23 +03:00
if ( ! domain )
return ;
cache = get_cache ( domain ) ;
2008-08-28 04:29:10 +04:00
if ( ! cache - > tdb ) {
return ;
}
/* Clear U/SID cache entry */
2018-10-27 23:01:03 +03:00
fstr_sprintf ( key_str , " U/%s " , dom_sid_str_buf ( sid , & sid_string ) ) ;
2008-08-28 04:29:10 +04:00
DEBUG ( 10 , ( " wcache_invalidate_samlogon: clearing %s \n " , key_str ) ) ;
tdb_delete ( cache - > tdb , string_tdb_data ( key_str ) ) ;
2017-03-02 16:54:09 +03:00
/* Clear UG/SID cache entry */
2018-10-27 23:01:03 +03:00
fstr_sprintf ( key_str , " UG/%s " , dom_sid_str_buf ( sid , & sid_string ) ) ;
2017-03-02 16:54:09 +03:00
DEBUG ( 10 , ( " wcache_invalidate_samlogon: clearing %s \n " , key_str ) ) ;
tdb_delete ( cache - > tdb , string_tdb_data ( key_str ) ) ;
2008-08-28 04:29:10 +04:00
/* Samba/winbindd never needs this. */
2010-12-11 16:27:54 +03:00
netsamlogon_clear_cached_user ( sid ) ;
2005-11-10 23:28:23 +03:00
}
2008-01-07 12:59:14 +03:00
bool wcache_invalidate_cache ( void )
2003-06-21 08:05:01 +04:00
{
struct winbindd_domain * domain ;
for ( domain = domain_list ( ) ; domain ; domain = domain - > next ) {
struct winbind_cache * cache = get_cache ( domain ) ;
DEBUG ( 10 , ( " wcache_invalidate_cache: invalidating cache "
" entries for %s \n " , domain - > name ) ) ;
2007-11-26 13:44:30 +03:00
if ( cache ) {
if ( cache - > tdb ) {
tdb_traverse ( cache - > tdb , traverse_fn , NULL ) ;
} else {
2008-01-07 12:59:14 +03:00
return false ;
2007-11-26 13:44:30 +03:00
}
}
2003-06-21 08:05:01 +04:00
}
2008-01-07 12:59:14 +03:00
return true ;
2003-06-21 08:05:01 +04:00
}
2010-02-09 11:35:40 +03:00
bool wcache_invalidate_cache_noinit ( void )
{
struct winbindd_domain * domain ;
for ( domain = domain_list ( ) ; domain ; domain = domain - > next ) {
struct winbind_cache * cache ;
/* Skip uninitialized domains. */
if ( ! domain - > initialized & & ! domain - > internal ) {
continue ;
}
cache = get_cache ( domain ) ;
DEBUG ( 10 , ( " wcache_invalidate_cache: invalidating cache "
" entries for %s \n " , domain - > name ) ) ;
if ( cache ) {
if ( cache - > tdb ) {
tdb_traverse ( cache - > tdb , traverse_fn , NULL ) ;
2010-03-06 15:58:23 +03:00
/*
* Flushing cache has nothing to with domains .
* return here if we successfully flushed once .
* To avoid unnecessary traversing the cache .
*/
return true ;
2010-02-09 11:35:40 +03:00
} else {
return false ;
}
}
}
return true ;
}
2017-07-12 14:32:33 +03:00
static bool init_wcache ( void )
2005-06-09 02:10:34 +04:00
{
2014-11-02 22:21:37 +03:00
char * db_path ;
2005-06-09 02:10:34 +04:00
if ( wcache = = NULL ) {
wcache = SMB_XMALLOC_P ( struct winbind_cache ) ;
ZERO_STRUCTP ( wcache ) ;
}
if ( wcache - > tdb ! = NULL )
2008-01-07 13:27:54 +03:00
return true ;
2005-06-09 02:10:34 +04:00
2016-08-19 00:01:50 +03:00
db_path = wcache_path ( ) ;
2014-11-02 22:21:37 +03:00
if ( db_path = = NULL ) {
return false ;
}
2006-02-04 01:19:41 +03:00
/* when working offline we must not clear the cache on restart */
2014-11-02 22:21:37 +03:00
wcache - > tdb = tdb_open_log ( db_path ,
2006-02-04 01:19:41 +03:00
WINBINDD_CACHE_TDB_DEFAULT_HASH_SIZE ,
2010-09-27 16:46:07 +04:00
TDB_INCOMPATIBLE_HASH |
( lp_winbind_offline_logon ( ) ? TDB_DEFAULT : ( TDB_DEFAULT | TDB_CLEAR_IF_FIRST ) ) ,
2006-07-11 13:22:55 +04:00
O_RDWR | O_CREAT , 0600 ) ;
2014-11-02 22:21:37 +03:00
TALLOC_FREE ( db_path ) ;
2005-06-09 02:10:34 +04:00
if ( wcache - > tdb = = NULL ) {
DEBUG ( 0 , ( " Failed to open winbindd_cache.tdb! \n " ) ) ;
2008-01-07 13:27:54 +03:00
return false ;
2005-06-09 02:10:34 +04:00
}
2008-01-07 13:27:54 +03:00
return true ;
2005-06-09 02:10:34 +04:00
}
2007-04-14 02:29:50 +04:00
/************************************************************************
This is called by the parent to initialize the cache file .
We don ' t need sophisticated locking here as we know we ' re the
only opener .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2007-10-19 04:40:25 +04:00
bool initialize_winbindd_cache ( void )
2007-04-14 02:29:50 +04:00
{
2008-01-07 13:27:54 +03:00
bool cache_bad = true ;
2015-04-24 05:04:23 +03:00
uint32_t vers ;
2007-04-14 02:29:50 +04:00
if ( ! init_wcache ( ) ) {
DEBUG ( 0 , ( " initialize_winbindd_cache: init_wcache failed. \n " ) ) ;
2008-01-07 13:27:54 +03:00
return false ;
2007-04-14 02:29:50 +04:00
}
/* Check version number. */
if ( tdb_fetch_uint32 ( wcache - > tdb , WINBINDD_CACHE_VERSION_KEYSTR , & vers ) & &
vers = = WINBINDD_CACHE_VERSION ) {
2008-01-07 13:27:54 +03:00
cache_bad = false ;
2007-04-14 02:29:50 +04:00
}
if ( cache_bad ) {
2014-11-02 22:21:37 +03:00
char * db_path ;
2007-04-14 02:29:50 +04:00
DEBUG ( 0 , ( " initialize_winbindd_cache: clearing cache "
" and re-creating with version number %d \n " ,
WINBINDD_CACHE_VERSION ) ) ;
tdb_close ( wcache - > tdb ) ;
wcache - > tdb = NULL ;
2016-08-19 00:01:50 +03:00
db_path = wcache_path ( ) ;
2014-11-02 22:21:37 +03:00
if ( db_path = = NULL ) {
return false ;
}
if ( unlink ( db_path ) = = - 1 ) {
2007-04-14 02:29:50 +04:00
DEBUG ( 0 , ( " initialize_winbindd_cache: unlink %s failed %s " ,
2014-11-02 22:21:37 +03:00
db_path ,
2007-04-14 02:29:50 +04:00
strerror ( errno ) ) ) ;
2014-11-02 22:21:37 +03:00
TALLOC_FREE ( db_path ) ;
2008-01-07 13:27:54 +03:00
return false ;
2007-04-14 02:29:50 +04:00
}
2014-11-02 22:21:37 +03:00
TALLOC_FREE ( db_path ) ;
2007-04-14 02:29:50 +04:00
if ( ! init_wcache ( ) ) {
DEBUG ( 0 , ( " initialize_winbindd_cache: re-initialization "
" init_wcache failed. \n " ) ) ;
2008-01-07 13:27:54 +03:00
return false ;
2007-04-14 02:29:50 +04:00
}
/* Write the version. */
if ( ! tdb_store_uint32 ( wcache - > tdb , WINBINDD_CACHE_VERSION_KEYSTR , WINBINDD_CACHE_VERSION ) ) {
DEBUG ( 0 , ( " initialize_winbindd_cache: version number store failed %s \n " ,
2015-03-12 17:19:02 +03:00
tdb_errorstr ( wcache - > tdb ) ) ) ;
2008-01-07 13:27:54 +03:00
return false ;
2007-04-14 02:29:50 +04:00
}
}
tdb_close ( wcache - > tdb ) ;
wcache - > tdb = NULL ;
2008-01-07 13:27:54 +03:00
return true ;
2007-04-14 02:29:50 +04:00
}
2008-01-09 01:02:50 +03:00
void close_winbindd_cache ( void )
2007-11-26 13:44:30 +03:00
{
2008-01-07 12:41:09 +03:00
if ( ! wcache ) {
2007-11-26 13:44:30 +03:00
return ;
2008-01-07 12:41:09 +03:00
}
2007-11-26 13:44:30 +03:00
if ( wcache - > tdb ) {
tdb_close ( wcache - > tdb ) ;
wcache - > tdb = NULL ;
}
}
2010-05-21 05:25:01 +04:00
bool lookup_cached_sid ( TALLOC_CTX * mem_ctx , const struct dom_sid * sid ,
2007-04-23 00:15:00 +04:00
char * * domain_name , char * * name ,
2006-09-08 18:28:06 +04:00
enum lsa_SidType * type )
2005-06-09 02:10:34 +04:00
{
2005-09-30 21:13:37 +04:00
struct winbindd_domain * domain ;
NTSTATUS status ;
2005-06-09 02:10:34 +04:00
2005-09-30 21:13:37 +04:00
domain = find_lookup_domain_from_sid ( sid ) ;
if ( domain = = NULL ) {
2008-01-07 13:27:54 +03:00
return false ;
2005-06-09 02:10:34 +04:00
}
2009-08-01 14:16:11 +04:00
status = wcache_sid_to_name ( domain , sid , mem_ctx , domain_name , name ,
type ) ;
2005-09-30 21:13:37 +04:00
return NT_STATUS_IS_OK ( status ) ;
}
2018-04-26 13:17:12 +03:00
bool lookup_cached_name ( const char * namespace ,
const char * domain_name ,
2006-02-04 01:19:41 +03:00
const char * name ,
2010-05-21 05:25:01 +04:00
struct dom_sid * sid ,
2006-09-08 18:28:06 +04:00
enum lsa_SidType * type )
2006-02-04 01:19:41 +03:00
{
struct winbindd_domain * domain ;
NTSTATUS status ;
2009-08-01 02:10:46 +04:00
bool original_online_state ;
2006-02-04 01:19:41 +03:00
2018-04-26 13:17:12 +03:00
domain = find_lookup_domain_from_name ( namespace ) ;
2006-02-04 01:19:41 +03:00
if ( domain = = NULL ) {
2008-01-07 13:27:54 +03:00
return false ;
2006-02-04 01:19:41 +03:00
}
2007-05-07 01:36:20 +04:00
/* If we are doing a cached logon, temporarily set the domain
offline so the cache won ' t expire the entry */
2009-07-27 01:20:54 +04:00
2007-05-07 01:36:20 +04:00
original_online_state = domain - > online ;
2008-01-07 13:27:54 +03:00
domain - > online = false ;
2009-08-01 02:10:46 +04:00
status = wcache_name_to_sid ( domain , domain_name , name , sid , type ) ;
2007-05-07 01:36:20 +04:00
domain - > online = original_online_state ;
2009-07-27 01:20:54 +04:00
2006-02-04 01:19:41 +03:00
return NT_STATUS_IS_OK ( status ) ;
}
2016-09-28 21:26:04 +03:00
/*
* Cache a name to sid without checking the sequence number .
* Used when caching from a trusted PAC .
*/
void cache_name2sid_trusted ( struct winbindd_domain * domain ,
const char * domain_name ,
const char * name ,
enum lsa_SidType type ,
const struct dom_sid * sid )
{
2016-10-14 01:01:58 +03:00
/*
* Ensure we store the mapping with the
* existing sequence number from the cache .
*/
get_cache ( domain ) ;
( void ) fetch_cache_seqnum ( domain , time ( NULL ) ) ;
2016-09-28 21:26:04 +03:00
wcache_save_name_to_sid ( domain ,
NT_STATUS_OK ,
domain_name ,
name ,
sid ,
type ) ;
}
2006-02-07 20:55:17 +03:00
void cache_name2sid ( struct winbindd_domain * domain ,
const char * domain_name , const char * name ,
2010-05-21 05:25:01 +04:00
enum lsa_SidType type , const struct dom_sid * sid )
2006-02-07 20:55:17 +03:00
{
2016-09-28 20:12:36 +03:00
refresh_sequence_number ( domain ) ;
2006-02-07 20:55:17 +03:00
wcache_save_name_to_sid ( domain , NT_STATUS_OK , domain_name , name ,
sid , type ) ;
}
2007-04-14 02:29:50 +04:00
/*
* The original idea that this cache only contains centries has
* been blurred - now other stuff gets put in here . Ensure we
* ignore these things on cleanup .
*/
2006-02-04 01:19:41 +03:00
static int traverse_fn_cleanup ( TDB_CONTEXT * the_tdb , TDB_DATA kbuf ,
TDB_DATA dbuf , void * state )
{
struct cache_entry * centry ;
2007-04-14 02:29:50 +04:00
if ( is_non_centry_key ( kbuf ) ) {
return 0 ;
}
2007-03-29 13:35:51 +04:00
centry = wcache_fetch_raw ( ( char * ) kbuf . dptr ) ;
2006-02-04 01:19:41 +03:00
if ( ! centry ) {
return 0 ;
}
if ( ! NT_STATUS_IS_OK ( centry - > status ) ) {
2007-03-29 13:35:51 +04:00
DEBUG ( 10 , ( " deleting centry %s \n " , ( const char * ) kbuf . dptr ) ) ;
2006-02-04 01:19:41 +03:00
tdb_delete ( the_tdb , kbuf ) ;
}
centry_free ( centry ) ;
return 0 ;
}
/* flush the cache */
2017-07-12 13:40:29 +03:00
static void wcache_flush_cache ( void )
2006-02-04 01:19:41 +03:00
{
2014-11-02 22:21:37 +03:00
char * db_path ;
2006-02-04 01:19:41 +03:00
if ( ! wcache )
return ;
if ( wcache - > tdb ) {
tdb_close ( wcache - > tdb ) ;
wcache - > tdb = NULL ;
}
2009-03-12 12:12:58 +03:00
if ( ! winbindd_use_cache ( ) ) {
2006-02-04 01:19:41 +03:00
return ;
2009-03-12 12:12:58 +03:00
}
2006-02-04 01:19:41 +03:00
2016-08-19 00:01:50 +03:00
db_path = wcache_path ( ) ;
2014-11-02 22:21:37 +03:00
if ( db_path = = NULL ) {
return ;
}
2006-02-04 01:19:41 +03:00
/* when working offline we must not clear the cache on restart */
2014-11-02 22:21:37 +03:00
wcache - > tdb = tdb_open_log ( db_path ,
WINBINDD_CACHE_TDB_DEFAULT_HASH_SIZE ,
2010-09-27 16:46:07 +04:00
TDB_INCOMPATIBLE_HASH |
( lp_winbind_offline_logon ( ) ? TDB_DEFAULT : ( TDB_DEFAULT | TDB_CLEAR_IF_FIRST ) ) ,
2006-07-11 13:22:55 +04:00
O_RDWR | O_CREAT , 0600 ) ;
2014-11-02 22:21:37 +03:00
TALLOC_FREE ( db_path ) ;
2006-02-04 01:19:41 +03:00
if ( ! wcache - > tdb ) {
DEBUG ( 0 , ( " Failed to open winbindd_cache.tdb! \n " ) ) ;
2006-06-19 23:41:56 +04:00
return ;
2006-02-04 01:19:41 +03:00
}
tdb_traverse ( wcache - > tdb , traverse_fn_cleanup , NULL ) ;
DEBUG ( 10 , ( " wcache_flush_cache success \n " ) ) ;
}
/* Count cached creds */
static int traverse_fn_cached_creds ( TDB_CONTEXT * the_tdb , TDB_DATA kbuf , TDB_DATA dbuf ,
void * state )
{
int * cred_count = ( int * ) state ;
2007-03-29 13:35:51 +04:00
if ( strncmp ( ( const char * ) kbuf . dptr , " CRED/ " , 5 ) = = 0 ) {
2006-02-04 01:19:41 +03:00
( * cred_count ) + + ;
}
return 0 ;
}
NTSTATUS wcache_count_cached_creds ( struct winbindd_domain * domain , int * count )
{
struct winbind_cache * cache = get_cache ( domain ) ;
* count = 0 ;
if ( ! cache - > tdb ) {
return NT_STATUS_INTERNAL_DB_ERROR ;
}
tdb_traverse ( cache - > tdb , traverse_fn_cached_creds , ( void * ) count ) ;
return NT_STATUS_OK ;
}
struct cred_list {
struct cred_list * prev , * next ;
TDB_DATA key ;
fstring name ;
time_t created ;
} ;
static struct cred_list * wcache_cred_list ;
static int traverse_fn_get_credlist ( TDB_CONTEXT * the_tdb , TDB_DATA kbuf , TDB_DATA dbuf ,
void * state )
{
struct cred_list * cred ;
2007-03-29 13:35:51 +04:00
if ( strncmp ( ( const char * ) kbuf . dptr , " CRED/ " , 5 ) = = 0 ) {
2006-02-04 01:19:41 +03:00
cred = SMB_MALLOC_P ( struct cred_list ) ;
if ( cred = = NULL ) {
DEBUG ( 0 , ( " traverse_fn_remove_first_creds: failed to malloc new entry for list \n " ) ) ;
return - 1 ;
}
ZERO_STRUCTP ( cred ) ;
2009-07-27 01:20:54 +04:00
2006-02-04 01:19:41 +03:00
/* save a copy of the key */
2009-07-27 01:20:54 +04:00
2007-03-29 13:35:51 +04:00
fstrcpy ( cred - > name , ( const char * ) kbuf . dptr ) ;
2006-02-04 01:19:41 +03:00
DLIST_ADD ( wcache_cred_list , cred ) ;
}
2009-07-27 01:20:54 +04:00
2006-02-04 01:19:41 +03:00
return 0 ;
}
2010-05-21 05:25:01 +04:00
NTSTATUS wcache_remove_oldest_cached_creds ( struct winbindd_domain * domain , const struct dom_sid * sid )
2006-02-04 01:19:41 +03:00
{
struct winbind_cache * cache = get_cache ( domain ) ;
NTSTATUS status ;
int ret ;
2016-06-29 14:38:19 +03:00
struct cred_list * cred , * next , * oldest = NULL ;
2006-02-04 01:19:41 +03:00
if ( ! cache - > tdb ) {
return NT_STATUS_INTERNAL_DB_ERROR ;
}
/* we possibly already have an entry */
if ( sid & & NT_STATUS_IS_OK ( wcache_cached_creds_exist ( domain , sid ) ) ) {
2009-07-27 01:20:54 +04:00
2018-12-06 20:25:02 +03:00
fstring key_str ;
struct dom_sid_buf tmp ;
2006-02-04 01:19:41 +03:00
DEBUG ( 11 , ( " we already have an entry, deleting that \n " ) ) ;
2018-12-06 20:25:02 +03:00
fstr_sprintf ( key_str , " CRED/%s " , dom_sid_str_buf ( sid , & tmp ) ) ;
2006-02-04 01:19:41 +03:00
tdb_delete ( cache - > tdb , string_tdb_data ( key_str ) ) ;
return NT_STATUS_OK ;
}
ret = tdb_traverse ( cache - > tdb , traverse_fn_get_credlist , NULL ) ;
if ( ret = = 0 ) {
return NT_STATUS_OK ;
2011-06-20 13:10:31 +04:00
} else if ( ( ret < 0 ) | | ( wcache_cred_list = = NULL ) ) {
2006-02-04 01:19:41 +03:00
return NT_STATUS_OBJECT_NAME_NOT_FOUND ;
}
ZERO_STRUCTP ( oldest ) ;
for ( cred = wcache_cred_list ; cred ; cred = cred - > next ) {
TDB_DATA data ;
time_t t ;
2015-03-12 17:23:17 +03:00
data = tdb_fetch ( cache - > tdb , string_tdb_data ( cred - > name ) ) ;
2006-02-04 01:19:41 +03:00
if ( ! data . dptr ) {
DEBUG ( 10 , ( " wcache_remove_oldest_cached_creds: entry for [%s] not found \n " ,
cred - > name ) ) ;
status = NT_STATUS_OBJECT_NAME_NOT_FOUND ;
goto done ;
}
2009-07-27 01:20:54 +04:00
2006-02-04 01:19:41 +03:00
t = IVAL ( data . dptr , 0 ) ;
SAFE_FREE ( data . dptr ) ;
if ( ! oldest ) {
oldest = SMB_MALLOC_P ( struct cred_list ) ;
if ( oldest = = NULL ) {
status = NT_STATUS_NO_MEMORY ;
goto done ;
}
fstrcpy ( oldest - > name , cred - > name ) ;
oldest - > created = t ;
continue ;
}
if ( t < oldest - > created ) {
fstrcpy ( oldest - > name , cred - > name ) ;
oldest - > created = t ;
}
}
if ( tdb_delete ( cache - > tdb , string_tdb_data ( oldest - > name ) ) = = 0 ) {
status = NT_STATUS_OK ;
} else {
status = NT_STATUS_UNSUCCESSFUL ;
}
done :
2016-06-29 14:38:19 +03:00
for ( cred = wcache_cred_list ; cred ; cred = next ) {
next = cred - > next ;
DLIST_REMOVE ( wcache_cred_list , cred ) ;
SAFE_FREE ( cred ) ;
}
2006-02-04 01:19:41 +03:00
SAFE_FREE ( oldest ) ;
2009-07-27 01:20:54 +04:00
2006-02-04 01:19:41 +03:00
return status ;
}
/* Change the global online/offline state. */
2007-10-19 04:40:25 +04:00
bool set_global_winbindd_state_offline ( void )
2006-02-04 01:19:41 +03:00
{
TDB_DATA data ;
DEBUG ( 10 , ( " set_global_winbindd_state_offline: offline requested. \n " ) ) ;
/* Only go offline if someone has created
the key " WINBINDD_OFFLINE " in the cache tdb . */
if ( wcache = = NULL | | wcache - > tdb = = NULL ) {
DEBUG ( 10 , ( " set_global_winbindd_state_offline: wcache not open yet. \n " ) ) ;
2008-01-07 13:27:54 +03:00
return false ;
2006-02-04 01:19:41 +03:00
}
if ( ! lp_winbind_offline_logon ( ) ) {
DEBUG ( 10 , ( " set_global_winbindd_state_offline: rejecting. \n " ) ) ;
2008-01-07 13:27:54 +03:00
return false ;
2006-02-04 01:19:41 +03:00
}
if ( global_winbindd_offline_state ) {
/* Already offline. */
2008-01-07 13:27:54 +03:00
return true ;
2006-02-04 01:19:41 +03:00
}
data = tdb_fetch_bystring ( wcache - > tdb , " WINBINDD_OFFLINE " ) ;
2006-10-09 19:11:37 +04:00
if ( ! data . dptr | | data . dsize ! = 4 ) {
2006-02-04 01:19:41 +03:00
DEBUG ( 10 , ( " set_global_winbindd_state_offline: offline state not set. \n " ) ) ;
2006-10-09 19:11:37 +04:00
SAFE_FREE ( data . dptr ) ;
2008-01-07 13:27:54 +03:00
return false ;
2006-02-04 01:19:41 +03:00
} else {
DEBUG ( 10 , ( " set_global_winbindd_state_offline: offline state set. \n " ) ) ;
2008-01-07 13:27:54 +03:00
global_winbindd_offline_state = true ;
2006-10-09 19:11:37 +04:00
SAFE_FREE ( data . dptr ) ;
2008-01-07 13:27:54 +03:00
return true ;
2006-02-04 01:19:41 +03:00
}
}
void set_global_winbindd_state_online ( void )
{
DEBUG ( 10 , ( " set_global_winbindd_state_online: online requested. \n " ) ) ;
if ( ! lp_winbind_offline_logon ( ) ) {
DEBUG ( 10 , ( " set_global_winbindd_state_online: rejecting. \n " ) ) ;
return ;
}
if ( ! global_winbindd_offline_state ) {
/* Already online. */
return ;
}
2008-01-07 13:27:54 +03:00
global_winbindd_offline_state = false ;
2006-02-04 01:19:41 +03:00
if ( ! wcache - > tdb ) {
return ;
}
/* Ensure there is no key "WINBINDD_OFFLINE" in the cache tdb. */
tdb_delete_bystring ( wcache - > tdb , " WINBINDD_OFFLINE " ) ;
}
2007-10-19 04:40:25 +04:00
bool get_global_winbindd_state_offline ( void )
2006-05-04 16:37:13 +04:00
{
return global_winbindd_offline_state ;
}
2006-11-30 02:20:22 +03:00
/***********************************************************************
Validate functions for all possible cache tdb keys .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2007-05-14 16:57:24 +04:00
static struct cache_entry * create_centry_validate ( const char * kstr , TDB_DATA data ,
2007-06-26 00:17:04 +04:00
struct tdb_validation_status * state )
2006-11-30 02:20:22 +03:00
{
2007-04-13 04:39:06 +04:00
struct cache_entry * centry ;
centry = SMB_XMALLOC_P ( struct cache_entry ) ;
2014-04-14 16:37:29 +04:00
centry - > data = ( unsigned char * ) smb_memdup ( data . dptr , data . dsize ) ;
2007-04-13 04:39:06 +04:00
if ( ! centry - > data ) {
SAFE_FREE ( centry ) ;
return NULL ;
}
centry - > len = data . dsize ;
centry - > ofs = 0 ;
2010-11-04 19:10:25 +03:00
if ( centry - > len < 16 ) {
2007-04-13 04:39:06 +04:00
/* huh? corrupt cache? */
2010-11-04 19:10:25 +03:00
DEBUG ( 0 , ( " create_centry_validate: Corrupt cache for key %s "
" (len < 16) ? \n " , kstr ) ) ;
2007-04-13 04:39:06 +04:00
centry_free ( centry ) ;
2008-01-07 13:27:54 +03:00
state - > bad_entry = true ;
state - > success = false ;
2007-04-13 04:39:06 +04:00
return NULL ;
}
centry - > status = NT_STATUS ( centry_uint32 ( centry ) ) ;
centry - > sequence_number = centry_uint32 ( centry ) ;
2010-11-08 13:50:51 +03:00
centry - > timeout = centry_uint64_t ( centry ) ;
2007-04-13 04:39:06 +04:00
return centry ;
}
2007-05-14 16:57:24 +04:00
static int validate_seqnum ( TALLOC_CTX * mem_ctx , const char * keystr , TDB_DATA dbuf ,
2007-06-26 00:17:04 +04:00
struct tdb_validation_status * state )
2007-04-13 04:39:06 +04:00
{
if ( dbuf . dsize ! = 8 ) {
DEBUG ( 0 , ( " validate_seqnum: Corrupt cache for key %s (len %u != 8) ? \n " ,
keystr , ( unsigned int ) dbuf . dsize ) ) ;
2008-01-07 13:27:54 +03:00
state - > bad_entry = true ;
2007-04-13 04:39:06 +04:00
return 1 ;
}
2006-11-30 02:20:22 +03:00
return 0 ;
}
2007-05-14 16:57:24 +04:00
static int validate_u ( TALLOC_CTX * mem_ctx , const char * keystr , TDB_DATA dbuf ,
2007-06-26 00:17:04 +04:00
struct tdb_validation_status * state )
2006-11-30 02:20:22 +03:00
{
2007-05-14 16:57:24 +04:00
struct cache_entry * centry = create_centry_validate ( keystr , dbuf , state ) ;
2010-05-21 05:25:01 +04:00
struct dom_sid sid ;
2007-04-13 04:39:06 +04:00
if ( ! centry ) {
return 1 ;
}
( void ) centry_string ( centry , mem_ctx ) ;
( void ) centry_string ( centry , mem_ctx ) ;
( void ) centry_string ( centry , mem_ctx ) ;
( void ) centry_string ( centry , mem_ctx ) ;
2016-12-30 13:57:50 +03:00
( void ) centry_string ( centry , mem_ctx ) ;
( void ) centry_uint32 ( centry ) ;
2007-04-13 04:39:06 +04:00
( void ) centry_uint32 ( centry ) ;
2016-12-30 13:57:50 +03:00
( void ) centry_string ( centry , mem_ctx ) ;
2009-08-01 01:48:39 +04:00
( void ) centry_sid ( centry , & sid ) ;
( void ) centry_sid ( centry , & sid ) ;
2007-04-13 04:39:06 +04:00
centry_free ( centry ) ;
2007-05-14 16:57:24 +04:00
if ( ! ( state - > success ) ) {
2007-04-13 04:39:06 +04:00
return 1 ;
}
DEBUG ( 10 , ( " validate_u: %s ok \n " , keystr ) ) ;
2006-11-30 02:20:22 +03:00
return 0 ;
}
2007-05-14 16:57:24 +04:00
static int validate_loc_pol ( TALLOC_CTX * mem_ctx , const char * keystr , TDB_DATA dbuf ,
2007-06-26 00:17:04 +04:00
struct tdb_validation_status * state )
2006-11-30 02:20:22 +03:00
{
2007-05-14 16:57:24 +04:00
struct cache_entry * centry = create_centry_validate ( keystr , dbuf , state ) ;
2007-04-13 05:00:44 +04:00
if ( ! centry ) {
return 1 ;
}
( void ) centry_nttime ( centry ) ;
( void ) centry_nttime ( centry ) ;
( void ) centry_uint16 ( centry ) ;
centry_free ( centry ) ;
2007-05-14 16:57:24 +04:00
if ( ! ( state - > success ) ) {
2007-04-13 05:00:44 +04:00
return 1 ;
}
DEBUG ( 10 , ( " validate_loc_pol: %s ok \n " , keystr ) ) ;
2006-11-30 02:20:22 +03:00
return 0 ;
}
2007-05-14 16:57:24 +04:00
static int validate_pwd_pol ( TALLOC_CTX * mem_ctx , const char * keystr , TDB_DATA dbuf ,
2007-06-26 00:17:04 +04:00
struct tdb_validation_status * state )
2006-11-30 02:20:22 +03:00
{
2007-05-14 16:57:24 +04:00
struct cache_entry * centry = create_centry_validate ( keystr , dbuf , state ) ;
2007-04-13 05:00:44 +04:00
if ( ! centry ) {
return 1 ;
}
2007-04-13 05:46:47 +04:00
( void ) centry_uint16 ( centry ) ;
( void ) centry_uint16 ( centry ) ;
( void ) centry_uint32 ( centry ) ;
( void ) centry_nttime ( centry ) ;
( void ) centry_nttime ( centry ) ;
2007-04-13 05:00:44 +04:00
centry_free ( centry ) ;
2007-05-14 16:57:24 +04:00
if ( ! ( state - > success ) ) {
2007-04-13 05:00:44 +04:00
return 1 ;
}
DEBUG ( 10 , ( " validate_pwd_pol: %s ok \n " , keystr ) ) ;
2006-11-30 02:20:22 +03:00
return 0 ;
}
2007-05-14 16:57:24 +04:00
static int validate_cred ( TALLOC_CTX * mem_ctx , const char * keystr , TDB_DATA dbuf ,
2007-06-26 00:17:04 +04:00
struct tdb_validation_status * state )
2006-11-30 02:20:22 +03:00
{
2007-05-14 16:57:24 +04:00
struct cache_entry * centry = create_centry_validate ( keystr , dbuf , state ) ;
2007-04-13 05:00:44 +04:00
if ( ! centry ) {
return 1 ;
}
2007-04-13 05:46:47 +04:00
( void ) centry_time ( centry ) ;
( void ) centry_hash16 ( centry , mem_ctx ) ;
/* We only have 17 bytes more data in the salted cred case. */
if ( centry - > len - centry - > ofs = = 17 ) {
( void ) centry_hash16 ( centry , mem_ctx ) ;
}
2007-04-13 05:00:44 +04:00
centry_free ( centry ) ;
2007-05-14 16:57:24 +04:00
if ( ! ( state - > success ) ) {
2007-04-13 05:00:44 +04:00
return 1 ;
}
DEBUG ( 10 , ( " validate_cred: %s ok \n " , keystr ) ) ;
2006-11-30 02:20:22 +03:00
return 0 ;
}
2007-05-14 16:57:24 +04:00
static int validate_ul ( TALLOC_CTX * mem_ctx , const char * keystr , TDB_DATA dbuf ,
2007-06-26 00:17:04 +04:00
struct tdb_validation_status * state )
2006-11-30 02:20:22 +03:00
{
2007-05-14 16:57:24 +04:00
struct cache_entry * centry = create_centry_validate ( keystr , dbuf , state ) ;
2015-05-16 00:56:25 +03:00
int32_t num_entries , i ;
2007-04-13 05:00:44 +04:00
if ( ! centry ) {
return 1 ;
}
2015-05-16 00:56:25 +03:00
num_entries = ( int32_t ) centry_uint32 ( centry ) ;
2007-04-13 05:46:47 +04:00
for ( i = 0 ; i < num_entries ; i + + ) {
2016-12-30 13:57:50 +03:00
( void ) centry_uint32 ( centry ) ;
2007-04-13 05:46:47 +04:00
}
2007-04-13 05:00:44 +04:00
centry_free ( centry ) ;
2007-05-14 16:57:24 +04:00
if ( ! ( state - > success ) ) {
2007-04-13 05:00:44 +04:00
return 1 ;
}
DEBUG ( 10 , ( " validate_ul: %s ok \n " , keystr ) ) ;
2006-11-30 02:20:22 +03:00
return 0 ;
}
2007-05-14 16:57:24 +04:00
static int validate_gl ( TALLOC_CTX * mem_ctx , const char * keystr , TDB_DATA dbuf ,
2007-06-26 00:17:04 +04:00
struct tdb_validation_status * state )
2006-11-30 02:20:22 +03:00
{
2007-05-14 16:57:24 +04:00
struct cache_entry * centry = create_centry_validate ( keystr , dbuf , state ) ;
2015-05-16 00:56:25 +03:00
int32_t num_entries , i ;
2007-04-13 05:00:44 +04:00
if ( ! centry ) {
return 1 ;
}
2007-04-13 05:46:47 +04:00
num_entries = centry_uint32 ( centry ) ;
2009-07-27 01:20:54 +04:00
2007-04-13 05:46:47 +04:00
for ( i = 0 ; i < num_entries ; i + + ) {
( void ) centry_string ( centry , mem_ctx ) ;
( void ) centry_string ( centry , mem_ctx ) ;
( void ) centry_uint32 ( centry ) ;
}
2007-04-13 05:00:44 +04:00
centry_free ( centry ) ;
2007-05-14 16:57:24 +04:00
if ( ! ( state - > success ) ) {
2007-04-13 05:00:44 +04:00
return 1 ;
}
DEBUG ( 10 , ( " validate_gl: %s ok \n " , keystr ) ) ;
2006-11-30 02:20:22 +03:00
return 0 ;
}
2017-03-02 16:54:09 +03:00
static int validate_ug ( TALLOC_CTX * mem_ctx , const char * keystr , TDB_DATA dbuf ,
struct tdb_validation_status * state )
{
struct cache_entry * centry = create_centry_validate ( keystr , dbuf , state ) ;
int32_t num_groups , i ;
if ( ! centry ) {
return 1 ;
}
num_groups = centry_uint32 ( centry ) ;
for ( i = 0 ; i < num_groups ; i + + ) {
struct dom_sid sid ;
centry_sid ( centry , & sid ) ;
}
centry_free ( centry ) ;
if ( ! ( state - > success ) ) {
return 1 ;
}
DEBUG ( 10 , ( " validate_ug: %s ok \n " , keystr ) ) ;
return 0 ;
}
2007-05-14 16:57:24 +04:00
static int validate_ua ( TALLOC_CTX * mem_ctx , const char * keystr , TDB_DATA dbuf ,
2007-06-26 00:17:04 +04:00
struct tdb_validation_status * state )
2006-11-30 02:20:22 +03:00
{
2007-05-14 16:57:24 +04:00
struct cache_entry * centry = create_centry_validate ( keystr , dbuf , state ) ;
2015-05-16 00:56:25 +03:00
int32_t num_aliases , i ;
2007-04-13 05:00:44 +04:00
if ( ! centry ) {
return 1 ;
}
2007-04-13 05:46:47 +04:00
num_aliases = centry_uint32 ( centry ) ;
for ( i = 0 ; i < num_aliases ; i + + ) {
( void ) centry_uint32 ( centry ) ;
}
2007-04-13 05:00:44 +04:00
centry_free ( centry ) ;
2007-05-14 16:57:24 +04:00
if ( ! ( state - > success ) ) {
2007-04-13 05:00:44 +04:00
return 1 ;
}
DEBUG ( 10 , ( " validate_ua: %s ok \n " , keystr ) ) ;
2006-11-30 02:20:22 +03:00
return 0 ;
}
2007-05-14 16:57:24 +04:00
static int validate_gm ( TALLOC_CTX * mem_ctx , const char * keystr , TDB_DATA dbuf ,
2007-06-26 00:17:04 +04:00
struct tdb_validation_status * state )
2006-11-30 02:20:22 +03:00
{
2007-05-14 16:57:24 +04:00
struct cache_entry * centry = create_centry_validate ( keystr , dbuf , state ) ;
2015-05-16 00:56:25 +03:00
int32_t num_names , i ;
2007-04-13 05:00:44 +04:00
if ( ! centry ) {
return 1 ;
}
2007-04-13 05:46:47 +04:00
num_names = centry_uint32 ( centry ) ;
for ( i = 0 ; i < num_names ; i + + ) {
2010-05-21 05:25:01 +04:00
struct dom_sid sid ;
2009-08-01 01:48:39 +04:00
centry_sid ( centry , & sid ) ;
2007-04-13 05:46:47 +04:00
( void ) centry_string ( centry , mem_ctx ) ;
( void ) centry_uint32 ( centry ) ;
}
2007-04-13 05:00:44 +04:00
centry_free ( centry ) ;
2007-05-14 16:57:24 +04:00
if ( ! ( state - > success ) ) {
2007-04-13 05:00:44 +04:00
return 1 ;
}
DEBUG ( 10 , ( " validate_gm: %s ok \n " , keystr ) ) ;
2006-11-30 02:20:22 +03:00
return 0 ;
}
2007-05-14 16:57:24 +04:00
static int validate_dr ( TALLOC_CTX * mem_ctx , const char * keystr , TDB_DATA dbuf ,
2007-06-26 00:17:04 +04:00
struct tdb_validation_status * state )
2006-12-01 04:58:43 +03:00
{
2007-04-13 05:46:47 +04:00
/* Can't say anything about this other than must be nonzero. */
if ( dbuf . dsize = = 0 ) {
DEBUG ( 0 , ( " validate_dr: Corrupt cache for key %s (len == 0) ? \n " ,
keystr ) ) ;
2008-01-07 13:27:54 +03:00
state - > bad_entry = true ;
state - > success = false ;
2007-04-13 05:00:44 +04:00
return 1 ;
}
DEBUG ( 10 , ( " validate_dr: %s ok \n " , keystr ) ) ;
2006-12-01 04:58:43 +03:00
return 0 ;
}
2007-05-14 16:57:24 +04:00
static int validate_de ( TALLOC_CTX * mem_ctx , const char * keystr , TDB_DATA dbuf ,
2007-06-26 00:17:04 +04:00
struct tdb_validation_status * state )
2006-12-01 04:58:43 +03:00
{
2007-04-13 05:46:47 +04:00
/* Can't say anything about this other than must be nonzero. */
if ( dbuf . dsize = = 0 ) {
DEBUG ( 0 , ( " validate_de: Corrupt cache for key %s (len == 0) ? \n " ,
keystr ) ) ;
2008-01-07 13:27:54 +03:00
state - > bad_entry = true ;
state - > success = false ;
2007-04-13 05:00:44 +04:00
return 1 ;
}
DEBUG ( 10 , ( " validate_de: %s ok \n " , keystr ) ) ;
2006-12-01 04:58:43 +03:00
return 0 ;
}
2008-09-16 00:41:37 +04:00
static int validate_nss_an ( TALLOC_CTX * mem_ctx , const char * keystr ,
TDB_DATA dbuf ,
struct tdb_validation_status * state )
{
struct cache_entry * centry = create_centry_validate ( keystr , dbuf , state ) ;
if ( ! centry ) {
return 1 ;
}
( void ) centry_string ( centry , mem_ctx ) ;
centry_free ( centry ) ;
if ( ! ( state - > success ) ) {
return 1 ;
}
DEBUG ( 10 , ( " validate_pwinfo: %s ok \n " , keystr ) ) ;
return 0 ;
}
static int validate_nss_na ( TALLOC_CTX * mem_ctx , const char * keystr ,
TDB_DATA dbuf ,
struct tdb_validation_status * state )
{
struct cache_entry * centry = create_centry_validate ( keystr , dbuf , state ) ;
if ( ! centry ) {
return 1 ;
}
( void ) centry_string ( centry , mem_ctx ) ;
centry_free ( centry ) ;
if ( ! ( state - > success ) ) {
return 1 ;
}
2017-01-03 15:18:25 +03:00
DBG_DEBUG ( " %s ok \n " , keystr ) ;
2008-09-16 00:41:37 +04:00
return 0 ;
}
2007-05-14 16:57:24 +04:00
static int validate_trustdomcache ( TALLOC_CTX * mem_ctx , const char * keystr ,
TDB_DATA dbuf ,
2007-06-26 00:17:04 +04:00
struct tdb_validation_status * state )
2007-05-14 16:57:24 +04:00
{
if ( dbuf . dsize = = 0 ) {
DEBUG ( 0 , ( " validate_trustdomcache: Corrupt cache for "
" key %s (len ==0) ? \n " , keystr ) ) ;
2008-01-07 13:27:54 +03:00
state - > bad_entry = true ;
state - > success = false ;
2007-05-14 16:57:24 +04:00
return 1 ;
}
DEBUG ( 10 , ( " validate_trustdomcache: %s ok \n " , keystr ) ) ;
DEBUGADD ( 10 , ( " Don't trust me, I am a DUMMY! \n " ) ) ;
return 0 ;
}
static int validate_offline ( TALLOC_CTX * mem_ctx , const char * keystr , TDB_DATA dbuf ,
2007-06-26 00:17:04 +04:00
struct tdb_validation_status * state )
2006-11-30 03:09:34 +03:00
{
2007-04-13 05:00:44 +04:00
if ( dbuf . dsize ! = 4 ) {
DEBUG ( 0 , ( " validate_offline: Corrupt cache for key %s (len %u != 4) ? \n " ,
keystr , ( unsigned int ) dbuf . dsize ) ) ;
2008-01-07 13:27:54 +03:00
state - > bad_entry = true ;
state - > success = false ;
2007-04-13 05:00:44 +04:00
return 1 ;
}
DEBUG ( 10 , ( " validate_offline: %s ok \n " , keystr ) ) ;
2006-11-30 03:09:34 +03:00
return 0 ;
}
2009-08-29 21:28:42 +04:00
static int validate_ndr ( TALLOC_CTX * mem_ctx , const char * keystr , TDB_DATA dbuf ,
struct tdb_validation_status * state )
{
/*
* Ignore validation for now . The proper way to do this is with a
* checksum . Just pure parsing does not really catch much .
*/
return 0 ;
}
2007-05-14 16:57:24 +04:00
static int validate_cache_version ( TALLOC_CTX * mem_ctx , const char * keystr , TDB_DATA dbuf ,
2007-06-26 00:17:04 +04:00
struct tdb_validation_status * state )
2007-05-14 16:57:24 +04:00
{
if ( dbuf . dsize ! = 4 ) {
DEBUG ( 0 , ( " validate_cache_version: Corrupt cache for "
" key %s (len %u != 4) ? \n " ,
keystr , ( unsigned int ) dbuf . dsize ) ) ;
2008-01-07 13:27:54 +03:00
state - > bad_entry = true ;
state - > success = false ;
2007-05-14 16:57:24 +04:00
return 1 ;
}
DEBUG ( 10 , ( " validate_cache_version: %s ok \n " , keystr ) ) ;
return 0 ;
}
2006-11-30 02:20:22 +03:00
/***********************************************************************
A list of all possible cache tdb keys with associated validation
functions .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
struct key_val_struct {
const char * keyname ;
2007-06-26 00:17:04 +04:00
int ( * validate_data_fn ) ( TALLOC_CTX * mem_ctx , const char * keystr , TDB_DATA dbuf , struct tdb_validation_status * state ) ;
2006-11-30 02:20:22 +03:00
} key_val [ ] = {
{ " SEQNUM/ " , validate_seqnum } ,
{ " U/ " , validate_u } ,
{ " LOC_POL/ " , validate_loc_pol } ,
{ " PWD_POL/ " , validate_pwd_pol } ,
{ " CRED/ " , validate_cred } ,
{ " UL/ " , validate_ul } ,
{ " GL/ " , validate_gl } ,
2017-03-02 16:54:09 +03:00
{ " UG/ " , validate_ug } ,
2006-11-30 02:20:22 +03:00
{ " UA " , validate_ua } ,
{ " GM/ " , validate_gm } ,
2006-12-01 04:58:43 +03:00
{ " DR/ " , validate_dr } ,
{ " DE/ " , validate_de } ,
2007-05-14 16:57:24 +04:00
{ " TRUSTDOMCACHE/ " , validate_trustdomcache } ,
2008-09-16 00:41:37 +04:00
{ " NSS/NA/ " , validate_nss_na } ,
{ " NSS/AN/ " , validate_nss_an } ,
2006-11-30 03:09:34 +03:00
{ " WINBINDD_OFFLINE " , validate_offline } ,
2009-08-29 21:28:42 +04:00
{ " NDR/ " , validate_ndr } ,
2007-05-14 16:57:24 +04:00
{ WINBINDD_CACHE_VERSION_KEYSTR , validate_cache_version } ,
2006-11-30 02:20:22 +03:00
{ NULL , NULL }
} ;
/***********************************************************************
Function to look at every entry in the tdb and validate it as far as
possible .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static int cache_traverse_validate_fn ( TDB_CONTEXT * the_tdb , TDB_DATA kbuf , TDB_DATA dbuf , void * state )
{
int i ;
2008-04-23 16:55:51 +04:00
unsigned int max_key_len = 1024 ;
2007-06-26 00:17:04 +04:00
struct tdb_validation_status * v_state = ( struct tdb_validation_status * ) state ;
2006-11-30 02:20:22 +03:00
2007-04-13 04:39:06 +04:00
/* Paranoia check. */
2013-11-13 18:10:33 +04:00
if ( strncmp ( " UA/ " , ( const char * ) kbuf . dptr , 3 ) = = 0 | |
strncmp ( " NDR/ " , ( const char * ) kbuf . dptr , 4 ) = = 0 ) {
2008-04-23 16:55:51 +04:00
max_key_len = 1024 * 1024 ;
}
if ( kbuf . dsize > max_key_len ) {
DEBUG ( 0 , ( " cache_traverse_validate_fn: key length too large: "
" (%u) > (%u) \n \n " ,
( unsigned int ) kbuf . dsize , ( unsigned int ) max_key_len ) ) ;
return 1 ;
2007-04-13 04:39:06 +04:00
}
2006-11-30 02:20:22 +03:00
for ( i = 0 ; key_val [ i ] . keyname ; i + + ) {
2006-12-01 03:06:35 +03:00
size_t namelen = strlen ( key_val [ i ] . keyname ) ;
if ( kbuf . dsize > = namelen & & (
2007-03-29 13:35:51 +04:00
strncmp ( key_val [ i ] . keyname , ( const char * ) kbuf . dptr , namelen ) ) = = 0 ) {
2007-04-13 04:39:06 +04:00
TALLOC_CTX * mem_ctx ;
char * keystr ;
int ret ;
2007-05-07 19:07:49 +04:00
keystr = SMB_MALLOC_ARRAY ( char , kbuf . dsize + 1 ) ;
2007-04-13 04:39:06 +04:00
if ( ! keystr ) {
return 1 ;
}
memcpy ( keystr , kbuf . dptr , kbuf . dsize ) ;
keystr [ kbuf . dsize ] = ' \0 ' ;
mem_ctx = talloc_init ( " validate_ctx " ) ;
if ( ! mem_ctx ) {
SAFE_FREE ( keystr ) ;
return 1 ;
}
2007-05-14 16:57:24 +04:00
ret = key_val [ i ] . validate_data_fn ( mem_ctx , keystr , dbuf ,
v_state ) ;
2007-04-13 04:39:06 +04:00
SAFE_FREE ( keystr ) ;
talloc_destroy ( mem_ctx ) ;
return ret ;
2006-11-30 02:20:22 +03:00
}
}
2006-12-01 04:58:43 +03:00
DEBUG ( 0 , ( " cache_traverse_validate_fn: unknown cache entry \n key : \n " ) ) ;
2015-04-24 05:04:23 +03:00
dump_data ( 0 , ( uint8_t * ) kbuf . dptr , kbuf . dsize ) ;
2006-12-01 04:58:43 +03:00
DEBUG ( 0 , ( " data : \n " ) ) ;
2015-04-24 05:04:23 +03:00
dump_data ( 0 , ( uint8_t * ) dbuf . dptr , dbuf . dsize ) ;
2008-01-07 13:27:54 +03:00
v_state - > unknown_key = true ;
v_state - > success = false ;
2006-12-01 03:06:35 +03:00
return 1 ; /* terminate. */
2006-11-30 02:20:22 +03:00
}
2007-04-13 04:39:06 +04:00
static void validate_panic ( const char * const why )
{
2007-05-14 16:57:24 +04:00
DEBUG ( 0 , ( " validating cache: would panic %s \n " , why ) ) ;
DEBUGADD ( 0 , ( " exiting instead (cache validation mode) \n " ) ) ;
exit ( 47 ) ;
2007-04-13 04:39:06 +04:00
}
2011-12-03 04:19:34 +04:00
static int wbcache_update_centry_fn ( TDB_CONTEXT * tdb ,
TDB_DATA key ,
TDB_DATA data ,
void * state )
{
uint64_t ctimeout ;
TDB_DATA blob ;
if ( is_non_centry_key ( key ) ) {
return 0 ;
}
if ( data . dptr = = NULL | | data . dsize = = 0 ) {
if ( tdb_delete ( tdb , key ) < 0 ) {
DEBUG ( 0 , ( " tdb_delete for [%s] failed! \n " ,
key . dptr ) ) ;
return 1 ;
}
}
/* add timeout to blob (uint64_t) */
blob . dsize = data . dsize + 8 ;
blob . dptr = SMB_XMALLOC_ARRAY ( uint8_t , blob . dsize ) ;
if ( blob . dptr = = NULL ) {
return 1 ;
}
memset ( blob . dptr , 0 , blob . dsize ) ;
/* copy status and seqnum */
memcpy ( blob . dptr , data . dptr , 8 ) ;
/* add timeout */
ctimeout = lp_winbind_cache_time ( ) + time ( NULL ) ;
SBVAL ( blob . dptr , 8 , ctimeout ) ;
/* copy the rest */
memcpy ( blob . dptr + 16 , data . dptr + 8 , data . dsize - 8 ) ;
if ( tdb_store ( tdb , key , blob , TDB_REPLACE ) < 0 ) {
DEBUG ( 0 , ( " tdb_store to update [%s] failed! \n " ,
key . dptr ) ) ;
SAFE_FREE ( blob . dptr ) ;
return 1 ;
}
SAFE_FREE ( blob . dptr ) ;
return 0 ;
}
static bool wbcache_upgrade_v1_to_v2 ( TDB_CONTEXT * tdb )
{
int rc ;
DEBUG ( 1 , ( " Upgrade to version 2 of the winbindd_cache.tdb \n " ) ) ;
rc = tdb_traverse ( tdb , wbcache_update_centry_fn , NULL ) ;
if ( rc < 0 ) {
return false ;
}
return true ;
}
2006-11-30 02:20:22 +03:00
/***********************************************************************
Try and validate every entry in the winbindd cache . If we fail here ,
2007-11-23 12:54:48 +03:00
delete the cache tdb and return non - zero .
2006-11-30 02:20:22 +03:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2007-05-14 16:57:24 +04:00
int winbindd_validate_cache ( void )
{
2007-06-26 17:45:07 +04:00
int ret = - 1 ;
2014-11-02 22:21:37 +03:00
char * tdb_path = NULL ;
2007-06-26 17:45:07 +04:00
TDB_CONTEXT * tdb = NULL ;
2011-12-03 04:19:34 +04:00
uint32_t vers_id ;
bool ok ;
2007-06-26 00:17:04 +04:00
2007-05-14 16:57:24 +04:00
DEBUG ( 10 , ( " winbindd_validate_cache: replacing panic function \n " ) ) ;
smb_panic_fn = validate_panic ;
2016-08-19 00:01:50 +03:00
tdb_path = wcache_path ( ) ;
2014-11-02 22:21:37 +03:00
if ( tdb_path = = NULL ) {
goto done ;
}
tdb = tdb_open_log ( tdb_path ,
2007-06-26 17:45:07 +04:00
WINBINDD_CACHE_TDB_DEFAULT_HASH_SIZE ,
2010-09-27 16:46:07 +04:00
TDB_INCOMPATIBLE_HASH |
2014-11-02 22:21:37 +03:00
( lp_winbind_offline_logon ( )
? TDB_DEFAULT
2007-06-26 17:45:07 +04:00
: TDB_DEFAULT | TDB_CLEAR_IF_FIRST ) ,
2014-11-02 22:21:37 +03:00
O_RDWR | O_CREAT ,
2007-06-26 17:45:07 +04:00
0600 ) ;
if ( ! tdb ) {
DEBUG ( 0 , ( " winbindd_validate_cache: "
" error opening/initializing tdb \n " ) ) ;
goto done ;
}
2011-12-03 04:19:34 +04:00
/* Version check and upgrade code. */
if ( ! tdb_fetch_uint32 ( tdb , WINBINDD_CACHE_VERSION_KEYSTR , & vers_id ) ) {
DEBUG ( 10 , ( " Fresh database \n " ) ) ;
tdb_store_uint32 ( tdb , WINBINDD_CACHE_VERSION_KEYSTR , WINBINDD_CACHE_VERSION ) ;
vers_id = WINBINDD_CACHE_VERSION ;
}
if ( vers_id ! = WINBINDD_CACHE_VERSION ) {
if ( vers_id = = WINBINDD_CACHE_VER1 ) {
ok = wbcache_upgrade_v1_to_v2 ( tdb ) ;
if ( ! ok ) {
DEBUG ( 10 , ( " winbindd_validate_cache: upgrade to version 2 failed. \n " ) ) ;
unlink ( tdb_path ) ;
goto done ;
}
tdb_store_uint32 ( tdb ,
WINBINDD_CACHE_VERSION_KEYSTR ,
WINBINDD_CACHE_VERSION ) ;
vers_id = WINBINDD_CACHE_VER2 ;
}
}
2007-06-26 17:45:07 +04:00
tdb_close ( tdb ) ;
2007-08-31 14:30:14 +04:00
ret = tdb_validate_and_backup ( tdb_path , cache_traverse_validate_fn ) ;
2007-05-14 16:57:24 +04:00
2007-07-09 19:34:46 +04:00
if ( ret ! = 0 ) {
DEBUG ( 10 , ( " winbindd_validate_cache: validation not successful. \n " ) ) ;
DEBUGADD ( 10 , ( " removing tdb %s. \n " , tdb_path ) ) ;
unlink ( tdb_path ) ;
}
2007-06-26 17:45:07 +04:00
done :
2014-11-02 22:21:37 +03:00
TALLOC_FREE ( tdb_path ) ;
2007-05-14 16:57:24 +04:00
DEBUG ( 10 , ( " winbindd_validate_cache: restoring panic function \n " ) ) ;
smb_panic_fn = smb_panic ;
2006-11-30 02:20:22 +03:00
return ret ;
}
2007-08-31 14:47:42 +04:00
/***********************************************************************
Try and validate every entry in the winbindd cache .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
int winbindd_validate_cache_nobackup ( void )
{
int ret = - 1 ;
2014-11-02 22:21:37 +03:00
char * tdb_path ;
2007-08-31 14:47:42 +04:00
DEBUG ( 10 , ( " winbindd_validate_cache: replacing panic function \n " ) ) ;
smb_panic_fn = validate_panic ;
2016-08-19 00:01:50 +03:00
tdb_path = wcache_path ( ) ;
2014-11-02 22:21:37 +03:00
if ( tdb_path = = NULL ) {
goto err_panic_restore ;
}
2007-08-31 20:30:40 +04:00
if ( wcache = = NULL | | wcache - > tdb = = NULL ) {
ret = tdb_validate_open ( tdb_path , cache_traverse_validate_fn ) ;
} else {
ret = tdb_validate ( wcache - > tdb , cache_traverse_validate_fn ) ;
}
2007-08-31 14:47:42 +04:00
if ( ret ! = 0 ) {
DEBUG ( 10 , ( " winbindd_validate_cache_nobackup: validation not "
" successful. \n " ) ) ;
}
2014-11-02 22:21:37 +03:00
TALLOC_FREE ( tdb_path ) ;
err_panic_restore :
2007-08-31 14:47:42 +04:00
DEBUG ( 10 , ( " winbindd_validate_cache_nobackup: restoring panic "
" function \n " ) ) ;
smb_panic_fn = smb_panic ;
return ret ;
}
2008-04-10 13:53:53 +04:00
bool winbindd_cache_validate_and_initialize ( void )
{
close_winbindd_cache ( ) ;
if ( lp_winbind_offline_logon ( ) ) {
if ( winbindd_validate_cache ( ) < 0 ) {
DEBUG ( 0 , ( " winbindd cache tdb corrupt and no backup "
" could be restored. \n " ) ) ;
}
}
return initialize_winbindd_cache ( ) ;
}
2007-05-06 22:39:31 +04:00
/*********************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2007-10-19 04:40:25 +04:00
static bool add_wbdomain_to_tdc_array ( struct winbindd_domain * new_dom ,
2007-05-06 22:39:31 +04:00
struct winbindd_tdc_domain * * domains ,
size_t * num_domains )
{
struct winbindd_tdc_domain * list = NULL ;
2017-07-12 14:30:02 +03:00
size_t i , idx ;
2008-01-07 13:27:54 +03:00
bool set_only = false ;
2009-07-27 01:20:54 +04:00
2007-05-06 22:39:31 +04:00
/* don't allow duplicates */
idx = * num_domains ;
list = * domains ;
2009-07-27 01:20:54 +04:00
2007-05-06 22:39:31 +04:00
for ( i = 0 ; i < ( * num_domains ) ; i + + ) {
if ( strequal ( new_dom - > name , list [ i ] . domain_name ) ) {
DEBUG ( 10 , ( " add_wbdomain_to_tdc_array: Found existing record for %s \n " ,
new_dom - > name ) ) ;
idx = i ;
2008-01-07 13:27:54 +03:00
set_only = true ;
2009-07-27 01:20:54 +04:00
2007-05-06 22:39:31 +04:00
break ;
}
}
if ( ! set_only ) {
if ( ! * domains ) {
2011-06-07 05:30:12 +04:00
list = talloc_array ( NULL , struct winbindd_tdc_domain , 1 ) ;
2007-05-06 22:39:31 +04:00
idx = 0 ;
} else {
2011-06-07 05:10:15 +04:00
list = talloc_realloc ( * domains , * domains ,
2007-05-06 22:39:31 +04:00
struct winbindd_tdc_domain ,
( * num_domains ) + 1 ) ;
idx = * num_domains ;
}
ZERO_STRUCT ( list [ idx ] ) ;
}
if ( ! list )
2008-01-07 13:27:54 +03:00
return false ;
2007-05-06 22:39:31 +04:00
2013-02-25 12:31:12 +04:00
list [ idx ] . domain_name = talloc_strdup ( list , new_dom - > name ) ;
if ( list [ idx ] . domain_name = = NULL ) {
return false ;
}
if ( new_dom - > alt_name ! = NULL ) {
list [ idx ] . dns_name = talloc_strdup ( list , new_dom - > alt_name ) ;
if ( list [ idx ] . dns_name = = NULL ) {
return false ;
}
}
2007-05-06 22:39:31 +04:00
2008-07-29 14:08:47 +04:00
if ( ! is_null_sid ( & new_dom - > sid ) ) {
2007-05-06 22:39:31 +04:00
sid_copy ( & list [ idx ] . sid , & new_dom - > sid ) ;
2008-07-29 14:08:47 +04:00
} else {
sid_copy ( & list [ idx ] . sid , & global_sid_NULL ) ;
}
2007-05-06 22:39:31 +04:00
if ( new_dom - > domain_flags ! = 0x0 )
list [ idx ] . trust_flags = new_dom - > domain_flags ;
if ( new_dom - > domain_type ! = 0x0 )
list [ idx ] . trust_type = new_dom - > domain_type ;
if ( new_dom - > domain_trust_attribs ! = 0x0 )
list [ idx ] . trust_attribs = new_dom - > domain_trust_attribs ;
2009-07-27 01:20:54 +04:00
2007-05-06 22:39:31 +04:00
if ( ! set_only ) {
* domains = list ;
* num_domains = idx + 1 ;
}
2008-01-07 13:27:54 +03:00
return true ;
2007-05-06 22:39:31 +04:00
}
/*********************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static TDB_DATA make_tdc_key ( const char * domain_name )
{
char * keystr = NULL ;
TDB_DATA key = { NULL , 0 } ;
2009-07-27 01:20:54 +04:00
2007-05-06 22:39:31 +04:00
if ( ! domain_name ) {
DEBUG ( 5 , ( " make_tdc_key: Keyname workgroup is NULL! \n " ) ) ;
return key ;
}
2009-07-27 01:20:54 +04:00
2009-01-01 03:30:11 +03:00
if ( asprintf ( & keystr , " TRUSTDOMCACHE/%s " , domain_name ) = = - 1 ) {
return key ;
}
2007-05-21 17:40:27 +04:00
key = string_term_tdb_data ( keystr ) ;
2009-07-27 01:20:54 +04:00
2007-05-06 22:39:31 +04:00
return key ;
}
/*********************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static int pack_tdc_domains ( struct winbindd_tdc_domain * domains ,
size_t num_domains ,
unsigned char * * buf )
{
unsigned char * buffer = NULL ;
int len = 0 ;
int buflen = 0 ;
2017-07-12 14:30:02 +03:00
size_t i = 0 ;
2007-05-06 22:39:31 +04:00
DEBUG ( 10 , ( " pack_tdc_domains: Packing %d trusted domains \n " ,
( int ) num_domains ) ) ;
2009-07-27 01:20:54 +04:00
2007-05-06 22:39:31 +04:00
buflen = 0 ;
2009-07-27 01:20:54 +04:00
2007-05-06 22:39:31 +04:00
again :
len = 0 ;
2009-07-27 01:20:54 +04:00
2007-05-06 22:39:31 +04:00
/* Store the number of array items first */
2019-05-22 17:17:48 +03:00
len + = tdb_pack ( buffer ? buffer + len : NULL ,
buffer ? buflen - len : 0 , " d " ,
2007-05-06 22:39:31 +04:00
num_domains ) ;
/* now pack each domain trust record */
for ( i = 0 ; i < num_domains ; i + + ) {
2018-12-06 20:25:02 +03:00
struct dom_sid_buf tmp ;
2007-12-16 00:00:39 +03:00
2007-05-06 22:39:31 +04:00
if ( buflen > 0 ) {
DEBUG ( 10 , ( " pack_tdc_domains: Packing domain %s (%s) \n " ,
domains [ i ] . domain_name ,
domains [ i ] . dns_name ? domains [ i ] . dns_name : " UNKNOWN " ) ) ;
}
2009-07-27 01:20:54 +04:00
2019-05-22 17:17:48 +03:00
len + = tdb_pack ( buffer ? buffer + len : NULL ,
buffer ? buflen - len : 0 , " fffddd " ,
2007-05-06 22:39:31 +04:00
domains [ i ] . domain_name ,
2013-02-25 12:31:12 +04:00
domains [ i ] . dns_name ? domains [ i ] . dns_name : " " ,
2018-12-06 20:25:02 +03:00
dom_sid_str_buf ( & domains [ i ] . sid , & tmp ) ,
2007-05-06 22:39:31 +04:00
domains [ i ] . trust_flags ,
domains [ i ] . trust_attribs ,
domains [ i ] . trust_type ) ;
}
if ( buflen < len ) {
2007-06-04 23:58:11 +04:00
SAFE_FREE ( buffer ) ;
2007-05-06 22:39:31 +04:00
if ( ( buffer = SMB_MALLOC_ARRAY ( unsigned char , len ) ) = = NULL ) {
DEBUG ( 0 , ( " pack_tdc_domains: failed to alloc buffer! \n " ) ) ;
buflen = - 1 ;
goto done ;
}
buflen = len ;
goto again ;
}
* buf = buffer ;
2009-07-27 01:20:54 +04:00
2007-05-06 22:39:31 +04:00
done :
return buflen ;
}
/*********************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static size_t unpack_tdc_domains ( unsigned char * buf , int buflen ,
struct winbindd_tdc_domain * * domains )
{
fstring domain_name , dns_name , sid_string ;
2015-04-24 05:04:23 +03:00
uint32_t type , attribs , flags ;
2007-05-06 22:39:31 +04:00
int num_domains ;
int len = 0 ;
int i ;
struct winbindd_tdc_domain * list = NULL ;
/* get the number of domains */
len + = tdb_unpack ( buf + len , buflen - len , " d " , & num_domains ) ;
if ( len = = - 1 ) {
DEBUG ( 5 , ( " unpack_tdc_domains: Failed to unpack domain array \n " ) ) ;
return 0 ;
}
2011-06-07 05:30:12 +04:00
list = talloc_array ( NULL , struct winbindd_tdc_domain , num_domains ) ;
2007-05-06 22:39:31 +04:00
if ( ! list ) {
DEBUG ( 0 , ( " unpack_tdc_domains: Failed to talloc() domain list! \n " ) ) ;
return 0 ;
}
2009-07-27 01:20:54 +04:00
2007-05-06 22:39:31 +04:00
for ( i = 0 ; i < num_domains ; i + + ) {
2013-01-11 17:02:52 +04:00
int this_len ;
this_len = tdb_unpack ( buf + len , buflen - len , " fffddd " ,
2007-05-06 22:39:31 +04:00
domain_name ,
dns_name ,
sid_string ,
& flags ,
& attribs ,
& type ) ;
2013-01-11 17:02:52 +04:00
if ( this_len = = - 1 ) {
2007-05-06 22:39:31 +04:00
DEBUG ( 5 , ( " unpack_tdc_domains: Failed to unpack domain array \n " ) ) ;
TALLOC_FREE ( list ) ;
return 0 ;
}
2013-01-11 17:02:52 +04:00
len + = this_len ;
2007-05-06 22:39:31 +04:00
DEBUG ( 11 , ( " unpack_tdc_domains: Unpacking domain %s (%s) "
" SID %s, flags = 0x%x, attribs = 0x%x, type = 0x%x \n " ,
domain_name , dns_name , sid_string ,
flags , attribs , type ) ) ;
2009-07-27 01:20:54 +04:00
2007-05-06 22:39:31 +04:00
list [ i ] . domain_name = talloc_strdup ( list , domain_name ) ;
2013-02-25 12:31:12 +04:00
list [ i ] . dns_name = NULL ;
if ( dns_name [ 0 ] ! = ' \0 ' ) {
list [ i ] . dns_name = talloc_strdup ( list , dns_name ) ;
}
2007-05-06 22:39:31 +04:00
if ( ! string_to_sid ( & ( list [ i ] . sid ) , sid_string ) ) {
DEBUG ( 10 , ( " unpack_tdc_domains: no SID for domain %s \n " ,
domain_name ) ) ;
}
list [ i ] . trust_flags = flags ;
list [ i ] . trust_attribs = attribs ;
list [ i ] . trust_type = type ;
}
* domains = list ;
2009-07-27 01:20:54 +04:00
2007-05-06 22:39:31 +04:00
return num_domains ;
}
/*********************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2007-10-19 04:40:25 +04:00
static bool wcache_tdc_store_list ( struct winbindd_tdc_domain * domains , size_t num_domains )
2007-05-06 22:39:31 +04:00
{
TDB_DATA key = make_tdc_key ( lp_workgroup ( ) ) ;
TDB_DATA data = { NULL , 0 } ;
int ret ;
2009-07-27 01:20:54 +04:00
2007-05-06 22:39:31 +04:00
if ( ! key . dptr )
2008-01-07 13:27:54 +03:00
return false ;
2009-07-27 01:20:54 +04:00
2007-05-06 22:39:31 +04:00
/* See if we were asked to delete the cache entry */
if ( ! domains ) {
ret = tdb_delete ( wcache - > tdb , key ) ;
goto done ;
}
2009-07-27 01:20:54 +04:00
2007-05-06 22:39:31 +04:00
data . dsize = pack_tdc_domains ( domains , num_domains , & data . dptr ) ;
2009-07-27 01:20:54 +04:00
2007-05-06 22:39:31 +04:00
if ( ! data . dptr ) {
ret = - 1 ;
goto done ;
}
2009-07-27 01:20:54 +04:00
2007-05-06 22:39:31 +04:00
ret = tdb_store ( wcache - > tdb , key , data , 0 ) ;
done :
SAFE_FREE ( data . dptr ) ;
SAFE_FREE ( key . dptr ) ;
2009-07-27 01:20:54 +04:00
2011-06-20 13:10:31 +04:00
return ( ret = = 0 ) ;
2007-05-06 22:39:31 +04:00
}
/*********************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2007-10-19 04:40:25 +04:00
bool wcache_tdc_fetch_list ( struct winbindd_tdc_domain * * domains , size_t * num_domains )
2007-05-06 22:39:31 +04:00
{
TDB_DATA key = make_tdc_key ( lp_workgroup ( ) ) ;
TDB_DATA data = { NULL , 0 } ;
* domains = NULL ;
* num_domains = 0 ;
if ( ! key . dptr )
2008-01-07 13:27:54 +03:00
return false ;
2009-07-27 01:20:54 +04:00
2015-03-12 17:23:17 +03:00
data = tdb_fetch ( wcache - > tdb , key ) ;
2007-05-06 22:39:31 +04:00
SAFE_FREE ( key . dptr ) ;
2009-07-27 01:20:54 +04:00
2007-05-06 22:39:31 +04:00
if ( ! data . dptr )
2008-01-07 13:27:54 +03:00
return false ;
2009-07-27 01:20:54 +04:00
2007-05-06 22:39:31 +04:00
* num_domains = unpack_tdc_domains ( data . dptr , data . dsize , domains ) ;
SAFE_FREE ( data . dptr ) ;
2009-07-27 01:20:54 +04:00
2007-05-06 22:39:31 +04:00
if ( ! * domains )
2008-01-07 13:27:54 +03:00
return false ;
2007-05-06 22:39:31 +04:00
2008-01-07 13:27:54 +03:00
return true ;
2007-05-06 22:39:31 +04:00
}
/*********************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2007-10-19 04:40:25 +04:00
bool wcache_tdc_add_domain ( struct winbindd_domain * domain )
2007-05-06 22:39:31 +04:00
{
struct winbindd_tdc_domain * dom_list = NULL ;
size_t num_domains = 0 ;
2008-01-07 13:27:54 +03:00
bool ret = false ;
2018-10-27 23:01:03 +03:00
struct dom_sid_buf buf ;
2007-05-06 22:39:31 +04:00
DEBUG ( 10 , ( " wcache_tdc_add_domain: Adding domain %s (%s), SID %s, "
" flags = 0x%x, attributes = 0x%x, type = 0x%x \n " ,
domain - > name , domain - > alt_name ,
2018-10-27 23:01:03 +03:00
dom_sid_str_buf ( & domain - > sid , & buf ) ,
2007-05-06 22:39:31 +04:00
domain - > domain_flags ,
domain - > domain_trust_attribs ,
domain - > domain_type ) ) ;
2009-07-27 01:20:54 +04:00
2007-05-06 22:39:31 +04:00
if ( ! init_wcache ( ) ) {
2008-01-07 13:27:54 +03:00
return false ;
2007-05-06 22:39:31 +04:00
}
2009-07-27 01:20:54 +04:00
2007-05-06 22:39:31 +04:00
/* fetch the list */
wcache_tdc_fetch_list ( & dom_list , & num_domains ) ;
2009-07-27 01:20:54 +04:00
2007-05-06 22:39:31 +04:00
/* add the new domain */
if ( ! add_wbdomain_to_tdc_array ( domain , & dom_list , & num_domains ) ) {
goto done ;
}
/* pack the domain */
if ( ! wcache_tdc_store_list ( dom_list , num_domains ) ) {
goto done ;
}
2009-07-27 01:20:54 +04:00
2007-05-06 22:39:31 +04:00
/* Success */
2008-01-07 13:27:54 +03:00
ret = true ;
2007-05-06 22:39:31 +04:00
done :
TALLOC_FREE ( dom_list ) ;
2009-07-27 01:20:54 +04:00
2007-05-06 22:39:31 +04:00
return ret ;
}
2013-01-11 17:51:42 +04:00
static struct winbindd_tdc_domain * wcache_tdc_dup_domain (
TALLOC_CTX * mem_ctx , const struct winbindd_tdc_domain * src )
{
struct winbindd_tdc_domain * dst ;
dst = talloc ( mem_ctx , struct winbindd_tdc_domain ) ;
if ( dst = = NULL ) {
goto fail ;
}
dst - > domain_name = talloc_strdup ( dst , src - > domain_name ) ;
if ( dst - > domain_name = = NULL ) {
goto fail ;
}
2013-02-18 19:36:22 +04:00
dst - > dns_name = NULL ;
if ( src - > dns_name ! = NULL ) {
dst - > dns_name = talloc_strdup ( dst , src - > dns_name ) ;
if ( dst - > dns_name = = NULL ) {
goto fail ;
}
2013-01-11 17:51:42 +04:00
}
2013-02-18 19:36:22 +04:00
2013-01-11 17:51:42 +04:00
sid_copy ( & dst - > sid , & src - > sid ) ;
dst - > trust_flags = src - > trust_flags ;
dst - > trust_type = src - > trust_type ;
dst - > trust_attribs = src - > trust_attribs ;
return dst ;
fail :
TALLOC_FREE ( dst ) ;
return NULL ;
}
2007-05-06 22:39:31 +04:00
/*********************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
struct winbindd_tdc_domain * wcache_tdc_fetch_domain ( TALLOC_CTX * ctx , const char * name )
{
struct winbindd_tdc_domain * dom_list = NULL ;
size_t num_domains = 0 ;
2017-07-12 14:30:02 +03:00
size_t i ;
2007-05-06 22:39:31 +04:00
struct winbindd_tdc_domain * d = NULL ;
DEBUG ( 10 , ( " wcache_tdc_fetch_domain: Searching for domain %s \n " , name ) ) ;
if ( ! init_wcache ( ) ) {
2011-12-20 13:25:05 +04:00
return NULL ;
2007-05-06 22:39:31 +04:00
}
2009-07-27 01:20:54 +04:00
2007-05-06 22:39:31 +04:00
/* fetch the list */
wcache_tdc_fetch_list ( & dom_list , & num_domains ) ;
2009-07-27 01:20:54 +04:00
2007-05-06 22:39:31 +04:00
for ( i = 0 ; i < num_domains ; i + + ) {
if ( strequal ( name , dom_list [ i ] . domain_name ) | |
strequal ( name , dom_list [ i ] . dns_name ) )
{
DEBUG ( 10 , ( " wcache_tdc_fetch_domain: Found domain %s \n " ,
name ) ) ;
2009-07-27 01:20:54 +04:00
2013-01-11 17:51:42 +04:00
d = wcache_tdc_dup_domain ( ctx , & dom_list [ i ] ) ;
2007-05-06 22:39:31 +04:00
break ;
}
}
TALLOC_FREE ( dom_list ) ;
2009-07-27 01:20:54 +04:00
2007-05-06 22:39:31 +04:00
return d ;
}
/*********************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
void wcache_tdc_clear ( void )
{
if ( ! init_wcache ( ) )
return ;
wcache_tdc_store_list ( NULL , 0 ) ;
2009-07-27 01:20:54 +04:00
2007-05-06 22:39:31 +04:00
return ;
}
2013-02-18 18:44:20 +04:00
static bool wcache_ndr_key ( TALLOC_CTX * mem_ctx , const char * domain_name ,
2009-08-24 02:13:02 +04:00
uint32_t opnum , const DATA_BLOB * req ,
TDB_DATA * pkey )
{
char * key ;
size_t keylen ;
key = talloc_asprintf ( mem_ctx , " NDR/%s/%d/ " , domain_name , ( int ) opnum ) ;
if ( key = = NULL ) {
return false ;
}
keylen = talloc_get_size ( key ) - 1 ;
key = talloc_realloc ( mem_ctx , key , char , keylen + req - > length ) ;
if ( key = = NULL ) {
return false ;
}
memcpy ( key + keylen , req - > data , req - > length ) ;
pkey - > dptr = ( uint8_t * ) key ;
pkey - > dsize = talloc_get_size ( key ) ;
return true ;
}
2009-08-25 14:25:12 +04:00
static bool wcache_opnum_cacheable ( uint32_t opnum )
{
switch ( opnum ) {
case NDR_WBINT_PING :
case NDR_WBINT_QUERYSEQUENCENUMBER :
2009-08-30 11:41:43 +04:00
case NDR_WBINT_ALLOCATEUID :
2009-08-30 11:46:34 +04:00
case NDR_WBINT_ALLOCATEGID :
2009-10-08 12:35:02 +04:00
case NDR_WBINT_CHECKMACHINEACCOUNT :
2009-10-06 20:26:33 +04:00
case NDR_WBINT_CHANGEMACHINEACCOUNT :
2009-12-23 15:10:55 +03:00
case NDR_WBINT_PINGDC :
2009-08-25 14:25:12 +04:00
return false ;
}
return true ;
}
2009-08-24 02:13:02 +04:00
bool wcache_fetch_ndr ( TALLOC_CTX * mem_ctx , struct winbindd_domain * domain ,
uint32_t opnum , const DATA_BLOB * req , DATA_BLOB * resp )
{
TDB_DATA key , data ;
bool ret = false ;
2010-07-13 17:37:13 +04:00
if ( ! wcache_opnum_cacheable ( opnum ) | |
is_my_own_sam_domain ( domain ) | |
is_builtin_domain ( domain ) ) {
2009-08-25 14:25:12 +04:00
return false ;
}
2009-08-24 02:13:02 +04:00
if ( wcache - > tdb = = NULL ) {
return false ;
}
if ( ! wcache_ndr_key ( talloc_tos ( ) , domain - > name , opnum , req , & key ) ) {
return false ;
}
2015-03-12 17:23:17 +03:00
data = tdb_fetch ( wcache - > tdb , key ) ;
2009-08-24 02:13:02 +04:00
TALLOC_FREE ( key . dptr ) ;
if ( data . dptr = = NULL ) {
return false ;
}
2010-11-04 19:10:25 +03:00
if ( data . dsize < 12 ) {
2009-08-24 02:13:02 +04:00
goto fail ;
}
2017-08-01 17:40:01 +03:00
if ( is_domain_online ( domain ) ) {
2009-08-24 02:13:02 +04:00
uint32_t entry_seqnum , dom_seqnum , last_check ;
2010-11-04 19:10:25 +03:00
uint64_t entry_timeout ;
2009-08-24 02:13:02 +04:00
if ( ! wcache_fetch_seqnum ( domain - > name , & dom_seqnum ,
& last_check ) ) {
goto fail ;
}
entry_seqnum = IVAL ( data . dptr , 0 ) ;
if ( entry_seqnum ! = dom_seqnum ) {
DEBUG ( 10 , ( " Entry has wrong sequence number: %d \n " ,
( int ) entry_seqnum ) ) ;
goto fail ;
}
2010-11-04 19:10:25 +03:00
entry_timeout = BVAL ( data . dptr , 4 ) ;
2017-08-06 19:04:12 +03:00
if ( time ( NULL ) > ( time_t ) entry_timeout ) {
2010-11-04 19:10:25 +03:00
DEBUG ( 10 , ( " Entry has timed out \n " ) ) ;
goto fail ;
}
2009-08-24 02:13:02 +04:00
}
2010-11-04 19:10:25 +03:00
resp - > data = ( uint8_t * ) talloc_memdup ( mem_ctx , data . dptr + 12 ,
data . dsize - 12 ) ;
2009-08-24 02:13:02 +04:00
if ( resp - > data = = NULL ) {
DEBUG ( 10 , ( " talloc failed \n " ) ) ;
goto fail ;
}
2010-11-04 19:10:25 +03:00
resp - > length = data . dsize - 12 ;
2009-08-24 02:13:02 +04:00
ret = true ;
fail :
SAFE_FREE ( data . dptr ) ;
return ret ;
}
void wcache_store_ndr ( struct winbindd_domain * domain , uint32_t opnum ,
const DATA_BLOB * req , const DATA_BLOB * resp )
{
TDB_DATA key , data ;
uint32_t dom_seqnum , last_check ;
2010-11-04 19:10:25 +03:00
uint64_t timeout ;
2009-08-24 02:13:02 +04:00
2010-07-13 17:37:13 +04:00
if ( ! wcache_opnum_cacheable ( opnum ) | |
is_my_own_sam_domain ( domain ) | |
is_builtin_domain ( domain ) ) {
2009-08-25 14:25:12 +04:00
return ;
}
2009-08-24 02:13:02 +04:00
if ( wcache - > tdb = = NULL ) {
return ;
}
if ( ! wcache_fetch_seqnum ( domain - > name , & dom_seqnum , & last_check ) ) {
DEBUG ( 10 , ( " could not fetch seqnum for domain %s \n " ,
domain - > name ) ) ;
return ;
}
if ( ! wcache_ndr_key ( talloc_tos ( ) , domain - > name , opnum , req , & key ) ) {
return ;
}
2010-11-04 19:10:25 +03:00
timeout = time ( NULL ) + lp_winbind_cache_time ( ) ;
data . dsize = resp - > length + 12 ;
2009-08-24 02:13:02 +04:00
data . dptr = talloc_array ( key . dptr , uint8_t , data . dsize ) ;
if ( data . dptr = = NULL ) {
goto done ;
}
SIVAL ( data . dptr , 0 , dom_seqnum ) ;
2010-11-04 19:10:25 +03:00
SBVAL ( data . dptr , 4 , timeout ) ;
memcpy ( data . dptr + 12 , resp - > data , resp - > length ) ;
2009-08-24 02:13:02 +04:00
tdb_store ( wcache - > tdb , key , data , 0 ) ;
done :
TALLOC_FREE ( key . dptr ) ;
return ;
}