2000-07-05 15:24:26 +04:00
/*
2002-01-30 09:08:46 +03:00
Unix SMB / CIFS implementation .
2000-07-05 15:24:26 +04:00
Winbind status program .
2003-08-12 04:46:15 +04:00
Copyright ( C ) Tim Potter 2000 - 2003
2002-01-10 14:28:14 +03:00
Copyright ( C ) Andrew Bartlett 2002
2000-07-05 15:24:26 +04:00
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
2007-07-09 23:25:36 +04:00
the Free Software Foundation ; either version 3 of the License , or
2000-07-05 15:24:26 +04:00
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
2007-07-10 04:52:41 +04:00
along with this program . If not , see < http : //www.gnu.org/licenses/>.
2000-07-05 15:24:26 +04:00
*/
# include "includes.h"
2007-09-14 15:56:10 +04:00
# include "winbind_client.h"
2007-12-21 20:59:56 +03:00
# include "libwbclient/wbclient.h"
2000-07-05 15:24:26 +04:00
2002-07-15 14:35:28 +04:00
# undef DBGC_CLASS
# define DBGC_CLASS DBGC_WINBIND
2002-09-25 19:19:00 +04:00
extern int winbindd_fd ;
2000-07-05 15:24:26 +04:00
2007-10-19 04:40:25 +04:00
static char winbind_separator_int ( bool strict )
2002-01-10 14:28:14 +03:00
{
struct winbindd_response response ;
2007-10-19 04:40:25 +04:00
static bool got_sep ;
2002-03-20 06:54:47 +03:00
static char sep ;
if ( got_sep )
return sep ;
2002-01-10 14:28:14 +03:00
ZERO_STRUCT ( response ) ;
/* Send off request */
2005-06-25 00:25:18 +04:00
if ( winbindd_request_response ( WINBINDD_INFO , NULL , & response ) ! =
2002-01-10 14:28:14 +03:00
NSS_STATUS_SUCCESS ) {
2005-12-21 15:52:04 +03:00
d_fprintf ( stderr , " could not obtain winbind separator! \n " ) ;
2005-11-30 01:46:16 +03:00
if ( strict ) {
2006-01-30 16:32:41 +03:00
return 0 ;
2005-11-30 01:46:16 +03:00
}
2002-02-15 16:28:59 +03:00
/* HACK: (this module should not call lp_ funtions) */
return * lp_winbind_separator ( ) ;
2002-01-10 14:28:14 +03:00
}
2002-03-20 06:54:47 +03:00
sep = response . data . info . winbind_separator ;
2008-02-04 19:25:06 +03:00
got_sep = true ;
2002-01-10 14:28:14 +03:00
2002-03-20 06:54:47 +03:00
if ( ! sep ) {
2005-12-21 15:52:04 +03:00
d_fprintf ( stderr , " winbind separator was NULL! \n " ) ;
2005-11-30 01:46:16 +03:00
if ( strict ) {
2006-01-30 16:32:41 +03:00
return 0 ;
2005-11-30 01:46:16 +03:00
}
2002-02-15 16:28:59 +03:00
/* HACK: (this module should not call lp_ funtions) */
2002-03-20 06:54:47 +03:00
sep = * lp_winbind_separator ( ) ;
2002-01-10 14:28:14 +03:00
}
2002-03-20 06:54:47 +03:00
return sep ;
2002-01-10 14:28:14 +03:00
}
2005-11-30 01:46:16 +03:00
static char winbind_separator ( void )
{
2008-02-04 19:25:06 +03:00
return winbind_separator_int ( false ) ;
2005-11-30 01:46:16 +03:00
}
2002-11-13 02:20:50 +03:00
static const char * get_winbind_domain ( void )
2002-01-26 12:55:38 +03:00
{
2008-02-04 19:23:28 +03:00
wbcErr wbc_status = WBC_ERR_UNKNOWN_FAILURE ;
2007-12-21 20:59:56 +03:00
struct wbcDomainInfo * dinfo = NULL ;
2002-01-26 12:55:38 +03:00
static fstring winbind_domain ;
2007-12-21 20:59:56 +03:00
ZERO_STRUCT ( dinfo ) ;
2008-02-04 19:23:28 +03:00
2007-12-21 20:59:56 +03:00
wbc_status = wbcDomainInfo ( " . " , & dinfo ) ;
2002-01-26 12:55:38 +03:00
2007-12-21 20:59:56 +03:00
if ( ! WBC_ERROR_IS_OK ( wbc_status ) ) {
2005-12-21 15:52:04 +03:00
d_fprintf ( stderr , " could not obtain winbind domain name! \n " ) ;
2008-02-04 19:23:28 +03:00
2002-02-15 16:28:59 +03:00
/* HACK: (this module should not call lp_ funtions) */
return lp_workgroup ( ) ;
2002-01-26 12:55:38 +03:00
}
2008-02-04 19:23:28 +03:00
fstrcpy ( winbind_domain , dinfo - > short_name ) ;
2002-01-26 12:55:38 +03:00
2007-12-21 20:59:56 +03:00
wbcFreeMemory ( dinfo ) ;
2002-01-26 12:55:38 +03:00
2007-12-21 20:59:56 +03:00
return winbind_domain ;
2002-01-26 12:55:38 +03:00
}
2002-01-10 13:23:54 +03:00
/* Copy of parse_domain_user from winbindd_util.c. Parse a string of the
form DOMAIN / user into a domain and a user */
2008-02-04 19:23:28 +03:00
static bool parse_wbinfo_domain_user ( const char * domuser , fstring domain ,
2002-03-20 06:54:47 +03:00
fstring user )
2002-01-10 13:23:54 +03:00
{
2002-01-10 14:28:14 +03:00
2002-03-20 06:54:47 +03:00
char * p = strchr ( domuser , winbind_separator ( ) ) ;
2002-01-10 13:23:54 +03:00
2002-01-18 05:37:55 +03:00
if ( ! p ) {
2007-08-28 00:09:37 +04:00
/* Maybe it was a UPN? */
if ( ( p = strchr ( domuser , ' @ ' ) ) ! = NULL ) {
fstrcpy ( domain , " " ) ;
fstrcpy ( user , domuser ) ;
2008-02-04 19:25:06 +03:00
return true ;
2007-08-28 00:09:37 +04:00
}
2008-02-04 19:23:28 +03:00
2002-01-18 05:37:55 +03:00
fstrcpy ( user , domuser ) ;
2002-01-26 12:55:38 +03:00
fstrcpy ( domain , get_winbind_domain ( ) ) ;
2008-02-04 19:25:06 +03:00
return true ;
2002-01-18 05:37:55 +03:00
}
2008-02-04 19:23:28 +03:00
2002-01-10 13:23:54 +03:00
fstrcpy ( user , p + 1 ) ;
fstrcpy ( domain , domuser ) ;
domain [ PTR_DIFF ( p , domuser ) ] = 0 ;
2003-07-03 23:11:31 +04:00
strupper_m ( domain ) ;
2002-03-20 06:54:47 +03:00
2008-02-04 19:25:06 +03:00
return true ;
2002-01-10 13:23:54 +03:00
}
2006-04-23 15:11:27 +04:00
/* pull pwent info for a given user */
2007-10-19 04:40:25 +04:00
static bool wbinfo_get_userinfo ( char * user )
2006-04-23 15:11:27 +04:00
{
2007-12-21 20:59:56 +03:00
wbcErr wbc_status = WBC_ERR_UNKNOWN_FAILURE ;
2008-02-04 19:23:28 +03:00
struct passwd * pwd = NULL ;
2006-04-23 15:11:27 +04:00
2007-12-21 20:59:56 +03:00
wbc_status = wbcGetpwnam ( user , & pwd ) ;
if ( ! WBC_ERROR_IS_OK ( wbc_status ) ) {
return false ;
}
2008-02-04 19:23:28 +03:00
2007-12-21 20:59:56 +03:00
d_printf ( " %s:%s:%d:%d:%s:%s:%s \n " ,
pwd - > pw_name ,
pwd - > pw_passwd ,
pwd - > pw_uid ,
pwd - > pw_gid ,
pwd - > pw_gecos ,
pwd - > pw_dir ,
pwd - > pw_shell ) ;
2008-02-04 19:23:28 +03:00
2007-12-21 20:59:56 +03:00
return true ;
2006-04-23 15:11:27 +04:00
}
2007-08-12 21:36:42 +04:00
/* pull pwent info for a given uid */
2007-10-19 04:40:25 +04:00
static bool wbinfo_get_uidinfo ( int uid )
2007-08-12 21:36:42 +04:00
{
2007-12-21 20:59:56 +03:00
wbcErr wbc_status = WBC_ERR_UNKNOWN_FAILURE ;
2008-02-04 19:23:28 +03:00
struct passwd * pwd = NULL ;
2007-08-12 21:36:42 +04:00
2007-12-21 20:59:56 +03:00
wbc_status = wbcGetpwuid ( uid , & pwd ) ;
if ( ! WBC_ERROR_IS_OK ( wbc_status ) ) {
return false ;
}
2008-02-04 19:23:28 +03:00
2007-12-21 20:59:56 +03:00
d_printf ( " %s:%s:%d:%d:%s:%s:%s \n " ,
pwd - > pw_name ,
pwd - > pw_passwd ,
pwd - > pw_uid ,
pwd - > pw_gid ,
pwd - > pw_gecos ,
pwd - > pw_dir ,
pwd - > pw_shell ) ;
2008-02-04 19:23:28 +03:00
2007-12-21 20:59:56 +03:00
return true ;
2007-08-12 21:36:42 +04:00
}
2006-07-11 22:01:26 +04:00
/* pull grent for a given group */
2007-10-19 04:40:25 +04:00
static bool wbinfo_get_groupinfo ( char * group )
2006-07-11 22:01:26 +04:00
{
struct winbindd_request request ;
struct winbindd_response response ;
NSS_STATUS result ;
ZERO_STRUCT ( request ) ;
ZERO_STRUCT ( response ) ;
/* Send request */
fstrcpy ( request . data . groupname , group ) ;
result = winbindd_request_response ( WINBINDD_GETGRNAM , & request ,
& response ) ;
if ( result ! = NSS_STATUS_SUCCESS )
2008-02-04 19:25:06 +03:00
return false ;
2006-07-11 22:01:26 +04:00
2008-02-04 19:23:28 +03:00
d_printf ( " %s:%s:%d \n " ,
2006-07-11 22:01:26 +04:00
response . data . gr . gr_name ,
response . data . gr . gr_passwd ,
response . data . gr . gr_gid ) ;
2008-02-04 19:23:28 +03:00
2008-02-04 19:25:06 +03:00
return true ;
2006-07-11 22:01:26 +04:00
}
2000-10-13 09:19:57 +04:00
/* List groups a user is a member of */
2007-10-19 04:40:25 +04:00
static bool wbinfo_get_usergroups ( char * user )
2000-10-11 09:25:32 +04:00
{
struct winbindd_request request ;
struct winbindd_response response ;
2001-09-05 11:55:54 +04:00
NSS_STATUS result ;
int i ;
2008-02-04 19:23:28 +03:00
2005-10-24 20:55:26 +04:00
ZERO_STRUCT ( request ) ;
2000-10-11 09:25:32 +04:00
ZERO_STRUCT ( response ) ;
/* Send request */
fstrcpy ( request . data . username , user ) ;
2005-06-25 00:25:18 +04:00
result = winbindd_request_response ( WINBINDD_GETGROUPS , & request , & response ) ;
2000-10-11 09:25:32 +04:00
2002-01-11 06:49:51 +03:00
if ( result ! = NSS_STATUS_SUCCESS )
2008-02-04 19:25:06 +03:00
return false ;
2000-10-11 09:25:32 +04:00
2002-01-11 06:49:51 +03:00
for ( i = 0 ; i < response . data . num_entries ; i + + )
2006-04-12 18:10:39 +04:00
d_printf ( " %d \n " , ( int ) ( ( gid_t * ) response . extra_data . data ) [ i ] ) ;
2002-01-11 06:49:51 +03:00
2006-04-12 18:10:39 +04:00
SAFE_FREE ( response . extra_data . data ) ;
2000-10-11 09:25:32 +04:00
2008-02-04 19:25:06 +03:00
return true ;
2000-10-11 09:25:32 +04:00
}
2003-11-19 11:11:14 +03:00
/* List group SIDs a user SID is a member of */
2008-03-24 00:41:45 +03:00
static bool wbinfo_get_usersids ( const char * user_sid_str )
2003-11-19 11:11:14 +03:00
{
2008-03-24 00:41:45 +03:00
wbcErr wbc_status = WBC_ERR_UNKNOWN_FAILURE ;
uint32_t num_sids ;
uint32_t i ;
struct wbcDomainSid user_sid , * sids = NULL ;
2003-11-19 11:11:14 +03:00
/* Send request */
2008-03-24 00:41:45 +03:00
wbc_status = wbcStringToSid ( user_sid_str , & user_sid ) ;
if ( ! WBC_ERROR_IS_OK ( wbc_status ) ) {
return false ;
}
2003-11-19 11:11:14 +03:00
2008-03-24 00:41:45 +03:00
wbc_status = wbcLookupUserSids ( & user_sid , false , & num_sids , & sids ) ;
if ( ! WBC_ERROR_IS_OK ( wbc_status ) ) {
2008-02-04 19:25:06 +03:00
return false ;
2008-03-24 00:41:45 +03:00
}
2003-11-19 11:11:14 +03:00
2008-03-24 00:41:45 +03:00
for ( i = 0 ; i < num_sids ; i + + ) {
char * str = NULL ;
wbc_status = wbcSidToString ( & sids [ i ] , & str ) ;
if ( ! WBC_ERROR_IS_OK ( wbc_status ) ) {
wbcFreeMemory ( sids ) ;
return false ;
}
d_printf ( " %s \n " , str ) ;
wbcFreeMemory ( str ) ;
2003-11-19 11:11:14 +03:00
}
2008-03-24 00:41:45 +03:00
wbcFreeMemory ( sids ) ;
2003-11-19 11:11:14 +03:00
2008-02-04 19:25:06 +03:00
return true ;
2003-11-19 11:11:14 +03:00
}
2008-03-24 00:41:45 +03:00
static bool wbinfo_get_userdomgroups ( const char * user_sid_str )
2005-06-09 02:10:34 +04:00
{
2008-03-24 00:41:45 +03:00
wbcErr wbc_status = WBC_ERR_UNKNOWN_FAILURE ;
uint32_t num_sids ;
uint32_t i ;
struct wbcDomainSid user_sid , * sids = NULL ;
2005-06-09 02:10:34 +04:00
/* Send request */
2008-03-24 00:41:45 +03:00
wbc_status = wbcStringToSid ( user_sid_str , & user_sid ) ;
if ( ! WBC_ERROR_IS_OK ( wbc_status ) ) {
return false ;
}
2005-06-09 02:10:34 +04:00
2008-03-24 00:41:45 +03:00
wbc_status = wbcLookupUserSids ( & user_sid , true , & num_sids , & sids ) ;
if ( ! WBC_ERROR_IS_OK ( wbc_status ) ) {
2008-02-04 19:25:06 +03:00
return false ;
2008-03-24 00:41:45 +03:00
}
2005-06-09 02:10:34 +04:00
2008-03-24 00:41:45 +03:00
for ( i = 0 ; i < num_sids ; i + + ) {
char * str = NULL ;
wbc_status = wbcSidToString ( & sids [ i ] , & str ) ;
if ( ! WBC_ERROR_IS_OK ( wbc_status ) ) {
wbcFreeMemory ( sids ) ;
return false ;
}
d_printf ( " %s \n " , str ) ;
wbcFreeMemory ( str ) ;
}
2008-02-04 19:23:28 +03:00
2008-03-24 00:41:45 +03:00
wbcFreeMemory ( sids ) ;
2005-06-09 02:10:34 +04:00
2008-02-04 19:25:06 +03:00
return true ;
2005-06-09 02:10:34 +04:00
}
2002-03-29 18:37:39 +03:00
/* Convert NetBIOS name to IP */
2007-10-19 04:40:25 +04:00
static bool wbinfo_wins_byname ( char * name )
2002-03-29 18:37:39 +03:00
{
struct winbindd_request request ;
struct winbindd_response response ;
ZERO_STRUCT ( request ) ;
ZERO_STRUCT ( response ) ;
/* Send request */
fstrcpy ( request . data . winsreq , name ) ;
2005-06-25 00:25:18 +04:00
if ( winbindd_request_response ( WINBINDD_WINS_BYNAME , & request , & response ) ! =
2002-03-29 18:37:39 +03:00
NSS_STATUS_SUCCESS ) {
2008-02-04 19:25:06 +03:00
return false ;
2002-03-29 18:37:39 +03:00
}
/* Display response */
2005-12-21 15:52:04 +03:00
d_printf ( " %s \n " , response . data . winsresp ) ;
2002-03-29 18:37:39 +03:00
2008-02-04 19:25:06 +03:00
return true ;
2002-03-29 18:37:39 +03:00
}
/* Convert IP to NetBIOS name */
2007-10-19 04:40:25 +04:00
static bool wbinfo_wins_byip ( char * ip )
2002-03-29 18:37:39 +03:00
{
struct winbindd_request request ;
struct winbindd_response response ;
ZERO_STRUCT ( request ) ;
ZERO_STRUCT ( response ) ;
/* Send request */
fstrcpy ( request . data . winsreq , ip ) ;
2005-06-25 00:25:18 +04:00
if ( winbindd_request_response ( WINBINDD_WINS_BYIP , & request , & response ) ! =
2002-03-29 18:37:39 +03:00
NSS_STATUS_SUCCESS ) {
2008-02-04 19:25:06 +03:00
return false ;
2002-03-29 18:37:39 +03:00
}
/* Display response */
2005-12-21 15:52:04 +03:00
d_printf ( " %s \n " , response . data . winsresp ) ;
2002-03-29 18:37:39 +03:00
2008-02-04 19:25:06 +03:00
return true ;
2002-03-29 18:37:39 +03:00
}
2000-07-05 15:24:26 +04:00
/* List trusted domains */
2007-10-19 04:40:25 +04:00
static bool wbinfo_list_domains ( bool list_all_domains )
2000-07-05 15:24:26 +04:00
{
2006-02-04 01:19:41 +03:00
struct winbindd_request request ;
2000-07-05 15:24:26 +04:00
struct winbindd_response response ;
2006-02-04 01:19:41 +03:00
ZERO_STRUCT ( request ) ;
2000-07-05 15:24:26 +04:00
ZERO_STRUCT ( response ) ;
/* Send request */
2006-02-04 01:19:41 +03:00
request . data . list_all_domains = list_all_domains ;
if ( winbindd_request_response ( WINBINDD_LIST_TRUSTDOM , & request , & response ) ! =
2002-03-20 06:54:47 +03:00
NSS_STATUS_SUCCESS )
2008-02-04 19:25:06 +03:00
return false ;
2000-07-05 15:24:26 +04:00
/* Display response */
2006-04-12 18:10:39 +04:00
if ( response . extra_data . data ) {
const char * extra_data = ( char * ) response . extra_data . data ;
2007-12-08 04:32:32 +03:00
char * name ;
2005-06-09 02:10:34 +04:00
char * p ;
2007-12-08 04:32:32 +03:00
TALLOC_CTX * frame = talloc_stackframe ( ) ;
2005-06-09 02:10:34 +04:00
2007-12-08 04:32:32 +03:00
while ( next_token_talloc ( frame , & extra_data , & name , " \n " ) ) {
2005-06-09 02:10:34 +04:00
p = strchr ( name , ' \\ ' ) ;
if ( p = = 0 ) {
2005-12-21 15:52:04 +03:00
d_fprintf ( stderr , " Got invalid response: %s \n " ,
2005-06-09 02:10:34 +04:00
extra_data ) ;
2007-12-08 04:32:32 +03:00
TALLOC_FREE ( frame ) ;
SAFE_FREE ( response . extra_data . data ) ;
2008-02-04 19:25:06 +03:00
return false ;
2005-06-09 02:10:34 +04:00
}
* p = 0 ;
2002-03-01 04:13:42 +03:00
d_printf ( " %s \n " , name ) ;
2005-06-09 02:10:34 +04:00
}
2007-12-08 04:32:32 +03:00
TALLOC_FREE ( frame ) ;
2006-04-12 18:10:39 +04:00
SAFE_FREE ( response . extra_data . data ) ;
2000-07-05 15:24:26 +04:00
}
2008-02-04 19:25:06 +03:00
return true ;
2000-07-05 15:24:26 +04:00
}
2006-05-31 21:15:33 +04:00
/* List own domain */
2007-10-19 04:40:25 +04:00
static bool wbinfo_list_own_domain ( void )
2006-05-31 21:15:33 +04:00
{
d_printf ( " %s \n " , get_winbind_domain ( ) ) ;
2008-02-04 19:25:06 +03:00
return true ;
2006-05-31 21:15:33 +04:00
}
2002-01-31 14:49:29 +03:00
/* show sequence numbers */
2007-10-19 04:40:25 +04:00
static bool wbinfo_show_sequence ( const char * domain )
2002-01-31 14:49:29 +03:00
{
2003-08-11 02:01:11 +04:00
struct winbindd_request request ;
2002-01-31 14:49:29 +03:00
struct winbindd_response response ;
ZERO_STRUCT ( response ) ;
2003-08-11 02:01:11 +04:00
ZERO_STRUCT ( request ) ;
if ( domain )
fstrcpy ( request . domain_name , domain ) ;
2002-01-31 14:49:29 +03:00
/* Send request */
2002-03-20 06:54:47 +03:00
2005-06-25 00:25:18 +04:00
if ( winbindd_request_response ( WINBINDD_SHOW_SEQUENCE , & request , & response ) ! =
2002-03-20 06:54:47 +03:00
NSS_STATUS_SUCCESS )
2008-02-04 19:25:06 +03:00
return false ;
2002-01-31 14:49:29 +03:00
/* Display response */
2002-03-20 06:54:47 +03:00
2007-10-01 19:35:05 +04:00
if ( domain ) {
d_printf ( " %s : " , domain ) ;
if ( response . data . sequence_number = = ( uint32_t ) - 1 ) {
d_printf ( " DISCONNECTED \n " ) ;
} else {
d_printf ( " %d \n " , response . data . sequence_number ) ;
}
} else if ( response . extra_data . data ) {
2006-04-12 18:10:39 +04:00
char * extra_data = ( char * ) response . extra_data . data ;
2002-03-01 04:13:42 +03:00
d_printf ( " %s " , extra_data ) ;
2006-04-12 18:10:39 +04:00
SAFE_FREE ( response . extra_data . data ) ;
2002-01-31 14:49:29 +03:00
}
2008-02-04 19:25:06 +03:00
return true ;
2002-01-31 14:49:29 +03:00
}
2004-01-04 14:51:31 +03:00
/* Show domain info */
2007-10-19 04:40:25 +04:00
static bool wbinfo_domain_info ( const char * domain_name )
2004-01-04 14:51:31 +03:00
{
struct winbindd_request request ;
struct winbindd_response response ;
ZERO_STRUCT ( request ) ;
ZERO_STRUCT ( response ) ;
2006-07-05 19:29:31 +04:00
if ( ( strequal ( domain_name , " . " ) ) | | ( domain_name [ 0 ] = = ' \0 ' ) )
fstrcpy ( request . domain_name , get_winbind_domain ( ) ) ;
else
fstrcpy ( request . domain_name , domain_name ) ;
2004-01-04 14:51:31 +03:00
/* Send request */
2005-06-25 00:25:18 +04:00
if ( winbindd_request_response ( WINBINDD_DOMAIN_INFO , & request , & response ) ! =
2004-01-04 14:51:31 +03:00
NSS_STATUS_SUCCESS )
2008-02-04 19:25:06 +03:00
return false ;
2004-01-04 14:51:31 +03:00
/* Display response */
2004-01-08 11:19:18 +03:00
d_printf ( " Name : %s \n " , response . data . domain_info . name ) ;
d_printf ( " Alt_Name : %s \n " , response . data . domain_info . alt_name ) ;
2004-01-04 14:51:31 +03:00
2004-01-08 11:19:18 +03:00
d_printf ( " SID : %s \n " , response . data . domain_info . sid ) ;
2004-01-04 14:51:31 +03:00
2004-01-08 11:19:18 +03:00
d_printf ( " Active Directory : %s \n " ,
response . data . domain_info . active_directory ? " Yes " : " No " ) ;
d_printf ( " Native : %s \n " ,
2004-01-04 14:51:31 +03:00
response . data . domain_info . native_mode ? " Yes " : " No " ) ;
2004-01-08 11:19:18 +03:00
d_printf ( " Primary : %s \n " ,
2004-01-04 14:51:31 +03:00
response . data . domain_info . primary ? " Yes " : " No " ) ;
2008-02-04 19:25:06 +03:00
return true ;
2004-01-04 14:51:31 +03:00
}
2005-06-09 02:10:34 +04:00
/* Get a foreign DC's name */
2007-10-19 04:40:25 +04:00
static bool wbinfo_getdcname ( const char * domain_name )
2005-06-09 02:10:34 +04:00
{
struct winbindd_request request ;
struct winbindd_response response ;
ZERO_STRUCT ( request ) ;
ZERO_STRUCT ( response ) ;
fstrcpy ( request . domain_name , domain_name ) ;
/* Send request */
2005-06-25 00:25:18 +04:00
if ( winbindd_request_response ( WINBINDD_GETDCNAME , & request , & response ) ! =
2005-06-09 02:10:34 +04:00
NSS_STATUS_SUCCESS ) {
2005-12-21 15:52:04 +03:00
d_fprintf ( stderr , " Could not get dc name for %s \n " , domain_name ) ;
2008-02-04 19:25:06 +03:00
return false ;
2005-06-09 02:10:34 +04:00
}
/* Display response */
d_printf ( " %s \n " , response . data . dc_name ) ;
2008-02-04 19:25:06 +03:00
return true ;
2005-06-09 02:10:34 +04:00
}
2007-08-28 19:20:54 +04:00
/* Find a DC */
2007-10-19 04:40:25 +04:00
static bool wbinfo_dsgetdcname ( const char * domain_name , uint32_t flags )
2007-08-28 19:20:54 +04:00
{
struct winbindd_request request ;
struct winbindd_response response ;
ZERO_STRUCT ( request ) ;
ZERO_STRUCT ( response ) ;
fstrcpy ( request . domain_name , domain_name ) ;
request . flags = flags ;
request . flags | = DS_DIRECTORY_SERVICE_REQUIRED ;
/* Send request */
if ( winbindd_request_response ( WINBINDD_DSGETDCNAME , & request , & response ) ! =
NSS_STATUS_SUCCESS ) {
d_fprintf ( stderr , " Could not find dc for %s \n " , domain_name ) ;
2008-02-04 19:25:06 +03:00
return false ;
2007-08-28 19:20:54 +04:00
}
/* Display response */
d_printf ( " %s \n " , response . data . dc_name ) ;
2008-02-04 19:25:06 +03:00
return true ;
2007-08-28 19:20:54 +04:00
}
2000-07-05 15:24:26 +04:00
/* Check trust account password */
2007-10-19 04:40:25 +04:00
static bool wbinfo_check_secret ( void )
2000-07-05 15:24:26 +04:00
{
2008-02-04 19:23:28 +03:00
struct winbindd_response response ;
NSS_STATUS result ;
2000-10-13 09:19:57 +04:00
2008-02-04 19:23:28 +03:00
ZERO_STRUCT ( response ) ;
2000-10-13 09:19:57 +04:00
2008-02-04 19:23:28 +03:00
result = winbindd_request_response ( WINBINDD_CHECK_MACHACC , NULL , & response ) ;
d_printf ( " checking the trust secret via RPC calls %s \n " ,
2002-07-15 14:35:28 +04:00
( result = = NSS_STATUS_SUCCESS ) ? " succeeded " : " failed " ) ;
2000-10-13 09:19:57 +04:00
2008-02-04 19:23:28 +03:00
if ( result ! = NSS_STATUS_SUCCESS )
d_fprintf ( stderr , " error code was %s (0x%x) \n " ,
response . data . auth . nt_status_string ,
2002-07-15 14:35:28 +04:00
response . data . auth . nt_status ) ;
2008-02-04 19:23:28 +03:00
2002-07-15 14:35:28 +04:00
return result = = NSS_STATUS_SUCCESS ;
2000-07-05 15:24:26 +04:00
}
/* Convert uid to sid */
2007-10-19 04:40:25 +04:00
static bool wbinfo_uid_to_sid ( uid_t uid )
2000-07-05 15:24:26 +04:00
{
struct winbindd_request request ;
struct winbindd_response response ;
ZERO_STRUCT ( request ) ;
ZERO_STRUCT ( response ) ;
/* Send request */
request . data . uid = uid ;
2002-03-20 06:54:47 +03:00
2005-06-25 00:25:18 +04:00
if ( winbindd_request_response ( WINBINDD_UID_TO_SID , & request , & response ) ! =
2002-03-20 06:54:47 +03:00
NSS_STATUS_SUCCESS )
2008-02-04 19:25:06 +03:00
return false ;
2000-07-05 15:24:26 +04:00
/* Display response */
2002-03-01 04:13:42 +03:00
d_printf ( " %s \n " , response . data . sid . sid ) ;
2000-07-05 15:24:26 +04:00
2008-02-04 19:25:06 +03:00
return true ;
2000-07-05 15:24:26 +04:00
}
/* Convert gid to sid */
2007-10-19 04:40:25 +04:00
static bool wbinfo_gid_to_sid ( gid_t gid )
2000-07-05 15:24:26 +04:00
{
struct winbindd_request request ;
struct winbindd_response response ;
ZERO_STRUCT ( request ) ;
ZERO_STRUCT ( response ) ;
/* Send request */
request . data . gid = gid ;
2002-03-20 06:54:47 +03:00
2005-06-25 00:25:18 +04:00
if ( winbindd_request_response ( WINBINDD_GID_TO_SID , & request , & response ) ! =
2002-03-20 06:54:47 +03:00
NSS_STATUS_SUCCESS )
2008-02-04 19:25:06 +03:00
return false ;
2000-07-05 15:24:26 +04:00
/* Display response */
2002-03-01 04:13:42 +03:00
d_printf ( " %s \n " , response . data . sid . sid ) ;
2000-07-05 15:24:26 +04:00
2008-02-04 19:25:06 +03:00
return true ;
2000-07-05 15:24:26 +04:00
}
/* Convert sid to uid */
2007-10-19 04:40:25 +04:00
static bool wbinfo_sid_to_uid ( char * sid )
2000-07-05 15:24:26 +04:00
{
struct winbindd_request request ;
struct winbindd_response response ;
ZERO_STRUCT ( request ) ;
ZERO_STRUCT ( response ) ;
/* Send request */
fstrcpy ( request . data . sid , sid ) ;
2002-03-20 06:54:47 +03:00
2005-06-25 00:25:18 +04:00
if ( winbindd_request_response ( WINBINDD_SID_TO_UID , & request , & response ) ! =
2002-03-20 06:54:47 +03:00
NSS_STATUS_SUCCESS )
2008-02-04 19:25:06 +03:00
return false ;
2000-07-05 15:24:26 +04:00
/* Display response */
2002-03-01 04:13:42 +03:00
d_printf ( " %d \n " , ( int ) response . data . uid ) ;
2000-07-05 15:24:26 +04:00
2008-02-04 19:25:06 +03:00
return true ;
2000-07-05 15:24:26 +04:00
}
2007-10-19 04:40:25 +04:00
static bool wbinfo_sid_to_gid ( char * sid )
2000-07-05 15:24:26 +04:00
{
struct winbindd_request request ;
struct winbindd_response response ;
ZERO_STRUCT ( request ) ;
ZERO_STRUCT ( response ) ;
/* Send request */
fstrcpy ( request . data . sid , sid ) ;
2002-03-20 06:54:47 +03:00
2005-06-25 00:25:18 +04:00
if ( winbindd_request_response ( WINBINDD_SID_TO_GID , & request , & response ) ! =
2002-03-20 06:54:47 +03:00
NSS_STATUS_SUCCESS )
2008-02-04 19:25:06 +03:00
return false ;
2000-07-05 15:24:26 +04:00
/* Display response */
2002-03-01 04:13:42 +03:00
d_printf ( " %d \n " , ( int ) response . data . gid ) ;
2000-07-05 15:24:26 +04:00
2008-02-04 19:25:06 +03:00
return true ;
2000-07-05 15:24:26 +04:00
}
2007-10-19 04:40:25 +04:00
static bool wbinfo_allocate_uid ( void )
2004-04-07 16:43:44 +04:00
{
2006-02-04 01:19:41 +03:00
uid_t uid ;
2004-04-07 16:43:44 +04:00
2006-02-04 01:19:41 +03:00
if ( ! winbind_allocate_uid ( & uid ) )
2008-02-04 19:25:06 +03:00
return false ;
2004-04-07 16:43:44 +04:00
2006-02-04 01:19:41 +03:00
d_printf ( " New uid: %d \n " , uid ) ;
2008-02-04 19:25:06 +03:00
return true ;
2006-02-04 01:19:41 +03:00
}
2007-10-19 04:40:25 +04:00
static bool wbinfo_allocate_gid ( void )
2006-02-04 01:19:41 +03:00
{
gid_t gid ;
if ( ! winbind_allocate_gid ( & gid ) )
2008-02-04 19:25:06 +03:00
return false ;
2006-02-04 01:19:41 +03:00
d_printf ( " New gid: %d \n " , gid ) ;
2004-04-07 16:43:44 +04:00
2008-02-04 19:25:06 +03:00
return true ;
2004-04-07 16:43:44 +04:00
}
2000-07-05 15:24:26 +04:00
/* Convert sid to string */
2007-10-19 04:40:25 +04:00
static bool wbinfo_lookupsid ( char * sid )
2000-07-05 15:24:26 +04:00
{
struct winbindd_request request ;
struct winbindd_response response ;
ZERO_STRUCT ( request ) ;
ZERO_STRUCT ( response ) ;
/* Send off request */
fstrcpy ( request . data . sid , sid ) ;
2002-03-20 06:54:47 +03:00
2005-06-25 00:25:18 +04:00
if ( winbindd_request_response ( WINBINDD_LOOKUPSID , & request , & response ) ! =
2002-03-20 06:54:47 +03:00
NSS_STATUS_SUCCESS )
2008-02-04 19:25:06 +03:00
return false ;
2000-07-05 15:24:26 +04:00
/* Display response */
2008-02-04 19:23:28 +03:00
d_printf ( " %s%c%s %d \n " , response . data . name . dom_name ,
winbind_separator ( ) , response . data . name . name ,
2002-03-20 06:54:47 +03:00
response . data . name . type ) ;
2000-07-05 15:24:26 +04:00
2008-02-04 19:25:06 +03:00
return true ;
2000-07-05 15:24:26 +04:00
}
2006-07-11 22:01:26 +04:00
/* Lookup a list of RIDs */
2007-10-19 04:40:25 +04:00
static bool wbinfo_lookuprids ( char * domain , char * arg )
2006-07-11 22:01:26 +04:00
{
size_t i ;
DOM_SID sid ;
int num_rids ;
uint32 * rids ;
const char * p ;
2007-12-08 04:32:32 +03:00
char * ridstr ;
2006-07-11 22:01:26 +04:00
const char * * names ;
2006-09-08 18:28:06 +04:00
enum lsa_SidType * types ;
2006-07-11 22:01:26 +04:00
const char * domain_name ;
TALLOC_CTX * mem_ctx ;
2007-02-16 22:49:12 +03:00
struct winbindd_request request ;
struct winbindd_response response ;
2007-02-16 23:27:30 +03:00
ZERO_STRUCT ( request ) ;
ZERO_STRUCT ( response ) ;
2007-02-16 22:49:12 +03:00
if ( ( domain = = NULL ) | | ( strequal ( domain , " . " ) ) | | ( domain [ 0 ] = = ' \0 ' ) )
fstrcpy ( request . domain_name , get_winbind_domain ( ) ) ;
else
fstrcpy ( request . domain_name , domain ) ;
/* Send request */
if ( winbindd_request_response ( WINBINDD_DOMAIN_INFO , & request , & response ) ! =
NSS_STATUS_SUCCESS ) {
d_printf ( " Could not get domain sid for %s \n " , request . domain_name ) ;
2008-02-04 19:25:06 +03:00
return false ;
2007-02-16 22:49:12 +03:00
}
2006-07-11 22:01:26 +04:00
2007-02-16 22:49:12 +03:00
if ( ! string_to_sid ( & sid , response . data . domain_info . sid ) ) {
d_printf ( " Could not convert %s to sid \n " , response . data . domain_info . sid ) ;
2008-02-04 19:25:06 +03:00
return false ;
2006-07-11 22:01:26 +04:00
}
mem_ctx = talloc_new ( NULL ) ;
if ( mem_ctx = = NULL ) {
d_printf ( " talloc_new failed \n " ) ;
2008-02-04 19:25:06 +03:00
return false ;
2006-07-11 22:01:26 +04:00
}
num_rids = 0 ;
rids = NULL ;
p = arg ;
2007-12-08 04:32:32 +03:00
while ( next_token_talloc ( mem_ctx , & p , & ridstr , " , \n " ) ) {
2006-07-11 22:01:26 +04:00
uint32 rid = strtoul ( ridstr , NULL , 10 ) ;
ADD_TO_ARRAY ( mem_ctx , uint32 , rid , & rids , & num_rids ) ;
}
if ( rids = = NULL ) {
TALLOC_FREE ( mem_ctx ) ;
2008-02-04 19:25:06 +03:00
return false ;
2006-07-11 22:01:26 +04:00
}
if ( ! winbind_lookup_rids ( mem_ctx , & sid , num_rids , rids ,
& domain_name , & names , & types ) ) {
d_printf ( " winbind_lookup_rids failed \n " ) ;
TALLOC_FREE ( mem_ctx ) ;
2008-02-04 19:25:06 +03:00
return false ;
2006-07-11 22:01:26 +04:00
}
d_printf ( " Domain: %s \n " , domain_name ) ;
for ( i = 0 ; i < num_rids ; i + + ) {
d_printf ( " %8d: %s (%s) \n " , rids [ i ] , names [ i ] ,
sid_type_lookup ( types [ i ] ) ) ;
}
TALLOC_FREE ( mem_ctx ) ;
2008-02-04 19:25:06 +03:00
return true ;
2006-07-11 22:01:26 +04:00
}
2000-07-05 15:24:26 +04:00
/* Convert string to sid */
2007-10-19 04:40:25 +04:00
static bool wbinfo_lookupname ( char * name )
2000-07-05 15:24:26 +04:00
{
struct winbindd_request request ;
struct winbindd_response response ;
/* Send off request */
ZERO_STRUCT ( request ) ;
ZERO_STRUCT ( response ) ;
2008-02-04 19:23:28 +03:00
parse_wbinfo_domain_user ( name , request . data . name . dom_name ,
2002-03-20 06:54:47 +03:00
request . data . name . name ) ;
2002-01-26 12:55:38 +03:00
2005-06-25 00:25:18 +04:00
if ( winbindd_request_response ( WINBINDD_LOOKUPNAME , & request , & response ) ! =
2002-03-20 06:54:47 +03:00
NSS_STATUS_SUCCESS )
2008-02-04 19:25:06 +03:00
return false ;
2000-07-05 15:24:26 +04:00
/* Display response */
2004-01-05 07:26:35 +03:00
d_printf ( " %s %s (%d) \n " , response . data . sid . sid , sid_type_lookup ( response . data . sid . type ) , response . data . sid . type ) ;
2000-07-05 15:24:26 +04:00
2008-02-04 19:25:06 +03:00
return true ;
2000-07-05 15:24:26 +04:00
}
2001-08-22 06:48:16 +04:00
/* Authenticate a user with a plaintext password */
2007-10-19 04:40:25 +04:00
static bool wbinfo_auth_krb5 ( char * username , const char * cctype , uint32 flags )
2006-02-04 01:19:41 +03:00
{
struct winbindd_request request ;
struct winbindd_response response ;
NSS_STATUS result ;
char * p ;
/* Send off request */
ZERO_STRUCT ( request ) ;
ZERO_STRUCT ( response ) ;
p = strchr ( username , ' % ' ) ;
if ( p ) {
* p = 0 ;
fstrcpy ( request . data . auth . user , username ) ;
fstrcpy ( request . data . auth . pass , p + 1 ) ;
* p = ' % ' ;
} else
fstrcpy ( request . data . auth . user , username ) ;
request . flags = flags ;
fstrcpy ( request . data . auth . krb5_cc_type , cctype ) ;
request . data . auth . uid = geteuid ( ) ;
result = winbindd_request_response ( WINBINDD_PAM_AUTH , & request , & response ) ;
/* Display response */
d_printf ( " plaintext kerberos password authentication for [%s] %s (requesting cctype: %s) \n " ,
username , ( result = = NSS_STATUS_SUCCESS ) ? " succeeded " : " failed " , cctype ) ;
if ( response . data . auth . nt_status )
d_fprintf ( stderr , " error code was %s (0x%x) \n error messsage was: %s \n " ,
response . data . auth . nt_status_string ,
response . data . auth . nt_status ,
response . data . auth . error_string ) ;
if ( result = = NSS_STATUS_SUCCESS ) {
if ( request . flags & WBFLAG_PAM_INFO3_TEXT ) {
2008-01-17 12:24:34 +03:00
if ( response . data . auth . info3 . user_flgs & NETLOGON_CACHED_ACCOUNT ) {
d_printf ( " user_flgs: NETLOGON_CACHED_ACCOUNT \n " ) ;
2006-02-04 01:19:41 +03:00
}
}
if ( response . data . auth . krb5ccname [ 0 ] ! = ' \0 ' ) {
d_printf ( " credentials were put in: %s \n " , response . data . auth . krb5ccname ) ;
} else {
d_printf ( " no credentials cached \n " ) ;
}
}
return result = = NSS_STATUS_SUCCESS ;
}
/* Authenticate a user with a plaintext password */
2007-10-19 04:40:25 +04:00
static bool wbinfo_auth ( char * username )
2001-08-22 06:48:16 +04:00
{
2007-12-21 20:59:56 +03:00
wbcErr wbc_status = WBC_ERR_UNKNOWN_FAILURE ;
2008-02-04 19:23:28 +03:00
char * s = NULL ;
char * p = NULL ;
2008-02-05 11:37:32 +03:00
const char * password = NULL ;
2008-02-04 19:23:28 +03:00
char * name = NULL ;
2007-12-21 20:59:56 +03:00
if ( ( s = SMB_STRDUP ( username ) ) = = NULL ) {
return false ;
}
2001-08-22 06:48:16 +04:00
2007-12-21 20:59:56 +03:00
if ( ( p = strchr ( s , ' % ' ) ) ! = NULL ) {
2008-02-04 19:23:28 +03:00
* p = 0 ;
2007-12-21 20:59:56 +03:00
p + + ;
2008-02-04 19:07:54 +03:00
password = p ;
} else {
password = " " ;
2007-12-21 20:59:56 +03:00
}
2001-08-22 06:48:16 +04:00
2007-12-21 20:59:56 +03:00
name = s ;
2001-08-22 06:48:16 +04:00
2007-12-21 20:59:56 +03:00
wbc_status = wbcAuthenticateUser ( name , password ) ;
2001-08-22 06:48:16 +04:00
2008-02-04 19:23:28 +03:00
d_printf ( " plaintext password authentication %s \n " ,
2007-12-21 20:59:56 +03:00
WBC_ERROR_IS_OK ( wbc_status ) ? " succeeded " : " failed " ) ;
2001-08-22 06:48:16 +04:00
2007-12-21 20:59:56 +03:00
#if 0
2002-09-25 19:19:00 +04:00
if ( response . data . auth . nt_status )
2005-12-21 15:52:04 +03:00
d_fprintf ( stderr , " error code was %s (0x%x) \n error messsage was: %s \n " ,
2008-02-04 19:23:28 +03:00
response . data . auth . nt_status_string ,
2003-04-07 11:32:51 +04:00
response . data . auth . nt_status ,
response . data . auth . error_string ) ;
2007-12-21 20:59:56 +03:00
# endif
SAFE_FREE ( s ) ;
2002-02-05 12:40:36 +03:00
2008-02-04 19:23:28 +03:00
return WBC_ERROR_IS_OK ( wbc_status ) ;
2001-08-22 06:48:16 +04:00
}
/* Authenticate a user with a challenge/response */
2007-10-19 04:40:25 +04:00
static bool wbinfo_auth_crap ( char * username )
2001-08-22 06:48:16 +04:00
{
2008-01-29 18:21:14 +03:00
wbcErr wbc_status = WBC_ERR_UNKNOWN_FAILURE ;
struct wbcAuthUserParams params ;
2008-02-15 12:40:43 +03:00
struct wbcAuthUserInfo * info = NULL ;
2008-01-29 18:21:14 +03:00
struct wbcAuthErrorInfo * err = NULL ;
DATA_BLOB lm = data_blob_null ;
DATA_BLOB nt = data_blob_null ;
2008-02-04 19:23:28 +03:00
fstring name_user ;
fstring name_domain ;
fstring pass ;
char * p ;
2001-08-22 06:48:16 +04:00
2008-02-04 19:23:28 +03:00
p = strchr ( username , ' % ' ) ;
2001-08-22 06:48:16 +04:00
2008-02-04 19:23:28 +03:00
if ( p ) {
* p = 0 ;
fstrcpy ( pass , p + 1 ) ;
2002-01-10 13:23:54 +03:00
}
2002-01-10 14:28:14 +03:00
parse_wbinfo_domain_user ( username , name_domain , name_user ) ;
2002-01-10 13:23:54 +03:00
2008-01-29 18:21:14 +03:00
params . account_name = name_user ;
params . domain_name = name_domain ;
params . workstation_name = NULL ;
2005-11-08 09:19:34 +03:00
2008-01-29 18:21:14 +03:00
params . flags = 0 ;
params . parameter_control = WBC_MSV1_0_ALLOW_WORKSTATION_TRUST_ACCOUNT |
WBC_MSV1_0_ALLOW_SERVER_TRUST_ACCOUNT ;
2002-01-10 13:23:54 +03:00
2008-01-29 18:21:14 +03:00
params . level = WBC_AUTH_USER_LEVEL_RESPONSE ;
2001-08-22 06:48:16 +04:00
2008-01-29 18:21:14 +03:00
generate_random_buffer ( params . password . response . challenge , 8 ) ;
2008-02-04 19:23:28 +03:00
2004-09-30 04:49:41 +04:00
if ( lp_client_ntlmv2_auth ( ) ) {
DATA_BLOB server_chal ;
2008-02-04 19:23:28 +03:00
DATA_BLOB names_blob ;
2001-08-22 06:48:16 +04:00
2008-01-29 18:21:14 +03:00
server_chal = data_blob ( params . password . response . challenge , 8 ) ;
2008-02-04 19:23:28 +03:00
2004-09-30 04:49:41 +04:00
/* Pretend this is a login to 'us', for blob purposes */
names_blob = NTLMv2_generate_names_blob ( global_myname ( ) , lp_workgroup ( ) ) ;
2008-02-04 19:23:28 +03:00
if ( ! SMBNTLMv2encrypt ( name_user , name_domain , pass , & server_chal ,
2004-09-30 04:49:41 +04:00
& names_blob ,
2008-01-29 18:21:14 +03:00
& lm , & nt , NULL ) ) {
2004-09-30 04:49:41 +04:00
data_blob_free ( & names_blob ) ;
data_blob_free ( & server_chal ) ;
2008-02-04 19:25:06 +03:00
return false ;
2004-09-30 04:49:41 +04:00
}
data_blob_free ( & names_blob ) ;
data_blob_free ( & server_chal ) ;
} else {
2008-01-29 18:21:14 +03:00
if ( lp_client_lanman_auth ( ) ) {
bool ok ;
lm = data_blob ( NULL , 24 ) ;
ok = SMBencrypt ( pass , params . password . response . challenge ,
lm . data ) ;
if ( ! ok ) {
data_blob_free ( & lm ) ;
}
2004-09-30 04:49:41 +04:00
}
2008-01-29 18:21:14 +03:00
nt = data_blob ( NULL , 24 ) ;
SMBNTencrypt ( pass , params . password . response . challenge ,
nt . data ) ;
2004-09-30 04:49:41 +04:00
}
2001-08-22 06:48:16 +04:00
2008-01-29 18:21:14 +03:00
params . password . response . nt_length = nt . length ;
params . password . response . nt_data = nt . data ;
params . password . response . lm_length = lm . length ;
params . password . response . lm_data = lm . data ;
2008-02-15 12:40:43 +03:00
wbc_status = wbcAuthenticateUserEx ( & params , & info , & err ) ;
2001-08-22 06:48:16 +04:00
/* Display response */
2008-02-04 19:23:28 +03:00
d_printf ( " challenge/response password authentication %s \n " ,
2008-01-29 18:21:14 +03:00
WBC_ERROR_IS_OK ( wbc_status ) ? " succeeded " : " failed " ) ;
2001-08-22 06:48:16 +04:00
2008-01-29 18:21:14 +03:00
if ( wbc_status = = WBC_ERR_AUTH_ERROR ) {
2005-12-21 15:52:04 +03:00
d_fprintf ( stderr , " error code was %s (0x%x) \n error messsage was: %s \n " ,
2008-01-29 18:21:14 +03:00
err - > nt_string ,
err - > nt_status ,
err - > display_string ) ;
wbcFreeMemory ( err ) ;
2008-02-15 12:40:43 +03:00
} else if ( WBC_ERROR_IS_OK ( wbc_status ) ) {
wbcFreeMemory ( info ) ;
2008-01-29 18:21:14 +03:00
}
2002-02-05 12:40:36 +03:00
2008-01-29 18:21:14 +03:00
data_blob_free ( & nt ) ;
data_blob_free ( & lm ) ;
return WBC_ERROR_IS_OK ( wbc_status ) ;
2001-08-22 06:48:16 +04:00
}
2004-04-01 16:31:50 +04:00
/* Authenticate a user with a plaintext password and set a token */
2007-10-19 04:40:25 +04:00
static bool wbinfo_klog ( char * username )
2004-04-01 16:31:50 +04:00
{
struct winbindd_request request ;
struct winbindd_response response ;
2008-02-04 19:23:28 +03:00
NSS_STATUS result ;
char * p ;
2004-04-01 16:31:50 +04:00
/* Send off request */
ZERO_STRUCT ( request ) ;
ZERO_STRUCT ( response ) ;
2008-02-04 19:23:28 +03:00
p = strchr ( username , ' % ' ) ;
2004-04-01 16:31:50 +04:00
2008-02-04 19:23:28 +03:00
if ( p ) {
* p = 0 ;
fstrcpy ( request . data . auth . user , username ) ;
fstrcpy ( request . data . auth . pass , p + 1 ) ;
* p = ' % ' ;
} else {
fstrcpy ( request . data . auth . user , username ) ;
2004-04-01 16:31:50 +04:00
fstrcpy ( request . data . auth . pass , getpass ( " Password: " ) ) ;
}
request . flags | = WBFLAG_PAM_AFS_TOKEN ;
2005-06-25 00:25:18 +04:00
result = winbindd_request_response ( WINBINDD_PAM_AUTH , & request , & response ) ;
2004-04-01 16:31:50 +04:00
/* Display response */
2008-02-04 19:23:28 +03:00
d_printf ( " plaintext password authentication %s \n " ,
( result = = NSS_STATUS_SUCCESS ) ? " succeeded " : " failed " ) ;
2004-04-01 16:31:50 +04:00
if ( response . data . auth . nt_status )
2005-12-21 15:52:04 +03:00
d_fprintf ( stderr , " error code was %s (0x%x) \n error messsage was: %s \n " ,
2008-02-04 19:23:28 +03:00
response . data . auth . nt_status_string ,
2004-04-01 16:31:50 +04:00
response . data . auth . nt_status ,
response . data . auth . error_string ) ;
if ( result ! = NSS_STATUS_SUCCESS )
2008-02-04 19:25:06 +03:00
return false ;
2004-04-01 16:31:50 +04:00
2006-04-12 18:10:39 +04:00
if ( response . extra_data . data = = NULL ) {
2005-12-21 15:52:04 +03:00
d_fprintf ( stderr , " Did not get token data \n " ) ;
2008-02-04 19:25:06 +03:00
return false ;
2004-04-01 16:31:50 +04:00
}
2006-04-12 18:10:39 +04:00
if ( ! afs_settoken_str ( ( char * ) response . extra_data . data ) ) {
2005-12-21 15:52:04 +03:00
d_fprintf ( stderr , " Could not set token \n " ) ;
2008-02-04 19:25:06 +03:00
return false ;
2004-04-01 16:31:50 +04:00
}
d_printf ( " Successfully created AFS token \n " ) ;
2008-02-04 19:25:06 +03:00
return true ;
2004-04-01 16:31:50 +04:00
}
2000-07-05 15:24:26 +04:00
/* Print domain users */
2007-10-19 04:40:25 +04:00
static bool print_domain_users ( const char * domain )
2000-07-05 15:24:26 +04:00
{
2008-03-24 22:32:14 +03:00
wbcErr wbc_status = WBC_ERR_UNKNOWN_FAILURE ;
uint32_t i ;
uint32_t num_users = 0 ;
const char * * users = NULL ;
2000-07-05 15:24:26 +04:00
/* Send request to winbind daemon */
2008-03-24 22:32:14 +03:00
/* '.' is the special sign for our own domain */
if ( domain & & strcmp ( domain , " . " ) = = 0 ) {
domain = get_winbind_domain ( ) ;
2003-08-11 10:36:30 +04:00
}
2000-07-05 15:24:26 +04:00
2008-03-24 22:32:14 +03:00
wbc_status = wbcListUsers ( domain , & num_users , & users ) ;
if ( ! WBC_ERROR_IS_OK ( wbc_status ) ) {
2008-02-04 19:25:06 +03:00
return false ;
2008-03-24 22:32:14 +03:00
}
2000-07-05 15:24:26 +04:00
2008-03-24 22:32:14 +03:00
for ( i = 0 ; i < num_users ; i + + ) {
d_printf ( " %s \n " , users [ i ] ) ;
}
2007-12-08 04:32:32 +03:00
2008-03-24 22:32:14 +03:00
wbcFreeMemory ( users ) ;
2002-01-11 06:49:51 +03:00
2008-02-04 19:25:06 +03:00
return true ;
2000-07-05 15:24:26 +04:00
}
/* Print domain groups */
2007-10-19 04:40:25 +04:00
static bool print_domain_groups ( const char * domain )
2000-07-05 15:24:26 +04:00
{
2008-03-24 22:32:14 +03:00
wbcErr wbc_status = WBC_ERR_UNKNOWN_FAILURE ;
uint32_t i ;
uint32_t num_groups = 0 ;
const char * * groups = NULL ;
2000-07-05 15:24:26 +04:00
2008-03-24 22:32:14 +03:00
/* Send request to winbind daemon */
2000-07-05 15:24:26 +04:00
2008-03-24 22:32:14 +03:00
/* '.' is the special sign for our own domain */
if ( domain & & strcmp ( domain , " . " ) = = 0 ) {
domain = get_winbind_domain ( ) ;
2003-08-11 10:36:30 +04:00
}
2008-03-24 22:32:14 +03:00
wbc_status = wbcListGroups ( domain , & num_groups , & groups ) ;
if ( ! WBC_ERROR_IS_OK ( wbc_status ) ) {
2008-02-04 19:25:06 +03:00
return false ;
2008-03-24 22:32:14 +03:00
}
2000-07-05 15:24:26 +04:00
2008-03-24 22:32:14 +03:00
for ( i = 0 ; i < num_groups ; i + + ) {
d_printf ( " %s \n " , groups [ i ] ) ;
}
2002-01-11 06:49:51 +03:00
2008-03-24 22:32:14 +03:00
wbcFreeMemory ( groups ) ;
2007-12-08 04:32:32 +03:00
2008-02-04 19:25:06 +03:00
return true ;
2000-07-05 15:24:26 +04:00
}
2001-12-11 08:18:36 +03:00
/* Set the authorised user for winbindd access in secrets.tdb */
2007-10-19 04:40:25 +04:00
static bool wbinfo_set_auth_user ( char * username )
2001-12-11 08:18:36 +03:00
{
2004-04-01 12:54:01 +04:00
const char * password ;
char * p ;
2002-02-15 16:28:59 +03:00
fstring user , domain ;
2001-12-11 08:18:36 +03:00
/* Separate into user and password */
2002-02-15 16:28:59 +03:00
parse_wbinfo_domain_user ( username , domain , user ) ;
2004-04-01 12:54:01 +04:00
p = strchr ( user , ' % ' ) ;
2001-12-11 08:18:36 +03:00
2004-04-01 12:54:01 +04:00
if ( p ! = NULL ) {
* p = 0 ;
password = p + 1 ;
2003-10-31 23:29:18 +03:00
} else {
char * thepass = getpass ( " Password: " ) ;
if ( thepass ) {
2008-02-04 19:23:28 +03:00
password = thepass ;
2003-10-31 23:29:18 +03:00
} else
password = " " ;
}
2001-12-11 08:18:36 +03:00
2002-11-02 04:51:53 +03:00
/* Store or remove DOMAIN\username%password in secrets.tdb */
secrets_init ( ) ;
if ( user [ 0 ] ) {
if ( ! secrets_store ( SECRETS_AUTH_USER , user ,
strlen ( user ) + 1 ) ) {
d_fprintf ( stderr , " error storing username \n " ) ;
2008-02-04 19:25:06 +03:00
return false ;
2002-11-02 04:51:53 +03:00
}
/* We always have a domain name added by the
parse_wbinfo_domain_user ( ) function . */
if ( ! secrets_store ( SECRETS_AUTH_DOMAIN , domain ,
strlen ( domain ) + 1 ) ) {
d_fprintf ( stderr , " error storing domain name \n " ) ;
2008-02-04 19:25:06 +03:00
return false ;
2002-11-02 04:51:53 +03:00
}
} else {
secrets_delete ( SECRETS_AUTH_USER ) ;
secrets_delete ( SECRETS_AUTH_DOMAIN ) ;
2001-12-11 08:18:36 +03:00
}
2002-11-02 04:51:53 +03:00
if ( password [ 0 ] ) {
if ( ! secrets_store ( SECRETS_AUTH_PASSWORD , password ,
strlen ( password ) + 1 ) ) {
d_fprintf ( stderr , " error storing password \n " ) ;
2008-02-04 19:25:06 +03:00
return false ;
2002-11-02 04:51:53 +03:00
}
} else
secrets_delete ( SECRETS_AUTH_PASSWORD ) ;
2008-02-04 19:25:06 +03:00
return true ;
2001-12-11 08:18:36 +03:00
}
2002-11-02 04:51:53 +03:00
static void wbinfo_get_auth_user ( void )
{
char * user , * domain , * password ;
/* Lift data from secrets file */
2008-02-04 19:23:28 +03:00
2004-01-07 13:11:24 +03:00
secrets_fetch_ipc_userpass ( & user , & domain , & password ) ;
2002-11-02 04:51:53 +03:00
2004-01-07 13:11:24 +03:00
if ( ( ! user | | ! * user ) & & ( ! domain | | ! * domain ) & & ( ! password | | ! * password ) ) {
2002-11-02 04:51:53 +03:00
2004-01-07 13:11:24 +03:00
SAFE_FREE ( user ) ;
SAFE_FREE ( domain ) ;
SAFE_FREE ( password ) ;
2002-11-02 04:51:53 +03:00
d_printf ( " No authorised user configured \n " ) ;
return ;
}
/* Pretty print authorised user info */
2004-01-06 22:57:14 +03:00
d_printf ( " %s%s%s%s%s \n " , domain ? domain : " " , domain ? lp_winbind_separator ( ) : " " ,
2002-11-02 04:51:53 +03:00
user , password ? " % " : " " , password ? password : " " ) ;
SAFE_FREE ( user ) ;
SAFE_FREE ( domain ) ;
SAFE_FREE ( password ) ;
}
2007-10-19 04:40:25 +04:00
static bool wbinfo_ping ( void )
2002-01-10 13:23:54 +03:00
{
NSS_STATUS result ;
2002-09-25 19:19:00 +04:00
2005-06-25 00:25:18 +04:00
result = winbindd_request_response ( WINBINDD_PING , NULL , NULL ) ;
2002-01-10 13:23:54 +03:00
/* Display response */
2008-02-04 19:23:28 +03:00
d_printf ( " Ping to winbindd %s on fd %d \n " ,
( result = = NSS_STATUS_SUCCESS ) ? " succeeded " : " failed " , winbindd_fd ) ;
2002-01-10 13:23:54 +03:00
2008-02-04 19:23:28 +03:00
return result = = NSS_STATUS_SUCCESS ;
2002-01-10 13:23:54 +03:00
}
2000-07-05 15:24:26 +04:00
/* Main program */
2001-12-11 08:18:36 +03:00
enum {
2002-03-20 06:54:47 +03:00
OPT_SET_AUTH_USER = 1000 ,
2002-11-02 04:51:53 +03:00
OPT_GET_AUTH_USER ,
2003-08-11 02:01:11 +04:00
OPT_DOMAIN_NAME ,
2003-11-19 11:11:14 +03:00
OPT_SEQUENCE ,
2005-06-09 02:10:34 +04:00
OPT_GETDCNAME ,
2007-08-28 19:20:54 +04:00
OPT_DSGETDCNAME ,
2005-06-09 02:10:34 +04:00
OPT_USERDOMGROUPS ,
2005-11-30 01:46:16 +03:00
OPT_USERSIDS ,
2006-02-04 01:19:41 +03:00
OPT_ALLOCATE_UID ,
OPT_ALLOCATE_GID ,
OPT_SEPARATOR ,
2006-05-31 21:15:33 +04:00
OPT_LIST_ALL_DOMAINS ,
2006-07-11 22:01:26 +04:00
OPT_LIST_OWN_DOMAIN ,
2007-08-12 21:36:42 +04:00
OPT_UID_INFO ,
2006-07-11 22:01:26 +04:00
OPT_GROUP_INFO ,
2001-12-11 08:18:36 +03:00
} ;
2006-11-30 02:20:22 +03:00
int main ( int argc , char * * argv , char * * envp )
2000-07-05 15:24:26 +04:00
{
int opt ;
2008-02-04 19:23:28 +03:00
TALLOC_CTX * frame = talloc_stackframe ( ) ;
2001-12-11 08:18:36 +03:00
poptContext pc ;
2001-12-11 21:08:48 +03:00
static char * string_arg ;
2003-08-11 02:01:11 +04:00
static char * opt_domain_name ;
2001-12-11 21:08:48 +03:00
static int int_arg ;
2002-04-04 10:40:17 +04:00
int result = 1 ;
2001-12-11 08:18:36 +03:00
struct poptOption long_options [ ] = {
2002-09-25 19:19:00 +04:00
POPT_AUTOHELP
2001-12-11 08:18:36 +03:00
2008-02-04 19:23:28 +03:00
/* longName, shortName, argInfo, argPtr, value, descrip,
2002-03-20 06:54:47 +03:00
argDesc */
2003-08-11 02:01:11 +04:00
{ " domain-users " , ' u ' , POPT_ARG_NONE , 0 , ' u ' , " Lists all domain users " , " domain " } ,
{ " domain-groups " , ' g ' , POPT_ARG_NONE , 0 , ' g ' , " Lists all domain groups " , " domain " } ,
2003-03-18 09:07:50 +03:00
{ " WINS-by-name " , ' N ' , POPT_ARG_STRING , & string_arg , ' N ' , " Converts NetBIOS name to IP " , " NETBIOS-NAME " } ,
{ " WINS-by-ip " , ' I ' , POPT_ARG_STRING , & string_arg , ' I ' , " Converts IP address to NetBIOS name " , " IP " } ,
2002-10-29 20:36:50 +03:00
{ " name-to-sid " , ' n ' , POPT_ARG_STRING , & string_arg , ' n ' , " Converts name to sid " , " NAME " } ,
{ " sid-to-name " , ' s ' , POPT_ARG_STRING , & string_arg , ' s ' , " Converts sid to name " , " SID " } ,
2006-07-11 22:01:26 +04:00
{ " lookup-rids " , ' R ' , POPT_ARG_STRING , & string_arg , ' R ' , " Converts RIDs to names " , " RIDs " } ,
2002-10-29 20:36:50 +03:00
{ " uid-to-sid " , ' U ' , POPT_ARG_INT , & int_arg , ' U ' , " Converts uid to sid " , " UID " } ,
{ " gid-to-sid " , ' G ' , POPT_ARG_INT , & int_arg , ' G ' , " Converts gid to sid " , " GID " } ,
{ " sid-to-uid " , ' S ' , POPT_ARG_STRING , & string_arg , ' S ' , " Converts sid to uid " , " SID " } ,
{ " sid-to-gid " , ' Y ' , POPT_ARG_STRING , & string_arg , ' Y ' , " Converts sid to gid " , " SID " } ,
2006-02-04 01:19:41 +03:00
{ " allocate-uid " , 0 , POPT_ARG_NONE , 0 , OPT_ALLOCATE_UID ,
" Get a new UID out of idmap " } ,
{ " allocate-gid " , 0 , POPT_ARG_NONE , 0 , OPT_ALLOCATE_GID ,
" Get a new GID out of idmap " } ,
2002-09-25 19:19:00 +04:00
{ " check-secret " , ' t ' , POPT_ARG_NONE , 0 , ' t ' , " Check shared secret " } ,
{ " trusted-domains " , ' m ' , POPT_ARG_NONE , 0 , ' m ' , " List trusted domains " } ,
2006-02-04 01:19:41 +03:00
{ " all-domains " , 0 , POPT_ARG_NONE , 0 , OPT_LIST_ALL_DOMAINS , " List all domains (trusted and own domain) " } ,
2006-05-31 21:15:33 +04:00
{ " own-domain " , 0 , POPT_ARG_NONE , 0 , OPT_LIST_OWN_DOMAIN , " List own domain " } ,
2003-03-18 09:07:50 +03:00
{ " sequence " , 0 , POPT_ARG_NONE , 0 , OPT_SEQUENCE , " Show sequence numbers of all domains " } ,
2004-01-23 15:57:29 +03:00
{ " domain-info " , ' D ' , POPT_ARG_STRING , & string_arg , ' D ' , " Show most of the info we have about the domain " } ,
2006-04-23 15:11:27 +04:00
{ " user-info " , ' i ' , POPT_ARG_STRING , & string_arg , ' i ' , " Get user info " , " USER " } ,
2007-08-12 21:36:42 +04:00
{ " uid-info " , 0 , POPT_ARG_INT , & int_arg , OPT_UID_INFO , " Get user info from uid " , " UID " } ,
2006-07-11 22:01:26 +04:00
{ " group-info " , 0 , POPT_ARG_STRING , & string_arg , OPT_GROUP_INFO , " Get group info " , " GROUP " } ,
2002-10-29 20:36:50 +03:00
{ " user-groups " , ' r ' , POPT_ARG_STRING , & string_arg , ' r ' , " Get user groups " , " USER " } ,
2005-06-09 02:10:34 +04:00
{ " user-domgroups " , 0 , POPT_ARG_STRING , & string_arg ,
OPT_USERDOMGROUPS , " Get user domain groups " , " SID " } ,
2003-11-19 11:11:14 +03:00
{ " user-sids " , 0 , POPT_ARG_STRING , & string_arg , OPT_USERSIDS , " Get user group sids for user SID " , " SID " } ,
2002-09-25 19:19:00 +04:00
{ " authenticate " , ' a ' , POPT_ARG_STRING , & string_arg , ' a ' , " authenticate user " , " user%password " } ,
2003-06-18 18:20:23 +04:00
{ " set-auth-user " , 0 , POPT_ARG_STRING , & string_arg , OPT_SET_AUTH_USER , " Store user and password used by winbindd (root only) " , " user%password " } ,
2005-06-09 02:10:34 +04:00
{ " getdcname " , 0 , POPT_ARG_STRING , & string_arg , OPT_GETDCNAME ,
" Get a DC name for a foreign domain " , " domainname " } ,
2007-08-28 19:20:54 +04:00
{ " dsgetdcname " , 0 , POPT_ARG_STRING , & string_arg , OPT_DSGETDCNAME , " Find a DC for a domain " , " domainname " } ,
2002-11-02 04:51:53 +03:00
{ " get-auth-user " , 0 , POPT_ARG_NONE , NULL , OPT_GET_AUTH_USER , " Retrieve user and password used by winbindd (root only) " , NULL } ,
2003-03-18 09:07:50 +03:00
{ " ping " , ' p ' , POPT_ARG_NONE , 0 , ' p ' , " Ping winbindd to see if it is alive " } ,
2003-12-23 23:25:21 +03:00
{ " domain " , 0 , POPT_ARG_STRING , & opt_domain_name , OPT_DOMAIN_NAME , " Define to the domain to restrict operation " , " domain " } ,
2004-04-01 16:31:50 +04:00
# ifdef WITH_FAKE_KASERVER
{ " klog " , ' k ' , POPT_ARG_STRING , & string_arg , ' k ' , " set an AFS token from winbind " , " user%password " } ,
2006-02-04 01:19:41 +03:00
# endif
# ifdef HAVE_KRB5
{ " krb5auth " , ' K ' , POPT_ARG_STRING , & string_arg , ' K ' , " authenticate user using Kerberos " , " user%password " } ,
/* destroys wbinfo --help output */
/* "user%password,DOM\\user%password,user@EXAMPLE.COM,EXAMPLE.COM\\user%password" }, */
2004-04-01 16:31:50 +04:00
# endif
2005-11-30 01:46:16 +03:00
{ " separator " , 0 , POPT_ARG_NONE , 0 , OPT_SEPARATOR , " Get the active winbind separator " , NULL } ,
2007-12-14 21:38:23 +03:00
POPT_COMMON_CONFIGFILE
2003-04-14 06:38:21 +04:00
POPT_COMMON_VERSION
POPT_TABLEEND
2001-12-11 08:18:36 +03:00
} ;
2000-07-05 15:24:26 +04:00
/* Samba client initialisation */
2005-12-29 01:48:54 +03:00
load_case_tables ( ) ;
2000-07-05 15:24:26 +04:00
2002-09-25 19:19:00 +04:00
/* Parse options */
pc = poptGetContext ( " wbinfo " , argc , ( const char * * ) argv , long_options , 0 ) ;
2000-07-05 15:24:26 +04:00
/* Parse command line options */
if ( argc = = 1 ) {
2002-09-25 19:19:00 +04:00
poptPrintHelp ( pc , stderr , 0 ) ;
2000-07-05 15:24:26 +04:00
return 1 ;
}
2001-12-11 08:18:36 +03:00
while ( ( opt = poptGetNextOpt ( pc ) ) ! = - 1 ) {
2003-08-11 02:01:11 +04:00
/* get the generic configuration parameters like --domain */
2001-12-11 08:18:36 +03:00
}
2002-04-04 10:40:17 +04:00
poptFreeContext ( pc ) ;
2008-02-04 19:25:06 +03:00
if ( ! lp_load ( get_dyn_CONFIGFILE ( ) , true , false , false , true ) ) {
2007-12-14 21:38:23 +03:00
d_fprintf ( stderr , " wbinfo: error opening config file %s. Error was %s \n " ,
get_dyn_CONFIGFILE ( ) , strerror ( errno ) ) ;
exit ( 1 ) ;
}
if ( ! init_names ( ) )
return 1 ;
load_interfaces ( ) ;
2001-12-11 08:18:36 +03:00
pc = poptGetContext ( NULL , argc , ( const char * * ) argv , long_options ,
POPT_CONTEXT_KEEP_FIRST ) ;
while ( ( opt = poptGetNextOpt ( pc ) ) ! = - 1 ) {
2000-07-05 15:24:26 +04:00
switch ( opt ) {
case ' u ' :
2003-08-11 02:01:11 +04:00
if ( ! print_domain_users ( opt_domain_name ) ) {
2005-12-21 15:52:04 +03:00
d_fprintf ( stderr , " Error looking up domain users \n " ) ;
2002-04-04 10:40:17 +04:00
goto done ;
2000-07-05 15:24:26 +04:00
}
break ;
case ' g ' :
2003-08-11 02:01:11 +04:00
if ( ! print_domain_groups ( opt_domain_name ) ) {
2005-12-21 15:52:04 +03:00
d_fprintf ( stderr , " Error looking up domain groups \n " ) ;
2002-04-04 10:40:17 +04:00
goto done ;
2000-07-05 15:24:26 +04:00
}
break ;
case ' s ' :
2001-12-11 08:18:36 +03:00
if ( ! wbinfo_lookupsid ( string_arg ) ) {
2005-12-21 15:52:04 +03:00
d_fprintf ( stderr , " Could not lookup sid %s \n " , string_arg ) ;
2002-04-04 10:40:17 +04:00
goto done ;
2000-07-05 15:24:26 +04:00
}
break ;
2006-07-11 22:01:26 +04:00
case ' R ' :
if ( ! wbinfo_lookuprids ( opt_domain_name , string_arg ) ) {
d_fprintf ( stderr , " Could not lookup RIDs %s \n " , string_arg ) ;
goto done ;
}
break ;
2000-07-05 15:24:26 +04:00
case ' n ' :
2001-12-11 08:18:36 +03:00
if ( ! wbinfo_lookupname ( string_arg ) ) {
2005-12-21 15:52:04 +03:00
d_fprintf ( stderr , " Could not lookup name %s \n " , string_arg ) ;
2002-04-04 10:40:17 +04:00
goto done ;
2000-07-05 15:24:26 +04:00
}
break ;
2002-03-29 18:37:39 +03:00
case ' N ' :
if ( ! wbinfo_wins_byname ( string_arg ) ) {
2005-12-21 15:52:04 +03:00
d_fprintf ( stderr , " Could not lookup WINS by name %s \n " , string_arg ) ;
2002-04-04 10:40:17 +04:00
goto done ;
2002-03-29 18:37:39 +03:00
}
break ;
case ' I ' :
if ( ! wbinfo_wins_byip ( string_arg ) ) {
2005-12-21 15:52:04 +03:00
d_fprintf ( stderr , " Could not lookup WINS by IP %s \n " , string_arg ) ;
2002-04-04 10:40:17 +04:00
goto done ;
2002-03-29 18:37:39 +03:00
}
break ;
2000-07-05 15:24:26 +04:00
case ' U ' :
2001-12-11 08:18:36 +03:00
if ( ! wbinfo_uid_to_sid ( int_arg ) ) {
2005-12-21 15:52:04 +03:00
d_fprintf ( stderr , " Could not convert uid %d to sid \n " , int_arg ) ;
2002-04-04 10:40:17 +04:00
goto done ;
2000-07-05 15:24:26 +04:00
}
break ;
case ' G ' :
2001-12-11 08:18:36 +03:00
if ( ! wbinfo_gid_to_sid ( int_arg ) ) {
2005-12-21 15:52:04 +03:00
d_fprintf ( stderr , " Could not convert gid %d to sid \n " ,
2001-12-11 08:18:36 +03:00
int_arg ) ;
2002-04-04 10:40:17 +04:00
goto done ;
2000-07-05 15:24:26 +04:00
}
break ;
case ' S ' :
2001-12-11 08:18:36 +03:00
if ( ! wbinfo_sid_to_uid ( string_arg ) ) {
2005-12-21 15:52:04 +03:00
d_fprintf ( stderr , " Could not convert sid %s to uid \n " ,
2001-12-11 08:18:36 +03:00
string_arg ) ;
2002-04-04 10:40:17 +04:00
goto done ;
2000-07-05 15:24:26 +04:00
}
break ;
case ' Y ' :
2001-12-11 08:18:36 +03:00
if ( ! wbinfo_sid_to_gid ( string_arg ) ) {
2005-12-21 15:52:04 +03:00
d_fprintf ( stderr , " Could not convert sid %s to gid \n " ,
2001-12-11 08:18:36 +03:00
string_arg ) ;
2002-04-04 10:40:17 +04:00
goto done ;
2000-07-05 15:24:26 +04:00
}
break ;
2006-02-04 01:19:41 +03:00
case OPT_ALLOCATE_UID :
if ( ! wbinfo_allocate_uid ( ) ) {
d_fprintf ( stderr , " Could not allocate a uid \n " ) ;
goto done ;
}
break ;
case OPT_ALLOCATE_GID :
if ( ! wbinfo_allocate_gid ( ) ) {
d_fprintf ( stderr , " Could not allocate a gid \n " ) ;
2004-04-07 16:43:44 +04:00
goto done ;
}
break ;
2000-07-05 15:24:26 +04:00
case ' t ' :
if ( ! wbinfo_check_secret ( ) ) {
2005-12-21 15:52:04 +03:00
d_fprintf ( stderr , " Could not check secret \n " ) ;
2002-04-04 10:40:17 +04:00
goto done ;
2000-07-05 15:24:26 +04:00
}
break ;
case ' m ' :
2008-02-04 19:25:06 +03:00
if ( ! wbinfo_list_domains ( false ) ) {
2005-12-21 15:52:04 +03:00
d_fprintf ( stderr , " Could not list trusted domains \n " ) ;
2002-04-04 10:40:17 +04:00
goto done ;
2000-07-05 15:24:26 +04:00
}
break ;
2002-01-31 14:49:29 +03:00
case OPT_SEQUENCE :
2003-08-11 02:01:11 +04:00
if ( ! wbinfo_show_sequence ( opt_domain_name ) ) {
2005-12-21 15:52:04 +03:00
d_fprintf ( stderr , " Could not show sequence numbers \n " ) ;
2002-04-04 10:40:17 +04:00
goto done ;
2002-01-31 14:49:29 +03:00
}
break ;
2004-01-04 14:51:31 +03:00
case ' D ' :
if ( ! wbinfo_domain_info ( string_arg ) ) {
2005-12-21 15:52:04 +03:00
d_fprintf ( stderr , " Could not get domain info \n " ) ;
2004-01-04 14:51:31 +03:00
goto done ;
}
break ;
2006-04-23 15:11:27 +04:00
case ' i ' :
if ( ! wbinfo_get_userinfo ( string_arg ) ) {
d_fprintf ( stderr , " Could not get info for user %s \n " ,
string_arg ) ;
goto done ;
}
break ;
2007-08-12 21:36:42 +04:00
case OPT_UID_INFO :
if ( ! wbinfo_get_uidinfo ( int_arg ) ) {
d_fprintf ( stderr , " Could not get info for uid "
" %d \n " , int_arg ) ;
goto done ;
}
break ;
2006-07-11 22:01:26 +04:00
case OPT_GROUP_INFO :
if ( ! wbinfo_get_groupinfo ( string_arg ) ) {
d_fprintf ( stderr , " Could not get info for "
" group %s \n " , string_arg ) ;
goto done ;
}
2007-03-24 02:10:46 +03:00
break ;
2000-10-11 09:25:32 +04:00
case ' r ' :
2001-12-11 08:18:36 +03:00
if ( ! wbinfo_get_usergroups ( string_arg ) ) {
2005-12-21 15:52:04 +03:00
d_fprintf ( stderr , " Could not get groups for user %s \n " ,
2001-12-11 08:18:36 +03:00
string_arg ) ;
2002-04-04 10:40:17 +04:00
goto done ;
2000-10-11 09:25:32 +04:00
}
break ;
2003-11-19 11:11:14 +03:00
case OPT_USERSIDS :
if ( ! wbinfo_get_usersids ( string_arg ) ) {
2005-12-21 15:52:04 +03:00
d_fprintf ( stderr , " Could not get group SIDs for user SID %s \n " ,
2003-11-19 11:11:14 +03:00
string_arg ) ;
goto done ;
}
break ;
2005-06-09 02:10:34 +04:00
case OPT_USERDOMGROUPS :
if ( ! wbinfo_get_userdomgroups ( string_arg ) ) {
2005-12-21 15:52:04 +03:00
d_fprintf ( stderr , " Could not get user's domain groups "
2005-06-09 02:10:34 +04:00
" for user SID %s \n " , string_arg ) ;
goto done ;
}
break ;
2002-10-29 20:36:50 +03:00
case ' a ' : {
2008-02-04 19:25:06 +03:00
bool got_error = false ;
2003-07-08 07:16:28 +04:00
if ( ! wbinfo_auth ( string_arg ) ) {
2005-12-21 15:52:04 +03:00
d_fprintf ( stderr , " Could not authenticate user %s with "
2003-07-08 07:16:28 +04:00
" plaintext password \n " , string_arg ) ;
2008-02-04 19:25:06 +03:00
got_error = true ;
2003-07-08 07:16:28 +04:00
}
if ( ! wbinfo_auth_crap ( string_arg ) ) {
2005-12-21 15:52:04 +03:00
d_fprintf ( stderr , " Could not authenticate user %s with "
2003-07-08 07:16:28 +04:00
" challenge/response \n " , string_arg ) ;
2008-02-04 19:25:06 +03:00
got_error = true ;
2003-07-08 07:16:28 +04:00
}
if ( got_error )
goto done ;
break ;
}
2006-02-04 01:19:41 +03:00
case ' K ' : {
uint32 flags = WBFLAG_PAM_KRB5 |
WBFLAG_PAM_CACHED_LOGIN |
WBFLAG_PAM_FALLBACK_AFTER_KRB5 |
WBFLAG_PAM_INFO3_TEXT ;
2007-06-21 18:32:09 +04:00
if ( ! wbinfo_auth_krb5 ( string_arg , " FILE " , flags ) ) {
d_fprintf ( stderr , " Could not authenticate user [%s] with "
" Kerberos (ccache: %s) \n " , string_arg , " FILE " ) ;
2006-02-04 01:19:41 +03:00
goto done ;
2007-06-21 18:32:09 +04:00
}
2006-02-04 01:19:41 +03:00
break ;
}
2004-04-01 16:31:50 +04:00
case ' k ' :
if ( ! wbinfo_klog ( string_arg ) ) {
2005-12-21 15:52:04 +03:00
d_fprintf ( stderr , " Could not klog user \n " ) ;
2004-04-01 16:31:50 +04:00
goto done ;
}
break ;
2003-07-25 05:18:10 +04:00
case ' p ' :
2003-07-08 07:16:28 +04:00
if ( ! wbinfo_ping ( ) ) {
2006-02-04 01:19:41 +03:00
d_fprintf ( stderr , " could not ping winbindd! \n " ) ;
2003-07-08 07:16:28 +04:00
goto done ;
}
break ;
2001-12-11 08:18:36 +03:00
case OPT_SET_AUTH_USER :
2005-12-21 15:52:04 +03:00
if ( ! wbinfo_set_auth_user ( string_arg ) ) {
goto done ;
}
2002-11-02 04:51:53 +03:00
break ;
case OPT_GET_AUTH_USER :
wbinfo_get_auth_user ( ) ;
2001-12-11 08:18:36 +03:00
break ;
2005-06-09 02:10:34 +04:00
case OPT_GETDCNAME :
2005-12-21 15:52:04 +03:00
if ( ! wbinfo_getdcname ( string_arg ) ) {
goto done ;
}
2005-06-09 02:10:34 +04:00
break ;
2007-08-28 19:20:54 +04:00
case OPT_DSGETDCNAME :
if ( ! wbinfo_dsgetdcname ( string_arg , 0 ) ) {
goto done ;
}
break ;
2005-12-21 15:52:04 +03:00
case OPT_SEPARATOR : {
2008-02-04 19:25:06 +03:00
const char sep = winbind_separator_int ( true ) ;
2006-01-30 16:32:41 +03:00
if ( ! sep ) {
2005-12-21 15:52:04 +03:00
goto done ;
}
d_printf ( " %c \n " , sep ) ;
2005-11-30 01:46:16 +03:00
break ;
2005-12-21 15:52:04 +03:00
}
2006-02-04 01:19:41 +03:00
case OPT_LIST_ALL_DOMAINS :
2008-02-04 19:25:06 +03:00
if ( ! wbinfo_list_domains ( true ) ) {
2006-02-04 01:19:41 +03:00
goto done ;
}
2006-05-31 21:15:33 +04:00
break ;
case OPT_LIST_OWN_DOMAIN :
if ( ! wbinfo_list_own_domain ( ) ) {
goto done ;
}
break ;
2003-08-11 02:01:11 +04:00
/* generic configuration options */
case OPT_DOMAIN_NAME :
break ;
2000-07-05 15:24:26 +04:00
default :
2002-03-01 04:13:42 +03:00
d_fprintf ( stderr , " Invalid option \n " ) ;
2002-09-25 19:19:00 +04:00
poptPrintHelp ( pc , stderr , 0 ) ;
2002-04-04 10:40:17 +04:00
goto done ;
2000-07-05 15:24:26 +04:00
}
}
2001-12-11 08:18:36 +03:00
2002-04-04 10:40:17 +04:00
result = 0 ;
/* Exit code */
2000-07-05 15:24:26 +04:00
2002-04-04 10:40:17 +04:00
done :
2007-11-21 19:27:22 +03:00
talloc_destroy ( frame ) ;
2002-04-04 10:40:17 +04:00
poptFreeContext ( pc ) ;
return result ;
2000-07-05 15:24:26 +04:00
}