2000-05-09 15:43:00 +04:00
/*
2002-01-30 09:08:46 +03:00
Unix SMB / CIFS implementation .
2000-05-09 15:43:00 +04:00
Winbind daemon for ntdom nss module
Copyright ( C ) Tim Potter 2000
2006-07-19 00:19:55 +04:00
Copyright ( C ) Gerald Carter 2006
2000-05-09 15:43:00 +04:00
2004-12-18 01:16:30 +03:00
You are free to use this interface definition in any way you see
fit , including without restriction , using this header in your own
products . You do not need to give any attribution .
2000-05-09 15:43:00 +04:00
*/
2001-09-17 08:52:45 +04:00
# ifndef SAFE_FREE
2005-05-31 17:46:45 +04:00
# define SAFE_FREE(x) do { if(x) {free(x); x=NULL;} } while(0)
2001-09-17 08:52:45 +04:00
# endif
2000-05-09 15:43:00 +04:00
# ifndef _WINBINDD_NTDOM_H
# define _WINBINDD_NTDOM_H
# define WINBINDD_SOCKET_NAME "pipe" /* Name of PF_UNIX socket */
2007-04-21 01:09:44 +04:00
/* Let the build environment override the public winbindd socket location. This
* is needed for launchd support - - jpeach .
*/
# ifndef WINBINDD_SOCKET_DIR
2000-05-09 15:43:00 +04:00
# define WINBINDD_SOCKET_DIR " / tmp / .winbindd" /* Name of PF_UNIX dir */
2007-04-21 01:09:44 +04:00
# endif
2007-09-15 22:55:04 +04:00
/*
* when compiled with socket_wrapper support
* the location of the WINBINDD_SOCKET_DIR
* can be overwritten via an environment variable
*/
# define WINBINDD_SOCKET_DIR_ENVVAR "WINBINDD_SOCKET_DIR"
2003-04-07 11:32:51 +04:00
# define WINBINDD_PRIV_SOCKET_SUBDIR "winbindd_privileged" /* name of subdirectory of lp_lockdir() to hold the 'privileged' pipe */
2000-06-14 13:58:12 +04:00
# define WINBINDD_DOMAIN_ENV "WINBINDD_DOMAIN" /* Environment variables */
# define WINBINDD_DONT_ENV "_NO_WINBINDD"
2007-08-30 20:24:51 +04:00
# define WINBINDD_LOCATOR_KDC_ADDRESS "WINBINDD_LOCATOR_KDC_ADDRESS"
2000-05-09 15:43:00 +04:00
2002-01-10 14:28:14 +03:00
/* Update this when you change the interface. */
2002-01-11 02:45:29 +03:00
2007-08-28 19:16:42 +04:00
# define WINBIND_INTERFACE_VERSION 19
2002-01-11 02:45:29 +03:00
2006-07-19 00:19:55 +04:00
/* Have to deal with time_t being 4 or 8 bytes due to structure alignment.
On a 64 bit Linux box , we have to support a constant structure size
between / lib / libnss_winbind . so .2 and / li64 / libnss_winbind . so .2 .
The easiest way to do this is to always use 8 byte values for time_t . */
2007-09-13 18:14:02 +04:00
# define SMB_TIME_T int64_t
2006-07-19 00:19:55 +04:00
2002-01-11 02:45:29 +03:00
/* Socket commands */
2002-01-10 14:28:14 +03:00
2000-05-09 15:43:00 +04:00
enum winbindd_cmd {
2000-06-14 13:58:12 +04:00
2002-01-11 02:45:29 +03:00
WINBINDD_INTERFACE_VERSION , /* Always a well known value */
2000-06-14 13:58:12 +04:00
/* Get users and groups */
2002-01-10 09:20:03 +03:00
WINBINDD_GETPWNAM ,
WINBINDD_GETPWUID ,
WINBINDD_GETGRNAM ,
WINBINDD_GETGRGID ,
2000-10-11 09:45:06 +04:00
WINBINDD_GETGROUPS ,
2000-06-14 13:58:12 +04:00
/* Enumerate users and groups */
WINBINDD_SETPWENT ,
WINBINDD_ENDPWENT ,
WINBINDD_GETPWENT ,
WINBINDD_SETGRENT ,
WINBINDD_ENDGRENT ,
WINBINDD_GETGRENT ,
/* PAM authenticate and password change */
WINBINDD_PAM_AUTH ,
2001-11-14 23:02:02 +03:00
WINBINDD_PAM_AUTH_CRAP ,
2000-06-14 13:58:12 +04:00
WINBINDD_PAM_CHAUTHTOK ,
2006-02-04 01:19:41 +03:00
WINBINDD_PAM_LOGOFF ,
2006-07-13 13:29:25 +04:00
WINBINDD_PAM_CHNG_PSWD_AUTH_CRAP ,
2000-06-14 13:58:12 +04:00
/* List various things */
2001-11-14 23:02:02 +03:00
WINBINDD_LIST_USERS , /* List w/o rid->id mapping */
WINBINDD_LIST_GROUPS , /* Ditto */
2000-06-14 13:58:12 +04:00
WINBINDD_LIST_TRUSTDOM ,
/* SID conversion */
WINBINDD_LOOKUPSID ,
WINBINDD_LOOKUPNAME ,
2006-07-11 22:01:26 +04:00
WINBINDD_LOOKUPRIDS ,
2000-06-14 13:58:12 +04:00
2001-11-14 23:02:02 +03:00
/* Lookup functions */
2000-06-14 13:58:12 +04:00
WINBINDD_SID_TO_UID ,
WINBINDD_SID_TO_GID ,
2006-12-12 17:52:13 +03:00
WINBINDD_SIDS_TO_XIDS ,
2000-06-14 13:58:12 +04:00
WINBINDD_UID_TO_SID ,
WINBINDD_GID_TO_SID ,
2006-02-04 01:19:41 +03:00
WINBINDD_ALLOCATE_UID ,
WINBINDD_ALLOCATE_GID ,
2006-12-12 17:52:13 +03:00
WINBINDD_SET_MAPPING ,
WINBINDD_SET_HWM ,
2000-06-14 13:58:12 +04:00
/* Miscellaneous other stuff */
WINBINDD_CHECK_MACHACC , /* Check machine account pw works */
2002-01-10 13:23:54 +03:00
WINBINDD_PING , /* Just tell me winbind is running */
2002-01-10 14:28:14 +03:00
WINBINDD_INFO , /* Various bit of info. Currently just tidbits */
2002-01-26 12:55:38 +03:00
WINBINDD_DOMAIN_NAME , /* The domain this winbind server is a member of (lp_workgroup()) */
2000-06-14 13:58:12 +04:00
2004-01-04 14:51:31 +03:00
WINBINDD_DOMAIN_INFO , /* Most of what we know from
struct winbindd_domain */
2005-06-09 02:10:34 +04:00
WINBINDD_GETDCNAME , /* Issue a GetDCName Request */
2007-08-28 19:20:54 +04:00
WINBINDD_DSGETDCNAME , /* Issue a DsGetDCName Request */
2004-01-04 14:51:31 +03:00
2002-01-31 14:49:29 +03:00
WINBINDD_SHOW_SEQUENCE , /* display sequence numbers of domains */
2002-03-29 18:37:39 +03:00
/* WINS commands */
WINBINDD_WINS_BYIP ,
WINBINDD_WINS_BYNAME ,
2002-07-15 14:35:28 +04:00
/* this is like GETGRENT but gives an empty group list */
WINBINDD_GETGRLST ,
2003-01-28 15:07:02 +03:00
WINBINDD_NETBIOS_NAME , /* The netbios name of the server */
2000-06-14 13:58:12 +04:00
2003-04-07 11:32:51 +04:00
/* find the location of our privileged pipe */
2003-03-24 12:54:13 +03:00
WINBINDD_PRIV_PIPE_DIR ,
2003-11-19 11:11:14 +03:00
/* return a list of group sids for a user sid */
2005-06-09 02:10:34 +04:00
WINBINDD_GETUSERSIDS ,
2006-02-04 01:19:41 +03:00
/* Various group queries */
2005-06-09 02:10:34 +04:00
WINBINDD_GETUSERDOMGROUPS ,
/* Initialize connection in a child */
WINBINDD_INIT_CONNECTION ,
/* Blocking calls that are not allowed on the main winbind pipe, only
* between parent and children */
WINBINDD_DUAL_SID2UID ,
WINBINDD_DUAL_SID2GID ,
2006-12-12 17:52:13 +03:00
WINBINDD_DUAL_SIDS2XIDS ,
2006-08-08 19:33:09 +04:00
WINBINDD_DUAL_UID2SID ,
WINBINDD_DUAL_GID2SID ,
2006-12-12 17:52:13 +03:00
WINBINDD_DUAL_SET_MAPPING ,
WINBINDD_DUAL_SET_HWM ,
2005-06-09 02:10:34 +04:00
/* Wrapper around possibly blocking unix nss calls */
WINBINDD_DUAL_USERINFO ,
WINBINDD_DUAL_GETSIDALIASES ,
2003-11-19 11:11:14 +03:00
2006-08-19 05:04:54 +04:00
/* Complete the challenge phase of the NTLM authentication
protocol using cached password . */
WINBINDD_CCACHE_NTLMAUTH ,
2000-06-14 13:58:12 +04:00
WINBINDD_NUM_CMDS
2000-05-09 15:43:00 +04:00
} ;
2003-07-09 20:44:47 +04:00
typedef struct winbindd_pw {
fstring pw_name ;
fstring pw_passwd ;
uid_t pw_uid ;
gid_t pw_gid ;
fstring pw_gecos ;
fstring pw_dir ;
fstring pw_shell ;
} WINBINDD_PW ;
typedef struct winbindd_gr {
fstring gr_name ;
fstring gr_passwd ;
gid_t gr_gid ;
2007-09-13 18:14:02 +04:00
uint32_t num_gr_mem ;
uint32_t gr_mem_ofs ; /* offset to group membership */
2003-07-09 20:44:47 +04:00
} WINBINDD_GR ;
2007-08-28 19:16:42 +04:00
/* PAM specific request flags */
2007-06-27 13:38:07 +04:00
# define WBFLAG_PAM_INFO3_NDR 0x00000001
# define WBFLAG_PAM_INFO3_TEXT 0x00000002
# define WBFLAG_PAM_USER_SESSION_KEY 0x00000004
# define WBFLAG_PAM_LMKEY 0x00000008
# define WBFLAG_PAM_CONTACT_TRUSTDOM 0x00000010
# define WBFLAG_PAM_UNIX_NAME 0x00000080
# define WBFLAG_PAM_AFS_TOKEN 0x00000100
# define WBFLAG_PAM_NT_STATUS_SQUASH 0x00000200
2007-08-28 19:16:42 +04:00
# define WBFLAG_PAM_KRB5 0x00001000
# define WBFLAG_PAM_FALLBACK_AFTER_KRB5 0x00002000
# define WBFLAG_PAM_CACHED_LOGIN 0x00004000
2007-12-19 19:53:14 +03:00
# define WBFLAG_PAM_GET_PWD_POLICY 0x00008000
2002-08-17 21:00:51 +04:00
2007-08-28 19:16:42 +04:00
/* generic request flags */
# define WBFLAG_QUERY_ONLY 0x00000020 /* not used */
2005-06-09 02:10:34 +04:00
/* This is a flag that can only be sent from parent to child */
2007-08-28 19:16:42 +04:00
# define WBFLAG_IS_PRIVILEGED 0x00000400 /* not used */
2005-09-19 22:49:18 +04:00
/* Flag to say this is a winbindd internal send - don't recurse. */
2007-06-27 13:38:07 +04:00
# define WBFLAG_RECURSE 0x00000800
2005-06-09 02:10:34 +04:00
2006-02-04 01:19:41 +03:00
2005-09-30 21:13:37 +04:00
# define WINBINDD_MAX_EXTRA_DATA (128*1024)
2000-05-09 15:43:00 +04:00
/* Winbind request structure */
2006-07-19 00:19:55 +04:00
/*******************************************************************************
* This structure MUST be the same size in the 32 bit and 64 bit builds
* for compatibility between / lib64 / libnss_winbind . so and / lib / libnss_winbind . so
*
* DO NOT CHANGE THIS STRUCTURE WITHOUT TESTING THE 32 BIT NSS LIB AGAINST
* A 64 BIT WINBINDD - - jerry
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2000-05-09 15:43:00 +04:00
struct winbindd_request {
2007-09-13 18:14:02 +04:00
uint32_t length ;
2000-05-09 15:43:00 +04:00
enum winbindd_cmd cmd ; /* Winbindd command to execute */
2007-05-30 23:47:35 +04:00
enum winbindd_cmd original_cmd ; /* Original Winbindd command
issued to parent process */
2000-05-09 15:43:00 +04:00
pid_t pid ; /* pid of calling process */
2007-09-13 18:14:02 +04:00
uint32_t wb_flags ; /* generic flags */
uint32_t flags ; /* flags relevant *only* to a given request */
2003-08-11 02:01:11 +04:00
fstring domain_name ; /* name of domain for which the request applies */
2000-05-09 15:43:00 +04:00
union {
2002-03-29 18:37:39 +03:00
fstring winsreq ; /* WINS request */
2000-06-14 13:58:12 +04:00
fstring username ; /* getpwnam */
fstring groupname ; /* getgrnam */
uid_t uid ; /* getpwuid, uid_to_sid */
gid_t gid ; /* getgrgid, gid_to_sid */
2000-05-09 15:43:00 +04:00
struct {
2002-09-25 19:19:00 +04:00
/* We deliberatedly don't split into domain/user to
avoid having the client know what the separator
2007-12-04 04:57:46 +03:00
character is . */
2000-05-09 15:43:00 +04:00
fstring user ;
fstring pass ;
2007-12-04 04:57:46 +03:00
char require_membership_of_sid [ 1024 ] ;
2006-02-04 01:19:41 +03:00
fstring krb5_cc_type ;
uid_t uid ;
2000-06-14 13:58:12 +04:00
} auth ; /* pam_winbind auth module */
2001-08-22 06:48:16 +04:00
struct {
2007-09-13 18:14:02 +04:00
uint8_t chal [ 8 ] ;
uint32_t logon_parameters ;
2001-08-22 06:48:16 +04:00
fstring user ;
2002-01-10 13:23:54 +03:00
fstring domain ;
2001-08-22 06:48:16 +04:00
fstring lm_resp ;
2007-09-13 18:14:02 +04:00
uint32_t lm_resp_len ;
2001-08-22 06:48:16 +04:00
fstring nt_resp ;
2007-09-13 18:14:02 +04:00
uint32_t nt_resp_len ;
2002-08-17 21:00:51 +04:00
fstring workstation ;
2004-10-01 07:28:39 +04:00
fstring require_membership_of_sid ;
2001-08-22 06:48:16 +04:00
} auth_crap ;
2000-06-14 13:58:12 +04:00
struct {
fstring user ;
fstring oldpass ;
fstring newpass ;
} chauthtok ; /* pam_winbind passwd module */
2006-07-13 13:29:25 +04:00
struct {
fstring user ;
fstring domain ;
2007-09-13 18:14:02 +04:00
uint8_t new_nt_pswd [ 516 ] ;
uint16_t new_nt_pswd_len ;
uint8_t old_nt_hash_enc [ 16 ] ;
uint16_t old_nt_hash_enc_len ;
uint8_t new_lm_pswd [ 516 ] ;
uint16_t new_lm_pswd_len ;
uint8_t old_lm_hash_enc [ 16 ] ;
uint16_t old_lm_hash_enc_len ;
2006-07-13 13:29:25 +04:00
} chng_pswd_auth_crap ; /* pam_winbind passwd module */
2006-02-04 01:19:41 +03:00
struct {
fstring user ;
fstring krb5ccname ;
uid_t uid ;
} logoff ; /* pam_winbind session module */
2000-06-14 13:58:12 +04:00
fstring sid ; /* lookupsid, sid_to_[ug]id */
2002-01-26 12:55:38 +03:00
struct {
fstring dom_name ; /* lookupname */
2007-12-04 04:57:46 +03:00
fstring name ;
2002-01-26 12:55:38 +03:00
} name ;
2007-09-13 18:14:02 +04:00
uint32_t num_entries ; /* getpwent, getgrent */
2003-07-09 20:44:47 +04:00
struct {
fstring username ;
fstring groupname ;
} acct_mgt ;
2005-06-09 02:10:34 +04:00
struct {
2007-09-13 18:14:02 +04:00
bool is_primary ;
2005-06-09 02:10:34 +04:00
fstring dcname ;
} init_conn ;
struct {
fstring sid ;
fstring name ;
} dual_sid2id ;
struct {
fstring sid ;
2007-09-13 18:14:02 +04:00
uint32_t type ;
uint32_t id ;
2005-06-09 02:10:34 +04:00
} dual_idmapset ;
2007-09-13 18:14:02 +04:00
bool list_all_domains ;
2006-07-19 00:19:55 +04:00
2006-08-19 05:04:54 +04:00
struct {
uid_t uid ;
fstring user ;
/* the effective uid of the client, must be the uid for 'user'.
This is checked by the main daemon , trusted by children . */
/* if the blobs are length zero, then this doesn't
produce an actual challenge response . It merely
succeeds if there are cached credentials available
that could be used . */
2007-09-13 18:14:02 +04:00
uint32_t initial_blob_len ; /* blobs in extra_data */
uint32_t challenge_blob_len ;
2006-08-19 05:04:54 +04:00
} ccache_ntlm_auth ;
2006-07-19 00:19:55 +04:00
/* padding -- needed to fix alignment between 32bit and 64bit libs.
2006-08-19 05:04:54 +04:00
The size is the sizeof the union without the padding aligned on
2006-07-19 00:19:55 +04:00
an 8 byte boundary . - - jerry */
2007-10-19 15:03:44 +04:00
char padding [ 1800 ] ;
2000-05-09 15:43:00 +04:00
} data ;
2006-04-12 18:10:39 +04:00
union {
2006-07-19 00:19:55 +04:00
SMB_TIME_T padding ;
2006-04-12 18:10:39 +04:00
char * data ;
} extra_data ;
2007-09-13 18:14:02 +04:00
uint32_t extra_len ;
2002-12-20 04:25:27 +03:00
char null_term ;
2000-05-09 15:43:00 +04:00
} ;
/* Response values */
enum winbindd_result {
2000-06-14 13:58:12 +04:00
WINBINDD_ERROR ,
2005-06-09 02:10:34 +04:00
WINBINDD_PENDING ,
2000-06-14 13:58:12 +04:00
WINBINDD_OK
2000-05-09 15:43:00 +04:00
} ;
/* Winbind response structure */
2006-07-19 00:19:55 +04:00
/*******************************************************************************
* This structure MUST be the same size in the 32 bit and 64 bit builds
* for compatibility between / lib64 / libnss_winbind . so and / lib / libnss_winbind . so
*
* DO NOT CHANGE THIS STRUCTURE WITHOUT TESTING THE 32 BIT NSS LIB AGAINST
* A 64 BIT WINBINDD - - jerry
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2000-05-09 15:43:00 +04:00
struct winbindd_response {
2000-06-14 13:58:12 +04:00
/* Header information */
2000-05-09 15:43:00 +04:00
2007-09-13 18:14:02 +04:00
uint32_t length ; /* Length of response */
2000-06-14 13:58:12 +04:00
enum winbindd_result result ; /* Result code */
2000-05-09 15:43:00 +04:00
2000-06-14 13:58:12 +04:00
/* Fixed length return data */
union {
2002-01-10 14:28:14 +03:00
int interface_version ; /* Try to ensure this is always in the same spot... */
2000-06-14 13:58:12 +04:00
2002-03-29 18:37:39 +03:00
fstring winsresp ; /* WINS response */
2000-06-30 10:48:47 +04:00
/* getpwnam, getpwuid */
2000-06-14 13:58:12 +04:00
2003-07-09 20:44:47 +04:00
struct winbindd_pw pw ;
2000-06-14 13:58:12 +04:00
2000-06-30 10:48:47 +04:00
/* getgrnam, getgrgid */
2000-06-14 13:58:12 +04:00
2003-07-09 20:44:47 +04:00
struct winbindd_gr gr ;
2000-06-14 13:58:12 +04:00
2007-09-13 18:14:02 +04:00
uint32_t num_entries ; /* getpwent, getgrent */
2001-11-21 11:36:43 +03:00
struct winbindd_sid {
2000-07-05 15:24:26 +04:00
fstring sid ; /* lookupname, [ug]id_to_sid */
int type ;
} sid ;
2001-11-21 11:36:43 +03:00
struct winbindd_name {
2002-01-26 12:55:38 +03:00
fstring dom_name ; /* lookupsid */
fstring name ;
2000-06-14 13:58:12 +04:00
int type ;
} name ;
uid_t uid ; /* sid_to_uid */
gid_t gid ; /* sid_to_gid */
2002-01-10 14:28:14 +03:00
struct winbindd_info {
char winbind_separator ;
fstring samba_version ;
} info ;
2002-01-26 12:55:38 +03:00
fstring domain_name ;
2003-01-28 15:07:02 +03:00
fstring netbios_name ;
2005-06-09 02:10:34 +04:00
fstring dc_name ;
2002-02-05 12:40:36 +03:00
struct auth_reply {
2007-09-13 18:14:02 +04:00
uint32_t nt_status ;
2002-02-05 12:40:36 +03:00
fstring nt_status_string ;
fstring error_string ;
int pam_error ;
2004-04-06 12:11:16 +04:00
char user_session_key [ 16 ] ;
2002-08-17 21:00:51 +04:00
char first_8_lm_hash [ 8 ] ;
2006-02-04 01:19:41 +03:00
fstring krb5ccname ;
2007-09-13 18:14:02 +04:00
uint32_t reject_reason ;
uint32_t padding ;
2006-02-04 01:19:41 +03:00
struct policy_settings {
2007-09-13 18:14:02 +04:00
uint32_t min_length_password ;
uint32_t password_history ;
uint32_t password_properties ;
uint32_t padding ;
2006-07-19 00:19:55 +04:00
SMB_TIME_T expire ;
SMB_TIME_T min_passwordage ;
2006-02-04 01:19:41 +03:00
} policy ;
struct info3_text {
2006-07-19 00:19:55 +04:00
SMB_TIME_T logon_time ;
SMB_TIME_T logoff_time ;
SMB_TIME_T kickoff_time ;
SMB_TIME_T pass_last_set_time ;
SMB_TIME_T pass_can_change_time ;
SMB_TIME_T pass_must_change_time ;
2007-09-13 18:14:02 +04:00
uint32_t logon_count ;
uint32_t bad_pw_count ;
uint32_t user_rid ;
uint32_t group_rid ;
uint32_t num_groups ;
uint32_t user_flgs ;
uint32_t acct_flags ;
uint32_t num_other_sids ;
2006-07-19 00:19:55 +04:00
fstring dom_sid ;
2006-02-04 01:19:41 +03:00
fstring user_name ;
fstring full_name ;
fstring logon_script ;
fstring profile_path ;
fstring home_dir ;
fstring dir_drive ;
fstring logon_srv ;
fstring logon_dom ;
} info3 ;
2002-02-05 12:40:36 +03:00
} auth ;
2004-01-04 14:51:31 +03:00
struct {
fstring name ;
fstring alt_name ;
fstring sid ;
2007-09-13 18:14:02 +04:00
bool native_mode ;
bool active_directory ;
bool primary ;
2004-01-04 14:51:31 +03:00
} domain_info ;
2007-09-19 23:05:54 +04:00
uint32_t sequence_number ;
2005-06-09 02:10:34 +04:00
struct {
fstring acct_name ;
fstring full_name ;
2005-06-29 18:03:53 +04:00
fstring homedir ;
fstring shell ;
2007-09-13 18:14:02 +04:00
uint32_t primary_gid ;
uint32_t group_rid ;
2005-06-09 02:10:34 +04:00
} user_info ;
2006-08-19 05:04:54 +04:00
struct {
2007-09-13 18:14:02 +04:00
uint32_t auth_blob_len ; /* blob in extra_data */
2006-08-19 05:04:54 +04:00
} ccache_ntlm_auth ;
2000-06-14 13:58:12 +04:00
} data ;
2000-05-09 15:43:00 +04:00
2000-06-14 13:58:12 +04:00
/* Variable length return data */
2000-05-09 15:43:00 +04:00
2006-04-12 18:10:39 +04:00
union {
2006-07-19 00:19:55 +04:00
SMB_TIME_T padding ;
2006-04-12 18:10:39 +04:00
void * data ;
} extra_data ;
2000-05-09 15:43:00 +04:00
} ;
2006-08-26 06:53:45 +04:00
struct WINBINDD_MEMORY_CREDS {
struct WINBINDD_MEMORY_CREDS * next , * prev ;
const char * username ; /* lookup key. */
2006-08-29 03:01:30 +04:00
uid_t uid ;
2006-08-26 06:53:45 +04:00
int ref_count ;
size_t len ;
2007-09-13 18:14:02 +04:00
uint8_t * nt_hash ; /* Base pointer for the following 2 */
uint8_t * lm_hash ;
2006-08-26 06:53:45 +04:00
char * pass ;
} ;
2006-02-04 01:19:41 +03:00
struct WINBINDD_CCACHE_ENTRY {
2006-08-26 06:53:45 +04:00
struct WINBINDD_CCACHE_ENTRY * next , * prev ;
2006-02-04 01:19:41 +03:00
const char * principal_name ;
const char * ccname ;
const char * service ;
const char * username ;
2006-09-08 04:19:32 +04:00
const char * realm ;
2006-08-26 06:53:45 +04:00
struct WINBINDD_MEMORY_CREDS * cred_ptr ;
int ref_count ;
2006-02-04 01:19:41 +03:00
uid_t uid ;
time_t create_time ;
time_t renew_until ;
time_t refresh_time ;
struct timed_event * event ;
} ;
2000-05-09 15:43:00 +04:00
# endif