mirror of
https://github.com/samba-team/samba.git
synced 2025-02-04 17:47:26 +03:00
Start merging mimir's trusted domain code from HEAD to 3.0. (for HEAD trusting
NT).
This commit is contained in:
parent
d4262c37f1
commit
76cd4a8901
@ -59,14 +59,14 @@ struct machine_acct_pass {
|
||||
/*
|
||||
* storage structure for trusted domain
|
||||
*/
|
||||
struct trusted_dom_pass {
|
||||
typedef struct trusted_dom_pass {
|
||||
size_t uni_name_len;
|
||||
smb_ucs2_t uni_name[32]; /* unicode domain name */
|
||||
size_t pass_len;
|
||||
fstring pass; /* trust relationship's password */
|
||||
time_t mod_time;
|
||||
DOM_SID domain_sid; /* remote domain's sid */
|
||||
};
|
||||
} TRUSTED_DOM_PASS;
|
||||
|
||||
/*
|
||||
* trusted domain entry/entries returned by secrets_get_trusted_domains
|
||||
|
@ -387,6 +387,7 @@ BOOL tdb_change_uint32_atomic(TDB_CONTEXT *tdb, const char *keystr, uint32 *oldv
|
||||
size_t tdb_pack(char *buf, int bufsize, const char *fmt, ...)
|
||||
{
|
||||
va_list ap;
|
||||
uint8 bt;
|
||||
uint16 w;
|
||||
uint32 d;
|
||||
int i;
|
||||
@ -402,40 +403,46 @@ size_t tdb_pack(char *buf, int bufsize, const char *fmt, ...)
|
||||
|
||||
while (*fmt) {
|
||||
switch ((c = *fmt++)) {
|
||||
case 'w':
|
||||
case 'b': /* unsigned 8-bit integer */
|
||||
len = 1;
|
||||
bt = (uint8)va_arg(ap, int);
|
||||
if (bufsize && bufsize >= len)
|
||||
SSVAL(buf, 0, bt);
|
||||
break;
|
||||
case 'w': /* unsigned 16-bit integer */
|
||||
len = 2;
|
||||
w = (uint16)va_arg(ap, int);
|
||||
if (bufsize && bufsize >= len)
|
||||
SSVAL(buf, 0, w);
|
||||
break;
|
||||
case 'd':
|
||||
case 'd': /* signed 32-bit integer (standard int in most systems) */
|
||||
len = 4;
|
||||
d = va_arg(ap, uint32);
|
||||
if (bufsize && bufsize >= len)
|
||||
SIVAL(buf, 0, d);
|
||||
break;
|
||||
case 'p':
|
||||
case 'p': /* pointer */
|
||||
len = 4;
|
||||
p = va_arg(ap, void *);
|
||||
d = p?1:0;
|
||||
if (bufsize && bufsize >= len)
|
||||
SIVAL(buf, 0, d);
|
||||
break;
|
||||
case 'P':
|
||||
case 'P': /* null-terminated string */
|
||||
s = va_arg(ap,char *);
|
||||
w = strlen(s);
|
||||
len = w + 1;
|
||||
if (bufsize && bufsize >= len)
|
||||
memcpy(buf, s, len);
|
||||
break;
|
||||
case 'f':
|
||||
case 'f': /* null-terminated string */
|
||||
s = va_arg(ap,char *);
|
||||
w = strlen(s);
|
||||
len = w + 1;
|
||||
if (bufsize && bufsize >= len)
|
||||
memcpy(buf, s, len);
|
||||
break;
|
||||
case 'B':
|
||||
case 'B': /* fixed-length string */
|
||||
i = va_arg(ap, int);
|
||||
s = va_arg(ap, char *);
|
||||
len = 4+i;
|
||||
@ -474,6 +481,7 @@ size_t tdb_pack(char *buf, int bufsize, const char *fmt, ...)
|
||||
int tdb_unpack(char *buf, int bufsize, const char *fmt, ...)
|
||||
{
|
||||
va_list ap;
|
||||
uint8 *bt;
|
||||
uint16 *w;
|
||||
uint32 *d;
|
||||
int len;
|
||||
@ -489,6 +497,13 @@ int tdb_unpack(char *buf, int bufsize, const char *fmt, ...)
|
||||
|
||||
while (*fmt) {
|
||||
switch ((c=*fmt++)) {
|
||||
case 'b':
|
||||
len = 1;
|
||||
bt = va_arg(ap, uint8 *);
|
||||
if (bufsize < len)
|
||||
goto no_space;
|
||||
*bt = SVAL(buf, 0);
|
||||
break;
|
||||
case 'w':
|
||||
len = 2;
|
||||
w = va_arg(ap, uint16 *);
|
||||
@ -566,6 +581,130 @@ int tdb_unpack(char *buf, int bufsize, const char *fmt, ...)
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
* Pack SID passed by pointer
|
||||
*
|
||||
* @param pack_buf pointer to buffer which is to be filled with packed data
|
||||
* @param bufsize size of packing buffer
|
||||
* @param sid pointer to sid to be packed
|
||||
*
|
||||
* @return length of the packed representation of the whole structure
|
||||
**/
|
||||
size_t tdb_sid_pack(char* pack_buf, int bufsize, DOM_SID* sid)
|
||||
{
|
||||
int idx;
|
||||
size_t len = 0;
|
||||
|
||||
if (!sid || !pack_buf) return -1;
|
||||
|
||||
len += tdb_pack(pack_buf + len, bufsize - len, "bb", sid->sid_rev_num,
|
||||
sid->num_auths);
|
||||
|
||||
for (idx = 0; idx < 6; idx++) {
|
||||
len += tdb_pack(pack_buf + len, bufsize - len, "b", sid->id_auth[idx]);
|
||||
}
|
||||
|
||||
for (idx = 0; idx < MAXSUBAUTHS; idx++) {
|
||||
len += tdb_pack(pack_buf + len, bufsize - len, "d", sid->sub_auths[idx]);
|
||||
}
|
||||
|
||||
return len;
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
* Unpack SID into a pointer
|
||||
*
|
||||
* @param pack_buf pointer to buffer with packed representation
|
||||
* @param bufsize size of the buffer
|
||||
* @param sid pointer to sid structure to be filled with unpacked data
|
||||
*
|
||||
* @return size of structure unpacked from buffer
|
||||
**/
|
||||
size_t tdb_sid_unpack(char* pack_buf, int bufsize, DOM_SID* sid)
|
||||
{
|
||||
int idx, len = 0;
|
||||
|
||||
if (!sid || !pack_buf) return -1;
|
||||
|
||||
len += tdb_unpack(pack_buf + len, bufsize - len, "bb",
|
||||
&sid->sid_rev_num, &sid->num_auths);
|
||||
|
||||
for (idx = 0; idx < 6; idx++) {
|
||||
len += tdb_unpack(pack_buf + len, bufsize - len, "b", &sid->id_auth[idx]);
|
||||
}
|
||||
|
||||
for (idx = 0; idx < MAXSUBAUTHS; idx++) {
|
||||
len += tdb_unpack(pack_buf + len, bufsize - len, "d", &sid->sub_auths[idx]);
|
||||
}
|
||||
|
||||
return len;
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
* Pack TRUSTED_DOM_PASS passed by pointer
|
||||
*
|
||||
* @param pack_buf pointer to buffer which is to be filled with packed data
|
||||
* @param bufsize size of the buffer
|
||||
* @param pass pointer to trusted domain password to be packed
|
||||
*
|
||||
* @return length of the packed representation of the whole structure
|
||||
**/
|
||||
size_t tdb_trusted_dom_pass_pack(char* pack_buf, int bufsize, TRUSTED_DOM_PASS* pass)
|
||||
{
|
||||
int idx, len = 0;
|
||||
|
||||
if (!pack_buf || !pass) return -1;
|
||||
|
||||
/* packing unicode domain name and password */
|
||||
len += tdb_pack(pack_buf + len, bufsize - len, "d", pass->uni_name_len);
|
||||
|
||||
for (idx = 0; idx < 32; idx++)
|
||||
len += tdb_pack(pack_buf + len, bufsize - len, "w", pass->uni_name[idx]);
|
||||
|
||||
len += tdb_pack(pack_buf + len, bufsize - len, "dPd", pass->pass_len,
|
||||
pass->pass, pass->mod_time);
|
||||
|
||||
/* packing SID structure */
|
||||
len += tdb_sid_pack(pack_buf + len, bufsize - len, &pass->domain_sid);
|
||||
|
||||
return len;
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
* Unpack TRUSTED_DOM_PASS passed by pointer
|
||||
*
|
||||
* @param pack_buf pointer to buffer with packed representation
|
||||
* @param bufsize size of the buffer
|
||||
* @param pass pointer to trusted domain password to be filled with unpacked data
|
||||
*
|
||||
* @return size of structure unpacked from buffer
|
||||
**/
|
||||
size_t tdb_trusted_dom_pass_unpack(char* pack_buf, int bufsize, TRUSTED_DOM_PASS* pass)
|
||||
{
|
||||
int idx, len = 0;
|
||||
|
||||
if (!pack_buf || !pass) return -1;
|
||||
|
||||
/* unpack unicode domain name and plaintext password */
|
||||
len += tdb_unpack(pack_buf, bufsize - len, "d", &pass->uni_name_len);
|
||||
|
||||
for (idx = 0; idx < 32; idx++)
|
||||
len += tdb_unpack(pack_buf + len, bufsize - len, "w", &pass->uni_name[idx]);
|
||||
|
||||
len += tdb_unpack(pack_buf + len, bufsize - len, "dPd", &pass->pass_len, &pass->pass,
|
||||
&pass->mod_time);
|
||||
|
||||
/* unpack domain sid */
|
||||
len += tdb_sid_unpack(pack_buf + len, bufsize - len, &pass->domain_sid);
|
||||
|
||||
return len;
|
||||
}
|
||||
|
||||
|
||||
/****************************************************************************
|
||||
Log tdb messages via DEBUG().
|
||||
****************************************************************************/
|
||||
|
Loading…
x
Reference in New Issue
Block a user