/* Editor Settings: expandtabs and use 4 spaces for indentation * ex: set softtabstop=4 tabstop=8 expandtab shiftwidth=4: * * -*- mode: c, c-basic-offset: 4 -*- */ /* * Copyright Likewise Software 2004-2008 * All rights reserved. * * This library is free software; you can redistribute it and/or modify it * under the terms of the GNU Lesser General Public License as published by * the Free Software Foundation; either version 2.1 of the license, or (at * your option) any later version. * * This library is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser * General Public License for more details. You should have received a copy * of the GNU Lesser General Public License along with this program. If * not, see . * * LIKEWISE SOFTWARE MAKES THIS SOFTWARE AVAILABLE UNDER OTHER LICENSING * TERMS AS WELL. IF YOU HAVE ENTERED INTO A SEPARATE LICENSE AGREEMENT * WITH LIKEWISE SOFTWARE, THEN YOU MAY ELECT TO USE THE SOFTWARE UNDER THE * TERMS OF THAT SOFTWARE LICENSE AGREEMENT INSTEAD OF THE TERMS OF THE GNU * LESSER GENERAL PUBLIC LICENSE, NOTWITHSTANDING THE ABOVE NOTICE. IF YOU * HAVE QUESTIONS, OR WISH TO REQUEST A COPY OF THE ALTERNATE LICENSING * TERMS OFFERED BY LIKEWISE SOFTWARE, PLEASE CONTACT LIKEWISE SOFTWARE AT * license@likewisesoftware.com */ /* * Copyright (C) Likewise Software. All rights reserved. * * Module Name: * * nss-user.c * * Abstract: * * Name Server Switch (Likewise LSASS) * * Handle NSS User Information * * Authors: Krishna Ganugapati (krishnag@likewisesoftware.com) * Sriram Nambakam (snambakam@likewisesoftware.com) * Brian Koropoff (bkoropoff@likewisesoftware.com) */ #include "lsanss.h" #include "nss-user.h" typedef struct { nss_backend_t base; LSA_ENUMUSERS_STATE enumUsersState; HANDLE hLsaConnectionPrUsers; } LSA_NSS_PRPASSWD_BACKEND, *PLSA_NSS_PRPASSWD_BACKEND; typedef NSS_STATUS (*NSS_ENTRYPOINT)(nss_backend_t*, void*); static void LsaNssHpuxPasswdToPrpasswd( struct passwd *in, struct pr_passwd *out) { struct pr_default* defaults; defaults = getprdfnam("default"); out->sfld = defaults->prd; out->sflg = defaults->prg; strncpy(out->ufld.fd_name, in->pw_name, 8); out->uflg.fg_name = 1; out->ufld.fd_uid = in->pw_uid; out->uflg.fg_uid = 1; out->ufld.fd_pswduser = in->pw_uid; out->uflg.fg_pswduser = 1; /* FIXME: we need some way to acquire this info */ out->ufld.fd_lock = 0; out->uflg.fg_lock = 1; out->ufld.fd_pw_audid = in->pw_uid + 100; out->uflg.fg_pw_audid = 1; out->ufld.fd_pw_audflg = 1; out->uflg.fg_pw_audflg = 1; // HP-UX requires the encrypted password to be explicitly overwritten for // each user. HP-UX will not honor the fg_encrypt value by falling back to // sfld.fd_encrypt if it is 0. out->ufld.fd_encrypt[0] = '*'; out->ufld.fd_encrypt[1] = 0; out->uflg.fg_encrypt = 1; } static NSS_STATUS LsaNssHpuxPrpasswdDestructor( nss_backend_t* pBackend, void* pArgs) { PLSA_NSS_PRPASSWD_BACKEND pLsaBackend = (PLSA_NSS_PRPASSWD_BACKEND) pBackend; PLSA_ENUMUSERS_STATE pEnumUsersState = &pLsaBackend->enumUsersState; int ret = NSS_STATUS_SUCCESS; LsaNssClearEnumUsersState( &pLsaBackend->hLsaConnectionPrUsers, pEnumUsersState); LwFreeMemory(pBackend); return ret; } static NSS_STATUS LsaNssHpuxPrpasswdSetpwent( nss_backend_t* pBackend, void* pArgs) { PLSA_NSS_PRPASSWD_BACKEND pLsaBackend = (PLSA_NSS_PRPASSWD_BACKEND) pBackend; PLSA_ENUMUSERS_STATE pEnumUsersState = &pLsaBackend->enumUsersState; return LsaNssCommonPasswdSetpwent(&pLsaBackend->hLsaConnectionPrUsers, pEnumUsersState); } static NSS_STATUS LsaNssHpuxPrpasswdGetpwent( nss_backend_t* pBackend, void* pArgs) { PLSA_NSS_PRPASSWD_BACKEND pLsaBackend = (PLSA_NSS_PRPASSWD_BACKEND) pBackend; PLSA_ENUMUSERS_STATE pEnumUsersState = &pLsaBackend->enumUsersState; nss_XbyY_args_t* pXbyYArgs = (nss_XbyY_args_t*) pArgs; comsec_nss_parms_t* pComsecParams = (comsec_nss_parms_t*) pXbyYArgs->buf.result; struct passwd resultUser; char szBuf[2048]; size_t bufLen = sizeof(szBuf); int err = 0; int ret; int* pErrorNumber = &err; ret = LsaNssCommonPasswdGetpwent(&pLsaBackend->hLsaConnectionPrUsers, pEnumUsersState, &resultUser, szBuf, bufLen, pErrorNumber); if (ret == NSS_STATUS_SUCCESS) { LsaNssHpuxPasswdToPrpasswd(&resultUser, pComsecParams->prpw); pXbyYArgs->returnval = pComsecParams->prpw; } else if (ret == NSS_STATUS_TRYAGAIN && err == ERANGE) { pXbyYArgs->erange = 1; } return ret; } static NSS_STATUS LsaNssHpuxPrpasswdEndpwent( nss_backend_t* pBackend, void* pArgs) { PLSA_NSS_PRPASSWD_BACKEND pLsaBackend = (PLSA_NSS_PRPASSWD_BACKEND) pBackend; PLSA_ENUMUSERS_STATE pEnumUsersState = &pLsaBackend->enumUsersState; return LsaNssCommonPasswdEndpwent(&pLsaBackend->hLsaConnectionPrUsers, pEnumUsersState); } static NSS_STATUS LsaNssHpuxPrpasswdGetpwnam( nss_backend_t* pBackend, void* pArgs) { nss_XbyY_args_t* pXbyYArgs = (nss_XbyY_args_t*) pArgs; int ret = NSS_STATUS_SUCCESS; int err = 0; int * pErrorNumber = &err; const char * pszLoginId = pXbyYArgs->key.name; comsec_nss_parms_t* pComsecParams = (comsec_nss_parms_t*) pXbyYArgs->buf.result; struct passwd resultUser; char szBuf[2048]; size_t bufLen = sizeof(szBuf); PLSA_NSS_PRPASSWD_BACKEND pLsaBackend = (PLSA_NSS_PRPASSWD_BACKEND) pBackend; ret = LsaNssCommonPasswdGetpwnam(&pLsaBackend->hLsaConnectionPrUsers, pszLoginId, &resultUser, szBuf, bufLen, pErrorNumber); if (ret == NSS_STATUS_SUCCESS) { LsaNssHpuxPasswdToPrpasswd(&resultUser, pComsecParams->prpw); pXbyYArgs->returnval = pComsecParams->prpw; } return ret; } static NSS_STATUS LsaNssHpuxPrpasswdGetpwuid( nss_backend_t* pBackend, void* pArgs) { nss_XbyY_args_t* pXbyYArgs = (nss_XbyY_args_t*) pArgs; int ret = NSS_STATUS_SUCCESS; int err = 0; int * pErrorNumber = &err; uid_t uid = pXbyYArgs->key.uid; comsec_nss_parms_t* pComsecParams = (comsec_nss_parms_t*) pXbyYArgs->buf.result; struct passwd resultUser; char szBuf[2048]; size_t bufLen = sizeof(szBuf); PLSA_NSS_PRPASSWD_BACKEND pLsaBackend = (PLSA_NSS_PRPASSWD_BACKEND) pBackend; ret = LsaNssCommonPasswdGetpwuid(&pLsaBackend->hLsaConnectionPrUsers, uid, &resultUser, szBuf, bufLen, pErrorNumber); if (ret == NSS_STATUS_SUCCESS) { LsaNssHpuxPasswdToPrpasswd(&resultUser, pComsecParams->prpw); pXbyYArgs->returnval = pComsecParams->prpw; } return ret; } static NSS_ENTRYPOINT LsaNssHpuxPrpasswdOps[] = { LsaNssHpuxPrpasswdDestructor, LsaNssHpuxPrpasswdEndpwent, LsaNssHpuxPrpasswdSetpwent, LsaNssHpuxPrpasswdGetpwent, LsaNssHpuxPrpasswdGetpwnam, LsaNssHpuxPrpasswdGetpwuid }; static nss_backend_t LsaNssHpuxPrpasswdBackend = { .n_ops = 6, .ops = LsaNssHpuxPrpasswdOps }; nss_backend_t* LsaNssHpuxPrpasswdCreateBackend( void ) { PLSA_NSS_PRPASSWD_BACKEND pLsaBackend = NULL; if (LwAllocateMemory(sizeof(*pLsaBackend), (void**) &pLsaBackend)) { return NULL; } pLsaBackend->base = LsaNssHpuxPrpasswdBackend; return (nss_backend_t*) pLsaBackend; }