⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 credentials.c

📁 samba最新软件
💻 C
📖 第 1 页 / 共 2 页
字号:
/*    Unix SMB/CIFS implementation.   User credentials handling   Copyright (C) Jelmer Vernooij 2005   Copyright (C) Tim Potter 2001   Copyright (C) Andrew Bartlett <abartlet@samba.org> 2005      This program is free software; you can redistribute it and/or modify   it under the terms of the GNU General Public License as published by   the Free Software Foundation; either version 3 of the License, or   (at your option) any later version.      This program is distributed in the hope that it will be useful,   but WITHOUT ANY WARRANTY; without even the implied warranty of   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the   GNU General Public License for more details.      You should have received a copy of the GNU General Public License   along with this program.  If not, see <http://www.gnu.org/licenses/>.*/#include "includes.h"#include "librpc/gen_ndr/samr.h" /* for struct samrPassword */#include "auth/credentials/credentials.h"#include "auth/credentials/credentials_krb5.h"#include "libcli/auth/libcli_auth.h"#include "lib/events/events.h"#include "param/param.h"/** * Create a new credentials structure * @param mem_ctx TALLOC_CTX parent for credentials structure  */_PUBLIC_ struct cli_credentials *cli_credentials_init(TALLOC_CTX *mem_ctx) {	struct cli_credentials *cred = talloc(mem_ctx, struct cli_credentials);	if (!cred) {		return cred;	}	cred->netlogon_creds = NULL;	cred->machine_account_pending = false;	cred->workstation_obtained = CRED_UNINITIALISED;	cred->username_obtained = CRED_UNINITIALISED;	cred->password_obtained = CRED_UNINITIALISED;	cred->domain_obtained = CRED_UNINITIALISED;	cred->realm_obtained = CRED_UNINITIALISED;	cred->ccache_obtained = CRED_UNINITIALISED;	cred->client_gss_creds_obtained = CRED_UNINITIALISED;	cred->server_gss_creds_obtained = CRED_UNINITIALISED;	cred->keytab_obtained = CRED_UNINITIALISED;	cred->principal_obtained = CRED_UNINITIALISED;	cred->ccache_threshold = CRED_UNINITIALISED;	cred->client_gss_creds_threshold = CRED_UNINITIALISED;	cred->old_password = NULL;	cred->smb_krb5_context = NULL;	cred->salt_principal = NULL;	cred->machine_account = false;	cred->bind_dn = NULL;	cred->tries = 3;	cred->callback_running = false;	cli_credentials_set_kerberos_state(cred, CRED_AUTO_USE_KERBEROS);	cli_credentials_set_gensec_features(cred, 0);	return cred;}/** * Create a new anonymous credential * @param mem_ctx TALLOC_CTX parent for credentials structure  */_PUBLIC_ struct cli_credentials *cli_credentials_init_anon(TALLOC_CTX *mem_ctx){	struct cli_credentials *anon_credentials;	anon_credentials = cli_credentials_init(mem_ctx);	cli_credentials_set_anonymous(anon_credentials);	return anon_credentials;}_PUBLIC_ void cli_credentials_set_kerberos_state(struct cli_credentials *creds, 					enum credentials_use_kerberos use_kerberos){	creds->use_kerberos = use_kerberos;}_PUBLIC_ enum credentials_use_kerberos cli_credentials_get_kerberos_state(struct cli_credentials *creds){	return creds->use_kerberos;}_PUBLIC_ void cli_credentials_set_gensec_features(struct cli_credentials *creds, uint32_t gensec_features){	creds->gensec_features = gensec_features;}_PUBLIC_ uint32_t cli_credentials_get_gensec_features(struct cli_credentials *creds){	return creds->gensec_features;}/** * Obtain the username for this credentials context. * @param cred credentials context * @retval The username set on this context. * @note Return value will never be NULL except by programmer error. */_PUBLIC_ const char *cli_credentials_get_username(struct cli_credentials *cred){	if (cred->machine_account_pending) {		cli_credentials_set_machine_account(cred, 					cred->machine_account_pending_lp_ctx);	}	if (cred->username_obtained == CRED_CALLBACK && 	    !cred->callback_running) {	    	cred->callback_running = true;		cred->username = cred->username_cb(cred);	    	cred->callback_running = false;		cred->username_obtained = CRED_SPECIFIED;		cli_credentials_invalidate_ccache(cred, cred->username_obtained);	}	return cred->username;}_PUBLIC_ bool cli_credentials_set_username(struct cli_credentials *cred, 				  const char *val, enum credentials_obtained obtained){	if (obtained >= cred->username_obtained) {		cred->username = talloc_strdup(cred, val);		cred->username_obtained = obtained;		cli_credentials_invalidate_ccache(cred, cred->username_obtained);		return true;	}	return false;}bool cli_credentials_set_username_callback(struct cli_credentials *cred,				  const char *(*username_cb) (struct cli_credentials *)){	if (cred->username_obtained < CRED_CALLBACK) {		cred->username_cb = username_cb;		cred->username_obtained = CRED_CALLBACK;		return true;	}	return false;}_PUBLIC_ bool cli_credentials_set_bind_dn(struct cli_credentials *cred, 				 const char *bind_dn){	cred->bind_dn = talloc_strdup(cred, bind_dn);	return true;}/** * Obtain the BIND DN for this credentials context. * @param cred credentials context * @retval The username set on this context. * @note Return value will be NULL if not specified explictly */_PUBLIC_ const char *cli_credentials_get_bind_dn(struct cli_credentials *cred){	return cred->bind_dn;}/** * Obtain the client principal for this credentials context. * @param cred credentials context * @retval The username set on this context. * @note Return value will never be NULL except by programmer error. */_PUBLIC_ const char *cli_credentials_get_principal(struct cli_credentials *cred, TALLOC_CTX *mem_ctx){	if (cred->machine_account_pending) {		cli_credentials_set_machine_account(cred,					cred->machine_account_pending_lp_ctx);	}	if (cred->principal_obtained == CRED_CALLBACK && 	    !cred->callback_running) {	    	cred->callback_running = true;		cred->principal = cred->principal_cb(cred);	    	cred->callback_running = false;		cred->principal_obtained = CRED_SPECIFIED;		cli_credentials_invalidate_ccache(cred, cred->principal_obtained);	}	if (cred->principal_obtained < cred->username_obtained) {		if (cred->domain_obtained > cred->realm_obtained) {			return talloc_asprintf(mem_ctx, "%s@%s", 					       cli_credentials_get_username(cred),					       cli_credentials_get_domain(cred));		} else {			return talloc_asprintf(mem_ctx, "%s@%s", 					       cli_credentials_get_username(cred),					       cli_credentials_get_realm(cred));		}	}	return talloc_reference(mem_ctx, cred->principal);}bool cli_credentials_set_principal(struct cli_credentials *cred, 				   const char *val, 				   enum credentials_obtained obtained){	if (obtained >= cred->principal_obtained) {		cred->principal = talloc_strdup(cred, val);		cred->principal_obtained = obtained;		cli_credentials_invalidate_ccache(cred, cred->principal_obtained);		return true;	}	return false;}/* Set a callback to get the principal.  This could be a popup dialog, * a terminal prompt or similar.  */bool cli_credentials_set_principal_callback(struct cli_credentials *cred,				  const char *(*principal_cb) (struct cli_credentials *)){	if (cred->principal_obtained < CRED_CALLBACK) {		cred->principal_cb = principal_cb;		cred->principal_obtained = CRED_CALLBACK;		return true;	}	return false;}/* Some of our tools are 'anonymous by default'.  This is a single * function to determine if authentication has been explicitly * requested */_PUBLIC_ bool cli_credentials_authentication_requested(struct cli_credentials *cred) {	if (cred->bind_dn) {		return true;	}	if (cli_credentials_is_anonymous(cred)){		return false;	}	if (cred->principal_obtained >= CRED_SPECIFIED) {		return true;	}	if (cred->username_obtained >= CRED_SPECIFIED) {		return true;	}	if (cli_credentials_get_kerberos_state(cred) == CRED_MUST_USE_KERBEROS) {		return true;	}	return false;}/** * Obtain the password for this credentials context. * @param cred credentials context * @retval If set, the cleartext password, otherwise NULL */_PUBLIC_ const char *cli_credentials_get_password(struct cli_credentials *cred){	if (cred->machine_account_pending) {		cli_credentials_set_machine_account(cred,						    cred->machine_account_pending_lp_ctx);	}	if (cred->password_obtained == CRED_CALLBACK && 	    !cred->callback_running) {	    	cred->callback_running = true;		cred->password = cred->password_cb(cred);	    	cred->callback_running = false;		cred->password_obtained = CRED_CALLBACK_RESULT;		cli_credentials_invalidate_ccache(cred, cred->password_obtained);	}	return cred->password;}/* Set a password on the credentials context, including an indication * of 'how' the password was obtained */_PUBLIC_ bool cli_credentials_set_password(struct cli_credentials *cred, 				  const char *val, 				  enum credentials_obtained obtained){	if (obtained >= cred->password_obtained) {		cred->password = talloc_strdup(cred, val);		cred->password_obtained = obtained;		cli_credentials_invalidate_ccache(cred, cred->password_obtained);		cred->nt_hash = NULL;		cred->lm_response = data_blob(NULL, 0);		cred->nt_response = data_blob(NULL, 0);		return true;	}	return false;}_PUBLIC_ bool cli_credentials_set_password_callback(struct cli_credentials *cred,					   const char *(*password_cb) (struct cli_credentials *)){	if (cred->password_obtained < CRED_CALLBACK) {		cred->password_cb = password_cb;		cred->password_obtained = CRED_CALLBACK;		cli_credentials_invalidate_ccache(cred, cred->password_obtained);		return true;	}	return false;}/** * Obtain the 'old' password for this credentials context (used for join accounts). * @param cred credentials context * @retval If set, the cleartext password, otherwise NULL */const char *cli_credentials_get_old_password(struct cli_credentials *cred){	if (cred->machine_account_pending) {		cli_credentials_set_machine_account(cred,						    cred->machine_account_pending_lp_ctx);	}	return cred->old_password;}bool cli_credentials_set_old_password(struct cli_credentials *cred, 				      const char *val, 				      enum credentials_obtained obtained){	cred->old_password = talloc_strdup(cred, val);	return true;}/** * Obtain the password, in the form MD4(unicode(password)) for this credentials context. * * Sometimes we only have this much of the password, while the rest of * the time this call avoids calling E_md4hash themselves. * * @param cred credentials context * @retval If set, the cleartext password, otherwise NULL */_PUBLIC_ const struct samr_Password *cli_credentials_get_nt_hash(struct cli_credentials *cred, 							TALLOC_CTX *mem_ctx){	const char *password = cli_credentials_get_password(cred);	if (password) {		struct samr_Password *nt_hash = talloc(mem_ctx, struct samr_Password);		if (!nt_hash) {			return NULL;		}				E_md4hash(password, nt_hash->hash);    		return nt_hash;	} else {		return cred->nt_hash;	}}/**

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -