⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 vactivedir.c

📁 相当优秀的 UNIX 进程管理工具
💻 C
📖 第 1 页 / 共 2 页
字号:
/* * $Id: vactivedir.c,v 1.10 2004/01/07 16:06:16 tomcollins Exp $ * Copyright (C) 1999-2003 Inter7 Internet Technologies, Inc. * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA */#include <stdio.h>#include <stdlib.h>#include <sys/stat.h>#include <fcntl.h>#include <unistd.h>#include <string.h>#include <pwd.h>#include <sys/time.h>#include <time.h>#include <utime.h>#include <sys/types.h>#include <sys/socket.h>#include <sys/time.h>#include <netinet/in.h>#include <arpa/inet.h>#include <sys/un.h>#include "config.h"#include "vpopmail.h"#include "vauth.h"#include "vlimits.h"#include "file_lock.h"#include "vactivedir.h"#define MAX_BUFF 300#define PACKET_SIZE 388#define SMALL_BUFF 200static char IUser[SMALL_BUFF];static char IPass[SMALL_BUFF];static char IGecos[SMALL_BUFF];static char IDir[SMALL_BUFF];static char IShell[SMALL_BUFF];static char IClearPass[SMALL_BUFF];char *dc_filename(char *domain, uid_t uid, gid_t gid);typedef struct actdirvp {  char cmd[16];  char p1[16];  char p2[16];  char p3[16];  char pw_name[32];  char pw_domain[64];  char pw_uid[16];  char pw_gid[16];  char pw_dir[160];  char pw_shell[20];  char pw_clear_passwd[16];  char pw_gecos[48];} actdirvp;static int GetAllSock = -1;int ad_open_conn(){ int sock; struct sockaddr_in sin;  sock = socket(AF_INET,SOCK_STREAM,0);  if ( sock == -1 ) return(-1);  memset(&sin,0,sizeof(struct sockaddr_in));  sin.sin_family = AF_INET;  sin.sin_port = htons(ACTIVE_DIR_PORT);  sin.sin_addr.s_addr = inet_addr(ACTIVE_DIR_IP);  if (connect(sock,(struct sockaddr *)&sin,sizeof(struct sockaddr_in))==-1){    close(sock);    return(-1);  }  return(sock);}void inline ad_clean_one(char *inp, int len){ int i;  inp[len-1] = 0;  for(i=len-2;i>=0;--i){    if ( inp[i] == ' ' ) inp[i] = 0;    else break;  }}void ad_clean_packet(struct actdirvp *adir){  /*memmove(adir,&adir->cmd[4], PACKET_SIZE-4);*/  ad_clean_one(adir->cmd, 16);  ad_clean_one(adir->p1, 16);  ad_clean_one(adir->p2, 16);  ad_clean_one(adir->p3, 16);  ad_clean_one(adir->pw_name, 32);  ad_clean_one(adir->pw_domain, 64);  ad_clean_one(adir->pw_uid, 16);  ad_clean_one(adir->pw_gid, 16);  ad_clean_one(adir->pw_gecos, 48);  ad_clean_one(adir->pw_dir, 160);  ad_clean_one(adir->pw_shell, 20);  ad_clean_one(adir->pw_clear_passwd, 16);}void ad_fill_vpw( struct vqpasswd *vpw, struct actdirvp *adir){  vpw->pw_name   = IUser;  vpw->pw_passwd = IPass;  vpw->pw_gecos  = IGecos;  vpw->pw_dir    = IDir;  vpw->pw_shell  = IShell;  vpw->pw_clear_passwd  = IClearPass;  strncpy(vpw->pw_name, adir->pw_name, 32);  memset(vpw->pw_passwd,0,sizeof(IPass));  vpw->pw_uid = atoi(adir->pw_uid);  vpw->pw_gid = atoi(adir->pw_gid);  strncpy(vpw->pw_gecos, adir->pw_gecos, 48);  strncpy(vpw->pw_dir, adir->pw_dir, 160);  strncpy(vpw->pw_shell, adir->pw_shell, 20);  strncpy(vpw->pw_clear_passwd, adir->pw_clear_passwd, 16);}void ad_print_packet(struct actdirvp *adir){  printf("cmd: |%-16s|\n", adir->cmd);  printf("p1: |%-16s|\n", adir->p1);  printf("p2: |%-16s|\n", adir->p2);  printf("p3: |%-16s|\n", adir->p3);  printf("name: |%-32s|\n", adir->pw_name);  printf("domain: |%-32s|\n", adir->pw_domain);  printf("gecos: |%-48s|\n", adir->pw_gecos);  printf("uid: |%-16s|\n", adir->pw_uid);  printf("gid: |%-16s|\n", adir->pw_gid);  printf("dir: |%-160s|\n", adir->pw_dir);  printf("shell: |%-20s|\n", adir->pw_shell);  printf("clear passwd: |%-16s|\n", adir->pw_clear_passwd);}struct vqpasswd *vauth_getpw(char *user, char *domain){ static struct vqpasswd vpw; static struct actdirvp adir; int sock;  if ( (sock=ad_open_conn())==-1){    printf("could not connect\n");    return(NULL);  }  memset(&adir,' ',sizeof(struct actdirvp));  memcpy( adir.cmd, "select", 6);  memcpy( adir.pw_name, user, strlen(user));  memcpy( adir.pw_domain, domain, strlen(domain));  if ( write(sock,&adir, sizeof(struct actdirvp))<0){    close(sock);    printf("vauth_getpw: write failed\n");    return(NULL);  }  if ( read(sock,&adir, sizeof(struct actdirvp))<0) {    close(sock);    printf("vauth_getpw: read failed\n");    return(NULL);  }  ad_clean_packet(&adir);  close(sock);  if ( strncmp(adir.p1,"yes",3) != 0 ) return(NULL);     ad_fill_vpw(&vpw,&adir);  vlimits_setflags (&vpw, domain);    return(&vpw);}struct vqpasswd *vauth_getall(char *domain, int first, int sortit){ static struct vqpasswd vpw; static struct actdirvp adir; char foob[4]; int size;  if ( first == 1 ) {    if ( GetAllSock != -1 ) close(GetAllSock);    if ( (GetAllSock=ad_open_conn())==-1){      printf("could not connect\n");      return(NULL);    }    memset(&adir,' ',sizeof(struct actdirvp));    memcpy( adir.cmd, "getall", 6);    memcpy( adir.pw_domain, domain, strlen(domain));      if ( write(GetAllSock,&adir, sizeof(struct actdirvp))<0){      close(GetAllSock);      GetAllSock = -1;      return(NULL);    }  }  if ( GetAllSock == -1 ) return(NULL);    memset(&adir,' ',sizeof(struct actdirvp));  if ( (size=read(GetAllSock,&adir, sizeof(struct actdirvp)))<0) {    close(GetAllSock);    GetAllSock = -1;    return(NULL);  }  if ( first == 1 ) read(GetAllSock, foob,4);  ad_clean_packet(&adir);  if ( strncmp(adir.p1,"yes",3) != 0 ) {    close(GetAllSock);    GetAllSock = -1;    return(NULL);   }    ad_fill_vpw(&vpw,&adir);  return(&vpw);}void vauth_end_getall(){  if ( GetAllSock !=  -1 ) {    close(GetAllSock);    GetAllSock = -1;  }}int vauth_adduser(char *user, char *domain, char *pass, char *gecos,                   char *dir, int apop ){ static struct actdirvp adir; int sock; char tmpbuf[160]; char dom_dir[160];  if ( (sock=ad_open_conn())==-1){    printf("could not connect\n");    return(-1);  }  memset(&adir,' ',sizeof(struct actdirvp));  memcpy( adir.cmd, "create", 6);  memcpy( adir.pw_name, user, strlen(user));  memcpy( adir.pw_domain, domain, strlen(domain));  memcpy( adir.pw_clear_passwd, pass, strlen(pass));  memcpy( adir.pw_gecos, gecos, strlen(gecos));  if ( apop == USE_POP ) memcpy( adir.pw_uid, "1", 1);  else memcpy( adir.pw_uid, "2", 1);  memcpy( adir.pw_gid, "0", 1);  vget_assign(domain, dom_dir, 160, NULL, NULL);  if ( strlen(dir) > 0 ) {    snprintf(tmpbuf,160, "%s/%s/%s", dom_dir, dir, user);  } else {    snprintf(tmpbuf, 160, "%s/%s", dom_dir, user);  }  memcpy( adir.pw_dir, tmpbuf, strlen(tmpbuf));  memcpy( adir.pw_shell, "NOQUOTA", 7);  /*ad_print_packet(&adir);*/  if ( write(sock,&adir, sizeof(struct actdirvp))<0){    close(sock);    printf("write failed\n");    return(-1);  }  if ( read(sock,&adir, sizeof(struct actdirvp))<0) {    close(sock);    printf("read failed\n");    return(-1);  }  ad_clean_packet(&adir);  close(sock);  if ( strncmp(adir.p1,"yes",3) != 0 ) return(-1);   return(0);}int vauth_adddomain( char *domain ){  return(0);}int vauth_deldomain( char *domain ){  return(0);}int vauth_deluser( char *user, char *domain ){ static struct actdirvp adir; int sock;  if ( (sock=ad_open_conn())==-1){    printf("could not connect\n");    return(-1);  }  memset(&adir,' ',sizeof(struct actdirvp));  memcpy( adir.cmd, "delete", 6);  memcpy( adir.pw_name, user, strlen(user));  memcpy( adir.pw_domain, domain, strlen(domain));  if ( write(sock,&adir, sizeof(struct actdirvp))<0){    close(sock);    printf("write failed\n");    return(-1);  }  if ( read(sock,&adir, sizeof(struct actdirvp))<0) {    close(sock);    printf("read failed\n");    return(-1);  }  ad_clean_packet(&adir);  close(sock);  if ( strncmp(adir.p1,"yes",3) != 0 ) return(-1);   return(0);}/* Utility function to set the users quota * * Calls underlying vauth_getpw and vauth_setpw * to actually change the users information */int vauth_setquota( char *username, char *domain, char *quota){ struct vqpasswd *vpw;  vpw = vauth_getpw( username, domain );  if ( vpw==NULL ) return(VA_USER_DOES_NOT_EXIST);  vpw->pw_shell = quota;  return(vauth_setpw(vpw,domain));}int vauth_setpw( struct vqpasswd *vpw, char *domain ) { static struct actdirvp adir; int sock; char tmpbuf[160];  if ( (sock=ad_open_conn())==-1){    printf("could not connect\n");    return(-1);  }  memset(&adir,' ',sizeof(struct actdirvp));  memcpy( adir.cmd, "update", 6);  memcpy( adir.pw_name, vpw->pw_name, strlen(vpw->pw_name));  memcpy( adir.pw_domain, domain, strlen(domain));  memcpy( adir.pw_gecos, vpw->pw_gecos, strlen(vpw->pw_gecos));  snprintf(tmpbuf,16,"%d", vpw->pw_uid);  memcpy( adir.pw_uid, tmpbuf, strlen(tmpbuf));  snprintf(tmpbuf,16,"%d", vpw->pw_gid);  memcpy( adir.pw_gid, tmpbuf, strlen(tmpbuf));  memcpy( adir.pw_dir, vpw->pw_dir, strlen(vpw->pw_dir));  memcpy( adir.pw_shell, vpw->pw_shell, strlen(vpw->pw_shell));  memcpy( adir.pw_clear_passwd, vpw->pw_clear_passwd,           strlen(vpw->pw_clear_passwd));  if ( write(sock,&adir, sizeof(struct actdirvp))<0){    close(sock);    printf("write failed\n");    return(-1);  }  if ( read(sock,&adir, sizeof(struct actdirvp))<0) {    close(sock);    printf("read failed\n");    return(-1);

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -