bool login_cache_delentry(const struct samu *sampass) { int ret; char *keystr; if (!login_cache_init()) return False; if (pdb_get_nt_username(sampass) == NULL) { return False; } keystr = SMB_STRDUP(pdb_get_nt_username(sampass)); if (!keystr || !keystr[0]) { SAFE_FREE(keystr); return False; } DEBUG(9, ("About to delete entry for %s\n", keystr)); ret = tdb_delete_bystring(cache, keystr); DEBUG(9, ("tdb_delete returned %d\n", ret)); SAFE_FREE(keystr); return ret == 0; }
BOOL login_cache_delentry(const struct samu *sampass) { int ret; TDB_DATA keybuf; if (!login_cache_init()) return False; if (pdb_get_nt_username(sampass) == NULL) { return False; } keybuf.dptr = SMB_STRDUP(pdb_get_nt_username(sampass)); if (!keybuf.dptr || !strlen(keybuf.dptr)) { SAFE_FREE(keybuf.dptr); return False; } keybuf.dsize = strlen(keybuf.dptr) + 1; DEBUG(9, ("About to delete entry for %s\n", keybuf.dptr)); ret = tdb_delete(cache, keybuf); DEBUG(9, ("tdb_delete returned %d\n", ret)); SAFE_FREE(keybuf.dptr); return ret == 0; }
/* if we can't read the cache, oh well, no need to return anything */ bool login_cache_read(struct samu *sampass, struct login_cache *entry) { char *keystr; TDB_DATA databuf; uint32_t entry_timestamp = 0, bad_password_time = 0; uint16_t acct_ctrl; if (!login_cache_init()) { return false; } if (pdb_get_nt_username(sampass) == NULL) { return false; } keystr = SMB_STRDUP(pdb_get_nt_username(sampass)); if (!keystr || !keystr[0]) { SAFE_FREE(keystr); return false; } DEBUG(7, ("Looking up login cache for user %s\n", keystr)); databuf = tdb_fetch_bystring(cache, keystr); SAFE_FREE(keystr); ZERO_STRUCTP(entry); if (tdb_unpack (databuf.dptr, databuf.dsize, SAM_CACHE_FORMAT, &entry_timestamp, &acct_ctrl, &entry->bad_password_count, &bad_password_time) == -1) { DEBUG(7, ("No cache entry found\n")); SAFE_FREE(databuf.dptr); return false; } /* * Deal with 32-bit acct_ctrl. In the tdb we only store 16-bit * ("w" in SAM_CACHE_FORMAT). Fixes bug 7253. */ entry->acct_ctrl = acct_ctrl; /* Deal with possible 64-bit time_t. */ entry->entry_timestamp = (time_t)entry_timestamp; entry->bad_password_time = (time_t)bad_password_time; SAFE_FREE(databuf.dptr); DEBUG(5, ("Found login cache entry: timestamp %12u, flags 0x%x, count %d, time %12u\n", (unsigned int)entry->entry_timestamp, entry->acct_ctrl, entry->bad_password_count, (unsigned int)entry->bad_password_time)); return true; }
bool login_cache_write(const struct samu *sampass, const struct login_cache *entry) { char *keystr; TDB_DATA databuf; bool ret; uint32_t entry_timestamp; uint32_t bad_password_time = entry->bad_password_time; if (!login_cache_init()) return False; if (pdb_get_nt_username(sampass) == NULL) { return False; } keystr = SMB_STRDUP(pdb_get_nt_username(sampass)); if (!keystr || !keystr[0]) { SAFE_FREE(keystr); return False; } entry_timestamp = (uint32_t)time(NULL); databuf.dsize = tdb_pack(NULL, 0, SAM_CACHE_FORMAT, entry_timestamp, entry->acct_ctrl, entry->bad_password_count, bad_password_time); databuf.dptr = SMB_MALLOC_ARRAY(uint8_t, databuf.dsize); if (!databuf.dptr) { SAFE_FREE(keystr); return False; } if (tdb_pack(databuf.dptr, databuf.dsize, SAM_CACHE_FORMAT, entry_timestamp, entry->acct_ctrl, entry->bad_password_count, bad_password_time) != databuf.dsize) { SAFE_FREE(keystr); SAFE_FREE(databuf.dptr); return False; } ret = tdb_store_bystring(cache, keystr, databuf, 0); SAFE_FREE(keystr); SAFE_FREE(databuf.dptr); return ret == 0; }
BOOL login_cache_write(const struct samu *sampass, LOGIN_CACHE entry) { TDB_DATA keybuf, databuf; BOOL ret; if (!login_cache_init()) return False; if (pdb_get_nt_username(sampass) == NULL) { return False; } keybuf.dptr = SMB_STRDUP(pdb_get_nt_username(sampass)); if (!keybuf.dptr || !strlen(keybuf.dptr)) { SAFE_FREE(keybuf.dptr); return False; } keybuf.dsize = strlen(keybuf.dptr) + 1; entry.entry_timestamp = time(NULL); databuf.dsize = tdb_pack(NULL, 0, SAM_CACHE_FORMAT, entry.entry_timestamp, entry.acct_ctrl, entry.bad_password_count, entry.bad_password_time); databuf.dptr = SMB_MALLOC_ARRAY(char, databuf.dsize); if (!databuf.dptr) { SAFE_FREE(keybuf.dptr); return False; } if (tdb_pack(databuf.dptr, databuf.dsize, SAM_CACHE_FORMAT, entry.entry_timestamp, entry.acct_ctrl, entry.bad_password_count, entry.bad_password_time) != databuf.dsize) { SAFE_FREE(keybuf.dptr); SAFE_FREE(databuf.dptr); return False; } ret = tdb_store(cache, keybuf, databuf, 0); SAFE_FREE(keybuf.dptr); SAFE_FREE(databuf.dptr); return ret == 0; }
/* if we can't read the cache, oh well, no need to return anything */ LOGIN_CACHE * login_cache_read(struct samu *sampass) { char *keystr; TDB_DATA databuf; LOGIN_CACHE *entry; if (!login_cache_init()) return NULL; if (pdb_get_nt_username(sampass) == NULL) { return NULL; } keystr = SMB_STRDUP(pdb_get_nt_username(sampass)); if (!keystr || !keystr[0]) { SAFE_FREE(keystr); return NULL; } DEBUG(7, ("Looking up login cache for user %s\n", keystr)); databuf = tdb_fetch_bystring(cache, keystr); SAFE_FREE(keystr); if (!(entry = SMB_MALLOC_P(LOGIN_CACHE))) { DEBUG(1, ("Unable to allocate cache entry buffer!\n")); SAFE_FREE(databuf.dptr); return NULL; } if (tdb_unpack (databuf.dptr, databuf.dsize, SAM_CACHE_FORMAT, &entry->entry_timestamp, &entry->acct_ctrl, &entry->bad_password_count, &entry->bad_password_time) == -1) { DEBUG(7, ("No cache entry found\n")); SAFE_FREE(entry); SAFE_FREE(databuf.dptr); return NULL; } SAFE_FREE(databuf.dptr); DEBUG(5, ("Found login cache entry: timestamp %12u, flags 0x%x, count %d, time %12u\n", (unsigned int)entry->entry_timestamp, entry->acct_ctrl, entry->bad_password_count, (unsigned int)entry->bad_password_time)); return entry; }