/** * WinPR: Windows Portable Runtime * Security Support Provider Interface * * Copyright 2012 Marc-Andre Moreau * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #ifdef HAVE_CONFIG_H #include "config.h" #endif #include /** * sspicli.dll: * * EnumerateSecurityPackagesA * EnumerateSecurityPackagesW * GetUserNameExW * ImportSecurityContextA * LogonUser * LogonUserEx * LogonUserExExW * SspiCompareAuthIdentities * SspiCopyAuthIdentity * SspiDecryptAuthIdentity * SspiEncodeAuthIdentityAsStrings * SspiEncodeStringsAsAuthIdentity * SspiEncryptAuthIdentity * SspiExcludePackage * SspiFreeAuthIdentity * SspiGetTargetHostName * SspiIsAuthIdentityEncrypted * SspiLocalFree * SspiMarshalAuthIdentity * SspiPrepareForCredRead * SspiPrepareForCredWrite * SspiUnmarshalAuthIdentity * SspiValidateAuthIdentity * SspiZeroAuthIdentity */ #ifndef _WIN32 #include #ifdef HAVE_UNISTD_H #include #endif #include #include #include "../handle/handle.h" #include "../security/security.h" BOOL LogonUserA(LPCSTR lpszUsername, LPCSTR lpszDomain, LPCSTR lpszPassword, DWORD dwLogonType, DWORD dwLogonProvider, PHANDLE phToken) { struct passwd* pw; WINPR_ACCESS_TOKEN* token; if (!lpszUsername) return FALSE; token = (WINPR_ACCESS_TOKEN*) malloc(sizeof(WINPR_ACCESS_TOKEN)); if (!token) return FALSE; ZeroMemory(token, sizeof(WINPR_ACCESS_TOKEN)); WINPR_HANDLE_SET_TYPE(token, HANDLE_TYPE_ACCESS_TOKEN); token->Username = _strdup(lpszUsername); if (lpszDomain) token->Domain = _strdup(lpszDomain); pw = getpwnam(lpszUsername); if (pw) { token->UserId = (DWORD) pw->pw_uid; token->GroupId = (DWORD) pw->pw_gid; } *((ULONG_PTR*) phToken) = (ULONG_PTR) token; return TRUE; } BOOL LogonUserW(LPCWSTR lpszUsername, LPCWSTR lpszDomain, LPCWSTR lpszPassword, DWORD dwLogonType, DWORD dwLogonProvider, PHANDLE phToken) { return TRUE; } BOOL LogonUserExA(LPCSTR lpszUsername, LPCSTR lpszDomain, LPCSTR lpszPassword, DWORD dwLogonType, DWORD dwLogonProvider, PHANDLE phToken, PSID* ppLogonSid, PVOID* ppProfileBuffer, LPDWORD pdwProfileLength, PQUOTA_LIMITS pQuotaLimits) { return TRUE; } BOOL LogonUserExW(LPCWSTR lpszUsername, LPCWSTR lpszDomain, LPCWSTR lpszPassword, DWORD dwLogonType, DWORD dwLogonProvider, PHANDLE phToken, PSID* ppLogonSid, PVOID* ppProfileBuffer, LPDWORD pdwProfileLength, PQUOTA_LIMITS pQuotaLimits) { return TRUE; } BOOL GetUserNameExA(EXTENDED_NAME_FORMAT NameFormat, LPSTR lpNameBuffer, PULONG nSize) { int length; char* login; switch (NameFormat) { case NameSamCompatible: login = getlogin(); length = strlen(login); if (*nSize >= length) { CopyMemory(lpNameBuffer, login, length + 1); return 1; } else { *nSize = length + 1; } break; case NameFullyQualifiedDN: case NameDisplay: case NameUniqueId: case NameCanonical: case NameUserPrincipal: case NameCanonicalEx: case NameServicePrincipal: case NameDnsDomain: break; default: break; } return 0; } BOOL GetUserNameExW(EXTENDED_NAME_FORMAT NameFormat, LPWSTR lpNameBuffer, PULONG nSize) { return 0; } #endif