From e2049e77e406981363a7b81fd092a6ccb4afb187 Mon Sep 17 00:00:00 2001 From: Andrew Bartlett Date: Fri, 15 Jul 2011 16:09:52 +1000 Subject: s3-auth Use guest boolean in auth_user_info_unix Signed-off-by: Andrew Tridgell --- source3/smbd/lanman.c | 2 +- source3/smbd/password.c | 6 +++--- source3/smbd/service.c | 4 ++-- source3/smbd/session.c | 2 +- source3/smbd/sesssetup.c | 6 +++--- source3/smbd/smb2_sesssetup.c | 8 ++++---- 6 files changed, 14 insertions(+), 14 deletions(-) (limited to 'source3/smbd') diff --git a/source3/smbd/lanman.c b/source3/smbd/lanman.c index b8fcc3022d..c1b7ab6077 100644 --- a/source3/smbd/lanman.c +++ b/source3/smbd/lanman.c @@ -5857,7 +5857,7 @@ void api_reply(connection_struct *conn, uint16 vuid, if (api_commands[i].auth_user && lp_restrict_anonymous()) { user_struct *user = get_valid_user_struct(req->sconn, vuid); - if (!user || user->session_info->guest) { + if (!user || user->session_info->unix_info->guest) { reply_nterror(req, NT_STATUS_ACCESS_DENIED); return; } diff --git a/source3/smbd/password.c b/source3/smbd/password.c index 08b53a818e..9daecaf48e 100644 --- a/source3/smbd/password.c +++ b/source3/smbd/password.c @@ -294,7 +294,7 @@ int register_existing_vuid(struct smbd_server_connection *sconn, vuser->session_info->unix_info->unix_name, vuser->session_info->unix_info->sanitized_username, vuser->session_info->info3->base.domain.string, - vuser->session_info->guest )); + vuser->session_info->unix_info->guest )); DEBUG(3, ("register_existing_vuid: User name: %s\t" "Real name: %s\n", vuser->session_info->unix_info->unix_name, @@ -328,13 +328,13 @@ int register_existing_vuid(struct smbd_server_connection *sconn, vuser->homes_snum = -1; - if (!vuser->session_info->guest) { + if (!vuser->session_info->unix_info->guest) { vuser->homes_snum = register_homes_share( vuser->session_info->unix_info->unix_name); } if (srv_is_signing_negotiated(sconn) && - !vuser->session_info->guest) { + !vuser->session_info->unix_info->guest) { /* Try and turn on server signing on the first non-guest * sessionsetup. */ srv_set_signing(sconn, diff --git a/source3/smbd/service.c b/source3/smbd/service.c index 47114f1255..d5a757c61f 100644 --- a/source3/smbd/service.c +++ b/source3/smbd/service.c @@ -394,7 +394,7 @@ static NTSTATUS create_connection_session_info(struct smbd_server_connection *sc * This is the normal security != share case where we have a * valid vuid from the session setup. */ - if (vuid_serverinfo->guest) { + if (vuid_serverinfo->unix_info->guest) { if (!lp_guest_ok(snum)) { DEBUG(2, ("guest user (from session setup) " "not permitted to access this share " @@ -475,7 +475,7 @@ NTSTATUS set_conn_force_user_group(connection_struct *conn, int snum) } status = make_session_info_from_username( - conn, fuser, conn->session_info->guest, + conn, fuser, conn->session_info->unix_info->guest, &forced_serverinfo); if (!NT_STATUS_IS_OK(status)) { return status; diff --git a/source3/smbd/session.c b/source3/smbd/session.c index a6bc4924b5..9b8d11cc65 100644 --- a/source3/smbd/session.c +++ b/source3/smbd/session.c @@ -53,7 +53,7 @@ bool session_claim(struct smbd_server_connection *sconn, user_struct *vuser) /* don't register sessions for the guest user - its just too expensive to go through pam session code for browsing etc */ - if (vuser->session_info->guest) { + if (vuser->session_info->unix_info->guest) { return True; } diff --git a/source3/smbd/sesssetup.c b/source3/smbd/sesssetup.c index 694c0874f2..76f96b1e42 100644 --- a/source3/smbd/sesssetup.c +++ b/source3/smbd/sesssetup.c @@ -441,7 +441,7 @@ static void reply_spnego_kerberos(struct smb_request *req, SSVAL(req->outbuf, smb_vwv3, 0); - if (session_info->guest) { + if (session_info->unix_info->guest) { SSVAL(req->outbuf,smb_vwv2,1); } @@ -535,7 +535,7 @@ static void reply_spnego_ntlmssp(struct smb_request *req, SSVAL(req->outbuf, smb_vwv3, 0); - if (session_info->guest) { + if (session_info->unix_info->guest) { SSVAL(req->outbuf,smb_vwv2,1); } } @@ -1702,7 +1702,7 @@ void reply_sesssetup_and_X(struct smb_request *req) /* perhaps grab OS version here?? */ } - if (session_info->guest) { + if (session_info->unix_info->guest) { SSVAL(req->outbuf,smb_vwv2,1); } diff --git a/source3/smbd/smb2_sesssetup.c b/source3/smbd/smb2_sesssetup.c index fb9fbde502..9475ffb363 100644 --- a/source3/smbd/smb2_sesssetup.c +++ b/source3/smbd/smb2_sesssetup.c @@ -253,7 +253,7 @@ static NTSTATUS smbd_smb2_session_setup_krb5(struct smbd_smb2_session *session, session->do_signing = true; } - if (session->session_info->guest) { + if (session->session_info->unix_info->guest) { /* we map anonymous to guest internally */ *out_session_flags |= SMB2_SESSION_FLAG_IS_GUEST; *out_session_flags |= SMB2_SESSION_FLAG_IS_NULL; @@ -280,7 +280,7 @@ static NTSTATUS smbd_smb2_session_setup_krb5(struct smbd_smb2_session *session, session->session_info->unix_info->sanitized_username = talloc_strdup(session->session_info, tmp); - if (!session->session_info->guest) { + if (!session->session_info->unix_info->guest) { session->compat_vuser->homes_snum = register_homes_share(session->session_info->unix_info->unix_name); } @@ -460,7 +460,7 @@ static NTSTATUS smbd_smb2_common_ntlmssp_auth_return(struct smbd_smb2_session *s session->do_signing = true; } - if (session->session_info->guest) { + if (session->session_info->unix_info->guest) { /* we map anonymous to guest internally */ *out_session_flags |= SMB2_SESSION_FLAG_IS_GUEST; *out_session_flags |= SMB2_SESSION_FLAG_IS_NULL; @@ -491,7 +491,7 @@ static NTSTATUS smbd_smb2_common_ntlmssp_auth_return(struct smbd_smb2_session *s session->session_info->unix_info->sanitized_username = talloc_strdup( session->session_info, tmp); - if (!session->compat_vuser->session_info->guest) { + if (!session->compat_vuser->session_info->unix_info->guest) { session->compat_vuser->homes_snum = register_homes_share(session->session_info->unix_info->unix_name); } -- cgit