From bc8e2d5f23bdf539310e53fbad0e98f10465287f Mon Sep 17 00:00:00 2001 From: Andrew Bartlett Date: Sun, 9 May 2004 23:05:37 +0000 Subject: r620: Remove more ununsed code. Andrew Bartlett (This used to be commit 795ace17a8905f495e9e191ffbd559927894941b) --- source4/auth/auth_compat.c | 121 --------------------------------------------- source4/auth/config.m4 | 2 +- source4/smbd/rewrite.c | 5 -- 3 files changed, 1 insertion(+), 127 deletions(-) delete mode 100644 source4/auth/auth_compat.c (limited to 'source4') diff --git a/source4/auth/auth_compat.c b/source4/auth/auth_compat.c deleted file mode 100644 index d8c1ad78f0..0000000000 --- a/source4/auth/auth_compat.c +++ /dev/null @@ -1,121 +0,0 @@ -/* - Unix SMB/CIFS implementation. - Password and authentication handling - Copyright (C) Andrew Bartlett 2001-2002 - - This program is free software; you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation; either version 2 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program; if not, write to the Free Software - Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. -*/ - -#include "includes.h" - -#undef DBGC_CLASS -#define DBGC_CLASS DBGC_AUTH - -/**************************************************************************** - COMPATIBILITY INTERFACES: - ***************************************************************************/ - -/**************************************************************************** -check if a username/password is OK assuming the password is a 24 byte -SMB hash -return True if the password is correct, False otherwise -****************************************************************************/ - -NTSTATUS check_plaintext_password(const char *smb_name, DATA_BLOB plaintext_password, auth_serversupplied_info **server_info) -{ - struct auth_context *plaintext_auth_context = NULL; - auth_usersupplied_info *user_info = NULL; - const uint8 *chal; - NTSTATUS nt_status; - if (!NT_STATUS_IS_OK(nt_status = make_auth_context_subsystem(&plaintext_auth_context))) { - return nt_status; - } - - chal = plaintext_auth_context->get_ntlm_challenge(plaintext_auth_context); - - if (!make_user_info_for_reply(&user_info, - smb_name, lp_workgroup(), chal, - plaintext_password)) { - return NT_STATUS_NO_MEMORY; - } - - nt_status = plaintext_auth_context->check_ntlm_password(plaintext_auth_context, - user_info, server_info); - - (plaintext_auth_context->free)(&plaintext_auth_context); - free_user_info(&user_info); - return nt_status; -} - -static NTSTATUS pass_check_smb(struct server_context *smb, - const char *smb_name, - const char *domain, - DATA_BLOB lm_pwd, - DATA_BLOB nt_pwd, - DATA_BLOB plaintext_password, - BOOL encrypted) - -{ - NTSTATUS nt_status; - auth_serversupplied_info *server_info = NULL; - if (encrypted) { - auth_usersupplied_info *user_info = NULL; - make_user_info_for_reply_enc(&user_info, smb_name, - domain, - lm_pwd, - nt_pwd); - nt_status = smb->negotiate.auth_context->check_ntlm_password(smb->negotiate.auth_context, - user_info, &server_info); - free_user_info(&user_info); - } else { - nt_status = check_plaintext_password(smb_name, plaintext_password, &server_info); - } - free_server_info(&server_info); - return nt_status; -} - -/**************************************************************************** -check if a username/password pair is ok via the auth subsystem. -return True if the password is correct, False otherwise -****************************************************************************/ -BOOL password_ok(struct server_context *smb, const char *smb_name, DATA_BLOB password_blob) -{ - - DATA_BLOB null_password = data_blob(NULL, 0); - BOOL encrypted = (smb->negotiate.encrypted_passwords && password_blob.length == 24); - - if (encrypted) { - /* - * The password could be either NTLM or plain LM. Try NTLM first, - * but fall-through as required. - * NTLMv2 makes no sense here. - */ - if (NT_STATUS_IS_OK(pass_check_smb(smb, smb_name, lp_workgroup(), null_password, password_blob, null_password, encrypted))) { - return True; - } - - if (NT_STATUS_IS_OK(pass_check_smb(smb, smb_name, lp_workgroup(), password_blob, null_password, null_password, encrypted))) { - return True; - } - } else { - if (NT_STATUS_IS_OK(pass_check_smb(smb, smb_name, lp_workgroup(), null_password, null_password, password_blob, encrypted))) { - return True; - } - } - - return False; -} - - diff --git a/source4/auth/config.m4 b/source4/auth/config.m4 index cb547301f5..23c7b8a3f5 100644 --- a/source4/auth/config.m4 +++ b/source4/auth/config.m4 @@ -5,5 +5,5 @@ SMB_MODULE(auth_builtin,AUTH,STATIC,[auth/auth_builtin.o]) SMB_MODULE(auth_unix,AUTH,STATIC,[auth/auth_unix.o]) SMB_SUBSYSTEM(AUTH,auth/auth.o, - [auth/auth_ntlmssp.o auth/auth_util.o auth/pampass.o auth/pass_check.o auth/auth_compat.o], + [auth/auth_ntlmssp.o auth/auth_util.o auth/pampass.o auth/pass_check.o], auth/auth_public_proto.h) diff --git a/source4/smbd/rewrite.c b/source4/smbd/rewrite.c index 91ccbaf4e4..e5e9340a72 100644 --- a/source4/smbd/rewrite.c +++ b/source4/smbd/rewrite.c @@ -62,8 +62,3 @@ BOOL init_names(void) BOOL become_user_permanently(uid_t uid, gid_t gid) { return True; } - -int sys_getgrouplist(const char *user, gid_t gid, gid_t *groups, int *ngroups) -{ - return 0; -} -- cgit