xref: /titanic_44/usr/src/cmd/smbsrv/smbadm/smbadm.c (revision 8d7e41661dc4633488e93b13363137523ce59977)
1da6c28aaSamw /*
2da6c28aaSamw  * CDDL HEADER START
3da6c28aaSamw  *
4da6c28aaSamw  * The contents of this file are subject to the terms of the
5da6c28aaSamw  * Common Development and Distribution License (the "License").
6da6c28aaSamw  * You may not use this file except in compliance with the License.
7da6c28aaSamw  *
8da6c28aaSamw  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9da6c28aaSamw  * or http://www.opensolaris.org/os/licensing.
10da6c28aaSamw  * See the License for the specific language governing permissions
11da6c28aaSamw  * and limitations under the License.
12da6c28aaSamw  *
13da6c28aaSamw  * When distributing Covered Code, include this CDDL HEADER in each
14da6c28aaSamw  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15da6c28aaSamw  * If applicable, add the following below this CDDL HEADER, with the
16da6c28aaSamw  * fields enclosed by brackets "[]" replaced with your own identifying
17da6c28aaSamw  * information: Portions Copyright [yyyy] [name of copyright owner]
18da6c28aaSamw  *
19da6c28aaSamw  * CDDL HEADER END
20da6c28aaSamw  */
21da6c28aaSamw /*
22dc20a302Sas200622  * Copyright 2008 Sun Microsystems, Inc.  All rights reserved.
23da6c28aaSamw  * Use is subject to license terms.
24da6c28aaSamw  */
25da6c28aaSamw 
26da6c28aaSamw /*
27da6c28aaSamw  * This module contains smbadm CLI which offers smb configuration
28da6c28aaSamw  * functionalities.
29da6c28aaSamw  */
30*8d7e4166Sjose borrego #include <errno.h>
31*8d7e4166Sjose borrego #include <err.h>
32*8d7e4166Sjose borrego #include <ctype.h>
33da6c28aaSamw #include <stdlib.h>
34da6c28aaSamw #include <stdio.h>
35da6c28aaSamw #include <syslog.h>
36da6c28aaSamw #include <strings.h>
37da6c28aaSamw #include <limits.h>
38da6c28aaSamw #include <getopt.h>
39da6c28aaSamw #include <libintl.h>
40da6c28aaSamw #include <zone.h>
41da6c28aaSamw #include <grp.h>
42da6c28aaSamw #include <libgen.h>
43c8ec8eeaSjose borrego #include <netinet/in.h>
44da6c28aaSamw #include <smbsrv/libsmb.h>
45da6c28aaSamw 
46da6c28aaSamw typedef enum {
47da6c28aaSamw 	HELP_ADD_MEMBER,
48da6c28aaSamw 	HELP_CREATE,
49da6c28aaSamw 	HELP_DELETE,
50da6c28aaSamw 	HELP_DEL_MEMBER,
51da6c28aaSamw 	HELP_GET,
52da6c28aaSamw 	HELP_JOIN,
53da6c28aaSamw 	HELP_LIST,
54da6c28aaSamw 	HELP_RENAME,
55da6c28aaSamw 	HELP_SET,
56da6c28aaSamw 	HELP_SHOW,
573db3f65cSamw 	HELP_USER_DISABLE,
583db3f65cSamw 	HELP_USER_ENABLE
59da6c28aaSamw } smbadm_help_t;
60da6c28aaSamw 
613db3f65cSamw #define	SMBADM_CMDF_USER	0x01
623db3f65cSamw #define	SMBADM_CMDF_GROUP	0x02
633db3f65cSamw #define	SMBADM_CMDF_TYPEMASK	0x0F
64faa1795aSjb150015 
65c8ec8eeaSjose borrego #define	SMBADM_ANSBUFSIZ	64
66c8ec8eeaSjose borrego 
67da6c28aaSamw typedef struct smbadm_cmdinfo {
68da6c28aaSamw 	char *name;
69da6c28aaSamw 	int (*func)(int, char **);
70da6c28aaSamw 	smbadm_help_t usage;
71faa1795aSjb150015 	uint32_t flags;
72da6c28aaSamw } smbadm_cmdinfo_t;
73da6c28aaSamw 
74da6c28aaSamw smbadm_cmdinfo_t *curcmd;
75da6c28aaSamw static char *progname;
76da6c28aaSamw 
77*8d7e4166Sjose borrego static void smbadm_usage(boolean_t);
78*8d7e4166Sjose borrego static int smbadm_join_workgroup(const char *);
79*8d7e4166Sjose borrego static int smbadm_join_domain(const char *, const char *);
80*8d7e4166Sjose borrego static boolean_t smbadm_valid_domainname(const char *);
81*8d7e4166Sjose borrego static boolean_t smbadm_valid_username(const char *);
82*8d7e4166Sjose borrego static boolean_t smbadm_valid_workgroup(const char *);
83*8d7e4166Sjose borrego static void smbadm_extract_domain(char *, char **, char **);
84*8d7e4166Sjose borrego 
85da6c28aaSamw static int smbadm_join(int, char **);
86da6c28aaSamw static int smbadm_list(int, char **);
87da6c28aaSamw static int smbadm_group_create(int, char **);
88da6c28aaSamw static int smbadm_group_delete(int, char **);
89da6c28aaSamw static int smbadm_group_rename(int, char **);
90da6c28aaSamw static int smbadm_group_show(int, char **);
91da6c28aaSamw static int smbadm_group_getprop(int, char **);
92da6c28aaSamw static int smbadm_group_setprop(int, char **);
93da6c28aaSamw static int smbadm_group_addmember(int, char **);
94da6c28aaSamw static int smbadm_group_delmember(int, char **);
95da6c28aaSamw static int smbadm_user_disable(int, char **);
96da6c28aaSamw static int smbadm_user_enable(int, char **);
97da6c28aaSamw 
98da6c28aaSamw static smbadm_cmdinfo_t smbadm_cmdtable[] =
99da6c28aaSamw {
100faa1795aSjb150015 	{ "add-member",		smbadm_group_addmember,	HELP_ADD_MEMBER,
101faa1795aSjb150015 	SMBADM_CMDF_GROUP },
102faa1795aSjb150015 	{ "create",		smbadm_group_create,	HELP_CREATE,
103faa1795aSjb150015 	SMBADM_CMDF_GROUP },
104faa1795aSjb150015 	{ "delete",		smbadm_group_delete,	HELP_DELETE,
105faa1795aSjb150015 	SMBADM_CMDF_GROUP },
1063db3f65cSamw 	{ "disable-user",	smbadm_user_disable,	HELP_USER_DISABLE,
1073db3f65cSamw 	SMBADM_CMDF_USER },
1083db3f65cSamw 	{ "enable-user",	smbadm_user_enable,	HELP_USER_ENABLE,
1093db3f65cSamw 	SMBADM_CMDF_USER },
110faa1795aSjb150015 	{ "get",		smbadm_group_getprop,	HELP_GET,
111faa1795aSjb150015 	SMBADM_CMDF_GROUP },
112faa1795aSjb150015 	{ "join",		smbadm_join,		HELP_JOIN,	0 },
113faa1795aSjb150015 	{ "list",		smbadm_list,		HELP_LIST,	0 },
114faa1795aSjb150015 	{ "remove-member",	smbadm_group_delmember,	HELP_DEL_MEMBER,
115faa1795aSjb150015 	SMBADM_CMDF_GROUP },
116faa1795aSjb150015 	{ "rename",		smbadm_group_rename,	HELP_RENAME,
117faa1795aSjb150015 	SMBADM_CMDF_GROUP },
118faa1795aSjb150015 	{ "set",		smbadm_group_setprop,	HELP_SET,
119faa1795aSjb150015 	SMBADM_CMDF_GROUP },
120faa1795aSjb150015 	{ "show",		smbadm_group_show,	HELP_SHOW,
121faa1795aSjb150015 	SMBADM_CMDF_GROUP },
122da6c28aaSamw };
123da6c28aaSamw 
124da6c28aaSamw #define	SMBADM_NCMD	(sizeof (smbadm_cmdtable) / sizeof (smbadm_cmdtable[0]))
125da6c28aaSamw 
126da6c28aaSamw typedef struct smbadm_prop {
127da6c28aaSamw 	char *p_name;
128da6c28aaSamw 	char *p_value;
129da6c28aaSamw } smbadm_prop_t;
130da6c28aaSamw 
131da6c28aaSamw typedef struct smbadm_prop_handle {
132da6c28aaSamw 	char *p_name;
133da6c28aaSamw 	char *p_dispvalue;
134da6c28aaSamw 	int (*p_setfn)(char *, smbadm_prop_t *);
135da6c28aaSamw 	int (*p_getfn)(char *, smbadm_prop_t *);
136da6c28aaSamw 	boolean_t (*p_chkfn)(smbadm_prop_t *);
137da6c28aaSamw } smbadm_prop_handle_t;
138da6c28aaSamw 
139da6c28aaSamw static boolean_t smbadm_prop_validate(smbadm_prop_t *prop, boolean_t chkval);
140da6c28aaSamw static int smbadm_prop_parse(char *arg, smbadm_prop_t *prop);
141da6c28aaSamw static smbadm_prop_handle_t *smbadm_prop_gethandle(char *pname);
142da6c28aaSamw 
143da6c28aaSamw static boolean_t smbadm_chkprop_priv(smbadm_prop_t *prop);
144da6c28aaSamw static int smbadm_setprop_tkowner(char *gname, smbadm_prop_t *prop);
145da6c28aaSamw static int smbadm_getprop_tkowner(char *gname, smbadm_prop_t *prop);
146da6c28aaSamw static int smbadm_setprop_backup(char *gname, smbadm_prop_t *prop);
147da6c28aaSamw static int smbadm_getprop_backup(char *gname, smbadm_prop_t *prop);
148da6c28aaSamw static int smbadm_setprop_restore(char *gname, smbadm_prop_t *prop);
149da6c28aaSamw static int smbadm_getprop_restore(char *gname, smbadm_prop_t *prop);
150da6c28aaSamw static int smbadm_setprop_desc(char *gname, smbadm_prop_t *prop);
151da6c28aaSamw static int smbadm_getprop_desc(char *gname, smbadm_prop_t *prop);
152da6c28aaSamw 
153da6c28aaSamw static smbadm_prop_handle_t smbadm_ptable[] = {
154da6c28aaSamw 	{"backup",	"on | off", 	smbadm_setprop_backup,
155da6c28aaSamw 	smbadm_getprop_backup,	smbadm_chkprop_priv 	},
156da6c28aaSamw 	{"restore",	"on | off",	smbadm_setprop_restore,
157da6c28aaSamw 	smbadm_getprop_restore,	smbadm_chkprop_priv	},
158da6c28aaSamw 	{"take-ownership", "on | off",	smbadm_setprop_tkowner,
159da6c28aaSamw 	smbadm_getprop_tkowner,	smbadm_chkprop_priv	},
160da6c28aaSamw 	{"description",	"<string>",	smbadm_setprop_desc,
161da6c28aaSamw 	smbadm_getprop_desc,	NULL			},
162da6c28aaSamw };
163da6c28aaSamw 
1643db3f65cSamw static int smbadm_init(void);
1653db3f65cSamw static void smbadm_fini(void);
166da6c28aaSamw static const char *smbadm_pwd_strerror(int error);
167da6c28aaSamw 
168da6c28aaSamw /*
169da6c28aaSamw  * Number of supported properties
170da6c28aaSamw  */
171da6c28aaSamw #define	SMBADM_NPROP	(sizeof (smbadm_ptable) / sizeof (smbadm_ptable[0]))
172da6c28aaSamw 
173da6c28aaSamw static void
174da6c28aaSamw smbadm_cmdusage(FILE *fp, smbadm_cmdinfo_t *cmd)
175da6c28aaSamw {
176da6c28aaSamw 	switch (cmd->usage) {
177da6c28aaSamw 	case HELP_ADD_MEMBER:
178da6c28aaSamw 		(void) fprintf(fp,
179da6c28aaSamw 		    gettext("\t%s -m member [[-m member] ...] group\n"),
180da6c28aaSamw 		    cmd->name);
181da6c28aaSamw 		return;
182da6c28aaSamw 
183da6c28aaSamw 	case HELP_CREATE:
184da6c28aaSamw 		(void) fprintf(fp, gettext("\t%s [-d description] group\n"),
185da6c28aaSamw 		    cmd->name);
186da6c28aaSamw 		return;
187da6c28aaSamw 
188da6c28aaSamw 	case HELP_DELETE:
189da6c28aaSamw 		(void) fprintf(fp, gettext("\t%s group\n"), cmd->name);
190da6c28aaSamw 		return;
191da6c28aaSamw 
1923db3f65cSamw 	case HELP_USER_DISABLE:
1933db3f65cSamw 	case HELP_USER_ENABLE:
194da6c28aaSamw 		(void) fprintf(fp, gettext("\t%s user\n"), cmd->name);
195da6c28aaSamw 		return;
196da6c28aaSamw 
197da6c28aaSamw 	case HELP_GET:
198da6c28aaSamw 		(void) fprintf(fp, gettext("\t%s [[-p property] ...] group\n"),
199da6c28aaSamw 		    cmd->name);
200da6c28aaSamw 		return;
201da6c28aaSamw 
202da6c28aaSamw 	case HELP_JOIN:
203da6c28aaSamw 		(void) fprintf(fp, gettext("\t%s -u username domain\n"
204da6c28aaSamw 		    "\t%s -w workgroup\n"), cmd->name, cmd->name);
205da6c28aaSamw 		return;
206da6c28aaSamw 
207da6c28aaSamw 	case HELP_LIST:
208da6c28aaSamw 		(void) fprintf(fp, gettext("\t%s\n"), cmd->name);
209da6c28aaSamw 		return;
210da6c28aaSamw 
211da6c28aaSamw 	case HELP_DEL_MEMBER:
212da6c28aaSamw 		(void) fprintf(fp,
213da6c28aaSamw 		    gettext("\t%s -m member [[-m member] ...] group\n"),
214da6c28aaSamw 		    cmd->name);
215da6c28aaSamw 		return;
216da6c28aaSamw 
217da6c28aaSamw 	case HELP_RENAME:
218da6c28aaSamw 		(void) fprintf(fp, gettext("\t%s group new-group\n"),
219da6c28aaSamw 		    cmd->name);
220da6c28aaSamw 		return;
221da6c28aaSamw 
222da6c28aaSamw 	case HELP_SET:
223da6c28aaSamw 		(void) fprintf(fp, gettext("\t%s -p property=value "
224da6c28aaSamw 		    "[[-p property=value] ...] group\n"), cmd->name);
225da6c28aaSamw 		return;
226da6c28aaSamw 
227da6c28aaSamw 	case HELP_SHOW:
228da6c28aaSamw 		(void) fprintf(fp, gettext("\t%s [-m] [-p] [group]\n"),
229da6c28aaSamw 		    cmd->name);
230da6c28aaSamw 		return;
231da6c28aaSamw 
2323db3f65cSamw 	default:
2333db3f65cSamw 		break;
234da6c28aaSamw 	}
235da6c28aaSamw 
236da6c28aaSamw 	abort();
237da6c28aaSamw 	/* NOTREACHED */
238da6c28aaSamw }
239da6c28aaSamw 
240da6c28aaSamw static void
241da6c28aaSamw smbadm_usage(boolean_t requested)
242da6c28aaSamw {
243da6c28aaSamw 	FILE *fp = requested ? stdout : stderr;
244da6c28aaSamw 	boolean_t show_props = B_FALSE;
245da6c28aaSamw 	int i;
246da6c28aaSamw 
247da6c28aaSamw 	if (curcmd == NULL) {
248da6c28aaSamw 		(void) fprintf(fp,
249da6c28aaSamw 		    gettext("usage: %s [-h | <command> [options]]\n"),
250da6c28aaSamw 		    progname);
251da6c28aaSamw 		(void) fprintf(fp,
252da6c28aaSamw 		    gettext("where 'command' is one of the following:\n\n"));
253da6c28aaSamw 
254da6c28aaSamw 		for (i = 0; i < SMBADM_NCMD; i++)
255da6c28aaSamw 			smbadm_cmdusage(fp, &smbadm_cmdtable[i]);
256da6c28aaSamw 
257da6c28aaSamw 		(void) fprintf(fp,
258da6c28aaSamw 		    gettext("\nFor property list, run %s %s|%s\n"),
259da6c28aaSamw 		    progname, "get", "set");
260da6c28aaSamw 
261da6c28aaSamw 		exit(requested ? 0 : 2);
262da6c28aaSamw 	}
263da6c28aaSamw 
264da6c28aaSamw 	(void) fprintf(fp, gettext("usage:\n"));
265da6c28aaSamw 	smbadm_cmdusage(fp, curcmd);
266da6c28aaSamw 
267da6c28aaSamw 	if (strcmp(curcmd->name, "get") == 0 ||
268da6c28aaSamw 	    strcmp(curcmd->name, "set") == 0)
269da6c28aaSamw 		show_props = B_TRUE;
270da6c28aaSamw 
271da6c28aaSamw 	if (show_props) {
272da6c28aaSamw 		(void) fprintf(fp,
273da6c28aaSamw 		    gettext("\nThe following properties are supported:\n"));
274da6c28aaSamw 
275da6c28aaSamw 		(void) fprintf(fp, "\n\t%-16s   %s\n\n",
276da6c28aaSamw 		    "PROPERTY", "VALUES");
277da6c28aaSamw 
278da6c28aaSamw 		for (i = 0; i < SMBADM_NPROP; i++) {
279da6c28aaSamw 			(void) fprintf(fp, "\t%-16s   %s\n",
280da6c28aaSamw 			    smbadm_ptable[i].p_name,
281da6c28aaSamw 			    smbadm_ptable[i].p_dispvalue);
282da6c28aaSamw 		}
283da6c28aaSamw 	}
284da6c28aaSamw 
285da6c28aaSamw 	exit(requested ? 0 : 2);
286da6c28aaSamw }
287da6c28aaSamw 
288da6c28aaSamw /*
289c8ec8eeaSjose borrego  * smbadm_strcasecmplist
290c8ec8eeaSjose borrego  *
291c8ec8eeaSjose borrego  * Find a string 's' within a list of strings.
292c8ec8eeaSjose borrego  *
293c8ec8eeaSjose borrego  * Returns the index of the matching string or -1 if there is no match.
294c8ec8eeaSjose borrego  */
295c8ec8eeaSjose borrego static int
296c8ec8eeaSjose borrego smbadm_strcasecmplist(const char *s, ...)
297c8ec8eeaSjose borrego {
298c8ec8eeaSjose borrego 	va_list ap;
299c8ec8eeaSjose borrego 	char *p;
300c8ec8eeaSjose borrego 	int ndx;
301c8ec8eeaSjose borrego 
302c8ec8eeaSjose borrego 	va_start(ap, s);
303c8ec8eeaSjose borrego 
304c8ec8eeaSjose borrego 	for (ndx = 0; ((p = va_arg(ap, char *)) != NULL); ++ndx) {
305c8ec8eeaSjose borrego 		if (strcasecmp(s, p) == 0) {
306c8ec8eeaSjose borrego 			va_end(ap);
307c8ec8eeaSjose borrego 			return (ndx);
308c8ec8eeaSjose borrego 		}
309c8ec8eeaSjose borrego 	}
310c8ec8eeaSjose borrego 
311c8ec8eeaSjose borrego 	va_end(ap);
312c8ec8eeaSjose borrego 	return (-1);
313c8ec8eeaSjose borrego }
314c8ec8eeaSjose borrego 
315c8ec8eeaSjose borrego /*
316c8ec8eeaSjose borrego  * smbadm_answer_prompt
317c8ec8eeaSjose borrego  *
318c8ec8eeaSjose borrego  * Prompt for the answer to a question.  A default response must be
319c8ec8eeaSjose borrego  * specified, which will be used if the user presses <enter> without
320c8ec8eeaSjose borrego  * answering the question.
321c8ec8eeaSjose borrego  */
322c8ec8eeaSjose borrego static int
323c8ec8eeaSjose borrego smbadm_answer_prompt(const char *prompt, char *answer, const char *dflt)
324c8ec8eeaSjose borrego {
325c8ec8eeaSjose borrego 	char buf[SMBADM_ANSBUFSIZ];
326c8ec8eeaSjose borrego 	char *p;
327c8ec8eeaSjose borrego 
328c8ec8eeaSjose borrego 	(void) printf(gettext("%s [%s]: "), prompt, dflt);
329c8ec8eeaSjose borrego 
330c8ec8eeaSjose borrego 	if (fgets(buf, SMBADM_ANSBUFSIZ, stdin) == NULL)
331c8ec8eeaSjose borrego 		return (-1);
332c8ec8eeaSjose borrego 
333c8ec8eeaSjose borrego 	if ((p = strchr(buf, '\n')) != NULL)
334c8ec8eeaSjose borrego 		*p = '\0';
335c8ec8eeaSjose borrego 
336c8ec8eeaSjose borrego 	if (*buf == '\0')
337c8ec8eeaSjose borrego 		(void) strlcpy(answer, dflt, SMBADM_ANSBUFSIZ);
338c8ec8eeaSjose borrego 	else
339c8ec8eeaSjose borrego 		(void) strlcpy(answer, buf, SMBADM_ANSBUFSIZ);
340c8ec8eeaSjose borrego 
341c8ec8eeaSjose borrego 	return (0);
342c8ec8eeaSjose borrego }
343c8ec8eeaSjose borrego 
344c8ec8eeaSjose borrego /*
345c8ec8eeaSjose borrego  * smbadm_confirm
346c8ec8eeaSjose borrego  *
347c8ec8eeaSjose borrego  * Ask a question that requires a yes/no answer.
348c8ec8eeaSjose borrego  * A default response must be specified.
349c8ec8eeaSjose borrego  */
350c8ec8eeaSjose borrego static boolean_t
351c8ec8eeaSjose borrego smbadm_confirm(const char *prompt, const char *dflt)
352c8ec8eeaSjose borrego {
353c8ec8eeaSjose borrego 	char buf[SMBADM_ANSBUFSIZ];
354c8ec8eeaSjose borrego 
355c8ec8eeaSjose borrego 	for (;;) {
356c8ec8eeaSjose borrego 		if (smbadm_answer_prompt(prompt, buf, dflt) < 0)
357c8ec8eeaSjose borrego 			return (B_FALSE);
358c8ec8eeaSjose borrego 
359c8ec8eeaSjose borrego 		if (smbadm_strcasecmplist(buf, "n", "no", 0) >= 0)
360c8ec8eeaSjose borrego 			return (B_FALSE);
361c8ec8eeaSjose borrego 
362c8ec8eeaSjose borrego 		if (smbadm_strcasecmplist(buf, "y", "yes", 0) >= 0)
363c8ec8eeaSjose borrego 			return (B_TRUE);
364c8ec8eeaSjose borrego 
365c8ec8eeaSjose borrego 		(void) printf(gettext("Please answer yes or no.\n"));
366c8ec8eeaSjose borrego 	}
367c8ec8eeaSjose borrego }
368c8ec8eeaSjose borrego 
369c8ec8eeaSjose borrego static boolean_t
370*8d7e4166Sjose borrego smbadm_join_prompt(const char *domain)
371c8ec8eeaSjose borrego {
372*8d7e4166Sjose borrego 	(void) printf(gettext("After joining %s the smb service will be "
373*8d7e4166Sjose borrego 	    "restarted automatically.\n"), domain);
374c8ec8eeaSjose borrego 
375*8d7e4166Sjose borrego 	return (smbadm_confirm("Would you like to continue?", "no"));
376c8ec8eeaSjose borrego }
377c8ec8eeaSjose borrego 
378*8d7e4166Sjose borrego static void
379*8d7e4166Sjose borrego smbadm_restart_service(void)
380*8d7e4166Sjose borrego {
381*8d7e4166Sjose borrego 	if (smb_smf_restart_service() != 0) {
382*8d7e4166Sjose borrego 		(void) fprintf(stderr,
383*8d7e4166Sjose borrego 		    gettext("Unable to restart smb service. "
384*8d7e4166Sjose borrego 		    "Run 'svcs -xv smb/server' for more information."));
385*8d7e4166Sjose borrego 	}
386c8ec8eeaSjose borrego }
387c8ec8eeaSjose borrego 
388c8ec8eeaSjose borrego /*
389da6c28aaSamw  * smbadm_join
390da6c28aaSamw  *
391*8d7e4166Sjose borrego  * Join a domain or workgroup.
392*8d7e4166Sjose borrego  *
393*8d7e4166Sjose borrego  * When joining a domain, we may receive the username, password and
394*8d7e4166Sjose borrego  * domain name in any of the following combinations.  Note that the
395*8d7e4166Sjose borrego  * password is optional on the command line: if it is not provided,
396*8d7e4166Sjose borrego  * we will prompt for it later.
397*8d7e4166Sjose borrego  *
398*8d7e4166Sjose borrego  *	username+password domain
399*8d7e4166Sjose borrego  *	domain\username+password
400*8d7e4166Sjose borrego  *	domain/username+password
401*8d7e4166Sjose borrego  *	username@domain
402*8d7e4166Sjose borrego  *
403*8d7e4166Sjose borrego  * We allow domain\name+password or domain/name+password but not
404*8d7e4166Sjose borrego  * name+password@domain because @ is a valid password character.
405*8d7e4166Sjose borrego  *
406*8d7e4166Sjose borrego  * If the username and domain name are passed as separate command
407*8d7e4166Sjose borrego  * line arguments, we process them directly.  Otherwise we separate
408*8d7e4166Sjose borrego  * them and continue as if they were separate command line arguments.
409da6c28aaSamw  */
410da6c28aaSamw static int
411da6c28aaSamw smbadm_join(int argc, char **argv)
412da6c28aaSamw {
413*8d7e4166Sjose borrego 	char buf[MAXHOSTNAMELEN * 2];
414*8d7e4166Sjose borrego 	char *domain = NULL;
415*8d7e4166Sjose borrego 	char *username = NULL;
416*8d7e4166Sjose borrego 	uint32_t mode = 0;
417da6c28aaSamw 	char option;
418da6c28aaSamw 
419da6c28aaSamw 	while ((option = getopt(argc, argv, "u:w:")) != -1) {
420da6c28aaSamw 		switch (option) {
421da6c28aaSamw 		case 'w':
422*8d7e4166Sjose borrego 			if (mode != 0) {
423*8d7e4166Sjose borrego 				(void) fprintf(stderr,
424*8d7e4166Sjose borrego 				    gettext("-u and -w must only appear "
425*8d7e4166Sjose borrego 				    "once and are mutually exclusive\n"));
426*8d7e4166Sjose borrego 				smbadm_usage(B_FALSE);
427*8d7e4166Sjose borrego 			}
428*8d7e4166Sjose borrego 
429*8d7e4166Sjose borrego 			mode = SMB_SECMODE_WORKGRP;
430*8d7e4166Sjose borrego 			domain = optarg;
431da6c28aaSamw 			break;
432da6c28aaSamw 
433da6c28aaSamw 		case 'u':
434*8d7e4166Sjose borrego 			if (mode != 0) {
435*8d7e4166Sjose borrego 				(void) fprintf(stderr,
436*8d7e4166Sjose borrego 				    gettext("-u and -w must only appear "
437*8d7e4166Sjose borrego 				    "once and are mutually exclusive\n"));
438*8d7e4166Sjose borrego 				smbadm_usage(B_FALSE);
439*8d7e4166Sjose borrego 			}
440*8d7e4166Sjose borrego 
441*8d7e4166Sjose borrego 			mode = SMB_SECMODE_DOMAIN;
442*8d7e4166Sjose borrego 			username = optarg;
443*8d7e4166Sjose borrego 
444*8d7e4166Sjose borrego 			if ((domain = argv[optind]) == NULL) {
445*8d7e4166Sjose borrego 				/*
446*8d7e4166Sjose borrego 				 * The domain was not specified as a separate
447*8d7e4166Sjose borrego 				 * argument, check for the combination forms.
448*8d7e4166Sjose borrego 				 */
449*8d7e4166Sjose borrego 				(void) strlcpy(buf, username, sizeof (buf));
450*8d7e4166Sjose borrego 				smbadm_extract_domain(buf, &username, &domain);
451*8d7e4166Sjose borrego 			}
452*8d7e4166Sjose borrego 
453*8d7e4166Sjose borrego 			if ((username == NULL) || (*username == '\0')) {
454*8d7e4166Sjose borrego 				(void) fprintf(stderr,
455*8d7e4166Sjose borrego 				    gettext("missing username\n"));
456*8d7e4166Sjose borrego 				smbadm_usage(B_FALSE);
457*8d7e4166Sjose borrego 			}
458da6c28aaSamw 			break;
459da6c28aaSamw 
460da6c28aaSamw 		default:
461da6c28aaSamw 			smbadm_usage(B_FALSE);
462*8d7e4166Sjose borrego 			break;
463da6c28aaSamw 		}
464da6c28aaSamw 	}
465da6c28aaSamw 
466*8d7e4166Sjose borrego 	if ((domain == NULL) || (*domain == '\0')) {
467da6c28aaSamw 		(void) fprintf(stderr, gettext("missing %s name\n"),
468*8d7e4166Sjose borrego 		    (mode == SMB_SECMODE_WORKGRP) ? "workgroup" : "domain");
469da6c28aaSamw 		smbadm_usage(B_FALSE);
470da6c28aaSamw 	}
471da6c28aaSamw 
472*8d7e4166Sjose borrego 	if (mode == SMB_SECMODE_WORKGRP)
473*8d7e4166Sjose borrego 		return (smbadm_join_workgroup(domain));
474*8d7e4166Sjose borrego 	else
475*8d7e4166Sjose borrego 		return (smbadm_join_domain(domain, username));
476*8d7e4166Sjose borrego }
477*8d7e4166Sjose borrego 
478*8d7e4166Sjose borrego /*
479*8d7e4166Sjose borrego  * Workgroups comprise a collection of standalone, independently administered
480*8d7e4166Sjose borrego  * computers that use a common workgroup name.  This is a peer-to-peer model
481*8d7e4166Sjose borrego  * with no formal membership mechanism.
482*8d7e4166Sjose borrego  */
483*8d7e4166Sjose borrego static int
484*8d7e4166Sjose borrego smbadm_join_workgroup(const char *workgroup)
485*8d7e4166Sjose borrego {
486*8d7e4166Sjose borrego 	smb_joininfo_t jdi;
487*8d7e4166Sjose borrego 	uint32_t status;
488*8d7e4166Sjose borrego 
489*8d7e4166Sjose borrego 	bzero(&jdi, sizeof (jdi));
490*8d7e4166Sjose borrego 	jdi.mode = SMB_SECMODE_WORKGRP;
491*8d7e4166Sjose borrego 	(void) strlcpy(jdi.domain_name, workgroup, sizeof (jdi.domain_name));
492*8d7e4166Sjose borrego 	(void) strtrim(jdi.domain_name, " \t\n");
493*8d7e4166Sjose borrego 
494*8d7e4166Sjose borrego 	if (!smbadm_valid_workgroup(jdi.domain_name)) {
495*8d7e4166Sjose borrego 		(void) fprintf(stderr, gettext("workgroup name is invalid\n"));
496da6c28aaSamw 		smbadm_usage(B_FALSE);
497da6c28aaSamw 	}
498da6c28aaSamw 
499*8d7e4166Sjose borrego 	if (!smbadm_join_prompt(jdi.domain_name))
500c8ec8eeaSjose borrego 		return (0);
501c8ec8eeaSjose borrego 
502*8d7e4166Sjose borrego 	if ((status = smb_join(&jdi)) != NT_STATUS_SUCCESS) {
503*8d7e4166Sjose borrego 		(void) fprintf(stderr, gettext("failed to join %s: %s\n"),
504da6c28aaSamw 		    jdi.domain_name, xlate_nt_status(status));
505da6c28aaSamw 		return (1);
506da6c28aaSamw 	}
507da6c28aaSamw 
508*8d7e4166Sjose borrego 	(void) printf(gettext("Successfully joined %s\n"), jdi.domain_name);
509*8d7e4166Sjose borrego 	smbadm_restart_service();
510faa1795aSjb150015 	return (0);
511faa1795aSjb150015 }
512*8d7e4166Sjose borrego 
513*8d7e4166Sjose borrego /*
514*8d7e4166Sjose borrego  * Domains comprise a centrally administered group of computers and accounts
515*8d7e4166Sjose borrego  * that share a common security and administration policy and database.
516*8d7e4166Sjose borrego  * Computers must join a domain and become domain members, which requires
517*8d7e4166Sjose borrego  * an administrator level account name.
518*8d7e4166Sjose borrego  *
519*8d7e4166Sjose borrego  * The '+' character is invalid within a username.  We allow the password
520*8d7e4166Sjose borrego  * to be appended to the username using '+' as a scripting convenience.
521*8d7e4166Sjose borrego  */
522*8d7e4166Sjose borrego static int
523*8d7e4166Sjose borrego smbadm_join_domain(const char *domain, const char *username)
524*8d7e4166Sjose borrego {
525*8d7e4166Sjose borrego 	smb_joininfo_t jdi;
526*8d7e4166Sjose borrego 	uint32_t status;
527*8d7e4166Sjose borrego 	char *prompt;
528*8d7e4166Sjose borrego 	char *p;
529*8d7e4166Sjose borrego 	int len;
530*8d7e4166Sjose borrego 
531*8d7e4166Sjose borrego 	bzero(&jdi, sizeof (jdi));
532*8d7e4166Sjose borrego 	jdi.mode = SMB_SECMODE_DOMAIN;
533*8d7e4166Sjose borrego 	(void) strlcpy(jdi.domain_name, domain, sizeof (jdi.domain_name));
534*8d7e4166Sjose borrego 	(void) strtrim(jdi.domain_name, " \t\n");
535*8d7e4166Sjose borrego 
536*8d7e4166Sjose borrego 	if (!smbadm_valid_domainname(jdi.domain_name)) {
537*8d7e4166Sjose borrego 		(void) fprintf(stderr, gettext("domain name is invalid\n"));
538*8d7e4166Sjose borrego 		smbadm_usage(B_FALSE);
539faa1795aSjb150015 	}
540faa1795aSjb150015 
541*8d7e4166Sjose borrego 	if (!smbadm_join_prompt(jdi.domain_name))
542c8ec8eeaSjose borrego 		return (0);
543c8ec8eeaSjose borrego 
544*8d7e4166Sjose borrego 	if ((p = strchr(username, '+')) != NULL) {
545*8d7e4166Sjose borrego 		++p;
546*8d7e4166Sjose borrego 
547*8d7e4166Sjose borrego 		len = (int)(p - username);
548*8d7e4166Sjose borrego 		if (len > sizeof (jdi.domain_name))
549*8d7e4166Sjose borrego 			len = sizeof (jdi.domain_name);
550*8d7e4166Sjose borrego 
551*8d7e4166Sjose borrego 		(void) strlcpy(jdi.domain_username, username, len);
552*8d7e4166Sjose borrego 		(void) strlcpy(jdi.domain_passwd, p,
553*8d7e4166Sjose borrego 		    sizeof (jdi.domain_passwd));
554*8d7e4166Sjose borrego 	} else {
555*8d7e4166Sjose borrego 		(void) strlcpy(jdi.domain_username, username,
556*8d7e4166Sjose borrego 		    sizeof (jdi.domain_username));
557*8d7e4166Sjose borrego 	}
558*8d7e4166Sjose borrego 
559*8d7e4166Sjose borrego 	if (!smbadm_valid_username(jdi.domain_username)) {
560*8d7e4166Sjose borrego 		(void) fprintf(stderr,
561*8d7e4166Sjose borrego 		    gettext("username contains invalid characters\n"));
562*8d7e4166Sjose borrego 		smbadm_usage(B_FALSE);
563*8d7e4166Sjose borrego 	}
564*8d7e4166Sjose borrego 
565da6c28aaSamw 	if (*jdi.domain_passwd == '\0') {
566*8d7e4166Sjose borrego 		prompt = gettext("Enter domain password: ");
567*8d7e4166Sjose borrego 
568*8d7e4166Sjose borrego 		if ((p = getpassphrase(prompt)) == NULL) {
569da6c28aaSamw 			(void) fprintf(stderr, gettext("missing password\n"));
570da6c28aaSamw 			smbadm_usage(B_FALSE);
571da6c28aaSamw 		}
572da6c28aaSamw 
573da6c28aaSamw 		(void) strlcpy(jdi.domain_passwd, p,
574da6c28aaSamw 		    sizeof (jdi.domain_passwd));
575da6c28aaSamw 	}
576da6c28aaSamw 
577*8d7e4166Sjose borrego 	(void) printf(gettext("Joining %s ... this may take a minute ...\n"),
578da6c28aaSamw 	    jdi.domain_name);
579da6c28aaSamw 
580da6c28aaSamw 	status = smb_join(&jdi);
581da6c28aaSamw 
582da6c28aaSamw 	switch (status) {
583da6c28aaSamw 	case NT_STATUS_SUCCESS:
584*8d7e4166Sjose borrego 		(void) printf(gettext("Successfully joined %s\n"),
585da6c28aaSamw 		    jdi.domain_name);
586*8d7e4166Sjose borrego 		bzero(&jdi, sizeof (jdi));
587*8d7e4166Sjose borrego 		smbadm_restart_service();
588da6c28aaSamw 		return (0);
589da6c28aaSamw 
590da6c28aaSamw 	case NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND:
591*8d7e4166Sjose borrego 		(void) fprintf(stderr,
592*8d7e4166Sjose borrego 		    gettext("failed to find any domain controllers for %s\n"),
593da6c28aaSamw 		    jdi.domain_name);
594*8d7e4166Sjose borrego 		bzero(&jdi, sizeof (jdi));
595*8d7e4166Sjose borrego 		return (1);
596da6c28aaSamw 
597da6c28aaSamw 	default:
598*8d7e4166Sjose borrego 		(void) fprintf(stderr, gettext("failed to join %s: %s\n"),
599da6c28aaSamw 		    jdi.domain_name, xlate_nt_status(status));
600*8d7e4166Sjose borrego 		bzero(&jdi, sizeof (jdi));
601*8d7e4166Sjose borrego 		return (1);
602*8d7e4166Sjose borrego 	}
603da6c28aaSamw }
604da6c28aaSamw 
605*8d7e4166Sjose borrego /*
606*8d7e4166Sjose borrego  * We want to process the user and domain names as separate strings.
607*8d7e4166Sjose borrego  * Check for names of the forms below and separate the components as
608*8d7e4166Sjose borrego  * required.
609*8d7e4166Sjose borrego  *
610*8d7e4166Sjose borrego  *	name@domain
611*8d7e4166Sjose borrego  *	domain\name
612*8d7e4166Sjose borrego  *	domain/name
613*8d7e4166Sjose borrego  *
614*8d7e4166Sjose borrego  * If we encounter any of the forms above in arg, the @, / or \
615*8d7e4166Sjose borrego  * separator is replaced by \0 and the username and domain pointers
616*8d7e4166Sjose borrego  * are changed to point to the appropriate components (in arg).
617*8d7e4166Sjose borrego  *
618*8d7e4166Sjose borrego  * If none of the separators are encountered, the username and domain
619*8d7e4166Sjose borrego  * pointers remain unchanged.
620*8d7e4166Sjose borrego  */
621*8d7e4166Sjose borrego static void
622*8d7e4166Sjose borrego smbadm_extract_domain(char *arg, char **username, char **domain)
623*8d7e4166Sjose borrego {
624*8d7e4166Sjose borrego 	char *p;
625*8d7e4166Sjose borrego 
626*8d7e4166Sjose borrego 	if ((p = strpbrk(arg, "/\\@")) != NULL) {
627*8d7e4166Sjose borrego 		if (*p == '@') {
628*8d7e4166Sjose borrego 			*p = '\0';
629*8d7e4166Sjose borrego 			++p;
630*8d7e4166Sjose borrego 
631*8d7e4166Sjose borrego 			if (strchr(arg, '+') != NULL)
632*8d7e4166Sjose borrego 				return;
633*8d7e4166Sjose borrego 
634*8d7e4166Sjose borrego 			*domain = p;
635*8d7e4166Sjose borrego 			*username = arg;
636*8d7e4166Sjose borrego 		} else {
637*8d7e4166Sjose borrego 			*p = '\0';
638*8d7e4166Sjose borrego 			++p;
639*8d7e4166Sjose borrego 			*username = p;
640*8d7e4166Sjose borrego 			*domain = arg;
641*8d7e4166Sjose borrego 		}
642*8d7e4166Sjose borrego 	}
643*8d7e4166Sjose borrego }
644*8d7e4166Sjose borrego 
645*8d7e4166Sjose borrego /*
646*8d7e4166Sjose borrego  * Check a domain name for RFC 1035 and 1123 compliance.  Domain names may
647*8d7e4166Sjose borrego  * contain alphanumeric characters, hyphens and dots.  The first and last
648*8d7e4166Sjose borrego  * character of a label must be alphanumeric.  Interior characters may be
649*8d7e4166Sjose borrego  * alphanumeric or hypens.
650*8d7e4166Sjose borrego  *
651*8d7e4166Sjose borrego  * Domain names should not contain underscores but we allow them because
652*8d7e4166Sjose borrego  * Windows names are often in non-compliance with this rule.
653*8d7e4166Sjose borrego  */
654*8d7e4166Sjose borrego static boolean_t
655*8d7e4166Sjose borrego smbadm_valid_domainname(const char *domain)
656*8d7e4166Sjose borrego {
657*8d7e4166Sjose borrego 	boolean_t new_label = B_TRUE;
658*8d7e4166Sjose borrego 	const char *p;
659*8d7e4166Sjose borrego 	char label_terminator;
660*8d7e4166Sjose borrego 
661*8d7e4166Sjose borrego 	if (domain == NULL || *domain == '\0')
662*8d7e4166Sjose borrego 		return (B_FALSE);
663*8d7e4166Sjose borrego 
664*8d7e4166Sjose borrego 	label_terminator = *domain;
665*8d7e4166Sjose borrego 
666*8d7e4166Sjose borrego 	for (p = domain; *p != '\0'; ++p) {
667*8d7e4166Sjose borrego 		if (new_label) {
668*8d7e4166Sjose borrego 			if (!isalnum(*p))
669*8d7e4166Sjose borrego 				return (B_FALSE);
670*8d7e4166Sjose borrego 			new_label = B_FALSE;
671*8d7e4166Sjose borrego 			label_terminator = *p;
672*8d7e4166Sjose borrego 			continue;
673*8d7e4166Sjose borrego 		}
674*8d7e4166Sjose borrego 
675*8d7e4166Sjose borrego 		if (*p == '.') {
676*8d7e4166Sjose borrego 			if (!isalnum(label_terminator))
677*8d7e4166Sjose borrego 				return (B_FALSE);
678*8d7e4166Sjose borrego 			new_label = B_TRUE;
679*8d7e4166Sjose borrego 			label_terminator = *p;
680*8d7e4166Sjose borrego 			continue;
681*8d7e4166Sjose borrego 		}
682*8d7e4166Sjose borrego 
683*8d7e4166Sjose borrego 		label_terminator = *p;
684*8d7e4166Sjose borrego 
685*8d7e4166Sjose borrego 		if (isalnum(*p) || *p == '-' || *p == '_')
686*8d7e4166Sjose borrego 			continue;
687*8d7e4166Sjose borrego 
688*8d7e4166Sjose borrego 		return (B_FALSE);
689*8d7e4166Sjose borrego 	}
690*8d7e4166Sjose borrego 
691*8d7e4166Sjose borrego 	if (!isalnum(label_terminator))
692*8d7e4166Sjose borrego 		return (B_FALSE);
693*8d7e4166Sjose borrego 	return (B_TRUE);
694*8d7e4166Sjose borrego }
695*8d7e4166Sjose borrego 
696*8d7e4166Sjose borrego /*
697*8d7e4166Sjose borrego  * Windows user names cannot contain the following characters
698*8d7e4166Sjose borrego  * or control characters.
699*8d7e4166Sjose borrego  *
700*8d7e4166Sjose borrego  * " / \ [ ] < > + ; , ? * = @
701*8d7e4166Sjose borrego  */
702*8d7e4166Sjose borrego static boolean_t
703*8d7e4166Sjose borrego smbadm_valid_username(const char *username)
704*8d7e4166Sjose borrego {
705*8d7e4166Sjose borrego 	const char *invalid = "\"/\\[]<>+;,?*=@";
706*8d7e4166Sjose borrego 	const char *p;
707*8d7e4166Sjose borrego 
708*8d7e4166Sjose borrego 	if (username == NULL)
709*8d7e4166Sjose borrego 		return (B_FALSE);
710*8d7e4166Sjose borrego 
711*8d7e4166Sjose borrego 	if (strpbrk(username, invalid))
712*8d7e4166Sjose borrego 		return (B_FALSE);
713*8d7e4166Sjose borrego 
714*8d7e4166Sjose borrego 	for (p = username; *p != '\0'; p++) {
715*8d7e4166Sjose borrego 		if (iscntrl(*p))
716*8d7e4166Sjose borrego 			return (B_FALSE);
717*8d7e4166Sjose borrego 	}
718*8d7e4166Sjose borrego 
719*8d7e4166Sjose borrego 	return (B_TRUE);
720*8d7e4166Sjose borrego }
721*8d7e4166Sjose borrego 
722*8d7e4166Sjose borrego /*
723*8d7e4166Sjose borrego  * A workgroup name can contain 1 to 15 characters but cannot be the same
724*8d7e4166Sjose borrego  * as the NetBIOS name.  The name must begin with a letter or number.
725*8d7e4166Sjose borrego  *
726*8d7e4166Sjose borrego  * The name cannot consist entirely of spaces or dots, which is covered
727*8d7e4166Sjose borrego  * by the requirement that the name must begin with an alphanumeric
728*8d7e4166Sjose borrego  * character.
729*8d7e4166Sjose borrego  *
730*8d7e4166Sjose borrego  * The name must not contain any of the following characters or control
731*8d7e4166Sjose borrego  * characters.
732*8d7e4166Sjose borrego  *
733*8d7e4166Sjose borrego  * " / \ [ ] : | < > + = ; , ?
734*8d7e4166Sjose borrego  */
735*8d7e4166Sjose borrego static boolean_t
736*8d7e4166Sjose borrego smbadm_valid_workgroup(const char *workgroup)
737*8d7e4166Sjose borrego {
738*8d7e4166Sjose borrego 	char netbiosname[NETBIOS_NAME_SZ];
739*8d7e4166Sjose borrego 	const char *invalid = "\"/\\[]:|<>+=;,?";
740*8d7e4166Sjose borrego 	const char *p;
741*8d7e4166Sjose borrego 
742*8d7e4166Sjose borrego 	if (workgroup == NULL || *workgroup == '\0' || (!isalnum(*workgroup)))
743*8d7e4166Sjose borrego 		return (B_FALSE);
744*8d7e4166Sjose borrego 
745*8d7e4166Sjose borrego 	if (strlen(workgroup) >= NETBIOS_NAME_SZ)
746*8d7e4166Sjose borrego 		return (B_FALSE);
747*8d7e4166Sjose borrego 
748*8d7e4166Sjose borrego 	if (smb_getnetbiosname(netbiosname, NETBIOS_NAME_SZ) == 0) {
749*8d7e4166Sjose borrego 		if (utf8_strcasecmp(workgroup, netbiosname) == 0)
750*8d7e4166Sjose borrego 			return (B_FALSE);
751*8d7e4166Sjose borrego 	}
752*8d7e4166Sjose borrego 
753*8d7e4166Sjose borrego 	if (strpbrk(workgroup, invalid))
754*8d7e4166Sjose borrego 		return (B_FALSE);
755*8d7e4166Sjose borrego 
756*8d7e4166Sjose borrego 	for (p = workgroup; *p != '\0'; p++) {
757*8d7e4166Sjose borrego 		if (iscntrl(*p))
758*8d7e4166Sjose borrego 			return (B_FALSE);
759*8d7e4166Sjose borrego 	}
760*8d7e4166Sjose borrego 
761*8d7e4166Sjose borrego 	return (B_TRUE);
762da6c28aaSamw }
763da6c28aaSamw 
764da6c28aaSamw /*
765da6c28aaSamw  * smbadm_list
766da6c28aaSamw  *
767da6c28aaSamw  * Displays current security mode and domain/workgroup name.
768da6c28aaSamw  */
769da6c28aaSamw /*ARGSUSED*/
770da6c28aaSamw static int
771da6c28aaSamw smbadm_list(int argc, char **argv)
772da6c28aaSamw {
773faa1795aSjb150015 	char domain[MAXHOSTNAMELEN];
774*8d7e4166Sjose borrego 	char fqdn[MAXHOSTNAMELEN];
775*8d7e4166Sjose borrego 	char srvname[MAXHOSTNAMELEN];
776faa1795aSjb150015 	char modename[16];
777faa1795aSjb150015 	int rc;
778*8d7e4166Sjose borrego 	uint32_t srvipaddr;
779c8ec8eeaSjose borrego 	char ipstr[INET6_ADDRSTRLEN];
780da6c28aaSamw 
781faa1795aSjb150015 	rc = smb_config_getstr(SMB_CI_SECURITY, modename, sizeof (modename));
782faa1795aSjb150015 	if (rc != SMBD_SMF_OK) {
783da6c28aaSamw 		(void) fprintf(stderr,
784c8ec8eeaSjose borrego 		    gettext("failed to get the connected mode\n"));
785da6c28aaSamw 		return (1);
786da6c28aaSamw 	}
787da6c28aaSamw 
788faa1795aSjb150015 	if (smb_getdomainname(domain, sizeof (domain)) != 0) {
789faa1795aSjb150015 		(void) fprintf(stderr, gettext("failed to get the %s name\n"),
790faa1795aSjb150015 		    modename);
791da6c28aaSamw 		return (1);
792da6c28aaSamw 	}
793c8ec8eeaSjose borrego 	if (strcmp(modename, "workgroup") == 0) {
794c8ec8eeaSjose borrego 		(void) printf(gettext("Workgroup: %s\n"), domain);
795c8ec8eeaSjose borrego 		return (0);
796c8ec8eeaSjose borrego 	}
797c8ec8eeaSjose borrego 	(void) printf(gettext("Domain: %s\n"), domain);
798*8d7e4166Sjose borrego 	if ((smb_getfqdomainname(fqdn, sizeof (fqdn)) == 0) && (*fqdn != '\0'))
799*8d7e4166Sjose borrego 		(void) printf(gettext("FQDN: %s\n"), fqdn);
800da6c28aaSamw 
801*8d7e4166Sjose borrego 	if ((smb_get_dcinfo(srvname, MAXHOSTNAMELEN, &srvipaddr)
802*8d7e4166Sjose borrego 	    == NT_STATUS_SUCCESS) && (*srvname != '\0') &&
803*8d7e4166Sjose borrego 	    (srvipaddr != 0)) {
804*8d7e4166Sjose borrego 		(void) inet_ntop(AF_INET, (const void *)&srvipaddr,
805c8ec8eeaSjose borrego 		    ipstr, sizeof (ipstr));
806c8ec8eeaSjose borrego 		(void) printf(gettext("Selected Domain Controller: %s (%s)\n"),
807*8d7e4166Sjose borrego 		    srvname, ipstr);
808c8ec8eeaSjose borrego 	}
809da6c28aaSamw 	return (0);
810da6c28aaSamw }
811da6c28aaSamw 
812da6c28aaSamw /*
813da6c28aaSamw  * smbadm_group_create
814da6c28aaSamw  *
815da6c28aaSamw  * Creates a local SMB group
816da6c28aaSamw  */
817da6c28aaSamw static int
818da6c28aaSamw smbadm_group_create(int argc, char **argv)
819da6c28aaSamw {
820da6c28aaSamw 	char *gname = NULL;
821da6c28aaSamw 	char *desc = NULL;
822da6c28aaSamw 	char option;
823dc20a302Sas200622 	int status;
824da6c28aaSamw 
825da6c28aaSamw 	while ((option = getopt(argc, argv, "d:")) != -1) {
826da6c28aaSamw 		switch (option) {
827da6c28aaSamw 		case 'd':
828da6c28aaSamw 			desc = optarg;
829da6c28aaSamw 			break;
830da6c28aaSamw 
831da6c28aaSamw 		default:
832da6c28aaSamw 			smbadm_usage(B_FALSE);
833da6c28aaSamw 		}
834da6c28aaSamw 	}
835da6c28aaSamw 
836da6c28aaSamw 	gname = argv[optind];
837da6c28aaSamw 	if (optind >= argc || gname == NULL || *gname == '\0') {
838da6c28aaSamw 		(void) fprintf(stderr, gettext("missing group name\n"));
839da6c28aaSamw 		smbadm_usage(B_FALSE);
840da6c28aaSamw 	}
841da6c28aaSamw 
842da6c28aaSamw 	if (getgrnam(gname) == NULL) {
843da6c28aaSamw 		(void) fprintf(stderr,
844dc20a302Sas200622 		    gettext("failed to get the Solaris group '%s'\n"), gname);
845da6c28aaSamw 		(void) fprintf(stderr,
846dc20a302Sas200622 		    gettext("use 'groupadd' to add '%s'\n"), gname);
847da6c28aaSamw 		return (1);
848da6c28aaSamw 	}
849da6c28aaSamw 
850dc20a302Sas200622 	status = smb_lgrp_add(gname, desc);
851dc20a302Sas200622 	if (status != SMB_LGRP_SUCCESS) {
852da6c28aaSamw 		(void) fprintf(stderr,
853da6c28aaSamw 		    gettext("failed to create the group (%s)\n"),
854dc20a302Sas200622 		    smb_lgrp_strerror(status));
855da6c28aaSamw 	} else {
856dc20a302Sas200622 		(void) printf(gettext("'%s' created.\n"),
857da6c28aaSamw 		    gname);
858da6c28aaSamw 	}
859da6c28aaSamw 
860da6c28aaSamw 	return (status);
861da6c28aaSamw }
862da6c28aaSamw 
863da6c28aaSamw /*
864da6c28aaSamw  * smbadm_group_dump_members
865da6c28aaSamw  *
866da6c28aaSamw  * Dump group members details.
867da6c28aaSamw  */
868da6c28aaSamw static void
869dc20a302Sas200622 smbadm_group_dump_members(smb_gsid_t *members, int num)
870da6c28aaSamw {
8716537f381Sas200622 	char sidstr[SMB_SID_STRSZ];
872da6c28aaSamw 	int i;
873da6c28aaSamw 
874dc20a302Sas200622 	if (num == 0) {
875da6c28aaSamw 		(void) printf(gettext("\tNo members\n"));
876da6c28aaSamw 		return;
877da6c28aaSamw 	}
878da6c28aaSamw 
879da6c28aaSamw 	(void) printf(gettext("\tMembers:\n"));
880dc20a302Sas200622 	for (i = 0; i < num; i++) {
8818c10a865Sas200622 		*sidstr = '\0';
8828c10a865Sas200622 		if (smb_lookup_sid(members[i].gs_sid, sidstr,
8838c10a865Sas200622 		    sizeof (sidstr)) == NT_STATUS_SUCCESS)
884dc20a302Sas200622 			(void) printf(gettext("\t\t%s\n"), sidstr);
8858c10a865Sas200622 		else
886*8d7e4166Sjose borrego 			(void) printf(gettext("\t\tinvalid SID\n"));
887da6c28aaSamw 	}
888da6c28aaSamw }
889da6c28aaSamw 
890da6c28aaSamw /*
891da6c28aaSamw  * smbadm_group_dump_privs
892da6c28aaSamw  *
893da6c28aaSamw  * Dump group privilege details.
894da6c28aaSamw  */
895da6c28aaSamw static void
896dc20a302Sas200622 smbadm_group_dump_privs(smb_privset_t *privs)
897da6c28aaSamw {
898dc20a302Sas200622 	smb_privinfo_t *pinfo;
899dc20a302Sas200622 	char *pstatus;
900da6c28aaSamw 	int i;
901da6c28aaSamw 
902da6c28aaSamw 	(void) printf(gettext("\tPrivileges: \n"));
903da6c28aaSamw 
904dc20a302Sas200622 	for (i = 0; i < privs->priv_cnt; i++) {
905dc20a302Sas200622 		pinfo = smb_priv_getbyvalue(privs->priv[i].luid.lo_part);
906dc20a302Sas200622 		if ((pinfo == NULL) || (pinfo->flags & PF_PRESENTABLE) == 0)
907da6c28aaSamw 			continue;
908da6c28aaSamw 
909dc20a302Sas200622 		switch (privs->priv[i].attrs) {
910dc20a302Sas200622 		case SE_PRIVILEGE_ENABLED:
911dc20a302Sas200622 			pstatus = "On";
912dc20a302Sas200622 			break;
913dc20a302Sas200622 		case SE_PRIVILEGE_DISABLED:
914dc20a302Sas200622 			pstatus = "Off";
915dc20a302Sas200622 			break;
916dc20a302Sas200622 		default:
917dc20a302Sas200622 			pstatus = "Unknown";
918dc20a302Sas200622 			break;
919dc20a302Sas200622 		}
920dc20a302Sas200622 		(void) printf(gettext("\t\t%s: %s\n"), pinfo->name, pstatus);
921da6c28aaSamw 	}
922da6c28aaSamw 
923dc20a302Sas200622 	if (privs->priv_cnt == 0)
924da6c28aaSamw 		(void) printf(gettext("\t\tNo privileges\n"));
925da6c28aaSamw }
926da6c28aaSamw 
927da6c28aaSamw /*
928da6c28aaSamw  * smbadm_group_dump
929da6c28aaSamw  *
930da6c28aaSamw  * Dump group details.
931da6c28aaSamw  */
932dc20a302Sas200622 static void
933dc20a302Sas200622 smbadm_group_dump(smb_group_t *grp, boolean_t show_mem, boolean_t show_privs)
934da6c28aaSamw {
9356537f381Sas200622 	char sidstr[SMB_SID_STRSZ];
936da6c28aaSamw 
937dc20a302Sas200622 	(void) printf(gettext("%s (%s)\n"), grp->sg_name, grp->sg_cmnt);
938da6c28aaSamw 
9396537f381Sas200622 	smb_sid_tostr(grp->sg_id.gs_sid, sidstr);
940dc20a302Sas200622 	(void) printf(gettext("\tSID: %s\n"), sidstr);
941da6c28aaSamw 
942da6c28aaSamw 	if (show_privs)
943dc20a302Sas200622 		smbadm_group_dump_privs(grp->sg_privs);
944da6c28aaSamw 
945da6c28aaSamw 	if (show_mem)
946dc20a302Sas200622 		smbadm_group_dump_members(grp->sg_members, grp->sg_nmembers);
947da6c28aaSamw }
948da6c28aaSamw 
949da6c28aaSamw /*
950da6c28aaSamw  * smbadm_group_show
951da6c28aaSamw  *
952da6c28aaSamw  */
953da6c28aaSamw static int
954da6c28aaSamw smbadm_group_show(int argc, char **argv)
955da6c28aaSamw {
956da6c28aaSamw 	char *gname = NULL;
957da6c28aaSamw 	boolean_t show_privs;
958da6c28aaSamw 	boolean_t show_members;
959da6c28aaSamw 	char option;
960dc20a302Sas200622 	int status;
961dc20a302Sas200622 	smb_group_t grp;
962dc20a302Sas200622 	smb_giter_t gi;
963da6c28aaSamw 
964da6c28aaSamw 	show_privs = show_members = B_FALSE;
965da6c28aaSamw 
966da6c28aaSamw 	while ((option = getopt(argc, argv, "mp")) != -1) {
967da6c28aaSamw 		switch (option) {
968da6c28aaSamw 		case 'm':
969da6c28aaSamw 			show_members = B_TRUE;
970da6c28aaSamw 			break;
971da6c28aaSamw 		case 'p':
972da6c28aaSamw 			show_privs = B_TRUE;
973da6c28aaSamw 			break;
974da6c28aaSamw 
975da6c28aaSamw 		default:
976da6c28aaSamw 			smbadm_usage(B_FALSE);
977da6c28aaSamw 		}
978da6c28aaSamw 	}
979da6c28aaSamw 
980da6c28aaSamw 	gname = argv[optind];
981da6c28aaSamw 	if (optind >= argc || gname == NULL || *gname == '\0')
982da6c28aaSamw 		gname = "*";
983da6c28aaSamw 
984dc20a302Sas200622 	if (strcmp(gname, "*")) {
985dc20a302Sas200622 		status = smb_lgrp_getbyname(gname, &grp);
986dc20a302Sas200622 		if (status == SMB_LGRP_SUCCESS) {
987dc20a302Sas200622 			smbadm_group_dump(&grp, show_members, show_privs);
988dc20a302Sas200622 			smb_lgrp_free(&grp);
989dc20a302Sas200622 		} else {
990da6c28aaSamw 			(void) fprintf(stderr,
991*8d7e4166Sjose borrego 			    gettext("failed to find %s (%s)\n"),
992dc20a302Sas200622 			    gname, smb_lgrp_strerror(status));
993dc20a302Sas200622 		}
994dc20a302Sas200622 		return (status);
995da6c28aaSamw 	}
996da6c28aaSamw 
9976537f381Sas200622 	if ((status = smb_lgrp_iteropen(&gi)) != SMB_LGRP_SUCCESS) {
998*8d7e4166Sjose borrego 		(void) fprintf(stderr, gettext("failed to list groups (%s)\n"),
999dc20a302Sas200622 		    smb_lgrp_strerror(status));
1000dc20a302Sas200622 		return (status);
1001da6c28aaSamw 	}
1002da6c28aaSamw 
10036537f381Sas200622 	while ((status = smb_lgrp_iterate(&gi, &grp)) == SMB_LGRP_SUCCESS) {
1004dc20a302Sas200622 		smbadm_group_dump(&grp, show_members, show_privs);
1005dc20a302Sas200622 		smb_lgrp_free(&grp);
1006da6c28aaSamw 	}
10076537f381Sas200622 
1008dc20a302Sas200622 	smb_lgrp_iterclose(&gi);
1009da6c28aaSamw 
10106537f381Sas200622 	if (status != SMB_LGRP_NO_MORE) {
10116537f381Sas200622 		(void) fprintf(stderr,
10126537f381Sas200622 		    gettext("failed to get all the groups (%s)\n"),
10136537f381Sas200622 		    smb_lgrp_strerror(status));
10146537f381Sas200622 		return (status);
10156537f381Sas200622 	}
10166537f381Sas200622 
1017dc20a302Sas200622 	return (0);
1018da6c28aaSamw }
1019da6c28aaSamw 
1020da6c28aaSamw /*
1021da6c28aaSamw  * smbadm_group_delete
1022da6c28aaSamw  */
1023da6c28aaSamw static int
1024da6c28aaSamw smbadm_group_delete(int argc, char **argv)
1025da6c28aaSamw {
1026da6c28aaSamw 	char *gname = NULL;
1027dc20a302Sas200622 	int status;
1028da6c28aaSamw 
1029da6c28aaSamw 	gname = argv[optind];
1030da6c28aaSamw 	if (optind >= argc || gname == NULL || *gname == '\0') {
1031da6c28aaSamw 		(void) fprintf(stderr, gettext("missing group name\n"));
1032da6c28aaSamw 		smbadm_usage(B_FALSE);
1033da6c28aaSamw 	}
1034da6c28aaSamw 
1035dc20a302Sas200622 	status = smb_lgrp_delete(gname);
1036dc20a302Sas200622 	if (status != SMB_LGRP_SUCCESS) {
1037da6c28aaSamw 		(void) fprintf(stderr,
1038*8d7e4166Sjose borrego 		    gettext("failed to delete %s (%s)\n"), gname,
1039dc20a302Sas200622 		    smb_lgrp_strerror(status));
1040da6c28aaSamw 	} else {
1041*8d7e4166Sjose borrego 		(void) printf(gettext("%s deleted.\n"), gname);
1042da6c28aaSamw 	}
1043da6c28aaSamw 
1044da6c28aaSamw 	return (status);
1045da6c28aaSamw }
1046da6c28aaSamw 
1047da6c28aaSamw /*
1048da6c28aaSamw  * smbadm_group_rename
1049da6c28aaSamw  */
1050da6c28aaSamw static int
1051da6c28aaSamw smbadm_group_rename(int argc, char **argv)
1052da6c28aaSamw {
1053da6c28aaSamw 	char *gname = NULL;
1054da6c28aaSamw 	char *ngname = NULL;
1055dc20a302Sas200622 	int status;
1056da6c28aaSamw 
1057da6c28aaSamw 	gname = argv[optind];
1058da6c28aaSamw 	if (optind++ >= argc || gname == NULL || *gname == '\0') {
1059da6c28aaSamw 		(void) fprintf(stderr, gettext("missing group name\n"));
1060da6c28aaSamw 		smbadm_usage(B_FALSE);
1061da6c28aaSamw 	}
1062da6c28aaSamw 
1063da6c28aaSamw 	ngname = argv[optind];
1064da6c28aaSamw 	if (optind >= argc || ngname == NULL || *ngname == '\0') {
1065da6c28aaSamw 		(void) fprintf(stderr, gettext("missing new group name\n"));
1066da6c28aaSamw 		smbadm_usage(B_FALSE);
1067da6c28aaSamw 	}
1068da6c28aaSamw 
1069dc20a302Sas200622 	if (getgrnam(ngname) == NULL) {
1070da6c28aaSamw 		(void) fprintf(stderr,
1071dc20a302Sas200622 		    gettext("failed to get the Solaris group '%s'\n"), ngname);
1072da6c28aaSamw 		(void) fprintf(stderr,
1073dc20a302Sas200622 		    gettext("use 'groupadd' to add '%s'\n"), ngname);
1074da6c28aaSamw 		return (1);
1075da6c28aaSamw 	}
1076da6c28aaSamw 
1077dc20a302Sas200622 	status = smb_lgrp_rename(gname, ngname);
1078dc20a302Sas200622 	if (status != SMB_LGRP_SUCCESS) {
1079dc20a302Sas200622 		if (status == SMB_LGRP_EXISTS)
1080da6c28aaSamw 			(void) fprintf(stderr,
1081dc20a302Sas200622 			    gettext("failed to rename '%s' (%s already "
1082dc20a302Sas200622 			    "exists)\n"), gname, ngname);
1083dc20a302Sas200622 		else
1084dc20a302Sas200622 			(void) fprintf(stderr,
1085dc20a302Sas200622 			    gettext("failed to rename '%s' (%s)\n"), gname,
1086dc20a302Sas200622 			    smb_lgrp_strerror(status));
1087da6c28aaSamw 	} else {
1088dc20a302Sas200622 		(void) printf(gettext("'%s' renamed to '%s'\n"), gname, ngname);
1089da6c28aaSamw 	}
1090da6c28aaSamw 
1091da6c28aaSamw 	return (status);
1092da6c28aaSamw }
1093da6c28aaSamw 
1094da6c28aaSamw /*
1095da6c28aaSamw  * smbadm_group_setprop
1096da6c28aaSamw  *
1097da6c28aaSamw  * Set the group properties.
1098da6c28aaSamw  */
1099da6c28aaSamw static int
1100da6c28aaSamw smbadm_group_setprop(int argc, char **argv)
1101da6c28aaSamw {
1102da6c28aaSamw 	char *gname = NULL;
1103da6c28aaSamw 	smbadm_prop_t props[SMBADM_NPROP];
1104da6c28aaSamw 	smbadm_prop_handle_t *phandle;
1105da6c28aaSamw 	char option;
1106da6c28aaSamw 	int pcnt = 0;
1107da6c28aaSamw 	int ret;
1108da6c28aaSamw 	int p;
1109da6c28aaSamw 
1110da6c28aaSamw 	bzero(props, SMBADM_NPROP * sizeof (smbadm_prop_t));
1111da6c28aaSamw 
1112da6c28aaSamw 	while ((option = getopt(argc, argv, "p:")) != -1) {
1113da6c28aaSamw 		switch (option) {
1114da6c28aaSamw 		case 'p':
1115da6c28aaSamw 			if (pcnt >= SMBADM_NPROP) {
1116da6c28aaSamw 				(void) fprintf(stderr,
1117da6c28aaSamw 				    gettext("exceeded number of supported"
1118da6c28aaSamw 				    " properties\n"));
1119da6c28aaSamw 				smbadm_usage(B_FALSE);
1120da6c28aaSamw 			}
1121da6c28aaSamw 
1122dc20a302Sas200622 			if (smbadm_prop_parse(optarg, &props[pcnt++]) != 0)
1123da6c28aaSamw 				smbadm_usage(B_FALSE);
1124da6c28aaSamw 			break;
1125da6c28aaSamw 
1126da6c28aaSamw 		default:
1127da6c28aaSamw 			smbadm_usage(B_FALSE);
1128da6c28aaSamw 		}
1129da6c28aaSamw 	}
1130da6c28aaSamw 
1131da6c28aaSamw 	if (pcnt == 0) {
1132da6c28aaSamw 		(void) fprintf(stderr,
1133da6c28aaSamw 		    gettext("missing property=value argument\n"));
1134da6c28aaSamw 		smbadm_usage(B_FALSE);
1135da6c28aaSamw 	}
1136da6c28aaSamw 
1137da6c28aaSamw 	gname = argv[optind];
1138da6c28aaSamw 	if (optind >= argc || gname == NULL || *gname == '\0') {
1139da6c28aaSamw 		(void) fprintf(stderr, gettext("missing group name\n"));
1140da6c28aaSamw 		smbadm_usage(B_FALSE);
1141da6c28aaSamw 	}
1142da6c28aaSamw 
1143da6c28aaSamw 	for (p = 0; p < pcnt; p++) {
1144da6c28aaSamw 		phandle = smbadm_prop_gethandle(props[p].p_name);
1145da6c28aaSamw 		if (phandle) {
1146da6c28aaSamw 			if (phandle->p_setfn(gname, &props[p]) != 0)
1147da6c28aaSamw 				ret = 1;
1148da6c28aaSamw 		}
1149da6c28aaSamw 	}
1150da6c28aaSamw 
1151da6c28aaSamw 	return (ret);
1152da6c28aaSamw }
1153da6c28aaSamw 
1154da6c28aaSamw /*
1155da6c28aaSamw  * smbadm_group_getprop
1156da6c28aaSamw  *
1157da6c28aaSamw  * Get the group properties.
1158da6c28aaSamw  */
1159da6c28aaSamw static int
1160da6c28aaSamw smbadm_group_getprop(int argc, char **argv)
1161da6c28aaSamw {
1162da6c28aaSamw 	char *gname = NULL;
1163da6c28aaSamw 	smbadm_prop_t props[SMBADM_NPROP];
1164da6c28aaSamw 	smbadm_prop_handle_t *phandle;
1165da6c28aaSamw 	char option;
1166da6c28aaSamw 	int pcnt = 0;
1167da6c28aaSamw 	int ret;
1168da6c28aaSamw 	int p;
1169da6c28aaSamw 
1170da6c28aaSamw 	bzero(props, SMBADM_NPROP * sizeof (smbadm_prop_t));
1171da6c28aaSamw 
1172da6c28aaSamw 	while ((option = getopt(argc, argv, "p:")) != -1) {
1173da6c28aaSamw 		switch (option) {
1174da6c28aaSamw 		case 'p':
1175da6c28aaSamw 			if (pcnt >= SMBADM_NPROP) {
1176da6c28aaSamw 				(void) fprintf(stderr,
1177da6c28aaSamw 				    gettext("exceeded number of supported"
1178da6c28aaSamw 				    " properties\n"));
1179da6c28aaSamw 				smbadm_usage(B_FALSE);
1180da6c28aaSamw 			}
1181da6c28aaSamw 
1182dc20a302Sas200622 			if (smbadm_prop_parse(optarg, &props[pcnt++]) != 0)
1183da6c28aaSamw 				smbadm_usage(B_FALSE);
1184da6c28aaSamw 			break;
1185da6c28aaSamw 
1186da6c28aaSamw 		default:
1187da6c28aaSamw 			smbadm_usage(B_FALSE);
1188da6c28aaSamw 		}
1189da6c28aaSamw 	}
1190da6c28aaSamw 
1191da6c28aaSamw 	gname = argv[optind];
1192da6c28aaSamw 	if (optind >= argc || gname == NULL || *gname == '\0') {
1193da6c28aaSamw 		(void) fprintf(stderr, gettext("missing group name\n"));
1194da6c28aaSamw 		smbadm_usage(B_FALSE);
1195da6c28aaSamw 	}
1196da6c28aaSamw 
1197da6c28aaSamw 	if (pcnt == 0) {
1198da6c28aaSamw 		/*
1199da6c28aaSamw 		 * If no property has be specified then get
1200da6c28aaSamw 		 * all the properties.
1201da6c28aaSamw 		 */
1202da6c28aaSamw 		pcnt = SMBADM_NPROP;
1203da6c28aaSamw 		for (p = 0; p < pcnt; p++)
1204da6c28aaSamw 			props[p].p_name = smbadm_ptable[p].p_name;
1205da6c28aaSamw 	}
1206da6c28aaSamw 
1207da6c28aaSamw 	for (p = 0; p < pcnt; p++) {
1208da6c28aaSamw 		phandle = smbadm_prop_gethandle(props[p].p_name);
1209da6c28aaSamw 		if (phandle) {
1210da6c28aaSamw 			if (phandle->p_getfn(gname, &props[p]) != 0)
1211da6c28aaSamw 				ret = 1;
1212da6c28aaSamw 		}
1213da6c28aaSamw 	}
1214da6c28aaSamw 
1215da6c28aaSamw 	return (ret);
1216da6c28aaSamw }
1217da6c28aaSamw 
1218da6c28aaSamw /*
1219da6c28aaSamw  * smbadm_group_addmember
1220da6c28aaSamw  *
1221da6c28aaSamw  */
1222da6c28aaSamw static int
1223da6c28aaSamw smbadm_group_addmember(int argc, char **argv)
1224da6c28aaSamw {
1225da6c28aaSamw 	char *gname = NULL;
1226da6c28aaSamw 	char **mname;
1227da6c28aaSamw 	char option;
1228dc20a302Sas200622 	smb_gsid_t msid;
1229dc20a302Sas200622 	int status;
1230da6c28aaSamw 	int mcnt = 0;
1231da6c28aaSamw 	int ret = 0;
1232da6c28aaSamw 	int i;
1233da6c28aaSamw 
1234da6c28aaSamw 
1235da6c28aaSamw 	mname = (char **)malloc(argc * sizeof (char *));
1236da6c28aaSamw 	if (mname == NULL) {
1237*8d7e4166Sjose borrego 		warn(gettext("failed to add group member"));
1238da6c28aaSamw 		return (1);
1239da6c28aaSamw 	}
1240da6c28aaSamw 	bzero(mname, argc * sizeof (char *));
1241da6c28aaSamw 
1242da6c28aaSamw 	while ((option = getopt(argc, argv, "m:")) != -1) {
1243da6c28aaSamw 		switch (option) {
1244da6c28aaSamw 		case 'm':
1245da6c28aaSamw 			mname[mcnt++] = optarg;
1246da6c28aaSamw 			break;
1247da6c28aaSamw 
1248da6c28aaSamw 		default:
1249da6c28aaSamw 			free(mname);
1250da6c28aaSamw 			smbadm_usage(B_FALSE);
1251da6c28aaSamw 		}
1252da6c28aaSamw 	}
1253da6c28aaSamw 
1254da6c28aaSamw 	if (mcnt == 0) {
1255da6c28aaSamw 		(void) fprintf(stderr, gettext("missing member name\n"));
1256da6c28aaSamw 		free(mname);
1257da6c28aaSamw 		smbadm_usage(B_FALSE);
1258da6c28aaSamw 	}
1259da6c28aaSamw 
1260da6c28aaSamw 	gname = argv[optind];
1261da6c28aaSamw 	if (optind >= argc || gname == NULL || *gname == 0) {
1262da6c28aaSamw 		(void) fprintf(stderr, gettext("missing group name\n"));
1263da6c28aaSamw 		free(mname);
1264da6c28aaSamw 		smbadm_usage(B_FALSE);
1265da6c28aaSamw 	}
1266da6c28aaSamw 
1267da6c28aaSamw 
1268da6c28aaSamw 	for (i = 0; i < mcnt; i++) {
1269da6c28aaSamw 		if (mname[i] == NULL)
1270da6c28aaSamw 			continue;
1271da6c28aaSamw 
1272dc20a302Sas200622 		if (smb_lookup_name(mname[i], &msid) != NT_STATUS_SUCCESS) {
1273dc20a302Sas200622 			(void) fprintf(stderr,
1274*8d7e4166Sjose borrego 			    gettext("failed to add %s: unable to obtain SID\n"),
1275dc20a302Sas200622 			    mname[i]);
1276dc20a302Sas200622 			continue;
1277dc20a302Sas200622 		}
1278dc20a302Sas200622 
1279dc20a302Sas200622 		status = smb_lgrp_add_member(gname, msid.gs_sid, msid.gs_type);
1280dc20a302Sas200622 		free(msid.gs_sid);
1281dc20a302Sas200622 		if (status != SMB_LGRP_SUCCESS) {
1282da6c28aaSamw 			(void) fprintf(stderr,
1283da6c28aaSamw 			    gettext("failed to add %s (%s)\n"),
1284dc20a302Sas200622 			    mname[i], smb_lgrp_strerror(status));
1285da6c28aaSamw 			ret = 1;
1286dc20a302Sas200622 		} else {
1287dc20a302Sas200622 			(void) printf(gettext("'%s' is now a member of '%s'\n"),
1288da6c28aaSamw 			    mname[i], gname);
1289da6c28aaSamw 		}
1290dc20a302Sas200622 	}
1291da6c28aaSamw 
1292da6c28aaSamw 	free(mname);
1293da6c28aaSamw 	return (ret);
1294da6c28aaSamw }
1295da6c28aaSamw 
1296da6c28aaSamw /*
1297da6c28aaSamw  * smbadm_group_delmember
1298da6c28aaSamw  */
1299da6c28aaSamw static int
1300da6c28aaSamw smbadm_group_delmember(int argc, char **argv)
1301da6c28aaSamw {
1302da6c28aaSamw 	char *gname = NULL;
1303da6c28aaSamw 	char **mname;
1304da6c28aaSamw 	char option;
1305dc20a302Sas200622 	smb_gsid_t msid;
1306dc20a302Sas200622 	int status;
1307da6c28aaSamw 	int mcnt = 0;
1308da6c28aaSamw 	int ret = 0;
1309da6c28aaSamw 	int i;
1310da6c28aaSamw 
1311da6c28aaSamw 	mname = (char **)malloc(argc * sizeof (char *));
1312da6c28aaSamw 	if (mname == NULL) {
1313*8d7e4166Sjose borrego 		warn(gettext("failed to delete group member"));
1314da6c28aaSamw 		return (1);
1315da6c28aaSamw 	}
1316da6c28aaSamw 	bzero(mname, argc * sizeof (char *));
1317da6c28aaSamw 
1318da6c28aaSamw 	while ((option = getopt(argc, argv, "m:")) != -1) {
1319da6c28aaSamw 		switch (option) {
1320da6c28aaSamw 		case 'm':
1321da6c28aaSamw 			mname[mcnt++] = optarg;
1322da6c28aaSamw 			break;
1323da6c28aaSamw 
1324da6c28aaSamw 		default:
1325da6c28aaSamw 			free(mname);
1326da6c28aaSamw 			smbadm_usage(B_FALSE);
1327da6c28aaSamw 		}
1328da6c28aaSamw 	}
1329da6c28aaSamw 
1330da6c28aaSamw 	if (mcnt == 0) {
1331da6c28aaSamw 		(void) fprintf(stderr, gettext("missing member name\n"));
1332da6c28aaSamw 		free(mname);
1333da6c28aaSamw 		smbadm_usage(B_FALSE);
1334da6c28aaSamw 	}
1335da6c28aaSamw 
1336da6c28aaSamw 	gname = argv[optind];
1337da6c28aaSamw 	if (optind >= argc || gname == NULL || *gname == 0) {
1338da6c28aaSamw 		(void) fprintf(stderr, gettext("missing group name\n"));
1339da6c28aaSamw 		free(mname);
1340da6c28aaSamw 		smbadm_usage(B_FALSE);
1341da6c28aaSamw 	}
1342da6c28aaSamw 
1343da6c28aaSamw 
1344da6c28aaSamw 	for (i = 0; i < mcnt; i++) {
1345da6c28aaSamw 		if (mname[i] == NULL)
1346da6c28aaSamw 			continue;
1347da6c28aaSamw 
1348dc20a302Sas200622 		if (smb_lookup_name(mname[i], &msid) != NT_STATUS_SUCCESS) {
1349dc20a302Sas200622 			(void) fprintf(stderr,
1350*8d7e4166Sjose borrego 			    gettext("failed to remove %s: "
1351*8d7e4166Sjose borrego 			    "unable to obtain SID\n"),
1352dc20a302Sas200622 			    mname[i]);
1353dc20a302Sas200622 			continue;
1354dc20a302Sas200622 		}
1355dc20a302Sas200622 
1356dc20a302Sas200622 		status = smb_lgrp_del_member(gname, msid.gs_sid, msid.gs_type);
1357dc20a302Sas200622 		free(msid.gs_sid);
1358dc20a302Sas200622 		if (status != SMB_LGRP_SUCCESS) {
1359da6c28aaSamw 			(void) fprintf(stderr,
1360da6c28aaSamw 			    gettext("failed to remove %s (%s)\n"),
1361dc20a302Sas200622 			    mname[i], smb_lgrp_strerror(status));
1362da6c28aaSamw 			ret = 1;
1363da6c28aaSamw 		} else {
1364da6c28aaSamw 			(void) printf(
1365dc20a302Sas200622 			    gettext("'%s' has been removed from %s\n"),
1366da6c28aaSamw 			    mname[i], gname);
1367da6c28aaSamw 		}
1368da6c28aaSamw 	}
1369da6c28aaSamw 
1370da6c28aaSamw 	return (ret);
1371da6c28aaSamw }
1372da6c28aaSamw 
1373da6c28aaSamw static int
1374da6c28aaSamw smbadm_user_disable(int argc, char **argv)
1375da6c28aaSamw {
1376da6c28aaSamw 	int error;
1377da6c28aaSamw 	char *user = NULL;
1378da6c28aaSamw 
1379da6c28aaSamw 	user = argv[optind];
1380da6c28aaSamw 	if (optind >= argc || user == NULL || *user == '\0') {
1381da6c28aaSamw 		(void) fprintf(stderr, gettext("missing user name\n"));
1382da6c28aaSamw 		smbadm_usage(B_FALSE);
1383da6c28aaSamw 	}
1384da6c28aaSamw 
1385da6c28aaSamw 	error = smb_pwd_setcntl(user, SMB_PWC_DISABLE);
1386da6c28aaSamw 	if (error == SMB_PWE_SUCCESS)
1387da6c28aaSamw 		(void) printf(gettext("%s is disabled.\n"), user);
1388da6c28aaSamw 	else
1389da6c28aaSamw 		(void) fprintf(stderr, "%s\n", smbadm_pwd_strerror(error));
1390da6c28aaSamw 
1391da6c28aaSamw 	return (error);
1392da6c28aaSamw }
1393da6c28aaSamw 
1394da6c28aaSamw static int
1395da6c28aaSamw smbadm_user_enable(int argc, char **argv)
1396da6c28aaSamw {
1397da6c28aaSamw 	int error;
1398da6c28aaSamw 	char *user = NULL;
1399da6c28aaSamw 
1400da6c28aaSamw 	user = argv[optind];
1401da6c28aaSamw 	if (optind >= argc || user == NULL || *user == '\0') {
1402da6c28aaSamw 		(void) fprintf(stderr, gettext("missing user name\n"));
1403da6c28aaSamw 		smbadm_usage(B_FALSE);
1404da6c28aaSamw 	}
1405da6c28aaSamw 
1406da6c28aaSamw 	error = smb_pwd_setcntl(user, SMB_PWC_ENABLE);
1407da6c28aaSamw 	if (error == SMB_PWE_SUCCESS)
1408da6c28aaSamw 		(void) printf(gettext("%s is enabled.\n"), user);
1409da6c28aaSamw 	else
1410da6c28aaSamw 		(void) fprintf(stderr, "%s\n", smbadm_pwd_strerror(error));
1411da6c28aaSamw 
1412da6c28aaSamw 	return (error);
1413da6c28aaSamw }
1414da6c28aaSamw 
1415da6c28aaSamw 
1416da6c28aaSamw int
1417da6c28aaSamw main(int argc, char **argv)
1418da6c28aaSamw {
1419dc20a302Sas200622 	int ret;
1420da6c28aaSamw 	int i;
1421da6c28aaSamw 
1422da6c28aaSamw 	(void) malloc(0);	/* satisfy libumem dependency */
1423da6c28aaSamw 
1424da6c28aaSamw 	progname = basename(argv[0]);
1425da6c28aaSamw 
1426da6c28aaSamw 	if (getzoneid() != GLOBAL_ZONEID) {
1427da6c28aaSamw 		(void) fprintf(stderr,
1428da6c28aaSamw 		    gettext("cannot execute in non-global zone\n"));
1429da6c28aaSamw 		return (0);
1430da6c28aaSamw 	}
1431da6c28aaSamw 
1432da6c28aaSamw 	if (is_system_labeled()) {
1433da6c28aaSamw 		(void) fprintf(stderr,
1434da6c28aaSamw 		    gettext("Trusted Extensions not supported\n"));
1435da6c28aaSamw 		return (0);
1436da6c28aaSamw 	}
1437da6c28aaSamw 
1438da6c28aaSamw 	if (argc < 2) {
1439da6c28aaSamw 		(void) fprintf(stderr, gettext("missing command\n"));
1440da6c28aaSamw 		smbadm_usage(B_FALSE);
1441da6c28aaSamw 	}
1442da6c28aaSamw 
1443da6c28aaSamw 	/*
1444da6c28aaSamw 	 * Special case "cmd --help/-?"
1445da6c28aaSamw 	 */
1446da6c28aaSamw 	if (strcmp(argv[1], "-?") == 0 ||
1447da6c28aaSamw 	    strcmp(argv[1], "--help") == 0 ||
1448da6c28aaSamw 	    strcmp(argv[1], "-h") == 0)
1449da6c28aaSamw 		smbadm_usage(B_TRUE);
1450da6c28aaSamw 
1451da6c28aaSamw 	for (i = 0; i < SMBADM_NCMD; ++i) {
1452da6c28aaSamw 		curcmd = &smbadm_cmdtable[i];
1453da6c28aaSamw 		if (strcasecmp(argv[1], curcmd->name) == 0) {
1454da6c28aaSamw 			if (argc > 2) {
1455da6c28aaSamw 				/* cmd subcmd --help/-? */
1456da6c28aaSamw 				if (strcmp(argv[2], "-?") == 0 ||
1457da6c28aaSamw 				    strcmp(argv[2], "--help") == 0 ||
1458da6c28aaSamw 				    strcmp(argv[2], "-h") == 0)
1459da6c28aaSamw 					smbadm_usage(B_TRUE);
1460da6c28aaSamw 			}
1461da6c28aaSamw 
14623db3f65cSamw 			if ((ret = smbadm_init()) != 0)
1463faa1795aSjb150015 				return (ret);
1464dc20a302Sas200622 
1465dc20a302Sas200622 			ret = curcmd->func(argc - 1, &argv[1]);
1466faa1795aSjb150015 
14673db3f65cSamw 			smbadm_fini();
1468dc20a302Sas200622 			return (ret);
1469da6c28aaSamw 		}
1470da6c28aaSamw 	}
1471da6c28aaSamw 
1472da6c28aaSamw 	curcmd = NULL;
1473da6c28aaSamw 	(void) fprintf(stderr, gettext("unknown subcommand (%s)\n"), argv[1]);
1474da6c28aaSamw 	smbadm_usage(B_FALSE);
1475da6c28aaSamw 	return (2);
1476da6c28aaSamw }
1477da6c28aaSamw 
1478faa1795aSjb150015 static int
14793db3f65cSamw smbadm_init(void)
1480faa1795aSjb150015 {
1481faa1795aSjb150015 	int rc;
1482faa1795aSjb150015 
14833db3f65cSamw 	switch (curcmd->flags & SMBADM_CMDF_TYPEMASK) {
14843db3f65cSamw 	case SMBADM_CMDF_GROUP:
1485faa1795aSjb150015 		if (smb_idmap_start() != 0) {
1486faa1795aSjb150015 			(void) fprintf(stderr,
1487faa1795aSjb150015 			    gettext("failed to contact idmap service\n"));
1488faa1795aSjb150015 			return (1);
1489faa1795aSjb150015 		}
1490faa1795aSjb150015 
1491faa1795aSjb150015 		if ((rc = smb_lgrp_start()) != SMB_LGRP_SUCCESS) {
1492faa1795aSjb150015 			(void) fprintf(stderr,
1493faa1795aSjb150015 			    gettext("failed to initialize (%s)\n"),
1494faa1795aSjb150015 			    smb_lgrp_strerror(rc));
1495faa1795aSjb150015 			smb_idmap_stop();
1496faa1795aSjb150015 			return (1);
1497faa1795aSjb150015 		}
14983db3f65cSamw 		break;
14993db3f65cSamw 
15003db3f65cSamw 	case SMBADM_CMDF_USER:
15013db3f65cSamw 		smb_pwd_init(B_FALSE);
15023db3f65cSamw 		break;
15033db3f65cSamw 
15043db3f65cSamw 	default:
15053db3f65cSamw 		break;
1506faa1795aSjb150015 	}
1507faa1795aSjb150015 
1508faa1795aSjb150015 	return (0);
1509faa1795aSjb150015 }
1510faa1795aSjb150015 
1511faa1795aSjb150015 static void
15123db3f65cSamw smbadm_fini(void)
1513faa1795aSjb150015 {
15143db3f65cSamw 	switch (curcmd->flags & SMBADM_CMDF_TYPEMASK) {
15153db3f65cSamw 	case SMBADM_CMDF_GROUP:
1516faa1795aSjb150015 		smb_lgrp_stop();
1517faa1795aSjb150015 		smb_idmap_stop();
15183db3f65cSamw 		break;
15193db3f65cSamw 
15203db3f65cSamw 	case SMBADM_CMDF_USER:
15213db3f65cSamw 		smb_pwd_fini();
15223db3f65cSamw 		break;
15233db3f65cSamw 
15243db3f65cSamw 	default:
15253db3f65cSamw 		break;
1526faa1795aSjb150015 	}
1527faa1795aSjb150015 }
1528faa1795aSjb150015 
1529da6c28aaSamw static boolean_t
1530da6c28aaSamw smbadm_prop_validate(smbadm_prop_t *prop, boolean_t chkval)
1531da6c28aaSamw {
1532da6c28aaSamw 	smbadm_prop_handle_t *pinfo;
1533da6c28aaSamw 	int i;
1534da6c28aaSamw 
1535da6c28aaSamw 	for (i = 0; i < SMBADM_NPROP; i++) {
1536da6c28aaSamw 		pinfo = &smbadm_ptable[i];
1537da6c28aaSamw 		if (strcmp(pinfo->p_name, prop->p_name) == 0) {
1538da6c28aaSamw 			if (pinfo->p_chkfn && chkval)
1539da6c28aaSamw 				return (pinfo->p_chkfn(prop));
1540da6c28aaSamw 
1541da6c28aaSamw 			return (B_TRUE);
1542da6c28aaSamw 		}
1543da6c28aaSamw 	}
1544da6c28aaSamw 
1545*8d7e4166Sjose borrego 	(void) fprintf(stderr, gettext("unrecognized property '%s'\n"),
1546*8d7e4166Sjose borrego 	    prop->p_name);
1547da6c28aaSamw 
1548da6c28aaSamw 	return (B_FALSE);
1549da6c28aaSamw }
1550da6c28aaSamw 
1551da6c28aaSamw static int
1552da6c28aaSamw smbadm_prop_parse(char *arg, smbadm_prop_t *prop)
1553da6c28aaSamw {
1554da6c28aaSamw 	boolean_t parse_value;
1555da6c28aaSamw 	char *equal;
1556da6c28aaSamw 
1557da6c28aaSamw 	if (arg == NULL)
1558da6c28aaSamw 		return (2);
1559da6c28aaSamw 
1560da6c28aaSamw 	prop->p_name = prop->p_value = NULL;
1561da6c28aaSamw 
1562da6c28aaSamw 	if (strcmp(curcmd->name, "set") == 0)
1563da6c28aaSamw 		parse_value = B_TRUE;
1564da6c28aaSamw 	else
1565da6c28aaSamw 		parse_value = B_FALSE;
1566da6c28aaSamw 
1567da6c28aaSamw 	prop->p_name = arg;
1568da6c28aaSamw 
1569da6c28aaSamw 	if (parse_value) {
1570da6c28aaSamw 		equal = strchr(arg, '=');
1571da6c28aaSamw 		if (equal == NULL)
1572da6c28aaSamw 			return (2);
1573da6c28aaSamw 
1574da6c28aaSamw 		*equal++ = '\0';
1575da6c28aaSamw 		prop->p_value = equal;
1576da6c28aaSamw 	}
1577da6c28aaSamw 
1578da6c28aaSamw 	if (smbadm_prop_validate(prop, parse_value) == B_FALSE)
1579da6c28aaSamw 		return (2);
1580da6c28aaSamw 
1581da6c28aaSamw 	return (0);
1582da6c28aaSamw }
1583da6c28aaSamw 
1584da6c28aaSamw static smbadm_prop_handle_t *
1585da6c28aaSamw smbadm_prop_gethandle(char *pname)
1586da6c28aaSamw {
1587da6c28aaSamw 	int i;
1588da6c28aaSamw 
1589da6c28aaSamw 	for (i = 0; i < SMBADM_NPROP; i++)
1590da6c28aaSamw 		if (strcmp(pname, smbadm_ptable[i].p_name) == 0)
1591da6c28aaSamw 			return (&smbadm_ptable[i]);
1592da6c28aaSamw 
1593da6c28aaSamw 	return (NULL);
1594da6c28aaSamw }
1595da6c28aaSamw 
1596da6c28aaSamw static int
1597da6c28aaSamw smbadm_setprop_desc(char *gname, smbadm_prop_t *prop)
1598da6c28aaSamw {
1599dc20a302Sas200622 	int status;
1600da6c28aaSamw 
1601dc20a302Sas200622 	status = smb_lgrp_setcmnt(gname, prop->p_value);
1602dc20a302Sas200622 	if (status != SMB_LGRP_SUCCESS) {
1603da6c28aaSamw 		(void) fprintf(stderr,
1604da6c28aaSamw 		    gettext("failed to modify the group description (%s)\n"),
1605dc20a302Sas200622 		    smb_lgrp_strerror(status));
1606da6c28aaSamw 		return (1);
1607da6c28aaSamw 	}
1608da6c28aaSamw 
1609*8d7e4166Sjose borrego 	(void) printf(gettext("%s: description modified\n"), gname);
1610da6c28aaSamw 	return (0);
1611da6c28aaSamw }
1612da6c28aaSamw 
1613da6c28aaSamw static int
1614da6c28aaSamw smbadm_getprop_desc(char *gname, smbadm_prop_t *prop)
1615da6c28aaSamw {
1616dc20a302Sas200622 	char *cmnt = NULL;
1617dc20a302Sas200622 	int status;
1618da6c28aaSamw 
1619dc20a302Sas200622 	status = smb_lgrp_getcmnt(gname, &cmnt);
1620dc20a302Sas200622 	if (status != SMB_LGRP_SUCCESS) {
1621da6c28aaSamw 		(void) fprintf(stderr,
1622dc20a302Sas200622 		    gettext("failed to get the group description (%s)\n"),
1623dc20a302Sas200622 		    smb_lgrp_strerror(status));
1624da6c28aaSamw 		return (1);
1625da6c28aaSamw 	}
1626da6c28aaSamw 
1627dc20a302Sas200622 	(void) printf(gettext("\t%s: %s\n"), prop->p_name, cmnt);
1628dc20a302Sas200622 	free(cmnt);
1629da6c28aaSamw 	return (0);
1630da6c28aaSamw }
1631da6c28aaSamw 
1632da6c28aaSamw static int
1633dc20a302Sas200622 smbadm_group_setpriv(char *gname, uint8_t priv_id, smbadm_prop_t *prop)
1634da6c28aaSamw {
1635dc20a302Sas200622 	boolean_t enable;
1636dc20a302Sas200622 	int status;
1637da6c28aaSamw 	int ret;
1638da6c28aaSamw 
1639da6c28aaSamw 	if (strcasecmp(prop->p_value, "on") == 0) {
1640da6c28aaSamw 		(void) printf(gettext("Enabling %s privilege "), prop->p_name);
1641dc20a302Sas200622 		enable = B_TRUE;
1642da6c28aaSamw 	} else {
1643da6c28aaSamw 		(void) printf(gettext("Disabling %s privilege "), prop->p_name);
1644dc20a302Sas200622 		enable = B_FALSE;
1645da6c28aaSamw 	}
1646da6c28aaSamw 
1647dc20a302Sas200622 	status = smb_lgrp_setpriv(gname, priv_id, enable);
1648dc20a302Sas200622 	if (status == SMB_LGRP_SUCCESS) {
1649da6c28aaSamw 		(void) printf(gettext("succeeded\n"));
1650da6c28aaSamw 		ret = 0;
1651da6c28aaSamw 	} else {
1652dc20a302Sas200622 		(void) printf(gettext("failed: %s\n"),
1653dc20a302Sas200622 		    smb_lgrp_strerror(status));
1654da6c28aaSamw 		ret = 1;
1655da6c28aaSamw 	}
1656da6c28aaSamw 
1657da6c28aaSamw 	return (ret);
1658da6c28aaSamw }
1659da6c28aaSamw 
1660da6c28aaSamw static int
1661dc20a302Sas200622 smbadm_group_getpriv(char *gname, uint8_t priv_id, smbadm_prop_t *prop)
1662da6c28aaSamw {
1663dc20a302Sas200622 	boolean_t enable;
1664dc20a302Sas200622 	int status;
1665da6c28aaSamw 
1666dc20a302Sas200622 	status = smb_lgrp_getpriv(gname, priv_id, &enable);
1667dc20a302Sas200622 	if (status != SMB_LGRP_SUCCESS) {
1668da6c28aaSamw 		(void) fprintf(stderr, gettext("failed to get %s (%s)\n"),
1669dc20a302Sas200622 		    prop->p_name, smb_lgrp_strerror(status));
1670da6c28aaSamw 		return (1);
1671da6c28aaSamw 	}
1672da6c28aaSamw 
1673dc20a302Sas200622 	(void) printf(gettext("\t%s: %s\n"), prop->p_name,
1674dc20a302Sas200622 	    (enable) ? "On" : "Off");
1675da6c28aaSamw 
1676da6c28aaSamw 	return (0);
1677da6c28aaSamw }
1678da6c28aaSamw 
1679da6c28aaSamw static int
1680da6c28aaSamw smbadm_setprop_tkowner(char *gname, smbadm_prop_t *prop)
1681da6c28aaSamw {
1682da6c28aaSamw 	return (smbadm_group_setpriv(gname, SE_TAKE_OWNERSHIP_LUID, prop));
1683da6c28aaSamw }
1684da6c28aaSamw 
1685da6c28aaSamw static int
1686da6c28aaSamw smbadm_getprop_tkowner(char *gname, smbadm_prop_t *prop)
1687da6c28aaSamw {
1688da6c28aaSamw 	return (smbadm_group_getpriv(gname, SE_TAKE_OWNERSHIP_LUID, prop));
1689da6c28aaSamw }
1690da6c28aaSamw 
1691da6c28aaSamw static int
1692da6c28aaSamw smbadm_setprop_backup(char *gname, smbadm_prop_t *prop)
1693da6c28aaSamw {
1694da6c28aaSamw 	return (smbadm_group_setpriv(gname, SE_BACKUP_LUID, prop));
1695da6c28aaSamw }
1696da6c28aaSamw 
1697da6c28aaSamw static int
1698da6c28aaSamw smbadm_getprop_backup(char *gname, smbadm_prop_t *prop)
1699da6c28aaSamw {
1700da6c28aaSamw 	return (smbadm_group_getpriv(gname, SE_BACKUP_LUID, prop));
1701da6c28aaSamw }
1702da6c28aaSamw 
1703da6c28aaSamw static int
1704da6c28aaSamw smbadm_setprop_restore(char *gname, smbadm_prop_t *prop)
1705da6c28aaSamw {
1706da6c28aaSamw 	return (smbadm_group_setpriv(gname, SE_RESTORE_LUID, prop));
1707da6c28aaSamw }
1708da6c28aaSamw 
1709da6c28aaSamw static int
1710da6c28aaSamw smbadm_getprop_restore(char *gname, smbadm_prop_t *prop)
1711da6c28aaSamw {
1712da6c28aaSamw 	return (smbadm_group_getpriv(gname, SE_RESTORE_LUID, prop));
1713da6c28aaSamw }
1714da6c28aaSamw 
1715da6c28aaSamw static boolean_t
1716da6c28aaSamw smbadm_chkprop_priv(smbadm_prop_t *prop)
1717da6c28aaSamw {
1718da6c28aaSamw 	if (prop->p_value == NULL || *prop->p_value == '\0') {
1719da6c28aaSamw 		(void) fprintf(stderr,
1720da6c28aaSamw 		    gettext("missing value for '%s'\n"), prop->p_name);
1721da6c28aaSamw 		return (B_FALSE);
1722da6c28aaSamw 	}
1723da6c28aaSamw 
1724da6c28aaSamw 	if (strcasecmp(prop->p_value, "on") == 0)
1725da6c28aaSamw 		return (B_TRUE);
1726da6c28aaSamw 
1727da6c28aaSamw 	if (strcasecmp(prop->p_value, "off") == 0)
1728da6c28aaSamw 		return (B_TRUE);
1729da6c28aaSamw 
1730da6c28aaSamw 	(void) fprintf(stderr,
1731da6c28aaSamw 	    gettext("%s: unrecognized value for '%s' property\n"),
1732da6c28aaSamw 	    prop->p_value, prop->p_name);
1733da6c28aaSamw 
1734da6c28aaSamw 	return (B_FALSE);
1735da6c28aaSamw }
1736da6c28aaSamw 
1737da6c28aaSamw static const char *
1738da6c28aaSamw smbadm_pwd_strerror(int error)
1739da6c28aaSamw {
1740da6c28aaSamw 	switch (error) {
1741da6c28aaSamw 	case SMB_PWE_SUCCESS:
1742da6c28aaSamw 		return (gettext("Success."));
1743da6c28aaSamw 
1744da6c28aaSamw 	case SMB_PWE_USER_UNKNOWN:
1745da6c28aaSamw 		return (gettext("User does not exist."));
1746da6c28aaSamw 
1747da6c28aaSamw 	case SMB_PWE_USER_DISABLE:
1748*8d7e4166Sjose borrego 		return (gettext("User is disabled."));
1749da6c28aaSamw 
1750da6c28aaSamw 	case SMB_PWE_CLOSE_FAILED:
1751da6c28aaSamw 	case SMB_PWE_OPEN_FAILED:
1752da6c28aaSamw 	case SMB_PWE_WRITE_FAILED:
1753da6c28aaSamw 	case SMB_PWE_UPDATE_FAILED:
1754da6c28aaSamw 		return (gettext("Unexpected failure. "
1755da6c28aaSamw 		    "SMB password database unchanged."));
1756da6c28aaSamw 
1757da6c28aaSamw 	case SMB_PWE_STAT_FAILED:
1758da6c28aaSamw 		return (gettext("stat of SMB password file failed."));
1759da6c28aaSamw 
1760da6c28aaSamw 	case SMB_PWE_BUSY:
1761da6c28aaSamw 		return (gettext("SMB password database busy. "
1762da6c28aaSamw 		    "Try again later."));
1763da6c28aaSamw 
1764da6c28aaSamw 	case SMB_PWE_DENIED:
1765da6c28aaSamw 		return (gettext("Operation not permitted."));
1766da6c28aaSamw 
1767da6c28aaSamw 	case SMB_PWE_SYSTEM_ERROR:
1768da6c28aaSamw 		return (gettext("System error."));
17693db3f65cSamw 
17703db3f65cSamw 	default:
17713db3f65cSamw 		break;
1772da6c28aaSamw 	}
1773da6c28aaSamw 
1774da6c28aaSamw 	return (gettext("Unknown error code."));
1775da6c28aaSamw }
1776da6c28aaSamw 
1777da6c28aaSamw /*
1778da6c28aaSamw  * Enable libumem debugging by default on DEBUG builds.
1779da6c28aaSamw  */
1780da6c28aaSamw #ifdef DEBUG
1781da6c28aaSamw const char *
1782da6c28aaSamw _umem_debug_init(void)
1783da6c28aaSamw {
1784da6c28aaSamw 	return ("default,verbose"); /* $UMEM_DEBUG setting */
1785da6c28aaSamw }
1786da6c28aaSamw 
1787da6c28aaSamw const char *
1788da6c28aaSamw _umem_logging_init(void)
1789da6c28aaSamw {
1790da6c28aaSamw 	return ("fail,contents"); /* $UMEM_LOGGING setting */
1791da6c28aaSamw }
1792da6c28aaSamw #endif
1793