root/usr/src/cmd/smbsrv/smbadm/smbadm.c
/*
 * CDDL HEADER START
 *
 * The contents of this file are subject to the terms of the
 * Common Development and Distribution License (the "License").
 * You may not use this file except in compliance with the License.
 *
 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
 * or http://www.opensolaris.org/os/licensing.
 * See the License for the specific language governing permissions
 * and limitations under the License.
 *
 * When distributing Covered Code, include this CDDL HEADER in each
 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
 * If applicable, add the following below this CDDL HEADER, with the
 * fields enclosed by brackets "[]" replaced with your own identifying
 * information: Portions Copyright [yyyy] [name of copyright owner]
 *
 * CDDL HEADER END
 */
/*
 * Copyright (c) 2007, 2010, Oracle and/or its affiliates. All rights reserved.
 * Copyright 2019 Nexenta by DDN, Inc. All rights reserved.
 * Copyright 2022-2023 RackTop Systems, Inc.
 */

/*
 * This module contains smbadm CLI which offers smb configuration
 * functionalities.
 */
#include <errno.h>
#include <err.h>
#include <ctype.h>
#include <stdlib.h>
#include <unistd.h>
#include <stdio.h>
#include <syslog.h>
#include <strings.h>
#include <limits.h>
#include <getopt.h>
#include <libintl.h>
#include <zone.h>
#include <pwd.h>
#include <grp.h>
#include <libgen.h>
#include <netinet/in.h>
#include <auth_attr.h>
#include <locale.h>
#include <smbsrv/libsmb.h>
#include <smbsrv/libsmbns.h>
#include "smbadm.h"

#if !defined(TEXT_DOMAIN)
#define TEXT_DOMAIN "SYS_TEST"
#endif

typedef enum {
        HELP_ADD_MEMBER,
        HELP_CREATE,
        HELP_DELETE,
        HELP_DEL_MEMBER,
        HELP_GET,
        HELP_JOIN,
        HELP_LIST,
        HELP_LIST_DOMAINS,
        HELP_LIST_SESS,
        HELP_LIST_TREES,
        HELP_LIST_OFILES,
        HELP_CLOSE_SESS,
        HELP_CLOSE_OFILE,
        HELP_LOOKUP,
        HELP_RENAME,
        HELP_SET,
        HELP_SHOW,
        HELP_USER_DISABLE,
        HELP_USER_ENABLE,
        HELP_USER_DELETE
} smbadm_help_t;

#define SMBADM_CMDF_NONE        0x00
#define SMBADM_CMDF_USER        0x01    /* needs smb_pwd_init */
#define SMBADM_CMDF_GROUP       0x02    /* needs smb_lgrp_start */
#define SMBADM_CMDF_KMOD        0x04    /* needs smb_kmod_bind */
#define SMBADM_CMDF_TYPEMASK    0x0F

typedef enum {
        SMBADM_GRP_ADDMEMBER = 0,
        SMBADM_GRP_DELMEMBER,
} smbadm_grp_action_t;

#define SMBADM_ANSBUFSIZ        64

typedef struct smbadm_cmdinfo {
        char *name;
        int (*func)(int, char **);
        smbadm_help_t usage;
        uint32_t flags;
        char *auth;
} smbadm_cmdinfo_t;

smbadm_cmdinfo_t *curcmd;
static char *progname;

#define SMBADM_ACTION_AUTH      "solaris.smf.manage.smb"
#define SMBADM_VALUE_AUTH       "solaris.smf.value.smb"
#define SMBADM_BASIC_AUTH       "solaris.network.hosts.read"

static boolean_t smbadm_checkauth(const char *);

static void smbadm_usage(boolean_t) __NORETURN;
static int smbadm_join_workgroup(const char *, boolean_t);
static int smbadm_join_domain(const char *, const char *,
    const char *, boolean_t);
static void smbadm_extract_domain(char *, char **, char **);
static void smbadm_update_groups(smbadm_grp_action_t);

static int smbadm_join(int, char **);
static int smbadm_list(int, char **);
static int smbadm_lookup(int, char **);
static void smbadm_lookup_name(char *, boolean_t);
static void smbadm_lookup_sid(char *, boolean_t);
static int smbadm_group_create(int, char **);
static int smbadm_group_delete(int, char **);
static int smbadm_group_rename(int, char **);
static int smbadm_group_show(int, char **);
static void smbadm_group_show_name(const char *, const char *);
static int smbadm_group_getprop(int, char **);
static int smbadm_group_setprop(int, char **);
static int smbadm_group_addmember(int, char **);
static int smbadm_group_delmember(int, char **);
static int smbadm_group_add_del_member(char *, char *, smbadm_grp_action_t);

static int smbadm_user_delete(int, char **);
static int smbadm_user_disable(int, char **);
static int smbadm_user_enable(int, char **);

/* Please keep the order consistent with smbadm(8) man page */
static smbadm_cmdinfo_t smbadm_cmdtable[] =
{
        { "create",             smbadm_group_create,    HELP_CREATE,
                SMBADM_CMDF_GROUP,      SMBADM_ACTION_AUTH },
        { "delete",             smbadm_group_delete,    HELP_DELETE,
                SMBADM_CMDF_GROUP,      SMBADM_ACTION_AUTH },
        { "rename",             smbadm_group_rename,    HELP_RENAME,
                SMBADM_CMDF_GROUP,      SMBADM_ACTION_AUTH },
        { "show",               smbadm_group_show,      HELP_SHOW,
                SMBADM_CMDF_GROUP,      SMBADM_ACTION_AUTH },
        { "get",                smbadm_group_getprop,   HELP_GET,
                SMBADM_CMDF_GROUP,      SMBADM_ACTION_AUTH },
        { "set",                smbadm_group_setprop,   HELP_SET,
                SMBADM_CMDF_GROUP,      SMBADM_ACTION_AUTH },
        { "add-member",         smbadm_group_addmember, HELP_ADD_MEMBER,
                SMBADM_CMDF_GROUP,      SMBADM_ACTION_AUTH },
        { "remove-member",      smbadm_group_delmember, HELP_DEL_MEMBER,
                SMBADM_CMDF_GROUP,      SMBADM_ACTION_AUTH },
        { "delete-user",        smbadm_user_delete,     HELP_USER_DELETE,
                SMBADM_CMDF_USER,       SMBADM_ACTION_AUTH },
        { "disable-user",       smbadm_user_disable,    HELP_USER_DISABLE,
                SMBADM_CMDF_USER,       SMBADM_ACTION_AUTH },
        { "enable-user",        smbadm_user_enable,     HELP_USER_ENABLE,
                SMBADM_CMDF_USER,       SMBADM_ACTION_AUTH },
        { "join",               smbadm_join,            HELP_JOIN,
                SMBADM_CMDF_GROUP,      SMBADM_VALUE_AUTH },
        /* "list" is now an alias for "list-domains" */
        { "list",               smbadm_list,            HELP_LIST,
                SMBADM_CMDF_NONE,       SMBADM_BASIC_AUTH },
        { "list-domains",       smbadm_list,            HELP_LIST_DOMAINS,
                SMBADM_CMDF_NONE,       SMBADM_BASIC_AUTH },

        { "list-sessions",      cmd_list_sess,          HELP_LIST_SESS,
                SMBADM_CMDF_KMOD,       SMBADM_BASIC_AUTH },
        { "list-trees",         cmd_list_trees,         HELP_LIST_TREES,
                SMBADM_CMDF_KMOD,       SMBADM_BASIC_AUTH },
        { "list-ofiles",        cmd_list_ofiles,        HELP_LIST_OFILES,
                SMBADM_CMDF_KMOD,       SMBADM_BASIC_AUTH },
        { "close-session",      cmd_close_sess, HELP_CLOSE_SESS,
                SMBADM_CMDF_KMOD,       SMBADM_BASIC_AUTH },
        { "close-ofile",        cmd_close_ofile,        HELP_CLOSE_OFILE,
                SMBADM_CMDF_KMOD,       SMBADM_BASIC_AUTH },
        { "lookup",             smbadm_lookup,          HELP_LOOKUP,
                SMBADM_CMDF_NONE,       SMBADM_BASIC_AUTH },
};

#define SMBADM_NCMD     (sizeof (smbadm_cmdtable) / sizeof (smbadm_cmdtable[0]))

typedef struct smbadm_prop {
        char *p_name;
        char *p_value;
} smbadm_prop_t;

typedef struct smbadm_prop_handle {
        char *p_name;
        char *p_dispvalue;
        int (*p_setfn)(char *, smbadm_prop_t *);
        int (*p_getfn)(char *, smbadm_prop_t *);
        boolean_t (*p_chkfn)(smbadm_prop_t *);
} smbadm_prop_handle_t;

static boolean_t smbadm_prop_validate(smbadm_prop_t *prop, boolean_t chkval);
static int smbadm_prop_parse(char *arg, smbadm_prop_t *prop);
static smbadm_prop_handle_t *smbadm_prop_gethandle(char *pname);

static boolean_t smbadm_chkprop_priv(smbadm_prop_t *prop);
static int smbadm_setprop_tkowner(char *gname, smbadm_prop_t *prop);
static int smbadm_getprop_tkowner(char *gname, smbadm_prop_t *prop);
static int smbadm_setprop_readfile(char *gname, smbadm_prop_t *prop);
static int smbadm_getprop_readfile(char *gname, smbadm_prop_t *prop);
static int smbadm_setprop_writefile(char *gname, smbadm_prop_t *prop);
static int smbadm_getprop_writefile(char *gname, smbadm_prop_t *prop);
static int smbadm_setprop_backup(char *gname, smbadm_prop_t *prop);
static int smbadm_getprop_backup(char *gname, smbadm_prop_t *prop);
static int smbadm_setprop_restore(char *gname, smbadm_prop_t *prop);
static int smbadm_getprop_restore(char *gname, smbadm_prop_t *prop);
static int smbadm_setprop_desc(char *gname, smbadm_prop_t *prop);
static int smbadm_getprop_desc(char *gname, smbadm_prop_t *prop);

static smbadm_prop_handle_t smbadm_ptable[] = {
        {"backup",      "on|off",       smbadm_setprop_backup,
        smbadm_getprop_backup,  smbadm_chkprop_priv     },
        {"restore",     "on|off",       smbadm_setprop_restore,
        smbadm_getprop_restore, smbadm_chkprop_priv     },
        {"take-ownership", "on|off",    smbadm_setprop_tkowner,
        smbadm_getprop_tkowner, smbadm_chkprop_priv     },
        {"bypass-read", "on|off",       smbadm_setprop_readfile,
        smbadm_getprop_readfile,        smbadm_chkprop_priv     },
        {"bypass-write", "on|off",      smbadm_setprop_writefile,
        smbadm_getprop_writefile,       smbadm_chkprop_priv     },
        {"description", "<string>",     smbadm_setprop_desc,
        smbadm_getprop_desc,    NULL                    },
};

static int smbadm_init(void);
static void smbadm_fini(void);
static const char *smbadm_pwd_strerror(int error);

/*
 * Number of supported properties
 */
#define SMBADM_NPROP    (sizeof (smbadm_ptable) / sizeof (smbadm_ptable[0]))

static void
smbadm_cmdusage(FILE *fp, smbadm_cmdinfo_t *cmd)
{
        switch (cmd->usage) {
        case HELP_ADD_MEMBER:
                (void) fprintf(fp,
                    gettext("\t%s -m <member> [-m <member>]... <group>\n"),
                    cmd->name);
                return;

        case HELP_CREATE:
                (void) fprintf(fp, gettext("\t%s [-d <description>] <group>\n"),
                    cmd->name);
                return;

        case HELP_DELETE:
                (void) fprintf(fp, gettext("\t%s <group>\n"), cmd->name);
                return;

        case HELP_USER_DELETE:
        case HELP_USER_DISABLE:
        case HELP_USER_ENABLE:
                (void) fprintf(fp, gettext("\t%s <username>\n"), cmd->name);
                return;

        case HELP_GET:
                (void) fprintf(fp, gettext("\t%s [-p <property>]... <group>\n"),
                    cmd->name);
                return;

        case HELP_JOIN:
#if 0   /* Don't document "-p" yet, still needs work (NEX-11960) */
                (void) fprintf(fp, gettext("\t%s [-y] -p <domain>\n"
                    "\t%s [-y] [-c container] -u <username domain>\n"
                    "\t%s [-y] -w <workgroup>\n"),
                    cmd->name, cmd->name, cmd->name);
#else
                (void) fprintf(fp, gettext(
                    "\t%s [-y] [-c container] -u <username> <domain>\n"
                    "\t%s [-y] -w <workgroup>\n"), cmd->name, cmd->name);
#endif
                return;

        case HELP_LIST:
                (void) fprintf(fp, gettext(
                    "\t%s  (alias for list-domains)\n"), cmd->name);
                return;

        case HELP_LIST_DOMAINS:
                (void) fprintf(fp, gettext("\t%s\n"), cmd->name);
                return;

        case HELP_LIST_SESS:
        case HELP_LIST_TREES:
        case HELP_LIST_OFILES:
                (void) fprintf(fp, gettext(
                    "\t%s [-p] [-o field,...]\n"), cmd->name);
                return;

        case HELP_CLOSE_SESS:
                (void) fprintf(fp, gettext(
                    "\t%s <client_name> [user_name]\n"), cmd->name);
                return;

        case HELP_CLOSE_OFILE:
                (void) fprintf(fp, gettext("\t%s <File_ID>\n"), cmd->name);
                return;


        case HELP_LOOKUP:
                (void) fprintf(fp,
                    gettext("\t%s [-p] <account-name>\n"),
                    cmd->name);
                return;

        case HELP_DEL_MEMBER:
                (void) fprintf(fp,
                    gettext("\t%s -m <member> [-m <member>]... <group>\n"),
                    cmd->name);
                return;

        case HELP_RENAME:
                (void) fprintf(fp, gettext("\t%s <group> <new-group>\n"),
                    cmd->name);
                return;

        case HELP_SET:
                (void) fprintf(fp, gettext("\t%s -p <property>=<value> "
                    "[-p <property>=<value>]... <group>\n"), cmd->name);
                return;

        case HELP_SHOW:
                (void) fprintf(fp, gettext("\t%s [-mps] [<group>]\n"),
                    cmd->name);
                return;

        default:
                break;
        }

        abort();
        /* NOTREACHED */
}

static void
smbadm_usage(boolean_t requested)
{
        FILE *fp = requested ? stdout : stderr;
        boolean_t show_props = B_FALSE;
        int i;

        if (curcmd == NULL) {
                (void) fprintf(fp,
                    gettext("usage: %s <subcommand> <args> ...\n"),
                    progname);

                for (i = 0; i < SMBADM_NCMD; i++)
                        smbadm_cmdusage(fp, &smbadm_cmdtable[i]);

                (void) fprintf(fp,
                    gettext("\nFor property list, run %s %s|%s\n"),
                    progname, "get", "set");

                exit(requested ? 0 : 2);
        }

        (void) fprintf(fp, gettext("usage:\n"));
        smbadm_cmdusage(fp, curcmd);

        if (strcmp(curcmd->name, "get") == 0 ||
            strcmp(curcmd->name, "set") == 0)
                show_props = B_TRUE;

        if (show_props) {
                (void) fprintf(fp,
                    gettext("\nThe following properties are supported:\n"));

                (void) fprintf(fp, "\n\t%-16s   %s\n\n",
                    "PROPERTY", "VALUES");

                for (i = 0; i < SMBADM_NPROP; i++) {
                        (void) fprintf(fp, "\t%-16s   %s\n",
                            smbadm_ptable[i].p_name,
                            smbadm_ptable[i].p_dispvalue);
                }
        }

        exit(requested ? 0 : 2);
}

/*
 * smbadm_strcasecmplist
 *
 * Find a string 's' within a list of strings.
 *
 * Returns the index of the matching string or -1 if there is no match.
 */
static int
smbadm_strcasecmplist(const char *s, ...)
{
        va_list ap;
        char *p;
        int ndx;

        va_start(ap, s);

        for (ndx = 0; ((p = va_arg(ap, char *)) != NULL); ++ndx) {
                if (strcasecmp(s, p) == 0) {
                        va_end(ap);
                        return (ndx);
                }
        }

        va_end(ap);
        return (-1);
}

/*
 * smbadm_answer_prompt
 *
 * Prompt for the answer to a question.  A default response must be
 * specified, which will be used if the user presses <enter> without
 * answering the question.
 */
static int
smbadm_answer_prompt(const char *prompt, char *answer, const char *dflt)
{
        char buf[SMBADM_ANSBUFSIZ];
        char *p;

        (void) printf(gettext("%s [%s]: "), prompt, dflt);

        if (fgets(buf, SMBADM_ANSBUFSIZ, stdin) == NULL)
                return (-1);

        if ((p = strchr(buf, '\n')) != NULL)
                *p = '\0';

        if (*buf == '\0')
                (void) strlcpy(answer, dflt, SMBADM_ANSBUFSIZ);
        else
                (void) strlcpy(answer, buf, SMBADM_ANSBUFSIZ);

        return (0);
}

/*
 * smbadm_confirm
 *
 * Ask a question that requires a yes/no answer.
 * A default response must be specified.
 */
static boolean_t
smbadm_confirm(const char *prompt, const char *dflt)
{
        char buf[SMBADM_ANSBUFSIZ];

        for (;;) {
                if (smbadm_answer_prompt(prompt, buf, dflt) < 0)
                        return (B_FALSE);

                if (smbadm_strcasecmplist(buf, "n", "no", 0) >= 0)
                        return (B_FALSE);

                if (smbadm_strcasecmplist(buf, "y", "yes", 0) >= 0)
                        return (B_TRUE);

                (void) printf(gettext("Please answer yes or no.\n"));
        }
}

static boolean_t
smbadm_join_confirm(const char *domain)
{
        (void) printf(gettext("After joining %s the smb service will be "
            "restarted automatically.\n"), domain);

        return (smbadm_confirm("Would you like to continue?", "no"));
}

static void
smbadm_restart_service(void)
{
        if (smb_smf_restart_service() != 0) {
                (void) fprintf(stderr,
                    gettext("Unable to restart smb service. "
                    "Run 'svcs -xv smb/server' for more information."));
        }
}

/*
 * smbadm_join
 *
 * Join a domain or workgroup.
 *
 * When joining a domain, we may receive the username, password and
 * domain name in any of the following combinations.  Note that the
 * password is optional on the command line: if it is not provided,
 * we will prompt for it later.
 *
 *      username+password domain
 *      domain\username+password
 *      domain/username+password
 *      username@domain
 *
 * We allow domain\name+password or domain/name+password but not
 * name+password@domain because @ is a valid password character.
 *
 * If the username and domain name are passed as separate command
 * line arguments, we process them directly.  Otherwise we separate
 * them and continue as if they were separate command line arguments.
 */
static int
smbadm_join(int argc, char **argv)
{
        char buf[MAXHOSTNAMELEN * 2];
        char *domain = NULL;
        char *username = NULL;
        char *container = NULL;
        uint32_t mode = 0;
        boolean_t confirm = B_TRUE;
        int option;

        while ((option = getopt(argc, argv, "c:pu:wy")) != -1) {
                if (mode != 0) {
                        (void) fprintf(stderr, gettext(
                            "join options are mutually exclusive\n"));
                        smbadm_usage(B_FALSE);
                }
                switch (option) {
                case 'c':
                        container = optarg;
                        break;
                case 'p':
                        mode = SMB_SECMODE_DOMAIN;
                        /* leave username = NULL */
                        break;

                case 'u':
                        mode = SMB_SECMODE_DOMAIN;
                        username = optarg;
                        break;

                case 'w':
                        mode = SMB_SECMODE_WORKGRP;
                        break;

                case 'y':
                        confirm = B_FALSE;
                        break;

                default:
                        smbadm_usage(B_FALSE);
                        break;
                }
        }

        if (optind < argc)
                domain = argv[optind];

        if (username != NULL && domain == NULL) {
                /*
                 * The domain was not specified as a separate
                 * argument, check for the combination forms.
                 */
                (void) strlcpy(buf, username, sizeof (buf));
                smbadm_extract_domain(buf, &username, &domain);
        }

        if ((domain == NULL) || (*domain == '\0')) {
                (void) fprintf(stderr, gettext("missing %s name\n"),
                    (mode == SMB_SECMODE_WORKGRP) ? "workgroup" : "domain");
                smbadm_usage(B_FALSE);
        }

        if (mode == SMB_SECMODE_WORKGRP) {
                return (smbadm_join_workgroup(domain, confirm));
        }
        return (smbadm_join_domain(domain, container, username, confirm));
}

/*
 * Workgroups comprise a collection of standalone, independently administered
 * computers that use a common workgroup name.  This is a peer-to-peer model
 * with no formal membership mechanism.
 */
static int
smbadm_join_workgroup(const char *workgroup, boolean_t confirm)
{
        smb_joininfo_t jdi;
        smb_joinres_t jdres;
        uint32_t status;

        bzero(&jdres, sizeof (jdres));
        bzero(&jdi, sizeof (jdi));
        jdi.mode = SMB_SECMODE_WORKGRP;
        (void) strlcpy(jdi.domain_name, workgroup, sizeof (jdi.domain_name));
        (void) strtrim(jdi.domain_name, " \t\n");

        if (smb_name_validate_workgroup(jdi.domain_name) != ERROR_SUCCESS) {
                (void) fprintf(stderr, gettext("workgroup name is invalid\n"));
                smbadm_usage(B_FALSE);
        }

        if (confirm && !smbadm_join_confirm(jdi.domain_name))
                return (0);

        smbadm_update_groups(SMBADM_GRP_DELMEMBER); // before "un-join"
        if ((status = smb_join(&jdi, &jdres)) != NT_STATUS_SUCCESS) {
                (void) fprintf(stderr, gettext("failed to join %s: %s\n"),
                    jdi.domain_name, xlate_nt_status(status));
                return (1);
        }

        (void) printf(gettext("Successfully joined %s\n"), jdi.domain_name);
        smbadm_restart_service();
        return (0);
}

/*
 * Domains comprise a centrally administered group of computers and accounts
 * that share a common security and administration policy and database.
 * Computers must join a domain and become domain members, which requires
 * an administrator level account name.
 *
 * The '+' character is invalid within a username.  We allow the password
 * to be appended to the username using '+' as a scripting convenience.
 * See details above smbadm_join()
 */
static int
smbadm_join_domain(const char *domain, const char *container,
    const char *username, boolean_t confirm)
{
        smb_joininfo_t jdi;
        smb_joinres_t jdres;
        char *passwd_prompt;
        char *p;
        int len, rc;

        bzero(&jdres, sizeof (jdres));
        bzero(&jdi, sizeof (jdi));
        jdi.mode = SMB_SECMODE_DOMAIN;
        (void) strlcpy(jdi.domain_name, domain, sizeof (jdi.domain_name));
        (void) strtrim(jdi.domain_name, " \t\n");
        if (container != NULL) {
                if (strlcpy(jdi.container_name, container,
                    sizeof (jdi.container_name)) >=
                    sizeof (jdi.container_name)) {
                        (void) fprintf(stderr, gettext("container name is "
                            "too long\n"));
                        smbadm_usage(B_FALSE);
                }
        }

        if (smb_name_validate_domain(jdi.domain_name) != ERROR_SUCCESS) {
                (void) fprintf(stderr, gettext("domain name is invalid\n"));
                smbadm_usage(B_FALSE);
        }

        if (confirm && !smbadm_join_confirm(jdi.domain_name))
                return (0);

        /*
         * Note: username is null for "unsecure join"
         * (join using a pre-created computer account)
         * Not implemented.
         */
        if (username == NULL) {
                (void) fprintf(stderr,
                    gettext("username missing\n"));
                smbadm_usage(B_FALSE);
        }

        /*
         * Check for "username+password" as described above.
         */
        if ((p = strchr(username, '+')) != NULL) {
                ++p;

                len = (int)(p - username);
                if (len > sizeof (jdi.domain_name))
                        len = sizeof (jdi.domain_name);

                (void) strlcpy(jdi.domain_username, username, len);
                (void) strlcpy(jdi.domain_passwd, p,
                    sizeof (jdi.domain_passwd));
        } else {
                (void) strlcpy(jdi.domain_username, username,
                    sizeof (jdi.domain_username));
        }

        if (smb_name_validate_account(jdi.domain_username)
            != ERROR_SUCCESS) {
                (void) fprintf(stderr,
                    gettext("username contains invalid characters\n"));
                smbadm_usage(B_FALSE);
        }

        if (*jdi.domain_passwd == '\0') {
                if (isatty(fileno(stdin))) {
                        passwd_prompt = gettext("Enter domain password: ");
                        if ((p = getpassphrase(passwd_prompt)) == NULL) {
                                (void) fprintf(stderr, gettext(
                                    "missing password\n"));
                                smbadm_usage(B_FALSE);
                        }

                        (void) strlcpy(jdi.domain_passwd, p,
                            sizeof (jdi.domain_passwd));
                } else {
                        /* Just read from stdin, no prompt. */
                        char *pbuf = NULL;
                        size_t pblen = 0;
                        len = getline(&pbuf, &pblen, stdin);

                        /* trim the ending newline if it exists */
                        if (len > 0 && pbuf[len - 1] == '\n') {
                                pbuf[len - 1] = '\0';
                                len--;
                        }
                        if (len <= 0) {
                                (void) fprintf(stderr, gettext(
                                    "missing password\n"));
                                smbadm_usage(B_FALSE);
                        }
                        (void) strlcpy(jdi.domain_passwd, pbuf,
                            sizeof (jdi.domain_passwd));
                }
        }

        (void) printf(gettext("Joining %s ... this may take a minute ...\n"),
            jdi.domain_name);

        rc = smb_join(&jdi, &jdres);
        if (rc != 0) {
                (void) printf(gettext("Cannot call the SMB service. "
                    " (error %d: %s) "
                    "Please check the service status "
                    "(svcs -vx network/smb/server)\n"),
                    rc, strerror(rc));
                bzero(&jdi, sizeof (jdi));
                return (1);
        }

        switch (jdres.status) {
        case NT_STATUS_SUCCESS:
                (void) printf(gettext(
                    "Successfully joined domain %s using AD server %s\n"),
                    jdi.domain_name, jdres.dc_name);
                bzero(&jdi, sizeof (jdi));
                smbadm_update_groups(SMBADM_GRP_ADDMEMBER); // after join
                smbadm_restart_service();
                return (0);

        case NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND:
                /* See: smb_ads_lookup_msdcs */
                (void) fprintf(stderr, gettext(
                    "failed to find any AD servers for domain: %s\n"),
                    jdi.domain_name);
                goto common;

        case NT_STATUS_BAD_NETWORK_PATH:
                /* See: smbrdr_ctx_new / smb_ctx_resolve */
                (void) fprintf(stderr, gettext(
                    "failed to resolve address of AD server: %s\n"),
                    jdres.dc_name);
                goto common;

        case NT_STATUS_NETWORK_ACCESS_DENIED:
                /* See: smbrdr_ctx_new / smb_ctx_get_ssn */
                (void) fprintf(stderr, gettext(
                    "failed to authenticate with AD server: %s\n"),
                    jdres.dc_name);
                goto common;

        case NT_STATUS_BAD_NETWORK_NAME:
                /*
                 * See: smbrdr_ctx_new / smb_ctx_get_tree
                 * and: ndr_rpc_bind / smb_fh_open
                 */
                (void) fprintf(stderr, gettext(
                    "failed connecting to services on AD server: %s\n"),
                    jdres.dc_name);
                goto common;

        default:
                (void) fprintf(stderr, gettext(
                    "failed to join domain %s\n"),
                    jdi.domain_name);
                if (jdres.dc_name[0] != '\0') {
                        (void) fprintf(stderr, gettext(
                            "using AD server: %s\n"),
                            jdres.dc_name);
                }
                /* FALLTHROUGH */
        common:
                if (jdres.join_err != 0) {
                        (void) fprintf(stderr, "%s\n",
                            smb_ads_strerror(jdres.join_err));
                } else if (jdres.status != 0) {
                        (void) fprintf(stderr, "(%s)\n",
                            xlate_nt_status(jdres.status));
                }
                (void) fprintf(stderr, gettext("Please refer to the "
                    "service log for more information.\n"));
                bzero(&jdi, sizeof (jdi));
                return (1);
        }
}

/*
 * We want to process the user and domain names as separate strings.
 * Check for names of the forms below and separate the components as
 * required.
 *
 *      name@domain
 *      domain\name
 *      domain/name
 *
 * If we encounter any of the forms above in arg, the @, / or \
 * separator is replaced by \0 and the username and domain pointers
 * are changed to point to the appropriate components (in arg).
 *
 * If none of the separators are encountered, the username and domain
 * pointers remain unchanged.
 */
static void
smbadm_extract_domain(char *arg, char **username, char **domain)
{
        char *p;

        if ((p = strpbrk(arg, "/\\@")) != NULL) {
                if (*p == '@') {
                        *p = '\0';
                        ++p;

                        if (strchr(arg, '+') != NULL)
                                return;

                        *domain = p;
                        *username = arg;
                } else {
                        *p = '\0';
                        ++p;
                        *username = p;
                        *domain = arg;
                }
        }
}

/*
 * smbadm_update_groups
 * Add or remove "Domain Admins@mydomain" to/from the
 * local administrators group.
 *
 * Similar to: smbadm_group_add_del_member
 */
static void
smbadm_update_groups(smbadm_grp_action_t act)
{
        char sidstr[SMB_SID_STRSZ];
        char gname[] = "administrators"; // must be writable
        smb_gsid_t msid;
        int rc;

        /*
         * Compose the (well-known) SID for "Domain Admins"
         * which is {domain-SID}-512
         */
        rc = smb_config_getstr(SMB_CI_DOMAIN_SID, sidstr, sizeof (sidstr));
        if (rc != 0) {
                (void) fprintf(stderr,
                    gettext("Update local groups: no domain SID\n"));
                return;
        }
        (void) strlcat(sidstr, "-512", sizeof (sidstr));

        msid.gs_type = SidTypeGroup;
        msid.gs_sid = smb_sid_fromstr(sidstr);
        if (msid.gs_sid == NULL) {
                (void) fprintf(stderr,
                    gettext("Update local groups: no memory for SID\n"));
                return;
        }

        switch (act) {
        case SMBADM_GRP_ADDMEMBER:
                rc = smb_lgrp_add_member(gname,
                    msid.gs_sid, msid.gs_type);
                // suppress "already in group"
                if (rc == SMB_LGRP_MEMBER_IN_GROUP)
                        rc = 0;
                break;
        case SMBADM_GRP_DELMEMBER:
                rc = smb_lgrp_del_member(gname,
                    msid.gs_sid, msid.gs_type);
                // supress "not in group"
                if (rc == SMB_LGRP_MEMBER_NOT_IN_GROUP)
                        rc = 0;
                break;
        default:
                rc = SMB_LGRP_INTERNAL_ERROR;
                break;
        }

        smb_sid_free(msid.gs_sid);

        if (rc != SMB_LGRP_SUCCESS) {
                (void) fprintf(stderr,
                    gettext("Update local groups: can't update DB, %s\n"),
                    smb_lgrp_strerror(rc));
        }
}

/*
 * smbadm_list
 *
 * Displays current security mode and domain/workgroup name.
 */
/*ARGSUSED*/
static int
smbadm_list(int argc, char **argv)
{
        char domain[MAXHOSTNAMELEN];
        char fqdn[MAXHOSTNAMELEN];
        char srvname[MAXHOSTNAMELEN];
        char modename[16];
        int rc;
        smb_inaddr_t srvipaddr;
        char ipstr[INET6_ADDRSTRLEN];

        rc = smb_config_getstr(SMB_CI_SECURITY, modename, sizeof (modename));
        if (rc != SMBD_SMF_OK) {
                (void) fprintf(stderr,
                    gettext("cannot determine the operational mode\n"));
                return (1);
        }

        if (smb_getdomainname(domain, sizeof (domain)) != 0) {
                (void) fprintf(stderr, gettext("failed to get the %s name\n"),
                    modename);
                return (1);
        }

        if (strcmp(modename, "workgroup") == 0) {
                (void) printf(gettext("[*] [%s]\n"), domain);
                return (0);
        }

        (void) printf(gettext("[*] [%s]\n"), domain);
        if ((smb_getfqdomainname(fqdn, sizeof (fqdn)) == 0) && (*fqdn != '\0'))
                (void) printf(gettext("[*] [%s]\n"), fqdn);

        if ((smb_get_dcinfo(srvname, MAXHOSTNAMELEN, &srvipaddr)
            == NT_STATUS_SUCCESS) && (*srvname != '\0') &&
            (!smb_inet_iszero(&srvipaddr))) {
                (void) smb_inet_ntop(&srvipaddr, ipstr,
                    SMB_IPSTRLEN(srvipaddr.a_family));
                (void) printf(gettext("\t[+%s] [%s]\n"),
                    srvname, ipstr);
        }

        /* Print the local and domain SID. */
        smb_domain_show();
        return (0);
}

/*
 * smbadm_lookup
 *
 * Lookup the SID for a given account (user or group)
 */
static int
smbadm_lookup(int argc, char **argv)
{
        int i;
        boolean_t parsable = B_FALSE;
        char option;

        if (argc < 2) {
                (void) fprintf(stderr, gettext("missing account name\n"));
                smbadm_usage(B_FALSE);
        }

        while ((option = getopt(argc, argv, "p")) != -1) {
                switch (option) {
                case 'p':
                        parsable = B_TRUE;
                        break;

                default:
                        smbadm_usage(B_FALSE);
                        break;
                }
        }

        for (i = optind; i < argc; i++) {
                if (strncmp(argv[i], "S-1-", 4) == 0)
                        smbadm_lookup_sid(argv[i], parsable);
                else
                        smbadm_lookup_name(argv[i], parsable);
        }
        return (0);
}

static void
smbadm_lookup_name(char *name, boolean_t parsable)
{
        lsa_account_t   acct;
        int rc;

        if ((rc = smb_lookup_name(name, SidTypeUnknown, &acct)) != 0) {
                (void) fprintf(stderr, gettext(
                    "\t\t%s: lookup name failed, rc=%d\n"),
                    name, rc);
                return;
        }
        if (acct.a_status != NT_STATUS_SUCCESS) {
                (void) fprintf(stderr, gettext("\t\t%s [%s]\n"),
                    name, xlate_nt_status(acct.a_status));
                return;
        }
        if (parsable) {
                (void) printf("%s:%u:%s:%s\n",
                    acct.a_sid, acct.a_sidtype, acct.a_name, acct.a_domain);
        } else {
                (void) printf("\t%s\n", acct.a_sid);
        }
}

static void
smbadm_lookup_sid(char *sidstr, boolean_t parsable)
{
        lsa_account_t   acct;
        int rc;

        if ((rc = smb_lookup_sid(sidstr, &acct)) != 0) {
                (void) fprintf(stderr, gettext(
                    "\t\t%s: lookup SID failed, rc=%d\n"),
                    sidstr, rc);
                return;
        }
        if (acct.a_status != NT_STATUS_SUCCESS) {
                (void) fprintf(stderr, gettext("\t\t%s [%s]\n"),
                    sidstr, xlate_nt_status(acct.a_status));
                return;
        }
        if (parsable) {
                (void) printf("%s:%u:%s:%s\n",
                    acct.a_sid, acct.a_sidtype, acct.a_name, acct.a_domain);
        } else {
                (void) printf("\t%s\\%s\n", acct.a_domain, acct.a_name);
        }
}

/*
 * smbadm_group_create
 *
 * Creates a local SMB group
 */
static int
smbadm_group_create(int argc, char **argv)
{
        char *gname = NULL;
        char *desc = NULL;
        int option;
        int status;

        while ((option = getopt(argc, argv, "d:")) != -1) {
                switch (option) {
                case 'd':
                        desc = optarg;
                        break;

                default:
                        smbadm_usage(B_FALSE);
                }
        }

        gname = argv[optind];
        if (optind >= argc || gname == NULL || *gname == '\0') {
                (void) fprintf(stderr, gettext("missing group name\n"));
                smbadm_usage(B_FALSE);
        }

        status = smb_lgrp_add(gname, desc);
        if (status != SMB_LGRP_SUCCESS) {
                (void) fprintf(stderr,
                    gettext("failed to create %s (%s)\n"), gname,
                    smb_lgrp_strerror(status));
        } else {
                (void) printf(gettext("%s created\n"), gname);
        }

        return (status);
}

/*
 * smbadm_group_dump_members
 *
 * Dump group members details.
 */
static void
smbadm_group_dump_members(smb_gsid_t *members, int num, boolean_t show_sids)
{
        char            sidstr[SMB_SID_STRSZ];
        lsa_account_t   acct;
        int             i;

        if (num == 0) {
                (void) printf(gettext("\tNo members\n"));
                return;
        }

        (void) printf(gettext("\tMembers:\n"));
        for (i = 0; i < num; i++) {
                smb_sid_tostr(members[i].gs_sid, sidstr);

                if (!show_sids &&
                    smb_lookup_sid(sidstr, &acct) == 0) {
                        if (acct.a_status == NT_STATUS_SUCCESS)
                                smbadm_group_show_name(acct.a_domain,
                                    acct.a_name);
                        else
                                (void) printf(gettext("\t\t%s [%s]\n"),
                                    sidstr, xlate_nt_status(acct.a_status));
                } else {
                        (void) printf(gettext("\t\t%s\n"), sidstr);
                }
        }
}

static void
smbadm_group_show_name(const char *domain, const char *name)
{
        if (strchr(domain, '.') != NULL)
                (void) printf("\t\t%s@%s\n", name, domain);
        else
                (void) printf("\t\t%s\\%s\n", domain, name);
}

/*
 * smbadm_group_dump_privs
 *
 * Dump group privilege details.
 */
static void
smbadm_group_dump_privs(smb_privset_t *privs)
{
        smb_privinfo_t *pinfo;
        char *pstatus;
        int i;

        (void) printf(gettext("\tPrivileges: \n"));

        for (i = 0; i < privs->priv_cnt; i++) {
                pinfo = smb_priv_getbyvalue(privs->priv[i].luid.lo_part);
                if ((pinfo == NULL) || (pinfo->flags & PF_PRESENTABLE) == 0)
                        continue;

                switch (privs->priv[i].attrs) {
                case SE_PRIVILEGE_ENABLED:
                        pstatus = "On";
                        break;
                case SE_PRIVILEGE_DISABLED:
                        pstatus = "Off";
                        break;
                default:
                        pstatus = "Unknown";
                        break;
                }
                (void) printf(gettext("\t\t%s: %s\n"), pinfo->name, pstatus);
        }

        if (privs->priv_cnt == 0)
                (void) printf(gettext("\t\tNo privileges\n"));
}

/*
 * smbadm_group_dump
 *
 * Dump group details.
 */
static void
smbadm_group_dump(smb_group_t *grp, boolean_t show_mem, boolean_t show_privs,
    boolean_t show_sids)
{
        char sidstr[SMB_SID_STRSZ];

        (void) printf(gettext("%s (%s)\n"), grp->sg_name, grp->sg_cmnt);

        smb_sid_tostr(grp->sg_id.gs_sid, sidstr);
        (void) printf(gettext("\tSID: %s\n"), sidstr);

        if (show_privs)
                smbadm_group_dump_privs(grp->sg_privs);

        if (show_mem)
                smbadm_group_dump_members(grp->sg_members, grp->sg_nmembers,
                    show_sids);
}

/*
 * smbadm_group_show
 *
 */
static int
smbadm_group_show(int argc, char **argv)
{
        char *gname = NULL;
        boolean_t show_members = B_FALSE;
        boolean_t show_privs = B_FALSE;
        boolean_t show_sids = B_FALSE;
        int option;
        int status;
        smb_group_t grp;
        smb_giter_t gi;

        while ((option = getopt(argc, argv, "mps")) != -1) {
                switch (option) {
                case 'm':
                        show_members = B_TRUE;
                        break;
                case 'p':
                        show_privs = B_TRUE;
                        break;
                case 's':
                        show_sids = B_TRUE;
                        break;

                default:
                        smbadm_usage(B_FALSE);
                }
        }

        gname = argv[optind];
        if (optind >= argc || gname == NULL || *gname == '\0')
                gname = "*";

        if (strcmp(gname, "*")) {
                status = smb_lgrp_getbyname(gname, &grp);
                if (status == SMB_LGRP_SUCCESS) {
                        smbadm_group_dump(&grp, show_members, show_privs,
                            show_sids);
                        smb_lgrp_free(&grp);
                } else {
                        (void) fprintf(stderr,
                            gettext("failed to find %s (%s)\n"),
                            gname, smb_lgrp_strerror(status));
                }
                return (status);
        }

        if ((status = smb_lgrp_iteropen(&gi)) != SMB_LGRP_SUCCESS) {
                (void) fprintf(stderr, gettext("failed to list groups (%s)\n"),
                    smb_lgrp_strerror(status));
                return (status);
        }

        while ((status = smb_lgrp_iterate(&gi, &grp)) == SMB_LGRP_SUCCESS) {
                smbadm_group_dump(&grp, show_members, show_privs, show_sids);
                smb_lgrp_free(&grp);
        }

        smb_lgrp_iterclose(&gi);

        if ((status != SMB_LGRP_NO_MORE) || smb_lgrp_itererror(&gi)) {
                if (status != SMB_LGRP_NO_MORE)
                        smb_syslog(LOG_ERR, "smb_lgrp_iterate: %s",
                            smb_lgrp_strerror(status));

                (void) fprintf(stderr,
                    gettext("\nAn error occurred while retrieving group data.\n"
                    "Check the system log for more information.\n"));
                return (status);
        }

        return (0);
}

/*
 * smbadm_group_delete
 */
static int
smbadm_group_delete(int argc, char **argv)
{
        char *gname = NULL;
        int status;

        gname = argv[optind];
        if (optind >= argc || gname == NULL || *gname == '\0') {
                (void) fprintf(stderr, gettext("missing group name\n"));
                smbadm_usage(B_FALSE);
        }

        status = smb_lgrp_delete(gname);
        if (status != SMB_LGRP_SUCCESS) {
                (void) fprintf(stderr,
                    gettext("failed to delete %s (%s)\n"), gname,
                    smb_lgrp_strerror(status));
        } else {
                (void) printf(gettext("%s deleted\n"), gname);
        }

        return (status);
}

/*
 * smbadm_group_rename
 */
static int
smbadm_group_rename(int argc, char **argv)
{
        char *gname = NULL;
        char *ngname = NULL;
        int status;

        gname = argv[optind];
        if (optind++ >= argc || gname == NULL || *gname == '\0') {
                (void) fprintf(stderr, gettext("missing group name\n"));
                smbadm_usage(B_FALSE);
        }

        ngname = argv[optind];
        if (optind >= argc || ngname == NULL || *ngname == '\0') {
                (void) fprintf(stderr, gettext("missing new group name\n"));
                smbadm_usage(B_FALSE);
        }

        status = smb_lgrp_rename(gname, ngname);
        if (status != SMB_LGRP_SUCCESS) {
                if (status == SMB_LGRP_EXISTS)
                        (void) fprintf(stderr,
                            gettext("failed to rename '%s' (%s already "
                            "exists)\n"), gname, ngname);
                else
                        (void) fprintf(stderr,
                            gettext("failed to rename '%s' (%s)\n"), gname,
                            smb_lgrp_strerror(status));
        } else {
                (void) printf(gettext("'%s' renamed to '%s'\n"), gname, ngname);
        }

        return (status);
}

/*
 * smbadm_group_setprop
 *
 * Set the group properties.
 */
static int
smbadm_group_setprop(int argc, char **argv)
{
        char *gname = NULL;
        smbadm_prop_t props[SMBADM_NPROP];
        smbadm_prop_handle_t *phandle;
        int option;
        int pcnt = 0;
        int ret = 0;
        int p;

        bzero(props, SMBADM_NPROP * sizeof (smbadm_prop_t));

        while ((option = getopt(argc, argv, "p:")) != -1) {
                switch (option) {
                case 'p':
                        if (pcnt >= SMBADM_NPROP) {
                                (void) fprintf(stderr,
                                    gettext("exceeded number of supported"
                                    " properties\n"));
                                smbadm_usage(B_FALSE);
                        }

                        if (smbadm_prop_parse(optarg, &props[pcnt++]) != 0)
                                smbadm_usage(B_FALSE);
                        break;

                default:
                        smbadm_usage(B_FALSE);
                }
        }

        if (pcnt == 0) {
                (void) fprintf(stderr,
                    gettext("missing property=value argument\n"));
                smbadm_usage(B_FALSE);
        }

        gname = argv[optind];
        if (optind >= argc || gname == NULL || *gname == '\0') {
                (void) fprintf(stderr, gettext("missing group name\n"));
                smbadm_usage(B_FALSE);
        }

        for (p = 0; p < pcnt; p++) {
                phandle = smbadm_prop_gethandle(props[p].p_name);
                if (phandle) {
                        if (phandle->p_setfn(gname, &props[p]) != 0)
                                ret = 1;
                }
        }

        return (ret);
}

/*
 * smbadm_group_getprop
 *
 * Get the group properties.
 */
static int
smbadm_group_getprop(int argc, char **argv)
{
        char *gname = NULL;
        smbadm_prop_t props[SMBADM_NPROP];
        smbadm_prop_handle_t *phandle;
        int option;
        int pcnt = 0;
        int ret = 0;
        int p;

        bzero(props, SMBADM_NPROP * sizeof (smbadm_prop_t));

        while ((option = getopt(argc, argv, "p:")) != -1) {
                switch (option) {
                case 'p':
                        if (pcnt >= SMBADM_NPROP) {
                                (void) fprintf(stderr,
                                    gettext("exceeded number of supported"
                                    " properties\n"));
                                smbadm_usage(B_FALSE);
                        }

                        if (smbadm_prop_parse(optarg, &props[pcnt++]) != 0)
                                smbadm_usage(B_FALSE);
                        break;

                default:
                        smbadm_usage(B_FALSE);
                }
        }

        gname = argv[optind];
        if (optind >= argc || gname == NULL || *gname == '\0') {
                (void) fprintf(stderr, gettext("missing group name\n"));
                smbadm_usage(B_FALSE);
        }

        if (pcnt == 0) {
                /*
                 * If no property has be specified then get
                 * all the properties.
                 */
                pcnt = SMBADM_NPROP;
                for (p = 0; p < pcnt; p++)
                        props[p].p_name = smbadm_ptable[p].p_name;
        }

        for (p = 0; p < pcnt; p++) {
                phandle = smbadm_prop_gethandle(props[p].p_name);
                if (phandle) {
                        if (phandle->p_getfn(gname, &props[p]) != 0)
                                ret = 1;
                }
        }

        return (ret);
}

/*
 * smbadm_group_addmember
 *
 */
static int
smbadm_group_addmember(int argc, char **argv)
{
        char *gname = NULL;
        char **mname;
        int option;
        int mcnt = 0;
        int ret = 0;
        int i;


        mname = (char **)malloc(argc * sizeof (char *));
        if (mname == NULL) {
                warn(gettext("failed to add group member"));
                return (1);
        }
        bzero(mname, argc * sizeof (char *));

        while ((option = getopt(argc, argv, "m:")) != -1) {
                switch (option) {
                case 'm':
                        mname[mcnt++] = optarg;
                        break;

                default:
                        free(mname);
                        smbadm_usage(B_FALSE);
                }
        }

        if (mcnt == 0) {
                (void) fprintf(stderr, gettext("missing member name\n"));
                free(mname);
                smbadm_usage(B_FALSE);
        }

        gname = argv[optind];
        if (optind >= argc || gname == NULL || *gname == 0) {
                (void) fprintf(stderr, gettext("missing group name\n"));
                free(mname);
                smbadm_usage(B_FALSE);
        }

        for (i = 0; i < mcnt; i++) {
                if (mname[i] == NULL)
                        continue;
                ret |= smbadm_group_add_del_member(
                    gname, mname[i], SMBADM_GRP_ADDMEMBER);
        }

        free(mname);
        return (ret);
}

/*
 * smbadm_group_delmember
 */
static int
smbadm_group_delmember(int argc, char **argv)
{
        char *gname = NULL;
        char **mname;
        int option;
        int mcnt = 0;
        int ret = 0;
        int i;

        mname = (char **)malloc(argc * sizeof (char *));
        if (mname == NULL) {
                warn(gettext("failed to delete group member"));
                return (1);
        }
        bzero(mname, argc * sizeof (char *));

        while ((option = getopt(argc, argv, "m:")) != -1) {
                switch (option) {
                case 'm':
                        mname[mcnt++] = optarg;
                        break;

                default:
                        free(mname);
                        smbadm_usage(B_FALSE);
                }
        }

        if (mcnt == 0) {
                (void) fprintf(stderr, gettext("missing member name\n"));
                free(mname);
                smbadm_usage(B_FALSE);
        }

        gname = argv[optind];
        if (optind >= argc || gname == NULL || *gname == 0) {
                (void) fprintf(stderr, gettext("missing group name\n"));
                free(mname);
                smbadm_usage(B_FALSE);
        }


        for (i = 0; i < mcnt; i++) {
                ret = 0;
                if (mname[i] == NULL)
                        continue;
                ret |= smbadm_group_add_del_member(
                    gname, mname[i], SMBADM_GRP_DELMEMBER);
        }

        free(mname);
        return (ret);
}

static int
smbadm_group_add_del_member(char *gname, char *mname,
    smbadm_grp_action_t act)
{
        lsa_account_t   acct;
        smb_gsid_t msid;
        char *sidstr;
        char *act_str = NULL;
        int rc;

        if (strncmp(mname, "S-1-", 4) == 0) {
                /*
                 * We are given a SID.  Just use it.
                 *
                 * We'd like the real account type if we can get it,
                 * but don't want to error out if we can't get it.
                 * Lacking other info, assume it's a group.
                 */
                sidstr = mname;
                rc = smb_lookup_sid(sidstr, &acct);
                if ((rc != 0) || (acct.a_status != NT_STATUS_SUCCESS))
                        acct.a_sidtype = SidTypeGroup;
        } else {
                rc = smb_lookup_name(mname, SidTypeUnknown, &acct);
                if ((rc != 0) || (acct.a_status != NT_STATUS_SUCCESS)) {
                        (void) fprintf(stderr,
                            gettext("%s: name lookup failed\n"), mname);
                        return (1);
                }
                sidstr = acct.a_sid;
        }

        msid.gs_type = acct.a_sidtype;
        if ((msid.gs_sid = smb_sid_fromstr(sidstr)) == NULL) {
                (void) fprintf(stderr,
                    gettext("%s: no memory for SID\n"), sidstr);
                return (1);
        }

        switch (act) {
        case SMBADM_GRP_ADDMEMBER:
                act_str = gettext("add");
                rc = smb_lgrp_add_member(gname,
                    msid.gs_sid, msid.gs_type);
                break;
        case SMBADM_GRP_DELMEMBER:
                act_str = gettext("remove");
                rc = smb_lgrp_del_member(gname,
                    msid.gs_sid, msid.gs_type);
                break;
        default:
                rc = SMB_LGRP_INTERNAL_ERROR;
                break;
        }

        smb_sid_free(msid.gs_sid);

        if (rc != SMB_LGRP_SUCCESS) {
                (void) fprintf(stderr,
                    gettext("failed to %s %s (%s)\n"),
                    act_str, mname, smb_lgrp_strerror(rc));
                return (1);
        }
        return (0);
}

static int
smbadm_user_delete(int argc, char **argv)
{
        int error;
        char *user = NULL;

        user = argv[optind];
        if (optind >= argc || user == NULL || *user == '\0') {
                (void) fprintf(stderr, gettext("missing user name\n"));
                smbadm_usage(B_FALSE);
        }

        error = smb_pwd_setcntl(user, SMB_PWC_DELETE);
        if (error == SMB_PWE_SUCCESS)
                (void) printf(gettext("%s has been deleted.\n"), user);
        else
                (void) fprintf(stderr, "%s\n", smbadm_pwd_strerror(error));

        return (error);
}

static int
smbadm_user_disable(int argc, char **argv)
{
        int error;
        char *user = NULL;

        user = argv[optind];
        if (optind >= argc || user == NULL || *user == '\0') {
                (void) fprintf(stderr, gettext("missing user name\n"));
                smbadm_usage(B_FALSE);
        }

        error = smb_pwd_setcntl(user, SMB_PWC_DISABLE);
        if (error == SMB_PWE_SUCCESS)
                (void) printf(gettext("%s is disabled.\n"), user);
        else
                (void) fprintf(stderr, "%s\n", smbadm_pwd_strerror(error));

        return (error);
}

static int
smbadm_user_enable(int argc, char **argv)
{
        int error;
        char *user = NULL;

        user = argv[optind];
        if (optind >= argc || user == NULL || *user == '\0') {
                (void) fprintf(stderr, gettext("missing user name\n"));
                smbadm_usage(B_FALSE);
        }

        error = smb_pwd_setcntl(user, SMB_PWC_ENABLE);
        if (error == SMB_PWE_SUCCESS)
                (void) printf(gettext("%s is enabled.\n"), user);
        else
                (void) fprintf(stderr, "%s\n", smbadm_pwd_strerror(error));

        return (error);
}


int
main(int argc, char **argv)
{
        int ret;
        int i;

        (void) setlocale(LC_ALL, "");
        (void) textdomain(TEXT_DOMAIN);

        (void) malloc(0);       /* satisfy libumem dependency */

        progname = basename(argv[0]);

        if (is_system_labeled()) {
                (void) fprintf(stderr,
                    gettext("Trusted Extensions not supported\n"));
                return (1);
        }

        if (argc < 2) {
                (void) fprintf(stderr, gettext("missing command\n"));
                smbadm_usage(B_FALSE);
        }

        /*
         * Special case "cmd --help/-?"
         */
        if (strcmp(argv[1], "-?") == 0 ||
            strcmp(argv[1], "--help") == 0 ||
            strcmp(argv[1], "-h") == 0)
                smbadm_usage(B_TRUE);

        for (i = 0; i < SMBADM_NCMD; ++i) {
                curcmd = &smbadm_cmdtable[i];
                if (strcasecmp(argv[1], curcmd->name) == 0) {
                        if (argc > 2) {
                                /* cmd subcmd --help/-? */
                                if (strcmp(argv[2], "-?") == 0 ||
                                    strcmp(argv[2], "--help") == 0 ||
                                    strcmp(argv[2], "-h") == 0)
                                        smbadm_usage(B_TRUE);
                        }

                        if (!smbadm_checkauth(curcmd->auth)) {
                                (void) fprintf(stderr,
                                    gettext("%s: %s: authorization denied\n"),
                                    progname, curcmd->name);
                                return (1);
                        }

                        if ((ret = smbadm_init()) != 0)
                                return (ret);

                        ret = curcmd->func(argc - 1, &argv[1]);

                        smbadm_fini();
                        return (ret);
                }
        }

        curcmd = NULL;
        (void) fprintf(stderr, gettext("unknown subcommand (%s)\n"), argv[1]);
        smbadm_usage(B_FALSE);
        return (2);
}

static int
smbadm_init(void)
{
        int rc;

        if ((curcmd->flags & SMBADM_CMDF_KMOD) != 0) {
                if ((rc = smb_kmod_bind(B_FALSE)) != 0) {
                        (void) fprintf(stderr,
                            gettext("failed to open driver (%s)\n"),
                            strerror(rc));
                        return (1);
                }
        }

        if ((curcmd->flags & SMBADM_CMDF_GROUP) != 0) {
                if ((rc = smb_lgrp_start()) != SMB_LGRP_SUCCESS) {
                        (void) fprintf(stderr,
                            gettext("failed to initialize (%s)\n"),
                            smb_lgrp_strerror(rc));
                        return (1);
                }
        }

        if ((curcmd->flags & SMBADM_CMDF_USER) != 0) {
                smb_pwd_init(B_FALSE);
        }

        return (0);
}

static void
smbadm_fini(void)
{

        if ((curcmd->flags & SMBADM_CMDF_KMOD) != 0) {
                smb_kmod_unbind();
        }

        if ((curcmd->flags & SMBADM_CMDF_GROUP) != 0) {
                smb_lgrp_stop();
        }

        if ((curcmd->flags & SMBADM_CMDF_USER) != 0) {
                smb_pwd_fini();
        }
}

static boolean_t
smbadm_checkauth(const char *auth)
{
        struct passwd *pw;

        if ((pw = getpwuid(getuid())) == NULL)
                return (B_FALSE);

        if (chkauthattr(auth, pw->pw_name) == 0)
                return (B_FALSE);

        return (B_TRUE);
}

static boolean_t
smbadm_prop_validate(smbadm_prop_t *prop, boolean_t chkval)
{
        smbadm_prop_handle_t *pinfo;
        int i;

        for (i = 0; i < SMBADM_NPROP; i++) {
                pinfo = &smbadm_ptable[i];
                if (strcmp(pinfo->p_name, prop->p_name) == 0) {
                        if (pinfo->p_chkfn && chkval)
                                return (pinfo->p_chkfn(prop));

                        return (B_TRUE);
                }
        }

        (void) fprintf(stderr, gettext("unrecognized property '%s'\n"),
            prop->p_name);

        return (B_FALSE);
}

static int
smbadm_prop_parse(char *arg, smbadm_prop_t *prop)
{
        boolean_t parse_value;
        char *equal;

        if (arg == NULL)
                return (2);

        prop->p_name = prop->p_value = NULL;

        if (strcmp(curcmd->name, "set") == 0)
                parse_value = B_TRUE;
        else
                parse_value = B_FALSE;

        prop->p_name = arg;

        if (parse_value) {
                equal = strchr(arg, '=');
                if (equal == NULL)
                        return (2);

                *equal++ = '\0';
                prop->p_value = equal;
        }

        if (smbadm_prop_validate(prop, parse_value) == B_FALSE)
                return (2);

        return (0);
}

static smbadm_prop_handle_t *
smbadm_prop_gethandle(char *pname)
{
        int i;

        for (i = 0; i < SMBADM_NPROP; i++)
                if (strcmp(pname, smbadm_ptable[i].p_name) == 0)
                        return (&smbadm_ptable[i]);

        return (NULL);
}

static int
smbadm_setprop_desc(char *gname, smbadm_prop_t *prop)
{
        int status;

        status = smb_lgrp_setcmnt(gname, prop->p_value);
        if (status != SMB_LGRP_SUCCESS) {
                (void) fprintf(stderr,
                    gettext("failed to modify the group description (%s)\n"),
                    smb_lgrp_strerror(status));
                return (1);
        }

        (void) printf(gettext("%s: description modified\n"), gname);
        return (0);
}

static int
smbadm_getprop_desc(char *gname, smbadm_prop_t *prop)
{
        char *cmnt = NULL;
        int status;

        status = smb_lgrp_getcmnt(gname, &cmnt);
        if (status != SMB_LGRP_SUCCESS) {
                (void) fprintf(stderr,
                    gettext("failed to get the group description (%s)\n"),
                    smb_lgrp_strerror(status));
                return (1);
        }

        (void) printf(gettext("\t%s: %s\n"), prop->p_name, cmnt);
        free(cmnt);
        return (0);
}

static int
smbadm_group_setpriv(char *gname, uint8_t priv_id, smbadm_prop_t *prop)
{
        boolean_t enable;
        int status;
        int ret;

        if (strcasecmp(prop->p_value, "on") == 0) {
                (void) printf(gettext("Enabling %s privilege "), prop->p_name);
                enable = B_TRUE;
        } else {
                (void) printf(gettext("Disabling %s privilege "), prop->p_name);
                enable = B_FALSE;
        }

        status = smb_lgrp_setpriv(gname, priv_id, enable);
        if (status == SMB_LGRP_SUCCESS) {
                (void) printf(gettext("succeeded\n"));
                ret = 0;
        } else {
                (void) printf(gettext("failed: %s\n"),
                    smb_lgrp_strerror(status));
                ret = 1;
        }

        return (ret);
}

static int
smbadm_group_getpriv(char *gname, uint8_t priv_id, smbadm_prop_t *prop)
{
        boolean_t enable;
        int status;

        status = smb_lgrp_getpriv(gname, priv_id, &enable);
        if (status != SMB_LGRP_SUCCESS) {
                (void) fprintf(stderr, gettext("failed to get %s (%s)\n"),
                    prop->p_name, smb_lgrp_strerror(status));
                return (1);
        }

        (void) printf(gettext("\t%s: %s\n"), prop->p_name,
            (enable) ? "On" : "Off");

        return (0);
}

static int
smbadm_setprop_tkowner(char *gname, smbadm_prop_t *prop)
{
        return (smbadm_group_setpriv(gname, SE_TAKE_OWNERSHIP_LUID, prop));
}

static int
smbadm_getprop_tkowner(char *gname, smbadm_prop_t *prop)
{
        return (smbadm_group_getpriv(gname, SE_TAKE_OWNERSHIP_LUID, prop));
}

static int
smbadm_setprop_readfile(char *gname, smbadm_prop_t *prop)
{
        return (smbadm_group_setpriv(gname, SE_READ_FILE_LUID, prop));
}

static int
smbadm_getprop_readfile(char *gname, smbadm_prop_t *prop)
{
        return (smbadm_group_getpriv(gname, SE_READ_FILE_LUID, prop));
}

static int
smbadm_setprop_writefile(char *gname, smbadm_prop_t *prop)
{
        return (smbadm_group_setpriv(gname, SE_WRITE_FILE_LUID, prop));
}

static int
smbadm_getprop_writefile(char *gname, smbadm_prop_t *prop)
{
        return (smbadm_group_getpriv(gname, SE_WRITE_FILE_LUID, prop));
}

static int
smbadm_setprop_backup(char *gname, smbadm_prop_t *prop)
{
        return (smbadm_group_setpriv(gname, SE_BACKUP_LUID, prop));
}

static int
smbadm_getprop_backup(char *gname, smbadm_prop_t *prop)
{
        return (smbadm_group_getpriv(gname, SE_BACKUP_LUID, prop));
}

static int
smbadm_setprop_restore(char *gname, smbadm_prop_t *prop)
{
        return (smbadm_group_setpriv(gname, SE_RESTORE_LUID, prop));
}

static int
smbadm_getprop_restore(char *gname, smbadm_prop_t *prop)
{
        return (smbadm_group_getpriv(gname, SE_RESTORE_LUID, prop));
}

static boolean_t
smbadm_chkprop_priv(smbadm_prop_t *prop)
{
        if (prop->p_value == NULL || *prop->p_value == '\0') {
                (void) fprintf(stderr,
                    gettext("missing value for '%s'\n"), prop->p_name);
                return (B_FALSE);
        }

        if (strcasecmp(prop->p_value, "on") == 0)
                return (B_TRUE);

        if (strcasecmp(prop->p_value, "off") == 0)
                return (B_TRUE);

        (void) fprintf(stderr,
            gettext("%s: unrecognized value for '%s' property\n"),
            prop->p_value, prop->p_name);

        return (B_FALSE);
}

static const char *
smbadm_pwd_strerror(int error)
{
        switch (error) {
        case SMB_PWE_SUCCESS:
                return (gettext("Success."));

        case SMB_PWE_USER_UNKNOWN:
                return (gettext("User does not exist."));

        case SMB_PWE_USER_DISABLE:
                return (gettext("User is disabled."));

        case SMB_PWE_CLOSE_FAILED:
        case SMB_PWE_OPEN_FAILED:
        case SMB_PWE_WRITE_FAILED:
        case SMB_PWE_UPDATE_FAILED:
                return (gettext("Unexpected failure. "
                    "SMB password database unchanged."));

        case SMB_PWE_STAT_FAILED:
                return (gettext("stat of SMB password file failed."));

        case SMB_PWE_BUSY:
                return (gettext("SMB password database busy. "
                    "Try again later."));

        case SMB_PWE_DENIED:
                return (gettext("Operation not permitted."));

        case SMB_PWE_SYSTEM_ERROR:
                return (gettext("System error."));

        default:
                break;
        }

        return (gettext("Unknown error code."));
}

/*
 * Enable libumem debugging by default on DEBUG builds.
 */
#ifdef DEBUG
const char *
_umem_debug_init(void)
{
        return ("default,verbose"); /* $UMEM_DEBUG setting */
}

const char *
_umem_logging_init(void)
{
        return ("fail,contents"); /* $UMEM_LOGGING setting */
}
#endif