2003-04-12 03:32:00 +04:00
/*
Unix SMB / CIFS implementation .
FS info functions
Copyright ( C ) Stefan ( metze ) Metzmacher 2003
2007-04-18 04:34:10 +04:00
Copyright ( C ) Jeremy Allison 2007.
2003-04-12 03:32:00 +04:00
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
2007-07-09 23:25:36 +04:00
the Free Software Foundation ; either version 3 of the License , or
2003-04-12 03:32:00 +04:00
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
2007-07-10 04:52:41 +04:00
along with this program . If not , see < http : //www.gnu.org/licenses/>.
2003-04-12 03:32:00 +04:00
*/
# include "includes.h"
2004-11-13 02:42:12 +03:00
/****************************************************************************
Get UNIX extensions version info .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
BOOL cli_unix_extensions_version ( struct cli_state * cli , uint16 * pmajor , uint16 * pminor ,
uint32 * pcaplow , uint32 * pcaphigh )
{
BOOL ret = False ;
uint16 setup ;
char param [ 2 ] ;
char * rparam = NULL , * rdata = NULL ;
unsigned int rparam_count = 0 , rdata_count = 0 ;
setup = TRANSACT2_QFSINFO ;
SSVAL ( param , 0 , SMB_QUERY_CIFS_UNIX_INFO ) ;
if ( ! cli_send_trans ( cli , SMBtrans2 ,
NULL ,
0 , 0 ,
& setup , 1 , 0 ,
param , 2 , 0 ,
NULL , 0 , 560 ) ) {
goto cleanup ;
}
if ( ! cli_receive_trans ( cli , SMBtrans2 ,
& rparam , & rparam_count ,
& rdata , & rdata_count ) ) {
goto cleanup ;
}
if ( cli_is_error ( cli ) ) {
ret = False ;
goto cleanup ;
} else {
ret = True ;
}
if ( rdata_count < 12 ) {
goto cleanup ;
}
* pmajor = SVAL ( rdata , 0 ) ;
* pminor = SVAL ( rdata , 2 ) ;
2007-05-16 04:07:38 +04:00
cli - > posix_capabilities = * pcaplow = IVAL ( rdata , 4 ) ;
2004-11-13 02:42:12 +03:00
* pcaphigh = IVAL ( rdata , 8 ) ;
/* todo: but not yet needed
* return the other stuff
*/
cleanup :
SAFE_FREE ( rparam ) ;
SAFE_FREE ( rdata ) ;
return ret ;
}
2003-04-12 03:32:00 +04:00
2006-07-12 04:21:14 +04:00
/****************************************************************************
Set UNIX extensions capabilities .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
BOOL cli_set_unix_extensions_capabilities ( struct cli_state * cli , uint16 major , uint16 minor ,
uint32 caplow , uint32 caphigh )
{
BOOL ret = False ;
uint16 setup ;
char param [ 4 ] ;
char data [ 12 ] ;
char * rparam = NULL , * rdata = NULL ;
unsigned int rparam_count = 0 , rdata_count = 0 ;
setup = TRANSACT2_SETFSINFO ;
SSVAL ( param , 0 , 0 ) ;
SSVAL ( param , 2 , SMB_SET_CIFS_UNIX_INFO ) ;
SSVAL ( data , 0 , major ) ;
SSVAL ( data , 2 , minor ) ;
SIVAL ( data , 4 , caplow ) ;
SIVAL ( data , 8 , caphigh ) ;
if ( ! cli_send_trans ( cli , SMBtrans2 ,
NULL ,
0 , 0 ,
& setup , 1 , 0 ,
param , 4 , 0 ,
data , 12 , 560 ) ) {
goto cleanup ;
}
if ( ! cli_receive_trans ( cli , SMBtrans2 ,
& rparam , & rparam_count ,
& rdata , & rdata_count ) ) {
goto cleanup ;
}
if ( cli_is_error ( cli ) ) {
ret = False ;
goto cleanup ;
} else {
ret = True ;
}
cleanup :
SAFE_FREE ( rparam ) ;
SAFE_FREE ( rdata ) ;
return ret ;
}
2003-04-12 03:32:00 +04:00
BOOL cli_get_fs_attr_info ( struct cli_state * cli , uint32 * fs_attr )
{
BOOL ret = False ;
uint16 setup ;
char param [ 2 ] ;
char * rparam = NULL , * rdata = NULL ;
unsigned int rparam_count = 0 , rdata_count = 0 ;
if ( ! cli | | ! fs_attr )
smb_panic ( " cli_get_fs_attr_info() called with NULL Pionter! " ) ;
setup = TRANSACT2_QFSINFO ;
SSVAL ( param , 0 , SMB_QUERY_FS_ATTRIBUTE_INFO ) ;
if ( ! cli_send_trans ( cli , SMBtrans2 ,
NULL ,
0 , 0 ,
& setup , 1 , 0 ,
param , 2 , 0 ,
NULL , 0 , 560 ) ) {
goto cleanup ;
}
if ( ! cli_receive_trans ( cli , SMBtrans2 ,
& rparam , & rparam_count ,
& rdata , & rdata_count ) ) {
goto cleanup ;
}
if ( cli_is_error ( cli ) ) {
ret = False ;
goto cleanup ;
} else {
ret = True ;
}
if ( rdata_count < 12 ) {
goto cleanup ;
}
* fs_attr = IVAL ( rdata , 0 ) ;
/* todo: but not yet needed
* return the other stuff
*/
cleanup :
SAFE_FREE ( rparam ) ;
SAFE_FREE ( rdata ) ;
return ret ;
}
2005-03-30 04:47:57 +04:00
BOOL cli_get_fs_volume_info_old ( struct cli_state * cli , fstring volume_name , uint32 * pserial_number )
{
BOOL ret = False ;
uint16 setup ;
char param [ 2 ] ;
char * rparam = NULL , * rdata = NULL ;
unsigned int rparam_count = 0 , rdata_count = 0 ;
unsigned char nlen ;
setup = TRANSACT2_QFSINFO ;
SSVAL ( param , 0 , SMB_INFO_VOLUME ) ;
if ( ! cli_send_trans ( cli , SMBtrans2 ,
NULL ,
0 , 0 ,
& setup , 1 , 0 ,
param , 2 , 0 ,
NULL , 0 , 560 ) ) {
goto cleanup ;
}
if ( ! cli_receive_trans ( cli , SMBtrans2 ,
& rparam , & rparam_count ,
& rdata , & rdata_count ) ) {
goto cleanup ;
}
if ( cli_is_error ( cli ) ) {
ret = False ;
goto cleanup ;
} else {
ret = True ;
}
if ( rdata_count < 5 ) {
goto cleanup ;
}
if ( pserial_number ) {
* pserial_number = IVAL ( rdata , 0 ) ;
}
nlen = CVAL ( rdata , l2_vol_cch ) ;
clistr_pull ( cli , volume_name , rdata + l2_vol_szVolLabel , sizeof ( fstring ) , nlen , STR_NOALIGN ) ;
/* todo: but not yet needed
* return the other stuff
*/
cleanup :
SAFE_FREE ( rparam ) ;
SAFE_FREE ( rdata ) ;
return ret ;
}
BOOL cli_get_fs_volume_info ( struct cli_state * cli , fstring volume_name , uint32 * pserial_number , time_t * pdate )
{
BOOL ret = False ;
uint16 setup ;
char param [ 2 ] ;
char * rparam = NULL , * rdata = NULL ;
unsigned int rparam_count = 0 , rdata_count = 0 ;
unsigned int nlen ;
setup = TRANSACT2_QFSINFO ;
SSVAL ( param , 0 , SMB_QUERY_FS_VOLUME_INFO ) ;
if ( ! cli_send_trans ( cli , SMBtrans2 ,
NULL ,
0 , 0 ,
& setup , 1 , 0 ,
param , 2 , 0 ,
NULL , 0 , 560 ) ) {
goto cleanup ;
}
if ( ! cli_receive_trans ( cli , SMBtrans2 ,
& rparam , & rparam_count ,
& rdata , & rdata_count ) ) {
goto cleanup ;
}
if ( cli_is_error ( cli ) ) {
ret = False ;
goto cleanup ;
} else {
ret = True ;
}
if ( rdata_count < 19 ) {
goto cleanup ;
}
if ( pdate ) {
2006-08-24 20:44:00 +04:00
struct timespec ts ;
ts = interpret_long_date ( rdata ) ;
* pdate = ts . tv_sec ;
2005-03-30 04:47:57 +04:00
}
if ( pserial_number ) {
* pserial_number = IVAL ( rdata , 8 ) ;
}
nlen = IVAL ( rdata , 12 ) ;
clistr_pull ( cli , volume_name , rdata + 18 , sizeof ( fstring ) , nlen , STR_UNICODE ) ;
/* todo: but not yet needed
* return the other stuff
*/
cleanup :
SAFE_FREE ( rparam ) ;
SAFE_FREE ( rdata ) ;
return ret ;
}
2007-03-21 03:25:08 +03:00
/******************************************************************************
Send / receive the request encryption blob .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2007-03-28 01:13:31 +04:00
static NTSTATUS enc_blob_send_receive ( struct cli_state * cli , DATA_BLOB * in , DATA_BLOB * out , DATA_BLOB * param_out )
2007-03-21 03:25:08 +03:00
{
uint16 setup ;
2007-03-21 03:44:15 +03:00
char param [ 4 ] ;
2007-03-21 03:25:08 +03:00
char * rparam = NULL , * rdata = NULL ;
unsigned int rparam_count = 0 , rdata_count = 0 ;
NTSTATUS status = NT_STATUS_OK ;
setup = TRANSACT2_SETFSINFO ;
2007-03-21 03:44:15 +03:00
SSVAL ( param , 0 , 0 ) ;
SSVAL ( param , 2 , SMB_REQUEST_TRANSPORT_ENCRYPTION ) ;
2007-03-21 03:25:08 +03:00
if ( ! cli_send_trans ( cli , SMBtrans2 ,
NULL ,
0 , 0 ,
& setup , 1 , 0 ,
2007-03-21 03:44:15 +03:00
param , 4 , 0 ,
2007-03-21 03:25:08 +03:00
( char * ) in - > data , in - > length , CLI_BUFFER_SIZE ) ) {
status = cli_nt_error ( cli ) ;
goto out ;
}
if ( ! cli_receive_trans ( cli , SMBtrans2 ,
& rparam , & rparam_count ,
& rdata , & rdata_count ) ) {
status = cli_nt_error ( cli ) ;
goto out ;
}
if ( cli_is_error ( cli ) ) {
status = cli_nt_error ( cli ) ;
if ( ! NT_STATUS_EQUAL ( status , NT_STATUS_MORE_PROCESSING_REQUIRED ) ) {
goto out ;
}
}
* out = data_blob ( rdata , rdata_count ) ;
2007-03-28 01:13:31 +04:00
* param_out = data_blob ( rparam , rparam_count ) ;
2007-03-21 03:25:08 +03:00
out :
SAFE_FREE ( rparam ) ;
SAFE_FREE ( rdata ) ;
return status ;
}
2007-04-18 04:34:10 +04:00
/******************************************************************************
Make a client state struct .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static struct smb_trans_enc_state * make_cli_enc_state ( enum smb_trans_enc_type smb_enc_type )
{
struct smb_trans_enc_state * es = NULL ;
es = SMB_MALLOC_P ( struct smb_trans_enc_state ) ;
if ( ! es ) {
return NULL ;
}
ZERO_STRUCTP ( es ) ;
es - > smb_enc_type = smb_enc_type ;
2007-04-19 01:56:18 +04:00
if ( smb_enc_type = = SMB_TRANS_ENC_GSS ) {
# if defined(HAVE_GSSAPI) && defined(HAVE_KRB5)
es - > s . gss_state = SMB_MALLOC_P ( struct smb_tran_enc_state_gss ) ;
if ( ! es - > s . gss_state ) {
SAFE_FREE ( es ) ;
return NULL ;
}
ZERO_STRUCTP ( es - > s . gss_state ) ;
# else
2007-04-19 02:34:23 +04:00
DEBUG ( 0 , ( " make_cli_enc_state: no krb5 compiled. \n " ) ) ;
2007-04-19 01:56:18 +04:00
SAFE_FREE ( es ) ;
return NULL ;
# endif
}
2007-04-18 04:34:10 +04:00
return es ;
}
2007-03-21 03:25:08 +03:00
/******************************************************************************
Start a raw ntlmssp encryption .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
NTSTATUS cli_raw_ntlm_smb_encryption_start ( struct cli_state * cli ,
const char * user ,
const char * pass ,
const char * domain )
{
2007-05-14 16:16:20 +04:00
DATA_BLOB blob_in = data_blob_null ;
DATA_BLOB blob_out = data_blob_null ;
DATA_BLOB param_out = data_blob_null ;
2007-03-21 03:25:08 +03:00
NTSTATUS status = NT_STATUS_UNSUCCESSFUL ;
2007-04-18 04:34:10 +04:00
struct smb_trans_enc_state * es = make_cli_enc_state ( SMB_TRANS_ENC_NTLM ) ;
2007-03-21 03:25:08 +03:00
if ( ! es ) {
return NT_STATUS_NO_MEMORY ;
}
2007-03-22 05:24:12 +03:00
status = ntlmssp_client_start ( & es - > s . ntlmssp_state ) ;
2007-03-21 03:25:08 +03:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
goto fail ;
}
2007-03-22 05:24:12 +03:00
ntlmssp_want_feature ( es - > s . ntlmssp_state , NTLMSSP_FEATURE_SESSION_KEY ) ;
es - > s . ntlmssp_state - > neg_flags | = ( NTLMSSP_NEGOTIATE_SIGN | NTLMSSP_NEGOTIATE_SEAL ) ;
2007-03-21 03:25:08 +03:00
2007-03-22 05:24:12 +03:00
if ( ! NT_STATUS_IS_OK ( status = ntlmssp_set_username ( es - > s . ntlmssp_state , user ) ) ) {
2007-03-21 03:25:08 +03:00
goto fail ;
}
2007-03-22 05:24:12 +03:00
if ( ! NT_STATUS_IS_OK ( status = ntlmssp_set_domain ( es - > s . ntlmssp_state , domain ) ) ) {
2007-03-21 03:25:08 +03:00
goto fail ;
}
2007-03-22 05:24:12 +03:00
if ( ! NT_STATUS_IS_OK ( status = ntlmssp_set_password ( es - > s . ntlmssp_state , pass ) ) ) {
2007-03-21 03:25:08 +03:00
goto fail ;
}
do {
2007-03-22 05:24:12 +03:00
status = ntlmssp_update ( es - > s . ntlmssp_state , blob_in , & blob_out ) ;
2007-03-21 03:25:08 +03:00
data_blob_free ( & blob_in ) ;
2007-03-28 01:13:31 +04:00
data_blob_free ( & param_out ) ;
2007-03-21 03:25:08 +03:00
if ( NT_STATUS_EQUAL ( status , NT_STATUS_MORE_PROCESSING_REQUIRED ) | | NT_STATUS_IS_OK ( status ) ) {
2007-03-28 01:13:31 +04:00
status = enc_blob_send_receive ( cli , & blob_out , & blob_in , & param_out ) ;
}
if ( param_out . length = = 2 ) {
es - > enc_ctx_num = SVAL ( param_out . data , 0 ) ;
2007-03-21 03:25:08 +03:00
}
data_blob_free ( & blob_out ) ;
} while ( NT_STATUS_EQUAL ( status , NT_STATUS_MORE_PROCESSING_REQUIRED ) ) ;
data_blob_free ( & blob_in ) ;
if ( NT_STATUS_IS_OK ( status ) ) {
/* Replace the old state, if any. */
if ( cli - > trans_enc_state ) {
common_free_encryption_state ( & cli - > trans_enc_state ) ;
}
cli - > trans_enc_state = es ;
cli - > trans_enc_state - > enc_on = True ;
2007-03-21 04:32:01 +03:00
es = NULL ;
2007-03-21 03:25:08 +03:00
}
fail :
common_free_encryption_state ( & es ) ;
return status ;
}
2007-04-18 04:34:10 +04:00
# if defined(HAVE_GSSAPI) && defined(HAVE_KRB5)
# ifndef SMB_GSS_REQUIRED_FLAGS
# define SMB_GSS_REQUIRED_FLAGS (GSS_C_CONF_FLAG|GSS_C_INTEG_FLAG|GSS_C_MUTUAL_FLAG|GSS_C_REPLAY_FLAG|GSS_C_SEQUENCE_FLAG)
# endif
/******************************************************************************
Get client gss blob to send to a server .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static NTSTATUS make_cli_gss_blob ( struct smb_trans_enc_state * es ,
const char * service ,
const char * host ,
NTSTATUS status_in ,
DATA_BLOB spnego_blob_in ,
DATA_BLOB * p_blob_out )
{
2007-04-19 02:02:30 +04:00
const char * krb_mechs [ ] = { OID_KERBEROS5 , NULL } ;
2007-04-18 04:34:10 +04:00
OM_uint32 ret ;
OM_uint32 min ;
gss_name_t srv_name ;
gss_buffer_desc input_name ;
gss_buffer_desc * p_tok_in ;
gss_buffer_desc tok_out , tok_in ;
2007-05-14 16:16:20 +04:00
DATA_BLOB blob_out = data_blob_null ;
DATA_BLOB blob_in = data_blob_null ;
2007-04-18 04:34:10 +04:00
char * host_princ_s = NULL ;
OM_uint32 ret_flags = 0 ;
NTSTATUS status = NT_STATUS_OK ;
2007-04-19 12:45:29 +04:00
gss_OID_desc nt_hostbased_service =
{ 10 , CONST_DISCARD ( char * , " \x2a \x86 \x48 \x86 \xf7 \x12 \x01 \x02 \x01 \x04 " ) } ;
2007-04-18 04:34:10 +04:00
memset ( & tok_out , ' \0 ' , sizeof ( tok_out ) ) ;
/* Get a ticket for the service@host */
asprintf ( & host_princ_s , " %s@%s " , service , host ) ;
if ( host_princ_s = = NULL ) {
return NT_STATUS_NO_MEMORY ;
}
input_name . value = host_princ_s ;
input_name . length = strlen ( host_princ_s ) + 1 ;
ret = gss_import_name ( & min ,
& input_name ,
2007-04-19 12:45:29 +04:00
& nt_hostbased_service ,
2007-04-18 04:34:10 +04:00
& srv_name ) ;
if ( ret ! = GSS_S_COMPLETE ) {
SAFE_FREE ( host_princ_s ) ;
return map_nt_error_from_gss ( ret , min ) ;
}
if ( spnego_blob_in . length = = 0 ) {
p_tok_in = GSS_C_NO_BUFFER ;
} else {
/* Remove the SPNEGO wrapper */
if ( ! spnego_parse_auth_response ( spnego_blob_in , status_in , OID_KERBEROS5 , & blob_in ) ) {
status = NT_STATUS_UNSUCCESSFUL ;
goto fail ;
}
tok_in . value = blob_in . data ;
tok_in . length = blob_in . length ;
p_tok_in = & tok_in ;
}
ret = gss_init_sec_context ( & min ,
GSS_C_NO_CREDENTIAL , /* Use our default cred. */
& es - > s . gss_state - > gss_ctx ,
srv_name ,
GSS_C_NO_OID , /* default OID. */
GSS_C_MUTUAL_FLAG | GSS_C_REPLAY_FLAG | GSS_C_SEQUENCE_FLAG ,
GSS_C_INDEFINITE , /* requested ticket lifetime. */
NULL , /* no channel bindings */
p_tok_in ,
NULL , /* ignore mech type */
& tok_out ,
& ret_flags ,
NULL ) ; /* ignore time_rec */
status = map_nt_error_from_gss ( ret , min ) ;
if ( ! NT_STATUS_IS_OK ( status ) & & ! NT_STATUS_EQUAL ( status , NT_STATUS_MORE_PROCESSING_REQUIRED ) ) {
2007-04-19 05:20:37 +04:00
ADS_STATUS adss = ADS_ERROR_GSS ( ret , min ) ;
DEBUG ( 10 , ( " make_cli_gss_blob: gss_init_sec_context failed with %s \n " ,
ads_errstr ( adss ) ) ) ;
2007-04-18 04:34:10 +04:00
goto fail ;
}
if ( ( ret_flags & SMB_GSS_REQUIRED_FLAGS ) ! = SMB_GSS_REQUIRED_FLAGS ) {
status = NT_STATUS_ACCESS_DENIED ;
}
blob_out = data_blob ( tok_out . value , tok_out . length ) ;
/* Wrap in an SPNEGO wrapper */
* p_blob_out = gen_negTokenTarg ( krb_mechs , blob_out ) ;
fail :
data_blob_free ( & blob_out ) ;
data_blob_free ( & blob_in ) ;
SAFE_FREE ( host_princ_s ) ;
gss_release_name ( & min , & srv_name ) ;
if ( tok_out . value ) {
gss_release_buffer ( & min , & tok_out ) ;
}
return status ;
}
/******************************************************************************
Start a SPNEGO gssapi encryption context .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
NTSTATUS cli_gss_smb_encryption_start ( struct cli_state * cli )
{
2007-05-14 16:16:20 +04:00
DATA_BLOB blob_recv = data_blob_null ;
DATA_BLOB blob_send = data_blob_null ;
DATA_BLOB param_out = data_blob_null ;
2007-04-18 04:34:10 +04:00
NTSTATUS status = NT_STATUS_UNSUCCESSFUL ;
fstring fqdn ;
const char * servicename ;
struct smb_trans_enc_state * es = make_cli_enc_state ( SMB_TRANS_ENC_GSS ) ;
if ( ! es ) {
return NT_STATUS_NO_MEMORY ;
}
name_to_fqdn ( fqdn , cli - > desthost ) ;
strlower_m ( fqdn ) ;
servicename = " cifs " ;
status = make_cli_gss_blob ( es , servicename , fqdn , NT_STATUS_OK , blob_recv , & blob_send ) ;
if ( ! NT_STATUS_EQUAL ( status , NT_STATUS_MORE_PROCESSING_REQUIRED ) ) {
servicename = " host " ;
status = make_cli_gss_blob ( es , servicename , fqdn , NT_STATUS_OK , blob_recv , & blob_send ) ;
if ( ! NT_STATUS_EQUAL ( status , NT_STATUS_MORE_PROCESSING_REQUIRED ) ) {
goto fail ;
}
}
do {
data_blob_free ( & blob_recv ) ;
status = enc_blob_send_receive ( cli , & blob_send , & blob_recv , & param_out ) ;
if ( param_out . length = = 2 ) {
es - > enc_ctx_num = SVAL ( param_out . data , 0 ) ;
}
data_blob_free ( & blob_send ) ;
status = make_cli_gss_blob ( es , servicename , fqdn , status , blob_recv , & blob_send ) ;
} while ( NT_STATUS_EQUAL ( status , NT_STATUS_MORE_PROCESSING_REQUIRED ) ) ;
data_blob_free ( & blob_recv ) ;
if ( NT_STATUS_IS_OK ( status ) ) {
/* Replace the old state, if any. */
if ( cli - > trans_enc_state ) {
common_free_encryption_state ( & cli - > trans_enc_state ) ;
}
cli - > trans_enc_state = es ;
cli - > trans_enc_state - > enc_on = True ;
es = NULL ;
}
fail :
common_free_encryption_state ( & es ) ;
return status ;
}
2007-04-19 04:51:18 +04:00
# else
NTSTATUS cli_gss_smb_encryption_start ( struct cli_state * cli )
{
return NT_STATUS_NOT_SUPPORTED ;
}
2007-04-18 04:34:10 +04:00
# endif