mirror of
https://github.com/samba-team/samba.git
synced 2025-03-27 22:50:26 +03:00
s3-auth rename auth_ntlmssp_prepare() -> auth_generic_prepare()
This function handles more than NTLMSSP now, at least when we are an AD DC and so changing the name may avoid some confusion in the future. Andrew Bartlett Signed-off-by: Stefan Metzmacher <metze@samba.org>
This commit is contained in:
parent
6391fff9da
commit
1100f6eca5
@ -210,7 +210,7 @@ static NTSTATUS auth_ntlmssp_check_password(struct ntlmssp_state *ntlmssp_state,
|
||||
return nt_status;
|
||||
}
|
||||
|
||||
NTSTATUS auth_ntlmssp_prepare(const struct tsocket_address *remote_address,
|
||||
NTSTATUS auth_generic_prepare(const struct tsocket_address *remote_address,
|
||||
struct auth_generic_state **auth_ntlmssp_state)
|
||||
{
|
||||
struct auth_context *auth_context;
|
||||
@ -414,7 +414,7 @@ NTSTATUS auth_generic_authtype_start(struct auth_generic_state *auth_ntlmssp_sta
|
||||
|
||||
if (auth_type != DCERPC_AUTH_TYPE_NTLMSSP) {
|
||||
/* The caller will then free the auth_ntlmssp_state,
|
||||
* undoing what was done in auth_ntlmssp_prepare().
|
||||
* undoing what was done in auth_generic_prepare().
|
||||
*
|
||||
* We can't do that logic here, as
|
||||
* auth_ntlmssp_want_feature() may have been called in
|
||||
|
@ -69,7 +69,7 @@ NTSTATUS auth_netlogond_init(void);
|
||||
|
||||
/* The following definitions come from auth/auth_ntlmssp.c */
|
||||
|
||||
NTSTATUS auth_ntlmssp_prepare(const struct tsocket_address *remote_address,
|
||||
NTSTATUS auth_generic_prepare(const struct tsocket_address *remote_address,
|
||||
struct auth_generic_state **auth_ntlmssp_state);
|
||||
NTSTATUS auth_ntlmssp_start(struct auth_generic_state *auth_ntlmssp_state);
|
||||
NTSTATUS auth_generic_start(struct auth_generic_state *auth_ntlmssp_state, const char *oid);
|
||||
|
@ -38,9 +38,9 @@ NTSTATUS ntlmssp_server_auth_start(TALLOC_CTX *mem_ctx,
|
||||
struct auth_generic_state *a = NULL;
|
||||
NTSTATUS status;
|
||||
|
||||
status = auth_ntlmssp_prepare(remote_address, &a);
|
||||
status = auth_generic_prepare(remote_address, &a);
|
||||
if (!NT_STATUS_IS_OK(status)) {
|
||||
DEBUG(0, (__location__ ": auth_ntlmssp_prepare failed: %s\n",
|
||||
DEBUG(0, (__location__ ": auth_generic_prepare failed: %s\n",
|
||||
nt_errstr(status)));
|
||||
return status;
|
||||
}
|
||||
|
@ -204,7 +204,7 @@ DATA_BLOB negprot_spnego(TALLOC_CTX *ctx, struct smbd_server_connection *sconn)
|
||||
sconn->use_gensec_hook = false;
|
||||
|
||||
/* See if we can get an SPNEGO blob out of the gensec hook (if auth_samba4 is loaded) */
|
||||
status = auth_ntlmssp_prepare(sconn->remote_address,
|
||||
status = auth_generic_prepare(sconn->remote_address,
|
||||
&auth_ntlmssp_state);
|
||||
if (NT_STATUS_IS_OK(status)) {
|
||||
status = auth_generic_start(auth_ntlmssp_state, GENSEC_OID_SPNEGO);
|
||||
|
@ -80,7 +80,7 @@ static NTSTATUS make_auth_ntlmssp(const struct tsocket_address *remote_address,
|
||||
struct smb_trans_enc_state *es)
|
||||
{
|
||||
struct auth_generic_state *auth_ntlmssp_state;
|
||||
NTSTATUS status = auth_ntlmssp_prepare(remote_address,
|
||||
NTSTATUS status = auth_generic_prepare(remote_address,
|
||||
&auth_ntlmssp_state);
|
||||
if (!NT_STATUS_IS_OK(status)) {
|
||||
return nt_status_squash(status);
|
||||
|
@ -625,7 +625,7 @@ static void reply_spnego_negotiate(struct smb_request *req,
|
||||
return;
|
||||
}
|
||||
|
||||
status = auth_ntlmssp_prepare(sconn->remote_address,
|
||||
status = auth_generic_prepare(sconn->remote_address,
|
||||
auth_ntlmssp_state);
|
||||
if (!NT_STATUS_IS_OK(status)) {
|
||||
/* Kill the intermediate vuid */
|
||||
@ -737,7 +737,7 @@ static void reply_spnego_auth(struct smb_request *req,
|
||||
data_blob_free(&secblob);
|
||||
|
||||
if (!*auth_ntlmssp_state) {
|
||||
status = auth_ntlmssp_prepare(sconn->remote_address,
|
||||
status = auth_generic_prepare(sconn->remote_address,
|
||||
auth_ntlmssp_state);
|
||||
if (!NT_STATUS_IS_OK(status)) {
|
||||
/* Kill the intermediate vuid */
|
||||
@ -1145,7 +1145,7 @@ static void reply_sesssetup_and_X_spnego(struct smb_request *req)
|
||||
DATA_BLOB chal;
|
||||
|
||||
if (!vuser->auth_ntlmssp_state) {
|
||||
status = auth_ntlmssp_prepare(sconn->remote_address,
|
||||
status = auth_generic_prepare(sconn->remote_address,
|
||||
&vuser->auth_ntlmssp_state);
|
||||
if (!NT_STATUS_IS_OK(status)) {
|
||||
/* Kill the intermediate vuid */
|
||||
|
@ -375,7 +375,7 @@ static NTSTATUS smbd_smb2_spnego_negotiate(struct smbd_smb2_session *session,
|
||||
status = NT_STATUS_MORE_PROCESSING_REQUIRED;
|
||||
} else {
|
||||
/* Fall back to NTLMSSP. */
|
||||
status = auth_ntlmssp_prepare(session->sconn->remote_address,
|
||||
status = auth_generic_prepare(session->sconn->remote_address,
|
||||
&session->auth_ntlmssp_state);
|
||||
if (!NT_STATUS_IS_OK(status)) {
|
||||
goto out;
|
||||
@ -564,7 +564,7 @@ static NTSTATUS smbd_smb2_spnego_auth(struct smbd_smb2_session *session,
|
||||
}
|
||||
|
||||
if (session->auth_ntlmssp_state == NULL) {
|
||||
status = auth_ntlmssp_prepare(session->sconn->remote_address,
|
||||
status = auth_generic_prepare(session->sconn->remote_address,
|
||||
&session->auth_ntlmssp_state);
|
||||
if (!NT_STATUS_IS_OK(status)) {
|
||||
data_blob_free(&auth);
|
||||
@ -641,7 +641,7 @@ static NTSTATUS smbd_smb2_raw_ntlmssp_auth(struct smbd_smb2_session *session,
|
||||
*out_security_buffer = data_blob_null;
|
||||
|
||||
if (session->auth_ntlmssp_state == NULL) {
|
||||
status = auth_ntlmssp_prepare(session->sconn->remote_address,
|
||||
status = auth_generic_prepare(session->sconn->remote_address,
|
||||
&session->auth_ntlmssp_state);
|
||||
if (!NT_STATUS_IS_OK(status)) {
|
||||
TALLOC_FREE(session);
|
||||
|
Loading…
x
Reference in New Issue
Block a user