mirror of
https://github.com/samba-team/samba.git
synced 2025-01-08 21:18:16 +03:00
libcli/auth: split out netlogon_creds_cli_check_transport()
This will make it easier to implement netr_ServerAuthenticateKerberos() later... BUG: https://bugzilla.samba.org/show_bug.cgi?id=15425 Signed-off-by: Stefan Metzmacher <metze@samba.org> Reviewed-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
This commit is contained in:
parent
8edbdd65ef
commit
7a5ad9f64a
@ -1216,6 +1216,49 @@ NTSTATUS netlogon_creds_cli_lck(
|
|||||||
return status;
|
return status;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static NTSTATUS netlogon_creds_cli_check_transport(
|
||||||
|
enum dcerpc_AuthType auth_type,
|
||||||
|
enum dcerpc_AuthLevel auth_level,
|
||||||
|
const struct netlogon_creds_CredentialState *creds,
|
||||||
|
enum dcerpc_AuthLevel min_auth_level)
|
||||||
|
{
|
||||||
|
if (auth_level < min_auth_level) {
|
||||||
|
return NT_STATUS_INVALID_PARAMETER_MIX;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (creds == NULL) {
|
||||||
|
return NT_STATUS_INVALID_PARAMETER_MIX;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (auth_type == DCERPC_AUTH_TYPE_SCHANNEL) {
|
||||||
|
switch (auth_level) {
|
||||||
|
case DCERPC_AUTH_LEVEL_INTEGRITY:
|
||||||
|
case DCERPC_AUTH_LEVEL_PRIVACY:
|
||||||
|
return NT_STATUS_OK;
|
||||||
|
default:
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
|
return NT_STATUS_INVALID_PARAMETER_MIX;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (creds->negotiate_flags & NETLOGON_NEG_AUTHENTICATED_RPC) {
|
||||||
|
/*
|
||||||
|
* if DCERPC_AUTH_TYPE_SCHANNEL is supported
|
||||||
|
* it should be used, which means
|
||||||
|
* we had a chance to verify no downgrade
|
||||||
|
* happened.
|
||||||
|
*
|
||||||
|
* This relies on netlogon_creds_cli_check*
|
||||||
|
* being called before, as first request after
|
||||||
|
* the DCERPC bind.
|
||||||
|
*/
|
||||||
|
return NT_STATUS_INVALID_PARAMETER_MIX;
|
||||||
|
}
|
||||||
|
|
||||||
|
return NT_STATUS_OK;
|
||||||
|
}
|
||||||
|
|
||||||
struct netlogon_creds_cli_auth_state {
|
struct netlogon_creds_cli_auth_state {
|
||||||
struct tevent_context *ev;
|
struct tevent_context *ev;
|
||||||
struct netlogon_creds_cli_context *context;
|
struct netlogon_creds_cli_context *context;
|
||||||
@ -1707,17 +1750,11 @@ struct tevent_req *netlogon_creds_cli_check_send(TALLOC_CTX *mem_ctx,
|
|||||||
&state->auth_type,
|
&state->auth_type,
|
||||||
&state->auth_level);
|
&state->auth_level);
|
||||||
|
|
||||||
if (state->auth_type != DCERPC_AUTH_TYPE_SCHANNEL) {
|
status = netlogon_creds_cli_check_transport(state->auth_type,
|
||||||
tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER_MIX);
|
state->auth_level,
|
||||||
return tevent_req_post(req, ev);
|
state->creds,
|
||||||
}
|
DCERPC_AUTH_LEVEL_INTEGRITY);
|
||||||
|
if (tevent_req_nterror(req, status)) {
|
||||||
switch (state->auth_level) {
|
|
||||||
case DCERPC_AUTH_LEVEL_INTEGRITY:
|
|
||||||
case DCERPC_AUTH_LEVEL_PRIVACY:
|
|
||||||
break;
|
|
||||||
default:
|
|
||||||
tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER_MIX);
|
|
||||||
return tevent_req_post(req, ev);
|
return tevent_req_post(req, ev);
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -2305,32 +2342,12 @@ static void netlogon_creds_cli_ServerPasswordSet_locked(struct tevent_req *subre
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (state->auth_type == DCERPC_AUTH_TYPE_SCHANNEL) {
|
status = netlogon_creds_cli_check_transport(state->auth_type,
|
||||||
switch (state->auth_level) {
|
state->auth_level,
|
||||||
case DCERPC_AUTH_LEVEL_INTEGRITY:
|
state->creds,
|
||||||
case DCERPC_AUTH_LEVEL_PRIVACY:
|
DCERPC_AUTH_LEVEL_NONE);
|
||||||
break;
|
if (tevent_req_nterror(req, status)) {
|
||||||
default:
|
return;
|
||||||
tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER_MIX);
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
uint32_t tmp = state->creds->negotiate_flags;
|
|
||||||
|
|
||||||
if (tmp & NETLOGON_NEG_AUTHENTICATED_RPC) {
|
|
||||||
/*
|
|
||||||
* if DCERPC_AUTH_TYPE_SCHANNEL is supported
|
|
||||||
* it should be used, which means
|
|
||||||
* we had a chance to verify no downgrade
|
|
||||||
* happened.
|
|
||||||
*
|
|
||||||
* This relies on netlogon_creds_cli_check*
|
|
||||||
* being called before, as first request after
|
|
||||||
* the DCERPC bind.
|
|
||||||
*/
|
|
||||||
tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER_MIX);
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
state->old_timeout = dcerpc_binding_handle_set_timeout(
|
state->old_timeout = dcerpc_binding_handle_set_timeout(
|
||||||
@ -3196,32 +3213,12 @@ static void netlogon_creds_cli_DsrUpdateReadOnlyServerDnsRecords_locked(struct t
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (state->auth_type == DCERPC_AUTH_TYPE_SCHANNEL) {
|
status = netlogon_creds_cli_check_transport(state->auth_type,
|
||||||
switch (state->auth_level) {
|
state->auth_level,
|
||||||
case DCERPC_AUTH_LEVEL_INTEGRITY:
|
state->creds,
|
||||||
case DCERPC_AUTH_LEVEL_PRIVACY:
|
DCERPC_AUTH_LEVEL_NONE);
|
||||||
break;
|
if (tevent_req_nterror(req, status)) {
|
||||||
default:
|
return;
|
||||||
tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER_MIX);
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
uint32_t tmp = state->creds->negotiate_flags;
|
|
||||||
|
|
||||||
if (tmp & NETLOGON_NEG_AUTHENTICATED_RPC) {
|
|
||||||
/*
|
|
||||||
* if DCERPC_AUTH_TYPE_SCHANNEL is supported
|
|
||||||
* it should be used, which means
|
|
||||||
* we had a chance to verify no downgrade
|
|
||||||
* happened.
|
|
||||||
*
|
|
||||||
* This relies on netlogon_creds_cli_check*
|
|
||||||
* being called before, as first request after
|
|
||||||
* the DCERPC bind.
|
|
||||||
*/
|
|
||||||
tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER_MIX);
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
@ -3465,16 +3462,11 @@ static void netlogon_creds_cli_ServerGetTrustInfo_locked(struct tevent_req *subr
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (state->auth_type == DCERPC_AUTH_TYPE_SCHANNEL) {
|
status = netlogon_creds_cli_check_transport(state->auth_type,
|
||||||
switch (state->auth_level) {
|
state->auth_level,
|
||||||
case DCERPC_AUTH_LEVEL_PRIVACY:
|
state->creds,
|
||||||
break;
|
DCERPC_AUTH_LEVEL_PRIVACY);
|
||||||
default:
|
if (tevent_req_nterror(req, status)) {
|
||||||
tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER_MIX);
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER_MIX);
|
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user