1
0
mirror of https://github.com/samba-team/samba.git synced 2024-12-23 17:34:34 +03:00
samba-mirror/source3/include/auth.h
Andrew Bartlett deabae191b s3:auth Rename user_info->client_domain -> user_info->client.domain_name
This is closer to the structure I want for a common struct
auth_usersupplied_info.

Andrew Bartlett
2010-06-07 23:34:28 +10:00

163 lines
4.9 KiB
C

#ifndef _SMBAUTH_H_
#define _SMBAUTH_H_
/*
Unix SMB/CIFS implementation.
Standardised Authentication types
Copyright (C) Andrew Bartlett 2001
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
struct auth_usersupplied_info {
DATA_BLOB lm_resp;
DATA_BLOB nt_resp;
DATA_BLOB lm_interactive_pwd;
DATA_BLOB nt_interactive_pwd;
DATA_BLOB plaintext_password;
bool encrypted;
struct {
char *account_name; /* username before/after mapping */
char *domain_name; /* username before/after mapping */
} client, mapped;
bool was_mapped; /* Did the username map actually match? */
char *domain; /* domain name after mapping */
char *internal_username; /* username after mapping */
const char *workstation_name; /* workstation name (netbios calling
* name) unicode string */
uint32 logon_parameters;
};
struct extra_auth_info {
struct dom_sid user_sid;
struct dom_sid pgid_sid;
};
struct auth_serversupplied_info {
bool guest;
bool system;
struct unix_user_token utok;
/* NT group information taken from the info3 structure */
NT_USER_TOKEN *ptok;
/* This is the final session key, as used by SMB signing, and
* (truncated to 16 bytes) encryption on the SAMR and LSA pipes
* when over ncacn_np.
* It is calculated by NTLMSSP from the session key in the info3,
* and is set from the Kerberos session key using
* krb5_auth_con_getremotesubkey().
*
* Bootom line, it is not the same as the session keys in info3.
*/
DATA_BLOB user_session_key;
DATA_BLOB lm_session_key;
struct netr_SamInfo3 *info3;
/* this structure is filled *only* in pathological cases where the user
* sid or the primary group sid are not sids of the domain. Normally
* this happens only for unix accounts that have unix domain sids.
* This is checked only when info3.rid and/or info3.primary_gid are set
* to the special invalid value of 0xFFFFFFFF */
struct extra_auth_info extra;
void *pam_handle;
/*
* This is a token from /etc/passwd and /etc/group
*/
bool nss_token;
char *unix_name;
/*
* For performance reasons we keep an alpha_strcpy-sanitized version
* of the username around as long as the global variable current_user
* still exists. If we did not do keep this, we'd have to call
* alpha_strcpy whenever we do a become_user(), potentially on every
* smb request. See set_current_user_info.
*/
char *sanitized_username;
};
struct auth_context {
DATA_BLOB challenge;
/* Who set this up in the first place? */
const char *challenge_set_by;
bool challenge_may_be_modified;
struct auth_methods *challenge_set_method;
/* What order are the various methods in? Try to stop it changing under us */
struct auth_methods *auth_method_list;
NTSTATUS (*get_ntlm_challenge)(struct auth_context *auth_context,
uint8_t chal[8]);
NTSTATUS (*check_ntlm_password)(const struct auth_context *auth_context,
const struct auth_usersupplied_info *user_info,
struct auth_serversupplied_info **server_info);
NTSTATUS (*nt_status_squash)(NTSTATUS nt_status);
void (*free)(struct auth_context **auth_context);
};
typedef struct auth_methods
{
struct auth_methods *prev, *next;
const char *name; /* What name got this module */
NTSTATUS (*auth)(const struct auth_context *auth_context,
void *my_private_data,
TALLOC_CTX *mem_ctx,
const struct auth_usersupplied_info *user_info,
struct auth_serversupplied_info **server_info);
/* If you are using this interface, then you are probably
* getting something wrong. This interface is only for
* security=server, and makes a number of compromises to allow
* that. It is not compatible with being a PDC. */
DATA_BLOB (*get_chal)(const struct auth_context *auth_context,
void **my_private_data,
TALLOC_CTX *mem_ctx);
/* Used to keep tabs on things like the cli for SMB server authentication */
void *private_data;
} auth_methods;
typedef NTSTATUS (*auth_init_function)(struct auth_context *, const char *, struct auth_methods **);
struct auth_init_function_entry {
const char *name;
/* Function to create a member of the authmethods list */
auth_init_function init;
struct auth_init_function_entry *prev, *next;
};
struct auth_ntlmssp_state;
/* Changed from 1 -> 2 to add the logon_parameters field. */
#define AUTH_INTERFACE_VERSION 2
#endif /* _SMBAUTH_H_ */