diff options
Diffstat (limited to 'libcli')
-rw-r--r-- | libcli/auth/smbencrypt.c | 144 | ||||
-rw-r--r-- | libcli/auth/spnego.h | 70 | ||||
-rw-r--r-- | libcli/auth/spnego_parse.c | 408 | ||||
-rw-r--r-- | libcli/auth/spnego_proto.h | 28 | ||||
-rw-r--r-- | libcli/security/security_descriptor.c | 2 | ||||
-rw-r--r-- | libcli/security/security_descriptor.h | 3 | ||||
-rw-r--r-- | libcli/util/doserr.c | 2 | ||||
-rw-r--r-- | libcli/util/ntstatus.h | 6 | ||||
-rw-r--r-- | libcli/util/werror.h | 283 |
9 files changed, 729 insertions, 217 deletions
diff --git a/libcli/auth/smbencrypt.c b/libcli/auth/smbencrypt.c index eaa1b6f050..a3182cd806 100644 --- a/libcli/auth/smbencrypt.c +++ b/libcli/auth/smbencrypt.c @@ -1,4 +1,4 @@ -/* +/* Unix SMB/CIFS implementation. SMB parameters and setup Copyright (C) Andrew Tridgell 1992-1998 @@ -6,17 +6,17 @@ Copyright (C) Jeremy Allison 1995-2000. Copyright (C) Luke Kennethc Casson Leighton 1996-2000. Copyright (C) Andrew Bartlett <abartlet@samba.org> 2002-2003 - + This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 3 of the License, or (at your option) any later version. - + This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. - + You should have received a copy of the GNU General Public License along with this program. If not, see <http://www.gnu.org/licenses/>. */ @@ -47,8 +47,8 @@ void SMBencrypt_hash(const uint8_t lm_hash[16], const uint8_t *c8, uint8_t p24[2 /* This implements the X/Open SMB password encryption - It takes a password ('unix' string), a 8 byte "crypt key" - and puts 24 bytes of encrypted password into p24 + It takes a password ('unix' string), a 8 byte "crypt key" + and puts 24 bytes of encrypted password into p24 Returns False if password must have been truncated to create LM hash */ @@ -58,7 +58,7 @@ bool SMBencrypt(const char *passwd, const uint8_t *c8, uint8_t p24[24]) bool ret; uint8_t lm_hash[16]; - ret = E_deshash(passwd, lm_hash); + ret = E_deshash(passwd, lm_hash); SMBencrypt_hash(lm_hash, c8, p24); return ret; } @@ -68,7 +68,7 @@ bool SMBencrypt(const char *passwd, const uint8_t *c8, uint8_t p24[24]) * @param passwd password in 'unix' charset. * @param p16 return password hashed with md4, caller allocated 16 byte buffer */ - + bool E_md4hash(const char *passwd, uint8_t p16[16]) { size_t len; @@ -82,7 +82,7 @@ bool E_md4hash(const char *passwd, uint8_t p16[16]) mdfour(p16, (const uint8_t *)passwd, strlen(passwd)); return false; } - + len -= 2; mdfour(p16, (const uint8_t *)wpwd, len); @@ -101,7 +101,7 @@ void E_md5hash(const uint8_t salt[16], const uint8_t nthash[16], uint8_t hash_ou { struct MD5Context tctx; uint8_t array[32]; - + memset(hash_out, '\0', 16); memcpy(array, salt, 16); memcpy(&array[16], nthash, 16); @@ -117,7 +117,7 @@ void E_md5hash(const uint8_t salt[16], const uint8_t nthash[16], uint8_t hash_ou * @return false if password was > 14 characters, and therefore may be incorrect, otherwise true * @note p16 is filled in regardless */ - + bool E_deshash(const char *passwd, uint8_t p16[16]) { bool ret = true; @@ -134,19 +134,19 @@ bool E_deshash(const char *passwd, uint8_t p16[16]) ret = false; } - ZERO_STRUCT(dospwd); + ZERO_STRUCT(dospwd); return ret; } /** - * Creates the MD4 and DES (LM) Hash of the users password. + * Creates the MD4 and DES (LM) Hash of the users password. * MD4 is of the NT Unicode, DES is of the DOS UPPERCASE password. * @param passwd password in 'unix' charset. * @param nt_p16 return password hashed with md4, caller allocated 16 byte buffer * @param p16 return password hashed with des, caller allocated 16 byte buffer */ - + /* Does both the NT and LM owfs of a user's password */ void nt_lm_owf_gen(const char *pwd, uint8_t nt_p16[16], uint8_t p16[16]) { @@ -176,13 +176,13 @@ bool ntv2_owf_gen(const uint8_t owf[16], uint8_t kr_buf[16]) { smb_ucs2_t *user; - smb_ucs2_t *domain; + smb_ucs2_t *domain; size_t user_byte_len; size_t domain_byte_len; bool ret; HMACMD5Context ctx; - TALLOC_CTX *mem_ctx = talloc_init("ntv2_owf_gen for %s\\%s", domain_in, user_in); + TALLOC_CTX *mem_ctx = talloc_init("ntv2_owf_gen for %s\\%s", domain_in, user_in); if (!mem_ctx) { return false; @@ -230,7 +230,7 @@ bool ntv2_owf_gen(const uint8_t owf[16], /* We don't want null termination */ user_byte_len = user_byte_len - 2; domain_byte_len = domain_byte_len - 2; - + hmac_md5_init_limK_to_64(owf, 16, &ctx); hmac_md5_update((uint8_t *)user, user_byte_len, &ctx); hmac_md5_update((uint8_t *)domain, domain_byte_len, &ctx); @@ -254,17 +254,17 @@ void SMBOWFencrypt(const uint8_t passwd[16], const uint8_t *c8, uint8_t p24[24]) uint8_t p21[21]; ZERO_STRUCT(p21); - - memcpy(p21, passwd, 16); + + memcpy(p21, passwd, 16); E_P24(p21, c8, p24); } /* Does the des encryption. */ - + void SMBNTencrypt_hash(const uint8_t nt_hash[16], uint8_t *c8, uint8_t *p24) { uint8_t p21[21]; - + memset(p21,'\0',21); memcpy(p21, nt_hash, 16); SMBOWFencrypt(p21, c8, p24); @@ -282,7 +282,7 @@ void SMBNTencrypt_hash(const uint8_t nt_hash[16], uint8_t *c8, uint8_t *p24) void SMBNTencrypt(const char *passwd, uint8_t *c8, uint8_t *p24) { uint8_t nt_hash[16]; - E_md4hash(passwd, nt_hash); + E_md4hash(passwd, nt_hash); SMBNTencrypt_hash(nt_hash, c8, p24); } @@ -312,7 +312,7 @@ void SMBsesskeygen_ntv2(const uint8_t kr[16], const uint8_t * nt_resp, uint8_t sess_key[16]) { /* a very nice, 128 bit, variable session key */ - + HMACMD5Context ctx; hmac_md5_init_limK_to_64(kr, 16, &ctx); @@ -327,9 +327,9 @@ void SMBsesskeygen_ntv2(const uint8_t kr[16], void SMBsesskeygen_ntv1(const uint8_t kr[16], uint8_t sess_key[16]) { - /* yes, this session key does not change - yes, this + /* yes, this session key does not change - yes, this is a problem - but it is 128 bits */ - + mdfour((uint8_t *)sess_key, kr, 16); #ifdef DEBUG_PASSWORD @@ -339,15 +339,15 @@ void SMBsesskeygen_ntv1(const uint8_t kr[16], uint8_t sess_key[16]) } void SMBsesskeygen_lm_sess_key(const uint8_t lm_hash[16], - const uint8_t lm_resp[24], /* only uses 8 */ + const uint8_t lm_resp[24], /* only uses 8 */ uint8_t sess_key[16]) { /* Calculate the LM session key (effective length 40 bits, but changes with each session) */ uint8_t p24[24]; uint8_t partial_lm_hash[14]; - - memcpy(partial_lm_hash, lm_hash, 8); + + memcpy(partial_lm_hash, lm_hash, 8); memset(partial_lm_hash + 8, 0xbd, 6); des_crypt56(p24, lm_resp, partial_lm_hash, 1); @@ -361,21 +361,21 @@ void SMBsesskeygen_lm_sess_key(const uint8_t lm_hash[16], #endif } -DATA_BLOB NTLMv2_generate_names_blob(TALLOC_CTX *mem_ctx, - const char *hostname, +DATA_BLOB NTLMv2_generate_names_blob(TALLOC_CTX *mem_ctx, + const char *hostname, const char *domain) { DATA_BLOB names_blob = data_blob_talloc(mem_ctx, NULL, 0); - - msrpc_gen(mem_ctx, &names_blob, - "aaa", + + msrpc_gen(mem_ctx, &names_blob, + "aaa", MsvAvNbDomainName, domain, MsvAvNbComputerName, hostname, MsvAvEOL, ""); return names_blob; } -static DATA_BLOB NTLMv2_generate_client_data(TALLOC_CTX *mem_ctx, const DATA_BLOB *names_blob) +static DATA_BLOB NTLMv2_generate_client_data(TALLOC_CTX *mem_ctx, const DATA_BLOB *names_blob) { uint8_t client_chal[8]; DATA_BLOB response = data_blob(NULL, 0); @@ -390,7 +390,7 @@ static DATA_BLOB NTLMv2_generate_client_data(TALLOC_CTX *mem_ctx, const DATA_BLO /* See http://www.ubiqx.org/cifs/SMB.html#SMB.8.5 */ - msrpc_gen(mem_ctx, &response, "ddbbdb", + msrpc_gen(mem_ctx, &response, "ddbbdb", 0x00000101, /* Header */ 0, /* 'Reserved' */ long_date, 8, /* Timestamp */ @@ -401,7 +401,7 @@ static DATA_BLOB NTLMv2_generate_client_data(TALLOC_CTX *mem_ctx, const DATA_BLO return response; } -static DATA_BLOB NTLMv2_generate_response(TALLOC_CTX *out_mem_ctx, +static DATA_BLOB NTLMv2_generate_response(TALLOC_CTX *out_mem_ctx, const uint8_t ntlm_v2_hash[16], const DATA_BLOB *server_chal, const DATA_BLOB *names_blob) @@ -409,14 +409,14 @@ static DATA_BLOB NTLMv2_generate_response(TALLOC_CTX *out_mem_ctx, uint8_t ntlmv2_response[16]; DATA_BLOB ntlmv2_client_data; DATA_BLOB final_response; - - TALLOC_CTX *mem_ctx = talloc_named(out_mem_ctx, 0, + + TALLOC_CTX *mem_ctx = talloc_named(out_mem_ctx, 0, "NTLMv2_generate_response internal context"); if (!mem_ctx) { return data_blob(NULL, 0); } - + /* NTLMv2 */ /* generate some data to pass into the response function - including the hostname and domain name of the server */ @@ -424,12 +424,12 @@ static DATA_BLOB NTLMv2_generate_response(TALLOC_CTX *out_mem_ctx, /* Given that data, and the challenge from the server, generate a response */ SMBOWFencrypt_ntv2(ntlm_v2_hash, server_chal, &ntlmv2_client_data, ntlmv2_response); - + final_response = data_blob_talloc(out_mem_ctx, NULL, sizeof(ntlmv2_response) + ntlmv2_client_data.length); memcpy(final_response.data, ntlmv2_response, sizeof(ntlmv2_response)); - memcpy(final_response.data+sizeof(ntlmv2_response), + memcpy(final_response.data+sizeof(ntlmv2_response), ntlmv2_client_data.data, ntlmv2_client_data.length); talloc_free(mem_ctx); @@ -437,25 +437,25 @@ static DATA_BLOB NTLMv2_generate_response(TALLOC_CTX *out_mem_ctx, return final_response; } -static DATA_BLOB LMv2_generate_response(TALLOC_CTX *mem_ctx, +static DATA_BLOB LMv2_generate_response(TALLOC_CTX *mem_ctx, const uint8_t ntlm_v2_hash[16], const DATA_BLOB *server_chal) { uint8_t lmv2_response[16]; DATA_BLOB lmv2_client_data = data_blob_talloc(mem_ctx, NULL, 8); DATA_BLOB final_response = data_blob_talloc(mem_ctx, NULL,24); - + /* LMv2 */ /* client-supplied random data */ - generate_random_buffer(lmv2_client_data.data, lmv2_client_data.length); + generate_random_buffer(lmv2_client_data.data, lmv2_client_data.length); /* Given that data, and the challenge from the server, generate a response */ SMBOWFencrypt_ntv2(ntlm_v2_hash, server_chal, &lmv2_client_data, lmv2_response); memcpy(final_response.data, lmv2_response, sizeof(lmv2_response)); - /* after the first 16 bytes is the random data we generated above, + /* after the first 16 bytes is the random data we generated above, so the server can verify us with it */ - memcpy(final_response.data+sizeof(lmv2_response), + memcpy(final_response.data+sizeof(lmv2_response), lmv2_client_data.data, lmv2_client_data.length); data_blob_free(&lmv2_client_data); @@ -463,12 +463,12 @@ static DATA_BLOB LMv2_generate_response(TALLOC_CTX *mem_ctx, return final_response; } -bool SMBNTLMv2encrypt_hash(TALLOC_CTX *mem_ctx, +bool SMBNTLMv2encrypt_hash(TALLOC_CTX *mem_ctx, const char *user, const char *domain, const uint8_t nt_hash[16], - const DATA_BLOB *server_chal, + const DATA_BLOB *server_chal, const DATA_BLOB *names_blob, - DATA_BLOB *lm_response, DATA_BLOB *nt_response, - DATA_BLOB *lm_session_key, DATA_BLOB *user_session_key) + DATA_BLOB *lm_response, DATA_BLOB *nt_response, + DATA_BLOB *lm_session_key, DATA_BLOB *user_session_key) { uint8_t ntlm_v2_hash[16]; @@ -479,49 +479,49 @@ bool SMBNTLMv2encrypt_hash(TALLOC_CTX *mem_ctx, if (!ntv2_owf_gen(nt_hash, user, domain, true, ntlm_v2_hash)) { return false; } - + if (nt_response) { - *nt_response = NTLMv2_generate_response(mem_ctx, + *nt_response = NTLMv2_generate_response(mem_ctx, ntlm_v2_hash, server_chal, - names_blob); + names_blob); if (user_session_key) { *user_session_key = data_blob_talloc(mem_ctx, NULL, 16); - + /* The NTLMv2 calculations also provide a session key, for signing etc later */ /* use only the first 16 bytes of nt_response for session key */ SMBsesskeygen_ntv2(ntlm_v2_hash, nt_response->data, user_session_key->data); } } - + /* LMv2 */ - + if (lm_response) { - *lm_response = LMv2_generate_response(mem_ctx, + *lm_response = LMv2_generate_response(mem_ctx, ntlm_v2_hash, server_chal); if (lm_session_key) { *lm_session_key = data_blob_talloc(mem_ctx, NULL, 16); - + /* The NTLMv2 calculations also provide a session key, for signing etc later */ /* use only the first 16 bytes of lm_response for session key */ SMBsesskeygen_ntv2(ntlm_v2_hash, lm_response->data, lm_session_key->data); } } - + return true; } -bool SMBNTLMv2encrypt(TALLOC_CTX *mem_ctx, - const char *user, const char *domain, - const char *password, - const DATA_BLOB *server_chal, +bool SMBNTLMv2encrypt(TALLOC_CTX *mem_ctx, + const char *user, const char *domain, + const char *password, + const DATA_BLOB *server_chal, const DATA_BLOB *names_blob, - DATA_BLOB *lm_response, DATA_BLOB *nt_response, - DATA_BLOB *lm_session_key, DATA_BLOB *user_session_key) + DATA_BLOB *lm_response, DATA_BLOB *nt_response, + DATA_BLOB *lm_session_key, DATA_BLOB *user_session_key) { uint8_t nt_hash[16]; E_md4hash(password, nt_hash); - return SMBNTLMv2encrypt_hash(mem_ctx, + return SMBNTLMv2encrypt_hash(mem_ctx, user, domain, nt_hash, server_chal, names_blob, lm_response, nt_response, lm_session_key, user_session_key); } @@ -539,14 +539,14 @@ bool encode_pw_buffer(uint8_t buffer[516], const char *password, int string_flag string_flags |= STR_NOALIGN; new_pw_len = push_string(new_pw, - password, + password, sizeof(new_pw), string_flags); - + memcpy(&buffer[512 - new_pw_len], new_pw, new_pw_len); generate_random_buffer(buffer, 512 - new_pw_len); - /* + /* * The length of the new password is in the last 4 bytes of * the data buffer. */ @@ -596,7 +596,7 @@ bool decode_pw_buffer(TALLOC_CTX *ctx, } /* decode into the return buffer. */ - if (!convert_string_talloc(ctx, string_charset, CH_UNIX, + if (!convert_string_talloc(ctx, string_charset, CH_UNIX, &in_buffer[512 - byte_len], byte_len, (void *)pp_new_pwrd, @@ -649,7 +649,7 @@ bool set_pw_in_buffer(uint8_t buffer[516], DATA_BLOB *password) generate_random_buffer(buffer, 512 - password->length); - /* + /* * The length of the new password is in the last 4 bytes of * the data buffer. */ @@ -661,7 +661,7 @@ bool set_pw_in_buffer(uint8_t buffer[516], DATA_BLOB *password) decode a password buffer *new_pw_size is the length in bytes of the extracted unicode password ************************************************************/ -bool extract_pw_from_buffer(TALLOC_CTX *mem_ctx, +bool extract_pw_from_buffer(TALLOC_CTX *mem_ctx, uint8_t in_buffer[516], DATA_BLOB *new_pass) { int byte_len=0; diff --git a/libcli/auth/spnego.h b/libcli/auth/spnego.h new file mode 100644 index 0000000000..4b60f22d32 --- /dev/null +++ b/libcli/auth/spnego.h @@ -0,0 +1,70 @@ +/* + Unix SMB/CIFS implementation. + + RFC2478 Compliant SPNEGO implementation + + Copyright (C) Jim McDonough <jmcd@us.ibm.com> 2003 + + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 3 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + + You should have received a copy of the GNU General Public License + along with this program. If not, see <http://www.gnu.org/licenses/>. +*/ + +#define OID_SPNEGO "1.3.6.1.5.5.2" +#define OID_NTLMSSP "1.3.6.1.4.1.311.2.2.10" +#define OID_KERBEROS5_OLD "1.2.840.48018.1.2.2" +#define OID_KERBEROS5 "1.2.840.113554.1.2.2" + +#define SPNEGO_DELEG_FLAG 0x01 +#define SPNEGO_MUTUAL_FLAG 0x02 +#define SPNEGO_REPLAY_FLAG 0x04 +#define SPNEGO_SEQUENCE_FLAG 0x08 +#define SPNEGO_ANON_FLAG 0x10 +#define SPNEGO_CONF_FLAG 0x20 +#define SPNEGO_INTEG_FLAG 0x40 + +enum spnego_negResult { + SPNEGO_ACCEPT_COMPLETED = 0, + SPNEGO_ACCEPT_INCOMPLETE = 1, + SPNEGO_REJECT = 2, + SPNEGO_NONE_RESULT = 3 +}; + +struct spnego_negTokenInit { + const char **mechTypes; + DATA_BLOB reqFlags; + uint8_t reqFlagsPadding; + DATA_BLOB mechToken; + DATA_BLOB mechListMIC; + char *targetPrincipal; +}; + +struct spnego_negTokenTarg { + uint8_t negResult; + const char *supportedMech; + DATA_BLOB responseToken; + DATA_BLOB mechListMIC; +}; + +struct spnego_data { + int type; + struct spnego_negTokenInit negTokenInit; + struct spnego_negTokenTarg negTokenTarg; +}; + +enum spnego_message_type { + SPNEGO_NEG_TOKEN_INIT = 0, + SPNEGO_NEG_TOKEN_TARG = 1, +}; + +#include "../libcli/auth/spnego_proto.h" diff --git a/libcli/auth/spnego_parse.c b/libcli/auth/spnego_parse.c new file mode 100644 index 0000000000..3f7047b0e0 --- /dev/null +++ b/libcli/auth/spnego_parse.c @@ -0,0 +1,408 @@ +/* + Unix SMB/CIFS implementation. + + RFC2478 Compliant SPNEGO implementation + + Copyright (C) Jim McDonough <jmcd@us.ibm.com> 2003 + + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 3 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + + You should have received a copy of the GNU General Public License + along with this program. If not, see <http://www.gnu.org/licenses/>. +*/ + +#include "includes.h" +#include "../libcli/auth/spnego.h" +#include "../lib/util/asn1.h" + +static bool read_negTokenInit(struct asn1_data *asn1, TALLOC_CTX *mem_ctx, + struct spnego_negTokenInit *token) +{ + ZERO_STRUCTP(token); + + asn1_start_tag(asn1, ASN1_CONTEXT(0)); + asn1_start_tag(asn1, ASN1_SEQUENCE(0)); + + while (!asn1->has_error && 0 < asn1_tag_remaining(asn1)) { + int i; + uint8_t context; + if (!asn1_peek_uint8(asn1, &context)) { + asn1->has_error = true; + break; + } + + switch (context) { + /* Read mechTypes */ + case ASN1_CONTEXT(0): + asn1_start_tag(asn1, ASN1_CONTEXT(0)); + asn1_start_tag(asn1, ASN1_SEQUENCE(0)); + + token->mechTypes = talloc(NULL, const char *); + for (i = 0; !asn1->has_error && + 0 < asn1_tag_remaining(asn1); i++) { + token->mechTypes = talloc_realloc(NULL, + token->mechTypes, + const char *, i+2); + asn1_read_OID(asn1, token->mechTypes, token->mechTypes + i); + } + token->mechTypes[i] = NULL; + + asn1_end_tag(asn1); + asn1_end_tag(asn1); + break; + /* Read reqFlags */ + case ASN1_CONTEXT(1): + asn1_start_tag(asn1, ASN1_CONTEXT(1)); + asn1_read_BitString(asn1, mem_ctx, &token->reqFlags, + &token->reqFlagsPadding); + asn1_end_tag(asn1); + break; + /* Read mechToken */ + case ASN1_CONTEXT(2): + asn1_start_tag(asn1, ASN1_CONTEXT(2)); + asn1_read_OctetString(asn1, mem_ctx, &token->mechToken); + asn1_end_tag(asn1); + break; + /* Read mecListMIC */ + case ASN1_CONTEXT(3): + { + uint8_t type_peek; + asn1_start_tag(asn1, ASN1_CONTEXT(3)); + if (!asn1_peek_uint8(asn1, &type_peek)) { + asn1->has_error = true; + break; + } + if (type_peek == ASN1_OCTET_STRING) { + asn1_read_OctetString(asn1, mem_ctx, + &token->mechListMIC); + } else { + /* RFC 2478 says we have an Octet String here, + but W2k sends something different... */ + char *mechListMIC; + asn1_push_tag(asn1, ASN1_SEQUENCE(0)); + asn1_push_tag(asn1, ASN1_CONTEXT(0)); + asn1_read_GeneralString(asn1, mem_ctx, &mechListMIC); + asn1_pop_tag(asn1); + asn1_pop_tag(asn1); + + token->targetPrincipal = mechListMIC; + } + asn1_end_tag(asn1); + break; + } + default: + asn1->has_error = true; + break; + } + } + + asn1_end_tag(asn1); + asn1_end_tag(asn1); + + return !asn1->has_error; +} + +static bool write_negTokenInit(struct asn1_data *asn1, struct spnego_negTokenInit *token) +{ + asn1_push_tag(asn1, ASN1_CONTEXT(0)); + asn1_push_tag(asn1, ASN1_SEQUENCE(0)); + + /* Write mechTypes */ + if (token->mechTypes && *token->mechTypes) { + int i; + + asn1_push_tag(asn1, ASN1_CONTEXT(0)); + asn1_push_tag(asn1, ASN1_SEQUENCE(0)); + for (i = 0; token->mechTypes[i]; i++) { + asn1_write_OID(asn1, token->mechTypes[i]); + } + asn1_pop_tag(asn1); + asn1_pop_tag(asn1); + } + + /* write reqFlags */ + if (token->reqFlags.length > 0) { + asn1_push_tag(asn1, ASN1_CONTEXT(1)); + asn1_write_BitString(asn1, token->reqFlags.data, + token->reqFlags.length, + token->reqFlagsPadding); + asn1_pop_tag(asn1); + } + + /* write mechToken */ + if (token->mechToken.data) { + asn1_push_tag(asn1, ASN1_CONTEXT(2)); + asn1_write_OctetString(asn1, token->mechToken.data, + token->mechToken.length); + asn1_pop_tag(asn1); + } + + /* write mechListMIC */ + if (token->mechListMIC.data) { + asn1_push_tag(asn1, ASN1_CONTEXT(3)); +#if 0 + /* This is what RFC 2478 says ... */ + asn1_write_OctetString(asn1, token->mechListMIC.data, + token->mechListMIC.length); +#else + /* ... but unfortunately this is what Windows + sends/expects */ + asn1_push_tag(asn1, ASN1_SEQUENCE(0)); + asn1_push_tag(asn1, ASN1_CONTEXT(0)); + asn1_push_tag(asn1, ASN1_GENERAL_STRING); + asn1_write(asn1, token->mechListMIC.data, + token->mechListMIC.length); + asn1_pop_tag(asn1); + asn1_pop_tag(asn1); + asn1_pop_tag(asn1); +#endif + asn1_pop_tag(asn1); + } + + asn1_pop_tag(asn1); + asn1_pop_tag(asn1); + + return !asn1->has_error; +} + +static bool read_negTokenTarg(struct asn1_data *asn1, TALLOC_CTX *mem_ctx, + struct spnego_negTokenTarg *token) +{ + ZERO_STRUCTP(token); + + asn1_start_tag(asn1, ASN1_CONTEXT(1)); + asn1_start_tag(asn1, ASN1_SEQUENCE(0)); + + while (!asn1->has_error && 0 < asn1_tag_remaining(asn1)) { + uint8_t context; + if (!asn1_peek_uint8(asn1, &context)) { + asn1->has_error = true; + break; + } + + switch (context) { + case ASN1_CONTEXT(0): + asn1_start_tag(asn1, ASN1_CONTEXT(0)); + asn1_start_tag(asn1, ASN1_ENUMERATED); + asn1_read_uint8(asn1, &token->negResult); + asn1_end_tag(asn1); + asn1_end_tag(asn1); + break; + case ASN1_CONTEXT(1): + asn1_start_tag(asn1, ASN1_CONTEXT(1)); + asn1_read_OID(asn1, mem_ctx, &token->supportedMech); + asn1_end_tag(asn1); + break; + case ASN1_CONTEXT(2): + asn1_start_tag(asn1, ASN1_CONTEXT(2)); + asn1_read_OctetString(asn1, mem_ctx, &token->responseToken); + asn1_end_tag(asn1); + break; + case ASN1_CONTEXT(3): + asn1_start_tag(asn1, ASN1_CONTEXT(3)); + asn1_read_OctetString(asn1, mem_ctx, &token->mechListMIC); + asn1_end_tag(asn1); + break; + default: + asn1->has_error = true; + break; + } + } + + asn1_end_tag(asn1); + asn1_end_tag(asn1); + + return !asn1->has_error; +} + +static bool write_negTokenTarg(struct asn1_data *asn1, struct spnego_negTokenTarg *token) +{ + asn1_push_tag(asn1, ASN1_CONTEXT(1)); + asn1_push_tag(asn1, ASN1_SEQUENCE(0)); + + if (token->negResult != SPNEGO_NONE_RESULT) { + asn1_push_tag(asn1, ASN1_CONTEXT(0)); + asn1_write_enumerated(asn1, token->negResult); + asn1_pop_tag(asn1); + } + + if (token->supportedMech) { + asn1_push_tag(asn1, ASN1_CONTEXT(1)); + asn1_write_OID(asn1, token->supportedMech); + asn1_pop_tag(asn1); + } + + if (token->responseToken.data) { + asn1_push_tag(asn1, ASN1_CONTEXT(2)); + asn1_write_OctetString(asn1, token->responseToken.data, + token->responseToken.length); + asn1_pop_tag(asn1); + } + + if (token->mechListMIC.data) { + asn1_push_tag(asn1, ASN1_CONTEXT(3)); + asn1_write_OctetString(asn1, token->mechListMIC.data, + token->mechListMIC.length); + asn1_pop_tag(asn1); + } + + asn1_pop_tag(asn1); + asn1_pop_tag(asn1); + + return !asn1->has_error; +} + +ssize_t spnego_read_data(TALLOC_CTX *mem_ctx, DATA_BLOB data, struct spnego_data *token) +{ + struct asn1_data *asn1; + ssize_t ret = -1; + uint8_t context; + + ZERO_STRUCTP(token); + + if (data.length == 0) { + return ret; + } + + asn1 = asn1_init(mem_ctx); + if (asn1 == NULL) { + return -1; + } + + asn1_load(asn1, data); + + if (!asn1_peek_uint8(asn1, &context)) { + asn1->has_error = true; + } else { + switch (context) { + case ASN1_APPLICATION(0): + asn1_start_tag(asn1, ASN1_APPLICATION(0)); + asn1_check_OID(asn1, OID_SPNEGO); + if (read_negTokenInit(asn1, mem_ctx, &token->negTokenInit)) { + token->type = SPNEGO_NEG_TOKEN_INIT; + } + asn1_end_tag(asn1); + break; + case ASN1_CONTEXT(1): + if (read_negTokenTarg(asn1, mem_ctx, &token->negTokenTarg)) { + token->type = SPNEGO_NEG_TOKEN_TARG; + } + break; + default: + asn1->has_error = true; + break; + } + } + + if (!asn1->has_error) ret = asn1->ofs; + asn1_free(asn1); + + return ret; +} + +ssize_t spnego_write_data(TALLOC_CTX *mem_ctx, DATA_BLOB *blob, struct spnego_data *spnego) +{ + struct asn1_data *asn1 = asn1_init(mem_ctx); + ssize_t ret = -1; + + if (asn1 == NULL) { + return -1; + } + + switch (spnego->type) { + case SPNEGO_NEG_TOKEN_INIT: + asn1_push_tag(asn1, ASN1_APPLICATION(0)); + asn1_write_OID(asn1, OID_SPNEGO); + write_negTokenInit(asn1, &spnego->negTokenInit); + asn1_pop_tag(asn1); + break; + case SPNEGO_NEG_TOKEN_TARG: + write_negTokenTarg(asn1, &spnego->negTokenTarg); + break; + default: + asn1->has_error = true; + break; + } + + if (!asn1->has_error) { + *blob = data_blob_talloc(mem_ctx, asn1->data, asn1->length); + ret = asn1->ofs; + } + asn1_free(asn1); + + return ret; +} + +bool spnego_free_data(struct spnego_data *spnego) +{ + bool ret = true; + + if (!spnego) goto out; + + switch(spnego->type) { + case SPNEGO_NEG_TOKEN_INIT: + if (spnego->negTokenInit.mechTypes) { + talloc_free(spnego->negTokenInit.mechTypes); + } + data_blob_free(&spnego->negTokenInit.reqFlags); + data_blob_free(&spnego->negTokenInit.mechToken); + data_blob_free(&spnego->negTokenInit.mechListMIC); + talloc_free(spnego->negTokenInit.targetPrincipal); + break; + case SPNEGO_NEG_TOKEN_TARG: + if (spnego->negTokenTarg.supportedMech) { + talloc_free(discard_const(spnego->negTokenTarg.supportedMech)); + } + data_blob_free(&spnego->negTokenTarg.responseToken); + data_blob_free(&spnego->negTokenTarg.mechListMIC); + break; + default: + ret = false; + break; + } + ZERO_STRUCTP(spnego); +out: + return ret; +} + +bool spnego_write_mech_types(TALLOC_CTX *mem_ctx, + const char **mech_types, + DATA_BLOB *blob) +{ + struct asn1_data *asn1 = asn1_init(mem_ctx); + + /* Write mechTypes */ + if (mech_types && *mech_types) { + int i; + + asn1_push_tag(asn1, ASN1_SEQUENCE(0)); + for (i = 0; mech_types[i]; i++) { + asn1_write_OID(asn1, mech_types[i]); + } + asn1_pop_tag(asn1); + } + + if (asn1->has_error) { + asn1_free(asn1); + return false; + } + + *blob = data_blob_talloc(mem_ctx, asn1->data, asn1->length); + if (blob->length != asn1->length) { + asn1_free(asn1); + return false; + } + + asn1_free(asn1); + + return true; +} diff --git a/libcli/auth/spnego_proto.h b/libcli/auth/spnego_proto.h new file mode 100644 index 0000000000..5fd5e59c65 --- /dev/null +++ b/libcli/auth/spnego_proto.h @@ -0,0 +1,28 @@ +/* + Unix SMB/CIFS implementation. + + RFC2478 Compliant SPNEGO implementation + + Copyright (C) Jim McDonough <jmcd@us.ibm.com> 2003 + + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 3 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + + You should have received a copy of the GNU General Public License + along with this program. If not, see <http://www.gnu.org/licenses/>. +*/ + +ssize_t spnego_read_data(TALLOC_CTX *mem_ctx, DATA_BLOB data, struct spnego_data *token); +ssize_t spnego_write_data(TALLOC_CTX *mem_ctx, DATA_BLOB *blob, struct spnego_data *spnego); +bool spnego_free_data(struct spnego_data *spnego); +bool spnego_write_mech_types(TALLOC_CTX *mem_ctx, + const char **mech_types, + DATA_BLOB *blob); diff --git a/libcli/security/security_descriptor.c b/libcli/security/security_descriptor.c index f18a326e99..dbe11604fd 100644 --- a/libcli/security/security_descriptor.c +++ b/libcli/security/security_descriptor.c @@ -50,7 +50,7 @@ struct security_descriptor *security_descriptor_initialise(TALLOC_CTX *mem_ctx) return sd; } -static struct security_acl *security_acl_dup(TALLOC_CTX *mem_ctx, +struct security_acl *security_acl_dup(TALLOC_CTX *mem_ctx, const struct security_acl *oacl) { struct security_acl *nacl; diff --git a/libcli/security/security_descriptor.h b/libcli/security/security_descriptor.h index c535f5d253..a377ef59ce 100644 --- a/libcli/security/security_descriptor.h +++ b/libcli/security/security_descriptor.h @@ -61,4 +61,7 @@ struct security_ace *security_ace_create(TALLOC_CTX *mem_ctx, uint32_t access_mask, uint8_t flags); +struct security_acl *security_acl_dup(TALLOC_CTX *mem_ctx, + const struct security_acl *oacl); + #endif /* __SECURITY_DESCRIPTOR_H__ */ diff --git a/libcli/util/doserr.c b/libcli/util/doserr.c index 6af197284f..5e74138467 100644 --- a/libcli/util/doserr.c +++ b/libcli/util/doserr.c @@ -179,7 +179,6 @@ static const struct werror_code_struct dos_errs[] = { "WERR_INVALID_USER_BUFFER", WERR_INVALID_USER_BUFFER }, { "WERR_NO_TRUST_SAM_ACCOUNT", WERR_NO_TRUST_SAM_ACCOUNT }, { "WERR_INVALID_PRINTER_COMMAND", WERR_INVALID_PRINTER_COMMAND }, - { "WERR_CLASS_NOT_REGISTERED", WERR_CLASS_NOT_REGISTERED }, { "WERR_NO_SHUTDOWN_IN_PROGRESS", WERR_NO_SHUTDOWN_IN_PROGRESS }, { "WERR_SHUTDOWN_ALREADY_IN_PROGRESS", WERR_SHUTDOWN_ALREADY_IN_PROGRESS }, { "WERR_SEC_E_ENCRYPT_FAILURE", WERR_SEC_E_ENCRYPT_FAILURE }, @@ -217,6 +216,7 @@ static const struct werror_code_struct dos_errs[] = { "WERR_UNKNOWN_PRINT_MONITOR", WERR_UNKNOWN_PRINT_MONITOR }, { "WERR_PASSWORD_RESTRICTION", WERR_PASSWORD_RESTRICTION }, { "WERR_WRONG_PASSWORD", WERR_WRONG_PASSWORD }, + { "WERR_CLASS_NOT_REGISTERED", WERR_CLASS_NOT_REGISTERED }, { NULL, W_ERROR(0) } }; diff --git a/libcli/util/ntstatus.h b/libcli/util/ntstatus.h index 5ef429598e..1025f47210 100644 --- a/libcli/util/ntstatus.h +++ b/libcli/util/ntstatus.h @@ -637,8 +637,8 @@ NTSTATUS nt_status_string_to_code(const char *nt_status_str); /** Used by ntstatus_dos_equal: */ extern bool ntstatus_check_dos_mapping; -#define NT_STATUS_IS_OK(x) (NT_STATUS_V(x) == 0) -#define NT_STATUS_IS_ERR(x) ((NT_STATUS_V(x) & 0xc0000000) == 0xc0000000) +#define NT_STATUS_IS_OK(x) (likely(NT_STATUS_V(x) == 0)) +#define NT_STATUS_IS_ERR(x) (unlikely((NT_STATUS_V(x) & 0xc0000000) == 0xc0000000)) /* checking for DOS error mapping here is ugly, but unfortunately the alternative is a very intrusive rewrite of the torture code */ #if _SAMBA_BUILD_ == 4 @@ -648,7 +648,7 @@ extern bool ntstatus_check_dos_mapping; #endif #define NT_STATUS_HAVE_NO_MEMORY(x) do { \ - if (!(x)) {\ + if (unlikely(!(x))) { \ return NT_STATUS_NO_MEMORY;\ }\ } while (0) diff --git a/libcli/util/werror.h b/libcli/util/werror.h index f82879cac9..d64746b363 100644 --- a/libcli/util/werror.h +++ b/libcli/util/werror.h @@ -74,139 +74,130 @@ typedef uint32_t WERROR; /* these are win32 error codes. There are only a few places where these matter for Samba, primarily in the NT printing code */ -#define WERR_OK W_ERROR(0) -#define WERR_BADFUNC W_ERROR(1) -#define WERR_BADFILE W_ERROR(2) -#define WERR_ACCESS_DENIED W_ERROR(5) -#define WERR_BADFID W_ERROR(6) -#define WERR_NOMEM W_ERROR(8) -#define WERR_GENERAL_FAILURE W_ERROR(31) -#define WERR_NOT_SUPPORTED W_ERROR(50) -#define WERR_DUP_NAME W_ERROR(52) -#define WERR_BAD_NETPATH W_ERROR(53) -#define WERR_BAD_NET_RESP W_ERROR(58) -#define WERR_UNEXP_NET_ERR W_ERROR(59) -#define WERR_DEVICE_NOT_EXIST W_ERROR(55) -#define WERR_PRINTQ_FULL W_ERROR(61) -#define WERR_NO_SPOOL_SPACE W_ERROR(62) -#define WERR_NO_SUCH_SHARE W_ERROR(67) -#define WERR_FILE_EXISTS W_ERROR(80) -#define WERR_BAD_PASSWORD W_ERROR(86) -#define WERR_INVALID_PARAM W_ERROR(87) -#define WERR_CALL_NOT_IMPLEMENTED W_ERROR(120) -#define WERR_SEM_TIMEOUT W_ERROR(121) -#define WERR_INSUFFICIENT_BUFFER W_ERROR(122) -#define WERR_INVALID_NAME W_ERROR(123) -#define WERR_UNKNOWN_LEVEL W_ERROR(124) -#define WERR_OBJECT_PATH_INVALID W_ERROR(161) -#define WERR_ALREADY_EXISTS W_ERROR(183) -#define WERR_NO_MORE_ITEMS W_ERROR(259) -#define WERR_MORE_DATA W_ERROR(234) -#define WERR_INVALID_OWNER W_ERROR(1307) -#define WERR_IO_PENDING W_ERROR(997) -#define WERR_CAN_NOT_COMPLETE W_ERROR(1003) -#define WERR_INVALID_FLAGS W_ERROR(1004) -#define WERR_REG_CORRUPT W_ERROR(1015) -#define WERR_REG_IO_FAILURE W_ERROR(1016) -#define WERR_REG_FILE_INVALID W_ERROR(1017) -#define WERR_NO_SUCH_SERVICE W_ERROR(1060) -#define WERR_INVALID_SERVICE_CONTROL W_ERROR(1052) -#define WERR_SERVICE_ALREADY_RUNNING W_ERROR(1056) -#define WERR_SERVICE_DISABLED W_ERROR(1058) -#define WERR_SERVICE_MARKED_FOR_DELETE W_ERROR(1072) -#define WERR_SERVICE_EXISTS W_ERROR(1073) -#define WERR_SERVICE_NEVER_STARTED W_ERROR(1077) -#define WERR_DUPLICATE_SERVICE_NAME W_ERROR(1078) -#define WERR_DEVICE_NOT_CONNECTED W_ERROR(1167) -#define WERR_NOT_FOUND W_ERROR(1168) -#define WERR_INVALID_COMPUTERNAME W_ERROR(1210) -#define WERR_INVALID_DOMAINNAME W_ERROR(1212) -#define WERR_NOT_AUTHENTICATED W_ERROR(1244) -#define WERR_UNKNOWN_REVISION W_ERROR(1305) -#define WERR_MACHINE_LOCKED W_ERROR(1271) -#define WERR_REVISION_MISMATCH W_ERROR(1306) -#define WERR_INVALID_OWNER W_ERROR(1307) -#define WERR_INVALID_PRIMARY_GROUP W_ERROR(1308) -#define WERR_NO_LOGON_SERVERS W_ERROR(1311) -#define WERR_NO_SUCH_LOGON_SESSION W_ERROR(1312) -#define WERR_NO_SUCH_PRIVILEGE W_ERROR(1313) -#define WERR_PRIVILEGE_NOT_HELD W_ERROR(1314) -#define WERR_USER_ALREADY_EXISTS W_ERROR(1316) -#define WERR_NO_SUCH_USER W_ERROR(1317) -#define WERR_GROUP_EXISTS W_ERROR(1318) -#define WERR_NO_SUCH_GROUP W_ERROR(1319) -#define WERR_MEMBER_IN_GROUP W_ERROR(1320) -#define WERR_USER_NOT_IN_GROUP W_ERROR(1321) -#define WERR_WRONG_PASSWORD W_ERROR(1323) -#define WERR_PASSWORD_RESTRICTION W_ERROR(1325) -#define WERR_LOGON_FAILURE W_ERROR(1326) -#define WERR_NO_SUCH_DOMAIN W_ERROR(1355) -#define WERR_NONE_MAPPED W_ERROR(1332) -#define WERR_INVALID_SECURITY_DESCRIPTOR W_ERROR(1338) -#define WERR_INVALID_DOMAIN_STATE W_ERROR(1353) -#define WERR_INVALID_DOMAIN_ROLE W_ERROR(1354) -#define WERR_NO_SUCH_DOMAIN W_ERROR(1355) -#define WERR_NO_SYSTEM_RESOURCES W_ERROR(1450) -#define WERR_SPECIAL_ACCOUNT W_ERROR(1371) -#define WERR_NO_SUCH_ALIAS W_ERROR(1376) -#define WERR_MEMBER_IN_ALIAS W_ERROR(1378) -#define WERR_ALIAS_EXISTS W_ERROR(1379) -#define WERR_TIME_SKEW W_ERROR(1398) -#define WERR_EVENTLOG_FILE_CORRUPT W_ERROR(1500) -#define WERR_SERVER_UNAVAILABLE W_ERROR(1722) -#define WERR_INVALID_USER_BUFFER W_ERROR(1784) -#define WERR_NO_TRUST_SAM_ACCOUNT W_ERROR(1787) -#define WERR_INVALID_FORM_NAME W_ERROR(1902) -#define WERR_INVALID_FORM_SIZE W_ERROR(1903) -#define WERR_PASSWORD_MUST_CHANGE W_ERROR(1907) -#define WERR_ACCOUNT_LOCKED_OUT W_ERROR(1909) -#define WERR_ALREADY_SHARED W_ERROR(2118) -#define WERR_NOT_CONNECTED W_ERROR(2250) -#define WERR_NAME_NOT_FOUND W_ERROR(2273) -#define WERR_SESSION_NOT_FOUND W_ERROR(2312) -#define WERR_FID_NOT_FOUND W_ERROR(2314) -#define WERR_DOMAIN_CONTROLLER_NOT_FOUND W_ERROR(2453) -#define WERR_TIME_DIFF_AT_DC W_ERROR(2457) +#define WERR_OK W_ERROR(0x00000000) +#define WERR_BADFUNC W_ERROR(0x00000001) +#define WERR_BADFILE W_ERROR(0x00000002) +#define WERR_ACCESS_DENIED W_ERROR(0x00000005) +#define WERR_BADFID W_ERROR(0x00000006) +#define WERR_NOMEM W_ERROR(0x00000008) +#define WERR_GENERAL_FAILURE W_ERROR(0x0000001F) +#define WERR_NOT_SUPPORTED W_ERROR(0x00000032) +#define WERR_DUP_NAME W_ERROR(0x00000034) +#define WERR_BAD_NETPATH W_ERROR(0x00000035) +#define WERR_BAD_NET_RESP W_ERROR(0x0000003A) +#define WERR_UNEXP_NET_ERR W_ERROR(0x0000003B) +#define WERR_DEVICE_NOT_EXIST W_ERROR(0x00000037) +#define WERR_PRINTQ_FULL W_ERROR(0x0000003D) +#define WERR_NO_SPOOL_SPACE W_ERROR(0x0000003E) +#define WERR_NO_SUCH_SHARE W_ERROR(0x00000043) +#define WERR_FILE_EXISTS W_ERROR(0x00000050) +#define WERR_BAD_PASSWORD W_ERROR(0x00000056) +#define WERR_INVALID_PARAM W_ERROR(0x00000057) +#define WERR_CALL_NOT_IMPLEMENTED W_ERROR(0x00000078) +#define WERR_SEM_TIMEOUT W_ERROR(0x00000079) +#define WERR_INSUFFICIENT_BUFFER W_ERROR(0x0000007A) +#define WERR_INVALID_NAME W_ERROR(0x0000007B) +#define WERR_UNKNOWN_LEVEL W_ERROR(0x0000007C) +#define WERR_OBJECT_PATH_INVALID W_ERROR(0x000000A1) +#define WERR_ALREADY_EXISTS W_ERROR(0x000000B7) +#define WERR_MORE_DATA W_ERROR(0x000000EA) +#define WERR_NO_MORE_ITEMS W_ERROR(0x00000103) +#define WERR_STATUS_MORE_ENTRIES W_ERROR(0x00000105) +#define WERR_IO_PENDING W_ERROR(0x000003E5) +#define WERR_CAN_NOT_COMPLETE W_ERROR(0x000003EB) +#define WERR_INVALID_FLAGS W_ERROR(0x000003EC) +#define WERR_REG_CORRUPT W_ERROR(0x000003F7) +#define WERR_REG_IO_FAILURE W_ERROR(0x000003F8) +#define WERR_REG_FILE_INVALID W_ERROR(0x000003F9) +#define WERR_INVALID_SERVICE_CONTROL W_ERROR(0x0000041C) +#define WERR_SERVICE_ALREADY_RUNNING W_ERROR(0x00000420) +#define WERR_SERVICE_DISABLED W_ERROR(0x00000422) +#define WERR_NO_SUCH_SERVICE W_ERROR(0x00000424) +#define WERR_SERVICE_MARKED_FOR_DELETE W_ERROR(0x00000430) +#define WERR_SERVICE_EXISTS W_ERROR(0x00000431) +#define WERR_SERVICE_NEVER_STARTED W_ERROR(0x00000435) +#define WERR_DUPLICATE_SERVICE_NAME W_ERROR(0x00000436) +#define WERR_DEVICE_NOT_CONNECTED W_ERROR(0x0000048F) +#define WERR_NOT_FOUND W_ERROR(0x00000490) +#define WERR_INVALID_COMPUTERNAME W_ERROR(0x000004BA) +#define WERR_INVALID_DOMAINNAME W_ERROR(0x000004BC) +#define WERR_NOT_AUTHENTICATED W_ERROR(0x000004DC) +#define WERR_MACHINE_LOCKED W_ERROR(0x000004F7) +#define WERR_UNKNOWN_REVISION W_ERROR(0x00000519) +#define WERR_INVALID_OWNER W_ERROR(0x0000051B) +#define WERR_REVISION_MISMATCH W_ERROR(0x0000051A) +#define WERR_INVALID_OWNER W_ERROR(0x0000051B) +#define WERR_INVALID_PRIMARY_GROUP W_ERROR(0x0000051C) +#define WERR_NO_LOGON_SERVERS W_ERROR(0x0000051F) +#define WERR_NO_SUCH_LOGON_SESSION W_ERROR(0x00000520) +#define WERR_NO_SUCH_PRIVILEGE W_ERROR(0x00000521) +#define WERR_PRIVILEGE_NOT_HELD W_ERROR(0x00000522) +#define WERR_USER_ALREADY_EXISTS W_ERROR(0x00000524) +#define WERR_NO_SUCH_USER W_ERROR(0x00000525) +#define WERR_GROUP_EXISTS W_ERROR(0x00000526) +#define WERR_NO_SUCH_GROUP W_ERROR(0x00000527) +#define WERR_MEMBER_IN_GROUP W_ERROR(0x00000528) +#define WERR_USER_NOT_IN_GROUP W_ERROR(0x00000529) +#define WERR_WRONG_PASSWORD W_ERROR(0x0000052B) +#define WERR_PASSWORD_RESTRICTION W_ERROR(0x0000052D) +#define WERR_LOGON_FAILURE W_ERROR(0x0000052E) +#define WERR_NONE_MAPPED W_ERROR(0x00000534) +#define WERR_INVALID_SECURITY_DESCRIPTOR W_ERROR(0x0000053A) +#define WERR_INVALID_DOMAIN_STATE W_ERROR(0x00000549) +#define WERR_INVALID_DOMAIN_ROLE W_ERROR(0x0000054A) +#define WERR_NO_SUCH_DOMAIN W_ERROR(0x0000054B) +#define WERR_SPECIAL_ACCOUNT W_ERROR(0x0000055B) +#define WERR_NO_SUCH_ALIAS W_ERROR(0x00000560) +#define WERR_MEMBER_IN_ALIAS W_ERROR(0x00000562) +#define WERR_ALIAS_EXISTS W_ERROR(0x00000563) +#define WERR_TIME_SKEW W_ERROR(0x00000576) +#define WERR_NO_SYSTEM_RESOURCES W_ERROR(0x000005AA) +#define WERR_EVENTLOG_FILE_CORRUPT W_ERROR(0x000005DC) +#define WERR_SERVER_UNAVAILABLE W_ERROR(0x000006BA) +#define WERR_INVALID_USER_BUFFER W_ERROR(0x000006F8) +#define WERR_NO_TRUST_SAM_ACCOUNT W_ERROR(0x000006FB) +#define WERR_INVALID_FORM_NAME W_ERROR(0x0000076E) +#define WERR_INVALID_FORM_SIZE W_ERROR(0x0000076F) +#define WERR_PASSWORD_MUST_CHANGE W_ERROR(0x00000773) +#define WERR_ACCOUNT_LOCKED_OUT W_ERROR(0x00000775) -#define WERR_DEVICE_NOT_AVAILABLE W_ERROR(4319) -#define WERR_STATUS_MORE_ENTRIES W_ERROR(0x0105) +#define WERR_DOMAIN_CONTROLLER_NOT_FOUND W_ERROR(0x00000995) /* Error code is wrong, should be 0x00000774 (1908)*/ -#define WERR_PRINTER_DRIVER_ALREADY_INSTALLED W_ERROR(ERRdriveralreadyinstalled) -#define WERR_UNKNOWN_PORT W_ERROR(ERRunknownprinterport) -#define WERR_UNKNOWN_PRINTER_DRIVER W_ERROR(ERRunknownprinterdriver) -#define WERR_UNKNOWN_PRINTPROCESSOR W_ERROR(ERRunknownprintprocessor) -#define WERR_INVALID_SEPARATOR_FILE W_ERROR(ERRinvalidseparatorfile) -#define WERR_INVALID_PRIORITY W_ERROR(ERRinvalidjobpriority) -#define WERR_INVALID_PRINTER_NAME W_ERROR(ERRinvalidprintername) -#define WERR_PRINTER_ALREADY_EXISTS W_ERROR(ERRprinteralreadyexists) -#define WERR_INVALID_PRINTER_COMMAND W_ERROR(ERRinvalidprintercommand) -#define WERR_INVALID_DATATYPE W_ERROR(ERRinvaliddatatype) -#define WERR_INVALID_ENVIRONMENT W_ERROR(ERRinvalidenvironment) +#define WERR_DEVICE_NOT_AVAILABLE W_ERROR(0x000010DF) -#define WERR_UNKNOWN_PRINT_MONITOR W_ERROR(ERRunknownprintmonitor) -#define WERR_PRINTER_DRIVER_IN_USE W_ERROR(ERRprinterdriverinuse) -#define WERR_SPOOL_FILE_NOT_FOUND W_ERROR(ERRspoolfilenotfound) -#define WERR_SPL_NO_STARTDOC W_ERROR(ERRnostartdoc) -#define WERR_SPL_NO_ADDJOB W_ERROR(ERRnoaddjob) -#define WERR_PRINT_PROCESSOR_ALREADY_INSTALLED W_ERROR(ERRprintprocessoralreadyinstalled) -#define WERR_PRINT_MONITOR_ALREADY_INSTALLED W_ERROR(ERRprintmonitoralreadyinstalled) -#define WERR_INVALID_PRINT_MONITOR W_ERROR(ERRinvalidprintmonitor) -#define WERR_PRINT_MONITOR_IN_USE W_ERROR(ERRprintmonitorinuse) -#define WERR_PRINTER_HAS_JOBS_QUEUED W_ERROR(ERRprinterhasjobsqueued) +#define WERR_PRINTER_DRIVER_ALREADY_INSTALLED W_ERROR(0x00000703) +#define WERR_UNKNOWN_PORT W_ERROR(0x00000704) +#define WERR_UNKNOWN_PRINTER_DRIVER W_ERROR(0x00000705) +#define WERR_UNKNOWN_PRINTPROCESSOR W_ERROR(0x00000706) +#define WERR_INVALID_SEPARATOR_FILE W_ERROR(0x00000707) +#define WERR_INVALID_PRIORITY W_ERROR(0x00000708) +#define WERR_INVALID_PRINTER_NAME W_ERROR(0x00000709) +#define WERR_PRINTER_ALREADY_EXISTS W_ERROR(0x0000070A) +#define WERR_INVALID_PRINTER_COMMAND W_ERROR(0x0000070B) +#define WERR_INVALID_DATATYPE W_ERROR(0x0000070C) +#define WERR_INVALID_ENVIRONMENT W_ERROR(0x0000070D) + +#define WERR_UNKNOWN_PRINT_MONITOR W_ERROR(0x00000BB8) +#define WERR_PRINTER_DRIVER_IN_USE W_ERROR(0x00000BB9) +#define WERR_SPOOL_FILE_NOT_FOUND W_ERROR(0x00000BBA) +#define WERR_SPL_NO_STARTDOC W_ERROR(0x00000BBB) +#define WERR_SPL_NO_ADDJOB W_ERROR(0x00000BBC) +#define WERR_PRINT_PROCESSOR_ALREADY_INSTALLED W_ERROR(0x00000BBD) +#define WERR_PRINT_MONITOR_ALREADY_INSTALLED W_ERROR(0x00000BBE) +#define WERR_INVALID_PRINT_MONITOR W_ERROR(0x00000BBF) +#define WERR_PRINT_MONITOR_IN_USE W_ERROR(0x00000BC0) +#define WERR_PRINTER_HAS_JOBS_QUEUED W_ERROR(0x00000BC1) + +#define WERR_NO_SHUTDOWN_IN_PROGRESS W_ERROR(0x0000045c) +#define WERR_SHUTDOWN_ALREADY_IN_PROGRESS W_ERROR(0x0000045b) -#define WERR_CLASS_NOT_REGISTERED W_ERROR(0x40154) -#define WERR_NO_SHUTDOWN_IN_PROGRESS W_ERROR(0x45c) -#define WERR_SHUTDOWN_ALREADY_IN_PROGRESS W_ERROR(0x45b) /* Configuration Manager Errors */ /* Basically Win32 errors meanings are specific to the \ntsvcs pipe */ - #define WERR_CM_INVALID_POINTER W_ERROR(3) #define WERR_CM_BUFFER_SMALL W_ERROR(26) #define WERR_CM_NO_MORE_HW_PROFILES W_ERROR(35) #define WERR_CM_NO_SUCH_VALUE W_ERROR(37) -#define WERR_DEVICE_NOT_SHARED W_ERROR(NERR_BASE+211) - /* DFS errors */ #ifndef NERR_BASE @@ -217,24 +208,31 @@ typedef uint32_t WERROR; #define MAX_NERR (NERR_BASE+899) #endif -#define WERR_BUF_TOO_SMALL W_ERROR(NERR_BASE+23) -#define WERR_JOB_NOT_FOUND W_ERROR(NERR_BASE+51) -#define WERR_DEST_NOT_FOUND W_ERROR(NERR_BASE+52) -#define WERR_GROUP_NOT_FOUND W_ERROR(NERR_BASE+120) -#define WERR_USER_NOT_FOUND W_ERROR(NERR_BASE+121) -#define WERR_USER_EXISTS W_ERROR(NERR_BASE+124) -#define WERR_NET_NAME_NOT_FOUND W_ERROR(NERR_BASE+210) -#define WERR_NOT_LOCAL_DOMAIN W_ERROR(NERR_BASE+220) -#define WERR_DC_NOT_FOUND W_ERROR(NERR_BASE+353) -#define WERR_DFS_NO_SUCH_VOL W_ERROR(NERR_BASE+562) -#define WERR_DFS_NO_SUCH_SHARE W_ERROR(NERR_BASE+565) -#define WERR_DFS_NO_SUCH_SERVER W_ERROR(NERR_BASE+573) -#define WERR_DFS_INTERNAL_ERROR W_ERROR(NERR_BASE+590) -#define WERR_DFS_CANT_CREATE_JUNCT W_ERROR(NERR_BASE+569) -#define WERR_SETUP_ALREADY_JOINED W_ERROR(NERR_BASE+591) -#define WERR_SETUP_NOT_JOINED W_ERROR(NERR_BASE+592) -#define WERR_SETUP_DOMAIN_CONTROLLER W_ERROR(NERR_BASE+593) -#define WERR_DEFAULT_JOIN_REQUIRED W_ERROR(NERR_BASE+594) +#define WERR_BUF_TOO_SMALL W_ERROR(0x0000084B) +#define WERR_ALREADY_SHARED W_ERROR(0x00000846) +#define WERR_JOB_NOT_FOUND W_ERROR(0x00000867) +#define WERR_DEST_NOT_FOUND W_ERROR(0x00000868) +#define WERR_GROUP_NOT_FOUND W_ERROR(0x000008AC) +#define WERR_USER_NOT_FOUND W_ERROR(0x000008AD) +#define WERR_USER_EXISTS W_ERROR(0x000008B0) +#define WERR_NOT_CONNECTED W_ERROR(0x000008CA) +#define WERR_NAME_NOT_FOUND W_ERROR(0x000008E1) +#define WERR_NET_NAME_NOT_FOUND W_ERROR(0x00000906) +#define WERR_SESSION_NOT_FOUND W_ERROR(0x00000908) +#define WERR_DEVICE_NOT_SHARED W_ERROR(0x00000907) +#define WERR_FID_NOT_FOUND W_ERROR(0x0000090A) +#define WERR_NOT_LOCAL_DOMAIN W_ERROR(0x00000910) +#define WERR_DC_NOT_FOUND W_ERROR(0x00000995) +#define WERR_TIME_DIFF_AT_DC W_ERROR(0x00000999) +#define WERR_DFS_NO_SUCH_VOL W_ERROR(0x00000A66) +#define WERR_DFS_NO_SUCH_SHARE W_ERROR(0x00000A69) +#define WERR_DFS_NO_SUCH_SERVER W_ERROR(0x00000A71) +#define WERR_DFS_INTERNAL_ERROR W_ERROR(0x00000A82) +#define WERR_DFS_CANT_CREATE_JUNCT W_ERROR(0x00000A6D) +#define WERR_SETUP_ALREADY_JOINED W_ERROR(0x00000A83) +#define WERR_SETUP_NOT_JOINED W_ERROR(0x00000A84) +#define WERR_SETUP_DOMAIN_CONTROLLER W_ERROR(0x00000A85) +#define WERR_DEFAULT_JOIN_REQUIRED W_ERROR(0x00000A86) /* DS errors */ #define WERR_DS_NO_ATTRIBUTE_OR_VALUE W_ERROR(0x0000200A) @@ -298,6 +296,7 @@ typedef uint32_t WERROR; #define WERR_FRS_SYSVOL_IS_BUSY W_ERROR(FRS_ERR_BASE+15) #define WERR_FRS_INVALID_SERVICE_PARAMETER W_ERROR(FRS_ERR_BASE+17) +/* RPC/COM/OLE HRESULT error codes */ /* RPC errors */ #define WERR_RPC_E_INVALID_HEADER W_ERROR(0x80010111) #define WERR_RPC_E_REMOTE_DISABLED W_ERROR(0x8001011c) @@ -307,6 +306,10 @@ typedef uint32_t WERROR; #define WERR_SEC_E_DECRYPT_FAILURE W_ERROR(0x80090330) #define WERR_SEC_E_ALGORITHM_MISMATCH W_ERROR(0x80090331) +/* COM REGDB error codes */ +#define WERR_CLASS_NOT_REGISTERED W_ERROR(0x80040154) /* REGDB_E_CLASSNOTREG */ + +/* Generic error code aliases */ #define WERR_FOOBAR WERR_GENERAL_FAILURE /***************************************************************************** |