#ifndef _SMBAUTH_H_ #define _SMBAUTH_H_ /* Unix SMB/CIFS implementation. Standardised Authentication types Copyright (C) Andrew Bartlett 2001 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see <http://www.gnu.org/licenses/>. */ struct auth_usersupplied_info { DATA_BLOB lm_resp; DATA_BLOB nt_resp; DATA_BLOB lm_interactive_pwd; DATA_BLOB nt_interactive_pwd; DATA_BLOB plaintext_password; bool encrypted; struct { char *account_name; /* username before/after mapping */ char *domain_name; /* username before/after mapping */ } client, mapped; bool was_mapped; /* Did the username map actually match? */ char *internal_username; /* username after mapping */ const char *workstation_name; /* workstation name (netbios calling * name) unicode string */ uint32 logon_parameters; }; struct extra_auth_info { struct dom_sid user_sid; struct dom_sid pgid_sid; }; struct auth_serversupplied_info { bool guest; bool system; struct unix_user_token utok; /* NT group information taken from the info3 structure */ NT_USER_TOKEN *ptok; /* This is the final session key, as used by SMB signing, and * (truncated to 16 bytes) encryption on the SAMR and LSA pipes * when over ncacn_np. * It is calculated by NTLMSSP from the session key in the info3, * and is set from the Kerberos session key using * krb5_auth_con_getremotesubkey(). * * Bootom line, it is not the same as the session keys in info3. */ DATA_BLOB user_session_key; DATA_BLOB lm_session_key; struct netr_SamInfo3 *info3; /* this structure is filled *only* in pathological cases where the user * sid or the primary group sid are not sids of the domain. Normally * this happens only for unix accounts that have unix domain sids. * This is checked only when info3.rid and/or info3.primary_gid are set * to the special invalid value of 0xFFFFFFFF */ struct extra_auth_info extra; void *pam_handle; /* * This is a token from /etc/passwd and /etc/group */ bool nss_token; char *unix_name; /* * For performance reasons we keep an alpha_strcpy-sanitized version * of the username around as long as the global variable current_user * still exists. If we did not do keep this, we'd have to call * alpha_strcpy whenever we do a become_user(), potentially on every * smb request. See set_current_user_info. */ char *sanitized_username; }; struct auth_context { DATA_BLOB challenge; /* Who set this up in the first place? */ const char *challenge_set_by; bool challenge_may_be_modified; struct auth_methods *challenge_set_method; /* What order are the various methods in? Try to stop it changing under us */ struct auth_methods *auth_method_list; NTSTATUS (*get_ntlm_challenge)(struct auth_context *auth_context, uint8_t chal[8]); NTSTATUS (*check_ntlm_password)(const struct auth_context *auth_context, const struct auth_usersupplied_info *user_info, struct auth_serversupplied_info **server_info); NTSTATUS (*nt_status_squash)(NTSTATUS nt_status); }; typedef struct auth_methods { struct auth_methods *prev, *next; const char *name; /* What name got this module */ NTSTATUS (*auth)(const struct auth_context *auth_context, void *my_private_data, TALLOC_CTX *mem_ctx, const struct auth_usersupplied_info *user_info, struct auth_serversupplied_info **server_info); /* If you are using this interface, then you are probably * getting something wrong. This interface is only for * security=server, and makes a number of compromises to allow * that. It is not compatible with being a PDC. */ DATA_BLOB (*get_chal)(const struct auth_context *auth_context, void **my_private_data, TALLOC_CTX *mem_ctx); /* Used to keep tabs on things like the cli for SMB server authentication */ void *private_data; } auth_methods; typedef NTSTATUS (*auth_init_function)(struct auth_context *, const char *, struct auth_methods **); struct auth_init_function_entry { const char *name; /* Function to create a member of the authmethods list */ auth_init_function init; struct auth_init_function_entry *prev, *next; }; struct auth_ntlmssp_state; /* Changed from 1 -> 2 to add the logon_parameters field. */ #define AUTH_INTERFACE_VERSION 2 #endif /* _SMBAUTH_H_ */