1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
|
#ifndef _SMBAUTH_H_
#define _SMBAUTH_H_
/*
Unix SMB/CIFS implementation.
Standardised Authentication types
Copyright (C) Andrew Bartlett 2001
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#include "../auth/common_auth.h"
struct gensec_security;
struct extra_auth_info {
struct dom_sid user_sid;
struct dom_sid pgid_sid;
};
struct auth_serversupplied_info {
bool guest;
bool system;
struct security_unix_token utok;
/* NT group information taken from the info3 structure */
struct security_token *security_token;
/* These are the intermediate session keys, as provided by a
* NETLOGON server and used by NTLMSSP to negotiate key
* exchange etc (which will provide the session_key in the
* auth_session_info). It is usually the same as the keys in
* the info3, but is a variable length structure here to allow
* it to be omitted if the auth module does not know it.
*/
DATA_BLOB session_key;
DATA_BLOB lm_session_key;
struct netr_SamInfo3 *info3;
/* this structure is filled *only* in pathological cases where the user
* sid or the primary group sid are not sids of the domain. Normally
* this happens only for unix accounts that have unix domain sids.
* This is checked only when info3.rid and/or info3.primary_gid are set
* to the special invalid value of 0xFFFFFFFF */
struct extra_auth_info extra;
/*
* This is a token from /etc/passwd and /etc/group
*/
bool nss_token;
char *unix_name;
};
typedef NTSTATUS (*prepare_gensec_fn)(TALLOC_CTX *mem_ctx,
struct gensec_security **gensec_context);
typedef NTSTATUS (*make_auth4_context_fn)(TALLOC_CTX *mem_ctx,
struct auth4_context **auth4_context);
struct auth_context {
DATA_BLOB challenge;
/* Who set this up in the first place? */
const char *challenge_set_by;
bool challenge_may_be_modified;
struct auth_methods *challenge_set_method;
/* What order are the various methods in? Try to stop it changing under us */
struct auth_methods *auth_method_list;
prepare_gensec_fn prepare_gensec;
make_auth4_context_fn make_auth4_context;
};
typedef struct auth_methods
{
struct auth_methods *prev, *next;
const char *name; /* What name got this module */
NTSTATUS (*auth)(const struct auth_context *auth_context,
void *my_private_data,
TALLOC_CTX *mem_ctx,
const struct auth_usersupplied_info *user_info,
struct auth_serversupplied_info **server_info);
/* If you are using this interface, then you are probably
* getting something wrong. This interface is only for
* security=server, and makes a number of compromises to allow
* that. It is not compatible with being a PDC. */
DATA_BLOB (*get_chal)(const struct auth_context *auth_context,
void **my_private_data,
TALLOC_CTX *mem_ctx);
/* Optional methods allowing this module to provide a way to get a gensec context and an auth4_context */
prepare_gensec_fn prepare_gensec;
make_auth4_context_fn make_auth4_context;
/* Used to keep tabs on things like the cli for SMB server authentication */
void *private_data;
} auth_methods;
typedef NTSTATUS (*auth_init_function)(struct auth_context *, const char *, struct auth_methods **);
struct auth_init_function_entry {
const char *name;
/* Function to create a member of the authmethods list */
auth_init_function init;
struct auth_init_function_entry *prev, *next;
};
extern const struct gensec_security_ops gensec_ntlmssp3_server_ops;
/* Intent of use for session key. LSA and SAMR pipes use 16 bytes of session key when doing create/modify calls */
enum session_key_use_intent {
KEY_USE_FULL = 0,
KEY_USE_16BYTES
};
/* Changed from 1 -> 2 to add the logon_parameters field. */
/* Changed from 2 -> 3 when we reworked many auth structures to use IDL or be in common with Samba4 */
#define AUTH_INTERFACE_VERSION 3
#include "auth/proto.h"
#endif /* _SMBAUTH_H_ */
|