⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 gensec.c

📁 samba最新软件
💻 C
📖 第 1 页 / 共 3 页
字号:
	}		return gensec_security->ops->max_wrapped_size(gensec_security);}size_t gensec_max_input_size(struct gensec_security *gensec_security) {	if (!gensec_security->ops->max_input_size) {		return (1 << 17) - gensec_sig_size(gensec_security, 1 << 17);	}		return gensec_security->ops->max_input_size(gensec_security);}_PUBLIC_ NTSTATUS gensec_wrap(struct gensec_security *gensec_security, 		     TALLOC_CTX *mem_ctx, 		     const DATA_BLOB *in, 		     DATA_BLOB *out) {	if (!gensec_security->ops->wrap) {		return NT_STATUS_NOT_IMPLEMENTED;	}	return gensec_security->ops->wrap(gensec_security, mem_ctx, in, out);}_PUBLIC_ NTSTATUS gensec_unwrap(struct gensec_security *gensec_security, 		       TALLOC_CTX *mem_ctx, 		       const DATA_BLOB *in, 		       DATA_BLOB *out) {	if (!gensec_security->ops->unwrap) {		return NT_STATUS_NOT_IMPLEMENTED;	}	return gensec_security->ops->unwrap(gensec_security, mem_ctx, in, out);}_PUBLIC_ NTSTATUS gensec_session_key(struct gensec_security *gensec_security, 			    DATA_BLOB *session_key){	if (!gensec_security->ops->session_key) {		return NT_STATUS_NOT_IMPLEMENTED;	}	if (!gensec_have_feature(gensec_security, GENSEC_FEATURE_SESSION_KEY)) {		return NT_STATUS_NO_USER_SESSION_KEY;	}		return gensec_security->ops->session_key(gensec_security, session_key);}/**  * Return the credentials of a logged on user, including session keys * etc. * * Only valid after a successful authentication * * May only be called once per authentication. * */_PUBLIC_ NTSTATUS gensec_session_info(struct gensec_security *gensec_security, 			     struct auth_session_info **session_info){	if (!gensec_security->ops->session_info) {		return NT_STATUS_NOT_IMPLEMENTED;	}	return gensec_security->ops->session_info(gensec_security, session_info);}/** * Next state function for the GENSEC state machine *  * @param gensec_security GENSEC State * @param out_mem_ctx The TALLOC_CTX for *out to be allocated on * @param in The request, as a DATA_BLOB * @param out The reply, as an talloc()ed DATA_BLOB, on *out_mem_ctx * @return Error, MORE_PROCESSING_REQUIRED if a reply is sent,  *                or NT_STATUS_OK if the user is authenticated.  */_PUBLIC_ NTSTATUS gensec_update(struct gensec_security *gensec_security, TALLOC_CTX *out_mem_ctx, 		       const DATA_BLOB in, DATA_BLOB *out) {	return gensec_security->ops->update(gensec_security, out_mem_ctx, in, out);}static void gensec_update_async_timed_handler(struct event_context *ev, struct timed_event *te,					      struct timeval t, void *ptr){	struct gensec_update_request *req = talloc_get_type(ptr, struct gensec_update_request);	req->status = req->gensec_security->ops->update(req->gensec_security, req, req->in, &req->out);	req->callback.fn(req, req->callback.private_data);}/** * Next state function for the GENSEC state machine async version *  * @param gensec_security GENSEC State * @param in The request, as a DATA_BLOB * @param callback The function that will be called when the operation is *                 finished, it should return gensec_update_recv() to get output * @param private_data A private pointer that will be passed to the callback function */_PUBLIC_ void gensec_update_send(struct gensec_security *gensec_security, const DATA_BLOB in,				 void (*callback)(struct gensec_update_request *req, void *private_data),				 void *private_data){	struct gensec_update_request *req = NULL;	struct timed_event *te = NULL;	req = talloc(gensec_security, struct gensec_update_request);	if (!req) goto failed;	req->gensec_security		= gensec_security;	req->in				= in;	req->out			= data_blob(NULL, 0);	req->callback.fn		= callback;	req->callback.private_data	= private_data;	te = event_add_timed(gensec_security->event_ctx, req,			     timeval_zero(),			     gensec_update_async_timed_handler, req);	if (!te) goto failed;	return;failed:	talloc_free(req);	callback(NULL, private_data);}/** * Next state function for the GENSEC state machine *  * @param req GENSEC update request state * @param out_mem_ctx The TALLOC_CTX for *out to be allocated on * @param out The reply, as an talloc()ed DATA_BLOB, on *out_mem_ctx * @return Error, MORE_PROCESSING_REQUIRED if a reply is sent,  *                or NT_STATUS_OK if the user is authenticated.  */_PUBLIC_ NTSTATUS gensec_update_recv(struct gensec_update_request *req, TALLOC_CTX *out_mem_ctx, DATA_BLOB *out){	NTSTATUS status;	NT_STATUS_HAVE_NO_MEMORY(req);	*out = req->out;	talloc_steal(out_mem_ctx, out->data);	status = req->status;	talloc_free(req);	return status;}/**  * Set the requirement for a certain feature on the connection * */_PUBLIC_ void gensec_want_feature(struct gensec_security *gensec_security,			 uint32_t feature) {	gensec_security->want_features |= feature;}/**  * Check the requirement for a certain feature on the connection * */_PUBLIC_ bool gensec_have_feature(struct gensec_security *gensec_security,			 uint32_t feature) {	if (!gensec_security->ops->have_feature) {		return false;	}		/* We might 'have' features that we don't 'want', because the	 * other end demanded them, or we can't neotiate them off */	return gensec_security->ops->have_feature(gensec_security, feature);}/**  * Associate a credentials structure with a GENSEC context - talloc_reference()s it to the context  * */_PUBLIC_ NTSTATUS gensec_set_credentials(struct gensec_security *gensec_security, struct cli_credentials *credentials) {	gensec_security->credentials = talloc_reference(gensec_security, credentials);	NT_STATUS_HAVE_NO_MEMORY(gensec_security->credentials);	gensec_want_feature(gensec_security, cli_credentials_get_gensec_features(gensec_security->credentials));	return NT_STATUS_OK;}/**  * Return the credentials structure associated with a GENSEC context * */_PUBLIC_ struct cli_credentials *gensec_get_credentials(struct gensec_security *gensec_security) {	if (!gensec_security) {		return NULL;	}	return gensec_security->credentials;}/**  * Set the target service (such as 'http' or 'host') on a GENSEC context - ensures it is talloc()ed  * */_PUBLIC_ NTSTATUS gensec_set_target_service(struct gensec_security *gensec_security, const char *service) {	gensec_security->target.service = talloc_strdup(gensec_security, service);	if (!gensec_security->target.service) {		return NT_STATUS_NO_MEMORY;	}	return NT_STATUS_OK;}_PUBLIC_ const char *gensec_get_target_service(struct gensec_security *gensec_security) {	if (gensec_security->target.service) {		return gensec_security->target.service;	}	return "host";}/**  * Set the target hostname (suitable for kerberos resolutation) on a GENSEC context - ensures it is talloc()ed  * */_PUBLIC_ NTSTATUS gensec_set_target_hostname(struct gensec_security *gensec_security, const char *hostname) {	gensec_security->target.hostname = talloc_strdup(gensec_security, hostname);	if (hostname && !gensec_security->target.hostname) {		return NT_STATUS_NO_MEMORY;	}	return NT_STATUS_OK;}_PUBLIC_ const char *gensec_get_target_hostname(struct gensec_security *gensec_security) {	/* We allow the target hostname to be overriden for testing purposes */	const char *target_hostname = lp_parm_string(gensec_security->lp_ctx, NULL, "gensec", "target_hostname");	if (target_hostname) {		return target_hostname;	}	if (gensec_security->target.hostname) {		return gensec_security->target.hostname;	}	/* We could add use the 'set sockaddr' call, and do a reverse	 * lookup, but this would be both insecure (compromising the	 * way kerberos works) and add DNS timeouts */	return NULL;}/**  * Set (and talloc_reference) local and peer socket addresses onto a socket context on the GENSEC context  * * This is so that kerberos can include these addresses in * cryptographic tokens, to avoid certain attacks. */_PUBLIC_ NTSTATUS gensec_set_my_addr(struct gensec_security *gensec_security, struct socket_address *my_addr) {	gensec_security->my_addr = my_addr;	if (my_addr && !talloc_reference(gensec_security, my_addr)) {		return NT_STATUS_NO_MEMORY;	}	return NT_STATUS_OK;}_PUBLIC_ NTSTATUS gensec_set_peer_addr(struct gensec_security *gensec_security, struct socket_address *peer_addr) {	gensec_security->peer_addr = peer_addr;	if (peer_addr && !talloc_reference(gensec_security, peer_addr)) {		return NT_STATUS_NO_MEMORY;	}	return NT_STATUS_OK;}struct socket_address *gensec_get_my_addr(struct gensec_security *gensec_security) {	if (gensec_security->my_addr) {		return gensec_security->my_addr;	}	/* We could add a 'set sockaddr' call, and do a lookup.  This	 * would avoid needing to do system calls if nothing asks. */	return NULL;}_PUBLIC_ struct socket_address *gensec_get_peer_addr(struct gensec_security *gensec_security) {	if (gensec_security->peer_addr) {		return gensec_security->peer_addr;	}	/* We could add a 'set sockaddr' call, and do a lookup.  This	 * would avoid needing to do system calls if nothing asks.	 * However, this is not appropriate for the peer addres on	 * datagram sockets */	return NULL;}/**  * Set the target principal (assuming it it known, say from the SPNEGO reply) *  - ensures it is talloc()ed  * */NTSTATUS gensec_set_target_principal(struct gensec_security *gensec_security, const char *principal) {	gensec_security->target.principal = talloc_strdup(gensec_security, principal);	if (!gensec_security->target.principal) {		return NT_STATUS_NO_MEMORY;	}	return NT_STATUS_OK;}const char *gensec_get_target_principal(struct gensec_security *gensec_security) {	if (gensec_security->target.principal) {		return gensec_security->target.principal;	}	return NULL;}/*  register a GENSEC backend.   The 'name' can be later used by other backends to find the operations  structure for this backend.*/NTSTATUS gensec_register(const struct gensec_security_ops *ops){	if (!lp_parm_bool(global_loadparm, NULL, "gensec", ops->name, ops->enabled)) {		DEBUG(2,("gensec subsystem %s is disabled\n", ops->name));		return NT_STATUS_OK;	}	if (gensec_security_by_name(NULL, ops->name) != NULL) {		/* its already registered! */		DEBUG(0,("GENSEC backend '%s' already registered\n", 			 ops->name));		return NT_STATUS_OBJECT_NAME_COLLISION;	}	generic_security_ops = talloc_realloc(talloc_autofree_context(), 					      generic_security_ops, 					      struct gensec_security_ops *, 					      gensec_num_backends+2);	if (!generic_security_ops) {		return NT_STATUS_NO_MEMORY;	}	generic_security_ops[gensec_num_backends] = discard_const_p(struct gensec_security_ops, ops);	gensec_num_backends++;	generic_security_ops[gensec_num_backends] = NULL;	DEBUG(3,("GENSEC backend '%s' registered\n", 		 ops->name));	return NT_STATUS_OK;}/*  return the GENSEC interface version, and the size of some critical types  This can be used by backends to either detect compilation errors, or provide  multiple implementations for different smbd compilation options in one module*/const struct gensec_critical_sizes *gensec_interface_version(void){	static const struct gensec_critical_sizes critical_sizes = {		GENSEC_INTERFACE_VERSION,		sizeof(struct gensec_security_ops),		sizeof(struct gensec_security),	};	return &critical_sizes;}static int sort_gensec(struct gensec_security_ops **gs1, struct gensec_security_ops **gs2) {	return (*gs2)->priority - (*gs1)->priority;}/*  initialise the GENSEC subsystem*/_PUBLIC_ NTSTATUS gensec_init(struct loadparm_context *lp_ctx){	static bool initialized = false;	extern NTSTATUS gensec_sasl_init(void);	extern NTSTATUS gensec_krb5_init(void);	extern NTSTATUS gensec_schannel_init(void);	extern NTSTATUS gensec_spnego_init(void);	extern NTSTATUS gensec_gssapi_init(void);	extern NTSTATUS gensec_ntlmssp_init(void);	init_module_fn static_init[] = { STATIC_gensec_MODULES };	init_module_fn *shared_init;	if (initialized) return NT_STATUS_OK;	initialized = true;		shared_init = load_samba_modules(NULL, lp_ctx, "gensec");	run_init_functions(static_init);	run_init_functions(shared_init);	talloc_free(shared_init);	qsort(generic_security_ops, gensec_num_backends, sizeof(*generic_security_ops), QSORT_CAST sort_gensec);		return NT_STATUS_OK;}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -