2 Unix SMB/CIFS implementation.
3 SMB parameters and setup
4 Copyright (C) Andrew Tridgell 1992-1998
5 Copyright (C) Luke Kenneth Casson Leighton 1996-1998
6 Copyright (C) Jeremy Allison 1998
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
20 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
26 /* the client asks for a smaller buffer to save ram and also to get more
27 overlap on the wire. This size gives us a nice read/write size, which
28 will be a multiple of the page size on almost any system */
29 #define CLI_BUFFER_SIZE (0xFFFF)
30 #define CLI_SAMBA_MAX_LARGE_READX_SIZE (127*1024) /* Works for Samba servers */
31 #define CLI_WINDOWS_MAX_LARGE_READX_SIZE ((64*1024)-2) /* Windows servers are broken.... */
32 #define CLI_SAMBA_MAX_POSIX_LARGE_READX_SIZE (0xFFFF00) /* 24-bit len. */
35 * These definitions depend on smb.h
38 struct print_job_info
{
47 struct cli_pipe_auth_data
{
48 enum pipe_auth_type auth_type
; /* switch for the union below. Defined in ntdomain.h */
49 enum pipe_auth_level auth_level
; /* defined in ntdomain.h */
51 struct schannel_auth_struct
*schannel_auth
;
52 NTLMSSP_STATE
*ntlmssp_state
;
53 struct kerberos_auth_struct
*kerberos_auth
;
55 void (*cli_auth_data_free_func
)(struct cli_pipe_auth_data
*);
58 struct rpc_pipe_client
{
59 struct rpc_pipe_client
*prev
, *next
;
63 struct cli_state
*cli
;
66 const char *pipe_name
;
70 const char *user_name
;
76 struct cli_pipe_auth_data auth
;
78 /* The following is only non-null on a netlogon pipe. */
82 /* Transport encryption state. */
83 enum smb_trans_enc_type
{ SMB_TRANS_ENC_NTLM
, SMB_TRANS_ENC_GSS
};
85 #if defined(HAVE_GSSAPI) && defined(HAVE_KRB5)
86 struct smb_tran_enc_state_gss
{
92 struct smb_trans_enc_state
{
93 enum smb_trans_enc_type smb_enc_type
;
97 NTLMSSP_STATE
*ntlmssp_state
;
98 #if defined(HAVE_GSSAPI) && defined(HAVE_KRB5)
99 struct smb_tran_enc_state_gss
*gss_state
;
107 int smb_rw_error
; /* Copy of last read or write error. */
119 /* The credentials used to open the cli_state connection. */
125 * The following strings are the
126 * ones returned by the server if
127 * the protocol > NT1.
131 fstring server_domain
;
135 struct nmb_name called
;
136 struct nmb_name calling
;
137 fstring full_dest_host_name
;
138 struct in_addr dest_ip
;
140 DATA_BLOB secblob
; /* cryptkey or negTokenInit */
144 int readbraw_supported
;
145 int writebraw_supported
;
146 int timeout
; /* in milliseconds. */
151 unsigned int bufsize
;
156 uint32 posix_capabilities
;
161 smb_sign_info sign_info
;
163 struct smb_trans_enc_state
*trans_enc_state
; /* Setup if we're encrypting SMB's. */
165 /* the session key for this CLI, outside
166 any per-pipe authenticaion */
167 DATA_BLOB user_session_key
;
169 /* The list of pipes currently open on this connection. */
170 struct rpc_pipe_client
*pipe_list
;
173 BOOL fallback_after_kerberos
;
176 BOOL use_oplocks
; /* should we use oplocks? */
177 BOOL use_level_II_oplocks
; /* should we use level II oplocks? */
179 /* a oplock break request handler */
180 BOOL (*oplock_handler
)(struct cli_state
*cli
, int fnum
, unsigned char level
);
182 BOOL force_dos_errors
;
183 BOOL case_sensitive
; /* False by default. */
186 typedef struct file_info
{
187 struct cli_state
*cli
;
192 /* these times are normally kept in GMT */
193 struct timespec mtime_ts
;
194 struct timespec atime_ts
;
195 struct timespec ctime_ts
;
198 char short_name
[13*3]; /* the *3 is to cope with multi-byte */
201 #define CLI_FULL_CONNECTION_DONT_SPNEGO 0x0001
202 #define CLI_FULL_CONNECTION_USE_KERBEROS 0x0002
203 #define CLI_FULL_CONNECTION_ANONYMOUS_FALLBACK 0x0004
205 #endif /* _CLIENT_H */