s3-net: add command rpc registry import
[Samba.git] / source3 / libsmb / ntlmssp_wrap.c
blobb3ddf50de117461ef791a03c4acfb492df55522a
1 /*
2 NLTMSSP wrappers
4 Copyright (C) Andrew Tridgell 2001
5 Copyright (C) Andrew Bartlett 2001-2003
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>.
21 #include "includes.h"
22 #include "libcli/auth/ntlmssp.h"
23 #include "ntlmssp_wrap.h"
25 NTSTATUS auth_ntlmssp_sign_packet(struct auth_ntlmssp_state *ans,
26 TALLOC_CTX *sig_mem_ctx,
27 const uint8_t *data,
28 size_t length,
29 const uint8_t *whole_pdu,
30 size_t pdu_length,
31 DATA_BLOB *sig)
33 return ntlmssp_sign_packet(ans->ntlmssp_state,
34 sig_mem_ctx,
35 data, length,
36 whole_pdu, pdu_length,
37 sig);
40 NTSTATUS auth_ntlmssp_check_packet(struct auth_ntlmssp_state *ans,
41 const uint8_t *data,
42 size_t length,
43 const uint8_t *whole_pdu,
44 size_t pdu_length,
45 const DATA_BLOB *sig)
47 return ntlmssp_check_packet(ans->ntlmssp_state,
48 data, length,
49 whole_pdu, pdu_length,
50 sig);
53 NTSTATUS auth_ntlmssp_seal_packet(struct auth_ntlmssp_state *ans,
54 TALLOC_CTX *sig_mem_ctx,
55 uint8_t *data,
56 size_t length,
57 const uint8_t *whole_pdu,
58 size_t pdu_length,
59 DATA_BLOB *sig)
61 return ntlmssp_seal_packet(ans->ntlmssp_state,
62 sig_mem_ctx,
63 data, length,
64 whole_pdu, pdu_length,
65 sig);
68 NTSTATUS auth_ntlmssp_unseal_packet(struct auth_ntlmssp_state *ans,
69 uint8_t *data,
70 size_t length,
71 const uint8_t *whole_pdu,
72 size_t pdu_length,
73 const DATA_BLOB *sig)
75 return ntlmssp_unseal_packet(ans->ntlmssp_state,
76 data, length,
77 whole_pdu, pdu_length,
78 sig);
81 bool auth_ntlmssp_negotiated_sign(struct auth_ntlmssp_state *ans)
83 return ans->ntlmssp_state->neg_flags & NTLMSSP_NEGOTIATE_SIGN;
86 bool auth_ntlmssp_negotiated_seal(struct auth_ntlmssp_state *ans)
88 return ans->ntlmssp_state->neg_flags & NTLMSSP_NEGOTIATE_SEAL;
91 struct ntlmssp_state *auth_ntlmssp_get_ntlmssp_state(
92 struct auth_ntlmssp_state *ans)
94 return ans->ntlmssp_state;
97 /* Needed for 'map to guest' and 'smb username' processing */
98 const char *auth_ntlmssp_get_username(struct auth_ntlmssp_state *ans)
100 return ans->ntlmssp_state->user;
103 const char *auth_ntlmssp_get_domain(struct auth_ntlmssp_state *ans)
105 return ans->ntlmssp_state->domain;
108 const char *auth_ntlmssp_get_client(struct auth_ntlmssp_state *ans)
110 return ans->ntlmssp_state->client.netbios_name;
113 const uint8_t *auth_ntlmssp_get_nt_hash(struct auth_ntlmssp_state *ans)
115 return ans->ntlmssp_state->nt_hash;
118 NTSTATUS auth_ntlmssp_set_username(struct auth_ntlmssp_state *ans,
119 const char *user)
121 return ntlmssp_set_username(ans->ntlmssp_state, user);
124 NTSTATUS auth_ntlmssp_set_domain(struct auth_ntlmssp_state *ans,
125 const char *domain)
127 return ntlmssp_set_domain(ans->ntlmssp_state, domain);
130 NTSTATUS auth_ntlmssp_set_password(struct auth_ntlmssp_state *ans,
131 const char *password)
133 return ntlmssp_set_password(ans->ntlmssp_state, password);
136 void auth_ntlmssp_and_flags(struct auth_ntlmssp_state *ans, uint32_t flags)
138 ans->ntlmssp_state->neg_flags &= flags;
141 void auth_ntlmssp_or_flags(struct auth_ntlmssp_state *ans, uint32_t flags)
143 ans->ntlmssp_state->neg_flags |= flags;
146 DATA_BLOB auth_ntlmssp_get_session_key(struct auth_ntlmssp_state *ans)
148 return ans->ntlmssp_state->session_key;
151 NTSTATUS auth_ntlmssp_update(struct auth_ntlmssp_state *ans,
152 const DATA_BLOB request, DATA_BLOB *reply)
154 return ntlmssp_update(ans->ntlmssp_state, request, reply);
157 NTSTATUS auth_ntlmssp_client_start(TALLOC_CTX *mem_ctx,
158 const char *netbios_name,
159 const char *netbios_domain,
160 bool use_ntlmv2,
161 struct auth_ntlmssp_state **_ans)
163 struct auth_ntlmssp_state *ans;
164 NTSTATUS status;
166 ans = talloc_zero(mem_ctx, struct auth_ntlmssp_state);
168 status = ntlmssp_client_start(ans,
169 netbios_name, netbios_domain,
170 use_ntlmv2, &ans->ntlmssp_state);
171 if (!NT_STATUS_IS_OK(status)) {
172 return status;
175 *_ans = ans;
176 return NT_STATUS_OK;