Fix bug 10196 - RW Deny for a specific user is not overriding RW Allow for a group.
[Samba.git] / libcli / auth / proto.h
blobb9d91d04ea58efe881a922090a30a7309c92e5a5
1 #ifndef _LIBCLI_AUTH_PROTO_H__
2 #define _LIBCLI_AUTH_PROTO_H__
4 #undef _PRINTF_ATTRIBUTE
5 #define _PRINTF_ATTRIBUTE(a1, a2) PRINTF_ATTRIBUTE(a1, a2)
7 /* this file contains prototypes for functions that are private
8 * to this subsystem or library. These functions should not be
9 * used outside this particular subsystem! */
12 /* The following definitions come from /home/jeremy/src/samba/git/master/source3/../source4/../libcli/auth/credentials.c */
14 void netlogon_creds_des_encrypt_LMKey(struct netlogon_creds_CredentialState *creds, struct netr_LMSessionKey *key);
15 void netlogon_creds_des_decrypt_LMKey(struct netlogon_creds_CredentialState *creds, struct netr_LMSessionKey *key);
16 void netlogon_creds_des_encrypt(struct netlogon_creds_CredentialState *creds, struct samr_Password *pass);
17 void netlogon_creds_des_decrypt(struct netlogon_creds_CredentialState *creds, struct samr_Password *pass);
18 void netlogon_creds_arcfour_crypt(struct netlogon_creds_CredentialState *creds, uint8_t *data, size_t len);
19 void netlogon_creds_aes_encrypt(struct netlogon_creds_CredentialState *creds, uint8_t *data, size_t len);
20 void netlogon_creds_aes_decrypt(struct netlogon_creds_CredentialState *creds, uint8_t *data, size_t len);
22 /*****************************************************************
23 The above functions are common to the client and server interface
24 next comes the client specific functions
25 ******************************************************************/
26 struct netlogon_creds_CredentialState *netlogon_creds_client_init(TALLOC_CTX *mem_ctx,
27 const char *client_account,
28 const char *client_computer_name,
29 const struct netr_Credential *client_challenge,
30 const struct netr_Credential *server_challenge,
31 const struct samr_Password *machine_password,
32 struct netr_Credential *initial_credential,
33 uint32_t negotiate_flags);
34 struct netlogon_creds_CredentialState *netlogon_creds_client_init_session_key(TALLOC_CTX *mem_ctx,
35 const uint8_t session_key[16]);
36 void netlogon_creds_client_authenticator(struct netlogon_creds_CredentialState *creds,
37 struct netr_Authenticator *next);
38 bool netlogon_creds_client_check(struct netlogon_creds_CredentialState *creds,
39 const struct netr_Credential *received_credentials);
40 struct netlogon_creds_CredentialState *netlogon_creds_copy(TALLOC_CTX *mem_ctx,
41 struct netlogon_creds_CredentialState *creds_in);
43 /*****************************************************************
44 The above functions are common to the client and server interface
45 next comes the server specific functions
46 ******************************************************************/
47 struct netlogon_creds_CredentialState *netlogon_creds_server_init(TALLOC_CTX *mem_ctx,
48 const char *client_account,
49 const char *client_computer_name,
50 uint16_t secure_channel_type,
51 const struct netr_Credential *client_challenge,
52 const struct netr_Credential *server_challenge,
53 const struct samr_Password *machine_password,
54 struct netr_Credential *credentials_in,
55 struct netr_Credential *credentials_out,
56 uint32_t negotiate_flags);
57 NTSTATUS netlogon_creds_server_step_check(struct netlogon_creds_CredentialState *creds,
58 struct netr_Authenticator *received_authenticator,
59 struct netr_Authenticator *return_authenticator) ;
60 void netlogon_creds_decrypt_samlogon(struct netlogon_creds_CredentialState *creds,
61 uint16_t validation_level,
62 union netr_Validation *validation) ;
64 /* The following definitions come from /home/jeremy/src/samba/git/master/source3/../source4/../libcli/auth/session.c */
66 void sess_crypt_blob(DATA_BLOB *out, const DATA_BLOB *in, const DATA_BLOB *session_key,
67 bool forward);
68 DATA_BLOB sess_encrypt_string(const char *str, const DATA_BLOB *session_key);
69 char *sess_decrypt_string(TALLOC_CTX *mem_ctx,
70 DATA_BLOB *blob, const DATA_BLOB *session_key);
71 DATA_BLOB sess_encrypt_blob(TALLOC_CTX *mem_ctx, DATA_BLOB *blob_in, const DATA_BLOB *session_key);
72 NTSTATUS sess_decrypt_blob(TALLOC_CTX *mem_ctx, const DATA_BLOB *blob, const DATA_BLOB *session_key,
73 DATA_BLOB *ret);
75 /* The following definitions come from /home/jeremy/src/samba/git/master/source3/../source4/../libcli/auth/smbencrypt.c */
77 void SMBencrypt_hash(const uint8_t lm_hash[16], const uint8_t *c8, uint8_t p24[24]);
78 bool SMBencrypt(const char *passwd, const uint8_t *c8, uint8_t p24[24]);
80 /**
81 * Creates the MD4 Hash of the users password in NT UNICODE.
82 * @param passwd password in 'unix' charset.
83 * @param p16 return password hashed with md4, caller allocated 16 byte buffer
85 bool E_md4hash(const char *passwd, uint8_t p16[16]);
87 /**
88 * Creates the MD5 Hash of a combination of 16 byte salt and 16 byte NT hash.
89 * @param 16 byte salt.
90 * @param 16 byte NT hash.
91 * @param 16 byte return hashed with md5, caller allocated 16 byte buffer
93 void E_md5hash(const uint8_t salt[16], const uint8_t nthash[16], uint8_t hash_out[16]);
95 /**
96 * Creates the DES forward-only Hash of the users password in DOS ASCII charset
97 * @param passwd password in 'unix' charset.
98 * @param p16 return password hashed with DES, caller allocated 16 byte buffer
99 * @return false if password was > 14 characters, and therefore may be incorrect, otherwise true
100 * @note p16 is filled in regardless
102 bool E_deshash(const char *passwd, uint8_t p16[16]);
105 * Creates the MD4 and DES (LM) Hash of the users password.
106 * MD4 is of the NT Unicode, DES is of the DOS UPPERCASE password.
107 * @param passwd password in 'unix' charset.
108 * @param nt_p16 return password hashed with md4, caller allocated 16 byte buffer
109 * @param p16 return password hashed with des, caller allocated 16 byte buffer
111 void nt_lm_owf_gen(const char *pwd, uint8_t nt_p16[16], uint8_t p16[16]);
112 bool ntv2_owf_gen(const uint8_t owf[16],
113 const char *user_in, const char *domain_in,
114 uint8_t kr_buf[16]);
115 void SMBOWFencrypt(const uint8_t passwd[16], const uint8_t *c8, uint8_t p24[24]);
116 void SMBNTencrypt_hash(const uint8_t nt_hash[16], const uint8_t *c8, uint8_t *p24);
117 void SMBNTencrypt(const char *passwd, const uint8_t *c8, uint8_t *p24);
118 void SMBOWFencrypt_ntv2(const uint8_t kr[16],
119 const DATA_BLOB *srv_chal,
120 const DATA_BLOB *smbcli_chal,
121 uint8_t resp_buf[16]);
122 void SMBsesskeygen_ntv2(const uint8_t kr[16],
123 const uint8_t * nt_resp, uint8_t sess_key[16]);
124 void SMBsesskeygen_ntv1(const uint8_t kr[16], uint8_t sess_key[16]);
125 void SMBsesskeygen_lm_sess_key(const uint8_t lm_hash[16],
126 const uint8_t lm_resp[24], /* only uses 8 */
127 uint8_t sess_key[16]);
128 DATA_BLOB NTLMv2_generate_names_blob(TALLOC_CTX *mem_ctx,
129 const char *hostname,
130 const char *domain);
131 bool SMBNTLMv2encrypt_hash(TALLOC_CTX *mem_ctx,
132 const char *user, const char *domain, const uint8_t nt_hash[16],
133 const DATA_BLOB *server_chal,
134 const DATA_BLOB *names_blob,
135 DATA_BLOB *lm_response, DATA_BLOB *nt_response,
136 DATA_BLOB *lm_session_key, DATA_BLOB *user_session_key) ;
137 bool SMBNTLMv2encrypt(TALLOC_CTX *mem_ctx,
138 const char *user, const char *domain,
139 const char *password,
140 const DATA_BLOB *server_chal,
141 const DATA_BLOB *names_blob,
142 DATA_BLOB *lm_response, DATA_BLOB *nt_response,
143 DATA_BLOB *lm_session_key, DATA_BLOB *user_session_key) ;
145 /***********************************************************
146 encode a password buffer with a unicode password. The buffer
147 is filled with random data to make it harder to attack.
148 ************************************************************/
149 bool encode_pw_buffer(uint8_t buffer[516], const char *password, int string_flags);
151 /***********************************************************
152 decode a password buffer
153 *new_pw_len is the length in bytes of the possibly mulitbyte
154 returned password including termination.
155 ************************************************************/
156 bool decode_pw_buffer(TALLOC_CTX *ctx,
157 uint8_t in_buffer[516],
158 char **pp_new_pwrd,
159 size_t *new_pw_len,
160 charset_t string_charset);
162 /***********************************************************
163 Decode an arc4 encrypted password change buffer.
164 ************************************************************/
165 void encode_or_decode_arc4_passwd_buffer(unsigned char pw_buf[532], const DATA_BLOB *psession_key);
167 /***********************************************************
168 encode a password buffer with an already unicode password. The
169 rest of the buffer is filled with random data to make it harder to attack.
170 ************************************************************/
171 bool set_pw_in_buffer(uint8_t buffer[516], DATA_BLOB *password);
173 /***********************************************************
174 decode a password buffer
175 *new_pw_size is the length in bytes of the extracted unicode password
176 ************************************************************/
177 bool extract_pw_from_buffer(TALLOC_CTX *mem_ctx,
178 uint8_t in_buffer[516], DATA_BLOB *new_pass);
179 void encode_wkssvc_join_password_buffer(TALLOC_CTX *mem_ctx,
180 const char *pwd,
181 DATA_BLOB *session_key,
182 struct wkssvc_PasswordBuffer **pwd_buf);
183 WERROR decode_wkssvc_join_password_buffer(TALLOC_CTX *mem_ctx,
184 struct wkssvc_PasswordBuffer *pwd_buf,
185 DATA_BLOB *session_key,
186 char **pwd);
188 /* The following definitions come from /home/jeremy/src/samba/git/master/source3/../source4/../libcli/auth/smbdes.c */
190 void des_crypt56(uint8_t out[8], const uint8_t in[8], const uint8_t key[7], int forw);
191 void E_P16(const uint8_t *p14,uint8_t *p16);
192 void E_P24(const uint8_t *p21, const uint8_t *c8, uint8_t *p24);
193 void D_P16(const uint8_t *p14, const uint8_t *in, uint8_t *out);
194 void E_old_pw_hash( uint8_t *p14, const uint8_t *in, uint8_t *out);
195 void des_crypt128(uint8_t out[8], const uint8_t in[8], const uint8_t key[16]);
196 void des_crypt64(uint8_t out[8], const uint8_t in[8], const uint8_t key[8], int forw);
197 void des_crypt112(uint8_t out[8], const uint8_t in[8], const uint8_t key[14], int forw);
198 void des_crypt112_16(uint8_t out[16], const uint8_t in[16], const uint8_t key[14], int forw);
199 void sam_rid_crypt(unsigned int rid, const uint8_t *in, uint8_t *out, int forw);
200 #undef _PRINTF_ATTRIBUTE
201 #define _PRINTF_ATTRIBUTE(a1, a2)
203 #endif