r9742: merging reg_objects and NT_PRINTER_DATA changes from SAMBA_3_0
[Samba.git] / source / include / client.h
blobd7418cc42be33d1d5cd0dab78536d5dcc562c88d
1 /*
2 Unix SMB/CIFS implementation.
3 SMB parameters and setup
4 Copyright (C) Andrew Tridgell 1992-1998
5 Copyright (C) Luke Kenneth Casson Leighton 1996-1998
6 Copyright (C) Jeremy Allison 1998
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
20 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
23 #ifndef _CLIENT_H
24 #define _CLIENT_H
26 /* the client asks for a smaller buffer to save ram and also to get more
27 overlap on the wire. This size gives us a nice read/write size, which
28 will be a multiple of the page size on almost any system */
29 #define CLI_BUFFER_SIZE (0xFFFF)
30 #define CLI_MAX_LARGE_READX_SIZE (127*1024)
33 * These definitions depend on smb.h
36 typedef struct file_info
38 SMB_BIG_UINT size;
39 uint16 mode;
40 uid_t uid;
41 gid_t gid;
42 /* these times are normally kept in GMT */
43 time_t mtime;
44 time_t atime;
45 time_t ctime;
46 pstring name;
47 char short_name[13*3]; /* the *3 is to cope with multi-byte */
48 } file_info;
50 struct print_job_info
52 uint16 id;
53 uint16 priority;
54 size_t size;
55 fstring user;
56 fstring name;
57 time_t t;
60 struct rpc_pipe_client {
61 TALLOC_CTX *mem_ctx;
63 struct cli_state *cli;
65 int pipe_idx;
66 uint16 fnum;
68 int pipe_auth_flags;
70 NTLMSSP_STATE *ntlmssp_pipe_state;
71 const char *user_name;
72 const char *domain;
73 struct pwd_info pwd;
75 struct schannel_auth_struct auth_info;
77 uint16 max_xmit_frag;
78 uint16 max_recv_frag;
81 struct cli_state {
82 int port;
83 int fd;
84 int smb_rw_error; /* Copy of last read or write error. */
85 uint16 cnum;
86 uint16 pid;
87 uint16 mid;
88 uint16 vuid;
89 int protocol;
90 int sec_mode;
91 int rap_error;
92 int privileges;
94 fstring desthost;
95 fstring user_name;
96 fstring domain;
99 * The following strings are the
100 * ones returned by the server if
101 * the protocol > NT1.
103 fstring server_type;
104 fstring server_os;
105 fstring server_domain;
107 fstring share;
108 fstring dev;
109 struct nmb_name called;
110 struct nmb_name calling;
111 fstring full_dest_host_name;
112 struct in_addr dest_ip;
114 struct pwd_info pwd;
115 DATA_BLOB secblob; /* cryptkey or negTokenInit */
116 uint32 sesskey;
117 int serverzone;
118 uint32 servertime;
119 int readbraw_supported;
120 int writebraw_supported;
121 int timeout; /* in milliseconds. */
122 size_t max_xmit;
123 size_t max_mux;
124 char *outbuf;
125 char *inbuf;
126 unsigned int bufsize;
127 int initialised;
128 int win95;
129 uint32 capabilities;
130 BOOL dfsroot;
132 TALLOC_CTX *mem_ctx;
134 smb_sign_info sign_info;
136 /* the session key for this CLI, outside
137 any per-pipe authenticaion */
138 DATA_BLOB user_session_key;
141 * Only used in NT domain calls.
144 int pipe_idx; /* Index (into list of known pipes)
145 of the pipe we're talking to,
146 if any */
148 struct rpc_pipe_client pipes[PI_MAX_PIPES];
150 /* Secure pipe parameters */
151 int pipe_auth_flags;
153 struct rpc_pipe_client netlogon_pipe; /* The "first" pipe to get
154 the session key for the
155 schannel. */
156 unsigned char sess_key[16]; /* Current session key. */
157 DOM_CRED clnt_cred; /* Client credential. */
158 fstring mach_acct; /* MYNAME$. */
159 fstring srv_name_slash; /* \\remote server. */
160 fstring clnt_name_slash; /* \\local client. */
162 BOOL use_kerberos;
163 BOOL fallback_after_kerberos;
164 BOOL use_spnego;
166 BOOL use_oplocks; /* should we use oplocks? */
167 BOOL use_level_II_oplocks; /* should we use level II oplocks? */
169 /* a oplock break request handler */
170 BOOL (*oplock_handler)(struct cli_state *cli, int fnum, unsigned char level);
172 BOOL force_dos_errors;
173 BOOL case_sensitive; /* False by default. */
175 /* was this structure allocated by cli_initialise? If so, then
176 free in cli_shutdown() */
177 BOOL allocated;
179 /* Name of the pipe we're talking to, if any */
180 fstring pipe_name;
183 #define CLI_FULL_CONNECTION_DONT_SPNEGO 0x0001
184 #define CLI_FULL_CONNECTION_USE_KERBEROS 0x0002
185 #define CLI_FULL_CONNECTION_ANNONYMOUS_FALLBACK 0x0004
187 #endif /* _CLIENT_H */