DATA_BLOB session_key;
bool do_signing;
- user_struct *compat_vuser;
+ struct user_struct *compat_vuser;
struct {
/* an id tree used to allocate tids */
char* name;
/* With share level security vuid will always be zero.
Don't depend on vuser being non-null !!. JRA */
- user_struct *vuser = get_valid_user_struct(sconn, vuid);
+ struct user_struct *vuser = get_valid_user_struct(sconn, vuid);
if (!str1 || !str2 || !p) {
return False;
/* Check whether this api call can be done anonymously */
if (api_commands[i].auth_user && lp_restrict_anonymous()) {
- user_struct *user = get_valid_user_struct(req->sconn, vuid);
+ struct user_struct *user = get_valid_user_struct(req->sconn, vuid);
if (!user || security_session_user_level(user->session_info, NULL) < SECURITY_USER) {
reply_nterror(req, NT_STATUS_ACCESS_DENIED);
SERVER_ALLOCATED_REQUIRED_NO,
SERVER_ALLOCATED_REQUIRED_ANY};
-static user_struct *get_valid_user_struct_internal(
+static struct user_struct *get_valid_user_struct_internal(
struct smbd_server_connection *sconn,
uint16 vuid,
enum server_allocated_state server_allocated)
{
- user_struct *usp;
+ struct user_struct *usp;
int count=0;
if (vuid == UID_FIELD_INVALID)
tell random client vuid's (normally zero) from valid vuids.
****************************************************************************/
-user_struct *get_valid_user_struct(struct smbd_server_connection *sconn,
+struct user_struct *get_valid_user_struct(struct smbd_server_connection *sconn,
uint16 vuid)
{
return get_valid_user_struct_internal(sconn, vuid,
Get the user struct of a partial NTLMSSP login
****************************************************************************/
-user_struct *get_partial_auth_user_struct(struct smbd_server_connection *sconn,
+struct user_struct *get_partial_auth_user_struct(struct smbd_server_connection *sconn,
uint16 vuid)
{
return get_valid_user_struct_internal(sconn, vuid,
void invalidate_vuid(struct smbd_server_connection *sconn, uint16 vuid)
{
- user_struct *vuser = NULL;
+ struct user_struct *vuser = NULL;
vuser = get_valid_user_struct_internal(sconn, vuid,
SERVER_ALLOCATED_REQUIRED_ANY);
int register_initial_vuid(struct smbd_server_connection *sconn)
{
- user_struct *vuser;
+ struct user_struct *vuser;
/* Limit allowed vuids to 16bits - VUID_OFFSET. */
if (sconn->num_users >= 0xFFFF-VUID_OFFSET) {
return UID_FIELD_INVALID;
}
- if((vuser = talloc_zero(NULL, user_struct)) == NULL) {
+ if((vuser = talloc_zero(NULL, struct user_struct)) == NULL) {
DEBUG(0,("register_initial_vuid: "
"Failed to talloc users struct!\n"));
return UID_FIELD_INVALID;
struct auth_session_info *session_info,
DATA_BLOB response_blob)
{
- user_struct *vuser;
+ struct user_struct *vuser;
bool guest = security_session_user_level(session_info, NULL) < SECURITY_USER;
vuser = get_partial_auth_user_struct(sconn, vuid);
*/
if (session_tag != sconn->smb1.sessions.last_session_tag) {
- user_struct *vuser = NULL;
+ struct user_struct *vuser = NULL;
sconn->smb1.sessions.last_session_tag = session_tag;
if(session_tag != UID_FIELD_INVALID) {
/* The following definitions come from smbd/password.c */
-user_struct *get_valid_user_struct(struct smbd_server_connection *sconn,
+struct user_struct *get_valid_user_struct(struct smbd_server_connection *sconn,
uint16 vuid);
bool is_partial_auth_vuid(struct smbd_server_connection *sconn, uint16 vuid);
-user_struct *get_partial_auth_user_struct(struct smbd_server_connection *sconn,
+struct user_struct *get_partial_auth_user_struct(struct smbd_server_connection *sconn,
uint16 vuid);
void invalidate_vuid(struct smbd_server_connection *sconn, uint16 vuid);
void invalidate_all_vuids(struct smbd_server_connection *sconn);
struct smbd_smb2_tcon;
connection_struct *make_connection_smb2(struct smbd_server_connection *sconn,
struct smbd_smb2_tcon *tcon,
- user_struct *vuser,
+ struct user_struct *vuser,
const char *pdev,
NTSTATUS *pstatus);
connection_struct *make_connection(struct smbd_server_connection *sconn,
/* The following definitions come from smbd/session.c */
struct sessionid;
bool session_init(void);
-bool session_claim(struct smbd_server_connection *sconn, user_struct *vuser);
-void session_yield(user_struct *vuser);
+bool session_claim(struct smbd_server_connection *sconn, struct user_struct *vuser);
+void session_yield(struct user_struct *vuser);
int list_sessions(TALLOC_CTX *mem_ctx, struct sessionid **session_list);
/* The following definitions come from smbd/sesssetup.c */
void reply_ulogoffX(struct smb_request *req)
{
struct smbd_server_connection *sconn = req->sconn;
- user_struct *vuser;
+ struct user_struct *vuser;
START_PROFILE(SMBulogoffX);
static NTSTATUS make_connection_snum(struct smbd_server_connection *sconn,
connection_struct *conn,
- int snum, user_struct *vuser,
+ int snum, struct user_struct *vuser,
const char *pdev)
{
struct smb_filename *smb_fname_cpath = NULL;
****************************************************************************/
static connection_struct *make_connection_smb1(struct smbd_server_connection *sconn,
- int snum, user_struct *vuser,
+ int snum, struct user_struct *vuser,
const char *pdev,
NTSTATUS *pstatus)
{
connection_struct *make_connection_smb2(struct smbd_server_connection *sconn,
struct smbd_smb2_tcon *tcon,
- user_struct *vuser,
+ struct user_struct *vuser,
const char *pdev,
NTSTATUS *pstatus)
{
NTSTATUS *status)
{
uid_t euid;
- user_struct *vuser = NULL;
+ struct user_struct *vuser = NULL;
char *service = NULL;
fstring dev;
int snum = -1;
called when a session is created
********************************************************************/
-bool session_claim(struct smbd_server_connection *sconn, user_struct *vuser)
+bool session_claim(struct smbd_server_connection *sconn, struct user_struct *vuser)
{
struct server_id pid = messaging_server_id(sconn->msg_ctx);
TDB_DATA data;
called when a session is destroyed
********************************************************************/
-void session_yield(user_struct *vuser)
+void session_yield(struct user_struct *vuser)
{
struct sessionid sessionid;
struct db_record *rec;
uint16 data_blob_len = SVAL(req->vwv+7, 0);
enum remote_arch_types ra_type = get_remote_arch();
int vuid = req->vuid;
- user_struct *vuser = NULL;
+ struct user_struct *vuser = NULL;
NTSTATUS status = NT_STATUS_OK;
struct smbd_server_connection *sconn = req->sconn;
uint16_t action = 0;
session->session_key = session->session_info->session_key;
- session->compat_vuser = talloc_zero(session, user_struct);
+ session->compat_vuser = talloc_zero(session, struct user_struct);
if (session->compat_vuser == NULL) {
TALLOC_FREE(session);
return NT_STATUS_NO_MEMORY;
int snum = -1;
struct smbd_smb2_tcon *tcon;
connection_struct *compat_conn = NULL;
- user_struct *compat_vuser = req->session->compat_vuser;
+ struct user_struct *compat_vuser = req->session->compat_vuser;
int id;
NTSTATUS status;
bool change_to_user(connection_struct *conn, uint16_t vuid)
{
const struct auth_session_info *session_info = NULL;
- user_struct *vuser;
+ struct user_struct *vuser;
int snum = SNUM(conn);
if (!conn) {