2 Unix SMB/CIFS implementation.
3 SMB parameters and setup
4 Copyright (C) Andrew Tridgell 1992-1998
5 Copyright (C) Luke Kenneth Casson Leighton 1996-1998
6 Copyright (C) Jeremy Allison 1998
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program. If not, see <http://www.gnu.org/licenses/>.
25 #define CLI_BUFFER_SIZE (0xFFFF)
28 * These definitions depend on smb.h
31 struct print_job_info {
42 * A list of subsidiary connections for DFS.
44 struct cli_state *prev, *next;
47 NTSTATUS raw_status; /* maybe via NT_STATUS_DOS() */
49 /* The credentials used to open the cli_state connection. */
52 char *password; /* Can be null to force use of zero NTLMSSP session key. */
55 * The following strings are the
56 * ones returned by the server if
66 DATA_BLOB secblob; /* cryptkey or negTokenInit */
70 int readbraw_supported;
71 int writebraw_supported;
72 int timeout; /* in milliseconds. */
79 /* What the server offered. */
80 uint32_t server_posix_capabilities;
81 /* What the client requested. */
82 uint32_t requested_posix_capabilities;
85 struct smb_signing_state *signing_state;
87 struct smb_trans_enc_state *trans_enc_state; /* Setup if we're encrypting SMB's. */
89 /* the session key for this CLI, outside
90 any per-pipe authenticaion */
91 DATA_BLOB user_session_key;
93 /* The list of pipes currently open on this connection. */
94 struct rpc_pipe_client *pipe_list;
97 bool fallback_after_kerberos;
99 bool got_kerberos_mechanism; /* Server supports krb5 in SPNEGO. */
101 bool use_oplocks; /* should we use oplocks? */
103 bool case_sensitive; /* False by default. */
105 /* Where (if anywhere) this is mounted under DFS. */
106 char *dfs_mountpoint;
110 struct sockaddr_storage local_ss;
111 struct sockaddr_storage remote_ss;
112 const char *remote_name;
113 const char *remote_realm;
114 struct tevent_req *read_smb_req;
115 struct tevent_queue *outgoing;
116 struct tevent_req **pending;
118 * The incoming dispatch function should return:
119 * - NT_STATUS_RETRY, if more incoming PDUs are expected.
120 * - NT_STATUS_OK, if no more processing is desired, e.g.
121 * the dispatch function called
123 * - All other return values disconnect the connection.
125 NTSTATUS (*dispatch_incoming)(struct cli_state *cli,
129 enum protocol_types protocol;
147 uint16_t security_mode;
148 uint16_t dialect_revision;
149 struct GUID server_guid;
150 uint32_t server_capabilities;
151 uint32_t max_transact_size;
152 uint32_t max_read_size;
153 uint32_t max_write_size;
154 struct timespec system_time;
155 struct timespec server_start_time;
160 uint32_t share_flags;
161 uint32_t share_capabilities;
162 uint32_t maximal_access;
171 /* these times are normally kept in GMT */
172 struct timespec mtime_ts;
173 struct timespec atime_ts;
174 struct timespec ctime_ts;
179 #define CLI_FULL_CONNECTION_DONT_SPNEGO 0x0001
180 #define CLI_FULL_CONNECTION_USE_KERBEROS 0x0002
181 #define CLI_FULL_CONNECTION_ANONYMOUS_FALLBACK 0x0004
182 #define CLI_FULL_CONNECTION_FALLBACK_AFTER_KERBEROS 0x0008
183 #define CLI_FULL_CONNECTION_OPLOCKS 0x0010
184 #define CLI_FULL_CONNECTION_LEVEL_II_OPLOCKS 0x0020
185 #define CLI_FULL_CONNECTION_USE_CCACHE 0x0040
186 #define CLI_FULL_CONNECTION_FORCE_DOS_ERRORS 0x0080
187 #define CLI_FULL_CONNECTION_FORCE_ASCII 0x0100
189 #endif /* _CLIENT_H */