r4618: - tidied up the alter_context client code a bit
[metze/samba/wb-ndr.git] / source / librpc / rpc / dcerpc_auth.c
1 /* 
2    Unix SMB/CIFS implementation.
3
4    Generic Authentication Interface
5
6    Copyright (C) Andrew Tridgell 2003
7    Copyright (C) Andrew Bartlett <abartlet@samba.org> 2004
8
9    
10    This program is free software; you can redistribute it and/or modify
11    it under the terms of the GNU General Public License as published by
12    the Free Software Foundation; either version 2 of the License, or
13    (at your option) any later version.
14    
15    This program is distributed in the hope that it will be useful,
16    but WITHOUT ANY WARRANTY; without even the implied warranty of
17    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
18    GNU General Public License for more details.
19    
20    You should have received a copy of the GNU General Public License
21    along with this program; if not, write to the Free Software
22    Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
23 */
24
25 #include "includes.h"
26
27 /*
28   do a non-athenticated dcerpc bind
29 */
30 NTSTATUS dcerpc_bind_auth_none(struct dcerpc_pipe *p,
31                                const char *uuid, uint_t version)
32 {
33         TALLOC_CTX *mem_ctx;
34         NTSTATUS status;
35
36         mem_ctx = talloc_init("dcerpc_bind_auth_ntlm");
37         if (!mem_ctx) {
38                 return NT_STATUS_NO_MEMORY;
39         }
40
41         status = dcerpc_bind_byuuid(p, mem_ctx, uuid, version);
42         talloc_destroy(mem_ctx);
43
44         return status;
45 }
46
47 NTSTATUS dcerpc_bind_auth3(struct dcerpc_pipe *p, uint8_t auth_type, uint8_t auth_level,
48                            const char *uuid, uint_t version)
49 {
50         NTSTATUS status;
51         TALLOC_CTX *mem_ctx;
52         DATA_BLOB credentials;
53         DATA_BLOB null_data_blob = data_blob(NULL, 0);
54
55         mem_ctx = talloc_init("dcerpc_bind_auth");
56         if (!mem_ctx) {
57                 return NT_STATUS_NO_MEMORY;
58         }
59         
60         if (!p->conn->security_state.generic_state) {
61                 status = gensec_client_start(p, &p->conn->security_state.generic_state);
62                 if (!NT_STATUS_IS_OK(status)) {
63                         return status;
64                 }
65
66                 status = gensec_start_mech_by_authtype(p->conn->security_state.generic_state, 
67                                                        auth_type, auth_level);
68
69                 if (!NT_STATUS_IS_OK(status)) {
70                         return status;
71                 }
72         }
73
74         p->conn->security_state.auth_info = talloc(p, struct dcerpc_auth);
75         if (!p->conn->security_state.auth_info) {
76                 status = NT_STATUS_NO_MEMORY;
77                 goto done;
78         }
79
80         p->conn->security_state.auth_info->auth_type = auth_type;
81         p->conn->security_state.auth_info->auth_level = auth_level;
82         p->conn->security_state.auth_info->auth_pad_length = 0;
83         p->conn->security_state.auth_info->auth_reserved = 0;
84         p->conn->security_state.auth_info->auth_context_id = random();
85         p->conn->security_state.auth_info->credentials = null_data_blob;
86
87         status = gensec_update(p->conn->security_state.generic_state, mem_ctx,
88                                null_data_blob,
89                                &credentials);
90         
91         if (!NT_STATUS_EQUAL(status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
92                 goto done;
93         }
94
95         p->conn->security_state.auth_info->credentials = credentials;
96
97         status = dcerpc_bind_byuuid(p, mem_ctx, uuid, version);
98         if (!NT_STATUS_IS_OK(status)) {
99                 goto done;
100         }
101
102         status = gensec_update(p->conn->security_state.generic_state, mem_ctx,
103                                p->conn->security_state.auth_info->credentials,
104                                &credentials);
105
106         if (!NT_STATUS_EQUAL(status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
107                 goto done;
108         }
109
110         p->conn->security_state.auth_info->credentials = credentials;
111         
112         status = dcerpc_auth3(p->conn, mem_ctx);
113 done:
114         talloc_destroy(mem_ctx);
115
116         if (!NT_STATUS_IS_OK(status)) {
117                 talloc_free(p->conn->security_state.generic_state);
118                 ZERO_STRUCT(p->conn->security_state);
119         } else {
120                 /* Authenticated connections use the generic session key */
121                 p->conn->security_state.session_key = dcerpc_generic_session_key;
122         }
123
124         return status;
125 }