2 Unix SMB/CIFS implementation.
3 SMB parameters and setup
4 Copyright (C) Andrew Tridgell 1992-1998
5 Copyright (C) Luke Kenneth Casson Leighton 1996-1998
6 Copyright (C) Jeremy Allison 1998
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program. If not, see <http://www.gnu.org/licenses/>.
25 #define CLI_BUFFER_SIZE (0xFFFF)
28 * These definitions depend on smb.h
31 struct print_job_info {
42 * A list of subsidiary connections for DFS.
44 struct cli_state *prev, *next;
47 NTSTATUS raw_status; /* maybe via NT_STATUS_DOS() */
49 /* The credentials used to open the cli_state connection. */
52 char *password; /* Can be null to force use of zero NTLMSSP session key. */
55 * The following strings are the
56 * ones returned by the server if
66 DATA_BLOB secblob; /* cryptkey or negTokenInit */
70 int readbraw_supported;
71 int writebraw_supported;
72 int timeout; /* in milliseconds. */
78 /* What the server offered. */
79 uint32_t server_posix_capabilities;
80 /* What the client requested. */
81 uint32_t requested_posix_capabilities;
84 struct smb_signing_state *signing_state;
86 struct smb_trans_enc_state *trans_enc_state; /* Setup if we're encrypting SMB's. */
88 /* the session key for this CLI, outside
89 any per-pipe authenticaion */
90 DATA_BLOB user_session_key;
92 /* The list of pipes currently open on this connection. */
93 struct rpc_pipe_client *pipe_list;
96 bool fallback_after_kerberos;
98 bool got_kerberos_mechanism; /* Server supports krb5 in SPNEGO. */
100 bool use_oplocks; /* should we use oplocks? */
102 bool case_sensitive; /* False by default. */
104 /* Where (if anywhere) this is mounted under DFS. */
105 char *dfs_mountpoint;
109 struct sockaddr_storage local_ss;
110 struct sockaddr_storage remote_ss;
111 const char *remote_name;
112 const char *remote_realm;
113 struct tevent_req *read_smb_req;
114 struct tevent_queue *outgoing;
115 struct tevent_req **pending;
117 * The incoming dispatch function should return:
118 * - NT_STATUS_RETRY, if more incoming PDUs are expected.
119 * - NT_STATUS_OK, if no more processing is desired, e.g.
120 * the dispatch function called
122 * - All other return values disconnect the connection.
124 NTSTATUS (*dispatch_incoming)(struct cli_state *cli,
128 enum protocol_types protocol;
132 uint32_t capabilities;
136 uint32_t capabilities;
139 uint32_t capabilities;
158 uint16_t security_mode;
159 uint16_t dialect_revision;
160 struct GUID server_guid;
161 uint32_t server_capabilities;
162 uint32_t max_transact_size;
163 uint32_t max_read_size;
164 uint32_t max_write_size;
165 struct timespec system_time;
166 struct timespec server_start_time;
171 uint32_t share_flags;
172 uint32_t share_capabilities;
173 uint32_t maximal_access;
182 /* these times are normally kept in GMT */
183 struct timespec mtime_ts;
184 struct timespec atime_ts;
185 struct timespec ctime_ts;
190 #define CLI_FULL_CONNECTION_DONT_SPNEGO 0x0001
191 #define CLI_FULL_CONNECTION_USE_KERBEROS 0x0002
192 #define CLI_FULL_CONNECTION_ANONYMOUS_FALLBACK 0x0004
193 #define CLI_FULL_CONNECTION_FALLBACK_AFTER_KERBEROS 0x0008
194 #define CLI_FULL_CONNECTION_OPLOCKS 0x0010
195 #define CLI_FULL_CONNECTION_LEVEL_II_OPLOCKS 0x0020
196 #define CLI_FULL_CONNECTION_USE_CCACHE 0x0040
197 #define CLI_FULL_CONNECTION_FORCE_DOS_ERRORS 0x0080
198 #define CLI_FULL_CONNECTION_FORCE_ASCII 0x0100
200 #endif /* _CLIENT_H */