s3:utils: let smbstatus report anonymous signing/encryption explicitly
[samba.git] / source4 / auth / session.h
index 97a8aba0f141c470f6239163e26be34e5b074d69..3258c807137d177792e49d8c4adc2ca30af81c1c 100644 (file)
 #ifndef _SAMBA_AUTH_SESSION_H
 #define _SAMBA_AUTH_SESSION_H
 
+#include "lib/util/data_blob.h"
 #include "librpc/gen_ndr/security.h"
+#include "libcli/util/werror.h"
+#include "lib/util/time.h"
 #include "librpc/gen_ndr/netlogon.h"
 #include "librpc/gen_ndr/auth.h"
 
+struct loadparm_context;
 struct tevent_context;
 struct ldb_context;
 struct ldb_dn;
 /* Create a security token for a session SYSTEM (the most
- * trusted/prvilaged account), including the local machine account as
+ * trusted/privileged account), including the local machine account as
  * the off-host credentials */
 struct auth_session_info *system_session(struct loadparm_context *lp_ctx) ;
 
+enum claims_data_present {
+       CLAIMS_DATA_ENCODED_CLAIMS_PRESENT = 0x01,
+       CLAIMS_DATA_CLAIMS_PRESENT = 0x02,
+       CLAIMS_DATA_SECURITY_CLAIMS_PRESENT = 0x04,
+};
+
+struct claims_data {
+       DATA_BLOB encoded_claims_set;
+       struct CLAIMS_SET *claims_set;
+       /*
+        * These security claims are here treated as only a product — the result
+        * of conversion from another format — and ought not to be treated as
+        * authoritative.
+        */
+       struct CLAIM_SECURITY_ATTRIBUTE_RELATIVE_V1 *security_claims;
+       uint32_t n_security_claims;
+       enum claims_data_present flags;
+};
+
+struct auth_claims {
+       struct claims_data *user_claims;
+       struct claims_data *device_claims;
+};
+
 NTSTATUS auth_anonymous_user_info_dc(TALLOC_CTX *mem_ctx,
                                             const char *netbios_name,
                                             struct auth_user_info_dc **interim_info);
+NTSTATUS auth_generate_security_token(TALLOC_CTX *mem_ctx,
+                                      struct loadparm_context *lp_ctx, /* Optional, if you don't want privileges */
+                                      struct ldb_context *sam_ctx, /* Optional, if you don't want local groups */
+                                      const struct auth_user_info_dc *user_info_dc,
+                                      const struct auth_user_info_dc *device_info_dc,
+                                      const struct auth_claims auth_claims,
+                                      uint32_t session_info_flags,
+                                      struct security_token **_security_token);
 NTSTATUS auth_generate_session_info(TALLOC_CTX *mem_ctx,
-                                   struct loadparm_context *lp_ctx, /* Optional, if you don't want privilages */
+                                   struct loadparm_context *lp_ctx, /* Optional, if you don't want privileges */
                                    struct ldb_context *sam_ctx, /* Optional, if you don't want local groups */
-                                   struct auth_user_info_dc *interim_info,
+                                   const struct auth_user_info_dc *user_info_dc,
                                    uint32_t session_info_flags,
                                    struct auth_session_info **session_info);
 NTSTATUS auth_anonymous_session_info(TALLOC_CTX *parent_ctx, 
@@ -55,7 +91,7 @@ NTSTATUS auth_session_info_transport_from_session(TALLOC_CTX *mem_ctx,
                                                  struct loadparm_context *lp_ctx,
                                                  struct auth_session_info_transport **transport_out);
 
-/* Produce a session_info for an arbitary DN or principal in the local
+/* Produce a session_info for an arbitrary DN or principal in the local
  * DB, assuming the local DB holds all the groups
  *
  * Supply either a principal or a DN
@@ -75,5 +111,42 @@ struct auth_session_info *admin_session(TALLOC_CTX *mem_ctx,
                                        struct loadparm_context *lp_ctx,
                                        struct dom_sid *domain_sid);
 
+NTSTATUS encode_claims_set(TALLOC_CTX *mem_ctx,
+                          struct CLAIMS_SET *claims_set,
+                          DATA_BLOB *claims_blob);
+
+/*
+ * Construct a ‘claims_data’ structure from a claims blob, such as is found in a
+ * PAC.
+ */
+NTSTATUS claims_data_from_encoded_claims_set(TALLOC_CTX *claims_data_ctx,
+                                            const DATA_BLOB *encoded_claims_set,
+                                            struct claims_data **out);
+
+/*
+ * Construct a ‘claims_data’ structure from a talloc‐allocated claims set, such
+ * as we might build from searching the database. If this function returns
+ * successfully, it assumes ownership of the claims set.
+ */
+NTSTATUS claims_data_from_claims_set(TALLOC_CTX *claims_data_ctx,
+                                    struct CLAIMS_SET *claims_set,
+                                    struct claims_data **out);
+
+/*
+ * From a ‘claims_data’ structure, return an encoded claims blob that can be put
+ * into a PAC.
+ */
+NTSTATUS claims_data_encoded_claims_set(TALLOC_CTX *mem_ctx,
+                                       struct claims_data *claims_data,
+                                       DATA_BLOB *encoded_claims_set_out);
+
+/*
+ * From a ‘claims_data’ structure, return an array of security claims that can
+ * be put in a security token for access checks.
+ */
+NTSTATUS claims_data_security_claims(TALLOC_CTX *mem_ctx,
+                                    struct claims_data *claims_data,
+                                    struct CLAIM_SECURITY_ATTRIBUTE_RELATIVE_V1 **security_claims_out,
+                                    uint32_t *n_security_claims_out);
 
 #endif /* _SAMBA_AUTH_SESSION_H */