Signed-off-by: Stefan Metzmacher <metze@samba.org>
-NTSTATUS ntlmssp_server_step(struct gensec_security *gensec_security,
+NTSTATUS auth_generic_server_step(struct gensec_security *gensec_security,
TALLOC_CTX *mem_ctx,
DATA_BLOB *token_in,
DATA_BLOB *token_out)
TALLOC_CTX *mem_ctx,
DATA_BLOB *token_in,
DATA_BLOB *token_out)
-NTSTATUS ntlmssp_server_check_flags(struct gensec_security *gensec_security,
+NTSTATUS auth_generic_server_check_flags(struct gensec_security *gensec_security,
bool do_sign, bool do_seal)
{
if (do_sign && !gensec_have_feature(gensec_security, GENSEC_FEATURE_SIGN)) {
bool do_sign, bool do_seal)
{
if (do_sign && !gensec_have_feature(gensec_security, GENSEC_FEATURE_SIGN)) {
-NTSTATUS ntlmssp_server_get_user_info(struct gensec_security *gensec_security,
+NTSTATUS auth_generic_server_get_user_info(struct gensec_security *gensec_security,
TALLOC_CTX *mem_ctx,
struct auth_session_info **session_info)
{
TALLOC_CTX *mem_ctx,
struct auth_session_info **session_info)
{
DATA_BLOB *token_out,
const struct tsocket_address *remote_address,
struct gensec_security **ctx);
DATA_BLOB *token_out,
const struct tsocket_address *remote_address,
struct gensec_security **ctx);
-NTSTATUS ntlmssp_server_step(struct gensec_security *ctx,
+NTSTATUS auth_generic_server_step(struct gensec_security *ctx,
TALLOC_CTX *mem_ctx,
DATA_BLOB *token_in,
DATA_BLOB *token_out);
TALLOC_CTX *mem_ctx,
DATA_BLOB *token_in,
DATA_BLOB *token_out);
-NTSTATUS ntlmssp_server_check_flags(struct gensec_security *ctx,
+NTSTATUS auth_generic_server_check_flags(struct gensec_security *ctx,
bool do_sign, bool do_seal);
bool do_sign, bool do_seal);
-NTSTATUS ntlmssp_server_get_user_info(struct gensec_security *ctx,
+NTSTATUS auth_generic_server_get_user_info(struct gensec_security *ctx,
TALLOC_CTX *mem_ctx,
struct auth_session_info **session_info);
TALLOC_CTX *mem_ctx,
struct auth_session_info **session_info);
mem_ctx, &token_in, &token_out);
break;
case SPNEGO_NTLMSSP:
mem_ctx, &token_in, &token_out);
break;
case SPNEGO_NTLMSSP:
- status = ntlmssp_server_step(
+ status = auth_generic_server_step(
sp_ctx->mech_ctx.gensec_security,
mem_ctx, &token_in, &token_out);
break;
sp_ctx->mech_ctx.gensec_security,
mem_ctx, &token_in, &token_out);
break;
ensure the underlying NTLMSSP flags are also set. If not we should
refuse the bind. */
ensure the underlying NTLMSSP flags are also set. If not we should
refuse the bind. */
- status = ntlmssp_server_check_flags(gensec_security,
+ status = auth_generic_server_check_flags(gensec_security,
(auth_level ==
DCERPC_AUTH_LEVEL_INTEGRITY),
(auth_level ==
(auth_level ==
DCERPC_AUTH_LEVEL_INTEGRITY),
(auth_level ==
TALLOC_FREE(*session_info);
TALLOC_FREE(*session_info);
- status = ntlmssp_server_get_user_info(gensec_security,
+ status = auth_generic_server_get_user_info(gensec_security,
mem_ctx, session_info);
if (!NT_STATUS_IS_OK(status)) {
DEBUG(0, (__location__ ": failed to obtain the server info "
mem_ctx, session_info);
if (!NT_STATUS_IS_OK(status)) {
DEBUG(0, (__location__ ": failed to obtain the server info "
case DCERPC_AUTH_TYPE_NTLMSSP:
gensec_security = talloc_get_type_abort(p->auth.auth_ctx,
struct gensec_security);
case DCERPC_AUTH_TYPE_NTLMSSP:
gensec_security = talloc_get_type_abort(p->auth.auth_ctx,
struct gensec_security);
- status = ntlmssp_server_step(gensec_security,
+ status = auth_generic_server_step(gensec_security,
pkt, &auth_info.credentials,
&response);
break;
pkt, &auth_info.credentials,
&response);
break;
case DCERPC_AUTH_TYPE_NTLMSSP:
gensec_security = talloc_get_type_abort(p->auth.auth_ctx,
struct gensec_security);
case DCERPC_AUTH_TYPE_NTLMSSP:
gensec_security = talloc_get_type_abort(p->auth.auth_ctx,
struct gensec_security);
- status = ntlmssp_server_step(gensec_security,
+ status = auth_generic_server_step(gensec_security,
pkt,
&auth_info.credentials,
&auth_resp);
pkt,
&auth_info.credentials,
&auth_resp);