s4:kdc: Implement KDC plugin hardware authentication policy
[samba.git] / source4 / param / loadparm.c
index b1c3db6e7e11414899be3470db87f5a1660dbef2..7d3891dc0b9df2c483bb1d215d9b4029e14938f1 100644 (file)
 #include "includes.h"
 #include "lib/param/param.h"
 #include "libcli/raw/libcliraw.h"
-#include "rpc_server/common/common.h"
+#include "librpc/ndr/libndr.h"
+#include "libcli/smb/smb2_negotiate_context.h"
 
 void lpcfg_smbcli_options(struct loadparm_context *lp_ctx,
                         struct smbcli_options *options)
 {
-       options->max_xmit = lpcfg_max_xmit(lp_ctx);
-       options->max_mux = lpcfg_maxmux(lp_ctx);
-       options->use_spnego = lpcfg_nt_status_support(lp_ctx) && lpcfg_use_spnego(lp_ctx);
-       options->signing = lpcfg_client_signing(lp_ctx);
-       options->request_timeout = SMB_REQUEST_TIMEOUT;
-       options->ntstatus_support = lpcfg_nt_status_support(lp_ctx);
-       options->max_protocol = lpcfg_cli_maxprotocol(lp_ctx);
-       options->unicode = lpcfg_unicode(lp_ctx);
-       options->use_oplocks = true;
-       options->use_level2_oplocks = true;
+       struct GUID client_guid;
+       const char *str = NULL;
+
+       str = lpcfg_parm_string(lp_ctx, NULL, "libsmb", "client_guid");
+       if (str != NULL) {
+               GUID_from_string(str, &client_guid);
+       } else {
+               client_guid = GUID_random();
+       }
+       *options = (struct smbcli_options) {
+               .max_xmit = lpcfg_max_xmit(lp_ctx),
+               .max_mux = lpcfg_max_mux(lp_ctx),
+               .use_spnego = lpcfg_nt_status_support(lp_ctx) && lpcfg_client_use_spnego(lp_ctx),
+               .signing = lpcfg_client_signing(lp_ctx),
+               .request_timeout = SMB_REQUEST_TIMEOUT,
+               .ntstatus_support = lpcfg_nt_status_support(lp_ctx),
+               .min_protocol = lpcfg_client_min_protocol(lp_ctx),
+               .max_protocol = lpcfg__client_max_protocol(lp_ctx),
+               .unicode = lpcfg_unicode(lp_ctx),
+               .use_oplocks = true,
+               .use_level2_oplocks = true,
+               .smb2_capabilities = SMB2_CAP_ALL,
+               .client_guid = client_guid,
+               .max_credits = WINDOWS_CLIENT_PURE_SMB2_NEGPROT_INITIAL_CREDIT_ASK,
+               .smb3_capabilities = smb311_capabilities_parse("client",
+                       lpcfg_client_smb3_signing_algorithms(lp_ctx),
+                       lpcfg_client_smb3_encryption_algorithms(lp_ctx)),
+       };
 }
 
 void lpcfg_smbcli_session_options(struct loadparm_context *lp_ctx,
                                 struct smbcli_session_options *options)
 {
-       options->lanman_auth = lpcfg_client_lanman_auth(lp_ctx);
-       options->ntlmv2_auth = lpcfg_client_ntlmv2_auth(lp_ctx);
-       options->plaintext_auth = lpcfg_client_plaintext_auth(lp_ctx);
-}
-
-_PUBLIC_ struct dcerpc_server_info *lpcfg_dcerpc_server_info(TALLOC_CTX *mem_ctx, struct loadparm_context *lp_ctx)
-{
-       struct dcerpc_server_info *ret = talloc_zero(mem_ctx, struct dcerpc_server_info);
-
-       ret->domain_name = talloc_reference(mem_ctx, lpcfg_workgroup(lp_ctx));
-       ret->version_major = lpcfg_parm_int(lp_ctx, NULL, "server_info", "version_major", 5);
-       ret->version_minor = lpcfg_parm_int(lp_ctx, NULL, "server_info", "version_minor", 2);
-       ret->version_build = lpcfg_parm_int(lp_ctx, NULL, "server_info", "version_build", 3790);
-
-       return ret;
+       *options = (struct smbcli_session_options) {
+               .lanman_auth = lpcfg_client_lanman_auth(lp_ctx),
+               .ntlmv2_auth = lpcfg_client_ntlmv2_auth(lp_ctx),
+               .plaintext_auth = lpcfg_client_plaintext_auth(lp_ctx),
+       };
 }