1/*
2   Unix SMB/CIFS implementation.
3   SMB parameters and setup
4   Copyright (C) Andrew Tridgell 1992-1998
5   Copyright (C) Luke Kenneth Casson Leighton 1996-1998
6   Copyright (C) Jeremy Allison 1998
7
8   This program is free software; you can redistribute it and/or modify
9   it under the terms of the GNU General Public License as published by
10   the Free Software Foundation; either version 2 of the License, or
11   (at your option) any later version.
12
13   This program is distributed in the hope that it will be useful,
14   but WITHOUT ANY WARRANTY; without even the implied warranty of
15   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
16   GNU General Public License for more details.
17
18   You should have received a copy of the GNU General Public License
19   along with this program; if not, write to the Free Software
20   Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
21*/
22
23#ifndef _CLIENT_H
24#define _CLIENT_H
25
26/* the client asks for a smaller buffer to save ram and also to get more
27   overlap on the wire. This size gives us a nice read/write size, which
28   will be a multiple of the page size on almost any system */
29#define CLI_BUFFER_SIZE (0xFFFF)
30
31
32/*
33 * These definitions depend on smb.h
34 */
35
36typedef struct file_info
37{
38	SMB_BIG_UINT size;
39	uint16 mode;
40	uid_t uid;
41	gid_t gid;
42	/* these times are normally kept in GMT */
43	time_t mtime;
44	time_t atime;
45	time_t ctime;
46	pstring name;
47	char short_name[13*3]; /* the *3 is to cope with multi-byte */
48} file_info;
49
50struct print_job_info
51{
52	uint16 id;
53	uint16 priority;
54	size_t size;
55	fstring user;
56	fstring name;
57	time_t t;
58};
59
60struct cli_state {
61	int port;
62	int fd;
63	int smb_rw_error; /* Copy of last read or write error. */
64	uint16 cnum;
65	uint16 pid;
66	uint16 mid;
67	uint16 vuid;
68	int protocol;
69	int sec_mode;
70	int rap_error;
71	int privileges;
72
73	fstring desthost;
74	fstring user_name;
75	fstring domain;
76
77	/*
78	 * The following strings are the
79	 * ones returned by the server if
80	 * the protocol > NT1.
81	 */
82	fstring server_type;
83	fstring server_os;
84	fstring server_domain;
85
86	fstring share;
87	fstring dev;
88	struct nmb_name called;
89	struct nmb_name calling;
90	fstring full_dest_host_name;
91	struct in_addr dest_ip;
92
93	struct pwd_info pwd;
94	DATA_BLOB secblob; /* cryptkey or negTokenInit */
95	uint32 sesskey;
96	int serverzone;
97	uint32 servertime;
98	int readbraw_supported;
99	int writebraw_supported;
100	int timeout; /* in milliseconds. */
101	size_t max_xmit;
102	size_t max_mux;
103	char *outbuf;
104	char *inbuf;
105	unsigned int bufsize;
106	int initialised;
107	int win95;
108	uint32 capabilities;
109
110	TALLOC_CTX *mem_ctx;
111
112	smb_sign_info sign_info;
113
114	/* the session key for this CLI, outside
115	   any per-pipe authenticaion */
116	DATA_BLOB user_session_key;
117
118	/*
119	 * Only used in NT domain calls.
120	 */
121
122	int pipe_idx;                      /* Index (into list of known pipes)
123					      of the pipe we're talking to,
124					      if any */
125
126	uint16 nt_pipe_fnum;               /* Pipe handle. */
127
128	/* Secure pipe parameters */
129	int pipe_auth_flags;
130
131	uint16 saved_netlogon_pipe_fnum;   /* The "first" pipe to get
132                                              the session key for the
133                                              schannel. */
134	struct netsec_auth_struct auth_info;
135
136	NTLMSSP_STATE *ntlmssp_pipe_state;
137
138	unsigned char sess_key[16];        /* Current session key. */
139	DOM_CRED clnt_cred;                /* Client credential. */
140	fstring mach_acct;                 /* MYNAME$. */
141	fstring srv_name_slash;            /* \\remote server. */
142	fstring clnt_name_slash;           /* \\local client. */
143	uint16 max_xmit_frag;
144	uint16 max_recv_frag;
145
146	BOOL use_kerberos;
147	BOOL use_spnego;
148
149	BOOL use_oplocks; /* should we use oplocks? */
150	BOOL use_level_II_oplocks; /* should we use level II oplocks? */
151
152	/* a oplock break request handler */
153	BOOL (*oplock_handler)(struct cli_state *cli, int fnum, unsigned char level);
154
155	BOOL force_dos_errors;
156
157	/* was this structure allocated by cli_initialise? If so, then
158           free in cli_shutdown() */
159	BOOL allocated;
160
161	/* Name of the pipe we're talking to, if any */
162	fstring pipe_name;
163};
164
165#define CLI_FULL_CONNECTION_DONT_SPNEGO 0x0001
166#define CLI_FULL_CONNECTION_USE_KERBEROS 0x0002
167#define CLI_FULL_CONNECTION_ANNONYMOUS_FALLBACK 0x0004
168
169#endif /* _CLIENT_H */
170