xref: /titanic_44/usr/src/lib/smbsrv/libsmb/common/libsmb.h (revision 6d57f8333dfc689618aaf2efe76a8066de053841)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright 2009 Sun Microsystems, Inc.  All rights reserved.
23  * Use is subject to license terms.
24  */
25 
26 #ifndef	_LIBSMB_H
27 #define	_LIBSMB_H
28 
29 #ifdef	__cplusplus
30 extern "C" {
31 #endif
32 
33 #include <sys/types.h>
34 #include <sys/list.h>
35 #include <arpa/inet.h>
36 #include <net/if.h>
37 #include <inet/tcp.h>
38 #include <netdb.h>
39 #include <stdlib.h>
40 #include <libscf.h>
41 #include <libshare.h>
42 #include <sqlite/sqlite.h>
43 
44 #include <smbsrv/string.h>
45 #include <smbsrv/smb_idmap.h>
46 #include <smbsrv/netbios.h>
47 #include <smbsrv/smb_share.h>
48 #include <smbsrv/ntstatus.h>
49 #include <smbsrv/smb_door_svc.h>
50 #include <smbsrv/alloc.h>
51 #include <smbsrv/codepage.h>
52 #include <smbsrv/ctype.h>
53 #include <smbsrv/hash_table.h>
54 #include <smbsrv/msgbuf.h>
55 #include <smbsrv/oem.h>
56 #include <smbsrv/smb_i18n.h>
57 #include <smbsrv/wintypes.h>
58 #include <smbsrv/smb_xdr.h>
59 #include <smbsrv/smbinfo.h>
60 
61 #define	SMB_VARRUN_DIR "/var/run/smb"
62 #define	SMB_CCACHE_FILE "ccache"
63 #define	SMB_CCACHE_PATH SMB_VARRUN_DIR "/" SMB_CCACHE_FILE
64 
65 
66 
67 /* Max value length of all SMB properties */
68 #define	MAX_VALUE_BUFLEN	512
69 
70 #define	SMBD_FMRI_PREFIX		"network/smb/server"
71 #define	SMBD_DEFAULT_INSTANCE_FMRI	"svc:/network/smb/server:default"
72 #define	SMBD_PG_NAME			"smbd"
73 #define	SMBD_PROTECTED_PG_NAME		"read"
74 
75 #define	SMBD_SMF_OK		0
76 #define	SMBD_SMF_NO_MEMORY	1	/* no memory for data structures */
77 #define	SMBD_SMF_SYSTEM_ERR	2	/* system error, use errno */
78 #define	SMBD_SMF_NO_PERMISSION	3	/* no permission for operation */
79 #define	SMBD_SMF_INVALID_ARG	4
80 
81 #define	SCH_STATE_UNINIT	0
82 #define	SCH_STATE_INITIALIZING	1
83 #define	SCH_STATE_INIT		2
84 
85 typedef struct smb_scfhandle {
86 	scf_handle_t		*scf_handle;
87 	int			scf_state;
88 	scf_service_t		*scf_service;
89 	scf_scope_t		*scf_scope;
90 	scf_transaction_t	*scf_trans;
91 	scf_transaction_entry_t	*scf_entry;
92 	scf_propertygroup_t	*scf_pg;
93 	scf_instance_t		*scf_instance;
94 	scf_iter_t		*scf_inst_iter;
95 	scf_iter_t		*scf_pg_iter;
96 } smb_scfhandle_t;
97 
98 /*
99  * CIFS Configuration Management
100  */
101 typedef enum {
102 	SMB_CI_OPLOCK_ENABLE = 0,
103 
104 	SMB_CI_AUTOHOME_MAP,
105 
106 	SMB_CI_DOMAIN_SID,
107 	SMB_CI_DOMAIN_MEMB,
108 	SMB_CI_DOMAIN_NAME,
109 	SMB_CI_DOMAIN_FQDN,
110 	SMB_CI_DOMAIN_FOREST,
111 	SMB_CI_DOMAIN_GUID,
112 	SMB_CI_DOMAIN_SRV,
113 
114 	SMB_CI_WINS_SRV1,
115 	SMB_CI_WINS_SRV2,
116 	SMB_CI_WINS_EXCL,
117 
118 	SMB_CI_SRVSVC_SHRSET_ENABLE,
119 
120 	SMB_CI_MAX_WORKERS,
121 	SMB_CI_MAX_CONNECTIONS,
122 	SMB_CI_KEEPALIVE,
123 	SMB_CI_RESTRICT_ANON,
124 
125 	SMB_CI_SIGNING_ENABLE,
126 	SMB_CI_SIGNING_REQD,
127 
128 	SMB_CI_SYNC_ENABLE,
129 
130 	SMB_CI_SECURITY,
131 	SMB_CI_NBSCOPE,
132 	SMB_CI_SYS_CMNT,
133 	SMB_CI_LM_LEVEL,
134 
135 	SMB_CI_ADS_SITE,
136 
137 	SMB_CI_DYNDNS_ENABLE,
138 
139 	SMB_CI_MACHINE_PASSWD,
140 	SMB_CI_KPASSWD_SRV,
141 	SMB_CI_KPASSWD_DOMAIN,
142 	SMB_CI_KPASSWD_SEQNUM,
143 	SMB_CI_NETLOGON_SEQNUM,
144 	SMB_CI_IPV6_ENABLE,
145 	SMB_CI_MAX
146 } smb_cfg_id_t;
147 
148 /* SMF helper functions */
149 extern smb_scfhandle_t *smb_smf_scf_init(char *);
150 extern void smb_smf_scf_fini(smb_scfhandle_t *);
151 extern int smb_smf_start_transaction(smb_scfhandle_t *);
152 extern int smb_smf_end_transaction(smb_scfhandle_t *);
153 extern int smb_smf_set_string_property(smb_scfhandle_t *, char *, char *);
154 extern int smb_smf_get_string_property(smb_scfhandle_t *, char *,
155     char *, size_t);
156 extern int smb_smf_set_integer_property(smb_scfhandle_t *, char *, int64_t);
157 extern int smb_smf_get_integer_property(smb_scfhandle_t *, char *, int64_t *);
158 extern int smb_smf_set_boolean_property(smb_scfhandle_t *, char *, uint8_t);
159 extern int smb_smf_get_boolean_property(smb_scfhandle_t *, char *, uint8_t *);
160 extern int smb_smf_set_opaque_property(smb_scfhandle_t *, char *,
161     void *, size_t);
162 extern int smb_smf_get_opaque_property(smb_scfhandle_t *, char *,
163     void *, size_t);
164 extern int smb_smf_create_service_pgroup(smb_scfhandle_t *, char *);
165 extern int smb_smf_restart_service(void);
166 extern int smb_smf_maintenance_mode(void);
167 
168 /* ZFS interface */
169 int smb_getdataset(const char *, char *, size_t);
170 
171 /* Configuration management functions  */
172 extern int smb_config_get(smb_cfg_id_t, char *, int);
173 extern char *smb_config_getname(smb_cfg_id_t);
174 extern int smb_config_getstr(smb_cfg_id_t, char *, int);
175 extern int smb_config_getnum(smb_cfg_id_t, int64_t *);
176 extern boolean_t smb_config_getbool(smb_cfg_id_t);
177 
178 extern int smb_config_set(smb_cfg_id_t, char *);
179 extern int smb_config_setstr(smb_cfg_id_t, char *);
180 extern int smb_config_setnum(smb_cfg_id_t, int64_t);
181 extern int smb_config_setbool(smb_cfg_id_t, boolean_t);
182 
183 extern uint8_t smb_config_get_fg_flag(void);
184 extern char *smb_config_get_localsid(void);
185 extern int smb_config_secmode_fromstr(char *);
186 extern char *smb_config_secmode_tostr(int);
187 extern int smb_config_get_secmode(void);
188 extern int smb_config_set_secmode(int);
189 extern int smb_config_set_idmap_domain(char *);
190 extern int smb_config_refresh_idmap(void);
191 extern int smb_config_getip(smb_cfg_id_t, smb_inaddr_t *);
192 
193 extern void smb_load_kconfig(smb_kmod_cfg_t *kcfg);
194 extern uint32_t smb_crc_gen(uint8_t *, size_t);
195 
196 extern boolean_t smb_match_netlogon_seqnum(void);
197 extern int smb_setdomainprops(char *, char *, char *);
198 extern void smb_update_netlogon_seqnum(void);
199 
200 /* maximum password length on Windows 2000 and above */
201 #define	SMB_PASSWD_MAXLEN	127
202 #define	SMB_USERNAME_MAXLEN	40
203 
204 typedef struct smb_joininfo {
205 	char domain_name[MAXHOSTNAMELEN];
206 	char domain_username[SMB_USERNAME_MAXLEN + 1];
207 	char domain_passwd[SMB_PASSWD_MAXLEN + 1];
208 	uint32_t mode;
209 } smb_joininfo_t;
210 
211 /* APIs to communicate with SMB daemon via door calls */
212 extern uint32_t smb_join(smb_joininfo_t *info);
213 extern bool_t xdr_smb_dr_joininfo_t(XDR *, smb_joininfo_t *);
214 
215 
216 #define	SMB_DOMAIN_NOMACHINE_SID	-1
217 #define	SMB_DOMAIN_NODOMAIN_SID		-2
218 
219 extern int nt_domain_init(char *, uint32_t);
220 extern void nt_domain_save(void);
221 extern void nt_domain_show(void);
222 extern void nt_domain_unlink(void);
223 
224 extern void smb_config_getdomaininfo(char *domain, char *fqdn, char *forest,
225     char *guid);
226 extern void smb_config_setdomaininfo(char *domain, char *fqdn, char *forest,
227     char *guid);
228 extern uint32_t smb_get_dcinfo(char *, uint32_t, smb_inaddr_t *);
229 
230 /*
231  * buffer context structure. This is used to keep track of the buffer
232  * context.
233  *
234  * basep:  points to the beginning of the buffer
235  * curp:   points to the current offset
236  * endp:   points to the limit of the buffer
237  */
238 typedef struct {
239 	unsigned char *basep;
240 	unsigned char *curp;
241 	unsigned char *endp;
242 } smb_ctxbuf_t;
243 
244 extern int smb_ctxbuf_init(smb_ctxbuf_t *ctx, unsigned char *buf,
245     size_t buflen);
246 extern int smb_ctxbuf_len(smb_ctxbuf_t *ctx);
247 extern int smb_ctxbuf_printf(smb_ctxbuf_t *ctx, const char *fmt, ...);
248 
249 /* Functions to handle SMB daemon communications with idmap service */
250 extern int smb_idmap_start(void);
251 extern void smb_idmap_stop(void);
252 extern int smb_idmap_restart(void);
253 
254 /* Miscellaneous functions */
255 extern void hexdump(unsigned char *, int);
256 extern size_t bintohex(const char *, size_t, char *, size_t);
257 extern size_t hextobin(const char *, size_t, char *, size_t);
258 extern char *strstrip(char *, const char *);
259 extern char *strtrim(char *, const char *);
260 extern char *trim_whitespace(char *);
261 extern void randomize(char *, unsigned);
262 extern void rand_hash(unsigned char *, size_t, unsigned char *, size_t);
263 
264 extern int smb_getdomainname(char *, size_t);
265 extern int smb_getfqdomainname(char *, size_t);
266 extern int smb_gethostname(char *, size_t, int);
267 extern int smb_getfqhostname(char *, size_t);
268 extern int smb_getnetbiosname(char *, size_t);
269 extern struct hostent *smb_gethostbyname(const char *, int *);
270 extern struct hostent *smb_gethostbyaddr(const char *, int, int, int *);
271 extern boolean_t smb_ishostname(const char *);
272 
273 #define	SMB_SAMACCT_MAXLEN	(NETBIOS_NAME_SZ + 1)
274 extern int smb_getsamaccount(char *, size_t);
275 
276 extern smb_sid_t *smb_getdomainsid(void);
277 
278 extern int smb_get_nameservers(smb_inaddr_t *, int);
279 extern void smb_tonetbiosname(char *, char *, char);
280 
281 extern int smb_chk_hostaccess(smb_inaddr_t *, char *);
282 
283 void smb_trace(const char *s);
284 void smb_tracef(const char *fmt, ...);
285 
286 /*
287  * Authentication
288  */
289 
290 #define	SMBAUTH_LM_MAGIC_STR	"KGS!@#$%"
291 
292 #define	SMBAUTH_HASH_SZ		16	/* also LM/NTLM/NTLMv2 Hash size */
293 #define	SMBAUTH_LM_RESP_SZ	24	/* also NTLM Response size */
294 #define	SMBAUTH_LM_PWD_SZ	14	/* LM password size */
295 #define	SMBAUTH_V2_CLNT_CHALLENGE_SZ 8	/* both LMv2 and NTLMv2 */
296 #define	SMBAUTH_SESSION_KEY_SZ	SMBAUTH_HASH_SZ
297 #define	SMBAUTH_HEXHASH_SZ	(SMBAUTH_HASH_SZ * 2)
298 
299 #define	SMBAUTH_FAILURE		1
300 #define	SMBAUTH_SUCCESS		0
301 #define	MD_DIGEST_LEN		16
302 
303 /*
304  * Name Types
305  *
306  * The list of names near the end of the data blob (i.e. the ndb_names
307  * field of the smb_auth_data_blob_t data structure) can be classify into
308  * the following types:
309  *
310  * 0x0000 Indicates the end of the list.
311  * 0x0001 The name is a NetBIOS machine name (e.g. server name)
312  * 0x0002 The name is an NT Domain NetBIOS name.
313  * 0x0003 The name is the server's DNS hostname.
314  * 0x0004 The name is a W2K Domain name (a DNS name).
315  */
316 #define	SMBAUTH_NAME_TYPE_LIST_END		0x0000
317 #define	SMBAUTH_NAME_TYPE_SERVER_NETBIOS 	0x0001
318 #define	SMBAUTH_NAME_TYPE_DOMAIN_NETBIOS 	0x0002
319 #define	SMBAUTH_NAME_TYPE_SERVER_DNS		0x0003
320 #define	SMBAUTH_NAME_TYPE_DOMAIN_DNS 		0x0004
321 
322 /*
323  * smb_auth_name_entry_t
324  *
325  * Each name entry in the data blob consists of the following 3 fields:
326  *
327  * nne_type - name type
328  * nne_len  - the length of the name
329  * nne_name - the name, in uppercase UCS-2LE Unicode format
330  */
331 typedef struct smb_auth_name_entry {
332 	unsigned short nne_type;
333 	unsigned short nne_len;
334 	mts_wchar_t nne_name[SMB_PI_MAX_DOMAIN * 2];
335 } smb_auth_name_entry_t;
336 
337 /*
338  * smb_auth_data_blob
339  *
340  * The format of this NTLMv2 data blob structure is as follow:
341  *
342  *	- Blob Signature 0x01010000 (4 bytes)
343  * - Reserved (0x00000000) (4 bytes)
344  * - Timestamp Little-endian, 64-bit signed value representing
345  *   the number of tenths of a microsecond since January 1, 1601.
346  *   (8 bytes)
347  * - Client Challenge (8 bytes)
348  * - Unknown1 (4 bytes)
349  * - List of Target Information (variable length)
350  * - Unknown2 (4 bytes)
351  */
352 typedef struct smb_auth_data_blob {
353 	unsigned char ndb_signature[4];
354 	unsigned char ndb_reserved[4];
355 	uint64_t ndb_timestamp;
356 	unsigned char ndb_clnt_challenge[SMBAUTH_V2_CLNT_CHALLENGE_SZ];
357 	unsigned char ndb_unknown[4];
358 	smb_auth_name_entry_t ndb_names[2];
359 	unsigned char ndb_unknown2[4];
360 } smb_auth_data_blob_t;
361 
362 #define	SMBAUTH_BLOB_MAXLEN (sizeof (smb_auth_data_blob_t))
363 #define	SMBAUTH_CI_MAXLEN   SMBAUTH_LM_RESP_SZ
364 #define	SMBAUTH_CS_MAXLEN   (SMBAUTH_BLOB_MAXLEN + SMBAUTH_HASH_SZ)
365 
366 /*
367  * smb_auth_info_t
368  *
369  * The structure contains all the authentication information
370  * needed for the preparaton of the SMBSessionSetupAndx request
371  * and the user session key.
372  *
373  * hash      - NTLM hash
374  * hash_v2   - NTLMv2 hash
375  * ci_len    - the length of the case-insensitive password
376  * ci        - case-insensitive password
377  *             (If NTLMv2 authentication mechanism is used, it
378  *              represents the LMv2 response. Otherwise, it
379  *              is empty.)
380  * cs_len    - the length of the case-sensitive password
381  * cs        - case-sensitive password
382  *             (If NTLMv2 authentication mechanism is used, it
383  *              represents the NTLMv2 response. Otherwise, it
384  *              represents the NTLM response.)
385  * data_blob - NTLMv2 data blob
386  */
387 typedef struct smb_auth_info {
388 	unsigned char hash[SMBAUTH_HASH_SZ];
389 	unsigned char hash_v2[SMBAUTH_HASH_SZ];
390 	unsigned short ci_len;
391 	unsigned char ci[SMBAUTH_CI_MAXLEN];
392 	unsigned short cs_len;
393 	unsigned char cs[SMBAUTH_CS_MAXLEN];
394 	int lmcompatibility_lvl;
395 	smb_auth_data_blob_t data_blob;
396 } smb_auth_info_t;
397 
398 /*
399  * SMB password management
400  */
401 
402 #define	SMB_PWF_LM	0x01	/* LM hash is present */
403 #define	SMB_PWF_NT	0x02	/* NT hash is present */
404 #define	SMB_PWF_DISABLE	0x04	/* Account is disabled */
405 
406 typedef struct smb_passwd {
407 	uid_t		pw_uid;
408 	uint32_t	pw_flags;
409 	char		pw_name[SMB_USERNAME_MAXLEN];
410 	uint8_t		pw_lmhash[SMBAUTH_HASH_SZ];
411 	uint8_t		pw_nthash[SMBAUTH_HASH_SZ];
412 } smb_passwd_t;
413 
414 /*
415  * Control flags passed to smb_pwd_setcntl
416  */
417 #define	SMB_PWC_DISABLE	0x01
418 #define	SMB_PWC_ENABLE	0x02
419 #define	SMB_PWC_NOLM	0x04
420 
421 #define	SMB_PWE_SUCCESS		0
422 #define	SMB_PWE_USER_UNKNOWN	1
423 #define	SMB_PWE_USER_DISABLE	2
424 #define	SMB_PWE_CLOSE_FAILED	3
425 #define	SMB_PWE_OPEN_FAILED	4
426 #define	SMB_PWE_WRITE_FAILED	6
427 #define	SMB_PWE_UPDATE_FAILED	7
428 #define	SMB_PWE_STAT_FAILED	8
429 #define	SMB_PWE_BUSY		9
430 #define	SMB_PWE_DENIED		10
431 #define	SMB_PWE_SYSTEM_ERROR	11
432 #define	SMB_PWE_INVALID_PARAM	12
433 #define	SMB_PWE_NO_MEMORY	13
434 #define	SMB_PWE_MAX		14
435 
436 typedef struct smb_pwditer {
437 	void *spi_next;
438 } smb_pwditer_t;
439 
440 typedef struct smb_luser {
441 	char *su_name;
442 	char *su_fullname;
443 	char *su_desc;
444 	uint32_t su_rid;
445 	uint32_t su_ctrl;
446 } smb_luser_t;
447 
448 extern void smb_pwd_init(boolean_t);
449 extern void smb_pwd_fini(void);
450 extern smb_passwd_t *smb_pwd_getpwnam(const char *, smb_passwd_t *);
451 extern smb_passwd_t *smb_pwd_getpwuid(uid_t, smb_passwd_t *);
452 extern int smb_pwd_setpasswd(const char *, const char *);
453 extern int smb_pwd_setcntl(const char *, int);
454 
455 extern int smb_pwd_iteropen(smb_pwditer_t *);
456 extern smb_luser_t *smb_pwd_iterate(smb_pwditer_t *);
457 extern void smb_pwd_iterclose(smb_pwditer_t *);
458 
459 extern int smb_auth_qnd_unicode(mts_wchar_t *dst, char *src, int length);
460 extern int smb_auth_hmac_md5(unsigned char *data, int data_len,
461     unsigned char *key, int key_len, unsigned char *digest);
462 
463 /*
464  * A variation on HMAC-MD5 known as HMACT64 is used by Windows systems.
465  * The HMACT64() function is the same as the HMAC-MD5() except that
466  * it truncates the input key to 64 bytes rather than hashing it down
467  * to 16 bytes using the MD5() function.
468  */
469 #define	SMBAUTH_HMACT64(D, Ds, K, Ks, digest) \
470 	smb_auth_hmac_md5(D, Ds, K, (Ks > 64) ? 64 : Ks, digest)
471 
472 extern int smb_auth_DES(unsigned char *, int, unsigned char *, int,
473     unsigned char *, int);
474 
475 extern int smb_auth_md4(unsigned char *, unsigned char *, int);
476 extern int smb_auth_lm_hash(char *, unsigned char *);
477 extern int smb_auth_ntlm_hash(char *, unsigned char *);
478 
479 extern int smb_auth_set_info(char *, char *,
480     unsigned char *, char *, unsigned char *,
481     int, int, smb_auth_info_t *);
482 
483 extern int smb_auth_ntlmv2_hash(unsigned char *,
484 	char *, char *, unsigned char *);
485 
486 extern int smb_auth_gen_session_key(smb_auth_info_t *, unsigned char *);
487 
488 boolean_t smb_auth_validate_lm(unsigned char *, uint32_t, smb_passwd_t *,
489     unsigned char *, int, char *, char *);
490 boolean_t smb_auth_validate_nt(unsigned char *, uint32_t, smb_passwd_t *,
491     unsigned char *, int, char *, char *, uchar_t *);
492 
493 /*
494  * SMB MAC Signing
495  */
496 
497 #define	SMB_MAC_KEY_SZ	(SMBAUTH_SESSION_KEY_SZ + SMBAUTH_CS_MAXLEN)
498 #define	SMB_SIG_OFFS	14	/* signature field offset within header */
499 #define	SMB_SIG_SIZE	8	/* SMB signature size */
500 
501 /*
502  * Signing flags:
503  *
504  * SMB_SCF_ENABLE                 Signing is enabled.
505  *
506  * SMB_SCF_REQUIRED               Signing is enabled and required.
507  *                                This flag shouldn't be set if
508  *                                SMB_SCF_ENABLE isn't set.
509  *
510  * SMB_SCF_STARTED                Signing will start after receiving
511  *                                the first non-anonymous SessionSetup
512  *                                request.
513  *
514  * SMB_SCF_KEY_ISSET_THIS_LOGON   Indicates whether the MAC key has just
515  *                                been set for this logon. (prior to
516  *                                sending the SMBSessionSetup request)
517  *
518  */
519 #define	SMB_SCF_ENABLE		0x01
520 #define	SMB_SCF_REQUIRED	0x02
521 #define	SMB_SCF_STARTED		0x04
522 #define	SMB_SCF_KEY_ISSET_THIS_LOGON	0x08
523 
524 /*
525  * smb_sign_ctx
526  *
527  * SMB signing context.
528  *
529  *	ssc_seqnum				sequence number
530  *	ssc_keylen				mac key length
531  *	ssc_mid					multiplex id - reserved
532  *	ssc_flags				flags
533  *	ssc_mackey				mac key
534  *	ssc_sign				mac signature
535  *
536  */
537 typedef struct smb_sign_ctx {
538 	unsigned int ssc_seqnum;
539 	unsigned short ssc_keylen;
540 	unsigned short ssc_mid;
541 	unsigned int ssc_flags;
542 	unsigned char ssc_mackey[SMB_MAC_KEY_SZ];
543 	unsigned char ssc_sign[SMB_SIG_SIZE];
544 } smb_sign_ctx_t;
545 
546 extern int smb_mac_init(smb_sign_ctx_t *sign_ctx, smb_auth_info_t *auth);
547 extern int smb_mac_calc(smb_sign_ctx_t *sign_ctx,
548     const unsigned char *buf, size_t buf_len, unsigned char *mac_sign);
549 extern int smb_mac_chk(smb_sign_ctx_t *sign_ctx,
550     const unsigned char *buf, size_t buf_len);
551 extern int smb_mac_sign(smb_sign_ctx_t *sign_ctx,
552     unsigned char *buf, size_t buf_len);
553 extern void smb_mac_inc_seqnum(smb_sign_ctx_t *sign_ctx);
554 extern void smb_mac_dec_seqnum(smb_sign_ctx_t *sign_ctx);
555 
556 /*
557  * Each domain is categorized using the enum values below.
558  * The local domain refers to the local machine and is named
559  * after the local hostname. The primary domain is the domain
560  * that the system joined. All other domains are either
561  * trusted or untrusted, as defined by the primary domain PDC.
562  *
563  * This enum must be kept in step with the table of strings
564  * in ntdomain.c.
565  */
566 typedef enum nt_domain_type {
567 	NT_DOMAIN_NULL,
568 	NT_DOMAIN_BUILTIN,
569 	NT_DOMAIN_LOCAL,
570 	NT_DOMAIN_PRIMARY,
571 	NT_DOMAIN_ACCOUNT,
572 	NT_DOMAIN_TRUSTED,
573 	NT_DOMAIN_UNTRUSTED,
574 	NT_DOMAIN_NUM_TYPES
575 } nt_domain_type_t;
576 
577 
578 /*
579  * This is the information that is held about each domain. The database
580  * is a linked list that is threaded through the domain structures. As
581  * the number of domains in the database should be small (32 max), this
582  * should be sufficient.
583  */
584 typedef struct nt_domain {
585 	struct nt_domain *next;
586 	nt_domain_type_t type;
587 	char *name;
588 	smb_sid_t *sid;
589 } nt_domain_t;
590 
591 nt_domain_t *nt_domain_new(nt_domain_type_t type, char *name, smb_sid_t *sid);
592 void nt_domain_delete(nt_domain_t *domain);
593 nt_domain_t *nt_domain_add(nt_domain_t *new_domain);
594 void nt_domain_remove(nt_domain_t *domain);
595 void nt_domain_flush(nt_domain_type_t domain_type);
596 void nt_domain_sync(void);
597 char *nt_domain_xlat_type(nt_domain_type_t domain_type);
598 nt_domain_type_t nt_domain_xlat_type_name(char *type_name);
599 nt_domain_t *nt_domain_lookup_name(char *domain_name);
600 nt_domain_t *nt_domain_lookup_sid(smb_sid_t *domain_sid);
601 nt_domain_t *nt_domain_lookupbytype(nt_domain_type_t type);
602 smb_sid_t *nt_domain_local_sid(void);
603 
604 typedef enum {
605 	SMB_LGRP_BUILTIN = 1,
606 	SMB_LGRP_LOCAL
607 } smb_gdomain_t;
608 
609 typedef struct smb_gsid {
610 	smb_sid_t *gs_sid;
611 	uint16_t gs_type;
612 } smb_gsid_t;
613 
614 typedef struct smb_giter {
615 	sqlite_vm	*sgi_vm;
616 	sqlite		*sgi_db;
617 } smb_giter_t;
618 
619 typedef struct smb_group {
620 	char			*sg_name;
621 	char			*sg_cmnt;
622 	uint32_t		sg_attr;
623 	uint32_t		sg_rid;
624 	smb_gsid_t		sg_id;
625 	smb_gdomain_t		sg_domain;
626 	smb_privset_t		*sg_privs;
627 	uint32_t		sg_nmembers;
628 	smb_gsid_t		*sg_members;
629 } smb_group_t;
630 
631 int smb_lgrp_start(void);
632 void smb_lgrp_stop(void);
633 int smb_lgrp_add(char *, char *);
634 int smb_lgrp_rename(char *, char *);
635 int smb_lgrp_delete(char *);
636 int smb_lgrp_setcmnt(char *, char *);
637 int smb_lgrp_getcmnt(char *, char **);
638 int smb_lgrp_getpriv(char *, uint8_t, boolean_t *);
639 int smb_lgrp_setpriv(char *, uint8_t, boolean_t);
640 int smb_lgrp_add_member(char *, smb_sid_t *, uint16_t);
641 int smb_lgrp_del_member(char *, smb_sid_t *, uint16_t);
642 int smb_lgrp_getbyname(char *, smb_group_t *);
643 int smb_lgrp_getbyrid(uint32_t, smb_gdomain_t, smb_group_t *);
644 void smb_lgrp_free(smb_group_t *);
645 boolean_t smb_lgrp_is_member(smb_group_t *, smb_sid_t *);
646 char *smb_lgrp_strerror(int);
647 int smb_lgrp_iteropen(smb_giter_t *);
648 void smb_lgrp_iterclose(smb_giter_t *);
649 int smb_lgrp_iterate(smb_giter_t *, smb_group_t *);
650 
651 int smb_lookup_sid(smb_sid_t *, char *buf, int buflen);
652 int smb_lookup_name(char *, smb_gsid_t *);
653 
654 #define	SMB_LGRP_SUCCESS		0
655 #define	SMB_LGRP_INVALID_ARG		1
656 #define	SMB_LGRP_INVALID_MEMBER		2
657 #define	SMB_LGRP_INVALID_NAME		3
658 #define	SMB_LGRP_NOT_FOUND		4
659 #define	SMB_LGRP_EXISTS			5
660 #define	SMB_LGRP_NO_SID			6
661 #define	SMB_LGRP_NO_LOCAL_SID		7
662 #define	SMB_LGRP_SID_NOTLOCAL		8
663 #define	SMB_LGRP_WKSID			9
664 #define	SMB_LGRP_NO_MEMORY		10
665 #define	SMB_LGRP_DB_ERROR		11
666 #define	SMB_LGRP_DBINIT_ERROR		12
667 #define	SMB_LGRP_INTERNAL_ERROR		13
668 #define	SMB_LGRP_MEMBER_IN_GROUP	14
669 #define	SMB_LGRP_MEMBER_NOT_IN_GROUP	15
670 #define	SMB_LGRP_NO_SUCH_PRIV		16
671 #define	SMB_LGRP_NO_SUCH_DOMAIN		17
672 #define	SMB_LGRP_PRIV_HELD		18
673 #define	SMB_LGRP_PRIV_NOT_HELD		19
674 #define	SMB_LGRP_BAD_DATA		20
675 #define	SMB_LGRP_NO_MORE		21
676 #define	SMB_LGRP_DBOPEN_FAILED		22
677 #define	SMB_LGRP_DBEXEC_FAILED		23
678 #define	SMB_LGRP_DBINIT_FAILED		24
679 #define	SMB_LGRP_DOMLKP_FAILED		25
680 #define	SMB_LGRP_DOMINS_FAILED		26
681 #define	SMB_LGRP_INSERT_FAILED		27
682 #define	SMB_LGRP_DELETE_FAILED		28
683 #define	SMB_LGRP_UPDATE_FAILED		29
684 #define	SMB_LGRP_LOOKUP_FAILED		30
685 #define	SMB_LGRP_NOT_SUPPORTED		31
686 
687 #define	SMB_LGRP_NAME_CHAR_MAX	32
688 #define	SMB_LGRP_COMMENT_MAX	256
689 #define	SMB_LGRP_NAME_MAX	(SMB_LGRP_NAME_CHAR_MAX * MTS_MB_CHAR_MAX + 1)
690 
691 /*
692  * values for smb_nic_t.smbflags
693  */
694 #define	SMB_NICF_NBEXCL		0x01	/* Excluded from Netbios activities */
695 #define	SMB_NICF_ALIAS		0x02	/* This is an alias */
696 
697 /*
698  * smb_nic_t
699  *     nic_host		actual host name
700  *     nic_nbname	16-byte NetBIOS host name
701  */
702 typedef struct {
703 	char		nic_host[MAXHOSTNAMELEN];
704 	char		nic_nbname[NETBIOS_NAME_SZ];
705 	char		nic_cmnt[SMB_PI_MAX_COMMENT];
706 	char		nic_ifname[LIFNAMSIZ];
707 	smb_inaddr_t	nic_ip;
708 	uint32_t	nic_mask;
709 	uint32_t	nic_bcast;
710 	uint32_t	nic_smbflags;
711 	uint64_t	nic_sysflags;
712 } smb_nic_t;
713 
714 typedef struct smb_niciter {
715 	smb_nic_t ni_nic;
716 	int ni_cookie;
717 	int ni_seqnum;
718 } smb_niciter_t;
719 
720 /* NIC config functions */
721 int smb_nic_init(void);
722 void smb_nic_fini(void);
723 int smb_nic_getnum(char *);
724 int smb_nic_addhost(const char *, const char *, int, const char **);
725 int smb_nic_delhost(const char *);
726 int smb_nic_getfirst(smb_niciter_t *);
727 int smb_nic_getnext(smb_niciter_t *);
728 boolean_t smb_nic_exists(smb_inaddr_t *, boolean_t);
729 
730 /* NIC Monitoring functions */
731 int smb_nicmon_start(const char *);
732 void smb_nicmon_stop(void);
733 
734 /*
735  * Well-known account structure
736  *
737  * A security identifier (SID) is a unique value of variable length that
738  * is used to identify a security principal or security group in
739  * Windows. Well-known SIDs are a group of SIDs that identify generic
740  * users or generic groups. Their values remain constant across all
741  * operating systems.
742  *
743  * This structure is defined to store these SIDs and other related
744  * information about them (e.g. account and domain names) in a
745  * predefined table.
746  */
747 typedef struct smb_wka {
748 	uint8_t		wka_domidx;
749 	char		*wka_sid;
750 	char		*wka_name;
751 	uint16_t	wka_type;
752 	uint16_t	wka_flags;
753 	char		*wka_desc;
754 	smb_sid_t	*wka_binsid;
755 } smb_wka_t;
756 
757 /*
758  * Defined values for smb_wka.wka_flags
759  *
760  * SMB_WKAFLG_LGRP_ENABLE		Can be added as local group
761  */
762 #define	SMB_WKAFLG_LGRP_ENABLE	0x1
763 
764 /*
765  * Well-known account interfaces
766  */
767 int smb_wka_init(void);
768 void smb_wka_fini(void);
769 smb_wka_t *smb_wka_lookup_name(char *);
770 smb_wka_t *smb_wka_lookup_sid(smb_sid_t *);
771 smb_sid_t *smb_wka_get_sid(char *);
772 char *smb_wka_get_domain(int);
773 uint32_t smb_wka_token_groups(boolean_t, smb_ids_t *);
774 
775 /*
776  * In memory account representation
777  */
778 typedef struct smb_account {
779 	char		*a_name;
780 	char		*a_domain;
781 	uint16_t	a_type;
782 	smb_sid_t	*a_sid;
783 	smb_sid_t	*a_domsid;
784 	uint32_t	a_rid;
785 } smb_account_t;
786 
787 uint32_t smb_sam_lookup_name(char *, char *, uint16_t, smb_account_t *);
788 uint32_t smb_sam_lookup_sid(smb_sid_t *, smb_account_t *);
789 int smb_sam_usr_cnt(void);
790 uint32_t smb_sam_usr_groups(smb_sid_t *, smb_ids_t *);
791 int smb_sam_grp_cnt(nt_domain_type_t);
792 void smb_account_free(smb_account_t *);
793 boolean_t smb_account_validate(smb_account_t *);
794 
795 #ifdef	__cplusplus
796 }
797 #endif
798 
799 #endif	/* _LIBSMB_H */
800