<samba:parameter name="server smb encrypt"
context="S"
type="enum"
+ function="_server_smb_encrypt"
enumlist="enum_smb_encryption_vals"
xmlns:samba="http://www.samba.org/samba/DTD/samba-doc">
<description>
context="S"
type="enum"
enumlist="enum_smb_encryption_vals"
- function="server_smb_encrypt"
+ function="_server_smb_encrypt"
synonym="1"
xmlns:samba="http://www.samba.org/samba/DTD/samba-doc">
<description>
.aio_read_size = 1,
.aio_write_size = 1,
.map_readonly = MAP_READONLY_NO,
- .server_smb_encrypt = SMB_ENCRYPTION_DEFAULT,
+ ._server_smb_encrypt = SMB_ENCRYPTION_DEFAULT,
.kernel_share_modes = false,
.durable_handles = true,
.check_parent_directory_delete_on_close = false,
dirleases &= !lp_kernel_oplocks(GLOBAL_SECTION_SNUM);
return dirleases;
}
+
+int lp_server_smb_encrypt(struct smbXsrv_connection *xconn, int snum)
+{
+ return lp__server_smb_encrypt(snum);
+}
bool lp_strict_rename(int snum);
int lp_smb3_directory_leases(void);
+struct smbXsrv_connection;
+int lp_server_smb_encrypt(struct smbXsrv_connection *xconn, int snum);
+
int lp_wi_scan_global_parametrics(
const char *regex, size_t max_matches,
bool (*cb)(const char *string, regmatch_t matches[],
return;
}
- if (lp_server_smb_encrypt(SNUM(conn)) ==
+ if (lp_server_smb_encrypt(xconn, SNUM(conn)) ==
SMB_ENCRYPTION_OFF) {
reply_nterror(
req,
}
if ((protocol >= PROTOCOL_SMB3_00) &&
- (lp_server_smb_encrypt(-1) != SMB_ENCRYPTION_OFF) &&
+ (lp_server_smb_encrypt(xconn, -1) != SMB_ENCRYPTION_OFF) &&
(in_capabilities & SMB2_CAP_ENCRYPTION)) {
capabilities |= SMB2_CAP_ENCRYPTION;
}
/* Case options for the share. */
conn_setup_case_options(conn);
- conn->encrypt_level = lp_server_smb_encrypt(snum);
+ conn->encrypt_level = lp_server_smb_encrypt(xconn, snum);
if ((conn->encrypt_level > SMB_ENCRYPTION_OFF) &&
- (lp_server_smb_encrypt(-1) == SMB_ENCRYPTION_OFF)) {
+ (lp_server_smb_encrypt(xconn, -1) == SMB_ENCRYPTION_OFF)) {
if (conn->encrypt_level == SMB_ENCRYPTION_REQUIRED) {
DBG_ERR("Service [%s] requires encryption, but "
x->global->signing_flags = SMBXSRV_SIGNING_REQUIRED;
}
- if ((lp_server_smb_encrypt(-1) >= SMB_ENCRYPTION_DESIRED) &&
+ if ((lp_server_smb_encrypt(xconn, -1) >= SMB_ENCRYPTION_DESIRED) &&
(xconn->smb2.client.capabilities & SMB2_CAP_ENCRYPTION)) {
x->global->encryption_flags = SMBXSRV_ENCRYPTION_DESIRED;
}
- if (lp_server_smb_encrypt(-1) == SMB_ENCRYPTION_REQUIRED) {
+ if (lp_server_smb_encrypt(xconn, -1) == SMB_ENCRYPTION_REQUIRED) {
x->global->encryption_flags = SMBXSRV_ENCRYPTION_REQUIRED |
SMBXSRV_ENCRYPTION_DESIRED;
}
TALLOC_FREE(proxy);
}
- if ((lp_server_smb_encrypt(snum) >= SMB_ENCRYPTION_DESIRED) &&
+ if ((lp_server_smb_encrypt(conn, snum) >= SMB_ENCRYPTION_DESIRED) &&
(conn->smb2.server.cipher != 0))
{
encryption_desired = true;
}
- if (lp_server_smb_encrypt(snum) == SMB_ENCRYPTION_REQUIRED) {
+ if (lp_server_smb_encrypt(conn, snum) == SMB_ENCRYPTION_REQUIRED) {
encryption_desired = true;
encryption_required = true;
}