Not yet used, that comes next.
Signed-off-by: Ralph Boehme <slow@samba.org>
Reviewed-by: Volker Lendecke <vl@samba.org>
struct smb2_connect_state {
struct tevent_context *ev;
struct cli_credentials *credentials;
+ struct loadparm_context *lp_ctx;
bool fallback_to_anonymous;
uint64_t previous_session_id;
struct resolve_context *resolve_ctx;
state->ev = ev;
state->credentials = credentials;
+ state->lp_ctx = lp_ctx;
state->fallback_to_anonymous = fallback_to_anonymous;
state->previous_session_id = previous_session_id;
state->options = *options;
struct smb2_transport *transport = state->transport;
struct tevent_req *subreq = NULL;
- state->session = smb2_session_init(transport, state->gensec_settings, state);
+ state->session = smb2_session_init(transport,
+ state->lp_ctx,
+ state->gensec_settings,
+ state);
if (tevent_req_nomem(state->session, req)) {
return;
}
#include "auth/gensec/gensec.h"
#include "auth/credentials/credentials.h"
#include "../libcli/smb/smbXcli_base.h"
+#include "lib/param/param.h"
/**
initialise a smb2_session structure
*/
struct smb2_session *smb2_session_init(struct smb2_transport *transport,
+ struct loadparm_context *lp_ctx,
struct gensec_settings *settings,
TALLOC_CTX *parent_ctx)
{
return NULL;
}
session->transport = talloc_steal(session, transport);
+ session->debug_encryption = lpcfg_debug_encryption(lp_ctx);
+ session->wireshark_keyfile = lpcfg_parm_string(lp_ctx,
+ NULL,
+ "debug encryption",
+ "wireshark keyfile");
session->smbXcli = smbXcli_session_create(session, transport->conn);
if (session->smbXcli == NULL) {
struct smbXcli_session *smbXcli;
bool needs_bind;
bool anonymous_session_key;
+ bool debug_encryption;
+ const char *wireshark_keyfile;
DATA_BLOB forced_session_key;
};
struct test_smb2_bench_session_setup_shared_state *state = loop->state;
loop->session = smb2_session_init(loop->conn->transport,
+ state->tctx->lp_ctx,
state->gensec_settings,
loop->conn->transport);
torture_assert_goto(state->tctx, loop->session != NULL,
bool result = true;
session = smb2_session_init(tree->session->transport,
+ tctx->lp_ctx,
lpcfg_gensec_settings(tctx, tctx->lp_ctx),
tctx);
torture_assert(tctx, session, "Session initialization failed");
* are mapped to guest.
*/
session3_1 = smb2_session_init(transport1,
+ tctx->lp_ctx,
lpcfg_gensec_settings(tctx, tctx->lp_ctx),
tctx);
torture_assert(tctx, session3_1 != NULL, "smb2_session_channel failed");
* session keys.
*/
session1_2 = smb2_session_init(transport2,
+ tctx->lp_ctx,
lpcfg_gensec_settings(tctx, tctx->lp_ctx),
tree2_0);
torture_assert(tctx, session1_2 != NULL, "smb2_session_channel failed");
torture_assert(tctx, ok, "smbXcli_session_is_authenticated(user)");
anon_session = smb2_session_init(transport,
+ tctx->lp_ctx,
lpcfg_gensec_settings(tctx, tctx->lp_ctx),
tctx);
torture_assert(tctx, anon_session != NULL, "smb2_session_init(anon)");
torture_assert(tctx, ok, "smbXcli_session_is_authenticated(user)");
anon_session = smb2_session_init(transport,
+ tctx->lp_ctx,
lpcfg_gensec_settings(tctx, tctx->lp_ctx),
tctx);
torture_assert(tctx, anon_session != NULL, "smb2_session_init(anon)");
*/
session_id = smb2cli_session_current_id(anon_session->smbXcli);
anon_session_nosign = smb2_session_init(transport,
+ tctx->lp_ctx,
lpcfg_gensec_settings(tctx, tctx->lp_ctx),
tctx);
torture_assert(tctx, anon_session_nosign != NULL, "smb2_session_init(anon_nosign)");
struct smb2_session *session;
session = smb2_session_init(transport,
+ tctx->lp_ctx,
lpcfg_gensec_settings(tctx, tctx->lp_ctx),
mem_ctx);