The branch, master has been updated
       via  239178aee36 s3: smbd: Rename srv_set_signing() -> 
smb1_srv_set_signing()
       via  b8ce6949ff4 s3: smbd: Rename srv_is_signing_negotiated() -> 
smb1_srv_is_signing_negotiated().
       via  e0ad956c097 s3: smbd: Rename srv_is_signing_active() -> 
smb1_srv_is_signing_active().
       via  93eaaccf8e6 s3: smbd: Rename srv_set_signing_negotiated() -> 
smb1_srv_set_signing_negotiated().
       via  ed648848958 s3: smbd: Rename srv_cancel_sign_response() -> 
smb1_srv_cancel_sign_response().
       via  fa9c48ae4dd s3: smbd: Rename srv_calculate_sign_mac() -> 
smb1_srv_calculate_sign_mac().
       via  777fbb3753b s3: smbd: Rename srv_check_sign_mac() -> 
smb1_srv_check_sign_mac().
       via  3e021c3762f s3: libcli: Rename smb_key_derivation() -> 
smb1_key_derivation()
       via  0b391fc19f7 s3: libcli: Rename smb_signing_is_negotiated() -> 
smb1_signing_is_negotiated()
       via  7a385775eec s3: libcli: Rename smb_signing_set_negotiated() -> 
smb1_signing_set_negotiated()
       via  79633b42d61 s3: libcli: Rename smb_signing_is_mandatory() -> 
smb1_signing_is_mandatory()
       via  e42fc9bc24d s3: libcli: Rename smb_signing_is_desired() -> 
smb1_signing_is_desired()
       via  2fd29169714 s3: libcli: Remove unused smb_signing_is_allowed()
       via  0c8bc1bf568 s3: libcli: Rename smb_signing_is_active() -> 
smb1_signing_is_active()
       via  8dd252ad91b s3: libcli: Rename smb_signing_activate() -> 
smb1_signing_activate()
       via  84a498feeca s3: libcli: Rename smb_signing_check_pdu() -> 
smb1_signing_check_pdu()
       via  6a68caff962 s3: libcli: Rename smb_signing_sign_pdu() -> 
smb1_signing_sign_pdu()
       via  fd9325587c9 s3: libcli: Rename smb_signing_cancel_reply() -> 
smb1_signing_cancel_reply()
       via  e563725a196 s3: libcli: Rename smb_signing_next_seqnum() -> 
smb1_signing_next_seqnum()
       via  00d8b05ddbf s3: libcli: Rename smb_signing_md5() -> 
smb1_signing_md5()
       via  7e82ac3a40d s3: libcli: Rename smb_signing_good() -> 
smb1_signing_good()
       via  6ae33a62bc4 s3: libcli: Rename smb_signing_init() -> 
smb1_signing_init()
       via  cba8ba327f1 s3: libcli: Rename smb_signing_init_ex() -> 
smb1_signing_init_ex()
       via  aee7bfa079a s3: libcli: Rename static smb_signing_reset_info() -> 
smb1_signing_reset_info()
       via  b879d475bfd s3: smbd: Look at the correct signing state for the 
debug messages in make_connection_snum().
       via  1f3f6e20dc0 s3: smbd: Split srv_init_signing() into 2 static 
functions smb1_srv_init_signing() and smb2_srv_init_signing().
       via  3f9d528f389 s3: smbd: Add smb2_srv_init_signing(). Initializes 
conn->smb2.signing_mandatory.
       via  b51b055fc4b s3: smbd: Add 'bool signing_mandatory' to struct 
smbXsrv_connection.smb2 component.
       via  41393579de6 s3: Simple rename 'struct smb_signing_state' -> 'struct 
smb1_signing_state'
       via  d972f64b30d s3: smbd: notify_mid_maps is used by both SMB1 and SMB2.
      from  7debfe7a231 ctdb-tools: Remove deprecated networking commands and 
replace with new commands

https://git.samba.org/?p=samba.git;a=shortlog;h=master


- Log -----------------------------------------------------------------
commit 239178aee363be2c3add4063fe9c50f482a58ed1
Author: Jeremy Allison <[email protected]>
Date:   Mon Mar 7 19:57:15 2022 -0800

    s3: smbd: Rename srv_set_signing() -> smb1_srv_set_signing()
    
    Signed-off-by: Jeremy Allison <[email protected]>
    Signed-off-by: David Mulder <[email protected]>
    
    Autobuild-User(master): David Mulder <[email protected]>
    Autobuild-Date(master): Tue Mar  8 23:05:19 UTC 2022 on sn-devel-184

commit b8ce6949ff4709325080ec579adb49a83786a59a
Author: Jeremy Allison <[email protected]>
Date:   Mon Mar 7 19:54:00 2022 -0800

    s3: smbd: Rename srv_is_signing_negotiated() -> 
smb1_srv_is_signing_negotiated().
    
    Signed-off-by: Jeremy Allison <[email protected]>
    Signed-off-by: David Mulder <[email protected]>

commit e0ad956c097b45568cfb3370d191b0ed52adea23
Author: Jeremy Allison <[email protected]>
Date:   Mon Mar 7 19:51:06 2022 -0800

    s3: smbd: Rename srv_is_signing_active() -> smb1_srv_is_signing_active().
    
    Signed-off-by: Jeremy Allison <[email protected]>
    Signed-off-by: David Mulder <[email protected]>

commit 93eaaccf8e6e8652e10f5e3990db78dc113546ed
Author: Jeremy Allison <[email protected]>
Date:   Mon Mar 7 19:46:58 2022 -0800

    s3: smbd: Rename srv_set_signing_negotiated() -> 
smb1_srv_set_signing_negotiated().
    
    Signed-off-by: Jeremy Allison <[email protected]>
    Signed-off-by: David Mulder <[email protected]>

commit ed6488489580c9400b419a86ead470f9bdcd2969
Author: Jeremy Allison <[email protected]>
Date:   Mon Mar 7 19:45:19 2022 -0800

    s3: smbd: Rename srv_cancel_sign_response() -> 
smb1_srv_cancel_sign_response().
    
    Signed-off-by: Jeremy Allison <[email protected]>
    Signed-off-by: David Mulder <[email protected]>

commit fa9c48ae4dd69c80c47cd4684deff04339bd22ea
Author: Jeremy Allison <[email protected]>
Date:   Mon Mar 7 19:44:18 2022 -0800

    s3: smbd: Rename srv_calculate_sign_mac() -> smb1_srv_calculate_sign_mac().
    
    Signed-off-by: Jeremy Allison <[email protected]>
    Signed-off-by: David Mulder <[email protected]>

commit 777fbb3753b97eb2570df974c74689300260cf36
Author: Jeremy Allison <[email protected]>
Date:   Mon Mar 7 19:43:10 2022 -0800

    s3: smbd: Rename srv_check_sign_mac() -> smb1_srv_check_sign_mac().
    
    Signed-off-by: Jeremy Allison <[email protected]>
    Signed-off-by: David Mulder <[email protected]>

commit 3e021c3762fce4f5c238da5ab36797c3d6fba1a5
Author: Jeremy Allison <[email protected]>
Date:   Mon Mar 7 19:41:31 2022 -0800

    s3: libcli: Rename smb_key_derivation() -> smb1_key_derivation()
    
    Signed-off-by: Jeremy Allison <[email protected]>
    Signed-off-by: David Mulder <[email protected]>

commit 0b391fc19f7098ce2f7b8faf22adab1fbb34bee7
Author: Jeremy Allison <[email protected]>
Date:   Mon Mar 7 19:39:58 2022 -0800

    s3: libcli: Rename smb_signing_is_negotiated() -> 
smb1_signing_is_negotiated()
    
    Signed-off-by: Jeremy Allison <[email protected]>
    Signed-off-by: David Mulder <[email protected]>

commit 7a385775eeccd5a36a2767052133c7e4bcfbf904
Author: Jeremy Allison <[email protected]>
Date:   Mon Mar 7 19:38:35 2022 -0800

    s3: libcli: Rename smb_signing_set_negotiated() -> 
smb1_signing_set_negotiated()
    
    Signed-off-by: Jeremy Allison <[email protected]>
    Signed-off-by: David Mulder <[email protected]>

commit 79633b42d6199da3b9764c28772308de08c3c94e
Author: Jeremy Allison <[email protected]>
Date:   Mon Mar 7 19:36:25 2022 -0800

    s3: libcli: Rename smb_signing_is_mandatory() -> smb1_signing_is_mandatory()
    
    Signed-off-by: Jeremy Allison <[email protected]>
    Signed-off-by: David Mulder <[email protected]>

commit e42fc9bc24deb288fad14c99bcf5a63435c5cd83
Author: Jeremy Allison <[email protected]>
Date:   Mon Mar 7 19:34:42 2022 -0800

    s3: libcli: Rename smb_signing_is_desired() -> smb1_signing_is_desired()
    
    Signed-off-by: Jeremy Allison <[email protected]>
    Signed-off-by: David Mulder <[email protected]>

commit 2fd29169714bd5e768789e24de34c7a7efd80a07
Author: Jeremy Allison <[email protected]>
Date:   Mon Mar 7 19:33:23 2022 -0800

    s3: libcli: Remove unused smb_signing_is_allowed()
    
    Signed-off-by: Jeremy Allison <[email protected]>
    Signed-off-by: David Mulder <[email protected]>

commit 0c8bc1bf5689753cfbc1bc35d6cfba506446ac68
Author: Jeremy Allison <[email protected]>
Date:   Mon Mar 7 19:31:34 2022 -0800

    s3: libcli: Rename smb_signing_is_active() -> smb1_signing_is_active()
    
    Signed-off-by: Jeremy Allison <[email protected]>
    Signed-off-by: David Mulder <[email protected]>

commit 8dd252ad91bf9ec4b6d993a49eb873f79ca33d28
Author: Jeremy Allison <[email protected]>
Date:   Mon Mar 7 19:29:57 2022 -0800

    s3: libcli: Rename smb_signing_activate() -> smb1_signing_activate()
    
    Fix the debugs that also used this name.
    
    Signed-off-by: Jeremy Allison <[email protected]>
    Signed-off-by: David Mulder <[email protected]>

commit 84a498feeca62f0263e2c536cfd24bf37965ff87
Author: Jeremy Allison <[email protected]>
Date:   Mon Mar 7 19:26:54 2022 -0800

    s3: libcli: Rename smb_signing_check_pdu() -> smb1_signing_check_pdu()
    
    Fix the debugs that also used this name.
    
    Signed-off-by: Jeremy Allison <[email protected]>
    Signed-off-by: David Mulder <[email protected]>

commit 6a68caff962e6e601b04744a0aea42dc76c21456
Author: Jeremy Allison <[email protected]>
Date:   Mon Mar 7 19:22:51 2022 -0800

    s3: libcli: Rename smb_signing_sign_pdu() -> smb1_signing_sign_pdu()
    
    Fix the debugs that also used this name.
    
    Signed-off-by: Jeremy Allison <[email protected]>
    Signed-off-by: David Mulder <[email protected]>

commit fd9325587c9b42c3416b81dc4dc5b9bbfa3d9bd1
Author: Jeremy Allison <[email protected]>
Date:   Mon Mar 7 19:20:27 2022 -0800

    s3: libcli: Rename smb_signing_cancel_reply() -> smb1_signing_cancel_reply()
    
    Signed-off-by: Jeremy Allison <[email protected]>
    Signed-off-by: David Mulder <[email protected]>

commit e563725a196d06a2d9de1bf5f1b8d592da0a6913
Author: Jeremy Allison <[email protected]>
Date:   Mon Mar 7 19:18:39 2022 -0800

    s3: libcli: Rename smb_signing_next_seqnum() -> smb1_signing_next_seqnum()
    
    Signed-off-by: Jeremy Allison <[email protected]>
    Signed-off-by: David Mulder <[email protected]>

commit 00d8b05ddbfd42cce56ad7d33da72f67fd07530e
Author: Jeremy Allison <[email protected]>
Date:   Mon Mar 7 19:16:07 2022 -0800

    s3: libcli: Rename smb_signing_md5() -> smb1_signing_md5()
    
    Fix the debug that also used this name.
    
    Signed-off-by: Jeremy Allison <[email protected]>
    Signed-off-by: David Mulder <[email protected]>

commit 7e82ac3a40dbe43b8e954d8d1eb6a4423b27cef9
Author: Jeremy Allison <[email protected]>
Date:   Mon Mar 7 19:14:35 2022 -0800

    s3: libcli: Rename smb_signing_good() -> smb1_signing_good()
    
    Fix the debugs that also used this name.
    
    Signed-off-by: Jeremy Allison <[email protected]>
    Signed-off-by: David Mulder <[email protected]>

commit 6ae33a62bc48a6b3e24563f766b6b0d51729e09c
Author: Jeremy Allison <[email protected]>
Date:   Mon Mar 7 19:12:45 2022 -0800

    s3: libcli: Rename smb_signing_init() -> smb1_signing_init()
    
    Signed-off-by: Jeremy Allison <[email protected]>
    Signed-off-by: David Mulder <[email protected]>

commit cba8ba327f1caf0914ae1608a3a16135506bc15f
Author: Jeremy Allison <[email protected]>
Date:   Mon Mar 7 19:11:33 2022 -0800

    s3: libcli: Rename smb_signing_init_ex() -> smb1_signing_init_ex()
    
    Signed-off-by: Jeremy Allison <[email protected]>
    Signed-off-by: David Mulder <[email protected]>

commit aee7bfa079a9e0befaae67994f55d02f7fe6d8bc
Author: Jeremy Allison <[email protected]>
Date:   Mon Mar 7 19:08:47 2022 -0800

    s3: libcli: Rename static smb_signing_reset_info() -> 
smb1_signing_reset_info()
    
    Signed-off-by: Jeremy Allison <[email protected]>
    Signed-off-by: David Mulder <[email protected]>

commit b879d475bfde86d4f7c73ef17cedd91d03ecfeed
Author: Jeremy Allison <[email protected]>
Date:   Mon Mar 7 19:06:34 2022 -0800

    s3: smbd: Look at the correct signing state for the debug messages in 
make_connection_snum().
    
    The rest of the changes should now be just renaming
    the SMB1 signing functions to make it clear they are
    SMB1 specific.
    
    Signed-off-by: Jeremy Allison <[email protected]>
    Signed-off-by: David Mulder <[email protected]>

commit 1f3f6e20dc086a36de52bffd0bc36e15fb19e1c6
Author: Jeremy Allison <[email protected]>
Date:   Mon Mar 7 19:04:23 2022 -0800

    s3: smbd: Split srv_init_signing() into 2 static functions 
smb1_srv_init_signing() and smb2_srv_init_signing().
    
    Correctly initialize and look at xconn->smb2.signing_mandatory
    for the SMB2 signing state (this gets set correctly for the AD-DC
    case etc. inside smb2_srv_init_signing()).
    
    Signed-off-by: Jeremy Allison <[email protected]>
    Signed-off-by: David Mulder <[email protected]>

commit 3f9d528f3895e2c95d22110e8e7718da30df3c08
Author: Jeremy Allison <[email protected]>
Date:   Mon Mar 7 18:13:11 2022 -0800

    s3: smbd: Add smb2_srv_init_signing(). Initializes 
conn->smb2.signing_mandatory.
    
    Not yet used.
    
    Signed-off-by: Jeremy Allison <[email protected]>
    Signed-off-by: David Mulder <[email protected]>

commit b51b055fc4ba56d5d9a5a990fc6031f80488e6ab
Author: Jeremy Allison <[email protected]>
Date:   Mon Mar 7 18:09:40 2022 -0800

    s3: smbd: Add 'bool signing_mandatory' to struct smbXsrv_connection.smb2 
component.
    
    Not yet used.
    
    Signed-off-by: Jeremy Allison <[email protected]>
    Signed-off-by: David Mulder <[email protected]>

commit 41393579de6e1605de7b216e670575976ba53fb8
Author: Jeremy Allison <[email protected]>
Date:   Mon Mar 7 18:05:41 2022 -0800

    s3: Simple rename 'struct smb_signing_state' -> 'struct smb1_signing_state'
    
    This is only used by the SMB1 signing code, except for one
    bool for SMB2 which we will replace next.
    
    Signed-off-by: Jeremy Allison <[email protected]>
    Signed-off-by: David Mulder <[email protected]>

commit d972f64b30d9681bbc3fbee5b7572eb24d757eb0
Author: Jeremy Allison <[email protected]>
Date:   Wed Sep 8 15:06:11 2021 -0700

    s3: smbd: notify_mid_maps is used by both SMB1 and SMB2.
    
    Signed-off-by: Jeremy Allison <[email protected]>
    Reviewed-by: David Mulder <[email protected]>

-----------------------------------------------------------------------

Summary of changes:
 libcli/smb/smbXcli_base.c   |  22 +++++-----
 libcli/smb/smb_signing.c    | 105 +++++++++++++++++++++-----------------------
 libcli/smb/smb_signing.h    |  29 ++++++------
 source3/param/loadparm.h    |   2 +-
 source3/smbd/globals.h      |   8 ++--
 source3/smbd/negprot.c      |   6 +--
 source3/smbd/notify.c       |   8 ++--
 source3/smbd/nttrans.c      |   2 +-
 source3/smbd/process.c      |   8 ++--
 source3/smbd/proto.h        |  14 +++---
 source3/smbd/reply.c        |  14 +++---
 source3/smbd/service.c      |  10 ++++-
 source3/smbd/sesssetup.c    |  14 +++---
 source3/smbd/signing.c      |  82 ++++++++++++++++++++++------------
 source3/smbd/smb2_negprot.c |   9 ++--
 source3/smbd/trans2.c       |   4 +-
 16 files changed, 181 insertions(+), 156 deletions(-)


Changeset truncated at 500 lines:

diff --git a/libcli/smb/smbXcli_base.c b/libcli/smb/smbXcli_base.c
index 7579fa1c378..0f3e4fa3f90 100644
--- a/libcli/smb/smbXcli_base.c
+++ b/libcli/smb/smbXcli_base.c
@@ -104,7 +104,7 @@ struct smbXcli_conn {
 
                uint16_t mid;
 
-               struct smb_signing_state *signing;
+               struct smb1_signing_state *signing;
                struct smb_trans_enc_state *trans_enc;
 
                struct tevent_req *read_braw_req;
@@ -425,7 +425,7 @@ struct smbXcli_conn *smbXcli_conn_create(TALLOC_CTX 
*mem_ctx,
        conn->smb1.mid = 1;
 
        /* initialise signing */
-       conn->smb1.signing = smb_signing_init(conn,
+       conn->smb1.signing = smb1_signing_init(conn,
                                              conn->allow_signing,
                                              conn->desire_signing,
                                              conn->mandatory_signing);
@@ -790,7 +790,7 @@ bool smb1cli_conn_activate_signing(struct smbXcli_conn 
*conn,
                                   const DATA_BLOB user_session_key,
                                   const DATA_BLOB response)
 {
-       return smb_signing_activate(conn->smb1.signing,
+       return smb1_signing_activate(conn->smb1.signing,
                                    user_session_key,
                                    response);
 }
@@ -801,12 +801,12 @@ bool smb1cli_conn_check_signing(struct smbXcli_conn *conn,
        const uint8_t *hdr = buf + NBT_HDR_SIZE;
        size_t len = smb_len_nbt(buf);
 
-       return smb_signing_check_pdu(conn->smb1.signing, hdr, len, seqnum);
+       return smb1_signing_check_pdu(conn->smb1.signing, hdr, len, seqnum);
 }
 
 bool smb1cli_conn_signing_is_active(struct smbXcli_conn *conn)
 {
-       return smb_signing_is_active(conn->smb1.signing);
+       return smb1_signing_is_active(conn->smb1.signing);
 }
 
 void smb1cli_conn_set_encryption(struct smbXcli_conn *conn,
@@ -949,7 +949,7 @@ static NTSTATUS smbXcli_req_cancel_write_req(struct 
tevent_req *req)
                 * pending, we're able to recover the signing
                 * state.
                 */
-               smb_signing_cancel_reply(conn->smb1.signing,
+               smb1_signing_cancel_reply(conn->smb1.signing,
                                         state->smb1.one_way_seqnum);
                return NT_STATUS_OK;
        }
@@ -1673,9 +1673,9 @@ static NTSTATUS smb1cli_conn_signv(struct smbXcli_conn 
*conn,
                return NT_STATUS_NO_MEMORY;
        }
 
-       *seqnum = smb_signing_next_seqnum(conn->smb1.signing,
+       *seqnum = smb1_signing_next_seqnum(conn->smb1.signing,
                                          one_way_seqnum);
-       status = smb_signing_sign_pdu(conn->smb1.signing,
+       status = smb1_signing_sign_pdu(conn->smb1.signing,
                                      buf,
                                      talloc_get_size(buf),
                                      *seqnum);
@@ -2295,7 +2295,7 @@ static NTSTATUS smb1cli_conn_dispatch_incoming(struct 
smbXcli_conn *conn,
        state = tevent_req_data(req, struct smbXcli_req_state);
 
        if (!oplock_break /* oplock breaks are not signed */
-           && !smb_signing_check_pdu(conn->smb1.signing,
+           && !smb1_signing_check_pdu(conn->smb1.signing,
                                      inhdr, len, state->smb1.seqnum+1)) {
                DEBUG(10, ("cli_check_sign_mac failed\n"));
                return NT_STATUS_ACCESS_DENIED;
@@ -4659,7 +4659,7 @@ static void smbXcli_negprot_smb1_done(struct tevent_req 
*subreq)
                        server_mandatory = true;
                }
 
-               ok = smb_signing_set_negotiated(conn->smb1.signing,
+               ok = smb1_signing_set_negotiated(conn->smb1.signing,
                                                server_allowed,
                                                server_mandatory);
                if (!ok) {
@@ -6138,7 +6138,7 @@ NTSTATUS smb1cli_session_protect_session_key(struct 
smbXcli_session *session)
                return NT_STATUS_INVALID_PARAMETER_MIX;
        }
 
-       status = smb_key_derivation(session->smb1.application_key.data,
+       status = smb1_key_derivation(session->smb1.application_key.data,
                                    session->smb1.application_key.length,
                                    session->smb1.application_key.data);
        if (!NT_STATUS_IS_OK(status)) {
diff --git a/libcli/smb/smb_signing.c b/libcli/smb/smb_signing.c
index c75a0756821..f01865c9bc5 100644
--- a/libcli/smb/smb_signing.c
+++ b/libcli/smb/smb_signing.c
@@ -27,9 +27,9 @@
 #include <gnutls/gnutls.h>
 #include <gnutls/crypto.h>
 
-/* Used by the SMB signing functions. */
+/* Used by the SMB1 signing functions. */
 
-struct smb_signing_state {
+struct smb1_signing_state {
        /* is signing localy allowed */
        bool allowed;
 
@@ -55,7 +55,7 @@ struct smb_signing_state {
        void (*free_fn)(TALLOC_CTX *mem_ctx, void *ptr);
 };
 
-static void smb_signing_reset_info(struct smb_signing_state *si)
+static void smb1_signing_reset_info(struct smb1_signing_state *si)
 {
        si->active = false;
        si->seqnum = 0;
@@ -69,27 +69,27 @@ static void smb_signing_reset_info(struct smb_signing_state 
*si)
        si->mac_key.length = 0;
 }
 
-struct smb_signing_state *smb_signing_init_ex(TALLOC_CTX *mem_ctx,
+struct smb1_signing_state *smb1_signing_init_ex(TALLOC_CTX *mem_ctx,
                                              bool allowed,
                                              bool desired,
                                              bool mandatory,
                                              void *(*alloc_fn)(TALLOC_CTX *, 
size_t),
                                              void (*free_fn)(TALLOC_CTX *, 
void *))
 {
-       struct smb_signing_state *si;
+       struct smb1_signing_state *si;
 
        if (alloc_fn) {
-               void *p = alloc_fn(mem_ctx, sizeof(struct smb_signing_state));
+               void *p = alloc_fn(mem_ctx, sizeof(struct smb1_signing_state));
                if (p == NULL) {
                        return NULL;
                }
-               memset(p, 0, sizeof(struct smb_signing_state));
-               si = (struct smb_signing_state *)p;
+               memset(p, 0, sizeof(struct smb1_signing_state));
+               si = (struct smb1_signing_state *)p;
                si->mem_ctx = mem_ctx;
                si->alloc_fn = alloc_fn;
                si->free_fn = free_fn;
        } else {
-               si = talloc_zero(mem_ctx, struct smb_signing_state);
+               si = talloc_zero(mem_ctx, struct smb1_signing_state);
                if (si == NULL) {
                        return NULL;
                }
@@ -110,16 +110,16 @@ struct smb_signing_state *smb_signing_init_ex(TALLOC_CTX 
*mem_ctx,
        return si;
 }
 
-struct smb_signing_state *smb_signing_init(TALLOC_CTX *mem_ctx,
+struct smb1_signing_state *smb1_signing_init(TALLOC_CTX *mem_ctx,
                                           bool allowed,
                                           bool desired,
                                           bool mandatory)
 {
-       return smb_signing_init_ex(mem_ctx, allowed, desired, mandatory,
+       return smb1_signing_init_ex(mem_ctx, allowed, desired, mandatory,
                                   NULL, NULL);
 }
 
-static bool smb_signing_good(struct smb_signing_state *si,
+static bool smb1_signing_good(struct smb1_signing_state *si,
                             bool good, uint32_t seq)
 {
        if (good) {
@@ -131,18 +131,18 @@ static bool smb_signing_good(struct smb_signing_state *si,
 
        if (!si->mandatory && !si->active) {
                /* Non-mandatory signing - just turn off if this is the first 
bad packet.. */
-               DEBUG(5, ("smb_signing_good: signing negotiated but not 
required and peer\n"
-                         "isn't sending correct signatures. Turning off.\n"));
-               smb_signing_reset_info(si);
+               DBG_INFO("signing negotiated but not required and peer\n"
+                         "isn't sending correct signatures. Turning off.\n");
+               smb1_signing_reset_info(si);
                return true;
        }
 
        /* Mandatory signing or bad packet after signing started - fail and 
disconnect. */
-       DEBUG(0, ("smb_signing_good: BAD SIG: seq %u\n", (unsigned int)seq));
+       DBG_ERR("BAD SIG: seq %u\n", (unsigned int)seq);
        return false;
 }
 
-static NTSTATUS smb_signing_md5(const DATA_BLOB *mac_key,
+static NTSTATUS smb1_signing_md5(const DATA_BLOB *mac_key,
                                const uint8_t *hdr, size_t len,
                                uint32_t seq_number,
                                uint8_t calc_md5_mac[16])
@@ -159,7 +159,7 @@ static NTSTATUS smb_signing_md5(const DATA_BLOB *mac_key,
         * We do this here, to avoid modifying the packet.
         */
 
-       DEBUG(10,("smb_signing_md5: sequence number %u\n", seq_number ));
+       DBG_DEBUG("sequence number %u\n", seq_number );
 
        SIVAL(sequence_buf, 0, seq_number);
        SIVAL(sequence_buf, 4, 0);
@@ -204,7 +204,7 @@ static NTSTATUS smb_signing_md5(const DATA_BLOB *mac_key,
        return NT_STATUS_OK;
 }
 
-uint32_t smb_signing_next_seqnum(struct smb_signing_state *si, bool oneway)
+uint32_t smb1_signing_next_seqnum(struct smb1_signing_state *si, bool oneway)
 {
        uint32_t seqnum;
 
@@ -222,7 +222,7 @@ uint32_t smb_signing_next_seqnum(struct smb_signing_state 
*si, bool oneway)
        return seqnum;
 }
 
-void smb_signing_cancel_reply(struct smb_signing_state *si, bool oneway)
+void smb1_signing_cancel_reply(struct smb1_signing_state *si, bool oneway)
 {
        if (si->mac_key.length == 0) {
                return;
@@ -235,7 +235,7 @@ void smb_signing_cancel_reply(struct smb_signing_state *si, 
bool oneway)
        }
 }
 
-NTSTATUS smb_signing_sign_pdu(struct smb_signing_state *si,
+NTSTATUS smb1_signing_sign_pdu(struct smb1_signing_state *si,
                              uint8_t *outhdr, size_t len,
                              uint32_t seqnum)
 {
@@ -251,9 +251,9 @@ NTSTATUS smb_signing_sign_pdu(struct smb_signing_state *si,
 
        /* JRA Paranioa test - we should be able to get rid of this... */
        if (len < (HDR_SS_FIELD + 8)) {
-               DEBUG(1,("smb_signing_sign_pdu: Logic error. "
+               DBG_WARNING("Logic error. "
                         "Can't check signature on short packet! smb_len = 
%u\n",
-                        (unsigned)len));
+                        (unsigned)len);
                abort();
        }
 
@@ -286,7 +286,7 @@ NTSTATUS smb_signing_sign_pdu(struct smb_signing_state *si,
        } else {
                NTSTATUS status;
 
-               status = smb_signing_md5(&si->mac_key,
+               status = smb1_signing_md5(&si->mac_key,
                                         outhdr,
                                         len,
                                         seqnum,
@@ -296,7 +296,7 @@ NTSTATUS smb_signing_sign_pdu(struct smb_signing_state *si,
                }
        }
 
-       DEBUG(10, ("smb_signing_sign_pdu: sent SMB signature of\n"));
+       DBG_DEBUG("sent SMB signature of\n");
        dump_data(10, calc_md5_mac, 8);
 
        memcpy(&outhdr[HDR_SS_FIELD], calc_md5_mac, 8);
@@ -307,7 +307,7 @@ NTSTATUS smb_signing_sign_pdu(struct smb_signing_state *si,
        return NT_STATUS_OK;
 }
 
-bool smb_signing_check_pdu(struct smb_signing_state *si,
+bool smb1_signing_check_pdu(struct smb1_signing_state *si,
                           const uint8_t *inhdr, size_t len,
                           uint32_t seqnum)
 {
@@ -321,13 +321,13 @@ bool smb_signing_check_pdu(struct smb_signing_state *si,
        }
 
        if (len < (HDR_SS_FIELD + 8)) {
-               DEBUG(1,("smb_signing_check_pdu: Can't check signature "
+               DBG_WARNING("Can't check signature "
                         "on short packet! smb_len = %u\n",
-                        (unsigned)len));
+                        (unsigned)len);
                return false;
        }
 
-       status = smb_signing_md5(&si->mac_key,
+       status = smb1_signing_md5(&si->mac_key,
                                 inhdr,
                                 len,
                                 seqnum,
@@ -345,35 +345,33 @@ bool smb_signing_check_pdu(struct smb_signing_state *si,
                int i;
                const int sign_range = 5;
 
-               DEBUG(5, ("smb_signing_check_pdu: BAD SIG: wanted SMB signature 
of\n"));
+               DBG_INFO("BAD SIG: wanted SMB signature of\n");
                dump_data(5, calc_md5_mac, 8);
 
-               DEBUG(5, ("smb_signing_check_pdu: BAD SIG: got SMB signature 
of\n"));
+               DBG_INFO("BAD SIG: got SMB signature of\n");
                dump_data(5, reply_sent_mac, 8);
 
                for (i = -sign_range; i < sign_range; i++) {
-                       smb_signing_md5(&si->mac_key, inhdr, len,
+                       smb1_signing_md5(&si->mac_key, inhdr, len,
                                        seqnum+i, calc_md5_mac);
                        if (memcmp(reply_sent_mac, calc_md5_mac, 8) == 0) {
-                               DEBUG(0,("smb_signing_check_pdu: "
-                                        "out of seq. seq num %u matches. "
+                               DBG_ERR("out of seq. seq num %u matches. "
                                         "We were expecting seq %u\n",
                                         (unsigned int)seqnum+i,
-                                        (unsigned int)seqnum));
+                                        (unsigned int)seqnum);
                                break;
                        }
                }
        } else {
-               DEBUG(10, ("smb_signing_check_pdu: seq %u: "
-                          "got good SMB signature of\n",
-                          (unsigned int)seqnum));
+               DBG_DEBUG("seq %u: got good SMB signature of\n",
+                          (unsigned int)seqnum);
                dump_data(10, reply_sent_mac, 8);
        }
 
-       return smb_signing_good(si, good, seqnum);
+       return smb1_signing_good(si, good, seqnum);
 }
 
-bool smb_signing_activate(struct smb_signing_state *si,
+bool smb1_signing_activate(struct smb1_signing_state *si,
                          const DATA_BLOB user_session_key,
                          const DATA_BLOB response)
 {
@@ -396,7 +394,7 @@ bool smb_signing_activate(struct smb_signing_state *si,
                return false;
        }
 
-       smb_signing_reset_info(si);
+       smb1_signing_reset_info(si);
 
        len = response.length + user_session_key.length;
        if (si->alloc_fn) {
@@ -415,19 +413,19 @@ bool smb_signing_activate(struct smb_signing_state *si,
        ofs = 0;
        memcpy(&si->mac_key.data[ofs], user_session_key.data, 
user_session_key.length);
 
-       DEBUG(10, ("smb_signing_activate: user_session_key\n"));
+       DBG_DEBUG("user_session_key\n");
        dump_data(10, user_session_key.data, user_session_key.length);
 
        if (response.length) {
                ofs = user_session_key.length;
                memcpy(&si->mac_key.data[ofs], response.data, response.length);
-               DEBUG(10, ("smb_signing_activate: response_data\n"));
+               DBG_DEBUG("response_data\n");
                dump_data(10, response.data, response.length);
        } else {
-               DEBUG(10, ("smb_signing_activate: NULL response_data\n"));
+               DBG_DEBUG("NULL response_data\n");
        }
 
-       dump_data_pw("smb_signing_activate: mac key is:\n",
+       dump_data_pw("smb1_signing_activate: mac key is:\n",
                     si->mac_key.data, si->mac_key.length);
 
        /* Initialise the sequence number */
@@ -436,27 +434,22 @@ bool smb_signing_activate(struct smb_signing_state *si,
        return true;
 }
 
-bool smb_signing_is_active(struct smb_signing_state *si)
+bool smb1_signing_is_active(struct smb1_signing_state *si)
 {
        return si->active;
 }
 
-bool smb_signing_is_allowed(struct smb_signing_state *si)
-{
-       return si->allowed;
-}
-
-bool smb_signing_is_desired(struct smb_signing_state *si)
+bool smb1_signing_is_desired(struct smb1_signing_state *si)
 {
        return si->desired;
 }
 
-bool smb_signing_is_mandatory(struct smb_signing_state *si)
+bool smb1_signing_is_mandatory(struct smb1_signing_state *si)
 {
        return si->mandatory;
 }
 
-bool smb_signing_set_negotiated(struct smb_signing_state *si,
+bool smb1_signing_set_negotiated(struct smb1_signing_state *si,
                                bool allowed, bool mandatory)
 {
        if (si->active) {
@@ -499,12 +492,12 @@ bool smb_signing_set_negotiated(struct smb_signing_state 
*si,
        return true;
 }
 
-bool smb_signing_is_negotiated(struct smb_signing_state *si)
+bool smb1_signing_is_negotiated(struct smb1_signing_state *si)
 {
        return si->negotiated;
 }
 
-NTSTATUS smb_key_derivation(const uint8_t *KI,
+NTSTATUS smb1_key_derivation(const uint8_t *KI,
                            size_t KI_len,
                            uint8_t KO[16])
 {
diff --git a/libcli/smb/smb_signing.h b/libcli/smb/smb_signing.h
index 66cf40e4065..9f2f3c15a1a 100644
--- a/libcli/smb/smb_signing.h
+++ b/libcli/smb/smb_signing.h
@@ -22,37 +22,36 @@
 #ifndef _SMB_SIGNING_H_
 #define _SMB_SIGNING_H_
 
-struct smb_signing_state;
+struct smb1_signing_state;
 
-struct smb_signing_state *smb_signing_init(TALLOC_CTX *mem_ctx,
+struct smb1_signing_state *smb1_signing_init(TALLOC_CTX *mem_ctx,
                                           bool allowed,
                                           bool desired,
                                           bool mandatory);
-struct smb_signing_state *smb_signing_init_ex(TALLOC_CTX *mem_ctx,
+struct smb1_signing_state *smb1_signing_init_ex(TALLOC_CTX *mem_ctx,
                                              bool allowed,
                                              bool desired,
                                              bool mandatory,
                                              void *(*alloc_fn)(TALLOC_CTX *, 
size_t),
                                              void (*free_fn)(TALLOC_CTX *, 
void *));
-uint32_t smb_signing_next_seqnum(struct smb_signing_state *si, bool oneway);
-void smb_signing_cancel_reply(struct smb_signing_state *si, bool oneway);
-NTSTATUS smb_signing_sign_pdu(struct smb_signing_state *si,
+uint32_t smb1_signing_next_seqnum(struct smb1_signing_state *si, bool oneway);
+void smb1_signing_cancel_reply(struct smb1_signing_state *si, bool oneway);
+NTSTATUS smb1_signing_sign_pdu(struct smb1_signing_state *si,
                              uint8_t *outhdr, size_t len,
                              uint32_t seqnum);
-bool smb_signing_check_pdu(struct smb_signing_state *si,
+bool smb1_signing_check_pdu(struct smb1_signing_state *si,
                           const uint8_t *inhdr, size_t len,
                           uint32_t seqnum);
-bool smb_signing_activate(struct smb_signing_state *si,
+bool smb1_signing_activate(struct smb1_signing_state *si,
                          const DATA_BLOB user_session_key,
                          const DATA_BLOB response);
-bool smb_signing_is_active(struct smb_signing_state *si);
-bool smb_signing_is_allowed(struct smb_signing_state *si);
-bool smb_signing_is_desired(struct smb_signing_state *si);
-bool smb_signing_is_mandatory(struct smb_signing_state *si);
-bool smb_signing_set_negotiated(struct smb_signing_state *si,
+bool smb1_signing_is_active(struct smb1_signing_state *si);
+bool smb1_signing_is_desired(struct smb1_signing_state *si);
+bool smb1_signing_is_mandatory(struct smb1_signing_state *si);
+bool smb1_signing_set_negotiated(struct smb1_signing_state *si,
                                bool allowed, bool mandatory);
-bool smb_signing_is_negotiated(struct smb_signing_state *si);
-NTSTATUS smb_key_derivation(const uint8_t *KI,
+bool smb1_signing_is_negotiated(struct smb1_signing_state *si);
+NTSTATUS smb1_key_derivation(const uint8_t *KI,
                            size_t KI_len,
                            uint8_t KO[16]);
 
diff --git a/source3/param/loadparm.h b/source3/param/loadparm.h
index 52197ae4979..55a8926b920 100644
--- a/source3/param/loadparm.h
+++ b/source3/param/loadparm.h
@@ -171,7 +171,7 @@ const char *lp_printcapname(void);
 bool lp_disable_spoolss( void );
 void lp_set_spoolss_state( uint32_t state );
 uint32_t lp_get_spoolss_state( void );
-struct smb_signing_state;
+struct smb1_signing_state;
 void set_use_sendfile(int snum, bool val);
 void lp_set_mangling_method(const char *new_method);
 bool lp_posix_pathnames(void);
diff --git a/source3/smbd/globals.h b/source3/smbd/globals.h
index b5bb26d1e36..a024305486c 100644
--- a/source3/smbd/globals.h
+++ b/source3/smbd/globals.h
@@ -439,7 +439,7 @@ struct smbXsrv_connection {
                         */
                        int max_send;
                } sessions;
-               struct smb_signing_state *signing_state;
+               struct smb1_signing_state *signing_state;
 
                struct {
                        uint16_t client_major;
@@ -542,6 +542,8 @@ struct smbXsrv_connection {
                struct {
                        uint8_t read_body_padding;
                } smbtorture;


-- 
Samba Shared Repository

Reply via email to