2011-05-05 20:12:07 +04:00
/*
Unix SMB / CIFS implementation .
smb2 lib
Copyright ( C ) Volker Lendecke 2011
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation ; either version 3 of the License , or
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
along with this program . If not , see < http : //www.gnu.org/licenses/>.
*/
# include "includes.h"
# include "client.h"
# include "async_smb.h"
# include "smb2cli.h"
2011-09-03 12:18:17 +04:00
# include "../libcli/smb/smbXcli_base.h"
2011-05-05 20:12:07 +04:00
# include "libsmb/proto.h"
# include "lib/util/tevent_ntstatus.h"
# include "../libcli/auth/spnego.h"
2011-07-25 10:04:38 +04:00
# include "../auth/ntlmssp/ntlmssp.h"
2011-05-05 20:12:07 +04:00
2011-09-18 22:23:22 +04:00
struct smb2cli_session_setup_state {
2011-09-03 12:18:17 +04:00
struct smbXcli_session * session ;
2011-05-05 20:12:07 +04:00
uint8_t fixed [ 24 ] ;
2011-09-05 20:22:57 +04:00
uint8_t dyn_pad [ 1 ] ;
2011-09-03 12:18:17 +04:00
struct iovec * recv_iov ;
DATA_BLOB out_security_buffer ;
NTSTATUS status ;
2011-05-05 20:12:07 +04:00
} ;
2011-09-18 22:23:22 +04:00
static void smb2cli_session_setup_done ( struct tevent_req * subreq ) ;
2011-05-05 20:12:07 +04:00
2011-09-19 07:37:34 +04:00
struct tevent_req * smb2cli_session_setup_send ( TALLOC_CTX * mem_ctx ,
2011-09-03 12:18:17 +04:00
struct tevent_context * ev ,
struct smbXcli_conn * conn ,
uint32_t timeout_msec ,
struct smbXcli_session * session ,
uint8_t in_flags ,
uint32_t in_capabilities ,
uint32_t in_channel ,
struct smbXcli_session * in_previous_session ,
const DATA_BLOB * in_security_buffer )
2011-05-05 20:12:07 +04:00
{
struct tevent_req * req , * subreq ;
2011-09-18 22:23:22 +04:00
struct smb2cli_session_setup_state * state ;
2011-05-05 20:12:07 +04:00
uint8_t * buf ;
2011-09-05 20:22:57 +04:00
uint8_t * dyn ;
size_t dyn_len ;
2011-09-03 12:18:17 +04:00
uint8_t security_mode ;
uint16_t security_buffer_offset = 0 ;
uint16_t security_buffer_length = 0 ;
uint64_t previous_session_id = 0 ;
2011-05-05 20:12:07 +04:00
req = tevent_req_create ( mem_ctx , & state ,
2011-09-18 22:23:22 +04:00
struct smb2cli_session_setup_state ) ;
2011-05-05 20:12:07 +04:00
if ( req = = NULL ) {
return NULL ;
}
2011-09-03 12:18:17 +04:00
if ( session = = NULL ) {
tevent_req_nterror ( req , NT_STATUS_INVALID_PARAMETER_MIX ) ;
return tevent_req_post ( req , ev ) ;
}
state - > session = session ;
security_mode = smb2cli_session_security_mode ( session ) ;
if ( in_security_buffer ) {
if ( in_security_buffer - > length > UINT16_MAX ) {
tevent_req_nterror ( req , NT_STATUS_INVALID_PARAMETER_MIX ) ;
return tevent_req_post ( req , ev ) ;
}
security_buffer_offset = SMB2_HDR_BODY + 24 ;
security_buffer_length = in_security_buffer - > length ;
}
if ( in_previous_session ) {
previous_session_id =
smb2cli_session_current_id ( in_previous_session ) ;
}
2011-05-05 20:12:07 +04:00
buf = state - > fixed ;
2011-09-03 12:18:17 +04:00
SSVAL ( buf , 0 , 25 ) ;
SCVAL ( buf , 2 , in_flags ) ;
SCVAL ( buf , 3 , security_mode ) ;
SIVAL ( buf , 4 , in_capabilities ) ;
SIVAL ( buf , 8 , in_channel ) ;
SSVAL ( buf , 12 , security_buffer_offset ) ;
SSVAL ( buf , 14 , security_buffer_length ) ;
SBVAL ( buf , 16 , previous_session_id ) ;
if ( security_buffer_length > 0 ) {
dyn = in_security_buffer - > data ;
dyn_len = in_security_buffer - > length ;
2011-09-05 20:22:57 +04:00
} else {
dyn = state - > dyn_pad ; ;
dyn_len = sizeof ( state - > dyn_pad ) ;
}
2011-09-03 12:18:17 +04:00
subreq = smb2cli_req_send ( state , ev ,
conn , SMB2_OP_SESSSETUP ,
2011-08-12 19:26:13 +04:00
0 , 0 , /* flags */
2011-09-03 12:18:17 +04:00
timeout_msec ,
0xFEFF ,
2011-08-31 02:32:48 +04:00
0 , /* tid */
2011-09-03 12:18:17 +04:00
session ,
2011-05-05 20:12:07 +04:00
state - > fixed , sizeof ( state - > fixed ) ,
2011-09-05 20:22:57 +04:00
dyn , dyn_len ) ;
2011-05-05 20:12:07 +04:00
if ( tevent_req_nomem ( subreq , req ) ) {
return tevent_req_post ( req , ev ) ;
}
2011-09-18 22:23:22 +04:00
tevent_req_set_callback ( subreq , smb2cli_session_setup_done , req ) ;
2011-05-05 20:12:07 +04:00
return req ;
}
2011-09-18 22:23:22 +04:00
static void smb2cli_session_setup_done ( struct tevent_req * subreq )
2011-05-05 20:12:07 +04:00
{
struct tevent_req * req =
tevent_req_callback_data ( subreq ,
struct tevent_req ) ;
2011-09-18 22:23:22 +04:00
struct smb2cli_session_setup_state * state =
2011-05-05 20:12:07 +04:00
tevent_req_data ( req ,
2011-09-18 22:23:22 +04:00
struct smb2cli_session_setup_state ) ;
2011-05-05 20:12:07 +04:00
NTSTATUS status ;
2011-09-03 12:18:17 +04:00
uint64_t current_session_id ;
uint64_t session_id ;
uint16_t session_flags ;
uint16_t expected_offset = 0 ;
uint16_t security_buffer_offset ;
uint16_t security_buffer_length ;
uint8_t * security_buffer_data = NULL ;
const uint8_t * hdr ;
const uint8_t * body ;
2011-08-31 02:40:06 +04:00
static const struct smb2cli_req_expected_response expected [ ] = {
{
. status = NT_STATUS_MORE_PROCESSING_REQUIRED ,
. body_size = 0x09
} ,
{
. status = NT_STATUS_OK ,
. body_size = 0x09
}
} ;
2011-09-03 12:18:17 +04:00
status = smb2cli_req_recv ( subreq , state , & state - > recv_iov ,
2011-08-31 02:40:06 +04:00
expected , ARRAY_SIZE ( expected ) ) ;
2011-09-03 12:18:17 +04:00
TALLOC_FREE ( subreq ) ;
2011-05-05 20:12:07 +04:00
if ( ! NT_STATUS_IS_OK ( status ) & &
! NT_STATUS_EQUAL ( status , NT_STATUS_MORE_PROCESSING_REQUIRED ) ) {
tevent_req_nterror ( req , status ) ;
return ;
}
2011-09-03 12:18:17 +04:00
hdr = ( const uint8_t * ) state - > recv_iov [ 0 ] . iov_base ;
body = ( const uint8_t * ) state - > recv_iov [ 1 ] . iov_base ;
2011-05-05 20:12:07 +04:00
2011-09-03 12:18:17 +04:00
session_id = BVAL ( hdr , SMB2_HDR_SESSION_ID ) ;
session_flags = SVAL ( body , 2 ) ;
security_buffer_offset = SVAL ( body , 4 ) ;
security_buffer_length = SVAL ( body , 6 ) ;
if ( security_buffer_length > 0 ) {
expected_offset = SMB2_HDR_BODY + 8 ;
}
if ( security_buffer_offset ! = 0 ) {
security_buffer_data = ( uint8_t * ) state - > recv_iov [ 2 ] . iov_base ;
expected_offset = SMB2_HDR_BODY + 8 ;
}
if ( security_buffer_offset ! = expected_offset ) {
2011-05-05 20:12:07 +04:00
tevent_req_nterror ( req , NT_STATUS_INVALID_NETWORK_RESPONSE ) ;
return ;
}
2011-09-03 12:18:17 +04:00
if ( security_buffer_length > state - > recv_iov [ 2 ] . iov_len ) {
tevent_req_nterror ( req , NT_STATUS_INVALID_NETWORK_RESPONSE ) ;
2011-05-05 20:12:07 +04:00
return ;
}
2011-09-03 12:18:17 +04:00
state - > out_security_buffer . data = security_buffer_data ;
state - > out_security_buffer . length = security_buffer_length ;
current_session_id = smb2cli_session_current_id ( state - > session ) ;
if ( current_session_id = = 0 ) {
/* A new session was requested */
current_session_id = session_id ;
}
if ( current_session_id ! = session_id ) {
tevent_req_nterror ( req , NT_STATUS_INVALID_NETWORK_RESPONSE ) ;
return ;
}
smb2cli_session_set_id_and_flags ( state - > session ,
session_id , session_flags ) ;
state - > status = status ;
2011-05-05 20:12:07 +04:00
tevent_req_done ( req ) ;
}
2011-09-19 07:37:34 +04:00
NTSTATUS smb2cli_session_setup_recv ( struct tevent_req * req ,
TALLOC_CTX * mem_ctx ,
struct iovec * * recv_iov ,
DATA_BLOB * out_security_buffer )
2011-05-05 20:12:07 +04:00
{
2011-09-18 22:23:22 +04:00
struct smb2cli_session_setup_state * state =
2011-05-05 20:12:07 +04:00
tevent_req_data ( req ,
2011-09-18 22:23:22 +04:00
struct smb2cli_session_setup_state ) ;
2011-09-03 12:18:17 +04:00
NTSTATUS status ;
struct iovec * _tmp ;
2011-05-05 20:12:07 +04:00
2011-09-03 12:18:17 +04:00
if ( tevent_req_is_nterror ( req , & status ) ) {
tevent_req_received ( req ) ;
2011-05-05 20:12:07 +04:00
return status ;
}
2011-09-03 12:18:17 +04:00
if ( recv_iov = = NULL ) {
recv_iov = & _tmp ;
}
* recv_iov = talloc_move ( mem_ctx , & state - > recv_iov ) ;
* out_security_buffer = state - > out_security_buffer ;
/*
* Return the status from the server :
* NT_STATUS_MORE_PROCESSING_REQUIRED or
* NT_STATUS_OK .
*/
status = state - > status ;
tevent_req_received ( req ) ;
2011-05-05 20:12:07 +04:00
return status ;
}
struct smb2cli_logoff_state {
2011-11-21 19:30:09 +04:00
struct cli_state * cli ;
2011-05-05 20:12:07 +04:00
uint8_t fixed [ 4 ] ;
} ;
static void smb2cli_logoff_done ( struct tevent_req * subreq ) ;
struct tevent_req * smb2cli_logoff_send ( TALLOC_CTX * mem_ctx ,
struct tevent_context * ev ,
struct cli_state * cli )
{
struct tevent_req * req , * subreq ;
struct smb2cli_logoff_state * state ;
req = tevent_req_create ( mem_ctx , & state ,
struct smb2cli_logoff_state ) ;
if ( req = = NULL ) {
return NULL ;
}
2011-11-21 19:30:09 +04:00
state - > cli = cli ;
2011-05-05 20:12:07 +04:00
SSVAL ( state - > fixed , 0 , 4 ) ;
2011-09-03 12:18:17 +04:00
subreq = smb2cli_req_send ( state , ev ,
2011-09-22 23:09:00 +04:00
cli - > conn , SMB2_OP_LOGOFF ,
2011-08-12 19:26:13 +04:00
0 , 0 , /* flags */
2011-09-17 21:56:50 +04:00
cli - > timeout ,
2011-08-12 19:26:13 +04:00
cli - > smb2 . pid ,
0 , /* tid */
2011-09-03 12:18:17 +04:00
cli - > smb2 . session ,
2011-05-05 20:12:07 +04:00
state - > fixed , sizeof ( state - > fixed ) ,
NULL , 0 ) ;
if ( tevent_req_nomem ( subreq , req ) ) {
return tevent_req_post ( req , ev ) ;
}
tevent_req_set_callback ( subreq , smb2cli_logoff_done , req ) ;
return req ;
}
static void smb2cli_logoff_done ( struct tevent_req * subreq )
{
struct tevent_req * req =
tevent_req_callback_data ( subreq ,
struct tevent_req ) ;
2011-11-21 19:30:09 +04:00
struct smb2cli_logoff_state * state =
tevent_req_data ( req ,
struct smb2cli_logoff_state ) ;
2011-05-05 20:12:07 +04:00
NTSTATUS status ;
struct iovec * iov ;
2011-08-31 02:40:06 +04:00
static const struct smb2cli_req_expected_response expected [ ] = {
{
. status = NT_STATUS_OK ,
. body_size = 0x04
}
} ;
2011-05-05 20:12:07 +04:00
2011-11-21 19:30:09 +04:00
status = smb2cli_req_recv ( subreq , state , & iov ,
2011-08-31 02:40:06 +04:00
expected , ARRAY_SIZE ( expected ) ) ;
2011-05-05 20:12:07 +04:00
TALLOC_FREE ( subreq ) ;
2011-11-21 19:30:09 +04:00
TALLOC_FREE ( state - > cli - > smb2 . session ) ;
2011-05-05 20:12:07 +04:00
if ( tevent_req_nterror ( req , status ) ) {
return ;
}
tevent_req_done ( req ) ;
}
NTSTATUS smb2cli_logoff_recv ( struct tevent_req * req )
{
return tevent_req_simple_recv_ntstatus ( req ) ;
}
NTSTATUS smb2cli_logoff ( struct cli_state * cli )
{
TALLOC_CTX * frame = talloc_stackframe ( ) ;
struct event_context * ev ;
struct tevent_req * req ;
NTSTATUS status = NT_STATUS_NO_MEMORY ;
if ( cli_has_async_calls ( cli ) ) {
/*
* Can ' t use sync call while an async call is in flight
*/
status = NT_STATUS_INVALID_PARAMETER ;
goto fail ;
}
ev = event_context_init ( frame ) ;
if ( ev = = NULL ) {
goto fail ;
}
req = smb2cli_logoff_send ( frame , ev , cli ) ;
if ( req = = NULL ) {
goto fail ;
}
if ( ! tevent_req_poll_ntstatus ( req , ev , & status ) ) {
goto fail ;
}
status = smb2cli_logoff_recv ( req ) ;
fail :
TALLOC_FREE ( frame ) ;
return status ;
}