2003-11-26 03:36:17 +00:00
/*
Unix SMB / CIFS implementation .
dcerpc utility functions
Copyright ( C ) Andrew Tridgell 2003
2004-10-18 15:18:05 +00:00
Copyright ( C ) Jelmer Vernooij 2004
2003-11-26 03:36:17 +00:00
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation ; either version 2 of the License , or
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
along with this program ; if not , write to the Free Software
Foundation , Inc . , 675 Mass Ave , Cambridge , MA 0213 9 , USA .
*/
# include "includes.h"
/*
work out what TCP port to use for a given interface on a given host
*/
NTSTATUS dcerpc_epm_map_tcp_port ( const char * server ,
2004-06-01 10:12:52 +00:00
const char * uuid , uint_t version ,
2004-05-25 16:24:13 +00:00
uint32_t * port )
2003-11-26 03:36:17 +00:00
{
struct dcerpc_pipe * p ;
NTSTATUS status ;
struct epm_Map r ;
struct policy_handle handle ;
2003-12-16 09:02:58 +00:00
struct GUID guid ;
2003-11-26 03:36:17 +00:00
struct epm_twr_t twr , * twr_r ;
2003-11-27 05:34:28 +00:00
if ( strcasecmp ( uuid , DCERPC_EPMAPPER_UUID ) = = 0 | |
strcasecmp ( uuid , DCERPC_MGMT_UUID ) = = 0 ) {
2003-11-27 04:02:15 +00:00
/* don't lookup epmapper via epmapper! */
2003-11-27 04:04:31 +00:00
* port = EPMAPPER_PORT ;
2003-11-27 04:02:15 +00:00
return NT_STATUS_OK ;
}
2004-09-22 22:20:40 +00:00
status = dcerpc_pipe_open_tcp ( & p , server , EPMAPPER_PORT , AF_UNSPEC ) ;
2003-11-26 03:36:17 +00:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
return status ;
}
/* we can use the pipes memory context here as we will have a short
lived connection */
2004-08-30 03:10:43 +00:00
status = dcerpc_bind_byuuid ( p , p ,
2003-11-26 03:36:17 +00:00
DCERPC_EPMAPPER_UUID ,
DCERPC_EPMAPPER_VERSION ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
dcerpc_pipe_close ( p ) ;
return status ;
}
ZERO_STRUCT ( handle ) ;
ZERO_STRUCT ( guid ) ;
2004-10-21 10:52:03 +00:00
twr . tower . num_floors = 5 ;
twr . tower . floors = talloc ( p , sizeof ( twr . tower . floors [ 0 ] ) * 5 ) ;
2003-11-26 03:36:17 +00:00
/* what I'd like for christmas ... */
/* an RPC interface ... */
2004-10-21 10:52:03 +00:00
twr . tower . floors [ 0 ] . lhs . protocol = EPM_PROTOCOL_UUID ;
GUID_from_string ( uuid , & twr . tower . floors [ 0 ] . lhs . info . uuid . uuid ) ;
twr . tower . floors [ 0 ] . lhs . info . uuid . version = version ;
twr . tower . floors [ 0 ] . rhs . uuid . unknown = 0 ;
2003-11-26 03:36:17 +00:00
/* encoded with NDR ... */
2004-10-21 10:52:03 +00:00
twr . tower . floors [ 1 ] . lhs . protocol = EPM_PROTOCOL_UUID ;
GUID_from_string ( NDR_GUID , & twr . tower . floors [ 1 ] . lhs . info . uuid . uuid ) ;
twr . tower . floors [ 1 ] . lhs . info . uuid . version = NDR_GUID_VERSION ;
twr . tower . floors [ 1 ] . rhs . uuid . unknown = 0 ;
2003-11-26 03:36:17 +00:00
/* on an RPC connection ... */
2004-10-21 10:52:03 +00:00
twr . tower . floors [ 2 ] . lhs . protocol = EPM_PROTOCOL_NCACN ;
twr . tower . floors [ 2 ] . lhs . info . lhs_data = data_blob ( NULL , 0 ) ;
twr . tower . floors [ 2 ] . rhs . ncacn . minor_version = 0 ;
2003-11-26 03:36:17 +00:00
/* on a TCP port ... */
2004-10-21 10:52:03 +00:00
twr . tower . floors [ 3 ] . lhs . protocol = EPM_PROTOCOL_TCP ;
twr . tower . floors [ 3 ] . lhs . info . lhs_data = data_blob ( NULL , 0 ) ;
twr . tower . floors [ 3 ] . rhs . tcp . port = 0 ;
2003-11-26 03:36:17 +00:00
/* on an IP link ... */
2004-10-21 10:52:03 +00:00
twr . tower . floors [ 4 ] . lhs . protocol = EPM_PROTOCOL_IP ;
twr . tower . floors [ 4 ] . lhs . info . lhs_data = data_blob ( NULL , 0 ) ;
twr . tower . floors [ 4 ] . rhs . ip . address = 0 ;
2003-11-26 03:36:17 +00:00
2003-11-26 03:41:06 +00:00
/* with some nice pretty paper around it of course */
2003-11-26 03:36:17 +00:00
r . in . object = & guid ;
r . in . map_tower = & twr ;
r . in . entry_handle = & handle ;
r . in . max_towers = 1 ;
r . out . entry_handle = & handle ;
2004-08-30 03:10:43 +00:00
status = dcerpc_epm_Map ( p , p , & r ) ;
2003-11-26 03:36:17 +00:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
dcerpc_pipe_close ( p ) ;
return status ;
}
2004-08-14 16:08:32 +00:00
if ( r . out . result ! = 0 | | r . out . num_towers ! = 1 ) {
2003-11-26 03:36:17 +00:00
dcerpc_pipe_close ( p ) ;
return NT_STATUS_PORT_UNREACHABLE ;
}
twr_r = r . out . towers [ 0 ] . twr ;
if ( ! twr_r ) {
dcerpc_pipe_close ( p ) ;
return NT_STATUS_PORT_UNREACHABLE ;
}
2004-10-21 10:52:03 +00:00
if ( twr_r - > tower . num_floors ! = 5 | |
twr_r - > tower . floors [ 3 ] . lhs . protocol ! = twr . tower . floors [ 3 ] . lhs . protocol ) {
2003-11-26 03:36:17 +00:00
dcerpc_pipe_close ( p ) ;
return NT_STATUS_PORT_UNREACHABLE ;
}
2004-10-21 10:52:03 +00:00
* port = twr_r - > tower . floors [ 3 ] . rhs . tcp . port ;
2003-11-26 03:36:17 +00:00
dcerpc_pipe_close ( p ) ;
return NT_STATUS_OK ;
}
2003-11-27 07:28:46 +00:00
/*
find the pipe name for a local IDL interface
*/
2004-05-25 16:24:13 +00:00
const char * idl_pipe_name ( const char * uuid , uint32_t if_version )
2003-11-27 07:28:46 +00:00
{
int i ;
for ( i = 0 ; dcerpc_pipes [ i ] ; i + + ) {
if ( strcasecmp ( dcerpc_pipes [ i ] - > uuid , uuid ) = = 0 & &
dcerpc_pipes [ i ] - > if_version = = if_version ) {
return dcerpc_pipes [ i ] - > name ;
}
}
return " UNKNOWN " ;
}
/*
find the number of calls defined by local IDL
*/
2004-05-25 16:24:13 +00:00
int idl_num_calls ( const char * uuid , uint32_t if_version )
2003-11-27 07:28:46 +00:00
{
int i ;
for ( i = 0 ; dcerpc_pipes [ i ] ; i + + ) {
if ( strcasecmp ( dcerpc_pipes [ i ] - > uuid , uuid ) = = 0 & &
dcerpc_pipes [ i ] - > if_version = = if_version ) {
return dcerpc_pipes [ i ] - > num_calls ;
}
}
return - 1 ;
}
2003-11-28 08:51:09 +00:00
/*
find a dcerpc interface by name
*/
const struct dcerpc_interface_table * idl_iface_by_name ( const char * name )
{
int i ;
for ( i = 0 ; dcerpc_pipes [ i ] ; i + + ) {
if ( strcasecmp ( dcerpc_pipes [ i ] - > name , name ) = = 0 ) {
return dcerpc_pipes [ i ] ;
}
}
return NULL ;
}
2003-12-14 01:09:10 +00:00
2003-12-15 03:29:55 +00:00
/*
find a dcerpc interface by uuid
*/
const struct dcerpc_interface_table * idl_iface_by_uuid ( const char * uuid )
{
int i ;
for ( i = 0 ; dcerpc_pipes [ i ] ; i + + ) {
if ( strcasecmp ( dcerpc_pipes [ i ] - > uuid , uuid ) = = 0 ) {
return dcerpc_pipes [ i ] ;
}
}
return NULL ;
}
2003-12-14 01:09:10 +00:00
/*
push a dcerpc_packet into a blob , potentially with auth info
*/
NTSTATUS dcerpc_push_auth ( DATA_BLOB * blob , TALLOC_CTX * mem_ctx ,
struct dcerpc_packet * pkt ,
2003-12-17 02:06:44 +00:00
struct dcerpc_auth * auth_info )
2003-12-14 01:09:10 +00:00
{
NTSTATUS status ;
struct ndr_push * ndr ;
ndr = ndr_push_init_ctx ( mem_ctx ) ;
if ( ! ndr ) {
return NT_STATUS_NO_MEMORY ;
}
2003-12-17 02:06:44 +00:00
if ( ! ( pkt - > drep [ 0 ] & DCERPC_DREP_LE ) ) {
2003-12-16 09:02:58 +00:00
ndr - > flags | = LIBNDR_FLAG_BIGENDIAN ;
}
2003-12-14 01:09:10 +00:00
if ( auth_info ) {
pkt - > auth_length = auth_info - > credentials . length ;
} else {
pkt - > auth_length = 0 ;
}
status = ndr_push_dcerpc_packet ( ndr , NDR_SCALARS | NDR_BUFFERS , pkt ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
return status ;
}
if ( auth_info ) {
status = ndr_push_dcerpc_auth ( ndr , NDR_SCALARS | NDR_BUFFERS , auth_info ) ;
}
* blob = ndr_push_blob ( ndr ) ;
/* fill in the frag length */
2003-12-16 09:02:58 +00:00
dcerpc_set_frag_length ( blob , blob - > length ) ;
2003-12-14 01:09:10 +00:00
return NT_STATUS_OK ;
}
2003-12-15 03:29:55 +00:00
2004-10-21 12:47:02 +00:00
# define MAX_PROTSEQ 10
2003-12-15 03:29:55 +00:00
2003-12-16 10:57:17 +00:00
static const struct {
const char * name ;
enum dcerpc_transport_t transport ;
2004-10-21 12:47:02 +00:00
int num_protocols ;
enum epm_protocols protseq [ MAX_PROTSEQ ] ;
} transports [ ] = {
{ " ncacn_np " , NCACN_NP , 3 ,
{ EPM_PROTOCOL_NCACN , EPM_PROTOCOL_SMB , EPM_PROTOCOL_PIPE } } ,
{ " ncacn_ip_tcp " , NCACN_IP_TCP , 3 ,
{ EPM_PROTOCOL_NCACN , EPM_PROTOCOL_IP , EPM_PROTOCOL_TCP } } ,
{ " ncadg_ip_udp " , NCACN_IP_UDP , 3 ,
{ EPM_PROTOCOL_NCACN , EPM_PROTOCOL_IP , EPM_PROTOCOL_UDP } } ,
2004-10-21 19:54:38 +00:00
{ " ncalrpc " , NCALRPC , 2 ,
{ EPM_PROTOCOL_NCALRPC , EPM_PROTOCOL_PIPE } } ,
2004-10-21 12:47:02 +00:00
{ " ncacn_unix_stream " , NCACN_UNIX_STREAM , 2 ,
{ EPM_PROTOCOL_NCACN , EPM_PROTOCOL_UNIX_DS } } ,
{ " ncadg_unix_dgram " , NCADG_UNIX_DGRAM , 2 ,
{ EPM_PROTOCOL_NCADG , EPM_PROTOCOL_UNIX_DS } } ,
{ " ncacn_at_dsp " , NCACN_AT_DSP , 3 ,
{ EPM_PROTOCOL_NCACN , EPM_PROTOCOL_APPLETALK , EPM_PROTOCOL_DSP } } ,
{ " ncadg_at_ddp " , NCADG_AT_DDP , 3 ,
{ EPM_PROTOCOL_NCADG , EPM_PROTOCOL_APPLETALK , EPM_PROTOCOL_DDP } } ,
{ " ncacn_vns_ssp " , NCACN_VNS_SPP , 3 ,
{ EPM_PROTOCOL_NCACN , EPM_PROTOCOL_STREETTALK , EPM_PROTOCOL_VINES_SPP } } ,
{ " ncacn_vns_ipc " , NCACN_VNS_IPC , 3 ,
{ EPM_PROTOCOL_NCACN , EPM_PROTOCOL_STREETTALK , EPM_PROTOCOL_VINES_IPC } , } ,
2003-12-16 10:57:17 +00:00
} ;
static const struct {
const char * name ;
2004-05-25 16:24:13 +00:00
uint32_t flag ;
2003-12-16 10:57:17 +00:00
} ncacn_options [ ] = {
{ " sign " , DCERPC_SIGN } ,
{ " seal " , DCERPC_SEAL } ,
2004-09-25 07:25:51 +00:00
{ " connect " , DCERPC_CONNECT } ,
2003-12-16 10:57:17 +00:00
{ " validate " , DCERPC_DEBUG_VALIDATE_BOTH } ,
2004-02-03 14:56:07 +00:00
{ " print " , DCERPC_DEBUG_PRINT_BOTH } ,
2004-09-02 10:45:58 +00:00
{ " padcheck " , DCERPC_DEBUG_PAD_CHECK } ,
2003-12-16 10:57:17 +00:00
{ " bigendian " , DCERPC_PUSH_BIGENDIAN }
} ;
2004-10-21 19:54:38 +00:00
2003-12-16 10:57:17 +00:00
/*
form a binding string from a binding structure
*/
const char * dcerpc_binding_string ( TALLOC_CTX * mem_ctx , const struct dcerpc_binding * b )
{
char * s = NULL ;
int i ;
const char * t_name = NULL ;
2004-10-21 12:47:02 +00:00
for ( i = 0 ; i < ARRAY_SIZE ( transports ) ; i + + ) {
if ( transports [ i ] . transport = = b - > transport ) {
t_name = transports [ i ] . name ;
2003-12-16 10:57:17 +00:00
}
}
if ( ! t_name ) {
return NULL ;
}
2004-10-18 11:43:26 +00:00
if ( b - > object ) {
s = talloc_asprintf ( mem_ctx , " %s@ " , GUID_string ( mem_ctx , b - > object ) ) ;
}
2004-10-21 21:02:51 +00:00
s = talloc_asprintf_append ( s , " %s: " , t_name ) ;
2003-12-16 10:57:17 +00:00
if ( ! s ) return NULL ;
2004-10-21 21:02:51 +00:00
if ( b - > host ) {
s = talloc_asprintf_append ( s , " %s " , b - > host ) ;
}
2004-10-21 19:54:38 +00:00
if ( ( ! b - > options | | ! b - > options [ 0 ] ) & & ! b - > flags ) {
return s ;
}
s = talloc_asprintf_append ( s , " [ " ) ;
2003-12-16 10:57:17 +00:00
/* this is a *really* inefficent way of dealing with strings,
but this is rarely called and the strings are always short ,
so I don ' t care */
2003-12-17 21:37:34 +00:00
for ( i = 0 ; b - > options & & b - > options [ i ] ; i + + ) {
2004-10-21 19:54:38 +00:00
s = talloc_asprintf_append ( s , " %s, " , b - > options [ i ] ) ;
2003-12-16 10:57:17 +00:00
if ( ! s ) return NULL ;
}
for ( i = 0 ; i < ARRAY_SIZE ( ncacn_options ) ; i + + ) {
if ( b - > flags & ncacn_options [ i ] . flag ) {
2004-10-21 19:54:38 +00:00
s = talloc_asprintf_append ( s , " %s, " , ncacn_options [ i ] . name ) ;
2003-12-16 10:57:17 +00:00
if ( ! s ) return NULL ;
}
}
2004-10-21 19:54:38 +00:00
s [ strlen ( s ) - 1 ] = 0 ;
s = talloc_asprintf_append ( s , " ] " ) ;
2003-12-16 10:57:17 +00:00
return s ;
}
2003-12-15 03:29:55 +00:00
/*
parse a binding string into a dcerpc_binding structure
*/
NTSTATUS dcerpc_parse_binding ( TALLOC_CTX * mem_ctx , const char * s , struct dcerpc_binding * b )
{
2004-10-18 11:43:26 +00:00
char * options , * type ;
2003-12-15 03:29:55 +00:00
char * p ;
int i , j , comma_count ;
2004-10-18 11:43:26 +00:00
p = strchr ( s , ' @ ' ) ;
if ( p & & PTR_DIFF ( p , s ) = = 36 ) { /* 36 is the length of a UUID */
NTSTATUS status ;
b - > object = talloc_p ( mem_ctx , struct GUID ) ;
status = GUID_from_string ( s , b - > object ) ;
if ( NT_STATUS_IS_ERR ( status ) ) {
DEBUG ( 0 , ( " Failed parsing UUID \n " ) ) ;
return status ;
}
s = p + 1 ;
} else {
b - > object = NULL ;
2003-12-15 03:29:55 +00:00
}
p = strchr ( s , ' : ' ) ;
if ( ! p ) {
2004-10-18 11:43:26 +00:00
return NT_STATUS_INVALID_PARAMETER ;
2003-12-15 03:29:55 +00:00
}
2004-10-18 11:43:26 +00:00
type = talloc_strndup ( mem_ctx , s , PTR_DIFF ( p , s ) ) ;
if ( ! type ) {
2003-12-15 03:29:55 +00:00
return NT_STATUS_NO_MEMORY ;
}
2004-10-21 12:47:02 +00:00
for ( i = 0 ; i < ARRAY_SIZE ( transports ) ; i + + ) {
if ( strcasecmp ( type , transports [ i ] . name ) = = 0 ) {
b - > transport = transports [ i ] . transport ;
2003-12-15 03:29:55 +00:00
break ;
}
}
2004-10-21 12:47:02 +00:00
if ( i = = ARRAY_SIZE ( transports ) ) {
2004-10-18 11:43:26 +00:00
DEBUG ( 0 , ( " Unknown dcerpc transport '%s' \n " , type ) ) ;
2003-12-15 03:29:55 +00:00
return NT_STATUS_INVALID_PARAMETER ;
}
2004-10-18 11:43:26 +00:00
s = p + 1 ;
p = strchr ( s , ' [ ' ) ;
if ( p ) {
b - > host = talloc_strndup ( mem_ctx , s , PTR_DIFF ( p , s ) ) ;
options = talloc_strdup ( mem_ctx , p + 1 ) ;
if ( options [ strlen ( options ) - 1 ] ! = ' ] ' ) {
return NT_STATUS_INVALID_PARAMETER ;
}
options [ strlen ( options ) - 1 ] = 0 ;
} else {
b - > host = talloc_strdup ( mem_ctx , s ) ;
options = NULL ;
}
if ( ! b - > host ) {
return NT_STATUS_NO_MEMORY ;
}
2003-12-15 03:29:55 +00:00
b - > options = NULL ;
b - > flags = 0 ;
2004-10-18 11:43:26 +00:00
if ( ! options ) {
2003-12-15 03:29:55 +00:00
return NT_STATUS_OK ;
}
2004-10-18 11:43:26 +00:00
comma_count = count_chars ( options , ' , ' ) ;
2003-12-15 03:29:55 +00:00
b - > options = talloc_array_p ( mem_ctx , const char * , comma_count + 2 ) ;
if ( ! b - > options ) {
return NT_STATUS_NO_MEMORY ;
}
2004-10-18 11:43:26 +00:00
for ( i = 0 ; ( p = strchr ( options , ' , ' ) ) ; i + + ) {
b - > options [ i ] = talloc_strndup ( mem_ctx , options , PTR_DIFF ( p , options ) ) ;
2003-12-15 03:29:55 +00:00
if ( ! b - > options [ i ] ) {
return NT_STATUS_NO_MEMORY ;
}
2004-10-18 11:43:26 +00:00
options = p + 1 ;
2003-12-15 03:29:55 +00:00
}
2004-10-18 11:43:26 +00:00
b - > options [ i ] = options ;
2003-12-15 03:29:55 +00:00
b - > options [ i + 1 ] = NULL ;
/* some options are pre-parsed for convenience */
for ( i = 0 ; b - > options [ i ] ; i + + ) {
2003-12-16 10:57:17 +00:00
for ( j = 0 ; j < ARRAY_SIZE ( ncacn_options ) ; j + + ) {
if ( strcasecmp ( ncacn_options [ j ] . name , b - > options [ i ] ) = = 0 ) {
2003-12-16 10:15:21 +00:00
int k ;
2003-12-16 10:57:17 +00:00
b - > flags | = ncacn_options [ j ] . flag ;
2003-12-16 10:15:21 +00:00
for ( k = i ; b - > options [ k ] ; k + + ) {
b - > options [ k ] = b - > options [ k + 1 ] ;
}
2003-12-19 04:26:26 +00:00
i - - ;
2003-12-15 03:29:55 +00:00
break ;
}
}
}
return NT_STATUS_OK ;
}
2004-10-21 21:02:51 +00:00
static const char * floor_get_rhs_data ( TALLOC_CTX * mem_ctx , struct epm_floor * floor )
{
switch ( floor - > lhs . protocol ) {
case EPM_PROTOCOL_TCP :
if ( floor - > rhs . tcp . port = = 0 ) return NULL ;
return talloc_asprintf ( mem_ctx , " %d " , floor - > rhs . tcp . port ) ;
case EPM_PROTOCOL_UDP :
if ( floor - > rhs . udp . port = = 0 ) return NULL ;
return talloc_asprintf ( mem_ctx , " %d " , floor - > rhs . udp . port ) ;
case EPM_PROTOCOL_HTTP :
if ( floor - > rhs . http . port = = 0 ) return NULL ;
return talloc_asprintf ( mem_ctx , " %d " , floor - > rhs . http . port ) ;
case EPM_PROTOCOL_IP :
if ( floor - > rhs . ip . address = = 0 ) {
return NULL ;
}
{
struct in_addr in ;
in . s_addr = htonl ( floor - > rhs . ip . address ) ;
return talloc_strdup ( mem_ctx , inet_ntoa ( in ) ) ;
}
case EPM_PROTOCOL_NCACN :
return NULL ;
case EPM_PROTOCOL_NCADG :
return NULL ;
case EPM_PROTOCOL_SMB :
return talloc_strdup ( mem_ctx , floor - > rhs . smb . unc ) ;
case EPM_PROTOCOL_PIPE :
return talloc_strdup ( mem_ctx , floor - > rhs . pipe . path ) ;
case EPM_PROTOCOL_NETBIOS :
return talloc_strdup ( mem_ctx , floor - > rhs . netbios . name ) ;
case EPM_PROTOCOL_NCALRPC :
return NULL ;
case EPM_PROTOCOL_VINES_SPP :
return talloc_asprintf ( mem_ctx , " %d " , floor - > rhs . vines_spp . port ) ;
case EPM_PROTOCOL_VINES_IPC :
return talloc_asprintf ( mem_ctx , " %d " , floor - > rhs . vines_ipc . port ) ;
case EPM_PROTOCOL_STREETTALK :
return talloc_strdup ( mem_ctx , floor - > rhs . streettalk . streettalk ) ;
case EPM_PROTOCOL_UNIX_DS :
return talloc_strdup ( mem_ctx , floor - > rhs . unix_ds . path ) ;
case EPM_PROTOCOL_NULL :
return NULL ;
}
return NULL ;
}
2004-10-21 19:54:38 +00:00
static NTSTATUS floor_set_rhs_data ( TALLOC_CTX * mem_ctx , struct epm_floor * floor , const char * data )
{
switch ( floor - > lhs . protocol ) {
case EPM_PROTOCOL_TCP :
floor - > rhs . tcp . port = atoi ( data ) ;
return NT_STATUS_OK ;
case EPM_PROTOCOL_UDP :
floor - > rhs . udp . port = atoi ( data ) ;
return NT_STATUS_OK ;
case EPM_PROTOCOL_HTTP :
floor - > rhs . http . port = atoi ( data ) ;
return NT_STATUS_OK ;
case EPM_PROTOCOL_IP :
floor - > rhs . ip . address = 0 ;
/* Only try to put in a IPv4 address. Windows 2003 just returns
* 0.0 .0 .0 for IPv6 addresses */
if ( strlen ( data ) > 0 ) {
struct addrinfo hints , * res ;
memset ( & hints , 0 , sizeof ( struct addrinfo ) ) ;
hints . ai_family = AF_INET ;
2004-10-21 21:02:51 +00:00
hints . ai_protocol = PF_INET ;
2004-10-21 19:54:38 +00:00
if ( getaddrinfo ( data , NULL , & hints , & res ) < 0 ) {
return NT_STATUS_BAD_NETWORK_NAME ;
}
2004-10-21 21:02:51 +00:00
floor - > rhs . ip . address = ntohl ( ( ( struct sockaddr_in * ) res - > ai_addr ) - > sin_addr . s_addr ) ;
2004-10-21 19:54:38 +00:00
freeaddrinfo ( res ) ;
}
return NT_STATUS_OK ;
case EPM_PROTOCOL_NCACN :
floor - > rhs . ncacn . minor_version = 0 ;
return NT_STATUS_OK ;
case EPM_PROTOCOL_NCADG :
floor - > rhs . ncadg . minor_version = 0 ;
return NT_STATUS_OK ;
case EPM_PROTOCOL_SMB :
floor - > rhs . smb . unc = talloc_strdup ( mem_ctx , data ) ;
if ( ! floor - > rhs . smb . unc ) {
return NT_STATUS_NO_MEMORY ;
}
return NT_STATUS_OK ;
case EPM_PROTOCOL_PIPE :
floor - > rhs . pipe . path = talloc_strdup ( mem_ctx , data ) ;
if ( ! floor - > rhs . pipe . path ) {
return NT_STATUS_NO_MEMORY ;
}
return NT_STATUS_OK ;
case EPM_PROTOCOL_NETBIOS :
floor - > rhs . netbios . name = talloc_strdup ( mem_ctx , data ) ;
if ( ! floor - > rhs . netbios . name ) {
return NT_STATUS_NO_MEMORY ;
}
return NT_STATUS_OK ;
case EPM_PROTOCOL_NCALRPC :
return NT_STATUS_OK ;
case EPM_PROTOCOL_VINES_SPP :
floor - > rhs . vines_spp . port = atoi ( data ) ;
return NT_STATUS_OK ;
case EPM_PROTOCOL_VINES_IPC :
floor - > rhs . vines_ipc . port = atoi ( data ) ;
return NT_STATUS_OK ;
case EPM_PROTOCOL_STREETTALK :
floor - > rhs . streettalk . streettalk = talloc_strdup ( mem_ctx , data ) ;
if ( ! floor - > rhs . streettalk . streettalk ) {
return NT_STATUS_NO_MEMORY ;
}
return NT_STATUS_OK ;
case EPM_PROTOCOL_UNIX_DS :
floor - > rhs . unix_ds . path = talloc_strdup ( mem_ctx , data ) ;
if ( ! floor - > rhs . unix_ds . path ) {
return NT_STATUS_NO_MEMORY ;
}
return NT_STATUS_OK ;
case EPM_PROTOCOL_NULL :
return NT_STATUS_OK ;
}
return NT_STATUS_NOT_SUPPORTED ;
}
2004-10-21 21:02:51 +00:00
NTSTATUS dcerpc_binding_from_tower ( TALLOC_CTX * mem_ctx , struct epm_tower * tower , struct dcerpc_binding * binding )
{
int i ;
binding - > transport = - 1 ;
binding - > object = NULL ;
binding - > options = NULL ;
binding - > host = NULL ;
binding - > flags = 0 ;
/* Find a transport that matches this tower */
for ( i = 0 ; i < ARRAY_SIZE ( transports ) ; i + + ) {
int j ;
if ( transports [ i ] . num_protocols ! = tower - > num_floors - 2 ) {
continue ;
}
for ( j = 0 ; j < transports [ i ] . num_protocols ; j + + ) {
if ( transports [ i ] . protseq [ j ] ! = tower - > floors [ j + 2 ] . lhs . protocol ) {
break ;
}
}
if ( j = = transports [ i ] . num_protocols ) {
binding - > transport = transports [ i ] . transport ;
break ;
}
}
if ( binding - > transport = = - 1 ) {
return NT_STATUS_NOT_SUPPORTED ;
}
if ( tower - > num_floors < 1 ) {
return NT_STATUS_OK ;
}
/* Set object uuid */
if ( ! uuid_all_zero ( & tower - > floors [ 0 ] . lhs . info . uuid . uuid ) ) {
binding - > object = talloc_p ( mem_ctx , struct GUID ) ;
* binding - > object = tower - > floors [ 0 ] . lhs . info . uuid . uuid ;
}
/* Ignore floor 1, it contains the NDR version info */
binding - > options = talloc_array_p ( mem_ctx , const char * , 2 ) ;
/* Set endpoint */
if ( tower - > num_floors > = 3 ) {
binding - > options [ 0 ] = floor_get_rhs_data ( mem_ctx , & tower - > floors [ tower - > num_floors - 1 ] ) ;
} else {
binding - > options [ 0 ] = NULL ;
}
binding - > options [ 1 ] = NULL ;
/* Set network address */
if ( tower - > num_floors > = 4 ) {
binding - > host = floor_get_rhs_data ( mem_ctx , & tower - > floors [ tower - > num_floors - 2 ] ) ;
}
return NT_STATUS_OK ;
}
2004-10-21 19:54:38 +00:00
NTSTATUS dcerpc_binding_build_tower ( TALLOC_CTX * mem_ctx , struct dcerpc_binding * binding , struct epm_tower * * tower )
{
const enum epm_protocols * protseq ;
int num_protocols = - 1 , i ;
NTSTATUS status ;
* tower = talloc_p ( mem_ctx , struct epm_tower ) ;
if ( ! ( * tower ) ) {
return NT_STATUS_NO_MEMORY ;
}
/* Find transport */
for ( i = 0 ; i < ARRAY_SIZE ( transports ) ; i + + ) {
if ( transports [ i ] . transport = = binding - > transport ) {
protseq = transports [ i ] . protseq ;
num_protocols = transports [ i ] . num_protocols ;
break ;
}
}
if ( num_protocols = = - 1 ) {
DEBUG ( 0 , ( " Unable to find transport with id '%d' \n " , binding - > transport ) ) ;
return NT_STATUS_UNSUCCESSFUL ;
}
( * tower ) - > num_floors = 2 + num_protocols ;
( * tower ) - > floors = talloc_array_p ( mem_ctx , struct epm_floor , ( * tower ) - > num_floors ) ;
/* Floor 0 */
( * tower ) - > floors [ 0 ] . lhs . protocol = EPM_PROTOCOL_UUID ;
if ( binding - > object ) {
( * tower ) - > floors [ 0 ] . lhs . info . uuid . uuid = * binding - > object ;
2004-10-21 21:02:51 +00:00
} else {
ZERO_STRUCT ( ( * tower ) - > floors [ 0 ] . lhs . info . uuid . uuid ) ;
2004-10-21 19:54:38 +00:00
}
( * tower ) - > floors [ 0 ] . lhs . info . uuid . version = 0 ;
/* Floor 1 */
( * tower ) - > floors [ 1 ] . lhs . protocol = EPM_PROTOCOL_UUID ;
( * tower ) - > floors [ 1 ] . lhs . info . uuid . version = NDR_GUID_VERSION ;
status = GUID_from_string ( NDR_GUID , & ( * tower ) - > floors [ 1 ] . lhs . info . uuid . uuid ) ;
if ( NT_STATUS_IS_ERR ( status ) ) {
return status ;
}
/* Floor 2 to num_protocols */
for ( i = 0 ; i < num_protocols ; i + + ) {
( * tower ) - > floors [ 2 + i ] . lhs . protocol = protseq [ i ] ;
2004-10-21 21:02:51 +00:00
ZERO_STRUCT ( ( * tower ) - > floors [ 2 + i ] . rhs ) ;
2004-10-21 19:54:38 +00:00
}
/* The top floor contains the endpoint */
if ( num_protocols > = 1 & & binding - > options & & binding - > options [ 0 ] ) {
status = floor_set_rhs_data ( mem_ctx , & ( * tower ) - > floors [ 2 + num_protocols - 1 ] , binding - > options [ 0 ] ) ;
if ( NT_STATUS_IS_ERR ( status ) ) {
return status ;
}
}
/* The second-to-top floor contains the network address */
if ( num_protocols > = 2 & & binding - > host ) {
status = floor_set_rhs_data ( mem_ctx , & ( * tower ) - > floors [ 2 + num_protocols - 2 ] , binding - > host ) ;
if ( NT_STATUS_IS_ERR ( status ) ) {
return status ;
}
}
return NT_STATUS_OK ;
}
2003-12-15 03:29:55 +00:00
2003-12-17 03:38:06 +00:00
/* open a rpc connection to a rpc pipe on SMB using the binding
2003-12-15 03:29:55 +00:00
structure to determine the endpoint and options */
static NTSTATUS dcerpc_pipe_connect_ncacn_np ( struct dcerpc_pipe * * p ,
struct dcerpc_binding * binding ,
const char * pipe_uuid ,
2004-05-25 16:24:13 +00:00
uint32_t pipe_version ,
2003-12-15 03:29:55 +00:00
const char * domain ,
const char * username ,
const char * password )
{
NTSTATUS status ;
BOOL retry ;
2004-08-04 13:23:35 +00:00
struct smbcli_state * cli ;
2003-12-15 03:29:55 +00:00
const char * pipe_name ;
2004-10-18 15:18:05 +00:00
TALLOC_CTX * mem_ctx = talloc_init ( " dcerpc_pipe_connect_ncacn_np " ) ;
2003-12-15 03:29:55 +00:00
2004-10-18 11:43:26 +00:00
if ( ! binding - > options | | ! binding - > options [ 0 ] | | ! strlen ( binding - > options [ 0 ] ) ) {
2003-12-15 03:29:55 +00:00
const struct dcerpc_interface_table * table = idl_iface_by_uuid ( pipe_uuid ) ;
2004-10-18 15:18:05 +00:00
struct dcerpc_binding default_binding ;
int i ;
2003-12-15 03:29:55 +00:00
if ( ! table ) {
DEBUG ( 0 , ( " Unknown interface endpoint '%s' \n " , pipe_uuid ) ) ;
2004-10-18 15:18:05 +00:00
talloc_destroy ( mem_ctx ) ;
2003-12-15 03:29:55 +00:00
return NT_STATUS_INVALID_PARAMETER ;
}
2004-10-18 15:18:05 +00:00
/* Find one of the default pipes for this interface */
for ( i = 0 ; i < table - > endpoints - > count ; i + + ) {
status = dcerpc_parse_binding ( mem_ctx , table - > endpoints - > names [ i ] , & default_binding ) ;
2004-10-21 12:47:02 +00:00
if ( NT_STATUS_IS_OK ( status ) & & default_binding . transport = = NCACN_NP ) {
2004-10-18 15:18:05 +00:00
pipe_name = default_binding . options [ 0 ] ;
break ;
}
}
2003-12-15 03:29:55 +00:00
} else {
pipe_name = binding - > options [ 0 ] ;
}
2004-10-18 16:07:08 +00:00
if ( ! strncasecmp ( pipe_name , " /pipe/ " , 6 ) | |
! strncasecmp ( pipe_name , " \\ pipe \\ " , 6 ) ) {
2004-10-18 15:18:05 +00:00
pipe_name + = 6 ;
2003-12-15 03:29:55 +00:00
}
2004-10-18 16:25:36 +00:00
if ( pipe_name [ 0 ] ! = ' \\ ' ) {
pipe_name = talloc_asprintf ( mem_ctx , " \\ %s " , pipe_name ) ;
}
2004-10-18 15:18:05 +00:00
2004-09-11 15:11:36 +00:00
if ( ! username | | ! username [ 0 ] ) {
2004-09-28 05:44:59 +00:00
status = smbcli_full_connection ( NULL , & cli , lp_netbios_name ( ) ,
2004-06-06 07:14:10 +00:00
binding - > host , NULL ,
" ipc$ " , " ????? " ,
" " , " " , NULL , 0 , & retry ) ;
} else {
2004-09-28 05:44:59 +00:00
status = smbcli_full_connection ( NULL , & cli , lp_netbios_name ( ) ,
2004-06-06 07:14:10 +00:00
binding - > host , NULL ,
" ipc$ " , " ????? " ,
username , domain ,
password , 0 , & retry ) ;
}
2003-12-15 03:29:55 +00:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2003-12-16 10:57:17 +00:00
DEBUG ( 0 , ( " Failed to connect to %s - %s \n " , binding - > host , nt_errstr ( status ) ) ) ;
2004-10-18 15:18:05 +00:00
talloc_destroy ( mem_ctx ) ;
2003-12-15 03:29:55 +00:00
return status ;
}
status = dcerpc_pipe_open_smb ( p , cli - > tree , pipe_name ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
2003-12-16 10:57:17 +00:00
DEBUG ( 0 , ( " Failed to open pipe %s - %s \n " , pipe_name , nt_errstr ( status ) ) ) ;
2004-08-04 13:23:35 +00:00
smbcli_tdis ( cli ) ;
smbcli_shutdown ( cli ) ;
2004-10-18 15:18:05 +00:00
talloc_destroy ( mem_ctx ) ;
return status ;
}
talloc_destroy ( mem_ctx ) ;
2003-12-15 03:29:55 +00:00
/* this ensures that the reference count is decremented so
a pipe close will really close the link */
2004-09-26 23:38:14 +00:00
talloc_steal ( * p , cli ) ;
2003-12-15 03:29:55 +00:00
( * p ) - > flags = binding - > flags ;
2004-06-07 21:30:17 +00:00
/* remember the binding string for possible secondary connections */
2004-08-30 03:10:43 +00:00
( * p ) - > binding_string = dcerpc_binding_string ( ( * p ) , binding ) ;
2004-06-07 21:30:17 +00:00
if ( username & & username [ 0 ] & & ( binding - > flags & DCERPC_SCHANNEL_ANY ) ) {
2004-02-10 10:22:12 +00:00
status = dcerpc_bind_auth_schannel ( * p , pipe_uuid , pipe_version ,
2004-06-06 07:14:10 +00:00
domain , username , password ) ;
2004-10-01 05:19:51 +00:00
} else if ( username & & username [ 0 ] & &
( binding - > flags & ( DCERPC_CONNECT | DCERPC_SIGN | DCERPC_SEAL ) ) ) {
2003-12-15 03:29:55 +00:00
status = dcerpc_bind_auth_ntlm ( * p , pipe_uuid , pipe_version , domain , username , password ) ;
} else {
status = dcerpc_bind_auth_none ( * p , pipe_uuid , pipe_version ) ;
2004-09-11 15:11:36 +00:00
2003-12-15 03:29:55 +00:00
}
2004-02-10 10:22:12 +00:00
2003-12-15 03:29:55 +00:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2003-12-16 10:57:17 +00:00
DEBUG ( 0 , ( " Failed to bind to uuid %s - %s \n " , pipe_uuid , nt_errstr ( status ) ) ) ;
2003-12-15 03:29:55 +00:00
dcerpc_pipe_close ( * p ) ;
r1294: A nice, large, commit...
This implements gensec for Samba's server side, and brings gensec up
to the standards of a full subsystem.
This means that use of the subsystem is by gensec_* functions, not
function pointers in structures (this is internal). This causes
changes in all the existing gensec users.
Our RPC server no longer contains it's own generalised security
scheme, and now calls gensec directly.
Gensec has also taken over the role of auth/auth_ntlmssp.c
An important part of gensec, is the output of the 'session_info'
struct. This is now reference counted, so that we can correctly free
it when a pipe is closed, no matter if it was inherited, or created by
per-pipe authentication.
The schannel code is reworked, to be in the same file for client and
server.
ntlm_auth is reworked to use gensec.
The major problem with this code is the way it relies on subsystem
auto-initialisation. The primary reason for this commit now.is to
allow these problems to be looked at, and fixed.
There are problems with the new code:
- I've tested it with smbtorture, but currently don't have VMware and
valgrind working (this I'll fix soon).
- The SPNEGO code is client-only at this point.
- We still do not do kerberos.
Andrew Bartlett
(This used to be commit 07fd885fd488fd1051eacc905a2d4962f8a018ec)
2004-06-29 09:40:10 +00:00
* p = NULL ;
2003-12-15 03:29:55 +00:00
return status ;
}
return NT_STATUS_OK ;
}
/* open a rpc connection to a rpc pipe on SMP using the binding
structure to determine the endpoint and options */
static NTSTATUS dcerpc_pipe_connect_ncacn_ip_tcp ( struct dcerpc_pipe * * p ,
struct dcerpc_binding * binding ,
const char * pipe_uuid ,
2004-05-25 16:24:13 +00:00
uint32_t pipe_version ,
2003-12-15 03:29:55 +00:00
const char * domain ,
const char * username ,
const char * password )
{
NTSTATUS status ;
2004-05-25 16:24:13 +00:00
uint32_t port = 0 ;
2003-12-15 03:29:55 +00:00
2004-10-18 11:43:26 +00:00
if ( binding - > options & & binding - > options [ 0 ] & & strlen ( binding - > options [ 0 ] ) ) {
2003-12-15 03:29:55 +00:00
port = atoi ( binding - > options [ 0 ] ) ;
}
if ( port = = 0 ) {
status = dcerpc_epm_map_tcp_port ( binding - > host ,
pipe_uuid , pipe_version ,
& port ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
DEBUG ( 0 , ( " Failed to map DCERPC/TCP port for '%s' - %s \n " ,
pipe_uuid , nt_errstr ( status ) ) ) ;
return status ;
}
DEBUG ( 1 , ( " Mapped to DCERPC/TCP port %u \n " , port ) ) ;
}
2004-09-22 22:20:40 +00:00
status = dcerpc_pipe_open_tcp ( p , binding - > host , port , AF_UNSPEC ) ;
2003-12-15 03:29:55 +00:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2003-12-15 03:41:08 +00:00
DEBUG ( 0 , ( " Failed to connect to %s:%d \n " , binding - > host , port ) ) ;
2003-12-15 03:29:55 +00:00
return status ;
}
( * p ) - > flags = binding - > flags ;
2004-06-07 21:30:17 +00:00
/* remember the binding string for possible secondary connections */
2004-08-30 03:10:43 +00:00
( * p ) - > binding_string = dcerpc_binding_string ( ( * p ) , binding ) ;
2004-06-07 21:30:17 +00:00
if ( username & & username [ 0 ] & & ( binding - > flags & DCERPC_SCHANNEL_ANY ) ) {
2004-06-06 07:14:10 +00:00
status = dcerpc_bind_auth_schannel ( * p , pipe_uuid , pipe_version ,
domain , username , password ) ;
2004-09-25 07:25:51 +00:00
} else if ( username & & username [ 0 ] ) {
2004-06-07 21:30:17 +00:00
status = dcerpc_bind_auth_ntlm ( * p , pipe_uuid , pipe_version , domain , username , password ) ;
} else {
2003-12-15 03:29:55 +00:00
status = dcerpc_bind_auth_none ( * p , pipe_uuid , pipe_version ) ;
}
if ( ! NT_STATUS_IS_OK ( status ) ) {
2004-06-06 07:14:10 +00:00
DEBUG ( 0 , ( " Failed to bind to uuid %s - %s \n " ,
pipe_uuid , nt_errstr ( status ) ) ) ;
2003-12-15 03:29:55 +00:00
dcerpc_pipe_close ( * p ) ;
r1294: A nice, large, commit...
This implements gensec for Samba's server side, and brings gensec up
to the standards of a full subsystem.
This means that use of the subsystem is by gensec_* functions, not
function pointers in structures (this is internal). This causes
changes in all the existing gensec users.
Our RPC server no longer contains it's own generalised security
scheme, and now calls gensec directly.
Gensec has also taken over the role of auth/auth_ntlmssp.c
An important part of gensec, is the output of the 'session_info'
struct. This is now reference counted, so that we can correctly free
it when a pipe is closed, no matter if it was inherited, or created by
per-pipe authentication.
The schannel code is reworked, to be in the same file for client and
server.
ntlm_auth is reworked to use gensec.
The major problem with this code is the way it relies on subsystem
auto-initialisation. The primary reason for this commit now.is to
allow these problems to be looked at, and fixed.
There are problems with the new code:
- I've tested it with smbtorture, but currently don't have VMware and
valgrind working (this I'll fix soon).
- The SPNEGO code is client-only at this point.
- We still do not do kerberos.
Andrew Bartlett
(This used to be commit 07fd885fd488fd1051eacc905a2d4962f8a018ec)
2004-06-29 09:40:10 +00:00
* p = NULL ;
2003-12-15 03:29:55 +00:00
return status ;
}
return status ;
}
/* open a rpc connection to a rpc pipe, using the specified
binding structure to determine the endpoint and options */
NTSTATUS dcerpc_pipe_connect_b ( struct dcerpc_pipe * * p ,
struct dcerpc_binding * binding ,
const char * pipe_uuid ,
2004-05-25 16:24:13 +00:00
uint32_t pipe_version ,
2003-12-15 03:29:55 +00:00
const char * domain ,
const char * username ,
const char * password )
{
NTSTATUS status = NT_STATUS_INVALID_PARAMETER ;
switch ( binding - > transport ) {
case NCACN_NP :
status = dcerpc_pipe_connect_ncacn_np ( p , binding , pipe_uuid , pipe_version ,
domain , username , password ) ;
break ;
case NCACN_IP_TCP :
status = dcerpc_pipe_connect_ncacn_ip_tcp ( p , binding , pipe_uuid , pipe_version ,
domain , username , password ) ;
break ;
2004-10-21 12:47:02 +00:00
default :
return NT_STATUS_NOT_SUPPORTED ;
2003-12-15 03:29:55 +00:00
}
return status ;
}
/* open a rpc connection to a rpc pipe, using the specified string
binding to determine the endpoint and options */
NTSTATUS dcerpc_pipe_connect ( struct dcerpc_pipe * * p ,
const char * binding ,
const char * pipe_uuid ,
2004-05-25 16:24:13 +00:00
uint32_t pipe_version ,
2003-12-15 03:29:55 +00:00
const char * domain ,
const char * username ,
const char * password )
{
struct dcerpc_binding b ;
NTSTATUS status ;
TALLOC_CTX * mem_ctx ;
mem_ctx = talloc_init ( " dcerpc_pipe_connect " ) ;
if ( ! mem_ctx ) return NT_STATUS_NO_MEMORY ;
status = dcerpc_parse_binding ( mem_ctx , binding , & b ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
2003-12-15 03:41:08 +00:00
DEBUG ( 0 , ( " Failed to parse dcerpc binding '%s' \n " , binding ) ) ;
2003-12-15 03:29:55 +00:00
talloc_destroy ( mem_ctx ) ;
return status ;
}
2003-12-16 10:57:17 +00:00
DEBUG ( 3 , ( " Using binding %s \n " , dcerpc_binding_string ( mem_ctx , & b ) ) ) ;
2003-12-15 03:29:55 +00:00
status = dcerpc_pipe_connect_b ( p , & b , pipe_uuid , pipe_version , domain , username , password ) ;
talloc_destroy ( mem_ctx ) ;
return status ;
}
2004-01-20 06:07:09 +00:00
/*
2004-06-06 07:14:10 +00:00
create a secondary dcerpc connection from a primary connection
2004-06-05 05:01:38 +00:00
2004-06-06 07:14:10 +00:00
if the primary is a SMB connection then the secondary connection
will be on the same SMB connection , but use a new fnum
2004-01-20 06:07:09 +00:00
*/
2004-06-06 07:14:10 +00:00
NTSTATUS dcerpc_secondary_connection ( struct dcerpc_pipe * p , struct dcerpc_pipe * * p2 ,
const char * pipe_name ,
const char * pipe_uuid ,
uint32_t pipe_version )
2004-01-20 06:07:09 +00:00
{
2004-08-04 13:23:35 +00:00
struct smbcli_tree * tree ;
2004-06-06 07:14:10 +00:00
NTSTATUS status = NT_STATUS_INVALID_PARAMETER ;
struct dcerpc_binding b ;
2004-01-20 06:07:09 +00:00
2004-06-06 07:14:10 +00:00
switch ( p - > transport . transport ) {
case NCACN_NP :
tree = dcerpc_smb_tree ( p ) ;
if ( ! tree ) {
return NT_STATUS_INVALID_PARAMETER ;
}
status = dcerpc_pipe_open_smb ( p2 , tree , pipe_name ) ;
break ;
case NCACN_IP_TCP :
2004-08-30 03:10:43 +00:00
status = dcerpc_parse_binding ( p , p - > binding_string , & b ) ;
2004-06-06 07:14:10 +00:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
return status ;
}
b . flags & = ~ DCERPC_AUTH_OPTIONS ;
status = dcerpc_pipe_connect_ncacn_ip_tcp ( p2 , & b , pipe_uuid ,
pipe_version , NULL ,
NULL , NULL ) ;
break ;
2004-10-21 12:47:02 +00:00
default :
return NT_STATUS_NOT_SUPPORTED ;
2004-01-20 06:07:09 +00:00
}
if ( ! NT_STATUS_IS_OK ( status ) ) {
2004-06-06 07:14:10 +00:00
return status ;
}
2004-01-20 06:07:09 +00:00
( * p2 ) - > flags = p - > flags ;
status = dcerpc_bind_auth_none ( * p2 , pipe_uuid , pipe_version ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
return status ;
}
return NT_STATUS_OK ;
}
2004-04-07 07:20:53 +00:00
2004-09-11 15:11:36 +00:00
NTSTATUS dcerpc_generic_session_key ( struct dcerpc_pipe * p ,
2004-09-25 12:48:56 +00:00
DATA_BLOB * session_key )
2004-09-11 15:11:36 +00:00
{
/* this took quite a few CPU cycles to find ... */
2004-10-21 19:54:38 +00:00
session_key - > data = discard_const_p ( unsigned char , " SystemLibraryDTC " ) ;
2004-09-11 15:11:36 +00:00
session_key - > length = 16 ;
return NT_STATUS_OK ;
}
2004-04-07 07:20:53 +00:00
/*
2004-09-11 15:11:36 +00:00
fetch the user session key - may be default ( above ) or the SMB session key
2004-04-07 07:20:53 +00:00
*/
NTSTATUS dcerpc_fetch_session_key ( struct dcerpc_pipe * p ,
2004-05-09 12:42:18 +00:00
DATA_BLOB * session_key )
2004-04-07 07:20:53 +00:00
{
2004-09-11 15:11:36 +00:00
return p - > security_state . session_key ( p , session_key ) ;
2004-04-07 07:20:53 +00:00
}
2004-06-14 08:12:50 +00:00
/*
log a rpc packet in a format suitable for ndrdump . This is especially useful
for sealed packets , where ethereal cannot easily see the contents
this triggers on a debug level of > = 10
*/
void dcerpc_log_packet ( const struct dcerpc_interface_table * ndr ,
uint32_t opnum , uint32_t flags , DATA_BLOB * pkt )
{
const int num_examples = 20 ;
int i ;
if ( DEBUGLEVEL < 10 ) return ;
for ( i = 0 ; i < num_examples ; i + + ) {
char * name = NULL ;
asprintf ( & name , " %s/rpclog/%s-%u.%d.%s " ,
lp_lockdir ( ) , ndr - > name , opnum , i ,
( flags & NDR_IN ) ? " in " : " out " ) ;
if ( name = = NULL ) {
return ;
}
if ( ! file_exist ( name , NULL ) ) {
if ( file_save ( name , pkt - > data , pkt - > length ) ) {
DEBUG ( 10 , ( " Logged rpc packet to %s \n " , name ) ) ;
}
free ( name ) ;
break ;
}
free ( name ) ;
}
}