mirror of
https://github.com/samba-team/samba.git
synced 2025-01-15 23:24:37 +03:00
054e3b2ae3
techniques more accurately.
-
1075 lines
28 KiB
C
1075 lines
28 KiB
C
/*
|
|
Unix SMB/Netbios implementation.
|
|
Version 1.9.
|
|
SMB client generic functions
|
|
Copyright (C) Andrew Tridgell 1994-1997
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 2 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program; if not, write to the Free Software
|
|
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
|
*/
|
|
|
|
#ifdef SYSLOG
|
|
#undef SYSLOG
|
|
#endif
|
|
|
|
#include "includes.h"
|
|
|
|
|
|
extern int DEBUGLEVEL;
|
|
|
|
/****************************************************************************
|
|
setup basics in a outgoing packet
|
|
****************************************************************************/
|
|
static void cli_setup_packet(struct cli_state *cli)
|
|
{
|
|
SSVAL(cli->outbuf,smb_pid,cli->pid);
|
|
SSVAL(cli->outbuf,smb_uid,cli->uid);
|
|
SSVAL(cli->outbuf,smb_mid,cli->mid);
|
|
if (cli->protocol > PROTOCOL_CORE) {
|
|
SCVAL(cli->outbuf,smb_flg,0x8);
|
|
SSVAL(cli->outbuf,smb_flg2,0x1);
|
|
}
|
|
}
|
|
|
|
|
|
/****************************************************************************
|
|
send a SMB trans or trans2 request
|
|
****************************************************************************/
|
|
static BOOL cli_send_trans(struct cli_state *cli,
|
|
int trans, char *name, int fid, int flags,
|
|
char *data,char *param,uint16 *setup, int ldata,int lparam,
|
|
int lsetup,int mdata,int mparam,int msetup)
|
|
{
|
|
int i;
|
|
int this_ldata,this_lparam;
|
|
int tot_data=0,tot_param=0;
|
|
char *outdata,*outparam;
|
|
char *p;
|
|
|
|
this_lparam = MIN(lparam,cli->max_xmit - (500+lsetup*SIZEOFWORD)); /* hack */
|
|
this_ldata = MIN(ldata,cli->max_xmit - (500+lsetup*SIZEOFWORD+this_lparam));
|
|
|
|
bzero(cli->outbuf,smb_size);
|
|
set_message(cli->outbuf,14+lsetup,0,True);
|
|
CVAL(cli->outbuf,smb_com) = trans;
|
|
SSVAL(cli->outbuf,smb_tid, cli->cnum);
|
|
cli_setup_packet(cli);
|
|
|
|
outparam = smb_buf(cli->outbuf)+(trans==SMBtrans ? strlen(name)+1 : 3);
|
|
outdata = outparam+this_lparam;
|
|
|
|
/* primary request */
|
|
SSVAL(cli->outbuf,smb_tpscnt,lparam); /* tpscnt */
|
|
SSVAL(cli->outbuf,smb_tdscnt,ldata); /* tdscnt */
|
|
SSVAL(cli->outbuf,smb_mprcnt,mparam); /* mprcnt */
|
|
SSVAL(cli->outbuf,smb_mdrcnt,mdata); /* mdrcnt */
|
|
SCVAL(cli->outbuf,smb_msrcnt,msetup); /* msrcnt */
|
|
SSVAL(cli->outbuf,smb_flags,flags); /* flags */
|
|
SIVAL(cli->outbuf,smb_timeout,0); /* timeout */
|
|
SSVAL(cli->outbuf,smb_pscnt,this_lparam); /* pscnt */
|
|
SSVAL(cli->outbuf,smb_psoff,smb_offset(outparam,cli->outbuf)); /* psoff */
|
|
SSVAL(cli->outbuf,smb_dscnt,this_ldata); /* dscnt */
|
|
SSVAL(cli->outbuf,smb_dsoff,smb_offset(outdata,cli->outbuf)); /* dsoff */
|
|
SCVAL(cli->outbuf,smb_suwcnt,lsetup); /* suwcnt */
|
|
for (i=0;i<lsetup;i++) /* setup[] */
|
|
SSVAL(cli->outbuf,smb_setup+i*SIZEOFWORD,setup[i]);
|
|
p = smb_buf(cli->outbuf);
|
|
if (trans==SMBtrans) {
|
|
strcpy(p,name); /* name[] */
|
|
} else {
|
|
*p++ = 0; /* put in a null smb_name */
|
|
*p++ = 'D'; *p++ = ' '; /* observed in OS/2 */
|
|
}
|
|
if (this_lparam) /* param[] */
|
|
memcpy(outparam,param,this_lparam);
|
|
if (this_ldata) /* data[] */
|
|
memcpy(outdata,data,this_ldata);
|
|
set_message(cli->outbuf,14+lsetup, /* wcnt, bcc */
|
|
PTR_DIFF(outdata+this_ldata,smb_buf(cli->outbuf)),False);
|
|
|
|
show_msg(cli->outbuf);
|
|
send_smb(cli->fd,cli->outbuf);
|
|
|
|
if (this_ldata < ldata || this_lparam < lparam) {
|
|
/* receive interim response */
|
|
if (!receive_smb(cli->fd,cli->inbuf,cli->timeout) ||
|
|
CVAL(cli->inbuf,smb_rcls) != 0) {
|
|
return(False);
|
|
}
|
|
|
|
tot_data = this_ldata;
|
|
tot_param = this_lparam;
|
|
|
|
while (tot_data < ldata || tot_param < lparam) {
|
|
this_lparam = MIN(lparam-tot_param,cli->max_xmit - 500); /* hack */
|
|
this_ldata = MIN(ldata-tot_data,cli->max_xmit - (500+this_lparam));
|
|
|
|
set_message(cli->outbuf,trans==SMBtrans?8:9,0,True);
|
|
CVAL(cli->outbuf,smb_com) = trans==SMBtrans ? SMBtranss : SMBtranss2;
|
|
|
|
outparam = smb_buf(cli->outbuf);
|
|
outdata = outparam+this_lparam;
|
|
|
|
/* secondary request */
|
|
SSVAL(cli->outbuf,smb_tpscnt,lparam); /* tpscnt */
|
|
SSVAL(cli->outbuf,smb_tdscnt,ldata); /* tdscnt */
|
|
SSVAL(cli->outbuf,smb_spscnt,this_lparam); /* pscnt */
|
|
SSVAL(cli->outbuf,smb_spsoff,smb_offset(outparam,cli->outbuf)); /* psoff */
|
|
SSVAL(cli->outbuf,smb_spsdisp,tot_param); /* psdisp */
|
|
SSVAL(cli->outbuf,smb_sdscnt,this_ldata); /* dscnt */
|
|
SSVAL(cli->outbuf,smb_sdsoff,smb_offset(outdata,cli->outbuf)); /* dsoff */
|
|
SSVAL(cli->outbuf,smb_sdsdisp,tot_data); /* dsdisp */
|
|
if (trans==SMBtrans2)
|
|
SSVAL(cli->outbuf,smb_sfid,fid); /* fid */
|
|
if (this_lparam) /* param[] */
|
|
memcpy(outparam,param,this_lparam);
|
|
if (this_ldata) /* data[] */
|
|
memcpy(outdata,data,this_ldata);
|
|
set_message(cli->outbuf,trans==SMBtrans?8:9, /* wcnt, bcc */
|
|
PTR_DIFF(outdata+this_ldata,smb_buf(cli->outbuf)),False);
|
|
|
|
show_msg(cli->outbuf);
|
|
send_smb(cli->fd,cli->outbuf);
|
|
|
|
tot_data += this_ldata;
|
|
tot_param += this_lparam;
|
|
}
|
|
}
|
|
|
|
return(True);
|
|
}
|
|
|
|
|
|
/****************************************************************************
|
|
receive a SMB trans or trans2 response allocating the necessary memory
|
|
****************************************************************************/
|
|
static BOOL cli_receive_trans(struct cli_state *cli,
|
|
int trans,int *data_len,
|
|
int *param_len, char **data,char **param)
|
|
{
|
|
int total_data=0;
|
|
int total_param=0;
|
|
int this_data,this_param;
|
|
|
|
*data_len = *param_len = 0;
|
|
|
|
if (!receive_smb(cli->fd,cli->inbuf,cli->timeout))
|
|
return False;
|
|
|
|
show_msg(cli->inbuf);
|
|
|
|
/* sanity check */
|
|
if (CVAL(cli->inbuf,smb_com) != trans) {
|
|
DEBUG(0,("Expected %s response, got command 0x%02x\n",
|
|
trans==SMBtrans?"SMBtrans":"SMBtrans2",
|
|
CVAL(cli->inbuf,smb_com)));
|
|
return(False);
|
|
}
|
|
if (CVAL(cli->inbuf,smb_rcls) != 0)
|
|
return(False);
|
|
|
|
/* parse out the lengths */
|
|
total_data = SVAL(cli->inbuf,smb_tdrcnt);
|
|
total_param = SVAL(cli->inbuf,smb_tprcnt);
|
|
|
|
/* allocate it */
|
|
*data = Realloc(*data,total_data);
|
|
*param = Realloc(*param,total_param);
|
|
|
|
while (1) {
|
|
this_data = SVAL(cli->inbuf,smb_drcnt);
|
|
this_param = SVAL(cli->inbuf,smb_prcnt);
|
|
|
|
if (this_data + *data_len > total_data ||
|
|
this_param + *param_len > total_param) {
|
|
DEBUG(1,("Data overflow in cli_receive_trans\n"));
|
|
return False;
|
|
}
|
|
|
|
if (this_data)
|
|
memcpy(*data + SVAL(cli->inbuf,smb_drdisp),
|
|
smb_base(cli->inbuf) + SVAL(cli->inbuf,smb_droff),
|
|
this_data);
|
|
if (this_param)
|
|
memcpy(*param + SVAL(cli->inbuf,smb_prdisp),
|
|
smb_base(cli->inbuf) + SVAL(cli->inbuf,smb_proff),
|
|
this_param);
|
|
*data_len += this_data;
|
|
*param_len += this_param;
|
|
|
|
/* parse out the total lengths again - they can shrink! */
|
|
total_data = SVAL(cli->inbuf,smb_tdrcnt);
|
|
total_param = SVAL(cli->inbuf,smb_tprcnt);
|
|
|
|
if (total_data <= *data_len && total_param <= *param_len)
|
|
break;
|
|
|
|
if (!receive_smb(cli->fd,cli->inbuf,cli->timeout))
|
|
return False;
|
|
|
|
show_msg(cli->inbuf);
|
|
|
|
/* sanity check */
|
|
if (CVAL(cli->inbuf,smb_com) != trans) {
|
|
DEBUG(0,("Expected %s response, got command 0x%02x\n",
|
|
trans==SMBtrans?"SMBtrans":"SMBtrans2",
|
|
CVAL(cli->inbuf,smb_com)));
|
|
return(False);
|
|
}
|
|
if (CVAL(cli->inbuf,smb_rcls) != 0)
|
|
return(False);
|
|
}
|
|
|
|
return(True);
|
|
}
|
|
|
|
|
|
/****************************************************************************
|
|
call a remote api
|
|
****************************************************************************/
|
|
static BOOL cli_api(struct cli_state *cli,
|
|
int prcnt,int drcnt,int mprcnt,int mdrcnt,int *rprcnt,
|
|
int *rdrcnt, char *param,char *data,
|
|
char **rparam, char **rdata)
|
|
{
|
|
cli_send_trans(cli,SMBtrans,"\\PIPE\\LANMAN",0,0,
|
|
data,param,NULL,
|
|
drcnt,prcnt,0,
|
|
mdrcnt,mprcnt,0);
|
|
|
|
return (cli_receive_trans(cli,SMBtrans,
|
|
rdrcnt,rprcnt,
|
|
rdata,rparam));
|
|
}
|
|
|
|
|
|
/****************************************************************************
|
|
perform a NetWkstaUserLogon
|
|
****************************************************************************/
|
|
BOOL cli_NetWkstaUserLogon(struct cli_state *cli,char *user, char *workstation)
|
|
{
|
|
char *rparam = NULL;
|
|
char *rdata = NULL;
|
|
char *p;
|
|
int rdrcnt,rprcnt;
|
|
pstring param;
|
|
|
|
memset(param, 0, sizeof(param));
|
|
|
|
/* send a SMBtrans command with api NetWkstaUserLogon */
|
|
p = param;
|
|
SSVAL(p,0,132); /* api number */
|
|
p += 2;
|
|
strcpy(p,"OOWb54WrLh");
|
|
p = skip_string(p,1);
|
|
strcpy(p,"WB21BWDWWDDDDDDDzzzD");
|
|
p = skip_string(p,1);
|
|
SSVAL(p,0,1);
|
|
p += 2;
|
|
strcpy(p,user);
|
|
strupper(p);
|
|
p += 21; p++; p += 15; p++;
|
|
strcpy(p, workstation);
|
|
strupper(p);
|
|
p += 16;
|
|
SSVAL(p, 0, BUFFER_SIZE);
|
|
p += 2;
|
|
SSVAL(p, 0, BUFFER_SIZE);
|
|
p += 2;
|
|
|
|
cli->error = -1;
|
|
|
|
if (cli_api(cli, PTR_DIFF(p,param),0,
|
|
1024,BUFFER_SIZE,
|
|
&rprcnt,&rdrcnt,
|
|
param,NULL,
|
|
&rparam,&rdata)) {
|
|
cli->error = SVAL(rparam,0);
|
|
p = rdata;
|
|
|
|
if (cli->error == 0) {
|
|
DEBUG(4,("NetWkstaUserLogon success\n"));
|
|
cli->privilages = SVAL(p, 24);
|
|
fstrcpy(cli->eff_name,p+2);
|
|
} else {
|
|
DEBUG(1,("NetwkstaUserLogon gave error %d\n", cli->error));
|
|
}
|
|
}
|
|
|
|
if (rparam) free(rparam);
|
|
if (rdata) free(rdata);
|
|
return cli->error == 0;
|
|
}
|
|
|
|
|
|
/****************************************************************************
|
|
call a NetServerEnum for the specified workgroup and servertype mask.
|
|
This function then calls the specified callback function for each name returned.
|
|
|
|
The callback function takes 3 arguments: the machine name, the server type and
|
|
the comment.
|
|
****************************************************************************/
|
|
BOOL cli_NetServerEnum(struct cli_state *cli, char *workgroup, uint32 stype,
|
|
void (*fn)(char *, uint32, char *))
|
|
{
|
|
char *rparam = NULL;
|
|
char *rdata = NULL;
|
|
int rdrcnt,rprcnt;
|
|
char *p;
|
|
pstring param;
|
|
int uLevel = 1;
|
|
int count = -1;
|
|
|
|
/* send a SMBtrans command with api NetServerEnum */
|
|
p = param;
|
|
SSVAL(p,0,0x68); /* api number */
|
|
p += 2;
|
|
strcpy(p,"WrLehDz");
|
|
p = skip_string(p,1);
|
|
|
|
strcpy(p,"B16BBDz");
|
|
|
|
p = skip_string(p,1);
|
|
SSVAL(p,0,uLevel);
|
|
SSVAL(p,2,BUFFER_SIZE);
|
|
p += 4;
|
|
SIVAL(p,0,stype);
|
|
p += 4;
|
|
|
|
pstrcpy(p, workgroup);
|
|
p = skip_string(p,1);
|
|
|
|
if (cli_api(cli,
|
|
PTR_DIFF(p,param), /* param count */
|
|
8, /*data count */
|
|
0, /* mprcount */
|
|
BUFFER_SIZE, /* mdrcount */
|
|
&rprcnt,&rdrcnt,
|
|
param, NULL,
|
|
&rparam,&rdata)) {
|
|
int res = SVAL(rparam,0);
|
|
int converter=SVAL(rparam,2);
|
|
int i;
|
|
|
|
if (res == 0) {
|
|
count=SVAL(rparam,4);
|
|
p = rdata;
|
|
|
|
for (i = 0;i < count;i++, p += 26) {
|
|
char *sname = p;
|
|
int comment_offset = IVAL(p,22) & 0xFFFF;
|
|
char *cmnt = comment_offset?(rdata+comment_offset-converter):"";
|
|
|
|
stype = IVAL(p,18) & ~SV_TYPE_LOCAL_LIST_ONLY;
|
|
|
|
fn(sname, stype, cmnt);
|
|
}
|
|
}
|
|
}
|
|
|
|
if (rparam) free(rparam);
|
|
if (rdata) free(rdata);
|
|
|
|
return(count > 0);
|
|
}
|
|
|
|
|
|
|
|
|
|
static struct {
|
|
int prot;
|
|
char *name;
|
|
}
|
|
prots[] =
|
|
{
|
|
{PROTOCOL_CORE,"PC NETWORK PROGRAM 1.0"},
|
|
{PROTOCOL_COREPLUS,"MICROSOFT NETWORKS 1.03"},
|
|
{PROTOCOL_LANMAN1,"MICROSOFT NETWORKS 3.0"},
|
|
{PROTOCOL_LANMAN1,"LANMAN1.0"},
|
|
{PROTOCOL_LANMAN2,"LM1.2X002"},
|
|
{PROTOCOL_LANMAN2,"Samba"},
|
|
{PROTOCOL_NT1,"NT LM 0.12"},
|
|
{PROTOCOL_NT1,"NT LANMAN 1.0"},
|
|
{-1,NULL}
|
|
};
|
|
|
|
|
|
/****************************************************************************
|
|
send a session setup
|
|
****************************************************************************/
|
|
BOOL cli_session_setup(struct cli_state *cli,
|
|
char *user,
|
|
char *pass, int passlen,
|
|
char *ntpass, int ntpasslen,
|
|
char *workgroup)
|
|
{
|
|
char *p;
|
|
fstring pword;
|
|
|
|
if (cli->protocol < PROTOCOL_LANMAN1)
|
|
return False;
|
|
|
|
if (passlen > sizeof(pword)-1) {
|
|
return False;
|
|
}
|
|
|
|
if ((cli->sec_mode & 2) && *pass && passlen != 24) {
|
|
passlen = 24;
|
|
SMBencrypt((uchar *)pass,(uchar *)cli->cryptkey,(uchar *)pword);
|
|
} else {
|
|
memcpy(pword, pass, passlen);
|
|
}
|
|
|
|
/* if in share level security then don't send a password now */
|
|
if (!(cli->sec_mode & 1)) {fstrcpy(pword, "");passlen=1;}
|
|
|
|
/* send a session setup command */
|
|
bzero(cli->outbuf,smb_size);
|
|
|
|
if (cli->protocol < PROTOCOL_NT1) {
|
|
set_message(cli->outbuf,10,1 + strlen(user) + passlen,True);
|
|
CVAL(cli->outbuf,smb_com) = SMBsesssetupX;
|
|
cli_setup_packet(cli);
|
|
|
|
CVAL(cli->outbuf,smb_vwv0) = 0xFF;
|
|
SSVAL(cli->outbuf,smb_vwv2,cli->max_xmit);
|
|
SSVAL(cli->outbuf,smb_vwv3,2);
|
|
SSVAL(cli->outbuf,smb_vwv4,1);
|
|
SIVAL(cli->outbuf,smb_vwv5,cli->sesskey);
|
|
SSVAL(cli->outbuf,smb_vwv7,passlen);
|
|
p = smb_buf(cli->outbuf);
|
|
memcpy(p,pword,passlen);
|
|
p += passlen;
|
|
strcpy(p,user);
|
|
strupper(p);
|
|
} else {
|
|
set_message(cli->outbuf,13,0,True);
|
|
CVAL(cli->outbuf,smb_com) = SMBsesssetupX;
|
|
cli_setup_packet(cli);
|
|
|
|
CVAL(cli->outbuf,smb_vwv0) = 0xFF;
|
|
SSVAL(cli->outbuf,smb_vwv2,BUFFER_SIZE);
|
|
SSVAL(cli->outbuf,smb_vwv3,2);
|
|
SSVAL(cli->outbuf,smb_vwv4,cli->pid);
|
|
SIVAL(cli->outbuf,smb_vwv5,cli->sesskey);
|
|
SSVAL(cli->outbuf,smb_vwv7,passlen);
|
|
SSVAL(cli->outbuf,smb_vwv8,ntpasslen);
|
|
p = smb_buf(cli->outbuf);
|
|
memcpy(p,pword,passlen);
|
|
p += SVAL(cli->outbuf,smb_vwv7);
|
|
memcpy(p,ntpass,ntpasslen);
|
|
p += SVAL(cli->outbuf,smb_vwv8);
|
|
strcpy(p,user);
|
|
strupper(p);
|
|
p = skip_string(p,1);
|
|
strcpy(p,workgroup);
|
|
strupper(p);
|
|
p = skip_string(p,1);
|
|
strcpy(p,"Unix");p = skip_string(p,1);
|
|
strcpy(p,"Samba");p = skip_string(p,1);
|
|
set_message(cli->outbuf,13,PTR_DIFF(p,smb_buf(cli->outbuf)),False);
|
|
}
|
|
|
|
send_smb(cli->fd,cli->outbuf);
|
|
if (!receive_smb(cli->fd,cli->inbuf,cli->timeout))
|
|
return False;
|
|
|
|
show_msg(cli->inbuf);
|
|
|
|
if (CVAL(cli->inbuf,smb_rcls) != 0) {
|
|
return False;
|
|
}
|
|
|
|
/* use the returned uid from now on */
|
|
cli->uid = SVAL(cli->inbuf,smb_uid);
|
|
|
|
return True;
|
|
}
|
|
|
|
|
|
/****************************************************************************
|
|
send a tconX
|
|
****************************************************************************/
|
|
BOOL cli_send_tconX(struct cli_state *cli,
|
|
char *share, char *dev, char *pass, int passlen)
|
|
{
|
|
fstring fullshare, pword;
|
|
char *p;
|
|
bzero(cli->outbuf,smb_size);
|
|
bzero(cli->inbuf,smb_size);
|
|
|
|
if (cli->sec_mode & 1) {
|
|
passlen = 1;
|
|
pass = "";
|
|
}
|
|
|
|
if ((cli->sec_mode & 2) && *pass && passlen != 24) {
|
|
passlen = 24;
|
|
SMBencrypt((uchar *)pass,(uchar *)cli->cryptkey,(uchar *)pword);
|
|
} else {
|
|
memcpy(pword, pass, passlen);
|
|
}
|
|
|
|
sprintf(fullshare, "\\\\%s\\%s", cli->desthost, share);
|
|
|
|
set_message(cli->outbuf,4,
|
|
2 + strlen(fullshare) + passlen + strlen(dev),True);
|
|
CVAL(cli->outbuf,smb_com) = SMBtconX;
|
|
cli_setup_packet(cli);
|
|
|
|
SSVAL(cli->outbuf,smb_vwv0,0xFF);
|
|
SSVAL(cli->outbuf,smb_vwv3,passlen);
|
|
|
|
p = smb_buf(cli->outbuf);
|
|
memcpy(p,pword,passlen);
|
|
p += passlen;
|
|
strcpy(p,fullshare);
|
|
p = skip_string(p,1);
|
|
strcpy(p,dev);
|
|
|
|
SCVAL(cli->inbuf,smb_rcls, 1);
|
|
|
|
send_smb(cli->fd,cli->outbuf);
|
|
if (!receive_smb(cli->fd,cli->inbuf,cli->timeout))
|
|
return False;
|
|
|
|
if (CVAL(cli->inbuf,smb_rcls) != 0) {
|
|
return False;
|
|
}
|
|
|
|
cli->cnum = SVAL(cli->inbuf,smb_tid);
|
|
return True;
|
|
}
|
|
|
|
|
|
/****************************************************************************
|
|
send a tree disconnect
|
|
****************************************************************************/
|
|
BOOL cli_tdis(struct cli_state *cli)
|
|
{
|
|
bzero(cli->outbuf,smb_size);
|
|
set_message(cli->outbuf,0,0,True);
|
|
CVAL(cli->outbuf,smb_com) = SMBtdis;
|
|
SSVAL(cli->outbuf,smb_tid,cli->cnum);
|
|
cli_setup_packet(cli);
|
|
|
|
send_smb(cli->fd,cli->outbuf);
|
|
if (!receive_smb(cli->fd,cli->inbuf,cli->timeout))
|
|
return False;
|
|
|
|
return CVAL(cli->inbuf,smb_rcls) == 0;
|
|
}
|
|
|
|
/****************************************************************************
|
|
delete a file
|
|
****************************************************************************/
|
|
BOOL cli_unlink(struct cli_state *cli, char *fname)
|
|
{
|
|
char *p;
|
|
|
|
bzero(cli->outbuf,smb_size);
|
|
bzero(cli->inbuf,smb_size);
|
|
|
|
set_message(cli->outbuf,1, 2 + strlen(fname),True);
|
|
|
|
CVAL(cli->outbuf,smb_com) = SMBunlink;
|
|
SSVAL(cli->outbuf,smb_tid,cli->cnum);
|
|
cli_setup_packet(cli);
|
|
|
|
SSVAL(cli->outbuf,smb_vwv0,aSYSTEM | aHIDDEN);
|
|
|
|
p = smb_buf(cli->outbuf);
|
|
*p++ = 4;
|
|
strcpy(p,fname);
|
|
p = skip_string(p,1);
|
|
|
|
send_smb(cli->fd,cli->outbuf);
|
|
if (!receive_smb(cli->fd,cli->inbuf,cli->timeout)) {
|
|
return False;
|
|
}
|
|
|
|
if (CVAL(cli->inbuf,smb_rcls) != 0) {
|
|
return False;
|
|
}
|
|
|
|
return True;
|
|
}
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
open a file
|
|
****************************************************************************/
|
|
int cli_open(struct cli_state *cli, char *fname, int flags, int share_mode)
|
|
{
|
|
char *p;
|
|
unsigned openfn=0;
|
|
unsigned accessmode=0;
|
|
|
|
if (flags & O_CREAT)
|
|
openfn |= (1<<4);
|
|
if (!(flags & O_EXCL)) {
|
|
if (flags & O_TRUNC)
|
|
openfn |= (1<<1);
|
|
else
|
|
openfn |= (1<<0);
|
|
}
|
|
|
|
accessmode = (share_mode<<4);
|
|
|
|
if ((flags & O_RDWR) == O_RDWR) {
|
|
accessmode |= 2;
|
|
} else if ((flags & O_WRONLY) == O_WRONLY) {
|
|
accessmode |= 1;
|
|
}
|
|
|
|
bzero(cli->outbuf,smb_size);
|
|
bzero(cli->inbuf,smb_size);
|
|
|
|
set_message(cli->outbuf,15,1 + strlen(fname),True);
|
|
|
|
CVAL(cli->outbuf,smb_com) = SMBopenX;
|
|
SSVAL(cli->outbuf,smb_tid,cli->cnum);
|
|
cli_setup_packet(cli);
|
|
|
|
SSVAL(cli->outbuf,smb_vwv0,0xFF);
|
|
SSVAL(cli->outbuf,smb_vwv2,0); /* no additional info */
|
|
SSVAL(cli->outbuf,smb_vwv3,accessmode);
|
|
SSVAL(cli->outbuf,smb_vwv4,aSYSTEM | aHIDDEN);
|
|
SSVAL(cli->outbuf,smb_vwv5,aSYSTEM | aHIDDEN);
|
|
SSVAL(cli->outbuf,smb_vwv8,openfn);
|
|
|
|
p = smb_buf(cli->outbuf);
|
|
strcpy(p,fname);
|
|
p = skip_string(p,1);
|
|
|
|
send_smb(cli->fd,cli->outbuf);
|
|
if (!receive_smb(cli->fd,cli->inbuf,cli->timeout)) {
|
|
return -1;
|
|
}
|
|
|
|
if (CVAL(cli->inbuf,smb_rcls) != 0) {
|
|
return -1;
|
|
}
|
|
|
|
return SVAL(cli->inbuf,smb_vwv2);
|
|
}
|
|
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
close a file
|
|
****************************************************************************/
|
|
BOOL cli_close(struct cli_state *cli, int fnum)
|
|
{
|
|
bzero(cli->outbuf,smb_size);
|
|
bzero(cli->inbuf,smb_size);
|
|
|
|
set_message(cli->outbuf,3,0,True);
|
|
|
|
CVAL(cli->outbuf,smb_com) = SMBclose;
|
|
SSVAL(cli->outbuf,smb_tid,cli->cnum);
|
|
cli_setup_packet(cli);
|
|
|
|
SSVAL(cli->outbuf,smb_vwv0,fnum);
|
|
SSVAL(cli->outbuf,smb_vwv1,0);
|
|
SSVAL(cli->outbuf,smb_vwv2,0);
|
|
|
|
send_smb(cli->fd,cli->outbuf);
|
|
if (!receive_smb(cli->fd,cli->inbuf,cli->timeout)) {
|
|
return False;
|
|
}
|
|
|
|
if (CVAL(cli->inbuf,smb_rcls) != 0) {
|
|
return False;
|
|
}
|
|
|
|
return True;
|
|
}
|
|
|
|
|
|
/****************************************************************************
|
|
lock a file
|
|
****************************************************************************/
|
|
BOOL cli_lock(struct cli_state *cli, int fnum, uint32 offset, uint32 len, int timeout)
|
|
{
|
|
char *p;
|
|
|
|
bzero(cli->outbuf,smb_size);
|
|
bzero(cli->inbuf,smb_size);
|
|
|
|
set_message(cli->outbuf,8,10,True);
|
|
|
|
CVAL(cli->outbuf,smb_com) = SMBlockingX;
|
|
SSVAL(cli->outbuf,smb_tid,cli->cnum);
|
|
cli_setup_packet(cli);
|
|
|
|
CVAL(cli->outbuf,smb_vwv0) = 0xFF;
|
|
SSVAL(cli->outbuf,smb_vwv2,fnum);
|
|
CVAL(cli->outbuf,smb_vwv3) = 0;
|
|
SIVALS(cli->outbuf, smb_vwv4, timeout);
|
|
SSVAL(cli->outbuf,smb_vwv6,0);
|
|
SSVAL(cli->outbuf,smb_vwv7,1);
|
|
|
|
p = smb_buf(cli->outbuf);
|
|
SSVAL(p, 0, cli->pid);
|
|
SIVAL(p, 2, offset);
|
|
SIVAL(p, 6, len);
|
|
|
|
send_smb(cli->fd,cli->outbuf);
|
|
if (!receive_smb(cli->fd,cli->inbuf,cli->timeout)) {
|
|
return False;
|
|
}
|
|
|
|
if (CVAL(cli->inbuf,smb_rcls) != 0) {
|
|
return False;
|
|
}
|
|
|
|
return True;
|
|
}
|
|
|
|
/****************************************************************************
|
|
unlock a file
|
|
****************************************************************************/
|
|
BOOL cli_unlock(struct cli_state *cli, int fnum, uint32 offset, uint32 len, int timeout)
|
|
{
|
|
char *p;
|
|
|
|
bzero(cli->outbuf,smb_size);
|
|
bzero(cli->inbuf,smb_size);
|
|
|
|
set_message(cli->outbuf,8,10,True);
|
|
|
|
CVAL(cli->outbuf,smb_com) = SMBlockingX;
|
|
SSVAL(cli->outbuf,smb_tid,cli->cnum);
|
|
cli_setup_packet(cli);
|
|
|
|
CVAL(cli->outbuf,smb_vwv0) = 0xFF;
|
|
SSVAL(cli->outbuf,smb_vwv2,fnum);
|
|
CVAL(cli->outbuf,smb_vwv3) = 0;
|
|
SIVALS(cli->outbuf, smb_vwv4, timeout);
|
|
SSVAL(cli->outbuf,smb_vwv6,1);
|
|
SSVAL(cli->outbuf,smb_vwv7,0);
|
|
|
|
p = smb_buf(cli->outbuf);
|
|
SSVAL(p, 0, cli->pid);
|
|
SIVAL(p, 2, offset);
|
|
SIVAL(p, 6, len);
|
|
|
|
send_smb(cli->fd,cli->outbuf);
|
|
if (!receive_smb(cli->fd,cli->inbuf,cli->timeout)) {
|
|
return False;
|
|
}
|
|
|
|
if (CVAL(cli->inbuf,smb_rcls) != 0) {
|
|
return False;
|
|
}
|
|
|
|
return True;
|
|
}
|
|
|
|
|
|
/****************************************************************************
|
|
read from a file
|
|
****************************************************************************/
|
|
int cli_read(struct cli_state *cli, int fnum, char *buf, uint32 offset, uint16 size)
|
|
{
|
|
char *p;
|
|
|
|
bzero(cli->outbuf,smb_size);
|
|
bzero(cli->inbuf,smb_size);
|
|
|
|
set_message(cli->outbuf,10,0,True);
|
|
|
|
CVAL(cli->outbuf,smb_com) = SMBreadX;
|
|
SSVAL(cli->outbuf,smb_tid,cli->cnum);
|
|
cli_setup_packet(cli);
|
|
|
|
CVAL(cli->outbuf,smb_vwv0) = 0xFF;
|
|
SSVAL(cli->outbuf,smb_vwv2,fnum);
|
|
SIVAL(cli->outbuf,smb_vwv3,offset);
|
|
SSVAL(cli->outbuf,smb_vwv5,size);
|
|
SSVAL(cli->outbuf,smb_vwv6,size);
|
|
|
|
send_smb(cli->fd,cli->outbuf);
|
|
if (!receive_smb(cli->fd,cli->inbuf,cli->timeout)) {
|
|
return -1;
|
|
}
|
|
|
|
if (CVAL(cli->inbuf,smb_rcls) != 0) {
|
|
return -1;
|
|
}
|
|
|
|
size = SVAL(cli->inbuf, smb_vwv5);
|
|
p = smb_base(cli->inbuf) + SVAL(cli->inbuf,smb_vwv6);
|
|
|
|
memcpy(buf, p, size);
|
|
|
|
return size;
|
|
}
|
|
|
|
|
|
/****************************************************************************
|
|
write to a file
|
|
****************************************************************************/
|
|
int cli_write(struct cli_state *cli, int fnum, char *buf, uint32 offset, uint16 size)
|
|
{
|
|
char *p;
|
|
|
|
bzero(cli->outbuf,smb_size);
|
|
bzero(cli->inbuf,smb_size);
|
|
|
|
set_message(cli->outbuf,12,size,True);
|
|
|
|
CVAL(cli->outbuf,smb_com) = SMBwriteX;
|
|
SSVAL(cli->outbuf,smb_tid,cli->cnum);
|
|
cli_setup_packet(cli);
|
|
|
|
CVAL(cli->outbuf,smb_vwv0) = 0xFF;
|
|
SSVAL(cli->outbuf,smb_vwv2,fnum);
|
|
SIVAL(cli->outbuf,smb_vwv3,offset);
|
|
|
|
SSVAL(cli->outbuf,smb_vwv10,size);
|
|
SSVAL(cli->outbuf,smb_vwv11,smb_buf(cli->outbuf) - smb_base(cli->outbuf));
|
|
|
|
p = smb_base(cli->outbuf) + SVAL(cli->outbuf,smb_vwv11);
|
|
memcpy(p, buf, size);
|
|
|
|
send_smb(cli->fd,cli->outbuf);
|
|
if (!receive_smb(cli->fd,cli->inbuf,cli->timeout)) {
|
|
return -1;
|
|
}
|
|
|
|
if (CVAL(cli->inbuf,smb_rcls) != 0) {
|
|
return -1;
|
|
}
|
|
|
|
return SVAL(cli->inbuf, smb_vwv2);
|
|
}
|
|
|
|
|
|
/****************************************************************************
|
|
send a negprot command
|
|
****************************************************************************/
|
|
BOOL cli_negprot(struct cli_state *cli)
|
|
{
|
|
char *p;
|
|
int numprots;
|
|
int plength;
|
|
|
|
bzero(cli->outbuf,smb_size);
|
|
|
|
/* setup the protocol strings */
|
|
for (plength=0,numprots=0;
|
|
prots[numprots].name && prots[numprots].prot<=cli->protocol;
|
|
numprots++)
|
|
plength += strlen(prots[numprots].name)+2;
|
|
|
|
set_message(cli->outbuf,0,plength,True);
|
|
|
|
p = smb_buf(cli->outbuf);
|
|
for (numprots=0;
|
|
prots[numprots].name && prots[numprots].prot<=cli->protocol;
|
|
numprots++) {
|
|
*p++ = 2;
|
|
strcpy(p,prots[numprots].name);
|
|
p += strlen(p) + 1;
|
|
}
|
|
|
|
CVAL(cli->outbuf,smb_com) = SMBnegprot;
|
|
cli_setup_packet(cli);
|
|
|
|
CVAL(smb_buf(cli->outbuf),0) = 2;
|
|
|
|
send_smb(cli->fd,cli->outbuf);
|
|
if (!receive_smb(cli->fd,cli->inbuf,cli->timeout))
|
|
return False;
|
|
|
|
show_msg(cli->inbuf);
|
|
|
|
if (CVAL(cli->inbuf,smb_rcls) != 0 ||
|
|
((int)SVAL(cli->inbuf,smb_vwv0) >= numprots)) {
|
|
return(False);
|
|
}
|
|
|
|
cli->protocol = prots[SVAL(cli->inbuf,smb_vwv0)].prot;
|
|
|
|
|
|
if (cli->protocol < PROTOCOL_NT1) {
|
|
cli->sec_mode = SVAL(cli->inbuf,smb_vwv1);
|
|
cli->max_xmit = SVAL(cli->inbuf,smb_vwv2);
|
|
cli->sesskey = IVAL(cli->inbuf,smb_vwv6);
|
|
cli->serverzone = SVALS(cli->inbuf,smb_vwv10)*60;
|
|
/* this time is converted to GMT by make_unix_date */
|
|
cli->servertime = make_unix_date(cli->inbuf+smb_vwv8);
|
|
if (cli->protocol >= PROTOCOL_COREPLUS) {
|
|
cli->readbraw_supported = ((SVAL(cli->inbuf,smb_vwv5) & 0x1) != 0);
|
|
cli->writebraw_supported = ((SVAL(cli->inbuf,smb_vwv5) & 0x2) != 0);
|
|
}
|
|
memcpy(cli->cryptkey,smb_buf(cli->inbuf),8);
|
|
} else {
|
|
/* NT protocol */
|
|
cli->sec_mode = CVAL(cli->inbuf,smb_vwv1);
|
|
cli->max_xmit = IVAL(cli->inbuf,smb_vwv3+1);
|
|
cli->sesskey = IVAL(cli->inbuf,smb_vwv7+1);
|
|
cli->serverzone = SVALS(cli->inbuf,smb_vwv15+1)*60;
|
|
/* this time arrives in real GMT */
|
|
cli->servertime = interpret_long_date(cli->inbuf+smb_vwv11+1);
|
|
memcpy(cli->cryptkey,smb_buf(cli->inbuf),8);
|
|
if (IVAL(cli->inbuf,smb_vwv9+1) & 1)
|
|
cli->readbraw_supported =
|
|
cli->writebraw_supported = True;
|
|
}
|
|
|
|
return True;
|
|
}
|
|
|
|
|
|
/****************************************************************************
|
|
send a session request
|
|
****************************************************************************/
|
|
BOOL cli_session_request(struct cli_state *cli, char *host, int name_type,
|
|
char *myname)
|
|
{
|
|
fstring dest;
|
|
char *p;
|
|
int len = 4;
|
|
/* send a session request (RFC 1002) */
|
|
|
|
fstrcpy(dest,host);
|
|
|
|
p = strchr(dest,'.');
|
|
if (p) *p = 0;
|
|
|
|
fstrcpy(cli->desthost, dest);
|
|
|
|
/* put in the destination name */
|
|
p = cli->outbuf+len;
|
|
name_mangle(dest,p,name_type);
|
|
len += name_len(p);
|
|
|
|
/* and my name */
|
|
p = cli->outbuf+len;
|
|
name_mangle(myname,p,0);
|
|
len += name_len(p);
|
|
|
|
/* setup the packet length */
|
|
_smb_setlen(cli->outbuf,len);
|
|
CVAL(cli->outbuf,0) = 0x81;
|
|
|
|
send_smb(cli->fd,cli->outbuf);
|
|
DEBUG(5,("Sent session request\n"));
|
|
|
|
if (!receive_smb(cli->fd,cli->inbuf,cli->timeout))
|
|
return False;
|
|
|
|
if (CVAL(cli->inbuf,0) != 0x82) {
|
|
cli->error = CVAL(cli->inbuf,0);
|
|
return False;
|
|
}
|
|
return(True);
|
|
}
|
|
|
|
|
|
/****************************************************************************
|
|
open the client sockets
|
|
****************************************************************************/
|
|
BOOL cli_connect(struct cli_state *cli, char *host, struct in_addr *ip)
|
|
{
|
|
struct in_addr dest_ip;
|
|
|
|
fstrcpy(cli->desthost, host);
|
|
|
|
if (!ip) {
|
|
struct hostent *hp;
|
|
|
|
if ((hp = Get_Hostbyname(cli->desthost)) == 0) {
|
|
return False;
|
|
}
|
|
|
|
putip((char *)&dest_ip,(char *)hp->h_addr);
|
|
} else {
|
|
dest_ip = *ip;
|
|
}
|
|
|
|
|
|
cli->fd = open_socket_out(SOCK_STREAM, &dest_ip, 139, cli->timeout);
|
|
if (cli->fd == -1)
|
|
return False;
|
|
|
|
return True;
|
|
}
|
|
|
|
|
|
/****************************************************************************
|
|
initialise a client structure
|
|
****************************************************************************/
|
|
BOOL cli_initialise(struct cli_state *cli)
|
|
{
|
|
if (cli->initialised) cli_shutdown(cli);
|
|
|
|
memset(cli, 0, sizeof(*cli));
|
|
cli->fd = -1;
|
|
cli->cnum = -1;
|
|
cli->pid = getpid();
|
|
cli->mid = 1;
|
|
cli->uid = getuid();
|
|
cli->protocol = PROTOCOL_NT1;
|
|
cli->timeout = 20000;
|
|
cli->bufsize = 0x10000;
|
|
cli->max_xmit = cli->bufsize - 4;
|
|
cli->outbuf = (char *)malloc(cli->bufsize);
|
|
cli->inbuf = (char *)malloc(cli->bufsize);
|
|
if (!cli->outbuf || !cli->inbuf) return False;
|
|
cli->initialised = 1;
|
|
return True;
|
|
}
|
|
|
|
/****************************************************************************
|
|
shutdown a client structure
|
|
****************************************************************************/
|
|
void cli_shutdown(struct cli_state *cli)
|
|
{
|
|
if (cli->outbuf) free(cli->outbuf);
|
|
if (cli->inbuf) free(cli->inbuf);
|
|
if (cli->fd != -1) close(cli->fd);
|
|
memset(cli, 0, sizeof(*cli));
|
|
}
|
|
|
|
/****************************************************************************
|
|
return a description of the error
|
|
****************************************************************************/
|
|
char *cli_errstr(struct cli_state *cli)
|
|
{
|
|
return smb_errstr(cli->inbuf);
|
|
}
|
|
|
|
/****************************************************************************
|
|
return error codes for the last packet
|
|
****************************************************************************/
|
|
void cli_error(struct cli_state *cli, int *eclass, int *num)
|
|
{
|
|
*eclass = CVAL(cli->inbuf,smb_rcls);
|
|
*num = SVAL(cli->inbuf,smb_err);
|
|
}
|
|
|
|
/****************************************************************************
|
|
set socket options on a open connection
|
|
****************************************************************************/
|
|
void cli_sockopt(struct cli_state *cli, char *options)
|
|
{
|
|
set_socket_options(cli->fd, options);
|
|
}
|