mirror of
https://github.com/samba-team/samba.git
synced 2024-12-27 03:21:53 +03:00
8528016978
try to include just the BASENAME.h files (containing only structs)
(This used to be commit 3dd477ca51
)
81 lines
2.7 KiB
C
81 lines
2.7 KiB
C
/*
|
|
Unix SMB/CIFS implementation.
|
|
|
|
defend our names against name registration requests
|
|
|
|
Copyright (C) Andrew Tridgell 2005
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 2 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program; if not, write to the Free Software
|
|
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
#include "dlinklist.h"
|
|
#include "system/network.h"
|
|
#include "nbt_server/nbt_server.h"
|
|
#include "nbt_server/wins/winsserver.h"
|
|
#include "librpc/gen_ndr/ndr_nbt.h"
|
|
#include "lib/socket/socket.h"
|
|
|
|
|
|
/*
|
|
defend our registered names against registration or name refresh
|
|
requests
|
|
*/
|
|
void nbtd_request_defense(struct nbt_name_socket *nbtsock,
|
|
struct nbt_name_packet *packet,
|
|
struct socket_address *src)
|
|
{
|
|
struct nbtd_iface_name *iname;
|
|
struct nbt_name *name;
|
|
struct nbtd_interface *iface = talloc_get_type(nbtsock->incoming.private,
|
|
struct nbtd_interface);
|
|
|
|
/*
|
|
* if the packet comes from one of our interfaces
|
|
* it must be our winsclient trying to reach the winsserver
|
|
*/
|
|
if (nbtd_self_packet(nbtsock, packet, src)) {
|
|
nbtd_winsserver_request(nbtsock, packet, src);
|
|
return;
|
|
}
|
|
|
|
NBTD_ASSERT_PACKET(packet, src, packet->qdcount == 1);
|
|
NBTD_ASSERT_PACKET(packet, src, packet->arcount == 1);
|
|
NBTD_ASSERT_PACKET(packet, src,
|
|
packet->questions[0].question_type == NBT_QTYPE_NETBIOS);
|
|
NBTD_ASSERT_PACKET(packet, src,
|
|
packet->questions[0].question_class == NBT_QCLASS_IP);
|
|
NBTD_ASSERT_PACKET(packet, src,
|
|
packet->additional[0].rr_type == NBT_QTYPE_NETBIOS);
|
|
NBTD_ASSERT_PACKET(packet, src,
|
|
packet->additional[0].rr_class == NBT_QCLASS_IP);
|
|
NBTD_ASSERT_PACKET(packet, src,
|
|
packet->additional[0].rdata.netbios.length == 6);
|
|
|
|
/* see if we have the requested name on this interface */
|
|
name = &packet->questions[0].name;
|
|
|
|
iname = nbtd_find_iname(iface, name, NBT_NM_ACTIVE);
|
|
if (iname != NULL &&
|
|
!(name->type == NBT_NAME_LOGON || iname->nb_flags & NBT_NM_GROUP)) {
|
|
DEBUG(2,("Defending name %s on %s against %s\n",
|
|
nbt_name_string(packet, name),
|
|
iface->bcast_address, src->addr));
|
|
nbtd_name_registration_reply(nbtsock, packet, src, NBT_RCODE_ACT);
|
|
} else {
|
|
nbtd_winsserver_request(nbtsock, packet, src);
|
|
}
|
|
}
|