mirror of
https://github.com/samba-team/samba.git
synced 2024-12-23 17:34:34 +03:00
e287dfe9ed
Signed-off-by: Volker Lendecke <vl@samba.org> Reviewed-by: Jeremy Allison <jra@samba.org>
1253 lines
36 KiB
C
1253 lines
36 KiB
C
/*
|
|
Unix SMB/CIFS implementation.
|
|
|
|
dcerpc connect functions
|
|
|
|
Copyright (C) Andrew Tridgell 2003
|
|
Copyright (C) Jelmer Vernooij 2004
|
|
Copyright (C) Andrew Bartlett <abartlet@samba.org> 2005-2007
|
|
Copyright (C) Rafal Szczesniak 2005
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
|
|
#include "includes.h"
|
|
#include "libcli/composite/composite.h"
|
|
#include "libcli/smb_composite/smb_composite.h"
|
|
#include "lib/events/events.h"
|
|
#include "libcli/smb2/smb2.h"
|
|
#include "libcli/smb2/smb2_calls.h"
|
|
#include "libcli/smb/smbXcli_base.h"
|
|
#include "librpc/rpc/dcerpc.h"
|
|
#include "librpc/rpc/dcerpc_proto.h"
|
|
#include "auth/credentials/credentials.h"
|
|
#include "param/param.h"
|
|
#include "libcli/resolve/resolve.h"
|
|
#include "libcli/http/http.h"
|
|
#include "lib/util/util_net.h"
|
|
|
|
#undef strcasecmp
|
|
|
|
struct dcerpc_pipe_connect {
|
|
struct dcecli_connection *conn;
|
|
struct dcerpc_binding *binding;
|
|
const struct ndr_interface_table *interface;
|
|
struct cli_credentials *creds;
|
|
struct resolve_context *resolve_ctx;
|
|
struct {
|
|
const char *dir;
|
|
} ncalrpc;
|
|
struct {
|
|
struct smbXcli_conn *conn;
|
|
struct smbXcli_session *session;
|
|
struct smbXcli_tcon *tcon;
|
|
const char *pipe_name;
|
|
} smb;
|
|
};
|
|
|
|
struct pipe_np_smb_state {
|
|
struct smb_composite_connect conn;
|
|
struct dcerpc_pipe_connect io;
|
|
};
|
|
|
|
|
|
/*
|
|
Stage 3 of ncacn_np_smb: Named pipe opened (or not)
|
|
*/
|
|
static void continue_pipe_open_smb(struct composite_context *ctx)
|
|
{
|
|
struct composite_context *c = talloc_get_type(ctx->async.private_data,
|
|
struct composite_context);
|
|
|
|
/* receive result of named pipe open request on smb */
|
|
c->status = dcerpc_pipe_open_smb_recv(ctx);
|
|
if (!composite_is_ok(c)) return;
|
|
|
|
composite_done(c);
|
|
}
|
|
|
|
static void continue_smb_open(struct composite_context *c);
|
|
static void continue_smb2_connect(struct tevent_req *subreq);
|
|
static void continue_smbXcli_connect(struct tevent_req *subreq);
|
|
|
|
/*
|
|
Stage 2 of ncacn_np_smb: Open a named pipe after successful smb connection
|
|
*/
|
|
static void continue_smb_connect(struct composite_context *ctx)
|
|
{
|
|
struct composite_context *c = talloc_get_type(ctx->async.private_data,
|
|
struct composite_context);
|
|
struct pipe_np_smb_state *s = talloc_get_type(c->private_data,
|
|
struct pipe_np_smb_state);
|
|
struct smbcli_tree *t;
|
|
|
|
/* receive result of smb connect request */
|
|
c->status = smb_composite_connect_recv(ctx, s->io.conn);
|
|
if (!composite_is_ok(c)) return;
|
|
|
|
t = s->conn.out.tree;
|
|
|
|
/* prepare named pipe open parameters */
|
|
s->io.smb.conn = t->session->transport->conn;
|
|
s->io.smb.session = t->session->smbXcli;
|
|
s->io.smb.tcon = t->smbXcli;
|
|
smb1cli_tcon_set_id(s->io.smb.tcon, t->tid);
|
|
s->io.smb.pipe_name = dcerpc_binding_get_string_option(s->io.binding,
|
|
"endpoint");
|
|
|
|
continue_smb_open(c);
|
|
}
|
|
|
|
static void continue_smb_open(struct composite_context *c)
|
|
{
|
|
struct pipe_np_smb_state *s = talloc_get_type(c->private_data,
|
|
struct pipe_np_smb_state);
|
|
struct composite_context *open_ctx;
|
|
|
|
/* send named pipe open request */
|
|
open_ctx = dcerpc_pipe_open_smb_send(s->io.conn,
|
|
s->io.smb.conn,
|
|
s->io.smb.session,
|
|
s->io.smb.tcon,
|
|
DCERPC_REQUEST_TIMEOUT * 1000,
|
|
s->io.smb.pipe_name);
|
|
if (composite_nomem(open_ctx, c)) return;
|
|
|
|
composite_continue(c, open_ctx, continue_pipe_open_smb, c);
|
|
}
|
|
|
|
|
|
/*
|
|
Initiate async open of a rpc connection to a rpc pipe on SMB using
|
|
the binding structure to determine the endpoint and options
|
|
*/
|
|
static struct composite_context *dcerpc_pipe_connect_ncacn_np_smb_send(TALLOC_CTX *mem_ctx, struct dcerpc_pipe_connect *io, struct loadparm_context *lp_ctx)
|
|
{
|
|
struct composite_context *c;
|
|
struct pipe_np_smb_state *s;
|
|
struct tevent_req *subreq = NULL;
|
|
struct smb_composite_connect *conn;
|
|
uint32_t flags;
|
|
const char *target_hostname = NULL;
|
|
const char *dest_address = NULL;
|
|
const char *calling_name = NULL;
|
|
|
|
/* composite context allocation and setup */
|
|
c = composite_create(mem_ctx, io->conn->event_ctx);
|
|
if (c == NULL) return NULL;
|
|
|
|
s = talloc_zero(c, struct pipe_np_smb_state);
|
|
if (composite_nomem(s, c)) return c;
|
|
c->private_data = s;
|
|
|
|
s->io = *io;
|
|
conn = &s->conn;
|
|
|
|
if (smbXcli_conn_is_connected(s->io.smb.conn)) {
|
|
continue_smb_open(c);
|
|
return c;
|
|
}
|
|
|
|
if (s->io.creds == NULL) {
|
|
composite_error(c, NT_STATUS_INVALID_PARAMETER_MIX);
|
|
return c;
|
|
}
|
|
|
|
/* prepare smb connection parameters: we're connecting to IPC$ share on
|
|
remote rpc server */
|
|
target_hostname = dcerpc_binding_get_string_option(s->io.binding, "target_hostname");
|
|
conn->in.dest_host = dcerpc_binding_get_string_option(s->io.binding, "host");
|
|
conn->in.dest_ports = lpcfg_smb_ports(lp_ctx);
|
|
conn->in.called_name = target_hostname;
|
|
if (conn->in.called_name == NULL) {
|
|
conn->in.called_name = "*SMBSERVER";
|
|
}
|
|
conn->in.socket_options = lpcfg_socket_options(lp_ctx);
|
|
conn->in.service = "IPC$";
|
|
conn->in.service_type = NULL;
|
|
conn->in.workgroup = lpcfg_workgroup(lp_ctx);
|
|
conn->in.gensec_settings = lpcfg_gensec_settings(conn, lp_ctx);
|
|
|
|
lpcfg_smbcli_options(lp_ctx, &conn->in.options);
|
|
lpcfg_smbcli_session_options(lp_ctx, &conn->in.session_options);
|
|
|
|
/*
|
|
* provide proper credentials - user supplied, but allow a
|
|
* fallback to anonymous if this is an schannel connection
|
|
* (might be NT4 not allowing machine logins at session
|
|
* setup) or if asked to do so by the caller (perhaps a SAMR password change?)
|
|
*/
|
|
s->conn.in.credentials = s->io.creds;
|
|
flags = dcerpc_binding_get_flags(s->io.binding);
|
|
if (flags & (DCERPC_SCHANNEL|DCERPC_ANON_FALLBACK)) {
|
|
conn->in.fallback_to_anonymous = true;
|
|
} else {
|
|
conn->in.fallback_to_anonymous = false;
|
|
}
|
|
|
|
conn->in.options.min_protocol = lpcfg_client_ipc_min_protocol(lp_ctx);
|
|
conn->in.options.max_protocol = lpcfg_client_ipc_max_protocol(lp_ctx);
|
|
if ((flags & DCERPC_SMB1) && (flags & DCERPC_SMB2)) {
|
|
/* auto */
|
|
} else if (flags & DCERPC_SMB2) {
|
|
if (conn->in.options.min_protocol < PROTOCOL_SMB2_02) {
|
|
conn->in.options.min_protocol = PROTOCOL_SMB2_02;
|
|
}
|
|
if (conn->in.options.max_protocol < PROTOCOL_SMB2_02) {
|
|
conn->in.options.max_protocol = PROTOCOL_LATEST;
|
|
}
|
|
} else if (flags & DCERPC_SMB1) {
|
|
conn->in.options.min_protocol = PROTOCOL_NT1;
|
|
conn->in.options.max_protocol = PROTOCOL_NT1;
|
|
} else {
|
|
/* auto */
|
|
}
|
|
|
|
conn->in.options.signing = lpcfg_client_ipc_signing(lp_ctx);
|
|
|
|
if (s->conn.in.credentials != NULL) {
|
|
calling_name = cli_credentials_get_workstation(s->conn.in.credentials);
|
|
}
|
|
if (calling_name == NULL) {
|
|
calling_name = "SMBCLIENT";
|
|
}
|
|
|
|
if (target_hostname == NULL) {
|
|
target_hostname = conn->in.dest_host;
|
|
}
|
|
|
|
if (conn->in.dest_host != NULL && is_ipaddress(conn->in.dest_host)) {
|
|
dest_address = conn->in.dest_host;
|
|
}
|
|
|
|
subreq = smb_connect_nego_send(s,
|
|
c->event_ctx,
|
|
s->io.resolve_ctx,
|
|
&conn->in.options,
|
|
conn->in.socket_options,
|
|
conn->in.dest_host,
|
|
dest_address,
|
|
conn->in.dest_ports,
|
|
target_hostname,
|
|
conn->in.called_name,
|
|
calling_name);
|
|
if (composite_nomem(subreq, c)) return c;
|
|
tevent_req_set_callback(subreq,
|
|
continue_smbXcli_connect,
|
|
c);
|
|
|
|
return c;
|
|
}
|
|
|
|
static void continue_smbXcli_connect(struct tevent_req *subreq)
|
|
{
|
|
struct composite_context *c =
|
|
tevent_req_callback_data(subreq,
|
|
struct composite_context);
|
|
struct pipe_np_smb_state *s =
|
|
talloc_get_type_abort(c->private_data,
|
|
struct pipe_np_smb_state);
|
|
struct smb_composite_connect *conn = &s->conn;
|
|
struct composite_context *creq = NULL;
|
|
enum protocol_types protocol;
|
|
|
|
c->status = smb_connect_nego_recv(subreq, s,
|
|
&conn->in.existing_conn);
|
|
TALLOC_FREE(subreq);
|
|
if (!composite_is_ok(c)) return;
|
|
|
|
protocol = smbXcli_conn_protocol(conn->in.existing_conn);
|
|
if (protocol >= PROTOCOL_SMB2_02) {
|
|
/*
|
|
* continue with smb2 session setup/tree connect
|
|
* on the established connection.
|
|
*/
|
|
subreq = smb2_connect_send(s, c->event_ctx,
|
|
conn->in.dest_host,
|
|
conn->in.dest_ports,
|
|
conn->in.service,
|
|
s->io.resolve_ctx,
|
|
conn->in.credentials,
|
|
conn->in.fallback_to_anonymous,
|
|
&conn->in.existing_conn,
|
|
0, /* previous_session_id */
|
|
&conn->in.options,
|
|
conn->in.socket_options,
|
|
conn->in.gensec_settings);
|
|
if (composite_nomem(subreq, c)) return;
|
|
tevent_req_set_callback(subreq, continue_smb2_connect, c);
|
|
return;
|
|
}
|
|
|
|
/*
|
|
* continue with smb1 session setup/tree connect
|
|
* on the established connection.
|
|
*/
|
|
creq = smb_composite_connect_send(conn, s->io.conn,
|
|
s->io.resolve_ctx,
|
|
c->event_ctx);
|
|
if (composite_nomem(creq, c)) return;
|
|
|
|
composite_continue(c, creq, continue_smb_connect, c);
|
|
return;
|
|
}
|
|
|
|
|
|
/*
|
|
Receive result of a rpc connection to a rpc pipe on SMB
|
|
*/
|
|
static NTSTATUS dcerpc_pipe_connect_ncacn_np_smb_recv(struct composite_context *c)
|
|
{
|
|
NTSTATUS status = composite_wait(c);
|
|
|
|
talloc_free(c);
|
|
return status;
|
|
}
|
|
|
|
/*
|
|
Stage 2 of ncacn_np_smb2: Open a named pipe after successful smb2 connection
|
|
*/
|
|
static void continue_smb2_connect(struct tevent_req *subreq)
|
|
{
|
|
struct composite_context *c =
|
|
tevent_req_callback_data(subreq,
|
|
struct composite_context);
|
|
struct pipe_np_smb_state *s = talloc_get_type(c->private_data,
|
|
struct pipe_np_smb_state);
|
|
struct smb2_tree *t;
|
|
|
|
/* receive result of smb2 connect request */
|
|
c->status = smb2_connect_recv(subreq, s->io.conn, &t);
|
|
TALLOC_FREE(subreq);
|
|
if (!composite_is_ok(c)) return;
|
|
|
|
s->io.smb.conn = t->session->transport->conn;
|
|
s->io.smb.session = t->session->smbXcli;
|
|
s->io.smb.tcon = t->smbXcli;
|
|
s->io.smb.pipe_name = dcerpc_binding_get_string_option(s->io.binding,
|
|
"endpoint");
|
|
|
|
continue_smb_open(c);
|
|
}
|
|
|
|
|
|
struct pipe_ip_tcp_state {
|
|
struct dcerpc_pipe_connect io;
|
|
const char *localaddr;
|
|
const char *host;
|
|
const char *target_hostname;
|
|
uint32_t port;
|
|
};
|
|
|
|
|
|
/*
|
|
Stage 2 of ncacn_ip_tcp: rpc pipe opened (or not)
|
|
*/
|
|
static void continue_pipe_open_ncacn_ip_tcp(struct composite_context *ctx)
|
|
{
|
|
struct composite_context *c = talloc_get_type(ctx->async.private_data,
|
|
struct composite_context);
|
|
struct pipe_ip_tcp_state *s = talloc_get_type(c->private_data,
|
|
struct pipe_ip_tcp_state);
|
|
char *localaddr = NULL;
|
|
char *remoteaddr = NULL;
|
|
|
|
/* receive result of named pipe open request on tcp/ip */
|
|
c->status = dcerpc_pipe_open_tcp_recv(ctx, s, &localaddr, &remoteaddr);
|
|
if (!composite_is_ok(c)) return;
|
|
|
|
c->status = dcerpc_binding_set_string_option(s->io.binding,
|
|
"localaddress",
|
|
localaddr);
|
|
if (!composite_is_ok(c)) return;
|
|
|
|
c->status = dcerpc_binding_set_string_option(s->io.binding,
|
|
"host",
|
|
remoteaddr);
|
|
if (!composite_is_ok(c)) return;
|
|
|
|
composite_done(c);
|
|
}
|
|
|
|
|
|
/*
|
|
Initiate async open of a rpc connection to a rpc pipe on TCP/IP using
|
|
the binding structure to determine the endpoint and options
|
|
*/
|
|
static struct composite_context* dcerpc_pipe_connect_ncacn_ip_tcp_send(TALLOC_CTX *mem_ctx,
|
|
struct dcerpc_pipe_connect *io)
|
|
{
|
|
struct composite_context *c;
|
|
struct pipe_ip_tcp_state *s;
|
|
struct composite_context *pipe_req;
|
|
const char *endpoint;
|
|
|
|
/* composite context allocation and setup */
|
|
c = composite_create(mem_ctx, io->conn->event_ctx);
|
|
if (c == NULL) return NULL;
|
|
|
|
s = talloc_zero(c, struct pipe_ip_tcp_state);
|
|
if (composite_nomem(s, c)) return c;
|
|
c->private_data = s;
|
|
|
|
/* store input parameters in state structure */
|
|
s->io = *io;
|
|
s->localaddr = dcerpc_binding_get_string_option(io->binding,
|
|
"localaddress");
|
|
s->host = dcerpc_binding_get_string_option(io->binding, "host");
|
|
s->target_hostname = dcerpc_binding_get_string_option(io->binding,
|
|
"target_hostname");
|
|
endpoint = dcerpc_binding_get_string_option(io->binding, "endpoint");
|
|
/* port number is a binding endpoint here */
|
|
if (endpoint != NULL) {
|
|
s->port = atoi(endpoint);
|
|
}
|
|
|
|
if (s->port == 0) {
|
|
composite_error(c, NT_STATUS_INVALID_PARAMETER_MIX);
|
|
return c;
|
|
}
|
|
|
|
/* send pipe open request on tcp/ip */
|
|
pipe_req = dcerpc_pipe_open_tcp_send(s->io.conn, s->localaddr, s->host, s->target_hostname,
|
|
s->port, io->resolve_ctx);
|
|
composite_continue(c, pipe_req, continue_pipe_open_ncacn_ip_tcp, c);
|
|
return c;
|
|
}
|
|
|
|
|
|
/*
|
|
Receive result of a rpc connection to a rpc pipe on TCP/IP
|
|
*/
|
|
static NTSTATUS dcerpc_pipe_connect_ncacn_ip_tcp_recv(struct composite_context *c)
|
|
{
|
|
NTSTATUS status = composite_wait(c);
|
|
|
|
talloc_free(c);
|
|
return status;
|
|
}
|
|
|
|
|
|
struct pipe_http_state {
|
|
struct dcerpc_pipe_connect io;
|
|
const char *localaddr;
|
|
const char *target_hostname;
|
|
const char *rpc_server;
|
|
uint32_t rpc_server_port;
|
|
char *rpc_proxy;
|
|
uint32_t rpc_proxy_port;
|
|
char *http_proxy;
|
|
uint32_t http_proxy_port;
|
|
bool use_tls;
|
|
bool use_proxy;
|
|
enum http_auth_method http_auth;
|
|
struct loadparm_context *lp_ctx;
|
|
};
|
|
|
|
/*
|
|
Stage 2 of ncacn_http: rpc pipe opened (or not)
|
|
*/
|
|
static void continue_pipe_open_ncacn_http(struct tevent_req *subreq)
|
|
{
|
|
struct composite_context *c = NULL;
|
|
struct pipe_http_state *s = NULL;
|
|
struct tstream_context *stream = NULL;
|
|
struct tevent_queue *queue = NULL;
|
|
|
|
c = tevent_req_callback_data(subreq, struct composite_context);
|
|
s = talloc_get_type(c->private_data, struct pipe_http_state);
|
|
|
|
/* receive result of RoH connect request */
|
|
c->status = dcerpc_pipe_open_roh_recv(subreq, s->io.conn,
|
|
&stream, &queue);
|
|
TALLOC_FREE(subreq);
|
|
if (!composite_is_ok(c)) return;
|
|
|
|
s->io.conn->transport.transport = NCACN_HTTP;
|
|
s->io.conn->transport.stream = stream;
|
|
s->io.conn->transport.write_queue = queue;
|
|
s->io.conn->transport.pending_reads = 0;
|
|
s->io.conn->server_name = strupper_talloc(s->io.conn,
|
|
s->target_hostname);
|
|
|
|
composite_done(c);
|
|
}
|
|
|
|
/*
|
|
Initiate async open of a rpc connection to a rpc pipe using HTTP transport,
|
|
and using the binding structure to determine the endpoint and options
|
|
*/
|
|
static struct composite_context* dcerpc_pipe_connect_ncacn_http_send(
|
|
TALLOC_CTX *mem_ctx, struct dcerpc_pipe_connect *io,
|
|
struct loadparm_context *lp_ctx)
|
|
{
|
|
struct composite_context *c;
|
|
struct pipe_http_state *s;
|
|
struct tevent_req *subreq;
|
|
const char *endpoint;
|
|
const char *use_proxy;
|
|
char *proxy;
|
|
char *port;
|
|
const char *opt;
|
|
|
|
/* composite context allocation and setup */
|
|
c = composite_create(mem_ctx, io->conn->event_ctx);
|
|
if (c == NULL) return NULL;
|
|
|
|
s = talloc_zero(c, struct pipe_http_state);
|
|
if (composite_nomem(s, c)) return c;
|
|
c->private_data = s;
|
|
|
|
/* store input parameters in state structure */
|
|
s->lp_ctx = lp_ctx;
|
|
s->io = *io;
|
|
s->localaddr = dcerpc_binding_get_string_option(io->binding,
|
|
"localaddress");
|
|
/* RPC server and port (the endpoint) */
|
|
s->rpc_server = dcerpc_binding_get_string_option(io->binding, "host");
|
|
s->target_hostname = dcerpc_binding_get_string_option(io->binding,
|
|
"target_hostname");
|
|
endpoint = dcerpc_binding_get_string_option(io->binding, "endpoint");
|
|
if (endpoint == NULL) {
|
|
composite_error(c, NT_STATUS_INVALID_PARAMETER_MIX);
|
|
return c;
|
|
}
|
|
s->rpc_server_port = atoi(endpoint);
|
|
if (s->rpc_server_port == 0) {
|
|
composite_error(c, NT_STATUS_INVALID_PARAMETER_MIX);
|
|
return c;
|
|
}
|
|
|
|
/* Use TLS */
|
|
opt = dcerpc_binding_get_string_option(io->binding, "HttpUseTls");
|
|
if (opt) {
|
|
if (strcasecmp(opt, "true") == 0) {
|
|
s->use_tls = true;
|
|
} else if (strcasecmp(opt, "false") == 0) {
|
|
s->use_tls = false;
|
|
} else {
|
|
composite_error(c, NT_STATUS_INVALID_PARAMETER_MIX);
|
|
return c;
|
|
}
|
|
} else {
|
|
s->use_tls = true;
|
|
}
|
|
|
|
/* RPC Proxy */
|
|
proxy = port = talloc_strdup(s, dcerpc_binding_get_string_option(
|
|
io->binding, "RpcProxy"));
|
|
s->rpc_proxy = strsep(&port, ":");
|
|
if (proxy && port) {
|
|
s->rpc_proxy_port = atoi(port);
|
|
} else {
|
|
s->rpc_proxy_port = s->use_tls ? 443 : 80;
|
|
}
|
|
if (s->rpc_proxy == NULL) {
|
|
s->rpc_proxy = talloc_strdup(s, s->rpc_server);
|
|
if (composite_nomem(s->rpc_proxy, c)) return c;
|
|
}
|
|
|
|
/* HTTP Proxy */
|
|
proxy = port = talloc_strdup(s, dcerpc_binding_get_string_option(
|
|
io->binding, "HttpProxy"));
|
|
s->http_proxy = strsep(&port, ":");
|
|
if (proxy && port) {
|
|
s->http_proxy_port = atoi(port);
|
|
} else {
|
|
s->http_proxy_port = s->use_tls ? 443 : 80;
|
|
}
|
|
|
|
/* Use local proxy */
|
|
use_proxy = dcerpc_binding_get_string_option(io->binding,
|
|
"HttpConnectOption");
|
|
if (use_proxy && strcasecmp(use_proxy, "UseHttpProxy")) {
|
|
s->use_proxy = true;
|
|
}
|
|
|
|
/* If use local proxy set, the http proxy should be provided */
|
|
if (s->use_proxy && !s->http_proxy) {
|
|
composite_error(c, NT_STATUS_INVALID_PARAMETER_MIX);
|
|
return c;
|
|
}
|
|
|
|
/* Check which HTTP authentication method to use */
|
|
opt = dcerpc_binding_get_string_option(io->binding, "HttpAuthOption");
|
|
if (opt) {
|
|
if (strcasecmp(opt, "basic") == 0) {
|
|
s->http_auth = HTTP_AUTH_BASIC;
|
|
} else if (strcasecmp(opt, "ntlm") == 0) {
|
|
s->http_auth = HTTP_AUTH_NTLM;
|
|
} else if (strcasecmp(opt, "negotiate") == 0) {
|
|
s->http_auth = HTTP_AUTH_NEGOTIATE;
|
|
} else {
|
|
composite_error(c, NT_STATUS_INVALID_PARAMETER_MIX);
|
|
return c;
|
|
}
|
|
} else {
|
|
s->http_auth = HTTP_AUTH_NTLM;
|
|
}
|
|
|
|
subreq = dcerpc_pipe_open_roh_send(s->io.conn, s->localaddr,
|
|
s->rpc_server, s->rpc_server_port,
|
|
s->rpc_proxy, s->rpc_proxy_port,
|
|
s->http_proxy, s->http_proxy_port,
|
|
s->use_tls, s->use_proxy,
|
|
s->io.creds, io->resolve_ctx,
|
|
s->lp_ctx, s->http_auth);
|
|
if (composite_nomem(subreq, c)) return c;
|
|
|
|
tevent_req_set_callback(subreq, continue_pipe_open_ncacn_http, c);
|
|
return c;
|
|
}
|
|
|
|
static NTSTATUS dcerpc_pipe_connect_ncacn_http_recv(struct composite_context *c)
|
|
{
|
|
return composite_wait_free(c);
|
|
}
|
|
|
|
|
|
struct pipe_unix_state {
|
|
struct dcerpc_pipe_connect io;
|
|
const char *path;
|
|
};
|
|
|
|
|
|
/*
|
|
Stage 2 of ncacn_unix: rpc pipe opened (or not)
|
|
*/
|
|
static void continue_pipe_open_ncacn_unix_stream(struct composite_context *ctx)
|
|
{
|
|
struct composite_context *c = talloc_get_type(ctx->async.private_data,
|
|
struct composite_context);
|
|
|
|
/* receive result of pipe open request on unix socket */
|
|
c->status = dcerpc_pipe_open_unix_stream_recv(ctx);
|
|
if (!composite_is_ok(c)) return;
|
|
|
|
composite_done(c);
|
|
}
|
|
|
|
|
|
/*
|
|
Initiate async open of a rpc connection to a rpc pipe on unix socket using
|
|
the binding structure to determine the endpoint and options
|
|
*/
|
|
static struct composite_context* dcerpc_pipe_connect_ncacn_unix_stream_send(TALLOC_CTX *mem_ctx,
|
|
struct dcerpc_pipe_connect *io)
|
|
{
|
|
struct composite_context *c;
|
|
struct pipe_unix_state *s;
|
|
struct composite_context *pipe_req;
|
|
|
|
/* composite context allocation and setup */
|
|
c = composite_create(mem_ctx, io->conn->event_ctx);
|
|
if (c == NULL) return NULL;
|
|
|
|
s = talloc_zero(c, struct pipe_unix_state);
|
|
if (composite_nomem(s, c)) return c;
|
|
c->private_data = s;
|
|
|
|
/* prepare pipe open parameters and store them in state structure
|
|
also, verify whether biding endpoint is not null */
|
|
s->io = *io;
|
|
|
|
s->path = dcerpc_binding_get_string_option(io->binding, "endpoint");
|
|
if (s->path == NULL) {
|
|
composite_error(c, NT_STATUS_INVALID_PARAMETER_MIX);
|
|
return c;
|
|
}
|
|
|
|
/* send pipe open request on unix socket */
|
|
pipe_req = dcerpc_pipe_open_unix_stream_send(s->io.conn, s->path);
|
|
composite_continue(c, pipe_req, continue_pipe_open_ncacn_unix_stream, c);
|
|
return c;
|
|
}
|
|
|
|
|
|
/*
|
|
Receive result of a rpc connection to a pipe on unix socket
|
|
*/
|
|
static NTSTATUS dcerpc_pipe_connect_ncacn_unix_stream_recv(struct composite_context *c)
|
|
{
|
|
NTSTATUS status = composite_wait(c);
|
|
|
|
talloc_free(c);
|
|
return status;
|
|
}
|
|
|
|
|
|
struct pipe_ncalrpc_state {
|
|
struct dcerpc_pipe_connect io;
|
|
};
|
|
|
|
static NTSTATUS dcerpc_pipe_connect_ncalrpc_recv(struct composite_context *c);
|
|
|
|
/*
|
|
Stage 2 of ncalrpc: rpc pipe opened (or not)
|
|
*/
|
|
static void continue_pipe_open_ncalrpc(struct composite_context *ctx)
|
|
{
|
|
struct composite_context *c = talloc_get_type(ctx->async.private_data,
|
|
struct composite_context);
|
|
|
|
/* receive result of pipe open request on ncalrpc */
|
|
c->status = dcerpc_pipe_connect_ncalrpc_recv(ctx);
|
|
if (!composite_is_ok(c)) return;
|
|
|
|
composite_done(c);
|
|
}
|
|
|
|
|
|
/*
|
|
Initiate async open of a rpc connection request on NCALRPC using
|
|
the binding structure to determine the endpoint and options
|
|
*/
|
|
static struct composite_context* dcerpc_pipe_connect_ncalrpc_send(TALLOC_CTX *mem_ctx,
|
|
struct dcerpc_pipe_connect *io)
|
|
{
|
|
struct composite_context *c;
|
|
struct pipe_ncalrpc_state *s;
|
|
struct composite_context *pipe_req;
|
|
const char *endpoint;
|
|
|
|
/* composite context allocation and setup */
|
|
c = composite_create(mem_ctx, io->conn->event_ctx);
|
|
if (c == NULL) return NULL;
|
|
|
|
s = talloc_zero(c, struct pipe_ncalrpc_state);
|
|
if (composite_nomem(s, c)) return c;
|
|
c->private_data = s;
|
|
|
|
/* store input parameters in state structure */
|
|
s->io = *io;
|
|
|
|
endpoint = dcerpc_binding_get_string_option(io->binding, "endpoint");
|
|
if (endpoint == NULL) {
|
|
composite_error(c, NT_STATUS_INVALID_PARAMETER_MIX);
|
|
return c;
|
|
}
|
|
|
|
/* send pipe open request */
|
|
pipe_req = dcerpc_pipe_open_pipe_send(s->io.conn,
|
|
s->io.ncalrpc.dir,
|
|
endpoint);
|
|
composite_continue(c, pipe_req, continue_pipe_open_ncalrpc, c);
|
|
return c;
|
|
}
|
|
|
|
|
|
/*
|
|
Receive result of a rpc connection to a rpc pipe on NCALRPC
|
|
*/
|
|
static NTSTATUS dcerpc_pipe_connect_ncalrpc_recv(struct composite_context *c)
|
|
{
|
|
NTSTATUS status = composite_wait(c);
|
|
|
|
talloc_free(c);
|
|
return status;
|
|
}
|
|
|
|
|
|
struct pipe_connect_state {
|
|
struct dcerpc_pipe *pipe;
|
|
struct dcerpc_binding *binding;
|
|
const struct ndr_interface_table *table;
|
|
struct cli_credentials *credentials;
|
|
struct loadparm_context *lp_ctx;
|
|
};
|
|
|
|
|
|
static void continue_map_binding(struct composite_context *ctx);
|
|
static void continue_connect(struct composite_context *c, struct pipe_connect_state *s);
|
|
static void continue_pipe_connect_ncacn_np_smb(struct composite_context *ctx);
|
|
static void continue_pipe_connect_ncacn_ip_tcp(struct composite_context *ctx);
|
|
static void continue_pipe_connect_ncacn_http(struct composite_context *ctx);
|
|
static void continue_pipe_connect_ncacn_unix(struct composite_context *ctx);
|
|
static void continue_pipe_connect_ncalrpc(struct composite_context *ctx);
|
|
static void continue_pipe_connect(struct composite_context *c, struct pipe_connect_state *s);
|
|
static void continue_pipe_auth(struct composite_context *ctx);
|
|
|
|
|
|
/*
|
|
Stage 2 of pipe_connect_b: Receive result of endpoint mapping
|
|
*/
|
|
static void continue_map_binding(struct composite_context *ctx)
|
|
{
|
|
struct composite_context *c = talloc_get_type(ctx->async.private_data,
|
|
struct composite_context);
|
|
struct pipe_connect_state *s = talloc_get_type(c->private_data,
|
|
struct pipe_connect_state);
|
|
const char *endpoint;
|
|
|
|
c->status = dcerpc_epm_map_binding_recv(ctx);
|
|
if (!composite_is_ok(c)) return;
|
|
|
|
endpoint = dcerpc_binding_get_string_option(s->binding, "endpoint");
|
|
DEBUG(4,("Mapped to DCERPC endpoint %s\n", endpoint));
|
|
|
|
continue_connect(c, s);
|
|
}
|
|
|
|
|
|
/*
|
|
Stage 2 of pipe_connect_b: Continue connection after endpoint is known
|
|
*/
|
|
static void continue_connect(struct composite_context *c, struct pipe_connect_state *s)
|
|
{
|
|
struct dcerpc_pipe_connect pc;
|
|
|
|
/* potential exits to another stage by sending an async request */
|
|
struct composite_context *ncacn_np_smb_req;
|
|
struct composite_context *ncacn_ip_tcp_req;
|
|
struct composite_context *ncacn_http_req;
|
|
struct composite_context *ncacn_unix_req;
|
|
struct composite_context *ncalrpc_req;
|
|
enum dcerpc_transport_t transport;
|
|
|
|
/* dcerpc pipe connect input parameters */
|
|
ZERO_STRUCT(pc);
|
|
pc.conn = s->pipe->conn;
|
|
pc.binding = s->binding;
|
|
pc.interface = s->table;
|
|
pc.creds = s->credentials;
|
|
pc.resolve_ctx = lpcfg_resolve_context(s->lp_ctx);
|
|
|
|
transport = dcerpc_binding_get_transport(s->binding);
|
|
|
|
/* connect dcerpc pipe depending on required transport */
|
|
switch (transport) {
|
|
case NCACN_NP:
|
|
/*
|
|
* SMB1/2/3...
|
|
*/
|
|
ncacn_np_smb_req = dcerpc_pipe_connect_ncacn_np_smb_send(c, &pc, s->lp_ctx);
|
|
composite_continue(c, ncacn_np_smb_req, continue_pipe_connect_ncacn_np_smb, c);
|
|
return;
|
|
|
|
case NCACN_IP_TCP:
|
|
ncacn_ip_tcp_req = dcerpc_pipe_connect_ncacn_ip_tcp_send(c, &pc);
|
|
composite_continue(c, ncacn_ip_tcp_req, continue_pipe_connect_ncacn_ip_tcp, c);
|
|
return;
|
|
|
|
case NCACN_HTTP:
|
|
ncacn_http_req = dcerpc_pipe_connect_ncacn_http_send(c, &pc, s->lp_ctx);
|
|
composite_continue(c, ncacn_http_req, continue_pipe_connect_ncacn_http, c);
|
|
return;
|
|
|
|
case NCACN_UNIX_STREAM:
|
|
ncacn_unix_req = dcerpc_pipe_connect_ncacn_unix_stream_send(c, &pc);
|
|
composite_continue(c, ncacn_unix_req, continue_pipe_connect_ncacn_unix, c);
|
|
return;
|
|
|
|
case NCALRPC:
|
|
pc.ncalrpc.dir = lpcfg_ncalrpc_dir(s->lp_ctx);
|
|
c->status = dcerpc_binding_set_string_option(s->binding, "ncalrpc_dir",
|
|
pc.ncalrpc.dir);
|
|
if (!composite_is_ok(c)) return;
|
|
ncalrpc_req = dcerpc_pipe_connect_ncalrpc_send(c, &pc);
|
|
composite_continue(c, ncalrpc_req, continue_pipe_connect_ncalrpc, c);
|
|
return;
|
|
|
|
default:
|
|
/* looks like a transport we don't support now */
|
|
composite_error(c, NT_STATUS_NOT_SUPPORTED);
|
|
}
|
|
}
|
|
|
|
|
|
/*
|
|
Stage 3 of pipe_connect_b: Receive result of pipe connect request on
|
|
named pipe on smb
|
|
*/
|
|
static void continue_pipe_connect_ncacn_np_smb(struct composite_context *ctx)
|
|
{
|
|
struct composite_context *c = talloc_get_type(ctx->async.private_data,
|
|
struct composite_context);
|
|
struct pipe_connect_state *s = talloc_get_type(c->private_data,
|
|
struct pipe_connect_state);
|
|
|
|
c->status = dcerpc_pipe_connect_ncacn_np_smb_recv(ctx);
|
|
if (!composite_is_ok(c)) return;
|
|
|
|
continue_pipe_connect(c, s);
|
|
}
|
|
|
|
|
|
/*
|
|
Stage 3 of pipe_connect_b: Receive result of pipe connect request on tcp/ip
|
|
*/
|
|
static void continue_pipe_connect_ncacn_ip_tcp(struct composite_context *ctx)
|
|
{
|
|
struct composite_context *c = talloc_get_type(ctx->async.private_data,
|
|
struct composite_context);
|
|
struct pipe_connect_state *s = talloc_get_type(c->private_data,
|
|
struct pipe_connect_state);
|
|
|
|
c->status = dcerpc_pipe_connect_ncacn_ip_tcp_recv(ctx);
|
|
if (!composite_is_ok(c)) return;
|
|
|
|
continue_pipe_connect(c, s);
|
|
}
|
|
|
|
|
|
/*
|
|
Stage 3 of pipe_connect_b: Receive result of pipe connect request on http
|
|
*/
|
|
static void continue_pipe_connect_ncacn_http(struct composite_context *ctx)
|
|
{
|
|
struct composite_context *c = talloc_get_type(ctx->async.private_data,
|
|
struct composite_context);
|
|
struct pipe_connect_state *s = talloc_get_type(c->private_data,
|
|
struct pipe_connect_state);
|
|
|
|
c->status = dcerpc_pipe_connect_ncacn_http_recv(ctx);
|
|
if (!composite_is_ok(c)) return;
|
|
|
|
continue_pipe_connect(c, s);
|
|
}
|
|
|
|
|
|
/*
|
|
Stage 3 of pipe_connect_b: Receive result of pipe connect request on unix socket
|
|
*/
|
|
static void continue_pipe_connect_ncacn_unix(struct composite_context *ctx)
|
|
{
|
|
struct composite_context *c = talloc_get_type(ctx->async.private_data,
|
|
struct composite_context);
|
|
struct pipe_connect_state *s = talloc_get_type(c->private_data,
|
|
struct pipe_connect_state);
|
|
|
|
c->status = dcerpc_pipe_connect_ncacn_unix_stream_recv(ctx);
|
|
if (!composite_is_ok(c)) return;
|
|
|
|
continue_pipe_connect(c, s);
|
|
}
|
|
|
|
|
|
/*
|
|
Stage 3 of pipe_connect_b: Receive result of pipe connect request on local rpc
|
|
*/
|
|
static void continue_pipe_connect_ncalrpc(struct composite_context *ctx)
|
|
{
|
|
struct composite_context *c = talloc_get_type(ctx->async.private_data,
|
|
struct composite_context);
|
|
struct pipe_connect_state *s = talloc_get_type(c->private_data,
|
|
struct pipe_connect_state);
|
|
|
|
c->status = dcerpc_pipe_connect_ncalrpc_recv(ctx);
|
|
if (!composite_is_ok(c)) return;
|
|
|
|
continue_pipe_connect(c, s);
|
|
}
|
|
|
|
|
|
/*
|
|
Stage 4 of pipe_connect_b: Start an authentication on connected dcerpc pipe
|
|
depending on credentials and binding flags passed.
|
|
*/
|
|
static void continue_pipe_connect(struct composite_context *c, struct pipe_connect_state *s)
|
|
{
|
|
struct composite_context *auth_bind_req;
|
|
|
|
s->pipe->binding = dcerpc_binding_dup(s->pipe, s->binding);
|
|
if (composite_nomem(s->pipe->binding, c)) {
|
|
return;
|
|
}
|
|
|
|
auth_bind_req = dcerpc_pipe_auth_send(s->pipe, s->binding, s->table,
|
|
s->credentials, s->lp_ctx);
|
|
composite_continue(c, auth_bind_req, continue_pipe_auth, c);
|
|
}
|
|
|
|
|
|
/*
|
|
Stage 5 of pipe_connect_b: Receive result of pipe authentication request
|
|
and say if all went ok
|
|
*/
|
|
static void continue_pipe_auth(struct composite_context *ctx)
|
|
{
|
|
struct composite_context *c = talloc_get_type(ctx->async.private_data,
|
|
struct composite_context);
|
|
struct pipe_connect_state *s = talloc_get_type(c->private_data, struct pipe_connect_state);
|
|
|
|
c->status = dcerpc_pipe_auth_recv(ctx, s, &s->pipe);
|
|
if (!composite_is_ok(c)) return;
|
|
|
|
composite_done(c);
|
|
}
|
|
|
|
|
|
/*
|
|
handle timeouts of a dcerpc connect
|
|
*/
|
|
static void dcerpc_connect_timeout_handler(struct tevent_context *ev, struct tevent_timer *te,
|
|
struct timeval t, void *private_data)
|
|
{
|
|
struct composite_context *c = talloc_get_type_abort(private_data,
|
|
struct composite_context);
|
|
struct pipe_connect_state *s = talloc_get_type_abort(c->private_data, struct pipe_connect_state);
|
|
if (!s->pipe->inhibit_timeout_processing) {
|
|
composite_error(c, NT_STATUS_IO_TIMEOUT);
|
|
} else {
|
|
s->pipe->timed_out = true;
|
|
}
|
|
}
|
|
|
|
/*
|
|
start a request to open a rpc connection to a rpc pipe, using
|
|
specified binding structure to determine the endpoint and options
|
|
*/
|
|
_PUBLIC_ struct composite_context* dcerpc_pipe_connect_b_send(TALLOC_CTX *parent_ctx,
|
|
const struct dcerpc_binding *binding,
|
|
const struct ndr_interface_table *table,
|
|
struct cli_credentials *credentials,
|
|
struct tevent_context *ev,
|
|
struct loadparm_context *lp_ctx)
|
|
{
|
|
struct composite_context *c;
|
|
struct pipe_connect_state *s;
|
|
enum dcerpc_transport_t transport;
|
|
const char *endpoint = NULL;
|
|
struct cli_credentials *epm_creds = NULL;
|
|
|
|
/* composite context allocation and setup */
|
|
c = composite_create(parent_ctx, ev);
|
|
if (c == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
s = talloc_zero(c, struct pipe_connect_state);
|
|
if (composite_nomem(s, c)) return c;
|
|
c->private_data = s;
|
|
|
|
/* initialise dcerpc pipe structure */
|
|
s->pipe = dcerpc_pipe_init(c, ev);
|
|
if (composite_nomem(s->pipe, c)) return c;
|
|
|
|
if (DEBUGLEVEL >= 10) {
|
|
s->pipe->conn->packet_log_dir = lpcfg_lock_directory(lp_ctx);
|
|
}
|
|
|
|
/* store parameters in state structure */
|
|
s->binding = dcerpc_binding_dup(s, binding);
|
|
if (composite_nomem(s->binding, c)) return c;
|
|
s->table = table;
|
|
s->credentials = credentials;
|
|
s->lp_ctx = lp_ctx;
|
|
|
|
s->pipe->timed_out = false;
|
|
s->pipe->inhibit_timeout_processing = false;
|
|
|
|
tevent_add_timer(c->event_ctx, c,
|
|
timeval_current_ofs(DCERPC_REQUEST_TIMEOUT, 0),
|
|
dcerpc_connect_timeout_handler, c);
|
|
|
|
transport = dcerpc_binding_get_transport(s->binding);
|
|
|
|
switch (transport) {
|
|
case NCACN_NP:
|
|
case NCACN_IP_TCP:
|
|
case NCALRPC:
|
|
endpoint = dcerpc_binding_get_string_option(s->binding, "endpoint");
|
|
|
|
/* anonymous credentials for rpc connection used to get endpoint mapping */
|
|
epm_creds = cli_credentials_init_anon(s);
|
|
if (composite_nomem(epm_creds, c)) return c;
|
|
|
|
break;
|
|
case NCACN_HTTP:
|
|
endpoint = dcerpc_binding_get_string_option(s->binding, "endpoint");
|
|
epm_creds = credentials;
|
|
break;
|
|
default:
|
|
DBG_INFO("Unknown transport; continuing with anon, no endpoint.\n");
|
|
epm_creds = cli_credentials_init_anon(s);
|
|
if (composite_nomem(epm_creds, c)){
|
|
return c;
|
|
}
|
|
break;
|
|
}
|
|
|
|
if (endpoint == NULL) {
|
|
struct composite_context *binding_req;
|
|
|
|
binding_req = dcerpc_epm_map_binding_send(c, s->binding, s->table,
|
|
epm_creds,
|
|
s->pipe->conn->event_ctx,
|
|
s->lp_ctx);
|
|
composite_continue(c, binding_req, continue_map_binding, c);
|
|
return c;
|
|
}
|
|
|
|
continue_connect(c, s);
|
|
return c;
|
|
}
|
|
|
|
|
|
/*
|
|
receive result of a request to open a rpc connection to a rpc pipe
|
|
*/
|
|
_PUBLIC_ NTSTATUS dcerpc_pipe_connect_b_recv(struct composite_context *c, TALLOC_CTX *mem_ctx,
|
|
struct dcerpc_pipe **p)
|
|
{
|
|
NTSTATUS status;
|
|
struct pipe_connect_state *s;
|
|
|
|
status = composite_wait(c);
|
|
|
|
if (NT_STATUS_IS_OK(status)) {
|
|
s = talloc_get_type(c->private_data, struct pipe_connect_state);
|
|
talloc_steal(mem_ctx, s->pipe);
|
|
*p = s->pipe;
|
|
}
|
|
talloc_free(c);
|
|
return status;
|
|
}
|
|
|
|
|
|
/*
|
|
open a rpc connection to a rpc pipe, using the specified
|
|
binding structure to determine the endpoint and options - sync version
|
|
*/
|
|
_PUBLIC_ NTSTATUS dcerpc_pipe_connect_b(TALLOC_CTX *parent_ctx,
|
|
struct dcerpc_pipe **pp,
|
|
const struct dcerpc_binding *binding,
|
|
const struct ndr_interface_table *table,
|
|
struct cli_credentials *credentials,
|
|
struct tevent_context *ev,
|
|
struct loadparm_context *lp_ctx)
|
|
{
|
|
struct composite_context *c;
|
|
|
|
c = dcerpc_pipe_connect_b_send(parent_ctx, binding, table,
|
|
credentials, ev, lp_ctx);
|
|
return dcerpc_pipe_connect_b_recv(c, parent_ctx, pp);
|
|
}
|
|
|
|
|
|
struct pipe_conn_state {
|
|
struct dcerpc_pipe *pipe;
|
|
};
|
|
|
|
|
|
static void continue_pipe_connect_b(struct composite_context *ctx);
|
|
|
|
|
|
/*
|
|
Initiate rpc connection to a rpc pipe, using the specified string
|
|
binding to determine the endpoint and options.
|
|
The string is to be parsed to a binding structure first.
|
|
*/
|
|
_PUBLIC_ struct composite_context* dcerpc_pipe_connect_send(TALLOC_CTX *parent_ctx,
|
|
const char *binding,
|
|
const struct ndr_interface_table *table,
|
|
struct cli_credentials *credentials,
|
|
struct tevent_context *ev, struct loadparm_context *lp_ctx)
|
|
{
|
|
struct composite_context *c;
|
|
struct pipe_conn_state *s;
|
|
struct dcerpc_binding *b;
|
|
struct composite_context *pipe_conn_req;
|
|
|
|
/* composite context allocation and setup */
|
|
c = composite_create(parent_ctx, ev);
|
|
if (c == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
s = talloc_zero(c, struct pipe_conn_state);
|
|
if (composite_nomem(s, c)) return c;
|
|
c->private_data = s;
|
|
|
|
/* parse binding string to the structure */
|
|
c->status = dcerpc_parse_binding(c, binding, &b);
|
|
if (!NT_STATUS_IS_OK(c->status)) {
|
|
DEBUG(0, ("Failed to parse dcerpc binding '%s'\n", binding));
|
|
composite_error(c, c->status);
|
|
return c;
|
|
}
|
|
|
|
DEBUG(3, ("Using binding %s\n", dcerpc_binding_string(c, b)));
|
|
|
|
/*
|
|
start connecting to a rpc pipe after binding structure
|
|
is established
|
|
*/
|
|
pipe_conn_req = dcerpc_pipe_connect_b_send(c, b, table,
|
|
credentials, ev, lp_ctx);
|
|
composite_continue(c, pipe_conn_req, continue_pipe_connect_b, c);
|
|
return c;
|
|
}
|
|
|
|
|
|
/*
|
|
Stage 2 of pipe_connect: Receive result of actual pipe connect request
|
|
and say if we're done ok
|
|
*/
|
|
static void continue_pipe_connect_b(struct composite_context *ctx)
|
|
{
|
|
struct composite_context *c = talloc_get_type(ctx->async.private_data,
|
|
struct composite_context);
|
|
struct pipe_conn_state *s = talloc_get_type(c->private_data,
|
|
struct pipe_conn_state);
|
|
|
|
c->status = dcerpc_pipe_connect_b_recv(ctx, c, &s->pipe);
|
|
talloc_steal(s, s->pipe);
|
|
if (!composite_is_ok(c)) return;
|
|
|
|
composite_done(c);
|
|
}
|
|
|
|
|
|
/*
|
|
Receive result of pipe connect (using binding string) request
|
|
and return connected pipe structure.
|
|
*/
|
|
NTSTATUS dcerpc_pipe_connect_recv(struct composite_context *c,
|
|
TALLOC_CTX *mem_ctx,
|
|
struct dcerpc_pipe **pp)
|
|
{
|
|
NTSTATUS status;
|
|
struct pipe_conn_state *s;
|
|
|
|
status = composite_wait(c);
|
|
if (NT_STATUS_IS_OK(status)) {
|
|
s = talloc_get_type(c->private_data, struct pipe_conn_state);
|
|
*pp = talloc_steal(mem_ctx, s->pipe);
|
|
}
|
|
talloc_free(c);
|
|
return status;
|
|
}
|
|
|
|
|
|
/*
|
|
Open a rpc connection to a rpc pipe, using the specified string
|
|
binding to determine the endpoint and options - sync version
|
|
*/
|
|
_PUBLIC_ NTSTATUS dcerpc_pipe_connect(TALLOC_CTX *parent_ctx,
|
|
struct dcerpc_pipe **pp,
|
|
const char *binding,
|
|
const struct ndr_interface_table *table,
|
|
struct cli_credentials *credentials,
|
|
struct tevent_context *ev,
|
|
struct loadparm_context *lp_ctx)
|
|
{
|
|
struct composite_context *c;
|
|
c = dcerpc_pipe_connect_send(parent_ctx, binding,
|
|
table, credentials, ev, lp_ctx);
|
|
return dcerpc_pipe_connect_recv(c, parent_ctx, pp);
|
|
}
|
|
|