mirror of
https://github.com/samba-team/samba.git
synced 2024-12-23 17:34:34 +03:00
c290ece1f6
Signed-off-by: Stefan Metzmacher <metze@samba.org> Reviewed-by: Jeremy Allison <jra@samba.org>
351 lines
8.9 KiB
C
351 lines
8.9 KiB
C
/*
|
|
Unix SMB/CIFS implementation.
|
|
smb2 lib
|
|
Copyright (C) Volker Lendecke 2011
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
#include "system/network.h"
|
|
#include "../lib/util/tevent_ntstatus.h"
|
|
#include "../libcli/smb/smb_common.h"
|
|
#include "../libcli/smb/smbXcli_base.h"
|
|
|
|
struct smb2cli_session_setup_state {
|
|
struct smbXcli_session *session;
|
|
uint8_t fixed[24];
|
|
uint8_t dyn_pad[1];
|
|
struct iovec *recv_iov;
|
|
DATA_BLOB out_security_buffer;
|
|
NTSTATUS status;
|
|
};
|
|
|
|
static void smb2cli_session_setup_done(struct tevent_req *subreq);
|
|
|
|
struct tevent_req *smb2cli_session_setup_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct smbXcli_conn *conn,
|
|
uint32_t timeout_msec,
|
|
struct smbXcli_session *session,
|
|
uint8_t in_flags,
|
|
uint32_t in_capabilities,
|
|
uint32_t in_channel,
|
|
uint64_t in_previous_session_id,
|
|
const DATA_BLOB *in_security_buffer)
|
|
{
|
|
struct tevent_req *req, *subreq;
|
|
struct smb2cli_session_setup_state *state;
|
|
uint8_t *buf;
|
|
uint8_t *dyn;
|
|
size_t dyn_len;
|
|
uint8_t security_mode;
|
|
uint16_t security_buffer_offset = 0;
|
|
uint16_t security_buffer_length = 0;
|
|
|
|
req = tevent_req_create(mem_ctx, &state,
|
|
struct smb2cli_session_setup_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
if (session == NULL) {
|
|
tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER_MIX);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
state->session = session;
|
|
security_mode = smb2cli_session_security_mode(session);
|
|
|
|
if (in_security_buffer) {
|
|
if (in_security_buffer->length > UINT16_MAX) {
|
|
tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER_MIX);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
security_buffer_offset = SMB2_HDR_BODY + 24;
|
|
security_buffer_length = in_security_buffer->length;
|
|
}
|
|
|
|
buf = state->fixed;
|
|
|
|
SSVAL(buf, 0, 25);
|
|
SCVAL(buf, 2, in_flags);
|
|
SCVAL(buf, 3, security_mode);
|
|
SIVAL(buf, 4, in_capabilities);
|
|
SIVAL(buf, 8, in_channel);
|
|
SSVAL(buf, 12, security_buffer_offset);
|
|
SSVAL(buf, 14, security_buffer_length);
|
|
SBVAL(buf, 16, in_previous_session_id);
|
|
|
|
if (security_buffer_length > 0) {
|
|
dyn = in_security_buffer->data;
|
|
dyn_len = in_security_buffer->length;
|
|
} else {
|
|
dyn = state->dyn_pad;;
|
|
dyn_len = sizeof(state->dyn_pad);
|
|
}
|
|
|
|
subreq = smb2cli_req_send(state, ev,
|
|
conn, SMB2_OP_SESSSETUP,
|
|
0, 0, /* flags */
|
|
timeout_msec,
|
|
NULL, /* tcon */
|
|
session,
|
|
state->fixed, sizeof(state->fixed),
|
|
dyn, dyn_len,
|
|
UINT16_MAX); /* max_dyn_len */
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, smb2cli_session_setup_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void smb2cli_session_setup_done(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req =
|
|
tevent_req_callback_data(subreq,
|
|
struct tevent_req);
|
|
struct smb2cli_session_setup_state *state =
|
|
tevent_req_data(req,
|
|
struct smb2cli_session_setup_state);
|
|
NTSTATUS status;
|
|
NTSTATUS preauth_status;
|
|
uint64_t current_session_id;
|
|
uint64_t session_id;
|
|
uint16_t session_flags;
|
|
uint16_t expected_offset = 0;
|
|
uint16_t security_buffer_offset;
|
|
uint16_t security_buffer_length;
|
|
uint8_t *security_buffer_data = NULL;
|
|
struct iovec sent_iov[3];
|
|
const uint8_t *hdr;
|
|
const uint8_t *body;
|
|
static const struct smb2cli_req_expected_response expected[] = {
|
|
{
|
|
.status = NT_STATUS_MORE_PROCESSING_REQUIRED,
|
|
.body_size = 0x09
|
|
},
|
|
{
|
|
.status = NT_STATUS_OK,
|
|
.body_size = 0x09
|
|
}
|
|
};
|
|
|
|
status = smb2cli_req_recv(subreq, state, &state->recv_iov,
|
|
expected, ARRAY_SIZE(expected));
|
|
if (!NT_STATUS_IS_OK(status) &&
|
|
!NT_STATUS_EQUAL(status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
|
|
TALLOC_FREE(subreq);
|
|
tevent_req_nterror(req, status);
|
|
return;
|
|
}
|
|
|
|
smb2cli_req_get_sent_iov(subreq, sent_iov);
|
|
preauth_status = smb2cli_session_update_preauth(state->session, sent_iov);
|
|
TALLOC_FREE(subreq);
|
|
if (tevent_req_nterror(req, preauth_status)) {
|
|
return;
|
|
}
|
|
|
|
if (NT_STATUS_EQUAL(status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
|
|
preauth_status = smb2cli_session_update_preauth(state->session,
|
|
state->recv_iov);
|
|
if (tevent_req_nterror(req, preauth_status)) {
|
|
return;
|
|
}
|
|
}
|
|
|
|
hdr = (const uint8_t *)state->recv_iov[0].iov_base;
|
|
body = (const uint8_t *)state->recv_iov[1].iov_base;
|
|
|
|
session_id = BVAL(hdr, SMB2_HDR_SESSION_ID);
|
|
session_flags = SVAL(body, 2);
|
|
|
|
security_buffer_offset = SVAL(body, 4);
|
|
security_buffer_length = SVAL(body, 6);
|
|
|
|
if (security_buffer_length > 0) {
|
|
expected_offset = SMB2_HDR_BODY + 8;
|
|
}
|
|
if (security_buffer_offset != 0) {
|
|
security_buffer_data = (uint8_t *)state->recv_iov[2].iov_base;
|
|
expected_offset = SMB2_HDR_BODY + 8;
|
|
}
|
|
|
|
if (security_buffer_offset != expected_offset) {
|
|
tevent_req_nterror(req, NT_STATUS_INVALID_NETWORK_RESPONSE);
|
|
return;
|
|
}
|
|
if (security_buffer_length > state->recv_iov[2].iov_len) {
|
|
tevent_req_nterror(req, NT_STATUS_INVALID_NETWORK_RESPONSE);
|
|
return;
|
|
}
|
|
|
|
state->out_security_buffer.data = security_buffer_data;
|
|
state->out_security_buffer.length = security_buffer_length;
|
|
|
|
current_session_id = smb2cli_session_current_id(state->session);
|
|
if (current_session_id == 0) {
|
|
/* A new session was requested */
|
|
current_session_id = session_id;
|
|
}
|
|
|
|
if (current_session_id != session_id) {
|
|
tevent_req_nterror(req, NT_STATUS_INVALID_NETWORK_RESPONSE);
|
|
return;
|
|
}
|
|
|
|
smb2cli_session_set_id_and_flags(state->session,
|
|
session_id, session_flags);
|
|
|
|
state->status = status;
|
|
tevent_req_done(req);
|
|
}
|
|
|
|
NTSTATUS smb2cli_session_setup_recv(struct tevent_req *req,
|
|
TALLOC_CTX *mem_ctx,
|
|
struct iovec **recv_iov,
|
|
DATA_BLOB *out_security_buffer)
|
|
{
|
|
struct smb2cli_session_setup_state *state =
|
|
tevent_req_data(req,
|
|
struct smb2cli_session_setup_state);
|
|
NTSTATUS status;
|
|
struct iovec *_tmp;
|
|
|
|
if (tevent_req_is_nterror(req, &status)) {
|
|
tevent_req_received(req);
|
|
return status;
|
|
}
|
|
|
|
if (recv_iov == NULL) {
|
|
recv_iov = &_tmp;
|
|
}
|
|
|
|
*recv_iov = talloc_move(mem_ctx, &state->recv_iov);
|
|
|
|
*out_security_buffer = state->out_security_buffer;
|
|
|
|
/*
|
|
* Return the status from the server:
|
|
* NT_STATUS_MORE_PROCESSING_REQUIRED or
|
|
* NT_STATUS_OK.
|
|
*/
|
|
status = state->status;
|
|
tevent_req_received(req);
|
|
return status;
|
|
}
|
|
|
|
struct smb2cli_logoff_state {
|
|
uint8_t fixed[4];
|
|
};
|
|
|
|
static void smb2cli_logoff_done(struct tevent_req *subreq);
|
|
|
|
struct tevent_req *smb2cli_logoff_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct smbXcli_conn *conn,
|
|
uint32_t timeout_msec,
|
|
struct smbXcli_session *session)
|
|
{
|
|
struct tevent_req *req, *subreq;
|
|
struct smb2cli_logoff_state *state;
|
|
|
|
req = tevent_req_create(mem_ctx, &state,
|
|
struct smb2cli_logoff_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
SSVAL(state->fixed, 0, 4);
|
|
|
|
subreq = smb2cli_req_send(state, ev,
|
|
conn, SMB2_OP_LOGOFF,
|
|
0, 0, /* flags */
|
|
timeout_msec,
|
|
NULL, /* tcon */
|
|
session,
|
|
state->fixed, sizeof(state->fixed),
|
|
NULL, 0, /* dyn* */
|
|
0); /* max_dyn_len */
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, smb2cli_logoff_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void smb2cli_logoff_done(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req =
|
|
tevent_req_callback_data(subreq,
|
|
struct tevent_req);
|
|
struct smb2cli_logoff_state *state =
|
|
tevent_req_data(req,
|
|
struct smb2cli_logoff_state);
|
|
NTSTATUS status;
|
|
struct iovec *iov;
|
|
static const struct smb2cli_req_expected_response expected[] = {
|
|
{
|
|
.status = NT_STATUS_OK,
|
|
.body_size = 0x04
|
|
}
|
|
};
|
|
|
|
status = smb2cli_req_recv(subreq, state, &iov,
|
|
expected, ARRAY_SIZE(expected));
|
|
TALLOC_FREE(subreq);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return;
|
|
}
|
|
tevent_req_done(req);
|
|
}
|
|
|
|
NTSTATUS smb2cli_logoff_recv(struct tevent_req *req)
|
|
{
|
|
return tevent_req_simple_recv_ntstatus(req);
|
|
}
|
|
|
|
NTSTATUS smb2cli_logoff(struct smbXcli_conn *conn,
|
|
uint32_t timeout_msec,
|
|
struct smbXcli_session *session)
|
|
{
|
|
TALLOC_CTX *frame = talloc_stackframe();
|
|
struct tevent_context *ev;
|
|
struct tevent_req *req;
|
|
NTSTATUS status = NT_STATUS_NO_MEMORY;
|
|
|
|
if (smbXcli_conn_has_async_calls(conn)) {
|
|
/*
|
|
* Can't use sync call while an async call is in flight
|
|
*/
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
goto fail;
|
|
}
|
|
ev = samba_tevent_context_init(frame);
|
|
if (ev == NULL) {
|
|
goto fail;
|
|
}
|
|
req = smb2cli_logoff_send(frame, ev, conn, timeout_msec, session);
|
|
if (req == NULL) {
|
|
goto fail;
|
|
}
|
|
if (!tevent_req_poll_ntstatus(req, ev, &status)) {
|
|
goto fail;
|
|
}
|
|
status = smb2cli_logoff_recv(req);
|
|
fail:
|
|
TALLOC_FREE(frame);
|
|
return status;
|
|
}
|