mirror of
https://github.com/samba-team/samba.git
synced 2024-12-28 07:21:54 +03:00
fd46817f0b
srv_samr.c: duplicate gid fix.
srv_spoolss_nt.c: Merge of JF's work.
uid.c: Fix for returning names when a PDC.
Jeremy.
(This used to be commit d938ad6963
)
243 lines
6.3 KiB
C
243 lines
6.3 KiB
C
/*
|
|
Unix SMB/Netbios implementation.
|
|
Version 3.0
|
|
client dgram calls
|
|
Copyright (C) Andrew Tridgell 1994-1998
|
|
Copyright (C) Richard Sharpe 2001
|
|
Copyright (C) John Terpstra 2001
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 2 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program; if not, write to the Free Software
|
|
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
|
*/
|
|
|
|
#define NO_SYSLOG
|
|
|
|
#include "includes.h"
|
|
|
|
/*
|
|
* cli_send_mailslot, send a mailslot for client code ...
|
|
*/
|
|
|
|
static int dgram_sock = -1;
|
|
|
|
int cli_send_mailslot(BOOL unique, char *mailslot, char *buf, int len,
|
|
const char *srcname, int src_type,
|
|
const char *dstname, int dest_type,
|
|
struct in_addr dest_ip, struct in_addr src_ip,
|
|
int dest_port)
|
|
{
|
|
struct packet_struct p;
|
|
struct dgram_packet *dgram = &p.packet.dgram;
|
|
struct sockaddr_in sock_out;
|
|
char *ptr, *p2;
|
|
char tmp[4];
|
|
|
|
bzero((char *)&p, sizeof(p));
|
|
|
|
/*
|
|
* First, check if we have an open socket to the dest IP
|
|
*/
|
|
|
|
if (dgram_sock < 1) {
|
|
|
|
int name_size;
|
|
|
|
if ((dgram_sock = open_socket_out(SOCK_DGRAM, &dest_ip, 138, LONG_CONNECT_TIMEOUT)) < 0) {
|
|
|
|
DEBUG(4, ("open_sock_out failed ..."));
|
|
return False;
|
|
|
|
}
|
|
|
|
/* Make it a broadcast socket ... */
|
|
|
|
set_socket_options(dgram_sock, "SO_BROADCAST");
|
|
|
|
/* Now, bind my addr to it ... */
|
|
|
|
bzero((char *)&sock_out, sizeof(sock_out));
|
|
putip((char *)&sock_out.sin_addr, (char *)&src_ip);
|
|
sock_out.sin_port = INADDR_ANY;
|
|
sock_out.sin_family = AF_INET;
|
|
|
|
bind(dgram_sock, (struct sockaddr_in *)&sock_out, sizeof(sock_out));
|
|
|
|
/* Now, figure out what socket name we were bound to. We want the port */
|
|
|
|
name_size = sizeof(sock_out);
|
|
|
|
getsockname(dgram_sock, (struct sockaddr_in *)&sock_out, &name_size);
|
|
|
|
fprintf(stderr, "Socket bound to IP:%s, port: %d\n", inet_ntoa(sock_out.sin_addr), ntohs(sock_out.sin_port));
|
|
|
|
}
|
|
|
|
/*
|
|
* Next, build the DGRAM ...
|
|
*/
|
|
|
|
/* DIRECT GROUP or UNIQUE datagram. */
|
|
dgram->header.msg_type = unique ? 0x10 : 0x11;
|
|
dgram->header.flags.node_type = M_NODE;
|
|
dgram->header.flags.first = True;
|
|
dgram->header.flags.more = False;
|
|
dgram->header.dgm_id = ((unsigned)time(NULL)%(unsigned)0x7FFF) + ((unsigned)sys_getpid()%(unsigned)100);
|
|
dgram->header.source_ip = src_ip;
|
|
dgram->header.source_port = ntohs(sock_out.sin_port);
|
|
dgram->header.dgm_length = 0; /* Let build_dgram() handle this. */
|
|
dgram->header.packet_offset = 0;
|
|
|
|
make_nmb_name(&dgram->source_name,srcname,src_type);
|
|
make_nmb_name(&dgram->dest_name,dstname,dest_type);
|
|
|
|
ptr = &dgram->data[0];
|
|
|
|
/* Setup the smb part. */
|
|
ptr -= 4; /* XXX Ugliness because of handling of tcp SMB length. */
|
|
memcpy(tmp,ptr,4);
|
|
set_message(ptr,17,17 + len,True);
|
|
memcpy(ptr,tmp,4);
|
|
|
|
CVAL(ptr,smb_com) = SMBtrans;
|
|
SSVAL(ptr,smb_vwv1,len);
|
|
SSVAL(ptr,smb_vwv11,len);
|
|
SSVAL(ptr,smb_vwv12,70 + strlen(mailslot));
|
|
SSVAL(ptr,smb_vwv13,3);
|
|
SSVAL(ptr,smb_vwv14,1);
|
|
SSVAL(ptr,smb_vwv15,1);
|
|
SSVAL(ptr,smb_vwv16,2);
|
|
p2 = smb_buf(ptr);
|
|
pstrcpy(p2,mailslot);
|
|
p2 = skip_string(p2,1);
|
|
|
|
memcpy(p2,buf,len);
|
|
p2 += len;
|
|
|
|
dgram->datasize = PTR_DIFF(p2,ptr+4); /* +4 for tcp length. */
|
|
|
|
p.ip = dest_ip;
|
|
p.port = dest_port;
|
|
p.fd = dgram_sock;
|
|
p.timestamp = time(NULL);
|
|
p.packet_type = DGRAM_PACKET;
|
|
|
|
DEBUG(4,("send_mailslot: Sending to mailslot %s from %s IP %s ", mailslot,
|
|
nmb_namestr(&dgram->source_name), inet_ntoa(src_ip)));
|
|
DEBUG(4,("to %s IP %s\n", nmb_namestr(&dgram->dest_name), inet_ntoa(dest_ip)));
|
|
|
|
return send_packet(&p);
|
|
|
|
}
|
|
|
|
/*
|
|
* cli_get_response: Get a response ...
|
|
*/
|
|
int cli_get_response(BOOL unique, char *mailslot, char *buf, int bufsiz)
|
|
{
|
|
struct packet_struct *packet;
|
|
|
|
packet = read_packet(dgram_sock, DGRAM_PACKET);
|
|
|
|
if (packet) { /* We got one, pull what we want out of the SMB data ... */
|
|
|
|
struct dgram_packet *dgram = &packet->packet.dgram;
|
|
|
|
/*
|
|
* We should probably parse the SMB, but for now, we will pull what
|
|
* from fixed, known locations ...
|
|
*/
|
|
|
|
/* Copy the data to buffer, respecting sizes ... */
|
|
|
|
bcopy(&dgram->data[92], buf, MIN(bufsiz, (dgram->datasize - 92)));
|
|
|
|
}
|
|
else
|
|
return -1;
|
|
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* cli_get_backup_list: Send a get backup list request ...
|
|
*/
|
|
|
|
static char cli_backup_list[1024];
|
|
|
|
int cli_get_backup_list(const char *myname, const char *send_to_name)
|
|
{
|
|
char outbuf[15];
|
|
char *p;
|
|
struct in_addr sendto_ip, my_ip;
|
|
|
|
if (!resolve_name(send_to_name, &sendto_ip, 0x1d)) {
|
|
|
|
fprintf(stderr, "Could not resolve name: %s<1D>\n", send_to_name);
|
|
|
|
}
|
|
|
|
bzero(&my_ip, 4); /* Cheap way to get 0.0.0.0 in there */
|
|
|
|
if (!resolve_name(myname, &my_ip, 0x00)) { /* FIXME: Call others here */
|
|
|
|
fprintf(stderr, "Could not resolve name: %s<00>\n", myname);
|
|
|
|
}
|
|
|
|
bzero(cli_backup_list, sizeof(cli_backup_list));
|
|
bzero(outbuf, sizeof(outbuf));
|
|
|
|
p = outbuf;
|
|
|
|
SCVAL(p, 0, ANN_GetBackupListReq);
|
|
p++;
|
|
|
|
SCVAL(p, 0, 1); /* Count pointer ... */
|
|
p++;
|
|
|
|
SIVAL(p, 0, 1); /* The sender's token ... */
|
|
p += 4;
|
|
|
|
cli_send_mailslot(True, "\\MAILSLOT\\BROWSE", outbuf, PTR_DIFF(p, outbuf),
|
|
myname, 0, send_to_name, 0x1d, sendto_ip, my_ip, 138);
|
|
|
|
/* We should check the error and return if we got one */
|
|
|
|
/* Now, get the response ... */
|
|
|
|
cli_get_response(True, "\\MAILSLOT\\BROWSE", cli_backup_list, sizeof(cli_backup_list));
|
|
|
|
/* Should check the response here ... FIXME */
|
|
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* cli_get_backup_server: Get the backup list and retrieve a server from it
|
|
*/
|
|
|
|
int cli_get_backup_server(char *my_name, char *target, char *servername, int namesize)
|
|
{
|
|
|
|
/* Get the backup list first. We could pull this from the cache later */
|
|
|
|
cli_get_backup_list(my_name, target); /* FIXME: Check the response */
|
|
|
|
strncpy(servername, cli_backup_list, MIN(16, namesize));
|
|
|
|
/* Should check the response here ... FIXME */
|
|
|
|
return 0;
|
|
}
|