root/source4/libcli/raw/rawnegotiate.c

/* [<][>][^][v][top][bottom][index][help] */

DEFINITIONS

This source file includes following definitions.
  1. smb_raw_negotiate_send
  2. smb_raw_negotiate_recv
  3. smb_raw_negotiate

   1 /* 
   2    Unix SMB/CIFS implementation.
   3 
   4    SMB client negotiate context management functions
   5 
   6    Copyright (C) Andrew Tridgell 1994-2005
   7    Copyright (C) James Myers 2003 <myersjj@samba.org>
   8    
   9    This program is free software; you can redistribute it and/or modify
  10    it under the terms of the GNU General Public License as published by
  11    the Free Software Foundation; either version 3 of the License, or
  12    (at your option) any later version.
  13    
  14    This program is distributed in the hope that it will be useful,
  15    but WITHOUT ANY WARRANTY; without even the implied warranty of
  16    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
  17    GNU General Public License for more details.
  18    
  19    You should have received a copy of the GNU General Public License
  20    along with this program.  If not, see <http://www.gnu.org/licenses/>.
  21 */
  22 
  23 #include "includes.h"
  24 #include "libcli/raw/libcliraw.h"
  25 #include "libcli/raw/raw_proto.h"
  26 #include "system/time.h"
  27 
  28 static const struct {
  29         enum protocol_types prot;
  30         const char *name;
  31 } prots[] = {
  32         {PROTOCOL_CORE,"PC NETWORK PROGRAM 1.0"},
  33         {PROTOCOL_COREPLUS,"MICROSOFT NETWORKS 1.03"},
  34         {PROTOCOL_LANMAN1,"MICROSOFT NETWORKS 3.0"},
  35         {PROTOCOL_LANMAN1,"LANMAN1.0"},
  36         {PROTOCOL_LANMAN1,"Windows for Workgroups 3.1a"},
  37         {PROTOCOL_LANMAN2,"LM1.2X002"},
  38         {PROTOCOL_LANMAN2,"DOS LANMAN2.1"},
  39         {PROTOCOL_LANMAN2,"LANMAN2.1"},
  40         {PROTOCOL_LANMAN2,"Samba"},
  41         {PROTOCOL_NT1,"NT LANMAN 1.0"},
  42         {PROTOCOL_NT1,"NT LM 0.12"},
  43 #if 0
  44         /* we don't yet handle chaining a SMB transport onto SMB2 */
  45         {PROTOCOL_SMB2,"SMB 2.002"},
  46 #endif
  47 };
  48 
  49 /*
  50   Send a negprot command.
  51 */
  52 struct smbcli_request *smb_raw_negotiate_send(struct smbcli_transport *transport, 
     /* [<][>][^][v][top][bottom][index][help] */
  53                                               bool unicode,
  54                                               int maxprotocol)
  55 {
  56         struct smbcli_request *req;
  57         int i;
  58         uint16_t flags2 = 0;
  59 
  60         req = smbcli_request_setup_transport(transport, SMBnegprot, 0, 0);
  61         if (!req) {
  62                 return NULL;
  63         }
  64 
  65         flags2 |= FLAGS2_32_BIT_ERROR_CODES;
  66         if (unicode) {
  67                 flags2 |= FLAGS2_UNICODE_STRINGS;
  68         }
  69         flags2 |= FLAGS2_EXTENDED_ATTRIBUTES;
  70         flags2 |= FLAGS2_LONG_PATH_COMPONENTS;
  71         flags2 |= FLAGS2_IS_LONG_NAME;
  72 
  73         if (transport->options.use_spnego) {
  74                 flags2 |= FLAGS2_EXTENDED_SECURITY;
  75         }
  76 
  77         SSVAL(req->out.hdr,HDR_FLG2, flags2);
  78 
  79         /* setup the protocol strings */
  80         for (i=0; i < ARRAY_SIZE(prots) && prots[i].prot <= maxprotocol; i++) {
  81                 smbcli_req_append_bytes(req, (const uint8_t *)"\2", 1);
  82                 smbcli_req_append_string(req, prots[i].name, STR_TERMINATE | STR_ASCII);
  83         }
  84 
  85         if (!smbcli_request_send(req)) {
  86                 smbcli_request_destroy(req);
  87                 return NULL;
  88         }
  89 
  90         return req;
  91 }
  92 
  93 /*
  94  Send a negprot command.
  95 */
  96 NTSTATUS smb_raw_negotiate_recv(struct smbcli_request *req)
     /* [<][>][^][v][top][bottom][index][help] */
  97 {
  98         struct smbcli_transport *transport = req->transport;
  99         int protocol;
 100 
 101         if (!smbcli_request_receive(req) ||
 102             smbcli_request_is_error(req)) {
 103                 return smbcli_request_destroy(req);
 104         }
 105 
 106         SMBCLI_CHECK_MIN_WCT(req, 1);
 107 
 108         protocol = SVALS(req->in.vwv, VWV(0));
 109 
 110         if (protocol >= ARRAY_SIZE(prots) || protocol < 0) {
 111                 req->status = NT_STATUS_UNSUCCESSFUL;
 112                 return smbcli_request_destroy(req);
 113         }
 114 
 115         transport->negotiate.protocol = prots[protocol].prot;
 116 
 117         if (transport->negotiate.protocol >= PROTOCOL_NT1) {
 118                 NTTIME ntt;
 119 
 120                 /* NT protocol */
 121                 SMBCLI_CHECK_WCT(req, 17);
 122                 transport->negotiate.sec_mode = CVAL(req->in.vwv,VWV(1));
 123                 transport->negotiate.max_mux  = SVAL(req->in.vwv,VWV(1)+1);
 124                 transport->negotiate.max_xmit = IVAL(req->in.vwv,VWV(3)+1);
 125                 transport->negotiate.sesskey  = IVAL(req->in.vwv,VWV(7)+1);
 126                 transport->negotiate.capabilities = IVAL(req->in.vwv,VWV(9)+1);
 127 
 128                 /* this time arrives in real GMT */
 129                 ntt = smbcli_pull_nttime(req->in.vwv, VWV(11)+1);
 130                 transport->negotiate.server_time = nt_time_to_unix(ntt);                
 131                 transport->negotiate.server_zone = SVALS(req->in.vwv,VWV(15)+1) * 60;
 132                 transport->negotiate.key_len = CVAL(req->in.vwv,VWV(16)+1);
 133 
 134                 if (transport->negotiate.capabilities & CAP_EXTENDED_SECURITY) {
 135                         if (req->in.data_size < 16) {
 136                                 goto failed;
 137                         }
 138                         transport->negotiate.server_guid = smbcli_req_pull_blob(&req->in.bufinfo, transport, req->in.data, 16);
 139                         transport->negotiate.secblob = smbcli_req_pull_blob(&req->in.bufinfo, transport, req->in.data + 16, req->in.data_size - 16);
 140                 } else {
 141                         if (req->in.data_size < (transport->negotiate.key_len)) {
 142                                 goto failed;
 143                         }
 144                         transport->negotiate.secblob = smbcli_req_pull_blob(&req->in.bufinfo, transport, req->in.data, transport->negotiate.key_len);
 145                         smbcli_req_pull_string(&req->in.bufinfo, transport, &transport->negotiate.server_domain,
 146                                             req->in.data+transport->negotiate.key_len,
 147                                             req->in.data_size-transport->negotiate.key_len, STR_UNICODE|STR_NOALIGN);
 148                         /* here comes the server name */
 149                 }
 150 
 151                 if (transport->negotiate.capabilities & CAP_RAW_MODE) {
 152                         transport->negotiate.readbraw_supported = true;
 153                         transport->negotiate.writebraw_supported = true;
 154                 }
 155         } else if (transport->negotiate.protocol >= PROTOCOL_LANMAN1) {
 156                 SMBCLI_CHECK_WCT(req, 13);
 157                 transport->negotiate.sec_mode = SVAL(req->in.vwv,VWV(1));
 158                 transport->negotiate.max_xmit = SVAL(req->in.vwv,VWV(2));
 159                 transport->negotiate.sesskey =  IVAL(req->in.vwv,VWV(6));
 160                 transport->negotiate.server_zone = SVALS(req->in.vwv,VWV(10)) * 60;
 161                 
 162                 /* this time is converted to GMT by raw_pull_dos_date */
 163                 transport->negotiate.server_time = raw_pull_dos_date(transport,
 164                                                                      req->in.vwv+VWV(8));
 165                 if ((SVAL(req->in.vwv,VWV(5)) & 0x1)) {
 166                         transport->negotiate.readbraw_supported = 1;
 167                 }
 168                 if ((SVAL(req->in.vwv,VWV(5)) & 0x2)) {
 169                         transport->negotiate.writebraw_supported = 1;
 170                 }
 171                 transport->negotiate.secblob = smbcli_req_pull_blob(&req->in.bufinfo, transport, 
 172                                                                  req->in.data, req->in.data_size);
 173         } else {
 174                 /* the old core protocol */
 175                 transport->negotiate.sec_mode = 0;
 176                 transport->negotiate.server_time = time(NULL);
 177                 transport->negotiate.max_xmit = transport->options.max_xmit;
 178                 transport->negotiate.server_zone = get_time_zone(transport->negotiate.server_time);
 179         }
 180 
 181         /* a way to force ascii SMB */
 182         if (!transport->options.unicode) {
 183                 transport->negotiate.capabilities &= ~CAP_UNICODE;
 184         }
 185 
 186         if (!transport->options.ntstatus_support) {
 187                 transport->negotiate.capabilities &= ~CAP_STATUS32;
 188         }
 189 
 190         if (!transport->options.use_level2_oplocks) {
 191                 transport->negotiate.capabilities &= ~CAP_LEVEL_II_OPLOCKS;
 192         }
 193 
 194 failed:
 195         return smbcli_request_destroy(req);
 196 }
 197 
 198 
 199 /*
 200  Send a negprot command (sync interface)
 201 */
 202 NTSTATUS smb_raw_negotiate(struct smbcli_transport *transport, bool unicode, int maxprotocol)
     /* [<][>][^][v][top][bottom][index][help] */
 203 {
 204         struct smbcli_request *req = smb_raw_negotiate_send(transport, unicode, maxprotocol);
 205         return smb_raw_negotiate_recv(req);
 206 }

/* [<][>][^][v][top][bottom][index][help] */