gensec: Refactor gensec_security_mechs()
[samba4-gss.git] / source4 / libcli / cliconnect.c
blob58118b086aaddf4228e9859ffcf9c28388d0a8ac
1 /*
2 Unix SMB/CIFS implementation.
4 client connect/disconnect routines
6 Copyright (C) Andrew Tridgell 2003-2005
7 Copyright (C) James Peach 2005
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>.
23 #include "includes.h"
24 #include "libcli/libcli.h"
25 #include "libcli/raw/libcliraw.h"
26 #include "libcli/raw/raw_proto.h"
27 #include "libcli/auth/libcli_auth.h"
28 #include "libcli/smb_composite/smb_composite.h"
29 #include "libcli/smb/smbXcli_base.h"
32 wrapper around smbcli_sock_connect()
34 bool smbcli_socket_connect(struct smbcli_state *cli, const char *server,
35 const char **ports,
36 struct tevent_context *ev_ctx,
37 struct resolve_context *resolve_ctx,
38 struct smbcli_options *options,
39 const char *socket_options,
40 struct nbt_name *calling,
41 struct nbt_name *called)
43 NTSTATUS status;
45 cli->options = *options;
47 status = smbcli_sock_connect(cli,
48 NULL, /* host_addr */
49 ports,
50 server,
51 resolve_ctx,
52 ev_ctx,
53 socket_options,
54 calling,
55 called,
56 &cli->sock);
57 if (!NT_STATUS_IS_OK(status)) {
58 return false;
61 return true;
64 /* wrapper around smb_raw_negotiate() */
65 NTSTATUS smbcli_negprot(struct smbcli_state *cli, bool unicode, int maxprotocol)
67 if (unicode) {
68 cli->options.unicode = 1;
69 } else {
70 cli->options.unicode = 0;
73 cli->transport = smbcli_transport_init(cli->sock, cli,
74 true, &cli->options);
75 cli->sock = NULL;
76 if (!cli->transport) {
77 return NT_STATUS_NO_MEMORY;
80 return smb_raw_negotiate(cli->transport, unicode, PROTOCOL_CORE, maxprotocol);
83 /* wrapper around smb_raw_sesssetup() */
84 NTSTATUS smbcli_session_setup(struct smbcli_state *cli,
85 struct cli_credentials *credentials,
86 const char *workgroup,
87 struct smbcli_session_options options,
88 struct gensec_settings *gensec_settings)
90 struct smb_composite_sesssetup setup;
91 NTSTATUS status;
93 cli->session = smbcli_session_init(cli->transport, cli, true,
94 options);
95 if (!cli->session) return NT_STATUS_UNSUCCESSFUL;
97 setup.in.sesskey = cli->transport->negotiate.sesskey;
98 setup.in.capabilities = cli->transport->negotiate.capabilities;
99 setup.in.credentials = credentials;
100 setup.in.workgroup = workgroup;
101 setup.in.gensec_settings = gensec_settings;
103 status = smb_composite_sesssetup(cli->session, &setup);
105 cli->session->vuid = setup.out.vuid;
107 return status;
110 /* wrapper around smb_raw_tcon() */
111 NTSTATUS smbcli_tconX(struct smbcli_state *cli, const char *sharename,
112 const char *devtype, const char *password)
114 union smb_tcon tcon;
115 TALLOC_CTX *mem_ctx;
116 NTSTATUS status;
118 cli->tree = smbcli_tree_init(cli->session, cli, true);
119 if (!cli->tree) return NT_STATUS_UNSUCCESSFUL;
121 mem_ctx = talloc_init("tcon");
122 if (!mem_ctx) {
123 return NT_STATUS_NO_MEMORY;
126 /* setup a tree connect */
127 tcon.generic.level = RAW_TCON_TCONX;
128 tcon.tconx.in.flags = TCONX_FLAG_EXTENDED_RESPONSE;
129 tcon.tconx.in.flags |= TCONX_FLAG_EXTENDED_SIGNATURES;
130 if (cli->transport->negotiate.sec_mode & NEGOTIATE_SECURITY_USER_LEVEL) {
131 tcon.tconx.in.password = data_blob(NULL, 0);
132 } else if (cli->transport->negotiate.sec_mode & NEGOTIATE_SECURITY_CHALLENGE_RESPONSE) {
133 tcon.tconx.in.password = data_blob_talloc(mem_ctx, NULL, 24);
134 if (cli->transport->negotiate.secblob.length < 8) {
135 return NT_STATUS_INVALID_PARAMETER;
137 SMBencrypt(password, cli->transport->negotiate.secblob.data, tcon.tconx.in.password.data);
138 } else {
139 tcon.tconx.in.password = data_blob_talloc(mem_ctx, password, strlen(password)+1);
141 tcon.tconx.in.path = sharename;
142 tcon.tconx.in.device = devtype;
144 status = smb_raw_tcon(cli->tree, mem_ctx, &tcon);
145 if (!NT_STATUS_IS_OK(status)) {
146 goto out;
148 cli->tree->tid = tcon.tconx.out.tid;
150 if (tcon.tconx.out.options & SMB_EXTENDED_SIGNATURES) {
151 smb1cli_session_protect_session_key(cli->tree->session->smbXcli);
154 out:
155 talloc_free(mem_ctx);
157 return status;
162 easy way to get to a fully connected smbcli_state in one call
164 NTSTATUS smbcli_full_connection(TALLOC_CTX *parent_ctx,
165 struct smbcli_state **ret_cli,
166 const char *host,
167 const char **ports,
168 const char *sharename,
169 const char *devtype,
170 const char *socket_options,
171 struct cli_credentials *credentials,
172 struct resolve_context *resolve_ctx,
173 struct tevent_context *ev,
174 struct smbcli_options *options,
175 struct smbcli_session_options *session_options,
176 struct gensec_settings *gensec_settings)
178 struct smbcli_tree *tree;
179 NTSTATUS status;
181 *ret_cli = NULL;
183 status = smbcli_tree_full_connection(parent_ctx,
184 &tree, host, ports,
185 sharename, devtype,
186 socket_options,
187 credentials, resolve_ctx, ev,
188 options,
189 session_options,
190 gensec_settings);
191 if (!NT_STATUS_IS_OK(status)) {
192 goto done;
195 (*ret_cli) = smbcli_state_init(parent_ctx);
197 (*ret_cli)->tree = tree;
198 (*ret_cli)->session = tree->session;
199 (*ret_cli)->transport = tree->session->transport;
201 talloc_steal(*ret_cli, tree);
203 done:
204 return status;
209 disconnect the tree
211 NTSTATUS smbcli_tdis(struct smbcli_state *cli)
213 return smb_tree_disconnect(cli->tree);
216 /****************************************************************************
217 Initialise a client state structure.
218 ****************************************************************************/
219 struct smbcli_state *smbcli_state_init(TALLOC_CTX *mem_ctx)
221 return talloc_zero(mem_ctx, struct smbcli_state);
224 /* Insert a NULL at the first separator of the given path and return a pointer
225 * to the remainder of the string.
227 static char *
228 terminate_path_at_separator(char * path)
230 char * p;
232 if (!path) {
233 return NULL;
236 if ((p = strchr_m(path, '/'))) {
237 *p = '\0';
238 return p + 1;
241 if ((p = strchr_m(path, '\\'))) {
242 *p = '\0';
243 return p + 1;
246 /* No separator. */
247 return NULL;
251 parse a //server/share type UNC name
253 bool smbcli_parse_unc(const char *unc_name, TALLOC_CTX *mem_ctx,
254 char **hostname, char **sharename)
256 char *p;
258 if (strncmp(unc_name, "\\\\", 2) &&
259 strncmp(unc_name, "//", 2)) {
260 return false;
263 *hostname = *sharename = NULL;
265 *hostname = talloc_strdup(mem_ctx, &unc_name[2]);
266 p = terminate_path_at_separator(*hostname);
268 if (p != NULL && *p) {
269 *sharename = talloc_strdup(mem_ctx, p);
270 terminate_path_at_separator(*sharename);
273 if (*hostname && *sharename) {
274 return true;
277 talloc_free(*hostname);
278 talloc_free(*sharename);
279 *hostname = *sharename = NULL;
280 return false;