2 Unix SMB/CIFS implementation.
3 SMB client session context management functions
5 Copyright (C) Andrew Tridgell 1994-2005
6 Copyright (C) James Myers 2003 <myersjj@samba.org>
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program. If not, see <http://www.gnu.org/licenses/>.
23 #include "libcli/raw/libcliraw.h"
24 #include "libcli/raw/raw_proto.h"
25 #include "system/filesys.h"
26 #include "../libcli/smb/smbXcli_base.h"
28 #define SETUP_REQUEST_SESSION(cmd, wct, buflen) do { \
29 req = smbcli_request_setup_session(session, cmd, wct, buflen); \
30 if (!req) return NULL; \
34 /****************************************************************************
35 Initialize the session context
36 ****************************************************************************/
37 struct smbcli_session
*smbcli_session_init(struct smbcli_transport
*transport
,
38 TALLOC_CTX
*parent_ctx
, bool primary
,
39 struct smbcli_session_options options
)
41 struct smbcli_session
*session
;
43 uint32_t capabilities
;
45 session
= talloc_zero(parent_ctx
, struct smbcli_session
);
51 session
->transport
= talloc_steal(session
, transport
);
53 session
->transport
= talloc_reference(session
, transport
);
55 session
->pid
= (uint32_t)getpid();
56 session
->vuid
= UID_FIELD_INVALID
;
57 session
->options
= options
;
60 * for now session->vuid is still used by the callers, but we call:
61 * smb1cli_session_set_id(session->smbXcli, session->vuid);
62 * before using session->smbXcli, in future we should remove
65 session
->smbXcli
= smbXcli_session_create(session
, transport
->conn
);
66 if (session
->smbXcli
== NULL
) {
71 capabilities
= transport
->negotiate
.capabilities
;
73 flags2
= FLAGS2_LONG_PATH_COMPONENTS
| FLAGS2_EXTENDED_ATTRIBUTES
;
75 if (capabilities
& CAP_UNICODE
) {
76 flags2
|= FLAGS2_UNICODE_STRINGS
;
78 if (capabilities
& CAP_STATUS32
) {
79 flags2
|= FLAGS2_32_BIT_ERROR_CODES
;
81 if (capabilities
& CAP_EXTENDED_SECURITY
) {
82 flags2
|= FLAGS2_EXTENDED_SECURITY
;
84 if (smb1cli_conn_signing_is_active(session
->transport
->conn
)) {
85 flags2
|= FLAGS2_SMB_SECURITY_SIGNATURES
;
88 session
->flags2
= flags2
;
93 /****************************************************************************
94 Perform a session setup (async send)
95 ****************************************************************************/
96 struct smbcli_request
*smb_raw_sesssetup_send(struct smbcli_session
*session
,
97 union smb_sesssetup
*parms
)
99 struct smbcli_request
*req
= NULL
;
101 switch (parms
->old
.level
) {
102 case RAW_SESSSETUP_OLD
:
103 SETUP_REQUEST_SESSION(SMBsesssetupX
, 10, 0);
104 SSVAL(req
->out
.vwv
, VWV(0), SMB_CHAIN_NONE
);
105 SSVAL(req
->out
.vwv
, VWV(1), 0);
106 SSVAL(req
->out
.vwv
,VWV(2),parms
->old
.in
.bufsize
);
107 SSVAL(req
->out
.vwv
,VWV(3),parms
->old
.in
.mpx_max
);
108 SSVAL(req
->out
.vwv
,VWV(4),parms
->old
.in
.vc_num
);
109 SIVAL(req
->out
.vwv
,VWV(5),parms
->old
.in
.sesskey
);
110 SSVAL(req
->out
.vwv
,VWV(7),parms
->old
.in
.password
.length
);
111 SIVAL(req
->out
.vwv
,VWV(8), 0); /* reserved */
112 smbcli_req_append_blob(req
, &parms
->old
.in
.password
);
113 smbcli_req_append_string(req
, parms
->old
.in
.user
, STR_TERMINATE
);
114 smbcli_req_append_string(req
, parms
->old
.in
.domain
, STR_TERMINATE
|STR_UPPER
);
115 smbcli_req_append_string(req
, parms
->old
.in
.os
, STR_TERMINATE
);
116 smbcli_req_append_string(req
, parms
->old
.in
.lanman
, STR_TERMINATE
);
119 case RAW_SESSSETUP_NT1
:
120 SETUP_REQUEST_SESSION(SMBsesssetupX
, 13, 0);
121 SSVAL(req
->out
.vwv
, VWV(0), SMB_CHAIN_NONE
);
122 SSVAL(req
->out
.vwv
, VWV(1), 0);
123 SSVAL(req
->out
.vwv
, VWV(2), parms
->nt1
.in
.bufsize
);
124 SSVAL(req
->out
.vwv
, VWV(3), parms
->nt1
.in
.mpx_max
);
125 SSVAL(req
->out
.vwv
, VWV(4), parms
->nt1
.in
.vc_num
);
126 SIVAL(req
->out
.vwv
, VWV(5), parms
->nt1
.in
.sesskey
);
127 SSVAL(req
->out
.vwv
, VWV(7), parms
->nt1
.in
.password1
.length
);
128 SSVAL(req
->out
.vwv
, VWV(8), parms
->nt1
.in
.password2
.length
);
129 SIVAL(req
->out
.vwv
, VWV(9), 0); /* reserved */
130 SIVAL(req
->out
.vwv
, VWV(11), parms
->nt1
.in
.capabilities
);
131 smbcli_req_append_blob(req
, &parms
->nt1
.in
.password1
);
132 smbcli_req_append_blob(req
, &parms
->nt1
.in
.password2
);
133 smbcli_req_append_string(req
, parms
->nt1
.in
.user
, STR_TERMINATE
);
134 smbcli_req_append_string(req
, parms
->nt1
.in
.domain
, STR_TERMINATE
|STR_UPPER
);
135 smbcli_req_append_string(req
, parms
->nt1
.in
.os
, STR_TERMINATE
);
136 smbcli_req_append_string(req
, parms
->nt1
.in
.lanman
, STR_TERMINATE
);
139 case RAW_SESSSETUP_SPNEGO
:
140 SETUP_REQUEST_SESSION(SMBsesssetupX
, 12, 0);
141 SSVAL(req
->out
.vwv
, VWV(0), SMB_CHAIN_NONE
);
142 SSVAL(req
->out
.vwv
, VWV(1), 0);
143 SSVAL(req
->out
.vwv
, VWV(2), parms
->spnego
.in
.bufsize
);
144 SSVAL(req
->out
.vwv
, VWV(3), parms
->spnego
.in
.mpx_max
);
145 SSVAL(req
->out
.vwv
, VWV(4), parms
->spnego
.in
.vc_num
);
146 SIVAL(req
->out
.vwv
, VWV(5), parms
->spnego
.in
.sesskey
);
147 SSVAL(req
->out
.vwv
, VWV(7), parms
->spnego
.in
.secblob
.length
);
148 SIVAL(req
->out
.vwv
, VWV(8), 0); /* reserved */
149 SIVAL(req
->out
.vwv
, VWV(10), parms
->spnego
.in
.capabilities
);
150 smbcli_req_append_blob(req
, &parms
->spnego
.in
.secblob
);
151 smbcli_req_append_string(req
, parms
->spnego
.in
.os
, STR_TERMINATE
);
152 smbcli_req_append_string(req
, parms
->spnego
.in
.lanman
, STR_TERMINATE
);
153 smbcli_req_append_string(req
, parms
->spnego
.in
.workgroup
, STR_TERMINATE
);
156 case RAW_SESSSETUP_SMB2
:
160 if (!smbcli_request_send(req
)) {
161 smbcli_request_destroy(req
);
169 /****************************************************************************
170 Perform a session setup (async recv)
171 ****************************************************************************/
172 NTSTATUS
smb_raw_sesssetup_recv(struct smbcli_request
*req
,
174 union smb_sesssetup
*parms
)
179 if (!smbcli_request_receive(req
)) {
180 return smbcli_request_destroy(req
);
183 if (!NT_STATUS_IS_OK(req
->status
) &&
184 !NT_STATUS_EQUAL(req
->status
,NT_STATUS_MORE_PROCESSING_REQUIRED
)) {
185 return smbcli_request_destroy(req
);
188 switch (parms
->old
.level
) {
189 case RAW_SESSSETUP_OLD
:
190 SMBCLI_CHECK_WCT(req
, 3);
191 ZERO_STRUCT(parms
->old
.out
);
192 parms
->old
.out
.vuid
= SVAL(req
->in
.hdr
, HDR_UID
);
193 parms
->old
.out
.action
= SVAL(req
->in
.vwv
, VWV(2));
196 p
+= smbcli_req_pull_string(&req
->in
.bufinfo
, mem_ctx
, &parms
->old
.out
.os
, p
, -1, STR_TERMINATE
);
197 p
+= smbcli_req_pull_string(&req
->in
.bufinfo
, mem_ctx
, &parms
->old
.out
.lanman
, p
, -1, STR_TERMINATE
);
198 smbcli_req_pull_string(&req
->in
.bufinfo
, mem_ctx
, &parms
->old
.out
.domain
, p
, -1, STR_TERMINATE
);
202 case RAW_SESSSETUP_NT1
:
203 SMBCLI_CHECK_WCT(req
, 3);
204 ZERO_STRUCT(parms
->nt1
.out
);
205 parms
->nt1
.out
.vuid
= SVAL(req
->in
.hdr
, HDR_UID
);
206 parms
->nt1
.out
.action
= SVAL(req
->in
.vwv
, VWV(2));
209 p
+= smbcli_req_pull_string(&req
->in
.bufinfo
, mem_ctx
, &parms
->nt1
.out
.os
, p
, -1, STR_TERMINATE
);
210 p
+= smbcli_req_pull_string(&req
->in
.bufinfo
, mem_ctx
, &parms
->nt1
.out
.lanman
, p
, -1, STR_TERMINATE
);
211 if (p
< (req
->in
.data
+ req
->in
.data_size
)) {
212 smbcli_req_pull_string(&req
->in
.bufinfo
, mem_ctx
, &parms
->nt1
.out
.domain
, p
, -1, STR_TERMINATE
);
217 case RAW_SESSSETUP_SPNEGO
:
218 SMBCLI_CHECK_WCT(req
, 4);
219 ZERO_STRUCT(parms
->spnego
.out
);
220 parms
->spnego
.out
.vuid
= SVAL(req
->in
.hdr
, HDR_UID
);
221 parms
->spnego
.out
.action
= SVAL(req
->in
.vwv
, VWV(2));
222 len
= SVAL(req
->in
.vwv
, VWV(3));
228 parms
->spnego
.out
.secblob
= smbcli_req_pull_blob(&req
->in
.bufinfo
, mem_ctx
, p
, len
);
229 p
+= parms
->spnego
.out
.secblob
.length
;
230 p
+= smbcli_req_pull_string(&req
->in
.bufinfo
, mem_ctx
, &parms
->spnego
.out
.os
, p
, -1, STR_TERMINATE
);
231 p
+= smbcli_req_pull_string(&req
->in
.bufinfo
, mem_ctx
, &parms
->spnego
.out
.lanman
, p
, -1, STR_TERMINATE
);
232 smbcli_req_pull_string(&req
->in
.bufinfo
, mem_ctx
, &parms
->spnego
.out
.workgroup
, p
, -1, STR_TERMINATE
);
235 case RAW_SESSSETUP_SMB2
:
236 req
->status
= NT_STATUS_INTERNAL_ERROR
;
241 return smbcli_request_destroy(req
);
246 Perform a session setup (sync interface)
248 NTSTATUS
smb_raw_sesssetup(struct smbcli_session
*session
,
249 TALLOC_CTX
*mem_ctx
, union smb_sesssetup
*parms
)
251 struct smbcli_request
*req
= smb_raw_sesssetup_send(session
, parms
);
252 return smb_raw_sesssetup_recv(req
, mem_ctx
, parms
);
256 /****************************************************************************
257 Send a ulogoff (async send)
258 *****************************************************************************/
259 struct smbcli_request
*smb_raw_ulogoff_send(struct smbcli_session
*session
)
261 struct smbcli_request
*req
;
263 SETUP_REQUEST_SESSION(SMBulogoffX
, 2, 0);
265 SSVAL(req
->out
.vwv
, VWV(0), SMB_CHAIN_NONE
);
266 SSVAL(req
->out
.vwv
, VWV(1), 0);
268 if (!smbcli_request_send(req
)) {
269 smbcli_request_destroy(req
);
276 /****************************************************************************
277 Send a ulogoff (sync interface)
278 *****************************************************************************/
279 NTSTATUS
smb_raw_ulogoff(struct smbcli_session
*session
)
281 struct smbcli_request
*req
= smb_raw_ulogoff_send(session
);
282 return smbcli_request_simple_recv(req
);
286 /****************************************************************************
287 Send a exit (async send)
288 *****************************************************************************/
289 struct smbcli_request
*smb_raw_exit_send(struct smbcli_session
*session
)
291 struct smbcli_request
*req
;
293 SETUP_REQUEST_SESSION(SMBexit
, 0, 0);
295 if (!smbcli_request_send(req
)) {
296 smbcli_request_destroy(req
);
303 /****************************************************************************
304 Send a exit (sync interface)
305 *****************************************************************************/
306 _PUBLIC_ NTSTATUS
smb_raw_exit(struct smbcli_session
*session
)
308 struct smbcli_request
*req
= smb_raw_exit_send(session
);
309 return smbcli_request_simple_recv(req
);