1*10023SGordon.Ross@Sun.COM /*
2*10023SGordon.Ross@Sun.COM * CDDL HEADER START
3*10023SGordon.Ross@Sun.COM *
4*10023SGordon.Ross@Sun.COM * The contents of this file are subject to the terms of the
5*10023SGordon.Ross@Sun.COM * Common Development and Distribution License (the "License").
6*10023SGordon.Ross@Sun.COM * You may not use this file except in compliance with the License.
7*10023SGordon.Ross@Sun.COM *
8*10023SGordon.Ross@Sun.COM * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9*10023SGordon.Ross@Sun.COM * or http://www.opensolaris.org/os/licensing.
10*10023SGordon.Ross@Sun.COM * See the License for the specific language governing permissions
11*10023SGordon.Ross@Sun.COM * and limitations under the License.
12*10023SGordon.Ross@Sun.COM *
13*10023SGordon.Ross@Sun.COM * When distributing Covered Code, include this CDDL HEADER in each
14*10023SGordon.Ross@Sun.COM * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15*10023SGordon.Ross@Sun.COM * If applicable, add the following below this CDDL HEADER, with the
16*10023SGordon.Ross@Sun.COM * fields enclosed by brackets "[]" replaced with your own identifying
17*10023SGordon.Ross@Sun.COM * information: Portions Copyright [yyyy] [name of copyright owner]
18*10023SGordon.Ross@Sun.COM *
19*10023SGordon.Ross@Sun.COM * CDDL HEADER END
20*10023SGordon.Ross@Sun.COM */
21*10023SGordon.Ross@Sun.COM
22*10023SGordon.Ross@Sun.COM /*
23*10023SGordon.Ross@Sun.COM * Copyright 2009 Sun Microsystems, Inc. All rights reserved.
24*10023SGordon.Ross@Sun.COM * Use is subject to license terms.
25*10023SGordon.Ross@Sun.COM */
26*10023SGordon.Ross@Sun.COM
27*10023SGordon.Ross@Sun.COM /*
28*10023SGordon.Ross@Sun.COM * Functions to setup connections (TCP and/or NetBIOS)
29*10023SGordon.Ross@Sun.COM * This has the fall-back logic for IP6, IP4, NBT
30*10023SGordon.Ross@Sun.COM */
31*10023SGordon.Ross@Sun.COM
32*10023SGordon.Ross@Sun.COM #include <errno.h>
33*10023SGordon.Ross@Sun.COM #include <stdio.h>
34*10023SGordon.Ross@Sun.COM #include <string.h>
35*10023SGordon.Ross@Sun.COM #include <strings.h>
36*10023SGordon.Ross@Sun.COM #include <stdlib.h>
37*10023SGordon.Ross@Sun.COM #include <unistd.h>
38*10023SGordon.Ross@Sun.COM #include <netdb.h>
39*10023SGordon.Ross@Sun.COM #include <libintl.h>
40*10023SGordon.Ross@Sun.COM #include <xti.h>
41*10023SGordon.Ross@Sun.COM #include <assert.h>
42*10023SGordon.Ross@Sun.COM
43*10023SGordon.Ross@Sun.COM #include <sys/types.h>
44*10023SGordon.Ross@Sun.COM #include <sys/time.h>
45*10023SGordon.Ross@Sun.COM #include <sys/byteorder.h>
46*10023SGordon.Ross@Sun.COM #include <sys/socket.h>
47*10023SGordon.Ross@Sun.COM #include <sys/fcntl.h>
48*10023SGordon.Ross@Sun.COM
49*10023SGordon.Ross@Sun.COM #include <netinet/in.h>
50*10023SGordon.Ross@Sun.COM #include <netinet/tcp.h>
51*10023SGordon.Ross@Sun.COM #include <arpa/inet.h>
52*10023SGordon.Ross@Sun.COM
53*10023SGordon.Ross@Sun.COM #include <netsmb/smb.h>
54*10023SGordon.Ross@Sun.COM #include <netsmb/smb_lib.h>
55*10023SGordon.Ross@Sun.COM #include <netsmb/netbios.h>
56*10023SGordon.Ross@Sun.COM #include <netsmb/nb_lib.h>
57*10023SGordon.Ross@Sun.COM #include <netsmb/smb_dev.h>
58*10023SGordon.Ross@Sun.COM
59*10023SGordon.Ross@Sun.COM #include "charsets.h"
60*10023SGordon.Ross@Sun.COM #include "private.h"
61*10023SGordon.Ross@Sun.COM
62*10023SGordon.Ross@Sun.COM /*
63*10023SGordon.Ross@Sun.COM * SMB messages are up to 64K.
64*10023SGordon.Ross@Sun.COM * Let's leave room for two.
65*10023SGordon.Ross@Sun.COM */
66*10023SGordon.Ross@Sun.COM static int smb_tcpsndbuf = 0x20000;
67*10023SGordon.Ross@Sun.COM static int smb_tcprcvbuf = 0x20000;
68*10023SGordon.Ross@Sun.COM static int smb_connect_timeout = 30; /* seconds */
69*10023SGordon.Ross@Sun.COM int smb_recv_timeout = 30; /* seconds */
70*10023SGordon.Ross@Sun.COM
71*10023SGordon.Ross@Sun.COM int conn_tcp6(struct smb_ctx *, const struct sockaddr *, int);
72*10023SGordon.Ross@Sun.COM int conn_tcp4(struct smb_ctx *, const struct sockaddr *, int);
73*10023SGordon.Ross@Sun.COM int conn_nbt(struct smb_ctx *, const struct sockaddr *, char *);
74*10023SGordon.Ross@Sun.COM
75*10023SGordon.Ross@Sun.COM /*
76*10023SGordon.Ross@Sun.COM * Internal set sockopt for int-sized options.
77*10023SGordon.Ross@Sun.COM * Borrowed from: libnsl/rpc/ti_opts.c
78*10023SGordon.Ross@Sun.COM */
79*10023SGordon.Ross@Sun.COM static int
smb_setopt_int(int fd,int level,int name,int val)80*10023SGordon.Ross@Sun.COM smb_setopt_int(int fd, int level, int name, int val)
81*10023SGordon.Ross@Sun.COM {
82*10023SGordon.Ross@Sun.COM struct t_optmgmt oreq, ores;
83*10023SGordon.Ross@Sun.COM struct {
84*10023SGordon.Ross@Sun.COM struct t_opthdr oh;
85*10023SGordon.Ross@Sun.COM int ival;
86*10023SGordon.Ross@Sun.COM } opts;
87*10023SGordon.Ross@Sun.COM
88*10023SGordon.Ross@Sun.COM /* opt header */
89*10023SGordon.Ross@Sun.COM opts.oh.len = sizeof (opts);
90*10023SGordon.Ross@Sun.COM opts.oh.level = level;
91*10023SGordon.Ross@Sun.COM opts.oh.name = name;
92*10023SGordon.Ross@Sun.COM opts.oh.status = 0;
93*10023SGordon.Ross@Sun.COM opts.ival = val;
94*10023SGordon.Ross@Sun.COM
95*10023SGordon.Ross@Sun.COM oreq.flags = T_NEGOTIATE;
96*10023SGordon.Ross@Sun.COM oreq.opt.buf = (void *)&opts;
97*10023SGordon.Ross@Sun.COM oreq.opt.len = sizeof (opts);
98*10023SGordon.Ross@Sun.COM
99*10023SGordon.Ross@Sun.COM ores.flags = 0;
100*10023SGordon.Ross@Sun.COM ores.opt.buf = NULL;
101*10023SGordon.Ross@Sun.COM ores.opt.maxlen = 0;
102*10023SGordon.Ross@Sun.COM
103*10023SGordon.Ross@Sun.COM if (t_optmgmt(fd, &oreq, &ores) < 0) {
104*10023SGordon.Ross@Sun.COM DPRINT("t_opgmgnt, t_errno = %d", t_errno);
105*10023SGordon.Ross@Sun.COM if (t_errno == TSYSERR)
106*10023SGordon.Ross@Sun.COM return (errno);
107*10023SGordon.Ross@Sun.COM return (EPROTO);
108*10023SGordon.Ross@Sun.COM }
109*10023SGordon.Ross@Sun.COM if (ores.flags != T_SUCCESS) {
110*10023SGordon.Ross@Sun.COM DPRINT("flags 0x%x, status 0x%x",
111*10023SGordon.Ross@Sun.COM (int)ores.flags, (int)opts.oh.status);
112*10023SGordon.Ross@Sun.COM return (EPROTO);
113*10023SGordon.Ross@Sun.COM }
114*10023SGordon.Ross@Sun.COM
115*10023SGordon.Ross@Sun.COM return (0);
116*10023SGordon.Ross@Sun.COM }
117*10023SGordon.Ross@Sun.COM
118*10023SGordon.Ross@Sun.COM static int
smb_setopts(int fd)119*10023SGordon.Ross@Sun.COM smb_setopts(int fd)
120*10023SGordon.Ross@Sun.COM {
121*10023SGordon.Ross@Sun.COM int err;
122*10023SGordon.Ross@Sun.COM
123*10023SGordon.Ross@Sun.COM /*
124*10023SGordon.Ross@Sun.COM * Set various socket/TCP options.
125*10023SGordon.Ross@Sun.COM * Failures here are not fatal -
126*10023SGordon.Ross@Sun.COM * just log a complaint.
127*10023SGordon.Ross@Sun.COM *
128*10023SGordon.Ross@Sun.COM * We don't need these two:
129*10023SGordon.Ross@Sun.COM * SO_RCVTIMEO, SO_SNDTIMEO
130*10023SGordon.Ross@Sun.COM */
131*10023SGordon.Ross@Sun.COM
132*10023SGordon.Ross@Sun.COM err = smb_setopt_int(fd, SOL_SOCKET, SO_SNDBUF, smb_tcpsndbuf);
133*10023SGordon.Ross@Sun.COM if (err) {
134*10023SGordon.Ross@Sun.COM DPRINT("set SO_SNDBUF, err %d", err);
135*10023SGordon.Ross@Sun.COM }
136*10023SGordon.Ross@Sun.COM
137*10023SGordon.Ross@Sun.COM err = smb_setopt_int(fd, SOL_SOCKET, SO_RCVBUF, smb_tcprcvbuf);
138*10023SGordon.Ross@Sun.COM if (err) {
139*10023SGordon.Ross@Sun.COM DPRINT("set SO_RCVBUF, err %d", err);
140*10023SGordon.Ross@Sun.COM }
141*10023SGordon.Ross@Sun.COM
142*10023SGordon.Ross@Sun.COM err = smb_setopt_int(fd, SOL_SOCKET, SO_KEEPALIVE, 1);
143*10023SGordon.Ross@Sun.COM if (err) {
144*10023SGordon.Ross@Sun.COM DPRINT("set SO_KEEPALIVE, err %d", err);
145*10023SGordon.Ross@Sun.COM }
146*10023SGordon.Ross@Sun.COM
147*10023SGordon.Ross@Sun.COM err = smb_setopt_int(fd, IPPROTO_TCP, TCP_NODELAY, 1);
148*10023SGordon.Ross@Sun.COM if (err) {
149*10023SGordon.Ross@Sun.COM DPRINT("set TCP_NODELAY, err %d", err);
150*10023SGordon.Ross@Sun.COM }
151*10023SGordon.Ross@Sun.COM
152*10023SGordon.Ross@Sun.COM /* Set the connect timeout (in milliseconds). */
153*10023SGordon.Ross@Sun.COM err = smb_setopt_int(fd, IPPROTO_TCP,
154*10023SGordon.Ross@Sun.COM TCP_CONN_ABORT_THRESHOLD,
155*10023SGordon.Ross@Sun.COM smb_connect_timeout * 1000);
156*10023SGordon.Ross@Sun.COM if (err) {
157*10023SGordon.Ross@Sun.COM DPRINT("set connect timeout, err %d", err);
158*10023SGordon.Ross@Sun.COM }
159*10023SGordon.Ross@Sun.COM return (0);
160*10023SGordon.Ross@Sun.COM }
161*10023SGordon.Ross@Sun.COM
162*10023SGordon.Ross@Sun.COM
163*10023SGordon.Ross@Sun.COM int
conn_tcp6(struct smb_ctx * ctx,const struct sockaddr * sa,int port)164*10023SGordon.Ross@Sun.COM conn_tcp6(struct smb_ctx *ctx, const struct sockaddr *sa, int port)
165*10023SGordon.Ross@Sun.COM {
166*10023SGordon.Ross@Sun.COM struct sockaddr_in6 sin6;
167*10023SGordon.Ross@Sun.COM char *dev = "/dev/tcp6";
168*10023SGordon.Ross@Sun.COM char paddrbuf[INET6_ADDRSTRLEN];
169*10023SGordon.Ross@Sun.COM struct t_call sndcall;
170*10023SGordon.Ross@Sun.COM int fd, err;
171*10023SGordon.Ross@Sun.COM
172*10023SGordon.Ross@Sun.COM if (sa->sa_family != AF_INET6) {
173*10023SGordon.Ross@Sun.COM DPRINT("bad af %d", sa->sa_family);
174*10023SGordon.Ross@Sun.COM return (EINVAL);
175*10023SGordon.Ross@Sun.COM }
176*10023SGordon.Ross@Sun.COM bcopy(sa, &sin6, sizeof (sin6));
177*10023SGordon.Ross@Sun.COM sin6.sin6_port = htons(port);
178*10023SGordon.Ross@Sun.COM
179*10023SGordon.Ross@Sun.COM DPRINT("tcp6: %s (%d)",
180*10023SGordon.Ross@Sun.COM inet_ntop(AF_INET6, &sin6.sin6_addr,
181*10023SGordon.Ross@Sun.COM paddrbuf, sizeof (paddrbuf)), port);
182*10023SGordon.Ross@Sun.COM
183*10023SGordon.Ross@Sun.COM fd = t_open(dev, O_RDWR, NULL);
184*10023SGordon.Ross@Sun.COM if (fd < 0) {
185*10023SGordon.Ross@Sun.COM /* Assume t_errno = TSYSERR */
186*10023SGordon.Ross@Sun.COM err = errno;
187*10023SGordon.Ross@Sun.COM perror(dev);
188*10023SGordon.Ross@Sun.COM return (err);
189*10023SGordon.Ross@Sun.COM }
190*10023SGordon.Ross@Sun.COM if ((err = smb_setopts(fd)) != 0)
191*10023SGordon.Ross@Sun.COM goto errout;
192*10023SGordon.Ross@Sun.COM if (t_bind(fd, NULL, NULL) < 0) {
193*10023SGordon.Ross@Sun.COM DPRINT("t_bind t_errno %d", t_errno);
194*10023SGordon.Ross@Sun.COM if (t_errno == TSYSERR)
195*10023SGordon.Ross@Sun.COM err = errno;
196*10023SGordon.Ross@Sun.COM else
197*10023SGordon.Ross@Sun.COM err = EPROTO;
198*10023SGordon.Ross@Sun.COM goto errout;
199*10023SGordon.Ross@Sun.COM }
200*10023SGordon.Ross@Sun.COM sndcall.addr.maxlen = sizeof (sin6);
201*10023SGordon.Ross@Sun.COM sndcall.addr.len = sizeof (sin6);
202*10023SGordon.Ross@Sun.COM sndcall.addr.buf = (void *) &sin6;
203*10023SGordon.Ross@Sun.COM sndcall.opt.len = 0;
204*10023SGordon.Ross@Sun.COM sndcall.udata.len = 0;
205*10023SGordon.Ross@Sun.COM if (t_connect(fd, &sndcall, NULL) < 0) {
206*10023SGordon.Ross@Sun.COM err = get_xti_err(fd);
207*10023SGordon.Ross@Sun.COM DPRINT("connect, err %d", err);
208*10023SGordon.Ross@Sun.COM goto errout;
209*10023SGordon.Ross@Sun.COM }
210*10023SGordon.Ross@Sun.COM
211*10023SGordon.Ross@Sun.COM DPRINT("tcp6: connected, fd=%d", fd);
212*10023SGordon.Ross@Sun.COM ctx->ct_tran_fd = fd;
213*10023SGordon.Ross@Sun.COM return (0);
214*10023SGordon.Ross@Sun.COM
215*10023SGordon.Ross@Sun.COM errout:
216*10023SGordon.Ross@Sun.COM close(fd);
217*10023SGordon.Ross@Sun.COM return (err);
218*10023SGordon.Ross@Sun.COM }
219*10023SGordon.Ross@Sun.COM
220*10023SGordon.Ross@Sun.COM /*
221*10023SGordon.Ross@Sun.COM * This is used for both SMB over TCP (port 445)
222*10023SGordon.Ross@Sun.COM * and NetBIOS - see conn_nbt().
223*10023SGordon.Ross@Sun.COM */
224*10023SGordon.Ross@Sun.COM int
conn_tcp4(struct smb_ctx * ctx,const struct sockaddr * sa,int port)225*10023SGordon.Ross@Sun.COM conn_tcp4(struct smb_ctx *ctx, const struct sockaddr *sa, int port)
226*10023SGordon.Ross@Sun.COM {
227*10023SGordon.Ross@Sun.COM struct sockaddr_in sin;
228*10023SGordon.Ross@Sun.COM char *dev = "/dev/tcp";
229*10023SGordon.Ross@Sun.COM char paddrbuf[INET_ADDRSTRLEN];
230*10023SGordon.Ross@Sun.COM struct t_call sndcall;
231*10023SGordon.Ross@Sun.COM int fd, err;
232*10023SGordon.Ross@Sun.COM
233*10023SGordon.Ross@Sun.COM if (sa->sa_family != AF_INET) {
234*10023SGordon.Ross@Sun.COM DPRINT("bad af %d", sa->sa_family);
235*10023SGordon.Ross@Sun.COM return (EINVAL);
236*10023SGordon.Ross@Sun.COM }
237*10023SGordon.Ross@Sun.COM bcopy(sa, &sin, sizeof (sin));
238*10023SGordon.Ross@Sun.COM sin.sin_port = htons(port);
239*10023SGordon.Ross@Sun.COM
240*10023SGordon.Ross@Sun.COM DPRINT("tcp4: %s (%d)",
241*10023SGordon.Ross@Sun.COM inet_ntop(AF_INET, &sin.sin_addr,
242*10023SGordon.Ross@Sun.COM paddrbuf, sizeof (paddrbuf)), port);
243*10023SGordon.Ross@Sun.COM
244*10023SGordon.Ross@Sun.COM fd = t_open(dev, O_RDWR, NULL);
245*10023SGordon.Ross@Sun.COM if (fd < 0) {
246*10023SGordon.Ross@Sun.COM /* Assume t_errno = TSYSERR */
247*10023SGordon.Ross@Sun.COM err = errno;
248*10023SGordon.Ross@Sun.COM perror(dev);
249*10023SGordon.Ross@Sun.COM return (err);
250*10023SGordon.Ross@Sun.COM }
251*10023SGordon.Ross@Sun.COM if ((err = smb_setopts(fd)) != 0)
252*10023SGordon.Ross@Sun.COM goto errout;
253*10023SGordon.Ross@Sun.COM if (t_bind(fd, NULL, NULL) < 0) {
254*10023SGordon.Ross@Sun.COM DPRINT("t_bind t_errno %d", t_errno);
255*10023SGordon.Ross@Sun.COM if (t_errno == TSYSERR)
256*10023SGordon.Ross@Sun.COM err = errno;
257*10023SGordon.Ross@Sun.COM else
258*10023SGordon.Ross@Sun.COM err = EPROTO;
259*10023SGordon.Ross@Sun.COM goto errout;
260*10023SGordon.Ross@Sun.COM }
261*10023SGordon.Ross@Sun.COM sndcall.addr.maxlen = sizeof (sin);
262*10023SGordon.Ross@Sun.COM sndcall.addr.len = sizeof (sin);
263*10023SGordon.Ross@Sun.COM sndcall.addr.buf = (void *) &sin;
264*10023SGordon.Ross@Sun.COM sndcall.opt.len = 0;
265*10023SGordon.Ross@Sun.COM sndcall.udata.len = 0;
266*10023SGordon.Ross@Sun.COM if (t_connect(fd, &sndcall, NULL) < 0) {
267*10023SGordon.Ross@Sun.COM err = get_xti_err(fd);
268*10023SGordon.Ross@Sun.COM DPRINT("connect, err %d", err);
269*10023SGordon.Ross@Sun.COM goto errout;
270*10023SGordon.Ross@Sun.COM }
271*10023SGordon.Ross@Sun.COM
272*10023SGordon.Ross@Sun.COM DPRINT("tcp4: connected, fd=%d", fd);
273*10023SGordon.Ross@Sun.COM ctx->ct_tran_fd = fd;
274*10023SGordon.Ross@Sun.COM return (0);
275*10023SGordon.Ross@Sun.COM
276*10023SGordon.Ross@Sun.COM errout:
277*10023SGordon.Ross@Sun.COM close(fd);
278*10023SGordon.Ross@Sun.COM return (err);
279*10023SGordon.Ross@Sun.COM }
280*10023SGordon.Ross@Sun.COM
281*10023SGordon.Ross@Sun.COM /*
282*10023SGordon.Ross@Sun.COM * Open a NetBIOS connection (session, port 139)
283*10023SGordon.Ross@Sun.COM *
284*10023SGordon.Ross@Sun.COM * The optional name parameter, if passed, means
285*10023SGordon.Ross@Sun.COM * we found the sockaddr via NetBIOS name lookup,
286*10023SGordon.Ross@Sun.COM * and can just use that for our session request.
287*10023SGordon.Ross@Sun.COM * Otherwise (if name is NULL), we're connecting
288*10023SGordon.Ross@Sun.COM * by IP address, and need to come up with the
289*10023SGordon.Ross@Sun.COM * NetBIOS name by other means.
290*10023SGordon.Ross@Sun.COM */
291*10023SGordon.Ross@Sun.COM int
conn_nbt(struct smb_ctx * ctx,const struct sockaddr * saarg,char * name)292*10023SGordon.Ross@Sun.COM conn_nbt(struct smb_ctx *ctx, const struct sockaddr *saarg, char *name)
293*10023SGordon.Ross@Sun.COM {
294*10023SGordon.Ross@Sun.COM struct sockaddr_in sin;
295*10023SGordon.Ross@Sun.COM struct sockaddr *sa;
296*10023SGordon.Ross@Sun.COM char server[NB_NAMELEN];
297*10023SGordon.Ross@Sun.COM char workgroup[NB_NAMELEN];
298*10023SGordon.Ross@Sun.COM int err, nberr, port;
299*10023SGordon.Ross@Sun.COM
300*10023SGordon.Ross@Sun.COM bcopy(saarg, &sin, sizeof (sin));
301*10023SGordon.Ross@Sun.COM sa = (struct sockaddr *)&sin;
302*10023SGordon.Ross@Sun.COM
303*10023SGordon.Ross@Sun.COM switch (sin.sin_family) {
304*10023SGordon.Ross@Sun.COM case AF_NETBIOS: /* our fake AF */
305*10023SGordon.Ross@Sun.COM sin.sin_family = AF_INET;
306*10023SGordon.Ross@Sun.COM break;
307*10023SGordon.Ross@Sun.COM case AF_INET:
308*10023SGordon.Ross@Sun.COM break;
309*10023SGordon.Ross@Sun.COM default:
310*10023SGordon.Ross@Sun.COM DPRINT("bad af %d", sin.sin_family);
311*10023SGordon.Ross@Sun.COM return (EINVAL);
312*10023SGordon.Ross@Sun.COM }
313*10023SGordon.Ross@Sun.COM port = IPPORT_NETBIOS_SSN;
314*10023SGordon.Ross@Sun.COM
315*10023SGordon.Ross@Sun.COM /*
316*10023SGordon.Ross@Sun.COM * If we have a NetBIOS name, just use it.
317*10023SGordon.Ross@Sun.COM * This is the path taken when we've done a
318*10023SGordon.Ross@Sun.COM * NetBIOS name lookup on this name to get
319*10023SGordon.Ross@Sun.COM * the IP address in the passed sa. Otherwise,
320*10023SGordon.Ross@Sun.COM * we're connecting by IP address, and need to
321*10023SGordon.Ross@Sun.COM * figure out what NetBIOS name to use.
322*10023SGordon.Ross@Sun.COM */
323*10023SGordon.Ross@Sun.COM if (name) {
324*10023SGordon.Ross@Sun.COM strlcpy(server, name, sizeof (server));
325*10023SGordon.Ross@Sun.COM DPRINT("given name: %s", server);
326*10023SGordon.Ross@Sun.COM } else {
327*10023SGordon.Ross@Sun.COM /*
328*10023SGordon.Ross@Sun.COM *
329*10023SGordon.Ross@Sun.COM * Try a NetBIOS node status query,
330*10023SGordon.Ross@Sun.COM * which searches for a type=[20] name.
331*10023SGordon.Ross@Sun.COM * If that doesn't work, just use the
332*10023SGordon.Ross@Sun.COM * (fake) "*SMBSERVER" name.
333*10023SGordon.Ross@Sun.COM */
334*10023SGordon.Ross@Sun.COM DPRINT("try node status");
335*10023SGordon.Ross@Sun.COM server[0] = '\0';
336*10023SGordon.Ross@Sun.COM nberr = nbns_getnodestatus(ctx->ct_nb,
337*10023SGordon.Ross@Sun.COM &sin.sin_addr, server, workgroup);
338*10023SGordon.Ross@Sun.COM if (nberr == 0 && server[0] != '\0') {
339*10023SGordon.Ross@Sun.COM /* Found the name. Save for reconnect. */
340*10023SGordon.Ross@Sun.COM DPRINT("found name: %s", server);
341*10023SGordon.Ross@Sun.COM strlcpy(ctx->ct_srvname, server,
342*10023SGordon.Ross@Sun.COM sizeof (ctx->ct_srvname));
343*10023SGordon.Ross@Sun.COM } else {
344*10023SGordon.Ross@Sun.COM DPRINT("getnodestatus, nberr %d", nberr);
345*10023SGordon.Ross@Sun.COM strlcpy(server, "*SMBSERVER", sizeof (server));
346*10023SGordon.Ross@Sun.COM }
347*10023SGordon.Ross@Sun.COM }
348*10023SGordon.Ross@Sun.COM
349*10023SGordon.Ross@Sun.COM /*
350*10023SGordon.Ross@Sun.COM * Establish the TCP connection.
351*10023SGordon.Ross@Sun.COM * Careful to close it on errors.
352*10023SGordon.Ross@Sun.COM */
353*10023SGordon.Ross@Sun.COM if ((err = conn_tcp4(ctx, sa, port)) != 0) {
354*10023SGordon.Ross@Sun.COM DPRINT("TCP connect: err=%d", err);
355*10023SGordon.Ross@Sun.COM goto out;
356*10023SGordon.Ross@Sun.COM }
357*10023SGordon.Ross@Sun.COM
358*10023SGordon.Ross@Sun.COM /* Connected. Do NetBIOS session request. */
359*10023SGordon.Ross@Sun.COM err = nb_ssn_request(ctx, server);
360*10023SGordon.Ross@Sun.COM if (err)
361*10023SGordon.Ross@Sun.COM DPRINT("ssn_rq, err %d", err);
362*10023SGordon.Ross@Sun.COM
363*10023SGordon.Ross@Sun.COM out:
364*10023SGordon.Ross@Sun.COM if (err) {
365*10023SGordon.Ross@Sun.COM if (ctx->ct_tran_fd != -1) {
366*10023SGordon.Ross@Sun.COM close(ctx->ct_tran_fd);
367*10023SGordon.Ross@Sun.COM ctx->ct_tran_fd = -1;
368*10023SGordon.Ross@Sun.COM }
369*10023SGordon.Ross@Sun.COM }
370*10023SGordon.Ross@Sun.COM return (err);
371*10023SGordon.Ross@Sun.COM }
372*10023SGordon.Ross@Sun.COM
373*10023SGordon.Ross@Sun.COM /*
374*10023SGordon.Ross@Sun.COM * Make a new connection, or reconnect.
375*10023SGordon.Ross@Sun.COM */
376*10023SGordon.Ross@Sun.COM int
smb_iod_connect(smb_ctx_t * ctx)377*10023SGordon.Ross@Sun.COM smb_iod_connect(smb_ctx_t *ctx)
378*10023SGordon.Ross@Sun.COM {
379*10023SGordon.Ross@Sun.COM struct sockaddr *sa;
380*10023SGordon.Ross@Sun.COM int err, err2;
381*10023SGordon.Ross@Sun.COM struct mbdata blob;
382*10023SGordon.Ross@Sun.COM
383*10023SGordon.Ross@Sun.COM memset(&blob, 0, sizeof (blob));
384*10023SGordon.Ross@Sun.COM
385*10023SGordon.Ross@Sun.COM if (ctx->ct_srvname[0] == '\0') {
386*10023SGordon.Ross@Sun.COM DPRINT("sername not set!");
387*10023SGordon.Ross@Sun.COM return (EINVAL);
388*10023SGordon.Ross@Sun.COM }
389*10023SGordon.Ross@Sun.COM DPRINT("server: %s", ctx->ct_srvname);
390*10023SGordon.Ross@Sun.COM
391*10023SGordon.Ross@Sun.COM if (smb_debug)
392*10023SGordon.Ross@Sun.COM dump_ctx("smb_iod_connect", ctx);
393*10023SGordon.Ross@Sun.COM
394*10023SGordon.Ross@Sun.COM /*
395*10023SGordon.Ross@Sun.COM * This may be a reconnect, so
396*10023SGordon.Ross@Sun.COM * cleanup if necessary.
397*10023SGordon.Ross@Sun.COM */
398*10023SGordon.Ross@Sun.COM if (ctx->ct_tran_fd != -1) {
399*10023SGordon.Ross@Sun.COM close(ctx->ct_tran_fd);
400*10023SGordon.Ross@Sun.COM ctx->ct_tran_fd = -1;
401*10023SGordon.Ross@Sun.COM }
402*10023SGordon.Ross@Sun.COM
403*10023SGordon.Ross@Sun.COM /*
404*10023SGordon.Ross@Sun.COM * Get local machine name.
405*10023SGordon.Ross@Sun.COM * Full name - not a NetBIOS name.
406*10023SGordon.Ross@Sun.COM */
407*10023SGordon.Ross@Sun.COM if (ctx->ct_locname == NULL) {
408*10023SGordon.Ross@Sun.COM err = smb_getlocalname(&ctx->ct_locname);
409*10023SGordon.Ross@Sun.COM if (err) {
410*10023SGordon.Ross@Sun.COM smb_error(dgettext(TEXT_DOMAIN,
411*10023SGordon.Ross@Sun.COM "can't get local name"), err);
412*10023SGordon.Ross@Sun.COM return (err);
413*10023SGordon.Ross@Sun.COM }
414*10023SGordon.Ross@Sun.COM }
415*10023SGordon.Ross@Sun.COM
416*10023SGordon.Ross@Sun.COM /*
417*10023SGordon.Ross@Sun.COM * We're called with each IP address
418*10023SGordon.Ross@Sun.COM * already copied into ct_srvaddr.
419*10023SGordon.Ross@Sun.COM */
420*10023SGordon.Ross@Sun.COM ctx->ct_flags |= SMBCF_RESOLVED;
421*10023SGordon.Ross@Sun.COM
422*10023SGordon.Ross@Sun.COM sa = &ctx->ct_srvaddr.sa;
423*10023SGordon.Ross@Sun.COM switch (sa->sa_family) {
424*10023SGordon.Ross@Sun.COM
425*10023SGordon.Ross@Sun.COM case AF_INET6:
426*10023SGordon.Ross@Sun.COM err = conn_tcp6(ctx, sa, IPPORT_SMB);
427*10023SGordon.Ross@Sun.COM break;
428*10023SGordon.Ross@Sun.COM
429*10023SGordon.Ross@Sun.COM case AF_INET:
430*10023SGordon.Ross@Sun.COM err = conn_tcp4(ctx, sa, IPPORT_SMB);
431*10023SGordon.Ross@Sun.COM /*
432*10023SGordon.Ross@Sun.COM * If port 445 was not listening, try port 139.
433*10023SGordon.Ross@Sun.COM * Note: Not doing NetBIOS name lookup here.
434*10023SGordon.Ross@Sun.COM * We already have the IP address.
435*10023SGordon.Ross@Sun.COM */
436*10023SGordon.Ross@Sun.COM switch (err) {
437*10023SGordon.Ross@Sun.COM case ECONNRESET:
438*10023SGordon.Ross@Sun.COM case ECONNREFUSED:
439*10023SGordon.Ross@Sun.COM err2 = conn_nbt(ctx, sa, NULL);
440*10023SGordon.Ross@Sun.COM if (err2 == 0)
441*10023SGordon.Ross@Sun.COM err = 0;
442*10023SGordon.Ross@Sun.COM }
443*10023SGordon.Ross@Sun.COM break;
444*10023SGordon.Ross@Sun.COM
445*10023SGordon.Ross@Sun.COM case AF_NETBIOS:
446*10023SGordon.Ross@Sun.COM /* Like AF_INET, but use NetBIOS ssn. */
447*10023SGordon.Ross@Sun.COM err = conn_nbt(ctx, sa, ctx->ct_srvname);
448*10023SGordon.Ross@Sun.COM break;
449*10023SGordon.Ross@Sun.COM
450*10023SGordon.Ross@Sun.COM default:
451*10023SGordon.Ross@Sun.COM DPRINT("skipped family %d", sa->sa_family);
452*10023SGordon.Ross@Sun.COM err = EPROTONOSUPPORT;
453*10023SGordon.Ross@Sun.COM break;
454*10023SGordon.Ross@Sun.COM }
455*10023SGordon.Ross@Sun.COM
456*10023SGordon.Ross@Sun.COM
457*10023SGordon.Ross@Sun.COM if (err) {
458*10023SGordon.Ross@Sun.COM DPRINT("connect, err=%d", err);
459*10023SGordon.Ross@Sun.COM return (err);
460*10023SGordon.Ross@Sun.COM }
461*10023SGordon.Ross@Sun.COM
462*10023SGordon.Ross@Sun.COM /*
463*10023SGordon.Ross@Sun.COM * SMB Negotiate Protocol and
464*10023SGordon.Ross@Sun.COM * SMB Session Setup, one of 3 ways:
465*10023SGordon.Ross@Sun.COM * NULL session
466*10023SGordon.Ross@Sun.COM * Extended security,
467*10023SGordon.Ross@Sun.COM * NTLM (v2, v1)
468*10023SGordon.Ross@Sun.COM *
469*10023SGordon.Ross@Sun.COM * Empty user name means an explicit request for
470*10023SGordon.Ross@Sun.COM * NULL session setup. No fall-back logic here.
471*10023SGordon.Ross@Sun.COM *
472*10023SGordon.Ross@Sun.COM * For NULL session, don't offer extended security.
473*10023SGordon.Ross@Sun.COM * That's a lot simpler than dealing with NTLMSSP.
474*10023SGordon.Ross@Sun.COM */
475*10023SGordon.Ross@Sun.COM if (ctx->ct_user[0] == '\0') {
476*10023SGordon.Ross@Sun.COM ctx->ct_vopt &= ~SMBVOPT_EXT_SEC;
477*10023SGordon.Ross@Sun.COM err = smb_negprot(ctx, &blob);
478*10023SGordon.Ross@Sun.COM if (err)
479*10023SGordon.Ross@Sun.COM goto out;
480*10023SGordon.Ross@Sun.COM err = smb_ssnsetup_null(ctx);
481*10023SGordon.Ross@Sun.COM } else {
482*10023SGordon.Ross@Sun.COM /*
483*10023SGordon.Ross@Sun.COM * Do SMB Negotiate Protocol.
484*10023SGordon.Ross@Sun.COM */
485*10023SGordon.Ross@Sun.COM err = smb_negprot(ctx, &blob);
486*10023SGordon.Ross@Sun.COM if (err)
487*10023SGordon.Ross@Sun.COM goto out;
488*10023SGordon.Ross@Sun.COM
489*10023SGordon.Ross@Sun.COM /*
490*10023SGordon.Ross@Sun.COM * Do SMB Session Setup (authenticate)
491*10023SGordon.Ross@Sun.COM *
492*10023SGordon.Ross@Sun.COM * If the server negotiated extended security,
493*10023SGordon.Ross@Sun.COM * run the SPNEGO state machine.
494*10023SGordon.Ross@Sun.COM */
495*10023SGordon.Ross@Sun.COM if (ctx->ct_sopt.sv_caps & SMB_CAP_EXT_SECURITY) {
496*10023SGordon.Ross@Sun.COM err = smb_ssnsetup_spnego(ctx, &blob);
497*10023SGordon.Ross@Sun.COM } else {
498*10023SGordon.Ross@Sun.COM /*
499*10023SGordon.Ross@Sun.COM * Server did NOT negotiate extended security.
500*10023SGordon.Ross@Sun.COM * Try NTLMv2, NTLMv1 (if enabled).
501*10023SGordon.Ross@Sun.COM */
502*10023SGordon.Ross@Sun.COM if ((ctx->ct_authflags &
503*10023SGordon.Ross@Sun.COM (SMB_AT_NTLM2 | SMB_AT_NTLM1)) == 0) {
504*10023SGordon.Ross@Sun.COM /*
505*10023SGordon.Ross@Sun.COM * Don't return EAUTH, because a
506*10023SGordon.Ross@Sun.COM * new password will not help.
507*10023SGordon.Ross@Sun.COM */
508*10023SGordon.Ross@Sun.COM DPRINT("No NTLM authflags");
509*10023SGordon.Ross@Sun.COM err = ENOTSUP;
510*10023SGordon.Ross@Sun.COM goto out;
511*10023SGordon.Ross@Sun.COM }
512*10023SGordon.Ross@Sun.COM if (ctx->ct_authflags & SMB_AT_NTLM2)
513*10023SGordon.Ross@Sun.COM err = smb_ssnsetup_ntlm2(ctx);
514*10023SGordon.Ross@Sun.COM else
515*10023SGordon.Ross@Sun.COM err = EAUTH;
516*10023SGordon.Ross@Sun.COM if (err == EAUTH && 0 !=
517*10023SGordon.Ross@Sun.COM (ctx->ct_authflags & SMB_AT_NTLM1))
518*10023SGordon.Ross@Sun.COM err = smb_ssnsetup_ntlm1(ctx);
519*10023SGordon.Ross@Sun.COM }
520*10023SGordon.Ross@Sun.COM }
521*10023SGordon.Ross@Sun.COM
522*10023SGordon.Ross@Sun.COM /* Tell library code we have a session. */
523*10023SGordon.Ross@Sun.COM ctx->ct_flags |= SMBCF_RESOLVED | SMBCF_SSNACTIVE;
524*10023SGordon.Ross@Sun.COM
525*10023SGordon.Ross@Sun.COM out:
526*10023SGordon.Ross@Sun.COM mb_done(&blob);
527*10023SGordon.Ross@Sun.COM
528*10023SGordon.Ross@Sun.COM if (err) {
529*10023SGordon.Ross@Sun.COM close(ctx->ct_tran_fd);
530*10023SGordon.Ross@Sun.COM ctx->ct_tran_fd = -1;
531*10023SGordon.Ross@Sun.COM } else
532*10023SGordon.Ross@Sun.COM DPRINT("tran_fd = %d", ctx->ct_tran_fd);
533*10023SGordon.Ross@Sun.COM
534*10023SGordon.Ross@Sun.COM return (err);
535*10023SGordon.Ross@Sun.COM }
536