1*10023SGordon.Ross@Sun.COM /* 2*10023SGordon.Ross@Sun.COM * CDDL HEADER START 3*10023SGordon.Ross@Sun.COM * 4*10023SGordon.Ross@Sun.COM * The contents of this file are subject to the terms of the 5*10023SGordon.Ross@Sun.COM * Common Development and Distribution License (the "License"). 6*10023SGordon.Ross@Sun.COM * You may not use this file except in compliance with the License. 7*10023SGordon.Ross@Sun.COM * 8*10023SGordon.Ross@Sun.COM * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9*10023SGordon.Ross@Sun.COM * or http://www.opensolaris.org/os/licensing. 10*10023SGordon.Ross@Sun.COM * See the License for the specific language governing permissions 11*10023SGordon.Ross@Sun.COM * and limitations under the License. 12*10023SGordon.Ross@Sun.COM * 13*10023SGordon.Ross@Sun.COM * When distributing Covered Code, include this CDDL HEADER in each 14*10023SGordon.Ross@Sun.COM * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15*10023SGordon.Ross@Sun.COM * If applicable, add the following below this CDDL HEADER, with the 16*10023SGordon.Ross@Sun.COM * fields enclosed by brackets "[]" replaced with your own identifying 17*10023SGordon.Ross@Sun.COM * information: Portions Copyright [yyyy] [name of copyright owner] 18*10023SGordon.Ross@Sun.COM * 19*10023SGordon.Ross@Sun.COM * CDDL HEADER END 20*10023SGordon.Ross@Sun.COM */ 21*10023SGordon.Ross@Sun.COM 22*10023SGordon.Ross@Sun.COM /* 23*10023SGordon.Ross@Sun.COM * Copyright 2009 Sun Microsystems, Inc. All rights reserved. 24*10023SGordon.Ross@Sun.COM * Use is subject to license terms. 25*10023SGordon.Ross@Sun.COM */ 26*10023SGordon.Ross@Sun.COM 27*10023SGordon.Ross@Sun.COM /* 28*10023SGordon.Ross@Sun.COM * Functions to setup connections (TCP and/or NetBIOS) 29*10023SGordon.Ross@Sun.COM * This has the fall-back logic for IP6, IP4, NBT 30*10023SGordon.Ross@Sun.COM */ 31*10023SGordon.Ross@Sun.COM 32*10023SGordon.Ross@Sun.COM #include <errno.h> 33*10023SGordon.Ross@Sun.COM #include <stdio.h> 34*10023SGordon.Ross@Sun.COM #include <string.h> 35*10023SGordon.Ross@Sun.COM #include <strings.h> 36*10023SGordon.Ross@Sun.COM #include <stdlib.h> 37*10023SGordon.Ross@Sun.COM #include <unistd.h> 38*10023SGordon.Ross@Sun.COM #include <netdb.h> 39*10023SGordon.Ross@Sun.COM #include <libintl.h> 40*10023SGordon.Ross@Sun.COM #include <xti.h> 41*10023SGordon.Ross@Sun.COM #include <assert.h> 42*10023SGordon.Ross@Sun.COM 43*10023SGordon.Ross@Sun.COM #include <sys/types.h> 44*10023SGordon.Ross@Sun.COM #include <sys/time.h> 45*10023SGordon.Ross@Sun.COM #include <sys/byteorder.h> 46*10023SGordon.Ross@Sun.COM #include <sys/socket.h> 47*10023SGordon.Ross@Sun.COM #include <sys/fcntl.h> 48*10023SGordon.Ross@Sun.COM 49*10023SGordon.Ross@Sun.COM #include <netinet/in.h> 50*10023SGordon.Ross@Sun.COM #include <netinet/tcp.h> 51*10023SGordon.Ross@Sun.COM #include <arpa/inet.h> 52*10023SGordon.Ross@Sun.COM 53*10023SGordon.Ross@Sun.COM #include <netsmb/smb.h> 54*10023SGordon.Ross@Sun.COM #include <netsmb/smb_lib.h> 55*10023SGordon.Ross@Sun.COM #include <netsmb/netbios.h> 56*10023SGordon.Ross@Sun.COM #include <netsmb/nb_lib.h> 57*10023SGordon.Ross@Sun.COM #include <netsmb/smb_dev.h> 58*10023SGordon.Ross@Sun.COM 59*10023SGordon.Ross@Sun.COM #include "charsets.h" 60*10023SGordon.Ross@Sun.COM #include "private.h" 61*10023SGordon.Ross@Sun.COM 62*10023SGordon.Ross@Sun.COM /* 63*10023SGordon.Ross@Sun.COM * SMB messages are up to 64K. 64*10023SGordon.Ross@Sun.COM * Let's leave room for two. 65*10023SGordon.Ross@Sun.COM */ 66*10023SGordon.Ross@Sun.COM static int smb_tcpsndbuf = 0x20000; 67*10023SGordon.Ross@Sun.COM static int smb_tcprcvbuf = 0x20000; 68*10023SGordon.Ross@Sun.COM static int smb_connect_timeout = 30; /* seconds */ 69*10023SGordon.Ross@Sun.COM int smb_recv_timeout = 30; /* seconds */ 70*10023SGordon.Ross@Sun.COM 71*10023SGordon.Ross@Sun.COM int conn_tcp6(struct smb_ctx *, const struct sockaddr *, int); 72*10023SGordon.Ross@Sun.COM int conn_tcp4(struct smb_ctx *, const struct sockaddr *, int); 73*10023SGordon.Ross@Sun.COM int conn_nbt(struct smb_ctx *, const struct sockaddr *, char *); 74*10023SGordon.Ross@Sun.COM 75*10023SGordon.Ross@Sun.COM /* 76*10023SGordon.Ross@Sun.COM * Internal set sockopt for int-sized options. 77*10023SGordon.Ross@Sun.COM * Borrowed from: libnsl/rpc/ti_opts.c 78*10023SGordon.Ross@Sun.COM */ 79*10023SGordon.Ross@Sun.COM static int 80*10023SGordon.Ross@Sun.COM smb_setopt_int(int fd, int level, int name, int val) 81*10023SGordon.Ross@Sun.COM { 82*10023SGordon.Ross@Sun.COM struct t_optmgmt oreq, ores; 83*10023SGordon.Ross@Sun.COM struct { 84*10023SGordon.Ross@Sun.COM struct t_opthdr oh; 85*10023SGordon.Ross@Sun.COM int ival; 86*10023SGordon.Ross@Sun.COM } opts; 87*10023SGordon.Ross@Sun.COM 88*10023SGordon.Ross@Sun.COM /* opt header */ 89*10023SGordon.Ross@Sun.COM opts.oh.len = sizeof (opts); 90*10023SGordon.Ross@Sun.COM opts.oh.level = level; 91*10023SGordon.Ross@Sun.COM opts.oh.name = name; 92*10023SGordon.Ross@Sun.COM opts.oh.status = 0; 93*10023SGordon.Ross@Sun.COM opts.ival = val; 94*10023SGordon.Ross@Sun.COM 95*10023SGordon.Ross@Sun.COM oreq.flags = T_NEGOTIATE; 96*10023SGordon.Ross@Sun.COM oreq.opt.buf = (void *)&opts; 97*10023SGordon.Ross@Sun.COM oreq.opt.len = sizeof (opts); 98*10023SGordon.Ross@Sun.COM 99*10023SGordon.Ross@Sun.COM ores.flags = 0; 100*10023SGordon.Ross@Sun.COM ores.opt.buf = NULL; 101*10023SGordon.Ross@Sun.COM ores.opt.maxlen = 0; 102*10023SGordon.Ross@Sun.COM 103*10023SGordon.Ross@Sun.COM if (t_optmgmt(fd, &oreq, &ores) < 0) { 104*10023SGordon.Ross@Sun.COM DPRINT("t_opgmgnt, t_errno = %d", t_errno); 105*10023SGordon.Ross@Sun.COM if (t_errno == TSYSERR) 106*10023SGordon.Ross@Sun.COM return (errno); 107*10023SGordon.Ross@Sun.COM return (EPROTO); 108*10023SGordon.Ross@Sun.COM } 109*10023SGordon.Ross@Sun.COM if (ores.flags != T_SUCCESS) { 110*10023SGordon.Ross@Sun.COM DPRINT("flags 0x%x, status 0x%x", 111*10023SGordon.Ross@Sun.COM (int)ores.flags, (int)opts.oh.status); 112*10023SGordon.Ross@Sun.COM return (EPROTO); 113*10023SGordon.Ross@Sun.COM } 114*10023SGordon.Ross@Sun.COM 115*10023SGordon.Ross@Sun.COM return (0); 116*10023SGordon.Ross@Sun.COM } 117*10023SGordon.Ross@Sun.COM 118*10023SGordon.Ross@Sun.COM static int 119*10023SGordon.Ross@Sun.COM smb_setopts(int fd) 120*10023SGordon.Ross@Sun.COM { 121*10023SGordon.Ross@Sun.COM int err; 122*10023SGordon.Ross@Sun.COM 123*10023SGordon.Ross@Sun.COM /* 124*10023SGordon.Ross@Sun.COM * Set various socket/TCP options. 125*10023SGordon.Ross@Sun.COM * Failures here are not fatal - 126*10023SGordon.Ross@Sun.COM * just log a complaint. 127*10023SGordon.Ross@Sun.COM * 128*10023SGordon.Ross@Sun.COM * We don't need these two: 129*10023SGordon.Ross@Sun.COM * SO_RCVTIMEO, SO_SNDTIMEO 130*10023SGordon.Ross@Sun.COM */ 131*10023SGordon.Ross@Sun.COM 132*10023SGordon.Ross@Sun.COM err = smb_setopt_int(fd, SOL_SOCKET, SO_SNDBUF, smb_tcpsndbuf); 133*10023SGordon.Ross@Sun.COM if (err) { 134*10023SGordon.Ross@Sun.COM DPRINT("set SO_SNDBUF, err %d", err); 135*10023SGordon.Ross@Sun.COM } 136*10023SGordon.Ross@Sun.COM 137*10023SGordon.Ross@Sun.COM err = smb_setopt_int(fd, SOL_SOCKET, SO_RCVBUF, smb_tcprcvbuf); 138*10023SGordon.Ross@Sun.COM if (err) { 139*10023SGordon.Ross@Sun.COM DPRINT("set SO_RCVBUF, err %d", err); 140*10023SGordon.Ross@Sun.COM } 141*10023SGordon.Ross@Sun.COM 142*10023SGordon.Ross@Sun.COM err = smb_setopt_int(fd, SOL_SOCKET, SO_KEEPALIVE, 1); 143*10023SGordon.Ross@Sun.COM if (err) { 144*10023SGordon.Ross@Sun.COM DPRINT("set SO_KEEPALIVE, err %d", err); 145*10023SGordon.Ross@Sun.COM } 146*10023SGordon.Ross@Sun.COM 147*10023SGordon.Ross@Sun.COM err = smb_setopt_int(fd, IPPROTO_TCP, TCP_NODELAY, 1); 148*10023SGordon.Ross@Sun.COM if (err) { 149*10023SGordon.Ross@Sun.COM DPRINT("set TCP_NODELAY, err %d", err); 150*10023SGordon.Ross@Sun.COM } 151*10023SGordon.Ross@Sun.COM 152*10023SGordon.Ross@Sun.COM /* Set the connect timeout (in milliseconds). */ 153*10023SGordon.Ross@Sun.COM err = smb_setopt_int(fd, IPPROTO_TCP, 154*10023SGordon.Ross@Sun.COM TCP_CONN_ABORT_THRESHOLD, 155*10023SGordon.Ross@Sun.COM smb_connect_timeout * 1000); 156*10023SGordon.Ross@Sun.COM if (err) { 157*10023SGordon.Ross@Sun.COM DPRINT("set connect timeout, err %d", err); 158*10023SGordon.Ross@Sun.COM } 159*10023SGordon.Ross@Sun.COM return (0); 160*10023SGordon.Ross@Sun.COM } 161*10023SGordon.Ross@Sun.COM 162*10023SGordon.Ross@Sun.COM 163*10023SGordon.Ross@Sun.COM int 164*10023SGordon.Ross@Sun.COM conn_tcp6(struct smb_ctx *ctx, const struct sockaddr *sa, int port) 165*10023SGordon.Ross@Sun.COM { 166*10023SGordon.Ross@Sun.COM struct sockaddr_in6 sin6; 167*10023SGordon.Ross@Sun.COM char *dev = "/dev/tcp6"; 168*10023SGordon.Ross@Sun.COM char paddrbuf[INET6_ADDRSTRLEN]; 169*10023SGordon.Ross@Sun.COM struct t_call sndcall; 170*10023SGordon.Ross@Sun.COM int fd, err; 171*10023SGordon.Ross@Sun.COM 172*10023SGordon.Ross@Sun.COM if (sa->sa_family != AF_INET6) { 173*10023SGordon.Ross@Sun.COM DPRINT("bad af %d", sa->sa_family); 174*10023SGordon.Ross@Sun.COM return (EINVAL); 175*10023SGordon.Ross@Sun.COM } 176*10023SGordon.Ross@Sun.COM bcopy(sa, &sin6, sizeof (sin6)); 177*10023SGordon.Ross@Sun.COM sin6.sin6_port = htons(port); 178*10023SGordon.Ross@Sun.COM 179*10023SGordon.Ross@Sun.COM DPRINT("tcp6: %s (%d)", 180*10023SGordon.Ross@Sun.COM inet_ntop(AF_INET6, &sin6.sin6_addr, 181*10023SGordon.Ross@Sun.COM paddrbuf, sizeof (paddrbuf)), port); 182*10023SGordon.Ross@Sun.COM 183*10023SGordon.Ross@Sun.COM fd = t_open(dev, O_RDWR, NULL); 184*10023SGordon.Ross@Sun.COM if (fd < 0) { 185*10023SGordon.Ross@Sun.COM /* Assume t_errno = TSYSERR */ 186*10023SGordon.Ross@Sun.COM err = errno; 187*10023SGordon.Ross@Sun.COM perror(dev); 188*10023SGordon.Ross@Sun.COM return (err); 189*10023SGordon.Ross@Sun.COM } 190*10023SGordon.Ross@Sun.COM if ((err = smb_setopts(fd)) != 0) 191*10023SGordon.Ross@Sun.COM goto errout; 192*10023SGordon.Ross@Sun.COM if (t_bind(fd, NULL, NULL) < 0) { 193*10023SGordon.Ross@Sun.COM DPRINT("t_bind t_errno %d", t_errno); 194*10023SGordon.Ross@Sun.COM if (t_errno == TSYSERR) 195*10023SGordon.Ross@Sun.COM err = errno; 196*10023SGordon.Ross@Sun.COM else 197*10023SGordon.Ross@Sun.COM err = EPROTO; 198*10023SGordon.Ross@Sun.COM goto errout; 199*10023SGordon.Ross@Sun.COM } 200*10023SGordon.Ross@Sun.COM sndcall.addr.maxlen = sizeof (sin6); 201*10023SGordon.Ross@Sun.COM sndcall.addr.len = sizeof (sin6); 202*10023SGordon.Ross@Sun.COM sndcall.addr.buf = (void *) &sin6; 203*10023SGordon.Ross@Sun.COM sndcall.opt.len = 0; 204*10023SGordon.Ross@Sun.COM sndcall.udata.len = 0; 205*10023SGordon.Ross@Sun.COM if (t_connect(fd, &sndcall, NULL) < 0) { 206*10023SGordon.Ross@Sun.COM err = get_xti_err(fd); 207*10023SGordon.Ross@Sun.COM DPRINT("connect, err %d", err); 208*10023SGordon.Ross@Sun.COM goto errout; 209*10023SGordon.Ross@Sun.COM } 210*10023SGordon.Ross@Sun.COM 211*10023SGordon.Ross@Sun.COM DPRINT("tcp6: connected, fd=%d", fd); 212*10023SGordon.Ross@Sun.COM ctx->ct_tran_fd = fd; 213*10023SGordon.Ross@Sun.COM return (0); 214*10023SGordon.Ross@Sun.COM 215*10023SGordon.Ross@Sun.COM errout: 216*10023SGordon.Ross@Sun.COM close(fd); 217*10023SGordon.Ross@Sun.COM return (err); 218*10023SGordon.Ross@Sun.COM } 219*10023SGordon.Ross@Sun.COM 220*10023SGordon.Ross@Sun.COM /* 221*10023SGordon.Ross@Sun.COM * This is used for both SMB over TCP (port 445) 222*10023SGordon.Ross@Sun.COM * and NetBIOS - see conn_nbt(). 223*10023SGordon.Ross@Sun.COM */ 224*10023SGordon.Ross@Sun.COM int 225*10023SGordon.Ross@Sun.COM conn_tcp4(struct smb_ctx *ctx, const struct sockaddr *sa, int port) 226*10023SGordon.Ross@Sun.COM { 227*10023SGordon.Ross@Sun.COM struct sockaddr_in sin; 228*10023SGordon.Ross@Sun.COM char *dev = "/dev/tcp"; 229*10023SGordon.Ross@Sun.COM char paddrbuf[INET_ADDRSTRLEN]; 230*10023SGordon.Ross@Sun.COM struct t_call sndcall; 231*10023SGordon.Ross@Sun.COM int fd, err; 232*10023SGordon.Ross@Sun.COM 233*10023SGordon.Ross@Sun.COM if (sa->sa_family != AF_INET) { 234*10023SGordon.Ross@Sun.COM DPRINT("bad af %d", sa->sa_family); 235*10023SGordon.Ross@Sun.COM return (EINVAL); 236*10023SGordon.Ross@Sun.COM } 237*10023SGordon.Ross@Sun.COM bcopy(sa, &sin, sizeof (sin)); 238*10023SGordon.Ross@Sun.COM sin.sin_port = htons(port); 239*10023SGordon.Ross@Sun.COM 240*10023SGordon.Ross@Sun.COM DPRINT("tcp4: %s (%d)", 241*10023SGordon.Ross@Sun.COM inet_ntop(AF_INET, &sin.sin_addr, 242*10023SGordon.Ross@Sun.COM paddrbuf, sizeof (paddrbuf)), port); 243*10023SGordon.Ross@Sun.COM 244*10023SGordon.Ross@Sun.COM fd = t_open(dev, O_RDWR, NULL); 245*10023SGordon.Ross@Sun.COM if (fd < 0) { 246*10023SGordon.Ross@Sun.COM /* Assume t_errno = TSYSERR */ 247*10023SGordon.Ross@Sun.COM err = errno; 248*10023SGordon.Ross@Sun.COM perror(dev); 249*10023SGordon.Ross@Sun.COM return (err); 250*10023SGordon.Ross@Sun.COM } 251*10023SGordon.Ross@Sun.COM if ((err = smb_setopts(fd)) != 0) 252*10023SGordon.Ross@Sun.COM goto errout; 253*10023SGordon.Ross@Sun.COM if (t_bind(fd, NULL, NULL) < 0) { 254*10023SGordon.Ross@Sun.COM DPRINT("t_bind t_errno %d", t_errno); 255*10023SGordon.Ross@Sun.COM if (t_errno == TSYSERR) 256*10023SGordon.Ross@Sun.COM err = errno; 257*10023SGordon.Ross@Sun.COM else 258*10023SGordon.Ross@Sun.COM err = EPROTO; 259*10023SGordon.Ross@Sun.COM goto errout; 260*10023SGordon.Ross@Sun.COM } 261*10023SGordon.Ross@Sun.COM sndcall.addr.maxlen = sizeof (sin); 262*10023SGordon.Ross@Sun.COM sndcall.addr.len = sizeof (sin); 263*10023SGordon.Ross@Sun.COM sndcall.addr.buf = (void *) &sin; 264*10023SGordon.Ross@Sun.COM sndcall.opt.len = 0; 265*10023SGordon.Ross@Sun.COM sndcall.udata.len = 0; 266*10023SGordon.Ross@Sun.COM if (t_connect(fd, &sndcall, NULL) < 0) { 267*10023SGordon.Ross@Sun.COM err = get_xti_err(fd); 268*10023SGordon.Ross@Sun.COM DPRINT("connect, err %d", err); 269*10023SGordon.Ross@Sun.COM goto errout; 270*10023SGordon.Ross@Sun.COM } 271*10023SGordon.Ross@Sun.COM 272*10023SGordon.Ross@Sun.COM DPRINT("tcp4: connected, fd=%d", fd); 273*10023SGordon.Ross@Sun.COM ctx->ct_tran_fd = fd; 274*10023SGordon.Ross@Sun.COM return (0); 275*10023SGordon.Ross@Sun.COM 276*10023SGordon.Ross@Sun.COM errout: 277*10023SGordon.Ross@Sun.COM close(fd); 278*10023SGordon.Ross@Sun.COM return (err); 279*10023SGordon.Ross@Sun.COM } 280*10023SGordon.Ross@Sun.COM 281*10023SGordon.Ross@Sun.COM /* 282*10023SGordon.Ross@Sun.COM * Open a NetBIOS connection (session, port 139) 283*10023SGordon.Ross@Sun.COM * 284*10023SGordon.Ross@Sun.COM * The optional name parameter, if passed, means 285*10023SGordon.Ross@Sun.COM * we found the sockaddr via NetBIOS name lookup, 286*10023SGordon.Ross@Sun.COM * and can just use that for our session request. 287*10023SGordon.Ross@Sun.COM * Otherwise (if name is NULL), we're connecting 288*10023SGordon.Ross@Sun.COM * by IP address, and need to come up with the 289*10023SGordon.Ross@Sun.COM * NetBIOS name by other means. 290*10023SGordon.Ross@Sun.COM */ 291*10023SGordon.Ross@Sun.COM int 292*10023SGordon.Ross@Sun.COM conn_nbt(struct smb_ctx *ctx, const struct sockaddr *saarg, char *name) 293*10023SGordon.Ross@Sun.COM { 294*10023SGordon.Ross@Sun.COM struct sockaddr_in sin; 295*10023SGordon.Ross@Sun.COM struct sockaddr *sa; 296*10023SGordon.Ross@Sun.COM char server[NB_NAMELEN]; 297*10023SGordon.Ross@Sun.COM char workgroup[NB_NAMELEN]; 298*10023SGordon.Ross@Sun.COM int err, nberr, port; 299*10023SGordon.Ross@Sun.COM 300*10023SGordon.Ross@Sun.COM bcopy(saarg, &sin, sizeof (sin)); 301*10023SGordon.Ross@Sun.COM sa = (struct sockaddr *)&sin; 302*10023SGordon.Ross@Sun.COM 303*10023SGordon.Ross@Sun.COM switch (sin.sin_family) { 304*10023SGordon.Ross@Sun.COM case AF_NETBIOS: /* our fake AF */ 305*10023SGordon.Ross@Sun.COM sin.sin_family = AF_INET; 306*10023SGordon.Ross@Sun.COM break; 307*10023SGordon.Ross@Sun.COM case AF_INET: 308*10023SGordon.Ross@Sun.COM break; 309*10023SGordon.Ross@Sun.COM default: 310*10023SGordon.Ross@Sun.COM DPRINT("bad af %d", sin.sin_family); 311*10023SGordon.Ross@Sun.COM return (EINVAL); 312*10023SGordon.Ross@Sun.COM } 313*10023SGordon.Ross@Sun.COM port = IPPORT_NETBIOS_SSN; 314*10023SGordon.Ross@Sun.COM 315*10023SGordon.Ross@Sun.COM /* 316*10023SGordon.Ross@Sun.COM * If we have a NetBIOS name, just use it. 317*10023SGordon.Ross@Sun.COM * This is the path taken when we've done a 318*10023SGordon.Ross@Sun.COM * NetBIOS name lookup on this name to get 319*10023SGordon.Ross@Sun.COM * the IP address in the passed sa. Otherwise, 320*10023SGordon.Ross@Sun.COM * we're connecting by IP address, and need to 321*10023SGordon.Ross@Sun.COM * figure out what NetBIOS name to use. 322*10023SGordon.Ross@Sun.COM */ 323*10023SGordon.Ross@Sun.COM if (name) { 324*10023SGordon.Ross@Sun.COM strlcpy(server, name, sizeof (server)); 325*10023SGordon.Ross@Sun.COM DPRINT("given name: %s", server); 326*10023SGordon.Ross@Sun.COM } else { 327*10023SGordon.Ross@Sun.COM /* 328*10023SGordon.Ross@Sun.COM * 329*10023SGordon.Ross@Sun.COM * Try a NetBIOS node status query, 330*10023SGordon.Ross@Sun.COM * which searches for a type=[20] name. 331*10023SGordon.Ross@Sun.COM * If that doesn't work, just use the 332*10023SGordon.Ross@Sun.COM * (fake) "*SMBSERVER" name. 333*10023SGordon.Ross@Sun.COM */ 334*10023SGordon.Ross@Sun.COM DPRINT("try node status"); 335*10023SGordon.Ross@Sun.COM server[0] = '\0'; 336*10023SGordon.Ross@Sun.COM nberr = nbns_getnodestatus(ctx->ct_nb, 337*10023SGordon.Ross@Sun.COM &sin.sin_addr, server, workgroup); 338*10023SGordon.Ross@Sun.COM if (nberr == 0 && server[0] != '\0') { 339*10023SGordon.Ross@Sun.COM /* Found the name. Save for reconnect. */ 340*10023SGordon.Ross@Sun.COM DPRINT("found name: %s", server); 341*10023SGordon.Ross@Sun.COM strlcpy(ctx->ct_srvname, server, 342*10023SGordon.Ross@Sun.COM sizeof (ctx->ct_srvname)); 343*10023SGordon.Ross@Sun.COM } else { 344*10023SGordon.Ross@Sun.COM DPRINT("getnodestatus, nberr %d", nberr); 345*10023SGordon.Ross@Sun.COM strlcpy(server, "*SMBSERVER", sizeof (server)); 346*10023SGordon.Ross@Sun.COM } 347*10023SGordon.Ross@Sun.COM } 348*10023SGordon.Ross@Sun.COM 349*10023SGordon.Ross@Sun.COM /* 350*10023SGordon.Ross@Sun.COM * Establish the TCP connection. 351*10023SGordon.Ross@Sun.COM * Careful to close it on errors. 352*10023SGordon.Ross@Sun.COM */ 353*10023SGordon.Ross@Sun.COM if ((err = conn_tcp4(ctx, sa, port)) != 0) { 354*10023SGordon.Ross@Sun.COM DPRINT("TCP connect: err=%d", err); 355*10023SGordon.Ross@Sun.COM goto out; 356*10023SGordon.Ross@Sun.COM } 357*10023SGordon.Ross@Sun.COM 358*10023SGordon.Ross@Sun.COM /* Connected. Do NetBIOS session request. */ 359*10023SGordon.Ross@Sun.COM err = nb_ssn_request(ctx, server); 360*10023SGordon.Ross@Sun.COM if (err) 361*10023SGordon.Ross@Sun.COM DPRINT("ssn_rq, err %d", err); 362*10023SGordon.Ross@Sun.COM 363*10023SGordon.Ross@Sun.COM out: 364*10023SGordon.Ross@Sun.COM if (err) { 365*10023SGordon.Ross@Sun.COM if (ctx->ct_tran_fd != -1) { 366*10023SGordon.Ross@Sun.COM close(ctx->ct_tran_fd); 367*10023SGordon.Ross@Sun.COM ctx->ct_tran_fd = -1; 368*10023SGordon.Ross@Sun.COM } 369*10023SGordon.Ross@Sun.COM } 370*10023SGordon.Ross@Sun.COM return (err); 371*10023SGordon.Ross@Sun.COM } 372*10023SGordon.Ross@Sun.COM 373*10023SGordon.Ross@Sun.COM /* 374*10023SGordon.Ross@Sun.COM * Make a new connection, or reconnect. 375*10023SGordon.Ross@Sun.COM */ 376*10023SGordon.Ross@Sun.COM int 377*10023SGordon.Ross@Sun.COM smb_iod_connect(smb_ctx_t *ctx) 378*10023SGordon.Ross@Sun.COM { 379*10023SGordon.Ross@Sun.COM struct sockaddr *sa; 380*10023SGordon.Ross@Sun.COM int err, err2; 381*10023SGordon.Ross@Sun.COM struct mbdata blob; 382*10023SGordon.Ross@Sun.COM 383*10023SGordon.Ross@Sun.COM memset(&blob, 0, sizeof (blob)); 384*10023SGordon.Ross@Sun.COM 385*10023SGordon.Ross@Sun.COM if (ctx->ct_srvname[0] == '\0') { 386*10023SGordon.Ross@Sun.COM DPRINT("sername not set!"); 387*10023SGordon.Ross@Sun.COM return (EINVAL); 388*10023SGordon.Ross@Sun.COM } 389*10023SGordon.Ross@Sun.COM DPRINT("server: %s", ctx->ct_srvname); 390*10023SGordon.Ross@Sun.COM 391*10023SGordon.Ross@Sun.COM if (smb_debug) 392*10023SGordon.Ross@Sun.COM dump_ctx("smb_iod_connect", ctx); 393*10023SGordon.Ross@Sun.COM 394*10023SGordon.Ross@Sun.COM /* 395*10023SGordon.Ross@Sun.COM * This may be a reconnect, so 396*10023SGordon.Ross@Sun.COM * cleanup if necessary. 397*10023SGordon.Ross@Sun.COM */ 398*10023SGordon.Ross@Sun.COM if (ctx->ct_tran_fd != -1) { 399*10023SGordon.Ross@Sun.COM close(ctx->ct_tran_fd); 400*10023SGordon.Ross@Sun.COM ctx->ct_tran_fd = -1; 401*10023SGordon.Ross@Sun.COM } 402*10023SGordon.Ross@Sun.COM 403*10023SGordon.Ross@Sun.COM /* 404*10023SGordon.Ross@Sun.COM * Get local machine name. 405*10023SGordon.Ross@Sun.COM * Full name - not a NetBIOS name. 406*10023SGordon.Ross@Sun.COM */ 407*10023SGordon.Ross@Sun.COM if (ctx->ct_locname == NULL) { 408*10023SGordon.Ross@Sun.COM err = smb_getlocalname(&ctx->ct_locname); 409*10023SGordon.Ross@Sun.COM if (err) { 410*10023SGordon.Ross@Sun.COM smb_error(dgettext(TEXT_DOMAIN, 411*10023SGordon.Ross@Sun.COM "can't get local name"), err); 412*10023SGordon.Ross@Sun.COM return (err); 413*10023SGordon.Ross@Sun.COM } 414*10023SGordon.Ross@Sun.COM } 415*10023SGordon.Ross@Sun.COM 416*10023SGordon.Ross@Sun.COM /* 417*10023SGordon.Ross@Sun.COM * We're called with each IP address 418*10023SGordon.Ross@Sun.COM * already copied into ct_srvaddr. 419*10023SGordon.Ross@Sun.COM */ 420*10023SGordon.Ross@Sun.COM ctx->ct_flags |= SMBCF_RESOLVED; 421*10023SGordon.Ross@Sun.COM 422*10023SGordon.Ross@Sun.COM sa = &ctx->ct_srvaddr.sa; 423*10023SGordon.Ross@Sun.COM switch (sa->sa_family) { 424*10023SGordon.Ross@Sun.COM 425*10023SGordon.Ross@Sun.COM case AF_INET6: 426*10023SGordon.Ross@Sun.COM err = conn_tcp6(ctx, sa, IPPORT_SMB); 427*10023SGordon.Ross@Sun.COM break; 428*10023SGordon.Ross@Sun.COM 429*10023SGordon.Ross@Sun.COM case AF_INET: 430*10023SGordon.Ross@Sun.COM err = conn_tcp4(ctx, sa, IPPORT_SMB); 431*10023SGordon.Ross@Sun.COM /* 432*10023SGordon.Ross@Sun.COM * If port 445 was not listening, try port 139. 433*10023SGordon.Ross@Sun.COM * Note: Not doing NetBIOS name lookup here. 434*10023SGordon.Ross@Sun.COM * We already have the IP address. 435*10023SGordon.Ross@Sun.COM */ 436*10023SGordon.Ross@Sun.COM switch (err) { 437*10023SGordon.Ross@Sun.COM case ECONNRESET: 438*10023SGordon.Ross@Sun.COM case ECONNREFUSED: 439*10023SGordon.Ross@Sun.COM err2 = conn_nbt(ctx, sa, NULL); 440*10023SGordon.Ross@Sun.COM if (err2 == 0) 441*10023SGordon.Ross@Sun.COM err = 0; 442*10023SGordon.Ross@Sun.COM } 443*10023SGordon.Ross@Sun.COM break; 444*10023SGordon.Ross@Sun.COM 445*10023SGordon.Ross@Sun.COM case AF_NETBIOS: 446*10023SGordon.Ross@Sun.COM /* Like AF_INET, but use NetBIOS ssn. */ 447*10023SGordon.Ross@Sun.COM err = conn_nbt(ctx, sa, ctx->ct_srvname); 448*10023SGordon.Ross@Sun.COM break; 449*10023SGordon.Ross@Sun.COM 450*10023SGordon.Ross@Sun.COM default: 451*10023SGordon.Ross@Sun.COM DPRINT("skipped family %d", sa->sa_family); 452*10023SGordon.Ross@Sun.COM err = EPROTONOSUPPORT; 453*10023SGordon.Ross@Sun.COM break; 454*10023SGordon.Ross@Sun.COM } 455*10023SGordon.Ross@Sun.COM 456*10023SGordon.Ross@Sun.COM 457*10023SGordon.Ross@Sun.COM if (err) { 458*10023SGordon.Ross@Sun.COM DPRINT("connect, err=%d", err); 459*10023SGordon.Ross@Sun.COM return (err); 460*10023SGordon.Ross@Sun.COM } 461*10023SGordon.Ross@Sun.COM 462*10023SGordon.Ross@Sun.COM /* 463*10023SGordon.Ross@Sun.COM * SMB Negotiate Protocol and 464*10023SGordon.Ross@Sun.COM * SMB Session Setup, one of 3 ways: 465*10023SGordon.Ross@Sun.COM * NULL session 466*10023SGordon.Ross@Sun.COM * Extended security, 467*10023SGordon.Ross@Sun.COM * NTLM (v2, v1) 468*10023SGordon.Ross@Sun.COM * 469*10023SGordon.Ross@Sun.COM * Empty user name means an explicit request for 470*10023SGordon.Ross@Sun.COM * NULL session setup. No fall-back logic here. 471*10023SGordon.Ross@Sun.COM * 472*10023SGordon.Ross@Sun.COM * For NULL session, don't offer extended security. 473*10023SGordon.Ross@Sun.COM * That's a lot simpler than dealing with NTLMSSP. 474*10023SGordon.Ross@Sun.COM */ 475*10023SGordon.Ross@Sun.COM if (ctx->ct_user[0] == '\0') { 476*10023SGordon.Ross@Sun.COM ctx->ct_vopt &= ~SMBVOPT_EXT_SEC; 477*10023SGordon.Ross@Sun.COM err = smb_negprot(ctx, &blob); 478*10023SGordon.Ross@Sun.COM if (err) 479*10023SGordon.Ross@Sun.COM goto out; 480*10023SGordon.Ross@Sun.COM err = smb_ssnsetup_null(ctx); 481*10023SGordon.Ross@Sun.COM } else { 482*10023SGordon.Ross@Sun.COM /* 483*10023SGordon.Ross@Sun.COM * Do SMB Negotiate Protocol. 484*10023SGordon.Ross@Sun.COM */ 485*10023SGordon.Ross@Sun.COM err = smb_negprot(ctx, &blob); 486*10023SGordon.Ross@Sun.COM if (err) 487*10023SGordon.Ross@Sun.COM goto out; 488*10023SGordon.Ross@Sun.COM 489*10023SGordon.Ross@Sun.COM /* 490*10023SGordon.Ross@Sun.COM * Do SMB Session Setup (authenticate) 491*10023SGordon.Ross@Sun.COM * 492*10023SGordon.Ross@Sun.COM * If the server negotiated extended security, 493*10023SGordon.Ross@Sun.COM * run the SPNEGO state machine. 494*10023SGordon.Ross@Sun.COM */ 495*10023SGordon.Ross@Sun.COM if (ctx->ct_sopt.sv_caps & SMB_CAP_EXT_SECURITY) { 496*10023SGordon.Ross@Sun.COM err = smb_ssnsetup_spnego(ctx, &blob); 497*10023SGordon.Ross@Sun.COM } else { 498*10023SGordon.Ross@Sun.COM /* 499*10023SGordon.Ross@Sun.COM * Server did NOT negotiate extended security. 500*10023SGordon.Ross@Sun.COM * Try NTLMv2, NTLMv1 (if enabled). 501*10023SGordon.Ross@Sun.COM */ 502*10023SGordon.Ross@Sun.COM if ((ctx->ct_authflags & 503*10023SGordon.Ross@Sun.COM (SMB_AT_NTLM2 | SMB_AT_NTLM1)) == 0) { 504*10023SGordon.Ross@Sun.COM /* 505*10023SGordon.Ross@Sun.COM * Don't return EAUTH, because a 506*10023SGordon.Ross@Sun.COM * new password will not help. 507*10023SGordon.Ross@Sun.COM */ 508*10023SGordon.Ross@Sun.COM DPRINT("No NTLM authflags"); 509*10023SGordon.Ross@Sun.COM err = ENOTSUP; 510*10023SGordon.Ross@Sun.COM goto out; 511*10023SGordon.Ross@Sun.COM } 512*10023SGordon.Ross@Sun.COM if (ctx->ct_authflags & SMB_AT_NTLM2) 513*10023SGordon.Ross@Sun.COM err = smb_ssnsetup_ntlm2(ctx); 514*10023SGordon.Ross@Sun.COM else 515*10023SGordon.Ross@Sun.COM err = EAUTH; 516*10023SGordon.Ross@Sun.COM if (err == EAUTH && 0 != 517*10023SGordon.Ross@Sun.COM (ctx->ct_authflags & SMB_AT_NTLM1)) 518*10023SGordon.Ross@Sun.COM err = smb_ssnsetup_ntlm1(ctx); 519*10023SGordon.Ross@Sun.COM } 520*10023SGordon.Ross@Sun.COM } 521*10023SGordon.Ross@Sun.COM 522*10023SGordon.Ross@Sun.COM /* Tell library code we have a session. */ 523*10023SGordon.Ross@Sun.COM ctx->ct_flags |= SMBCF_RESOLVED | SMBCF_SSNACTIVE; 524*10023SGordon.Ross@Sun.COM 525*10023SGordon.Ross@Sun.COM out: 526*10023SGordon.Ross@Sun.COM mb_done(&blob); 527*10023SGordon.Ross@Sun.COM 528*10023SGordon.Ross@Sun.COM if (err) { 529*10023SGordon.Ross@Sun.COM close(ctx->ct_tran_fd); 530*10023SGordon.Ross@Sun.COM ctx->ct_tran_fd = -1; 531*10023SGordon.Ross@Sun.COM } else 532*10023SGordon.Ross@Sun.COM DPRINT("tran_fd = %d", ctx->ct_tran_fd); 533*10023SGordon.Ross@Sun.COM 534*10023SGordon.Ross@Sun.COM return (err); 535*10023SGordon.Ross@Sun.COM } 536