summaryrefslogtreecommitdiff
path: root/source3
diff options
context:
space:
mode:
authorAndrew Tridgell <tridge@samba.org>2000-01-03 03:24:23 +0000
committerAndrew Tridgell <tridge@samba.org>2000-01-03 03:24:23 +0000
commit8ae3366268e38f3f61f121d77c6083484408e442 (patch)
tree051c07f7e5d278848b5b9386f47792a47187a95c /source3
parent574788039f53fada4769731ea3fafe9710417b71 (diff)
downloadsamba-8ae3366268e38f3f61f121d77c6083484408e442.tar.gz
samba-8ae3366268e38f3f61f121d77c6083484408e442.tar.bz2
samba-8ae3366268e38f3f61f121d77c6083484408e442.zip
the bulk of the unexpected packet handling code is in here
(This used to be commit 771f610f0d0223fea815771c9efe40d00e4817f4)
Diffstat (limited to 'source3')
-rw-r--r--source3/libsmb/unexpected.c160
1 files changed, 160 insertions, 0 deletions
diff --git a/source3/libsmb/unexpected.c b/source3/libsmb/unexpected.c
new file mode 100644
index 0000000000..57fad7c696
--- /dev/null
+++ b/source3/libsmb/unexpected.c
@@ -0,0 +1,160 @@
+/*
+ Unix SMB/Netbios implementation.
+ Version 3.0
+ handle unexpected packets
+ Copyright (C) Andrew Tridgell 2000
+
+ This program is free software; you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published by
+ the Free Software Foundation; either version 2 of the License, or
+ (at your option) any later version.
+
+ This program is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ GNU General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with this program; if not, write to the Free Software
+ Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
+
+*/
+
+#include "includes.h"
+
+extern int DEBUGLEVEL;
+
+static TDB_CONTEXT *tdb;
+
+/* the key type used in the unexpeceted packet database */
+struct unexpected_key {
+ enum packet_type packet_type;
+ time_t timestamp;
+ int count;
+};
+
+
+
+/****************************************************************************
+ all unexpected packets are passed in here, to be stored in a unexpected
+ packet database. This allows nmblookup and other tools to receive packets
+ erroneoously sent to the wrong port by broken MS systems
+ **************************************************************************/
+void unexpected_packet(struct packet_struct *p)
+{
+ static int count;
+ TDB_DATA kbuf, dbuf;
+ struct unexpected_key key;
+ char buf[1024];
+ int len=0;
+
+ if (!tdb) {
+ tdb = tdb_open(lock_path("unexpected.tdb"), 0,
+ TDB_CLEAR_IF_FIRST,
+ O_RDWR | O_CREAT, 0644);
+ if (!tdb) {
+ DEBUG(0,("Failed to open unexpected.tdb\n"));
+ return;
+ }
+ }
+
+ memset(buf,'\0',sizeof(buf));
+
+ len = build_packet(buf, p);
+
+ key.packet_type = p->packet_type;
+ key.timestamp = p->timestamp;
+ key.count = count++;
+
+ kbuf.dptr = (char *)&key;
+ kbuf.dsize = sizeof(key);
+ dbuf.dptr = buf;
+ dbuf.dsize = len;
+
+ tdb_store(tdb, kbuf, dbuf, TDB_REPLACE);
+}
+
+
+static time_t lastt;
+
+/****************************************************************************
+delete the record if it is too old
+ **************************************************************************/
+static int traverse_fn(TDB_CONTEXT *ttdb, TDB_DATA kbuf, TDB_DATA dbuf)
+{
+ struct unexpected_key key;
+
+ memcpy(&key, kbuf.dptr, sizeof(key));
+
+ if (lastt - key.timestamp > NMBD_UNEXPECTED_TIMEOUT) {
+ tdb_delete(ttdb, kbuf);
+ }
+
+ return 0;
+}
+
+
+/****************************************************************************
+delete all old unexpected packets
+ **************************************************************************/
+void clear_unexpected(time_t t)
+{
+ if (!tdb) return;
+
+ if ((lastt != 0) && (t < lastt + NMBD_UNEXPECTED_TIMEOUT))
+ return;
+
+ lastt = t;
+
+ tdb_traverse(tdb, traverse_fn);
+}
+
+
+static struct packet_struct *matched_packet;
+static int match_trn_id;
+
+/****************************************************************************
+tdb traversal fn to find a matching 137 packet
+ **************************************************************************/
+static int traverse_match_137(TDB_CONTEXT *ttdb, TDB_DATA kbuf, TDB_DATA dbuf)
+{
+ struct unexpected_key key;
+ struct packet_struct *p;
+
+ memcpy(&key, kbuf.dptr, sizeof(key));
+
+ if (key.packet_type != NMB_PACKET) return 0;
+
+ p = parse_packet(dbuf.dptr, dbuf.dsize, NMB_PACKET);
+
+ if (p->packet_type == NMB_PACKET &&
+ p->packet.nmb.header.name_trn_id == match_trn_id) {
+ matched_packet = p;
+ return -1;
+ }
+
+ free_packet(p);
+
+ return 0;
+}
+
+
+/****************************************************************************
+check for a particular packet in the unexpected packet queue
+ **************************************************************************/
+struct packet_struct *receive_unexpected_137(int trn_id)
+{
+ TDB_CONTEXT *tdb2;
+
+ tdb2 = tdb_open(lock_path("unexpected.tdb"), 0, 0, O_RDONLY, 0);
+ if (!tdb2) return NULL;
+
+ matched_packet = NULL;
+ match_trn_id = trn_id;
+
+ tdb_traverse(tdb2, traverse_match_137);
+
+ tdb_close(tdb2);
+
+ return matched_packet;
+}