diff options
Diffstat (limited to 'source3/libsmb/clidgram.c')
-rw-r--r-- | source3/libsmb/clidgram.c | 267 |
1 files changed, 267 insertions, 0 deletions
diff --git a/source3/libsmb/clidgram.c b/source3/libsmb/clidgram.c new file mode 100644 index 0000000000..8f4bdf7be6 --- /dev/null +++ b/source3/libsmb/clidgram.c @@ -0,0 +1,267 @@ +/* + Unix SMB/CIFS implementation. + client dgram calls + Copyright (C) Andrew Tridgell 1994-1998 + Copyright (C) Richard Sharpe 2001 + Copyright (C) John Terpstra 2001 + + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 2 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program; if not, write to the Free Software + Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. +*/ + +#include "includes.h" + +/* + * cli_send_mailslot, send a mailslot for client code ... + */ + +int cli_send_mailslot(int dgram_sock, BOOL unique, char *mailslot, + char *buf, int len, + const char *srcname, int src_type, + const char *dstname, int dest_type, + struct in_addr dest_ip, struct in_addr src_ip, + int dest_port, int src_port) +{ + struct packet_struct p; + struct dgram_packet *dgram = &p.packet.dgram; + char *ptr, *p2; + char tmp[4]; + + memset((char *)&p, '\0', sizeof(p)); + + /* + * Next, build the DGRAM ... + */ + + /* DIRECT GROUP or UNIQUE datagram. */ + dgram->header.msg_type = unique ? 0x10 : 0x11; + dgram->header.flags.node_type = M_NODE; + dgram->header.flags.first = True; + dgram->header.flags.more = False; + dgram->header.dgm_id = ((unsigned)time(NULL)%(unsigned)0x7FFF) + ((unsigned)sys_getpid()%(unsigned)100); + dgram->header.source_ip.s_addr = src_ip.s_addr; + dgram->header.source_port = ntohs(src_port); + dgram->header.dgm_length = 0; /* Let build_dgram() handle this. */ + dgram->header.packet_offset = 0; + + make_nmb_name(&dgram->source_name,srcname,src_type); + make_nmb_name(&dgram->dest_name,dstname,dest_type); + + ptr = &dgram->data[0]; + + /* Setup the smb part. */ + ptr -= 4; /* XXX Ugliness because of handling of tcp SMB length. */ + memcpy(tmp,ptr,4); + set_message(ptr,17,17 + len,True); + memcpy(ptr,tmp,4); + + SCVAL(ptr,smb_com,SMBtrans); + SSVAL(ptr,smb_vwv1,len); + SSVAL(ptr,smb_vwv11,len); + SSVAL(ptr,smb_vwv12,70 + strlen(mailslot)); + SSVAL(ptr,smb_vwv13,3); + SSVAL(ptr,smb_vwv14,1); + SSVAL(ptr,smb_vwv15,1); + SSVAL(ptr,smb_vwv16,2); + p2 = smb_buf(ptr); + pstrcpy(p2,mailslot); + p2 = skip_string(p2,1); + + memcpy(p2,buf,len); + p2 += len; + + dgram->datasize = PTR_DIFF(p2,ptr+4); /* +4 for tcp length. */ + + p.ip = dest_ip; + p.port = dest_port; + p.fd = dgram_sock; + p.timestamp = time(NULL); + p.packet_type = DGRAM_PACKET; + + DEBUG(4,("send_mailslot: Sending to mailslot %s from %s IP %s ", mailslot, + nmb_namestr(&dgram->source_name), inet_ntoa(src_ip))); + DEBUG(4,("to %s IP %s\n", nmb_namestr(&dgram->dest_name), inet_ntoa(dest_ip))); + + return send_packet(&p); + +} + +/* + * cli_get_response: Get a response ... + */ +int cli_get_response(int dgram_sock, BOOL unique, char *mailslot, char *buf, int bufsiz) +{ + struct packet_struct *packet; + + packet = receive_dgram_packet(dgram_sock, 5, mailslot); + + if (packet) { /* We got one, pull what we want out of the SMB data ... */ + + struct dgram_packet *dgram = &packet->packet.dgram; + + /* + * We should probably parse the SMB, but for now, we will pull what + * from fixed, known locations ... + */ + + /* Copy the data to buffer, respecting sizes ... */ + + memcpy(buf, &dgram->data[92], MIN(bufsiz, (dgram->datasize - 92))); + + } + else + return -1; + + return 0; + +} + +/* + * cli_get_backup_list: Send a get backup list request ... + */ + +static char cli_backup_list[1024]; + +int cli_get_backup_list(const char *myname, const char *send_to_name) +{ + char outbuf[15]; + char *p; + struct in_addr sendto_ip, my_ip; + int dgram_sock; + struct sockaddr_in sock_out; + socklen_t name_size; + + if (!resolve_name(send_to_name, &sendto_ip, 0x1d)) { + + DEBUG(0, ("Could not resolve name: %s<1D>\n", send_to_name)); + return False; + + } + + my_ip.s_addr = inet_addr("0.0.0.0"); + + if (!resolve_name(myname, &my_ip, 0x00)) { /* FIXME: Call others here */ + + DEBUG(0, ("Could not resolve name: %s<00>\n", myname)); + + } + + if ((dgram_sock = open_socket_out(SOCK_DGRAM, &sendto_ip, 138, LONG_CONNECT_TIMEOUT)) < 0) { + + DEBUG(4, ("open_sock_out failed ...")); + return False; + + } + + /* Make it a broadcast socket ... */ + + set_socket_options(dgram_sock, "SO_BROADCAST"); + + /* Make it non-blocking??? */ + + if (fcntl(dgram_sock, F_SETFL, O_NONBLOCK) < 0) { + + DEBUG(0, ("Unable to set non blocking on dgram sock\n")); + + } + + /* Now, bind a local addr to it ... Try port 138 first ... */ + + memset((char *)&sock_out, '\0', sizeof(sock_out)); + sock_out.sin_addr.s_addr = INADDR_ANY; + sock_out.sin_port = htons(138); + sock_out.sin_family = AF_INET; + + if (bind(dgram_sock, (struct sockaddr *)&sock_out, sizeof(sock_out)) < 0) { + + /* Try again on any port ... */ + + sock_out.sin_port = INADDR_ANY; + + if (bind(dgram_sock, (struct sockaddr *)&sock_out, sizeof(sock_out)) < 0) { + + DEBUG(4, ("failed to bind socket to address ...\n")); + return False; + + } + + } + + /* Now, figure out what socket name we were bound to. We want the port */ + + name_size = sizeof(sock_out); + + getsockname(dgram_sock, (struct sockaddr *)&sock_out, &name_size); + + DEBUG(5, ("Socket bound to IP:%s, port: %d\n", inet_ntoa(sock_out.sin_addr), ntohs(sock_out.sin_port))); + + /* Now, build the request */ + + memset(cli_backup_list, '\0', sizeof(cli_backup_list)); + memset(outbuf, '\0', sizeof(outbuf)); + + p = outbuf; + + SCVAL(p, 0, ANN_GetBackupListReq); + p++; + + SCVAL(p, 0, 1); /* Count pointer ... */ + p++; + + SIVAL(p, 0, 1); /* The sender's token ... */ + p += 4; + + cli_send_mailslot(dgram_sock, True, "\\MAILSLOT\\BROWSE", outbuf, + PTR_DIFF(p, outbuf), myname, 0, send_to_name, + 0x1d, sendto_ip, my_ip, 138, sock_out.sin_port); + + /* We should check the error and return if we got one */ + + /* Now, get the response ... */ + + cli_get_response(dgram_sock, True, "\\MAILSLOT\\BROWSE", cli_backup_list, sizeof(cli_backup_list)); + + /* Should check the response here ... FIXME */ + + close(dgram_sock); + + return True; + +} + +/* + * cli_get_backup_server: Get the backup list and retrieve a server from it + */ + +int cli_get_backup_server(char *my_name, char *target, char *servername, int namesize) +{ + + /* Get the backup list first. We could pull this from the cache later */ + + cli_get_backup_list(my_name, target); /* FIXME: Check the response */ + + if (!cli_backup_list[0]) { /* Empty list ... try again */ + + cli_get_backup_list(my_name, target); + + } + + strncpy(servername, cli_backup_list, MIN(16, namesize)); + + return True; + +} + + + |