From 4cc7a1b0ef893941446c5f03b9372966a453cb6a Mon Sep 17 00:00:00 2001 From: Jeremy Allison Date: Fri, 8 May 1998 01:22:16 +0000 Subject: Initial cut at the code that will do NT SMB calls. Not linked in, not compiled yet, just checked in for safe keeping :-). Jeremy. (This used to be commit 74565f0039be8ab02a501accad5e671e80733314) --- source3/smbd/nttrans.c | 225 +++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 225 insertions(+) create mode 100644 source3/smbd/nttrans.c diff --git a/source3/smbd/nttrans.c b/source3/smbd/nttrans.c new file mode 100644 index 0000000000..0a861bf9c6 --- /dev/null +++ b/source3/smbd/nttrans.c @@ -0,0 +1,225 @@ +/* + Unix SMB/Netbios implementation. + Version 1.9. + SMB NT transaction handling + Copyright (C) Jeremy Allison 1994-1998 + + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 2 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program; if not, write to the Free Software + Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. +*/ + +#include "includes.h" + +extern int DEBUGLEVEL; +extern int Protocol; +extern connection_struct Connections[]; +extern files_struct Files[]; +extern int Client; +extern int oplock_sock; +extern int smb_read_error; +extern int global_oplock_break; + +/**************************************************************************** + reply to an unsolicited SMBNTtranss - just ignore it! +****************************************************************************/ + +int reply_nttranss(char *inbuf,char *outbuf,int length,int bufsize) +{ + DEBUG(4,("Ignoring nttranss of length %d\n",length)); + return(-1); +} + +/**************************************************************************** + reply to a SMBNTtrans +****************************************************************************/ + +int reply_nttrans(char *inbuf,char *outbuf,int length,int bufsize) +{ + int outsize = 0; + int cnum = SVAL(inbuf,smb_tid); +#if 0 + uint16 max_setup_count = CVAL(inbuf, smb_nt_MaxSetupCount); + uint32 max_parameter_count = IVAL(inbuf, smb_nt_MaxParameterCount); + uint32 max_data_count = IVAL(inbuf,smb_nt_MaxDataCount); +#endif + uint32 total_parameter_count = IVAL(inbuf, smb_nt_TotalParameterCount); + uint32 total_data_count = IVAL(inbuf, smb_nt_TotalDataCount); + uint32 parameter_count = IVAL(inbuf,smb_nt_ParameterCount); + uint32 parameter_offset = IVAL(inbuf,smb_nt_ParameterOffset); + uint32 data_count = IVAL(inbuf,smb_nt_DataCount); + uint32 data_offset = IVAL(inbuf,smb_nt_DataOffset); + uint16 setup_count = SVAL(inbuf,smb_nt_SetupCount); + uint16 function_code = SVAL( inbuf, smb_nt_Function); + char *params = NULL, *data = NULL, *setup = NULL; + uint32 num_params_sofar, num_data_sofar; + + if(global_oplock_break && (function_code == NT_TRANSACT_CREATE)) { + /* + * Queue this open message as we are the process of an oplock break. + */ + + DEBUG(2,("%s: reply_nttrans: queueing message NT_TRANSACT_CREATE \ +due to being in oplock break state.\n", timestring() )); + + push_smb_message( inbuf, length); + return -1; + } + + outsize = set_message(outbuf,0,0,True); + + /* + * All nttrans messages we handle have smb_wcnt == 19 + setup_count. + * Ensure this is so as a sanity check. + */ + + if(CVAL(inbuf, smb_wcnt) != 19 + setup_count) { + DEBUG(2,("Invalid smb_wcnt in trans2 call\n")); + return(ERROR(ERRSRV,ERRerror)); + } + + /* Allocate the space for the setup, the maximum needed parameters and data */ + + if(setup_count > 0) + setup = (char *)malloc(setup_count); + if (total_parameter_count > 0) + params = (char *)malloc(total_parameter_count); + if (total_data_count > 0) + data = (char *)malloc(total_data_count); + + if ((total_parameter_count && !params) || (total_data_count && !data) || + (setup_count && !setup)) { + DEBUG(0,("reply_nttrans : Out of memory\n")); + return(ERROR(ERRDOS,ERRnomem)); + } + + /* Copy the param and data bytes sent with this request into + the params buffer */ + num_params_sofar = parameter_count; + num_data_sofar = data_count; + + if (parameter_count > total_parameter_count || data_count > total_data_count) + exit_server("reply_nttrans: invalid sizes in packet.\n"); + + if(setup) + memcpy( setup, &inbuf[smb_nt_SetupStart], setup_count); + if(params) + memcpy( params, smb_base(inbuf) + parameter_offset, parameter_count); + if(data) + memcpy( data, smb_base(inbuf) + data_offset, data_count); + + if(num_data_sofar < total_data_count || num_params_sofar < total_parameter_count) { + /* We need to send an interim response then receive the rest + of the parameter/data bytes */ + outsize = set_message(outbuf,0,0,True); + send_smb(Client,outbuf); + + while( num_data_sofar < total_data_count || num_params_sofar < total_parameter_count) { + BOOL ret; + + ret = receive_next_smb(Client,oplock_sock,inbuf,bufsize, + SMB_SECONDARY_WAIT); + + if((ret && (CVAL(inbuf, smb_com) != SMBnttranss)) || !ret) { + outsize = set_message(outbuf,0,0,True); + if(ret) + DEBUG(0,("reply_nttrans: Invalid secondary nttrans packet\n")); + else + DEBUG(0,("reply_nttrans: %s in getting secondary nttrans response.\n", + (smb_read_error == READ_ERROR) ? "error" : "timeout" )); + if(params) + free(params); + if(data) + free(data); + if(setup) + free(setup); + return(ERROR(ERRSRV,ERRerror)); + } + + /* Revise total_params and total_data in case they have changed downwards */ + total_parameter_count = SIVAL(inbuf, smb_nts_TotalParameterCount); + total_data_count = SIVAL(inbuf, smb_nts_TotalDataCount); + num_params_sofar += (parameter_count = SIVAL(inbuf,smb_nts_ParameterCount)); + num_data_sofar += ( data_count = SIVAL(inbuf, smb_nts_DataCount)); + if (num_params_sofar > total_parameter_count || num_data_sofar > total_data_count) + exit_server("reply_nttrans2: data overflow in secondary nttrans packet\n"); + + memcpy( ¶ms[ SIVAL(inbuf, smb_nts_ParameterDisplacement)], + smb_base(inbuf) + SVAL(inbuf, smb_nts_ParameterOffset), parameter_count); + memcpy( &data[SVAL(inbuf, smb_nts_DataDisplacement)], + smb_base(inbuf)+ SVAL(inbuf, smb_nts_DataOffset), data_count); + } + } + + if (Protocol >= PROTOCOL_NT1) { + uint16 flg2 = SVAL(outbuf,smb_flg2); + SSVAL(outbuf,smb_flg2,flg2 | 0x40); /* IS_LONG_NAME */ + } + + /* Now we must call the relevant TRANS2 function */ + switch(function_code) + { + case NT_TRANSACT_CREATE: + outsize = call_nt_transact_create(inbuf, outbuf, bufsize, cnum, + &setup, ¶ms, &data); + break; + case NT_TRANSACT_IOCTL: + outsize = call_nt_transact_ioctl(inbuf, outbuf, bufsize, cnum, + &setup, ¶ms, &data); + break; + case NT_TRANSACT_SET_SECURITY_DESC: + outsize = call_nt_transact_set_security_desc(inbuf, outbuf, length, bufsize, cnum, + &setup, ¶ms, &data); + break; + case NT_TRANSACT_NOTIFY_CHANGE: + outsize = call_nt_transact_notify_change(inbuf, outbuf, length, bufsize, cnum, + &setup, ¶ms, &data); + break; + case NT_TRANSACT_RENAME: + outsize = call_nt_transact_rename(inbuf, outbuf, length, bufsize, cnum, + &setup, ¶ms, &data); + break; + case NT_TRANSACT_QUERY_SECURITY_DESC: + outsize = call_nt_transact_query_security_desc(inbuf, outbuf, length, bufsize, cnum, + &setup, ¶ms, &data, total_data); + break; + default: + /* Error in request */ + DEBUG(0,("reply_nttrans: %s Unknown request %d in nttrans call\n",timestring(), + tran_call)); + if(setup) + free(setup); + if(params) + free(params); + if(data) + free(data); + return (ERROR(ERRSRV,ERRerror)); + } + + /* As we do not know how many data packets will need to be + returned here the various call_nt_transact_xxxx calls + must send their own. Thus a call_nt_transact_xxxx routine only + returns a value other than -1 when it wants to send + an error packet. + */ + + if(setup) + free(setup); + if(params) + free(params); + if(data) + free(data); + return outsize; /* If a correct response was needed the call_nt_transact_xxxx + calls have already sent it. If outsize != -1 then it is + returning an error packet. */ +} -- cgit