From 92bc7a4263ba27f113306b31721dc3bbaa94baf3 Mon Sep 17 00:00:00 2001 From: Luke Leighton Date: Sun, 5 Dec 1999 01:34:34 +0000 Subject: first version of msrpc agent redirector code. client-side only. (This used to be commit 5e5a1dceee0b6088822697284d3e0af04d197477) --- source3/lib/msrpc-agent.c | 261 ++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 261 insertions(+) create mode 100644 source3/lib/msrpc-agent.c (limited to 'source3/lib/msrpc-agent.c') diff --git a/source3/lib/msrpc-agent.c b/source3/lib/msrpc-agent.c new file mode 100644 index 0000000000..4612aae14f --- /dev/null +++ b/source3/lib/msrpc-agent.c @@ -0,0 +1,261 @@ +/* + Unix SMB/Netbios implementation. + Version 2 + SMB agent/socket plugin + Copyright (C) Andrew Tridgell 1999 + + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 2 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program; if not, write to the Free Software + Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. +*/ + +#include "includes.h" +#include "smb.h" + +extern int DEBUGLEVEL; + +static char packet[BUFFER_SIZE]; + +/**************************************************************************** +terminate sockent connection +***********************************************************<*****************/ +static void free_sock(void *sock) +{ + if (sock != NULL) + { + struct msrpc_state *n = (struct msrpc_state*)sock; + msrpc_use_del(n->pipe_name, &n->usr, False, NULL); + } +} + +static struct msrpc_state *init_client_connection(int c) +{ + pstring buf; + uchar ntpw[16]; + uchar lmpw[16]; + fstring pipe_name; + struct user_credentials usr; + char *p = buf; + int rl; + uint32 len; + uint16 version; + uint16 command; + BOOL new_con = False; + + ZERO_STRUCT(usr); + + DEBUG(10,("first request\n")); + + rl = read(c, &buf, sizeof(len)); + + if (rl != sizeof(len)) + { + DEBUG(0,("Unable to read length\n")); + dump_data(0, buf, sizeof(len)); + return NULL; + } + + len = IVAL(buf, 0); + + if (len > sizeof(buf)) + { + DEBUG(0,("length %d too long\n", len)); + return NULL; + } + + rl = read(c, buf, len); + + if (rl < 0) + { + DEBUG(0,("Unable to read from connection\n")); + return NULL; + } + +#ifdef DEBUG_PASSWORD + dump_data(100, buf, rl); +#endif + version = SVAL(p, 0); + p += 2; + command = SVAL(p, 0); + p += 2; + + fstrcpy(pipe_name, p); + p = skip_string(p, 1); + fstrcpy(usr.user_name, p); + p = skip_string(p, 1); + fstrcpy(usr.domain, p); + p = skip_string(p, 1); + + if (PTR_DIFF(p, buf) < rl) + { + memcpy(lmpw, p, 16); + p += 16; + memcpy(ntpw, p, 16); + p += 16; + pwd_set_lm_nt_16(&usr.pwd, lmpw, ntpw); + } + else + { + pwd_set_nullpwd(&usr.pwd); + } + + if (PTR_DIFF(p, buf) != rl) + { + DEBUG(0,("Buffer size %d %d!\n", + PTR_DIFF(p, buf), rl)); + return NULL; + } + + switch (command) + { + case AGENT_CMD_CON: + { + new_con = True; + break; + } + case AGENT_CMD_CON_REUSE: + { + new_con = True; + usr.reuse = True; + break; + } + default: + { + DEBUG(0,("unknown command %d\n", command)); + return NULL; + } + } + + if (new_con) + { + struct msrpc_state *n; + uint32 status = 0; + n = msrpc_use_add(pipe_name, &usr, False); + + if (n == NULL) + { + DEBUG(0,("Unable to connect to %s\n", pipe_name)); + status = 0x1; + } + else + { + fstrcpy(n->pipe_name, pipe_name); + copy_user_creds(&n->usr, &usr); + } + + if (write(c, &status, sizeof(status)) != sizeof(status)) + { + DEBUG(0,("Could not write connection down pipe.\n")); + if (n != NULL) + { + msrpc_use_del(pipe_name, &usr, False, NULL); + n = NULL; + } + } + return n; + } + return NULL; +} + +static BOOL process_cli_sock(struct sock_redir **socks, uint32 num_socks, + struct sock_redir *sock) +{ + struct msrpc_state *n = (struct msrpc_state*)sock->n; + if (n == NULL) + { + n = init_client_connection(sock->c); + if (n == NULL) + { + return False; + } + sock->n = (void*)n; + sock->s = n->fd; + } + else + { + if (!receive_smb(sock->c, packet, 0)) + { + DEBUG(0,("client closed connection\n")); + return False; + } + + if (!send_smb(sock->s, packet)) + { + DEBUG(0,("server is dead\n")); + return False; + } + } + return True; +} + +static BOOL process_srv_sock(struct sock_redir **socks, uint32 num_socks, + int fd) +{ + int i; + if (!receive_smb(fd, packet, 0)) + { + DEBUG(0,("server closed connection\n")); + return False; + } + + DEBUG(10,("process_srv_sock:\tfd:\t%d\n", fd)); + + for (i = 0; i < num_socks; i++) + { + struct msrpc_state *n; + if (socks[i] == NULL || socks[i]->n == NULL) + { + continue; + } + n = (struct msrpc_state*)socks[i]->n; + DEBUG(10,("list:\tfd:\t%d\n", + socks[i]->s)); + if (!send_smb(socks[i]->c, packet)) + { + DEBUG(0,("client is dead\n")); + return False; + } + return True; + } + return False; +} + +static int get_agent_sock(char *pipe_name) +{ + fstring path; + fstring dir; + + slprintf(dir, sizeof(dir)-1, "/tmp/.msrpc/.%s", pipe_name); + slprintf(path, sizeof(path)-1, "%s/agent", dir); + + return create_pipe_socket(dir, S_IRUSR|S_IWUSR|S_IXUSR, path, 0); +} + +void start_msrpc_agent(char *pipe_name) +{ + struct vagent_ops va = + { + free_sock, + get_agent_sock, + process_cli_sock, + process_srv_sock, + pipe_name, + NULL, + 0 + }; + + CatchChild(); + + start_agent(&va); +} + -- cgit