2 Unix SMB/Netbios implementation.
4 NBT netbios routines and daemon - version 2
6 Copyright (C) Jeremy Allison 1994-1997
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
20 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
26 extern int DEBUGLEVEL;
28 /****************************************************************************
29 Function called when the name lookup succeeded.
30 ****************************************************************************/
32 static void wins_proxy_name_query_request_success( struct subnet_record *subrec,
33 struct userdata_struct *userdata,
34 struct nmb_name *nmbname, struct in_addr ip, struct res_rec *rrec)
36 struct packet_struct *original_packet;
37 struct subnet_record *orig_broadcast_subnet;
42 struct in_addr *iplist;
44 /* Extract the original packet and the original broadcast subnet from
47 memcpy( (char *)&orig_broadcast_subnet, userdata->data, sizeof(struct subnet_record *) );
48 memcpy( (char *)&original_packet, &userdata->data[sizeof(struct subnet_record *)],
49 sizeof(struct packet_struct *) );
51 nb_flags = get_nb_flags( rrec->rdata );
53 num_ips = rrec->rdlength / 6;
56 DEBUG(0,("wins_proxy_name_query_request_success: Invalid number of IP records (0) \
57 returned for name %s.\n", namestr(nmbname) ));
65 if((iplist = (struct in_addr *)malloc( num_ips * sizeof(struct in_addr) )) == NULL)
67 DEBUG(0,("wins_proxy_name_query_request_success: malloc fail !\n"));
71 for(i = 0; i < num_ips; i++)
72 putip( (char *)&iplist[i], (char *)&rrec->rdata[ (i*6) + 2]);
75 /* Add the queried name to the original subnet as a WINS_PROXY_NAME. */
77 if(rrec == PERMANENT_TTL)
80 add_name_to_subnet( orig_broadcast_subnet, nmbname->name, nmbname->name_type,
81 nb_flags, ttl, WINS_PROXY_NAME, num_ips, iplist);
86 /* Finally reply to the original name query. */
87 reply_netbios_packet(original_packet, /* Packet to reply to. */
89 NMB_QUERY, /* nmbd type code. */
90 NMB_NAME_QUERY_OPCODE, /* opcode. */
92 rrec->rdata, /* data to send. */
93 rrec->rdlength); /* data length. */
96 /****************************************************************************
97 Function called when the name lookup failed.
98 ****************************************************************************/
100 static void wins_proxy_name_query_request_fail(struct subnet_record *subrec,
101 struct response_record *rrec,
102 struct nmb_name *question_name, int fail_code)
104 DEBUG(4,("wins_proxy_name_query_request_fail: WINS server returned error code %d for lookup \
105 of name %s.\n", fail_code, namestr(question_name) ));
108 /****************************************************************************
109 Function to make a deep copy of the userdata we will need when the WINS
111 ****************************************************************************/
113 static struct userdata_struct *wins_proxy_userdata_copy_fn(struct userdata_struct *userdata)
115 struct packet_struct *p, *copy_of_p;
116 struct userdata_struct *new_userdata =
117 (struct userdata_struct *)malloc( userdata->userdata_len );
119 if(new_userdata == NULL)
122 new_userdata->copy_fn = userdata->copy_fn;
123 new_userdata->free_fn = userdata->free_fn;
124 new_userdata->userdata_len = userdata->userdata_len;
126 /* Copy the subnet_record pointer. */
127 memcpy( new_userdata->data, userdata->data, sizeof(struct subnet_record *) );
129 /* Extract the pointer to the packet struct */
130 memcpy((char *)&p, &userdata->data[sizeof(struct subnet_record *)],
131 sizeof(struct packet_struct *) );
133 /* Do a deep copy of the packet. */
134 if((copy_of_p = copy_packet(p)) == NULL)
136 free((char *)new_userdata);
141 copy_of_p->locked = True;
143 memcpy( &new_userdata->data[sizeof(struct subnet_record *)], (char *)©_of_p,
144 sizeof(struct packet_struct *) );
149 /****************************************************************************
150 Function to free the deep copy of the userdata we used when the WINS
151 proxy query returned.
152 ****************************************************************************/
154 static void wins_proxy_userdata_free_fn(struct userdata_struct *userdata)
156 struct packet_struct *p;
158 /* Extract the pointer to the packet struct */
159 memcpy((char *)&p, &userdata->data[sizeof(struct subnet_record *)],
160 sizeof(struct packet_struct *));
162 /* Unlock the packet. */
166 free((char *)userdata);
169 /****************************************************************************
170 Make a WINS query on behalf of a broadcast client name query request.
171 ****************************************************************************/
173 void make_wins_proxy_name_query_request( struct subnet_record *subrec,
174 struct packet_struct *incoming_packet,
175 struct nmb_name *question_name)
177 char ud[sizeof(struct userdata_struct) + sizeof(struct subrec *) +
178 sizeof(struct packet_struct *)];
179 struct userdata_struct *userdata = (struct userdata_struct *)ud;
181 bzero(ud, sizeof(ud));
183 userdata->copy_fn = wins_proxy_userdata_copy_fn;
184 userdata->free_fn = wins_proxy_userdata_free_fn;
185 userdata->userdata_len = sizeof(ud);
186 memcpy( userdata->data, (char *)&subrec, sizeof(struct subnet_record *));
187 memcpy( &userdata->data[sizeof(struct subnet_record *)], (char *)&incoming_packet,
188 sizeof(struct packet_struct *));
190 /* Now use the unicast subnet to query the name with the WINS server. */
191 query_name( unicast_subnet, question_name->name, question_name->name_type,
192 wins_proxy_name_query_request_success,
193 wins_proxy_name_query_request_fail,