2 Unix SMB/CIFS implementation.
4 dcerpc utility functions
6 Copyright (C) Andrew Tridgell 2003
7 Copyright (C) Jelmer Vernooij 2004
8 Copyright (C) Andrew Bartlett <abartlet@samba.org> 2005
9 Copyright (C) Rafal Szczesniak 2006
10 Copyright (C) Stefan Metzmacher 2014
12 This program is free software; you can redistribute it and/or modify
13 it under the terms of the GNU General Public License as published by
14 the Free Software Foundation; either version 3 of the License, or
15 (at your option) any later version.
17 This program is distributed in the hope that it will be useful,
18 but WITHOUT ANY WARRANTY; without even the implied warranty of
19 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
20 GNU General Public License for more details.
22 You should have received a copy of the GNU General Public License
23 along with this program. If not, see <http://www.gnu.org/licenses/>.
27 #include "../../lib/util/util_net.h"
28 #include "librpc/gen_ndr/ndr_epmapper.h"
29 #include "librpc/gen_ndr/ndr_misc.h"
30 #include "librpc/rpc/dcerpc.h"
31 #include "rpc_common.h"
36 #define MAX_PROTSEQ 10
40 enum dcerpc_transport_t transport;
42 enum epm_protocol protseq[MAX_PROTSEQ];
44 { "ncacn_np", NCACN_NP, 3,
45 { EPM_PROTOCOL_NCACN, EPM_PROTOCOL_SMB, EPM_PROTOCOL_NETBIOS }},
46 { "ncacn_ip_tcp", NCACN_IP_TCP, 3,
47 { EPM_PROTOCOL_NCACN, EPM_PROTOCOL_TCP, EPM_PROTOCOL_IP } },
48 { "ncacn_http", NCACN_HTTP, 3,
49 { EPM_PROTOCOL_NCACN, EPM_PROTOCOL_HTTP, EPM_PROTOCOL_IP } },
50 { "ncadg_ip_udp", NCACN_IP_UDP, 3,
51 { EPM_PROTOCOL_NCADG, EPM_PROTOCOL_UDP, EPM_PROTOCOL_IP } },
52 { "ncalrpc", NCALRPC, 2,
53 { EPM_PROTOCOL_NCALRPC, EPM_PROTOCOL_NAMED_PIPE } },
54 { "ncacn_unix_stream", NCACN_UNIX_STREAM, 2,
55 { EPM_PROTOCOL_NCACN, EPM_PROTOCOL_UNIX_DS } },
56 { "ncadg_unix_dgram", NCADG_UNIX_DGRAM, 2,
57 { EPM_PROTOCOL_NCADG, EPM_PROTOCOL_UNIX_DS } },
58 { "ncacn_at_dsp", NCACN_AT_DSP, 3,
59 { EPM_PROTOCOL_NCACN, EPM_PROTOCOL_APPLETALK, EPM_PROTOCOL_DSP } },
60 { "ncadg_at_ddp", NCADG_AT_DDP, 3,
61 { EPM_PROTOCOL_NCADG, EPM_PROTOCOL_APPLETALK, EPM_PROTOCOL_DDP } },
62 { "ncacn_vns_ssp", NCACN_VNS_SPP, 3,
63 { EPM_PROTOCOL_NCACN, EPM_PROTOCOL_STREETTALK, EPM_PROTOCOL_VINES_SPP } },
64 { "ncacn_vns_ipc", NCACN_VNS_IPC, 3,
65 { EPM_PROTOCOL_NCACN, EPM_PROTOCOL_STREETTALK, EPM_PROTOCOL_VINES_IPC }, },
66 { "ncadg_ipx", NCADG_IPX, 2,
67 { EPM_PROTOCOL_NCADG, EPM_PROTOCOL_IPX },
69 { "ncacn_spx", NCACN_SPX, 3,
70 /* I guess some MS programmer confused the identifier for
71 * EPM_PROTOCOL_UUID (0x0D or 13) with the one for
72 * EPM_PROTOCOL_SPX (0x13) here. -- jelmer*/
73 { EPM_PROTOCOL_NCACN, EPM_PROTOCOL_NCALRPC, EPM_PROTOCOL_UUID },
77 static const struct ncacn_option {
81 {"sign", DCERPC_SIGN},
82 {"seal", DCERPC_SEAL},
83 {"connect", DCERPC_CONNECT},
84 {"spnego", DCERPC_AUTH_SPNEGO},
85 {"ntlm", DCERPC_AUTH_NTLM},
86 {"krb5", DCERPC_AUTH_KRB5},
87 {"validate", DCERPC_DEBUG_VALIDATE_BOTH},
88 {"print", DCERPC_DEBUG_PRINT_BOTH},
89 {"padcheck", DCERPC_DEBUG_PAD_CHECK},
90 {"bigendian", DCERPC_PUSH_BIGENDIAN},
91 {"smb2", DCERPC_SMB2},
92 {"ndr64", DCERPC_NDR64},
95 static const struct ncacn_option *ncacn_option_by_name(const char *name)
99 for (i=0; i<ARRAY_SIZE(ncacn_options); i++) {
102 ret = strcasecmp(ncacn_options[i].name, name);
107 return &ncacn_options[i];
113 const char *epm_floor_string(TALLOC_CTX *mem_ctx, struct epm_floor *epm_floor)
115 struct ndr_syntax_id syntax;
118 switch(epm_floor->lhs.protocol) {
119 case EPM_PROTOCOL_UUID:
120 status = dcerpc_floor_get_lhs_data(epm_floor, &syntax);
121 if (NT_STATUS_IS_OK(status)) {
122 /* lhs is used: UUID */
125 if (GUID_equal(&syntax.uuid, &ndr_transfer_syntax_ndr.uuid)) {
129 if (GUID_equal(&syntax.uuid, &ndr_transfer_syntax_ndr64.uuid)) {
133 uuidstr = GUID_string(mem_ctx, &syntax.uuid);
135 return talloc_asprintf(mem_ctx, " uuid %s/0x%02x", uuidstr, syntax.if_version);
137 return talloc_asprintf(mem_ctx, "IPX:%s",
138 data_blob_hex_string_upper(mem_ctx, &epm_floor->rhs.uuid.unknown));
141 case EPM_PROTOCOL_NCACN:
144 case EPM_PROTOCOL_NCADG:
147 case EPM_PROTOCOL_NCALRPC:
150 case EPM_PROTOCOL_DNET_NSP:
153 case EPM_PROTOCOL_IP:
154 return talloc_asprintf(mem_ctx, "IP:%s", epm_floor->rhs.ip.ipaddr);
156 case EPM_PROTOCOL_NAMED_PIPE:
157 return talloc_asprintf(mem_ctx, "NAMED-PIPE:%s", epm_floor->rhs.named_pipe.path);
159 case EPM_PROTOCOL_SMB:
160 return talloc_asprintf(mem_ctx, "SMB:%s", epm_floor->rhs.smb.unc);
162 case EPM_PROTOCOL_UNIX_DS:
163 return talloc_asprintf(mem_ctx, "Unix:%s", epm_floor->rhs.unix_ds.path);
165 case EPM_PROTOCOL_NETBIOS:
166 return talloc_asprintf(mem_ctx, "NetBIOS:%s", epm_floor->rhs.netbios.name);
168 case EPM_PROTOCOL_NETBEUI:
171 case EPM_PROTOCOL_SPX:
174 case EPM_PROTOCOL_NB_IPX:
177 case EPM_PROTOCOL_HTTP:
178 return talloc_asprintf(mem_ctx, "HTTP:%d", epm_floor->rhs.http.port);
180 case EPM_PROTOCOL_TCP:
181 return talloc_asprintf(mem_ctx, "TCP:%d", epm_floor->rhs.tcp.port);
183 case EPM_PROTOCOL_UDP:
184 return talloc_asprintf(mem_ctx, "UDP:%d", epm_floor->rhs.udp.port);
187 return talloc_asprintf(mem_ctx, "UNK(%02x):", epm_floor->lhs.protocol);
193 form a binding string from a binding structure
195 _PUBLIC_ char *dcerpc_binding_string(TALLOC_CTX *mem_ctx, const struct dcerpc_binding *b)
197 char *s = talloc_strdup(mem_ctx, "");
200 const char *t_name = NULL;
202 if (b->transport != NCA_UNKNOWN) {
203 t_name = derpc_transport_string_by_transport(b->transport);
210 if (!GUID_all_zero(&b->object.uuid)) {
212 s = talloc_asprintf_append_buffer(s, "%s@",
213 GUID_string(mem_ctx, &b->object.uuid));
220 if (t_name != NULL) {
222 s = talloc_asprintf_append_buffer(s, "%s:", t_name);
231 s = talloc_asprintf_append_buffer(s, "%s", b->host);
238 if (!b->endpoint && !b->options && !b->flags) {
243 s = talloc_asprintf_append_buffer(s, "[");
251 s = talloc_asprintf_append_buffer(s, "%s", b->endpoint);
258 for (i=0;i<ARRAY_SIZE(ncacn_options);i++) {
259 if (!(b->flags & ncacn_options[i].flag)) {
264 s = talloc_asprintf_append_buffer(s, ",%s", ncacn_options[i].name);
271 for (i=0;b->options && b->options[i];i++) {
273 s = talloc_asprintf_append_buffer(s, ",%s", b->options[i]);
281 s = talloc_asprintf_append_buffer(s, "]");
291 parse a binding string into a dcerpc_binding structure
293 _PUBLIC_ NTSTATUS dcerpc_parse_binding(TALLOC_CTX *mem_ctx, const char *_s, struct dcerpc_binding **b_out)
296 struct dcerpc_binding *b;
298 char *options = NULL;
303 b = talloc_zero(mem_ctx, struct dcerpc_binding);
305 return NT_STATUS_NO_MEMORY;
308 _t = talloc_strdup(b, _s);
311 return NT_STATUS_NO_MEMORY;
320 if (options[strlen(options)-1] != ']') {
322 return NT_STATUS_INVALID_PARAMETER_MIX;
324 options[strlen(options)-1] = 0;
329 if (p && PTR_DIFF(p, s) == 36) { /* 36 is the length of a UUID */
332 status = dcerpc_binding_set_string_option(b, "object", s);
333 if (!NT_STATUS_IS_OK(status)) {
344 b->transport = NCA_UNKNOWN;
348 status = dcerpc_binding_set_string_option(b, "transport", s);
349 if (!NT_STATUS_IS_OK(status)) {
358 status = dcerpc_binding_set_string_option(b, "host", s);
359 if (!NT_STATUS_IS_OK(status)) {
364 b->target_hostname = talloc_strdup(b, b->host);
365 if (b->target_hostname == NULL) {
367 return NT_STATUS_NO_MEMORY;
371 for (i=0; options != NULL; i++) {
372 const char *name = options;
373 const char *value = NULL;
375 p = strchr(options, ',');
383 p = strchr(name, '=');
391 * If it's not a key=value pair
392 * it might be a ncacn_option
393 * or if it's the first option
396 const struct ncacn_option *no = NULL;
400 no = ncacn_option_by_name(name);
404 * we don't allow unknown options
406 return NT_STATUS_INVALID_PARAMETER_MIX;
410 * This is the endpoint
413 if (strlen(value) == 0) {
419 status = dcerpc_binding_set_string_option(b, name, value);
420 if (!NT_STATUS_IS_OK(status)) {
431 _PUBLIC_ void dcerpc_binding_get_auth_info(const struct dcerpc_binding *b,
432 enum dcerpc_AuthType *_auth_type,
433 enum dcerpc_AuthLevel *_auth_level)
435 enum dcerpc_AuthType auth_type;
436 enum dcerpc_AuthLevel auth_level;
438 if (b->flags & DCERPC_AUTH_SPNEGO) {
439 auth_type = DCERPC_AUTH_TYPE_SPNEGO;
440 } else if (b->flags & DCERPC_AUTH_KRB5) {
441 auth_type = DCERPC_AUTH_TYPE_KRB5;
442 } else if (b->flags & DCERPC_SCHANNEL) {
443 auth_type = DCERPC_AUTH_TYPE_SCHANNEL;
444 } else if (b->flags & DCERPC_AUTH_NTLM) {
445 auth_type = DCERPC_AUTH_TYPE_NTLMSSP;
447 auth_type = DCERPC_AUTH_TYPE_NONE;
450 if (b->flags & DCERPC_SEAL) {
451 auth_level = DCERPC_AUTH_LEVEL_PRIVACY;
452 } else if (b->flags & DCERPC_SIGN) {
453 auth_level = DCERPC_AUTH_LEVEL_INTEGRITY;
454 } else if (b->flags & DCERPC_CONNECT) {
455 auth_level = DCERPC_AUTH_LEVEL_CONNECT;
456 } else if (auth_type != DCERPC_AUTH_TYPE_NONE) {
457 auth_level = DCERPC_AUTH_LEVEL_CONNECT;
459 auth_level = DCERPC_AUTH_LEVEL_NONE;
462 if (_auth_type == NULL) {
463 *_auth_type = auth_type;
466 if (_auth_level == NULL) {
467 *_auth_level = auth_level;
471 _PUBLIC_ const char *dcerpc_binding_get_string_option(const struct dcerpc_binding *b,
477 #define _SPECIAL(x) { .name = #x, .value = b->x, }
479 { .name = "object", .value = b->object_string, },
482 _SPECIAL(target_hostname),
483 _SPECIAL(target_principal),
486 const struct ncacn_option *no = NULL;
487 size_t name_len = strlen(name);
491 ret = strcmp(name, "transport");
493 return derpc_transport_string_by_transport(b->transport);
496 for (i=0; i < ARRAY_SIZE(specials); i++) {
497 ret = strcmp(specials[i].name, name);
502 return specials[i].value;
505 no = ncacn_option_by_name(name);
507 if (b->flags & no->flag) {
514 if (b->options == NULL) {
518 for (i=0; b->options[i]; i++) {
519 const char *o = b->options[i];
520 const char *vs = NULL;
522 ret = strncmp(name, o, name_len);
527 if (o[name_len] != '=') {
531 vs = &o[name_len + 1];
539 _PUBLIC_ char *dcerpc_binding_copy_string_option(TALLOC_CTX *mem_ctx,
540 const struct dcerpc_binding *b,
543 const char *c = dcerpc_binding_get_string_option(b, name);
551 v = talloc_strdup(mem_ctx, c);
560 _PUBLIC_ NTSTATUS dcerpc_binding_set_string_option(struct dcerpc_binding *b,
567 #define _SPECIAL(x) { .name = #x, .ptr = &b->x, }
571 _SPECIAL(target_hostname),
572 _SPECIAL(target_principal),
575 const struct ncacn_option *no = NULL;
576 size_t name_len = strlen(name);
577 const char *opt = NULL;
583 * Note: value == NULL, means delete it.
584 * value != NULL means add or reset.
587 ret = strcmp(name, "transport");
589 enum dcerpc_transport_t t = dcerpc_transport_by_name(value);
591 if (t == NCA_UNKNOWN && value != NULL) {
592 return NT_STATUS_INVALID_PARAMETER_MIX;
599 ret = strcmp(name, "object");
605 tmp = discard_const_p(char, b->object_string);
609 b->object_string = NULL;
610 ZERO_STRUCT(b->object);
614 blob = data_blob_string_const(value);
615 if (blob.length != 36) {
616 return NT_STATUS_INVALID_PARAMETER_MIX;
619 status = GUID_from_data_blob(&blob, &uuid);
620 if (!NT_STATUS_IS_OK(status)) {
624 b->object_string = GUID_string(b, &uuid);
625 if (b->object_string == NULL) {
626 b->object_string = tmp;
627 return NT_STATUS_NO_MEMORY;
631 ZERO_STRUCT(b->object);
632 b->object.uuid = uuid;
636 for (i=0; i < ARRAY_SIZE(specials); i++) {
637 ret = strcmp(specials[i].name, name);
642 tmp = discard_const_p(char, *specials[i].ptr);
646 *specials[i].ptr = NULL;
650 if (value[0] == '\0') {
651 return NT_STATUS_INVALID_PARAMETER_MIX;
654 *specials[i].ptr = talloc_strdup(b, value);
655 if (*specials[i].ptr == NULL) {
656 *specials[i].ptr = tmp;
657 return NT_STATUS_NO_MEMORY;
664 no = ncacn_option_by_name(name);
667 b->flags &= ~no->flag;
671 ret = strcasecmp(no->name, value);
673 return NT_STATUS_INVALID_PARAMETER_MIX;
676 b->flags |= no->flag;
680 for (i=0; b->options && b->options[i]; i++) {
681 const char *o = b->options[i];
683 ret = strncmp(name, o, name_len);
688 if (o[name_len] != '=') {
703 n = talloc_realloc(b, b->options, const char *, i + 2);
705 return NT_STATUS_NO_MEMORY;
712 tmp = discard_const_p(char, opt);
715 for (;b->options[i];i++) {
716 b->options[i] = b->options[i+1];
722 b->options[i] = talloc_asprintf(b->options, "%s=%s",
724 if (b->options[i] == NULL) {
726 return NT_STATUS_NO_MEMORY;
732 _PUBLIC_ uint32_t dcerpc_binding_get_flags(const struct dcerpc_binding *b)
737 _PUBLIC_ NTSTATUS dcerpc_binding_set_flags(struct dcerpc_binding *b,
742 * TODO: in future we may want to reject invalid combinations
745 b->flags |= additional;
750 _PUBLIC_ NTSTATUS dcerpc_floor_get_lhs_data(const struct epm_floor *epm_floor,
751 struct ndr_syntax_id *syntax)
753 TALLOC_CTX *mem_ctx = talloc_init("floor_get_lhs_data");
754 struct ndr_pull *ndr;
755 enum ndr_err_code ndr_err;
756 uint16_t if_version=0;
758 ndr = ndr_pull_init_blob(&epm_floor->lhs.lhs_data, mem_ctx);
760 talloc_free(mem_ctx);
761 return NT_STATUS_NO_MEMORY;
763 ndr->flags |= LIBNDR_FLAG_NOALIGN;
765 ndr_err = ndr_pull_GUID(ndr, NDR_SCALARS | NDR_BUFFERS, &syntax->uuid);
766 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
767 talloc_free(mem_ctx);
768 return ndr_map_error2ntstatus(ndr_err);
771 ndr_err = ndr_pull_uint16(ndr, NDR_SCALARS, &if_version);
772 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
773 talloc_free(mem_ctx);
774 return ndr_map_error2ntstatus(ndr_err);
777 syntax->if_version = if_version;
779 talloc_free(mem_ctx);
784 static DATA_BLOB dcerpc_floor_pack_lhs_data(TALLOC_CTX *mem_ctx, const struct ndr_syntax_id *syntax)
787 enum ndr_err_code ndr_err;
788 struct ndr_push *ndr;
790 ndr = ndr_push_init_ctx(mem_ctx);
792 return data_blob_null;
795 ndr->flags |= LIBNDR_FLAG_NOALIGN;
797 ndr_err = ndr_push_GUID(ndr, NDR_SCALARS | NDR_BUFFERS, &syntax->uuid);
798 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
799 return data_blob_null;
801 ndr_err = ndr_push_uint16(ndr, NDR_SCALARS, syntax->if_version);
802 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
803 return data_blob_null;
806 blob = ndr_push_blob(ndr);
807 talloc_steal(mem_ctx, blob.data);
812 static bool dcerpc_floor_pack_rhs_if_version_data(
813 TALLOC_CTX *mem_ctx, const struct ndr_syntax_id *syntax,
817 struct ndr_push *ndr = ndr_push_init_ctx(mem_ctx);
818 enum ndr_err_code ndr_err;
824 ndr->flags |= LIBNDR_FLAG_NOALIGN;
826 ndr_err = ndr_push_uint16(ndr, NDR_SCALARS, syntax->if_version >> 16);
827 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
831 blob = ndr_push_blob(ndr);
832 talloc_steal(mem_ctx, blob.data);
838 char *dcerpc_floor_get_rhs_data(TALLOC_CTX *mem_ctx, struct epm_floor *epm_floor)
840 switch (epm_floor->lhs.protocol) {
841 case EPM_PROTOCOL_TCP:
842 if (epm_floor->rhs.tcp.port == 0) return NULL;
843 return talloc_asprintf(mem_ctx, "%d", epm_floor->rhs.tcp.port);
845 case EPM_PROTOCOL_UDP:
846 if (epm_floor->rhs.udp.port == 0) return NULL;
847 return talloc_asprintf(mem_ctx, "%d", epm_floor->rhs.udp.port);
849 case EPM_PROTOCOL_HTTP:
850 if (epm_floor->rhs.http.port == 0) return NULL;
851 return talloc_asprintf(mem_ctx, "%d", epm_floor->rhs.http.port);
853 case EPM_PROTOCOL_IP:
854 return talloc_strdup(mem_ctx, epm_floor->rhs.ip.ipaddr);
856 case EPM_PROTOCOL_NCACN:
859 case EPM_PROTOCOL_NCADG:
862 case EPM_PROTOCOL_SMB:
863 if (strlen(epm_floor->rhs.smb.unc) == 0) return NULL;
864 return talloc_strdup(mem_ctx, epm_floor->rhs.smb.unc);
866 case EPM_PROTOCOL_NAMED_PIPE:
867 if (strlen(epm_floor->rhs.named_pipe.path) == 0) return NULL;
868 return talloc_strdup(mem_ctx, epm_floor->rhs.named_pipe.path);
870 case EPM_PROTOCOL_NETBIOS:
871 if (strlen(epm_floor->rhs.netbios.name) == 0) return NULL;
872 return talloc_strdup(mem_ctx, epm_floor->rhs.netbios.name);
874 case EPM_PROTOCOL_NCALRPC:
877 case EPM_PROTOCOL_VINES_SPP:
878 return talloc_asprintf(mem_ctx, "%d", epm_floor->rhs.vines_spp.port);
880 case EPM_PROTOCOL_VINES_IPC:
881 return talloc_asprintf(mem_ctx, "%d", epm_floor->rhs.vines_ipc.port);
883 case EPM_PROTOCOL_STREETTALK:
884 return talloc_strdup(mem_ctx, epm_floor->rhs.streettalk.streettalk);
886 case EPM_PROTOCOL_UNIX_DS:
887 if (strlen(epm_floor->rhs.unix_ds.path) == 0) return NULL;
888 return talloc_strdup(mem_ctx, epm_floor->rhs.unix_ds.path);
890 case EPM_PROTOCOL_NULL:
894 DEBUG(0,("Unsupported lhs protocol %d\n", epm_floor->lhs.protocol));
901 static NTSTATUS dcerpc_floor_set_rhs_data(TALLOC_CTX *mem_ctx,
902 struct epm_floor *epm_floor,
909 switch (epm_floor->lhs.protocol) {
910 case EPM_PROTOCOL_TCP:
911 epm_floor->rhs.tcp.port = atoi(data);
914 case EPM_PROTOCOL_UDP:
915 epm_floor->rhs.udp.port = atoi(data);
918 case EPM_PROTOCOL_HTTP:
919 epm_floor->rhs.http.port = atoi(data);
922 case EPM_PROTOCOL_IP:
923 if (!is_ipaddress_v4(data)) {
926 epm_floor->rhs.ip.ipaddr = talloc_strdup(mem_ctx, data);
927 NT_STATUS_HAVE_NO_MEMORY(epm_floor->rhs.ip.ipaddr);
930 case EPM_PROTOCOL_NCACN:
931 epm_floor->rhs.ncacn.minor_version = 0;
934 case EPM_PROTOCOL_NCADG:
935 epm_floor->rhs.ncadg.minor_version = 0;
938 case EPM_PROTOCOL_SMB:
939 epm_floor->rhs.smb.unc = talloc_strdup(mem_ctx, data);
940 NT_STATUS_HAVE_NO_MEMORY(epm_floor->rhs.smb.unc);
943 case EPM_PROTOCOL_NAMED_PIPE:
944 epm_floor->rhs.named_pipe.path = talloc_strdup(mem_ctx, data);
945 NT_STATUS_HAVE_NO_MEMORY(epm_floor->rhs.named_pipe.path);
948 case EPM_PROTOCOL_NETBIOS:
949 epm_floor->rhs.netbios.name = talloc_strdup(mem_ctx, data);
950 NT_STATUS_HAVE_NO_MEMORY(epm_floor->rhs.netbios.name);
953 case EPM_PROTOCOL_NCALRPC:
956 case EPM_PROTOCOL_VINES_SPP:
957 epm_floor->rhs.vines_spp.port = atoi(data);
960 case EPM_PROTOCOL_VINES_IPC:
961 epm_floor->rhs.vines_ipc.port = atoi(data);
964 case EPM_PROTOCOL_STREETTALK:
965 epm_floor->rhs.streettalk.streettalk = talloc_strdup(mem_ctx, data);
966 NT_STATUS_HAVE_NO_MEMORY(epm_floor->rhs.streettalk.streettalk);
969 case EPM_PROTOCOL_UNIX_DS:
970 epm_floor->rhs.unix_ds.path = talloc_strdup(mem_ctx, data);
971 NT_STATUS_HAVE_NO_MEMORY(epm_floor->rhs.unix_ds.path);
974 case EPM_PROTOCOL_NULL:
978 DEBUG(0,("Unsupported lhs protocol %d\n", epm_floor->lhs.protocol));
982 return NT_STATUS_NOT_SUPPORTED;
985 enum dcerpc_transport_t dcerpc_transport_by_endpoint_protocol(int prot)
989 /* Find a transport that has 'prot' as 4th protocol */
990 for (i=0;i<ARRAY_SIZE(transports);i++) {
991 if (transports[i].num_protocols >= 2 &&
992 transports[i].protseq[1] == prot) {
993 return transports[i].transport;
997 /* Unknown transport */
998 return (unsigned int)-1;
1001 _PUBLIC_ enum dcerpc_transport_t dcerpc_transport_by_tower(const struct epm_tower *tower)
1005 /* Find a transport that matches this tower */
1006 for (i=0;i<ARRAY_SIZE(transports);i++) {
1008 if (transports[i].num_protocols != tower->num_floors - 2) {
1012 for (j = 0; j < transports[i].num_protocols; j++) {
1013 if (transports[i].protseq[j] != tower->floors[j+2].lhs.protocol) {
1018 if (j == transports[i].num_protocols) {
1019 return transports[i].transport;
1023 /* Unknown transport */
1024 return (unsigned int)-1;
1027 _PUBLIC_ const char *derpc_transport_string_by_transport(enum dcerpc_transport_t t)
1031 for (i=0; i<ARRAY_SIZE(transports); i++) {
1032 if (t == transports[i].transport) {
1033 return transports[i].name;
1039 _PUBLIC_ enum dcerpc_transport_t dcerpc_transport_by_name(const char *name)
1047 for (i=0; i<ARRAY_SIZE(transports);i++) {
1048 if (strcasecmp(name, transports[i].name) == 0) {
1049 return transports[i].transport;
1056 _PUBLIC_ NTSTATUS dcerpc_binding_from_tower(TALLOC_CTX *mem_ctx,
1057 struct epm_tower *tower,
1058 struct dcerpc_binding **b_out)
1061 struct dcerpc_binding *binding;
1064 * A tower needs to have at least 4 floors to carry useful
1065 * information. Floor 3 is the transport identifier which defines
1066 * how many floors are required at least.
1068 if (tower->num_floors < 4) {
1069 return NT_STATUS_INVALID_PARAMETER;
1072 binding = talloc_zero(mem_ctx, struct dcerpc_binding);
1073 NT_STATUS_HAVE_NO_MEMORY(binding);
1075 ZERO_STRUCT(binding->object);
1076 binding->options = NULL;
1077 binding->host = NULL;
1078 binding->target_hostname = NULL;
1080 binding->assoc_group_id = 0;
1082 binding->transport = dcerpc_transport_by_tower(tower);
1084 if (binding->transport == (unsigned int)-1) {
1085 talloc_free(binding);
1086 return NT_STATUS_NOT_SUPPORTED;
1089 /* Set object uuid */
1090 status = dcerpc_floor_get_lhs_data(&tower->floors[0], &binding->object);
1092 if (!NT_STATUS_IS_OK(status)) {
1093 DEBUG(1, ("Error pulling object uuid and version: %s", nt_errstr(status)));
1094 talloc_free(binding);
1098 /* Ignore floor 1, it contains the NDR version info */
1100 binding->options = NULL;
1104 if (tower->num_floors >= 4) {
1105 binding->endpoint = dcerpc_floor_get_rhs_data(binding, &tower->floors[3]);
1108 int saved_errno = errno;
1109 talloc_free(binding);
1110 return map_nt_error_from_unix_common(saved_errno);
1113 /* Set network address */
1115 if (tower->num_floors >= 5) {
1116 binding->host = dcerpc_floor_get_rhs_data(binding, &tower->floors[4]);
1119 int saved_errno = errno;
1120 talloc_free(binding);
1121 return map_nt_error_from_unix_common(saved_errno);
1123 binding->target_hostname = binding->host;
1126 return NT_STATUS_OK;
1129 _PUBLIC_ struct dcerpc_binding *dcerpc_binding_dup(TALLOC_CTX *mem_ctx,
1130 const struct dcerpc_binding *b)
1132 struct dcerpc_binding *n;
1135 n = talloc_zero(mem_ctx, struct dcerpc_binding);
1140 n->transport = b->transport;
1141 n->object = b->object;
1142 n->flags = b->flags;
1143 n->assoc_group_id = b->assoc_group_id;
1145 if (b->object_string != NULL) {
1146 n->object_string = talloc_strdup(n, b->object_string);
1147 if (n->object_string == NULL) {
1152 if (b->host != NULL) {
1153 n->host = talloc_strdup(n, b->host);
1154 if (n->host == NULL) {
1160 if (b->target_hostname != NULL) {
1161 n->target_hostname = talloc_strdup(n, b->target_hostname);
1162 if (n->target_hostname == NULL) {
1168 if (b->target_principal != NULL) {
1169 n->target_principal = talloc_strdup(n, b->target_principal);
1170 if (n->target_principal == NULL) {
1176 if (b->endpoint != NULL) {
1177 n->endpoint = talloc_strdup(n, b->endpoint);
1178 if (n->endpoint == NULL) {
1184 for (count = 0; b->options && b->options[count]; count++);
1189 n->options = talloc_array(n, const char *, count + 1);
1190 if (n->options == NULL) {
1195 for (i = 0; i < count; i++) {
1196 n->options[i] = talloc_strdup(n->options, b->options[i]);
1197 if (n->options[i] == NULL) {
1202 n->options[count] = NULL;
1208 _PUBLIC_ NTSTATUS dcerpc_binding_build_tower(TALLOC_CTX *mem_ctx,
1209 const struct dcerpc_binding *binding,
1210 struct epm_tower *tower)
1212 const enum epm_protocol *protseq = NULL;
1213 int num_protocols = -1, i;
1216 /* Find transport */
1217 for (i=0;i<ARRAY_SIZE(transports);i++) {
1218 if (transports[i].transport == binding->transport) {
1219 protseq = transports[i].protseq;
1220 num_protocols = transports[i].num_protocols;
1225 if (num_protocols == -1) {
1226 DEBUG(0, ("Unable to find transport with id '%d'\n", binding->transport));
1227 return NT_STATUS_UNSUCCESSFUL;
1230 tower->num_floors = 2 + num_protocols;
1231 tower->floors = talloc_array(mem_ctx, struct epm_floor, tower->num_floors);
1234 tower->floors[0].lhs.protocol = EPM_PROTOCOL_UUID;
1236 tower->floors[0].lhs.lhs_data = dcerpc_floor_pack_lhs_data(tower->floors, &binding->object);
1238 if (!dcerpc_floor_pack_rhs_if_version_data(
1239 tower->floors, &binding->object,
1240 &tower->floors[0].rhs.uuid.unknown)) {
1241 return NT_STATUS_NO_MEMORY;
1245 tower->floors[1].lhs.protocol = EPM_PROTOCOL_UUID;
1247 tower->floors[1].lhs.lhs_data = dcerpc_floor_pack_lhs_data(tower->floors,
1248 &ndr_transfer_syntax_ndr);
1250 tower->floors[1].rhs.uuid.unknown = data_blob_talloc_zero(tower->floors, 2);
1252 /* Floor 2 to num_protocols */
1253 for (i = 0; i < num_protocols; i++) {
1254 tower->floors[2 + i].lhs.protocol = protseq[i];
1255 tower->floors[2 + i].lhs.lhs_data = data_blob_null;
1256 ZERO_STRUCT(tower->floors[2 + i].rhs);
1257 status = dcerpc_floor_set_rhs_data(tower->floors,
1258 &tower->floors[2 + i],
1260 if (!NT_STATUS_IS_OK(status)) {
1265 /* The 4th floor contains the endpoint */
1266 if (num_protocols >= 2 && binding->endpoint) {
1267 status = dcerpc_floor_set_rhs_data(tower->floors,
1270 if (!NT_STATUS_IS_OK(status)) {
1275 /* The 5th contains the network address */
1276 if (num_protocols >= 3 && binding->host) {
1277 status = dcerpc_floor_set_rhs_data(tower->floors,
1280 if (!NT_STATUS_IS_OK(status)) {
1285 return NT_STATUS_OK;