libcli/netlogon: re-enable debugging.
[samba.git] / libcli / netlogon.c
1 /*
2    Unix SMB/CIFS implementation.
3
4    CLDAP server structures
5
6    Copyright (C) Andrew Bartlett <abartlet@samba.org> 2008
7
8    This program is free software; you can redistribute it and/or modify
9    it under the terms of the GNU General Public License as published by
10    the Free Software Foundation; either version 3 of the License, or
11    (at your option) any later version.
12
13    This program is distributed in the hope that it will be useful,
14    but WITHOUT ANY WARRANTY; without even the implied warranty of
15    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
16    GNU General Public License for more details.
17
18    You should have received a copy of the GNU General Public License
19    along with this program.  If not, see <http://www.gnu.org/licenses/>.
20 */
21
22 #include "includes.h"
23 #include "../libcli/netlogon.h"
24
25 NTSTATUS push_netlogon_samlogon_response(DATA_BLOB *data, TALLOC_CTX *mem_ctx,
26                                          struct netlogon_samlogon_response *response)
27 {
28         enum ndr_err_code ndr_err;
29         if (response->ntver == NETLOGON_NT_VERSION_1) {
30                 ndr_err = ndr_push_struct_blob(data, mem_ctx,
31                                                &response->data.nt4,
32                                                (ndr_push_flags_fn_t)ndr_push_NETLOGON_SAM_LOGON_RESPONSE_NT40);
33         } else if (response->ntver & NETLOGON_NT_VERSION_5EX) {
34                 ndr_err = ndr_push_struct_blob(data, mem_ctx,
35                                                &response->data.nt5_ex,
36                                                (ndr_push_flags_fn_t)ndr_push_NETLOGON_SAM_LOGON_RESPONSE_EX_with_flags);
37         } else if (response->ntver & NETLOGON_NT_VERSION_5) {
38                 ndr_err = ndr_push_struct_blob(data, mem_ctx,
39                                                &response->data.nt5,
40                                                (ndr_push_flags_fn_t)ndr_push_NETLOGON_SAM_LOGON_RESPONSE);
41         } else {
42                 DEBUG(0, ("Asked to push unknown netlogon response type 0x%02x\n", response->ntver));
43                 return NT_STATUS_INVALID_PARAMETER;
44         }
45         if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
46                 DEBUG(2,("failed to push netlogon response of type 0x%02x\n",
47                          response->ntver));
48                 return ndr_map_error2ntstatus(ndr_err);
49         }
50         return NT_STATUS_OK;
51 }
52
53 NTSTATUS pull_netlogon_samlogon_response(DATA_BLOB *data, TALLOC_CTX *mem_ctx,
54                                          struct netlogon_samlogon_response *response)
55 {
56         uint32_t ntver;
57         enum ndr_err_code ndr_err;
58
59         if (data->length < 8) {
60                 return NT_STATUS_BUFFER_TOO_SMALL;
61         }
62
63         /* lmnttoken */
64         if (SVAL(data->data, data->length - 4) != 0xffff) {
65                 return NT_STATUS_INVALID_NETWORK_RESPONSE;
66         }
67         /* lm20token */
68         if (SVAL(data->data, data->length - 2) != 0xffff) {
69                 return NT_STATUS_INVALID_NETWORK_RESPONSE;
70         }
71
72         ntver = IVAL(data->data, data->length - 8);
73
74         if (ntver == NETLOGON_NT_VERSION_1) {
75                 ndr_err = ndr_pull_struct_blob_all(data, mem_ctx,
76                                                    &response->data.nt4,
77                                                    (ndr_pull_flags_fn_t)ndr_pull_NETLOGON_SAM_LOGON_RESPONSE_NT40);
78                 response->ntver = NETLOGON_NT_VERSION_1;
79                 if (NDR_ERR_CODE_IS_SUCCESS(ndr_err) && DEBUGLEVEL >= 10) {
80                         NDR_PRINT_DEBUG(NETLOGON_SAM_LOGON_RESPONSE_NT40,
81                                         &response->data.nt4);
82                 }
83
84         } else if (ntver & NETLOGON_NT_VERSION_5EX) {
85                 struct ndr_pull *ndr;
86                 ndr = ndr_pull_init_blob(data, mem_ctx);
87                 if (!ndr) {
88                         return NT_STATUS_NO_MEMORY;
89                 }
90                 ndr_err = ndr_pull_NETLOGON_SAM_LOGON_RESPONSE_EX_with_flags(
91                         ndr, NDR_SCALARS|NDR_BUFFERS, &response->data.nt5_ex,
92                         ntver);
93                 if (ndr->offset < ndr->data_size) {
94                         ndr_err = ndr_pull_error(ndr, NDR_ERR_UNREAD_BYTES,
95                                                  "not all bytes consumed ofs[%u] size[%u]",
96                                                  ndr->offset, ndr->data_size);
97                 }
98                 response->ntver = NETLOGON_NT_VERSION_5EX;
99                 if (NDR_ERR_CODE_IS_SUCCESS(ndr_err) && DEBUGLEVEL >= 10) {
100                         NDR_PRINT_DEBUG(NETLOGON_SAM_LOGON_RESPONSE_EX,
101                                         &response->data.nt5_ex);
102                 }
103
104         } else if (ntver & NETLOGON_NT_VERSION_5) {
105                 ndr_err = ndr_pull_struct_blob_all(data, mem_ctx,
106                                                    &response->data.nt5,
107                                                    (ndr_pull_flags_fn_t)ndr_pull_NETLOGON_SAM_LOGON_RESPONSE);
108                 response->ntver = NETLOGON_NT_VERSION_5;
109                 if (NDR_ERR_CODE_IS_SUCCESS(ndr_err) && DEBUGLEVEL >= 10) {
110                         NDR_PRINT_DEBUG(NETLOGON_SAM_LOGON_RESPONSE,
111                                         &response->data.nt5);
112                 }
113         } else {
114                 DEBUG(2,("failed to parse netlogon response of type 0x%02x - unknown response type\n",
115                          ntver));
116                 dump_data(10, data->data, data->length);
117                 return NT_STATUS_INVALID_NETWORK_RESPONSE;
118         }
119
120         if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
121                 DEBUG(2,("failed to parse netlogon response of type 0x%02x\n",
122                          ntver));
123                 dump_data(10, data->data, data->length);
124                 return ndr_map_error2ntstatus(ndr_err);
125         }
126
127         return NT_STATUS_OK;
128 }
129
130 void map_netlogon_samlogon_response(struct netlogon_samlogon_response *response)
131 {
132         struct NETLOGON_SAM_LOGON_RESPONSE_EX response_5_ex;
133         switch (response->ntver) {
134         case NETLOGON_NT_VERSION_5EX:
135                 break;
136         case NETLOGON_NT_VERSION_5:
137                 ZERO_STRUCT(response_5_ex);
138                 response_5_ex.command = response->data.nt5.command;
139                 response_5_ex.pdc_name = response->data.nt5.pdc_name;
140                 response_5_ex.user_name = response->data.nt5.user_name;
141                 response_5_ex.domain_name = response->data.nt5.domain_name;
142                 response_5_ex.domain_uuid = response->data.nt5.domain_uuid;
143                 response_5_ex.forest = response->data.nt5.forest;
144                 response_5_ex.dns_domain = response->data.nt5.dns_domain;
145                 response_5_ex.pdc_dns_name = response->data.nt5.pdc_dns_name;
146                 response_5_ex.sockaddr.pdc_ip = response->data.nt5.pdc_ip;
147                 response_5_ex.server_type = response->data.nt5.server_type;
148                 response_5_ex.nt_version = response->data.nt5.nt_version;
149                 response_5_ex.lmnt_token = response->data.nt5.lmnt_token;
150                 response_5_ex.lm20_token = response->data.nt5.lm20_token;
151                 response->ntver = NETLOGON_NT_VERSION_5EX;
152                 response->data.nt5_ex = response_5_ex;
153                 break;
154
155         case NETLOGON_NT_VERSION_1:
156                 ZERO_STRUCT(response_5_ex);
157                 response_5_ex.command = response->data.nt4.command;
158                 response_5_ex.pdc_name = response->data.nt4.pdc_name;
159                 response_5_ex.user_name = response->data.nt4.user_name;
160                 response_5_ex.domain_name = response->data.nt4.domain_name;
161                 response_5_ex.nt_version = response->data.nt4.nt_version;
162                 response_5_ex.lmnt_token = response->data.nt4.lmnt_token;
163                 response_5_ex.lm20_token = response->data.nt4.lm20_token;
164                 response->ntver = NETLOGON_NT_VERSION_5EX;
165                 response->data.nt5_ex = response_5_ex;
166                 break;
167         }
168         return;
169 }
170
171 NTSTATUS push_nbt_netlogon_response(DATA_BLOB *data, TALLOC_CTX *mem_ctx,
172                                     struct nbt_netlogon_response *response)
173 {
174         NTSTATUS status = NT_STATUS_INVALID_NETWORK_RESPONSE;
175         enum ndr_err_code ndr_err;
176         switch (response->response_type) {
177         case NETLOGON_GET_PDC:
178                 ndr_err = ndr_push_struct_blob(data, mem_ctx,
179                                                &response->data.get_pdc,
180                                                (ndr_push_flags_fn_t)ndr_push_nbt_netlogon_response_from_pdc);
181                 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
182                         status = ndr_map_error2ntstatus(ndr_err);
183                         DEBUG(0,("Failed to parse netlogon packet of length %d: %s\n",
184                                  (int)data->length, nt_errstr(status)));
185                         if (DEBUGLVL(10)) {
186                                 file_save("netlogon.dat", data->data, data->length);
187                         }
188                         return status;
189                 }
190                 status = NT_STATUS_OK;
191                 break;
192         case NETLOGON_SAMLOGON:
193                 status = push_netlogon_samlogon_response(
194                         data, mem_ctx, 
195                         &response->data.samlogon);
196                 break;
197         }
198         return status;
199 }
200
201
202 NTSTATUS pull_nbt_netlogon_response(DATA_BLOB *data, TALLOC_CTX *mem_ctx,
203                                          struct nbt_netlogon_response *response)
204 {
205         NTSTATUS status = NT_STATUS_INVALID_NETWORK_RESPONSE;
206         enum netlogon_command command;
207         enum ndr_err_code ndr_err;
208         if (data->length < 4) {
209                 return NT_STATUS_INVALID_NETWORK_RESPONSE;
210         }
211
212         command = SVAL(data->data, 0);
213
214         switch (command) {
215         case NETLOGON_RESPONSE_FROM_PDC:
216                 ndr_err = ndr_pull_struct_blob_all(data, mem_ctx,
217                                                    &response->data.get_pdc,
218                                                    (ndr_pull_flags_fn_t)ndr_pull_nbt_netlogon_response_from_pdc);
219                 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
220                         status = ndr_map_error2ntstatus(ndr_err);
221                         DEBUG(0,("Failed to parse netlogon packet of length %d: %s\n",
222                                  (int)data->length, nt_errstr(status)));
223                         if (DEBUGLVL(10)) {
224                                 file_save("netlogon.dat", data->data, data->length);
225                         }
226                         return status;
227                 }
228                 status = NT_STATUS_OK;
229                 response->response_type = NETLOGON_GET_PDC;
230                 break;
231         case LOGON_SAM_LOGON_RESPONSE:
232         case LOGON_SAM_LOGON_PAUSE_RESPONSE:
233         case LOGON_SAM_LOGON_USER_UNKNOWN:
234         case LOGON_SAM_LOGON_RESPONSE_EX:
235         case LOGON_SAM_LOGON_PAUSE_RESPONSE_EX:
236         case LOGON_SAM_LOGON_USER_UNKNOWN_EX:
237                 status = pull_netlogon_samlogon_response(
238                         data, mem_ctx, 
239                         &response->data.samlogon);
240                 response->response_type = NETLOGON_SAMLOGON;
241                 break;
242
243         /* These levels are queries, not responses */
244         case LOGON_PRIMARY_QUERY:
245         case NETLOGON_ANNOUNCE_UAS:
246         case LOGON_SAM_LOGON_REQUEST:
247                 status = NT_STATUS_INVALID_NETWORK_RESPONSE;
248         }
249
250         return status;
251
252 }