gensec: clarify memory ownership for gensec_session_info() and gensec_session_key()
[samba.git] / source4 / libcli / smb2 / session.c
index 3f9b3ed55c199e65c8e07b2420a9f04974610a37..0f749a0b6c2f1a31ca6fc02406b979b7844201cd 100644 (file)
 */
 
 #include "includes.h"
+#include <tevent.h>
+#include "lib/util/tevent_ntstatus.h"
 #include "libcli/raw/libcliraw.h"
 #include "libcli/smb2/smb2.h"
 #include "libcli/smb2/smb2_calls.h"
-#include "libcli/composite/composite.h"
 #include "auth/gensec/gensec.h"
 
-/*
+#include <unistd.h>
+
+/**
   initialise a smb2_session structure
  */
 struct smb2_session *smb2_session_init(struct smb2_transport *transport,
-                                      TALLOC_CTX *parent_ctx, BOOL primary)
+                                      struct gensec_settings *settings,
+                                      TALLOC_CTX *parent_ctx, bool primary)
 {
        struct smb2_session *session;
        NTSTATUS status;
@@ -45,9 +49,12 @@ struct smb2_session *smb2_session_init(struct smb2_transport *transport,
                session->transport = talloc_reference(session, transport);
        }
 
+       session->pid = getpid();
+
        /* prepare a gensec context for later use */
        status = gensec_client_start(session, &session->gensec, 
-                                    session->transport->socket->event.ctx);
+                                    session->transport->socket->event.ctx, 
+                                    settings);
        if (!NT_STATUS_IS_OK(status)) {
                talloc_free(session);
                return NULL;
@@ -58,7 +65,7 @@ struct smb2_session *smb2_session_init(struct smb2_transport *transport,
        return session;
 }
 
-/*
+/**
   send a session setup request
 */
 struct smb2_request *smb2_session_setup_send(struct smb2_session *session, 
@@ -68,13 +75,15 @@ struct smb2_request *smb2_session_setup_send(struct smb2_session *session,
        NTSTATUS status;
        
        req = smb2_request_init(session->transport, SMB2_OP_SESSSETUP, 
-                               0x18, True, io->in.secblob.length);
+                               0x18, true, io->in.secblob.length);
        if (req == NULL) return NULL;
 
-       SBVAL(req->out.hdr,  SMB2_HDR_UID, session->uid);
-       SSVAL(req->out.body, 0x02, io->in._pad); /* pad */
-       SIVAL(req->out.body, 0x04, io->in.unknown2);
-       SIVAL(req->out.body, 0x08, io->in.unknown3);
+       SBVAL(req->out.hdr,  SMB2_HDR_SESSION_ID, session->uid);
+       SCVAL(req->out.body, 0x02, io->in.vc_number);
+       SCVAL(req->out.body, 0x03, io->in.security_mode);
+       SIVAL(req->out.body, 0x04, io->in.capabilities);
+       SIVAL(req->out.body, 0x08, io->in.channel);
+       SBVAL(req->out.body, 0x10, io->in.previous_sessionid);
 
        req->session = session;
 
@@ -83,7 +92,6 @@ struct smb2_request *smb2_session_setup_send(struct smb2_session *session,
                talloc_free(req);
                return NULL;
        }
-       SBVAL(req->out.body, 0x10, io->in.unknown4);
 
        smb2_transport_send(req);
 
@@ -91,7 +99,7 @@ struct smb2_request *smb2_session_setup_send(struct smb2_session *session,
 }
 
 
-/*
+/**
   recv a session setup reply
 */
 NTSTATUS smb2_session_setup_recv(struct smb2_request *req, TALLOC_CTX *mem_ctx, 
@@ -105,10 +113,10 @@ NTSTATUS smb2_session_setup_recv(struct smb2_request *req, TALLOC_CTX *mem_ctx,
                return smb2_request_destroy(req);
        }
 
-       SMB2_CHECK_PACKET_RECV(req, 0x08, True);
+       SMB2_CHECK_PACKET_RECV(req, 0x08, true);
 
-       io->out._pad     = SVAL(req->in.body, 0x02);
-       io->out.uid      = BVAL(req->in.hdr,  SMB2_HDR_UID);
+       io->out.session_flags = SVAL(req->in.body, 0x02);
+       io->out.uid           = BVAL(req->in.hdr,  SMB2_HDR_SESSION_ID);
        
        status = smb2_pull_o16s16_blob(&req->in, mem_ctx, req->in.body+0x04, &io->out.secblob);
        if (!NT_STATUS_IS_OK(status)) {
@@ -129,121 +137,155 @@ NTSTATUS smb2_session_setup(struct smb2_session *session,
        return smb2_session_setup_recv(req, mem_ctx, io);
 }
 
-
-struct smb2_session_state {
+struct smb2_session_setup_spnego_state {
        struct smb2_session_setup io;
        struct smb2_request *req;
        NTSTATUS gensec_status;
 };
 
+static void smb2_session_setup_spnego_handler(struct smb2_request *req);
+
 /*
-  handle continuations of the spnego session setup
-*/
-static void session_request_handler(struct smb2_request *req)
+  a composite function that does a full SPNEGO session setup
+ */
+struct tevent_req *smb2_session_setup_spnego_send(TALLOC_CTX *mem_ctx,
+                                                 struct tevent_context *ev,
+                                                 struct smb2_session *session,
+                                                 struct cli_credentials *credentials)
 {
-       struct composite_context *c = talloc_get_type(req->async.private, 
-                                                     struct composite_context);
-       struct smb2_session_state *state = talloc_get_type(c->private_data, 
-                                                          struct smb2_session_state);
-       struct smb2_session *session = req->session;
-
-       c->status = smb2_session_setup_recv(req, c, &state->io);
-       if (NT_STATUS_EQUAL(c->status, NT_STATUS_MORE_PROCESSING_REQUIRED) ||
-           (NT_STATUS_IS_OK(c->status) && 
-            NT_STATUS_EQUAL(state->gensec_status, NT_STATUS_MORE_PROCESSING_REQUIRED))) {
-               NTSTATUS session_key_err;
-               DATA_BLOB session_key;
-               c->status = gensec_update(session->gensec, c, 
-                                         state->io.out.secblob,
-                                         &state->io.in.secblob);
-               state->gensec_status = c->status;
-
-               session_key_err = gensec_session_key(session->gensec, &session_key);
-               if (NT_STATUS_IS_OK(session_key_err)) {
-                       session->session_key = session_key;
-               }
+       struct tevent_req *req;
+       struct smb2_session_setup_spnego_state *state;
+       const char *chosen_oid;
+       struct smb2_request *subreq;
+       NTSTATUS status;
+
+       req = tevent_req_create(mem_ctx, &state,
+                               struct smb2_session_setup_spnego_state);
+       if (req == NULL) {
+               return NULL;
+       }
+
+       ZERO_STRUCT(state->io);
+       state->io.in.vc_number          = 0;
+       if (session->transport->signing_required) {
+               state->io.in.security_mode =
+                       SMB2_NEGOTIATE_SIGNING_ENABLED | SMB2_NEGOTIATE_SIGNING_REQUIRED;
        }
+       state->io.in.capabilities       = 0;
+       state->io.in.channel            = 0;
+       state->io.in.previous_sessionid = 0;
 
-       session->uid = state->io.out.uid;
+       status = gensec_set_credentials(session->gensec, credentials);
+       if (tevent_req_nterror(req, status)) {
+               return tevent_req_post(req, ev);
+       }
 
-       if (NT_STATUS_EQUAL(c->status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
-               state->req = smb2_session_setup_send(session, &state->io);
-               if (state->req == NULL) {
-                       composite_error(c, NT_STATUS_NO_MEMORY);
-                       return;
-               }
+       status = gensec_set_target_hostname(session->gensec,
+                                           session->transport->socket->hostname);
+       if (tevent_req_nterror(req, status)) {
+               return tevent_req_post(req, ev);
+       }
 
-               state->req->async.fn = session_request_handler;
-               state->req->async.private = c;
-               return;
+       status = gensec_set_target_service(session->gensec, "cifs");
+       if (tevent_req_nterror(req, status)) {
+               return tevent_req_post(req, ev);
        }
 
-       if (!NT_STATUS_IS_OK(c->status)) {
-               composite_error(c, c->status);
-               return;
+       if (session->transport->negotiate.secblob.length > 0) {
+               chosen_oid = GENSEC_OID_SPNEGO;
+       } else {
+               chosen_oid = GENSEC_OID_NTLMSSP;
        }
 
-       composite_done(c);
+       status = gensec_start_mech_by_oid(session->gensec, chosen_oid);
+       if (tevent_req_nterror(req, status)) {
+               return tevent_req_post(req, ev);
+       }
+
+       status = gensec_update(session->gensec, state,
+                              session->transport->negotiate.secblob,
+                              &state->io.in.secblob);
+       if (!NT_STATUS_EQUAL(status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
+               tevent_req_nterror(req, status);
+               return tevent_req_post(req, ev);
+       }
+       state->gensec_status = status;
+
+       subreq = smb2_session_setup_send(session, &state->io);
+       if (tevent_req_nomem(subreq, req)) {
+               return tevent_req_post(req, ev);
+       }
+       subreq->async.fn = smb2_session_setup_spnego_handler;
+       subreq->async.private_data = req;
+
+       return req;
 }
 
 /*
-  a composite function that does a full SPNEGO session setup
- */
-struct composite_context *smb2_session_setup_spnego_send(struct smb2_session *session, 
-                                                        struct cli_credentials *credentials)
+  handle continuations of the spnego session setup
+*/
+static void smb2_session_setup_spnego_handler(struct smb2_request *subreq)
 {
-       struct composite_context *c;
-       struct smb2_session_state *state;
+       struct tevent_req *req =
+               talloc_get_type_abort(subreq->async.private_data,
+               struct tevent_req);
+       struct smb2_session_setup_spnego_state *state =
+               tevent_req_data(req,
+               struct smb2_session_setup_spnego_state);
+       struct smb2_session *session = subreq->session;
+       NTSTATUS peer_status;
+       NTSTATUS status;
 
-       c = composite_create(session, session->transport->socket->event.ctx);
-       if (c == NULL) return NULL;
+       status = smb2_session_setup_recv(subreq, state, &state->io);
+       peer_status = status;
+       if (NT_STATUS_EQUAL(peer_status, NT_STATUS_MORE_PROCESSING_REQUIRED) ||
+           (NT_STATUS_IS_OK(peer_status) &&
+            NT_STATUS_EQUAL(state->gensec_status, NT_STATUS_MORE_PROCESSING_REQUIRED))) {
+               status = gensec_update(session->gensec, state,
+                                      state->io.out.secblob,
+                                      &state->io.in.secblob);
+               state->gensec_status = status;
+               session->uid = state->io.out.uid;
+       }
 
-       state = talloc(c, struct smb2_session_state);
-       if (composite_nomem(state, c)) return c;
-       c->private_data = state;
+       if (!NT_STATUS_IS_OK(status) &&
+           !NT_STATUS_EQUAL(status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
+               tevent_req_nterror(req, status);
+               return;
+       }
 
-       ZERO_STRUCT(state->io);
-       state->io.in._pad = 0x0000;
-       state->io.in.unknown2 = 0x0000000F;
-       state->io.in.unknown3 = 0x00000000;
-       state->io.in.unknown4 = 0; /* uint64_t */
-
-       c->status = gensec_set_credentials(session->gensec, credentials);
-       if (!composite_is_ok(c)) return c;
-
-       c->status = gensec_set_target_hostname(session->gensec, 
-                                              session->transport->socket->hostname);
-       if (!composite_is_ok(c)) return c;
-
-       c->status = gensec_set_target_service(session->gensec, "cifs");
-       if (!composite_is_ok(c)) return c;
-
-       c->status = gensec_start_mech_by_oid(session->gensec, GENSEC_OID_SPNEGO);
-       if (!composite_is_ok(c)) return c;
-
-       c->status = gensec_update(session->gensec, c, 
-                                 session->transport->negotiate.secblob,
-                                 &state->io.in.secblob);
-       if (!NT_STATUS_EQUAL(c->status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
-               composite_error(c, c->status);
-               return c;
+       if (NT_STATUS_EQUAL(peer_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
+               subreq = smb2_session_setup_send(session, &state->io);
+               if (tevent_req_nomem(subreq, req)) {
+                       return;
+               }
+
+               subreq->async.fn = smb2_session_setup_spnego_handler;
+               subreq->async.private_data = req;
+               return;
        }
-       state->gensec_status = c->status;
-               
-       state->req = smb2_session_setup_send(session, &state->io);
-       composite_continue_smb2(c, state->req, session_request_handler, c);
-       return c;
+
+       gensec_session_key(session->gensec, session, &session->session_key);
+
+       if (session->transport->signing_required) {
+               if (session->session_key.length == 0) {
+                       DEBUG(0,("Wrong session key length %u for SMB2 signing\n",
+                                (unsigned)session->session_key.length));
+                       tevent_req_nterror(req, NT_STATUS_ACCESS_DENIED);
+                       return;
+               }
+               session->signing_active = true;
+       }
+
+       tevent_req_done(req);
 }
 
 /*
   receive a composite session setup reply
 */
-NTSTATUS smb2_session_setup_spnego_recv(struct composite_context *c)
+NTSTATUS smb2_session_setup_spnego_recv(struct tevent_req *req)
 {
-       NTSTATUS status;
-       status = composite_wait(c);
-       talloc_free(c);
-       return status;
+       return tevent_req_simple_recv_ntstatus(req);
 }
 
 /*
@@ -252,6 +294,37 @@ NTSTATUS smb2_session_setup_spnego_recv(struct composite_context *c)
 NTSTATUS smb2_session_setup_spnego(struct smb2_session *session, 
                                   struct cli_credentials *credentials)
 {
-       struct composite_context *c = smb2_session_setup_spnego_send(session, credentials);
-       return smb2_session_setup_spnego_recv(c);
+       struct tevent_req *subreq;
+       NTSTATUS status;
+       bool ok;
+       TALLOC_CTX *frame = talloc_stackframe();
+       struct tevent_context *ev = session->transport->socket->event.ctx;
+
+       if (frame == NULL) {
+               return NT_STATUS_NO_MEMORY;
+       }
+
+       subreq = smb2_session_setup_spnego_send(frame, ev,
+                                               session, credentials);
+       if (subreq == NULL) {
+               TALLOC_FREE(frame);
+               return NT_STATUS_NO_MEMORY;
+       }
+
+       ok = tevent_req_poll(subreq, ev);
+       if (!ok) {
+               status = map_nt_error_from_unix_common(errno);
+               TALLOC_FREE(frame);
+               return status;
+       }
+
+       status = smb2_session_setup_spnego_recv(subreq);
+       TALLOC_FREE(subreq);
+       if (!NT_STATUS_IS_OK(status)) {
+               TALLOC_FREE(frame);
+               return status;
+       }
+
+       TALLOC_FREE(frame);
+       return NT_STATUS_OK;
 }