Make cli_session_setup_guest chainable
[ira/wip.git] / source3 / libsmb / clidgram.c
index 9f6f4480c5e27453f173558e27f9655e85231904..349a8331b47c97e2091800d66245aeb28d4deb5d 100644 (file)
@@ -75,7 +75,13 @@ bool cli_send_mailslot(struct messaging_context *msg_ctx,
        /* Setup the smb part. */
        ptr -= 4; /* XXX Ugliness because of handling of tcp SMB length. */
        memcpy(tmp,ptr,4);
-       set_message(ptr,17,strlen(mailslot) + 1 + len,True);
+
+       if (smb_size + 17*2 + strlen(mailslot) + 1 + len > MAX_DGRAM_SIZE) {
+               DEBUG(0, ("cli_send_mailslot: Cannot write beyond end of packet\n"));
+               return False;
+       }
+
+       cli_set_message(ptr,17,strlen(mailslot) + 1 + len,True);
        memcpy(ptr,tmp,4);
 
        SCVAL(ptr,smb_com,SMBtrans);
@@ -99,7 +105,7 @@ bool cli_send_mailslot(struct messaging_context *msg_ctx,
        dgram->datasize = PTR_DIFF(p2,ptr+4); /* +4 for tcp length. */
 
        p.packet_type = DGRAM_PACKET;
-       p.ip = ((const struct sockaddr_in *)&dest_ss)->sin_addr;
+       p.ip = ((const struct sockaddr_in *)dest_ss)->sin_addr;
        p.timestamp = time(NULL);
 
        DEBUG(4,("send_mailslot: Sending to mailslot %s from %s ",
@@ -114,94 +120,193 @@ bool cli_send_mailslot(struct messaging_context *msg_ctx,
                                                  (uint8 *)&p, sizeof(p)));
 }
 
-/*
- * cli_get_response: Get a response ...
- */
-bool cli_get_response(const char *mailslot, char *buf, int bufsiz)
+static const char *mailslot_name(TALLOC_CTX *mem_ctx, struct in_addr dc_ip)
+{
+       return talloc_asprintf(mem_ctx, "%s%X",
+                              NBT_MAILSLOT_GETDC, dc_ip.s_addr);
+}
+
+bool send_getdc_request(TALLOC_CTX *mem_ctx,
+                       struct messaging_context *msg_ctx,
+                       struct sockaddr_storage *dc_ss,
+                       const char *domain_name,
+                       const DOM_SID *sid,
+                       uint32_t nt_version)
 {
-       struct packet_struct *p;
+       struct in_addr dc_ip;
+       const char *my_acct_name = NULL;
+       const char *my_mailslot = NULL;
+       struct nbt_netlogon_packet packet;
+       struct NETLOGON_SAM_LOGON_REQUEST *s;
+       enum ndr_err_code ndr_err;
+       DATA_BLOB blob;
+       struct dom_sid my_sid;
+
+       ZERO_STRUCT(packet);
+       ZERO_STRUCT(my_sid);
+
+       if (dc_ss->ss_family != AF_INET) {
+               return false;
+       }
 
-       p = receive_unexpected(DGRAM_PACKET, 0, mailslot);
+       if (sid) {
+               my_sid = *sid;
+       }
 
-       if (p == NULL)
-               return False;
+       dc_ip = ((struct sockaddr_in *)dc_ss)->sin_addr;
+       my_mailslot = mailslot_name(mem_ctx, dc_ip);
+       if (!my_mailslot) {
+               return false;
+       }
 
-       memcpy(buf, &p->packet.dgram.data[92],
-              MIN(bufsiz, p->packet.dgram.datasize-92));
+       my_acct_name = talloc_asprintf(mem_ctx, "%s$", global_myname());
+       if (!my_acct_name) {
+               return false;
+       }
 
-       return True;
-}
+       packet.command  = LOGON_SAM_LOGON_REQUEST;
+       s               = &packet.req.logon;
+
+       s->request_count        = 0;
+       s->computer_name        = global_myname();
+       s->user_name            = my_acct_name;
+       s->mailslot_name        = my_mailslot;
+       s->acct_control         = ACB_WSTRUST;
+       s->sid                  = my_sid;
+       s->nt_version           = nt_version;
+       s->lmnt_token           = 0xffff;
+       s->lm20_token           = 0xffff;
+
+       if (DEBUGLEVEL >= 10) {
+               NDR_PRINT_DEBUG(nbt_netlogon_packet, &packet);
+       }
 
-/*
- * cli_get_backup_list: Send a get backup list request ...
- */
+       ndr_err = ndr_push_struct_blob(&blob, mem_ctx, NULL, &packet,
+                      (ndr_push_flags_fn_t)ndr_push_nbt_netlogon_packet);
+       if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
+               return false;
+       }
 
-static char cli_backup_list[1024];
+       return cli_send_mailslot(msg_ctx,
+                                false, NBT_MAILSLOT_NTLOGON, 0,
+                                (char *)blob.data, blob.length,
+                                global_myname(), 0, domain_name, 0x1c,
+                                dc_ss);
+}
 
-int cli_get_backup_list(struct messaging_context *msg_ctx,
-                       const char *myname, const char *send_to_name)
+bool receive_getdc_response(TALLOC_CTX *mem_ctx,
+                           struct sockaddr_storage *dc_ss,
+                           const char *domain_name,
+                           uint32_t *nt_version,
+                           const char **dc_name,
+                           struct netlogon_samlogon_response **_r)
 {
-       pstring outbuf;
-       char *p;
-       struct sockaddr_storage sendto_ss;
-
-       if (!resolve_name(send_to_name, &sendto_ss, 0x1d)) {
+       struct packet_struct *packet;
+       const char *my_mailslot = NULL;
+       struct in_addr dc_ip;
+       DATA_BLOB blob;
+       struct netlogon_samlogon_response r;
+       union dgram_message_body p;
+       enum ndr_err_code ndr_err;
+       NTSTATUS status;
+
+       const char *returned_dc = NULL;
+       const char *returned_domain = NULL;
+
+       if (dc_ss->ss_family != AF_INET) {
+               return false;
+       }
 
-               DEBUG(0, ("Could not resolve name: %s<1D>\n", send_to_name));
-               return False;
+       dc_ip = ((struct sockaddr_in *)dc_ss)->sin_addr;
 
+       my_mailslot = mailslot_name(mem_ctx, dc_ip);
+       if (!my_mailslot) {
+               return false;
        }
 
-       memset(cli_backup_list, '\0', sizeof(cli_backup_list));
-       memset(outbuf, '\0', sizeof(outbuf));
+       packet = receive_unexpected(DGRAM_PACKET, 0, my_mailslot);
 
-       p = outbuf;
+       if (packet == NULL) {
+               DEBUG(5, ("Did not receive packet for %s\n", my_mailslot));
+               return False;
+       }
 
-       SCVAL(p, 0, ANN_GetBackupListReq);
-       p++;
+       DEBUG(5, ("Received packet for %s\n", my_mailslot));
 
-       SCVAL(p, 0, 1); /* Count pointer ... */
-       p++;
+       blob = data_blob_const(packet->packet.dgram.data,
+                              packet->packet.dgram.datasize);
 
-       SIVAL(p, 0, 1); /* The sender's token ... */
-       p += 4;
+       if (blob.length < 4) {
+               DEBUG(0,("invalid length: %d\n", (int)blob.length));
+               return false;
+       }
 
-       cli_send_mailslot(msg_ctx, True, "\\MAILSLOT\\BROWSE", 1, outbuf, 
-                         PTR_DIFF(p, outbuf), myname, 0, send_to_name, 
-                         0x1d, &sendto_ss);
+       if (RIVAL(blob.data,0) != DGRAM_SMB) {
+               DEBUG(0,("invalid packet\n"));
+               return false;
+       }
 
-       /* We should check the error and return if we got one */
+       blob.data += 4;
+       blob.length -= 4;
 
-       /* Now, get the response ... */
+       ndr_err = ndr_pull_union_blob_all(&blob, mem_ctx, NULL, &p, DGRAM_SMB,
+                      (ndr_pull_flags_fn_t)ndr_pull_dgram_smb_packet);
+       if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
+               DEBUG(0,("failed to parse packet\n"));
+               return false;
+       }
 
-       cli_get_response("\\MAILSLOT\\BROWSE",
-                        cli_backup_list, sizeof(cli_backup_list));
+       if (p.smb.smb_command != SMB_TRANSACTION) {
+               DEBUG(0,("invalid smb_command: %d\n", p.smb.smb_command));
+               return false;
+       }
 
-       return True;
+       if (DEBUGLEVEL >= 10) {
+               NDR_PRINT_DEBUG(dgram_smb_packet, &p);
+       }
 
-}
+       blob = p.smb.body.trans.data;
 
-/*
- * cli_get_backup_server: Get the backup list and retrieve a server from it
- */
+       ZERO_STRUCT(r);
 
-int cli_get_backup_server(struct messaging_context *msg_ctx,
-                         char *my_name, char *target, char *servername,
-                         int namesize)
-{
+       status = pull_netlogon_samlogon_response(&blob, mem_ctx, NULL, &r);
+       if (!NT_STATUS_IS_OK(status)) {
+               return false;
+       }
+
+       map_netlogon_samlogon_response(&r);
 
-  /* Get the backup list first. We could pull this from the cache later */
+       /* do we still need this ? */
+       *nt_version = r.ntver;
 
-  cli_get_backup_list(msg_ctx, my_name, target);  /* FIXME: Check the response */
+       returned_domain = r.data.nt5_ex.domain;
+       returned_dc = r.data.nt5_ex.pdc_name;
 
-  if (!cli_backup_list[0]) { /* Empty list ... try again */
+       if (!strequal(returned_domain, domain_name)) {
+               DEBUG(3, ("GetDC: Expected domain %s, got %s\n",
+                         domain_name, returned_domain));
+               return false;
+       }
 
-    cli_get_backup_list(msg_ctx, my_name, target);
+       *dc_name = talloc_strdup(mem_ctx, returned_dc);
+       if (!*dc_name) {
+               return false;
+       }
 
-  }
+       if (**dc_name == '\\')  *dc_name += 1;
+       if (**dc_name == '\\')  *dc_name += 1;
 
-  strncpy(servername, cli_backup_list, MIN(16, namesize));
+       if (_r) {
+               *_r = (struct netlogon_samlogon_response *)talloc_memdup(
+                       mem_ctx, &r, sizeof(struct netlogon_samlogon_response));
+               if (!*_r) {
+                       return false;
+               }
+       }
 
-  return True;
+       DEBUG(10, ("GetDC gave name %s for domain %s\n",
+                  *dc_name, returned_domain));
 
+       return True;
 }
+