2 Unix SMB/CIFS implementation.
4 Copyright (C) Andrew Tridgell 2005
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program. If not, see <http://www.gnu.org/licenses/>.
20 a composite API for making a full SMB connection
24 #include "libcli/raw/libcliraw.h"
25 #include "libcli/composite/composite.h"
26 #include "libcli/smb_composite/smb_composite.h"
27 #include "lib/events/events.h"
28 #include "libcli/resolve/resolve.h"
29 #include "auth/credentials/credentials.h"
30 #include "librpc/gen_ndr/ndr_nbt.h"
31 #include "param/param.h"
33 /* the stages of this call */
34 enum connect_stage {CONNECT_RESOLVE,
36 CONNECT_SESSION_REQUEST,
38 CONNECT_SESSION_SETUP,
39 CONNECT_SESSION_SETUP_ANON,
42 struct connect_state {
43 enum connect_stage stage;
44 struct smbcli_socket *sock;
45 struct smbcli_transport *transport;
46 struct smbcli_session *session;
47 struct smb_composite_connect *io;
48 union smb_tcon *io_tcon;
49 struct smb_composite_sesssetup *io_setup;
50 struct smbcli_request *req;
51 struct composite_context *creq;
55 static void request_handler(struct smbcli_request *);
56 static void composite_handler(struct composite_context *);
61 static NTSTATUS connect_send_negprot(struct composite_context *c,
62 struct smb_composite_connect *io)
64 struct connect_state *state = talloc_get_type(c->private_data, struct connect_state);
66 state->req = smb_raw_negotiate_send(state->transport, lp_unicode(global_loadparm),
67 lp_cli_maxprotocol(global_loadparm));
68 NT_STATUS_HAVE_NO_MEMORY(state->req);
70 state->req->async.fn = request_handler;
71 state->req->async.private = c;
72 state->stage = CONNECT_NEGPROT;
79 a tree connect request has completed
81 static NTSTATUS connect_tcon(struct composite_context *c,
82 struct smb_composite_connect *io)
84 struct connect_state *state = talloc_get_type(c->private_data, struct connect_state);
87 status = smb_raw_tcon_recv(state->req, c, state->io_tcon);
88 NT_STATUS_NOT_OK_RETURN(status);
90 io->out.tree->tid = state->io_tcon->tconx.out.tid;
91 if (state->io_tcon->tconx.out.dev_type) {
92 io->out.tree->device = talloc_strdup(io->out.tree,
93 state->io_tcon->tconx.out.dev_type);
95 if (state->io_tcon->tconx.out.fs_type) {
96 io->out.tree->fs_type = talloc_strdup(io->out.tree,
97 state->io_tcon->tconx.out.fs_type);
101 c->state = COMPOSITE_STATE_DONE;
108 a session setup request with anonymous fallback has completed
110 static NTSTATUS connect_session_setup_anon(struct composite_context *c,
111 struct smb_composite_connect *io)
113 struct connect_state *state = talloc_get_type(c->private_data, struct connect_state);
116 status = smb_composite_sesssetup_recv(state->creq);
117 NT_STATUS_NOT_OK_RETURN(status);
119 io->out.anonymous_fallback_done = true;
121 state->session->vuid = state->io_setup->out.vuid;
123 /* setup for a tconx */
124 io->out.tree = smbcli_tree_init(state->session, state, true);
125 NT_STATUS_HAVE_NO_MEMORY(io->out.tree);
127 state->io_tcon = talloc(c, union smb_tcon);
128 NT_STATUS_HAVE_NO_MEMORY(state->io_tcon);
130 /* connect to a share using a tree connect */
131 state->io_tcon->generic.level = RAW_TCON_TCONX;
132 state->io_tcon->tconx.in.flags = 0;
133 state->io_tcon->tconx.in.password = data_blob(NULL, 0);
135 state->io_tcon->tconx.in.path = talloc_asprintf(state->io_tcon,
139 NT_STATUS_HAVE_NO_MEMORY(state->io_tcon->tconx.in.path);
140 if (!io->in.service_type) {
141 state->io_tcon->tconx.in.device = "?????";
143 state->io_tcon->tconx.in.device = io->in.service_type;
146 state->req = smb_raw_tcon_send(io->out.tree, state->io_tcon);
147 NT_STATUS_HAVE_NO_MEMORY(state->req);
148 if (state->req->state == SMBCLI_REQUEST_ERROR) {
149 return state->req->status;
152 state->req->async.fn = request_handler;
153 state->req->async.private = c;
154 state->stage = CONNECT_TCON;
160 a session setup request has completed
162 static NTSTATUS connect_session_setup(struct composite_context *c,
163 struct smb_composite_connect *io)
165 struct connect_state *state = talloc_get_type(c->private_data, struct connect_state);
168 status = smb_composite_sesssetup_recv(state->creq);
170 if (!NT_STATUS_IS_OK(status) &&
171 !cli_credentials_is_anonymous(state->io->in.credentials) &&
172 io->in.fallback_to_anonymous) {
174 state->io_setup->in.credentials = cli_credentials_init(state);
175 NT_STATUS_HAVE_NO_MEMORY(state->io_setup->in.credentials);
176 cli_credentials_set_conf(state->io_setup->in.credentials,
178 cli_credentials_set_anonymous(state->io_setup->in.credentials);
180 /* If the preceding attempt was with extended security, we
181 * have been given a uid in the NTLMSSP_CHALLENGE reply. This
182 * would lead to an invalid uid in the anonymous fallback */
183 state->session->vuid = 0;
184 data_blob_free(&state->session->user_session_key);
185 talloc_free(state->session->gensec);
186 state->session->gensec = NULL;
188 state->creq = smb_composite_sesssetup_send(state->session,
190 NT_STATUS_HAVE_NO_MEMORY(state->creq);
191 if (state->creq->state == COMPOSITE_STATE_ERROR) {
192 return state->creq->status;
194 state->creq->async.fn = composite_handler;
195 state->creq->async.private_data = c;
196 state->stage = CONNECT_SESSION_SETUP_ANON;
201 NT_STATUS_NOT_OK_RETURN(status);
203 state->session->vuid = state->io_setup->out.vuid;
205 /* setup for a tconx */
206 io->out.tree = smbcli_tree_init(state->session, state, true);
207 NT_STATUS_HAVE_NO_MEMORY(io->out.tree);
209 state->io_tcon = talloc(c, union smb_tcon);
210 NT_STATUS_HAVE_NO_MEMORY(state->io_tcon);
212 /* connect to a share using a tree connect */
213 state->io_tcon->generic.level = RAW_TCON_TCONX;
214 state->io_tcon->tconx.in.flags = 0;
215 state->io_tcon->tconx.in.password = data_blob(NULL, 0);
217 state->io_tcon->tconx.in.path = talloc_asprintf(state->io_tcon,
221 NT_STATUS_HAVE_NO_MEMORY(state->io_tcon->tconx.in.path);
222 if (!io->in.service_type) {
223 state->io_tcon->tconx.in.device = "?????";
225 state->io_tcon->tconx.in.device = io->in.service_type;
228 state->req = smb_raw_tcon_send(io->out.tree, state->io_tcon);
229 NT_STATUS_HAVE_NO_MEMORY(state->req);
230 if (state->req->state == SMBCLI_REQUEST_ERROR) {
231 return state->req->status;
234 state->req->async.fn = request_handler;
235 state->req->async.private = c;
236 state->stage = CONNECT_TCON;
242 a negprot request has completed
244 static NTSTATUS connect_negprot(struct composite_context *c,
245 struct smb_composite_connect *io)
247 struct connect_state *state = talloc_get_type(c->private_data, struct connect_state);
250 status = smb_raw_negotiate_recv(state->req);
251 NT_STATUS_NOT_OK_RETURN(status);
253 /* next step is a session setup */
254 state->session = smbcli_session_init(state->transport, state, true);
255 NT_STATUS_HAVE_NO_MEMORY(state->session);
257 state->io_setup = talloc(c, struct smb_composite_sesssetup);
258 NT_STATUS_HAVE_NO_MEMORY(state->io_setup);
260 /* prepare a session setup to establish a security context */
261 state->io_setup->in.sesskey = state->transport->negotiate.sesskey;
262 state->io_setup->in.capabilities = state->transport->negotiate.capabilities;
263 state->io_setup->in.credentials = io->in.credentials;
264 state->io_setup->in.workgroup = io->in.workgroup;
266 state->creq = smb_composite_sesssetup_send(state->session, state->io_setup);
267 NT_STATUS_HAVE_NO_MEMORY(state->creq);
268 if (state->creq->state == COMPOSITE_STATE_ERROR) {
269 return state->creq->status;
272 state->creq->async.fn = composite_handler;
273 state->creq->async.private_data = c;
274 state->stage = CONNECT_SESSION_SETUP;
281 a session request operation has completed
283 static NTSTATUS connect_session_request(struct composite_context *c,
284 struct smb_composite_connect *io)
286 struct connect_state *state = talloc_get_type(c->private_data, struct connect_state);
289 status = smbcli_transport_connect_recv(state->req);
290 NT_STATUS_NOT_OK_RETURN(status);
292 /* next step is a negprot */
293 return connect_send_negprot(c, io);
297 a socket connection operation has completed
299 static NTSTATUS connect_socket(struct composite_context *c,
300 struct smb_composite_connect *io)
302 struct connect_state *state = talloc_get_type(c->private_data, struct connect_state);
304 struct nbt_name calling, called;
306 status = smbcli_sock_connect_recv(state->creq, state, &state->sock);
307 NT_STATUS_NOT_OK_RETURN(status);
309 /* the socket is up - we can initialise the smbcli transport layer */
310 state->transport = smbcli_transport_init(state->sock, state, true,
311 lp_max_xmit(global_loadparm),
312 lp_maxmux(global_loadparm));
313 NT_STATUS_HAVE_NO_MEMORY(state->transport);
315 if (is_ipaddress(state->sock->hostname) &&
316 (state->io->in.called_name != NULL)) {
317 /* If connecting to an IP address, we might want the real name
318 * of the host for later kerberos. The called name is a better
320 state->sock->hostname =
321 talloc_strdup(state->sock, io->in.called_name);
322 NT_STATUS_HAVE_NO_MEMORY(state->sock->hostname);
325 make_nbt_name_client(&calling, cli_credentials_get_workstation(io->in.credentials));
327 nbt_choose_called_name(state, &called, io->in.called_name, NBT_NAME_SERVER);
329 /* we have a connected socket - next step is a session
330 request, if needed. Port 445 doesn't need it, so it goes
331 straight to the negprot */
332 if (state->sock->port == 445) {
333 status = nbt_name_dup(state->transport, &called,
334 &state->transport->called);
335 NT_STATUS_NOT_OK_RETURN(status);
336 return connect_send_negprot(c, io);
339 state->req = smbcli_transport_connect_send(state->transport, &calling, &called);
340 NT_STATUS_HAVE_NO_MEMORY(state->req);
342 state->req->async.fn = request_handler;
343 state->req->async.private = c;
344 state->stage = CONNECT_SESSION_REQUEST;
351 called when name resolution is finished
353 static NTSTATUS connect_resolve(struct composite_context *c,
354 struct smb_composite_connect *io)
356 struct connect_state *state = talloc_get_type(c->private_data, struct connect_state);
360 status = resolve_name_recv(state->creq, state, &address);
361 NT_STATUS_NOT_OK_RETURN(status);
363 state->creq = smbcli_sock_connect_send(state, address,
365 io->in.dest_host, c->event_ctx);
366 NT_STATUS_HAVE_NO_MEMORY(state->creq);
368 state->stage = CONNECT_SOCKET;
369 state->creq->async.private_data = c;
370 state->creq->async.fn = composite_handler;
377 handle and dispatch state transitions
379 static void state_handler(struct composite_context *c)
381 struct connect_state *state = talloc_get_type(c->private_data, struct connect_state);
383 switch (state->stage) {
384 case CONNECT_RESOLVE:
385 c->status = connect_resolve(c, state->io);
388 c->status = connect_socket(c, state->io);
390 case CONNECT_SESSION_REQUEST:
391 c->status = connect_session_request(c, state->io);
393 case CONNECT_NEGPROT:
394 c->status = connect_negprot(c, state->io);
396 case CONNECT_SESSION_SETUP:
397 c->status = connect_session_setup(c, state->io);
399 case CONNECT_SESSION_SETUP_ANON:
400 c->status = connect_session_setup_anon(c, state->io);
403 c->status = connect_tcon(c, state->io);
407 if (!NT_STATUS_IS_OK(c->status)) {
408 c->state = COMPOSITE_STATE_ERROR;
411 if (c->state >= COMPOSITE_STATE_DONE &&
419 handler for completion of a smbcli_request sub-request
421 static void request_handler(struct smbcli_request *req)
423 struct composite_context *c = talloc_get_type(req->async.private,
424 struct composite_context);
429 handler for completion of a smbcli_composite sub-request
431 static void composite_handler(struct composite_context *creq)
433 struct composite_context *c = talloc_get_type(creq->async.private_data,
434 struct composite_context);
439 a function to establish a smbcli_tree from scratch
441 struct composite_context *smb_composite_connect_send(struct smb_composite_connect *io,
443 struct event_context *event_ctx)
445 struct composite_context *c;
446 struct connect_state *state;
447 struct nbt_name name;
449 c = talloc_zero(mem_ctx, struct composite_context);
450 if (c == NULL) goto failed;
452 state = talloc_zero(c, struct connect_state);
453 if (state == NULL) goto failed;
455 if (event_ctx == NULL) {
456 event_ctx = event_context_init(mem_ctx);
461 c->state = COMPOSITE_STATE_IN_PROGRESS;
462 c->event_ctx = talloc_reference(c, event_ctx);
463 c->private_data = state;
465 state->stage = CONNECT_RESOLVE;
466 make_nbt_name_server(&name, io->in.dest_host);
467 state->creq = resolve_name_send(lp_resolve_context(global_loadparm), &name, c->event_ctx);
469 if (state->creq == NULL) goto failed;
470 state->creq->async.private_data = c;
471 state->creq->async.fn = composite_handler;
480 recv half of async composite connect code
482 NTSTATUS smb_composite_connect_recv(struct composite_context *c, TALLOC_CTX *mem_ctx)
486 status = composite_wait(c);
488 if (NT_STATUS_IS_OK(status)) {
489 struct connect_state *state = talloc_get_type(c->private_data, struct connect_state);
490 talloc_steal(mem_ctx, state->io->out.tree);
498 sync version of smb_composite_connect
500 NTSTATUS smb_composite_connect(struct smb_composite_connect *io, TALLOC_CTX *mem_ctx,
501 struct event_context *ev)
503 struct composite_context *c = smb_composite_connect_send(io, mem_ctx, ev);
504 return smb_composite_connect_recv(c, mem_ctx);