1*613a2f6bSGordon Ross /* 2*613a2f6bSGordon Ross * CDDL HEADER START 3*613a2f6bSGordon Ross * 4*613a2f6bSGordon Ross * The contents of this file are subject to the terms of the 5*613a2f6bSGordon Ross * Common Development and Distribution License (the "License"). 6*613a2f6bSGordon Ross * You may not use this file except in compliance with the License. 7*613a2f6bSGordon Ross * 8*613a2f6bSGordon Ross * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9*613a2f6bSGordon Ross * or http://www.opensolaris.org/os/licensing. 10*613a2f6bSGordon Ross * See the License for the specific language governing permissions 11*613a2f6bSGordon Ross * and limitations under the License. 12*613a2f6bSGordon Ross * 13*613a2f6bSGordon Ross * When distributing Covered Code, include this CDDL HEADER in each 14*613a2f6bSGordon Ross * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15*613a2f6bSGordon Ross * If applicable, add the following below this CDDL HEADER, with the 16*613a2f6bSGordon Ross * fields enclosed by brackets "[]" replaced with your own identifying 17*613a2f6bSGordon Ross * information: Portions Copyright [yyyy] [name of copyright owner] 18*613a2f6bSGordon Ross * 19*613a2f6bSGordon Ross * CDDL HEADER END 20*613a2f6bSGordon Ross */ 21*613a2f6bSGordon Ross 22*613a2f6bSGordon Ross /* 23*613a2f6bSGordon Ross * Copyright 2009 Sun Microsystems, Inc. All rights reserved. 24*613a2f6bSGordon Ross * Use is subject to license terms. 25*613a2f6bSGordon Ross */ 26*613a2f6bSGordon Ross 27*613a2f6bSGordon Ross /* 28*613a2f6bSGordon Ross * Functions to setup connections (TCP and/or NetBIOS) 29*613a2f6bSGordon Ross * This has the fall-back logic for IP6, IP4, NBT 30*613a2f6bSGordon Ross */ 31*613a2f6bSGordon Ross 32*613a2f6bSGordon Ross #include <errno.h> 33*613a2f6bSGordon Ross #include <stdio.h> 34*613a2f6bSGordon Ross #include <string.h> 35*613a2f6bSGordon Ross #include <strings.h> 36*613a2f6bSGordon Ross #include <stdlib.h> 37*613a2f6bSGordon Ross #include <unistd.h> 38*613a2f6bSGordon Ross #include <netdb.h> 39*613a2f6bSGordon Ross #include <libintl.h> 40*613a2f6bSGordon Ross #include <xti.h> 41*613a2f6bSGordon Ross #include <assert.h> 42*613a2f6bSGordon Ross 43*613a2f6bSGordon Ross #include <sys/types.h> 44*613a2f6bSGordon Ross #include <sys/time.h> 45*613a2f6bSGordon Ross #include <sys/byteorder.h> 46*613a2f6bSGordon Ross #include <sys/socket.h> 47*613a2f6bSGordon Ross #include <sys/fcntl.h> 48*613a2f6bSGordon Ross 49*613a2f6bSGordon Ross #include <netinet/in.h> 50*613a2f6bSGordon Ross #include <netinet/tcp.h> 51*613a2f6bSGordon Ross #include <arpa/inet.h> 52*613a2f6bSGordon Ross 53*613a2f6bSGordon Ross #include <netsmb/smb.h> 54*613a2f6bSGordon Ross #include <netsmb/smb_lib.h> 55*613a2f6bSGordon Ross #include <netsmb/netbios.h> 56*613a2f6bSGordon Ross #include <netsmb/nb_lib.h> 57*613a2f6bSGordon Ross #include <netsmb/smb_dev.h> 58*613a2f6bSGordon Ross 59*613a2f6bSGordon Ross #include "charsets.h" 60*613a2f6bSGordon Ross #include "private.h" 61*613a2f6bSGordon Ross 62*613a2f6bSGordon Ross /* 63*613a2f6bSGordon Ross * SMB messages are up to 64K. 64*613a2f6bSGordon Ross * Let's leave room for two. 65*613a2f6bSGordon Ross */ 66*613a2f6bSGordon Ross static int smb_tcpsndbuf = 0x20000; 67*613a2f6bSGordon Ross static int smb_tcprcvbuf = 0x20000; 68*613a2f6bSGordon Ross static int smb_connect_timeout = 30; /* seconds */ 69*613a2f6bSGordon Ross int smb_recv_timeout = 30; /* seconds */ 70*613a2f6bSGordon Ross 71*613a2f6bSGordon Ross int conn_tcp6(struct smb_ctx *, const struct sockaddr *, int); 72*613a2f6bSGordon Ross int conn_tcp4(struct smb_ctx *, const struct sockaddr *, int); 73*613a2f6bSGordon Ross int conn_nbt(struct smb_ctx *, const struct sockaddr *, char *); 74*613a2f6bSGordon Ross 75*613a2f6bSGordon Ross /* 76*613a2f6bSGordon Ross * Internal set sockopt for int-sized options. 77*613a2f6bSGordon Ross * Borrowed from: libnsl/rpc/ti_opts.c 78*613a2f6bSGordon Ross */ 79*613a2f6bSGordon Ross static int 80*613a2f6bSGordon Ross smb_setopt_int(int fd, int level, int name, int val) 81*613a2f6bSGordon Ross { 82*613a2f6bSGordon Ross struct t_optmgmt oreq, ores; 83*613a2f6bSGordon Ross struct { 84*613a2f6bSGordon Ross struct t_opthdr oh; 85*613a2f6bSGordon Ross int ival; 86*613a2f6bSGordon Ross } opts; 87*613a2f6bSGordon Ross 88*613a2f6bSGordon Ross /* opt header */ 89*613a2f6bSGordon Ross opts.oh.len = sizeof (opts); 90*613a2f6bSGordon Ross opts.oh.level = level; 91*613a2f6bSGordon Ross opts.oh.name = name; 92*613a2f6bSGordon Ross opts.oh.status = 0; 93*613a2f6bSGordon Ross opts.ival = val; 94*613a2f6bSGordon Ross 95*613a2f6bSGordon Ross oreq.flags = T_NEGOTIATE; 96*613a2f6bSGordon Ross oreq.opt.buf = (void *)&opts; 97*613a2f6bSGordon Ross oreq.opt.len = sizeof (opts); 98*613a2f6bSGordon Ross 99*613a2f6bSGordon Ross ores.flags = 0; 100*613a2f6bSGordon Ross ores.opt.buf = NULL; 101*613a2f6bSGordon Ross ores.opt.maxlen = 0; 102*613a2f6bSGordon Ross 103*613a2f6bSGordon Ross if (t_optmgmt(fd, &oreq, &ores) < 0) { 104*613a2f6bSGordon Ross DPRINT("t_opgmgnt, t_errno = %d", t_errno); 105*613a2f6bSGordon Ross if (t_errno == TSYSERR) 106*613a2f6bSGordon Ross return (errno); 107*613a2f6bSGordon Ross return (EPROTO); 108*613a2f6bSGordon Ross } 109*613a2f6bSGordon Ross if (ores.flags != T_SUCCESS) { 110*613a2f6bSGordon Ross DPRINT("flags 0x%x, status 0x%x", 111*613a2f6bSGordon Ross (int)ores.flags, (int)opts.oh.status); 112*613a2f6bSGordon Ross return (EPROTO); 113*613a2f6bSGordon Ross } 114*613a2f6bSGordon Ross 115*613a2f6bSGordon Ross return (0); 116*613a2f6bSGordon Ross } 117*613a2f6bSGordon Ross 118*613a2f6bSGordon Ross static int 119*613a2f6bSGordon Ross smb_setopts(int fd) 120*613a2f6bSGordon Ross { 121*613a2f6bSGordon Ross int err; 122*613a2f6bSGordon Ross 123*613a2f6bSGordon Ross /* 124*613a2f6bSGordon Ross * Set various socket/TCP options. 125*613a2f6bSGordon Ross * Failures here are not fatal - 126*613a2f6bSGordon Ross * just log a complaint. 127*613a2f6bSGordon Ross * 128*613a2f6bSGordon Ross * We don't need these two: 129*613a2f6bSGordon Ross * SO_RCVTIMEO, SO_SNDTIMEO 130*613a2f6bSGordon Ross */ 131*613a2f6bSGordon Ross 132*613a2f6bSGordon Ross err = smb_setopt_int(fd, SOL_SOCKET, SO_SNDBUF, smb_tcpsndbuf); 133*613a2f6bSGordon Ross if (err) { 134*613a2f6bSGordon Ross DPRINT("set SO_SNDBUF, err %d", err); 135*613a2f6bSGordon Ross } 136*613a2f6bSGordon Ross 137*613a2f6bSGordon Ross err = smb_setopt_int(fd, SOL_SOCKET, SO_RCVBUF, smb_tcprcvbuf); 138*613a2f6bSGordon Ross if (err) { 139*613a2f6bSGordon Ross DPRINT("set SO_RCVBUF, err %d", err); 140*613a2f6bSGordon Ross } 141*613a2f6bSGordon Ross 142*613a2f6bSGordon Ross err = smb_setopt_int(fd, SOL_SOCKET, SO_KEEPALIVE, 1); 143*613a2f6bSGordon Ross if (err) { 144*613a2f6bSGordon Ross DPRINT("set SO_KEEPALIVE, err %d", err); 145*613a2f6bSGordon Ross } 146*613a2f6bSGordon Ross 147*613a2f6bSGordon Ross err = smb_setopt_int(fd, IPPROTO_TCP, TCP_NODELAY, 1); 148*613a2f6bSGordon Ross if (err) { 149*613a2f6bSGordon Ross DPRINT("set TCP_NODELAY, err %d", err); 150*613a2f6bSGordon Ross } 151*613a2f6bSGordon Ross 152*613a2f6bSGordon Ross /* Set the connect timeout (in milliseconds). */ 153*613a2f6bSGordon Ross err = smb_setopt_int(fd, IPPROTO_TCP, 154*613a2f6bSGordon Ross TCP_CONN_ABORT_THRESHOLD, 155*613a2f6bSGordon Ross smb_connect_timeout * 1000); 156*613a2f6bSGordon Ross if (err) { 157*613a2f6bSGordon Ross DPRINT("set connect timeout, err %d", err); 158*613a2f6bSGordon Ross } 159*613a2f6bSGordon Ross return (0); 160*613a2f6bSGordon Ross } 161*613a2f6bSGordon Ross 162*613a2f6bSGordon Ross 163*613a2f6bSGordon Ross int 164*613a2f6bSGordon Ross conn_tcp6(struct smb_ctx *ctx, const struct sockaddr *sa, int port) 165*613a2f6bSGordon Ross { 166*613a2f6bSGordon Ross struct sockaddr_in6 sin6; 167*613a2f6bSGordon Ross char *dev = "/dev/tcp6"; 168*613a2f6bSGordon Ross char paddrbuf[INET6_ADDRSTRLEN]; 169*613a2f6bSGordon Ross struct t_call sndcall; 170*613a2f6bSGordon Ross int fd, err; 171*613a2f6bSGordon Ross 172*613a2f6bSGordon Ross if (sa->sa_family != AF_INET6) { 173*613a2f6bSGordon Ross DPRINT("bad af %d", sa->sa_family); 174*613a2f6bSGordon Ross return (EINVAL); 175*613a2f6bSGordon Ross } 176*613a2f6bSGordon Ross bcopy(sa, &sin6, sizeof (sin6)); 177*613a2f6bSGordon Ross sin6.sin6_port = htons(port); 178*613a2f6bSGordon Ross 179*613a2f6bSGordon Ross DPRINT("tcp6: %s (%d)", 180*613a2f6bSGordon Ross inet_ntop(AF_INET6, &sin6.sin6_addr, 181*613a2f6bSGordon Ross paddrbuf, sizeof (paddrbuf)), port); 182*613a2f6bSGordon Ross 183*613a2f6bSGordon Ross fd = t_open(dev, O_RDWR, NULL); 184*613a2f6bSGordon Ross if (fd < 0) { 185*613a2f6bSGordon Ross /* Assume t_errno = TSYSERR */ 186*613a2f6bSGordon Ross err = errno; 187*613a2f6bSGordon Ross perror(dev); 188*613a2f6bSGordon Ross return (err); 189*613a2f6bSGordon Ross } 190*613a2f6bSGordon Ross if ((err = smb_setopts(fd)) != 0) 191*613a2f6bSGordon Ross goto errout; 192*613a2f6bSGordon Ross if (t_bind(fd, NULL, NULL) < 0) { 193*613a2f6bSGordon Ross DPRINT("t_bind t_errno %d", t_errno); 194*613a2f6bSGordon Ross if (t_errno == TSYSERR) 195*613a2f6bSGordon Ross err = errno; 196*613a2f6bSGordon Ross else 197*613a2f6bSGordon Ross err = EPROTO; 198*613a2f6bSGordon Ross goto errout; 199*613a2f6bSGordon Ross } 200*613a2f6bSGordon Ross sndcall.addr.maxlen = sizeof (sin6); 201*613a2f6bSGordon Ross sndcall.addr.len = sizeof (sin6); 202*613a2f6bSGordon Ross sndcall.addr.buf = (void *) &sin6; 203*613a2f6bSGordon Ross sndcall.opt.len = 0; 204*613a2f6bSGordon Ross sndcall.udata.len = 0; 205*613a2f6bSGordon Ross if (t_connect(fd, &sndcall, NULL) < 0) { 206*613a2f6bSGordon Ross err = get_xti_err(fd); 207*613a2f6bSGordon Ross DPRINT("connect, err %d", err); 208*613a2f6bSGordon Ross goto errout; 209*613a2f6bSGordon Ross } 210*613a2f6bSGordon Ross 211*613a2f6bSGordon Ross DPRINT("tcp6: connected, fd=%d", fd); 212*613a2f6bSGordon Ross ctx->ct_tran_fd = fd; 213*613a2f6bSGordon Ross return (0); 214*613a2f6bSGordon Ross 215*613a2f6bSGordon Ross errout: 216*613a2f6bSGordon Ross close(fd); 217*613a2f6bSGordon Ross return (err); 218*613a2f6bSGordon Ross } 219*613a2f6bSGordon Ross 220*613a2f6bSGordon Ross /* 221*613a2f6bSGordon Ross * This is used for both SMB over TCP (port 445) 222*613a2f6bSGordon Ross * and NetBIOS - see conn_nbt(). 223*613a2f6bSGordon Ross */ 224*613a2f6bSGordon Ross int 225*613a2f6bSGordon Ross conn_tcp4(struct smb_ctx *ctx, const struct sockaddr *sa, int port) 226*613a2f6bSGordon Ross { 227*613a2f6bSGordon Ross struct sockaddr_in sin; 228*613a2f6bSGordon Ross char *dev = "/dev/tcp"; 229*613a2f6bSGordon Ross char paddrbuf[INET_ADDRSTRLEN]; 230*613a2f6bSGordon Ross struct t_call sndcall; 231*613a2f6bSGordon Ross int fd, err; 232*613a2f6bSGordon Ross 233*613a2f6bSGordon Ross if (sa->sa_family != AF_INET) { 234*613a2f6bSGordon Ross DPRINT("bad af %d", sa->sa_family); 235*613a2f6bSGordon Ross return (EINVAL); 236*613a2f6bSGordon Ross } 237*613a2f6bSGordon Ross bcopy(sa, &sin, sizeof (sin)); 238*613a2f6bSGordon Ross sin.sin_port = htons(port); 239*613a2f6bSGordon Ross 240*613a2f6bSGordon Ross DPRINT("tcp4: %s (%d)", 241*613a2f6bSGordon Ross inet_ntop(AF_INET, &sin.sin_addr, 242*613a2f6bSGordon Ross paddrbuf, sizeof (paddrbuf)), port); 243*613a2f6bSGordon Ross 244*613a2f6bSGordon Ross fd = t_open(dev, O_RDWR, NULL); 245*613a2f6bSGordon Ross if (fd < 0) { 246*613a2f6bSGordon Ross /* Assume t_errno = TSYSERR */ 247*613a2f6bSGordon Ross err = errno; 248*613a2f6bSGordon Ross perror(dev); 249*613a2f6bSGordon Ross return (err); 250*613a2f6bSGordon Ross } 251*613a2f6bSGordon Ross if ((err = smb_setopts(fd)) != 0) 252*613a2f6bSGordon Ross goto errout; 253*613a2f6bSGordon Ross if (t_bind(fd, NULL, NULL) < 0) { 254*613a2f6bSGordon Ross DPRINT("t_bind t_errno %d", t_errno); 255*613a2f6bSGordon Ross if (t_errno == TSYSERR) 256*613a2f6bSGordon Ross err = errno; 257*613a2f6bSGordon Ross else 258*613a2f6bSGordon Ross err = EPROTO; 259*613a2f6bSGordon Ross goto errout; 260*613a2f6bSGordon Ross } 261*613a2f6bSGordon Ross sndcall.addr.maxlen = sizeof (sin); 262*613a2f6bSGordon Ross sndcall.addr.len = sizeof (sin); 263*613a2f6bSGordon Ross sndcall.addr.buf = (void *) &sin; 264*613a2f6bSGordon Ross sndcall.opt.len = 0; 265*613a2f6bSGordon Ross sndcall.udata.len = 0; 266*613a2f6bSGordon Ross if (t_connect(fd, &sndcall, NULL) < 0) { 267*613a2f6bSGordon Ross err = get_xti_err(fd); 268*613a2f6bSGordon Ross DPRINT("connect, err %d", err); 269*613a2f6bSGordon Ross goto errout; 270*613a2f6bSGordon Ross } 271*613a2f6bSGordon Ross 272*613a2f6bSGordon Ross DPRINT("tcp4: connected, fd=%d", fd); 273*613a2f6bSGordon Ross ctx->ct_tran_fd = fd; 274*613a2f6bSGordon Ross return (0); 275*613a2f6bSGordon Ross 276*613a2f6bSGordon Ross errout: 277*613a2f6bSGordon Ross close(fd); 278*613a2f6bSGordon Ross return (err); 279*613a2f6bSGordon Ross } 280*613a2f6bSGordon Ross 281*613a2f6bSGordon Ross /* 282*613a2f6bSGordon Ross * Open a NetBIOS connection (session, port 139) 283*613a2f6bSGordon Ross * 284*613a2f6bSGordon Ross * The optional name parameter, if passed, means 285*613a2f6bSGordon Ross * we found the sockaddr via NetBIOS name lookup, 286*613a2f6bSGordon Ross * and can just use that for our session request. 287*613a2f6bSGordon Ross * Otherwise (if name is NULL), we're connecting 288*613a2f6bSGordon Ross * by IP address, and need to come up with the 289*613a2f6bSGordon Ross * NetBIOS name by other means. 290*613a2f6bSGordon Ross */ 291*613a2f6bSGordon Ross int 292*613a2f6bSGordon Ross conn_nbt(struct smb_ctx *ctx, const struct sockaddr *saarg, char *name) 293*613a2f6bSGordon Ross { 294*613a2f6bSGordon Ross struct sockaddr_in sin; 295*613a2f6bSGordon Ross struct sockaddr *sa; 296*613a2f6bSGordon Ross char server[NB_NAMELEN]; 297*613a2f6bSGordon Ross char workgroup[NB_NAMELEN]; 298*613a2f6bSGordon Ross int err, nberr, port; 299*613a2f6bSGordon Ross 300*613a2f6bSGordon Ross bcopy(saarg, &sin, sizeof (sin)); 301*613a2f6bSGordon Ross sa = (struct sockaddr *)&sin; 302*613a2f6bSGordon Ross 303*613a2f6bSGordon Ross switch (sin.sin_family) { 304*613a2f6bSGordon Ross case AF_NETBIOS: /* our fake AF */ 305*613a2f6bSGordon Ross sin.sin_family = AF_INET; 306*613a2f6bSGordon Ross break; 307*613a2f6bSGordon Ross case AF_INET: 308*613a2f6bSGordon Ross break; 309*613a2f6bSGordon Ross default: 310*613a2f6bSGordon Ross DPRINT("bad af %d", sin.sin_family); 311*613a2f6bSGordon Ross return (EINVAL); 312*613a2f6bSGordon Ross } 313*613a2f6bSGordon Ross port = IPPORT_NETBIOS_SSN; 314*613a2f6bSGordon Ross 315*613a2f6bSGordon Ross /* 316*613a2f6bSGordon Ross * If we have a NetBIOS name, just use it. 317*613a2f6bSGordon Ross * This is the path taken when we've done a 318*613a2f6bSGordon Ross * NetBIOS name lookup on this name to get 319*613a2f6bSGordon Ross * the IP address in the passed sa. Otherwise, 320*613a2f6bSGordon Ross * we're connecting by IP address, and need to 321*613a2f6bSGordon Ross * figure out what NetBIOS name to use. 322*613a2f6bSGordon Ross */ 323*613a2f6bSGordon Ross if (name) { 324*613a2f6bSGordon Ross strlcpy(server, name, sizeof (server)); 325*613a2f6bSGordon Ross DPRINT("given name: %s", server); 326*613a2f6bSGordon Ross } else { 327*613a2f6bSGordon Ross /* 328*613a2f6bSGordon Ross * 329*613a2f6bSGordon Ross * Try a NetBIOS node status query, 330*613a2f6bSGordon Ross * which searches for a type=[20] name. 331*613a2f6bSGordon Ross * If that doesn't work, just use the 332*613a2f6bSGordon Ross * (fake) "*SMBSERVER" name. 333*613a2f6bSGordon Ross */ 334*613a2f6bSGordon Ross DPRINT("try node status"); 335*613a2f6bSGordon Ross server[0] = '\0'; 336*613a2f6bSGordon Ross nberr = nbns_getnodestatus(ctx->ct_nb, 337*613a2f6bSGordon Ross &sin.sin_addr, server, workgroup); 338*613a2f6bSGordon Ross if (nberr == 0 && server[0] != '\0') { 339*613a2f6bSGordon Ross /* Found the name. Save for reconnect. */ 340*613a2f6bSGordon Ross DPRINT("found name: %s", server); 341*613a2f6bSGordon Ross strlcpy(ctx->ct_srvname, server, 342*613a2f6bSGordon Ross sizeof (ctx->ct_srvname)); 343*613a2f6bSGordon Ross } else { 344*613a2f6bSGordon Ross DPRINT("getnodestatus, nberr %d", nberr); 345*613a2f6bSGordon Ross strlcpy(server, "*SMBSERVER", sizeof (server)); 346*613a2f6bSGordon Ross } 347*613a2f6bSGordon Ross } 348*613a2f6bSGordon Ross 349*613a2f6bSGordon Ross /* 350*613a2f6bSGordon Ross * Establish the TCP connection. 351*613a2f6bSGordon Ross * Careful to close it on errors. 352*613a2f6bSGordon Ross */ 353*613a2f6bSGordon Ross if ((err = conn_tcp4(ctx, sa, port)) != 0) { 354*613a2f6bSGordon Ross DPRINT("TCP connect: err=%d", err); 355*613a2f6bSGordon Ross goto out; 356*613a2f6bSGordon Ross } 357*613a2f6bSGordon Ross 358*613a2f6bSGordon Ross /* Connected. Do NetBIOS session request. */ 359*613a2f6bSGordon Ross err = nb_ssn_request(ctx, server); 360*613a2f6bSGordon Ross if (err) 361*613a2f6bSGordon Ross DPRINT("ssn_rq, err %d", err); 362*613a2f6bSGordon Ross 363*613a2f6bSGordon Ross out: 364*613a2f6bSGordon Ross if (err) { 365*613a2f6bSGordon Ross if (ctx->ct_tran_fd != -1) { 366*613a2f6bSGordon Ross close(ctx->ct_tran_fd); 367*613a2f6bSGordon Ross ctx->ct_tran_fd = -1; 368*613a2f6bSGordon Ross } 369*613a2f6bSGordon Ross } 370*613a2f6bSGordon Ross return (err); 371*613a2f6bSGordon Ross } 372*613a2f6bSGordon Ross 373*613a2f6bSGordon Ross /* 374*613a2f6bSGordon Ross * Make a new connection, or reconnect. 375*613a2f6bSGordon Ross */ 376*613a2f6bSGordon Ross int 377*613a2f6bSGordon Ross smb_iod_connect(smb_ctx_t *ctx) 378*613a2f6bSGordon Ross { 379*613a2f6bSGordon Ross struct sockaddr *sa; 380*613a2f6bSGordon Ross int err, err2; 381*613a2f6bSGordon Ross struct mbdata blob; 382*613a2f6bSGordon Ross 383*613a2f6bSGordon Ross memset(&blob, 0, sizeof (blob)); 384*613a2f6bSGordon Ross 385*613a2f6bSGordon Ross if (ctx->ct_srvname[0] == '\0') { 386*613a2f6bSGordon Ross DPRINT("sername not set!"); 387*613a2f6bSGordon Ross return (EINVAL); 388*613a2f6bSGordon Ross } 389*613a2f6bSGordon Ross DPRINT("server: %s", ctx->ct_srvname); 390*613a2f6bSGordon Ross 391*613a2f6bSGordon Ross if (smb_debug) 392*613a2f6bSGordon Ross dump_ctx("smb_iod_connect", ctx); 393*613a2f6bSGordon Ross 394*613a2f6bSGordon Ross /* 395*613a2f6bSGordon Ross * This may be a reconnect, so 396*613a2f6bSGordon Ross * cleanup if necessary. 397*613a2f6bSGordon Ross */ 398*613a2f6bSGordon Ross if (ctx->ct_tran_fd != -1) { 399*613a2f6bSGordon Ross close(ctx->ct_tran_fd); 400*613a2f6bSGordon Ross ctx->ct_tran_fd = -1; 401*613a2f6bSGordon Ross } 402*613a2f6bSGordon Ross 403*613a2f6bSGordon Ross /* 404*613a2f6bSGordon Ross * Get local machine name. 405*613a2f6bSGordon Ross * Full name - not a NetBIOS name. 406*613a2f6bSGordon Ross */ 407*613a2f6bSGordon Ross if (ctx->ct_locname == NULL) { 408*613a2f6bSGordon Ross err = smb_getlocalname(&ctx->ct_locname); 409*613a2f6bSGordon Ross if (err) { 410*613a2f6bSGordon Ross smb_error(dgettext(TEXT_DOMAIN, 411*613a2f6bSGordon Ross "can't get local name"), err); 412*613a2f6bSGordon Ross return (err); 413*613a2f6bSGordon Ross } 414*613a2f6bSGordon Ross } 415*613a2f6bSGordon Ross 416*613a2f6bSGordon Ross /* 417*613a2f6bSGordon Ross * We're called with each IP address 418*613a2f6bSGordon Ross * already copied into ct_srvaddr. 419*613a2f6bSGordon Ross */ 420*613a2f6bSGordon Ross ctx->ct_flags |= SMBCF_RESOLVED; 421*613a2f6bSGordon Ross 422*613a2f6bSGordon Ross sa = &ctx->ct_srvaddr.sa; 423*613a2f6bSGordon Ross switch (sa->sa_family) { 424*613a2f6bSGordon Ross 425*613a2f6bSGordon Ross case AF_INET6: 426*613a2f6bSGordon Ross err = conn_tcp6(ctx, sa, IPPORT_SMB); 427*613a2f6bSGordon Ross break; 428*613a2f6bSGordon Ross 429*613a2f6bSGordon Ross case AF_INET: 430*613a2f6bSGordon Ross err = conn_tcp4(ctx, sa, IPPORT_SMB); 431*613a2f6bSGordon Ross /* 432*613a2f6bSGordon Ross * If port 445 was not listening, try port 139. 433*613a2f6bSGordon Ross * Note: Not doing NetBIOS name lookup here. 434*613a2f6bSGordon Ross * We already have the IP address. 435*613a2f6bSGordon Ross */ 436*613a2f6bSGordon Ross switch (err) { 437*613a2f6bSGordon Ross case ECONNRESET: 438*613a2f6bSGordon Ross case ECONNREFUSED: 439*613a2f6bSGordon Ross err2 = conn_nbt(ctx, sa, NULL); 440*613a2f6bSGordon Ross if (err2 == 0) 441*613a2f6bSGordon Ross err = 0; 442*613a2f6bSGordon Ross } 443*613a2f6bSGordon Ross break; 444*613a2f6bSGordon Ross 445*613a2f6bSGordon Ross case AF_NETBIOS: 446*613a2f6bSGordon Ross /* Like AF_INET, but use NetBIOS ssn. */ 447*613a2f6bSGordon Ross err = conn_nbt(ctx, sa, ctx->ct_srvname); 448*613a2f6bSGordon Ross break; 449*613a2f6bSGordon Ross 450*613a2f6bSGordon Ross default: 451*613a2f6bSGordon Ross DPRINT("skipped family %d", sa->sa_family); 452*613a2f6bSGordon Ross err = EPROTONOSUPPORT; 453*613a2f6bSGordon Ross break; 454*613a2f6bSGordon Ross } 455*613a2f6bSGordon Ross 456*613a2f6bSGordon Ross 457*613a2f6bSGordon Ross if (err) { 458*613a2f6bSGordon Ross DPRINT("connect, err=%d", err); 459*613a2f6bSGordon Ross return (err); 460*613a2f6bSGordon Ross } 461*613a2f6bSGordon Ross 462*613a2f6bSGordon Ross /* 463*613a2f6bSGordon Ross * SMB Negotiate Protocol and 464*613a2f6bSGordon Ross * SMB Session Setup, one of 3 ways: 465*613a2f6bSGordon Ross * NULL session 466*613a2f6bSGordon Ross * Extended security, 467*613a2f6bSGordon Ross * NTLM (v2, v1) 468*613a2f6bSGordon Ross * 469*613a2f6bSGordon Ross * Empty user name means an explicit request for 470*613a2f6bSGordon Ross * NULL session setup. No fall-back logic here. 471*613a2f6bSGordon Ross * 472*613a2f6bSGordon Ross * For NULL session, don't offer extended security. 473*613a2f6bSGordon Ross * That's a lot simpler than dealing with NTLMSSP. 474*613a2f6bSGordon Ross */ 475*613a2f6bSGordon Ross if (ctx->ct_user[0] == '\0') { 476*613a2f6bSGordon Ross ctx->ct_vopt &= ~SMBVOPT_EXT_SEC; 477*613a2f6bSGordon Ross err = smb_negprot(ctx, &blob); 478*613a2f6bSGordon Ross if (err) 479*613a2f6bSGordon Ross goto out; 480*613a2f6bSGordon Ross err = smb_ssnsetup_null(ctx); 481*613a2f6bSGordon Ross } else { 482*613a2f6bSGordon Ross /* 483*613a2f6bSGordon Ross * Do SMB Negotiate Protocol. 484*613a2f6bSGordon Ross */ 485*613a2f6bSGordon Ross err = smb_negprot(ctx, &blob); 486*613a2f6bSGordon Ross if (err) 487*613a2f6bSGordon Ross goto out; 488*613a2f6bSGordon Ross 489*613a2f6bSGordon Ross /* 490*613a2f6bSGordon Ross * Do SMB Session Setup (authenticate) 491*613a2f6bSGordon Ross * 492*613a2f6bSGordon Ross * If the server negotiated extended security, 493*613a2f6bSGordon Ross * run the SPNEGO state machine. 494*613a2f6bSGordon Ross */ 495*613a2f6bSGordon Ross if (ctx->ct_sopt.sv_caps & SMB_CAP_EXT_SECURITY) { 496*613a2f6bSGordon Ross err = smb_ssnsetup_spnego(ctx, &blob); 497*613a2f6bSGordon Ross } else { 498*613a2f6bSGordon Ross /* 499*613a2f6bSGordon Ross * Server did NOT negotiate extended security. 500*613a2f6bSGordon Ross * Try NTLMv2, NTLMv1 (if enabled). 501*613a2f6bSGordon Ross */ 502*613a2f6bSGordon Ross if ((ctx->ct_authflags & 503*613a2f6bSGordon Ross (SMB_AT_NTLM2 | SMB_AT_NTLM1)) == 0) { 504*613a2f6bSGordon Ross /* 505*613a2f6bSGordon Ross * Don't return EAUTH, because a 506*613a2f6bSGordon Ross * new password will not help. 507*613a2f6bSGordon Ross */ 508*613a2f6bSGordon Ross DPRINT("No NTLM authflags"); 509*613a2f6bSGordon Ross err = ENOTSUP; 510*613a2f6bSGordon Ross goto out; 511*613a2f6bSGordon Ross } 512*613a2f6bSGordon Ross if (ctx->ct_authflags & SMB_AT_NTLM2) 513*613a2f6bSGordon Ross err = smb_ssnsetup_ntlm2(ctx); 514*613a2f6bSGordon Ross else 515*613a2f6bSGordon Ross err = EAUTH; 516*613a2f6bSGordon Ross if (err == EAUTH && 0 != 517*613a2f6bSGordon Ross (ctx->ct_authflags & SMB_AT_NTLM1)) 518*613a2f6bSGordon Ross err = smb_ssnsetup_ntlm1(ctx); 519*613a2f6bSGordon Ross } 520*613a2f6bSGordon Ross } 521*613a2f6bSGordon Ross 522*613a2f6bSGordon Ross /* Tell library code we have a session. */ 523*613a2f6bSGordon Ross ctx->ct_flags |= SMBCF_RESOLVED | SMBCF_SSNACTIVE; 524*613a2f6bSGordon Ross 525*613a2f6bSGordon Ross out: 526*613a2f6bSGordon Ross mb_done(&blob); 527*613a2f6bSGordon Ross 528*613a2f6bSGordon Ross if (err) { 529*613a2f6bSGordon Ross close(ctx->ct_tran_fd); 530*613a2f6bSGordon Ross ctx->ct_tran_fd = -1; 531*613a2f6bSGordon Ross } else 532*613a2f6bSGordon Ross DPRINT("tran_fd = %d", ctx->ct_tran_fd); 533*613a2f6bSGordon Ross 534*613a2f6bSGordon Ross return (err); 535*613a2f6bSGordon Ross } 536