xref: /titanic_50/usr/src/lib/libsmbfs/smb/ssnsetup.c (revision 15359501f7d4b9abebd7b7bf6efd5982a8e7eb27)
1613a2f6bSGordon Ross /*
2613a2f6bSGordon Ross  * Copyright (c) 2000-2001 Boris Popov
3613a2f6bSGordon Ross  * All rights reserved.
4613a2f6bSGordon Ross  *
5613a2f6bSGordon Ross  * Redistribution and use in source and binary forms, with or without
6613a2f6bSGordon Ross  * modification, are permitted provided that the following conditions
7613a2f6bSGordon Ross  * are met:
8613a2f6bSGordon Ross  * 1. Redistributions of source code must retain the above copyright
9613a2f6bSGordon Ross  *    notice, this list of conditions and the following disclaimer.
10613a2f6bSGordon Ross  * 2. Redistributions in binary form must reproduce the above copyright
11613a2f6bSGordon Ross  *    notice, this list of conditions and the following disclaimer in the
12613a2f6bSGordon Ross  *    documentation and/or other materials provided with the distribution.
13613a2f6bSGordon Ross  * 3. All advertising materials mentioning features or use of this software
14613a2f6bSGordon Ross  *    must display the following acknowledgement:
15613a2f6bSGordon Ross  *    This product includes software developed by Boris Popov.
16613a2f6bSGordon Ross  * 4. Neither the name of the author nor the names of any co-contributors
17613a2f6bSGordon Ross  *    may be used to endorse or promote products derived from this software
18613a2f6bSGordon Ross  *    without specific prior written permission.
19613a2f6bSGordon Ross  *
20613a2f6bSGordon Ross  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
21613a2f6bSGordon Ross  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22613a2f6bSGordon Ross  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23613a2f6bSGordon Ross  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
24613a2f6bSGordon Ross  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25613a2f6bSGordon Ross  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26613a2f6bSGordon Ross  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27613a2f6bSGordon Ross  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28613a2f6bSGordon Ross  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29613a2f6bSGordon Ross  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30613a2f6bSGordon Ross  * SUCH DAMAGE.
31613a2f6bSGordon Ross  */
32613a2f6bSGordon Ross 
33613a2f6bSGordon Ross /*
34*15359501SGordon Ross  * Copyright (c) 2009, 2010, Oracle and/or its affiliates. All rights reserved.
35613a2f6bSGordon Ross  */
36613a2f6bSGordon Ross 
37613a2f6bSGordon Ross /*
38613a2f6bSGordon Ross  * SMB Session Setup, and related.
39613a2f6bSGordon Ross  * Copied from the driver: smb_smb.c
40613a2f6bSGordon Ross  */
41613a2f6bSGordon Ross 
42613a2f6bSGordon Ross #include <errno.h>
43613a2f6bSGordon Ross #include <stdio.h>
44613a2f6bSGordon Ross #include <stdlib.h>
45613a2f6bSGordon Ross #include <unistd.h>
46613a2f6bSGordon Ross #include <strings.h>
47613a2f6bSGordon Ross #include <netdb.h>
48613a2f6bSGordon Ross #include <libintl.h>
49613a2f6bSGordon Ross #include <xti.h>
50613a2f6bSGordon Ross #include <assert.h>
51613a2f6bSGordon Ross 
52613a2f6bSGordon Ross #include <sys/types.h>
53613a2f6bSGordon Ross #include <sys/time.h>
54613a2f6bSGordon Ross #include <sys/byteorder.h>
55613a2f6bSGordon Ross #include <sys/socket.h>
56613a2f6bSGordon Ross #include <sys/fcntl.h>
57613a2f6bSGordon Ross 
58613a2f6bSGordon Ross #include <netinet/in.h>
59613a2f6bSGordon Ross #include <netinet/tcp.h>
60613a2f6bSGordon Ross #include <arpa/inet.h>
61613a2f6bSGordon Ross 
62613a2f6bSGordon Ross #include <netsmb/mchain.h>
63613a2f6bSGordon Ross #include <netsmb/netbios.h>
64613a2f6bSGordon Ross #include <netsmb/smb_dev.h>
65613a2f6bSGordon Ross #include <netsmb/smb.h>
66613a2f6bSGordon Ross 
67613a2f6bSGordon Ross #include <netsmb/smb_lib.h>
68613a2f6bSGordon Ross #include <netsmb/nb_lib.h>
69613a2f6bSGordon Ross 
70613a2f6bSGordon Ross #include "private.h"
71613a2f6bSGordon Ross #include "charsets.h"
72613a2f6bSGordon Ross #include "ntlm.h"
73613a2f6bSGordon Ross #include "smb_crypt.h"
74613a2f6bSGordon Ross 
75613a2f6bSGordon Ross /*
76613a2f6bSGordon Ross  * When we have a _real_ ntstatus.h, eliminate this.
77613a2f6bSGordon Ross  * XXX: Current smb.h defines it without the high bits.
78613a2f6bSGordon Ross  */
79613a2f6bSGordon Ross #define	STATUS_MORE_PROCESSING_REQUIRED 0xC0000016
80613a2f6bSGordon Ross 
81613a2f6bSGordon Ross static int
82613a2f6bSGordon Ross smb__ssnsetup(struct smb_ctx *ctx,
83613a2f6bSGordon Ross 	struct mbdata *mbc1, struct mbdata *mbc2,
84613a2f6bSGordon Ross 	uint32_t *statusp, uint16_t *actionp);
85613a2f6bSGordon Ross 
86613a2f6bSGordon Ross /*
87613a2f6bSGordon Ross  * Session Setup: NULL session (anonymous)
88613a2f6bSGordon Ross  */
89613a2f6bSGordon Ross int
90613a2f6bSGordon Ross smb_ssnsetup_null(struct smb_ctx *ctx)
91613a2f6bSGordon Ross {
92613a2f6bSGordon Ross 	int err;
93613a2f6bSGordon Ross 	uint32_t ntstatus;
94613a2f6bSGordon Ross 	uint16_t action = 0;
95613a2f6bSGordon Ross 
96613a2f6bSGordon Ross 	if (ctx->ct_sopt.sv_caps & SMB_CAP_EXT_SECURITY) {
97613a2f6bSGordon Ross 		/* Should not get here with... */
98613a2f6bSGordon Ross 		err = EINVAL;
99613a2f6bSGordon Ross 		goto out;
100613a2f6bSGordon Ross 	}
101613a2f6bSGordon Ross 
102613a2f6bSGordon Ross 	err = smb__ssnsetup(ctx, NULL, NULL, &ntstatus, &action);
103613a2f6bSGordon Ross 	if (err)
104613a2f6bSGordon Ross 		goto out;
105613a2f6bSGordon Ross 
106613a2f6bSGordon Ross 	DPRINT("status 0x%x action 0x%x", ntstatus, (int)action);
107613a2f6bSGordon Ross 	if (ntstatus != 0)
108613a2f6bSGordon Ross 		err = EAUTH;
109613a2f6bSGordon Ross 
110613a2f6bSGordon Ross out:
111613a2f6bSGordon Ross 	return (err);
112613a2f6bSGordon Ross }
113613a2f6bSGordon Ross 
114613a2f6bSGordon Ross 
115613a2f6bSGordon Ross /*
116613a2f6bSGordon Ross  * SMB Session Setup, using NTLMv1 (and maybe LMv1)
117613a2f6bSGordon Ross  */
118613a2f6bSGordon Ross int
119613a2f6bSGordon Ross smb_ssnsetup_ntlm1(struct smb_ctx *ctx)
120613a2f6bSGordon Ross {
121613a2f6bSGordon Ross 	struct mbdata lm_mbc, nt_mbc;
122613a2f6bSGordon Ross 	int err;
123613a2f6bSGordon Ross 	uint32_t ntstatus;
124613a2f6bSGordon Ross 	uint16_t action = 0;
125613a2f6bSGordon Ross 
126613a2f6bSGordon Ross 	if (ctx->ct_sopt.sv_caps & SMB_CAP_EXT_SECURITY) {
127613a2f6bSGordon Ross 		/* Should not get here with... */
128613a2f6bSGordon Ross 		err = EINVAL;
129613a2f6bSGordon Ross 		goto out;
130613a2f6bSGordon Ross 	}
131613a2f6bSGordon Ross 
132613a2f6bSGordon Ross 	/* Make mb_done calls at out safe. */
133613a2f6bSGordon Ross 	bzero(&lm_mbc, sizeof (lm_mbc));
134613a2f6bSGordon Ross 	bzero(&nt_mbc, sizeof (nt_mbc));
135613a2f6bSGordon Ross 
136613a2f6bSGordon Ross 	/* Put the LM,NTLM responses (as mbdata). */
137613a2f6bSGordon Ross 	err = ntlm_put_v1_responses(ctx, &lm_mbc, &nt_mbc);
138613a2f6bSGordon Ross 	if (err)
139613a2f6bSGordon Ross 		goto out;
140613a2f6bSGordon Ross 
141613a2f6bSGordon Ross 	/*
142613a2f6bSGordon Ross 	 * If we negotiated signing, compute the MAC key
143613a2f6bSGordon Ross 	 * and start signing messages, but only on the
144613a2f6bSGordon Ross 	 * first non-null session login.
145613a2f6bSGordon Ross 	 */
146613a2f6bSGordon Ross 	if ((ctx->ct_vcflags & SMBV_WILL_SIGN) &&
147613a2f6bSGordon Ross 	    (ctx->ct_hflags2 & SMB_FLAGS2_SECURITY_SIGNATURE) == 0) {
148613a2f6bSGordon Ross 		struct mbuf *m = nt_mbc.mb_top;
149613a2f6bSGordon Ross 		char *p;
150613a2f6bSGordon Ross 
151613a2f6bSGordon Ross 		/*
152613a2f6bSGordon Ross 		 * MAC_key = concat(session_key, nt_response)
153613a2f6bSGordon Ross 		 */
154613a2f6bSGordon Ross 		ctx->ct_mackeylen = NTLM_HASH_SZ + m->m_len;
155613a2f6bSGordon Ross 		ctx->ct_mackey = malloc(ctx->ct_mackeylen);
156613a2f6bSGordon Ross 		if (ctx->ct_mackey == NULL) {
157613a2f6bSGordon Ross 			ctx->ct_mackeylen = 0;
158613a2f6bSGordon Ross 			err = ENOMEM;
159613a2f6bSGordon Ross 			goto out;
160613a2f6bSGordon Ross 		}
161613a2f6bSGordon Ross 		p = ctx->ct_mackey;
162613a2f6bSGordon Ross 		memcpy(p, ctx->ct_ssn_key, NTLM_HASH_SZ);
163613a2f6bSGordon Ross 		memcpy(p + NTLM_HASH_SZ, m->m_data, m->m_len);
164613a2f6bSGordon Ross 
165613a2f6bSGordon Ross 		/* OK, start signing! */
166613a2f6bSGordon Ross 		ctx->ct_hflags2 |= SMB_FLAGS2_SECURITY_SIGNATURE;
167613a2f6bSGordon Ross 	}
168613a2f6bSGordon Ross 
169613a2f6bSGordon Ross 	err = smb__ssnsetup(ctx, &lm_mbc, &nt_mbc, &ntstatus, &action);
170613a2f6bSGordon Ross 	if (err)
171613a2f6bSGordon Ross 		goto out;
172613a2f6bSGordon Ross 
173613a2f6bSGordon Ross 	DPRINT("status 0x%x action 0x%x", ntstatus, (int)action);
174613a2f6bSGordon Ross 	if (ntstatus != 0)
175613a2f6bSGordon Ross 		err = EAUTH;
176613a2f6bSGordon Ross 
177613a2f6bSGordon Ross out:
178613a2f6bSGordon Ross 	mb_done(&lm_mbc);
179613a2f6bSGordon Ross 	mb_done(&nt_mbc);
180613a2f6bSGordon Ross 
181613a2f6bSGordon Ross 	return (err);
182613a2f6bSGordon Ross }
183613a2f6bSGordon Ross 
184613a2f6bSGordon Ross /*
185613a2f6bSGordon Ross  * SMB Session Setup, using NTLMv2 (and LMv2)
186613a2f6bSGordon Ross  */
187613a2f6bSGordon Ross int
188613a2f6bSGordon Ross smb_ssnsetup_ntlm2(struct smb_ctx *ctx)
189613a2f6bSGordon Ross {
190613a2f6bSGordon Ross 	struct mbdata lm_mbc, nt_mbc, ti_mbc;
191613a2f6bSGordon Ross 	int err;
192613a2f6bSGordon Ross 	uint32_t ntstatus;
193613a2f6bSGordon Ross 	uint16_t action = 0;
194613a2f6bSGordon Ross 
195613a2f6bSGordon Ross 	if (ctx->ct_sopt.sv_caps & SMB_CAP_EXT_SECURITY) {
196613a2f6bSGordon Ross 		/* Should not get here with... */
197613a2f6bSGordon Ross 		err = EINVAL;
198613a2f6bSGordon Ross 		goto out;
199613a2f6bSGordon Ross 	}
200613a2f6bSGordon Ross 
201613a2f6bSGordon Ross 	/* Make mb_done calls at out safe. */
202613a2f6bSGordon Ross 	bzero(&lm_mbc, sizeof (lm_mbc));
203613a2f6bSGordon Ross 	bzero(&nt_mbc, sizeof (nt_mbc));
204613a2f6bSGordon Ross 	bzero(&ti_mbc, sizeof (ti_mbc));
205613a2f6bSGordon Ross 
206613a2f6bSGordon Ross 	/* Build the NTLMv2 "target info" blob (as mbdata) */
207613a2f6bSGordon Ross 	err = ntlm_build_target_info(ctx, NULL, &ti_mbc);
208613a2f6bSGordon Ross 	if (err)
209613a2f6bSGordon Ross 		goto out;
210613a2f6bSGordon Ross 
211613a2f6bSGordon Ross 	/* Put the LMv2, NTLMv2 responses (as mbdata). */
212613a2f6bSGordon Ross 	err = ntlm_put_v2_responses(ctx, &ti_mbc, &lm_mbc, &nt_mbc);
213613a2f6bSGordon Ross 	if (err)
214613a2f6bSGordon Ross 		goto out;
215613a2f6bSGordon Ross 
216613a2f6bSGordon Ross 	/*
217613a2f6bSGordon Ross 	 * If we negotiated signing, compute the MAC key
218613a2f6bSGordon Ross 	 * and start signing messages, but only on the
219613a2f6bSGordon Ross 	 * first non-null session login.
220613a2f6bSGordon Ross 	 */
221613a2f6bSGordon Ross 	if ((ctx->ct_vcflags & SMBV_WILL_SIGN) &&
222613a2f6bSGordon Ross 	    (ctx->ct_hflags2 & SMB_FLAGS2_SECURITY_SIGNATURE) == 0) {
223613a2f6bSGordon Ross 		struct mbuf *m = nt_mbc.mb_top;
224613a2f6bSGordon Ross 		char *p;
225613a2f6bSGordon Ross 
226613a2f6bSGordon Ross 		/*
227613a2f6bSGordon Ross 		 * MAC_key = concat(session_key, nt_response)
228613a2f6bSGordon Ross 		 */
229613a2f6bSGordon Ross 		ctx->ct_mackeylen = NTLM_HASH_SZ + m->m_len;
230613a2f6bSGordon Ross 		ctx->ct_mackey = malloc(ctx->ct_mackeylen);
231613a2f6bSGordon Ross 		if (ctx->ct_mackey == NULL) {
232613a2f6bSGordon Ross 			ctx->ct_mackeylen = 0;
233613a2f6bSGordon Ross 			err = ENOMEM;
234613a2f6bSGordon Ross 			goto out;
235613a2f6bSGordon Ross 		}
236613a2f6bSGordon Ross 		p = ctx->ct_mackey;
237613a2f6bSGordon Ross 		memcpy(p, ctx->ct_ssn_key, NTLM_HASH_SZ);
238613a2f6bSGordon Ross 		memcpy(p + NTLM_HASH_SZ, m->m_data, m->m_len);
239613a2f6bSGordon Ross 
240613a2f6bSGordon Ross 		/* OK, start signing! */
241613a2f6bSGordon Ross 		ctx->ct_hflags2 |= SMB_FLAGS2_SECURITY_SIGNATURE;
242613a2f6bSGordon Ross 	}
243613a2f6bSGordon Ross 
244613a2f6bSGordon Ross 	err = smb__ssnsetup(ctx, &lm_mbc, &nt_mbc, &ntstatus, &action);
245613a2f6bSGordon Ross 	if (err)
246613a2f6bSGordon Ross 		goto out;
247613a2f6bSGordon Ross 
248613a2f6bSGordon Ross 	DPRINT("status 0x%x action 0x%x", ntstatus, (int)action);
249613a2f6bSGordon Ross 	if (ntstatus != 0)
250613a2f6bSGordon Ross 		err = EAUTH;
251613a2f6bSGordon Ross 
252613a2f6bSGordon Ross out:
253613a2f6bSGordon Ross 	mb_done(&ti_mbc);
254613a2f6bSGordon Ross 	mb_done(&lm_mbc);
255613a2f6bSGordon Ross 	mb_done(&nt_mbc);
256613a2f6bSGordon Ross 
257613a2f6bSGordon Ross 	return (err);
258613a2f6bSGordon Ross }
259613a2f6bSGordon Ross 
260613a2f6bSGordon Ross int
261613a2f6bSGordon Ross smb_ssnsetup_spnego(struct smb_ctx *ctx, struct mbdata *hint_mb)
262613a2f6bSGordon Ross {
263613a2f6bSGordon Ross 	struct mbdata send_mb, recv_mb;
264613a2f6bSGordon Ross 	int		err;
265613a2f6bSGordon Ross 	uint32_t	ntstatus;
266613a2f6bSGordon Ross 	uint16_t	action = 0;
267613a2f6bSGordon Ross 
268613a2f6bSGordon Ross 	err = ssp_ctx_create_client(ctx, hint_mb);
269613a2f6bSGordon Ross 	if (err)
270613a2f6bSGordon Ross 		goto out;
271613a2f6bSGordon Ross 
272613a2f6bSGordon Ross 	bzero(&send_mb, sizeof (send_mb));
273613a2f6bSGordon Ross 	bzero(&recv_mb, sizeof (recv_mb));
274613a2f6bSGordon Ross 
275613a2f6bSGordon Ross 	/* NULL input indicates first call. */
276613a2f6bSGordon Ross 	err = ssp_ctx_next_token(ctx, NULL, &send_mb);
277613a2f6bSGordon Ross 	if (err)
278613a2f6bSGordon Ross 		goto out;
279613a2f6bSGordon Ross 
280613a2f6bSGordon Ross 	for (;;) {
281613a2f6bSGordon Ross 		err = smb__ssnsetup(ctx, &send_mb, &recv_mb,
282613a2f6bSGordon Ross 		    &ntstatus, &action);
283613a2f6bSGordon Ross 		if (err)
284613a2f6bSGordon Ross 			goto out;
285613a2f6bSGordon Ross 		if (ntstatus == 0)
286613a2f6bSGordon Ross 			break; /* normal loop termination */
287613a2f6bSGordon Ross 		if (ntstatus != STATUS_MORE_PROCESSING_REQUIRED) {
288613a2f6bSGordon Ross 			err = EAUTH;
289*15359501SGordon Ross 			goto out;
290613a2f6bSGordon Ross 		}
291613a2f6bSGordon Ross 
292613a2f6bSGordon Ross 		/* middle calls get both in, out */
293613a2f6bSGordon Ross 		err = ssp_ctx_next_token(ctx, &recv_mb, &send_mb);
294613a2f6bSGordon Ross 		if (err)
295613a2f6bSGordon Ross 			goto out;
296613a2f6bSGordon Ross 	}
297613a2f6bSGordon Ross 	DPRINT("status 0x%x action 0x%x", ntstatus, (int)action);
298613a2f6bSGordon Ross 
299613a2f6bSGordon Ross 	/* NULL output indicates last call. */
300613a2f6bSGordon Ross 	(void) ssp_ctx_next_token(ctx, &recv_mb, NULL);
301613a2f6bSGordon Ross 
302613a2f6bSGordon Ross out:
303613a2f6bSGordon Ross 	ssp_ctx_destroy(ctx);
304613a2f6bSGordon Ross 
305613a2f6bSGordon Ross 	return (err);
306613a2f6bSGordon Ross }
307613a2f6bSGordon Ross 
308613a2f6bSGordon Ross /*
309613a2f6bSGordon Ross  * Session Setup function used for all the forms we support.
310613a2f6bSGordon Ross  * To allow this sharing, the crypto stuff is computed by
311613a2f6bSGordon Ross  * callers and passed in as mbdata chains.  Also, the args
312613a2f6bSGordon Ross  * have different meanings for extended security vs. old.
313613a2f6bSGordon Ross  * Some may be used as either IN or OUT parameters.
314613a2f6bSGordon Ross  *
315613a2f6bSGordon Ross  * For NTLM (v1, v2), all parameters are inputs
316613a2f6bSGordon Ross  * 	mbc1: [in] LM password hash
317613a2f6bSGordon Ross  * 	mbc2: [in] NT password hash
318613a2f6bSGordon Ross  * For Extended security (spnego)
319613a2f6bSGordon Ross  *	mbc1: [in]  outgoing blob data
320613a2f6bSGordon Ross  *	mbc2: [out] received blob data
321613a2f6bSGordon Ross  * For both forms, these are optional:
322613a2f6bSGordon Ross  *	statusp: [out] NT status
323613a2f6bSGordon Ross  *	actionp: [out] Logon Action (i.e. SMB_ACT_GUEST)
324613a2f6bSGordon Ross  */
325613a2f6bSGordon Ross static int
326613a2f6bSGordon Ross smb__ssnsetup(struct smb_ctx *ctx,
327613a2f6bSGordon Ross 	struct mbdata *mbc1, struct mbdata *mbc2,
328613a2f6bSGordon Ross 	uint32_t *statusp, uint16_t *actionp)
329613a2f6bSGordon Ross {
330613a2f6bSGordon Ross 	static const char NativeOS[] = "Solaris";
331613a2f6bSGordon Ross 	static const char LanMan[] = "NETSMB";
332613a2f6bSGordon Ross 	struct smb_sopt *sv = &ctx->ct_sopt;
333613a2f6bSGordon Ross 	struct smb_iods *is = &ctx->ct_iods;
334613a2f6bSGordon Ross 	struct smb_rq	*rqp = NULL;
335613a2f6bSGordon Ross 	struct mbdata	*mbp;
336613a2f6bSGordon Ross 	struct mbuf	*m;
337613a2f6bSGordon Ross 	int err, uc;
338613a2f6bSGordon Ross 	uint32_t caps;
339613a2f6bSGordon Ross 	uint16_t bc, len1, len2, sblen;
340613a2f6bSGordon Ross 	uint8_t wc;
341613a2f6bSGordon Ross 
342613a2f6bSGordon Ross 	/*
343613a2f6bSGordon Ross 	 * Some of the "capability" bits we offer will be copied
344613a2f6bSGordon Ross 	 * from those offered by the server, with a mask applied.
345613a2f6bSGordon Ross 	 * This is the mask of capabilies copied from the server.
346613a2f6bSGordon Ross 	 * Some others get special handling below.
347613a2f6bSGordon Ross 	 */
348613a2f6bSGordon Ross 	static const uint32_t caps_mask =
349613a2f6bSGordon Ross 	    SMB_CAP_UNICODE |
350613a2f6bSGordon Ross 	    SMB_CAP_LARGE_FILES |
351613a2f6bSGordon Ross 	    SMB_CAP_NT_SMBS |
352613a2f6bSGordon Ross 	    SMB_CAP_STATUS32 |
353613a2f6bSGordon Ross 	    SMB_CAP_EXT_SECURITY;
354613a2f6bSGordon Ross 
355613a2f6bSGordon Ross 	caps = ctx->ct_sopt.sv_caps & caps_mask;
356613a2f6bSGordon Ross 	uc = ctx->ct_hflags2 & SMB_FLAGS2_UNICODE;
357613a2f6bSGordon Ross 
358613a2f6bSGordon Ross 	err = smb_rq_init(ctx, SMB_COM_SESSION_SETUP_ANDX, &rqp);
359613a2f6bSGordon Ross 	if (err)
360613a2f6bSGordon Ross 		goto out;
361613a2f6bSGordon Ross 
362613a2f6bSGordon Ross 	/*
363613a2f6bSGordon Ross 	 * Build the SMB request.
364613a2f6bSGordon Ross 	 */
365613a2f6bSGordon Ross 	mbp = &rqp->rq_rq;
366613a2f6bSGordon Ross 	smb_rq_wstart(rqp);
367613a2f6bSGordon Ross 	mb_put_uint16le(mbp, 0xff);		/* 0: AndXCommand */
368613a2f6bSGordon Ross 	mb_put_uint16le(mbp, 0);		/* 1: AndXOffset */
369613a2f6bSGordon Ross 	mb_put_uint16le(mbp, sv->sv_maxtx);	/* 2: MaxBufferSize */
370613a2f6bSGordon Ross 	mb_put_uint16le(mbp, sv->sv_maxmux);	/* 3: MaxMpxCount */
371613a2f6bSGordon Ross 	mb_put_uint16le(mbp, 1);		/* 4: VcNumber */
372613a2f6bSGordon Ross 	mb_put_uint32le(mbp, sv->sv_skey);	/* 5,6: Session Key */
373613a2f6bSGordon Ross 
374613a2f6bSGordon Ross 	if (caps & SMB_CAP_EXT_SECURITY) {
375613a2f6bSGordon Ross 		len1 = mbc1 ? mbc1->mb_count : 0;
376613a2f6bSGordon Ross 		mb_put_uint16le(mbp, len1);	/* 7: Sec. Blob Len */
377613a2f6bSGordon Ross 		mb_put_uint32le(mbp, 0);	/* 8,9: reserved */
378613a2f6bSGordon Ross 		mb_put_uint32le(mbp, caps);	/* 10,11: Capabilities */
379613a2f6bSGordon Ross 		smb_rq_wend(rqp);		/* 12: Byte Count */
380613a2f6bSGordon Ross 		smb_rq_bstart(rqp);
381613a2f6bSGordon Ross 		if (mbc1 && mbc1->mb_top) {
382613a2f6bSGordon Ross 			mb_put_mbuf(mbp, mbc1->mb_top);	/* sec. blob */
383613a2f6bSGordon Ross 			mbc1->mb_top = NULL; /* consumed */
384613a2f6bSGordon Ross 		}
385613a2f6bSGordon Ross 		/* mbc2 is required below */
386613a2f6bSGordon Ross 		if (mbc2 == NULL) {
387613a2f6bSGordon Ross 			err = EINVAL;
388613a2f6bSGordon Ross 			goto out;
389613a2f6bSGordon Ross 		}
390613a2f6bSGordon Ross 	} else {
391613a2f6bSGordon Ross 		len1 = mbc1 ? mbc1->mb_count : 0;
392613a2f6bSGordon Ross 		len2 = mbc2 ? mbc2->mb_count : 0;
393613a2f6bSGordon Ross 		mb_put_uint16le(mbp, len1);	/* 7: LM pass. len */
394613a2f6bSGordon Ross 		mb_put_uint16le(mbp, len2);	/* 8: NT pass. len */
395613a2f6bSGordon Ross 		mb_put_uint32le(mbp, 0);	/* 9,10: reserved */
396613a2f6bSGordon Ross 		mb_put_uint32le(mbp, caps);	/* 11,12: Capabilities */
397613a2f6bSGordon Ross 		smb_rq_wend(rqp);		/* 13: Byte Count */
398613a2f6bSGordon Ross 		smb_rq_bstart(rqp);
399613a2f6bSGordon Ross 		if (mbc1 && mbc1->mb_top) {
400613a2f6bSGordon Ross 			mb_put_mbuf(mbp, mbc1->mb_top);	/* LM password */
401613a2f6bSGordon Ross 			mbc1->mb_top = NULL; /* consumed */
402613a2f6bSGordon Ross 		}
403613a2f6bSGordon Ross 		if (mbc2 && mbc2->mb_top) {
404613a2f6bSGordon Ross 			mb_put_mbuf(mbp, mbc2->mb_top);	/* NT password */
405613a2f6bSGordon Ross 			mbc2->mb_top = NULL; /* consumed */
406613a2f6bSGordon Ross 		}
40702d09e03SGordon Ross 		mb_put_string(mbp, ctx->ct_user, uc);
40802d09e03SGordon Ross 		mb_put_string(mbp, ctx->ct_domain, uc);
409613a2f6bSGordon Ross 	}
41002d09e03SGordon Ross 	mb_put_string(mbp, NativeOS, uc);
41102d09e03SGordon Ross 	mb_put_string(mbp, LanMan, uc);
412613a2f6bSGordon Ross 	smb_rq_bend(rqp);
413613a2f6bSGordon Ross 
414613a2f6bSGordon Ross 	err = smb_rq_internal(ctx, rqp);
415613a2f6bSGordon Ross 	if (err)
416613a2f6bSGordon Ross 		goto out;
417613a2f6bSGordon Ross 
418613a2f6bSGordon Ross 	if (statusp)
419613a2f6bSGordon Ross 		*statusp = rqp->rq_status;
420613a2f6bSGordon Ross 
421613a2f6bSGordon Ross 	/*
422613a2f6bSGordon Ross 	 * If we have a real error, the response probably has
423613a2f6bSGordon Ross 	 * no more data, so don't try to parse any more.
424613a2f6bSGordon Ross 	 * Note: err=0, means rq_status is valid.
425613a2f6bSGordon Ross 	 */
426613a2f6bSGordon Ross 	if (rqp->rq_status != 0 &&
427613a2f6bSGordon Ross 	    rqp->rq_status != STATUS_MORE_PROCESSING_REQUIRED) {
428613a2f6bSGordon Ross 		goto out;
429613a2f6bSGordon Ross 	}
430613a2f6bSGordon Ross 
431613a2f6bSGordon Ross 	/*
432613a2f6bSGordon Ross 	 * Parse the reply
433613a2f6bSGordon Ross 	 */
434613a2f6bSGordon Ross 	uc = rqp->rq_hflags2 & SMB_FLAGS2_UNICODE;
435613a2f6bSGordon Ross 	is->is_smbuid = rqp->rq_uid;
436613a2f6bSGordon Ross 	mbp = &rqp->rq_rp;
437613a2f6bSGordon Ross 
43802d09e03SGordon Ross 	err = md_get_uint8(mbp, &wc);
439613a2f6bSGordon Ross 	if (err)
440613a2f6bSGordon Ross 		goto out;
441613a2f6bSGordon Ross 
442613a2f6bSGordon Ross 	err = EBADRPC; /* for any problems in this section */
443613a2f6bSGordon Ross 	if (caps & SMB_CAP_EXT_SECURITY) {
444613a2f6bSGordon Ross 		if (wc != 4)
445613a2f6bSGordon Ross 			goto out;
44602d09e03SGordon Ross 		md_get_uint16le(mbp, NULL);	/* secondary cmd */
44702d09e03SGordon Ross 		md_get_uint16le(mbp, NULL);	/* andxoffset */
44802d09e03SGordon Ross 		md_get_uint16le(mbp, actionp);	/* action */
44902d09e03SGordon Ross 		md_get_uint16le(mbp, &sblen);	/* sec. blob len */
45002d09e03SGordon Ross 		md_get_uint16le(mbp, &bc);	/* byte count */
451613a2f6bSGordon Ross 		/*
452613a2f6bSGordon Ross 		 * Get the security blob, after
453613a2f6bSGordon Ross 		 * sanity-checking the length.
454613a2f6bSGordon Ross 		 */
455613a2f6bSGordon Ross 		if (sblen == 0 || bc < sblen)
456613a2f6bSGordon Ross 			goto out;
45702d09e03SGordon Ross 		err = md_get_mbuf(mbp, sblen, &m);
458613a2f6bSGordon Ross 		if (err)
459613a2f6bSGordon Ross 			goto out;
460613a2f6bSGordon Ross 		mb_initm(mbc2, m);
461613a2f6bSGordon Ross 		mbc2->mb_count = sblen;
462613a2f6bSGordon Ross 	} else {
463613a2f6bSGordon Ross 		if (wc != 3)
464613a2f6bSGordon Ross 			goto out;
46502d09e03SGordon Ross 		md_get_uint16le(mbp, NULL);	/* secondary cmd */
46602d09e03SGordon Ross 		md_get_uint16le(mbp, NULL);	/* andxoffset */
46702d09e03SGordon Ross 		md_get_uint16le(mbp, actionp);	/* action */
46802d09e03SGordon Ross 		err = md_get_uint16le(mbp, &bc); /* byte count */
469613a2f6bSGordon Ross 		if (err)
470613a2f6bSGordon Ross 			goto out;
471613a2f6bSGordon Ross 	}
472613a2f6bSGordon Ross 
473613a2f6bSGordon Ross 	/*
474613a2f6bSGordon Ross 	 * Native OS, LANMGR, & Domain follow here.
475613a2f6bSGordon Ross 	 * Parse these strings and store for later.
476613a2f6bSGordon Ross 	 * If unicode, they should be aligned.
477613a2f6bSGordon Ross 	 *
478613a2f6bSGordon Ross 	 * Note that with Extended security, we may use
479613a2f6bSGordon Ross 	 * multiple calls to this function.  Only parse
480613a2f6bSGordon Ross 	 * these strings on the last one (status == 0).
481613a2f6bSGordon Ross 	 * Ditto for the CAP_LARGE work-around.
482613a2f6bSGordon Ross 	 */
483613a2f6bSGordon Ross 	if (rqp->rq_status != 0)
484613a2f6bSGordon Ross 		goto out;
485613a2f6bSGordon Ross 
486613a2f6bSGordon Ross 	/* Ignore any parsing errors for these strings. */
48702d09e03SGordon Ross 	err = md_get_string(mbp, &ctx->ct_srv_OS, uc);
488613a2f6bSGordon Ross 	DPRINT("server OS: %s", err ? "?" : ctx->ct_srv_OS);
48902d09e03SGordon Ross 	err = md_get_string(mbp, &ctx->ct_srv_LM, uc);
490613a2f6bSGordon Ross 	DPRINT("server LM: %s", err ? "?" : ctx->ct_srv_LM);
491613a2f6bSGordon Ross 	/*
492613a2f6bSGordon Ross 	 * There's sometimes a server domain folloing
493613a2f6bSGordon Ross 	 * at this point, but we don't need it.
494613a2f6bSGordon Ross 	 */
495613a2f6bSGordon Ross 
496613a2f6bSGordon Ross 	/* Success! (See Ignore any ... above) */
497613a2f6bSGordon Ross 	err = 0;
498613a2f6bSGordon Ross 
499613a2f6bSGordon Ross 	/*
500613a2f6bSGordon Ross 	 * Windows systems don't suport CAP_LARGE_READX,WRITEX
501613a2f6bSGordon Ross 	 * when signing is enabled, so adjust sv_caps.
502613a2f6bSGordon Ross 	 */
503613a2f6bSGordon Ross 	if (ctx->ct_srv_OS &&
504613a2f6bSGordon Ross 	    0 == strncmp(ctx->ct_srv_OS, "Windows ", 8)) {
505613a2f6bSGordon Ross 		DPRINT("Server is Windows");
506613a2f6bSGordon Ross 		if (ctx->ct_vcflags & SMBV_WILL_SIGN) {
507613a2f6bSGordon Ross 			DPRINT("disable CAP_LARGE_(r/w)");
508613a2f6bSGordon Ross 			ctx->ct_sopt.sv_caps &=
509613a2f6bSGordon Ross 			    ~(SMB_CAP_LARGE_READX | SMB_CAP_LARGE_WRITEX);
510613a2f6bSGordon Ross 		}
511613a2f6bSGordon Ross 	}
512613a2f6bSGordon Ross 
513613a2f6bSGordon Ross out:
514613a2f6bSGordon Ross 	if (rqp)
515613a2f6bSGordon Ross 		smb_rq_done(rqp);
516613a2f6bSGordon Ross 
517613a2f6bSGordon Ross 	return (err);
518613a2f6bSGordon Ross }
519