1613a2f6bSGordon Ross /* 2613a2f6bSGordon Ross * Copyright (c) 2000-2001 Boris Popov 3613a2f6bSGordon Ross * All rights reserved. 4613a2f6bSGordon Ross * 5613a2f6bSGordon Ross * Redistribution and use in source and binary forms, with or without 6613a2f6bSGordon Ross * modification, are permitted provided that the following conditions 7613a2f6bSGordon Ross * are met: 8613a2f6bSGordon Ross * 1. Redistributions of source code must retain the above copyright 9613a2f6bSGordon Ross * notice, this list of conditions and the following disclaimer. 10613a2f6bSGordon Ross * 2. Redistributions in binary form must reproduce the above copyright 11613a2f6bSGordon Ross * notice, this list of conditions and the following disclaimer in the 12613a2f6bSGordon Ross * documentation and/or other materials provided with the distribution. 13613a2f6bSGordon Ross * 3. All advertising materials mentioning features or use of this software 14613a2f6bSGordon Ross * must display the following acknowledgement: 15613a2f6bSGordon Ross * This product includes software developed by Boris Popov. 16613a2f6bSGordon Ross * 4. Neither the name of the author nor the names of any co-contributors 17613a2f6bSGordon Ross * may be used to endorse or promote products derived from this software 18613a2f6bSGordon Ross * without specific prior written permission. 19613a2f6bSGordon Ross * 20613a2f6bSGordon Ross * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 21613a2f6bSGordon Ross * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 22613a2f6bSGordon Ross * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 23613a2f6bSGordon Ross * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 24613a2f6bSGordon Ross * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 25613a2f6bSGordon Ross * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26613a2f6bSGordon Ross * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27613a2f6bSGordon Ross * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28613a2f6bSGordon Ross * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29613a2f6bSGordon Ross * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30613a2f6bSGordon Ross * SUCH DAMAGE. 31613a2f6bSGordon Ross */ 32613a2f6bSGordon Ross 33613a2f6bSGordon Ross /* 34*15359501SGordon Ross * Copyright (c) 2009, 2010, Oracle and/or its affiliates. All rights reserved. 35613a2f6bSGordon Ross */ 36613a2f6bSGordon Ross 37613a2f6bSGordon Ross /* 38613a2f6bSGordon Ross * SMB Session Setup, and related. 39613a2f6bSGordon Ross * Copied from the driver: smb_smb.c 40613a2f6bSGordon Ross */ 41613a2f6bSGordon Ross 42613a2f6bSGordon Ross #include <errno.h> 43613a2f6bSGordon Ross #include <stdio.h> 44613a2f6bSGordon Ross #include <stdlib.h> 45613a2f6bSGordon Ross #include <unistd.h> 46613a2f6bSGordon Ross #include <strings.h> 47613a2f6bSGordon Ross #include <netdb.h> 48613a2f6bSGordon Ross #include <libintl.h> 49613a2f6bSGordon Ross #include <xti.h> 50613a2f6bSGordon Ross #include <assert.h> 51613a2f6bSGordon Ross 52613a2f6bSGordon Ross #include <sys/types.h> 53613a2f6bSGordon Ross #include <sys/time.h> 54613a2f6bSGordon Ross #include <sys/byteorder.h> 55613a2f6bSGordon Ross #include <sys/socket.h> 56613a2f6bSGordon Ross #include <sys/fcntl.h> 57613a2f6bSGordon Ross 58613a2f6bSGordon Ross #include <netinet/in.h> 59613a2f6bSGordon Ross #include <netinet/tcp.h> 60613a2f6bSGordon Ross #include <arpa/inet.h> 61613a2f6bSGordon Ross 62613a2f6bSGordon Ross #include <netsmb/mchain.h> 63613a2f6bSGordon Ross #include <netsmb/netbios.h> 64613a2f6bSGordon Ross #include <netsmb/smb_dev.h> 65613a2f6bSGordon Ross #include <netsmb/smb.h> 66613a2f6bSGordon Ross 67613a2f6bSGordon Ross #include <netsmb/smb_lib.h> 68613a2f6bSGordon Ross #include <netsmb/nb_lib.h> 69613a2f6bSGordon Ross 70613a2f6bSGordon Ross #include "private.h" 71613a2f6bSGordon Ross #include "charsets.h" 72613a2f6bSGordon Ross #include "ntlm.h" 73613a2f6bSGordon Ross #include "smb_crypt.h" 74613a2f6bSGordon Ross 75613a2f6bSGordon Ross /* 76613a2f6bSGordon Ross * When we have a _real_ ntstatus.h, eliminate this. 77613a2f6bSGordon Ross * XXX: Current smb.h defines it without the high bits. 78613a2f6bSGordon Ross */ 79613a2f6bSGordon Ross #define STATUS_MORE_PROCESSING_REQUIRED 0xC0000016 80613a2f6bSGordon Ross 81613a2f6bSGordon Ross static int 82613a2f6bSGordon Ross smb__ssnsetup(struct smb_ctx *ctx, 83613a2f6bSGordon Ross struct mbdata *mbc1, struct mbdata *mbc2, 84613a2f6bSGordon Ross uint32_t *statusp, uint16_t *actionp); 85613a2f6bSGordon Ross 86613a2f6bSGordon Ross /* 87613a2f6bSGordon Ross * Session Setup: NULL session (anonymous) 88613a2f6bSGordon Ross */ 89613a2f6bSGordon Ross int 90613a2f6bSGordon Ross smb_ssnsetup_null(struct smb_ctx *ctx) 91613a2f6bSGordon Ross { 92613a2f6bSGordon Ross int err; 93613a2f6bSGordon Ross uint32_t ntstatus; 94613a2f6bSGordon Ross uint16_t action = 0; 95613a2f6bSGordon Ross 96613a2f6bSGordon Ross if (ctx->ct_sopt.sv_caps & SMB_CAP_EXT_SECURITY) { 97613a2f6bSGordon Ross /* Should not get here with... */ 98613a2f6bSGordon Ross err = EINVAL; 99613a2f6bSGordon Ross goto out; 100613a2f6bSGordon Ross } 101613a2f6bSGordon Ross 102613a2f6bSGordon Ross err = smb__ssnsetup(ctx, NULL, NULL, &ntstatus, &action); 103613a2f6bSGordon Ross if (err) 104613a2f6bSGordon Ross goto out; 105613a2f6bSGordon Ross 106613a2f6bSGordon Ross DPRINT("status 0x%x action 0x%x", ntstatus, (int)action); 107613a2f6bSGordon Ross if (ntstatus != 0) 108613a2f6bSGordon Ross err = EAUTH; 109613a2f6bSGordon Ross 110613a2f6bSGordon Ross out: 111613a2f6bSGordon Ross return (err); 112613a2f6bSGordon Ross } 113613a2f6bSGordon Ross 114613a2f6bSGordon Ross 115613a2f6bSGordon Ross /* 116613a2f6bSGordon Ross * SMB Session Setup, using NTLMv1 (and maybe LMv1) 117613a2f6bSGordon Ross */ 118613a2f6bSGordon Ross int 119613a2f6bSGordon Ross smb_ssnsetup_ntlm1(struct smb_ctx *ctx) 120613a2f6bSGordon Ross { 121613a2f6bSGordon Ross struct mbdata lm_mbc, nt_mbc; 122613a2f6bSGordon Ross int err; 123613a2f6bSGordon Ross uint32_t ntstatus; 124613a2f6bSGordon Ross uint16_t action = 0; 125613a2f6bSGordon Ross 126613a2f6bSGordon Ross if (ctx->ct_sopt.sv_caps & SMB_CAP_EXT_SECURITY) { 127613a2f6bSGordon Ross /* Should not get here with... */ 128613a2f6bSGordon Ross err = EINVAL; 129613a2f6bSGordon Ross goto out; 130613a2f6bSGordon Ross } 131613a2f6bSGordon Ross 132613a2f6bSGordon Ross /* Make mb_done calls at out safe. */ 133613a2f6bSGordon Ross bzero(&lm_mbc, sizeof (lm_mbc)); 134613a2f6bSGordon Ross bzero(&nt_mbc, sizeof (nt_mbc)); 135613a2f6bSGordon Ross 136613a2f6bSGordon Ross /* Put the LM,NTLM responses (as mbdata). */ 137613a2f6bSGordon Ross err = ntlm_put_v1_responses(ctx, &lm_mbc, &nt_mbc); 138613a2f6bSGordon Ross if (err) 139613a2f6bSGordon Ross goto out; 140613a2f6bSGordon Ross 141613a2f6bSGordon Ross /* 142613a2f6bSGordon Ross * If we negotiated signing, compute the MAC key 143613a2f6bSGordon Ross * and start signing messages, but only on the 144613a2f6bSGordon Ross * first non-null session login. 145613a2f6bSGordon Ross */ 146613a2f6bSGordon Ross if ((ctx->ct_vcflags & SMBV_WILL_SIGN) && 147613a2f6bSGordon Ross (ctx->ct_hflags2 & SMB_FLAGS2_SECURITY_SIGNATURE) == 0) { 148613a2f6bSGordon Ross struct mbuf *m = nt_mbc.mb_top; 149613a2f6bSGordon Ross char *p; 150613a2f6bSGordon Ross 151613a2f6bSGordon Ross /* 152613a2f6bSGordon Ross * MAC_key = concat(session_key, nt_response) 153613a2f6bSGordon Ross */ 154613a2f6bSGordon Ross ctx->ct_mackeylen = NTLM_HASH_SZ + m->m_len; 155613a2f6bSGordon Ross ctx->ct_mackey = malloc(ctx->ct_mackeylen); 156613a2f6bSGordon Ross if (ctx->ct_mackey == NULL) { 157613a2f6bSGordon Ross ctx->ct_mackeylen = 0; 158613a2f6bSGordon Ross err = ENOMEM; 159613a2f6bSGordon Ross goto out; 160613a2f6bSGordon Ross } 161613a2f6bSGordon Ross p = ctx->ct_mackey; 162613a2f6bSGordon Ross memcpy(p, ctx->ct_ssn_key, NTLM_HASH_SZ); 163613a2f6bSGordon Ross memcpy(p + NTLM_HASH_SZ, m->m_data, m->m_len); 164613a2f6bSGordon Ross 165613a2f6bSGordon Ross /* OK, start signing! */ 166613a2f6bSGordon Ross ctx->ct_hflags2 |= SMB_FLAGS2_SECURITY_SIGNATURE; 167613a2f6bSGordon Ross } 168613a2f6bSGordon Ross 169613a2f6bSGordon Ross err = smb__ssnsetup(ctx, &lm_mbc, &nt_mbc, &ntstatus, &action); 170613a2f6bSGordon Ross if (err) 171613a2f6bSGordon Ross goto out; 172613a2f6bSGordon Ross 173613a2f6bSGordon Ross DPRINT("status 0x%x action 0x%x", ntstatus, (int)action); 174613a2f6bSGordon Ross if (ntstatus != 0) 175613a2f6bSGordon Ross err = EAUTH; 176613a2f6bSGordon Ross 177613a2f6bSGordon Ross out: 178613a2f6bSGordon Ross mb_done(&lm_mbc); 179613a2f6bSGordon Ross mb_done(&nt_mbc); 180613a2f6bSGordon Ross 181613a2f6bSGordon Ross return (err); 182613a2f6bSGordon Ross } 183613a2f6bSGordon Ross 184613a2f6bSGordon Ross /* 185613a2f6bSGordon Ross * SMB Session Setup, using NTLMv2 (and LMv2) 186613a2f6bSGordon Ross */ 187613a2f6bSGordon Ross int 188613a2f6bSGordon Ross smb_ssnsetup_ntlm2(struct smb_ctx *ctx) 189613a2f6bSGordon Ross { 190613a2f6bSGordon Ross struct mbdata lm_mbc, nt_mbc, ti_mbc; 191613a2f6bSGordon Ross int err; 192613a2f6bSGordon Ross uint32_t ntstatus; 193613a2f6bSGordon Ross uint16_t action = 0; 194613a2f6bSGordon Ross 195613a2f6bSGordon Ross if (ctx->ct_sopt.sv_caps & SMB_CAP_EXT_SECURITY) { 196613a2f6bSGordon Ross /* Should not get here with... */ 197613a2f6bSGordon Ross err = EINVAL; 198613a2f6bSGordon Ross goto out; 199613a2f6bSGordon Ross } 200613a2f6bSGordon Ross 201613a2f6bSGordon Ross /* Make mb_done calls at out safe. */ 202613a2f6bSGordon Ross bzero(&lm_mbc, sizeof (lm_mbc)); 203613a2f6bSGordon Ross bzero(&nt_mbc, sizeof (nt_mbc)); 204613a2f6bSGordon Ross bzero(&ti_mbc, sizeof (ti_mbc)); 205613a2f6bSGordon Ross 206613a2f6bSGordon Ross /* Build the NTLMv2 "target info" blob (as mbdata) */ 207613a2f6bSGordon Ross err = ntlm_build_target_info(ctx, NULL, &ti_mbc); 208613a2f6bSGordon Ross if (err) 209613a2f6bSGordon Ross goto out; 210613a2f6bSGordon Ross 211613a2f6bSGordon Ross /* Put the LMv2, NTLMv2 responses (as mbdata). */ 212613a2f6bSGordon Ross err = ntlm_put_v2_responses(ctx, &ti_mbc, &lm_mbc, &nt_mbc); 213613a2f6bSGordon Ross if (err) 214613a2f6bSGordon Ross goto out; 215613a2f6bSGordon Ross 216613a2f6bSGordon Ross /* 217613a2f6bSGordon Ross * If we negotiated signing, compute the MAC key 218613a2f6bSGordon Ross * and start signing messages, but only on the 219613a2f6bSGordon Ross * first non-null session login. 220613a2f6bSGordon Ross */ 221613a2f6bSGordon Ross if ((ctx->ct_vcflags & SMBV_WILL_SIGN) && 222613a2f6bSGordon Ross (ctx->ct_hflags2 & SMB_FLAGS2_SECURITY_SIGNATURE) == 0) { 223613a2f6bSGordon Ross struct mbuf *m = nt_mbc.mb_top; 224613a2f6bSGordon Ross char *p; 225613a2f6bSGordon Ross 226613a2f6bSGordon Ross /* 227613a2f6bSGordon Ross * MAC_key = concat(session_key, nt_response) 228613a2f6bSGordon Ross */ 229613a2f6bSGordon Ross ctx->ct_mackeylen = NTLM_HASH_SZ + m->m_len; 230613a2f6bSGordon Ross ctx->ct_mackey = malloc(ctx->ct_mackeylen); 231613a2f6bSGordon Ross if (ctx->ct_mackey == NULL) { 232613a2f6bSGordon Ross ctx->ct_mackeylen = 0; 233613a2f6bSGordon Ross err = ENOMEM; 234613a2f6bSGordon Ross goto out; 235613a2f6bSGordon Ross } 236613a2f6bSGordon Ross p = ctx->ct_mackey; 237613a2f6bSGordon Ross memcpy(p, ctx->ct_ssn_key, NTLM_HASH_SZ); 238613a2f6bSGordon Ross memcpy(p + NTLM_HASH_SZ, m->m_data, m->m_len); 239613a2f6bSGordon Ross 240613a2f6bSGordon Ross /* OK, start signing! */ 241613a2f6bSGordon Ross ctx->ct_hflags2 |= SMB_FLAGS2_SECURITY_SIGNATURE; 242613a2f6bSGordon Ross } 243613a2f6bSGordon Ross 244613a2f6bSGordon Ross err = smb__ssnsetup(ctx, &lm_mbc, &nt_mbc, &ntstatus, &action); 245613a2f6bSGordon Ross if (err) 246613a2f6bSGordon Ross goto out; 247613a2f6bSGordon Ross 248613a2f6bSGordon Ross DPRINT("status 0x%x action 0x%x", ntstatus, (int)action); 249613a2f6bSGordon Ross if (ntstatus != 0) 250613a2f6bSGordon Ross err = EAUTH; 251613a2f6bSGordon Ross 252613a2f6bSGordon Ross out: 253613a2f6bSGordon Ross mb_done(&ti_mbc); 254613a2f6bSGordon Ross mb_done(&lm_mbc); 255613a2f6bSGordon Ross mb_done(&nt_mbc); 256613a2f6bSGordon Ross 257613a2f6bSGordon Ross return (err); 258613a2f6bSGordon Ross } 259613a2f6bSGordon Ross 260613a2f6bSGordon Ross int 261613a2f6bSGordon Ross smb_ssnsetup_spnego(struct smb_ctx *ctx, struct mbdata *hint_mb) 262613a2f6bSGordon Ross { 263613a2f6bSGordon Ross struct mbdata send_mb, recv_mb; 264613a2f6bSGordon Ross int err; 265613a2f6bSGordon Ross uint32_t ntstatus; 266613a2f6bSGordon Ross uint16_t action = 0; 267613a2f6bSGordon Ross 268613a2f6bSGordon Ross err = ssp_ctx_create_client(ctx, hint_mb); 269613a2f6bSGordon Ross if (err) 270613a2f6bSGordon Ross goto out; 271613a2f6bSGordon Ross 272613a2f6bSGordon Ross bzero(&send_mb, sizeof (send_mb)); 273613a2f6bSGordon Ross bzero(&recv_mb, sizeof (recv_mb)); 274613a2f6bSGordon Ross 275613a2f6bSGordon Ross /* NULL input indicates first call. */ 276613a2f6bSGordon Ross err = ssp_ctx_next_token(ctx, NULL, &send_mb); 277613a2f6bSGordon Ross if (err) 278613a2f6bSGordon Ross goto out; 279613a2f6bSGordon Ross 280613a2f6bSGordon Ross for (;;) { 281613a2f6bSGordon Ross err = smb__ssnsetup(ctx, &send_mb, &recv_mb, 282613a2f6bSGordon Ross &ntstatus, &action); 283613a2f6bSGordon Ross if (err) 284613a2f6bSGordon Ross goto out; 285613a2f6bSGordon Ross if (ntstatus == 0) 286613a2f6bSGordon Ross break; /* normal loop termination */ 287613a2f6bSGordon Ross if (ntstatus != STATUS_MORE_PROCESSING_REQUIRED) { 288613a2f6bSGordon Ross err = EAUTH; 289*15359501SGordon Ross goto out; 290613a2f6bSGordon Ross } 291613a2f6bSGordon Ross 292613a2f6bSGordon Ross /* middle calls get both in, out */ 293613a2f6bSGordon Ross err = ssp_ctx_next_token(ctx, &recv_mb, &send_mb); 294613a2f6bSGordon Ross if (err) 295613a2f6bSGordon Ross goto out; 296613a2f6bSGordon Ross } 297613a2f6bSGordon Ross DPRINT("status 0x%x action 0x%x", ntstatus, (int)action); 298613a2f6bSGordon Ross 299613a2f6bSGordon Ross /* NULL output indicates last call. */ 300613a2f6bSGordon Ross (void) ssp_ctx_next_token(ctx, &recv_mb, NULL); 301613a2f6bSGordon Ross 302613a2f6bSGordon Ross out: 303613a2f6bSGordon Ross ssp_ctx_destroy(ctx); 304613a2f6bSGordon Ross 305613a2f6bSGordon Ross return (err); 306613a2f6bSGordon Ross } 307613a2f6bSGordon Ross 308613a2f6bSGordon Ross /* 309613a2f6bSGordon Ross * Session Setup function used for all the forms we support. 310613a2f6bSGordon Ross * To allow this sharing, the crypto stuff is computed by 311613a2f6bSGordon Ross * callers and passed in as mbdata chains. Also, the args 312613a2f6bSGordon Ross * have different meanings for extended security vs. old. 313613a2f6bSGordon Ross * Some may be used as either IN or OUT parameters. 314613a2f6bSGordon Ross * 315613a2f6bSGordon Ross * For NTLM (v1, v2), all parameters are inputs 316613a2f6bSGordon Ross * mbc1: [in] LM password hash 317613a2f6bSGordon Ross * mbc2: [in] NT password hash 318613a2f6bSGordon Ross * For Extended security (spnego) 319613a2f6bSGordon Ross * mbc1: [in] outgoing blob data 320613a2f6bSGordon Ross * mbc2: [out] received blob data 321613a2f6bSGordon Ross * For both forms, these are optional: 322613a2f6bSGordon Ross * statusp: [out] NT status 323613a2f6bSGordon Ross * actionp: [out] Logon Action (i.e. SMB_ACT_GUEST) 324613a2f6bSGordon Ross */ 325613a2f6bSGordon Ross static int 326613a2f6bSGordon Ross smb__ssnsetup(struct smb_ctx *ctx, 327613a2f6bSGordon Ross struct mbdata *mbc1, struct mbdata *mbc2, 328613a2f6bSGordon Ross uint32_t *statusp, uint16_t *actionp) 329613a2f6bSGordon Ross { 330613a2f6bSGordon Ross static const char NativeOS[] = "Solaris"; 331613a2f6bSGordon Ross static const char LanMan[] = "NETSMB"; 332613a2f6bSGordon Ross struct smb_sopt *sv = &ctx->ct_sopt; 333613a2f6bSGordon Ross struct smb_iods *is = &ctx->ct_iods; 334613a2f6bSGordon Ross struct smb_rq *rqp = NULL; 335613a2f6bSGordon Ross struct mbdata *mbp; 336613a2f6bSGordon Ross struct mbuf *m; 337613a2f6bSGordon Ross int err, uc; 338613a2f6bSGordon Ross uint32_t caps; 339613a2f6bSGordon Ross uint16_t bc, len1, len2, sblen; 340613a2f6bSGordon Ross uint8_t wc; 341613a2f6bSGordon Ross 342613a2f6bSGordon Ross /* 343613a2f6bSGordon Ross * Some of the "capability" bits we offer will be copied 344613a2f6bSGordon Ross * from those offered by the server, with a mask applied. 345613a2f6bSGordon Ross * This is the mask of capabilies copied from the server. 346613a2f6bSGordon Ross * Some others get special handling below. 347613a2f6bSGordon Ross */ 348613a2f6bSGordon Ross static const uint32_t caps_mask = 349613a2f6bSGordon Ross SMB_CAP_UNICODE | 350613a2f6bSGordon Ross SMB_CAP_LARGE_FILES | 351613a2f6bSGordon Ross SMB_CAP_NT_SMBS | 352613a2f6bSGordon Ross SMB_CAP_STATUS32 | 353613a2f6bSGordon Ross SMB_CAP_EXT_SECURITY; 354613a2f6bSGordon Ross 355613a2f6bSGordon Ross caps = ctx->ct_sopt.sv_caps & caps_mask; 356613a2f6bSGordon Ross uc = ctx->ct_hflags2 & SMB_FLAGS2_UNICODE; 357613a2f6bSGordon Ross 358613a2f6bSGordon Ross err = smb_rq_init(ctx, SMB_COM_SESSION_SETUP_ANDX, &rqp); 359613a2f6bSGordon Ross if (err) 360613a2f6bSGordon Ross goto out; 361613a2f6bSGordon Ross 362613a2f6bSGordon Ross /* 363613a2f6bSGordon Ross * Build the SMB request. 364613a2f6bSGordon Ross */ 365613a2f6bSGordon Ross mbp = &rqp->rq_rq; 366613a2f6bSGordon Ross smb_rq_wstart(rqp); 367613a2f6bSGordon Ross mb_put_uint16le(mbp, 0xff); /* 0: AndXCommand */ 368613a2f6bSGordon Ross mb_put_uint16le(mbp, 0); /* 1: AndXOffset */ 369613a2f6bSGordon Ross mb_put_uint16le(mbp, sv->sv_maxtx); /* 2: MaxBufferSize */ 370613a2f6bSGordon Ross mb_put_uint16le(mbp, sv->sv_maxmux); /* 3: MaxMpxCount */ 371613a2f6bSGordon Ross mb_put_uint16le(mbp, 1); /* 4: VcNumber */ 372613a2f6bSGordon Ross mb_put_uint32le(mbp, sv->sv_skey); /* 5,6: Session Key */ 373613a2f6bSGordon Ross 374613a2f6bSGordon Ross if (caps & SMB_CAP_EXT_SECURITY) { 375613a2f6bSGordon Ross len1 = mbc1 ? mbc1->mb_count : 0; 376613a2f6bSGordon Ross mb_put_uint16le(mbp, len1); /* 7: Sec. Blob Len */ 377613a2f6bSGordon Ross mb_put_uint32le(mbp, 0); /* 8,9: reserved */ 378613a2f6bSGordon Ross mb_put_uint32le(mbp, caps); /* 10,11: Capabilities */ 379613a2f6bSGordon Ross smb_rq_wend(rqp); /* 12: Byte Count */ 380613a2f6bSGordon Ross smb_rq_bstart(rqp); 381613a2f6bSGordon Ross if (mbc1 && mbc1->mb_top) { 382613a2f6bSGordon Ross mb_put_mbuf(mbp, mbc1->mb_top); /* sec. blob */ 383613a2f6bSGordon Ross mbc1->mb_top = NULL; /* consumed */ 384613a2f6bSGordon Ross } 385613a2f6bSGordon Ross /* mbc2 is required below */ 386613a2f6bSGordon Ross if (mbc2 == NULL) { 387613a2f6bSGordon Ross err = EINVAL; 388613a2f6bSGordon Ross goto out; 389613a2f6bSGordon Ross } 390613a2f6bSGordon Ross } else { 391613a2f6bSGordon Ross len1 = mbc1 ? mbc1->mb_count : 0; 392613a2f6bSGordon Ross len2 = mbc2 ? mbc2->mb_count : 0; 393613a2f6bSGordon Ross mb_put_uint16le(mbp, len1); /* 7: LM pass. len */ 394613a2f6bSGordon Ross mb_put_uint16le(mbp, len2); /* 8: NT pass. len */ 395613a2f6bSGordon Ross mb_put_uint32le(mbp, 0); /* 9,10: reserved */ 396613a2f6bSGordon Ross mb_put_uint32le(mbp, caps); /* 11,12: Capabilities */ 397613a2f6bSGordon Ross smb_rq_wend(rqp); /* 13: Byte Count */ 398613a2f6bSGordon Ross smb_rq_bstart(rqp); 399613a2f6bSGordon Ross if (mbc1 && mbc1->mb_top) { 400613a2f6bSGordon Ross mb_put_mbuf(mbp, mbc1->mb_top); /* LM password */ 401613a2f6bSGordon Ross mbc1->mb_top = NULL; /* consumed */ 402613a2f6bSGordon Ross } 403613a2f6bSGordon Ross if (mbc2 && mbc2->mb_top) { 404613a2f6bSGordon Ross mb_put_mbuf(mbp, mbc2->mb_top); /* NT password */ 405613a2f6bSGordon Ross mbc2->mb_top = NULL; /* consumed */ 406613a2f6bSGordon Ross } 40702d09e03SGordon Ross mb_put_string(mbp, ctx->ct_user, uc); 40802d09e03SGordon Ross mb_put_string(mbp, ctx->ct_domain, uc); 409613a2f6bSGordon Ross } 41002d09e03SGordon Ross mb_put_string(mbp, NativeOS, uc); 41102d09e03SGordon Ross mb_put_string(mbp, LanMan, uc); 412613a2f6bSGordon Ross smb_rq_bend(rqp); 413613a2f6bSGordon Ross 414613a2f6bSGordon Ross err = smb_rq_internal(ctx, rqp); 415613a2f6bSGordon Ross if (err) 416613a2f6bSGordon Ross goto out; 417613a2f6bSGordon Ross 418613a2f6bSGordon Ross if (statusp) 419613a2f6bSGordon Ross *statusp = rqp->rq_status; 420613a2f6bSGordon Ross 421613a2f6bSGordon Ross /* 422613a2f6bSGordon Ross * If we have a real error, the response probably has 423613a2f6bSGordon Ross * no more data, so don't try to parse any more. 424613a2f6bSGordon Ross * Note: err=0, means rq_status is valid. 425613a2f6bSGordon Ross */ 426613a2f6bSGordon Ross if (rqp->rq_status != 0 && 427613a2f6bSGordon Ross rqp->rq_status != STATUS_MORE_PROCESSING_REQUIRED) { 428613a2f6bSGordon Ross goto out; 429613a2f6bSGordon Ross } 430613a2f6bSGordon Ross 431613a2f6bSGordon Ross /* 432613a2f6bSGordon Ross * Parse the reply 433613a2f6bSGordon Ross */ 434613a2f6bSGordon Ross uc = rqp->rq_hflags2 & SMB_FLAGS2_UNICODE; 435613a2f6bSGordon Ross is->is_smbuid = rqp->rq_uid; 436613a2f6bSGordon Ross mbp = &rqp->rq_rp; 437613a2f6bSGordon Ross 43802d09e03SGordon Ross err = md_get_uint8(mbp, &wc); 439613a2f6bSGordon Ross if (err) 440613a2f6bSGordon Ross goto out; 441613a2f6bSGordon Ross 442613a2f6bSGordon Ross err = EBADRPC; /* for any problems in this section */ 443613a2f6bSGordon Ross if (caps & SMB_CAP_EXT_SECURITY) { 444613a2f6bSGordon Ross if (wc != 4) 445613a2f6bSGordon Ross goto out; 44602d09e03SGordon Ross md_get_uint16le(mbp, NULL); /* secondary cmd */ 44702d09e03SGordon Ross md_get_uint16le(mbp, NULL); /* andxoffset */ 44802d09e03SGordon Ross md_get_uint16le(mbp, actionp); /* action */ 44902d09e03SGordon Ross md_get_uint16le(mbp, &sblen); /* sec. blob len */ 45002d09e03SGordon Ross md_get_uint16le(mbp, &bc); /* byte count */ 451613a2f6bSGordon Ross /* 452613a2f6bSGordon Ross * Get the security blob, after 453613a2f6bSGordon Ross * sanity-checking the length. 454613a2f6bSGordon Ross */ 455613a2f6bSGordon Ross if (sblen == 0 || bc < sblen) 456613a2f6bSGordon Ross goto out; 45702d09e03SGordon Ross err = md_get_mbuf(mbp, sblen, &m); 458613a2f6bSGordon Ross if (err) 459613a2f6bSGordon Ross goto out; 460613a2f6bSGordon Ross mb_initm(mbc2, m); 461613a2f6bSGordon Ross mbc2->mb_count = sblen; 462613a2f6bSGordon Ross } else { 463613a2f6bSGordon Ross if (wc != 3) 464613a2f6bSGordon Ross goto out; 46502d09e03SGordon Ross md_get_uint16le(mbp, NULL); /* secondary cmd */ 46602d09e03SGordon Ross md_get_uint16le(mbp, NULL); /* andxoffset */ 46702d09e03SGordon Ross md_get_uint16le(mbp, actionp); /* action */ 46802d09e03SGordon Ross err = md_get_uint16le(mbp, &bc); /* byte count */ 469613a2f6bSGordon Ross if (err) 470613a2f6bSGordon Ross goto out; 471613a2f6bSGordon Ross } 472613a2f6bSGordon Ross 473613a2f6bSGordon Ross /* 474613a2f6bSGordon Ross * Native OS, LANMGR, & Domain follow here. 475613a2f6bSGordon Ross * Parse these strings and store for later. 476613a2f6bSGordon Ross * If unicode, they should be aligned. 477613a2f6bSGordon Ross * 478613a2f6bSGordon Ross * Note that with Extended security, we may use 479613a2f6bSGordon Ross * multiple calls to this function. Only parse 480613a2f6bSGordon Ross * these strings on the last one (status == 0). 481613a2f6bSGordon Ross * Ditto for the CAP_LARGE work-around. 482613a2f6bSGordon Ross */ 483613a2f6bSGordon Ross if (rqp->rq_status != 0) 484613a2f6bSGordon Ross goto out; 485613a2f6bSGordon Ross 486613a2f6bSGordon Ross /* Ignore any parsing errors for these strings. */ 48702d09e03SGordon Ross err = md_get_string(mbp, &ctx->ct_srv_OS, uc); 488613a2f6bSGordon Ross DPRINT("server OS: %s", err ? "?" : ctx->ct_srv_OS); 48902d09e03SGordon Ross err = md_get_string(mbp, &ctx->ct_srv_LM, uc); 490613a2f6bSGordon Ross DPRINT("server LM: %s", err ? "?" : ctx->ct_srv_LM); 491613a2f6bSGordon Ross /* 492613a2f6bSGordon Ross * There's sometimes a server domain folloing 493613a2f6bSGordon Ross * at this point, but we don't need it. 494613a2f6bSGordon Ross */ 495613a2f6bSGordon Ross 496613a2f6bSGordon Ross /* Success! (See Ignore any ... above) */ 497613a2f6bSGordon Ross err = 0; 498613a2f6bSGordon Ross 499613a2f6bSGordon Ross /* 500613a2f6bSGordon Ross * Windows systems don't suport CAP_LARGE_READX,WRITEX 501613a2f6bSGordon Ross * when signing is enabled, so adjust sv_caps. 502613a2f6bSGordon Ross */ 503613a2f6bSGordon Ross if (ctx->ct_srv_OS && 504613a2f6bSGordon Ross 0 == strncmp(ctx->ct_srv_OS, "Windows ", 8)) { 505613a2f6bSGordon Ross DPRINT("Server is Windows"); 506613a2f6bSGordon Ross if (ctx->ct_vcflags & SMBV_WILL_SIGN) { 507613a2f6bSGordon Ross DPRINT("disable CAP_LARGE_(r/w)"); 508613a2f6bSGordon Ross ctx->ct_sopt.sv_caps &= 509613a2f6bSGordon Ross ~(SMB_CAP_LARGE_READX | SMB_CAP_LARGE_WRITEX); 510613a2f6bSGordon Ross } 511613a2f6bSGordon Ross } 512613a2f6bSGordon Ross 513613a2f6bSGordon Ross out: 514613a2f6bSGordon Ross if (rqp) 515613a2f6bSGordon Ross smb_rq_done(rqp); 516613a2f6bSGordon Ross 517613a2f6bSGordon Ross return (err); 518613a2f6bSGordon Ross } 519