1*613a2f6bSGordon Ross /* 2*613a2f6bSGordon Ross * Copyright (c) 2000-2001 Boris Popov 3*613a2f6bSGordon Ross * All rights reserved. 4*613a2f6bSGordon Ross * 5*613a2f6bSGordon Ross * Redistribution and use in source and binary forms, with or without 6*613a2f6bSGordon Ross * modification, are permitted provided that the following conditions 7*613a2f6bSGordon Ross * are met: 8*613a2f6bSGordon Ross * 1. Redistributions of source code must retain the above copyright 9*613a2f6bSGordon Ross * notice, this list of conditions and the following disclaimer. 10*613a2f6bSGordon Ross * 2. Redistributions in binary form must reproduce the above copyright 11*613a2f6bSGordon Ross * notice, this list of conditions and the following disclaimer in the 12*613a2f6bSGordon Ross * documentation and/or other materials provided with the distribution. 13*613a2f6bSGordon Ross * 3. All advertising materials mentioning features or use of this software 14*613a2f6bSGordon Ross * must display the following acknowledgement: 15*613a2f6bSGordon Ross * This product includes software developed by Boris Popov. 16*613a2f6bSGordon Ross * 4. Neither the name of the author nor the names of any co-contributors 17*613a2f6bSGordon Ross * may be used to endorse or promote products derived from this software 18*613a2f6bSGordon Ross * without specific prior written permission. 19*613a2f6bSGordon Ross * 20*613a2f6bSGordon Ross * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 21*613a2f6bSGordon Ross * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 22*613a2f6bSGordon Ross * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 23*613a2f6bSGordon Ross * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 24*613a2f6bSGordon Ross * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 25*613a2f6bSGordon Ross * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26*613a2f6bSGordon Ross * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27*613a2f6bSGordon Ross * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28*613a2f6bSGordon Ross * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29*613a2f6bSGordon Ross * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30*613a2f6bSGordon Ross * SUCH DAMAGE. 31*613a2f6bSGordon Ross */ 32*613a2f6bSGordon Ross 33*613a2f6bSGordon Ross /* 34*613a2f6bSGordon Ross * Copyright 2009 Sun Microsystems, Inc. All rights reserved. 35*613a2f6bSGordon Ross * Use is subject to license terms. 36*613a2f6bSGordon Ross */ 37*613a2f6bSGordon Ross 38*613a2f6bSGordon Ross /* 39*613a2f6bSGordon Ross * SMB Session Setup, and related. 40*613a2f6bSGordon Ross * Copied from the driver: smb_smb.c 41*613a2f6bSGordon Ross */ 42*613a2f6bSGordon Ross 43*613a2f6bSGordon Ross #include <errno.h> 44*613a2f6bSGordon Ross #include <stdio.h> 45*613a2f6bSGordon Ross #include <stdlib.h> 46*613a2f6bSGordon Ross #include <unistd.h> 47*613a2f6bSGordon Ross #include <strings.h> 48*613a2f6bSGordon Ross #include <netdb.h> 49*613a2f6bSGordon Ross #include <libintl.h> 50*613a2f6bSGordon Ross #include <xti.h> 51*613a2f6bSGordon Ross #include <assert.h> 52*613a2f6bSGordon Ross 53*613a2f6bSGordon Ross #include <sys/types.h> 54*613a2f6bSGordon Ross #include <sys/time.h> 55*613a2f6bSGordon Ross #include <sys/byteorder.h> 56*613a2f6bSGordon Ross #include <sys/socket.h> 57*613a2f6bSGordon Ross #include <sys/fcntl.h> 58*613a2f6bSGordon Ross 59*613a2f6bSGordon Ross #include <netinet/in.h> 60*613a2f6bSGordon Ross #include <netinet/tcp.h> 61*613a2f6bSGordon Ross #include <arpa/inet.h> 62*613a2f6bSGordon Ross 63*613a2f6bSGordon Ross #include <netsmb/mchain.h> 64*613a2f6bSGordon Ross #include <netsmb/netbios.h> 65*613a2f6bSGordon Ross #include <netsmb/smb_dev.h> 66*613a2f6bSGordon Ross #include <netsmb/smb.h> 67*613a2f6bSGordon Ross 68*613a2f6bSGordon Ross #include <netsmb/smb_lib.h> 69*613a2f6bSGordon Ross #include <netsmb/nb_lib.h> 70*613a2f6bSGordon Ross 71*613a2f6bSGordon Ross #include "private.h" 72*613a2f6bSGordon Ross #include "charsets.h" 73*613a2f6bSGordon Ross #include "ntlm.h" 74*613a2f6bSGordon Ross #include "smb_crypt.h" 75*613a2f6bSGordon Ross 76*613a2f6bSGordon Ross /* 77*613a2f6bSGordon Ross * When we have a _real_ ntstatus.h, eliminate this. 78*613a2f6bSGordon Ross * XXX: Current smb.h defines it without the high bits. 79*613a2f6bSGordon Ross */ 80*613a2f6bSGordon Ross #define STATUS_MORE_PROCESSING_REQUIRED 0xC0000016 81*613a2f6bSGordon Ross 82*613a2f6bSGordon Ross static int 83*613a2f6bSGordon Ross smb__ssnsetup(struct smb_ctx *ctx, 84*613a2f6bSGordon Ross struct mbdata *mbc1, struct mbdata *mbc2, 85*613a2f6bSGordon Ross uint32_t *statusp, uint16_t *actionp); 86*613a2f6bSGordon Ross 87*613a2f6bSGordon Ross /* 88*613a2f6bSGordon Ross * Session Setup: NULL session (anonymous) 89*613a2f6bSGordon Ross */ 90*613a2f6bSGordon Ross int 91*613a2f6bSGordon Ross smb_ssnsetup_null(struct smb_ctx *ctx) 92*613a2f6bSGordon Ross { 93*613a2f6bSGordon Ross int err; 94*613a2f6bSGordon Ross uint32_t ntstatus; 95*613a2f6bSGordon Ross uint16_t action = 0; 96*613a2f6bSGordon Ross 97*613a2f6bSGordon Ross if (ctx->ct_sopt.sv_caps & SMB_CAP_EXT_SECURITY) { 98*613a2f6bSGordon Ross /* Should not get here with... */ 99*613a2f6bSGordon Ross err = EINVAL; 100*613a2f6bSGordon Ross goto out; 101*613a2f6bSGordon Ross } 102*613a2f6bSGordon Ross 103*613a2f6bSGordon Ross err = smb__ssnsetup(ctx, NULL, NULL, &ntstatus, &action); 104*613a2f6bSGordon Ross if (err) 105*613a2f6bSGordon Ross goto out; 106*613a2f6bSGordon Ross 107*613a2f6bSGordon Ross DPRINT("status 0x%x action 0x%x", ntstatus, (int)action); 108*613a2f6bSGordon Ross if (ntstatus != 0) 109*613a2f6bSGordon Ross err = EAUTH; 110*613a2f6bSGordon Ross 111*613a2f6bSGordon Ross out: 112*613a2f6bSGordon Ross return (err); 113*613a2f6bSGordon Ross } 114*613a2f6bSGordon Ross 115*613a2f6bSGordon Ross 116*613a2f6bSGordon Ross /* 117*613a2f6bSGordon Ross * SMB Session Setup, using NTLMv1 (and maybe LMv1) 118*613a2f6bSGordon Ross */ 119*613a2f6bSGordon Ross int 120*613a2f6bSGordon Ross smb_ssnsetup_ntlm1(struct smb_ctx *ctx) 121*613a2f6bSGordon Ross { 122*613a2f6bSGordon Ross struct mbdata lm_mbc, nt_mbc; 123*613a2f6bSGordon Ross int err; 124*613a2f6bSGordon Ross uint32_t ntstatus; 125*613a2f6bSGordon Ross uint16_t action = 0; 126*613a2f6bSGordon Ross 127*613a2f6bSGordon Ross if (ctx->ct_sopt.sv_caps & SMB_CAP_EXT_SECURITY) { 128*613a2f6bSGordon Ross /* Should not get here with... */ 129*613a2f6bSGordon Ross err = EINVAL; 130*613a2f6bSGordon Ross goto out; 131*613a2f6bSGordon Ross } 132*613a2f6bSGordon Ross 133*613a2f6bSGordon Ross /* Make mb_done calls at out safe. */ 134*613a2f6bSGordon Ross bzero(&lm_mbc, sizeof (lm_mbc)); 135*613a2f6bSGordon Ross bzero(&nt_mbc, sizeof (nt_mbc)); 136*613a2f6bSGordon Ross 137*613a2f6bSGordon Ross /* Put the LM,NTLM responses (as mbdata). */ 138*613a2f6bSGordon Ross err = ntlm_put_v1_responses(ctx, &lm_mbc, &nt_mbc); 139*613a2f6bSGordon Ross if (err) 140*613a2f6bSGordon Ross goto out; 141*613a2f6bSGordon Ross 142*613a2f6bSGordon Ross /* 143*613a2f6bSGordon Ross * If we negotiated signing, compute the MAC key 144*613a2f6bSGordon Ross * and start signing messages, but only on the 145*613a2f6bSGordon Ross * first non-null session login. 146*613a2f6bSGordon Ross */ 147*613a2f6bSGordon Ross if ((ctx->ct_vcflags & SMBV_WILL_SIGN) && 148*613a2f6bSGordon Ross (ctx->ct_hflags2 & SMB_FLAGS2_SECURITY_SIGNATURE) == 0) { 149*613a2f6bSGordon Ross struct mbuf *m = nt_mbc.mb_top; 150*613a2f6bSGordon Ross char *p; 151*613a2f6bSGordon Ross 152*613a2f6bSGordon Ross /* 153*613a2f6bSGordon Ross * MAC_key = concat(session_key, nt_response) 154*613a2f6bSGordon Ross */ 155*613a2f6bSGordon Ross ctx->ct_mackeylen = NTLM_HASH_SZ + m->m_len; 156*613a2f6bSGordon Ross ctx->ct_mackey = malloc(ctx->ct_mackeylen); 157*613a2f6bSGordon Ross if (ctx->ct_mackey == NULL) { 158*613a2f6bSGordon Ross ctx->ct_mackeylen = 0; 159*613a2f6bSGordon Ross err = ENOMEM; 160*613a2f6bSGordon Ross goto out; 161*613a2f6bSGordon Ross } 162*613a2f6bSGordon Ross p = ctx->ct_mackey; 163*613a2f6bSGordon Ross memcpy(p, ctx->ct_ssn_key, NTLM_HASH_SZ); 164*613a2f6bSGordon Ross memcpy(p + NTLM_HASH_SZ, m->m_data, m->m_len); 165*613a2f6bSGordon Ross 166*613a2f6bSGordon Ross /* OK, start signing! */ 167*613a2f6bSGordon Ross ctx->ct_hflags2 |= SMB_FLAGS2_SECURITY_SIGNATURE; 168*613a2f6bSGordon Ross } 169*613a2f6bSGordon Ross 170*613a2f6bSGordon Ross err = smb__ssnsetup(ctx, &lm_mbc, &nt_mbc, &ntstatus, &action); 171*613a2f6bSGordon Ross if (err) 172*613a2f6bSGordon Ross goto out; 173*613a2f6bSGordon Ross 174*613a2f6bSGordon Ross DPRINT("status 0x%x action 0x%x", ntstatus, (int)action); 175*613a2f6bSGordon Ross if (ntstatus != 0) 176*613a2f6bSGordon Ross err = EAUTH; 177*613a2f6bSGordon Ross 178*613a2f6bSGordon Ross out: 179*613a2f6bSGordon Ross mb_done(&lm_mbc); 180*613a2f6bSGordon Ross mb_done(&nt_mbc); 181*613a2f6bSGordon Ross 182*613a2f6bSGordon Ross return (err); 183*613a2f6bSGordon Ross } 184*613a2f6bSGordon Ross 185*613a2f6bSGordon Ross /* 186*613a2f6bSGordon Ross * SMB Session Setup, using NTLMv2 (and LMv2) 187*613a2f6bSGordon Ross */ 188*613a2f6bSGordon Ross int 189*613a2f6bSGordon Ross smb_ssnsetup_ntlm2(struct smb_ctx *ctx) 190*613a2f6bSGordon Ross { 191*613a2f6bSGordon Ross struct mbdata lm_mbc, nt_mbc, ti_mbc; 192*613a2f6bSGordon Ross int err; 193*613a2f6bSGordon Ross uint32_t ntstatus; 194*613a2f6bSGordon Ross uint16_t action = 0; 195*613a2f6bSGordon Ross 196*613a2f6bSGordon Ross if (ctx->ct_sopt.sv_caps & SMB_CAP_EXT_SECURITY) { 197*613a2f6bSGordon Ross /* Should not get here with... */ 198*613a2f6bSGordon Ross err = EINVAL; 199*613a2f6bSGordon Ross goto out; 200*613a2f6bSGordon Ross } 201*613a2f6bSGordon Ross 202*613a2f6bSGordon Ross /* Make mb_done calls at out safe. */ 203*613a2f6bSGordon Ross bzero(&lm_mbc, sizeof (lm_mbc)); 204*613a2f6bSGordon Ross bzero(&nt_mbc, sizeof (nt_mbc)); 205*613a2f6bSGordon Ross bzero(&ti_mbc, sizeof (ti_mbc)); 206*613a2f6bSGordon Ross 207*613a2f6bSGordon Ross /* Build the NTLMv2 "target info" blob (as mbdata) */ 208*613a2f6bSGordon Ross err = ntlm_build_target_info(ctx, NULL, &ti_mbc); 209*613a2f6bSGordon Ross if (err) 210*613a2f6bSGordon Ross goto out; 211*613a2f6bSGordon Ross 212*613a2f6bSGordon Ross /* Put the LMv2, NTLMv2 responses (as mbdata). */ 213*613a2f6bSGordon Ross err = ntlm_put_v2_responses(ctx, &ti_mbc, &lm_mbc, &nt_mbc); 214*613a2f6bSGordon Ross if (err) 215*613a2f6bSGordon Ross goto out; 216*613a2f6bSGordon Ross 217*613a2f6bSGordon Ross /* 218*613a2f6bSGordon Ross * If we negotiated signing, compute the MAC key 219*613a2f6bSGordon Ross * and start signing messages, but only on the 220*613a2f6bSGordon Ross * first non-null session login. 221*613a2f6bSGordon Ross */ 222*613a2f6bSGordon Ross if ((ctx->ct_vcflags & SMBV_WILL_SIGN) && 223*613a2f6bSGordon Ross (ctx->ct_hflags2 & SMB_FLAGS2_SECURITY_SIGNATURE) == 0) { 224*613a2f6bSGordon Ross struct mbuf *m = nt_mbc.mb_top; 225*613a2f6bSGordon Ross char *p; 226*613a2f6bSGordon Ross 227*613a2f6bSGordon Ross /* 228*613a2f6bSGordon Ross * MAC_key = concat(session_key, nt_response) 229*613a2f6bSGordon Ross */ 230*613a2f6bSGordon Ross ctx->ct_mackeylen = NTLM_HASH_SZ + m->m_len; 231*613a2f6bSGordon Ross ctx->ct_mackey = malloc(ctx->ct_mackeylen); 232*613a2f6bSGordon Ross if (ctx->ct_mackey == NULL) { 233*613a2f6bSGordon Ross ctx->ct_mackeylen = 0; 234*613a2f6bSGordon Ross err = ENOMEM; 235*613a2f6bSGordon Ross goto out; 236*613a2f6bSGordon Ross } 237*613a2f6bSGordon Ross p = ctx->ct_mackey; 238*613a2f6bSGordon Ross memcpy(p, ctx->ct_ssn_key, NTLM_HASH_SZ); 239*613a2f6bSGordon Ross memcpy(p + NTLM_HASH_SZ, m->m_data, m->m_len); 240*613a2f6bSGordon Ross 241*613a2f6bSGordon Ross /* OK, start signing! */ 242*613a2f6bSGordon Ross ctx->ct_hflags2 |= SMB_FLAGS2_SECURITY_SIGNATURE; 243*613a2f6bSGordon Ross } 244*613a2f6bSGordon Ross 245*613a2f6bSGordon Ross err = smb__ssnsetup(ctx, &lm_mbc, &nt_mbc, &ntstatus, &action); 246*613a2f6bSGordon Ross if (err) 247*613a2f6bSGordon Ross goto out; 248*613a2f6bSGordon Ross 249*613a2f6bSGordon Ross DPRINT("status 0x%x action 0x%x", ntstatus, (int)action); 250*613a2f6bSGordon Ross if (ntstatus != 0) 251*613a2f6bSGordon Ross err = EAUTH; 252*613a2f6bSGordon Ross 253*613a2f6bSGordon Ross out: 254*613a2f6bSGordon Ross mb_done(&ti_mbc); 255*613a2f6bSGordon Ross mb_done(&lm_mbc); 256*613a2f6bSGordon Ross mb_done(&nt_mbc); 257*613a2f6bSGordon Ross 258*613a2f6bSGordon Ross return (err); 259*613a2f6bSGordon Ross } 260*613a2f6bSGordon Ross 261*613a2f6bSGordon Ross int 262*613a2f6bSGordon Ross smb_ssnsetup_spnego(struct smb_ctx *ctx, struct mbdata *hint_mb) 263*613a2f6bSGordon Ross { 264*613a2f6bSGordon Ross struct mbdata send_mb, recv_mb; 265*613a2f6bSGordon Ross int err; 266*613a2f6bSGordon Ross uint32_t ntstatus; 267*613a2f6bSGordon Ross uint16_t action = 0; 268*613a2f6bSGordon Ross 269*613a2f6bSGordon Ross err = ssp_ctx_create_client(ctx, hint_mb); 270*613a2f6bSGordon Ross if (err) 271*613a2f6bSGordon Ross goto out; 272*613a2f6bSGordon Ross 273*613a2f6bSGordon Ross bzero(&send_mb, sizeof (send_mb)); 274*613a2f6bSGordon Ross bzero(&recv_mb, sizeof (recv_mb)); 275*613a2f6bSGordon Ross 276*613a2f6bSGordon Ross /* NULL input indicates first call. */ 277*613a2f6bSGordon Ross err = ssp_ctx_next_token(ctx, NULL, &send_mb); 278*613a2f6bSGordon Ross if (err) 279*613a2f6bSGordon Ross goto out; 280*613a2f6bSGordon Ross 281*613a2f6bSGordon Ross for (;;) { 282*613a2f6bSGordon Ross err = smb__ssnsetup(ctx, &send_mb, &recv_mb, 283*613a2f6bSGordon Ross &ntstatus, &action); 284*613a2f6bSGordon Ross if (err) 285*613a2f6bSGordon Ross goto out; 286*613a2f6bSGordon Ross if (ntstatus == 0) 287*613a2f6bSGordon Ross break; /* normal loop termination */ 288*613a2f6bSGordon Ross if (ntstatus != STATUS_MORE_PROCESSING_REQUIRED) { 289*613a2f6bSGordon Ross err = EAUTH; 290*613a2f6bSGordon Ross break; 291*613a2f6bSGordon Ross } 292*613a2f6bSGordon Ross 293*613a2f6bSGordon Ross /* middle calls get both in, out */ 294*613a2f6bSGordon Ross err = ssp_ctx_next_token(ctx, &recv_mb, &send_mb); 295*613a2f6bSGordon Ross if (err) 296*613a2f6bSGordon Ross goto out; 297*613a2f6bSGordon Ross } 298*613a2f6bSGordon Ross DPRINT("status 0x%x action 0x%x", ntstatus, (int)action); 299*613a2f6bSGordon Ross 300*613a2f6bSGordon Ross /* NULL output indicates last call. */ 301*613a2f6bSGordon Ross (void) ssp_ctx_next_token(ctx, &recv_mb, NULL); 302*613a2f6bSGordon Ross 303*613a2f6bSGordon Ross out: 304*613a2f6bSGordon Ross ssp_ctx_destroy(ctx); 305*613a2f6bSGordon Ross 306*613a2f6bSGordon Ross return (err); 307*613a2f6bSGordon Ross } 308*613a2f6bSGordon Ross 309*613a2f6bSGordon Ross /* 310*613a2f6bSGordon Ross * Session Setup function used for all the forms we support. 311*613a2f6bSGordon Ross * To allow this sharing, the crypto stuff is computed by 312*613a2f6bSGordon Ross * callers and passed in as mbdata chains. Also, the args 313*613a2f6bSGordon Ross * have different meanings for extended security vs. old. 314*613a2f6bSGordon Ross * Some may be used as either IN or OUT parameters. 315*613a2f6bSGordon Ross * 316*613a2f6bSGordon Ross * For NTLM (v1, v2), all parameters are inputs 317*613a2f6bSGordon Ross * mbc1: [in] LM password hash 318*613a2f6bSGordon Ross * mbc2: [in] NT password hash 319*613a2f6bSGordon Ross * For Extended security (spnego) 320*613a2f6bSGordon Ross * mbc1: [in] outgoing blob data 321*613a2f6bSGordon Ross * mbc2: [out] received blob data 322*613a2f6bSGordon Ross * For both forms, these are optional: 323*613a2f6bSGordon Ross * statusp: [out] NT status 324*613a2f6bSGordon Ross * actionp: [out] Logon Action (i.e. SMB_ACT_GUEST) 325*613a2f6bSGordon Ross */ 326*613a2f6bSGordon Ross static int 327*613a2f6bSGordon Ross smb__ssnsetup(struct smb_ctx *ctx, 328*613a2f6bSGordon Ross struct mbdata *mbc1, struct mbdata *mbc2, 329*613a2f6bSGordon Ross uint32_t *statusp, uint16_t *actionp) 330*613a2f6bSGordon Ross { 331*613a2f6bSGordon Ross static const char NativeOS[] = "Solaris"; 332*613a2f6bSGordon Ross static const char LanMan[] = "NETSMB"; 333*613a2f6bSGordon Ross struct smb_sopt *sv = &ctx->ct_sopt; 334*613a2f6bSGordon Ross struct smb_iods *is = &ctx->ct_iods; 335*613a2f6bSGordon Ross struct smb_rq *rqp = NULL; 336*613a2f6bSGordon Ross struct mbdata *mbp; 337*613a2f6bSGordon Ross struct mbuf *m; 338*613a2f6bSGordon Ross int err, uc; 339*613a2f6bSGordon Ross uint32_t caps; 340*613a2f6bSGordon Ross uint16_t bc, len1, len2, sblen; 341*613a2f6bSGordon Ross uint8_t wc; 342*613a2f6bSGordon Ross 343*613a2f6bSGordon Ross /* 344*613a2f6bSGordon Ross * Some of the "capability" bits we offer will be copied 345*613a2f6bSGordon Ross * from those offered by the server, with a mask applied. 346*613a2f6bSGordon Ross * This is the mask of capabilies copied from the server. 347*613a2f6bSGordon Ross * Some others get special handling below. 348*613a2f6bSGordon Ross */ 349*613a2f6bSGordon Ross static const uint32_t caps_mask = 350*613a2f6bSGordon Ross SMB_CAP_UNICODE | 351*613a2f6bSGordon Ross SMB_CAP_LARGE_FILES | 352*613a2f6bSGordon Ross SMB_CAP_NT_SMBS | 353*613a2f6bSGordon Ross SMB_CAP_STATUS32 | 354*613a2f6bSGordon Ross SMB_CAP_EXT_SECURITY; 355*613a2f6bSGordon Ross 356*613a2f6bSGordon Ross caps = ctx->ct_sopt.sv_caps & caps_mask; 357*613a2f6bSGordon Ross uc = ctx->ct_hflags2 & SMB_FLAGS2_UNICODE; 358*613a2f6bSGordon Ross 359*613a2f6bSGordon Ross err = smb_rq_init(ctx, SMB_COM_SESSION_SETUP_ANDX, &rqp); 360*613a2f6bSGordon Ross if (err) 361*613a2f6bSGordon Ross goto out; 362*613a2f6bSGordon Ross 363*613a2f6bSGordon Ross /* 364*613a2f6bSGordon Ross * Build the SMB request. 365*613a2f6bSGordon Ross */ 366*613a2f6bSGordon Ross mbp = &rqp->rq_rq; 367*613a2f6bSGordon Ross smb_rq_wstart(rqp); 368*613a2f6bSGordon Ross mb_put_uint16le(mbp, 0xff); /* 0: AndXCommand */ 369*613a2f6bSGordon Ross mb_put_uint16le(mbp, 0); /* 1: AndXOffset */ 370*613a2f6bSGordon Ross mb_put_uint16le(mbp, sv->sv_maxtx); /* 2: MaxBufferSize */ 371*613a2f6bSGordon Ross mb_put_uint16le(mbp, sv->sv_maxmux); /* 3: MaxMpxCount */ 372*613a2f6bSGordon Ross mb_put_uint16le(mbp, 1); /* 4: VcNumber */ 373*613a2f6bSGordon Ross mb_put_uint32le(mbp, sv->sv_skey); /* 5,6: Session Key */ 374*613a2f6bSGordon Ross 375*613a2f6bSGordon Ross if (caps & SMB_CAP_EXT_SECURITY) { 376*613a2f6bSGordon Ross len1 = mbc1 ? mbc1->mb_count : 0; 377*613a2f6bSGordon Ross mb_put_uint16le(mbp, len1); /* 7: Sec. Blob Len */ 378*613a2f6bSGordon Ross mb_put_uint32le(mbp, 0); /* 8,9: reserved */ 379*613a2f6bSGordon Ross mb_put_uint32le(mbp, caps); /* 10,11: Capabilities */ 380*613a2f6bSGordon Ross smb_rq_wend(rqp); /* 12: Byte Count */ 381*613a2f6bSGordon Ross smb_rq_bstart(rqp); 382*613a2f6bSGordon Ross if (mbc1 && mbc1->mb_top) { 383*613a2f6bSGordon Ross mb_put_mbuf(mbp, mbc1->mb_top); /* sec. blob */ 384*613a2f6bSGordon Ross mbc1->mb_top = NULL; /* consumed */ 385*613a2f6bSGordon Ross } 386*613a2f6bSGordon Ross /* mbc2 is required below */ 387*613a2f6bSGordon Ross if (mbc2 == NULL) { 388*613a2f6bSGordon Ross err = EINVAL; 389*613a2f6bSGordon Ross goto out; 390*613a2f6bSGordon Ross } 391*613a2f6bSGordon Ross } else { 392*613a2f6bSGordon Ross len1 = mbc1 ? mbc1->mb_count : 0; 393*613a2f6bSGordon Ross len2 = mbc2 ? mbc2->mb_count : 0; 394*613a2f6bSGordon Ross mb_put_uint16le(mbp, len1); /* 7: LM pass. len */ 395*613a2f6bSGordon Ross mb_put_uint16le(mbp, len2); /* 8: NT pass. len */ 396*613a2f6bSGordon Ross mb_put_uint32le(mbp, 0); /* 9,10: reserved */ 397*613a2f6bSGordon Ross mb_put_uint32le(mbp, caps); /* 11,12: Capabilities */ 398*613a2f6bSGordon Ross smb_rq_wend(rqp); /* 13: Byte Count */ 399*613a2f6bSGordon Ross smb_rq_bstart(rqp); 400*613a2f6bSGordon Ross if (mbc1 && mbc1->mb_top) { 401*613a2f6bSGordon Ross mb_put_mbuf(mbp, mbc1->mb_top); /* LM password */ 402*613a2f6bSGordon Ross mbc1->mb_top = NULL; /* consumed */ 403*613a2f6bSGordon Ross } 404*613a2f6bSGordon Ross if (mbc2 && mbc2->mb_top) { 405*613a2f6bSGordon Ross mb_put_mbuf(mbp, mbc2->mb_top); /* NT password */ 406*613a2f6bSGordon Ross mbc2->mb_top = NULL; /* consumed */ 407*613a2f6bSGordon Ross } 408*613a2f6bSGordon Ross mb_put_dstring(mbp, ctx->ct_user, uc); 409*613a2f6bSGordon Ross mb_put_dstring(mbp, ctx->ct_domain, uc); 410*613a2f6bSGordon Ross } 411*613a2f6bSGordon Ross mb_put_dstring(mbp, NativeOS, uc); 412*613a2f6bSGordon Ross mb_put_dstring(mbp, LanMan, uc); 413*613a2f6bSGordon Ross smb_rq_bend(rqp); 414*613a2f6bSGordon Ross 415*613a2f6bSGordon Ross err = smb_rq_internal(ctx, rqp); 416*613a2f6bSGordon Ross if (err) 417*613a2f6bSGordon Ross goto out; 418*613a2f6bSGordon Ross 419*613a2f6bSGordon Ross if (statusp) 420*613a2f6bSGordon Ross *statusp = rqp->rq_status; 421*613a2f6bSGordon Ross 422*613a2f6bSGordon Ross /* 423*613a2f6bSGordon Ross * If we have a real error, the response probably has 424*613a2f6bSGordon Ross * no more data, so don't try to parse any more. 425*613a2f6bSGordon Ross * Note: err=0, means rq_status is valid. 426*613a2f6bSGordon Ross */ 427*613a2f6bSGordon Ross if (rqp->rq_status != 0 && 428*613a2f6bSGordon Ross rqp->rq_status != STATUS_MORE_PROCESSING_REQUIRED) { 429*613a2f6bSGordon Ross goto out; 430*613a2f6bSGordon Ross } 431*613a2f6bSGordon Ross 432*613a2f6bSGordon Ross /* 433*613a2f6bSGordon Ross * Parse the reply 434*613a2f6bSGordon Ross */ 435*613a2f6bSGordon Ross uc = rqp->rq_hflags2 & SMB_FLAGS2_UNICODE; 436*613a2f6bSGordon Ross is->is_smbuid = rqp->rq_uid; 437*613a2f6bSGordon Ross mbp = &rqp->rq_rp; 438*613a2f6bSGordon Ross 439*613a2f6bSGordon Ross err = mb_get_uint8(mbp, &wc); 440*613a2f6bSGordon Ross if (err) 441*613a2f6bSGordon Ross goto out; 442*613a2f6bSGordon Ross 443*613a2f6bSGordon Ross err = EBADRPC; /* for any problems in this section */ 444*613a2f6bSGordon Ross if (caps & SMB_CAP_EXT_SECURITY) { 445*613a2f6bSGordon Ross if (wc != 4) 446*613a2f6bSGordon Ross goto out; 447*613a2f6bSGordon Ross mb_get_uint16le(mbp, NULL); /* secondary cmd */ 448*613a2f6bSGordon Ross mb_get_uint16le(mbp, NULL); /* andxoffset */ 449*613a2f6bSGordon Ross mb_get_uint16le(mbp, actionp); /* action */ 450*613a2f6bSGordon Ross mb_get_uint16le(mbp, &sblen); /* sec. blob len */ 451*613a2f6bSGordon Ross mb_get_uint16le(mbp, &bc); /* byte count */ 452*613a2f6bSGordon Ross /* 453*613a2f6bSGordon Ross * Get the security blob, after 454*613a2f6bSGordon Ross * sanity-checking the length. 455*613a2f6bSGordon Ross */ 456*613a2f6bSGordon Ross if (sblen == 0 || bc < sblen) 457*613a2f6bSGordon Ross goto out; 458*613a2f6bSGordon Ross err = mb_get_mbuf(mbp, sblen, &m); 459*613a2f6bSGordon Ross if (err) 460*613a2f6bSGordon Ross goto out; 461*613a2f6bSGordon Ross mb_initm(mbc2, m); 462*613a2f6bSGordon Ross mbc2->mb_count = sblen; 463*613a2f6bSGordon Ross } else { 464*613a2f6bSGordon Ross if (wc != 3) 465*613a2f6bSGordon Ross goto out; 466*613a2f6bSGordon Ross mb_get_uint16le(mbp, NULL); /* secondary cmd */ 467*613a2f6bSGordon Ross mb_get_uint16le(mbp, NULL); /* andxoffset */ 468*613a2f6bSGordon Ross mb_get_uint16le(mbp, actionp); /* action */ 469*613a2f6bSGordon Ross err = mb_get_uint16le(mbp, &bc); /* byte count */ 470*613a2f6bSGordon Ross if (err) 471*613a2f6bSGordon Ross goto out; 472*613a2f6bSGordon Ross } 473*613a2f6bSGordon Ross 474*613a2f6bSGordon Ross /* 475*613a2f6bSGordon Ross * Native OS, LANMGR, & Domain follow here. 476*613a2f6bSGordon Ross * Parse these strings and store for later. 477*613a2f6bSGordon Ross * If unicode, they should be aligned. 478*613a2f6bSGordon Ross * 479*613a2f6bSGordon Ross * Note that with Extended security, we may use 480*613a2f6bSGordon Ross * multiple calls to this function. Only parse 481*613a2f6bSGordon Ross * these strings on the last one (status == 0). 482*613a2f6bSGordon Ross * Ditto for the CAP_LARGE work-around. 483*613a2f6bSGordon Ross */ 484*613a2f6bSGordon Ross if (rqp->rq_status != 0) 485*613a2f6bSGordon Ross goto out; 486*613a2f6bSGordon Ross 487*613a2f6bSGordon Ross /* Ignore any parsing errors for these strings. */ 488*613a2f6bSGordon Ross err = mb_get_string(mbp, &ctx->ct_srv_OS, uc); 489*613a2f6bSGordon Ross DPRINT("server OS: %s", err ? "?" : ctx->ct_srv_OS); 490*613a2f6bSGordon Ross err = mb_get_string(mbp, &ctx->ct_srv_LM, uc); 491*613a2f6bSGordon Ross DPRINT("server LM: %s", err ? "?" : ctx->ct_srv_LM); 492*613a2f6bSGordon Ross /* 493*613a2f6bSGordon Ross * There's sometimes a server domain folloing 494*613a2f6bSGordon Ross * at this point, but we don't need it. 495*613a2f6bSGordon Ross */ 496*613a2f6bSGordon Ross 497*613a2f6bSGordon Ross /* Success! (See Ignore any ... above) */ 498*613a2f6bSGordon Ross err = 0; 499*613a2f6bSGordon Ross 500*613a2f6bSGordon Ross /* 501*613a2f6bSGordon Ross * Windows systems don't suport CAP_LARGE_READX,WRITEX 502*613a2f6bSGordon Ross * when signing is enabled, so adjust sv_caps. 503*613a2f6bSGordon Ross */ 504*613a2f6bSGordon Ross if (ctx->ct_srv_OS && 505*613a2f6bSGordon Ross 0 == strncmp(ctx->ct_srv_OS, "Windows ", 8)) { 506*613a2f6bSGordon Ross DPRINT("Server is Windows"); 507*613a2f6bSGordon Ross if (ctx->ct_vcflags & SMBV_WILL_SIGN) { 508*613a2f6bSGordon Ross DPRINT("disable CAP_LARGE_(r/w)"); 509*613a2f6bSGordon Ross ctx->ct_sopt.sv_caps &= 510*613a2f6bSGordon Ross ~(SMB_CAP_LARGE_READX | SMB_CAP_LARGE_WRITEX); 511*613a2f6bSGordon Ross } 512*613a2f6bSGordon Ross } 513*613a2f6bSGordon Ross 514*613a2f6bSGordon Ross out: 515*613a2f6bSGordon Ross if (rqp) 516*613a2f6bSGordon Ross smb_rq_done(rqp); 517*613a2f6bSGordon Ross 518*613a2f6bSGordon Ross return (err); 519*613a2f6bSGordon Ross } 520