xref: /titanic_54/usr/src/lib/libsmbfs/smb/ssnsetup.c (revision 613a2f6ba31e891e3d947a356daf5e563d43c1ce)
1*613a2f6bSGordon Ross /*
2*613a2f6bSGordon Ross  * Copyright (c) 2000-2001 Boris Popov
3*613a2f6bSGordon Ross  * All rights reserved.
4*613a2f6bSGordon Ross  *
5*613a2f6bSGordon Ross  * Redistribution and use in source and binary forms, with or without
6*613a2f6bSGordon Ross  * modification, are permitted provided that the following conditions
7*613a2f6bSGordon Ross  * are met:
8*613a2f6bSGordon Ross  * 1. Redistributions of source code must retain the above copyright
9*613a2f6bSGordon Ross  *    notice, this list of conditions and the following disclaimer.
10*613a2f6bSGordon Ross  * 2. Redistributions in binary form must reproduce the above copyright
11*613a2f6bSGordon Ross  *    notice, this list of conditions and the following disclaimer in the
12*613a2f6bSGordon Ross  *    documentation and/or other materials provided with the distribution.
13*613a2f6bSGordon Ross  * 3. All advertising materials mentioning features or use of this software
14*613a2f6bSGordon Ross  *    must display the following acknowledgement:
15*613a2f6bSGordon Ross  *    This product includes software developed by Boris Popov.
16*613a2f6bSGordon Ross  * 4. Neither the name of the author nor the names of any co-contributors
17*613a2f6bSGordon Ross  *    may be used to endorse or promote products derived from this software
18*613a2f6bSGordon Ross  *    without specific prior written permission.
19*613a2f6bSGordon Ross  *
20*613a2f6bSGordon Ross  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
21*613a2f6bSGordon Ross  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22*613a2f6bSGordon Ross  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23*613a2f6bSGordon Ross  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
24*613a2f6bSGordon Ross  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25*613a2f6bSGordon Ross  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26*613a2f6bSGordon Ross  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27*613a2f6bSGordon Ross  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28*613a2f6bSGordon Ross  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29*613a2f6bSGordon Ross  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30*613a2f6bSGordon Ross  * SUCH DAMAGE.
31*613a2f6bSGordon Ross  */
32*613a2f6bSGordon Ross 
33*613a2f6bSGordon Ross /*
34*613a2f6bSGordon Ross  * Copyright 2009 Sun Microsystems, Inc.  All rights reserved.
35*613a2f6bSGordon Ross  * Use is subject to license terms.
36*613a2f6bSGordon Ross  */
37*613a2f6bSGordon Ross 
38*613a2f6bSGordon Ross /*
39*613a2f6bSGordon Ross  * SMB Session Setup, and related.
40*613a2f6bSGordon Ross  * Copied from the driver: smb_smb.c
41*613a2f6bSGordon Ross  */
42*613a2f6bSGordon Ross 
43*613a2f6bSGordon Ross #include <errno.h>
44*613a2f6bSGordon Ross #include <stdio.h>
45*613a2f6bSGordon Ross #include <stdlib.h>
46*613a2f6bSGordon Ross #include <unistd.h>
47*613a2f6bSGordon Ross #include <strings.h>
48*613a2f6bSGordon Ross #include <netdb.h>
49*613a2f6bSGordon Ross #include <libintl.h>
50*613a2f6bSGordon Ross #include <xti.h>
51*613a2f6bSGordon Ross #include <assert.h>
52*613a2f6bSGordon Ross 
53*613a2f6bSGordon Ross #include <sys/types.h>
54*613a2f6bSGordon Ross #include <sys/time.h>
55*613a2f6bSGordon Ross #include <sys/byteorder.h>
56*613a2f6bSGordon Ross #include <sys/socket.h>
57*613a2f6bSGordon Ross #include <sys/fcntl.h>
58*613a2f6bSGordon Ross 
59*613a2f6bSGordon Ross #include <netinet/in.h>
60*613a2f6bSGordon Ross #include <netinet/tcp.h>
61*613a2f6bSGordon Ross #include <arpa/inet.h>
62*613a2f6bSGordon Ross 
63*613a2f6bSGordon Ross #include <netsmb/mchain.h>
64*613a2f6bSGordon Ross #include <netsmb/netbios.h>
65*613a2f6bSGordon Ross #include <netsmb/smb_dev.h>
66*613a2f6bSGordon Ross #include <netsmb/smb.h>
67*613a2f6bSGordon Ross 
68*613a2f6bSGordon Ross #include <netsmb/smb_lib.h>
69*613a2f6bSGordon Ross #include <netsmb/nb_lib.h>
70*613a2f6bSGordon Ross 
71*613a2f6bSGordon Ross #include "private.h"
72*613a2f6bSGordon Ross #include "charsets.h"
73*613a2f6bSGordon Ross #include "ntlm.h"
74*613a2f6bSGordon Ross #include "smb_crypt.h"
75*613a2f6bSGordon Ross 
76*613a2f6bSGordon Ross /*
77*613a2f6bSGordon Ross  * When we have a _real_ ntstatus.h, eliminate this.
78*613a2f6bSGordon Ross  * XXX: Current smb.h defines it without the high bits.
79*613a2f6bSGordon Ross  */
80*613a2f6bSGordon Ross #define	STATUS_MORE_PROCESSING_REQUIRED 0xC0000016
81*613a2f6bSGordon Ross 
82*613a2f6bSGordon Ross static int
83*613a2f6bSGordon Ross smb__ssnsetup(struct smb_ctx *ctx,
84*613a2f6bSGordon Ross 	struct mbdata *mbc1, struct mbdata *mbc2,
85*613a2f6bSGordon Ross 	uint32_t *statusp, uint16_t *actionp);
86*613a2f6bSGordon Ross 
87*613a2f6bSGordon Ross /*
88*613a2f6bSGordon Ross  * Session Setup: NULL session (anonymous)
89*613a2f6bSGordon Ross  */
90*613a2f6bSGordon Ross int
91*613a2f6bSGordon Ross smb_ssnsetup_null(struct smb_ctx *ctx)
92*613a2f6bSGordon Ross {
93*613a2f6bSGordon Ross 	int err;
94*613a2f6bSGordon Ross 	uint32_t ntstatus;
95*613a2f6bSGordon Ross 	uint16_t action = 0;
96*613a2f6bSGordon Ross 
97*613a2f6bSGordon Ross 	if (ctx->ct_sopt.sv_caps & SMB_CAP_EXT_SECURITY) {
98*613a2f6bSGordon Ross 		/* Should not get here with... */
99*613a2f6bSGordon Ross 		err = EINVAL;
100*613a2f6bSGordon Ross 		goto out;
101*613a2f6bSGordon Ross 	}
102*613a2f6bSGordon Ross 
103*613a2f6bSGordon Ross 	err = smb__ssnsetup(ctx, NULL, NULL, &ntstatus, &action);
104*613a2f6bSGordon Ross 	if (err)
105*613a2f6bSGordon Ross 		goto out;
106*613a2f6bSGordon Ross 
107*613a2f6bSGordon Ross 	DPRINT("status 0x%x action 0x%x", ntstatus, (int)action);
108*613a2f6bSGordon Ross 	if (ntstatus != 0)
109*613a2f6bSGordon Ross 		err = EAUTH;
110*613a2f6bSGordon Ross 
111*613a2f6bSGordon Ross out:
112*613a2f6bSGordon Ross 	return (err);
113*613a2f6bSGordon Ross }
114*613a2f6bSGordon Ross 
115*613a2f6bSGordon Ross 
116*613a2f6bSGordon Ross /*
117*613a2f6bSGordon Ross  * SMB Session Setup, using NTLMv1 (and maybe LMv1)
118*613a2f6bSGordon Ross  */
119*613a2f6bSGordon Ross int
120*613a2f6bSGordon Ross smb_ssnsetup_ntlm1(struct smb_ctx *ctx)
121*613a2f6bSGordon Ross {
122*613a2f6bSGordon Ross 	struct mbdata lm_mbc, nt_mbc;
123*613a2f6bSGordon Ross 	int err;
124*613a2f6bSGordon Ross 	uint32_t ntstatus;
125*613a2f6bSGordon Ross 	uint16_t action = 0;
126*613a2f6bSGordon Ross 
127*613a2f6bSGordon Ross 	if (ctx->ct_sopt.sv_caps & SMB_CAP_EXT_SECURITY) {
128*613a2f6bSGordon Ross 		/* Should not get here with... */
129*613a2f6bSGordon Ross 		err = EINVAL;
130*613a2f6bSGordon Ross 		goto out;
131*613a2f6bSGordon Ross 	}
132*613a2f6bSGordon Ross 
133*613a2f6bSGordon Ross 	/* Make mb_done calls at out safe. */
134*613a2f6bSGordon Ross 	bzero(&lm_mbc, sizeof (lm_mbc));
135*613a2f6bSGordon Ross 	bzero(&nt_mbc, sizeof (nt_mbc));
136*613a2f6bSGordon Ross 
137*613a2f6bSGordon Ross 	/* Put the LM,NTLM responses (as mbdata). */
138*613a2f6bSGordon Ross 	err = ntlm_put_v1_responses(ctx, &lm_mbc, &nt_mbc);
139*613a2f6bSGordon Ross 	if (err)
140*613a2f6bSGordon Ross 		goto out;
141*613a2f6bSGordon Ross 
142*613a2f6bSGordon Ross 	/*
143*613a2f6bSGordon Ross 	 * If we negotiated signing, compute the MAC key
144*613a2f6bSGordon Ross 	 * and start signing messages, but only on the
145*613a2f6bSGordon Ross 	 * first non-null session login.
146*613a2f6bSGordon Ross 	 */
147*613a2f6bSGordon Ross 	if ((ctx->ct_vcflags & SMBV_WILL_SIGN) &&
148*613a2f6bSGordon Ross 	    (ctx->ct_hflags2 & SMB_FLAGS2_SECURITY_SIGNATURE) == 0) {
149*613a2f6bSGordon Ross 		struct mbuf *m = nt_mbc.mb_top;
150*613a2f6bSGordon Ross 		char *p;
151*613a2f6bSGordon Ross 
152*613a2f6bSGordon Ross 		/*
153*613a2f6bSGordon Ross 		 * MAC_key = concat(session_key, nt_response)
154*613a2f6bSGordon Ross 		 */
155*613a2f6bSGordon Ross 		ctx->ct_mackeylen = NTLM_HASH_SZ + m->m_len;
156*613a2f6bSGordon Ross 		ctx->ct_mackey = malloc(ctx->ct_mackeylen);
157*613a2f6bSGordon Ross 		if (ctx->ct_mackey == NULL) {
158*613a2f6bSGordon Ross 			ctx->ct_mackeylen = 0;
159*613a2f6bSGordon Ross 			err = ENOMEM;
160*613a2f6bSGordon Ross 			goto out;
161*613a2f6bSGordon Ross 		}
162*613a2f6bSGordon Ross 		p = ctx->ct_mackey;
163*613a2f6bSGordon Ross 		memcpy(p, ctx->ct_ssn_key, NTLM_HASH_SZ);
164*613a2f6bSGordon Ross 		memcpy(p + NTLM_HASH_SZ, m->m_data, m->m_len);
165*613a2f6bSGordon Ross 
166*613a2f6bSGordon Ross 		/* OK, start signing! */
167*613a2f6bSGordon Ross 		ctx->ct_hflags2 |= SMB_FLAGS2_SECURITY_SIGNATURE;
168*613a2f6bSGordon Ross 	}
169*613a2f6bSGordon Ross 
170*613a2f6bSGordon Ross 	err = smb__ssnsetup(ctx, &lm_mbc, &nt_mbc, &ntstatus, &action);
171*613a2f6bSGordon Ross 	if (err)
172*613a2f6bSGordon Ross 		goto out;
173*613a2f6bSGordon Ross 
174*613a2f6bSGordon Ross 	DPRINT("status 0x%x action 0x%x", ntstatus, (int)action);
175*613a2f6bSGordon Ross 	if (ntstatus != 0)
176*613a2f6bSGordon Ross 		err = EAUTH;
177*613a2f6bSGordon Ross 
178*613a2f6bSGordon Ross out:
179*613a2f6bSGordon Ross 	mb_done(&lm_mbc);
180*613a2f6bSGordon Ross 	mb_done(&nt_mbc);
181*613a2f6bSGordon Ross 
182*613a2f6bSGordon Ross 	return (err);
183*613a2f6bSGordon Ross }
184*613a2f6bSGordon Ross 
185*613a2f6bSGordon Ross /*
186*613a2f6bSGordon Ross  * SMB Session Setup, using NTLMv2 (and LMv2)
187*613a2f6bSGordon Ross  */
188*613a2f6bSGordon Ross int
189*613a2f6bSGordon Ross smb_ssnsetup_ntlm2(struct smb_ctx *ctx)
190*613a2f6bSGordon Ross {
191*613a2f6bSGordon Ross 	struct mbdata lm_mbc, nt_mbc, ti_mbc;
192*613a2f6bSGordon Ross 	int err;
193*613a2f6bSGordon Ross 	uint32_t ntstatus;
194*613a2f6bSGordon Ross 	uint16_t action = 0;
195*613a2f6bSGordon Ross 
196*613a2f6bSGordon Ross 	if (ctx->ct_sopt.sv_caps & SMB_CAP_EXT_SECURITY) {
197*613a2f6bSGordon Ross 		/* Should not get here with... */
198*613a2f6bSGordon Ross 		err = EINVAL;
199*613a2f6bSGordon Ross 		goto out;
200*613a2f6bSGordon Ross 	}
201*613a2f6bSGordon Ross 
202*613a2f6bSGordon Ross 	/* Make mb_done calls at out safe. */
203*613a2f6bSGordon Ross 	bzero(&lm_mbc, sizeof (lm_mbc));
204*613a2f6bSGordon Ross 	bzero(&nt_mbc, sizeof (nt_mbc));
205*613a2f6bSGordon Ross 	bzero(&ti_mbc, sizeof (ti_mbc));
206*613a2f6bSGordon Ross 
207*613a2f6bSGordon Ross 	/* Build the NTLMv2 "target info" blob (as mbdata) */
208*613a2f6bSGordon Ross 	err = ntlm_build_target_info(ctx, NULL, &ti_mbc);
209*613a2f6bSGordon Ross 	if (err)
210*613a2f6bSGordon Ross 		goto out;
211*613a2f6bSGordon Ross 
212*613a2f6bSGordon Ross 	/* Put the LMv2, NTLMv2 responses (as mbdata). */
213*613a2f6bSGordon Ross 	err = ntlm_put_v2_responses(ctx, &ti_mbc, &lm_mbc, &nt_mbc);
214*613a2f6bSGordon Ross 	if (err)
215*613a2f6bSGordon Ross 		goto out;
216*613a2f6bSGordon Ross 
217*613a2f6bSGordon Ross 	/*
218*613a2f6bSGordon Ross 	 * If we negotiated signing, compute the MAC key
219*613a2f6bSGordon Ross 	 * and start signing messages, but only on the
220*613a2f6bSGordon Ross 	 * first non-null session login.
221*613a2f6bSGordon Ross 	 */
222*613a2f6bSGordon Ross 	if ((ctx->ct_vcflags & SMBV_WILL_SIGN) &&
223*613a2f6bSGordon Ross 	    (ctx->ct_hflags2 & SMB_FLAGS2_SECURITY_SIGNATURE) == 0) {
224*613a2f6bSGordon Ross 		struct mbuf *m = nt_mbc.mb_top;
225*613a2f6bSGordon Ross 		char *p;
226*613a2f6bSGordon Ross 
227*613a2f6bSGordon Ross 		/*
228*613a2f6bSGordon Ross 		 * MAC_key = concat(session_key, nt_response)
229*613a2f6bSGordon Ross 		 */
230*613a2f6bSGordon Ross 		ctx->ct_mackeylen = NTLM_HASH_SZ + m->m_len;
231*613a2f6bSGordon Ross 		ctx->ct_mackey = malloc(ctx->ct_mackeylen);
232*613a2f6bSGordon Ross 		if (ctx->ct_mackey == NULL) {
233*613a2f6bSGordon Ross 			ctx->ct_mackeylen = 0;
234*613a2f6bSGordon Ross 			err = ENOMEM;
235*613a2f6bSGordon Ross 			goto out;
236*613a2f6bSGordon Ross 		}
237*613a2f6bSGordon Ross 		p = ctx->ct_mackey;
238*613a2f6bSGordon Ross 		memcpy(p, ctx->ct_ssn_key, NTLM_HASH_SZ);
239*613a2f6bSGordon Ross 		memcpy(p + NTLM_HASH_SZ, m->m_data, m->m_len);
240*613a2f6bSGordon Ross 
241*613a2f6bSGordon Ross 		/* OK, start signing! */
242*613a2f6bSGordon Ross 		ctx->ct_hflags2 |= SMB_FLAGS2_SECURITY_SIGNATURE;
243*613a2f6bSGordon Ross 	}
244*613a2f6bSGordon Ross 
245*613a2f6bSGordon Ross 	err = smb__ssnsetup(ctx, &lm_mbc, &nt_mbc, &ntstatus, &action);
246*613a2f6bSGordon Ross 	if (err)
247*613a2f6bSGordon Ross 		goto out;
248*613a2f6bSGordon Ross 
249*613a2f6bSGordon Ross 	DPRINT("status 0x%x action 0x%x", ntstatus, (int)action);
250*613a2f6bSGordon Ross 	if (ntstatus != 0)
251*613a2f6bSGordon Ross 		err = EAUTH;
252*613a2f6bSGordon Ross 
253*613a2f6bSGordon Ross out:
254*613a2f6bSGordon Ross 	mb_done(&ti_mbc);
255*613a2f6bSGordon Ross 	mb_done(&lm_mbc);
256*613a2f6bSGordon Ross 	mb_done(&nt_mbc);
257*613a2f6bSGordon Ross 
258*613a2f6bSGordon Ross 	return (err);
259*613a2f6bSGordon Ross }
260*613a2f6bSGordon Ross 
261*613a2f6bSGordon Ross int
262*613a2f6bSGordon Ross smb_ssnsetup_spnego(struct smb_ctx *ctx, struct mbdata *hint_mb)
263*613a2f6bSGordon Ross {
264*613a2f6bSGordon Ross 	struct mbdata send_mb, recv_mb;
265*613a2f6bSGordon Ross 	int		err;
266*613a2f6bSGordon Ross 	uint32_t	ntstatus;
267*613a2f6bSGordon Ross 	uint16_t	action = 0;
268*613a2f6bSGordon Ross 
269*613a2f6bSGordon Ross 	err = ssp_ctx_create_client(ctx, hint_mb);
270*613a2f6bSGordon Ross 	if (err)
271*613a2f6bSGordon Ross 		goto out;
272*613a2f6bSGordon Ross 
273*613a2f6bSGordon Ross 	bzero(&send_mb, sizeof (send_mb));
274*613a2f6bSGordon Ross 	bzero(&recv_mb, sizeof (recv_mb));
275*613a2f6bSGordon Ross 
276*613a2f6bSGordon Ross 	/* NULL input indicates first call. */
277*613a2f6bSGordon Ross 	err = ssp_ctx_next_token(ctx, NULL, &send_mb);
278*613a2f6bSGordon Ross 	if (err)
279*613a2f6bSGordon Ross 		goto out;
280*613a2f6bSGordon Ross 
281*613a2f6bSGordon Ross 	for (;;) {
282*613a2f6bSGordon Ross 		err = smb__ssnsetup(ctx, &send_mb, &recv_mb,
283*613a2f6bSGordon Ross 		    &ntstatus, &action);
284*613a2f6bSGordon Ross 		if (err)
285*613a2f6bSGordon Ross 			goto out;
286*613a2f6bSGordon Ross 		if (ntstatus == 0)
287*613a2f6bSGordon Ross 			break; /* normal loop termination */
288*613a2f6bSGordon Ross 		if (ntstatus != STATUS_MORE_PROCESSING_REQUIRED) {
289*613a2f6bSGordon Ross 			err = EAUTH;
290*613a2f6bSGordon Ross 			break;
291*613a2f6bSGordon Ross 		}
292*613a2f6bSGordon Ross 
293*613a2f6bSGordon Ross 		/* middle calls get both in, out */
294*613a2f6bSGordon Ross 		err = ssp_ctx_next_token(ctx, &recv_mb, &send_mb);
295*613a2f6bSGordon Ross 		if (err)
296*613a2f6bSGordon Ross 			goto out;
297*613a2f6bSGordon Ross 	}
298*613a2f6bSGordon Ross 	DPRINT("status 0x%x action 0x%x", ntstatus, (int)action);
299*613a2f6bSGordon Ross 
300*613a2f6bSGordon Ross 	/* NULL output indicates last call. */
301*613a2f6bSGordon Ross 	(void) ssp_ctx_next_token(ctx, &recv_mb, NULL);
302*613a2f6bSGordon Ross 
303*613a2f6bSGordon Ross out:
304*613a2f6bSGordon Ross 	ssp_ctx_destroy(ctx);
305*613a2f6bSGordon Ross 
306*613a2f6bSGordon Ross 	return (err);
307*613a2f6bSGordon Ross }
308*613a2f6bSGordon Ross 
309*613a2f6bSGordon Ross /*
310*613a2f6bSGordon Ross  * Session Setup function used for all the forms we support.
311*613a2f6bSGordon Ross  * To allow this sharing, the crypto stuff is computed by
312*613a2f6bSGordon Ross  * callers and passed in as mbdata chains.  Also, the args
313*613a2f6bSGordon Ross  * have different meanings for extended security vs. old.
314*613a2f6bSGordon Ross  * Some may be used as either IN or OUT parameters.
315*613a2f6bSGordon Ross  *
316*613a2f6bSGordon Ross  * For NTLM (v1, v2), all parameters are inputs
317*613a2f6bSGordon Ross  * 	mbc1: [in] LM password hash
318*613a2f6bSGordon Ross  * 	mbc2: [in] NT password hash
319*613a2f6bSGordon Ross  * For Extended security (spnego)
320*613a2f6bSGordon Ross  *	mbc1: [in]  outgoing blob data
321*613a2f6bSGordon Ross  *	mbc2: [out] received blob data
322*613a2f6bSGordon Ross  * For both forms, these are optional:
323*613a2f6bSGordon Ross  *	statusp: [out] NT status
324*613a2f6bSGordon Ross  *	actionp: [out] Logon Action (i.e. SMB_ACT_GUEST)
325*613a2f6bSGordon Ross  */
326*613a2f6bSGordon Ross static int
327*613a2f6bSGordon Ross smb__ssnsetup(struct smb_ctx *ctx,
328*613a2f6bSGordon Ross 	struct mbdata *mbc1, struct mbdata *mbc2,
329*613a2f6bSGordon Ross 	uint32_t *statusp, uint16_t *actionp)
330*613a2f6bSGordon Ross {
331*613a2f6bSGordon Ross 	static const char NativeOS[] = "Solaris";
332*613a2f6bSGordon Ross 	static const char LanMan[] = "NETSMB";
333*613a2f6bSGordon Ross 	struct smb_sopt *sv = &ctx->ct_sopt;
334*613a2f6bSGordon Ross 	struct smb_iods *is = &ctx->ct_iods;
335*613a2f6bSGordon Ross 	struct smb_rq	*rqp = NULL;
336*613a2f6bSGordon Ross 	struct mbdata	*mbp;
337*613a2f6bSGordon Ross 	struct mbuf	*m;
338*613a2f6bSGordon Ross 	int err, uc;
339*613a2f6bSGordon Ross 	uint32_t caps;
340*613a2f6bSGordon Ross 	uint16_t bc, len1, len2, sblen;
341*613a2f6bSGordon Ross 	uint8_t wc;
342*613a2f6bSGordon Ross 
343*613a2f6bSGordon Ross 	/*
344*613a2f6bSGordon Ross 	 * Some of the "capability" bits we offer will be copied
345*613a2f6bSGordon Ross 	 * from those offered by the server, with a mask applied.
346*613a2f6bSGordon Ross 	 * This is the mask of capabilies copied from the server.
347*613a2f6bSGordon Ross 	 * Some others get special handling below.
348*613a2f6bSGordon Ross 	 */
349*613a2f6bSGordon Ross 	static const uint32_t caps_mask =
350*613a2f6bSGordon Ross 	    SMB_CAP_UNICODE |
351*613a2f6bSGordon Ross 	    SMB_CAP_LARGE_FILES |
352*613a2f6bSGordon Ross 	    SMB_CAP_NT_SMBS |
353*613a2f6bSGordon Ross 	    SMB_CAP_STATUS32 |
354*613a2f6bSGordon Ross 	    SMB_CAP_EXT_SECURITY;
355*613a2f6bSGordon Ross 
356*613a2f6bSGordon Ross 	caps = ctx->ct_sopt.sv_caps & caps_mask;
357*613a2f6bSGordon Ross 	uc = ctx->ct_hflags2 & SMB_FLAGS2_UNICODE;
358*613a2f6bSGordon Ross 
359*613a2f6bSGordon Ross 	err = smb_rq_init(ctx, SMB_COM_SESSION_SETUP_ANDX, &rqp);
360*613a2f6bSGordon Ross 	if (err)
361*613a2f6bSGordon Ross 		goto out;
362*613a2f6bSGordon Ross 
363*613a2f6bSGordon Ross 	/*
364*613a2f6bSGordon Ross 	 * Build the SMB request.
365*613a2f6bSGordon Ross 	 */
366*613a2f6bSGordon Ross 	mbp = &rqp->rq_rq;
367*613a2f6bSGordon Ross 	smb_rq_wstart(rqp);
368*613a2f6bSGordon Ross 	mb_put_uint16le(mbp, 0xff);		/* 0: AndXCommand */
369*613a2f6bSGordon Ross 	mb_put_uint16le(mbp, 0);		/* 1: AndXOffset */
370*613a2f6bSGordon Ross 	mb_put_uint16le(mbp, sv->sv_maxtx);	/* 2: MaxBufferSize */
371*613a2f6bSGordon Ross 	mb_put_uint16le(mbp, sv->sv_maxmux);	/* 3: MaxMpxCount */
372*613a2f6bSGordon Ross 	mb_put_uint16le(mbp, 1);		/* 4: VcNumber */
373*613a2f6bSGordon Ross 	mb_put_uint32le(mbp, sv->sv_skey);	/* 5,6: Session Key */
374*613a2f6bSGordon Ross 
375*613a2f6bSGordon Ross 	if (caps & SMB_CAP_EXT_SECURITY) {
376*613a2f6bSGordon Ross 		len1 = mbc1 ? mbc1->mb_count : 0;
377*613a2f6bSGordon Ross 		mb_put_uint16le(mbp, len1);	/* 7: Sec. Blob Len */
378*613a2f6bSGordon Ross 		mb_put_uint32le(mbp, 0);	/* 8,9: reserved */
379*613a2f6bSGordon Ross 		mb_put_uint32le(mbp, caps);	/* 10,11: Capabilities */
380*613a2f6bSGordon Ross 		smb_rq_wend(rqp);		/* 12: Byte Count */
381*613a2f6bSGordon Ross 		smb_rq_bstart(rqp);
382*613a2f6bSGordon Ross 		if (mbc1 && mbc1->mb_top) {
383*613a2f6bSGordon Ross 			mb_put_mbuf(mbp, mbc1->mb_top);	/* sec. blob */
384*613a2f6bSGordon Ross 			mbc1->mb_top = NULL; /* consumed */
385*613a2f6bSGordon Ross 		}
386*613a2f6bSGordon Ross 		/* mbc2 is required below */
387*613a2f6bSGordon Ross 		if (mbc2 == NULL) {
388*613a2f6bSGordon Ross 			err = EINVAL;
389*613a2f6bSGordon Ross 			goto out;
390*613a2f6bSGordon Ross 		}
391*613a2f6bSGordon Ross 	} else {
392*613a2f6bSGordon Ross 		len1 = mbc1 ? mbc1->mb_count : 0;
393*613a2f6bSGordon Ross 		len2 = mbc2 ? mbc2->mb_count : 0;
394*613a2f6bSGordon Ross 		mb_put_uint16le(mbp, len1);	/* 7: LM pass. len */
395*613a2f6bSGordon Ross 		mb_put_uint16le(mbp, len2);	/* 8: NT pass. len */
396*613a2f6bSGordon Ross 		mb_put_uint32le(mbp, 0);	/* 9,10: reserved */
397*613a2f6bSGordon Ross 		mb_put_uint32le(mbp, caps);	/* 11,12: Capabilities */
398*613a2f6bSGordon Ross 		smb_rq_wend(rqp);		/* 13: Byte Count */
399*613a2f6bSGordon Ross 		smb_rq_bstart(rqp);
400*613a2f6bSGordon Ross 		if (mbc1 && mbc1->mb_top) {
401*613a2f6bSGordon Ross 			mb_put_mbuf(mbp, mbc1->mb_top);	/* LM password */
402*613a2f6bSGordon Ross 			mbc1->mb_top = NULL; /* consumed */
403*613a2f6bSGordon Ross 		}
404*613a2f6bSGordon Ross 		if (mbc2 && mbc2->mb_top) {
405*613a2f6bSGordon Ross 			mb_put_mbuf(mbp, mbc2->mb_top);	/* NT password */
406*613a2f6bSGordon Ross 			mbc2->mb_top = NULL; /* consumed */
407*613a2f6bSGordon Ross 		}
408*613a2f6bSGordon Ross 		mb_put_dstring(mbp, ctx->ct_user, uc);
409*613a2f6bSGordon Ross 		mb_put_dstring(mbp, ctx->ct_domain, uc);
410*613a2f6bSGordon Ross 	}
411*613a2f6bSGordon Ross 	mb_put_dstring(mbp, NativeOS, uc);
412*613a2f6bSGordon Ross 	mb_put_dstring(mbp, LanMan, uc);
413*613a2f6bSGordon Ross 	smb_rq_bend(rqp);
414*613a2f6bSGordon Ross 
415*613a2f6bSGordon Ross 	err = smb_rq_internal(ctx, rqp);
416*613a2f6bSGordon Ross 	if (err)
417*613a2f6bSGordon Ross 		goto out;
418*613a2f6bSGordon Ross 
419*613a2f6bSGordon Ross 	if (statusp)
420*613a2f6bSGordon Ross 		*statusp = rqp->rq_status;
421*613a2f6bSGordon Ross 
422*613a2f6bSGordon Ross 	/*
423*613a2f6bSGordon Ross 	 * If we have a real error, the response probably has
424*613a2f6bSGordon Ross 	 * no more data, so don't try to parse any more.
425*613a2f6bSGordon Ross 	 * Note: err=0, means rq_status is valid.
426*613a2f6bSGordon Ross 	 */
427*613a2f6bSGordon Ross 	if (rqp->rq_status != 0 &&
428*613a2f6bSGordon Ross 	    rqp->rq_status != STATUS_MORE_PROCESSING_REQUIRED) {
429*613a2f6bSGordon Ross 		goto out;
430*613a2f6bSGordon Ross 	}
431*613a2f6bSGordon Ross 
432*613a2f6bSGordon Ross 	/*
433*613a2f6bSGordon Ross 	 * Parse the reply
434*613a2f6bSGordon Ross 	 */
435*613a2f6bSGordon Ross 	uc = rqp->rq_hflags2 & SMB_FLAGS2_UNICODE;
436*613a2f6bSGordon Ross 	is->is_smbuid = rqp->rq_uid;
437*613a2f6bSGordon Ross 	mbp = &rqp->rq_rp;
438*613a2f6bSGordon Ross 
439*613a2f6bSGordon Ross 	err = mb_get_uint8(mbp, &wc);
440*613a2f6bSGordon Ross 	if (err)
441*613a2f6bSGordon Ross 		goto out;
442*613a2f6bSGordon Ross 
443*613a2f6bSGordon Ross 	err = EBADRPC; /* for any problems in this section */
444*613a2f6bSGordon Ross 	if (caps & SMB_CAP_EXT_SECURITY) {
445*613a2f6bSGordon Ross 		if (wc != 4)
446*613a2f6bSGordon Ross 			goto out;
447*613a2f6bSGordon Ross 		mb_get_uint16le(mbp, NULL);	/* secondary cmd */
448*613a2f6bSGordon Ross 		mb_get_uint16le(mbp, NULL);	/* andxoffset */
449*613a2f6bSGordon Ross 		mb_get_uint16le(mbp, actionp);	/* action */
450*613a2f6bSGordon Ross 		mb_get_uint16le(mbp, &sblen);	/* sec. blob len */
451*613a2f6bSGordon Ross 		mb_get_uint16le(mbp, &bc);	/* byte count */
452*613a2f6bSGordon Ross 		/*
453*613a2f6bSGordon Ross 		 * Get the security blob, after
454*613a2f6bSGordon Ross 		 * sanity-checking the length.
455*613a2f6bSGordon Ross 		 */
456*613a2f6bSGordon Ross 		if (sblen == 0 || bc < sblen)
457*613a2f6bSGordon Ross 			goto out;
458*613a2f6bSGordon Ross 		err = mb_get_mbuf(mbp, sblen, &m);
459*613a2f6bSGordon Ross 		if (err)
460*613a2f6bSGordon Ross 			goto out;
461*613a2f6bSGordon Ross 		mb_initm(mbc2, m);
462*613a2f6bSGordon Ross 		mbc2->mb_count = sblen;
463*613a2f6bSGordon Ross 	} else {
464*613a2f6bSGordon Ross 		if (wc != 3)
465*613a2f6bSGordon Ross 			goto out;
466*613a2f6bSGordon Ross 		mb_get_uint16le(mbp, NULL);	/* secondary cmd */
467*613a2f6bSGordon Ross 		mb_get_uint16le(mbp, NULL);	/* andxoffset */
468*613a2f6bSGordon Ross 		mb_get_uint16le(mbp, actionp);	/* action */
469*613a2f6bSGordon Ross 		err = mb_get_uint16le(mbp, &bc); /* byte count */
470*613a2f6bSGordon Ross 		if (err)
471*613a2f6bSGordon Ross 			goto out;
472*613a2f6bSGordon Ross 	}
473*613a2f6bSGordon Ross 
474*613a2f6bSGordon Ross 	/*
475*613a2f6bSGordon Ross 	 * Native OS, LANMGR, & Domain follow here.
476*613a2f6bSGordon Ross 	 * Parse these strings and store for later.
477*613a2f6bSGordon Ross 	 * If unicode, they should be aligned.
478*613a2f6bSGordon Ross 	 *
479*613a2f6bSGordon Ross 	 * Note that with Extended security, we may use
480*613a2f6bSGordon Ross 	 * multiple calls to this function.  Only parse
481*613a2f6bSGordon Ross 	 * these strings on the last one (status == 0).
482*613a2f6bSGordon Ross 	 * Ditto for the CAP_LARGE work-around.
483*613a2f6bSGordon Ross 	 */
484*613a2f6bSGordon Ross 	if (rqp->rq_status != 0)
485*613a2f6bSGordon Ross 		goto out;
486*613a2f6bSGordon Ross 
487*613a2f6bSGordon Ross 	/* Ignore any parsing errors for these strings. */
488*613a2f6bSGordon Ross 	err = mb_get_string(mbp, &ctx->ct_srv_OS, uc);
489*613a2f6bSGordon Ross 	DPRINT("server OS: %s", err ? "?" : ctx->ct_srv_OS);
490*613a2f6bSGordon Ross 	err = mb_get_string(mbp, &ctx->ct_srv_LM, uc);
491*613a2f6bSGordon Ross 	DPRINT("server LM: %s", err ? "?" : ctx->ct_srv_LM);
492*613a2f6bSGordon Ross 	/*
493*613a2f6bSGordon Ross 	 * There's sometimes a server domain folloing
494*613a2f6bSGordon Ross 	 * at this point, but we don't need it.
495*613a2f6bSGordon Ross 	 */
496*613a2f6bSGordon Ross 
497*613a2f6bSGordon Ross 	/* Success! (See Ignore any ... above) */
498*613a2f6bSGordon Ross 	err = 0;
499*613a2f6bSGordon Ross 
500*613a2f6bSGordon Ross 	/*
501*613a2f6bSGordon Ross 	 * Windows systems don't suport CAP_LARGE_READX,WRITEX
502*613a2f6bSGordon Ross 	 * when signing is enabled, so adjust sv_caps.
503*613a2f6bSGordon Ross 	 */
504*613a2f6bSGordon Ross 	if (ctx->ct_srv_OS &&
505*613a2f6bSGordon Ross 	    0 == strncmp(ctx->ct_srv_OS, "Windows ", 8)) {
506*613a2f6bSGordon Ross 		DPRINT("Server is Windows");
507*613a2f6bSGordon Ross 		if (ctx->ct_vcflags & SMBV_WILL_SIGN) {
508*613a2f6bSGordon Ross 			DPRINT("disable CAP_LARGE_(r/w)");
509*613a2f6bSGordon Ross 			ctx->ct_sopt.sv_caps &=
510*613a2f6bSGordon Ross 			    ~(SMB_CAP_LARGE_READX | SMB_CAP_LARGE_WRITEX);
511*613a2f6bSGordon Ross 		}
512*613a2f6bSGordon Ross 	}
513*613a2f6bSGordon Ross 
514*613a2f6bSGordon Ross out:
515*613a2f6bSGordon Ross 	if (rqp)
516*613a2f6bSGordon Ross 		smb_rq_done(rqp);
517*613a2f6bSGordon Ross 
518*613a2f6bSGordon Ross 	return (err);
519*613a2f6bSGordon Ross }
520