9d6c9ffaf27f36d7c4a5ce0a697d54bf2c35a3b9
[kai/samba.git] / source4 / libcli / raw / rawnegotiate.c
1 /* 
2    Unix SMB/CIFS implementation.
3
4    SMB client negotiate context management functions
5
6    Copyright (C) Andrew Tridgell 1994-2005
7    Copyright (C) James Myers 2003 <myersjj@samba.org>
8    
9    This program is free software; you can redistribute it and/or modify
10    it under the terms of the GNU General Public License as published by
11    the Free Software Foundation; either version 3 of the License, or
12    (at your option) any later version.
13    
14    This program is distributed in the hope that it will be useful,
15    but WITHOUT ANY WARRANTY; without even the implied warranty of
16    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
17    GNU General Public License for more details.
18    
19    You should have received a copy of the GNU General Public License
20    along with this program.  If not, see <http://www.gnu.org/licenses/>.
21 */
22
23 #include "includes.h"
24 #include "libcli/raw/libcliraw.h"
25 #include "libcli/raw/raw_proto.h"
26 #include "system/time.h"
27
28 static const struct {
29         enum protocol_types prot;
30         const char *name;
31 } prots[] = {
32         {PROTOCOL_CORE,"PC NETWORK PROGRAM 1.0"},
33         {PROTOCOL_COREPLUS,"MICROSOFT NETWORKS 1.03"},
34         {PROTOCOL_LANMAN1,"MICROSOFT NETWORKS 3.0"},
35         {PROTOCOL_LANMAN1,"LANMAN1.0"},
36         {PROTOCOL_LANMAN1,"Windows for Workgroups 3.1a"},
37         {PROTOCOL_LANMAN2,"LM1.2X002"},
38         {PROTOCOL_LANMAN2,"DOS LANMAN2.1"},
39         {PROTOCOL_LANMAN2,"LANMAN2.1"},
40         {PROTOCOL_LANMAN2,"Samba"},
41         {PROTOCOL_NT1,"NT LANMAN 1.0"},
42         {PROTOCOL_NT1,"NT LM 0.12"},
43 #if 0
44         /* we don't yet handle chaining a SMB transport onto SMB2 */
45         {PROTOCOL_SMB2_02,"SMB 2.002"},
46 #endif
47 };
48
49 /*
50   Send a negprot command.
51 */
52 struct smbcli_request *smb_raw_negotiate_send(struct smbcli_transport *transport, 
53                                               bool unicode,
54                                               int maxprotocol)
55 {
56         struct smbcli_request *req;
57         int i;
58         uint16_t flags2 = 0;
59
60         req = smbcli_request_setup_transport(transport, SMBnegprot, 0, 0);
61         if (!req) {
62                 return NULL;
63         }
64
65         if (transport->options.ntstatus_support) {
66                 flags2 |= FLAGS2_32_BIT_ERROR_CODES;
67         }
68
69         if (unicode) {
70                 flags2 |= FLAGS2_UNICODE_STRINGS;
71         }
72         flags2 |= FLAGS2_EXTENDED_ATTRIBUTES;
73         flags2 |= FLAGS2_LONG_PATH_COMPONENTS;
74         flags2 |= FLAGS2_IS_LONG_NAME;
75
76         if (transport->options.use_spnego) {
77                 flags2 |= FLAGS2_EXTENDED_SECURITY;
78         }
79
80         SSVAL(req->out.hdr,HDR_FLG2, flags2);
81
82         /* setup the protocol strings */
83         for (i=0; i < ARRAY_SIZE(prots) && prots[i].prot <= maxprotocol; i++) {
84                 smbcli_req_append_bytes(req, (const uint8_t *)"\2", 1);
85                 smbcli_req_append_string(req, prots[i].name, STR_TERMINATE | STR_ASCII);
86         }
87
88         if (!smbcli_request_send(req)) {
89                 smbcli_request_destroy(req);
90                 return NULL;
91         }
92
93         return req;
94 }
95
96 /*
97  Send a negprot command.
98 */
99 NTSTATUS smb_raw_negotiate_recv(struct smbcli_request *req)
100 {
101         struct smbcli_transport *transport = req->transport;
102         int protocol;
103
104         if (!smbcli_request_receive(req) ||
105             smbcli_request_is_error(req)) {
106                 return smbcli_request_destroy(req);
107         }
108
109         SMBCLI_CHECK_MIN_WCT(req, 1);
110
111         protocol = SVALS(req->in.vwv, VWV(0));
112
113         if (protocol >= ARRAY_SIZE(prots) || protocol < 0) {
114                 req->status = NT_STATUS_UNSUCCESSFUL;
115                 return smbcli_request_destroy(req);
116         }
117
118         transport->negotiate.protocol = prots[protocol].prot;
119
120         if (transport->negotiate.protocol >= PROTOCOL_NT1) {
121                 NTTIME ntt;
122
123                 /* NT protocol */
124                 SMBCLI_CHECK_WCT(req, 17);
125                 transport->negotiate.sec_mode = CVAL(req->in.vwv,VWV(1));
126                 transport->negotiate.max_mux  = SVAL(req->in.vwv,VWV(1)+1);
127                 transport->negotiate.max_xmit = IVAL(req->in.vwv,VWV(3)+1);
128                 transport->negotiate.sesskey  = IVAL(req->in.vwv,VWV(7)+1);
129                 transport->negotiate.capabilities = IVAL(req->in.vwv,VWV(9)+1);
130
131                 /* this time arrives in real GMT */
132                 ntt = smbcli_pull_nttime(req->in.vwv, VWV(11)+1);
133                 transport->negotiate.server_time = nt_time_to_unix(ntt);                
134                 transport->negotiate.server_zone = SVALS(req->in.vwv,VWV(15)+1) * 60;
135                 transport->negotiate.key_len = CVAL(req->in.vwv,VWV(16)+1);
136
137                 if (transport->negotiate.capabilities & CAP_EXTENDED_SECURITY) {
138                         if (req->in.data_size < 16) {
139                                 goto failed;
140                         }
141                         transport->negotiate.server_guid = smbcli_req_pull_blob(&req->in.bufinfo, transport, req->in.data, 16);
142                         transport->negotiate.secblob = smbcli_req_pull_blob(&req->in.bufinfo, transport, req->in.data + 16, req->in.data_size - 16);
143                 } else {
144                         if (req->in.data_size < (transport->negotiate.key_len)) {
145                                 goto failed;
146                         }
147                         transport->negotiate.secblob = smbcli_req_pull_blob(&req->in.bufinfo, transport, req->in.data, transport->negotiate.key_len);
148                         smbcli_req_pull_string(&req->in.bufinfo, transport, &transport->negotiate.server_domain,
149                                             req->in.data+transport->negotiate.key_len,
150                                             req->in.data_size-transport->negotiate.key_len, STR_UNICODE|STR_NOALIGN);
151                         /* here comes the server name */
152                 }
153
154                 if (transport->negotiate.capabilities & CAP_RAW_MODE) {
155                         transport->negotiate.readbraw_supported = true;
156                         transport->negotiate.writebraw_supported = true;
157                 }
158
159                 if (transport->negotiate.capabilities & CAP_LOCK_AND_READ)
160                         transport->negotiate.lockread_supported = true;
161         } else if (transport->negotiate.protocol >= PROTOCOL_LANMAN1) {
162                 SMBCLI_CHECK_WCT(req, 13);
163                 transport->negotiate.sec_mode = SVAL(req->in.vwv,VWV(1));
164                 transport->negotiate.max_xmit = SVAL(req->in.vwv,VWV(2));
165                 transport->negotiate.sesskey =  IVAL(req->in.vwv,VWV(6));
166                 transport->negotiate.server_zone = SVALS(req->in.vwv,VWV(10)) * 60;
167                 
168                 /* this time is converted to GMT by raw_pull_dos_date */
169                 transport->negotiate.server_time = raw_pull_dos_date(transport,
170                                                                      req->in.vwv+VWV(8));
171                 if ((SVAL(req->in.vwv,VWV(5)) & 0x1)) {
172                         transport->negotiate.readbraw_supported = 1;
173                 }
174                 if ((SVAL(req->in.vwv,VWV(5)) & 0x2)) {
175                         transport->negotiate.writebraw_supported = 1;
176                 }
177                 transport->negotiate.secblob = smbcli_req_pull_blob(&req->in.bufinfo, transport, 
178                                                                  req->in.data, req->in.data_size);
179         } else {
180                 /* the old core protocol */
181                 transport->negotiate.sec_mode = 0;
182                 transport->negotiate.server_time = time(NULL);
183                 transport->negotiate.max_xmit = transport->options.max_xmit;
184                 transport->negotiate.server_zone = get_time_zone(transport->negotiate.server_time);
185         }
186
187         /* a way to force ascii SMB */
188         if (!transport->options.unicode) {
189                 transport->negotiate.capabilities &= ~CAP_UNICODE;
190         }
191
192         if (!transport->options.ntstatus_support) {
193                 transport->negotiate.capabilities &= ~CAP_STATUS32;
194         }
195
196         if (!transport->options.use_level2_oplocks) {
197                 transport->negotiate.capabilities &= ~CAP_LEVEL_II_OPLOCKS;
198         }
199
200 failed:
201         return smbcli_request_destroy(req);
202 }
203
204
205 /*
206  Send a negprot command (sync interface)
207 */
208 NTSTATUS smb_raw_negotiate(struct smbcli_transport *transport, bool unicode, int maxprotocol)
209 {
210         struct smbcli_request *req = smb_raw_negotiate_send(transport, unicode, maxprotocol);
211         return smb_raw_negotiate_recv(req);
212 }