s3:smb2_server: add smbd_smb2_request_verify_sizes()
authorStefan Metzmacher <metze@samba.org>
Tue, 6 Sep 2011 12:00:04 +0000 (14:00 +0200)
committerStefan Metzmacher <metze@samba.org>
Wed, 7 Sep 2011 08:38:02 +0000 (10:38 +0200)
metze

source3/smbd/globals.h
source3/smbd/smb2_server.c

index 6ce9835dee661b5060d951830b98cb5f00405329..92532c2d090199f7cf6814e131c3175c40e97a29 100644 (file)
@@ -269,6 +269,9 @@ NTSTATUS smbd_smb2_request_pending_queue(struct smbd_smb2_request *req,
 struct smb_request *smbd_smb2_fake_smb_request(struct smbd_smb2_request *req);
 void remove_smb2_chained_fsp(files_struct *fsp);
 
+NTSTATUS smbd_smb2_request_verify_sizes(struct smbd_smb2_request *req,
+                                       size_t expected_body_size);
+
 NTSTATUS smbd_smb2_request_process_negprot(struct smbd_smb2_request *req);
 NTSTATUS smbd_smb2_request_process_sesssetup(struct smbd_smb2_request *req);
 NTSTATUS smbd_smb2_request_process_logoff(struct smbd_smb2_request *req);
index fa4801c3772e1534a09d7659cc22a8d35766214d..8fbbbc05023d18a215df0b8c3673a7f50696fffc 100644 (file)
@@ -1250,6 +1250,48 @@ static NTSTATUS smbd_smb2_request_check_session(struct smbd_smb2_request *req)
        return NT_STATUS_OK;
 }
 
+NTSTATUS smbd_smb2_request_verify_sizes(struct smbd_smb2_request *req,
+                                       size_t expected_body_size)
+{
+       const uint8_t *inbody;
+       int i = req->current_idx;
+       size_t body_size;
+
+       /*
+        * The following should be checked already.
+        */
+       if ((i+2) > req->in.vector_count) {
+               return NT_STATUS_INTERNAL_ERROR;
+       }
+       if (req->in.vector[i+0].iov_len != SMB2_HDR_BODY) {
+               return NT_STATUS_INTERNAL_ERROR;
+       }
+       if (req->in.vector[i+1].iov_len < 2) {
+               return NT_STATUS_INTERNAL_ERROR;
+       }
+
+       /*
+        * Now check the expected body size,
+        * where the last byte might be in the
+        * dynnamic section..
+        */
+       if (req->in.vector[i+1].iov_len != (expected_body_size & 0xFFFFFFFE)) {
+               return NT_STATUS_INVALID_PARAMETER;
+       }
+       if (req->in.vector[i+2].iov_len < (expected_body_size & 0x00000001)) {
+               return NT_STATUS_INVALID_PARAMETER;
+       }
+
+       inbody = (const uint8_t *)req->in.vector[i+1].iov_base;
+
+       body_size = SVAL(inbody, 0x00);
+       if (body_size != expected_body_size) {
+               return NT_STATUS_INVALID_PARAMETER;
+       }
+
+       return NT_STATUS_OK;
+}
+
 NTSTATUS smbd_smb2_request_dispatch(struct smbd_smb2_request *req)
 {
        const uint8_t *inhdr;