Fix bug 10196 - RW Deny for a specific user is not overriding RW Allow for a group.
[Samba.git] / librpc / rpc / binding.c
blob2fa325fb938cf61344cfc9433cbcb2f18b60010c
1 /*
2 Unix SMB/CIFS implementation.
4 dcerpc utility functions
6 Copyright (C) Andrew Tridgell 2003
7 Copyright (C) Jelmer Vernooij 2004
8 Copyright (C) Andrew Bartlett <abartlet@samba.org> 2005
9 Copyright (C) Rafal Szczesniak 2006
11 This program is free software; you can redistribute it and/or modify
12 it under the terms of the GNU General Public License as published by
13 the Free Software Foundation; either version 3 of the License, or
14 (at your option) any later version.
16 This program is distributed in the hope that it will be useful,
17 but WITHOUT ANY WARRANTY; without even the implied warranty of
18 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 GNU General Public License for more details.
21 You should have received a copy of the GNU General Public License
22 along with this program. If not, see <http://www.gnu.org/licenses/>.
25 #include "includes.h"
26 #include "../../lib/util/util_net.h"
27 #include "librpc/gen_ndr/ndr_epmapper.h"
28 #include "librpc/gen_ndr/ndr_misc.h"
29 #include "librpc/rpc/dcerpc.h"
30 #include "rpc_common.h"
32 #undef strcasecmp
33 #undef strncasecmp
35 #define MAX_PROTSEQ 10
37 static const struct {
38 const char *name;
39 enum dcerpc_transport_t transport;
40 int num_protocols;
41 enum epm_protocol protseq[MAX_PROTSEQ];
42 } transports[] = {
43 { "ncacn_np", NCACN_NP, 3,
44 { EPM_PROTOCOL_NCACN, EPM_PROTOCOL_SMB, EPM_PROTOCOL_NETBIOS }},
45 { "ncacn_ip_tcp", NCACN_IP_TCP, 3,
46 { EPM_PROTOCOL_NCACN, EPM_PROTOCOL_TCP, EPM_PROTOCOL_IP } },
47 { "ncacn_http", NCACN_HTTP, 3,
48 { EPM_PROTOCOL_NCACN, EPM_PROTOCOL_HTTP, EPM_PROTOCOL_IP } },
49 { "ncadg_ip_udp", NCACN_IP_UDP, 3,
50 { EPM_PROTOCOL_NCADG, EPM_PROTOCOL_UDP, EPM_PROTOCOL_IP } },
51 { "ncalrpc", NCALRPC, 2,
52 { EPM_PROTOCOL_NCALRPC, EPM_PROTOCOL_NAMED_PIPE } },
53 { "ncacn_unix_stream", NCACN_UNIX_STREAM, 2,
54 { EPM_PROTOCOL_NCACN, EPM_PROTOCOL_UNIX_DS } },
55 { "ncadg_unix_dgram", NCADG_UNIX_DGRAM, 2,
56 { EPM_PROTOCOL_NCADG, EPM_PROTOCOL_UNIX_DS } },
57 { "ncacn_at_dsp", NCACN_AT_DSP, 3,
58 { EPM_PROTOCOL_NCACN, EPM_PROTOCOL_APPLETALK, EPM_PROTOCOL_DSP } },
59 { "ncadg_at_ddp", NCADG_AT_DDP, 3,
60 { EPM_PROTOCOL_NCADG, EPM_PROTOCOL_APPLETALK, EPM_PROTOCOL_DDP } },
61 { "ncacn_vns_ssp", NCACN_VNS_SPP, 3,
62 { EPM_PROTOCOL_NCACN, EPM_PROTOCOL_STREETTALK, EPM_PROTOCOL_VINES_SPP } },
63 { "ncacn_vns_ipc", NCACN_VNS_IPC, 3,
64 { EPM_PROTOCOL_NCACN, EPM_PROTOCOL_STREETTALK, EPM_PROTOCOL_VINES_IPC }, },
65 { "ncadg_ipx", NCADG_IPX, 2,
66 { EPM_PROTOCOL_NCADG, EPM_PROTOCOL_IPX },
68 { "ncacn_spx", NCACN_SPX, 3,
69 /* I guess some MS programmer confused the identifier for
70 * EPM_PROTOCOL_UUID (0x0D or 13) with the one for
71 * EPM_PROTOCOL_SPX (0x13) here. -- jelmer*/
72 { EPM_PROTOCOL_NCACN, EPM_PROTOCOL_NCALRPC, EPM_PROTOCOL_UUID },
76 static const struct {
77 const char *name;
78 uint32_t flag;
79 } ncacn_options[] = {
80 {"sign", DCERPC_SIGN},
81 {"seal", DCERPC_SEAL},
82 {"connect", DCERPC_CONNECT},
83 {"spnego", DCERPC_AUTH_SPNEGO},
84 {"ntlm", DCERPC_AUTH_NTLM},
85 {"krb5", DCERPC_AUTH_KRB5},
86 {"validate", DCERPC_DEBUG_VALIDATE_BOTH},
87 {"print", DCERPC_DEBUG_PRINT_BOTH},
88 {"padcheck", DCERPC_DEBUG_PAD_CHECK},
89 {"bigendian", DCERPC_PUSH_BIGENDIAN},
90 {"smb2", DCERPC_SMB2},
91 {"hdrsign", DCERPC_HEADER_SIGNING},
92 {"ndr64", DCERPC_NDR64},
93 {"localaddress", DCERPC_LOCALADDRESS}
96 const char *epm_floor_string(TALLOC_CTX *mem_ctx, struct epm_floor *epm_floor)
98 struct ndr_syntax_id syntax;
99 NTSTATUS status;
101 switch(epm_floor->lhs.protocol) {
102 case EPM_PROTOCOL_UUID:
103 status = dcerpc_floor_get_lhs_data(epm_floor, &syntax);
104 if (NT_STATUS_IS_OK(status)) {
105 /* lhs is used: UUID */
106 char *uuidstr;
108 if (GUID_equal(&syntax.uuid, &ndr_transfer_syntax_ndr.uuid)) {
109 return "NDR";
112 if (GUID_equal(&syntax.uuid, &ndr_transfer_syntax_ndr64.uuid)) {
113 return "NDR64";
116 uuidstr = GUID_string(mem_ctx, &syntax.uuid);
118 return talloc_asprintf(mem_ctx, " uuid %s/0x%02x", uuidstr, syntax.if_version);
119 } else { /* IPX */
120 return talloc_asprintf(mem_ctx, "IPX:%s",
121 data_blob_hex_string_upper(mem_ctx, &epm_floor->rhs.uuid.unknown));
124 case EPM_PROTOCOL_NCACN:
125 return "RPC-C";
127 case EPM_PROTOCOL_NCADG:
128 return "RPC";
130 case EPM_PROTOCOL_NCALRPC:
131 return "NCALRPC";
133 case EPM_PROTOCOL_DNET_NSP:
134 return "DNET/NSP";
136 case EPM_PROTOCOL_IP:
137 return talloc_asprintf(mem_ctx, "IP:%s", epm_floor->rhs.ip.ipaddr);
139 case EPM_PROTOCOL_NAMED_PIPE:
140 return talloc_asprintf(mem_ctx, "NAMED-PIPE:%s", epm_floor->rhs.named_pipe.path);
142 case EPM_PROTOCOL_SMB:
143 return talloc_asprintf(mem_ctx, "SMB:%s", epm_floor->rhs.smb.unc);
145 case EPM_PROTOCOL_UNIX_DS:
146 return talloc_asprintf(mem_ctx, "Unix:%s", epm_floor->rhs.unix_ds.path);
148 case EPM_PROTOCOL_NETBIOS:
149 return talloc_asprintf(mem_ctx, "NetBIOS:%s", epm_floor->rhs.netbios.name);
151 case EPM_PROTOCOL_NETBEUI:
152 return "NETBeui";
154 case EPM_PROTOCOL_SPX:
155 return "SPX";
157 case EPM_PROTOCOL_NB_IPX:
158 return "NB_IPX";
160 case EPM_PROTOCOL_HTTP:
161 return talloc_asprintf(mem_ctx, "HTTP:%d", epm_floor->rhs.http.port);
163 case EPM_PROTOCOL_TCP:
164 return talloc_asprintf(mem_ctx, "TCP:%d", epm_floor->rhs.tcp.port);
166 case EPM_PROTOCOL_UDP:
167 return talloc_asprintf(mem_ctx, "UDP:%d", epm_floor->rhs.udp.port);
169 default:
170 return talloc_asprintf(mem_ctx, "UNK(%02x):", epm_floor->lhs.protocol);
176 form a binding string from a binding structure
178 _PUBLIC_ char *dcerpc_binding_string(TALLOC_CTX *mem_ctx, const struct dcerpc_binding *b)
180 char *s = talloc_strdup(mem_ctx, "");
181 int i;
182 const char *t_name = NULL;
184 if (b->transport != NCA_UNKNOWN) {
185 t_name = derpc_transport_string_by_transport(b->transport);
186 if (!t_name) {
187 return NULL;
191 if (!GUID_all_zero(&b->object.uuid)) {
192 s = talloc_asprintf(s, "%s@",
193 GUID_string(mem_ctx, &b->object.uuid));
196 if (t_name != NULL) {
197 s = talloc_asprintf_append_buffer(s, "%s:", t_name);
198 if (s == NULL) {
199 return NULL;
203 if (b->host) {
204 s = talloc_asprintf_append_buffer(s, "%s", b->host);
207 if (!b->endpoint && !b->options && !b->flags) {
208 return s;
211 s = talloc_asprintf_append_buffer(s, "[");
213 if (b->endpoint) {
214 s = talloc_asprintf_append_buffer(s, "%s", b->endpoint);
217 /* this is a *really* inefficent way of dealing with strings,
218 but this is rarely called and the strings are always short,
219 so I don't care */
220 for (i=0;b->options && b->options[i];i++) {
221 s = talloc_asprintf_append_buffer(s, ",%s", b->options[i]);
222 if (!s) return NULL;
225 for (i=0;i<ARRAY_SIZE(ncacn_options);i++) {
226 if (b->flags & ncacn_options[i].flag) {
227 if (ncacn_options[i].flag == DCERPC_LOCALADDRESS && b->localaddress) {
228 s = talloc_asprintf_append_buffer(s, ",%s=%s", ncacn_options[i].name,
229 b->localaddress);
230 } else {
231 s = talloc_asprintf_append_buffer(s, ",%s", ncacn_options[i].name);
233 if (!s) return NULL;
237 s = talloc_asprintf_append_buffer(s, "]");
239 return s;
243 parse a binding string into a dcerpc_binding structure
245 _PUBLIC_ NTSTATUS dcerpc_parse_binding(TALLOC_CTX *mem_ctx, const char *s, struct dcerpc_binding **b_out)
247 struct dcerpc_binding *b;
248 char *options;
249 char *p;
250 int i, j, comma_count;
252 b = talloc_zero(mem_ctx, struct dcerpc_binding);
253 if (!b) {
254 return NT_STATUS_NO_MEMORY;
257 p = strchr(s, '@');
259 if (p && PTR_DIFF(p, s) == 36) { /* 36 is the length of a UUID */
260 NTSTATUS status;
261 DATA_BLOB blob = data_blob(s, 36);
262 status = GUID_from_data_blob(&blob, &b->object.uuid);
264 if (NT_STATUS_IS_ERR(status)) {
265 DEBUG(0, ("Failed parsing UUID\n"));
266 return status;
269 s = p + 1;
270 } else {
271 ZERO_STRUCT(b->object);
274 b->object.if_version = 0;
276 p = strchr(s, ':');
278 if (p == NULL) {
279 b->transport = NCA_UNKNOWN;
280 } else {
281 char *type = talloc_strndup(mem_ctx, s, PTR_DIFF(p, s));
282 if (!type) {
283 return NT_STATUS_NO_MEMORY;
286 for (i=0;i<ARRAY_SIZE(transports);i++) {
287 if (strcasecmp(type, transports[i].name) == 0) {
288 b->transport = transports[i].transport;
289 break;
293 if (i==ARRAY_SIZE(transports)) {
294 DEBUG(0,("Unknown dcerpc transport '%s'\n", type));
295 return NT_STATUS_INVALID_PARAMETER;
298 talloc_free(type);
300 s = p+1;
303 p = strchr(s, '[');
304 if (p) {
305 b->host = talloc_strndup(b, s, PTR_DIFF(p, s));
306 options = talloc_strdup(mem_ctx, p+1);
307 if (options[strlen(options)-1] != ']') {
308 return NT_STATUS_INVALID_PARAMETER;
310 options[strlen(options)-1] = 0;
311 } else {
312 b->host = talloc_strdup(b, s);
313 options = NULL;
315 if (!b->host) {
316 return NT_STATUS_NO_MEMORY;
319 b->target_hostname = b->host;
321 b->options = NULL;
322 b->flags = 0;
323 b->assoc_group_id = 0;
324 b->endpoint = NULL;
325 b->localaddress = NULL;
327 if (!options) {
328 *b_out = b;
329 return NT_STATUS_OK;
332 comma_count = count_chars(options, ',');
334 b->options = talloc_array(b, const char *, comma_count+2);
335 if (!b->options) {
336 return NT_STATUS_NO_MEMORY;
339 for (i=0; (p = strchr(options, ',')); i++) {
340 b->options[i] = talloc_strndup(b, options, PTR_DIFF(p, options));
341 if (!b->options[i]) {
342 return NT_STATUS_NO_MEMORY;
344 options = p+1;
346 b->options[i] = options;
347 b->options[i+1] = NULL;
349 /* some options are pre-parsed for convenience */
350 for (i=0;b->options[i];i++) {
351 for (j=0;j<ARRAY_SIZE(ncacn_options);j++) {
352 size_t opt_len = strlen(ncacn_options[j].name);
353 if (strncasecmp(ncacn_options[j].name, b->options[i], opt_len) == 0) {
354 int k;
355 char c = b->options[i][opt_len];
357 if (ncacn_options[j].flag == DCERPC_LOCALADDRESS && c == '=') {
358 b->localaddress = talloc_strdup(b, &b->options[i][opt_len+1]);
359 } else if (c != 0) {
360 continue;
363 b->flags |= ncacn_options[j].flag;
364 for (k=i;b->options[k];k++) {
365 b->options[k] = b->options[k+1];
367 i--;
368 break;
373 if (b->options[0]) {
374 /* Endpoint is first option */
375 b->endpoint = b->options[0];
376 if (strlen(b->endpoint) == 0) b->endpoint = NULL;
378 for (i=0;b->options[i];i++) {
379 b->options[i] = b->options[i+1];
383 if (b->options[0] == NULL)
384 b->options = NULL;
386 *b_out = b;
387 return NT_STATUS_OK;
390 _PUBLIC_ NTSTATUS dcerpc_floor_get_lhs_data(const struct epm_floor *epm_floor,
391 struct ndr_syntax_id *syntax)
393 TALLOC_CTX *mem_ctx = talloc_init("floor_get_lhs_data");
394 struct ndr_pull *ndr;
395 enum ndr_err_code ndr_err;
396 uint16_t if_version=0;
398 ndr = ndr_pull_init_blob(&epm_floor->lhs.lhs_data, mem_ctx);
399 if (ndr == NULL) {
400 talloc_free(mem_ctx);
401 return NT_STATUS_NO_MEMORY;
403 ndr->flags |= LIBNDR_FLAG_NOALIGN;
405 ndr_err = ndr_pull_GUID(ndr, NDR_SCALARS | NDR_BUFFERS, &syntax->uuid);
406 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
407 talloc_free(mem_ctx);
408 return ndr_map_error2ntstatus(ndr_err);
411 ndr_err = ndr_pull_uint16(ndr, NDR_SCALARS, &if_version);
412 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
413 talloc_free(mem_ctx);
414 return ndr_map_error2ntstatus(ndr_err);
417 syntax->if_version = if_version;
419 talloc_free(mem_ctx);
421 return NT_STATUS_OK;
424 static DATA_BLOB dcerpc_floor_pack_lhs_data(TALLOC_CTX *mem_ctx, const struct ndr_syntax_id *syntax)
426 DATA_BLOB blob;
427 struct ndr_push *ndr;
429 ndr = ndr_push_init_ctx(mem_ctx);
430 if (ndr == NULL) {
431 return data_blob_null;
434 ndr->flags |= LIBNDR_FLAG_NOALIGN;
436 ndr_push_GUID(ndr, NDR_SCALARS | NDR_BUFFERS, &syntax->uuid);
437 ndr_push_uint16(ndr, NDR_SCALARS, syntax->if_version);
439 blob = ndr_push_blob(ndr);
440 talloc_steal(mem_ctx, blob.data);
441 talloc_free(ndr);
442 return blob;
445 static bool dcerpc_floor_pack_rhs_if_version_data(
446 TALLOC_CTX *mem_ctx, const struct ndr_syntax_id *syntax,
447 DATA_BLOB *pblob)
449 DATA_BLOB blob;
450 struct ndr_push *ndr = ndr_push_init_ctx(mem_ctx);
451 enum ndr_err_code ndr_err;
453 if (ndr == NULL) {
454 return false;
457 ndr->flags |= LIBNDR_FLAG_NOALIGN;
459 ndr_err = ndr_push_uint16(ndr, NDR_SCALARS, syntax->if_version >> 16);
460 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
461 return false;
464 blob = ndr_push_blob(ndr);
465 talloc_steal(mem_ctx, blob.data);
466 talloc_free(ndr);
467 *pblob = blob;
468 return true;
471 const char *dcerpc_floor_get_rhs_data(TALLOC_CTX *mem_ctx, struct epm_floor *epm_floor)
473 switch (epm_floor->lhs.protocol) {
474 case EPM_PROTOCOL_TCP:
475 if (epm_floor->rhs.tcp.port == 0) return NULL;
476 return talloc_asprintf(mem_ctx, "%d", epm_floor->rhs.tcp.port);
478 case EPM_PROTOCOL_UDP:
479 if (epm_floor->rhs.udp.port == 0) return NULL;
480 return talloc_asprintf(mem_ctx, "%d", epm_floor->rhs.udp.port);
482 case EPM_PROTOCOL_HTTP:
483 if (epm_floor->rhs.http.port == 0) return NULL;
484 return talloc_asprintf(mem_ctx, "%d", epm_floor->rhs.http.port);
486 case EPM_PROTOCOL_IP:
487 return talloc_strdup(mem_ctx, epm_floor->rhs.ip.ipaddr);
489 case EPM_PROTOCOL_NCACN:
490 return NULL;
492 case EPM_PROTOCOL_NCADG:
493 return NULL;
495 case EPM_PROTOCOL_SMB:
496 if (strlen(epm_floor->rhs.smb.unc) == 0) return NULL;
497 return talloc_strdup(mem_ctx, epm_floor->rhs.smb.unc);
499 case EPM_PROTOCOL_NAMED_PIPE:
500 if (strlen(epm_floor->rhs.named_pipe.path) == 0) return NULL;
501 return talloc_strdup(mem_ctx, epm_floor->rhs.named_pipe.path);
503 case EPM_PROTOCOL_NETBIOS:
504 if (strlen(epm_floor->rhs.netbios.name) == 0) return NULL;
505 return talloc_strdup(mem_ctx, epm_floor->rhs.netbios.name);
507 case EPM_PROTOCOL_NCALRPC:
508 return NULL;
510 case EPM_PROTOCOL_VINES_SPP:
511 return talloc_asprintf(mem_ctx, "%d", epm_floor->rhs.vines_spp.port);
513 case EPM_PROTOCOL_VINES_IPC:
514 return talloc_asprintf(mem_ctx, "%d", epm_floor->rhs.vines_ipc.port);
516 case EPM_PROTOCOL_STREETTALK:
517 return talloc_strdup(mem_ctx, epm_floor->rhs.streettalk.streettalk);
519 case EPM_PROTOCOL_UNIX_DS:
520 if (strlen(epm_floor->rhs.unix_ds.path) == 0) return NULL;
521 return talloc_strdup(mem_ctx, epm_floor->rhs.unix_ds.path);
523 case EPM_PROTOCOL_NULL:
524 return NULL;
526 default:
527 DEBUG(0,("Unsupported lhs protocol %d\n", epm_floor->lhs.protocol));
528 break;
531 return NULL;
534 static NTSTATUS dcerpc_floor_set_rhs_data(TALLOC_CTX *mem_ctx,
535 struct epm_floor *epm_floor,
536 const char *data)
538 switch (epm_floor->lhs.protocol) {
539 case EPM_PROTOCOL_TCP:
540 epm_floor->rhs.tcp.port = atoi(data);
541 return NT_STATUS_OK;
543 case EPM_PROTOCOL_UDP:
544 epm_floor->rhs.udp.port = atoi(data);
545 return NT_STATUS_OK;
547 case EPM_PROTOCOL_HTTP:
548 epm_floor->rhs.http.port = atoi(data);
549 return NT_STATUS_OK;
551 case EPM_PROTOCOL_IP:
552 epm_floor->rhs.ip.ipaddr = talloc_strdup(mem_ctx, data);
553 NT_STATUS_HAVE_NO_MEMORY(epm_floor->rhs.ip.ipaddr);
554 return NT_STATUS_OK;
556 case EPM_PROTOCOL_NCACN:
557 epm_floor->rhs.ncacn.minor_version = 0;
558 return NT_STATUS_OK;
560 case EPM_PROTOCOL_NCADG:
561 epm_floor->rhs.ncadg.minor_version = 0;
562 return NT_STATUS_OK;
564 case EPM_PROTOCOL_SMB:
565 epm_floor->rhs.smb.unc = talloc_strdup(mem_ctx, data);
566 NT_STATUS_HAVE_NO_MEMORY(epm_floor->rhs.smb.unc);
567 return NT_STATUS_OK;
569 case EPM_PROTOCOL_NAMED_PIPE:
570 epm_floor->rhs.named_pipe.path = talloc_strdup(mem_ctx, data);
571 NT_STATUS_HAVE_NO_MEMORY(epm_floor->rhs.named_pipe.path);
572 return NT_STATUS_OK;
574 case EPM_PROTOCOL_NETBIOS:
575 epm_floor->rhs.netbios.name = talloc_strdup(mem_ctx, data);
576 NT_STATUS_HAVE_NO_MEMORY(epm_floor->rhs.netbios.name);
577 return NT_STATUS_OK;
579 case EPM_PROTOCOL_NCALRPC:
580 return NT_STATUS_OK;
582 case EPM_PROTOCOL_VINES_SPP:
583 epm_floor->rhs.vines_spp.port = atoi(data);
584 return NT_STATUS_OK;
586 case EPM_PROTOCOL_VINES_IPC:
587 epm_floor->rhs.vines_ipc.port = atoi(data);
588 return NT_STATUS_OK;
590 case EPM_PROTOCOL_STREETTALK:
591 epm_floor->rhs.streettalk.streettalk = talloc_strdup(mem_ctx, data);
592 NT_STATUS_HAVE_NO_MEMORY(epm_floor->rhs.streettalk.streettalk);
593 return NT_STATUS_OK;
595 case EPM_PROTOCOL_UNIX_DS:
596 epm_floor->rhs.unix_ds.path = talloc_strdup(mem_ctx, data);
597 NT_STATUS_HAVE_NO_MEMORY(epm_floor->rhs.unix_ds.path);
598 return NT_STATUS_OK;
600 case EPM_PROTOCOL_NULL:
601 return NT_STATUS_OK;
603 default:
604 DEBUG(0,("Unsupported lhs protocol %d\n", epm_floor->lhs.protocol));
605 break;
608 return NT_STATUS_NOT_SUPPORTED;
611 enum dcerpc_transport_t dcerpc_transport_by_endpoint_protocol(int prot)
613 int i;
615 /* Find a transport that has 'prot' as 4th protocol */
616 for (i=0;i<ARRAY_SIZE(transports);i++) {
617 if (transports[i].num_protocols >= 2 &&
618 transports[i].protseq[1] == prot) {
619 return transports[i].transport;
623 /* Unknown transport */
624 return (unsigned int)-1;
627 _PUBLIC_ enum dcerpc_transport_t dcerpc_transport_by_tower(const struct epm_tower *tower)
629 int i;
631 /* Find a transport that matches this tower */
632 for (i=0;i<ARRAY_SIZE(transports);i++) {
633 int j;
634 if (transports[i].num_protocols != tower->num_floors - 2) {
635 continue;
638 for (j = 0; j < transports[i].num_protocols; j++) {
639 if (transports[i].protseq[j] != tower->floors[j+2].lhs.protocol) {
640 break;
644 if (j == transports[i].num_protocols) {
645 return transports[i].transport;
649 /* Unknown transport */
650 return (unsigned int)-1;
653 _PUBLIC_ const char *derpc_transport_string_by_transport(enum dcerpc_transport_t t)
655 int i;
657 for (i=0; i<ARRAY_SIZE(transports); i++) {
658 if (t == transports[i].transport) {
659 return transports[i].name;
662 return NULL;
665 _PUBLIC_ NTSTATUS dcerpc_binding_from_tower(TALLOC_CTX *mem_ctx,
666 struct epm_tower *tower,
667 struct dcerpc_binding **b_out)
669 NTSTATUS status;
670 struct dcerpc_binding *binding;
673 * A tower needs to have at least 4 floors to carry useful
674 * information. Floor 3 is the transport identifier which defines
675 * how many floors are required at least.
677 if (tower->num_floors < 4) {
678 return NT_STATUS_INVALID_PARAMETER;
681 binding = talloc_zero(mem_ctx, struct dcerpc_binding);
682 NT_STATUS_HAVE_NO_MEMORY(binding);
684 ZERO_STRUCT(binding->object);
685 binding->options = NULL;
686 binding->host = NULL;
687 binding->target_hostname = NULL;
688 binding->flags = 0;
689 binding->assoc_group_id = 0;
691 binding->transport = dcerpc_transport_by_tower(tower);
693 if (binding->transport == (unsigned int)-1) {
694 return NT_STATUS_NOT_SUPPORTED;
697 /* Set object uuid */
698 status = dcerpc_floor_get_lhs_data(&tower->floors[0], &binding->object);
700 if (!NT_STATUS_IS_OK(status)) {
701 DEBUG(1, ("Error pulling object uuid and version: %s", nt_errstr(status)));
702 return status;
705 /* Ignore floor 1, it contains the NDR version info */
707 binding->options = NULL;
709 /* Set endpoint */
710 if (tower->num_floors >= 4) {
711 binding->endpoint = dcerpc_floor_get_rhs_data(binding, &tower->floors[3]);
712 } else {
713 binding->endpoint = NULL;
716 /* Set network address */
717 if (tower->num_floors >= 5) {
718 binding->host = dcerpc_floor_get_rhs_data(binding, &tower->floors[4]);
719 NT_STATUS_HAVE_NO_MEMORY(binding->host);
720 binding->target_hostname = binding->host;
722 *b_out = binding;
723 return NT_STATUS_OK;
726 _PUBLIC_ struct dcerpc_binding *dcerpc_binding_dup(TALLOC_CTX *mem_ctx,
727 const struct dcerpc_binding *b)
729 struct dcerpc_binding *n;
730 uint32_t count;
732 n = talloc_zero(mem_ctx, struct dcerpc_binding);
733 if (n == NULL) {
734 return NULL;
737 n->transport = b->transport;
738 n->object = b->object;
739 n->flags = b->flags;
740 n->assoc_group_id = b->assoc_group_id;
742 if (b->host != NULL) {
743 n->host = talloc_strdup(n, b->host);
744 if (n->host == NULL) {
745 talloc_free(n);
746 return NULL;
750 if (b->target_hostname != NULL) {
751 n->target_hostname = talloc_strdup(n, b->target_hostname);
752 if (n->target_hostname == NULL) {
753 talloc_free(n);
754 return NULL;
758 if (b->target_principal != NULL) {
759 n->target_principal = talloc_strdup(n, b->target_principal);
760 if (n->target_principal == NULL) {
761 talloc_free(n);
762 return NULL;
766 if (b->localaddress != NULL) {
767 n->localaddress = talloc_strdup(n, b->localaddress);
768 if (n->localaddress == NULL) {
769 talloc_free(n);
770 return NULL;
774 if (b->endpoint != NULL) {
775 n->endpoint = talloc_strdup(n, b->endpoint);
776 if (n->endpoint == NULL) {
777 talloc_free(n);
778 return NULL;
782 for (count = 0; b->options && b->options[count]; count++);
784 if (count > 0) {
785 uint32_t i;
787 n->options = talloc_array(n, const char *, count + 1);
788 if (n->options == NULL) {
789 talloc_free(n);
790 return NULL;
793 for (i = 0; i < count; i++) {
794 n->options[i] = talloc_strdup(n->options, b->options[i]);
795 if (n->options[i] == NULL) {
796 talloc_free(n);
797 return NULL;
800 n->options[count] = NULL;
803 return n;
806 _PUBLIC_ NTSTATUS dcerpc_binding_build_tower(TALLOC_CTX *mem_ctx,
807 const struct dcerpc_binding *binding,
808 struct epm_tower *tower)
810 const enum epm_protocol *protseq = NULL;
811 int num_protocols = -1, i;
812 NTSTATUS status;
814 /* Find transport */
815 for (i=0;i<ARRAY_SIZE(transports);i++) {
816 if (transports[i].transport == binding->transport) {
817 protseq = transports[i].protseq;
818 num_protocols = transports[i].num_protocols;
819 break;
823 if (num_protocols == -1) {
824 DEBUG(0, ("Unable to find transport with id '%d'\n", binding->transport));
825 return NT_STATUS_UNSUCCESSFUL;
828 tower->num_floors = 2 + num_protocols;
829 tower->floors = talloc_array(mem_ctx, struct epm_floor, tower->num_floors);
831 /* Floor 0 */
832 tower->floors[0].lhs.protocol = EPM_PROTOCOL_UUID;
834 tower->floors[0].lhs.lhs_data = dcerpc_floor_pack_lhs_data(tower->floors, &binding->object);
836 if (!dcerpc_floor_pack_rhs_if_version_data(
837 tower->floors, &binding->object,
838 &tower->floors[0].rhs.uuid.unknown)) {
839 return NT_STATUS_NO_MEMORY;
842 /* Floor 1 */
843 tower->floors[1].lhs.protocol = EPM_PROTOCOL_UUID;
845 tower->floors[1].lhs.lhs_data = dcerpc_floor_pack_lhs_data(tower->floors,
846 &ndr_transfer_syntax_ndr);
848 tower->floors[1].rhs.uuid.unknown = data_blob_talloc_zero(tower->floors, 2);
850 /* Floor 2 to num_protocols */
851 for (i = 0; i < num_protocols; i++) {
852 tower->floors[2 + i].lhs.protocol = protseq[i];
853 tower->floors[2 + i].lhs.lhs_data = data_blob_talloc(tower->floors, NULL, 0);
854 ZERO_STRUCT(tower->floors[2 + i].rhs);
855 dcerpc_floor_set_rhs_data(tower->floors, &tower->floors[2 + i], "");
858 /* The 4th floor contains the endpoint */
859 if (num_protocols >= 2 && binding->endpoint) {
860 status = dcerpc_floor_set_rhs_data(tower->floors, &tower->floors[3], binding->endpoint);
861 if (NT_STATUS_IS_ERR(status)) {
862 return status;
866 /* The 5th contains the network address */
867 if (num_protocols >= 3 && binding->host) {
868 if (is_ipaddress(binding->host) ||
869 (binding->host[0] == '\\' && binding->host[1] == '\\')) {
870 status = dcerpc_floor_set_rhs_data(tower->floors, &tower->floors[4],
871 binding->host);
872 } else {
873 /* note that we don't attempt to resolve the
874 name here - when we get a hostname here we
875 are in the client code, and want to put in
876 a wildcard all-zeros IP for the server to
877 fill in */
878 status = dcerpc_floor_set_rhs_data(tower->floors, &tower->floors[4],
879 "0.0.0.0");
881 if (NT_STATUS_IS_ERR(status)) {
882 return status;
886 return NT_STATUS_OK;