2 Unix SMB/CIFS implementation.
3 handle unexpected packets
4 Copyright (C) Andrew Tridgell 2000
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program. If not, see <http://www.gnu.org/licenses/>.
23 static TDB_CONTEXT
*tdbd
= NULL
;
25 /* the key type used in the unexpected packet database */
26 struct unexpected_key
{
27 enum packet_type packet_type
;
32 /****************************************************************************
33 All unexpected packets are passed in here, to be stored in a unexpected
34 packet database. This allows nmblookup and other tools to receive packets
35 erroneously sent to the wrong port by broken MS systems.
36 **************************************************************************/
38 void unexpected_packet(struct packet_struct
*p
)
42 struct unexpected_key key
;
48 tdbd
= tdb_open_log(lock_path("unexpected.tdb"), 0,
49 TDB_CLEAR_IF_FIRST
|TDB_DEFAULT
,
50 O_RDWR
| O_CREAT
, 0644);
52 DEBUG(0,("Failed to open unexpected.tdb\n"));
57 memset(buf
,'\0',sizeof(buf
));
59 /* Encode the ip addr and port. */
60 enc_ip
= ntohl(p
->ip
.s_addr
);
64 len
= build_packet(&buf
[6], sizeof(buf
)-6, p
) + 6;
66 ZERO_STRUCT(key
); /* needed for potential alignment */
68 key
.packet_type
= p
->packet_type
;
69 key
.timestamp
= p
->timestamp
;
72 kbuf
.dptr
= (uint8_t *)&key
;
73 kbuf
.dsize
= sizeof(key
);
74 dbuf
.dptr
= (uint8_t *)buf
;
77 tdb_store(tdbd
, kbuf
, dbuf
, TDB_REPLACE
);
83 /****************************************************************************
84 Delete the record if it is too old.
85 **************************************************************************/
87 static int traverse_fn(TDB_CONTEXT
*ttdb
, TDB_DATA kbuf
, TDB_DATA dbuf
, void *state
)
89 struct unexpected_key key
;
91 if (kbuf
.dsize
!= sizeof(key
)) {
92 tdb_delete(ttdb
, kbuf
);
95 memcpy(&key
, kbuf
.dptr
, sizeof(key
));
97 if (lastt
- key
.timestamp
> NMBD_UNEXPECTED_TIMEOUT
) {
98 tdb_delete(ttdb
, kbuf
);
105 /****************************************************************************
106 Delete all old unexpected packets.
107 **************************************************************************/
109 void clear_unexpected(time_t t
)
113 if ((lastt
!= 0) && (t
< lastt
+ NMBD_UNEXPECTED_TIMEOUT
))
118 tdb_traverse(tdbd
, traverse_fn
, NULL
);
121 struct receive_unexpected_state
{
122 struct packet_struct
*matched_packet
;
124 enum packet_type match_type
;
125 const char *match_name
;
128 /****************************************************************************
129 tdb traversal fn to find a matching 137 packet.
130 **************************************************************************/
132 static int traverse_match(TDB_CONTEXT
*ttdb
, TDB_DATA kbuf
, TDB_DATA dbuf
,
135 struct receive_unexpected_state
*state
=
136 (struct receive_unexpected_state
*)private_data
;
137 struct unexpected_key key
;
141 struct packet_struct
*p
;
143 if (kbuf
.dsize
!= sizeof(key
)) {
147 memcpy(&key
, kbuf
.dptr
, sizeof(key
));
149 if (key
.packet_type
!= state
->match_type
) return 0;
151 if (dbuf
.dsize
< 6) {
155 /* Decode the ip addr and port. */
156 enc_ip
= IVAL(dbuf
.dptr
,0);
157 ip
.s_addr
= htonl(enc_ip
);
158 port
= SVAL(dbuf
.dptr
,4);
160 p
= parse_packet((char *)&dbuf
.dptr
[6],
168 if ((state
->match_type
== NMB_PACKET
&&
169 p
->packet
.nmb
.header
.name_trn_id
== state
->match_id
) ||
170 (state
->match_type
== DGRAM_PACKET
&&
171 match_mailslot_name(p
, state
->match_name
))) {
172 state
->matched_packet
= p
;
181 /****************************************************************************
182 Check for a particular packet in the unexpected packet queue.
183 **************************************************************************/
185 struct packet_struct
*receive_unexpected(enum packet_type packet_type
, int id
,
186 const char *mailslot_name
)
189 struct receive_unexpected_state state
;
191 tdb2
= tdb_open_log(lock_path("unexpected.tdb"), 0, 0, O_RDONLY
, 0);
192 if (!tdb2
) return NULL
;
194 state
.matched_packet
= NULL
;
196 state
.match_type
= packet_type
;
197 state
.match_name
= mailslot_name
;
199 tdb_traverse(tdb2
, traverse_match
, &state
);
203 return state
.matched_packet
;