- updated load_netbios_names() to cope with new wins.dat format
[Samba.git] / source / namelogon.c
blobc10049135c42e1cf502af8b91c5b552ae89664e7
1 /*
2 Unix SMB/Netbios implementation.
3 Version 1.9.
4 NBT netbios routines and daemon - version 2
5 Copyright (C) Andrew Tridgell 1994-1995
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
21 Revision History:
23 14 jan 96: lkcl@pires.co.uk
24 added multiple workgroup domain master support
28 #include "includes.h"
30 extern int ClientDGRAM;
32 #define TEST_CODE /* want to debug unknown browse packets */
34 extern int DEBUGLEVEL;
36 extern pstring myname;
39 /****************************************************************************
40 process a domain logon packet
42 08aug96 lkcl@pires.co.uk
43 reply_code == 0xC courtesy of jim@oxfordcc.co.uk forwarded by
44 lewis2@server.uwindsor.ca
45 **************************************************************************/
46 void process_logon_packet(struct packet_struct *p,char *buf,int len)
48 struct dgram_packet *dgram = &p->packet.dgram;
49 struct in_addr ip = dgram->header.source_ip;
50 struct subnet_record *d = find_subnet(ip);
51 char *logname,*q;
52 fstring reply_name;
53 BOOL add_slashes = False;
54 pstring outbuf;
55 int code,reply_code;
56 struct work_record *work;
58 if (!d) return;
60 if (!(work = find_workgroupstruct(d,dgram->dest_name.name, False)))
61 return;
63 if (!lp_domain_logons()) {
64 DEBUG(3,("No domain logons\n"));
65 return;
67 if (!listening_name(work, &dgram->dest_name))
69 DEBUG(4,("Not listening to that domain\n"));
70 return;
73 code = SVAL(buf,0);
74 switch (code) {
75 case 0:
77 char *machine = buf+2;
78 char *user = skip_string(machine,1);
79 logname = skip_string(user,1);
80 reply_code = 6;
81 strcpy(reply_name,myname);
82 strupper(reply_name);
83 add_slashes = True;
84 DEBUG(3,("Domain login request from %s(%s) user=%s\n",
85 machine,inet_ntoa(p->ip),user));
87 break;
88 case 7:
90 char *machine = buf+2;
91 logname = skip_string(machine,1);
92 reply_code = 7;
93 strcpy(reply_name,lp_domain_controller());
94 if (!*reply_name) {
95 strcpy(reply_name,myname);
96 reply_code = 0xC;
98 strupper(reply_name);
99 DEBUG(3,("GETDC request from %s(%s), reporting %s 0x%2x\n",
100 machine,inet_ntoa(p->ip), reply_name, reply_code));
102 break;
103 default:
104 DEBUG(3,("Unknown domain request %d\n",code));
105 return;
108 bzero(outbuf,sizeof(outbuf));
109 q = outbuf;
110 SSVAL(q,0,reply_code);
111 q += 2;
112 if (add_slashes) {
113 strcpy(q,"\\\\");
114 q += 2;
116 StrnCpy(q,reply_name,16);
117 q = skip_string(q,1);
119 if (reply_code == 0xC)
121 if ( PTR_DIFF (q,outbuf) & 1 )
123 q++;
126 PutUniCode(q,reply_name);
127 q += 2*(strlen(reply_name) + 1);
129 PutUniCode(q,lp_workgroup());
130 q += 2*(strlen(lp_workgroup()) + 1);
132 SIVAL(q,0,1);
133 q += 4;
134 SSVAL(q,0,0xFFFF);
135 q += 2;
138 SSVAL(q,0,0xFFFF);
139 q += 2;
141 send_mailslot_reply(logname,ClientDGRAM,outbuf,PTR_DIFF(q,outbuf),
142 myname,&dgram->source_name.name[0],0x20,0,p->ip,
143 *iface_ip(p->ip));