2 Unix SMB/CIFS implementation.
3 handle unexpected packets
4 Copyright (C) Andrew Tridgell 2000
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program. If not, see <http://www.gnu.org/licenses/>.
23 static struct tdb_wrap
*tdbd
= NULL
;
25 /* the key type used in the unexpected packet database */
26 struct unexpected_key
{
27 enum packet_type packet_type
;
32 /****************************************************************************
33 All unexpected packets are passed in here, to be stored in a unexpected
34 packet database. This allows nmblookup and other tools to receive packets
35 erroneously sent to the wrong port by broken MS systems.
36 **************************************************************************/
38 void unexpected_packet(struct packet_struct
*p
)
42 struct unexpected_key key
;
48 tdbd
= tdb_wrap_open(talloc_autofree_context(),
49 lock_path("unexpected.tdb"), 0,
50 TDB_CLEAR_IF_FIRST
|TDB_DEFAULT
,
51 O_RDWR
| O_CREAT
, 0644);
53 DEBUG(0,("Failed to open unexpected.tdb\n"));
58 memset(buf
,'\0',sizeof(buf
));
60 /* Encode the ip addr and port. */
61 enc_ip
= ntohl(p
->ip
.s_addr
);
65 len
= build_packet(&buf
[6], sizeof(buf
)-6, p
) + 6;
67 ZERO_STRUCT(key
); /* needed for potential alignment */
69 key
.packet_type
= p
->packet_type
;
70 key
.timestamp
= p
->timestamp
;
73 kbuf
.dptr
= (uint8_t *)&key
;
74 kbuf
.dsize
= sizeof(key
);
75 dbuf
.dptr
= (uint8_t *)buf
;
78 tdb_store(tdbd
->tdb
, kbuf
, dbuf
, TDB_REPLACE
);
84 /****************************************************************************
85 Delete the record if it is too old.
86 **************************************************************************/
88 static int traverse_fn(TDB_CONTEXT
*ttdb
, TDB_DATA kbuf
, TDB_DATA dbuf
, void *state
)
90 struct unexpected_key key
;
92 if (kbuf
.dsize
!= sizeof(key
)) {
93 tdb_delete(ttdb
, kbuf
);
96 memcpy(&key
, kbuf
.dptr
, sizeof(key
));
98 if (lastt
- key
.timestamp
> NMBD_UNEXPECTED_TIMEOUT
) {
99 tdb_delete(ttdb
, kbuf
);
106 /****************************************************************************
107 Delete all old unexpected packets.
108 **************************************************************************/
110 void clear_unexpected(time_t t
)
114 if ((lastt
!= 0) && (t
< lastt
+ NMBD_UNEXPECTED_TIMEOUT
))
119 tdb_traverse(tdbd
->tdb
, traverse_fn
, NULL
);
122 struct receive_unexpected_state
{
123 struct packet_struct
*matched_packet
;
125 enum packet_type match_type
;
126 const char *match_name
;
129 /****************************************************************************
130 tdb traversal fn to find a matching 137 packet.
131 **************************************************************************/
133 static int traverse_match(TDB_CONTEXT
*ttdb
, TDB_DATA kbuf
, TDB_DATA dbuf
,
136 struct receive_unexpected_state
*state
=
137 (struct receive_unexpected_state
*)private_data
;
138 struct unexpected_key key
;
142 struct packet_struct
*p
;
144 if (kbuf
.dsize
!= sizeof(key
)) {
148 memcpy(&key
, kbuf
.dptr
, sizeof(key
));
150 if (key
.packet_type
!= state
->match_type
) return 0;
152 if (dbuf
.dsize
< 6) {
156 /* Decode the ip addr and port. */
157 enc_ip
= IVAL(dbuf
.dptr
,0);
158 ip
.s_addr
= htonl(enc_ip
);
159 port
= SVAL(dbuf
.dptr
,4);
161 p
= parse_packet((char *)&dbuf
.dptr
[6],
169 if ((state
->match_type
== NMB_PACKET
&&
170 p
->packet
.nmb
.header
.name_trn_id
== state
->match_id
) ||
171 (state
->match_type
== DGRAM_PACKET
&&
172 match_mailslot_name(p
, state
->match_name
))) {
173 state
->matched_packet
= p
;
182 /****************************************************************************
183 Check for a particular packet in the unexpected packet queue.
184 **************************************************************************/
186 struct packet_struct
*receive_unexpected(enum packet_type packet_type
, int id
,
187 const char *mailslot_name
)
189 struct tdb_wrap
*tdb2
;
190 struct receive_unexpected_state state
;
192 tdb2
= tdb_wrap_open(talloc_autofree_context(),
193 lock_path("unexpected.tdb"), 0, 0, O_RDONLY
, 0);
194 if (!tdb2
) return NULL
;
196 state
.matched_packet
= NULL
;
198 state
.match_type
= packet_type
;
199 state
.match_name
= mailslot_name
;
201 tdb_traverse(tdb2
->tdb
, traverse_match
, &state
);
205 return state
.matched_packet
;