dns: The QCLASS is called IN, not IP
[Samba/gebeck_regimport.git] / source4 / libcli / raw / rawnegotiate.c
blob9d6c9ffaf27f36d7c4a5ce0a697d54bf2c35a3b9
1 /*
2 Unix SMB/CIFS implementation.
4 SMB client negotiate context management functions
6 Copyright (C) Andrew Tridgell 1994-2005
7 Copyright (C) James Myers 2003 <myersjj@samba.org>
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>.
23 #include "includes.h"
24 #include "libcli/raw/libcliraw.h"
25 #include "libcli/raw/raw_proto.h"
26 #include "system/time.h"
28 static const struct {
29 enum protocol_types prot;
30 const char *name;
31 } prots[] = {
32 {PROTOCOL_CORE,"PC NETWORK PROGRAM 1.0"},
33 {PROTOCOL_COREPLUS,"MICROSOFT NETWORKS 1.03"},
34 {PROTOCOL_LANMAN1,"MICROSOFT NETWORKS 3.0"},
35 {PROTOCOL_LANMAN1,"LANMAN1.0"},
36 {PROTOCOL_LANMAN1,"Windows for Workgroups 3.1a"},
37 {PROTOCOL_LANMAN2,"LM1.2X002"},
38 {PROTOCOL_LANMAN2,"DOS LANMAN2.1"},
39 {PROTOCOL_LANMAN2,"LANMAN2.1"},
40 {PROTOCOL_LANMAN2,"Samba"},
41 {PROTOCOL_NT1,"NT LANMAN 1.0"},
42 {PROTOCOL_NT1,"NT LM 0.12"},
43 #if 0
44 /* we don't yet handle chaining a SMB transport onto SMB2 */
45 {PROTOCOL_SMB2_02,"SMB 2.002"},
46 #endif
50 Send a negprot command.
52 struct smbcli_request *smb_raw_negotiate_send(struct smbcli_transport *transport,
53 bool unicode,
54 int maxprotocol)
56 struct smbcli_request *req;
57 int i;
58 uint16_t flags2 = 0;
60 req = smbcli_request_setup_transport(transport, SMBnegprot, 0, 0);
61 if (!req) {
62 return NULL;
65 if (transport->options.ntstatus_support) {
66 flags2 |= FLAGS2_32_BIT_ERROR_CODES;
69 if (unicode) {
70 flags2 |= FLAGS2_UNICODE_STRINGS;
72 flags2 |= FLAGS2_EXTENDED_ATTRIBUTES;
73 flags2 |= FLAGS2_LONG_PATH_COMPONENTS;
74 flags2 |= FLAGS2_IS_LONG_NAME;
76 if (transport->options.use_spnego) {
77 flags2 |= FLAGS2_EXTENDED_SECURITY;
80 SSVAL(req->out.hdr,HDR_FLG2, flags2);
82 /* setup the protocol strings */
83 for (i=0; i < ARRAY_SIZE(prots) && prots[i].prot <= maxprotocol; i++) {
84 smbcli_req_append_bytes(req, (const uint8_t *)"\2", 1);
85 smbcli_req_append_string(req, prots[i].name, STR_TERMINATE | STR_ASCII);
88 if (!smbcli_request_send(req)) {
89 smbcli_request_destroy(req);
90 return NULL;
93 return req;
97 Send a negprot command.
99 NTSTATUS smb_raw_negotiate_recv(struct smbcli_request *req)
101 struct smbcli_transport *transport = req->transport;
102 int protocol;
104 if (!smbcli_request_receive(req) ||
105 smbcli_request_is_error(req)) {
106 return smbcli_request_destroy(req);
109 SMBCLI_CHECK_MIN_WCT(req, 1);
111 protocol = SVALS(req->in.vwv, VWV(0));
113 if (protocol >= ARRAY_SIZE(prots) || protocol < 0) {
114 req->status = NT_STATUS_UNSUCCESSFUL;
115 return smbcli_request_destroy(req);
118 transport->negotiate.protocol = prots[protocol].prot;
120 if (transport->negotiate.protocol >= PROTOCOL_NT1) {
121 NTTIME ntt;
123 /* NT protocol */
124 SMBCLI_CHECK_WCT(req, 17);
125 transport->negotiate.sec_mode = CVAL(req->in.vwv,VWV(1));
126 transport->negotiate.max_mux = SVAL(req->in.vwv,VWV(1)+1);
127 transport->negotiate.max_xmit = IVAL(req->in.vwv,VWV(3)+1);
128 transport->negotiate.sesskey = IVAL(req->in.vwv,VWV(7)+1);
129 transport->negotiate.capabilities = IVAL(req->in.vwv,VWV(9)+1);
131 /* this time arrives in real GMT */
132 ntt = smbcli_pull_nttime(req->in.vwv, VWV(11)+1);
133 transport->negotiate.server_time = nt_time_to_unix(ntt);
134 transport->negotiate.server_zone = SVALS(req->in.vwv,VWV(15)+1) * 60;
135 transport->negotiate.key_len = CVAL(req->in.vwv,VWV(16)+1);
137 if (transport->negotiate.capabilities & CAP_EXTENDED_SECURITY) {
138 if (req->in.data_size < 16) {
139 goto failed;
141 transport->negotiate.server_guid = smbcli_req_pull_blob(&req->in.bufinfo, transport, req->in.data, 16);
142 transport->negotiate.secblob = smbcli_req_pull_blob(&req->in.bufinfo, transport, req->in.data + 16, req->in.data_size - 16);
143 } else {
144 if (req->in.data_size < (transport->negotiate.key_len)) {
145 goto failed;
147 transport->negotiate.secblob = smbcli_req_pull_blob(&req->in.bufinfo, transport, req->in.data, transport->negotiate.key_len);
148 smbcli_req_pull_string(&req->in.bufinfo, transport, &transport->negotiate.server_domain,
149 req->in.data+transport->negotiate.key_len,
150 req->in.data_size-transport->negotiate.key_len, STR_UNICODE|STR_NOALIGN);
151 /* here comes the server name */
154 if (transport->negotiate.capabilities & CAP_RAW_MODE) {
155 transport->negotiate.readbraw_supported = true;
156 transport->negotiate.writebraw_supported = true;
159 if (transport->negotiate.capabilities & CAP_LOCK_AND_READ)
160 transport->negotiate.lockread_supported = true;
161 } else if (transport->negotiate.protocol >= PROTOCOL_LANMAN1) {
162 SMBCLI_CHECK_WCT(req, 13);
163 transport->negotiate.sec_mode = SVAL(req->in.vwv,VWV(1));
164 transport->negotiate.max_xmit = SVAL(req->in.vwv,VWV(2));
165 transport->negotiate.sesskey = IVAL(req->in.vwv,VWV(6));
166 transport->negotiate.server_zone = SVALS(req->in.vwv,VWV(10)) * 60;
168 /* this time is converted to GMT by raw_pull_dos_date */
169 transport->negotiate.server_time = raw_pull_dos_date(transport,
170 req->in.vwv+VWV(8));
171 if ((SVAL(req->in.vwv,VWV(5)) & 0x1)) {
172 transport->negotiate.readbraw_supported = 1;
174 if ((SVAL(req->in.vwv,VWV(5)) & 0x2)) {
175 transport->negotiate.writebraw_supported = 1;
177 transport->negotiate.secblob = smbcli_req_pull_blob(&req->in.bufinfo, transport,
178 req->in.data, req->in.data_size);
179 } else {
180 /* the old core protocol */
181 transport->negotiate.sec_mode = 0;
182 transport->negotiate.server_time = time(NULL);
183 transport->negotiate.max_xmit = transport->options.max_xmit;
184 transport->negotiate.server_zone = get_time_zone(transport->negotiate.server_time);
187 /* a way to force ascii SMB */
188 if (!transport->options.unicode) {
189 transport->negotiate.capabilities &= ~CAP_UNICODE;
192 if (!transport->options.ntstatus_support) {
193 transport->negotiate.capabilities &= ~CAP_STATUS32;
196 if (!transport->options.use_level2_oplocks) {
197 transport->negotiate.capabilities &= ~CAP_LEVEL_II_OPLOCKS;
200 failed:
201 return smbcli_request_destroy(req);
206 Send a negprot command (sync interface)
208 NTSTATUS smb_raw_negotiate(struct smbcli_transport *transport, bool unicode, int maxprotocol)
210 struct smbcli_request *req = smb_raw_negotiate_send(transport, unicode, maxprotocol);
211 return smb_raw_negotiate_recv(req);