📄 clientgen.c
字号:
/* Unix SMB/Netbios implementation. Version 1.9. SMB client generic functions Copyright (C) Andrew Tridgell 1994-1998 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.*/#define NO_SYSLOG#include "includes.h"#include "trans2.h"extern int DEBUGLEVEL;extern pstring user_socket_options;/* * Change the port number used to call on */int cli_set_port(struct cli_state *cli, int port){ if (port > 0) cli -> port = port; return cli -> port;}/****************************************************************************recv an smb****************************************************************************/static BOOL cli_receive_smb(struct cli_state *cli){ return client_receive_smb(cli->fd,cli->inbuf,cli->timeout);}/**************************************************************************** send an smb to a fd and re-establish if necessary****************************************************************************/static BOOL cli_send_smb(struct cli_state *cli){ size_t len; size_t nwritten=0; ssize_t ret; BOOL reestablished=False; len = smb_len(cli->outbuf) + 4; while (nwritten < len) { ret = write_socket(cli->fd,cli->outbuf+nwritten,len - nwritten); if (ret <= 0 && errno == EPIPE && !reestablished) { if (cli_reestablish_connection(cli)) { reestablished = True; nwritten=0; continue; } } if (ret <= 0) { DEBUG(0,("Error writing %d bytes to client. %d. Exiting\n", (int)len,(int)ret)); close_sockets(); exit(1); } nwritten += ret; } return True;}/***************************************************** RAP error codes - a small start but will be extended.*******************************************************/struct{ int err; char *message;} const rap_errmap[] ={ {5, "User has insufficient privilege" }, {86, "The specified password is invalid" }, {2226, "Operation only permitted on a Primary Domain Controller" }, {2242, "The password of this user has expired." }, {2243, "The password of this user cannot change." }, {2244, "This password cannot be used now (password history conflict)." }, {2245, "The password is shorter than required." }, {2246, "The password of this user is too recent to change."}, {0, NULL}}; /**************************************************************************** return a description of an SMB error****************************************************************************/static char *cli_smb_errstr(struct cli_state *cli){ return smb_errstr(cli->inbuf);}/****************************************************** Return an error message - either an SMB error or a RAP error.*******************************************************/ char *cli_errstr(struct cli_state *cli){ static fstring error_message; uint8 errclass; uint32 errnum; uint32 nt_rpc_error; int i; /* * Errors are of three kinds - smb errors, * dealt with by cli_smb_errstr, NT errors, * whose code is in cli.nt_error, and rap * errors, whose error code is in cli.rap_error. */ cli_error(cli, &errclass, &errnum, &nt_rpc_error); if (errclass != 0) { return cli_smb_errstr(cli); } /* * Was it an NT error ? */ if (nt_rpc_error) { const char *nt_msg = get_nt_error_msg(nt_rpc_error); if (nt_msg == NULL) { slprintf(error_message, sizeof(fstring) - 1, "NT code %d", nt_rpc_error); } else { fstrcpy(error_message, nt_msg); } return error_message; } /* * Must have been a rap error. */ slprintf(error_message, sizeof(error_message) - 1, "code %d", cli->rap_error); for (i = 0; rap_errmap[i].message != NULL; i++) { if (rap_errmap[i].err == cli->rap_error) { fstrcpy( error_message, rap_errmap[i].message); break; } } return error_message;}/****************************************************************************setup basics in a outgoing packet****************************************************************************/static void cli_setup_packet(struct cli_state *cli){ cli->rap_error = 0; cli->nt_error = 0; SSVAL(cli->outbuf,smb_pid,cli->pid); SSVAL(cli->outbuf,smb_uid,cli->vuid); SSVAL(cli->outbuf,smb_mid,cli->mid); if (cli->protocol > PROTOCOL_CORE) { SCVAL(cli->outbuf,smb_flg,0x8); SSVAL(cli->outbuf,smb_flg2,0x1); }}#if 0/***************************************************************************** Convert a character pointer in a cli_call_api() response to a form we can use. This function contains code to prevent core dumps if the server returns invalid data.*****************************************************************************/static char *fix_char_ptr(unsigned int datap, unsigned int converter, char *rdata, int rdrcnt){ if (datap == 0) { /* turn NULL pointers into zero length strings */ return ""; } else { unsigned int offset = datap - converter; if (offset >= rdrcnt) { DEBUG(1,("bad char ptr: datap=%u, converter=%u rdrcnt=%d>", datap, converter, rdrcnt)); return "<ERROR>"; } else { return &rdata[offset]; } }}#endif /* 0 *//**************************************************************************** send a SMB trans or trans2 request ****************************************************************************/static BOOL cli_send_trans(struct cli_state *cli, int trans, char *name, int pipe_name_len, int fid, int flags, uint16 *setup, int lsetup, int msetup, char *param, int lparam, int mparam, char *data, int ldata, int mdata){ int i; int this_ldata,this_lparam; int tot_data=0,tot_param=0; char *outdata,*outparam; char *p; this_lparam = MIN(lparam,cli->max_xmit - (500+lsetup*2)); /* hack */ this_ldata = MIN(ldata,cli->max_xmit - (500+lsetup*2+this_lparam)); memset(cli->outbuf,'\0',smb_size); set_message(cli->outbuf,14+lsetup,0,True); CVAL(cli->outbuf,smb_com) = trans; SSVAL(cli->outbuf,smb_tid, cli->cnum); cli_setup_packet(cli); outparam = smb_buf(cli->outbuf)+(trans==SMBtrans ? pipe_name_len+1 : 3); outdata = outparam+this_lparam; /* primary request */ SSVAL(cli->outbuf,smb_tpscnt,lparam); /* tpscnt */ SSVAL(cli->outbuf,smb_tdscnt,ldata); /* tdscnt */ SSVAL(cli->outbuf,smb_mprcnt,mparam); /* mprcnt */ SSVAL(cli->outbuf,smb_mdrcnt,mdata); /* mdrcnt */ SCVAL(cli->outbuf,smb_msrcnt,msetup); /* msrcnt */ SSVAL(cli->outbuf,smb_flags,flags); /* flags */ SIVAL(cli->outbuf,smb_timeout,0); /* timeout */ SSVAL(cli->outbuf,smb_pscnt,this_lparam); /* pscnt */ SSVAL(cli->outbuf,smb_psoff,smb_offset(outparam,cli->outbuf)); /* psoff */ SSVAL(cli->outbuf,smb_dscnt,this_ldata); /* dscnt */ SSVAL(cli->outbuf,smb_dsoff,smb_offset(outdata,cli->outbuf)); /* dsoff */ SCVAL(cli->outbuf,smb_suwcnt,lsetup); /* suwcnt */ for (i=0;i<lsetup;i++) /* setup[] */ SSVAL(cli->outbuf,smb_setup+i*2,setup[i]); p = smb_buf(cli->outbuf); if (trans==SMBtrans) { memcpy(p,name, pipe_name_len + 1); /* name[] */ } else { *p++ = 0; /* put in a null smb_name */ *p++ = 'D'; *p++ = ' '; /* observed in OS/2 */ } if (this_lparam) /* param[] */ memcpy(outparam,param,this_lparam); if (this_ldata) /* data[] */ memcpy(outdata,data,this_ldata); set_message(cli->outbuf,14+lsetup, /* wcnt, bcc */ PTR_DIFF(outdata+this_ldata,smb_buf(cli->outbuf)),False); show_msg(cli->outbuf); cli_send_smb(cli); if (this_ldata < ldata || this_lparam < lparam) { /* receive interim response */ if (!cli_receive_smb(cli) || CVAL(cli->inbuf,smb_rcls) != 0) { return(False); } tot_data = this_ldata; tot_param = this_lparam; while (tot_data < ldata || tot_param < lparam) { this_lparam = MIN(lparam-tot_param,cli->max_xmit - 500); /* hack */ this_ldata = MIN(ldata-tot_data,cli->max_xmit - (500+this_lparam)); set_message(cli->outbuf,trans==SMBtrans?8:9,0,True); CVAL(cli->outbuf,smb_com) = trans==SMBtrans ? SMBtranss : SMBtranss2; outparam = smb_buf(cli->outbuf); outdata = outparam+this_lparam; /* secondary request */ SSVAL(cli->outbuf,smb_tpscnt,lparam); /* tpscnt */ SSVAL(cli->outbuf,smb_tdscnt,ldata); /* tdscnt */ SSVAL(cli->outbuf,smb_spscnt,this_lparam); /* pscnt */ SSVAL(cli->outbuf,smb_spsoff,smb_offset(outparam,cli->outbuf)); /* psoff */ SSVAL(cli->outbuf,smb_spsdisp,tot_param); /* psdisp */ SSVAL(cli->outbuf,smb_sdscnt,this_ldata); /* dscnt */ SSVAL(cli->outbuf,smb_sdsoff,smb_offset(outdata,cli->outbuf)); /* dsoff */ SSVAL(cli->outbuf,smb_sdsdisp,tot_data); /* dsdisp */ if (trans==SMBtrans2) SSVALS(cli->outbuf,smb_sfid,fid); /* fid */ if (this_lparam) /* param[] */ memcpy(outparam,param,this_lparam); if (this_ldata) /* data[] */ memcpy(outdata,data,this_ldata); set_message(cli->outbuf,trans==SMBtrans?8:9, /* wcnt, bcc */ PTR_DIFF(outdata+this_ldata,smb_buf(cli->outbuf)),False); show_msg(cli->outbuf); cli_send_smb(cli); tot_data += this_ldata; tot_param += this_lparam; } } return(True);}/**************************************************************************** receive a SMB trans or trans2 response allocating the necessary memory ****************************************************************************/static BOOL cli_receive_trans(struct cli_state *cli,int trans, char **param, int *param_len, char **data, int *data_len){ int total_data=0; int total_param=0; int this_data,this_param; uint8 eclass; uint32 ecode; *data_len = *param_len = 0; if (!cli_receive_smb(cli)) return False; show_msg(cli->inbuf); /* sanity check */ if (CVAL(cli->inbuf,smb_com) != trans) { DEBUG(0,("Expected %s response, got command 0x%02x\n", trans==SMBtrans?"SMBtrans":"SMBtrans2", CVAL(cli->inbuf,smb_com))); return(False); } /* * An NT RPC pipe call can return ERRDOS, ERRmoredata * to a trans call. This is not an error and should not * be treated as such. */ if (cli_error(cli, &eclass, &ecode, NULL)) { if(cli->nt_pipe_fnum == 0 || !(eclass == ERRDOS && ecode == ERRmoredata)) return(False); } /* parse out the lengths */ total_data = SVAL(cli->inbuf,smb_tdrcnt); total_param = SVAL(cli->inbuf,smb_tprcnt); /* allocate it */ *data = Realloc(*data,total_data); *param = Realloc(*param,total_param); while (1) { this_data = SVAL(cli->inbuf,smb_drcnt); this_param = SVAL(cli->inbuf,smb_prcnt); if (this_data + *data_len > total_data || this_param + *param_len > total_param) { DEBUG(1,("Data overflow in cli_receive_trans\n")); return False; } if (this_data) memcpy(*data + SVAL(cli->inbuf,smb_drdisp), smb_base(cli->inbuf) + SVAL(cli->inbuf,smb_droff), this_data); if (this_param) memcpy(*param + SVAL(cli->inbuf,smb_prdisp), smb_base(cli->inbuf) + SVAL(cli->inbuf,smb_proff), this_param); *data_len += this_data; *param_len += this_param; /* parse out the total lengths again - they can shrink! */ total_data = SVAL(cli->inbuf,smb_tdrcnt); total_param = SVAL(cli->inbuf,smb_tprcnt); if (total_data <= *data_len && total_param <= *param_len) break; if (!cli_receive_smb(cli)) return False; show_msg(cli->inbuf); /* sanity check */ if (CVAL(cli->inbuf,smb_com) != trans) { DEBUG(0,("Expected %s response, got command 0x%02x\n", trans==SMBtrans?"SMBtrans":"SMBtrans2", CVAL(cli->inbuf,smb_com))); return(False); } if (cli_error(cli, &eclass, &ecode, NULL)) { if(cli->nt_pipe_fnum == 0 || !(eclass == ERRDOS && ecode == ERRmoredata)) return(False); } } return(True);}/****************************************************************************Call a remote api on an arbitrary pipe. takes param, data and setup buffers.****************************************************************************/BOOL cli_api_pipe(struct cli_state *cli, char *pipe_name, int pipe_name_len, uint16 *setup, uint32 setup_count, uint32 max_setup_count, char *params, uint32 param_count, uint32 max_param_count, char *data, uint32 data_count, uint32 max_data_count, char **rparam, uint32 *rparam_count, char **rdata, uint32 *rdata_count){ if (pipe_name_len == 0) pipe_name_len = strlen(pipe_name); cli_send_trans(cli, SMBtrans, pipe_name, pipe_name_len, 0,0, /* fid, flags */ setup, setup_count, max_setup_count, params, param_count, max_param_count, data, data_count, max_data_count); return (cli_receive_trans(cli, SMBtrans, rparam, (int *)rparam_count, rdata, (int *)rdata_count));}/****************************************************************************call a remote api****************************************************************************/BOOL cli_api(struct cli_state *cli, char *param, int prcnt, int mprcnt, char *data, int drcnt, int mdrcnt, char **rparam, int *rprcnt, char **rdata, int *rdrcnt){ cli_send_trans(cli,SMBtrans, PIPE_LANMAN,strlen(PIPE_LANMAN), /* Name, length */ 0,0, /* fid, flags */ NULL,0,0, /* Setup, length, max */ param, prcnt, mprcnt, /* Params, length, max */ data, drcnt, mdrcnt /* Data, length, max */ ); return (cli_receive_trans(cli,SMBtrans, rparam, rprcnt, rdata, rdrcnt));}/****************************************************************************perform a NetWkstaUserLogon****************************************************************************/BOOL cli_NetWkstaUserLogon(struct cli_state *cli,char *user, char *workstation){ char *rparam = NULL; char *rdata = NULL; char *p; int rdrcnt,rprcnt; pstring param; memset(param, 0, sizeof(param)); /* send a SMBtrans command with api NetWkstaUserLogon */ p = param; SSVAL(p,0,132); /* api number */ p += 2; pstrcpy(p,"OOWb54WrLh"); p = skip_string(p,1); pstrcpy(p,"WB21BWDWWDDDDDDDzzzD"); p = skip_string(p,1); SSVAL(p,0,1);
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -