summaryrefslogtreecommitdiff
path: root/daemon/smblib/smblib-api.c
diff options
context:
space:
mode:
authorStef Walter <stef@memberwebs.com>2004-04-21 17:37:06 +0000
committerStef Walter <stef@memberwebs.com>2004-04-21 17:37:06 +0000
commitff76efc3e5e1b0e4ca3b10b7402406f619509bba (patch)
treec3b1e49235f67eabd22d31ebfc14934743b70858 /daemon/smblib/smblib-api.c
parent01430fca169c1b8d7b1b4f1bdd529aa6bc4be80b (diff)
Initial Import
Diffstat (limited to 'daemon/smblib/smblib-api.c')
-rw-r--r--daemon/smblib/smblib-api.c379
1 files changed, 379 insertions, 0 deletions
diff --git a/daemon/smblib/smblib-api.c b/daemon/smblib/smblib-api.c
new file mode 100644
index 0000000..f74e5fd
--- /dev/null
+++ b/daemon/smblib/smblib-api.c
@@ -0,0 +1,379 @@
+/* UNIX SMBlib NetBIOS implementation
+
+ Version 1.0
+ SMB API Calls ...
+
+ Copyright (C) Richard Sharpe 1996
+
+*/
+
+/*
+ This program is free software; you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published by
+ the Free Software Foundation; either version 2 of the License, or
+ (at your option) any later version.
+
+ This program is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ GNU General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with this program; if not, write to the Free Software
+ Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
+*/
+
+#include "smblib-priv.h"
+#include "../rfcnb/rfcnb.h"
+
+SMB_Tree_Handle SMBapi_Tree = NULL;
+
+/* Send an api request to the \\server\IPC$ tree, with a \PIPE\LANMAN api */
+/* request to change the user's password */
+
+#define SMB_LMAPI_SLOT "\\PIPE\\LANMAN"
+#define SMB_LMAPI_SUPW_DESC "zb16b16WW"
+
+int SMBapi_NetUserPasswordSet(SMB_Tree_Handle tree, char *user,
+ char *oldpass, char *newpass, int *apiStatus)
+
+{ struct RFCNB_Pkt *pkt;
+ int param_len, i, pkt_len, pad_api_name = FALSE;
+ char *p;
+
+ /* Get a packet, we need one with space for a transact plus. The calc */
+ /* below lays it all out as it is, including the empty string after the */
+ /* descriptor and before the username */
+
+ param_len = 2 + strlen(SMB_LMAPI_SUPW_DESC) + 1 +
+ 1 /* for empty string :-) */ + strlen(user) +
+ 1 + 16 + 16 + 2 + 2;
+
+ /* We have no setup words, wo we don't account for them */
+
+ pkt_len = SMB_trans_len + 2 /* for bcc */ + strlen(SMB_LMAPI_SLOT) + 1;
+
+ /* Pad things onto a word boundary ... */
+
+ if (pkt_len & 0x0001) {
+ pkt_len = pkt_len + 1;
+ pad_api_name = TRUE;
+ }
+
+
+ pkt_len = pkt_len + param_len;
+
+ /* Now allocate space for the packet, build it and send it */
+
+ pkt = (struct RFCNB_Pkt *)RFCNB_Alloc_Pkt(pkt_len);
+
+ if (pkt == NULL) {
+
+ SMBlib_errno = SMBlibE_NoSpace;
+ return(SMBlibE_BAD); /* Should handle the error */
+
+ }
+
+ bzero(SMB_Hdr(pkt), SMB_trans_len);
+ SIVAL(SMB_Hdr(pkt), SMB_hdr_idf_offset, SMB_DEF_IDF); /* Plunk in IDF */
+ *(SMB_Hdr(pkt) + SMB_hdr_com_offset) = SMBtrans;
+ SSVAL(SMB_Hdr(pkt), SMB_hdr_pid_offset, tree -> con -> pid);
+ SSVAL(SMB_Hdr(pkt), SMB_hdr_tid_offset, tree -> tid);
+ SSVAL(SMB_Hdr(pkt), SMB_hdr_mid_offset, tree -> con -> mid);
+ SSVAL(SMB_Hdr(pkt), SMB_hdr_uid_offset, tree -> con -> uid);
+ *(SMB_Hdr(pkt) + SMB_hdr_wct_offset) = 14;
+
+ SSVAL(SMB_Hdr(pkt), SMB_trans_tpc_offset, param_len);
+ SSVAL(SMB_Hdr(pkt), SMB_trans_tdc_offset, 0);
+ SSVAL(SMB_Hdr(pkt), SMB_trans_mpc_offset, 4);
+ SSVAL(SMB_Hdr(pkt), SMB_trans_mdc_offset, 0);
+ SSVAL(SMB_Hdr(pkt), SMB_trans_msc_offset, 0);
+ SSVAL(SMB_Hdr(pkt), SMB_trans_flg_offset, 0);
+ SIVAL(SMB_Hdr(pkt), SMB_trans_tmo_offset, 5000);
+ SSVAL(SMB_Hdr(pkt), SMB_trans_pbc_offset, param_len);
+ SSVAL(SMB_Hdr(pkt), SMB_trans_pbo_offset, SMB_trans_len + 2 +
+ strlen(SMB_LMAPI_SLOT) + 1);
+ SSVAL(SMB_Hdr(pkt), SMB_trans_dbc_offset, 0);
+ SSVAL(SMB_Hdr(pkt), SMB_trans_dbo_offset, 0);
+
+ /* Now put in the bcc and the rest of the info ... */
+
+ SSVAL(SMB_Hdr(pkt), SMB_trans_len, param_len + strlen(SMB_LMAPI_SLOT) + 1);
+
+ p = SMB_Hdr(pkt) + SMB_trans_len + 2; /* Skip the BCC and ect */
+
+ strcpy(p, SMB_LMAPI_SLOT);
+ p = p + strlen(SMB_LMAPI_SLOT) + 1;
+
+ if (pad_api_name == TRUE) /* Pad if we need to */
+ p = p + 1;
+
+/* SSVAL(p, 0, 65000); /* Check the result */
+ SSVAL(p, 0, SMB_LMapi_UserPasswordSet); /* The api call */
+
+ p = p + 2;
+
+ strcpy(p, SMB_LMAPI_SUPW_DESC); /* Copy in the param desc */
+
+ p = p + strlen(SMB_LMAPI_SUPW_DESC) + 1;
+
+ *p = 0; /* Stick in that null string */
+ p = p + 1;
+
+ strcpy(p, user);
+
+ p = p + strlen(user) + 1;
+
+ strncpy(p, oldpass, 16);
+
+ p = p + 16;
+
+ strncpy(p, newpass, 16);
+
+ p = p + 16;
+
+ SSVAL(p, 0, 0); /* Seems to be zero always? */
+ SSVAL(p, 2, strlen(newpass)); /* Length of new password ...*/
+
+ /* Now send the lot and get a response ... */
+
+ if (RFCNB_Send(tree -> con -> Trans_Connect, pkt, pkt_len) < 0){
+
+#ifdef DEBUG
+ fprintf(stderr, "Error sending Trans request\n");
+#endif
+
+ RFCNB_Free_Pkt(pkt);
+ SMBlib_errno = SMBlibE_SendFailed;
+ return(SMBlibE_BAD);
+
+ }
+
+ /* Now get the response ... */
+
+ if (RFCNB_Recv(tree -> con -> Trans_Connect, pkt, pkt_len) < 0) {
+
+#ifdef DEBUG
+ fprintf(stderr, "Error receiving response to Trans request\n");
+#endif
+
+ RFCNB_Free_Pkt(pkt);
+ SMBlib_errno = SMBlibE_RecvFailed;
+ return(SMBlibE_BAD);
+
+ }
+
+ /* Check out the response type ... */
+
+ if (CVAL(SMB_Hdr(pkt), SMB_hdr_rcls_offset) != SMBC_SUCCESS) { /* Process error */
+
+#ifdef DEBUG
+ fprintf(stderr, "SMB_trans failed with errorclass = %i, Error Code = %i\n",
+ CVAL(SMB_Hdr(pkt), SMB_hdr_rcls_offset),
+ SVAL(SMB_Hdr(pkt), SMB_hdr_err_offset));
+#endif
+
+ SMBlib_SMB_Error = IVAL(SMB_Hdr(pkt), SMB_hdr_rcls_offset);
+ RFCNB_Free_Pkt(pkt);
+ SMBlib_errno = SMBlibE_Remote;
+ return(SMBlibE_BAD);
+
+ }
+
+ /* All ok, pass back the status */
+
+ *apiStatus = SVAL(SMB_Hdr(pkt), SVAL(SMB_Hdr(pkt), SMB_transr_pbo_offset));
+ RFCNB_Free_Pkt(pkt);
+
+ return(0);
+
+}
+
+#define SMB_LMAPI_SUI_DESC "zWsTPWW"
+#define SMB_LMAPI_SUI_DATA_DESC "B16"
+
+
+/* Set user info ... specifically, password */
+
+int SMBapi_NetSetUserInfo(SMB_Tree_Handle tree, char *user,
+ char *newpass, int *apiStatus)
+
+{ struct RFCNB_Pkt *pkt;
+ int param_len, i, pkt_len, data_len, pad_api_name = FALSE;
+ int pad_params = FALSE;
+ char *p;
+
+ /* Get a packet, we need one with space for a transact plus. The calc */
+ /* below lays it all out as it is, including the empty string after the */
+ /* descriptor and before the username */
+
+ param_len = 2 + strlen(SMB_LMAPI_SUI_DESC) + 1 +
+ + strlen(SMB_LMAPI_SUI_DATA_DESC) + 1 + strlen(user) +
+ 1 + 2 + 2 + 2 + 2;
+
+ data_len = 16;
+
+ /* We have no setup words, so we don't account for them */
+
+ pkt_len = SMB_trans_len + 2 /* for bcc */ + strlen(SMB_LMAPI_SLOT) + 1;
+
+ if (pkt_len & 0x0001) { /* Pad to a WORD boundary */
+
+ pad_api_name = TRUE;
+
+ }
+
+ if (param_len & 0x0001) { /* pad to a WORD boundary */
+
+ pad_params = TRUE;
+
+ }
+
+ pkt_len = pkt_len + param_len + data_len;
+
+ if (pad_api_name == TRUE) pkt_len = pkt_len + 1;
+ if (pad_params == TRUE) pkt_len = pkt_len + 1;
+
+ /* Now allocate space for the packet, build it and send it */
+
+ pkt = (struct RFCNB_Pkt *)RFCNB_Alloc_Pkt(pkt_len);
+
+ if (pkt == NULL) {
+
+ SMBlib_errno = SMBlibE_NoSpace;
+ return(SMBlibE_BAD); /* Should handle the error */
+
+ }
+
+ bzero(SMB_Hdr(pkt), SMB_trans_len);
+ SIVAL(SMB_Hdr(pkt), SMB_hdr_idf_offset, SMB_DEF_IDF); /* Plunk in IDF */
+ *(SMB_Hdr(pkt) + SMB_hdr_com_offset) = SMBtrans;
+ SSVAL(SMB_Hdr(pkt), SMB_hdr_pid_offset, tree -> con -> pid);
+ SSVAL(SMB_Hdr(pkt), SMB_hdr_tid_offset, tree -> tid);
+ SSVAL(SMB_Hdr(pkt), SMB_hdr_mid_offset, tree -> con -> mid);
+ SSVAL(SMB_Hdr(pkt), SMB_hdr_uid_offset, tree -> con -> uid);
+ *(SMB_Hdr(pkt) + SMB_hdr_wct_offset) = 14;
+
+ SSVAL(SMB_Hdr(pkt), SMB_trans_tpc_offset, param_len);
+ SSVAL(SMB_Hdr(pkt), SMB_trans_tdc_offset, data_len);
+ SSVAL(SMB_Hdr(pkt), SMB_trans_mpc_offset, 4);
+ SSVAL(SMB_Hdr(pkt), SMB_trans_mdc_offset, 0);
+ SSVAL(SMB_Hdr(pkt), SMB_trans_msc_offset, 0);
+ SSVAL(SMB_Hdr(pkt), SMB_trans_flg_offset, 0);
+ SIVAL(SMB_Hdr(pkt), SMB_trans_tmo_offset, 5000);
+ SSVAL(SMB_Hdr(pkt), SMB_trans_pbc_offset, param_len);
+ SSVAL(SMB_Hdr(pkt), SMB_trans_pbo_offset, SMB_trans_len + 2 +
+ strlen(SMB_LMAPI_SLOT) + 1);
+ SSVAL(SMB_Hdr(pkt), SMB_trans_dbc_offset, data_len);
+ SSVAL(SMB_Hdr(pkt), SMB_trans_dbo_offset, pkt_len - data_len);
+
+ /* Now put in the bcc and the rest of the info ... */
+
+ SSVAL(SMB_Hdr(pkt), SMB_trans_len, param_len + strlen(SMB_LMAPI_SLOT) +
+ 1 + data_len);
+
+ p = SMB_Hdr(pkt) + SMB_trans_len + 2; /* Skip the BCC and ect */
+
+ strcpy(p, SMB_LMAPI_SLOT);
+ p = p + strlen(SMB_LMAPI_SLOT) + 1;
+
+ if (pad_api_name == TRUE) /* Pad to a word boundary */
+ p = p + 1;
+
+/* SSVAL(p, 0, 65000); /* Check the result */
+ SSVAL(p, 0, SMB_LMapi_SetUserInfo); /* The api call */
+
+ p = p + 2;
+
+ strcpy(p, SMB_LMAPI_SUI_DESC); /* Copy in the param desc */
+
+ p = p + strlen(SMB_LMAPI_SUI_DESC) + 1;
+
+ strcpy(p, SMB_LMAPI_SUI_DATA_DESC); /* Copy in second descriptor */
+
+ p = p + strlen(SMB_LMAPI_SUI_DATA_DESC) + 1;
+
+ strcpy(p, user);
+
+ p = p + strlen(user) + 1;
+
+ SSVAL(p, 0, 1); /* Claim that we have a level 1 struct ? */
+
+ p = p + 2;
+
+ SSVAL(p, 0, 3); /* Set the password */
+ SSVAL(p, 2, 1); /* Seems to be one ... */
+ SSVAL(p, 4, strlen(newpass)); /* Length of new password ...*/
+
+ /* Now copy the data in ... */
+
+ p = p + 6;
+
+ if (pad_params == TRUE)
+ p = p + 1;
+
+ strcpy(p, newpass);
+
+ /* Now send the lot and get a response ... */
+
+ if (RFCNB_Send(tree -> con -> Trans_Connect, pkt, pkt_len) < 0){
+
+#ifdef DEBUG
+ fprintf(stderr, "Error sending Trans SetUserInfo request\n");
+#endif
+
+ RFCNB_Free_Pkt(pkt);
+ SMBlib_errno = SMBlibE_SendFailed;
+ return(SMBlibE_BAD);
+
+ }
+
+ /* Now get the response ... */
+
+ if (RFCNB_Recv(tree -> con -> Trans_Connect, pkt, pkt_len) < 0) {
+
+#ifdef DEBUG
+ fprintf(stderr, "Error receiving response to Trans SetUserInfo request\n");
+#endif
+
+ RFCNB_Free_Pkt(pkt);
+ SMBlib_errno = SMBlibE_RecvFailed;
+ return(SMBlibE_BAD);
+
+ }
+
+ /* Check out the response type ... */
+
+ if (CVAL(SMB_Hdr(pkt), SMB_hdr_rcls_offset) != SMBC_SUCCESS) { /* Process error */
+
+#ifdef DEBUG
+ fprintf(stderr, "SMB_trans SetUserInfo failed with errorclass = %i, Error Code = %i\n",
+ CVAL(SMB_Hdr(pkt), SMB_hdr_rcls_offset),
+ SVAL(SMB_Hdr(pkt), SMB_hdr_err_offset));
+#endif
+
+ SMBlib_SMB_Error = IVAL(SMB_Hdr(pkt), SMB_hdr_rcls_offset);
+ RFCNB_Free_Pkt(pkt);
+ SMBlib_errno = SMBlibE_Remote;
+ return(SMBlibE_BAD);
+
+ }
+
+ /* All ok, pass back the status */
+
+ *apiStatus = SVAL(SMB_Hdr(pkt), SVAL(SMB_Hdr(pkt), SMB_transr_pbo_offset));
+ RFCNB_Free_Pkt(pkt);
+
+ return(0);
+
+}
+
+/* List all the shares available on a server */
+
+int SMBapi_NetShareEnum(SMB_Tree_Handle tree, char *enum_buf, int bufsiz,
+ int *shares_returned, int *shares_total)
+
+{
+
+
+}