| /*************************************************************************** |
| * _ _ ____ _ |
| * Project ___| | | | _ \| | |
| * / __| | | | |_) | | |
| * | (__| |_| | _ <| |___ |
| * \___|\___/|_| \_\_____| |
| * |
| * Copyright (C) 2014, Bill Nagel <wnagel@tycoint.com>, Exacq Technologies |
| * Copyright (C) 2016-2017, Daniel Stenberg, <daniel@haxx.se>, et al. |
| * |
| * This software is licensed as described in the file COPYING, which |
| * you should have received as part of this distribution. The terms |
| * are also available at https://curl.haxx.se/docs/copyright.html. |
| * |
| * You may opt to use, copy, modify, merge, publish, distribute and/or sell |
| * copies of the Software, and permit persons to whom the Software is |
| * furnished to do so, under the terms of the COPYING file. |
| * |
| * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY |
| * KIND, either express or implied. |
| * |
| ***************************************************************************/ |
| |
| #include "curl_setup.h" |
| |
| #if !defined(CURL_DISABLE_SMB) && defined(USE_NTLM) && \ |
| (CURL_SIZEOF_CURL_OFF_T > 4) |
| |
| #if !defined(USE_WINDOWS_SSPI) || defined(USE_WIN32_CRYPTO) |
| |
| #define BUILDING_CURL_SMB_C |
| |
| #ifdef HAVE_PROCESS_H |
| #include <process.h> |
| #ifdef CURL_WINDOWS_APP |
| #define getpid GetCurrentProcessId |
| #elif !defined(MSDOS) |
| #define getpid _getpid |
| #endif |
| #endif |
| |
| #include "smb.h" |
| #include "urldata.h" |
| #include "sendf.h" |
| #include "multiif.h" |
| #include "connect.h" |
| #include "progress.h" |
| #include "transfer.h" |
| #include "vtls/vtls.h" |
| #include "curl_ntlm_core.h" |
| #include "escape.h" |
| #include "curl_endian.h" |
| |
| /* The last #include files should be: */ |
| #include "curl_memory.h" |
| #include "memdebug.h" |
| |
| /* Local API functions */ |
| static CURLcode smb_setup_connection(struct connectdata *conn); |
| static CURLcode smb_connect(struct connectdata *conn, bool *done); |
| static CURLcode smb_connection_state(struct connectdata *conn, bool *done); |
| static CURLcode smb_request_state(struct connectdata *conn, bool *done); |
| static CURLcode smb_done(struct connectdata *conn, CURLcode status, |
| bool premature); |
| static CURLcode smb_disconnect(struct connectdata *conn, bool dead); |
| static int smb_getsock(struct connectdata *conn, curl_socket_t *socks, |
| int numsocks); |
| static CURLcode smb_parse_url_path(struct connectdata *conn); |
| |
| /* |
| * SMB handler interface |
| */ |
| const struct Curl_handler Curl_handler_smb = { |
| "SMB", /* scheme */ |
| smb_setup_connection, /* setup_connection */ |
| ZERO_NULL, /* do_it */ |
| smb_done, /* done */ |
| ZERO_NULL, /* do_more */ |
| smb_connect, /* connect_it */ |
| smb_connection_state, /* connecting */ |
| smb_request_state, /* doing */ |
| smb_getsock, /* proto_getsock */ |
| smb_getsock, /* doing_getsock */ |
| ZERO_NULL, /* domore_getsock */ |
| ZERO_NULL, /* perform_getsock */ |
| smb_disconnect, /* disconnect */ |
| ZERO_NULL, /* readwrite */ |
| ZERO_NULL, /* connection_check */ |
| PORT_SMB, /* defport */ |
| CURLPROTO_SMB, /* protocol */ |
| PROTOPT_NONE /* flags */ |
| }; |
| |
| #ifdef USE_SSL |
| /* |
| * SMBS handler interface |
| */ |
| const struct Curl_handler Curl_handler_smbs = { |
| "SMBS", /* scheme */ |
| smb_setup_connection, /* setup_connection */ |
| ZERO_NULL, /* do_it */ |
| smb_done, /* done */ |
| ZERO_NULL, /* do_more */ |
| smb_connect, /* connect_it */ |
| smb_connection_state, /* connecting */ |
| smb_request_state, /* doing */ |
| smb_getsock, /* proto_getsock */ |
| smb_getsock, /* doing_getsock */ |
| ZERO_NULL, /* domore_getsock */ |
| ZERO_NULL, /* perform_getsock */ |
| smb_disconnect, /* disconnect */ |
| ZERO_NULL, /* readwrite */ |
| ZERO_NULL, /* connection_check */ |
| PORT_SMBS, /* defport */ |
| CURLPROTO_SMBS, /* protocol */ |
| PROTOPT_SSL /* flags */ |
| }; |
| #endif |
| |
| #define MAX_PAYLOAD_SIZE 0x8000 |
| #define MAX_MESSAGE_SIZE (MAX_PAYLOAD_SIZE + 0x1000) |
| #define CLIENTNAME "curl" |
| #define SERVICENAME "?????" |
| |
| /* Append a string to an SMB message */ |
| #define MSGCAT(str) \ |
| strcpy(p, (str)); \ |
| p += strlen(str); |
| |
| /* Append a null-terminated string to an SMB message */ |
| #define MSGCATNULL(str) \ |
| strcpy(p, (str)); \ |
| p += strlen(str) + 1; |
| |
| /* SMB is mostly little endian */ |
| #if (defined(__BYTE_ORDER__) && __BYTE_ORDER__ == __ORDER_BIG_ENDIAN__) || \ |
| defined(__OS400__) |
| static unsigned short smb_swap16(unsigned short x) |
| { |
| return (unsigned short) ((x << 8) | ((x >> 8) & 0xff)); |
| } |
| |
| static unsigned int smb_swap32(unsigned int x) |
| { |
| return (x << 24) | ((x << 8) & 0xff0000) | ((x >> 8) & 0xff00) | |
| ((x >> 24) & 0xff); |
| } |
| |
| #ifdef HAVE_LONGLONG |
| static unsigned long long smb_swap64(unsigned long long x) |
| { |
| return ((unsigned long long) smb_swap32((unsigned int) x) << 32) | |
| smb_swap32((unsigned int) (x >> 32)); |
| } |
| #else |
| static unsigned __int64 smb_swap64(unsigned __int64 x) |
| { |
| return ((unsigned __int64) smb_swap32((unsigned int) x) << 32) | |
| smb_swap32((unsigned int) (x >> 32)); |
| } |
| #endif |
| #else |
| # define smb_swap16(x) (x) |
| # define smb_swap32(x) (x) |
| # define smb_swap64(x) (x) |
| #endif |
| |
| /* SMB request state */ |
| enum smb_req_state { |
| SMB_REQUESTING, |
| SMB_TREE_CONNECT, |
| SMB_OPEN, |
| SMB_DOWNLOAD, |
| SMB_UPLOAD, |
| SMB_CLOSE, |
| SMB_TREE_DISCONNECT, |
| SMB_DONE |
| }; |
| |
| /* SMB request data */ |
| struct smb_request { |
| enum smb_req_state state; |
| char *share; |
| char *path; |
| unsigned short tid; /* Even if we connect to the same tree as another */ |
| unsigned short fid; /* request, the tid will be different */ |
| CURLcode result; |
| }; |
| |
| static void conn_state(struct connectdata *conn, enum smb_conn_state newstate) |
| { |
| struct smb_conn *smb = &conn->proto.smbc; |
| #if defined(DEBUGBUILD) && !defined(CURL_DISABLE_VERBOSE_STRINGS) |
| /* For debug purposes */ |
| static const char * const names[] = { |
| "SMB_NOT_CONNECTED", |
| "SMB_CONNECTING", |
| "SMB_NEGOTIATE", |
| "SMB_SETUP", |
| "SMB_CONNECTED", |
| /* LAST */ |
| }; |
| |
| if(smb->state != newstate) |
| infof(conn->data, "SMB conn %p state change from %s to %s\n", |
| (void *)smb, names[smb->state], names[newstate]); |
| #endif |
| |
| smb->state = newstate; |
| } |
| |
| static void request_state(struct connectdata *conn, |
| enum smb_req_state newstate) |
| { |
| struct smb_request *req = conn->data->req.protop; |
| #if defined(DEBUGBUILD) && !defined(CURL_DISABLE_VERBOSE_STRINGS) |
| /* For debug purposes */ |
| static const char * const names[] = { |
| "SMB_REQUESTING", |
| "SMB_TREE_CONNECT", |
| "SMB_OPEN", |
| "SMB_DOWNLOAD", |
| "SMB_UPLOAD", |
| "SMB_CLOSE", |
| "SMB_TREE_DISCONNECT", |
| "SMB_DONE", |
| /* LAST */ |
| }; |
| |
| if(req->state != newstate) |
| infof(conn->data, "SMB request %p state change from %s to %s\n", |
| (void *)req, names[req->state], names[newstate]); |
| #endif |
| |
| req->state = newstate; |
| } |
| |
| static CURLcode smb_setup_connection(struct connectdata *conn) |
| { |
| struct smb_request *req; |
| |
| /* Initialize the request state */ |
| conn->data->req.protop = req = calloc(1, sizeof(struct smb_request)); |
| if(!req) |
| return CURLE_OUT_OF_MEMORY; |
| |
| /* Parse the URL path */ |
| return smb_parse_url_path(conn); |
| } |
| |
| static CURLcode smb_connect(struct connectdata *conn, bool *done) |
| { |
| struct smb_conn *smbc = &conn->proto.smbc; |
| char *slash; |
| |
| (void) done; |
| |
| /* Check we have a username and password to authenticate with */ |
| if(!conn->bits.user_passwd) |
| return CURLE_LOGIN_DENIED; |
| |
| /* Initialize the connection state */ |
| memset(smbc, 0, sizeof(*smbc)); |
| smbc->state = SMB_CONNECTING; |
| smbc->recv_buf = malloc(MAX_MESSAGE_SIZE); |
| if(!smbc->recv_buf) |
| return CURLE_OUT_OF_MEMORY; |
| |
| /* Multiple requests are allowed with this connection */ |
| connkeep(conn, "SMB default"); |
| |
| /* Parse the username, domain, and password */ |
| slash = strchr(conn->user, '/'); |
| if(!slash) |
| slash = strchr(conn->user, '\\'); |
| |
| if(slash) { |
| smbc->user = slash + 1; |
| smbc->domain = strdup(conn->user); |
| if(!smbc->domain) |
| return CURLE_OUT_OF_MEMORY; |
| smbc->domain[slash - conn->user] = 0; |
| } |
| else { |
| smbc->user = conn->user; |
| smbc->domain = strdup(conn->host.name); |
| if(!smbc->domain) |
| return CURLE_OUT_OF_MEMORY; |
| } |
| |
| return CURLE_OK; |
| } |
| |
| static CURLcode smb_recv_message(struct connectdata *conn, void **msg) |
| { |
| struct smb_conn *smbc = &conn->proto.smbc; |
| char *buf = smbc->recv_buf; |
| ssize_t bytes_read; |
| size_t nbt_size; |
| size_t msg_size; |
| size_t len = MAX_MESSAGE_SIZE - smbc->got; |
| CURLcode result; |
| |
| result = Curl_read(conn, FIRSTSOCKET, buf + smbc->got, len, &bytes_read); |
| if(result) |
| return result; |
| |
| if(!bytes_read) |
| return CURLE_OK; |
| |
| smbc->got += bytes_read; |
| |
| /* Check for a 32-bit nbt header */ |
| if(smbc->got < sizeof(unsigned int)) |
| return CURLE_OK; |
| |
| nbt_size = Curl_read16_be((const unsigned char *) |
| (buf + sizeof(unsigned short))) + |
| sizeof(unsigned int); |
| if(smbc->got < nbt_size) |
| return CURLE_OK; |
| |
| msg_size = sizeof(struct smb_header); |
| if(nbt_size >= msg_size + 1) { |
| /* Add the word count */ |
| msg_size += 1 + ((unsigned char) buf[msg_size]) * sizeof(unsigned short); |
| if(nbt_size >= msg_size + sizeof(unsigned short)) { |
| /* Add the byte count */ |
| msg_size += sizeof(unsigned short) + |
| Curl_read16_le((const unsigned char *)&buf[msg_size]); |
| if(nbt_size < msg_size) |
| return CURLE_READ_ERROR; |
| } |
| } |
| |
| *msg = buf; |
| |
| return CURLE_OK; |
| } |
| |
| static void smb_pop_message(struct connectdata *conn) |
| { |
| struct smb_conn *smbc = &conn->proto.smbc; |
| |
| smbc->got = 0; |
| } |
| |
| static void smb_format_message(struct connectdata *conn, struct smb_header *h, |
| unsigned char cmd, size_t len) |
| { |
| struct smb_conn *smbc = &conn->proto.smbc; |
| struct smb_request *req = conn->data->req.protop; |
| unsigned int pid; |
| |
| memset(h, 0, sizeof(*h)); |
| h->nbt_length = htons((unsigned short) (sizeof(*h) - sizeof(unsigned int) + |
| len)); |
| memcpy((char *)h->magic, "\xffSMB", 4); |
| h->command = cmd; |
| h->flags = SMB_FLAGS_CANONICAL_PATHNAMES | SMB_FLAGS_CASELESS_PATHNAMES; |
| h->flags2 = smb_swap16(SMB_FLAGS2_IS_LONG_NAME | SMB_FLAGS2_KNOWS_LONG_NAME); |
| h->uid = smb_swap16(smbc->uid); |
| h->tid = smb_swap16(req->tid); |
| pid = getpid(); |
| h->pid_high = smb_swap16((unsigned short)(pid >> 16)); |
| h->pid = smb_swap16((unsigned short) pid); |
| } |
| |
| static CURLcode smb_send(struct connectdata *conn, ssize_t len, |
| size_t upload_size) |
| { |
| struct smb_conn *smbc = &conn->proto.smbc; |
| ssize_t bytes_written; |
| CURLcode result; |
| |
| result = Curl_write(conn, FIRSTSOCKET, conn->data->state.uploadbuffer, |
| len, &bytes_written); |
| if(result) |
| return result; |
| |
| if(bytes_written != len) { |
| smbc->send_size = len; |
| smbc->sent = bytes_written; |
| } |
| |
| smbc->upload_size = upload_size; |
| |
| return CURLE_OK; |
| } |
| |
| static CURLcode smb_flush(struct connectdata *conn) |
| { |
| struct smb_conn *smbc = &conn->proto.smbc; |
| ssize_t bytes_written; |
| ssize_t len = smbc->send_size - smbc->sent; |
| CURLcode result; |
| |
| if(!smbc->send_size) |
| return CURLE_OK; |
| |
| result = Curl_write(conn, FIRSTSOCKET, |
| conn->data->state.uploadbuffer + smbc->sent, |
| len, &bytes_written); |
| if(result) |
| return result; |
| |
| if(bytes_written != len) |
| smbc->sent += bytes_written; |
| else |
| smbc->send_size = 0; |
| |
| return CURLE_OK; |
| } |
| |
| static CURLcode smb_send_message(struct connectdata *conn, unsigned char cmd, |
| const void *msg, size_t msg_len) |
| { |
| smb_format_message(conn, (struct smb_header *)conn->data->state.uploadbuffer, |
| cmd, msg_len); |
| memcpy(conn->data->state.uploadbuffer + sizeof(struct smb_header), |
| msg, msg_len); |
| |
| return smb_send(conn, sizeof(struct smb_header) + msg_len, 0); |
| } |
| |
| static CURLcode smb_send_negotiate(struct connectdata *conn) |
| { |
| const char *msg = "\x00\x0c\x00\x02NT LM 0.12"; |
| |
| return smb_send_message(conn, SMB_COM_NEGOTIATE, msg, 15); |
| } |
| |
| static CURLcode smb_send_setup(struct connectdata *conn) |
| { |
| struct smb_conn *smbc = &conn->proto.smbc; |
| struct smb_setup msg; |
| char *p = msg.bytes; |
| unsigned char lm_hash[21]; |
| unsigned char lm[24]; |
| unsigned char nt_hash[21]; |
| unsigned char nt[24]; |
| |
| size_t byte_count = sizeof(lm) + sizeof(nt); |
| byte_count += strlen(smbc->user) + strlen(smbc->domain); |
| byte_count += strlen(OS) + strlen(CLIENTNAME) + 4; /* 4 null chars */ |
| if(byte_count > sizeof(msg.bytes)) |
| return CURLE_FILESIZE_EXCEEDED; |
| |
| Curl_ntlm_core_mk_lm_hash(conn->data, conn->passwd, lm_hash); |
| Curl_ntlm_core_lm_resp(lm_hash, smbc->challenge, lm); |
| #ifdef USE_NTRESPONSES |
| Curl_ntlm_core_mk_nt_hash(conn->data, conn->passwd, nt_hash); |
| Curl_ntlm_core_lm_resp(nt_hash, smbc->challenge, nt); |
| #else |
| memset(nt, 0, sizeof(nt)); |
| #endif |
| |
| memset(&msg, 0, sizeof(msg)); |
| msg.word_count = SMB_WC_SETUP_ANDX; |
| msg.andx.command = SMB_COM_NO_ANDX_COMMAND; |
| msg.max_buffer_size = smb_swap16(MAX_MESSAGE_SIZE); |
| msg.max_mpx_count = smb_swap16(1); |
| msg.vc_number = smb_swap16(1); |
| msg.session_key = smb_swap32(smbc->session_key); |
| msg.capabilities = smb_swap32(SMB_CAP_LARGE_FILES); |
| msg.lengths[0] = smb_swap16(sizeof(lm)); |
| msg.lengths[1] = smb_swap16(sizeof(nt)); |
| memcpy(p, lm, sizeof(lm)); |
| p += sizeof(lm); |
| memcpy(p, nt, sizeof(nt)); |
| p += sizeof(nt); |
| MSGCATNULL(smbc->user); |
| MSGCATNULL(smbc->domain); |
| MSGCATNULL(OS); |
| MSGCATNULL(CLIENTNAME); |
| byte_count = p - msg.bytes; |
| msg.byte_count = smb_swap16((unsigned short)byte_count); |
| |
| return smb_send_message(conn, SMB_COM_SETUP_ANDX, &msg, |
| sizeof(msg) - sizeof(msg.bytes) + byte_count); |
| } |
| |
| static CURLcode smb_send_tree_connect(struct connectdata *conn) |
| { |
| struct smb_request *req = conn->data->req.protop; |
| struct smb_tree_connect msg; |
| char *p = msg.bytes; |
| |
| size_t byte_count = strlen(conn->host.name) + strlen(req->share); |
| byte_count += strlen(SERVICENAME) + 5; /* 2 nulls and 3 backslashes */ |
| if(byte_count > sizeof(msg.bytes)) |
| return CURLE_FILESIZE_EXCEEDED; |
| |
| memset(&msg, 0, sizeof(msg)); |
| msg.word_count = SMB_WC_TREE_CONNECT_ANDX; |
| msg.andx.command = SMB_COM_NO_ANDX_COMMAND; |
| msg.pw_len = 0; |
| MSGCAT("\\\\"); |
| MSGCAT(conn->host.name); |
| MSGCAT("\\"); |
| MSGCATNULL(req->share); |
| MSGCATNULL(SERVICENAME); /* Match any type of service */ |
| byte_count = p - msg.bytes; |
| msg.byte_count = smb_swap16((unsigned short)byte_count); |
| |
| return smb_send_message(conn, SMB_COM_TREE_CONNECT_ANDX, &msg, |
| sizeof(msg) - sizeof(msg.bytes) + byte_count); |
| } |
| |
| static CURLcode smb_send_open(struct connectdata *conn) |
| { |
| struct smb_request *req = conn->data->req.protop; |
| struct smb_nt_create msg; |
| size_t byte_count; |
| |
| if((strlen(req->path) + 1) > sizeof(msg.bytes)) |
| return CURLE_FILESIZE_EXCEEDED; |
| |
| memset(&msg, 0, sizeof(msg)); |
| msg.word_count = SMB_WC_NT_CREATE_ANDX; |
| msg.andx.command = SMB_COM_NO_ANDX_COMMAND; |
| byte_count = strlen(req->path); |
| msg.name_length = smb_swap16((unsigned short)byte_count); |
| msg.share_access = smb_swap32(SMB_FILE_SHARE_ALL); |
| if(conn->data->set.upload) { |
| msg.access = smb_swap32(SMB_GENERIC_READ | SMB_GENERIC_WRITE); |
| msg.create_disposition = smb_swap32(SMB_FILE_OVERWRITE_IF); |
| } |
| else { |
| msg.access = smb_swap32(SMB_GENERIC_READ); |
| msg.create_disposition = smb_swap32(SMB_FILE_OPEN); |
| } |
| msg.byte_count = smb_swap16((unsigned short) ++byte_count); |
| strcpy(msg.bytes, req->path); |
| |
| return smb_send_message(conn, SMB_COM_NT_CREATE_ANDX, &msg, |
| sizeof(msg) - sizeof(msg.bytes) + byte_count); |
| } |
| |
| static CURLcode smb_send_close(struct connectdata *conn) |
| { |
| struct smb_request *req = conn->data->req.protop; |
| struct smb_close msg; |
| |
| memset(&msg, 0, sizeof(msg)); |
| msg.word_count = SMB_WC_CLOSE; |
| msg.fid = smb_swap16(req->fid); |
| |
| return smb_send_message(conn, SMB_COM_CLOSE, &msg, sizeof(msg)); |
| } |
| |
| static CURLcode smb_send_tree_disconnect(struct connectdata *conn) |
| { |
| struct smb_tree_disconnect msg; |
| |
| memset(&msg, 0, sizeof(msg)); |
| |
| return smb_send_message(conn, SMB_COM_TREE_DISCONNECT, &msg, sizeof(msg)); |
| } |
| |
| static CURLcode smb_send_read(struct connectdata *conn) |
| { |
| struct smb_request *req = conn->data->req.protop; |
| curl_off_t offset = conn->data->req.offset; |
| struct smb_read msg; |
| |
| memset(&msg, 0, sizeof(msg)); |
| msg.word_count = SMB_WC_READ_ANDX; |
| msg.andx.command = SMB_COM_NO_ANDX_COMMAND; |
| msg.fid = smb_swap16(req->fid); |
| msg.offset = smb_swap32((unsigned int) offset); |
| msg.offset_high = smb_swap32((unsigned int) (offset >> 32)); |
| msg.min_bytes = smb_swap16(MAX_PAYLOAD_SIZE); |
| msg.max_bytes = smb_swap16(MAX_PAYLOAD_SIZE); |
| |
| return smb_send_message(conn, SMB_COM_READ_ANDX, &msg, sizeof(msg)); |
| } |
| |
| static CURLcode smb_send_write(struct connectdata *conn) |
| { |
| struct smb_write *msg = (struct smb_write *)conn->data->state.uploadbuffer; |
| struct smb_request *req = conn->data->req.protop; |
| curl_off_t offset = conn->data->req.offset; |
| |
| curl_off_t upload_size = conn->data->req.size - conn->data->req.bytecount; |
| if(upload_size >= MAX_PAYLOAD_SIZE - 1) /* There is one byte of padding */ |
| upload_size = MAX_PAYLOAD_SIZE - 1; |
| |
| memset(msg, 0, sizeof(*msg)); |
| msg->word_count = SMB_WC_WRITE_ANDX; |
| msg->andx.command = SMB_COM_NO_ANDX_COMMAND; |
| msg->fid = smb_swap16(req->fid); |
| msg->offset = smb_swap32((unsigned int) offset); |
| msg->offset_high = smb_swap32((unsigned int) (offset >> 32)); |
| msg->data_length = smb_swap16((unsigned short) upload_size); |
| msg->data_offset = smb_swap16(sizeof(*msg) - sizeof(unsigned int)); |
| msg->byte_count = smb_swap16((unsigned short) (upload_size + 1)); |
| |
| smb_format_message(conn, &msg->h, SMB_COM_WRITE_ANDX, |
| sizeof(*msg) - sizeof(msg->h) + (size_t) upload_size); |
| |
| return smb_send(conn, sizeof(*msg), (size_t) upload_size); |
| } |
| |
| static CURLcode smb_send_and_recv(struct connectdata *conn, void **msg) |
| { |
| struct smb_conn *smbc = &conn->proto.smbc; |
| CURLcode result; |
| |
| /* Check if there is data in the transfer buffer */ |
| if(!smbc->send_size && smbc->upload_size) { |
| int nread = smbc->upload_size > UPLOAD_BUFSIZE ? UPLOAD_BUFSIZE : |
| (int) smbc->upload_size; |
| conn->data->req.upload_fromhere = conn->data->state.uploadbuffer; |
| result = Curl_fillreadbuffer(conn, nread, &nread); |
| if(result && result != CURLE_AGAIN) |
| return result; |
| if(!nread) |
| return CURLE_OK; |
| |
| smbc->upload_size -= nread; |
| smbc->send_size = nread; |
| smbc->sent = 0; |
| } |
| |
| /* Check if there is data to send */ |
| if(smbc->send_size) { |
| result = smb_flush(conn); |
| if(result) |
| return result; |
| } |
| |
| /* Check if there is still data to be sent */ |
| if(smbc->send_size || smbc->upload_size) |
| return CURLE_AGAIN; |
| |
| return smb_recv_message(conn, msg); |
| } |
| |
| static CURLcode smb_connection_state(struct connectdata *conn, bool *done) |
| { |
| struct smb_conn *smbc = &conn->proto.smbc; |
| struct smb_negotiate_response *nrsp; |
| struct smb_header *h; |
| CURLcode result; |
| void *msg = NULL; |
| |
| if(smbc->state == SMB_CONNECTING) { |
| #ifdef USE_SSL |
| if((conn->handler->flags & PROTOPT_SSL)) { |
| bool ssl_done = FALSE; |
| result = Curl_ssl_connect_nonblocking(conn, FIRSTSOCKET, &ssl_done); |
| if(result && result != CURLE_AGAIN) |
| return result; |
| if(!ssl_done) |
| return CURLE_OK; |
| } |
| #endif |
| |
| result = smb_send_negotiate(conn); |
| if(result) { |
| connclose(conn, "SMB: failed to send negotiate message"); |
| return result; |
| } |
| |
| conn_state(conn, SMB_NEGOTIATE); |
| } |
| |
| /* Send the previous message and check for a response */ |
| result = smb_send_and_recv(conn, &msg); |
| if(result && result != CURLE_AGAIN) { |
| connclose(conn, "SMB: failed to communicate"); |
| return result; |
| } |
| |
| if(!msg) |
| return CURLE_OK; |
| |
| h = msg; |
| |
| switch(smbc->state) { |
| case SMB_NEGOTIATE: |
| if(h->status || smbc->got < sizeof(*nrsp) + sizeof(smbc->challenge) - 1) { |
| connclose(conn, "SMB: negotiation failed"); |
| return CURLE_COULDNT_CONNECT; |
| } |
| nrsp = msg; |
| memcpy(smbc->challenge, nrsp->bytes, sizeof(smbc->challenge)); |
| smbc->session_key = smb_swap32(nrsp->session_key); |
| result = smb_send_setup(conn); |
| if(result) { |
| connclose(conn, "SMB: failed to send setup message"); |
| return result; |
| } |
| conn_state(conn, SMB_SETUP); |
| break; |
| |
| case SMB_SETUP: |
| if(h->status) { |
| connclose(conn, "SMB: authentication failed"); |
| return CURLE_LOGIN_DENIED; |
| } |
| smbc->uid = smb_swap16(h->uid); |
| conn_state(conn, SMB_CONNECTED); |
| *done = true; |
| break; |
| |
| default: |
| smb_pop_message(conn); |
| return CURLE_OK; /* ignore */ |
| } |
| |
| smb_pop_message(conn); |
| |
| return CURLE_OK; |
| } |
| |
| /* |
| * Convert a timestamp from the Windows world (100 nsec units from |
| * 1 Jan 1601) to Posix time. |
| */ |
| static void get_posix_time(long *_out, const void *_in) |
| { |
| #ifdef HAVE_LONGLONG |
| long long timestamp = *(long long *) _in; |
| #else |
| unsigned __int64 timestamp = *(unsigned __int64 *) _in; |
| #endif |
| |
| timestamp -= 116444736000000000ULL; |
| timestamp /= 10000000; |
| *_out = (long) timestamp; |
| } |
| |
| static CURLcode smb_request_state(struct connectdata *conn, bool *done) |
| { |
| struct smb_request *req = conn->data->req.protop; |
| struct smb_header *h; |
| struct smb_conn *smbc = &conn->proto.smbc; |
| enum smb_req_state next_state = SMB_DONE; |
| unsigned short len; |
| unsigned short off; |
| CURLcode result; |
| void *msg = NULL; |
| const struct smb_nt_create_response *smb_m; |
| |
| /* Start the request */ |
| if(req->state == SMB_REQUESTING) { |
| result = smb_send_tree_connect(conn); |
| if(result) { |
| connclose(conn, "SMB: failed to send tree connect message"); |
| return result; |
| } |
| |
| request_state(conn, SMB_TREE_CONNECT); |
| } |
| |
| /* Send the previous message and check for a response */ |
| result = smb_send_and_recv(conn, &msg); |
| if(result && result != CURLE_AGAIN) { |
| connclose(conn, "SMB: failed to communicate"); |
| return result; |
| } |
| |
| if(!msg) |
| return CURLE_OK; |
| |
| h = msg; |
| |
| switch(req->state) { |
| case SMB_TREE_CONNECT: |
| if(h->status) { |
| req->result = CURLE_REMOTE_FILE_NOT_FOUND; |
| if(h->status == smb_swap32(SMB_ERR_NOACCESS)) |
| req->result = CURLE_REMOTE_ACCESS_DENIED; |
| break; |
| } |
| req->tid = smb_swap16(h->tid); |
| next_state = SMB_OPEN; |
| break; |
| |
| case SMB_OPEN: |
| if(h->status || smbc->got < sizeof(struct smb_nt_create_response)) { |
| req->result = CURLE_REMOTE_FILE_NOT_FOUND; |
| next_state = SMB_TREE_DISCONNECT; |
| break; |
| } |
| smb_m = (const struct smb_nt_create_response*) msg; |
| req->fid = smb_swap16(smb_m->fid); |
| conn->data->req.offset = 0; |
| if(conn->data->set.upload) { |
| conn->data->req.size = conn->data->state.infilesize; |
| Curl_pgrsSetUploadSize(conn->data, conn->data->req.size); |
| next_state = SMB_UPLOAD; |
| } |
| else { |
| smb_m = (const struct smb_nt_create_response*) msg; |
| conn->data->req.size = smb_swap64(smb_m->end_of_file); |
| Curl_pgrsSetDownloadSize(conn->data, conn->data->req.size); |
| if(conn->data->set.get_filetime) |
| get_posix_time(&conn->data->info.filetime, &smb_m->last_change_time); |
| next_state = SMB_DOWNLOAD; |
| } |
| break; |
| |
| case SMB_DOWNLOAD: |
| if(h->status || smbc->got < sizeof(struct smb_header) + 14) { |
| req->result = CURLE_RECV_ERROR; |
| next_state = SMB_CLOSE; |
| break; |
| } |
| len = Curl_read16_le(((const unsigned char *) msg) + |
| sizeof(struct smb_header) + 11); |
| off = Curl_read16_le(((const unsigned char *) msg) + |
| sizeof(struct smb_header) + 13); |
| if(len > 0) { |
| if(off + sizeof(unsigned int) + len > smbc->got) { |
| failf(conn->data, "Invalid input packet"); |
| result = CURLE_RECV_ERROR; |
| } |
| else |
| result = Curl_client_write(conn, CLIENTWRITE_BODY, |
| (char *)msg + off + sizeof(unsigned int), |
| len); |
| if(result) { |
| req->result = result; |
| next_state = SMB_CLOSE; |
| break; |
| } |
| } |
| conn->data->req.bytecount += len; |
| conn->data->req.offset += len; |
| Curl_pgrsSetDownloadCounter(conn->data, conn->data->req.bytecount); |
| next_state = (len < MAX_PAYLOAD_SIZE) ? SMB_CLOSE : SMB_DOWNLOAD; |
| break; |
| |
| case SMB_UPLOAD: |
| if(h->status || smbc->got < sizeof(struct smb_header) + 6) { |
| req->result = CURLE_UPLOAD_FAILED; |
| next_state = SMB_CLOSE; |
| break; |
| } |
| len = Curl_read16_le(((const unsigned char *) msg) + |
| sizeof(struct smb_header) + 5); |
| conn->data->req.bytecount += len; |
| conn->data->req.offset += len; |
| Curl_pgrsSetUploadCounter(conn->data, conn->data->req.bytecount); |
| if(conn->data->req.bytecount >= conn->data->req.size) |
| next_state = SMB_CLOSE; |
| else |
| next_state = SMB_UPLOAD; |
| break; |
| |
| case SMB_CLOSE: |
| /* We don't care if the close failed, proceed to tree disconnect anyway */ |
| next_state = SMB_TREE_DISCONNECT; |
| break; |
| |
| case SMB_TREE_DISCONNECT: |
| next_state = SMB_DONE; |
| break; |
| |
| default: |
| smb_pop_message(conn); |
| return CURLE_OK; /* ignore */ |
| } |
| |
| smb_pop_message(conn); |
| |
| switch(next_state) { |
| case SMB_OPEN: |
| result = smb_send_open(conn); |
| break; |
| |
| case SMB_DOWNLOAD: |
| result = smb_send_read(conn); |
| break; |
| |
| case SMB_UPLOAD: |
| result = smb_send_write(conn); |
| break; |
| |
| case SMB_CLOSE: |
| result = smb_send_close(conn); |
| break; |
| |
| case SMB_TREE_DISCONNECT: |
| result = smb_send_tree_disconnect(conn); |
| break; |
| |
| case SMB_DONE: |
| result = req->result; |
| *done = true; |
| break; |
| |
| default: |
| break; |
| } |
| |
| if(result) { |
| connclose(conn, "SMB: failed to send message"); |
| return result; |
| } |
| |
| request_state(conn, next_state); |
| |
| return CURLE_OK; |
| } |
| |
| static CURLcode smb_done(struct connectdata *conn, CURLcode status, |
| bool premature) |
| { |
| struct smb_request *req = conn->data->req.protop; |
| |
| (void) premature; |
| |
| Curl_safefree(req->share); |
| Curl_safefree(conn->data->req.protop); |
| |
| return status; |
| } |
| |
| static CURLcode smb_disconnect(struct connectdata *conn, bool dead) |
| { |
| struct smb_conn *smbc = &conn->proto.smbc; |
| struct smb_request *req = conn->data->req.protop; |
| |
| (void) dead; |
| |
| Curl_safefree(smbc->domain); |
| Curl_safefree(smbc->recv_buf); |
| |
| /* smb_done is not always called, so cleanup the request */ |
| if(req) { |
| Curl_safefree(req->share); |
| } |
| |
| return CURLE_OK; |
| } |
| |
| static int smb_getsock(struct connectdata *conn, curl_socket_t *socks, |
| int numsocks) |
| { |
| struct smb_conn *smbc = &conn->proto.smbc; |
| |
| if(!numsocks) |
| return GETSOCK_BLANK; |
| |
| socks[0] = conn->sock[FIRSTSOCKET]; |
| |
| if(smbc->send_size || smbc->upload_size) |
| return GETSOCK_WRITESOCK(0); |
| |
| return GETSOCK_READSOCK(0); |
| } |
| |
| static CURLcode smb_parse_url_path(struct connectdata *conn) |
| { |
| CURLcode result = CURLE_OK; |
| struct Curl_easy *data = conn->data; |
| struct smb_request *req = data->req.protop; |
| char *path; |
| char *slash; |
| |
| /* URL decode the path */ |
| result = Curl_urldecode(data, data->state.path, 0, &path, NULL, TRUE); |
| if(result) |
| return result; |
| |
| /* Parse the path for the share */ |
| req->share = strdup((*path == '/' || *path == '\\') ? path + 1 : path); |
| if(!req->share) { |
| free(path); |
| |
| return CURLE_OUT_OF_MEMORY; |
| } |
| |
| slash = strchr(req->share, '/'); |
| if(!slash) |
| slash = strchr(req->share, '\\'); |
| |
| /* The share must be present */ |
| if(!slash) { |
| free(path); |
| |
| return CURLE_URL_MALFORMAT; |
| } |
| |
| /* Parse the path for the file path converting any forward slashes into |
| backslashes */ |
| *slash++ = 0; |
| req->path = slash; |
| for(; *slash; slash++) { |
| if(*slash == '/') |
| *slash = '\\'; |
| } |
| |
| free(path); |
| |
| return CURLE_OK; |
| } |
| |
| #endif /* !USE_WINDOWS_SSPI || USE_WIN32_CRYPTO */ |
| |
| #endif /* CURL_DISABLE_SMB && USE_NTLM && CURL_SIZEOF_CURL_OFF_T > 4 */ |