1872 lines
36 KiB
C
1872 lines
36 KiB
C
/*
|
|
* ncplib.c
|
|
*
|
|
* Copyright (C) 1995, 1996 by Volker Lendecke
|
|
*
|
|
*/
|
|
|
|
#include "ncplib.h"
|
|
#include "ncplib_err.h"
|
|
|
|
#include <sys/ioctl.h>
|
|
/* #include <sys/wait.h> *//* generates a warning here */
|
|
extern pid_t wait(int *);
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include <errno.h>
|
|
#include <sys/time.h>
|
|
#include <sys/types.h>
|
|
#include <sys/socket.h>
|
|
#include <unistd.h>
|
|
#include <signal.h>
|
|
#include <fcntl.h>
|
|
#include <ctype.h>
|
|
#include <linux/route.h>
|
|
#include <sys/param.h>
|
|
#include <stdlib.h>
|
|
#include <mntent.h>
|
|
#include <pwd.h>
|
|
#include <sys/stat.h>
|
|
#include <stdarg.h>
|
|
|
|
static long
|
|
ncp_negotiate_buffersize(struct ncp_conn *conn,
|
|
int size, int *target);
|
|
static long
|
|
ncp_login_object(struct ncp_conn *conn,
|
|
const unsigned char *username,
|
|
int login_type,
|
|
const unsigned char *password);
|
|
|
|
static long
|
|
ncp_do_close(struct ncp_conn *conn);
|
|
|
|
void
|
|
str_upper(char *name)
|
|
{
|
|
while (*name)
|
|
{
|
|
*name = toupper(*name);
|
|
name = name + 1;
|
|
}
|
|
}
|
|
|
|
/* I know it's terrible to include a .c file here, but I want to keep
|
|
the file nwcrypt.c intact and separate for copyright reasons */
|
|
#include "nwcrypt.c"
|
|
|
|
void
|
|
ipx_fprint_node(FILE * file, IPXNode node)
|
|
{
|
|
fprintf(file, "%02X%02X%02X%02X%02X%02X",
|
|
(unsigned char) node[0],
|
|
(unsigned char) node[1],
|
|
(unsigned char) node[2],
|
|
(unsigned char) node[3],
|
|
(unsigned char) node[4],
|
|
(unsigned char) node[5]
|
|
);
|
|
}
|
|
|
|
void
|
|
ipx_fprint_network(FILE * file, IPXNet net)
|
|
{
|
|
fprintf(file, "%08lX", ntohl(net));
|
|
}
|
|
|
|
void
|
|
ipx_fprint_port(FILE * file, IPXPort port)
|
|
{
|
|
fprintf(file, "%04X", ntohs(port));
|
|
}
|
|
|
|
void
|
|
ipx_fprint_saddr(FILE * file, struct sockaddr_ipx *sipx)
|
|
{
|
|
ipx_fprint_network(file, sipx->sipx_network);
|
|
fprintf(file, ":");
|
|
ipx_fprint_node(file, sipx->sipx_node);
|
|
fprintf(file, ":");
|
|
ipx_fprint_port(file, sipx->sipx_port);
|
|
}
|
|
|
|
void
|
|
ipx_print_node(IPXNode node)
|
|
{
|
|
ipx_fprint_node(stdout, node);
|
|
}
|
|
|
|
void
|
|
ipx_print_network(IPXNet net)
|
|
{
|
|
ipx_fprint_network(stdout, net);
|
|
}
|
|
|
|
void
|
|
ipx_print_port(IPXPort port)
|
|
{
|
|
ipx_fprint_port(stdout, port);
|
|
}
|
|
|
|
void
|
|
ipx_print_saddr(struct sockaddr_ipx *sipx)
|
|
{
|
|
ipx_fprint_saddr(stdout, sipx);
|
|
}
|
|
|
|
int
|
|
ipx_sscanf_node(char *buf, unsigned char node[6])
|
|
{
|
|
int i;
|
|
int n[6];
|
|
|
|
if ((i = sscanf(buf, "%2x%2x%2x%2x%2x%2x",
|
|
&(n[0]), &(n[1]), &(n[2]),
|
|
&(n[3]), &(n[4]), &(n[5]))) != 6)
|
|
{
|
|
return i;
|
|
}
|
|
for (i = 0; i < 6; i++)
|
|
{
|
|
node[i] = n[i];
|
|
}
|
|
return 6;
|
|
}
|
|
|
|
void
|
|
ipx_assign_node(IPXNode dest, IPXNode src)
|
|
{
|
|
memcpy(dest, src, IPX_NODE_LEN);
|
|
}
|
|
|
|
int
|
|
ipx_node_equal(IPXNode n1, IPXNode n2)
|
|
{
|
|
return memcmp(n1, n2, IPX_NODE_LEN) == 0;
|
|
}
|
|
|
|
static int
|
|
ipx_recvfrom(int sock, void *buf, int len, unsigned int flags,
|
|
struct sockaddr_ipx *sender, int *addrlen, int timeout,
|
|
long *err)
|
|
{
|
|
fd_set rd, wr, ex;
|
|
struct timeval tv;
|
|
int result;
|
|
|
|
FD_ZERO(&rd);
|
|
FD_ZERO(&wr);
|
|
FD_ZERO(&ex);
|
|
FD_SET(sock, &rd);
|
|
|
|
tv.tv_sec = timeout;
|
|
tv.tv_usec = 0;
|
|
|
|
if ((result = select(sock + 1, &rd, &wr, &ex, &tv)) == -1)
|
|
{
|
|
*err = errno;
|
|
return -1;
|
|
}
|
|
if (FD_ISSET(sock, &rd))
|
|
{
|
|
result = recvfrom(sock, buf, len, flags,
|
|
(struct sockaddr *) sender, addrlen);
|
|
} else
|
|
{
|
|
result = -1;
|
|
errno = ETIMEDOUT;
|
|
}
|
|
if (result < 0)
|
|
{
|
|
*err = errno;
|
|
}
|
|
return result;
|
|
}
|
|
|
|
static int
|
|
ipx_recv(int sock, void *buf, int len, unsigned int flags, int timeout,
|
|
long *err)
|
|
{
|
|
struct sockaddr_ipx sender;
|
|
int addrlen = sizeof(sender);
|
|
|
|
return ipx_recvfrom(sock, buf, len, flags, &sender, &addrlen,
|
|
timeout, err);
|
|
}
|
|
|
|
static long
|
|
ipx_sap_find_nearest(int server_type, struct sockaddr_ipx *result,
|
|
char server_name[NCP_BINDERY_NAME_LEN])
|
|
{
|
|
struct sockaddr_ipx addr;
|
|
char data[1024];
|
|
int sock;
|
|
int opt;
|
|
int packets;
|
|
int len;
|
|
|
|
struct sap_server_ident *ident;
|
|
|
|
if ((sock = socket(AF_IPX, SOCK_DGRAM, PF_IPX)) < 0)
|
|
{
|
|
if (errno == EINVAL)
|
|
{
|
|
return NCPL_ET_NO_IPX;
|
|
}
|
|
return errno;
|
|
}
|
|
opt = 1;
|
|
/* Permit broadcast output */
|
|
if (setsockopt(sock, SOL_SOCKET, SO_BROADCAST, &opt, sizeof(opt)) == -1)
|
|
{
|
|
goto finished;
|
|
}
|
|
memzero(addr);
|
|
addr.sipx_family = AF_IPX;
|
|
addr.sipx_network = htonl(0x0);
|
|
addr.sipx_port = htons(0x0);
|
|
addr.sipx_type = IPX_SAP_PTYPE;
|
|
|
|
if (bind(sock, (struct sockaddr *) &addr, sizeof(addr)) == -1)
|
|
{
|
|
if (errno == EADDRNOTAVAIL)
|
|
{
|
|
errno = NCPL_ET_NO_INTERFACE;
|
|
}
|
|
goto finished;
|
|
}
|
|
WSET_HL(data, 0, IPX_SAP_NEAREST_QUERY);
|
|
WSET_HL(data, 2, server_type);
|
|
|
|
memzero(addr);
|
|
addr.sipx_family = AF_IPX;
|
|
addr.sipx_port = htons(IPX_SAP_PORT);
|
|
addr.sipx_type = IPX_SAP_PTYPE;
|
|
addr.sipx_network = htonl(0x0);
|
|
ipx_assign_node(addr.sipx_node, IPX_BROADCAST_NODE);
|
|
|
|
if (sendto(sock, data, 4, 0,
|
|
(struct sockaddr *) &addr, sizeof(addr)) < 0)
|
|
{
|
|
goto finished;
|
|
}
|
|
packets = 5;
|
|
do
|
|
{
|
|
long err;
|
|
len = ipx_recv(sock, data, 1024, 0, 1, &err);
|
|
if (len < 66)
|
|
{
|
|
packets = packets - 1;
|
|
continue;
|
|
}
|
|
}
|
|
while ((ntohs(*((__u16 *) data)) != IPX_SAP_NEAREST_RESPONSE)
|
|
&& (packets > 0));
|
|
|
|
if (packets == 0)
|
|
{
|
|
close(sock);
|
|
return NCPL_ET_NO_SERVER;
|
|
}
|
|
ident = (struct sap_server_ident *) (data + 2);
|
|
|
|
result->sipx_family = AF_IPX;
|
|
result->sipx_network = ident->server_network;
|
|
result->sipx_port = ident->server_port;
|
|
ipx_assign_node(result->sipx_node, ident->server_node);
|
|
|
|
memcpy(server_name, ident->server_name, sizeof(ident->server_name));
|
|
|
|
errno = 0;
|
|
|
|
finished:
|
|
close(sock);
|
|
return errno;
|
|
}
|
|
|
|
static int
|
|
ipx_make_reachable(IPXNet network)
|
|
{
|
|
struct rtentry rt_def;
|
|
/* Router */
|
|
struct sockaddr_ipx *sr = (struct sockaddr_ipx *) &rt_def.rt_gateway;
|
|
/* Target */
|
|
struct sockaddr_ipx *st = (struct sockaddr_ipx *) &rt_def.rt_dst;
|
|
|
|
struct ipx_rip_packet rip;
|
|
struct sockaddr_ipx addr;
|
|
int addrlen;
|
|
int sock;
|
|
int opt;
|
|
int res = -1;
|
|
int i;
|
|
int packets;
|
|
|
|
if (geteuid() != 0)
|
|
{
|
|
errno = EPERM;
|
|
return -1;
|
|
}
|
|
memzero(rip);
|
|
|
|
sock = socket(AF_IPX, SOCK_DGRAM, PF_IPX);
|
|
|
|
if (sock == -1)
|
|
{
|
|
if (errno == EINVAL)
|
|
{
|
|
return NCPL_ET_NO_IPX;
|
|
}
|
|
return errno;
|
|
}
|
|
opt = 1;
|
|
/* Permit broadcast output */
|
|
if (setsockopt(sock, SOL_SOCKET, SO_BROADCAST, &opt, sizeof(opt)) != 0)
|
|
{
|
|
goto finished;
|
|
}
|
|
memzero(addr);
|
|
addr.sipx_family = AF_IPX;
|
|
addr.sipx_network = htonl(0x0);
|
|
addr.sipx_port = htons(0x0);
|
|
addr.sipx_type = IPX_RIP_PTYPE;
|
|
|
|
if (bind(sock, (struct sockaddr *) &addr, sizeof(addr)) != 0)
|
|
{
|
|
goto finished;
|
|
}
|
|
addr.sipx_family = AF_IPX;
|
|
addr.sipx_port = htons(IPX_RIP_PORT);
|
|
addr.sipx_type = IPX_RIP_PTYPE;
|
|
addr.sipx_network = htonl(0x0);
|
|
ipx_assign_node(addr.sipx_node, IPX_BROADCAST_NODE);
|
|
|
|
rip.operation = htons(IPX_RIP_REQUEST);
|
|
rip.rt[0].network = htonl(network);
|
|
|
|
if (sendto(sock, &rip, sizeof(rip), 0,
|
|
(struct sockaddr *) &addr, sizeof(addr)) < 0)
|
|
{
|
|
goto finished;
|
|
}
|
|
packets = 3;
|
|
do
|
|
{
|
|
long err;
|
|
int len;
|
|
|
|
if (packets == 0)
|
|
{
|
|
goto finished;
|
|
}
|
|
addrlen = sizeof(struct sockaddr_ipx);
|
|
|
|
len = ipx_recvfrom(sock, &rip, sizeof(rip), 0, sr, &addrlen, 1,
|
|
&err);
|
|
|
|
if (len < sizeof(rip))
|
|
{
|
|
packets = packets - 1;
|
|
continue;
|
|
}
|
|
}
|
|
while (ntohs(rip.operation) != IPX_RIP_RESPONSE);
|
|
|
|
if (rip.rt[0].network != htonl(network))
|
|
{
|
|
goto finished;
|
|
}
|
|
rt_def.rt_flags = RTF_GATEWAY;
|
|
st->sipx_network = htonl(network);
|
|
st->sipx_family = AF_IPX;
|
|
sr->sipx_family = AF_IPX;
|
|
|
|
i = 0;
|
|
do
|
|
{
|
|
res = ioctl(sock, SIOCADDRT, &rt_def);
|
|
i++;
|
|
}
|
|
while ((i < 5) && (res < 0) && (errno == EAGAIN));
|
|
|
|
finished:
|
|
close(sock);
|
|
|
|
if (res != 0)
|
|
{
|
|
errno = ENETUNREACH;
|
|
}
|
|
return res;
|
|
}
|
|
|
|
static int
|
|
install_wdog(struct ncp_conn *conn)
|
|
{
|
|
int parent_pid = getpid();
|
|
int pid;
|
|
int sock = conn->wdog_sock;
|
|
|
|
char buf[1024];
|
|
struct sockaddr_ipx sender;
|
|
int sizeofaddr = sizeof(struct sockaddr_ipx);
|
|
int pktsize;
|
|
|
|
|
|
if ((pid = fork()) < 0)
|
|
{
|
|
return -1;
|
|
}
|
|
if (pid != 0)
|
|
{
|
|
/* Parent, should go on as usual */
|
|
conn->wdog_pid = pid;
|
|
return 0;
|
|
}
|
|
while (1)
|
|
{
|
|
long err;
|
|
/* every 120 seconds we look if our parent is
|
|
still alive */
|
|
pktsize = ipx_recvfrom(sock, buf, sizeof(buf), 0,
|
|
&sender, &sizeofaddr, 120, &err);
|
|
|
|
if (getppid() != parent_pid)
|
|
{
|
|
/* our parent has died, so nothing to do
|
|
anymore */
|
|
exit(0);
|
|
}
|
|
if ((pktsize != 2)
|
|
|| (buf[1] != '?'))
|
|
{
|
|
continue;
|
|
}
|
|
buf[1] = 'Y';
|
|
pktsize = sendto(sock, buf, 2, 0,
|
|
(struct sockaddr *) &sender,
|
|
sizeof(sender));
|
|
}
|
|
}
|
|
|
|
#define ncp_printf printf
|
|
|
|
#define ncp_printf printf
|
|
|
|
static void
|
|
assert_conn_locked(struct ncp_conn *conn);
|
|
|
|
static void
|
|
assert_conn_not_locked(struct ncp_conn *conn)
|
|
{
|
|
if (conn->lock != 0)
|
|
{
|
|
ncp_printf("ncpfs: conn already locked!\n");
|
|
}
|
|
}
|
|
|
|
static void
|
|
ncp_lock_conn(struct ncp_conn *conn)
|
|
{
|
|
assert_conn_not_locked(conn);
|
|
conn->lock = 1;
|
|
}
|
|
|
|
static void
|
|
ncp_unlock_conn(struct ncp_conn *conn)
|
|
{
|
|
assert_conn_locked(conn);
|
|
conn->lock = 0;
|
|
}
|
|
|
|
static long
|
|
do_ncp_call(struct ncp_conn *conn, int request_size)
|
|
{
|
|
struct ncp_request_header request;
|
|
|
|
int result;
|
|
int retries = 20;
|
|
int len;
|
|
long err;
|
|
|
|
memcpy(&request, conn->packet, sizeof(request));
|
|
|
|
while (retries > 0)
|
|
{
|
|
struct ncp_reply_header reply;
|
|
struct sockaddr_ipx sender;
|
|
int sizeofaddr = sizeof(sender);
|
|
|
|
retries -= 1;
|
|
|
|
result = sendto(conn->ncp_sock, conn->packet,
|
|
request_size,
|
|
0, (struct sockaddr *) &(conn->i.addr),
|
|
sizeof(conn->i.addr));
|
|
|
|
if (result < 0)
|
|
{
|
|
return errno;
|
|
}
|
|
re_select:
|
|
len = ipx_recvfrom(conn->ncp_sock,
|
|
(char *) &reply, sizeof(reply),
|
|
MSG_PEEK, &sender, &sizeofaddr, 3, &err);
|
|
|
|
if ((len < 0) && (err == ETIMEDOUT))
|
|
{
|
|
continue;
|
|
}
|
|
if (len < 0)
|
|
{
|
|
return err;
|
|
}
|
|
if ( /* Is the sender wrong? */
|
|
(memcmp(&sender.sipx_node,
|
|
&(conn->i.addr.sipx_node), 6) != 0)
|
|
|| (sender.sipx_port != conn->i.addr.sipx_port)
|
|
|
|
/* Did the sender send a positive acknowledge? */
|
|
|| ((len == sizeof(reply))
|
|
&& (reply.type == NCP_POSITIVE_ACK))
|
|
|
|
/* Did we get a bogus answer? */
|
|
|| ((len < sizeof(reply))
|
|
|| (reply.type != NCP_REPLY)
|
|
|| ((request.type != NCP_ALLOC_SLOT_REQUEST)
|
|
&& ((reply.sequence != request.sequence)
|
|
|| (reply.conn_low != request.conn_low)
|
|
|| (reply.conn_high != request.conn_high)))))
|
|
{
|
|
/* Then throw away the packet */
|
|
ipx_recv(conn->ncp_sock, (char *) &reply, sizeof(reply),
|
|
0, 1, &err);
|
|
goto re_select;
|
|
}
|
|
ipx_recv(conn->ncp_sock, conn->packet, NCP_PACKET_SIZE,
|
|
0, 1, &err);
|
|
conn->reply_size = len;
|
|
return 0;
|
|
}
|
|
return ETIMEDOUT;
|
|
}
|
|
|
|
static int
|
|
ncp_mount_request(struct ncp_conn *conn, int function)
|
|
{
|
|
struct ncp_ioctl_request request;
|
|
int result;
|
|
|
|
assert_conn_locked(conn);
|
|
|
|
if (conn->has_subfunction != 0)
|
|
{
|
|
WSET_HL(conn->packet, 7, conn->current_size
|
|
- sizeof(struct ncp_request_header) - 2);
|
|
}
|
|
request.function = function;
|
|
request.size = conn->current_size;
|
|
request.data = conn->packet;
|
|
|
|
if ((result = ioctl(conn->mount_fid, NCP_IOC_NCPREQUEST, &request)) < 0)
|
|
{
|
|
return result;
|
|
}
|
|
conn->completion = BVAL(conn->packet, 6);
|
|
conn->conn_status = BVAL(conn->packet, 7);
|
|
conn->ncp_reply_size = result - sizeof(struct ncp_reply_header);
|
|
|
|
if ((conn->completion != 0) && (conn->verbose != 0))
|
|
{
|
|
ncp_printf("ncp_request_error: %d\n", conn->completion);
|
|
}
|
|
return conn->completion == 0 ? 0 : NCPL_ET_REQUEST_ERROR;
|
|
}
|
|
|
|
static long
|
|
ncp_temp_request(struct ncp_conn *conn, int function)
|
|
{
|
|
long err;
|
|
|
|
assert_conn_locked(conn);
|
|
|
|
conn->sequence += 1;
|
|
|
|
WSET_LH(conn->packet, 0, NCP_REQUEST);
|
|
BSET(conn->packet, 2, conn->sequence);
|
|
BSET(conn->packet, 3, (conn->i.connection) & 0xff);
|
|
BSET(conn->packet, 5, (conn->i.connection) >> 8);
|
|
BSET(conn->packet, 4, 1);
|
|
BSET(conn->packet, 6, function);
|
|
|
|
if (conn->has_subfunction != 0)
|
|
{
|
|
WSET_HL(conn->packet, 7, conn->current_size
|
|
- sizeof(struct ncp_request_header) - 2);
|
|
}
|
|
if ((err = do_ncp_call(conn, conn->current_size)) != 0)
|
|
{
|
|
return err;
|
|
}
|
|
conn->completion = BVAL(conn->packet, 6);
|
|
conn->conn_status = BVAL(conn->packet, 7);
|
|
conn->ncp_reply_size =
|
|
conn->reply_size - sizeof(struct ncp_reply_header);
|
|
|
|
if ((conn->completion != 0) && (conn->verbose != 0))
|
|
{
|
|
ncp_printf("ncp_completion_code: %d\n", conn->completion);
|
|
}
|
|
return conn->completion == 0 ? 0 : NCPL_ET_REQUEST_ERROR;
|
|
}
|
|
|
|
static long
|
|
ncp_connect_addr(struct ncp_conn *conn, const struct sockaddr_ipx *target,
|
|
int wdog_needed)
|
|
{
|
|
struct sockaddr_ipx addr;
|
|
int addrlen;
|
|
|
|
int ncp_sock, wdog_sock;
|
|
long err;
|
|
|
|
conn->is_connected = NOT_CONNECTED;
|
|
conn->verbose = 0;
|
|
|
|
if ((ncp_sock = socket(AF_IPX, SOCK_DGRAM, PF_IPX)) == -1)
|
|
{
|
|
return errno;
|
|
}
|
|
if ((wdog_sock = socket(AF_IPX, SOCK_DGRAM, PF_IPX)) == -1)
|
|
{
|
|
return errno;
|
|
}
|
|
addr.sipx_family = AF_IPX;
|
|
addr.sipx_port = htons(0x0);
|
|
addr.sipx_type = NCP_PTYPE;
|
|
addr.sipx_network = IPX_THIS_NET;
|
|
ipx_assign_node(addr.sipx_node, IPX_THIS_NODE);
|
|
|
|
addrlen = sizeof(addr);
|
|
|
|
if ((bind(ncp_sock, (struct sockaddr *) &addr, sizeof(addr)) == -1)
|
|
|| (getsockname(ncp_sock, (struct sockaddr *) &addr, &addrlen) == -1))
|
|
{
|
|
int saved_errno = errno;
|
|
close(ncp_sock);
|
|
close(wdog_sock);
|
|
return saved_errno;
|
|
}
|
|
addr.sipx_port = htons(ntohs(addr.sipx_port) + 1);
|
|
|
|
if (bind(wdog_sock, (struct sockaddr *) &addr, sizeof(addr)) == -1)
|
|
{
|
|
int saved_errno = errno;
|
|
close(ncp_sock);
|
|
close(wdog_sock);
|
|
return saved_errno;
|
|
}
|
|
conn->ncp_sock = ncp_sock;
|
|
conn->wdog_sock = wdog_sock;
|
|
|
|
conn->sequence = 0;
|
|
conn->i.addr = *target;
|
|
|
|
WSET_LH(conn->packet, 0, NCP_ALLOC_SLOT_REQUEST);
|
|
BSET(conn->packet, 2, conn->sequence);
|
|
BSET(conn->packet, 3, 0xff);
|
|
BSET(conn->packet, 4, 1);
|
|
BSET(conn->packet, 5, 0xff);
|
|
BSET(conn->packet, 6, 0);
|
|
|
|
if ((err = do_ncp_call(conn, sizeof(struct ncp_request_header))) != 0)
|
|
{
|
|
if ((err != ENETUNREACH)
|
|
|| (ipx_make_reachable(htonl(target->sipx_network)) != 0)
|
|
|| ((err =
|
|
do_ncp_call(conn,
|
|
sizeof(struct ncp_request_header))) != 0))
|
|
{
|
|
close(ncp_sock);
|
|
close(wdog_sock);
|
|
return err;
|
|
}
|
|
}
|
|
if (wdog_needed != 0)
|
|
{
|
|
install_wdog(conn);
|
|
} else
|
|
{
|
|
conn->wdog_pid = 0;
|
|
}
|
|
|
|
conn->sequence = 0;
|
|
conn->i.connection =
|
|
BVAL(conn->packet, 3) + (BVAL(conn->packet, 5) << 8);
|
|
conn->is_connected = CONN_TEMPORARY;
|
|
|
|
if ((ncp_negotiate_buffersize(conn, 1024,
|
|
&(conn->i.buffer_size)) != 0)
|
|
|| (conn->i.buffer_size < 512)
|
|
|| (conn->i.buffer_size > 1024))
|
|
{
|
|
ncp_do_close(conn);
|
|
return -1;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static long
|
|
ncp_connect_any(struct ncp_conn *conn, int wdog_needed)
|
|
{
|
|
struct sockaddr_ipx addr;
|
|
char name[NCP_BINDERY_NAME_LEN];
|
|
long result;
|
|
|
|
if ((result = ipx_sap_find_nearest(IPX_SAP_FILE_SERVER,
|
|
&addr, name)) != 0)
|
|
{
|
|
return result;
|
|
}
|
|
if ((result = ncp_connect_addr(conn, &addr, wdog_needed)) != 0)
|
|
{
|
|
return result;
|
|
}
|
|
strcpy(conn->server, name);
|
|
return 0;
|
|
}
|
|
|
|
struct sockaddr_ipx *
|
|
ncp_find_fileserver(char *server_name, long *err)
|
|
{
|
|
return ncp_find_server(&server_name, NCP_BINDERY_FSERVER, err);
|
|
}
|
|
|
|
struct sockaddr_ipx *
|
|
ncp_find_server(char **server_name, int type, long *err)
|
|
{
|
|
char server[NCP_BINDERY_NAME_LEN + 1];
|
|
static char nearest[NCP_BINDERY_NAME_LEN + 1];
|
|
struct nw_property prop;
|
|
struct prop_net_address *n_addr = (struct prop_net_address *) ∝
|
|
struct ncp_conn conn;
|
|
|
|
static struct sockaddr_ipx result;
|
|
|
|
initialize_NCPL_error_table();
|
|
|
|
memset(server, 0, sizeof(server));
|
|
memset(nearest, 0, sizeof(nearest));
|
|
|
|
if (*server_name != NULL)
|
|
{
|
|
if (strlen(*server_name) >= sizeof(server))
|
|
{
|
|
*err = NCPL_ET_NAMETOOLONG;
|
|
return NULL;
|
|
}
|
|
strcpy(server, *server_name);
|
|
str_upper(server);
|
|
}
|
|
if ((*err = ipx_sap_find_nearest(type, &result, nearest)) != 0)
|
|
{
|
|
return NULL;
|
|
}
|
|
/* We have to ask the nearest server for our wanted server */
|
|
|
|
memzero(conn);
|
|
if ((*err = ncp_connect_addr(&conn, &result, 0)) != 0)
|
|
{
|
|
return NULL;
|
|
}
|
|
if (*server_name == NULL)
|
|
{
|
|
*server_name = nearest;
|
|
ncp_do_close(&conn);
|
|
errno = 0;
|
|
return &result;
|
|
}
|
|
/* The following optimization should have been done before
|
|
ncp_connect_addr. This would be convenient if there was a
|
|
simple way to find out whether there is a route to the
|
|
server. Parsing /proc/net/ipx_route is not too nice, so we
|
|
just connect to the server and immediately disconnect
|
|
again. This way we also find out if the server still has
|
|
free connection slots. */
|
|
|
|
if (strcmp(server, nearest) == 0)
|
|
{
|
|
/* Our wanted server answered the SAP GNS request, so
|
|
use it */
|
|
ncp_do_close(&conn);
|
|
errno = 0;
|
|
return &result;
|
|
}
|
|
if (ncp_read_property_value(&conn, type, server, 1,
|
|
"NET_ADDRESS", &prop) != 0)
|
|
{
|
|
ncp_do_close(&conn);
|
|
*err = NCPL_ET_HOST_UNKNOWN;
|
|
return NULL;
|
|
}
|
|
if ((*err = ncp_do_close(&conn)) != 0)
|
|
{
|
|
return NULL;
|
|
}
|
|
result.sipx_family = AF_IPX;
|
|
result.sipx_network = n_addr->network;
|
|
result.sipx_port = n_addr->port;
|
|
ipx_assign_node(result.sipx_node, n_addr->node);
|
|
|
|
/* To make the final server reachable, we connect again. See
|
|
above. (When can we rely on all users running ipxd??? :-)) */
|
|
memzero(conn);
|
|
if (((*err = ncp_connect_addr(&conn, &result, 0)) != 0)
|
|
|| ((*err = ncp_do_close(&conn)) != 0))
|
|
{
|
|
return NULL;
|
|
}
|
|
return &result;
|
|
}
|
|
|
|
static long
|
|
ncp_open_temporary(struct ncp_conn *conn,
|
|
struct ncp_conn_spec *spec)
|
|
{
|
|
struct sockaddr_ipx *addr;
|
|
long err;
|
|
|
|
if (spec == NULL)
|
|
{
|
|
return ncp_connect_any(conn, 1);
|
|
}
|
|
if ((addr = ncp_find_fileserver(spec->server, &err)) == NULL)
|
|
{
|
|
return err;
|
|
}
|
|
if ((err = ncp_connect_addr(conn, addr, 1)) != 0)
|
|
{
|
|
return err;
|
|
}
|
|
strcpy(conn->server, spec->server);
|
|
|
|
if (strlen(spec->user) != 0)
|
|
{
|
|
if (ncp_login_object(conn, spec->user, spec->login_type,
|
|
spec->password) != 0)
|
|
{
|
|
ncp_do_close(conn);
|
|
return EACCES;
|
|
}
|
|
strcpy(conn->user, spec->user);
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
char *
|
|
ncp_find_permanent(const struct ncp_conn_spec *spec)
|
|
{
|
|
FILE *mtab;
|
|
struct ncp_conn_ent *conn_ent;
|
|
char *result = NULL;
|
|
int mount_fid;
|
|
struct ncp_fs_info i;
|
|
|
|
initialize_NCPL_error_table();
|
|
|
|
if ((mtab = fopen(MOUNTED, "r")) == NULL)
|
|
{
|
|
return NULL;
|
|
}
|
|
while ((conn_ent = ncp_get_conn_ent(mtab)) != NULL)
|
|
{
|
|
if (spec != NULL)
|
|
{
|
|
if ((conn_ent->uid != spec->uid)
|
|
|| ((strlen(spec->server) != 0)
|
|
&& (strcasecmp(conn_ent->server,
|
|
spec->server) != 0))
|
|
|| ((strlen(spec->user) != 0)
|
|
&& (strcasecmp(conn_ent->user,
|
|
spec->user) != 0)))
|
|
{
|
|
continue;
|
|
}
|
|
}
|
|
mount_fid = open(conn_ent->mount_point, O_RDONLY, 0);
|
|
if (mount_fid < 0)
|
|
{
|
|
continue;
|
|
}
|
|
i.version = NCP_GET_FS_INFO_VERSION;
|
|
|
|
if (ioctl(mount_fid, NCP_IOC_GET_FS_INFO, &i) < 0)
|
|
{
|
|
close(mount_fid);
|
|
continue;
|
|
}
|
|
close(mount_fid);
|
|
result = conn_ent->mount_point;
|
|
break;
|
|
}
|
|
|
|
fclose(mtab);
|
|
errno = (result == NULL) ? ENOENT : 0;
|
|
return result;
|
|
}
|
|
|
|
static int
|
|
ncp_open_permanent(struct ncp_conn *conn,
|
|
const struct ncp_conn_spec *spec)
|
|
{
|
|
char *mount_point;
|
|
|
|
if (conn->is_connected != NOT_CONNECTED)
|
|
{
|
|
errno = EBUSY;
|
|
return -1;
|
|
}
|
|
if ((mount_point = ncp_find_permanent(spec)) == NULL)
|
|
{
|
|
return -1;
|
|
}
|
|
if (strlen(mount_point) >= sizeof(conn->mount_point))
|
|
{
|
|
errno = ENAMETOOLONG;
|
|
return -1;
|
|
}
|
|
/* The rest has already been done in ncp_find_permanent, so we
|
|
* do not check errors anymore */
|
|
conn->mount_fid = open(mount_point, O_RDONLY, 0);
|
|
conn->i.version = NCP_GET_FS_INFO_VERSION;
|
|
ioctl(conn->mount_fid, NCP_IOC_GET_FS_INFO, &(conn->i));
|
|
if (spec != NULL)
|
|
{
|
|
strncpy(conn->server, spec->server, sizeof(conn->server));
|
|
strncpy(conn->user, spec->user, sizeof(conn->user));
|
|
} else
|
|
{
|
|
memset(conn->server, '\0', sizeof(conn->server));
|
|
memset(conn->user, '\0', sizeof(conn->user));
|
|
}
|
|
strcpy(conn->mount_point, mount_point);
|
|
conn->is_connected = CONN_PERMANENT;
|
|
return 0;
|
|
}
|
|
|
|
struct ncp_conn *
|
|
ncp_open(struct ncp_conn_spec *spec, long *err)
|
|
{
|
|
struct ncp_conn *result;
|
|
|
|
initialize_NCPL_error_table();
|
|
|
|
result = malloc(sizeof(struct ncp_conn));
|
|
|
|
if (result == NULL)
|
|
{
|
|
*err = ENOMEM;
|
|
return NULL;
|
|
}
|
|
memzero(*result);
|
|
|
|
if (ncp_open_permanent(result, spec) == 0)
|
|
{
|
|
return result;
|
|
}
|
|
if ((*err = ncp_open_temporary(result, spec)) != 0)
|
|
{
|
|
free(result);
|
|
return NULL;
|
|
}
|
|
return result;
|
|
}
|
|
|
|
|
|
struct ncp_conn *
|
|
ncp_open_mount(const char *mount_point, long *err)
|
|
{
|
|
struct ncp_conn *result;
|
|
|
|
initialize_NCPL_error_table();
|
|
|
|
if (strlen(mount_point) >= sizeof(result->mount_point))
|
|
{
|
|
*err = ENAMETOOLONG;
|
|
return NULL;
|
|
}
|
|
result = malloc(sizeof(struct ncp_conn));
|
|
|
|
if (result == NULL)
|
|
{
|
|
*err = ENOMEM;
|
|
return NULL;
|
|
}
|
|
memzero(*result);
|
|
|
|
result->is_connected = NOT_CONNECTED;
|
|
|
|
result->mount_fid = open(mount_point, O_RDONLY, 0);
|
|
if (result->mount_fid < 0)
|
|
{
|
|
free(result);
|
|
*err = ENODEV;
|
|
return NULL;
|
|
}
|
|
strcpy(result->mount_point, mount_point);
|
|
result->is_connected = CONN_PERMANENT;
|
|
|
|
result->i.version = NCP_GET_FS_INFO_VERSION;
|
|
|
|
if (ioctl(result->mount_fid, NCP_IOC_GET_FS_INFO, &(result->i)) != 0)
|
|
{
|
|
free(result);
|
|
*err = NCPL_ET_NO_NCPFS_FILE;
|
|
return NULL;
|
|
}
|
|
return result;
|
|
}
|
|
|
|
static long
|
|
ncp_user_disconnect(struct ncp_conn *conn)
|
|
{
|
|
long result;
|
|
|
|
conn->sequence += 1;
|
|
|
|
WSET_LH(conn->packet, 0, NCP_DEALLOC_SLOT_REQUEST);
|
|
BSET(conn->packet, 2, conn->sequence);
|
|
BSET(conn->packet, 3, (conn->i.connection) & 0xff);
|
|
BSET(conn->packet, 4, 1);
|
|
BSET(conn->packet, 5, (conn->i.connection) >> 8);
|
|
BSET(conn->packet, 6, 0);
|
|
|
|
if ((result = do_ncp_call(conn, sizeof(struct ncp_request_header))) != 0)
|
|
{
|
|
return result;
|
|
}
|
|
close(conn->ncp_sock);
|
|
close(conn->wdog_sock);
|
|
|
|
if (conn->wdog_pid != 0)
|
|
{
|
|
kill(conn->wdog_pid, SIGTERM);
|
|
wait(NULL);
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static long
|
|
ncp_do_close(struct ncp_conn *conn)
|
|
{
|
|
long result = -1;
|
|
|
|
switch (conn->is_connected)
|
|
{
|
|
case CONN_PERMANENT:
|
|
result = close(conn->mount_fid);
|
|
break;
|
|
|
|
case CONN_TEMPORARY:
|
|
result = ncp_user_disconnect(conn);
|
|
break;
|
|
|
|
default:
|
|
break;
|
|
}
|
|
|
|
conn->is_connected = NOT_CONNECTED;
|
|
|
|
return result;
|
|
}
|
|
|
|
long
|
|
ncp_close(struct ncp_conn *conn)
|
|
{
|
|
long result;
|
|
if (conn == NULL)
|
|
{
|
|
return 0;
|
|
}
|
|
if ((result = ncp_do_close(conn)) != 0)
|
|
{
|
|
return result;
|
|
}
|
|
free(conn);
|
|
return 0;
|
|
}
|
|
|
|
struct ncp_conn_ent *
|
|
ncp_get_conn_ent(FILE * filep)
|
|
{
|
|
static struct ncp_conn_ent entry;
|
|
char server[2 * NCP_BINDERY_NAME_LEN];
|
|
char *user;
|
|
struct mntent *mnt_ent;
|
|
int fid;
|
|
|
|
memzero(server);
|
|
memzero(entry);
|
|
|
|
while ((mnt_ent = getmntent(filep)) != NULL)
|
|
{
|
|
if (strcmp(mnt_ent->mnt_type, "ncpfs") != 0)
|
|
{
|
|
continue;
|
|
}
|
|
if (strlen(mnt_ent->mnt_fsname) >= sizeof(server))
|
|
{
|
|
continue;
|
|
}
|
|
strcpy(server, mnt_ent->mnt_fsname);
|
|
user = strchr(server, '/');
|
|
if (user != NULL)
|
|
{
|
|
*user = '\0';
|
|
user += 1;
|
|
if (strlen(user) >= sizeof(entry.user))
|
|
{
|
|
continue;
|
|
}
|
|
strcpy(entry.user, user);
|
|
}
|
|
if ((strlen(server) >= sizeof(entry.server))
|
|
|| (strlen(mnt_ent->mnt_dir) >= sizeof(entry.mount_point)))
|
|
{
|
|
continue;
|
|
}
|
|
strcpy(entry.server, server);
|
|
strcpy(entry.mount_point, mnt_ent->mnt_dir);
|
|
|
|
fid = open(entry.mount_point, O_RDONLY, 0);
|
|
|
|
if (fid == -1)
|
|
{
|
|
continue;
|
|
}
|
|
if (ioctl(fid, NCP_IOC_GETMOUNTUID, &entry.uid) != 0)
|
|
{
|
|
close(fid);
|
|
continue;
|
|
}
|
|
close(fid);
|
|
return &entry;
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
static struct ncp_conn_spec *
|
|
ncp_get_nwc_ent(FILE * nwc)
|
|
{
|
|
static struct ncp_conn_spec spec;
|
|
char line[512];
|
|
int line_len;
|
|
char *user;
|
|
char *password;
|
|
|
|
memzero(spec);
|
|
spec.uid = getuid();
|
|
|
|
while (fgets(line, sizeof(line), nwc) != NULL)
|
|
{
|
|
if ((line[0] == '\n')
|
|
|| (line[0] == '#'))
|
|
{
|
|
continue;
|
|
}
|
|
line_len = strlen(line);
|
|
if (line[line_len - 1] == '\n')
|
|
{
|
|
line[line_len - 1] = '\0';
|
|
}
|
|
user = strchr(line, '/');
|
|
password = strchr(user != NULL ? user : line, ' ');
|
|
|
|
if (password != NULL)
|
|
{
|
|
*password = '\0';
|
|
password += 1;
|
|
}
|
|
if (user != NULL)
|
|
{
|
|
*user = '\0';
|
|
user += 1;
|
|
if (strlen(user) >= sizeof(spec.user))
|
|
{
|
|
continue;
|
|
}
|
|
strcpy(spec.user, user);
|
|
}
|
|
if (strlen(line) >= sizeof(spec.server))
|
|
{
|
|
continue;
|
|
}
|
|
strcpy(spec.server, line);
|
|
|
|
if (password != NULL)
|
|
{
|
|
while (*password == ' ')
|
|
{
|
|
password += 1;
|
|
}
|
|
|
|
if (strlen(password) >= sizeof(spec.password))
|
|
{
|
|
continue;
|
|
}
|
|
strcpy(spec.password, password);
|
|
}
|
|
return &spec;
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
FILE *
|
|
ncp_fopen_nwc(const char *user, const char *mode, long *err)
|
|
{
|
|
char path[MAXPATHLEN];
|
|
char *home = NULL;
|
|
struct stat st;
|
|
|
|
if (mode == NULL)
|
|
{
|
|
mode = "r";
|
|
}
|
|
if (user == NULL)
|
|
{
|
|
home = getenv("HOME");
|
|
} else
|
|
{
|
|
struct passwd *pwd;
|
|
|
|
if ((pwd = getpwnam(user)) != NULL)
|
|
{
|
|
home = pwd->pw_dir;
|
|
}
|
|
}
|
|
|
|
if ((home == NULL)
|
|
|| (strlen(home) + sizeof(NWCLIENT) + 2 > sizeof(path)))
|
|
{
|
|
*err = ENAMETOOLONG;
|
|
return NULL;
|
|
}
|
|
strcpy(path, home);
|
|
strcat(path, "/");
|
|
strcat(path, NWCLIENT);
|
|
|
|
if (stat(path, &st) != 0)
|
|
{
|
|
*err = errno;
|
|
return NULL;
|
|
}
|
|
if ((st.st_mode & (S_IRWXO | S_IRWXG)) != 0)
|
|
{
|
|
*err = NCPL_ET_INVALID_MODE;
|
|
return NULL;
|
|
}
|
|
return fopen(path, mode);
|
|
}
|
|
|
|
struct ncp_conn_spec *
|
|
ncp_find_conn_spec(const char *server, const char *user, const char *password,
|
|
int login_necessary, uid_t uid, long *err)
|
|
{
|
|
static struct ncp_conn_spec spec;
|
|
|
|
struct ncp_conn conn;
|
|
|
|
FILE *nwc;
|
|
struct ncp_conn_spec *nwc_ent;
|
|
|
|
initialize_NCPL_error_table();
|
|
|
|
*err = 0;
|
|
memzero(spec);
|
|
spec.uid = getuid();
|
|
|
|
if (server != NULL)
|
|
{
|
|
if (strlen(server) >= sizeof(spec.server))
|
|
{
|
|
*err = NCPL_ET_NAMETOOLONG;
|
|
return NULL;
|
|
}
|
|
strcpy(spec.server, server);
|
|
} else
|
|
{
|
|
if ((nwc = ncp_fopen_nwc(NULL, NULL, err)) == NULL)
|
|
{
|
|
*err = NCPL_ET_NO_SERVER;
|
|
return NULL;
|
|
}
|
|
nwc_ent = ncp_get_nwc_ent(nwc);
|
|
fclose(nwc);
|
|
|
|
if (nwc_ent == NULL)
|
|
{
|
|
*err = NCPL_ET_NO_SPEC;
|
|
return NULL;
|
|
}
|
|
strcpy(spec.server, nwc_ent->server);
|
|
strcpy(spec.user, nwc_ent->user);
|
|
}
|
|
|
|
str_upper(spec.server);
|
|
|
|
if (login_necessary == 0)
|
|
{
|
|
memset(spec.user, 0, sizeof(spec.user));
|
|
memset(spec.password, 0, sizeof(spec.password));
|
|
return &spec;
|
|
}
|
|
if (user != NULL)
|
|
{
|
|
if (strlen(user) >= sizeof(spec.user))
|
|
{
|
|
*err = NCPL_ET_NAMETOOLONG;
|
|
return NULL;
|
|
}
|
|
strcpy(spec.user, user);
|
|
}
|
|
str_upper(spec.user);
|
|
spec.login_type = NCP_BINDERY_USER;
|
|
|
|
if (ncp_open_permanent(&conn, &spec) == 0)
|
|
{
|
|
ncp_do_close(&conn);
|
|
return &spec;
|
|
}
|
|
if (password != NULL)
|
|
{
|
|
if (strlen(password) >= sizeof(spec.password))
|
|
{
|
|
*err = NCPL_ET_NAMETOOLONG;
|
|
return NULL;
|
|
}
|
|
strcpy(spec.password, password);
|
|
} else
|
|
{
|
|
if ((nwc = ncp_fopen_nwc(NULL, NULL, err)) != NULL)
|
|
{
|
|
while ((nwc_ent = ncp_get_nwc_ent(nwc)) != NULL)
|
|
{
|
|
if ((strcasecmp(spec.server,
|
|
nwc_ent->server) != 0)
|
|
|| ((*spec.user != '\0')
|
|
&& (strcasecmp(spec.user,
|
|
nwc_ent->user) != 0)))
|
|
{
|
|
continue;
|
|
}
|
|
strcpy(spec.user, nwc_ent->user);
|
|
strcpy(spec.password, nwc_ent->password);
|
|
break;
|
|
}
|
|
fclose(nwc);
|
|
}
|
|
}
|
|
|
|
if (strlen(spec.user) == 0)
|
|
{
|
|
*err = NCPL_ET_NO_USER;
|
|
return NULL;
|
|
}
|
|
if ((strlen(spec.password) == 0) && (password == NULL))
|
|
{
|
|
char *password;
|
|
if (!(isatty(0) && isatty(1)))
|
|
{
|
|
return NULL;
|
|
}
|
|
printf("Logging into %s as %s\n",
|
|
spec.server, spec.user);
|
|
|
|
password = getpass("Password: ");
|
|
if (strlen(password) > sizeof(spec.password))
|
|
{
|
|
return NULL;
|
|
}
|
|
strcpy(spec.password, password);
|
|
} else
|
|
{
|
|
if (strcmp(spec.password, NWC_NOPASSWORD) == 0)
|
|
{
|
|
*spec.password = '\0';
|
|
}
|
|
}
|
|
|
|
str_upper(spec.server);
|
|
str_upper(spec.user);
|
|
str_upper(spec.password);
|
|
return &spec;
|
|
}
|
|
|
|
struct ncp_conn *
|
|
ncp_initialize_as(int *argc, char **argv,
|
|
int login_necessary, int login_type, long *err)
|
|
{
|
|
char *server = NULL;
|
|
char *user = NULL;
|
|
char *password = NULL;
|
|
struct ncp_conn_spec *spec;
|
|
int i = 1;
|
|
|
|
int get_argument(int arg_no, char **target)
|
|
{
|
|
int count = 1;
|
|
|
|
if (target != NULL)
|
|
{
|
|
if (arg_no + 1 >= *argc)
|
|
{
|
|
/* No argument to switch */
|
|
errno = EINVAL;
|
|
return -1;
|
|
}
|
|
*target = argv[arg_no + 1];
|
|
count = 2;
|
|
}
|
|
/* Delete the consumed switch from the argument list
|
|
and decrement the argument count */
|
|
while (count + arg_no < *argc)
|
|
{
|
|
argv[arg_no] = argv[arg_no + count];
|
|
arg_no += 1;
|
|
}
|
|
*argc -= count;
|
|
return 0;
|
|
}
|
|
|
|
initialize_NCPL_error_table();
|
|
|
|
*err = EINVAL;
|
|
|
|
while (i < *argc)
|
|
{
|
|
if ((argv[i][0] != '-')
|
|
|| (strlen(argv[i]) != 2))
|
|
{
|
|
i += 1;
|
|
continue;
|
|
}
|
|
switch (argv[i][1])
|
|
{
|
|
case 'S':
|
|
if (get_argument(i, &server) != 0)
|
|
{
|
|
return NULL;
|
|
}
|
|
continue;
|
|
case 'U':
|
|
if (get_argument(i, &user) != 0)
|
|
{
|
|
return NULL;
|
|
}
|
|
continue;
|
|
case 'P':
|
|
if (get_argument(i, &password) != 0)
|
|
{
|
|
return NULL;
|
|
}
|
|
continue;
|
|
case 'n':
|
|
if (get_argument(i, 0) != 0)
|
|
{
|
|
return NULL;
|
|
}
|
|
password = NWC_NOPASSWORD;
|
|
continue;
|
|
}
|
|
i += 1;
|
|
}
|
|
|
|
spec = ncp_find_conn_spec(server, user, password, login_necessary,
|
|
getuid(), err);
|
|
|
|
if (spec == NULL)
|
|
{
|
|
if (login_necessary != 0)
|
|
{
|
|
return NULL;
|
|
} else
|
|
{
|
|
return ncp_open(NULL, err);
|
|
}
|
|
}
|
|
spec->login_type = login_type;
|
|
|
|
if (login_necessary == 0)
|
|
{
|
|
spec->user[0] = '\0';
|
|
}
|
|
return ncp_open(spec, err);
|
|
}
|
|
|
|
struct ncp_conn *
|
|
ncp_initialize(int *argc, char **argv,
|
|
int login_necessary, long *err)
|
|
{
|
|
return ncp_initialize_as(argc, argv, login_necessary,
|
|
NCP_BINDERY_USER, err);
|
|
}
|
|
|
|
static long
|
|
ncp_request(struct ncp_conn *conn, int function)
|
|
{
|
|
switch (conn->is_connected)
|
|
{
|
|
case CONN_PERMANENT:
|
|
return ncp_mount_request(conn, function);
|
|
case CONN_TEMPORARY:
|
|
return ncp_temp_request(conn, function);
|
|
default:
|
|
}
|
|
return ENOTCONN;
|
|
}
|
|
|
|
/****************************************************************************/
|
|
/* */
|
|
/* Helper functions */
|
|
/* */
|
|
/****************************************************************************/
|
|
|
|
static inline int
|
|
min(int a, int b)
|
|
{
|
|
return (a < b) ? a : b;
|
|
}
|
|
|
|
static void
|
|
assert_conn_locked(struct ncp_conn *conn)
|
|
{
|
|
if (conn->lock == 0)
|
|
{
|
|
ncp_printf("ncpfs: conn not locked!\n");
|
|
}
|
|
}
|
|
|
|
static void
|
|
ncp_add_byte(struct ncp_conn *conn, byte x)
|
|
{
|
|
assert_conn_locked(conn);
|
|
BSET(conn->packet, conn->current_size, x);
|
|
conn->current_size += 1;
|
|
return;
|
|
}
|
|
|
|
static void
|
|
ncp_add_word_lh(struct ncp_conn *conn, word x)
|
|
{
|
|
assert_conn_locked(conn);
|
|
WSET_LH(conn->packet, conn->current_size, x);
|
|
conn->current_size += 2;
|
|
return;
|
|
}
|
|
|
|
static void
|
|
ncp_add_dword_lh(struct ncp_conn *conn, dword x)
|
|
{
|
|
assert_conn_locked(conn);
|
|
DSET_LH(conn->packet, conn->current_size, x);
|
|
conn->current_size += 4;
|
|
return;
|
|
}
|
|
|
|
static void
|
|
ncp_add_word_hl(struct ncp_conn *conn, word x)
|
|
{
|
|
assert_conn_locked(conn);
|
|
WSET_HL(conn->packet, conn->current_size, x);
|
|
conn->current_size += 2;
|
|
return;
|
|
}
|
|
|
|
static void
|
|
ncp_add_dword_hl(struct ncp_conn *conn, dword x)
|
|
{
|
|
assert_conn_locked(conn);
|
|
DSET_HL(conn->packet, conn->current_size, x);
|
|
conn->current_size += 4;
|
|
return;
|
|
}
|
|
|
|
static void
|
|
ncp_add_mem(struct ncp_conn *conn, const void *source, int size)
|
|
{
|
|
assert_conn_locked(conn);
|
|
memcpy(&(conn->packet[conn->current_size]), source, size);
|
|
conn->current_size += size;
|
|
return;
|
|
}
|
|
|
|
static void
|
|
ncp_add_pstring(struct ncp_conn *conn, const char *s)
|
|
{
|
|
int len = strlen(s);
|
|
assert_conn_locked(conn);
|
|
if (len > 255)
|
|
{
|
|
ncp_printf("ncpfs: string too long: %s\n", s);
|
|
len = 255;
|
|
}
|
|
ncp_add_byte(conn, len);
|
|
ncp_add_mem(conn, s, len);
|
|
return;
|
|
}
|
|
|
|
static void
|
|
ncp_init_request(struct ncp_conn *conn)
|
|
{
|
|
ncp_lock_conn(conn);
|
|
|
|
conn->current_size = sizeof(struct ncp_request_header);
|
|
conn->has_subfunction = 0;
|
|
}
|
|
|
|
static void
|
|
ncp_init_request_s(struct ncp_conn *conn, int subfunction)
|
|
{
|
|
ncp_init_request(conn);
|
|
ncp_add_word_lh(conn, 0); /* preliminary size */
|
|
|
|
ncp_add_byte(conn, subfunction);
|
|
|
|
conn->has_subfunction = 1;
|
|
}
|
|
|
|
static char *
|
|
ncp_reply_data(struct ncp_conn *conn, int offset)
|
|
{
|
|
return &(conn->packet[sizeof(struct ncp_reply_header) + offset]);
|
|
}
|
|
|
|
static byte
|
|
ncp_reply_byte(struct ncp_conn *conn, int offset)
|
|
{
|
|
return *(byte *) (ncp_reply_data(conn, offset));
|
|
}
|
|
|
|
static word
|
|
ncp_reply_word_hl(struct ncp_conn *conn, int offset)
|
|
{
|
|
return WVAL_HL(ncp_reply_data(conn, offset), 0);
|
|
}
|
|
|
|
static word
|
|
ncp_reply_word_lh(struct ncp_conn *conn, int offset)
|
|
{
|
|
return WVAL_LH(ncp_reply_data(conn, offset), 0);
|
|
}
|
|
|
|
static dword
|
|
ncp_reply_dword_hl(struct ncp_conn *conn, int offset)
|
|
{
|
|
return DVAL_HL(ncp_reply_data(conn, offset), 0);
|
|
}
|
|
|
|
static dword
|
|
ncp_reply_dword_lh(struct ncp_conn *conn, int offset)
|
|
{
|
|
return DVAL_LH(ncp_reply_data(conn, offset), 0);
|
|
}
|
|
|
|
/* Here the ncp calls begin
|
|
*/
|
|
|
|
static long
|
|
ncp_negotiate_buffersize(struct ncp_conn *conn,
|
|
int size, int *target)
|
|
{
|
|
long result;
|
|
|
|
ncp_init_request(conn);
|
|
ncp_add_word_hl(conn, size);
|
|
|
|
if ((result = ncp_request(conn, 33)) != 0)
|
|
{
|
|
ncp_unlock_conn(conn);
|
|
return result;
|
|
}
|
|
*target = min(ncp_reply_word_hl(conn, 0), size);
|
|
|
|
ncp_unlock_conn(conn);
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* target is a 8-byte buffer
|
|
*/
|
|
long
|
|
ncp_get_encryption_key(struct ncp_conn *conn,
|
|
char *target)
|
|
{
|
|
long result;
|
|
|
|
ncp_init_request_s(conn, 23);
|
|
|
|
if ((result = ncp_request(conn, 23)) != 0)
|
|
{
|
|
ncp_unlock_conn(conn);
|
|
return result;
|
|
}
|
|
if (conn->ncp_reply_size < 8)
|
|
{
|
|
ncp_printf("ncp_reply_size %d < 8\n",
|
|
conn->ncp_reply_size);
|
|
ncp_unlock_conn(conn);
|
|
return result;
|
|
}
|
|
memcpy(target, ncp_reply_data(conn, 0), 8);
|
|
ncp_unlock_conn(conn);
|
|
return 0;
|
|
}
|
|
|
|
long
|
|
ncp_get_bindery_object_id(struct ncp_conn *conn,
|
|
__u16 object_type,
|
|
const char *object_name,
|
|
struct ncp_bindery_object *target)
|
|
{
|
|
long result;
|
|
ncp_init_request_s(conn, 53);
|
|
ncp_add_word_hl(conn, object_type);
|
|
ncp_add_pstring(conn, object_name);
|
|
|
|
if ((result = ncp_request(conn, 23)) != 0)
|
|
{
|
|
ncp_unlock_conn(conn);
|
|
return result;
|
|
}
|
|
if (conn->ncp_reply_size < 54)
|
|
{
|
|
ncp_printf("ncp_reply_size %d < 54\n",
|
|
conn->ncp_reply_size);
|
|
ncp_unlock_conn(conn);
|
|
return result;
|
|
}
|
|
target->object_id = ncp_reply_dword_hl(conn, 0);
|
|
target->object_type = ncp_reply_word_hl(conn, 4);
|
|
memcpy(target->object_name, ncp_reply_data(conn, 6), 48);
|
|
ncp_unlock_conn(conn);
|
|
return 0;
|
|
}
|
|
|
|
long
|
|
ncp_read_property_value(struct ncp_conn *conn,
|
|
int object_type, const char *object_name,
|
|
int segment, const char *prop_name,
|
|
struct nw_property *target)
|
|
{
|
|
long result;
|
|
ncp_init_request_s(conn, 61);
|
|
ncp_add_word_hl(conn, object_type);
|
|
ncp_add_pstring(conn, object_name);
|
|
ncp_add_byte(conn, segment);
|
|
ncp_add_pstring(conn, prop_name);
|
|
|
|
if ((result = ncp_request(conn, 23)) != 0)
|
|
{
|
|
ncp_unlock_conn(conn);
|
|
return result;
|
|
}
|
|
memcpy(&(target->value), ncp_reply_data(conn, 0), 128);
|
|
target->more_flag = ncp_reply_byte(conn, 128);
|
|
target->property_flag = ncp_reply_byte(conn, 129);
|
|
ncp_unlock_conn(conn);
|
|
return 0;
|
|
}
|
|
|
|
long
|
|
ncp_login_encrypted(struct ncp_conn *conn,
|
|
const struct ncp_bindery_object *object,
|
|
const unsigned char *key,
|
|
const unsigned char *passwd)
|
|
{
|
|
dword tmpID = htonl(object->object_id);
|
|
unsigned char buf[128];
|
|
unsigned char encrypted[8];
|
|
long result;
|
|
|
|
shuffle((byte *) & tmpID, passwd, strlen(passwd), buf);
|
|
nw_encrypt(key, buf, encrypted);
|
|
|
|
ncp_init_request_s(conn, 24);
|
|
ncp_add_mem(conn, encrypted, 8);
|
|
ncp_add_word_hl(conn, object->object_type);
|
|
ncp_add_pstring(conn, object->object_name);
|
|
|
|
result = ncp_request(conn, 23);
|
|
ncp_unlock_conn(conn);
|
|
return result;
|
|
}
|
|
|
|
long
|
|
ncp_login_unencrypted(struct ncp_conn *conn,
|
|
__u16 object_type, const char *object_name,
|
|
const unsigned char *passwd)
|
|
{
|
|
long result;
|
|
ncp_init_request_s(conn, 20);
|
|
ncp_add_word_hl(conn, object_type);
|
|
ncp_add_pstring(conn, object_name);
|
|
ncp_add_pstring(conn, passwd);
|
|
result = ncp_request(conn, 23);
|
|
ncp_unlock_conn(conn);
|
|
return result;
|
|
}
|
|
|
|
long
|
|
ncp_login_user(struct ncp_conn *conn,
|
|
const unsigned char *username,
|
|
const unsigned char *password)
|
|
{
|
|
return ncp_login_object(conn, username, NCP_BINDERY_USER, password);
|
|
}
|
|
|
|
static long
|
|
ncp_login_object(struct ncp_conn *conn,
|
|
const unsigned char *username,
|
|
int login_type,
|
|
const unsigned char *password)
|
|
{
|
|
long result;
|
|
unsigned char ncp_key[8];
|
|
struct ncp_bindery_object user;
|
|
|
|
if ((result = ncp_get_encryption_key(conn, ncp_key)) != 0)
|
|
{
|
|
return ncp_login_unencrypted(conn, login_type, username,
|
|
password);
|
|
}
|
|
if ((result = ncp_get_bindery_object_id(conn, login_type,
|
|
username, &user)) != 0)
|
|
{
|
|
return result;
|
|
}
|
|
if ((result = ncp_login_encrypted(conn, &user,
|
|
ncp_key, password)) != 0)
|
|
{
|
|
struct nw_property p;
|
|
struct ncp_prop_login_control *l
|
|
= (struct ncp_prop_login_control *) &p;
|
|
|
|
if (conn->completion != NCP_GRACE_PERIOD)
|
|
{
|
|
return result;
|
|
}
|
|
fprintf(stderr, "Your password has expired\n");
|
|
|
|
if ((result = ncp_read_property_value(conn, NCP_BINDERY_USER,
|
|
username, 1,
|
|
"LOGIN_CONTROL",
|
|
&p)) == 0)
|
|
{
|
|
fprintf(stderr, "You have %d login attempts left\n",
|
|
l->GraceLogins);
|
|
}
|
|
}
|
|
return 0;
|
|
}
|