Files
ncpfs/sutil/ncplib.c
ncpfs archive import f88460b2e6 Import ncpfs 2.0.9
2026-04-28 20:39:58 +02:00

1872 lines
36 KiB
C

/*
* ncplib.c
*
* Copyright (C) 1995, 1996 by Volker Lendecke
*
*/
#include "ncplib.h"
#include "ncplib_err.h"
#include <sys/ioctl.h>
/* #include <sys/wait.h> *//* generates a warning here */
extern pid_t wait(int *);
#include <stdio.h>
#include <string.h>
#include <errno.h>
#include <sys/time.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <unistd.h>
#include <signal.h>
#include <fcntl.h>
#include <ctype.h>
#include <linux/route.h>
#include <sys/param.h>
#include <stdlib.h>
#include <mntent.h>
#include <pwd.h>
#include <sys/stat.h>
#include <stdarg.h>
static long
ncp_negotiate_buffersize(struct ncp_conn *conn,
int size, int *target);
static long
ncp_login_object(struct ncp_conn *conn,
const unsigned char *username,
int login_type,
const unsigned char *password);
static long
ncp_do_close(struct ncp_conn *conn);
void
str_upper(char *name)
{
while (*name)
{
*name = toupper(*name);
name = name + 1;
}
}
/* I know it's terrible to include a .c file here, but I want to keep
the file nwcrypt.c intact and separate for copyright reasons */
#include "nwcrypt.c"
void
ipx_fprint_node(FILE * file, IPXNode node)
{
fprintf(file, "%02X%02X%02X%02X%02X%02X",
(unsigned char) node[0],
(unsigned char) node[1],
(unsigned char) node[2],
(unsigned char) node[3],
(unsigned char) node[4],
(unsigned char) node[5]
);
}
void
ipx_fprint_network(FILE * file, IPXNet net)
{
fprintf(file, "%08lX", ntohl(net));
}
void
ipx_fprint_port(FILE * file, IPXPort port)
{
fprintf(file, "%04X", ntohs(port));
}
void
ipx_fprint_saddr(FILE * file, struct sockaddr_ipx *sipx)
{
ipx_fprint_network(file, sipx->sipx_network);
fprintf(file, ":");
ipx_fprint_node(file, sipx->sipx_node);
fprintf(file, ":");
ipx_fprint_port(file, sipx->sipx_port);
}
void
ipx_print_node(IPXNode node)
{
ipx_fprint_node(stdout, node);
}
void
ipx_print_network(IPXNet net)
{
ipx_fprint_network(stdout, net);
}
void
ipx_print_port(IPXPort port)
{
ipx_fprint_port(stdout, port);
}
void
ipx_print_saddr(struct sockaddr_ipx *sipx)
{
ipx_fprint_saddr(stdout, sipx);
}
int
ipx_sscanf_node(char *buf, unsigned char node[6])
{
int i;
int n[6];
if ((i = sscanf(buf, "%2x%2x%2x%2x%2x%2x",
&(n[0]), &(n[1]), &(n[2]),
&(n[3]), &(n[4]), &(n[5]))) != 6)
{
return i;
}
for (i = 0; i < 6; i++)
{
node[i] = n[i];
}
return 6;
}
void
ipx_assign_node(IPXNode dest, IPXNode src)
{
memcpy(dest, src, IPX_NODE_LEN);
}
int
ipx_node_equal(IPXNode n1, IPXNode n2)
{
return memcmp(n1, n2, IPX_NODE_LEN) == 0;
}
static int
ipx_recvfrom(int sock, void *buf, int len, unsigned int flags,
struct sockaddr_ipx *sender, int *addrlen, int timeout,
long *err)
{
fd_set rd, wr, ex;
struct timeval tv;
int result;
FD_ZERO(&rd);
FD_ZERO(&wr);
FD_ZERO(&ex);
FD_SET(sock, &rd);
tv.tv_sec = timeout;
tv.tv_usec = 0;
if ((result = select(sock + 1, &rd, &wr, &ex, &tv)) == -1)
{
*err = errno;
return -1;
}
if (FD_ISSET(sock, &rd))
{
result = recvfrom(sock, buf, len, flags,
(struct sockaddr *) sender, addrlen);
} else
{
result = -1;
errno = ETIMEDOUT;
}
if (result < 0)
{
*err = errno;
}
return result;
}
static int
ipx_recv(int sock, void *buf, int len, unsigned int flags, int timeout,
long *err)
{
struct sockaddr_ipx sender;
int addrlen = sizeof(sender);
return ipx_recvfrom(sock, buf, len, flags, &sender, &addrlen,
timeout, err);
}
static long
ipx_sap_find_nearest(int server_type, struct sockaddr_ipx *result,
char server_name[NCP_BINDERY_NAME_LEN])
{
struct sockaddr_ipx addr;
char data[1024];
int sock;
int opt;
int packets;
int len;
struct sap_server_ident *ident;
if ((sock = socket(AF_IPX, SOCK_DGRAM, PF_IPX)) < 0)
{
if (errno == EINVAL)
{
return NCPL_ET_NO_IPX;
}
return errno;
}
opt = 1;
/* Permit broadcast output */
if (setsockopt(sock, SOL_SOCKET, SO_BROADCAST, &opt, sizeof(opt)) == -1)
{
goto finished;
}
memzero(addr);
addr.sipx_family = AF_IPX;
addr.sipx_network = htonl(0x0);
addr.sipx_port = htons(0x0);
addr.sipx_type = IPX_SAP_PTYPE;
if (bind(sock, (struct sockaddr *) &addr, sizeof(addr)) == -1)
{
if (errno == EADDRNOTAVAIL)
{
errno = NCPL_ET_NO_INTERFACE;
}
goto finished;
}
WSET_HL(data, 0, IPX_SAP_NEAREST_QUERY);
WSET_HL(data, 2, server_type);
memzero(addr);
addr.sipx_family = AF_IPX;
addr.sipx_port = htons(IPX_SAP_PORT);
addr.sipx_type = IPX_SAP_PTYPE;
addr.sipx_network = htonl(0x0);
ipx_assign_node(addr.sipx_node, IPX_BROADCAST_NODE);
if (sendto(sock, data, 4, 0,
(struct sockaddr *) &addr, sizeof(addr)) < 0)
{
goto finished;
}
packets = 5;
do
{
long err;
len = ipx_recv(sock, data, 1024, 0, 1, &err);
if (len < 66)
{
packets = packets - 1;
continue;
}
}
while ((ntohs(*((__u16 *) data)) != IPX_SAP_NEAREST_RESPONSE)
&& (packets > 0));
if (packets == 0)
{
close(sock);
return NCPL_ET_NO_SERVER;
}
ident = (struct sap_server_ident *) (data + 2);
result->sipx_family = AF_IPX;
result->sipx_network = ident->server_network;
result->sipx_port = ident->server_port;
ipx_assign_node(result->sipx_node, ident->server_node);
memcpy(server_name, ident->server_name, sizeof(ident->server_name));
errno = 0;
finished:
close(sock);
return errno;
}
static int
ipx_make_reachable(IPXNet network)
{
struct rtentry rt_def;
/* Router */
struct sockaddr_ipx *sr = (struct sockaddr_ipx *) &rt_def.rt_gateway;
/* Target */
struct sockaddr_ipx *st = (struct sockaddr_ipx *) &rt_def.rt_dst;
struct ipx_rip_packet rip;
struct sockaddr_ipx addr;
int addrlen;
int sock;
int opt;
int res = -1;
int i;
int packets;
if (geteuid() != 0)
{
errno = EPERM;
return -1;
}
memzero(rip);
sock = socket(AF_IPX, SOCK_DGRAM, PF_IPX);
if (sock == -1)
{
if (errno == EINVAL)
{
return NCPL_ET_NO_IPX;
}
return errno;
}
opt = 1;
/* Permit broadcast output */
if (setsockopt(sock, SOL_SOCKET, SO_BROADCAST, &opt, sizeof(opt)) != 0)
{
goto finished;
}
memzero(addr);
addr.sipx_family = AF_IPX;
addr.sipx_network = htonl(0x0);
addr.sipx_port = htons(0x0);
addr.sipx_type = IPX_RIP_PTYPE;
if (bind(sock, (struct sockaddr *) &addr, sizeof(addr)) != 0)
{
goto finished;
}
addr.sipx_family = AF_IPX;
addr.sipx_port = htons(IPX_RIP_PORT);
addr.sipx_type = IPX_RIP_PTYPE;
addr.sipx_network = htonl(0x0);
ipx_assign_node(addr.sipx_node, IPX_BROADCAST_NODE);
rip.operation = htons(IPX_RIP_REQUEST);
rip.rt[0].network = htonl(network);
if (sendto(sock, &rip, sizeof(rip), 0,
(struct sockaddr *) &addr, sizeof(addr)) < 0)
{
goto finished;
}
packets = 3;
do
{
long err;
int len;
if (packets == 0)
{
goto finished;
}
addrlen = sizeof(struct sockaddr_ipx);
len = ipx_recvfrom(sock, &rip, sizeof(rip), 0, sr, &addrlen, 1,
&err);
if (len < sizeof(rip))
{
packets = packets - 1;
continue;
}
}
while (ntohs(rip.operation) != IPX_RIP_RESPONSE);
if (rip.rt[0].network != htonl(network))
{
goto finished;
}
rt_def.rt_flags = RTF_GATEWAY;
st->sipx_network = htonl(network);
st->sipx_family = AF_IPX;
sr->sipx_family = AF_IPX;
i = 0;
do
{
res = ioctl(sock, SIOCADDRT, &rt_def);
i++;
}
while ((i < 5) && (res < 0) && (errno == EAGAIN));
finished:
close(sock);
if (res != 0)
{
errno = ENETUNREACH;
}
return res;
}
static int
install_wdog(struct ncp_conn *conn)
{
int parent_pid = getpid();
int pid;
int sock = conn->wdog_sock;
char buf[1024];
struct sockaddr_ipx sender;
int sizeofaddr = sizeof(struct sockaddr_ipx);
int pktsize;
if ((pid = fork()) < 0)
{
return -1;
}
if (pid != 0)
{
/* Parent, should go on as usual */
conn->wdog_pid = pid;
return 0;
}
while (1)
{
long err;
/* every 120 seconds we look if our parent is
still alive */
pktsize = ipx_recvfrom(sock, buf, sizeof(buf), 0,
&sender, &sizeofaddr, 120, &err);
if (getppid() != parent_pid)
{
/* our parent has died, so nothing to do
anymore */
exit(0);
}
if ((pktsize != 2)
|| (buf[1] != '?'))
{
continue;
}
buf[1] = 'Y';
pktsize = sendto(sock, buf, 2, 0,
(struct sockaddr *) &sender,
sizeof(sender));
}
}
#define ncp_printf printf
#define ncp_printf printf
static void
assert_conn_locked(struct ncp_conn *conn);
static void
assert_conn_not_locked(struct ncp_conn *conn)
{
if (conn->lock != 0)
{
ncp_printf("ncpfs: conn already locked!\n");
}
}
static void
ncp_lock_conn(struct ncp_conn *conn)
{
assert_conn_not_locked(conn);
conn->lock = 1;
}
static void
ncp_unlock_conn(struct ncp_conn *conn)
{
assert_conn_locked(conn);
conn->lock = 0;
}
static long
do_ncp_call(struct ncp_conn *conn, int request_size)
{
struct ncp_request_header request;
int result;
int retries = 20;
int len;
long err;
memcpy(&request, conn->packet, sizeof(request));
while (retries > 0)
{
struct ncp_reply_header reply;
struct sockaddr_ipx sender;
int sizeofaddr = sizeof(sender);
retries -= 1;
result = sendto(conn->ncp_sock, conn->packet,
request_size,
0, (struct sockaddr *) &(conn->i.addr),
sizeof(conn->i.addr));
if (result < 0)
{
return errno;
}
re_select:
len = ipx_recvfrom(conn->ncp_sock,
(char *) &reply, sizeof(reply),
MSG_PEEK, &sender, &sizeofaddr, 3, &err);
if ((len < 0) && (err == ETIMEDOUT))
{
continue;
}
if (len < 0)
{
return err;
}
if ( /* Is the sender wrong? */
(memcmp(&sender.sipx_node,
&(conn->i.addr.sipx_node), 6) != 0)
|| (sender.sipx_port != conn->i.addr.sipx_port)
/* Did the sender send a positive acknowledge? */
|| ((len == sizeof(reply))
&& (reply.type == NCP_POSITIVE_ACK))
/* Did we get a bogus answer? */
|| ((len < sizeof(reply))
|| (reply.type != NCP_REPLY)
|| ((request.type != NCP_ALLOC_SLOT_REQUEST)
&& ((reply.sequence != request.sequence)
|| (reply.conn_low != request.conn_low)
|| (reply.conn_high != request.conn_high)))))
{
/* Then throw away the packet */
ipx_recv(conn->ncp_sock, (char *) &reply, sizeof(reply),
0, 1, &err);
goto re_select;
}
ipx_recv(conn->ncp_sock, conn->packet, NCP_PACKET_SIZE,
0, 1, &err);
conn->reply_size = len;
return 0;
}
return ETIMEDOUT;
}
static int
ncp_mount_request(struct ncp_conn *conn, int function)
{
struct ncp_ioctl_request request;
int result;
assert_conn_locked(conn);
if (conn->has_subfunction != 0)
{
WSET_HL(conn->packet, 7, conn->current_size
- sizeof(struct ncp_request_header) - 2);
}
request.function = function;
request.size = conn->current_size;
request.data = conn->packet;
if ((result = ioctl(conn->mount_fid, NCP_IOC_NCPREQUEST, &request)) < 0)
{
return result;
}
conn->completion = BVAL(conn->packet, 6);
conn->conn_status = BVAL(conn->packet, 7);
conn->ncp_reply_size = result - sizeof(struct ncp_reply_header);
if ((conn->completion != 0) && (conn->verbose != 0))
{
ncp_printf("ncp_request_error: %d\n", conn->completion);
}
return conn->completion == 0 ? 0 : NCPL_ET_REQUEST_ERROR;
}
static long
ncp_temp_request(struct ncp_conn *conn, int function)
{
long err;
assert_conn_locked(conn);
conn->sequence += 1;
WSET_LH(conn->packet, 0, NCP_REQUEST);
BSET(conn->packet, 2, conn->sequence);
BSET(conn->packet, 3, (conn->i.connection) & 0xff);
BSET(conn->packet, 5, (conn->i.connection) >> 8);
BSET(conn->packet, 4, 1);
BSET(conn->packet, 6, function);
if (conn->has_subfunction != 0)
{
WSET_HL(conn->packet, 7, conn->current_size
- sizeof(struct ncp_request_header) - 2);
}
if ((err = do_ncp_call(conn, conn->current_size)) != 0)
{
return err;
}
conn->completion = BVAL(conn->packet, 6);
conn->conn_status = BVAL(conn->packet, 7);
conn->ncp_reply_size =
conn->reply_size - sizeof(struct ncp_reply_header);
if ((conn->completion != 0) && (conn->verbose != 0))
{
ncp_printf("ncp_completion_code: %d\n", conn->completion);
}
return conn->completion == 0 ? 0 : NCPL_ET_REQUEST_ERROR;
}
static long
ncp_connect_addr(struct ncp_conn *conn, const struct sockaddr_ipx *target,
int wdog_needed)
{
struct sockaddr_ipx addr;
int addrlen;
int ncp_sock, wdog_sock;
long err;
conn->is_connected = NOT_CONNECTED;
conn->verbose = 0;
if ((ncp_sock = socket(AF_IPX, SOCK_DGRAM, PF_IPX)) == -1)
{
return errno;
}
if ((wdog_sock = socket(AF_IPX, SOCK_DGRAM, PF_IPX)) == -1)
{
return errno;
}
addr.sipx_family = AF_IPX;
addr.sipx_port = htons(0x0);
addr.sipx_type = NCP_PTYPE;
addr.sipx_network = IPX_THIS_NET;
ipx_assign_node(addr.sipx_node, IPX_THIS_NODE);
addrlen = sizeof(addr);
if ((bind(ncp_sock, (struct sockaddr *) &addr, sizeof(addr)) == -1)
|| (getsockname(ncp_sock, (struct sockaddr *) &addr, &addrlen) == -1))
{
int saved_errno = errno;
close(ncp_sock);
close(wdog_sock);
return saved_errno;
}
addr.sipx_port = htons(ntohs(addr.sipx_port) + 1);
if (bind(wdog_sock, (struct sockaddr *) &addr, sizeof(addr)) == -1)
{
int saved_errno = errno;
close(ncp_sock);
close(wdog_sock);
return saved_errno;
}
conn->ncp_sock = ncp_sock;
conn->wdog_sock = wdog_sock;
conn->sequence = 0;
conn->i.addr = *target;
WSET_LH(conn->packet, 0, NCP_ALLOC_SLOT_REQUEST);
BSET(conn->packet, 2, conn->sequence);
BSET(conn->packet, 3, 0xff);
BSET(conn->packet, 4, 1);
BSET(conn->packet, 5, 0xff);
BSET(conn->packet, 6, 0);
if ((err = do_ncp_call(conn, sizeof(struct ncp_request_header))) != 0)
{
if ((err != ENETUNREACH)
|| (ipx_make_reachable(htonl(target->sipx_network)) != 0)
|| ((err =
do_ncp_call(conn,
sizeof(struct ncp_request_header))) != 0))
{
close(ncp_sock);
close(wdog_sock);
return err;
}
}
if (wdog_needed != 0)
{
install_wdog(conn);
} else
{
conn->wdog_pid = 0;
}
conn->sequence = 0;
conn->i.connection =
BVAL(conn->packet, 3) + (BVAL(conn->packet, 5) << 8);
conn->is_connected = CONN_TEMPORARY;
if ((ncp_negotiate_buffersize(conn, 1024,
&(conn->i.buffer_size)) != 0)
|| (conn->i.buffer_size < 512)
|| (conn->i.buffer_size > 1024))
{
ncp_do_close(conn);
return -1;
}
return 0;
}
static long
ncp_connect_any(struct ncp_conn *conn, int wdog_needed)
{
struct sockaddr_ipx addr;
char name[NCP_BINDERY_NAME_LEN];
long result;
if ((result = ipx_sap_find_nearest(IPX_SAP_FILE_SERVER,
&addr, name)) != 0)
{
return result;
}
if ((result = ncp_connect_addr(conn, &addr, wdog_needed)) != 0)
{
return result;
}
strcpy(conn->server, name);
return 0;
}
struct sockaddr_ipx *
ncp_find_fileserver(char *server_name, long *err)
{
return ncp_find_server(&server_name, NCP_BINDERY_FSERVER, err);
}
struct sockaddr_ipx *
ncp_find_server(char **server_name, int type, long *err)
{
char server[NCP_BINDERY_NAME_LEN + 1];
static char nearest[NCP_BINDERY_NAME_LEN + 1];
struct nw_property prop;
struct prop_net_address *n_addr = (struct prop_net_address *) &prop;
struct ncp_conn conn;
static struct sockaddr_ipx result;
initialize_NCPL_error_table();
memset(server, 0, sizeof(server));
memset(nearest, 0, sizeof(nearest));
if (*server_name != NULL)
{
if (strlen(*server_name) >= sizeof(server))
{
*err = NCPL_ET_NAMETOOLONG;
return NULL;
}
strcpy(server, *server_name);
str_upper(server);
}
if ((*err = ipx_sap_find_nearest(type, &result, nearest)) != 0)
{
return NULL;
}
/* We have to ask the nearest server for our wanted server */
memzero(conn);
if ((*err = ncp_connect_addr(&conn, &result, 0)) != 0)
{
return NULL;
}
if (*server_name == NULL)
{
*server_name = nearest;
ncp_do_close(&conn);
errno = 0;
return &result;
}
/* The following optimization should have been done before
ncp_connect_addr. This would be convenient if there was a
simple way to find out whether there is a route to the
server. Parsing /proc/net/ipx_route is not too nice, so we
just connect to the server and immediately disconnect
again. This way we also find out if the server still has
free connection slots. */
if (strcmp(server, nearest) == 0)
{
/* Our wanted server answered the SAP GNS request, so
use it */
ncp_do_close(&conn);
errno = 0;
return &result;
}
if (ncp_read_property_value(&conn, type, server, 1,
"NET_ADDRESS", &prop) != 0)
{
ncp_do_close(&conn);
*err = NCPL_ET_HOST_UNKNOWN;
return NULL;
}
if ((*err = ncp_do_close(&conn)) != 0)
{
return NULL;
}
result.sipx_family = AF_IPX;
result.sipx_network = n_addr->network;
result.sipx_port = n_addr->port;
ipx_assign_node(result.sipx_node, n_addr->node);
/* To make the final server reachable, we connect again. See
above. (When can we rely on all users running ipxd??? :-)) */
memzero(conn);
if (((*err = ncp_connect_addr(&conn, &result, 0)) != 0)
|| ((*err = ncp_do_close(&conn)) != 0))
{
return NULL;
}
return &result;
}
static long
ncp_open_temporary(struct ncp_conn *conn,
struct ncp_conn_spec *spec)
{
struct sockaddr_ipx *addr;
long err;
if (spec == NULL)
{
return ncp_connect_any(conn, 1);
}
if ((addr = ncp_find_fileserver(spec->server, &err)) == NULL)
{
return err;
}
if ((err = ncp_connect_addr(conn, addr, 1)) != 0)
{
return err;
}
strcpy(conn->server, spec->server);
if (strlen(spec->user) != 0)
{
if (ncp_login_object(conn, spec->user, spec->login_type,
spec->password) != 0)
{
ncp_do_close(conn);
return EACCES;
}
strcpy(conn->user, spec->user);
}
return 0;
}
char *
ncp_find_permanent(const struct ncp_conn_spec *spec)
{
FILE *mtab;
struct ncp_conn_ent *conn_ent;
char *result = NULL;
int mount_fid;
struct ncp_fs_info i;
initialize_NCPL_error_table();
if ((mtab = fopen(MOUNTED, "r")) == NULL)
{
return NULL;
}
while ((conn_ent = ncp_get_conn_ent(mtab)) != NULL)
{
if (spec != NULL)
{
if ((conn_ent->uid != spec->uid)
|| ((strlen(spec->server) != 0)
&& (strcasecmp(conn_ent->server,
spec->server) != 0))
|| ((strlen(spec->user) != 0)
&& (strcasecmp(conn_ent->user,
spec->user) != 0)))
{
continue;
}
}
mount_fid = open(conn_ent->mount_point, O_RDONLY, 0);
if (mount_fid < 0)
{
continue;
}
i.version = NCP_GET_FS_INFO_VERSION;
if (ioctl(mount_fid, NCP_IOC_GET_FS_INFO, &i) < 0)
{
close(mount_fid);
continue;
}
close(mount_fid);
result = conn_ent->mount_point;
break;
}
fclose(mtab);
errno = (result == NULL) ? ENOENT : 0;
return result;
}
static int
ncp_open_permanent(struct ncp_conn *conn,
const struct ncp_conn_spec *spec)
{
char *mount_point;
if (conn->is_connected != NOT_CONNECTED)
{
errno = EBUSY;
return -1;
}
if ((mount_point = ncp_find_permanent(spec)) == NULL)
{
return -1;
}
if (strlen(mount_point) >= sizeof(conn->mount_point))
{
errno = ENAMETOOLONG;
return -1;
}
/* The rest has already been done in ncp_find_permanent, so we
* do not check errors anymore */
conn->mount_fid = open(mount_point, O_RDONLY, 0);
conn->i.version = NCP_GET_FS_INFO_VERSION;
ioctl(conn->mount_fid, NCP_IOC_GET_FS_INFO, &(conn->i));
if (spec != NULL)
{
strncpy(conn->server, spec->server, sizeof(conn->server));
strncpy(conn->user, spec->user, sizeof(conn->user));
} else
{
memset(conn->server, '\0', sizeof(conn->server));
memset(conn->user, '\0', sizeof(conn->user));
}
strcpy(conn->mount_point, mount_point);
conn->is_connected = CONN_PERMANENT;
return 0;
}
struct ncp_conn *
ncp_open(struct ncp_conn_spec *spec, long *err)
{
struct ncp_conn *result;
initialize_NCPL_error_table();
result = malloc(sizeof(struct ncp_conn));
if (result == NULL)
{
*err = ENOMEM;
return NULL;
}
memzero(*result);
if (ncp_open_permanent(result, spec) == 0)
{
return result;
}
if ((*err = ncp_open_temporary(result, spec)) != 0)
{
free(result);
return NULL;
}
return result;
}
struct ncp_conn *
ncp_open_mount(const char *mount_point, long *err)
{
struct ncp_conn *result;
initialize_NCPL_error_table();
if (strlen(mount_point) >= sizeof(result->mount_point))
{
*err = ENAMETOOLONG;
return NULL;
}
result = malloc(sizeof(struct ncp_conn));
if (result == NULL)
{
*err = ENOMEM;
return NULL;
}
memzero(*result);
result->is_connected = NOT_CONNECTED;
result->mount_fid = open(mount_point, O_RDONLY, 0);
if (result->mount_fid < 0)
{
free(result);
*err = ENODEV;
return NULL;
}
strcpy(result->mount_point, mount_point);
result->is_connected = CONN_PERMANENT;
result->i.version = NCP_GET_FS_INFO_VERSION;
if (ioctl(result->mount_fid, NCP_IOC_GET_FS_INFO, &(result->i)) != 0)
{
free(result);
*err = NCPL_ET_NO_NCPFS_FILE;
return NULL;
}
return result;
}
static long
ncp_user_disconnect(struct ncp_conn *conn)
{
long result;
conn->sequence += 1;
WSET_LH(conn->packet, 0, NCP_DEALLOC_SLOT_REQUEST);
BSET(conn->packet, 2, conn->sequence);
BSET(conn->packet, 3, (conn->i.connection) & 0xff);
BSET(conn->packet, 4, 1);
BSET(conn->packet, 5, (conn->i.connection) >> 8);
BSET(conn->packet, 6, 0);
if ((result = do_ncp_call(conn, sizeof(struct ncp_request_header))) != 0)
{
return result;
}
close(conn->ncp_sock);
close(conn->wdog_sock);
if (conn->wdog_pid != 0)
{
kill(conn->wdog_pid, SIGTERM);
wait(NULL);
}
return 0;
}
static long
ncp_do_close(struct ncp_conn *conn)
{
long result = -1;
switch (conn->is_connected)
{
case CONN_PERMANENT:
result = close(conn->mount_fid);
break;
case CONN_TEMPORARY:
result = ncp_user_disconnect(conn);
break;
default:
break;
}
conn->is_connected = NOT_CONNECTED;
return result;
}
long
ncp_close(struct ncp_conn *conn)
{
long result;
if (conn == NULL)
{
return 0;
}
if ((result = ncp_do_close(conn)) != 0)
{
return result;
}
free(conn);
return 0;
}
struct ncp_conn_ent *
ncp_get_conn_ent(FILE * filep)
{
static struct ncp_conn_ent entry;
char server[2 * NCP_BINDERY_NAME_LEN];
char *user;
struct mntent *mnt_ent;
int fid;
memzero(server);
memzero(entry);
while ((mnt_ent = getmntent(filep)) != NULL)
{
if (strcmp(mnt_ent->mnt_type, "ncpfs") != 0)
{
continue;
}
if (strlen(mnt_ent->mnt_fsname) >= sizeof(server))
{
continue;
}
strcpy(server, mnt_ent->mnt_fsname);
user = strchr(server, '/');
if (user != NULL)
{
*user = '\0';
user += 1;
if (strlen(user) >= sizeof(entry.user))
{
continue;
}
strcpy(entry.user, user);
}
if ((strlen(server) >= sizeof(entry.server))
|| (strlen(mnt_ent->mnt_dir) >= sizeof(entry.mount_point)))
{
continue;
}
strcpy(entry.server, server);
strcpy(entry.mount_point, mnt_ent->mnt_dir);
fid = open(entry.mount_point, O_RDONLY, 0);
if (fid == -1)
{
continue;
}
if (ioctl(fid, NCP_IOC_GETMOUNTUID, &entry.uid) != 0)
{
close(fid);
continue;
}
close(fid);
return &entry;
}
return NULL;
}
static struct ncp_conn_spec *
ncp_get_nwc_ent(FILE * nwc)
{
static struct ncp_conn_spec spec;
char line[512];
int line_len;
char *user;
char *password;
memzero(spec);
spec.uid = getuid();
while (fgets(line, sizeof(line), nwc) != NULL)
{
if ((line[0] == '\n')
|| (line[0] == '#'))
{
continue;
}
line_len = strlen(line);
if (line[line_len - 1] == '\n')
{
line[line_len - 1] = '\0';
}
user = strchr(line, '/');
password = strchr(user != NULL ? user : line, ' ');
if (password != NULL)
{
*password = '\0';
password += 1;
}
if (user != NULL)
{
*user = '\0';
user += 1;
if (strlen(user) >= sizeof(spec.user))
{
continue;
}
strcpy(spec.user, user);
}
if (strlen(line) >= sizeof(spec.server))
{
continue;
}
strcpy(spec.server, line);
if (password != NULL)
{
while (*password == ' ')
{
password += 1;
}
if (strlen(password) >= sizeof(spec.password))
{
continue;
}
strcpy(spec.password, password);
}
return &spec;
}
return NULL;
}
FILE *
ncp_fopen_nwc(const char *user, const char *mode, long *err)
{
char path[MAXPATHLEN];
char *home = NULL;
struct stat st;
if (mode == NULL)
{
mode = "r";
}
if (user == NULL)
{
home = getenv("HOME");
} else
{
struct passwd *pwd;
if ((pwd = getpwnam(user)) != NULL)
{
home = pwd->pw_dir;
}
}
if ((home == NULL)
|| (strlen(home) + sizeof(NWCLIENT) + 2 > sizeof(path)))
{
*err = ENAMETOOLONG;
return NULL;
}
strcpy(path, home);
strcat(path, "/");
strcat(path, NWCLIENT);
if (stat(path, &st) != 0)
{
*err = errno;
return NULL;
}
if ((st.st_mode & (S_IRWXO | S_IRWXG)) != 0)
{
*err = NCPL_ET_INVALID_MODE;
return NULL;
}
return fopen(path, mode);
}
struct ncp_conn_spec *
ncp_find_conn_spec(const char *server, const char *user, const char *password,
int login_necessary, uid_t uid, long *err)
{
static struct ncp_conn_spec spec;
struct ncp_conn conn;
FILE *nwc;
struct ncp_conn_spec *nwc_ent;
initialize_NCPL_error_table();
*err = 0;
memzero(spec);
spec.uid = getuid();
if (server != NULL)
{
if (strlen(server) >= sizeof(spec.server))
{
*err = NCPL_ET_NAMETOOLONG;
return NULL;
}
strcpy(spec.server, server);
} else
{
if ((nwc = ncp_fopen_nwc(NULL, NULL, err)) == NULL)
{
*err = NCPL_ET_NO_SERVER;
return NULL;
}
nwc_ent = ncp_get_nwc_ent(nwc);
fclose(nwc);
if (nwc_ent == NULL)
{
*err = NCPL_ET_NO_SPEC;
return NULL;
}
strcpy(spec.server, nwc_ent->server);
strcpy(spec.user, nwc_ent->user);
}
str_upper(spec.server);
if (login_necessary == 0)
{
memset(spec.user, 0, sizeof(spec.user));
memset(spec.password, 0, sizeof(spec.password));
return &spec;
}
if (user != NULL)
{
if (strlen(user) >= sizeof(spec.user))
{
*err = NCPL_ET_NAMETOOLONG;
return NULL;
}
strcpy(spec.user, user);
}
str_upper(spec.user);
spec.login_type = NCP_BINDERY_USER;
if (ncp_open_permanent(&conn, &spec) == 0)
{
ncp_do_close(&conn);
return &spec;
}
if (password != NULL)
{
if (strlen(password) >= sizeof(spec.password))
{
*err = NCPL_ET_NAMETOOLONG;
return NULL;
}
strcpy(spec.password, password);
} else
{
if ((nwc = ncp_fopen_nwc(NULL, NULL, err)) != NULL)
{
while ((nwc_ent = ncp_get_nwc_ent(nwc)) != NULL)
{
if ((strcasecmp(spec.server,
nwc_ent->server) != 0)
|| ((*spec.user != '\0')
&& (strcasecmp(spec.user,
nwc_ent->user) != 0)))
{
continue;
}
strcpy(spec.user, nwc_ent->user);
strcpy(spec.password, nwc_ent->password);
break;
}
fclose(nwc);
}
}
if (strlen(spec.user) == 0)
{
*err = NCPL_ET_NO_USER;
return NULL;
}
if ((strlen(spec.password) == 0) && (password == NULL))
{
char *password;
if (!(isatty(0) && isatty(1)))
{
return NULL;
}
printf("Logging into %s as %s\n",
spec.server, spec.user);
password = getpass("Password: ");
if (strlen(password) > sizeof(spec.password))
{
return NULL;
}
strcpy(spec.password, password);
} else
{
if (strcmp(spec.password, NWC_NOPASSWORD) == 0)
{
*spec.password = '\0';
}
}
str_upper(spec.server);
str_upper(spec.user);
str_upper(spec.password);
return &spec;
}
struct ncp_conn *
ncp_initialize_as(int *argc, char **argv,
int login_necessary, int login_type, long *err)
{
char *server = NULL;
char *user = NULL;
char *password = NULL;
struct ncp_conn_spec *spec;
int i = 1;
int get_argument(int arg_no, char **target)
{
int count = 1;
if (target != NULL)
{
if (arg_no + 1 >= *argc)
{
/* No argument to switch */
errno = EINVAL;
return -1;
}
*target = argv[arg_no + 1];
count = 2;
}
/* Delete the consumed switch from the argument list
and decrement the argument count */
while (count + arg_no < *argc)
{
argv[arg_no] = argv[arg_no + count];
arg_no += 1;
}
*argc -= count;
return 0;
}
initialize_NCPL_error_table();
*err = EINVAL;
while (i < *argc)
{
if ((argv[i][0] != '-')
|| (strlen(argv[i]) != 2))
{
i += 1;
continue;
}
switch (argv[i][1])
{
case 'S':
if (get_argument(i, &server) != 0)
{
return NULL;
}
continue;
case 'U':
if (get_argument(i, &user) != 0)
{
return NULL;
}
continue;
case 'P':
if (get_argument(i, &password) != 0)
{
return NULL;
}
continue;
case 'n':
if (get_argument(i, 0) != 0)
{
return NULL;
}
password = NWC_NOPASSWORD;
continue;
}
i += 1;
}
spec = ncp_find_conn_spec(server, user, password, login_necessary,
getuid(), err);
if (spec == NULL)
{
if (login_necessary != 0)
{
return NULL;
} else
{
return ncp_open(NULL, err);
}
}
spec->login_type = login_type;
if (login_necessary == 0)
{
spec->user[0] = '\0';
}
return ncp_open(spec, err);
}
struct ncp_conn *
ncp_initialize(int *argc, char **argv,
int login_necessary, long *err)
{
return ncp_initialize_as(argc, argv, login_necessary,
NCP_BINDERY_USER, err);
}
static long
ncp_request(struct ncp_conn *conn, int function)
{
switch (conn->is_connected)
{
case CONN_PERMANENT:
return ncp_mount_request(conn, function);
case CONN_TEMPORARY:
return ncp_temp_request(conn, function);
default:
}
return ENOTCONN;
}
/****************************************************************************/
/* */
/* Helper functions */
/* */
/****************************************************************************/
static inline int
min(int a, int b)
{
return (a < b) ? a : b;
}
static void
assert_conn_locked(struct ncp_conn *conn)
{
if (conn->lock == 0)
{
ncp_printf("ncpfs: conn not locked!\n");
}
}
static void
ncp_add_byte(struct ncp_conn *conn, byte x)
{
assert_conn_locked(conn);
BSET(conn->packet, conn->current_size, x);
conn->current_size += 1;
return;
}
static void
ncp_add_word_lh(struct ncp_conn *conn, word x)
{
assert_conn_locked(conn);
WSET_LH(conn->packet, conn->current_size, x);
conn->current_size += 2;
return;
}
static void
ncp_add_dword_lh(struct ncp_conn *conn, dword x)
{
assert_conn_locked(conn);
DSET_LH(conn->packet, conn->current_size, x);
conn->current_size += 4;
return;
}
static void
ncp_add_word_hl(struct ncp_conn *conn, word x)
{
assert_conn_locked(conn);
WSET_HL(conn->packet, conn->current_size, x);
conn->current_size += 2;
return;
}
static void
ncp_add_dword_hl(struct ncp_conn *conn, dword x)
{
assert_conn_locked(conn);
DSET_HL(conn->packet, conn->current_size, x);
conn->current_size += 4;
return;
}
static void
ncp_add_mem(struct ncp_conn *conn, const void *source, int size)
{
assert_conn_locked(conn);
memcpy(&(conn->packet[conn->current_size]), source, size);
conn->current_size += size;
return;
}
static void
ncp_add_pstring(struct ncp_conn *conn, const char *s)
{
int len = strlen(s);
assert_conn_locked(conn);
if (len > 255)
{
ncp_printf("ncpfs: string too long: %s\n", s);
len = 255;
}
ncp_add_byte(conn, len);
ncp_add_mem(conn, s, len);
return;
}
static void
ncp_init_request(struct ncp_conn *conn)
{
ncp_lock_conn(conn);
conn->current_size = sizeof(struct ncp_request_header);
conn->has_subfunction = 0;
}
static void
ncp_init_request_s(struct ncp_conn *conn, int subfunction)
{
ncp_init_request(conn);
ncp_add_word_lh(conn, 0); /* preliminary size */
ncp_add_byte(conn, subfunction);
conn->has_subfunction = 1;
}
static char *
ncp_reply_data(struct ncp_conn *conn, int offset)
{
return &(conn->packet[sizeof(struct ncp_reply_header) + offset]);
}
static byte
ncp_reply_byte(struct ncp_conn *conn, int offset)
{
return *(byte *) (ncp_reply_data(conn, offset));
}
static word
ncp_reply_word_hl(struct ncp_conn *conn, int offset)
{
return WVAL_HL(ncp_reply_data(conn, offset), 0);
}
static word
ncp_reply_word_lh(struct ncp_conn *conn, int offset)
{
return WVAL_LH(ncp_reply_data(conn, offset), 0);
}
static dword
ncp_reply_dword_hl(struct ncp_conn *conn, int offset)
{
return DVAL_HL(ncp_reply_data(conn, offset), 0);
}
static dword
ncp_reply_dword_lh(struct ncp_conn *conn, int offset)
{
return DVAL_LH(ncp_reply_data(conn, offset), 0);
}
/* Here the ncp calls begin
*/
static long
ncp_negotiate_buffersize(struct ncp_conn *conn,
int size, int *target)
{
long result;
ncp_init_request(conn);
ncp_add_word_hl(conn, size);
if ((result = ncp_request(conn, 33)) != 0)
{
ncp_unlock_conn(conn);
return result;
}
*target = min(ncp_reply_word_hl(conn, 0), size);
ncp_unlock_conn(conn);
return 0;
}
/*
* target is a 8-byte buffer
*/
long
ncp_get_encryption_key(struct ncp_conn *conn,
char *target)
{
long result;
ncp_init_request_s(conn, 23);
if ((result = ncp_request(conn, 23)) != 0)
{
ncp_unlock_conn(conn);
return result;
}
if (conn->ncp_reply_size < 8)
{
ncp_printf("ncp_reply_size %d < 8\n",
conn->ncp_reply_size);
ncp_unlock_conn(conn);
return result;
}
memcpy(target, ncp_reply_data(conn, 0), 8);
ncp_unlock_conn(conn);
return 0;
}
long
ncp_get_bindery_object_id(struct ncp_conn *conn,
__u16 object_type,
const char *object_name,
struct ncp_bindery_object *target)
{
long result;
ncp_init_request_s(conn, 53);
ncp_add_word_hl(conn, object_type);
ncp_add_pstring(conn, object_name);
if ((result = ncp_request(conn, 23)) != 0)
{
ncp_unlock_conn(conn);
return result;
}
if (conn->ncp_reply_size < 54)
{
ncp_printf("ncp_reply_size %d < 54\n",
conn->ncp_reply_size);
ncp_unlock_conn(conn);
return result;
}
target->object_id = ncp_reply_dword_hl(conn, 0);
target->object_type = ncp_reply_word_hl(conn, 4);
memcpy(target->object_name, ncp_reply_data(conn, 6), 48);
ncp_unlock_conn(conn);
return 0;
}
long
ncp_read_property_value(struct ncp_conn *conn,
int object_type, const char *object_name,
int segment, const char *prop_name,
struct nw_property *target)
{
long result;
ncp_init_request_s(conn, 61);
ncp_add_word_hl(conn, object_type);
ncp_add_pstring(conn, object_name);
ncp_add_byte(conn, segment);
ncp_add_pstring(conn, prop_name);
if ((result = ncp_request(conn, 23)) != 0)
{
ncp_unlock_conn(conn);
return result;
}
memcpy(&(target->value), ncp_reply_data(conn, 0), 128);
target->more_flag = ncp_reply_byte(conn, 128);
target->property_flag = ncp_reply_byte(conn, 129);
ncp_unlock_conn(conn);
return 0;
}
long
ncp_login_encrypted(struct ncp_conn *conn,
const struct ncp_bindery_object *object,
const unsigned char *key,
const unsigned char *passwd)
{
dword tmpID = htonl(object->object_id);
unsigned char buf[128];
unsigned char encrypted[8];
long result;
shuffle((byte *) & tmpID, passwd, strlen(passwd), buf);
nw_encrypt(key, buf, encrypted);
ncp_init_request_s(conn, 24);
ncp_add_mem(conn, encrypted, 8);
ncp_add_word_hl(conn, object->object_type);
ncp_add_pstring(conn, object->object_name);
result = ncp_request(conn, 23);
ncp_unlock_conn(conn);
return result;
}
long
ncp_login_unencrypted(struct ncp_conn *conn,
__u16 object_type, const char *object_name,
const unsigned char *passwd)
{
long result;
ncp_init_request_s(conn, 20);
ncp_add_word_hl(conn, object_type);
ncp_add_pstring(conn, object_name);
ncp_add_pstring(conn, passwd);
result = ncp_request(conn, 23);
ncp_unlock_conn(conn);
return result;
}
long
ncp_login_user(struct ncp_conn *conn,
const unsigned char *username,
const unsigned char *password)
{
return ncp_login_object(conn, username, NCP_BINDERY_USER, password);
}
static long
ncp_login_object(struct ncp_conn *conn,
const unsigned char *username,
int login_type,
const unsigned char *password)
{
long result;
unsigned char ncp_key[8];
struct ncp_bindery_object user;
if ((result = ncp_get_encryption_key(conn, ncp_key)) != 0)
{
return ncp_login_unencrypted(conn, login_type, username,
password);
}
if ((result = ncp_get_bindery_object_id(conn, login_type,
username, &user)) != 0)
{
return result;
}
if ((result = ncp_login_encrypted(conn, &user,
ncp_key, password)) != 0)
{
struct nw_property p;
struct ncp_prop_login_control *l
= (struct ncp_prop_login_control *) &p;
if (conn->completion != NCP_GRACE_PERIOD)
{
return result;
}
fprintf(stderr, "Your password has expired\n");
if ((result = ncp_read_property_value(conn, NCP_BINDERY_USER,
username, 1,
"LOGIN_CONTROL",
&p)) == 0)
{
fprintf(stderr, "You have %d login attempts left\n",
l->GraceLogins);
}
}
return 0;
}