This is sock.c in view mode; [Download] [Up]
/* * sock.c * * Copyright (C) 1995 by Paal-Kr. Engstad and Volker Lendecke * Modified by Christian Starkjohann <cs@hal.kph.tuwien.ac.at> * */ #include "syshdr.h" #include <linux/smb_fs.h> #include <linux/smb.h> #include <linux/smbno.h> extern int errno; int close_fp(struct file *filp) { return close((int)filp); } static int _recvfrom(int sock_fd, unsigned char *ubuf, int size, int noblock, unsigned flags, struct sockaddr_in *sa, int *addr_len) { int sflags, rval; if((sflags = fcntl(sock_fd, F_GETFL, 0)) != -1){ if(noblock) sflags |= O_NDELAY; else sflags &= ~O_NDELAY; fcntl(sock_fd, F_SETFL, sflags); rval = recvfrom(sock_fd, ubuf, size, flags, (struct sockaddr *)sa, addr_len); if(rval < 0){ return -errno; } return rval; }else{ return -errno; } } static int _send(int sock_fd, const void *buff, int len, int noblock, unsigned flags) { int sflags, rval; if((sflags = fcntl(sock_fd, F_GETFL, 0)) != -1){ if(noblock) sflags |= O_NDELAY; else sflags &= ~O_NDELAY; fcntl(sock_fd, F_SETFL, sflags); rval = send(sock_fd, (void *)buff, len, flags); if(rval < 0){ return -errno; } return rval; }else{ return -errno; } } int smb_catch_keepalive(struct smb_server *server) { return 0; } int smb_dont_catch_keepalive(struct smb_server *server) { return 0; } /* * smb_receive_raw * fs points to the correct segment, sock != NULL, target != NULL * The smb header is only stored if want_header != 0. */ static int smb_receive_raw(int sock_fd, unsigned char *target, int max_raw_length, int want_header) { int len, result; int already_read; unsigned char peek_buf[4]; re_recv: result = _recvfrom(sock_fd, (void *)peek_buf, 4, 0, 0, NULL, NULL); if (result < 0) { DPRINTK("smb_receive_raw: recv error = %d\n", -result); return result; } if (result < 4) { DPRINTK("smb_receive_raw: got less than 4 bytes\n"); return -EIO; } switch (peek_buf[0]) { case 0x00: case 0x82: break; case 0x85: DPRINTK("smb_receive_raw: Got SESSION KEEP ALIVE\n"); goto re_recv; default: printk("smb_receive_raw: Invalid packet 0x%02x\n", peek_buf[0]); return -EIO; } /* The length in the RFC NB header is the raw data length */ len = smb_len(peek_buf); if (len > max_raw_length) { printk("smb_receive_raw: Received length (%d) > max_xmit (%d)!\n", len, max_raw_length); return -EIO; } if (want_header != 0) { memcpy(target, peek_buf, 4); target += 4; } already_read = 0; while (already_read < len) { result = _recvfrom(sock_fd, (void *)(target + already_read), len - already_read, 0, 0, NULL, NULL); if (result < 0) { printk("smb_receive_raw: recvfrom error = %d\n", -result); return result; } already_read += result; } return already_read; } /* * smb_receive * fs points to the correct segment, server != NULL, sock!=NULL */ static int smb_receive(struct smb_server *server, int sock_fd) { int result; result = smb_receive_raw(sock_fd, server->packet, server->max_recv - 4, /* max_xmit in server includes NB header */ 1); /* We want the header */ if (result < 0) { printk("smb_receive: receive error: %d\n", result); return result; } server->rcls = *((unsigned char *)(server->packet+9)); server->err = WVAL(server->packet, 11); if (server->rcls != 0) { DPRINTK("smb_receive: rcls=%d, err=%d\n", server->rcls, server->err); } return result; } /* * smb_receive's preconditions also apply here. */ static int smb_receive_trans2(struct smb_server *server, int sock_fd, int *data_len, int *param_len, char **data, char **param) { int total_data = 0; int total_param = 0; int result; unsigned char *inbuf = server->packet; DDPRINTK("smb_receive_trans2: enter\n"); *data_len = *param_len = 0; if ((result = smb_receive(server, sock_fd)) < 0) { return result; } if (server->rcls != 0) { return result; } /* parse out the lengths */ total_data = WVAL(inbuf, smb_tdrcnt); total_param = WVAL(inbuf, smb_tprcnt); if ((total_data > TRANS2_MAX_TRANSFER) || (total_param > TRANS2_MAX_TRANSFER)) { printk("smb_receive_trans2: data/param too long\n"); return -EIO; } /* allocate it */ if ((*data = malloc(total_data)) == NULL) { printk("smb_receive_trans2: could not alloc data area\n"); return -ENOMEM; } if ((*param = malloc(total_param)) == NULL) { printk("smb_receive_trans2: could not alloc param area\n"); free(*data); return -ENOMEM; } DDPRINTK("smb_rec_trans2: total_data/param: %d/%d\n", total_data, total_param); while (1) { if (WVAL(inbuf,smb_prdisp)+WVAL(inbuf, smb_prcnt) > total_param) { printk("smb_receive_trans2: invalid parameters\n"); result = -EIO; goto fail; } memcpy(*param + WVAL(inbuf,smb_prdisp), smb_base(inbuf) + WVAL(inbuf,smb_proff),WVAL(inbuf,smb_prcnt)); *param_len += WVAL(inbuf,smb_prcnt); if (WVAL(inbuf,smb_drdisp)+WVAL(inbuf, smb_drcnt)>total_data) { printk("smb_receive_trans2: invalid data block\n"); result = -EIO; goto fail; } memcpy(*data + WVAL(inbuf,smb_drdisp), smb_base(inbuf) + WVAL(inbuf,smb_droff),WVAL(inbuf,smb_drcnt)); *data_len += WVAL(inbuf,smb_drcnt); DDPRINTK("smb_rec_trans2: drcnt/prcnt: %d/%d\n", WVAL(inbuf, smb_drcnt), WVAL(inbuf, smb_prcnt)); /* parse out the total lengths again - they can shrink! */ if ((WVAL(inbuf,smb_tdrcnt) > total_data) || (WVAL(inbuf,smb_tprcnt) > total_param)) { printk("smb_receive_trans2: data/params grew!\n"); result = -EIO; goto fail; } total_data = WVAL(inbuf,smb_tdrcnt); total_param = WVAL(inbuf,smb_tprcnt); if (total_data <= *data_len && total_param <= *param_len) break; if ((result = smb_receive(server, sock_fd)) < 0) { goto fail; } if (server->rcls != 0) { result = -EIO; goto fail; } } DDPRINTK("smb_receive_trans2: normal exit\n"); return 0; fail: DPRINTK("smb_receive_trans2: failed exit\n"); free(*param); *param = NULL; free(*data); *data = NULL; return result; } static inline int server_sock(struct smb_server *server) { int sock_fd = server->m.fd; server->sock_file = (struct file *)sock_fd; return sock_fd; } int smb_release(struct smb_server *server) { int sock_fd = server_sock(server); if (sock_fd >= 0) close(sock_fd); sock_fd = socket(AF_INET, SOCK_STREAM, 0); server->m.fd = sock_fd; if(sock_fd < 0) return -errno; return 0; } int smb_connect(struct smb_server *server) { int sock_fd = server_sock(server); if (sock_fd < 0) return -EINVAL; return connect(sock_fd, (struct sockaddr *)&(server->m.addr), sizeof(struct sockaddr_in)); } /*****************************************************************************/ /* */ /* This routine was once taken from nfs, which is for udp. Here TCP does */ /* most of the ugly stuff for us (thanks, Alan!) */ /* */ /*****************************************************************************/ int smb_request(struct smb_server *server) { int len, result, result2; int sock_fd = server_sock(server); unsigned char *buffer = (server == NULL) ? NULL : server->packet; if ((sock_fd < 0) || (buffer == NULL)) { printk("smb_request: Bad server!\n"); return -EBADF; } if (server->state != CONN_VALID) return -EIO; if ((result = smb_dont_catch_keepalive(server)) != 0) { server->state = CONN_INVALID; smb_invalidate_all_inodes(server); return result; } len = smb_len(buffer) + 4; DDPRINTK("smb_request: len = %d cmd = 0x%X\n", len, buffer[8]); result = _send(sock_fd, (void *)buffer, len, 0, 0); if (result < 0) { printk("smb_request: send error = %d\n", result); } else { result = smb_receive(server, sock_fd); } if ((result2 = smb_catch_keepalive(server)) < 0) { result = result2; } if (result < 0) { server->state = CONN_INVALID; smb_invalidate_all_inodes(server); } DDPRINTK("smb_request: result = %d\n", result); return result; } /* * This is not really a trans2 request, we assume that you only have * one packet to send. */ int smb_trans2_request(struct smb_server *server, int *data_len, int *param_len, char **data, char **param) { int len, result, result2; int sock_fd = server_sock(server); unsigned char *buffer = (server == NULL) ? NULL : server->packet; if ((sock_fd < 0) || (buffer == NULL)) { printk("smb_trans2_request: Bad server!\n"); return -EBADF; } if (server->state != CONN_VALID) return -EIO; if ((result = smb_dont_catch_keepalive(server)) != 0) { server->state = CONN_INVALID; smb_invalidate_all_inodes(server); return result; } len = smb_len(buffer) + 4; DDPRINTK("smb_request: len = %d cmd = 0x%X\n", len, buffer[8]); result = _send(sock_fd, (void *)buffer, len, 0, 0); if (result < 0) { printk("smb_trans2_request: send error = %d\n", result); } else { result = smb_receive_trans2(server, sock_fd, data_len, param_len, data, param); } if ((result2 = smb_catch_keepalive(server)) < 0) { result = result2; } if (result < 0) { server->state = CONN_INVALID; smb_invalidate_all_inodes(server); } DDPRINTK("smb_trans2_request: result = %d\n", result); return result; } /* target must be in user space */ int smb_request_read_raw(struct smb_server *server, unsigned char *target, int max_len) { int len, result, result2; int sock_fd = server_sock(server); unsigned char *buffer = (server == NULL) ? NULL : server->packet; if ((sock_fd < 0) || (buffer == NULL)) { printk("smb_request_read_raw: Bad server!\n"); return -EBADF; } if (server->state != CONN_VALID) return -EIO; if ((result = smb_dont_catch_keepalive(server)) != 0) { server->state = CONN_INVALID; smb_invalidate_all_inodes(server); return result; } len = smb_len(buffer) + 4; DPRINTK("smb_request_read_raw: len = %d cmd = 0x%X\n", len, buffer[8]); DPRINTK("smb_request_read_raw: target=%X, max_len=%d\n", (unsigned int)target, max_len); DPRINTK("smb_request_read_raw: buffer=%X, sock=%X\n", (unsigned int)buffer, (unsigned int)sock_fd); result = _send(sock_fd, (void *)buffer, len, 0, 0); DPRINTK("smb_request_read_raw: send returned %d\n", result); if (result < 0) { printk("smb_request_read_raw: send error = %d\n", result); } else { result = smb_receive_raw(sock_fd, target, max_len, 0); } if ((result2 = smb_catch_keepalive(server)) < 0) { result = result2; } if (result < 0) { server->state = CONN_INVALID; smb_invalidate_all_inodes(server); } DPRINTK("smb_request_read_raw: result = %d\n", result); return result; } /* Source must be in user space. smb_request_write_raw assumes that * the request SMBwriteBraw has been completed successfully, so that * we can send the raw data now. */ int smb_request_write_raw(struct smb_server *server, unsigned const char *source, int length) { int result, result2; byte nb_header[4]; int sock_fd = server_sock(server); unsigned char *buffer = (server == NULL) ? NULL : server->packet; if ((sock_fd < 0) || (buffer == NULL)) { printk("smb_request_write_raw: Bad server!\n"); return -EBADF; } if (server->state != CONN_VALID) return -EIO; if ((result = smb_dont_catch_keepalive(server)) != 0) { server->state = CONN_INVALID; smb_invalidate_all_inodes(server); return result; } smb_encode_smb_length(nb_header, length); result = _send(sock_fd, (void *)nb_header, 4, 0, 0); if (result == 4) { result = _send(sock_fd, (void *)source, length, 0, 0); } else { result = -EIO; } DPRINTK("smb_request_write_raw: send returned %d\n", result); if (result == length) { result = smb_receive(server, sock_fd); } else { result = -EIO; } if ((result2 = smb_catch_keepalive(server)) < 0) { result = result2; } if (result < 0) { server->state = CONN_INVALID; smb_invalidate_all_inodes(server); } if (result > 0) { result = length; } DPRINTK("smb_request_write_raw: result = %d\n", result); return result; }
These are the contents of the former NiCE NeXT User Group NeXTSTEP/OpenStep software archive, currently hosted by Netfuture.ch.