]> granicus.if.org Git - curl/commitdiff
smb: Added initial SMB functionality
authorBill Nagel <wnagel@tycoint.com>
Sun, 30 Nov 2014 16:09:41 +0000 (11:09 -0500)
committerSteve Holme <steve_holme@hotmail.com>
Sun, 30 Nov 2014 18:01:15 +0000 (18:01 +0000)
Initial implementation of the SMB/CIFS protocol.

lib/smb.c
lib/urldata.h

index 3a082ca5e999b355a178087c112aefce70028c1a..ad0172269fb0afceb27832d10bd33fafda2ea8fc 100644 (file)
--- a/lib/smb.c
+++ b/lib/smb.c
 
 #define BUILDING_CURL_SMB_C
 
+#ifdef _WIN32
+#include <process.h>
+#define getpid _getpid
+#endif
+
 #include "smb.h"
 #include "urldata.h"
 #include "sendf.h"
 #include "multiif.h"
+#include "connect.h"
+#include "progress.h"
+#include "transfer.h"
+#include "vtls/vtls.h"
+#include "curl_ntlm_core.h"
+#include "curl_memory.h"
 
 /* The last #include file should be: */
 #include "memdebug.h"
@@ -94,63 +105,752 @@ const struct Curl_handler Curl_handler_smbs = {
 };
 #endif
 
+#define MAX_PAYLOAD_SIZE  0x8000
+#define MAX_MESSAGE_SIZE  (MAX_PAYLOAD_SIZE + 0x1000)
+#define CLIENTNAME        "curl"
+#define SERVICENAME       "?????"
+
+/* Append a string to an SMB message */
+#define MSGCAT(str) \
+  strcpy(p, (str)); \
+  p += strlen(str);
+
+/* Append a null-terminated string to an SMB message */
+#define MSGCATNULL(str) \
+  strcpy(p, (str)); \
+  p += strlen(str) + 1;
+
+/* SMB is mostly little endian */
+#if defined(__BYTE_ORDER__) && __BYTE_ORDER__ == __ORDER_BIG_ENDIAN__
+static unsigned short smb_swap16(unsigned short x)
+{
+  return (x << 8) | ((x >> 8) & 0xff);
+}
+
+static unsigned int smb_swap32(unsigned int x)
+{
+  return (x << 24) | ((x << 8) & 0xff0000) | ((x >> 8) & 0xff00) |
+         ((x >> 24) & 0xff);
+}
+
+#ifdef HAVE_LONGLONG
+static unsigned long long smb_swap64(unsigned long long x)
+{
+  return ((unsigned long long)smb_swap32(x) << 32) | smb_swap32(x >> 32);
+}
+#else
+static unsigned __int64 smb_swap64(unsigned __int64 x)
+{
+  return ((unsigned __int64)smb_swap32(x) << 32) | smb_swap32(x >> 32);
+}
+#endif
+#else
+#  define smb_swap16(x) (x)
+#  define smb_swap32(x) (x)
+#  define smb_swap64(x) (x)
+#endif
+
+/* SMB request state */
+enum smb_req_state {
+  SMB_REQUESTING,
+  SMB_TREE_CONNECT,
+  SMB_OPEN,
+  SMB_DOWNLOAD,
+  SMB_UPLOAD,
+  SMB_CLOSE,
+  SMB_TREE_DISCONNECT,
+  SMB_DONE,
+};
+
+/* SMB request data */
+struct smb_request {
+  enum smb_req_state state;
+  char *share;
+  char *path;
+  unsigned short tid; /* Even if we connect to the same tree as another */
+  unsigned short fid; /* request, the tid will be different */
+  CURLcode result;
+};
+
 static CURLcode smb_setup(struct connectdata *conn)
 {
-  (void) conn;
+  struct smb_request *req;
+  char *slash;
+  char *path;
+
+  /* Initialize the request state */
+  conn->data->req.protop = req = calloc(1, sizeof(struct smb_request));
+  if(!req)
+    return CURLE_OUT_OF_MEMORY;
+
+  req->state = SMB_REQUESTING;
+  req->result = CURLE_OK;
+
+  /* Parse the share and path */
+  path = conn->data->state.path;
+  req->share = strdup((*path == '/' || *path == '\\') ? path + 1 : path);
+  if(!req->share)
+    return CURLE_OUT_OF_MEMORY;
+
+  slash = strchr(req->share, '/');
+  if(!slash)
+    slash = strchr(req->share, '\\');
 
-  return CURLE_NOT_BUILT_IN;
+  if(!slash)
+    return CURLE_URL_MALFORMAT;
+
+  *slash++ = 0;
+  req->path = slash;
+  for(; *slash; slash++) {
+    if(*slash == '/')
+      *slash = '\\';
+  }
+
+  return CURLE_OK;
 }
 
 static CURLcode smb_connect(struct connectdata *conn, bool *done)
 {
-  (void) conn;
-  (void) done;
+  struct smb_conn *smbc = &conn->proto.smbc;
+  char *slash;
+
+  /* Initialize the connection state */
+  memset(smbc, 0, sizeof(*smbc));
+  smbc->state = SMB_CONNECTING;
+  smbc->send_buf = malloc(MAX_MESSAGE_SIZE);
+  smbc->recv_buf = malloc(MAX_MESSAGE_SIZE);
+  if(!smbc->send_buf || !smbc->recv_buf)
+    return CURLE_OUT_OF_MEMORY;
+
+  /* Multiple requests are allowed with this connection */
+  connkeep(conn, "SMB default");
+
+  /* Parse the username, domain, and password */
+  slash = strchr(conn->user, '/');
+  if(!slash)
+    slash = strchr(conn->user, '\\');
+
+  if(slash) {
+    smbc->user = slash + 1;
+    smbc->domain = strdup(conn->user);
+    if(!smbc->domain)
+      return CURLE_OUT_OF_MEMORY;
+    smbc->domain[slash - conn->user] = 0;
+  }
+  else {
+    smbc->user = conn->user;
+    smbc->domain = strdup(conn->host.name);
+    if(!smbc->domain)
+      return CURLE_OUT_OF_MEMORY;
+  }
+
+  return CURLE_OK;
+}
+
+static CURLcode smb_recv_message(struct connectdata *conn, void **msg)
+{
+  struct smb_conn *smbc = &conn->proto.smbc;
+  char *buf = smbc->recv_buf;
+  ssize_t bytes_read;
+  size_t nbt_size;
+  size_t msg_size;
+  size_t len = MAX_MESSAGE_SIZE - smbc->got;
+  CURLcode result;
+
+  result = Curl_read(conn, FIRSTSOCKET, buf + smbc->got, len, &bytes_read);
+  if(result)
+    return result;
+
+  if(!bytes_read)
+    return CURLE_OK;
+
+  smbc->got += bytes_read;
+
+  /* Check for a 32-bit nbt header */
+  if(smbc->got < sizeof(unsigned int))
+    return CURLE_OK;
+
+  nbt_size = ntohs(*(unsigned short*)(buf + sizeof(unsigned short))) +
+                   sizeof(unsigned int);
+  if(smbc->got < nbt_size)
+    return CURLE_OK;
+
+  msg_size = sizeof(struct smb_header);
+  if(nbt_size >= msg_size + 1) {
+    /* Add the word count */
+    msg_size += 1 + buf[msg_size] * sizeof(unsigned short);
+    if(nbt_size >= msg_size + sizeof(unsigned short)) {
+      /* Add the byte count */
+      msg_size += sizeof(unsigned short) + buf[msg_size] +
+                  (buf[msg_size + 1] << 8);
+      if(nbt_size < msg_size)
+        return CURLE_READ_ERROR;
+    }
+  }
+
+  *msg = buf;
+
+  return CURLE_OK;
+}
+
+static void smb_pop_message(struct connectdata *conn)
+{
+  struct smb_conn *smbc = &conn->proto.smbc;
+
+  smbc->got = 0;
+}
+
+static void smb_format_message(struct connectdata *conn, struct smb_header *h,
+                               unsigned char cmd, int len)
+{
+  struct smb_conn *smbc = &conn->proto.smbc;
+  struct smb_request *req = conn->data->req.protop;
+  unsigned int pid;
+
+  memset(h, 0, sizeof(*h));
+  h->nbt_length = htons(sizeof(*h) - sizeof(unsigned int) + len);
+  strncpy((char*)h->magic, "\xffSMB", 4);
+  h->command = cmd;
+  h->flags = SMB_FLAGS_CANONICAL_PATHNAMES | SMB_FLAGS_CASELESS_PATHNAMES;
+  h->flags2 = smb_swap16(SMB_FLAGS2_IS_LONG_NAME | SMB_FLAGS2_KNOWS_LONG_NAME);
+  h->uid = smb_swap16(smbc->uid);
+  h->tid = smb_swap16(req->tid);
+  pid = getpid();
+  h->pid_high = smb_swap16(pid >> 16);
+  h->pid = smb_swap16(pid);
+}
+
+static CURLcode smb_send(struct connectdata *conn, ssize_t len)
+{
+  struct smb_conn *smbc = &conn->proto.smbc;
+  ssize_t bytes_written;
+  CURLcode result;
+
+  result = Curl_write(conn, FIRSTSOCKET, smbc->send_buf, len, &bytes_written);
+  if(result)
+    return result;
+
+  if(bytes_written != len) {
+    smbc->send_size = len;
+    smbc->sent = bytes_written;
+  }
+
+  return CURLE_OK;
+}
+
+static CURLcode smb_flush(struct connectdata *conn)
+{
+  struct smb_conn *smbc = &conn->proto.smbc;
+  ssize_t bytes_written;
+  ssize_t len = smbc->send_size - smbc->sent;
+  CURLcode result;
+
+  if(!smbc->send_size)
+    return CURLE_OK;
+
+  result = Curl_write(conn, FIRSTSOCKET, smbc->send_buf + smbc->sent,
+                      len, &bytes_written);
+  if(result)
+    return result;
+
+  if(bytes_written != len)
+    smbc->sent += bytes_written;
+  else
+    smbc->send_size = 0;
+
+  return CURLE_OK;
+}
+
+static CURLcode smb_send_message(struct connectdata *conn, unsigned char cmd,
+                                 const void *msg, int msg_len)
+{
+  struct smb_conn *smbc = &conn->proto.smbc;
+
+  smb_format_message(conn, (struct smb_header*)smbc->send_buf, cmd, msg_len);
+  memcpy(smbc->send_buf + sizeof(struct smb_header), msg, msg_len);
+
+  return smb_send(conn, sizeof(struct smb_header) + msg_len);
+}
+
+static CURLcode smb_send_negotiate(struct connectdata *conn)
+{
+  const char *msg = "\x00\x0c\x00\x02NT LM 0.12";
+
+  return smb_send_message(conn, SMB_COM_NEGOTIATE, msg, 15);
+};
+
+static CURLcode smb_send_setup(struct connectdata *conn)
+{
+  struct smb_conn *smbc = &conn->proto.smbc;
+  struct smb_setup setup;
+  char *p = setup.bytes;
+  unsigned char lm_hash[21];
+  unsigned char lm[24];
+  unsigned char nt_hash[21];
+  unsigned char nt[24];
+
+  ssize_t byte_count = sizeof(lm) + sizeof(nt);
+  byte_count += strlen(smbc->user) + strlen(smbc->domain);
+  byte_count += strlen(OS) + strlen(CLIENTNAME) + 4; /* 4 null chars */
+  if(byte_count > sizeof(setup.bytes))
+    return CURLE_FILESIZE_EXCEEDED;
+
+  Curl_ntlm_core_mk_lm_hash(conn->data, conn->passwd, lm_hash);
+  Curl_ntlm_core_lm_resp(lm_hash, smbc->challenge, lm);
+#if USE_NTRESPONSES
+  Curl_ntlm_core_mk_nt_hash(conn->data, conn->passwd, nt_hash);
+  Curl_ntlm_core_lm_resp(nt_hash, smbc->challenge, nt);
+#else
+  memset(nt, 0, sizeof(nt));
+#endif
+
+  memset(&setup, 0, sizeof(setup));
+  setup.word_count = SMB_WC_SETUP_ANDX;
+  setup.andx.command = SMB_COM_NO_ANDX_COMMAND;
+  setup.max_buffer_size = smb_swap32(MAX_MESSAGE_SIZE);
+  setup.max_mpx_count = smb_swap16(1);
+  setup.vc_number = smb_swap16(1);
+  setup.session_key = smb_swap32(smbc->session_key);
+  setup.capabilities = smb_swap32(SMB_CAP_LARGE_FILES);
+  setup.lengths[0] = smb_swap16(sizeof(lm));
+  setup.lengths[1] = smb_swap16(sizeof(nt));
+  memcpy(p, lm, sizeof(lm));
+  p += sizeof(lm);
+  memcpy(p, nt, sizeof(nt));
+  p += sizeof(nt);
+  MSGCATNULL(smbc->user);
+  MSGCATNULL(smbc->domain);
+  MSGCATNULL(OS);
+  MSGCATNULL(CLIENTNAME);
+  setup.byte_count = smb_swap16(p - setup.bytes);
 
-  return CURLE_NOT_BUILT_IN;
+  return smb_send_message(conn, SMB_COM_SETUP_ANDX, &setup,
+                          sizeof(setup) - sizeof(setup.bytes) +
+                          setup.byte_count);
+}
+
+static CURLcode smb_send_tree_connect(struct connectdata *conn)
+{
+  struct smb_request *req = conn->data->req.protop;
+  struct smb_tree_connect tree;
+  char *p = tree.bytes;
+
+  ssize_t byte_count = strlen(conn->host.name) + strlen(req->share);
+  byte_count += strlen(SERVICENAME) + 5; /* 2 nulls and 3 backslashes */
+  if(byte_count > sizeof(tree.bytes))
+    return CURLE_FILESIZE_EXCEEDED;
+
+  memset(&tree, 0, sizeof(tree));
+  tree.word_count = SMB_WC_TREE_CONNECT_ANDX;
+  tree.andx.command = SMB_COM_NO_ANDX_COMMAND;
+  tree.pw_len = 0;
+  MSGCAT("\\\\");
+  MSGCAT(conn->host.name);
+  MSGCAT("\\");
+  MSGCATNULL(req->share);
+  MSGCATNULL(SERVICENAME); /* Match any type of service */
+  tree.byte_count = smb_swap16(p - tree.bytes);
+
+  return smb_send_message(conn, SMB_COM_TREE_CONNECT_ANDX, &tree,
+                          sizeof(tree) - sizeof(tree.bytes) + tree.byte_count);
+}
+
+static CURLcode smb_send_open(struct connectdata *conn)
+{
+  struct smb_request *req = conn->data->req.protop;
+  struct smb_nt_create open;
+
+  if((strlen(req->path) + 1) > sizeof(open.bytes))
+    return CURLE_FILESIZE_EXCEEDED;
+
+  memset(&open, 0, sizeof(open));
+  open.word_count = SMB_WC_NT_CREATE_ANDX;
+  open.andx.command = SMB_COM_NO_ANDX_COMMAND;
+  open.name_length = smb_swap16(strlen(req->path));
+  open.share_access = smb_swap32(SMB_FILE_SHARE_ALL);
+  if(conn->data->set.upload) {
+    open.access = smb_swap32(SMB_GENERIC_READ | SMB_GENERIC_WRITE);
+    open.create_disposition = smb_swap32(SMB_FILE_OVERWRITE_IF);
+  }
+  else {
+    open.access = smb_swap32(SMB_GENERIC_READ);
+    open.create_disposition = smb_swap32(SMB_FILE_OPEN);
+  }
+  open.byte_count = smb_swap16(open.name_length + 1);
+  strcpy(open.bytes, req->path);
+
+  return smb_send_message(conn, SMB_COM_NT_CREATE_ANDX, &open,
+                          sizeof(open) - sizeof(open.bytes) + open.byte_count);
+}
+
+static CURLcode smb_send_close(struct connectdata *conn)
+{
+  struct smb_request *req = conn->data->req.protop;
+  struct smb_close close;
+
+  memset(&close, 0, sizeof(close));
+  close.word_count = SMB_WC_CLOSE;
+  close.fid = smb_swap16(req->fid);
+
+  return smb_send_message(conn, SMB_COM_CLOSE, &close, sizeof(close));
+}
+
+static CURLcode smb_send_tree_disconnect(struct connectdata *conn)
+{
+  struct smb_tree_disconnect tree;
+
+  memset(&tree, 0, sizeof(tree));
+
+  return smb_send_message(conn, SMB_COM_TREE_DISCONNECT, &tree, sizeof(tree));
+}
+
+static CURLcode smb_send_read(struct connectdata *conn)
+{
+  struct smb_request *req = conn->data->req.protop;
+  curl_off_t offset = conn->data->req.offset;
+  struct smb_read read;
+
+  memset(&read, 0, sizeof(read));
+  read.word_count = SMB_WC_READ_ANDX;
+  read.andx.command = SMB_COM_NO_ANDX_COMMAND;
+  read.fid = smb_swap16(req->fid);
+  read.offset = smb_swap32(offset);
+  read.offset_high = smb_swap32(offset >> 32);
+  read.min_bytes = smb_swap16(MAX_PAYLOAD_SIZE);
+  read.max_bytes = smb_swap16(MAX_PAYLOAD_SIZE);
+
+  return smb_send_message(conn, SMB_COM_READ_ANDX, &read, sizeof(read));
+}
+
+static CURLcode smb_send_write(struct connectdata *conn)
+{
+  struct smb_conn *smbc = &conn->proto.smbc;
+  struct smb_write *write = (struct smb_write*)smbc->send_buf;
+  struct smb_request *req = conn->data->req.protop;
+  curl_off_t offset = conn->data->req.offset;
+  CURLcode result;
+  int nread;
+
+  conn->data->req.upload_fromhere = smbc->send_buf + sizeof(*write);
+  result = Curl_fillreadbuffer(conn, MAX_PAYLOAD_SIZE, &nread);
+  if(result && result != CURLE_AGAIN)
+    return result;
+  if(!nread)
+    return CURLE_OK;
+
+  memset(write, 0, sizeof(*write));
+  write->word_count = SMB_WC_WRITE_ANDX;
+  write->andx.command = SMB_COM_NO_ANDX_COMMAND;
+  write->fid = smb_swap16(req->fid);
+  write->offset = smb_swap32(offset);
+  write->offset_high = smb_swap32(offset >> 32);
+  write->data_length = smb_swap16(nread);
+  write->data_offset = smb_swap16(sizeof(*write) - sizeof(unsigned int));
+
+  smb_format_message(conn, &write->h, SMB_COM_WRITE_ANDX,
+                     sizeof(*write) - sizeof(write->h) + nread);
+
+  return smb_send(conn, sizeof(*write) + nread);
+}
+
+static CURLcode smb_send_and_recv(struct connectdata *conn, void **msg)
+{
+  struct smb_conn *smbc = &conn->proto.smbc;
+  CURLcode result;
+
+  /* Check if there is still data to send */
+  if(smbc->send_size) {
+    result = smb_flush(conn);
+    if(result)
+      return result;
+  }
+
+  /* Some data was sent, but not all */
+  if(smbc->send_size)
+    return CURLE_AGAIN;
+
+  return smb_recv_message(conn, msg);
 }
 
 static CURLcode smb_connection_state(struct connectdata *conn, bool *done)
 {
-  (void) conn;
-  (void) done;
+  struct smb_conn *smbc = &conn->proto.smbc;
+  struct smb_negotiate_response *nrsp;
+  struct smb_header *h;
+  CURLcode result;
+  void *msg = NULL;
 
-  return CURLE_NOT_BUILT_IN;
+  if(smbc->state == SMB_CONNECTING) {
+#ifdef USE_SSL
+    if((conn->handler->flags & PROTOPT_SSL)) {
+      bool ssl_done;
+      result = Curl_ssl_connect_nonblocking(conn, FIRSTSOCKET, &ssl_done);
+      if(result && result != CURLE_AGAIN)
+        return result;
+      if(!ssl_done)
+        return CURLE_OK;
+    }
+#endif
+
+    result = smb_send_negotiate(conn);
+    if(result) {
+      connclose(conn, "SMB: failed to send negotiate message");
+      return result;
+    }
+
+    smbc->state = SMB_NEGOTIATE;
+  }
+
+  /* Send the previous message and check for a response */
+  result = smb_send_and_recv(conn, &msg);
+  if(result && result != CURLE_AGAIN) {
+    connclose(conn, "SMB: failed to communicate");
+    return result;
+  }
+
+  if(!msg)
+    return CURLE_OK;
+
+  h = msg;
+
+  switch(smbc->state) {
+  case SMB_NEGOTIATE:
+    if(h->status) {
+      connclose(conn, "SMB: negotiation failed");
+      return CURLE_COULDNT_CONNECT;
+    }
+    nrsp = msg;
+    memcpy(smbc->challenge, nrsp->bytes, sizeof(smbc->challenge));
+    smbc->session_key = smb_swap32(nrsp->session_key);
+    result = smb_send_setup(conn);
+    if(result) {
+      connclose(conn, "SMB: failed to send setup message");
+      return result;
+    }
+    smbc->state = SMB_SETUP;
+    break;
+
+  case SMB_SETUP:
+    if(h->status) {
+      connclose(conn, "SMB: authentication failed");
+      return CURLE_LOGIN_DENIED;
+    }
+    smbc->uid = smb_swap16(h->uid);
+    smbc->state = SMB_CONNECTED;
+    *done = true;
+    break;
+
+  default:
+    smb_pop_message(conn);
+    return CURLE_OK; /* ignore */
+  }
+
+  smb_pop_message(conn);
+
+  return CURLE_OK;
 }
 
 static CURLcode smb_request_state(struct connectdata *conn, bool *done)
 {
-  (void) conn;
-  (void) done;
+  struct smb_request *req = conn->data->req.protop;
+  struct smb_header *h;
+  enum smb_req_state next_state = SMB_DONE;
+  unsigned short len;
+  unsigned short off;
+  CURLcode result;
+  void *msg = NULL;
+
+  /* Start the request */
+  if(req->state == SMB_REQUESTING) {
+    result = smb_send_tree_connect(conn);
+    if(result) {
+      connclose(conn, "SMB: failed to send tree connect message");
+      return result;
+    }
+
+    req->state = SMB_TREE_CONNECT;
+  }
+
+  /* Send the previous message and check for a response */
+  result = smb_send_and_recv(conn, &msg);
+  if(result && result != CURLE_AGAIN) {
+    connclose(conn, "SMB: failed to communicate");
+    return result;
+  }
+
+  if(!msg)
+    return CURLE_OK;
+
+  h = msg;
+
+  switch(req->state) {
+  case SMB_TREE_CONNECT:
+    if(h->status) {
+      req->result = CURLE_REMOTE_FILE_NOT_FOUND;
+      if(h->status == smb_swap32(SMB_ERR_NOACCESS))
+        req->result = CURLE_REMOTE_ACCESS_DENIED;
+      break;
+    }
+    req->tid = smb_swap16(h->tid);
+    next_state = SMB_OPEN;
+    break;
+
+  case SMB_OPEN:
+    if(h->status) {
+      req->result = CURLE_REMOTE_FILE_NOT_FOUND;
+      next_state = SMB_TREE_DISCONNECT;
+      break;
+    }
+    req->fid = smb_swap16(((struct smb_nt_create_response*)msg)->fid);
+    conn->data->req.offset = 0;
+    if(conn->data->set.upload) {
+      conn->data->req.size = conn->data->state.infilesize;
+      Curl_pgrsSetUploadSize(conn->data, conn->data->req.size);
+      next_state = SMB_UPLOAD;
+    }
+    else {
+      conn->data->req.size =
+        smb_swap64(((struct smb_nt_create_response*)msg)->end_of_file);
+      Curl_pgrsSetDownloadSize(conn->data, conn->data->req.size);
+      next_state = SMB_DOWNLOAD;
+    }
+    break;
+
+  case SMB_DOWNLOAD:
+    if(h->status) {
+      req->result = CURLE_RECV_ERROR;
+      next_state = SMB_CLOSE;
+      break;
+    }
+    len = smb_swap16(*(unsigned short*)((char*)msg +
+                     sizeof(struct smb_header) + 11));
+    off = smb_swap16(*(unsigned short*)((char*)msg +
+                     sizeof(struct smb_header) + 13));
+    if(len > 0)
+      Curl_client_write(conn, CLIENTWRITE_BODY,
+                        (char*)msg + off + sizeof(unsigned int), len);
+    conn->data->req.bytecount += len;
+    conn->data->req.offset += len;
+    Curl_pgrsSetDownloadCounter(conn->data, conn->data->req.bytecount);
+    next_state = (len < MAX_PAYLOAD_SIZE) ? SMB_CLOSE : SMB_DOWNLOAD;
+    break;
 
-  return CURLE_NOT_BUILT_IN;
+  case SMB_UPLOAD:
+    if(h->status) {
+      req->result = CURLE_UPLOAD_FAILED;
+      next_state = SMB_CLOSE;
+      break;
+    }
+    len = smb_swap16(*(unsigned short*)((char*)msg +
+                     sizeof(struct smb_header) + 5));
+    conn->data->req.bytecount += len;
+    conn->data->req.offset += len;
+    Curl_pgrsSetUploadCounter(conn->data, conn->data->req.bytecount);
+    if(conn->data->req.bytecount >= conn->data->req.size)
+      next_state = SMB_CLOSE;
+    else
+      next_state = SMB_UPLOAD;
+    break;
+
+  case SMB_CLOSE:
+    /* We don't care if the close failed, proceed to tree disconnect anyway */
+    next_state = SMB_TREE_DISCONNECT;
+    break;
+
+  case SMB_TREE_DISCONNECT:
+    next_state = SMB_DONE;
+    break;
+
+  default:
+    smb_pop_message(conn);
+    return CURLE_OK; /* ignore */
+  }
+
+  smb_pop_message(conn);
+
+  switch(next_state) {
+  case SMB_OPEN:
+    result = smb_send_open(conn);
+    break;
+
+  case SMB_DOWNLOAD:
+    result = smb_send_read(conn);
+    break;
+
+  case SMB_UPLOAD:
+    result = smb_send_write(conn);
+    break;
+
+  case SMB_CLOSE:
+    result = smb_send_close(conn);
+    break;
+
+  case SMB_TREE_DISCONNECT:
+    result = smb_send_tree_disconnect(conn);
+    break;
+
+  case SMB_DONE:
+    result = req->result;
+    *done = true;
+    break;
+
+  default:
+    break;
+  }
+
+  if(result) {
+    connclose(conn, "SMB: failed to send message");
+    return result;
+  }
+
+  req->state = next_state;
+
+  return CURLE_OK;
 }
 
 static CURLcode smb_done(struct connectdata *conn, CURLcode status,
                          bool premature)
 {
-  (void) conn;
-  (void) status;
-  (void) premature;
+  struct smb_request *req = conn->data->req.protop;
+
+  Curl_safefree(req->share);
+  Curl_safefree(conn->data->req.protop);
 
-  return CURLE_NOT_BUILT_IN;
+  return status;
 }
 
 static CURLcode smb_disconnect(struct connectdata *conn, bool dead)
 {
-  (void) conn;
-  (void) dead;
+  struct smb_conn *smbc = &conn->proto.smbc;
+  struct smb_request *req = conn->data->req.protop;
 
-  return CURLE_NOT_BUILT_IN;
+  Curl_safefree(smbc->domain);
+  Curl_safefree(smbc->send_buf);
+  Curl_safefree(smbc->recv_buf);
+
+  /* smb_done is not always called, so cleanup the request */
+  if(req) {
+    Curl_safefree(req->share);
+    Curl_safefree(conn->data->req.protop);
+  }
+
+  return CURLE_OK;
 }
 
 static int smb_getsock(struct connectdata *conn, curl_socket_t *socks,
                        int numsocks)
 {
-  (void) conn;
-  (void) socks;
-  (void) numsocks;
+  struct smb_conn *smbc = &conn->proto.smbc;
+
+  if(!numsocks)
+    return GETSOCK_BLANK;
+
+  socks[0] = conn->sock[FIRSTSOCKET];
+
+  if(smbc->send_size)
+    return GETSOCK_WRITESOCK(0);
 
-  return GETSOCK_BLANK;
+  return GETSOCK_READSOCK(0);
 }
 
 #endif /* CURL_DISABLE_SMB && USE_NTLM && USE_WINDOWS_SSPI */
index 97796b75ca8191c956a41a8677cf356235a11e30..e433edd4c52d01cc045548d40c863270865c1789 100644 (file)
 #include "ssh.h"
 #include "http.h"
 #include "rtsp.h"
+#include "smb.h"
 #include "wildcard.h"
 #include "multihandle.h"
 
@@ -1055,6 +1056,7 @@ struct connectdata {
     struct pop3_conn pop3c;
     struct smtp_conn smtpc;
     struct rtsp_conn rtspc;
+    struct smb_conn smbc;
     void *generic; /* RTMP and LDAP use this */
   } proto;