root/sys/netsmb/smb_smb.c
/*-
 * SPDX-License-Identifier: BSD-2-Clause
 *
 * Copyright (c) 2000-2001 Boris Popov
 * All rights reserved.
 *
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions
 * are met:
 * 1. Redistributions of source code must retain the above copyright
 *    notice, this list of conditions and the following disclaimer.
 * 2. Redistributions in binary form must reproduce the above copyright
 *    notice, this list of conditions and the following disclaimer in the
 *    documentation and/or other materials provided with the distribution.
 *
 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
 * SUCH DAMAGE.
 */

/*
 * various SMB requests. Most of the routines merely packs data into mbufs.
 */

#include <sys/param.h>
#include <sys/systm.h>
#include <sys/kernel.h>
#include <sys/malloc.h>
#include <sys/proc.h>
#include <sys/lock.h>
#include <sys/sysctl.h>
#include <sys/socket.h>
#include <sys/uio.h>

#include <sys/iconv.h>

#include <netsmb/smb.h>
#include <netsmb/smb_subr.h>
#include <netsmb/smb_rq.h>
#include <netsmb/smb_conn.h>
#include <netsmb/smb_tran.h>

#include "opt_netsmb.h"

struct smb_dialect {
        int             d_id;
        const char *    d_name;
};

static struct smb_dialect smb_dialects[] = {
        {SMB_DIALECT_CORE,      "PC NETWORK PROGRAM 1.0"},
        {SMB_DIALECT_COREPLUS,  "MICROSOFT NETWORKS 1.03"},
        {SMB_DIALECT_LANMAN1_0, "MICROSOFT NETWORKS 3.0"},
        {SMB_DIALECT_LANMAN1_0, "LANMAN1.0"},
        {SMB_DIALECT_LANMAN2_0, "LM1.2X002"},
        {SMB_DIALECT_LANMAN2_0, "Samba"},
        {SMB_DIALECT_NTLM0_12,  "NT LANMAN 1.0"},
        {SMB_DIALECT_NTLM0_12,  "NT LM 0.12"},
        {-1,                    NULL}
};

static u_int32_t
smb_vc_maxread(struct smb_vc *vcp)
{
        /*
         * Specs say up to 64k data bytes, but Windows traffic
         * uses 60k... no doubt for some good reason.
         *
         * Don't exceed the server's buffer size if signatures
         * are enabled otherwise Windows 2003 chokes. Allow space
         * for the SMB header & a little bit extra.
         */
        if ((vcp->vc_sopt.sv_caps & SMB_CAP_LARGE_READX) &&
            (vcp->vc_hflags2 & SMB_FLAGS2_SECURITY_SIGNATURE) == 0)
                return (60*1024);
        else
                return (vcp->vc_sopt.sv_maxtx - SMB_HDRLEN - 64);
}

static u_int32_t
smb_vc_maxwrite(struct smb_vc *vcp)
{
        /*
         * See comment above.
         */
        if ((vcp->vc_sopt.sv_caps & SMB_CAP_LARGE_WRITEX) &&
            (vcp->vc_hflags2 & SMB_FLAGS2_SECURITY_SIGNATURE) == 0)
                return (60*1024);
        else
                return (vcp->vc_sopt.sv_maxtx - SMB_HDRLEN - 64);
}

static int
smb_smb_nomux(struct smb_vc *vcp, struct smb_cred *scred, const char *name)
{
        if (scred->scr_td->td_proc == vcp->vc_iod->iod_p)
                return 0;
        SMBERROR("wrong function called(%s)\n", name);
        return EINVAL;
}

int
smb_smb_negotiate(struct smb_vc *vcp, struct smb_cred *scred)
{
        struct smb_dialect *dp;
        struct smb_sopt *sp = NULL;
        struct smb_rq *rqp;
        struct mbchain *mbp;
        struct mdchain *mdp;
        u_int8_t wc, stime[8], sblen;
        u_int16_t dindex, tw, tw1, swlen, bc;
        int error, maxqsz;
        int unicode = SMB_UNICODE_STRINGS(vcp);
        void * servercharset = vcp->vc_toserver;
        void * localcharset = vcp->vc_tolocal;

        if (smb_smb_nomux(vcp, scred, __func__) != 0)
                return EINVAL;
        /* Disable Unicode for SMB_COM_NEGOTIATE requests */ 
        if (unicode) {
                vcp->vc_toserver = vcp->vc_cp_toserver;
                vcp->vc_tolocal  = vcp->vc_cp_tolocal;
        }
        vcp->vc_hflags = 0;
        vcp->vc_hflags2 = 0;
        vcp->obj.co_flags &= ~(SMBV_ENCRYPT);
        sp = &vcp->vc_sopt;
        bzero(sp, sizeof(struct smb_sopt));
        error = smb_rq_alloc(VCTOCP(vcp), SMB_COM_NEGOTIATE, scred, &rqp);
        if (error)
                return error;
        smb_rq_getrequest(rqp, &mbp);
        smb_rq_wstart(rqp);
        smb_rq_wend(rqp);
        smb_rq_bstart(rqp);
        for(dp = smb_dialects; dp->d_id != -1; dp++) {
                mb_put_uint8(mbp, SMB_DT_DIALECT);
                smb_put_dstring(mbp, vcp, dp->d_name, SMB_CS_NONE);
        }
        smb_rq_bend(rqp);
        error = smb_rq_simple(rqp);
        SMBSDEBUG("%d\n", error);
        if (error)
                goto bad;
        smb_rq_getreply(rqp, &mdp);
        do {
                error = md_get_uint8(mdp, &wc);
                if (error)
                        break;
                error = md_get_uint16le(mdp, &dindex);
                if (error)
                        break;
                if (dindex > 7) {
                        SMBERROR("Don't know how to talk with server %s (%d)\n", "xxx", dindex);
                        error = EBADRPC;
                        break;
                }
                dp = smb_dialects + dindex;
                sp->sv_proto = dp->d_id;
                SMBSDEBUG("Dialect %s (%d, %d)\n", dp->d_name, dindex, wc);
                error = EBADRPC;
                if (dp->d_id >= SMB_DIALECT_NTLM0_12) {
                        if (wc != 17)
                                break;
                        md_get_uint8(mdp, &sp->sv_sm);
                        md_get_uint16le(mdp, &sp->sv_maxmux);
                        md_get_uint16le(mdp, &sp->sv_maxvcs);
                        md_get_uint32le(mdp, &sp->sv_maxtx);
                        md_get_uint32le(mdp, &sp->sv_maxraw);
                        md_get_uint32le(mdp, &sp->sv_skey);
                        md_get_uint32le(mdp, &sp->sv_caps);
                        md_get_mem(mdp, stime, 8, MB_MSYSTEM);
                        md_get_uint16le(mdp, (u_int16_t*)&sp->sv_tz);
                        md_get_uint8(mdp, &sblen);
                        if (sblen && (sp->sv_sm & SMB_SM_ENCRYPT)) {
                                if (sblen != SMB_MAXCHALLENGELEN) {
                                        SMBERROR("Unexpected length of security blob (%d)\n", sblen);
                                        break;
                                }
                                error = md_get_uint16le(mdp, &bc);
                                if (error)
                                        break;
                                if (sp->sv_caps & SMB_CAP_EXT_SECURITY)
                                        md_get_mem(mdp, NULL, 16, MB_MSYSTEM);
                                error = md_get_mem(mdp, vcp->vc_ch, sblen, MB_MSYSTEM);
                                if (error)
                                        break;
                                vcp->vc_chlen = sblen;
                                vcp->obj.co_flags |= SMBV_ENCRYPT;
                        }
                        if (sp->sv_sm & SMB_SM_SIGS_REQUIRE)
                                vcp->vc_hflags2 |= SMB_FLAGS2_SECURITY_SIGNATURE;
                        if (vcp->vc_ucs_toserver &&
                                sp->sv_caps & SMB_CAP_UNICODE) {
                                /*
                                * They do Unicode.
                                */
                                vcp->obj.co_flags |= SMBV_UNICODE;
                        }
                        vcp->vc_hflags2 |= SMB_FLAGS2_KNOWS_LONG_NAMES;
                        if (dp->d_id == SMB_DIALECT_NTLM0_12 &&
                            sp->sv_maxtx < 4096 &&
                            (sp->sv_caps & SMB_CAP_NT_SMBS) == 0) {
                                vcp->obj.co_flags |= SMBV_WIN95;
                                SMBSDEBUG("Win95 detected\n");
                        }
                        error = 0;
                        break;
                }
                vcp->vc_hflags2 &= ~(SMB_FLAGS2_EXT_SEC|SMB_FLAGS2_DFS|
                                     SMB_FLAGS2_ERR_STATUS|SMB_FLAGS2_UNICODE);
                unicode = 0;
                if (dp->d_id > SMB_DIALECT_CORE) {
                        md_get_uint16le(mdp, &tw);
                        sp->sv_sm = tw;
                        md_get_uint16le(mdp, &tw);
                        sp->sv_maxtx = tw;
                        md_get_uint16le(mdp, &sp->sv_maxmux);
                        md_get_uint16le(mdp, &sp->sv_maxvcs);
                        md_get_uint16le(mdp, &tw);      /* rawmode */
                        md_get_uint32le(mdp, &sp->sv_skey);
                        if (wc == 13) {         /* >= LANMAN1 */
                                md_get_uint16(mdp, &tw);                /* time */
                                md_get_uint16(mdp, &tw1);               /* date */
                                md_get_uint16le(mdp, (u_int16_t*)&sp->sv_tz);
                                md_get_uint16le(mdp, &swlen);
                                if (swlen > SMB_MAXCHALLENGELEN)
                                        break;
                                md_get_uint16(mdp, NULL);       /* mbz */
                                if (md_get_uint16le(mdp, &bc) != 0)
                                        break;
                                if (bc < swlen)
                                        break;
                                if (swlen && (sp->sv_sm & SMB_SM_ENCRYPT)) {
                                        error = md_get_mem(mdp, vcp->vc_ch, swlen, MB_MSYSTEM);
                                        if (error)
                                                break;
                                        vcp->vc_chlen = swlen;
                                        vcp->obj.co_flags |= SMBV_ENCRYPT;
                                }
                        }
                        vcp->vc_hflags2 |= SMB_FLAGS2_KNOWS_LONG_NAMES;
                } else {        /* an old CORE protocol */
                        sp->sv_maxmux = 1;
                }
                error = 0;
        } while (0);
        if (error == 0) {
                vcp->vc_maxvcs = sp->sv_maxvcs;
                if (vcp->vc_maxvcs <= 1) {
                        if (vcp->vc_maxvcs == 0)
                                vcp->vc_maxvcs = 1;
                }
                if (sp->sv_maxtx <= 0 || sp->sv_maxtx > 0xffff)
                        sp->sv_maxtx = 1024;
                else
                        sp->sv_maxtx = min(sp->sv_maxtx,
                                           63*1024 + SMB_HDRLEN + 16);
                SMB_TRAN_GETPARAM(vcp, SMBTP_RCVSZ, &maxqsz);
                vcp->vc_rxmax = min(smb_vc_maxread(vcp), maxqsz - 1024);
                SMB_TRAN_GETPARAM(vcp, SMBTP_SNDSZ, &maxqsz);
                vcp->vc_wxmax = min(smb_vc_maxwrite(vcp), maxqsz - 1024);
                vcp->vc_txmax = min(sp->sv_maxtx, maxqsz);
                SMBSDEBUG("TZ = %d\n", sp->sv_tz);
                SMBSDEBUG("CAPS = %x\n", sp->sv_caps);
                SMBSDEBUG("MAXMUX = %d\n", sp->sv_maxmux);
                SMBSDEBUG("MAXVCS = %d\n", sp->sv_maxvcs);
                SMBSDEBUG("MAXRAW = %d\n", sp->sv_maxraw);
                SMBSDEBUG("MAXTX = %d\n", sp->sv_maxtx);
        }
bad:
        /* Restore Unicode conversion state */
        if (unicode) {
                vcp->vc_toserver = servercharset;
                vcp->vc_tolocal  = localcharset;
                vcp->vc_hflags2 |= SMB_FLAGS2_UNICODE;
        }
        smb_rq_done(rqp);
        return error;
}

int
smb_smb_ssnsetup(struct smb_vc *vcp, struct smb_cred *scred)
{
        struct smb_rq *rqp;
        struct mbchain *mbp;
/*      u_int8_t wc;
        u_int16_t tw, tw1;*/
        smb_uniptr unipp, ntencpass = NULL;
        char *pp, *up, *pbuf, *encpass;
        int error, plen, uniplen, ulen, upper;
        u_int32_t caps = 0;

        upper = 0;

        if (vcp->obj.co_flags & SMBV_UNICODE)
                caps |= SMB_CAP_UNICODE;

again:

        vcp->vc_smbuid = SMB_UID_UNKNOWN;

        if (smb_smb_nomux(vcp, scred, __func__) != 0)
                return EINVAL;

        error = smb_rq_alloc(VCTOCP(vcp), SMB_COM_SESSION_SETUP_ANDX, scred, &rqp);
        if (error)
                return error;
        pbuf = malloc(SMB_MAXPASSWORDLEN + 1, M_SMBTEMP, M_WAITOK);
        encpass = malloc(24, M_SMBTEMP, M_WAITOK);
        if (vcp->vc_sopt.sv_sm & SMB_SM_USER) {
                /*
                 * We try w/o uppercasing first so Samba mixed case
                 * passwords work.  If that fails we come back and try
                 * uppercasing to satisfy OS/2 and Windows for Workgroups.
                 */
                if (upper++) {
                        iconv_convstr(vcp->vc_toupper, pbuf,
                                      smb_vc_getpass(vcp)/*, SMB_MAXPASSWORDLEN*/);
                } else {
                        strncpy(pbuf, smb_vc_getpass(vcp), SMB_MAXPASSWORDLEN);
                        pbuf[SMB_MAXPASSWORDLEN] = '\0';
                }
                if (!SMB_UNICODE_STRINGS(vcp))
                        iconv_convstr(vcp->vc_toserver, pbuf, pbuf/*,
                                      SMB_MAXPASSWORDLEN*/);

                if (vcp->vc_sopt.sv_sm & SMB_SM_ENCRYPT) {
                        uniplen = plen = 24;
                        smb_encrypt(pbuf, vcp->vc_ch, encpass);
                        ntencpass = malloc(uniplen, M_SMBTEMP, M_WAITOK);
                        if (SMB_UNICODE_STRINGS(vcp)) {
                                strncpy(pbuf, smb_vc_getpass(vcp),
                                        SMB_MAXPASSWORDLEN);
                                pbuf[SMB_MAXPASSWORDLEN] = '\0';
                        } else
                                iconv_convstr(vcp->vc_toserver, pbuf,
                                              smb_vc_getpass(vcp)/*,
                                              SMB_MAXPASSWORDLEN*/);
                        smb_ntencrypt(pbuf, vcp->vc_ch, (u_char*)ntencpass);
                        pp = encpass;
                        unipp = ntencpass;
                } else {
                        plen = strlen(pbuf) + 1;
                        pp = pbuf;
                        uniplen = plen * 2;
                        ntencpass = malloc(uniplen, M_SMBTEMP, M_WAITOK);
                        smb_strtouni(ntencpass, smb_vc_getpass(vcp));
                        plen--;

                        /*
                         * The uniplen is zeroed because Samba cannot deal
                         * with this 2nd cleartext password.  This Samba
                         * "bug" is actually a workaround for problems in
                         * Microsoft clients.
                         */
                        uniplen = 0/*-= 2*/;
                        unipp = ntencpass;
                }
        } else {
                /*
                 * In the share security mode password will be used
                 * only in the tree authentication
                 */
                 pp = "";
                 plen = 1;
                 unipp = &smb_unieol;
                 uniplen = 0 /* sizeof(smb_unieol) */;
        }
        smb_rq_wstart(rqp);
        mbp = &rqp->sr_rq;
        up = vcp->vc_username;
        ulen = strlen(up) + 1;
        /*
         * If userid is null we are attempting anonymous browse login
         * so passwords must be zero length.
         */
        if (ulen == 1)
                plen = uniplen = 0;
        mb_put_uint8(mbp, 0xff);
        mb_put_uint8(mbp, 0);
        mb_put_uint16le(mbp, 0);
        mb_put_uint16le(mbp, vcp->vc_sopt.sv_maxtx);
        mb_put_uint16le(mbp, vcp->vc_sopt.sv_maxmux);
        mb_put_uint16le(mbp, vcp->vc_number);
        mb_put_uint32le(mbp, vcp->vc_sopt.sv_skey);
        mb_put_uint16le(mbp, plen);
        if (SMB_DIALECT(vcp) < SMB_DIALECT_NTLM0_12) {
                mb_put_uint32le(mbp, 0);
                smb_rq_wend(rqp);
                smb_rq_bstart(rqp);
                mb_put_mem(mbp, pp, plen, MB_MSYSTEM);
                smb_put_dstring(mbp, vcp, up, SMB_CS_NONE);
        } else {
                mb_put_uint16le(mbp, uniplen);
                mb_put_uint32le(mbp, 0);                /* reserved */
                mb_put_uint32le(mbp, caps);
                smb_rq_wend(rqp);
                smb_rq_bstart(rqp);
                mb_put_mem(mbp, pp, plen, MB_MSYSTEM);
                mb_put_mem(mbp, (caddr_t)unipp, uniplen, MB_MSYSTEM);
                smb_put_dstring(mbp, vcp, up, SMB_CS_NONE);             /* AccountName */
                smb_put_dstring(mbp, vcp, vcp->vc_domain, SMB_CS_NONE); /* PrimaryDomain */
                smb_put_dstring(mbp, vcp, "FreeBSD", SMB_CS_NONE);      /* Client's OS */
                smb_put_dstring(mbp, vcp, "NETSMB", SMB_CS_NONE);               /* Client name */
        }
        smb_rq_bend(rqp);
        if (ntencpass)
                free(ntencpass, M_SMBTEMP);
        if (vcp->vc_hflags2 & SMB_FLAGS2_SECURITY_SIGNATURE)
                smb_calcmackey(vcp);
        error = smb_rq_simple(rqp);
        SMBSDEBUG("%d\n", error);
        if (error) {
                if (rqp->sr_errclass == ERRDOS && rqp->sr_serror == ERRnoaccess)
                        error = EAUTH;
                goto bad;
        }
        vcp->vc_smbuid = rqp->sr_rpuid;
bad:
        free(encpass, M_SMBTEMP);
        free(pbuf, M_SMBTEMP);
        smb_rq_done(rqp);
        if (error && upper == 1 && vcp->vc_sopt.sv_sm & SMB_SM_USER)
                goto again;
        return error;
}

int
smb_smb_ssnclose(struct smb_vc *vcp, struct smb_cred *scred)
{
        struct smb_rq *rqp;
        struct mbchain *mbp;
        int error;

        if (vcp->vc_smbuid == SMB_UID_UNKNOWN)
                return 0;

        if (smb_smb_nomux(vcp, scred, __func__) != 0)
                return EINVAL;

        error = smb_rq_alloc(VCTOCP(vcp), SMB_COM_LOGOFF_ANDX, scred, &rqp);
        if (error)
                return error;
        mbp = &rqp->sr_rq;
        smb_rq_wstart(rqp);
        mb_put_uint8(mbp, 0xff);
        mb_put_uint8(mbp, 0);
        mb_put_uint16le(mbp, 0);
        smb_rq_wend(rqp);
        smb_rq_bstart(rqp);
        smb_rq_bend(rqp);
        error = smb_rq_simple(rqp);
        SMBSDEBUG("%d\n", error);
        smb_rq_done(rqp);
        return error;
}

static char smb_any_share[] = "?????";

static char *
smb_share_typename(int stype)
{
        char *pp;

        switch (stype) {
            case SMB_ST_DISK:
                pp = "A:";
                break;
            case SMB_ST_PRINTER:
                pp = smb_any_share;             /* can't use LPT: here... */
                break;
            case SMB_ST_PIPE:
                pp = "IPC";
                break;
            case SMB_ST_COMM:
                pp = "COMM";
                break;
            case SMB_ST_ANY:
            default:
                pp = smb_any_share;
                break;
        }
        return pp;
}

int
smb_smb_treeconnect(struct smb_share *ssp, struct smb_cred *scred)
{
        struct smb_vc *vcp;
        struct smb_rq rq, *rqp = &rq;
        struct mbchain *mbp;
        char *pp, *pbuf, *encpass;
        int error, plen, caseopt, upper;

        upper = 0;

again:
        /* Disable Unicode for SMB_COM_TREE_CONNECT_ANDX requests */
        if (SSTOVC(ssp)->vc_hflags2 & SMB_FLAGS2_UNICODE) {
                vcp = SSTOVC(ssp);
                vcp->vc_toserver = vcp->vc_cp_toserver;
                vcp->vc_tolocal = vcp->vc_cp_tolocal;
                vcp->vc_hflags2 &= ~SMB_FLAGS2_UNICODE;
        }

        ssp->ss_tid = SMB_TID_UNKNOWN;
        error = smb_rq_alloc(SSTOCP(ssp), SMB_COM_TREE_CONNECT_ANDX, scred, &rqp);
        if (error)
                return error;
        vcp = rqp->sr_vc;
        caseopt = SMB_CS_NONE;
        if (vcp->vc_sopt.sv_sm & SMB_SM_USER) {
                plen = 1;
                pp = "";
                pbuf = NULL;
                encpass = NULL;
        } else {
                pbuf = malloc(SMB_MAXPASSWORDLEN + 1, M_SMBTEMP, M_WAITOK);
                encpass = malloc(24, M_SMBTEMP, M_WAITOK);
                /*
                 * We try w/o uppercasing first so Samba mixed case
                 * passwords work.  If that fails we come back and try
                 * uppercasing to satisfy OS/2 and Windows for Workgroups.
                 */
                if (upper++) {
                        iconv_convstr(vcp->vc_toupper, pbuf,
                                      smb_share_getpass(ssp)/*,
                                      SMB_MAXPASSWORDLEN*/);
                } else {
                        strncpy(pbuf, smb_share_getpass(ssp),
                                SMB_MAXPASSWORDLEN);
                        pbuf[SMB_MAXPASSWORDLEN] = '\0';
                }
                if (vcp->vc_sopt.sv_sm & SMB_SM_ENCRYPT) {
                        plen = 24;
                        smb_encrypt(pbuf, vcp->vc_ch, encpass);
                        pp = encpass;
                } else {
                        plen = strlen(pbuf) + 1;
                        pp = pbuf;
                }
        }
        mbp = &rqp->sr_rq;
        smb_rq_wstart(rqp);
        mb_put_uint8(mbp, 0xff);
        mb_put_uint8(mbp, 0);
        mb_put_uint16le(mbp, 0);
        mb_put_uint16le(mbp, 0);                /* Flags */
        mb_put_uint16le(mbp, plen);
        smb_rq_wend(rqp);
        smb_rq_bstart(rqp);
        mb_put_mem(mbp, pp, plen, MB_MSYSTEM);
        smb_put_dmem(mbp, vcp, "\\\\", 2, caseopt);
        pp = vcp->vc_srvname;
        smb_put_dmem(mbp, vcp, pp, strlen(pp), caseopt);
        smb_put_dmem(mbp, vcp, "\\", 1, caseopt);
        pp = ssp->ss_name;
        smb_put_dstring(mbp, vcp, pp, caseopt);
        pp = smb_share_typename(ssp->ss_type);
        smb_put_dstring(mbp, vcp, pp, caseopt);
        smb_rq_bend(rqp);
        error = smb_rq_simple(rqp);
        SMBSDEBUG("%d\n", error);
        if (error)
                goto bad;
        ssp->ss_tid = rqp->sr_rptid;
        ssp->ss_vcgenid = vcp->vc_genid;
        ssp->ss_flags |= SMBS_CONNECTED;
        /*
         * If the server can speak Unicode then switch
         * our converters to do Unicode <--> Local
         */
        if (vcp->obj.co_flags & SMBV_UNICODE) {
                vcp->vc_toserver = vcp->vc_ucs_toserver;
                vcp->vc_tolocal = vcp->vc_ucs_tolocal;
                vcp->vc_hflags2 |= SMB_FLAGS2_UNICODE;
        }
bad:
        if (encpass)
                free(encpass, M_SMBTEMP);
        if (pbuf)
                free(pbuf, M_SMBTEMP);
        smb_rq_done(rqp);
        if (error && upper == 1)
                goto again;
        return error;
}

int
smb_smb_treedisconnect(struct smb_share *ssp, struct smb_cred *scred)
{
        struct smb_rq *rqp;
        int error;

        if (ssp->ss_tid == SMB_TID_UNKNOWN)
                return 0;
        error = smb_rq_alloc(SSTOCP(ssp), SMB_COM_TREE_DISCONNECT, scred, &rqp);
        if (error)
                return error;
        smb_rq_wstart(rqp);
        smb_rq_wend(rqp);
        smb_rq_bstart(rqp);
        smb_rq_bend(rqp);
        error = smb_rq_simple(rqp);
        SMBSDEBUG("%d\n", error);
        smb_rq_done(rqp);
        ssp->ss_tid = SMB_TID_UNKNOWN;
        return error;
}

static __inline int
smb_smb_readx(struct smb_share *ssp, u_int16_t fid, int *len, int *rresid,
              struct uio *uio, struct smb_cred *scred)
{
        struct smb_rq *rqp;
        struct mbchain *mbp;
        struct mdchain *mdp;
        u_int8_t wc;
        int error;
        u_int16_t residhi, residlo, off, doff;
        u_int32_t resid;

        error = smb_rq_alloc(SSTOCP(ssp), SMB_COM_READ_ANDX, scred, &rqp);
        if (error)
                return error;
        smb_rq_getrequest(rqp, &mbp);
        smb_rq_wstart(rqp);
        mb_put_uint8(mbp, 0xff);        /* no secondary command */
        mb_put_uint8(mbp, 0);           /* MBZ */
        mb_put_uint16le(mbp, 0);        /* offset to secondary */
        mb_put_mem(mbp, (caddr_t)&fid, sizeof(fid), MB_MSYSTEM);
        mb_put_uint32le(mbp, uio->uio_offset);
        *len = min(SSTOVC(ssp)->vc_rxmax, *len);
        mb_put_uint16le(mbp, *len);     /* MaxCount */
        mb_put_uint16le(mbp, *len);     /* MinCount (only indicates blocking) */
        mb_put_uint32le(mbp, (unsigned)*len >> 16);     /* MaxCountHigh */
        mb_put_uint16le(mbp, *len);     /* Remaining ("obsolete") */
        mb_put_uint32le(mbp, uio->uio_offset >> 32);    /* OffsetHigh */
        smb_rq_wend(rqp);
        smb_rq_bstart(rqp);
        smb_rq_bend(rqp);
        do {
                error = smb_rq_simple(rqp);
                if (error)
                        break;
                smb_rq_getreply(rqp, &mdp);
                off = SMB_HDRLEN;
                md_get_uint8(mdp, &wc);
                off++;
                if (wc != 12) {
                        error = EBADRPC;
                        break;
                }
                md_get_uint8(mdp, NULL);
                off++;
                md_get_uint8(mdp, NULL);
                off++;
                md_get_uint16le(mdp, NULL);
                off += 2;
                md_get_uint16le(mdp, NULL);
                off += 2;
                md_get_uint16le(mdp, NULL);     /* data compaction mode */
                off += 2;
                md_get_uint16le(mdp, NULL);
                off += 2;
                md_get_uint16le(mdp, &residlo);
                off += 2;
                md_get_uint16le(mdp, &doff);    /* data offset */
                off += 2;
                md_get_uint16le(mdp, &residhi);
                off += 2;
                resid = (residhi << 16) | residlo;
                md_get_mem(mdp, NULL, 4 * 2, MB_MSYSTEM);
                off += 4*2;
                md_get_uint16le(mdp, NULL);     /* ByteCount */
                off += 2;
                if (doff > off) /* pad byte(s)? */
                        md_get_mem(mdp, NULL, doff - off, MB_MSYSTEM);
                if (resid == 0) {
                        *rresid = resid;
                        break;
                }
                error = md_get_uio(mdp, uio, resid);
                if (error)
                        break;
                *rresid = resid;
        } while(0);
        smb_rq_done(rqp);
        return (error);
}

static __inline int
smb_smb_writex(struct smb_share *ssp, u_int16_t fid, int *len, int *rresid,
        struct uio *uio, struct smb_cred *scred)
{
        struct smb_rq *rqp;
        struct mbchain *mbp;
        struct mdchain *mdp;
        int error;
        u_int8_t wc;
        u_int16_t resid;

        error = smb_rq_alloc(SSTOCP(ssp), SMB_COM_WRITE_ANDX, scred, &rqp);
        if (error)
                return (error);
        smb_rq_getrequest(rqp, &mbp);
        smb_rq_wstart(rqp);
        mb_put_uint8(mbp, 0xff);        /* no secondary command */
        mb_put_uint8(mbp, 0);           /* MBZ */
        mb_put_uint16le(mbp, 0);        /* offset to secondary */
        mb_put_mem(mbp, (caddr_t)&fid, sizeof(fid), MB_MSYSTEM);
        mb_put_uint32le(mbp, uio->uio_offset);
        mb_put_uint32le(mbp, 0);        /* MBZ (timeout) */
        mb_put_uint16le(mbp, 0);        /* !write-thru */
        mb_put_uint16le(mbp, 0);
        *len = min(SSTOVC(ssp)->vc_wxmax, *len);
        mb_put_uint16le(mbp, (unsigned)*len >> 16);
        mb_put_uint16le(mbp, *len);
        mb_put_uint16le(mbp, 64);       /* data offset from header start */
        mb_put_uint32le(mbp, uio->uio_offset >> 32);    /* OffsetHigh */
        smb_rq_wend(rqp);
        smb_rq_bstart(rqp);
        do {
                mb_put_uint8(mbp, 0xee);        /* mimic xp pad byte! */
                error = mb_put_uio(mbp, uio, *len);
                if (error)
                        break;
                smb_rq_bend(rqp);
                error = smb_rq_simple(rqp);
                if (error)
                        break;
                smb_rq_getreply(rqp, &mdp);
                md_get_uint8(mdp, &wc);
                if (wc != 6) {
                        error = EBADRPC;
                        break;
                }
                md_get_uint8(mdp, NULL);
                md_get_uint8(mdp, NULL);
                md_get_uint16le(mdp, NULL);
                md_get_uint16le(mdp, &resid);
                *rresid = resid;
        } while(0);

        smb_rq_done(rqp);
        return (error);
}

static __inline int
smb_smb_read(struct smb_share *ssp, u_int16_t fid,
        int *len, int *rresid, struct uio *uio, struct smb_cred *scred)
{
        struct smb_rq *rqp;
        struct mbchain *mbp;
        struct mdchain *mdp;
        u_int16_t resid, bc;
        u_int8_t wc;
        int error, rlen, blksz;

        if (SSTOVC(ssp)->vc_sopt.sv_caps & SMB_CAP_LARGE_READX)
                return (smb_smb_readx(ssp, fid, len, rresid, uio, scred));

        error = smb_rq_alloc(SSTOCP(ssp), SMB_COM_READ, scred, &rqp);
        if (error)
                return error;

        blksz = SSTOVC(ssp)->vc_txmax - SMB_HDRLEN - 16;
        rlen = *len = min(blksz, *len);

        smb_rq_getrequest(rqp, &mbp);
        smb_rq_wstart(rqp);
        mb_put_mem(mbp, (caddr_t)&fid, sizeof(fid), MB_MSYSTEM);
        mb_put_uint16le(mbp, rlen);
        mb_put_uint32le(mbp, uio->uio_offset);
        mb_put_uint16le(mbp, min(uio->uio_resid, 0xffff));
        smb_rq_wend(rqp);
        smb_rq_bstart(rqp);
        smb_rq_bend(rqp);
        do {
                error = smb_rq_simple(rqp);
                if (error)
                        break;
                smb_rq_getreply(rqp, &mdp);
                md_get_uint8(mdp, &wc);
                if (wc != 5) {
                        error = EBADRPC;
                        break;
                }
                md_get_uint16le(mdp, &resid);
                md_get_mem(mdp, NULL, 4 * 2, MB_MSYSTEM);
                md_get_uint16le(mdp, &bc);
                md_get_uint8(mdp, NULL);                /* ignore buffer type */
                md_get_uint16le(mdp, &resid);
                if (resid == 0) {
                        *rresid = resid;
                        break;
                }
                error = md_get_uio(mdp, uio, resid);
                if (error)
                        break;
                *rresid = resid;
        } while(0);
        smb_rq_done(rqp);
        return error;
}

int
smb_read(struct smb_share *ssp, u_int16_t fid, struct uio *uio,
        struct smb_cred *scred)
{
        int tsize, len, resid;
        int error = 0;

        tsize = uio->uio_resid;
        while (tsize > 0) {
                resid = 0;
                len = tsize;
                error = smb_smb_read(ssp, fid, &len, &resid, uio, scred);
                if (error)
                        break;
                tsize -= resid;
                if (resid < len)
                        break;
        }
        return error;
}

static __inline int
smb_smb_write(struct smb_share *ssp, u_int16_t fid, int *len, int *rresid,
        struct uio *uio, struct smb_cred *scred)
{
        struct smb_rq *rqp;
        struct mbchain *mbp;
        struct mdchain *mdp;
        u_int16_t resid;
        u_int8_t wc;
        int error, blksz;

        if (*len && SSTOVC(ssp)->vc_sopt.sv_caps & SMB_CAP_LARGE_WRITEX)
                return (smb_smb_writex(ssp, fid, len, rresid, uio, scred));

        blksz = SSTOVC(ssp)->vc_txmax - SMB_HDRLEN - 16;
        if (blksz > 0xffff)
                blksz = 0xffff;

        resid = *len = min(blksz, *len);

        error = smb_rq_alloc(SSTOCP(ssp), SMB_COM_WRITE, scred, &rqp);
        if (error)
                return error;
        smb_rq_getrequest(rqp, &mbp);
        smb_rq_wstart(rqp);
        mb_put_mem(mbp, (caddr_t)&fid, sizeof(fid), MB_MSYSTEM);
        mb_put_uint16le(mbp, resid);
        mb_put_uint32le(mbp, uio->uio_offset);
        mb_put_uint16le(mbp, min(uio->uio_resid, 0xffff));
        smb_rq_wend(rqp);
        smb_rq_bstart(rqp);
        mb_put_uint8(mbp, SMB_DT_DATA);
        mb_put_uint16le(mbp, resid);
        do {
                error = mb_put_uio(mbp, uio, resid);
                if (error)
                        break;
                smb_rq_bend(rqp);
                error = smb_rq_simple(rqp);
                if (error)
                        break;
                smb_rq_getreply(rqp, &mdp);
                md_get_uint8(mdp, &wc);
                if (wc != 1) {
                        error = EBADRPC;
                        break;
                }
                md_get_uint16le(mdp, &resid);
                *rresid = resid;
        } while(0);
        smb_rq_done(rqp);
        return error;
}

int
smb_write(struct smb_share *ssp, u_int16_t fid, struct uio *uio,
        struct smb_cred *scred)
{
        int error = 0, len, tsize, resid;
        struct uio olduio;

        tsize = uio->uio_resid;
        olduio = *uio;
        while (tsize > 0) {
                resid = 0;
                len = tsize;
                error = smb_smb_write(ssp, fid, &len, &resid, uio, scred);
                if (error)
                        break;
                if (resid < len) {
                        error = EIO;
                        break;
                }
                tsize -= resid;
        }
        if (error) {
                /*
                 * Errors can happen on the copyin, the rpc, etc.  So they
                 * imply resid is unreliable.  The only safe thing is
                 * to pretend zero bytes made it.  We needn't restore the
                 * iovs because callers don't depend on them in error
                 * paths - uio_resid and uio_offset are what matter.
                 */
                *uio = olduio;
        }
        return error;
}

int
smb_smb_echo(struct smb_vc *vcp, struct smb_cred *scred)
{
        struct smb_rq *rqp;
        struct mbchain *mbp;
        int error;

        error = smb_rq_alloc(VCTOCP(vcp), SMB_COM_ECHO, scred, &rqp);
        if (error)
                return error;
        mbp = &rqp->sr_rq;
        smb_rq_wstart(rqp);
        mb_put_uint16le(mbp, 1);
        smb_rq_wend(rqp);
        smb_rq_bstart(rqp);
        mb_put_uint32le(mbp, 0);
        smb_rq_bend(rqp);
        error = smb_rq_simple(rqp);
        SMBSDEBUG("%d\n", error);
        smb_rq_done(rqp);
        return error;
}