Fix bug #5479, print spool shares require max_xmit to
[samba.git] / source / libsmb / clireadwrite.c
1 /*
2    Unix SMB/CIFS implementation.
3    client file read/write routines
4    Copyright (C) Andrew Tridgell 1994-1998
5
6    This program is free software; you can redistribute it and/or modify
7    it under the terms of the GNU General Public License as published by
8    the Free Software Foundation; either version 3 of the License, or
9    (at your option) any later version.
10
11    This program is distributed in the hope that it will be useful,
12    but WITHOUT ANY WARRANTY; without even the implied warranty of
13    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14    GNU General Public License for more details.
15
16    You should have received a copy of the GNU General Public License
17    along with this program.  If not, see <http://www.gnu.org/licenses/>.
18 */
19
20 #include "includes.h"
21
22 /****************************************************************************
23   Calculate the recommended read buffer size
24 ****************************************************************************/
25 static size_t cli_read_max_bufsize(struct cli_state *cli)
26 {
27         if (!client_is_signing_on(cli) && !cli_encryption_on(cli)
28             && (cli->posix_capabilities & CIFS_UNIX_LARGE_READ_CAP)) {
29                 return CLI_SAMBA_MAX_POSIX_LARGE_READX_SIZE;
30         }
31         if (cli->capabilities & CAP_LARGE_READX) {
32                 return cli->is_samba
33                         ? CLI_SAMBA_MAX_LARGE_READX_SIZE
34                         : CLI_WINDOWS_MAX_LARGE_READX_SIZE;
35         }
36         return (cli->max_xmit - (smb_size+32)) & ~1023;
37 }
38
39 /*
40  * Send a read&x request
41  */
42
43 struct async_req *cli_read_andx_send(TALLOC_CTX *mem_ctx,
44                                      struct cli_state *cli, int fnum,
45                                      off_t offset, size_t size)
46 {
47         struct async_req *result;
48         struct cli_request *req;
49         bool bigoffset = False;
50         char *enc_buf;
51
52         if (size > cli_read_max_bufsize(cli)) {
53                 DEBUG(0, ("cli_read_andx_send got size=%d, can only handle "
54                           "size=%d\n", (int)size,
55                           (int)cli_read_max_bufsize(cli)));
56                 return NULL;
57         }
58
59         result = cli_request_new(mem_ctx, cli->event_ctx, cli, 12, 0, &req);
60         if (result == NULL) {
61                 DEBUG(0, ("cli_request_new failed\n"));
62                 return NULL;
63         }
64
65         req = cli_request_get(result);
66
67         req->data.read.ofs = offset;
68         req->data.read.size = size;
69         req->data.read.received = 0;
70         req->data.read.rcvbuf = NULL;
71
72         if ((SMB_BIG_UINT)offset >> 32)
73                 bigoffset = True;
74
75         cli_set_message(req->outbuf, bigoffset ? 12 : 10, 0, False);
76
77         SCVAL(req->outbuf,smb_com,SMBreadX);
78         SSVAL(req->outbuf,smb_tid,cli->cnum);
79         cli_setup_packet_buf(cli, req->outbuf);
80
81         SCVAL(req->outbuf,smb_vwv0,0xFF);
82         SCVAL(req->outbuf,smb_vwv0+1,0);
83         SSVAL(req->outbuf,smb_vwv1,0);
84         SSVAL(req->outbuf,smb_vwv2,fnum);
85         SIVAL(req->outbuf,smb_vwv3,offset);
86         SSVAL(req->outbuf,smb_vwv5,size);
87         SSVAL(req->outbuf,smb_vwv6,size);
88         SSVAL(req->outbuf,smb_vwv7,(size >> 16));
89         SSVAL(req->outbuf,smb_vwv8,0);
90         SSVAL(req->outbuf,smb_vwv9,0);
91         SSVAL(req->outbuf,smb_mid,req->mid);
92
93         if (bigoffset) {
94                 SIVAL(req->outbuf, smb_vwv10,
95                       (((SMB_BIG_UINT)offset)>>32) & 0xffffffff);
96         }
97
98         cli_calculate_sign_mac(cli, req->outbuf);
99
100         event_fd_set_writeable(cli->fd_event);
101
102         if (cli_encryption_on(cli)) {
103                 NTSTATUS status;
104                 status = cli_encrypt_message(cli, req->outbuf, &enc_buf);
105                 if (!NT_STATUS_IS_OK(status)) {
106                         DEBUG(0, ("Error in encrypting client message. "
107                                   "Error %s\n", nt_errstr(status)));
108                         TALLOC_FREE(req);
109                         return NULL;
110                 }
111                 req->outbuf = enc_buf;
112                 req->enc_state = cli->trans_enc_state;
113         }
114
115         return result;
116 }
117
118 /*
119  * Pull the data out of a finished async read_and_x request. rcvbuf is
120  * talloced from the request, so better make sure that you copy it away before
121  * you talloc_free(req). "rcvbuf" is NOT a talloc_ctx of its own, so do not
122  * talloc_move it!
123  */
124
125 NTSTATUS cli_read_andx_recv(struct async_req *req, ssize_t *received,
126                             uint8_t **rcvbuf)
127 {
128         struct cli_request *cli_req = cli_request_get(req);
129         NTSTATUS status;
130         size_t size;
131
132         SMB_ASSERT(req->state >= ASYNC_REQ_DONE);
133         if (req->state == ASYNC_REQ_ERROR) {
134                 return req->status;
135         }
136
137         status = cli_pull_error(cli_req->inbuf);
138
139         if (NT_STATUS_IS_ERR(status)) {
140                 return status;
141         }
142
143         /* size is the number of bytes the server returned.
144          * Might be zero. */
145         size = SVAL(cli_req->inbuf, smb_vwv5);
146         size |= (((unsigned int)(SVAL(cli_req->inbuf, smb_vwv7))) << 16);
147
148         if (size > cli_req->data.read.size) {
149                 DEBUG(5,("server returned more than we wanted!\n"));
150                 return NT_STATUS_UNEXPECTED_IO_ERROR;
151         }
152
153         *rcvbuf = (uint8_t *)
154                 (smb_base(cli_req->inbuf) + SVAL(cli_req->inbuf, smb_vwv6));
155         *received = size;
156         return NT_STATUS_OK;
157 }
158
159 /*
160  * Parallel read support.
161  *
162  * cli_pull sends as many read&x requests as the server would allow via
163  * max_mux at a time. When replies flow back in, the data is written into
164  * the callback function "sink" in the right order.
165  */
166
167 struct cli_pull_state {
168         struct async_req *req;
169
170         struct cli_state *cli;
171         uint16_t fnum;
172         off_t start_offset;
173         SMB_OFF_T size;
174
175         NTSTATUS (*sink)(char *buf, size_t n, void *priv);
176         void *priv;
177
178         size_t chunk_size;
179
180         /*
181          * Outstanding requests
182          */
183         int num_reqs;
184         struct async_req **reqs;
185
186         /*
187          * For how many bytes did we send requests already?
188          */
189         SMB_OFF_T requested;
190
191         /*
192          * Next request index to push into "sink". This walks around the "req"
193          * array, taking care that the requests are pushed to "sink" in the
194          * right order. If necessary (i.e. replies don't come in in the right
195          * order), replies are held back in "reqs".
196          */
197         int top_req;
198
199         /*
200          * How many bytes did we push into "sink"?
201          */
202
203         SMB_OFF_T pushed;
204 };
205
206 static char *cli_pull_print(TALLOC_CTX *mem_ctx, struct async_req *req)
207 {
208         struct cli_pull_state *state = talloc_get_type_abort(
209                 req->private_data, struct cli_pull_state);
210         char *result;
211
212         result = async_req_print(mem_ctx, req);
213         if (result == NULL) {
214                 return NULL;
215         }
216
217         return talloc_asprintf_append_buffer(
218                 result, "num_reqs=%d, top_req=%d",
219                 state->num_reqs, state->top_req);
220 }
221
222 static void cli_pull_read_done(struct async_req *read_req);
223
224 /*
225  * Prepare an async pull request
226  */
227
228 struct async_req *cli_pull_send(TALLOC_CTX *mem_ctx, struct cli_state *cli,
229                                 uint16_t fnum, off_t start_offset,
230                                 SMB_OFF_T size, size_t window_size,
231                                 NTSTATUS (*sink)(char *buf, size_t n,
232                                                  void *priv),
233                                 void *priv)
234 {
235         struct async_req *result;
236         struct cli_pull_state *state;
237         int i;
238
239         result = async_req_new(mem_ctx, cli->event_ctx);
240         if (result == NULL) {
241                 goto failed;
242         }
243         state = talloc(result, struct cli_pull_state);
244         if (state == NULL) {
245                 goto failed;
246         }
247         result->private_data = state;
248         result->print = cli_pull_print;
249         state->req = result;
250
251         state->cli = cli;
252         state->fnum = fnum;
253         state->start_offset = start_offset;
254         state->size = size;
255         state->sink = sink;
256         state->priv = priv;
257
258         state->pushed = 0;
259         state->top_req = 0;
260
261         if (size == 0) {
262                 if (!async_post_status(result, NT_STATUS_OK)) {
263                         goto failed;
264                 }
265                 return result;
266         }
267
268         state->chunk_size = cli_read_max_bufsize(cli);
269
270         state->num_reqs = MAX(window_size/state->chunk_size, 1);
271         state->num_reqs = MIN(state->num_reqs, cli->max_mux);
272
273         state->reqs = TALLOC_ZERO_ARRAY(state, struct async_req *,
274                                         state->num_reqs);
275         if (state->reqs == NULL) {
276                 goto failed;
277         }
278
279         state->requested = 0;
280
281         for (i=0; i<state->num_reqs; i++) {
282                 SMB_OFF_T size_left;
283                 size_t request_thistime;
284
285                 if (state->requested >= size) {
286                         state->num_reqs = i;
287                         break;
288                 }
289
290                 size_left = size - state->requested;
291                 request_thistime = MIN(size_left, state->chunk_size);
292
293                 state->reqs[i] = cli_read_andx_send(
294                         state->reqs, cli, fnum,
295                         state->start_offset + state->requested,
296                         request_thistime);
297
298                 if (state->reqs[i] == NULL) {
299                         goto failed;
300                 }
301
302                 state->reqs[i]->async.fn = cli_pull_read_done;
303                 state->reqs[i]->async.priv = result;
304
305                 state->requested += request_thistime;
306         }
307         return result;
308
309 failed:
310         TALLOC_FREE(result);
311         return NULL;
312 }
313
314 /*
315  * Handle incoming read replies, push the data into sink and send out new
316  * requests if necessary.
317  */
318
319 static void cli_pull_read_done(struct async_req *read_req)
320 {
321         struct async_req *pull_req = talloc_get_type_abort(
322                 read_req->async.priv, struct async_req);
323         struct cli_pull_state *state = talloc_get_type_abort(
324                 pull_req->private_data, struct cli_pull_state);
325         struct cli_request *read_state = cli_request_get(read_req);
326         NTSTATUS status;
327
328         status = cli_read_andx_recv(read_req, &read_state->data.read.received,
329                                     &read_state->data.read.rcvbuf);
330         if (!NT_STATUS_IS_OK(status)) {
331                 async_req_error(state->req, status);
332                 return;
333         }
334
335         /*
336          * This loop is the one to take care of out-of-order replies. All
337          * pending requests are in state->reqs, state->reqs[top_req] is the
338          * one that is to be pushed next. If however a request later than
339          * top_req is replied to, then we can't push yet. If top_req is
340          * replied to at a later point then, we need to push all the finished
341          * requests.
342          */
343
344         while (state->reqs[state->top_req] != NULL) {
345                 struct cli_request *top_read;
346
347                 DEBUG(11, ("cli_pull_read_done: top_req = %d\n",
348                            state->top_req));
349
350                 if (state->reqs[state->top_req]->state < ASYNC_REQ_DONE) {
351                         DEBUG(11, ("cli_pull_read_done: top request not yet "
352                                    "done\n"));
353                         return;
354                 }
355
356                 top_read = cli_request_get(state->reqs[state->top_req]);
357
358                 DEBUG(10, ("cli_pull_read_done: Pushing %d bytes, %d already "
359                            "pushed\n", (int)top_read->data.read.received,
360                            (int)state->pushed));
361
362                 status = state->sink((char *)top_read->data.read.rcvbuf,
363                                      top_read->data.read.received,
364                                      state->priv);
365                 if (!NT_STATUS_IS_OK(status)) {
366                         async_req_error(state->req, status);
367                         return;
368                 }
369                 state->pushed += top_read->data.read.received;
370
371                 TALLOC_FREE(state->reqs[state->top_req]);
372
373                 if (state->requested < state->size) {
374                         struct async_req *new_req;
375                         SMB_OFF_T size_left;
376                         size_t request_thistime;
377
378                         size_left = state->size - state->requested;
379                         request_thistime = MIN(size_left, state->chunk_size);
380
381                         DEBUG(10, ("cli_pull_read_done: Requesting %d bytes "
382                                    "at %d, position %d\n",
383                                    (int)request_thistime,
384                                    (int)(state->start_offset
385                                          + state->requested),
386                                    state->top_req));
387
388                         new_req = cli_read_andx_send(
389                                 state->reqs, state->cli, state->fnum,
390                                 state->start_offset + state->requested,
391                                 request_thistime);
392
393                         if (async_req_nomem(new_req, state->req)) {
394                                 return;
395                         }
396
397                         new_req->async.fn = cli_pull_read_done;
398                         new_req->async.priv = pull_req;
399
400                         state->reqs[state->top_req] = new_req;
401                         state->requested += request_thistime;
402                 }
403
404                 state->top_req = (state->top_req+1) % state->num_reqs;
405         }
406
407         async_req_done(pull_req);
408 }
409
410 NTSTATUS cli_pull_recv(struct async_req *req, SMB_OFF_T *received)
411 {
412         struct cli_pull_state *state = talloc_get_type_abort(
413                 req->private_data, struct cli_pull_state);
414
415         SMB_ASSERT(req->state >= ASYNC_REQ_DONE);
416         if (req->state == ASYNC_REQ_ERROR) {
417                 return req->status;
418         }
419         *received = state->pushed;
420         return NT_STATUS_OK;
421 }
422
423 NTSTATUS cli_pull(struct cli_state *cli, uint16_t fnum,
424                   off_t start_offset, SMB_OFF_T size, size_t window_size,
425                   NTSTATUS (*sink)(char *buf, size_t n, void *priv),
426                   void *priv, SMB_OFF_T *received)
427 {
428         TALLOC_CTX *frame = talloc_stackframe();
429         struct async_req *req;
430         NTSTATUS result = NT_STATUS_NO_MEMORY;
431
432         if (cli_tmp_event_ctx(frame, cli) == NULL) {
433                 goto nomem;
434         }
435
436         req = cli_pull_send(frame, cli, fnum, start_offset, size, window_size,
437                             sink, priv);
438         if (req == NULL) {
439                 goto nomem;
440         }
441
442         while (req->state < ASYNC_REQ_DONE) {
443                 event_loop_once(cli->event_ctx);
444         }
445
446         result = cli_pull_recv(req, received);
447  nomem:
448         TALLOC_FREE(frame);
449         return result;
450 }
451
452 static NTSTATUS cli_read_sink(char *buf, size_t n, void *priv)
453 {
454         char **pbuf = (char **)priv;
455         memcpy(*pbuf, buf, n);
456         *pbuf += n;
457         return NT_STATUS_OK;
458 }
459
460 ssize_t cli_read(struct cli_state *cli, int fnum, char *buf,
461                  off_t offset, size_t size)
462 {
463         NTSTATUS status;
464         SMB_OFF_T ret;
465
466         status = cli_pull(cli, fnum, offset, size, size,
467                           cli_read_sink, &buf, &ret);
468         if (!NT_STATUS_IS_OK(status)) {
469                 cli_set_error(cli, status);
470                 return -1;
471         }
472         return ret;
473 }
474
475 #if 0  /* relies on client_receive_smb(), now a static in libsmb/clientgen.c */
476
477 /* This call is INCOMPATIBLE with SMB signing.  If you remove the #if 0
478    you must fix ensure you don't attempt to sign the packets - data
479    *will* be currupted */
480
481 /****************************************************************************
482 Issue a single SMBreadraw and don't wait for a reply.
483 ****************************************************************************/
484
485 static bool cli_issue_readraw(struct cli_state *cli, int fnum, off_t offset, 
486                            size_t size, int i)
487 {
488
489         if (!cli->sign_info.use_smb_signing) {
490                 DEBUG(0, ("Cannot use readraw and SMB Signing\n"));
491                 return False;
492         }
493         
494         memset(cli->outbuf,'\0',smb_size);
495         memset(cli->inbuf,'\0',smb_size);
496
497         cli_set_message(cli->outbuf,10,0,True);
498                 
499         SCVAL(cli->outbuf,smb_com,SMBreadbraw);
500         SSVAL(cli->outbuf,smb_tid,cli->cnum);
501         cli_setup_packet(cli);
502
503         SSVAL(cli->outbuf,smb_vwv0,fnum);
504         SIVAL(cli->outbuf,smb_vwv1,offset);
505         SSVAL(cli->outbuf,smb_vwv2,size);
506         SSVAL(cli->outbuf,smb_vwv3,size);
507         SSVAL(cli->outbuf,smb_mid,cli->mid + i);
508
509         return cli_send_smb(cli);
510 }
511
512 /****************************************************************************
513  Tester for the readraw call.
514 ****************************************************************************/
515
516 ssize_t cli_readraw(struct cli_state *cli, int fnum, char *buf, off_t offset, size_t size)
517 {
518         char *p;
519         int size2;
520         size_t readsize;
521         ssize_t total = 0;
522
523         if (size == 0) 
524                 return 0;
525
526         /*
527          * Set readsize to the maximum size we can handle in one readraw.
528          */
529
530         readsize = 0xFFFF;
531
532         while (total < size) {
533                 readsize = MIN(readsize, size-total);
534
535                 /* Issue a read and receive a reply */
536
537                 if (!cli_issue_readraw(cli, fnum, offset, readsize, 0))
538                         return -1;
539
540                 if (!client_receive_smb(cli->fd, cli->inbuf, cli->timeout))
541                         return -1;
542
543                 size2 = smb_len(cli->inbuf);
544
545                 if (size2 > readsize) {
546                         DEBUG(5,("server returned more than we wanted!\n"));
547                         return -1;
548                 } else if (size2 < 0) {
549                         DEBUG(5,("read return < 0!\n"));
550                         return -1;
551                 }
552
553                 /* Copy data into buffer */
554
555                 if (size2) {
556                         p = cli->inbuf + 4;
557                         memcpy(buf + total, p, size2);
558                 }
559
560                 total += size2;
561                 offset += size2;
562
563                 /*
564                  * If the server returned less than we asked for we're at EOF.
565                  */
566
567                 if (size2 < readsize)
568                         break;
569         }
570
571         return total;
572 }
573 #endif
574
575 /****************************************************************************
576  Issue a single SMBwrite and don't wait for a reply.
577 ****************************************************************************/
578
579 static bool cli_issue_write(struct cli_state *cli,
580                                 int fnum,
581                                 off_t offset,
582                                 uint16 mode,
583                                 const char *buf,
584                                 size_t size,
585                                 int i)
586 {
587         char *p;
588         bool large_writex = false;
589         /* We can only do direct writes if not signing and not encrypting. */
590         bool direct_writes = !client_is_signing_on(cli) && !cli_encryption_on(cli);
591
592         if (!direct_writes && size + 1 > cli->bufsize) {
593                 cli->outbuf = (char *)SMB_REALLOC(cli->outbuf, size + 1024);
594                 if (!cli->outbuf) {
595                         return False;
596                 }
597                 cli->inbuf = (char *)SMB_REALLOC(cli->inbuf, size + 1024);
598                 if (cli->inbuf == NULL) {
599                         SAFE_FREE(cli->outbuf);
600                         return False;
601                 }
602                 cli->bufsize = size + 1024;
603         }
604
605         memset(cli->outbuf,'\0',smb_size);
606         memset(cli->inbuf,'\0',smb_size);
607
608         if (cli->capabilities & CAP_LARGE_FILES) {
609                 large_writex = True;
610         }
611
612         if (large_writex) {
613                 cli_set_message(cli->outbuf,14,0,True);
614         } else {
615                 cli_set_message(cli->outbuf,12,0,True);
616         }
617
618         SCVAL(cli->outbuf,smb_com,SMBwriteX);
619         SSVAL(cli->outbuf,smb_tid,cli->cnum);
620         cli_setup_packet(cli);
621
622         SCVAL(cli->outbuf,smb_vwv0,0xFF);
623         SSVAL(cli->outbuf,smb_vwv2,fnum);
624
625         SIVAL(cli->outbuf,smb_vwv3,offset);
626         SIVAL(cli->outbuf,smb_vwv5,0);
627         SSVAL(cli->outbuf,smb_vwv7,mode);
628
629         SSVAL(cli->outbuf,smb_vwv8,(mode & 0x0008) ? size : 0);
630         /*
631          * According to CIFS-TR-1p00, this following field should only
632          * be set if CAP_LARGE_WRITEX is set. We should check this
633          * locally. However, this check might already have been
634          * done by our callers.
635          */
636         SSVAL(cli->outbuf,smb_vwv9,(size>>16));
637         SSVAL(cli->outbuf,smb_vwv10,size);
638         /* +1 is pad byte. */
639         SSVAL(cli->outbuf,smb_vwv11,
640               smb_buf(cli->outbuf) - smb_base(cli->outbuf) + 1);
641
642         if (large_writex) {
643                 SIVAL(cli->outbuf,smb_vwv12,(((SMB_BIG_UINT)offset)>>32) & 0xffffffff);
644         }
645
646         p = smb_base(cli->outbuf) + SVAL(cli->outbuf,smb_vwv11) -1;
647         *p++ = '\0'; /* pad byte. */
648         if (!direct_writes) {
649                 memcpy(p, buf, size);
650         }
651         if (size > 0x1FFFF) {
652                 /* This is a POSIX 14 word large write. */
653                 set_message_bcc(cli->outbuf, 0); /* Set bcc to zero. */
654                 _smb_setlen_large(cli->outbuf,smb_size + 28 + 1 /* pad */ + size - 4);
655         } else {
656                 cli_setup_bcc(cli, p+size);
657         }
658
659         SSVAL(cli->outbuf,smb_mid,cli->mid + i);
660
661         show_msg(cli->outbuf);
662         if (direct_writes) {
663                 /* For direct writes we now need to write the data
664                  * directly out of buf. */
665                 return cli_send_smb_direct_writeX(cli, buf, size);
666         } else {
667                 return cli_send_smb(cli);
668         }
669 }
670
671 /****************************************************************************
672   write to a file
673   write_mode: 0x0001 disallow write cacheing
674               0x0002 return bytes remaining
675               0x0004 use raw named pipe protocol
676               0x0008 start of message mode named pipe protocol
677 ****************************************************************************/
678
679 ssize_t cli_write(struct cli_state *cli,
680                  int fnum, uint16 write_mode,
681                  const char *buf, off_t offset, size_t size)
682 {
683         ssize_t bwritten = 0;
684         unsigned int issued = 0;
685         unsigned int received = 0;
686         int mpx = 1;
687         size_t writesize;
688         int blocks;
689
690         if(cli->max_mux > 1) {
691                 mpx = cli->max_mux-1;
692         } else {
693                 mpx = 1;
694         }
695
696         /* Default (small) writesize. */
697         writesize = (cli->max_xmit - (smb_size+32)) & ~1023;
698
699         if (write_mode == 0 &&
700                         !client_is_signing_on(cli) &&
701                         !cli_encryption_on(cli) &&
702                         (cli->posix_capabilities & CIFS_UNIX_LARGE_WRITE_CAP) &&
703                         (cli->capabilities & CAP_LARGE_FILES)) {
704                 /* Only do massive writes if we can do them direct
705                  * with no signing or encrypting - not on a pipe. */
706                 writesize = CLI_SAMBA_MAX_POSIX_LARGE_WRITEX_SIZE;
707         } else if ((cli->capabilities & CAP_LARGE_WRITEX) &&
708                         (strcmp(cli->dev, "LPT1:") != 0)) {
709
710                 /* Printer devices are restricted to max_xmit
711                  * writesize in Vista and XPSP3. */
712
713                 if (cli->is_samba) {
714                         writesize = CLI_SAMBA_MAX_LARGE_WRITEX_SIZE;
715                 } else if (!client_is_signing_on(cli)) {
716                         /* Windows restricts signed writes to max_xmit.
717                          * Found by Volker. */
718                         writesize = CLI_WINDOWS_MAX_LARGE_WRITEX_SIZE;
719                 }
720         }
721
722         blocks = (size + (writesize-1)) / writesize;
723
724         while (received < blocks) {
725
726                 while ((issued - received < mpx) && (issued < blocks)) {
727                         ssize_t bsent = issued * writesize;
728                         ssize_t size1 = MIN(writesize, size - bsent);
729
730                         if (!cli_issue_write(cli, fnum, offset + bsent,
731                                         write_mode,
732                                         buf + bsent,
733                                         size1, issued))
734                                 return -1;
735                         issued++;
736                 }
737
738                 if (!cli_receive_smb(cli)) {
739                         return bwritten;
740                 }
741
742                 received++;
743
744                 if (cli_is_error(cli))
745                         break;
746
747                 bwritten += SVAL(cli->inbuf, smb_vwv2);
748                 if (writesize > 0xFFFF) {
749                         bwritten += (((int)(SVAL(cli->inbuf, smb_vwv4)))<<16);
750                 }
751         }
752
753         while (received < issued && cli_receive_smb(cli)) {
754                 received++;
755         }
756
757         return bwritten;
758 }
759
760 /****************************************************************************
761   write to a file using a SMBwrite and not bypassing 0 byte writes
762 ****************************************************************************/
763
764 ssize_t cli_smbwrite(struct cli_state *cli,
765                      int fnum, char *buf, off_t offset, size_t size1)
766 {
767         char *p;
768         ssize_t total = 0;
769
770         do {
771                 size_t size = MIN(size1, cli->max_xmit - 48);
772
773                 memset(cli->outbuf,'\0',smb_size);
774                 memset(cli->inbuf,'\0',smb_size);
775
776                 cli_set_message(cli->outbuf,5, 0,True);
777
778                 SCVAL(cli->outbuf,smb_com,SMBwrite);
779                 SSVAL(cli->outbuf,smb_tid,cli->cnum);
780                 cli_setup_packet(cli);
781
782                 SSVAL(cli->outbuf,smb_vwv0,fnum);
783                 SSVAL(cli->outbuf,smb_vwv1,size);
784                 SIVAL(cli->outbuf,smb_vwv2,offset);
785                 SSVAL(cli->outbuf,smb_vwv4,0);
786
787                 p = smb_buf(cli->outbuf);
788                 *p++ = 1;
789                 SSVAL(p, 0, size); p += 2;
790                 memcpy(p, buf + total, size); p += size;
791
792                 cli_setup_bcc(cli, p);
793
794                 if (!cli_send_smb(cli))
795                         return -1;
796
797                 if (!cli_receive_smb(cli))
798                         return -1;
799
800                 if (cli_is_error(cli))
801                         return -1;
802
803                 size = SVAL(cli->inbuf,smb_vwv0);
804                 if (size == 0)
805                         break;
806
807                 size1 -= size;
808                 total += size;
809                 offset += size;
810
811         } while (size1);
812
813         return total;
814 }