2 Unix SMB/CIFS implementation.
3 client file read/write routines
4 Copyright (C) Andrew Tridgell 1994-1998
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program. If not, see <http://www.gnu.org/licenses/>.
22 /****************************************************************************
23 Calculate the recommended read buffer size
24 ****************************************************************************/
25 static size_t cli_read_max_bufsize(struct cli_state *cli)
27 if (!client_is_signing_on(cli) && !cli_encryption_on(cli) == false
28 && (cli->posix_capabilities & CIFS_UNIX_LARGE_READ_CAP)) {
29 return CLI_SAMBA_MAX_POSIX_LARGE_READX_SIZE;
31 if (cli->capabilities & CAP_LARGE_READX) {
33 ? CLI_SAMBA_MAX_LARGE_READX_SIZE
34 : CLI_WINDOWS_MAX_LARGE_READX_SIZE;
36 return (cli->max_xmit - (smb_size+32)) & ~1023;
40 * Send a read&x request
43 struct async_req *cli_read_andx_send(TALLOC_CTX *mem_ctx,
44 struct cli_state *cli, int fnum,
45 off_t offset, size_t size)
47 struct async_req *result;
48 struct cli_request *req;
49 bool bigoffset = False;
52 if (size > cli_read_max_bufsize(cli)) {
53 DEBUG(0, ("cli_read_andx_send got size=%d, can only handle "
54 "size=%d\n", (int)size,
55 (int)cli_read_max_bufsize(cli)));
59 result = cli_request_new(mem_ctx, cli->event_ctx, cli, 12, 0, &req);
61 DEBUG(0, ("cli_request_new failed\n"));
65 req = cli_request_get(result);
67 req->data.read.ofs = offset;
68 req->data.read.size = size;
69 req->data.read.received = 0;
70 req->data.read.rcvbuf = NULL;
72 if ((SMB_BIG_UINT)offset >> 32)
75 cli_set_message(req->outbuf, bigoffset ? 12 : 10, 0, False);
77 SCVAL(req->outbuf,smb_com,SMBreadX);
78 SSVAL(req->outbuf,smb_tid,cli->cnum);
79 cli_setup_packet_buf(cli, req->outbuf);
81 SCVAL(req->outbuf,smb_vwv0,0xFF);
82 SCVAL(req->outbuf,smb_vwv0+1,0);
83 SSVAL(req->outbuf,smb_vwv1,0);
84 SSVAL(req->outbuf,smb_vwv2,fnum);
85 SIVAL(req->outbuf,smb_vwv3,offset);
86 SSVAL(req->outbuf,smb_vwv5,size);
87 SSVAL(req->outbuf,smb_vwv6,size);
88 SSVAL(req->outbuf,smb_vwv7,(size >> 16));
89 SSVAL(req->outbuf,smb_vwv8,0);
90 SSVAL(req->outbuf,smb_vwv9,0);
91 SSVAL(req->outbuf,smb_mid,req->mid);
94 SIVAL(req->outbuf, smb_vwv10,
95 (((SMB_BIG_UINT)offset)>>32) & 0xffffffff);
98 cli_calculate_sign_mac(cli, req->outbuf);
100 event_fd_set_writeable(cli->fd_event);
102 if (cli_encryption_on(cli)) {
104 status = cli_encrypt_message(cli, req->outbuf, &enc_buf);
105 if (!NT_STATUS_IS_OK(status)) {
106 DEBUG(0, ("Error in encrypting client message. "
107 "Error %s\n", nt_errstr(status)));
111 req->outbuf = enc_buf;
112 req->enc_state = cli->trans_enc_state;
119 * Pull the data out of a finished async read_and_x request. rcvbuf is
120 * talloced from the request, so better make sure that you copy it away before
121 * you talloc_free(req). "rcvbuf" is NOT a talloc_ctx of its own, so do not
125 NTSTATUS cli_read_andx_recv(struct async_req *req, ssize_t *received,
128 struct cli_request *cli_req = cli_request_get(req);
132 SMB_ASSERT(req->state >= ASYNC_REQ_DONE);
133 if (req->state == ASYNC_REQ_ERROR) {
137 status = cli_pull_error(cli_req->inbuf);
139 if (!NT_STATUS_IS_OK(status)) {
143 /* size is the number of bytes the server returned.
145 size = SVAL(cli_req->inbuf, smb_vwv5);
146 size |= (((unsigned int)(SVAL(cli_req->inbuf, smb_vwv7))) << 16);
148 if (size > cli_req->data.read.size) {
149 DEBUG(5,("server returned more than we wanted!\n"));
150 return NT_STATUS_UNEXPECTED_IO_ERROR;
154 DEBUG(5,("read return < 0!\n"));
155 return NT_STATUS_UNEXPECTED_IO_ERROR;
158 *rcvbuf = (uint8_t *)
159 (smb_base(cli_req->inbuf) + SVAL(cli_req->inbuf, smb_vwv6));
165 * Parallel read support.
167 * cli_pull sends as many read&x requests as the server would allow via
168 * max_mux at a time. When replies flow back in, the data is written into
169 * the callback function "sink" in the right order.
172 struct cli_pull_state {
173 struct async_req *req;
175 struct cli_state *cli;
180 NTSTATUS (*sink)(char *buf, size_t n, void *priv);
186 * Outstanding requests
189 struct async_req **reqs;
192 * For how many bytes did we send requests already?
197 * Next request index to push into "sink". This walks around the "req"
198 * array, taking care that the requests are pushed to "sink" in the
199 * right order. If necessary (i.e. replies don't come in in the right
200 * order), replies are held back in "reqs".
205 * How many bytes did we push into "sink"?
211 static char *cli_pull_print(TALLOC_CTX *mem_ctx, struct async_req *req)
213 struct cli_pull_state *state = talloc_get_type_abort(
214 req->private_data, struct cli_pull_state);
217 result = async_req_print(mem_ctx, req);
218 if (result == NULL) {
222 return talloc_asprintf_append_buffer(
223 result, "num_reqs=%d, top_req=%d",
224 state->num_reqs, state->top_req);
227 static void cli_pull_read_done(struct async_req *read_req);
230 * Prepare an async pull request
233 struct async_req *cli_pull_send(TALLOC_CTX *mem_ctx, struct cli_state *cli,
234 uint16_t fnum, off_t start_offset,
235 size_t size, size_t window_size,
236 NTSTATUS (*sink)(char *buf, size_t n,
240 struct async_req *result;
241 struct cli_pull_state *state;
244 result = async_req_new(mem_ctx, cli->event_ctx);
245 if (result == NULL) {
248 state = talloc(result, struct cli_pull_state);
252 result->private_data = state;
253 result->print = cli_pull_print;
258 state->start_offset = start_offset;
265 state->chunk_size = cli_read_max_bufsize(cli);
267 state->num_reqs = MAX(window_size/state->chunk_size, 1);
268 state->num_reqs = MIN(state->num_reqs, cli->max_mux);
270 state->reqs = TALLOC_ZERO_ARRAY(state, struct async_req *,
272 if (state->reqs == NULL) {
276 state->requested = 0;
278 for (i=0; i<state->num_reqs; i++) {
279 size_t size_left, request_thistime;
281 if (state->requested >= size) {
286 size_left = size - state->requested;
287 request_thistime = MIN(size_left, state->chunk_size);
289 state->reqs[i] = cli_read_andx_send(
290 state->reqs, cli, fnum,
291 state->start_offset + state->requested,
294 if (state->reqs[i] == NULL) {
298 state->reqs[i]->async.fn = cli_pull_read_done;
299 state->reqs[i]->async.priv = result;
301 state->requested += request_thistime;
311 * Handle incoming read replies, push the data into sink and send out new
312 * requests if necessary.
315 static void cli_pull_read_done(struct async_req *read_req)
317 struct async_req *pull_req = talloc_get_type_abort(
318 read_req->async.priv, struct async_req);
319 struct cli_pull_state *state = talloc_get_type_abort(
320 pull_req->private_data, struct cli_pull_state);
321 struct cli_request *read_state = cli_request_get(read_req);
324 status = cli_read_andx_recv(read_req, &read_state->data.read.received,
325 &read_state->data.read.rcvbuf);
326 if (!NT_STATUS_IS_OK(status)) {
327 async_req_error(state->req, status);
332 * This loop is the one to take care of out-of-order replies. All
333 * pending requests are in state->reqs, state->reqs[top_req] is the
334 * one that is to be pushed next. If however a request later than
335 * top_req is replied to, then we can't push yet. If top_req is
336 * replied to at a later point then, we need to push all the finished
340 while (state->reqs[state->top_req] != NULL) {
341 struct cli_request *top_read;
343 DEBUG(11, ("cli_pull_read_done: top_req = %d\n",
346 if (state->reqs[state->top_req]->state < ASYNC_REQ_DONE) {
347 DEBUG(11, ("cli_pull_read_done: top request not yet "
352 top_read = cli_request_get(state->reqs[state->top_req]);
354 DEBUG(10, ("cli_pull_read_done: Pushing %d bytes, %d already "
355 "pushed\n", (int)top_read->data.read.received,
356 (int)state->pushed));
358 status = state->sink((char *)top_read->data.read.rcvbuf,
359 top_read->data.read.received,
361 if (!NT_STATUS_IS_OK(status)) {
362 async_req_error(state->req, status);
365 state->pushed += top_read->data.read.received;
367 TALLOC_FREE(state->reqs[state->top_req]);
369 if (state->requested < state->size) {
370 struct async_req *new_req;
371 size_t size_left, request_thistime;
373 size_left = state->size - state->requested;
374 request_thistime = MIN(size_left, state->chunk_size);
376 DEBUG(10, ("cli_pull_read_done: Requesting %d bytes "
377 "at %d, position %d\n",
378 (int)request_thistime,
379 (int)(state->start_offset
383 new_req = cli_read_andx_send(
384 state->reqs, state->cli, state->fnum,
385 state->start_offset + state->requested,
388 if (async_req_nomem(new_req, state->req)) {
392 new_req->async.fn = cli_pull_read_done;
393 new_req->async.priv = pull_req;
395 state->reqs[state->top_req] = new_req;
396 state->requested += request_thistime;
399 state->top_req = (state->top_req+1) % state->num_reqs;
402 async_req_done(pull_req);
405 NTSTATUS cli_pull_recv(struct async_req *req, ssize_t *received)
407 struct cli_pull_state *state = talloc_get_type_abort(
408 req->private_data, struct cli_pull_state);
410 SMB_ASSERT(req->state >= ASYNC_REQ_DONE);
411 if (req->state == ASYNC_REQ_ERROR) {
414 *received = state->pushed;
418 NTSTATUS cli_pull(struct cli_state *cli, uint16_t fnum,
419 off_t start_offset, size_t size, size_t window_size,
420 NTSTATUS (*sink)(char *buf, size_t n, void *priv),
421 void *priv, ssize_t *received)
423 TALLOC_CTX *frame = talloc_stackframe();
424 struct async_req *req;
425 NTSTATUS result = NT_STATUS_NO_MEMORY;
427 if (cli_tmp_event_ctx(frame, cli) == NULL) {
431 req = cli_pull_send(frame, cli, fnum, start_offset, size, window_size,
437 while (req->state < ASYNC_REQ_DONE) {
438 event_loop_once(cli->event_ctx);
441 result = cli_pull_recv(req, received);
447 /****************************************************************************
448 Issue a single SMBread and don't wait for a reply.
449 ****************************************************************************/
451 static bool cli_issue_read(struct cli_state *cli, int fnum, off_t offset,
454 bool bigoffset = False;
456 memset(cli->outbuf,'\0',smb_size);
457 memset(cli->inbuf,'\0',smb_size);
459 if ((SMB_BIG_UINT)offset >> 32)
462 cli_set_message(cli->outbuf,bigoffset ? 12 : 10,0,True);
464 SCVAL(cli->outbuf,smb_com,SMBreadX);
465 SSVAL(cli->outbuf,smb_tid,cli->cnum);
466 cli_setup_packet(cli);
468 SCVAL(cli->outbuf,smb_vwv0,0xFF);
469 SSVAL(cli->outbuf,smb_vwv2,fnum);
470 SIVAL(cli->outbuf,smb_vwv3,offset);
471 SSVAL(cli->outbuf,smb_vwv5,size);
472 SSVAL(cli->outbuf,smb_vwv6,size);
473 SSVAL(cli->outbuf,smb_vwv7,(size >> 16));
474 SSVAL(cli->outbuf,smb_mid,cli->mid + i);
477 SIVAL(cli->outbuf,smb_vwv10,(((SMB_BIG_UINT)offset)>>32) & 0xffffffff);
480 return cli_send_smb(cli);
483 /****************************************************************************
484 Read size bytes at offset offset using SMBreadX.
485 ****************************************************************************/
487 ssize_t cli_read(struct cli_state *cli, int fnum, char *buf, off_t offset, size_t size)
493 /* We can only do direct reads if not signing or encrypting. */
494 bool direct_reads = !client_is_signing_on(cli) && !cli_encryption_on(cli);
500 * Set readsize to the maximum size we can handle in one readX,
501 * rounded down to a multiple of 1024.
504 if (client_is_signing_on(cli) == false &&
505 cli_encryption_on(cli) == false &&
506 (cli->posix_capabilities & CIFS_UNIX_LARGE_READ_CAP)) {
507 readsize = CLI_SAMBA_MAX_POSIX_LARGE_READX_SIZE;
508 } else if (cli->capabilities & CAP_LARGE_READX) {
510 readsize = CLI_SAMBA_MAX_LARGE_READX_SIZE;
512 readsize = CLI_WINDOWS_MAX_LARGE_READX_SIZE;
515 readsize = (cli->max_xmit - (smb_size+32)) & ~1023;
518 while (total < size) {
519 readsize = MIN(readsize, size-total);
521 /* Issue a read and receive a reply */
523 if (!cli_issue_read(cli, fnum, offset, readsize, 0))
527 if (!cli_receive_smb_readX_header(cli))
530 if (!cli_receive_smb(cli))
534 /* Check for error. Make sure to check for DOS and NT
537 if (cli_is_error(cli)) {
538 bool recoverable_error = False;
539 NTSTATUS status = NT_STATUS_OK;
543 if (cli_is_nt_error(cli))
544 status = cli_nt_error(cli);
546 cli_dos_error(cli, &eclass, &ecode);
549 * ERRDOS ERRmoredata or STATUS_MORE_ENRTIES is a
550 * recoverable error, plus we have valid data in the
551 * packet so don't error out here.
554 if ((eclass == ERRDOS && ecode == ERRmoredata) ||
555 NT_STATUS_V(status) == NT_STATUS_V(STATUS_MORE_ENTRIES))
556 recoverable_error = True;
558 if (!recoverable_error)
562 /* size2 is the number of bytes the server returned.
564 size2 = SVAL(cli->inbuf, smb_vwv5);
565 size2 |= (((unsigned int)(SVAL(cli->inbuf, smb_vwv7))) << 16);
567 if (size2 > readsize) {
568 DEBUG(5,("server returned more than we wanted!\n"));
570 } else if (size2 < 0) {
571 DEBUG(5,("read return < 0!\n"));
576 /* smb_vwv6 is the offset in the packet of the returned
577 * data bytes. Only valid if size2 != 0. */
580 /* Copy data into buffer */
581 p = smb_base(cli->inbuf) + SVAL(cli->inbuf,smb_vwv6);
582 memcpy(buf + total, p, size2);
584 /* Ensure the remaining data matches the return size. */
585 ssize_t toread = smb_len_large(cli->inbuf) - SVAL(cli->inbuf,smb_vwv6);
587 /* Ensure the size is correct. */
588 if (toread != size2) {
589 DEBUG(5,("direct read logic fail toread (%d) != size2 (%u)\n",
590 (int)toread, (unsigned int)size2 ));
594 /* Read data directly into buffer */
595 toread = cli_receive_smb_data(cli,buf+total,size2);
596 if (toread != size2) {
597 DEBUG(5,("direct read read failure toread (%d) != size2 (%u)\n",
598 (int)toread, (unsigned int)size2 ));
608 * If the server returned less than we asked for we're at EOF.
611 if (size2 < readsize)
618 #if 0 /* relies on client_receive_smb(), now a static in libsmb/clientgen.c */
620 /* This call is INCOMPATIBLE with SMB signing. If you remove the #if 0
621 you must fix ensure you don't attempt to sign the packets - data
622 *will* be currupted */
624 /****************************************************************************
625 Issue a single SMBreadraw and don't wait for a reply.
626 ****************************************************************************/
628 static bool cli_issue_readraw(struct cli_state *cli, int fnum, off_t offset,
632 if (!cli->sign_info.use_smb_signing) {
633 DEBUG(0, ("Cannot use readraw and SMB Signing\n"));
637 memset(cli->outbuf,'\0',smb_size);
638 memset(cli->inbuf,'\0',smb_size);
640 cli_set_message(cli->outbuf,10,0,True);
642 SCVAL(cli->outbuf,smb_com,SMBreadbraw);
643 SSVAL(cli->outbuf,smb_tid,cli->cnum);
644 cli_setup_packet(cli);
646 SSVAL(cli->outbuf,smb_vwv0,fnum);
647 SIVAL(cli->outbuf,smb_vwv1,offset);
648 SSVAL(cli->outbuf,smb_vwv2,size);
649 SSVAL(cli->outbuf,smb_vwv3,size);
650 SSVAL(cli->outbuf,smb_mid,cli->mid + i);
652 return cli_send_smb(cli);
655 /****************************************************************************
656 Tester for the readraw call.
657 ****************************************************************************/
659 ssize_t cli_readraw(struct cli_state *cli, int fnum, char *buf, off_t offset, size_t size)
670 * Set readsize to the maximum size we can handle in one readraw.
675 while (total < size) {
676 readsize = MIN(readsize, size-total);
678 /* Issue a read and receive a reply */
680 if (!cli_issue_readraw(cli, fnum, offset, readsize, 0))
683 if (!client_receive_smb(cli->fd, cli->inbuf, cli->timeout))
686 size2 = smb_len(cli->inbuf);
688 if (size2 > readsize) {
689 DEBUG(5,("server returned more than we wanted!\n"));
691 } else if (size2 < 0) {
692 DEBUG(5,("read return < 0!\n"));
696 /* Copy data into buffer */
700 memcpy(buf + total, p, size2);
707 * If the server returned less than we asked for we're at EOF.
710 if (size2 < readsize)
718 /****************************************************************************
719 Issue a single SMBwrite and don't wait for a reply.
720 ****************************************************************************/
722 static bool cli_issue_write(struct cli_state *cli,
731 bool large_writex = false;
732 /* We can only do direct writes if not signing and not encrypting. */
733 bool direct_writes = !client_is_signing_on(cli) && !cli_encryption_on(cli);
735 if (!direct_writes && size + 1 > cli->bufsize) {
736 cli->outbuf = (char *)SMB_REALLOC(cli->outbuf, size + 1024);
740 cli->inbuf = (char *)SMB_REALLOC(cli->inbuf, size + 1024);
741 if (cli->inbuf == NULL) {
742 SAFE_FREE(cli->outbuf);
745 cli->bufsize = size + 1024;
748 memset(cli->outbuf,'\0',smb_size);
749 memset(cli->inbuf,'\0',smb_size);
751 if (cli->capabilities & CAP_LARGE_FILES) {
756 cli_set_message(cli->outbuf,14,0,True);
758 cli_set_message(cli->outbuf,12,0,True);
761 SCVAL(cli->outbuf,smb_com,SMBwriteX);
762 SSVAL(cli->outbuf,smb_tid,cli->cnum);
763 cli_setup_packet(cli);
765 SCVAL(cli->outbuf,smb_vwv0,0xFF);
766 SSVAL(cli->outbuf,smb_vwv2,fnum);
768 SIVAL(cli->outbuf,smb_vwv3,offset);
769 SIVAL(cli->outbuf,smb_vwv5,0);
770 SSVAL(cli->outbuf,smb_vwv7,mode);
772 SSVAL(cli->outbuf,smb_vwv8,(mode & 0x0008) ? size : 0);
774 * According to CIFS-TR-1p00, this following field should only
775 * be set if CAP_LARGE_WRITEX is set. We should check this
776 * locally. However, this check might already have been
777 * done by our callers.
779 SSVAL(cli->outbuf,smb_vwv9,(size>>16));
780 SSVAL(cli->outbuf,smb_vwv10,size);
781 /* +1 is pad byte. */
782 SSVAL(cli->outbuf,smb_vwv11,
783 smb_buf(cli->outbuf) - smb_base(cli->outbuf) + 1);
786 SIVAL(cli->outbuf,smb_vwv12,(((SMB_BIG_UINT)offset)>>32) & 0xffffffff);
789 p = smb_base(cli->outbuf) + SVAL(cli->outbuf,smb_vwv11) -1;
790 *p++ = '\0'; /* pad byte. */
791 if (!direct_writes) {
792 memcpy(p, buf, size);
794 if (size > 0x1FFFF) {
795 /* This is a POSIX 14 word large write. */
796 set_message_bcc(cli->outbuf, 0); /* Set bcc to zero. */
797 _smb_setlen_large(cli->outbuf,smb_size + 28 + 1 /* pad */ + size - 4);
799 cli_setup_bcc(cli, p+size);
802 SSVAL(cli->outbuf,smb_mid,cli->mid + i);
804 show_msg(cli->outbuf);
806 /* For direct writes we now need to write the data
807 * directly out of buf. */
808 return cli_send_smb_direct_writeX(cli, buf, size);
810 return cli_send_smb(cli);
814 /****************************************************************************
816 write_mode: 0x0001 disallow write cacheing
817 0x0002 return bytes remaining
818 0x0004 use raw named pipe protocol
819 0x0008 start of message mode named pipe protocol
820 ****************************************************************************/
822 ssize_t cli_write(struct cli_state *cli,
823 int fnum, uint16 write_mode,
824 const char *buf, off_t offset, size_t size)
826 ssize_t bwritten = 0;
827 unsigned int issued = 0;
828 unsigned int received = 0;
833 if(cli->max_mux > 1) {
834 mpx = cli->max_mux-1;
839 /* Default (small) writesize. */
840 writesize = (cli->max_xmit - (smb_size+32)) & ~1023;
842 if (write_mode == 0 &&
843 !client_is_signing_on(cli) &&
844 !cli_encryption_on(cli) &&
845 (cli->posix_capabilities & CIFS_UNIX_LARGE_WRITE_CAP) &&
846 (cli->capabilities & CAP_LARGE_FILES)) {
847 /* Only do massive writes if we can do them direct
848 * with no signing or encrypting - not on a pipe. */
849 writesize = CLI_SAMBA_MAX_POSIX_LARGE_WRITEX_SIZE;
850 } else if (cli->capabilities & CAP_LARGE_WRITEX) {
852 writesize = CLI_SAMBA_MAX_LARGE_WRITEX_SIZE;
853 } else if (!client_is_signing_on(cli)) {
854 /* Windows restricts signed writes to max_xmit.
855 * Found by Volker. */
856 writesize = CLI_WINDOWS_MAX_LARGE_WRITEX_SIZE;
860 blocks = (size + (writesize-1)) / writesize;
862 while (received < blocks) {
864 while ((issued - received < mpx) && (issued < blocks)) {
865 ssize_t bsent = issued * writesize;
866 ssize_t size1 = MIN(writesize, size - bsent);
868 if (!cli_issue_write(cli, fnum, offset + bsent,
876 if (!cli_receive_smb(cli)) {
882 if (cli_is_error(cli))
885 bwritten += SVAL(cli->inbuf, smb_vwv2);
886 bwritten += (((int)(SVAL(cli->inbuf, smb_vwv4)))<<16);
889 while (received < issued && cli_receive_smb(cli)) {
896 /****************************************************************************
897 write to a file using a SMBwrite and not bypassing 0 byte writes
898 ****************************************************************************/
900 ssize_t cli_smbwrite(struct cli_state *cli,
901 int fnum, char *buf, off_t offset, size_t size1)
907 size_t size = MIN(size1, cli->max_xmit - 48);
909 memset(cli->outbuf,'\0',smb_size);
910 memset(cli->inbuf,'\0',smb_size);
912 cli_set_message(cli->outbuf,5, 0,True);
914 SCVAL(cli->outbuf,smb_com,SMBwrite);
915 SSVAL(cli->outbuf,smb_tid,cli->cnum);
916 cli_setup_packet(cli);
918 SSVAL(cli->outbuf,smb_vwv0,fnum);
919 SSVAL(cli->outbuf,smb_vwv1,size);
920 SIVAL(cli->outbuf,smb_vwv2,offset);
921 SSVAL(cli->outbuf,smb_vwv4,0);
923 p = smb_buf(cli->outbuf);
925 SSVAL(p, 0, size); p += 2;
926 memcpy(p, buf + total, size); p += size;
928 cli_setup_bcc(cli, p);
930 if (!cli_send_smb(cli))
933 if (!cli_receive_smb(cli))
936 if (cli_is_error(cli))
939 size = SVAL(cli->inbuf,smb_vwv0);