3d0e3ec9576d580408378ed868efcfb55166287f
[abartlet/samba.git/.git] / source3 / libsmb / clifile.c
1 /* 
2    Unix SMB/CIFS implementation.
3    client file operations
4    Copyright (C) Andrew Tridgell 1994-1998
5    Copyright (C) Jeremy Allison 2001-2002
6    
7    This program is free software; you can redistribute it and/or modify
8    it under the terms of the GNU General Public License as published by
9    the Free Software Foundation; either version 3 of the License, or
10    (at your option) any later version.
11    
12    This program is distributed in the hope that it will be useful,
13    but WITHOUT ANY WARRANTY; without even the implied warranty of
14    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
15    GNU General Public License for more details.
16    
17    You should have received a copy of the GNU General Public License
18    along with this program.  If not, see <http://www.gnu.org/licenses/>.
19 */
20
21 #include "includes.h"
22
23 /****************************************************************************
24  Hard/Symlink a file (UNIX extensions).
25  Creates new name (sym)linked to oldname.
26 ****************************************************************************/
27
28 static bool cli_link_internal(struct cli_state *cli, const char *oldname, const char *newname, bool hard_link)
29 {
30         unsigned int data_len = 0;
31         unsigned int param_len = 0;
32         uint16 setup = TRANSACT2_SETPATHINFO;
33         char *param;
34         char *data;
35         char *rparam=NULL, *rdata=NULL;
36         char *p;
37         size_t oldlen = 2*(strlen(oldname)+1);
38         size_t newlen = 2*(strlen(newname)+1);
39
40         param = SMB_MALLOC_ARRAY(char, 6+newlen+2);
41
42         if (!param) {
43                 return false;
44         }
45
46         data = SMB_MALLOC_ARRAY(char, oldlen+2);
47
48         if (!data) {
49                 SAFE_FREE(param);
50                 return false;
51         }
52
53         SSVAL(param,0,hard_link ? SMB_SET_FILE_UNIX_HLINK : SMB_SET_FILE_UNIX_LINK);
54         SIVAL(param,2,0);
55         p = &param[6];
56
57         p += clistr_push(cli, p, newname, newlen, STR_TERMINATE);
58         param_len = PTR_DIFF(p, param);
59
60         p = data;
61         p += clistr_push(cli, p, oldname, oldlen, STR_TERMINATE);
62         data_len = PTR_DIFF(p, data);
63
64         if (!cli_send_trans(cli, SMBtrans2,
65                         NULL,                        /* name */
66                         -1, 0,                          /* fid, flags */
67                         &setup, 1, 0,                   /* setup, length, max */
68                         param, param_len, 2,            /* param, length, max */
69                         data,  data_len, cli->max_xmit /* data, length, max */
70                         )) {
71                 SAFE_FREE(data);
72                 SAFE_FREE(param);
73                 return false;
74         }
75
76         SAFE_FREE(data);
77         SAFE_FREE(param);
78
79         if (!cli_receive_trans(cli, SMBtrans2,
80                         &rparam, &param_len,
81                         &rdata, &data_len)) {
82                         return false;
83         }
84
85         SAFE_FREE(data);
86         SAFE_FREE(param);
87         SAFE_FREE(rdata);
88         SAFE_FREE(rparam);
89
90         return true;
91 }
92
93 /****************************************************************************
94  Map standard UNIX permissions onto wire representations.
95 ****************************************************************************/
96
97 uint32 unix_perms_to_wire(mode_t perms)
98 {
99         unsigned int ret = 0;
100
101         ret |= ((perms & S_IXOTH) ?  UNIX_X_OTH : 0);
102         ret |= ((perms & S_IWOTH) ?  UNIX_W_OTH : 0);
103         ret |= ((perms & S_IROTH) ?  UNIX_R_OTH : 0);
104         ret |= ((perms & S_IXGRP) ?  UNIX_X_GRP : 0);
105         ret |= ((perms & S_IWGRP) ?  UNIX_W_GRP : 0);
106         ret |= ((perms & S_IRGRP) ?  UNIX_R_GRP : 0);
107         ret |= ((perms & S_IXUSR) ?  UNIX_X_USR : 0);
108         ret |= ((perms & S_IWUSR) ?  UNIX_W_USR : 0);
109         ret |= ((perms & S_IRUSR) ?  UNIX_R_USR : 0);
110 #ifdef S_ISVTX
111         ret |= ((perms & S_ISVTX) ?  UNIX_STICKY : 0);
112 #endif
113 #ifdef S_ISGID
114         ret |= ((perms & S_ISGID) ?  UNIX_SET_GID : 0);
115 #endif
116 #ifdef S_ISUID
117         ret |= ((perms & S_ISUID) ?  UNIX_SET_UID : 0);
118 #endif
119         return ret;
120 }
121
122 /****************************************************************************
123  Map wire permissions to standard UNIX.
124 ****************************************************************************/
125
126 mode_t wire_perms_to_unix(uint32 perms)
127 {
128         mode_t ret = (mode_t)0;
129
130         ret |= ((perms & UNIX_X_OTH) ? S_IXOTH : 0);
131         ret |= ((perms & UNIX_W_OTH) ? S_IWOTH : 0);
132         ret |= ((perms & UNIX_R_OTH) ? S_IROTH : 0);
133         ret |= ((perms & UNIX_X_GRP) ? S_IXGRP : 0);
134         ret |= ((perms & UNIX_W_GRP) ? S_IWGRP : 0);
135         ret |= ((perms & UNIX_R_GRP) ? S_IRGRP : 0);
136         ret |= ((perms & UNIX_X_USR) ? S_IXUSR : 0);
137         ret |= ((perms & UNIX_W_USR) ? S_IWUSR : 0);
138         ret |= ((perms & UNIX_R_USR) ? S_IRUSR : 0);
139 #ifdef S_ISVTX
140         ret |= ((perms & UNIX_STICKY) ? S_ISVTX : 0);
141 #endif
142 #ifdef S_ISGID
143         ret |= ((perms & UNIX_SET_GID) ? S_ISGID : 0);
144 #endif
145 #ifdef S_ISUID
146         ret |= ((perms & UNIX_SET_UID) ? S_ISUID : 0);
147 #endif
148         return ret;
149 }
150
151 /****************************************************************************
152  Return the file type from the wire filetype for UNIX extensions.
153 ****************************************************************************/
154
155 static mode_t unix_filetype_from_wire(uint32 wire_type)
156 {
157         switch (wire_type) {
158                 case UNIX_TYPE_FILE:
159                         return S_IFREG;
160                 case UNIX_TYPE_DIR:
161                         return S_IFDIR;
162 #ifdef S_IFLNK
163                 case UNIX_TYPE_SYMLINK:
164                         return S_IFLNK;
165 #endif
166 #ifdef S_IFCHR
167                 case UNIX_TYPE_CHARDEV:
168                         return S_IFCHR;
169 #endif
170 #ifdef S_IFBLK
171                 case UNIX_TYPE_BLKDEV:
172                         return S_IFBLK;
173 #endif
174 #ifdef S_IFIFO
175                 case UNIX_TYPE_FIFO:
176                         return S_IFIFO;
177 #endif
178 #ifdef S_IFSOCK
179                 case UNIX_TYPE_SOCKET:
180                         return S_IFSOCK;
181 #endif
182                 default:
183                         return (mode_t)0;
184         }
185 }
186
187 /****************************************************************************
188  Do a POSIX getfacl (UNIX extensions).
189 ****************************************************************************/
190
191 bool cli_unix_getfacl(struct cli_state *cli, const char *name, size_t *prb_size, char **retbuf)
192 {
193         unsigned int param_len = 0;
194         unsigned int data_len = 0;
195         uint16 setup = TRANSACT2_QPATHINFO;
196         char *param;
197         size_t nlen = 2*(strlen(name)+1);
198         char *rparam=NULL, *rdata=NULL;
199         char *p;
200
201         param = SMB_MALLOC_ARRAY(char, 6+nlen+2);
202         if (!param) {
203                 return false;
204         }
205
206         p = param;
207         memset(p, '\0', 6);
208         SSVAL(p, 0, SMB_QUERY_POSIX_ACL);
209         p += 6;
210         p += clistr_push(cli, p, name, nlen, STR_TERMINATE);
211         param_len = PTR_DIFF(p, param);
212
213         if (!cli_send_trans(cli, SMBtrans2,
214                 NULL,                        /* name */
215                 -1, 0,                       /* fid, flags */
216                 &setup, 1, 0,                /* setup, length, max */
217                 param, param_len, 2,         /* param, length, max */
218                 NULL,  0, cli->max_xmit      /* data, length, max */
219                 )) {
220                 SAFE_FREE(param);
221                 return false;
222         }
223
224         SAFE_FREE(param);
225
226         if (!cli_receive_trans(cli, SMBtrans2,
227                         &rparam, &param_len,
228                         &rdata, &data_len)) {
229                 return false;
230         }
231
232         if (data_len < 6) {
233                 SAFE_FREE(rdata);
234                 SAFE_FREE(rparam);
235                 return false;
236         }
237
238         SAFE_FREE(rparam);
239         *retbuf = rdata;
240         *prb_size = (size_t)data_len;
241
242         return true;
243 }
244
245 /****************************************************************************
246  Stat a file (UNIX extensions).
247 ****************************************************************************/
248
249 bool cli_unix_stat(struct cli_state *cli, const char *name, SMB_STRUCT_STAT *sbuf)
250 {
251         unsigned int param_len = 0;
252         unsigned int data_len = 0;
253         uint16 setup = TRANSACT2_QPATHINFO;
254         char *param;
255         size_t nlen = 2*(strlen(name)+1);
256         char *rparam=NULL, *rdata=NULL;
257         char *p;
258
259         ZERO_STRUCTP(sbuf);
260
261         param = SMB_MALLOC_ARRAY(char, 6+nlen+2);
262         if (!param) {
263                 return false;
264         }
265         p = param;
266         memset(p, '\0', 6);
267         SSVAL(p, 0, SMB_QUERY_FILE_UNIX_BASIC);
268         p += 6;
269         p += clistr_push(cli, p, name, nlen, STR_TERMINATE);
270         param_len = PTR_DIFF(p, param);
271
272         if (!cli_send_trans(cli, SMBtrans2,
273                         NULL,                        /* name */
274                         -1, 0,                       /* fid, flags */
275                         &setup, 1, 0,                /* setup, length, max */
276                         param, param_len, 2,         /* param, length, max */
277                         NULL,  0, cli->max_xmit      /* data, length, max */
278                         )) {
279                 SAFE_FREE(param);
280                 return false;
281         }
282
283         SAFE_FREE(param);
284
285         if (!cli_receive_trans(cli, SMBtrans2,
286                         &rparam, &param_len,
287                         &rdata, &data_len)) {
288                 return false;
289         }
290
291         if (data_len < 96) {
292                 SAFE_FREE(rdata);
293                 SAFE_FREE(rparam);
294                 return false;
295         }
296
297         sbuf->st_size = IVAL2_TO_SMB_BIG_UINT(rdata,0);     /* total size, in bytes */
298         sbuf->st_blocks = IVAL2_TO_SMB_BIG_UINT(rdata,8);   /* number of blocks allocated */
299 #if defined (HAVE_STAT_ST_BLOCKS) && defined(STAT_ST_BLOCKSIZE)
300         sbuf->st_blocks /= STAT_ST_BLOCKSIZE;
301 #else
302         /* assume 512 byte blocks */
303         sbuf->st_blocks /= 512;
304 #endif
305         set_ctimespec(sbuf, interpret_long_date(rdata + 16));    /* time of last change */
306         set_atimespec(sbuf, interpret_long_date(rdata + 24));    /* time of last access */
307         set_mtimespec(sbuf, interpret_long_date(rdata + 32));    /* time of last modification */
308
309         sbuf->st_uid = (uid_t) IVAL(rdata,40);      /* user ID of owner */
310         sbuf->st_gid = (gid_t) IVAL(rdata,48);      /* group ID of owner */
311         sbuf->st_mode |= unix_filetype_from_wire(IVAL(rdata, 56));
312 #if defined(HAVE_MAKEDEV)
313         {
314                 uint32 dev_major = IVAL(rdata,60);
315                 uint32 dev_minor = IVAL(rdata,68);
316                 sbuf->st_rdev = makedev(dev_major, dev_minor);
317         }
318 #endif
319         sbuf->st_ino = (SMB_INO_T)IVAL2_TO_SMB_BIG_UINT(rdata,76);      /* inode */
320         sbuf->st_mode |= wire_perms_to_unix(IVAL(rdata,84));     /* protection */
321         sbuf->st_nlink = IVAL(rdata,92);    /* number of hard links */
322
323         SAFE_FREE(rdata);
324         SAFE_FREE(rparam);
325
326         return true;
327 }
328
329 /****************************************************************************
330  Symlink a file (UNIX extensions).
331 ****************************************************************************/
332
333 bool cli_unix_symlink(struct cli_state *cli, const char *oldname, const char *newname)
334 {
335         return cli_link_internal(cli, oldname, newname, False);
336 }
337
338 /****************************************************************************
339  Hard a file (UNIX extensions).
340 ****************************************************************************/
341
342 bool cli_unix_hardlink(struct cli_state *cli, const char *oldname, const char *newname)
343 {
344         return cli_link_internal(cli, oldname, newname, True);
345 }
346
347 /****************************************************************************
348  Chmod or chown a file internal (UNIX extensions).
349 ****************************************************************************/
350
351 static bool cli_unix_chmod_chown_internal(struct cli_state *cli, const char *fname, uint32 mode, uint32 uid, uint32 gid)
352 {
353         unsigned int data_len = 0;
354         unsigned int param_len = 0;
355         uint16 setup = TRANSACT2_SETPATHINFO;
356         size_t nlen = 2*(strlen(fname)+1);
357         char *param;
358         char data[100];
359         char *rparam=NULL, *rdata=NULL;
360         char *p;
361
362         param = SMB_MALLOC_ARRAY(char, 6+nlen+2);
363         if (!param) {
364                 return false;
365         }
366         memset(param, '\0', 6);
367         memset(data, 0, sizeof(data));
368
369         SSVAL(param,0,SMB_SET_FILE_UNIX_BASIC);
370         p = &param[6];
371
372         p += clistr_push(cli, p, fname, nlen, STR_TERMINATE);
373         param_len = PTR_DIFF(p, param);
374
375         memset(data, 0xff, 40); /* Set all sizes/times to no change. */
376
377         SIVAL(data,40,uid);
378         SIVAL(data,48,gid);
379         SIVAL(data,84,mode);
380
381         data_len = 100;
382
383         if (!cli_send_trans(cli, SMBtrans2,
384                         NULL,                        /* name */
385                         -1, 0,                          /* fid, flags */
386                         &setup, 1, 0,                   /* setup, length, max */
387                         param, param_len, 2,            /* param, length, max */
388                         (char *)&data,  data_len, cli->max_xmit /* data, length, max */
389                         )) {
390                 SAFE_FREE(param);
391                 return False;
392         }
393
394         SAFE_FREE(param);
395
396         if (!cli_receive_trans(cli, SMBtrans2,
397                         &rparam, &param_len,
398                         &rdata, &data_len)) {
399                 return false;
400         }
401
402         SAFE_FREE(rdata);
403         SAFE_FREE(rparam);
404
405         return true;
406 }
407
408 /****************************************************************************
409  chmod a file (UNIX extensions).
410 ****************************************************************************/
411
412 bool cli_unix_chmod(struct cli_state *cli, const char *fname, mode_t mode)
413 {
414         return cli_unix_chmod_chown_internal(cli, fname,
415                 unix_perms_to_wire(mode), SMB_UID_NO_CHANGE, SMB_GID_NO_CHANGE);
416 }
417
418 /****************************************************************************
419  chown a file (UNIX extensions).
420 ****************************************************************************/
421
422 bool cli_unix_chown(struct cli_state *cli, const char *fname, uid_t uid, gid_t gid)
423 {
424         return cli_unix_chmod_chown_internal(cli, fname,
425                         SMB_MODE_NO_CHANGE, (uint32)uid, (uint32)gid);
426 }
427
428 /****************************************************************************
429  Rename a file.
430 ****************************************************************************/
431
432 bool cli_rename(struct cli_state *cli, const char *fname_src, const char *fname_dst)
433 {
434         char *p;
435
436         memset(cli->outbuf,'\0',smb_size);
437         memset(cli->inbuf,'\0',smb_size);
438
439         cli_set_message(cli->outbuf,1, 0, true);
440
441         SCVAL(cli->outbuf,smb_com,SMBmv);
442         SSVAL(cli->outbuf,smb_tid,cli->cnum);
443         cli_setup_packet(cli);
444
445         SSVAL(cli->outbuf,smb_vwv0,aSYSTEM | aHIDDEN | aDIR);
446
447         p = smb_buf(cli->outbuf);
448         *p++ = 4;
449         p += clistr_push(cli, p, fname_src,
450                         cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
451         *p++ = 4;
452         p += clistr_push(cli, p, fname_dst,
453                         cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
454
455         cli_setup_bcc(cli, p);
456
457         cli_send_smb(cli);
458         if (!cli_receive_smb(cli)) {
459                 return false;
460         }
461
462         if (cli_is_error(cli)) {
463                 return false;
464         }
465
466         return true;
467 }
468
469 /****************************************************************************
470  NT Rename a file.
471 ****************************************************************************/
472
473 bool cli_ntrename(struct cli_state *cli, const char *fname_src, const char *fname_dst)
474 {
475         char *p;
476
477         memset(cli->outbuf,'\0',smb_size);
478         memset(cli->inbuf,'\0',smb_size);
479
480         cli_set_message(cli->outbuf, 4, 0, true);
481
482         SCVAL(cli->outbuf,smb_com,SMBntrename);
483         SSVAL(cli->outbuf,smb_tid,cli->cnum);
484         cli_setup_packet(cli);
485
486         SSVAL(cli->outbuf,smb_vwv0,aSYSTEM | aHIDDEN | aDIR);
487         SSVAL(cli->outbuf,smb_vwv1, RENAME_FLAG_RENAME);
488
489         p = smb_buf(cli->outbuf);
490         *p++ = 4;
491         p += clistr_push(cli, p, fname_src,
492                         cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
493         *p++ = 4;
494         p += clistr_push(cli, p, fname_dst,
495                         cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
496
497         cli_setup_bcc(cli, p);
498
499         cli_send_smb(cli);
500         if (!cli_receive_smb(cli)) {
501                 return false;
502         }
503
504         if (cli_is_error(cli)) {
505                 return false;
506         }
507
508         return true;
509 }
510
511 /****************************************************************************
512  NT hardlink a file.
513 ****************************************************************************/
514
515 bool cli_nt_hardlink(struct cli_state *cli, const char *fname_src, const char *fname_dst)
516 {
517         char *p;
518
519         memset(cli->outbuf,'\0',smb_size);
520         memset(cli->inbuf,'\0',smb_size);
521
522         cli_set_message(cli->outbuf, 4, 0, true);
523
524         SCVAL(cli->outbuf,smb_com,SMBntrename);
525         SSVAL(cli->outbuf,smb_tid,cli->cnum);
526         cli_setup_packet(cli);
527
528         SSVAL(cli->outbuf,smb_vwv0,aSYSTEM | aHIDDEN | aDIR);
529         SSVAL(cli->outbuf,smb_vwv1, RENAME_FLAG_HARD_LINK);
530
531         p = smb_buf(cli->outbuf);
532         *p++ = 4;
533         p += clistr_push(cli, p, fname_src,
534                         cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
535         *p++ = 4;
536         p += clistr_push(cli, p, fname_dst,
537                         cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
538
539         cli_setup_bcc(cli, p);
540
541         cli_send_smb(cli);
542         if (!cli_receive_smb(cli)) {
543                 return false;
544         }
545
546         if (cli_is_error(cli)) {
547                 return false;
548         }
549
550         return true;
551 }
552
553 /****************************************************************************
554  Delete a file.
555 ****************************************************************************/
556
557 bool cli_unlink_full(struct cli_state *cli, const char *fname, uint16 attrs)
558 {
559         char *p;
560
561         memset(cli->outbuf,'\0',smb_size);
562         memset(cli->inbuf,'\0',smb_size);
563
564         cli_set_message(cli->outbuf,1, 0, true);
565
566         SCVAL(cli->outbuf,smb_com,SMBunlink);
567         SSVAL(cli->outbuf,smb_tid,cli->cnum);
568         cli_setup_packet(cli);
569
570         SSVAL(cli->outbuf,smb_vwv0, attrs);
571
572         p = smb_buf(cli->outbuf);
573         *p++ = 4;
574         p += clistr_push(cli, p, fname,
575                         cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
576
577         cli_setup_bcc(cli, p);
578         cli_send_smb(cli);
579         if (!cli_receive_smb(cli)) {
580                 return false;
581         }
582
583         if (cli_is_error(cli)) {
584                 return false;
585         }
586
587         return true;
588 }
589
590 /****************************************************************************
591  Delete a file.
592 ****************************************************************************/
593
594 bool cli_unlink(struct cli_state *cli, const char *fname)
595 {
596         return cli_unlink_full(cli, fname, aSYSTEM | aHIDDEN);
597 }
598
599 /****************************************************************************
600  Create a directory.
601 ****************************************************************************/
602
603 bool cli_mkdir(struct cli_state *cli, const char *dname)
604 {
605         char *p;
606
607         memset(cli->outbuf,'\0',smb_size);
608         memset(cli->inbuf,'\0',smb_size);
609
610         cli_set_message(cli->outbuf,0, 0, true);
611
612         SCVAL(cli->outbuf,smb_com,SMBmkdir);
613         SSVAL(cli->outbuf,smb_tid,cli->cnum);
614         cli_setup_packet(cli);
615
616         p = smb_buf(cli->outbuf);
617         *p++ = 4;
618         p += clistr_push(cli, p, dname,
619                         cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
620
621         cli_setup_bcc(cli, p);
622
623         cli_send_smb(cli);
624         if (!cli_receive_smb(cli)) {
625                 return False;
626         }
627
628         if (cli_is_error(cli)) {
629                 return False;
630         }
631
632         return True;
633 }
634
635 /****************************************************************************
636  Remove a directory.
637 ****************************************************************************/
638
639 bool cli_rmdir(struct cli_state *cli, const char *dname)
640 {
641         char *p;
642
643         memset(cli->outbuf,'\0',smb_size);
644         memset(cli->inbuf,'\0',smb_size);
645
646         cli_set_message(cli->outbuf,0, 0, true);
647
648         SCVAL(cli->outbuf,smb_com,SMBrmdir);
649         SSVAL(cli->outbuf,smb_tid,cli->cnum);
650         cli_setup_packet(cli);
651
652         p = smb_buf(cli->outbuf);
653         *p++ = 4;
654         p += clistr_push(cli, p, dname,
655                         cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
656
657         cli_setup_bcc(cli, p);
658
659         cli_send_smb(cli);
660         if (!cli_receive_smb(cli)) {
661                 return false;
662         }
663
664         if (cli_is_error(cli)) {
665                 return false;
666         }
667
668         return true;
669 }
670
671 /****************************************************************************
672  Set or clear the delete on close flag.
673 ****************************************************************************/
674
675 int cli_nt_delete_on_close(struct cli_state *cli, int fnum, bool flag)
676 {
677         unsigned int data_len = 1;
678         unsigned int param_len = 6;
679         uint16 setup = TRANSACT2_SETFILEINFO;
680         char param[6];
681         unsigned char data;
682         char *rparam=NULL, *rdata=NULL;
683
684         memset(param, 0, param_len);
685         SSVAL(param,0,fnum);
686         SSVAL(param,2,SMB_SET_FILE_DISPOSITION_INFO);
687
688         data = flag ? 1 : 0;
689
690         if (!cli_send_trans(cli, SMBtrans2,
691                         NULL,                        /* name */
692                         -1, 0,                          /* fid, flags */
693                         &setup, 1, 0,                   /* setup, length, max */
694                         param, param_len, 2,            /* param, length, max */
695                         (char *)&data,  data_len, cli->max_xmit /* data, length, max */
696                         )) {
697                 return false;
698         }
699
700         if (!cli_receive_trans(cli, SMBtrans2,
701                         &rparam, &param_len,
702                         &rdata, &data_len)) {
703                 return false;
704         }
705
706         SAFE_FREE(rdata);
707         SAFE_FREE(rparam);
708
709         return true;
710 }
711
712 /****************************************************************************
713  Open a file - exposing the full horror of the NT API :-).
714  Used in smbtorture.
715 ****************************************************************************/
716
717 int cli_nt_create_full(struct cli_state *cli, const char *fname,
718                        uint32 CreatFlags, uint32 DesiredAccess,
719                        uint32 FileAttributes, uint32 ShareAccess,
720                        uint32 CreateDisposition, uint32 CreateOptions,
721                        uint8 SecurityFlags)
722 {
723         char *p;
724         int len;
725
726         memset(cli->outbuf,'\0',smb_size);
727         memset(cli->inbuf,'\0',smb_size);
728
729         cli_set_message(cli->outbuf,24,0, true);
730
731         SCVAL(cli->outbuf,smb_com,SMBntcreateX);
732         SSVAL(cli->outbuf,smb_tid,cli->cnum);
733         cli_setup_packet(cli);
734
735         SSVAL(cli->outbuf,smb_vwv0,0xFF);
736         if (cli->use_oplocks)
737                 CreatFlags |= (REQUEST_OPLOCK|REQUEST_BATCH_OPLOCK);
738
739         SIVAL(cli->outbuf,smb_ntcreate_Flags, CreatFlags);
740         SIVAL(cli->outbuf,smb_ntcreate_RootDirectoryFid, 0x0);
741         SIVAL(cli->outbuf,smb_ntcreate_DesiredAccess, DesiredAccess);
742         SIVAL(cli->outbuf,smb_ntcreate_FileAttributes, FileAttributes);
743         SIVAL(cli->outbuf,smb_ntcreate_ShareAccess, ShareAccess);
744         SIVAL(cli->outbuf,smb_ntcreate_CreateDisposition, CreateDisposition);
745         SIVAL(cli->outbuf,smb_ntcreate_CreateOptions, CreateOptions);
746         SIVAL(cli->outbuf,smb_ntcreate_ImpersonationLevel, 0x02);
747         SCVAL(cli->outbuf,smb_ntcreate_SecurityFlags, SecurityFlags);
748
749         p = smb_buf(cli->outbuf);
750         /* this alignment and termination is critical for netapp filers. Don't change */
751         p += clistr_align_out(cli, p, 0);
752         len = clistr_push(cli, p, fname,
753                         cli->bufsize - PTR_DIFF(p,cli->outbuf), 0);
754         p += len;
755         SSVAL(cli->outbuf,smb_ntcreate_NameLength, len);
756         /* sigh. this copes with broken netapp filer behaviour */
757         p += clistr_push(cli, p, "",
758                         cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
759
760         cli_setup_bcc(cli, p);
761
762         cli_send_smb(cli);
763         if (!cli_receive_smb(cli)) {
764                 return -1;
765         }
766
767         if (cli_is_error(cli)) {
768                 return -1;
769         }
770
771         return SVAL(cli->inbuf,smb_vwv2 + 1);
772 }
773
774 struct cli_ntcreate_state {
775         uint16_t vwv[24];
776         uint16_t fnum;
777 };
778
779 static void cli_ntcreate_done(struct tevent_req *subreq);
780
781 struct tevent_req *cli_ntcreate_send(TALLOC_CTX *mem_ctx,
782                                      struct event_context *ev,
783                                      struct cli_state *cli,
784                                      const char *fname,
785                                      uint32_t CreatFlags,
786                                      uint32_t DesiredAccess,
787                                      uint32_t FileAttributes,
788                                      uint32_t ShareAccess,
789                                      uint32_t CreateDisposition,
790                                      uint32_t CreateOptions,
791                                      uint8_t SecurityFlags)
792 {
793         struct tevent_req *req, *subreq;
794         struct cli_ntcreate_state *state;
795         uint16_t *vwv;
796         uint8_t *bytes;
797         size_t converted_len;
798
799         req = tevent_req_create(mem_ctx, &state, struct cli_ntcreate_state);
800         if (req == NULL) {
801                 return NULL;
802         }
803         vwv = state->vwv;
804
805         SCVAL(vwv+0, 0, 0xFF);
806         SCVAL(vwv+0, 1, 0);
807         SSVAL(vwv+1, 0, 0);
808         SCVAL(vwv+2, 0, 0);
809
810         if (cli->use_oplocks) {
811                 CreatFlags |= (REQUEST_OPLOCK|REQUEST_BATCH_OPLOCK);
812         }
813         SIVAL(vwv+3, 1, CreatFlags);
814         SIVAL(vwv+5, 1, 0x0);   /* RootDirectoryFid */
815         SIVAL(vwv+7, 1, DesiredAccess);
816         SIVAL(vwv+9, 1, 0x0);   /* AllocationSize */
817         SIVAL(vwv+11, 1, 0x0);  /* AllocationSize */
818         SIVAL(vwv+13, 1, FileAttributes);
819         SIVAL(vwv+15, 1, ShareAccess);
820         SIVAL(vwv+17, 1, CreateDisposition);
821         SIVAL(vwv+19, 1, CreateOptions);
822         SIVAL(vwv+21, 1, 0x02); /* ImpersonationLevel */
823         SCVAL(vwv+23, 1, SecurityFlags);
824
825         bytes = talloc_array(state, uint8_t, 0);
826         bytes = smb_bytes_push_str(bytes, cli_ucs2(cli),
827                                    fname, strlen(fname)+1,
828                                    &converted_len);
829
830         /* sigh. this copes with broken netapp filer behaviour */
831         bytes = smb_bytes_push_str(bytes, cli_ucs2(cli), "", 1, NULL);
832
833         if (tevent_req_nomem(bytes, req)) {
834                 return tevent_req_post(req, ev);
835         }
836
837         SIVAL(vwv+2, 1, converted_len);
838
839         subreq = cli_smb_send(state, ev, cli, SMBntcreateX, 0, 24, vwv,
840                               talloc_get_size(bytes), bytes);
841         if (tevent_req_nomem(subreq, req)) {
842                 return tevent_req_post(req, ev);
843         }
844         tevent_req_set_callback(subreq, cli_ntcreate_done, req);
845         return req;
846 }
847
848 static void cli_ntcreate_done(struct tevent_req *subreq)
849 {
850         struct tevent_req *req = tevent_req_callback_data(
851                 subreq, struct tevent_req);
852         struct cli_ntcreate_state *state = tevent_req_data(
853                 req, struct cli_ntcreate_state);
854         uint8_t wct;
855         uint16_t *vwv;
856         uint32_t num_bytes;
857         uint8_t *bytes;
858         NTSTATUS status;
859
860         status = cli_smb_recv(subreq, 3, &wct, &vwv, &num_bytes, &bytes);
861         if (!NT_STATUS_IS_OK(status)) {
862                 TALLOC_FREE(subreq);
863                 tevent_req_nterror(req, status);
864                 return;
865         }
866         state->fnum = SVAL(vwv+2, 1);
867         tevent_req_done(req);
868 }
869
870 NTSTATUS cli_ntcreate_recv(struct tevent_req *req, uint16_t *pfnum)
871 {
872         struct cli_ntcreate_state *state = tevent_req_data(
873                 req, struct cli_ntcreate_state);
874         NTSTATUS status;
875
876         if (tevent_req_is_nterror(req, &status)) {
877                 return status;
878         }
879         *pfnum = state->fnum;
880         return NT_STATUS_OK;
881 }
882
883 NTSTATUS cli_ntcreate(struct cli_state *cli,
884                       const char *fname,
885                       uint32_t CreatFlags,
886                       uint32_t DesiredAccess,
887                       uint32_t FileAttributes,
888                       uint32_t ShareAccess,
889                       uint32_t CreateDisposition,
890                       uint32_t CreateOptions,
891                       uint8_t SecurityFlags,
892                       uint16_t *pfid)
893 {
894         TALLOC_CTX *frame = talloc_stackframe();
895         struct event_context *ev;
896         struct tevent_req *req;
897         NTSTATUS status = NT_STATUS_OK;
898
899         if (cli_has_async_calls(cli)) {
900                 /*
901                  * Can't use sync call while an async call is in flight
902                  */
903                 status = NT_STATUS_INVALID_PARAMETER;
904                 goto fail;
905         }
906
907         ev = event_context_init(frame);
908         if (ev == NULL) {
909                 status = NT_STATUS_NO_MEMORY;
910                 goto fail;
911         }
912
913         req = cli_ntcreate_send(frame, ev, cli, fname, CreatFlags,
914                                 DesiredAccess, FileAttributes, ShareAccess,
915                                 CreateDisposition, CreateOptions,
916                                 SecurityFlags);
917         if (req == NULL) {
918                 status = NT_STATUS_NO_MEMORY;
919                 goto fail;
920         }
921
922         if (!tevent_req_poll(req, ev)) {
923                 status = map_nt_error_from_unix(errno);
924                 goto fail;
925         }
926
927         status = cli_ntcreate_recv(req, pfid);
928  fail:
929         TALLOC_FREE(frame);
930         if (!NT_STATUS_IS_OK(status)) {
931                 cli_set_error(cli, status);
932         }
933         return status;
934 }
935
936 /****************************************************************************
937  Open a file.
938 ****************************************************************************/
939
940 int cli_nt_create(struct cli_state *cli, const char *fname, uint32 DesiredAccess)
941 {
942         return cli_nt_create_full(cli, fname, 0, DesiredAccess, 0,
943                                 FILE_SHARE_READ|FILE_SHARE_WRITE, FILE_OPEN, 0x0, 0x0);
944 }
945
946 uint8_t *smb_bytes_push_str(uint8_t *buf, bool ucs2,
947                             const char *str, size_t str_len,
948                             size_t *pconverted_size)
949 {
950         size_t buflen;
951         char *converted;
952         size_t converted_size;
953
954         if (buf == NULL) {
955                 return NULL;
956         }
957
958         buflen = talloc_get_size(buf);
959         /*
960          * We're pushing into an SMB buffer, align odd
961          */
962         if (ucs2 && (buflen % 2 == 0)) {
963                 buf = TALLOC_REALLOC_ARRAY(NULL, buf, uint8_t, buflen + 1);
964                 if (buf == NULL) {
965                         return NULL;
966                 }
967                 buf[buflen] = '\0';
968                 buflen += 1;
969         }
970
971         if (!convert_string_allocate(talloc_tos(), CH_UNIX,
972                                      ucs2 ? CH_UTF16LE : CH_DOS,
973                                      str, str_len, &converted,
974                                      &converted_size, true)) {
975                 return NULL;
976         }
977
978         buf = TALLOC_REALLOC_ARRAY(NULL, buf, uint8_t,
979                                    buflen + converted_size);
980         if (buf == NULL) {
981                 TALLOC_FREE(converted);
982                 return NULL;
983         }
984
985         memcpy(buf + buflen, converted, converted_size);
986
987         TALLOC_FREE(converted);
988
989         if (pconverted_size) {
990                 *pconverted_size = converted_size;
991         }
992
993         return buf;
994 }
995
996 /****************************************************************************
997  Open a file
998  WARNING: if you open with O_WRONLY then getattrE won't work!
999 ****************************************************************************/
1000
1001 struct async_req *cli_open_send(TALLOC_CTX *mem_ctx, struct event_context *ev,
1002                                 struct cli_state *cli,
1003                                 const char *fname, int flags, int share_mode)
1004 {
1005         unsigned openfn = 0;
1006         unsigned accessmode = 0;
1007         uint8_t additional_flags = 0;
1008         uint8_t *bytes;
1009         uint16_t vwv[15];
1010         struct async_req *result;
1011
1012         if (flags & O_CREAT) {
1013                 openfn |= (1<<4);
1014         }
1015         if (!(flags & O_EXCL)) {
1016                 if (flags & O_TRUNC)
1017                         openfn |= (1<<1);
1018                 else
1019                         openfn |= (1<<0);
1020         }
1021
1022         accessmode = (share_mode<<4);
1023
1024         if ((flags & O_ACCMODE) == O_RDWR) {
1025                 accessmode |= 2;
1026         } else if ((flags & O_ACCMODE) == O_WRONLY) {
1027                 accessmode |= 1;
1028         }
1029
1030 #if defined(O_SYNC)
1031         if ((flags & O_SYNC) == O_SYNC) {
1032                 accessmode |= (1<<14);
1033         }
1034 #endif /* O_SYNC */
1035
1036         if (share_mode == DENY_FCB) {
1037                 accessmode = 0xFF;
1038         }
1039
1040         SCVAL(vwv + 0, 0, 0xFF);
1041         SCVAL(vwv + 0, 1, 0);
1042         SSVAL(vwv + 1, 0, 0);
1043         SSVAL(vwv + 2, 0, 0);  /* no additional info */
1044         SSVAL(vwv + 3, 0, accessmode);
1045         SSVAL(vwv + 4, 0, aSYSTEM | aHIDDEN);
1046         SSVAL(vwv + 5, 0, 0);
1047         SIVAL(vwv + 6, 0, 0);
1048         SSVAL(vwv + 8, 0, openfn);
1049         SIVAL(vwv + 9, 0, 0);
1050         SIVAL(vwv + 11, 0, 0);
1051         SIVAL(vwv + 13, 0, 0);
1052
1053         if (cli->use_oplocks) {
1054                 /* if using oplocks then ask for a batch oplock via
1055                    core and extended methods */
1056                 additional_flags =
1057                         FLAG_REQUEST_OPLOCK|FLAG_REQUEST_BATCH_OPLOCK;
1058                 SSVAL(vwv+2, 0, SVAL(vwv+2, 0) | 6);
1059         }
1060
1061         bytes = talloc_array(talloc_tos(), uint8_t, 0);
1062         bytes = smb_bytes_push_str(bytes, cli_ucs2(cli), fname,
1063                                    strlen(fname)+1, NULL);
1064         if (bytes == NULL) {
1065                 return NULL;
1066         }
1067
1068         result = cli_request_send(mem_ctx, ev, cli, SMBopenX, additional_flags,
1069                                   15, vwv, 0, talloc_get_size(bytes), bytes);
1070         TALLOC_FREE(bytes);
1071         return result;
1072 }
1073
1074 NTSTATUS cli_open_recv(struct async_req *req, int *fnum)
1075 {
1076         uint8_t wct;
1077         uint16_t *vwv;
1078         uint16_t num_bytes;
1079         uint8_t *bytes;
1080         NTSTATUS status;
1081
1082         if (async_req_is_nterror(req, &status)) {
1083                 return status;
1084         }
1085
1086         status = cli_pull_reply(req, &wct, &vwv, &num_bytes, &bytes);
1087         if (!NT_STATUS_IS_OK(status)) {
1088                 return status;
1089         }
1090
1091         if (wct < 3) {
1092                 return NT_STATUS_INVALID_NETWORK_RESPONSE;
1093         }
1094
1095         *fnum = SVAL(vwv+2, 0);
1096
1097         return NT_STATUS_OK;
1098 }
1099
1100 int cli_open(struct cli_state *cli, const char *fname, int flags,
1101              int share_mode)
1102 {
1103         TALLOC_CTX *frame = talloc_stackframe();
1104         struct event_context *ev;
1105         struct async_req *req;
1106         int result = -1;
1107
1108         if (cli->fd_event != NULL) {
1109                 /*
1110                  * Can't use sync call while an async call is in flight
1111                  */
1112                 cli_set_error(cli, NT_STATUS_INVALID_PARAMETER);
1113                 goto fail;
1114         }
1115
1116         ev = event_context_init(frame);
1117         if (ev == NULL) {
1118                 goto fail;
1119         }
1120
1121         req = cli_open_send(frame, ev, cli, fname, flags, share_mode);
1122         if (req == NULL) {
1123                 goto fail;
1124         }
1125
1126         while (req->state < ASYNC_REQ_DONE) {
1127                 event_loop_once(ev);
1128         }
1129
1130         cli_open_recv(req, &result);
1131  fail:
1132         TALLOC_FREE(frame);
1133         return result;
1134 }
1135
1136 /****************************************************************************
1137  Close a file.
1138 ****************************************************************************/
1139
1140 struct async_req *cli_close_send(TALLOC_CTX *mem_ctx, struct event_context *ev,
1141                                  struct cli_state *cli, int fnum)
1142 {
1143         uint16_t vwv[3];
1144
1145         SSVAL(vwv+0, 0, fnum);
1146         SIVALS(vwv+1, 0, -1);
1147
1148         return cli_request_send(mem_ctx, ev, cli, SMBclose, 0, 3, vwv, 0,
1149                                 0, NULL);
1150 }
1151
1152 NTSTATUS cli_close_recv(struct async_req *req)
1153 {
1154         uint8_t wct;
1155         uint16_t *vwv;
1156         uint16_t num_bytes;
1157         uint8_t *bytes;
1158         NTSTATUS status;
1159
1160         if (async_req_is_nterror(req, &status)) {
1161                 return status;
1162         }
1163
1164         return cli_pull_reply(req, &wct, &vwv, &num_bytes, &bytes);
1165 }
1166
1167 bool cli_close(struct cli_state *cli, int fnum)
1168 {
1169         TALLOC_CTX *frame = talloc_stackframe();
1170         struct event_context *ev;
1171         struct async_req *req;
1172         bool result = false;
1173
1174         if (cli->fd_event != NULL) {
1175                 /*
1176                  * Can't use sync call while an async call is in flight
1177                  */
1178                 cli_set_error(cli, NT_STATUS_INVALID_PARAMETER);
1179                 goto fail;
1180         }
1181
1182         ev = event_context_init(frame);
1183         if (ev == NULL) {
1184                 goto fail;
1185         }
1186
1187         req = cli_close_send(frame, ev, cli, fnum);
1188         if (req == NULL) {
1189                 goto fail;
1190         }
1191
1192         while (req->state < ASYNC_REQ_DONE) {
1193                 event_loop_once(ev);
1194         }
1195
1196         result = NT_STATUS_IS_OK(cli_close_recv(req));
1197  fail:
1198         TALLOC_FREE(frame);
1199         return result;
1200 }
1201
1202 /****************************************************************************
1203  Truncate a file to a specified size
1204 ****************************************************************************/
1205
1206 bool cli_ftruncate(struct cli_state *cli, int fnum, uint64_t size)
1207 {
1208         unsigned int param_len = 6;
1209         unsigned int data_len = 8;
1210         uint16 setup = TRANSACT2_SETFILEINFO;
1211         char param[6];
1212         unsigned char data[8];
1213         char *rparam=NULL, *rdata=NULL;
1214         int saved_timeout = cli->timeout;
1215
1216         SSVAL(param,0,fnum);
1217         SSVAL(param,2,SMB_SET_FILE_END_OF_FILE_INFO);
1218         SSVAL(param,4,0);
1219
1220         SBVAL(data, 0, size);
1221
1222         if (!cli_send_trans(cli, SMBtrans2,
1223                             NULL,                    /* name */
1224                             -1, 0,                   /* fid, flags */
1225                             &setup, 1, 0,            /* setup, length, max */
1226                             param, param_len, 2,     /* param, length, max */
1227                             (char *)&data,  data_len,/* data, length, ... */
1228                             cli->max_xmit)) {        /* ... max */
1229                 cli->timeout = saved_timeout;
1230                 return False;
1231         }
1232
1233         if (!cli_receive_trans(cli, SMBtrans2,
1234                                 &rparam, &param_len,
1235                                 &rdata, &data_len)) {
1236                 cli->timeout = saved_timeout;
1237                 SAFE_FREE(rdata);
1238                 SAFE_FREE(rparam);
1239                 return False;
1240         }
1241
1242         cli->timeout = saved_timeout;
1243
1244         SAFE_FREE(rdata);
1245         SAFE_FREE(rparam);
1246
1247         return True;
1248 }
1249
1250
1251 /****************************************************************************
1252  send a lock with a specified locktype
1253  this is used for testing LOCKING_ANDX_CANCEL_LOCK
1254 ****************************************************************************/
1255
1256 NTSTATUS cli_locktype(struct cli_state *cli, int fnum,
1257                       uint32 offset, uint32 len,
1258                       int timeout, unsigned char locktype)
1259 {
1260         char *p;
1261         int saved_timeout = cli->timeout;
1262
1263         memset(cli->outbuf,'\0',smb_size);
1264         memset(cli->inbuf,'\0', smb_size);
1265
1266         cli_set_message(cli->outbuf,8,0,True);
1267
1268         SCVAL(cli->outbuf,smb_com,SMBlockingX);
1269         SSVAL(cli->outbuf,smb_tid,cli->cnum);
1270         cli_setup_packet(cli);
1271
1272         SCVAL(cli->outbuf,smb_vwv0,0xFF);
1273         SSVAL(cli->outbuf,smb_vwv2,fnum);
1274         SCVAL(cli->outbuf,smb_vwv3,locktype);
1275         SIVALS(cli->outbuf, smb_vwv4, timeout);
1276         SSVAL(cli->outbuf,smb_vwv6,0);
1277         SSVAL(cli->outbuf,smb_vwv7,1);
1278
1279         p = smb_buf(cli->outbuf);
1280         SSVAL(p, 0, cli->pid);
1281         SIVAL(p, 2, offset);
1282         SIVAL(p, 6, len);
1283
1284         p += 10;
1285
1286         cli_setup_bcc(cli, p);
1287
1288         cli_send_smb(cli);
1289
1290         if (timeout != 0) {
1291                 cli->timeout = (timeout == -1) ? 0x7FFFFFFF : (timeout + 2*1000);
1292         }
1293
1294         if (!cli_receive_smb(cli)) {
1295                 cli->timeout = saved_timeout;
1296                 return NT_STATUS_UNSUCCESSFUL;
1297         }
1298
1299         cli->timeout = saved_timeout;
1300
1301         return cli_nt_error(cli);
1302 }
1303
1304 /****************************************************************************
1305  Lock a file.
1306  note that timeout is in units of 2 milliseconds
1307 ****************************************************************************/
1308
1309 bool cli_lock(struct cli_state *cli, int fnum,
1310               uint32 offset, uint32 len, int timeout, enum brl_type lock_type)
1311 {
1312         char *p;
1313         int saved_timeout = cli->timeout;
1314
1315         memset(cli->outbuf,'\0',smb_size);
1316         memset(cli->inbuf,'\0', smb_size);
1317
1318         cli_set_message(cli->outbuf,8,0,True);
1319
1320         SCVAL(cli->outbuf,smb_com,SMBlockingX);
1321         SSVAL(cli->outbuf,smb_tid,cli->cnum);
1322         cli_setup_packet(cli);
1323
1324         SCVAL(cli->outbuf,smb_vwv0,0xFF);
1325         SSVAL(cli->outbuf,smb_vwv2,fnum);
1326         SCVAL(cli->outbuf,smb_vwv3,(lock_type == READ_LOCK? 1 : 0));
1327         SIVALS(cli->outbuf, smb_vwv4, timeout);
1328         SSVAL(cli->outbuf,smb_vwv6,0);
1329         SSVAL(cli->outbuf,smb_vwv7,1);
1330
1331         p = smb_buf(cli->outbuf);
1332         SSVAL(p, 0, cli->pid);
1333         SIVAL(p, 2, offset);
1334         SIVAL(p, 6, len);
1335
1336         p += 10;
1337
1338         cli_setup_bcc(cli, p);
1339
1340         cli_send_smb(cli);
1341
1342         if (timeout != 0) {
1343                 cli->timeout = (timeout == -1) ? 0x7FFFFFFF : (timeout*2 + 5*1000);
1344         }
1345
1346         if (!cli_receive_smb(cli)) {
1347                 cli->timeout = saved_timeout;
1348                 return False;
1349         }
1350
1351         cli->timeout = saved_timeout;
1352
1353         if (cli_is_error(cli)) {
1354                 return False;
1355         }
1356
1357         return True;
1358 }
1359
1360 /****************************************************************************
1361  Unlock a file.
1362 ****************************************************************************/
1363
1364 bool cli_unlock(struct cli_state *cli, int fnum, uint32 offset, uint32 len)
1365 {
1366         char *p;
1367
1368         memset(cli->outbuf,'\0',smb_size);
1369         memset(cli->inbuf,'\0',smb_size);
1370
1371         cli_set_message(cli->outbuf,8,0,True);
1372
1373         SCVAL(cli->outbuf,smb_com,SMBlockingX);
1374         SSVAL(cli->outbuf,smb_tid,cli->cnum);
1375         cli_setup_packet(cli);
1376
1377         SCVAL(cli->outbuf,smb_vwv0,0xFF);
1378         SSVAL(cli->outbuf,smb_vwv2,fnum);
1379         SCVAL(cli->outbuf,smb_vwv3,0);
1380         SIVALS(cli->outbuf, smb_vwv4, 0);
1381         SSVAL(cli->outbuf,smb_vwv6,1);
1382         SSVAL(cli->outbuf,smb_vwv7,0);
1383
1384         p = smb_buf(cli->outbuf);
1385         SSVAL(p, 0, cli->pid);
1386         SIVAL(p, 2, offset);
1387         SIVAL(p, 6, len);
1388         p += 10;
1389         cli_setup_bcc(cli, p);
1390         cli_send_smb(cli);
1391         if (!cli_receive_smb(cli)) {
1392                 return False;
1393         }
1394
1395         if (cli_is_error(cli)) {
1396                 return False;
1397         }
1398
1399         return True;
1400 }
1401
1402 /****************************************************************************
1403  Lock a file with 64 bit offsets.
1404 ****************************************************************************/
1405
1406 bool cli_lock64(struct cli_state *cli, int fnum,
1407                 uint64_t offset, uint64_t len, int timeout, enum brl_type lock_type)
1408 {
1409         char *p;
1410         int saved_timeout = cli->timeout;
1411         int ltype;
1412
1413         if (! (cli->capabilities & CAP_LARGE_FILES)) {
1414                 return cli_lock(cli, fnum, offset, len, timeout, lock_type);
1415         }
1416
1417         ltype = (lock_type == READ_LOCK? 1 : 0);
1418         ltype |= LOCKING_ANDX_LARGE_FILES;
1419
1420         memset(cli->outbuf,'\0',smb_size);
1421         memset(cli->inbuf,'\0', smb_size);
1422
1423         cli_set_message(cli->outbuf,8,0,True);
1424
1425         SCVAL(cli->outbuf,smb_com,SMBlockingX);
1426         SSVAL(cli->outbuf,smb_tid,cli->cnum);
1427         cli_setup_packet(cli);
1428
1429         SCVAL(cli->outbuf,smb_vwv0,0xFF);
1430         SSVAL(cli->outbuf,smb_vwv2,fnum);
1431         SCVAL(cli->outbuf,smb_vwv3,ltype);
1432         SIVALS(cli->outbuf, smb_vwv4, timeout);
1433         SSVAL(cli->outbuf,smb_vwv6,0);
1434         SSVAL(cli->outbuf,smb_vwv7,1);
1435
1436         p = smb_buf(cli->outbuf);
1437         SIVAL(p, 0, cli->pid);
1438         SOFF_T_R(p, 4, offset);
1439         SOFF_T_R(p, 12, len);
1440         p += 20;
1441
1442         cli_setup_bcc(cli, p);
1443         cli_send_smb(cli);
1444
1445         if (timeout != 0) {
1446                 cli->timeout = (timeout == -1) ? 0x7FFFFFFF : (timeout + 5*1000);
1447         }
1448
1449         if (!cli_receive_smb(cli)) {
1450                 cli->timeout = saved_timeout;
1451                 return False;
1452         }
1453
1454         cli->timeout = saved_timeout;
1455
1456         if (cli_is_error(cli)) {
1457                 return False;
1458         }
1459
1460         return True;
1461 }
1462
1463 /****************************************************************************
1464  Unlock a file with 64 bit offsets.
1465 ****************************************************************************/
1466
1467 bool cli_unlock64(struct cli_state *cli, int fnum, uint64_t offset, uint64_t len)
1468 {
1469         char *p;
1470
1471         if (! (cli->capabilities & CAP_LARGE_FILES)) {
1472                 return cli_unlock(cli, fnum, offset, len);
1473         }
1474
1475         memset(cli->outbuf,'\0',smb_size);
1476         memset(cli->inbuf,'\0',smb_size);
1477
1478         cli_set_message(cli->outbuf,8,0,True);
1479
1480         SCVAL(cli->outbuf,smb_com,SMBlockingX);
1481         SSVAL(cli->outbuf,smb_tid,cli->cnum);
1482         cli_setup_packet(cli);
1483
1484         SCVAL(cli->outbuf,smb_vwv0,0xFF);
1485         SSVAL(cli->outbuf,smb_vwv2,fnum);
1486         SCVAL(cli->outbuf,smb_vwv3,LOCKING_ANDX_LARGE_FILES);
1487         SIVALS(cli->outbuf, smb_vwv4, 0);
1488         SSVAL(cli->outbuf,smb_vwv6,1);
1489         SSVAL(cli->outbuf,smb_vwv7,0);
1490
1491         p = smb_buf(cli->outbuf);
1492         SIVAL(p, 0, cli->pid);
1493         SOFF_T_R(p, 4, offset);
1494         SOFF_T_R(p, 12, len);
1495         p += 20;
1496         cli_setup_bcc(cli, p);
1497         cli_send_smb(cli);
1498         if (!cli_receive_smb(cli)) {
1499                 return False;
1500         }
1501
1502         if (cli_is_error(cli)) {
1503                 return False;
1504         }
1505
1506         return True;
1507 }
1508
1509 /****************************************************************************
1510  Get/unlock a POSIX lock on a file - internal function.
1511 ****************************************************************************/
1512
1513 static bool cli_posix_lock_internal(struct cli_state *cli, int fnum,
1514                 uint64_t offset, uint64_t len, bool wait_lock, enum brl_type lock_type)
1515 {
1516         unsigned int param_len = 4;
1517         unsigned int data_len = POSIX_LOCK_DATA_SIZE;
1518         uint16 setup = TRANSACT2_SETFILEINFO;
1519         char param[4];
1520         unsigned char data[POSIX_LOCK_DATA_SIZE];
1521         char *rparam=NULL, *rdata=NULL;
1522         int saved_timeout = cli->timeout;
1523
1524         SSVAL(param,0,fnum);
1525         SSVAL(param,2,SMB_SET_POSIX_LOCK);
1526
1527         switch (lock_type) {
1528                 case READ_LOCK:
1529                         SSVAL(data, POSIX_LOCK_TYPE_OFFSET, POSIX_LOCK_TYPE_READ);
1530                         break;
1531                 case WRITE_LOCK:
1532                         SSVAL(data, POSIX_LOCK_TYPE_OFFSET, POSIX_LOCK_TYPE_WRITE);
1533                         break;
1534                 case UNLOCK_LOCK:
1535                         SSVAL(data, POSIX_LOCK_TYPE_OFFSET, POSIX_LOCK_TYPE_UNLOCK);
1536                         break;
1537                 default:
1538                         return False;
1539         }
1540
1541         if (wait_lock) {
1542                 SSVAL(data, POSIX_LOCK_FLAGS_OFFSET, POSIX_LOCK_FLAG_WAIT);
1543                 cli->timeout = 0x7FFFFFFF;
1544         } else {
1545                 SSVAL(data, POSIX_LOCK_FLAGS_OFFSET, POSIX_LOCK_FLAG_NOWAIT);
1546         }
1547
1548         SIVAL(data, POSIX_LOCK_PID_OFFSET, cli->pid);
1549         SOFF_T(data, POSIX_LOCK_START_OFFSET, offset);
1550         SOFF_T(data, POSIX_LOCK_LEN_OFFSET, len);
1551
1552         if (!cli_send_trans(cli, SMBtrans2,
1553                         NULL,                        /* name */
1554                         -1, 0,                          /* fid, flags */
1555                         &setup, 1, 0,                   /* setup, length, max */
1556                         param, param_len, 2,            /* param, length, max */
1557                         (char *)&data,  data_len, cli->max_xmit /* data, length, max */
1558                         )) {
1559                 cli->timeout = saved_timeout;
1560                 return False;
1561         }
1562
1563         if (!cli_receive_trans(cli, SMBtrans2,
1564                                 &rparam, &param_len,
1565                                 &rdata, &data_len)) {
1566                 cli->timeout = saved_timeout;
1567                 SAFE_FREE(rdata);
1568                 SAFE_FREE(rparam);
1569                 return False;
1570         }
1571
1572         cli->timeout = saved_timeout;
1573
1574         SAFE_FREE(rdata);
1575         SAFE_FREE(rparam);
1576
1577         return True;
1578 }
1579
1580 /****************************************************************************
1581  POSIX Lock a file.
1582 ****************************************************************************/
1583
1584 bool cli_posix_lock(struct cli_state *cli, int fnum,
1585                         uint64_t offset, uint64_t len,
1586                         bool wait_lock, enum brl_type lock_type)
1587 {
1588         if (lock_type != READ_LOCK && lock_type != WRITE_LOCK) {
1589                 return False;
1590         }
1591         return cli_posix_lock_internal(cli, fnum, offset, len, wait_lock, lock_type);
1592 }
1593
1594 /****************************************************************************
1595  POSIX Unlock a file.
1596 ****************************************************************************/
1597
1598 bool cli_posix_unlock(struct cli_state *cli, int fnum, uint64_t offset, uint64_t len)
1599 {
1600         return cli_posix_lock_internal(cli, fnum, offset, len, False, UNLOCK_LOCK);
1601 }
1602
1603 /****************************************************************************
1604  POSIX Get any lock covering a file.
1605 ****************************************************************************/
1606
1607 bool cli_posix_getlock(struct cli_state *cli, int fnum, uint64_t *poffset, uint64_t *plen)
1608 {
1609         return True;
1610 }
1611
1612 /****************************************************************************
1613  Do a SMBgetattrE call.
1614 ****************************************************************************/
1615
1616 bool cli_getattrE(struct cli_state *cli, int fd,
1617                   uint16 *attr, SMB_OFF_T *size,
1618                   time_t *change_time,
1619                   time_t *access_time,
1620                   time_t *write_time)
1621 {
1622         memset(cli->outbuf,'\0',smb_size);
1623         memset(cli->inbuf,'\0',smb_size);
1624
1625         cli_set_message(cli->outbuf,1,0,True);
1626
1627         SCVAL(cli->outbuf,smb_com,SMBgetattrE);
1628         SSVAL(cli->outbuf,smb_tid,cli->cnum);
1629         cli_setup_packet(cli);
1630
1631         SSVAL(cli->outbuf,smb_vwv0,fd);
1632
1633         cli_send_smb(cli);
1634         if (!cli_receive_smb(cli)) {
1635                 return False;
1636         }
1637
1638         if (cli_is_error(cli)) {
1639                 return False;
1640         }
1641
1642         if (size) {
1643                 *size = IVAL(cli->inbuf, smb_vwv6);
1644         }
1645
1646         if (attr) {
1647                 *attr = SVAL(cli->inbuf,smb_vwv10);
1648         }
1649
1650         if (change_time) {
1651                 *change_time = cli_make_unix_date2(cli, cli->inbuf+smb_vwv0);
1652         }
1653
1654         if (access_time) {
1655                 *access_time = cli_make_unix_date2(cli, cli->inbuf+smb_vwv2);
1656         }
1657
1658         if (write_time) {
1659                 *write_time = cli_make_unix_date2(cli, cli->inbuf+smb_vwv4);
1660         }
1661
1662         return True;
1663 }
1664
1665 /****************************************************************************
1666  Do a SMBgetatr call
1667 ****************************************************************************/
1668
1669 bool cli_getatr(struct cli_state *cli, const char *fname,
1670                 uint16 *attr, SMB_OFF_T *size, time_t *write_time)
1671 {
1672         char *p;
1673
1674         memset(cli->outbuf,'\0',smb_size);
1675         memset(cli->inbuf,'\0',smb_size);
1676
1677         cli_set_message(cli->outbuf,0,0,True);
1678
1679         SCVAL(cli->outbuf,smb_com,SMBgetatr);
1680         SSVAL(cli->outbuf,smb_tid,cli->cnum);
1681         cli_setup_packet(cli);
1682
1683         p = smb_buf(cli->outbuf);
1684         *p++ = 4;
1685         p += clistr_push(cli, p, fname,
1686                         cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
1687
1688         cli_setup_bcc(cli, p);
1689
1690         cli_send_smb(cli);
1691         if (!cli_receive_smb(cli)) {
1692                 return False;
1693         }
1694
1695         if (cli_is_error(cli)) {
1696                 return False;
1697         }
1698
1699         if (size) {
1700                 *size = IVAL(cli->inbuf, smb_vwv3);
1701         }
1702
1703         if (write_time) {
1704                 *write_time = cli_make_unix_date3(cli, cli->inbuf+smb_vwv1);
1705         }
1706
1707         if (attr) {
1708                 *attr = SVAL(cli->inbuf,smb_vwv0);
1709         }
1710
1711         return True;
1712 }
1713
1714 /****************************************************************************
1715  Do a SMBsetattrE call.
1716 ****************************************************************************/
1717
1718 bool cli_setattrE(struct cli_state *cli, int fd,
1719                   time_t change_time,
1720                   time_t access_time,
1721                   time_t write_time)
1722
1723 {
1724         char *p;
1725
1726         memset(cli->outbuf,'\0',smb_size);
1727         memset(cli->inbuf,'\0',smb_size);
1728
1729         cli_set_message(cli->outbuf,7,0,True);
1730
1731         SCVAL(cli->outbuf,smb_com,SMBsetattrE);
1732         SSVAL(cli->outbuf,smb_tid,cli->cnum);
1733         cli_setup_packet(cli);
1734
1735         SSVAL(cli->outbuf,smb_vwv0, fd);
1736         cli_put_dos_date2(cli, cli->outbuf,smb_vwv1, change_time);
1737         cli_put_dos_date2(cli, cli->outbuf,smb_vwv3, access_time);
1738         cli_put_dos_date2(cli, cli->outbuf,smb_vwv5, write_time);
1739
1740         p = smb_buf(cli->outbuf);
1741         *p++ = 4;
1742
1743         cli_setup_bcc(cli, p);
1744
1745         cli_send_smb(cli);
1746         if (!cli_receive_smb(cli)) {
1747                 return False;
1748         }
1749
1750         if (cli_is_error(cli)) {
1751                 return False;
1752         }
1753
1754         return True;
1755 }
1756
1757 /****************************************************************************
1758  Do a SMBsetatr call.
1759 ****************************************************************************/
1760
1761 bool cli_setatr(struct cli_state *cli, const char *fname, uint16 attr, time_t t)
1762 {
1763         char *p;
1764
1765         memset(cli->outbuf,'\0',smb_size);
1766         memset(cli->inbuf,'\0',smb_size);
1767
1768         cli_set_message(cli->outbuf,8,0,True);
1769
1770         SCVAL(cli->outbuf,smb_com,SMBsetatr);
1771         SSVAL(cli->outbuf,smb_tid,cli->cnum);
1772         cli_setup_packet(cli);
1773
1774         SSVAL(cli->outbuf,smb_vwv0, attr);
1775         cli_put_dos_date3(cli, cli->outbuf,smb_vwv1, t);
1776
1777         p = smb_buf(cli->outbuf);
1778         *p++ = 4;
1779         p += clistr_push(cli, p, fname,
1780                         cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
1781         *p++ = 4;
1782
1783         cli_setup_bcc(cli, p);
1784
1785         cli_send_smb(cli);
1786         if (!cli_receive_smb(cli)) {
1787                 return False;
1788         }
1789
1790         if (cli_is_error(cli)) {
1791                 return False;
1792         }
1793
1794         return True;
1795 }
1796
1797 /****************************************************************************
1798  Check for existance of a dir.
1799 ****************************************************************************/
1800
1801 bool cli_chkpath(struct cli_state *cli, const char *path)
1802 {
1803         char *path2 = NULL;
1804         char *p;
1805         TALLOC_CTX *frame = talloc_stackframe();
1806
1807         path2 = talloc_strdup(frame, path);
1808         if (!path2) {
1809                 TALLOC_FREE(frame);
1810                 return false;
1811         }
1812         trim_char(path2,'\0','\\');
1813         if (!*path2) {
1814                 path2 = talloc_strdup(frame, "\\");
1815                 if (!path2) {
1816                         TALLOC_FREE(frame);
1817                         return false;
1818                 }
1819         }
1820
1821         memset(cli->outbuf,'\0',smb_size);
1822         cli_set_message(cli->outbuf,0,0,True);
1823         SCVAL(cli->outbuf,smb_com,SMBcheckpath);
1824         SSVAL(cli->outbuf,smb_tid,cli->cnum);
1825         cli_setup_packet(cli);
1826         p = smb_buf(cli->outbuf);
1827         *p++ = 4;
1828         p += clistr_push(cli, p, path2,
1829                         cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
1830
1831         cli_setup_bcc(cli, p);
1832
1833         cli_send_smb(cli);
1834         if (!cli_receive_smb(cli)) {
1835                 TALLOC_FREE(frame);
1836                 return False;
1837         }
1838
1839         TALLOC_FREE(frame);
1840
1841         if (cli_is_error(cli)) return False;
1842
1843         return True;
1844 }
1845
1846 /****************************************************************************
1847  Query disk space.
1848 ****************************************************************************/
1849
1850 bool cli_dskattr(struct cli_state *cli, int *bsize, int *total, int *avail)
1851 {
1852         memset(cli->outbuf,'\0',smb_size);
1853         cli_set_message(cli->outbuf,0,0,True);
1854         SCVAL(cli->outbuf,smb_com,SMBdskattr);
1855         SSVAL(cli->outbuf,smb_tid,cli->cnum);
1856         cli_setup_packet(cli);
1857
1858         cli_send_smb(cli);
1859         if (!cli_receive_smb(cli)) {
1860                 return False;
1861         }
1862
1863         *bsize = SVAL(cli->inbuf,smb_vwv1)*SVAL(cli->inbuf,smb_vwv2);
1864         *total = SVAL(cli->inbuf,smb_vwv0);
1865         *avail = SVAL(cli->inbuf,smb_vwv3);
1866
1867         return True;
1868 }
1869
1870 /****************************************************************************
1871  Create and open a temporary file.
1872 ****************************************************************************/
1873
1874 int cli_ctemp(struct cli_state *cli, const char *path, char **tmp_path)
1875 {
1876         int len;
1877         char *p;
1878
1879         memset(cli->outbuf,'\0',smb_size);
1880         memset(cli->inbuf,'\0',smb_size);
1881
1882         cli_set_message(cli->outbuf,3,0,True);
1883
1884         SCVAL(cli->outbuf,smb_com,SMBctemp);
1885         SSVAL(cli->outbuf,smb_tid,cli->cnum);
1886         cli_setup_packet(cli);
1887
1888         SSVAL(cli->outbuf,smb_vwv0,0);
1889         SIVALS(cli->outbuf,smb_vwv1,-1);
1890
1891         p = smb_buf(cli->outbuf);
1892         *p++ = 4;
1893         p += clistr_push(cli, p, path,
1894                         cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
1895
1896         cli_setup_bcc(cli, p);
1897
1898         cli_send_smb(cli);
1899         if (!cli_receive_smb(cli)) {
1900                 return -1;
1901         }
1902
1903         if (cli_is_error(cli)) {
1904                 return -1;
1905         }
1906
1907         /* despite the spec, the result has a -1, followed by
1908            length, followed by name */
1909         p = smb_buf(cli->inbuf);
1910         p += 4;
1911         len = smb_buflen(cli->inbuf) - 4;
1912         if (len <= 0 || len > PATH_MAX) return -1;
1913
1914         if (tmp_path) {
1915                 char *path2 = SMB_MALLOC_ARRAY(char, len+1);
1916                 if (!path2) {
1917                         return -1;
1918                 }
1919                 clistr_pull(cli->inbuf, path2, p,
1920                             len+1, len, STR_ASCII);
1921                 *tmp_path = path2;
1922         }
1923
1924         return SVAL(cli->inbuf,smb_vwv0);
1925 }
1926
1927 /*
1928    send a raw ioctl - used by the torture code
1929 */
1930 NTSTATUS cli_raw_ioctl(struct cli_state *cli, int fnum, uint32 code, DATA_BLOB *blob)
1931 {
1932         memset(cli->outbuf,'\0',smb_size);
1933         memset(cli->inbuf,'\0',smb_size);
1934
1935         cli_set_message(cli->outbuf, 3, 0, True);
1936         SCVAL(cli->outbuf,smb_com,SMBioctl);
1937         cli_setup_packet(cli);
1938
1939         SSVAL(cli->outbuf, smb_vwv0, fnum);
1940         SSVAL(cli->outbuf, smb_vwv1, code>>16);
1941         SSVAL(cli->outbuf, smb_vwv2, (code&0xFFFF));
1942
1943         cli_send_smb(cli);
1944         if (!cli_receive_smb(cli)) {
1945                 return NT_STATUS_UNEXPECTED_NETWORK_ERROR;
1946         }
1947
1948         if (cli_is_error(cli)) {
1949                 return cli_nt_error(cli);
1950         }
1951
1952         *blob = data_blob_null;
1953
1954         return NT_STATUS_OK;
1955 }
1956
1957 /*********************************************************
1958  Set an extended attribute utility fn.
1959 *********************************************************/
1960
1961 static bool cli_set_ea(struct cli_state *cli, uint16 setup, char *param, unsigned int param_len,
1962                         const char *ea_name, const char *ea_val, size_t ea_len)
1963 {
1964         unsigned int data_len = 0;
1965         char *data = NULL;
1966         char *rparam=NULL, *rdata=NULL;
1967         char *p;
1968         size_t ea_namelen = strlen(ea_name);
1969
1970         if (ea_namelen == 0 && ea_len == 0) {
1971                 data_len = 4;
1972                 data = (char *)SMB_MALLOC(data_len);
1973                 if (!data) {
1974                         return False;
1975                 }
1976                 p = data;
1977                 SIVAL(p,0,data_len);
1978         } else {
1979                 data_len = 4 + 4 + ea_namelen + 1 + ea_len;
1980                 data = (char *)SMB_MALLOC(data_len);
1981                 if (!data) {
1982                         return False;
1983                 }
1984                 p = data;
1985                 SIVAL(p,0,data_len);
1986                 p += 4;
1987                 SCVAL(p, 0, 0); /* EA flags. */
1988                 SCVAL(p, 1, ea_namelen);
1989                 SSVAL(p, 2, ea_len);
1990                 memcpy(p+4, ea_name, ea_namelen+1); /* Copy in the name. */
1991                 memcpy(p+4+ea_namelen+1, ea_val, ea_len);
1992         }
1993
1994         if (!cli_send_trans(cli, SMBtrans2,
1995                         NULL,                        /* name */
1996                         -1, 0,                          /* fid, flags */
1997                         &setup, 1, 0,                   /* setup, length, max */
1998                         param, param_len, 2,            /* param, length, max */
1999                         data,  data_len, cli->max_xmit /* data, length, max */
2000                         )) {
2001                 SAFE_FREE(data);
2002                 return False;
2003         }
2004
2005         if (!cli_receive_trans(cli, SMBtrans2,
2006                         &rparam, &param_len,
2007                         &rdata, &data_len)) {
2008                         SAFE_FREE(data);
2009                 return false;
2010         }
2011
2012         SAFE_FREE(data);
2013         SAFE_FREE(rdata);
2014         SAFE_FREE(rparam);
2015
2016         return True;
2017 }
2018
2019 /*********************************************************
2020  Set an extended attribute on a pathname.
2021 *********************************************************/
2022
2023 bool cli_set_ea_path(struct cli_state *cli, const char *path, const char *ea_name, const char *ea_val, size_t ea_len)
2024 {
2025         uint16 setup = TRANSACT2_SETPATHINFO;
2026         unsigned int param_len = 0;
2027         char *param;
2028         size_t srclen = 2*(strlen(path)+1);
2029         char *p;
2030         bool ret;
2031
2032         param = SMB_MALLOC_ARRAY(char, 6+srclen+2);
2033         if (!param) {
2034                 return false;
2035         }
2036         memset(param, '\0', 6);
2037         SSVAL(param,0,SMB_INFO_SET_EA);
2038         p = &param[6];
2039
2040         p += clistr_push(cli, p, path, srclen, STR_TERMINATE);
2041         param_len = PTR_DIFF(p, param);
2042
2043         ret = cli_set_ea(cli, setup, param, param_len, ea_name, ea_val, ea_len);
2044         SAFE_FREE(param);
2045         return ret;
2046 }
2047
2048 /*********************************************************
2049  Set an extended attribute on an fnum.
2050 *********************************************************/
2051
2052 bool cli_set_ea_fnum(struct cli_state *cli, int fnum, const char *ea_name, const char *ea_val, size_t ea_len)
2053 {
2054         char param[6];
2055         uint16 setup = TRANSACT2_SETFILEINFO;
2056
2057         memset(param, 0, 6);
2058         SSVAL(param,0,fnum);
2059         SSVAL(param,2,SMB_INFO_SET_EA);
2060
2061         return cli_set_ea(cli, setup, param, 6, ea_name, ea_val, ea_len);
2062 }
2063
2064 /*********************************************************
2065  Get an extended attribute list utility fn.
2066 *********************************************************/
2067
2068 static bool cli_get_ea_list(struct cli_state *cli,
2069                 uint16 setup, char *param, unsigned int param_len,
2070                 TALLOC_CTX *ctx,
2071                 size_t *pnum_eas,
2072                 struct ea_struct **pea_list)
2073 {
2074         unsigned int data_len = 0;
2075         unsigned int rparam_len, rdata_len;
2076         char *rparam=NULL, *rdata=NULL;
2077         char *p;
2078         size_t ea_size;
2079         size_t num_eas;
2080         bool ret = False;
2081         struct ea_struct *ea_list;
2082
2083         *pnum_eas = 0;
2084         if (pea_list) {
2085                 *pea_list = NULL;
2086         }
2087
2088         if (!cli_send_trans(cli, SMBtrans2,
2089                         NULL,           /* Name */
2090                         -1, 0,          /* fid, flags */
2091                         &setup, 1, 0,   /* setup, length, max */
2092                         param, param_len, 10, /* param, length, max */
2093                         NULL, data_len, cli->max_xmit /* data, length, max */
2094                                 )) {
2095                 return False;
2096         }
2097
2098         if (!cli_receive_trans(cli, SMBtrans2,
2099                         &rparam, &rparam_len,
2100                         &rdata, &rdata_len)) {
2101                 return False;
2102         }
2103
2104         if (!rdata || rdata_len < 4) {
2105                 goto out;
2106         }
2107
2108         ea_size = (size_t)IVAL(rdata,0);
2109         if (ea_size > rdata_len) {
2110                 goto out;
2111         }
2112
2113         if (ea_size == 0) {
2114                 /* No EA's present. */
2115                 ret = True;
2116                 goto out;
2117         }
2118
2119         p = rdata + 4;
2120         ea_size -= 4;
2121
2122         /* Validate the EA list and count it. */
2123         for (num_eas = 0; ea_size >= 4; num_eas++) {
2124                 unsigned int ea_namelen = CVAL(p,1);
2125                 unsigned int ea_valuelen = SVAL(p,2);
2126                 if (ea_namelen == 0) {
2127                         goto out;
2128                 }
2129                 if (4 + ea_namelen + 1 + ea_valuelen > ea_size) {
2130                         goto out;
2131                 }
2132                 ea_size -= 4 + ea_namelen + 1 + ea_valuelen;
2133                 p += 4 + ea_namelen + 1 + ea_valuelen;
2134         }
2135
2136         if (num_eas == 0) {
2137                 ret = True;
2138                 goto out;
2139         }
2140
2141         *pnum_eas = num_eas;
2142         if (!pea_list) {
2143                 /* Caller only wants number of EA's. */
2144                 ret = True;
2145                 goto out;
2146         }
2147
2148         ea_list = TALLOC_ARRAY(ctx, struct ea_struct, num_eas);
2149         if (!ea_list) {
2150                 goto out;
2151         }
2152
2153         ea_size = (size_t)IVAL(rdata,0);
2154         p = rdata + 4;
2155
2156         for (num_eas = 0; num_eas < *pnum_eas; num_eas++ ) {
2157                 struct ea_struct *ea = &ea_list[num_eas];
2158                 fstring unix_ea_name;
2159                 unsigned int ea_namelen = CVAL(p,1);
2160                 unsigned int ea_valuelen = SVAL(p,2);
2161
2162                 ea->flags = CVAL(p,0);
2163                 unix_ea_name[0] = '\0';
2164                 pull_ascii_fstring(unix_ea_name, p + 4);
2165                 ea->name = talloc_strdup(ctx, unix_ea_name);
2166                 /* Ensure the value is null terminated (in case it's a string). */
2167                 ea->value = data_blob_talloc(ctx, NULL, ea_valuelen + 1);
2168                 if (!ea->value.data) {
2169                         goto out;
2170                 }
2171                 if (ea_valuelen) {
2172                         memcpy(ea->value.data, p+4+ea_namelen+1, ea_valuelen);
2173                 }
2174                 ea->value.data[ea_valuelen] = 0;
2175                 ea->value.length--;
2176                 p += 4 + ea_namelen + 1 + ea_valuelen;
2177         }
2178
2179         *pea_list = ea_list;
2180         ret = True;
2181
2182  out :
2183
2184         SAFE_FREE(rdata);
2185         SAFE_FREE(rparam);
2186         return ret;
2187 }
2188
2189 /*********************************************************
2190  Get an extended attribute list from a pathname.
2191 *********************************************************/
2192
2193 bool cli_get_ea_list_path(struct cli_state *cli, const char *path,
2194                 TALLOC_CTX *ctx,
2195                 size_t *pnum_eas,
2196                 struct ea_struct **pea_list)
2197 {
2198         uint16 setup = TRANSACT2_QPATHINFO;
2199         unsigned int param_len = 0;
2200         char *param;
2201         char *p;
2202         size_t srclen = 2*(strlen(path)+1);
2203         bool ret;
2204
2205         param = SMB_MALLOC_ARRAY(char, 6+srclen+2);
2206         if (!param) {
2207                 return false;
2208         }
2209         p = param;
2210         memset(p, 0, 6);
2211         SSVAL(p, 0, SMB_INFO_QUERY_ALL_EAS);
2212         p += 6;
2213         p += clistr_push(cli, p, path, srclen, STR_TERMINATE);
2214         param_len = PTR_DIFF(p, param);
2215
2216         ret = cli_get_ea_list(cli, setup, param, param_len, ctx, pnum_eas, pea_list);
2217         SAFE_FREE(param);
2218         return ret;
2219 }
2220
2221 /*********************************************************
2222  Get an extended attribute list from an fnum.
2223 *********************************************************/
2224
2225 bool cli_get_ea_list_fnum(struct cli_state *cli, int fnum,
2226                 TALLOC_CTX *ctx,
2227                 size_t *pnum_eas,
2228                 struct ea_struct **pea_list)
2229 {
2230         uint16 setup = TRANSACT2_QFILEINFO;
2231         char param[6];
2232
2233         memset(param, 0, 6);
2234         SSVAL(param,0,fnum);
2235         SSVAL(param,2,SMB_INFO_SET_EA);
2236
2237         return cli_get_ea_list(cli, setup, param, 6, ctx, pnum_eas, pea_list);
2238 }
2239
2240 /****************************************************************************
2241  Convert open "flags" arg to uint32 on wire.
2242 ****************************************************************************/
2243
2244 static uint32 open_flags_to_wire(int flags)
2245 {
2246         int open_mode = flags & O_ACCMODE;
2247         uint32 ret = 0;
2248
2249         switch (open_mode) {
2250                 case O_WRONLY:
2251                         ret |= SMB_O_WRONLY;
2252                         break;
2253                 case O_RDWR:
2254                         ret |= SMB_O_RDWR;
2255                         break;
2256                 default:
2257                 case O_RDONLY:
2258                         ret |= SMB_O_RDONLY;
2259                         break;
2260         }
2261
2262         if (flags & O_CREAT) {
2263                 ret |= SMB_O_CREAT;
2264         }
2265         if (flags & O_EXCL) {
2266                 ret |= SMB_O_EXCL;
2267         }
2268         if (flags & O_TRUNC) {
2269                 ret |= SMB_O_TRUNC;
2270         }
2271 #if defined(O_SYNC)
2272         if (flags & O_SYNC) {
2273                 ret |= SMB_O_SYNC;
2274         }
2275 #endif /* O_SYNC */
2276         if (flags & O_APPEND) {
2277                 ret |= SMB_O_APPEND;
2278         }
2279 #if defined(O_DIRECT)
2280         if (flags & O_DIRECT) {
2281                 ret |= SMB_O_DIRECT;
2282         }
2283 #endif
2284 #if defined(O_DIRECTORY)
2285         if (flags & O_DIRECTORY) {
2286                 ret &= ~(SMB_O_RDONLY|SMB_O_RDWR|SMB_O_WRONLY);
2287                 ret |= SMB_O_DIRECTORY;
2288         }
2289 #endif
2290         return ret;
2291 }
2292
2293 /****************************************************************************
2294  Open a file - POSIX semantics. Returns fnum. Doesn't request oplock.
2295 ****************************************************************************/
2296
2297 static int cli_posix_open_internal(struct cli_state *cli, const char *fname, int flags, mode_t mode, bool is_dir)
2298 {
2299         unsigned int data_len = 0;
2300         unsigned int param_len = 0;
2301         uint16 setup = TRANSACT2_SETPATHINFO;
2302         char *param;
2303         char data[18];
2304         char *rparam=NULL, *rdata=NULL;
2305         char *p;
2306         int fnum = -1;
2307         uint32 wire_flags = open_flags_to_wire(flags);
2308         size_t srclen = 2*(strlen(fname)+1);
2309
2310         param = SMB_MALLOC_ARRAY(char, 6+srclen+2);
2311         if (!param) {
2312                 return false;
2313         }
2314         memset(param, '\0', 6);
2315         SSVAL(param,0, SMB_POSIX_PATH_OPEN);
2316         p = &param[6];
2317
2318         p += clistr_push(cli, p, fname, srclen, STR_TERMINATE);
2319         param_len = PTR_DIFF(p, param);
2320
2321         if (is_dir) {
2322                 wire_flags &= ~(SMB_O_RDONLY|SMB_O_RDWR|SMB_O_WRONLY);
2323                 wire_flags |= SMB_O_DIRECTORY;
2324         }
2325
2326         p = data;
2327         SIVAL(p,0,0); /* No oplock. */
2328         SIVAL(p,4,wire_flags);
2329         SIVAL(p,8,unix_perms_to_wire(mode));
2330         SIVAL(p,12,0); /* Top bits of perms currently undefined. */
2331         SSVAL(p,16,SMB_NO_INFO_LEVEL_RETURNED); /* No info level returned. */
2332
2333         data_len = 18;
2334
2335         if (!cli_send_trans(cli, SMBtrans2,
2336                         NULL,                        /* name */
2337                         -1, 0,                          /* fid, flags */
2338                         &setup, 1, 0,                   /* setup, length, max */
2339                         param, param_len, 2,            /* param, length, max */
2340                         (char *)&data,  data_len, cli->max_xmit /* data, length, max */
2341                         )) {
2342                 SAFE_FREE(param);
2343                 return -1;
2344         }
2345
2346         SAFE_FREE(param);
2347
2348         if (!cli_receive_trans(cli, SMBtrans2,
2349                 &rparam, &param_len,
2350                 &rdata, &data_len)) {
2351                         return -1;
2352         }
2353
2354         fnum = SVAL(rdata,2);
2355
2356         SAFE_FREE(rdata);
2357         SAFE_FREE(rparam);
2358
2359         return fnum;
2360 }
2361
2362 /****************************************************************************
2363  open - POSIX semantics.
2364 ****************************************************************************/
2365
2366 int cli_posix_open(struct cli_state *cli, const char *fname, int flags, mode_t mode)
2367 {
2368         return cli_posix_open_internal(cli, fname, flags, mode, False);
2369 }
2370
2371 /****************************************************************************
2372  mkdir - POSIX semantics.
2373 ****************************************************************************/
2374
2375 int cli_posix_mkdir(struct cli_state *cli, const char *fname, mode_t mode)
2376 {
2377         return (cli_posix_open_internal(cli, fname, O_CREAT, mode, True) == -1) ? -1 : 0;
2378 }
2379
2380 /****************************************************************************
2381  unlink or rmdir - POSIX semantics.
2382 ****************************************************************************/
2383
2384 static bool cli_posix_unlink_internal(struct cli_state *cli, const char *fname, bool is_dir)
2385 {
2386         unsigned int data_len = 0;
2387         unsigned int param_len = 0;
2388         uint16 setup = TRANSACT2_SETPATHINFO;
2389         char *param;
2390         char data[2];
2391         char *rparam=NULL, *rdata=NULL;
2392         char *p;
2393         size_t srclen = 2*(strlen(fname)+1);
2394
2395         param = SMB_MALLOC_ARRAY(char, 6+srclen+2);
2396         if (!param) {
2397                 return false;
2398         }
2399         memset(param, '\0', 6);
2400         SSVAL(param,0, SMB_POSIX_PATH_UNLINK);
2401         p = &param[6];
2402
2403         p += clistr_push(cli, p, fname, srclen, STR_TERMINATE);
2404         param_len = PTR_DIFF(p, param);
2405
2406         SSVAL(data, 0, is_dir ? SMB_POSIX_UNLINK_DIRECTORY_TARGET :
2407                         SMB_POSIX_UNLINK_FILE_TARGET);
2408         data_len = 2;
2409
2410         if (!cli_send_trans(cli, SMBtrans2,
2411                         NULL,                        /* name */
2412                         -1, 0,                          /* fid, flags */
2413                         &setup, 1, 0,                   /* setup, length, max */
2414                         param, param_len, 2,            /* param, length, max */
2415                         (char *)&data,  data_len, cli->max_xmit /* data, length, max */
2416                         )) {
2417                 SAFE_FREE(param);
2418                 return False;
2419         }
2420
2421         SAFE_FREE(param);
2422
2423         if (!cli_receive_trans(cli, SMBtrans2,
2424                 &rparam, &param_len,
2425                 &rdata, &data_len)) {
2426                         return False;
2427         }
2428
2429         SAFE_FREE(rdata);
2430         SAFE_FREE(rparam);
2431
2432         return True;
2433 }
2434
2435 /****************************************************************************
2436  unlink - POSIX semantics.
2437 ****************************************************************************/
2438
2439 bool cli_posix_unlink(struct cli_state *cli, const char *fname)
2440 {
2441         return cli_posix_unlink_internal(cli, fname, False);
2442 }
2443
2444 /****************************************************************************
2445  rmdir - POSIX semantics.
2446 ****************************************************************************/
2447
2448 int cli_posix_rmdir(struct cli_state *cli, const char *fname)
2449 {
2450         return cli_posix_unlink_internal(cli, fname, True);
2451 }