r21517: Fix build warnings.
[samba.git] / source / param / loadparm.c
1 /* 
2    Unix SMB/CIFS implementation.
3    Parameter loading functions
4    Copyright (C) Karl Auer 1993-1998
5
6    Largely re-written by Andrew Tridgell, September 1994
7
8    Copyright (C) Simo Sorce 2001
9    Copyright (C) Alexander Bokovoy 2002
10    Copyright (C) Stefan (metze) Metzmacher 2002
11    Copyright (C) Jim McDonough <jmcd@us.ibm.com> 2003
12    
13    This program is free software; you can redistribute it and/or modify
14    it under the terms of the GNU General Public License as published by
15    the Free Software Foundation; either version 2 of the License, or
16    (at your option) any later version.
17    
18    This program is distributed in the hope that it will be useful,
19    but WITHOUT ANY WARRANTY; without even the implied warranty of
20    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
21    GNU General Public License for more details.
22    
23    You should have received a copy of the GNU General Public License
24    along with this program; if not, write to the Free Software
25    Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
26 */
27
28 /*
29  *  Load parameters.
30  *
31  *  This module provides suitable callback functions for the params
32  *  module. It builds the internal table of service details which is
33  *  then used by the rest of the server.
34  *
35  * To add a parameter:
36  *
37  * 1) add it to the global or service structure definition
38  * 2) add it to the parm_table
39  * 3) add it to the list of available functions (eg: using FN_GLOBAL_STRING())
40  * 4) If it's a global then initialise it in init_globals. If a local
41  *    (ie. service) parameter then initialise it in the sDefault structure
42  *  
43  *
44  * Notes:
45  *   The configuration file is processed sequentially for speed. It is NOT
46  *   accessed randomly as happens in 'real' Windows. For this reason, there
47  *   is a fair bit of sequence-dependent code here - ie., code which assumes
48  *   that certain things happen before others. In particular, the code which
49  *   happens at the boundary between sections is delicately poised, so be
50  *   careful!
51  *
52  */
53
54 #include "includes.h"
55
56 BOOL in_client = False;         /* Not in the client by default */
57 BOOL bLoaded = False;
58
59 extern pstring user_socket_options;
60 extern enum protocol_types Protocol;
61 extern userdom_struct current_user_info;
62
63 #ifndef GLOBAL_NAME
64 #define GLOBAL_NAME "global"
65 #endif
66
67 #ifndef PRINTERS_NAME
68 #define PRINTERS_NAME "printers"
69 #endif
70
71 #ifndef HOMES_NAME
72 #define HOMES_NAME "homes"
73 #endif
74
75 /* some helpful bits */
76 #define LP_SNUM_OK(i) (((i) >= 0) && ((i) < iNumServices) && (ServicePtrs != NULL) && ServicePtrs[(i)]->valid)
77 #define VALID(i) (ServicePtrs != NULL && ServicePtrs[i]->valid)
78
79 #define USERSHARE_VALID 1
80 #define USERSHARE_PENDING_DELETE 2
81
82 int keepalive = DEFAULT_KEEPALIVE;
83 BOOL use_getwd_cache = True;
84
85 extern int extra_time_offset;
86
87 static BOOL defaults_saved = False;
88
89 typedef struct _param_opt_struct param_opt_struct;
90 struct _param_opt_struct {
91         param_opt_struct *prev, *next;
92         char *key;
93         char *value;
94         char **list;
95 };
96
97 /* 
98  * This structure describes global (ie., server-wide) parameters.
99  */
100 typedef struct {
101         char *smb_ports;
102         char *dos_charset;
103         char *unix_charset;
104         char *display_charset;
105         char *szPrintcapname;
106         char *szAddPortCommand;
107         char *szEnumPortsCommand;
108         char *szAddPrinterCommand;
109         char *szDeletePrinterCommand;
110         char *szOs2DriverMap;
111         char *szLockDir;
112         char *szPidDir;
113         char *szRootdir;
114         char *szDefaultService;
115         char *szGetQuota;
116         char *szSetQuota;
117         char *szMsgCommand;
118         char *szServerString;
119         char *szAutoServices;
120         char *szPasswdProgram;
121         char *szPasswdChat;
122         char *szLogFile;
123         char *szConfigFile;
124         char *szSMBPasswdFile;
125         char *szPrivateDir;
126         char *szPassdbBackend;
127         char **szPreloadModules;
128         char *szPasswordServer;
129         char *szSocketOptions;
130         char *szRealm;
131         char *szAfsUsernameMap;
132         int iAfsTokenLifetime;
133         char *szLogNtTokenCommand;
134         char *szUsernameMap;
135         char *szLogonScript;
136         char *szLogonPath;
137         char *szLogonDrive;
138         char *szLogonHome;
139         char **szWINSservers;
140         char **szInterfaces;
141         char *szRemoteAnnounce;
142         char *szRemoteBrowseSync;
143         char *szSocketAddress;
144         char *szNISHomeMapName;
145         char *szAnnounceVersion;        /* This is initialised in init_globals */
146         char *szWorkgroup;
147         char *szNetbiosName;
148         char **szNetbiosAliases;
149         char *szNetbiosScope;
150         char *szNameResolveOrder;
151         char *szPanicAction;
152         char *szAddUserScript;
153         char *szRenameUserScript;
154         char *szDelUserScript;
155         char *szAddGroupScript;
156         char *szDelGroupScript;
157         char *szAddUserToGroupScript;
158         char *szDelUserFromGroupScript;
159         char *szSetPrimaryGroupScript;
160         char *szAddMachineScript;
161         char *szShutdownScript;
162         char *szAbortShutdownScript;
163         char *szUsernameMapScript;
164         char *szCheckPasswordScript;
165         char *szWINSHook;
166         char *szUtmpDir;
167         char *szWtmpDir;
168         BOOL bUtmp;
169         char *szIdmapUID;
170         char *szIdmapGID;
171         BOOL bPassdbExpandExplicit;
172         int AlgorithmicRidBase;
173         char *szTemplateHomedir;
174         char *szTemplateShell;
175         char *szWinbindSeparator;
176         BOOL bWinbindEnumUsers;
177         BOOL bWinbindEnumGroups;
178         BOOL bWinbindUseDefaultDomain;
179         BOOL bWinbindTrustedDomainsOnly;
180         BOOL bWinbindNestedGroups;
181         BOOL bWinbindRefreshTickets;
182         BOOL bWinbindOfflineLogon;
183         BOOL bWinbindNormalizeNames;
184         char **szIdmapDomains;
185         char **szIdmapBackend; /* deprecated */
186         char *szIdmapAllocBackend;
187         char *szAddShareCommand;
188         char *szChangeShareCommand;
189         char *szDeleteShareCommand;
190         char **szEventLogs;
191         char *szGuestaccount;
192         char *szManglingMethod;
193         char **szServicesList;
194         char *szUsersharePath;
195         char *szUsershareTemplateShare;
196         char **szUsersharePrefixAllowList;
197         char **szUsersharePrefixDenyList;
198         int mangle_prefix;
199         int max_log_size;
200         char *szLogLevel;
201         int max_xmit;
202         int max_mux;
203         int max_open_files;
204         int open_files_db_hash_size;
205         int pwordlevel;
206         int unamelevel;
207         int deadtime;
208         int maxprotocol;
209         int minprotocol;
210         int security;
211         char **AuthMethods;
212         BOOL paranoid_server_security;
213         int maxdisksize;
214         int lpqcachetime;
215         int iMaxSmbdProcesses;
216         BOOL bDisableSpoolss;
217         int syslog;
218         int os_level;
219         int enhanced_browsing;
220         int max_ttl;
221         int max_wins_ttl;
222         int min_wins_ttl;
223         int lm_announce;
224         int lm_interval;
225         int announce_as;        /* This is initialised in init_globals */
226         int machine_password_timeout;
227         int map_to_guest;
228         int oplock_break_wait_time;
229         int winbind_cache_time;
230         int winbind_max_idle_children;
231         char **szWinbindNssInfo;
232         int iLockSpinCount;
233         int iLockSpinTime;
234         char *szLdapMachineSuffix;
235         char *szLdapUserSuffix;
236         char *szLdapIdmapSuffix;
237         char *szLdapGroupSuffix;
238         int ldap_ssl;
239         char *szLdapSuffix;
240         char *szLdapAdminDn;
241         int iAclCompat;
242         char *szCupsServer;
243         char *szIPrintServer;
244         int ldap_passwd_sync; 
245         int ldap_replication_sleep;
246         int ldap_timeout; /* This is initialised in init_globals */
247         int ldap_page_size;
248         BOOL ldap_delete_dn;
249         BOOL bMsAddPrinterWizard;
250         BOOL bDNSproxy;
251         BOOL bWINSsupport;
252         BOOL bWINSproxy;
253         BOOL bLocalMaster;
254         BOOL bPreferredMaster;
255         BOOL bDomainMaster;
256         BOOL bDomainLogons;
257         BOOL bEncryptPasswords;
258         BOOL bUpdateEncrypt;
259         int  clientSchannel;
260         int  serverSchannel;
261         BOOL bNullPasswords;
262         BOOL bObeyPamRestrictions;
263         BOOL bLoadPrinters;
264         int PrintcapCacheTime;
265         BOOL bLargeReadwrite;
266         BOOL bReadRaw;
267         BOOL bWriteRaw;
268         BOOL bReadbmpx;
269         BOOL bSyslogOnly;
270         BOOL bBrowseList;
271         BOOL bNISHomeMap;
272         BOOL bTimeServer;
273         BOOL bBindInterfacesOnly;
274         BOOL bPamPasswordChange;
275         BOOL bUnixPasswdSync;
276         BOOL bPasswdChatDebug;
277         int iPasswdChatTimeout;
278         BOOL bTimestampLogs;
279         BOOL bNTSmbSupport;
280         BOOL bNTPipeSupport;
281         BOOL bNTStatusSupport;
282         BOOL bStatCache;
283         int iMaxStatCacheSize;
284         BOOL bKernelOplocks;
285         BOOL bAllowTrustedDomains;
286         BOOL bLanmanAuth;
287         BOOL bNTLMAuth;
288         BOOL bUseSpnego;
289         BOOL bClientLanManAuth;
290         BOOL bClientNTLMv2Auth;
291         BOOL bClientPlaintextAuth;
292         BOOL bClientUseSpnego;
293         BOOL bDebugHiresTimestamp;
294         BOOL bDebugPid;
295         BOOL bDebugUid;
296         BOOL bEnableCoreFiles;
297         BOOL bHostMSDfs;
298         BOOL bUseMmap;
299         BOOL bHostnameLookups;
300         BOOL bUnixExtensions;
301         BOOL bDisableNetbios;
302         BOOL bUseKerberosKeytab;
303         BOOL bDeferSharingViolations;
304         BOOL bEnablePrivileges;
305         BOOL bASUSupport;
306         BOOL bUsershareOwnerOnly;
307         BOOL bUsershareAllowGuests;
308         BOOL bRegistryShares;
309         int restrict_anonymous;
310         int name_cache_timeout;
311         int client_signing;
312         int server_signing;
313         int iUsershareMaxShares;
314         int iIdmapExpireTime;
315         int iIdmapNegativeTime;
316
317         BOOL bResetOnZeroVC;
318         param_opt_struct *param_opt;
319 } global;
320
321 static global Globals;
322
323 /* 
324  * This structure describes a single service. 
325  */
326 typedef struct {
327         BOOL valid;
328         BOOL autoloaded;
329         int usershare;
330         time_t usershare_last_mod;
331         char *szService;
332         char *szPath;
333         char *szUsername;
334         char **szInvalidUsers;
335         char **szValidUsers;
336         char **szAdminUsers;
337         char *szCopy;
338         char *szInclude;
339         char *szPreExec;
340         char *szPostExec;
341         char *szRootPreExec;
342         char *szRootPostExec;
343         char *szCupsOptions;
344         char *szPrintcommand;
345         char *szLpqcommand;
346         char *szLprmcommand;
347         char *szLppausecommand;
348         char *szLpresumecommand;
349         char *szQueuepausecommand;
350         char *szQueueresumecommand;
351         char *szPrintername;
352         char *szPrintjobUsername;
353         char *szDontdescend;
354         char **szHostsallow;
355         char **szHostsdeny;
356         char *szMagicScript;
357         char *szMagicOutput;
358         char *szMangledMap;
359         char *szVetoFiles;
360         char *szHideFiles;
361         char *szVetoOplockFiles;
362         char *comment;
363         char *force_user;
364         char *force_group;
365         char **readlist;
366         char **writelist;
367         char **printer_admin;
368         char *volume;
369         char *fstype;
370         char **szVfsObjects;
371         char *szMSDfsProxy;
372         char *szDfree;
373         int iMinPrintSpace;
374         int iMaxPrintJobs;
375         int iMaxReportedPrintJobs;
376         int iWriteCacheSize;
377         int iCreate_mask;
378         int iCreate_force_mode;
379         int iSecurity_mask;
380         int iSecurity_force_mode;
381         int iDir_mask;
382         int iDir_force_mode;
383         int iDir_Security_mask;
384         int iDir_Security_force_mode;
385         int iMaxConnections;
386         int iDefaultCase;
387         int iPrinting;
388         int iOplockContentionLimit;
389         int iCSCPolicy;
390         int iBlock_size;
391         int iDfreeCacheTime;
392         BOOL bPreexecClose;
393         BOOL bRootpreexecClose;
394         int  iCaseSensitive;
395         BOOL bCasePreserve;
396         BOOL bShortCasePreserve;
397         BOOL bHideDotFiles;
398         BOOL bHideSpecialFiles;
399         BOOL bHideUnReadable;
400         BOOL bHideUnWriteableFiles;
401         BOOL bBrowseable;
402         BOOL bAvailable;
403         BOOL bRead_only;
404         BOOL bNo_set_dir;
405         BOOL bGuest_only;
406         BOOL bGuest_ok;
407         BOOL bPrint_ok;
408         BOOL bMap_system;
409         BOOL bMap_hidden;
410         BOOL bMap_archive;
411         BOOL bStoreDosAttributes;
412         BOOL bDmapiSupport;
413         BOOL bLocking;
414         int iStrictLocking;
415         BOOL bPosixLocking;
416         BOOL bShareModes;
417         BOOL bOpLocks;
418         BOOL bLevel2OpLocks;
419         BOOL bOnlyUser;
420         BOOL bMangledNames;
421         BOOL bWidelinks;
422         BOOL bSymlinks;
423         BOOL bSyncAlways;
424         BOOL bStrictAllocate;
425         BOOL bStrictSync;
426         char magic_char;
427         BOOL *copymap;
428         BOOL bDeleteReadonly;
429         BOOL bFakeOplocks;
430         BOOL bDeleteVetoFiles;
431         BOOL bDosFilemode;
432         BOOL bDosFiletimes;
433         BOOL bDosFiletimeResolution;
434         BOOL bFakeDirCreateTimes;
435         BOOL bBlockingLocks;
436         BOOL bInheritPerms;
437         BOOL bInheritACLS;
438         BOOL bInheritOwner;
439         BOOL bMSDfsRoot;
440         BOOL bUseClientDriver;
441         BOOL bDefaultDevmode;
442         BOOL bForcePrintername;
443         BOOL bNTAclSupport;
444         BOOL bForceUnknownAclUser;
445         BOOL bUseSendfile;
446         BOOL bProfileAcls;
447         BOOL bMap_acl_inherit;
448         BOOL bAfs_Share;
449         BOOL bEASupport;
450         BOOL bAclCheckPermissions;
451         BOOL bAclMapFullControl;
452         BOOL bAclGroupControl;
453         BOOL bChangeNotify;
454         BOOL bKernelChangeNotify;
455         int iallocation_roundup_size;
456         int iAioReadSize;
457         int iAioWriteSize;
458         int iMap_readonly;
459         param_opt_struct *param_opt;
460
461         char dummy[3];          /* for alignment */
462 } service;
463
464
465 /* This is a default service used to prime a services structure */
466 static service sDefault = {
467         True,                   /* valid */
468         False,                  /* not autoloaded */
469         0,                      /* not a usershare */
470         (time_t)0,              /* No last mod time */
471         NULL,                   /* szService */
472         NULL,                   /* szPath */
473         NULL,                   /* szUsername */
474         NULL,                   /* szInvalidUsers */
475         NULL,                   /* szValidUsers */
476         NULL,                   /* szAdminUsers */
477         NULL,                   /* szCopy */
478         NULL,                   /* szInclude */
479         NULL,                   /* szPreExec */
480         NULL,                   /* szPostExec */
481         NULL,                   /* szRootPreExec */
482         NULL,                   /* szRootPostExec */
483         NULL,                   /* szCupsOptions */
484         NULL,                   /* szPrintcommand */
485         NULL,                   /* szLpqcommand */
486         NULL,                   /* szLprmcommand */
487         NULL,                   /* szLppausecommand */
488         NULL,                   /* szLpresumecommand */
489         NULL,                   /* szQueuepausecommand */
490         NULL,                   /* szQueueresumecommand */
491         NULL,                   /* szPrintername */
492         NULL,                   /* szPrintjobUsername */
493         NULL,                   /* szDontdescend */
494         NULL,                   /* szHostsallow */
495         NULL,                   /* szHostsdeny */
496         NULL,                   /* szMagicScript */
497         NULL,                   /* szMagicOutput */
498         NULL,                   /* szMangledMap */
499         NULL,                   /* szVetoFiles */
500         NULL,                   /* szHideFiles */
501         NULL,                   /* szVetoOplockFiles */
502         NULL,                   /* comment */
503         NULL,                   /* force user */
504         NULL,                   /* force group */
505         NULL,                   /* readlist */
506         NULL,                   /* writelist */
507         NULL,                   /* printer admin */
508         NULL,                   /* volume */
509         NULL,                   /* fstype */
510         NULL,                   /* vfs objects */
511         NULL,                   /* szMSDfsProxy */
512         NULL,                   /* szDfree */
513         0,                      /* iMinPrintSpace */
514         1000,                   /* iMaxPrintJobs */
515         0,                      /* iMaxReportedPrintJobs */
516         0,                      /* iWriteCacheSize */
517         0744,                   /* iCreate_mask */
518         0000,                   /* iCreate_force_mode */
519         0777,                   /* iSecurity_mask */
520         0,                      /* iSecurity_force_mode */
521         0755,                   /* iDir_mask */
522         0000,                   /* iDir_force_mode */
523         0777,                   /* iDir_Security_mask */
524         0,                      /* iDir_Security_force_mode */
525         0,                      /* iMaxConnections */
526         CASE_LOWER,             /* iDefaultCase */
527         DEFAULT_PRINTING,       /* iPrinting */
528         2,                      /* iOplockContentionLimit */
529         0,                      /* iCSCPolicy */
530         1024,                   /* iBlock_size */
531         0,                      /* iDfreeCacheTime */
532         False,                  /* bPreexecClose */
533         False,                  /* bRootpreexecClose */
534         Auto,                   /* case sensitive */
535         True,                   /* case preserve */
536         True,                   /* short case preserve */
537         True,                   /* bHideDotFiles */
538         False,                  /* bHideSpecialFiles */
539         False,                  /* bHideUnReadable */
540         False,                  /* bHideUnWriteableFiles */
541         True,                   /* bBrowseable */
542         True,                   /* bAvailable */
543         True,                   /* bRead_only */
544         True,                   /* bNo_set_dir */
545         False,                  /* bGuest_only */
546         False,                  /* bGuest_ok */
547         False,                  /* bPrint_ok */
548         False,                  /* bMap_system */
549         False,                  /* bMap_hidden */
550         True,                   /* bMap_archive */
551         False,                  /* bStoreDosAttributes */
552         False,                  /* bDmapiSupport */
553         True,                   /* bLocking */
554         Auto,                   /* iStrictLocking */
555         True,                   /* bPosixLocking */
556         True,                   /* bShareModes */
557         True,                   /* bOpLocks */
558         True,                   /* bLevel2OpLocks */
559         False,                  /* bOnlyUser */
560         True,                   /* bMangledNames */
561         True,                   /* bWidelinks */
562         True,                   /* bSymlinks */
563         False,                  /* bSyncAlways */
564         False,                  /* bStrictAllocate */
565         False,                  /* bStrictSync */
566         '~',                    /* magic char */
567         NULL,                   /* copymap */
568         False,                  /* bDeleteReadonly */
569         False,                  /* bFakeOplocks */
570         False,                  /* bDeleteVetoFiles */
571         False,                  /* bDosFilemode */
572         True,                   /* bDosFiletimes */
573         False,                  /* bDosFiletimeResolution */
574         False,                  /* bFakeDirCreateTimes */
575         True,                   /* bBlockingLocks */
576         False,                  /* bInheritPerms */
577         False,                  /* bInheritACLS */
578         False,                  /* bInheritOwner */
579         False,                  /* bMSDfsRoot */
580         False,                  /* bUseClientDriver */
581         True,                   /* bDefaultDevmode */
582         False,                  /* bForcePrintername */
583         True,                   /* bNTAclSupport */
584         False,                  /* bForceUnknownAclUser */
585         False,                  /* bUseSendfile */
586         False,                  /* bProfileAcls */
587         False,                  /* bMap_acl_inherit */
588         False,                  /* bAfs_Share */
589         False,                  /* bEASupport */
590         True,                   /* bAclCheckPermissions */
591         True,                   /* bAclMapFullControl */
592         False,                  /* bAclGroupControl */
593         True,                   /* bChangeNotify */
594         True,                   /* bKernelChangeNotify */
595         SMB_ROUNDUP_ALLOCATION_SIZE,            /* iallocation_roundup_size */
596         0,                      /* iAioReadSize */
597         0,                      /* iAioWriteSize */
598         MAP_READONLY_YES,       /* iMap_readonly */
599         
600         NULL,                   /* Parametric options */
601
602         ""                      /* dummy */
603 };
604
605 /* local variables */
606 static service **ServicePtrs = NULL;
607 static int iNumServices = 0;
608 static int iServiceIndex = 0;
609 static TDB_CONTEXT *ServiceHash;
610 static int *invalid_services = NULL;
611 static int num_invalid_services = 0;
612 static BOOL bInGlobalSection = True;
613 static BOOL bGlobalOnly = False;
614 static int server_role;
615 static int default_server_announce;
616
617 #define NUMPARAMETERS (sizeof(parm_table) / sizeof(struct parm_struct))
618
619 /* prototypes for the special type handlers */
620 static BOOL handle_include( int snum, const char *pszParmValue, char **ptr);
621 static BOOL handle_copy( int snum, const char *pszParmValue, char **ptr);
622 static BOOL handle_netbios_name( int snum, const char *pszParmValue, char **ptr);
623 static BOOL handle_idmap_uid( int snum, const char *pszParmValue, char **ptr);
624 static BOOL handle_idmap_gid( int snum, const char *pszParmValue, char **ptr);
625 static BOOL handle_debug_list( int snum, const char *pszParmValue, char **ptr );
626 static BOOL handle_workgroup( int snum, const char *pszParmValue, char **ptr );
627 static BOOL handle_netbios_aliases( int snum, const char *pszParmValue, char **ptr );
628 static BOOL handle_netbios_scope( int snum, const char *pszParmValue, char **ptr );
629 static BOOL handle_charset( int snum, const char *pszParmValue, char **ptr );
630 static BOOL handle_printing( int snum, const char *pszParmValue, char **ptr);
631
632 static void set_server_role(void);
633 static void set_default_server_announce_type(void);
634 static void set_allowed_client_auth(void);
635
636 static const struct enum_list enum_protocol[] = {
637         {PROTOCOL_NT1, "NT1"},
638         {PROTOCOL_LANMAN2, "LANMAN2"},
639         {PROTOCOL_LANMAN1, "LANMAN1"},
640         {PROTOCOL_CORE, "CORE"},
641         {PROTOCOL_COREPLUS, "COREPLUS"},
642         {PROTOCOL_COREPLUS, "CORE+"},
643         {-1, NULL}
644 };
645
646 static const struct enum_list enum_security[] = {
647         {SEC_SHARE, "SHARE"},
648         {SEC_USER, "USER"},
649         {SEC_SERVER, "SERVER"},
650         {SEC_DOMAIN, "DOMAIN"},
651 #ifdef HAVE_ADS
652         {SEC_ADS, "ADS"},
653 #endif
654         {-1, NULL}
655 };
656
657 static const struct enum_list enum_printing[] = {
658         {PRINT_SYSV, "sysv"},
659         {PRINT_AIX, "aix"},
660         {PRINT_HPUX, "hpux"},
661         {PRINT_BSD, "bsd"},
662         {PRINT_QNX, "qnx"},
663         {PRINT_PLP, "plp"},
664         {PRINT_LPRNG, "lprng"},
665         {PRINT_CUPS, "cups"},
666         {PRINT_IPRINT, "iprint"},
667         {PRINT_LPRNT, "nt"},
668         {PRINT_LPROS2, "os2"},
669 #ifdef DEVELOPER
670         {PRINT_TEST, "test"},
671         {PRINT_VLP, "vlp"},
672 #endif /* DEVELOPER */
673         {-1, NULL}
674 };
675
676 static const struct enum_list enum_ldap_ssl[] = {
677         {LDAP_SSL_OFF, "no"},
678         {LDAP_SSL_OFF, "No"},
679         {LDAP_SSL_OFF, "off"},
680         {LDAP_SSL_OFF, "Off"},
681         {LDAP_SSL_START_TLS, "start tls"},
682         {LDAP_SSL_START_TLS, "Start_tls"},
683         {-1, NULL}
684 };
685
686 static const struct enum_list enum_ldap_passwd_sync[] = {
687         {LDAP_PASSWD_SYNC_OFF, "no"},
688         {LDAP_PASSWD_SYNC_OFF, "No"},
689         {LDAP_PASSWD_SYNC_OFF, "off"},
690         {LDAP_PASSWD_SYNC_OFF, "Off"},
691         {LDAP_PASSWD_SYNC_ON, "Yes"},
692         {LDAP_PASSWD_SYNC_ON, "yes"},
693         {LDAP_PASSWD_SYNC_ON, "on"},
694         {LDAP_PASSWD_SYNC_ON, "On"},
695         {LDAP_PASSWD_SYNC_ONLY, "Only"},
696         {LDAP_PASSWD_SYNC_ONLY, "only"},
697         {-1, NULL}
698 };
699
700 /* Types of machine we can announce as. */
701 #define ANNOUNCE_AS_NT_SERVER 1
702 #define ANNOUNCE_AS_WIN95 2
703 #define ANNOUNCE_AS_WFW 3
704 #define ANNOUNCE_AS_NT_WORKSTATION 4
705
706 static const struct enum_list enum_announce_as[] = {
707         {ANNOUNCE_AS_NT_SERVER, "NT"},
708         {ANNOUNCE_AS_NT_SERVER, "NT Server"},
709         {ANNOUNCE_AS_NT_WORKSTATION, "NT Workstation"},
710         {ANNOUNCE_AS_WIN95, "win95"},
711         {ANNOUNCE_AS_WFW, "WfW"},
712         {-1, NULL}
713 };
714
715 static const struct enum_list enum_map_readonly[] = {
716         {MAP_READONLY_NO, "no"},
717         {MAP_READONLY_NO, "false"},
718         {MAP_READONLY_NO, "0"},
719         {MAP_READONLY_YES, "yes"},
720         {MAP_READONLY_YES, "true"},
721         {MAP_READONLY_YES, "1"},
722         {MAP_READONLY_PERMISSIONS, "permissions"},
723         {MAP_READONLY_PERMISSIONS, "perms"},
724         {-1, NULL}
725 };
726
727 static const struct enum_list enum_case[] = {
728         {CASE_LOWER, "lower"},
729         {CASE_UPPER, "upper"},
730         {-1, NULL}
731 };
732
733 static const struct enum_list enum_bool_auto[] = {
734         {False, "No"},
735         {False, "False"},
736         {False, "0"},
737         {True, "Yes"},
738         {True, "True"},
739         {True, "1"},
740         {Auto, "Auto"},
741         {-1, NULL}
742 };
743
744 /* Client-side offline caching policy types */
745 #define CSC_POLICY_MANUAL 0
746 #define CSC_POLICY_DOCUMENTS 1
747 #define CSC_POLICY_PROGRAMS 2
748 #define CSC_POLICY_DISABLE 3
749
750 static const struct enum_list enum_csc_policy[] = {
751         {CSC_POLICY_MANUAL, "manual"},
752         {CSC_POLICY_DOCUMENTS, "documents"},
753         {CSC_POLICY_PROGRAMS, "programs"},
754         {CSC_POLICY_DISABLE, "disable"},
755         {-1, NULL}
756 };
757
758 /* SMB signing types. */
759 static const struct enum_list enum_smb_signing_vals[] = {
760         {False, "No"},
761         {False, "False"},
762         {False, "0"},
763         {False, "Off"},
764         {False, "disabled"},
765         {True, "Yes"},
766         {True, "True"},
767         {True, "1"},
768         {True, "On"},
769         {True, "enabled"},
770         {Auto, "auto"},
771         {Required, "required"},
772         {Required, "mandatory"},
773         {Required, "force"},
774         {Required, "forced"},
775         {Required, "enforced"},
776         {-1, NULL}
777 };
778
779 /* ACL compatibility options. */
780 static const struct enum_list enum_acl_compat_vals[] = {
781     { ACL_COMPAT_AUTO, "auto" },
782     { ACL_COMPAT_WINNT, "winnt" },
783     { ACL_COMPAT_WIN2K, "win2k" },
784     { -1, NULL}
785 };
786
787 /* 
788    Do you want session setups at user level security with a invalid
789    password to be rejected or allowed in as guest? WinNT rejects them
790    but it can be a pain as it means "net view" needs to use a password
791
792    You have 3 choices in the setting of map_to_guest:
793
794    "Never" means session setups with an invalid password
795    are rejected. This is the default.
796
797    "Bad User" means session setups with an invalid password
798    are rejected, unless the username does not exist, in which case it
799    is treated as a guest login
800
801    "Bad Password" means session setups with an invalid password
802    are treated as a guest login
803
804    Note that map_to_guest only has an effect in user or server
805    level security.
806 */
807
808 static const struct enum_list enum_map_to_guest[] = {
809         {NEVER_MAP_TO_GUEST, "Never"},
810         {MAP_TO_GUEST_ON_BAD_USER, "Bad User"},
811         {MAP_TO_GUEST_ON_BAD_PASSWORD, "Bad Password"},
812         {MAP_TO_GUEST_ON_BAD_UID, "Bad Uid"},
813         {-1, NULL}
814 };
815
816 /* Note: We do not initialise the defaults union - it is not allowed in ANSI C
817  *
818  * The FLAG_HIDE is explicit. Paramters set this way do NOT appear in any edit
819  * screen in SWAT. This is used to exclude parameters as well as to squash all
820  * parameters that have been duplicated by pseudonyms.
821  *
822  * NOTE: To display a parameter in BASIC view set FLAG_BASIC
823  *       Any parameter that does NOT have FLAG_ADVANCED will not disply at all
824  *       Set FLAG_SHARE and FLAG_PRINT to specifically display parameters in
825  *        respective views.
826  *
827  * NOTE2: Handling of duplicated (synonym) paramters:
828  *      Only the first occurance of a parameter should be enabled by FLAG_BASIC
829  *      and/or FLAG_ADVANCED. All duplicates following the first mention should be
830  *      set to FLAG_HIDE. ie: Make you must place the parameter that has the preferred
831  *      name first, and all synonyms must follow it with the FLAG_HIDE attribute.
832  */
833
834 static struct parm_struct parm_table[] = {
835         {N_("Base Options"), P_SEP, P_SEPARATOR}, 
836
837         {"dos charset", P_STRING, P_GLOBAL, &Globals.dos_charset, handle_charset, NULL, FLAG_ADVANCED}, 
838         {"unix charset", P_STRING, P_GLOBAL, &Globals.unix_charset, handle_charset, NULL, FLAG_ADVANCED}, 
839         {"display charset", P_STRING, P_GLOBAL, &Globals.display_charset, handle_charset, NULL, FLAG_ADVANCED}, 
840         {"comment", P_STRING, P_LOCAL, &sDefault.comment, NULL, NULL, FLAG_BASIC | FLAG_ADVANCED | FLAG_SHARE | FLAG_PRINT}, 
841         {"path", P_STRING, P_LOCAL, &sDefault.szPath, NULL, NULL, FLAG_BASIC | FLAG_ADVANCED | FLAG_SHARE | FLAG_PRINT}, 
842         {"directory", P_STRING, P_LOCAL, &sDefault.szPath, NULL, NULL, FLAG_HIDE}, 
843         {"workgroup", P_USTRING, P_GLOBAL, &Globals.szWorkgroup, handle_workgroup, NULL, FLAG_BASIC | FLAG_ADVANCED | FLAG_WIZARD}, 
844 #ifdef WITH_ADS
845         {"realm", P_USTRING, P_GLOBAL, &Globals.szRealm, NULL, NULL, FLAG_BASIC | FLAG_ADVANCED | FLAG_WIZARD}, 
846 #endif
847         {"netbios name", P_USTRING, P_GLOBAL, &Globals.szNetbiosName, handle_netbios_name, NULL, FLAG_BASIC | FLAG_ADVANCED | FLAG_WIZARD}, 
848         {"netbios aliases", P_LIST, P_GLOBAL, &Globals.szNetbiosAliases, handle_netbios_aliases,  NULL, FLAG_ADVANCED}, 
849         {"netbios scope", P_USTRING, P_GLOBAL, &Globals.szNetbiosScope, handle_netbios_scope,  NULL, FLAG_ADVANCED}, 
850         {"server string", P_STRING, P_GLOBAL, &Globals.szServerString, NULL, NULL, FLAG_BASIC | FLAG_ADVANCED }, 
851         {"interfaces", P_LIST, P_GLOBAL, &Globals.szInterfaces, NULL, NULL, FLAG_BASIC | FLAG_ADVANCED | FLAG_WIZARD}, 
852         {"bind interfaces only", P_BOOL, P_GLOBAL, &Globals.bBindInterfacesOnly, NULL, NULL, FLAG_ADVANCED | FLAG_WIZARD}, 
853
854         {N_("Security Options"), P_SEP, P_SEPARATOR}, 
855
856         {"security", P_ENUM, P_GLOBAL, &Globals.security, NULL, enum_security, FLAG_BASIC | FLAG_ADVANCED | FLAG_WIZARD}, 
857         {"auth methods", P_LIST, P_GLOBAL, &Globals.AuthMethods, NULL, NULL, FLAG_ADVANCED}, 
858         {"encrypt passwords", P_BOOL, P_GLOBAL, &Globals.bEncryptPasswords, NULL, NULL, FLAG_BASIC | FLAG_ADVANCED | FLAG_WIZARD}, 
859         {"update encrypted", P_BOOL, P_GLOBAL, &Globals.bUpdateEncrypt, NULL, NULL, FLAG_ADVANCED}, 
860         {"client schannel", P_ENUM, P_GLOBAL, &Globals.clientSchannel, NULL, enum_bool_auto, FLAG_BASIC | FLAG_ADVANCED}, 
861         {"server schannel", P_ENUM, P_GLOBAL, &Globals.serverSchannel, NULL, enum_bool_auto, FLAG_BASIC | FLAG_ADVANCED}, 
862         {"allow trusted domains", P_BOOL, P_GLOBAL, &Globals.bAllowTrustedDomains, NULL, NULL, FLAG_ADVANCED}, 
863         {"map to guest", P_ENUM, P_GLOBAL, &Globals.map_to_guest, NULL, enum_map_to_guest, FLAG_ADVANCED}, 
864         {"null passwords", P_BOOL, P_GLOBAL, &Globals.bNullPasswords, NULL, NULL, FLAG_ADVANCED}, 
865         {"obey pam restrictions", P_BOOL, P_GLOBAL, &Globals.bObeyPamRestrictions, NULL, NULL, FLAG_ADVANCED}, 
866         {"password server", P_STRING, P_GLOBAL, &Globals.szPasswordServer, NULL, NULL, FLAG_ADVANCED | FLAG_WIZARD}, 
867         {"smb passwd file", P_STRING, P_GLOBAL, &Globals.szSMBPasswdFile, NULL, NULL, FLAG_ADVANCED}, 
868         {"private dir", P_STRING, P_GLOBAL, &Globals.szPrivateDir, NULL, NULL, FLAG_ADVANCED}, 
869         {"passdb backend", P_STRING, P_GLOBAL, &Globals.szPassdbBackend, NULL, NULL, FLAG_ADVANCED | FLAG_WIZARD}, 
870         {"algorithmic rid base", P_INTEGER, P_GLOBAL, &Globals.AlgorithmicRidBase, NULL, NULL, FLAG_ADVANCED}, 
871         {"root directory", P_STRING, P_GLOBAL, &Globals.szRootdir, NULL, NULL, FLAG_ADVANCED}, 
872         {"root dir", P_STRING, P_GLOBAL, &Globals.szRootdir, NULL, NULL, FLAG_HIDE}, 
873         {"root", P_STRING, P_GLOBAL, &Globals.szRootdir, NULL, NULL, FLAG_HIDE}, 
874         {"guest account", P_STRING, P_GLOBAL, &Globals.szGuestaccount, NULL, NULL, FLAG_BASIC | FLAG_ADVANCED}, 
875         {"enable privileges", P_BOOL, P_GLOBAL, &Globals.bEnablePrivileges, NULL, NULL, FLAG_ADVANCED}, 
876
877         {"pam password change", P_BOOL, P_GLOBAL, &Globals.bPamPasswordChange, NULL, NULL, FLAG_ADVANCED}, 
878         {"passwd program", P_STRING, P_GLOBAL, &Globals.szPasswdProgram, NULL, NULL, FLAG_ADVANCED}, 
879         {"passwd chat", P_STRING, P_GLOBAL, &Globals.szPasswdChat, NULL, NULL, FLAG_ADVANCED}, 
880         {"passwd chat debug", P_BOOL, P_GLOBAL, &Globals.bPasswdChatDebug, NULL, NULL, FLAG_ADVANCED}, 
881         {"passwd chat timeout", P_INTEGER, P_GLOBAL, &Globals.iPasswdChatTimeout, NULL, NULL, FLAG_ADVANCED}, 
882         {"check password script", P_STRING, P_GLOBAL, &Globals.szCheckPasswordScript, NULL, NULL, FLAG_ADVANCED}, 
883         {"username map", P_STRING, P_GLOBAL, &Globals.szUsernameMap, NULL, NULL, FLAG_ADVANCED}, 
884         {"password level", P_INTEGER, P_GLOBAL, &Globals.pwordlevel, NULL, NULL, FLAG_ADVANCED}, 
885         {"username level", P_INTEGER, P_GLOBAL, &Globals.unamelevel, NULL, NULL, FLAG_ADVANCED}, 
886         {"unix password sync", P_BOOL, P_GLOBAL, &Globals.bUnixPasswdSync, NULL, NULL, FLAG_ADVANCED}, 
887         {"restrict anonymous", P_INTEGER, P_GLOBAL, &Globals.restrict_anonymous, NULL, NULL, FLAG_ADVANCED}, 
888         {"lanman auth", P_BOOL, P_GLOBAL, &Globals.bLanmanAuth, NULL, NULL, FLAG_ADVANCED}, 
889         {"ntlm auth", P_BOOL, P_GLOBAL, &Globals.bNTLMAuth, NULL, NULL, FLAG_ADVANCED}, 
890         {"client NTLMv2 auth", P_BOOL, P_GLOBAL, &Globals.bClientNTLMv2Auth, NULL, NULL, FLAG_ADVANCED}, 
891         {"client lanman auth", P_BOOL, P_GLOBAL, &Globals.bClientLanManAuth, NULL, NULL, FLAG_ADVANCED}, 
892         {"client plaintext auth", P_BOOL, P_GLOBAL, &Globals.bClientPlaintextAuth, NULL, NULL, FLAG_ADVANCED}, 
893
894         {"username", P_STRING, P_LOCAL, &sDefault.szUsername, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_SHARE}, 
895         {"user", P_STRING, P_LOCAL, &sDefault.szUsername, NULL, NULL, FLAG_HIDE}, 
896         {"users", P_STRING, P_LOCAL, &sDefault.szUsername, NULL, NULL, FLAG_HIDE}, 
897
898         {"invalid users", P_LIST, P_LOCAL, &sDefault.szInvalidUsers, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_SHARE}, 
899         {"valid users", P_LIST, P_LOCAL, &sDefault.szValidUsers, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_SHARE}, 
900         {"admin users", P_LIST, P_LOCAL, &sDefault.szAdminUsers, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_SHARE}, 
901         {"read list", P_LIST, P_LOCAL, &sDefault.readlist, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_SHARE}, 
902         {"write list", P_LIST, P_LOCAL, &sDefault.writelist, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_SHARE}, 
903         {"printer admin", P_LIST, P_LOCAL, &sDefault.printer_admin, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_PRINT | FLAG_DEPRECATED }, 
904         {"force user", P_STRING, P_LOCAL, &sDefault.force_user, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
905         {"force group", P_STRING, P_LOCAL, &sDefault.force_group, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
906         {"group", P_STRING, P_LOCAL, &sDefault.force_group, NULL, NULL, FLAG_ADVANCED}, 
907
908         {"read only", P_BOOL, P_LOCAL, &sDefault.bRead_only, NULL, NULL, FLAG_BASIC | FLAG_ADVANCED | FLAG_SHARE}, 
909         {"write ok", P_BOOLREV, P_LOCAL, &sDefault.bRead_only, NULL, NULL, FLAG_HIDE}, 
910         {"writeable", P_BOOLREV, P_LOCAL, &sDefault.bRead_only, NULL, NULL, FLAG_HIDE}, 
911         {"writable", P_BOOLREV, P_LOCAL, &sDefault.bRead_only, NULL, NULL, FLAG_HIDE}, 
912
913         {"acl check permissions", P_BOOL, P_LOCAL, &sDefault.bAclCheckPermissions, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_SHARE},
914         {"acl group control", P_BOOL, P_LOCAL, &sDefault.bAclGroupControl, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_SHARE | FLAG_DEPRECATED },
915         {"acl map full control", P_BOOL, P_LOCAL, &sDefault.bAclMapFullControl, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_SHARE},
916         {"create mask", P_OCTAL, P_LOCAL, &sDefault.iCreate_mask, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_SHARE}, 
917         {"create mode", P_OCTAL, P_LOCAL, &sDefault.iCreate_mask, NULL, NULL, FLAG_HIDE}, 
918         {"force create mode", P_OCTAL, P_LOCAL, &sDefault.iCreate_force_mode, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_SHARE}, 
919         {"security mask", P_OCTAL, P_LOCAL, &sDefault.iSecurity_mask, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_SHARE}, 
920         {"force security mode", P_OCTAL, P_LOCAL, &sDefault.iSecurity_force_mode, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_SHARE}, 
921         {"directory mask", P_OCTAL, P_LOCAL, &sDefault.iDir_mask, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_SHARE}, 
922         {"directory mode", P_OCTAL, P_LOCAL, &sDefault.iDir_mask, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL}, 
923         {"force directory mode", P_OCTAL, P_LOCAL, &sDefault.iDir_force_mode, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_SHARE}, 
924         {"directory security mask", P_OCTAL, P_LOCAL, &sDefault.iDir_Security_mask, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_SHARE}, 
925         {"force directory security mode", P_OCTAL, P_LOCAL, &sDefault.iDir_Security_force_mode, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_SHARE}, 
926         {"force unknown acl user", P_BOOL, P_LOCAL, &sDefault.bForceUnknownAclUser, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_SHARE},
927         {"inherit permissions", P_BOOL, P_LOCAL, &sDefault.bInheritPerms, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
928         {"inherit acls", P_BOOL, P_LOCAL, &sDefault.bInheritACLS, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
929         {"inherit owner", P_BOOL, P_LOCAL, &sDefault.bInheritOwner, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
930         {"guest only", P_BOOL, P_LOCAL, &sDefault.bGuest_only, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
931         {"only guest", P_BOOL, P_LOCAL, &sDefault.bGuest_only, NULL, NULL, FLAG_HIDE}, 
932
933         {"guest ok", P_BOOL, P_LOCAL, &sDefault.bGuest_ok, NULL, NULL, FLAG_BASIC | FLAG_ADVANCED | FLAG_SHARE | FLAG_PRINT}, 
934         {"public", P_BOOL, P_LOCAL, &sDefault.bGuest_ok, NULL, NULL, FLAG_HIDE}, 
935
936         {"only user", P_BOOL, P_LOCAL, &sDefault.bOnlyUser, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_DEPRECATED}, 
937         {"hosts allow", P_LIST, P_LOCAL, &sDefault.szHostsallow, NULL, NULL, FLAG_GLOBAL | FLAG_BASIC | FLAG_ADVANCED | FLAG_SHARE | FLAG_PRINT}, 
938         {"allow hosts", P_LIST, P_LOCAL, &sDefault.szHostsallow, NULL, NULL, FLAG_HIDE}, 
939         {"hosts deny", P_LIST, P_LOCAL, &sDefault.szHostsdeny, NULL, NULL, FLAG_GLOBAL | FLAG_BASIC | FLAG_ADVANCED | FLAG_SHARE | FLAG_PRINT}, 
940         {"deny hosts", P_LIST, P_LOCAL, &sDefault.szHostsdeny, NULL, NULL, FLAG_HIDE}, 
941         {"preload modules", P_LIST, P_GLOBAL, &Globals.szPreloadModules, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL}, 
942         {"use kerberos keytab", P_BOOL, P_GLOBAL, &Globals.bUseKerberosKeytab, NULL, NULL, FLAG_ADVANCED}, 
943
944         {N_("Logging Options"), P_SEP, P_SEPARATOR}, 
945
946         {"log level", P_STRING, P_GLOBAL, &Globals.szLogLevel, handle_debug_list, NULL, FLAG_ADVANCED}, 
947         {"debuglevel", P_STRING, P_GLOBAL, &Globals.szLogLevel, handle_debug_list, NULL, FLAG_HIDE}, 
948         {"syslog", P_INTEGER, P_GLOBAL, &Globals.syslog, NULL, NULL, FLAG_ADVANCED}, 
949         {"syslog only", P_BOOL, P_GLOBAL, &Globals.bSyslogOnly, NULL, NULL, FLAG_ADVANCED}, 
950         {"log file", P_STRING, P_GLOBAL, &Globals.szLogFile, NULL, NULL, FLAG_ADVANCED}, 
951
952         {"max log size", P_INTEGER, P_GLOBAL, &Globals.max_log_size, NULL, NULL, FLAG_ADVANCED}, 
953         {"debug timestamp", P_BOOL, P_GLOBAL, &Globals.bTimestampLogs, NULL, NULL, FLAG_ADVANCED}, 
954         {"timestamp logs", P_BOOL, P_GLOBAL, &Globals.bTimestampLogs, NULL, NULL, FLAG_ADVANCED}, 
955         {"debug hires timestamp", P_BOOL, P_GLOBAL, &Globals.bDebugHiresTimestamp, NULL, NULL, FLAG_ADVANCED}, 
956         {"debug pid", P_BOOL, P_GLOBAL, &Globals.bDebugPid, NULL, NULL, FLAG_ADVANCED}, 
957         {"debug uid", P_BOOL, P_GLOBAL, &Globals.bDebugUid, NULL, NULL, FLAG_ADVANCED}, 
958         {"enable core files", P_BOOL, P_GLOBAL, &Globals.bEnableCoreFiles, NULL, NULL, FLAG_ADVANCED},
959
960         {N_("Protocol Options"), P_SEP, P_SEPARATOR}, 
961
962         {"allocation roundup size", P_INTEGER, P_LOCAL, &sDefault.iallocation_roundup_size, NULL, NULL, FLAG_ADVANCED}, 
963         {"aio read size", P_INTEGER, P_LOCAL, &sDefault.iAioReadSize, NULL, NULL, FLAG_ADVANCED}, 
964         {"aio write size", P_INTEGER, P_LOCAL, &sDefault.iAioWriteSize, NULL, NULL, FLAG_ADVANCED}, 
965         {"smb ports", P_STRING, P_GLOBAL, &Globals.smb_ports, NULL, NULL, FLAG_ADVANCED}, 
966         {"large readwrite", P_BOOL, P_GLOBAL, &Globals.bLargeReadwrite, NULL, NULL, FLAG_ADVANCED}, 
967         {"max protocol", P_ENUM, P_GLOBAL, &Globals.maxprotocol, NULL, enum_protocol, FLAG_ADVANCED}, 
968         {"protocol", P_ENUM, P_GLOBAL, &Globals.maxprotocol, NULL, enum_protocol, FLAG_ADVANCED}, 
969         {"min protocol", P_ENUM, P_GLOBAL, &Globals.minprotocol, NULL, enum_protocol, FLAG_ADVANCED}, 
970         {"read bmpx", P_BOOL, P_GLOBAL, &Globals.bReadbmpx, NULL, NULL, FLAG_ADVANCED}, 
971         {"read raw", P_BOOL, P_GLOBAL, &Globals.bReadRaw, NULL, NULL, FLAG_ADVANCED}, 
972         {"write raw", P_BOOL, P_GLOBAL, &Globals.bWriteRaw, NULL, NULL, FLAG_ADVANCED}, 
973         {"disable netbios", P_BOOL, P_GLOBAL, &Globals.bDisableNetbios, NULL, NULL, FLAG_ADVANCED}, 
974         {"reset on zero vc", P_BOOL, P_GLOBAL, &Globals.bResetOnZeroVC, NULL, NULL, FLAG_ADVANCED}, 
975
976         {"acl compatibility", P_ENUM, P_GLOBAL, &Globals.iAclCompat, NULL,  enum_acl_compat_vals, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
977         {"defer sharing violations", P_BOOL, P_GLOBAL, &Globals.bDeferSharingViolations, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL},
978         {"ea support", P_BOOL, P_LOCAL, &sDefault.bEASupport, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
979         {"nt acl support", P_BOOL, P_LOCAL, &sDefault.bNTAclSupport, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
980         {"nt pipe support", P_BOOL, P_GLOBAL, &Globals.bNTPipeSupport, NULL, NULL, FLAG_ADVANCED}, 
981         {"nt status support", P_BOOL, P_GLOBAL, &Globals.bNTStatusSupport, NULL, NULL, FLAG_ADVANCED}, 
982         {"profile acls", P_BOOL, P_LOCAL, &sDefault.bProfileAcls, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_SHARE}, 
983
984         {"announce version", P_STRING, P_GLOBAL, &Globals.szAnnounceVersion, NULL, NULL, FLAG_ADVANCED}, 
985         {"announce as", P_ENUM, P_GLOBAL, &Globals.announce_as, NULL, enum_announce_as,  FLAG_ADVANCED}, 
986         {"map acl inherit", P_BOOL, P_LOCAL, &sDefault.bMap_acl_inherit, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
987         {"afs share", P_BOOL, P_LOCAL, &sDefault.bAfs_Share, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL},
988         {"max mux", P_INTEGER, P_GLOBAL, &Globals.max_mux, NULL, NULL, FLAG_ADVANCED}, 
989         {"max xmit", P_INTEGER, P_GLOBAL, &Globals.max_xmit, NULL, NULL, FLAG_ADVANCED}, 
990
991         {"name resolve order", P_STRING, P_GLOBAL, &Globals.szNameResolveOrder, NULL, NULL, FLAG_ADVANCED | FLAG_WIZARD}, 
992         {"max ttl", P_INTEGER, P_GLOBAL, &Globals.max_ttl, NULL, NULL, FLAG_ADVANCED}, 
993         {"max wins ttl", P_INTEGER, P_GLOBAL, &Globals.max_wins_ttl, NULL, NULL, FLAG_ADVANCED}, 
994         {"min wins ttl", P_INTEGER, P_GLOBAL, &Globals.min_wins_ttl, NULL, NULL, FLAG_ADVANCED}, 
995         {"time server", P_BOOL, P_GLOBAL, &Globals.bTimeServer, NULL, NULL, FLAG_ADVANCED}, 
996         {"unix extensions", P_BOOL, P_GLOBAL, &Globals.bUnixExtensions, NULL, NULL, FLAG_ADVANCED}, 
997         {"use spnego", P_BOOL, P_GLOBAL, &Globals.bUseSpnego, NULL, NULL, FLAG_ADVANCED}, 
998         {"client signing", P_ENUM, P_GLOBAL, &Globals.client_signing, NULL, enum_smb_signing_vals, FLAG_ADVANCED}, 
999         {"server signing", P_ENUM, P_GLOBAL, &Globals.server_signing, NULL, enum_smb_signing_vals, FLAG_ADVANCED}, 
1000         {"client use spnego", P_BOOL, P_GLOBAL, &Globals.bClientUseSpnego, NULL, NULL, FLAG_ADVANCED}, 
1001
1002         {"enable asu support", P_BOOL, P_GLOBAL, &Globals.bASUSupport, NULL, NULL, FLAG_ADVANCED}, 
1003         {"svcctl list", P_LIST, P_GLOBAL, &Globals.szServicesList, NULL, NULL, FLAG_ADVANCED},
1004
1005         {N_("Tuning Options"), P_SEP, P_SEPARATOR}, 
1006
1007         {"block size", P_INTEGER, P_LOCAL, &sDefault.iBlock_size, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1008         {"deadtime", P_INTEGER, P_GLOBAL, &Globals.deadtime, NULL, NULL, FLAG_ADVANCED}, 
1009         {"getwd cache", P_BOOL, P_GLOBAL, &use_getwd_cache, NULL, NULL, FLAG_ADVANCED}, 
1010         {"keepalive", P_INTEGER, P_GLOBAL, &keepalive, NULL, NULL, FLAG_ADVANCED}, 
1011         {"change notify", P_BOOL, P_LOCAL, &sDefault.bChangeNotify, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE },
1012         {"kernel change notify", P_BOOL, P_LOCAL, &sDefault.bKernelChangeNotify, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE },
1013
1014         {"lpq cache time", P_INTEGER, P_GLOBAL, &Globals.lpqcachetime, NULL, NULL, FLAG_ADVANCED}, 
1015         {"max smbd processes", P_INTEGER, P_GLOBAL, &Globals.iMaxSmbdProcesses, NULL, NULL, FLAG_ADVANCED}, 
1016         {"max connections", P_INTEGER, P_LOCAL, &sDefault.iMaxConnections, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
1017         {"paranoid server security", P_BOOL, P_GLOBAL, &Globals.paranoid_server_security, NULL, NULL, FLAG_ADVANCED}, 
1018         {"max disk size", P_INTEGER, P_GLOBAL, &Globals.maxdisksize, NULL, NULL, FLAG_ADVANCED}, 
1019         {"max open files", P_INTEGER, P_GLOBAL, &Globals.max_open_files, NULL, NULL, FLAG_ADVANCED}, 
1020         {"min print space", P_INTEGER, P_LOCAL, &sDefault.iMinPrintSpace, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT}, 
1021         {"open files database hash size", P_INTEGER, P_GLOBAL, &Globals.open_files_db_hash_size, NULL, NULL, FLAG_ADVANCED}, 
1022
1023         {"socket options", P_GSTRING, P_GLOBAL, user_socket_options, NULL, NULL, FLAG_ADVANCED}, 
1024         {"strict allocate", P_BOOL, P_LOCAL, &sDefault.bStrictAllocate, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
1025         {"strict sync", P_BOOL, P_LOCAL, &sDefault.bStrictSync, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
1026         {"sync always", P_BOOL, P_LOCAL, &sDefault.bSyncAlways, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
1027         {"use mmap", P_BOOL, P_GLOBAL, &Globals.bUseMmap, NULL, NULL, FLAG_ADVANCED}, 
1028         {"use sendfile", P_BOOL, P_LOCAL, &sDefault.bUseSendfile, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
1029         {"hostname lookups", P_BOOL, P_GLOBAL, &Globals.bHostnameLookups, NULL, NULL, FLAG_ADVANCED}, 
1030         {"write cache size", P_INTEGER, P_LOCAL, &sDefault.iWriteCacheSize, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_DEPRECATED}, 
1031
1032         {"name cache timeout", P_INTEGER, P_GLOBAL, &Globals.name_cache_timeout, NULL, NULL, FLAG_ADVANCED}, 
1033
1034         {N_("Printing Options"), P_SEP, P_SEPARATOR}, 
1035
1036         {"max reported print jobs", P_INTEGER, P_LOCAL, &sDefault.iMaxReportedPrintJobs, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT}, 
1037         {"max print jobs", P_INTEGER, P_LOCAL, &sDefault.iMaxPrintJobs, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT}, 
1038         {"load printers", P_BOOL, P_GLOBAL, &Globals.bLoadPrinters, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT}, 
1039         {"printcap cache time", P_INTEGER, P_GLOBAL, &Globals.PrintcapCacheTime, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT}, 
1040         {"printcap name", P_STRING, P_GLOBAL, &Globals.szPrintcapname, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT}, 
1041         {"printcap", P_STRING, P_GLOBAL, &Globals.szPrintcapname, NULL, NULL, FLAG_HIDE}, 
1042         {"printable", P_BOOL, P_LOCAL, &sDefault.bPrint_ok, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT}, 
1043         {"print ok", P_BOOL, P_LOCAL, &sDefault.bPrint_ok, NULL, NULL, FLAG_HIDE}, 
1044         {"printing", P_ENUM, P_LOCAL, &sDefault.iPrinting, handle_printing, enum_printing, FLAG_ADVANCED | FLAG_PRINT | FLAG_GLOBAL}, 
1045         {"cups options", P_STRING, P_LOCAL, &sDefault.szCupsOptions, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT | FLAG_GLOBAL}, 
1046         {"cups server", P_STRING, P_GLOBAL, &Globals.szCupsServer, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT | FLAG_GLOBAL}, 
1047         {"iprint server", P_STRING, P_GLOBAL, &Globals.szIPrintServer, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT | FLAG_GLOBAL}, 
1048         {"print command", P_STRING, P_LOCAL, &sDefault.szPrintcommand, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT | FLAG_GLOBAL}, 
1049         {"disable spoolss", P_BOOL, P_GLOBAL, &Globals.bDisableSpoolss, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT | FLAG_GLOBAL}, 
1050         {"enable spoolss", P_BOOLREV, P_GLOBAL, &Globals.bDisableSpoolss, NULL, NULL, FLAG_HIDE}, 
1051         {"lpq command", P_STRING, P_LOCAL, &sDefault.szLpqcommand, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT | FLAG_GLOBAL}, 
1052         {"lprm command", P_STRING, P_LOCAL, &sDefault.szLprmcommand, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT | FLAG_GLOBAL}, 
1053         {"lppause command", P_STRING, P_LOCAL, &sDefault.szLppausecommand, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT | FLAG_GLOBAL}, 
1054         {"lpresume command", P_STRING, P_LOCAL, &sDefault.szLpresumecommand, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT | FLAG_GLOBAL}, 
1055         {"queuepause command", P_STRING, P_LOCAL, &sDefault.szQueuepausecommand, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT | FLAG_GLOBAL}, 
1056         {"queueresume command", P_STRING, P_LOCAL, &sDefault.szQueueresumecommand, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT | FLAG_GLOBAL}, 
1057
1058         {"addport command", P_STRING, P_GLOBAL, &Globals.szAddPortCommand, NULL, NULL, FLAG_ADVANCED}, 
1059         {"enumports command", P_STRING, P_GLOBAL, &Globals.szEnumPortsCommand, NULL, NULL, FLAG_ADVANCED}, 
1060         {"addprinter command", P_STRING, P_GLOBAL, &Globals.szAddPrinterCommand, NULL, NULL, FLAG_ADVANCED}, 
1061         {"deleteprinter command", P_STRING, P_GLOBAL, &Globals.szDeletePrinterCommand, NULL, NULL, FLAG_ADVANCED}, 
1062         {"show add printer wizard", P_BOOL, P_GLOBAL, &Globals.bMsAddPrinterWizard, NULL, NULL, FLAG_ADVANCED}, 
1063         {"os2 driver map", P_STRING, P_GLOBAL, &Globals.szOs2DriverMap, NULL, NULL, FLAG_ADVANCED}, 
1064
1065         {"printer name", P_STRING, P_LOCAL, &sDefault.szPrintername, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT}, 
1066         {"printer", P_STRING, P_LOCAL, &sDefault.szPrintername, NULL, NULL, FLAG_HIDE}, 
1067         {"use client driver", P_BOOL, P_LOCAL, &sDefault.bUseClientDriver, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT}, 
1068         {"default devmode", P_BOOL, P_LOCAL, &sDefault.bDefaultDevmode, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT}, 
1069         {"force printername", P_BOOL, P_LOCAL, &sDefault.bForcePrintername, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT}, 
1070         {"printjob username", P_STRING, P_LOCAL, &sDefault.szPrintjobUsername, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT},
1071
1072         {N_("Filename Handling"), P_SEP, P_SEPARATOR}, 
1073         {"mangling method", P_STRING, P_GLOBAL, &Globals.szManglingMethod, NULL, NULL, FLAG_ADVANCED}, 
1074         {"mangle prefix", P_INTEGER, P_GLOBAL, &Globals.mangle_prefix, NULL, NULL, FLAG_ADVANCED}, 
1075
1076         {"default case", P_ENUM, P_LOCAL, &sDefault.iDefaultCase, NULL, enum_case, FLAG_ADVANCED | FLAG_SHARE}, 
1077         {"case sensitive", P_ENUM, P_LOCAL, &sDefault.iCaseSensitive, NULL, enum_bool_auto, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1078         {"casesignames", P_ENUM, P_LOCAL, &sDefault.iCaseSensitive, NULL, enum_bool_auto, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL | FLAG_HIDE}, 
1079         {"preserve case", P_BOOL, P_LOCAL, &sDefault.bCasePreserve, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1080         {"short preserve case", P_BOOL, P_LOCAL, &sDefault.bShortCasePreserve, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1081         {"mangling char", P_CHAR, P_LOCAL, &sDefault.magic_char, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1082         {"hide dot files", P_BOOL, P_LOCAL, &sDefault.bHideDotFiles, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1083         {"hide special files", P_BOOL, P_LOCAL, &sDefault.bHideSpecialFiles, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1084         {"hide unreadable", P_BOOL, P_LOCAL, &sDefault.bHideUnReadable, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1085         {"hide unwriteable files", P_BOOL, P_LOCAL, &sDefault.bHideUnWriteableFiles, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1086         {"delete veto files", P_BOOL, P_LOCAL, &sDefault.bDeleteVetoFiles, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1087         {"veto files", P_STRING, P_LOCAL, &sDefault.szVetoFiles, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL }, 
1088         {"hide files", P_STRING, P_LOCAL, &sDefault.szHideFiles, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL }, 
1089         {"veto oplock files", P_STRING, P_LOCAL, &sDefault.szVetoOplockFiles, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL }, 
1090         {"map archive", P_BOOL, P_LOCAL, &sDefault.bMap_archive, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1091         {"map hidden", P_BOOL, P_LOCAL, &sDefault.bMap_hidden, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1092         {"map system", P_BOOL, P_LOCAL, &sDefault.bMap_system, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1093         {"map readonly", P_ENUM, P_LOCAL, &sDefault.iMap_readonly, NULL, enum_map_readonly, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1094         {"mangled names", P_BOOL, P_LOCAL, &sDefault.bMangledNames, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1095         {"mangled map", P_STRING, P_LOCAL, &sDefault.szMangledMap, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL | FLAG_DEPRECATED }, 
1096         {"max stat cache size", P_INTEGER, P_GLOBAL, &Globals.iMaxStatCacheSize, NULL, NULL, FLAG_ADVANCED}, 
1097         {"stat cache", P_BOOL, P_GLOBAL, &Globals.bStatCache, NULL, NULL, FLAG_ADVANCED}, 
1098         {"store dos attributes", P_BOOL, P_LOCAL, &sDefault.bStoreDosAttributes, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1099         {"dmapi support", P_BOOL, P_LOCAL, &sDefault.bDmapiSupport, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL},
1100
1101
1102         {N_("Domain Options"), P_SEP, P_SEPARATOR}, 
1103
1104         {"machine password timeout", P_INTEGER, P_GLOBAL, &Globals.machine_password_timeout, NULL, NULL, FLAG_ADVANCED | FLAG_WIZARD}, 
1105
1106         {N_("Logon Options"), P_SEP, P_SEPARATOR}, 
1107
1108         {"add user script", P_STRING, P_GLOBAL, &Globals.szAddUserScript, NULL, NULL, FLAG_ADVANCED}, 
1109         {"rename user script", P_STRING, P_GLOBAL, &Globals.szRenameUserScript, NULL, NULL, FLAG_ADVANCED},
1110         {"delete user script", P_STRING, P_GLOBAL, &Globals.szDelUserScript, NULL, NULL, FLAG_ADVANCED}, 
1111         {"add group script", P_STRING, P_GLOBAL, &Globals.szAddGroupScript, NULL, NULL, FLAG_ADVANCED}, 
1112         {"delete group script", P_STRING, P_GLOBAL, &Globals.szDelGroupScript, NULL, NULL, FLAG_ADVANCED}, 
1113         {"add user to group script", P_STRING, P_GLOBAL, &Globals.szAddUserToGroupScript, NULL, NULL, FLAG_ADVANCED}, 
1114         {"delete user from group script", P_STRING, P_GLOBAL, &Globals.szDelUserFromGroupScript, NULL, NULL, FLAG_ADVANCED}, 
1115         {"set primary group script", P_STRING, P_GLOBAL, &Globals.szSetPrimaryGroupScript, NULL, NULL, FLAG_ADVANCED}, 
1116         {"add machine script", P_STRING, P_GLOBAL, &Globals.szAddMachineScript, NULL, NULL, FLAG_ADVANCED}, 
1117         {"shutdown script", P_STRING, P_GLOBAL, &Globals.szShutdownScript, NULL, NULL, FLAG_ADVANCED}, 
1118         {"abort shutdown script", P_STRING, P_GLOBAL, &Globals.szAbortShutdownScript, NULL, NULL, FLAG_ADVANCED}, 
1119         {"username map script", P_STRING, P_GLOBAL, &Globals.szUsernameMapScript, NULL, NULL, FLAG_ADVANCED}, 
1120
1121         {"logon script", P_STRING, P_GLOBAL, &Globals.szLogonScript, NULL, NULL, FLAG_ADVANCED}, 
1122         {"logon path", P_STRING, P_GLOBAL, &Globals.szLogonPath, NULL, NULL, FLAG_ADVANCED}, 
1123         {"logon drive", P_STRING, P_GLOBAL, &Globals.szLogonDrive, NULL, NULL, FLAG_ADVANCED}, 
1124         {"logon home", P_STRING, P_GLOBAL, &Globals.szLogonHome, NULL, NULL, FLAG_ADVANCED}, 
1125         {"domain logons", P_BOOL, P_GLOBAL, &Globals.bDomainLogons, NULL, NULL, FLAG_ADVANCED}, 
1126
1127         {N_("Browse Options"), P_SEP, P_SEPARATOR}, 
1128
1129         {"os level", P_INTEGER, P_GLOBAL, &Globals.os_level, NULL, NULL, FLAG_BASIC | FLAG_ADVANCED}, 
1130         {"lm announce", P_ENUM, P_GLOBAL, &Globals.lm_announce, NULL, enum_bool_auto, FLAG_ADVANCED}, 
1131         {"lm interval", P_INTEGER, P_GLOBAL, &Globals.lm_interval, NULL, NULL, FLAG_ADVANCED}, 
1132         {"preferred master", P_ENUM, P_GLOBAL, &Globals.bPreferredMaster, NULL, enum_bool_auto, FLAG_BASIC | FLAG_ADVANCED}, 
1133         {"prefered master", P_ENUM, P_GLOBAL, &Globals.bPreferredMaster, NULL, enum_bool_auto, FLAG_HIDE}, 
1134         {"local master", P_BOOL, P_GLOBAL, &Globals.bLocalMaster, NULL, NULL, FLAG_BASIC | FLAG_ADVANCED}, 
1135         {"domain master", P_ENUM, P_GLOBAL, &Globals.bDomainMaster, NULL, enum_bool_auto, FLAG_BASIC | FLAG_ADVANCED}, 
1136         {"browse list", P_BOOL, P_GLOBAL, &Globals.bBrowseList, NULL, NULL, FLAG_ADVANCED}, 
1137         {"browseable", P_BOOL, P_LOCAL, &sDefault.bBrowseable, NULL, NULL, FLAG_BASIC | FLAG_ADVANCED | FLAG_SHARE | FLAG_PRINT}, 
1138         {"browsable", P_BOOL, P_LOCAL, &sDefault.bBrowseable, NULL, NULL, FLAG_HIDE}, 
1139         {"enhanced browsing", P_BOOL, P_GLOBAL, &Globals.enhanced_browsing, NULL, NULL, FLAG_ADVANCED}, 
1140
1141         {N_("WINS Options"), P_SEP, P_SEPARATOR}, 
1142
1143         {"dns proxy", P_BOOL, P_GLOBAL, &Globals.bDNSproxy, NULL, NULL, FLAG_ADVANCED}, 
1144         {"wins proxy", P_BOOL, P_GLOBAL, &Globals.bWINSproxy, NULL, NULL, FLAG_ADVANCED}, 
1145
1146         {"wins server", P_LIST, P_GLOBAL, &Globals.szWINSservers, NULL, NULL, FLAG_BASIC | FLAG_ADVANCED | FLAG_WIZARD}, 
1147         {"wins support", P_BOOL, P_GLOBAL, &Globals.bWINSsupport, NULL, NULL, FLAG_BASIC | FLAG_ADVANCED | FLAG_WIZARD}, 
1148         {"wins hook", P_STRING, P_GLOBAL, &Globals.szWINSHook, NULL, NULL, FLAG_ADVANCED}, 
1149
1150         {N_("Locking Options"), P_SEP, P_SEPARATOR}, 
1151
1152         {"blocking locks", P_BOOL, P_LOCAL, &sDefault.bBlockingLocks, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1153         {"csc policy", P_ENUM, P_LOCAL, &sDefault.iCSCPolicy, NULL, enum_csc_policy, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1154         {"fake oplocks", P_BOOL, P_LOCAL, &sDefault.bFakeOplocks, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
1155         {"kernel oplocks", P_BOOL, P_GLOBAL, &Globals.bKernelOplocks, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL}, 
1156         {"locking", P_BOOL, P_LOCAL, &sDefault.bLocking, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1157         {"lock spin count", P_INTEGER, P_GLOBAL, &Globals.iLockSpinCount, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL}, 
1158         {"lock spin time", P_INTEGER, P_GLOBAL, &Globals.iLockSpinTime, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL}, 
1159
1160         {"oplocks", P_BOOL, P_LOCAL, &sDefault.bOpLocks, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1161         {"level2 oplocks", P_BOOL, P_LOCAL, &sDefault.bLevel2OpLocks, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1162         {"oplock break wait time", P_INTEGER, P_GLOBAL, &Globals.oplock_break_wait_time, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL}, 
1163         {"oplock contention limit", P_INTEGER, P_LOCAL, &sDefault.iOplockContentionLimit, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1164         {"posix locking", P_BOOL, P_LOCAL, &sDefault.bPosixLocking, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1165         {"strict locking", P_ENUM, P_LOCAL, &sDefault.iStrictLocking, NULL, enum_bool_auto, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1166         {"share modes", P_BOOL, P_LOCAL,  &sDefault.bShareModes, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1167
1168         {N_("Ldap Options"), P_SEP, P_SEPARATOR}, 
1169
1170         {"ldap admin dn", P_STRING, P_GLOBAL, &Globals.szLdapAdminDn, NULL, NULL, FLAG_ADVANCED}, 
1171         {"ldap delete dn", P_BOOL, P_GLOBAL, &Globals.ldap_delete_dn, NULL, NULL, FLAG_ADVANCED}, 
1172         {"ldap group suffix", P_STRING, P_GLOBAL, &Globals.szLdapGroupSuffix, NULL, NULL, FLAG_ADVANCED}, 
1173         {"ldap idmap suffix", P_STRING, P_GLOBAL, &Globals.szLdapIdmapSuffix, NULL, NULL, FLAG_ADVANCED}, 
1174         {"ldap machine suffix", P_STRING, P_GLOBAL, &Globals.szLdapMachineSuffix, NULL, NULL, FLAG_ADVANCED}, 
1175         {"ldap passwd sync", P_ENUM, P_GLOBAL, &Globals.ldap_passwd_sync, NULL, enum_ldap_passwd_sync, FLAG_ADVANCED}, 
1176         {"ldap password sync", P_ENUM, P_GLOBAL, &Globals.ldap_passwd_sync, NULL, enum_ldap_passwd_sync, FLAG_HIDE}, 
1177         {"ldap replication sleep", P_INTEGER, P_GLOBAL, &Globals.ldap_replication_sleep, NULL, NULL, FLAG_ADVANCED},
1178         {"ldap suffix", P_STRING, P_GLOBAL, &Globals.szLdapSuffix, NULL, NULL, FLAG_ADVANCED}, 
1179         {"ldap ssl", P_ENUM, P_GLOBAL, &Globals.ldap_ssl, NULL, enum_ldap_ssl, FLAG_ADVANCED}, 
1180         {"ldap timeout", P_INTEGER, P_GLOBAL, &Globals.ldap_timeout, NULL, NULL, FLAG_ADVANCED},
1181         {"ldap page size", P_INTEGER, P_GLOBAL, &Globals.ldap_page_size, NULL, NULL, FLAG_ADVANCED},
1182         {"ldap user suffix", P_STRING, P_GLOBAL, &Globals.szLdapUserSuffix, NULL, NULL, FLAG_ADVANCED}, 
1183
1184         {N_("Miscellaneous Options"), P_SEP, P_SEPARATOR}, 
1185         {"add share command", P_STRING, P_GLOBAL, &Globals.szAddShareCommand, NULL, NULL, FLAG_ADVANCED}, 
1186         {"change share command", P_STRING, P_GLOBAL, &Globals.szChangeShareCommand, NULL, NULL, FLAG_ADVANCED}, 
1187         {"delete share command", P_STRING, P_GLOBAL, &Globals.szDeleteShareCommand, NULL, NULL, FLAG_ADVANCED}, 
1188
1189         {N_("EventLog Options"), P_SEP, P_SEPARATOR}, 
1190         {"eventlog list",  P_LIST, P_GLOBAL, &Globals.szEventLogs, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_SHARE}, 
1191         
1192         {"config file", P_STRING, P_GLOBAL, &Globals.szConfigFile, NULL, NULL, FLAG_HIDE}, 
1193         {"preload", P_STRING, P_GLOBAL, &Globals.szAutoServices, NULL, NULL, FLAG_ADVANCED}, 
1194         {"auto services", P_STRING, P_GLOBAL, &Globals.szAutoServices, NULL, NULL, FLAG_ADVANCED}, 
1195         {"lock directory", P_STRING, P_GLOBAL, &Globals.szLockDir, NULL, NULL, FLAG_ADVANCED}, 
1196         {"lock dir", P_STRING, P_GLOBAL, &Globals.szLockDir, NULL, NULL, FLAG_HIDE}, 
1197         {"pid directory", P_STRING, P_GLOBAL, &Globals.szPidDir, NULL, NULL, FLAG_ADVANCED}, 
1198 #ifdef WITH_UTMP
1199         {"utmp directory", P_STRING, P_GLOBAL, &Globals.szUtmpDir, NULL, NULL, FLAG_ADVANCED}, 
1200         {"wtmp directory", P_STRING, P_GLOBAL, &Globals.szWtmpDir, NULL, NULL, FLAG_ADVANCED}, 
1201         {"utmp", P_BOOL, P_GLOBAL, &Globals.bUtmp, NULL, NULL, FLAG_ADVANCED}, 
1202 #endif
1203
1204         {"default service", P_STRING, P_GLOBAL, &Globals.szDefaultService, NULL, NULL, FLAG_ADVANCED}, 
1205         {"default", P_STRING, P_GLOBAL, &Globals.szDefaultService, NULL, NULL, FLAG_ADVANCED}, 
1206         {"message command", P_STRING, P_GLOBAL, &Globals.szMsgCommand, NULL, NULL, FLAG_ADVANCED}, 
1207         {"dfree cache time", P_INTEGER, P_LOCAL, &sDefault.iDfreeCacheTime, NULL, NULL, FLAG_ADVANCED}, 
1208         {"dfree command", P_STRING, P_LOCAL, &sDefault.szDfree, NULL, NULL, FLAG_ADVANCED}, 
1209         {"get quota command", P_STRING, P_GLOBAL, &Globals.szGetQuota, NULL, NULL, FLAG_ADVANCED}, 
1210         {"set quota command", P_STRING, P_GLOBAL, &Globals.szSetQuota, NULL, NULL, FLAG_ADVANCED}, 
1211         {"remote announce", P_STRING, P_GLOBAL, &Globals.szRemoteAnnounce, NULL, NULL, FLAG_ADVANCED}, 
1212         {"remote browse sync", P_STRING, P_GLOBAL, &Globals.szRemoteBrowseSync, NULL, NULL, FLAG_ADVANCED}, 
1213         {"socket address", P_STRING, P_GLOBAL, &Globals.szSocketAddress, NULL, NULL, FLAG_ADVANCED}, 
1214         {"homedir map", P_STRING, P_GLOBAL, &Globals.szNISHomeMapName, NULL, NULL, FLAG_ADVANCED}, 
1215         {"afs username map", P_STRING, P_GLOBAL, &Globals.szAfsUsernameMap, NULL, NULL, FLAG_ADVANCED}, 
1216         {"afs token lifetime", P_INTEGER, P_GLOBAL, &Globals.iAfsTokenLifetime, NULL, NULL, FLAG_ADVANCED},
1217         {"log nt token command", P_STRING, P_GLOBAL, &Globals.szLogNtTokenCommand, NULL, NULL, FLAG_ADVANCED},
1218         {"time offset", P_INTEGER, P_GLOBAL, &extra_time_offset, NULL, NULL, FLAG_ADVANCED}, 
1219         {"NIS homedir", P_BOOL, P_GLOBAL, &Globals.bNISHomeMap, NULL, NULL, FLAG_ADVANCED}, 
1220         {"-valid", P_BOOL, P_LOCAL, &sDefault.valid, NULL, NULL, FLAG_HIDE}, 
1221
1222         {"copy", P_STRING, P_LOCAL, &sDefault.szCopy, handle_copy, NULL, FLAG_HIDE}, 
1223         {"include", P_STRING, P_LOCAL, &sDefault.szInclude, handle_include, NULL, FLAG_HIDE}, 
1224         {"preexec", P_STRING, P_LOCAL, &sDefault.szPreExec, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_PRINT}, 
1225         {"exec", P_STRING, P_LOCAL, &sDefault.szPreExec, NULL, NULL, FLAG_ADVANCED}, 
1226
1227         {"preexec close", P_BOOL, P_LOCAL, &sDefault.bPreexecClose, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
1228         {"postexec", P_STRING, P_LOCAL, &sDefault.szPostExec, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_PRINT}, 
1229         {"root preexec", P_STRING, P_LOCAL, &sDefault.szRootPreExec, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_PRINT}, 
1230         {"root preexec close", P_BOOL, P_LOCAL, &sDefault.bRootpreexecClose, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
1231         {"root postexec", P_STRING, P_LOCAL, &sDefault.szRootPostExec, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_PRINT}, 
1232         {"available", P_BOOL, P_LOCAL, &sDefault.bAvailable, NULL, NULL, FLAG_BASIC | FLAG_ADVANCED | FLAG_SHARE | FLAG_PRINT}, 
1233         {"registry shares", P_BOOL, P_GLOBAL, &Globals.bRegistryShares, NULL, NULL, FLAG_ADVANCED},
1234         {"usershare allow guests", P_BOOL, P_GLOBAL, &Globals.bUsershareAllowGuests, NULL, NULL, FLAG_ADVANCED},
1235         {"usershare max shares", P_INTEGER, P_GLOBAL, &Globals.iUsershareMaxShares, NULL, NULL, FLAG_ADVANCED},
1236         {"usershare owner only", P_BOOL, P_GLOBAL, &Globals.bUsershareOwnerOnly, NULL, NULL, FLAG_ADVANCED}, 
1237         {"usershare path", P_STRING, P_GLOBAL, &Globals.szUsersharePath, NULL, NULL, FLAG_ADVANCED},
1238         {"usershare prefix allow list", P_LIST, P_GLOBAL, &Globals.szUsersharePrefixAllowList, NULL, NULL, FLAG_ADVANCED}, 
1239         {"usershare prefix deny list", P_LIST, P_GLOBAL, &Globals.szUsersharePrefixDenyList, NULL, NULL, FLAG_ADVANCED}, 
1240         {"usershare template share", P_STRING, P_GLOBAL, &Globals.szUsershareTemplateShare, NULL, NULL, FLAG_ADVANCED},
1241         {"volume", P_STRING, P_LOCAL, &sDefault.volume, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE }, 
1242         {"fstype", P_STRING, P_LOCAL, &sDefault.fstype, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
1243         {"set directory", P_BOOLREV, P_LOCAL, &sDefault.bNo_set_dir, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
1244         {"wide links", P_BOOL, P_LOCAL, &sDefault.bWidelinks, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1245         {"follow symlinks", P_BOOL, P_LOCAL, &sDefault.bSymlinks, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1246         {"dont descend", P_STRING, P_LOCAL, &sDefault.szDontdescend, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
1247         {"magic script", P_STRING, P_LOCAL, &sDefault.szMagicScript, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
1248         {"magic output", P_STRING, P_LOCAL, &sDefault.szMagicOutput, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
1249         {"delete readonly", P_BOOL, P_LOCAL, &sDefault.bDeleteReadonly, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1250         {"dos filemode", P_BOOL, P_LOCAL, &sDefault.bDosFilemode, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1251         {"dos filetimes", P_BOOL, P_LOCAL, &sDefault.bDosFiletimes, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1252         {"dos filetime resolution", P_BOOL, P_LOCAL, &sDefault.bDosFiletimeResolution, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1253
1254         {"fake directory create times", P_BOOL, P_LOCAL, &sDefault.bFakeDirCreateTimes, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1255         {"panic action", P_STRING, P_GLOBAL, &Globals.szPanicAction, NULL, NULL, FLAG_ADVANCED}, 
1256
1257         {N_("VFS module options"), P_SEP, P_SEPARATOR}, 
1258
1259         {"vfs objects", P_LIST, P_LOCAL, &sDefault.szVfsObjects, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
1260         {"vfs object", P_LIST, P_LOCAL, &sDefault.szVfsObjects, NULL, NULL, FLAG_HIDE}, 
1261
1262
1263         {"msdfs root", P_BOOL, P_LOCAL, &sDefault.bMSDfsRoot, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
1264         {"msdfs proxy", P_STRING, P_LOCAL, &sDefault.szMSDfsProxy, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
1265         {"host msdfs", P_BOOL, P_GLOBAL, &Globals.bHostMSDfs, NULL, NULL, FLAG_ADVANCED}, 
1266
1267         {N_("Winbind options"), P_SEP, P_SEPARATOR}, 
1268
1269         {"passdb expand explicit", P_BOOL, P_GLOBAL, &Globals.bPassdbExpandExplicit, NULL, NULL, FLAG_ADVANCED},
1270         {"idmap domains", P_LIST, P_GLOBAL, &Globals.szIdmapDomains, NULL, NULL, FLAG_ADVANCED}, 
1271         {"idmap backend", P_LIST, P_GLOBAL, &Globals.szIdmapBackend, NULL, NULL, FLAG_ADVANCED | FLAG_DEPRECATED }, 
1272         {"idmap alloc backend", P_STRING, P_GLOBAL, &Globals.szIdmapAllocBackend, NULL, NULL, FLAG_ADVANCED}, 
1273         {"idmap expire time", P_INTEGER, P_GLOBAL, &Globals.iIdmapExpireTime, NULL, NULL, FLAG_ADVANCED}, 
1274         {"idmap negative time", P_INTEGER, P_GLOBAL, &Globals.iIdmapNegativeTime, NULL, NULL, FLAG_ADVANCED}, 
1275         {"idmap uid", P_STRING, P_GLOBAL, &Globals.szIdmapUID, handle_idmap_uid, NULL, FLAG_ADVANCED | FLAG_DEPRECATED }, 
1276         {"winbind uid", P_STRING, P_GLOBAL, &Globals.szIdmapUID, handle_idmap_uid, NULL, FLAG_HIDE | FLAG_DEPRECATED }, 
1277         {"idmap gid", P_STRING, P_GLOBAL, &Globals.szIdmapGID, handle_idmap_gid, NULL, FLAG_ADVANCED | FLAG_DEPRECATED }, 
1278         {"winbind gid", P_STRING, P_GLOBAL, &Globals.szIdmapGID, handle_idmap_gid, NULL, FLAG_HIDE | FLAG_DEPRECATED }, 
1279         {"template homedir", P_STRING, P_GLOBAL, &Globals.szTemplateHomedir, NULL, NULL, FLAG_ADVANCED}, 
1280         {"template shell", P_STRING, P_GLOBAL, &Globals.szTemplateShell, NULL, NULL, FLAG_ADVANCED}, 
1281         {"winbind separator", P_STRING, P_GLOBAL, &Globals.szWinbindSeparator, NULL, NULL, FLAG_ADVANCED}, 
1282         {"winbind cache time", P_INTEGER, P_GLOBAL, &Globals.winbind_cache_time, NULL, NULL, FLAG_ADVANCED}, 
1283         {"winbind enum users", P_BOOL, P_GLOBAL, &Globals.bWinbindEnumUsers, NULL, NULL, FLAG_ADVANCED}, 
1284         {"winbind enum groups", P_BOOL, P_GLOBAL, &Globals.bWinbindEnumGroups, NULL, NULL, FLAG_ADVANCED}, 
1285         {"winbind use default domain", P_BOOL, P_GLOBAL, &Globals.bWinbindUseDefaultDomain, NULL, NULL, FLAG_ADVANCED}, 
1286         {"winbind trusted domains only", P_BOOL, P_GLOBAL, &Globals.bWinbindTrustedDomainsOnly, NULL, NULL, FLAG_ADVANCED}, 
1287         {"winbind nested groups", P_BOOL, P_GLOBAL, &Globals.bWinbindNestedGroups, NULL, NULL, FLAG_ADVANCED}, 
1288         {"winbind nss info", P_LIST, P_GLOBAL, &Globals.szWinbindNssInfo, NULL, NULL, FLAG_ADVANCED}, 
1289         {"winbind refresh tickets", P_BOOL, P_GLOBAL, &Globals.bWinbindRefreshTickets, NULL, NULL, FLAG_ADVANCED}, 
1290         {"winbind offline logon", P_BOOL, P_GLOBAL, &Globals.bWinbindOfflineLogon, NULL, NULL, FLAG_ADVANCED},
1291         {"winbind normalize names", P_BOOL, P_GLOBAL, &Globals.bWinbindNormalizeNames, NULL, NULL, FLAG_ADVANCED},
1292
1293         {NULL,  P_BOOL,  P_NONE,  NULL,  NULL,  NULL,  0}
1294 };
1295
1296 /***************************************************************************
1297  Initialise the sDefault parameter structure for the printer values.
1298 ***************************************************************************/
1299
1300 static void init_printer_values(service *pService)
1301 {
1302         /* choose defaults depending on the type of printing */
1303         switch (pService->iPrinting) {
1304                 case PRINT_BSD:
1305                 case PRINT_AIX:
1306                 case PRINT_LPRNT:
1307                 case PRINT_LPROS2:
1308                         string_set(&pService->szLpqcommand, "lpq -P'%p'");
1309                         string_set(&pService->szLprmcommand, "lprm -P'%p' %j");
1310                         string_set(&pService->szPrintcommand, "lpr -r -P'%p' %s");
1311                         break;
1312
1313                 case PRINT_LPRNG:
1314                 case PRINT_PLP:
1315                         string_set(&pService->szLpqcommand, "lpq -P'%p'");
1316                         string_set(&pService->szLprmcommand, "lprm -P'%p' %j");
1317                         string_set(&pService->szPrintcommand, "lpr -r -P'%p' %s");
1318                         string_set(&pService->szQueuepausecommand, "lpc stop '%p'");
1319                         string_set(&pService->szQueueresumecommand, "lpc start '%p'");
1320                         string_set(&pService->szLppausecommand, "lpc hold '%p' %j");
1321                         string_set(&pService->szLpresumecommand, "lpc release '%p' %j");
1322                         break;
1323
1324                 case PRINT_CUPS:
1325                 case PRINT_IPRINT:
1326 #ifdef HAVE_CUPS
1327                         /* set the lpq command to contain the destination printer
1328                            name only.  This is used by cups_queue_get() */
1329                         string_set(&pService->szLpqcommand, "%p");
1330                         string_set(&pService->szLprmcommand, "");
1331                         string_set(&pService->szPrintcommand, "");
1332                         string_set(&pService->szLppausecommand, "");
1333                         string_set(&pService->szLpresumecommand, "");
1334                         string_set(&pService->szQueuepausecommand, "");
1335                         string_set(&pService->szQueueresumecommand, "");
1336 #else
1337                         string_set(&pService->szLpqcommand, "lpq -P'%p'");
1338                         string_set(&pService->szLprmcommand, "lprm -P'%p' %j");
1339                         string_set(&pService->szPrintcommand, "lpr -P'%p' %s; rm %s");
1340                         string_set(&pService->szLppausecommand, "lp -i '%p-%j' -H hold");
1341                         string_set(&pService->szLpresumecommand, "lp -i '%p-%j' -H resume");
1342                         string_set(&pService->szQueuepausecommand, "disable '%p'");
1343                         string_set(&pService->szQueueresumecommand, "enable '%p'");
1344 #endif /* HAVE_CUPS */
1345                         break;
1346
1347                 case PRINT_SYSV:
1348                 case PRINT_HPUX:
1349                         string_set(&pService->szLpqcommand, "lpstat -o%p");
1350                         string_set(&pService->szLprmcommand, "cancel %p-%j");
1351                         string_set(&pService->szPrintcommand, "lp -c -d%p %s; rm %s");
1352                         string_set(&pService->szQueuepausecommand, "disable %p");
1353                         string_set(&pService->szQueueresumecommand, "enable %p");
1354 #ifndef HPUX
1355                         string_set(&pService->szLppausecommand, "lp -i %p-%j -H hold");
1356                         string_set(&pService->szLpresumecommand, "lp -i %p-%j -H resume");
1357 #endif /* HPUX */
1358                         break;
1359
1360                 case PRINT_QNX:
1361                         string_set(&pService->szLpqcommand, "lpq -P%p");
1362                         string_set(&pService->szLprmcommand, "lprm -P%p %j");
1363                         string_set(&pService->szPrintcommand, "lp -r -P%p %s");
1364                         break;
1365
1366 #ifdef DEVELOPER
1367         case PRINT_TEST:
1368         case PRINT_VLP:
1369                 string_set(&pService->szPrintcommand, "vlp print %p %s");
1370                 string_set(&pService->szLpqcommand, "vlp lpq %p");
1371                 string_set(&pService->szLprmcommand, "vlp lprm %p %j");
1372                 string_set(&pService->szLppausecommand, "vlp lppause %p %j");
1373                 string_set(&pService->szLpresumecommand, "vlp lpresum %p %j");
1374                 string_set(&pService->szQueuepausecommand, "vlp queuepause %p");
1375                 string_set(&pService->szQueueresumecommand, "vlp queueresume %p");
1376                 break;
1377 #endif /* DEVELOPER */
1378
1379         }
1380 }
1381
1382 /***************************************************************************
1383  Initialise the global parameter structure.
1384 ***************************************************************************/
1385
1386 static void init_globals(BOOL first_time_only)
1387 {
1388         static BOOL done_init = False;
1389         pstring s;
1390
1391         /* If requested to initialize only once and we've already done it... */
1392         if (first_time_only && done_init) {
1393                 /* ... then we have nothing more to do */
1394                 return;
1395         }
1396
1397         if (!done_init) {
1398                 int i;
1399
1400                 /* The logfile can be set before this is invoked. Free it if so. */
1401                 if (Globals.szLogFile != NULL) {
1402                         string_free(&Globals.szLogFile);
1403                         Globals.szLogFile = NULL;
1404                 }
1405
1406                 memset((void *)&Globals, '\0', sizeof(Globals));
1407
1408                 for (i = 0; parm_table[i].label; i++)
1409                         if ((parm_table[i].type == P_STRING ||
1410                              parm_table[i].type == P_USTRING) &&
1411                             parm_table[i].ptr)
1412                                 string_set((char **)parm_table[i].ptr, "");
1413
1414                 string_set(&sDefault.fstype, FSTYPE_STRING);
1415                 string_set(&sDefault.szPrintjobUsername, "%U");
1416
1417                 init_printer_values(&sDefault);
1418
1419                 done_init = True;
1420         }
1421
1422
1423         DEBUG(3, ("Initialising global parameters\n"));
1424
1425         string_set(&Globals.szSMBPasswdFile, dyn_SMB_PASSWD_FILE);
1426         string_set(&Globals.szPrivateDir, dyn_PRIVATE_DIR);
1427
1428         /* use the new 'hash2' method by default, with a prefix of 1 */
1429         string_set(&Globals.szManglingMethod, "hash2");
1430         Globals.mangle_prefix = 1;
1431
1432         string_set(&Globals.szGuestaccount, GUEST_ACCOUNT);
1433
1434         /* using UTF8 by default allows us to support all chars */
1435         string_set(&Globals.unix_charset, DEFAULT_UNIX_CHARSET);
1436
1437 #if defined(HAVE_NL_LANGINFO) && defined(CODESET)
1438         /* If the system supports nl_langinfo(), try to grab the value
1439            from the user's locale */
1440         string_set(&Globals.display_charset, "LOCALE");
1441 #else
1442         string_set(&Globals.display_charset, DEFAULT_DISPLAY_CHARSET);
1443 #endif
1444
1445         /* Use codepage 850 as a default for the dos character set */
1446         string_set(&Globals.dos_charset, DEFAULT_DOS_CHARSET);
1447
1448         /*
1449          * Allow the default PASSWD_CHAT to be overridden in local.h.
1450          */
1451         string_set(&Globals.szPasswdChat, DEFAULT_PASSWD_CHAT);
1452         
1453         set_global_myname(myhostname());
1454         string_set(&Globals.szNetbiosName,global_myname());
1455
1456         set_global_myworkgroup(WORKGROUP);
1457         string_set(&Globals.szWorkgroup, lp_workgroup());
1458         
1459         string_set(&Globals.szPasswdProgram, "");
1460         string_set(&Globals.szPidDir, dyn_PIDDIR);
1461         string_set(&Globals.szLockDir, dyn_LOCKDIR);
1462         string_set(&Globals.szSocketAddress, "0.0.0.0");
1463         pstrcpy(s, "Samba ");
1464         pstrcat(s, SAMBA_VERSION_STRING);
1465         string_set(&Globals.szServerString, s);
1466         slprintf(s, sizeof(s) - 1, "%d.%d", DEFAULT_MAJOR_VERSION,
1467                  DEFAULT_MINOR_VERSION);
1468         string_set(&Globals.szAnnounceVersion, s);
1469 #ifdef DEVELOPER
1470         string_set(&Globals.szPanicAction, "/bin/sleep 999999999");
1471 #endif
1472
1473         pstrcpy(user_socket_options, DEFAULT_SOCKET_OPTIONS);
1474
1475         string_set(&Globals.szLogonDrive, "");
1476         /* %N is the NIS auto.home server if -DAUTOHOME is used, else same as %L */
1477         string_set(&Globals.szLogonHome, "\\\\%N\\%U");
1478         string_set(&Globals.szLogonPath, "\\\\%N\\%U\\profile");
1479
1480         string_set(&Globals.szNameResolveOrder, "lmhosts wins host bcast");
1481         string_set(&Globals.szPasswordServer, "*");
1482
1483         Globals.AlgorithmicRidBase = BASE_RID;
1484
1485         Globals.bLoadPrinters = True;
1486         Globals.PrintcapCacheTime = 750;        /* 12.5 minutes */
1487
1488         /* Was 65535 (0xFFFF). 0x4101 matches W2K and causes major speed improvements... */
1489         /* Discovered by 2 days of pain by Don McCall @ HP :-). */
1490         Globals.max_xmit = 0x4104;
1491         Globals.max_mux = 50;   /* This is *needed* for profile support. */
1492         Globals.lpqcachetime = 30;      /* changed to handle large print servers better -- jerry */
1493         Globals.bDisableSpoolss = False;
1494         Globals.iMaxSmbdProcesses = 0;/* no limit specified */
1495         Globals.pwordlevel = 0;
1496         Globals.unamelevel = 0;
1497         Globals.deadtime = 0;
1498         Globals.bLargeReadwrite = True;
1499         Globals.max_log_size = 5000;
1500         Globals.max_open_files = MAX_OPEN_FILES;
1501         Globals.open_files_db_hash_size = SMB_OPEN_DATABASE_TDB_HASH_SIZE;
1502         Globals.maxprotocol = PROTOCOL_NT1;
1503         Globals.minprotocol = PROTOCOL_CORE;
1504         Globals.security = SEC_USER;
1505         Globals.paranoid_server_security = True;
1506         Globals.bEncryptPasswords = True;
1507         Globals.bUpdateEncrypt = False;
1508         Globals.clientSchannel = Auto;
1509         Globals.serverSchannel = Auto;
1510         Globals.bReadRaw = True;
1511         Globals.bWriteRaw = True;
1512         Globals.bReadbmpx = False;
1513         Globals.bNullPasswords = False;
1514         Globals.bObeyPamRestrictions = False;
1515         Globals.syslog = 1;
1516         Globals.bSyslogOnly = False;
1517         Globals.bTimestampLogs = True;
1518         string_set(&Globals.szLogLevel, "0");
1519         Globals.bDebugHiresTimestamp = False;
1520         Globals.bDebugPid = False;
1521         Globals.bDebugUid = False;
1522         Globals.bEnableCoreFiles = True;
1523         Globals.max_ttl = 60 * 60 * 24 * 3;     /* 3 days default. */
1524         Globals.max_wins_ttl = 60 * 60 * 24 * 6;        /* 6 days default. */
1525         Globals.min_wins_ttl = 60 * 60 * 6;     /* 6 hours default. */
1526         Globals.machine_password_timeout = 60 * 60 * 24 * 7;    /* 7 days default. */
1527         Globals.lm_announce = 2;        /* = Auto: send only if LM clients found */
1528         Globals.lm_interval = 60;
1529         Globals.announce_as = ANNOUNCE_AS_NT_SERVER;
1530 #if (defined(HAVE_NETGROUP) && defined(WITH_AUTOMOUNT))
1531         Globals.bNISHomeMap = False;
1532 #ifdef WITH_NISPLUS_HOME
1533         string_set(&Globals.szNISHomeMapName, "auto_home.org_dir");
1534 #else
1535         string_set(&Globals.szNISHomeMapName, "auto.home");
1536 #endif
1537 #endif
1538         Globals.bTimeServer = False;
1539         Globals.bBindInterfacesOnly = False;
1540         Globals.bUnixPasswdSync = False;
1541         Globals.bPamPasswordChange = False;
1542         Globals.bPasswdChatDebug = False;
1543         Globals.iPasswdChatTimeout = 2; /* 2 second default. */
1544         Globals.bNTPipeSupport = True;  /* Do NT pipes by default. */
1545         Globals.bNTStatusSupport = True; /* Use NT status by default. */
1546         Globals.bStatCache = True;      /* use stat cache by default */
1547         Globals.iMaxStatCacheSize = 1024; /* one Meg by default. */
1548         Globals.restrict_anonymous = 0;
1549         Globals.bClientLanManAuth = True;       /* Do use the LanMan hash if it is available */
1550         Globals.bClientPlaintextAuth = True;    /* Do use a plaintext password if is requested by the server */
1551         Globals.bLanmanAuth = True;     /* Do use the LanMan hash if it is available */
1552         Globals.bNTLMAuth = True;       /* Do use NTLMv1 if it is available (otherwise NTLMv2) */
1553         Globals.bClientNTLMv2Auth = False; /* Client should not use NTLMv2, as we can't tell that the server supports it. */
1554         /* Note, that we will use NTLM2 session security (which is different), if it is available */
1555
1556         Globals.map_to_guest = 0;       /* By Default, "Never" */
1557         Globals.oplock_break_wait_time = 0;     /* By Default, 0 msecs. */
1558         Globals.enhanced_browsing = True; 
1559         Globals.iLockSpinCount = 0; /* Unused. */
1560         Globals.iLockSpinTime = WINDOWS_MINIMUM_LOCK_TIMEOUT_MS; /* msec. */
1561 #ifdef MMAP_BLACKLIST
1562         Globals.bUseMmap = False;
1563 #else
1564         Globals.bUseMmap = True;
1565 #endif
1566         Globals.bUnixExtensions = True;
1567         Globals.bResetOnZeroVC = False;
1568
1569         /* hostname lookups can be very expensive and are broken on
1570            a large number of sites (tridge) */
1571         Globals.bHostnameLookups = False;
1572
1573         string_set(&Globals.szPassdbBackend, "smbpasswd");
1574         string_set(&Globals.szLdapSuffix, "");
1575         string_set(&Globals.szLdapMachineSuffix, "");
1576         string_set(&Globals.szLdapUserSuffix, "");
1577         string_set(&Globals.szLdapGroupSuffix, "");
1578         string_set(&Globals.szLdapIdmapSuffix, "");
1579
1580         string_set(&Globals.szLdapAdminDn, "");
1581         Globals.ldap_ssl = LDAP_SSL_ON;
1582         Globals.ldap_passwd_sync = LDAP_PASSWD_SYNC_OFF;
1583         Globals.ldap_delete_dn = False;
1584         Globals.ldap_replication_sleep = 1000; /* wait 1 sec for replication */
1585         Globals.ldap_timeout = LDAP_CONNECT_DEFAULT_TIMEOUT;
1586         Globals.ldap_page_size = LDAP_PAGE_SIZE;
1587
1588         /* This is what we tell the afs client. in reality we set the token 
1589          * to never expire, though, when this runs out the afs client will 
1590          * forget the token. Set to 0 to get NEVERDATE.*/
1591         Globals.iAfsTokenLifetime = 604800;
1592
1593 /* these parameters are set to defaults that are more appropriate
1594    for the increasing samba install base:
1595
1596    as a member of the workgroup, that will possibly become a
1597    _local_ master browser (lm = True).  this is opposed to a forced
1598    local master browser startup (pm = True).
1599
1600    doesn't provide WINS server service by default (wsupp = False),
1601    and doesn't provide domain master browser services by default, either.
1602
1603 */
1604
1605         Globals.bMsAddPrinterWizard = True;
1606         Globals.bPreferredMaster = Auto;        /* depending on bDomainMaster */
1607         Globals.os_level = 20;
1608         Globals.bLocalMaster = True;
1609         Globals.bDomainMaster = Auto;   /* depending on bDomainLogons */
1610         Globals.bDomainLogons = False;
1611         Globals.bBrowseList = True;
1612         Globals.bWINSsupport = False;
1613         Globals.bWINSproxy = False;
1614
1615         Globals.bDNSproxy = True;
1616
1617         /* this just means to use them if they exist */
1618         Globals.bKernelOplocks = True;
1619
1620         Globals.bAllowTrustedDomains = True;
1621
1622         string_set(&Globals.szTemplateShell, "/bin/false");
1623         string_set(&Globals.szTemplateHomedir, "/home/%D/%U");
1624         string_set(&Globals.szWinbindSeparator, "\\");
1625
1626         string_set(&Globals.szCupsServer, "");
1627         string_set(&Globals.szIPrintServer, "");
1628
1629         Globals.winbind_cache_time = 300;       /* 5 minutes */
1630         Globals.bWinbindEnumUsers = False;
1631         Globals.bWinbindEnumGroups = False;
1632         Globals.bWinbindUseDefaultDomain = False;
1633         Globals.bWinbindTrustedDomainsOnly = False;
1634         Globals.bWinbindNestedGroups = True;
1635         Globals.bWinbindRefreshTickets = False;
1636         Globals.bWinbindOfflineLogon = False;
1637
1638         Globals.iIdmapExpireTime = 900; /* 15 minutes by default */
1639         Globals.iIdmapNegativeTime = 120; /* 2 minutes by default */
1640
1641         Globals.bPassdbExpandExplicit = False;
1642
1643         Globals.name_cache_timeout = 660; /* In seconds */
1644
1645         Globals.bUseSpnego = True;
1646         Globals.bClientUseSpnego = True;
1647
1648         Globals.client_signing = Auto;
1649         Globals.server_signing = False;
1650
1651         Globals.bDeferSharingViolations = True;
1652         string_set(&Globals.smb_ports, SMB_PORTS);
1653
1654         Globals.bEnablePrivileges = True;
1655         Globals.bHostMSDfs        = True;
1656         Globals.bASUSupport       = False;
1657         
1658         /* User defined shares. */
1659         pstrcpy(s, dyn_LOCKDIR);
1660         pstrcat(s, "/usershares");
1661         string_set(&Globals.szUsersharePath, s);
1662         string_set(&Globals.szUsershareTemplateShare, "");
1663         Globals.iUsershareMaxShares = 0;
1664         /* By default disallow sharing of directories not owned by the sharer. */
1665         Globals.bUsershareOwnerOnly = True;
1666         /* By default disallow guest access to usershares. */
1667         Globals.bUsershareAllowGuests = False;
1668
1669         /* By default no shares out of the registry */
1670         Globals.bRegistryShares = False;
1671 }
1672
1673 static TALLOC_CTX *lp_talloc;
1674
1675 /******************************************************************* a
1676  Free up temporary memory - called from the main loop.
1677 ********************************************************************/
1678
1679 void lp_TALLOC_FREE(void)
1680 {
1681         if (!lp_talloc)
1682                 return;
1683         TALLOC_FREE(lp_talloc);
1684         lp_talloc = NULL;
1685 }
1686
1687 TALLOC_CTX *tmp_talloc_ctx(void)
1688 {
1689         if (lp_talloc == NULL) {
1690                 lp_talloc = talloc_init("tmp_talloc_ctx");
1691         }
1692
1693         if (lp_talloc == NULL) {
1694                 smb_panic("Could not create temporary talloc context\n");
1695         }
1696
1697         return lp_talloc;
1698 }
1699
1700 /*******************************************************************
1701  Convenience routine to grab string parameters into temporary memory
1702  and run standard_sub_basic on them. The buffers can be written to by
1703  callers without affecting the source string.
1704 ********************************************************************/
1705
1706 static char *lp_string(const char *s)
1707 {
1708         char *ret, *tmpstr;
1709
1710         /* The follow debug is useful for tracking down memory problems
1711            especially if you have an inner loop that is calling a lp_*()
1712            function that returns a string.  Perhaps this debug should be
1713            present all the time? */
1714
1715 #if 0
1716         DEBUG(10, ("lp_string(%s)\n", s));
1717 #endif
1718
1719         if (!lp_talloc)
1720                 lp_talloc = talloc_init("lp_talloc");
1721
1722         tmpstr = alloc_sub_basic(get_current_username(),
1723                                  current_user_info.domain, s);
1724         if (trim_char(tmpstr, '\"', '\"')) {
1725                 if (strchr(tmpstr,'\"') != NULL) {
1726                         SAFE_FREE(tmpstr);
1727                         tmpstr = alloc_sub_basic(get_current_username(),
1728                                                  current_user_info.domain, s);
1729                 }
1730         }
1731         ret = talloc_strdup(lp_talloc, tmpstr);
1732         SAFE_FREE(tmpstr);
1733                         
1734         return (ret);
1735 }
1736
1737 /*
1738    In this section all the functions that are used to access the 
1739    parameters from the rest of the program are defined 
1740 */
1741
1742 #define FN_GLOBAL_STRING(fn_name,ptr) \
1743  char *fn_name(void) {return(lp_string(*(char **)(ptr) ? *(char **)(ptr) : ""));}
1744 #define FN_GLOBAL_CONST_STRING(fn_name,ptr) \
1745  const char *fn_name(void) {return(*(const char **)(ptr) ? *(const char **)(ptr) : "");}
1746 #define FN_GLOBAL_LIST(fn_name,ptr) \
1747  const char **fn_name(void) {return(*(const char ***)(ptr));}
1748 #define FN_GLOBAL_BOOL(fn_name,ptr) \
1749  BOOL fn_name(void) {return(*(BOOL *)(ptr));}
1750 #define FN_GLOBAL_CHAR(fn_name,ptr) \
1751  char fn_name(void) {return(*(char *)(ptr));}
1752 #define FN_GLOBAL_INTEGER(fn_name,ptr) \
1753  int fn_name(void) {return(*(int *)(ptr));}
1754
1755 #define FN_LOCAL_STRING(fn_name,val) \
1756  char *fn_name(int i) {return(lp_string((LP_SNUM_OK(i) && ServicePtrs[(i)]->val) ? ServicePtrs[(i)]->val : sDefault.val));}
1757 #define FN_LOCAL_CONST_STRING(fn_name,val) \
1758  const char *fn_name(int i) {return (const char *)((LP_SNUM_OK(i) && ServicePtrs[(i)]->val) ? ServicePtrs[(i)]->val : sDefault.val);}
1759 #define FN_LOCAL_LIST(fn_name,val) \
1760  const char **fn_name(int i) {return(const char **)(LP_SNUM_OK(i)? ServicePtrs[(i)]->val : sDefault.val);}
1761 #define FN_LOCAL_BOOL(fn_name,val) \
1762  BOOL fn_name(int i) {return(LP_SNUM_OK(i)? ServicePtrs[(i)]->val : sDefault.val);}
1763 #define FN_LOCAL_INTEGER(fn_name,val) \
1764  int fn_name(int i) {return(LP_SNUM_OK(i)? ServicePtrs[(i)]->val : sDefault.val);}
1765
1766 #define FN_LOCAL_PARM_BOOL(fn_name,val) \
1767  BOOL fn_name(const struct share_params *p) {return(LP_SNUM_OK(p->service)? ServicePtrs[(p->service)]->val : sDefault.val);}
1768 #define FN_LOCAL_PARM_INTEGER(fn_name,val) \
1769  int fn_name(const struct share_params *p) {return(LP_SNUM_OK(p->service)? ServicePtrs[(p->service)]->val : sDefault.val);}
1770 #define FN_LOCAL_PARM_STRING(fn_name,val) \
1771  char *fn_name(const struct share_params *p) {return(lp_string((LP_SNUM_OK(p->service) && ServicePtrs[(p->service)]->val) ? ServicePtrs[(p->service)]->val : sDefault.val));}
1772 #define FN_LOCAL_CHAR(fn_name,val) \
1773  char fn_name(const struct share_params *p) {return(LP_SNUM_OK(p->service)? ServicePtrs[(p->service)]->val : sDefault.val);}
1774
1775 FN_GLOBAL_STRING(lp_smb_ports, &Globals.smb_ports)
1776 FN_GLOBAL_STRING(lp_dos_charset, &Globals.dos_charset)
1777 FN_GLOBAL_STRING(lp_unix_charset, &Globals.unix_charset)
1778 FN_GLOBAL_STRING(lp_display_charset, &Globals.display_charset)
1779 FN_GLOBAL_STRING(lp_logfile, &Globals.szLogFile)
1780 FN_GLOBAL_STRING(lp_configfile, &Globals.szConfigFile)
1781 FN_GLOBAL_STRING(lp_smb_passwd_file, &Globals.szSMBPasswdFile)
1782 FN_GLOBAL_STRING(lp_private_dir, &Globals.szPrivateDir)
1783 FN_GLOBAL_STRING(lp_serverstring, &Globals.szServerString)
1784 FN_GLOBAL_INTEGER(lp_printcap_cache_time, &Globals.PrintcapCacheTime)
1785 FN_GLOBAL_STRING(lp_addport_cmd, &Globals.szAddPortCommand)
1786 FN_GLOBAL_STRING(lp_enumports_cmd, &Globals.szEnumPortsCommand)
1787 FN_GLOBAL_STRING(lp_addprinter_cmd, &Globals.szAddPrinterCommand)
1788 FN_GLOBAL_STRING(lp_deleteprinter_cmd, &Globals.szDeletePrinterCommand)
1789 FN_GLOBAL_STRING(lp_os2_driver_map, &Globals.szOs2DriverMap)
1790 FN_GLOBAL_STRING(lp_lockdir, &Globals.szLockDir)
1791 FN_GLOBAL_STRING(lp_piddir, &Globals.szPidDir)
1792 FN_GLOBAL_STRING(lp_mangling_method, &Globals.szManglingMethod)
1793 FN_GLOBAL_INTEGER(lp_mangle_prefix, &Globals.mangle_prefix)
1794 FN_GLOBAL_STRING(lp_utmpdir, &Globals.szUtmpDir)
1795 FN_GLOBAL_STRING(lp_wtmpdir, &Globals.szWtmpDir)
1796 FN_GLOBAL_BOOL(lp_utmp, &Globals.bUtmp)
1797 FN_GLOBAL_STRING(lp_rootdir, &Globals.szRootdir)
1798 FN_GLOBAL_STRING(lp_defaultservice, &Globals.szDefaultService)
1799 FN_GLOBAL_STRING(lp_msg_command, &Globals.szMsgCommand)
1800 FN_GLOBAL_STRING(lp_get_quota_command, &Globals.szGetQuota)
1801 FN_GLOBAL_STRING(lp_set_quota_command, &Globals.szSetQuota)
1802 FN_GLOBAL_STRING(lp_auto_services, &Globals.szAutoServices)
1803 FN_GLOBAL_STRING(lp_passwd_program, &Globals.szPasswdProgram)
1804 FN_GLOBAL_STRING(lp_passwd_chat, &Globals.szPasswdChat)
1805 FN_GLOBAL_STRING(lp_passwordserver, &Globals.szPasswordServer)
1806 FN_GLOBAL_STRING(lp_name_resolve_order, &Globals.szNameResolveOrder)
1807 FN_GLOBAL_STRING(lp_realm, &Globals.szRealm)
1808 FN_GLOBAL_CONST_STRING(lp_afs_username_map, &Globals.szAfsUsernameMap)
1809 FN_GLOBAL_INTEGER(lp_afs_token_lifetime, &Globals.iAfsTokenLifetime)
1810 FN_GLOBAL_STRING(lp_log_nt_token_command, &Globals.szLogNtTokenCommand)
1811 FN_GLOBAL_STRING(lp_username_map, &Globals.szUsernameMap)
1812 FN_GLOBAL_CONST_STRING(lp_logon_script, &Globals.szLogonScript)
1813 FN_GLOBAL_CONST_STRING(lp_logon_path, &Globals.szLogonPath)
1814 FN_GLOBAL_CONST_STRING(lp_logon_drive, &Globals.szLogonDrive)
1815 FN_GLOBAL_CONST_STRING(lp_logon_home, &Globals.szLogonHome)
1816 FN_GLOBAL_STRING(lp_remote_announce, &Globals.szRemoteAnnounce)
1817 FN_GLOBAL_STRING(lp_remote_browse_sync, &Globals.szRemoteBrowseSync)
1818 FN_GLOBAL_LIST(lp_wins_server_list, &Globals.szWINSservers)
1819 FN_GLOBAL_LIST(lp_interfaces, &Globals.szInterfaces)
1820 FN_GLOBAL_STRING(lp_socket_address, &Globals.szSocketAddress)
1821 FN_GLOBAL_STRING(lp_nis_home_map_name, &Globals.szNISHomeMapName)
1822 static FN_GLOBAL_STRING(lp_announce_version, &Globals.szAnnounceVersion)
1823 FN_GLOBAL_LIST(lp_netbios_aliases, &Globals.szNetbiosAliases)
1824 /* FN_GLOBAL_STRING(lp_passdb_backend, &Globals.szPassdbBackend)
1825  * lp_passdb_backend() should be replace by the this macro again after
1826  * some releases.
1827  * */
1828 const char *lp_passdb_backend(void)
1829 {
1830         char *delim, *quote;
1831
1832         delim = strchr( Globals.szPassdbBackend, ' ');
1833         /* no space at all */
1834         if (delim == NULL) {
1835                 goto out;
1836         }
1837
1838         quote = strchr(Globals.szPassdbBackend, '"');
1839         /* no quote char or non in the first part */
1840         if (quote == NULL || quote > delim) {
1841                 *delim = '\0';
1842                 goto warn;
1843         }
1844
1845         quote = strchr(quote+1, '"');
1846         if (quote == NULL) {
1847                 DEBUG(0, ("WARNING: Your 'passdb backend' configuration is invalid due to a missing second \" char.\n"));
1848                 goto out;
1849         } else if (*(quote+1) == '\0') {
1850                 /* space, fitting quote char, and one backend only */
1851                 goto out;
1852         } else {
1853                 /* terminate string after the fitting quote char */
1854                 *(quote+1) = '\0';
1855         }
1856
1857 warn:
1858         DEBUG(0, ("WARNING: Your 'passdb backend' configuration includes multiple backends.  This\n"
1859                 "is deprecated since Samba 3.0.23.  Please check WHATSNEW.txt or the section 'Passdb\n"
1860                 "Changes' from the ChangeNotes as part of the Samba HOWTO collection.  Only the first\n"
1861                 "backend (%s) is used.  The rest is ignored.\n", Globals.szPassdbBackend));
1862
1863 out:
1864         return Globals.szPassdbBackend;
1865 }
1866 FN_GLOBAL_LIST(lp_preload_modules, &Globals.szPreloadModules)
1867 FN_GLOBAL_STRING(lp_panic_action, &Globals.szPanicAction)
1868 FN_GLOBAL_STRING(lp_adduser_script, &Globals.szAddUserScript)
1869 FN_GLOBAL_STRING(lp_renameuser_script, &Globals.szRenameUserScript)
1870 FN_GLOBAL_STRING(lp_deluser_script, &Globals.szDelUserScript)
1871
1872 FN_GLOBAL_CONST_STRING(lp_guestaccount, &Globals.szGuestaccount)
1873 FN_GLOBAL_STRING(lp_addgroup_script, &Globals.szAddGroupScript)
1874 FN_GLOBAL_STRING(lp_delgroup_script, &Globals.szDelGroupScript)
1875 FN_GLOBAL_STRING(lp_addusertogroup_script, &Globals.szAddUserToGroupScript)
1876 FN_GLOBAL_STRING(lp_deluserfromgroup_script, &Globals.szDelUserFromGroupScript)
1877 FN_GLOBAL_STRING(lp_setprimarygroup_script, &Globals.szSetPrimaryGroupScript)
1878
1879 FN_GLOBAL_STRING(lp_addmachine_script, &Globals.szAddMachineScript)
1880
1881 FN_GLOBAL_STRING(lp_shutdown_script, &Globals.szShutdownScript)
1882 FN_GLOBAL_STRING(lp_abort_shutdown_script, &Globals.szAbortShutdownScript)
1883 FN_GLOBAL_STRING(lp_username_map_script, &Globals.szUsernameMapScript)
1884
1885 FN_GLOBAL_STRING(lp_check_password_script, &Globals.szCheckPasswordScript)
1886
1887 FN_GLOBAL_STRING(lp_wins_hook, &Globals.szWINSHook)
1888 FN_GLOBAL_CONST_STRING(lp_template_homedir, &Globals.szTemplateHomedir)
1889 FN_GLOBAL_CONST_STRING(lp_template_shell, &Globals.szTemplateShell)
1890 FN_GLOBAL_CONST_STRING(lp_winbind_separator, &Globals.szWinbindSeparator)
1891 FN_GLOBAL_INTEGER(lp_acl_compatibility, &Globals.iAclCompat)
1892 FN_GLOBAL_BOOL(lp_winbind_enum_users, &Globals.bWinbindEnumUsers)
1893 FN_GLOBAL_BOOL(lp_winbind_enum_groups, &Globals.bWinbindEnumGroups)
1894 FN_GLOBAL_BOOL(lp_winbind_use_default_domain, &Globals.bWinbindUseDefaultDomain)
1895 FN_GLOBAL_BOOL(lp_winbind_trusted_domains_only, &Globals.bWinbindTrustedDomainsOnly)
1896 FN_GLOBAL_BOOL(lp_winbind_nested_groups, &Globals.bWinbindNestedGroups)
1897 FN_GLOBAL_BOOL(lp_winbind_refresh_tickets, &Globals.bWinbindRefreshTickets)
1898 FN_GLOBAL_BOOL(lp_winbind_offline_logon, &Globals.bWinbindOfflineLogon)
1899 FN_GLOBAL_BOOL(lp_winbind_normalize_names, &Globals.bWinbindNormalizeNames)
1900
1901 FN_GLOBAL_LIST(lp_idmap_domains, &Globals.szIdmapDomains)
1902 FN_GLOBAL_LIST(lp_idmap_backend, &Globals.szIdmapBackend) /* deprecated */
1903 FN_GLOBAL_STRING(lp_idmap_alloc_backend, &Globals.szIdmapAllocBackend)
1904 FN_GLOBAL_INTEGER(lp_idmap_expire_time, &Globals.iIdmapExpireTime)
1905 FN_GLOBAL_INTEGER(lp_idmap_negative_time, &Globals.iIdmapNegativeTime)
1906 FN_GLOBAL_BOOL(lp_passdb_expand_explicit, &Globals.bPassdbExpandExplicit)
1907
1908 FN_GLOBAL_STRING(lp_ldap_suffix, &Globals.szLdapSuffix)
1909 FN_GLOBAL_STRING(lp_ldap_admin_dn, &Globals.szLdapAdminDn)
1910 FN_GLOBAL_INTEGER(lp_ldap_ssl, &Globals.ldap_ssl)
1911 FN_GLOBAL_INTEGER(lp_ldap_passwd_sync, &Globals.ldap_passwd_sync)
1912 FN_GLOBAL_BOOL(lp_ldap_delete_dn, &Globals.ldap_delete_dn)
1913 FN_GLOBAL_INTEGER(lp_ldap_replication_sleep, &Globals.ldap_replication_sleep)
1914 FN_GLOBAL_INTEGER(lp_ldap_timeout, &Globals.ldap_timeout)
1915 FN_GLOBAL_INTEGER(lp_ldap_page_size, &Globals.ldap_page_size)
1916 FN_GLOBAL_STRING(lp_add_share_cmd, &Globals.szAddShareCommand)
1917 FN_GLOBAL_STRING(lp_change_share_cmd, &Globals.szChangeShareCommand)
1918 FN_GLOBAL_STRING(lp_delete_share_cmd, &Globals.szDeleteShareCommand)
1919 FN_GLOBAL_STRING(lp_usershare_path, &Globals.szUsersharePath)
1920 FN_GLOBAL_LIST(lp_usershare_prefix_allow_list, &Globals.szUsersharePrefixAllowList)
1921 FN_GLOBAL_LIST(lp_usershare_prefix_deny_list, &Globals.szUsersharePrefixDenyList)
1922
1923 FN_GLOBAL_LIST(lp_eventlog_list, &Globals.szEventLogs)
1924
1925 FN_GLOBAL_BOOL(lp_registry_shares, &Globals.bRegistryShares)
1926 FN_GLOBAL_BOOL(lp_usershare_allow_guests, &Globals.bUsershareAllowGuests)
1927 FN_GLOBAL_BOOL(lp_usershare_owner_only, &Globals.bUsershareOwnerOnly)
1928 FN_GLOBAL_BOOL(lp_disable_netbios, &Globals.bDisableNetbios)
1929 FN_GLOBAL_BOOL(lp_reset_on_zero_vc, &Globals.bResetOnZeroVC)
1930 FN_GLOBAL_BOOL(lp_ms_add_printer_wizard, &Globals.bMsAddPrinterWizard)
1931 FN_GLOBAL_BOOL(lp_dns_proxy, &Globals.bDNSproxy)
1932 FN_GLOBAL_BOOL(lp_wins_support, &Globals.bWINSsupport)
1933 FN_GLOBAL_BOOL(lp_we_are_a_wins_server, &Globals.bWINSsupport)
1934 FN_GLOBAL_BOOL(lp_wins_proxy, &Globals.bWINSproxy)
1935 FN_GLOBAL_BOOL(lp_local_master, &Globals.bLocalMaster)
1936 FN_GLOBAL_BOOL(lp_domain_logons, &Globals.bDomainLogons)
1937 FN_GLOBAL_BOOL(lp_load_printers, &Globals.bLoadPrinters)
1938 FN_GLOBAL_BOOL(lp_readbmpx, &Globals.bReadbmpx)
1939 FN_GLOBAL_BOOL(lp_readraw, &Globals.bReadRaw)
1940 FN_GLOBAL_BOOL(lp_large_readwrite, &Globals.bLargeReadwrite)
1941 FN_GLOBAL_BOOL(lp_writeraw, &Globals.bWriteRaw)
1942 FN_GLOBAL_BOOL(lp_null_passwords, &Globals.bNullPasswords)
1943 FN_GLOBAL_BOOL(lp_obey_pam_restrictions, &Globals.bObeyPamRestrictions)
1944 FN_GLOBAL_BOOL(lp_encrypted_passwords, &Globals.bEncryptPasswords)
1945 FN_GLOBAL_BOOL(lp_update_encrypted, &Globals.bUpdateEncrypt)
1946 FN_GLOBAL_INTEGER(lp_client_schannel, &Globals.clientSchannel)
1947 FN_GLOBAL_INTEGER(lp_server_schannel, &Globals.serverSchannel)
1948 FN_GLOBAL_BOOL(lp_syslog_only, &Globals.bSyslogOnly)
1949 FN_GLOBAL_BOOL(lp_timestamp_logs, &Globals.bTimestampLogs)
1950 FN_GLOBAL_BOOL(lp_debug_hires_timestamp, &Globals.bDebugHiresTimestamp)
1951 FN_GLOBAL_BOOL(lp_debug_pid, &Globals.bDebugPid)
1952 FN_GLOBAL_BOOL(lp_debug_uid, &Globals.bDebugUid)
1953 FN_GLOBAL_BOOL(lp_enable_core_files, &Globals.bEnableCoreFiles)
1954 FN_GLOBAL_BOOL(lp_browse_list, &Globals.bBrowseList)
1955 FN_GLOBAL_BOOL(lp_nis_home_map, &Globals.bNISHomeMap)
1956 static FN_GLOBAL_BOOL(lp_time_server, &Globals.bTimeServer)
1957 FN_GLOBAL_BOOL(lp_bind_interfaces_only, &Globals.bBindInterfacesOnly)
1958 FN_GLOBAL_BOOL(lp_pam_password_change, &Globals.bPamPasswordChange)
1959 FN_GLOBAL_BOOL(lp_unix_password_sync, &Globals.bUnixPasswdSync)
1960 FN_GLOBAL_BOOL(lp_passwd_chat_debug, &Globals.bPasswdChatDebug)
1961 FN_GLOBAL_INTEGER(lp_passwd_chat_timeout, &Globals.iPasswdChatTimeout)
1962 FN_GLOBAL_BOOL(lp_nt_pipe_support, &Globals.bNTPipeSupport)
1963 FN_GLOBAL_BOOL(lp_nt_status_support, &Globals.bNTStatusSupport)
1964 FN_GLOBAL_BOOL(lp_stat_cache, &Globals.bStatCache)
1965 FN_GLOBAL_INTEGER(lp_max_stat_cache_size, &Globals.iMaxStatCacheSize)
1966 FN_GLOBAL_BOOL(lp_allow_trusted_domains, &Globals.bAllowTrustedDomains)
1967 FN_GLOBAL_INTEGER(lp_restrict_anonymous, &Globals.restrict_anonymous)
1968 FN_GLOBAL_BOOL(lp_lanman_auth, &Globals.bLanmanAuth)
1969 FN_GLOBAL_BOOL(lp_ntlm_auth, &Globals.bNTLMAuth)
1970 FN_GLOBAL_BOOL(lp_client_plaintext_auth, &Globals.bClientPlaintextAuth)
1971 FN_GLOBAL_BOOL(lp_client_lanman_auth, &Globals.bClientLanManAuth)
1972 FN_GLOBAL_BOOL(lp_client_ntlmv2_auth, &Globals.bClientNTLMv2Auth)
1973 FN_GLOBAL_BOOL(lp_host_msdfs, &Globals.bHostMSDfs)
1974 FN_GLOBAL_BOOL(lp_kernel_oplocks, &Globals.bKernelOplocks)
1975 FN_GLOBAL_BOOL(lp_enhanced_browsing, &Globals.enhanced_browsing)
1976 FN_GLOBAL_BOOL(lp_use_mmap, &Globals.bUseMmap)
1977 FN_GLOBAL_BOOL(lp_unix_extensions, &Globals.bUnixExtensions)
1978 FN_GLOBAL_BOOL(lp_use_spnego, &Globals.bUseSpnego)
1979 FN_GLOBAL_BOOL(lp_client_use_spnego, &Globals.bClientUseSpnego)
1980 FN_GLOBAL_BOOL(lp_hostname_lookups, &Globals.bHostnameLookups)
1981 FN_LOCAL_PARM_BOOL(lp_change_notify, bChangeNotify)
1982 FN_LOCAL_PARM_BOOL(lp_kernel_change_notify, bKernelChangeNotify)
1983 FN_GLOBAL_BOOL(lp_use_kerberos_keytab, &Globals.bUseKerberosKeytab)
1984 FN_GLOBAL_BOOL(lp_defer_sharing_violations, &Globals.bDeferSharingViolations)
1985 FN_GLOBAL_BOOL(lp_enable_privileges, &Globals.bEnablePrivileges)
1986 FN_GLOBAL_BOOL(lp_enable_asu_support, &Globals.bASUSupport)
1987 FN_GLOBAL_INTEGER(lp_os_level, &Globals.os_level)
1988 FN_GLOBAL_INTEGER(lp_max_ttl, &Globals.max_ttl)
1989 FN_GLOBAL_INTEGER(lp_max_wins_ttl, &Globals.max_wins_ttl)
1990 FN_GLOBAL_INTEGER(lp_min_wins_ttl, &Globals.min_wins_ttl)
1991 FN_GLOBAL_INTEGER(lp_max_log_size, &Globals.max_log_size)
1992 FN_GLOBAL_INTEGER(lp_max_open_files, &Globals.max_open_files)
1993 FN_GLOBAL_INTEGER(lp_open_files_db_hash_size, &Globals.open_files_db_hash_size)
1994 FN_GLOBAL_INTEGER(lp_maxxmit, &Globals.max_xmit)
1995 FN_GLOBAL_INTEGER(lp_maxmux, &Globals.max_mux)
1996 FN_GLOBAL_INTEGER(lp_passwordlevel, &Globals.pwordlevel)
1997 FN_GLOBAL_INTEGER(lp_usernamelevel, &Globals.unamelevel)
1998 FN_GLOBAL_INTEGER(lp_deadtime, &Globals.deadtime)
1999 FN_GLOBAL_INTEGER(lp_maxprotocol, &Globals.maxprotocol)
2000 FN_GLOBAL_INTEGER(lp_minprotocol, &Globals.minprotocol)
2001 FN_GLOBAL_INTEGER(lp_security, &Globals.security)
2002 FN_GLOBAL_LIST(lp_auth_methods, &Globals.AuthMethods)
2003 FN_GLOBAL_BOOL(lp_paranoid_server_security, &Globals.paranoid_server_security)
2004 FN_GLOBAL_INTEGER(lp_maxdisksize, &Globals.maxdisksize)
2005 FN_GLOBAL_INTEGER(lp_lpqcachetime, &Globals.lpqcachetime)
2006 FN_GLOBAL_INTEGER(lp_max_smbd_processes, &Globals.iMaxSmbdProcesses)
2007 FN_GLOBAL_INTEGER(_lp_disable_spoolss, &Globals.bDisableSpoolss)
2008 FN_GLOBAL_INTEGER(lp_syslog, &Globals.syslog)
2009 static FN_GLOBAL_INTEGER(lp_announce_as, &Globals.announce_as)
2010 FN_GLOBAL_INTEGER(lp_lm_announce, &Globals.lm_announce)
2011 FN_GLOBAL_INTEGER(lp_lm_interval, &Globals.lm_interval)
2012 FN_GLOBAL_INTEGER(lp_machine_password_timeout, &Globals.machine_password_timeout)
2013 FN_GLOBAL_INTEGER(lp_map_to_guest, &Globals.map_to_guest)
2014 FN_GLOBAL_INTEGER(lp_oplock_break_wait_time, &Globals.oplock_break_wait_time)
2015 FN_GLOBAL_INTEGER(lp_lock_spin_count, &Globals.iLockSpinCount)
2016 FN_GLOBAL_INTEGER(lp_lock_spin_time, &Globals.iLockSpinTime)
2017 FN_GLOBAL_INTEGER(lp_usershare_max_shares, &Globals.iUsershareMaxShares)
2018
2019 FN_LOCAL_STRING(lp_preexec, szPreExec)
2020 FN_LOCAL_STRING(lp_postexec, szPostExec)
2021 FN_LOCAL_STRING(lp_rootpreexec, szRootPreExec)
2022 FN_LOCAL_STRING(lp_rootpostexec, szRootPostExec)
2023 FN_LOCAL_STRING(lp_servicename, szService)
2024 FN_LOCAL_CONST_STRING(lp_const_servicename, szService)
2025 FN_LOCAL_STRING(lp_pathname, szPath)
2026 FN_LOCAL_STRING(lp_dontdescend, szDontdescend)
2027 FN_LOCAL_STRING(lp_username, szUsername)
2028 FN_LOCAL_LIST(lp_invalid_users, szInvalidUsers)
2029 FN_LOCAL_LIST(lp_valid_users, szValidUsers)
2030 FN_LOCAL_LIST(lp_admin_users, szAdminUsers)
2031 FN_GLOBAL_LIST(lp_svcctl_list, &Globals.szServicesList)
2032 FN_LOCAL_STRING(lp_cups_options, szCupsOptions)
2033 FN_GLOBAL_STRING(lp_cups_server, &Globals.szCupsServer)
2034 FN_GLOBAL_STRING(lp_iprint_server, &Globals.szIPrintServer)
2035 FN_LOCAL_STRING(lp_printcommand, szPrintcommand)
2036 FN_LOCAL_STRING(lp_lpqcommand, szLpqcommand)
2037 FN_LOCAL_STRING(lp_lprmcommand, szLprmcommand)
2038 FN_LOCAL_STRING(lp_lppausecommand, szLppausecommand)
2039 FN_LOCAL_STRING(lp_lpresumecommand, szLpresumecommand)
2040 FN_LOCAL_STRING(lp_queuepausecommand, szQueuepausecommand)
2041 FN_LOCAL_STRING(lp_queueresumecommand, szQueueresumecommand)
2042 static FN_LOCAL_STRING(_lp_printername, szPrintername)
2043 FN_LOCAL_CONST_STRING(lp_printjob_username, szPrintjobUsername)
2044 FN_LOCAL_LIST(lp_hostsallow, szHostsallow)
2045 FN_LOCAL_LIST(lp_hostsdeny, szHostsdeny)
2046 FN_LOCAL_STRING(lp_magicscript, szMagicScript)
2047 FN_LOCAL_STRING(lp_magicoutput, szMagicOutput)
2048 FN_LOCAL_STRING(lp_comment, comment)
2049 FN_LOCAL_STRING(lp_force_user, force_user)
2050 FN_LOCAL_STRING(lp_force_group, force_group)
2051 FN_LOCAL_LIST(lp_readlist, readlist)
2052 FN_LOCAL_LIST(lp_writelist, writelist)
2053 FN_LOCAL_LIST(lp_printer_admin, printer_admin)
2054 FN_LOCAL_STRING(lp_fstype, fstype)
2055 FN_LOCAL_LIST(lp_vfs_objects, szVfsObjects)
2056 FN_LOCAL_STRING(lp_msdfs_proxy, szMSDfsProxy)
2057 static FN_LOCAL_STRING(lp_volume, volume)
2058 FN_LOCAL_PARM_STRING(lp_mangled_map, szMangledMap)
2059 FN_LOCAL_STRING(lp_veto_files, szVetoFiles)
2060 FN_LOCAL_STRING(lp_hide_files, szHideFiles)
2061 FN_LOCAL_STRING(lp_veto_oplocks, szVetoOplockFiles)
2062 FN_LOCAL_BOOL(lp_msdfs_root, bMSDfsRoot)
2063 FN_LOCAL_STRING(lp_dfree_command, szDfree)
2064 FN_LOCAL_BOOL(lp_autoloaded, autoloaded)
2065 FN_LOCAL_BOOL(lp_preexec_close, bPreexecClose)
2066 FN_LOCAL_BOOL(lp_rootpreexec_close, bRootpreexecClose)
2067 FN_LOCAL_INTEGER(lp_casesensitive, iCaseSensitive)
2068 FN_LOCAL_BOOL(lp_preservecase, bCasePreserve)
2069 FN_LOCAL_BOOL(lp_shortpreservecase, bShortCasePreserve)
2070 FN_LOCAL_BOOL(lp_hide_dot_files, bHideDotFiles)
2071 FN_LOCAL_BOOL(lp_hide_special_files, bHideSpecialFiles)
2072 FN_LOCAL_BOOL(lp_hideunreadable, bHideUnReadable)
2073 FN_LOCAL_BOOL(lp_hideunwriteable_files, bHideUnWriteableFiles)
2074 FN_LOCAL_BOOL(lp_browseable, bBrowseable)
2075 FN_LOCAL_BOOL(lp_readonly, bRead_only)
2076 FN_LOCAL_BOOL(lp_no_set_dir, bNo_set_dir)
2077 FN_LOCAL_BOOL(lp_guest_ok, bGuest_ok)
2078 FN_LOCAL_BOOL(lp_guest_only, bGuest_only)
2079 FN_LOCAL_BOOL(lp_print_ok, bPrint_ok)
2080 FN_LOCAL_BOOL(lp_map_hidden, bMap_hidden)
2081 FN_LOCAL_BOOL(lp_map_archive, bMap_archive)
2082 FN_LOCAL_BOOL(lp_store_dos_attributes, bStoreDosAttributes)
2083 FN_LOCAL_BOOL(lp_dmapi_support, bDmapiSupport)
2084 FN_LOCAL_PARM_BOOL(lp_locking, bLocking)
2085 FN_LOCAL_PARM_INTEGER(lp_strict_locking, iStrictLocking)
2086 FN_LOCAL_PARM_BOOL(lp_posix_locking, bPosixLocking)
2087 FN_LOCAL_BOOL(lp_share_modes, bShareModes)
2088 FN_LOCAL_BOOL(lp_oplocks, bOpLocks)
2089 FN_LOCAL_BOOL(lp_level2_oplocks, bLevel2OpLocks)
2090 FN_LOCAL_BOOL(lp_onlyuser, bOnlyUser)
2091 FN_LOCAL_PARM_BOOL(lp_manglednames, bMangledNames)
2092 FN_LOCAL_BOOL(lp_widelinks, bWidelinks)
2093 FN_LOCAL_BOOL(lp_symlinks, bSymlinks)
2094 FN_LOCAL_BOOL(lp_syncalways, bSyncAlways)
2095 FN_LOCAL_BOOL(lp_strict_allocate, bStrictAllocate)
2096 FN_LOCAL_BOOL(lp_strict_sync, bStrictSync)
2097 FN_LOCAL_BOOL(lp_map_system, bMap_system)
2098 FN_LOCAL_BOOL(lp_delete_readonly, bDeleteReadonly)
2099 FN_LOCAL_BOOL(lp_fake_oplocks, bFakeOplocks)
2100 FN_LOCAL_BOOL(lp_recursive_veto_delete, bDeleteVetoFiles)
2101 FN_LOCAL_BOOL(lp_dos_filemode, bDosFilemode)
2102 FN_LOCAL_BOOL(lp_dos_filetimes, bDosFiletimes)
2103 FN_LOCAL_BOOL(lp_dos_filetime_resolution, bDosFiletimeResolution)
2104 FN_LOCAL_BOOL(lp_fake_dir_create_times, bFakeDirCreateTimes)
2105 FN_LOCAL_BOOL(lp_blocking_locks, bBlockingLocks)
2106 FN_LOCAL_BOOL(lp_inherit_perms, bInheritPerms)
2107 FN_LOCAL_BOOL(lp_inherit_acls, bInheritACLS)
2108 FN_LOCAL_BOOL(lp_inherit_owner, bInheritOwner)
2109 FN_LOCAL_BOOL(lp_use_client_driver, bUseClientDriver)
2110 FN_LOCAL_BOOL(lp_default_devmode, bDefaultDevmode)
2111 FN_LOCAL_BOOL(lp_force_printername, bForcePrintername)
2112 FN_LOCAL_BOOL(lp_nt_acl_support, bNTAclSupport)
2113 FN_LOCAL_BOOL(lp_force_unknown_acl_user, bForceUnknownAclUser)
2114 FN_LOCAL_BOOL(lp_ea_support, bEASupport)
2115 FN_LOCAL_BOOL(_lp_use_sendfile, bUseSendfile)
2116 FN_LOCAL_BOOL(lp_profile_acls, bProfileAcls)
2117 FN_LOCAL_BOOL(lp_map_acl_inherit, bMap_acl_inherit)
2118 FN_LOCAL_BOOL(lp_afs_share, bAfs_Share)
2119 FN_LOCAL_BOOL(lp_acl_check_permissions, bAclCheckPermissions)
2120 FN_LOCAL_BOOL(lp_acl_group_control, bAclGroupControl)
2121 FN_LOCAL_BOOL(lp_acl_map_full_control, bAclMapFullControl)
2122 FN_LOCAL_INTEGER(lp_create_mask, iCreate_mask)
2123 FN_LOCAL_INTEGER(lp_force_create_mode, iCreate_force_mode)
2124 FN_LOCAL_INTEGER(lp_security_mask, iSecurity_mask)
2125 FN_LOCAL_INTEGER(lp_force_security_mode, iSecurity_force_mode)
2126 FN_LOCAL_INTEGER(lp_dir_mask, iDir_mask)
2127 FN_LOCAL_INTEGER(lp_force_dir_mode, iDir_force_mode)
2128 FN_LOCAL_INTEGER(lp_dir_security_mask, iDir_Security_mask)
2129 FN_LOCAL_INTEGER(lp_force_dir_security_mode, iDir_Security_force_mode)
2130 FN_LOCAL_INTEGER(lp_max_connections, iMaxConnections)
2131 FN_LOCAL_INTEGER(lp_defaultcase, iDefaultCase)
2132 FN_LOCAL_INTEGER(lp_minprintspace, iMinPrintSpace)
2133 FN_LOCAL_INTEGER(lp_printing, iPrinting)
2134 FN_LOCAL_INTEGER(lp_max_reported_jobs, iMaxReportedPrintJobs)
2135 FN_LOCAL_INTEGER(lp_oplock_contention_limit, iOplockContentionLimit)
2136 FN_LOCAL_INTEGER(lp_csc_policy, iCSCPolicy)
2137 FN_LOCAL_INTEGER(lp_write_cache_size, iWriteCacheSize)
2138 FN_LOCAL_INTEGER(lp_block_size, iBlock_size)
2139 FN_LOCAL_INTEGER(lp_dfree_cache_time, iDfreeCacheTime)
2140 FN_LOCAL_INTEGER(lp_allocation_roundup_size, iallocation_roundup_size)
2141 FN_LOCAL_INTEGER(lp_aio_read_size, iAioReadSize)
2142 FN_LOCAL_INTEGER(lp_aio_write_size, iAioWriteSize)
2143 FN_LOCAL_INTEGER(lp_map_readonly, iMap_readonly)
2144 FN_LOCAL_CHAR(lp_magicchar, magic_char)
2145 FN_GLOBAL_INTEGER(lp_winbind_cache_time, &Globals.winbind_cache_time)
2146 FN_GLOBAL_LIST(lp_winbind_nss_info, &Globals.szWinbindNssInfo)
2147 FN_GLOBAL_INTEGER(lp_algorithmic_rid_base, &Globals.AlgorithmicRidBase)
2148 FN_GLOBAL_INTEGER(lp_name_cache_timeout, &Globals.name_cache_timeout)
2149 FN_GLOBAL_INTEGER(lp_client_signing, &Globals.client_signing)
2150 FN_GLOBAL_INTEGER(lp_server_signing, &Globals.server_signing)
2151
2152 /* local prototypes */
2153
2154 static int map_parameter(const char *pszParmName);
2155 static BOOL set_boolean(BOOL *pb, const char *pszParmValue);
2156 static int getservicebyname(const char *pszServiceName,
2157                             service * pserviceDest);
2158 static void copy_service(service * pserviceDest,
2159                          service * pserviceSource, BOOL *pcopymapDest);
2160 static BOOL service_ok(int iService);
2161 static BOOL do_parameter(const char *pszParmName, const char *pszParmValue);
2162 static BOOL do_section(const char *pszSectionName);
2163 static void init_copymap(service * pservice);
2164 static BOOL hash_a_service(const char *name, int number);
2165 static void free_service_byindex(int iService);
2166 static char * canonicalize_servicename(const char *name);
2167
2168 /* This is a helper function for parametrical options support. */
2169 /* It returns a pointer to parametrical option value if it exists or NULL otherwise */
2170 /* Actual parametrical functions are quite simple */
2171 static param_opt_struct *get_parametrics(int snum, const char *type, const char *option)
2172 {
2173         BOOL global_section = False;
2174         char* param_key;
2175         param_opt_struct *data;
2176         
2177         if (snum >= iNumServices) return NULL;
2178         
2179         if (snum < 0) { 
2180                 data = Globals.param_opt;
2181                 global_section = True;
2182         } else {
2183                 data = ServicePtrs[snum]->param_opt;
2184         }
2185     
2186         asprintf(&param_key, "%s:%s", type, option);
2187         if (!param_key) {
2188                 DEBUG(0,("asprintf failed!\n"));
2189                 return NULL;
2190         }
2191
2192         while (data) {
2193                 if (strcmp(data->key, param_key) == 0) {
2194                         string_free(&param_key);
2195                         return data;
2196                 }
2197                 data = data->next;
2198         }
2199
2200         if (!global_section) {
2201                 /* Try to fetch the same option but from globals */
2202                 /* but only if we are not already working with Globals */
2203                 data = Globals.param_opt;
2204                 while (data) {
2205                         if (strcmp(data->key, param_key) == 0) {
2206                                 string_free(&param_key);
2207                                 return data;
2208                         }
2209                         data = data->next;
2210                 }
2211         }
2212
2213         string_free(&param_key);
2214         
2215         return NULL;
2216 }
2217
2218
2219 #define MISSING_PARAMETER(name) \
2220     DEBUG(0, ("%s(): value is NULL or empty!\n", #name))
2221
2222 /*******************************************************************
2223 convenience routine to return int parameters.
2224 ********************************************************************/
2225 static int lp_int(const char *s)
2226 {
2227
2228         if (!s || !*s) {
2229                 MISSING_PARAMETER(lp_int);
2230                 return (-1);
2231         }
2232
2233         return atoi(s); 
2234 }
2235
2236 /*******************************************************************
2237 convenience routine to return unsigned long parameters.
2238 ********************************************************************/
2239 static unsigned long lp_ulong(const char *s)
2240 {
2241
2242         if (!s || !*s) {
2243                 MISSING_PARAMETER(lp_ulong);
2244                 return (0);
2245         }
2246
2247         return strtoul(s, NULL, 10);
2248 }
2249
2250 /*******************************************************************
2251 convenience routine to return boolean parameters.
2252 ********************************************************************/
2253 static BOOL lp_bool(const char *s)
2254 {
2255         BOOL ret = False;
2256
2257         if (!s || !*s) {
2258                 MISSING_PARAMETER(lp_bool);
2259                 return False;
2260         }
2261         
2262         if (!set_boolean(&ret,s)) {
2263                 DEBUG(0,("lp_bool(%s): value is not boolean!\n",s));
2264                 return False;
2265         }
2266
2267         return ret;
2268 }
2269
2270 /*******************************************************************
2271 convenience routine to return enum parameters.
2272 ********************************************************************/
2273 static int lp_enum(const char *s,const struct enum_list *_enum)
2274 {
2275         int i;
2276
2277         if (!s || !*s || !_enum) {
2278                 MISSING_PARAMETER(lp_enum);
2279                 return (-1);
2280         }
2281         
2282         for (i=0; _enum[i].name; i++) {
2283                 if (strequal(_enum[i].name,s))
2284                         return _enum[i].value;
2285         }
2286
2287         DEBUG(0,("lp_enum(%s,enum): value is not in enum_list!\n",s));
2288         return (-1);
2289 }
2290
2291 #undef MISSING_PARAMETER
2292
2293 /* DO NOT USE lp_parm_string ANYMORE!!!!
2294  * use lp_parm_const_string or lp_parm_talloc_string
2295  *
2296  * lp_parm_string is only used to let old modules find this symbol
2297  */
2298 #undef lp_parm_string
2299  char *lp_parm_string(const char *servicename, const char *type, const char *option);
2300  char *lp_parm_string(const char *servicename, const char *type, const char *option)
2301 {
2302         return lp_parm_talloc_string(lp_servicenumber(servicename), type, option, NULL);
2303 }
2304
2305 /* Return parametric option from a given service. Type is a part of option before ':' */
2306 /* Parametric option has following syntax: 'Type: option = value' */
2307 /* the returned value is talloced in lp_talloc */
2308 char *lp_parm_talloc_string(int snum, const char *type, const char *option, const char *def)
2309 {
2310         param_opt_struct *data = get_parametrics(snum, type, option);
2311         
2312         if (data == NULL||data->value==NULL) {
2313                 if (def) {
2314                         return lp_string(def);
2315                 } else {
2316                         return NULL;
2317                 }
2318         }
2319
2320         return lp_string(data->value);
2321 }
2322
2323 /* Return parametric option from a given service. Type is a part of option before ':' */
2324 /* Parametric option has following syntax: 'Type: option = value' */
2325 const char *lp_parm_const_string(int snum, const char *type, const char *option, const char *def)
2326 {
2327         param_opt_struct *data = get_parametrics(snum, type, option);
2328         
2329         if (data == NULL||data->value==NULL)
2330                 return def;
2331                 
2332         return data->value;
2333 }
2334
2335 /* Return parametric option from a given service. Type is a part of option before ':' */
2336 /* Parametric option has following syntax: 'Type: option = value' */
2337
2338 const char **lp_parm_string_list(int snum, const char *type, const char *option, const char **def)
2339 {
2340         param_opt_struct *data = get_parametrics(snum, type, option);
2341
2342         if (data == NULL||data->value==NULL)
2343                 return (const char **)def;
2344                 
2345         if (data->list==NULL) {
2346                 data->list = str_list_make(data->value, NULL);
2347         }
2348
2349         return (const char **)data->list;
2350 }
2351
2352 /* Return parametric option from a given service. Type is a part of option before ':' */
2353 /* Parametric option has following syntax: 'Type: option = value' */
2354
2355 int lp_parm_int(int snum, const char *type, const char *option, int def)
2356 {
2357         param_opt_struct *data = get_parametrics(snum, type, option);
2358         
2359         if (data && data->value && *data->value)
2360                 return lp_int(data->value);
2361
2362         return def;
2363 }
2364
2365 /* Return parametric option from a given service. Type is a part of option before ':' */
2366 /* Parametric option has following syntax: 'Type: option = value' */
2367
2368 unsigned long lp_parm_ulong(int snum, const char *type, const char *option, unsigned long def)
2369 {
2370         param_opt_struct *data = get_parametrics(snum, type, option);
2371         
2372         if (data && data->value && *data->value)
2373                 return lp_ulong(data->value);
2374
2375         return def;
2376 }
2377
2378 /* Return parametric option from a given service. Type is a part of option before ':' */
2379 /* Parametric option has following syntax: 'Type: option = value' */
2380
2381 BOOL lp_parm_bool(int snum, const char *type, const char *option, BOOL def)
2382 {
2383         param_opt_struct *data = get_parametrics(snum, type, option);
2384         
2385         if (data && data->value && *data->value)
2386                 return lp_bool(data->value);
2387
2388         return def;
2389 }
2390
2391 /* Return parametric option from a given service. Type is a part of option before ':' */
2392 /* Parametric option has following syntax: 'Type: option = value' */
2393
2394 int lp_parm_enum(int snum, const char *type, const char *option,
2395                  const struct enum_list *_enum, int def)
2396 {
2397         param_opt_struct *data = get_parametrics(snum, type, option);
2398         
2399         if (data && data->value && *data->value && _enum)
2400                 return lp_enum(data->value, _enum);
2401
2402         return def;
2403 }
2404
2405
2406 /***************************************************************************
2407  Initialise a service to the defaults.
2408 ***************************************************************************/
2409
2410 static void init_service(service * pservice)
2411 {
2412         memset((char *)pservice, '\0', sizeof(service));
2413         copy_service(pservice, &sDefault, NULL);
2414 }
2415
2416 /***************************************************************************
2417  Free the dynamically allocated parts of a service struct.
2418 ***************************************************************************/
2419
2420 static void free_service(service *pservice)
2421 {
2422         int i;
2423         param_opt_struct *data, *pdata;
2424         if (!pservice)
2425                 return;
2426
2427         if (pservice->szService)
2428                 DEBUG(5, ("free_service: Freeing service %s\n",
2429                        pservice->szService));
2430
2431         string_free(&pservice->szService);
2432         SAFE_FREE(pservice->copymap);
2433
2434         for (i = 0; parm_table[i].label; i++) {
2435                 if ((parm_table[i].type == P_STRING ||
2436                      parm_table[i].type == P_USTRING) &&
2437                     parm_table[i].p_class == P_LOCAL)
2438                         string_free((char **)
2439                                     (((char *)pservice) +
2440                                      PTR_DIFF(parm_table[i].ptr, &sDefault)));
2441                 else if (parm_table[i].type == P_LIST &&
2442                          parm_table[i].p_class == P_LOCAL)
2443                              str_list_free((char ***)
2444                                             (((char *)pservice) +
2445                                              PTR_DIFF(parm_table[i].ptr, &sDefault)));
2446         }
2447
2448         data = pservice->param_opt;
2449         if (data)
2450                 DEBUG(5,("Freeing parametrics:\n"));
2451         while (data) {
2452                 DEBUG(5,("[%s = %s]\n", data->key, data->value));
2453                 string_free(&data->key);
2454                 string_free(&data->value);
2455                 str_list_free(&data->list);
2456                 pdata = data->next;
2457                 SAFE_FREE(data);
2458                 data = pdata;
2459         }
2460
2461         ZERO_STRUCTP(pservice);
2462 }
2463
2464
2465 /***************************************************************************
2466  remove a service indexed in the ServicePtrs array from the ServiceHash
2467  and free the dynamically allocated parts
2468 ***************************************************************************/
2469
2470 static void free_service_byindex(int idx)
2471 {
2472         if ( !LP_SNUM_OK(idx) ) 
2473                 return;
2474
2475         ServicePtrs[idx]->valid = False;
2476         invalid_services[num_invalid_services++] = idx;
2477
2478         /* we have to cleanup the hash record */
2479
2480         if (ServicePtrs[idx]->szService) {
2481                 char *canon_name = canonicalize_servicename( ServicePtrs[idx]->szService );
2482                 
2483                 tdb_delete_bystring(ServiceHash, canon_name );
2484         }
2485
2486         free_service(ServicePtrs[idx]);
2487 }
2488
2489 /***************************************************************************
2490  Add a new service to the services array initialising it with the given 
2491  service. 
2492 ***************************************************************************/
2493
2494 static int add_a_service(const service *pservice, const char *name)
2495 {
2496         int i;
2497         service tservice;
2498         int num_to_alloc = iNumServices + 1;
2499         param_opt_struct *data, *pdata;
2500
2501         tservice = *pservice;
2502
2503         /* it might already exist */
2504         if (name) {
2505                 i = getservicebyname(name, NULL);
2506                 if (i >= 0) {
2507                         /* Clean all parametric options for service */
2508                         /* They will be added during parsing again */
2509                         data = ServicePtrs[i]->param_opt;
2510                         while (data) {
2511                                 string_free(&data->key);
2512                                 string_free(&data->value);
2513                                 str_list_free(&data->list);
2514                                 pdata = data->next;
2515                                 SAFE_FREE(data);
2516                                 data = pdata;
2517                         }
2518                         ServicePtrs[i]->param_opt = NULL;
2519                         return (i);
2520                 }
2521         }
2522
2523         /* find an invalid one */
2524         i = iNumServices;
2525         if (num_invalid_services > 0) {
2526                 i = invalid_services[--num_invalid_services];
2527         }
2528
2529         /* if not, then create one */
2530         if (i == iNumServices) {
2531                 service **tsp;
2532                 int *tinvalid;
2533                 
2534                 tsp = SMB_REALLOC_ARRAY_KEEP_OLD_ON_ERROR(ServicePtrs, service *, num_to_alloc);
2535                 if (tsp == NULL) {
2536                         DEBUG(0,("add_a_service: failed to enlarge ServicePtrs!\n"));
2537                         return (-1);
2538                 }
2539                 ServicePtrs = tsp;
2540                 ServicePtrs[iNumServices] = SMB_MALLOC_P(service);
2541                 if (!ServicePtrs[iNumServices]) {
2542                         DEBUG(0,("add_a_service: out of memory!\n"));
2543                         return (-1);
2544                 }
2545                 iNumServices++;
2546
2547                 /* enlarge invalid_services here for now... */
2548                 tinvalid = SMB_REALLOC_ARRAY_KEEP_OLD_ON_ERROR(invalid_services, int,
2549                                              num_to_alloc);
2550                 if (tinvalid == NULL) {
2551                         DEBUG(0,("add_a_service: failed to enlarge "
2552                                  "invalid_services!\n"));
2553                         return (-1);
2554                 }
2555                 invalid_services = tinvalid;
2556         } else {
2557                 free_service_byindex(i);
2558         }
2559
2560         ServicePtrs[i]->valid = True;
2561
2562         init_service(ServicePtrs[i]);
2563         copy_service(ServicePtrs[i], &tservice, NULL);
2564         if (name)
2565                 string_set(&ServicePtrs[i]->szService, name);
2566                 
2567         DEBUG(8,("add_a_service: Creating snum = %d for %s\n", 
2568                 i, ServicePtrs[i]->szService));
2569
2570         if (!hash_a_service(ServicePtrs[i]->szService, i)) {
2571                 return (-1);
2572         }
2573                 
2574         return (i);
2575 }
2576
2577 /***************************************************************************
2578   Convert a string to uppercase and remove whitespaces.
2579 ***************************************************************************/
2580
2581 static char *canonicalize_servicename(const char *src)
2582 {
2583         static fstring canon; /* is fstring large enough? */
2584
2585         if ( !src ) {
2586                 DEBUG(0,("canonicalize_servicename: NULL source name!\n"));
2587                 return NULL;
2588         }
2589
2590         fstrcpy( canon, src );
2591         strlower_m( canon );
2592
2593         return canon;
2594 }
2595
2596 /***************************************************************************
2597   Add a name/index pair for the services array to the hash table.
2598 ***************************************************************************/
2599
2600 static BOOL hash_a_service(const char *name, int idx)
2601 {
2602         char *canon_name;
2603
2604         if ( !ServiceHash ) {
2605                 DEBUG(10,("hash_a_service: creating tdb servicehash\n"));
2606                 ServiceHash = tdb_open("servicehash", 1031, TDB_INTERNAL, 
2607                                         (O_RDWR|O_CREAT), 0600);
2608                 if ( !ServiceHash ) {
2609                         DEBUG(0,("hash_a_service: open tdb servicehash failed!\n"));
2610                         return False;
2611                 }
2612         }
2613
2614         DEBUG(10,("hash_a_service: hashing index %d for service name %s\n",
2615                 idx, name));
2616
2617         if ( !(canon_name = canonicalize_servicename( name )) )
2618                 return False;
2619
2620         tdb_store_int32(ServiceHash, canon_name, idx);
2621
2622         return True;
2623 }
2624
2625 /***************************************************************************
2626  Add a new home service, with the specified home directory, defaults coming 
2627  from service ifrom.
2628 ***************************************************************************/
2629
2630 BOOL lp_add_home(const char *pszHomename, int iDefaultService, 
2631                  const char *user, const char *pszHomedir)
2632 {
2633         int i;
2634         pstring newHomedir;
2635
2636         i = add_a_service(ServicePtrs[iDefaultService], pszHomename);
2637
2638         if (i < 0)
2639                 return (False);
2640
2641         if (!(*(ServicePtrs[iDefaultService]->szPath))
2642             || strequal(ServicePtrs[iDefaultService]->szPath, lp_pathname(GLOBAL_SECTION_SNUM))) {
2643                 pstrcpy(newHomedir, pszHomedir);
2644                 string_set(&ServicePtrs[i]->szPath, newHomedir);
2645         } 
2646
2647         if (!(*(ServicePtrs[i]->comment))) {
2648                 pstring comment;
2649                 slprintf(comment, sizeof(comment) - 1,
2650                          "Home directory of %s", user);
2651                 string_set(&ServicePtrs[i]->comment, comment);
2652         }
2653
2654         /* set the browseable flag from the global default */
2655
2656         ServicePtrs[i]->bBrowseable = sDefault.bBrowseable;
2657
2658         ServicePtrs[i]->autoloaded = True;
2659
2660         DEBUG(3, ("adding home's share [%s] for user '%s' at '%s'\n", pszHomename, 
2661                user, ServicePtrs[i]->szPath ));
2662         
2663         return (True);
2664 }
2665
2666 /***************************************************************************
2667  Add a new service, based on an old one.
2668 ***************************************************************************/
2669
2670 int lp_add_service(const char *pszService, int iDefaultService)
2671 {
2672         if (iDefaultService < 0) {
2673                 return add_a_service(&sDefault, pszService);
2674         }
2675
2676         return (add_a_service(ServicePtrs[iDefaultService], pszService));
2677 }
2678
2679 /***************************************************************************
2680  Add the IPC service.
2681 ***************************************************************************/
2682
2683 static BOOL lp_add_ipc(const char *ipc_name, BOOL guest_ok)
2684 {
2685         pstring comment;
2686         int i = add_a_service(&sDefault, ipc_name);
2687
2688         if (i < 0)
2689                 return (False);
2690
2691         slprintf(comment, sizeof(comment) - 1,
2692                  "IPC Service (%s)", Globals.szServerString);
2693
2694         string_set(&ServicePtrs[i]->szPath, tmpdir());
2695         string_set(&ServicePtrs[i]->szUsername, "");
2696         string_set(&ServicePtrs[i]->comment, comment);
2697         string_set(&ServicePtrs[i]->fstype, "IPC");
2698         ServicePtrs[i]->iMaxConnections = 0;
2699         ServicePtrs[i]->bAvailable = True;
2700         ServicePtrs[i]->bRead_only = True;
2701         ServicePtrs[i]->bGuest_only = False;
2702         ServicePtrs[i]->bGuest_ok = guest_ok;
2703         ServicePtrs[i]->bPrint_ok = False;
2704         ServicePtrs[i]->bBrowseable = sDefault.bBrowseable;
2705
2706         DEBUG(3, ("adding IPC service\n"));
2707
2708         return (True);
2709 }
2710
2711 /***************************************************************************
2712  Add a new printer service, with defaults coming from service iFrom.
2713 ***************************************************************************/
2714
2715 BOOL lp_add_printer(const char *pszPrintername, int iDefaultService)
2716 {
2717         const char *comment = "From Printcap";
2718         int i = add_a_service(ServicePtrs[iDefaultService], pszPrintername);
2719
2720         if (i < 0)
2721                 return (False);
2722
2723         /* note that we do NOT default the availability flag to True - */
2724         /* we take it from the default service passed. This allows all */
2725         /* dynamic printers to be disabled by disabling the [printers] */
2726         /* entry (if/when the 'available' keyword is implemented!).    */
2727
2728         /* the printer name is set to the service name. */
2729         string_set(&ServicePtrs[i]->szPrintername, pszPrintername);
2730         string_set(&ServicePtrs[i]->comment, comment);
2731
2732         /* set the browseable flag from the gloabl default */
2733         ServicePtrs[i]->bBrowseable = sDefault.bBrowseable;
2734
2735         /* Printers cannot be read_only. */
2736         ServicePtrs[i]->bRead_only = False;
2737         /* No share modes on printer services. */
2738         ServicePtrs[i]->bShareModes = False;
2739         /* No oplocks on printer services. */
2740         ServicePtrs[i]->bOpLocks = False;
2741         /* Printer services must be printable. */
2742         ServicePtrs[i]->bPrint_ok = True;
2743         
2744         DEBUG(3, ("adding printer service %s\n", pszPrintername));
2745
2746         return (True);
2747 }
2748
2749 /***************************************************************************
2750  Map a parameter's string representation to something we can use. 
2751  Returns False if the parameter string is not recognised, else TRUE.
2752 ***************************************************************************/
2753
2754 static int map_parameter(const char *pszParmName)
2755 {
2756         int iIndex;
2757
2758         if (*pszParmName == '-')
2759                 return (-1);
2760
2761         for (iIndex = 0; parm_table[iIndex].label; iIndex++)
2762                 if (strwicmp(parm_table[iIndex].label, pszParmName) == 0)
2763                         return (iIndex);
2764
2765         /* Warn only if it isn't parametric option */
2766         if (strchr(pszParmName, ':') == NULL)
2767                 DEBUG(0, ("Unknown parameter encountered: \"%s\"\n", pszParmName));
2768         /* We do return 'fail' for parametric options as well because they are
2769            stored in different storage
2770          */
2771         return (-1);
2772 }
2773
2774 /***************************************************************************
2775  Show all parameter's name, type, [values,] and flags.
2776 ***************************************************************************/
2777
2778 void show_parameter_list(void)
2779 {
2780         int classIndex, parmIndex, enumIndex, flagIndex;
2781         BOOL hadFlag;
2782         const char *section_names[] = { "local", "global", NULL};
2783         const char *type[] = { "P_BOOL", "P_BOOLREV", "P_CHAR", "P_INTEGER",
2784                 "P_OCTAL", "P_LIST", "P_STRING", "P_USTRING", "P_GSTRING",
2785                 "P_UGSTRING", "P_ENUM", "P_SEP"};
2786         unsigned flags[] = { FLAG_BASIC, FLAG_SHARE, FLAG_PRINT, FLAG_GLOBAL,
2787                 FLAG_WIZARD, FLAG_ADVANCED, FLAG_DEVELOPER, FLAG_DEPRECATED,
2788                 FLAG_HIDE, FLAG_DOS_STRING};
2789         const char *flag_names[] = { "FLAG_BASIC", "FLAG_SHARE", "FLAG_PRINT",
2790                 "FLAG_GLOBAL", "FLAG_WIZARD", "FLAG_ADVANCED", "FLAG_DEVELOPER",
2791                 "FLAG_DEPRECATED", "FLAG_HIDE", "FLAG_DOS_STRING", NULL};
2792
2793         for ( classIndex=0; section_names[classIndex]; classIndex++) {
2794                 printf("[%s]\n", section_names[classIndex]);
2795                 for (parmIndex = 0; parm_table[parmIndex].label; parmIndex++) {
2796                         if (parm_table[parmIndex].p_class == classIndex) {
2797                                 printf("%s=%s", 
2798                                         parm_table[parmIndex].label,
2799                                         type[parm_table[parmIndex].type]);
2800                                 switch (parm_table[parmIndex].type) {
2801                                 case P_ENUM:
2802                                         printf(",");
2803                                         for (enumIndex=0; parm_table[parmIndex].enum_list[enumIndex].name; enumIndex++)
2804                                                 printf("%s%s",
2805                                                         enumIndex ? "|" : "",
2806                                                         parm_table[parmIndex].enum_list[enumIndex].name);
2807                                         break;
2808                                 default:
2809                                         break;
2810                                 }
2811                                 printf(",");
2812                                 hadFlag = False;
2813                                 for ( flagIndex=0; flag_names[flagIndex]; flagIndex++ ) {
2814                                         if (parm_table[parmIndex].flags & flags[flagIndex]) {
2815                                                 printf("%s%s",
2816                                                         hadFlag ? "|" : "",
2817                                                         flag_names[flagIndex]);
2818                                                 hadFlag = True;
2819                                         }
2820                                 }
2821                                 printf("\n");
2822                         }
2823                 }
2824         }
2825 }
2826
2827 /***************************************************************************
2828  Set a boolean variable from the text value stored in the passed string.
2829  Returns True in success, False if the passed string does not correctly 
2830  represent a boolean.
2831 ***************************************************************************/
2832
2833 static BOOL set_boolean(BOOL *pb, const char *pszParmValue)
2834 {
2835         BOOL bRetval;
2836
2837         bRetval = True;
2838         if (strwicmp(pszParmValue, "yes") == 0 ||
2839             strwicmp(pszParmValue, "true") == 0 ||
2840             strwicmp(pszParmValue, "1") == 0)
2841                 *pb = True;
2842         else if (strwicmp(pszParmValue, "no") == 0 ||
2843                     strwicmp(pszParmValue, "False") == 0 ||
2844                     strwicmp(pszParmValue, "0") == 0)
2845                 *pb = False;
2846         else {
2847                 DEBUG(0,
2848                       ("ERROR: Badly formed boolean in configuration file: \"%s\".\n",
2849                        pszParmValue));
2850                 bRetval = False;
2851         }
2852         return (bRetval);
2853 }
2854
2855 /***************************************************************************
2856 Find a service by name. Otherwise works like get_service.
2857 ***************************************************************************/
2858
2859 static int getservicebyname(const char *pszServiceName, service * pserviceDest)
2860 {
2861         int iService = -1;
2862         char *canon_name;
2863
2864         if (ServiceHash != NULL) {
2865                 if ( !(canon_name = canonicalize_servicename( pszServiceName )) )
2866                         return -1;
2867
2868                 iService = tdb_fetch_int32(ServiceHash, canon_name );
2869
2870                 if (LP_SNUM_OK(iService)) {
2871                         if (pserviceDest != NULL) {
2872                                 copy_service(pserviceDest, ServicePtrs[iService], NULL);
2873                         }
2874                 } else {
2875                         iService = -1;
2876                 }
2877         }
2878
2879         return (iService);
2880 }
2881
2882 /***************************************************************************
2883  Copy a service structure to another.
2884  If pcopymapDest is NULL then copy all fields
2885 ***************************************************************************/
2886
2887 static void copy_service(service * pserviceDest, service * pserviceSource, BOOL *pcopymapDest)
2888 {
2889         int i;
2890         BOOL bcopyall = (pcopymapDest == NULL);
2891         param_opt_struct *data, *pdata, *paramo;
2892         BOOL not_added;
2893
2894         for (i = 0; parm_table[i].label; i++)
2895                 if (parm_table[i].ptr && parm_table[i].p_class == P_LOCAL &&
2896                     (bcopyall || pcopymapDest[i])) {
2897                         void *def_ptr = parm_table[i].ptr;
2898                         void *src_ptr =
2899                                 ((char *)pserviceSource) + PTR_DIFF(def_ptr,
2900                                                                     &sDefault);
2901                         void *dest_ptr =
2902                                 ((char *)pserviceDest) + PTR_DIFF(def_ptr,
2903                                                                   &sDefault);
2904
2905                         switch (parm_table[i].type) {
2906                                 case P_BOOL:
2907                                 case P_BOOLREV:
2908                                         *(BOOL *)dest_ptr = *(BOOL *)src_ptr;
2909                                         break;
2910
2911                                 case P_INTEGER:
2912                                 case P_ENUM:
2913                                 case P_OCTAL:
2914                                         *(int *)dest_ptr = *(int *)src_ptr;
2915                                         break;
2916
2917                                 case P_CHAR:
2918                                         *(char *)dest_ptr = *(char *)src_ptr;
2919                                         break;
2920
2921                                 case P_STRING:
2922                                         string_set((char **)dest_ptr,
2923                                                    *(char **)src_ptr);
2924                                         break;
2925
2926                                 case P_USTRING:
2927                                         string_set((char **)dest_ptr,
2928                                                    *(char **)src_ptr);
2929                                         strupper_m(*(char **)dest_ptr);
2930                                         break;
2931                                 case P_LIST:
2932                                         str_list_free((char ***)dest_ptr);
2933                                         str_list_copy((char ***)dest_ptr, *(const char ***)src_ptr);
2934                                         break;
2935                                 default:
2936                                         break;
2937                         }
2938                 }
2939
2940         if (bcopyall) {
2941                 init_copymap(pserviceDest);
2942                 if (pserviceSource->copymap)
2943                         memcpy((void *)pserviceDest->copymap,
2944                                (void *)pserviceSource->copymap,
2945                                sizeof(BOOL) * NUMPARAMETERS);
2946         }
2947         
2948         data = pserviceSource->param_opt;
2949         while (data) {
2950                 not_added = True;
2951                 pdata = pserviceDest->param_opt;
2952                 /* Traverse destination */
2953                 while (pdata) {
2954                         /* If we already have same option, override it */
2955                         if (strcmp(pdata->key, data->key) == 0) {
2956                                 string_free(&pdata->value);
2957                                 str_list_free(&data->list);
2958                                 pdata->value = SMB_STRDUP(data->value);
2959                                 not_added = False;
2960                                 break;
2961                         }
2962                         pdata = pdata->next;
2963                 }
2964                 if (not_added) {
2965                     paramo = SMB_XMALLOC_P(param_opt_struct);
2966                     paramo->key = SMB_STRDUP(data->key);
2967                     paramo->value = SMB_STRDUP(data->value);
2968                     paramo->list = NULL;
2969                     DLIST_ADD(pserviceDest->param_opt, paramo);
2970                 }
2971                 data = data->next;
2972         }
2973 }
2974
2975 /***************************************************************************
2976 Check a service for consistency. Return False if the service is in any way
2977 incomplete or faulty, else True.
2978 ***************************************************************************/
2979
2980 static BOOL service_ok(int iService)
2981 {
2982         BOOL bRetval;
2983
2984         bRetval = True;
2985         if (ServicePtrs[iService]->szService[0] == '\0') {
2986                 DEBUG(0, ("The following message indicates an internal error:\n"));
2987                 DEBUG(0, ("No service name in service entry.\n"));
2988                 bRetval = False;
2989         }
2990
2991         /* The [printers] entry MUST be printable. I'm all for flexibility, but */
2992         /* I can't see why you'd want a non-printable printer service...        */
2993         if (strwicmp(ServicePtrs[iService]->szService, PRINTERS_NAME) == 0) {
2994                 if (!ServicePtrs[iService]->bPrint_ok) {
2995                         DEBUG(0, ("WARNING: [%s] service MUST be printable!\n",
2996                                ServicePtrs[iService]->szService));
2997                         ServicePtrs[iService]->bPrint_ok = True;
2998                 }
2999                 /* [printers] service must also be non-browsable. */
3000                 if (ServicePtrs[iService]->bBrowseable)
3001                         ServicePtrs[iService]->bBrowseable = False;
3002         }
3003
3004         if (ServicePtrs[iService]->szPath[0] == '\0' &&
3005             strwicmp(ServicePtrs[iService]->szService, HOMES_NAME) != 0 &&
3006             ServicePtrs[iService]->szMSDfsProxy[0] == '\0'
3007             ) {
3008                 DEBUG(0, ("WARNING: No path in service %s - making it unavailable!\n",
3009                         ServicePtrs[iService]->szService));
3010                 ServicePtrs[iService]->bAvailable = False;
3011         }
3012
3013         /* If a service is flagged unavailable, log the fact at level 0. */
3014         if (!ServicePtrs[iService]->bAvailable)
3015                 DEBUG(1, ("NOTE: Service %s is flagged unavailable.\n",
3016                           ServicePtrs[iService]->szService));
3017
3018         return (bRetval);
3019 }
3020
3021 static struct file_lists {
3022         struct file_lists *next;
3023         char *name;
3024         char *subfname;
3025         time_t modtime;
3026 } *file_lists = NULL;
3027
3028 /*******************************************************************
3029  Keep a linked list of all config files so we know when one has changed 
3030  it's date and needs to be reloaded.
3031 ********************************************************************/
3032
3033 static void add_to_file_list(const char *fname, const char *subfname)
3034 {
3035         struct file_lists *f = file_lists;
3036
3037         while (f) {
3038                 if (f->name && !strcmp(f->name, fname))
3039                         break;
3040                 f = f->next;
3041         }
3042
3043         if (!f) {
3044                 f = SMB_MALLOC_P(struct file_lists);
3045                 if (!f)
3046                         return;
3047                 f->next = file_lists;
3048                 f->name = SMB_STRDUP(fname);
3049                 if (!f->name) {
3050                         SAFE_FREE(f);
3051                         return;
3052                 }
3053                 f->subfname = SMB_STRDUP(subfname);
3054                 if (!f->subfname) {
3055                         SAFE_FREE(f);
3056                         return;
3057                 }
3058                 file_lists = f;
3059                 f->modtime = file_modtime(subfname);
3060         } else {
3061                 time_t t = file_modtime(subfname);
3062                 if (t)
3063                         f->modtime = t;
3064         }
3065 }
3066
3067 /*******************************************************************
3068  Check if a config file has changed date.
3069 ********************************************************************/
3070
3071 BOOL lp_file_list_changed(void)
3072 {
3073         struct file_lists *f = file_lists;
3074
3075         DEBUG(6, ("lp_file_list_changed()\n"));
3076
3077         while (f) {
3078                 pstring n2;
3079                 time_t mod_time;
3080
3081                 pstrcpy(n2, f->name);
3082                 standard_sub_basic( get_current_username(),
3083                                     current_user_info.domain,
3084                                     n2, sizeof(n2) );
3085
3086                 DEBUGADD(6, ("file %s -> %s  last mod_time: %s\n",
3087                              f->name, n2, ctime(&f->modtime)));
3088
3089                 mod_time = file_modtime(n2);
3090
3091                 if (mod_time && ((f->modtime != mod_time) || (f->subfname == NULL) || (strcmp(n2, f->subfname) != 0))) {
3092                         DEBUGADD(6,
3093                                  ("file %s modified: %s\n", n2,
3094                                   ctime(&mod_time)));
3095                         f->modtime = mod_time;
3096                         SAFE_FREE(f->subfname);
3097                         f->subfname = SMB_STRDUP(n2);
3098                         return (True);
3099                 }
3100                 f = f->next;
3101         }
3102         return (False);
3103 }
3104
3105 /***************************************************************************
3106  Run standard_sub_basic on netbios name... needed because global_myname
3107  is not accessed through any lp_ macro.
3108  Note: We must *NOT* use string_set() here as ptr points to global_myname.
3109 ***************************************************************************/
3110
3111 static BOOL handle_netbios_name(int snum, const char *pszParmValue, char **ptr)
3112 {
3113         BOOL ret;
3114         pstring netbios_name;
3115
3116         pstrcpy(netbios_name, pszParmValue);
3117
3118         standard_sub_basic(get_current_username(), current_user_info.domain,
3119                            netbios_name, sizeof(netbios_name));
3120
3121         ret = set_global_myname(netbios_name);
3122         string_set(&Globals.szNetbiosName,global_myname());
3123         
3124         DEBUG(4, ("handle_netbios_name: set global_myname to: %s\n",
3125                global_myname()));
3126
3127         return ret;
3128 }
3129
3130 static BOOL handle_charset(int snum, const char *pszParmValue, char **ptr)
3131 {
3132         if (strcmp(*ptr, pszParmValue) != 0) {
3133                 string_set(ptr, pszParmValue);
3134                 init_iconv();
3135         }
3136         return True;
3137 }
3138
3139
3140
3141 static BOOL handle_workgroup(int snum, const char *pszParmValue, char **ptr)
3142 {
3143         BOOL ret;
3144         
3145         ret = set_global_myworkgroup(pszParmValue);
3146         string_set(&Globals.szWorkgroup,lp_workgroup());
3147         
3148         return ret;
3149 }
3150
3151 static BOOL handle_netbios_scope(int snum, const char *pszParmValue, char **ptr)
3152 {
3153         BOOL ret;
3154         
3155         ret = set_global_scope(pszParmValue);
3156         string_set(&Globals.szNetbiosScope,global_scope());
3157
3158         return ret;
3159 }
3160
3161 static BOOL handle_netbios_aliases(int snum, const char *pszParmValue, char **ptr)
3162 {
3163         str_list_free(&Globals.szNetbiosAliases);
3164         Globals.szNetbiosAliases = str_list_make(pszParmValue, NULL);
3165         return set_netbios_aliases((const char **)Globals.szNetbiosAliases);
3166 }
3167
3168 /***************************************************************************
3169  Handle the include operation.
3170 ***************************************************************************/
3171
3172 static BOOL handle_include(int snum, const char *pszParmValue, char **ptr)
3173 {
3174         pstring fname;
3175         pstrcpy(fname, pszParmValue);
3176
3177         standard_sub_basic(get_current_username(), current_user_info.domain,
3178                            fname,sizeof(fname));
3179
3180         add_to_file_list(pszParmValue, fname);
3181
3182         string_set(ptr, fname);
3183
3184         if (file_exist(fname, NULL))
3185                 return (pm_process(fname, do_section, do_parameter));
3186
3187         DEBUG(2, ("Can't find include file %s\n", fname));
3188
3189         return (False);
3190 }
3191
3192 /***************************************************************************
3193  Handle the interpretation of the copy parameter.
3194 ***************************************************************************/
3195
3196 static BOOL handle_copy(int snum, const char *pszParmValue, char **ptr)
3197 {
3198         BOOL bRetval;
3199         int iTemp;
3200         service serviceTemp;
3201
3202         string_set(ptr, pszParmValue);
3203
3204         init_service(&serviceTemp);
3205
3206         bRetval = False;
3207
3208         DEBUG(3, ("Copying service from service %s\n", pszParmValue));
3209
3210         if ((iTemp = getservicebyname(pszParmValue, &serviceTemp)) >= 0) {
3211                 if (iTemp == iServiceIndex) {
3212                         DEBUG(0, ("Can't copy service %s - unable to copy self!\n", pszParmValue));
3213                 } else {
3214                         copy_service(ServicePtrs[iServiceIndex],
3215                                      &serviceTemp,
3216                                      ServicePtrs[iServiceIndex]->copymap);
3217                         bRetval = True;
3218                 }
3219         } else {
3220                 DEBUG(0, ("Unable to copy service - source not found: %s\n", pszParmValue));
3221                 bRetval = False;
3222         }
3223
3224         free_service(&serviceTemp);
3225         return (bRetval);
3226 }
3227
3228 /***************************************************************************
3229  Handle idmap/non unix account uid and gid allocation parameters.  The format of these
3230  parameters is:
3231
3232  [global]
3233
3234         idmap uid = 1000-1999
3235         idmap gid = 700-899
3236
3237  We only do simple parsing checks here.  The strings are parsed into useful
3238  structures in the idmap daemon code.
3239
3240 ***************************************************************************/
3241
3242 /* Some lp_ routines to return idmap [ug]id information */
3243
3244 static uid_t idmap_uid_low, idmap_uid_high;
3245 static gid_t idmap_gid_low, idmap_gid_high;
3246
3247 BOOL lp_idmap_uid(uid_t *low, uid_t *high)
3248 {
3249         if (idmap_uid_low == 0 || idmap_uid_high == 0)
3250                 return False;
3251
3252         if (low)
3253                 *low = idmap_uid_low;
3254
3255         if (high)
3256                 *high = idmap_uid_high;
3257
3258         return True;
3259 }
3260
3261 BOOL lp_idmap_gid(gid_t *low, gid_t *high)
3262 {
3263         if (idmap_gid_low == 0 || idmap_gid_high == 0)
3264                 return False;
3265
3266         if (low)
3267                 *low = idmap_gid_low;
3268
3269         if (high)
3270                 *high = idmap_gid_high;
3271
3272         return True;
3273 }
3274
3275 /* Do some simple checks on "idmap [ug]id" parameter values */
3276
3277 static BOOL handle_idmap_uid(int snum, const char *pszParmValue, char **ptr)
3278 {
3279         uint32 low, high;
3280
3281         if (sscanf(pszParmValue, "%u - %u", &low, &high) != 2 || high < low)
3282                 return False;
3283
3284         /* Parse OK */
3285
3286         string_set(ptr, pszParmValue);
3287
3288         idmap_uid_low = low;
3289         idmap_uid_high = high;
3290
3291         return True;
3292 }
3293
3294 static BOOL handle_idmap_gid(int snum, const char *pszParmValue, char **ptr)
3295 {
3296         uint32 low, high;
3297
3298         if (sscanf(pszParmValue, "%u - %u", &low, &high) != 2 || high < low)
3299                 return False;
3300
3301         /* Parse OK */
3302
3303         string_set(ptr, pszParmValue);
3304
3305         idmap_gid_low = low;
3306         idmap_gid_high = high;
3307
3308         return True;
3309 }
3310
3311 /***************************************************************************
3312  Handle the DEBUG level list.
3313 ***************************************************************************/
3314
3315 static BOOL handle_debug_list( int snum, const char *pszParmValueIn, char **ptr )
3316 {
3317         pstring pszParmValue;
3318
3319         pstrcpy(pszParmValue, pszParmValueIn);
3320         string_set(ptr, pszParmValueIn);
3321         return debug_parse_levels( pszParmValue );
3322 }
3323
3324 /***************************************************************************
3325  Handle ldap suffixes - default to ldapsuffix if sub-suffixes are not defined.
3326 ***************************************************************************/
3327
3328 static const char *append_ldap_suffix( const char *str )
3329 {
3330         const char *suffix_string;
3331
3332
3333         if (!lp_talloc)
3334                 lp_talloc = talloc_init("lp_talloc");
3335
3336         suffix_string = talloc_asprintf( lp_talloc, "%s,%s", str, Globals.szLdapSuffix );
3337         if ( !suffix_string ) {
3338                 DEBUG(0,("append_ldap_suffix: talloc_asprintf() failed!\n"));
3339                 return "";
3340         }
3341
3342         return suffix_string;
3343 }
3344
3345 const char *lp_ldap_machine_suffix(void)
3346 {
3347         if (Globals.szLdapMachineSuffix[0])
3348                 return append_ldap_suffix(Globals.szLdapMachineSuffix);
3349
3350         return lp_string(Globals.szLdapSuffix);
3351 }
3352
3353 const char *lp_ldap_user_suffix(void)
3354 {
3355         if (Globals.szLdapUserSuffix[0])
3356                 return append_ldap_suffix(Globals.szLdapUserSuffix);
3357
3358         return lp_string(Globals.szLdapSuffix);
3359 }
3360
3361 const char *lp_ldap_group_suffix(void)
3362 {
3363         if (Globals.szLdapGroupSuffix[0])
3364                 return append_ldap_suffix(Globals.szLdapGroupSuffix);
3365
3366         return lp_string(Globals.szLdapSuffix);
3367 }
3368
3369 const char *lp_ldap_idmap_suffix(void)
3370 {
3371         if (Globals.szLdapIdmapSuffix[0])
3372                 return append_ldap_suffix(Globals.szLdapIdmapSuffix);
3373
3374         return lp_string(Globals.szLdapSuffix);
3375 }
3376
3377 /****************************************************************************
3378  set the value for a P_ENUM
3379  ***************************************************************************/
3380
3381 static void lp_set_enum_parm( struct parm_struct *parm, const char *pszParmValue,
3382                               int *ptr )
3383 {
3384         int i;
3385
3386         for (i = 0; parm->enum_list[i].name; i++) {
3387                 if ( strequal(pszParmValue, parm->enum_list[i].name)) {
3388                         *ptr = parm->enum_list[i].value;
3389                         break;
3390                 }
3391         }
3392 }
3393
3394 /***************************************************************************
3395 ***************************************************************************/
3396
3397 static BOOL handle_printing(int snum, const char *pszParmValue, char **ptr)
3398 {
3399         static int parm_num = -1;
3400         service *s;
3401
3402         if ( parm_num == -1 )
3403                 parm_num = map_parameter( "printing" );
3404
3405         lp_set_enum_parm( &parm_table[parm_num], pszParmValue, (int*)ptr );
3406
3407         if ( snum < 0 )
3408                 s = &sDefault;
3409         else
3410                 s = ServicePtrs[snum];
3411
3412         init_printer_values( s );
3413
3414         return True;
3415 }
3416
3417
3418 /***************************************************************************
3419  Initialise a copymap.
3420 ***************************************************************************/
3421
3422 static void init_copymap(service * pservice)
3423 {
3424         int i;
3425         SAFE_FREE(pservice->copymap);
3426         pservice->copymap = SMB_MALLOC_ARRAY(BOOL,NUMPARAMETERS);
3427         if (!pservice->copymap)
3428                 DEBUG(0,
3429                       ("Couldn't allocate copymap!! (size %d)\n",
3430                        (int)NUMPARAMETERS));
3431         else
3432                 for (i = 0; i < NUMPARAMETERS; i++)
3433                         pservice->copymap[i] = True;
3434 }
3435
3436 /***************************************************************************
3437  Return the local pointer to a parameter given the service number and the 
3438  pointer into the default structure.
3439 ***************************************************************************/
3440
3441 void *lp_local_ptr(int snum, void *ptr)
3442 {
3443         return (void *)(((char *)ServicePtrs[snum]) + PTR_DIFF(ptr, &sDefault));
3444 }
3445
3446 /***************************************************************************
3447  Process a parameter for a particular service number. If snum < 0
3448  then assume we are in the globals.
3449 ***************************************************************************/
3450
3451 BOOL lp_do_parameter(int snum, const char *pszParmName, const char *pszParmValue)
3452 {
3453         int parmnum, i, slen;
3454         void *parm_ptr = NULL;  /* where we are going to store the result */
3455         void *def_ptr = NULL;
3456         pstring param_key;
3457         char *sep;
3458         param_opt_struct *paramo, *data;
3459         BOOL not_added;
3460
3461         parmnum = map_parameter(pszParmName);
3462
3463         if (parmnum < 0) {
3464                 if ((sep=strchr(pszParmName, ':')) != NULL) {
3465                         *sep = '\0';
3466                         ZERO_STRUCT(param_key);
3467                         pstr_sprintf(param_key, "%s:", pszParmName);
3468                         slen = strlen(param_key);
3469                         pstrcat(param_key, sep+1);
3470                         trim_char(param_key+slen, ' ', ' ');
3471                         not_added = True;
3472                         data = (snum < 0) ? Globals.param_opt : 
3473                                 ServicePtrs[snum]->param_opt;
3474                         /* Traverse destination */
3475                         while (data) {
3476                                 /* If we already have same option, override it */
3477                                 if (strcmp(data->key, param_key) == 0) {
3478                                         string_free(&data->value);
3479                                         str_list_free(&data->list);
3480                                         data->value = SMB_STRDUP(pszParmValue);
3481                                         not_added = False;
3482                                         break;
3483                                 }
3484                                 data = data->next;
3485                         }
3486                         if (not_added) {
3487                                 paramo = SMB_XMALLOC_P(param_opt_struct);
3488                                 paramo->key = SMB_STRDUP(param_key);
3489                                 paramo->value = SMB_STRDUP(pszParmValue);
3490                                 paramo->list = NULL;
3491                                 if (snum < 0) {
3492                                         DLIST_ADD(Globals.param_opt, paramo);
3493                                 } else {
3494                                         DLIST_ADD(ServicePtrs[snum]->param_opt, paramo);
3495                                 }
3496                         }
3497
3498                         *sep = ':';
3499                         return (True);
3500                 }
3501                 DEBUG(0, ("Ignoring unknown parameter \"%s\"\n", pszParmName));
3502                 return (True);
3503         }
3504
3505         if (parm_table[parmnum].flags & FLAG_DEPRECATED) {
3506                 DEBUG(1, ("WARNING: The \"%s\" option is deprecated\n",
3507                           pszParmName));
3508         }
3509
3510         def_ptr = parm_table[parmnum].ptr;
3511
3512         /* we might point at a service, the default service or a global */
3513         if (snum < 0) {
3514                 parm_ptr = def_ptr;
3515         } else {
3516                 if (parm_table[parmnum].p_class == P_GLOBAL) {
3517                         DEBUG(0,
3518                               ("Global parameter %s found in service section!\n",
3519                                pszParmName));
3520                         return (True);
3521                 }
3522                 parm_ptr =
3523                         ((char *)ServicePtrs[snum]) + PTR_DIFF(def_ptr,
3524                                                             &sDefault);
3525         }
3526
3527         if (snum >= 0) {
3528                 if (!ServicePtrs[snum]->copymap)
3529                         init_copymap(ServicePtrs[snum]);
3530
3531                 /* this handles the aliases - set the copymap for other entries with
3532                    the same data pointer */
3533                 for (i = 0; parm_table[i].label; i++)
3534                         if (parm_table[i].ptr == parm_table[parmnum].ptr)
3535                                 ServicePtrs[snum]->copymap[i] = False;
3536         }
3537
3538         /* if it is a special case then go ahead */
3539         if (parm_table[parmnum].special) {
3540                 parm_table[parmnum].special(snum, pszParmValue, (char **)parm_ptr);
3541                 return (True);
3542         }
3543
3544         /* now switch on the type of variable it is */
3545         switch (parm_table[parmnum].type)
3546         {
3547                 case P_BOOL:
3548                         *(BOOL *)parm_ptr = lp_bool(pszParmValue);
3549                         break;
3550
3551                 case P_BOOLREV:
3552                         *(BOOL *)parm_ptr = !lp_bool(pszParmValue);
3553                         break;
3554
3555                 case P_INTEGER:
3556                         *(int *)parm_ptr = lp_int(pszParmValue);
3557                         break;
3558
3559                 case P_CHAR:
3560                         *(char *)parm_ptr = *pszParmValue;
3561                         break;
3562
3563                 case P_OCTAL:
3564                         i = sscanf(pszParmValue, "%o", (int *)parm_ptr);
3565                         if ( i != 1 ) {
3566                             DEBUG ( 0, ("Invalid octal number %s\n", pszParmName ));
3567                         }
3568                         break;
3569
3570                 case P_LIST:
3571                         str_list_free((char ***)parm_ptr);
3572                         *(char ***)parm_ptr = str_list_make(pszParmValue, NULL);
3573                         break;
3574
3575                 case P_STRING:
3576                         string_set((char **)parm_ptr, pszParmValue);
3577                         break;
3578
3579                 case P_USTRING:
3580                         string_set((char **)parm_ptr, pszParmValue);
3581                         strupper_m(*(char **)parm_ptr);
3582                         break;
3583
3584                 case P_GSTRING:
3585                         pstrcpy((char *)parm_ptr, pszParmValue);
3586                         break;
3587
3588                 case P_UGSTRING:
3589                         pstrcpy((char *)parm_ptr, pszParmValue);
3590                         strupper_m((char *)parm_ptr);
3591                         break;
3592
3593                 case P_ENUM:
3594                         lp_set_enum_parm( &parm_table[parmnum], pszParmValue, (int*)parm_ptr );
3595                         break;
3596                 case P_SEP:
3597                         break;
3598         }
3599
3600         return (True);
3601 }
3602
3603 /***************************************************************************
3604  Process a parameter.
3605 ***************************************************************************/
3606
3607 static BOOL do_parameter(const char *pszParmName, const char *pszParmValue)
3608 {
3609         if (!bInGlobalSection && bGlobalOnly)
3610                 return (True);
3611
3612         DEBUGADD(4, ("doing parameter %s = %s\n", pszParmName, pszParmValue));
3613
3614         return (lp_do_parameter(bInGlobalSection ? -2 : iServiceIndex,
3615                                 pszParmName, pszParmValue));
3616 }
3617
3618 /***************************************************************************
3619  Print a parameter of the specified type.
3620 ***************************************************************************/
3621
3622 static void print_parameter(struct parm_struct *p, void *ptr, FILE * f)
3623 {
3624         int i;
3625         switch (p->type)
3626         {
3627                 case P_ENUM:
3628                         for (i = 0; p->enum_list[i].name; i++) {
3629                                 if (*(int *)ptr == p->enum_list[i].value) {
3630                                         fprintf(f, "%s",
3631                                                 p->enum_list[i].name);
3632                                         break;
3633                                 }
3634                         }
3635                         break;
3636
3637                 case P_BOOL:
3638                         fprintf(f, "%s", BOOLSTR(*(BOOL *)ptr));
3639                         break;
3640
3641                 case P_BOOLREV:
3642                         fprintf(f, "%s", BOOLSTR(!*(BOOL *)ptr));
3643                         break;
3644
3645                 case P_INTEGER:
3646                         fprintf(f, "%d", *(int *)ptr);
3647                         break;
3648
3649                 case P_CHAR:
3650                         fprintf(f, "%c", *(char *)ptr);
3651                         break;
3652
3653                 case P_OCTAL:
3654                         fprintf(f, "%s", octal_string(*(int *)ptr));
3655                         break;
3656
3657                 case P_LIST:
3658                         if ((char ***)ptr && *(char ***)ptr) {
3659                                 char **list = *(char ***)ptr;
3660                                 
3661                                 for (; *list; list++) {
3662                                         /* surround strings with whitespace in double quotes */
3663                                         if ( strchr_m( *list, ' ' ) )
3664                                                 fprintf(f, "\"%s\"%s", *list, ((*(list+1))?", ":""));
3665                                         else
3666                                                 fprintf(f, "%s%s", *list, ((*(list+1))?", ":""));
3667                                 }
3668                         }
3669                         break;
3670
3671                 case P_GSTRING:
3672                 case P_UGSTRING:
3673                         if ((char *)ptr) {
3674                                 fprintf(f, "%s", (char *)ptr);
3675                         }
3676                         break;
3677
3678                 case P_STRING:
3679                 case P_USTRING:
3680                         if (*(char **)ptr) {
3681                                 fprintf(f, "%s", *(char **)ptr);
3682                         }
3683                         break;
3684                 case P_SEP:
3685                         break;
3686         }
3687 }
3688
3689 /***************************************************************************
3690  Check if two parameters are equal.
3691 ***************************************************************************/
3692
3693 static BOOL equal_parameter(parm_type type, void *ptr1, void *ptr2)
3694 {
3695         switch (type) {
3696                 case P_BOOL:
3697                 case P_BOOLREV:
3698                         return (*((BOOL *)ptr1) == *((BOOL *)ptr2));
3699
3700                 case P_INTEGER:
3701                 case P_ENUM:
3702                 case P_OCTAL:
3703                         return (*((int *)ptr1) == *((int *)ptr2));
3704
3705                 case P_CHAR:
3706                         return (*((char *)ptr1) == *((char *)ptr2));
3707                 
3708                 case P_LIST:
3709                         return str_list_compare(*(char ***)ptr1, *(char ***)ptr2);
3710
3711                 case P_GSTRING:
3712                 case P_UGSTRING:
3713                 {
3714                         char *p1 = (char *)ptr1, *p2 = (char *)ptr2;
3715                         if (p1 && !*p1)
3716                                 p1 = NULL;
3717                         if (p2 && !*p2)
3718                                 p2 = NULL;
3719                         return (p1 == p2 || strequal(p1, p2));
3720                 }
3721                 case P_STRING:
3722                 case P_USTRING:
3723                 {
3724                         char *p1 = *(char **)ptr1, *p2 = *(char **)ptr2;
3725                         if (p1 && !*p1)
3726                                 p1 = NULL;
3727                         if (p2 && !*p2)
3728                                 p2 = NULL;
3729                         return (p1 == p2 || strequal(p1, p2));
3730                 }
3731                 case P_SEP:
3732                         break;
3733         }
3734         return (False);
3735 }
3736
3737 /***************************************************************************
3738  Initialize any local varients in the sDefault table.
3739 ***************************************************************************/
3740
3741 void init_locals(void)
3742 {
3743         /* None as yet. */
3744 }
3745
3746 /***************************************************************************
3747  Process a new section (service). At this stage all sections are services.
3748  Later we'll have special sections that permit server parameters to be set.
3749  Returns True on success, False on failure. 
3750 ***************************************************************************/
3751
3752 static BOOL do_section(const char *pszSectionName)
3753 {
3754         BOOL bRetval;
3755         BOOL isglobal = ((strwicmp(pszSectionName, GLOBAL_NAME) == 0) ||
3756                          (strwicmp(pszSectionName, GLOBAL_NAME2) == 0));
3757         bRetval = False;
3758
3759         /* if we were in a global section then do the local inits */
3760         if (bInGlobalSection && !isglobal)
3761                 init_locals();
3762
3763         /* if we've just struck a global section, note the fact. */
3764         bInGlobalSection = isglobal;
3765
3766         /* check for multiple global sections */
3767         if (bInGlobalSection) {
3768                 DEBUG(3, ("Processing section \"[%s]\"\n", pszSectionName));
3769                 return (True);
3770         }
3771
3772         if (!bInGlobalSection && bGlobalOnly)
3773                 return (True);
3774
3775         /* if we have a current service, tidy it up before moving on */
3776         bRetval = True;
3777
3778         if (iServiceIndex >= 0)
3779                 bRetval = service_ok(iServiceIndex);
3780
3781         /* if all is still well, move to the next record in the services array */
3782         if (bRetval) {
3783                 /* We put this here to avoid an odd message order if messages are */
3784                 /* issued by the post-processing of a previous section. */
3785                 DEBUG(2, ("Processing section \"[%s]\"\n", pszSectionName));
3786
3787                 if ((iServiceIndex = add_a_service(&sDefault, pszSectionName))
3788                     < 0) {
3789                         DEBUG(0, ("Failed to add a new service\n"));
3790                         return (False);
3791                 }
3792         }
3793
3794         return (bRetval);
3795 }
3796
3797
3798 /***************************************************************************
3799  Determine if a partcular base parameter is currentl set to the default value.
3800 ***************************************************************************/
3801
3802 static BOOL is_default(int i)
3803 {
3804         if (!defaults_saved)
3805                 return False;
3806         switch (parm_table[i].type) {
3807                 case P_LIST:
3808                         return str_list_compare (parm_table[i].def.lvalue, 
3809                                                 *(char ***)parm_table[i].ptr);
3810                 case P_STRING:
3811                 case P_USTRING:
3812                         return strequal(parm_table[i].def.svalue,
3813                                         *(char **)parm_table[i].ptr);
3814                 case P_GSTRING:
3815                 case P_UGSTRING:
3816                         return strequal(parm_table[i].def.svalue,
3817                                         (char *)parm_table[i].ptr);
3818                 case P_BOOL:
3819                 case P_BOOLREV:
3820                         return parm_table[i].def.bvalue ==
3821                                 *(BOOL *)parm_table[i].ptr;
3822                 case P_CHAR:
3823                         return parm_table[i].def.cvalue ==
3824                                 *(char *)parm_table[i].ptr;
3825                 case P_INTEGER:
3826                 case P_OCTAL:
3827                 case P_ENUM:
3828                         return parm_table[i].def.ivalue ==
3829                                 *(int *)parm_table[i].ptr;
3830                 case P_SEP:
3831                         break;
3832         }
3833         return False;
3834 }
3835
3836 /***************************************************************************
3837 Display the contents of the global structure.
3838 ***************************************************************************/
3839
3840 static void dump_globals(FILE *f)
3841 {
3842         int i;
3843         param_opt_struct *data;
3844         
3845         fprintf(f, "[global]\n");
3846
3847         for (i = 0; parm_table[i].label; i++)
3848                 if (parm_table[i].p_class == P_GLOBAL &&
3849                     parm_table[i].ptr &&
3850                     (i == 0 || (parm_table[i].ptr != parm_table[i - 1].ptr))) {
3851                         if (defaults_saved && is_default(i))
3852                                 continue;
3853                         fprintf(f, "\t%s = ", parm_table[i].label);
3854                         print_parameter(&parm_table[i], parm_table[i].ptr, f);
3855                         fprintf(f, "\n");
3856         }
3857         if (Globals.param_opt != NULL) {
3858                 data = Globals.param_opt;
3859                 while(data) {
3860                         fprintf(f, "\t%s = %s\n", data->key, data->value);
3861                         data = data->next;
3862                 }
3863         }
3864
3865 }
3866
3867 /***************************************************************************
3868  Return True if a local parameter is currently set to the global default.
3869 ***************************************************************************/
3870
3871 BOOL lp_is_default(int snum, struct parm_struct *parm)
3872 {
3873         int pdiff = PTR_DIFF(parm->ptr, &sDefault);
3874
3875         return equal_parameter(parm->type,
3876                                ((char *)ServicePtrs[snum]) + pdiff,
3877                                ((char *)&sDefault) + pdiff);
3878 }
3879
3880 /***************************************************************************
3881  Display the contents of a single services record.
3882 ***************************************************************************/
3883
3884 static void dump_a_service(service * pService, FILE * f)
3885 {
3886         int i;
3887         param_opt_struct *data;
3888         
3889         if (pService != &sDefault)
3890                 fprintf(f, "[%s]\n", pService->szService);
3891
3892         for (i = 0; parm_table[i].label; i++) {
3893
3894                 if (parm_table[i].p_class == P_LOCAL &&
3895                     parm_table[i].ptr &&
3896                     (*parm_table[i].label != '-') &&
3897                     (i == 0 || (parm_table[i].ptr != parm_table[i - 1].ptr))) 
3898                 {
3899                 
3900                         int pdiff = PTR_DIFF(parm_table[i].ptr, &sDefault);
3901
3902                         if (pService == &sDefault) {
3903                                 if (defaults_saved && is_default(i))
3904                                         continue;
3905                         } else {
3906                                 if (equal_parameter(parm_table[i].type,
3907                                                     ((char *)pService) +
3908                                                     pdiff,
3909                                                     ((char *)&sDefault) +
3910                                                     pdiff))
3911                                         continue;
3912                         }
3913
3914                         fprintf(f, "\t%s = ", parm_table[i].label);
3915                         print_parameter(&parm_table[i],
3916                                         ((char *)pService) + pdiff, f);
3917                         fprintf(f, "\n");
3918                 }
3919         }
3920
3921                 if (pService->param_opt != NULL) {
3922                         data = pService->param_opt;
3923                         while(data) {
3924                                 fprintf(f, "\t%s = %s\n", data->key, data->value);
3925                                 data = data->next;
3926                         }
3927                 }
3928 }
3929
3930 /***************************************************************************
3931  Display the contents of a parameter of a single services record.
3932 ***************************************************************************/
3933
3934 BOOL dump_a_parameter(int snum, char *parm_name, FILE * f, BOOL isGlobal)
3935 {
3936         int i;
3937         BOOL result = False;
3938         parm_class p_class;
3939         unsigned flag = 0;
3940         fstring local_parm_name;
3941         char *parm_opt;
3942         const char *parm_opt_value;
3943
3944         /* check for parametrical option */
3945         fstrcpy( local_parm_name, parm_name);
3946         parm_opt = strchr( local_parm_name, ':');
3947
3948         if (parm_opt) {
3949                 *parm_opt = '\0';
3950                 parm_opt++;
3951                 if (strlen(parm_opt)) {
3952                         parm_opt_value = lp_parm_const_string( snum,
3953                                 local_parm_name, parm_opt, NULL);
3954                         if (parm_opt_value) {
3955                                 printf( "%s\n", parm_opt_value);
3956                                 result = True;
3957                         }
3958                 }
3959                 return result;
3960         }
3961
3962         /* check for a key and print the value */
3963         if (isGlobal) {
3964                 p_class = P_GLOBAL;
3965                 flag = FLAG_GLOBAL;
3966         } else
3967                 p_class = P_LOCAL;
3968
3969         for (i = 0; parm_table[i].label; i++) {
3970                 if (strwicmp(parm_table[i].label, parm_name) == 0 &&
3971                     (parm_table[i].p_class == p_class || parm_table[i].flags & flag) &&
3972                     parm_table[i].ptr &&
3973                     (*parm_table[i].label != '-') &&
3974                     (i == 0 || (parm_table[i].ptr != parm_table[i - 1].ptr))) 
3975                 {
3976                         void *ptr;
3977
3978                         if (isGlobal) {
3979                                 ptr = parm_table[i].ptr;
3980                         } else {
3981                                 service * pService = ServicePtrs[snum];
3982                                 ptr = ((char *)pService) +
3983                                         PTR_DIFF(parm_table[i].ptr, &sDefault);
3984                         }
3985
3986                         print_parameter(&parm_table[i],
3987                                         ptr, f);
3988                         fprintf(f, "\n");
3989                         result = True;
3990                         break;
3991                 }
3992         }
3993
3994         return result;
3995 }
3996
3997 /***************************************************************************
3998  Return info about the next service  in a service. snum==GLOBAL_SECTION_SNUM gives the globals.
3999  Return NULL when out of parameters.
4000 ***************************************************************************/
4001
4002 struct parm_struct *lp_next_parameter(int snum, int *i, int allparameters)
4003 {
4004         if (snum < 0) {
4005                 /* do the globals */
4006                 for (; parm_table[*i].label; (*i)++) {
4007                         if (parm_table[*i].p_class == P_SEPARATOR)
4008                                 return &parm_table[(*i)++];
4009
4010                         if (!parm_table[*i].ptr
4011                             || (*parm_table[*i].label == '-'))
4012                                 continue;
4013
4014                         if ((*i) > 0
4015                             && (parm_table[*i].ptr ==
4016                                 parm_table[(*i) - 1].ptr))
4017                                 continue;
4018
4019                         return &parm_table[(*i)++];
4020                 }
4021         } else {
4022                 service *pService = ServicePtrs[snum];
4023
4024                 for (; parm_table[*i].label; (*i)++) {
4025                         if (parm_table[*i].p_class == P_SEPARATOR)
4026                                 return &parm_table[(*i)++];
4027
4028                         if (parm_table[*i].p_class == P_LOCAL &&
4029                             parm_table[*i].ptr &&
4030                             (*parm_table[*i].label != '-') &&
4031                             ((*i) == 0 ||
4032                              (parm_table[*i].ptr !=
4033                               parm_table[(*i) - 1].ptr)))
4034                         {
4035                                 int pdiff =
4036                                         PTR_DIFF(parm_table[*i].ptr,
4037                                                  &sDefault);
4038
4039                                 if (allparameters ||
4040                                     !equal_parameter(parm_table[*i].type,
4041                                                      ((char *)pService) +
4042                                                      pdiff,
4043                                                      ((char *)&sDefault) +
4044                                                      pdiff))
4045                                 {
4046                                         return &parm_table[(*i)++];
4047                                 }
4048                         }
4049                 }
4050         }
4051
4052         return NULL;
4053 }
4054
4055
4056 #if 0
4057 /***************************************************************************
4058  Display the contents of a single copy structure.
4059 ***************************************************************************/
4060 static void dump_copy_map(BOOL *pcopymap)
4061 {
4062         int i;
4063         if (!pcopymap)
4064                 return;
4065
4066         printf("\n\tNon-Copied parameters:\n");
4067
4068         for (i = 0; parm_table[i].label; i++)
4069                 if (parm_table[i].p_class == P_LOCAL &&
4070                     parm_table[i].ptr && !pcopymap[i] &&
4071                     (i == 0 || (parm_table[i].ptr != parm_table[i - 1].ptr)))
4072                 {
4073                         printf("\t\t%s\n", parm_table[i].label);
4074                 }
4075 }
4076 #endif
4077
4078 /***************************************************************************
4079  Return TRUE if the passed service number is within range.
4080 ***************************************************************************/
4081
4082 BOOL lp_snum_ok(int iService)
4083 {
4084         return (LP_SNUM_OK(iService) && ServicePtrs[iService]->bAvailable);
4085 }
4086
4087 /***************************************************************************
4088  Auto-load some home services.
4089 ***************************************************************************/
4090
4091 static void lp_add_auto_services(char *str)
4092 {
4093         char *s;
4094         char *p;
4095         int homes;
4096
4097         if (!str)
4098                 return;
4099
4100         s = SMB_STRDUP(str);
4101         if (!s)
4102                 return;
4103
4104         homes = lp_servicenumber(HOMES_NAME);
4105
4106         for (p = strtok(s, LIST_SEP); p; p = strtok(NULL, LIST_SEP)) {
4107                 char *home = get_user_home_dir(p);
4108
4109                 if (lp_servicenumber(p) >= 0)
4110                         continue;
4111
4112                 if (home && homes >= 0)
4113                         lp_add_home(p, homes, p, home);
4114         }
4115         SAFE_FREE(s);
4116 }
4117
4118 /***************************************************************************
4119  Auto-load one printer.
4120 ***************************************************************************/
4121
4122 void lp_add_one_printer(char *name, char *comment)
4123 {
4124         int printers = lp_servicenumber(PRINTERS_NAME);
4125         int i;
4126
4127         if (lp_servicenumber(name) < 0) {
4128                 lp_add_printer(name, printers);
4129                 if ((i = lp_servicenumber(name)) >= 0) {
4130                         string_set(&ServicePtrs[i]->comment, comment);
4131                         ServicePtrs[i]->autoloaded = True;
4132                 }
4133         }
4134 }
4135
4136 /***************************************************************************
4137  Have we loaded a services file yet?
4138 ***************************************************************************/
4139
4140 BOOL lp_loaded(void)
4141 {
4142         return (bLoaded);
4143 }
4144
4145 /***************************************************************************
4146  Unload unused services.
4147 ***************************************************************************/
4148
4149 void lp_killunused(BOOL (*snumused) (int))
4150 {
4151         int i;
4152         for (i = 0; i < iNumServices; i++) {
4153                 if (!VALID(i))
4154                         continue;
4155
4156                 /* don't kill autoloaded or usershare services */
4157                 if ( ServicePtrs[i]->autoloaded ||
4158                                 ServicePtrs[i]->usershare == USERSHARE_VALID) {
4159                         continue;
4160                 }
4161
4162                 if (!snumused || !snumused(i)) {
4163                         free_service_byindex(i);
4164                 }
4165         }
4166 }
4167
4168 /***************************************************************************
4169  Unload a service.
4170 ***************************************************************************/
4171
4172 void lp_killservice(int iServiceIn)
4173 {
4174         if (VALID(iServiceIn)) {
4175                 free_service_byindex(iServiceIn);
4176         }
4177 }
4178
4179 /***************************************************************************
4180  Save the curent values of all global and sDefault parameters into the 
4181  defaults union. This allows swat and testparm to show only the
4182  changed (ie. non-default) parameters.
4183 ***************************************************************************/
4184
4185 static void lp_save_defaults(void)
4186 {
4187         int i;
4188         for (i = 0; parm_table[i].label; i++) {
4189                 if (i > 0 && parm_table[i].ptr == parm_table[i - 1].ptr)
4190                         continue;
4191                 switch (parm_table[i].type) {
4192                         case P_LIST:
4193                                 str_list_copy(&(parm_table[i].def.lvalue),
4194                                             *(const char ***)parm_table[i].ptr);
4195                                 break;
4196                         case P_STRING:
4197                         case P_USTRING:
4198                                 if (parm_table[i].ptr) {
4199                                         parm_table[i].def.svalue = SMB_STRDUP(*(char **)parm_table[i].ptr);
4200                                 } else {
4201                                         parm_table[i].def.svalue = NULL;
4202                                 }
4203                                 break;
4204                         case P_GSTRING:
4205                         case P_UGSTRING:
4206                                 if (parm_table[i].ptr) {
4207                                         parm_table[i].def.svalue = SMB_STRDUP((char *)parm_table[i].ptr);
4208                                 } else {
4209                                         parm_table[i].def.svalue = NULL;
4210                                 }
4211                                 break;
4212                         case P_BOOL:
4213                         case P_BOOLREV:
4214                                 parm_table[i].def.bvalue =
4215                                         *(BOOL *)parm_table[i].ptr;
4216                                 break;
4217                         case P_CHAR:
4218                                 parm_table[i].def.cvalue =
4219                                         *(char *)parm_table[i].ptr;
4220                                 break;
4221                         case P_INTEGER:
4222                         case P_OCTAL:
4223                         case P_ENUM:
4224                                 parm_table[i].def.ivalue =
4225                                         *(int *)parm_table[i].ptr;
4226                                 break;
4227                         case P_SEP:
4228                                 break;
4229                 }
4230         }
4231         defaults_saved = True;
4232 }
4233
4234 /*******************************************************************
4235  Set the server type we will announce as via nmbd.
4236 ********************************************************************/
4237
4238 static const struct srv_role_tab {
4239         uint32 role;
4240         const char *role_str;
4241 } srv_role_tab [] = {
4242         { ROLE_STANDALONE, "ROLE_STANDALONE" },
4243         { ROLE_DOMAIN_MEMBER, "ROLE_DOMAIN_MEMBER" },
4244         { ROLE_DOMAIN_BDC, "ROLE_DOMAIN_BDC" },
4245         { ROLE_DOMAIN_PDC, "ROLE_DOMAIN_PDC" },
4246         { 0, NULL }
4247 };
4248
4249 const char* server_role_str(uint32 role)
4250 {
4251         int i = 0;
4252         for (i=0; srv_role_tab[i].role_str; i++) {
4253                 if (role == srv_role_tab[i].role) {
4254                         return srv_role_tab[i].role_str;
4255                 }
4256         }
4257         return NULL;
4258 }
4259
4260 static void set_server_role(void)
4261 {
4262         server_role = ROLE_STANDALONE;
4263
4264         switch (lp_security()) {
4265                 case SEC_SHARE:
4266                         if (lp_domain_logons())
4267                                 DEBUG(0, ("Server's Role (logon server) conflicts with share-level security\n"));
4268                         break;
4269                 case SEC_SERVER:
4270                         if (lp_domain_logons())
4271                                 DEBUG(0, ("Server's Role (logon server) conflicts with server-level security\n"));
4272                         /* this used to be considered ROLE_DOMAIN_MEMBER but that's just wrong */
4273                         server_role = ROLE_STANDALONE;
4274                         break;
4275                 case SEC_DOMAIN:
4276                         if (lp_domain_logons()) {
4277                                 DEBUG(1, ("Server's Role (logon server) NOT ADVISED with domain-level security\n"));
4278                                 server_role = ROLE_DOMAIN_BDC;
4279                                 break;
4280                         }
4281                         server_role = ROLE_DOMAIN_MEMBER;
4282                         break;
4283                 case SEC_ADS:
4284                         if (lp_domain_logons()) {
4285                                 server_role = ROLE_DOMAIN_PDC;
4286                                 break;
4287                         }
4288                         server_role = ROLE_DOMAIN_MEMBER;
4289                         break;
4290                 case SEC_USER:
4291                         if (lp_domain_logons()) {
4292
4293                                 if (Globals.bDomainMaster) /* auto or yes */ 
4294                                         server_role = ROLE_DOMAIN_PDC;
4295                                 else
4296                                         server_role = ROLE_DOMAIN_BDC;
4297                         }
4298                         break;
4299                 default:
4300                         DEBUG(0, ("Server's Role undefined due to unknown security mode\n"));
4301                         break;
4302         }
4303
4304         DEBUG(10, ("set_server_role: role = %s\n", server_role_str(server_role)));
4305 }
4306
4307 /***********************************************************
4308  If we should send plaintext/LANMAN passwords in the clinet
4309 ************************************************************/
4310
4311 static void set_allowed_client_auth(void)
4312 {
4313         if (Globals.bClientNTLMv2Auth) {
4314                 Globals.bClientLanManAuth = False;
4315         }
4316         if (!Globals.bClientLanManAuth) {
4317                 Globals.bClientPlaintextAuth = False;
4318         }
4319 }
4320
4321 /***************************************************************************
4322  JRA.
4323  The following code allows smbd to read a user defined share file.
4324  Yes, this is my intent. Yes, I'm comfortable with that...
4325
4326  THE FOLLOWING IS SECURITY CRITICAL CODE.
4327
4328  It washes your clothes, it cleans your house, it guards you while you sleep...
4329  Do not f%^k with it....
4330 ***************************************************************************/
4331
4332 #define MAX_USERSHARE_FILE_SIZE (10*1024)
4333
4334 /***************************************************************************
4335  Check allowed stat state of a usershare file.
4336  Ensure we print out who is dicking with us so the admin can
4337  get their sorry ass fired.
4338 ***************************************************************************/
4339
4340 static BOOL check_usershare_stat(const char *fname, SMB_STRUCT_STAT *psbuf)
4341 {
4342         if (!S_ISREG(psbuf->st_mode)) {
4343                 DEBUG(0,("check_usershare_stat: file %s owned by uid %u is "
4344                         "not a regular file\n",
4345                         fname, (unsigned int)psbuf->st_uid ));
4346                 return False;
4347         }
4348
4349         /* Ensure this doesn't have the other write bit set. */
4350         if (psbuf->st_mode & S_IWOTH) {
4351                 DEBUG(0,("check_usershare_stat: file %s owned by uid %u allows "
4352                         "public write. Refusing to allow as a usershare file.\n",
4353                         fname, (unsigned int)psbuf->st_uid ));
4354                 return False;
4355         }
4356
4357         /* Should be 10k or less. */
4358         if (psbuf->st_size > MAX_USERSHARE_FILE_SIZE) {
4359                 DEBUG(0,("check_usershare_stat: file %s owned by uid %u is "
4360                         "too large (%u) to be a user share file.\n",
4361                         fname, (unsigned int)psbuf->st_uid,
4362                         (unsigned int)psbuf->st_size ));
4363                 return False;
4364         }
4365
4366         return True;
4367 }
4368
4369 /***************************************************************************
4370  Parse the contents of a usershare file.
4371 ***************************************************************************/
4372
4373 enum usershare_err parse_usershare_file(TALLOC_CTX *ctx, 
4374                         SMB_STRUCT_STAT *psbuf,
4375                         const char *servicename,
4376                         int snum,
4377                         char **lines,
4378                         int numlines,
4379                         pstring sharepath,
4380                         pstring comment,
4381                         SEC_DESC **ppsd,
4382                         BOOL *pallow_guest)
4383 {
4384         const char **prefixallowlist = lp_usershare_prefix_allow_list();
4385         const char **prefixdenylist = lp_usershare_prefix_deny_list();
4386         int us_vers;
4387         SMB_STRUCT_DIR *dp;
4388         SMB_STRUCT_STAT sbuf;
4389
4390         *pallow_guest = False;
4391
4392         if (numlines < 4) {
4393                 return USERSHARE_MALFORMED_FILE;
4394         }
4395
4396         if (strcmp(lines[0], "#VERSION 1") == 0) {
4397                 us_vers = 1;
4398         } else if (strcmp(lines[0], "#VERSION 2") == 0) {
4399                 us_vers = 2;
4400                 if (numlines < 5) {
4401                         return USERSHARE_MALFORMED_FILE;
4402                 }
4403         } else {
4404                 return USERSHARE_BAD_VERSION;
4405         }
4406
4407         if (strncmp(lines[1], "path=", 5) != 0) {
4408                 return USERSHARE_MALFORMED_PATH;
4409         }
4410
4411         pstrcpy(sharepath, &lines[1][5]);
4412         trim_string(sharepath, " ", " ");
4413
4414         if (strncmp(lines[2], "comment=", 8) != 0) {
4415                 return USERSHARE_MALFORMED_COMMENT_DEF;
4416         }
4417
4418         pstrcpy(comment, &lines[2][8]);
4419         trim_string(comment, " ", " ");
4420         trim_char(comment, '"', '"');
4421
4422         if (strncmp(lines[3], "usershare_acl=", 14) != 0) {
4423                 return USERSHARE_MALFORMED_ACL_DEF;
4424         }
4425
4426         if (!parse_usershare_acl(ctx, &lines[3][14], ppsd)) {
4427                 return USERSHARE_ACL_ERR;
4428         }
4429
4430         if (us_vers == 2) {
4431                 if (strncmp(lines[4], "guest_ok=", 9) != 0) {
4432                         return USERSHARE_MALFORMED_ACL_DEF;
4433                 }
4434                 if (lines[4][9] == 'y') {
4435                         *pallow_guest = True;
4436                 }
4437         }
4438
4439         if (snum != -1 && (strcmp(sharepath, ServicePtrs[snum]->szPath) == 0)) {
4440                 /* Path didn't change, no checks needed. */
4441                 return USERSHARE_OK;
4442         }
4443
4444         /* The path *must* be absolute. */
4445         if (sharepath[0] != '/') {
4446                 DEBUG(2,("parse_usershare_file: share %s: path %s is not an absolute path.\n",
4447                         servicename, sharepath));
4448                 return USERSHARE_PATH_NOT_ABSOLUTE;
4449         }
4450
4451         /* If there is a usershare prefix deny list ensure one of these paths
4452            doesn't match the start of the user given path. */
4453         if (prefixdenylist) {
4454                 int i;
4455                 for ( i=0; prefixdenylist[i]; i++ ) {
4456                         DEBUG(10,("parse_usershare_file: share %s : checking prefixdenylist[%d]='%s' against %s\n",
4457                                 servicename, i, prefixdenylist[i], sharepath ));
4458                         if (memcmp( sharepath, prefixdenylist[i], strlen(prefixdenylist[i])) == 0) {
4459                                 DEBUG(2,("parse_usershare_file: share %s path %s starts with one of the "
4460                                         "usershare prefix deny list entries.\n",
4461                                         servicename, sharepath));
4462                                 return USERSHARE_PATH_IS_DENIED;
4463                         }
4464                 }
4465         }
4466
4467         /* If there is a usershare prefix allow list ensure one of these paths
4468            does match the start of the user given path. */
4469
4470         if (prefixallowlist) {
4471                 int i;
4472                 for ( i=0; prefixallowlist[i]; i++ ) {
4473                         DEBUG(10,("parse_usershare_file: share %s checking prefixallowlist[%d]='%s' against %s\n",
4474                                 servicename, i, prefixallowlist[i], sharepath ));
4475                         if (memcmp( sharepath, prefixallowlist[i], strlen(prefixallowlist[i])) == 0) {
4476                                 break;
4477                         }
4478                 }
4479                 if (prefixallowlist[i] == NULL) {
4480                         DEBUG(2,("parse_usershare_file: share %s path %s doesn't start with one of the "
4481                                 "usershare prefix allow list entries.\n",
4482                                 servicename, sharepath));
4483                         return USERSHARE_PATH_NOT_ALLOWED;
4484                 }
4485         }
4486
4487         /* Ensure this is pointing to a directory. */
4488         dp = sys_opendir(sharepath);
4489
4490         if (!dp) {
4491                 DEBUG(2,("parse_usershare_file: share %s path %s is not a directory.\n",
4492                         servicename, sharepath));
4493                 return USERSHARE_PATH_NOT_DIRECTORY;
4494         }
4495
4496         /* Ensure the owner of the usershare file has permission to share
4497            this directory. */
4498
4499         if (sys_stat(sharepath, &sbuf) == -1) {
4500                 DEBUG(2,("parse_usershare_file: share %s : stat failed on path %s. %s\n",
4501                         servicename, sharepath, strerror(errno) ));
4502                 sys_closedir(dp);
4503                 return USERSHARE_POSIX_ERR;
4504         }
4505
4506         sys_closedir(dp);
4507
4508         if (!S_ISDIR(sbuf.st_mode)) {
4509                 DEBUG(2,("parse_usershare_file: share %s path %s is not a directory.\n",
4510                         servicename, sharepath ));
4511                 return USERSHARE_PATH_NOT_DIRECTORY;
4512         }
4513
4514         /* Check if sharing is restricted to owner-only. */
4515         /* psbuf is the stat of the usershare definition file,
4516            sbuf is the stat of the target directory to be shared. */
4517
4518         if (lp_usershare_owner_only()) {
4519                 /* root can share anything. */
4520                 if ((psbuf->st_uid != 0) && (sbuf.st_uid != psbuf->st_uid)) {
4521                         return USERSHARE_PATH_NOT_ALLOWED;
4522                 }
4523         }
4524
4525         return USERSHARE_OK;
4526 }
4527
4528 /***************************************************************************
4529  Deal with a usershare file.
4530  Returns:
4531         >= 0 - snum
4532         -1 - Bad name, invalid contents.
4533            - service name already existed and not a usershare, problem
4534             with permissions to share directory etc.
4535 ***************************************************************************/
4536
4537 static int process_usershare_file(const char *dir_name, const char *file_name, int snum_template)
4538 {
4539         SMB_STRUCT_STAT sbuf;
4540         SMB_STRUCT_STAT lsbuf;
4541         pstring fname;
4542         pstring sharepath;
4543         pstring comment;
4544         fstring service_name;
4545         char **lines = NULL;
4546         int numlines = 0;
4547         int fd = -1;
4548         int iService = -1;
4549         TALLOC_CTX *ctx = NULL;
4550         SEC_DESC *psd = NULL;
4551         BOOL guest_ok = False;
4552
4553         /* Ensure share name doesn't contain invalid characters. */
4554         if (!validate_net_name(file_name, INVALID_SHARENAME_CHARS, strlen(file_name))) {
4555                 DEBUG(0,("process_usershare_file: share name %s contains "
4556                         "invalid characters (any of %s)\n",
4557                         file_name, INVALID_SHARENAME_CHARS ));
4558                 return -1;
4559         }
4560
4561         fstrcpy(service_name, file_name);
4562
4563         pstrcpy(fname, dir_name);
4564         pstrcat(fname, "/");
4565         pstrcat(fname, file_name);
4566
4567         /* Minimize the race condition by doing an lstat before we
4568            open and fstat. Ensure this isn't a symlink link. */
4569
4570         if (sys_lstat(fname, &lsbuf) != 0) {
4571                 DEBUG(0,("process_usershare_file: stat of %s failed. %s\n",
4572                         fname, strerror(errno) ));
4573                 return -1;
4574         }
4575
4576         /* This must be a regular file, not a symlink, directory or
4577            other strange filetype. */
4578         if (!check_usershare_stat(fname, &lsbuf)) {
4579                 return -1;
4580         }
4581
4582         /* See if there is already a servicenum for this name. */
4583         /* tdb_fetch_int32 returns -1 if not found. */
4584         iService = (int)tdb_fetch_int32(ServiceHash, canonicalize_servicename(service_name) );
4585
4586         if (iService != -1 && ServicePtrs[iService]->usershare_last_mod == lsbuf.st_mtime) {
4587                 /* Nothing changed - Mark valid and return. */
4588                 DEBUG(10,("process_usershare_file: service %s not changed.\n",
4589                         service_name ));
4590                 ServicePtrs[iService]->usershare = USERSHARE_VALID;
4591                 return iService;
4592         }
4593
4594         /* Try and open the file read only - no symlinks allowed. */
4595 #ifdef O_NOFOLLOW
4596         fd = sys_open(fname, O_RDONLY|O_NOFOLLOW, 0);
4597 #else
4598         fd = sys_open(fname, O_RDONLY, 0);
4599 #endif
4600
4601         if (fd == -1) {
4602                 DEBUG(0,("process_usershare_file: unable to open %s. %s\n",
4603                         fname, strerror(errno) ));
4604                 return -1;
4605         }
4606
4607         /* Now fstat to be *SURE* it's a regular file. */
4608         if (sys_fstat(fd, &sbuf) != 0) {
4609                 close(fd);
4610                 DEBUG(0,("process_usershare_file: fstat of %s failed. %s\n",
4611                         fname, strerror(errno) ));
4612                 return -1;
4613         }
4614
4615         /* Is it the same dev/inode as was lstated ? */
4616         if (lsbuf.st_dev != sbuf.st_dev || lsbuf.st_ino != sbuf.st_ino) {
4617                 close(fd);
4618                 DEBUG(0,("process_usershare_file: fstat of %s is a different file from lstat. "
4619                         "Symlink spoofing going on ?\n", fname ));
4620                 return -1;
4621         }
4622
4623         /* This must be a regular file, not a symlink, directory or
4624            other strange filetype. */
4625         if (!check_usershare_stat(fname, &sbuf)) {
4626                 return -1;
4627         }
4628
4629         lines = fd_lines_load(fd, &numlines, MAX_USERSHARE_FILE_SIZE);
4630
4631         close(fd);
4632         if (lines == NULL) {
4633                 DEBUG(0,("process_usershare_file: loading file %s owned by %u failed.\n",
4634                         fname, (unsigned int)sbuf.st_uid ));
4635                 return -1;
4636         }
4637
4638         /* Should we allow printers to be shared... ? */
4639         ctx = talloc_init("usershare_sd_xctx");
4640         if (!ctx) {
4641                 file_lines_free(lines);
4642                 return 1;
4643         }
4644
4645         if (parse_usershare_file(ctx, &sbuf, service_name,
4646                         iService, lines, numlines, sharepath,
4647                         comment, &psd, &guest_ok) != USERSHARE_OK) {
4648                 talloc_destroy(ctx);
4649                 file_lines_free(lines);
4650                 return -1;
4651         }
4652
4653         file_lines_free(lines);
4654
4655         /* Everything ok - add the service possibly using a template. */
4656         if (iService < 0) {
4657                 const service *sp = &sDefault;
4658                 if (snum_template != -1) {
4659                         sp = ServicePtrs[snum_template];
4660                 }
4661
4662                 if ((iService = add_a_service(sp, service_name)) < 0) {
4663                         DEBUG(0, ("process_usershare_file: Failed to add "
4664                                 "new service %s\n", service_name));
4665                         talloc_destroy(ctx);
4666                         return -1;
4667                 }
4668
4669                 /* Read only is controlled by usershare ACL below. */
4670                 ServicePtrs[iService]->bRead_only = False;
4671         }
4672
4673         /* Write the ACL of the new/modified share. */
4674         if (!set_share_security(service_name, psd)) {
4675                  DEBUG(0, ("process_usershare_file: Failed to set share "
4676                         "security for user share %s\n",
4677                         service_name ));
4678                 lp_remove_service(iService);
4679                 talloc_destroy(ctx);
4680                 return -1;
4681         }
4682
4683         talloc_destroy(ctx);
4684
4685         /* If from a template it may be marked invalid. */
4686         ServicePtrs[iService]->valid = True;
4687
4688         /* Set the service as a valid usershare. */
4689         ServicePtrs[iService]->usershare = USERSHARE_VALID;
4690
4691         /* Set guest access. */
4692         if (lp_usershare_allow_guests()) {
4693                 ServicePtrs[iService]->bGuest_ok = guest_ok;
4694         }
4695
4696         /* And note when it was loaded. */
4697         ServicePtrs[iService]->usershare_last_mod = sbuf.st_mtime;
4698         string_set(&ServicePtrs[iService]->szPath, sharepath);
4699         string_set(&ServicePtrs[iService]->comment, comment);
4700
4701         return iService;
4702 }
4703
4704 /***************************************************************************
4705  Checks if a usershare entry has been modified since last load.
4706 ***************************************************************************/
4707
4708 static BOOL usershare_exists(int iService, time_t *last_mod)
4709 {
4710         SMB_STRUCT_STAT lsbuf;
4711         const char *usersharepath = Globals.szUsersharePath;
4712         pstring fname;
4713
4714         pstrcpy(fname, usersharepath);
4715         pstrcat(fname, "/");
4716         pstrcat(fname, ServicePtrs[iService]->szService);
4717
4718         if (sys_lstat(fname, &lsbuf) != 0) {
4719                 return False;
4720         }
4721
4722         if (!S_ISREG(lsbuf.st_mode)) {
4723                 return False;
4724         }
4725
4726         *last_mod = lsbuf.st_mtime;
4727         return True;
4728 }
4729
4730 /***************************************************************************
4731  Load a usershare service by name. Returns a valid servicenumber or -1.
4732 ***************************************************************************/
4733
4734 int load_usershare_service(const char *servicename)
4735 {
4736         SMB_STRUCT_STAT sbuf;
4737         const char *usersharepath = Globals.szUsersharePath;
4738         int max_user_shares = Globals.iUsershareMaxShares;
4739         int snum_template = -1;
4740
4741         if (*usersharepath == 0 ||  max_user_shares == 0) {
4742                 return -1;
4743         }
4744
4745         if (sys_stat(usersharepath, &sbuf) != 0) {
4746                 DEBUG(0,("load_usershare_service: stat of %s failed. %s\n",
4747                         usersharepath, strerror(errno) ));
4748                 return -1;
4749         }
4750
4751         if (!S_ISDIR(sbuf.st_mode)) {
4752                 DEBUG(0,("load_usershare_service: %s is not a directory.\n",
4753                         usersharepath ));
4754                 return -1;
4755         }
4756
4757         /*
4758          * This directory must be owned by root, and have the 't' bit set.
4759          * It also must not be writable by "other".
4760          */
4761
4762 #ifdef S_ISVTX
4763         if (sbuf.st_uid != 0 || !(sbuf.st_mode & S_ISVTX) || (sbuf.st_mode & S_IWOTH)) {
4764 #else
4765         if (sbuf.st_uid != 0 || (sbuf.st_mode & S_IWOTH)) {
4766 #endif
4767                 DEBUG(0,("load_usershare_service: directory %s is not owned by root "
4768                         "or does not have the sticky bit 't' set or is writable by anyone.\n",
4769                         usersharepath ));
4770                 return -1;
4771         }
4772
4773         /* Ensure the template share exists if it's set. */
4774         if (Globals.szUsershareTemplateShare[0]) {
4775                 /* We can't use lp_servicenumber here as we are recommending that
4776                    template shares have -valid=False set. */
4777                 for (snum_template = iNumServices - 1; snum_template >= 0; snum_template--) {
4778                         if (ServicePtrs[snum_template]->szService &&
4779                                         strequal(ServicePtrs[snum_template]->szService,
4780                                                 Globals.szUsershareTemplateShare)) {
4781                                 break;
4782                         }
4783                 }
4784
4785                 if (snum_template == -1) {
4786                         DEBUG(0,("load_usershare_service: usershare template share %s "
4787                                 "does not exist.\n",
4788                                 Globals.szUsershareTemplateShare ));
4789                         return -1;
4790                 }
4791         }
4792
4793         return process_usershare_file(usersharepath, servicename, snum_template);
4794 }
4795
4796 /***************************************************************************
4797  Load all user defined shares from the user share directory.
4798  We only do this if we're enumerating the share list.
4799  This is the function that can delete usershares that have
4800  been removed.
4801 ***************************************************************************/
4802
4803 int load_usershare_shares(void)
4804 {
4805         SMB_STRUCT_DIR *dp;
4806         SMB_STRUCT_STAT sbuf;
4807         SMB_STRUCT_DIRENT *de;
4808         int num_usershares = 0;
4809         int max_user_shares = Globals.iUsershareMaxShares;
4810         unsigned int num_dir_entries, num_bad_dir_entries, num_tmp_dir_entries;
4811         unsigned int allowed_bad_entries = ((2*max_user_shares)/10);
4812         unsigned int allowed_tmp_entries = ((2*max_user_shares)/10);
4813         int iService;
4814         int snum_template = -1;
4815         const char *usersharepath = Globals.szUsersharePath;
4816         int ret = lp_numservices();
4817
4818         if (max_user_shares == 0 || *usersharepath == '\0') {
4819                 return lp_numservices();
4820         }
4821
4822         if (sys_stat(usersharepath, &sbuf) != 0) {
4823                 DEBUG(0,("load_usershare_shares: stat of %s failed. %s\n",
4824                         usersharepath, strerror(errno) ));
4825                 return ret;
4826         }
4827
4828         /*
4829          * This directory must be owned by root, and have the 't' bit set.
4830          * It also must not be writable by "other".
4831          */
4832
4833 #ifdef S_ISVTX
4834         if (sbuf.st_uid != 0 || !(sbuf.st_mode & S_ISVTX) || (sbuf.st_mode & S_IWOTH)) {
4835 #else
4836         if (sbuf.st_uid != 0 || (sbuf.st_mode & S_IWOTH)) {
4837 #endif
4838                 DEBUG(0,("load_usershare_shares: directory %s is not owned by root "
4839                         "or does not have the sticky bit 't' set or is writable by anyone.\n",
4840                         usersharepath ));
4841                 return ret;
4842         }
4843
4844         /* Ensure the template share exists if it's set. */
4845         if (Globals.szUsershareTemplateShare[0]) {
4846                 /* We can't use lp_servicenumber here as we are recommending that
4847                    template shares have -valid=False set. */
4848                 for (snum_template = iNumServices - 1; snum_template >= 0; snum_template--) {
4849                         if (ServicePtrs[snum_template]->szService &&
4850                                         strequal(ServicePtrs[snum_template]->szService,
4851                                                 Globals.szUsershareTemplateShare)) {
4852                                 break;
4853                         }
4854                 }
4855
4856                 if (snum_template == -1) {
4857                         DEBUG(0,("load_usershare_shares: usershare template share %s "
4858                                 "does not exist.\n",
4859                                 Globals.szUsershareTemplateShare ));
4860                         return ret;
4861                 }
4862         }
4863
4864         /* Mark all existing usershares as pending delete. */
4865         for (iService = iNumServices - 1; iService >= 0; iService--) {
4866                 if (VALID(iService) && ServicePtrs[iService]->usershare) {
4867                         ServicePtrs[iService]->usershare = USERSHARE_PENDING_DELETE;
4868                 }
4869         }
4870
4871         dp = sys_opendir(usersharepath);
4872         if (!dp) {
4873                 DEBUG(0,("load_usershare_shares:: failed to open directory %s. %s\n",
4874                         usersharepath, strerror(errno) ));
4875                 return ret;
4876         }
4877
4878         for (num_dir_entries = 0, num_bad_dir_entries = 0, num_tmp_dir_entries = 0;
4879                         (de = sys_readdir(dp));
4880                         num_dir_entries++ ) {
4881                 int r;
4882                 const char *n = de->d_name;
4883
4884                 /* Ignore . and .. */
4885                 if (*n == '.') {
4886                         if ((n[1] == '\0') || (n[1] == '.' && n[2] == '\0')) {
4887                                 continue;
4888                         }
4889                 }
4890
4891                 if (n[0] == ':') {
4892                         /* Temporary file used when creating a share. */
4893                         num_tmp_dir_entries++;
4894                 }
4895
4896                 /* Allow 20% tmp entries. */
4897                 if (num_tmp_dir_entries > allowed_tmp_entries) {
4898                         DEBUG(0,("load_usershare_shares: too many temp entries (%u) "
4899                                 "in directory %s\n",
4900                                 num_tmp_dir_entries, usersharepath));
4901                         break;
4902                 }
4903
4904                 r = process_usershare_file(usersharepath, n, snum_template);
4905                 if (r == 0) {
4906                         /* Update the services count. */
4907                         num_usershares++;
4908                         if (num_usershares >= max_user_shares) {
4909                                 DEBUG(0,("load_usershare_shares: max user shares reached "
4910                                         "on file %s in directory %s\n",
4911                                         n, usersharepath ));
4912                                 break;
4913                         }
4914                 } else if (r == -1) {
4915                         num_bad_dir_entries++;
4916                 }
4917
4918                 /* Allow 20% bad entries. */
4919                 if (num_bad_dir_entries > allowed_bad_entries) {
4920                         DEBUG(0,("load_usershare_shares: too many bad entries (%u) "
4921                                 "in directory %s\n",
4922                                 num_bad_dir_entries, usersharepath));
4923                         break;
4924                 }
4925
4926                 /* Allow 20% bad entries. */
4927                 if (num_dir_entries > max_user_shares + allowed_bad_entries) {
4928                         DEBUG(0,("load_usershare_shares: too many total entries (%u) "
4929                         "in directory %s\n",
4930                         num_dir_entries, usersharepath));
4931                         break;
4932                 }
4933         }
4934
4935         sys_closedir(dp);
4936
4937         /* Sweep through and delete any non-refreshed usershares that are
4938            not currently in use. */
4939         for (iService = iNumServices - 1; iService >= 0; iService--) {
4940                 if (VALID(iService) && (ServicePtrs[iService]->usershare == USERSHARE_PENDING_DELETE)) {
4941                         if (conn_snum_used(iService)) {
4942                                 continue;
4943                         }
4944                         /* Remove from the share ACL db. */
4945                         DEBUG(10,("load_usershare_shares: Removing deleted usershare %s\n",
4946                                 lp_servicename(iService) ));
4947                         delete_share_security(snum2params_static(iService));
4948                         free_service_byindex(iService);
4949                 }
4950         }
4951
4952         return lp_numservices();
4953 }
4954
4955 /********************************************************
4956  Destroy global resources allocated in this file
4957 ********************************************************/
4958
4959 void gfree_loadparm(void)
4960 {
4961         struct file_lists *f;
4962         struct file_lists *next;
4963         int i;
4964
4965         lp_TALLOC_FREE();
4966
4967         /* Free the file lists */
4968
4969         f = file_lists;
4970         while( f ) {
4971                 next = f->next;
4972                 SAFE_FREE( f->name );
4973                 SAFE_FREE( f->subfname );
4974                 SAFE_FREE( f );
4975                 f = next;
4976         }
4977
4978         /* Free resources allocated to services */
4979
4980         for ( i = 0; i < iNumServices; i++ ) {
4981                 if ( VALID(i) ) {
4982                         free_service_byindex(i);
4983                 }
4984         }
4985
4986         SAFE_FREE( ServicePtrs );
4987         iNumServices = 0;
4988
4989         /* Now release all resources allocated to global
4990            parameters and the default service */
4991
4992         for (i = 0; parm_table[i].label; i++) 
4993         {
4994                 if ( parm_table[i].type == P_STRING 
4995                         || parm_table[i].type == P_USTRING ) 
4996                 {
4997                         string_free( (char**)parm_table[i].ptr );
4998                 }
4999                 else if (parm_table[i].type == P_LIST) {
5000                         str_list_free( (char***)parm_table[i].ptr );
5001                 }
5002         }
5003 }
5004
5005 /***************************************************************************
5006  Load the services array from the services file. Return True on success, 
5007  False on failure.
5008 ***************************************************************************/
5009
5010 BOOL lp_load(const char *pszFname,
5011              BOOL global_only,
5012              BOOL save_defaults,
5013              BOOL add_ipc,
5014              BOOL initialize_globals)
5015 {
5016         pstring n2;
5017         BOOL bRetval;
5018         param_opt_struct *data, *pdata;
5019
5020         pstrcpy(n2, pszFname);
5021         
5022         standard_sub_basic( get_current_username(), current_user_info.domain,
5023                             n2,sizeof(n2) );
5024
5025         add_to_file_list(pszFname, n2);
5026
5027         bRetval = False;
5028
5029         DEBUG(3, ("lp_load: refreshing parameters\n"));
5030         
5031         bInGlobalSection = True;
5032         bGlobalOnly = global_only;
5033
5034         init_globals(! initialize_globals);
5035         debug_init();
5036
5037         if (save_defaults) {
5038                 init_locals();
5039                 lp_save_defaults();
5040         }
5041
5042         if (Globals.param_opt != NULL) {
5043                 data = Globals.param_opt;
5044                 while (data) {
5045                         string_free(&data->key);
5046                         string_free(&data->value);
5047                         str_list_free(&data->list);
5048                         pdata = data->next;
5049                         SAFE_FREE(data);
5050                         data = pdata;
5051                 }
5052                 Globals.param_opt = NULL;
5053         }
5054         
5055         /* We get sections first, so have to start 'behind' to make up */
5056         iServiceIndex = -1;
5057         bRetval = pm_process(n2, do_section, do_parameter);
5058
5059         /* finish up the last section */
5060         DEBUG(4, ("pm_process() returned %s\n", BOOLSTR(bRetval)));
5061         if (bRetval)
5062                 if (iServiceIndex >= 0)
5063                         bRetval = service_ok(iServiceIndex);
5064
5065         lp_add_auto_services(lp_auto_services());
5066
5067         if (add_ipc) {
5068                 /* When 'restrict anonymous = 2' guest connections to ipc$
5069                    are denied */
5070                 lp_add_ipc("IPC$", (lp_restrict_anonymous() < 2));
5071                 if ( lp_enable_asu_support() )
5072                         lp_add_ipc("ADMIN$", False);
5073         }
5074
5075         set_server_role();
5076         set_default_server_announce_type();
5077         set_allowed_client_auth();
5078
5079         bLoaded = True;
5080
5081         /* Now we check bWINSsupport and set szWINSserver to 127.0.0.1 */
5082         /* if bWINSsupport is true and we are in the client            */
5083         if (in_client && Globals.bWINSsupport) {
5084                 lp_do_parameter(GLOBAL_SECTION_SNUM, "wins server", "127.0.0.1");
5085         }
5086
5087         init_iconv();
5088
5089         return (bRetval);
5090 }
5091
5092 /***************************************************************************
5093  Reset the max number of services.
5094 ***************************************************************************/
5095
5096 void lp_resetnumservices(void)
5097 {
5098         iNumServices = 0;
5099 }
5100
5101 /***************************************************************************
5102  Return the max number of services.
5103 ***************************************************************************/
5104
5105 int lp_numservices(void)
5106 {
5107         return (iNumServices);
5108 }
5109
5110 /***************************************************************************
5111 Display the contents of the services array in human-readable form.
5112 ***************************************************************************/
5113
5114 void lp_dump(FILE *f, BOOL show_defaults, int maxtoprint)
5115 {
5116         int iService;
5117
5118         if (show_defaults)
5119                 defaults_saved = False;
5120
5121         dump_globals(f);
5122
5123         dump_a_service(&sDefault, f);
5124
5125         for (iService = 0; iService < maxtoprint; iService++) {
5126                 fprintf(f,"\n");
5127                 lp_dump_one(f, show_defaults, iService);
5128         }
5129 }
5130
5131 /***************************************************************************
5132 Display the contents of one service in human-readable form.
5133 ***************************************************************************/
5134
5135 void lp_dump_one(FILE * f, BOOL show_defaults, int snum)
5136 {
5137         if (VALID(snum)) {
5138                 if (ServicePtrs[snum]->szService[0] == '\0')
5139                         return;
5140                 dump_a_service(ServicePtrs[snum], f);
5141         }
5142 }
5143
5144 /***************************************************************************
5145 Return the number of the service with the given name, or -1 if it doesn't
5146 exist. Note that this is a DIFFERENT ANIMAL from the internal function
5147 getservicebyname()! This works ONLY if all services have been loaded, and
5148 does not copy the found service.
5149 ***************************************************************************/
5150
5151 int lp_servicenumber(const char *pszServiceName)
5152 {
5153         int iService;
5154         fstring serviceName;
5155         
5156         if (!pszServiceName) {
5157                 return GLOBAL_SECTION_SNUM;
5158         }
5159         
5160         for (iService = iNumServices - 1; iService >= 0; iService--) {
5161                 if (VALID(iService) && ServicePtrs[iService]->szService) {
5162                         /*
5163                          * The substitution here is used to support %U is
5164                          * service names
5165                          */
5166                         fstrcpy(serviceName, ServicePtrs[iService]->szService);
5167                         standard_sub_basic(get_current_username(),
5168                                            current_user_info.domain,
5169                                            serviceName,sizeof(serviceName));
5170                         if (strequal(serviceName, pszServiceName)) {
5171                                 break;
5172                         }
5173                 }
5174         }
5175
5176         if (iService >= 0 && ServicePtrs[iService]->usershare == USERSHARE_VALID) {
5177                 time_t last_mod;
5178
5179                 if (!usershare_exists(iService, &last_mod)) {
5180                         /* Remove the share security tdb entry for it. */
5181                         delete_share_security(snum2params_static(iService));
5182                         /* Remove it from the array. */
5183                         free_service_byindex(iService);
5184                         /* Doesn't exist anymore. */
5185                         return GLOBAL_SECTION_SNUM;
5186                 }
5187
5188                 /* Has it been modified ? If so delete and reload. */
5189                 if (ServicePtrs[iService]->usershare_last_mod < last_mod) {
5190                         /* Remove it from the array. */
5191                         free_service_byindex(iService);
5192                         /* and now reload it. */
5193                         iService = load_usershare_service(pszServiceName);
5194                 }
5195         }
5196
5197         if (iService < 0) {
5198                 DEBUG(7,("lp_servicenumber: couldn't find %s\n", pszServiceName));
5199                 return GLOBAL_SECTION_SNUM;
5200         }
5201
5202         return (iService);
5203 }
5204
5205 BOOL share_defined(const char *service_name)
5206 {
5207         return (lp_servicenumber(service_name) != -1);
5208 }
5209
5210 struct share_params *get_share_params(TALLOC_CTX *mem_ctx,
5211                                       const char *sharename)
5212 {
5213         struct share_params *result;
5214         char *sname;
5215         int snum;
5216
5217         if (!(sname = SMB_STRDUP(sharename))) {
5218                 return NULL;
5219         }
5220
5221         snum = find_service(sname);
5222         SAFE_FREE(sname);
5223
5224         if (snum < 0) {
5225                 return NULL;
5226         }
5227
5228         if (!(result = TALLOC_P(mem_ctx, struct share_params))) {
5229                 DEBUG(0, ("talloc failed\n"));
5230                 return NULL;
5231         }
5232
5233         result->service = snum;
5234         return result;
5235 }
5236
5237 struct share_iterator *share_list_all(TALLOC_CTX *mem_ctx)
5238 {
5239         struct share_iterator *result;
5240
5241         if (!(result = TALLOC_P(mem_ctx, struct share_iterator))) {
5242                 DEBUG(0, ("talloc failed\n"));
5243                 return NULL;
5244         }
5245
5246         result->next_id = 0;
5247         return result;
5248 }
5249
5250 struct share_params *next_share(struct share_iterator *list)
5251 {
5252         struct share_params *result;
5253
5254         while (!lp_snum_ok(list->next_id) &&
5255                (list->next_id < lp_numservices())) {
5256                 list->next_id += 1;
5257         }
5258
5259         if (list->next_id >= lp_numservices()) {
5260                 return NULL;
5261         }
5262
5263         if (!(result = TALLOC_P(list, struct share_params))) {
5264                 DEBUG(0, ("talloc failed\n"));
5265                 return NULL;
5266         }
5267
5268         result->service = list->next_id;
5269         list->next_id += 1;
5270         return result;
5271 }
5272
5273 struct share_params *next_printer(struct share_iterator *list)
5274 {
5275         struct share_params *result;
5276
5277         while ((result = next_share(list)) != NULL) {
5278                 if (lp_print_ok(result->service)) {
5279                         break;
5280                 }
5281         }
5282         return result;
5283 }
5284
5285 /*
5286  * This is a hack for a transition period until we transformed all code from
5287  * service numbers to struct share_params.
5288  */
5289
5290 struct share_params *snum2params_static(int snum)
5291 {
5292         static struct share_params result;
5293         result.service = snum;
5294         return &result;
5295 }
5296
5297 /*******************************************************************
5298  A useful volume label function. 
5299 ********************************************************************/
5300
5301 char *volume_label(int snum)
5302 {
5303         char *ret = lp_volume(snum);
5304         if (!*ret)
5305                 return lp_servicename(snum);
5306         return (ret);
5307 }
5308
5309
5310 /*******************************************************************
5311  Set the server type we will announce as via nmbd.
5312 ********************************************************************/
5313
5314 static void set_default_server_announce_type(void)
5315 {
5316         default_server_announce = 0;
5317         default_server_announce |= SV_TYPE_WORKSTATION;
5318         default_server_announce |= SV_TYPE_SERVER;
5319         default_server_announce |= SV_TYPE_SERVER_UNIX;
5320
5321         /* note that the flag should be set only if we have a 
5322            printer service but nmbd doesn't actually load the 
5323            services so we can't tell   --jerry */
5324
5325         default_server_announce |= SV_TYPE_PRINTQ_SERVER;
5326
5327         switch (lp_announce_as()) {
5328                 case ANNOUNCE_AS_NT_SERVER:
5329                         default_server_announce |= SV_TYPE_SERVER_NT;
5330                         /* fall through... */
5331                 case ANNOUNCE_AS_NT_WORKSTATION:
5332                         default_server_announce |= SV_TYPE_NT;
5333                         break;
5334                 case ANNOUNCE_AS_WIN95:
5335                         default_server_announce |= SV_TYPE_WIN95_PLUS;
5336                         break;
5337                 case ANNOUNCE_AS_WFW:
5338                         default_server_announce |= SV_TYPE_WFW;
5339                         break;
5340                 default:
5341                         break;
5342         }
5343
5344         switch (lp_server_role()) {
5345                 case ROLE_DOMAIN_MEMBER:
5346                         default_server_announce |= SV_TYPE_DOMAIN_MEMBER;
5347                         break;
5348                 case ROLE_DOMAIN_PDC:
5349                         default_server_announce |= SV_TYPE_DOMAIN_CTRL;
5350                         break;
5351                 case ROLE_DOMAIN_BDC:
5352                         default_server_announce |= SV_TYPE_DOMAIN_BAKCTRL;
5353                         break;
5354                 case ROLE_STANDALONE:
5355                 default:
5356                         break;
5357         }
5358         if (lp_time_server())
5359                 default_server_announce |= SV_TYPE_TIME_SOURCE;
5360
5361         if (lp_host_msdfs())
5362                 default_server_announce |= SV_TYPE_DFS_SERVER;
5363 }
5364
5365 /***********************************************************
5366  returns role of Samba server
5367 ************************************************************/
5368
5369 int lp_server_role(void)
5370 {
5371         return server_role;
5372 }
5373
5374 /***********************************************************
5375  If we are PDC then prefer us as DMB
5376 ************************************************************/
5377
5378 BOOL lp_domain_master(void)
5379 {
5380         if (Globals.bDomainMaster == Auto)
5381                 return (lp_server_role() == ROLE_DOMAIN_PDC);
5382
5383         return Globals.bDomainMaster;
5384 }
5385
5386 /***********************************************************
5387  If we are DMB then prefer us as LMB
5388 ************************************************************/
5389
5390 BOOL lp_preferred_master(void)
5391 {
5392         if (Globals.bPreferredMaster == Auto)
5393                 return (lp_local_master() && lp_domain_master());
5394
5395         return Globals.bPreferredMaster;
5396 }
5397
5398 /*******************************************************************
5399  Remove a service.
5400 ********************************************************************/
5401
5402 void lp_remove_service(int snum)
5403 {
5404         ServicePtrs[snum]->valid = False;
5405         invalid_services[num_invalid_services++] = snum;
5406 }
5407
5408 /*******************************************************************
5409  Copy a service.
5410 ********************************************************************/
5411
5412 void lp_copy_service(int snum, const char *new_name)
5413 {
5414         do_section(new_name);
5415         if (snum >= 0) {
5416                 snum = lp_servicenumber(new_name);
5417                 if (snum >= 0)
5418                         lp_do_parameter(snum, "copy", lp_servicename(snum));
5419         }
5420 }
5421
5422
5423 /*******************************************************************
5424  Get the default server type we will announce as via nmbd.
5425 ********************************************************************/
5426
5427 int lp_default_server_announce(void)
5428 {
5429         return default_server_announce;
5430 }
5431
5432 /*******************************************************************
5433  Split the announce version into major and minor numbers.
5434 ********************************************************************/
5435
5436 int lp_major_announce_version(void)
5437 {
5438         static BOOL got_major = False;
5439         static int major_version = DEFAULT_MAJOR_VERSION;
5440         char *vers;
5441         char *p;
5442
5443         if (got_major)
5444                 return major_version;
5445
5446         got_major = True;
5447         if ((vers = lp_announce_version()) == NULL)
5448                 return major_version;
5449
5450         if ((p = strchr_m(vers, '.')) == 0)
5451                 return major_version;
5452
5453         *p = '\0';
5454         major_version = atoi(vers);
5455         return major_version;
5456 }
5457
5458 int lp_minor_announce_version(void)
5459 {
5460         static BOOL got_minor = False;
5461         static int minor_version = DEFAULT_MINOR_VERSION;
5462         char *vers;
5463         char *p;
5464
5465         if (got_minor)
5466                 return minor_version;
5467
5468         got_minor = True;
5469         if ((vers = lp_announce_version()) == NULL)
5470                 return minor_version;
5471
5472         if ((p = strchr_m(vers, '.')) == 0)
5473                 return minor_version;
5474
5475         p++;
5476         minor_version = atoi(p);
5477         return minor_version;
5478 }
5479
5480 /***********************************************************
5481  Set the global name resolution order (used in smbclient).
5482 ************************************************************/
5483
5484 void lp_set_name_resolve_order(const char *new_order)
5485 {
5486         string_set(&Globals.szNameResolveOrder, new_order);
5487 }
5488
5489 const char *lp_printername(int snum)
5490 {
5491         const char *ret = _lp_printername(snum);
5492         if (ret == NULL || (ret != NULL && *ret == '\0'))
5493                 ret = lp_const_servicename(snum);
5494
5495         return ret;
5496 }
5497
5498
5499 /***********************************************************
5500  Allow daemons such as winbindd to fix their logfile name.
5501 ************************************************************/
5502
5503 void lp_set_logfile(const char *name)
5504 {
5505         string_set(&Globals.szLogFile, name);
5506         pstrcpy(debugf, name);
5507 }
5508
5509 /*******************************************************************
5510  Return the max print jobs per queue.
5511 ********************************************************************/
5512
5513 int lp_maxprintjobs(int snum)
5514 {
5515         int maxjobs = LP_SNUM_OK(snum) ? ServicePtrs[snum]->iMaxPrintJobs : sDefault.iMaxPrintJobs;
5516         if (maxjobs <= 0 || maxjobs >= PRINT_MAX_JOBID)
5517                 maxjobs = PRINT_MAX_JOBID - 1;
5518
5519         return maxjobs;
5520 }
5521
5522 const char *lp_printcapname(void)
5523 {
5524         if ((Globals.szPrintcapname != NULL) &&
5525             (Globals.szPrintcapname[0] != '\0'))
5526                 return Globals.szPrintcapname;
5527
5528         if (sDefault.iPrinting == PRINT_CUPS) {
5529 #ifdef HAVE_CUPS
5530                 return "cups";
5531 #else
5532                 return "lpstat";
5533 #endif
5534         }
5535
5536         if (sDefault.iPrinting == PRINT_BSD)
5537                 return "/etc/printcap";
5538
5539         return PRINTCAP_NAME;
5540 }
5541
5542 /*******************************************************************
5543  Ensure we don't use sendfile if server smb signing is active.
5544 ********************************************************************/
5545
5546 static uint32 spoolss_state;
5547
5548 BOOL lp_disable_spoolss( void )
5549 {
5550         if ( spoolss_state == SVCCTL_STATE_UNKNOWN )
5551                 spoolss_state = _lp_disable_spoolss() ? SVCCTL_STOPPED : SVCCTL_RUNNING;
5552
5553         return spoolss_state == SVCCTL_STOPPED ? True : False;
5554 }
5555
5556 void lp_set_spoolss_state( uint32 state )
5557 {
5558         SMB_ASSERT( (state == SVCCTL_STOPPED) || (state == SVCCTL_RUNNING) );
5559
5560         spoolss_state = state;
5561 }
5562
5563 uint32 lp_get_spoolss_state( void )
5564 {
5565         return lp_disable_spoolss() ? SVCCTL_STOPPED : SVCCTL_RUNNING;
5566 }
5567
5568 /*******************************************************************
5569  Ensure we don't use sendfile if server smb signing is active.
5570 ********************************************************************/
5571
5572 BOOL lp_use_sendfile(int snum)
5573 {
5574         /* Using sendfile blows the brains out of any DOS or Win9x TCP stack... JRA. */
5575         if (Protocol < PROTOCOL_NT1) {
5576                 return False;
5577         }
5578         return (_lp_use_sendfile(snum) && (get_remote_arch() != RA_WIN95) && !srv_is_signing_active());
5579 }
5580
5581 /*******************************************************************
5582  Turn off sendfile if we find the underlying OS doesn't support it.
5583 ********************************************************************/
5584
5585 void set_use_sendfile(int snum, BOOL val)
5586 {
5587         if (LP_SNUM_OK(snum))
5588                 ServicePtrs[snum]->bUseSendfile = val;
5589         else
5590                 sDefault.bUseSendfile = val;
5591 }
5592
5593 /*******************************************************************
5594  Turn off storing DOS attributes if this share doesn't support it.
5595 ********************************************************************/
5596
5597 void set_store_dos_attributes(int snum, BOOL val)
5598 {
5599         if (!LP_SNUM_OK(snum))
5600                 return;
5601         ServicePtrs[(snum)]->bStoreDosAttributes = val;
5602 }
5603
5604 void lp_set_mangling_method(const char *new_method)
5605 {
5606         string_set(&Globals.szManglingMethod, new_method);
5607 }
5608
5609 /*******************************************************************
5610  Global state for POSIX pathname processing.
5611 ********************************************************************/
5612
5613 static BOOL posix_pathnames;
5614
5615 BOOL lp_posix_pathnames(void)
5616 {
5617         return posix_pathnames;
5618 }
5619
5620 /*******************************************************************
5621  Change everything needed to ensure POSIX pathname processing (currently
5622  not much).
5623 ********************************************************************/
5624
5625 void lp_set_posix_pathnames(void)
5626 {
5627         posix_pathnames = True;
5628 }
5629
5630 /*******************************************************************
5631  Global state for POSIX lock processing - CIFS unix extensions.
5632 ********************************************************************/
5633
5634 BOOL posix_default_lock_was_set;
5635 static enum brl_flavour posix_cifsx_locktype; /* By default 0 == WINDOWS_LOCK */
5636
5637 enum brl_flavour lp_posix_cifsu_locktype(files_struct *fsp)
5638 {
5639         if (posix_default_lock_was_set) {
5640                 return posix_cifsx_locktype;
5641         } else {
5642                 return fsp->posix_open ? POSIX_LOCK : WINDOWS_LOCK;
5643         }
5644 }
5645
5646 /*******************************************************************
5647 ********************************************************************/
5648
5649 void lp_set_posix_default_cifsx_readwrite_locktype(enum brl_flavour val)
5650 {
5651         posix_default_lock_was_set = True;
5652         posix_cifsx_locktype = val;
5653 }