This is a set of generic SMB client routines. I needed this in a hurry
authorAndrew Tridgell <tridge@samba.org>
Tue, 21 Oct 1997 09:12:41 +0000 (09:12 +0000)
committerAndrew Tridgell <tridge@samba.org>
Tue, 21 Oct 1997 09:12:41 +0000 (09:12 +0000)
to fix the password server code, so I didn't use SMBlib. This code is
fairly generic and uses a "struct cli_state" to hold the client
state.

source/libsmb/clientgen.c [new file with mode: 0644]

diff --git a/source/libsmb/clientgen.c b/source/libsmb/clientgen.c
new file mode 100644 (file)
index 0000000..d47c5a2
--- /dev/null
@@ -0,0 +1,673 @@
+/* 
+   Unix SMB/Netbios implementation.
+   Version 1.9.
+   SMB client generic functions
+   Copyright (C) Andrew Tridgell 1994-1997
+   
+   This program is free software; you can redistribute it and/or modify
+   it under the terms of the GNU General Public License as published by
+   the Free Software Foundation; either version 2 of the License, or
+   (at your option) any later version.
+   
+   This program is distributed in the hope that it will be useful,
+   but WITHOUT ANY WARRANTY; without even the implied warranty of
+   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+   GNU General Public License for more details.
+   
+   You should have received a copy of the GNU General Public License
+   along with this program; if not, write to the Free Software
+   Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
+*/
+
+#ifdef SYSLOG
+#undef SYSLOG
+#endif
+
+#include "includes.h"
+
+
+extern int DEBUGLEVEL;
+
+/****************************************************************************
+setup basics in a outgoing packet
+****************************************************************************/
+static void cli_setup_pkt(struct cli_state *cli)
+{
+       SSVAL(cli->outbuf,smb_pid,cli->pid);
+       SSVAL(cli->outbuf,smb_uid,cli->uid);
+       SSVAL(cli->outbuf,smb_mid,cli->mid);
+       if (cli->protocol > PROTOCOL_CORE) {
+               SCVAL(cli->outbuf,smb_flg,0x8);
+               SSVAL(cli->outbuf,smb_flg2,0x1);
+       }
+}
+
+
+/****************************************************************************
+  send a SMB trans or trans2 request
+  ****************************************************************************/
+static BOOL cli_send_trans(struct cli_state *cli,
+                          int trans, char *name, int fid, int flags,
+                          char *data,char *param,uint16 *setup, int ldata,int lparam,
+                          int lsetup,int mdata,int mparam,int msetup)
+{
+       int i;
+       int this_ldata,this_lparam;
+       int tot_data=0,tot_param=0;
+       char *outdata,*outparam;
+       char *p;
+
+       this_lparam = MIN(lparam,cli->max_xmit - (500+lsetup*SIZEOFWORD)); /* hack */
+       this_ldata = MIN(ldata,cli->max_xmit - (500+lsetup*SIZEOFWORD+this_lparam));
+
+       bzero(cli->outbuf,smb_size);
+       set_message(cli->outbuf,14+lsetup,0,True);
+       CVAL(cli->outbuf,smb_com) = trans;
+       SSVAL(cli->outbuf,smb_tid, cli->cnum);
+       cli_setup_pkt(cli);
+
+       outparam = smb_buf(cli->outbuf)+(trans==SMBtrans ? strlen(name)+1 : 3);
+       outdata = outparam+this_lparam;
+
+       /* primary request */
+       SSVAL(cli->outbuf,smb_tpscnt,lparam);   /* tpscnt */
+       SSVAL(cli->outbuf,smb_tdscnt,ldata);    /* tdscnt */
+       SSVAL(cli->outbuf,smb_mprcnt,mparam);   /* mprcnt */
+       SSVAL(cli->outbuf,smb_mdrcnt,mdata);    /* mdrcnt */
+       SCVAL(cli->outbuf,smb_msrcnt,msetup);   /* msrcnt */
+       SSVAL(cli->outbuf,smb_flags,flags);     /* flags */
+       SIVAL(cli->outbuf,smb_timeout,0);               /* timeout */
+       SSVAL(cli->outbuf,smb_pscnt,this_lparam);       /* pscnt */
+       SSVAL(cli->outbuf,smb_psoff,smb_offset(outparam,cli->outbuf)); /* psoff */
+       SSVAL(cli->outbuf,smb_dscnt,this_ldata);        /* dscnt */
+       SSVAL(cli->outbuf,smb_dsoff,smb_offset(outdata,cli->outbuf)); /* dsoff */
+       SCVAL(cli->outbuf,smb_suwcnt,lsetup);   /* suwcnt */
+       for (i=0;i<lsetup;i++)          /* setup[] */
+               SSVAL(cli->outbuf,smb_setup+i*SIZEOFWORD,setup[i]);
+       p = smb_buf(cli->outbuf);
+       if (trans==SMBtrans) {
+               strcpy(p,name);                 /* name[] */
+       } else {
+               *p++ = 0;  /* put in a null smb_name */
+               *p++ = 'D'; *p++ = ' '; /* observed in OS/2 */
+       }
+       if (this_lparam)                        /* param[] */
+               memcpy(outparam,param,this_lparam);
+       if (this_ldata)                 /* data[] */
+               memcpy(outdata,data,this_ldata);
+       set_message(cli->outbuf,14+lsetup,              /* wcnt, bcc */
+                   PTR_DIFF(outdata+this_ldata,smb_buf(cli->outbuf)),False);
+
+       show_msg(cli->outbuf);
+       send_smb(cli->fd,cli->outbuf);
+
+       if (this_ldata < ldata || this_lparam < lparam) {
+               /* receive interim response */
+               if (!receive_smb(cli->fd,cli->inbuf,cli->timeout) || 
+                   CVAL(cli->inbuf,smb_rcls) != 0) {
+                       return(False);
+               }      
+
+               tot_data = this_ldata;
+               tot_param = this_lparam;
+               
+               while (tot_data < ldata || tot_param < lparam)  {
+                       this_lparam = MIN(lparam-tot_param,cli->max_xmit - 500); /* hack */
+                       this_ldata = MIN(ldata-tot_data,cli->max_xmit - (500+this_lparam));
+
+                       set_message(cli->outbuf,trans==SMBtrans?8:9,0,True);
+                       CVAL(cli->outbuf,smb_com) = trans==SMBtrans ? SMBtranss : SMBtranss2;
+                       
+                       outparam = smb_buf(cli->outbuf);
+                       outdata = outparam+this_lparam;
+                       
+                       /* secondary request */
+                       SSVAL(cli->outbuf,smb_tpscnt,lparam);   /* tpscnt */
+                       SSVAL(cli->outbuf,smb_tdscnt,ldata);    /* tdscnt */
+                       SSVAL(cli->outbuf,smb_spscnt,this_lparam);      /* pscnt */
+                       SSVAL(cli->outbuf,smb_spsoff,smb_offset(outparam,cli->outbuf)); /* psoff */
+                       SSVAL(cli->outbuf,smb_spsdisp,tot_param);       /* psdisp */
+                       SSVAL(cli->outbuf,smb_sdscnt,this_ldata);       /* dscnt */
+                       SSVAL(cli->outbuf,smb_sdsoff,smb_offset(outdata,cli->outbuf)); /* dsoff */
+                       SSVAL(cli->outbuf,smb_sdsdisp,tot_data);        /* dsdisp */
+                       if (trans==SMBtrans2)
+                               SSVAL(cli->outbuf,smb_sfid,fid);                /* fid */
+                       if (this_lparam)                        /* param[] */
+                               memcpy(outparam,param,this_lparam);
+                       if (this_ldata)                 /* data[] */
+                               memcpy(outdata,data,this_ldata);
+                       set_message(cli->outbuf,trans==SMBtrans?8:9, /* wcnt, bcc */
+                                   PTR_DIFF(outdata+this_ldata,smb_buf(cli->outbuf)),False);
+                       
+                       show_msg(cli->outbuf);
+                       send_smb(cli->fd,cli->outbuf);
+                       
+                       tot_data += this_ldata;
+                       tot_param += this_lparam;
+               }
+       }
+
+       return(True);
+}
+
+
+/****************************************************************************
+  receive a SMB trans or trans2 response allocating the necessary memory
+  ****************************************************************************/
+static BOOL cli_receive_trans(struct cli_state *cli,
+                             int trans,int *data_len,
+                             int *param_len, char **data,char **param)
+{
+       int total_data=0;
+       int total_param=0;
+       int this_data,this_param;
+       
+       *data_len = *param_len = 0;
+       
+       if (!receive_smb(cli->fd,cli->inbuf,cli->timeout))
+               return False;
+
+       show_msg(cli->inbuf);
+       
+       /* sanity check */
+       if (CVAL(cli->inbuf,smb_com) != trans) {
+               DEBUG(0,("Expected %s response, got command 0x%02x\n",
+                        trans==SMBtrans?"SMBtrans":"SMBtrans2", 
+                        CVAL(cli->inbuf,smb_com)));
+               return(False);
+       }
+       if (CVAL(cli->inbuf,smb_rcls) != 0)
+               return(False);
+
+       /* parse out the lengths */
+       total_data = SVAL(cli->inbuf,smb_tdrcnt);
+       total_param = SVAL(cli->inbuf,smb_tprcnt);
+
+       /* allocate it */
+       *data = Realloc(*data,total_data);
+       *param = Realloc(*param,total_param);
+
+       while (1)  {
+               this_data = SVAL(cli->inbuf,smb_drcnt);
+               this_param = SVAL(cli->inbuf,smb_prcnt);
+
+               if (this_data + *data_len > total_data ||
+                   this_param + *param_len > total_param) {
+                       DEBUG(1,("Data overflow in cli_receive_trans\n"));
+                       return False;
+               }
+
+               if (this_data)
+                       memcpy(*data + SVAL(cli->inbuf,smb_drdisp),
+                              smb_base(cli->inbuf) + SVAL(cli->inbuf,smb_droff),
+                              this_data);
+               if (this_param)
+                       memcpy(*param + SVAL(cli->inbuf,smb_prdisp),
+                              smb_base(cli->inbuf) + SVAL(cli->inbuf,smb_proff),
+                              this_param);
+               *data_len += this_data;
+               *param_len += this_param;
+
+               /* parse out the total lengths again - they can shrink! */
+               total_data = SVAL(cli->inbuf,smb_tdrcnt);
+               total_param = SVAL(cli->inbuf,smb_tprcnt);
+               
+               if (total_data <= *data_len && total_param <= *param_len)
+                       break;
+               
+               if (!receive_smb(cli->fd,cli->inbuf,cli->timeout))
+                       return False;
+
+               show_msg(cli->inbuf);
+               
+               /* sanity check */
+               if (CVAL(cli->inbuf,smb_com) != trans) {
+                       DEBUG(0,("Expected %s response, got command 0x%02x\n",
+                                trans==SMBtrans?"SMBtrans":"SMBtrans2", 
+                                CVAL(cli->inbuf,smb_com)));
+                       return(False);
+               }
+               if (CVAL(cli->inbuf,smb_rcls) != 0)
+                       return(False);
+       }
+       
+       return(True);
+}
+
+
+/****************************************************************************
+call a remote api
+****************************************************************************/
+static BOOL cli_api(struct cli_state *cli,
+                   int prcnt,int drcnt,int mprcnt,int mdrcnt,int *rprcnt,
+                   int *rdrcnt, char *param,char *data, 
+                   char **rparam, char **rdata)
+{
+  cli_send_trans(cli,SMBtrans,"\\PIPE\\LANMAN",0,0,
+                data,param,NULL,
+                drcnt,prcnt,0,
+                mdrcnt,mprcnt,0);
+
+  return (cli_receive_trans(cli,SMBtrans,
+                                    rdrcnt,rprcnt,
+                                    rdata,rparam));
+}
+
+
+/****************************************************************************
+perform a NetWkstaUserLogon
+****************************************************************************/
+BOOL cli_NetWkstaUserLogon(struct cli_state *cli,char *user, char *workstation)
+{
+       char *rparam = NULL;
+       char *rdata = NULL;
+       char *p;
+       int rdrcnt,rprcnt;
+       pstring param;
+
+       memset(param, 0, sizeof(param));
+       
+       /* send a SMBtrans command with api NetWkstaUserLogon */
+       p = param;
+       SSVAL(p,0,132); /* api number */
+       p += 2;
+       strcpy(p,"OOWb54WrLh");
+       p = skip_string(p,1);
+       strcpy(p,"WB21BWDWWDDDDDDDzzzD");
+       p = skip_string(p,1);
+       SSVAL(p,0,1);
+       p += 2;
+       strcpy(p,user);
+       strupper(p);
+       p += 21; p++; p += 15; p++; 
+       strcpy(p, workstation); 
+       strupper(p);
+       p += 16;
+       SSVAL(p, 0, BUFFER_SIZE);
+       p += 2;
+       SSVAL(p, 0, BUFFER_SIZE);
+       p += 2;
+       
+       cli->error = -1;
+       
+       if (cli_api(cli, PTR_DIFF(p,param),0,
+                   1024,BUFFER_SIZE,
+                   &rprcnt,&rdrcnt,
+                   param,NULL,
+                   &rparam,&rdata)) {
+               cli->error = SVAL(rparam,0);
+               p = rdata;
+               
+               if (cli->error == 0) {
+                       DEBUG(4,("NetWkstaUserLogon success\n"));
+                       cli->privilages = SVAL(p, 24);
+                       fstrcpy(cli->eff_name,p+2);
+               } else {
+                       DEBUG(1,("NetwkstaUserLogon gave error %d\n", cli->error));
+               }
+       }
+       
+       if (rparam) free(rparam);
+       if (rdata) free(rdata);
+       return cli->error == 0;
+}
+
+
+
+static  struct {
+    int prot;
+    char *name;
+  }
+prots[] = 
+    {
+      {PROTOCOL_CORE,"PC NETWORK PROGRAM 1.0"},
+      {PROTOCOL_COREPLUS,"MICROSOFT NETWORKS 1.03"},
+      {PROTOCOL_LANMAN1,"MICROSOFT NETWORKS 3.0"},
+      {PROTOCOL_LANMAN1,"LANMAN1.0"},
+      {PROTOCOL_LANMAN2,"LM1.2X002"},
+      {PROTOCOL_LANMAN2,"Samba"},
+      {PROTOCOL_NT1,"NT LM 0.12"},
+      {PROTOCOL_NT1,"NT LANMAN 1.0"},
+      {-1,NULL}
+    };
+
+
+/****************************************************************************
+send a session setup
+****************************************************************************/
+BOOL cli_session_setup(struct cli_state *cli, 
+                      char *user, 
+                      char *pass, int passlen,
+                      char *ntpass, int ntpasslen,
+                      char *workgroup)
+{
+       char *p;
+       fstring pword;
+
+       if (cli->protocol < PROTOCOL_LANMAN1)
+               return False;
+
+       if (passlen > sizeof(pword)-1) {
+               return False;
+       }
+
+       if ((cli->sec_mode & 2) && *pass && passlen != 24) {
+               passlen = 24;
+               SMBencrypt((uchar *)pass,(uchar *)cli->cryptkey,(uchar *)pword);
+       } else {
+               memcpy(pword, pass, passlen);
+       }
+
+       /* if in share level security then don't send a password now */
+       if (!(cli->sec_mode & 1)) {fstrcpy(pword, "");passlen=1;} 
+
+       /* send a session setup command */
+       bzero(cli->outbuf,smb_size);
+
+       if (cli->protocol < PROTOCOL_NT1) {
+               set_message(cli->outbuf,10,1 + strlen(user) + passlen,True);
+               CVAL(cli->outbuf,smb_com) = SMBsesssetupX;
+               cli_setup_pkt(cli);
+
+               CVAL(cli->outbuf,smb_vwv0) = 0xFF;
+               SSVAL(cli->outbuf,smb_vwv2,cli->max_xmit);
+               SSVAL(cli->outbuf,smb_vwv3,2);
+               SSVAL(cli->outbuf,smb_vwv4,1);
+               SIVAL(cli->outbuf,smb_vwv5,cli->sesskey);
+               SSVAL(cli->outbuf,smb_vwv7,passlen);
+               p = smb_buf(cli->outbuf);
+               memcpy(p,pword,passlen);
+               p += passlen;
+               strcpy(p,user);
+               strupper(p);
+       } else {
+               set_message(cli->outbuf,13,0,True);
+               CVAL(cli->outbuf,smb_com) = SMBsesssetupX;
+               cli_setup_pkt(cli);
+               
+               CVAL(cli->outbuf,smb_vwv0) = 0xFF;
+               SSVAL(cli->outbuf,smb_vwv2,BUFFER_SIZE);
+               SSVAL(cli->outbuf,smb_vwv3,2);
+               SSVAL(cli->outbuf,smb_vwv4,cli->pid);
+               SIVAL(cli->outbuf,smb_vwv5,cli->sesskey);
+               SSVAL(cli->outbuf,smb_vwv7,passlen);
+               SSVAL(cli->outbuf,smb_vwv8,ntpasslen);
+               p = smb_buf(cli->outbuf);
+               memcpy(p,pword,passlen); 
+               p += SVAL(cli->outbuf,smb_vwv7);
+               memcpy(p,ntpass,ntpasslen); 
+               p += SVAL(cli->outbuf,smb_vwv8);
+               strcpy(p,user);
+               strupper(p);
+               p = skip_string(p,1);
+               strcpy(p,workgroup);
+               strupper(p);
+               p = skip_string(p,1);
+               strcpy(p,"Unix");p = skip_string(p,1);
+               strcpy(p,"Samba");p = skip_string(p,1);
+               set_message(cli->outbuf,13,PTR_DIFF(p,smb_buf(cli->outbuf)),False);
+       }
+
+      send_smb(cli->fd,cli->outbuf);
+      if (!receive_smb(cli->fd,cli->inbuf,cli->timeout))
+             return False;
+
+      show_msg(cli->inbuf);
+
+      if (CVAL(cli->inbuf,smb_rcls) != 0) {
+             return False;
+      }
+
+      /* use the returned uid from now on */
+      cli->uid = SVAL(cli->inbuf,smb_uid);
+
+      return True;
+}
+
+
+/****************************************************************************
+send a tconX
+****************************************************************************/
+BOOL cli_send_tconX(struct cli_state *cli, 
+                   char *share, char *dev, char *pword, int passlen)
+{
+       char *p;
+       bzero(cli->outbuf,smb_size);
+       bzero(cli->inbuf,smb_size);
+
+       set_message(cli->outbuf,4,
+                   2 + strlen(share) + passlen + strlen(dev),True);
+       CVAL(cli->outbuf,smb_com) = SMBtconX;
+       cli_setup_pkt(cli);
+
+       SSVAL(cli->outbuf,smb_vwv0,0xFF);
+       SSVAL(cli->outbuf,smb_vwv3,passlen);
+
+       p = smb_buf(cli->outbuf);
+       memcpy(p,pword,passlen);
+       p += passlen;
+       strcpy(p,share);
+       p = skip_string(p,1);
+       strcpy(p,dev);
+
+       SCVAL(cli->inbuf,smb_rcls, 1);
+
+       send_smb(cli->fd,cli->outbuf);
+       if (!receive_smb(cli->fd,cli->inbuf,cli->timeout))
+               return False;
+
+       if (CVAL(cli->inbuf,smb_rcls) != 0) {
+               return False;
+       }
+
+       cli->cnum = SVAL(cli->inbuf,smb_tid);
+       return True;
+}
+
+
+/****************************************************************************
+send a tree disconnect
+****************************************************************************/
+BOOL cli_tdis(struct cli_state *cli)
+{
+       bzero(cli->outbuf,smb_size);
+       set_message(cli->outbuf,0,0,True);
+       CVAL(cli->outbuf,smb_com) = SMBtdis;
+       SSVAL(cli->outbuf,smb_tid,cli->cnum);
+       cli_setup_pkt(cli);
+       
+       send_smb(cli->fd,cli->outbuf);
+       if (!receive_smb(cli->fd,cli->inbuf,cli->timeout))
+               return False;
+       
+       return CVAL(cli->inbuf,smb_rcls) == 0;
+}
+
+
+/****************************************************************************
+send a negprot command
+****************************************************************************/
+BOOL cli_negprot(struct cli_state *cli)
+{
+       char *p;
+       int numprots;
+       int plength;
+
+       bzero(cli->outbuf,smb_size);
+
+       /* setup the protocol strings */
+       for (plength=0,numprots=0;
+            prots[numprots].name && prots[numprots].prot<=cli->protocol;
+            numprots++)
+               plength += strlen(prots[numprots].name)+2;
+    
+       set_message(cli->outbuf,0,plength,True);
+
+       p = smb_buf(cli->outbuf);
+       for (numprots=0;
+            prots[numprots].name && prots[numprots].prot<=cli->protocol;
+            numprots++) {
+               *p++ = 2;
+               strcpy(p,prots[numprots].name);
+               p += strlen(p) + 1;
+       }
+
+       CVAL(cli->outbuf,smb_com) = SMBnegprot;
+       cli_setup_pkt(cli);
+
+       CVAL(smb_buf(cli->outbuf),0) = 2;
+
+       send_smb(cli->fd,cli->outbuf);
+       if (!receive_smb(cli->fd,cli->inbuf,cli->timeout))
+               return False;
+
+       show_msg(cli->inbuf);
+
+       if (CVAL(cli->inbuf,smb_rcls) != 0 || 
+           ((int)SVAL(cli->inbuf,smb_vwv0) >= numprots)) {
+               return(False);
+       }
+
+       cli->protocol = prots[SVAL(cli->inbuf,smb_vwv0)].prot;
+
+
+       if (cli->protocol < PROTOCOL_NT1) {    
+               cli->sec_mode = SVAL(cli->inbuf,smb_vwv1);
+               cli->max_xmit = SVAL(cli->inbuf,smb_vwv2);
+               cli->sesskey = IVAL(cli->inbuf,smb_vwv6);
+               cli->serverzone = SVALS(cli->inbuf,smb_vwv10)*60;
+               /* this time is converted to GMT by make_unix_date */
+               cli->servertime = make_unix_date(cli->inbuf+smb_vwv8);
+               if (cli->protocol >= PROTOCOL_COREPLUS) {
+                       cli->readbraw_supported = ((SVAL(cli->inbuf,smb_vwv5) & 0x1) != 0);
+                       cli->writebraw_supported = ((SVAL(cli->inbuf,smb_vwv5) & 0x2) != 0);
+               }
+               memcpy(cli->cryptkey,smb_buf(cli->inbuf),8);
+       } else {
+               /* NT protocol */
+               cli->sec_mode = CVAL(cli->inbuf,smb_vwv1);
+               cli->max_xmit = IVAL(cli->inbuf,smb_vwv3+1);
+               cli->sesskey = IVAL(cli->inbuf,smb_vwv7+1);
+               cli->serverzone = SVALS(cli->inbuf,smb_vwv15+1)*60;
+               /* this time arrives in real GMT */
+               cli->servertime = interpret_long_date(cli->inbuf+smb_vwv11+1);
+               memcpy(cli->cryptkey,smb_buf(cli->inbuf),8);
+               if (IVAL(cli->inbuf,smb_vwv9+1) & 1)
+                       cli->readbraw_supported = 
+                               cli->writebraw_supported = True;      
+       }
+
+       return True;
+}
+
+
+/****************************************************************************
+  send a session request
+****************************************************************************/
+BOOL cli_session_request(struct cli_state *cli, char *host, int name_type,
+                        char *myname)
+{
+       fstring dest;
+       char *p;
+       int len = 4;
+       /* send a session request (RFC 1002) */
+
+       fstrcpy(dest,host);
+  
+       p = strchr(dest,'.');
+       if (p) *p = 0;
+
+       fstrcpy(cli->desthost, dest);
+
+       /* put in the destination name */
+       p = cli->outbuf+len;
+       name_mangle(dest,p,name_type);
+       len += name_len(p);
+
+       /* and my name */
+       p = cli->outbuf+len;
+       name_mangle(myname,p,0);
+       len += name_len(p);
+
+       /* setup the packet length */
+       _smb_setlen(cli->outbuf,len);
+       CVAL(cli->outbuf,0) = 0x81;
+
+       send_smb(cli->fd,cli->outbuf);
+       DEBUG(5,("Sent session request\n"));
+
+       if (!receive_smb(cli->fd,cli->inbuf,cli->timeout))
+               return False;
+
+       if (CVAL(cli->inbuf,0) != 0x82) {
+               cli->error = CVAL(cli->inbuf,0);
+               return False;
+       }
+       return(True);
+}
+
+
+/****************************************************************************
+open the client sockets
+****************************************************************************/
+BOOL cli_connect(struct cli_state *cli, char *host, struct in_addr *ip)
+{
+       struct in_addr dest_ip;
+
+       fstrcpy(cli->desthost, host);
+       
+       if (!ip) {
+               struct hostent *hp;
+
+               if ((hp = Get_Hostbyname(cli->desthost)) == 0) {
+                       return False;
+               }
+
+               putip((char *)&dest_ip,(char *)hp->h_addr);
+       } else {
+               dest_ip = *ip;
+       }
+
+
+       cli->fd = open_socket_out(SOCK_STREAM, &dest_ip, 139, cli->timeout);
+       if (cli->fd == -1)
+               return False;
+
+       return True;
+}
+
+
+/****************************************************************************
+initialise a client structure
+****************************************************************************/
+BOOL cli_initialise(struct cli_state *cli)
+{
+       if (cli->initialised) cli_shutdown(cli);
+
+       memset(cli, 0, sizeof(*cli));
+       cli->fd = -1;
+       cli->cnum = -1;
+       cli->pid = getpid();
+       cli->mid = 1;
+       cli->uid = getuid();
+       cli->protocol = PROTOCOL_NT1;
+       cli->timeout = 20000;
+       cli->bufsize = 0x10000;
+       cli->max_xmit = cli->bufsize - 4;
+       cli->outbuf = (char *)malloc(cli->bufsize);
+       cli->inbuf = (char *)malloc(cli->bufsize);
+       if (!cli->outbuf || !cli->inbuf) return False;
+       cli->initialised = 1;
+       return True;
+}
+
+/****************************************************************************
+shutdown a client structure
+****************************************************************************/
+void cli_shutdown(struct cli_state *cli)
+{
+       if (cli->outbuf) free(cli->outbuf);
+       if (cli->inbuf) free(cli->inbuf);
+       if (cli->fd != -1) close(cli->fd);
+       memset(cli, 0, sizeof(*cli));
+}