2 Unix SMB/CIFS implementation.
4 Copyright (C) Andrew Tridgell 1994-1998
5 Copyright (C) Gerald (Jerry) Carter 2004
6 Copyright (C) James Peach 2007
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program. If not, see <http://www.gnu.org/licenses/>.
23 #include "../libcli/auth/libcli_auth.h"
24 #include "../librpc/gen_ndr/rap.h"
25 #include "../lib/crypto/arcfour.h"
26 #include "../lib/util/tevent_ntstatus.h"
27 #include "async_smb.h"
28 #include "libsmb/libsmb.h"
29 #include "libsmb/clirap.h"
31 #include "../libcli/smb/smbXcli_base.h"
33 #define PIPE_LANMAN "\\PIPE\\LANMAN"
35 /****************************************************************************
37 ****************************************************************************/
39 bool cli_api(struct cli_state
*cli
,
40 char *param
, int prcnt
, int mprcnt
,
41 char *data
, int drcnt
, int mdrcnt
,
42 char **rparam
, unsigned int *rprcnt
,
43 char **rdata
, unsigned int *rdrcnt
)
47 uint8_t *my_rparam
, *my_rdata
;
48 uint32_t num_my_rparam
, num_my_rdata
;
50 status
= cli_trans(talloc_tos(), cli
, SMBtrans
,
51 PIPE_LANMAN
, 0, /* name, fid */
52 0, 0, /* function, flags */
53 NULL
, 0, 0, /* setup */
54 (uint8_t *)param
, prcnt
, mprcnt
, /* Params, length, max */
55 (uint8_t *)data
, drcnt
, mdrcnt
, /* Data, length, max */
56 NULL
, /* recv_flags2 */
57 NULL
, 0, NULL
, /* rsetup */
58 &my_rparam
, 0, &num_my_rparam
,
59 &my_rdata
, 0, &num_my_rdata
);
60 if (!NT_STATUS_IS_OK(status
)) {
65 * I know this memcpy massively hurts, but there are just tons
66 * of callers of cli_api that eventually need changing to
70 *rparam
= (char *)smb_memdup(my_rparam
, num_my_rparam
);
71 if (*rparam
== NULL
) {
74 *rprcnt
= num_my_rparam
;
75 TALLOC_FREE(my_rparam
);
77 *rdata
= (char *)smb_memdup(my_rdata
, num_my_rdata
);
81 *rdrcnt
= num_my_rdata
;
82 TALLOC_FREE(my_rdata
);
86 TALLOC_FREE(my_rdata
);
87 TALLOC_FREE(my_rparam
);
95 /****************************************************************************
96 Perform a NetWkstaUserLogon.
97 ****************************************************************************/
99 bool cli_NetWkstaUserLogon(struct cli_state
*cli
,char *user
, char *workstation
)
104 unsigned int rdrcnt
,rprcnt
;
107 memset(param
, 0, sizeof(param
));
109 /* send a SMBtrans command with api NetWkstaUserLogon */
111 SSVAL(p
,0,132); /* api number */
113 strlcpy(p
,"OOWb54WrLh",sizeof(param
)-PTR_DIFF(p
,param
));
114 p
= skip_string(param
,sizeof(param
),p
);
115 strlcpy(p
,"WB21BWDWWDDDDDDDzzzD",sizeof(param
)-PTR_DIFF(p
,param
));
116 p
= skip_string(param
,sizeof(param
),p
);
119 strlcpy(p
,user
,sizeof(param
)-PTR_DIFF(p
,param
));
120 if (!strupper_m(p
)) {
127 strlcpy(p
, workstation
,sizeof(param
)-PTR_DIFF(p
,param
));
128 if (!strupper_m(p
)) {
132 SSVAL(p
, 0, CLI_BUFFER_SIZE
);
134 SSVAL(p
, 0, CLI_BUFFER_SIZE
);
138 param
, PTR_DIFF(p
,param
),1024, /* param, length, max */
139 NULL
, 0, CLI_BUFFER_SIZE
, /* data, length, max */
140 &rparam
, &rprcnt
, /* return params, return size */
141 &rdata
, &rdrcnt
/* return data, return size */
143 cli
->rap_error
= rparam
? SVAL(rparam
,0) : -1;
146 if (cli
->rap_error
== 0) {
147 DEBUG(4,("NetWkstaUserLogon success\n"));
149 * The cli->privileges = SVAL(p, 24); field was set here
150 * but it was not use anywhere else.
152 /* The cli->eff_name field used to be set here
153 but it wasn't used anywhere else. */
155 DEBUG(1,("NetwkstaUserLogon gave error %d\n", cli
->rap_error
));
161 return (cli
->rap_error
== 0);
164 /****************************************************************************
165 Call a NetShareEnum - try and browse available connections on a host.
166 ****************************************************************************/
168 int cli_RNetShareEnum(struct cli_state
*cli
, void (*fn
)(const char *, uint32
, const char *, void *), void *state
)
173 unsigned int rdrcnt
,rprcnt
;
177 /* now send a SMBtrans command with api RNetShareEnum */
179 SSVAL(p
,0,0); /* api number */
181 strlcpy(p
,"WrLeh",sizeof(param
)-PTR_DIFF(p
,param
));
182 p
= skip_string(param
,sizeof(param
),p
);
183 strlcpy(p
,"B13BWz",sizeof(param
)-PTR_DIFF(p
,param
));
184 p
= skip_string(param
,sizeof(param
),p
);
187 * Win2k needs a *smaller* buffer than 0xFFFF here -
188 * it returns "out of server memory" with 0xFFFF !!! JRA.
194 param
, PTR_DIFF(p
,param
), 1024, /* Param, length, maxlen */
195 NULL
, 0, 0xFFE0, /* data, length, maxlen - Win2k needs a small buffer here too ! */
196 &rparam
, &rprcnt
, /* return params, length */
197 &rdata
, &rdrcnt
)) /* return data, length */
199 int res
= rparam
? SVAL(rparam
,0) : -1;
201 if (res
== 0 || res
== ERRmoredata
) {
202 int converter
=SVAL(rparam
,2);
204 char *rdata_end
= rdata
+ rdrcnt
;
206 count
=SVAL(rparam
,4);
209 for (i
=0;i
<count
;i
++,p
+=20) {
217 TALLOC_CTX
*frame
= talloc_stackframe();
219 if (p
+ 20 > rdata_end
) {
226 comment_offset
= (IVAL(p
,16) & 0xFFFF) - converter
;
227 if (comment_offset
< 0 ||
228 comment_offset
> (int)rdrcnt
) {
232 cmnt
= comment_offset
?(rdata
+comment_offset
):"";
234 /* Work out the comment length. */
235 for (p1
= cmnt
, len
= 0; *p1
&&
236 p1
< rdata_end
; len
++)
241 pull_string_talloc(frame
,rdata
,0,
242 &s1
,sname
,14,STR_ASCII
);
243 pull_string_talloc(frame
,rdata
,0,
244 &s2
,cmnt
,len
,STR_ASCII
);
250 fn(s1
, type
, s2
, state
);
255 DEBUG(4,("NetShareEnum res=%d\n", res
));
258 DEBUG(4,("NetShareEnum failed\n"));
267 /****************************************************************************
268 Call a NetServerEnum for the specified workgroup and servertype mask. This
269 function then calls the specified callback function for each name returned.
271 The callback function takes 4 arguments: the machine name, the server type,
272 the comment and a state pointer.
273 ****************************************************************************/
275 bool cli_NetServerEnum(struct cli_state
*cli
, char *workgroup
, uint32 stype
,
276 void (*fn
)(const char *, uint32
, const char *, void *),
281 char *rdata_end
= NULL
;
282 unsigned int rdrcnt
,rprcnt
;
287 uint32 func
= RAP_NetServerEnum2
;
288 char *last_entry
= NULL
;
293 errno
= 0; /* reset */
296 * This may take more than one transaction, so we should loop until
297 * we no longer get a more data to process or we have all of the
301 /* send a SMBtrans command with api NetServerEnum */
303 SIVAL(p
,0,func
); /* api number */
306 if (func
== RAP_NetServerEnum3
) {
307 strlcpy(p
,"WrLehDzz", sizeof(param
)-PTR_DIFF(p
,param
));
309 strlcpy(p
,"WrLehDz", sizeof(param
)-PTR_DIFF(p
,param
));
312 p
= skip_string(param
, sizeof(param
), p
);
313 strlcpy(p
,"B16BBDz", sizeof(param
)-PTR_DIFF(p
,param
));
315 p
= skip_string(param
, sizeof(param
), p
);
317 SSVAL(p
,2,CLI_BUFFER_SIZE
);
322 /* If we have more data, tell the server where
327 sizeof(param
) - PTR_DIFF(p
,param
) - 1,
328 STR_TERMINATE
|STR_UPPER
);
330 if (len
== (size_t)-1) {
331 SAFE_FREE(last_entry
);
336 if (func
== RAP_NetServerEnum3
) {
338 last_entry
? last_entry
: "",
339 sizeof(param
) - PTR_DIFF(p
,param
) - 1,
342 if (len
== (size_t)-1) {
343 SAFE_FREE(last_entry
);
349 /* Next time through we need to use the continue api */
350 func
= RAP_NetServerEnum3
;
353 param
, PTR_DIFF(p
,param
), 8, /* params, length, max */
354 NULL
, 0, CLI_BUFFER_SIZE
, /* data, length, max */
355 &rparam
, &rprcnt
, /* return params, return size */
356 &rdata
, &rdrcnt
)) { /* return data, return size */
358 /* break out of the loop on error */
363 rdata_end
= rdata
+ rdrcnt
;
364 res
= rparam
? SVAL(rparam
,0) : -1;
366 if (res
== 0 || res
== ERRmoredata
||
367 (res
!= -1 && cli_errno(cli
) == 0)) {
370 int converter
=SVAL(rparam
,2);
372 /* Get the number of items returned in this buffer */
373 count
= SVAL(rparam
, 4);
375 /* The next field contains the number of items left,
376 * including those returned in this buffer. So the
377 * first time through this should contain all of the
380 if (total_cnt
== 0) {
381 total_cnt
= SVAL(rparam
, 6);
384 /* Keep track of how many we have read */
388 /* The last name in the previous NetServerEnum reply is
389 * sent back to server in the NetServerEnum3 request
390 * (last_entry). The next reply should repeat this entry
391 * as the first element. We have no proof that this is
392 * always true, but from traces that seems to be the
393 * behavior from Window Servers. So first lets do a lot
394 * of checking, just being paranoid. If the string
395 * matches then we already saw this entry so skip it.
397 * NOTE: sv1_name field must be null terminated and has
398 * a max size of 16 (NetBIOS Name).
400 if (last_entry
&& count
&& p
&&
401 (strncmp(last_entry
, p
, 16) == 0)) {
402 count
-= 1; /* Skip this entry */
403 return_cnt
= -1; /* Not part of total, so don't count. */
404 p
= rdata
+ 26; /* Skip the whole record */
407 for (i
= 0; i
< count
; i
++, p
+= 26) {
412 TALLOC_CTX
*frame
= talloc_stackframe();
413 uint32_t entry_stype
;
415 if (p
+ 26 > rdata_end
) {
421 comment_offset
= (IVAL(p
,22) & 0xFFFF)-converter
;
422 cmnt
= comment_offset
?(rdata
+comment_offset
):"";
424 if (comment_offset
< 0 || comment_offset
>= (int)rdrcnt
) {
429 /* Work out the comment length. */
430 for (p1
= cmnt
, len
= 0; *p1
&&
431 p1
< rdata_end
; len
++)
437 entry_stype
= IVAL(p
,18) & ~SV_TYPE_LOCAL_LIST_ONLY
;
439 pull_string_talloc(frame
,rdata
,0,
440 &s1
,sname
,16,STR_ASCII
);
441 pull_string_talloc(frame
,rdata
,0,
442 &s2
,cmnt
,len
,STR_ASCII
);
449 fn(s1
, entry_stype
, s2
, state
);
453 /* We are done with the old last entry, so now we can free it */
455 SAFE_FREE(last_entry
); /* This will set it to null */
458 /* We always make a copy of the last entry if we have one */
460 last_entry
= smb_xstrdup(sname
);
463 /* If we have more data, but no last entry then error out */
464 if (!last_entry
&& (res
== ERRmoredata
)) {
473 } while ((res
== ERRmoredata
) && (total_cnt
> return_cnt
));
477 SAFE_FREE(last_entry
);
480 errno
= cli_errno(cli
);
483 /* this is a very special case, when the domain master for the
484 work group isn't part of the work group itself, there is something
490 return(return_cnt
> 0);
493 /****************************************************************************
494 Send a SamOEMChangePassword command.
495 ****************************************************************************/
497 bool cli_oem_change_password(struct cli_state
*cli
, const char *user
, const char *new_password
,
498 const char *old_password
)
501 unsigned char data
[532];
503 unsigned char old_pw_hash
[16];
504 unsigned char new_pw_hash
[16];
505 unsigned int data_len
;
506 unsigned int param_len
= 0;
509 unsigned int rprcnt
, rdrcnt
;
511 if (strlen(user
) >= sizeof(fstring
)-1) {
512 DEBUG(0,("cli_oem_change_password: user name %s is too long.\n", user
));
516 SSVAL(p
,0,214); /* SamOEMChangePassword command. */
518 strlcpy(p
, "zsT", sizeof(param
)-PTR_DIFF(p
,param
));
519 p
= skip_string(param
,sizeof(param
),p
);
520 strlcpy(p
, "B516B16", sizeof(param
)-PTR_DIFF(p
,param
));
521 p
= skip_string(param
,sizeof(param
),p
);
522 strlcpy(p
,user
, sizeof(param
)-PTR_DIFF(p
,param
));
523 p
= skip_string(param
,sizeof(param
),p
);
527 param_len
= PTR_DIFF(p
,param
);
530 * Get the Lanman hash of the old password, we
531 * use this as the key to make_oem_passwd_hash().
533 E_deshash(old_password
, old_pw_hash
);
535 encode_pw_buffer(data
, new_password
, STR_ASCII
);
537 #ifdef DEBUG_PASSWORD
538 DEBUG(100,("make_oem_passwd_hash\n"));
539 dump_data(100, data
, 516);
541 arcfour_crypt( (unsigned char *)data
, (unsigned char *)old_pw_hash
, 516);
544 * Now place the old password hash in the data.
546 E_deshash(new_password
, new_pw_hash
);
548 E_old_pw_hash( new_pw_hash
, old_pw_hash
, (uchar
*)&data
[516]);
553 param
, param_len
, 4, /* param, length, max */
554 (char *)data
, data_len
, 0, /* data, length, max */
557 DEBUG(0,("cli_oem_change_password: Failed to send password change for user %s\n",
563 cli
->rap_error
= SVAL(rparam
,0);
569 return (cli
->rap_error
== 0);
572 /****************************************************************************
573 Send a qpathinfo call.
574 ****************************************************************************/
576 struct cli_qpathinfo1_state
{
577 struct cli_state
*cli
;
582 static void cli_qpathinfo1_done(struct tevent_req
*subreq
);
584 struct tevent_req
*cli_qpathinfo1_send(TALLOC_CTX
*mem_ctx
,
585 struct tevent_context
*ev
,
586 struct cli_state
*cli
,
589 struct tevent_req
*req
= NULL
, *subreq
= NULL
;
590 struct cli_qpathinfo1_state
*state
= NULL
;
592 req
= tevent_req_create(mem_ctx
, &state
, struct cli_qpathinfo1_state
);
597 subreq
= cli_qpathinfo_send(state
, ev
, cli
, fname
, SMB_INFO_STANDARD
,
598 22, CLI_BUFFER_SIZE
);
599 if (tevent_req_nomem(subreq
, req
)) {
600 return tevent_req_post(req
, ev
);
602 tevent_req_set_callback(subreq
, cli_qpathinfo1_done
, req
);
606 static void cli_qpathinfo1_done(struct tevent_req
*subreq
)
608 struct tevent_req
*req
= tevent_req_callback_data(
609 subreq
, struct tevent_req
);
610 struct cli_qpathinfo1_state
*state
= tevent_req_data(
611 req
, struct cli_qpathinfo1_state
);
614 status
= cli_qpathinfo_recv(subreq
, state
, &state
->data
,
617 if (!NT_STATUS_IS_OK(status
)) {
618 tevent_req_nterror(req
, status
);
621 tevent_req_done(req
);
624 NTSTATUS
cli_qpathinfo1_recv(struct tevent_req
*req
,
631 struct cli_qpathinfo1_state
*state
= tevent_req_data(
632 req
, struct cli_qpathinfo1_state
);
635 time_t (*date_fn
)(const void *buf
, int serverzone
);
637 if (tevent_req_is_nterror(req
, &status
)) {
641 if (state
->cli
->win95
) {
642 date_fn
= make_unix_date
;
644 date_fn
= make_unix_date2
;
648 *change_time
= date_fn(state
->data
+0, smb1cli_conn_server_time_zone(state
->cli
->conn
));
651 *access_time
= date_fn(state
->data
+4, smb1cli_conn_server_time_zone(state
->cli
->conn
));
654 *write_time
= date_fn(state
->data
+8, smb1cli_conn_server_time_zone(state
->cli
->conn
));
657 *size
= IVAL(state
->data
, 12);
660 *mode
= SVAL(state
->data
, l1_attrFile
);
665 NTSTATUS
cli_qpathinfo1(struct cli_state
*cli
,
673 TALLOC_CTX
*frame
= talloc_stackframe();
674 struct tevent_context
*ev
;
675 struct tevent_req
*req
;
676 NTSTATUS status
= NT_STATUS_NO_MEMORY
;
678 if (smbXcli_conn_has_async_calls(cli
->conn
)) {
680 * Can't use sync call while an async call is in flight
682 status
= NT_STATUS_INVALID_PARAMETER
;
685 ev
= samba_tevent_context_init(frame
);
689 req
= cli_qpathinfo1_send(frame
, ev
, cli
, fname
);
693 if (!tevent_req_poll_ntstatus(req
, ev
, &status
)) {
696 status
= cli_qpathinfo1_recv(req
, change_time
, access_time
,
697 write_time
, size
, mode
);
703 /****************************************************************************
704 Send a setpathinfo call.
705 ****************************************************************************/
707 NTSTATUS
cli_setpathinfo_basic(struct cli_state
*cli
, const char *fname
,
714 unsigned int data_len
= 0;
721 * Add the create, last access, modification, and status change times
723 put_long_date(p
, create_time
);
726 put_long_date(p
, access_time
);
729 put_long_date(p
, write_time
);
732 put_long_date(p
, change_time
);
743 data_len
= PTR_DIFF(p
, data
);
745 return cli_setpathinfo(cli
, SMB_FILE_BASIC_INFORMATION
, fname
,
746 (uint8_t *)data
, data_len
);
749 /****************************************************************************
750 Send a qpathinfo call with the SMB_QUERY_FILE_ALL_INFO info level.
751 ****************************************************************************/
753 struct cli_qpathinfo2_state
{
758 static void cli_qpathinfo2_done(struct tevent_req
*subreq
);
760 struct tevent_req
*cli_qpathinfo2_send(TALLOC_CTX
*mem_ctx
,
761 struct tevent_context
*ev
,
762 struct cli_state
*cli
,
765 struct tevent_req
*req
= NULL
, *subreq
= NULL
;
766 struct cli_qpathinfo2_state
*state
= NULL
;
768 req
= tevent_req_create(mem_ctx
, &state
, struct cli_qpathinfo2_state
);
772 subreq
= cli_qpathinfo_send(state
, ev
, cli
, fname
,
773 SMB_QUERY_FILE_ALL_INFO
,
774 68, CLI_BUFFER_SIZE
);
775 if (tevent_req_nomem(subreq
, req
)) {
776 return tevent_req_post(req
, ev
);
778 tevent_req_set_callback(subreq
, cli_qpathinfo2_done
, req
);
782 static void cli_qpathinfo2_done(struct tevent_req
*subreq
)
784 struct tevent_req
*req
= tevent_req_callback_data(
785 subreq
, struct tevent_req
);
786 struct cli_qpathinfo2_state
*state
= tevent_req_data(
787 req
, struct cli_qpathinfo2_state
);
790 status
= cli_qpathinfo_recv(subreq
, state
, &state
->data
,
793 if (!NT_STATUS_IS_OK(status
)) {
794 tevent_req_nterror(req
, status
);
797 tevent_req_done(req
);
800 NTSTATUS
cli_qpathinfo2_recv(struct tevent_req
*req
,
801 struct timespec
*create_time
,
802 struct timespec
*access_time
,
803 struct timespec
*write_time
,
804 struct timespec
*change_time
,
805 off_t
*size
, uint16
*mode
,
808 struct cli_qpathinfo2_state
*state
= tevent_req_data(
809 req
, struct cli_qpathinfo2_state
);
812 if (tevent_req_is_nterror(req
, &status
)) {
817 *create_time
= interpret_long_date((char *)state
->data
+0);
820 *access_time
= interpret_long_date((char *)state
->data
+8);
823 *write_time
= interpret_long_date((char *)state
->data
+16);
826 *change_time
= interpret_long_date((char *)state
->data
+24);
829 *mode
= SVAL(state
->data
, 32);
832 *size
= IVAL2_TO_SMB_BIG_UINT(state
->data
,48);
835 *ino
= IVAL(state
->data
, 64);
840 NTSTATUS
cli_qpathinfo2(struct cli_state
*cli
, const char *fname
,
841 struct timespec
*create_time
,
842 struct timespec
*access_time
,
843 struct timespec
*write_time
,
844 struct timespec
*change_time
,
845 off_t
*size
, uint16
*mode
,
848 TALLOC_CTX
*frame
= NULL
;
849 struct tevent_context
*ev
;
850 struct tevent_req
*req
;
851 NTSTATUS status
= NT_STATUS_NO_MEMORY
;
853 if (smbXcli_conn_protocol(cli
->conn
) >= PROTOCOL_SMB2_02
) {
854 return cli_smb2_qpathinfo2(cli
,
865 frame
= talloc_stackframe();
867 if (smbXcli_conn_has_async_calls(cli
->conn
)) {
869 * Can't use sync call while an async call is in flight
871 status
= NT_STATUS_INVALID_PARAMETER
;
874 ev
= samba_tevent_context_init(frame
);
878 req
= cli_qpathinfo2_send(frame
, ev
, cli
, fname
);
882 if (!tevent_req_poll_ntstatus(req
, ev
, &status
)) {
885 status
= cli_qpathinfo2_recv(req
, create_time
, access_time
,
886 write_time
, change_time
, size
, mode
, ino
);
892 /****************************************************************************
894 ****************************************************************************/
896 struct cli_qpathinfo_streams_state
{
901 static void cli_qpathinfo_streams_done(struct tevent_req
*subreq
);
903 struct tevent_req
*cli_qpathinfo_streams_send(TALLOC_CTX
*mem_ctx
,
904 struct tevent_context
*ev
,
905 struct cli_state
*cli
,
908 struct tevent_req
*req
= NULL
, *subreq
= NULL
;
909 struct cli_qpathinfo_streams_state
*state
= NULL
;
911 req
= tevent_req_create(mem_ctx
, &state
,
912 struct cli_qpathinfo_streams_state
);
916 subreq
= cli_qpathinfo_send(state
, ev
, cli
, fname
,
917 SMB_FILE_STREAM_INFORMATION
,
919 if (tevent_req_nomem(subreq
, req
)) {
920 return tevent_req_post(req
, ev
);
922 tevent_req_set_callback(subreq
, cli_qpathinfo_streams_done
, req
);
926 static void cli_qpathinfo_streams_done(struct tevent_req
*subreq
)
928 struct tevent_req
*req
= tevent_req_callback_data(
929 subreq
, struct tevent_req
);
930 struct cli_qpathinfo_streams_state
*state
= tevent_req_data(
931 req
, struct cli_qpathinfo_streams_state
);
934 status
= cli_qpathinfo_recv(subreq
, state
, &state
->data
,
937 if (!NT_STATUS_IS_OK(status
)) {
938 tevent_req_nterror(req
, status
);
941 tevent_req_done(req
);
944 NTSTATUS
cli_qpathinfo_streams_recv(struct tevent_req
*req
,
946 unsigned int *pnum_streams
,
947 struct stream_struct
**pstreams
)
949 struct cli_qpathinfo_streams_state
*state
= tevent_req_data(
950 req
, struct cli_qpathinfo_streams_state
);
953 if (tevent_req_is_nterror(req
, &status
)) {
956 if (!parse_streams_blob(mem_ctx
, state
->data
, state
->num_data
,
957 pnum_streams
, pstreams
)) {
958 return NT_STATUS_INVALID_NETWORK_RESPONSE
;
963 NTSTATUS
cli_qpathinfo_streams(struct cli_state
*cli
, const char *fname
,
965 unsigned int *pnum_streams
,
966 struct stream_struct
**pstreams
)
968 TALLOC_CTX
*frame
= NULL
;
969 struct tevent_context
*ev
;
970 struct tevent_req
*req
;
971 NTSTATUS status
= NT_STATUS_NO_MEMORY
;
973 if (smbXcli_conn_protocol(cli
->conn
) >= PROTOCOL_SMB2_02
) {
974 return cli_smb2_qpathinfo_streams(cli
,
981 frame
= talloc_stackframe();
983 if (smbXcli_conn_has_async_calls(cli
->conn
)) {
985 * Can't use sync call while an async call is in flight
987 status
= NT_STATUS_INVALID_PARAMETER
;
990 ev
= samba_tevent_context_init(frame
);
994 req
= cli_qpathinfo_streams_send(frame
, ev
, cli
, fname
);
998 if (!tevent_req_poll_ntstatus(req
, ev
, &status
)) {
1001 status
= cli_qpathinfo_streams_recv(req
, mem_ctx
, pnum_streams
,
1008 bool parse_streams_blob(TALLOC_CTX
*mem_ctx
, const uint8_t *rdata
,
1010 unsigned int *pnum_streams
,
1011 struct stream_struct
**pstreams
)
1013 unsigned int num_streams
;
1014 struct stream_struct
*streams
;
1021 while ((data_len
> ofs
) && (data_len
- ofs
>= 24)) {
1025 struct stream_struct
*tmp
;
1028 tmp
= talloc_realloc(mem_ctx
, streams
,
1029 struct stream_struct
,
1037 nlen
= IVAL(rdata
, ofs
+ 0x04);
1039 streams
[num_streams
].size
= IVAL_TO_SMB_OFF_T(
1041 streams
[num_streams
].alloc_size
= IVAL_TO_SMB_OFF_T(
1044 if (nlen
> data_len
- (ofs
+ 24)) {
1049 * We need to null-terminate src, how do I do this with
1050 * convert_string_talloc??
1053 tmp_buf
= talloc_array(streams
, uint8_t, nlen
+2);
1054 if (tmp_buf
== NULL
) {
1058 memcpy(tmp_buf
, rdata
+ofs
+24, nlen
);
1060 tmp_buf
[nlen
+1] = 0;
1062 if (!convert_string_talloc(streams
, CH_UTF16
, CH_UNIX
, tmp_buf
,
1063 nlen
+2, &vstr
, &size
))
1065 TALLOC_FREE(tmp_buf
);
1069 TALLOC_FREE(tmp_buf
);
1070 streams
[num_streams
].name
= (char *)vstr
;
1073 len
= IVAL(rdata
, ofs
);
1074 if (len
> data_len
- ofs
) {
1077 if (len
== 0) break;
1081 *pnum_streams
= num_streams
;
1082 *pstreams
= streams
;
1086 TALLOC_FREE(streams
);
1090 /****************************************************************************
1091 Send a qfileinfo QUERY_FILE_NAME_INFO call.
1092 ****************************************************************************/
1094 NTSTATUS
cli_qfilename(struct cli_state
*cli
, uint16_t fnum
,
1095 TALLOC_CTX
*mem_ctx
, char **_name
)
1097 uint16_t recv_flags2
;
1104 status
= cli_qfileinfo(talloc_tos(), cli
, fnum
,
1105 SMB_QUERY_FILE_NAME_INFO
,
1106 4, CLI_BUFFER_SIZE
, &recv_flags2
,
1107 &rdata
, &num_rdata
);
1108 if (!NT_STATUS_IS_OK(status
)) {
1112 namelen
= IVAL(rdata
, 0);
1113 if (namelen
> (num_rdata
- 4)) {
1115 return NT_STATUS_INVALID_NETWORK_RESPONSE
;
1118 clistr_pull_talloc(mem_ctx
,
1119 (const char *)rdata
,
1126 status
= map_nt_error_from_unix(errno
);
1133 return NT_STATUS_OK
;
1136 /****************************************************************************
1137 Send a qfileinfo call.
1138 ****************************************************************************/
1140 NTSTATUS
cli_qfileinfo_basic(struct cli_state
*cli
, uint16_t fnum
,
1141 uint16
*mode
, off_t
*size
,
1142 struct timespec
*create_time
,
1143 struct timespec
*access_time
,
1144 struct timespec
*write_time
,
1145 struct timespec
*change_time
,
1152 if (smbXcli_conn_protocol(cli
->conn
) >= PROTOCOL_SMB2_02
) {
1153 return cli_smb2_qfileinfo_basic(cli
,
1164 /* if its a win95 server then fail this - win95 totally screws it
1167 return NT_STATUS_NOT_SUPPORTED
;
1170 status
= cli_qfileinfo(talloc_tos(), cli
, fnum
,
1171 SMB_QUERY_FILE_ALL_INFO
,
1172 68, CLI_BUFFER_SIZE
,
1174 &rdata
, &num_rdata
);
1175 if (!NT_STATUS_IS_OK(status
)) {
1180 *create_time
= interpret_long_date((char *)rdata
+0);
1183 *access_time
= interpret_long_date((char *)rdata
+8);
1186 *write_time
= interpret_long_date((char *)rdata
+16);
1189 *change_time
= interpret_long_date((char *)rdata
+24);
1192 *mode
= SVAL(rdata
, 32);
1195 *size
= IVAL2_TO_SMB_BIG_UINT(rdata
,48);
1198 *ino
= IVAL(rdata
, 64);
1202 return NT_STATUS_OK
;
1205 /****************************************************************************
1206 Send a qpathinfo BASIC_INFO call.
1207 ****************************************************************************/
1209 struct cli_qpathinfo_basic_state
{
1214 static void cli_qpathinfo_basic_done(struct tevent_req
*subreq
);
1216 struct tevent_req
*cli_qpathinfo_basic_send(TALLOC_CTX
*mem_ctx
,
1217 struct tevent_context
*ev
,
1218 struct cli_state
*cli
,
1221 struct tevent_req
*req
= NULL
, *subreq
= NULL
;
1222 struct cli_qpathinfo_basic_state
*state
= NULL
;
1224 req
= tevent_req_create(mem_ctx
, &state
,
1225 struct cli_qpathinfo_basic_state
);
1229 subreq
= cli_qpathinfo_send(state
, ev
, cli
, fname
,
1230 SMB_QUERY_FILE_BASIC_INFO
,
1231 36, CLI_BUFFER_SIZE
);
1232 if (tevent_req_nomem(subreq
, req
)) {
1233 return tevent_req_post(req
, ev
);
1235 tevent_req_set_callback(subreq
, cli_qpathinfo_basic_done
, req
);
1239 static void cli_qpathinfo_basic_done(struct tevent_req
*subreq
)
1241 struct tevent_req
*req
= tevent_req_callback_data(
1242 subreq
, struct tevent_req
);
1243 struct cli_qpathinfo_basic_state
*state
= tevent_req_data(
1244 req
, struct cli_qpathinfo_basic_state
);
1247 status
= cli_qpathinfo_recv(subreq
, state
, &state
->data
,
1249 TALLOC_FREE(subreq
);
1250 if (!NT_STATUS_IS_OK(status
)) {
1251 tevent_req_nterror(req
, status
);
1254 tevent_req_done(req
);
1257 NTSTATUS
cli_qpathinfo_basic_recv(struct tevent_req
*req
,
1258 SMB_STRUCT_STAT
*sbuf
, uint32
*attributes
)
1260 struct cli_qpathinfo_basic_state
*state
= tevent_req_data(
1261 req
, struct cli_qpathinfo_basic_state
);
1264 if (tevent_req_is_nterror(req
, &status
)) {
1268 sbuf
->st_ex_btime
= interpret_long_date((char *)state
->data
);
1269 sbuf
->st_ex_atime
= interpret_long_date((char *)state
->data
+8);
1270 sbuf
->st_ex_mtime
= interpret_long_date((char *)state
->data
+16);
1271 sbuf
->st_ex_ctime
= interpret_long_date((char *)state
->data
+24);
1272 *attributes
= IVAL(state
->data
, 32);
1273 return NT_STATUS_OK
;
1276 NTSTATUS
cli_qpathinfo_basic(struct cli_state
*cli
, const char *name
,
1277 SMB_STRUCT_STAT
*sbuf
, uint32
*attributes
)
1279 TALLOC_CTX
*frame
= NULL
;
1280 struct tevent_context
*ev
;
1281 struct tevent_req
*req
;
1282 NTSTATUS status
= NT_STATUS_NO_MEMORY
;
1284 if (smbXcli_conn_protocol(cli
->conn
) >= PROTOCOL_SMB2_02
) {
1285 return cli_smb2_qpathinfo_basic(cli
,
1291 frame
= talloc_stackframe();
1293 if (smbXcli_conn_has_async_calls(cli
->conn
)) {
1295 * Can't use sync call while an async call is in flight
1297 status
= NT_STATUS_INVALID_PARAMETER
;
1300 ev
= samba_tevent_context_init(frame
);
1304 req
= cli_qpathinfo_basic_send(frame
, ev
, cli
, name
);
1308 if (!tevent_req_poll_ntstatus(req
, ev
, &status
)) {
1311 status
= cli_qpathinfo_basic_recv(req
, sbuf
, attributes
);
1317 /****************************************************************************
1318 Send a qpathinfo SMB_QUERY_FILE_ALT_NAME_INFO call.
1319 ****************************************************************************/
1321 NTSTATUS
cli_qpathinfo_alt_name(struct cli_state
*cli
, const char *fname
, fstring alt_name
)
1326 char *converted
= NULL
;
1327 size_t converted_size
= 0;
1330 if (smbXcli_conn_protocol(cli
->conn
) >= PROTOCOL_SMB2_02
) {
1331 return cli_smb2_qpathinfo_alt_name(cli
,
1336 status
= cli_qpathinfo(talloc_tos(), cli
, fname
,
1337 SMB_QUERY_FILE_ALT_NAME_INFO
,
1338 4, CLI_BUFFER_SIZE
, &rdata
, &num_rdata
);
1339 if (!NT_STATUS_IS_OK(status
)) {
1343 len
= IVAL(rdata
, 0);
1345 if (len
> num_rdata
- 4) {
1346 return NT_STATUS_INVALID_NETWORK_RESPONSE
;
1349 /* The returned data is a pushed string, not raw data. */
1350 if (!convert_string_talloc(talloc_tos(),
1351 smbXcli_conn_use_unicode(cli
->conn
) ? CH_UTF16LE
: CH_DOS
,
1357 return NT_STATUS_NO_MEMORY
;
1359 fstrcpy(alt_name
, converted
);
1361 TALLOC_FREE(converted
);
1364 return NT_STATUS_OK
;
1367 /****************************************************************************
1368 Send a qpathinfo SMB_QUERY_FILE_STADNDARD_INFO call.
1369 ****************************************************************************/
1371 NTSTATUS
cli_qpathinfo_standard(struct cli_state
*cli
, const char *fname
,
1372 uint64_t *allocated
, uint64_t *size
,
1374 bool *is_del_pending
, bool *is_dir
)
1380 if (smbXcli_conn_protocol(cli
->conn
) >= PROTOCOL_SMB2_02
) {
1381 return NT_STATUS_NOT_IMPLEMENTED
;
1384 status
= cli_qpathinfo(talloc_tos(), cli
, fname
,
1385 SMB_QUERY_FILE_STANDARD_INFO
,
1386 24, CLI_BUFFER_SIZE
, &rdata
, &num_rdata
);
1387 if (!NT_STATUS_IS_OK(status
)) {
1392 *allocated
= BVAL(rdata
, 0);
1396 *size
= BVAL(rdata
, 8);
1400 *nlinks
= IVAL(rdata
, 16);
1403 if (is_del_pending
) {
1404 *is_del_pending
= CVAL(rdata
, 20);
1408 *is_dir
= CVAL(rdata
, 20);
1413 return NT_STATUS_OK
;
1417 /* like cli_qpathinfo2 but do not use SMB_QUERY_FILE_ALL_INFO with smb1 */
1418 NTSTATUS
cli_qpathinfo3(struct cli_state
*cli
, const char *fname
,
1419 struct timespec
*create_time
,
1420 struct timespec
*access_time
,
1421 struct timespec
*write_time
,
1422 struct timespec
*change_time
,
1423 off_t
*size
, uint16
*mode
,
1426 NTSTATUS status
= NT_STATUS_OK
;
1431 if (smbXcli_conn_protocol(cli
->conn
) >= PROTOCOL_SMB2_02
) {
1432 return cli_qpathinfo2(cli
, fname
,
1433 create_time
, access_time
, write_time
, change_time
,
1437 if (create_time
|| access_time
|| write_time
|| change_time
|| mode
) {
1438 status
= cli_qpathinfo_basic(cli
, fname
, &st
, &attr
);
1439 if (!NT_STATUS_IS_OK(status
)) {
1445 status
= cli_qpathinfo_standard(cli
, fname
,
1446 NULL
, &pos
, NULL
, NULL
, NULL
);
1447 if (!NT_STATUS_IS_OK(status
)) {
1455 *create_time
= st
.st_ex_btime
;
1458 *access_time
= st
.st_ex_atime
;
1461 *write_time
= st
.st_ex_mtime
;
1464 *change_time
= st
.st_ex_ctime
;
1473 return NT_STATUS_OK
;