added some QPATHINFO and QFILEINFO tests into smbtorture.
[Samba.git] / source / libsmb / clientgen.c
blob7060467aee3866db8e459073181b68e00e974230
1 /*
2 Unix SMB/Netbios implementation.
3 Version 1.9.
4 SMB client generic functions
5 Copyright (C) Andrew Tridgell 1994-1997
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
22 #ifdef SYSLOG
23 #undef SYSLOG
24 #endif
26 #include "includes.h"
27 #include "trans2.h"
30 extern int DEBUGLEVEL;
32 /****************************************************************************
33 setup basics in a outgoing packet
34 ****************************************************************************/
35 static void cli_setup_packet(struct cli_state *cli)
37 SSVAL(cli->outbuf,smb_pid,cli->pid);
38 SSVAL(cli->outbuf,smb_uid,cli->uid);
39 SSVAL(cli->outbuf,smb_mid,cli->mid);
40 if (cli->protocol > PROTOCOL_CORE) {
41 SCVAL(cli->outbuf,smb_flg,0x8);
42 SSVAL(cli->outbuf,smb_flg2,0x1);
47 /****************************************************************************
48 send a SMB trans or trans2 request
49 ****************************************************************************/
50 static BOOL cli_send_trans(struct cli_state *cli,
51 int trans, char *name, int fid, int flags,
52 char *data,char *param,uint16 *setup, int ldata,int lparam,
53 int lsetup,int mdata,int mparam,int msetup)
55 int i;
56 int this_ldata,this_lparam;
57 int tot_data=0,tot_param=0;
58 char *outdata,*outparam;
59 char *p;
61 this_lparam = MIN(lparam,cli->max_xmit - (500+lsetup*2)); /* hack */
62 this_ldata = MIN(ldata,cli->max_xmit - (500+lsetup*2+this_lparam));
64 bzero(cli->outbuf,smb_size);
65 set_message(cli->outbuf,14+lsetup,0,True);
66 CVAL(cli->outbuf,smb_com) = trans;
67 SSVAL(cli->outbuf,smb_tid, cli->cnum);
68 cli_setup_packet(cli);
70 outparam = smb_buf(cli->outbuf)+(trans==SMBtrans ? strlen(name)+1 : 3);
71 outdata = outparam+this_lparam;
73 /* primary request */
74 SSVAL(cli->outbuf,smb_tpscnt,lparam); /* tpscnt */
75 SSVAL(cli->outbuf,smb_tdscnt,ldata); /* tdscnt */
76 SSVAL(cli->outbuf,smb_mprcnt,mparam); /* mprcnt */
77 SSVAL(cli->outbuf,smb_mdrcnt,mdata); /* mdrcnt */
78 SCVAL(cli->outbuf,smb_msrcnt,msetup); /* msrcnt */
79 SSVAL(cli->outbuf,smb_flags,flags); /* flags */
80 SIVAL(cli->outbuf,smb_timeout,0); /* timeout */
81 SSVAL(cli->outbuf,smb_pscnt,this_lparam); /* pscnt */
82 SSVAL(cli->outbuf,smb_psoff,smb_offset(outparam,cli->outbuf)); /* psoff */
83 SSVAL(cli->outbuf,smb_dscnt,this_ldata); /* dscnt */
84 SSVAL(cli->outbuf,smb_dsoff,smb_offset(outdata,cli->outbuf)); /* dsoff */
85 SCVAL(cli->outbuf,smb_suwcnt,lsetup); /* suwcnt */
86 for (i=0;i<lsetup;i++) /* setup[] */
87 SSVAL(cli->outbuf,smb_setup+i*2,setup[i]);
88 p = smb_buf(cli->outbuf);
89 if (trans==SMBtrans) {
90 strcpy(p,name); /* name[] */
91 } else {
92 *p++ = 0; /* put in a null smb_name */
93 *p++ = 'D'; *p++ = ' '; /* observed in OS/2 */
95 if (this_lparam) /* param[] */
96 memcpy(outparam,param,this_lparam);
97 if (this_ldata) /* data[] */
98 memcpy(outdata,data,this_ldata);
99 set_message(cli->outbuf,14+lsetup, /* wcnt, bcc */
100 PTR_DIFF(outdata+this_ldata,smb_buf(cli->outbuf)),False);
102 show_msg(cli->outbuf);
103 send_smb(cli->fd,cli->outbuf);
105 if (this_ldata < ldata || this_lparam < lparam) {
106 /* receive interim response */
107 if (!receive_smb(cli->fd,cli->inbuf,cli->timeout) ||
108 CVAL(cli->inbuf,smb_rcls) != 0) {
109 return(False);
112 tot_data = this_ldata;
113 tot_param = this_lparam;
115 while (tot_data < ldata || tot_param < lparam) {
116 this_lparam = MIN(lparam-tot_param,cli->max_xmit - 500); /* hack */
117 this_ldata = MIN(ldata-tot_data,cli->max_xmit - (500+this_lparam));
119 set_message(cli->outbuf,trans==SMBtrans?8:9,0,True);
120 CVAL(cli->outbuf,smb_com) = trans==SMBtrans ? SMBtranss : SMBtranss2;
122 outparam = smb_buf(cli->outbuf);
123 outdata = outparam+this_lparam;
125 /* secondary request */
126 SSVAL(cli->outbuf,smb_tpscnt,lparam); /* tpscnt */
127 SSVAL(cli->outbuf,smb_tdscnt,ldata); /* tdscnt */
128 SSVAL(cli->outbuf,smb_spscnt,this_lparam); /* pscnt */
129 SSVAL(cli->outbuf,smb_spsoff,smb_offset(outparam,cli->outbuf)); /* psoff */
130 SSVAL(cli->outbuf,smb_spsdisp,tot_param); /* psdisp */
131 SSVAL(cli->outbuf,smb_sdscnt,this_ldata); /* dscnt */
132 SSVAL(cli->outbuf,smb_sdsoff,smb_offset(outdata,cli->outbuf)); /* dsoff */
133 SSVAL(cli->outbuf,smb_sdsdisp,tot_data); /* dsdisp */
134 if (trans==SMBtrans2)
135 SSVALS(cli->outbuf,smb_sfid,fid); /* fid */
136 if (this_lparam) /* param[] */
137 memcpy(outparam,param,this_lparam);
138 if (this_ldata) /* data[] */
139 memcpy(outdata,data,this_ldata);
140 set_message(cli->outbuf,trans==SMBtrans?8:9, /* wcnt, bcc */
141 PTR_DIFF(outdata+this_ldata,smb_buf(cli->outbuf)),False);
143 show_msg(cli->outbuf);
144 send_smb(cli->fd,cli->outbuf);
146 tot_data += this_ldata;
147 tot_param += this_lparam;
151 return(True);
155 /****************************************************************************
156 receive a SMB trans or trans2 response allocating the necessary memory
157 ****************************************************************************/
158 static BOOL cli_receive_trans(struct cli_state *cli,
159 int trans,int *data_len,
160 int *param_len, char **data,char **param)
162 int total_data=0;
163 int total_param=0;
164 int this_data,this_param;
166 *data_len = *param_len = 0;
168 if (!receive_smb(cli->fd,cli->inbuf,cli->timeout))
169 return False;
171 show_msg(cli->inbuf);
173 /* sanity check */
174 if (CVAL(cli->inbuf,smb_com) != trans) {
175 DEBUG(0,("Expected %s response, got command 0x%02x\n",
176 trans==SMBtrans?"SMBtrans":"SMBtrans2",
177 CVAL(cli->inbuf,smb_com)));
178 return(False);
180 if (CVAL(cli->inbuf,smb_rcls) != 0)
181 return(False);
183 /* parse out the lengths */
184 total_data = SVAL(cli->inbuf,smb_tdrcnt);
185 total_param = SVAL(cli->inbuf,smb_tprcnt);
187 /* allocate it */
188 *data = Realloc(*data,total_data);
189 *param = Realloc(*param,total_param);
191 while (1) {
192 this_data = SVAL(cli->inbuf,smb_drcnt);
193 this_param = SVAL(cli->inbuf,smb_prcnt);
195 if (this_data + *data_len > total_data ||
196 this_param + *param_len > total_param) {
197 DEBUG(1,("Data overflow in cli_receive_trans\n"));
198 return False;
201 if (this_data)
202 memcpy(*data + SVAL(cli->inbuf,smb_drdisp),
203 smb_base(cli->inbuf) + SVAL(cli->inbuf,smb_droff),
204 this_data);
205 if (this_param)
206 memcpy(*param + SVAL(cli->inbuf,smb_prdisp),
207 smb_base(cli->inbuf) + SVAL(cli->inbuf,smb_proff),
208 this_param);
209 *data_len += this_data;
210 *param_len += this_param;
212 /* parse out the total lengths again - they can shrink! */
213 total_data = SVAL(cli->inbuf,smb_tdrcnt);
214 total_param = SVAL(cli->inbuf,smb_tprcnt);
216 if (total_data <= *data_len && total_param <= *param_len)
217 break;
219 if (!receive_smb(cli->fd,cli->inbuf,cli->timeout))
220 return False;
222 show_msg(cli->inbuf);
224 /* sanity check */
225 if (CVAL(cli->inbuf,smb_com) != trans) {
226 DEBUG(0,("Expected %s response, got command 0x%02x\n",
227 trans==SMBtrans?"SMBtrans":"SMBtrans2",
228 CVAL(cli->inbuf,smb_com)));
229 return(False);
231 if (CVAL(cli->inbuf,smb_rcls) != 0)
232 return(False);
235 return(True);
239 /****************************************************************************
240 call a remote api
241 ****************************************************************************/
242 static BOOL cli_api(struct cli_state *cli,
243 int prcnt,int drcnt,int mprcnt,int mdrcnt,int *rprcnt,
244 int *rdrcnt, char *param,char *data,
245 char **rparam, char **rdata)
247 cli_send_trans(cli,SMBtrans,PIPE_LANMAN,0,0,
248 data,param,NULL,
249 drcnt,prcnt,0,
250 mdrcnt,mprcnt,0);
252 return (cli_receive_trans(cli,SMBtrans,
253 rdrcnt,rprcnt,
254 rdata,rparam));
258 /****************************************************************************
259 perform a NetWkstaUserLogon
260 ****************************************************************************/
261 BOOL cli_NetWkstaUserLogon(struct cli_state *cli,char *user, char *workstation)
263 char *rparam = NULL;
264 char *rdata = NULL;
265 char *p;
266 int rdrcnt,rprcnt;
267 pstring param;
269 memset(param, 0, sizeof(param));
271 /* send a SMBtrans command with api NetWkstaUserLogon */
272 p = param;
273 SSVAL(p,0,132); /* api number */
274 p += 2;
275 strcpy(p,"OOWb54WrLh");
276 p = skip_string(p,1);
277 strcpy(p,"WB21BWDWWDDDDDDDzzzD");
278 p = skip_string(p,1);
279 SSVAL(p,0,1);
280 p += 2;
281 strcpy(p,user);
282 strupper(p);
283 p += 21; p++; p += 15; p++;
284 strcpy(p, workstation);
285 strupper(p);
286 p += 16;
287 SSVAL(p, 0, BUFFER_SIZE);
288 p += 2;
289 SSVAL(p, 0, BUFFER_SIZE);
290 p += 2;
292 cli->error = -1;
294 if (cli_api(cli, PTR_DIFF(p,param),0,
295 1024,BUFFER_SIZE,
296 &rprcnt,&rdrcnt,
297 param,NULL,
298 &rparam,&rdata)) {
299 cli->error = SVAL(rparam,0);
300 p = rdata;
302 if (cli->error == 0) {
303 DEBUG(4,("NetWkstaUserLogon success\n"));
304 cli->privilages = SVAL(p, 24);
305 fstrcpy(cli->eff_name,p+2);
306 } else {
307 DEBUG(1,("NetwkstaUserLogon gave error %d\n", cli->error));
311 if (rparam) free(rparam);
312 if (rdata) free(rdata);
313 return cli->error == 0;
317 /****************************************************************************
318 call a NetServerEnum for the specified workgroup and servertype mask.
319 This function then calls the specified callback function for each name returned.
321 The callback function takes 3 arguments: the machine name, the server type and
322 the comment.
323 ****************************************************************************/
324 BOOL cli_NetServerEnum(struct cli_state *cli, char *workgroup, uint32 stype,
325 void (*fn)(char *, uint32, char *))
327 char *rparam = NULL;
328 char *rdata = NULL;
329 int rdrcnt,rprcnt;
330 char *p;
331 pstring param;
332 int uLevel = 1;
333 int count = -1;
335 /* send a SMBtrans command with api NetServerEnum */
336 p = param;
337 SSVAL(p,0,0x68); /* api number */
338 p += 2;
339 strcpy(p,"WrLehDz");
340 p = skip_string(p,1);
342 strcpy(p,"B16BBDz");
344 p = skip_string(p,1);
345 SSVAL(p,0,uLevel);
346 SSVAL(p,2,BUFFER_SIZE);
347 p += 4;
348 SIVAL(p,0,stype);
349 p += 4;
351 pstrcpy(p, workgroup);
352 p = skip_string(p,1);
354 if (cli_api(cli,
355 PTR_DIFF(p,param), /* param count */
356 0, /*data count */
357 8, /* mprcount */
358 BUFFER_SIZE, /* mdrcount */
359 &rprcnt,&rdrcnt,
360 param, NULL,
361 &rparam,&rdata)) {
362 int res = SVAL(rparam,0);
363 int converter=SVAL(rparam,2);
364 int i;
366 if (res == 0) {
367 count=SVAL(rparam,4);
368 p = rdata;
370 for (i = 0;i < count;i++, p += 26) {
371 char *sname = p;
372 int comment_offset = (IVAL(p,22) & 0xFFFF)-converter;
373 char *cmnt = comment_offset?(rdata+comment_offset):"";
374 if (comment_offset < 0 || comment_offset > rdrcnt) continue;
376 stype = IVAL(p,18) & ~SV_TYPE_LOCAL_LIST_ONLY;
378 fn(sname, stype, cmnt);
383 if (rparam) free(rparam);
384 if (rdata) free(rdata);
386 return(count > 0);
392 static struct {
393 int prot;
394 char *name;
396 prots[] =
398 {PROTOCOL_CORE,"PC NETWORK PROGRAM 1.0"},
399 {PROTOCOL_COREPLUS,"MICROSOFT NETWORKS 1.03"},
400 {PROTOCOL_LANMAN1,"MICROSOFT NETWORKS 3.0"},
401 {PROTOCOL_LANMAN1,"LANMAN1.0"},
402 {PROTOCOL_LANMAN2,"LM1.2X002"},
403 {PROTOCOL_LANMAN2,"Samba"},
404 {PROTOCOL_NT1,"NT LM 0.12"},
405 {PROTOCOL_NT1,"NT LANMAN 1.0"},
406 {-1,NULL}
410 /****************************************************************************
411 send a session setup
412 ****************************************************************************/
413 BOOL cli_session_setup(struct cli_state *cli,
414 char *user,
415 char *pass, int passlen,
416 char *ntpass, int ntpasslen,
417 char *workgroup)
419 char *p;
420 fstring pword;
422 if (cli->protocol < PROTOCOL_LANMAN1)
423 return True;
425 if (passlen > sizeof(pword)-1) {
426 return False;
429 if ((cli->sec_mode & 2) && *pass && passlen != 24) {
430 passlen = 24;
431 SMBencrypt((uchar *)pass,(uchar *)cli->cryptkey,(uchar *)pword);
432 } else {
433 memcpy(pword, pass, passlen);
436 /* if in share level security then don't send a password now */
437 if (!(cli->sec_mode & 1)) {fstrcpy(pword, "");passlen=1;}
439 /* send a session setup command */
440 bzero(cli->outbuf,smb_size);
442 if (cli->protocol < PROTOCOL_NT1) {
443 set_message(cli->outbuf,10,1 + strlen(user) + passlen,True);
444 CVAL(cli->outbuf,smb_com) = SMBsesssetupX;
445 cli_setup_packet(cli);
447 CVAL(cli->outbuf,smb_vwv0) = 0xFF;
448 SSVAL(cli->outbuf,smb_vwv2,cli->max_xmit);
449 SSVAL(cli->outbuf,smb_vwv3,2);
450 SSVAL(cli->outbuf,smb_vwv4,1);
451 SIVAL(cli->outbuf,smb_vwv5,cli->sesskey);
452 SSVAL(cli->outbuf,smb_vwv7,passlen);
453 p = smb_buf(cli->outbuf);
454 memcpy(p,pword,passlen);
455 p += passlen;
456 strcpy(p,user);
457 strupper(p);
458 } else {
459 set_message(cli->outbuf,13,0,True);
460 CVAL(cli->outbuf,smb_com) = SMBsesssetupX;
461 cli_setup_packet(cli);
463 CVAL(cli->outbuf,smb_vwv0) = 0xFF;
464 SSVAL(cli->outbuf,smb_vwv2,BUFFER_SIZE);
465 SSVAL(cli->outbuf,smb_vwv3,2);
466 SSVAL(cli->outbuf,smb_vwv4,cli->pid);
467 SIVAL(cli->outbuf,smb_vwv5,cli->sesskey);
468 SSVAL(cli->outbuf,smb_vwv7,passlen);
469 SSVAL(cli->outbuf,smb_vwv8,ntpasslen);
470 p = smb_buf(cli->outbuf);
471 memcpy(p,pword,passlen);
472 p += SVAL(cli->outbuf,smb_vwv7);
473 memcpy(p,ntpass,ntpasslen);
474 p += SVAL(cli->outbuf,smb_vwv8);
475 strcpy(p,user);
476 strupper(p);
477 p = skip_string(p,1);
478 strcpy(p,workgroup);
479 strupper(p);
480 p = skip_string(p,1);
481 strcpy(p,"Unix");p = skip_string(p,1);
482 strcpy(p,"Samba");p = skip_string(p,1);
483 set_message(cli->outbuf,13,PTR_DIFF(p,smb_buf(cli->outbuf)),False);
486 send_smb(cli->fd,cli->outbuf);
487 if (!receive_smb(cli->fd,cli->inbuf,cli->timeout))
488 return False;
490 show_msg(cli->inbuf);
492 if (CVAL(cli->inbuf,smb_rcls) != 0) {
493 return False;
496 /* use the returned uid from now on */
497 cli->uid = SVAL(cli->inbuf,smb_uid);
499 return True;
503 /****************************************************************************
504 send a tconX
505 ****************************************************************************/
506 BOOL cli_send_tconX(struct cli_state *cli,
507 char *share, char *dev, char *pass, int passlen)
509 fstring fullshare, pword;
510 char *p;
511 bzero(cli->outbuf,smb_size);
512 bzero(cli->inbuf,smb_size);
514 if (cli->sec_mode & 1) {
515 passlen = 1;
516 pass = "";
519 if ((cli->sec_mode & 2) && *pass && passlen != 24) {
520 passlen = 24;
521 SMBencrypt((uchar *)pass,(uchar *)cli->cryptkey,(uchar *)pword);
522 } else {
523 memcpy(pword, pass, passlen);
526 sprintf(fullshare, "\\\\%s\\%s", cli->desthost, share);
528 set_message(cli->outbuf,4,
529 2 + strlen(fullshare) + passlen + strlen(dev),True);
530 CVAL(cli->outbuf,smb_com) = SMBtconX;
531 cli_setup_packet(cli);
533 SSVAL(cli->outbuf,smb_vwv0,0xFF);
534 SSVAL(cli->outbuf,smb_vwv3,passlen);
536 p = smb_buf(cli->outbuf);
537 memcpy(p,pword,passlen);
538 p += passlen;
539 strcpy(p,fullshare);
540 p = skip_string(p,1);
541 strcpy(p,dev);
543 SCVAL(cli->inbuf,smb_rcls, 1);
545 send_smb(cli->fd,cli->outbuf);
546 if (!receive_smb(cli->fd,cli->inbuf,cli->timeout))
547 return False;
549 if (CVAL(cli->inbuf,smb_rcls) != 0) {
550 return False;
553 cli->cnum = SVAL(cli->inbuf,smb_tid);
554 return True;
558 /****************************************************************************
559 send a tree disconnect
560 ****************************************************************************/
561 BOOL cli_tdis(struct cli_state *cli)
563 bzero(cli->outbuf,smb_size);
564 set_message(cli->outbuf,0,0,True);
565 CVAL(cli->outbuf,smb_com) = SMBtdis;
566 SSVAL(cli->outbuf,smb_tid,cli->cnum);
567 cli_setup_packet(cli);
569 send_smb(cli->fd,cli->outbuf);
570 if (!receive_smb(cli->fd,cli->inbuf,cli->timeout))
571 return False;
573 return CVAL(cli->inbuf,smb_rcls) == 0;
576 /****************************************************************************
577 delete a file
578 ****************************************************************************/
579 BOOL cli_unlink(struct cli_state *cli, char *fname)
581 char *p;
583 bzero(cli->outbuf,smb_size);
584 bzero(cli->inbuf,smb_size);
586 set_message(cli->outbuf,1, 2 + strlen(fname),True);
588 CVAL(cli->outbuf,smb_com) = SMBunlink;
589 SSVAL(cli->outbuf,smb_tid,cli->cnum);
590 cli_setup_packet(cli);
592 SSVAL(cli->outbuf,smb_vwv0,aSYSTEM | aHIDDEN);
594 p = smb_buf(cli->outbuf);
595 *p++ = 4;
596 strcpy(p,fname);
597 p = skip_string(p,1);
599 send_smb(cli->fd,cli->outbuf);
600 if (!receive_smb(cli->fd,cli->inbuf,cli->timeout)) {
601 return False;
604 if (CVAL(cli->inbuf,smb_rcls) != 0) {
605 return False;
608 return True;
613 /****************************************************************************
614 open a file
615 ****************************************************************************/
616 int cli_open(struct cli_state *cli, char *fname, int flags, int share_mode)
618 char *p;
619 unsigned openfn=0;
620 unsigned accessmode=0;
622 if (flags & O_CREAT)
623 openfn |= (1<<4);
624 if (!(flags & O_EXCL)) {
625 if (flags & O_TRUNC)
626 openfn |= (1<<1);
627 else
628 openfn |= (1<<0);
631 accessmode = (share_mode<<4);
633 if ((flags & O_RDWR) == O_RDWR) {
634 accessmode |= 2;
635 } else if ((flags & O_WRONLY) == O_WRONLY) {
636 accessmode |= 1;
639 bzero(cli->outbuf,smb_size);
640 bzero(cli->inbuf,smb_size);
642 set_message(cli->outbuf,15,1 + strlen(fname),True);
644 CVAL(cli->outbuf,smb_com) = SMBopenX;
645 SSVAL(cli->outbuf,smb_tid,cli->cnum);
646 cli_setup_packet(cli);
648 SSVAL(cli->outbuf,smb_vwv0,0xFF);
649 SSVAL(cli->outbuf,smb_vwv2,0); /* no additional info */
650 SSVAL(cli->outbuf,smb_vwv3,accessmode);
651 SSVAL(cli->outbuf,smb_vwv4,aSYSTEM | aHIDDEN);
652 SSVAL(cli->outbuf,smb_vwv5,0);
653 SSVAL(cli->outbuf,smb_vwv8,openfn);
655 p = smb_buf(cli->outbuf);
656 strcpy(p,fname);
657 p = skip_string(p,1);
659 send_smb(cli->fd,cli->outbuf);
660 if (!receive_smb(cli->fd,cli->inbuf,cli->timeout)) {
661 return -1;
664 if (CVAL(cli->inbuf,smb_rcls) != 0) {
665 return -1;
668 return SVAL(cli->inbuf,smb_vwv2);
674 /****************************************************************************
675 close a file
676 ****************************************************************************/
677 BOOL cli_close(struct cli_state *cli, int fnum)
679 bzero(cli->outbuf,smb_size);
680 bzero(cli->inbuf,smb_size);
682 set_message(cli->outbuf,3,0,True);
684 CVAL(cli->outbuf,smb_com) = SMBclose;
685 SSVAL(cli->outbuf,smb_tid,cli->cnum);
686 cli_setup_packet(cli);
688 SSVAL(cli->outbuf,smb_vwv0,fnum);
689 SIVALS(cli->outbuf,smb_vwv1,-1);
691 send_smb(cli->fd,cli->outbuf);
692 if (!receive_smb(cli->fd,cli->inbuf,cli->timeout)) {
693 return False;
696 if (CVAL(cli->inbuf,smb_rcls) != 0) {
697 return False;
700 return True;
704 /****************************************************************************
705 lock a file
706 ****************************************************************************/
707 BOOL cli_lock(struct cli_state *cli, int fnum, uint32 offset, uint32 len, int timeout)
709 char *p;
711 bzero(cli->outbuf,smb_size);
712 bzero(cli->inbuf,smb_size);
714 set_message(cli->outbuf,8,10,True);
716 CVAL(cli->outbuf,smb_com) = SMBlockingX;
717 SSVAL(cli->outbuf,smb_tid,cli->cnum);
718 cli_setup_packet(cli);
720 CVAL(cli->outbuf,smb_vwv0) = 0xFF;
721 SSVAL(cli->outbuf,smb_vwv2,fnum);
722 CVAL(cli->outbuf,smb_vwv3) = 0;
723 SIVALS(cli->outbuf, smb_vwv4, timeout);
724 SSVAL(cli->outbuf,smb_vwv6,0);
725 SSVAL(cli->outbuf,smb_vwv7,1);
727 p = smb_buf(cli->outbuf);
728 SSVAL(p, 0, cli->pid);
729 SIVAL(p, 2, offset);
730 SIVAL(p, 6, len);
732 send_smb(cli->fd,cli->outbuf);
733 if (!receive_smb(cli->fd,cli->inbuf,cli->timeout)) {
734 return False;
737 if (CVAL(cli->inbuf,smb_rcls) != 0) {
738 return False;
741 return True;
744 /****************************************************************************
745 unlock a file
746 ****************************************************************************/
747 BOOL cli_unlock(struct cli_state *cli, int fnum, uint32 offset, uint32 len, int timeout)
749 char *p;
751 bzero(cli->outbuf,smb_size);
752 bzero(cli->inbuf,smb_size);
754 set_message(cli->outbuf,8,10,True);
756 CVAL(cli->outbuf,smb_com) = SMBlockingX;
757 SSVAL(cli->outbuf,smb_tid,cli->cnum);
758 cli_setup_packet(cli);
760 CVAL(cli->outbuf,smb_vwv0) = 0xFF;
761 SSVAL(cli->outbuf,smb_vwv2,fnum);
762 CVAL(cli->outbuf,smb_vwv3) = 0;
763 SIVALS(cli->outbuf, smb_vwv4, timeout);
764 SSVAL(cli->outbuf,smb_vwv6,1);
765 SSVAL(cli->outbuf,smb_vwv7,0);
767 p = smb_buf(cli->outbuf);
768 SSVAL(p, 0, cli->pid);
769 SIVAL(p, 2, offset);
770 SIVAL(p, 6, len);
772 send_smb(cli->fd,cli->outbuf);
773 if (!receive_smb(cli->fd,cli->inbuf,cli->timeout)) {
774 return False;
777 if (CVAL(cli->inbuf,smb_rcls) != 0) {
778 return False;
781 return True;
785 /****************************************************************************
786 read from a file
787 ****************************************************************************/
788 int cli_read(struct cli_state *cli, int fnum, char *buf, uint32 offset, uint16 size)
790 char *p;
792 bzero(cli->outbuf,smb_size);
793 bzero(cli->inbuf,smb_size);
795 set_message(cli->outbuf,10,0,True);
797 CVAL(cli->outbuf,smb_com) = SMBreadX;
798 SSVAL(cli->outbuf,smb_tid,cli->cnum);
799 cli_setup_packet(cli);
801 CVAL(cli->outbuf,smb_vwv0) = 0xFF;
802 SSVAL(cli->outbuf,smb_vwv2,fnum);
803 SIVAL(cli->outbuf,smb_vwv3,offset);
804 SSVAL(cli->outbuf,smb_vwv5,size);
805 SSVAL(cli->outbuf,smb_vwv6,size);
807 send_smb(cli->fd,cli->outbuf);
808 if (!receive_smb(cli->fd,cli->inbuf,cli->timeout)) {
809 return -1;
812 if (CVAL(cli->inbuf,smb_rcls) != 0) {
813 return -1;
816 size = SVAL(cli->inbuf, smb_vwv5);
817 p = smb_base(cli->inbuf) + SVAL(cli->inbuf,smb_vwv6);
819 memcpy(buf, p, size);
821 return size;
825 /****************************************************************************
826 write to a file
827 ****************************************************************************/
828 int cli_write(struct cli_state *cli, int fnum, char *buf, uint32 offset, uint16 size)
830 char *p;
832 bzero(cli->outbuf,smb_size);
833 bzero(cli->inbuf,smb_size);
835 set_message(cli->outbuf,12,size,True);
837 CVAL(cli->outbuf,smb_com) = SMBwriteX;
838 SSVAL(cli->outbuf,smb_tid,cli->cnum);
839 cli_setup_packet(cli);
841 CVAL(cli->outbuf,smb_vwv0) = 0xFF;
842 SSVAL(cli->outbuf,smb_vwv2,fnum);
843 SIVAL(cli->outbuf,smb_vwv3,offset);
845 SSVAL(cli->outbuf,smb_vwv10,size);
846 SSVAL(cli->outbuf,smb_vwv11,smb_buf(cli->outbuf) - smb_base(cli->outbuf));
848 p = smb_base(cli->outbuf) + SVAL(cli->outbuf,smb_vwv11);
849 memcpy(p, buf, size);
851 send_smb(cli->fd,cli->outbuf);
852 if (!receive_smb(cli->fd,cli->inbuf,cli->timeout)) {
853 return -1;
856 if (CVAL(cli->inbuf,smb_rcls) != 0) {
857 return -1;
860 return SVAL(cli->inbuf, smb_vwv2);
864 /****************************************************************************
865 do a SMBgetatr call
866 ****************************************************************************/
867 BOOL cli_getatr(struct cli_state *cli, char *fname,
868 int *attr, uint32 *size, time_t *t)
870 char *p;
872 bzero(cli->outbuf,smb_size);
873 bzero(cli->inbuf,smb_size);
875 set_message(cli->outbuf,0,strlen(fname)+2,True);
877 CVAL(cli->outbuf,smb_com) = SMBgetatr;
878 SSVAL(cli->outbuf,smb_tid,cli->cnum);
879 cli_setup_packet(cli);
881 p = smb_buf(cli->outbuf);
882 *p = 4;
883 strcpy(p+1, fname);
885 send_smb(cli->fd,cli->outbuf);
886 if (!receive_smb(cli->fd,cli->inbuf,cli->timeout)) {
887 return False;
890 if (CVAL(cli->inbuf,smb_rcls) != 0) {
891 return False;
894 if (size) {
895 *size = IVAL(cli->inbuf, smb_vwv3);
898 if (t) {
899 *t = make_unix_date3(cli->inbuf+smb_vwv1);
902 if (attr) {
903 *attr = SVAL(cli->inbuf,smb_vwv0);
907 return True;
911 /****************************************************************************
912 do a SMBsetatr call
913 ****************************************************************************/
914 BOOL cli_setatr(struct cli_state *cli, char *fname, int attr, time_t t)
916 char *p;
918 bzero(cli->outbuf,smb_size);
919 bzero(cli->inbuf,smb_size);
921 set_message(cli->outbuf,8,strlen(fname)+2,True);
923 CVAL(cli->outbuf,smb_com) = SMBsetatr;
924 SSVAL(cli->outbuf,smb_tid,cli->cnum);
925 cli_setup_packet(cli);
927 SSVAL(cli->outbuf,smb_vwv0, attr);
928 put_dos_date3(cli->outbuf,smb_vwv1, t);
930 p = smb_buf(cli->outbuf);
931 *p = 4;
932 strcpy(p+1, fname);
934 send_smb(cli->fd,cli->outbuf);
935 if (!receive_smb(cli->fd,cli->inbuf,cli->timeout)) {
936 return False;
939 if (CVAL(cli->inbuf,smb_rcls) != 0) {
940 return False;
943 return True;
946 /****************************************************************************
947 send a qpathinfo call
948 ****************************************************************************/
949 BOOL cli_qpathinfo(struct cli_state *cli, char *fname,
950 time_t *c_time, time_t *a_time, time_t *m_time, uint32 *size)
952 int data_len = 0;
953 int param_len = 0;
954 uint16 setup = TRANSACT2_QPATHINFO;
955 pstring param;
956 char *rparam=NULL, *rdata=NULL;
958 param_len = strlen(fname) + 7;
960 memset(param, 0, param_len);
961 SSVAL(param, 0, SMB_INFO_STANDARD);
962 pstrcpy(&param[6], fname);
964 if (!cli_send_trans(cli, SMBtrans2, NULL, -1, 0,
965 NULL, param, &setup,
966 data_len, param_len, 1,
967 cli->max_xmit, 10, 0)) {
968 return False;
971 if (!cli_receive_trans(cli, SMBtrans2, &data_len, &param_len,
972 &rdata, &rparam)) {
973 return False;
976 if (!rdata || data_len < 22) {
977 return False;
980 if (c_time) {
981 *c_time = make_unix_date2(rdata+0);
983 if (a_time) {
984 *a_time = make_unix_date2(rdata+4);
986 if (m_time) {
987 *m_time = make_unix_date2(rdata+8);
989 if (size) {
990 *size = IVAL(rdata, 12);
993 if (rdata) free(rdata);
994 if (rparam) free(rparam);
995 return True;
999 /****************************************************************************
1000 send a qfileinfo call
1001 ****************************************************************************/
1002 BOOL cli_qfileinfo(struct cli_state *cli, int fnum,
1003 time_t *c_time, time_t *a_time, time_t *m_time, uint32 *size)
1005 int data_len = 0;
1006 int param_len = 0;
1007 uint16 setup = TRANSACT2_QFILEINFO;
1008 pstring param;
1009 char *rparam=NULL, *rdata=NULL;
1011 param_len = 4;
1013 memset(param, 0, param_len);
1014 SSVAL(param, 0, fnum);
1015 SSVAL(param, 2, SMB_INFO_STANDARD);
1017 if (!cli_send_trans(cli, SMBtrans2, NULL, -1, 0,
1018 NULL, param, &setup,
1019 data_len, param_len, 1,
1020 cli->max_xmit, 2, 0)) {
1021 return False;
1024 if (!cli_receive_trans(cli, SMBtrans2, &data_len, &param_len,
1025 &rdata, &rparam)) {
1026 return False;
1029 if (!rdata || data_len < 22) {
1030 return False;
1033 if (c_time) {
1034 *c_time = make_unix_date2(rdata+0);
1036 if (a_time) {
1037 *a_time = make_unix_date2(rdata+4);
1039 if (m_time) {
1040 *m_time = make_unix_date2(rdata+8);
1042 if (size) {
1043 *size = IVAL(rdata, 12);
1046 if (rdata) free(rdata);
1047 if (rparam) free(rparam);
1048 return True;
1052 /****************************************************************************
1053 send a negprot command
1054 ****************************************************************************/
1055 BOOL cli_negprot(struct cli_state *cli)
1057 char *p;
1058 int numprots;
1059 int plength;
1061 bzero(cli->outbuf,smb_size);
1063 /* setup the protocol strings */
1064 for (plength=0,numprots=0;
1065 prots[numprots].name && prots[numprots].prot<=cli->protocol;
1066 numprots++)
1067 plength += strlen(prots[numprots].name)+2;
1069 set_message(cli->outbuf,0,plength,True);
1071 p = smb_buf(cli->outbuf);
1072 for (numprots=0;
1073 prots[numprots].name && prots[numprots].prot<=cli->protocol;
1074 numprots++) {
1075 *p++ = 2;
1076 strcpy(p,prots[numprots].name);
1077 p += strlen(p) + 1;
1080 CVAL(cli->outbuf,smb_com) = SMBnegprot;
1081 cli_setup_packet(cli);
1083 CVAL(smb_buf(cli->outbuf),0) = 2;
1085 send_smb(cli->fd,cli->outbuf);
1086 if (!receive_smb(cli->fd,cli->inbuf,cli->timeout))
1087 return False;
1089 show_msg(cli->inbuf);
1091 if (CVAL(cli->inbuf,smb_rcls) != 0 ||
1092 ((int)SVAL(cli->inbuf,smb_vwv0) >= numprots)) {
1093 return(False);
1096 cli->protocol = prots[SVAL(cli->inbuf,smb_vwv0)].prot;
1099 if (cli->protocol >= PROTOCOL_NT1) {
1100 /* NT protocol */
1101 cli->sec_mode = CVAL(cli->inbuf,smb_vwv1);
1102 cli->max_xmit = IVAL(cli->inbuf,smb_vwv3+1);
1103 cli->sesskey = IVAL(cli->inbuf,smb_vwv7+1);
1104 cli->serverzone = SVALS(cli->inbuf,smb_vwv15+1)*60;
1105 /* this time arrives in real GMT */
1106 cli->servertime = interpret_long_date(cli->inbuf+smb_vwv11+1);
1107 memcpy(cli->cryptkey,smb_buf(cli->inbuf),8);
1108 if (IVAL(cli->inbuf,smb_vwv9+1) & 1)
1109 cli->readbraw_supported =
1110 cli->writebraw_supported = True;
1111 } else if (cli->protocol >= PROTOCOL_LANMAN1) {
1112 cli->sec_mode = SVAL(cli->inbuf,smb_vwv1);
1113 cli->max_xmit = SVAL(cli->inbuf,smb_vwv2);
1114 cli->sesskey = IVAL(cli->inbuf,smb_vwv6);
1115 cli->serverzone = SVALS(cli->inbuf,smb_vwv10)*60;
1116 /* this time is converted to GMT by make_unix_date */
1117 cli->servertime = make_unix_date(cli->inbuf+smb_vwv8);
1118 cli->readbraw_supported = ((SVAL(cli->inbuf,smb_vwv5) & 0x1) != 0);
1119 cli->writebraw_supported = ((SVAL(cli->inbuf,smb_vwv5) & 0x2) != 0);
1120 memcpy(cli->cryptkey,smb_buf(cli->inbuf),8);
1121 } else {
1122 /* the old core protocol */
1123 cli->sec_mode = 0;
1124 cli->serverzone = TimeDiff(time(NULL));
1127 return True;
1131 /****************************************************************************
1132 send a session request
1133 ****************************************************************************/
1134 BOOL cli_session_request(struct cli_state *cli, char *host, int name_type,
1135 char *myname)
1137 fstring dest;
1138 char *p;
1139 int len = 4;
1140 /* send a session request (RFC 1002) */
1142 fstrcpy(dest,host);
1144 p = strchr(dest,'.');
1145 if (p) *p = 0;
1147 fstrcpy(cli->desthost, dest);
1149 /* put in the destination name */
1150 p = cli->outbuf+len;
1151 name_mangle(dest,p,name_type);
1152 len += name_len(p);
1154 /* and my name */
1155 p = cli->outbuf+len;
1156 name_mangle(myname,p,0);
1157 len += name_len(p);
1159 /* setup the packet length */
1160 _smb_setlen(cli->outbuf,len);
1161 CVAL(cli->outbuf,0) = 0x81;
1163 send_smb(cli->fd,cli->outbuf);
1164 DEBUG(5,("Sent session request\n"));
1166 if (!receive_smb(cli->fd,cli->inbuf,cli->timeout))
1167 return False;
1169 if (CVAL(cli->inbuf,0) != 0x82) {
1170 cli->error = CVAL(cli->inbuf,0);
1171 return False;
1173 return(True);
1177 /****************************************************************************
1178 open the client sockets
1179 ****************************************************************************/
1180 BOOL cli_connect(struct cli_state *cli, char *host, struct in_addr *ip)
1182 struct in_addr dest_ip;
1184 fstrcpy(cli->desthost, host);
1186 if (!ip) {
1187 struct hostent *hp;
1189 if ((hp = Get_Hostbyname(cli->desthost)) == 0) {
1190 return False;
1193 putip((char *)&dest_ip,(char *)hp->h_addr);
1194 } else {
1195 dest_ip = *ip;
1199 cli->fd = open_socket_out(SOCK_STREAM, &dest_ip, 139, cli->timeout);
1200 if (cli->fd == -1)
1201 return False;
1203 return True;
1207 /****************************************************************************
1208 initialise a client structure
1209 ****************************************************************************/
1210 BOOL cli_initialise(struct cli_state *cli)
1212 if (cli->initialised) cli_shutdown(cli);
1214 memset(cli, 0, sizeof(*cli));
1215 cli->fd = -1;
1216 cli->cnum = -1;
1217 cli->pid = getpid();
1218 cli->mid = 1;
1219 cli->uid = getuid();
1220 cli->protocol = PROTOCOL_NT1;
1221 cli->timeout = 20000;
1222 cli->bufsize = 0x10000;
1223 cli->max_xmit = cli->bufsize - 4;
1224 cli->outbuf = (char *)malloc(cli->bufsize);
1225 cli->inbuf = (char *)malloc(cli->bufsize);
1226 if (!cli->outbuf || !cli->inbuf) return False;
1227 cli->initialised = 1;
1228 return True;
1231 /****************************************************************************
1232 shutdown a client structure
1233 ****************************************************************************/
1234 void cli_shutdown(struct cli_state *cli)
1236 if (cli->outbuf) free(cli->outbuf);
1237 if (cli->inbuf) free(cli->inbuf);
1238 if (cli->fd != -1) close(cli->fd);
1239 memset(cli, 0, sizeof(*cli));
1242 /****************************************************************************
1243 return a description of the error
1244 ****************************************************************************/
1245 char *cli_errstr(struct cli_state *cli)
1247 return smb_errstr(cli->inbuf);
1250 /****************************************************************************
1251 return error codes for the last packet
1252 ****************************************************************************/
1253 void cli_error(struct cli_state *cli, int *eclass, int *num)
1255 *eclass = CVAL(cli->inbuf,smb_rcls);
1256 *num = SVAL(cli->inbuf,smb_err);
1259 /****************************************************************************
1260 set socket options on a open connection
1261 ****************************************************************************/
1262 void cli_sockopt(struct cli_state *cli, char *options)
1264 set_socket_options(cli->fd, options);
1267 /****************************************************************************
1268 set the PID to use for smb messages. Return the old pid.
1269 ****************************************************************************/
1270 int cli_setpid(struct cli_state *cli, int pid)
1272 int ret = cli->pid;
1273 cli->pid = pid;
1274 return ret;