Add an entry for the "check" command to the tdbtool manpage.
[Samba/gebeck_regimport.git] / source3 / libsmb / clifile.c
blob733abb6510ce6f2523005440b5c236ba3b51fc83
1 /*
2 Unix SMB/CIFS implementation.
3 client file operations
4 Copyright (C) Andrew Tridgell 1994-1998
5 Copyright (C) Jeremy Allison 2001-2002
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>.
21 #include "includes.h"
23 /****************************************************************************
24 Hard/Symlink a file (UNIX extensions).
25 Creates new name (sym)linked to oldname.
26 ****************************************************************************/
28 static bool cli_link_internal(struct cli_state *cli, const char *oldname, const char *newname, bool hard_link)
30 unsigned int data_len = 0;
31 unsigned int param_len = 0;
32 uint16 setup = TRANSACT2_SETPATHINFO;
33 char *param;
34 char *data;
35 char *rparam=NULL, *rdata=NULL;
36 char *p;
37 size_t oldlen = 2*(strlen(oldname)+1);
38 size_t newlen = 2*(strlen(newname)+1);
40 param = SMB_MALLOC_ARRAY(char, 6+newlen+2);
42 if (!param) {
43 return false;
46 data = SMB_MALLOC_ARRAY(char, oldlen+2);
48 if (!data) {
49 SAFE_FREE(param);
50 return false;
53 SSVAL(param,0,hard_link ? SMB_SET_FILE_UNIX_HLINK : SMB_SET_FILE_UNIX_LINK);
54 SIVAL(param,2,0);
55 p = &param[6];
57 p += clistr_push(cli, p, newname, newlen, STR_TERMINATE);
58 param_len = PTR_DIFF(p, param);
60 p = data;
61 p += clistr_push(cli, p, oldname, oldlen, STR_TERMINATE);
62 data_len = PTR_DIFF(p, data);
64 if (!cli_send_trans(cli, SMBtrans2,
65 NULL, /* name */
66 -1, 0, /* fid, flags */
67 &setup, 1, 0, /* setup, length, max */
68 param, param_len, 2, /* param, length, max */
69 data, data_len, cli->max_xmit /* data, length, max */
70 )) {
71 SAFE_FREE(data);
72 SAFE_FREE(param);
73 return false;
76 SAFE_FREE(data);
77 SAFE_FREE(param);
79 if (!cli_receive_trans(cli, SMBtrans2,
80 &rparam, &param_len,
81 &rdata, &data_len)) {
82 return false;
85 SAFE_FREE(data);
86 SAFE_FREE(param);
87 SAFE_FREE(rdata);
88 SAFE_FREE(rparam);
90 return true;
93 /****************************************************************************
94 Map standard UNIX permissions onto wire representations.
95 ****************************************************************************/
97 uint32 unix_perms_to_wire(mode_t perms)
99 unsigned int ret = 0;
101 ret |= ((perms & S_IXOTH) ? UNIX_X_OTH : 0);
102 ret |= ((perms & S_IWOTH) ? UNIX_W_OTH : 0);
103 ret |= ((perms & S_IROTH) ? UNIX_R_OTH : 0);
104 ret |= ((perms & S_IXGRP) ? UNIX_X_GRP : 0);
105 ret |= ((perms & S_IWGRP) ? UNIX_W_GRP : 0);
106 ret |= ((perms & S_IRGRP) ? UNIX_R_GRP : 0);
107 ret |= ((perms & S_IXUSR) ? UNIX_X_USR : 0);
108 ret |= ((perms & S_IWUSR) ? UNIX_W_USR : 0);
109 ret |= ((perms & S_IRUSR) ? UNIX_R_USR : 0);
110 #ifdef S_ISVTX
111 ret |= ((perms & S_ISVTX) ? UNIX_STICKY : 0);
112 #endif
113 #ifdef S_ISGID
114 ret |= ((perms & S_ISGID) ? UNIX_SET_GID : 0);
115 #endif
116 #ifdef S_ISUID
117 ret |= ((perms & S_ISUID) ? UNIX_SET_UID : 0);
118 #endif
119 return ret;
122 /****************************************************************************
123 Map wire permissions to standard UNIX.
124 ****************************************************************************/
126 mode_t wire_perms_to_unix(uint32 perms)
128 mode_t ret = (mode_t)0;
130 ret |= ((perms & UNIX_X_OTH) ? S_IXOTH : 0);
131 ret |= ((perms & UNIX_W_OTH) ? S_IWOTH : 0);
132 ret |= ((perms & UNIX_R_OTH) ? S_IROTH : 0);
133 ret |= ((perms & UNIX_X_GRP) ? S_IXGRP : 0);
134 ret |= ((perms & UNIX_W_GRP) ? S_IWGRP : 0);
135 ret |= ((perms & UNIX_R_GRP) ? S_IRGRP : 0);
136 ret |= ((perms & UNIX_X_USR) ? S_IXUSR : 0);
137 ret |= ((perms & UNIX_W_USR) ? S_IWUSR : 0);
138 ret |= ((perms & UNIX_R_USR) ? S_IRUSR : 0);
139 #ifdef S_ISVTX
140 ret |= ((perms & UNIX_STICKY) ? S_ISVTX : 0);
141 #endif
142 #ifdef S_ISGID
143 ret |= ((perms & UNIX_SET_GID) ? S_ISGID : 0);
144 #endif
145 #ifdef S_ISUID
146 ret |= ((perms & UNIX_SET_UID) ? S_ISUID : 0);
147 #endif
148 return ret;
151 /****************************************************************************
152 Return the file type from the wire filetype for UNIX extensions.
153 ****************************************************************************/
155 static mode_t unix_filetype_from_wire(uint32 wire_type)
157 switch (wire_type) {
158 case UNIX_TYPE_FILE:
159 return S_IFREG;
160 case UNIX_TYPE_DIR:
161 return S_IFDIR;
162 #ifdef S_IFLNK
163 case UNIX_TYPE_SYMLINK:
164 return S_IFLNK;
165 #endif
166 #ifdef S_IFCHR
167 case UNIX_TYPE_CHARDEV:
168 return S_IFCHR;
169 #endif
170 #ifdef S_IFBLK
171 case UNIX_TYPE_BLKDEV:
172 return S_IFBLK;
173 #endif
174 #ifdef S_IFIFO
175 case UNIX_TYPE_FIFO:
176 return S_IFIFO;
177 #endif
178 #ifdef S_IFSOCK
179 case UNIX_TYPE_SOCKET:
180 return S_IFSOCK;
181 #endif
182 default:
183 return (mode_t)0;
187 /****************************************************************************
188 Do a POSIX getfacl (UNIX extensions).
189 ****************************************************************************/
191 bool cli_unix_getfacl(struct cli_state *cli, const char *name, size_t *prb_size, char **retbuf)
193 unsigned int param_len = 0;
194 unsigned int data_len = 0;
195 uint16 setup = TRANSACT2_QPATHINFO;
196 char *param;
197 size_t nlen = 2*(strlen(name)+1);
198 char *rparam=NULL, *rdata=NULL;
199 char *p;
201 param = SMB_MALLOC_ARRAY(char, 6+nlen+2);
202 if (!param) {
203 return false;
206 p = param;
207 memset(p, '\0', 6);
208 SSVAL(p, 0, SMB_QUERY_POSIX_ACL);
209 p += 6;
210 p += clistr_push(cli, p, name, nlen, STR_TERMINATE);
211 param_len = PTR_DIFF(p, param);
213 if (!cli_send_trans(cli, SMBtrans2,
214 NULL, /* name */
215 -1, 0, /* fid, flags */
216 &setup, 1, 0, /* setup, length, max */
217 param, param_len, 2, /* param, length, max */
218 NULL, 0, cli->max_xmit /* data, length, max */
219 )) {
220 SAFE_FREE(param);
221 return false;
224 SAFE_FREE(param);
226 if (!cli_receive_trans(cli, SMBtrans2,
227 &rparam, &param_len,
228 &rdata, &data_len)) {
229 return false;
232 if (data_len < 6) {
233 SAFE_FREE(rdata);
234 SAFE_FREE(rparam);
235 return false;
238 SAFE_FREE(rparam);
239 *retbuf = rdata;
240 *prb_size = (size_t)data_len;
242 return true;
245 /****************************************************************************
246 Stat a file (UNIX extensions).
247 ****************************************************************************/
249 bool cli_unix_stat(struct cli_state *cli, const char *name, SMB_STRUCT_STAT *sbuf)
251 unsigned int param_len = 0;
252 unsigned int data_len = 0;
253 uint16 setup = TRANSACT2_QPATHINFO;
254 char *param;
255 size_t nlen = 2*(strlen(name)+1);
256 char *rparam=NULL, *rdata=NULL;
257 char *p;
259 ZERO_STRUCTP(sbuf);
261 param = SMB_MALLOC_ARRAY(char, 6+nlen+2);
262 if (!param) {
263 return false;
265 p = param;
266 memset(p, '\0', 6);
267 SSVAL(p, 0, SMB_QUERY_FILE_UNIX_BASIC);
268 p += 6;
269 p += clistr_push(cli, p, name, nlen, STR_TERMINATE);
270 param_len = PTR_DIFF(p, param);
272 if (!cli_send_trans(cli, SMBtrans2,
273 NULL, /* name */
274 -1, 0, /* fid, flags */
275 &setup, 1, 0, /* setup, length, max */
276 param, param_len, 2, /* param, length, max */
277 NULL, 0, cli->max_xmit /* data, length, max */
278 )) {
279 SAFE_FREE(param);
280 return false;
283 SAFE_FREE(param);
285 if (!cli_receive_trans(cli, SMBtrans2,
286 &rparam, &param_len,
287 &rdata, &data_len)) {
288 return false;
291 if (data_len < 96) {
292 SAFE_FREE(rdata);
293 SAFE_FREE(rparam);
294 return false;
297 sbuf->st_size = IVAL2_TO_SMB_BIG_UINT(rdata,0); /* total size, in bytes */
298 sbuf->st_blocks = IVAL2_TO_SMB_BIG_UINT(rdata,8); /* number of blocks allocated */
299 #if defined (HAVE_STAT_ST_BLOCKS) && defined(STAT_ST_BLOCKSIZE)
300 sbuf->st_blocks /= STAT_ST_BLOCKSIZE;
301 #else
302 /* assume 512 byte blocks */
303 sbuf->st_blocks /= 512;
304 #endif
305 set_ctimespec(sbuf, interpret_long_date(rdata + 16)); /* time of last change */
306 set_atimespec(sbuf, interpret_long_date(rdata + 24)); /* time of last access */
307 set_mtimespec(sbuf, interpret_long_date(rdata + 32)); /* time of last modification */
309 sbuf->st_uid = (uid_t) IVAL(rdata,40); /* user ID of owner */
310 sbuf->st_gid = (gid_t) IVAL(rdata,48); /* group ID of owner */
311 sbuf->st_mode |= unix_filetype_from_wire(IVAL(rdata, 56));
312 #if defined(HAVE_MAKEDEV)
314 uint32 dev_major = IVAL(rdata,60);
315 uint32 dev_minor = IVAL(rdata,68);
316 sbuf->st_rdev = makedev(dev_major, dev_minor);
318 #endif
319 sbuf->st_ino = (SMB_INO_T)IVAL2_TO_SMB_BIG_UINT(rdata,76); /* inode */
320 sbuf->st_mode |= wire_perms_to_unix(IVAL(rdata,84)); /* protection */
321 sbuf->st_nlink = IVAL(rdata,92); /* number of hard links */
323 SAFE_FREE(rdata);
324 SAFE_FREE(rparam);
326 return true;
329 /****************************************************************************
330 Symlink a file (UNIX extensions).
331 ****************************************************************************/
333 bool cli_unix_symlink(struct cli_state *cli, const char *oldname, const char *newname)
335 return cli_link_internal(cli, oldname, newname, False);
338 /****************************************************************************
339 Hard a file (UNIX extensions).
340 ****************************************************************************/
342 bool cli_unix_hardlink(struct cli_state *cli, const char *oldname, const char *newname)
344 return cli_link_internal(cli, oldname, newname, True);
347 /****************************************************************************
348 Chmod or chown a file internal (UNIX extensions).
349 ****************************************************************************/
351 static bool cli_unix_chmod_chown_internal(struct cli_state *cli, const char *fname, uint32 mode, uint32 uid, uint32 gid)
353 unsigned int data_len = 0;
354 unsigned int param_len = 0;
355 uint16 setup = TRANSACT2_SETPATHINFO;
356 size_t nlen = 2*(strlen(fname)+1);
357 char *param;
358 char data[100];
359 char *rparam=NULL, *rdata=NULL;
360 char *p;
362 param = SMB_MALLOC_ARRAY(char, 6+nlen+2);
363 if (!param) {
364 return false;
366 memset(param, '\0', 6);
367 memset(data, 0, sizeof(data));
369 SSVAL(param,0,SMB_SET_FILE_UNIX_BASIC);
370 p = &param[6];
372 p += clistr_push(cli, p, fname, nlen, STR_TERMINATE);
373 param_len = PTR_DIFF(p, param);
375 memset(data, 0xff, 40); /* Set all sizes/times to no change. */
377 SIVAL(data,40,uid);
378 SIVAL(data,48,gid);
379 SIVAL(data,84,mode);
381 data_len = 100;
383 if (!cli_send_trans(cli, SMBtrans2,
384 NULL, /* name */
385 -1, 0, /* fid, flags */
386 &setup, 1, 0, /* setup, length, max */
387 param, param_len, 2, /* param, length, max */
388 (char *)&data, data_len, cli->max_xmit /* data, length, max */
389 )) {
390 SAFE_FREE(param);
391 return False;
394 SAFE_FREE(param);
396 if (!cli_receive_trans(cli, SMBtrans2,
397 &rparam, &param_len,
398 &rdata, &data_len)) {
399 return false;
402 SAFE_FREE(rdata);
403 SAFE_FREE(rparam);
405 return true;
408 /****************************************************************************
409 chmod a file (UNIX extensions).
410 ****************************************************************************/
412 bool cli_unix_chmod(struct cli_state *cli, const char *fname, mode_t mode)
414 return cli_unix_chmod_chown_internal(cli, fname,
415 unix_perms_to_wire(mode), SMB_UID_NO_CHANGE, SMB_GID_NO_CHANGE);
418 /****************************************************************************
419 chown a file (UNIX extensions).
420 ****************************************************************************/
422 bool cli_unix_chown(struct cli_state *cli, const char *fname, uid_t uid, gid_t gid)
424 return cli_unix_chmod_chown_internal(cli, fname,
425 SMB_MODE_NO_CHANGE, (uint32)uid, (uint32)gid);
428 /****************************************************************************
429 Rename a file.
430 ****************************************************************************/
432 bool cli_rename(struct cli_state *cli, const char *fname_src, const char *fname_dst)
434 char *p;
436 memset(cli->outbuf,'\0',smb_size);
437 memset(cli->inbuf,'\0',smb_size);
439 cli_set_message(cli->outbuf,1, 0, true);
441 SCVAL(cli->outbuf,smb_com,SMBmv);
442 SSVAL(cli->outbuf,smb_tid,cli->cnum);
443 cli_setup_packet(cli);
445 SSVAL(cli->outbuf,smb_vwv0,aSYSTEM | aHIDDEN | aDIR);
447 p = smb_buf(cli->outbuf);
448 *p++ = 4;
449 p += clistr_push(cli, p, fname_src,
450 cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
451 *p++ = 4;
452 p += clistr_push(cli, p, fname_dst,
453 cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
455 cli_setup_bcc(cli, p);
457 cli_send_smb(cli);
458 if (!cli_receive_smb(cli)) {
459 return false;
462 if (cli_is_error(cli)) {
463 return false;
466 return true;
469 /****************************************************************************
470 NT Rename a file.
471 ****************************************************************************/
473 bool cli_ntrename(struct cli_state *cli, const char *fname_src, const char *fname_dst)
475 char *p;
477 memset(cli->outbuf,'\0',smb_size);
478 memset(cli->inbuf,'\0',smb_size);
480 cli_set_message(cli->outbuf, 4, 0, true);
482 SCVAL(cli->outbuf,smb_com,SMBntrename);
483 SSVAL(cli->outbuf,smb_tid,cli->cnum);
484 cli_setup_packet(cli);
486 SSVAL(cli->outbuf,smb_vwv0,aSYSTEM | aHIDDEN | aDIR);
487 SSVAL(cli->outbuf,smb_vwv1, RENAME_FLAG_RENAME);
489 p = smb_buf(cli->outbuf);
490 *p++ = 4;
491 p += clistr_push(cli, p, fname_src,
492 cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
493 *p++ = 4;
494 p += clistr_push(cli, p, fname_dst,
495 cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
497 cli_setup_bcc(cli, p);
499 cli_send_smb(cli);
500 if (!cli_receive_smb(cli)) {
501 return false;
504 if (cli_is_error(cli)) {
505 return false;
508 return true;
511 /****************************************************************************
512 NT hardlink a file.
513 ****************************************************************************/
515 bool cli_nt_hardlink(struct cli_state *cli, const char *fname_src, const char *fname_dst)
517 char *p;
519 memset(cli->outbuf,'\0',smb_size);
520 memset(cli->inbuf,'\0',smb_size);
522 cli_set_message(cli->outbuf, 4, 0, true);
524 SCVAL(cli->outbuf,smb_com,SMBntrename);
525 SSVAL(cli->outbuf,smb_tid,cli->cnum);
526 cli_setup_packet(cli);
528 SSVAL(cli->outbuf,smb_vwv0,aSYSTEM | aHIDDEN | aDIR);
529 SSVAL(cli->outbuf,smb_vwv1, RENAME_FLAG_HARD_LINK);
531 p = smb_buf(cli->outbuf);
532 *p++ = 4;
533 p += clistr_push(cli, p, fname_src,
534 cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
535 *p++ = 4;
536 p += clistr_push(cli, p, fname_dst,
537 cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
539 cli_setup_bcc(cli, p);
541 cli_send_smb(cli);
542 if (!cli_receive_smb(cli)) {
543 return false;
546 if (cli_is_error(cli)) {
547 return false;
550 return true;
553 /****************************************************************************
554 Delete a file.
555 ****************************************************************************/
557 bool cli_unlink_full(struct cli_state *cli, const char *fname, uint16 attrs)
559 char *p;
561 memset(cli->outbuf,'\0',smb_size);
562 memset(cli->inbuf,'\0',smb_size);
564 cli_set_message(cli->outbuf,1, 0, true);
566 SCVAL(cli->outbuf,smb_com,SMBunlink);
567 SSVAL(cli->outbuf,smb_tid,cli->cnum);
568 cli_setup_packet(cli);
570 SSVAL(cli->outbuf,smb_vwv0, attrs);
572 p = smb_buf(cli->outbuf);
573 *p++ = 4;
574 p += clistr_push(cli, p, fname,
575 cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
577 cli_setup_bcc(cli, p);
578 cli_send_smb(cli);
579 if (!cli_receive_smb(cli)) {
580 return false;
583 if (cli_is_error(cli)) {
584 return false;
587 return true;
590 /****************************************************************************
591 Delete a file.
592 ****************************************************************************/
594 bool cli_unlink(struct cli_state *cli, const char *fname)
596 return cli_unlink_full(cli, fname, aSYSTEM | aHIDDEN);
599 /****************************************************************************
600 Create a directory.
601 ****************************************************************************/
603 bool cli_mkdir(struct cli_state *cli, const char *dname)
605 char *p;
607 memset(cli->outbuf,'\0',smb_size);
608 memset(cli->inbuf,'\0',smb_size);
610 cli_set_message(cli->outbuf,0, 0, true);
612 SCVAL(cli->outbuf,smb_com,SMBmkdir);
613 SSVAL(cli->outbuf,smb_tid,cli->cnum);
614 cli_setup_packet(cli);
616 p = smb_buf(cli->outbuf);
617 *p++ = 4;
618 p += clistr_push(cli, p, dname,
619 cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
621 cli_setup_bcc(cli, p);
623 cli_send_smb(cli);
624 if (!cli_receive_smb(cli)) {
625 return False;
628 if (cli_is_error(cli)) {
629 return False;
632 return True;
635 /****************************************************************************
636 Remove a directory.
637 ****************************************************************************/
639 bool cli_rmdir(struct cli_state *cli, const char *dname)
641 char *p;
643 memset(cli->outbuf,'\0',smb_size);
644 memset(cli->inbuf,'\0',smb_size);
646 cli_set_message(cli->outbuf,0, 0, true);
648 SCVAL(cli->outbuf,smb_com,SMBrmdir);
649 SSVAL(cli->outbuf,smb_tid,cli->cnum);
650 cli_setup_packet(cli);
652 p = smb_buf(cli->outbuf);
653 *p++ = 4;
654 p += clistr_push(cli, p, dname,
655 cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
657 cli_setup_bcc(cli, p);
659 cli_send_smb(cli);
660 if (!cli_receive_smb(cli)) {
661 return false;
664 if (cli_is_error(cli)) {
665 return false;
668 return true;
671 /****************************************************************************
672 Set or clear the delete on close flag.
673 ****************************************************************************/
675 int cli_nt_delete_on_close(struct cli_state *cli, int fnum, bool flag)
677 unsigned int data_len = 1;
678 unsigned int param_len = 6;
679 uint16 setup = TRANSACT2_SETFILEINFO;
680 char param[6];
681 unsigned char data;
682 char *rparam=NULL, *rdata=NULL;
684 memset(param, 0, param_len);
685 SSVAL(param,0,fnum);
686 SSVAL(param,2,SMB_SET_FILE_DISPOSITION_INFO);
688 data = flag ? 1 : 0;
690 if (!cli_send_trans(cli, SMBtrans2,
691 NULL, /* name */
692 -1, 0, /* fid, flags */
693 &setup, 1, 0, /* setup, length, max */
694 param, param_len, 2, /* param, length, max */
695 (char *)&data, data_len, cli->max_xmit /* data, length, max */
696 )) {
697 return false;
700 if (!cli_receive_trans(cli, SMBtrans2,
701 &rparam, &param_len,
702 &rdata, &data_len)) {
703 return false;
706 SAFE_FREE(rdata);
707 SAFE_FREE(rparam);
709 return true;
712 /****************************************************************************
713 Open a file - exposing the full horror of the NT API :-).
714 Used in smbtorture.
715 ****************************************************************************/
717 int cli_nt_create_full(struct cli_state *cli, const char *fname,
718 uint32 CreatFlags, uint32 DesiredAccess,
719 uint32 FileAttributes, uint32 ShareAccess,
720 uint32 CreateDisposition, uint32 CreateOptions,
721 uint8 SecurityFlags)
723 char *p;
724 int len;
726 memset(cli->outbuf,'\0',smb_size);
727 memset(cli->inbuf,'\0',smb_size);
729 cli_set_message(cli->outbuf,24,0, true);
731 SCVAL(cli->outbuf,smb_com,SMBntcreateX);
732 SSVAL(cli->outbuf,smb_tid,cli->cnum);
733 cli_setup_packet(cli);
735 SSVAL(cli->outbuf,smb_vwv0,0xFF);
736 if (cli->use_oplocks)
737 CreatFlags |= (REQUEST_OPLOCK|REQUEST_BATCH_OPLOCK);
739 SIVAL(cli->outbuf,smb_ntcreate_Flags, CreatFlags);
740 SIVAL(cli->outbuf,smb_ntcreate_RootDirectoryFid, 0x0);
741 SIVAL(cli->outbuf,smb_ntcreate_DesiredAccess, DesiredAccess);
742 SIVAL(cli->outbuf,smb_ntcreate_FileAttributes, FileAttributes);
743 SIVAL(cli->outbuf,smb_ntcreate_ShareAccess, ShareAccess);
744 SIVAL(cli->outbuf,smb_ntcreate_CreateDisposition, CreateDisposition);
745 SIVAL(cli->outbuf,smb_ntcreate_CreateOptions, CreateOptions);
746 SIVAL(cli->outbuf,smb_ntcreate_ImpersonationLevel, 0x02);
747 SCVAL(cli->outbuf,smb_ntcreate_SecurityFlags, SecurityFlags);
749 p = smb_buf(cli->outbuf);
750 /* this alignment and termination is critical for netapp filers. Don't change */
751 p += clistr_align_out(cli, p, 0);
752 len = clistr_push(cli, p, fname,
753 cli->bufsize - PTR_DIFF(p,cli->outbuf), 0);
754 p += len;
755 SSVAL(cli->outbuf,smb_ntcreate_NameLength, len);
756 /* sigh. this copes with broken netapp filer behaviour */
757 p += clistr_push(cli, p, "",
758 cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
760 cli_setup_bcc(cli, p);
762 cli_send_smb(cli);
763 if (!cli_receive_smb(cli)) {
764 return -1;
767 if (cli_is_error(cli)) {
768 return -1;
771 return SVAL(cli->inbuf,smb_vwv2 + 1);
774 /****************************************************************************
775 Open a file.
776 ****************************************************************************/
778 int cli_nt_create(struct cli_state *cli, const char *fname, uint32 DesiredAccess)
780 return cli_nt_create_full(cli, fname, 0, DesiredAccess, 0,
781 FILE_SHARE_READ|FILE_SHARE_WRITE, FILE_OPEN, 0x0, 0x0);
784 uint8_t *smb_bytes_push_str(uint8_t *buf, bool ucs2, const char *str)
786 size_t buflen = talloc_get_size(buf);
787 char *converted;
788 size_t converted_size;
791 * We're pushing into an SMB buffer, align odd
793 if (ucs2 && (buflen % 2 == 0)) {
794 buf = TALLOC_REALLOC_ARRAY(NULL, buf, uint8_t, buflen + 1);
795 if (buf == NULL) {
796 return NULL;
798 buf[buflen] = '\0';
799 buflen += 1;
802 if (!convert_string_allocate(talloc_tos(), CH_UNIX,
803 ucs2 ? CH_UTF16LE : CH_DOS,
804 str, strlen(str)+1, &converted,
805 &converted_size, true)) {
806 return NULL;
809 buf = TALLOC_REALLOC_ARRAY(NULL, buf, uint8_t,
810 buflen + converted_size);
811 if (buf == NULL) {
812 return NULL;
815 memcpy(buf + buflen, converted, converted_size);
817 TALLOC_FREE(converted);
818 return buf;
821 /****************************************************************************
822 Open a file
823 WARNING: if you open with O_WRONLY then getattrE won't work!
824 ****************************************************************************/
826 struct async_req *cli_open_send(TALLOC_CTX *mem_ctx, struct event_context *ev,
827 struct cli_state *cli,
828 const char *fname, int flags, int share_mode)
830 unsigned openfn = 0;
831 unsigned accessmode = 0;
832 uint8_t additional_flags = 0;
833 uint8_t *bytes;
834 uint16_t vwv[15];
835 struct async_req *result;
837 if (flags & O_CREAT) {
838 openfn |= (1<<4);
840 if (!(flags & O_EXCL)) {
841 if (flags & O_TRUNC)
842 openfn |= (1<<1);
843 else
844 openfn |= (1<<0);
847 accessmode = (share_mode<<4);
849 if ((flags & O_ACCMODE) == O_RDWR) {
850 accessmode |= 2;
851 } else if ((flags & O_ACCMODE) == O_WRONLY) {
852 accessmode |= 1;
855 #if defined(O_SYNC)
856 if ((flags & O_SYNC) == O_SYNC) {
857 accessmode |= (1<<14);
859 #endif /* O_SYNC */
861 if (share_mode == DENY_FCB) {
862 accessmode = 0xFF;
865 SCVAL(vwv + 0, 0, 0xFF);
866 SCVAL(vwv + 0, 1, 0);
867 SSVAL(vwv + 1, 0, 0);
868 SSVAL(vwv + 2, 0, 0); /* no additional info */
869 SSVAL(vwv + 3, 0, accessmode);
870 SSVAL(vwv + 4, 0, aSYSTEM | aHIDDEN);
871 SSVAL(vwv + 5, 0, 0);
872 SIVAL(vwv + 6, 0, 0);
873 SSVAL(vwv + 8, 0, openfn);
874 SIVAL(vwv + 9, 0, 0);
875 SIVAL(vwv + 11, 0, 0);
876 SIVAL(vwv + 13, 0, 0);
878 if (cli->use_oplocks) {
879 /* if using oplocks then ask for a batch oplock via
880 core and extended methods */
881 additional_flags =
882 FLAG_REQUEST_OPLOCK|FLAG_REQUEST_BATCH_OPLOCK;
883 SSVAL(vwv+2, 0, SVAL(vwv+2, 0) | 6);
886 bytes = talloc_array(talloc_tos(), uint8_t, 0);
887 if (bytes == NULL) {
888 return NULL;
891 bytes = smb_bytes_push_str(
892 bytes, (cli->capabilities & CAP_UNICODE) != 0, fname);
893 if (bytes == NULL) {
894 return NULL;
897 result = cli_request_send(mem_ctx, ev, cli, SMBopenX, additional_flags,
898 15, vwv, talloc_get_size(bytes), bytes);
899 TALLOC_FREE(bytes);
900 return result;
903 NTSTATUS cli_open_recv(struct async_req *req, int *fnum)
905 uint8_t wct;
906 uint16_t *vwv;
907 uint16_t num_bytes;
908 uint8_t *bytes;
909 NTSTATUS status;
911 if (async_req_is_error(req, &status)) {
912 return status;
915 status = cli_pull_reply(req, &wct, &vwv, &num_bytes, &bytes);
916 if (!NT_STATUS_IS_OK(status)) {
917 return status;
920 if (wct < 3) {
921 return NT_STATUS_INVALID_NETWORK_RESPONSE;
924 *fnum = SVAL(vwv+2, 0);
926 return NT_STATUS_OK;
929 int cli_open(struct cli_state *cli, const char *fname, int flags,
930 int share_mode)
932 TALLOC_CTX *frame = talloc_stackframe();
933 struct event_context *ev;
934 struct async_req *req;
935 int result = -1;
937 if (cli->fd_event != NULL) {
939 * Can't use sync call while an async call is in flight
941 cli_set_error(cli, NT_STATUS_INVALID_PARAMETER);
942 goto fail;
945 ev = event_context_init(frame);
946 if (ev == NULL) {
947 goto fail;
950 req = cli_open_send(frame, ev, cli, fname, flags, share_mode);
951 if (req == NULL) {
952 goto fail;
955 while (req->state < ASYNC_REQ_DONE) {
956 event_loop_once(ev);
959 cli_open_recv(req, &result);
960 fail:
961 TALLOC_FREE(frame);
962 return result;
965 /****************************************************************************
966 Close a file.
967 ****************************************************************************/
969 struct async_req *cli_close_send(TALLOC_CTX *mem_ctx, struct event_context *ev,
970 struct cli_state *cli, int fnum)
972 uint16_t vwv[3];
974 SSVAL(vwv+0, 0, fnum);
975 SIVALS(vwv+1, 0, -1);
977 return cli_request_send(mem_ctx, ev, cli, SMBclose, 0, 3, vwv,
978 0, NULL);
981 NTSTATUS cli_close_recv(struct async_req *req)
983 uint8_t wct;
984 uint16_t *vwv;
985 uint16_t num_bytes;
986 uint8_t *bytes;
987 NTSTATUS status;
989 if (async_req_is_error(req, &status)) {
990 return status;
993 return cli_pull_reply(req, &wct, &vwv, &num_bytes, &bytes);
996 bool cli_close(struct cli_state *cli, int fnum)
998 TALLOC_CTX *frame = talloc_stackframe();
999 struct event_context *ev;
1000 struct async_req *req;
1001 bool result = false;
1003 if (cli->fd_event != NULL) {
1005 * Can't use sync call while an async call is in flight
1007 cli_set_error(cli, NT_STATUS_INVALID_PARAMETER);
1008 goto fail;
1011 ev = event_context_init(frame);
1012 if (ev == NULL) {
1013 goto fail;
1016 req = cli_close_send(frame, ev, cli, fnum);
1017 if (req == NULL) {
1018 goto fail;
1021 while (req->state < ASYNC_REQ_DONE) {
1022 event_loop_once(ev);
1025 result = NT_STATUS_IS_OK(cli_close_recv(req));
1026 fail:
1027 TALLOC_FREE(frame);
1028 return result;
1031 /****************************************************************************
1032 Truncate a file to a specified size
1033 ****************************************************************************/
1035 bool cli_ftruncate(struct cli_state *cli, int fnum, uint64_t size)
1037 unsigned int param_len = 6;
1038 unsigned int data_len = 8;
1039 uint16 setup = TRANSACT2_SETFILEINFO;
1040 char param[6];
1041 unsigned char data[8];
1042 char *rparam=NULL, *rdata=NULL;
1043 int saved_timeout = cli->timeout;
1045 SSVAL(param,0,fnum);
1046 SSVAL(param,2,SMB_SET_FILE_END_OF_FILE_INFO);
1047 SSVAL(param,4,0);
1049 SBVAL(data, 0, size);
1051 if (!cli_send_trans(cli, SMBtrans2,
1052 NULL, /* name */
1053 -1, 0, /* fid, flags */
1054 &setup, 1, 0, /* setup, length, max */
1055 param, param_len, 2, /* param, length, max */
1056 (char *)&data, data_len,/* data, length, ... */
1057 cli->max_xmit)) { /* ... max */
1058 cli->timeout = saved_timeout;
1059 return False;
1062 if (!cli_receive_trans(cli, SMBtrans2,
1063 &rparam, &param_len,
1064 &rdata, &data_len)) {
1065 cli->timeout = saved_timeout;
1066 SAFE_FREE(rdata);
1067 SAFE_FREE(rparam);
1068 return False;
1071 cli->timeout = saved_timeout;
1073 SAFE_FREE(rdata);
1074 SAFE_FREE(rparam);
1076 return True;
1080 /****************************************************************************
1081 send a lock with a specified locktype
1082 this is used for testing LOCKING_ANDX_CANCEL_LOCK
1083 ****************************************************************************/
1085 NTSTATUS cli_locktype(struct cli_state *cli, int fnum,
1086 uint32 offset, uint32 len,
1087 int timeout, unsigned char locktype)
1089 char *p;
1090 int saved_timeout = cli->timeout;
1092 memset(cli->outbuf,'\0',smb_size);
1093 memset(cli->inbuf,'\0', smb_size);
1095 cli_set_message(cli->outbuf,8,0,True);
1097 SCVAL(cli->outbuf,smb_com,SMBlockingX);
1098 SSVAL(cli->outbuf,smb_tid,cli->cnum);
1099 cli_setup_packet(cli);
1101 SCVAL(cli->outbuf,smb_vwv0,0xFF);
1102 SSVAL(cli->outbuf,smb_vwv2,fnum);
1103 SCVAL(cli->outbuf,smb_vwv3,locktype);
1104 SIVALS(cli->outbuf, smb_vwv4, timeout);
1105 SSVAL(cli->outbuf,smb_vwv6,0);
1106 SSVAL(cli->outbuf,smb_vwv7,1);
1108 p = smb_buf(cli->outbuf);
1109 SSVAL(p, 0, cli->pid);
1110 SIVAL(p, 2, offset);
1111 SIVAL(p, 6, len);
1113 p += 10;
1115 cli_setup_bcc(cli, p);
1117 cli_send_smb(cli);
1119 if (timeout != 0) {
1120 cli->timeout = (timeout == -1) ? 0x7FFFFFFF : (timeout + 2*1000);
1123 if (!cli_receive_smb(cli)) {
1124 cli->timeout = saved_timeout;
1125 return NT_STATUS_UNSUCCESSFUL;
1128 cli->timeout = saved_timeout;
1130 return cli_nt_error(cli);
1133 /****************************************************************************
1134 Lock a file.
1135 note that timeout is in units of 2 milliseconds
1136 ****************************************************************************/
1138 bool cli_lock(struct cli_state *cli, int fnum,
1139 uint32 offset, uint32 len, int timeout, enum brl_type lock_type)
1141 char *p;
1142 int saved_timeout = cli->timeout;
1144 memset(cli->outbuf,'\0',smb_size);
1145 memset(cli->inbuf,'\0', smb_size);
1147 cli_set_message(cli->outbuf,8,0,True);
1149 SCVAL(cli->outbuf,smb_com,SMBlockingX);
1150 SSVAL(cli->outbuf,smb_tid,cli->cnum);
1151 cli_setup_packet(cli);
1153 SCVAL(cli->outbuf,smb_vwv0,0xFF);
1154 SSVAL(cli->outbuf,smb_vwv2,fnum);
1155 SCVAL(cli->outbuf,smb_vwv3,(lock_type == READ_LOCK? 1 : 0));
1156 SIVALS(cli->outbuf, smb_vwv4, timeout);
1157 SSVAL(cli->outbuf,smb_vwv6,0);
1158 SSVAL(cli->outbuf,smb_vwv7,1);
1160 p = smb_buf(cli->outbuf);
1161 SSVAL(p, 0, cli->pid);
1162 SIVAL(p, 2, offset);
1163 SIVAL(p, 6, len);
1165 p += 10;
1167 cli_setup_bcc(cli, p);
1169 cli_send_smb(cli);
1171 if (timeout != 0) {
1172 cli->timeout = (timeout == -1) ? 0x7FFFFFFF : (timeout*2 + 5*1000);
1175 if (!cli_receive_smb(cli)) {
1176 cli->timeout = saved_timeout;
1177 return False;
1180 cli->timeout = saved_timeout;
1182 if (cli_is_error(cli)) {
1183 return False;
1186 return True;
1189 /****************************************************************************
1190 Unlock a file.
1191 ****************************************************************************/
1193 bool cli_unlock(struct cli_state *cli, int fnum, uint32 offset, uint32 len)
1195 char *p;
1197 memset(cli->outbuf,'\0',smb_size);
1198 memset(cli->inbuf,'\0',smb_size);
1200 cli_set_message(cli->outbuf,8,0,True);
1202 SCVAL(cli->outbuf,smb_com,SMBlockingX);
1203 SSVAL(cli->outbuf,smb_tid,cli->cnum);
1204 cli_setup_packet(cli);
1206 SCVAL(cli->outbuf,smb_vwv0,0xFF);
1207 SSVAL(cli->outbuf,smb_vwv2,fnum);
1208 SCVAL(cli->outbuf,smb_vwv3,0);
1209 SIVALS(cli->outbuf, smb_vwv4, 0);
1210 SSVAL(cli->outbuf,smb_vwv6,1);
1211 SSVAL(cli->outbuf,smb_vwv7,0);
1213 p = smb_buf(cli->outbuf);
1214 SSVAL(p, 0, cli->pid);
1215 SIVAL(p, 2, offset);
1216 SIVAL(p, 6, len);
1217 p += 10;
1218 cli_setup_bcc(cli, p);
1219 cli_send_smb(cli);
1220 if (!cli_receive_smb(cli)) {
1221 return False;
1224 if (cli_is_error(cli)) {
1225 return False;
1228 return True;
1231 /****************************************************************************
1232 Lock a file with 64 bit offsets.
1233 ****************************************************************************/
1235 bool cli_lock64(struct cli_state *cli, int fnum,
1236 uint64_t offset, uint64_t len, int timeout, enum brl_type lock_type)
1238 char *p;
1239 int saved_timeout = cli->timeout;
1240 int ltype;
1242 if (! (cli->capabilities & CAP_LARGE_FILES)) {
1243 return cli_lock(cli, fnum, offset, len, timeout, lock_type);
1246 ltype = (lock_type == READ_LOCK? 1 : 0);
1247 ltype |= LOCKING_ANDX_LARGE_FILES;
1249 memset(cli->outbuf,'\0',smb_size);
1250 memset(cli->inbuf,'\0', smb_size);
1252 cli_set_message(cli->outbuf,8,0,True);
1254 SCVAL(cli->outbuf,smb_com,SMBlockingX);
1255 SSVAL(cli->outbuf,smb_tid,cli->cnum);
1256 cli_setup_packet(cli);
1258 SCVAL(cli->outbuf,smb_vwv0,0xFF);
1259 SSVAL(cli->outbuf,smb_vwv2,fnum);
1260 SCVAL(cli->outbuf,smb_vwv3,ltype);
1261 SIVALS(cli->outbuf, smb_vwv4, timeout);
1262 SSVAL(cli->outbuf,smb_vwv6,0);
1263 SSVAL(cli->outbuf,smb_vwv7,1);
1265 p = smb_buf(cli->outbuf);
1266 SIVAL(p, 0, cli->pid);
1267 SOFF_T_R(p, 4, offset);
1268 SOFF_T_R(p, 12, len);
1269 p += 20;
1271 cli_setup_bcc(cli, p);
1272 cli_send_smb(cli);
1274 if (timeout != 0) {
1275 cli->timeout = (timeout == -1) ? 0x7FFFFFFF : (timeout + 5*1000);
1278 if (!cli_receive_smb(cli)) {
1279 cli->timeout = saved_timeout;
1280 return False;
1283 cli->timeout = saved_timeout;
1285 if (cli_is_error(cli)) {
1286 return False;
1289 return True;
1292 /****************************************************************************
1293 Unlock a file with 64 bit offsets.
1294 ****************************************************************************/
1296 bool cli_unlock64(struct cli_state *cli, int fnum, uint64_t offset, uint64_t len)
1298 char *p;
1300 if (! (cli->capabilities & CAP_LARGE_FILES)) {
1301 return cli_unlock(cli, fnum, offset, len);
1304 memset(cli->outbuf,'\0',smb_size);
1305 memset(cli->inbuf,'\0',smb_size);
1307 cli_set_message(cli->outbuf,8,0,True);
1309 SCVAL(cli->outbuf,smb_com,SMBlockingX);
1310 SSVAL(cli->outbuf,smb_tid,cli->cnum);
1311 cli_setup_packet(cli);
1313 SCVAL(cli->outbuf,smb_vwv0,0xFF);
1314 SSVAL(cli->outbuf,smb_vwv2,fnum);
1315 SCVAL(cli->outbuf,smb_vwv3,LOCKING_ANDX_LARGE_FILES);
1316 SIVALS(cli->outbuf, smb_vwv4, 0);
1317 SSVAL(cli->outbuf,smb_vwv6,1);
1318 SSVAL(cli->outbuf,smb_vwv7,0);
1320 p = smb_buf(cli->outbuf);
1321 SIVAL(p, 0, cli->pid);
1322 SOFF_T_R(p, 4, offset);
1323 SOFF_T_R(p, 12, len);
1324 p += 20;
1325 cli_setup_bcc(cli, p);
1326 cli_send_smb(cli);
1327 if (!cli_receive_smb(cli)) {
1328 return False;
1331 if (cli_is_error(cli)) {
1332 return False;
1335 return True;
1338 /****************************************************************************
1339 Get/unlock a POSIX lock on a file - internal function.
1340 ****************************************************************************/
1342 static bool cli_posix_lock_internal(struct cli_state *cli, int fnum,
1343 uint64_t offset, uint64_t len, bool wait_lock, enum brl_type lock_type)
1345 unsigned int param_len = 4;
1346 unsigned int data_len = POSIX_LOCK_DATA_SIZE;
1347 uint16 setup = TRANSACT2_SETFILEINFO;
1348 char param[4];
1349 unsigned char data[POSIX_LOCK_DATA_SIZE];
1350 char *rparam=NULL, *rdata=NULL;
1351 int saved_timeout = cli->timeout;
1353 SSVAL(param,0,fnum);
1354 SSVAL(param,2,SMB_SET_POSIX_LOCK);
1356 switch (lock_type) {
1357 case READ_LOCK:
1358 SSVAL(data, POSIX_LOCK_TYPE_OFFSET, POSIX_LOCK_TYPE_READ);
1359 break;
1360 case WRITE_LOCK:
1361 SSVAL(data, POSIX_LOCK_TYPE_OFFSET, POSIX_LOCK_TYPE_WRITE);
1362 break;
1363 case UNLOCK_LOCK:
1364 SSVAL(data, POSIX_LOCK_TYPE_OFFSET, POSIX_LOCK_TYPE_UNLOCK);
1365 break;
1366 default:
1367 return False;
1370 if (wait_lock) {
1371 SSVAL(data, POSIX_LOCK_FLAGS_OFFSET, POSIX_LOCK_FLAG_WAIT);
1372 cli->timeout = 0x7FFFFFFF;
1373 } else {
1374 SSVAL(data, POSIX_LOCK_FLAGS_OFFSET, POSIX_LOCK_FLAG_NOWAIT);
1377 SIVAL(data, POSIX_LOCK_PID_OFFSET, cli->pid);
1378 SOFF_T(data, POSIX_LOCK_START_OFFSET, offset);
1379 SOFF_T(data, POSIX_LOCK_LEN_OFFSET, len);
1381 if (!cli_send_trans(cli, SMBtrans2,
1382 NULL, /* name */
1383 -1, 0, /* fid, flags */
1384 &setup, 1, 0, /* setup, length, max */
1385 param, param_len, 2, /* param, length, max */
1386 (char *)&data, data_len, cli->max_xmit /* data, length, max */
1387 )) {
1388 cli->timeout = saved_timeout;
1389 return False;
1392 if (!cli_receive_trans(cli, SMBtrans2,
1393 &rparam, &param_len,
1394 &rdata, &data_len)) {
1395 cli->timeout = saved_timeout;
1396 SAFE_FREE(rdata);
1397 SAFE_FREE(rparam);
1398 return False;
1401 cli->timeout = saved_timeout;
1403 SAFE_FREE(rdata);
1404 SAFE_FREE(rparam);
1406 return True;
1409 /****************************************************************************
1410 POSIX Lock a file.
1411 ****************************************************************************/
1413 bool cli_posix_lock(struct cli_state *cli, int fnum,
1414 uint64_t offset, uint64_t len,
1415 bool wait_lock, enum brl_type lock_type)
1417 if (lock_type != READ_LOCK && lock_type != WRITE_LOCK) {
1418 return False;
1420 return cli_posix_lock_internal(cli, fnum, offset, len, wait_lock, lock_type);
1423 /****************************************************************************
1424 POSIX Unlock a file.
1425 ****************************************************************************/
1427 bool cli_posix_unlock(struct cli_state *cli, int fnum, uint64_t offset, uint64_t len)
1429 return cli_posix_lock_internal(cli, fnum, offset, len, False, UNLOCK_LOCK);
1432 /****************************************************************************
1433 POSIX Get any lock covering a file.
1434 ****************************************************************************/
1436 bool cli_posix_getlock(struct cli_state *cli, int fnum, uint64_t *poffset, uint64_t *plen)
1438 return True;
1441 /****************************************************************************
1442 Do a SMBgetattrE call.
1443 ****************************************************************************/
1445 bool cli_getattrE(struct cli_state *cli, int fd,
1446 uint16 *attr, SMB_OFF_T *size,
1447 time_t *change_time,
1448 time_t *access_time,
1449 time_t *write_time)
1451 memset(cli->outbuf,'\0',smb_size);
1452 memset(cli->inbuf,'\0',smb_size);
1454 cli_set_message(cli->outbuf,1,0,True);
1456 SCVAL(cli->outbuf,smb_com,SMBgetattrE);
1457 SSVAL(cli->outbuf,smb_tid,cli->cnum);
1458 cli_setup_packet(cli);
1460 SSVAL(cli->outbuf,smb_vwv0,fd);
1462 cli_send_smb(cli);
1463 if (!cli_receive_smb(cli)) {
1464 return False;
1467 if (cli_is_error(cli)) {
1468 return False;
1471 if (size) {
1472 *size = IVAL(cli->inbuf, smb_vwv6);
1475 if (attr) {
1476 *attr = SVAL(cli->inbuf,smb_vwv10);
1479 if (change_time) {
1480 *change_time = cli_make_unix_date2(cli, cli->inbuf+smb_vwv0);
1483 if (access_time) {
1484 *access_time = cli_make_unix_date2(cli, cli->inbuf+smb_vwv2);
1487 if (write_time) {
1488 *write_time = cli_make_unix_date2(cli, cli->inbuf+smb_vwv4);
1491 return True;
1494 /****************************************************************************
1495 Do a SMBgetatr call
1496 ****************************************************************************/
1498 bool cli_getatr(struct cli_state *cli, const char *fname,
1499 uint16 *attr, SMB_OFF_T *size, time_t *write_time)
1501 char *p;
1503 memset(cli->outbuf,'\0',smb_size);
1504 memset(cli->inbuf,'\0',smb_size);
1506 cli_set_message(cli->outbuf,0,0,True);
1508 SCVAL(cli->outbuf,smb_com,SMBgetatr);
1509 SSVAL(cli->outbuf,smb_tid,cli->cnum);
1510 cli_setup_packet(cli);
1512 p = smb_buf(cli->outbuf);
1513 *p++ = 4;
1514 p += clistr_push(cli, p, fname,
1515 cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
1517 cli_setup_bcc(cli, p);
1519 cli_send_smb(cli);
1520 if (!cli_receive_smb(cli)) {
1521 return False;
1524 if (cli_is_error(cli)) {
1525 return False;
1528 if (size) {
1529 *size = IVAL(cli->inbuf, smb_vwv3);
1532 if (write_time) {
1533 *write_time = cli_make_unix_date3(cli, cli->inbuf+smb_vwv1);
1536 if (attr) {
1537 *attr = SVAL(cli->inbuf,smb_vwv0);
1540 return True;
1543 /****************************************************************************
1544 Do a SMBsetattrE call.
1545 ****************************************************************************/
1547 bool cli_setattrE(struct cli_state *cli, int fd,
1548 time_t change_time,
1549 time_t access_time,
1550 time_t write_time)
1553 char *p;
1555 memset(cli->outbuf,'\0',smb_size);
1556 memset(cli->inbuf,'\0',smb_size);
1558 cli_set_message(cli->outbuf,7,0,True);
1560 SCVAL(cli->outbuf,smb_com,SMBsetattrE);
1561 SSVAL(cli->outbuf,smb_tid,cli->cnum);
1562 cli_setup_packet(cli);
1564 SSVAL(cli->outbuf,smb_vwv0, fd);
1565 cli_put_dos_date2(cli, cli->outbuf,smb_vwv1, change_time);
1566 cli_put_dos_date2(cli, cli->outbuf,smb_vwv3, access_time);
1567 cli_put_dos_date2(cli, cli->outbuf,smb_vwv5, write_time);
1569 p = smb_buf(cli->outbuf);
1570 *p++ = 4;
1572 cli_setup_bcc(cli, p);
1574 cli_send_smb(cli);
1575 if (!cli_receive_smb(cli)) {
1576 return False;
1579 if (cli_is_error(cli)) {
1580 return False;
1583 return True;
1586 /****************************************************************************
1587 Do a SMBsetatr call.
1588 ****************************************************************************/
1590 bool cli_setatr(struct cli_state *cli, const char *fname, uint16 attr, time_t t)
1592 char *p;
1594 memset(cli->outbuf,'\0',smb_size);
1595 memset(cli->inbuf,'\0',smb_size);
1597 cli_set_message(cli->outbuf,8,0,True);
1599 SCVAL(cli->outbuf,smb_com,SMBsetatr);
1600 SSVAL(cli->outbuf,smb_tid,cli->cnum);
1601 cli_setup_packet(cli);
1603 SSVAL(cli->outbuf,smb_vwv0, attr);
1604 cli_put_dos_date3(cli, cli->outbuf,smb_vwv1, t);
1606 p = smb_buf(cli->outbuf);
1607 *p++ = 4;
1608 p += clistr_push(cli, p, fname,
1609 cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
1610 *p++ = 4;
1612 cli_setup_bcc(cli, p);
1614 cli_send_smb(cli);
1615 if (!cli_receive_smb(cli)) {
1616 return False;
1619 if (cli_is_error(cli)) {
1620 return False;
1623 return True;
1626 /****************************************************************************
1627 Check for existance of a dir.
1628 ****************************************************************************/
1630 bool cli_chkpath(struct cli_state *cli, const char *path)
1632 char *path2 = NULL;
1633 char *p;
1634 TALLOC_CTX *frame = talloc_stackframe();
1636 path2 = talloc_strdup(frame, path);
1637 if (!path2) {
1638 TALLOC_FREE(frame);
1639 return false;
1641 trim_char(path2,'\0','\\');
1642 if (!*path2) {
1643 path2 = talloc_strdup(frame, "\\");
1644 if (!path2) {
1645 TALLOC_FREE(frame);
1646 return false;
1650 memset(cli->outbuf,'\0',smb_size);
1651 cli_set_message(cli->outbuf,0,0,True);
1652 SCVAL(cli->outbuf,smb_com,SMBcheckpath);
1653 SSVAL(cli->outbuf,smb_tid,cli->cnum);
1654 cli_setup_packet(cli);
1655 p = smb_buf(cli->outbuf);
1656 *p++ = 4;
1657 p += clistr_push(cli, p, path2,
1658 cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
1660 cli_setup_bcc(cli, p);
1662 cli_send_smb(cli);
1663 if (!cli_receive_smb(cli)) {
1664 TALLOC_FREE(frame);
1665 return False;
1668 TALLOC_FREE(frame);
1670 if (cli_is_error(cli)) return False;
1672 return True;
1675 /****************************************************************************
1676 Query disk space.
1677 ****************************************************************************/
1679 bool cli_dskattr(struct cli_state *cli, int *bsize, int *total, int *avail)
1681 memset(cli->outbuf,'\0',smb_size);
1682 cli_set_message(cli->outbuf,0,0,True);
1683 SCVAL(cli->outbuf,smb_com,SMBdskattr);
1684 SSVAL(cli->outbuf,smb_tid,cli->cnum);
1685 cli_setup_packet(cli);
1687 cli_send_smb(cli);
1688 if (!cli_receive_smb(cli)) {
1689 return False;
1692 *bsize = SVAL(cli->inbuf,smb_vwv1)*SVAL(cli->inbuf,smb_vwv2);
1693 *total = SVAL(cli->inbuf,smb_vwv0);
1694 *avail = SVAL(cli->inbuf,smb_vwv3);
1696 return True;
1699 /****************************************************************************
1700 Create and open a temporary file.
1701 ****************************************************************************/
1703 int cli_ctemp(struct cli_state *cli, const char *path, char **tmp_path)
1705 int len;
1706 char *p;
1708 memset(cli->outbuf,'\0',smb_size);
1709 memset(cli->inbuf,'\0',smb_size);
1711 cli_set_message(cli->outbuf,3,0,True);
1713 SCVAL(cli->outbuf,smb_com,SMBctemp);
1714 SSVAL(cli->outbuf,smb_tid,cli->cnum);
1715 cli_setup_packet(cli);
1717 SSVAL(cli->outbuf,smb_vwv0,0);
1718 SIVALS(cli->outbuf,smb_vwv1,-1);
1720 p = smb_buf(cli->outbuf);
1721 *p++ = 4;
1722 p += clistr_push(cli, p, path,
1723 cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
1725 cli_setup_bcc(cli, p);
1727 cli_send_smb(cli);
1728 if (!cli_receive_smb(cli)) {
1729 return -1;
1732 if (cli_is_error(cli)) {
1733 return -1;
1736 /* despite the spec, the result has a -1, followed by
1737 length, followed by name */
1738 p = smb_buf(cli->inbuf);
1739 p += 4;
1740 len = smb_buflen(cli->inbuf) - 4;
1741 if (len <= 0 || len > PATH_MAX) return -1;
1743 if (tmp_path) {
1744 char *path2 = SMB_MALLOC_ARRAY(char, len+1);
1745 if (!path2) {
1746 return -1;
1748 clistr_pull(cli, path2, p,
1749 len+1, len, STR_ASCII);
1750 *tmp_path = path2;
1753 return SVAL(cli->inbuf,smb_vwv0);
1757 send a raw ioctl - used by the torture code
1759 NTSTATUS cli_raw_ioctl(struct cli_state *cli, int fnum, uint32 code, DATA_BLOB *blob)
1761 memset(cli->outbuf,'\0',smb_size);
1762 memset(cli->inbuf,'\0',smb_size);
1764 cli_set_message(cli->outbuf, 3, 0, True);
1765 SCVAL(cli->outbuf,smb_com,SMBioctl);
1766 cli_setup_packet(cli);
1768 SSVAL(cli->outbuf, smb_vwv0, fnum);
1769 SSVAL(cli->outbuf, smb_vwv1, code>>16);
1770 SSVAL(cli->outbuf, smb_vwv2, (code&0xFFFF));
1772 cli_send_smb(cli);
1773 if (!cli_receive_smb(cli)) {
1774 return NT_STATUS_UNEXPECTED_NETWORK_ERROR;
1777 if (cli_is_error(cli)) {
1778 return cli_nt_error(cli);
1781 *blob = data_blob_null;
1783 return NT_STATUS_OK;
1786 /*********************************************************
1787 Set an extended attribute utility fn.
1788 *********************************************************/
1790 static bool cli_set_ea(struct cli_state *cli, uint16 setup, char *param, unsigned int param_len,
1791 const char *ea_name, const char *ea_val, size_t ea_len)
1793 unsigned int data_len = 0;
1794 char *data = NULL;
1795 char *rparam=NULL, *rdata=NULL;
1796 char *p;
1797 size_t ea_namelen = strlen(ea_name);
1799 if (ea_namelen == 0 && ea_len == 0) {
1800 data_len = 4;
1801 data = (char *)SMB_MALLOC(data_len);
1802 if (!data) {
1803 return False;
1805 p = data;
1806 SIVAL(p,0,data_len);
1807 } else {
1808 data_len = 4 + 4 + ea_namelen + 1 + ea_len;
1809 data = (char *)SMB_MALLOC(data_len);
1810 if (!data) {
1811 return False;
1813 p = data;
1814 SIVAL(p,0,data_len);
1815 p += 4;
1816 SCVAL(p, 0, 0); /* EA flags. */
1817 SCVAL(p, 1, ea_namelen);
1818 SSVAL(p, 2, ea_len);
1819 memcpy(p+4, ea_name, ea_namelen+1); /* Copy in the name. */
1820 memcpy(p+4+ea_namelen+1, ea_val, ea_len);
1823 if (!cli_send_trans(cli, SMBtrans2,
1824 NULL, /* name */
1825 -1, 0, /* fid, flags */
1826 &setup, 1, 0, /* setup, length, max */
1827 param, param_len, 2, /* param, length, max */
1828 data, data_len, cli->max_xmit /* data, length, max */
1829 )) {
1830 SAFE_FREE(data);
1831 return False;
1834 if (!cli_receive_trans(cli, SMBtrans2,
1835 &rparam, &param_len,
1836 &rdata, &data_len)) {
1837 SAFE_FREE(data);
1838 return false;
1841 SAFE_FREE(data);
1842 SAFE_FREE(rdata);
1843 SAFE_FREE(rparam);
1845 return True;
1848 /*********************************************************
1849 Set an extended attribute on a pathname.
1850 *********************************************************/
1852 bool cli_set_ea_path(struct cli_state *cli, const char *path, const char *ea_name, const char *ea_val, size_t ea_len)
1854 uint16 setup = TRANSACT2_SETPATHINFO;
1855 unsigned int param_len = 0;
1856 char *param;
1857 size_t srclen = 2*(strlen(path)+1);
1858 char *p;
1859 bool ret;
1861 param = SMB_MALLOC_ARRAY(char, 6+srclen+2);
1862 if (!param) {
1863 return false;
1865 memset(param, '\0', 6);
1866 SSVAL(param,0,SMB_INFO_SET_EA);
1867 p = &param[6];
1869 p += clistr_push(cli, p, path, srclen, STR_TERMINATE);
1870 param_len = PTR_DIFF(p, param);
1872 ret = cli_set_ea(cli, setup, param, param_len, ea_name, ea_val, ea_len);
1873 SAFE_FREE(param);
1874 return ret;
1877 /*********************************************************
1878 Set an extended attribute on an fnum.
1879 *********************************************************/
1881 bool cli_set_ea_fnum(struct cli_state *cli, int fnum, const char *ea_name, const char *ea_val, size_t ea_len)
1883 char param[6];
1884 uint16 setup = TRANSACT2_SETFILEINFO;
1886 memset(param, 0, 6);
1887 SSVAL(param,0,fnum);
1888 SSVAL(param,2,SMB_INFO_SET_EA);
1890 return cli_set_ea(cli, setup, param, 6, ea_name, ea_val, ea_len);
1893 /*********************************************************
1894 Get an extended attribute list utility fn.
1895 *********************************************************/
1897 static bool cli_get_ea_list(struct cli_state *cli,
1898 uint16 setup, char *param, unsigned int param_len,
1899 TALLOC_CTX *ctx,
1900 size_t *pnum_eas,
1901 struct ea_struct **pea_list)
1903 unsigned int data_len = 0;
1904 unsigned int rparam_len, rdata_len;
1905 char *rparam=NULL, *rdata=NULL;
1906 char *p;
1907 size_t ea_size;
1908 size_t num_eas;
1909 bool ret = False;
1910 struct ea_struct *ea_list;
1912 *pnum_eas = 0;
1913 if (pea_list) {
1914 *pea_list = NULL;
1917 if (!cli_send_trans(cli, SMBtrans2,
1918 NULL, /* Name */
1919 -1, 0, /* fid, flags */
1920 &setup, 1, 0, /* setup, length, max */
1921 param, param_len, 10, /* param, length, max */
1922 NULL, data_len, cli->max_xmit /* data, length, max */
1923 )) {
1924 return False;
1927 if (!cli_receive_trans(cli, SMBtrans2,
1928 &rparam, &rparam_len,
1929 &rdata, &rdata_len)) {
1930 return False;
1933 if (!rdata || rdata_len < 4) {
1934 goto out;
1937 ea_size = (size_t)IVAL(rdata,0);
1938 if (ea_size > rdata_len) {
1939 goto out;
1942 if (ea_size == 0) {
1943 /* No EA's present. */
1944 ret = True;
1945 goto out;
1948 p = rdata + 4;
1949 ea_size -= 4;
1951 /* Validate the EA list and count it. */
1952 for (num_eas = 0; ea_size >= 4; num_eas++) {
1953 unsigned int ea_namelen = CVAL(p,1);
1954 unsigned int ea_valuelen = SVAL(p,2);
1955 if (ea_namelen == 0) {
1956 goto out;
1958 if (4 + ea_namelen + 1 + ea_valuelen > ea_size) {
1959 goto out;
1961 ea_size -= 4 + ea_namelen + 1 + ea_valuelen;
1962 p += 4 + ea_namelen + 1 + ea_valuelen;
1965 if (num_eas == 0) {
1966 ret = True;
1967 goto out;
1970 *pnum_eas = num_eas;
1971 if (!pea_list) {
1972 /* Caller only wants number of EA's. */
1973 ret = True;
1974 goto out;
1977 ea_list = TALLOC_ARRAY(ctx, struct ea_struct, num_eas);
1978 if (!ea_list) {
1979 goto out;
1982 ea_size = (size_t)IVAL(rdata,0);
1983 p = rdata + 4;
1985 for (num_eas = 0; num_eas < *pnum_eas; num_eas++ ) {
1986 struct ea_struct *ea = &ea_list[num_eas];
1987 fstring unix_ea_name;
1988 unsigned int ea_namelen = CVAL(p,1);
1989 unsigned int ea_valuelen = SVAL(p,2);
1991 ea->flags = CVAL(p,0);
1992 unix_ea_name[0] = '\0';
1993 pull_ascii_fstring(unix_ea_name, p + 4);
1994 ea->name = talloc_strdup(ctx, unix_ea_name);
1995 /* Ensure the value is null terminated (in case it's a string). */
1996 ea->value = data_blob_talloc(ctx, NULL, ea_valuelen + 1);
1997 if (!ea->value.data) {
1998 goto out;
2000 if (ea_valuelen) {
2001 memcpy(ea->value.data, p+4+ea_namelen+1, ea_valuelen);
2003 ea->value.data[ea_valuelen] = 0;
2004 ea->value.length--;
2005 p += 4 + ea_namelen + 1 + ea_valuelen;
2008 *pea_list = ea_list;
2009 ret = True;
2011 out :
2013 SAFE_FREE(rdata);
2014 SAFE_FREE(rparam);
2015 return ret;
2018 /*********************************************************
2019 Get an extended attribute list from a pathname.
2020 *********************************************************/
2022 bool cli_get_ea_list_path(struct cli_state *cli, const char *path,
2023 TALLOC_CTX *ctx,
2024 size_t *pnum_eas,
2025 struct ea_struct **pea_list)
2027 uint16 setup = TRANSACT2_QPATHINFO;
2028 unsigned int param_len = 0;
2029 char *param;
2030 char *p;
2031 size_t srclen = 2*(strlen(path)+1);
2032 bool ret;
2034 param = SMB_MALLOC_ARRAY(char, 6+srclen+2);
2035 if (!param) {
2036 return false;
2038 p = param;
2039 memset(p, 0, 6);
2040 SSVAL(p, 0, SMB_INFO_QUERY_ALL_EAS);
2041 p += 6;
2042 p += clistr_push(cli, p, path, srclen, STR_TERMINATE);
2043 param_len = PTR_DIFF(p, param);
2045 ret = cli_get_ea_list(cli, setup, param, param_len, ctx, pnum_eas, pea_list);
2046 SAFE_FREE(param);
2047 return ret;
2050 /*********************************************************
2051 Get an extended attribute list from an fnum.
2052 *********************************************************/
2054 bool cli_get_ea_list_fnum(struct cli_state *cli, int fnum,
2055 TALLOC_CTX *ctx,
2056 size_t *pnum_eas,
2057 struct ea_struct **pea_list)
2059 uint16 setup = TRANSACT2_QFILEINFO;
2060 char param[6];
2062 memset(param, 0, 6);
2063 SSVAL(param,0,fnum);
2064 SSVAL(param,2,SMB_INFO_SET_EA);
2066 return cli_get_ea_list(cli, setup, param, 6, ctx, pnum_eas, pea_list);
2069 /****************************************************************************
2070 Convert open "flags" arg to uint32 on wire.
2071 ****************************************************************************/
2073 static uint32 open_flags_to_wire(int flags)
2075 int open_mode = flags & O_ACCMODE;
2076 uint32 ret = 0;
2078 switch (open_mode) {
2079 case O_WRONLY:
2080 ret |= SMB_O_WRONLY;
2081 break;
2082 case O_RDWR:
2083 ret |= SMB_O_RDWR;
2084 break;
2085 default:
2086 case O_RDONLY:
2087 ret |= SMB_O_RDONLY;
2088 break;
2091 if (flags & O_CREAT) {
2092 ret |= SMB_O_CREAT;
2094 if (flags & O_EXCL) {
2095 ret |= SMB_O_EXCL;
2097 if (flags & O_TRUNC) {
2098 ret |= SMB_O_TRUNC;
2100 #if defined(O_SYNC)
2101 if (flags & O_SYNC) {
2102 ret |= SMB_O_SYNC;
2104 #endif /* O_SYNC */
2105 if (flags & O_APPEND) {
2106 ret |= SMB_O_APPEND;
2108 #if defined(O_DIRECT)
2109 if (flags & O_DIRECT) {
2110 ret |= SMB_O_DIRECT;
2112 #endif
2113 #if defined(O_DIRECTORY)
2114 if (flags & O_DIRECTORY) {
2115 ret &= ~(SMB_O_RDONLY|SMB_O_RDWR|SMB_O_WRONLY);
2116 ret |= SMB_O_DIRECTORY;
2118 #endif
2119 return ret;
2122 /****************************************************************************
2123 Open a file - POSIX semantics. Returns fnum. Doesn't request oplock.
2124 ****************************************************************************/
2126 static int cli_posix_open_internal(struct cli_state *cli, const char *fname, int flags, mode_t mode, bool is_dir)
2128 unsigned int data_len = 0;
2129 unsigned int param_len = 0;
2130 uint16 setup = TRANSACT2_SETPATHINFO;
2131 char *param;
2132 char data[18];
2133 char *rparam=NULL, *rdata=NULL;
2134 char *p;
2135 int fnum = -1;
2136 uint32 wire_flags = open_flags_to_wire(flags);
2137 size_t srclen = 2*(strlen(fname)+1);
2139 param = SMB_MALLOC_ARRAY(char, 6+srclen+2);
2140 if (!param) {
2141 return false;
2143 memset(param, '\0', 6);
2144 SSVAL(param,0, SMB_POSIX_PATH_OPEN);
2145 p = &param[6];
2147 p += clistr_push(cli, p, fname, srclen, STR_TERMINATE);
2148 param_len = PTR_DIFF(p, param);
2150 if (is_dir) {
2151 wire_flags &= ~(SMB_O_RDONLY|SMB_O_RDWR|SMB_O_WRONLY);
2152 wire_flags |= SMB_O_DIRECTORY;
2155 p = data;
2156 SIVAL(p,0,0); /* No oplock. */
2157 SIVAL(p,4,wire_flags);
2158 SIVAL(p,8,unix_perms_to_wire(mode));
2159 SIVAL(p,12,0); /* Top bits of perms currently undefined. */
2160 SSVAL(p,16,SMB_NO_INFO_LEVEL_RETURNED); /* No info level returned. */
2162 data_len = 18;
2164 if (!cli_send_trans(cli, SMBtrans2,
2165 NULL, /* name */
2166 -1, 0, /* fid, flags */
2167 &setup, 1, 0, /* setup, length, max */
2168 param, param_len, 2, /* param, length, max */
2169 (char *)&data, data_len, cli->max_xmit /* data, length, max */
2170 )) {
2171 SAFE_FREE(param);
2172 return -1;
2175 SAFE_FREE(param);
2177 if (!cli_receive_trans(cli, SMBtrans2,
2178 &rparam, &param_len,
2179 &rdata, &data_len)) {
2180 return -1;
2183 fnum = SVAL(rdata,2);
2185 SAFE_FREE(rdata);
2186 SAFE_FREE(rparam);
2188 return fnum;
2191 /****************************************************************************
2192 open - POSIX semantics.
2193 ****************************************************************************/
2195 int cli_posix_open(struct cli_state *cli, const char *fname, int flags, mode_t mode)
2197 return cli_posix_open_internal(cli, fname, flags, mode, False);
2200 /****************************************************************************
2201 mkdir - POSIX semantics.
2202 ****************************************************************************/
2204 int cli_posix_mkdir(struct cli_state *cli, const char *fname, mode_t mode)
2206 return (cli_posix_open_internal(cli, fname, O_CREAT, mode, True) == -1) ? -1 : 0;
2209 /****************************************************************************
2210 unlink or rmdir - POSIX semantics.
2211 ****************************************************************************/
2213 static bool cli_posix_unlink_internal(struct cli_state *cli, const char *fname, bool is_dir)
2215 unsigned int data_len = 0;
2216 unsigned int param_len = 0;
2217 uint16 setup = TRANSACT2_SETPATHINFO;
2218 char *param;
2219 char data[2];
2220 char *rparam=NULL, *rdata=NULL;
2221 char *p;
2222 size_t srclen = 2*(strlen(fname)+1);
2224 param = SMB_MALLOC_ARRAY(char, 6+srclen+2);
2225 if (!param) {
2226 return false;
2228 memset(param, '\0', 6);
2229 SSVAL(param,0, SMB_POSIX_PATH_UNLINK);
2230 p = &param[6];
2232 p += clistr_push(cli, p, fname, srclen, STR_TERMINATE);
2233 param_len = PTR_DIFF(p, param);
2235 SSVAL(data, 0, is_dir ? SMB_POSIX_UNLINK_DIRECTORY_TARGET :
2236 SMB_POSIX_UNLINK_FILE_TARGET);
2237 data_len = 2;
2239 if (!cli_send_trans(cli, SMBtrans2,
2240 NULL, /* name */
2241 -1, 0, /* fid, flags */
2242 &setup, 1, 0, /* setup, length, max */
2243 param, param_len, 2, /* param, length, max */
2244 (char *)&data, data_len, cli->max_xmit /* data, length, max */
2245 )) {
2246 SAFE_FREE(param);
2247 return False;
2250 SAFE_FREE(param);
2252 if (!cli_receive_trans(cli, SMBtrans2,
2253 &rparam, &param_len,
2254 &rdata, &data_len)) {
2255 return False;
2258 SAFE_FREE(rdata);
2259 SAFE_FREE(rparam);
2261 return True;
2264 /****************************************************************************
2265 unlink - POSIX semantics.
2266 ****************************************************************************/
2268 bool cli_posix_unlink(struct cli_state *cli, const char *fname)
2270 return cli_posix_unlink_internal(cli, fname, False);
2273 /****************************************************************************
2274 rmdir - POSIX semantics.
2275 ****************************************************************************/
2277 int cli_posix_rmdir(struct cli_state *cli, const char *fname)
2279 return cli_posix_unlink_internal(cli, fname, True);