s4:libcli/smb2: remove unused elements from smb2_tree
[Samba/gebeck_regimport.git] / source4 / torture / smb2 / util.c
blob250c4a27c7b2cc71c5d33fe6182f2a32e8731db8
1 /*
2 Unix SMB/CIFS implementation.
4 helper functions for SMB2 test suite
6 Copyright (C) Andrew Tridgell 2005
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program. If not, see <http://www.gnu.org/licenses/>.
22 #include "includes.h"
23 #include "libcli/security/security_descriptor.h"
24 #include "libcli/smb2/smb2.h"
25 #include "libcli/smb2/smb2_calls.h"
26 #include "../libcli/smb/smbXcli_base.h"
27 #include "lib/cmdline/popt_common.h"
28 #include "system/time.h"
29 #include "librpc/gen_ndr/ndr_security.h"
30 #include "param/param.h"
31 #include "libcli/resolve/resolve.h"
33 #include "torture/torture.h"
34 #include "torture/smb2/proto.h"
38 write to a file on SMB2
40 NTSTATUS smb2_util_write(struct smb2_tree *tree,
41 struct smb2_handle handle,
42 const void *buf, off_t offset, size_t size)
44 struct smb2_write w;
46 ZERO_STRUCT(w);
47 w.in.file.handle = handle;
48 w.in.offset = offset;
49 w.in.data = data_blob_const(buf, size);
51 return smb2_write(tree, &w);
55 create a complex file/dir using the SMB2 protocol
57 static NTSTATUS smb2_create_complex(struct smb2_tree *tree, const char *fname,
58 struct smb2_handle *handle, bool dir)
60 TALLOC_CTX *tmp_ctx = talloc_new(tree);
61 char buf[7] = "abc";
62 struct smb2_create io;
63 union smb_setfileinfo setfile;
64 union smb_fileinfo fileinfo;
65 time_t t = (time(NULL) & ~1);
66 NTSTATUS status;
68 smb2_util_unlink(tree, fname);
69 ZERO_STRUCT(io);
70 io.in.desired_access = SEC_FLAG_MAXIMUM_ALLOWED;
71 io.in.file_attributes = FILE_ATTRIBUTE_NORMAL;
72 io.in.create_disposition = NTCREATEX_DISP_OVERWRITE_IF;
73 io.in.share_access =
74 NTCREATEX_SHARE_ACCESS_DELETE|
75 NTCREATEX_SHARE_ACCESS_READ|
76 NTCREATEX_SHARE_ACCESS_WRITE;
77 io.in.create_options = 0;
78 io.in.fname = fname;
79 if (dir) {
80 io.in.create_options = NTCREATEX_OPTIONS_DIRECTORY;
81 io.in.share_access &= ~NTCREATEX_SHARE_ACCESS_DELETE;
82 io.in.file_attributes = FILE_ATTRIBUTE_DIRECTORY;
83 io.in.create_disposition = NTCREATEX_DISP_CREATE;
86 /* it seems vista is now fussier about alignment? */
87 if (strchr(fname, ':') == NULL) {
88 /* setup some EAs */
89 io.in.eas.num_eas = 2;
90 io.in.eas.eas = talloc_array(tmp_ctx, struct ea_struct, 2);
91 io.in.eas.eas[0].flags = 0;
92 io.in.eas.eas[0].name.s = "EAONE";
93 io.in.eas.eas[0].value = data_blob_talloc(tmp_ctx, "VALUE1", 6);
94 io.in.eas.eas[1].flags = 0;
95 io.in.eas.eas[1].name.s = "SECONDEA";
96 io.in.eas.eas[1].value = data_blob_talloc(tmp_ctx, "ValueTwo", 8);
99 status = smb2_create(tree, tmp_ctx, &io);
100 talloc_free(tmp_ctx);
101 NT_STATUS_NOT_OK_RETURN(status);
103 *handle = io.out.file.handle;
105 if (!dir) {
106 status = smb2_util_write(tree, *handle, buf, 0, sizeof(buf));
107 NT_STATUS_NOT_OK_RETURN(status);
110 /* make sure all the timestamps aren't the same, and are also
111 in different DST zones*/
112 setfile.generic.level = RAW_SFILEINFO_BASIC_INFORMATION;
113 setfile.generic.in.file.handle = *handle;
115 unix_to_nt_time(&setfile.basic_info.in.create_time, t + 9*30*24*60*60);
116 unix_to_nt_time(&setfile.basic_info.in.access_time, t + 6*30*24*60*60);
117 unix_to_nt_time(&setfile.basic_info.in.write_time, t + 3*30*24*60*60);
118 unix_to_nt_time(&setfile.basic_info.in.change_time, t + 1*30*24*60*60);
119 setfile.basic_info.in.attrib = FILE_ATTRIBUTE_NORMAL;
121 status = smb2_setinfo_file(tree, &setfile);
122 if (!NT_STATUS_IS_OK(status)) {
123 printf("Failed to setup file times - %s\n", nt_errstr(status));
124 return status;
127 /* make sure all the timestamps aren't the same */
128 fileinfo.generic.level = RAW_FILEINFO_SMB2_ALL_INFORMATION;
129 fileinfo.generic.in.file.handle = *handle;
131 status = smb2_getinfo_file(tree, tree, &fileinfo);
132 if (!NT_STATUS_IS_OK(status)) {
133 printf("Failed to query file times - %s\n", nt_errstr(status));
134 return status;
138 #define CHECK_TIME(field) do {\
139 if (setfile.basic_info.in.field != fileinfo.all_info2.out.field) { \
140 printf("(%s) " #field " not setup correctly: %s(%llu) => %s(%llu)\n", \
141 __location__, \
142 nt_time_string(tree, setfile.basic_info.in.field), \
143 (unsigned long long)setfile.basic_info.in.field, \
144 nt_time_string(tree, fileinfo.basic_info.out.field), \
145 (unsigned long long)fileinfo.basic_info.out.field); \
146 status = NT_STATUS_INVALID_PARAMETER; \
148 } while (0)
150 CHECK_TIME(create_time);
151 CHECK_TIME(access_time);
152 CHECK_TIME(write_time);
153 CHECK_TIME(change_time);
155 return status;
159 create a complex file using the SMB2 protocol
161 NTSTATUS smb2_create_complex_file(struct smb2_tree *tree, const char *fname,
162 struct smb2_handle *handle)
164 return smb2_create_complex(tree, fname, handle, false);
168 create a complex dir using the SMB2 protocol
170 NTSTATUS smb2_create_complex_dir(struct smb2_tree *tree, const char *fname,
171 struct smb2_handle *handle)
173 return smb2_create_complex(tree, fname, handle, true);
177 show lots of information about a file
179 void torture_smb2_all_info(struct smb2_tree *tree, struct smb2_handle handle)
181 NTSTATUS status;
182 TALLOC_CTX *tmp_ctx = talloc_new(tree);
183 union smb_fileinfo io;
185 io.generic.level = RAW_FILEINFO_SMB2_ALL_INFORMATION;
186 io.generic.in.file.handle = handle;
188 status = smb2_getinfo_file(tree, tmp_ctx, &io);
189 if (!NT_STATUS_IS_OK(status)) {
190 DEBUG(0,("getinfo failed - %s\n", nt_errstr(status)));
191 talloc_free(tmp_ctx);
192 return;
195 d_printf("all_info for '%s'\n", io.all_info2.out.fname.s);
196 d_printf("\tcreate_time: %s\n", nt_time_string(tmp_ctx, io.all_info2.out.create_time));
197 d_printf("\taccess_time: %s\n", nt_time_string(tmp_ctx, io.all_info2.out.access_time));
198 d_printf("\twrite_time: %s\n", nt_time_string(tmp_ctx, io.all_info2.out.write_time));
199 d_printf("\tchange_time: %s\n", nt_time_string(tmp_ctx, io.all_info2.out.change_time));
200 d_printf("\tattrib: 0x%x\n", io.all_info2.out.attrib);
201 d_printf("\tunknown1: 0x%x\n", io.all_info2.out.unknown1);
202 d_printf("\talloc_size: %llu\n", (long long)io.all_info2.out.alloc_size);
203 d_printf("\tsize: %llu\n", (long long)io.all_info2.out.size);
204 d_printf("\tnlink: %u\n", io.all_info2.out.nlink);
205 d_printf("\tdelete_pending: %u\n", io.all_info2.out.delete_pending);
206 d_printf("\tdirectory: %u\n", io.all_info2.out.directory);
207 d_printf("\tfile_id: %llu\n", (long long)io.all_info2.out.file_id);
208 d_printf("\tea_size: %u\n", io.all_info2.out.ea_size);
209 d_printf("\taccess_mask: 0x%08x\n", io.all_info2.out.access_mask);
210 d_printf("\tposition: 0x%llx\n", (long long)io.all_info2.out.position);
211 d_printf("\tmode: 0x%llx\n", (long long)io.all_info2.out.mode);
213 /* short name, if any */
214 io.generic.level = RAW_FILEINFO_ALT_NAME_INFORMATION;
215 status = smb2_getinfo_file(tree, tmp_ctx, &io);
216 if (NT_STATUS_IS_OK(status)) {
217 d_printf("\tshort name: '%s'\n", io.alt_name_info.out.fname.s);
220 /* the EAs, if any */
221 io.generic.level = RAW_FILEINFO_SMB2_ALL_EAS;
222 status = smb2_getinfo_file(tree, tmp_ctx, &io);
223 if (NT_STATUS_IS_OK(status)) {
224 int i;
225 for (i=0;i<io.all_eas.out.num_eas;i++) {
226 d_printf("\tEA[%d] flags=%d len=%d '%s'\n", i,
227 io.all_eas.out.eas[i].flags,
228 (int)io.all_eas.out.eas[i].value.length,
229 io.all_eas.out.eas[i].name.s);
233 /* streams, if available */
234 io.generic.level = RAW_FILEINFO_STREAM_INFORMATION;
235 status = smb2_getinfo_file(tree, tmp_ctx, &io);
236 if (NT_STATUS_IS_OK(status)) {
237 int i;
238 for (i=0;i<io.stream_info.out.num_streams;i++) {
239 d_printf("\tstream %d:\n", i);
240 d_printf("\t\tsize %ld\n",
241 (long)io.stream_info.out.streams[i].size);
242 d_printf("\t\talloc size %ld\n",
243 (long)io.stream_info.out.streams[i].alloc_size);
244 d_printf("\t\tname %s\n", io.stream_info.out.streams[i].stream_name.s);
248 if (DEBUGLVL(1)) {
249 /* the security descriptor */
250 io.query_secdesc.level = RAW_FILEINFO_SEC_DESC;
251 io.query_secdesc.in.secinfo_flags =
252 SECINFO_OWNER|SECINFO_GROUP|
253 SECINFO_DACL;
254 status = smb2_getinfo_file(tree, tmp_ctx, &io);
255 if (NT_STATUS_IS_OK(status)) {
256 NDR_PRINT_DEBUG(security_descriptor, io.query_secdesc.out.sd);
260 talloc_free(tmp_ctx);
264 * open a smb2 tree connect
266 bool torture_smb2_tree_connect(struct torture_context *tctx,
267 struct smb2_session *session,
268 TALLOC_CTX *mem_ctx,
269 struct smb2_tree **_tree)
271 NTSTATUS status;
272 const char *host = torture_setting_string(tctx, "host", NULL);
273 const char *share = torture_setting_string(tctx, "share", NULL);
274 struct smb2_tree_connect tcon;
275 struct smb2_tree *tree;
277 ZERO_STRUCT(tcon);
278 tcon.in.reserved = 0;
279 tcon.in.path = talloc_asprintf(tctx, "\\\\%s\\%s", host, share);
280 if (tcon.in.path == NULL) {
281 printf("talloc failed\n");
282 return false;
285 status = smb2_tree_connect(session, &tcon);
286 if (!NT_STATUS_IS_OK(status)) {
287 printf("Failed to tree_connect to SMB2 share \\\\%s\\%s - %s\n",
288 host, share, nt_errstr(status));
289 return false;
292 tree = smb2_tree_init(session, mem_ctx, true);
293 if (tree == NULL) {
294 printf("talloc failed\n");
295 return false;
298 smb2cli_tcon_set_values(tree->smbXcli,
299 tcon.out.tid,
300 tcon.out.share_type,
301 tcon.out.flags,
302 tcon.out.capabilities,
303 tcon.out.access_mask);
305 *_tree = tree;
307 return true;
311 * do a smb2 session setup (without a tree connect)
313 bool torture_smb2_session_setup(struct torture_context *tctx,
314 struct smb2_transport *transport,
315 uint64_t previous_session_id,
316 TALLOC_CTX *mem_ctx,
317 struct smb2_session **_session)
319 NTSTATUS status;
320 struct smb2_session *session;
321 struct cli_credentials *credentials = cmdline_credentials;
323 session = smb2_session_init(transport,
324 lpcfg_gensec_settings(tctx, tctx->lp_ctx),
325 mem_ctx, true);
327 if (session == NULL) {
328 return false;
331 status = smb2_session_setup_spnego(session, credentials,
332 previous_session_id);
333 if (!NT_STATUS_IS_OK(status)) {
334 printf("session setup failed: %s\n", nt_errstr(status));
335 talloc_free(session);
336 return false;
339 *_session = session;
341 return true;
345 open a smb2 connection
347 bool torture_smb2_connection_ext(struct torture_context *tctx,
348 uint64_t previous_session_id,
349 struct smb2_tree **tree)
351 NTSTATUS status;
352 const char *host = torture_setting_string(tctx, "host", NULL);
353 const char *share = torture_setting_string(tctx, "share", NULL);
354 struct cli_credentials *credentials = cmdline_credentials;
355 struct smbcli_options options;
357 lpcfg_smbcli_options(tctx->lp_ctx, &options);
359 status = smb2_connect_ext(tctx,
360 host,
361 lpcfg_smb_ports(tctx->lp_ctx),
362 share,
363 lpcfg_resolve_context(tctx->lp_ctx),
364 credentials,
365 previous_session_id,
366 tree,
367 tctx->ev,
368 &options,
369 lpcfg_socket_options(tctx->lp_ctx),
370 lpcfg_gensec_settings(tctx, tctx->lp_ctx)
372 if (!NT_STATUS_IS_OK(status)) {
373 printf("Failed to connect to SMB2 share \\\\%s\\%s - %s\n",
374 host, share, nt_errstr(status));
375 return false;
377 return true;
380 bool torture_smb2_connection(struct torture_context *tctx, struct smb2_tree **tree)
382 bool ret;
384 ret = torture_smb2_connection_ext(tctx, 0, tree);
386 return ret;
391 create and return a handle to a test file
393 NTSTATUS torture_smb2_testfile(struct smb2_tree *tree, const char *fname,
394 struct smb2_handle *handle)
396 struct smb2_create io;
397 NTSTATUS status;
399 ZERO_STRUCT(io);
400 io.in.oplock_level = 0;
401 io.in.desired_access = SEC_RIGHTS_FILE_ALL;
402 io.in.file_attributes = FILE_ATTRIBUTE_NORMAL;
403 io.in.create_disposition = NTCREATEX_DISP_OPEN_IF;
404 io.in.share_access =
405 NTCREATEX_SHARE_ACCESS_DELETE|
406 NTCREATEX_SHARE_ACCESS_READ|
407 NTCREATEX_SHARE_ACCESS_WRITE;
408 io.in.create_options = 0;
409 io.in.fname = fname;
411 status = smb2_create(tree, tree, &io);
412 NT_STATUS_NOT_OK_RETURN(status);
414 *handle = io.out.file.handle;
416 return NT_STATUS_OK;
420 create and return a handle to a test directory
422 NTSTATUS torture_smb2_testdir(struct smb2_tree *tree, const char *fname,
423 struct smb2_handle *handle)
425 struct smb2_create io;
426 NTSTATUS status;
428 ZERO_STRUCT(io);
429 io.in.oplock_level = 0;
430 io.in.desired_access = SEC_RIGHTS_DIR_ALL;
431 io.in.file_attributes = FILE_ATTRIBUTE_DIRECTORY;
432 io.in.create_disposition = NTCREATEX_DISP_OPEN_IF;
433 io.in.share_access = NTCREATEX_SHARE_ACCESS_READ|NTCREATEX_SHARE_ACCESS_WRITE|NTCREATEX_SHARE_ACCESS_DELETE;
434 io.in.create_options = NTCREATEX_OPTIONS_DIRECTORY;
435 io.in.fname = fname;
437 status = smb2_create(tree, tree, &io);
438 NT_STATUS_NOT_OK_RETURN(status);
440 *handle = io.out.file.handle;
442 return NT_STATUS_OK;
447 create a complex file using SMB2, to make it easier to
448 find fields in SMB2 getinfo levels
450 NTSTATUS torture_setup_complex_file(struct smb2_tree *tree, const char *fname)
452 struct smb2_handle handle;
453 NTSTATUS status = smb2_create_complex_file(tree, fname, &handle);
454 NT_STATUS_NOT_OK_RETURN(status);
455 return smb2_util_close(tree, handle);
460 create a complex dir using SMB2, to make it easier to
461 find fields in SMB2 getinfo levels
463 NTSTATUS torture_setup_complex_dir(struct smb2_tree *tree, const char *fname)
465 struct smb2_handle handle;
466 NTSTATUS status = smb2_create_complex_dir(tree, fname, &handle);
467 NT_STATUS_NOT_OK_RETURN(status);
468 return smb2_util_close(tree, handle);
473 return a handle to the root of the share
475 NTSTATUS smb2_util_roothandle(struct smb2_tree *tree, struct smb2_handle *handle)
477 struct smb2_create io;
478 NTSTATUS status;
480 ZERO_STRUCT(io);
481 io.in.oplock_level = 0;
482 io.in.desired_access = SEC_STD_SYNCHRONIZE | SEC_DIR_READ_ATTRIBUTE | SEC_DIR_LIST;
483 io.in.file_attributes = 0;
484 io.in.create_disposition = NTCREATEX_DISP_OPEN;
485 io.in.share_access = NTCREATEX_SHARE_ACCESS_READ|NTCREATEX_SHARE_ACCESS_DELETE;
486 io.in.create_options = NTCREATEX_OPTIONS_ASYNC_ALERT;
487 io.in.fname = NULL;
489 status = smb2_create(tree, tree, &io);
490 NT_STATUS_NOT_OK_RETURN(status);
492 *handle = io.out.file.handle;
494 return NT_STATUS_OK;
497 /* Comparable to torture_setup_dir, but for SMB2. */
498 bool smb2_util_setup_dir(struct torture_context *tctx, struct smb2_tree *tree,
499 const char *dname)
501 NTSTATUS status;
503 /* XXX: smb_raw_exit equivalent?
504 smb_raw_exit(cli->session); */
505 if (smb2_deltree(tree, dname) == -1) {
506 torture_result(tctx, TORTURE_ERROR, "Unable to deltree when setting up %s.\n", dname);
507 return false;
510 status = smb2_util_mkdir(tree, dname);
511 if (NT_STATUS_IS_ERR(status)) {
512 torture_result(tctx, TORTURE_ERROR, "Unable to mkdir when setting up %s - %s\n", dname,
513 nt_errstr(status));
514 return false;
517 return true;
520 #define CHECK_STATUS(status, correct) do { \
521 if (!NT_STATUS_EQUAL(status, correct)) { \
522 torture_result(tctx, TORTURE_FAIL, "(%s) Incorrect status %s - should be %s\n", \
523 __location__, nt_errstr(status), nt_errstr(correct)); \
524 ret = false; \
525 goto done; \
526 }} while (0)
529 * Helper function to verify a security descriptor, by querying
530 * and comparing against the passed in sd.
532 bool smb2_util_verify_sd(TALLOC_CTX *tctx, struct smb2_tree *tree,
533 struct smb2_handle handle, struct security_descriptor *sd)
535 NTSTATUS status;
536 bool ret = true;
537 union smb_fileinfo q = {};
539 q.query_secdesc.level = RAW_FILEINFO_SEC_DESC;
540 q.query_secdesc.in.file.handle = handle;
541 q.query_secdesc.in.secinfo_flags =
542 SECINFO_OWNER |
543 SECINFO_GROUP |
544 SECINFO_DACL;
545 status = smb2_getinfo_file(tree, tctx, &q);
546 CHECK_STATUS(status, NT_STATUS_OK);
548 if (!security_acl_equal(
549 q.query_secdesc.out.sd->dacl, sd->dacl)) {
550 torture_warning(tctx, "%s: security descriptors don't match!\n",
551 __location__);
552 torture_warning(tctx, "got:\n");
553 NDR_PRINT_DEBUG(security_descriptor,
554 q.query_secdesc.out.sd);
555 torture_warning(tctx, "expected:\n");
556 NDR_PRINT_DEBUG(security_descriptor, sd);
557 ret = false;
560 done:
561 return ret;
565 * Helper function to verify attributes, by querying
566 * and comparing against the passed in attrib.
568 bool smb2_util_verify_attrib(TALLOC_CTX *tctx, struct smb2_tree *tree,
569 struct smb2_handle handle, uint32_t attrib)
571 NTSTATUS status;
572 bool ret = true;
573 union smb_fileinfo q = {};
575 q.standard.level = RAW_FILEINFO_SMB2_ALL_INFORMATION;
576 q.standard.in.file.handle = handle;
577 status = smb2_getinfo_file(tree, tctx, &q);
578 CHECK_STATUS(status, NT_STATUS_OK);
580 q.all_info2.out.attrib &= ~(FILE_ATTRIBUTE_ARCHIVE | FILE_ATTRIBUTE_NONINDEXED);
582 if (q.all_info2.out.attrib != attrib) {
583 torture_warning(tctx, "%s: attributes don't match! "
584 "got %x, expected %x\n", __location__,
585 (uint32_t)q.standard.out.attrib,
586 (uint32_t)attrib);
587 ret = false;
590 done:
591 return ret;
595 uint32_t smb2_util_lease_state(const char *ls)
597 uint32_t val = 0;
598 int i;
600 for (i = 0; i < strlen(ls); i++) {
601 switch (ls[i]) {
602 case 'R':
603 val |= SMB2_LEASE_READ;
604 break;
605 case 'H':
606 val |= SMB2_LEASE_HANDLE;
607 break;
608 case 'W':
609 val |= SMB2_LEASE_WRITE;
610 break;
614 return val;
618 uint32_t smb2_util_share_access(const char *sharemode)
620 uint32_t val = NTCREATEX_SHARE_ACCESS_NONE; /* 0 */
621 int i;
623 for (i = 0; i < strlen(sharemode); i++) {
624 switch(sharemode[i]) {
625 case 'R':
626 val |= NTCREATEX_SHARE_ACCESS_READ;
627 break;
628 case 'W':
629 val |= NTCREATEX_SHARE_ACCESS_WRITE;
630 break;
631 case 'D':
632 val |= NTCREATEX_SHARE_ACCESS_DELETE;
633 break;
637 return val;
640 uint8_t smb2_util_oplock_level(const char *op)
642 uint8_t val = SMB2_OPLOCK_LEVEL_NONE;
643 int i;
645 for (i = 0; i < strlen(op); i++) {
646 switch (op[i]) {
647 case 's':
648 return SMB2_OPLOCK_LEVEL_II;
649 case 'x':
650 return SMB2_OPLOCK_LEVEL_EXCLUSIVE;
651 case 'b':
652 return SMB2_OPLOCK_LEVEL_BATCH;
653 default:
654 continue;
658 return val;
662 * Helper functions to fill a smb2_create struct for several
663 * open scenarios.
665 void smb2_generic_create_share(struct smb2_create *io, struct smb2_lease *ls,
666 bool dir, const char *name, uint32_t disposition,
667 uint32_t share_access,
668 uint8_t oplock, uint64_t leasekey,
669 uint32_t leasestate)
671 ZERO_STRUCT(*io);
672 io->in.security_flags = 0x00;
673 io->in.oplock_level = oplock;
674 io->in.impersonation_level = NTCREATEX_IMPERSONATION_IMPERSONATION;
675 io->in.create_flags = 0x00000000;
676 io->in.reserved = 0x00000000;
677 io->in.desired_access = SEC_RIGHTS_FILE_ALL;
678 io->in.file_attributes = FILE_ATTRIBUTE_NORMAL;
679 io->in.share_access = share_access;
680 io->in.create_disposition = disposition;
681 io->in.create_options = NTCREATEX_OPTIONS_SEQUENTIAL_ONLY |
682 NTCREATEX_OPTIONS_ASYNC_ALERT |
683 NTCREATEX_OPTIONS_NON_DIRECTORY_FILE |
684 0x00200000;
685 io->in.fname = name;
687 if (dir) {
688 io->in.create_options = NTCREATEX_OPTIONS_DIRECTORY;
689 io->in.share_access &= ~NTCREATEX_SHARE_ACCESS_DELETE;
690 io->in.file_attributes = FILE_ATTRIBUTE_DIRECTORY;
691 io->in.create_disposition = NTCREATEX_DISP_CREATE;
694 if (ls) {
695 ZERO_STRUCT(*ls);
696 ls->lease_key.data[0] = leasekey;
697 ls->lease_key.data[1] = ~leasekey;
698 ls->lease_state = leasestate;
699 io->in.lease_request = ls;
703 void smb2_generic_create(struct smb2_create *io, struct smb2_lease *ls,
704 bool dir, const char *name, uint32_t disposition,
705 uint8_t oplock, uint64_t leasekey,
706 uint32_t leasestate)
708 smb2_generic_create_share(io, ls, dir, name, disposition,
709 smb2_util_share_access("RWD"),
710 oplock,
711 leasekey, leasestate);
714 void smb2_lease_create_share(struct smb2_create *io, struct smb2_lease *ls,
715 bool dir, const char *name, uint32_t share_access,
716 uint64_t leasekey, uint32_t leasestate)
718 smb2_generic_create_share(io, ls, dir, name, NTCREATEX_DISP_OPEN_IF,
719 share_access, SMB2_OPLOCK_LEVEL_LEASE,
720 leasekey, leasestate);
723 void smb2_lease_create(struct smb2_create *io, struct smb2_lease *ls,
724 bool dir, const char *name, uint64_t leasekey,
725 uint32_t leasestate)
727 smb2_lease_create_share(io, ls, dir, name,
728 smb2_util_share_access("RWD"),
729 leasekey, leasestate);
732 void smb2_oplock_create_share(struct smb2_create *io, const char *name,
733 uint32_t share_access, uint8_t oplock)
735 smb2_generic_create_share(io, NULL, false, name, NTCREATEX_DISP_OPEN_IF,
736 share_access, oplock, 0, 0);
738 void smb2_oplock_create(struct smb2_create *io, const char *name, uint8_t oplock)
740 smb2_oplock_create_share(io, name, smb2_util_share_access("RWD"),
741 oplock);