r14574: Allow use of sendfile as long as the write cache has not been enabled
[Samba/nascimento.git] / source3 / libsmb / clisecdesc.c
blob24757434794068b23552c41f9aa4e1a5ee5293f7
1 /*
2 Unix SMB/CIFS implementation.
3 client security descriptor functions
4 Copyright (C) Andrew Tridgell 2000
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 2 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program; if not, write to the Free Software
18 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
21 #include "includes.h"
23 /****************************************************************************
24 query the security descriptor for a open file
25 ****************************************************************************/
26 SEC_DESC *cli_query_secdesc(struct cli_state *cli, int fnum,
27 TALLOC_CTX *mem_ctx)
29 char param[8];
30 char *rparam=NULL, *rdata=NULL;
31 unsigned int rparam_count=0, rdata_count=0;
32 prs_struct pd;
33 BOOL pd_initialized = False;
34 SEC_DESC *psd = NULL;
36 SIVAL(param, 0, fnum);
37 SIVAL(param, 4, 0x7);
39 if (!cli_send_nt_trans(cli,
40 NT_TRANSACT_QUERY_SECURITY_DESC,
41 0,
42 NULL, 0, 0,
43 param, 8, 4,
44 NULL, 0, 0x10000)) {
45 DEBUG(1,("Failed to send NT_TRANSACT_QUERY_SECURITY_DESC\n"));
46 goto cleanup;
50 if (!cli_receive_nt_trans(cli,
51 &rparam, &rparam_count,
52 &rdata, &rdata_count)) {
53 DEBUG(1,("Failed to recv NT_TRANSACT_QUERY_SECURITY_DESC\n"));
54 goto cleanup;
57 if (cli_is_error(cli))
58 goto cleanup;
60 if (!prs_init(&pd, rdata_count, mem_ctx, UNMARSHALL)) {
61 goto cleanup;
63 pd_initialized = True;
64 prs_copy_data_in(&pd, rdata, rdata_count);
65 prs_set_offset(&pd,0);
67 if (!sec_io_desc("sd data", &psd, &pd, 1)) {
68 DEBUG(1,("Failed to parse secdesc\n"));
69 goto cleanup;
72 cleanup:
74 SAFE_FREE(rparam);
75 SAFE_FREE(rdata);
77 if (pd_initialized)
78 prs_mem_free(&pd);
79 return psd;
82 /****************************************************************************
83 set the security descriptor for a open file
84 ****************************************************************************/
85 BOOL cli_set_secdesc(struct cli_state *cli, int fnum, SEC_DESC *sd)
87 char param[8];
88 char *rparam=NULL, *rdata=NULL;
89 unsigned int rparam_count=0, rdata_count=0;
90 uint32 sec_info = 0;
91 TALLOC_CTX *mem_ctx;
92 prs_struct pd;
93 BOOL ret = False;
95 if ((mem_ctx = talloc_init("cli_set_secdesc")) == NULL) {
96 DEBUG(0,("talloc_init failed.\n"));
97 goto cleanup;
100 prs_init(&pd, 0, mem_ctx, MARSHALL);
101 prs_give_memory(&pd, NULL, 0, True);
103 if (!sec_io_desc("sd data", &sd, &pd, 1)) {
104 DEBUG(1,("Failed to marshall secdesc\n"));
105 goto cleanup;
108 SIVAL(param, 0, fnum);
110 if (sd->off_dacl)
111 sec_info |= DACL_SECURITY_INFORMATION;
112 if (sd->off_owner_sid)
113 sec_info |= OWNER_SECURITY_INFORMATION;
114 if (sd->off_grp_sid)
115 sec_info |= GROUP_SECURITY_INFORMATION;
116 SSVAL(param, 4, sec_info);
118 if (!cli_send_nt_trans(cli,
119 NT_TRANSACT_SET_SECURITY_DESC,
121 NULL, 0, 0,
122 param, 8, 0,
123 prs_data_p(&pd), prs_offset(&pd), 0)) {
124 DEBUG(1,("Failed to send NT_TRANSACT_SET_SECURITY_DESC\n"));
125 goto cleanup;
129 if (!cli_receive_nt_trans(cli,
130 &rparam, &rparam_count,
131 &rdata, &rdata_count)) {
132 DEBUG(1,("NT_TRANSACT_SET_SECURITY_DESC failed\n"));
133 goto cleanup;
136 ret = True;
138 cleanup:
140 SAFE_FREE(rparam);
141 SAFE_FREE(rdata);
143 talloc_destroy(mem_ctx);
145 prs_mem_free(&pd);
146 return ret;