Add some missing HeapFree's and one missing free.
[wine/wine-kai.git] / files / smb.c
blob866650d7b06204b0c9080f9c725d7908448619cc
1 /*
2 * Copyright (C) 2002 Mike McCormack
4 * CIFS implementation for WINE
6 * This is a WINE's implementation of the Common Internet File System
8 * for specification see:
10 * http://www.codefx.com/CIFS_Explained.htm
11 * http://www.ubiqx.org/cifs/rfc-draft/rfc1002.html
12 * http://www.ubiqx.org/cifs/rfc-draft/draft-leach-cifs-v1-spec-02.html
13 * http://ubiqx.org/cifs/
14 * http://www.samba.org
16 * This library is free software; you can redistribute it and/or
17 * modify it under the terms of the GNU Lesser General Public
18 * License as published by the Free Software Foundation; either
19 * version 2.1 of the License, or (at your option) any later version.
21 * This library is distributed in the hope that it will be useful,
22 * but WITHOUT ANY WARRANTY; without even the implied warranty of
23 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
24 * Lesser General Public License for more details.
26 * You should have received a copy of the GNU Lesser General Public
27 * License along with this library; if not, write to the Free Software
28 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
31 * FIXME:
33 * - There is a race condition when two threads try to read from the same
34 * SMB handle. Either we need to lock the SMB handle for the time we
35 * use it in the client, or do all reading and writing to the socket
36 * fd in the server.
38 * - Each new handle opens up a new connection to the SMB server. This
39 * is not ideal, since operations can be multiplexed on one socket. For
40 * this to work properly we would need to have some way of discovering
41 * connections that are already open.
43 * - All access is currently anonymous. Password protected shares cannot
44 * be accessed. We need some way of organising passwords, storing them
45 * in the config file, or putting up a dialog box for the user.
47 * - We don't deal with SMB dialects at all.
49 * - SMB supports passing unicode over the wire, should use this if possible.
51 * - Implement ability to read named pipes over the network. Would require
52 * integrate this code with the named pipes code in the server, and
53 * possibly implementing some support for security tokens.
56 #include "config.h"
57 #include "wine/port.h"
59 #include <assert.h>
60 #include <ctype.h>
61 #include <fcntl.h>
62 #include <stdlib.h>
63 #include <stdio.h>
64 #include <string.h>
65 #include <sys/types.h>
66 #include <sys/stat.h>
67 #ifdef HAVE_SYS_MMAN_H
68 #include <sys/mman.h>
69 #endif
70 #ifdef HAVE_SYS_TIME_H
71 # include <sys/time.h>
72 #endif
73 #ifdef HAVE_SYS_POLL_H
74 # include <sys/poll.h>
75 #endif
76 #include <time.h>
77 #ifdef HAVE_UNISTD_H
78 # include <unistd.h>
79 #endif
80 #ifdef HAVE_UTIME_H
81 # include <utime.h>
82 #endif
83 #ifdef HAVE_SYS_SOCKET_H
84 # include <sys/socket.h>
85 #endif
86 #include <sys/types.h>
87 #ifdef HAVE_NETINET_IN_SYSTM_H
88 #include <netinet/in_systm.h>
89 #endif
90 #ifdef HAVE_NETINET_IN_H
91 #include <netinet/in.h>
92 #endif
93 #ifdef HAVE_NETINET_IP_H
94 #include <netinet/ip.h>
95 #endif
96 #ifdef HAVE_ARPA_INET_H
97 #include <arpa/inet.h>
98 #endif
99 #ifdef HAVE_NETDB_H
100 #include <netdb.h>
101 #endif
103 #include "winerror.h"
104 #include "windef.h"
105 #include "winbase.h"
106 #include "winnls.h"
107 #include "file.h"
109 #include "smb.h"
111 #include "wine/server.h"
112 #include "wine/debug.h"
114 WINE_DEFAULT_DEBUG_CHANNEL(file);
116 #define MAX_HOST_NAME 15
117 #define NB_TIMEOUT 10000
119 USHORT SMB_MultiplexId = 0;
121 struct NB_Buffer
123 unsigned char *buffer;
124 int len;
127 static int netbios_name(const char *p, unsigned char *buffer)
129 char ch;
130 int i,len=0;
132 buffer[len++]=' ';
133 for(i=0; i<=MAX_HOST_NAME; i++)
135 if(i<MAX_HOST_NAME)
137 if(*p)
138 ch = *p++&0xdf; /* add character from hostname */
139 else
140 ch = ' '; /* add padding */
142 else
143 ch = 0; /* add terminator */
144 buffer[len++] = ((ch&0xf0) >> 4) + 'A';
145 buffer[len++] = (ch&0x0f) + 'A';
147 buffer[len++] = 0; /* add second terminator */
148 return len;
151 static DWORD NB_NameReq(LPCSTR host, unsigned char *buffer, int len)
153 int trn = 1234,i=0;
155 NBR_ADDWORD(&buffer[i],trn); i+=2;
156 NBR_ADDWORD(&buffer[i],0x0110); i+=2;
157 NBR_ADDWORD(&buffer[i],0x0001); i+=2;
158 NBR_ADDWORD(&buffer[i],0x0000); i+=2;
159 NBR_ADDWORD(&buffer[i],0x0000); i+=2;
160 NBR_ADDWORD(&buffer[i],0x0000); i+=2;
162 i += netbios_name(host,&buffer[i]);
164 NBR_ADDWORD(&buffer[i],0x0020); i+=2;
165 NBR_ADDWORD(&buffer[i],0x0001); i+=2;
167 TRACE("packet is %d bytes in length\n",i);
170 int j;
171 for(j=0; j<i; j++)
172 printf("%02x%c",buffer[j],(((j+1)%16)&&((j+1)!=j))?' ':'\n');
175 return i;
178 /* unc = \\hostname\share\file... */
179 static BOOL UNC_SplitName(LPSTR unc, LPSTR *hostname, LPSTR *share, LPSTR *file)
181 char *p;
183 TRACE("%s\n",unc);
185 p = strchr(unc,'\\');
186 if(!p)
187 return FALSE;
188 p = strchr(p+1,'\\');
189 if(!p)
190 return FALSE;
191 *hostname=++p;
193 p = strchr(p,'\\');
194 if(!p)
195 return FALSE;
196 *p=0;
197 *share = ++p;
199 p = strchr(p,'\\');
200 if(!p)
201 return FALSE;
202 *p=0;
203 *file = ++p;
205 return TRUE;
208 static BOOL NB_Lookup(LPCSTR host, struct sockaddr_in *addr)
210 int fd,on=1,r,len,i,fromsize;
211 struct pollfd fds;
212 struct sockaddr_in sin,fromaddr;
213 unsigned char buffer[256];
215 fd = socket(PF_INET, SOCK_DGRAM, IPPROTO_UDP);
216 if(fd<0)
217 return FALSE;
219 r = setsockopt(fd, SOL_SOCKET, SO_BROADCAST, &on, sizeof on);
220 if(r<0)
221 goto err;
223 if(0==inet_aton("255.255.255.255", (struct in_addr *)&sin.sin_addr.s_addr))
225 FIXME("Error getting bcast address\n");
226 goto err;
228 sin.sin_family = AF_INET;
229 sin.sin_port = htons(137);
231 len = NB_NameReq(host,buffer,sizeof buffer);
232 if(len<=0)
233 goto err;
235 r = sendto(fd, buffer, len, 0, (struct sockaddr*)&sin, sizeof sin);
236 if(r<0)
238 FIXME("Error sending packet\n");
239 goto err;
242 fds.fd = fd;
243 fds.events = POLLIN;
244 fds.revents = 0;
246 /* FIXME: this is simple and easily fooled logic
247 * we should loop until we receive the correct packet or timeout
249 r = poll(&fds,1,NB_TIMEOUT);
250 if(r!=1)
251 goto err;
253 TRACE("Got response!\n");
255 fromsize = sizeof (fromaddr);
256 r = recvfrom(fd, buffer, sizeof buffer, 0, (struct sockaddr*)&fromaddr, &fromsize);
257 if(r<0)
258 goto err;
260 TRACE("%d bytes received\n",r);
262 if(r!=62)
263 goto err;
265 for(i=0; i<r; i++)
266 DPRINTF("%02X%c",buffer[i],(((i+1)!=r)&&((i+1)%16))?' ':'\n');
267 DPRINTF("\n");
269 if(0x0f & buffer[3])
270 goto err;
272 TRACE("packet is OK\n");
274 memcpy(&addr->sin_addr, &buffer[58], sizeof addr->sin_addr);
276 close(fd);
277 return TRUE;
279 err:
280 close(fd);
281 return FALSE;
284 #define NB_FIRST 0x40
286 #define NB_HDRSIZE 4
288 #define NB_SESSION_MSG 0x00
289 #define NB_SESSION_REQ 0x81
291 /* RFC 1002, section 4.3.2 */
292 static BOOL NB_SessionReq(int fd, char *called, char *calling)
294 unsigned char buffer[0x100];
295 int len = 0,r;
296 struct pollfd fds;
298 TRACE("called %s, calling %s\n",called,calling);
300 buffer[0] = NB_SESSION_REQ;
301 buffer[1] = NB_FIRST;
303 netbios_name(called, &buffer[NB_HDRSIZE]);
304 len += 34;
305 netbios_name(calling, &buffer[NB_HDRSIZE+len]);
306 len += 34;
308 NBR_ADDWORD(&buffer[2],len);
310 /* for(i=0; i<(len+NB_HDRSIZE); i++)
311 DPRINTF("%02X%c",buffer[i],(((i+1)!=(len+4))&&((i+1)%16))?' ':'\n'); */
313 r = write(fd,buffer,len+4);
314 if(r<0)
316 ERR("Write failed\n");
317 return FALSE;
320 fds.fd = fd;
321 fds.events = POLLIN;
322 fds.revents = 0;
324 r = poll(&fds,1,NB_TIMEOUT);
325 if(r!=1)
327 ERR("Poll failed\n");
328 return FALSE;
331 r = read(fd, buffer, NB_HDRSIZE);
332 if((r!=NB_HDRSIZE) || (buffer[0]!=0x82))
334 TRACE("Received %d bytes\n",r);
335 TRACE("%02x %02x %02x %02x\n", buffer[0],buffer[1],buffer[2],buffer[3]);
336 return FALSE;
339 return TRUE;
342 static BOOL NB_SendData(int fd, struct NB_Buffer *out)
344 unsigned char buffer[NB_HDRSIZE];
345 int r;
347 /* CHECK: is it always OK to do this in two writes? */
348 /* perhaps use scatter gather sendmsg instead? */
350 buffer[0] = NB_SESSION_MSG;
351 buffer[1] = NB_FIRST;
352 NBR_ADDWORD(&buffer[2],out->len);
354 r = write(fd, buffer, NB_HDRSIZE);
355 if(r!=NB_HDRSIZE)
356 return FALSE;
358 r = write(fd, out->buffer, out->len);
359 if(r!=out->len)
361 ERR("write failed\n");
362 return FALSE;
365 return TRUE;
368 static BOOL NB_RecvData(int fd, struct NB_Buffer *rx)
370 int r;
371 unsigned char buffer[NB_HDRSIZE];
373 r = read(fd, buffer, NB_HDRSIZE);
374 if((r!=NB_HDRSIZE) || (buffer[0]!=NB_SESSION_MSG))
376 ERR("Received %d bytes\n",r);
377 return FALSE;
380 rx->len = NBR_GETWORD(&buffer[2]);
382 rx->buffer = HeapAlloc(GetProcessHeap(), 0, rx->len);
383 if(!rx->buffer)
384 return FALSE;
386 r = read(fd, rx->buffer, rx->len);
387 if(rx->len!=r)
389 TRACE("Received %d bytes\n",r);
390 HeapFree(GetProcessHeap(), 0, rx->buffer);
391 rx->buffer = 0;
392 rx->len = 0;
393 return FALSE;
396 return TRUE;
399 static BOOL NB_Transaction(int fd, struct NB_Buffer *in, struct NB_Buffer *out)
401 int r;
402 struct pollfd fds;
404 if(TRACE_ON(file))
406 int i;
407 DPRINTF("Sending request:\n");
408 for(i=0; i<in->len; i++)
409 DPRINTF("%02X%c",in->buffer[i],(((i+1)!=in->len)&&((i+1)%16))?' ':'\n');
412 if(!NB_SendData(fd,in))
413 return FALSE;
415 fds.fd = fd;
416 fds.events = POLLIN;
417 fds.revents = 0;
419 r = poll(&fds,1,NB_TIMEOUT);
420 if(r!=1)
422 ERR("Poll failed\n");
423 return FALSE;
426 if(!NB_RecvData(fd, out))
427 return FALSE;
429 if(TRACE_ON(file))
431 int i;
432 DPRINTF("Got response:\n");
433 for(i=0; i<out->len; i++)
434 DPRINTF("%02X%c",out->buffer[i],(((i+1)!=out->len)&&((i+1)%16))?' ':'\n');
437 return TRUE;
440 #define SMB_ADDHEADER(b,l) { b[(l)++]=0xff; b[(l)++]='S'; b[(l)++]='M'; b[(l)++]='B'; }
441 #define SMB_ADDERRINFO(b,l) { b[(l)++]=0; b[(l)++]=0; b[(l)++]=0; b[(l)++]=0; }
442 #define SMB_ADDPADSIG(b,l) { memset(&b[l],0,12); l+=12; }
444 #define SMB_ERRCLASS 5
445 #define SMB_ERRCODE 7
446 #define SMB_TREEID 24
447 #define SMB_PROCID 26
448 #define SMB_USERID 28
449 #define SMB_PLEXID 30
450 #define SMB_PCOUNT 32
451 #define SMB_HDRSIZE 33
453 static DWORD SMB_GetError(unsigned char *buffer)
455 char *err_class;
457 switch(buffer[SMB_ERRCLASS])
459 case 0:
460 return STATUS_SUCCESS;
461 case 1:
462 err_class = "DOS";
463 break;
464 case 2:
465 err_class = "net server";
466 break;
467 case 3:
468 err_class = "hardware";
469 break;
470 case 0xff:
471 err_class = "smb";
472 break;
473 default:
474 err_class = "unknown";
475 break;
478 ERR("%s error %d \n",err_class, buffer[SMB_ERRCODE]);
480 /* FIXME: return propper error codes */
481 return STATUS_INVALID_PARAMETER;
484 static int SMB_Header(unsigned char *buffer, unsigned char command, USHORT tree_id, USHORT user_id)
486 int len = 0;
487 DWORD id;
489 /* 0 */
490 SMB_ADDHEADER(buffer,len);
492 /* 4 */
493 buffer[len++] = command;
495 /* 5 */
496 SMB_ADDERRINFO(buffer,len)
498 /* 9 */
499 buffer[len++] = 0x00; /* flags */
500 SMB_ADDWORD(&buffer[len],1); len += 2; /* flags2 */
502 /* 12 */
503 SMB_ADDPADSIG(buffer,len)
505 /* 24 */
506 SMB_ADDWORD(&buffer[len],tree_id); len += 2; /* treeid */
507 id = GetCurrentThreadId();
508 SMB_ADDWORD(&buffer[len],id); len += 2; /* process id */
509 SMB_ADDWORD(&buffer[len],user_id); len += 2; /* user id */
510 SMB_ADDWORD(&buffer[len],SMB_MultiplexId); len += 2; /* multiplex id */
511 SMB_MultiplexId++;
513 return len;
516 static const char *SMB_ProtocolDialect = "NT LM 0.12";
517 /* = "Windows for Workgroups 3.1a"; */
519 /* FIXME: support multiple SMB dialects */
520 static BOOL SMB_NegotiateProtocol(int fd, USHORT *dialect)
522 unsigned char buf[0x100];
523 int buflen = 0;
524 struct NB_Buffer tx, rx;
526 TRACE("\n");
528 memset(buf,0,sizeof buf);
530 tx.buffer = buf;
531 tx.len = SMB_Header(tx.buffer, SMB_COM_NEGOTIATE, 0, 0);
533 /* parameters */
534 tx.buffer[tx.len++] = 0; /* no parameters */
536 /* command buffer */
537 buflen = strlen(SMB_ProtocolDialect)+2; /* include type and nul byte */
538 SMB_ADDWORD(&tx.buffer[tx.len],buflen); tx.len += 2;
540 tx.buffer[tx.len] = 0x02;
541 strcpy(&tx.buffer[tx.len+1],SMB_ProtocolDialect);
542 tx.len += buflen;
544 rx.buffer = NULL;
545 rx.len = 0;
546 if(!NB_Transaction(fd, &tx, &rx))
548 ERR("Failed\n");
549 return FALSE;
552 if(!rx.buffer)
553 return FALSE;
555 /* FIXME: check response */
556 if(SMB_GetError(rx.buffer))
558 ERR("returned error\n");
559 HeapFree(GetProcessHeap(),0,rx.buffer);
560 return FALSE;
563 HeapFree(GetProcessHeap(),0,rx.buffer);
565 *dialect = 0;
567 return TRUE;
570 #define SMB_PARAM_COUNT(buffer) ((buffer)[SMB_PCOUNT])
571 #define SMB_PARAM(buffer,n) SMB_GETWORD(&(buffer)[SMB_HDRSIZE+2*(n)])
572 #define SMB_BUFFER_COUNT(buffer) SMB_GETWORD(buffer+SMB_HDRSIZE+2*SMB_PARAM_COUNT(buffer))
573 #define SMB_BUFFER(buffer,n) ((buffer)[SMB_HDRSIZE + 2*SMB_PARAM_COUNT(buffer) + 2 + (n) ])
575 static BOOL SMB_SessionSetup(int fd, USHORT *userid)
577 unsigned char buf[0x100];
578 int pcount,bcount;
579 struct NB_Buffer rx, tx;
581 memset(buf,0,sizeof buf);
582 tx.buffer = buf;
584 tx.len = SMB_Header(tx.buffer, SMB_COM_SESSION_SETUP_ANDX, 0, 0);
586 tx.buffer[tx.len++] = 0; /* no parameters? */
588 tx.buffer[tx.len++] = 0xff; /* AndXCommand: secondary request */
589 tx.buffer[tx.len++] = 0x00; /* AndXReserved */
590 SMB_ADDWORD(&tx.buffer[tx.len],0); /* AndXOffset */
591 tx.len += 2;
592 SMB_ADDWORD(&tx.buffer[tx.len],0x400); /* MaxBufferSize */
593 tx.len += 2;
594 SMB_ADDWORD(&tx.buffer[tx.len],1); /* MaxMpxCount */
595 tx.len += 2;
596 SMB_ADDWORD(&tx.buffer[tx.len],0); /* VcNumber */
597 tx.len += 2;
598 SMB_ADDWORD(&tx.buffer[tx.len],0); /* SessionKey */
599 tx.len += 2;
600 SMB_ADDWORD(&tx.buffer[tx.len],0); /* SessionKey */
601 tx.len += 2;
602 SMB_ADDWORD(&tx.buffer[tx.len],0); /* Password length */
603 tx.len += 2;
604 SMB_ADDWORD(&tx.buffer[tx.len],0); /* Reserved */
605 tx.len += 2;
606 SMB_ADDWORD(&tx.buffer[tx.len],0); /* Reserved */
607 tx.len += 2;
609 /* FIXME: add name and password here */
610 tx.buffer[tx.len++] = 0; /* number of bytes in password */
612 rx.buffer = NULL;
613 rx.len = 0;
614 if(!NB_Transaction(fd, &tx, &rx))
615 return FALSE;
617 if(!rx.buffer)
618 return FALSE;
620 if(SMB_GetError(rx.buffer))
621 goto done;
623 pcount = SMB_PARAM_COUNT(rx.buffer);
625 if( (SMB_HDRSIZE+pcount*2) > rx.len )
627 ERR("Bad parameter count %d\n",pcount);
628 goto done;
631 if(TRACE_ON(file))
633 int i;
634 DPRINTF("SMB_COM_SESSION_SETUP response, %d args: ",pcount);
635 for(i=0; i<pcount; i++)
636 DPRINTF("%04x ",SMB_PARAM(rx.buffer,i));
637 DPRINTF("\n");
640 bcount = SMB_BUFFER_COUNT(rx.buffer);
641 if( (SMB_HDRSIZE+pcount*2+2+bcount) > rx.len )
643 ERR("parameter count %x, buffer count %x, len %x\n",pcount,bcount,rx.len);
644 goto done;
647 if(TRACE_ON(file))
649 int i;
650 DPRINTF("response buffer %d bytes: ",bcount);
651 for(i=0; i<bcount; i++)
653 unsigned char ch = SMB_BUFFER(rx.buffer,i);
654 DPRINTF("%c", isprint(ch)?ch:' ');
656 DPRINTF("\n");
659 *userid = SMB_GETWORD(&rx.buffer[SMB_USERID]);
661 HeapFree(GetProcessHeap(),0,rx.buffer);
662 return TRUE;
664 done:
665 HeapFree(GetProcessHeap(),0,rx.buffer);
666 return FALSE;
670 static BOOL SMB_TreeConnect(int fd, USHORT user_id, LPCSTR share_name, USHORT *treeid)
672 unsigned char buf[0x100];
673 int slen;
674 struct NB_Buffer rx,tx;
676 TRACE("%s\n",share_name);
678 memset(buf,0,sizeof buf);
679 tx.buffer = buf;
681 tx.len = SMB_Header(tx.buffer, SMB_COM_TREE_CONNECT, 0, user_id);
683 tx.buffer[tx.len++] = 4; /* parameters */
685 tx.buffer[tx.len++] = 0xff; /* AndXCommand: secondary request */
686 tx.buffer[tx.len++] = 0x00; /* AndXReserved */
687 SMB_ADDWORD(&tx.buffer[tx.len],0); /* AndXOffset */
688 tx.len += 2;
689 SMB_ADDWORD(&tx.buffer[tx.len],0); /* Flags */
690 tx.len += 2;
691 SMB_ADDWORD(&tx.buffer[tx.len],1); /* Password length */
692 tx.len += 2;
694 /* SMB command buffer */
695 SMB_ADDWORD(&tx.buffer[tx.len],3); /* command buffer len */
696 tx.len += 2;
697 tx.buffer[tx.len++] = 0; /* null terminated password */
699 slen = strlen(share_name);
700 if(slen<(sizeof buf-tx.len))
701 strcpy(&tx.buffer[tx.len], share_name);
702 else
703 return FALSE;
704 tx.len += slen+1;
706 /* name of the service */
707 tx.buffer[tx.len++] = 0;
709 rx.buffer = NULL;
710 rx.len = 0;
711 if(!NB_Transaction(fd, &tx, &rx))
712 return FALSE;
714 if(!rx.buffer)
715 return FALSE;
717 if(SMB_GetError(rx.buffer))
719 HeapFree(GetProcessHeap(),0,rx.buffer);
720 return FALSE;
723 *treeid = SMB_GETWORD(&rx.buffer[SMB_TREEID]);
725 HeapFree(GetProcessHeap(),0,rx.buffer);
726 TRACE("OK, treeid = %04x\n", *treeid);
728 return TRUE;
731 #if 0 /* not yet */
732 static BOOL SMB_NtCreateOpen(int fd, USHORT tree_id, USHORT user_id, USHORT dialect,
733 LPCSTR filename, DWORD access, DWORD sharing,
734 LPSECURITY_ATTRIBUTES sa, DWORD creation,
735 DWORD attributes, HANDLE template, USHORT *file_id )
737 unsigned char buffer[0x100];
738 int len = 0,slen;
740 TRACE("%s\n",filename);
742 memset(buffer,0,sizeof buffer);
744 len = SMB_Header(buffer, SMB_COM_NT_CREATE_ANDX, tree_id, user_id);
746 /* 0 */
747 buffer[len++] = 24; /* parameters */
749 buffer[len++] = 0xff; /* AndXCommand: secondary request */
750 buffer[len++] = 0x00; /* AndXReserved */
751 SMB_ADDWORD(&buffer[len],0); len += 2; /* AndXOffset */
753 buffer[len++] = 0; /* reserved */
754 slen = strlen(filename);
755 SMB_ADDWORD(&buffer[len],slen); len += 2; /* name length */
757 /* 0x08 */
758 SMB_ADDDWORD(&buffer[len],0); len += 4; /* flags */
759 SMB_ADDDWORD(&buffer[len],0); len += 4; /* root directory fid */
760 /* 0x10 */
761 SMB_ADDDWORD(&buffer[len],access); len += 4; /* access */
762 SMB_ADDDWORD(&buffer[len],0); len += 4; /* allocation size */
763 /* 0x18 */
764 SMB_ADDDWORD(&buffer[len],0); len += 4; /* root directory fid */
766 /* 0x1c */
767 SMB_ADDDWORD(&buffer[len],0); len += 4; /* initial allocation */
768 SMB_ADDDWORD(&buffer[len],0); len += 4;
770 /* 0x24 */
771 SMB_ADDDWORD(&buffer[len],attributes); len += 4; /* ExtFileAttributes*/
773 /* 0x28 */
774 SMB_ADDDWORD(&buffer[len],sharing); len += 4; /* ShareAccess */
776 /* 0x2c */
777 TRACE("creation = %08lx\n",creation);
778 SMB_ADDDWORD(&buffer[len],creation); len += 4; /* CreateDisposition */
780 /* 0x30 */
781 SMB_ADDDWORD(&buffer[len],creation); len += 4; /* CreateOptions */
783 /* 0x34 */
784 SMB_ADDDWORD(&buffer[len],0); len += 4; /* Impersonation */
786 /* 0x38 */
787 buffer[len++] = 0; /* security flags */
789 /* 0x39 */
790 SMB_ADDWORD(&buffer[len],slen); len += 2; /* size of buffer */
792 if(slen<(sizeof buffer-len))
793 strcpy(&buffer[len], filename);
794 else
795 return FALSE;
796 len += slen+1;
798 /* name of the file */
799 buffer[len++] = 0;
801 if(!NB_Transaction(fd, buffer, len, &len))
802 return FALSE;
804 if(SMB_GetError(buffer))
805 return FALSE;
807 TRACE("OK\n");
809 /* FIXME */
810 /* *file_id = SMB_GETWORD(&buffer[xxx]); */
811 *file_id = 0;
812 return FALSE;
814 return TRUE;
816 #endif
818 static USHORT SMB_GetMode(DWORD access, DWORD sharing)
820 USHORT mode=0;
822 switch(access&(GENERIC_READ|GENERIC_WRITE))
824 case GENERIC_READ:
825 mode |= OF_READ;
826 break;
827 case GENERIC_WRITE:
828 mode |= OF_WRITE;
829 break;
830 case (GENERIC_READ|GENERIC_WRITE):
831 mode |= OF_READWRITE;
832 break;
835 switch(sharing&(FILE_SHARE_READ|FILE_SHARE_WRITE))
837 case (FILE_SHARE_READ|FILE_SHARE_WRITE):
838 mode |= OF_SHARE_DENY_NONE;
839 break;
840 case FILE_SHARE_READ:
841 mode |= OF_SHARE_DENY_WRITE;
842 break;
843 case FILE_SHARE_WRITE:
844 mode |= OF_SHARE_DENY_READ;
845 break;
846 default:
847 mode |= OF_SHARE_EXCLUSIVE;
848 break;
851 return mode;
854 #if 0 /* not yet */
855 /* inverse of FILE_ConvertOFMode */
856 static BOOL SMB_OpenAndX(int fd, USHORT tree_id, USHORT user_id, USHORT dialect,
857 LPCSTR filename, DWORD access, DWORD sharing,
858 DWORD creation, DWORD attributes, USHORT *file_id )
860 unsigned char buffer[0x100];
861 int len = 0;
862 USHORT mode;
864 TRACE("%s\n",filename);
866 mode = SMB_GetMode(access,sharing);
868 memset(buffer,0,sizeof buffer);
870 len = SMB_Header(buffer, SMB_COM_OPEN_ANDX, tree_id, user_id);
872 /* 0 */
873 buffer[len++] = 15; /* parameters */
874 buffer[len++] = 0xff; /* AndXCommand: secondary request */
875 buffer[len++] = 0x00; /* AndXReserved */
876 SMB_ADDWORD(buffer+len,0); len+=2; /* AndXOffset */
877 SMB_ADDWORD(buffer+len,0); len+=2; /* Flags */
878 SMB_ADDWORD(buffer+len,mode); len+=2; /* desired access */
879 SMB_ADDWORD(buffer+len,0); len+=2; /* search attributes */
880 SMB_ADDWORD(buffer+len,0); len+=2;
882 /*FIXME: complete */
883 return FALSE;
885 #endif
888 static BOOL SMB_Open(int fd, USHORT tree_id, USHORT user_id, USHORT dialect,
889 LPCSTR filename, DWORD access, DWORD sharing,
890 DWORD creation, DWORD attributes, USHORT *file_id )
892 unsigned char buf[0x100];
893 int slen,pcount,i;
894 USHORT mode = SMB_GetMode(access,sharing);
895 struct NB_Buffer rx,tx;
897 TRACE("%s\n",filename);
899 memset(buf,0,sizeof buf);
901 tx.buffer = buf;
902 tx.len = SMB_Header(tx.buffer, SMB_COM_OPEN, tree_id, user_id);
904 /* 0 */
905 tx.buffer[tx.len++] = 2; /* parameters */
906 SMB_ADDWORD(tx.buffer+tx.len,mode); tx.len+=2;
907 SMB_ADDWORD(tx.buffer+tx.len,0); tx.len+=2; /* search attributes */
909 slen = strlen(filename)+2; /* inc. nul and BufferFormat */
910 SMB_ADDWORD(tx.buffer+tx.len,slen); tx.len+=2;
912 tx.buffer[tx.len] = 0x04; /* BufferFormat */
913 strcpy(&tx.buffer[tx.len+1],filename);
914 tx.len += slen;
916 rx.buffer = NULL;
917 rx.len = 0;
918 if(!NB_Transaction(fd, &tx, &rx))
919 return FALSE;
921 if(!rx.buffer)
922 return FALSE;
924 if(SMB_GetError(rx.buffer))
925 return FALSE;
927 pcount = SMB_PARAM_COUNT(rx.buffer);
929 if( (SMB_HDRSIZE+pcount*2) > rx.len )
931 ERR("Bad parameter count %d\n",pcount);
932 return FALSE;
935 TRACE("response, %d args: ",pcount);
936 for(i=0; i<pcount; i++)
937 TRACE("%04x ",SMB_PARAM(rx.buffer,i));
938 TRACE("\n");
940 *file_id = SMB_PARAM(rx.buffer,0);
942 TRACE("file_id = %04x\n",*file_id);
944 return TRUE;
948 static BOOL SMB_Read(int fd, USHORT tree_id, USHORT user_id, USHORT dialect,
949 USHORT file_id, DWORD offset, LPVOID out, USHORT count, USHORT* read)
951 int buf_size,n,i;
952 struct NB_Buffer rx,tx;
954 TRACE("user %04x tree %04x file %04x count %04x offset %08lx\n",
955 user_id, tree_id, file_id, count, offset);
957 buf_size = count+0x100;
958 tx.buffer = (unsigned char *) HeapAlloc(GetProcessHeap(),0,buf_size);
960 memset(tx.buffer,0,buf_size);
962 tx.len = SMB_Header(tx.buffer, SMB_COM_READ, tree_id, user_id);
964 tx.buffer[tx.len++] = 5;
965 SMB_ADDWORD(&tx.buffer[tx.len],file_id); tx.len += 2;
966 SMB_ADDWORD(&tx.buffer[tx.len],count); tx.len += 2;
967 SMB_ADDDWORD(&tx.buffer[tx.len],offset); tx.len += 4;
968 SMB_ADDWORD(&tx.buffer[tx.len],0); tx.len += 2; /* how many more bytes will be read */
970 tx.buffer[tx.len++] = 0;
972 rx.buffer = NULL;
973 rx.len = 0;
974 if(!NB_Transaction(fd, &tx, &rx))
976 HeapFree(GetProcessHeap(),0,tx.buffer);
977 return FALSE;
980 if(SMB_GetError(rx.buffer))
982 HeapFree(GetProcessHeap(),0,rx.buffer);
983 HeapFree(GetProcessHeap(),0,tx.buffer);
984 return FALSE;
987 n = SMB_PARAM_COUNT(rx.buffer);
989 if( (SMB_HDRSIZE+n*2) > rx.len )
991 HeapFree(GetProcessHeap(),0,rx.buffer);
992 HeapFree(GetProcessHeap(),0,tx.buffer);
993 ERR("Bad parameter count %d\n",n);
994 return FALSE;
997 TRACE("response, %d args: ",n);
998 for(i=0; i<n; i++)
999 TRACE("%04x ",SMB_PARAM(rx.buffer,i));
1000 TRACE("\n");
1002 n = SMB_PARAM(rx.buffer,5) - 3;
1003 if(n>count)
1004 n=count;
1006 memcpy( out, &SMB_BUFFER(rx.buffer,3), n);
1008 TRACE("Read %d bytes\n",n);
1009 *read = n;
1011 HeapFree(GetProcessHeap(),0,tx.buffer);
1012 HeapFree(GetProcessHeap(),0,rx.buffer);
1014 return TRUE;
1019 * setup_count : number of USHORTs in the setup string
1021 struct SMB_Trans2Info
1023 struct NB_Buffer buf;
1024 unsigned char *setup;
1025 int setup_count;
1026 unsigned char *params;
1027 int param_count;
1028 unsigned char *data;
1029 int data_count;
1033 * Do an SMB transaction
1035 * This function allocates memory in the recv structure. It is
1036 * the caller's responsibility to free the memory if it finds
1037 * that recv->buf.buffer is nonzero.
1039 static BOOL SMB_Transaction2(int fd, int tree_id, int user_id,
1040 struct SMB_Trans2Info *send,
1041 struct SMB_Trans2Info *recv)
1043 int buf_size;
1044 const int retmaxparams = 0xf000;
1045 const int retmaxdata = 1024;
1046 const int retmaxsetup = 0; /* FIXME */
1047 const int flags = 0;
1048 const int timeout = 0;
1049 int param_ofs, data_ofs;
1050 struct NB_Buffer tx;
1051 BOOL ret = FALSE;
1053 buf_size = 0x100 + send->setup_count*2 + send->param_count + send->data_count ;
1054 tx.buffer = (unsigned char *) HeapAlloc(GetProcessHeap(),0,buf_size);
1056 tx.len = SMB_Header(tx.buffer, SMB_COM_TRANSACTION2, tree_id, user_id);
1058 tx.buffer[tx.len++] = 14 + send->setup_count;
1059 SMB_ADDWORD(&tx.buffer[tx.len],send->param_count); /* total param bytes sent */
1060 tx.len += 2;
1061 SMB_ADDWORD(&tx.buffer[tx.len],send->data_count); /* total data bytes sent */
1062 tx.len += 2;
1063 SMB_ADDWORD(&tx.buffer[tx.len],retmaxparams); /*max parameter bytes to return */
1064 tx.len += 2;
1065 SMB_ADDWORD(&tx.buffer[tx.len],retmaxdata); /* max data bytes to return */
1066 tx.len += 2;
1067 tx.buffer[tx.len++] = retmaxsetup;
1068 tx.buffer[tx.len++] = 0; /* reserved1 */
1070 SMB_ADDWORD(&tx.buffer[tx.len],flags); /* flags */
1071 tx.len += 2;
1072 SMB_ADDDWORD(&tx.buffer[tx.len],timeout); /* timeout */
1073 tx.len += 4;
1074 SMB_ADDWORD(&tx.buffer[tx.len],0); /* reserved2 */
1075 tx.len += 2;
1076 SMB_ADDWORD(&tx.buffer[tx.len],send->param_count); /* parameter count - this buffer */
1077 tx.len += 2;
1079 param_ofs = tx.len; /* parameter offset */
1080 tx.len += 2;
1081 SMB_ADDWORD(&tx.buffer[tx.len],send->data_count); /* data count */
1082 tx.len += 2;
1084 data_ofs = tx.len; /* data offset */
1085 tx.len += 2;
1086 tx.buffer[tx.len++] = send->setup_count; /* setup count */
1087 tx.buffer[tx.len++] = 0; /* reserved3 */
1089 memcpy(&tx.buffer[tx.len], send->setup, send->setup_count*2); /* setup */
1090 tx.len += send->setup_count*2;
1092 /* add string here when implementing SMB_COM_TRANS */
1094 SMB_ADDWORD(&tx.buffer[param_ofs], tx.len);
1095 memcpy(&tx.buffer[tx.len], send->params, send->param_count); /* parameters */
1096 tx.len += send->param_count;
1097 if(tx.len%2)
1098 tx.len ++; /* pad2 */
1100 SMB_ADDWORD(&tx.buffer[data_ofs], tx.len);
1101 if(send->data_count && send->data)
1103 memcpy(&tx.buffer[tx.len], send->data, send->data_count); /* data */
1104 tx.len += send->data_count;
1107 recv->buf.buffer = NULL;
1108 recv->buf.len = 0;
1109 if(!NB_Transaction(fd, &tx, &recv->buf))
1110 goto done;
1112 if(!recv->buf.buffer)
1113 goto done;
1115 if(SMB_GetError(recv->buf.buffer))
1116 goto done;
1118 /* reuse these two offsets to check the received message */
1119 param_ofs = SMB_PARAM(recv->buf.buffer,4);
1120 data_ofs = SMB_PARAM(recv->buf.buffer,7);
1122 if( (recv->param_count + param_ofs) > recv->buf.len )
1123 goto done;
1125 if( (recv->data_count + data_ofs) > recv->buf.len )
1126 goto done;
1128 TRACE("Success\n");
1130 recv->setup = NULL;
1131 recv->setup_count = 0;
1133 recv->param_count = SMB_PARAM(recv->buf.buffer,0);
1134 recv->params = &recv->buf.buffer[param_ofs];
1136 recv->data_count = SMB_PARAM(recv->buf.buffer,6);
1137 recv->data = &recv->buf.buffer[data_ofs];
1140 TRACE("%d words\n",SMB_PARAM_COUNT(recv->buf.buffer));
1141 TRACE("total parameters = %d\n",SMB_PARAM(recv->buf.buffer,0));
1142 TRACE("total data = %d\n",SMB_PARAM(recv->buf.buffer,1));
1143 TRACE("parameters = %d\n",SMB_PARAM(recv->buf.buffer,3));
1144 TRACE("parameter offset = %d\n",SMB_PARAM(recv->buf.buffer,4));
1145 TRACE("param displace = %d\n",SMB_PARAM(recv->buf.buffer,5));
1147 TRACE("data count = %d\n",SMB_PARAM(recv->buf.buffer,6));
1148 TRACE("data offset = %d\n",SMB_PARAM(recv->buf.buffer,7));
1149 TRACE("data displace = %d\n",SMB_PARAM(recv->buf.buffer,8));
1152 ret = TRUE;
1154 done:
1155 if(tx.buffer)
1156 HeapFree(GetProcessHeap(),0,tx.buffer);
1158 return ret;
1161 static BOOL SMB_SetupFindFirst(struct SMB_Trans2Info *send, LPSTR filename)
1163 int search_attribs = FILE_ATTRIBUTE_DIRECTORY | FILE_ATTRIBUTE_HIDDEN | FILE_ATTRIBUTE_SYSTEM;
1164 int search_count = 10;
1165 int flags = 0;
1166 int infolevel = 0x104; /* SMB_FILE_BOTH_DIRECTORY_INFO */
1167 int storagetype = 0;
1168 int len, buf_size;
1170 memset(send,0,sizeof send);
1172 send->setup_count = 1;
1173 send->setup = HeapAlloc(GetProcessHeap(),0,send->setup_count*2);
1174 if(!send->setup)
1175 return FALSE;
1177 buf_size = 0x10 + lstrlenA(filename);
1178 send->params = HeapAlloc(GetProcessHeap(),0,buf_size);
1179 if(!send->params)
1181 HeapFree(GetProcessHeap(),0,send->setup);
1182 return FALSE;
1185 SMB_ADDWORD(send->setup,TRANS2_FIND_FIRST2);
1187 len = 0;
1188 memset(send->params,0,buf_size);
1189 SMB_ADDWORD(&send->params[len],search_attribs); len += 2;
1190 SMB_ADDWORD(&send->params[len],search_count); len += 2;
1191 SMB_ADDWORD(&send->params[len],flags); len += 2;
1192 SMB_ADDWORD(&send->params[len],infolevel); len += 2;
1193 SMB_ADDDWORD(&send->params[len],storagetype); len += 4;
1195 strcpy(&send->params[len],filename);
1196 len += lstrlenA(filename)+1;
1198 send->param_count = len;
1199 send->data = NULL;
1200 send->data_count = 0;
1202 return TRUE;
1205 static SMB_DIR *SMB_Trans2FindFirst(int fd, USHORT tree_id,
1206 USHORT user_id, USHORT dialect, LPSTR filename )
1208 int num;
1209 BOOL ret;
1210 /* char *filename = "\\*"; */
1211 struct SMB_Trans2Info send, recv;
1212 SMB_DIR *smbdir = NULL;
1214 TRACE("patern = %s\n",filename);
1216 if(!SMB_SetupFindFirst(&send, filename))
1217 return FALSE;
1219 memset(&recv,0,sizeof recv);
1221 ret = SMB_Transaction2(fd, tree_id, user_id, &send, &recv);
1222 HeapFree(GetProcessHeap(),0,send.params);
1223 HeapFree(GetProcessHeap(),0,send.setup);
1225 if(!ret)
1226 goto done;
1228 if(recv.setup_count)
1229 goto done;
1231 if(recv.param_count != 10)
1232 goto done;
1234 num = SMB_GETWORD(&recv.params[2]);
1235 TRACE("Success, search id: %d\n",num);
1237 if(SMB_GETWORD(&recv.params[4]))
1238 FIXME("need to read more!\n");
1240 smbdir = HeapAlloc(GetProcessHeap(),0,sizeof(*smbdir));
1241 if(smbdir)
1243 int i, ofs=0;
1245 smbdir->current = 0;
1246 smbdir->num_entries = num;
1247 smbdir->entries = HeapAlloc(GetProcessHeap(), 0, sizeof(unsigned char*)*num);
1248 if(!smbdir->entries)
1249 goto done;
1250 smbdir->buffer = recv.buf.buffer; /* save to free later */
1252 for(i=0; i<num; i++)
1254 int size = SMB_GETDWORD(&recv.data[ofs]);
1256 smbdir->entries[i] = &recv.data[ofs];
1258 if(TRACE_ON(file))
1260 int j;
1261 for(j=0; j<size; j++)
1262 DPRINTF("%02x%c",recv.data[ofs+j],((j+1)%16)?' ':'\n');
1264 TRACE("file %d : %s\n", i, &recv.data[ofs+0x5e]);
1265 ofs += size;
1266 if(ofs>recv.data_count)
1267 goto done;
1270 ret = TRUE;
1273 done:
1274 if(!ret)
1276 if( recv.buf.buffer )
1277 HeapFree(GetProcessHeap(),0,recv.buf.buffer);
1278 if( smbdir )
1280 if( smbdir->entries )
1281 HeapFree(GetProcessHeap(),0,smbdir->entries);
1282 HeapFree(GetProcessHeap(),0,smbdir);
1284 smbdir = NULL;
1287 return smbdir;
1290 static int SMB_GetSocket(LPCSTR host)
1292 int fd=-1,r;
1293 struct sockaddr_in sin;
1294 struct hostent *he;
1296 TRACE("host %s\n",host);
1298 he = gethostbyname(host);
1299 if(he)
1301 memcpy(&sin.sin_addr,he->h_addr, sizeof (sin.sin_addr));
1302 goto connect;
1305 if(NB_Lookup(host,&sin))
1306 goto connect;
1308 /* FIXME: resolve by WINS too */
1310 ERR("couldn't resolve SMB host %s\n", host);
1312 return -1;
1314 connect:
1315 sin.sin_family = AF_INET;
1316 sin.sin_port = htons(139); /* netbios session */
1318 fd = socket(PF_INET, SOCK_STREAM, IPPROTO_TCP);
1319 if(fd<0)
1320 return fd;
1323 unsigned char *x = (unsigned char *)&sin.sin_addr;
1324 TRACE("Connecting to %d.%d.%d.%d ...\n", x[0],x[1],x[2],x[3]);
1326 r = connect(fd, (struct sockaddr*)&sin, sizeof sin);
1328 if(!NB_SessionReq(fd, "*SMBSERVER", "WINE"))
1330 close(fd);
1331 return -1;
1334 return fd;
1337 static BOOL SMB_LoginAndConnect(int fd, LPCSTR host, LPCSTR share, USHORT *tree_id, USHORT *user_id, USHORT *dialect)
1339 LPSTR name=NULL;
1341 TRACE("host %s share %s\n",host,share);
1343 if(!SMB_NegotiateProtocol(fd, dialect))
1344 return FALSE;
1346 if(!SMB_SessionSetup(fd, user_id))
1347 return FALSE;
1349 name = HeapAlloc(GetProcessHeap(),0,strlen(host)+strlen(share)+5);
1350 if(!name)
1351 return FALSE;
1353 sprintf(name,"\\\\%s\\%s",host,share);
1354 if(!SMB_TreeConnect(fd,*user_id,name,tree_id))
1356 HeapFree(GetProcessHeap(),0,name);
1357 return FALSE;
1360 return TRUE;
1363 static HANDLE SMB_RegisterFile( int fd, USHORT tree_id, USHORT user_id, USHORT dialect, USHORT file_id)
1365 int r;
1366 HANDLE ret;
1368 wine_server_send_fd( fd );
1370 SERVER_START_REQ( create_smb )
1372 req->tree_id = tree_id;
1373 req->user_id = user_id;
1374 req->file_id = file_id;
1375 req->dialect = 0;
1376 req->fd = fd;
1377 SetLastError(0);
1378 r = wine_server_call_err( req );
1379 ret = reply->handle;
1381 SERVER_END_REQ;
1383 if(!r)
1384 TRACE("created wineserver smb object, handle = %p\n",ret);
1385 else
1386 SetLastError( ERROR_PATH_NOT_FOUND );
1388 return ret;
1391 HANDLE WINAPI SMB_CreateFileW( LPCWSTR uncname, DWORD access, DWORD sharing,
1392 LPSECURITY_ATTRIBUTES sa, DWORD creation,
1393 DWORD attributes, HANDLE template )
1395 int fd;
1396 USHORT tree_id=0, user_id=0, dialect=0, file_id=0;
1397 LPSTR name,host,share,file;
1398 HANDLE handle = INVALID_HANDLE_VALUE;
1399 INT len;
1401 len = WideCharToMultiByte(CP_ACP, 0, uncname, -1, NULL, 0, NULL, NULL);
1402 name = HeapAlloc(GetProcessHeap(), 0, len);
1403 if(!name)
1404 return handle;
1406 WideCharToMultiByte(CP_ACP, 0, uncname, -1, name, len, NULL, NULL);
1408 if( !UNC_SplitName(name, &host, &share, &file) )
1410 HeapFree(GetProcessHeap(),0,name);
1411 return handle;
1414 TRACE("server is %s, share is %s, file is %s\n", host, share, file);
1416 fd = SMB_GetSocket(host);
1417 if(fd < 0)
1418 goto done;
1420 if(!SMB_LoginAndConnect(fd, host, share, &tree_id, &user_id, &dialect))
1421 goto done;
1423 #if 0
1424 if(!SMB_NtCreateOpen(fd, tree_id, user_id, dialect, file,
1425 access, sharing, sa, creation, attributes, template, &file_id ))
1427 close(fd);
1428 ERR("CreateOpen failed\n");
1429 goto done;
1431 #endif
1432 if(!SMB_Open(fd, tree_id, user_id, dialect, file,
1433 access, sharing, creation, attributes, &file_id ))
1435 close(fd);
1436 ERR("CreateOpen failed\n");
1437 goto done;
1440 handle = SMB_RegisterFile(fd, tree_id, user_id, dialect, file_id);
1441 if(!handle)
1443 ERR("register failed\n");
1444 close(fd);
1447 done:
1448 HeapFree(GetProcessHeap(),0,name);
1449 return handle;
1452 static BOOL SMB_GetSmbInfo(HANDLE hFile, USHORT *tree_id, USHORT *user_id, USHORT *dialect, USHORT *file_id, LPDWORD offset)
1454 int r;
1456 SERVER_START_REQ( get_smb_info )
1458 req->handle = hFile;
1459 req->flags = 0;
1460 SetLastError(0);
1461 r = wine_server_call_err( req );
1462 if(tree_id)
1463 *tree_id = reply->tree_id;
1464 if(user_id)
1465 *user_id = reply->user_id;
1466 if(file_id)
1467 *file_id = reply->file_id;
1468 if(dialect)
1469 *dialect = reply->dialect;
1470 if(offset)
1471 *offset = reply->offset;
1473 SERVER_END_REQ;
1475 return !r;
1478 static BOOL SMB_SetOffset(HANDLE hFile, DWORD offset)
1480 int r;
1482 TRACE("offset = %08lx\n",offset);
1484 SERVER_START_REQ( get_smb_info )
1486 req->handle = hFile;
1487 req->flags = SMBINFO_SET_OFFSET;
1488 req->offset = offset;
1489 SetLastError(0);
1490 r = wine_server_call_err( req );
1491 /* if(offset)
1492 *offset = reply->offset; */
1494 SERVER_END_REQ;
1496 return !r;
1499 BOOL WINAPI SMB_ReadFile(HANDLE hFile, LPVOID buffer, DWORD bytesToRead, LPDWORD bytesRead, LPOVERLAPPED lpOverlapped)
1501 int fd;
1502 DWORD total, count, offset;
1503 USHORT user_id, tree_id, dialect, file_id, read;
1504 BOOL r=TRUE;
1506 TRACE("%p %p %ld %p\n", hFile, buffer, bytesToRead, bytesRead);
1508 if(!SMB_GetSmbInfo(hFile, &tree_id, &user_id, &dialect, &file_id, &offset))
1509 return FALSE;
1511 fd = FILE_GetUnixHandle(hFile, GENERIC_READ);
1512 if(fd<0)
1513 return FALSE;
1515 total = 0;
1516 while(1)
1518 count = bytesToRead - total;
1519 if(count>0x400)
1520 count = 0x400;
1521 if(count==0)
1522 break;
1523 read = 0;
1524 r = SMB_Read(fd, tree_id, user_id, dialect, file_id, offset, buffer, count, &read);
1525 if(!r)
1526 break;
1527 if(!read)
1528 break;
1529 total += read;
1530 buffer = (char*)buffer + read;
1531 offset += read;
1532 if(total>=bytesToRead)
1533 break;
1535 close(fd);
1537 if(bytesRead)
1538 *bytesRead = total;
1540 if(!SMB_SetOffset(hFile, offset))
1541 return FALSE;
1543 return r;
1546 SMB_DIR* WINAPI SMB_FindFirst(LPCWSTR name)
1548 int fd = -1;
1549 LPSTR host,share,file;
1550 USHORT tree_id=0, user_id=0, dialect=0;
1551 SMB_DIR *ret = NULL;
1552 LPSTR filename;
1553 DWORD len;
1555 TRACE("Find %s\n",debugstr_w(name));
1557 len = WideCharToMultiByte( CP_ACP, 0, name, -1, NULL, 0, NULL, NULL );
1558 filename = HeapAlloc(GetProcessHeap(),0,len);
1559 if(!filename)
1560 return ret;
1561 WideCharToMultiByte( CP_ACP, 0, name, -1, filename, len, NULL, NULL );
1563 if( !UNC_SplitName(filename, &host, &share, &file) )
1564 goto done;
1566 fd = SMB_GetSocket(host);
1567 if(fd < 0)
1568 goto done;
1570 if(!SMB_LoginAndConnect(fd, host, share, &tree_id, &user_id, &dialect))
1571 goto done;
1573 TRACE("server is %s, share is %s, file is %s\n", host, share, file);
1575 ret = SMB_Trans2FindFirst(fd, tree_id, user_id, dialect, file);
1577 done:
1578 /* disconnect */
1579 if(fd != -1)
1580 close(fd);
1582 if(filename)
1583 HeapFree(GetProcessHeap(),0,filename);
1585 return ret;
1589 BOOL WINAPI SMB_FindNext(SMB_DIR *dir, WIN32_FIND_DATAW *data )
1591 unsigned char *ent;
1592 int len, fnlen;
1594 TRACE("%d of %d\n",dir->current,dir->num_entries);
1596 if(dir->current >= dir->num_entries)
1597 return FALSE;
1599 memset(data, 0, sizeof *data);
1601 ent = dir->entries[dir->current];
1602 len = SMB_GETDWORD(&ent[0]);
1603 if(len<0x5e)
1604 return FALSE;
1606 memcpy(&data->ftCreationTime, &ent[8], 8);
1607 memcpy(&data->ftLastAccessTime, &ent[0x10], 8);
1608 memcpy(&data->ftLastWriteTime, &ent[0x18], 8);
1609 data->nFileSizeHigh = SMB_GETDWORD(&ent[0x30]);
1610 data->nFileSizeLow = SMB_GETDWORD(&ent[0x34]);
1611 data->dwFileAttributes = SMB_GETDWORD(&ent[0x38]);
1613 /* copy the long filename */
1614 fnlen = SMB_GETDWORD(&ent[0x3c]);
1615 if ( fnlen > (sizeof data->cFileName/sizeof(WCHAR)) )
1616 return FALSE;
1617 MultiByteToWideChar( CP_ACP, 0, &ent[0x5e], fnlen, data->cFileName,
1618 sizeof(data->cFileName)/sizeof(WCHAR) );
1620 /* copy the short filename */
1621 if ( ent[0x44] > (sizeof data->cAlternateFileName/sizeof(WCHAR)) )
1622 return FALSE;
1623 MultiByteToWideChar( CP_ACP, 0, &ent[0x5e + len], ent[0x44], data->cAlternateFileName,
1624 sizeof(data->cAlternateFileName)/sizeof(WCHAR) );
1626 dir->current++;
1628 return TRUE;
1631 BOOL WINAPI SMB_CloseDir(SMB_DIR *dir)
1633 HeapFree(GetProcessHeap(),0,dir->buffer);
1634 HeapFree(GetProcessHeap(),0,dir->entries);
1635 memset(dir,0,sizeof *dir);
1636 HeapFree(GetProcessHeap(),0,dir);
1637 return TRUE;