/* The following definitions come from smbd/reply.c */
-bool check_fsp_open(connection_struct *conn, struct smb_request *req,
- files_struct *fsp);
bool check_fsp(connection_struct *conn, struct smb_request *req,
files_struct *fsp);
bool check_fsp_ntquota_handle(connection_struct *conn, struct smb_request *req,
NTSTATUS *err);
size_t srvstr_pull_req_talloc(TALLOC_CTX *ctx, struct smb_request *req,
char **dest, const uint8_t *src, int flags);
+bool check_fsp_open(connection_struct *conn, struct smb_request *req,
+ files_struct *fsp);
/* The following definitions come from smbd/seal.c */
#include "source3/printing/rap_jobid.h"
#include "source3/lib/substitute.h"
-/****************************************************************************
- Check if we have a correct fsp pointing to a file. Basic check for open fsp.
-****************************************************************************/
-
-bool check_fsp_open(connection_struct *conn, struct smb_request *req,
- files_struct *fsp)
-{
- if ((fsp == NULL) || (conn == NULL)) {
- reply_nterror(req, NT_STATUS_INVALID_HANDLE);
- return False;
- }
- if ((conn != fsp->conn) || (req->vuid != fsp->vuid)) {
- reply_nterror(req, NT_STATUS_INVALID_HANDLE);
- return False;
- }
- return True;
-}
-
/****************************************************************************
Check if we have a correct fsp pointing to a file.
****************************************************************************/
return pull_string_talloc(ctx, req->inbuf, req->flags2, dest, src,
bufrem, flags);
}
+
+/****************************************************************************
+ Check if we have a correct fsp pointing to a file. Basic check for open fsp.
+****************************************************************************/
+
+bool check_fsp_open(connection_struct *conn, struct smb_request *req,
+ files_struct *fsp)
+{
+ if ((fsp == NULL) || (conn == NULL)) {
+ reply_nterror(req, NT_STATUS_INVALID_HANDLE);
+ return False;
+ }
+ if ((conn != fsp->conn) || (req->vuid != fsp->vuid)) {
+ reply_nterror(req, NT_STATUS_INVALID_HANDLE);
+ return False;
+ }
+ return True;
+}