Make dskattr async.
[ira/wip.git] / source3 / libsmb / clifile.c
1 /* 
2    Unix SMB/CIFS implementation.
3    client file operations
4    Copyright (C) Andrew Tridgell 1994-1998
5    Copyright (C) Jeremy Allison 2001-2002
6    
7    This program is free software; you can redistribute it and/or modify
8    it under the terms of the GNU General Public License as published by
9    the Free Software Foundation; either version 3 of the License, or
10    (at your option) any later version.
11    
12    This program is distributed in the hope that it will be useful,
13    but WITHOUT ANY WARRANTY; without even the implied warranty of
14    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
15    GNU General Public License for more details.
16    
17    You should have received a copy of the GNU General Public License
18    along with this program.  If not, see <http://www.gnu.org/licenses/>.
19 */
20
21 #include "includes.h"
22
23 /****************************************************************************
24  Hard/Symlink a file (UNIX extensions).
25  Creates new name (sym)linked to oldname.
26 ****************************************************************************/
27
28 static bool cli_link_internal(struct cli_state *cli, const char *oldname, const char *newname, bool hard_link)
29 {
30         unsigned int data_len = 0;
31         unsigned int param_len = 0;
32         uint16 setup = TRANSACT2_SETPATHINFO;
33         char *param;
34         char *data;
35         char *rparam=NULL, *rdata=NULL;
36         char *p;
37         size_t oldlen = 2*(strlen(oldname)+1);
38         size_t newlen = 2*(strlen(newname)+1);
39
40         param = SMB_MALLOC_ARRAY(char, 6+newlen+2);
41
42         if (!param) {
43                 return false;
44         }
45
46         data = SMB_MALLOC_ARRAY(char, oldlen+2);
47
48         if (!data) {
49                 SAFE_FREE(param);
50                 return false;
51         }
52
53         SSVAL(param,0,hard_link ? SMB_SET_FILE_UNIX_HLINK : SMB_SET_FILE_UNIX_LINK);
54         SIVAL(param,2,0);
55         p = &param[6];
56
57         p += clistr_push(cli, p, newname, newlen, STR_TERMINATE);
58         param_len = PTR_DIFF(p, param);
59
60         p = data;
61         p += clistr_push(cli, p, oldname, oldlen, STR_TERMINATE);
62         data_len = PTR_DIFF(p, data);
63
64         if (!cli_send_trans(cli, SMBtrans2,
65                         NULL,                        /* name */
66                         -1, 0,                          /* fid, flags */
67                         &setup, 1, 0,                   /* setup, length, max */
68                         param, param_len, 2,            /* param, length, max */
69                         data,  data_len, cli->max_xmit /* data, length, max */
70                         )) {
71                 SAFE_FREE(data);
72                 SAFE_FREE(param);
73                 return false;
74         }
75
76         SAFE_FREE(data);
77         SAFE_FREE(param);
78
79         if (!cli_receive_trans(cli, SMBtrans2,
80                         &rparam, &param_len,
81                         &rdata, &data_len)) {
82                         return false;
83         }
84
85         SAFE_FREE(data);
86         SAFE_FREE(param);
87         SAFE_FREE(rdata);
88         SAFE_FREE(rparam);
89
90         return true;
91 }
92
93 /****************************************************************************
94  Map standard UNIX permissions onto wire representations.
95 ****************************************************************************/
96
97 uint32 unix_perms_to_wire(mode_t perms)
98 {
99         unsigned int ret = 0;
100
101         ret |= ((perms & S_IXOTH) ?  UNIX_X_OTH : 0);
102         ret |= ((perms & S_IWOTH) ?  UNIX_W_OTH : 0);
103         ret |= ((perms & S_IROTH) ?  UNIX_R_OTH : 0);
104         ret |= ((perms & S_IXGRP) ?  UNIX_X_GRP : 0);
105         ret |= ((perms & S_IWGRP) ?  UNIX_W_GRP : 0);
106         ret |= ((perms & S_IRGRP) ?  UNIX_R_GRP : 0);
107         ret |= ((perms & S_IXUSR) ?  UNIX_X_USR : 0);
108         ret |= ((perms & S_IWUSR) ?  UNIX_W_USR : 0);
109         ret |= ((perms & S_IRUSR) ?  UNIX_R_USR : 0);
110 #ifdef S_ISVTX
111         ret |= ((perms & S_ISVTX) ?  UNIX_STICKY : 0);
112 #endif
113 #ifdef S_ISGID
114         ret |= ((perms & S_ISGID) ?  UNIX_SET_GID : 0);
115 #endif
116 #ifdef S_ISUID
117         ret |= ((perms & S_ISUID) ?  UNIX_SET_UID : 0);
118 #endif
119         return ret;
120 }
121
122 /****************************************************************************
123  Map wire permissions to standard UNIX.
124 ****************************************************************************/
125
126 mode_t wire_perms_to_unix(uint32 perms)
127 {
128         mode_t ret = (mode_t)0;
129
130         ret |= ((perms & UNIX_X_OTH) ? S_IXOTH : 0);
131         ret |= ((perms & UNIX_W_OTH) ? S_IWOTH : 0);
132         ret |= ((perms & UNIX_R_OTH) ? S_IROTH : 0);
133         ret |= ((perms & UNIX_X_GRP) ? S_IXGRP : 0);
134         ret |= ((perms & UNIX_W_GRP) ? S_IWGRP : 0);
135         ret |= ((perms & UNIX_R_GRP) ? S_IRGRP : 0);
136         ret |= ((perms & UNIX_X_USR) ? S_IXUSR : 0);
137         ret |= ((perms & UNIX_W_USR) ? S_IWUSR : 0);
138         ret |= ((perms & UNIX_R_USR) ? S_IRUSR : 0);
139 #ifdef S_ISVTX
140         ret |= ((perms & UNIX_STICKY) ? S_ISVTX : 0);
141 #endif
142 #ifdef S_ISGID
143         ret |= ((perms & UNIX_SET_GID) ? S_ISGID : 0);
144 #endif
145 #ifdef S_ISUID
146         ret |= ((perms & UNIX_SET_UID) ? S_ISUID : 0);
147 #endif
148         return ret;
149 }
150
151 /****************************************************************************
152  Return the file type from the wire filetype for UNIX extensions.
153 ****************************************************************************/
154
155 static mode_t unix_filetype_from_wire(uint32 wire_type)
156 {
157         switch (wire_type) {
158                 case UNIX_TYPE_FILE:
159                         return S_IFREG;
160                 case UNIX_TYPE_DIR:
161                         return S_IFDIR;
162 #ifdef S_IFLNK
163                 case UNIX_TYPE_SYMLINK:
164                         return S_IFLNK;
165 #endif
166 #ifdef S_IFCHR
167                 case UNIX_TYPE_CHARDEV:
168                         return S_IFCHR;
169 #endif
170 #ifdef S_IFBLK
171                 case UNIX_TYPE_BLKDEV:
172                         return S_IFBLK;
173 #endif
174 #ifdef S_IFIFO
175                 case UNIX_TYPE_FIFO:
176                         return S_IFIFO;
177 #endif
178 #ifdef S_IFSOCK
179                 case UNIX_TYPE_SOCKET:
180                         return S_IFSOCK;
181 #endif
182                 default:
183                         return (mode_t)0;
184         }
185 }
186
187 /****************************************************************************
188  Do a POSIX getfacl (UNIX extensions).
189 ****************************************************************************/
190
191 bool cli_unix_getfacl(struct cli_state *cli, const char *name, size_t *prb_size, char **retbuf)
192 {
193         unsigned int param_len = 0;
194         unsigned int data_len = 0;
195         uint16 setup = TRANSACT2_QPATHINFO;
196         char *param;
197         size_t nlen = 2*(strlen(name)+1);
198         char *rparam=NULL, *rdata=NULL;
199         char *p;
200
201         param = SMB_MALLOC_ARRAY(char, 6+nlen+2);
202         if (!param) {
203                 return false;
204         }
205
206         p = param;
207         memset(p, '\0', 6);
208         SSVAL(p, 0, SMB_QUERY_POSIX_ACL);
209         p += 6;
210         p += clistr_push(cli, p, name, nlen, STR_TERMINATE);
211         param_len = PTR_DIFF(p, param);
212
213         if (!cli_send_trans(cli, SMBtrans2,
214                 NULL,                        /* name */
215                 -1, 0,                       /* fid, flags */
216                 &setup, 1, 0,                /* setup, length, max */
217                 param, param_len, 2,         /* param, length, max */
218                 NULL,  0, cli->max_xmit      /* data, length, max */
219                 )) {
220                 SAFE_FREE(param);
221                 return false;
222         }
223
224         SAFE_FREE(param);
225
226         if (!cli_receive_trans(cli, SMBtrans2,
227                         &rparam, &param_len,
228                         &rdata, &data_len)) {
229                 return false;
230         }
231
232         if (data_len < 6) {
233                 SAFE_FREE(rdata);
234                 SAFE_FREE(rparam);
235                 return false;
236         }
237
238         SAFE_FREE(rparam);
239         *retbuf = rdata;
240         *prb_size = (size_t)data_len;
241
242         return true;
243 }
244
245 /****************************************************************************
246  Stat a file (UNIX extensions).
247 ****************************************************************************/
248
249 bool cli_unix_stat(struct cli_state *cli, const char *name, SMB_STRUCT_STAT *sbuf)
250 {
251         unsigned int param_len = 0;
252         unsigned int data_len = 0;
253         uint16 setup = TRANSACT2_QPATHINFO;
254         char *param;
255         size_t nlen = 2*(strlen(name)+1);
256         char *rparam=NULL, *rdata=NULL;
257         char *p;
258
259         ZERO_STRUCTP(sbuf);
260
261         param = SMB_MALLOC_ARRAY(char, 6+nlen+2);
262         if (!param) {
263                 return false;
264         }
265         p = param;
266         memset(p, '\0', 6);
267         SSVAL(p, 0, SMB_QUERY_FILE_UNIX_BASIC);
268         p += 6;
269         p += clistr_push(cli, p, name, nlen, STR_TERMINATE);
270         param_len = PTR_DIFF(p, param);
271
272         if (!cli_send_trans(cli, SMBtrans2,
273                         NULL,                        /* name */
274                         -1, 0,                       /* fid, flags */
275                         &setup, 1, 0,                /* setup, length, max */
276                         param, param_len, 2,         /* param, length, max */
277                         NULL,  0, cli->max_xmit      /* data, length, max */
278                         )) {
279                 SAFE_FREE(param);
280                 return false;
281         }
282
283         SAFE_FREE(param);
284
285         if (!cli_receive_trans(cli, SMBtrans2,
286                         &rparam, &param_len,
287                         &rdata, &data_len)) {
288                 return false;
289         }
290
291         if (data_len < 96) {
292                 SAFE_FREE(rdata);
293                 SAFE_FREE(rparam);
294                 return false;
295         }
296
297         sbuf->st_size = IVAL2_TO_SMB_BIG_UINT(rdata,0);     /* total size, in bytes */
298         sbuf->st_blocks = IVAL2_TO_SMB_BIG_UINT(rdata,8);   /* number of blocks allocated */
299 #if defined (HAVE_STAT_ST_BLOCKS) && defined(STAT_ST_BLOCKSIZE)
300         sbuf->st_blocks /= STAT_ST_BLOCKSIZE;
301 #else
302         /* assume 512 byte blocks */
303         sbuf->st_blocks /= 512;
304 #endif
305         set_ctimespec(sbuf, interpret_long_date(rdata + 16));    /* time of last change */
306         set_atimespec(sbuf, interpret_long_date(rdata + 24));    /* time of last access */
307         set_mtimespec(sbuf, interpret_long_date(rdata + 32));    /* time of last modification */
308
309         sbuf->st_uid = (uid_t) IVAL(rdata,40);      /* user ID of owner */
310         sbuf->st_gid = (gid_t) IVAL(rdata,48);      /* group ID of owner */
311         sbuf->st_mode |= unix_filetype_from_wire(IVAL(rdata, 56));
312 #if defined(HAVE_MAKEDEV)
313         {
314                 uint32 dev_major = IVAL(rdata,60);
315                 uint32 dev_minor = IVAL(rdata,68);
316                 sbuf->st_rdev = makedev(dev_major, dev_minor);
317         }
318 #endif
319         sbuf->st_ino = (SMB_INO_T)IVAL2_TO_SMB_BIG_UINT(rdata,76);      /* inode */
320         sbuf->st_mode |= wire_perms_to_unix(IVAL(rdata,84));     /* protection */
321         sbuf->st_nlink = IVAL(rdata,92);    /* number of hard links */
322
323         SAFE_FREE(rdata);
324         SAFE_FREE(rparam);
325
326         return true;
327 }
328
329 /****************************************************************************
330  Symlink a file (UNIX extensions).
331 ****************************************************************************/
332
333 bool cli_unix_symlink(struct cli_state *cli, const char *oldname, const char *newname)
334 {
335         return cli_link_internal(cli, oldname, newname, False);
336 }
337
338 /****************************************************************************
339  Hard a file (UNIX extensions).
340 ****************************************************************************/
341
342 bool cli_unix_hardlink(struct cli_state *cli, const char *oldname, const char *newname)
343 {
344         return cli_link_internal(cli, oldname, newname, True);
345 }
346
347 /****************************************************************************
348  Chmod or chown a file internal (UNIX extensions).
349 ****************************************************************************/
350
351 static bool cli_unix_chmod_chown_internal(struct cli_state *cli, const char *fname, uint32 mode, uint32 uid, uint32 gid)
352 {
353         unsigned int data_len = 0;
354         unsigned int param_len = 0;
355         uint16 setup = TRANSACT2_SETPATHINFO;
356         size_t nlen = 2*(strlen(fname)+1);
357         char *param;
358         char data[100];
359         char *rparam=NULL, *rdata=NULL;
360         char *p;
361
362         param = SMB_MALLOC_ARRAY(char, 6+nlen+2);
363         if (!param) {
364                 return false;
365         }
366         memset(param, '\0', 6);
367         memset(data, 0, sizeof(data));
368
369         SSVAL(param,0,SMB_SET_FILE_UNIX_BASIC);
370         p = &param[6];
371
372         p += clistr_push(cli, p, fname, nlen, STR_TERMINATE);
373         param_len = PTR_DIFF(p, param);
374
375         memset(data, 0xff, 40); /* Set all sizes/times to no change. */
376
377         SIVAL(data,40,uid);
378         SIVAL(data,48,gid);
379         SIVAL(data,84,mode);
380
381         data_len = 100;
382
383         if (!cli_send_trans(cli, SMBtrans2,
384                         NULL,                        /* name */
385                         -1, 0,                          /* fid, flags */
386                         &setup, 1, 0,                   /* setup, length, max */
387                         param, param_len, 2,            /* param, length, max */
388                         (char *)&data,  data_len, cli->max_xmit /* data, length, max */
389                         )) {
390                 SAFE_FREE(param);
391                 return False;
392         }
393
394         SAFE_FREE(param);
395
396         if (!cli_receive_trans(cli, SMBtrans2,
397                         &rparam, &param_len,
398                         &rdata, &data_len)) {
399                 return false;
400         }
401
402         SAFE_FREE(rdata);
403         SAFE_FREE(rparam);
404
405         return true;
406 }
407
408 /****************************************************************************
409  chmod a file (UNIX extensions).
410 ****************************************************************************/
411
412 bool cli_unix_chmod(struct cli_state *cli, const char *fname, mode_t mode)
413 {
414         return cli_unix_chmod_chown_internal(cli, fname,
415                 unix_perms_to_wire(mode), SMB_UID_NO_CHANGE, SMB_GID_NO_CHANGE);
416 }
417
418 /****************************************************************************
419  chown a file (UNIX extensions).
420 ****************************************************************************/
421
422 bool cli_unix_chown(struct cli_state *cli, const char *fname, uid_t uid, gid_t gid)
423 {
424         return cli_unix_chmod_chown_internal(cli, fname,
425                         SMB_MODE_NO_CHANGE, (uint32)uid, (uint32)gid);
426 }
427
428 /****************************************************************************
429  Rename a file.
430 ****************************************************************************/
431
432 bool cli_rename(struct cli_state *cli, const char *fname_src, const char *fname_dst)
433 {
434         char *p;
435
436         memset(cli->outbuf,'\0',smb_size);
437         memset(cli->inbuf,'\0',smb_size);
438
439         cli_set_message(cli->outbuf,1, 0, true);
440
441         SCVAL(cli->outbuf,smb_com,SMBmv);
442         SSVAL(cli->outbuf,smb_tid,cli->cnum);
443         cli_setup_packet(cli);
444
445         SSVAL(cli->outbuf,smb_vwv0,aSYSTEM | aHIDDEN | aDIR);
446
447         p = smb_buf(cli->outbuf);
448         *p++ = 4;
449         p += clistr_push(cli, p, fname_src,
450                         cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
451         *p++ = 4;
452         p += clistr_push(cli, p, fname_dst,
453                         cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
454
455         cli_setup_bcc(cli, p);
456
457         cli_send_smb(cli);
458         if (!cli_receive_smb(cli)) {
459                 return false;
460         }
461
462         if (cli_is_error(cli)) {
463                 return false;
464         }
465
466         return true;
467 }
468
469 /****************************************************************************
470  NT Rename a file.
471 ****************************************************************************/
472
473 bool cli_ntrename(struct cli_state *cli, const char *fname_src, const char *fname_dst)
474 {
475         char *p;
476
477         memset(cli->outbuf,'\0',smb_size);
478         memset(cli->inbuf,'\0',smb_size);
479
480         cli_set_message(cli->outbuf, 4, 0, true);
481
482         SCVAL(cli->outbuf,smb_com,SMBntrename);
483         SSVAL(cli->outbuf,smb_tid,cli->cnum);
484         cli_setup_packet(cli);
485
486         SSVAL(cli->outbuf,smb_vwv0,aSYSTEM | aHIDDEN | aDIR);
487         SSVAL(cli->outbuf,smb_vwv1, RENAME_FLAG_RENAME);
488
489         p = smb_buf(cli->outbuf);
490         *p++ = 4;
491         p += clistr_push(cli, p, fname_src,
492                         cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
493         *p++ = 4;
494         p += clistr_push(cli, p, fname_dst,
495                         cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
496
497         cli_setup_bcc(cli, p);
498
499         cli_send_smb(cli);
500         if (!cli_receive_smb(cli)) {
501                 return false;
502         }
503
504         if (cli_is_error(cli)) {
505                 return false;
506         }
507
508         return true;
509 }
510
511 /****************************************************************************
512  NT hardlink a file.
513 ****************************************************************************/
514
515 bool cli_nt_hardlink(struct cli_state *cli, const char *fname_src, const char *fname_dst)
516 {
517         char *p;
518
519         memset(cli->outbuf,'\0',smb_size);
520         memset(cli->inbuf,'\0',smb_size);
521
522         cli_set_message(cli->outbuf, 4, 0, true);
523
524         SCVAL(cli->outbuf,smb_com,SMBntrename);
525         SSVAL(cli->outbuf,smb_tid,cli->cnum);
526         cli_setup_packet(cli);
527
528         SSVAL(cli->outbuf,smb_vwv0,aSYSTEM | aHIDDEN | aDIR);
529         SSVAL(cli->outbuf,smb_vwv1, RENAME_FLAG_HARD_LINK);
530
531         p = smb_buf(cli->outbuf);
532         *p++ = 4;
533         p += clistr_push(cli, p, fname_src,
534                         cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
535         *p++ = 4;
536         p += clistr_push(cli, p, fname_dst,
537                         cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
538
539         cli_setup_bcc(cli, p);
540
541         cli_send_smb(cli);
542         if (!cli_receive_smb(cli)) {
543                 return false;
544         }
545
546         if (cli_is_error(cli)) {
547                 return false;
548         }
549
550         return true;
551 }
552
553 /****************************************************************************
554  Delete a file.
555 ****************************************************************************/
556
557 bool cli_unlink_full(struct cli_state *cli, const char *fname, uint16 attrs)
558 {
559         char *p;
560
561         memset(cli->outbuf,'\0',smb_size);
562         memset(cli->inbuf,'\0',smb_size);
563
564         cli_set_message(cli->outbuf,1, 0, true);
565
566         SCVAL(cli->outbuf,smb_com,SMBunlink);
567         SSVAL(cli->outbuf,smb_tid,cli->cnum);
568         cli_setup_packet(cli);
569
570         SSVAL(cli->outbuf,smb_vwv0, attrs);
571
572         p = smb_buf(cli->outbuf);
573         *p++ = 4;
574         p += clistr_push(cli, p, fname,
575                         cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
576
577         cli_setup_bcc(cli, p);
578         cli_send_smb(cli);
579         if (!cli_receive_smb(cli)) {
580                 return false;
581         }
582
583         if (cli_is_error(cli)) {
584                 return false;
585         }
586
587         return true;
588 }
589
590 /****************************************************************************
591  Delete a file.
592 ****************************************************************************/
593
594 bool cli_unlink(struct cli_state *cli, const char *fname)
595 {
596         return cli_unlink_full(cli, fname, aSYSTEM | aHIDDEN);
597 }
598
599 /****************************************************************************
600  Create a directory.
601 ****************************************************************************/
602
603 static void cli_mkdir_done(struct tevent_req *subreq);
604
605 struct cli_mkdir_state {
606         int dummy;
607 };
608
609 struct tevent_req *cli_mkdir_send(TALLOC_CTX *mem_ctx,
610                                   struct event_context *ev,
611                                   struct cli_state *cli,
612                                   const char *dname)
613 {
614         struct tevent_req *req = NULL, *subreq = NULL;
615         struct cli_mkdir_state *state = NULL;
616         uint8_t additional_flags = 0;
617         uint8_t *bytes = NULL;
618
619         req = tevent_req_create(mem_ctx, &state, struct cli_mkdir_state);
620         if (req == NULL) {
621                 return NULL;
622         }
623
624         bytes = talloc_array(state, uint8_t, 1);
625         if (tevent_req_nomem(bytes, req)) {
626                 return tevent_req_post(req, ev);
627         }
628         bytes[0] = 4;
629         bytes = smb_bytes_push_str(bytes, cli_ucs2(cli), dname,
630                                    strlen(dname)+1, NULL);
631
632         if (tevent_req_nomem(bytes, req)) {
633                 return tevent_req_post(req, ev);
634         }
635
636         subreq = cli_smb_send(state, ev, cli, SMBmkdir, additional_flags,
637                               0, NULL, talloc_get_size(bytes), bytes);
638         if (tevent_req_nomem(subreq, req)) {
639                 return tevent_req_post(req, ev);
640         }
641         tevent_req_set_callback(subreq, cli_mkdir_done, req);
642         return req;
643 }
644
645 static void cli_mkdir_done(struct tevent_req *subreq)
646 {
647         struct tevent_req *req = tevent_req_callback_data(
648                 subreq, struct tevent_req);
649         NTSTATUS status;
650
651         status = cli_smb_recv(subreq, 0, NULL, NULL, NULL, NULL);
652         TALLOC_FREE(subreq);
653         if (!NT_STATUS_IS_OK(status)) {
654                 tevent_req_nterror(req, status);
655                 return;
656         }
657         tevent_req_done(req);
658 }
659
660 NTSTATUS cli_mkdir_recv(struct tevent_req *req)
661 {
662         return tevent_req_simple_recv_ntstatus(req);
663 }
664
665 NTSTATUS cli_mkdir(struct cli_state *cli, const char *dname)
666 {
667         TALLOC_CTX *frame = talloc_stackframe();
668         struct event_context *ev;
669         struct tevent_req *req;
670         NTSTATUS status = NT_STATUS_OK;
671
672         if (cli_has_async_calls(cli)) {
673                 /*
674                  * Can't use sync call while an async call is in flight
675                  */
676                 status = NT_STATUS_INVALID_PARAMETER;
677                 goto fail;
678         }
679
680         ev = event_context_init(frame);
681         if (ev == NULL) {
682                 status = NT_STATUS_NO_MEMORY;
683                 goto fail;
684         }
685
686         req = cli_mkdir_send(frame, ev, cli, dname);
687         if (req == NULL) {
688                 status = NT_STATUS_NO_MEMORY;
689                 goto fail;
690         }
691
692         if (!tevent_req_poll(req, ev)) {
693                 status = map_nt_error_from_unix(errno);
694                 goto fail;
695         }
696
697         status = cli_mkdir_recv(req);
698
699  fail:
700         TALLOC_FREE(frame);
701         if (!NT_STATUS_IS_OK(status)) {
702                 cli_set_error(cli, status);
703         }
704         return status;
705 }
706
707 /****************************************************************************
708  Remove a directory.
709 ****************************************************************************/
710
711 static void cli_rmdir_done(struct tevent_req *subreq);
712
713 struct cli_rmdir_state {
714         int dummy;
715 };
716
717 struct tevent_req *cli_rmdir_send(TALLOC_CTX *mem_ctx,
718                                   struct event_context *ev,
719                                   struct cli_state *cli,
720                                   const char *dname)
721 {
722         struct tevent_req *req = NULL, *subreq = NULL;
723         struct cli_rmdir_state *state = NULL;
724         uint8_t additional_flags = 0;
725         uint8_t *bytes = NULL;
726
727         req = tevent_req_create(mem_ctx, &state, struct cli_rmdir_state);
728         if (req == NULL) {
729                 return NULL;
730         }
731
732         bytes = talloc_array(state, uint8_t, 1);
733         if (tevent_req_nomem(bytes, req)) {
734                 return tevent_req_post(req, ev);
735         }
736         bytes[0] = 4;
737         bytes = smb_bytes_push_str(bytes, cli_ucs2(cli), dname,
738                                    strlen(dname)+1, NULL);
739
740         if (tevent_req_nomem(bytes, req)) {
741                 return tevent_req_post(req, ev);
742         }
743
744         subreq = cli_smb_send(state, ev, cli, SMBrmdir, additional_flags,
745                               0, NULL, talloc_get_size(bytes), bytes);
746         if (tevent_req_nomem(subreq, req)) {
747                 return tevent_req_post(req, ev);
748         }
749         tevent_req_set_callback(subreq, cli_rmdir_done, req);
750         return req;
751 }
752
753 static void cli_rmdir_done(struct tevent_req *subreq)
754 {
755         struct tevent_req *req = tevent_req_callback_data(
756                 subreq, struct tevent_req);
757         NTSTATUS status;
758
759         status = cli_smb_recv(subreq, 0, NULL, NULL, NULL, NULL);
760         TALLOC_FREE(subreq);
761         if (!NT_STATUS_IS_OK(status)) {
762                 tevent_req_nterror(req, status);
763                 return;
764         }
765         tevent_req_done(req);
766 }
767
768 NTSTATUS cli_rmdir_recv(struct tevent_req *req)
769 {
770         return tevent_req_simple_recv_ntstatus(req);
771 }
772
773 NTSTATUS cli_rmdir(struct cli_state *cli, const char *dname)
774 {
775         TALLOC_CTX *frame = talloc_stackframe();
776         struct event_context *ev;
777         struct tevent_req *req;
778         NTSTATUS status = NT_STATUS_OK;
779
780         if (cli_has_async_calls(cli)) {
781                 /*
782                  * Can't use sync call while an async call is in flight
783                  */
784                 status = NT_STATUS_INVALID_PARAMETER;
785                 goto fail;
786         }
787
788         ev = event_context_init(frame);
789         if (ev == NULL) {
790                 status = NT_STATUS_NO_MEMORY;
791                 goto fail;
792         }
793
794         req = cli_rmdir_send(frame, ev, cli, dname);
795         if (req == NULL) {
796                 status = NT_STATUS_NO_MEMORY;
797                 goto fail;
798         }
799
800         if (!tevent_req_poll(req, ev)) {
801                 status = map_nt_error_from_unix(errno);
802                 goto fail;
803         }
804
805         status = cli_rmdir_recv(req);
806
807  fail:
808         TALLOC_FREE(frame);
809         if (!NT_STATUS_IS_OK(status)) {
810                 cli_set_error(cli, status);
811         }
812         return status;
813 }
814
815 /****************************************************************************
816  Set or clear the delete on close flag.
817 ****************************************************************************/
818
819 int cli_nt_delete_on_close(struct cli_state *cli, int fnum, bool flag)
820 {
821         unsigned int data_len = 1;
822         unsigned int param_len = 6;
823         uint16 setup = TRANSACT2_SETFILEINFO;
824         char param[6];
825         unsigned char data;
826         char *rparam=NULL, *rdata=NULL;
827
828         memset(param, 0, param_len);
829         SSVAL(param,0,fnum);
830         SSVAL(param,2,SMB_SET_FILE_DISPOSITION_INFO);
831
832         data = flag ? 1 : 0;
833
834         if (!cli_send_trans(cli, SMBtrans2,
835                         NULL,                        /* name */
836                         -1, 0,                          /* fid, flags */
837                         &setup, 1, 0,                   /* setup, length, max */
838                         param, param_len, 2,            /* param, length, max */
839                         (char *)&data,  data_len, cli->max_xmit /* data, length, max */
840                         )) {
841                 return false;
842         }
843
844         if (!cli_receive_trans(cli, SMBtrans2,
845                         &rparam, &param_len,
846                         &rdata, &data_len)) {
847                 return false;
848         }
849
850         SAFE_FREE(rdata);
851         SAFE_FREE(rparam);
852
853         return true;
854 }
855
856 /****************************************************************************
857  Open a file - exposing the full horror of the NT API :-).
858  Used in smbtorture.
859 ****************************************************************************/
860
861 int cli_nt_create_full(struct cli_state *cli, const char *fname,
862                        uint32 CreatFlags, uint32 DesiredAccess,
863                        uint32 FileAttributes, uint32 ShareAccess,
864                        uint32 CreateDisposition, uint32 CreateOptions,
865                        uint8 SecurityFlags)
866 {
867         char *p;
868         int len;
869
870         memset(cli->outbuf,'\0',smb_size);
871         memset(cli->inbuf,'\0',smb_size);
872
873         cli_set_message(cli->outbuf,24,0, true);
874
875         SCVAL(cli->outbuf,smb_com,SMBntcreateX);
876         SSVAL(cli->outbuf,smb_tid,cli->cnum);
877         cli_setup_packet(cli);
878
879         SSVAL(cli->outbuf,smb_vwv0,0xFF);
880         if (cli->use_oplocks)
881                 CreatFlags |= (REQUEST_OPLOCK|REQUEST_BATCH_OPLOCK);
882
883         SIVAL(cli->outbuf,smb_ntcreate_Flags, CreatFlags);
884         SIVAL(cli->outbuf,smb_ntcreate_RootDirectoryFid, 0x0);
885         SIVAL(cli->outbuf,smb_ntcreate_DesiredAccess, DesiredAccess);
886         SIVAL(cli->outbuf,smb_ntcreate_FileAttributes, FileAttributes);
887         SIVAL(cli->outbuf,smb_ntcreate_ShareAccess, ShareAccess);
888         SIVAL(cli->outbuf,smb_ntcreate_CreateDisposition, CreateDisposition);
889         SIVAL(cli->outbuf,smb_ntcreate_CreateOptions, CreateOptions);
890         SIVAL(cli->outbuf,smb_ntcreate_ImpersonationLevel, 0x02);
891         SCVAL(cli->outbuf,smb_ntcreate_SecurityFlags, SecurityFlags);
892
893         p = smb_buf(cli->outbuf);
894         /* this alignment and termination is critical for netapp filers. Don't change */
895         p += clistr_align_out(cli, p, 0);
896         len = clistr_push(cli, p, fname,
897                         cli->bufsize - PTR_DIFF(p,cli->outbuf), 0);
898         p += len;
899         SSVAL(cli->outbuf,smb_ntcreate_NameLength, len);
900         /* sigh. this copes with broken netapp filer behaviour */
901         p += clistr_push(cli, p, "",
902                         cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
903
904         cli_setup_bcc(cli, p);
905
906         cli_send_smb(cli);
907         if (!cli_receive_smb(cli)) {
908                 return -1;
909         }
910
911         if (cli_is_error(cli)) {
912                 return -1;
913         }
914
915         return SVAL(cli->inbuf,smb_vwv2 + 1);
916 }
917
918 struct cli_ntcreate_state {
919         uint16_t vwv[24];
920         uint16_t fnum;
921 };
922
923 static void cli_ntcreate_done(struct tevent_req *subreq);
924
925 struct tevent_req *cli_ntcreate_send(TALLOC_CTX *mem_ctx,
926                                      struct event_context *ev,
927                                      struct cli_state *cli,
928                                      const char *fname,
929                                      uint32_t CreatFlags,
930                                      uint32_t DesiredAccess,
931                                      uint32_t FileAttributes,
932                                      uint32_t ShareAccess,
933                                      uint32_t CreateDisposition,
934                                      uint32_t CreateOptions,
935                                      uint8_t SecurityFlags)
936 {
937         struct tevent_req *req, *subreq;
938         struct cli_ntcreate_state *state;
939         uint16_t *vwv;
940         uint8_t *bytes;
941         size_t converted_len;
942
943         req = tevent_req_create(mem_ctx, &state, struct cli_ntcreate_state);
944         if (req == NULL) {
945                 return NULL;
946         }
947         vwv = state->vwv;
948
949         SCVAL(vwv+0, 0, 0xFF);
950         SCVAL(vwv+0, 1, 0);
951         SSVAL(vwv+1, 0, 0);
952         SCVAL(vwv+2, 0, 0);
953
954         if (cli->use_oplocks) {
955                 CreatFlags |= (REQUEST_OPLOCK|REQUEST_BATCH_OPLOCK);
956         }
957         SIVAL(vwv+3, 1, CreatFlags);
958         SIVAL(vwv+5, 1, 0x0);   /* RootDirectoryFid */
959         SIVAL(vwv+7, 1, DesiredAccess);
960         SIVAL(vwv+9, 1, 0x0);   /* AllocationSize */
961         SIVAL(vwv+11, 1, 0x0);  /* AllocationSize */
962         SIVAL(vwv+13, 1, FileAttributes);
963         SIVAL(vwv+15, 1, ShareAccess);
964         SIVAL(vwv+17, 1, CreateDisposition);
965         SIVAL(vwv+19, 1, CreateOptions);
966         SIVAL(vwv+21, 1, 0x02); /* ImpersonationLevel */
967         SCVAL(vwv+23, 1, SecurityFlags);
968
969         bytes = talloc_array(state, uint8_t, 0);
970         bytes = smb_bytes_push_str(bytes, cli_ucs2(cli),
971                                    fname, strlen(fname)+1,
972                                    &converted_len);
973
974         /* sigh. this copes with broken netapp filer behaviour */
975         bytes = smb_bytes_push_str(bytes, cli_ucs2(cli), "", 1, NULL);
976
977         if (tevent_req_nomem(bytes, req)) {
978                 return tevent_req_post(req, ev);
979         }
980
981         SIVAL(vwv+2, 1, converted_len);
982
983         subreq = cli_smb_send(state, ev, cli, SMBntcreateX, 0, 24, vwv,
984                               talloc_get_size(bytes), bytes);
985         if (tevent_req_nomem(subreq, req)) {
986                 return tevent_req_post(req, ev);
987         }
988         tevent_req_set_callback(subreq, cli_ntcreate_done, req);
989         return req;
990 }
991
992 static void cli_ntcreate_done(struct tevent_req *subreq)
993 {
994         struct tevent_req *req = tevent_req_callback_data(
995                 subreq, struct tevent_req);
996         struct cli_ntcreate_state *state = tevent_req_data(
997                 req, struct cli_ntcreate_state);
998         uint8_t wct;
999         uint16_t *vwv;
1000         uint32_t num_bytes;
1001         uint8_t *bytes;
1002         NTSTATUS status;
1003
1004         status = cli_smb_recv(subreq, 3, &wct, &vwv, &num_bytes, &bytes);
1005         if (!NT_STATUS_IS_OK(status)) {
1006                 TALLOC_FREE(subreq);
1007                 tevent_req_nterror(req, status);
1008                 return;
1009         }
1010         state->fnum = SVAL(vwv+2, 1);
1011         tevent_req_done(req);
1012 }
1013
1014 NTSTATUS cli_ntcreate_recv(struct tevent_req *req, uint16_t *pfnum)
1015 {
1016         struct cli_ntcreate_state *state = tevent_req_data(
1017                 req, struct cli_ntcreate_state);
1018         NTSTATUS status;
1019
1020         if (tevent_req_is_nterror(req, &status)) {
1021                 return status;
1022         }
1023         *pfnum = state->fnum;
1024         return NT_STATUS_OK;
1025 }
1026
1027 NTSTATUS cli_ntcreate(struct cli_state *cli,
1028                       const char *fname,
1029                       uint32_t CreatFlags,
1030                       uint32_t DesiredAccess,
1031                       uint32_t FileAttributes,
1032                       uint32_t ShareAccess,
1033                       uint32_t CreateDisposition,
1034                       uint32_t CreateOptions,
1035                       uint8_t SecurityFlags,
1036                       uint16_t *pfid)
1037 {
1038         TALLOC_CTX *frame = talloc_stackframe();
1039         struct event_context *ev;
1040         struct tevent_req *req;
1041         NTSTATUS status = NT_STATUS_OK;
1042
1043         if (cli_has_async_calls(cli)) {
1044                 /*
1045                  * Can't use sync call while an async call is in flight
1046                  */
1047                 status = NT_STATUS_INVALID_PARAMETER;
1048                 goto fail;
1049         }
1050
1051         ev = event_context_init(frame);
1052         if (ev == NULL) {
1053                 status = NT_STATUS_NO_MEMORY;
1054                 goto fail;
1055         }
1056
1057         req = cli_ntcreate_send(frame, ev, cli, fname, CreatFlags,
1058                                 DesiredAccess, FileAttributes, ShareAccess,
1059                                 CreateDisposition, CreateOptions,
1060                                 SecurityFlags);
1061         if (req == NULL) {
1062                 status = NT_STATUS_NO_MEMORY;
1063                 goto fail;
1064         }
1065
1066         if (!tevent_req_poll(req, ev)) {
1067                 status = map_nt_error_from_unix(errno);
1068                 goto fail;
1069         }
1070
1071         status = cli_ntcreate_recv(req, pfid);
1072  fail:
1073         TALLOC_FREE(frame);
1074         if (!NT_STATUS_IS_OK(status)) {
1075                 cli_set_error(cli, status);
1076         }
1077         return status;
1078 }
1079
1080 /****************************************************************************
1081  Open a file.
1082 ****************************************************************************/
1083
1084 int cli_nt_create(struct cli_state *cli, const char *fname, uint32 DesiredAccess)
1085 {
1086         return cli_nt_create_full(cli, fname, 0, DesiredAccess, 0,
1087                                 FILE_SHARE_READ|FILE_SHARE_WRITE, FILE_OPEN, 0x0, 0x0);
1088 }
1089
1090 uint8_t *smb_bytes_push_str(uint8_t *buf, bool ucs2,
1091                             const char *str, size_t str_len,
1092                             size_t *pconverted_size)
1093 {
1094         size_t buflen;
1095         char *converted;
1096         size_t converted_size;
1097
1098         if (buf == NULL) {
1099                 return NULL;
1100         }
1101
1102         buflen = talloc_get_size(buf);
1103         /*
1104          * We're pushing into an SMB buffer, align odd
1105          */
1106         if (ucs2 && (buflen % 2 == 0)) {
1107                 buf = TALLOC_REALLOC_ARRAY(NULL, buf, uint8_t, buflen + 1);
1108                 if (buf == NULL) {
1109                         return NULL;
1110                 }
1111                 buf[buflen] = '\0';
1112                 buflen += 1;
1113         }
1114
1115         if (!convert_string_talloc(talloc_tos(), CH_UNIX,
1116                                    ucs2 ? CH_UTF16LE : CH_DOS,
1117                                    str, str_len, &converted,
1118                                    &converted_size, true)) {
1119                 return NULL;
1120         }
1121
1122         buf = TALLOC_REALLOC_ARRAY(NULL, buf, uint8_t,
1123                                    buflen + converted_size);
1124         if (buf == NULL) {
1125                 TALLOC_FREE(converted);
1126                 return NULL;
1127         }
1128
1129         memcpy(buf + buflen, converted, converted_size);
1130
1131         TALLOC_FREE(converted);
1132
1133         if (pconverted_size) {
1134                 *pconverted_size = converted_size;
1135         }
1136
1137         return buf;
1138 }
1139
1140 /****************************************************************************
1141  Open a file
1142  WARNING: if you open with O_WRONLY then getattrE won't work!
1143 ****************************************************************************/
1144
1145 struct cli_open_state {
1146         uint16_t vwv[15];
1147         int fnum;
1148         struct iovec bytes;
1149 };
1150
1151 static void cli_open_done(struct tevent_req *subreq);
1152
1153 struct tevent_req *cli_open_create(TALLOC_CTX *mem_ctx,
1154                                    struct event_context *ev,
1155                                    struct cli_state *cli, const char *fname,
1156                                    int flags, int share_mode,
1157                                    struct tevent_req **psmbreq)
1158 {
1159         struct tevent_req *req, *subreq;
1160         struct cli_open_state *state;
1161         unsigned openfn;
1162         unsigned accessmode;
1163         uint8_t additional_flags;
1164         uint8_t *bytes;
1165
1166         req = tevent_req_create(mem_ctx, &state, struct cli_open_state);
1167         if (req == NULL) {
1168                 return NULL;
1169         }
1170
1171         openfn = 0;
1172         if (flags & O_CREAT) {
1173                 openfn |= (1<<4);
1174         }
1175         if (!(flags & O_EXCL)) {
1176                 if (flags & O_TRUNC)
1177                         openfn |= (1<<1);
1178                 else
1179                         openfn |= (1<<0);
1180         }
1181
1182         accessmode = (share_mode<<4);
1183
1184         if ((flags & O_ACCMODE) == O_RDWR) {
1185                 accessmode |= 2;
1186         } else if ((flags & O_ACCMODE) == O_WRONLY) {
1187                 accessmode |= 1;
1188         }
1189
1190 #if defined(O_SYNC)
1191         if ((flags & O_SYNC) == O_SYNC) {
1192                 accessmode |= (1<<14);
1193         }
1194 #endif /* O_SYNC */
1195
1196         if (share_mode == DENY_FCB) {
1197                 accessmode = 0xFF;
1198         }
1199
1200         SCVAL(state->vwv + 0, 0, 0xFF);
1201         SCVAL(state->vwv + 0, 1, 0);
1202         SSVAL(state->vwv + 1, 0, 0);
1203         SSVAL(state->vwv + 2, 0, 0);  /* no additional info */
1204         SSVAL(state->vwv + 3, 0, accessmode);
1205         SSVAL(state->vwv + 4, 0, aSYSTEM | aHIDDEN);
1206         SSVAL(state->vwv + 5, 0, 0);
1207         SIVAL(state->vwv + 6, 0, 0);
1208         SSVAL(state->vwv + 8, 0, openfn);
1209         SIVAL(state->vwv + 9, 0, 0);
1210         SIVAL(state->vwv + 11, 0, 0);
1211         SIVAL(state->vwv + 13, 0, 0);
1212
1213         additional_flags = 0;
1214
1215         if (cli->use_oplocks) {
1216                 /* if using oplocks then ask for a batch oplock via
1217                    core and extended methods */
1218                 additional_flags =
1219                         FLAG_REQUEST_OPLOCK|FLAG_REQUEST_BATCH_OPLOCK;
1220                 SSVAL(state->vwv+2, 0, SVAL(state->vwv+2, 0) | 6);
1221         }
1222
1223         bytes = talloc_array(state, uint8_t, 0);
1224         bytes = smb_bytes_push_str(bytes, cli_ucs2(cli), fname,
1225                                    strlen(fname)+1, NULL);
1226
1227         if (tevent_req_nomem(bytes, req)) {
1228                 return tevent_req_post(req, ev);
1229         }
1230
1231         state->bytes.iov_base = bytes;
1232         state->bytes.iov_len = talloc_get_size(bytes);
1233
1234         subreq = cli_smb_req_create(state, ev, cli, SMBopenX, additional_flags,
1235                                     15, state->vwv, 1, &state->bytes);
1236         if (subreq == NULL) {
1237                 TALLOC_FREE(req);
1238                 return NULL;
1239         }
1240         tevent_req_set_callback(subreq, cli_open_done, req);
1241         *psmbreq = subreq;
1242         return req;
1243 }
1244
1245 struct tevent_req *cli_open_send(TALLOC_CTX *mem_ctx, struct event_context *ev,
1246                                  struct cli_state *cli, const char *fname,
1247                                  int flags, int share_mode)
1248 {
1249         struct tevent_req *req, *subreq;
1250
1251         req = cli_open_create(mem_ctx, ev, cli, fname, flags, share_mode,
1252                               &subreq);
1253         if ((req == NULL) || !cli_smb_req_send(subreq)) {
1254                 TALLOC_FREE(req);
1255                 return NULL;
1256         }
1257         return req;
1258 }
1259
1260 static void cli_open_done(struct tevent_req *subreq)
1261 {
1262         struct tevent_req *req = tevent_req_callback_data(
1263                 subreq, struct tevent_req);
1264         struct cli_open_state *state = tevent_req_data(
1265                 req, struct cli_open_state);
1266         uint8_t wct;
1267         uint16_t *vwv;
1268         NTSTATUS status;
1269
1270         status = cli_smb_recv(subreq, 3, &wct, &vwv, NULL, NULL);
1271         if (!NT_STATUS_IS_OK(status)) {
1272                 TALLOC_FREE(subreq);
1273                 tevent_req_nterror(req, status);
1274                 return;
1275         }
1276         state->fnum = SVAL(vwv+2, 0);
1277         tevent_req_done(req);
1278 }
1279
1280 NTSTATUS cli_open_recv(struct tevent_req *req, int *fnum)
1281 {
1282         struct cli_open_state *state = tevent_req_data(
1283                 req, struct cli_open_state);
1284         NTSTATUS status;
1285
1286         if (tevent_req_is_nterror(req, &status)) {
1287                 return status;
1288         }
1289         *fnum = state->fnum;
1290         return NT_STATUS_OK;
1291 }
1292
1293 int cli_open(struct cli_state *cli, const char *fname, int flags,
1294              int share_mode)
1295 {
1296         TALLOC_CTX *frame = talloc_stackframe();
1297         struct event_context *ev;
1298         struct tevent_req *req;
1299         NTSTATUS status = NT_STATUS_OK;
1300         int result = -1;
1301
1302         if (cli_has_async_calls(cli)) {
1303                 /*
1304                  * Can't use sync call while an async call is in flight
1305                  */
1306                 status = NT_STATUS_INVALID_PARAMETER;
1307                 goto fail;
1308         }
1309
1310         ev = event_context_init(frame);
1311         if (ev == NULL) {
1312                 status = NT_STATUS_NO_MEMORY;
1313                 goto fail;
1314         }
1315
1316         req = cli_open_send(frame, ev, cli, fname, flags, share_mode);
1317         if (req == NULL) {
1318                 status = NT_STATUS_NO_MEMORY;
1319                 goto fail;
1320         }
1321
1322         if (!tevent_req_poll(req, ev)) {
1323                 status = map_nt_error_from_unix(errno);
1324                 goto fail;
1325         }
1326
1327         cli_open_recv(req, &result);
1328  fail:
1329         TALLOC_FREE(frame);
1330         if (!NT_STATUS_IS_OK(status)) {
1331                 cli_set_error(cli, status);
1332         }
1333         return result;
1334 }
1335
1336 /****************************************************************************
1337  Close a file.
1338 ****************************************************************************/
1339
1340 struct cli_close_state {
1341         uint16_t vwv[3];
1342 };
1343
1344 static void cli_close_done(struct tevent_req *subreq);
1345
1346 struct tevent_req *cli_close_create(TALLOC_CTX *mem_ctx,
1347                                     struct event_context *ev,
1348                                     struct cli_state *cli, int fnum,
1349                                     struct tevent_req **psubreq)
1350 {
1351         struct tevent_req *req, *subreq;
1352         struct cli_close_state *state;
1353
1354         req = tevent_req_create(mem_ctx, &state, struct cli_close_state);
1355         if (req == NULL) {
1356                 return NULL;
1357         }
1358         SSVAL(state->vwv+0, 0, fnum);
1359         SIVALS(state->vwv+1, 0, -1);
1360
1361         subreq = cli_smb_req_create(state, ev, cli, SMBclose, 0, 3, state->vwv,
1362                                     0, NULL);
1363         if (subreq == NULL) {
1364                 TALLOC_FREE(req);
1365                 return NULL;
1366         }
1367         tevent_req_set_callback(subreq, cli_close_done, req);
1368         *psubreq = subreq;
1369         return req;
1370 }
1371
1372 struct tevent_req *cli_close_send(TALLOC_CTX *mem_ctx,
1373                                   struct event_context *ev,
1374                                   struct cli_state *cli, int fnum)
1375 {
1376         struct tevent_req *req, *subreq;
1377
1378         req = cli_close_create(mem_ctx, ev, cli, fnum, &subreq);
1379         if ((req == NULL) || !cli_smb_req_send(subreq)) {
1380                 TALLOC_FREE(req);
1381                 return NULL;
1382         }
1383         return req;
1384 }
1385
1386 static void cli_close_done(struct tevent_req *subreq)
1387 {
1388         struct tevent_req *req = tevent_req_callback_data(
1389                 subreq, struct tevent_req);
1390         NTSTATUS status;
1391
1392         status = cli_smb_recv(subreq, 0, NULL, NULL, NULL, NULL);
1393         TALLOC_FREE(subreq);
1394         if (!NT_STATUS_IS_OK(status)) {
1395                 tevent_req_nterror(req, status);
1396                 return;
1397         }
1398         tevent_req_done(req);
1399 }
1400
1401 NTSTATUS cli_close_recv(struct tevent_req *req)
1402 {
1403         return tevent_req_simple_recv_ntstatus(req);
1404 }
1405
1406 bool cli_close(struct cli_state *cli, int fnum)
1407 {
1408         TALLOC_CTX *frame = talloc_stackframe();
1409         struct event_context *ev;
1410         struct tevent_req *req;
1411         NTSTATUS status = NT_STATUS_OK;
1412         bool result = false;
1413
1414         if (cli_has_async_calls(cli)) {
1415                 /*
1416                  * Can't use sync call while an async call is in flight
1417                  */
1418                 status = NT_STATUS_INVALID_PARAMETER;
1419                 goto fail;
1420         }
1421
1422         ev = event_context_init(frame);
1423         if (ev == NULL) {
1424                 status = NT_STATUS_NO_MEMORY;
1425                 goto fail;
1426         }
1427
1428         req = cli_close_send(frame, ev, cli, fnum);
1429         if (req == NULL) {
1430                 status = NT_STATUS_NO_MEMORY;
1431                 goto fail;
1432         }
1433
1434         if (!tevent_req_poll(req, ev)) {
1435                 status = map_nt_error_from_unix(errno);
1436                 goto fail;
1437         }
1438
1439         result = NT_STATUS_IS_OK(cli_close_recv(req));
1440  fail:
1441         TALLOC_FREE(frame);
1442         if (!NT_STATUS_IS_OK(status)) {
1443                 cli_set_error(cli, status);
1444         }
1445         return result;
1446 }
1447
1448 /****************************************************************************
1449  Truncate a file to a specified size
1450 ****************************************************************************/
1451
1452 bool cli_ftruncate(struct cli_state *cli, int fnum, uint64_t size)
1453 {
1454         unsigned int param_len = 6;
1455         unsigned int data_len = 8;
1456         uint16 setup = TRANSACT2_SETFILEINFO;
1457         char param[6];
1458         unsigned char data[8];
1459         char *rparam=NULL, *rdata=NULL;
1460         int saved_timeout = cli->timeout;
1461
1462         SSVAL(param,0,fnum);
1463         SSVAL(param,2,SMB_SET_FILE_END_OF_FILE_INFO);
1464         SSVAL(param,4,0);
1465
1466         SBVAL(data, 0, size);
1467
1468         if (!cli_send_trans(cli, SMBtrans2,
1469                             NULL,                    /* name */
1470                             -1, 0,                   /* fid, flags */
1471                             &setup, 1, 0,            /* setup, length, max */
1472                             param, param_len, 2,     /* param, length, max */
1473                             (char *)&data,  data_len,/* data, length, ... */
1474                             cli->max_xmit)) {        /* ... max */
1475                 cli->timeout = saved_timeout;
1476                 return False;
1477         }
1478
1479         if (!cli_receive_trans(cli, SMBtrans2,
1480                                 &rparam, &param_len,
1481                                 &rdata, &data_len)) {
1482                 cli->timeout = saved_timeout;
1483                 SAFE_FREE(rdata);
1484                 SAFE_FREE(rparam);
1485                 return False;
1486         }
1487
1488         cli->timeout = saved_timeout;
1489
1490         SAFE_FREE(rdata);
1491         SAFE_FREE(rparam);
1492
1493         return True;
1494 }
1495
1496
1497 /****************************************************************************
1498  send a lock with a specified locktype
1499  this is used for testing LOCKING_ANDX_CANCEL_LOCK
1500 ****************************************************************************/
1501
1502 NTSTATUS cli_locktype(struct cli_state *cli, int fnum,
1503                       uint32 offset, uint32 len,
1504                       int timeout, unsigned char locktype)
1505 {
1506         char *p;
1507         int saved_timeout = cli->timeout;
1508
1509         memset(cli->outbuf,'\0',smb_size);
1510         memset(cli->inbuf,'\0', smb_size);
1511
1512         cli_set_message(cli->outbuf,8,0,True);
1513
1514         SCVAL(cli->outbuf,smb_com,SMBlockingX);
1515         SSVAL(cli->outbuf,smb_tid,cli->cnum);
1516         cli_setup_packet(cli);
1517
1518         SCVAL(cli->outbuf,smb_vwv0,0xFF);
1519         SSVAL(cli->outbuf,smb_vwv2,fnum);
1520         SCVAL(cli->outbuf,smb_vwv3,locktype);
1521         SIVALS(cli->outbuf, smb_vwv4, timeout);
1522         SSVAL(cli->outbuf,smb_vwv6,0);
1523         SSVAL(cli->outbuf,smb_vwv7,1);
1524
1525         p = smb_buf(cli->outbuf);
1526         SSVAL(p, 0, cli->pid);
1527         SIVAL(p, 2, offset);
1528         SIVAL(p, 6, len);
1529
1530         p += 10;
1531
1532         cli_setup_bcc(cli, p);
1533
1534         cli_send_smb(cli);
1535
1536         if (timeout != 0) {
1537                 cli->timeout = (timeout == -1) ? 0x7FFFFFFF : (timeout + 2*1000);
1538         }
1539
1540         if (!cli_receive_smb(cli)) {
1541                 cli->timeout = saved_timeout;
1542                 return NT_STATUS_UNSUCCESSFUL;
1543         }
1544
1545         cli->timeout = saved_timeout;
1546
1547         return cli_nt_error(cli);
1548 }
1549
1550 /****************************************************************************
1551  Lock a file.
1552  note that timeout is in units of 2 milliseconds
1553 ****************************************************************************/
1554
1555 bool cli_lock(struct cli_state *cli, int fnum,
1556               uint32 offset, uint32 len, int timeout, enum brl_type lock_type)
1557 {
1558         char *p;
1559         int saved_timeout = cli->timeout;
1560
1561         memset(cli->outbuf,'\0',smb_size);
1562         memset(cli->inbuf,'\0', smb_size);
1563
1564         cli_set_message(cli->outbuf,8,0,True);
1565
1566         SCVAL(cli->outbuf,smb_com,SMBlockingX);
1567         SSVAL(cli->outbuf,smb_tid,cli->cnum);
1568         cli_setup_packet(cli);
1569
1570         SCVAL(cli->outbuf,smb_vwv0,0xFF);
1571         SSVAL(cli->outbuf,smb_vwv2,fnum);
1572         SCVAL(cli->outbuf,smb_vwv3,(lock_type == READ_LOCK? 1 : 0));
1573         SIVALS(cli->outbuf, smb_vwv4, timeout);
1574         SSVAL(cli->outbuf,smb_vwv6,0);
1575         SSVAL(cli->outbuf,smb_vwv7,1);
1576
1577         p = smb_buf(cli->outbuf);
1578         SSVAL(p, 0, cli->pid);
1579         SIVAL(p, 2, offset);
1580         SIVAL(p, 6, len);
1581
1582         p += 10;
1583
1584         cli_setup_bcc(cli, p);
1585
1586         cli_send_smb(cli);
1587
1588         if (timeout != 0) {
1589                 cli->timeout = (timeout == -1) ? 0x7FFFFFFF : (timeout*2 + 5*1000);
1590         }
1591
1592         if (!cli_receive_smb(cli)) {
1593                 cli->timeout = saved_timeout;
1594                 return False;
1595         }
1596
1597         cli->timeout = saved_timeout;
1598
1599         if (cli_is_error(cli)) {
1600                 return False;
1601         }
1602
1603         return True;
1604 }
1605
1606 /****************************************************************************
1607  Unlock a file.
1608 ****************************************************************************/
1609
1610 bool cli_unlock(struct cli_state *cli, int fnum, uint32 offset, uint32 len)
1611 {
1612         char *p;
1613
1614         memset(cli->outbuf,'\0',smb_size);
1615         memset(cli->inbuf,'\0',smb_size);
1616
1617         cli_set_message(cli->outbuf,8,0,True);
1618
1619         SCVAL(cli->outbuf,smb_com,SMBlockingX);
1620         SSVAL(cli->outbuf,smb_tid,cli->cnum);
1621         cli_setup_packet(cli);
1622
1623         SCVAL(cli->outbuf,smb_vwv0,0xFF);
1624         SSVAL(cli->outbuf,smb_vwv2,fnum);
1625         SCVAL(cli->outbuf,smb_vwv3,0);
1626         SIVALS(cli->outbuf, smb_vwv4, 0);
1627         SSVAL(cli->outbuf,smb_vwv6,1);
1628         SSVAL(cli->outbuf,smb_vwv7,0);
1629
1630         p = smb_buf(cli->outbuf);
1631         SSVAL(p, 0, cli->pid);
1632         SIVAL(p, 2, offset);
1633         SIVAL(p, 6, len);
1634         p += 10;
1635         cli_setup_bcc(cli, p);
1636         cli_send_smb(cli);
1637         if (!cli_receive_smb(cli)) {
1638                 return False;
1639         }
1640
1641         if (cli_is_error(cli)) {
1642                 return False;
1643         }
1644
1645         return True;
1646 }
1647
1648 /****************************************************************************
1649  Lock a file with 64 bit offsets.
1650 ****************************************************************************/
1651
1652 bool cli_lock64(struct cli_state *cli, int fnum,
1653                 uint64_t offset, uint64_t len, int timeout, enum brl_type lock_type)
1654 {
1655         char *p;
1656         int saved_timeout = cli->timeout;
1657         int ltype;
1658
1659         if (! (cli->capabilities & CAP_LARGE_FILES)) {
1660                 return cli_lock(cli, fnum, offset, len, timeout, lock_type);
1661         }
1662
1663         ltype = (lock_type == READ_LOCK? 1 : 0);
1664         ltype |= LOCKING_ANDX_LARGE_FILES;
1665
1666         memset(cli->outbuf,'\0',smb_size);
1667         memset(cli->inbuf,'\0', smb_size);
1668
1669         cli_set_message(cli->outbuf,8,0,True);
1670
1671         SCVAL(cli->outbuf,smb_com,SMBlockingX);
1672         SSVAL(cli->outbuf,smb_tid,cli->cnum);
1673         cli_setup_packet(cli);
1674
1675         SCVAL(cli->outbuf,smb_vwv0,0xFF);
1676         SSVAL(cli->outbuf,smb_vwv2,fnum);
1677         SCVAL(cli->outbuf,smb_vwv3,ltype);
1678         SIVALS(cli->outbuf, smb_vwv4, timeout);
1679         SSVAL(cli->outbuf,smb_vwv6,0);
1680         SSVAL(cli->outbuf,smb_vwv7,1);
1681
1682         p = smb_buf(cli->outbuf);
1683         SIVAL(p, 0, cli->pid);
1684         SOFF_T_R(p, 4, offset);
1685         SOFF_T_R(p, 12, len);
1686         p += 20;
1687
1688         cli_setup_bcc(cli, p);
1689         cli_send_smb(cli);
1690
1691         if (timeout != 0) {
1692                 cli->timeout = (timeout == -1) ? 0x7FFFFFFF : (timeout + 5*1000);
1693         }
1694
1695         if (!cli_receive_smb(cli)) {
1696                 cli->timeout = saved_timeout;
1697                 return False;
1698         }
1699
1700         cli->timeout = saved_timeout;
1701
1702         if (cli_is_error(cli)) {
1703                 return False;
1704         }
1705
1706         return True;
1707 }
1708
1709 /****************************************************************************
1710  Unlock a file with 64 bit offsets.
1711 ****************************************************************************/
1712
1713 bool cli_unlock64(struct cli_state *cli, int fnum, uint64_t offset, uint64_t len)
1714 {
1715         char *p;
1716
1717         if (! (cli->capabilities & CAP_LARGE_FILES)) {
1718                 return cli_unlock(cli, fnum, offset, len);
1719         }
1720
1721         memset(cli->outbuf,'\0',smb_size);
1722         memset(cli->inbuf,'\0',smb_size);
1723
1724         cli_set_message(cli->outbuf,8,0,True);
1725
1726         SCVAL(cli->outbuf,smb_com,SMBlockingX);
1727         SSVAL(cli->outbuf,smb_tid,cli->cnum);
1728         cli_setup_packet(cli);
1729
1730         SCVAL(cli->outbuf,smb_vwv0,0xFF);
1731         SSVAL(cli->outbuf,smb_vwv2,fnum);
1732         SCVAL(cli->outbuf,smb_vwv3,LOCKING_ANDX_LARGE_FILES);
1733         SIVALS(cli->outbuf, smb_vwv4, 0);
1734         SSVAL(cli->outbuf,smb_vwv6,1);
1735         SSVAL(cli->outbuf,smb_vwv7,0);
1736
1737         p = smb_buf(cli->outbuf);
1738         SIVAL(p, 0, cli->pid);
1739         SOFF_T_R(p, 4, offset);
1740         SOFF_T_R(p, 12, len);
1741         p += 20;
1742         cli_setup_bcc(cli, p);
1743         cli_send_smb(cli);
1744         if (!cli_receive_smb(cli)) {
1745                 return False;
1746         }
1747
1748         if (cli_is_error(cli)) {
1749                 return False;
1750         }
1751
1752         return True;
1753 }
1754
1755 /****************************************************************************
1756  Get/unlock a POSIX lock on a file - internal function.
1757 ****************************************************************************/
1758
1759 static bool cli_posix_lock_internal(struct cli_state *cli, int fnum,
1760                 uint64_t offset, uint64_t len, bool wait_lock, enum brl_type lock_type)
1761 {
1762         unsigned int param_len = 4;
1763         unsigned int data_len = POSIX_LOCK_DATA_SIZE;
1764         uint16 setup = TRANSACT2_SETFILEINFO;
1765         char param[4];
1766         unsigned char data[POSIX_LOCK_DATA_SIZE];
1767         char *rparam=NULL, *rdata=NULL;
1768         int saved_timeout = cli->timeout;
1769
1770         SSVAL(param,0,fnum);
1771         SSVAL(param,2,SMB_SET_POSIX_LOCK);
1772
1773         switch (lock_type) {
1774                 case READ_LOCK:
1775                         SSVAL(data, POSIX_LOCK_TYPE_OFFSET, POSIX_LOCK_TYPE_READ);
1776                         break;
1777                 case WRITE_LOCK:
1778                         SSVAL(data, POSIX_LOCK_TYPE_OFFSET, POSIX_LOCK_TYPE_WRITE);
1779                         break;
1780                 case UNLOCK_LOCK:
1781                         SSVAL(data, POSIX_LOCK_TYPE_OFFSET, POSIX_LOCK_TYPE_UNLOCK);
1782                         break;
1783                 default:
1784                         return False;
1785         }
1786
1787         if (wait_lock) {
1788                 SSVAL(data, POSIX_LOCK_FLAGS_OFFSET, POSIX_LOCK_FLAG_WAIT);
1789                 cli->timeout = 0x7FFFFFFF;
1790         } else {
1791                 SSVAL(data, POSIX_LOCK_FLAGS_OFFSET, POSIX_LOCK_FLAG_NOWAIT);
1792         }
1793
1794         SIVAL(data, POSIX_LOCK_PID_OFFSET, cli->pid);
1795         SOFF_T(data, POSIX_LOCK_START_OFFSET, offset);
1796         SOFF_T(data, POSIX_LOCK_LEN_OFFSET, len);
1797
1798         if (!cli_send_trans(cli, SMBtrans2,
1799                         NULL,                        /* name */
1800                         -1, 0,                          /* fid, flags */
1801                         &setup, 1, 0,                   /* setup, length, max */
1802                         param, param_len, 2,            /* param, length, max */
1803                         (char *)&data,  data_len, cli->max_xmit /* data, length, max */
1804                         )) {
1805                 cli->timeout = saved_timeout;
1806                 return False;
1807         }
1808
1809         if (!cli_receive_trans(cli, SMBtrans2,
1810                                 &rparam, &param_len,
1811                                 &rdata, &data_len)) {
1812                 cli->timeout = saved_timeout;
1813                 SAFE_FREE(rdata);
1814                 SAFE_FREE(rparam);
1815                 return False;
1816         }
1817
1818         cli->timeout = saved_timeout;
1819
1820         SAFE_FREE(rdata);
1821         SAFE_FREE(rparam);
1822
1823         return True;
1824 }
1825
1826 /****************************************************************************
1827  POSIX Lock a file.
1828 ****************************************************************************/
1829
1830 bool cli_posix_lock(struct cli_state *cli, int fnum,
1831                         uint64_t offset, uint64_t len,
1832                         bool wait_lock, enum brl_type lock_type)
1833 {
1834         if (lock_type != READ_LOCK && lock_type != WRITE_LOCK) {
1835                 return False;
1836         }
1837         return cli_posix_lock_internal(cli, fnum, offset, len, wait_lock, lock_type);
1838 }
1839
1840 /****************************************************************************
1841  POSIX Unlock a file.
1842 ****************************************************************************/
1843
1844 bool cli_posix_unlock(struct cli_state *cli, int fnum, uint64_t offset, uint64_t len)
1845 {
1846         return cli_posix_lock_internal(cli, fnum, offset, len, False, UNLOCK_LOCK);
1847 }
1848
1849 /****************************************************************************
1850  POSIX Get any lock covering a file.
1851 ****************************************************************************/
1852
1853 bool cli_posix_getlock(struct cli_state *cli, int fnum, uint64_t *poffset, uint64_t *plen)
1854 {
1855         return True;
1856 }
1857
1858 /****************************************************************************
1859  Do a SMBgetattrE call.
1860 ****************************************************************************/
1861
1862 bool cli_getattrE(struct cli_state *cli, int fd,
1863                   uint16 *attr, SMB_OFF_T *size,
1864                   time_t *change_time,
1865                   time_t *access_time,
1866                   time_t *write_time)
1867 {
1868         memset(cli->outbuf,'\0',smb_size);
1869         memset(cli->inbuf,'\0',smb_size);
1870
1871         cli_set_message(cli->outbuf,1,0,True);
1872
1873         SCVAL(cli->outbuf,smb_com,SMBgetattrE);
1874         SSVAL(cli->outbuf,smb_tid,cli->cnum);
1875         cli_setup_packet(cli);
1876
1877         SSVAL(cli->outbuf,smb_vwv0,fd);
1878
1879         cli_send_smb(cli);
1880         if (!cli_receive_smb(cli)) {
1881                 return False;
1882         }
1883
1884         if (cli_is_error(cli)) {
1885                 return False;
1886         }
1887
1888         if (size) {
1889                 *size = IVAL(cli->inbuf, smb_vwv6);
1890         }
1891
1892         if (attr) {
1893                 *attr = SVAL(cli->inbuf,smb_vwv10);
1894         }
1895
1896         if (change_time) {
1897                 *change_time = cli_make_unix_date2(cli, cli->inbuf+smb_vwv0);
1898         }
1899
1900         if (access_time) {
1901                 *access_time = cli_make_unix_date2(cli, cli->inbuf+smb_vwv2);
1902         }
1903
1904         if (write_time) {
1905                 *write_time = cli_make_unix_date2(cli, cli->inbuf+smb_vwv4);
1906         }
1907
1908         return True;
1909 }
1910
1911 /****************************************************************************
1912  Do a SMBgetatr call
1913 ****************************************************************************/
1914
1915 bool cli_getatr(struct cli_state *cli, const char *fname,
1916                 uint16 *attr, SMB_OFF_T *size, time_t *write_time)
1917 {
1918         char *p;
1919
1920         memset(cli->outbuf,'\0',smb_size);
1921         memset(cli->inbuf,'\0',smb_size);
1922
1923         cli_set_message(cli->outbuf,0,0,True);
1924
1925         SCVAL(cli->outbuf,smb_com,SMBgetatr);
1926         SSVAL(cli->outbuf,smb_tid,cli->cnum);
1927         cli_setup_packet(cli);
1928
1929         p = smb_buf(cli->outbuf);
1930         *p++ = 4;
1931         p += clistr_push(cli, p, fname,
1932                         cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
1933
1934         cli_setup_bcc(cli, p);
1935
1936         cli_send_smb(cli);
1937         if (!cli_receive_smb(cli)) {
1938                 return False;
1939         }
1940
1941         if (cli_is_error(cli)) {
1942                 return False;
1943         }
1944
1945         if (size) {
1946                 *size = IVAL(cli->inbuf, smb_vwv3);
1947         }
1948
1949         if (write_time) {
1950                 *write_time = cli_make_unix_date3(cli, cli->inbuf+smb_vwv1);
1951         }
1952
1953         if (attr) {
1954                 *attr = SVAL(cli->inbuf,smb_vwv0);
1955         }
1956
1957         return True;
1958 }
1959
1960 /****************************************************************************
1961  Do a SMBsetattrE call.
1962 ****************************************************************************/
1963
1964 bool cli_setattrE(struct cli_state *cli, int fd,
1965                   time_t change_time,
1966                   time_t access_time,
1967                   time_t write_time)
1968
1969 {
1970         char *p;
1971
1972         memset(cli->outbuf,'\0',smb_size);
1973         memset(cli->inbuf,'\0',smb_size);
1974
1975         cli_set_message(cli->outbuf,7,0,True);
1976
1977         SCVAL(cli->outbuf,smb_com,SMBsetattrE);
1978         SSVAL(cli->outbuf,smb_tid,cli->cnum);
1979         cli_setup_packet(cli);
1980
1981         SSVAL(cli->outbuf,smb_vwv0, fd);
1982         cli_put_dos_date2(cli, cli->outbuf,smb_vwv1, change_time);
1983         cli_put_dos_date2(cli, cli->outbuf,smb_vwv3, access_time);
1984         cli_put_dos_date2(cli, cli->outbuf,smb_vwv5, write_time);
1985
1986         p = smb_buf(cli->outbuf);
1987         *p++ = 4;
1988
1989         cli_setup_bcc(cli, p);
1990
1991         cli_send_smb(cli);
1992         if (!cli_receive_smb(cli)) {
1993                 return False;
1994         }
1995
1996         if (cli_is_error(cli)) {
1997                 return False;
1998         }
1999
2000         return True;
2001 }
2002
2003 /****************************************************************************
2004  Do a SMBsetatr call.
2005 ****************************************************************************/
2006
2007 bool cli_setatr(struct cli_state *cli, const char *fname, uint16 attr, time_t t)
2008 {
2009         char *p;
2010
2011         memset(cli->outbuf,'\0',smb_size);
2012         memset(cli->inbuf,'\0',smb_size);
2013
2014         cli_set_message(cli->outbuf,8,0,True);
2015
2016         SCVAL(cli->outbuf,smb_com,SMBsetatr);
2017         SSVAL(cli->outbuf,smb_tid,cli->cnum);
2018         cli_setup_packet(cli);
2019
2020         SSVAL(cli->outbuf,smb_vwv0, attr);
2021         cli_put_dos_date3(cli, cli->outbuf,smb_vwv1, t);
2022
2023         p = smb_buf(cli->outbuf);
2024         *p++ = 4;
2025         p += clistr_push(cli, p, fname,
2026                         cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
2027         *p++ = 4;
2028
2029         cli_setup_bcc(cli, p);
2030
2031         cli_send_smb(cli);
2032         if (!cli_receive_smb(cli)) {
2033                 return False;
2034         }
2035
2036         if (cli_is_error(cli)) {
2037                 return False;
2038         }
2039
2040         return True;
2041 }
2042
2043 /****************************************************************************
2044  Check for existance of a dir.
2045 ****************************************************************************/
2046
2047 static void cli_chkpath_done(struct tevent_req *subreq);
2048
2049 struct cli_chkpath_state {
2050         int dummy;
2051 };
2052
2053 struct tevent_req *cli_chkpath_send(TALLOC_CTX *mem_ctx,
2054                                   struct event_context *ev,
2055                                   struct cli_state *cli,
2056                                   const char *fname)
2057 {
2058         struct tevent_req *req = NULL, *subreq = NULL;
2059         struct cli_chkpath_state *state = NULL;
2060         uint8_t additional_flags = 0;
2061         uint8_t *bytes = NULL;
2062
2063         req = tevent_req_create(mem_ctx, &state, struct cli_chkpath_state);
2064         if (req == NULL) {
2065                 return NULL;
2066         }
2067
2068         bytes = talloc_array(state, uint8_t, 1);
2069         if (tevent_req_nomem(bytes, req)) {
2070                 return tevent_req_post(req, ev);
2071         }
2072         bytes[0] = 4;
2073         bytes = smb_bytes_push_str(bytes, cli_ucs2(cli), fname,
2074                                    strlen(fname)+1, NULL);
2075
2076         if (tevent_req_nomem(bytes, req)) {
2077                 return tevent_req_post(req, ev);
2078         }
2079
2080         subreq = cli_smb_send(state, ev, cli, SMBcheckpath, additional_flags,
2081                               0, NULL, talloc_get_size(bytes), bytes);
2082         if (tevent_req_nomem(subreq, req)) {
2083                 return tevent_req_post(req, ev);
2084         }
2085         tevent_req_set_callback(subreq, cli_chkpath_done, req);
2086         return req;
2087 }
2088
2089 static void cli_chkpath_done(struct tevent_req *subreq)
2090 {
2091         struct tevent_req *req = tevent_req_callback_data(
2092                 subreq, struct tevent_req);
2093         NTSTATUS status;
2094
2095         status = cli_smb_recv(subreq, 0, NULL, NULL, NULL, NULL);
2096         TALLOC_FREE(subreq);
2097         if (!NT_STATUS_IS_OK(status)) {
2098                 tevent_req_nterror(req, status);
2099                 return;
2100         }
2101         tevent_req_done(req);
2102 }
2103
2104 NTSTATUS cli_chkpath_recv(struct tevent_req *req)
2105 {
2106         return tevent_req_simple_recv_ntstatus(req);
2107 }
2108
2109 NTSTATUS cli_chkpath(struct cli_state *cli, const char *path)
2110 {
2111         TALLOC_CTX *frame = talloc_stackframe();
2112         struct event_context *ev = NULL;
2113         struct tevent_req *req = NULL;
2114         char *path2 = NULL;
2115         NTSTATUS status = NT_STATUS_OK;
2116
2117         if (cli_has_async_calls(cli)) {
2118                 /*
2119                  * Can't use sync call while an async call is in flight
2120                  */
2121                 status = NT_STATUS_INVALID_PARAMETER;
2122                 goto fail;
2123         }
2124
2125         path2 = talloc_strdup(frame, path);
2126         if (!path2) {
2127                 status = NT_STATUS_NO_MEMORY;
2128                 goto fail;
2129         }
2130         trim_char(path2,'\0','\\');
2131         if (!*path2) {
2132                 path2 = talloc_strdup(frame, "\\");
2133                 if (!path2) {
2134                         status = NT_STATUS_NO_MEMORY;
2135                         goto fail;
2136                 }
2137         }
2138
2139         ev = event_context_init(frame);
2140         if (ev == NULL) {
2141                 status = NT_STATUS_NO_MEMORY;
2142                 goto fail;
2143         }
2144
2145         req = cli_chkpath_send(frame, ev, cli, path2);
2146         if (req == NULL) {
2147                 status = NT_STATUS_NO_MEMORY;
2148                 goto fail;
2149         }
2150
2151         if (!tevent_req_poll(req, ev)) {
2152                 status = map_nt_error_from_unix(errno);
2153                 goto fail;
2154         }
2155
2156         status = cli_chkpath_recv(req);
2157
2158  fail:
2159         TALLOC_FREE(frame);
2160         if (!NT_STATUS_IS_OK(status)) {
2161                 cli_set_error(cli, status);
2162         }
2163         return status;
2164 }
2165
2166 /****************************************************************************
2167  Query disk space.
2168 ****************************************************************************/
2169
2170 static void cli_dskattr_done(struct tevent_req *subreq);
2171
2172 struct cli_dskattr_state {
2173         int bsize;
2174         int total;
2175         int avail;
2176 };
2177
2178 struct tevent_req *cli_dskattr_send(TALLOC_CTX *mem_ctx,
2179                                   struct event_context *ev,
2180                                   struct cli_state *cli)
2181 {
2182         struct tevent_req *req = NULL, *subreq = NULL;
2183         struct cli_dskattr_state *state = NULL;
2184         uint8_t additional_flags = 0;
2185
2186         req = tevent_req_create(mem_ctx, &state, struct cli_dskattr_state);
2187         if (req == NULL) {
2188                 return NULL;
2189         }
2190
2191         subreq = cli_smb_send(state, ev, cli, SMBdskattr, additional_flags,
2192                               0, NULL, 0, NULL);
2193         if (tevent_req_nomem(subreq, req)) {
2194                 return tevent_req_post(req, ev);
2195         }
2196         tevent_req_set_callback(subreq, cli_dskattr_done, req);
2197         return req;
2198 }
2199
2200 static void cli_dskattr_done(struct tevent_req *subreq)
2201 {
2202         struct tevent_req *req = tevent_req_callback_data(
2203                 subreq, struct tevent_req);
2204         struct cli_dskattr_state *state = tevent_req_data(
2205                 req, struct cli_dskattr_state);
2206         uint8_t wct;
2207         uint16_t *vwv = NULL;
2208         NTSTATUS status;
2209
2210         status = cli_smb_recv(subreq, 4, &wct, &vwv, NULL, NULL);
2211         if (!NT_STATUS_IS_OK(status)) {
2212                 tevent_req_nterror(req, status);
2213                 return;
2214         }
2215         state->bsize = SVAL(vwv+1, 0)*SVAL(vwv+2,0);
2216         state->total = SVAL(vwv+0, 0);
2217         state->avail = SVAL(vwv+3, 0);
2218         TALLOC_FREE(subreq);
2219         tevent_req_done(req);
2220 }
2221
2222 NTSTATUS cli_dskattr_recv(struct tevent_req *req, int *bsize, int *total, int *avail)
2223 {
2224         struct cli_dskattr_state *state = tevent_req_data(
2225                                 req, struct cli_dskattr_state);
2226         NTSTATUS status;
2227
2228         if (tevent_req_is_nterror(req, &status)) {
2229                 return status;
2230         }
2231         *bsize = state->bsize;
2232         *total = state->total;
2233         *avail = state->avail;
2234         return NT_STATUS_OK;
2235 }
2236
2237 NTSTATUS cli_dskattr(struct cli_state *cli, int *bsize, int *total, int *avail)
2238 {
2239         TALLOC_CTX *frame = talloc_stackframe();
2240         struct event_context *ev = NULL;
2241         struct tevent_req *req = NULL;
2242         NTSTATUS status = NT_STATUS_OK;
2243
2244         if (cli_has_async_calls(cli)) {
2245                 /*
2246                  * Can't use sync call while an async call is in flight
2247                  */
2248                 status = NT_STATUS_INVALID_PARAMETER;
2249                 goto fail;
2250         }
2251
2252         ev = event_context_init(frame);
2253         if (ev == NULL) {
2254                 status = NT_STATUS_NO_MEMORY;
2255                 goto fail;
2256         }
2257
2258         req = cli_dskattr_send(frame, ev, cli);
2259         if (req == NULL) {
2260                 status = NT_STATUS_NO_MEMORY;
2261                 goto fail;
2262         }
2263
2264         if (!tevent_req_poll(req, ev)) {
2265                 status = map_nt_error_from_unix(errno);
2266                 goto fail;
2267         }
2268
2269         status = cli_dskattr_recv(req, bsize, total, avail);
2270
2271  fail:
2272         TALLOC_FREE(frame);
2273         if (!NT_STATUS_IS_OK(status)) {
2274                 cli_set_error(cli, status);
2275         }
2276         return status;
2277 }
2278
2279 #if 0
2280 bool cli_dskattr(struct cli_state *cli, int *bsize, int *total, int *avail)
2281 {
2282         memset(cli->outbuf,'\0',smb_size);
2283         cli_set_message(cli->outbuf,0,0,True);
2284         SCVAL(cli->outbuf,smb_com,SMBdskattr);
2285         SSVAL(cli->outbuf,smb_tid,cli->cnum);
2286         cli_setup_packet(cli);
2287
2288         cli_send_smb(cli);
2289         if (!cli_receive_smb(cli)) {
2290                 return False;
2291         }
2292
2293         *bsize = SVAL(cli->inbuf,smb_vwv1)*SVAL(cli->inbuf,smb_vwv2);
2294         *total = SVAL(cli->inbuf,smb_vwv0);
2295         *avail = SVAL(cli->inbuf,smb_vwv3);
2296
2297         return True;
2298 }
2299 #endif
2300
2301 /****************************************************************************
2302  Create and open a temporary file.
2303 ****************************************************************************/
2304
2305 int cli_ctemp(struct cli_state *cli, const char *path, char **tmp_path)
2306 {
2307         int len;
2308         char *p;
2309
2310         memset(cli->outbuf,'\0',smb_size);
2311         memset(cli->inbuf,'\0',smb_size);
2312
2313         cli_set_message(cli->outbuf,3,0,True);
2314
2315         SCVAL(cli->outbuf,smb_com,SMBctemp);
2316         SSVAL(cli->outbuf,smb_tid,cli->cnum);
2317         cli_setup_packet(cli);
2318
2319         SSVAL(cli->outbuf,smb_vwv0,0);
2320         SIVALS(cli->outbuf,smb_vwv1,-1);
2321
2322         p = smb_buf(cli->outbuf);
2323         *p++ = 4;
2324         p += clistr_push(cli, p, path,
2325                         cli->bufsize - PTR_DIFF(p,cli->outbuf), STR_TERMINATE);
2326
2327         cli_setup_bcc(cli, p);
2328
2329         cli_send_smb(cli);
2330         if (!cli_receive_smb(cli)) {
2331                 return -1;
2332         }
2333
2334         if (cli_is_error(cli)) {
2335                 return -1;
2336         }
2337
2338         /* despite the spec, the result has a -1, followed by
2339            length, followed by name */
2340         p = smb_buf(cli->inbuf);
2341         p += 4;
2342         len = smb_buflen(cli->inbuf) - 4;
2343         if (len <= 0 || len > PATH_MAX) return -1;
2344
2345         if (tmp_path) {
2346                 char *path2 = SMB_MALLOC_ARRAY(char, len+1);
2347                 if (!path2) {
2348                         return -1;
2349                 }
2350                 clistr_pull(cli->inbuf, path2, p,
2351                             len+1, len, STR_ASCII);
2352                 *tmp_path = path2;
2353         }
2354
2355         return SVAL(cli->inbuf,smb_vwv0);
2356 }
2357
2358 /*
2359    send a raw ioctl - used by the torture code
2360 */
2361 NTSTATUS cli_raw_ioctl(struct cli_state *cli, int fnum, uint32 code, DATA_BLOB *blob)
2362 {
2363         memset(cli->outbuf,'\0',smb_size);
2364         memset(cli->inbuf,'\0',smb_size);
2365
2366         cli_set_message(cli->outbuf, 3, 0, True);
2367         SCVAL(cli->outbuf,smb_com,SMBioctl);
2368         cli_setup_packet(cli);
2369
2370         SSVAL(cli->outbuf, smb_vwv0, fnum);
2371         SSVAL(cli->outbuf, smb_vwv1, code>>16);
2372         SSVAL(cli->outbuf, smb_vwv2, (code&0xFFFF));
2373
2374         cli_send_smb(cli);
2375         if (!cli_receive_smb(cli)) {
2376                 return NT_STATUS_UNEXPECTED_NETWORK_ERROR;
2377         }
2378
2379         if (cli_is_error(cli)) {
2380                 return cli_nt_error(cli);
2381         }
2382
2383         *blob = data_blob_null;
2384
2385         return NT_STATUS_OK;
2386 }
2387
2388 /*********************************************************
2389  Set an extended attribute utility fn.
2390 *********************************************************/
2391
2392 static bool cli_set_ea(struct cli_state *cli, uint16 setup, char *param, unsigned int param_len,
2393                         const char *ea_name, const char *ea_val, size_t ea_len)
2394 {
2395         unsigned int data_len = 0;
2396         char *data = NULL;
2397         char *rparam=NULL, *rdata=NULL;
2398         char *p;
2399         size_t ea_namelen = strlen(ea_name);
2400
2401         if (ea_namelen == 0 && ea_len == 0) {
2402                 data_len = 4;
2403                 data = (char *)SMB_MALLOC(data_len);
2404                 if (!data) {
2405                         return False;
2406                 }
2407                 p = data;
2408                 SIVAL(p,0,data_len);
2409         } else {
2410                 data_len = 4 + 4 + ea_namelen + 1 + ea_len;
2411                 data = (char *)SMB_MALLOC(data_len);
2412                 if (!data) {
2413                         return False;
2414                 }
2415                 p = data;
2416                 SIVAL(p,0,data_len);
2417                 p += 4;
2418                 SCVAL(p, 0, 0); /* EA flags. */
2419                 SCVAL(p, 1, ea_namelen);
2420                 SSVAL(p, 2, ea_len);
2421                 memcpy(p+4, ea_name, ea_namelen+1); /* Copy in the name. */
2422                 memcpy(p+4+ea_namelen+1, ea_val, ea_len);
2423         }
2424
2425         if (!cli_send_trans(cli, SMBtrans2,
2426                         NULL,                        /* name */
2427                         -1, 0,                          /* fid, flags */
2428                         &setup, 1, 0,                   /* setup, length, max */
2429                         param, param_len, 2,            /* param, length, max */
2430                         data,  data_len, cli->max_xmit /* data, length, max */
2431                         )) {
2432                 SAFE_FREE(data);
2433                 return False;
2434         }
2435
2436         if (!cli_receive_trans(cli, SMBtrans2,
2437                         &rparam, &param_len,
2438                         &rdata, &data_len)) {
2439                         SAFE_FREE(data);
2440                 return false;
2441         }
2442
2443         SAFE_FREE(data);
2444         SAFE_FREE(rdata);
2445         SAFE_FREE(rparam);
2446
2447         return True;
2448 }
2449
2450 /*********************************************************
2451  Set an extended attribute on a pathname.
2452 *********************************************************/
2453
2454 bool cli_set_ea_path(struct cli_state *cli, const char *path, const char *ea_name, const char *ea_val, size_t ea_len)
2455 {
2456         uint16 setup = TRANSACT2_SETPATHINFO;
2457         unsigned int param_len = 0;
2458         char *param;
2459         size_t srclen = 2*(strlen(path)+1);
2460         char *p;
2461         bool ret;
2462
2463         param = SMB_MALLOC_ARRAY(char, 6+srclen+2);
2464         if (!param) {
2465                 return false;
2466         }
2467         memset(param, '\0', 6);
2468         SSVAL(param,0,SMB_INFO_SET_EA);
2469         p = &param[6];
2470
2471         p += clistr_push(cli, p, path, srclen, STR_TERMINATE);
2472         param_len = PTR_DIFF(p, param);
2473
2474         ret = cli_set_ea(cli, setup, param, param_len, ea_name, ea_val, ea_len);
2475         SAFE_FREE(param);
2476         return ret;
2477 }
2478
2479 /*********************************************************
2480  Set an extended attribute on an fnum.
2481 *********************************************************/
2482
2483 bool cli_set_ea_fnum(struct cli_state *cli, int fnum, const char *ea_name, const char *ea_val, size_t ea_len)
2484 {
2485         char param[6];
2486         uint16 setup = TRANSACT2_SETFILEINFO;
2487
2488         memset(param, 0, 6);
2489         SSVAL(param,0,fnum);
2490         SSVAL(param,2,SMB_INFO_SET_EA);
2491
2492         return cli_set_ea(cli, setup, param, 6, ea_name, ea_val, ea_len);
2493 }
2494
2495 /*********************************************************
2496  Get an extended attribute list utility fn.
2497 *********************************************************/
2498
2499 static bool cli_get_ea_list(struct cli_state *cli,
2500                 uint16 setup, char *param, unsigned int param_len,
2501                 TALLOC_CTX *ctx,
2502                 size_t *pnum_eas,
2503                 struct ea_struct **pea_list)
2504 {
2505         unsigned int data_len = 0;
2506         unsigned int rparam_len, rdata_len;
2507         char *rparam=NULL, *rdata=NULL;
2508         char *p;
2509         size_t ea_size;
2510         size_t num_eas;
2511         bool ret = False;
2512         struct ea_struct *ea_list;
2513
2514         *pnum_eas = 0;
2515         if (pea_list) {
2516                 *pea_list = NULL;
2517         }
2518
2519         if (!cli_send_trans(cli, SMBtrans2,
2520                         NULL,           /* Name */
2521                         -1, 0,          /* fid, flags */
2522                         &setup, 1, 0,   /* setup, length, max */
2523                         param, param_len, 10, /* param, length, max */
2524                         NULL, data_len, cli->max_xmit /* data, length, max */
2525                                 )) {
2526                 return False;
2527         }
2528
2529         if (!cli_receive_trans(cli, SMBtrans2,
2530                         &rparam, &rparam_len,
2531                         &rdata, &rdata_len)) {
2532                 return False;
2533         }
2534
2535         if (!rdata || rdata_len < 4) {
2536                 goto out;
2537         }
2538
2539         ea_size = (size_t)IVAL(rdata,0);
2540         if (ea_size > rdata_len) {
2541                 goto out;
2542         }
2543
2544         if (ea_size == 0) {
2545                 /* No EA's present. */
2546                 ret = True;
2547                 goto out;
2548         }
2549
2550         p = rdata + 4;
2551         ea_size -= 4;
2552
2553         /* Validate the EA list and count it. */
2554         for (num_eas = 0; ea_size >= 4; num_eas++) {
2555                 unsigned int ea_namelen = CVAL(p,1);
2556                 unsigned int ea_valuelen = SVAL(p,2);
2557                 if (ea_namelen == 0) {
2558                         goto out;
2559                 }
2560                 if (4 + ea_namelen + 1 + ea_valuelen > ea_size) {
2561                         goto out;
2562                 }
2563                 ea_size -= 4 + ea_namelen + 1 + ea_valuelen;
2564                 p += 4 + ea_namelen + 1 + ea_valuelen;
2565         }
2566
2567         if (num_eas == 0) {
2568                 ret = True;
2569                 goto out;
2570         }
2571
2572         *pnum_eas = num_eas;
2573         if (!pea_list) {
2574                 /* Caller only wants number of EA's. */
2575                 ret = True;
2576                 goto out;
2577         }
2578
2579         ea_list = TALLOC_ARRAY(ctx, struct ea_struct, num_eas);
2580         if (!ea_list) {
2581                 goto out;
2582         }
2583
2584         ea_size = (size_t)IVAL(rdata,0);
2585         p = rdata + 4;
2586
2587         for (num_eas = 0; num_eas < *pnum_eas; num_eas++ ) {
2588                 struct ea_struct *ea = &ea_list[num_eas];
2589                 fstring unix_ea_name;
2590                 unsigned int ea_namelen = CVAL(p,1);
2591                 unsigned int ea_valuelen = SVAL(p,2);
2592
2593                 ea->flags = CVAL(p,0);
2594                 unix_ea_name[0] = '\0';
2595                 pull_ascii_fstring(unix_ea_name, p + 4);
2596                 ea->name = talloc_strdup(ctx, unix_ea_name);
2597                 /* Ensure the value is null terminated (in case it's a string). */
2598                 ea->value = data_blob_talloc(ctx, NULL, ea_valuelen + 1);
2599                 if (!ea->value.data) {
2600                         goto out;
2601                 }
2602                 if (ea_valuelen) {
2603                         memcpy(ea->value.data, p+4+ea_namelen+1, ea_valuelen);
2604                 }
2605                 ea->value.data[ea_valuelen] = 0;
2606                 ea->value.length--;
2607                 p += 4 + ea_namelen + 1 + ea_valuelen;
2608         }
2609
2610         *pea_list = ea_list;
2611         ret = True;
2612
2613  out :
2614
2615         SAFE_FREE(rdata);
2616         SAFE_FREE(rparam);
2617         return ret;
2618 }
2619
2620 /*********************************************************
2621  Get an extended attribute list from a pathname.
2622 *********************************************************/
2623
2624 bool cli_get_ea_list_path(struct cli_state *cli, const char *path,
2625                 TALLOC_CTX *ctx,
2626                 size_t *pnum_eas,
2627                 struct ea_struct **pea_list)
2628 {
2629         uint16 setup = TRANSACT2_QPATHINFO;
2630         unsigned int param_len = 0;
2631         char *param;
2632         char *p;
2633         size_t srclen = 2*(strlen(path)+1);
2634         bool ret;
2635
2636         param = SMB_MALLOC_ARRAY(char, 6+srclen+2);
2637         if (!param) {
2638                 return false;
2639         }
2640         p = param;
2641         memset(p, 0, 6);
2642         SSVAL(p, 0, SMB_INFO_QUERY_ALL_EAS);
2643         p += 6;
2644         p += clistr_push(cli, p, path, srclen, STR_TERMINATE);
2645         param_len = PTR_DIFF(p, param);
2646
2647         ret = cli_get_ea_list(cli, setup, param, param_len, ctx, pnum_eas, pea_list);
2648         SAFE_FREE(param);
2649         return ret;
2650 }
2651
2652 /*********************************************************
2653  Get an extended attribute list from an fnum.
2654 *********************************************************/
2655
2656 bool cli_get_ea_list_fnum(struct cli_state *cli, int fnum,
2657                 TALLOC_CTX *ctx,
2658                 size_t *pnum_eas,
2659                 struct ea_struct **pea_list)
2660 {
2661         uint16 setup = TRANSACT2_QFILEINFO;
2662         char param[6];
2663
2664         memset(param, 0, 6);
2665         SSVAL(param,0,fnum);
2666         SSVAL(param,2,SMB_INFO_SET_EA);
2667
2668         return cli_get_ea_list(cli, setup, param, 6, ctx, pnum_eas, pea_list);
2669 }
2670
2671 /****************************************************************************
2672  Convert open "flags" arg to uint32 on wire.
2673 ****************************************************************************/
2674
2675 static uint32 open_flags_to_wire(int flags)
2676 {
2677         int open_mode = flags & O_ACCMODE;
2678         uint32 ret = 0;
2679
2680         switch (open_mode) {
2681                 case O_WRONLY:
2682                         ret |= SMB_O_WRONLY;
2683                         break;
2684                 case O_RDWR:
2685                         ret |= SMB_O_RDWR;
2686                         break;
2687                 default:
2688                 case O_RDONLY:
2689                         ret |= SMB_O_RDONLY;
2690                         break;
2691         }
2692
2693         if (flags & O_CREAT) {
2694                 ret |= SMB_O_CREAT;
2695         }
2696         if (flags & O_EXCL) {
2697                 ret |= SMB_O_EXCL;
2698         }
2699         if (flags & O_TRUNC) {
2700                 ret |= SMB_O_TRUNC;
2701         }
2702 #if defined(O_SYNC)
2703         if (flags & O_SYNC) {
2704                 ret |= SMB_O_SYNC;
2705         }
2706 #endif /* O_SYNC */
2707         if (flags & O_APPEND) {
2708                 ret |= SMB_O_APPEND;
2709         }
2710 #if defined(O_DIRECT)
2711         if (flags & O_DIRECT) {
2712                 ret |= SMB_O_DIRECT;
2713         }
2714 #endif
2715 #if defined(O_DIRECTORY)
2716         if (flags & O_DIRECTORY) {
2717                 ret &= ~(SMB_O_RDONLY|SMB_O_RDWR|SMB_O_WRONLY);
2718                 ret |= SMB_O_DIRECTORY;
2719         }
2720 #endif
2721         return ret;
2722 }
2723
2724 /****************************************************************************
2725  Open a file - POSIX semantics. Returns fnum. Doesn't request oplock.
2726 ****************************************************************************/
2727
2728 static int cli_posix_open_internal(struct cli_state *cli, const char *fname, int flags, mode_t mode, bool is_dir)
2729 {
2730         unsigned int data_len = 0;
2731         unsigned int param_len = 0;
2732         uint16 setup = TRANSACT2_SETPATHINFO;
2733         char *param;
2734         char data[18];
2735         char *rparam=NULL, *rdata=NULL;
2736         char *p;
2737         int fnum = -1;
2738         uint32 wire_flags = open_flags_to_wire(flags);
2739         size_t srclen = 2*(strlen(fname)+1);
2740
2741         param = SMB_MALLOC_ARRAY(char, 6+srclen+2);
2742         if (!param) {
2743                 return false;
2744         }
2745         memset(param, '\0', 6);
2746         SSVAL(param,0, SMB_POSIX_PATH_OPEN);
2747         p = &param[6];
2748
2749         p += clistr_push(cli, p, fname, srclen, STR_TERMINATE);
2750         param_len = PTR_DIFF(p, param);
2751
2752         if (is_dir) {
2753                 wire_flags &= ~(SMB_O_RDONLY|SMB_O_RDWR|SMB_O_WRONLY);
2754                 wire_flags |= SMB_O_DIRECTORY;
2755         }
2756
2757         p = data;
2758         SIVAL(p,0,0); /* No oplock. */
2759         SIVAL(p,4,wire_flags);
2760         SIVAL(p,8,unix_perms_to_wire(mode));
2761         SIVAL(p,12,0); /* Top bits of perms currently undefined. */
2762         SSVAL(p,16,SMB_NO_INFO_LEVEL_RETURNED); /* No info level returned. */
2763
2764         data_len = 18;
2765
2766         if (!cli_send_trans(cli, SMBtrans2,
2767                         NULL,                        /* name */
2768                         -1, 0,                          /* fid, flags */
2769                         &setup, 1, 0,                   /* setup, length, max */
2770                         param, param_len, 2,            /* param, length, max */
2771                         (char *)&data,  data_len, cli->max_xmit /* data, length, max */
2772                         )) {
2773                 SAFE_FREE(param);
2774                 return -1;
2775         }
2776
2777         SAFE_FREE(param);
2778
2779         if (!cli_receive_trans(cli, SMBtrans2,
2780                 &rparam, &param_len,
2781                 &rdata, &data_len)) {
2782                         return -1;
2783         }
2784
2785         fnum = SVAL(rdata,2);
2786
2787         SAFE_FREE(rdata);
2788         SAFE_FREE(rparam);
2789
2790         return fnum;
2791 }
2792
2793 /****************************************************************************
2794  open - POSIX semantics.
2795 ****************************************************************************/
2796
2797 int cli_posix_open(struct cli_state *cli, const char *fname, int flags, mode_t mode)
2798 {
2799         return cli_posix_open_internal(cli, fname, flags, mode, False);
2800 }
2801
2802 /****************************************************************************
2803  mkdir - POSIX semantics.
2804 ****************************************************************************/
2805
2806 int cli_posix_mkdir(struct cli_state *cli, const char *fname, mode_t mode)
2807 {
2808         return (cli_posix_open_internal(cli, fname, O_CREAT, mode, True) == -1) ? -1 : 0;
2809 }
2810
2811 /****************************************************************************
2812  unlink or rmdir - POSIX semantics.
2813 ****************************************************************************/
2814
2815 static bool cli_posix_unlink_internal(struct cli_state *cli, const char *fname, bool is_dir)
2816 {
2817         unsigned int data_len = 0;
2818         unsigned int param_len = 0;
2819         uint16 setup = TRANSACT2_SETPATHINFO;
2820         char *param;
2821         char data[2];
2822         char *rparam=NULL, *rdata=NULL;
2823         char *p;
2824         size_t srclen = 2*(strlen(fname)+1);
2825
2826         param = SMB_MALLOC_ARRAY(char, 6+srclen+2);
2827         if (!param) {
2828                 return false;
2829         }
2830         memset(param, '\0', 6);
2831         SSVAL(param,0, SMB_POSIX_PATH_UNLINK);
2832         p = &param[6];
2833
2834         p += clistr_push(cli, p, fname, srclen, STR_TERMINATE);
2835         param_len = PTR_DIFF(p, param);
2836
2837         SSVAL(data, 0, is_dir ? SMB_POSIX_UNLINK_DIRECTORY_TARGET :
2838                         SMB_POSIX_UNLINK_FILE_TARGET);
2839         data_len = 2;
2840
2841         if (!cli_send_trans(cli, SMBtrans2,
2842                         NULL,                        /* name */
2843                         -1, 0,                          /* fid, flags */
2844                         &setup, 1, 0,                   /* setup, length, max */
2845                         param, param_len, 2,            /* param, length, max */
2846                         (char *)&data,  data_len, cli->max_xmit /* data, length, max */
2847                         )) {
2848                 SAFE_FREE(param);
2849                 return False;
2850         }
2851
2852         SAFE_FREE(param);
2853
2854         if (!cli_receive_trans(cli, SMBtrans2,
2855                 &rparam, &param_len,
2856                 &rdata, &data_len)) {
2857                         return False;
2858         }
2859
2860         SAFE_FREE(rdata);
2861         SAFE_FREE(rparam);
2862
2863         return True;
2864 }
2865
2866 /****************************************************************************
2867  unlink - POSIX semantics.
2868 ****************************************************************************/
2869
2870 bool cli_posix_unlink(struct cli_state *cli, const char *fname)
2871 {
2872         return cli_posix_unlink_internal(cli, fname, False);
2873 }
2874
2875 /****************************************************************************
2876  rmdir - POSIX semantics.
2877 ****************************************************************************/
2878
2879 int cli_posix_rmdir(struct cli_state *cli, const char *fname)
2880 {
2881         return cli_posix_unlink_internal(cli, fname, True);
2882 }