r21905: Rename
[nivanova/samba-autobuild/.git] / source3 / param / loadparm.c
1 /* 
2    Unix SMB/CIFS implementation.
3    Parameter loading functions
4    Copyright (C) Karl Auer 1993-1998
5
6    Largely re-written by Andrew Tridgell, September 1994
7
8    Copyright (C) Simo Sorce 2001
9    Copyright (C) Alexander Bokovoy 2002
10    Copyright (C) Stefan (metze) Metzmacher 2002
11    Copyright (C) Jim McDonough <jmcd@us.ibm.com> 2003
12    
13    This program is free software; you can redistribute it and/or modify
14    it under the terms of the GNU General Public License as published by
15    the Free Software Foundation; either version 2 of the License, or
16    (at your option) any later version.
17    
18    This program is distributed in the hope that it will be useful,
19    but WITHOUT ANY WARRANTY; without even the implied warranty of
20    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
21    GNU General Public License for more details.
22    
23    You should have received a copy of the GNU General Public License
24    along with this program; if not, write to the Free Software
25    Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
26 */
27
28 /*
29  *  Load parameters.
30  *
31  *  This module provides suitable callback functions for the params
32  *  module. It builds the internal table of service details which is
33  *  then used by the rest of the server.
34  *
35  * To add a parameter:
36  *
37  * 1) add it to the global or service structure definition
38  * 2) add it to the parm_table
39  * 3) add it to the list of available functions (eg: using FN_GLOBAL_STRING())
40  * 4) If it's a global then initialise it in init_globals. If a local
41  *    (ie. service) parameter then initialise it in the sDefault structure
42  *  
43  *
44  * Notes:
45  *   The configuration file is processed sequentially for speed. It is NOT
46  *   accessed randomly as happens in 'real' Windows. For this reason, there
47  *   is a fair bit of sequence-dependent code here - ie., code which assumes
48  *   that certain things happen before others. In particular, the code which
49  *   happens at the boundary between sections is delicately poised, so be
50  *   careful!
51  *
52  */
53
54 #include "includes.h"
55
56 BOOL in_client = False;         /* Not in the client by default */
57 BOOL bLoaded = False;
58
59 extern pstring user_socket_options;
60 extern enum protocol_types Protocol;
61 extern userdom_struct current_user_info;
62
63 #ifndef GLOBAL_NAME
64 #define GLOBAL_NAME "global"
65 #endif
66
67 #ifndef PRINTERS_NAME
68 #define PRINTERS_NAME "printers"
69 #endif
70
71 #ifndef HOMES_NAME
72 #define HOMES_NAME "homes"
73 #endif
74
75 /* some helpful bits */
76 #define LP_SNUM_OK(i) (((i) >= 0) && ((i) < iNumServices) && (ServicePtrs != NULL) && ServicePtrs[(i)]->valid)
77 #define VALID(i) (ServicePtrs != NULL && ServicePtrs[i]->valid)
78
79 #define USERSHARE_VALID 1
80 #define USERSHARE_PENDING_DELETE 2
81
82 BOOL use_getwd_cache = True;
83
84 extern int extra_time_offset;
85
86 static BOOL defaults_saved = False;
87
88 typedef struct _param_opt_struct param_opt_struct;
89 struct _param_opt_struct {
90         param_opt_struct *prev, *next;
91         char *key;
92         char *value;
93         char **list;
94 };
95
96 /* 
97  * This structure describes global (ie., server-wide) parameters.
98  */
99 typedef struct {
100         char *smb_ports;
101         char *dos_charset;
102         char *unix_charset;
103         char *display_charset;
104         char *szPrintcapname;
105         char *szAddPortCommand;
106         char *szEnumPortsCommand;
107         char *szAddPrinterCommand;
108         char *szDeletePrinterCommand;
109         char *szOs2DriverMap;
110         char *szLockDir;
111         char *szPidDir;
112         char *szRootdir;
113         char *szDefaultService;
114         char *szGetQuota;
115         char *szSetQuota;
116         char *szMsgCommand;
117         char *szServerString;
118         char *szAutoServices;
119         char *szPasswdProgram;
120         char *szPasswdChat;
121         char *szLogFile;
122         char *szConfigFile;
123         char *szSMBPasswdFile;
124         char *szPrivateDir;
125         char *szPassdbBackend;
126         char **szPreloadModules;
127         char *szPasswordServer;
128         char *szSocketOptions;
129         char *szRealm;
130         char *szAfsUsernameMap;
131         int iAfsTokenLifetime;
132         char *szLogNtTokenCommand;
133         char *szUsernameMap;
134         char *szLogonScript;
135         char *szLogonPath;
136         char *szLogonDrive;
137         char *szLogonHome;
138         char **szWINSservers;
139         char **szInterfaces;
140         char *szRemoteAnnounce;
141         char *szRemoteBrowseSync;
142         char *szSocketAddress;
143         char *szNISHomeMapName;
144         char *szAnnounceVersion;        /* This is initialised in init_globals */
145         char *szWorkgroup;
146         char *szNetbiosName;
147         char **szNetbiosAliases;
148         char *szNetbiosScope;
149         char *szNameResolveOrder;
150         char *szPanicAction;
151         char *szAddUserScript;
152         char *szRenameUserScript;
153         char *szDelUserScript;
154         char *szAddGroupScript;
155         char *szDelGroupScript;
156         char *szAddUserToGroupScript;
157         char *szDelUserFromGroupScript;
158         char *szSetPrimaryGroupScript;
159         char *szAddMachineScript;
160         char *szShutdownScript;
161         char *szAbortShutdownScript;
162         char *szUsernameMapScript;
163         char *szCheckPasswordScript;
164         char *szWINSHook;
165         char *szUtmpDir;
166         char *szWtmpDir;
167         BOOL bUtmp;
168         char *szIdmapUID;
169         char *szIdmapGID;
170         BOOL bPassdbExpandExplicit;
171         int AlgorithmicRidBase;
172         char *szTemplateHomedir;
173         char *szTemplateShell;
174         char *szWinbindSeparator;
175         BOOL bWinbindEnumUsers;
176         BOOL bWinbindEnumGroups;
177         BOOL bWinbindUseDefaultDomain;
178         BOOL bWinbindTrustedDomainsOnly;
179         BOOL bWinbindNestedGroups;
180         BOOL bWinbindRefreshTickets;
181         BOOL bWinbindOfflineLogon;
182         BOOL bWinbindNormalizeNames;
183         char **szIdmapDomains;
184         char **szIdmapBackend; /* deprecated */
185         char *szIdmapAllocBackend;
186         char *szAddShareCommand;
187         char *szChangeShareCommand;
188         char *szDeleteShareCommand;
189         char **szEventLogs;
190         char *szGuestaccount;
191         char *szManglingMethod;
192         char **szServicesList;
193         char *szUsersharePath;
194         char *szUsershareTemplateShare;
195         char **szUsersharePrefixAllowList;
196         char **szUsersharePrefixDenyList;
197         int mangle_prefix;
198         int max_log_size;
199         char *szLogLevel;
200         int max_xmit;
201         int max_mux;
202         int max_open_files;
203         int open_files_db_hash_size;
204         int pwordlevel;
205         int unamelevel;
206         int deadtime;
207         int maxprotocol;
208         int minprotocol;
209         int security;
210         char **AuthMethods;
211         BOOL paranoid_server_security;
212         int maxdisksize;
213         int lpqcachetime;
214         int iMaxSmbdProcesses;
215         BOOL bDisableSpoolss;
216         int syslog;
217         int os_level;
218         int enhanced_browsing;
219         int max_ttl;
220         int max_wins_ttl;
221         int min_wins_ttl;
222         int lm_announce;
223         int lm_interval;
224         int announce_as;        /* This is initialised in init_globals */
225         int machine_password_timeout;
226         int map_to_guest;
227         int oplock_break_wait_time;
228         int winbind_cache_time;
229         int winbind_max_idle_children;
230         char **szWinbindNssInfo;
231         int iLockSpinTime;
232         char *szLdapMachineSuffix;
233         char *szLdapUserSuffix;
234         char *szLdapIdmapSuffix;
235         char *szLdapGroupSuffix;
236         int ldap_ssl;
237         char *szLdapSuffix;
238         char *szLdapAdminDn;
239         int iAclCompat;
240         char *szCupsServer;
241         char *szIPrintServer;
242         int ldap_passwd_sync; 
243         int ldap_replication_sleep;
244         int ldap_timeout; /* This is initialised in init_globals */
245         int ldap_page_size;
246         BOOL ldap_delete_dn;
247         BOOL bMsAddPrinterWizard;
248         BOOL bDNSproxy;
249         BOOL bWINSsupport;
250         BOOL bWINSproxy;
251         BOOL bLocalMaster;
252         BOOL bPreferredMaster;
253         BOOL bDomainMaster;
254         BOOL bDomainLogons;
255         BOOL bEncryptPasswords;
256         BOOL bUpdateEncrypt;
257         int  clientSchannel;
258         int  serverSchannel;
259         BOOL bNullPasswords;
260         BOOL bObeyPamRestrictions;
261         BOOL bLoadPrinters;
262         int PrintcapCacheTime;
263         BOOL bLargeReadwrite;
264         BOOL bReadRaw;
265         BOOL bWriteRaw;
266         BOOL bReadbmpx;
267         BOOL bSyslogOnly;
268         BOOL bBrowseList;
269         BOOL bNISHomeMap;
270         BOOL bTimeServer;
271         BOOL bBindInterfacesOnly;
272         BOOL bPamPasswordChange;
273         BOOL bUnixPasswdSync;
274         BOOL bPasswdChatDebug;
275         int iPasswdChatTimeout;
276         BOOL bTimestampLogs;
277         BOOL bNTSmbSupport;
278         BOOL bNTPipeSupport;
279         BOOL bNTStatusSupport;
280         BOOL bStatCache;
281         int iMaxStatCacheSize;
282         BOOL bKernelOplocks;
283         BOOL bAllowTrustedDomains;
284         BOOL bLanmanAuth;
285         BOOL bNTLMAuth;
286         BOOL bUseSpnego;
287         BOOL bClientLanManAuth;
288         BOOL bClientNTLMv2Auth;
289         BOOL bClientPlaintextAuth;
290         BOOL bClientUseSpnego;
291         BOOL bDebugPrefixTimestamp;
292         BOOL bDebugHiresTimestamp;
293         BOOL bDebugPid;
294         BOOL bDebugUid;
295         BOOL bEnableCoreFiles;
296         BOOL bHostMSDfs;
297         BOOL bUseMmap;
298         BOOL bHostnameLookups;
299         BOOL bUnixExtensions;
300         BOOL bDisableNetbios;
301         BOOL bUseKerberosKeytab;
302         BOOL bDeferSharingViolations;
303         BOOL bEnablePrivileges;
304         BOOL bASUSupport;
305         BOOL bUsershareOwnerOnly;
306         BOOL bUsershareAllowGuests;
307         BOOL bRegistryShares;
308         int restrict_anonymous;
309         int name_cache_timeout;
310         int client_signing;
311         int server_signing;
312         int iUsershareMaxShares;
313         int iIdmapCacheTime;
314         int iIdmapNegativeCacheTime;
315
316         BOOL bResetOnZeroVC;
317         int iKeepalive;
318         param_opt_struct *param_opt;
319 } global;
320
321 static global Globals;
322
323 /* 
324  * This structure describes a single service. 
325  */
326 typedef struct {
327         BOOL valid;
328         BOOL autoloaded;
329         int usershare;
330         time_t usershare_last_mod;
331         char *szService;
332         char *szPath;
333         char *szUsername;
334         char **szInvalidUsers;
335         char **szValidUsers;
336         char **szAdminUsers;
337         char *szCopy;
338         char *szInclude;
339         char *szPreExec;
340         char *szPostExec;
341         char *szRootPreExec;
342         char *szRootPostExec;
343         char *szCupsOptions;
344         char *szPrintcommand;
345         char *szLpqcommand;
346         char *szLprmcommand;
347         char *szLppausecommand;
348         char *szLpresumecommand;
349         char *szQueuepausecommand;
350         char *szQueueresumecommand;
351         char *szPrintername;
352         char *szPrintjobUsername;
353         char *szDontdescend;
354         char **szHostsallow;
355         char **szHostsdeny;
356         char *szMagicScript;
357         char *szMagicOutput;
358         char *szMangledMap;
359         char *szVetoFiles;
360         char *szHideFiles;
361         char *szVetoOplockFiles;
362         char *comment;
363         char *force_user;
364         char *force_group;
365         char **readlist;
366         char **writelist;
367         char **printer_admin;
368         char *volume;
369         char *fstype;
370         char **szVfsObjects;
371         char *szMSDfsProxy;
372         char *szDfree;
373         int iMinPrintSpace;
374         int iMaxPrintJobs;
375         int iMaxReportedPrintJobs;
376         int iWriteCacheSize;
377         int iCreate_mask;
378         int iCreate_force_mode;
379         int iSecurity_mask;
380         int iSecurity_force_mode;
381         int iDir_mask;
382         int iDir_force_mode;
383         int iDir_Security_mask;
384         int iDir_Security_force_mode;
385         int iMaxConnections;
386         int iDefaultCase;
387         int iPrinting;
388         int iOplockContentionLimit;
389         int iCSCPolicy;
390         int iBlock_size;
391         int iDfreeCacheTime;
392         BOOL bPreexecClose;
393         BOOL bRootpreexecClose;
394         int  iCaseSensitive;
395         BOOL bCasePreserve;
396         BOOL bShortCasePreserve;
397         BOOL bHideDotFiles;
398         BOOL bHideSpecialFiles;
399         BOOL bHideUnReadable;
400         BOOL bHideUnWriteableFiles;
401         BOOL bBrowseable;
402         BOOL bAvailable;
403         BOOL bRead_only;
404         BOOL bNo_set_dir;
405         BOOL bGuest_only;
406         BOOL bGuest_ok;
407         BOOL bPrint_ok;
408         BOOL bMap_system;
409         BOOL bMap_hidden;
410         BOOL bMap_archive;
411         BOOL bStoreDosAttributes;
412         BOOL bDmapiSupport;
413         BOOL bLocking;
414         int iStrictLocking;
415         BOOL bPosixLocking;
416         BOOL bShareModes;
417         BOOL bOpLocks;
418         BOOL bLevel2OpLocks;
419         BOOL bOnlyUser;
420         BOOL bMangledNames;
421         BOOL bWidelinks;
422         BOOL bSymlinks;
423         BOOL bSyncAlways;
424         BOOL bStrictAllocate;
425         BOOL bStrictSync;
426         char magic_char;
427         BOOL *copymap;
428         BOOL bDeleteReadonly;
429         BOOL bFakeOplocks;
430         BOOL bDeleteVetoFiles;
431         BOOL bDosFilemode;
432         BOOL bDosFiletimes;
433         BOOL bDosFiletimeResolution;
434         BOOL bFakeDirCreateTimes;
435         BOOL bBlockingLocks;
436         BOOL bInheritPerms;
437         BOOL bInheritACLS;
438         BOOL bInheritOwner;
439         BOOL bMSDfsRoot;
440         BOOL bUseClientDriver;
441         BOOL bDefaultDevmode;
442         BOOL bForcePrintername;
443         BOOL bNTAclSupport;
444         BOOL bForceUnknownAclUser;
445         BOOL bUseSendfile;
446         BOOL bProfileAcls;
447         BOOL bMap_acl_inherit;
448         BOOL bAfs_Share;
449         BOOL bEASupport;
450         BOOL bAclCheckPermissions;
451         BOOL bAclMapFullControl;
452         BOOL bAclGroupControl;
453         BOOL bChangeNotify;
454         BOOL bKernelChangeNotify;
455         int iallocation_roundup_size;
456         int iAioReadSize;
457         int iAioWriteSize;
458         int iMap_readonly;
459         param_opt_struct *param_opt;
460
461         char dummy[3];          /* for alignment */
462 } service;
463
464
465 /* This is a default service used to prime a services structure */
466 static service sDefault = {
467         True,                   /* valid */
468         False,                  /* not autoloaded */
469         0,                      /* not a usershare */
470         (time_t)0,              /* No last mod time */
471         NULL,                   /* szService */
472         NULL,                   /* szPath */
473         NULL,                   /* szUsername */
474         NULL,                   /* szInvalidUsers */
475         NULL,                   /* szValidUsers */
476         NULL,                   /* szAdminUsers */
477         NULL,                   /* szCopy */
478         NULL,                   /* szInclude */
479         NULL,                   /* szPreExec */
480         NULL,                   /* szPostExec */
481         NULL,                   /* szRootPreExec */
482         NULL,                   /* szRootPostExec */
483         NULL,                   /* szCupsOptions */
484         NULL,                   /* szPrintcommand */
485         NULL,                   /* szLpqcommand */
486         NULL,                   /* szLprmcommand */
487         NULL,                   /* szLppausecommand */
488         NULL,                   /* szLpresumecommand */
489         NULL,                   /* szQueuepausecommand */
490         NULL,                   /* szQueueresumecommand */
491         NULL,                   /* szPrintername */
492         NULL,                   /* szPrintjobUsername */
493         NULL,                   /* szDontdescend */
494         NULL,                   /* szHostsallow */
495         NULL,                   /* szHostsdeny */
496         NULL,                   /* szMagicScript */
497         NULL,                   /* szMagicOutput */
498         NULL,                   /* szMangledMap */
499         NULL,                   /* szVetoFiles */
500         NULL,                   /* szHideFiles */
501         NULL,                   /* szVetoOplockFiles */
502         NULL,                   /* comment */
503         NULL,                   /* force user */
504         NULL,                   /* force group */
505         NULL,                   /* readlist */
506         NULL,                   /* writelist */
507         NULL,                   /* printer admin */
508         NULL,                   /* volume */
509         NULL,                   /* fstype */
510         NULL,                   /* vfs objects */
511         NULL,                   /* szMSDfsProxy */
512         NULL,                   /* szDfree */
513         0,                      /* iMinPrintSpace */
514         1000,                   /* iMaxPrintJobs */
515         0,                      /* iMaxReportedPrintJobs */
516         0,                      /* iWriteCacheSize */
517         0744,                   /* iCreate_mask */
518         0000,                   /* iCreate_force_mode */
519         0777,                   /* iSecurity_mask */
520         0,                      /* iSecurity_force_mode */
521         0755,                   /* iDir_mask */
522         0000,                   /* iDir_force_mode */
523         0777,                   /* iDir_Security_mask */
524         0,                      /* iDir_Security_force_mode */
525         0,                      /* iMaxConnections */
526         CASE_LOWER,             /* iDefaultCase */
527         DEFAULT_PRINTING,       /* iPrinting */
528         2,                      /* iOplockContentionLimit */
529         0,                      /* iCSCPolicy */
530         1024,                   /* iBlock_size */
531         0,                      /* iDfreeCacheTime */
532         False,                  /* bPreexecClose */
533         False,                  /* bRootpreexecClose */
534         Auto,                   /* case sensitive */
535         True,                   /* case preserve */
536         True,                   /* short case preserve */
537         True,                   /* bHideDotFiles */
538         False,                  /* bHideSpecialFiles */
539         False,                  /* bHideUnReadable */
540         False,                  /* bHideUnWriteableFiles */
541         True,                   /* bBrowseable */
542         True,                   /* bAvailable */
543         True,                   /* bRead_only */
544         True,                   /* bNo_set_dir */
545         False,                  /* bGuest_only */
546         False,                  /* bGuest_ok */
547         False,                  /* bPrint_ok */
548         False,                  /* bMap_system */
549         False,                  /* bMap_hidden */
550         True,                   /* bMap_archive */
551         False,                  /* bStoreDosAttributes */
552         False,                  /* bDmapiSupport */
553         True,                   /* bLocking */
554         Auto,                   /* iStrictLocking */
555         True,                   /* bPosixLocking */
556         True,                   /* bShareModes */
557         True,                   /* bOpLocks */
558         True,                   /* bLevel2OpLocks */
559         False,                  /* bOnlyUser */
560         True,                   /* bMangledNames */
561         True,                   /* bWidelinks */
562         True,                   /* bSymlinks */
563         False,                  /* bSyncAlways */
564         False,                  /* bStrictAllocate */
565         False,                  /* bStrictSync */
566         '~',                    /* magic char */
567         NULL,                   /* copymap */
568         False,                  /* bDeleteReadonly */
569         False,                  /* bFakeOplocks */
570         False,                  /* bDeleteVetoFiles */
571         False,                  /* bDosFilemode */
572         True,                   /* bDosFiletimes */
573         False,                  /* bDosFiletimeResolution */
574         False,                  /* bFakeDirCreateTimes */
575         True,                   /* bBlockingLocks */
576         False,                  /* bInheritPerms */
577         False,                  /* bInheritACLS */
578         False,                  /* bInheritOwner */
579         False,                  /* bMSDfsRoot */
580         False,                  /* bUseClientDriver */
581         True,                   /* bDefaultDevmode */
582         False,                  /* bForcePrintername */
583         True,                   /* bNTAclSupport */
584         False,                  /* bForceUnknownAclUser */
585         False,                  /* bUseSendfile */
586         False,                  /* bProfileAcls */
587         False,                  /* bMap_acl_inherit */
588         False,                  /* bAfs_Share */
589         False,                  /* bEASupport */
590         True,                   /* bAclCheckPermissions */
591         True,                   /* bAclMapFullControl */
592         False,                  /* bAclGroupControl */
593         True,                   /* bChangeNotify */
594         True,                   /* bKernelChangeNotify */
595         SMB_ROUNDUP_ALLOCATION_SIZE,            /* iallocation_roundup_size */
596         0,                      /* iAioReadSize */
597         0,                      /* iAioWriteSize */
598         MAP_READONLY_YES,       /* iMap_readonly */
599         
600         NULL,                   /* Parametric options */
601
602         ""                      /* dummy */
603 };
604
605 /* local variables */
606 static service **ServicePtrs = NULL;
607 static int iNumServices = 0;
608 static int iServiceIndex = 0;
609 static TDB_CONTEXT *ServiceHash;
610 static int *invalid_services = NULL;
611 static int num_invalid_services = 0;
612 static BOOL bInGlobalSection = True;
613 static BOOL bGlobalOnly = False;
614 static int server_role;
615 static int default_server_announce;
616
617 #define NUMPARAMETERS (sizeof(parm_table) / sizeof(struct parm_struct))
618
619 /* prototypes for the special type handlers */
620 static BOOL handle_include( int snum, const char *pszParmValue, char **ptr);
621 static BOOL handle_copy( int snum, const char *pszParmValue, char **ptr);
622 static BOOL handle_netbios_name( int snum, const char *pszParmValue, char **ptr);
623 static BOOL handle_idmap_uid( int snum, const char *pszParmValue, char **ptr);
624 static BOOL handle_idmap_gid( int snum, const char *pszParmValue, char **ptr);
625 static BOOL handle_debug_list( int snum, const char *pszParmValue, char **ptr );
626 static BOOL handle_workgroup( int snum, const char *pszParmValue, char **ptr );
627 static BOOL handle_netbios_aliases( int snum, const char *pszParmValue, char **ptr );
628 static BOOL handle_netbios_scope( int snum, const char *pszParmValue, char **ptr );
629 static BOOL handle_charset( int snum, const char *pszParmValue, char **ptr );
630 static BOOL handle_printing( int snum, const char *pszParmValue, char **ptr);
631
632 static void set_server_role(void);
633 static void set_default_server_announce_type(void);
634 static void set_allowed_client_auth(void);
635
636 static const struct enum_list enum_protocol[] = {
637         {PROTOCOL_NT1, "NT1"},
638         {PROTOCOL_LANMAN2, "LANMAN2"},
639         {PROTOCOL_LANMAN1, "LANMAN1"},
640         {PROTOCOL_CORE, "CORE"},
641         {PROTOCOL_COREPLUS, "COREPLUS"},
642         {PROTOCOL_COREPLUS, "CORE+"},
643         {-1, NULL}
644 };
645
646 static const struct enum_list enum_security[] = {
647         {SEC_SHARE, "SHARE"},
648         {SEC_USER, "USER"},
649         {SEC_SERVER, "SERVER"},
650         {SEC_DOMAIN, "DOMAIN"},
651 #ifdef HAVE_ADS
652         {SEC_ADS, "ADS"},
653 #endif
654         {-1, NULL}
655 };
656
657 static const struct enum_list enum_printing[] = {
658         {PRINT_SYSV, "sysv"},
659         {PRINT_AIX, "aix"},
660         {PRINT_HPUX, "hpux"},
661         {PRINT_BSD, "bsd"},
662         {PRINT_QNX, "qnx"},
663         {PRINT_PLP, "plp"},
664         {PRINT_LPRNG, "lprng"},
665         {PRINT_CUPS, "cups"},
666         {PRINT_IPRINT, "iprint"},
667         {PRINT_LPRNT, "nt"},
668         {PRINT_LPROS2, "os2"},
669 #ifdef DEVELOPER
670         {PRINT_TEST, "test"},
671         {PRINT_VLP, "vlp"},
672 #endif /* DEVELOPER */
673         {-1, NULL}
674 };
675
676 static const struct enum_list enum_ldap_ssl[] = {
677         {LDAP_SSL_OFF, "no"},
678         {LDAP_SSL_OFF, "No"},
679         {LDAP_SSL_OFF, "off"},
680         {LDAP_SSL_OFF, "Off"},
681         {LDAP_SSL_START_TLS, "start tls"},
682         {LDAP_SSL_START_TLS, "Start_tls"},
683         {-1, NULL}
684 };
685
686 static const struct enum_list enum_ldap_passwd_sync[] = {
687         {LDAP_PASSWD_SYNC_OFF, "no"},
688         {LDAP_PASSWD_SYNC_OFF, "No"},
689         {LDAP_PASSWD_SYNC_OFF, "off"},
690         {LDAP_PASSWD_SYNC_OFF, "Off"},
691         {LDAP_PASSWD_SYNC_ON, "Yes"},
692         {LDAP_PASSWD_SYNC_ON, "yes"},
693         {LDAP_PASSWD_SYNC_ON, "on"},
694         {LDAP_PASSWD_SYNC_ON, "On"},
695         {LDAP_PASSWD_SYNC_ONLY, "Only"},
696         {LDAP_PASSWD_SYNC_ONLY, "only"},
697         {-1, NULL}
698 };
699
700 /* Types of machine we can announce as. */
701 #define ANNOUNCE_AS_NT_SERVER 1
702 #define ANNOUNCE_AS_WIN95 2
703 #define ANNOUNCE_AS_WFW 3
704 #define ANNOUNCE_AS_NT_WORKSTATION 4
705
706 static const struct enum_list enum_announce_as[] = {
707         {ANNOUNCE_AS_NT_SERVER, "NT"},
708         {ANNOUNCE_AS_NT_SERVER, "NT Server"},
709         {ANNOUNCE_AS_NT_WORKSTATION, "NT Workstation"},
710         {ANNOUNCE_AS_WIN95, "win95"},
711         {ANNOUNCE_AS_WFW, "WfW"},
712         {-1, NULL}
713 };
714
715 static const struct enum_list enum_map_readonly[] = {
716         {MAP_READONLY_NO, "no"},
717         {MAP_READONLY_NO, "false"},
718         {MAP_READONLY_NO, "0"},
719         {MAP_READONLY_YES, "yes"},
720         {MAP_READONLY_YES, "true"},
721         {MAP_READONLY_YES, "1"},
722         {MAP_READONLY_PERMISSIONS, "permissions"},
723         {MAP_READONLY_PERMISSIONS, "perms"},
724         {-1, NULL}
725 };
726
727 static const struct enum_list enum_case[] = {
728         {CASE_LOWER, "lower"},
729         {CASE_UPPER, "upper"},
730         {-1, NULL}
731 };
732
733 static const struct enum_list enum_bool_auto[] = {
734         {False, "No"},
735         {False, "False"},
736         {False, "0"},
737         {True, "Yes"},
738         {True, "True"},
739         {True, "1"},
740         {Auto, "Auto"},
741         {-1, NULL}
742 };
743
744 /* Client-side offline caching policy types */
745 #define CSC_POLICY_MANUAL 0
746 #define CSC_POLICY_DOCUMENTS 1
747 #define CSC_POLICY_PROGRAMS 2
748 #define CSC_POLICY_DISABLE 3
749
750 static const struct enum_list enum_csc_policy[] = {
751         {CSC_POLICY_MANUAL, "manual"},
752         {CSC_POLICY_DOCUMENTS, "documents"},
753         {CSC_POLICY_PROGRAMS, "programs"},
754         {CSC_POLICY_DISABLE, "disable"},
755         {-1, NULL}
756 };
757
758 /* SMB signing types. */
759 static const struct enum_list enum_smb_signing_vals[] = {
760         {False, "No"},
761         {False, "False"},
762         {False, "0"},
763         {False, "Off"},
764         {False, "disabled"},
765         {True, "Yes"},
766         {True, "True"},
767         {True, "1"},
768         {True, "On"},
769         {True, "enabled"},
770         {Auto, "auto"},
771         {Required, "required"},
772         {Required, "mandatory"},
773         {Required, "force"},
774         {Required, "forced"},
775         {Required, "enforced"},
776         {-1, NULL}
777 };
778
779 /* ACL compatibility options. */
780 static const struct enum_list enum_acl_compat_vals[] = {
781     { ACL_COMPAT_AUTO, "auto" },
782     { ACL_COMPAT_WINNT, "winnt" },
783     { ACL_COMPAT_WIN2K, "win2k" },
784     { -1, NULL}
785 };
786
787 /* 
788    Do you want session setups at user level security with a invalid
789    password to be rejected or allowed in as guest? WinNT rejects them
790    but it can be a pain as it means "net view" needs to use a password
791
792    You have 3 choices in the setting of map_to_guest:
793
794    "Never" means session setups with an invalid password
795    are rejected. This is the default.
796
797    "Bad User" means session setups with an invalid password
798    are rejected, unless the username does not exist, in which case it
799    is treated as a guest login
800
801    "Bad Password" means session setups with an invalid password
802    are treated as a guest login
803
804    Note that map_to_guest only has an effect in user or server
805    level security.
806 */
807
808 static const struct enum_list enum_map_to_guest[] = {
809         {NEVER_MAP_TO_GUEST, "Never"},
810         {MAP_TO_GUEST_ON_BAD_USER, "Bad User"},
811         {MAP_TO_GUEST_ON_BAD_PASSWORD, "Bad Password"},
812         {MAP_TO_GUEST_ON_BAD_UID, "Bad Uid"},
813         {-1, NULL}
814 };
815
816 /* Note: We do not initialise the defaults union - it is not allowed in ANSI C
817  *
818  * The FLAG_HIDE is explicit. Paramters set this way do NOT appear in any edit
819  * screen in SWAT. This is used to exclude parameters as well as to squash all
820  * parameters that have been duplicated by pseudonyms.
821  *
822  * NOTE: To display a parameter in BASIC view set FLAG_BASIC
823  *       Any parameter that does NOT have FLAG_ADVANCED will not disply at all
824  *       Set FLAG_SHARE and FLAG_PRINT to specifically display parameters in
825  *        respective views.
826  *
827  * NOTE2: Handling of duplicated (synonym) paramters:
828  *      Only the first occurance of a parameter should be enabled by FLAG_BASIC
829  *      and/or FLAG_ADVANCED. All duplicates following the first mention should be
830  *      set to FLAG_HIDE. ie: Make you must place the parameter that has the preferred
831  *      name first, and all synonyms must follow it with the FLAG_HIDE attribute.
832  */
833
834 static struct parm_struct parm_table[] = {
835         {N_("Base Options"), P_SEP, P_SEPARATOR}, 
836
837         {"dos charset", P_STRING, P_GLOBAL, &Globals.dos_charset, handle_charset, NULL, FLAG_ADVANCED}, 
838         {"unix charset", P_STRING, P_GLOBAL, &Globals.unix_charset, handle_charset, NULL, FLAG_ADVANCED}, 
839         {"display charset", P_STRING, P_GLOBAL, &Globals.display_charset, handle_charset, NULL, FLAG_ADVANCED}, 
840         {"comment", P_STRING, P_LOCAL, &sDefault.comment, NULL, NULL, FLAG_BASIC | FLAG_ADVANCED | FLAG_SHARE | FLAG_PRINT}, 
841         {"path", P_STRING, P_LOCAL, &sDefault.szPath, NULL, NULL, FLAG_BASIC | FLAG_ADVANCED | FLAG_SHARE | FLAG_PRINT}, 
842         {"directory", P_STRING, P_LOCAL, &sDefault.szPath, NULL, NULL, FLAG_HIDE}, 
843         {"workgroup", P_USTRING, P_GLOBAL, &Globals.szWorkgroup, handle_workgroup, NULL, FLAG_BASIC | FLAG_ADVANCED | FLAG_WIZARD}, 
844 #ifdef WITH_ADS
845         {"realm", P_USTRING, P_GLOBAL, &Globals.szRealm, NULL, NULL, FLAG_BASIC | FLAG_ADVANCED | FLAG_WIZARD}, 
846 #endif
847         {"netbios name", P_USTRING, P_GLOBAL, &Globals.szNetbiosName, handle_netbios_name, NULL, FLAG_BASIC | FLAG_ADVANCED | FLAG_WIZARD}, 
848         {"netbios aliases", P_LIST, P_GLOBAL, &Globals.szNetbiosAliases, handle_netbios_aliases,  NULL, FLAG_ADVANCED}, 
849         {"netbios scope", P_USTRING, P_GLOBAL, &Globals.szNetbiosScope, handle_netbios_scope,  NULL, FLAG_ADVANCED}, 
850         {"server string", P_STRING, P_GLOBAL, &Globals.szServerString, NULL, NULL, FLAG_BASIC | FLAG_ADVANCED }, 
851         {"interfaces", P_LIST, P_GLOBAL, &Globals.szInterfaces, NULL, NULL, FLAG_BASIC | FLAG_ADVANCED | FLAG_WIZARD}, 
852         {"bind interfaces only", P_BOOL, P_GLOBAL, &Globals.bBindInterfacesOnly, NULL, NULL, FLAG_ADVANCED | FLAG_WIZARD}, 
853
854         {N_("Security Options"), P_SEP, P_SEPARATOR}, 
855
856         {"security", P_ENUM, P_GLOBAL, &Globals.security, NULL, enum_security, FLAG_BASIC | FLAG_ADVANCED | FLAG_WIZARD}, 
857         {"auth methods", P_LIST, P_GLOBAL, &Globals.AuthMethods, NULL, NULL, FLAG_ADVANCED}, 
858         {"encrypt passwords", P_BOOL, P_GLOBAL, &Globals.bEncryptPasswords, NULL, NULL, FLAG_BASIC | FLAG_ADVANCED | FLAG_WIZARD}, 
859         {"update encrypted", P_BOOL, P_GLOBAL, &Globals.bUpdateEncrypt, NULL, NULL, FLAG_ADVANCED}, 
860         {"client schannel", P_ENUM, P_GLOBAL, &Globals.clientSchannel, NULL, enum_bool_auto, FLAG_BASIC | FLAG_ADVANCED}, 
861         {"server schannel", P_ENUM, P_GLOBAL, &Globals.serverSchannel, NULL, enum_bool_auto, FLAG_BASIC | FLAG_ADVANCED}, 
862         {"allow trusted domains", P_BOOL, P_GLOBAL, &Globals.bAllowTrustedDomains, NULL, NULL, FLAG_ADVANCED}, 
863         {"map to guest", P_ENUM, P_GLOBAL, &Globals.map_to_guest, NULL, enum_map_to_guest, FLAG_ADVANCED}, 
864         {"null passwords", P_BOOL, P_GLOBAL, &Globals.bNullPasswords, NULL, NULL, FLAG_ADVANCED}, 
865         {"obey pam restrictions", P_BOOL, P_GLOBAL, &Globals.bObeyPamRestrictions, NULL, NULL, FLAG_ADVANCED}, 
866         {"password server", P_STRING, P_GLOBAL, &Globals.szPasswordServer, NULL, NULL, FLAG_ADVANCED | FLAG_WIZARD}, 
867         {"smb passwd file", P_STRING, P_GLOBAL, &Globals.szSMBPasswdFile, NULL, NULL, FLAG_ADVANCED}, 
868         {"private dir", P_STRING, P_GLOBAL, &Globals.szPrivateDir, NULL, NULL, FLAG_ADVANCED}, 
869         {"passdb backend", P_STRING, P_GLOBAL, &Globals.szPassdbBackend, NULL, NULL, FLAG_ADVANCED | FLAG_WIZARD}, 
870         {"algorithmic rid base", P_INTEGER, P_GLOBAL, &Globals.AlgorithmicRidBase, NULL, NULL, FLAG_ADVANCED}, 
871         {"root directory", P_STRING, P_GLOBAL, &Globals.szRootdir, NULL, NULL, FLAG_ADVANCED}, 
872         {"root dir", P_STRING, P_GLOBAL, &Globals.szRootdir, NULL, NULL, FLAG_HIDE}, 
873         {"root", P_STRING, P_GLOBAL, &Globals.szRootdir, NULL, NULL, FLAG_HIDE}, 
874         {"guest account", P_STRING, P_GLOBAL, &Globals.szGuestaccount, NULL, NULL, FLAG_BASIC | FLAG_ADVANCED}, 
875         {"enable privileges", P_BOOL, P_GLOBAL, &Globals.bEnablePrivileges, NULL, NULL, FLAG_ADVANCED}, 
876
877         {"pam password change", P_BOOL, P_GLOBAL, &Globals.bPamPasswordChange, NULL, NULL, FLAG_ADVANCED}, 
878         {"passwd program", P_STRING, P_GLOBAL, &Globals.szPasswdProgram, NULL, NULL, FLAG_ADVANCED}, 
879         {"passwd chat", P_STRING, P_GLOBAL, &Globals.szPasswdChat, NULL, NULL, FLAG_ADVANCED}, 
880         {"passwd chat debug", P_BOOL, P_GLOBAL, &Globals.bPasswdChatDebug, NULL, NULL, FLAG_ADVANCED}, 
881         {"passwd chat timeout", P_INTEGER, P_GLOBAL, &Globals.iPasswdChatTimeout, NULL, NULL, FLAG_ADVANCED}, 
882         {"check password script", P_STRING, P_GLOBAL, &Globals.szCheckPasswordScript, NULL, NULL, FLAG_ADVANCED}, 
883         {"username map", P_STRING, P_GLOBAL, &Globals.szUsernameMap, NULL, NULL, FLAG_ADVANCED}, 
884         {"password level", P_INTEGER, P_GLOBAL, &Globals.pwordlevel, NULL, NULL, FLAG_ADVANCED}, 
885         {"username level", P_INTEGER, P_GLOBAL, &Globals.unamelevel, NULL, NULL, FLAG_ADVANCED}, 
886         {"unix password sync", P_BOOL, P_GLOBAL, &Globals.bUnixPasswdSync, NULL, NULL, FLAG_ADVANCED}, 
887         {"restrict anonymous", P_INTEGER, P_GLOBAL, &Globals.restrict_anonymous, NULL, NULL, FLAG_ADVANCED}, 
888         {"lanman auth", P_BOOL, P_GLOBAL, &Globals.bLanmanAuth, NULL, NULL, FLAG_ADVANCED}, 
889         {"ntlm auth", P_BOOL, P_GLOBAL, &Globals.bNTLMAuth, NULL, NULL, FLAG_ADVANCED}, 
890         {"client NTLMv2 auth", P_BOOL, P_GLOBAL, &Globals.bClientNTLMv2Auth, NULL, NULL, FLAG_ADVANCED}, 
891         {"client lanman auth", P_BOOL, P_GLOBAL, &Globals.bClientLanManAuth, NULL, NULL, FLAG_ADVANCED}, 
892         {"client plaintext auth", P_BOOL, P_GLOBAL, &Globals.bClientPlaintextAuth, NULL, NULL, FLAG_ADVANCED}, 
893
894         {"username", P_STRING, P_LOCAL, &sDefault.szUsername, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_SHARE}, 
895         {"user", P_STRING, P_LOCAL, &sDefault.szUsername, NULL, NULL, FLAG_HIDE}, 
896         {"users", P_STRING, P_LOCAL, &sDefault.szUsername, NULL, NULL, FLAG_HIDE}, 
897
898         {"invalid users", P_LIST, P_LOCAL, &sDefault.szInvalidUsers, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_SHARE}, 
899         {"valid users", P_LIST, P_LOCAL, &sDefault.szValidUsers, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_SHARE}, 
900         {"admin users", P_LIST, P_LOCAL, &sDefault.szAdminUsers, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_SHARE}, 
901         {"read list", P_LIST, P_LOCAL, &sDefault.readlist, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_SHARE}, 
902         {"write list", P_LIST, P_LOCAL, &sDefault.writelist, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_SHARE}, 
903         {"printer admin", P_LIST, P_LOCAL, &sDefault.printer_admin, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_PRINT | FLAG_DEPRECATED }, 
904         {"force user", P_STRING, P_LOCAL, &sDefault.force_user, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
905         {"force group", P_STRING, P_LOCAL, &sDefault.force_group, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
906         {"group", P_STRING, P_LOCAL, &sDefault.force_group, NULL, NULL, FLAG_ADVANCED}, 
907
908         {"read only", P_BOOL, P_LOCAL, &sDefault.bRead_only, NULL, NULL, FLAG_BASIC | FLAG_ADVANCED | FLAG_SHARE}, 
909         {"write ok", P_BOOLREV, P_LOCAL, &sDefault.bRead_only, NULL, NULL, FLAG_HIDE}, 
910         {"writeable", P_BOOLREV, P_LOCAL, &sDefault.bRead_only, NULL, NULL, FLAG_HIDE}, 
911         {"writable", P_BOOLREV, P_LOCAL, &sDefault.bRead_only, NULL, NULL, FLAG_HIDE}, 
912
913         {"acl check permissions", P_BOOL, P_LOCAL, &sDefault.bAclCheckPermissions, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_SHARE},
914         {"acl group control", P_BOOL, P_LOCAL, &sDefault.bAclGroupControl, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_SHARE | FLAG_DEPRECATED },
915         {"acl map full control", P_BOOL, P_LOCAL, &sDefault.bAclMapFullControl, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_SHARE},
916         {"create mask", P_OCTAL, P_LOCAL, &sDefault.iCreate_mask, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_SHARE}, 
917         {"create mode", P_OCTAL, P_LOCAL, &sDefault.iCreate_mask, NULL, NULL, FLAG_HIDE}, 
918         {"force create mode", P_OCTAL, P_LOCAL, &sDefault.iCreate_force_mode, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_SHARE}, 
919         {"security mask", P_OCTAL, P_LOCAL, &sDefault.iSecurity_mask, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_SHARE}, 
920         {"force security mode", P_OCTAL, P_LOCAL, &sDefault.iSecurity_force_mode, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_SHARE}, 
921         {"directory mask", P_OCTAL, P_LOCAL, &sDefault.iDir_mask, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_SHARE}, 
922         {"directory mode", P_OCTAL, P_LOCAL, &sDefault.iDir_mask, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL}, 
923         {"force directory mode", P_OCTAL, P_LOCAL, &sDefault.iDir_force_mode, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_SHARE}, 
924         {"directory security mask", P_OCTAL, P_LOCAL, &sDefault.iDir_Security_mask, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_SHARE}, 
925         {"force directory security mode", P_OCTAL, P_LOCAL, &sDefault.iDir_Security_force_mode, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_SHARE}, 
926         {"force unknown acl user", P_BOOL, P_LOCAL, &sDefault.bForceUnknownAclUser, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_SHARE},
927         {"inherit permissions", P_BOOL, P_LOCAL, &sDefault.bInheritPerms, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
928         {"inherit acls", P_BOOL, P_LOCAL, &sDefault.bInheritACLS, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
929         {"inherit owner", P_BOOL, P_LOCAL, &sDefault.bInheritOwner, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
930         {"guest only", P_BOOL, P_LOCAL, &sDefault.bGuest_only, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
931         {"only guest", P_BOOL, P_LOCAL, &sDefault.bGuest_only, NULL, NULL, FLAG_HIDE}, 
932
933         {"guest ok", P_BOOL, P_LOCAL, &sDefault.bGuest_ok, NULL, NULL, FLAG_BASIC | FLAG_ADVANCED | FLAG_SHARE | FLAG_PRINT}, 
934         {"public", P_BOOL, P_LOCAL, &sDefault.bGuest_ok, NULL, NULL, FLAG_HIDE}, 
935
936         {"only user", P_BOOL, P_LOCAL, &sDefault.bOnlyUser, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_DEPRECATED}, 
937         {"hosts allow", P_LIST, P_LOCAL, &sDefault.szHostsallow, NULL, NULL, FLAG_GLOBAL | FLAG_BASIC | FLAG_ADVANCED | FLAG_SHARE | FLAG_PRINT}, 
938         {"allow hosts", P_LIST, P_LOCAL, &sDefault.szHostsallow, NULL, NULL, FLAG_HIDE}, 
939         {"hosts deny", P_LIST, P_LOCAL, &sDefault.szHostsdeny, NULL, NULL, FLAG_GLOBAL | FLAG_BASIC | FLAG_ADVANCED | FLAG_SHARE | FLAG_PRINT}, 
940         {"deny hosts", P_LIST, P_LOCAL, &sDefault.szHostsdeny, NULL, NULL, FLAG_HIDE}, 
941         {"preload modules", P_LIST, P_GLOBAL, &Globals.szPreloadModules, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL}, 
942         {"use kerberos keytab", P_BOOL, P_GLOBAL, &Globals.bUseKerberosKeytab, NULL, NULL, FLAG_ADVANCED}, 
943
944         {N_("Logging Options"), P_SEP, P_SEPARATOR}, 
945
946         {"log level", P_STRING, P_GLOBAL, &Globals.szLogLevel, handle_debug_list, NULL, FLAG_ADVANCED}, 
947         {"debuglevel", P_STRING, P_GLOBAL, &Globals.szLogLevel, handle_debug_list, NULL, FLAG_HIDE}, 
948         {"syslog", P_INTEGER, P_GLOBAL, &Globals.syslog, NULL, NULL, FLAG_ADVANCED}, 
949         {"syslog only", P_BOOL, P_GLOBAL, &Globals.bSyslogOnly, NULL, NULL, FLAG_ADVANCED}, 
950         {"log file", P_STRING, P_GLOBAL, &Globals.szLogFile, NULL, NULL, FLAG_ADVANCED}, 
951
952         {"max log size", P_INTEGER, P_GLOBAL, &Globals.max_log_size, NULL, NULL, FLAG_ADVANCED}, 
953         {"debug timestamp", P_BOOL, P_GLOBAL, &Globals.bTimestampLogs, NULL, NULL, FLAG_ADVANCED}, 
954         {"timestamp logs", P_BOOL, P_GLOBAL, &Globals.bTimestampLogs, NULL, NULL, FLAG_ADVANCED}, 
955         {"debug prefix timestamp", P_BOOL, P_GLOBAL, &Globals.bDebugPrefixTimestamp, NULL, NULL, FLAG_ADVANCED}, 
956         {"debug hires timestamp", P_BOOL, P_GLOBAL, &Globals.bDebugHiresTimestamp, NULL, NULL, FLAG_ADVANCED}, 
957         {"debug pid", P_BOOL, P_GLOBAL, &Globals.bDebugPid, NULL, NULL, FLAG_ADVANCED}, 
958         {"debug uid", P_BOOL, P_GLOBAL, &Globals.bDebugUid, NULL, NULL, FLAG_ADVANCED}, 
959         {"enable core files", P_BOOL, P_GLOBAL, &Globals.bEnableCoreFiles, NULL, NULL, FLAG_ADVANCED},
960
961         {N_("Protocol Options"), P_SEP, P_SEPARATOR}, 
962
963         {"allocation roundup size", P_INTEGER, P_LOCAL, &sDefault.iallocation_roundup_size, NULL, NULL, FLAG_ADVANCED}, 
964         {"aio read size", P_INTEGER, P_LOCAL, &sDefault.iAioReadSize, NULL, NULL, FLAG_ADVANCED}, 
965         {"aio write size", P_INTEGER, P_LOCAL, &sDefault.iAioWriteSize, NULL, NULL, FLAG_ADVANCED}, 
966         {"smb ports", P_STRING, P_GLOBAL, &Globals.smb_ports, NULL, NULL, FLAG_ADVANCED}, 
967         {"large readwrite", P_BOOL, P_GLOBAL, &Globals.bLargeReadwrite, NULL, NULL, FLAG_ADVANCED}, 
968         {"max protocol", P_ENUM, P_GLOBAL, &Globals.maxprotocol, NULL, enum_protocol, FLAG_ADVANCED}, 
969         {"protocol", P_ENUM, P_GLOBAL, &Globals.maxprotocol, NULL, enum_protocol, FLAG_ADVANCED}, 
970         {"min protocol", P_ENUM, P_GLOBAL, &Globals.minprotocol, NULL, enum_protocol, FLAG_ADVANCED}, 
971         {"read bmpx", P_BOOL, P_GLOBAL, &Globals.bReadbmpx, NULL, NULL, FLAG_ADVANCED}, 
972         {"read raw", P_BOOL, P_GLOBAL, &Globals.bReadRaw, NULL, NULL, FLAG_ADVANCED}, 
973         {"write raw", P_BOOL, P_GLOBAL, &Globals.bWriteRaw, NULL, NULL, FLAG_ADVANCED}, 
974         {"disable netbios", P_BOOL, P_GLOBAL, &Globals.bDisableNetbios, NULL, NULL, FLAG_ADVANCED}, 
975         {"reset on zero vc", P_BOOL, P_GLOBAL, &Globals.bResetOnZeroVC, NULL, NULL, FLAG_ADVANCED}, 
976
977         {"acl compatibility", P_ENUM, P_GLOBAL, &Globals.iAclCompat, NULL,  enum_acl_compat_vals, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
978         {"defer sharing violations", P_BOOL, P_GLOBAL, &Globals.bDeferSharingViolations, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL},
979         {"ea support", P_BOOL, P_LOCAL, &sDefault.bEASupport, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
980         {"nt acl support", P_BOOL, P_LOCAL, &sDefault.bNTAclSupport, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
981         {"nt pipe support", P_BOOL, P_GLOBAL, &Globals.bNTPipeSupport, NULL, NULL, FLAG_ADVANCED}, 
982         {"nt status support", P_BOOL, P_GLOBAL, &Globals.bNTStatusSupport, NULL, NULL, FLAG_ADVANCED}, 
983         {"profile acls", P_BOOL, P_LOCAL, &sDefault.bProfileAcls, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_SHARE}, 
984
985         {"announce version", P_STRING, P_GLOBAL, &Globals.szAnnounceVersion, NULL, NULL, FLAG_ADVANCED}, 
986         {"announce as", P_ENUM, P_GLOBAL, &Globals.announce_as, NULL, enum_announce_as,  FLAG_ADVANCED}, 
987         {"map acl inherit", P_BOOL, P_LOCAL, &sDefault.bMap_acl_inherit, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
988         {"afs share", P_BOOL, P_LOCAL, &sDefault.bAfs_Share, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL},
989         {"max mux", P_INTEGER, P_GLOBAL, &Globals.max_mux, NULL, NULL, FLAG_ADVANCED}, 
990         {"max xmit", P_INTEGER, P_GLOBAL, &Globals.max_xmit, NULL, NULL, FLAG_ADVANCED}, 
991
992         {"name resolve order", P_STRING, P_GLOBAL, &Globals.szNameResolveOrder, NULL, NULL, FLAG_ADVANCED | FLAG_WIZARD}, 
993         {"max ttl", P_INTEGER, P_GLOBAL, &Globals.max_ttl, NULL, NULL, FLAG_ADVANCED}, 
994         {"max wins ttl", P_INTEGER, P_GLOBAL, &Globals.max_wins_ttl, NULL, NULL, FLAG_ADVANCED}, 
995         {"min wins ttl", P_INTEGER, P_GLOBAL, &Globals.min_wins_ttl, NULL, NULL, FLAG_ADVANCED}, 
996         {"time server", P_BOOL, P_GLOBAL, &Globals.bTimeServer, NULL, NULL, FLAG_ADVANCED}, 
997         {"unix extensions", P_BOOL, P_GLOBAL, &Globals.bUnixExtensions, NULL, NULL, FLAG_ADVANCED}, 
998         {"use spnego", P_BOOL, P_GLOBAL, &Globals.bUseSpnego, NULL, NULL, FLAG_ADVANCED}, 
999         {"client signing", P_ENUM, P_GLOBAL, &Globals.client_signing, NULL, enum_smb_signing_vals, FLAG_ADVANCED}, 
1000         {"server signing", P_ENUM, P_GLOBAL, &Globals.server_signing, NULL, enum_smb_signing_vals, FLAG_ADVANCED}, 
1001         {"client use spnego", P_BOOL, P_GLOBAL, &Globals.bClientUseSpnego, NULL, NULL, FLAG_ADVANCED}, 
1002
1003         {"enable asu support", P_BOOL, P_GLOBAL, &Globals.bASUSupport, NULL, NULL, FLAG_ADVANCED}, 
1004         {"svcctl list", P_LIST, P_GLOBAL, &Globals.szServicesList, NULL, NULL, FLAG_ADVANCED},
1005
1006         {N_("Tuning Options"), P_SEP, P_SEPARATOR}, 
1007
1008         {"block size", P_INTEGER, P_LOCAL, &sDefault.iBlock_size, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1009         {"deadtime", P_INTEGER, P_GLOBAL, &Globals.deadtime, NULL, NULL, FLAG_ADVANCED}, 
1010         {"getwd cache", P_BOOL, P_GLOBAL, &use_getwd_cache, NULL, NULL, FLAG_ADVANCED}, 
1011         {"keepalive", P_INTEGER, P_GLOBAL, &Globals.iKeepalive, NULL, NULL, FLAG_ADVANCED}, 
1012         {"change notify", P_BOOL, P_LOCAL, &sDefault.bChangeNotify, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE },
1013         {"kernel change notify", P_BOOL, P_LOCAL, &sDefault.bKernelChangeNotify, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE },
1014
1015         {"lpq cache time", P_INTEGER, P_GLOBAL, &Globals.lpqcachetime, NULL, NULL, FLAG_ADVANCED}, 
1016         {"max smbd processes", P_INTEGER, P_GLOBAL, &Globals.iMaxSmbdProcesses, NULL, NULL, FLAG_ADVANCED}, 
1017         {"max connections", P_INTEGER, P_LOCAL, &sDefault.iMaxConnections, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
1018         {"paranoid server security", P_BOOL, P_GLOBAL, &Globals.paranoid_server_security, NULL, NULL, FLAG_ADVANCED}, 
1019         {"max disk size", P_INTEGER, P_GLOBAL, &Globals.maxdisksize, NULL, NULL, FLAG_ADVANCED}, 
1020         {"max open files", P_INTEGER, P_GLOBAL, &Globals.max_open_files, NULL, NULL, FLAG_ADVANCED}, 
1021         {"min print space", P_INTEGER, P_LOCAL, &sDefault.iMinPrintSpace, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT}, 
1022         {"open files database hash size", P_INTEGER, P_GLOBAL, &Globals.open_files_db_hash_size, NULL, NULL, FLAG_ADVANCED}, 
1023
1024         {"socket options", P_GSTRING, P_GLOBAL, user_socket_options, NULL, NULL, FLAG_ADVANCED}, 
1025         {"strict allocate", P_BOOL, P_LOCAL, &sDefault.bStrictAllocate, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
1026         {"strict sync", P_BOOL, P_LOCAL, &sDefault.bStrictSync, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
1027         {"sync always", P_BOOL, P_LOCAL, &sDefault.bSyncAlways, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
1028         {"use mmap", P_BOOL, P_GLOBAL, &Globals.bUseMmap, NULL, NULL, FLAG_ADVANCED}, 
1029         {"use sendfile", P_BOOL, P_LOCAL, &sDefault.bUseSendfile, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
1030         {"hostname lookups", P_BOOL, P_GLOBAL, &Globals.bHostnameLookups, NULL, NULL, FLAG_ADVANCED}, 
1031         {"write cache size", P_INTEGER, P_LOCAL, &sDefault.iWriteCacheSize, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_DEPRECATED}, 
1032
1033         {"name cache timeout", P_INTEGER, P_GLOBAL, &Globals.name_cache_timeout, NULL, NULL, FLAG_ADVANCED}, 
1034
1035         {N_("Printing Options"), P_SEP, P_SEPARATOR}, 
1036
1037         {"max reported print jobs", P_INTEGER, P_LOCAL, &sDefault.iMaxReportedPrintJobs, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT}, 
1038         {"max print jobs", P_INTEGER, P_LOCAL, &sDefault.iMaxPrintJobs, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT}, 
1039         {"load printers", P_BOOL, P_GLOBAL, &Globals.bLoadPrinters, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT}, 
1040         {"printcap cache time", P_INTEGER, P_GLOBAL, &Globals.PrintcapCacheTime, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT}, 
1041         {"printcap name", P_STRING, P_GLOBAL, &Globals.szPrintcapname, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT}, 
1042         {"printcap", P_STRING, P_GLOBAL, &Globals.szPrintcapname, NULL, NULL, FLAG_HIDE}, 
1043         {"printable", P_BOOL, P_LOCAL, &sDefault.bPrint_ok, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT}, 
1044         {"print ok", P_BOOL, P_LOCAL, &sDefault.bPrint_ok, NULL, NULL, FLAG_HIDE}, 
1045         {"printing", P_ENUM, P_LOCAL, &sDefault.iPrinting, handle_printing, enum_printing, FLAG_ADVANCED | FLAG_PRINT | FLAG_GLOBAL}, 
1046         {"cups options", P_STRING, P_LOCAL, &sDefault.szCupsOptions, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT | FLAG_GLOBAL}, 
1047         {"cups server", P_STRING, P_GLOBAL, &Globals.szCupsServer, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT | FLAG_GLOBAL}, 
1048         {"iprint server", P_STRING, P_GLOBAL, &Globals.szIPrintServer, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT | FLAG_GLOBAL}, 
1049         {"print command", P_STRING, P_LOCAL, &sDefault.szPrintcommand, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT | FLAG_GLOBAL}, 
1050         {"disable spoolss", P_BOOL, P_GLOBAL, &Globals.bDisableSpoolss, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT | FLAG_GLOBAL}, 
1051         {"enable spoolss", P_BOOLREV, P_GLOBAL, &Globals.bDisableSpoolss, NULL, NULL, FLAG_HIDE}, 
1052         {"lpq command", P_STRING, P_LOCAL, &sDefault.szLpqcommand, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT | FLAG_GLOBAL}, 
1053         {"lprm command", P_STRING, P_LOCAL, &sDefault.szLprmcommand, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT | FLAG_GLOBAL}, 
1054         {"lppause command", P_STRING, P_LOCAL, &sDefault.szLppausecommand, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT | FLAG_GLOBAL}, 
1055         {"lpresume command", P_STRING, P_LOCAL, &sDefault.szLpresumecommand, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT | FLAG_GLOBAL}, 
1056         {"queuepause command", P_STRING, P_LOCAL, &sDefault.szQueuepausecommand, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT | FLAG_GLOBAL}, 
1057         {"queueresume command", P_STRING, P_LOCAL, &sDefault.szQueueresumecommand, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT | FLAG_GLOBAL}, 
1058
1059         {"addport command", P_STRING, P_GLOBAL, &Globals.szAddPortCommand, NULL, NULL, FLAG_ADVANCED}, 
1060         {"enumports command", P_STRING, P_GLOBAL, &Globals.szEnumPortsCommand, NULL, NULL, FLAG_ADVANCED}, 
1061         {"addprinter command", P_STRING, P_GLOBAL, &Globals.szAddPrinterCommand, NULL, NULL, FLAG_ADVANCED}, 
1062         {"deleteprinter command", P_STRING, P_GLOBAL, &Globals.szDeletePrinterCommand, NULL, NULL, FLAG_ADVANCED}, 
1063         {"show add printer wizard", P_BOOL, P_GLOBAL, &Globals.bMsAddPrinterWizard, NULL, NULL, FLAG_ADVANCED}, 
1064         {"os2 driver map", P_STRING, P_GLOBAL, &Globals.szOs2DriverMap, NULL, NULL, FLAG_ADVANCED}, 
1065
1066         {"printer name", P_STRING, P_LOCAL, &sDefault.szPrintername, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT}, 
1067         {"printer", P_STRING, P_LOCAL, &sDefault.szPrintername, NULL, NULL, FLAG_HIDE}, 
1068         {"use client driver", P_BOOL, P_LOCAL, &sDefault.bUseClientDriver, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT}, 
1069         {"default devmode", P_BOOL, P_LOCAL, &sDefault.bDefaultDevmode, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT}, 
1070         {"force printername", P_BOOL, P_LOCAL, &sDefault.bForcePrintername, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT}, 
1071         {"printjob username", P_STRING, P_LOCAL, &sDefault.szPrintjobUsername, NULL, NULL, FLAG_ADVANCED | FLAG_PRINT},
1072
1073         {N_("Filename Handling"), P_SEP, P_SEPARATOR}, 
1074         {"mangling method", P_STRING, P_GLOBAL, &Globals.szManglingMethod, NULL, NULL, FLAG_ADVANCED}, 
1075         {"mangle prefix", P_INTEGER, P_GLOBAL, &Globals.mangle_prefix, NULL, NULL, FLAG_ADVANCED}, 
1076
1077         {"default case", P_ENUM, P_LOCAL, &sDefault.iDefaultCase, NULL, enum_case, FLAG_ADVANCED | FLAG_SHARE}, 
1078         {"case sensitive", P_ENUM, P_LOCAL, &sDefault.iCaseSensitive, NULL, enum_bool_auto, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1079         {"casesignames", P_ENUM, P_LOCAL, &sDefault.iCaseSensitive, NULL, enum_bool_auto, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL | FLAG_HIDE}, 
1080         {"preserve case", P_BOOL, P_LOCAL, &sDefault.bCasePreserve, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1081         {"short preserve case", P_BOOL, P_LOCAL, &sDefault.bShortCasePreserve, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1082         {"mangling char", P_CHAR, P_LOCAL, &sDefault.magic_char, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1083         {"hide dot files", P_BOOL, P_LOCAL, &sDefault.bHideDotFiles, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1084         {"hide special files", P_BOOL, P_LOCAL, &sDefault.bHideSpecialFiles, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1085         {"hide unreadable", P_BOOL, P_LOCAL, &sDefault.bHideUnReadable, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1086         {"hide unwriteable files", P_BOOL, P_LOCAL, &sDefault.bHideUnWriteableFiles, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1087         {"delete veto files", P_BOOL, P_LOCAL, &sDefault.bDeleteVetoFiles, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1088         {"veto files", P_STRING, P_LOCAL, &sDefault.szVetoFiles, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL }, 
1089         {"hide files", P_STRING, P_LOCAL, &sDefault.szHideFiles, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL }, 
1090         {"veto oplock files", P_STRING, P_LOCAL, &sDefault.szVetoOplockFiles, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL }, 
1091         {"map archive", P_BOOL, P_LOCAL, &sDefault.bMap_archive, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1092         {"map hidden", P_BOOL, P_LOCAL, &sDefault.bMap_hidden, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1093         {"map system", P_BOOL, P_LOCAL, &sDefault.bMap_system, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1094         {"map readonly", P_ENUM, P_LOCAL, &sDefault.iMap_readonly, NULL, enum_map_readonly, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1095         {"mangled names", P_BOOL, P_LOCAL, &sDefault.bMangledNames, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1096         {"mangled map", P_STRING, P_LOCAL, &sDefault.szMangledMap, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL | FLAG_DEPRECATED }, 
1097         {"max stat cache size", P_INTEGER, P_GLOBAL, &Globals.iMaxStatCacheSize, NULL, NULL, FLAG_ADVANCED}, 
1098         {"stat cache", P_BOOL, P_GLOBAL, &Globals.bStatCache, NULL, NULL, FLAG_ADVANCED}, 
1099         {"store dos attributes", P_BOOL, P_LOCAL, &sDefault.bStoreDosAttributes, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1100         {"dmapi support", P_BOOL, P_LOCAL, &sDefault.bDmapiSupport, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL},
1101
1102
1103         {N_("Domain Options"), P_SEP, P_SEPARATOR}, 
1104
1105         {"machine password timeout", P_INTEGER, P_GLOBAL, &Globals.machine_password_timeout, NULL, NULL, FLAG_ADVANCED | FLAG_WIZARD}, 
1106
1107         {N_("Logon Options"), P_SEP, P_SEPARATOR}, 
1108
1109         {"add user script", P_STRING, P_GLOBAL, &Globals.szAddUserScript, NULL, NULL, FLAG_ADVANCED}, 
1110         {"rename user script", P_STRING, P_GLOBAL, &Globals.szRenameUserScript, NULL, NULL, FLAG_ADVANCED},
1111         {"delete user script", P_STRING, P_GLOBAL, &Globals.szDelUserScript, NULL, NULL, FLAG_ADVANCED}, 
1112         {"add group script", P_STRING, P_GLOBAL, &Globals.szAddGroupScript, NULL, NULL, FLAG_ADVANCED}, 
1113         {"delete group script", P_STRING, P_GLOBAL, &Globals.szDelGroupScript, NULL, NULL, FLAG_ADVANCED}, 
1114         {"add user to group script", P_STRING, P_GLOBAL, &Globals.szAddUserToGroupScript, NULL, NULL, FLAG_ADVANCED}, 
1115         {"delete user from group script", P_STRING, P_GLOBAL, &Globals.szDelUserFromGroupScript, NULL, NULL, FLAG_ADVANCED}, 
1116         {"set primary group script", P_STRING, P_GLOBAL, &Globals.szSetPrimaryGroupScript, NULL, NULL, FLAG_ADVANCED}, 
1117         {"add machine script", P_STRING, P_GLOBAL, &Globals.szAddMachineScript, NULL, NULL, FLAG_ADVANCED}, 
1118         {"shutdown script", P_STRING, P_GLOBAL, &Globals.szShutdownScript, NULL, NULL, FLAG_ADVANCED}, 
1119         {"abort shutdown script", P_STRING, P_GLOBAL, &Globals.szAbortShutdownScript, NULL, NULL, FLAG_ADVANCED}, 
1120         {"username map script", P_STRING, P_GLOBAL, &Globals.szUsernameMapScript, NULL, NULL, FLAG_ADVANCED}, 
1121
1122         {"logon script", P_STRING, P_GLOBAL, &Globals.szLogonScript, NULL, NULL, FLAG_ADVANCED}, 
1123         {"logon path", P_STRING, P_GLOBAL, &Globals.szLogonPath, NULL, NULL, FLAG_ADVANCED}, 
1124         {"logon drive", P_STRING, P_GLOBAL, &Globals.szLogonDrive, NULL, NULL, FLAG_ADVANCED}, 
1125         {"logon home", P_STRING, P_GLOBAL, &Globals.szLogonHome, NULL, NULL, FLAG_ADVANCED}, 
1126         {"domain logons", P_BOOL, P_GLOBAL, &Globals.bDomainLogons, NULL, NULL, FLAG_ADVANCED}, 
1127
1128         {N_("Browse Options"), P_SEP, P_SEPARATOR}, 
1129
1130         {"os level", P_INTEGER, P_GLOBAL, &Globals.os_level, NULL, NULL, FLAG_BASIC | FLAG_ADVANCED}, 
1131         {"lm announce", P_ENUM, P_GLOBAL, &Globals.lm_announce, NULL, enum_bool_auto, FLAG_ADVANCED}, 
1132         {"lm interval", P_INTEGER, P_GLOBAL, &Globals.lm_interval, NULL, NULL, FLAG_ADVANCED}, 
1133         {"preferred master", P_ENUM, P_GLOBAL, &Globals.bPreferredMaster, NULL, enum_bool_auto, FLAG_BASIC | FLAG_ADVANCED}, 
1134         {"prefered master", P_ENUM, P_GLOBAL, &Globals.bPreferredMaster, NULL, enum_bool_auto, FLAG_HIDE}, 
1135         {"local master", P_BOOL, P_GLOBAL, &Globals.bLocalMaster, NULL, NULL, FLAG_BASIC | FLAG_ADVANCED}, 
1136         {"domain master", P_ENUM, P_GLOBAL, &Globals.bDomainMaster, NULL, enum_bool_auto, FLAG_BASIC | FLAG_ADVANCED}, 
1137         {"browse list", P_BOOL, P_GLOBAL, &Globals.bBrowseList, NULL, NULL, FLAG_ADVANCED}, 
1138         {"browseable", P_BOOL, P_LOCAL, &sDefault.bBrowseable, NULL, NULL, FLAG_BASIC | FLAG_ADVANCED | FLAG_SHARE | FLAG_PRINT}, 
1139         {"browsable", P_BOOL, P_LOCAL, &sDefault.bBrowseable, NULL, NULL, FLAG_HIDE}, 
1140         {"enhanced browsing", P_BOOL, P_GLOBAL, &Globals.enhanced_browsing, NULL, NULL, FLAG_ADVANCED}, 
1141
1142         {N_("WINS Options"), P_SEP, P_SEPARATOR}, 
1143
1144         {"dns proxy", P_BOOL, P_GLOBAL, &Globals.bDNSproxy, NULL, NULL, FLAG_ADVANCED}, 
1145         {"wins proxy", P_BOOL, P_GLOBAL, &Globals.bWINSproxy, NULL, NULL, FLAG_ADVANCED}, 
1146
1147         {"wins server", P_LIST, P_GLOBAL, &Globals.szWINSservers, NULL, NULL, FLAG_BASIC | FLAG_ADVANCED | FLAG_WIZARD}, 
1148         {"wins support", P_BOOL, P_GLOBAL, &Globals.bWINSsupport, NULL, NULL, FLAG_BASIC | FLAG_ADVANCED | FLAG_WIZARD}, 
1149         {"wins hook", P_STRING, P_GLOBAL, &Globals.szWINSHook, NULL, NULL, FLAG_ADVANCED}, 
1150
1151         {N_("Locking Options"), P_SEP, P_SEPARATOR}, 
1152
1153         {"blocking locks", P_BOOL, P_LOCAL, &sDefault.bBlockingLocks, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1154         {"csc policy", P_ENUM, P_LOCAL, &sDefault.iCSCPolicy, NULL, enum_csc_policy, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1155         {"fake oplocks", P_BOOL, P_LOCAL, &sDefault.bFakeOplocks, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
1156         {"kernel oplocks", P_BOOL, P_GLOBAL, &Globals.bKernelOplocks, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL}, 
1157         {"locking", P_BOOL, P_LOCAL, &sDefault.bLocking, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1158         {"lock spin time", P_INTEGER, P_GLOBAL, &Globals.iLockSpinTime, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL}, 
1159
1160         {"oplocks", P_BOOL, P_LOCAL, &sDefault.bOpLocks, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1161         {"level2 oplocks", P_BOOL, P_LOCAL, &sDefault.bLevel2OpLocks, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1162         {"oplock break wait time", P_INTEGER, P_GLOBAL, &Globals.oplock_break_wait_time, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL}, 
1163         {"oplock contention limit", P_INTEGER, P_LOCAL, &sDefault.iOplockContentionLimit, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1164         {"posix locking", P_BOOL, P_LOCAL, &sDefault.bPosixLocking, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1165         {"strict locking", P_ENUM, P_LOCAL, &sDefault.iStrictLocking, NULL, enum_bool_auto, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1166         {"share modes", P_BOOL, P_LOCAL,  &sDefault.bShareModes, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1167
1168         {N_("Ldap Options"), P_SEP, P_SEPARATOR}, 
1169
1170         {"ldap admin dn", P_STRING, P_GLOBAL, &Globals.szLdapAdminDn, NULL, NULL, FLAG_ADVANCED}, 
1171         {"ldap delete dn", P_BOOL, P_GLOBAL, &Globals.ldap_delete_dn, NULL, NULL, FLAG_ADVANCED}, 
1172         {"ldap group suffix", P_STRING, P_GLOBAL, &Globals.szLdapGroupSuffix, NULL, NULL, FLAG_ADVANCED}, 
1173         {"ldap idmap suffix", P_STRING, P_GLOBAL, &Globals.szLdapIdmapSuffix, NULL, NULL, FLAG_ADVANCED}, 
1174         {"ldap machine suffix", P_STRING, P_GLOBAL, &Globals.szLdapMachineSuffix, NULL, NULL, FLAG_ADVANCED}, 
1175         {"ldap passwd sync", P_ENUM, P_GLOBAL, &Globals.ldap_passwd_sync, NULL, enum_ldap_passwd_sync, FLAG_ADVANCED}, 
1176         {"ldap password sync", P_ENUM, P_GLOBAL, &Globals.ldap_passwd_sync, NULL, enum_ldap_passwd_sync, FLAG_HIDE}, 
1177         {"ldap replication sleep", P_INTEGER, P_GLOBAL, &Globals.ldap_replication_sleep, NULL, NULL, FLAG_ADVANCED},
1178         {"ldap suffix", P_STRING, P_GLOBAL, &Globals.szLdapSuffix, NULL, NULL, FLAG_ADVANCED}, 
1179         {"ldap ssl", P_ENUM, P_GLOBAL, &Globals.ldap_ssl, NULL, enum_ldap_ssl, FLAG_ADVANCED}, 
1180         {"ldap timeout", P_INTEGER, P_GLOBAL, &Globals.ldap_timeout, NULL, NULL, FLAG_ADVANCED},
1181         {"ldap page size", P_INTEGER, P_GLOBAL, &Globals.ldap_page_size, NULL, NULL, FLAG_ADVANCED},
1182         {"ldap user suffix", P_STRING, P_GLOBAL, &Globals.szLdapUserSuffix, NULL, NULL, FLAG_ADVANCED}, 
1183
1184         {N_("Miscellaneous Options"), P_SEP, P_SEPARATOR}, 
1185         {"add share command", P_STRING, P_GLOBAL, &Globals.szAddShareCommand, NULL, NULL, FLAG_ADVANCED}, 
1186         {"change share command", P_STRING, P_GLOBAL, &Globals.szChangeShareCommand, NULL, NULL, FLAG_ADVANCED}, 
1187         {"delete share command", P_STRING, P_GLOBAL, &Globals.szDeleteShareCommand, NULL, NULL, FLAG_ADVANCED}, 
1188
1189         {N_("EventLog Options"), P_SEP, P_SEPARATOR}, 
1190         {"eventlog list",  P_LIST, P_GLOBAL, &Globals.szEventLogs, NULL, NULL, FLAG_ADVANCED | FLAG_GLOBAL | FLAG_SHARE}, 
1191         
1192         {"config file", P_STRING, P_GLOBAL, &Globals.szConfigFile, NULL, NULL, FLAG_HIDE}, 
1193         {"preload", P_STRING, P_GLOBAL, &Globals.szAutoServices, NULL, NULL, FLAG_ADVANCED}, 
1194         {"auto services", P_STRING, P_GLOBAL, &Globals.szAutoServices, NULL, NULL, FLAG_ADVANCED}, 
1195         {"lock directory", P_STRING, P_GLOBAL, &Globals.szLockDir, NULL, NULL, FLAG_ADVANCED}, 
1196         {"lock dir", P_STRING, P_GLOBAL, &Globals.szLockDir, NULL, NULL, FLAG_HIDE}, 
1197         {"pid directory", P_STRING, P_GLOBAL, &Globals.szPidDir, NULL, NULL, FLAG_ADVANCED}, 
1198 #ifdef WITH_UTMP
1199         {"utmp directory", P_STRING, P_GLOBAL, &Globals.szUtmpDir, NULL, NULL, FLAG_ADVANCED}, 
1200         {"wtmp directory", P_STRING, P_GLOBAL, &Globals.szWtmpDir, NULL, NULL, FLAG_ADVANCED}, 
1201         {"utmp", P_BOOL, P_GLOBAL, &Globals.bUtmp, NULL, NULL, FLAG_ADVANCED}, 
1202 #endif
1203
1204         {"default service", P_STRING, P_GLOBAL, &Globals.szDefaultService, NULL, NULL, FLAG_ADVANCED}, 
1205         {"default", P_STRING, P_GLOBAL, &Globals.szDefaultService, NULL, NULL, FLAG_ADVANCED}, 
1206         {"message command", P_STRING, P_GLOBAL, &Globals.szMsgCommand, NULL, NULL, FLAG_ADVANCED}, 
1207         {"dfree cache time", P_INTEGER, P_LOCAL, &sDefault.iDfreeCacheTime, NULL, NULL, FLAG_ADVANCED}, 
1208         {"dfree command", P_STRING, P_LOCAL, &sDefault.szDfree, NULL, NULL, FLAG_ADVANCED}, 
1209         {"get quota command", P_STRING, P_GLOBAL, &Globals.szGetQuota, NULL, NULL, FLAG_ADVANCED}, 
1210         {"set quota command", P_STRING, P_GLOBAL, &Globals.szSetQuota, NULL, NULL, FLAG_ADVANCED}, 
1211         {"remote announce", P_STRING, P_GLOBAL, &Globals.szRemoteAnnounce, NULL, NULL, FLAG_ADVANCED}, 
1212         {"remote browse sync", P_STRING, P_GLOBAL, &Globals.szRemoteBrowseSync, NULL, NULL, FLAG_ADVANCED}, 
1213         {"socket address", P_STRING, P_GLOBAL, &Globals.szSocketAddress, NULL, NULL, FLAG_ADVANCED}, 
1214         {"homedir map", P_STRING, P_GLOBAL, &Globals.szNISHomeMapName, NULL, NULL, FLAG_ADVANCED}, 
1215         {"afs username map", P_STRING, P_GLOBAL, &Globals.szAfsUsernameMap, NULL, NULL, FLAG_ADVANCED}, 
1216         {"afs token lifetime", P_INTEGER, P_GLOBAL, &Globals.iAfsTokenLifetime, NULL, NULL, FLAG_ADVANCED},
1217         {"log nt token command", P_STRING, P_GLOBAL, &Globals.szLogNtTokenCommand, NULL, NULL, FLAG_ADVANCED},
1218         {"time offset", P_INTEGER, P_GLOBAL, &extra_time_offset, NULL, NULL, FLAG_ADVANCED}, 
1219         {"NIS homedir", P_BOOL, P_GLOBAL, &Globals.bNISHomeMap, NULL, NULL, FLAG_ADVANCED}, 
1220         {"-valid", P_BOOL, P_LOCAL, &sDefault.valid, NULL, NULL, FLAG_HIDE}, 
1221
1222         {"copy", P_STRING, P_LOCAL, &sDefault.szCopy, handle_copy, NULL, FLAG_HIDE}, 
1223         {"include", P_STRING, P_LOCAL, &sDefault.szInclude, handle_include, NULL, FLAG_HIDE}, 
1224         {"preexec", P_STRING, P_LOCAL, &sDefault.szPreExec, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_PRINT}, 
1225         {"exec", P_STRING, P_LOCAL, &sDefault.szPreExec, NULL, NULL, FLAG_ADVANCED}, 
1226
1227         {"preexec close", P_BOOL, P_LOCAL, &sDefault.bPreexecClose, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
1228         {"postexec", P_STRING, P_LOCAL, &sDefault.szPostExec, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_PRINT}, 
1229         {"root preexec", P_STRING, P_LOCAL, &sDefault.szRootPreExec, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_PRINT}, 
1230         {"root preexec close", P_BOOL, P_LOCAL, &sDefault.bRootpreexecClose, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
1231         {"root postexec", P_STRING, P_LOCAL, &sDefault.szRootPostExec, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_PRINT}, 
1232         {"available", P_BOOL, P_LOCAL, &sDefault.bAvailable, NULL, NULL, FLAG_BASIC | FLAG_ADVANCED | FLAG_SHARE | FLAG_PRINT}, 
1233         {"registry shares", P_BOOL, P_GLOBAL, &Globals.bRegistryShares, NULL, NULL, FLAG_ADVANCED},
1234         {"usershare allow guests", P_BOOL, P_GLOBAL, &Globals.bUsershareAllowGuests, NULL, NULL, FLAG_ADVANCED},
1235         {"usershare max shares", P_INTEGER, P_GLOBAL, &Globals.iUsershareMaxShares, NULL, NULL, FLAG_ADVANCED},
1236         {"usershare owner only", P_BOOL, P_GLOBAL, &Globals.bUsershareOwnerOnly, NULL, NULL, FLAG_ADVANCED}, 
1237         {"usershare path", P_STRING, P_GLOBAL, &Globals.szUsersharePath, NULL, NULL, FLAG_ADVANCED},
1238         {"usershare prefix allow list", P_LIST, P_GLOBAL, &Globals.szUsersharePrefixAllowList, NULL, NULL, FLAG_ADVANCED}, 
1239         {"usershare prefix deny list", P_LIST, P_GLOBAL, &Globals.szUsersharePrefixDenyList, NULL, NULL, FLAG_ADVANCED}, 
1240         {"usershare template share", P_STRING, P_GLOBAL, &Globals.szUsershareTemplateShare, NULL, NULL, FLAG_ADVANCED},
1241         {"volume", P_STRING, P_LOCAL, &sDefault.volume, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE }, 
1242         {"fstype", P_STRING, P_LOCAL, &sDefault.fstype, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
1243         {"set directory", P_BOOLREV, P_LOCAL, &sDefault.bNo_set_dir, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
1244         {"wide links", P_BOOL, P_LOCAL, &sDefault.bWidelinks, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1245         {"follow symlinks", P_BOOL, P_LOCAL, &sDefault.bSymlinks, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1246         {"dont descend", P_STRING, P_LOCAL, &sDefault.szDontdescend, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
1247         {"magic script", P_STRING, P_LOCAL, &sDefault.szMagicScript, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
1248         {"magic output", P_STRING, P_LOCAL, &sDefault.szMagicOutput, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
1249         {"delete readonly", P_BOOL, P_LOCAL, &sDefault.bDeleteReadonly, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1250         {"dos filemode", P_BOOL, P_LOCAL, &sDefault.bDosFilemode, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1251         {"dos filetimes", P_BOOL, P_LOCAL, &sDefault.bDosFiletimes, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1252         {"dos filetime resolution", P_BOOL, P_LOCAL, &sDefault.bDosFiletimeResolution, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1253
1254         {"fake directory create times", P_BOOL, P_LOCAL, &sDefault.bFakeDirCreateTimes, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE | FLAG_GLOBAL}, 
1255         {"panic action", P_STRING, P_GLOBAL, &Globals.szPanicAction, NULL, NULL, FLAG_ADVANCED}, 
1256
1257         {N_("VFS module options"), P_SEP, P_SEPARATOR}, 
1258
1259         {"vfs objects", P_LIST, P_LOCAL, &sDefault.szVfsObjects, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
1260         {"vfs object", P_LIST, P_LOCAL, &sDefault.szVfsObjects, NULL, NULL, FLAG_HIDE}, 
1261
1262
1263         {"msdfs root", P_BOOL, P_LOCAL, &sDefault.bMSDfsRoot, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
1264         {"msdfs proxy", P_STRING, P_LOCAL, &sDefault.szMSDfsProxy, NULL, NULL, FLAG_ADVANCED | FLAG_SHARE}, 
1265         {"host msdfs", P_BOOL, P_GLOBAL, &Globals.bHostMSDfs, NULL, NULL, FLAG_ADVANCED}, 
1266
1267         {N_("Winbind options"), P_SEP, P_SEPARATOR}, 
1268
1269         {"passdb expand explicit", P_BOOL, P_GLOBAL, &Globals.bPassdbExpandExplicit, NULL, NULL, FLAG_ADVANCED},
1270         {"idmap domains", P_LIST, P_GLOBAL, &Globals.szIdmapDomains, NULL, NULL, FLAG_ADVANCED}, 
1271         {"idmap backend", P_LIST, P_GLOBAL, &Globals.szIdmapBackend, NULL, NULL, FLAG_ADVANCED }, 
1272         {"idmap alloc backend", P_STRING, P_GLOBAL, &Globals.szIdmapAllocBackend, NULL, NULL, FLAG_ADVANCED}, 
1273         {"idmap cache time", P_INTEGER, P_GLOBAL, &Globals.iIdmapCacheTime, NULL, NULL, FLAG_ADVANCED}, 
1274         {"idmap negative cache time", P_INTEGER, P_GLOBAL, &Globals.iIdmapNegativeCacheTime, NULL, NULL, FLAG_ADVANCED}, 
1275         {"idmap uid", P_STRING, P_GLOBAL, &Globals.szIdmapUID, handle_idmap_uid, NULL, FLAG_ADVANCED }, 
1276         {"winbind uid", P_STRING, P_GLOBAL, &Globals.szIdmapUID, handle_idmap_uid, NULL, FLAG_HIDE }, 
1277         {"idmap gid", P_STRING, P_GLOBAL, &Globals.szIdmapGID, handle_idmap_gid, NULL, FLAG_ADVANCED }, 
1278         {"winbind gid", P_STRING, P_GLOBAL, &Globals.szIdmapGID, handle_idmap_gid, NULL, FLAG_HIDE }, 
1279         {"template homedir", P_STRING, P_GLOBAL, &Globals.szTemplateHomedir, NULL, NULL, FLAG_ADVANCED}, 
1280         {"template shell", P_STRING, P_GLOBAL, &Globals.szTemplateShell, NULL, NULL, FLAG_ADVANCED}, 
1281         {"winbind separator", P_STRING, P_GLOBAL, &Globals.szWinbindSeparator, NULL, NULL, FLAG_ADVANCED}, 
1282         {"winbind cache time", P_INTEGER, P_GLOBAL, &Globals.winbind_cache_time, NULL, NULL, FLAG_ADVANCED}, 
1283         {"winbind enum users", P_BOOL, P_GLOBAL, &Globals.bWinbindEnumUsers, NULL, NULL, FLAG_ADVANCED}, 
1284         {"winbind enum groups", P_BOOL, P_GLOBAL, &Globals.bWinbindEnumGroups, NULL, NULL, FLAG_ADVANCED}, 
1285         {"winbind use default domain", P_BOOL, P_GLOBAL, &Globals.bWinbindUseDefaultDomain, NULL, NULL, FLAG_ADVANCED}, 
1286         {"winbind trusted domains only", P_BOOL, P_GLOBAL, &Globals.bWinbindTrustedDomainsOnly, NULL, NULL, FLAG_ADVANCED}, 
1287         {"winbind nested groups", P_BOOL, P_GLOBAL, &Globals.bWinbindNestedGroups, NULL, NULL, FLAG_ADVANCED}, 
1288         {"winbind nss info", P_LIST, P_GLOBAL, &Globals.szWinbindNssInfo, NULL, NULL, FLAG_ADVANCED}, 
1289         {"winbind refresh tickets", P_BOOL, P_GLOBAL, &Globals.bWinbindRefreshTickets, NULL, NULL, FLAG_ADVANCED}, 
1290         {"winbind offline logon", P_BOOL, P_GLOBAL, &Globals.bWinbindOfflineLogon, NULL, NULL, FLAG_ADVANCED},
1291         {"winbind normalize names", P_BOOL, P_GLOBAL, &Globals.bWinbindNormalizeNames, NULL, NULL, FLAG_ADVANCED},
1292
1293         {NULL,  P_BOOL,  P_NONE,  NULL,  NULL,  NULL,  0}
1294 };
1295
1296 /***************************************************************************
1297  Initialise the sDefault parameter structure for the printer values.
1298 ***************************************************************************/
1299
1300 static void init_printer_values(service *pService)
1301 {
1302         /* choose defaults depending on the type of printing */
1303         switch (pService->iPrinting) {
1304                 case PRINT_BSD:
1305                 case PRINT_AIX:
1306                 case PRINT_LPRNT:
1307                 case PRINT_LPROS2:
1308                         string_set(&pService->szLpqcommand, "lpq -P'%p'");
1309                         string_set(&pService->szLprmcommand, "lprm -P'%p' %j");
1310                         string_set(&pService->szPrintcommand, "lpr -r -P'%p' %s");
1311                         break;
1312
1313                 case PRINT_LPRNG:
1314                 case PRINT_PLP:
1315                         string_set(&pService->szLpqcommand, "lpq -P'%p'");
1316                         string_set(&pService->szLprmcommand, "lprm -P'%p' %j");
1317                         string_set(&pService->szPrintcommand, "lpr -r -P'%p' %s");
1318                         string_set(&pService->szQueuepausecommand, "lpc stop '%p'");
1319                         string_set(&pService->szQueueresumecommand, "lpc start '%p'");
1320                         string_set(&pService->szLppausecommand, "lpc hold '%p' %j");
1321                         string_set(&pService->szLpresumecommand, "lpc release '%p' %j");
1322                         break;
1323
1324                 case PRINT_CUPS:
1325                 case PRINT_IPRINT:
1326 #ifdef HAVE_CUPS
1327                         /* set the lpq command to contain the destination printer
1328                            name only.  This is used by cups_queue_get() */
1329                         string_set(&pService->szLpqcommand, "%p");
1330                         string_set(&pService->szLprmcommand, "");
1331                         string_set(&pService->szPrintcommand, "");
1332                         string_set(&pService->szLppausecommand, "");
1333                         string_set(&pService->szLpresumecommand, "");
1334                         string_set(&pService->szQueuepausecommand, "");
1335                         string_set(&pService->szQueueresumecommand, "");
1336 #else
1337                         string_set(&pService->szLpqcommand, "lpq -P'%p'");
1338                         string_set(&pService->szLprmcommand, "lprm -P'%p' %j");
1339                         string_set(&pService->szPrintcommand, "lpr -P'%p' %s; rm %s");
1340                         string_set(&pService->szLppausecommand, "lp -i '%p-%j' -H hold");
1341                         string_set(&pService->szLpresumecommand, "lp -i '%p-%j' -H resume");
1342                         string_set(&pService->szQueuepausecommand, "disable '%p'");
1343                         string_set(&pService->szQueueresumecommand, "enable '%p'");
1344 #endif /* HAVE_CUPS */
1345                         break;
1346
1347                 case PRINT_SYSV:
1348                 case PRINT_HPUX:
1349                         string_set(&pService->szLpqcommand, "lpstat -o%p");
1350                         string_set(&pService->szLprmcommand, "cancel %p-%j");
1351                         string_set(&pService->szPrintcommand, "lp -c -d%p %s; rm %s");
1352                         string_set(&pService->szQueuepausecommand, "disable %p");
1353                         string_set(&pService->szQueueresumecommand, "enable %p");
1354 #ifndef HPUX
1355                         string_set(&pService->szLppausecommand, "lp -i %p-%j -H hold");
1356                         string_set(&pService->szLpresumecommand, "lp -i %p-%j -H resume");
1357 #endif /* HPUX */
1358                         break;
1359
1360                 case PRINT_QNX:
1361                         string_set(&pService->szLpqcommand, "lpq -P%p");
1362                         string_set(&pService->szLprmcommand, "lprm -P%p %j");
1363                         string_set(&pService->szPrintcommand, "lp -r -P%p %s");
1364                         break;
1365
1366 #ifdef DEVELOPER
1367         case PRINT_TEST:
1368         case PRINT_VLP:
1369                 string_set(&pService->szPrintcommand, "vlp print %p %s");
1370                 string_set(&pService->szLpqcommand, "vlp lpq %p");
1371                 string_set(&pService->szLprmcommand, "vlp lprm %p %j");
1372                 string_set(&pService->szLppausecommand, "vlp lppause %p %j");
1373                 string_set(&pService->szLpresumecommand, "vlp lpresum %p %j");
1374                 string_set(&pService->szQueuepausecommand, "vlp queuepause %p");
1375                 string_set(&pService->szQueueresumecommand, "vlp queueresume %p");
1376                 break;
1377 #endif /* DEVELOPER */
1378
1379         }
1380 }
1381
1382 /***************************************************************************
1383  Initialise the global parameter structure.
1384 ***************************************************************************/
1385
1386 static void init_globals(BOOL first_time_only)
1387 {
1388         static BOOL done_init = False;
1389         pstring s;
1390
1391         /* If requested to initialize only once and we've already done it... */
1392         if (first_time_only && done_init) {
1393                 /* ... then we have nothing more to do */
1394                 return;
1395         }
1396
1397         if (!done_init) {
1398                 int i;
1399
1400                 /* The logfile can be set before this is invoked. Free it if so. */
1401                 if (Globals.szLogFile != NULL) {
1402                         string_free(&Globals.szLogFile);
1403                         Globals.szLogFile = NULL;
1404                 }
1405
1406                 memset((void *)&Globals, '\0', sizeof(Globals));
1407
1408                 for (i = 0; parm_table[i].label; i++)
1409                         if ((parm_table[i].type == P_STRING ||
1410                              parm_table[i].type == P_USTRING) &&
1411                             parm_table[i].ptr)
1412                                 string_set((char **)parm_table[i].ptr, "");
1413
1414                 string_set(&sDefault.fstype, FSTYPE_STRING);
1415                 string_set(&sDefault.szPrintjobUsername, "%U");
1416
1417                 init_printer_values(&sDefault);
1418
1419                 done_init = True;
1420         }
1421
1422
1423         DEBUG(3, ("Initialising global parameters\n"));
1424
1425         string_set(&Globals.szSMBPasswdFile, dyn_SMB_PASSWD_FILE);
1426         string_set(&Globals.szPrivateDir, dyn_PRIVATE_DIR);
1427
1428         /* use the new 'hash2' method by default, with a prefix of 1 */
1429         string_set(&Globals.szManglingMethod, "hash2");
1430         Globals.mangle_prefix = 1;
1431
1432         string_set(&Globals.szGuestaccount, GUEST_ACCOUNT);
1433
1434         /* using UTF8 by default allows us to support all chars */
1435         string_set(&Globals.unix_charset, DEFAULT_UNIX_CHARSET);
1436
1437 #if defined(HAVE_NL_LANGINFO) && defined(CODESET)
1438         /* If the system supports nl_langinfo(), try to grab the value
1439            from the user's locale */
1440         string_set(&Globals.display_charset, "LOCALE");
1441 #else
1442         string_set(&Globals.display_charset, DEFAULT_DISPLAY_CHARSET);
1443 #endif
1444
1445         /* Use codepage 850 as a default for the dos character set */
1446         string_set(&Globals.dos_charset, DEFAULT_DOS_CHARSET);
1447
1448         /*
1449          * Allow the default PASSWD_CHAT to be overridden in local.h.
1450          */
1451         string_set(&Globals.szPasswdChat, DEFAULT_PASSWD_CHAT);
1452         
1453         set_global_myname(myhostname());
1454         string_set(&Globals.szNetbiosName,global_myname());
1455
1456         set_global_myworkgroup(WORKGROUP);
1457         string_set(&Globals.szWorkgroup, lp_workgroup());
1458         
1459         string_set(&Globals.szPasswdProgram, "");
1460         string_set(&Globals.szPidDir, dyn_PIDDIR);
1461         string_set(&Globals.szLockDir, dyn_LOCKDIR);
1462         string_set(&Globals.szSocketAddress, "0.0.0.0");
1463         pstrcpy(s, "Samba ");
1464         pstrcat(s, SAMBA_VERSION_STRING);
1465         string_set(&Globals.szServerString, s);
1466         slprintf(s, sizeof(s) - 1, "%d.%d", DEFAULT_MAJOR_VERSION,
1467                  DEFAULT_MINOR_VERSION);
1468         string_set(&Globals.szAnnounceVersion, s);
1469 #ifdef DEVELOPER
1470         string_set(&Globals.szPanicAction, "/bin/sleep 999999999");
1471 #endif
1472
1473         pstrcpy(user_socket_options, DEFAULT_SOCKET_OPTIONS);
1474
1475         string_set(&Globals.szLogonDrive, "");
1476         /* %N is the NIS auto.home server if -DAUTOHOME is used, else same as %L */
1477         string_set(&Globals.szLogonHome, "\\\\%N\\%U");
1478         string_set(&Globals.szLogonPath, "\\\\%N\\%U\\profile");
1479
1480         string_set(&Globals.szNameResolveOrder, "lmhosts wins host bcast");
1481         string_set(&Globals.szPasswordServer, "*");
1482
1483         Globals.AlgorithmicRidBase = BASE_RID;
1484
1485         Globals.bLoadPrinters = True;
1486         Globals.PrintcapCacheTime = 750;        /* 12.5 minutes */
1487
1488         /* Was 65535 (0xFFFF). 0x4101 matches W2K and causes major speed improvements... */
1489         /* Discovered by 2 days of pain by Don McCall @ HP :-). */
1490         Globals.max_xmit = 0x4104;
1491         Globals.max_mux = 50;   /* This is *needed* for profile support. */
1492         Globals.lpqcachetime = 30;      /* changed to handle large print servers better -- jerry */
1493         Globals.bDisableSpoolss = False;
1494         Globals.iMaxSmbdProcesses = 0;/* no limit specified */
1495         Globals.pwordlevel = 0;
1496         Globals.unamelevel = 0;
1497         Globals.deadtime = 0;
1498         Globals.bLargeReadwrite = True;
1499         Globals.max_log_size = 5000;
1500         Globals.max_open_files = MAX_OPEN_FILES;
1501         Globals.open_files_db_hash_size = SMB_OPEN_DATABASE_TDB_HASH_SIZE;
1502         Globals.maxprotocol = PROTOCOL_NT1;
1503         Globals.minprotocol = PROTOCOL_CORE;
1504         Globals.security = SEC_USER;
1505         Globals.paranoid_server_security = True;
1506         Globals.bEncryptPasswords = True;
1507         Globals.bUpdateEncrypt = False;
1508         Globals.clientSchannel = Auto;
1509         Globals.serverSchannel = Auto;
1510         Globals.bReadRaw = True;
1511         Globals.bWriteRaw = True;
1512         Globals.bReadbmpx = False;
1513         Globals.bNullPasswords = False;
1514         Globals.bObeyPamRestrictions = False;
1515         Globals.syslog = 1;
1516         Globals.bSyslogOnly = False;
1517         Globals.bTimestampLogs = True;
1518         string_set(&Globals.szLogLevel, "0");
1519         Globals.bDebugPrefixTimestamp = False;
1520         Globals.bDebugHiresTimestamp = False;
1521         Globals.bDebugPid = False;
1522         Globals.bDebugUid = False;
1523         Globals.bEnableCoreFiles = True;
1524         Globals.max_ttl = 60 * 60 * 24 * 3;     /* 3 days default. */
1525         Globals.max_wins_ttl = 60 * 60 * 24 * 6;        /* 6 days default. */
1526         Globals.min_wins_ttl = 60 * 60 * 6;     /* 6 hours default. */
1527         Globals.machine_password_timeout = 60 * 60 * 24 * 7;    /* 7 days default. */
1528         Globals.lm_announce = 2;        /* = Auto: send only if LM clients found */
1529         Globals.lm_interval = 60;
1530         Globals.announce_as = ANNOUNCE_AS_NT_SERVER;
1531 #if (defined(HAVE_NETGROUP) && defined(WITH_AUTOMOUNT))
1532         Globals.bNISHomeMap = False;
1533 #ifdef WITH_NISPLUS_HOME
1534         string_set(&Globals.szNISHomeMapName, "auto_home.org_dir");
1535 #else
1536         string_set(&Globals.szNISHomeMapName, "auto.home");
1537 #endif
1538 #endif
1539         Globals.bTimeServer = False;
1540         Globals.bBindInterfacesOnly = False;
1541         Globals.bUnixPasswdSync = False;
1542         Globals.bPamPasswordChange = False;
1543         Globals.bPasswdChatDebug = False;
1544         Globals.iPasswdChatTimeout = 2; /* 2 second default. */
1545         Globals.bNTPipeSupport = True;  /* Do NT pipes by default. */
1546         Globals.bNTStatusSupport = True; /* Use NT status by default. */
1547         Globals.bStatCache = True;      /* use stat cache by default */
1548         Globals.iMaxStatCacheSize = 1024; /* one Meg by default. */
1549         Globals.restrict_anonymous = 0;
1550         Globals.bClientLanManAuth = True;       /* Do use the LanMan hash if it is available */
1551         Globals.bClientPlaintextAuth = True;    /* Do use a plaintext password if is requested by the server */
1552         Globals.bLanmanAuth = True;     /* Do use the LanMan hash if it is available */
1553         Globals.bNTLMAuth = True;       /* Do use NTLMv1 if it is available (otherwise NTLMv2) */
1554         Globals.bClientNTLMv2Auth = False; /* Client should not use NTLMv2, as we can't tell that the server supports it. */
1555         /* Note, that we will use NTLM2 session security (which is different), if it is available */
1556
1557         Globals.map_to_guest = 0;       /* By Default, "Never" */
1558         Globals.oplock_break_wait_time = 0;     /* By Default, 0 msecs. */
1559         Globals.enhanced_browsing = True; 
1560         Globals.iLockSpinTime = WINDOWS_MINIMUM_LOCK_TIMEOUT_MS; /* msec. */
1561 #ifdef MMAP_BLACKLIST
1562         Globals.bUseMmap = False;
1563 #else
1564         Globals.bUseMmap = True;
1565 #endif
1566         Globals.bUnixExtensions = True;
1567         Globals.bResetOnZeroVC = False;
1568
1569         /* hostname lookups can be very expensive and are broken on
1570            a large number of sites (tridge) */
1571         Globals.bHostnameLookups = False;
1572
1573         string_set(&Globals.szPassdbBackend, "smbpasswd");
1574         string_set(&Globals.szLdapSuffix, "");
1575         string_set(&Globals.szLdapMachineSuffix, "");
1576         string_set(&Globals.szLdapUserSuffix, "");
1577         string_set(&Globals.szLdapGroupSuffix, "");
1578         string_set(&Globals.szLdapIdmapSuffix, "");
1579
1580         string_set(&Globals.szLdapAdminDn, "");
1581         Globals.ldap_ssl = LDAP_SSL_ON;
1582         Globals.ldap_passwd_sync = LDAP_PASSWD_SYNC_OFF;
1583         Globals.ldap_delete_dn = False;
1584         Globals.ldap_replication_sleep = 1000; /* wait 1 sec for replication */
1585         Globals.ldap_timeout = LDAP_CONNECT_DEFAULT_TIMEOUT;
1586         Globals.ldap_page_size = LDAP_PAGE_SIZE;
1587
1588         /* This is what we tell the afs client. in reality we set the token 
1589          * to never expire, though, when this runs out the afs client will 
1590          * forget the token. Set to 0 to get NEVERDATE.*/
1591         Globals.iAfsTokenLifetime = 604800;
1592
1593 /* these parameters are set to defaults that are more appropriate
1594    for the increasing samba install base:
1595
1596    as a member of the workgroup, that will possibly become a
1597    _local_ master browser (lm = True).  this is opposed to a forced
1598    local master browser startup (pm = True).
1599
1600    doesn't provide WINS server service by default (wsupp = False),
1601    and doesn't provide domain master browser services by default, either.
1602
1603 */
1604
1605         Globals.bMsAddPrinterWizard = True;
1606         Globals.bPreferredMaster = Auto;        /* depending on bDomainMaster */
1607         Globals.os_level = 20;
1608         Globals.bLocalMaster = True;
1609         Globals.bDomainMaster = Auto;   /* depending on bDomainLogons */
1610         Globals.bDomainLogons = False;
1611         Globals.bBrowseList = True;
1612         Globals.bWINSsupport = False;
1613         Globals.bWINSproxy = False;
1614
1615         Globals.bDNSproxy = True;
1616
1617         /* this just means to use them if they exist */
1618         Globals.bKernelOplocks = True;
1619
1620         Globals.bAllowTrustedDomains = True;
1621
1622         string_set(&Globals.szTemplateShell, "/bin/false");
1623         string_set(&Globals.szTemplateHomedir, "/home/%D/%U");
1624         string_set(&Globals.szWinbindSeparator, "\\");
1625
1626         string_set(&Globals.szCupsServer, "");
1627         string_set(&Globals.szIPrintServer, "");
1628
1629         Globals.winbind_cache_time = 300;       /* 5 minutes */
1630         Globals.bWinbindEnumUsers = False;
1631         Globals.bWinbindEnumGroups = False;
1632         Globals.bWinbindUseDefaultDomain = False;
1633         Globals.bWinbindTrustedDomainsOnly = False;
1634         Globals.bWinbindNestedGroups = True;
1635         Globals.bWinbindRefreshTickets = False;
1636         Globals.bWinbindOfflineLogon = False;
1637
1638         Globals.iIdmapCacheTime = 900; /* 15 minutes by default */
1639         Globals.iIdmapNegativeCacheTime = 120; /* 2 minutes by default */
1640
1641         Globals.bPassdbExpandExplicit = False;
1642
1643         Globals.name_cache_timeout = 660; /* In seconds */
1644
1645         Globals.bUseSpnego = True;
1646         Globals.bClientUseSpnego = True;
1647
1648         Globals.client_signing = Auto;
1649         Globals.server_signing = False;
1650
1651         Globals.bDeferSharingViolations = True;
1652         string_set(&Globals.smb_ports, SMB_PORTS);
1653
1654         Globals.bEnablePrivileges = True;
1655         Globals.bHostMSDfs        = True;
1656         Globals.bASUSupport       = False;
1657         
1658         /* User defined shares. */
1659         pstrcpy(s, dyn_LOCKDIR);
1660         pstrcat(s, "/usershares");
1661         string_set(&Globals.szUsersharePath, s);
1662         string_set(&Globals.szUsershareTemplateShare, "");
1663         Globals.iUsershareMaxShares = 0;
1664         /* By default disallow sharing of directories not owned by the sharer. */
1665         Globals.bUsershareOwnerOnly = True;
1666         /* By default disallow guest access to usershares. */
1667         Globals.bUsershareAllowGuests = False;
1668
1669         Globals.iKeepalive = DEFAULT_KEEPALIVE;
1670
1671         /* By default no shares out of the registry */
1672         Globals.bRegistryShares = False;
1673 }
1674
1675 static TALLOC_CTX *lp_talloc;
1676
1677 /******************************************************************* a
1678  Free up temporary memory - called from the main loop.
1679 ********************************************************************/
1680
1681 void lp_TALLOC_FREE(void)
1682 {
1683         if (!lp_talloc)
1684                 return;
1685         TALLOC_FREE(lp_talloc);
1686         lp_talloc = NULL;
1687 }
1688
1689 TALLOC_CTX *tmp_talloc_ctx(void)
1690 {
1691         if (lp_talloc == NULL) {
1692                 lp_talloc = talloc_init("tmp_talloc_ctx");
1693         }
1694
1695         if (lp_talloc == NULL) {
1696                 smb_panic("Could not create temporary talloc context\n");
1697         }
1698
1699         return lp_talloc;
1700 }
1701
1702 /*******************************************************************
1703  Convenience routine to grab string parameters into temporary memory
1704  and run standard_sub_basic on them. The buffers can be written to by
1705  callers without affecting the source string.
1706 ********************************************************************/
1707
1708 static char *lp_string(const char *s)
1709 {
1710         char *ret, *tmpstr;
1711
1712         /* The follow debug is useful for tracking down memory problems
1713            especially if you have an inner loop that is calling a lp_*()
1714            function that returns a string.  Perhaps this debug should be
1715            present all the time? */
1716
1717 #if 0
1718         DEBUG(10, ("lp_string(%s)\n", s));
1719 #endif
1720
1721         if (!lp_talloc)
1722                 lp_talloc = talloc_init("lp_talloc");
1723
1724         tmpstr = alloc_sub_basic(get_current_username(),
1725                                  current_user_info.domain, s);
1726         if (trim_char(tmpstr, '\"', '\"')) {
1727                 if (strchr(tmpstr,'\"') != NULL) {
1728                         SAFE_FREE(tmpstr);
1729                         tmpstr = alloc_sub_basic(get_current_username(),
1730                                                  current_user_info.domain, s);
1731                 }
1732         }
1733         ret = talloc_strdup(lp_talloc, tmpstr);
1734         SAFE_FREE(tmpstr);
1735                         
1736         return (ret);
1737 }
1738
1739 /*
1740    In this section all the functions that are used to access the 
1741    parameters from the rest of the program are defined 
1742 */
1743
1744 #define FN_GLOBAL_STRING(fn_name,ptr) \
1745  char *fn_name(void) {return(lp_string(*(char **)(ptr) ? *(char **)(ptr) : ""));}
1746 #define FN_GLOBAL_CONST_STRING(fn_name,ptr) \
1747  const char *fn_name(void) {return(*(const char **)(ptr) ? *(const char **)(ptr) : "");}
1748 #define FN_GLOBAL_LIST(fn_name,ptr) \
1749  const char **fn_name(void) {return(*(const char ***)(ptr));}
1750 #define FN_GLOBAL_BOOL(fn_name,ptr) \
1751  BOOL fn_name(void) {return(*(BOOL *)(ptr));}
1752 #define FN_GLOBAL_CHAR(fn_name,ptr) \
1753  char fn_name(void) {return(*(char *)(ptr));}
1754 #define FN_GLOBAL_INTEGER(fn_name,ptr) \
1755  int fn_name(void) {return(*(int *)(ptr));}
1756
1757 #define FN_LOCAL_STRING(fn_name,val) \
1758  char *fn_name(int i) {return(lp_string((LP_SNUM_OK(i) && ServicePtrs[(i)]->val) ? ServicePtrs[(i)]->val : sDefault.val));}
1759 #define FN_LOCAL_CONST_STRING(fn_name,val) \
1760  const char *fn_name(int i) {return (const char *)((LP_SNUM_OK(i) && ServicePtrs[(i)]->val) ? ServicePtrs[(i)]->val : sDefault.val);}
1761 #define FN_LOCAL_LIST(fn_name,val) \
1762  const char **fn_name(int i) {return(const char **)(LP_SNUM_OK(i)? ServicePtrs[(i)]->val : sDefault.val);}
1763 #define FN_LOCAL_BOOL(fn_name,val) \
1764  BOOL fn_name(int i) {return(LP_SNUM_OK(i)? ServicePtrs[(i)]->val : sDefault.val);}
1765 #define FN_LOCAL_INTEGER(fn_name,val) \
1766  int fn_name(int i) {return(LP_SNUM_OK(i)? ServicePtrs[(i)]->val : sDefault.val);}
1767
1768 #define FN_LOCAL_PARM_BOOL(fn_name,val) \
1769  BOOL fn_name(const struct share_params *p) {return(LP_SNUM_OK(p->service)? ServicePtrs[(p->service)]->val : sDefault.val);}
1770 #define FN_LOCAL_PARM_INTEGER(fn_name,val) \
1771  int fn_name(const struct share_params *p) {return(LP_SNUM_OK(p->service)? ServicePtrs[(p->service)]->val : sDefault.val);}
1772 #define FN_LOCAL_PARM_STRING(fn_name,val) \
1773  char *fn_name(const struct share_params *p) {return(lp_string((LP_SNUM_OK(p->service) && ServicePtrs[(p->service)]->val) ? ServicePtrs[(p->service)]->val : sDefault.val));}
1774 #define FN_LOCAL_CHAR(fn_name,val) \
1775  char fn_name(const struct share_params *p) {return(LP_SNUM_OK(p->service)? ServicePtrs[(p->service)]->val : sDefault.val);}
1776
1777 FN_GLOBAL_STRING(lp_smb_ports, &Globals.smb_ports)
1778 FN_GLOBAL_STRING(lp_dos_charset, &Globals.dos_charset)
1779 FN_GLOBAL_STRING(lp_unix_charset, &Globals.unix_charset)
1780 FN_GLOBAL_STRING(lp_display_charset, &Globals.display_charset)
1781 FN_GLOBAL_STRING(lp_logfile, &Globals.szLogFile)
1782 FN_GLOBAL_STRING(lp_configfile, &Globals.szConfigFile)
1783 FN_GLOBAL_STRING(lp_smb_passwd_file, &Globals.szSMBPasswdFile)
1784 FN_GLOBAL_STRING(lp_private_dir, &Globals.szPrivateDir)
1785 FN_GLOBAL_STRING(lp_serverstring, &Globals.szServerString)
1786 FN_GLOBAL_INTEGER(lp_printcap_cache_time, &Globals.PrintcapCacheTime)
1787 FN_GLOBAL_STRING(lp_addport_cmd, &Globals.szAddPortCommand)
1788 FN_GLOBAL_STRING(lp_enumports_cmd, &Globals.szEnumPortsCommand)
1789 FN_GLOBAL_STRING(lp_addprinter_cmd, &Globals.szAddPrinterCommand)
1790 FN_GLOBAL_STRING(lp_deleteprinter_cmd, &Globals.szDeletePrinterCommand)
1791 FN_GLOBAL_STRING(lp_os2_driver_map, &Globals.szOs2DriverMap)
1792 FN_GLOBAL_STRING(lp_lockdir, &Globals.szLockDir)
1793 FN_GLOBAL_STRING(lp_piddir, &Globals.szPidDir)
1794 FN_GLOBAL_STRING(lp_mangling_method, &Globals.szManglingMethod)
1795 FN_GLOBAL_INTEGER(lp_mangle_prefix, &Globals.mangle_prefix)
1796 FN_GLOBAL_STRING(lp_utmpdir, &Globals.szUtmpDir)
1797 FN_GLOBAL_STRING(lp_wtmpdir, &Globals.szWtmpDir)
1798 FN_GLOBAL_BOOL(lp_utmp, &Globals.bUtmp)
1799 FN_GLOBAL_STRING(lp_rootdir, &Globals.szRootdir)
1800 FN_GLOBAL_STRING(lp_defaultservice, &Globals.szDefaultService)
1801 FN_GLOBAL_STRING(lp_msg_command, &Globals.szMsgCommand)
1802 FN_GLOBAL_STRING(lp_get_quota_command, &Globals.szGetQuota)
1803 FN_GLOBAL_STRING(lp_set_quota_command, &Globals.szSetQuota)
1804 FN_GLOBAL_STRING(lp_auto_services, &Globals.szAutoServices)
1805 FN_GLOBAL_STRING(lp_passwd_program, &Globals.szPasswdProgram)
1806 FN_GLOBAL_STRING(lp_passwd_chat, &Globals.szPasswdChat)
1807 FN_GLOBAL_STRING(lp_passwordserver, &Globals.szPasswordServer)
1808 FN_GLOBAL_STRING(lp_name_resolve_order, &Globals.szNameResolveOrder)
1809 FN_GLOBAL_STRING(lp_realm, &Globals.szRealm)
1810 FN_GLOBAL_CONST_STRING(lp_afs_username_map, &Globals.szAfsUsernameMap)
1811 FN_GLOBAL_INTEGER(lp_afs_token_lifetime, &Globals.iAfsTokenLifetime)
1812 FN_GLOBAL_STRING(lp_log_nt_token_command, &Globals.szLogNtTokenCommand)
1813 FN_GLOBAL_STRING(lp_username_map, &Globals.szUsernameMap)
1814 FN_GLOBAL_CONST_STRING(lp_logon_script, &Globals.szLogonScript)
1815 FN_GLOBAL_CONST_STRING(lp_logon_path, &Globals.szLogonPath)
1816 FN_GLOBAL_CONST_STRING(lp_logon_drive, &Globals.szLogonDrive)
1817 FN_GLOBAL_CONST_STRING(lp_logon_home, &Globals.szLogonHome)
1818 FN_GLOBAL_STRING(lp_remote_announce, &Globals.szRemoteAnnounce)
1819 FN_GLOBAL_STRING(lp_remote_browse_sync, &Globals.szRemoteBrowseSync)
1820 FN_GLOBAL_LIST(lp_wins_server_list, &Globals.szWINSservers)
1821 FN_GLOBAL_LIST(lp_interfaces, &Globals.szInterfaces)
1822 FN_GLOBAL_STRING(lp_socket_address, &Globals.szSocketAddress)
1823 FN_GLOBAL_STRING(lp_nis_home_map_name, &Globals.szNISHomeMapName)
1824 static FN_GLOBAL_STRING(lp_announce_version, &Globals.szAnnounceVersion)
1825 FN_GLOBAL_LIST(lp_netbios_aliases, &Globals.szNetbiosAliases)
1826 /* FN_GLOBAL_STRING(lp_passdb_backend, &Globals.szPassdbBackend)
1827  * lp_passdb_backend() should be replace by the this macro again after
1828  * some releases.
1829  * */
1830 const char *lp_passdb_backend(void)
1831 {
1832         char *delim, *quote;
1833
1834         delim = strchr( Globals.szPassdbBackend, ' ');
1835         /* no space at all */
1836         if (delim == NULL) {
1837                 goto out;
1838         }
1839
1840         quote = strchr(Globals.szPassdbBackend, '"');
1841         /* no quote char or non in the first part */
1842         if (quote == NULL || quote > delim) {
1843                 *delim = '\0';
1844                 goto warn;
1845         }
1846
1847         quote = strchr(quote+1, '"');
1848         if (quote == NULL) {
1849                 DEBUG(0, ("WARNING: Your 'passdb backend' configuration is invalid due to a missing second \" char.\n"));
1850                 goto out;
1851         } else if (*(quote+1) == '\0') {
1852                 /* space, fitting quote char, and one backend only */
1853                 goto out;
1854         } else {
1855                 /* terminate string after the fitting quote char */
1856                 *(quote+1) = '\0';
1857         }
1858
1859 warn:
1860         DEBUG(0, ("WARNING: Your 'passdb backend' configuration includes multiple backends.  This\n"
1861                 "is deprecated since Samba 3.0.23.  Please check WHATSNEW.txt or the section 'Passdb\n"
1862                 "Changes' from the ChangeNotes as part of the Samba HOWTO collection.  Only the first\n"
1863                 "backend (%s) is used.  The rest is ignored.\n", Globals.szPassdbBackend));
1864
1865 out:
1866         return Globals.szPassdbBackend;
1867 }
1868 FN_GLOBAL_LIST(lp_preload_modules, &Globals.szPreloadModules)
1869 FN_GLOBAL_STRING(lp_panic_action, &Globals.szPanicAction)
1870 FN_GLOBAL_STRING(lp_adduser_script, &Globals.szAddUserScript)
1871 FN_GLOBAL_STRING(lp_renameuser_script, &Globals.szRenameUserScript)
1872 FN_GLOBAL_STRING(lp_deluser_script, &Globals.szDelUserScript)
1873
1874 FN_GLOBAL_CONST_STRING(lp_guestaccount, &Globals.szGuestaccount)
1875 FN_GLOBAL_STRING(lp_addgroup_script, &Globals.szAddGroupScript)
1876 FN_GLOBAL_STRING(lp_delgroup_script, &Globals.szDelGroupScript)
1877 FN_GLOBAL_STRING(lp_addusertogroup_script, &Globals.szAddUserToGroupScript)
1878 FN_GLOBAL_STRING(lp_deluserfromgroup_script, &Globals.szDelUserFromGroupScript)
1879 FN_GLOBAL_STRING(lp_setprimarygroup_script, &Globals.szSetPrimaryGroupScript)
1880
1881 FN_GLOBAL_STRING(lp_addmachine_script, &Globals.szAddMachineScript)
1882
1883 FN_GLOBAL_STRING(lp_shutdown_script, &Globals.szShutdownScript)
1884 FN_GLOBAL_STRING(lp_abort_shutdown_script, &Globals.szAbortShutdownScript)
1885 FN_GLOBAL_STRING(lp_username_map_script, &Globals.szUsernameMapScript)
1886
1887 FN_GLOBAL_STRING(lp_check_password_script, &Globals.szCheckPasswordScript)
1888
1889 FN_GLOBAL_STRING(lp_wins_hook, &Globals.szWINSHook)
1890 FN_GLOBAL_CONST_STRING(lp_template_homedir, &Globals.szTemplateHomedir)
1891 FN_GLOBAL_CONST_STRING(lp_template_shell, &Globals.szTemplateShell)
1892 FN_GLOBAL_CONST_STRING(lp_winbind_separator, &Globals.szWinbindSeparator)
1893 FN_GLOBAL_INTEGER(lp_acl_compatibility, &Globals.iAclCompat)
1894 FN_GLOBAL_BOOL(lp_winbind_enum_users, &Globals.bWinbindEnumUsers)
1895 FN_GLOBAL_BOOL(lp_winbind_enum_groups, &Globals.bWinbindEnumGroups)
1896 FN_GLOBAL_BOOL(lp_winbind_use_default_domain, &Globals.bWinbindUseDefaultDomain)
1897 FN_GLOBAL_BOOL(lp_winbind_trusted_domains_only, &Globals.bWinbindTrustedDomainsOnly)
1898 FN_GLOBAL_BOOL(lp_winbind_nested_groups, &Globals.bWinbindNestedGroups)
1899 FN_GLOBAL_BOOL(lp_winbind_refresh_tickets, &Globals.bWinbindRefreshTickets)
1900 FN_GLOBAL_BOOL(lp_winbind_offline_logon, &Globals.bWinbindOfflineLogon)
1901 FN_GLOBAL_BOOL(lp_winbind_normalize_names, &Globals.bWinbindNormalizeNames)
1902
1903 FN_GLOBAL_LIST(lp_idmap_domains, &Globals.szIdmapDomains)
1904 FN_GLOBAL_LIST(lp_idmap_backend, &Globals.szIdmapBackend) /* deprecated */
1905 FN_GLOBAL_STRING(lp_idmap_alloc_backend, &Globals.szIdmapAllocBackend)
1906 FN_GLOBAL_INTEGER(lp_idmap_cache_time, &Globals.iIdmapCacheTime)
1907 FN_GLOBAL_INTEGER(lp_idmap_negative_cache_time, &Globals.iIdmapNegativeCacheTime)
1908 FN_GLOBAL_INTEGER(lp_keepalive, &Globals.iKeepalive)
1909 FN_GLOBAL_BOOL(lp_passdb_expand_explicit, &Globals.bPassdbExpandExplicit)
1910
1911 FN_GLOBAL_STRING(lp_ldap_suffix, &Globals.szLdapSuffix)
1912 FN_GLOBAL_STRING(lp_ldap_admin_dn, &Globals.szLdapAdminDn)
1913 FN_GLOBAL_INTEGER(lp_ldap_ssl, &Globals.ldap_ssl)
1914 FN_GLOBAL_INTEGER(lp_ldap_passwd_sync, &Globals.ldap_passwd_sync)
1915 FN_GLOBAL_BOOL(lp_ldap_delete_dn, &Globals.ldap_delete_dn)
1916 FN_GLOBAL_INTEGER(lp_ldap_replication_sleep, &Globals.ldap_replication_sleep)
1917 FN_GLOBAL_INTEGER(lp_ldap_timeout, &Globals.ldap_timeout)
1918 FN_GLOBAL_INTEGER(lp_ldap_page_size, &Globals.ldap_page_size)
1919 FN_GLOBAL_STRING(lp_add_share_cmd, &Globals.szAddShareCommand)
1920 FN_GLOBAL_STRING(lp_change_share_cmd, &Globals.szChangeShareCommand)
1921 FN_GLOBAL_STRING(lp_delete_share_cmd, &Globals.szDeleteShareCommand)
1922 FN_GLOBAL_STRING(lp_usershare_path, &Globals.szUsersharePath)
1923 FN_GLOBAL_LIST(lp_usershare_prefix_allow_list, &Globals.szUsersharePrefixAllowList)
1924 FN_GLOBAL_LIST(lp_usershare_prefix_deny_list, &Globals.szUsersharePrefixDenyList)
1925
1926 FN_GLOBAL_LIST(lp_eventlog_list, &Globals.szEventLogs)
1927
1928 FN_GLOBAL_BOOL(lp_registry_shares, &Globals.bRegistryShares)
1929 FN_GLOBAL_BOOL(lp_usershare_allow_guests, &Globals.bUsershareAllowGuests)
1930 FN_GLOBAL_BOOL(lp_usershare_owner_only, &Globals.bUsershareOwnerOnly)
1931 FN_GLOBAL_BOOL(lp_disable_netbios, &Globals.bDisableNetbios)
1932 FN_GLOBAL_BOOL(lp_reset_on_zero_vc, &Globals.bResetOnZeroVC)
1933 FN_GLOBAL_BOOL(lp_ms_add_printer_wizard, &Globals.bMsAddPrinterWizard)
1934 FN_GLOBAL_BOOL(lp_dns_proxy, &Globals.bDNSproxy)
1935 FN_GLOBAL_BOOL(lp_wins_support, &Globals.bWINSsupport)
1936 FN_GLOBAL_BOOL(lp_we_are_a_wins_server, &Globals.bWINSsupport)
1937 FN_GLOBAL_BOOL(lp_wins_proxy, &Globals.bWINSproxy)
1938 FN_GLOBAL_BOOL(lp_local_master, &Globals.bLocalMaster)
1939 FN_GLOBAL_BOOL(lp_domain_logons, &Globals.bDomainLogons)
1940 FN_GLOBAL_BOOL(lp_load_printers, &Globals.bLoadPrinters)
1941 FN_GLOBAL_BOOL(lp_readbmpx, &Globals.bReadbmpx)
1942 FN_GLOBAL_BOOL(lp_readraw, &Globals.bReadRaw)
1943 FN_GLOBAL_BOOL(lp_large_readwrite, &Globals.bLargeReadwrite)
1944 FN_GLOBAL_BOOL(lp_writeraw, &Globals.bWriteRaw)
1945 FN_GLOBAL_BOOL(lp_null_passwords, &Globals.bNullPasswords)
1946 FN_GLOBAL_BOOL(lp_obey_pam_restrictions, &Globals.bObeyPamRestrictions)
1947 FN_GLOBAL_BOOL(lp_encrypted_passwords, &Globals.bEncryptPasswords)
1948 FN_GLOBAL_BOOL(lp_update_encrypted, &Globals.bUpdateEncrypt)
1949 FN_GLOBAL_INTEGER(lp_client_schannel, &Globals.clientSchannel)
1950 FN_GLOBAL_INTEGER(lp_server_schannel, &Globals.serverSchannel)
1951 FN_GLOBAL_BOOL(lp_syslog_only, &Globals.bSyslogOnly)
1952 FN_GLOBAL_BOOL(lp_timestamp_logs, &Globals.bTimestampLogs)
1953 FN_GLOBAL_BOOL(lp_debug_prefix_timestamp, &Globals.bDebugPrefixTimestamp)
1954 FN_GLOBAL_BOOL(lp_debug_hires_timestamp, &Globals.bDebugHiresTimestamp)
1955 FN_GLOBAL_BOOL(lp_debug_pid, &Globals.bDebugPid)
1956 FN_GLOBAL_BOOL(lp_debug_uid, &Globals.bDebugUid)
1957 FN_GLOBAL_BOOL(lp_enable_core_files, &Globals.bEnableCoreFiles)
1958 FN_GLOBAL_BOOL(lp_browse_list, &Globals.bBrowseList)
1959 FN_GLOBAL_BOOL(lp_nis_home_map, &Globals.bNISHomeMap)
1960 static FN_GLOBAL_BOOL(lp_time_server, &Globals.bTimeServer)
1961 FN_GLOBAL_BOOL(lp_bind_interfaces_only, &Globals.bBindInterfacesOnly)
1962 FN_GLOBAL_BOOL(lp_pam_password_change, &Globals.bPamPasswordChange)
1963 FN_GLOBAL_BOOL(lp_unix_password_sync, &Globals.bUnixPasswdSync)
1964 FN_GLOBAL_BOOL(lp_passwd_chat_debug, &Globals.bPasswdChatDebug)
1965 FN_GLOBAL_INTEGER(lp_passwd_chat_timeout, &Globals.iPasswdChatTimeout)
1966 FN_GLOBAL_BOOL(lp_nt_pipe_support, &Globals.bNTPipeSupport)
1967 FN_GLOBAL_BOOL(lp_nt_status_support, &Globals.bNTStatusSupport)
1968 FN_GLOBAL_BOOL(lp_stat_cache, &Globals.bStatCache)
1969 FN_GLOBAL_INTEGER(lp_max_stat_cache_size, &Globals.iMaxStatCacheSize)
1970 FN_GLOBAL_BOOL(lp_allow_trusted_domains, &Globals.bAllowTrustedDomains)
1971 FN_GLOBAL_INTEGER(lp_restrict_anonymous, &Globals.restrict_anonymous)
1972 FN_GLOBAL_BOOL(lp_lanman_auth, &Globals.bLanmanAuth)
1973 FN_GLOBAL_BOOL(lp_ntlm_auth, &Globals.bNTLMAuth)
1974 FN_GLOBAL_BOOL(lp_client_plaintext_auth, &Globals.bClientPlaintextAuth)
1975 FN_GLOBAL_BOOL(lp_client_lanman_auth, &Globals.bClientLanManAuth)
1976 FN_GLOBAL_BOOL(lp_client_ntlmv2_auth, &Globals.bClientNTLMv2Auth)
1977 FN_GLOBAL_BOOL(lp_host_msdfs, &Globals.bHostMSDfs)
1978 FN_GLOBAL_BOOL(lp_kernel_oplocks, &Globals.bKernelOplocks)
1979 FN_GLOBAL_BOOL(lp_enhanced_browsing, &Globals.enhanced_browsing)
1980 FN_GLOBAL_BOOL(lp_use_mmap, &Globals.bUseMmap)
1981 FN_GLOBAL_BOOL(lp_unix_extensions, &Globals.bUnixExtensions)
1982 FN_GLOBAL_BOOL(lp_use_spnego, &Globals.bUseSpnego)
1983 FN_GLOBAL_BOOL(lp_client_use_spnego, &Globals.bClientUseSpnego)
1984 FN_GLOBAL_BOOL(lp_hostname_lookups, &Globals.bHostnameLookups)
1985 FN_LOCAL_PARM_BOOL(lp_change_notify, bChangeNotify)
1986 FN_LOCAL_PARM_BOOL(lp_kernel_change_notify, bKernelChangeNotify)
1987 FN_GLOBAL_BOOL(lp_use_kerberos_keytab, &Globals.bUseKerberosKeytab)
1988 FN_GLOBAL_BOOL(lp_defer_sharing_violations, &Globals.bDeferSharingViolations)
1989 FN_GLOBAL_BOOL(lp_enable_privileges, &Globals.bEnablePrivileges)
1990 FN_GLOBAL_BOOL(lp_enable_asu_support, &Globals.bASUSupport)
1991 FN_GLOBAL_INTEGER(lp_os_level, &Globals.os_level)
1992 FN_GLOBAL_INTEGER(lp_max_ttl, &Globals.max_ttl)
1993 FN_GLOBAL_INTEGER(lp_max_wins_ttl, &Globals.max_wins_ttl)
1994 FN_GLOBAL_INTEGER(lp_min_wins_ttl, &Globals.min_wins_ttl)
1995 FN_GLOBAL_INTEGER(lp_max_log_size, &Globals.max_log_size)
1996 FN_GLOBAL_INTEGER(lp_max_open_files, &Globals.max_open_files)
1997 FN_GLOBAL_INTEGER(lp_open_files_db_hash_size, &Globals.open_files_db_hash_size)
1998 FN_GLOBAL_INTEGER(lp_maxxmit, &Globals.max_xmit)
1999 FN_GLOBAL_INTEGER(lp_maxmux, &Globals.max_mux)
2000 FN_GLOBAL_INTEGER(lp_passwordlevel, &Globals.pwordlevel)
2001 FN_GLOBAL_INTEGER(lp_usernamelevel, &Globals.unamelevel)
2002 FN_GLOBAL_INTEGER(lp_deadtime, &Globals.deadtime)
2003 FN_GLOBAL_INTEGER(lp_maxprotocol, &Globals.maxprotocol)
2004 FN_GLOBAL_INTEGER(lp_minprotocol, &Globals.minprotocol)
2005 FN_GLOBAL_INTEGER(lp_security, &Globals.security)
2006 FN_GLOBAL_LIST(lp_auth_methods, &Globals.AuthMethods)
2007 FN_GLOBAL_BOOL(lp_paranoid_server_security, &Globals.paranoid_server_security)
2008 FN_GLOBAL_INTEGER(lp_maxdisksize, &Globals.maxdisksize)
2009 FN_GLOBAL_INTEGER(lp_lpqcachetime, &Globals.lpqcachetime)
2010 FN_GLOBAL_INTEGER(lp_max_smbd_processes, &Globals.iMaxSmbdProcesses)
2011 FN_GLOBAL_INTEGER(_lp_disable_spoolss, &Globals.bDisableSpoolss)
2012 FN_GLOBAL_INTEGER(lp_syslog, &Globals.syslog)
2013 static FN_GLOBAL_INTEGER(lp_announce_as, &Globals.announce_as)
2014 FN_GLOBAL_INTEGER(lp_lm_announce, &Globals.lm_announce)
2015 FN_GLOBAL_INTEGER(lp_lm_interval, &Globals.lm_interval)
2016 FN_GLOBAL_INTEGER(lp_machine_password_timeout, &Globals.machine_password_timeout)
2017 FN_GLOBAL_INTEGER(lp_map_to_guest, &Globals.map_to_guest)
2018 FN_GLOBAL_INTEGER(lp_oplock_break_wait_time, &Globals.oplock_break_wait_time)
2019 FN_GLOBAL_INTEGER(lp_lock_spin_time, &Globals.iLockSpinTime)
2020 FN_GLOBAL_INTEGER(lp_usershare_max_shares, &Globals.iUsershareMaxShares)
2021
2022 FN_LOCAL_STRING(lp_preexec, szPreExec)
2023 FN_LOCAL_STRING(lp_postexec, szPostExec)
2024 FN_LOCAL_STRING(lp_rootpreexec, szRootPreExec)
2025 FN_LOCAL_STRING(lp_rootpostexec, szRootPostExec)
2026 FN_LOCAL_STRING(lp_servicename, szService)
2027 FN_LOCAL_CONST_STRING(lp_const_servicename, szService)
2028 FN_LOCAL_STRING(lp_pathname, szPath)
2029 FN_LOCAL_STRING(lp_dontdescend, szDontdescend)
2030 FN_LOCAL_STRING(lp_username, szUsername)
2031 FN_LOCAL_LIST(lp_invalid_users, szInvalidUsers)
2032 FN_LOCAL_LIST(lp_valid_users, szValidUsers)
2033 FN_LOCAL_LIST(lp_admin_users, szAdminUsers)
2034 FN_GLOBAL_LIST(lp_svcctl_list, &Globals.szServicesList)
2035 FN_LOCAL_STRING(lp_cups_options, szCupsOptions)
2036 FN_GLOBAL_STRING(lp_cups_server, &Globals.szCupsServer)
2037 FN_GLOBAL_STRING(lp_iprint_server, &Globals.szIPrintServer)
2038 FN_LOCAL_STRING(lp_printcommand, szPrintcommand)
2039 FN_LOCAL_STRING(lp_lpqcommand, szLpqcommand)
2040 FN_LOCAL_STRING(lp_lprmcommand, szLprmcommand)
2041 FN_LOCAL_STRING(lp_lppausecommand, szLppausecommand)
2042 FN_LOCAL_STRING(lp_lpresumecommand, szLpresumecommand)
2043 FN_LOCAL_STRING(lp_queuepausecommand, szQueuepausecommand)
2044 FN_LOCAL_STRING(lp_queueresumecommand, szQueueresumecommand)
2045 static FN_LOCAL_STRING(_lp_printername, szPrintername)
2046 FN_LOCAL_CONST_STRING(lp_printjob_username, szPrintjobUsername)
2047 FN_LOCAL_LIST(lp_hostsallow, szHostsallow)
2048 FN_LOCAL_LIST(lp_hostsdeny, szHostsdeny)
2049 FN_LOCAL_STRING(lp_magicscript, szMagicScript)
2050 FN_LOCAL_STRING(lp_magicoutput, szMagicOutput)
2051 FN_LOCAL_STRING(lp_comment, comment)
2052 FN_LOCAL_STRING(lp_force_user, force_user)
2053 FN_LOCAL_STRING(lp_force_group, force_group)
2054 FN_LOCAL_LIST(lp_readlist, readlist)
2055 FN_LOCAL_LIST(lp_writelist, writelist)
2056 FN_LOCAL_LIST(lp_printer_admin, printer_admin)
2057 FN_LOCAL_STRING(lp_fstype, fstype)
2058 FN_LOCAL_LIST(lp_vfs_objects, szVfsObjects)
2059 FN_LOCAL_STRING(lp_msdfs_proxy, szMSDfsProxy)
2060 static FN_LOCAL_STRING(lp_volume, volume)
2061 FN_LOCAL_PARM_STRING(lp_mangled_map, szMangledMap)
2062 FN_LOCAL_STRING(lp_veto_files, szVetoFiles)
2063 FN_LOCAL_STRING(lp_hide_files, szHideFiles)
2064 FN_LOCAL_STRING(lp_veto_oplocks, szVetoOplockFiles)
2065 FN_LOCAL_BOOL(lp_msdfs_root, bMSDfsRoot)
2066 FN_LOCAL_STRING(lp_dfree_command, szDfree)
2067 FN_LOCAL_BOOL(lp_autoloaded, autoloaded)
2068 FN_LOCAL_BOOL(lp_preexec_close, bPreexecClose)
2069 FN_LOCAL_BOOL(lp_rootpreexec_close, bRootpreexecClose)
2070 FN_LOCAL_INTEGER(lp_casesensitive, iCaseSensitive)
2071 FN_LOCAL_BOOL(lp_preservecase, bCasePreserve)
2072 FN_LOCAL_BOOL(lp_shortpreservecase, bShortCasePreserve)
2073 FN_LOCAL_BOOL(lp_hide_dot_files, bHideDotFiles)
2074 FN_LOCAL_BOOL(lp_hide_special_files, bHideSpecialFiles)
2075 FN_LOCAL_BOOL(lp_hideunreadable, bHideUnReadable)
2076 FN_LOCAL_BOOL(lp_hideunwriteable_files, bHideUnWriteableFiles)
2077 FN_LOCAL_BOOL(lp_browseable, bBrowseable)
2078 FN_LOCAL_BOOL(lp_readonly, bRead_only)
2079 FN_LOCAL_BOOL(lp_no_set_dir, bNo_set_dir)
2080 FN_LOCAL_BOOL(lp_guest_ok, bGuest_ok)
2081 FN_LOCAL_BOOL(lp_guest_only, bGuest_only)
2082 FN_LOCAL_BOOL(lp_print_ok, bPrint_ok)
2083 FN_LOCAL_BOOL(lp_map_hidden, bMap_hidden)
2084 FN_LOCAL_BOOL(lp_map_archive, bMap_archive)
2085 FN_LOCAL_BOOL(lp_store_dos_attributes, bStoreDosAttributes)
2086 FN_LOCAL_BOOL(lp_dmapi_support, bDmapiSupport)
2087 FN_LOCAL_PARM_BOOL(lp_locking, bLocking)
2088 FN_LOCAL_PARM_INTEGER(lp_strict_locking, iStrictLocking)
2089 FN_LOCAL_PARM_BOOL(lp_posix_locking, bPosixLocking)
2090 FN_LOCAL_BOOL(lp_share_modes, bShareModes)
2091 FN_LOCAL_BOOL(lp_oplocks, bOpLocks)
2092 FN_LOCAL_BOOL(lp_level2_oplocks, bLevel2OpLocks)
2093 FN_LOCAL_BOOL(lp_onlyuser, bOnlyUser)
2094 FN_LOCAL_PARM_BOOL(lp_manglednames, bMangledNames)
2095 FN_LOCAL_BOOL(lp_widelinks, bWidelinks)
2096 FN_LOCAL_BOOL(lp_symlinks, bSymlinks)
2097 FN_LOCAL_BOOL(lp_syncalways, bSyncAlways)
2098 FN_LOCAL_BOOL(lp_strict_allocate, bStrictAllocate)
2099 FN_LOCAL_BOOL(lp_strict_sync, bStrictSync)
2100 FN_LOCAL_BOOL(lp_map_system, bMap_system)
2101 FN_LOCAL_BOOL(lp_delete_readonly, bDeleteReadonly)
2102 FN_LOCAL_BOOL(lp_fake_oplocks, bFakeOplocks)
2103 FN_LOCAL_BOOL(lp_recursive_veto_delete, bDeleteVetoFiles)
2104 FN_LOCAL_BOOL(lp_dos_filemode, bDosFilemode)
2105 FN_LOCAL_BOOL(lp_dos_filetimes, bDosFiletimes)
2106 FN_LOCAL_BOOL(lp_dos_filetime_resolution, bDosFiletimeResolution)
2107 FN_LOCAL_BOOL(lp_fake_dir_create_times, bFakeDirCreateTimes)
2108 FN_LOCAL_BOOL(lp_blocking_locks, bBlockingLocks)
2109 FN_LOCAL_BOOL(lp_inherit_perms, bInheritPerms)
2110 FN_LOCAL_BOOL(lp_inherit_acls, bInheritACLS)
2111 FN_LOCAL_BOOL(lp_inherit_owner, bInheritOwner)
2112 FN_LOCAL_BOOL(lp_use_client_driver, bUseClientDriver)
2113 FN_LOCAL_BOOL(lp_default_devmode, bDefaultDevmode)
2114 FN_LOCAL_BOOL(lp_force_printername, bForcePrintername)
2115 FN_LOCAL_BOOL(lp_nt_acl_support, bNTAclSupport)
2116 FN_LOCAL_BOOL(lp_force_unknown_acl_user, bForceUnknownAclUser)
2117 FN_LOCAL_BOOL(lp_ea_support, bEASupport)
2118 FN_LOCAL_BOOL(_lp_use_sendfile, bUseSendfile)
2119 FN_LOCAL_BOOL(lp_profile_acls, bProfileAcls)
2120 FN_LOCAL_BOOL(lp_map_acl_inherit, bMap_acl_inherit)
2121 FN_LOCAL_BOOL(lp_afs_share, bAfs_Share)
2122 FN_LOCAL_BOOL(lp_acl_check_permissions, bAclCheckPermissions)
2123 FN_LOCAL_BOOL(lp_acl_group_control, bAclGroupControl)
2124 FN_LOCAL_BOOL(lp_acl_map_full_control, bAclMapFullControl)
2125 FN_LOCAL_INTEGER(lp_create_mask, iCreate_mask)
2126 FN_LOCAL_INTEGER(lp_force_create_mode, iCreate_force_mode)
2127 FN_LOCAL_INTEGER(lp_security_mask, iSecurity_mask)
2128 FN_LOCAL_INTEGER(lp_force_security_mode, iSecurity_force_mode)
2129 FN_LOCAL_INTEGER(lp_dir_mask, iDir_mask)
2130 FN_LOCAL_INTEGER(lp_force_dir_mode, iDir_force_mode)
2131 FN_LOCAL_INTEGER(lp_dir_security_mask, iDir_Security_mask)
2132 FN_LOCAL_INTEGER(lp_force_dir_security_mode, iDir_Security_force_mode)
2133 FN_LOCAL_INTEGER(lp_max_connections, iMaxConnections)
2134 FN_LOCAL_INTEGER(lp_defaultcase, iDefaultCase)
2135 FN_LOCAL_INTEGER(lp_minprintspace, iMinPrintSpace)
2136 FN_LOCAL_INTEGER(lp_printing, iPrinting)
2137 FN_LOCAL_INTEGER(lp_max_reported_jobs, iMaxReportedPrintJobs)
2138 FN_LOCAL_INTEGER(lp_oplock_contention_limit, iOplockContentionLimit)
2139 FN_LOCAL_INTEGER(lp_csc_policy, iCSCPolicy)
2140 FN_LOCAL_INTEGER(lp_write_cache_size, iWriteCacheSize)
2141 FN_LOCAL_INTEGER(lp_block_size, iBlock_size)
2142 FN_LOCAL_INTEGER(lp_dfree_cache_time, iDfreeCacheTime)
2143 FN_LOCAL_INTEGER(lp_allocation_roundup_size, iallocation_roundup_size)
2144 FN_LOCAL_INTEGER(lp_aio_read_size, iAioReadSize)
2145 FN_LOCAL_INTEGER(lp_aio_write_size, iAioWriteSize)
2146 FN_LOCAL_INTEGER(lp_map_readonly, iMap_readonly)
2147 FN_LOCAL_CHAR(lp_magicchar, magic_char)
2148 FN_GLOBAL_INTEGER(lp_winbind_cache_time, &Globals.winbind_cache_time)
2149 FN_GLOBAL_LIST(lp_winbind_nss_info, &Globals.szWinbindNssInfo)
2150 FN_GLOBAL_INTEGER(lp_algorithmic_rid_base, &Globals.AlgorithmicRidBase)
2151 FN_GLOBAL_INTEGER(lp_name_cache_timeout, &Globals.name_cache_timeout)
2152 FN_GLOBAL_INTEGER(lp_client_signing, &Globals.client_signing)
2153 FN_GLOBAL_INTEGER(lp_server_signing, &Globals.server_signing)
2154
2155 /* local prototypes */
2156
2157 static int map_parameter(const char *pszParmName);
2158 static BOOL set_boolean(BOOL *pb, const char *pszParmValue);
2159 static int getservicebyname(const char *pszServiceName,
2160                             service * pserviceDest);
2161 static void copy_service(service * pserviceDest,
2162                          service * pserviceSource, BOOL *pcopymapDest);
2163 static BOOL do_parameter(const char *pszParmName, const char *pszParmValue);
2164 static BOOL do_section(const char *pszSectionName);
2165 static void init_copymap(service * pservice);
2166 static BOOL hash_a_service(const char *name, int number);
2167 static void free_service_byindex(int iService);
2168 static char * canonicalize_servicename(const char *name);
2169
2170 /* This is a helper function for parametrical options support. */
2171 /* It returns a pointer to parametrical option value if it exists or NULL otherwise */
2172 /* Actual parametrical functions are quite simple */
2173 static param_opt_struct *get_parametrics(int snum, const char *type, const char *option)
2174 {
2175         BOOL global_section = False;
2176         char* param_key;
2177         param_opt_struct *data;
2178         
2179         if (snum >= iNumServices) return NULL;
2180         
2181         if (snum < 0) { 
2182                 data = Globals.param_opt;
2183                 global_section = True;
2184         } else {
2185                 data = ServicePtrs[snum]->param_opt;
2186         }
2187     
2188         asprintf(&param_key, "%s:%s", type, option);
2189         if (!param_key) {
2190                 DEBUG(0,("asprintf failed!\n"));
2191                 return NULL;
2192         }
2193
2194         while (data) {
2195                 if (strcmp(data->key, param_key) == 0) {
2196                         string_free(&param_key);
2197                         return data;
2198                 }
2199                 data = data->next;
2200         }
2201
2202         if (!global_section) {
2203                 /* Try to fetch the same option but from globals */
2204                 /* but only if we are not already working with Globals */
2205                 data = Globals.param_opt;
2206                 while (data) {
2207                         if (strcmp(data->key, param_key) == 0) {
2208                                 string_free(&param_key);
2209                                 return data;
2210                         }
2211                         data = data->next;
2212                 }
2213         }
2214
2215         string_free(&param_key);
2216         
2217         return NULL;
2218 }
2219
2220
2221 #define MISSING_PARAMETER(name) \
2222     DEBUG(0, ("%s(): value is NULL or empty!\n", #name))
2223
2224 /*******************************************************************
2225 convenience routine to return int parameters.
2226 ********************************************************************/
2227 static int lp_int(const char *s)
2228 {
2229
2230         if (!s || !*s) {
2231                 MISSING_PARAMETER(lp_int);
2232                 return (-1);
2233         }
2234
2235         return atoi(s); 
2236 }
2237
2238 /*******************************************************************
2239 convenience routine to return unsigned long parameters.
2240 ********************************************************************/
2241 static unsigned long lp_ulong(const char *s)
2242 {
2243
2244         if (!s || !*s) {
2245                 MISSING_PARAMETER(lp_ulong);
2246                 return (0);
2247         }
2248
2249         return strtoul(s, NULL, 10);
2250 }
2251
2252 /*******************************************************************
2253 convenience routine to return boolean parameters.
2254 ********************************************************************/
2255 static BOOL lp_bool(const char *s)
2256 {
2257         BOOL ret = False;
2258
2259         if (!s || !*s) {
2260                 MISSING_PARAMETER(lp_bool);
2261                 return False;
2262         }
2263         
2264         if (!set_boolean(&ret,s)) {
2265                 DEBUG(0,("lp_bool(%s): value is not boolean!\n",s));
2266                 return False;
2267         }
2268
2269         return ret;
2270 }
2271
2272 /*******************************************************************
2273 convenience routine to return enum parameters.
2274 ********************************************************************/
2275 static int lp_enum(const char *s,const struct enum_list *_enum)
2276 {
2277         int i;
2278
2279         if (!s || !*s || !_enum) {
2280                 MISSING_PARAMETER(lp_enum);
2281                 return (-1);
2282         }
2283         
2284         for (i=0; _enum[i].name; i++) {
2285                 if (strequal(_enum[i].name,s))
2286                         return _enum[i].value;
2287         }
2288
2289         DEBUG(0,("lp_enum(%s,enum): value is not in enum_list!\n",s));
2290         return (-1);
2291 }
2292
2293 #undef MISSING_PARAMETER
2294
2295 /* DO NOT USE lp_parm_string ANYMORE!!!!
2296  * use lp_parm_const_string or lp_parm_talloc_string
2297  *
2298  * lp_parm_string is only used to let old modules find this symbol
2299  */
2300 #undef lp_parm_string
2301  char *lp_parm_string(const char *servicename, const char *type, const char *option);
2302  char *lp_parm_string(const char *servicename, const char *type, const char *option)
2303 {
2304         return lp_parm_talloc_string(lp_servicenumber(servicename), type, option, NULL);
2305 }
2306
2307 /* Return parametric option from a given service. Type is a part of option before ':' */
2308 /* Parametric option has following syntax: 'Type: option = value' */
2309 /* the returned value is talloced in lp_talloc */
2310 char *lp_parm_talloc_string(int snum, const char *type, const char *option, const char *def)
2311 {
2312         param_opt_struct *data = get_parametrics(snum, type, option);
2313         
2314         if (data == NULL||data->value==NULL) {
2315                 if (def) {
2316                         return lp_string(def);
2317                 } else {
2318                         return NULL;
2319                 }
2320         }
2321
2322         return lp_string(data->value);
2323 }
2324
2325 /* Return parametric option from a given service. Type is a part of option before ':' */
2326 /* Parametric option has following syntax: 'Type: option = value' */
2327 const char *lp_parm_const_string(int snum, const char *type, const char *option, const char *def)
2328 {
2329         param_opt_struct *data = get_parametrics(snum, type, option);
2330         
2331         if (data == NULL||data->value==NULL)
2332                 return def;
2333                 
2334         return data->value;
2335 }
2336
2337 /* Return parametric option from a given service. Type is a part of option before ':' */
2338 /* Parametric option has following syntax: 'Type: option = value' */
2339
2340 const char **lp_parm_string_list(int snum, const char *type, const char *option, const char **def)
2341 {
2342         param_opt_struct *data = get_parametrics(snum, type, option);
2343
2344         if (data == NULL||data->value==NULL)
2345                 return (const char **)def;
2346                 
2347         if (data->list==NULL) {
2348                 data->list = str_list_make(data->value, NULL);
2349         }
2350
2351         return (const char **)data->list;
2352 }
2353
2354 /* Return parametric option from a given service. Type is a part of option before ':' */
2355 /* Parametric option has following syntax: 'Type: option = value' */
2356
2357 int lp_parm_int(int snum, const char *type, const char *option, int def)
2358 {
2359         param_opt_struct *data = get_parametrics(snum, type, option);
2360         
2361         if (data && data->value && *data->value)
2362                 return lp_int(data->value);
2363
2364         return def;
2365 }
2366
2367 /* Return parametric option from a given service. Type is a part of option before ':' */
2368 /* Parametric option has following syntax: 'Type: option = value' */
2369
2370 unsigned long lp_parm_ulong(int snum, const char *type, const char *option, unsigned long def)
2371 {
2372         param_opt_struct *data = get_parametrics(snum, type, option);
2373         
2374         if (data && data->value && *data->value)
2375                 return lp_ulong(data->value);
2376
2377         return def;
2378 }
2379
2380 /* Return parametric option from a given service. Type is a part of option before ':' */
2381 /* Parametric option has following syntax: 'Type: option = value' */
2382
2383 BOOL lp_parm_bool(int snum, const char *type, const char *option, BOOL def)
2384 {
2385         param_opt_struct *data = get_parametrics(snum, type, option);
2386         
2387         if (data && data->value && *data->value)
2388                 return lp_bool(data->value);
2389
2390         return def;
2391 }
2392
2393 /* Return parametric option from a given service. Type is a part of option before ':' */
2394 /* Parametric option has following syntax: 'Type: option = value' */
2395
2396 int lp_parm_enum(int snum, const char *type, const char *option,
2397                  const struct enum_list *_enum, int def)
2398 {
2399         param_opt_struct *data = get_parametrics(snum, type, option);
2400         
2401         if (data && data->value && *data->value && _enum)
2402                 return lp_enum(data->value, _enum);
2403
2404         return def;
2405 }
2406
2407
2408 /***************************************************************************
2409  Initialise a service to the defaults.
2410 ***************************************************************************/
2411
2412 static void init_service(service * pservice)
2413 {
2414         memset((char *)pservice, '\0', sizeof(service));
2415         copy_service(pservice, &sDefault, NULL);
2416 }
2417
2418 /***************************************************************************
2419  Free the dynamically allocated parts of a service struct.
2420 ***************************************************************************/
2421
2422 static void free_service(service *pservice)
2423 {
2424         int i;
2425         param_opt_struct *data, *pdata;
2426         if (!pservice)
2427                 return;
2428
2429         if (pservice->szService)
2430                 DEBUG(5, ("free_service: Freeing service %s\n",
2431                        pservice->szService));
2432
2433         string_free(&pservice->szService);
2434         SAFE_FREE(pservice->copymap);
2435
2436         for (i = 0; parm_table[i].label; i++) {
2437                 if ((parm_table[i].type == P_STRING ||
2438                      parm_table[i].type == P_USTRING) &&
2439                     parm_table[i].p_class == P_LOCAL)
2440                         string_free((char **)
2441                                     (((char *)pservice) +
2442                                      PTR_DIFF(parm_table[i].ptr, &sDefault)));
2443                 else if (parm_table[i].type == P_LIST &&
2444                          parm_table[i].p_class == P_LOCAL)
2445                              str_list_free((char ***)
2446                                             (((char *)pservice) +
2447                                              PTR_DIFF(parm_table[i].ptr, &sDefault)));
2448         }
2449
2450         data = pservice->param_opt;
2451         if (data)
2452                 DEBUG(5,("Freeing parametrics:\n"));
2453         while (data) {
2454                 DEBUG(5,("[%s = %s]\n", data->key, data->value));
2455                 string_free(&data->key);
2456                 string_free(&data->value);
2457                 str_list_free(&data->list);
2458                 pdata = data->next;
2459                 SAFE_FREE(data);
2460                 data = pdata;
2461         }
2462
2463         ZERO_STRUCTP(pservice);
2464 }
2465
2466
2467 /***************************************************************************
2468  remove a service indexed in the ServicePtrs array from the ServiceHash
2469  and free the dynamically allocated parts
2470 ***************************************************************************/
2471
2472 static void free_service_byindex(int idx)
2473 {
2474         if ( !LP_SNUM_OK(idx) ) 
2475                 return;
2476
2477         ServicePtrs[idx]->valid = False;
2478         invalid_services[num_invalid_services++] = idx;
2479
2480         /* we have to cleanup the hash record */
2481
2482         if (ServicePtrs[idx]->szService) {
2483                 char *canon_name = canonicalize_servicename( ServicePtrs[idx]->szService );
2484                 
2485                 tdb_delete_bystring(ServiceHash, canon_name );
2486         }
2487
2488         free_service(ServicePtrs[idx]);
2489 }
2490
2491 /***************************************************************************
2492  Add a new service to the services array initialising it with the given 
2493  service. 
2494 ***************************************************************************/
2495
2496 static int add_a_service(const service *pservice, const char *name)
2497 {
2498         int i;
2499         service tservice;
2500         int num_to_alloc = iNumServices + 1;
2501         param_opt_struct *data, *pdata;
2502
2503         tservice = *pservice;
2504
2505         /* it might already exist */
2506         if (name) {
2507                 i = getservicebyname(name, NULL);
2508                 if (i >= 0) {
2509                         /* Clean all parametric options for service */
2510                         /* They will be added during parsing again */
2511                         data = ServicePtrs[i]->param_opt;
2512                         while (data) {
2513                                 string_free(&data->key);
2514                                 string_free(&data->value);
2515                                 str_list_free(&data->list);
2516                                 pdata = data->next;
2517                                 SAFE_FREE(data);
2518                                 data = pdata;
2519                         }
2520                         ServicePtrs[i]->param_opt = NULL;
2521                         return (i);
2522                 }
2523         }
2524
2525         /* find an invalid one */
2526         i = iNumServices;
2527         if (num_invalid_services > 0) {
2528                 i = invalid_services[--num_invalid_services];
2529         }
2530
2531         /* if not, then create one */
2532         if (i == iNumServices) {
2533                 service **tsp;
2534                 int *tinvalid;
2535                 
2536                 tsp = SMB_REALLOC_ARRAY_KEEP_OLD_ON_ERROR(ServicePtrs, service *, num_to_alloc);
2537                 if (tsp == NULL) {
2538                         DEBUG(0,("add_a_service: failed to enlarge ServicePtrs!\n"));
2539                         return (-1);
2540                 }
2541                 ServicePtrs = tsp;
2542                 ServicePtrs[iNumServices] = SMB_MALLOC_P(service);
2543                 if (!ServicePtrs[iNumServices]) {
2544                         DEBUG(0,("add_a_service: out of memory!\n"));
2545                         return (-1);
2546                 }
2547                 iNumServices++;
2548
2549                 /* enlarge invalid_services here for now... */
2550                 tinvalid = SMB_REALLOC_ARRAY_KEEP_OLD_ON_ERROR(invalid_services, int,
2551                                              num_to_alloc);
2552                 if (tinvalid == NULL) {
2553                         DEBUG(0,("add_a_service: failed to enlarge "
2554                                  "invalid_services!\n"));
2555                         return (-1);
2556                 }
2557                 invalid_services = tinvalid;
2558         } else {
2559                 free_service_byindex(i);
2560         }
2561
2562         ServicePtrs[i]->valid = True;
2563
2564         init_service(ServicePtrs[i]);
2565         copy_service(ServicePtrs[i], &tservice, NULL);
2566         if (name)
2567                 string_set(&ServicePtrs[i]->szService, name);
2568                 
2569         DEBUG(8,("add_a_service: Creating snum = %d for %s\n", 
2570                 i, ServicePtrs[i]->szService));
2571
2572         if (!hash_a_service(ServicePtrs[i]->szService, i)) {
2573                 return (-1);
2574         }
2575                 
2576         return (i);
2577 }
2578
2579 /***************************************************************************
2580   Convert a string to uppercase and remove whitespaces.
2581 ***************************************************************************/
2582
2583 static char *canonicalize_servicename(const char *src)
2584 {
2585         static fstring canon; /* is fstring large enough? */
2586
2587         if ( !src ) {
2588                 DEBUG(0,("canonicalize_servicename: NULL source name!\n"));
2589                 return NULL;
2590         }
2591
2592         fstrcpy( canon, src );
2593         strlower_m( canon );
2594
2595         return canon;
2596 }
2597
2598 /***************************************************************************
2599   Add a name/index pair for the services array to the hash table.
2600 ***************************************************************************/
2601
2602 static BOOL hash_a_service(const char *name, int idx)
2603 {
2604         char *canon_name;
2605
2606         if ( !ServiceHash ) {
2607                 DEBUG(10,("hash_a_service: creating tdb servicehash\n"));
2608                 ServiceHash = tdb_open("servicehash", 1031, TDB_INTERNAL, 
2609                                         (O_RDWR|O_CREAT), 0600);
2610                 if ( !ServiceHash ) {
2611                         DEBUG(0,("hash_a_service: open tdb servicehash failed!\n"));
2612                         return False;
2613                 }
2614         }
2615
2616         DEBUG(10,("hash_a_service: hashing index %d for service name %s\n",
2617                 idx, name));
2618
2619         if ( !(canon_name = canonicalize_servicename( name )) )
2620                 return False;
2621
2622         tdb_store_int32(ServiceHash, canon_name, idx);
2623
2624         return True;
2625 }
2626
2627 /***************************************************************************
2628  Add a new home service, with the specified home directory, defaults coming 
2629  from service ifrom.
2630 ***************************************************************************/
2631
2632 BOOL lp_add_home(const char *pszHomename, int iDefaultService, 
2633                  const char *user, const char *pszHomedir)
2634 {
2635         int i;
2636         pstring newHomedir;
2637
2638         i = add_a_service(ServicePtrs[iDefaultService], pszHomename);
2639
2640         if (i < 0)
2641                 return (False);
2642
2643         if (!(*(ServicePtrs[iDefaultService]->szPath))
2644             || strequal(ServicePtrs[iDefaultService]->szPath, lp_pathname(GLOBAL_SECTION_SNUM))) {
2645                 pstrcpy(newHomedir, pszHomedir);
2646                 string_set(&ServicePtrs[i]->szPath, newHomedir);
2647         } 
2648
2649         if (!(*(ServicePtrs[i]->comment))) {
2650                 pstring comment;
2651                 slprintf(comment, sizeof(comment) - 1,
2652                          "Home directory of %s", user);
2653                 string_set(&ServicePtrs[i]->comment, comment);
2654         }
2655
2656         /* set the browseable flag from the global default */
2657
2658         ServicePtrs[i]->bBrowseable = sDefault.bBrowseable;
2659
2660         ServicePtrs[i]->autoloaded = True;
2661
2662         DEBUG(3, ("adding home's share [%s] for user '%s' at '%s'\n", pszHomename, 
2663                user, ServicePtrs[i]->szPath ));
2664         
2665         return (True);
2666 }
2667
2668 /***************************************************************************
2669  Add a new service, based on an old one.
2670 ***************************************************************************/
2671
2672 int lp_add_service(const char *pszService, int iDefaultService)
2673 {
2674         if (iDefaultService < 0) {
2675                 return add_a_service(&sDefault, pszService);
2676         }
2677
2678         return (add_a_service(ServicePtrs[iDefaultService], pszService));
2679 }
2680
2681 /***************************************************************************
2682  Add the IPC service.
2683 ***************************************************************************/
2684
2685 static BOOL lp_add_ipc(const char *ipc_name, BOOL guest_ok)
2686 {
2687         pstring comment;
2688         int i = add_a_service(&sDefault, ipc_name);
2689
2690         if (i < 0)
2691                 return (False);
2692
2693         slprintf(comment, sizeof(comment) - 1,
2694                  "IPC Service (%s)", Globals.szServerString);
2695
2696         string_set(&ServicePtrs[i]->szPath, tmpdir());
2697         string_set(&ServicePtrs[i]->szUsername, "");
2698         string_set(&ServicePtrs[i]->comment, comment);
2699         string_set(&ServicePtrs[i]->fstype, "IPC");
2700         ServicePtrs[i]->iMaxConnections = 0;
2701         ServicePtrs[i]->bAvailable = True;
2702         ServicePtrs[i]->bRead_only = True;
2703         ServicePtrs[i]->bGuest_only = False;
2704         ServicePtrs[i]->bGuest_ok = guest_ok;
2705         ServicePtrs[i]->bPrint_ok = False;
2706         ServicePtrs[i]->bBrowseable = sDefault.bBrowseable;
2707
2708         DEBUG(3, ("adding IPC service\n"));
2709
2710         return (True);
2711 }
2712
2713 /***************************************************************************
2714  Add a new printer service, with defaults coming from service iFrom.
2715 ***************************************************************************/
2716
2717 BOOL lp_add_printer(const char *pszPrintername, int iDefaultService)
2718 {
2719         const char *comment = "From Printcap";
2720         int i = add_a_service(ServicePtrs[iDefaultService], pszPrintername);
2721
2722         if (i < 0)
2723                 return (False);
2724
2725         /* note that we do NOT default the availability flag to True - */
2726         /* we take it from the default service passed. This allows all */
2727         /* dynamic printers to be disabled by disabling the [printers] */
2728         /* entry (if/when the 'available' keyword is implemented!).    */
2729
2730         /* the printer name is set to the service name. */
2731         string_set(&ServicePtrs[i]->szPrintername, pszPrintername);
2732         string_set(&ServicePtrs[i]->comment, comment);
2733
2734         /* set the browseable flag from the gloabl default */
2735         ServicePtrs[i]->bBrowseable = sDefault.bBrowseable;
2736
2737         /* Printers cannot be read_only. */
2738         ServicePtrs[i]->bRead_only = False;
2739         /* No share modes on printer services. */
2740         ServicePtrs[i]->bShareModes = False;
2741         /* No oplocks on printer services. */
2742         ServicePtrs[i]->bOpLocks = False;
2743         /* Printer services must be printable. */
2744         ServicePtrs[i]->bPrint_ok = True;
2745         
2746         DEBUG(3, ("adding printer service %s\n", pszPrintername));
2747
2748         return (True);
2749 }
2750
2751 /***************************************************************************
2752  Map a parameter's string representation to something we can use. 
2753  Returns False if the parameter string is not recognised, else TRUE.
2754 ***************************************************************************/
2755
2756 static int map_parameter(const char *pszParmName)
2757 {
2758         int iIndex;
2759
2760         if (*pszParmName == '-')
2761                 return (-1);
2762
2763         for (iIndex = 0; parm_table[iIndex].label; iIndex++)
2764                 if (strwicmp(parm_table[iIndex].label, pszParmName) == 0)
2765                         return (iIndex);
2766
2767         /* Warn only if it isn't parametric option */
2768         if (strchr(pszParmName, ':') == NULL)
2769                 DEBUG(0, ("Unknown parameter encountered: \"%s\"\n", pszParmName));
2770         /* We do return 'fail' for parametric options as well because they are
2771            stored in different storage
2772          */
2773         return (-1);
2774 }
2775
2776 /***************************************************************************
2777  Show all parameter's name, type, [values,] and flags.
2778 ***************************************************************************/
2779
2780 void show_parameter_list(void)
2781 {
2782         int classIndex, parmIndex, enumIndex, flagIndex;
2783         BOOL hadFlag;
2784         const char *section_names[] = { "local", "global", NULL};
2785         const char *type[] = { "P_BOOL", "P_BOOLREV", "P_CHAR", "P_INTEGER",
2786                 "P_OCTAL", "P_LIST", "P_STRING", "P_USTRING", "P_GSTRING",
2787                 "P_UGSTRING", "P_ENUM", "P_SEP"};
2788         unsigned flags[] = { FLAG_BASIC, FLAG_SHARE, FLAG_PRINT, FLAG_GLOBAL,
2789                 FLAG_WIZARD, FLAG_ADVANCED, FLAG_DEVELOPER, FLAG_DEPRECATED,
2790                 FLAG_HIDE, FLAG_DOS_STRING};
2791         const char *flag_names[] = { "FLAG_BASIC", "FLAG_SHARE", "FLAG_PRINT",
2792                 "FLAG_GLOBAL", "FLAG_WIZARD", "FLAG_ADVANCED", "FLAG_DEVELOPER",
2793                 "FLAG_DEPRECATED", "FLAG_HIDE", "FLAG_DOS_STRING", NULL};
2794
2795         for ( classIndex=0; section_names[classIndex]; classIndex++) {
2796                 printf("[%s]\n", section_names[classIndex]);
2797                 for (parmIndex = 0; parm_table[parmIndex].label; parmIndex++) {
2798                         if (parm_table[parmIndex].p_class == classIndex) {
2799                                 printf("%s=%s", 
2800                                         parm_table[parmIndex].label,
2801                                         type[parm_table[parmIndex].type]);
2802                                 switch (parm_table[parmIndex].type) {
2803                                 case P_ENUM:
2804                                         printf(",");
2805                                         for (enumIndex=0; parm_table[parmIndex].enum_list[enumIndex].name; enumIndex++)
2806                                                 printf("%s%s",
2807                                                         enumIndex ? "|" : "",
2808                                                         parm_table[parmIndex].enum_list[enumIndex].name);
2809                                         break;
2810                                 default:
2811                                         break;
2812                                 }
2813                                 printf(",");
2814                                 hadFlag = False;
2815                                 for ( flagIndex=0; flag_names[flagIndex]; flagIndex++ ) {
2816                                         if (parm_table[parmIndex].flags & flags[flagIndex]) {
2817                                                 printf("%s%s",
2818                                                         hadFlag ? "|" : "",
2819                                                         flag_names[flagIndex]);
2820                                                 hadFlag = True;
2821                                         }
2822                                 }
2823                                 printf("\n");
2824                         }
2825                 }
2826         }
2827 }
2828
2829 /***************************************************************************
2830  Set a boolean variable from the text value stored in the passed string.
2831  Returns True in success, False if the passed string does not correctly 
2832  represent a boolean.
2833 ***************************************************************************/
2834
2835 static BOOL set_boolean(BOOL *pb, const char *pszParmValue)
2836 {
2837         BOOL bRetval;
2838
2839         bRetval = True;
2840         if (strwicmp(pszParmValue, "yes") == 0 ||
2841             strwicmp(pszParmValue, "true") == 0 ||
2842             strwicmp(pszParmValue, "1") == 0)
2843                 *pb = True;
2844         else if (strwicmp(pszParmValue, "no") == 0 ||
2845                     strwicmp(pszParmValue, "False") == 0 ||
2846                     strwicmp(pszParmValue, "0") == 0)
2847                 *pb = False;
2848         else {
2849                 DEBUG(0,
2850                       ("ERROR: Badly formed boolean in configuration file: \"%s\".\n",
2851                        pszParmValue));
2852                 bRetval = False;
2853         }
2854         return (bRetval);
2855 }
2856
2857 /***************************************************************************
2858 Find a service by name. Otherwise works like get_service.
2859 ***************************************************************************/
2860
2861 static int getservicebyname(const char *pszServiceName, service * pserviceDest)
2862 {
2863         int iService = -1;
2864         char *canon_name;
2865
2866         if (ServiceHash != NULL) {
2867                 if ( !(canon_name = canonicalize_servicename( pszServiceName )) )
2868                         return -1;
2869
2870                 iService = tdb_fetch_int32(ServiceHash, canon_name );
2871
2872                 if (LP_SNUM_OK(iService)) {
2873                         if (pserviceDest != NULL) {
2874                                 copy_service(pserviceDest, ServicePtrs[iService], NULL);
2875                         }
2876                 } else {
2877                         iService = -1;
2878                 }
2879         }
2880
2881         return (iService);
2882 }
2883
2884 /***************************************************************************
2885  Copy a service structure to another.
2886  If pcopymapDest is NULL then copy all fields
2887 ***************************************************************************/
2888
2889 static void copy_service(service * pserviceDest, service * pserviceSource, BOOL *pcopymapDest)
2890 {
2891         int i;
2892         BOOL bcopyall = (pcopymapDest == NULL);
2893         param_opt_struct *data, *pdata, *paramo;
2894         BOOL not_added;
2895
2896         for (i = 0; parm_table[i].label; i++)
2897                 if (parm_table[i].ptr && parm_table[i].p_class == P_LOCAL &&
2898                     (bcopyall || pcopymapDest[i])) {
2899                         void *def_ptr = parm_table[i].ptr;
2900                         void *src_ptr =
2901                                 ((char *)pserviceSource) + PTR_DIFF(def_ptr,
2902                                                                     &sDefault);
2903                         void *dest_ptr =
2904                                 ((char *)pserviceDest) + PTR_DIFF(def_ptr,
2905                                                                   &sDefault);
2906
2907                         switch (parm_table[i].type) {
2908                                 case P_BOOL:
2909                                 case P_BOOLREV:
2910                                         *(BOOL *)dest_ptr = *(BOOL *)src_ptr;
2911                                         break;
2912
2913                                 case P_INTEGER:
2914                                 case P_ENUM:
2915                                 case P_OCTAL:
2916                                         *(int *)dest_ptr = *(int *)src_ptr;
2917                                         break;
2918
2919                                 case P_CHAR:
2920                                         *(char *)dest_ptr = *(char *)src_ptr;
2921                                         break;
2922
2923                                 case P_STRING:
2924                                         string_set((char **)dest_ptr,
2925                                                    *(char **)src_ptr);
2926                                         break;
2927
2928                                 case P_USTRING:
2929                                         string_set((char **)dest_ptr,
2930                                                    *(char **)src_ptr);
2931                                         strupper_m(*(char **)dest_ptr);
2932                                         break;
2933                                 case P_LIST:
2934                                         str_list_free((char ***)dest_ptr);
2935                                         str_list_copy((char ***)dest_ptr, *(const char ***)src_ptr);
2936                                         break;
2937                                 default:
2938                                         break;
2939                         }
2940                 }
2941
2942         if (bcopyall) {
2943                 init_copymap(pserviceDest);
2944                 if (pserviceSource->copymap)
2945                         memcpy((void *)pserviceDest->copymap,
2946                                (void *)pserviceSource->copymap,
2947                                sizeof(BOOL) * NUMPARAMETERS);
2948         }
2949         
2950         data = pserviceSource->param_opt;
2951         while (data) {
2952                 not_added = True;
2953                 pdata = pserviceDest->param_opt;
2954                 /* Traverse destination */
2955                 while (pdata) {
2956                         /* If we already have same option, override it */
2957                         if (strcmp(pdata->key, data->key) == 0) {
2958                                 string_free(&pdata->value);
2959                                 str_list_free(&data->list);
2960                                 pdata->value = SMB_STRDUP(data->value);
2961                                 not_added = False;
2962                                 break;
2963                         }
2964                         pdata = pdata->next;
2965                 }
2966                 if (not_added) {
2967                     paramo = SMB_XMALLOC_P(param_opt_struct);
2968                     paramo->key = SMB_STRDUP(data->key);
2969                     paramo->value = SMB_STRDUP(data->value);
2970                     paramo->list = NULL;
2971                     DLIST_ADD(pserviceDest->param_opt, paramo);
2972                 }
2973                 data = data->next;
2974         }
2975 }
2976
2977 /***************************************************************************
2978 Check a service for consistency. Return False if the service is in any way
2979 incomplete or faulty, else True.
2980 ***************************************************************************/
2981
2982 BOOL service_ok(int iService)
2983 {
2984         BOOL bRetval;
2985
2986         bRetval = True;
2987         if (ServicePtrs[iService]->szService[0] == '\0') {
2988                 DEBUG(0, ("The following message indicates an internal error:\n"));
2989                 DEBUG(0, ("No service name in service entry.\n"));
2990                 bRetval = False;
2991         }
2992
2993         /* The [printers] entry MUST be printable. I'm all for flexibility, but */
2994         /* I can't see why you'd want a non-printable printer service...        */
2995         if (strwicmp(ServicePtrs[iService]->szService, PRINTERS_NAME) == 0) {
2996                 if (!ServicePtrs[iService]->bPrint_ok) {
2997                         DEBUG(0, ("WARNING: [%s] service MUST be printable!\n",
2998                                ServicePtrs[iService]->szService));
2999                         ServicePtrs[iService]->bPrint_ok = True;
3000                 }
3001                 /* [printers] service must also be non-browsable. */
3002                 if (ServicePtrs[iService]->bBrowseable)
3003                         ServicePtrs[iService]->bBrowseable = False;
3004         }
3005
3006         if (ServicePtrs[iService]->szPath[0] == '\0' &&
3007             strwicmp(ServicePtrs[iService]->szService, HOMES_NAME) != 0 &&
3008             ServicePtrs[iService]->szMSDfsProxy[0] == '\0'
3009             ) {
3010                 DEBUG(0, ("WARNING: No path in service %s - making it unavailable!\n",
3011                         ServicePtrs[iService]->szService));
3012                 ServicePtrs[iService]->bAvailable = False;
3013         }
3014
3015         /* If a service is flagged unavailable, log the fact at level 1. */
3016         if (!ServicePtrs[iService]->bAvailable)
3017                 DEBUG(1, ("NOTE: Service %s is flagged unavailable.\n",
3018                           ServicePtrs[iService]->szService));
3019
3020         return (bRetval);
3021 }
3022
3023 static struct file_lists {
3024         struct file_lists *next;
3025         char *name;
3026         char *subfname;
3027         time_t modtime;
3028 } *file_lists = NULL;
3029
3030 /*******************************************************************
3031  Keep a linked list of all config files so we know when one has changed 
3032  it's date and needs to be reloaded.
3033 ********************************************************************/
3034
3035 static void add_to_file_list(const char *fname, const char *subfname)
3036 {
3037         struct file_lists *f = file_lists;
3038
3039         while (f) {
3040                 if (f->name && !strcmp(f->name, fname))
3041                         break;
3042                 f = f->next;
3043         }
3044
3045         if (!f) {
3046                 f = SMB_MALLOC_P(struct file_lists);
3047                 if (!f)
3048                         return;
3049                 f->next = file_lists;
3050                 f->name = SMB_STRDUP(fname);
3051                 if (!f->name) {
3052                         SAFE_FREE(f);
3053                         return;
3054                 }
3055                 f->subfname = SMB_STRDUP(subfname);
3056                 if (!f->subfname) {
3057                         SAFE_FREE(f);
3058                         return;
3059                 }
3060                 file_lists = f;
3061                 f->modtime = file_modtime(subfname);
3062         } else {
3063                 time_t t = file_modtime(subfname);
3064                 if (t)
3065                         f->modtime = t;
3066         }
3067 }
3068
3069 /*******************************************************************
3070  Check if a config file has changed date.
3071 ********************************************************************/
3072
3073 BOOL lp_file_list_changed(void)
3074 {
3075         struct file_lists *f = file_lists;
3076
3077         DEBUG(6, ("lp_file_list_changed()\n"));
3078
3079         while (f) {
3080                 pstring n2;
3081                 time_t mod_time;
3082
3083                 pstrcpy(n2, f->name);
3084                 standard_sub_basic( get_current_username(),
3085                                     current_user_info.domain,
3086                                     n2, sizeof(n2) );
3087
3088                 DEBUGADD(6, ("file %s -> %s  last mod_time: %s\n",
3089                              f->name, n2, ctime(&f->modtime)));
3090
3091                 mod_time = file_modtime(n2);
3092
3093                 if (mod_time && ((f->modtime != mod_time) || (f->subfname == NULL) || (strcmp(n2, f->subfname) != 0))) {
3094                         DEBUGADD(6,
3095                                  ("file %s modified: %s\n", n2,
3096                                   ctime(&mod_time)));
3097                         f->modtime = mod_time;
3098                         SAFE_FREE(f->subfname);
3099                         f->subfname = SMB_STRDUP(n2);
3100                         return (True);
3101                 }
3102                 f = f->next;
3103         }
3104         return (False);
3105 }
3106
3107 /***************************************************************************
3108  Run standard_sub_basic on netbios name... needed because global_myname
3109  is not accessed through any lp_ macro.
3110  Note: We must *NOT* use string_set() here as ptr points to global_myname.
3111 ***************************************************************************/
3112
3113 static BOOL handle_netbios_name(int snum, const char *pszParmValue, char **ptr)
3114 {
3115         BOOL ret;
3116         pstring netbios_name;
3117
3118         pstrcpy(netbios_name, pszParmValue);
3119
3120         standard_sub_basic(get_current_username(), current_user_info.domain,
3121                            netbios_name, sizeof(netbios_name));
3122
3123         ret = set_global_myname(netbios_name);
3124         string_set(&Globals.szNetbiosName,global_myname());
3125         
3126         DEBUG(4, ("handle_netbios_name: set global_myname to: %s\n",
3127                global_myname()));
3128
3129         return ret;
3130 }
3131
3132 static BOOL handle_charset(int snum, const char *pszParmValue, char **ptr)
3133 {
3134         if (strcmp(*ptr, pszParmValue) != 0) {
3135                 string_set(ptr, pszParmValue);
3136                 init_iconv();
3137         }
3138         return True;
3139 }
3140
3141
3142
3143 static BOOL handle_workgroup(int snum, const char *pszParmValue, char **ptr)
3144 {
3145         BOOL ret;
3146         
3147         ret = set_global_myworkgroup(pszParmValue);
3148         string_set(&Globals.szWorkgroup,lp_workgroup());
3149         
3150         return ret;
3151 }
3152
3153 static BOOL handle_netbios_scope(int snum, const char *pszParmValue, char **ptr)
3154 {
3155         BOOL ret;
3156         
3157         ret = set_global_scope(pszParmValue);
3158         string_set(&Globals.szNetbiosScope,global_scope());
3159
3160         return ret;
3161 }
3162
3163 static BOOL handle_netbios_aliases(int snum, const char *pszParmValue, char **ptr)
3164 {
3165         str_list_free(&Globals.szNetbiosAliases);
3166         Globals.szNetbiosAliases = str_list_make(pszParmValue, NULL);
3167         return set_netbios_aliases((const char **)Globals.szNetbiosAliases);
3168 }
3169
3170 /***************************************************************************
3171  Handle the include operation.
3172 ***************************************************************************/
3173
3174 static BOOL handle_include(int snum, const char *pszParmValue, char **ptr)
3175 {
3176         pstring fname;
3177         pstrcpy(fname, pszParmValue);
3178
3179         standard_sub_basic(get_current_username(), current_user_info.domain,
3180                            fname,sizeof(fname));
3181
3182         add_to_file_list(pszParmValue, fname);
3183
3184         string_set(ptr, fname);
3185
3186         if (file_exist(fname, NULL))
3187                 return (pm_process(fname, do_section, do_parameter));
3188
3189         DEBUG(2, ("Can't find include file %s\n", fname));
3190
3191         return (False);
3192 }
3193
3194 /***************************************************************************
3195  Handle the interpretation of the copy parameter.
3196 ***************************************************************************/
3197
3198 static BOOL handle_copy(int snum, const char *pszParmValue, char **ptr)
3199 {
3200         BOOL bRetval;
3201         int iTemp;
3202         service serviceTemp;
3203
3204         string_set(ptr, pszParmValue);
3205
3206         init_service(&serviceTemp);
3207
3208         bRetval = False;
3209
3210         DEBUG(3, ("Copying service from service %s\n", pszParmValue));
3211
3212         if ((iTemp = getservicebyname(pszParmValue, &serviceTemp)) >= 0) {
3213                 if (iTemp == iServiceIndex) {
3214                         DEBUG(0, ("Can't copy service %s - unable to copy self!\n", pszParmValue));
3215                 } else {
3216                         copy_service(ServicePtrs[iServiceIndex],
3217                                      &serviceTemp,
3218                                      ServicePtrs[iServiceIndex]->copymap);
3219                         bRetval = True;
3220                 }
3221         } else {
3222                 DEBUG(0, ("Unable to copy service - source not found: %s\n", pszParmValue));
3223                 bRetval = False;
3224         }
3225
3226         free_service(&serviceTemp);
3227         return (bRetval);
3228 }
3229
3230 /***************************************************************************
3231  Handle idmap/non unix account uid and gid allocation parameters.  The format of these
3232  parameters is:
3233
3234  [global]
3235
3236         idmap uid = 1000-1999
3237         idmap gid = 700-899
3238
3239  We only do simple parsing checks here.  The strings are parsed into useful
3240  structures in the idmap daemon code.
3241
3242 ***************************************************************************/
3243
3244 /* Some lp_ routines to return idmap [ug]id information */
3245
3246 static uid_t idmap_uid_low, idmap_uid_high;
3247 static gid_t idmap_gid_low, idmap_gid_high;
3248
3249 BOOL lp_idmap_uid(uid_t *low, uid_t *high)
3250 {
3251         if (idmap_uid_low == 0 || idmap_uid_high == 0)
3252                 return False;
3253
3254         if (low)
3255                 *low = idmap_uid_low;
3256
3257         if (high)
3258                 *high = idmap_uid_high;
3259
3260         return True;
3261 }
3262
3263 BOOL lp_idmap_gid(gid_t *low, gid_t *high)
3264 {
3265         if (idmap_gid_low == 0 || idmap_gid_high == 0)
3266                 return False;
3267
3268         if (low)
3269                 *low = idmap_gid_low;
3270
3271         if (high)
3272                 *high = idmap_gid_high;
3273
3274         return True;
3275 }
3276
3277 /* Do some simple checks on "idmap [ug]id" parameter values */
3278
3279 static BOOL handle_idmap_uid(int snum, const char *pszParmValue, char **ptr)
3280 {
3281         uint32 low, high;
3282
3283         if (sscanf(pszParmValue, "%u - %u", &low, &high) != 2 || high < low)
3284                 return False;
3285
3286         /* Parse OK */
3287
3288         string_set(ptr, pszParmValue);
3289
3290         idmap_uid_low = low;
3291         idmap_uid_high = high;
3292
3293         return True;
3294 }
3295
3296 static BOOL handle_idmap_gid(int snum, const char *pszParmValue, char **ptr)
3297 {
3298         uint32 low, high;
3299
3300         if (sscanf(pszParmValue, "%u - %u", &low, &high) != 2 || high < low)
3301                 return False;
3302
3303         /* Parse OK */
3304
3305         string_set(ptr, pszParmValue);
3306
3307         idmap_gid_low = low;
3308         idmap_gid_high = high;
3309
3310         return True;
3311 }
3312
3313 /***************************************************************************
3314  Handle the DEBUG level list.
3315 ***************************************************************************/
3316
3317 static BOOL handle_debug_list( int snum, const char *pszParmValueIn, char **ptr )
3318 {
3319         pstring pszParmValue;
3320
3321         pstrcpy(pszParmValue, pszParmValueIn);
3322         string_set(ptr, pszParmValueIn);
3323         return debug_parse_levels( pszParmValue );
3324 }
3325
3326 /***************************************************************************
3327  Handle ldap suffixes - default to ldapsuffix if sub-suffixes are not defined.
3328 ***************************************************************************/
3329
3330 static const char *append_ldap_suffix( const char *str )
3331 {
3332         const char *suffix_string;
3333
3334
3335         if (!lp_talloc)
3336                 lp_talloc = talloc_init("lp_talloc");
3337
3338         suffix_string = talloc_asprintf( lp_talloc, "%s,%s", str, Globals.szLdapSuffix );
3339         if ( !suffix_string ) {
3340                 DEBUG(0,("append_ldap_suffix: talloc_asprintf() failed!\n"));
3341                 return "";
3342         }
3343
3344         return suffix_string;
3345 }
3346
3347 const char *lp_ldap_machine_suffix(void)
3348 {
3349         if (Globals.szLdapMachineSuffix[0])
3350                 return append_ldap_suffix(Globals.szLdapMachineSuffix);
3351
3352         return lp_string(Globals.szLdapSuffix);
3353 }
3354
3355 const char *lp_ldap_user_suffix(void)
3356 {
3357         if (Globals.szLdapUserSuffix[0])
3358                 return append_ldap_suffix(Globals.szLdapUserSuffix);
3359
3360         return lp_string(Globals.szLdapSuffix);
3361 }
3362
3363 const char *lp_ldap_group_suffix(void)
3364 {
3365         if (Globals.szLdapGroupSuffix[0])
3366                 return append_ldap_suffix(Globals.szLdapGroupSuffix);
3367
3368         return lp_string(Globals.szLdapSuffix);
3369 }
3370
3371 const char *lp_ldap_idmap_suffix(void)
3372 {
3373         if (Globals.szLdapIdmapSuffix[0])
3374                 return append_ldap_suffix(Globals.szLdapIdmapSuffix);
3375
3376         return lp_string(Globals.szLdapSuffix);
3377 }
3378
3379 /****************************************************************************
3380  set the value for a P_ENUM
3381  ***************************************************************************/
3382
3383 static void lp_set_enum_parm( struct parm_struct *parm, const char *pszParmValue,
3384                               int *ptr )
3385 {
3386         int i;
3387
3388         for (i = 0; parm->enum_list[i].name; i++) {
3389                 if ( strequal(pszParmValue, parm->enum_list[i].name)) {
3390                         *ptr = parm->enum_list[i].value;
3391                         break;
3392                 }
3393         }
3394 }
3395
3396 /***************************************************************************
3397 ***************************************************************************/
3398
3399 static BOOL handle_printing(int snum, const char *pszParmValue, char **ptr)
3400 {
3401         static int parm_num = -1;
3402         service *s;
3403
3404         if ( parm_num == -1 )
3405                 parm_num = map_parameter( "printing" );
3406
3407         lp_set_enum_parm( &parm_table[parm_num], pszParmValue, (int*)ptr );
3408
3409         if ( snum < 0 )
3410                 s = &sDefault;
3411         else
3412                 s = ServicePtrs[snum];
3413
3414         init_printer_values( s );
3415
3416         return True;
3417 }
3418
3419
3420 /***************************************************************************
3421  Initialise a copymap.
3422 ***************************************************************************/
3423
3424 static void init_copymap(service * pservice)
3425 {
3426         int i;
3427         SAFE_FREE(pservice->copymap);
3428         pservice->copymap = SMB_MALLOC_ARRAY(BOOL,NUMPARAMETERS);
3429         if (!pservice->copymap)
3430                 DEBUG(0,
3431                       ("Couldn't allocate copymap!! (size %d)\n",
3432                        (int)NUMPARAMETERS));
3433         else
3434                 for (i = 0; i < NUMPARAMETERS; i++)
3435                         pservice->copymap[i] = True;
3436 }
3437
3438 /***************************************************************************
3439  Return the local pointer to a parameter given the service number and the 
3440  pointer into the default structure.
3441 ***************************************************************************/
3442
3443 void *lp_local_ptr(int snum, void *ptr)
3444 {
3445         return (void *)(((char *)ServicePtrs[snum]) + PTR_DIFF(ptr, &sDefault));
3446 }
3447
3448 /***************************************************************************
3449  Process a parameter for a particular service number. If snum < 0
3450  then assume we are in the globals.
3451 ***************************************************************************/
3452
3453 BOOL lp_do_parameter(int snum, const char *pszParmName, const char *pszParmValue)
3454 {
3455         int parmnum, i, slen;
3456         void *parm_ptr = NULL;  /* where we are going to store the result */
3457         void *def_ptr = NULL;
3458         pstring param_key;
3459         char *sep;
3460         param_opt_struct *paramo, *data;
3461         BOOL not_added;
3462
3463         parmnum = map_parameter(pszParmName);
3464
3465         if (parmnum < 0) {
3466                 if ((sep=strchr(pszParmName, ':')) != NULL) {
3467                         *sep = '\0';
3468                         ZERO_STRUCT(param_key);
3469                         pstr_sprintf(param_key, "%s:", pszParmName);
3470                         slen = strlen(param_key);
3471                         pstrcat(param_key, sep+1);
3472                         trim_char(param_key+slen, ' ', ' ');
3473                         not_added = True;
3474                         data = (snum < 0) ? Globals.param_opt : 
3475                                 ServicePtrs[snum]->param_opt;
3476                         /* Traverse destination */
3477                         while (data) {
3478                                 /* If we already have same option, override it */
3479                                 if (strcmp(data->key, param_key) == 0) {
3480                                         string_free(&data->value);
3481                                         str_list_free(&data->list);
3482                                         data->value = SMB_STRDUP(pszParmValue);
3483                                         not_added = False;
3484                                         break;
3485                                 }
3486                                 data = data->next;
3487                         }
3488                         if (not_added) {
3489                                 paramo = SMB_XMALLOC_P(param_opt_struct);
3490                                 paramo->key = SMB_STRDUP(param_key);
3491                                 paramo->value = SMB_STRDUP(pszParmValue);
3492                                 paramo->list = NULL;
3493                                 if (snum < 0) {
3494                                         DLIST_ADD(Globals.param_opt, paramo);
3495                                 } else {
3496                                         DLIST_ADD(ServicePtrs[snum]->param_opt, paramo);
3497                                 }
3498                         }
3499
3500                         *sep = ':';
3501                         return (True);
3502                 }
3503                 DEBUG(0, ("Ignoring unknown parameter \"%s\"\n", pszParmName));
3504                 return (True);
3505         }
3506
3507         if (parm_table[parmnum].flags & FLAG_DEPRECATED) {
3508                 DEBUG(1, ("WARNING: The \"%s\" option is deprecated\n",
3509                           pszParmName));
3510         }
3511
3512         def_ptr = parm_table[parmnum].ptr;
3513
3514         /* we might point at a service, the default service or a global */
3515         if (snum < 0) {
3516                 parm_ptr = def_ptr;
3517         } else {
3518                 if (parm_table[parmnum].p_class == P_GLOBAL) {
3519                         DEBUG(0,
3520                               ("Global parameter %s found in service section!\n",
3521                                pszParmName));
3522                         return (True);
3523                 }
3524                 parm_ptr =
3525                         ((char *)ServicePtrs[snum]) + PTR_DIFF(def_ptr,
3526                                                             &sDefault);
3527
3528                 if (!ServicePtrs[snum]->copymap)
3529                         init_copymap(ServicePtrs[snum]);
3530
3531                 /* this handles the aliases - set the copymap for other entries with
3532                    the same data pointer */
3533                 for (i = 0; parm_table[i].label; i++)
3534                         if (parm_table[i].ptr == parm_table[parmnum].ptr)
3535                                 ServicePtrs[snum]->copymap[i] = False;
3536         }
3537
3538         /* if it is a special case then go ahead */
3539         if (parm_table[parmnum].special) {
3540                 parm_table[parmnum].special(snum, pszParmValue, (char **)parm_ptr);
3541                 return (True);
3542         }
3543
3544         /* now switch on the type of variable it is */
3545         switch (parm_table[parmnum].type)
3546         {
3547                 case P_BOOL:
3548                         *(BOOL *)parm_ptr = lp_bool(pszParmValue);
3549                         break;
3550
3551                 case P_BOOLREV:
3552                         *(BOOL *)parm_ptr = !lp_bool(pszParmValue);
3553                         break;
3554
3555                 case P_INTEGER:
3556                         *(int *)parm_ptr = lp_int(pszParmValue);
3557                         break;
3558
3559                 case P_CHAR:
3560                         *(char *)parm_ptr = *pszParmValue;
3561                         break;
3562
3563                 case P_OCTAL:
3564                         i = sscanf(pszParmValue, "%o", (int *)parm_ptr);
3565                         if ( i != 1 ) {
3566                             DEBUG ( 0, ("Invalid octal number %s\n", pszParmName ));
3567                         }
3568                         break;
3569
3570                 case P_LIST:
3571                         str_list_free((char ***)parm_ptr);
3572                         *(char ***)parm_ptr = str_list_make(pszParmValue, NULL);
3573                         break;
3574
3575                 case P_STRING:
3576                         string_set((char **)parm_ptr, pszParmValue);
3577                         break;
3578
3579                 case P_USTRING:
3580                         string_set((char **)parm_ptr, pszParmValue);
3581                         strupper_m(*(char **)parm_ptr);
3582                         break;
3583
3584                 case P_GSTRING:
3585                         pstrcpy((char *)parm_ptr, pszParmValue);
3586                         break;
3587
3588                 case P_UGSTRING:
3589                         pstrcpy((char *)parm_ptr, pszParmValue);
3590                         strupper_m((char *)parm_ptr);
3591                         break;
3592
3593                 case P_ENUM:
3594                         lp_set_enum_parm( &parm_table[parmnum], pszParmValue, (int*)parm_ptr );
3595                         break;
3596                 case P_SEP:
3597                         break;
3598         }
3599
3600         return (True);
3601 }
3602
3603 /***************************************************************************
3604  Process a parameter.
3605 ***************************************************************************/
3606
3607 static BOOL do_parameter(const char *pszParmName, const char *pszParmValue)
3608 {
3609         if (!bInGlobalSection && bGlobalOnly)
3610                 return (True);
3611
3612         DEBUGADD(4, ("doing parameter %s = %s\n", pszParmName, pszParmValue));
3613
3614         return (lp_do_parameter(bInGlobalSection ? -2 : iServiceIndex,
3615                                 pszParmName, pszParmValue));
3616 }
3617
3618 /***************************************************************************
3619  Print a parameter of the specified type.
3620 ***************************************************************************/
3621
3622 static void print_parameter(struct parm_struct *p, void *ptr, FILE * f)
3623 {
3624         int i;
3625         switch (p->type)
3626         {
3627                 case P_ENUM:
3628                         for (i = 0; p->enum_list[i].name; i++) {
3629                                 if (*(int *)ptr == p->enum_list[i].value) {
3630                                         fprintf(f, "%s",
3631                                                 p->enum_list[i].name);
3632                                         break;
3633                                 }
3634                         }
3635                         break;
3636
3637                 case P_BOOL:
3638                         fprintf(f, "%s", BOOLSTR(*(BOOL *)ptr));
3639                         break;
3640
3641                 case P_BOOLREV:
3642                         fprintf(f, "%s", BOOLSTR(!*(BOOL *)ptr));
3643                         break;
3644
3645                 case P_INTEGER:
3646                         fprintf(f, "%d", *(int *)ptr);
3647                         break;
3648
3649                 case P_CHAR:
3650                         fprintf(f, "%c", *(char *)ptr);
3651                         break;
3652
3653                 case P_OCTAL:
3654                         fprintf(f, "%s", octal_string(*(int *)ptr));
3655                         break;
3656
3657                 case P_LIST:
3658                         if ((char ***)ptr && *(char ***)ptr) {
3659                                 char **list = *(char ***)ptr;
3660                                 
3661                                 for (; *list; list++) {
3662                                         /* surround strings with whitespace in double quotes */
3663                                         if ( strchr_m( *list, ' ' ) )
3664                                                 fprintf(f, "\"%s\"%s", *list, ((*(list+1))?", ":""));
3665                                         else
3666                                                 fprintf(f, "%s%s", *list, ((*(list+1))?", ":""));
3667                                 }
3668                         }
3669                         break;
3670
3671                 case P_GSTRING:
3672                 case P_UGSTRING:
3673                         if ((char *)ptr) {
3674                                 fprintf(f, "%s", (char *)ptr);
3675                         }
3676                         break;
3677
3678                 case P_STRING:
3679                 case P_USTRING:
3680                         if (*(char **)ptr) {
3681                                 fprintf(f, "%s", *(char **)ptr);
3682                         }
3683                         break;
3684                 case P_SEP:
3685                         break;
3686         }
3687 }
3688
3689 /***************************************************************************
3690  Check if two parameters are equal.
3691 ***************************************************************************/
3692
3693 static BOOL equal_parameter(parm_type type, void *ptr1, void *ptr2)
3694 {
3695         switch (type) {
3696                 case P_BOOL:
3697                 case P_BOOLREV:
3698                         return (*((BOOL *)ptr1) == *((BOOL *)ptr2));
3699
3700                 case P_INTEGER:
3701                 case P_ENUM:
3702                 case P_OCTAL:
3703                         return (*((int *)ptr1) == *((int *)ptr2));
3704
3705                 case P_CHAR:
3706                         return (*((char *)ptr1) == *((char *)ptr2));
3707                 
3708                 case P_LIST:
3709                         return str_list_compare(*(char ***)ptr1, *(char ***)ptr2);
3710
3711                 case P_GSTRING:
3712                 case P_UGSTRING:
3713                 {
3714                         char *p1 = (char *)ptr1, *p2 = (char *)ptr2;
3715                         if (p1 && !*p1)
3716                                 p1 = NULL;
3717                         if (p2 && !*p2)
3718                                 p2 = NULL;
3719                         return (p1 == p2 || strequal(p1, p2));
3720                 }
3721                 case P_STRING:
3722                 case P_USTRING:
3723                 {
3724                         char *p1 = *(char **)ptr1, *p2 = *(char **)ptr2;
3725                         if (p1 && !*p1)
3726                                 p1 = NULL;
3727                         if (p2 && !*p2)
3728                                 p2 = NULL;
3729                         return (p1 == p2 || strequal(p1, p2));
3730                 }
3731                 case P_SEP:
3732                         break;
3733         }
3734         return (False);
3735 }
3736
3737 /***************************************************************************
3738  Initialize any local varients in the sDefault table.
3739 ***************************************************************************/
3740
3741 void init_locals(void)
3742 {
3743         /* None as yet. */
3744 }
3745
3746 /***************************************************************************
3747  Process a new section (service). At this stage all sections are services.
3748  Later we'll have special sections that permit server parameters to be set.
3749  Returns True on success, False on failure. 
3750 ***************************************************************************/
3751
3752 static BOOL do_section(const char *pszSectionName)
3753 {
3754         BOOL bRetval;
3755         BOOL isglobal = ((strwicmp(pszSectionName, GLOBAL_NAME) == 0) ||
3756                          (strwicmp(pszSectionName, GLOBAL_NAME2) == 0));
3757         bRetval = False;
3758
3759         /* if we were in a global section then do the local inits */
3760         if (bInGlobalSection && !isglobal)
3761                 init_locals();
3762
3763         /* if we've just struck a global section, note the fact. */
3764         bInGlobalSection = isglobal;
3765
3766         /* check for multiple global sections */
3767         if (bInGlobalSection) {
3768                 DEBUG(3, ("Processing section \"[%s]\"\n", pszSectionName));
3769                 return (True);
3770         }
3771
3772         if (!bInGlobalSection && bGlobalOnly)
3773                 return (True);
3774
3775         /* if we have a current service, tidy it up before moving on */
3776         bRetval = True;
3777
3778         if (iServiceIndex >= 0)
3779                 bRetval = service_ok(iServiceIndex);
3780
3781         /* if all is still well, move to the next record in the services array */
3782         if (bRetval) {
3783                 /* We put this here to avoid an odd message order if messages are */
3784                 /* issued by the post-processing of a previous section. */
3785                 DEBUG(2, ("Processing section \"[%s]\"\n", pszSectionName));
3786
3787                 if ((iServiceIndex = add_a_service(&sDefault, pszSectionName))
3788                     < 0) {
3789                         DEBUG(0, ("Failed to add a new service\n"));
3790                         return (False);
3791                 }
3792         }
3793
3794         return (bRetval);
3795 }
3796
3797
3798 /***************************************************************************
3799  Determine if a partcular base parameter is currentl set to the default value.
3800 ***************************************************************************/
3801
3802 static BOOL is_default(int i)
3803 {
3804         if (!defaults_saved)
3805                 return False;
3806         switch (parm_table[i].type) {
3807                 case P_LIST:
3808                         return str_list_compare (parm_table[i].def.lvalue, 
3809                                                 *(char ***)parm_table[i].ptr);
3810                 case P_STRING:
3811                 case P_USTRING:
3812                         return strequal(parm_table[i].def.svalue,
3813                                         *(char **)parm_table[i].ptr);
3814                 case P_GSTRING:
3815                 case P_UGSTRING:
3816                         return strequal(parm_table[i].def.svalue,
3817                                         (char *)parm_table[i].ptr);
3818                 case P_BOOL:
3819                 case P_BOOLREV:
3820                         return parm_table[i].def.bvalue ==
3821                                 *(BOOL *)parm_table[i].ptr;
3822                 case P_CHAR:
3823                         return parm_table[i].def.cvalue ==
3824                                 *(char *)parm_table[i].ptr;
3825                 case P_INTEGER:
3826                 case P_OCTAL:
3827                 case P_ENUM:
3828                         return parm_table[i].def.ivalue ==
3829                                 *(int *)parm_table[i].ptr;
3830                 case P_SEP:
3831                         break;
3832         }
3833         return False;
3834 }
3835
3836 /***************************************************************************
3837 Display the contents of the global structure.
3838 ***************************************************************************/
3839
3840 static void dump_globals(FILE *f)
3841 {
3842         int i;
3843         param_opt_struct *data;
3844         
3845         fprintf(f, "[global]\n");
3846
3847         for (i = 0; parm_table[i].label; i++)
3848                 if (parm_table[i].p_class == P_GLOBAL &&
3849                     parm_table[i].ptr &&
3850                     (i == 0 || (parm_table[i].ptr != parm_table[i - 1].ptr))) {
3851                         if (defaults_saved && is_default(i))
3852                                 continue;
3853                         fprintf(f, "\t%s = ", parm_table[i].label);
3854                         print_parameter(&parm_table[i], parm_table[i].ptr, f);
3855                         fprintf(f, "\n");
3856         }
3857         if (Globals.param_opt != NULL) {
3858                 data = Globals.param_opt;
3859                 while(data) {
3860                         fprintf(f, "\t%s = %s\n", data->key, data->value);
3861                         data = data->next;
3862                 }
3863         }
3864
3865 }
3866
3867 /***************************************************************************
3868  Return True if a local parameter is currently set to the global default.
3869 ***************************************************************************/
3870
3871 BOOL lp_is_default(int snum, struct parm_struct *parm)
3872 {
3873         int pdiff = PTR_DIFF(parm->ptr, &sDefault);
3874
3875         return equal_parameter(parm->type,
3876                                ((char *)ServicePtrs[snum]) + pdiff,
3877                                ((char *)&sDefault) + pdiff);
3878 }
3879
3880 /***************************************************************************
3881  Display the contents of a single services record.
3882 ***************************************************************************/
3883
3884 static void dump_a_service(service * pService, FILE * f)
3885 {
3886         int i;
3887         param_opt_struct *data;
3888         
3889         if (pService != &sDefault)
3890                 fprintf(f, "[%s]\n", pService->szService);
3891
3892         for (i = 0; parm_table[i].label; i++) {
3893
3894                 if (parm_table[i].p_class == P_LOCAL &&
3895                     parm_table[i].ptr &&
3896                     (*parm_table[i].label != '-') &&
3897                     (i == 0 || (parm_table[i].ptr != parm_table[i - 1].ptr))) 
3898                 {
3899                 
3900                         int pdiff = PTR_DIFF(parm_table[i].ptr, &sDefault);
3901
3902                         if (pService == &sDefault) {
3903                                 if (defaults_saved && is_default(i))
3904                                         continue;
3905                         } else {
3906                                 if (equal_parameter(parm_table[i].type,
3907                                                     ((char *)pService) +
3908                                                     pdiff,
3909                                                     ((char *)&sDefault) +
3910                                                     pdiff))
3911                                         continue;
3912                         }
3913
3914                         fprintf(f, "\t%s = ", parm_table[i].label);
3915                         print_parameter(&parm_table[i],
3916                                         ((char *)pService) + pdiff, f);
3917                         fprintf(f, "\n");
3918                 }
3919         }
3920
3921                 if (pService->param_opt != NULL) {
3922                         data = pService->param_opt;
3923                         while(data) {
3924                                 fprintf(f, "\t%s = %s\n", data->key, data->value);
3925                                 data = data->next;
3926                         }
3927                 }
3928 }
3929
3930 /***************************************************************************
3931  Display the contents of a parameter of a single services record.
3932 ***************************************************************************/
3933
3934 BOOL dump_a_parameter(int snum, char *parm_name, FILE * f, BOOL isGlobal)
3935 {
3936         int i;
3937         BOOL result = False;
3938         parm_class p_class;
3939         unsigned flag = 0;
3940         fstring local_parm_name;
3941         char *parm_opt;
3942         const char *parm_opt_value;
3943
3944         /* check for parametrical option */
3945         fstrcpy( local_parm_name, parm_name);
3946         parm_opt = strchr( local_parm_name, ':');
3947
3948         if (parm_opt) {
3949                 *parm_opt = '\0';
3950                 parm_opt++;
3951                 if (strlen(parm_opt)) {
3952                         parm_opt_value = lp_parm_const_string( snum,
3953                                 local_parm_name, parm_opt, NULL);
3954                         if (parm_opt_value) {
3955                                 printf( "%s\n", parm_opt_value);
3956                                 result = True;
3957                         }
3958                 }
3959                 return result;
3960         }
3961
3962         /* check for a key and print the value */
3963         if (isGlobal) {
3964                 p_class = P_GLOBAL;
3965                 flag = FLAG_GLOBAL;
3966         } else
3967                 p_class = P_LOCAL;
3968
3969         for (i = 0; parm_table[i].label; i++) {
3970                 if (strwicmp(parm_table[i].label, parm_name) == 0 &&
3971                     (parm_table[i].p_class == p_class || parm_table[i].flags & flag) &&
3972                     parm_table[i].ptr &&
3973                     (*parm_table[i].label != '-') &&
3974                     (i == 0 || (parm_table[i].ptr != parm_table[i - 1].ptr))) 
3975                 {
3976                         void *ptr;
3977
3978                         if (isGlobal) {
3979                                 ptr = parm_table[i].ptr;
3980                         } else {
3981                                 service * pService = ServicePtrs[snum];
3982                                 ptr = ((char *)pService) +
3983                                         PTR_DIFF(parm_table[i].ptr, &sDefault);
3984                         }
3985
3986                         print_parameter(&parm_table[i],
3987                                         ptr, f);
3988                         fprintf(f, "\n");
3989                         result = True;
3990                         break;
3991                 }
3992         }
3993
3994         return result;
3995 }
3996
3997 /***************************************************************************
3998  Return info about the next service  in a service. snum==GLOBAL_SECTION_SNUM gives the globals.
3999  Return NULL when out of parameters.
4000 ***************************************************************************/
4001
4002 struct parm_struct *lp_next_parameter(int snum, int *i, int allparameters)
4003 {
4004         if (snum < 0) {
4005                 /* do the globals */
4006                 for (; parm_table[*i].label; (*i)++) {
4007                         if (parm_table[*i].p_class == P_SEPARATOR)
4008                                 return &parm_table[(*i)++];
4009
4010                         if (!parm_table[*i].ptr
4011                             || (*parm_table[*i].label == '-'))
4012                                 continue;
4013
4014                         if ((*i) > 0
4015                             && (parm_table[*i].ptr ==
4016                                 parm_table[(*i) - 1].ptr))
4017                                 continue;
4018
4019                         return &parm_table[(*i)++];
4020                 }
4021         } else {
4022                 service *pService = ServicePtrs[snum];
4023
4024                 for (; parm_table[*i].label; (*i)++) {
4025                         if (parm_table[*i].p_class == P_SEPARATOR)
4026                                 return &parm_table[(*i)++];
4027
4028                         if (parm_table[*i].p_class == P_LOCAL &&
4029                             parm_table[*i].ptr &&
4030                             (*parm_table[*i].label != '-') &&
4031                             ((*i) == 0 ||
4032                              (parm_table[*i].ptr !=
4033                               parm_table[(*i) - 1].ptr)))
4034                         {
4035                                 int pdiff =
4036                                         PTR_DIFF(parm_table[*i].ptr,
4037                                                  &sDefault);
4038
4039                                 if (allparameters ||
4040                                     !equal_parameter(parm_table[*i].type,
4041                                                      ((char *)pService) +
4042                                                      pdiff,
4043                                                      ((char *)&sDefault) +
4044                                                      pdiff))
4045                                 {
4046                                         return &parm_table[(*i)++];
4047                                 }
4048                         }
4049                 }
4050         }
4051
4052         return NULL;
4053 }
4054
4055
4056 #if 0
4057 /***************************************************************************
4058  Display the contents of a single copy structure.
4059 ***************************************************************************/
4060 static void dump_copy_map(BOOL *pcopymap)
4061 {
4062         int i;
4063         if (!pcopymap)
4064                 return;
4065
4066         printf("\n\tNon-Copied parameters:\n");
4067
4068         for (i = 0; parm_table[i].label; i++)
4069                 if (parm_table[i].p_class == P_LOCAL &&
4070                     parm_table[i].ptr && !pcopymap[i] &&
4071                     (i == 0 || (parm_table[i].ptr != parm_table[i - 1].ptr)))
4072                 {
4073                         printf("\t\t%s\n", parm_table[i].label);
4074                 }
4075 }
4076 #endif
4077
4078 /***************************************************************************
4079  Return TRUE if the passed service number is within range.
4080 ***************************************************************************/
4081
4082 BOOL lp_snum_ok(int iService)
4083 {
4084         return (LP_SNUM_OK(iService) && ServicePtrs[iService]->bAvailable);
4085 }
4086
4087 /***************************************************************************
4088  Auto-load some home services.
4089 ***************************************************************************/
4090
4091 static void lp_add_auto_services(char *str)
4092 {
4093         char *s;
4094         char *p;
4095         int homes;
4096
4097         if (!str)
4098                 return;
4099
4100         s = SMB_STRDUP(str);
4101         if (!s)
4102                 return;
4103
4104         homes = lp_servicenumber(HOMES_NAME);
4105
4106         for (p = strtok(s, LIST_SEP); p; p = strtok(NULL, LIST_SEP)) {
4107                 char *home = get_user_home_dir(p);
4108
4109                 if (lp_servicenumber(p) >= 0)
4110                         continue;
4111
4112                 if (home && homes >= 0)
4113                         lp_add_home(p, homes, p, home);
4114         }
4115         SAFE_FREE(s);
4116 }
4117
4118 /***************************************************************************
4119  Auto-load one printer.
4120 ***************************************************************************/
4121
4122 void lp_add_one_printer(char *name, char *comment)
4123 {
4124         int printers = lp_servicenumber(PRINTERS_NAME);
4125         int i;
4126
4127         if (lp_servicenumber(name) < 0) {
4128                 lp_add_printer(name, printers);
4129                 if ((i = lp_servicenumber(name)) >= 0) {
4130                         string_set(&ServicePtrs[i]->comment, comment);
4131                         ServicePtrs[i]->autoloaded = True;
4132                 }
4133         }
4134 }
4135
4136 /***************************************************************************
4137  Have we loaded a services file yet?
4138 ***************************************************************************/
4139
4140 BOOL lp_loaded(void)
4141 {
4142         return (bLoaded);
4143 }
4144
4145 /***************************************************************************
4146  Unload unused services.
4147 ***************************************************************************/
4148
4149 void lp_killunused(BOOL (*snumused) (int))
4150 {
4151         int i;
4152         for (i = 0; i < iNumServices; i++) {
4153                 if (!VALID(i))
4154                         continue;
4155
4156                 /* don't kill autoloaded or usershare services */
4157                 if ( ServicePtrs[i]->autoloaded ||
4158                                 ServicePtrs[i]->usershare == USERSHARE_VALID) {
4159                         continue;
4160                 }
4161
4162                 if (!snumused || !snumused(i)) {
4163                         free_service_byindex(i);
4164                 }
4165         }
4166 }
4167
4168 /***************************************************************************
4169  Unload a service.
4170 ***************************************************************************/
4171
4172 void lp_killservice(int iServiceIn)
4173 {
4174         if (VALID(iServiceIn)) {
4175                 free_service_byindex(iServiceIn);
4176         }
4177 }
4178
4179 /***************************************************************************
4180  Save the curent values of all global and sDefault parameters into the 
4181  defaults union. This allows swat and testparm to show only the
4182  changed (ie. non-default) parameters.
4183 ***************************************************************************/
4184
4185 static void lp_save_defaults(void)
4186 {
4187         int i;
4188         for (i = 0; parm_table[i].label; i++) {
4189                 if (i > 0 && parm_table[i].ptr == parm_table[i - 1].ptr)
4190                         continue;
4191                 switch (parm_table[i].type) {
4192                         case P_LIST:
4193                                 str_list_copy(&(parm_table[i].def.lvalue),
4194                                             *(const char ***)parm_table[i].ptr);
4195                                 break;
4196                         case P_STRING:
4197                         case P_USTRING:
4198                                 if (parm_table[i].ptr) {
4199                                         parm_table[i].def.svalue = SMB_STRDUP(*(char **)parm_table[i].ptr);
4200                                 } else {
4201                                         parm_table[i].def.svalue = NULL;
4202                                 }
4203                                 break;
4204                         case P_GSTRING:
4205                         case P_UGSTRING:
4206                                 if (parm_table[i].ptr) {
4207                                         parm_table[i].def.svalue = SMB_STRDUP((char *)parm_table[i].ptr);
4208                                 } else {
4209                                         parm_table[i].def.svalue = NULL;
4210                                 }
4211                                 break;
4212                         case P_BOOL:
4213                         case P_BOOLREV:
4214                                 parm_table[i].def.bvalue =
4215                                         *(BOOL *)parm_table[i].ptr;
4216                                 break;
4217                         case P_CHAR:
4218                                 parm_table[i].def.cvalue =
4219                                         *(char *)parm_table[i].ptr;
4220                                 break;
4221                         case P_INTEGER:
4222                         case P_OCTAL:
4223                         case P_ENUM:
4224                                 parm_table[i].def.ivalue =
4225                                         *(int *)parm_table[i].ptr;
4226                                 break;
4227                         case P_SEP:
4228                                 break;
4229                 }
4230         }
4231         defaults_saved = True;
4232 }
4233
4234 /*******************************************************************
4235  Set the server type we will announce as via nmbd.
4236 ********************************************************************/
4237
4238 static const struct srv_role_tab {
4239         uint32 role;
4240         const char *role_str;
4241 } srv_role_tab [] = {
4242         { ROLE_STANDALONE, "ROLE_STANDALONE" },
4243         { ROLE_DOMAIN_MEMBER, "ROLE_DOMAIN_MEMBER" },
4244         { ROLE_DOMAIN_BDC, "ROLE_DOMAIN_BDC" },
4245         { ROLE_DOMAIN_PDC, "ROLE_DOMAIN_PDC" },
4246         { 0, NULL }
4247 };
4248
4249 const char* server_role_str(uint32 role)
4250 {
4251         int i = 0;
4252         for (i=0; srv_role_tab[i].role_str; i++) {
4253                 if (role == srv_role_tab[i].role) {
4254                         return srv_role_tab[i].role_str;
4255                 }
4256         }
4257         return NULL;
4258 }
4259
4260 static void set_server_role(void)
4261 {
4262         server_role = ROLE_STANDALONE;
4263
4264         switch (lp_security()) {
4265                 case SEC_SHARE:
4266                         if (lp_domain_logons())
4267                                 DEBUG(0, ("Server's Role (logon server) conflicts with share-level security\n"));
4268                         break;
4269                 case SEC_SERVER:
4270                         if (lp_domain_logons())
4271                                 DEBUG(0, ("Server's Role (logon server) conflicts with server-level security\n"));
4272                         /* this used to be considered ROLE_DOMAIN_MEMBER but that's just wrong */
4273                         server_role = ROLE_STANDALONE;
4274                         break;
4275                 case SEC_DOMAIN:
4276                         if (lp_domain_logons()) {
4277                                 DEBUG(1, ("Server's Role (logon server) NOT ADVISED with domain-level security\n"));
4278                                 server_role = ROLE_DOMAIN_BDC;
4279                                 break;
4280                         }
4281                         server_role = ROLE_DOMAIN_MEMBER;
4282                         break;
4283                 case SEC_ADS:
4284                         if (lp_domain_logons()) {
4285                                 server_role = ROLE_DOMAIN_PDC;
4286                                 break;
4287                         }
4288                         server_role = ROLE_DOMAIN_MEMBER;
4289                         break;
4290                 case SEC_USER:
4291                         if (lp_domain_logons()) {
4292
4293                                 if (Globals.bDomainMaster) /* auto or yes */ 
4294                                         server_role = ROLE_DOMAIN_PDC;
4295                                 else
4296                                         server_role = ROLE_DOMAIN_BDC;
4297                         }
4298                         break;
4299                 default:
4300                         DEBUG(0, ("Server's Role undefined due to unknown security mode\n"));
4301                         break;
4302         }
4303
4304         DEBUG(10, ("set_server_role: role = %s\n", server_role_str(server_role)));
4305 }
4306
4307 /***********************************************************
4308  If we should send plaintext/LANMAN passwords in the clinet
4309 ************************************************************/
4310
4311 static void set_allowed_client_auth(void)
4312 {
4313         if (Globals.bClientNTLMv2Auth) {
4314                 Globals.bClientLanManAuth = False;
4315         }
4316         if (!Globals.bClientLanManAuth) {
4317                 Globals.bClientPlaintextAuth = False;
4318         }
4319 }
4320
4321 /***************************************************************************
4322  JRA.
4323  The following code allows smbd to read a user defined share file.
4324  Yes, this is my intent. Yes, I'm comfortable with that...
4325
4326  THE FOLLOWING IS SECURITY CRITICAL CODE.
4327
4328  It washes your clothes, it cleans your house, it guards you while you sleep...
4329  Do not f%^k with it....
4330 ***************************************************************************/
4331
4332 #define MAX_USERSHARE_FILE_SIZE (10*1024)
4333
4334 /***************************************************************************
4335  Check allowed stat state of a usershare file.
4336  Ensure we print out who is dicking with us so the admin can
4337  get their sorry ass fired.
4338 ***************************************************************************/
4339
4340 static BOOL check_usershare_stat(const char *fname, SMB_STRUCT_STAT *psbuf)
4341 {
4342         if (!S_ISREG(psbuf->st_mode)) {
4343                 DEBUG(0,("check_usershare_stat: file %s owned by uid %u is "
4344                         "not a regular file\n",
4345                         fname, (unsigned int)psbuf->st_uid ));
4346                 return False;
4347         }
4348
4349         /* Ensure this doesn't have the other write bit set. */
4350         if (psbuf->st_mode & S_IWOTH) {
4351                 DEBUG(0,("check_usershare_stat: file %s owned by uid %u allows "
4352                         "public write. Refusing to allow as a usershare file.\n",
4353                         fname, (unsigned int)psbuf->st_uid ));
4354                 return False;
4355         }
4356
4357         /* Should be 10k or less. */
4358         if (psbuf->st_size > MAX_USERSHARE_FILE_SIZE) {
4359                 DEBUG(0,("check_usershare_stat: file %s owned by uid %u is "
4360                         "too large (%u) to be a user share file.\n",
4361                         fname, (unsigned int)psbuf->st_uid,
4362                         (unsigned int)psbuf->st_size ));
4363                 return False;
4364         }
4365
4366         return True;
4367 }
4368
4369 /***************************************************************************
4370  Parse the contents of a usershare file.
4371 ***************************************************************************/
4372
4373 enum usershare_err parse_usershare_file(TALLOC_CTX *ctx, 
4374                         SMB_STRUCT_STAT *psbuf,
4375                         const char *servicename,
4376                         int snum,
4377                         char **lines,
4378                         int numlines,
4379                         pstring sharepath,
4380                         pstring comment,
4381                         SEC_DESC **ppsd,
4382                         BOOL *pallow_guest)
4383 {
4384         const char **prefixallowlist = lp_usershare_prefix_allow_list();
4385         const char **prefixdenylist = lp_usershare_prefix_deny_list();
4386         int us_vers;
4387         SMB_STRUCT_DIR *dp;
4388         SMB_STRUCT_STAT sbuf;
4389
4390         *pallow_guest = False;
4391
4392         if (numlines < 4) {
4393                 return USERSHARE_MALFORMED_FILE;
4394         }
4395
4396         if (strcmp(lines[0], "#VERSION 1") == 0) {
4397                 us_vers = 1;
4398         } else if (strcmp(lines[0], "#VERSION 2") == 0) {
4399                 us_vers = 2;
4400                 if (numlines < 5) {
4401                         return USERSHARE_MALFORMED_FILE;
4402                 }
4403         } else {
4404                 return USERSHARE_BAD_VERSION;
4405         }
4406
4407         if (strncmp(lines[1], "path=", 5) != 0) {
4408                 return USERSHARE_MALFORMED_PATH;
4409         }
4410
4411         pstrcpy(sharepath, &lines[1][5]);
4412         trim_string(sharepath, " ", " ");
4413
4414         if (strncmp(lines[2], "comment=", 8) != 0) {
4415                 return USERSHARE_MALFORMED_COMMENT_DEF;
4416         }
4417
4418         pstrcpy(comment, &lines[2][8]);
4419         trim_string(comment, " ", " ");
4420         trim_char(comment, '"', '"');
4421
4422         if (strncmp(lines[3], "usershare_acl=", 14) != 0) {
4423                 return USERSHARE_MALFORMED_ACL_DEF;
4424         }
4425
4426         if (!parse_usershare_acl(ctx, &lines[3][14], ppsd)) {
4427                 return USERSHARE_ACL_ERR;
4428         }
4429
4430         if (us_vers == 2) {
4431                 if (strncmp(lines[4], "guest_ok=", 9) != 0) {
4432                         return USERSHARE_MALFORMED_ACL_DEF;
4433                 }
4434                 if (lines[4][9] == 'y') {
4435                         *pallow_guest = True;
4436                 }
4437         }
4438
4439         if (snum != -1 && (strcmp(sharepath, ServicePtrs[snum]->szPath) == 0)) {
4440                 /* Path didn't change, no checks needed. */
4441                 return USERSHARE_OK;
4442         }
4443
4444         /* The path *must* be absolute. */
4445         if (sharepath[0] != '/') {
4446                 DEBUG(2,("parse_usershare_file: share %s: path %s is not an absolute path.\n",
4447                         servicename, sharepath));
4448                 return USERSHARE_PATH_NOT_ABSOLUTE;
4449         }
4450
4451         /* If there is a usershare prefix deny list ensure one of these paths
4452            doesn't match the start of the user given path. */
4453         if (prefixdenylist) {
4454                 int i;
4455                 for ( i=0; prefixdenylist[i]; i++ ) {
4456                         DEBUG(10,("parse_usershare_file: share %s : checking prefixdenylist[%d]='%s' against %s\n",
4457                                 servicename, i, prefixdenylist[i], sharepath ));
4458                         if (memcmp( sharepath, prefixdenylist[i], strlen(prefixdenylist[i])) == 0) {
4459                                 DEBUG(2,("parse_usershare_file: share %s path %s starts with one of the "
4460                                         "usershare prefix deny list entries.\n",
4461                                         servicename, sharepath));
4462                                 return USERSHARE_PATH_IS_DENIED;
4463                         }
4464                 }
4465         }
4466
4467         /* If there is a usershare prefix allow list ensure one of these paths
4468            does match the start of the user given path. */
4469
4470         if (prefixallowlist) {
4471                 int i;
4472                 for ( i=0; prefixallowlist[i]; i++ ) {
4473                         DEBUG(10,("parse_usershare_file: share %s checking prefixallowlist[%d]='%s' against %s\n",
4474                                 servicename, i, prefixallowlist[i], sharepath ));
4475                         if (memcmp( sharepath, prefixallowlist[i], strlen(prefixallowlist[i])) == 0) {
4476                                 break;
4477                         }
4478                 }
4479                 if (prefixallowlist[i] == NULL) {
4480                         DEBUG(2,("parse_usershare_file: share %s path %s doesn't start with one of the "
4481                                 "usershare prefix allow list entries.\n",
4482                                 servicename, sharepath));
4483                         return USERSHARE_PATH_NOT_ALLOWED;
4484                 }
4485         }
4486
4487         /* Ensure this is pointing to a directory. */
4488         dp = sys_opendir(sharepath);
4489
4490         if (!dp) {
4491                 DEBUG(2,("parse_usershare_file: share %s path %s is not a directory.\n",
4492                         servicename, sharepath));
4493                 return USERSHARE_PATH_NOT_DIRECTORY;
4494         }
4495
4496         /* Ensure the owner of the usershare file has permission to share
4497            this directory. */
4498
4499         if (sys_stat(sharepath, &sbuf) == -1) {
4500                 DEBUG(2,("parse_usershare_file: share %s : stat failed on path %s. %s\n",
4501                         servicename, sharepath, strerror(errno) ));
4502                 sys_closedir(dp);
4503                 return USERSHARE_POSIX_ERR;
4504         }
4505
4506         sys_closedir(dp);
4507
4508         if (!S_ISDIR(sbuf.st_mode)) {
4509                 DEBUG(2,("parse_usershare_file: share %s path %s is not a directory.\n",
4510                         servicename, sharepath ));
4511                 return USERSHARE_PATH_NOT_DIRECTORY;
4512         }
4513
4514         /* Check if sharing is restricted to owner-only. */
4515         /* psbuf is the stat of the usershare definition file,
4516            sbuf is the stat of the target directory to be shared. */
4517
4518         if (lp_usershare_owner_only()) {
4519                 /* root can share anything. */
4520                 if ((psbuf->st_uid != 0) && (sbuf.st_uid != psbuf->st_uid)) {
4521                         return USERSHARE_PATH_NOT_ALLOWED;
4522                 }
4523         }
4524
4525         return USERSHARE_OK;
4526 }
4527
4528 /***************************************************************************
4529  Deal with a usershare file.
4530  Returns:
4531         >= 0 - snum
4532         -1 - Bad name, invalid contents.
4533            - service name already existed and not a usershare, problem
4534             with permissions to share directory etc.
4535 ***************************************************************************/
4536
4537 static int process_usershare_file(const char *dir_name, const char *file_name, int snum_template)
4538 {
4539         SMB_STRUCT_STAT sbuf;
4540         SMB_STRUCT_STAT lsbuf;
4541         pstring fname;
4542         pstring sharepath;
4543         pstring comment;
4544         fstring service_name;
4545         char **lines = NULL;
4546         int numlines = 0;
4547         int fd = -1;
4548         int iService = -1;
4549         TALLOC_CTX *ctx = NULL;
4550         SEC_DESC *psd = NULL;
4551         BOOL guest_ok = False;
4552
4553         /* Ensure share name doesn't contain invalid characters. */
4554         if (!validate_net_name(file_name, INVALID_SHARENAME_CHARS, strlen(file_name))) {
4555                 DEBUG(0,("process_usershare_file: share name %s contains "
4556                         "invalid characters (any of %s)\n",
4557                         file_name, INVALID_SHARENAME_CHARS ));
4558                 return -1;
4559         }
4560
4561         fstrcpy(service_name, file_name);
4562
4563         pstrcpy(fname, dir_name);
4564         pstrcat(fname, "/");
4565         pstrcat(fname, file_name);
4566
4567         /* Minimize the race condition by doing an lstat before we
4568            open and fstat. Ensure this isn't a symlink link. */
4569
4570         if (sys_lstat(fname, &lsbuf) != 0) {
4571                 DEBUG(0,("process_usershare_file: stat of %s failed. %s\n",
4572                         fname, strerror(errno) ));
4573                 return -1;
4574         }
4575
4576         /* This must be a regular file, not a symlink, directory or
4577            other strange filetype. */
4578         if (!check_usershare_stat(fname, &lsbuf)) {
4579                 return -1;
4580         }
4581
4582         /* See if there is already a servicenum for this name. */
4583         /* tdb_fetch_int32 returns -1 if not found. */
4584         iService = (int)tdb_fetch_int32(ServiceHash, canonicalize_servicename(service_name) );
4585
4586         if (iService != -1 && ServicePtrs[iService]->usershare_last_mod == lsbuf.st_mtime) {
4587                 /* Nothing changed - Mark valid and return. */
4588                 DEBUG(10,("process_usershare_file: service %s not changed.\n",
4589                         service_name ));
4590                 ServicePtrs[iService]->usershare = USERSHARE_VALID;
4591                 return iService;
4592         }
4593
4594         /* Try and open the file read only - no symlinks allowed. */
4595 #ifdef O_NOFOLLOW
4596         fd = sys_open(fname, O_RDONLY|O_NOFOLLOW, 0);
4597 #else
4598         fd = sys_open(fname, O_RDONLY, 0);
4599 #endif
4600
4601         if (fd == -1) {
4602                 DEBUG(0,("process_usershare_file: unable to open %s. %s\n",
4603                         fname, strerror(errno) ));
4604                 return -1;
4605         }
4606
4607         /* Now fstat to be *SURE* it's a regular file. */
4608         if (sys_fstat(fd, &sbuf) != 0) {
4609                 close(fd);
4610                 DEBUG(0,("process_usershare_file: fstat of %s failed. %s\n",
4611                         fname, strerror(errno) ));
4612                 return -1;
4613         }
4614
4615         /* Is it the same dev/inode as was lstated ? */
4616         if (lsbuf.st_dev != sbuf.st_dev || lsbuf.st_ino != sbuf.st_ino) {
4617                 close(fd);
4618                 DEBUG(0,("process_usershare_file: fstat of %s is a different file from lstat. "
4619                         "Symlink spoofing going on ?\n", fname ));
4620                 return -1;
4621         }
4622
4623         /* This must be a regular file, not a symlink, directory or
4624            other strange filetype. */
4625         if (!check_usershare_stat(fname, &sbuf)) {
4626                 return -1;
4627         }
4628
4629         lines = fd_lines_load(fd, &numlines, MAX_USERSHARE_FILE_SIZE);
4630
4631         close(fd);
4632         if (lines == NULL) {
4633                 DEBUG(0,("process_usershare_file: loading file %s owned by %u failed.\n",
4634                         fname, (unsigned int)sbuf.st_uid ));
4635                 return -1;
4636         }
4637
4638         /* Should we allow printers to be shared... ? */
4639         ctx = talloc_init("usershare_sd_xctx");
4640         if (!ctx) {
4641                 file_lines_free(lines);
4642                 return 1;
4643         }
4644
4645         if (parse_usershare_file(ctx, &sbuf, service_name,
4646                         iService, lines, numlines, sharepath,
4647                         comment, &psd, &guest_ok) != USERSHARE_OK) {
4648                 talloc_destroy(ctx);
4649                 file_lines_free(lines);
4650                 return -1;
4651         }
4652
4653         file_lines_free(lines);
4654
4655         /* Everything ok - add the service possibly using a template. */
4656         if (iService < 0) {
4657                 const service *sp = &sDefault;
4658                 if (snum_template != -1) {
4659                         sp = ServicePtrs[snum_template];
4660                 }
4661
4662                 if ((iService = add_a_service(sp, service_name)) < 0) {
4663                         DEBUG(0, ("process_usershare_file: Failed to add "
4664                                 "new service %s\n", service_name));
4665                         talloc_destroy(ctx);
4666                         return -1;
4667                 }
4668
4669                 /* Read only is controlled by usershare ACL below. */
4670                 ServicePtrs[iService]->bRead_only = False;
4671         }
4672
4673         /* Write the ACL of the new/modified share. */
4674         if (!set_share_security(service_name, psd)) {
4675                  DEBUG(0, ("process_usershare_file: Failed to set share "
4676                         "security for user share %s\n",
4677                         service_name ));
4678                 lp_remove_service(iService);
4679                 talloc_destroy(ctx);
4680                 return -1;
4681         }
4682
4683         talloc_destroy(ctx);
4684
4685         /* If from a template it may be marked invalid. */
4686         ServicePtrs[iService]->valid = True;
4687
4688         /* Set the service as a valid usershare. */
4689         ServicePtrs[iService]->usershare = USERSHARE_VALID;
4690
4691         /* Set guest access. */
4692         if (lp_usershare_allow_guests()) {
4693                 ServicePtrs[iService]->bGuest_ok = guest_ok;
4694         }
4695
4696         /* And note when it was loaded. */
4697         ServicePtrs[iService]->usershare_last_mod = sbuf.st_mtime;
4698         string_set(&ServicePtrs[iService]->szPath, sharepath);
4699         string_set(&ServicePtrs[iService]->comment, comment);
4700
4701         return iService;
4702 }
4703
4704 /***************************************************************************
4705  Checks if a usershare entry has been modified since last load.
4706 ***************************************************************************/
4707
4708 static BOOL usershare_exists(int iService, time_t *last_mod)
4709 {
4710         SMB_STRUCT_STAT lsbuf;
4711         const char *usersharepath = Globals.szUsersharePath;
4712         pstring fname;
4713
4714         pstrcpy(fname, usersharepath);
4715         pstrcat(fname, "/");
4716         pstrcat(fname, ServicePtrs[iService]->szService);
4717
4718         if (sys_lstat(fname, &lsbuf) != 0) {
4719                 return False;
4720         }
4721
4722         if (!S_ISREG(lsbuf.st_mode)) {
4723                 return False;
4724         }
4725
4726         *last_mod = lsbuf.st_mtime;
4727         return True;
4728 }
4729
4730 /***************************************************************************
4731  Load a usershare service by name. Returns a valid servicenumber or -1.
4732 ***************************************************************************/
4733
4734 int load_usershare_service(const char *servicename)
4735 {
4736         SMB_STRUCT_STAT sbuf;
4737         const char *usersharepath = Globals.szUsersharePath;
4738         int max_user_shares = Globals.iUsershareMaxShares;
4739         int snum_template = -1;
4740
4741         if (*usersharepath == 0 ||  max_user_shares == 0) {
4742                 return -1;
4743         }
4744
4745         if (sys_stat(usersharepath, &sbuf) != 0) {
4746                 DEBUG(0,("load_usershare_service: stat of %s failed. %s\n",
4747                         usersharepath, strerror(errno) ));
4748                 return -1;
4749         }
4750
4751         if (!S_ISDIR(sbuf.st_mode)) {
4752                 DEBUG(0,("load_usershare_service: %s is not a directory.\n",
4753                         usersharepath ));
4754                 return -1;
4755         }
4756
4757         /*
4758          * This directory must be owned by root, and have the 't' bit set.
4759          * It also must not be writable by "other".
4760          */
4761
4762 #ifdef S_ISVTX
4763         if (sbuf.st_uid != 0 || !(sbuf.st_mode & S_ISVTX) || (sbuf.st_mode & S_IWOTH)) {
4764 #else
4765         if (sbuf.st_uid != 0 || (sbuf.st_mode & S_IWOTH)) {
4766 #endif
4767                 DEBUG(0,("load_usershare_service: directory %s is not owned by root "
4768                         "or does not have the sticky bit 't' set or is writable by anyone.\n",
4769                         usersharepath ));
4770                 return -1;
4771         }
4772
4773         /* Ensure the template share exists if it's set. */
4774         if (Globals.szUsershareTemplateShare[0]) {
4775                 /* We can't use lp_servicenumber here as we are recommending that
4776                    template shares have -valid=False set. */
4777                 for (snum_template = iNumServices - 1; snum_template >= 0; snum_template--) {
4778                         if (ServicePtrs[snum_template]->szService &&
4779                                         strequal(ServicePtrs[snum_template]->szService,
4780                                                 Globals.szUsershareTemplateShare)) {
4781                                 break;
4782                         }
4783                 }
4784
4785                 if (snum_template == -1) {
4786                         DEBUG(0,("load_usershare_service: usershare template share %s "
4787                                 "does not exist.\n",
4788                                 Globals.szUsershareTemplateShare ));
4789                         return -1;
4790                 }
4791         }
4792
4793         return process_usershare_file(usersharepath, servicename, snum_template);
4794 }
4795
4796 /***************************************************************************
4797  Load all user defined shares from the user share directory.
4798  We only do this if we're enumerating the share list.
4799  This is the function that can delete usershares that have
4800  been removed.
4801 ***************************************************************************/
4802
4803 int load_usershare_shares(void)
4804 {
4805         SMB_STRUCT_DIR *dp;
4806         SMB_STRUCT_STAT sbuf;
4807         SMB_STRUCT_DIRENT *de;
4808         int num_usershares = 0;
4809         int max_user_shares = Globals.iUsershareMaxShares;
4810         unsigned int num_dir_entries, num_bad_dir_entries, num_tmp_dir_entries;
4811         unsigned int allowed_bad_entries = ((2*max_user_shares)/10);
4812         unsigned int allowed_tmp_entries = ((2*max_user_shares)/10);
4813         int iService;
4814         int snum_template = -1;
4815         const char *usersharepath = Globals.szUsersharePath;
4816         int ret = lp_numservices();
4817
4818         if (max_user_shares == 0 || *usersharepath == '\0') {
4819                 return lp_numservices();
4820         }
4821
4822         if (sys_stat(usersharepath, &sbuf) != 0) {
4823                 DEBUG(0,("load_usershare_shares: stat of %s failed. %s\n",
4824                         usersharepath, strerror(errno) ));
4825                 return ret;
4826         }
4827
4828         /*
4829          * This directory must be owned by root, and have the 't' bit set.
4830          * It also must not be writable by "other".
4831          */
4832
4833 #ifdef S_ISVTX
4834         if (sbuf.st_uid != 0 || !(sbuf.st_mode & S_ISVTX) || (sbuf.st_mode & S_IWOTH)) {
4835 #else
4836         if (sbuf.st_uid != 0 || (sbuf.st_mode & S_IWOTH)) {
4837 #endif
4838                 DEBUG(0,("load_usershare_shares: directory %s is not owned by root "
4839                         "or does not have the sticky bit 't' set or is writable by anyone.\n",
4840                         usersharepath ));
4841                 return ret;
4842         }
4843
4844         /* Ensure the template share exists if it's set. */
4845         if (Globals.szUsershareTemplateShare[0]) {
4846                 /* We can't use lp_servicenumber here as we are recommending that
4847                    template shares have -valid=False set. */
4848                 for (snum_template = iNumServices - 1; snum_template >= 0; snum_template--) {
4849                         if (ServicePtrs[snum_template]->szService &&
4850                                         strequal(ServicePtrs[snum_template]->szService,
4851                                                 Globals.szUsershareTemplateShare)) {
4852                                 break;
4853                         }
4854                 }
4855
4856                 if (snum_template == -1) {
4857                         DEBUG(0,("load_usershare_shares: usershare template share %s "
4858                                 "does not exist.\n",
4859                                 Globals.szUsershareTemplateShare ));
4860                         return ret;
4861                 }
4862         }
4863
4864         /* Mark all existing usershares as pending delete. */
4865         for (iService = iNumServices - 1; iService >= 0; iService--) {
4866                 if (VALID(iService) && ServicePtrs[iService]->usershare) {
4867                         ServicePtrs[iService]->usershare = USERSHARE_PENDING_DELETE;
4868                 }
4869         }
4870
4871         dp = sys_opendir(usersharepath);
4872         if (!dp) {
4873                 DEBUG(0,("load_usershare_shares:: failed to open directory %s. %s\n",
4874                         usersharepath, strerror(errno) ));
4875                 return ret;
4876         }
4877
4878         for (num_dir_entries = 0, num_bad_dir_entries = 0, num_tmp_dir_entries = 0;
4879                         (de = sys_readdir(dp));
4880                         num_dir_entries++ ) {
4881                 int r;
4882                 const char *n = de->d_name;
4883
4884                 /* Ignore . and .. */
4885                 if (*n == '.') {
4886                         if ((n[1] == '\0') || (n[1] == '.' && n[2] == '\0')) {
4887                                 continue;
4888                         }
4889                 }
4890
4891                 if (n[0] == ':') {
4892                         /* Temporary file used when creating a share. */
4893                         num_tmp_dir_entries++;
4894                 }
4895
4896                 /* Allow 20% tmp entries. */
4897                 if (num_tmp_dir_entries > allowed_tmp_entries) {
4898                         DEBUG(0,("load_usershare_shares: too many temp entries (%u) "
4899                                 "in directory %s\n",
4900                                 num_tmp_dir_entries, usersharepath));
4901                         break;
4902                 }
4903
4904                 r = process_usershare_file(usersharepath, n, snum_template);
4905                 if (r == 0) {
4906                         /* Update the services count. */
4907                         num_usershares++;
4908                         if (num_usershares >= max_user_shares) {
4909                                 DEBUG(0,("load_usershare_shares: max user shares reached "
4910                                         "on file %s in directory %s\n",
4911                                         n, usersharepath ));
4912                                 break;
4913                         }
4914                 } else if (r == -1) {
4915                         num_bad_dir_entries++;
4916                 }
4917
4918                 /* Allow 20% bad entries. */
4919                 if (num_bad_dir_entries > allowed_bad_entries) {
4920                         DEBUG(0,("load_usershare_shares: too many bad entries (%u) "
4921                                 "in directory %s\n",
4922                                 num_bad_dir_entries, usersharepath));
4923                         break;
4924                 }
4925
4926                 /* Allow 20% bad entries. */
4927                 if (num_dir_entries > max_user_shares + allowed_bad_entries) {
4928                         DEBUG(0,("load_usershare_shares: too many total entries (%u) "
4929                         "in directory %s\n",
4930                         num_dir_entries, usersharepath));
4931                         break;
4932                 }
4933         }
4934
4935         sys_closedir(dp);
4936
4937         /* Sweep through and delete any non-refreshed usershares that are
4938            not currently in use. */
4939         for (iService = iNumServices - 1; iService >= 0; iService--) {
4940                 if (VALID(iService) && (ServicePtrs[iService]->usershare == USERSHARE_PENDING_DELETE)) {
4941                         if (conn_snum_used(iService)) {
4942                                 continue;
4943                         }
4944                         /* Remove from the share ACL db. */
4945                         DEBUG(10,("load_usershare_shares: Removing deleted usershare %s\n",
4946                                 lp_servicename(iService) ));
4947                         delete_share_security(snum2params_static(iService));
4948                         free_service_byindex(iService);
4949                 }
4950         }
4951
4952         return lp_numservices();
4953 }
4954
4955 /********************************************************
4956  Destroy global resources allocated in this file
4957 ********************************************************/
4958
4959 void gfree_loadparm(void)
4960 {
4961         struct file_lists *f;
4962         struct file_lists *next;
4963         int i;
4964
4965         lp_TALLOC_FREE();
4966
4967         /* Free the file lists */
4968
4969         f = file_lists;
4970         while( f ) {
4971                 next = f->next;
4972                 SAFE_FREE( f->name );
4973                 SAFE_FREE( f->subfname );
4974                 SAFE_FREE( f );
4975                 f = next;
4976         }
4977
4978         /* Free resources allocated to services */
4979
4980         for ( i = 0; i < iNumServices; i++ ) {
4981                 if ( VALID(i) ) {
4982                         free_service_byindex(i);
4983                 }
4984         }
4985
4986         SAFE_FREE( ServicePtrs );
4987         iNumServices = 0;
4988
4989         /* Now release all resources allocated to global
4990            parameters and the default service */
4991
4992         for (i = 0; parm_table[i].label; i++) 
4993         {
4994                 if ( parm_table[i].type == P_STRING 
4995                         || parm_table[i].type == P_USTRING ) 
4996                 {
4997                         string_free( (char**)parm_table[i].ptr );
4998                 }
4999                 else if (parm_table[i].type == P_LIST) {
5000                         str_list_free( (char***)parm_table[i].ptr );
5001                 }
5002         }
5003 }
5004
5005 /***************************************************************************
5006  Load the services array from the services file. Return True on success, 
5007  False on failure.
5008 ***************************************************************************/
5009
5010 BOOL lp_load(const char *pszFname,
5011              BOOL global_only,
5012              BOOL save_defaults,
5013              BOOL add_ipc,
5014              BOOL initialize_globals)
5015 {
5016         pstring n2;
5017         BOOL bRetval;
5018         param_opt_struct *data, *pdata;
5019
5020         pstrcpy(n2, pszFname);
5021         
5022         standard_sub_basic( get_current_username(), current_user_info.domain,
5023                             n2,sizeof(n2) );
5024
5025         add_to_file_list(pszFname, n2);
5026
5027         bRetval = False;
5028
5029         DEBUG(3, ("lp_load: refreshing parameters\n"));
5030         
5031         bInGlobalSection = True;
5032         bGlobalOnly = global_only;
5033
5034         init_globals(! initialize_globals);
5035         debug_init();
5036
5037         if (save_defaults) {
5038                 init_locals();
5039                 lp_save_defaults();
5040         }
5041
5042         if (Globals.param_opt != NULL) {
5043                 data = Globals.param_opt;
5044                 while (data) {
5045                         string_free(&data->key);
5046                         string_free(&data->value);
5047                         str_list_free(&data->list);
5048                         pdata = data->next;
5049                         SAFE_FREE(data);
5050                         data = pdata;
5051                 }
5052                 Globals.param_opt = NULL;
5053         }
5054         
5055         /* We get sections first, so have to start 'behind' to make up */
5056         iServiceIndex = -1;
5057         bRetval = pm_process(n2, do_section, do_parameter);
5058
5059         /* finish up the last section */
5060         DEBUG(4, ("pm_process() returned %s\n", BOOLSTR(bRetval)));
5061         if (bRetval)
5062                 if (iServiceIndex >= 0)
5063                         bRetval = service_ok(iServiceIndex);
5064
5065         lp_add_auto_services(lp_auto_services());
5066
5067         if (add_ipc) {
5068                 /* When 'restrict anonymous = 2' guest connections to ipc$
5069                    are denied */
5070                 lp_add_ipc("IPC$", (lp_restrict_anonymous() < 2));
5071                 if ( lp_enable_asu_support() )
5072                         lp_add_ipc("ADMIN$", False);
5073         }
5074
5075         set_server_role();
5076         set_default_server_announce_type();
5077         set_allowed_client_auth();
5078
5079         bLoaded = True;
5080
5081         /* Now we check bWINSsupport and set szWINSserver to 127.0.0.1 */
5082         /* if bWINSsupport is true and we are in the client            */
5083         if (in_client && Globals.bWINSsupport) {
5084                 lp_do_parameter(GLOBAL_SECTION_SNUM, "wins server", "127.0.0.1");
5085         }
5086
5087         init_iconv();
5088
5089         return (bRetval);
5090 }
5091
5092 /***************************************************************************
5093  Reset the max number of services.
5094 ***************************************************************************/
5095
5096 void lp_resetnumservices(void)
5097 {
5098         iNumServices = 0;
5099 }
5100
5101 /***************************************************************************
5102  Return the max number of services.
5103 ***************************************************************************/
5104
5105 int lp_numservices(void)
5106 {
5107         return (iNumServices);
5108 }
5109
5110 /***************************************************************************
5111 Display the contents of the services array in human-readable form.
5112 ***************************************************************************/
5113
5114 void lp_dump(FILE *f, BOOL show_defaults, int maxtoprint)
5115 {
5116         int iService;
5117
5118         if (show_defaults)
5119                 defaults_saved = False;
5120
5121         dump_globals(f);
5122
5123         dump_a_service(&sDefault, f);
5124
5125         for (iService = 0; iService < maxtoprint; iService++) {
5126                 fprintf(f,"\n");
5127                 lp_dump_one(f, show_defaults, iService);
5128         }
5129 }
5130
5131 /***************************************************************************
5132 Display the contents of one service in human-readable form.
5133 ***************************************************************************/
5134
5135 void lp_dump_one(FILE * f, BOOL show_defaults, int snum)
5136 {
5137         if (VALID(snum)) {
5138                 if (ServicePtrs[snum]->szService[0] == '\0')
5139                         return;
5140                 dump_a_service(ServicePtrs[snum], f);
5141         }
5142 }
5143
5144 /***************************************************************************
5145 Return the number of the service with the given name, or -1 if it doesn't
5146 exist. Note that this is a DIFFERENT ANIMAL from the internal function
5147 getservicebyname()! This works ONLY if all services have been loaded, and
5148 does not copy the found service.
5149 ***************************************************************************/
5150
5151 int lp_servicenumber(const char *pszServiceName)
5152 {
5153         int iService;
5154         fstring serviceName;
5155         
5156         if (!pszServiceName) {
5157                 return GLOBAL_SECTION_SNUM;
5158         }
5159         
5160         for (iService = iNumServices - 1; iService >= 0; iService--) {
5161                 if (VALID(iService) && ServicePtrs[iService]->szService) {
5162                         /*
5163                          * The substitution here is used to support %U is
5164                          * service names
5165                          */
5166                         fstrcpy(serviceName, ServicePtrs[iService]->szService);
5167                         standard_sub_basic(get_current_username(),
5168                                            current_user_info.domain,
5169                                            serviceName,sizeof(serviceName));
5170                         if (strequal(serviceName, pszServiceName)) {
5171                                 break;
5172                         }
5173                 }
5174         }
5175
5176         if (iService >= 0 && ServicePtrs[iService]->usershare == USERSHARE_VALID) {
5177                 time_t last_mod;
5178
5179                 if (!usershare_exists(iService, &last_mod)) {
5180                         /* Remove the share security tdb entry for it. */
5181                         delete_share_security(snum2params_static(iService));
5182                         /* Remove it from the array. */
5183                         free_service_byindex(iService);
5184                         /* Doesn't exist anymore. */
5185                         return GLOBAL_SECTION_SNUM;
5186                 }
5187
5188                 /* Has it been modified ? If so delete and reload. */
5189                 if (ServicePtrs[iService]->usershare_last_mod < last_mod) {
5190                         /* Remove it from the array. */
5191                         free_service_byindex(iService);
5192                         /* and now reload it. */
5193                         iService = load_usershare_service(pszServiceName);
5194                 }
5195         }
5196
5197         if (iService < 0) {
5198                 DEBUG(7,("lp_servicenumber: couldn't find %s\n", pszServiceName));
5199                 return GLOBAL_SECTION_SNUM;
5200         }
5201
5202         return (iService);
5203 }
5204
5205 BOOL share_defined(const char *service_name)
5206 {
5207         return (lp_servicenumber(service_name) != -1);
5208 }
5209
5210 struct share_params *get_share_params(TALLOC_CTX *mem_ctx,
5211                                       const char *sharename)
5212 {
5213         struct share_params *result;
5214         char *sname;
5215         int snum;
5216
5217         if (!(sname = SMB_STRDUP(sharename))) {
5218                 return NULL;
5219         }
5220
5221         snum = find_service(sname);
5222         SAFE_FREE(sname);
5223
5224         if (snum < 0) {
5225                 return NULL;
5226         }
5227
5228         if (!(result = TALLOC_P(mem_ctx, struct share_params))) {
5229                 DEBUG(0, ("talloc failed\n"));
5230                 return NULL;
5231         }
5232
5233         result->service = snum;
5234         return result;
5235 }
5236
5237 struct share_iterator *share_list_all(TALLOC_CTX *mem_ctx)
5238 {
5239         struct share_iterator *result;
5240
5241         if (!(result = TALLOC_P(mem_ctx, struct share_iterator))) {
5242                 DEBUG(0, ("talloc failed\n"));
5243                 return NULL;
5244         }
5245
5246         result->next_id = 0;
5247         return result;
5248 }
5249
5250 struct share_params *next_share(struct share_iterator *list)
5251 {
5252         struct share_params *result;
5253
5254         while (!lp_snum_ok(list->next_id) &&
5255                (list->next_id < lp_numservices())) {
5256                 list->next_id += 1;
5257         }
5258
5259         if (list->next_id >= lp_numservices()) {
5260                 return NULL;
5261         }
5262
5263         if (!(result = TALLOC_P(list, struct share_params))) {
5264                 DEBUG(0, ("talloc failed\n"));
5265                 return NULL;
5266         }
5267
5268         result->service = list->next_id;
5269         list->next_id += 1;
5270         return result;
5271 }
5272
5273 struct share_params *next_printer(struct share_iterator *list)
5274 {
5275         struct share_params *result;
5276
5277         while ((result = next_share(list)) != NULL) {
5278                 if (lp_print_ok(result->service)) {
5279                         break;
5280                 }
5281         }
5282         return result;
5283 }
5284
5285 /*
5286  * This is a hack for a transition period until we transformed all code from
5287  * service numbers to struct share_params.
5288  */
5289
5290 struct share_params *snum2params_static(int snum)
5291 {
5292         static struct share_params result;
5293         result.service = snum;
5294         return &result;
5295 }
5296
5297 /*******************************************************************
5298  A useful volume label function. 
5299 ********************************************************************/
5300
5301 char *volume_label(int snum)
5302 {
5303         char *ret = lp_volume(snum);
5304         if (!*ret)
5305                 return lp_servicename(snum);
5306         return (ret);
5307 }
5308
5309
5310 /*******************************************************************
5311  Set the server type we will announce as via nmbd.
5312 ********************************************************************/
5313
5314 static void set_default_server_announce_type(void)
5315 {
5316         default_server_announce = 0;
5317         default_server_announce |= SV_TYPE_WORKSTATION;
5318         default_server_announce |= SV_TYPE_SERVER;
5319         default_server_announce |= SV_TYPE_SERVER_UNIX;
5320
5321         /* note that the flag should be set only if we have a 
5322            printer service but nmbd doesn't actually load the 
5323            services so we can't tell   --jerry */
5324
5325         default_server_announce |= SV_TYPE_PRINTQ_SERVER;
5326
5327         switch (lp_announce_as()) {
5328                 case ANNOUNCE_AS_NT_SERVER:
5329                         default_server_announce |= SV_TYPE_SERVER_NT;
5330                         /* fall through... */
5331                 case ANNOUNCE_AS_NT_WORKSTATION:
5332                         default_server_announce |= SV_TYPE_NT;
5333                         break;
5334                 case ANNOUNCE_AS_WIN95:
5335                         default_server_announce |= SV_TYPE_WIN95_PLUS;
5336                         break;
5337                 case ANNOUNCE_AS_WFW:
5338                         default_server_announce |= SV_TYPE_WFW;
5339                         break;
5340                 default:
5341                         break;
5342         }
5343
5344         switch (lp_server_role()) {
5345                 case ROLE_DOMAIN_MEMBER:
5346                         default_server_announce |= SV_TYPE_DOMAIN_MEMBER;
5347                         break;
5348                 case ROLE_DOMAIN_PDC:
5349                         default_server_announce |= SV_TYPE_DOMAIN_CTRL;
5350                         break;
5351                 case ROLE_DOMAIN_BDC:
5352                         default_server_announce |= SV_TYPE_DOMAIN_BAKCTRL;
5353                         break;
5354                 case ROLE_STANDALONE:
5355                 default:
5356                         break;
5357         }
5358         if (lp_time_server())
5359                 default_server_announce |= SV_TYPE_TIME_SOURCE;
5360
5361         if (lp_host_msdfs())
5362                 default_server_announce |= SV_TYPE_DFS_SERVER;
5363 }
5364
5365 /***********************************************************
5366  returns role of Samba server
5367 ************************************************************/
5368
5369 int lp_server_role(void)
5370 {
5371         return server_role;
5372 }
5373
5374 /***********************************************************
5375  If we are PDC then prefer us as DMB
5376 ************************************************************/
5377
5378 BOOL lp_domain_master(void)
5379 {
5380         if (Globals.bDomainMaster == Auto)
5381                 return (lp_server_role() == ROLE_DOMAIN_PDC);
5382
5383         return Globals.bDomainMaster;
5384 }
5385
5386 /***********************************************************
5387  If we are DMB then prefer us as LMB
5388 ************************************************************/
5389
5390 BOOL lp_preferred_master(void)
5391 {
5392         if (Globals.bPreferredMaster == Auto)
5393                 return (lp_local_master() && lp_domain_master());
5394
5395         return Globals.bPreferredMaster;
5396 }
5397
5398 /*******************************************************************
5399  Remove a service.
5400 ********************************************************************/
5401
5402 void lp_remove_service(int snum)
5403 {
5404         ServicePtrs[snum]->valid = False;
5405         invalid_services[num_invalid_services++] = snum;
5406 }
5407
5408 /*******************************************************************
5409  Copy a service.
5410 ********************************************************************/
5411
5412 void lp_copy_service(int snum, const char *new_name)
5413 {
5414         do_section(new_name);
5415         if (snum >= 0) {
5416                 snum = lp_servicenumber(new_name);
5417                 if (snum >= 0)
5418                         lp_do_parameter(snum, "copy", lp_servicename(snum));
5419         }
5420 }
5421
5422
5423 /*******************************************************************
5424  Get the default server type we will announce as via nmbd.
5425 ********************************************************************/
5426
5427 int lp_default_server_announce(void)
5428 {
5429         return default_server_announce;
5430 }
5431
5432 /*******************************************************************
5433  Split the announce version into major and minor numbers.
5434 ********************************************************************/
5435
5436 int lp_major_announce_version(void)
5437 {
5438         static BOOL got_major = False;
5439         static int major_version = DEFAULT_MAJOR_VERSION;
5440         char *vers;
5441         char *p;
5442
5443         if (got_major)
5444                 return major_version;
5445
5446         got_major = True;
5447         if ((vers = lp_announce_version()) == NULL)
5448                 return major_version;
5449
5450         if ((p = strchr_m(vers, '.')) == 0)
5451                 return major_version;
5452
5453         *p = '\0';
5454         major_version = atoi(vers);
5455         return major_version;
5456 }
5457
5458 int lp_minor_announce_version(void)
5459 {
5460         static BOOL got_minor = False;
5461         static int minor_version = DEFAULT_MINOR_VERSION;
5462         char *vers;
5463         char *p;
5464
5465         if (got_minor)
5466                 return minor_version;
5467
5468         got_minor = True;
5469         if ((vers = lp_announce_version()) == NULL)
5470                 return minor_version;
5471
5472         if ((p = strchr_m(vers, '.')) == 0)
5473                 return minor_version;
5474
5475         p++;
5476         minor_version = atoi(p);
5477         return minor_version;
5478 }
5479
5480 /***********************************************************
5481  Set the global name resolution order (used in smbclient).
5482 ************************************************************/
5483
5484 void lp_set_name_resolve_order(const char *new_order)
5485 {
5486         string_set(&Globals.szNameResolveOrder, new_order);
5487 }
5488
5489 const char *lp_printername(int snum)
5490 {
5491         const char *ret = _lp_printername(snum);
5492         if (ret == NULL || (ret != NULL && *ret == '\0'))
5493                 ret = lp_const_servicename(snum);
5494
5495         return ret;
5496 }
5497
5498
5499 /***********************************************************
5500  Allow daemons such as winbindd to fix their logfile name.
5501 ************************************************************/
5502
5503 void lp_set_logfile(const char *name)
5504 {
5505         string_set(&Globals.szLogFile, name);
5506         pstrcpy(debugf, name);
5507 }
5508
5509 /*******************************************************************
5510  Return the max print jobs per queue.
5511 ********************************************************************/
5512
5513 int lp_maxprintjobs(int snum)
5514 {
5515         int maxjobs = LP_SNUM_OK(snum) ? ServicePtrs[snum]->iMaxPrintJobs : sDefault.iMaxPrintJobs;
5516         if (maxjobs <= 0 || maxjobs >= PRINT_MAX_JOBID)
5517                 maxjobs = PRINT_MAX_JOBID - 1;
5518
5519         return maxjobs;
5520 }
5521
5522 const char *lp_printcapname(void)
5523 {
5524         if ((Globals.szPrintcapname != NULL) &&
5525             (Globals.szPrintcapname[0] != '\0'))
5526                 return Globals.szPrintcapname;
5527
5528         if (sDefault.iPrinting == PRINT_CUPS) {
5529 #ifdef HAVE_CUPS
5530                 return "cups";
5531 #else
5532                 return "lpstat";
5533 #endif
5534         }
5535
5536         if (sDefault.iPrinting == PRINT_BSD)
5537                 return "/etc/printcap";
5538
5539         return PRINTCAP_NAME;
5540 }
5541
5542 /*******************************************************************
5543  Ensure we don't use sendfile if server smb signing is active.
5544 ********************************************************************/
5545
5546 static uint32 spoolss_state;
5547
5548 BOOL lp_disable_spoolss( void )
5549 {
5550         if ( spoolss_state == SVCCTL_STATE_UNKNOWN )
5551                 spoolss_state = _lp_disable_spoolss() ? SVCCTL_STOPPED : SVCCTL_RUNNING;
5552
5553         return spoolss_state == SVCCTL_STOPPED ? True : False;
5554 }
5555
5556 void lp_set_spoolss_state( uint32 state )
5557 {
5558         SMB_ASSERT( (state == SVCCTL_STOPPED) || (state == SVCCTL_RUNNING) );
5559
5560         spoolss_state = state;
5561 }
5562
5563 uint32 lp_get_spoolss_state( void )
5564 {
5565         return lp_disable_spoolss() ? SVCCTL_STOPPED : SVCCTL_RUNNING;
5566 }
5567
5568 /*******************************************************************
5569  Ensure we don't use sendfile if server smb signing is active.
5570 ********************************************************************/
5571
5572 BOOL lp_use_sendfile(int snum)
5573 {
5574         /* Using sendfile blows the brains out of any DOS or Win9x TCP stack... JRA. */
5575         if (Protocol < PROTOCOL_NT1) {
5576                 return False;
5577         }
5578         return (_lp_use_sendfile(snum) && (get_remote_arch() != RA_WIN95) && !srv_is_signing_active());
5579 }
5580
5581 /*******************************************************************
5582  Turn off sendfile if we find the underlying OS doesn't support it.
5583 ********************************************************************/
5584
5585 void set_use_sendfile(int snum, BOOL val)
5586 {
5587         if (LP_SNUM_OK(snum))
5588                 ServicePtrs[snum]->bUseSendfile = val;
5589         else
5590                 sDefault.bUseSendfile = val;
5591 }
5592
5593 /*******************************************************************
5594  Turn off storing DOS attributes if this share doesn't support it.
5595 ********************************************************************/
5596
5597 void set_store_dos_attributes(int snum, BOOL val)
5598 {
5599         if (!LP_SNUM_OK(snum))
5600                 return;
5601         ServicePtrs[(snum)]->bStoreDosAttributes = val;
5602 }
5603
5604 void lp_set_mangling_method(const char *new_method)
5605 {
5606         string_set(&Globals.szManglingMethod, new_method);
5607 }
5608
5609 /*******************************************************************
5610  Global state for POSIX pathname processing.
5611 ********************************************************************/
5612
5613 static BOOL posix_pathnames;
5614
5615 BOOL lp_posix_pathnames(void)
5616 {
5617         return posix_pathnames;
5618 }
5619
5620 /*******************************************************************
5621  Change everything needed to ensure POSIX pathname processing (currently
5622  not much).
5623 ********************************************************************/
5624
5625 void lp_set_posix_pathnames(void)
5626 {
5627         posix_pathnames = True;
5628 }
5629
5630 /*******************************************************************
5631  Global state for POSIX lock processing - CIFS unix extensions.
5632 ********************************************************************/
5633
5634 BOOL posix_default_lock_was_set;
5635 static enum brl_flavour posix_cifsx_locktype; /* By default 0 == WINDOWS_LOCK */
5636
5637 enum brl_flavour lp_posix_cifsu_locktype(files_struct *fsp)
5638 {
5639         if (posix_default_lock_was_set) {
5640                 return posix_cifsx_locktype;
5641         } else {
5642                 return fsp->posix_open ? POSIX_LOCK : WINDOWS_LOCK;
5643         }
5644 }
5645
5646 /*******************************************************************
5647 ********************************************************************/
5648
5649 void lp_set_posix_default_cifsx_readwrite_locktype(enum brl_flavour val)
5650 {
5651         posix_default_lock_was_set = True;
5652         posix_cifsx_locktype = val;
5653 }