1/*
2   Unix SMB/CIFS implementation.
3   Parameter loading functions
4   Copyright (C) Karl Auer 1993-1998
5
6   Largely re-written by Andrew Tridgell, September 1994
7
8   Copyright (C) Simo Sorce 2001
9   Copyright (C) Alexander Bokovoy 2002
10   Copyright (C) Stefan (metze) Metzmacher 2002
11   Copyright (C) Jim McDonough (jmcd@us.ibm.com)  2003.
12   Copyright (C) James Myers 2003 <myersjj@samba.org>
13   Copyright (C) Jelmer Vernooij <jelmer@samba.org> 2007
14
15   This program is free software; you can redistribute it and/or modify
16   it under the terms of the GNU General Public License as published by
17   the Free Software Foundation; either version 3 of the License, or
18   (at your option) any later version.
19
20   This program is distributed in the hope that it will be useful,
21   but WITHOUT ANY WARRANTY; without even the implied warranty of
22   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
23   GNU General Public License for more details.
24
25   You should have received a copy of the GNU General Public License
26   along with this program.  If not, see <http://www.gnu.org/licenses/>.
27*/
28
29/*
30 *  Load parameters.
31 *
32 *  This module provides suitable callback functions for the params
33 *  module. It builds the internal table of service details which is
34 *  then used by the rest of the server.
35 *
36 * To add a parameter:
37 *
38 * 1) add it to the global or service structure definition
39 * 2) add it to the parm_table
40 * 3) add it to the list of available functions (eg: using FN_GLOBAL_STRING())
41 * 4) If it's a global then initialise it in init_globals. If a local
42 *    (ie. service) parameter then initialise it in the sDefault structure
43 *
44 *
45 * Notes:
46 *   The configuration file is processed sequentially for speed. It is NOT
47 *   accessed randomly as happens in 'real' Windows. For this reason, there
48 *   is a fair bit of sequence-dependent code here - ie., code which assumes
49 *   that certain things happen before others. In particular, the code which
50 *   happens at the boundary between sections is delicately poised, so be
51 *   careful!
52 *
53 */
54
55#include "includes.h"
56#include "version.h"
57#include "dynconfig/dynconfig.h"
58#include "system/time.h"
59#include "system/locale.h"
60#include "system/network.h" /* needed for TCP_NODELAY */
61#include "smb_server/smb_server.h"
62#include "libcli/raw/signing.h"
63#include "../lib/util/dlinklist.h"
64#include "param/param.h"
65#include "param/loadparm.h"
66#include "libcli/raw/libcliraw.h"
67#include "rpc_server/common/common.h"
68#include "lib/socket/socket.h"
69#include "auth/gensec/gensec.h"
70
71#define standard_sub_basic talloc_strdup
72
73static bool do_parameter(const char *, const char *, void *);
74static bool defaults_saved = false;
75
76/**
77 * This structure describes global (ie., server-wide) parameters.
78 */
79struct loadparm_global
80{
81	enum server_role server_role;
82
83	const char **smb_ports;
84	char *ncalrpc_dir;
85	char *dos_charset;
86	char *unix_charset;
87	char *display_charset;
88	char *szLockDir;
89	char *szModulesDir;
90	char *szPidDir;
91	char *szSetupDir;
92	char *szServerString;
93	char *szAutoServices;
94	char *szPasswdChat;
95	char *szShareBackend;
96	char *szSAM_URL;
97	char *szIDMAP_URL;
98	char *szSECRETS_URL;
99	char *szSPOOLSS_URL;
100	char *szWINS_CONFIG_URL;
101	char *szWINS_URL;
102	char *szPrivateDir;
103	const char **szPasswordServers;
104	char *szSocketOptions;
105	char *szRealm;
106	const char **szWINSservers;
107	const char **szInterfaces;
108	char *szSocketAddress;
109	char *szAnnounceVersion;	/* This is initialised in init_globals */
110	char *szWorkgroup;
111	char *szNetbiosName;
112	const char **szNetbiosAliases;
113	char *szNetbiosScope;
114	char *szDomainOtherSIDs;
115	const char **szNameResolveOrder;
116	const char **dcerpc_ep_servers;
117	const char **server_services;
118	char *ntptr_providor;
119	char *szWinbindSeparator;
120	char *szWinbinddPrivilegedSocketDirectory;
121	char *szWinbinddSocketDirectory;
122	char *szTemplateShell;
123	char *szTemplateHomedir;
124	int bWinbindSealedPipes;
125	int bIdmapTrustedOnly;
126	char *swat_directory;
127	int tls_enabled;
128	char *tls_keyfile;
129	char *tls_certfile;
130	char *tls_cafile;
131	char *tls_crlfile;
132	char *tls_dhpfile;
133	char *logfile;
134	char *panic_action;
135	int max_mux;
136	int debuglevel;
137	int max_xmit;
138	int pwordlevel;
139	int srv_maxprotocol;
140	int srv_minprotocol;
141	int cli_maxprotocol;
142	int cli_minprotocol;
143	int security;
144	int paranoid_server_security;
145	int max_wins_ttl;
146	int min_wins_ttl;
147	int announce_as;	/* This is initialised in init_globals */
148	int nbt_port;
149	int dgram_port;
150	int cldap_port;
151	int krb5_port;
152	int kpasswd_port;
153	int web_port;
154	char *socket_options;
155	int bWINSsupport;
156	int bWINSdnsProxy;
157	char *szWINSHook;
158	int bLocalMaster;
159	int bPreferredMaster;
160	int bEncryptPasswords;
161	int bNullPasswords;
162	int bObeyPamRestrictions;
163	int bLargeReadwrite;
164	int bReadRaw;
165	int bWriteRaw;
166	int bTimeServer;
167	int bBindInterfacesOnly;
168	int bNTSmbSupport;
169	int bNTStatusSupport;
170	int bLanmanAuth;
171	int bNTLMAuth;
172	int bUseSpnego;
173	int server_signing;
174	int client_signing;
175	int bClientPlaintextAuth;
176	int bClientLanManAuth;
177	int bClientNTLMv2Auth;
178	int client_use_spnego_principal;
179	int bHostMSDfs;
180	int bUnicode;
181	int bUnixExtensions;
182	int bDisableNetbios;
183	int bRpcBigEndian;
184	char *szNTPSignDSocketDirectory;
185	struct parmlist_entry *param_opt;
186};
187
188
189/**
190 * This structure describes a single service.
191 */
192struct loadparm_service
193{
194	char *szService;
195	char *szPath;
196	char *szCopy;
197	char *szInclude;
198	char *szPrintername;
199	char **szHostsallow;
200	char **szHostsdeny;
201	char *comment;
202	char *volume;
203	char *fstype;
204	char **ntvfs_handler;
205	int iMaxPrintJobs;
206	int iMaxConnections;
207	int iCSCPolicy;
208	int bAvailable;
209	int bBrowseable;
210	int bRead_only;
211	int bPrint_ok;
212	int bMap_system;
213	int bMap_hidden;
214	int bMap_archive;
215	int bStrictLocking;
216	int bOplocks;
217	int iCreate_mask;
218	int iCreate_force_mode;
219	int iDir_mask;
220	int iDir_force_mode;
221	int *copymap;
222	int bMSDfsRoot;
223	int bStrictSync;
224	int bCIFileSystem;
225	struct parmlist_entry *param_opt;
226
227	char dummy[3];		/* for alignment */
228};
229
230
231#define NUMPARAMETERS (sizeof(parm_table) / sizeof(struct parm_struct))
232
233
234/* prototypes for the special type handlers */
235static bool handle_include(struct loadparm_context *lp_ctx,
236			   const char *pszParmValue, char **ptr);
237static bool handle_copy(struct loadparm_context *lp_ctx,
238			const char *pszParmValue, char **ptr);
239static bool handle_debuglevel(struct loadparm_context *lp_ctx,
240			      const char *pszParmValue, char **ptr);
241static bool handle_logfile(struct loadparm_context *lp_ctx,
242			   const char *pszParmValue, char **ptr);
243
244static const struct enum_list enum_protocol[] = {
245	{PROTOCOL_SMB2, "SMB2"},
246	{PROTOCOL_NT1, "NT1"},
247	{PROTOCOL_LANMAN2, "LANMAN2"},
248	{PROTOCOL_LANMAN1, "LANMAN1"},
249	{PROTOCOL_CORE, "CORE"},
250	{PROTOCOL_COREPLUS, "COREPLUS"},
251	{PROTOCOL_COREPLUS, "CORE+"},
252	{-1, NULL}
253};
254
255static const struct enum_list enum_security[] = {
256	{SEC_SHARE, "SHARE"},
257	{SEC_USER, "USER"},
258	{-1, NULL}
259};
260
261static const struct enum_list enum_announce_as[] = {
262	{ANNOUNCE_AS_NT_SERVER, "NT"},
263	{ANNOUNCE_AS_NT_SERVER, "NT Server"},
264	{ANNOUNCE_AS_NT_WORKSTATION, "NT Workstation"},
265	{ANNOUNCE_AS_WIN95, "win95"},
266	{ANNOUNCE_AS_WFW, "WfW"},
267	{-1, NULL}
268};
269
270static const struct enum_list enum_bool_auto[] = {
271	{false, "No"},
272	{false, "False"},
273	{false, "0"},
274	{true, "Yes"},
275	{true, "True"},
276	{true, "1"},
277	{Auto, "Auto"},
278	{-1, NULL}
279};
280
281/* Client-side offline caching policy types */
282enum csc_policy {
283	CSC_POLICY_MANUAL=0,
284	CSC_POLICY_DOCUMENTS=1,
285	CSC_POLICY_PROGRAMS=2,
286	CSC_POLICY_DISABLE=3
287};
288
289static const struct enum_list enum_csc_policy[] = {
290	{CSC_POLICY_MANUAL, "manual"},
291	{CSC_POLICY_DOCUMENTS, "documents"},
292	{CSC_POLICY_PROGRAMS, "programs"},
293	{CSC_POLICY_DISABLE, "disable"},
294	{-1, NULL}
295};
296
297/* SMB signing types. */
298static const struct enum_list enum_smb_signing_vals[] = {
299	{SMB_SIGNING_OFF, "No"},
300	{SMB_SIGNING_OFF, "False"},
301	{SMB_SIGNING_OFF, "0"},
302	{SMB_SIGNING_OFF, "Off"},
303	{SMB_SIGNING_OFF, "disabled"},
304	{SMB_SIGNING_SUPPORTED, "Yes"},
305	{SMB_SIGNING_SUPPORTED, "True"},
306	{SMB_SIGNING_SUPPORTED, "1"},
307	{SMB_SIGNING_SUPPORTED, "On"},
308	{SMB_SIGNING_SUPPORTED, "enabled"},
309	{SMB_SIGNING_REQUIRED, "required"},
310	{SMB_SIGNING_REQUIRED, "mandatory"},
311	{SMB_SIGNING_REQUIRED, "force"},
312	{SMB_SIGNING_REQUIRED, "forced"},
313	{SMB_SIGNING_REQUIRED, "enforced"},
314	{SMB_SIGNING_AUTO, "auto"},
315	{-1, NULL}
316};
317
318static const struct enum_list enum_server_role[] = {
319	{ROLE_STANDALONE, "standalone"},
320	{ROLE_DOMAIN_MEMBER, "member server"},
321	{ROLE_DOMAIN_MEMBER, "member"},
322	{ROLE_DOMAIN_CONTROLLER, "domain controller"},
323	{ROLE_DOMAIN_CONTROLLER, "dc"},
324	{-1, NULL}
325};
326
327
328#define GLOBAL_VAR(name) offsetof(struct loadparm_global, name)
329#define LOCAL_VAR(name) offsetof(struct loadparm_service, name)
330
331static struct parm_struct parm_table[] = {
332	{"server role", P_ENUM, P_GLOBAL, GLOBAL_VAR(server_role), NULL, enum_server_role},
333
334	{"dos charset", P_STRING, P_GLOBAL, GLOBAL_VAR(dos_charset), NULL, NULL},
335	{"unix charset", P_STRING, P_GLOBAL, GLOBAL_VAR(unix_charset), NULL, NULL},
336	{"ncalrpc dir", P_STRING, P_GLOBAL, GLOBAL_VAR(ncalrpc_dir), NULL, NULL},
337	{"display charset", P_STRING, P_GLOBAL, GLOBAL_VAR(display_charset), NULL, NULL},
338	{"comment", P_STRING, P_LOCAL, LOCAL_VAR(comment), NULL, NULL},
339	{"path", P_STRING, P_LOCAL, LOCAL_VAR(szPath), NULL, NULL},
340	{"directory", P_STRING, P_LOCAL, LOCAL_VAR(szPath), NULL, NULL},
341	{"workgroup", P_USTRING, P_GLOBAL, GLOBAL_VAR(szWorkgroup), NULL, NULL},
342	{"realm", P_STRING, P_GLOBAL, GLOBAL_VAR(szRealm), NULL, NULL},
343	{"netbios name", P_USTRING, P_GLOBAL, GLOBAL_VAR(szNetbiosName), NULL, NULL},
344	{"netbios aliases", P_LIST, P_GLOBAL, GLOBAL_VAR(szNetbiosAliases), NULL, NULL},
345	{"netbios scope", P_USTRING, P_GLOBAL, GLOBAL_VAR(szNetbiosScope), NULL, NULL},
346	{"server string", P_STRING, P_GLOBAL, GLOBAL_VAR(szServerString), NULL, NULL},
347	{"interfaces", P_LIST, P_GLOBAL, GLOBAL_VAR(szInterfaces), NULL, NULL},
348	{"bind interfaces only", P_BOOL, P_GLOBAL, GLOBAL_VAR(bBindInterfacesOnly), NULL, NULL},
349	{"ntvfs handler", P_LIST, P_LOCAL, LOCAL_VAR(ntvfs_handler), NULL, NULL},
350	{"ntptr providor", P_STRING, P_GLOBAL, GLOBAL_VAR(ntptr_providor), NULL, NULL},
351	{"dcerpc endpoint servers", P_LIST, P_GLOBAL, GLOBAL_VAR(dcerpc_ep_servers), NULL, NULL},
352	{"server services", P_LIST, P_GLOBAL, GLOBAL_VAR(server_services), NULL, NULL},
353
354	{"security", P_ENUM, P_GLOBAL, GLOBAL_VAR(security), NULL, enum_security},
355	{"encrypt passwords", P_BOOL, P_GLOBAL, GLOBAL_VAR(bEncryptPasswords), NULL, NULL},
356	{"null passwords", P_BOOL, P_GLOBAL, GLOBAL_VAR(bNullPasswords), NULL, NULL},
357	{"obey pam restrictions", P_BOOL, P_GLOBAL, GLOBAL_VAR(bObeyPamRestrictions), NULL, NULL},
358	{"password server", P_LIST, P_GLOBAL, GLOBAL_VAR(szPasswordServers), NULL, NULL},
359	{"sam database", P_STRING, P_GLOBAL, GLOBAL_VAR(szSAM_URL), NULL, NULL},
360	{"idmap database", P_STRING, P_GLOBAL, GLOBAL_VAR(szIDMAP_URL), NULL, NULL},
361	{"secrets database", P_STRING, P_GLOBAL, GLOBAL_VAR(szSECRETS_URL), NULL, NULL},
362	{"spoolss database", P_STRING, P_GLOBAL, GLOBAL_VAR(szSPOOLSS_URL), NULL, NULL},
363	{"wins config database", P_STRING, P_GLOBAL, GLOBAL_VAR(szWINS_CONFIG_URL), NULL, NULL},
364	{"wins database", P_STRING, P_GLOBAL, GLOBAL_VAR(szWINS_URL), NULL, NULL},
365	{"private dir", P_STRING, P_GLOBAL, GLOBAL_VAR(szPrivateDir), NULL, NULL},
366	{"passwd chat", P_STRING, P_GLOBAL, GLOBAL_VAR(szPasswdChat), NULL, NULL},
367	{"password level", P_INTEGER, P_GLOBAL, GLOBAL_VAR(pwordlevel), NULL, NULL},
368	{"lanman auth", P_BOOL, P_GLOBAL, GLOBAL_VAR(bLanmanAuth), NULL, NULL},
369	{"ntlm auth", P_BOOL, P_GLOBAL, GLOBAL_VAR(bNTLMAuth), NULL, NULL},
370	{"client NTLMv2 auth", P_BOOL, P_GLOBAL, GLOBAL_VAR(bClientNTLMv2Auth), NULL, NULL},
371	{"client lanman auth", P_BOOL, P_GLOBAL, GLOBAL_VAR(bClientLanManAuth), NULL, NULL},
372	{"client plaintext auth", P_BOOL, P_GLOBAL, GLOBAL_VAR(bClientPlaintextAuth), NULL, NULL},
373	{"client use spnego principal", P_BOOL, P_GLOBAL, GLOBAL_VAR(client_use_spnego_principal), NULL, NULL},
374
375	{"read only", P_BOOL, P_LOCAL, LOCAL_VAR(bRead_only), NULL, NULL},
376
377	{"create mask", P_OCTAL, P_LOCAL, LOCAL_VAR(iCreate_mask), NULL, NULL},
378	{"force create mode", P_OCTAL, P_LOCAL, LOCAL_VAR(iCreate_force_mode), NULL, NULL},
379	{"directory mask", P_OCTAL, P_LOCAL, LOCAL_VAR(iDir_mask), NULL, NULL},
380	{"force directory mode", P_OCTAL, P_LOCAL, LOCAL_VAR(iDir_force_mode), NULL, NULL},
381
382	{"hosts allow", P_LIST, P_LOCAL, LOCAL_VAR(szHostsallow), NULL, NULL},
383	{"hosts deny", P_LIST, P_LOCAL, LOCAL_VAR(szHostsdeny), NULL, NULL},
384
385	{"log level", P_INTEGER, P_GLOBAL, GLOBAL_VAR(debuglevel), handle_debuglevel, NULL},
386	{"debuglevel", P_INTEGER, P_GLOBAL, GLOBAL_VAR(debuglevel), handle_debuglevel, NULL},
387	{"log file", P_STRING, P_GLOBAL, GLOBAL_VAR(logfile), handle_logfile, NULL},
388
389	{"smb ports", P_LIST, P_GLOBAL, GLOBAL_VAR(smb_ports), NULL, NULL},
390	{"nbt port", P_INTEGER, P_GLOBAL, GLOBAL_VAR(nbt_port), NULL, NULL},
391	{"dgram port", P_INTEGER, P_GLOBAL, GLOBAL_VAR(dgram_port), NULL, NULL},
392	{"cldap port", P_INTEGER, P_GLOBAL, GLOBAL_VAR(cldap_port), NULL, NULL},
393	{"krb5 port", P_INTEGER, P_GLOBAL, GLOBAL_VAR(krb5_port), NULL, NULL},
394	{"kpasswd port", P_INTEGER, P_GLOBAL, GLOBAL_VAR(kpasswd_port), NULL, NULL},
395	{"web port", P_INTEGER, P_GLOBAL, GLOBAL_VAR(web_port), NULL, NULL},
396	{"tls enabled", P_BOOL, P_GLOBAL, GLOBAL_VAR(tls_enabled), NULL, NULL},
397	{"tls keyfile", P_STRING, P_GLOBAL, GLOBAL_VAR(tls_keyfile), NULL, NULL},
398	{"tls certfile", P_STRING, P_GLOBAL, GLOBAL_VAR(tls_certfile), NULL, NULL},
399	{"tls cafile", P_STRING, P_GLOBAL, GLOBAL_VAR(tls_cafile), NULL, NULL},
400	{"tls crlfile", P_STRING, P_GLOBAL, GLOBAL_VAR(tls_crlfile), NULL, NULL},
401	{"tls dh params file", P_STRING, P_GLOBAL, GLOBAL_VAR(tls_dhpfile), NULL, NULL},
402	{"swat directory", P_STRING, P_GLOBAL, GLOBAL_VAR(swat_directory), NULL, NULL},
403	{"large readwrite", P_BOOL, P_GLOBAL, GLOBAL_VAR(bLargeReadwrite), NULL, NULL},
404	{"server max protocol", P_ENUM, P_GLOBAL, GLOBAL_VAR(srv_maxprotocol), NULL, enum_protocol},
405	{"server min protocol", P_ENUM, P_GLOBAL, GLOBAL_VAR(srv_minprotocol), NULL, enum_protocol},
406	{"client max protocol", P_ENUM, P_GLOBAL, GLOBAL_VAR(cli_maxprotocol), NULL, enum_protocol},
407	{"client min protocol", P_ENUM, P_GLOBAL, GLOBAL_VAR(cli_minprotocol), NULL, enum_protocol},
408	{"unicode", P_BOOL, P_GLOBAL, GLOBAL_VAR(bUnicode), NULL, NULL},
409	{"read raw", P_BOOL, P_GLOBAL, GLOBAL_VAR(bReadRaw), NULL, NULL},
410	{"write raw", P_BOOL, P_GLOBAL, GLOBAL_VAR(bWriteRaw), NULL, NULL},
411	{"disable netbios", P_BOOL, P_GLOBAL, GLOBAL_VAR(bDisableNetbios), NULL, NULL},
412
413	{"nt status support", P_BOOL, P_GLOBAL, GLOBAL_VAR(bNTStatusSupport), NULL, NULL},
414
415	{"announce version", P_STRING, P_GLOBAL, GLOBAL_VAR(szAnnounceVersion), NULL, NULL},
416	{"announce as", P_ENUM, P_GLOBAL, GLOBAL_VAR(announce_as), NULL, enum_announce_as},
417	{"max mux", P_INTEGER, P_GLOBAL, GLOBAL_VAR(max_mux), NULL, NULL},
418	{"max xmit", P_BYTES, P_GLOBAL, GLOBAL_VAR(max_xmit), NULL, NULL},
419
420	{"name resolve order", P_LIST, P_GLOBAL, GLOBAL_VAR(szNameResolveOrder), NULL, NULL},
421	{"max wins ttl", P_INTEGER, P_GLOBAL, GLOBAL_VAR(max_wins_ttl), NULL, NULL},
422	{"min wins ttl", P_INTEGER, P_GLOBAL, GLOBAL_VAR(min_wins_ttl), NULL, NULL},
423	{"time server", P_BOOL, P_GLOBAL, GLOBAL_VAR(bTimeServer), NULL, NULL},
424	{"unix extensions", P_BOOL, P_GLOBAL, GLOBAL_VAR(bUnixExtensions), NULL, NULL},
425	{"use spnego", P_BOOL, P_GLOBAL, GLOBAL_VAR(bUseSpnego), NULL, NULL},
426	{"server signing", P_ENUM, P_GLOBAL, GLOBAL_VAR(server_signing), NULL, enum_smb_signing_vals},
427	{"client signing", P_ENUM, P_GLOBAL, GLOBAL_VAR(client_signing), NULL, enum_smb_signing_vals},
428	{"rpc big endian", P_BOOL, P_GLOBAL, GLOBAL_VAR(bRpcBigEndian), NULL, NULL},
429
430	{"max connections", P_INTEGER, P_LOCAL, LOCAL_VAR(iMaxConnections), NULL, NULL},
431	{"paranoid server security", P_BOOL, P_GLOBAL, GLOBAL_VAR(paranoid_server_security), NULL, NULL},
432	{"socket options", P_STRING, P_GLOBAL, GLOBAL_VAR(socket_options), NULL, NULL},
433
434	{"strict sync", P_BOOL, P_LOCAL, LOCAL_VAR(bStrictSync), NULL, NULL},
435	{"case insensitive filesystem", P_BOOL, P_LOCAL, LOCAL_VAR(bCIFileSystem), NULL, NULL},
436
437	{"max print jobs", P_INTEGER, P_LOCAL, LOCAL_VAR(iMaxPrintJobs), NULL, NULL},
438	{"printable", P_BOOL, P_LOCAL, LOCAL_VAR(bPrint_ok), NULL, NULL},
439	{"print ok", P_BOOL, P_LOCAL, LOCAL_VAR(bPrint_ok), NULL, NULL},
440
441	{"printer name", P_STRING, P_LOCAL, LOCAL_VAR(szPrintername), NULL, NULL},
442	{"printer", P_STRING, P_LOCAL, LOCAL_VAR(szPrintername), NULL, NULL},
443
444	{"map system", P_BOOL, P_LOCAL, LOCAL_VAR(bMap_system), NULL, NULL},
445	{"map hidden", P_BOOL, P_LOCAL, LOCAL_VAR(bMap_hidden), NULL, NULL},
446	{"map archive", P_BOOL, P_LOCAL, LOCAL_VAR(bMap_archive), NULL, NULL},
447
448	{"preferred master", P_ENUM, P_GLOBAL, GLOBAL_VAR(bPreferredMaster), NULL, enum_bool_auto},
449	{"prefered master", P_ENUM, P_GLOBAL, GLOBAL_VAR(bPreferredMaster), NULL, enum_bool_auto},
450	{"local master", P_BOOL, P_GLOBAL, GLOBAL_VAR(bLocalMaster), NULL, NULL},
451	{"browseable", P_BOOL, P_LOCAL, LOCAL_VAR(bBrowseable), NULL, NULL},
452	{"browsable", P_BOOL, P_LOCAL, LOCAL_VAR(bBrowseable), NULL, NULL},
453
454	{"wins server", P_LIST, P_GLOBAL, GLOBAL_VAR(szWINSservers), NULL, NULL},
455	{"wins support", P_BOOL, P_GLOBAL, GLOBAL_VAR(bWINSsupport), NULL, NULL},
456	{"dns proxy", P_BOOL, P_GLOBAL, GLOBAL_VAR(bWINSdnsProxy), NULL, NULL},
457	{"wins hook", P_STRING, P_GLOBAL, GLOBAL_VAR(szWINSHook), NULL, NULL},
458
459	{"csc policy", P_ENUM, P_LOCAL, LOCAL_VAR(iCSCPolicy), NULL, enum_csc_policy},
460
461	{"strict locking", P_BOOL, P_LOCAL, LOCAL_VAR(bStrictLocking), NULL, NULL},
462	{"oplocks", P_BOOL, P_LOCAL, LOCAL_VAR(bOplocks), NULL, NULL},
463
464	{"share backend", P_STRING, P_GLOBAL, GLOBAL_VAR(szShareBackend), NULL, NULL},
465	{"preload", P_STRING, P_GLOBAL, GLOBAL_VAR(szAutoServices), NULL, NULL},
466	{"auto services", P_STRING, P_GLOBAL, GLOBAL_VAR(szAutoServices), NULL, NULL},
467	{"lock dir", P_STRING, P_GLOBAL, GLOBAL_VAR(szLockDir), NULL, NULL},
468	{"lock directory", P_STRING, P_GLOBAL, GLOBAL_VAR(szLockDir), NULL, NULL},
469	{"modules dir", P_STRING, P_GLOBAL, GLOBAL_VAR(szModulesDir), NULL, NULL},
470	{"pid directory", P_STRING, P_GLOBAL, GLOBAL_VAR(szPidDir), NULL, NULL},
471	{"setup directory", P_STRING, P_GLOBAL, GLOBAL_VAR(szSetupDir), NULL, NULL},
472
473	{"socket address", P_STRING, P_GLOBAL, GLOBAL_VAR(szSocketAddress), NULL, NULL},
474	{"copy", P_STRING, P_LOCAL, LOCAL_VAR(szCopy), handle_copy, NULL},
475	{"include", P_STRING, P_LOCAL, LOCAL_VAR(szInclude), handle_include, NULL},
476
477	{"available", P_BOOL, P_LOCAL, LOCAL_VAR(bAvailable), NULL, NULL},
478	{"volume", P_STRING, P_LOCAL, LOCAL_VAR(volume), NULL, NULL },
479	{"fstype", P_STRING, P_LOCAL, LOCAL_VAR(fstype), NULL, NULL},
480
481	{"panic action", P_STRING, P_GLOBAL, GLOBAL_VAR(panic_action), NULL, NULL},
482
483	{"msdfs root", P_BOOL, P_LOCAL, LOCAL_VAR(bMSDfsRoot), NULL, NULL},
484	{"host msdfs", P_BOOL, P_GLOBAL, GLOBAL_VAR(bHostMSDfs), NULL, NULL},
485	{"winbind separator", P_STRING, P_GLOBAL, GLOBAL_VAR(szWinbindSeparator), NULL, NULL },
486	{"winbindd socket directory", P_STRING, P_GLOBAL, GLOBAL_VAR(szWinbinddSocketDirectory), NULL, NULL },
487	{"winbindd privileged socket directory", P_STRING, P_GLOBAL, GLOBAL_VAR(szWinbinddPrivilegedSocketDirectory), NULL, NULL },
488	{"winbind sealed pipes", P_BOOL, P_GLOBAL, GLOBAL_VAR(bWinbindSealedPipes), NULL, NULL },
489	{"template shell", P_STRING, P_GLOBAL, GLOBAL_VAR(szTemplateShell), NULL, NULL },
490	{"template homedir", P_STRING, P_GLOBAL, GLOBAL_VAR(szTemplateHomedir), NULL, NULL },
491	{"idmap trusted only", P_BOOL, P_GLOBAL, GLOBAL_VAR(bIdmapTrustedOnly), NULL, NULL},
492
493	{"ntp signd socket directory", P_STRING, P_GLOBAL, GLOBAL_VAR(szNTPSignDSocketDirectory), NULL, NULL },
494
495	{NULL, P_BOOL, P_NONE, 0, NULL, NULL}
496};
497
498
499/* local variables */
500struct loadparm_context {
501	const char *szConfigFile;
502	struct loadparm_global *globals;
503	struct loadparm_service **services;
504	struct loadparm_service *sDefault;
505	int iNumServices;
506	struct loadparm_service *currentService;
507	bool bInGlobalSection;
508	struct file_lists {
509		struct file_lists *next;
510		char *name;
511		char *subfname;
512		time_t modtime;
513	} *file_lists;
514	unsigned int flags[NUMPARAMETERS];
515	struct smb_iconv_convenience *iconv_convenience;
516};
517
518
519struct loadparm_service *lp_default_service(struct loadparm_context *lp_ctx)
520{
521	return lp_ctx->sDefault;
522}
523
524/*
525  return the parameter table
526*/
527struct parm_struct *lp_parm_table(void)
528{
529	return parm_table;
530}
531
532/**
533 * Convenience routine to grab string parameters into temporary memory
534 * and run standard_sub_basic on them.
535 *
536 * The buffers can be written to by
537 * callers without affecting the source string.
538 */
539
540static const char *lp_string(const char *s)
541{
542#if 0  /* until REWRITE done to make thread-safe */
543	size_t len = s ? strlen(s) : 0;
544	char *ret;
545#endif
546
547	/* The follow debug is useful for tracking down memory problems
548	   especially if you have an inner loop that is calling a lp_*()
549	   function that returns a string.  Perhaps this debug should be
550	   present all the time? */
551
552#if 0
553	DEBUG(10, ("lp_string(%s)\n", s));
554#endif
555
556#if 0  /* until REWRITE done to make thread-safe */
557	if (!lp_talloc)
558		lp_talloc = talloc_init("lp_talloc");
559
560	ret = talloc_array(lp_talloc, char, len + 100);	/* leave room for substitution */
561
562	if (!ret)
563		return NULL;
564
565	if (!s)
566		*ret = 0;
567	else
568		strlcpy(ret, s, len);
569
570	if (trim_string(ret, "\"", "\"")) {
571		if (strchr(ret,'"') != NULL)
572			strlcpy(ret, s, len);
573	}
574
575	standard_sub_basic(ret,len+100);
576	return (ret);
577#endif
578	return s;
579}
580
581/*
582   In this section all the functions that are used to access the
583   parameters from the rest of the program are defined
584*/
585
586#define FN_GLOBAL_STRING(fn_name,var_name) \
587 const char *fn_name(struct loadparm_context *lp_ctx) {if (lp_ctx == NULL) return NULL; return lp_ctx->globals->var_name ? lp_string(lp_ctx->globals->var_name) : "";}
588#define FN_GLOBAL_CONST_STRING(fn_name,var_name) \
589 const char *fn_name(struct loadparm_context *lp_ctx) {if (lp_ctx == NULL) return NULL; return lp_ctx->globals->var_name ? lp_ctx->globals->var_name : "";}
590#define FN_GLOBAL_LIST(fn_name,var_name) \
591 const char **fn_name(struct loadparm_context *lp_ctx) {if (lp_ctx == NULL) return NULL; return lp_ctx->globals->var_name;}
592#define FN_GLOBAL_BOOL(fn_name,var_name) \
593 bool fn_name(struct loadparm_context *lp_ctx) {if (lp_ctx == NULL) return false; return lp_ctx->globals->var_name;}
594#if 0 /* unused */
595#define FN_GLOBAL_CHAR(fn_name,ptr) \
596 char fn_name(void) {return(*(char *)(ptr));}
597#endif
598#define FN_GLOBAL_INTEGER(fn_name,var_name) \
599 int fn_name(struct loadparm_context *lp_ctx) {return lp_ctx->globals->var_name;}
600
601#define FN_LOCAL_STRING(fn_name,val) \
602 const char *fn_name(struct loadparm_service *service, struct loadparm_service *sDefault) {return(lp_string((const char *)((service != NULL && service->val != NULL) ? service->val : sDefault->val)));}
603#define FN_LOCAL_LIST(fn_name,val) \
604 const char **fn_name(struct loadparm_service *service, struct loadparm_service *sDefault) {return(const char **)(service != NULL && service->val != NULL? service->val : sDefault->val);}
605#define FN_LOCAL_BOOL(fn_name,val) \
606 bool fn_name(struct loadparm_service *service, struct loadparm_service *sDefault) {return((service != NULL)? service->val : sDefault->val);}
607#define FN_LOCAL_INTEGER(fn_name,val) \
608 int fn_name(struct loadparm_service *service, struct loadparm_service *sDefault) {return((service != NULL)? service->val : sDefault->val);}
609
610_PUBLIC_ FN_GLOBAL_INTEGER(lp_server_role, server_role)
611_PUBLIC_ FN_GLOBAL_LIST(lp_smb_ports, smb_ports)
612_PUBLIC_ FN_GLOBAL_INTEGER(lp_nbt_port, nbt_port)
613_PUBLIC_ FN_GLOBAL_INTEGER(lp_dgram_port, dgram_port)
614_PUBLIC_ FN_GLOBAL_INTEGER(lp_cldap_port, cldap_port)
615_PUBLIC_ FN_GLOBAL_INTEGER(lp_krb5_port, krb5_port)
616_PUBLIC_ FN_GLOBAL_INTEGER(lp_kpasswd_port, kpasswd_port)
617_PUBLIC_ FN_GLOBAL_INTEGER(lp_web_port, web_port)
618_PUBLIC_ FN_GLOBAL_STRING(lp_swat_directory, swat_directory)
619_PUBLIC_ FN_GLOBAL_BOOL(lp_tls_enabled, tls_enabled)
620_PUBLIC_ FN_GLOBAL_STRING(lp_share_backend, szShareBackend)
621_PUBLIC_ FN_GLOBAL_STRING(lp_sam_url, szSAM_URL)
622_PUBLIC_ FN_GLOBAL_STRING(lp_idmap_url, szIDMAP_URL)
623_PUBLIC_ FN_GLOBAL_STRING(lp_secrets_url, szSECRETS_URL)
624_PUBLIC_ FN_GLOBAL_STRING(lp_spoolss_url, szSPOOLSS_URL)
625_PUBLIC_ FN_GLOBAL_STRING(lp_wins_config_url, szWINS_CONFIG_URL)
626_PUBLIC_ FN_GLOBAL_STRING(lp_wins_url, szWINS_URL)
627_PUBLIC_ FN_GLOBAL_CONST_STRING(lp_winbind_separator, szWinbindSeparator)
628_PUBLIC_ FN_GLOBAL_CONST_STRING(lp_winbindd_socket_directory, szWinbinddSocketDirectory)
629_PUBLIC_ FN_GLOBAL_CONST_STRING(lp_winbindd_privileged_socket_directory, szWinbinddPrivilegedSocketDirectory)
630_PUBLIC_ FN_GLOBAL_CONST_STRING(lp_template_shell, szTemplateShell)
631_PUBLIC_ FN_GLOBAL_CONST_STRING(lp_template_homedir, szTemplateHomedir)
632_PUBLIC_ FN_GLOBAL_BOOL(lp_winbind_sealed_pipes, bWinbindSealedPipes)
633_PUBLIC_ FN_GLOBAL_BOOL(lp_idmap_trusted_only, bIdmapTrustedOnly)
634_PUBLIC_ FN_GLOBAL_STRING(lp_private_dir, szPrivateDir)
635_PUBLIC_ FN_GLOBAL_STRING(lp_serverstring, szServerString)
636_PUBLIC_ FN_GLOBAL_STRING(lp_lockdir, szLockDir)
637_PUBLIC_ FN_GLOBAL_STRING(lp_modulesdir, szModulesDir)
638_PUBLIC_ FN_GLOBAL_STRING(lp_setupdir, szSetupDir)
639_PUBLIC_ FN_GLOBAL_STRING(lp_ncalrpc_dir, ncalrpc_dir)
640_PUBLIC_ FN_GLOBAL_STRING(lp_dos_charset, dos_charset)
641_PUBLIC_ FN_GLOBAL_STRING(lp_unix_charset, unix_charset)
642_PUBLIC_ FN_GLOBAL_STRING(lp_display_charset, display_charset)
643_PUBLIC_ FN_GLOBAL_STRING(lp_piddir, szPidDir)
644_PUBLIC_ FN_GLOBAL_LIST(lp_dcerpc_endpoint_servers, dcerpc_ep_servers)
645_PUBLIC_ FN_GLOBAL_LIST(lp_server_services, server_services)
646_PUBLIC_ FN_GLOBAL_STRING(lp_ntptr_providor, ntptr_providor)
647_PUBLIC_ FN_GLOBAL_STRING(lp_auto_services, szAutoServices)
648_PUBLIC_ FN_GLOBAL_STRING(lp_passwd_chat, szPasswdChat)
649_PUBLIC_ FN_GLOBAL_LIST(lp_passwordserver, szPasswordServers)
650_PUBLIC_ FN_GLOBAL_LIST(lp_name_resolve_order, szNameResolveOrder)
651_PUBLIC_ FN_GLOBAL_STRING(lp_realm, szRealm)
652_PUBLIC_ FN_GLOBAL_STRING(lp_socket_options, socket_options)
653_PUBLIC_ FN_GLOBAL_STRING(lp_workgroup, szWorkgroup)
654_PUBLIC_ FN_GLOBAL_STRING(lp_netbios_name, szNetbiosName)
655_PUBLIC_ FN_GLOBAL_STRING(lp_netbios_scope, szNetbiosScope)
656_PUBLIC_ FN_GLOBAL_LIST(lp_wins_server_list, szWINSservers)
657_PUBLIC_ FN_GLOBAL_LIST(lp_interfaces, szInterfaces)
658_PUBLIC_ FN_GLOBAL_STRING(lp_socket_address, szSocketAddress)
659_PUBLIC_ FN_GLOBAL_LIST(lp_netbios_aliases, szNetbiosAliases)
660
661_PUBLIC_ FN_GLOBAL_BOOL(lp_disable_netbios, bDisableNetbios)
662_PUBLIC_ FN_GLOBAL_BOOL(lp_wins_support, bWINSsupport)
663_PUBLIC_ FN_GLOBAL_BOOL(lp_wins_dns_proxy, bWINSdnsProxy)
664_PUBLIC_ FN_GLOBAL_STRING(lp_wins_hook, szWINSHook)
665_PUBLIC_ FN_GLOBAL_BOOL(lp_local_master, bLocalMaster)
666_PUBLIC_ FN_GLOBAL_BOOL(lp_readraw, bReadRaw)
667_PUBLIC_ FN_GLOBAL_BOOL(lp_large_readwrite, bLargeReadwrite)
668_PUBLIC_ FN_GLOBAL_BOOL(lp_writeraw, bWriteRaw)
669_PUBLIC_ FN_GLOBAL_BOOL(lp_null_passwords, bNullPasswords)
670_PUBLIC_ FN_GLOBAL_BOOL(lp_obey_pam_restrictions, bObeyPamRestrictions)
671_PUBLIC_ FN_GLOBAL_BOOL(lp_encrypted_passwords, bEncryptPasswords)
672_PUBLIC_ FN_GLOBAL_BOOL(lp_time_server, bTimeServer)
673_PUBLIC_ FN_GLOBAL_BOOL(lp_bind_interfaces_only, bBindInterfacesOnly)
674_PUBLIC_ FN_GLOBAL_BOOL(lp_unicode, bUnicode)
675_PUBLIC_ FN_GLOBAL_BOOL(lp_nt_status_support, bNTStatusSupport)
676_PUBLIC_ FN_GLOBAL_BOOL(lp_lanman_auth, bLanmanAuth)
677_PUBLIC_ FN_GLOBAL_BOOL(lp_ntlm_auth, bNTLMAuth)
678_PUBLIC_ FN_GLOBAL_BOOL(lp_client_plaintext_auth, bClientPlaintextAuth)
679_PUBLIC_ FN_GLOBAL_BOOL(lp_client_lanman_auth, bClientLanManAuth)
680_PUBLIC_ FN_GLOBAL_BOOL(lp_client_ntlmv2_auth, bClientNTLMv2Auth)
681_PUBLIC_ FN_GLOBAL_BOOL(lp_client_use_spnego_principal, client_use_spnego_principal)
682_PUBLIC_ FN_GLOBAL_BOOL(lp_host_msdfs, bHostMSDfs)
683_PUBLIC_ FN_GLOBAL_BOOL(lp_unix_extensions, bUnixExtensions)
684_PUBLIC_ FN_GLOBAL_BOOL(lp_use_spnego, bUseSpnego)
685_PUBLIC_ FN_GLOBAL_BOOL(lp_rpc_big_endian, bRpcBigEndian)
686_PUBLIC_ FN_GLOBAL_INTEGER(lp_max_wins_ttl, max_wins_ttl)
687_PUBLIC_ FN_GLOBAL_INTEGER(lp_min_wins_ttl, min_wins_ttl)
688_PUBLIC_ FN_GLOBAL_INTEGER(lp_maxmux, max_mux)
689_PUBLIC_ FN_GLOBAL_INTEGER(lp_max_xmit, max_xmit)
690_PUBLIC_ FN_GLOBAL_INTEGER(lp_passwordlevel, pwordlevel)
691_PUBLIC_ FN_GLOBAL_INTEGER(lp_srv_maxprotocol, srv_maxprotocol)
692_PUBLIC_ FN_GLOBAL_INTEGER(lp_srv_minprotocol, srv_minprotocol)
693_PUBLIC_ FN_GLOBAL_INTEGER(lp_cli_maxprotocol, cli_maxprotocol)
694_PUBLIC_ FN_GLOBAL_INTEGER(lp_cli_minprotocol, cli_minprotocol)
695_PUBLIC_ FN_GLOBAL_INTEGER(lp_security, security)
696_PUBLIC_ FN_GLOBAL_BOOL(lp_paranoid_server_security, paranoid_server_security)
697_PUBLIC_ FN_GLOBAL_INTEGER(lp_announce_as, announce_as)
698const char *lp_servicename(const struct loadparm_service *service)
699{
700	return lp_string((const char *)service->szService);
701}
702
703_PUBLIC_ FN_LOCAL_STRING(lp_pathname, szPath)
704static FN_LOCAL_STRING(_lp_printername, szPrintername)
705_PUBLIC_ FN_LOCAL_LIST(lp_hostsallow, szHostsallow)
706_PUBLIC_ FN_LOCAL_LIST(lp_hostsdeny, szHostsdeny)
707_PUBLIC_ FN_LOCAL_STRING(lp_comment, comment)
708_PUBLIC_ FN_LOCAL_STRING(lp_fstype, fstype)
709static FN_LOCAL_STRING(lp_volume, volume)
710_PUBLIC_ FN_LOCAL_LIST(lp_ntvfs_handler, ntvfs_handler)
711_PUBLIC_ FN_LOCAL_BOOL(lp_msdfs_root, bMSDfsRoot)
712_PUBLIC_ FN_LOCAL_BOOL(lp_browseable, bBrowseable)
713_PUBLIC_ FN_LOCAL_BOOL(lp_readonly, bRead_only)
714_PUBLIC_ FN_LOCAL_BOOL(lp_print_ok, bPrint_ok)
715_PUBLIC_ FN_LOCAL_BOOL(lp_map_hidden, bMap_hidden)
716_PUBLIC_ FN_LOCAL_BOOL(lp_map_archive, bMap_archive)
717_PUBLIC_ FN_LOCAL_BOOL(lp_strict_locking, bStrictLocking)
718_PUBLIC_ FN_LOCAL_BOOL(lp_oplocks, bOplocks)
719_PUBLIC_ FN_LOCAL_BOOL(lp_strict_sync, bStrictSync)
720_PUBLIC_ FN_LOCAL_BOOL(lp_ci_filesystem, bCIFileSystem)
721_PUBLIC_ FN_LOCAL_BOOL(lp_map_system, bMap_system)
722_PUBLIC_ FN_LOCAL_INTEGER(lp_max_connections, iMaxConnections)
723_PUBLIC_ FN_LOCAL_INTEGER(lp_csc_policy, iCSCPolicy)
724_PUBLIC_ FN_LOCAL_INTEGER(lp_create_mask, iCreate_mask)
725_PUBLIC_ FN_LOCAL_INTEGER(lp_force_create_mode, iCreate_force_mode)
726_PUBLIC_ FN_LOCAL_INTEGER(lp_dir_mask, iDir_mask)
727_PUBLIC_ FN_LOCAL_INTEGER(lp_force_dir_mode, iDir_force_mode)
728_PUBLIC_ FN_GLOBAL_INTEGER(lp_server_signing, server_signing)
729_PUBLIC_ FN_GLOBAL_INTEGER(lp_client_signing, client_signing)
730
731_PUBLIC_ FN_GLOBAL_CONST_STRING(lp_ntp_signd_socket_directory, szNTPSignDSocketDirectory)
732
733/* local prototypes */
734static int map_parameter(const char *pszParmName);
735static struct loadparm_service *getservicebyname(struct loadparm_context *lp_ctx,
736					const char *pszServiceName);
737static void copy_service(struct loadparm_service *pserviceDest,
738			 struct loadparm_service *pserviceSource,
739			 int *pcopymapDest);
740static bool service_ok(struct loadparm_service *service);
741static bool do_section(const char *pszSectionName, void *);
742static void init_copymap(struct loadparm_service *pservice);
743
744/* This is a helper function for parametrical options support. */
745/* It returns a pointer to parametrical option value if it exists or NULL otherwise */
746/* Actual parametrical functions are quite simple */
747const char *lp_get_parametric(struct loadparm_context *lp_ctx,
748			      struct loadparm_service *service,
749			      const char *type, const char *option)
750{
751	char *vfskey;
752        struct parmlist_entry *data;
753
754	if (lp_ctx == NULL)
755		return NULL;
756
757	data = (service == NULL ? lp_ctx->globals->param_opt : service->param_opt);
758
759	asprintf(&vfskey, "%s:%s", type, option);
760	strlower(vfskey);
761
762	while (data) {
763		if (strcmp(data->key, vfskey) == 0) {
764			free(vfskey);
765			return data->value;
766		}
767		data = data->next;
768	}
769
770	if (service != NULL) {
771		/* Try to fetch the same option but from globals */
772		/* but only if we are not already working with globals */
773		for (data = lp_ctx->globals->param_opt; data;
774		     data = data->next) {
775			if (strcmp(data->key, vfskey) == 0) {
776				free(vfskey);
777				return data->value;
778			}
779		}
780	}
781
782	free(vfskey);
783
784	return NULL;
785}
786
787
788/**
789 * convenience routine to return int parameters.
790 */
791static int lp_int(const char *s)
792{
793
794	if (!s) {
795		DEBUG(0,("lp_int(%s): is called with NULL!\n",s));
796		return -1;
797	}
798
799	return strtol(s, NULL, 0);
800}
801
802/**
803 * convenience routine to return unsigned long parameters.
804 */
805static int lp_ulong(const char *s)
806{
807
808	if (!s) {
809		DEBUG(0,("lp_int(%s): is called with NULL!\n",s));
810		return -1;
811	}
812
813	return strtoul(s, NULL, 0);
814}
815
816/**
817 * convenience routine to return unsigned long parameters.
818 */
819static double lp_double(const char *s)
820{
821
822	if (!s) {
823		DEBUG(0,("lp_double(%s): is called with NULL!\n",s));
824		return -1;
825	}
826
827	return strtod(s, NULL);
828}
829
830/**
831 * convenience routine to return boolean parameters.
832 */
833static bool lp_bool(const char *s)
834{
835	bool ret = false;
836
837	if (!s) {
838		DEBUG(0,("lp_bool(%s): is called with NULL!\n",s));
839		return false;
840	}
841
842	if (!set_boolean(s, &ret)) {
843		DEBUG(0,("lp_bool(%s): value is not boolean!\n",s));
844		return false;
845	}
846
847	return ret;
848}
849
850
851/**
852 * Return parametric option from a given service. Type is a part of option before ':'
853 * Parametric option has following syntax: 'Type: option = value'
854 * Returned value is allocated in 'lp_talloc' context
855 */
856
857const char *lp_parm_string(struct loadparm_context *lp_ctx,
858			   struct loadparm_service *service, const char *type,
859			   const char *option)
860{
861	const char *value = lp_get_parametric(lp_ctx, service, type, option);
862
863	if (value)
864		return lp_string(value);
865
866	return NULL;
867}
868
869/**
870 * Return parametric option from a given service. Type is a part of option before ':'
871 * Parametric option has following syntax: 'Type: option = value'
872 * Returned value is allocated in 'lp_talloc' context
873 */
874
875const char **lp_parm_string_list(TALLOC_CTX *mem_ctx,
876				 struct loadparm_context *lp_ctx,
877				 struct loadparm_service *service,
878				 const char *type,
879				 const char *option, const char *separator)
880{
881	const char *value = lp_get_parametric(lp_ctx, service, type, option);
882
883	if (value != NULL)
884		return (const char **)str_list_make(mem_ctx, value, separator);
885
886	return NULL;
887}
888
889/**
890 * Return parametric option from a given service. Type is a part of option before ':'
891 * Parametric option has following syntax: 'Type: option = value'
892 */
893
894int lp_parm_int(struct loadparm_context *lp_ctx,
895		struct loadparm_service *service, const char *type,
896		const char *option, int default_v)
897{
898	const char *value = lp_get_parametric(lp_ctx, service, type, option);
899
900	if (value)
901		return lp_int(value);
902
903	return default_v;
904}
905
906/**
907 * Return parametric option from a given service. Type is a part of
908 * option before ':'.
909 * Parametric option has following syntax: 'Type: option = value'.
910 */
911
912int lp_parm_bytes(struct loadparm_context *lp_ctx,
913		  struct loadparm_service *service, const char *type,
914		  const char *option, int default_v)
915{
916	uint64_t bval;
917
918	const char *value = lp_get_parametric(lp_ctx, service, type, option);
919
920	if (value && conv_str_size(value, &bval)) {
921		if (bval <= INT_MAX) {
922			return (int)bval;
923		}
924	}
925
926	return default_v;
927}
928
929/**
930 * Return parametric option from a given service.
931 * Type is a part of option before ':'
932 * Parametric option has following syntax: 'Type: option = value'
933 */
934unsigned long lp_parm_ulong(struct loadparm_context *lp_ctx,
935			    struct loadparm_service *service, const char *type,
936			    const char *option, unsigned long default_v)
937{
938	const char *value = lp_get_parametric(lp_ctx, service, type, option);
939
940	if (value)
941		return lp_ulong(value);
942
943	return default_v;
944}
945
946
947double lp_parm_double(struct loadparm_context *lp_ctx,
948		      struct loadparm_service *service, const char *type,
949		      const char *option, double default_v)
950{
951	const char *value = lp_get_parametric(lp_ctx, service, type, option);
952
953	if (value != NULL)
954		return lp_double(value);
955
956	return default_v;
957}
958
959/**
960 * Return parametric option from a given service. Type is a part of option before ':'
961 * Parametric option has following syntax: 'Type: option = value'
962 */
963
964bool lp_parm_bool(struct loadparm_context *lp_ctx,
965		  struct loadparm_service *service, const char *type,
966		  const char *option, bool default_v)
967{
968	const char *value = lp_get_parametric(lp_ctx, service, type, option);
969
970	if (value != NULL)
971		return lp_bool(value);
972
973	return default_v;
974}
975
976
977/**
978 * Initialise a service to the defaults.
979 */
980
981static struct loadparm_service *init_service(TALLOC_CTX *mem_ctx, struct loadparm_service *sDefault)
982{
983	struct loadparm_service *pservice =
984		talloc_zero(mem_ctx, struct loadparm_service);
985	copy_service(pservice, sDefault, NULL);
986	return pservice;
987}
988
989/**
990 * Set a string value, deallocating any existing space, and allocing the space
991 * for the string
992 */
993static bool string_set(TALLOC_CTX *mem_ctx, char **dest, const char *src)
994{
995	talloc_free(*dest);
996
997	if (src == NULL)
998		src = "";
999
1000	*dest = talloc_strdup(mem_ctx, src);
1001	if ((*dest) == NULL) {
1002		DEBUG(0,("Out of memory in string_init\n"));
1003		return false;
1004	}
1005
1006	return true;
1007}
1008
1009
1010
1011/**
1012 * Add a new service to the services array initialising it with the given
1013 * service.
1014 */
1015
1016struct loadparm_service *lp_add_service(struct loadparm_context *lp_ctx,
1017				     const struct loadparm_service *pservice,
1018				     const char *name)
1019{
1020	int i;
1021	struct loadparm_service tservice;
1022	int num_to_alloc = lp_ctx->iNumServices + 1;
1023	struct parmlist_entry *data, *pdata;
1024
1025	tservice = *pservice;
1026
1027	/* it might already exist */
1028	if (name) {
1029		struct loadparm_service *service = getservicebyname(lp_ctx,
1030								    name);
1031		if (service != NULL) {
1032			/* Clean all parametric options for service */
1033			/* They will be added during parsing again */
1034			data = service->param_opt;
1035			while (data) {
1036				pdata = data->next;
1037				talloc_free(data);
1038				data = pdata;
1039			}
1040			service->param_opt = NULL;
1041			return service;
1042		}
1043	}
1044
1045	/* find an invalid one */
1046	for (i = 0; i < lp_ctx->iNumServices; i++)
1047		if (lp_ctx->services[i] == NULL)
1048			break;
1049
1050	/* if not, then create one */
1051	if (i == lp_ctx->iNumServices) {
1052		struct loadparm_service **tsp;
1053
1054		tsp = talloc_realloc(lp_ctx, lp_ctx->services, struct loadparm_service *, num_to_alloc);
1055
1056		if (!tsp) {
1057			DEBUG(0,("lp_add_service: failed to enlarge services!\n"));
1058			return NULL;
1059		} else {
1060			lp_ctx->services = tsp;
1061			lp_ctx->services[lp_ctx->iNumServices] = NULL;
1062		}
1063
1064		lp_ctx->iNumServices++;
1065	}
1066
1067	lp_ctx->services[i] = init_service(lp_ctx->services, lp_ctx->sDefault);
1068	if (lp_ctx->services[i] == NULL) {
1069		DEBUG(0,("lp_add_service: out of memory!\n"));
1070		return NULL;
1071	}
1072	copy_service(lp_ctx->services[i], &tservice, NULL);
1073	if (name != NULL)
1074		string_set(lp_ctx->services[i], &lp_ctx->services[i]->szService, name);
1075	return lp_ctx->services[i];
1076}
1077
1078/**
1079 * Add a new home service, with the specified home directory, defaults coming
1080 * from service ifrom.
1081 */
1082
1083bool lp_add_home(struct loadparm_context *lp_ctx,
1084		 const char *pszHomename,
1085		 struct loadparm_service *default_service,
1086		 const char *user, const char *pszHomedir)
1087{
1088	struct loadparm_service *service;
1089
1090	service = lp_add_service(lp_ctx, default_service, pszHomename);
1091
1092	if (service == NULL)
1093		return false;
1094
1095	if (!(*(default_service->szPath))
1096	    || strequal(default_service->szPath, lp_ctx->sDefault->szPath)) {
1097		service->szPath = talloc_strdup(service, pszHomedir);
1098	} else {
1099		service->szPath = string_sub_talloc(service, lp_pathname(default_service, lp_ctx->sDefault), "%H", pszHomedir);
1100	}
1101
1102	if (!(*(service->comment))) {
1103		service->comment = talloc_asprintf(service, "Home directory of %s", user);
1104	}
1105	service->bAvailable = default_service->bAvailable;
1106	service->bBrowseable = default_service->bBrowseable;
1107
1108	DEBUG(3, ("adding home's share [%s] for user '%s' at '%s'\n",
1109		  pszHomename, user, service->szPath));
1110
1111	return true;
1112}
1113
1114/**
1115 * Add the IPC service.
1116 */
1117
1118static bool lp_add_hidden(struct loadparm_context *lp_ctx, const char *name,
1119			  const char *fstype)
1120{
1121	struct loadparm_service *service = lp_add_service(lp_ctx, lp_ctx->sDefault, name);
1122
1123	if (service == NULL)
1124		return false;
1125
1126	string_set(service, &service->szPath, tmpdir());
1127
1128	service->comment = talloc_asprintf(service, "%s Service (%s)",
1129				fstype, lp_ctx->globals->szServerString);
1130	string_set(service, &service->fstype, fstype);
1131	service->iMaxConnections = -1;
1132	service->bAvailable = true;
1133	service->bRead_only = true;
1134	service->bPrint_ok = false;
1135	service->bBrowseable = false;
1136
1137	if (strcasecmp(fstype, "IPC") == 0) {
1138		lp_do_service_parameter(lp_ctx, service, "ntvfs handler",
1139					"default");
1140	}
1141
1142	DEBUG(3, ("adding hidden service %s\n", name));
1143
1144	return true;
1145}
1146
1147/**
1148 * Add a new printer service, with defaults coming from service iFrom.
1149 */
1150
1151bool lp_add_printer(struct loadparm_context *lp_ctx,
1152		    const char *pszPrintername,
1153		    struct loadparm_service *default_service)
1154{
1155	const char *comment = "From Printcap";
1156	struct loadparm_service *service;
1157	service = lp_add_service(lp_ctx, default_service, pszPrintername);
1158
1159	if (service == NULL)
1160		return false;
1161
1162	/* note that we do NOT default the availability flag to True - */
1163	/* we take it from the default service passed. This allows all */
1164	/* dynamic printers to be disabled by disabling the [printers] */
1165	/* entry (if/when the 'available' keyword is implemented!).    */
1166
1167	/* the printer name is set to the service name. */
1168	string_set(service, &service->szPrintername, pszPrintername);
1169	string_set(service, &service->comment, comment);
1170	service->bBrowseable = default_service->bBrowseable;
1171	/* Printers cannot be read_only. */
1172	service->bRead_only = false;
1173	/* Printer services must be printable. */
1174	service->bPrint_ok = true;
1175
1176	DEBUG(3, ("adding printer service %s\n", pszPrintername));
1177
1178	return true;
1179}
1180
1181/**
1182 * Map a parameter's string representation to something we can use.
1183 * Returns False if the parameter string is not recognised, else TRUE.
1184 */
1185
1186static int map_parameter(const char *pszParmName)
1187{
1188	int iIndex;
1189
1190	if (*pszParmName == '-')
1191		return -1;
1192
1193	for (iIndex = 0; parm_table[iIndex].label; iIndex++)
1194		if (strwicmp(parm_table[iIndex].label, pszParmName) == 0)
1195			return iIndex;
1196
1197	/* Warn only if it isn't parametric option */
1198	if (strchr(pszParmName, ':') == NULL)
1199		DEBUG(0, ("Unknown parameter encountered: \"%s\"\n", pszParmName));
1200	/* We do return 'fail' for parametric options as well because they are
1201	   stored in different storage
1202	 */
1203	return -1;
1204}
1205
1206
1207/**
1208  return the parameter structure for a parameter
1209*/
1210struct parm_struct *lp_parm_struct(const char *name)
1211{
1212	int parmnum = map_parameter(name);
1213	if (parmnum == -1) return NULL;
1214	return &parm_table[parmnum];
1215}
1216
1217/**
1218  return the parameter pointer for a parameter
1219*/
1220void *lp_parm_ptr(struct loadparm_context *lp_ctx,
1221		  struct loadparm_service *service, struct parm_struct *parm)
1222{
1223	if (service == NULL) {
1224		if (parm->pclass == P_LOCAL)
1225			return ((char *)lp_ctx->sDefault)+parm->offset;
1226		else if (parm->pclass == P_GLOBAL)
1227			return ((char *)lp_ctx->globals)+parm->offset;
1228		else return NULL;
1229	} else {
1230		return ((char *)service) + parm->offset;
1231	}
1232}
1233
1234/**
1235 * Find a service by name. Otherwise works like get_service.
1236 */
1237
1238static struct loadparm_service *getservicebyname(struct loadparm_context *lp_ctx,
1239					const char *pszServiceName)
1240{
1241	int iService;
1242
1243	for (iService = lp_ctx->iNumServices - 1; iService >= 0; iService--)
1244		if (lp_ctx->services[iService] != NULL &&
1245		    strwicmp(lp_ctx->services[iService]->szService, pszServiceName) == 0) {
1246			return lp_ctx->services[iService];
1247		}
1248
1249	return NULL;
1250}
1251
1252/**
1253 * Copy a service structure to another.
1254 * If pcopymapDest is NULL then copy all fields
1255 */
1256
1257static void copy_service(struct loadparm_service *pserviceDest,
1258			 struct loadparm_service *pserviceSource,
1259			 int *pcopymapDest)
1260{
1261	int i;
1262	bool bcopyall = (pcopymapDest == NULL);
1263	struct parmlist_entry *data, *pdata, *paramo;
1264	bool not_added;
1265
1266	for (i = 0; parm_table[i].label; i++)
1267		if (parm_table[i].offset != -1 && parm_table[i].pclass == P_LOCAL &&
1268		    (bcopyall || pcopymapDest[i])) {
1269			void *src_ptr =
1270				((char *)pserviceSource) + parm_table[i].offset;
1271			void *dest_ptr =
1272				((char *)pserviceDest) + parm_table[i].offset;
1273
1274			switch (parm_table[i].type) {
1275				case P_BOOL:
1276					*(int *)dest_ptr = *(int *)src_ptr;
1277					break;
1278
1279				case P_INTEGER:
1280				case P_OCTAL:
1281				case P_ENUM:
1282					*(int *)dest_ptr = *(int *)src_ptr;
1283					break;
1284
1285				case P_STRING:
1286					string_set(pserviceDest,
1287						   (char **)dest_ptr,
1288						   *(char **)src_ptr);
1289					break;
1290
1291				case P_USTRING:
1292					string_set(pserviceDest,
1293						   (char **)dest_ptr,
1294						   *(char **)src_ptr);
1295					strupper(*(char **)dest_ptr);
1296					break;
1297				case P_LIST:
1298					*(const char ***)dest_ptr = (const char **)str_list_copy(pserviceDest,
1299										  *(const char ***)src_ptr);
1300					break;
1301				default:
1302					break;
1303			}
1304		}
1305
1306	if (bcopyall) {
1307		init_copymap(pserviceDest);
1308		if (pserviceSource->copymap)
1309			memcpy((void *)pserviceDest->copymap,
1310			       (void *)pserviceSource->copymap,
1311			       sizeof(int) * NUMPARAMETERS);
1312	}
1313
1314	data = pserviceSource->param_opt;
1315	while (data) {
1316		not_added = true;
1317		pdata = pserviceDest->param_opt;
1318		/* Traverse destination */
1319		while (pdata) {
1320			/* If we already have same option, override it */
1321			if (strcmp(pdata->key, data->key) == 0) {
1322				talloc_free(pdata->value);
1323				pdata->value = talloc_reference(pdata,
1324							     data->value);
1325				not_added = false;
1326				break;
1327			}
1328			pdata = pdata->next;
1329		}
1330		if (not_added) {
1331			paramo = talloc(pserviceDest, struct parmlist_entry);
1332			if (paramo == NULL)
1333				smb_panic("OOM");
1334			paramo->key = talloc_reference(paramo, data->key);
1335			paramo->value = talloc_reference(paramo, data->value);
1336			DLIST_ADD(pserviceDest->param_opt, paramo);
1337		}
1338		data = data->next;
1339	}
1340}
1341
1342/**
1343 * Check a service for consistency. Return False if the service is in any way
1344 * incomplete or faulty, else True.
1345 */
1346static bool service_ok(struct loadparm_service *service)
1347{
1348	bool bRetval;
1349
1350	bRetval = true;
1351	if (service->szService[0] == '\0') {
1352		DEBUG(0, ("The following message indicates an internal error:\n"));
1353		DEBUG(0, ("No service name in service entry.\n"));
1354		bRetval = false;
1355	}
1356
1357	/* The [printers] entry MUST be printable. I'm all for flexibility, but */
1358	/* I can't see why you'd want a non-printable printer service...        */
1359	if (strwicmp(service->szService, PRINTERS_NAME) == 0) {
1360		if (!service->bPrint_ok) {
1361			DEBUG(0, ("WARNING: [%s] service MUST be printable!\n",
1362			       service->szService));
1363			service->bPrint_ok = true;
1364		}
1365		/* [printers] service must also be non-browsable. */
1366		if (service->bBrowseable)
1367			service->bBrowseable = false;
1368	}
1369
1370	/* If a service is flagged unavailable, log the fact at level 0. */
1371	if (!service->bAvailable)
1372		DEBUG(1, ("NOTE: Service %s is flagged unavailable.\n",
1373			  service->szService));
1374
1375	return bRetval;
1376}
1377
1378
1379/*******************************************************************
1380 Keep a linked list of all config files so we know when one has changed
1381 it's date and needs to be reloaded.
1382********************************************************************/
1383
1384static void add_to_file_list(struct loadparm_context *lp_ctx,
1385			     const char *fname, const char *subfname)
1386{
1387	struct file_lists *f = lp_ctx->file_lists;
1388
1389	while (f) {
1390		if (f->name && !strcmp(f->name, fname))
1391			break;
1392		f = f->next;
1393	}
1394
1395	if (!f) {
1396		f = talloc(lp_ctx, struct file_lists);
1397		if (!f)
1398			return;
1399		f->next = lp_ctx->file_lists;
1400		f->name = talloc_strdup(f, fname);
1401		if (!f->name) {
1402			talloc_free(f);
1403			return;
1404		}
1405		f->subfname = talloc_strdup(f, subfname);
1406		if (!f->subfname) {
1407			talloc_free(f);
1408			return;
1409		}
1410		lp_ctx->file_lists = f;
1411		f->modtime = file_modtime(subfname);
1412	} else {
1413		time_t t = file_modtime(subfname);
1414		if (t)
1415			f->modtime = t;
1416	}
1417}
1418
1419/*******************************************************************
1420 Check if a config file has changed date.
1421********************************************************************/
1422bool lp_file_list_changed(struct loadparm_context *lp_ctx)
1423{
1424	struct file_lists *f;
1425	DEBUG(6, ("lp_file_list_changed()\n"));
1426
1427	for (f = lp_ctx->file_lists; f != NULL; f = f->next) {
1428		char *n2;
1429		time_t mod_time;
1430
1431		n2 = standard_sub_basic(lp_ctx, f->name);
1432
1433		DEBUGADD(6, ("file %s -> %s  last mod_time: %s\n",
1434			     f->name, n2, ctime(&f->modtime)));
1435
1436		mod_time = file_modtime(n2);
1437
1438		if (mod_time && ((f->modtime != mod_time) || (f->subfname == NULL) || (strcmp(n2, f->subfname) != 0))) {
1439			DEBUGADD(6, ("file %s modified: %s\n", n2,
1440				  ctime(&mod_time)));
1441			f->modtime = mod_time;
1442			talloc_free(f->subfname);
1443			f->subfname = talloc_strdup(f, n2);
1444			return true;
1445		}
1446	}
1447	return false;
1448}
1449
1450/***************************************************************************
1451 Handle the include operation.
1452***************************************************************************/
1453
1454static bool handle_include(struct loadparm_context *lp_ctx,
1455			   const char *pszParmValue, char **ptr)
1456{
1457	char *fname = standard_sub_basic(lp_ctx, pszParmValue);
1458
1459	add_to_file_list(lp_ctx, pszParmValue, fname);
1460
1461	string_set(lp_ctx, ptr, fname);
1462
1463	if (file_exist(fname))
1464		return pm_process(fname, do_section, do_parameter, lp_ctx);
1465
1466	DEBUG(2, ("Can't find include file %s\n", fname));
1467
1468	return false;
1469}
1470
1471/***************************************************************************
1472 Handle the interpretation of the copy parameter.
1473***************************************************************************/
1474
1475static bool handle_copy(struct loadparm_context *lp_ctx,
1476			const char *pszParmValue, char **ptr)
1477{
1478	bool bRetval;
1479	struct loadparm_service *serviceTemp;
1480
1481	string_set(lp_ctx, ptr, pszParmValue);
1482
1483	bRetval = false;
1484
1485	DEBUG(3, ("Copying service from service %s\n", pszParmValue));
1486
1487	if ((serviceTemp = getservicebyname(lp_ctx, pszParmValue)) != NULL) {
1488		if (serviceTemp == lp_ctx->currentService) {
1489			DEBUG(0, ("Can't copy service %s - unable to copy self!\n", pszParmValue));
1490		} else {
1491			copy_service(lp_ctx->currentService,
1492				     serviceTemp,
1493				     lp_ctx->currentService->copymap);
1494			bRetval = true;
1495		}
1496	} else {
1497		DEBUG(0, ("Unable to copy service - source not found: %s\n",
1498			  pszParmValue));
1499		bRetval = false;
1500	}
1501
1502	return bRetval;
1503}
1504
1505static bool handle_debuglevel(struct loadparm_context *lp_ctx,
1506			const char *pszParmValue, char **ptr)
1507{
1508	DEBUGLEVEL = atoi(pszParmValue);
1509
1510	return true;
1511}
1512
1513static bool handle_logfile(struct loadparm_context *lp_ctx,
1514			const char *pszParmValue, char **ptr)
1515{
1516	logfile = pszParmValue;
1517	return true;
1518}
1519
1520/***************************************************************************
1521 Initialise a copymap.
1522***************************************************************************/
1523
1524static void init_copymap(struct loadparm_service *pservice)
1525{
1526	int i;
1527	talloc_free(pservice->copymap);
1528	pservice->copymap = talloc_array(pservice, int, NUMPARAMETERS);
1529	if (pservice->copymap == NULL) {
1530		DEBUG(0,
1531		      ("Couldn't allocate copymap!! (size %d)\n",
1532		       (int)NUMPARAMETERS));
1533		return;
1534	}
1535	for (i = 0; i < NUMPARAMETERS; i++)
1536		pservice->copymap[i] = true;
1537}
1538
1539/**
1540 * Process a parametric option
1541 */
1542static bool lp_do_parameter_parametric(struct loadparm_context *lp_ctx,
1543				       struct loadparm_service *service,
1544				       const char *pszParmName,
1545				       const char *pszParmValue, int flags)
1546{
1547	struct parmlist_entry *paramo, *data;
1548	char *name;
1549	TALLOC_CTX *mem_ctx;
1550
1551	while (isspace((unsigned char)*pszParmName)) {
1552		pszParmName++;
1553	}
1554
1555	name = strdup(pszParmName);
1556	if (!name) return false;
1557
1558	strlower(name);
1559
1560	if (service == NULL) {
1561		data = lp_ctx->globals->param_opt;
1562		mem_ctx = lp_ctx->globals;
1563	} else {
1564		data = service->param_opt;
1565		mem_ctx = service;
1566	}
1567
1568	/* Traverse destination */
1569	for (paramo=data; paramo; paramo=paramo->next) {
1570		/* If we already have the option set, override it unless
1571		   it was a command line option and the new one isn't */
1572		if (strcmp(paramo->key, name) == 0) {
1573			if ((paramo->priority & FLAG_CMDLINE) &&
1574			    !(flags & FLAG_CMDLINE)) {
1575				return true;
1576			}
1577
1578			talloc_free(paramo->value);
1579			paramo->value = talloc_strdup(paramo, pszParmValue);
1580			paramo->priority = flags;
1581			free(name);
1582			return true;
1583		}
1584	}
1585
1586	paramo = talloc(mem_ctx, struct parmlist_entry);
1587	if (!paramo)
1588		smb_panic("OOM");
1589	paramo->key = talloc_strdup(paramo, name);
1590	paramo->value = talloc_strdup(paramo, pszParmValue);
1591	paramo->priority = flags;
1592	if (service == NULL) {
1593		DLIST_ADD(lp_ctx->globals->param_opt, paramo);
1594	} else {
1595		DLIST_ADD(service->param_opt, paramo);
1596	}
1597
1598	free(name);
1599
1600	return true;
1601}
1602
1603static bool set_variable(TALLOC_CTX *mem_ctx, int parmnum, void *parm_ptr,
1604			 const char *pszParmName, const char *pszParmValue,
1605			 struct loadparm_context *lp_ctx)
1606{
1607	int i;
1608	/* if it is a special case then go ahead */
1609	if (parm_table[parmnum].special) {
1610		parm_table[parmnum].special(lp_ctx, pszParmValue,
1611					    (char **)parm_ptr);
1612		return true;
1613	}
1614
1615	/* now switch on the type of variable it is */
1616	switch (parm_table[parmnum].type)
1617	{
1618		case P_BOOL: {
1619			bool b;
1620			if (!set_boolean(pszParmValue, &b)) {
1621				DEBUG(0,("lp_do_parameter(%s): value is not boolean!\n", pszParmValue));
1622				return false;
1623			}
1624			*(int *)parm_ptr = b;
1625			}
1626			break;
1627
1628		case P_INTEGER:
1629			*(int *)parm_ptr = atoi(pszParmValue);
1630			break;
1631
1632		case P_OCTAL:
1633			*(int *)parm_ptr = strtol(pszParmValue, NULL, 8);
1634			break;
1635
1636		case P_BYTES:
1637		{
1638			uint64_t val;
1639			if (conv_str_size(pszParmValue, &val)) {
1640				if (val <= INT_MAX) {
1641					*(int *)parm_ptr = (int)val;
1642					break;
1643				}
1644			}
1645
1646			DEBUG(0,("lp_do_parameter(%s): value is not "
1647			    "a valid size specifier!\n", pszParmValue));
1648			return false;
1649		}
1650
1651		case P_LIST:
1652			*(const char ***)parm_ptr = (const char **)str_list_make(mem_ctx,
1653								  pszParmValue, NULL);
1654			break;
1655
1656		case P_STRING:
1657			string_set(mem_ctx, (char **)parm_ptr, pszParmValue);
1658			break;
1659
1660		case P_USTRING:
1661			string_set(mem_ctx, (char **)parm_ptr, pszParmValue);
1662			strupper(*(char **)parm_ptr);
1663			break;
1664
1665		case P_ENUM:
1666			for (i = 0; parm_table[parmnum].enum_list[i].name; i++) {
1667				if (strequal
1668				    (pszParmValue,
1669				     parm_table[parmnum].enum_list[i].name)) {
1670					*(int *)parm_ptr =
1671						parm_table[parmnum].
1672						enum_list[i].value;
1673					break;
1674				}
1675			}
1676			if (!parm_table[parmnum].enum_list[i].name) {
1677				DEBUG(0,("Unknown enumerated value '%s' for '%s'\n",
1678					 pszParmValue, pszParmName));
1679				return false;
1680			}
1681			break;
1682	}
1683
1684	if (lp_ctx->flags[parmnum] & FLAG_DEFAULT) {
1685		lp_ctx->flags[parmnum] &= ~FLAG_DEFAULT;
1686		/* we have to also unset FLAG_DEFAULT on aliases */
1687		for (i=parmnum-1;i>=0 && parm_table[i].offset == parm_table[parmnum].offset;i--) {
1688			lp_ctx->flags[i] &= ~FLAG_DEFAULT;
1689		}
1690		for (i=parmnum+1;i<NUMPARAMETERS && parm_table[i].offset == parm_table[parmnum].offset;i++) {
1691			lp_ctx->flags[i] &= ~FLAG_DEFAULT;
1692		}
1693	}
1694	return true;
1695}
1696
1697
1698bool lp_do_global_parameter(struct loadparm_context *lp_ctx,
1699			    const char *pszParmName, const char *pszParmValue)
1700{
1701	int parmnum = map_parameter(pszParmName);
1702	void *parm_ptr;
1703
1704	if (parmnum < 0) {
1705		if (strchr(pszParmName, ':')) {
1706			return lp_do_parameter_parametric(lp_ctx, NULL, pszParmName, pszParmValue, 0);
1707		}
1708		DEBUG(0, ("Ignoring unknown parameter \"%s\"\n", pszParmName));
1709		return true;
1710	}
1711
1712	/* if the flag has been set on the command line, then don't allow override,
1713	   but don't report an error */
1714	if (lp_ctx->flags[parmnum] & FLAG_CMDLINE) {
1715		return true;
1716	}
1717
1718	parm_ptr = lp_parm_ptr(lp_ctx, NULL, &parm_table[parmnum]);
1719
1720	return set_variable(lp_ctx, parmnum, parm_ptr,
1721			    pszParmName, pszParmValue, lp_ctx);
1722}
1723
1724bool lp_do_service_parameter(struct loadparm_context *lp_ctx,
1725			     struct loadparm_service *service,
1726			     const char *pszParmName, const char *pszParmValue)
1727{
1728	void *parm_ptr;
1729	int i;
1730	int parmnum = map_parameter(pszParmName);
1731
1732	if (parmnum < 0) {
1733		if (strchr(pszParmName, ':')) {
1734			return lp_do_parameter_parametric(lp_ctx, service, pszParmName, pszParmValue, 0);
1735		}
1736		DEBUG(0, ("Ignoring unknown parameter \"%s\"\n", pszParmName));
1737		return true;
1738	}
1739
1740	/* if the flag has been set on the command line, then don't allow override,
1741	   but don't report an error */
1742	if (lp_ctx->flags[parmnum] & FLAG_CMDLINE) {
1743		return true;
1744	}
1745
1746	if (parm_table[parmnum].pclass == P_GLOBAL) {
1747		DEBUG(0,
1748		      ("Global parameter %s found in service section!\n",
1749		       pszParmName));
1750		return true;
1751	}
1752	parm_ptr = ((char *)service) + parm_table[parmnum].offset;
1753
1754	if (!service->copymap)
1755		init_copymap(service);
1756
1757	/* this handles the aliases - set the copymap for other
1758	 * entries with the same data pointer */
1759	for (i = 0; parm_table[i].label; i++)
1760		if (parm_table[i].offset == parm_table[parmnum].offset &&
1761		    parm_table[i].pclass == parm_table[parmnum].pclass)
1762			service->copymap[i] = false;
1763
1764	return set_variable(service, parmnum, parm_ptr, pszParmName,
1765			    pszParmValue, lp_ctx);
1766}
1767
1768/**
1769 * Process a parameter.
1770 */
1771
1772static bool do_parameter(const char *pszParmName, const char *pszParmValue,
1773			 void *userdata)
1774{
1775	struct loadparm_context *lp_ctx = (struct loadparm_context *)userdata;
1776
1777	if (lp_ctx->bInGlobalSection)
1778		return lp_do_global_parameter(lp_ctx, pszParmName,
1779					      pszParmValue);
1780	else
1781		return lp_do_service_parameter(lp_ctx, lp_ctx->currentService,
1782					       pszParmName, pszParmValue);
1783}
1784
1785/*
1786  variable argument do parameter
1787*/
1788bool lp_do_global_parameter_var(struct loadparm_context *lp_ctx, const char *pszParmName, const char *fmt, ...) PRINTF_ATTRIBUTE(3, 4);
1789bool lp_do_global_parameter_var(struct loadparm_context *lp_ctx,
1790				const char *pszParmName, const char *fmt, ...)
1791{
1792	char *s;
1793	bool ret;
1794	va_list ap;
1795
1796	va_start(ap, fmt);
1797	s = talloc_vasprintf(NULL, fmt, ap);
1798	va_end(ap);
1799	ret = lp_do_global_parameter(lp_ctx, pszParmName, s);
1800	talloc_free(s);
1801	return ret;
1802}
1803
1804
1805/*
1806  set a parameter from the commandline - this is called from command line parameter
1807  parsing code. It sets the parameter then marks the parameter as unable to be modified
1808  by smb.conf processing
1809*/
1810bool lp_set_cmdline(struct loadparm_context *lp_ctx, const char *pszParmName,
1811		    const char *pszParmValue)
1812{
1813	int parmnum = map_parameter(pszParmName);
1814	int i;
1815
1816	while (isspace((unsigned char)*pszParmValue)) pszParmValue++;
1817
1818
1819	if (parmnum < 0 && strchr(pszParmName, ':')) {
1820		/* set a parametric option */
1821		return lp_do_parameter_parametric(lp_ctx, NULL, pszParmName,
1822						  pszParmValue, FLAG_CMDLINE);
1823	}
1824
1825	if (parmnum < 0) {
1826		DEBUG(0,("Unknown option '%s'\n", pszParmName));
1827		return false;
1828	}
1829
1830	/* reset the CMDLINE flag in case this has been called before */
1831	lp_ctx->flags[parmnum] &= ~FLAG_CMDLINE;
1832
1833	if (!lp_do_global_parameter(lp_ctx, pszParmName, pszParmValue)) {
1834		return false;
1835	}
1836
1837	lp_ctx->flags[parmnum] |= FLAG_CMDLINE;
1838
1839	/* we have to also set FLAG_CMDLINE on aliases */
1840	for (i=parmnum-1;i>=0 && parm_table[i].offset == parm_table[parmnum].offset;i--) {
1841		lp_ctx->flags[i] |= FLAG_CMDLINE;
1842	}
1843	for (i=parmnum+1;i<NUMPARAMETERS && parm_table[i].offset == parm_table[parmnum].offset;i++) {
1844		lp_ctx->flags[i] |= FLAG_CMDLINE;
1845	}
1846
1847	return true;
1848}
1849
1850/*
1851  set a option from the commandline in 'a=b' format. Use to support --option
1852*/
1853bool lp_set_option(struct loadparm_context *lp_ctx, const char *option)
1854{
1855	char *p, *s;
1856	bool ret;
1857
1858	s = strdup(option);
1859	if (!s) {
1860		return false;
1861	}
1862
1863	p = strchr(s, '=');
1864	if (!p) {
1865		free(s);
1866		return false;
1867	}
1868
1869	*p = 0;
1870
1871	ret = lp_set_cmdline(lp_ctx, s, p+1);
1872	free(s);
1873	return ret;
1874}
1875
1876
1877#define BOOLSTR(b) ((b) ? "Yes" : "No")
1878
1879/**
1880 * Print a parameter of the specified type.
1881 */
1882
1883static void print_parameter(struct parm_struct *p, void *ptr, FILE * f)
1884{
1885	int i;
1886	switch (p->type)
1887	{
1888		case P_ENUM:
1889			for (i = 0; p->enum_list[i].name; i++) {
1890				if (*(int *)ptr == p->enum_list[i].value) {
1891					fprintf(f, "%s",
1892						p->enum_list[i].name);
1893					break;
1894				}
1895			}
1896			break;
1897
1898		case P_BOOL:
1899			fprintf(f, "%s", BOOLSTR((bool)*(int *)ptr));
1900			break;
1901
1902		case P_INTEGER:
1903		case P_BYTES:
1904			fprintf(f, "%d", *(int *)ptr);
1905			break;
1906
1907		case P_OCTAL:
1908			fprintf(f, "0%o", *(int *)ptr);
1909			break;
1910
1911		case P_LIST:
1912			if ((char ***)ptr && *(char ***)ptr) {
1913				char **list = *(char ***)ptr;
1914
1915				for (; *list; list++)
1916					fprintf(f, "%s%s", *list,
1917						((*(list+1))?", ":""));
1918			}
1919			break;
1920
1921		case P_STRING:
1922		case P_USTRING:
1923			if (*(char **)ptr) {
1924				fprintf(f, "%s", *(char **)ptr);
1925			}
1926			break;
1927	}
1928}
1929
1930/**
1931 * Check if two parameters are equal.
1932 */
1933
1934static bool equal_parameter(parm_type type, void *ptr1, void *ptr2)
1935{
1936	switch (type) {
1937		case P_BOOL:
1938			return (*((int *)ptr1) == *((int *)ptr2));
1939
1940		case P_INTEGER:
1941		case P_OCTAL:
1942		case P_BYTES:
1943		case P_ENUM:
1944			return (*((int *)ptr1) == *((int *)ptr2));
1945
1946		case P_LIST:
1947			return str_list_equal((const char **)(*(char ***)ptr1),
1948					      (const char **)(*(char ***)ptr2));
1949
1950		case P_STRING:
1951		case P_USTRING:
1952		{
1953			char *p1 = *(char **)ptr1, *p2 = *(char **)ptr2;
1954			if (p1 && !*p1)
1955				p1 = NULL;
1956			if (p2 && !*p2)
1957				p2 = NULL;
1958			return (p1 == p2 || strequal(p1, p2));
1959		}
1960	}
1961	return false;
1962}
1963
1964/**
1965 * Process a new section (service).
1966 *
1967 * At this stage all sections are services.
1968 * Later we'll have special sections that permit server parameters to be set.
1969 * Returns True on success, False on failure.
1970 */
1971
1972static bool do_section(const char *pszSectionName, void *userdata)
1973{
1974	struct loadparm_context *lp_ctx = (struct loadparm_context *)userdata;
1975	bool bRetval;
1976	bool isglobal = ((strwicmp(pszSectionName, GLOBAL_NAME) == 0) ||
1977			 (strwicmp(pszSectionName, GLOBAL_NAME2) == 0));
1978	bRetval = false;
1979
1980	/* if we've just struck a global section, note the fact. */
1981	lp_ctx->bInGlobalSection = isglobal;
1982
1983	/* check for multiple global sections */
1984	if (lp_ctx->bInGlobalSection) {
1985		DEBUG(3, ("Processing section \"[%s]\"\n", pszSectionName));
1986		return true;
1987	}
1988
1989	/* if we have a current service, tidy it up before moving on */
1990	bRetval = true;
1991
1992	if (lp_ctx->currentService != NULL)
1993		bRetval = service_ok(lp_ctx->currentService);
1994
1995	/* if all is still well, move to the next record in the services array */
1996	if (bRetval) {
1997		/* We put this here to avoid an odd message order if messages are */
1998		/* issued by the post-processing of a previous section. */
1999		DEBUG(2, ("Processing section \"[%s]\"\n", pszSectionName));
2000
2001		if ((lp_ctx->currentService = lp_add_service(lp_ctx, lp_ctx->sDefault,
2002							     pszSectionName))
2003		    == NULL) {
2004			DEBUG(0, ("Failed to add a new service\n"));
2005			return false;
2006		}
2007	}
2008
2009	return bRetval;
2010}
2011
2012
2013/**
2014 * Determine if a particular base parameter is currently set to the default value.
2015 */
2016
2017static bool is_default(struct loadparm_service *sDefault, int i)
2018{
2019	void *def_ptr = ((char *)sDefault) + parm_table[i].offset;
2020	if (!defaults_saved)
2021		return false;
2022	switch (parm_table[i].type) {
2023		case P_LIST:
2024			return str_list_equal((const char **)parm_table[i].def.lvalue,
2025					      (const char **)def_ptr);
2026		case P_STRING:
2027		case P_USTRING:
2028			return strequal(parm_table[i].def.svalue,
2029					*(char **)def_ptr);
2030		case P_BOOL:
2031			return parm_table[i].def.bvalue ==
2032				*(int *)def_ptr;
2033		case P_INTEGER:
2034		case P_OCTAL:
2035		case P_BYTES:
2036		case P_ENUM:
2037			return parm_table[i].def.ivalue ==
2038				*(int *)def_ptr;
2039	}
2040	return false;
2041}
2042
2043/**
2044 *Display the contents of the global structure.
2045 */
2046
2047static void dump_globals(struct loadparm_context *lp_ctx, FILE *f,
2048			 bool show_defaults)
2049{
2050	int i;
2051	struct parmlist_entry *data;
2052
2053	fprintf(f, "# Global parameters\n[global]\n");
2054
2055	for (i = 0; parm_table[i].label; i++)
2056		if (parm_table[i].pclass == P_GLOBAL &&
2057		    parm_table[i].offset != -1 &&
2058		    (i == 0 || (parm_table[i].offset != parm_table[i - 1].offset))) {
2059			if (!show_defaults && (lp_ctx->flags[i] & FLAG_DEFAULT))
2060				continue;
2061			fprintf(f, "\t%s = ", parm_table[i].label);
2062			print_parameter(&parm_table[i], lp_parm_ptr(lp_ctx, NULL, &parm_table[i]), f);
2063			fprintf(f, "\n");
2064	}
2065	if (lp_ctx->globals->param_opt != NULL) {
2066		for (data = lp_ctx->globals->param_opt; data;
2067		     data = data->next) {
2068			fprintf(f, "\t%s = %s\n", data->key, data->value);
2069		}
2070        }
2071
2072}
2073
2074/**
2075 * Display the contents of a single services record.
2076 */
2077
2078static void dump_a_service(struct loadparm_service * pService, struct loadparm_service *sDefault, FILE * f)
2079{
2080	int i;
2081	struct parmlist_entry *data;
2082
2083	if (pService != sDefault)
2084		fprintf(f, "\n[%s]\n", pService->szService);
2085
2086	for (i = 0; parm_table[i].label; i++) {
2087		if (parm_table[i].pclass == P_LOCAL &&
2088		    parm_table[i].offset != -1 &&
2089		    (*parm_table[i].label != '-') &&
2090		    (i == 0 || (parm_table[i].offset != parm_table[i - 1].offset)))
2091		{
2092			if (pService == sDefault) {
2093				if (defaults_saved && is_default(sDefault, i))
2094					continue;
2095			} else {
2096				if (equal_parameter(parm_table[i].type,
2097						    ((char *)pService) +
2098						    parm_table[i].offset,
2099						    ((char *)sDefault) +
2100						    parm_table[i].offset))
2101					continue;
2102			}
2103
2104			fprintf(f, "\t%s = ", parm_table[i].label);
2105			print_parameter(&parm_table[i],
2106					((char *)pService) + parm_table[i].offset, f);
2107			fprintf(f, "\n");
2108		}
2109	}
2110	if (pService->param_opt != NULL) {
2111		for (data = pService->param_opt; data; data = data->next) {
2112			fprintf(f, "\t%s = %s\n", data->key, data->value);
2113		}
2114        }
2115}
2116
2117bool lp_dump_a_parameter(struct loadparm_context *lp_ctx,
2118			 struct loadparm_service *service,
2119			 const char *parm_name, FILE * f)
2120{
2121	struct parm_struct *parm;
2122	void *ptr;
2123
2124	parm = lp_parm_struct(parm_name);
2125	if (!parm) {
2126		return false;
2127	}
2128
2129	ptr = lp_parm_ptr(lp_ctx, service,parm);
2130
2131	print_parameter(parm, ptr, f);
2132	fprintf(f, "\n");
2133	return true;
2134}
2135
2136/**
2137 * Return info about the next parameter in a service.
2138 * snum==-1 gives the globals.
2139 * Return NULL when out of parameters.
2140 */
2141
2142struct parm_struct *lp_next_parameter(struct loadparm_context *lp_ctx, int snum, int *i,
2143				      int allparameters)
2144{
2145	if (snum == -1) {
2146		/* do the globals */
2147		for (; parm_table[*i].label; (*i)++) {
2148			if (parm_table[*i].offset == -1
2149			    || (*parm_table[*i].label == '-'))
2150				continue;
2151
2152			if ((*i) > 0
2153			    && (parm_table[*i].offset ==
2154				parm_table[(*i) - 1].offset))
2155				continue;
2156
2157			return &parm_table[(*i)++];
2158		}
2159	} else {
2160		struct loadparm_service *pService = lp_ctx->services[snum];
2161
2162		for (; parm_table[*i].label; (*i)++) {
2163			if (parm_table[*i].pclass == P_LOCAL &&
2164			    parm_table[*i].offset != -1 &&
2165			    (*parm_table[*i].label != '-') &&
2166			    ((*i) == 0 ||
2167			     (parm_table[*i].offset !=
2168			      parm_table[(*i) - 1].offset)))
2169			{
2170				if (allparameters ||
2171				    !equal_parameter(parm_table[*i].type,
2172						     ((char *)pService) +
2173						     parm_table[*i].offset,
2174						     ((char *)lp_ctx->sDefault) +
2175						     parm_table[*i].offset))
2176				{
2177					return &parm_table[(*i)++];
2178				}
2179			}
2180		}
2181	}
2182
2183	return NULL;
2184}
2185
2186
2187/**
2188 * Auto-load some home services.
2189 */
2190static void lp_add_auto_services(struct loadparm_context *lp_ctx,
2191				 const char *str)
2192{
2193	return;
2194}
2195
2196
2197/**
2198 * Unload unused services.
2199 */
2200
2201void lp_killunused(struct loadparm_context *lp_ctx,
2202		   struct smbsrv_connection *smb,
2203		   bool (*snumused) (struct smbsrv_connection *, int))
2204{
2205	int i;
2206	for (i = 0; i < lp_ctx->iNumServices; i++) {
2207		if (lp_ctx->services[i] == NULL)
2208			continue;
2209
2210		if (!snumused || !snumused(smb, i)) {
2211			talloc_free(lp_ctx->services[i]);
2212			lp_ctx->services[i] = NULL;
2213		}
2214	}
2215}
2216
2217
2218static int lp_destructor(struct loadparm_context *lp_ctx)
2219{
2220	struct parmlist_entry *data;
2221
2222	if (lp_ctx->globals->param_opt != NULL) {
2223		struct parmlist_entry *next;
2224		for (data = lp_ctx->globals->param_opt; data; data=next) {
2225			next = data->next;
2226			if (data->priority & FLAG_CMDLINE) continue;
2227			DLIST_REMOVE(lp_ctx->globals->param_opt, data);
2228			talloc_free(data);
2229		}
2230	}
2231
2232	return 0;
2233}
2234
2235/**
2236 * Initialise the global parameter structure.
2237 */
2238struct loadparm_context *loadparm_init(TALLOC_CTX *mem_ctx)
2239{
2240	int i;
2241	char *myname;
2242	struct loadparm_context *lp_ctx;
2243
2244	lp_ctx = talloc_zero(mem_ctx, struct loadparm_context);
2245	if (lp_ctx == NULL)
2246		return NULL;
2247
2248	talloc_set_destructor(lp_ctx, lp_destructor);
2249	lp_ctx->bInGlobalSection = true;
2250	lp_ctx->globals = talloc_zero(lp_ctx, struct loadparm_global);
2251	lp_ctx->sDefault = talloc_zero(lp_ctx, struct loadparm_service);
2252
2253	lp_ctx->sDefault->iMaxPrintJobs = 1000;
2254	lp_ctx->sDefault->bAvailable = true;
2255	lp_ctx->sDefault->bBrowseable = true;
2256	lp_ctx->sDefault->bRead_only = true;
2257	lp_ctx->sDefault->bMap_archive = true;
2258	lp_ctx->sDefault->bStrictLocking = true;
2259	lp_ctx->sDefault->bOplocks = true;
2260	lp_ctx->sDefault->iCreate_mask = 0744;
2261	lp_ctx->sDefault->iCreate_force_mode = 0000;
2262	lp_ctx->sDefault->iDir_mask = 0755;
2263	lp_ctx->sDefault->iDir_force_mode = 0000;
2264
2265	DEBUG(3, ("Initialising global parameters\n"));
2266
2267	for (i = 0; parm_table[i].label; i++) {
2268		if ((parm_table[i].type == P_STRING ||
2269		     parm_table[i].type == P_USTRING) &&
2270		    parm_table[i].offset != -1 &&
2271		    !(lp_ctx->flags[i] & FLAG_CMDLINE)) {
2272			char **r;
2273			if (parm_table[i].pclass == P_LOCAL) {
2274				r = (char **)(((char *)lp_ctx->sDefault) + parm_table[i].offset);
2275			} else {
2276				r = (char **)(((char *)lp_ctx->globals) + parm_table[i].offset);
2277			}
2278			*r = talloc_strdup(lp_ctx, "");
2279		}
2280	}
2281
2282	lp_do_global_parameter(lp_ctx, "share backend", "classic");
2283
2284	lp_do_global_parameter(lp_ctx, "server role", "standalone");
2285
2286	/* options that can be set on the command line must be initialised via
2287	   the slower lp_do_global_parameter() to ensure that FLAG_CMDLINE is obeyed */
2288#ifdef TCP_NODELAY
2289	lp_do_global_parameter(lp_ctx, "socket options", "TCP_NODELAY");
2290#endif
2291	lp_do_global_parameter(lp_ctx, "workgroup", DEFAULT_WORKGROUP);
2292	myname = get_myname(lp_ctx);
2293	lp_do_global_parameter(lp_ctx, "netbios name", myname);
2294	talloc_free(myname);
2295	lp_do_global_parameter(lp_ctx, "name resolve order", "wins host bcast");
2296
2297	lp_do_global_parameter(lp_ctx, "fstype", "NTFS");
2298
2299	lp_do_global_parameter(lp_ctx, "ntvfs handler", "unixuid default");
2300	lp_do_global_parameter(lp_ctx, "max connections", "-1");
2301
2302	lp_do_global_parameter(lp_ctx, "dcerpc endpoint servers", "epmapper srvsvc wkssvc rpcecho samr netlogon lsarpc spoolss drsuapi winreg dssetup unixinfo browser");
2303	lp_do_global_parameter(lp_ctx, "server services", "smb rpc nbt wrepl ldap cldap kdc drepl winbind ntp_signd kcc");
2304	lp_do_global_parameter(lp_ctx, "ntptr providor", "simple_ldb");
2305	lp_do_global_parameter(lp_ctx, "auth methods:domain controller", "anonymous sam_ignoredomain");
2306	lp_do_global_parameter(lp_ctx, "auth methods:member server", "anonymous sam winbind");
2307	lp_do_global_parameter(lp_ctx, "auth methods:standalone", "anonymous sam_ignoredomain");
2308	lp_do_global_parameter(lp_ctx, "private dir", dyn_PRIVATE_DIR);
2309	lp_do_global_parameter(lp_ctx, "sam database", "sam.ldb");
2310	lp_do_global_parameter(lp_ctx, "idmap database", "idmap.ldb");
2311	lp_do_global_parameter(lp_ctx, "secrets database", "secrets.ldb");
2312	lp_do_global_parameter(lp_ctx, "spoolss database", "spoolss.ldb");
2313	lp_do_global_parameter(lp_ctx, "wins config database", "wins_config.ldb");
2314	lp_do_global_parameter(lp_ctx, "wins database", "wins.ldb");
2315	lp_do_global_parameter(lp_ctx, "registry:HKEY_LOCAL_MACHINE", "hklm.ldb");
2316
2317	/* This hive should be dynamically generated by Samba using
2318	   data from the sam, but for the moment leave it in a tdb to
2319	   keep regedt32 from popping up an annoying dialog. */
2320	lp_do_global_parameter(lp_ctx, "registry:HKEY_USERS", "hku.ldb");
2321
2322	/* using UTF8 by default allows us to support all chars */
2323	lp_do_global_parameter(lp_ctx, "unix charset", "UTF8");
2324
2325	/* Use codepage 850 as a default for the dos character set */
2326	lp_do_global_parameter(lp_ctx, "dos charset", "CP850");
2327
2328	/*
2329	 * Allow the default PASSWD_CHAT to be overridden in local.h.
2330	 */
2331	lp_do_global_parameter(lp_ctx, "passwd chat", DEFAULT_PASSWD_CHAT);
2332
2333	lp_do_global_parameter(lp_ctx, "pid directory", dyn_PIDDIR);
2334	lp_do_global_parameter(lp_ctx, "lock dir", dyn_LOCKDIR);
2335	lp_do_global_parameter(lp_ctx, "modules dir", dyn_MODULESDIR);
2336	lp_do_global_parameter(lp_ctx, "ncalrpc dir", dyn_NCALRPCDIR);
2337
2338	lp_do_global_parameter(lp_ctx, "socket address", "0.0.0.0");
2339	lp_do_global_parameter_var(lp_ctx, "server string",
2340				   "Samba %s", SAMBA_VERSION_STRING);
2341
2342	lp_do_global_parameter_var(lp_ctx, "announce version", "%d.%d",
2343			 DEFAULT_MAJOR_VERSION,
2344			 DEFAULT_MINOR_VERSION);
2345
2346	lp_do_global_parameter(lp_ctx, "password server", "*");
2347
2348	lp_do_global_parameter(lp_ctx, "max mux", "50");
2349	lp_do_global_parameter(lp_ctx, "max xmit", "12288");
2350	lp_do_global_parameter(lp_ctx, "password level", "0");
2351	lp_do_global_parameter(lp_ctx, "LargeReadwrite", "True");
2352	lp_do_global_parameter(lp_ctx, "server min protocol", "CORE");
2353	lp_do_global_parameter(lp_ctx, "server max protocol", "NT1");
2354	lp_do_global_parameter(lp_ctx, "client min protocol", "CORE");
2355	lp_do_global_parameter(lp_ctx, "client max protocol", "NT1");
2356	lp_do_global_parameter(lp_ctx, "security", "USER");
2357	lp_do_global_parameter(lp_ctx, "paranoid server security", "True");
2358	lp_do_global_parameter(lp_ctx, "EncryptPasswords", "True");
2359	lp_do_global_parameter(lp_ctx, "ReadRaw", "True");
2360	lp_do_global_parameter(lp_ctx, "WriteRaw", "True");
2361	lp_do_global_parameter(lp_ctx, "NullPasswords", "False");
2362	lp_do_global_parameter(lp_ctx, "ObeyPamRestrictions", "False");
2363	lp_do_global_parameter(lp_ctx, "announce as", "NT SERVER");
2364
2365	lp_do_global_parameter(lp_ctx, "TimeServer", "False");
2366	lp_do_global_parameter(lp_ctx, "BindInterfacesOnly", "False");
2367	lp_do_global_parameter(lp_ctx, "Unicode", "True");
2368	lp_do_global_parameter(lp_ctx, "ClientLanManAuth", "False");
2369	lp_do_global_parameter(lp_ctx, "LanmanAuth", "False");
2370	lp_do_global_parameter(lp_ctx, "NTLMAuth", "True");
2371	lp_do_global_parameter(lp_ctx, "client use spnego principal", "False");
2372
2373	lp_do_global_parameter(lp_ctx, "UnixExtensions", "False");
2374
2375	lp_do_global_parameter(lp_ctx, "PreferredMaster", "Auto");
2376	lp_do_global_parameter(lp_ctx, "LocalMaster", "True");
2377
2378	lp_do_global_parameter(lp_ctx, "wins support", "False");
2379	lp_do_global_parameter(lp_ctx, "dns proxy", "True");
2380
2381	lp_do_global_parameter(lp_ctx, "winbind separator", "\\");
2382	lp_do_global_parameter(lp_ctx, "winbind sealed pipes", "True");
2383	lp_do_global_parameter(lp_ctx, "winbindd socket directory", dyn_WINBINDD_SOCKET_DIR);
2384	lp_do_global_parameter(lp_ctx, "winbindd privileged socket directory", dyn_WINBINDD_PRIVILEGED_SOCKET_DIR);
2385	lp_do_global_parameter(lp_ctx, "template shell", "/bin/false");
2386	lp_do_global_parameter(lp_ctx, "template homedir", "/home/%WORKGROUP%/%ACCOUNTNAME%");
2387	lp_do_global_parameter(lp_ctx, "idmap trusted only", "False");
2388
2389	lp_do_global_parameter(lp_ctx, "client signing", "Yes");
2390	lp_do_global_parameter(lp_ctx, "server signing", "auto");
2391
2392	lp_do_global_parameter(lp_ctx, "use spnego", "True");
2393
2394	lp_do_global_parameter(lp_ctx, "smb ports", "445 139");
2395	lp_do_global_parameter(lp_ctx, "nbt port", "137");
2396	lp_do_global_parameter(lp_ctx, "dgram port", "138");
2397	lp_do_global_parameter(lp_ctx, "cldap port", "389");
2398	lp_do_global_parameter(lp_ctx, "krb5 port", "88");
2399	lp_do_global_parameter(lp_ctx, "kpasswd port", "464");
2400	lp_do_global_parameter(lp_ctx, "web port", "901");
2401	lp_do_global_parameter(lp_ctx, "swat directory", dyn_SWATDIR);
2402
2403	lp_do_global_parameter(lp_ctx, "nt status support", "True");
2404
2405	lp_do_global_parameter(lp_ctx, "max wins ttl", "518400"); /* 6 days */
2406	lp_do_global_parameter(lp_ctx, "min wins ttl", "10");
2407
2408	lp_do_global_parameter(lp_ctx, "tls enabled", "True");
2409	lp_do_global_parameter(lp_ctx, "tls keyfile", "tls/key.pem");
2410	lp_do_global_parameter(lp_ctx, "tls certfile", "tls/cert.pem");
2411	lp_do_global_parameter(lp_ctx, "tls cafile", "tls/ca.pem");
2412	lp_do_global_parameter_var(lp_ctx, "setup directory", "%s",
2413				   dyn_SETUPDIR);
2414
2415	lp_do_global_parameter(lp_ctx, "prefork children:smb", "4");
2416
2417	lp_do_global_parameter(lp_ctx, "ntp signd socket directory", dyn_NTP_SIGND_SOCKET_DIR);
2418
2419	for (i = 0; parm_table[i].label; i++) {
2420		if (!(lp_ctx->flags[i] & FLAG_CMDLINE)) {
2421			lp_ctx->flags[i] |= FLAG_DEFAULT;
2422		}
2423	}
2424
2425	return lp_ctx;
2426}
2427
2428const char *lp_configfile(struct loadparm_context *lp_ctx)
2429{
2430	return lp_ctx->szConfigFile;
2431}
2432
2433const char *lp_default_path(void)
2434{
2435    if (getenv("SMB_CONF_PATH"))
2436        return getenv("SMB_CONF_PATH");
2437    else
2438        return dyn_CONFIGFILE;
2439}
2440
2441/**
2442 * Update the internal state of a loadparm context after settings
2443 * have changed.
2444 */
2445static bool lp_update(struct loadparm_context *lp_ctx)
2446{
2447	lp_add_auto_services(lp_ctx, lp_auto_services(lp_ctx));
2448
2449	lp_add_hidden(lp_ctx, "IPC$", "IPC");
2450	lp_add_hidden(lp_ctx, "ADMIN$", "DISK");
2451
2452	if (!lp_ctx->globals->szWINSservers && lp_ctx->globals->bWINSsupport) {
2453		lp_do_global_parameter(lp_ctx, "wins server", "127.0.0.1");
2454	}
2455
2456	panic_action = lp_ctx->globals->panic_action;
2457
2458	reload_charcnv(lp_ctx);
2459
2460	/* FIXME: ntstatus_check_dos_mapping = lp_nt_status_support(lp_ctx); */
2461
2462	/* FIXME: This is a bit of a hack, but we can't use a global, since
2463	 * not everything that uses lp also uses the socket library */
2464	if (lp_parm_bool(lp_ctx, NULL, "socket", "testnonblock", false)) {
2465		setenv("SOCKET_TESTNONBLOCK", "1", 1);
2466	} else {
2467		unsetenv("SOCKET_TESTNONBLOCK");
2468	}
2469
2470	/* FIXME: Check locale in environment for this: */
2471	if (strcmp(lp_display_charset(lp_ctx), lp_unix_charset(lp_ctx)) != 0)
2472		d_set_iconv(smb_iconv_open(lp_display_charset(lp_ctx), lp_unix_charset(lp_ctx)));
2473	else
2474		d_set_iconv((smb_iconv_t)-1);
2475
2476	return true;
2477}
2478
2479bool lp_load_default(struct loadparm_context *lp_ctx)
2480{
2481    const char *path;
2482
2483    path = lp_default_path();
2484
2485    if (!file_exist(path)) {
2486	    /* We allow the default smb.conf file to not exist,
2487	     * basically the equivalent of an empty file. */
2488	    return lp_update(lp_ctx);
2489    }
2490
2491    return lp_load(lp_ctx, path);
2492}
2493
2494/**
2495 * Load the services array from the services file.
2496 *
2497 * Return True on success, False on failure.
2498 */
2499bool lp_load(struct loadparm_context *lp_ctx, const char *filename)
2500{
2501	char *n2;
2502	bool bRetval;
2503
2504	filename = talloc_strdup(lp_ctx, filename);
2505
2506	lp_ctx->szConfigFile = filename;
2507
2508	lp_ctx->bInGlobalSection = true;
2509	n2 = standard_sub_basic(lp_ctx, lp_ctx->szConfigFile);
2510	DEBUG(2, ("lp_load: refreshing parameters from %s\n", n2));
2511
2512	add_to_file_list(lp_ctx, lp_ctx->szConfigFile, n2);
2513
2514	/* We get sections first, so have to start 'behind' to make up */
2515	lp_ctx->currentService = NULL;
2516	bRetval = pm_process(n2, do_section, do_parameter, lp_ctx);
2517
2518	/* finish up the last section */
2519	DEBUG(4, ("pm_process() returned %s\n", BOOLSTR(bRetval)));
2520	if (bRetval)
2521		if (lp_ctx->currentService != NULL)
2522			bRetval = service_ok(lp_ctx->currentService);
2523
2524	bRetval = bRetval && lp_update(lp_ctx);
2525
2526	return bRetval;
2527}
2528
2529/**
2530 * Return the max number of services.
2531 */
2532
2533int lp_numservices(struct loadparm_context *lp_ctx)
2534{
2535	return lp_ctx->iNumServices;
2536}
2537
2538/**
2539 * Display the contents of the services array in human-readable form.
2540 */
2541
2542void lp_dump(struct loadparm_context *lp_ctx, FILE *f, bool show_defaults,
2543	     int maxtoprint)
2544{
2545	int iService;
2546
2547	if (show_defaults)
2548		defaults_saved = false;
2549
2550	dump_globals(lp_ctx, f, show_defaults);
2551
2552	dump_a_service(lp_ctx->sDefault, lp_ctx->sDefault, f);
2553
2554	for (iService = 0; iService < maxtoprint; iService++)
2555		lp_dump_one(f, show_defaults, lp_ctx->services[iService], lp_ctx->sDefault);
2556}
2557
2558/**
2559 * Display the contents of one service in human-readable form.
2560 */
2561void lp_dump_one(FILE *f, bool show_defaults, struct loadparm_service *service, struct loadparm_service *sDefault)
2562{
2563	if (service != NULL) {
2564		if (service->szService[0] == '\0')
2565			return;
2566		dump_a_service(service, sDefault, f);
2567	}
2568}
2569
2570struct loadparm_service *lp_servicebynum(struct loadparm_context *lp_ctx,
2571					 int snum)
2572{
2573	return lp_ctx->services[snum];
2574}
2575
2576struct loadparm_service *lp_service(struct loadparm_context *lp_ctx,
2577				    const char *service_name)
2578{
2579	int iService;
2580        char *serviceName;
2581
2582	for (iService = lp_ctx->iNumServices - 1; iService >= 0; iService--) {
2583		if (lp_ctx->services[iService] &&
2584		    lp_ctx->services[iService]->szService) {
2585			/*
2586			 * The substitution here is used to support %U is
2587			 * service names
2588			 */
2589			serviceName = standard_sub_basic(
2590					lp_ctx->services[iService],
2591					lp_ctx->services[iService]->szService);
2592			if (strequal(serviceName, service_name))
2593				return lp_ctx->services[iService];
2594		}
2595	}
2596
2597	DEBUG(7,("lp_servicenumber: couldn't find %s\n", service_name));
2598	return NULL;
2599}
2600
2601
2602/**
2603 * A useful volume label function.
2604 */
2605const char *volume_label(struct loadparm_service *service, struct loadparm_service *sDefault)
2606{
2607	const char *ret = lp_volume(service, sDefault);
2608	if (!*ret)
2609		return lp_servicename(service);
2610	return ret;
2611}
2612
2613
2614/**
2615 * If we are PDC then prefer us as DMB
2616 */
2617const char *lp_printername(struct loadparm_service *service, struct loadparm_service *sDefault)
2618{
2619	const char *ret = _lp_printername(service, sDefault);
2620	if (ret == NULL || (ret != NULL && *ret == '\0'))
2621		ret = lp_servicename(service);
2622
2623	return ret;
2624}
2625
2626
2627/**
2628 * Return the max print jobs per queue.
2629 */
2630int lp_maxprintjobs(struct loadparm_service *service, struct loadparm_service *sDefault)
2631{
2632	int maxjobs = (service != NULL) ? service->iMaxPrintJobs : sDefault->iMaxPrintJobs;
2633	if (maxjobs <= 0 || maxjobs >= PRINT_MAX_JOBID)
2634		maxjobs = PRINT_MAX_JOBID - 1;
2635
2636	return maxjobs;
2637}
2638
2639struct smb_iconv_convenience *lp_iconv_convenience(struct loadparm_context *lp_ctx)
2640{
2641	if (lp_ctx == NULL) {
2642		static struct smb_iconv_convenience *fallback_ic = NULL;
2643		if (fallback_ic == NULL)
2644			fallback_ic = smb_iconv_convenience_init(talloc_autofree_context(),
2645						  "CP850", "UTF8", true);
2646		return fallback_ic;
2647	}
2648	return lp_ctx->iconv_convenience;
2649}
2650
2651_PUBLIC_ void reload_charcnv(struct loadparm_context *lp_ctx)
2652{
2653	talloc_unlink(lp_ctx, lp_ctx->iconv_convenience);
2654	global_iconv_convenience = lp_ctx->iconv_convenience = smb_iconv_convenience_init_lp(lp_ctx, lp_ctx);
2655}
2656
2657void lp_smbcli_options(struct loadparm_context *lp_ctx,
2658			 struct smbcli_options *options)
2659{
2660	options->max_xmit = lp_max_xmit(lp_ctx);
2661	options->max_mux = lp_maxmux(lp_ctx);
2662	options->use_spnego = lp_nt_status_support(lp_ctx) && lp_use_spnego(lp_ctx);
2663	options->signing = lp_client_signing(lp_ctx);
2664	options->request_timeout = SMB_REQUEST_TIMEOUT;
2665	options->ntstatus_support = lp_nt_status_support(lp_ctx);
2666	options->max_protocol = lp_cli_maxprotocol(lp_ctx);
2667	options->unicode = lp_unicode(lp_ctx);
2668	options->use_oplocks = true;
2669	options->use_level2_oplocks = true;
2670}
2671
2672void lp_smbcli_session_options(struct loadparm_context *lp_ctx,
2673				 struct smbcli_session_options *options)
2674{
2675	options->lanman_auth = lp_client_lanman_auth(lp_ctx);
2676	options->ntlmv2_auth = lp_client_ntlmv2_auth(lp_ctx);
2677	options->plaintext_auth = lp_client_plaintext_auth(lp_ctx);
2678}
2679
2680_PUBLIC_ char *lp_tls_keyfile(TALLOC_CTX *mem_ctx, struct loadparm_context *lp_ctx)
2681{
2682	return private_path(mem_ctx, lp_ctx, lp_ctx->globals->tls_keyfile);
2683}
2684
2685_PUBLIC_ char *lp_tls_certfile(TALLOC_CTX *mem_ctx, struct loadparm_context *lp_ctx)
2686{
2687	return private_path(mem_ctx, lp_ctx, lp_ctx->globals->tls_certfile);
2688}
2689
2690_PUBLIC_ char *lp_tls_cafile(TALLOC_CTX *mem_ctx, struct loadparm_context *lp_ctx)
2691{
2692	return private_path(mem_ctx, lp_ctx, lp_ctx->globals->tls_cafile);
2693}
2694
2695_PUBLIC_ char *lp_tls_crlfile(TALLOC_CTX *mem_ctx, struct loadparm_context *lp_ctx)
2696{
2697	return private_path(mem_ctx, lp_ctx, lp_ctx->globals->tls_crlfile);
2698}
2699
2700_PUBLIC_ char *lp_tls_dhpfile(TALLOC_CTX *mem_ctx, struct loadparm_context *lp_ctx)
2701{
2702	return private_path(mem_ctx, lp_ctx, lp_ctx->globals->tls_dhpfile);
2703}
2704
2705_PUBLIC_ struct dcerpc_server_info *lp_dcerpc_server_info(TALLOC_CTX *mem_ctx, struct loadparm_context *lp_ctx)
2706{
2707	struct dcerpc_server_info *ret = talloc_zero(mem_ctx, struct dcerpc_server_info);
2708
2709	ret->domain_name = talloc_reference(mem_ctx, lp_workgroup(lp_ctx));
2710	ret->version_major = lp_parm_int(lp_ctx, NULL, "server_info", "version_major", 5);
2711	ret->version_minor = lp_parm_int(lp_ctx, NULL, "server_info", "version_minor", 2);
2712	ret->version_build = lp_parm_int(lp_ctx, NULL, "server_info", "version_build", 3790);
2713
2714	return ret;
2715}
2716
2717struct gensec_settings *lp_gensec_settings(TALLOC_CTX *mem_ctx, struct loadparm_context *lp_ctx)
2718{
2719	struct gensec_settings *settings = talloc(mem_ctx, struct gensec_settings);
2720	if (settings == NULL)
2721		return NULL;
2722	SMB_ASSERT(lp_ctx != NULL);
2723	settings->lp_ctx = talloc_reference(settings, lp_ctx);
2724	settings->iconv_convenience = lp_iconv_convenience(lp_ctx);
2725	settings->target_hostname = lp_parm_string(lp_ctx, NULL, "gensec", "target_hostname");
2726	return settings;
2727}
2728
2729