2 Unix SMB/CIFS implementation.
4 Copyright (C) Andrew Tridgell 1999
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 2 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program; if not, write to the Free Software
18 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
23 static fstring password
;
24 static fstring username
;
26 static int max_protocol
= PROTOCOL_NT1
;
27 static BOOL showall
= False
;
28 static BOOL old_list
= False
;
29 static const char *maskchars
= "<>\"?*abc.";
30 static const char *filechars
= "abcdefghijklm.";
32 static int die_on_error
;
33 static int NumLoops
= 0;
34 static int ignore_dot_errors
= 0;
38 extern BOOL AllowDebugChange
;
40 /* a test fn for LANMAN mask support */
41 static int ms_fnmatch_lanman_core(const char *pattern
, const char *string
)
43 const char *p
= pattern
, *n
= string
;
46 if (strcmp(p
,"?")==0 && strcmp(n
,".")==0) goto match
;
51 /* if (! *n && ! *p) goto match; */
52 if (*n
!= '.') goto nomatch
;
57 if ((*n
== '.' && n
[1] != '.') || ! *n
) goto next
;
63 if (! n
[1] && ms_fnmatch_lanman_core(p
, n
+1) == 0) goto match
;
64 if (ms_fnmatch_lanman_core(p
, n
) == 0) goto match
;
74 if (ms_fnmatch_lanman_core(p
, n
) == 0) goto match
;
80 if (ms_fnmatch_lanman_core(p
, n
) == 0) goto match
;
81 if (*n
== '.' && !strchr_m(n
+1,'.')) {
89 if (*n
== 0 && ms_fnmatch_lanman_core(p
, n
) == 0) goto match
;
90 if (*n
!= '.') goto nomatch
;
95 if (c
!= *n
) goto nomatch
;
100 if (! *n
) goto match
;
103 if (verbose
) printf("NOMATCH pattern=[%s] string=[%s]\n", pattern
, string
);
107 if (ms_fnmatch_lanman_core(p
, n
) == 0) goto match
;
111 if (verbose
) printf("MATCH pattern=[%s] string=[%s]\n", pattern
, string
);
115 static int ms_fnmatch_lanman(const char *pattern
, const char *string
)
117 if (!strpbrk(pattern
, "?*<>\"")) {
118 if (strcmp(string
,"..") == 0)
121 return strcmp(pattern
, string
);
124 if (strcmp(string
,"..") == 0 || strcmp(string
,".") == 0) {
125 return ms_fnmatch_lanman_core(pattern
, "..") &&
126 ms_fnmatch_lanman_core(pattern
, ".");
129 return ms_fnmatch_lanman_core(pattern
, string
);
132 static BOOL
reg_match_one(struct cli_state
*cli
, const char *pattern
, const char *file
)
134 /* oh what a weird world this is */
135 if (old_list
&& strcmp(pattern
, "*.*") == 0) return True
;
137 if (strcmp(pattern
,".") == 0) return False
;
139 if (max_protocol
<= PROTOCOL_LANMAN2
) {
140 return ms_fnmatch_lanman(pattern
, file
)==0;
143 if (strcmp(file
,"..") == 0) file
= ".";
145 return ms_fnmatch(pattern
, file
, cli
->protocol
, False
) == 0;
148 static char *reg_test(struct cli_state
*cli
, char *pattern
, char *long_name
, char *short_name
)
153 pattern
= 1+strrchr_m(pattern
,'\\');
155 if (reg_match_one(cli
, pattern
, ".")) ret
[0] = '+';
156 if (reg_match_one(cli
, pattern
, "..")) ret
[1] = '+';
157 if (reg_match_one(cli
, pattern
, long_name
) ||
158 (*short_name
&& reg_match_one(cli
, pattern
, short_name
))) ret
[2] = '+';
163 /*****************************************************
164 return a connection to a server
165 *******************************************************/
166 static struct cli_state
*connect_one(char *share
)
169 struct nmb_name called
, calling
;
176 share
= strchr_m(server
,'\\');
177 if (!share
) return NULL
;
185 make_nmb_name(&calling
, "masktest", 0x0);
186 make_nmb_name(&called
, server
, 0x20);
191 /* have to open a new connection */
192 if (!(c
=cli_initialise())) {
193 DEBUG(0,("Connection to %s failed\n", server_n
));
197 status
= cli_connect(c
, server_n
, &ip
);
198 if (!NT_STATUS_IS_OK(status
)) {
199 DEBUG(0,("Connection to %s failed. Error %s\n", server_n
, nt_errstr(status
) ));
203 c
->protocol
= max_protocol
;
205 if (!cli_session_request(c
, &calling
, &called
)) {
206 DEBUG(0,("session request to %s failed\n", called
.name
));
208 if (strcmp(called
.name
, "*SMBSERVER")) {
209 make_nmb_name(&called
, "*SMBSERVER", 0x20);
215 DEBUG(4,(" session request ok\n"));
217 if (!cli_negprot(c
)) {
218 DEBUG(0,("protocol negotiation failed\n"));
224 char *pass
= getpass("Password: ");
226 fstrcpy(password
, pass
);
230 if (!NT_STATUS_IS_OK(cli_session_setup(c
, username
,
231 password
, strlen(password
),
232 password
, strlen(password
),
234 DEBUG(0,("session setup failed: %s\n", cli_errstr(c
)));
239 * These next two lines are needed to emulate
240 * old client behaviour for people who have
241 * scripts based on client output.
242 * QUESTION ? Do we want to have a 'client compatibility
243 * mode to turn these on/off ? JRA.
246 if (*c
->server_domain
|| *c
->server_os
|| *c
->server_type
)
247 DEBUG(1,("Domain=[%s] OS=[%s] Server=[%s]\n",
248 c
->server_domain
,c
->server_os
,c
->server_type
));
250 DEBUG(4,(" session setup ok\n"));
252 if (!cli_send_tconX(c
, share
, "?????",
253 password
, strlen(password
)+1)) {
254 DEBUG(0,("tree connect failed: %s\n", cli_errstr(c
)));
259 DEBUG(4,(" tconx ok\n"));
264 static char *resultp
;
265 static file_info
*f_info
;
267 static void listfn(const char *mnt
, file_info
*f
, const char *s
, void *state
)
269 if (strcmp(f
->name
,".") == 0) {
271 } else if (strcmp(f
->name
,"..") == 0) {
279 static void get_real_name(struct cli_state
*cli
,
280 pstring long_name
, fstring short_name
)
282 /* nasty hack to force level 260 listings - tridge */
283 cli
->capabilities
|= CAP_NT_SMBS
;
284 if (max_protocol
<= PROTOCOL_LANMAN1
) {
285 cli_list_new(cli
, "\\masktest\\*.*", aHIDDEN
| aDIR
, listfn
, NULL
);
287 cli_list_new(cli
, "\\masktest\\*", aHIDDEN
| aDIR
, listfn
, NULL
);
290 fstrcpy(short_name
, f_info
->short_name
);
291 strlower_m(short_name
);
292 pstrcpy(long_name
, f_info
->name
);
293 strlower_m(long_name
);
296 if (*short_name
== 0) {
297 fstrcpy(short_name
, long_name
);
301 if (!strchr_m(short_name
,'.')) {
302 fstrcat(short_name
,".");
307 static void testpair(struct cli_state
*cli
, char *mask
, char *file
)
318 fstrcpy(res1
, "---");
320 fnum
= cli_open(cli
, file
, O_CREAT
|O_TRUNC
|O_RDWR
, 0);
322 DEBUG(0,("Can't create %s\n", file
));
325 cli_close(cli
, fnum
);
328 fstrcpy(short_name
, "");
330 get_real_name(cli
, long_name
, short_name
);
332 fstrcpy(res1
, "---");
333 cli_list(cli
, mask
, aHIDDEN
| aDIR
, listfn
, NULL
);
335 res2
= reg_test(cli
, mask
, long_name
, short_name
);
338 ((strcmp(res1
, res2
) && !ignore_dot_errors
) ||
339 (strcmp(res1
+2, res2
+2) && ignore_dot_errors
))) {
340 DEBUG(0,("%s %s %d mask=[%s] file=[%s] rfile=[%s/%s]\n",
341 res1
, res2
, count
, mask
, file
, long_name
, short_name
));
342 if (die_on_error
) exit(1);
345 cli_unlink(cli
, file
);
347 if (count
% 100 == 0) DEBUG(0,("%d\n", count
));
350 static void test_mask(int argc
, char *argv
[],
351 struct cli_state
*cli
)
355 int mc_len
= strlen(maskchars
);
356 int fc_len
= strlen(filechars
);
358 cli_mkdir(cli
, "\\masktest");
360 cli_unlink(cli
, "\\masktest\\*");
364 pstrcpy(mask
,"\\masktest\\");
365 pstrcpy(file
,"\\masktest\\");
366 pstrcat(mask
, argv
[0]);
367 pstrcat(file
, argv
[1]);
368 testpair(cli
, mask
, file
);
376 l1
= 1 + random() % 20;
377 l2
= 1 + random() % 20;
378 pstrcpy(mask
,"\\masktest\\");
379 pstrcpy(file
,"\\masktest\\");
382 mask
[i
+l
] = maskchars
[random() % mc_len
];
387 file
[i
+l
] = filechars
[random() % fc_len
];
391 if (strcmp(file
+l
,".") == 0 ||
392 strcmp(file
+l
,"..") == 0 ||
393 strcmp(mask
+l
,"..") == 0) continue;
395 if (strspn(file
+l
, ".") == strlen(file
+l
)) continue;
397 testpair(cli
, mask
, file
);
398 if (NumLoops
&& (--NumLoops
== 0))
403 cli_rmdir(cli
, "\\masktest");
407 static void usage(void)
411 masktest //server/share [options..]\n\
419 -f filechars (default %s)\n\
420 -m maskchars (default %s)\n\
424 -i ignore . and .. errors\n\
426 This program tests wildcard matching between two servers. It generates\n\
427 random pairs of filenames/masks and tests that they match in the same\n\
428 way on the servers and internally\n\
430 filechars
, maskchars
);
433 /****************************************************************************
435 ****************************************************************************/
436 int main(int argc
,char *argv
[])
439 struct cli_state
*cli
;
449 AllowDebugChange
= False
;
451 if (argc
< 2 || argv
[1][0] == '-') {
458 all_string_sub(share
,"/","\\",0);
460 setup_logging(argv
[0],True
);
465 lp_load(dyn_CONFIGFILE
,True
,False
,False
,True
);
468 if (getenv("USER")) {
469 fstrcpy(username
,getenv("USER"));
474 while ((opt
= getopt(argc
, argv
, "n:d:U:s:hm:f:aoW:M:vEi")) != EOF
) {
477 NumLoops
= atoi(optarg
);
480 DEBUGLEVEL
= atoi(optarg
);
486 ignore_dot_errors
= 1;
492 max_protocol
= interpret_protocol(optarg
, max_protocol
);
495 fstrcpy(username
,optarg
);
496 p
= strchr_m(username
,'%');
499 fstrcpy(password
, p
+1);
522 printf("Unknown option %c (%d)\n", (char)opt
, opt
);
531 cli
= connect_one(share
);
533 DEBUG(0,("Failed to connect to %s\n", share
));
537 /* need to init seed after connect as clientgen uses random numbers */
538 DEBUG(0,("seed=%d\n", seed
));
541 test_mask(argc
, argv
, cli
);