r14561: Update WHATSNEW.txt to revision 14554
[Samba.git] / source / torture / masktest.c
blobcb88e573e264582b3913793e7d1a3a03a4f520a2
1 /*
2 Unix SMB/CIFS implementation.
3 mask_match tester
4 Copyright (C) Andrew Tridgell 1999
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 2 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program; if not, write to the Free Software
18 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
21 #include "includes.h"
22 #include "system/filesys.h"
23 #include "libcli/libcli.h"
24 #include "libcli/raw/libcliraw.h"
25 #include "system/time.h"
26 #include "pstring.h"
27 #include "auth/gensec/gensec.h"
29 static struct cli_credentials *credentials;
30 static BOOL showall = False;
31 static BOOL old_list = False;
32 static const char *maskchars = "<>\"?*abc.";
33 static const char *filechars = "abcdefghijklm.";
34 static int verbose;
35 static int die_on_error;
36 static int NumLoops = 0;
37 static int max_length = 20;
39 static BOOL reg_match_one(struct smbcli_state *cli, const char *pattern, const char *file)
41 /* oh what a weird world this is */
42 if (old_list && strcmp(pattern, "*.*") == 0) return True;
44 if (strcmp(pattern,".") == 0) return False;
46 if (strcmp(file,"..") == 0) file = ".";
48 return ms_fnmatch(pattern, file, cli->transport->negotiate.protocol)==0;
51 static char *reg_test(struct smbcli_state *cli, char *pattern, char *long_name, char *short_name)
53 static fstring ret;
54 fstrcpy(ret, "---");
56 pattern = 1+strrchr_m(pattern,'\\');
58 if (reg_match_one(cli, pattern, ".")) ret[0] = '+';
59 if (reg_match_one(cli, pattern, "..")) ret[1] = '+';
60 if (reg_match_one(cli, pattern, long_name) ||
61 (*short_name && reg_match_one(cli, pattern, short_name))) ret[2] = '+';
62 return ret;
66 /*****************************************************
67 return a connection to a server
68 *******************************************************/
69 static struct smbcli_state *connect_one(char *share)
71 struct smbcli_state *c;
72 fstring server;
73 NTSTATUS status;
75 fstrcpy(server,share+2);
76 share = strchr_m(server,'\\');
77 if (!share) return NULL;
78 *share = 0;
79 share++;
81 cli_credentials_set_workstation(credentials, "masktest", CRED_SPECIFIED);
83 status = smbcli_full_connection(NULL, &c,
84 server,
85 share, NULL,
86 credentials, NULL);
88 if (!NT_STATUS_IS_OK(status)) {
89 return NULL;
92 return c;
95 static char *resultp;
96 static struct {
97 pstring long_name;
98 pstring short_name;
99 } last_hit;
100 static BOOL f_info_hit;
102 static void listfn(struct clilist_file_info *f, const char *s, void *state)
104 if (strcmp(f->name,".") == 0) {
105 resultp[0] = '+';
106 } else if (strcmp(f->name,"..") == 0) {
107 resultp[1] = '+';
108 } else {
109 resultp[2] = '+';
111 pstrcpy(last_hit.long_name, f->name);
112 pstrcpy(last_hit.short_name, f->short_name);
113 f_info_hit = True;
116 static void get_real_name(struct smbcli_state *cli,
117 pstring long_name, fstring short_name)
119 const char *mask;
120 if (cli->transport->negotiate.protocol <= PROTOCOL_LANMAN1) {
121 mask = "\\masktest\\*.*";
122 } else {
123 mask = "\\masktest\\*";
126 f_info_hit = False;
128 smbcli_list_new(cli->tree, mask,
129 FILE_ATTRIBUTE_HIDDEN | FILE_ATTRIBUTE_DIRECTORY,
130 RAW_SEARCH_BOTH_DIRECTORY_INFO,
131 listfn, NULL);
133 if (f_info_hit) {
134 fstrcpy(short_name, last_hit.short_name);
135 strlower(short_name);
136 pstrcpy(long_name, last_hit.long_name);
137 strlower(long_name);
140 if (*short_name == 0) {
141 fstrcpy(short_name, long_name);
145 static void testpair(struct smbcli_state *cli, char *mask, char *file)
147 int fnum;
148 fstring res1;
149 char *res2;
150 static int count;
151 fstring short_name;
152 pstring long_name;
154 count++;
156 fstrcpy(res1, "---");
158 fnum = smbcli_open(cli->tree, file, O_CREAT|O_TRUNC|O_RDWR, 0);
159 if (fnum == -1) {
160 DEBUG(0,("Can't create %s\n", file));
161 return;
163 smbcli_close(cli->tree, fnum);
165 resultp = res1;
166 fstrcpy(short_name, "");
167 get_real_name(cli, long_name, short_name);
168 fstrcpy(res1, "---");
169 smbcli_list_new(cli->tree, mask,
170 FILE_ATTRIBUTE_HIDDEN | FILE_ATTRIBUTE_DIRECTORY,
171 RAW_SEARCH_BOTH_DIRECTORY_INFO,
172 listfn, NULL);
174 res2 = reg_test(cli, mask, long_name, short_name);
176 if (showall || strcmp(res1, res2)) {
177 d_printf("%s %s %d mask=[%s] file=[%s] rfile=[%s/%s]\n",
178 res1, res2, count, mask, file, long_name, short_name);
179 if (die_on_error) exit(1);
182 smbcli_unlink(cli->tree, file);
184 if (count % 100 == 0) DEBUG(0,("%d\n", count));
187 static void test_mask(int argc, char *argv[],
188 struct smbcli_state *cli)
190 pstring mask, file;
191 int l1, l2, i, l;
192 int mc_len = strlen(maskchars);
193 int fc_len = strlen(filechars);
195 smbcli_mkdir(cli->tree, "\\masktest");
197 smbcli_unlink(cli->tree, "\\masktest\\*");
199 if (argc >= 2) {
200 while (argc >= 2) {
201 pstrcpy(mask,"\\masktest\\");
202 pstrcpy(file,"\\masktest\\");
203 pstrcat(mask, argv[0]);
204 pstrcat(file, argv[1]);
205 testpair(cli, mask, file);
206 argv += 2;
207 argc -= 2;
209 goto finished;
212 while (1) {
213 l1 = 1 + random() % max_length;
214 l2 = 1 + random() % max_length;
215 pstrcpy(mask,"\\masktest\\");
216 pstrcpy(file,"\\masktest\\");
217 l = strlen(mask);
218 for (i=0;i<l1;i++) {
219 mask[i+l] = maskchars[random() % mc_len];
221 mask[l+l1] = 0;
223 for (i=0;i<l2;i++) {
224 file[i+l] = filechars[random() % fc_len];
226 file[l+l2] = 0;
228 if (strcmp(file+l,".") == 0 ||
229 strcmp(file+l,"..") == 0 ||
230 strcmp(mask+l,"..") == 0) continue;
232 if (strspn(file+l, ".") == strlen(file+l)) continue;
234 testpair(cli, mask, file);
235 if (NumLoops && (--NumLoops == 0))
236 break;
239 finished:
240 smbcli_rmdir(cli->tree, "\\masktest");
244 static void usage(void)
246 printf(
247 "Usage:\n\
248 masktest //server/share [options..]\n\
249 options:\n\
250 -d debuglevel\n\
251 -n numloops\n\
252 -W workgroup\n\
253 -U user%%pass\n\
254 -s seed\n\
255 -l max test length\n\
256 -M max protocol\n\
257 -f filechars (default %s)\n\
258 -m maskchars (default %s)\n\
259 -v verbose mode\n\
260 -E die on error\n\
261 -a show all tests\n\
263 This program tests wildcard matching between two servers. It generates\n\
264 random pairs of filenames/masks and tests that they match in the same\n\
265 way on the servers and internally\n\
267 filechars, maskchars);
270 /****************************************************************************
271 main program
272 ****************************************************************************/
273 int main(int argc,char *argv[])
275 char *share;
276 struct smbcli_state *cli;
277 int opt;
278 int seed;
280 setlinebuf(stdout);
282 setup_logging("masktest", DEBUG_STDOUT);
284 lp_set_cmdline("log level", "0");
286 if (argc < 2 || argv[1][0] == '-') {
287 usage();
288 exit(1);
291 share = argv[1];
293 all_string_sub(share,"/","\\",0);
295 setup_logging(argv[0], DEBUG_STDOUT);
297 argc -= 1;
298 argv += 1;
300 lp_load();
302 credentials = cli_credentials_init(talloc_autofree_context());
303 cli_credentials_guess(credentials);
305 seed = time(NULL);
307 init_iconv();
309 while ((opt = getopt(argc, argv, "n:d:U:s:hm:f:aoW:M:vEl:")) != EOF) {
310 switch (opt) {
311 case 'n':
312 NumLoops = atoi(optarg);
313 break;
314 case 'd':
315 DEBUGLEVEL = atoi(optarg);
316 break;
317 case 'E':
318 die_on_error = 1;
319 break;
320 case 'v':
321 verbose++;
322 break;
323 case 'M':
324 lp_set_cmdline("max protocol", optarg);
325 break;
326 case 'U':
327 cli_credentials_parse_string(credentials, optarg, CRED_SPECIFIED);
328 break;
329 case 's':
330 seed = atoi(optarg);
331 break;
332 case 'h':
333 usage();
334 exit(1);
335 case 'm':
336 maskchars = optarg;
337 break;
338 case 'l':
339 max_length = atoi(optarg);
340 break;
341 case 'f':
342 filechars = optarg;
343 break;
344 case 'a':
345 showall = 1;
346 break;
347 case 'o':
348 old_list = True;
349 break;
350 default:
351 printf("Unknown option %c (%d)\n", (char)opt, opt);
352 exit(1);
356 gensec_init();
358 argc -= optind;
359 argv += optind;
361 cli = connect_one(share);
362 if (!cli) {
363 DEBUG(0,("Failed to connect to %s\n", share));
364 exit(1);
367 /* need to init seed after connect as clientgen uses random numbers */
368 DEBUG(0,("seed=%d format --- --- (server, correct)\n", seed));
369 srandom(seed);
371 test_mask(argc, argv, cli);
373 return(0);