r23784: use the GPLv3 boilerplate as recommended by the FSF and the license text
[ira/wip.git] / source3 / utils / nmblookup.c
1 /* 
2    Unix SMB/CIFS implementation.
3    NBT client - used to lookup netbios names
4    Copyright (C) Andrew Tridgell 1994-1998
5    Copyright (C) Jelmer Vernooij 2003 (Conversion to popt)
6    
7    This program is free software; you can redistribute it and/or modify
8    it under the terms of the GNU General Public License as published by
9    the Free Software Foundation; either version 3 of the License, or
10    (at your option) any later version.
11    
12    This program is distributed in the hope that it will be useful,
13    but WITHOUT ANY WARRANTY; without even the implied warranty of
14    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
15    GNU General Public License for more details.
16    
17    You should have received a copy of the GNU General Public License
18    along with this program.  If not, see <http://www.gnu.org/licenses/>.
19    
20 */
21
22 #include "includes.h"
23
24 extern BOOL AllowDebugChange;
25
26 static BOOL give_flags = False;
27 static BOOL use_bcast = True;
28 static BOOL got_bcast = False;
29 static struct in_addr bcast_addr;
30 static BOOL recursion_desired = False;
31 static BOOL translate_addresses = False;
32 static int ServerFD= -1;
33 static int RootPort = False;
34 static BOOL find_status=False;
35
36 /****************************************************************************
37   open the socket communication
38   **************************************************************************/
39 static BOOL open_sockets(void)
40 {
41   ServerFD = open_socket_in( SOCK_DGRAM,
42                              (RootPort ? 137 : 0),
43                              (RootPort ?   0 : 3),
44                              interpret_addr(lp_socket_address()), True );
45
46   if (ServerFD == -1)
47     return(False);
48
49   set_socket_options( ServerFD, "SO_BROADCAST" );
50
51   DEBUG(3, ("Socket opened.\n"));
52   return True;
53 }
54
55 /****************************************************************************
56 turn a node status flags field into a string
57 ****************************************************************************/
58 static char *node_status_flags(unsigned char flags)
59 {
60         static fstring ret;
61         fstrcpy(ret,"");
62         
63         fstrcat(ret, (flags & 0x80) ? "<GROUP> " : "        ");
64         if ((flags & 0x60) == 0x00) fstrcat(ret,"B ");
65         if ((flags & 0x60) == 0x20) fstrcat(ret,"P ");
66         if ((flags & 0x60) == 0x40) fstrcat(ret,"M ");
67         if ((flags & 0x60) == 0x60) fstrcat(ret,"H ");
68         if (flags & 0x10) fstrcat(ret,"<DEREGISTERING> ");
69         if (flags & 0x08) fstrcat(ret,"<CONFLICT> ");
70         if (flags & 0x04) fstrcat(ret,"<ACTIVE> ");
71         if (flags & 0x02) fstrcat(ret,"<PERMANENT> ");
72         
73         return ret;
74 }
75
76 /****************************************************************************
77 turn the NMB Query flags into a string
78 ****************************************************************************/
79 static char *query_flags(int flags)
80 {
81         static fstring ret1;
82         fstrcpy(ret1, "");
83
84         if (flags & NM_FLAGS_RS) fstrcat(ret1, "Response ");
85         if (flags & NM_FLAGS_AA) fstrcat(ret1, "Authoritative ");
86         if (flags & NM_FLAGS_TC) fstrcat(ret1, "Truncated ");
87         if (flags & NM_FLAGS_RD) fstrcat(ret1, "Recursion_Desired ");
88         if (flags & NM_FLAGS_RA) fstrcat(ret1, "Recursion_Available ");
89         if (flags & NM_FLAGS_B)  fstrcat(ret1, "Broadcast ");
90
91         return ret1;
92 }
93
94 /****************************************************************************
95 do a node status query
96 ****************************************************************************/
97 static void do_node_status(int fd, const char *name, int type, struct in_addr ip)
98 {
99         struct nmb_name nname;
100         int count, i, j;
101         NODE_STATUS_STRUCT *status;
102         struct node_status_extra extra;
103         fstring cleanname;
104
105         d_printf("Looking up status of %s\n",inet_ntoa(ip));
106         make_nmb_name(&nname, name, type);
107         status = node_status_query(fd,&nname,ip, &count, &extra);
108         if (status) {
109                 for (i=0;i<count;i++) {
110                         pull_ascii_fstring(cleanname, status[i].name);
111                         for (j=0;cleanname[j];j++) {
112                                 if (!isprint((int)cleanname[j])) cleanname[j] = '.';
113                         }
114                         d_printf("\t%-15s <%02x> - %s\n",
115                                cleanname,status[i].type,
116                                node_status_flags(status[i].flags));
117                 }
118                 d_printf("\n\tMAC Address = %02X-%02X-%02X-%02X-%02X-%02X\n",
119                                 extra.mac_addr[0], extra.mac_addr[1],
120                                 extra.mac_addr[2], extra.mac_addr[3],
121                                 extra.mac_addr[4], extra.mac_addr[5]);
122                 d_printf("\n");
123                 SAFE_FREE(status);
124         } else {
125                 d_printf("No reply from %s\n\n",inet_ntoa(ip));
126         }
127 }
128
129
130 /****************************************************************************
131 send out one query
132 ****************************************************************************/
133 static BOOL query_one(const char *lookup, unsigned int lookup_type)
134 {
135         int j, count, flags = 0;
136         struct in_addr *ip_list=NULL;
137
138         if (got_bcast) {
139                 d_printf("querying %s on %s\n", lookup, inet_ntoa(bcast_addr));
140                 ip_list = name_query(ServerFD,lookup,lookup_type,use_bcast,
141                                      use_bcast?True:recursion_desired,
142                                      bcast_addr,&count, &flags, NULL);
143         } else {
144                 struct in_addr *bcast;
145                 for (j=iface_count() - 1;
146                      !ip_list && j >= 0;
147                      j--) {
148                         bcast = iface_n_bcast(j);
149                         d_printf("querying %s on %s\n", 
150                                lookup, inet_ntoa(*bcast));
151                         ip_list = name_query(ServerFD,lookup,lookup_type,
152                                              use_bcast,
153                                              use_bcast?True:recursion_desired,
154                                              *bcast,&count, &flags, NULL);
155                 }
156         }
157
158         if (!ip_list) return False;
159
160         if (give_flags)
161           d_printf("Flags: %s\n", query_flags(flags));
162
163         for (j=0;j<count;j++) {
164                 if (translate_addresses) {
165                         struct hostent *host = gethostbyaddr((char *)&ip_list[j], sizeof(ip_list[j]), AF_INET);
166                         if (host) {
167                                 d_printf("%s, ", host -> h_name);
168                         }
169                 }
170                 d_printf("%s %s<%02x>\n",inet_ntoa(ip_list[j]),lookup, lookup_type);
171                 /* We can only do find_status if the ip address returned
172                    was valid - ie. name_query returned true.
173                  */
174                 if (find_status) {
175                         do_node_status(ServerFD, lookup, lookup_type, ip_list[j]);
176                 }
177         }
178
179         safe_free(ip_list);
180
181         return (ip_list != NULL);
182 }
183
184
185 /****************************************************************************
186   main program
187 ****************************************************************************/
188 int main(int argc,char *argv[])
189 {
190   int opt;
191   unsigned int lookup_type = 0x0;
192   fstring lookup;
193   static BOOL find_master=False;
194   static BOOL lookup_by_ip = False;
195   poptContext pc;
196
197   struct poptOption long_options[] = {
198           POPT_AUTOHELP
199           { "broadcast", 'B', POPT_ARG_STRING, NULL, 'B', "Specify address to use for broadcasts", "BROADCAST-ADDRESS" },
200           { "flags", 'f', POPT_ARG_VAL, &give_flags, True, "List the NMB flags returned" },
201           { "unicast", 'U', POPT_ARG_STRING, NULL, 'U', "Specify address to use for unicast" },
202           { "master-browser", 'M', POPT_ARG_VAL, &find_master, True, "Search for a master browser" },
203           { "recursion", 'R', POPT_ARG_VAL, &recursion_desired, True, "Set recursion desired in package" },
204           { "status", 'S', POPT_ARG_VAL, &find_status, True, "Lookup node status as well" },
205           { "translate", 'T', POPT_ARG_NONE, NULL, 'T', "Translate IP addresses into names" },
206           { "root-port", 'r', POPT_ARG_VAL, &RootPort, True, "Use root port 137 (Win95 only replies to this)" },
207           { "lookup-by-ip", 'A', POPT_ARG_VAL, &lookup_by_ip, True, "Do a node status on <name> as an IP Address" },
208           POPT_COMMON_SAMBA
209           POPT_COMMON_CONNECTION
210           { 0, 0, 0, 0 }
211   };
212         
213   *lookup = 0;
214
215   load_case_tables();
216
217   setup_logging(argv[0],True);
218
219   pc = poptGetContext("nmblookup", argc, (const char **)argv, long_options, 
220                                           POPT_CONTEXT_KEEP_FIRST);
221
222   poptSetOtherOptionHelp(pc, "<NODE> ...");
223
224   while ((opt = poptGetNextOpt(pc)) != -1) {
225           switch (opt) {
226           case 'B':
227                   bcast_addr = *interpret_addr2(poptGetOptArg(pc));
228                   got_bcast = True;
229                   use_bcast = True;
230                   break;
231           case 'U':
232                   bcast_addr = *interpret_addr2(poptGetOptArg(pc));
233                   got_bcast = True;
234                   use_bcast = False;
235                   break;
236           case 'T':
237                   translate_addresses = !translate_addresses;
238                   break;
239           }
240   }
241
242   poptGetArg(pc); /* Remove argv[0] */
243
244   if(!poptPeekArg(pc)) { 
245           poptPrintUsage(pc, stderr, 0);
246           exit(1);
247   }
248
249   if (!lp_load(dyn_CONFIGFILE,True,False,False,True)) {
250           fprintf(stderr, "Can't load %s - run testparm to debug it\n", dyn_CONFIGFILE);
251   }
252
253   load_interfaces();
254   if (!open_sockets()) return(1);
255
256   while(poptPeekArg(pc))
257   {
258           char *p;
259           struct in_addr ip;
260
261           fstrcpy(lookup,poptGetArg(pc));
262
263           if(lookup_by_ip)
264           {
265                   ip = *interpret_addr2(lookup);
266                   fstrcpy(lookup,"*");
267                   do_node_status(ServerFD, lookup, lookup_type, ip);
268                   continue;
269           }
270
271           if (find_master) {
272                   if (*lookup == '-') {
273                           fstrcpy(lookup,"\01\02__MSBROWSE__\02");
274                           lookup_type = 1;
275                   } else {
276                           lookup_type = 0x1d;
277                   }
278           }
279
280           p = strchr_m(lookup,'#');
281           if (p) {
282                   *p = '\0';
283                   sscanf(++p,"%x",&lookup_type);
284           }
285
286           if (!query_one(lookup, lookup_type)) {
287                   d_printf( "name_query failed to find name %s", lookup );
288                   if( 0 != lookup_type )
289                           d_printf( "#%02x", lookup_type );
290                   d_printf( "\n" );
291           }
292   }
293
294   poptFreeContext(pc);
295
296   return(0);
297 }