2 Unix SMB/CIFS implementation.
4 Copyright (C) Andrew Tridgell 1999
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program. If not, see <http://www.gnu.org/licenses/>.
21 #include "system/filesys.h"
23 #include "libsmb/libsmb.h"
24 #include "libsmb/nmblib.h"
25 #include "../libcli/smb/smbXcli_base.h"
27 static fstring password;
28 static fstring username;
30 static struct cli_credentials *test_creds;
31 static int max_protocol = -1;
32 static bool showall = False;
33 static bool old_list = False;
34 static const char *maskchars = "<>\"?*abc.";
35 static const char *filechars = "abcdefghijklm.";
37 static int die_on_error;
38 static int NumLoops = 0;
39 static int ignore_dot_errors = 0;
44 /* a test fn for LANMAN mask support */
45 static int ms_fnmatch_lanman_core(const char *pattern, const char *string)
47 const char *p = pattern, *n = string;
50 if (strcmp(p,"?")==0 && strcmp(n,".")==0) goto match;
55 /* if (! *n && ! *p) goto match; */
56 if (*n != '.') goto nomatch;
61 if ((*n == '.' && n[1] != '.') || ! *n) goto next;
67 if (! n[1] && ms_fnmatch_lanman_core(p, n+1) == 0) goto match;
68 if (ms_fnmatch_lanman_core(p, n) == 0) goto match;
78 if (ms_fnmatch_lanman_core(p, n) == 0) goto match;
84 if (ms_fnmatch_lanman_core(p, n) == 0) goto match;
85 if (*n == '.' && !strchr_m(n+1,'.')) {
93 if (*n == 0 && ms_fnmatch_lanman_core(p, n) == 0) goto match;
94 if (*n != '.') goto nomatch;
99 if (c != *n) goto nomatch;
104 if (! *n) goto match;
107 if (verbose) printf("NOMATCH pattern=[%s] string=[%s]\n", pattern, string);
111 if (ms_fnmatch_lanman_core(p, n) == 0) goto match;
115 if (verbose) printf("MATCH pattern=[%s] string=[%s]\n", pattern, string);
119 static int ms_fnmatch_lanman(const char *pattern, const char *string)
121 if (!strpbrk(pattern, "?*<>\"")) {
122 if (strcmp(string,"..") == 0)
125 return strcmp(pattern, string);
128 if (strcmp(string,"..") == 0 || strcmp(string,".") == 0) {
129 return ms_fnmatch_lanman_core(pattern, "..") &&
130 ms_fnmatch_lanman_core(pattern, ".");
133 return ms_fnmatch_lanman_core(pattern, string);
136 static bool reg_match_one(struct cli_state *cli, const char *pattern, const char *file)
138 /* oh what a weird world this is */
139 if (old_list && strcmp(pattern, "*.*") == 0) return True;
141 if (strcmp(pattern,".") == 0) return False;
143 if (max_protocol <= PROTOCOL_LANMAN2) {
144 return ms_fnmatch_lanman(pattern, file)==0;
147 if (strcmp(file,"..") == 0) file = ".";
149 return ms_fnmatch(pattern, file, smbXcli_conn_protocol(cli->conn), False) == 0;
152 static char *reg_test(struct cli_state *cli, const char *pattern, const char *long_name, const char *short_name)
155 const char *new_pattern = 1+strrchr_m(pattern,'\\');
158 if (reg_match_one(cli, new_pattern, ".")) ret[0] = '+';
159 if (reg_match_one(cli, new_pattern, "..")) ret[1] = '+';
160 if (reg_match_one(cli, new_pattern, long_name) ||
161 (*short_name && reg_match_one(cli, new_pattern, short_name))) ret[2] = '+';
166 /*****************************************************
167 return a connection to a server
168 *******************************************************/
169 static struct cli_state *connect_one(char *share)
177 share = strchr_m(server,'\\');
178 if (!share) return NULL;
184 status = cli_connect_nb(server, NULL, 0, 0x20, "masktest",
185 SMB_SIGNING_DEFAULT, 0, &c);
186 if (!NT_STATUS_IS_OK(status)) {
187 DEBUG(0,("Connection to %s failed. Error %s\n", server_n,
192 status = smbXcli_negprot(c->conn, c->timeout, PROTOCOL_CORE,
194 if (!NT_STATUS_IS_OK(status)) {
195 DEBUG(0, ("protocol negotiation failed: %s\n",
201 status = cli_session_setup_creds(c, test_creds);
202 if (!NT_STATUS_IS_OK(status)) {
203 DEBUG(0, ("session setup failed: %s\n", nt_errstr(status)));
208 * These next two lines are needed to emulate
209 * old client behaviour for people who have
210 * scripts based on client output.
211 * QUESTION ? Do we want to have a 'client compatibility
212 * mode to turn these on/off ? JRA.
215 if (*c->server_domain || *c->server_os || *c->server_type)
216 DEBUG(1,("Domain=[%s] OS=[%s] Server=[%s]\n",
217 c->server_domain,c->server_os,c->server_type));
219 DEBUG(4,(" session setup ok\n"));
221 status = cli_tree_connect_creds(c, share, "?????", test_creds);
222 if (!NT_STATUS_IS_OK(status)) {
223 DEBUG(0,("tree connect failed: %s\n", nt_errstr(status)));
228 DEBUG(4,(" tconx ok\n"));
233 static char *resultp;
240 static NTSTATUS listfn(const char *mnt, struct file_info *f, const char *s,
243 struct rn_state *state = (struct rn_state *)private_data;
244 if (strcmp(f->name,".") == 0) {
246 } else if (strcmp(f->name,"..") == 0) {
253 return NT_STATUS_INTERNAL_ERROR;
256 if (ISDOT(f->name) || ISDOTDOT(f->name)) {
261 fstrcpy(state->short_name, f->short_name ? f->short_name : "");
262 (void)strlower_m(state->short_name);
263 *state->pp_long_name = SMB_STRDUP(f->name);
264 if (!*state->pp_long_name) {
265 return NT_STATUS_NO_MEMORY;
267 (void)strlower_m(*state->pp_long_name);
271 static void get_real_name(struct cli_state *cli,
272 char **pp_long_name, fstring short_name)
274 struct rn_state state;
276 state.pp_long_name = pp_long_name;
277 state.short_name = short_name;
279 *pp_long_name = NULL;
280 /* nasty hack to force level 260 listings - tridge */
281 if (max_protocol <= PROTOCOL_LANMAN1) {
282 cli_list_trans(cli, "\\masktest\\*.*", FILE_ATTRIBUTE_HIDDEN | FILE_ATTRIBUTE_DIRECTORY,
283 SMB_FIND_FILE_BOTH_DIRECTORY_INFO, listfn,
286 cli_list_trans(cli, "\\masktest\\*", FILE_ATTRIBUTE_HIDDEN | FILE_ATTRIBUTE_DIRECTORY,
287 SMB_FIND_FILE_BOTH_DIRECTORY_INFO,
291 if (*short_name == 0) {
292 fstrcpy(short_name, *pp_long_name);
296 if (!strchr_m(short_name,'.')) {
297 fstrcat(short_name,".");
302 static void testpair(struct cli_state *cli, const char *mask, const char *file)
309 char *long_name = NULL;
313 fstrcpy(res1, "---");
315 if (!NT_STATUS_IS_OK(cli_openx(cli, file, O_CREAT|O_TRUNC|O_RDWR, 0, &fnum))) {
316 DEBUG(0,("Can't create %s\n", file));
319 cli_close(cli, fnum);
322 fstrcpy(short_name, "");
323 get_real_name(cli, &long_name, short_name);
327 fstrcpy(res1, "---");
328 cli_list(cli, mask, FILE_ATTRIBUTE_HIDDEN | FILE_ATTRIBUTE_DIRECTORY, listfn, NULL);
330 res2 = reg_test(cli, mask, long_name, short_name);
333 ((strcmp(res1, res2) && !ignore_dot_errors) ||
334 (strcmp(res1+2, res2+2) && ignore_dot_errors))) {
335 DEBUG(0,("%s %s %d mask=[%s] file=[%s] rfile=[%s/%s]\n",
336 res1, res2, count, mask, file, long_name, short_name));
337 if (die_on_error) exit(1);
340 cli_unlink(cli, file, FILE_ATTRIBUTE_SYSTEM | FILE_ATTRIBUTE_HIDDEN);
342 if (count % 100 == 0) DEBUG(0,("%d\n", count));
343 SAFE_FREE(long_name);
346 static void test_mask(int argc, char *argv[],
347 struct cli_state *cli)
351 int mc_len = strlen(maskchars);
352 int fc_len = strlen(filechars);
353 TALLOC_CTX *ctx = talloc_tos();
355 cli_mkdir(cli, "\\masktest");
357 cli_unlink(cli, "\\masktest\\*", FILE_ATTRIBUTE_SYSTEM | FILE_ATTRIBUTE_HIDDEN);
361 mask = talloc_asprintf(ctx,
364 file = talloc_asprintf(ctx,
367 if (!mask || !file) {
370 testpair(cli, mask, file);
378 l1 = 1 + random() % 20;
379 l2 = 1 + random() % 20;
380 mask = talloc_array(ctx, char, strlen("\\masktest\\")+1+22);
381 file = talloc_array(ctx, char, strlen("\\masktest\\")+1+22);
382 if (!mask || !file) {
385 memcpy(mask,"\\masktest\\",strlen("\\masktest\\")+1);
386 memcpy(file,"\\masktest\\",strlen("\\masktest\\")+1);
389 mask[i+l] = maskchars[random() % mc_len];
394 file[i+l] = filechars[random() % fc_len];
398 if (strcmp(file+l,".") == 0 ||
399 strcmp(file+l,"..") == 0 ||
400 strcmp(mask+l,"..") == 0) continue;
402 if (strspn(file+l, ".") == strlen(file+l)) continue;
404 testpair(cli, mask, file);
405 if (NumLoops && (--NumLoops == 0))
412 cli_rmdir(cli, "\\masktest");
416 static void usage(void)
420 masktest //server/share [options..]\n\
428 -f filechars (default %s)\n\
429 -m maskchars (default %s)\n\
433 -i ignore . and .. errors\n\
435 This program tests wildcard matching between two servers. It generates\n\
436 random pairs of filenames/masks and tests that they match in the same\n\
437 way on the servers and internally\n\
439 filechars, maskchars);
442 /****************************************************************************
444 ****************************************************************************/
445 int main(int argc,char *argv[])
448 struct cli_state *cli;
452 TALLOC_CTX *frame = talloc_stackframe();
456 lp_set_cmdline("log level", "0");
458 if (argc < 2 || argv[1][0] == '-') {
465 all_string_sub(share,"/","\\",0);
467 setup_logging(argv[0], DEBUG_STDERR);
473 lp_load_global(get_dyn_CONFIGFILE());
476 if (getenv("USER")) {
477 fstrcpy(username,getenv("USER"));
482 while ((opt = getopt(argc, argv, "n:d:U:s:hm:f:aoW:M:vEi")) != EOF) {
485 NumLoops = atoi(optarg);
488 lp_set_cmdline("log level", optarg);
494 ignore_dot_errors = 1;
500 lp_set_cmdline("client max protocol", optarg);
503 fstrcpy(username,optarg);
504 p = strchr_m(username,'%');
507 fstrcpy(password, p+1);
530 printf("Unknown option %c (%d)\n", (char)opt, opt);
538 max_protocol = lp_client_max_protocol();
539 max_protocol = MIN(max_protocol, PROTOCOL_NT1);
545 rc = samba_getpass("Password: ", pwd, sizeof(pwd), false, false);
547 fstrcpy(password, pass);
551 test_creds = cli_session_creds_init(frame,
556 false, /* use_kerberos */
557 false, /* fallback_after_kerberos */
558 false, /* use_ccache */
559 false); /* password_is_nt_hash */
560 if (test_creds == NULL) {
561 d_printf("cli_session_creds_init() failed.\n");
565 cli = connect_one(share);
567 DEBUG(0,("Failed to connect to %s\n", share));
571 /* need to init seed after connect as clientgen uses random numbers */
572 DEBUG(0,("seed=%d\n", seed));
575 test_mask(argc, argv, cli);