2 Unix SMB/CIFS implementation.
4 Copyright (C) Andrew Tridgell 1999
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 2 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program; if not, write to the Free Software
18 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
23 static fstring password;
24 static fstring username;
26 static int max_protocol = PROTOCOL_NT1;
27 static BOOL showall = False;
28 static BOOL old_list = False;
29 static const char *maskchars = "<>\"?*abc.";
30 static const char *filechars = "abcdefghijklm.";
32 static int die_on_error;
33 static int NumLoops = 0;
34 static int ignore_dot_errors = 0;
38 extern BOOL AllowDebugChange;
40 /* a test fn for LANMAN mask support */
41 int ms_fnmatch_lanman_core(const char *pattern, const char *string)
43 const char *p = pattern, *n = string;
46 if (strcmp(p,"?")==0 && strcmp(n,".")==0) goto match;
51 /* if (! *n && ! *p) goto match; */
52 if (*n != '.') goto nomatch;
57 if ((*n == '.' && n[1] != '.') || ! *n) goto next;
63 if (! n[1] && ms_fnmatch_lanman_core(p, n+1) == 0) goto match;
64 if (ms_fnmatch_lanman_core(p, n) == 0) goto match;
74 if (ms_fnmatch_lanman_core(p, n) == 0) goto match;
80 if (ms_fnmatch_lanman_core(p, n) == 0) goto match;
81 if (*n == '.' && !strchr_m(n+1,'.')) {
89 if (*n == 0 && ms_fnmatch_lanman_core(p, n) == 0) goto match;
90 if (*n != '.') goto nomatch;
95 if (c != *n) goto nomatch;
100 if (! *n) goto match;
103 if (verbose) printf("NOMATCH pattern=[%s] string=[%s]\n", pattern, string);
107 if (ms_fnmatch_lanman_core(p, n) == 0) goto match;
111 if (verbose) printf("MATCH pattern=[%s] string=[%s]\n", pattern, string);
115 int ms_fnmatch_lanman(const char *pattern, const char *string)
117 if (!strpbrk(pattern, "?*<>\"")) {
118 if (strcmp(string,"..") == 0)
121 return strcmp(pattern, string);
124 if (strcmp(string,"..") == 0 || strcmp(string,".") == 0) {
125 return ms_fnmatch_lanman_core(pattern, "..") &&
126 ms_fnmatch_lanman_core(pattern, ".");
129 return ms_fnmatch_lanman_core(pattern, string);
132 static BOOL reg_match_one(struct cli_state *cli, const char *pattern, const char *file)
134 /* oh what a weird world this is */
135 if (old_list && strcmp(pattern, "*.*") == 0) return True;
137 if (strcmp(pattern,".") == 0) return False;
139 if (max_protocol <= PROTOCOL_LANMAN2) {
140 return ms_fnmatch_lanman(pattern, file)==0;
143 if (strcmp(file,"..") == 0) file = ".";
145 return ms_fnmatch(pattern, file, cli->protocol, False) == 0;
148 static char *reg_test(struct cli_state *cli, char *pattern, char *long_name, char *short_name)
153 pattern = 1+strrchr_m(pattern,'\\');
155 if (reg_match_one(cli, pattern, ".")) ret[0] = '+';
156 if (reg_match_one(cli, pattern, "..")) ret[1] = '+';
157 if (reg_match_one(cli, pattern, long_name) ||
158 (*short_name && reg_match_one(cli, pattern, short_name))) ret[2] = '+';
163 /*****************************************************
164 return a connection to a server
165 *******************************************************/
166 struct cli_state *connect_one(char *share)
169 struct nmb_name called, calling;
175 share = strchr_m(server,'\\');
176 if (!share) return NULL;
184 make_nmb_name(&calling, "masktest", 0x0);
185 make_nmb_name(&called , server, 0x20);
190 /* have to open a new connection */
191 if (!(c=cli_initialise()) || !cli_connect(c, server_n, &ip)) {
192 DEBUG(0,("Connection to %s failed\n", server_n));
196 c->protocol = max_protocol;
198 if (!cli_session_request(c, &calling, &called)) {
199 DEBUG(0,("session request to %s failed\n", called.name));
201 if (strcmp(called.name, "*SMBSERVER")) {
202 make_nmb_name(&called , "*SMBSERVER", 0x20);
208 DEBUG(4,(" session request ok\n"));
210 if (!cli_negprot(c)) {
211 DEBUG(0,("protocol negotiation failed\n"));
217 char *pass = getpass("Password: ");
219 fstrcpy(password, pass);
223 if (!NT_STATUS_IS_OK(cli_session_setup(c, username,
224 password, strlen(password),
225 password, strlen(password),
227 DEBUG(0,("session setup failed: %s\n", cli_errstr(c)));
232 * These next two lines are needed to emulate
233 * old client behaviour for people who have
234 * scripts based on client output.
235 * QUESTION ? Do we want to have a 'client compatibility
236 * mode to turn these on/off ? JRA.
239 if (*c->server_domain || *c->server_os || *c->server_type)
240 DEBUG(1,("Domain=[%s] OS=[%s] Server=[%s]\n",
241 c->server_domain,c->server_os,c->server_type));
243 DEBUG(4,(" session setup ok\n"));
245 if (!cli_send_tconX(c, share, "?????",
246 password, strlen(password)+1)) {
247 DEBUG(0,("tree connect failed: %s\n", cli_errstr(c)));
252 DEBUG(4,(" tconx ok\n"));
257 static char *resultp;
258 static file_info *f_info;
260 static void listfn(const char *mnt, file_info *f, const char *s, void *state)
262 if (strcmp(f->name,".") == 0) {
264 } else if (strcmp(f->name,"..") == 0) {
272 static void get_real_name(struct cli_state *cli,
273 pstring long_name, fstring short_name)
275 /* nasty hack to force level 260 listings - tridge */
276 cli->capabilities |= CAP_NT_SMBS;
277 if (max_protocol <= PROTOCOL_LANMAN1) {
278 cli_list_new(cli, "\\masktest\\*.*", aHIDDEN | aDIR, listfn, NULL);
280 cli_list_new(cli, "\\masktest\\*", aHIDDEN | aDIR, listfn, NULL);
283 fstrcpy(short_name, f_info->short_name);
284 strlower_m(short_name);
285 pstrcpy(long_name, f_info->name);
286 strlower_m(long_name);
289 if (*short_name == 0) {
290 fstrcpy(short_name, long_name);
294 if (!strchr_m(short_name,'.')) {
295 fstrcat(short_name,".");
300 static void testpair(struct cli_state *cli, char *mask, char *file)
311 fstrcpy(res1, "---");
313 fnum = cli_open(cli, file, O_CREAT|O_TRUNC|O_RDWR, 0);
315 DEBUG(0,("Can't create %s\n", file));
318 cli_close(cli, fnum);
321 fstrcpy(short_name, "");
323 get_real_name(cli, long_name, short_name);
325 fstrcpy(res1, "---");
326 cli_list(cli, mask, aHIDDEN | aDIR, listfn, NULL);
328 res2 = reg_test(cli, mask, long_name, short_name);
331 ((strcmp(res1, res2) && !ignore_dot_errors) ||
332 (strcmp(res1+2, res2+2) && ignore_dot_errors))) {
333 DEBUG(0,("%s %s %d mask=[%s] file=[%s] rfile=[%s/%s]\n",
334 res1, res2, count, mask, file, long_name, short_name));
335 if (die_on_error) exit(1);
338 cli_unlink(cli, file);
340 if (count % 100 == 0) DEBUG(0,("%d\n", count));
343 static void test_mask(int argc, char *argv[],
344 struct cli_state *cli)
348 int mc_len = strlen(maskchars);
349 int fc_len = strlen(filechars);
351 cli_mkdir(cli, "\\masktest");
353 cli_unlink(cli, "\\masktest\\*");
357 pstrcpy(mask,"\\masktest\\");
358 pstrcpy(file,"\\masktest\\");
359 pstrcat(mask, argv[0]);
360 pstrcat(file, argv[1]);
361 testpair(cli, mask, file);
369 l1 = 1 + random() % 20;
370 l2 = 1 + random() % 20;
371 pstrcpy(mask,"\\masktest\\");
372 pstrcpy(file,"\\masktest\\");
375 mask[i+l] = maskchars[random() % mc_len];
380 file[i+l] = filechars[random() % fc_len];
384 if (strcmp(file+l,".") == 0 ||
385 strcmp(file+l,"..") == 0 ||
386 strcmp(mask+l,"..") == 0) continue;
388 if (strspn(file+l, ".") == strlen(file+l)) continue;
390 testpair(cli, mask, file);
391 if (NumLoops && (--NumLoops == 0))
396 cli_rmdir(cli, "\\masktest");
400 static void usage(void)
404 masktest //server/share [options..]\n\
412 -f filechars (default %s)\n\
413 -m maskchars (default %s)\n\
417 -i ignore . and .. errors\n\
419 This program tests wildcard matching between two servers. It generates\n\
420 random pairs of filenames/masks and tests that they match in the same\n\
421 way on the servers and internally\n\
423 filechars, maskchars);
426 /****************************************************************************
428 ****************************************************************************/
429 int main(int argc,char *argv[])
432 struct cli_state *cli;
442 AllowDebugChange = False;
444 if (argc < 2 || argv[1][0] == '-') {
451 all_string_sub(share,"/","\\",0);
453 setup_logging(argv[0],True);
458 lp_load(dyn_CONFIGFILE,True,False,False,True);
461 if (getenv("USER")) {
462 fstrcpy(username,getenv("USER"));
467 while ((opt = getopt(argc, argv, "n:d:U:s:hm:f:aoW:M:vEi")) != EOF) {
470 NumLoops = atoi(optarg);
473 DEBUGLEVEL = atoi(optarg);
479 ignore_dot_errors = 1;
485 max_protocol = interpret_protocol(optarg, max_protocol);
488 fstrcpy(username,optarg);
489 p = strchr_m(username,'%');
492 fstrcpy(password, p+1);
515 printf("Unknown option %c (%d)\n", (char)opt, opt);
524 cli = connect_one(share);
526 DEBUG(0,("Failed to connect to %s\n", share));
530 /* need to init seed after connect as clientgen uses random numbers */
531 DEBUG(0,("seed=%d\n", seed));
534 test_mask(argc, argv, cli);