2 Unix SMB/Netbios implementation.
5 Copyright (C) Andrew Tridgell 1994-1998
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
24 #include <linux/version.h>
25 #define LVERSION(major,minor,patch) (((((major)<<8)+(minor))<<8)+(patch))
26 #if LINUX_VERSION_CODE < LVERSION(2,1,70)
27 #error this code will only compile on versions of linux after 2.1.70
32 #include <asm/types.h>
33 #include <linux/smb_fs.h>
34 static struct smb_conn_opt conn_options;
40 /* Uncomment this to allow debug the smbmount daemon */
43 pstring cur_dir = "\\";
45 extern pstring service;
46 extern pstring desthost;
47 extern pstring global_myname;
48 extern pstring myhostname;
49 extern pstring password;
50 extern pstring username;
51 extern pstring workgroup;
54 extern BOOL connect_as_printer;
55 extern BOOL connect_as_ipc;
56 extern struct in_addr ipzero;
58 extern BOOL doencrypt;
60 extern pstring user_socket_options;
62 /* 30 second timeout on most commands */
63 #define CLIENT_TIMEOUT (30*1000)
64 #define SHORT_TIMEOUT (5*1000)
66 /* value for unused fid field in trans2 secondary request */
67 #define FID_UNUSED (0xFFFF)
71 extern int max_protocol;
75 time_t newer_than = 0;
76 int archive_level = 0;
78 extern pstring debugf;
79 extern int DEBUGLEVEL;
81 BOOL translation = False;
91 /* clitar bits insert */
94 extern BOOL tar_reset;
98 mode_t myumask = 0755;
100 extern pstring scope;
106 BOOL recurse = False;
107 BOOL lowercase = False;
109 struct in_addr dest_ip;
111 #define SEPARATORS " \t\n\r"
113 BOOL abort_mget = True;
117 extern BOOL readbraw_supported ;
118 extern BOOL writebraw_supported;
120 pstring fileselection = "";
122 extern file_info def_finfo;
125 int get_total_size = 0;
126 int get_total_time_ms = 0;
127 int put_total_size = 0;
128 int put_total_time_ms = 0;
137 #define CNV_LANG(s) dos_to_unix(s,False)
138 #define CNV_INPUT(s) unix_to_dos(s,True)
140 /****************************************************************************
141 check for existance of a dir
142 ****************************************************************************/
143 static BOOL chkpath(char *path,BOOL report)
146 pstring inbuf,outbuf;
150 trim_string(path2,NULL,"\\");
151 if (!*path2) *path2 = '\\';
153 bzero(outbuf,smb_size);
154 set_message(outbuf,0,4 + strlen(path2),True);
155 SCVAL(outbuf,smb_com,SMBchkpth);
156 SSVAL(outbuf,smb_tid,cnum);
157 cli_setup_pkt(outbuf);
165 /* this little bit of code can be used to extract NT error codes.
166 Just feed a bunch of "cd foo" commands to smbclient then watch
167 in netmon (tridge) */
169 SIVAL(outbuf, smb_rcls, code | 0xC0000000);
170 SSVAL(outbuf, smb_flg2, SVAL(outbuf, smb_flg2) | (1<<14));
175 send_smb(Client,outbuf);
176 client_receive_smb(Client,inbuf,CLIENT_TIMEOUT);
178 if (report && CVAL(inbuf,smb_rcls) != 0)
179 DEBUG(2,("chkpath: %s\n",smb_errstr(inbuf)));
181 return(CVAL(inbuf,smb_rcls) == 0);
188 if ((i = fork()) < 0)
190 DEBUG(0, ("could not fork\n"));
194 /* parent simply exits */
202 close_our_files(void)
205 for (i = 0; i < NR_OPEN; i++) {
220 * Send a login and store the connection options. This is a separate
221 * function to keep clientutil.c independent of linux kernel changes.
223 static BOOL mount_send_login(char *inbuf, char *outbuf)
225 struct connection_options opt;
226 int res = cli_send_login(inbuf, outbuf, True, True, &opt);
231 conn_options.protocol = opt.protocol;
232 conn_options.case_handling = CASE_LOWER;
233 conn_options.max_xmit = opt.max_xmit;
234 conn_options.server_uid = opt.server_vuid;
235 conn_options.tid = opt.tid;
236 conn_options.secmode = opt.sec_mode;
237 conn_options.maxmux = opt.max_mux;
238 conn_options.maxvcs = opt.max_vcs;
239 conn_options.rawmode = opt.rawmode;
240 conn_options.sesskey = opt.sesskey;
241 conn_options.maxraw = opt.maxraw;
242 conn_options.capabilities = opt.capabilities;
243 conn_options.serverzone = opt.serverzone;
249 * Call the smbfs ioctl to install a connection socket,
250 * then wait for a signal to reconnect. Note that we do
251 * not exit after open_sockets() or send_login() errors,
252 * as the smbfs mount would then have no way to recover.
255 send_fs_socket(char *mount_point, char *inbuf, char *outbuf)
257 int fd, closed = 0, res = 1;
262 if ((fd = open(mount_point, O_RDONLY)) < 0)
264 DEBUG(0, ("smbmount: can't open %s\n", mount_point));
269 * Call the ioctl even if we couldn't get a socket ...
270 * there's no point in making smbfs wait for a timeout.
272 conn_options.fd = -1;
274 conn_options.fd = Client;
275 res = ioctl(fd, SMB_IOC_NEWCONN, &conn_options);
278 DEBUG(0, ("smbmount: ioctl failed, res=%d\n", res));
284 * Close all open files if we haven't done so yet.
296 * Create the background process after trying the mount.
297 * to avoid race conditions with automount and other processes.
304 * Wait for a signal from smbfs ...
306 CatchSignal(SIGUSR1, &usr1_handler);
308 DEBUG(0, ("smbmount: got signal, getting new socket\n"));
310 res = cli_open_sockets(port);
313 DEBUG(0, ("smbmount: can't open sockets\n"));
317 res = mount_send_login(inbuf, outbuf);
320 DEBUG(0, ("smbmount: login failed\n"));
323 DEBUG(0, ("smbmount: exit\n"));
327 /****************************************************************************
329 ****************************************************************************/
330 static void cmd_mount(char *inbuf,char *outbuf)
334 pstring mount_command;
337 char mount_point[MAXPATHLEN+1];
339 if (!next_token(NULL, mpoint, NULL, sizeof(mpoint)))
341 DEBUG(0,("You must supply a mount point\n"));
345 memset(mount_point, 0, sizeof(mount_point));
347 if (realpath(mpoint, mount_point) == NULL)
349 DEBUG(0, ("Could not resolve mount point\n"));
354 * Build the service name to report on the Unix side,
355 * converting '\' to '/' and ' ' to '_'.
357 pstrcpy(share_name, service);
358 string_replace(share_name, '\\', '/');
359 string_replace(share_name, ' ', '_');
361 slprintf(mount_command, sizeof(mount_command)-1,"smbmnt %s -s %s", mount_point, share_name);
363 while(next_token(NULL, buf, NULL, sizeof(buf)))
365 pstrcat(mount_command, " ");
366 pstrcat(mount_command, buf);
369 DEBUG(3, ("mount command: %s\n", mount_command));
371 if ((retval = system(mount_command)) != 0)
373 DEBUG(0,("mount failed\n"));
377 send_fs_socket(mount_point, inbuf, outbuf);
381 /* This defines the commands supported by this client */
389 {"mount", cmd_mount, "<mount-point options> mount an smbfs file system"},
394 /*******************************************************************
395 lookup a command string in the list of commands, including
397 ******************************************************************/
398 static int process_tok(fstring tok)
400 int i = 0, matches = 0;
402 int tok_len = strlen(tok);
404 while (commands[i].fn != NULL)
406 if (strequal(commands[i].name,tok))
412 else if (strnequal(commands[i].name, tok, tok_len))
422 else if (matches == 1)
428 /****************************************************************************
430 ****************************************************************************/
431 void cmd_help(char *dum_in, char *dum_out)
436 if (next_token(NULL,buf,NULL,sizeof(buf)))
438 if ((i = process_tok(buf)) >= 0)
439 DEBUG(0,("HELP %s:\n\t%s\n\n",commands[i].name,commands[i].description));
442 while (commands[i].description)
444 for (j=0; commands[i].description && (j<5); j++) {
445 DEBUG(0,("%-15s",commands[i].name));
452 /****************************************************************************
453 wait for keyboard activity, swallowing network packets
454 ****************************************************************************/
455 static void wait_keyboard(char *buffer)
459 struct timeval timeout;
466 FD_SET(fileno(stdin),&fds);
470 selrtn = sys_select(MAX(Client,fileno(stdin))+1,&fds,&timeout);
472 if (FD_ISSET(fileno(stdin),&fds))
475 /* We deliberately use receive_smb instead of
476 client_receive_smb as we want to receive
477 session keepalives and then drop them here.
479 if (FD_ISSET(Client,&fds))
480 receive_smb(Client,buffer,0);
487 /****************************************************************************
488 process commands from the client
489 ****************************************************************************/
490 static BOOL process(char *base_directory)
496 char *InBuffer = (char *)malloc(BUFFER_SIZE + SAFETY_MARGIN);
497 char *OutBuffer = (char *)malloc(BUFFER_SIZE + SAFETY_MARGIN);
499 if ((InBuffer == NULL) || (OutBuffer == NULL))
502 bzero(OutBuffer,smb_size);
504 if (!mount_send_login(InBuffer,OutBuffer))
508 if (cmd[0] != '\0') while (cmd[0] != '\0')
514 if ((p = strchr(cmd, ';')) == 0)
516 strncpy(line, cmd, 999);
522 if (p - cmd > 999) p = cmd + 999;
523 strncpy(line, cmd, p - cmd);
524 line[p - cmd] = '\0';
528 /* input language code to internal one */
531 /* and get the first part of the command */
534 if (!next_token(&ptr,tok,NULL,sizeof(tok))) continue;
537 if ((i = process_tok(tok)) >= 0)
538 commands[i].fn(InBuffer,OutBuffer);
540 DEBUG(0,("%s: command abbreviation ambiguous\n",CNV_LANG(tok)));
542 DEBUG(0,("%s: command not found\n",CNV_LANG(tok)));
544 else while (!feof(stdin))
549 bzero(OutBuffer,smb_size);
551 /* display a prompt */
552 DEBUG(0,("smb: %s> ", CNV_LANG(cur_dir)));
555 wait_keyboard(InBuffer);
557 /* and get a response */
558 if (!fgets(line,1000,stdin))
561 /* input language code to internal one */
564 /* special case - first char is ! */
571 /* and get the first part of the command */
574 if (!next_token(&ptr,tok,NULL,sizeof(tok))) continue;
577 if ((i = process_tok(tok)) >= 0)
578 commands[i].fn(InBuffer,OutBuffer);
580 DEBUG(0,("%s: command abbreviation ambiguous\n",CNV_LANG(tok)));
582 DEBUG(0,("%s: command not found\n",CNV_LANG(tok)));
585 cli_send_logout(InBuffer,OutBuffer);
589 /****************************************************************************
591 ****************************************************************************/
592 static void usage(char *pname)
594 DEBUG(0,("Usage: %s service <password> [-p port] [-d debuglevel] [-l log] ",
597 DEBUG(0,("\nVersion %s\n",VERSION));
598 DEBUG(0,("\t-p port connect to the specified port\n"));
599 DEBUG(0,("\t-d debuglevel set the debuglevel\n"));
600 DEBUG(0,("\t-l log basename. Basename for log/debug files\n"));
601 DEBUG(0,("\t-n netbios name. Use this name as my netbios name\n"));
602 DEBUG(0,("\t-N don't ask for a password\n"));
603 DEBUG(0,("\t-m max protocol set the max protocol level\n"));
604 DEBUG(0,("\t-I dest IP use this IP to connect to\n"));
605 DEBUG(0,("\t-E write messages to stderr instead of stdout\n"));
606 DEBUG(0,("\t-U username set the network username\n"));
607 DEBUG(0,("\t-W workgroup set the workgroup name\n"));
608 DEBUG(0,("\t-c command string execute semicolon separated commands\n"));
609 DEBUG(0,("\t-t terminal code terminal i/o code {sjis|euc|jis7|jis8|junet|hex}\n"));
610 DEBUG(0,("\t-D directory start from directory\n"));
614 /****************************************************************************
616 ****************************************************************************/
617 int main(int argc,char *argv[])
619 fstring base_directory;
620 char *pname = argv[0];
626 BOOL nt_domain_logon = False;
627 static pstring servicesf = CONFIGFILE;
632 pstrcpy(term_code, KANJI);
642 setup_logging(pname,True);
645 charset_initialise();
647 pid = (uint16)getpid();
648 vuid = (uint16)getuid();
655 pstrcpy(username,getenv("USER"));
657 /* modification to support userid%passwd syntax in the USER var
658 25.Aug.97, jdblair@uab.edu */
660 if ((p=strchr(username,'%')))
663 pstrcpy(password,p+1);
665 memset(strchr(getenv("USER"),'%')+1,'X',strlen(password));
670 /* modification to support PASSWD environmental var
671 25.Aug.97, jdblair@uab.edu */
673 if (getenv("PASSWD"))
674 pstrcpy(password,getenv("PASSWD"));
676 if (*username == 0 && getenv("LOGNAME"))
678 pstrcpy(username,getenv("LOGNAME"));
691 pstrcpy(service, argv[1]);
692 /* Convert any '/' characters in the service name to '\' characters */
693 string_replace( service, '/','\\');
697 if (count_chars(service,'\\') < 3)
700 printf("\n%s: Not enough '\\' characters in service\n",service);
704 if (argc > 1 && (*argv[1] != '-'))
707 pstrcpy(password,argv[1]);
708 memset(argv[1],'X',strlen(argv[1]));
715 getopt(argc, argv,"s:B:O:M:S:i:Nn:d:Pp:l:hI:EB:U:L:t:m:W:T:D:c:")) != EOF)
719 max_protocol = interpret_protocol(optarg,max_protocol);
722 pstrcpy(user_socket_options,optarg);
725 pstrcpy(desthost,optarg);
727 nt_domain_logon = True;
730 iface_set_default(NULL,optarg,NULL);
733 pstrcpy(base_directory,optarg);
736 pstrcpy(scope,optarg);
741 pstrcpy(username,optarg);
742 if ((lp=strchr(username,'%')))
745 pstrcpy(password,lp+1);
747 memset(strchr(optarg,'%')+1,'X',strlen(password));
753 pstrcpy(workgroup,optarg);
760 dest_ip = *interpret_addr2(optarg);
761 if (zero_ip(dest_ip)) exit(1);
766 pstrcpy(global_myname,optarg);
775 DEBUGLEVEL = atoi(optarg);
778 slprintf(debugf,sizeof(debugf)-1,"%s.client",optarg);
792 pstrcpy(servicesf, optarg);
795 pstrcpy(term_code, optarg);
802 if (!*query_host && !*service)
809 DEBUG( 3, ( "Client started (version %s)\n", VERSION ) );
811 if(!get_myname(myhostname,NULL))
813 DEBUG(0,("Failed to get my hostname.\n"));
816 if (!lp_load(servicesf,True,False,False)) {
817 fprintf(stderr, "Can't load %s - run testparm to debug it\n", servicesf);
820 codepage_initialise(lp_client_code_page());
822 interpret_coding_system(term_code);
825 pstrcpy(workgroup,lp_workgroup());
828 get_myname((*global_myname)?NULL:global_myname,NULL);
829 strupper(global_myname);
831 if (cli_open_sockets(port))
833 if (!process(base_directory))