2 Unix SMB/Netbios implementation.
5 Copyright (C) Andrew Tridgell 1994-1998
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
33 extern pstring global_myname;
35 extern pstring user_socket_options;
38 extern pstring debugf;
39 extern int DEBUGLEVEL;
42 extern file_info def_finfo;
44 #define CNV_LANG(s) dos2unix_format(s,False)
45 #define CNV_INPUT(s) unix2dos_format(s,True)
47 static int process_tok(fstring tok);
48 static void cmd_help(struct client_info *info);
49 static void cmd_quit(struct client_info *info);
51 static struct cli_state smbcli;
52 struct cli_state *smb_cli = &smbcli;
56 /****************************************************************************
57 initialise smb client structure
58 ****************************************************************************/
59 void rpcclient_init(void)
61 bzero(smb_cli, sizeof(smb_cli));
62 cli_initialise(smb_cli);
63 smb_cli->capabilities |= CAP_NT_SMBS;
66 /****************************************************************************
67 make smb client connection
68 ****************************************************************************/
69 static BOOL rpcclient_connect(struct client_info *info)
71 struct nmb_name calling;
72 struct nmb_name called;
74 make_nmb_name(&called , dns_to_netbios_name(info->dest_host ), info->name_type, scope);
75 make_nmb_name(&calling, dns_to_netbios_name(info->myhostname), 0x0 , scope);
77 if (!cli_establish_connection(smb_cli,
78 info->dest_host, &info->dest_ip,
80 info->share, info->svc_type,
83 DEBUG(0,("rpcclient_connect: connection failed\n"));
84 cli_shutdown(smb_cli);
91 /****************************************************************************
92 stop the smb connection(s?)
93 ****************************************************************************/
94 static void rpcclient_stop(void)
96 cli_shutdown(smb_cli);
98 /****************************************************************************
99 This defines the commands supported by this client
100 ****************************************************************************/
104 void (*fn)(struct client_info*);
109 {"ntlogin", cmd_netlogon_login_test, "<username> NT Domain login test"},
111 {"wksinfo", cmd_wks_query_info, "DCE/RPC - Workstation Query Info"},
112 {"srvinfo", cmd_srv_query_info, "DCE/RPC - Server Query Info"},
113 {"srvsessions",cmd_srv_enum_sess, "DCE/RPC - List sessions on a server"},
114 {"srvshares", cmd_srv_enum_shares, "DCE/RPC - List shares on a server"},
115 {"srvconnections",cmd_srv_enum_conn, "DCE/RPC - List connections on a server"},
116 {"srvfiles", cmd_srv_enum_files, "DCE/RPC - List files on a server"},
117 {"lsaquery", cmd_lsa_query_info, "Query Info Policy (domain member or server)"},
118 {"lookupsids", cmd_lsa_lookup_sids, "Resolve names from SIDs"},
119 {"enumusers", cmd_sam_enum_users, "SAM User Database Query (experimental!)"},
120 {"samuser", cmd_sam_query_user, "<username> SAM User Query (experimental!)"},
121 {"samtest", cmd_sam_test , "SAM User Encrypted RPC test (experimental!)"},
122 {"enumaliases",cmd_sam_enum_aliases, "SAM Aliases Database Query (experimental!)"},
124 {"enumgroups", cmd_sam_enum_groups, "SAM Group Database Query (experimental!)"},
126 {"samgroups", cmd_sam_query_groups, "SAM Group Database Query (experimental!)"},
127 {"quit", cmd_quit, "logoff the server"},
128 {"q", cmd_quit, "logoff the server"},
129 {"exit", cmd_quit, "logoff the server"},
130 {"bye", cmd_quit, "logoff the server"},
131 {"help", cmd_help, "[command] give help on a command"},
132 {"?", cmd_help, "[command] give help on a command"},
133 {"!", NULL, "run a shell command on the local system"},
138 /****************************************************************************
139 do a (presumably graceful) quit...
140 ****************************************************************************/
141 static void cmd_quit(struct client_info *info)
147 smb_mem_write_status(dbf);
148 smb_mem_write_errors(dbf);
149 smb_mem_write_verbose(dbf);
155 /****************************************************************************
157 ****************************************************************************/
158 static void cmd_help(struct client_info *info)
163 if (next_token(NULL,buf,NULL, sizeof(buf)))
165 if ((i = process_tok(buf)) >= 0)
166 fprintf(out_hnd, "HELP %s:\n\t%s\n\n",commands[i].name,commands[i].description);
169 while (commands[i].description)
171 for (j=0; commands[i].description && (j<5); j++) {
172 fprintf(out_hnd, "%-15s",commands[i].name);
175 fprintf(out_hnd, "\n");
179 /*******************************************************************
180 lookup a command string in the list of commands, including
182 ******************************************************************/
183 static int process_tok(fstring tok)
185 int i = 0, matches = 0;
187 int tok_len = strlen(tok);
189 while (commands[i].fn != NULL)
191 if (strequal(commands[i].name,tok))
197 else if (strnequal(commands[i].name, tok, tok_len))
207 else if (matches == 1)
213 /****************************************************************************
214 wait for keyboard activity, swallowing network packets
215 ****************************************************************************/
216 static void wait_keyboard(struct cli_state *cli)
219 struct timeval timeout;
224 FD_SET(cli->fd,&fds);
225 FD_SET(fileno(stdin),&fds);
229 sys_select(MAX(cli->fd,fileno(stdin))+1,&fds,&timeout);
231 if (FD_ISSET(fileno(stdin),&fds))
234 /* We deliberately use receive_smb instead of
235 client_receive_smb as we want to receive
236 session keepalives and then drop them here.
238 if (FD_ISSET(cli->fd,&fds))
239 receive_smb(cli->fd,cli->inbuf,0);
243 /****************************************************************************
244 process commands from the client
245 ****************************************************************************/
246 static void do_command(struct client_info *info, char *tok, char *line)
250 if ((i = process_tok(tok)) >= 0)
252 commands[i].fn(info);
256 fprintf(out_hnd, "%s: command abbreviation ambiguous\n", CNV_LANG(tok));
260 fprintf(out_hnd, "%s: command not found\n", CNV_LANG(tok));
264 /****************************************************************************
265 process commands from the client
266 ****************************************************************************/
267 static BOOL process( struct client_info *info, char *cmd_str)
272 if (cmd[0] != '\0') while (cmd[0] != '\0')
277 if ((p = strchr(cmd, ';')) == 0)
279 strncpy(line, cmd, 999);
285 if (p - cmd > 999) p = cmd + 999;
286 strncpy(line, cmd, p - cmd);
287 line[p - cmd] = '\0';
291 /* input language code to internal one */
294 /* get the first part of the command */
297 if (!next_token(&ptr,tok,NULL, sizeof(tok))) continue;
300 do_command(info, tok, line);
302 else while (!feof(stdin))
306 /* display a prompt */
307 fprintf(out_hnd, "smb: %s> ", CNV_LANG(info->cur_dir));
311 line[0] = wait_keyboard(smb_cli);
312 /* this might not be such a good idea... */
318 wait_keyboard(smb_cli);
321 /* and get a response */
323 fgets( &line[1],999, stdin);
325 if (!fgets(line,1000,stdin))
331 /* input language code to internal one */
334 /* special case - first char is ! */
341 fprintf(out_hnd, "%s\n", line);
343 /* get the first part of the command */
346 if (!next_token(&ptr,tok,NULL, sizeof(tok))) continue;
349 do_command(info, tok, line);
355 /****************************************************************************
357 ****************************************************************************/
358 static void usage(char *pname)
360 fprintf(out_hnd, "Usage: %s service <password> [-d debuglevel] [-l log] ",
363 fprintf(out_hnd, "\nVersion %s\n",VERSION);
364 fprintf(out_hnd, "\t-d debuglevel set the debuglevel\n");
365 fprintf(out_hnd, "\t-l log basename. Basename for log/debug files\n");
366 fprintf(out_hnd, "\t-n netbios name. Use this name as my netbios name\n");
367 fprintf(out_hnd, "\t-N don't ask for a password\n");
368 fprintf(out_hnd, "\t-m max protocol set the max protocol level\n");
369 fprintf(out_hnd, "\t-I dest IP use this IP to connect to\n");
370 fprintf(out_hnd, "\t-E write messages to stderr instead of stdout\n");
371 fprintf(out_hnd, "\t-U username set the network username\n");
372 fprintf(out_hnd, "\t-W workgroup set the workgroup name\n");
373 fprintf(out_hnd, "\t-c command string execute semicolon separated commands\n");
374 fprintf(out_hnd, "\t-t terminal code terminal i/o code {sjis|euc|jis7|jis8|junet|hex}\n");
375 fprintf(out_hnd, "\n");
385 /****************************************************************************
387 ****************************************************************************/
388 int main(int argc,char *argv[])
390 char *pname = argv[0];
395 static pstring servicesf = CONFIGFILE;
398 BOOL got_pass = False;
400 mode_t myumask = 0755;
401 enum client_action cli_action = CLIENT_NONE;
403 struct client_info cli_info;
405 pstring password; /* local copy only, if one is entered */
412 pstrcpy(term_code, KANJI);
419 cli_info.put_total_size = 0;
420 cli_info.put_total_time_ms = 0;
421 cli_info.get_total_size = 0;
422 cli_info.get_total_time_ms = 0;
424 cli_info.dir_total = 0;
425 cli_info.newer_than = 0;
426 cli_info.archive_level = 0;
427 cli_info.print_mode = 1;
429 cli_info.translation = False;
430 cli_info.recurse_dir = False;
431 cli_info.lowercase = False;
432 cli_info.prompt = True;
433 cli_info.abort_mget = True;
435 cli_info.dest_ip.s_addr = 0;
436 cli_info.name_type = 0x20;
438 pstrcpy(cli_info.cur_dir , "\\");
439 pstrcpy(cli_info.file_sel, "");
440 pstrcpy(cli_info.base_dir, "");
441 pstrcpy(smb_cli->domain, "");
442 pstrcpy(smb_cli->user_name, "");
443 pstrcpy(cli_info.myhostname, "");
444 pstrcpy(cli_info.dest_host, "");
446 pstrcpy(cli_info.svc_type, "A:");
447 pstrcpy(cli_info.share, "");
448 pstrcpy(cli_info.service, "");
450 pstrcpy(cli_info.dom.level3_sid, "");
451 pstrcpy(cli_info.dom.level3_dom, "");
452 pstrcpy(cli_info.dom.level5_sid, "");
453 pstrcpy(cli_info.dom.level5_dom, "");
455 smb_cli->nt_pipe_fnum = 0xffff;
457 setup_logging(pname, True);
460 charset_initialise();
468 pstrcpy(smb_cli->user_name,getenv("USER"));
470 /* modification to support userid%passwd syntax in the USER var
471 25.Aug.97, jdblair@uab.edu */
473 if ((p=strchr(smb_cli->user_name,'%')))
476 pstrcpy(password,p+1);
478 memset(strchr(getenv("USER"),'%')+1,'X',strlen(password));
480 strupper(smb_cli->user_name);
485 /* modification to support PASSWD environmental var
486 25.Aug.97, jdblair@uab.edu */
487 if (getenv("PASSWD"))
489 pstrcpy(password,getenv("PASSWD"));
492 if (*smb_cli->user_name == 0 && getenv("LOGNAME"))
494 pstrcpy(smb_cli->user_name,getenv("LOGNAME"));
495 strupper(smb_cli->user_name);
507 pstrcpy(cli_info.service, argv[1]);
508 /* Convert any '/' characters in the service name to '\' characters */
509 string_replace( cli_info.service, '/','\\');
513 DEBUG(1,("service: %s\n", cli_info.service));
515 if (count_chars(cli_info.service,'\\') < 3)
518 printf("\n%s: Not enough '\\' characters in service\n", cli_info.service);
523 if (count_chars(cli_info.service,'\\') > 3)
526 printf("\n%s: Too many '\\' characters in service\n", cli_info.service);
531 if (argc > 1 && (*argv[1] != '-'))
534 pstrcpy(password,argv[1]);
535 memset(argv[1],'X',strlen(argv[1]));
540 cli_action = CLIENT_SVC;
543 while ((opt = getopt(argc, argv,"s:B:O:M:S:i:N:d:l:hI:EB:U:L:t:m:W:T:D:c:")) != EOF)
549 /* FIXME ... max_protocol seems to be funny here */
551 int max_protocol = 0;
552 max_protocol = interpret_protocol(optarg,max_protocol);
553 fprintf(stderr, "max protocol not currently supported\n");
559 pstrcpy(user_socket_options,optarg);
565 pstrcpy(cli_info.dest_host,optarg);
566 strupper(cli_info.dest_host);
567 cli_action = CLIENT_IPC;
573 iface_set_default(NULL,optarg,NULL);
579 pstrcpy(scope, optarg);
586 pstrcpy(smb_cli->user_name,optarg);
587 if ((lp=strchr(smb_cli->user_name,'%')))
590 pstrcpy(password,lp+1);
592 memset(strchr(optarg,'%')+1,'X',strlen(password));
599 pstrcpy(smb_cli->domain,optarg);
611 cli_info.dest_ip = *interpret_addr2(optarg);
612 if (zero_ip(cli_info.dest_ip))
630 DEBUGLEVEL = atoi(optarg);
636 slprintf(debugf, sizeof(debugf)-1,
657 pstrcpy(servicesf, optarg);
663 pstrcpy(term_code, optarg);
676 if (cli_action == CLIENT_NONE)
682 DEBUG(3,("%s client started (version %s)\n",timestring(),VERSION));
684 if (!get_myname(cli_info.myhostname, NULL))
686 fprintf(stderr, "Failed to get my hostname.\n");
689 fstrcpy(global_myname, cli_info.myhostname);
690 strupper(global_myname);
692 if (!lp_load(servicesf,True, False, False))
694 fprintf(stderr, "Can't load %s - run testparm to debug it\n", servicesf);
697 codepage_initialise(lp_client_code_page());
699 if (*smb_cli->domain == 0) pstrcpy(smb_cli->domain,lp_workgroup());
703 if (cli_action == CLIENT_IPC)
705 pstrcpy(cli_info.share, "IPC$");
706 pstrcpy(cli_info.svc_type, "IPC");
709 fstrcpy(cli_info.mach_acct, cli_info.myhostname);
710 strupper(cli_info.mach_acct);
711 fstrcat(cli_info.mach_acct, "$");
713 /* set the password cache info */
716 if (password[0] == 0)
718 pwd_set_nullpwd(&(smb_cli->pwd));
722 pwd_make_lm_nt_16(&(smb_cli->pwd), password); /* generate 16 byte hashes */
727 pwd_read(&(smb_cli->pwd), "Enter Password:", True);
730 /* paranoia: destroy the local copy of the password */
731 bzero(password, sizeof(password));
733 /* establish connections. nothing to stop these being re-established. */
734 rpcclient_connect(&cli_info);
736 DEBUG(5,("rpcclient_connect: smb_cli->fd:%d\n", smb_cli->fd));
737 if (smb_cli->fd <= 0)
739 fprintf(stderr, "warning: connection could not be established to %s<%02x>\n",
740 cli_info.dest_host, cli_info.name_type);
741 fprintf(stderr, "this version of smbclient may crash if you proceed\n");
749 process(&cli_info, cmd_str);
755 fprintf(stderr, "unknown client action requested\n");