2 Unix SMB/Netbios implementation.
4 Samba utility functions
5 Copyright (C) Andrew Tridgell 1992-1997
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
30 int Protocol = PROTOCOL_COREPLUS;
32 /* a default finfo structure to ensure all fields are sensible */
33 file_info def_finfo = {-1,0,0,0,0,0,0,""};
35 /* these are some file handles where debug info will be stored */
38 /* the client file descriptor */
41 /* the last IP received from */
42 struct in_addr lastip;
44 /* the last port received from */
47 /* this is used by the chaining code */
53 case handling on filenames
55 int case_default = CASE_LOWER;
60 /* the following control case operations - they are put here so the
61 client can link easily */
64 BOOL use_mangled_map = False;
65 BOOL short_case_preserve;
68 fstring remote_machine="";
69 fstring local_machine="";
70 fstring remote_arch="UNKNOWN";
71 fstring remote_proto="UNKNOWN";
72 pstring myhostname="";
73 pstring user_socket_options="";
74 pstring sesssetup_user="";
76 fstring myworkgroup = "";
78 int smb_read_error = 0;
80 static char *filename_dos(char *path,char *buf);
82 static BOOL stdout_logging = False;
85 /*******************************************************************
86 get ready for syslog stuff
87 ******************************************************************/
88 void setup_logging(char *pname,BOOL interactive)
92 char *p = strrchr(pname,'/');
94 openlog(pname, LOG_PID, LOG_DAEMON);
98 stdout_logging = True;
104 BOOL append_log=False;
107 /****************************************************************************
109 ****************************************************************************/
110 void reopen_logs(void)
117 strcpy(fname,debugf);
118 if (lp_loaded() && (*lp_logfile()))
119 strcpy(fname,lp_logfile());
121 if (!strcsequal(fname,debugf) || !dbf || !file_exist(debugf,NULL))
123 int oldumask = umask(022);
124 strcpy(debugf,fname);
125 if (dbf) fclose(dbf);
127 dbf = fopen(debugf,"a");
129 dbf = fopen(debugf,"w");
130 if (dbf) setbuf(dbf,NULL);
145 /*******************************************************************
146 check if the log has grown too big
147 ********************************************************************/
148 static void check_log_size(void)
150 static int debug_count=0;
154 if (debug_count++ < 100) return;
156 maxlog = lp_max_log_size() * 1024;
157 if (!dbf || maxlog <= 0) return;
159 if (fstat(fileno(dbf),&st) == 0 && st.st_size > maxlog) {
160 fclose(dbf); dbf = NULL;
162 if (dbf && file_size(debugf) > maxlog) {
164 fclose(dbf); dbf = NULL;
165 sprintf(name,"%s.old",debugf);
166 sys_rename(debugf,name);
174 /*******************************************************************
175 write an debug message on the debugfile. This is called by the DEBUG
177 ********************************************************************/
179 int Debug1(char *format_str, ...)
189 if (stdout_logging) {
191 va_start(ap, format_str);
194 format_str = va_arg(ap,char *);
196 vfprintf(dbf,format_str,ap);
202 if (!lp_syslog_only())
207 int oldumask = umask(022);
208 dbf = fopen(debugf,"w");
218 if (syslog_level < lp_syslog())
221 * map debug levels to syslog() priorities
222 * note that not all DEBUG(0, ...) calls are
225 static int priority_map[] = {
234 if (syslog_level >= sizeof(priority_map) / sizeof(priority_map[0]) ||
236 priority = LOG_DEBUG;
238 priority = priority_map[syslog_level];
241 va_start(ap, format_str);
244 format_str = va_arg(ap,char *);
246 vsprintf(msgbuf, format_str, ap);
250 syslog(priority, "%s", msgbuf);
255 if (!lp_syslog_only())
259 va_start(ap, format_str);
262 format_str = va_arg(ap,char *);
264 vfprintf(dbf,format_str,ap);
274 /****************************************************************************
275 find a suitable temporary directory. The result should be copied immediately
276 as it may be overwritten by a subsequent call
277 ****************************************************************************/
281 if ((p = getenv("TMPDIR"))) {
289 /****************************************************************************
290 determine if a file descriptor is in fact a socket
291 ****************************************************************************/
292 BOOL is_a_socket(int fd)
296 return(getsockopt(fd, SOL_SOCKET, SO_TYPE, (char *)&v, &l) == 0);
300 static char *last_ptr=NULL;
302 /****************************************************************************
303 Get the next token from a string, return False if none found
304 handles double-quotes.
305 Based on a routine by GJC@VILLAGE.COM.
306 Extensively modified by Andrew.Tridgell@anu.edu.au
307 ****************************************************************************/
308 BOOL next_token(char **ptr,char *buff,char *sep)
313 if (!ptr) ptr = &last_ptr;
314 if (!ptr) return(False);
318 /* default to simple separators */
319 if (!sep) sep = " \t\n\r";
321 /* find the first non sep char */
322 while(*s && strchr(sep,*s)) s++;
325 if (! *s) return(False);
327 /* copy over the token */
328 for (quoted = False; *s && (quoted || !strchr(sep,*s)); s++)
336 *ptr = (*s) ? s+1 : s;
343 /****************************************************************************
344 Convert list of tokens to array; dependent on above routine.
345 Uses last_ptr from above - bit of a hack.
346 ****************************************************************************/
347 char **toktocliplist(int *ctok, char *sep)
353 if (!sep) sep = " \t\n\r";
355 while(*s && strchr(sep,*s)) s++;
358 if (!*s) return(NULL);
362 while(*s && (!strchr(sep,*s))) s++;
363 while(*s && strchr(sep,*s)) *s++=0;
369 if (!(ret=iret=malloc(ictok*sizeof(char *)))) return NULL;
381 /*******************************************************************
382 safely copies memory, ensuring no overlap problems.
383 this is only used if the machine does not have it's own memmove().
384 this is not the fastest algorithm in town, but it will do for our
386 ********************************************************************/
387 void *MemMove(void *dest,void *src,int size)
391 if (dest==src || !size) return(dest);
393 d = (unsigned long)dest;
394 s = (unsigned long)src;
396 if ((d >= (s+size)) || (s >= (d+size))) {
398 memcpy(dest,src,size);
404 /* we can forward copy */
405 if (s-d >= sizeof(int) &&
406 !(s%sizeof(int)) && !(d%sizeof(int)) && !(size%sizeof(int))) {
407 /* do it all as words */
408 int *idest = (int *)dest;
409 int *isrc = (int *)src;
411 for (i=0;i<size;i++) idest[i] = isrc[i];
414 char *cdest = (char *)dest;
415 char *csrc = (char *)src;
416 for (i=0;i<size;i++) cdest[i] = csrc[i];
421 /* must backward copy */
422 if (d-s >= sizeof(int) &&
423 !(s%sizeof(int)) && !(d%sizeof(int)) && !(size%sizeof(int))) {
424 /* do it all as words */
425 int *idest = (int *)dest;
426 int *isrc = (int *)src;
428 for (i=size-1;i>=0;i--) idest[i] = isrc[i];
431 char *cdest = (char *)dest;
432 char *csrc = (char *)src;
433 for (i=size-1;i>=0;i--) cdest[i] = csrc[i];
441 /****************************************************************************
442 prompte a dptr (to make it recently used)
443 ****************************************************************************/
444 void array_promote(char *array,int elsize,int element)
450 p = (char *)malloc(elsize);
454 DEBUG(5,("Ahh! Can't malloc\n"));
457 memcpy(p,array + element * elsize, elsize);
458 memmove(array + elsize,array,elsize*element);
459 memcpy(array,p,elsize);
463 enum SOCK_OPT_TYPES {OPT_BOOL,OPT_INT,OPT_ON};
472 } socket_options[] = {
473 {"SO_KEEPALIVE", SOL_SOCKET, SO_KEEPALIVE, 0, OPT_BOOL},
474 {"SO_REUSEADDR", SOL_SOCKET, SO_REUSEADDR, 0, OPT_BOOL},
475 {"SO_BROADCAST", SOL_SOCKET, SO_BROADCAST, 0, OPT_BOOL},
477 {"TCP_NODELAY", IPPROTO_TCP, TCP_NODELAY, 0, OPT_BOOL},
479 #ifdef IPTOS_LOWDELAY
480 {"IPTOS_LOWDELAY", IPPROTO_IP, IP_TOS, IPTOS_LOWDELAY, OPT_ON},
482 #ifdef IPTOS_THROUGHPUT
483 {"IPTOS_THROUGHPUT", IPPROTO_IP, IP_TOS, IPTOS_THROUGHPUT, OPT_ON},
486 {"SO_SNDBUF", SOL_SOCKET, SO_SNDBUF, 0, OPT_INT},
489 {"SO_RCVBUF", SOL_SOCKET, SO_RCVBUF, 0, OPT_INT},
492 {"SO_SNDLOWAT", SOL_SOCKET, SO_SNDLOWAT, 0, OPT_INT},
495 {"SO_RCVLOWAT", SOL_SOCKET, SO_RCVLOWAT, 0, OPT_INT},
498 {"SO_SNDTIMEO", SOL_SOCKET, SO_SNDTIMEO, 0, OPT_INT},
501 {"SO_RCVTIMEO", SOL_SOCKET, SO_RCVTIMEO, 0, OPT_INT},
507 /****************************************************************************
508 set user socket options
509 ****************************************************************************/
510 void set_socket_options(int fd, char *options)
514 while (next_token(&options,tok," \t,"))
519 BOOL got_value = False;
521 if ((p = strchr(tok,'=')))
528 for (i=0;socket_options[i].name;i++)
529 if (strequal(socket_options[i].name,tok))
532 if (!socket_options[i].name)
534 DEBUG(0,("Unknown socket option %s\n",tok));
538 switch (socket_options[i].opttype)
542 ret = setsockopt(fd,socket_options[i].level,
543 socket_options[i].option,(char *)&value,sizeof(int));
548 DEBUG(0,("syntax error - %s does not take a value\n",tok));
551 int on = socket_options[i].value;
552 ret = setsockopt(fd,socket_options[i].level,
553 socket_options[i].option,(char *)&on,sizeof(int));
559 DEBUG(0,("Failed to set socket option %s\n",tok));
565 /****************************************************************************
566 close the socket communication
567 ****************************************************************************/
568 void close_sockets(void )
574 /****************************************************************************
575 determine whether we are in the specified group
576 ****************************************************************************/
577 BOOL in_group(gid_t group, int current_gid, int ngroups, int *groups)
581 if (group == current_gid) return(True);
583 for (i=0;i<ngroups;i++)
584 if (group == groups[i])
590 /****************************************************************************
591 this is a safer strcpy(), meant to prevent core dumps when nasty things happen
592 ****************************************************************************/
593 char *StrCpy(char *dest,char *src)
598 /* I don't want to get lazy with these ... */
600 DEBUG(0,("ERROR: NULL StrCpy() called!\n"));
605 if (!dest) return(NULL);
610 while ((*d++ = *src++)) ;
614 /****************************************************************************
615 line strncpy but always null terminates. Make sure there is room!
616 ****************************************************************************/
617 char *StrnCpy(char *dest,char *src,int n)
620 if (!dest) return(NULL);
625 while (n-- && (*d++ = *src++)) ;
631 /*******************************************************************
632 copy an IP address from one buffer to another
633 ********************************************************************/
634 void putip(void *dest,void *src)
640 /****************************************************************************
641 interpret the weird netbios "name". Return the name type
642 ****************************************************************************/
643 static int name_interpret(char *in,char *out)
646 int len = (*in++) / 2;
650 if (len > 30 || len<1) return(0);
654 if (in[0] < 'A' || in[0] > 'P' || in[1] < 'A' || in[1] > 'P') {
658 *out = ((in[0]-'A')<<4) + (in[1]-'A');
666 /* Handle any scope names */
669 *out++ = '.'; /* Scope names are separated by periods */
670 len = *(unsigned char *)in++;
671 StrnCpy(out, in, len);
680 /****************************************************************************
681 mangle a name into netbios format
682 ****************************************************************************/
683 int name_mangle(char *In,char *Out,char name_type)
687 char *in = (char *)&buf[0];
688 char *out = (char *)Out;
693 StrnCpy(name,In,sizeof(name)-1);
694 sprintf(buf,"%-15.15s%c",name,name_type);
697 memset(&buf[1],0,16);
702 char c = toupper(in[i]);
703 out[i*2] = (c>>4) + 'A';
704 out[i*2+1] = (c & 0xF) + 'A';
712 p = strchr(label, '.');
714 p = label + strlen(label);
716 memcpy(out, label, p - label);
718 label += p - label + (*p == '.');
721 return(name_len(Out));
725 /*******************************************************************
726 check if a file exists
727 ********************************************************************/
728 BOOL file_exist(char *fname,struct stat *sbuf)
731 if (!sbuf) sbuf = &st;
733 if (sys_stat(fname,sbuf) != 0)
736 return(S_ISREG(sbuf->st_mode));
739 /*******************************************************************
740 check a files mod time
741 ********************************************************************/
742 time_t file_modtime(char *fname)
746 if (sys_stat(fname,&st) != 0)
752 /*******************************************************************
753 check if a directory exists
754 ********************************************************************/
755 BOOL directory_exist(char *dname,struct stat *st)
760 if (sys_stat(dname,st) != 0)
763 return(S_ISDIR(st->st_mode));
766 /*******************************************************************
767 returns the size in bytes of the named file
768 ********************************************************************/
769 uint32 file_size(char *file_name)
773 sys_stat(file_name,&buf);
777 /*******************************************************************
778 return a string representing an attribute for a file
779 ********************************************************************/
780 char *attrib_string(int mode)
782 static char attrstr[10];
786 if (mode & aVOLID) strcat(attrstr,"V");
787 if (mode & aDIR) strcat(attrstr,"D");
788 if (mode & aARCH) strcat(attrstr,"A");
789 if (mode & aHIDDEN) strcat(attrstr,"H");
790 if (mode & aSYSTEM) strcat(attrstr,"S");
791 if (mode & aRONLY) strcat(attrstr,"R");
797 /*******************************************************************
798 case insensitive string compararison
799 ********************************************************************/
800 int StrCaseCmp(const char *s, const char *t)
802 /* compare until we run out of string, either t or s, or find a difference */
803 /* We *must* use toupper rather than tolower here due to the
804 asynchronous upper to lower mapping.
806 while (*s && *t && toupper(*s) == toupper(*t))
811 return(toupper(*s) - toupper(*t));
814 /*******************************************************************
815 case insensitive string compararison, length limited
816 ********************************************************************/
817 int StrnCaseCmp(const char *s, const char *t, int n)
819 /* compare until we run out of string, either t or s, or chars */
820 /* We *must* use toupper rather than tolower here due to the
821 asynchronous upper to lower mapping.
823 while (n-- && *s && *t && toupper(*s) == toupper(*t))
828 /* not run out of chars - strings are different lengths */
829 if (n) return(toupper(*s) - toupper(*t));
831 /* identical up to where we run out of chars, and strings are same length */
835 /*******************************************************************
837 ********************************************************************/
838 BOOL strequal(char *s1,char *s2)
840 if (s1 == s2) return(True);
841 if (!s1 || !s2) return(False);
843 return(StrCaseCmp(s1,s2)==0);
846 /*******************************************************************
847 compare 2 strings up to and including the nth char.
848 ******************************************************************/
849 BOOL strnequal(char *s1,char *s2,int n)
851 if (s1 == s2) return(True);
852 if (!s1 || !s2 || !n) return(False);
854 return(StrnCaseCmp(s1,s2,n)==0);
857 /*******************************************************************
858 compare 2 strings (case sensitive)
859 ********************************************************************/
860 BOOL strcsequal(char *s1,char *s2)
862 if (s1 == s2) return(True);
863 if (!s1 || !s2) return(False);
865 return(strcmp(s1,s2)==0);
869 /*******************************************************************
870 convert a string to lower case
871 ********************************************************************/
872 void strlower(char *s)
877 if (is_shift_jis (*s)) {
879 } else if (is_kana (*s)) {
894 /*******************************************************************
895 convert a string to upper case
896 ********************************************************************/
897 void strupper(char *s)
902 if (is_shift_jis (*s)) {
904 } else if (is_kana (*s)) {
919 /*******************************************************************
920 convert a string to "normal" form
921 ********************************************************************/
922 void strnorm(char *s)
924 if (case_default == CASE_UPPER)
930 /*******************************************************************
931 check if a string is in "normal" case
932 ********************************************************************/
933 BOOL strisnormal(char *s)
935 if (case_default == CASE_UPPER)
936 return(!strhaslower(s));
938 return(!strhasupper(s));
942 /****************************************************************************
944 ****************************************************************************/
945 void string_replace(char *s,char oldc,char newc)
950 if (is_shift_jis (*s)) {
952 } else if (is_kana (*s)) {
967 /****************************************************************************
968 make a file into unix format
969 ****************************************************************************/
970 void unix_format(char *fname)
973 string_replace(fname,'\\','/');
977 strcpy(namecopy,fname);
979 strcat(fname,namecopy);
983 /****************************************************************************
984 make a file into dos format
985 ****************************************************************************/
986 void dos_format(char *fname)
988 string_replace(fname,'/','\\');
992 /*******************************************************************
993 show a smb message structure
994 ********************************************************************/
995 void show_msg(char *buf)
1002 DEBUG(5,("size=%d\nsmb_com=0x%x\nsmb_rcls=%d\nsmb_reh=%d\nsmb_err=%d\nsmb_flg=%d\nsmb_flg2=%d\n",
1004 (int)CVAL(buf,smb_com),
1005 (int)CVAL(buf,smb_rcls),
1006 (int)CVAL(buf,smb_reh),
1007 (int)SVAL(buf,smb_err),
1008 (int)CVAL(buf,smb_flg),
1009 (int)SVAL(buf,smb_flg2)));
1010 DEBUG(5,("smb_tid=%d\nsmb_pid=%d\nsmb_uid=%d\nsmb_mid=%d\nsmt_wct=%d\n",
1011 (int)SVAL(buf,smb_tid),
1012 (int)SVAL(buf,smb_pid),
1013 (int)SVAL(buf,smb_uid),
1014 (int)SVAL(buf,smb_mid),
1015 (int)CVAL(buf,smb_wct)));
1016 for (i=0;i<(int)CVAL(buf,smb_wct);i++)
1017 DEBUG(5,("smb_vwv[%d]=%d (0x%X)\n",i,
1018 SVAL(buf,smb_vwv+2*i),SVAL(buf,smb_vwv+2*i)));
1019 bcc = (int)SVAL(buf,smb_vwv+2*(CVAL(buf,smb_wct)));
1020 DEBUG(5,("smb_bcc=%d\n",bcc));
1021 if (DEBUGLEVEL < 10)
1023 for (i=0;i<MIN(bcc,128);i++)
1024 DEBUG(10,("%X ",CVAL(smb_buf(buf),i)));
1028 /*******************************************************************
1029 return the length of an smb packet
1030 ********************************************************************/
1031 int smb_len(char *buf)
1033 return( PVAL(buf,3) | (PVAL(buf,2)<<8) | ((PVAL(buf,1)&1)<<16) );
1036 /*******************************************************************
1037 set the length of an smb packet
1038 ********************************************************************/
1039 void _smb_setlen(char *buf,int len)
1042 buf[1] = (len&0x10000)>>16;
1043 buf[2] = (len&0xFF00)>>8;
1047 /*******************************************************************
1048 set the length and marker of an smb packet
1049 ********************************************************************/
1050 void smb_setlen(char *buf,int len)
1052 _smb_setlen(buf,len);
1060 /*******************************************************************
1061 setup the word count and byte count for a smb message
1062 ********************************************************************/
1063 int set_message(char *buf,int num_words,int num_bytes,BOOL zero)
1066 bzero(buf + smb_size,num_words*2 + num_bytes);
1067 CVAL(buf,smb_wct) = num_words;
1068 SSVAL(buf,smb_vwv + num_words*SIZEOFWORD,num_bytes);
1069 smb_setlen(buf,smb_size + num_words*2 + num_bytes - 4);
1070 return (smb_size + num_words*2 + num_bytes);
1073 /*******************************************************************
1074 return the number of smb words
1075 ********************************************************************/
1076 int smb_numwords(char *buf)
1078 return (CVAL(buf,smb_wct));
1081 /*******************************************************************
1082 return the size of the smb_buf region of a message
1083 ********************************************************************/
1084 int smb_buflen(char *buf)
1086 return(SVAL(buf,smb_vwv0 + smb_numwords(buf)*2));
1089 /*******************************************************************
1090 return a pointer to the smb_buf data area
1091 ********************************************************************/
1092 int smb_buf_ofs(char *buf)
1094 return (smb_size + CVAL(buf,smb_wct)*2);
1097 /*******************************************************************
1098 return a pointer to the smb_buf data area
1099 ********************************************************************/
1100 char *smb_buf(char *buf)
1102 return (buf + smb_buf_ofs(buf));
1105 /*******************************************************************
1106 return the SMB offset into an SMB buffer
1107 ********************************************************************/
1108 int smb_offset(char *p,char *buf)
1110 return(PTR_DIFF(p,buf+4) + chain_size);
1114 /*******************************************************************
1115 skip past some strings in a buffer
1116 ********************************************************************/
1117 char *skip_string(char *buf,int n)
1120 buf += strlen(buf) + 1;
1124 /*******************************************************************
1125 trim the specified elements off the front and back of a string
1126 ********************************************************************/
1127 BOOL trim_string(char *s,char *front,char *back)
1130 while (front && *front && strncmp(s,front,strlen(front)) == 0)
1136 if (!(*p = p[strlen(front)]))
1141 while (back && *back && strlen(s) >= strlen(back) &&
1142 (strncmp(s+strlen(s)-strlen(back),back,strlen(back))==0))
1145 s[strlen(s)-strlen(back)] = 0;
1151 /*******************************************************************
1152 reduce a file name, removing .. elements.
1153 ********************************************************************/
1154 void dos_clean_name(char *s)
1158 DEBUG(3,("dos_clean_name [%s]\n",s));
1160 /* remove any double slashes */
1161 string_sub(s, "\\\\", "\\");
1163 while ((p = strstr(s,"\\..\\")) != NULL)
1170 if ((p=strrchr(s,'\\')) != NULL)
1177 trim_string(s,NULL,"\\..");
1179 string_sub(s, "\\.\\", "\\");
1182 /*******************************************************************
1183 reduce a file name, removing .. elements.
1184 ********************************************************************/
1185 void unix_clean_name(char *s)
1189 DEBUG(3,("unix_clean_name [%s]\n",s));
1191 /* remove any double slashes */
1192 string_sub(s, "//","/");
1194 /* Remove leading ./ characters */
1195 if(strncmp(s, "./", 2) == 0) {
1196 trim_string(s, "./", NULL);
1201 while ((p = strstr(s,"/../")) != NULL)
1208 if ((p=strrchr(s,'/')) != NULL)
1215 trim_string(s,NULL,"/..");
1219 /*******************************************************************
1220 a wrapper for the normal chdir() function
1221 ********************************************************************/
1222 int ChDir(char *path)
1225 static pstring LastDir="";
1227 if (strcsequal(path,".")) return(0);
1229 if (*path == '/' && strcsequal(LastDir,path)) return(0);
1230 DEBUG(3,("chdir to %s\n",path));
1231 res = sys_chdir(path);
1233 strcpy(LastDir,path);
1238 /*******************************************************************
1239 return the absolute current directory path. A dumb version.
1240 ********************************************************************/
1241 static char *Dumb_GetWd(char *s)
1244 return ((char *)getcwd(s,sizeof(pstring)));
1246 return ((char *)getwd(s));
1251 /* number of list structures for a caching GetWd function. */
1252 #define MAX_GETWDCACHE (50)
1260 } ino_list[MAX_GETWDCACHE];
1262 BOOL use_getwd_cache=True;
1264 /*******************************************************************
1265 return the absolute current directory path
1266 ********************************************************************/
1267 char *GetWd(char *str)
1270 static BOOL getwd_cache_init = False;
1271 struct stat st, st2;
1276 if (!use_getwd_cache)
1277 return(Dumb_GetWd(str));
1279 /* init the cache */
1280 if (!getwd_cache_init)
1282 getwd_cache_init = True;
1283 for (i=0;i<MAX_GETWDCACHE;i++)
1285 string_init(&ino_list[i].text,"");
1286 ino_list[i].valid = False;
1290 /* Get the inode of the current directory, if this doesn't work we're
1293 if (stat(".",&st) == -1)
1295 DEBUG(0,("Very strange, couldn't stat \".\"\n"));
1296 return(Dumb_GetWd(str));
1300 for (i=0; i<MAX_GETWDCACHE; i++)
1301 if (ino_list[i].valid)
1304 /* If we have found an entry with a matching inode and dev number
1305 then find the inode number for the directory in the cached string.
1306 If this agrees with that returned by the stat for the current
1307 directory then all is o.k. (but make sure it is a directory all
1310 if (st.st_ino == ino_list[i].inode &&
1311 st.st_dev == ino_list[i].dev)
1313 if (stat(ino_list[i].text,&st2) == 0)
1315 if (st.st_ino == st2.st_ino &&
1316 st.st_dev == st2.st_dev &&
1317 (st2.st_mode & S_IFMT) == S_IFDIR)
1319 strcpy (str, ino_list[i].text);
1321 /* promote it for future use */
1322 array_promote((char *)&ino_list[0],sizeof(ino_list[0]),i);
1327 /* If the inode is different then something's changed,
1328 scrub the entry and start from scratch. */
1329 ino_list[i].valid = False;
1336 /* We don't have the information to hand so rely on traditional methods.
1337 The very slow getcwd, which spawns a process on some systems, or the
1338 not quite so bad getwd. */
1342 DEBUG(0,("Getwd failed, errno %d\n",errno));
1348 DEBUG(5,("GetWd %s, inode %d, dev %x\n",s,(int)st.st_ino,(int)st.st_dev));
1350 /* add it to the cache */
1351 i = MAX_GETWDCACHE - 1;
1352 string_set(&ino_list[i].text,s);
1353 ino_list[i].dev = st.st_dev;
1354 ino_list[i].inode = st.st_ino;
1355 ino_list[i].valid = True;
1357 /* put it at the top of the list */
1358 array_promote((char *)&ino_list[0],sizeof(ino_list[0]),i);
1365 /*******************************************************************
1366 reduce a file name, removing .. elements and checking that
1367 it is below dir in the heirachy. This uses GetWd() and so must be run
1368 on the system that has the referenced file system.
1370 widelinks are allowed if widelinks is true
1371 ********************************************************************/
1372 BOOL reduce_name(char *s,char *dir,BOOL widelinks)
1374 #ifndef REDUCE_PATHS
1382 BOOL relative = (*s != '/');
1384 *dir2 = *wd = *basename = *newname = 0;
1389 /* can't have a leading .. */
1390 if (strncmp(s,"..",2) == 0 && (s[2]==0 || s[2]=='/'))
1392 DEBUG(3,("Illegal file name? (%s)\n",s));
1402 DEBUG(3,("reduce_name [%s] [%s]\n",s,dir));
1404 /* remove any double slashes */
1405 string_sub(s,"//","/");
1408 p = strrchr(basename,'/');
1415 DEBUG(0,("couldn't getwd for %s %s\n",s,dir));
1419 if (ChDir(dir) != 0)
1421 DEBUG(0,("couldn't chdir to %s\n",dir));
1427 DEBUG(0,("couldn't getwd for %s\n",dir));
1433 if (p && (p != basename))
1436 if (strcmp(p+1,".")==0)
1438 if (strcmp(p+1,"..")==0)
1442 if (ChDir(basename) != 0)
1445 DEBUG(3,("couldn't chdir for %s %s basename=%s\n",s,dir,basename));
1449 if (!GetWd(newname))
1452 DEBUG(2,("couldn't get wd for %s %s\n",s,dir2));
1456 if (p && (p != basename))
1458 strcat(newname,"/");
1459 strcat(newname,p+1);
1463 int l = strlen(dir2);
1464 if (dir2[l-1] == '/')
1467 if (strncmp(newname,dir2,l) != 0)
1470 DEBUG(2,("Bad access attempt? s=%s dir=%s newname=%s l=%d\n",s,dir2,newname,l));
1476 if (newname[l] == '/')
1477 strcpy(s,newname + l + 1);
1479 strcpy(s,newname+l);
1490 DEBUG(3,("reduced to %s\n",s));
1495 /****************************************************************************
1497 ****************************************************************************/
1498 static void expand_one(char *Mask,int len)
1501 while ((p1 = strchr(Mask,'*')) != NULL)
1503 int lfill = (len+1) - strlen(Mask);
1504 int l1= (p1 - Mask);
1507 memset(tmp+l1,'?',lfill);
1508 strcpy(tmp + l1 + lfill,Mask + l1 + 1);
1513 /****************************************************************************
1514 expand a wildcard expression, replacing *s with ?s
1515 ****************************************************************************/
1516 void expand_mask(char *Mask,BOOL doext)
1521 BOOL hasdot = False;
1523 BOOL absolute = (*Mask == '\\');
1525 *mbeg = *mext = *dirpart = *filepart = 0;
1527 /* parse the directory and filename */
1528 if (strchr(Mask,'\\'))
1529 dirname_dos(Mask,dirpart);
1531 filename_dos(Mask,filepart);
1533 strcpy(mbeg,filepart);
1534 if ((p1 = strchr(mbeg,'.')) != NULL)
1544 if (strlen(mbeg) > 8)
1546 strcpy(mext,mbeg + 8);
1552 strcpy(mbeg,"????????");
1553 if ((*mext == 0) && doext && !hasdot)
1556 if (strequal(mbeg,"*") && *mext==0)
1564 strcpy(Mask,dirpart);
1565 if (*dirpart || absolute) strcat(Mask,"\\");
1570 DEBUG(6,("Mask expanded to [%s]\n",Mask));
1574 /****************************************************************************
1575 does a string have any uppercase chars in it?
1576 ****************************************************************************/
1577 BOOL strhasupper(char *s)
1582 if (is_shift_jis (*s)) {
1584 } else if (is_kana (*s)) {
1587 if (isupper(*s)) return(True);
1591 if (isupper(*s)) return(True);
1598 /****************************************************************************
1599 does a string have any lowercase chars in it?
1600 ****************************************************************************/
1601 BOOL strhaslower(char *s)
1606 if (is_shift_jis (*s)) {
1608 } else if (is_kana (*s)) {
1611 if (islower(*s)) return(True);
1615 if (islower(*s)) return(True);
1622 /****************************************************************************
1623 find the number of chars in a string
1624 ****************************************************************************/
1625 int count_chars(char *s,char c)
1638 /****************************************************************************
1640 ****************************************************************************/
1641 void make_dir_struct(char *buf,char *mask,char *fname,unsigned int size,int mode,time_t date)
1648 if ((mode & aDIR) != 0)
1651 memset(buf+1,' ',11);
1652 if ((p = strchr(mask2,'.')) != NULL)
1655 memcpy(buf+1,mask2,MIN(strlen(mask2),8));
1656 memcpy(buf+9,p+1,MIN(strlen(p+1),3));
1660 memcpy(buf+1,mask2,MIN(strlen(mask2),11));
1662 bzero(buf+21,DIR_STRUCT_SIZE-21);
1663 CVAL(buf,21) = mode;
1664 put_dos_date(buf,22,date);
1665 SSVAL(buf,26,size & 0xFFFF);
1666 SSVAL(buf,28,size >> 16);
1667 StrnCpy(buf+30,fname,12);
1668 if (!case_sensitive)
1670 DEBUG(8,("put name [%s] into dir struct\n",buf+30));
1674 /*******************************************************************
1675 close the low 3 fd's and open dev/null in their place
1676 ********************************************************************/
1677 void close_low_fds(void)
1681 close(0); close(1); close(2);
1682 /* try and use up these file descriptors, so silly
1683 library routines writing to stdout etc won't cause havoc */
1685 fd = open("/dev/null",O_RDWR,0);
1686 if (fd < 0) fd = open("/dev/null",O_WRONLY,0);
1688 DEBUG(0,("Can't open /dev/null\n"));
1692 DEBUG(0,("Didn't get file descriptor %d\n",i));
1698 /****************************************************************************
1699 Set a fd into blocking/nonblocking mode. Uses POSIX O_NONBLOCK if available,
1701 if SYSV use O_NDELAY
1703 ****************************************************************************/
1704 int set_blocking(int fd, int set)
1708 #define FLAG_TO_SET O_NONBLOCK
1711 #define FLAG_TO_SET O_NDELAY
1713 #define FLAG_TO_SET FNDELAY
1717 if((val = fcntl(fd, F_GETFL, 0)) == -1)
1719 if(set) /* Turn blocking on - ie. clear nonblock flag */
1720 val &= ~FLAG_TO_SET;
1723 return fcntl( fd, F_SETFL, val);
1728 /****************************************************************************
1730 ****************************************************************************/
1731 int write_socket(int fd,char *buf,int len)
1737 DEBUG(6,("write_socket(%d,%d)\n",fd,len));
1738 ret = write_data(fd,buf,len);
1740 DEBUG(6,("write_socket(%d,%d) wrote %d\n",fd,len,ret));
1744 /****************************************************************************
1746 ****************************************************************************/
1747 int read_udp_socket(int fd,char *buf,int len)
1750 struct sockaddr sock;
1753 socklen = sizeof(sock);
1754 bzero((char *)&sock,socklen);
1755 bzero((char *)&lastip,sizeof(lastip));
1756 ret = recvfrom(fd,buf,len,0,&sock,&socklen);
1758 DEBUG(2,("read socket failed. ERRNO=%d\n",errno));
1762 lastip = *(struct in_addr *) &sock.sa_data[2];
1763 lastport = ntohs(((struct sockaddr_in *)&sock)->sin_port);
1768 /****************************************************************************
1769 read data from a device with a timout in msec.
1770 mincount = if timeout, minimum to read before returning
1771 maxcount = number to be read.
1772 ****************************************************************************/
1773 int read_with_timeout(int fd,char *buf,int mincnt,int maxcnt,long time_out)
1779 struct timeval timeout;
1781 /* just checking .... */
1782 if (maxcnt <= 0) return(0);
1787 if (time_out <= 0) {
1788 if (mincnt == 0) mincnt = maxcnt;
1790 while (nread < mincnt) {
1791 readret = read(fd, buf + nread, maxcnt - nread);
1793 smb_read_error = READ_EOF;
1797 if (readret == -1) {
1798 smb_read_error = READ_ERROR;
1806 /* Most difficult - timeout read */
1807 /* If this is ever called on a disk file and
1808 mincnt is greater then the filesize then
1809 system performance will suffer severely as
1810 select always return true on disk files */
1812 /* Set initial timeout */
1813 timeout.tv_sec = time_out / 1000;
1814 timeout.tv_usec = 1000 * (time_out % 1000);
1816 for (nread=0; nread<mincnt; )
1821 selrtn = sys_select(&fds,&timeout);
1823 /* Check if error */
1825 /* something is wrong. Maybe the socket is dead? */
1826 smb_read_error = READ_ERROR;
1830 /* Did we timeout ? */
1832 smb_read_error = READ_TIMEOUT;
1836 readret = read(fd, buf+nread, maxcnt-nread);
1838 /* we got EOF on the file descriptor */
1839 smb_read_error = READ_EOF;
1843 if (readret == -1) {
1844 /* the descriptor is probably dead */
1845 smb_read_error = READ_ERROR;
1852 /* Return the number we got */
1856 /****************************************************************************
1857 read data from the client. Maxtime is in milliseconds
1858 ****************************************************************************/
1859 int read_max_udp(int fd,char *buffer,int bufsize,int maxtime)
1864 struct timeval timeout;
1869 timeout.tv_sec = maxtime / 1000;
1870 timeout.tv_usec = (maxtime % 1000) * 1000;
1872 selrtn = sys_select(&fds,maxtime>0?&timeout:NULL);
1874 if (!FD_ISSET(fd,&fds))
1877 nread = read_udp_socket(fd, buffer, bufsize);
1879 /* return the number got */
1883 /*******************************************************************
1884 find the difference in milliseconds between two struct timeval
1886 ********************************************************************/
1887 int TvalDiff(struct timeval *tvalold,struct timeval *tvalnew)
1889 return((tvalnew->tv_sec - tvalold->tv_sec)*1000 +
1890 ((int)tvalnew->tv_usec - (int)tvalold->tv_usec)/1000);
1893 /****************************************************************************
1894 send a keepalive packet (rfc1002)
1895 ****************************************************************************/
1896 BOOL send_keepalive(int client)
1898 unsigned char buf[4];
1901 buf[1] = buf[2] = buf[3] = 0;
1903 return(write_data(client,(char *)buf,4) == 4);
1908 /****************************************************************************
1909 read data from the client, reading exactly N bytes.
1910 ****************************************************************************/
1911 int read_data(int fd,char *buffer,int N)
1920 ret = read(fd,buffer + total,N - total);
1922 smb_read_error = READ_EOF;
1926 smb_read_error = READ_ERROR;
1935 /****************************************************************************
1937 ****************************************************************************/
1938 int write_data(int fd,char *buffer,int N)
1945 ret = write(fd,buffer + total,N - total);
1947 if (ret == -1) return -1;
1948 if (ret == 0) return total;
1956 /****************************************************************************
1957 transfer some data between two fd's
1958 ****************************************************************************/
1959 int transfer_file(int infd,int outfd,int n,char *header,int headlen,int align)
1961 static char *buf=NULL;
1966 DEBUG(4,("transfer_file %d (head=%d) called\n",n,headlen));
1969 size = lp_readsize();
1970 size = MAX(size,1024);
1973 while (!buf && size>0) {
1974 buf = (char *)Realloc(buf,size+8);
1975 if (!buf) size /= 2;
1979 DEBUG(0,("Can't allocate transfer buffer!\n"));
1983 abuf = buf + (align%8);
1990 int s = MIN(n,size);
1995 if (header && (headlen >= MIN(s,1024))) {
2005 if (header && headlen > 0)
2007 ret = MIN(headlen,size);
2008 memcpy(buf1,header,ret);
2011 if (headlen <= 0) header = NULL;
2015 ret += read(infd,buf1+ret,s-ret);
2019 ret2 = (outfd>=0?write_data(outfd,buf1,ret):ret);
2020 if (ret2 > 0) total += ret2;
2021 /* if we can't write then dump excess data */
2023 transfer_file(infd,-1,n-(ret+headlen),NULL,0,0);
2025 if (ret <= 0 || ret2 != ret)
2033 /****************************************************************************
2034 read 4 bytes of a smb packet and return the smb length of the packet
2035 possibly store the result in the buffer
2036 ****************************************************************************/
2037 int read_smb_length(int fd,char *inbuf,int timeout)
2041 int len=0, msg_type;
2052 ok = (read_with_timeout(fd,buffer,4,4,timeout) == 4);
2054 ok = (read_data(fd,buffer,4) == 4);
2059 len = smb_len(buffer);
2060 msg_type = CVAL(buffer,0);
2062 if (msg_type == 0x85)
2064 DEBUG(5,("Got keepalive packet\n"));
2069 DEBUG(10,("got smb length of %d\n",len));
2076 /****************************************************************************
2077 read an smb from a fd and return it's length
2078 The timeout is in milli seconds
2079 ****************************************************************************/
2080 BOOL receive_smb(int fd,char *buffer,int timeout)
2086 bzero(buffer,smb_size + 100);
2088 len = read_smb_length(fd,buffer,timeout);
2092 if (len > BUFFER_SIZE) {
2093 DEBUG(0,("Invalid packet length! (%d bytes).\n",len));
2094 if (len > BUFFER_SIZE + (SAFETY_MARGIN/2))
2098 ret = read_data(fd,buffer+4,len);
2100 smb_read_error = READ_ERROR;
2108 /****************************************************************************
2110 ****************************************************************************/
2111 BOOL send_smb(int fd,char *buffer)
2115 len = smb_len(buffer) + 4;
2117 while (nwritten < len)
2119 ret = write_socket(fd,buffer+nwritten,len - nwritten);
2122 DEBUG(0,("Error writing %d bytes to client. %d. Exiting\n",len,ret));
2134 /****************************************************************************
2135 find a pointer to a netbios name
2136 ****************************************************************************/
2137 char *name_ptr(char *buf,int ofs)
2139 unsigned char c = *(unsigned char *)(buf+ofs);
2141 if ((c & 0xC0) == 0xC0)
2145 memcpy(p,buf+ofs,2);
2148 DEBUG(5,("name ptr to pos %d from %d is %s\n",l,ofs,buf+l));
2155 /****************************************************************************
2156 extract a netbios name from a buf
2157 ****************************************************************************/
2158 int name_extract(char *buf,int ofs,char *name)
2160 char *p = name_ptr(buf,ofs);
2161 int d = PTR_DIFF(p,buf+ofs);
2163 if (d < -50 || d > 50) return(0);
2164 return(name_interpret(p,name));
2168 /****************************************************************************
2169 return the total storage length of a mangled name
2170 ****************************************************************************/
2171 int name_len(char *s)
2174 unsigned char c = *(unsigned char *)s;
2175 if ((c & 0xC0) == 0xC0)
2177 while (*s) s += (*s)+1;
2178 return(PTR_DIFF(s,s0)+1);
2181 /****************************************************************************
2182 send a single packet to a port on another machine
2183 ****************************************************************************/
2184 BOOL send_one_packet(char *buf,int len,struct in_addr ip,int port,int type)
2188 struct sockaddr_in sock_out;
2193 /* create a socket to write to */
2194 out_fd = socket(AF_INET, type, 0);
2197 DEBUG(0,("socket failed"));
2201 /* set the address and port */
2202 bzero((char *)&sock_out,sizeof(sock_out));
2203 putip((char *)&sock_out.sin_addr,(char *)&ip);
2204 sock_out.sin_port = htons( port );
2205 sock_out.sin_family = AF_INET;
2208 DEBUG(3,("sending a packet of len %d to (%s) on port %d of type %s\n",
2209 len,inet_ntoa(ip),port,type==SOCK_DGRAM?"DGRAM":"STREAM"));
2212 ret = (sendto(out_fd,buf,len,0,(struct sockaddr *)&sock_out,sizeof(sock_out)) >= 0);
2215 DEBUG(0,("Packet send to %s(%d) failed ERRNO=%d\n",
2216 inet_ntoa(ip),port,errno));
2222 /*******************************************************************
2223 sleep for a specified number of milliseconds
2224 ********************************************************************/
2228 struct timeval tval,t1,t2;
2235 tval.tv_sec = (t-tdiff)/1000;
2236 tval.tv_usec = 1000*((t-tdiff)%1000);
2240 sys_select(&fds,&tval);
2243 tdiff = TvalDiff(&t1,&t2);
2247 /****************************************************************************
2248 check if a string is part of a list
2249 ****************************************************************************/
2250 BOOL in_list(char *s,char *list,BOOL casesensitive)
2255 if (!list) return(False);
2257 while (next_token(&p,tok,LIST_SEP))
2259 if (casesensitive) {
2260 if (strcmp(tok,s) == 0)
2263 if (StrCaseCmp(tok,s) == 0)
2270 /* this is used to prevent lots of mallocs of size 1 */
2271 static char *null_string = NULL;
2273 /****************************************************************************
2274 set a string value, allocing the space for the string
2275 ****************************************************************************/
2276 BOOL string_init(char **dest,char *src)
2287 null_string = (char *)malloc(1);
2290 *dest = null_string;
2294 *dest = (char *)malloc(l+1);
2300 /****************************************************************************
2302 ****************************************************************************/
2303 void string_free(char **s)
2305 if (!s || !(*s)) return;
2306 if (*s == null_string)
2312 /****************************************************************************
2313 set a string value, allocing the space for the string, and deallocating any
2315 ****************************************************************************/
2316 BOOL string_set(char **dest,char *src)
2320 return(string_init(dest,src));
2323 /****************************************************************************
2324 substitute a string for a pattern in another string. Make sure there is
2327 This routine looks for pattern in s and replaces it with
2328 insert. It may do multiple replacements.
2330 return True if a substitution was done.
2331 ****************************************************************************/
2332 BOOL string_sub(char *s,char *pattern,char *insert)
2338 if (!insert || !pattern || !s) return(False);
2341 lp = strlen(pattern);
2342 li = strlen(insert);
2344 if (!*pattern) return(False);
2346 while (lp <= ls && (p = strstr(s,pattern)))
2349 memmove(p+li,p+lp,ls + 1 - (PTR_DIFF(p,s) + lp));
2350 memcpy(p,insert,li);
2359 /*********************************************************
2360 * Recursive routine that is called by mask_match.
2361 * Does the actual matching.
2362 *********************************************************/
2363 BOOL do_match(char *str, char *regexp, int case_sig)
2367 for( p = regexp; *p && *str; ) {
2374 /* Look for a character matching
2375 the one after the '*' */
2378 return True; /* Automatic match */
2380 while(*str && (case_sig ? (*p != *str) : (toupper(*p)!=toupper(*str))))
2382 if(do_match(str,p,case_sig))
2396 if(toupper(*str) != toupper(*p))
2406 if (!*p && str[0] == '.' && str[1] == 0)
2409 if (!*str && *p == '?')
2411 while (*p == '?') p++;
2415 if(!*str && (*p == '*' && p[1] == '\0'))
2421 /*********************************************************
2422 * Routine to match a given string with a regexp - uses
2423 * simplified regexp that takes * and ? only. Case can be
2424 * significant or not.
2425 *********************************************************/
2426 BOOL mask_match(char *str, char *regexp, int case_sig,BOOL trans2)
2430 fstring ebase,eext,sbase,sext;
2434 /* Make local copies of str and regexp */
2435 StrnCpy(p1,regexp,sizeof(pstring)-1);
2436 StrnCpy(p2,str,sizeof(pstring)-1);
2438 if (!strchr(p2,'.')) {
2443 if (!strchr(p1,'.')) {
2451 string_sub(p1,"*.*","*");
2452 string_sub(p1,".*","*");
2456 /* Remove any *? and ** as they are meaningless */
2457 for(p = p1; *p; p++)
2458 while( *p == '*' && (p[1] == '?' ||p[1] == '*'))
2459 (void)strcpy( &p[1], &p[2]);
2461 if (strequal(p1,"*")) return(True);
2463 DEBUG(5,("mask_match str=<%s> regexp=<%s>, case_sig = %d\n", p2, p1, case_sig));
2469 if ((p=strrchr(p1,'.'))) {
2478 if (!strequal(p2,".") && !strequal(p2,"..") && (p=strrchr(p2,'.'))) {
2488 matched = do_match(sbase,ebase,case_sig) &&
2489 (trans2 || do_match(sext,eext,case_sig));
2491 DEBUG(5,("mask_match returning %d\n", matched));
2498 /****************************************************************************
2499 become a daemon, discarding the controlling terminal
2500 ****************************************************************************/
2501 void become_daemon(void)
2503 #ifndef NO_FORK_DEBUG
2507 /* detach from the terminal */
2513 int i = open("/dev/tty", O_RDWR);
2516 ioctl(i, (int) TIOCNOTTY, (char *)0);
2526 /****************************************************************************
2527 put up a yes/no prompt
2528 ****************************************************************************/
2534 if (!fgets(ans,sizeof(ans)-1,stdin))
2537 if (*ans == 'y' || *ans == 'Y')
2543 /****************************************************************************
2544 read a line from a file with possible \ continuation chars.
2545 Blanks at the start or end of a line are stripped.
2546 The string will be allocated if s2 is NULL
2547 ****************************************************************************/
2548 char *fgets_slash(char *s2,int maxlen,FILE *f)
2553 BOOL start_of_line = True;
2560 maxlen = MIN(maxlen,8);
2561 s = (char *)Realloc(s,maxlen);
2564 if (!s || maxlen < 2) return(NULL);
2568 while (len < maxlen-1)
2576 while (len > 0 && s[len-1] == ' ')
2580 if (len > 0 && s[len-1] == '\\')
2583 start_of_line = True;
2588 if (len <= 0 && !s2)
2590 return(len>0?s:NULL);
2595 start_of_line = False;
2599 if (!s2 && len > maxlen-3)
2602 s = (char *)Realloc(s,maxlen);
2603 if (!s) return(NULL);
2611 /****************************************************************************
2612 set the length of a file from a filedescriptor.
2613 Returns 0 on success, -1 on failure.
2614 ****************************************************************************/
2615 int set_filelen(int fd, long len)
2617 /* According to W. R. Stevens advanced UNIX prog. Pure 4.3 BSD cannot
2618 extend a file with ftruncate. Provide alternate implementation
2621 #if FTRUNCATE_CAN_EXTEND
2622 return ftruncate(fd, len);
2626 long currpos = lseek(fd, 0L, SEEK_CUR);
2630 /* Do an fstat to see if the file is longer than
2631 the requested size (call ftruncate),
2632 or shorter, in which case seek to len - 1 and write 1
2634 if(fstat(fd, &st)<0)
2638 if (S_ISFIFO(st.st_mode)) return 0;
2641 if(st.st_size == len)
2643 if(st.st_size > len)
2644 return ftruncate(fd, len);
2646 if(lseek(fd, len-1, SEEK_SET) != len -1)
2648 if(write(fd, &c, 1)!=1)
2650 /* Seek to where we were */
2651 lseek(fd, currpos, SEEK_SET);
2657 /****************************************************************************
2658 return the byte checksum of some data
2659 ****************************************************************************/
2660 int byte_checksum(char *buf,int len)
2662 unsigned char *p = (unsigned char *)buf;
2672 /****************************************************************************
2673 this is a version of setbuffer() for those machines that only have setvbuf
2674 ****************************************************************************/
2675 void setbuffer(FILE *f,char *buf,int bufsize)
2677 setvbuf(f,buf,_IOFBF,bufsize);
2682 /****************************************************************************
2683 parse out a directory name from a path name. Assumes dos style filenames.
2684 ****************************************************************************/
2685 char *dirname_dos(char *path,char *buf)
2687 char *p = strrchr(path,'\\');
2702 /****************************************************************************
2703 parse out a filename from a path name. Assumes dos style filenames.
2704 ****************************************************************************/
2705 static char *filename_dos(char *path,char *buf)
2707 char *p = strrchr(path,'\\');
2719 /****************************************************************************
2720 expand a pointer to be a particular size
2721 ****************************************************************************/
2722 void *Realloc(void *p,int size)
2728 DEBUG(5,("Realloc asked for 0 bytes\n"));
2733 ret = (void *)malloc(size);
2735 ret = (void *)realloc(p,size);
2738 DEBUG(0,("Memory allocation error: failed to expand to %d bytes\n",size));
2744 /****************************************************************************
2746 ****************************************************************************/
2747 char *strdup(char *s)
2750 if (!s) return(NULL);
2751 ret = (char *)malloc(strlen(s)+1);
2752 if (!ret) return(NULL);
2759 /****************************************************************************
2760 Signal handler for SIGPIPE (write on a disconnected socket)
2761 ****************************************************************************/
2764 DEBUG(0,("Probably got SIGPIPE\nExiting\n"));
2768 /****************************************************************************
2769 get my own name and IP
2770 ****************************************************************************/
2771 BOOL get_myname(char *my_name,struct in_addr *ip)
2778 /* get my host name */
2779 if (gethostname(hostname, MAXHOSTNAMELEN) == -1)
2781 DEBUG(0,("gethostname failed\n"));
2786 if ((hp = Get_Hostbyname(hostname)) == 0)
2788 DEBUG(0,( "Get_Hostbyname: Unknown host %s.\n",hostname));
2794 /* split off any parts after an initial . */
2795 char *p = strchr(hostname,'.');
2798 strcpy(my_name,hostname);
2802 putip((char *)ip,(char *)hp->h_addr);
2808 /****************************************************************************
2809 true if two IP addresses are equal
2810 ****************************************************************************/
2811 BOOL ip_equal(struct in_addr ip1,struct in_addr ip2)
2814 a1 = ntohl(ip1.s_addr);
2815 a2 = ntohl(ip2.s_addr);
2820 /****************************************************************************
2821 open a socket of the specified type, port and address for incoming data
2822 ****************************************************************************/
2823 int open_socket_in(int type, int port, int dlevel,uint32 socket_addr)
2826 struct sockaddr_in sock;
2830 /* get my host name */
2831 if (gethostname(host_name, MAXHOSTNAMELEN) == -1)
2832 { DEBUG(0,("gethostname failed\n")); return -1; }
2835 if ((hp = Get_Hostbyname(host_name)) == 0)
2837 DEBUG(0,( "Get_Hostbyname: Unknown host. %s\n",host_name));
2841 bzero((char *)&sock,sizeof(sock));
2842 memcpy((char *)&sock.sin_addr,(char *)hp->h_addr, hp->h_length);
2843 #if defined(__FreeBSD__) || defined(NETBSD) /* XXX not the right ifdef */
2844 sock.sin_len = sizeof(sock);
2846 sock.sin_port = htons( port );
2847 sock.sin_family = hp->h_addrtype;
2848 sock.sin_addr.s_addr = socket_addr;
2849 res = socket(hp->h_addrtype, type, 0);
2851 { DEBUG(0,("socket failed\n")); return -1; }
2855 setsockopt(res,SOL_SOCKET,SO_REUSEADDR,(char *)&one,sizeof(one));
2858 /* now we've got a socket - we need to bind it */
2859 if (bind(res, (struct sockaddr * ) &sock,sizeof(sock)) < 0)
2862 if (port == SMB_PORT || port == NMB_PORT)
2863 DEBUG(dlevel,("bind failed on port %d socket_addr=%x (%s)\n",
2864 port,socket_addr,strerror(errno)));
2867 if (dlevel > 0 && port < 1000)
2870 if (port >= 1000 && port < 9000)
2871 return(open_socket_in(type,port+1,dlevel,socket_addr));
2876 DEBUG(3,("bind succeeded on port %d\n",port));
2882 /****************************************************************************
2883 create an outgoing socket
2884 **************************************************************************/
2885 int open_socket_out(int type, struct in_addr *addr, int port ,int timeout)
2887 struct sockaddr_in sock_out;
2889 int connect_loop = 250; /* 250 milliseconds */
2890 int loops = (timeout * 1000) / connect_loop;
2892 /* create a socket to write to */
2893 res = socket(PF_INET, type, 0);
2895 { DEBUG(0,("socket error\n")); return -1; }
2897 if (type != SOCK_STREAM) return(res);
2899 bzero((char *)&sock_out,sizeof(sock_out));
2900 putip((char *)&sock_out.sin_addr,(char *)addr);
2902 sock_out.sin_port = htons( port );
2903 sock_out.sin_family = PF_INET;
2905 /* set it non-blocking */
2906 set_blocking(res,0);
2908 DEBUG(3,("Connecting to %s at port %d\n",inet_ntoa(*addr),port));
2910 /* and connect it to the destination */
2912 ret = connect(res,(struct sockaddr *)&sock_out,sizeof(sock_out));
2914 /* Some systems return EAGAIN when they mean EINPROGRESS */
2915 if (ret < 0 && (errno == EINPROGRESS || errno == EALREADY ||
2916 errno == EAGAIN) && loops--) {
2917 msleep(connect_loop);
2921 if (ret < 0 && (errno == EINPROGRESS || errno == EALREADY ||
2923 DEBUG(1,("timeout connecting to %s:%d\n",inet_ntoa(*addr),port));
2929 if (ret < 0 && errno == EISCONN) {
2936 DEBUG(1,("error connecting to %s:%d (%s)\n",
2937 inet_ntoa(*addr),port,strerror(errno)));
2941 /* set it blocking again */
2942 set_blocking(res,1);
2948 /****************************************************************************
2949 interpret a protocol description string, with a default
2950 ****************************************************************************/
2951 int interpret_protocol(char *str,int def)
2953 if (strequal(str,"NT1"))
2954 return(PROTOCOL_NT1);
2955 if (strequal(str,"LANMAN2"))
2956 return(PROTOCOL_LANMAN2);
2957 if (strequal(str,"LANMAN1"))
2958 return(PROTOCOL_LANMAN1);
2959 if (strequal(str,"CORE"))
2960 return(PROTOCOL_CORE);
2961 if (strequal(str,"COREPLUS"))
2962 return(PROTOCOL_COREPLUS);
2963 if (strequal(str,"CORE+"))
2964 return(PROTOCOL_COREPLUS);
2966 DEBUG(0,("Unrecognised protocol level %s\n",str));
2971 /****************************************************************************
2972 interpret a security level
2973 ****************************************************************************/
2974 int interpret_security(char *str,int def)
2976 if (strequal(str,"SERVER"))
2978 if (strequal(str,"USER"))
2980 if (strequal(str,"SHARE"))
2983 DEBUG(0,("Unrecognised security level %s\n",str));
2989 /****************************************************************************
2990 interpret an internet address or name into an IP address in 4 byte form
2991 ****************************************************************************/
2992 uint32 interpret_addr(char *str)
2997 BOOL pure_address = True;
2999 if (strcmp(str,"0.0.0.0") == 0) return(0);
3000 if (strcmp(str,"255.255.255.255") == 0) return(0xFFFFFFFF);
3002 for (i=0; pure_address && str[i]; i++)
3003 if (!(isdigit(str[i]) || str[i] == '.'))
3004 pure_address = False;
3006 /* if it's in the form of an IP address then get the lib to interpret it */
3008 res = inet_addr(str);
3010 /* otherwise assume it's a network name of some sort and use
3012 if ((hp = Get_Hostbyname(str)) == 0) {
3013 DEBUG(3,("Get_Hostbyname: Unknown host. %s\n",str));
3016 putip((char *)&res,(char *)hp->h_addr);
3019 if (res == (uint32)-1) return(0);
3024 /*******************************************************************
3025 a convenient addition to interpret_addr()
3026 ******************************************************************/
3027 struct in_addr *interpret_addr2(char *str)
3029 static struct in_addr ret;
3030 uint32 a = interpret_addr(str);
3035 /*******************************************************************
3036 check if an IP is the 0.0.0.0
3037 ******************************************************************/
3038 BOOL zero_ip(struct in_addr ip)
3041 putip((char *)&a,(char *)&ip);
3046 /*******************************************************************
3047 matchname - determine if host name matches IP address
3048 ******************************************************************/
3049 static BOOL matchname(char *remotehost,struct in_addr addr)
3054 if ((hp = Get_Hostbyname(remotehost)) == 0) {
3055 DEBUG(0,("Get_Hostbyname(%s): lookup failure", remotehost));
3060 * Make sure that gethostbyname() returns the "correct" host name.
3061 * Unfortunately, gethostbyname("localhost") sometimes yields
3062 * "localhost.domain". Since the latter host name comes from the
3063 * local DNS, we just have to trust it (all bets are off if the local
3064 * DNS is perverted). We always check the address list, though.
3067 if (strcasecmp(remotehost, hp->h_name)
3068 && strcasecmp(remotehost, "localhost")) {
3069 DEBUG(0,("host name/name mismatch: %s != %s",
3070 remotehost, hp->h_name));
3074 /* Look up the host address in the address list we just got. */
3075 for (i = 0; hp->h_addr_list[i]; i++) {
3076 if (memcmp(hp->h_addr_list[i], (caddr_t) & addr, sizeof(addr)) == 0)
3081 * The host name does not map to the original host address. Perhaps
3082 * someone has compromised a name server. More likely someone botched
3083 * it, but that could be dangerous, too.
3086 DEBUG(0,("host name/address mismatch: %s != %s",
3087 inet_ntoa(addr), hp->h_name));
3091 /*******************************************************************
3092 Reset the 'done' variables so after a client process is created
3093 from a fork call these calls will be re-done. This should be
3094 expanded if more variables need reseting.
3095 ******************************************************************/
3097 static BOOL global_client_name_done = False;
3098 static BOOL global_client_addr_done = False;
3100 void reset_globals_after_fork()
3102 global_client_name_done = False;
3103 global_client_addr_done = False;
3106 /*******************************************************************
3107 return the DNS name of the client
3108 ******************************************************************/
3109 char *client_name(void)
3113 struct sockaddr_in *sockin = (struct sockaddr_in *) (&sa);
3114 int length = sizeof(sa);
3115 static pstring name_buf;
3118 if (global_client_name_done)
3121 strcpy(name_buf,"UNKNOWN");
3123 if (getpeername(Client, &sa, &length) < 0) {
3124 DEBUG(0,("getpeername failed\n"));
3128 /* Look up the remote host name. */
3129 if ((hp = gethostbyaddr((char *) &sockin->sin_addr,
3130 sizeof(sockin->sin_addr),
3132 DEBUG(1,("Gethostbyaddr failed for %s\n",client_addr()));
3133 StrnCpy(name_buf,client_addr(),sizeof(name_buf) - 1);
3135 StrnCpy(name_buf,(char *)hp->h_name,sizeof(name_buf) - 1);
3136 if (!matchname(name_buf, sockin->sin_addr)) {
3137 DEBUG(0,("Matchname failed on %s %s\n",name_buf,client_addr()));
3138 strcpy(name_buf,"UNKNOWN");
3141 global_client_name_done = True;
3145 /*******************************************************************
3146 return the IP addr of the client as a string
3147 ******************************************************************/
3148 char *client_addr(void)
3152 struct sockaddr_in *sockin = (struct sockaddr_in *) (&sa);
3153 int length = sizeof(sa);
3154 static fstring addr_buf;
3156 if (global_client_addr_done)
3159 strcpy(addr_buf,"0.0.0.0");
3161 if (getpeername(Client, &sa, &length) < 0) {
3162 DEBUG(0,("getpeername failed\n"));
3166 strcpy(addr_buf,(char *)inet_ntoa(sockin->sin_addr));
3168 global_client_addr_done = True;
3172 /*******************************************************************
3173 sub strings with useful parameters
3174 ********************************************************************/
3175 void standard_sub_basic(char *s)
3177 if (!strchr(s,'%')) return;
3179 string_sub(s,"%R",remote_proto);
3180 string_sub(s,"%a",remote_arch);
3181 string_sub(s,"%m",remote_machine);
3182 string_sub(s,"%L",local_machine);
3184 if (!strchr(s,'%')) return;
3186 string_sub(s,"%v",VERSION);
3187 string_sub(s,"%h",myhostname);
3188 string_sub(s,"%U",sesssetup_user);
3190 if (!strchr(s,'%')) return;
3192 string_sub(s,"%I",client_addr());
3194 string_sub(s,"%M",client_name());
3195 string_sub(s,"%T",timestring());
3197 if (!strchr(s,'%')) return;
3201 sprintf(pidstr,"%d",(int)getpid());
3202 string_sub(s,"%d",pidstr);
3205 if (!strchr(s,'%')) return;
3208 struct passwd *pass = Get_Pwnam(sesssetup_user,False);
3210 string_sub(s,"%G",gidtoname(pass->pw_gid));
3216 /*******************************************************************
3217 are two IPs on the same subnet?
3218 ********************************************************************/
3219 BOOL same_net(struct in_addr ip1,struct in_addr ip2,struct in_addr mask)
3221 uint32 net1,net2,nmask;
3223 nmask = ntohl(mask.s_addr);
3224 net1 = ntohl(ip1.s_addr);
3225 net2 = ntohl(ip2.s_addr);
3227 return((net1 & nmask) == (net2 & nmask));
3231 /*******************************************************************
3232 write a string in unicoode format
3233 ********************************************************************/
3234 int PutUniCode(char *dst,char *src)
3238 dst[ret++] = src[0];
3247 /****************************************************************************
3248 a wrapper for gethostbyname() that tries with all lower and all upper case
3249 if the initial name fails
3250 ****************************************************************************/
3251 struct hostent *Get_Hostbyname(char *name)
3253 char *name2 = strdup(name);
3254 struct hostent *ret;
3258 DEBUG(0,("Memory allocation error in Get_Hostbyname! panic\n"));
3262 if (!isalnum(*name2))
3268 ret = sys_gethostbyname(name2);
3275 /* try with all lowercase */
3277 ret = sys_gethostbyname(name2);
3284 /* try with all uppercase */
3286 ret = sys_gethostbyname(name2);
3293 /* nothing works :-( */
3299 /****************************************************************************
3300 check if a process exists. Does this work on all unixes?
3301 ****************************************************************************/
3302 BOOL process_exists(int pid)
3306 sprintf(s,"/proc/%d",pid);
3307 return(directory_exist(s,NULL));
3310 static BOOL tested=False;
3311 static BOOL ok=False;
3315 sprintf(s,"/proc/%05d",(int)getpid());
3316 ok = file_exist(s,NULL);
3319 sprintf(s,"/proc/%05d",pid);
3320 return(file_exist(s,NULL));
3324 /* CGH 8/16/96 - added ESRCH test */
3325 return(pid == getpid() || kill(pid,0) == 0 || errno != ESRCH);
3330 /*******************************************************************
3331 turn a uid into a user name
3332 ********************************************************************/
3333 char *uidtoname(int uid)
3335 static char name[40];
3336 struct passwd *pass = getpwuid(uid);
3337 if (pass) return(pass->pw_name);
3338 sprintf(name,"%d",uid);
3342 /*******************************************************************
3343 turn a gid into a group name
3344 ********************************************************************/
3345 char *gidtoname(int gid)
3347 static char name[40];
3348 struct group *grp = getgrgid(gid);
3349 if (grp) return(grp->gr_name);
3350 sprintf(name,"%d",gid);
3354 /*******************************************************************
3356 ********************************************************************/
3357 void BlockSignals(BOOL block,int signum)
3360 int block_mask = sigmask(signum);
3361 static int oldmask = 0;
3363 oldmask = sigblock(block_mask);
3365 sigsetmask(oldmask);
3366 #elif defined(USE_SIGPROCMASK)
3369 sigaddset(&set,signum);
3370 sigprocmask(block?SIG_BLOCK:SIG_UNBLOCK,&set,NULL);
3375 /*******************************************************************
3376 my own panic function - not suitable for general use
3377 ********************************************************************/
3378 void ajt_panic(void)
3380 system("/usr/bin/X11/xedit -display ljus:0 /tmp/ERROR_FAULT");
3385 #define DIRECT direct
3387 #define DIRECT dirent
3390 /*******************************************************************
3391 a readdir wrapper which just returns the file name
3392 also return the inode number if requested
3393 ********************************************************************/
3394 char *readdirname(void *p)
3399 if (!p) return(NULL);
3401 ptr = (struct DIRECT *)readdir(p);
3402 if (!ptr) return(NULL);
3404 dname = ptr->d_name;
3407 if (telldir(p) < 0) return(NULL);
3411 /* this handles a broken compiler setup, causing a mixture
3412 of BSD and SYSV headers and libraries */
3414 static BOOL broken_readdir = False;
3415 if (!broken_readdir && !(*(dname)) && strequal("..",dname-2))
3417 DEBUG(0,("Your readdir() is broken. You have somehow mixed SYSV and BSD headers and libraries\n"));
3418 broken_readdir = True;
3428 unix_to_dos(buf, True);
3436 BOOL is_hidden_path(int snum, char *name)
3438 return is_in_path(name, lp_hide_files(snum));
3441 BOOL is_vetoed_name(int snum, char *name)
3443 return is_in_path(name, lp_veto_files(snum));
3446 BOOL is_in_path(char *name, char *namelist)
3449 char *nameptr = namelist;
3452 DEBUG(5, ("is_in_path: %s list: %s\n", name, namelist));
3454 /* if we have no list it's obviously not in the path */
3455 if((nameptr == NULL ) || (*nameptr == '\0'))
3457 DEBUG(5,("is_in_path: no name list. return False\n"));
3461 /* now, we need to find the names one by one and check them
3462 they can contain spaces and all sorts of stuff so we
3463 separate them with of all things '\' which can never be in a filename
3464 I could use "" but then I have to break them all out
3465 maybe such a routine exists somewhere?
3468 /* lkcl 03jul97 - the separator character used to be a '/'.
3469 i changed it to a '\', after examining the code, and seeing
3470 that unix_convert is called before check_path and dos_mode.
3471 unix_convert changes, in the path, all dos '\'s to unix '/'s.
3473 therefore, users might want to match against '/'s in the path,
3474 and therefore '\' must be used as the separator.
3476 the alternatives are:
3478 1) move all check_path and dos_mode calls to before the
3481 2) have a corresponding dos_convert call, which can be used
3482 in here to reverse '/'s into '\'s and vice-versa. users
3483 would specify the lp_veto_files and lp_hide_files parameters
3484 in dos mode path format ('\' for directory separator), with a
3485 list separator of '/', and they would be swapped inside this
3486 function, before making the search.
3492 if ( *nameptr == '\\' )
3494 /* cope with multiple (useless) \s) */
3498 /* find the next \ */
3499 if ((name_end = strchr(nameptr,'\\')) != NULL)
3504 /* look for a match. */
3505 if (mask_match(name, nameptr, case_sensitive, False))
3507 DEBUG(5,("is_in_path: mask match succeeded\n"));
3511 /* oops - the last check for a \ didn't find one. */
3512 if (name_end == NULL)
3514 DEBUG(5,("is_in_path: last name. failed\n"));
3518 /* next segment please */
3519 nameptr = name_end + 1;
3522 DEBUG(5,("is_in_path: not found\n"));
3527 /****************************************************************************
3528 routine to do file locking
3529 ****************************************************************************/
3530 BOOL fcntl_lock(int fd,int op,uint32 offset,uint32 count,int type)
3537 uint32 mask = 0xC0000000;
3539 /* make sure the count is reasonable, we might kill the lockd otherwise */
3542 /* the offset is often strange - remove 2 of its bits if either of
3543 the top two bits are set. Shift the top ones by two bits. This
3544 still allows OLE2 apps to operate, but should stop lockd from
3546 if ((offset & mask) != 0)
3547 offset = (offset & ~mask) | ((offset & mask) >> 2);
3549 uint32 mask = ((unsigned)1<<31);
3551 /* interpret negative counts as large numbers */
3555 /* no negative offsets */
3558 /* count + offset must be in range */
3559 while ((offset < 0 || (offset + count < 0)) && mask)
3567 DEBUG(5,("fcntl_lock %d %d %d %d %d\n",fd,op,(int)offset,(int)count,type));
3570 lock.l_whence = SEEK_SET;
3571 lock.l_start = (int)offset;
3572 lock.l_len = (int)count;
3577 ret = fcntl(fd,op,&lock);
3580 DEBUG(3,("fcntl lock gave errno %d (%s)\n",errno,strerror(errno)));
3586 (lock.l_type != F_UNLCK) &&
3587 (lock.l_pid != 0) &&
3588 (lock.l_pid != getpid()))
3590 DEBUG(3,("fd %d is locked by pid %d\n",fd,lock.l_pid));
3594 /* it must be not locked or locked by me */
3598 /* a lock set or unset */
3601 DEBUG(3,("lock failed at offset %d count %d op %d type %d (%s)\n",
3602 offset,count,op,type,strerror(errno)));
3604 /* perhaps it doesn't support this sort of locking?? */
3605 if (errno == EINVAL)
3607 DEBUG(3,("locking not supported? returning True\n"));
3614 /* everything went OK */
3615 DEBUG(5,("Lock call successful\n"));
3623 /*******************************************************************
3624 lock a file - returning a open file descriptor or -1 on failure
3625 The timeout is in seconds. 0 means no timeout
3626 ********************************************************************/
3627 int file_lock(char *name,int timeout)
3629 int fd = open(name,O_RDWR|O_CREAT,0666);
3631 if (fd < 0) return(-1);
3634 if (timeout) t = time(NULL);
3635 while (!timeout || (time(NULL)-t < timeout)) {
3636 if (fcntl_lock(fd,F_SETLK,0,1,F_WRLCK)) return(fd);
3637 msleep(LOCK_RETRY_TIMEOUT);
3645 /*******************************************************************
3646 unlock a file locked by file_lock
3647 ********************************************************************/
3648 void file_unlock(int fd)
3652 fcntl_lock(fd,F_SETLK,0,1,F_UNLCK);