client.c, clitar.c: rename process_tar to tar_process, prepare code
[nivanova/samba-autobuild/.git] / source3 / client / client.c
1 /*
2    Unix SMB/CIFS implementation.
3    SMB client
4    Copyright (C) Andrew Tridgell          1994-1998
5    Copyright (C) Simo Sorce               2001-2002
6    Copyright (C) Jelmer Vernooij          2003
7    Copyright (C) Gerald (Jerry) Carter    2004
8    Copyright (C) Jeremy Allison           1994-2007
9
10    This program is free software; you can redistribute it and/or modify
11    it under the terms of the GNU General Public License as published by
12    the Free Software Foundation; either version 3 of the License, or
13    (at your option) any later version.
14
15    This program is distributed in the hope that it will be useful,
16    but WITHOUT ANY WARRANTY; without even the implied warranty of
17    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
18    GNU General Public License for more details.
19
20    You should have received a copy of the GNU General Public License
21    along with this program.  If not, see <http://www.gnu.org/licenses/>.
22 */
23
24 #include "includes.h"
25 #include "system/filesys.h"
26 #include "popt_common.h"
27 #include "rpc_client/cli_pipe.h"
28 #include "client/client_proto.h"
29 #include "client/clitar_proto.h"
30 #include "../librpc/gen_ndr/ndr_srvsvc_c.h"
31 #include "../lib/util/select.h"
32 #include "system/readline.h"
33 #include "../libcli/smbreadline/smbreadline.h"
34 #include "../libcli/security/security.h"
35 #include "system/select.h"
36 #include "libsmb/libsmb.h"
37 #include "libsmb/clirap.h"
38 #include "trans2.h"
39 #include "libsmb/nmblib.h"
40 #include "include/ntioctl.h"
41 #include "../libcli/smb/smbXcli_base.h"
42
43 #ifndef REGISTER
44 #define REGISTER 0
45 #endif
46
47 extern int do_smb_browse(void); /* mDNS browsing */
48
49 extern bool override_logfile;
50
51 static int port = 0;
52 static char *service;
53 static char *desthost;
54 static bool grepable = false;
55 static char *cmdstr = NULL;
56 const char *cmd_ptr = NULL;
57
58 static int io_bufsize = 0; /* we use the default size */
59 static int io_timeout = (CLIENT_TIMEOUT/1000); /* Per operation timeout (in seconds). */
60
61 static int name_type = 0x20;
62 static int max_protocol = -1;
63
64 static int process_tok(char *tok);
65 static int cmd_help(void);
66
67 #define CREATE_ACCESS_READ READ_CONTROL_ACCESS
68
69 /* value for unused fid field in trans2 secondary request */
70 #define FID_UNUSED (0xFFFF)
71
72 time_t newer_than = 0;
73 static int archive_level = 0;
74
75 static bool translation = false;
76 static bool have_ip;
77
78 static bool prompt = true;
79
80 static bool recurse = false;
81 static bool showacls = false;
82 bool lowercase = false;
83 static bool backup_intent = false;
84
85 static struct sockaddr_storage dest_ss;
86 static char dest_ss_str[INET6_ADDRSTRLEN];
87
88 #define SEPARATORS " \t\n\r"
89
90 static bool abort_mget = true;
91
92 /* timing globals */
93 uint64_t get_total_size = 0;
94 unsigned int get_total_time_ms = 0;
95 static uint64_t put_total_size = 0;
96 static unsigned int put_total_time_ms = 0;
97
98 /* totals globals */
99 static double dir_total;
100
101 /* encrypted state. */
102 static bool smb_encrypt;
103
104 /* root cli_state connection */
105
106 struct cli_state *cli;
107
108 static char CLI_DIRSEP_CHAR = '\\';
109 static char CLI_DIRSEP_STR[] = { '\\', '\0' };
110
111 /* Authentication for client connections. */
112 struct user_auth_info *auth_info;
113
114 /* Accessor functions for directory paths. */
115 static char *fileselection;
116 static const char *client_get_fileselection(void)
117 {
118         if (fileselection) {
119                 return fileselection;
120         }
121         return "";
122 }
123
124 static const char *client_set_fileselection(const char *new_fs)
125 {
126         SAFE_FREE(fileselection);
127         if (new_fs) {
128                 fileselection = SMB_STRDUP(new_fs);
129         }
130         return client_get_fileselection();
131 }
132
133 static char *cwd;
134 static const char *client_get_cwd(void)
135 {
136         if (cwd) {
137                 return cwd;
138         }
139         return CLI_DIRSEP_STR;
140 }
141
142 static const char *client_set_cwd(const char *new_cwd)
143 {
144         SAFE_FREE(cwd);
145         if (new_cwd) {
146                 cwd = SMB_STRDUP(new_cwd);
147         }
148         return client_get_cwd();
149 }
150
151 static char *cur_dir;
152 const char *client_get_cur_dir(void)
153 {
154         if (cur_dir) {
155                 return cur_dir;
156         }
157         return CLI_DIRSEP_STR;
158 }
159
160 const char *client_set_cur_dir(const char *newdir)
161 {
162         SAFE_FREE(cur_dir);
163         if (newdir) {
164                 cur_dir = SMB_STRDUP(newdir);
165         }
166         return client_get_cur_dir();
167 }
168
169 /****************************************************************************
170  Put up a yes/no prompt.
171 ****************************************************************************/
172
173 static bool yesno(const char *p)
174 {
175         char ans[20];
176         printf("%s",p);
177
178         if (!fgets(ans,sizeof(ans)-1,stdin))
179                 return(False);
180
181         if (*ans == 'y' || *ans == 'Y')
182                 return(True);
183
184         return(False);
185 }
186
187 /****************************************************************************
188  Write to a local file with CR/LF->LF translation if appropriate. Return the
189  number taken from the buffer. This may not equal the number written.
190 ****************************************************************************/
191
192 static int writefile(int f, char *b, int n)
193 {
194         int i;
195
196         if (!translation) {
197                 return write(f,b,n);
198         }
199
200         i = 0;
201         while (i < n) {
202                 if (*b == '\r' && (i<(n-1)) && *(b+1) == '\n') {
203                         b++;i++;
204                 }
205                 if (write(f, b, 1) != 1) {
206                         break;
207                 }
208                 b++;
209                 i++;
210         }
211
212         return(i);
213 }
214
215 /****************************************************************************
216  Read from a file with LF->CR/LF translation if appropriate. Return the
217  number read. read approx n bytes.
218 ****************************************************************************/
219
220 static int readfile(uint8_t *b, int n, XFILE *f)
221 {
222         int i;
223         int c;
224
225         if (!translation)
226                 return x_fread(b,1,n,f);
227
228         i = 0;
229         while (i < (n - 1) && (i < BUFFER_SIZE)) {
230                 if ((c = x_getc(f)) == EOF) {
231                         break;
232                 }
233
234                 if (c == '\n') { /* change all LFs to CR/LF */
235                         b[i++] = '\r';
236                 }
237
238                 b[i++] = c;
239         }
240
241         return(i);
242 }
243
244 struct push_state {
245         XFILE *f;
246         off_t nread;
247 };
248
249 static size_t push_source(uint8_t *buf, size_t n, void *priv)
250 {
251         struct push_state *state = (struct push_state *)priv;
252         int result;
253
254         if (x_feof(state->f)) {
255                 return 0;
256         }
257
258         result = readfile(buf, n, state->f);
259         state->nread += result;
260         return result;
261 }
262
263 /****************************************************************************
264  Send a message.
265 ****************************************************************************/
266
267 static void send_message(const char *username)
268 {
269         char buf[1600];
270         NTSTATUS status;
271         int i;
272
273         d_printf("Type your message, ending it with a Control-D\n");
274
275         i = 0;
276         while (i<sizeof(buf)-2) {
277                 int c = fgetc(stdin);
278                 if (c == EOF) {
279                         break;
280                 }
281                 if (c == '\n') {
282                         buf[i++] = '\r';
283                 }
284                 buf[i++] = c;
285         }
286         buf[i] = '\0';
287
288         status = cli_message(cli, desthost, username, buf);
289         if (!NT_STATUS_IS_OK(status)) {
290                 d_fprintf(stderr, "cli_message returned %s\n",
291                           nt_errstr(status));
292         }
293 }
294
295 /****************************************************************************
296  Check the space on a device.
297 ****************************************************************************/
298
299 static int do_dskattr(void)
300 {
301         int total, bsize, avail;
302         struct cli_state *targetcli = NULL;
303         char *targetpath = NULL;
304         TALLOC_CTX *ctx = talloc_tos();
305         NTSTATUS status;
306
307         status = cli_resolve_path(ctx, "", auth_info, cli,
308                                   client_get_cur_dir(), &targetcli,
309                                   &targetpath);
310         if (!NT_STATUS_IS_OK(status)) {
311                 d_printf("Error in dskattr: %s\n", nt_errstr(status));
312                 return 1;
313         }
314
315         status = cli_dskattr(targetcli, &bsize, &total, &avail);
316         if (!NT_STATUS_IS_OK(status)) {
317                 d_printf("Error in dskattr: %s\n", nt_errstr(status));
318                 return 1;
319         }
320
321         d_printf("\n\t\t%d blocks of size %d. %d blocks available\n",
322                  total, bsize, avail);
323
324         return 0;
325 }
326
327 /****************************************************************************
328  Show cd/pwd.
329 ****************************************************************************/
330
331 static int cmd_pwd(void)
332 {
333         d_printf("Current directory is %s",service);
334         d_printf("%s\n",client_get_cur_dir());
335         return 0;
336 }
337
338 /****************************************************************************
339  Ensure name has correct directory separators.
340 ****************************************************************************/
341
342 static void normalize_name(char *newdir)
343 {
344         if (!(cli->requested_posix_capabilities & CIFS_UNIX_POSIX_PATHNAMES_CAP)) {
345                 string_replace(newdir,'/','\\');
346         }
347 }
348
349 /****************************************************************************
350  Change directory - inner section.
351 ****************************************************************************/
352
353 static int do_cd(const char *new_dir)
354 {
355         char *newdir = NULL;
356         char *saved_dir = NULL;
357         char *new_cd = NULL;
358         char *targetpath = NULL;
359         struct cli_state *targetcli = NULL;
360         SMB_STRUCT_STAT sbuf;
361         uint32 attributes;
362         int ret = 1;
363         TALLOC_CTX *ctx = talloc_stackframe();
364         NTSTATUS status;
365
366         newdir = talloc_strdup(ctx, new_dir);
367         if (!newdir) {
368                 TALLOC_FREE(ctx);
369                 return 1;
370         }
371
372         normalize_name(newdir);
373
374         /* Save the current directory in case the new directory is invalid */
375
376         saved_dir = talloc_strdup(ctx, client_get_cur_dir());
377         if (!saved_dir) {
378                 TALLOC_FREE(ctx);
379                 return 1;
380         }
381
382         if (*newdir == CLI_DIRSEP_CHAR) {
383                 client_set_cur_dir(newdir);
384                 new_cd = newdir;
385         } else {
386                 new_cd = talloc_asprintf(ctx, "%s%s",
387                                 client_get_cur_dir(),
388                                 newdir);
389                 if (!new_cd) {
390                         goto out;
391                 }
392         }
393
394         /* Ensure cur_dir ends in a DIRSEP */
395         if ((new_cd[0] != '\0') && (*(new_cd+strlen(new_cd)-1) != CLI_DIRSEP_CHAR)) {
396                 new_cd = talloc_asprintf_append(new_cd, "%s", CLI_DIRSEP_STR);
397                 if (!new_cd) {
398                         goto out;
399                 }
400         }
401         client_set_cur_dir(new_cd);
402
403         new_cd = clean_name(ctx, new_cd);
404         client_set_cur_dir(new_cd);
405
406         status = cli_resolve_path(ctx, "", auth_info, cli, new_cd,
407                                   &targetcli, &targetpath);
408         if (!NT_STATUS_IS_OK(status)) {
409                 d_printf("cd %s: %s\n", new_cd, nt_errstr(status));
410                 client_set_cur_dir(saved_dir);
411                 goto out;
412         }
413
414         if (strequal(targetpath,CLI_DIRSEP_STR )) {
415                 TALLOC_FREE(ctx);
416                 return 0;
417         }
418
419         /* Use a trans2_qpathinfo to test directories for modern servers.
420            Except Win9x doesn't support the qpathinfo_basic() call..... */
421
422         if (smbXcli_conn_protocol(targetcli->conn) > PROTOCOL_LANMAN2 && !targetcli->win95) {
423
424                 status = cli_qpathinfo_basic(targetcli, targetpath, &sbuf,
425                                              &attributes);
426                 if (!NT_STATUS_IS_OK(status)) {
427                         d_printf("cd %s: %s\n", new_cd, nt_errstr(status));
428                         client_set_cur_dir(saved_dir);
429                         goto out;
430                 }
431
432                 if (!(attributes & FILE_ATTRIBUTE_DIRECTORY)) {
433                         d_printf("cd %s: not a directory\n", new_cd);
434                         client_set_cur_dir(saved_dir);
435                         goto out;
436                 }
437         } else {
438
439                 targetpath = talloc_asprintf(ctx,
440                                 "%s%s",
441                                 targetpath,
442                                 CLI_DIRSEP_STR );
443                 if (!targetpath) {
444                         client_set_cur_dir(saved_dir);
445                         goto out;
446                 }
447                 targetpath = clean_name(ctx, targetpath);
448                 if (!targetpath) {
449                         client_set_cur_dir(saved_dir);
450                         goto out;
451                 }
452
453                 status = cli_chkpath(targetcli, targetpath);
454                 if (!NT_STATUS_IS_OK(status)) {
455                         d_printf("cd %s: %s\n", new_cd, nt_errstr(status));
456                         client_set_cur_dir(saved_dir);
457                         goto out;
458                 }
459         }
460
461         ret = 0;
462
463 out:
464
465         TALLOC_FREE(ctx);
466         return ret;
467 }
468
469 /****************************************************************************
470  Change directory.
471 ****************************************************************************/
472
473 static int cmd_cd(void)
474 {
475         char *buf = NULL;
476         int rc = 0;
477
478         if (next_token_talloc(talloc_tos(), &cmd_ptr, &buf,NULL)) {
479                 rc = do_cd(buf);
480         } else {
481                 d_printf("Current directory is %s\n",client_get_cur_dir());
482         }
483
484         return rc;
485 }
486
487 /****************************************************************************
488  Change directory.
489 ****************************************************************************/
490
491 static int cmd_cd_oneup(void)
492 {
493         return do_cd("..");
494 }
495
496 /*******************************************************************
497  Decide if a file should be operated on.
498 ********************************************************************/
499
500 static bool do_this_one(struct file_info *finfo)
501 {
502         if (!finfo->name) {
503                 return false;
504         }
505
506         if (finfo->mode & FILE_ATTRIBUTE_DIRECTORY) {
507                 return true;
508         }
509
510         if (*client_get_fileselection() &&
511             !mask_match(finfo->name,client_get_fileselection(),false)) {
512                 DEBUG(3,("mask_match %s failed\n", finfo->name));
513                 return false;
514         }
515
516         if (newer_than && finfo->mtime_ts.tv_sec < newer_than) {
517                 DEBUG(3,("newer_than %s failed\n", finfo->name));
518                 return false;
519         }
520
521         if ((archive_level==1 || archive_level==2) && !(finfo->mode & FILE_ATTRIBUTE_ARCHIVE)) {
522                 DEBUG(3,("archive %s failed\n", finfo->name));
523                 return false;
524         }
525
526         return true;
527 }
528
529 /****************************************************************************
530  Display info about a file.
531 ****************************************************************************/
532
533 static NTSTATUS display_finfo(struct cli_state *cli_state, struct file_info *finfo,
534                           const char *dir)
535 {
536         time_t t;
537         TALLOC_CTX *ctx = talloc_tos();
538         NTSTATUS status = NT_STATUS_OK;
539
540         if (!do_this_one(finfo)) {
541                 return NT_STATUS_OK;
542         }
543
544         t = finfo->mtime_ts.tv_sec; /* the time is assumed to be passed as GMT */
545         if (!showacls) {
546                 d_printf("  %-30s%7.7s %8.0f  %s",
547                          finfo->name,
548                          attrib_string(talloc_tos(), finfo->mode),
549                         (double)finfo->size,
550                         time_to_asc(t));
551                 dir_total += finfo->size;
552         } else {
553                 char *afname = NULL;
554                 uint16_t fnum;
555
556                 /* skip if this is . or .. */
557                 if ( strequal(finfo->name,"..") || strequal(finfo->name,".") )
558                         return NT_STATUS_OK;
559                 /* create absolute filename for cli_ntcreate() FIXME */
560                 afname = talloc_asprintf(ctx,
561                                         "%s%s%s",
562                                         dir,
563                                         CLI_DIRSEP_STR,
564                                         finfo->name);
565                 if (!afname) {
566                         return NT_STATUS_NO_MEMORY;
567                 }
568                 /* print file meta date header */
569                 d_printf( "FILENAME:%s\n", finfo->name);
570                 d_printf( "MODE:%s\n", attrib_string(talloc_tos(), finfo->mode));
571                 d_printf( "SIZE:%.0f\n", (double)finfo->size);
572                 d_printf( "MTIME:%s", time_to_asc(t));
573                 status = cli_ntcreate(cli_state, afname, 0,
574                                       CREATE_ACCESS_READ, 0,
575                                       FILE_SHARE_READ|FILE_SHARE_WRITE,
576                                       FILE_OPEN, 0x0, 0x0, &fnum);
577                 if (!NT_STATUS_IS_OK(status)) {
578                         DEBUG( 0, ("display_finfo() Failed to open %s: %s\n",
579                                    afname, nt_errstr(status)));
580                 } else {
581                         struct security_descriptor *sd = NULL;
582                         status = cli_query_secdesc(cli_state, fnum,
583                                                    ctx, &sd);
584                         if (!NT_STATUS_IS_OK(status)) {
585                                 DEBUG( 0, ("display_finfo() failed to "
586                                            "get security descriptor: %s",
587                                            nt_errstr(status)));
588                         } else {
589                                 display_sec_desc(sd);
590                         }
591                         TALLOC_FREE(sd);
592                 }
593                 TALLOC_FREE(afname);
594         }
595         return status;
596 }
597
598 /****************************************************************************
599  Accumulate size of a file.
600 ****************************************************************************/
601
602 static NTSTATUS do_du(struct cli_state *cli_state, struct file_info *finfo,
603                   const char *dir)
604 {
605         if (do_this_one(finfo)) {
606                 dir_total += finfo->size;
607         }
608         return NT_STATUS_OK;
609 }
610
611 static bool do_list_recurse;
612 static bool do_list_dirs;
613 static char *do_list_queue = 0;
614 static long do_list_queue_size = 0;
615 static long do_list_queue_start = 0;
616 static long do_list_queue_end = 0;
617 static NTSTATUS (*do_list_fn)(struct cli_state *cli_state, struct file_info *,
618                           const char *dir);
619
620 /****************************************************************************
621  Functions for do_list_queue.
622 ****************************************************************************/
623
624 /*
625  * The do_list_queue is a NUL-separated list of strings stored in a
626  * char*.  Since this is a FIFO, we keep track of the beginning and
627  * ending locations of the data in the queue.  When we overflow, we
628  * double the size of the char*.  When the start of the data passes
629  * the midpoint, we move everything back.  This is logically more
630  * complex than a linked list, but easier from a memory management
631  * angle.  In any memory error condition, do_list_queue is reset.
632  * Functions check to ensure that do_list_queue is non-NULL before
633  * accessing it.
634  */
635
636 static void reset_do_list_queue(void)
637 {
638         SAFE_FREE(do_list_queue);
639         do_list_queue_size = 0;
640         do_list_queue_start = 0;
641         do_list_queue_end = 0;
642 }
643
644 static void init_do_list_queue(void)
645 {
646         reset_do_list_queue();
647         do_list_queue_size = 1024;
648         do_list_queue = (char *)SMB_MALLOC(do_list_queue_size);
649         if (do_list_queue == 0) {
650                 d_printf("malloc fail for size %d\n",
651                          (int)do_list_queue_size);
652                 reset_do_list_queue();
653         } else {
654                 memset(do_list_queue, 0, do_list_queue_size);
655         }
656 }
657
658 static void adjust_do_list_queue(void)
659 {
660         /*
661          * If the starting point of the queue is more than half way through,
662          * move everything toward the beginning.
663          */
664
665         if (do_list_queue == NULL) {
666                 DEBUG(4,("do_list_queue is empty\n"));
667                 do_list_queue_start = do_list_queue_end = 0;
668                 return;
669         }
670
671         if (do_list_queue_start == do_list_queue_end) {
672                 DEBUG(4,("do_list_queue is empty\n"));
673                 do_list_queue_start = do_list_queue_end = 0;
674                 *do_list_queue = '\0';
675         } else if (do_list_queue_start > (do_list_queue_size / 2)) {
676                 DEBUG(4,("sliding do_list_queue backward\n"));
677                 memmove(do_list_queue,
678                         do_list_queue + do_list_queue_start,
679                         do_list_queue_end - do_list_queue_start);
680                 do_list_queue_end -= do_list_queue_start;
681                 do_list_queue_start = 0;
682         }
683 }
684
685 static void add_to_do_list_queue(const char *entry)
686 {
687         long new_end = do_list_queue_end + ((long)strlen(entry)) + 1;
688         while (new_end > do_list_queue_size) {
689                 do_list_queue_size *= 2;
690                 DEBUG(4,("enlarging do_list_queue to %d\n",
691                          (int)do_list_queue_size));
692                 do_list_queue = (char *)SMB_REALLOC(do_list_queue, do_list_queue_size);
693                 if (! do_list_queue) {
694                         d_printf("failure enlarging do_list_queue to %d bytes\n",
695                                  (int)do_list_queue_size);
696                         reset_do_list_queue();
697                 } else {
698                         memset(do_list_queue + do_list_queue_size / 2,
699                                0, do_list_queue_size / 2);
700                 }
701         }
702         if (do_list_queue) {
703                 strlcpy_base(do_list_queue + do_list_queue_end,
704                                  entry, do_list_queue, do_list_queue_size);
705                 do_list_queue_end = new_end;
706                 DEBUG(4,("added %s to do_list_queue (start=%d, end=%d)\n",
707                          entry, (int)do_list_queue_start, (int)do_list_queue_end));
708         }
709 }
710
711 static char *do_list_queue_head(void)
712 {
713         return do_list_queue + do_list_queue_start;
714 }
715
716 static void remove_do_list_queue_head(void)
717 {
718         if (do_list_queue_end > do_list_queue_start) {
719                 do_list_queue_start += strlen(do_list_queue_head()) + 1;
720                 adjust_do_list_queue();
721                 DEBUG(4,("removed head of do_list_queue (start=%d, end=%d)\n",
722                          (int)do_list_queue_start, (int)do_list_queue_end));
723         }
724 }
725
726 static int do_list_queue_empty(void)
727 {
728         return (! (do_list_queue && *do_list_queue));
729 }
730
731 /****************************************************************************
732  A helper for do_list.
733 ****************************************************************************/
734
735 static NTSTATUS do_list_helper(const char *mntpoint, struct file_info *f,
736                            const char *mask, void *state)
737 {
738         struct cli_state *cli_state = (struct cli_state *)state;
739         TALLOC_CTX *ctx = talloc_tos();
740         char *dir = NULL;
741         char *dir_end = NULL;
742         NTSTATUS status = NT_STATUS_OK;
743
744         /* Work out the directory. */
745         dir = talloc_strdup(ctx, mask);
746         if (!dir) {
747                 return NT_STATUS_NO_MEMORY;
748         }
749         if ((dir_end = strrchr(dir, CLI_DIRSEP_CHAR)) != NULL) {
750                 *dir_end = '\0';
751         }
752
753         if (f->mode & FILE_ATTRIBUTE_DIRECTORY) {
754                 if (do_list_dirs && do_this_one(f)) {
755                         status = do_list_fn(cli_state, f, dir);
756                         if (!NT_STATUS_IS_OK(status)) {
757                                 return status;
758                         }
759                 }
760                 if (do_list_recurse &&
761                     f->name &&
762                     !strequal(f->name,".") &&
763                     !strequal(f->name,"..")) {
764                         char *mask2 = NULL;
765                         char *p = NULL;
766
767                         if (!f->name[0]) {
768                                 d_printf("Empty dir name returned. Possible server misconfiguration.\n");
769                                 TALLOC_FREE(dir);
770                                 return NT_STATUS_UNSUCCESSFUL;
771                         }
772
773                         mask2 = talloc_asprintf(ctx,
774                                         "%s%s",
775                                         mntpoint,
776                                         mask);
777                         if (!mask2) {
778                                 TALLOC_FREE(dir);
779                                 return NT_STATUS_NO_MEMORY;
780                         }
781                         p = strrchr_m(mask2,CLI_DIRSEP_CHAR);
782                         if (p) {
783                                 p[1] = 0;
784                         } else {
785                                 mask2[0] = '\0';
786                         }
787                         mask2 = talloc_asprintf_append(mask2,
788                                         "%s%s*",
789                                         f->name,
790                                         CLI_DIRSEP_STR);
791                         if (!mask2) {
792                                 TALLOC_FREE(dir);
793                                 return NT_STATUS_NO_MEMORY;
794                         }
795                         add_to_do_list_queue(mask2);
796                         TALLOC_FREE(mask2);
797                 }
798                 TALLOC_FREE(dir);
799                 return NT_STATUS_OK;
800         }
801
802         if (do_this_one(f)) {
803                 status = do_list_fn(cli_state, f, dir);
804         }
805         TALLOC_FREE(dir);
806         return status;
807 }
808
809 /****************************************************************************
810  A wrapper around cli_list that adds recursion.
811 ****************************************************************************/
812
813 NTSTATUS do_list(const char *mask,
814                         uint16 attribute,
815                         NTSTATUS (*fn)(struct cli_state *cli_state, struct file_info *,
816                                    const char *dir),
817                         bool rec,
818                         bool dirs)
819 {
820         static int in_do_list = 0;
821         TALLOC_CTX *ctx = talloc_tos();
822         struct cli_state *targetcli = NULL;
823         char *targetpath = NULL;
824         NTSTATUS ret_status = NT_STATUS_OK;
825         NTSTATUS status = NT_STATUS_OK;
826
827         if (in_do_list && rec) {
828                 fprintf(stderr, "INTERNAL ERROR: do_list called recursively when the recursive flag is true\n");
829                 exit(1);
830         }
831
832         in_do_list = 1;
833
834         do_list_recurse = rec;
835         do_list_dirs = dirs;
836         do_list_fn = fn;
837
838         if (rec) {
839                 init_do_list_queue();
840                 add_to_do_list_queue(mask);
841
842                 while (!do_list_queue_empty()) {
843                         /*
844                          * Need to copy head so that it doesn't become
845                          * invalid inside the call to cli_list.  This
846                          * would happen if the list were expanded
847                          * during the call.
848                          * Fix from E. Jay Berkenbilt (ejb@ql.org)
849                          */
850                         char *head = talloc_strdup(ctx, do_list_queue_head());
851
852                         if (!head) {
853                                 return NT_STATUS_NO_MEMORY;
854                         }
855
856                         /* check for dfs */
857
858                         status = cli_resolve_path(ctx, "", auth_info, cli,
859                                                   head, &targetcli,
860                                                   &targetpath);
861                         if (!NT_STATUS_IS_OK(status)) {
862                                 d_printf("do_list: [%s] %s\n", head,
863                                          nt_errstr(status));
864                                 remove_do_list_queue_head();
865                                 continue;
866                         }
867
868                         status = cli_list(targetcli, targetpath, attribute,
869                                  do_list_helper, targetcli);
870                         if (!NT_STATUS_IS_OK(status)) {
871                                 d_printf("%s listing %s\n",
872                                          nt_errstr(status), targetpath);
873                                 ret_status = status;
874                         }
875                         remove_do_list_queue_head();
876                         if ((! do_list_queue_empty()) && (fn == display_finfo)) {
877                                 char *next_file = do_list_queue_head();
878                                 char *save_ch = 0;
879                                 if ((strlen(next_file) >= 2) &&
880                                     (next_file[strlen(next_file) - 1] == '*') &&
881                                     (next_file[strlen(next_file) - 2] == CLI_DIRSEP_CHAR)) {
882                                         save_ch = next_file +
883                                                 strlen(next_file) - 2;
884                                         *save_ch = '\0';
885                                         if (showacls) {
886                                                 /* cwd is only used if showacls is on */
887                                                 client_set_cwd(next_file);
888                                         }
889                                 }
890                                 if (!showacls) /* don't disturbe the showacls output */
891                                         d_printf("\n%s\n",next_file);
892                                 if (save_ch) {
893                                         *save_ch = CLI_DIRSEP_CHAR;
894                                 }
895                         }
896                         TALLOC_FREE(head);
897                         TALLOC_FREE(targetpath);
898                 }
899         } else {
900                 /* check for dfs */
901                 status = cli_resolve_path(ctx, "", auth_info, cli, mask,
902                                           &targetcli, &targetpath);
903                 if (NT_STATUS_IS_OK(status)) {
904                         status = cli_list(targetcli, targetpath, attribute,
905                                           do_list_helper, targetcli);
906                         if (!NT_STATUS_IS_OK(status)) {
907                                 d_printf("%s listing %s\n",
908                                          nt_errstr(status), targetpath);
909                                 ret_status = status;
910                         }
911                         TALLOC_FREE(targetpath);
912                 } else {
913                         d_printf("do_list: [%s] %s\n", mask, nt_errstr(status));
914                         ret_status = status;
915                 }
916         }
917
918         in_do_list = 0;
919         reset_do_list_queue();
920         return ret_status;
921 }
922
923 /****************************************************************************
924  Get a directory listing.
925 ****************************************************************************/
926
927 static int cmd_dir(void)
928 {
929         TALLOC_CTX *ctx = talloc_tos();
930         uint16 attribute = FILE_ATTRIBUTE_DIRECTORY | FILE_ATTRIBUTE_SYSTEM | FILE_ATTRIBUTE_HIDDEN;
931         char *mask = NULL;
932         char *buf = NULL;
933         int rc = 1;
934         NTSTATUS status;
935
936         dir_total = 0;
937         mask = talloc_strdup(ctx, client_get_cur_dir());
938         if (!mask) {
939                 return 1;
940         }
941
942         if (next_token_talloc(ctx, &cmd_ptr,&buf,NULL)) {
943                 normalize_name(buf);
944                 if (*buf == CLI_DIRSEP_CHAR) {
945                         mask = talloc_strdup(ctx, buf);
946                 } else {
947                         mask = talloc_asprintf_append(mask, "%s", buf);
948                 }
949         } else {
950                 mask = talloc_asprintf_append(mask, "*");
951         }
952         if (!mask) {
953                 return 1;
954         }
955
956         if (showacls) {
957                 /* cwd is only used if showacls is on */
958                 client_set_cwd(client_get_cur_dir());
959         }
960
961         status = do_list(mask, attribute, display_finfo, recurse, true);
962         if (!NT_STATUS_IS_OK(status)) {
963                 return 1;
964         }
965
966         rc = do_dskattr();
967
968         DEBUG(3, ("Total bytes listed: %.0f\n", dir_total));
969
970         return rc;
971 }
972
973 /****************************************************************************
974  Get a directory listing.
975 ****************************************************************************/
976
977 static int cmd_du(void)
978 {
979         TALLOC_CTX *ctx = talloc_tos();
980         uint16 attribute = FILE_ATTRIBUTE_DIRECTORY | FILE_ATTRIBUTE_SYSTEM | FILE_ATTRIBUTE_HIDDEN;
981         char *mask = NULL;
982         char *buf = NULL;
983         NTSTATUS status;
984         int rc = 1;
985
986         dir_total = 0;
987         mask = talloc_strdup(ctx, client_get_cur_dir());
988         if (!mask) {
989                 return 1;
990         }
991         if ((mask[0] != '\0') && (mask[strlen(mask)-1]!=CLI_DIRSEP_CHAR)) {
992                 mask = talloc_asprintf_append(mask, "%s", CLI_DIRSEP_STR);
993                 if (!mask) {
994                         return 1;
995                 }
996         }
997
998         if (next_token_talloc(ctx, &cmd_ptr,&buf,NULL)) {
999                 normalize_name(buf);
1000                 if (*buf == CLI_DIRSEP_CHAR) {
1001                         mask = talloc_strdup(ctx, buf);
1002                 } else {
1003                         mask = talloc_asprintf_append(mask, "%s", buf);
1004                 }
1005         } else {
1006                 mask = talloc_strdup(ctx, "*");
1007         }
1008
1009         status = do_list(mask, attribute, do_du, recurse, true);
1010         if (!NT_STATUS_IS_OK(status)) {
1011                 return 1;
1012         }
1013
1014         rc = do_dskattr();
1015
1016         d_printf("Total number of bytes: %.0f\n", dir_total);
1017
1018         return rc;
1019 }
1020
1021 static int cmd_echo(void)
1022 {
1023         TALLOC_CTX *ctx = talloc_tos();
1024         char *num;
1025         char *data;
1026         NTSTATUS status;
1027
1028         if (!next_token_talloc(ctx, &cmd_ptr, &num, NULL)
1029             || !next_token_talloc(ctx, &cmd_ptr, &data, NULL)) {
1030                 d_printf("echo <num> <data>\n");
1031                 return 1;
1032         }
1033
1034         status = cli_echo(cli, atoi(num), data_blob_const(data, strlen(data)));
1035
1036         if (!NT_STATUS_IS_OK(status)) {
1037                 d_printf("echo failed: %s\n", nt_errstr(status));
1038                 return 1;
1039         }
1040
1041         return 0;
1042 }
1043
1044 /****************************************************************************
1045  Get a file from rname to lname
1046 ****************************************************************************/
1047
1048 static NTSTATUS writefile_sink(char *buf, size_t n, void *priv)
1049 {
1050         int *pfd = (int *)priv;
1051         if (writefile(*pfd, buf, n) == -1) {
1052                 return map_nt_error_from_unix(errno);
1053         }
1054         return NT_STATUS_OK;
1055 }
1056
1057 static int do_get(const char *rname, const char *lname_in, bool reget)
1058 {
1059         TALLOC_CTX *ctx = talloc_tos();
1060         int handle = 0;
1061         uint16_t fnum;
1062         bool newhandle = false;
1063         struct timespec tp_start;
1064         uint16 attr;
1065         off_t size;
1066         off_t start = 0;
1067         off_t nread = 0;
1068         int rc = 0;
1069         struct cli_state *targetcli = NULL;
1070         char *targetname = NULL;
1071         char *lname = NULL;
1072         NTSTATUS status;
1073
1074         lname = talloc_strdup(ctx, lname_in);
1075         if (!lname) {
1076                 return 1;
1077         }
1078
1079         if (lowercase) {
1080                 if (!strlower_m(lname)) {
1081                         d_printf("strlower_m %s failed\n", lname);
1082                         return 1;
1083                 }
1084         }
1085
1086         status = cli_resolve_path(ctx, "", auth_info, cli, rname, &targetcli,
1087                                   &targetname);
1088         if (!NT_STATUS_IS_OK(status)) {
1089                 d_printf("Failed to open %s: %s\n", rname, nt_errstr(status));
1090                 return 1;
1091         }
1092
1093         clock_gettime_mono(&tp_start);
1094
1095         status = cli_open(targetcli, targetname, O_RDONLY, DENY_NONE, &fnum);
1096         if (!NT_STATUS_IS_OK(status)) {
1097                 d_printf("%s opening remote file %s\n", nt_errstr(status),
1098                          rname);
1099                 return 1;
1100         }
1101
1102         if(!strcmp(lname,"-")) {
1103                 handle = fileno(stdout);
1104         } else {
1105                 if (reget) {
1106                         handle = open(lname, O_WRONLY|O_CREAT, 0644);
1107                         if (handle >= 0) {
1108                                 start = lseek(handle, 0, SEEK_END);
1109                                 if (start == -1) {
1110                                         d_printf("Error seeking local file\n");
1111                                         return 1;
1112                                 }
1113                         }
1114                 } else {
1115                         handle = open(lname, O_WRONLY|O_CREAT|O_TRUNC, 0644);
1116                 }
1117                 newhandle = true;
1118         }
1119         if (handle < 0) {
1120                 d_printf("Error opening local file %s\n",lname);
1121                 return 1;
1122         }
1123
1124
1125         status = cli_qfileinfo_basic(targetcli, fnum, &attr, &size, NULL, NULL,
1126                                      NULL, NULL, NULL);
1127         if (!NT_STATUS_IS_OK(status)) {
1128                 status = cli_getattrE(targetcli, fnum, &attr, &size, NULL, NULL,
1129                                       NULL);
1130                 if(!NT_STATUS_IS_OK(status)) {
1131                         d_printf("getattrib: %s\n", nt_errstr(status));
1132                         return 1;
1133                 }
1134         }
1135
1136         DEBUG(1,("getting file %s of size %.0f as %s ",
1137                  rname, (double)size, lname));
1138
1139         status = cli_pull(targetcli, fnum, start, size, io_bufsize,
1140                           writefile_sink, (void *)&handle, &nread);
1141         if (!NT_STATUS_IS_OK(status)) {
1142                 d_fprintf(stderr, "parallel_read returned %s\n",
1143                           nt_errstr(status));
1144                 cli_close(targetcli, fnum);
1145                 return 1;
1146         }
1147
1148         status = cli_close(targetcli, fnum);
1149         if (!NT_STATUS_IS_OK(status)) {
1150                 d_printf("Error %s closing remote file\n", nt_errstr(status));
1151                 rc = 1;
1152         }
1153
1154         if (newhandle) {
1155                 close(handle);
1156         }
1157
1158         if (archive_level >= 2 && (attr & FILE_ATTRIBUTE_ARCHIVE)) {
1159                 cli_setatr(cli, rname, attr & ~(uint16)FILE_ATTRIBUTE_ARCHIVE, 0);
1160         }
1161
1162         {
1163                 struct timespec tp_end;
1164                 int this_time;
1165
1166                 clock_gettime_mono(&tp_end);
1167                 this_time = nsec_time_diff(&tp_end,&tp_start)/1000000;
1168                 get_total_time_ms += this_time;
1169                 get_total_size += nread;
1170
1171                 DEBUG(1,("(%3.1f KiloBytes/sec) (average %3.1f KiloBytes/sec)\n",
1172                          nread / (1.024*this_time + 1.0e-4),
1173                          get_total_size / (1.024*get_total_time_ms)));
1174         }
1175
1176         TALLOC_FREE(targetname);
1177         return rc;
1178 }
1179
1180 /****************************************************************************
1181  Get a file.
1182 ****************************************************************************/
1183
1184 static int cmd_get(void)
1185 {
1186         TALLOC_CTX *ctx = talloc_tos();
1187         char *lname = NULL;
1188         char *rname = NULL;
1189         char *fname = NULL;
1190
1191         rname = talloc_strdup(ctx, client_get_cur_dir());
1192         if (!rname) {
1193                 return 1;
1194         }
1195
1196         if (!next_token_talloc(ctx, &cmd_ptr,&fname,NULL)) {
1197                 d_printf("get <filename> [localname]\n");
1198                 return 1;
1199         }
1200         rname = talloc_asprintf_append(rname, "%s", fname);
1201         if (!rname) {
1202                 return 1;
1203         }
1204         rname = clean_name(ctx, rname);
1205         if (!rname) {
1206                 return 1;
1207         }
1208
1209         next_token_talloc(ctx, &cmd_ptr,&lname,NULL);
1210         if (!lname) {
1211                 lname = fname;
1212         }
1213
1214         return do_get(rname, lname, false);
1215 }
1216
1217 /****************************************************************************
1218  Do an mget operation on one file.
1219 ****************************************************************************/
1220
1221 static NTSTATUS do_mget(struct cli_state *cli_state, struct file_info *finfo,
1222                     const char *dir)
1223 {
1224         TALLOC_CTX *ctx = talloc_tos();
1225         NTSTATUS status = NT_STATUS_OK;
1226         char *rname = NULL;
1227         char *quest = NULL;
1228         char *saved_curdir = NULL;
1229         char *mget_mask = NULL;
1230         char *new_cd = NULL;
1231
1232         if (!finfo->name) {
1233                 return NT_STATUS_OK;
1234         }
1235
1236         if (strequal(finfo->name,".") || strequal(finfo->name,".."))
1237                 return NT_STATUS_OK;
1238
1239         if (abort_mget) {
1240                 d_printf("mget aborted\n");
1241                 return NT_STATUS_UNSUCCESSFUL;
1242         }
1243
1244         if (finfo->mode & FILE_ATTRIBUTE_DIRECTORY) {
1245                 if (asprintf(&quest,
1246                          "Get directory %s? ",finfo->name) < 0) {
1247                         return NT_STATUS_NO_MEMORY;
1248                 }
1249         } else {
1250                 if (asprintf(&quest,
1251                          "Get file %s? ",finfo->name) < 0) {
1252                         return NT_STATUS_NO_MEMORY;
1253                 }
1254         }
1255
1256         if (prompt && !yesno(quest)) {
1257                 SAFE_FREE(quest);
1258                 return NT_STATUS_OK;
1259         }
1260         SAFE_FREE(quest);
1261
1262         if (!(finfo->mode & FILE_ATTRIBUTE_DIRECTORY)) {
1263                 rname = talloc_asprintf(ctx,
1264                                 "%s%s",
1265                                 client_get_cur_dir(),
1266                                 finfo->name);
1267                 if (!rname) {
1268                         return NT_STATUS_NO_MEMORY;
1269                 }
1270                 do_get(rname, finfo->name, false);
1271                 TALLOC_FREE(rname);
1272                 return NT_STATUS_OK;
1273         }
1274
1275         /* handle directories */
1276         saved_curdir = talloc_strdup(ctx, client_get_cur_dir());
1277         if (!saved_curdir) {
1278                 return NT_STATUS_NO_MEMORY;
1279         }
1280
1281         new_cd = talloc_asprintf(ctx,
1282                                 "%s%s%s",
1283                                 client_get_cur_dir(),
1284                                 finfo->name,
1285                                 CLI_DIRSEP_STR);
1286         if (!new_cd) {
1287                 return NT_STATUS_NO_MEMORY;
1288         }
1289         client_set_cur_dir(new_cd);
1290
1291         string_replace(finfo->name,'\\','/');
1292         if (lowercase) {
1293                 if (!strlower_m(finfo->name)) {
1294                         return NT_STATUS_INVALID_PARAMETER;
1295                 }
1296         }
1297
1298         if (!directory_exist(finfo->name) &&
1299             mkdir(finfo->name,0777) != 0) {
1300                 d_printf("failed to create directory %s\n",finfo->name);
1301                 client_set_cur_dir(saved_curdir);
1302                 return map_nt_error_from_unix(errno);
1303         }
1304
1305         if (chdir(finfo->name) != 0) {
1306                 d_printf("failed to chdir to directory %s\n",finfo->name);
1307                 client_set_cur_dir(saved_curdir);
1308                 return map_nt_error_from_unix(errno);
1309         }
1310
1311         mget_mask = talloc_asprintf(ctx,
1312                         "%s*",
1313                         client_get_cur_dir());
1314
1315         if (!mget_mask) {
1316                 return NT_STATUS_NO_MEMORY;
1317         }
1318
1319         status = do_list(mget_mask,
1320                          (FILE_ATTRIBUTE_SYSTEM
1321                           | FILE_ATTRIBUTE_HIDDEN
1322                           | FILE_ATTRIBUTE_DIRECTORY),
1323                          do_mget, false, true);
1324         if (!NT_STATUS_IS_OK(status)
1325          && !NT_STATUS_EQUAL(status, NT_STATUS_ACCESS_DENIED)) {
1326                 /*
1327                  * Ignore access denied errors to ensure all permitted files are
1328                  * pulled down.
1329                  */
1330                 return status;
1331         }
1332
1333         if (chdir("..") == -1) {
1334                 d_printf("do_mget: failed to chdir to .. (error %s)\n",
1335                         strerror(errno) );
1336                 return map_nt_error_from_unix(errno);
1337         }
1338         client_set_cur_dir(saved_curdir);
1339         TALLOC_FREE(mget_mask);
1340         TALLOC_FREE(saved_curdir);
1341         TALLOC_FREE(new_cd);
1342         return NT_STATUS_OK;
1343 }
1344
1345 /****************************************************************************
1346  View the file using the pager.
1347 ****************************************************************************/
1348
1349 static int cmd_more(void)
1350 {
1351         TALLOC_CTX *ctx = talloc_tos();
1352         char *rname = NULL;
1353         char *fname = NULL;
1354         char *lname = NULL;
1355         char *pager_cmd = NULL;
1356         const char *pager;
1357         int fd;
1358         int rc = 0;
1359         mode_t mask;
1360
1361         rname = talloc_strdup(ctx, client_get_cur_dir());
1362         if (!rname) {
1363                 return 1;
1364         }
1365
1366         lname = talloc_asprintf(ctx, "%s/smbmore.XXXXXX",tmpdir());
1367         if (!lname) {
1368                 return 1;
1369         }
1370         mask = umask(S_IRWXO | S_IRWXG);
1371         fd = mkstemp(lname);
1372         umask(mask);
1373         if (fd == -1) {
1374                 d_printf("failed to create temporary file for more\n");
1375                 return 1;
1376         }
1377         close(fd);
1378
1379         if (!next_token_talloc(ctx, &cmd_ptr,&fname,NULL)) {
1380                 d_printf("more <filename>\n");
1381                 unlink(lname);
1382                 return 1;
1383         }
1384         rname = talloc_asprintf_append(rname, "%s", fname);
1385         if (!rname) {
1386                 return 1;
1387         }
1388         rname = clean_name(ctx,rname);
1389         if (!rname) {
1390                 return 1;
1391         }
1392
1393         rc = do_get(rname, lname, false);
1394
1395         pager=getenv("PAGER");
1396
1397         pager_cmd = talloc_asprintf(ctx,
1398                                 "%s %s",
1399                                 (pager? pager:PAGER),
1400                                 lname);
1401         if (!pager_cmd) {
1402                 return 1;
1403         }
1404         if (system(pager_cmd) == -1) {
1405                 d_printf("system command '%s' returned -1\n",
1406                         pager_cmd);
1407         }
1408         unlink(lname);
1409
1410         return rc;
1411 }
1412
1413 /****************************************************************************
1414  Do a mget command.
1415 ****************************************************************************/
1416
1417 static int cmd_mget(void)
1418 {
1419         TALLOC_CTX *ctx = talloc_tos();
1420         uint16 attribute = FILE_ATTRIBUTE_SYSTEM | FILE_ATTRIBUTE_HIDDEN;
1421         char *mget_mask = NULL;
1422         char *buf = NULL;
1423         NTSTATUS status = NT_STATUS_OK;
1424
1425         if (recurse) {
1426                 attribute |= FILE_ATTRIBUTE_DIRECTORY;
1427         }
1428
1429         abort_mget = false;
1430
1431         while (next_token_talloc(ctx, &cmd_ptr,&buf,NULL)) {
1432
1433                 mget_mask = talloc_strdup(ctx, client_get_cur_dir());
1434                 if (!mget_mask) {
1435                         return 1;
1436                 }
1437                 if (*buf == CLI_DIRSEP_CHAR) {
1438                         mget_mask = talloc_strdup(ctx, buf);
1439                 } else {
1440                         mget_mask = talloc_asprintf_append(mget_mask,
1441                                                         "%s", buf);
1442                 }
1443                 if (!mget_mask) {
1444                         return 1;
1445                 }
1446                 status = do_list(mget_mask, attribute, do_mget, false, true);
1447                 if (!NT_STATUS_IS_OK(status)) {
1448                         return 1;
1449                 }
1450         }
1451
1452         if (mget_mask == NULL) {
1453                 d_printf("nothing to mget\n");
1454                 return 0;
1455         }
1456
1457         if (!*mget_mask) {
1458                 mget_mask = talloc_asprintf(ctx,
1459                                         "%s*",
1460                                         client_get_cur_dir());
1461                 if (!mget_mask) {
1462                         return 1;
1463                 }
1464                 status = do_list(mget_mask, attribute, do_mget, false, true);
1465                 if (!NT_STATUS_IS_OK(status)) {
1466                         return 1;
1467                 }
1468         }
1469
1470         return 0;
1471 }
1472
1473 /****************************************************************************
1474  Make a directory of name "name".
1475 ****************************************************************************/
1476
1477 static bool do_mkdir(const char *name)
1478 {
1479         TALLOC_CTX *ctx = talloc_tos();
1480         struct cli_state *targetcli;
1481         char *targetname = NULL;
1482         NTSTATUS status;
1483
1484         status = cli_resolve_path(ctx, "", auth_info, cli, name, &targetcli,
1485                                   &targetname);
1486         if (!NT_STATUS_IS_OK(status)) {
1487                 d_printf("mkdir %s: %s\n", name, nt_errstr(status));
1488                 return false;
1489         }
1490
1491         status = cli_mkdir(targetcli, targetname);
1492         if (!NT_STATUS_IS_OK(status)) {
1493                 d_printf("%s making remote directory %s\n",
1494                          nt_errstr(status),name);
1495                 return false;
1496         }
1497
1498         return true;
1499 }
1500
1501 /****************************************************************************
1502  Show 8.3 name of a file.
1503 ****************************************************************************/
1504
1505 static bool do_altname(const char *name)
1506 {
1507         fstring altname;
1508         NTSTATUS status;
1509
1510         status = cli_qpathinfo_alt_name(cli, name, altname);
1511         if (!NT_STATUS_IS_OK(status)) {
1512                 d_printf("%s getting alt name for %s\n",
1513                          nt_errstr(status),name);
1514                 return false;
1515         }
1516         d_printf("%s\n", altname);
1517
1518         return true;
1519 }
1520
1521 /****************************************************************************
1522  Exit client.
1523 ****************************************************************************/
1524
1525 static int cmd_quit(void)
1526 {
1527         cli_shutdown(cli);
1528         exit(0);
1529         /* NOTREACHED */
1530         return 0;
1531 }
1532
1533 /****************************************************************************
1534  Make a directory.
1535 ****************************************************************************/
1536
1537 static int cmd_mkdir(void)
1538 {
1539         TALLOC_CTX *ctx = talloc_tos();
1540         char *mask = NULL;
1541         char *buf = NULL;
1542         NTSTATUS status;
1543
1544         mask = talloc_strdup(ctx, client_get_cur_dir());
1545         if (!mask) {
1546                 return 1;
1547         }
1548
1549         if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL)) {
1550                 if (!recurse) {
1551                         d_printf("mkdir <dirname>\n");
1552                 }
1553                 return 1;
1554         }
1555         mask = talloc_asprintf_append(mask, "%s", buf);
1556         if (!mask) {
1557                 return 1;
1558         }
1559
1560         if (recurse) {
1561                 char *ddir = NULL;
1562                 char *ddir2 = NULL;
1563                 struct cli_state *targetcli;
1564                 char *targetname = NULL;
1565                 char *p = NULL;
1566                 char *saveptr;
1567
1568                 ddir2 = talloc_strdup(ctx, "");
1569                 if (!ddir2) {
1570                         return 1;
1571                 }
1572
1573                 status = cli_resolve_path(ctx, "", auth_info, cli, mask,
1574                                           &targetcli, &targetname);
1575                 if (!NT_STATUS_IS_OK(status)) {
1576                         return 1;
1577                 }
1578
1579                 ddir = talloc_strdup(ctx, targetname);
1580                 if (!ddir) {
1581                         return 1;
1582                 }
1583                 trim_char(ddir,'.','\0');
1584                 p = strtok_r(ddir, "/\\", &saveptr);
1585                 while (p) {
1586                         ddir2 = talloc_asprintf_append(ddir2, "%s", p);
1587                         if (!ddir2) {
1588                                 return 1;
1589                         }
1590                         if (!NT_STATUS_IS_OK(cli_chkpath(targetcli, ddir2))) {
1591                                 do_mkdir(ddir2);
1592                         }
1593                         ddir2 = talloc_asprintf_append(ddir2, "%s", CLI_DIRSEP_STR);
1594                         if (!ddir2) {
1595                                 return 1;
1596                         }
1597                         p = strtok_r(NULL, "/\\", &saveptr);
1598                 }
1599         } else {
1600                 do_mkdir(mask);
1601         }
1602
1603         return 0;
1604 }
1605
1606 /****************************************************************************
1607  Show alt name.
1608 ****************************************************************************/
1609
1610 static int cmd_altname(void)
1611 {
1612         TALLOC_CTX *ctx = talloc_tos();
1613         char *name;
1614         char *buf;
1615
1616         name = talloc_strdup(ctx, client_get_cur_dir());
1617         if (!name) {
1618                 return 1;
1619         }
1620
1621         if (!next_token_talloc(ctx, &cmd_ptr, &buf, NULL)) {
1622                 d_printf("altname <file>\n");
1623                 return 1;
1624         }
1625         name = talloc_asprintf_append(name, "%s", buf);
1626         if (!name) {
1627                 return 1;
1628         }
1629         do_altname(name);
1630         return 0;
1631 }
1632
1633 static char *attr_str(TALLOC_CTX *mem_ctx, uint16_t mode)
1634 {
1635         char *attrs = talloc_zero_array(mem_ctx, char, 17);
1636         int i = 0;
1637
1638         if (!(mode & FILE_ATTRIBUTE_NORMAL)) {
1639                 if (mode & FILE_ATTRIBUTE_ENCRYPTED) {
1640                         attrs[i++] = 'E';
1641                 }
1642                 if (mode & FILE_ATTRIBUTE_NONINDEXED) {
1643                         attrs[i++] = 'N';
1644                 }
1645                 if (mode & FILE_ATTRIBUTE_OFFLINE) {
1646                         attrs[i++] = 'O';
1647                 }
1648                 if (mode & FILE_ATTRIBUTE_COMPRESSED) {
1649                         attrs[i++] = 'C';
1650                 }
1651                 if (mode & FILE_ATTRIBUTE_REPARSE_POINT) {
1652                         attrs[i++] = 'r';
1653                 }
1654                 if (mode & FILE_ATTRIBUTE_SPARSE) {
1655                         attrs[i++] = 's';
1656                 }
1657                 if (mode & FILE_ATTRIBUTE_TEMPORARY) {
1658                         attrs[i++] = 'T';
1659                 }
1660                 if (mode & FILE_ATTRIBUTE_NORMAL) {
1661                         attrs[i++] = 'N';
1662                 }
1663                 if (mode & FILE_ATTRIBUTE_READONLY) {
1664                         attrs[i++] = 'R';
1665                 }
1666                 if (mode & FILE_ATTRIBUTE_HIDDEN) {
1667                         attrs[i++] = 'H';
1668                 }
1669                 if (mode & FILE_ATTRIBUTE_SYSTEM) {
1670                         attrs[i++] = 'S';
1671                 }
1672                 if (mode & FILE_ATTRIBUTE_DIRECTORY) {
1673                         attrs[i++] = 'D';
1674                 }
1675                 if (mode & FILE_ATTRIBUTE_ARCHIVE) {
1676                         attrs[i++] = 'A';
1677                 }
1678         }
1679         return attrs;
1680 }
1681
1682 /****************************************************************************
1683  Show all info we can get
1684 ****************************************************************************/
1685
1686 static int do_allinfo(const char *name)
1687 {
1688         fstring altname;
1689         struct timespec b_time, a_time, m_time, c_time;
1690         off_t size;
1691         uint16_t mode;
1692         NTTIME tmp;
1693         uint16_t fnum;
1694         unsigned int num_streams;
1695         struct stream_struct *streams;
1696         int num_snapshots;
1697         char **snapshots;
1698         unsigned int i;
1699         NTSTATUS status;
1700
1701         status = cli_qpathinfo_alt_name(cli, name, altname);
1702         if (!NT_STATUS_IS_OK(status)) {
1703                 d_printf("%s getting alt name for %s\n", nt_errstr(status),
1704                          name);
1705                 /*
1706                  * Ignore not supported or not implemented, it does not
1707                  * hurt if we can't list alternate names.
1708                  */
1709                 if (NT_STATUS_EQUAL(status, NT_STATUS_NOT_SUPPORTED) ||
1710                     NT_STATUS_EQUAL(status, NT_STATUS_NOT_IMPLEMENTED)) {
1711                         altname[0] = '\0';
1712                 } else {
1713                         return false;
1714                 }
1715         }
1716         d_printf("altname: %s\n", altname);
1717
1718         status = cli_qpathinfo3(cli, name, &b_time, &a_time, &m_time, &c_time,
1719                                 &size, &mode, NULL);
1720         if (!NT_STATUS_IS_OK(status)) {
1721                 d_printf("%s getting pathinfo for %s\n", nt_errstr(status),
1722                          name);
1723                 return false;
1724         }
1725
1726         unix_timespec_to_nt_time(&tmp, b_time);
1727         d_printf("create_time:    %s\n", nt_time_string(talloc_tos(), tmp));
1728
1729         unix_timespec_to_nt_time(&tmp, a_time);
1730         d_printf("access_time:    %s\n", nt_time_string(talloc_tos(), tmp));
1731
1732         unix_timespec_to_nt_time(&tmp, m_time);
1733         d_printf("write_time:     %s\n", nt_time_string(talloc_tos(), tmp));
1734
1735         unix_timespec_to_nt_time(&tmp, c_time);
1736         d_printf("change_time:    %s\n", nt_time_string(talloc_tos(), tmp));
1737
1738         d_printf("attributes: %s (%x)\n", attr_str(talloc_tos(), mode), mode);
1739
1740         status = cli_qpathinfo_streams(cli, name, talloc_tos(), &num_streams,
1741                                        &streams);
1742         if (!NT_STATUS_IS_OK(status)) {
1743                 d_printf("%s getting streams for %s\n", nt_errstr(status),
1744                          name);
1745                 return false;
1746         }
1747
1748         for (i=0; i<num_streams; i++) {
1749                 d_printf("stream: [%s], %lld bytes\n", streams[i].name,
1750                          (unsigned long long)streams[i].size);
1751         }
1752
1753         if (mode & FILE_ATTRIBUTE_REPARSE_POINT) {
1754                 char *subst, *print;
1755                 uint32_t flags;
1756
1757                 status = cli_readlink(cli, name, talloc_tos(), &subst, &print,
1758                                       &flags);
1759                 if (!NT_STATUS_IS_OK(status)) {
1760                         d_fprintf(stderr, "cli_readlink returned %s\n",
1761                                   nt_errstr(status));
1762                 } else {
1763                         d_printf("symlink: subst=[%s], print=[%s], flags=%x\n",
1764                                  subst, print, flags);
1765                         TALLOC_FREE(subst);
1766                         TALLOC_FREE(print);
1767                 }
1768         }
1769
1770         status = cli_ntcreate(cli, name, 0,
1771                               SEC_FILE_READ_DATA | SEC_FILE_READ_ATTRIBUTE |
1772                               SEC_STD_SYNCHRONIZE, 0,
1773                               FILE_SHARE_READ|FILE_SHARE_WRITE
1774                               |FILE_SHARE_DELETE,
1775                               FILE_OPEN, 0x0, 0x0, &fnum);
1776         if (!NT_STATUS_IS_OK(status)) {
1777                 /*
1778                  * Ignore failure, it does not hurt if we can't list
1779                  * snapshots
1780                  */
1781                 return 0;
1782         }
1783         status = cli_shadow_copy_data(talloc_tos(), cli, fnum,
1784                                       true, &snapshots, &num_snapshots);
1785         if (!NT_STATUS_IS_OK(status)) {
1786                 cli_close(cli, fnum);
1787                 return 0;
1788         }
1789
1790         for (i=0; i<num_snapshots; i++) {
1791                 char *snap_name;
1792
1793                 d_printf("%s\n", snapshots[i]);
1794                 snap_name = talloc_asprintf(talloc_tos(), "%s%s",
1795                                             snapshots[i], name);
1796                 status = cli_qpathinfo3(cli, snap_name, &b_time, &a_time,
1797                                         &m_time, &c_time, &size,
1798                                         NULL, NULL);
1799                 if (!NT_STATUS_IS_OK(status)) {
1800                         d_fprintf(stderr, "pathinfo(%s) failed: %s\n",
1801                                   snap_name, nt_errstr(status));
1802                         TALLOC_FREE(snap_name);
1803                         continue;
1804                 }
1805                 unix_timespec_to_nt_time(&tmp, b_time);
1806                 d_printf("create_time:    %s\n", nt_time_string(talloc_tos(), tmp));
1807                 unix_timespec_to_nt_time(&tmp, a_time);
1808                 d_printf("access_time:    %s\n", nt_time_string(talloc_tos(), tmp));
1809                 unix_timespec_to_nt_time(&tmp, m_time);
1810                 d_printf("write_time:     %s\n", nt_time_string(talloc_tos(), tmp));
1811                 unix_timespec_to_nt_time(&tmp, c_time);
1812                 d_printf("change_time:    %s\n", nt_time_string(talloc_tos(), tmp));
1813                 d_printf("size: %d\n", (int)size);
1814         }
1815
1816         TALLOC_FREE(snapshots);
1817
1818         return 0;
1819 }
1820
1821 /****************************************************************************
1822  Show all info we can get
1823 ****************************************************************************/
1824
1825 static int cmd_allinfo(void)
1826 {
1827         TALLOC_CTX *ctx = talloc_tos();
1828         char *name;
1829         char *buf;
1830
1831         name = talloc_strdup(ctx, client_get_cur_dir());
1832         if (!name) {
1833                 return 1;
1834         }
1835
1836         if (!next_token_talloc(ctx, &cmd_ptr, &buf, NULL)) {
1837                 d_printf("allinfo <file>\n");
1838                 return 1;
1839         }
1840         name = talloc_asprintf_append(name, "%s", buf);
1841         if (!name) {
1842                 return 1;
1843         }
1844
1845         do_allinfo(name);
1846
1847         return 0;
1848 }
1849
1850 /****************************************************************************
1851  Put a single file.
1852 ****************************************************************************/
1853
1854 static int do_put(const char *rname, const char *lname, bool reput)
1855 {
1856         TALLOC_CTX *ctx = talloc_tos();
1857         uint16_t fnum;
1858         XFILE *f;
1859         off_t start = 0;
1860         int rc = 0;
1861         struct timespec tp_start;
1862         struct cli_state *targetcli;
1863         char *targetname = NULL;
1864         struct push_state state;
1865         NTSTATUS status;
1866
1867         status = cli_resolve_path(ctx, "", auth_info, cli, rname,
1868                                   &targetcli, &targetname);
1869         if (!NT_STATUS_IS_OK(status)) {
1870                 d_printf("Failed to open %s: %s\n", rname, nt_errstr(status));
1871                 return 1;
1872         }
1873
1874         clock_gettime_mono(&tp_start);
1875
1876         if (reput) {
1877                 status = cli_open(targetcli, targetname, O_RDWR|O_CREAT, DENY_NONE, &fnum);
1878                 if (NT_STATUS_IS_OK(status)) {
1879                         if (!NT_STATUS_IS_OK(status = cli_qfileinfo_basic(
1880                                                      targetcli, fnum, NULL,
1881                                                      &start, NULL, NULL,
1882                                                      NULL, NULL, NULL)) &&
1883                             !NT_STATUS_IS_OK(status = cli_getattrE(
1884                                                      targetcli, fnum, NULL,
1885                                                      &start, NULL, NULL,
1886                                                      NULL))) {
1887                                 d_printf("getattrib: %s\n", nt_errstr(status));
1888                                 return 1;
1889                         }
1890                 }
1891         } else {
1892                 status = cli_open(targetcli, targetname, O_RDWR|O_CREAT|O_TRUNC, DENY_NONE, &fnum);
1893         }
1894
1895         if (!NT_STATUS_IS_OK(status)) {
1896                 d_printf("%s opening remote file %s\n", nt_errstr(status),
1897                          rname);
1898                 return 1;
1899         }
1900
1901         /* allow files to be piped into smbclient
1902            jdblair 24.jun.98
1903
1904            Note that in this case this function will exit(0) rather
1905            than returning. */
1906         if (!strcmp(lname, "-")) {
1907                 f = x_stdin;
1908                 /* size of file is not known */
1909         } else {
1910                 f = x_fopen(lname,O_RDONLY, 0);
1911                 if (f && reput) {
1912                         if (x_tseek(f, start, SEEK_SET) == -1) {
1913                                 d_printf("Error seeking local file\n");
1914                                 x_fclose(f);
1915                                 return 1;
1916                         }
1917                 }
1918         }
1919
1920         if (!f) {
1921                 d_printf("Error opening local file %s\n",lname);
1922                 return 1;
1923         }
1924
1925         DEBUG(1,("putting file %s as %s ",lname,
1926                  rname));
1927
1928         x_setvbuf(f, NULL, X_IOFBF, io_bufsize);
1929
1930         state.f = f;
1931         state.nread = 0;
1932
1933         status = cli_push(targetcli, fnum, 0, 0, io_bufsize, push_source,
1934                           &state);
1935         if (!NT_STATUS_IS_OK(status)) {
1936                 d_fprintf(stderr, "cli_push returned %s\n", nt_errstr(status));
1937                 rc = 1;
1938         }
1939
1940         status = cli_close(targetcli, fnum);
1941         if (!NT_STATUS_IS_OK(status)) {
1942                 d_printf("%s closing remote file %s\n", nt_errstr(status),
1943                          rname);
1944                 if (f != x_stdin) {
1945                         x_fclose(f);
1946                 }
1947                 return 1;
1948         }
1949
1950         if (f != x_stdin) {
1951                 x_fclose(f);
1952         }
1953
1954         {
1955                 struct timespec tp_end;
1956                 int this_time;
1957
1958                 clock_gettime_mono(&tp_end);
1959                 this_time = nsec_time_diff(&tp_end,&tp_start)/1000000;
1960                 put_total_time_ms += this_time;
1961                 put_total_size += state.nread;
1962
1963                 DEBUG(1,("(%3.1f kb/s) (average %3.1f kb/s)\n",
1964                          state.nread / (1.024*this_time + 1.0e-4),
1965                          put_total_size / (1.024*put_total_time_ms)));
1966         }
1967
1968         if (f == x_stdin) {
1969                 cli_shutdown(cli);
1970                 exit(rc);
1971         }
1972
1973         return rc;
1974 }
1975
1976 /****************************************************************************
1977  Put a file.
1978 ****************************************************************************/
1979
1980 static int cmd_put(void)
1981 {
1982         TALLOC_CTX *ctx = talloc_tos();
1983         char *lname;
1984         char *rname;
1985         char *buf;
1986
1987         rname = talloc_strdup(ctx, client_get_cur_dir());
1988         if (!rname) {
1989                 return 1;
1990         }
1991
1992         if (!next_token_talloc(ctx, &cmd_ptr,&lname,NULL)) {
1993                 d_printf("put <filename>\n");
1994                 return 1;
1995         }
1996
1997         if (next_token_talloc(ctx, &cmd_ptr,&buf,NULL)) {
1998                 rname = talloc_asprintf_append(rname, "%s", buf);
1999         } else {
2000                 rname = talloc_asprintf_append(rname, "%s", lname);
2001         }
2002         if (!rname) {
2003                 return 1;
2004         }
2005
2006         rname = clean_name(ctx, rname);
2007         if (!rname) {
2008                 return 1;
2009         }
2010
2011         {
2012                 SMB_STRUCT_STAT st;
2013                 /* allow '-' to represent stdin
2014                    jdblair, 24.jun.98 */
2015                 if (!file_exist_stat(lname, &st, false) &&
2016                     (strcmp(lname,"-"))) {
2017                         d_printf("%s does not exist\n",lname);
2018                         return 1;
2019                 }
2020         }
2021
2022         return do_put(rname, lname, false);
2023 }
2024
2025 /*************************************
2026  File list structure.
2027 *************************************/
2028
2029 static struct file_list {
2030         struct file_list *prev, *next;
2031         char *file_path;
2032         bool isdir;
2033 } *file_list;
2034
2035 /****************************************************************************
2036  Free a file_list structure.
2037 ****************************************************************************/
2038
2039 static void free_file_list (struct file_list *l_head)
2040 {
2041         struct file_list *list, *next;
2042
2043         for (list = l_head; list; list = next) {
2044                 next = list->next;
2045                 DLIST_REMOVE(l_head, list);
2046                 SAFE_FREE(list->file_path);
2047                 SAFE_FREE(list);
2048         }
2049 }
2050
2051 /****************************************************************************
2052  Seek in a directory/file list until you get something that doesn't start with
2053  the specified name.
2054 ****************************************************************************/
2055
2056 static bool seek_list(struct file_list *list, char *name)
2057 {
2058         while (list) {
2059                 trim_string(list->file_path,"./","\n");
2060                 if (strncmp(list->file_path, name, strlen(name)) != 0) {
2061                         return true;
2062                 }
2063                 list = list->next;
2064         }
2065
2066         return false;
2067 }
2068
2069 /****************************************************************************
2070  Set the file selection mask.
2071 ****************************************************************************/
2072
2073 static int cmd_select(void)
2074 {
2075         TALLOC_CTX *ctx = talloc_tos();
2076         char *new_fs = NULL;
2077         next_token_talloc(ctx, &cmd_ptr,&new_fs,NULL)
2078                 ;
2079         if (new_fs) {
2080                 client_set_fileselection(new_fs);
2081         } else {
2082                 client_set_fileselection("");
2083         }
2084         return 0;
2085 }
2086
2087 /****************************************************************************
2088   Recursive file matching function act as find
2089   match must be always set to true when calling this function
2090 ****************************************************************************/
2091
2092 static int file_find(struct file_list **list, const char *directory,
2093                       const char *expression, bool match)
2094 {
2095         DIR *dir;
2096         struct file_list *entry;
2097         struct stat statbuf;
2098         int ret;
2099         char *path;
2100         bool isdir;
2101         const char *dname;
2102
2103         dir = opendir(directory);
2104         if (!dir)
2105                 return -1;
2106
2107         while ((dname = readdirname(dir))) {
2108                 if (!strcmp("..", dname))
2109                         continue;
2110                 if (!strcmp(".", dname))
2111                         continue;
2112
2113                 if (asprintf(&path, "%s/%s", directory, dname) <= 0) {
2114                         continue;
2115                 }
2116
2117                 isdir = false;
2118                 if (!match || !gen_fnmatch(expression, dname)) {
2119                         if (recurse) {
2120                                 ret = stat(path, &statbuf);
2121                                 if (ret == 0) {
2122                                         if (S_ISDIR(statbuf.st_mode)) {
2123                                                 isdir = true;
2124                                                 ret = file_find(list, path, expression, false);
2125                                         }
2126                                 } else {
2127                                         d_printf("file_find: cannot stat file %s\n", path);
2128                                 }
2129
2130                                 if (ret == -1) {
2131                                         SAFE_FREE(path);
2132                                         closedir(dir);
2133                                         return -1;
2134                                 }
2135                         }
2136                         entry = SMB_MALLOC_P(struct file_list);
2137                         if (!entry) {
2138                                 d_printf("Out of memory in file_find\n");
2139                                 closedir(dir);
2140                                 return -1;
2141                         }
2142                         entry->file_path = path;
2143                         entry->isdir = isdir;
2144                         DLIST_ADD(*list, entry);
2145                 } else {
2146                         SAFE_FREE(path);
2147                 }
2148         }
2149
2150         closedir(dir);
2151         return 0;
2152 }
2153
2154 /****************************************************************************
2155  mput some files.
2156 ****************************************************************************/
2157
2158 static int cmd_mput(void)
2159 {
2160         TALLOC_CTX *ctx = talloc_tos();
2161         char *p = NULL;
2162
2163         while (next_token_talloc(ctx, &cmd_ptr,&p,NULL)) {
2164                 int ret;
2165                 struct file_list *temp_list;
2166                 char *quest, *lname, *rname;
2167
2168                 file_list = NULL;
2169
2170                 ret = file_find(&file_list, ".", p, true);
2171                 if (ret) {
2172                         free_file_list(file_list);
2173                         continue;
2174                 }
2175
2176                 quest = NULL;
2177                 lname = NULL;
2178                 rname = NULL;
2179
2180                 for (temp_list = file_list; temp_list;
2181                      temp_list = temp_list->next) {
2182
2183                         SAFE_FREE(lname);
2184                         if (asprintf(&lname, "%s/", temp_list->file_path) <= 0) {
2185                                 continue;
2186                         }
2187                         trim_string(lname, "./", "/");
2188
2189                         /* check if it's a directory */
2190                         if (temp_list->isdir) {
2191                                 /* if (!recurse) continue; */
2192
2193                                 SAFE_FREE(quest);
2194                                 if (asprintf(&quest, "Put directory %s? ", lname) < 0) {
2195                                         break;
2196                                 }
2197                                 if (prompt && !yesno(quest)) { /* No */
2198                                         /* Skip the directory */
2199                                         lname[strlen(lname)-1] = '/';
2200                                         if (!seek_list(temp_list, lname))
2201                                                 break;
2202                                 } else { /* Yes */
2203                                         SAFE_FREE(rname);
2204                                         if(asprintf(&rname, "%s%s", client_get_cur_dir(), lname) < 0) {
2205                                                 break;
2206                                         }
2207                                         normalize_name(rname);
2208                                         if (!NT_STATUS_IS_OK(cli_chkpath(cli, rname)) &&
2209                                             !do_mkdir(rname)) {
2210                                                 DEBUG (0, ("Unable to make dir, skipping..."));
2211                                                 /* Skip the directory */
2212                                                 lname[strlen(lname)-1] = '/';
2213                                                 if (!seek_list(temp_list, lname)) {
2214                                                         break;
2215                                                 }
2216                                         }
2217                                 }
2218                                 continue;
2219                         } else {
2220                                 SAFE_FREE(quest);
2221                                 if (asprintf(&quest,"Put file %s? ", lname) < 0) {
2222                                         break;
2223                                 }
2224                                 if (prompt && !yesno(quest)) {
2225                                         /* No */
2226                                         continue;
2227                                 }
2228
2229                                 /* Yes */
2230                                 SAFE_FREE(rname);
2231                                 if (asprintf(&rname, "%s%s", client_get_cur_dir(), lname) < 0) {
2232                                         break;
2233                                 }
2234                         }
2235
2236                         normalize_name(rname);
2237
2238                         do_put(rname, lname, false);
2239                 }
2240                 free_file_list(file_list);
2241                 SAFE_FREE(quest);
2242                 SAFE_FREE(lname);
2243                 SAFE_FREE(rname);
2244         }
2245
2246         return 0;
2247 }
2248
2249 /****************************************************************************
2250  Cancel a print job.
2251 ****************************************************************************/
2252
2253 static int do_cancel(int job)
2254 {
2255         if (cli_printjob_del(cli, job)) {
2256                 d_printf("Job %d cancelled\n",job);
2257                 return 0;
2258         } else {
2259                 NTSTATUS status = cli_nt_error(cli);
2260                 d_printf("Error cancelling job %d : %s\n",
2261                          job, nt_errstr(status));
2262                 return 1;
2263         }
2264 }
2265
2266 /****************************************************************************
2267  Cancel a print job.
2268 ****************************************************************************/
2269
2270 static int cmd_cancel(void)
2271 {
2272         TALLOC_CTX *ctx = talloc_tos();
2273         char *buf = NULL;
2274         int job;
2275
2276         if (!next_token_talloc(ctx, &cmd_ptr, &buf,NULL)) {
2277                 d_printf("cancel <jobid> ...\n");
2278                 return 1;
2279         }
2280         do {
2281                 job = atoi(buf);
2282                 do_cancel(job);
2283         } while (next_token_talloc(ctx, &cmd_ptr,&buf,NULL));
2284
2285         return 0;
2286 }
2287
2288 /****************************************************************************
2289  Print a file.
2290 ****************************************************************************/
2291
2292 static int cmd_print(void)
2293 {
2294         TALLOC_CTX *ctx = talloc_tos();
2295         char *lname = NULL;
2296         char *rname = NULL;
2297         char *p = NULL;
2298
2299         if (!next_token_talloc(ctx, &cmd_ptr, &lname,NULL)) {
2300                 d_printf("print <filename>\n");
2301                 return 1;
2302         }
2303
2304         rname = talloc_strdup(ctx, lname);
2305         if (!rname) {
2306                 return 1;
2307         }
2308         p = strrchr_m(rname,'/');
2309         if (p) {
2310                 rname = talloc_asprintf(ctx,
2311                                         "%s-%d",
2312                                         p+1,
2313                                         (int)getpid());
2314         }
2315         if (strequal(lname,"-")) {
2316                 rname = talloc_asprintf(ctx,
2317                                 "stdin-%d",
2318                                 (int)getpid());
2319         }
2320         if (!rname) {
2321                 return 1;
2322         }
2323
2324         return do_put(rname, lname, false);
2325 }
2326
2327 /****************************************************************************
2328  Show a print queue entry.
2329 ****************************************************************************/
2330
2331 static void queue_fn(struct print_job_info *p)
2332 {
2333         d_printf("%-6d   %-9d    %s\n", (int)p->id, (int)p->size, p->name);
2334 }
2335
2336 /****************************************************************************
2337  Show a print queue.
2338 ****************************************************************************/
2339
2340 static int cmd_queue(void)
2341 {
2342         cli_print_queue(cli, queue_fn);
2343         return 0;
2344 }
2345
2346 /****************************************************************************
2347  Delete some files.
2348 ****************************************************************************/
2349
2350 static NTSTATUS do_del(struct cli_state *cli_state, struct file_info *finfo,
2351                    const char *dir)
2352 {
2353         TALLOC_CTX *ctx = talloc_tos();
2354         char *mask = NULL;
2355         NTSTATUS status;
2356
2357         mask = talloc_asprintf(ctx,
2358                                 "%s%c%s",
2359                                 dir,
2360                                 CLI_DIRSEP_CHAR,
2361                                 finfo->name);
2362         if (!mask) {
2363                 return NT_STATUS_NO_MEMORY;
2364         }
2365
2366         if (finfo->mode & FILE_ATTRIBUTE_DIRECTORY) {
2367                 TALLOC_FREE(mask);
2368                 return NT_STATUS_OK;
2369         }
2370
2371         status = cli_unlink(cli_state, mask, FILE_ATTRIBUTE_SYSTEM | FILE_ATTRIBUTE_HIDDEN);
2372         if (!NT_STATUS_IS_OK(status)) {
2373                 d_printf("%s deleting remote file %s\n",
2374                          nt_errstr(status), mask);
2375         }
2376         TALLOC_FREE(mask);
2377         return status;
2378 }
2379
2380 /****************************************************************************
2381  Delete some files.
2382 ****************************************************************************/
2383
2384 static int cmd_del(void)
2385 {
2386         TALLOC_CTX *ctx = talloc_tos();
2387         char *mask = NULL;
2388         char *buf = NULL;
2389         NTSTATUS status = NT_STATUS_OK;
2390         uint16 attribute = FILE_ATTRIBUTE_SYSTEM | FILE_ATTRIBUTE_HIDDEN;
2391
2392         if (recurse) {
2393                 attribute |= FILE_ATTRIBUTE_DIRECTORY;
2394         }
2395
2396         mask = talloc_strdup(ctx, client_get_cur_dir());
2397         if (!mask) {
2398                 return 1;
2399         }
2400         if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL)) {
2401                 d_printf("del <filename>\n");
2402                 return 1;
2403         }
2404         mask = talloc_asprintf_append(mask, "%s", buf);
2405         if (!mask) {
2406                 return 1;
2407         }
2408
2409         status = do_list(mask,attribute,do_del,false,false);
2410         if (!NT_STATUS_IS_OK(status)) {
2411                 return 1;
2412         }
2413         return 0;
2414 }
2415
2416 /****************************************************************************
2417  Wildcard delete some files.
2418 ****************************************************************************/
2419
2420 static int cmd_wdel(void)
2421 {
2422         TALLOC_CTX *ctx = talloc_tos();
2423         char *mask = NULL;
2424         char *buf = NULL;
2425         uint16 attribute;
2426         struct cli_state *targetcli;
2427         char *targetname = NULL;
2428         NTSTATUS status;
2429
2430         if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL)) {
2431                 d_printf("wdel 0x<attrib> <wcard>\n");
2432                 return 1;
2433         }
2434
2435         attribute = (uint16)strtol(buf, (char **)NULL, 16);
2436
2437         if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL)) {
2438                 d_printf("wdel 0x<attrib> <wcard>\n");
2439                 return 1;
2440         }
2441
2442         mask = talloc_asprintf(ctx, "%s%s",
2443                         client_get_cur_dir(),
2444                         buf);
2445         if (!mask) {
2446                 return 1;
2447         }
2448
2449         status = cli_resolve_path(ctx, "", auth_info, cli, mask, &targetcli,
2450                                   &targetname);
2451         if (!NT_STATUS_IS_OK(status)) {
2452                 d_printf("cmd_wdel %s: %s\n", mask, nt_errstr(status));
2453                 return 1;
2454         }
2455
2456         status = cli_unlink(targetcli, targetname, attribute);
2457         if (!NT_STATUS_IS_OK(status)) {
2458                 d_printf("%s deleting remote files %s\n", nt_errstr(status),
2459                          targetname);
2460         }
2461         return 0;
2462 }
2463
2464 /****************************************************************************
2465 ****************************************************************************/
2466
2467 static int cmd_open(void)
2468 {
2469         TALLOC_CTX *ctx = talloc_tos();
2470         char *mask = NULL;
2471         char *buf = NULL;
2472         char *targetname = NULL;
2473         struct cli_state *targetcli;
2474         uint16_t fnum = (uint16_t)-1;
2475         NTSTATUS status;
2476
2477         if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL)) {
2478                 d_printf("open <filename>\n");
2479                 return 1;
2480         }
2481         mask = talloc_asprintf(ctx,
2482                         "%s%s",
2483                         client_get_cur_dir(),
2484                         buf);
2485         if (!mask) {
2486                 return 1;
2487         }
2488
2489         status = cli_resolve_path(ctx, "", auth_info, cli, mask, &targetcli,
2490                                   &targetname);
2491         if (!NT_STATUS_IS_OK(status)) {
2492                 d_printf("open %s: %s\n", mask, nt_errstr(status));
2493                 return 1;
2494         }
2495
2496         status = cli_ntcreate(targetcli, targetname, 0,
2497                         FILE_READ_DATA|FILE_WRITE_DATA, 0,
2498                         FILE_SHARE_READ|FILE_SHARE_WRITE, FILE_OPEN,
2499                         0x0, 0x0, &fnum);
2500         if (!NT_STATUS_IS_OK(status)) {
2501                 status = cli_ntcreate(targetcli, targetname, 0,
2502                                 FILE_READ_DATA, 0,
2503                                 FILE_SHARE_READ|FILE_SHARE_WRITE, FILE_OPEN,
2504                                 0x0, 0x0, &fnum);
2505                 if (NT_STATUS_IS_OK(status)) {
2506                         d_printf("open file %s: for read/write fnum %d\n", targetname, fnum);
2507                 } else {
2508                         d_printf("Failed to open file %s. %s\n",
2509                                  targetname, nt_errstr(status));
2510                 }
2511         } else {
2512                 d_printf("open file %s: for read/write fnum %d\n", targetname, fnum);
2513         }
2514         return 0;
2515 }
2516
2517 static int cmd_posix_encrypt(void)
2518 {
2519         TALLOC_CTX *ctx = talloc_tos();
2520         NTSTATUS status = NT_STATUS_UNSUCCESSFUL;
2521
2522         if (cli->use_kerberos) {
2523                 status = cli_gss_smb_encryption_start(cli);
2524         } else {
2525                 char *domain = NULL;
2526                 char *user = NULL;
2527                 char *password = NULL;
2528
2529                 if (!next_token_talloc(ctx, &cmd_ptr,&domain,NULL)) {
2530                         d_printf("posix_encrypt domain user password\n");
2531                         return 1;
2532                 }
2533
2534                 if (!next_token_talloc(ctx, &cmd_ptr,&user,NULL)) {
2535                         d_printf("posix_encrypt domain user password\n");
2536                         return 1;
2537                 }
2538
2539                 if (!next_token_talloc(ctx, &cmd_ptr,&password,NULL)) {
2540                         d_printf("posix_encrypt domain user password\n");
2541                         return 1;
2542                 }
2543
2544                 status = cli_raw_ntlm_smb_encryption_start(cli,
2545                                                         user,
2546                                                         password,
2547                                                         domain);
2548         }
2549
2550         if (!NT_STATUS_IS_OK(status)) {
2551                 d_printf("posix_encrypt failed with error %s\n", nt_errstr(status));
2552         } else {
2553                 d_printf("encryption on\n");
2554                 smb_encrypt = true;
2555         }
2556
2557         return 0;
2558 }
2559
2560 /****************************************************************************
2561 ****************************************************************************/
2562
2563 static int cmd_posix_open(void)
2564 {
2565         TALLOC_CTX *ctx = talloc_tos();
2566         char *mask = NULL;
2567         char *buf = NULL;
2568         char *targetname = NULL;
2569         struct cli_state *targetcli;
2570         mode_t mode;
2571         uint16_t fnum;
2572         NTSTATUS status;
2573
2574         if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL)) {
2575                 d_printf("posix_open <filename> 0<mode>\n");
2576                 return 1;
2577         }
2578         mask = talloc_asprintf(ctx,
2579                         "%s%s",
2580                         client_get_cur_dir(),
2581                         buf);
2582         if (!mask) {
2583                 return 1;
2584         }
2585
2586         if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL)) {
2587                 d_printf("posix_open <filename> 0<mode>\n");
2588                 return 1;
2589         }
2590         mode = (mode_t)strtol(buf, (char **)NULL, 8);
2591
2592         status = cli_resolve_path(ctx, "", auth_info, cli, mask, &targetcli,
2593                                   &targetname);
2594         if (!NT_STATUS_IS_OK(status)) {
2595                 d_printf("posix_open %s: %s\n", mask, nt_errstr(status));
2596                 return 1;
2597         }
2598
2599         status = cli_posix_open(targetcli, targetname, O_CREAT|O_RDWR, mode,
2600                                 &fnum);
2601         if (!NT_STATUS_IS_OK(status)) {
2602                 status = cli_posix_open(targetcli, targetname,
2603                                         O_CREAT|O_RDONLY, mode, &fnum);
2604                 if (!NT_STATUS_IS_OK(status)) {
2605                         d_printf("Failed to open file %s. %s\n", targetname,
2606                                  nt_errstr(status));
2607                 } else {
2608                         d_printf("posix_open file %s: for readonly fnum %d\n",
2609                                  targetname, fnum);
2610                 }
2611         } else {
2612                 d_printf("posix_open file %s: for read/write fnum %d\n",
2613                          targetname, fnum);
2614         }
2615
2616         return 0;
2617 }
2618
2619 static int cmd_posix_mkdir(void)
2620 {
2621         TALLOC_CTX *ctx = talloc_tos();
2622         char *mask = NULL;
2623         char *buf = NULL;
2624         char *targetname = NULL;
2625         struct cli_state *targetcli;
2626         mode_t mode;
2627         NTSTATUS status;
2628
2629         if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL)) {
2630                 d_printf("posix_mkdir <filename> 0<mode>\n");
2631                 return 1;
2632         }
2633         mask = talloc_asprintf(ctx,
2634                         "%s%s",
2635                         client_get_cur_dir(),
2636                         buf);
2637         if (!mask) {
2638                 return 1;
2639         }
2640
2641         if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL)) {
2642                 d_printf("posix_mkdir <filename> 0<mode>\n");
2643                 return 1;
2644         }
2645         mode = (mode_t)strtol(buf, (char **)NULL, 8);
2646
2647         status = cli_resolve_path(ctx, "", auth_info, cli, mask, &targetcli,
2648                                   &targetname);
2649         if (!NT_STATUS_IS_OK(status)) {
2650                 d_printf("posix_mkdir %s: %s\n", mask, nt_errstr(status));
2651                 return 1;
2652         }
2653
2654         status = cli_posix_mkdir(targetcli, targetname, mode);
2655         if (!NT_STATUS_IS_OK(status)) {
2656                 d_printf("Failed to open file %s. %s\n",
2657                          targetname, nt_errstr(status));
2658         } else {
2659                 d_printf("posix_mkdir created directory %s\n", targetname);
2660         }
2661         return 0;
2662 }
2663
2664 static int cmd_posix_unlink(void)
2665 {
2666         TALLOC_CTX *ctx = talloc_tos();
2667         char *mask = NULL;
2668         char *buf = NULL;
2669         char *targetname = NULL;
2670         struct cli_state *targetcli;
2671         NTSTATUS status;
2672
2673         if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL)) {
2674                 d_printf("posix_unlink <filename>\n");
2675                 return 1;
2676         }
2677         mask = talloc_asprintf(ctx,
2678                         "%s%s",
2679                         client_get_cur_dir(),
2680                         buf);
2681         if (!mask) {
2682                 return 1;
2683         }
2684
2685         status = cli_resolve_path(ctx, "", auth_info, cli, mask, &targetcli,
2686                                   &targetname);
2687         if (!NT_STATUS_IS_OK(status)) {
2688                 d_printf("posix_unlink %s: %s\n", mask, nt_errstr(status));
2689                 return 1;
2690         }
2691
2692         status = cli_posix_unlink(targetcli, targetname);
2693         if (!NT_STATUS_IS_OK(status)) {
2694                 d_printf("Failed to unlink file %s. %s\n",
2695                          targetname, nt_errstr(status));
2696         } else {
2697                 d_printf("posix_unlink deleted file %s\n", targetname);
2698         }
2699
2700         return 0;
2701 }
2702
2703 static int cmd_posix_rmdir(void)
2704 {
2705         TALLOC_CTX *ctx = talloc_tos();
2706         char *mask = NULL;
2707         char *buf = NULL;
2708         char *targetname = NULL;
2709         struct cli_state *targetcli;
2710         NTSTATUS status;
2711
2712         if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL)) {
2713                 d_printf("posix_rmdir <filename>\n");
2714                 return 1;
2715         }
2716         mask = talloc_asprintf(ctx,
2717                         "%s%s",
2718                         client_get_cur_dir(),
2719                         buf);
2720         if (!mask) {
2721                 return 1;
2722         }
2723
2724         status = cli_resolve_path(ctx, "", auth_info, cli, mask, &targetcli,
2725                                   &targetname);
2726         if (!NT_STATUS_IS_OK(status)) {
2727                 d_printf("posix_rmdir %s: %s\n", mask, nt_errstr(status));
2728                 return 1;
2729         }
2730
2731         status = cli_posix_rmdir(targetcli, targetname);
2732         if (!NT_STATUS_IS_OK(status)) {
2733                 d_printf("Failed to unlink directory %s. %s\n",
2734                          targetname, nt_errstr(status));
2735         } else {
2736                 d_printf("posix_rmdir deleted directory %s\n", targetname);
2737         }
2738
2739         return 0;
2740 }
2741
2742 static int cmd_close(void)
2743 {
2744         TALLOC_CTX *ctx = talloc_tos();
2745         char *buf = NULL;
2746         int fnum;
2747         NTSTATUS status;
2748
2749         if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL)) {
2750                 d_printf("close <fnum>\n");
2751                 return 1;
2752         }
2753
2754         fnum = atoi(buf);
2755         /* We really should use the targetcli here.... */
2756         status = cli_close(cli, fnum);
2757         if (!NT_STATUS_IS_OK(status)) {
2758                 d_printf("close %d: %s\n", fnum, nt_errstr(status));
2759                 return 1;
2760         }
2761         return 0;
2762 }
2763
2764 static int cmd_posix(void)
2765 {
2766         TALLOC_CTX *ctx = talloc_tos();
2767         uint16 major, minor;
2768         uint32 caplow, caphigh;
2769         char *caps;
2770         NTSTATUS status;
2771
2772         if (!SERVER_HAS_UNIX_CIFS(cli)) {
2773                 d_printf("Server doesn't support UNIX CIFS extensions.\n");
2774                 return 1;
2775         }
2776
2777         status = cli_unix_extensions_version(cli, &major, &minor, &caplow,
2778                                              &caphigh);
2779         if (!NT_STATUS_IS_OK(status)) {
2780                 d_printf("Can't get UNIX CIFS extensions version from "
2781                          "server: %s\n", nt_errstr(status));
2782                 return 1;
2783         }
2784
2785         d_printf("Server supports CIFS extensions %u.%u\n", (unsigned int)major, (unsigned int)minor);
2786
2787         caps = talloc_strdup(ctx, "");
2788         if (!caps) {
2789                 return 1;
2790         }
2791         if (caplow & CIFS_UNIX_FCNTL_LOCKS_CAP) {
2792                 caps = talloc_asprintf_append(caps, "locks ");
2793                 if (!caps) {
2794                         return 1;
2795                 }
2796         }
2797         if (caplow & CIFS_UNIX_POSIX_ACLS_CAP) {
2798                 caps = talloc_asprintf_append(caps, "acls ");
2799                 if (!caps) {
2800                         return 1;
2801                 }
2802         }
2803         if (caplow & CIFS_UNIX_XATTTR_CAP) {
2804                 caps = talloc_asprintf_append(caps, "eas ");
2805                 if (!caps) {
2806                         return 1;
2807                 }
2808         }
2809         if (caplow & CIFS_UNIX_POSIX_PATHNAMES_CAP) {
2810                 caps = talloc_asprintf_append(caps, "pathnames ");
2811                 if (!caps) {
2812                         return 1;
2813                 }
2814         }
2815         if (caplow & CIFS_UNIX_POSIX_PATH_OPERATIONS_CAP) {
2816                 caps = talloc_asprintf_append(caps, "posix_path_operations ");
2817                 if (!caps) {
2818                         return 1;
2819                 }
2820         }
2821         if (caplow & CIFS_UNIX_LARGE_READ_CAP) {
2822                 caps = talloc_asprintf_append(caps, "large_read ");
2823                 if (!caps) {
2824                         return 1;
2825                 }
2826         }
2827         if (caplow & CIFS_UNIX_LARGE_WRITE_CAP) {
2828                 caps = talloc_asprintf_append(caps, "large_write ");
2829                 if (!caps) {
2830                         return 1;
2831                 }
2832         }
2833         if (caplow & CIFS_UNIX_TRANSPORT_ENCRYPTION_CAP) {
2834                 caps = talloc_asprintf_append(caps, "posix_encrypt ");
2835                 if (!caps) {
2836                         return 1;
2837                 }
2838         }
2839         if (caplow & CIFS_UNIX_TRANSPORT_ENCRYPTION_MANDATORY_CAP) {
2840                 caps = talloc_asprintf_append(caps, "mandatory_posix_encrypt ");
2841                 if (!caps) {
2842                         return 1;
2843                 }
2844         }
2845
2846         if (*caps && caps[strlen(caps)-1] == ' ') {
2847                 caps[strlen(caps)-1] = '\0';
2848         }
2849
2850         d_printf("Server supports CIFS capabilities %s\n", caps);
2851
2852         status = cli_set_unix_extensions_capabilities(cli, major, minor,
2853                                                       caplow, caphigh);
2854         if (!NT_STATUS_IS_OK(status)) {
2855                 d_printf("Can't set UNIX CIFS extensions capabilities. %s.\n",
2856                          nt_errstr(status));
2857                 return 1;
2858         }
2859
2860         if (caplow & CIFS_UNIX_POSIX_PATHNAMES_CAP) {
2861                 CLI_DIRSEP_CHAR = '/';
2862                 *CLI_DIRSEP_STR = '/';
2863                 client_set_cur_dir(CLI_DIRSEP_STR);
2864         }
2865
2866         return 0;
2867 }
2868
2869 static int cmd_lock(void)
2870 {
2871         TALLOC_CTX *ctx = talloc_tos();
2872         char *buf = NULL;
2873         uint64_t start, len;
2874         enum brl_type lock_type;
2875         int fnum;
2876         NTSTATUS status;
2877
2878         if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL)) {
2879                 d_printf("lock <fnum> [r|w] <hex-start> <hex-len>\n");
2880                 return 1;
2881         }
2882         fnum = atoi(buf);
2883
2884         if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL)) {
2885                 d_printf("lock <fnum> [r|w] <hex-start> <hex-len>\n");
2886                 return 1;
2887         }
2888
2889         if (*buf == 'r' || *buf == 'R') {
2890                 lock_type = READ_LOCK;
2891         } else if (*buf == 'w' || *buf == 'W') {
2892                 lock_type = WRITE_LOCK;
2893         } else {
2894                 d_printf("lock <fnum> [r|w] <hex-start> <hex-len>\n");
2895                 return 1;
2896         }
2897
2898         if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL)) {
2899                 d_printf("lock <fnum> [r|w] <hex-start> <hex-len>\n");
2900                 return 1;
2901         }
2902
2903         start = (uint64_t)strtol(buf, (char **)NULL, 16);
2904
2905         if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL)) {
2906                 d_printf("lock <fnum> [r|w] <hex-start> <hex-len>\n");
2907                 return 1;
2908         }
2909
2910         len = (uint64_t)strtol(buf, (char **)NULL, 16);
2911
2912         status = cli_posix_lock(cli, fnum, start, len, true, lock_type);
2913         if (!NT_STATUS_IS_OK(status)) {
2914                 d_printf("lock failed %d: %s\n", fnum, nt_errstr(status));
2915         }
2916
2917         return 0;
2918 }
2919
2920 static int cmd_unlock(void)
2921 {
2922         TALLOC_CTX *ctx = talloc_tos();
2923         char *buf = NULL;
2924         uint64_t start, len;
2925         int fnum;
2926         NTSTATUS status;
2927
2928         if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL)) {
2929                 d_printf("unlock <fnum> <hex-start> <hex-len>\n");
2930                 return 1;
2931         }
2932         fnum = atoi(buf);
2933
2934         if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL)) {
2935                 d_printf("unlock <fnum> <hex-start> <hex-len>\n");
2936                 return 1;
2937         }
2938
2939         start = (uint64_t)strtol(buf, (char **)NULL, 16);
2940
2941         if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL)) {
2942                 d_printf("unlock <fnum> <hex-start> <hex-len>\n");
2943                 return 1;
2944         }
2945
2946         len = (uint64_t)strtol(buf, (char **)NULL, 16);
2947
2948         status = cli_posix_unlock(cli, fnum, start, len);
2949         if (!NT_STATUS_IS_OK(status)) {
2950                 d_printf("unlock failed %d: %s\n", fnum, nt_errstr(status));
2951         }
2952
2953         return 0;
2954 }
2955
2956
2957 /****************************************************************************
2958  Remove a directory.
2959 ****************************************************************************/
2960
2961 static int cmd_rmdir(void)
2962 {
2963         TALLOC_CTX *ctx = talloc_tos();
2964         char *mask = NULL;
2965         char *buf = NULL;
2966         char *targetname = NULL;
2967         struct cli_state *targetcli;
2968         NTSTATUS status;
2969
2970         if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL)) {
2971                 d_printf("rmdir <dirname>\n");
2972                 return 1;
2973         }
2974         mask = talloc_asprintf(ctx,
2975                         "%s%s",
2976                         client_get_cur_dir(),
2977                         buf);
2978         if (!mask) {
2979                 return 1;
2980         }
2981
2982         status = cli_resolve_path(ctx, "", auth_info, cli, mask, &targetcli,
2983                                   &targetname);
2984         if (!NT_STATUS_IS_OK(status)) {
2985                 d_printf("rmdir %s: %s\n", mask, nt_errstr(status));
2986                 return 1;
2987         }
2988
2989         status = cli_rmdir(targetcli, targetname);
2990         if (!NT_STATUS_IS_OK(status)) {
2991                 d_printf("%s removing remote directory file %s\n",
2992                          nt_errstr(status), mask);
2993         }
2994
2995         return 0;
2996 }
2997
2998 /****************************************************************************
2999  UNIX hardlink.
3000 ****************************************************************************/
3001
3002 static int cmd_link(void)
3003 {
3004         TALLOC_CTX *ctx = talloc_tos();
3005         char *oldname = NULL;
3006         char *newname = NULL;
3007         char *buf = NULL;
3008         char *buf2 = NULL;
3009         char *targetname = NULL;
3010         struct cli_state *targetcli;
3011         NTSTATUS status;
3012
3013         if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL) ||
3014             !next_token_talloc(ctx, &cmd_ptr,&buf2,NULL)) {
3015                 d_printf("link <oldname> <newname>\n");
3016                 return 1;
3017         }
3018         oldname = talloc_asprintf(ctx,
3019                         "%s%s",
3020                         client_get_cur_dir(),
3021                         buf);
3022         if (!oldname) {
3023                 return 1;
3024         }
3025         newname = talloc_asprintf(ctx,
3026                         "%s%s",
3027                         client_get_cur_dir(),
3028                         buf2);
3029         if (!newname) {
3030                 return 1;
3031         }
3032
3033         status = cli_resolve_path(ctx, "", auth_info, cli, oldname, &targetcli,
3034                                   &targetname);
3035         if (!NT_STATUS_IS_OK(status)) {
3036                 d_printf("link %s: %s\n", oldname, nt_errstr(status));
3037                 return 1;
3038         }
3039
3040         if (!SERVER_HAS_UNIX_CIFS(targetcli)) {
3041                 d_printf("Server doesn't support UNIX CIFS calls.\n");
3042                 return 1;
3043         }
3044
3045         status = cli_posix_hardlink(targetcli, targetname, newname);
3046         if (!NT_STATUS_IS_OK(status)) {
3047                 d_printf("%s linking files (%s -> %s)\n",
3048                          nt_errstr(status), newname, oldname);
3049                 return 1;
3050         }
3051         return 0;
3052 }
3053
3054 /****************************************************************************
3055  UNIX readlink.
3056 ****************************************************************************/
3057
3058 static int cmd_readlink(void)
3059 {
3060         TALLOC_CTX *ctx = talloc_tos();
3061         char *name= NULL;
3062         char *buf = NULL;
3063         char *targetname = NULL;
3064         char linkname[PATH_MAX+1];
3065         struct cli_state *targetcli;
3066         NTSTATUS status;
3067
3068         if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL)) {
3069                 d_printf("readlink <name>\n");
3070                 return 1;
3071         }
3072         name = talloc_asprintf(ctx,
3073                         "%s%s",
3074                         client_get_cur_dir(),
3075                         buf);
3076         if (!name) {
3077                 return 1;
3078         }
3079
3080         status = cli_resolve_path(ctx, "", auth_info, cli, name, &targetcli,
3081                                   &targetname);
3082         if (!NT_STATUS_IS_OK(status)) {
3083                 d_printf("readlink %s: %s\n", name, nt_errstr(status));
3084                 return 1;
3085         }
3086
3087         if (!SERVER_HAS_UNIX_CIFS(targetcli)) {
3088                 d_printf("Server doesn't support UNIX CIFS calls.\n");
3089                 return 1;
3090         }
3091
3092         status = cli_posix_readlink(targetcli, name, linkname, PATH_MAX+1);
3093         if (!NT_STATUS_IS_OK(status)) {
3094                 d_printf("%s readlink on file %s\n",
3095                          nt_errstr(status), name);
3096                 return 1;
3097         }
3098
3099         d_printf("%s -> %s\n", name, linkname);
3100
3101         return 0;
3102 }
3103
3104
3105 /****************************************************************************
3106  UNIX symlink.
3107 ****************************************************************************/
3108
3109 static int cmd_symlink(void)
3110 {
3111         TALLOC_CTX *ctx = talloc_tos();
3112         char *oldname = NULL;
3113         char *newname = NULL;
3114         char *buf = NULL;
3115         char *buf2 = NULL;
3116         struct cli_state *newcli;
3117         NTSTATUS status;
3118
3119         if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL) ||
3120             !next_token_talloc(ctx, &cmd_ptr,&buf2,NULL)) {
3121                 d_printf("symlink <oldname> <newname>\n");
3122                 return 1;
3123         }
3124         /* Oldname (link target) must be an untouched blob. */
3125         oldname = buf;
3126
3127         if (SERVER_HAS_UNIX_CIFS(cli)) {
3128                 newname = talloc_asprintf(ctx, "%s%s", client_get_cur_dir(),
3129                                           buf2);
3130                 if (!newname) {
3131                         return 1;
3132                 }
3133                 /* New name must be present in share namespace. */
3134                 status = cli_resolve_path(ctx, "", auth_info, cli, newname,
3135                                           &newcli, &newname);
3136                 if (!NT_STATUS_IS_OK(status)) {
3137                         d_printf("link %s: %s\n", oldname, nt_errstr(status));
3138                         return 1;
3139                 }
3140                 status = cli_posix_symlink(newcli, oldname, newname);
3141         } else {
3142                 status = cli_symlink(
3143                         cli, oldname, buf2,
3144                         buf2[0] == '\\' ? 0 : SYMLINK_FLAG_RELATIVE);
3145         }
3146
3147         if (!NT_STATUS_IS_OK(status)) {
3148                 d_printf("%s symlinking files (%s -> %s)\n",
3149                          nt_errstr(status), oldname, newname);
3150                 return 1;
3151         }
3152
3153         return 0;
3154 }
3155
3156 /****************************************************************************
3157  UNIX chmod.
3158 ****************************************************************************/
3159
3160 static int cmd_chmod(void)
3161 {
3162         TALLOC_CTX *ctx = talloc_tos();
3163         char *src = NULL;
3164         char *buf = NULL;
3165         char *buf2 = NULL;
3166         char *targetname = NULL;
3167         struct cli_state *targetcli;
3168         mode_t mode;
3169         NTSTATUS status;
3170
3171         if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL) ||
3172             !next_token_talloc(ctx, &cmd_ptr,&buf2,NULL)) {
3173                 d_printf("chmod mode file\n");
3174                 return 1;
3175         }
3176         src = talloc_asprintf(ctx,
3177                         "%s%s",
3178                         client_get_cur_dir(),
3179                         buf2);
3180         if (!src) {
3181                 return 1;
3182         }
3183
3184         mode = (mode_t)strtol(buf, NULL, 8);
3185
3186         status = cli_resolve_path(ctx, "", auth_info, cli, src, &targetcli,
3187                                   &targetname);
3188         if (!NT_STATUS_IS_OK(status)) {
3189                 d_printf("chmod %s: %s\n", src, nt_errstr(status));
3190                 return 1;
3191         }
3192
3193         if (!SERVER_HAS_UNIX_CIFS(targetcli)) {
3194                 d_printf("Server doesn't support UNIX CIFS calls.\n");
3195                 return 1;
3196         }
3197
3198         status = cli_posix_chmod(targetcli, targetname, mode);
3199         if (!NT_STATUS_IS_OK(status)) {
3200                 d_printf("%s chmod file %s 0%o\n",
3201                          nt_errstr(status), src, (unsigned int)mode);
3202                 return 1;
3203         }
3204
3205         return 0;
3206 }
3207
3208 static const char *filetype_to_str(mode_t mode)
3209 {
3210         if (S_ISREG(mode)) {
3211                 return "regular file";
3212         } else if (S_ISDIR(mode)) {
3213                 return "directory";
3214         } else
3215 #ifdef S_ISCHR
3216         if (S_ISCHR(mode)) {
3217                 return "character device";
3218         } else
3219 #endif
3220 #ifdef S_ISBLK
3221         if (S_ISBLK(mode)) {
3222                 return "block device";
3223         } else
3224 #endif
3225 #ifdef S_ISFIFO
3226         if (S_ISFIFO(mode)) {
3227                 return "fifo";
3228         } else
3229 #endif
3230 #ifdef S_ISLNK
3231         if (S_ISLNK(mode)) {
3232                 return "symbolic link";
3233         } else
3234 #endif
3235 #ifdef S_ISSOCK
3236         if (S_ISSOCK(mode)) {
3237                 return "socket";
3238         } else
3239 #endif
3240         return "";
3241 }
3242
3243 static char rwx_to_str(mode_t m, mode_t bt, char ret)
3244 {
3245         if (m & bt) {
3246                 return ret;
3247         } else {
3248                 return '-';
3249         }
3250 }
3251
3252 static char *unix_mode_to_str(char *s, mode_t m)
3253 {
3254         char *p = s;
3255         const char *str = filetype_to_str(m);
3256
3257         switch(str[0]) {
3258                 case 'd':
3259                         *p++ = 'd';
3260                         break;
3261                 case 'c':
3262                         *p++ = 'c';
3263                         break;
3264                 case 'b':
3265                         *p++ = 'b';
3266                         break;
3267                 case 'f':
3268                         *p++ = 'p';
3269                         break;
3270                 case 's':
3271                         *p++ = str[1] == 'y' ? 'l' : 's';
3272                         break;
3273                 case 'r':
3274                 default:
3275                         *p++ = '-';
3276                         break;
3277         }
3278         *p++ = rwx_to_str(m, S_IRUSR, 'r');
3279         *p++ = rwx_to_str(m, S_IWUSR, 'w');
3280         *p++ = rwx_to_str(m, S_IXUSR, 'x');
3281         *p++ = rwx_to_str(m, S_IRGRP, 'r');
3282         *p++ = rwx_to_str(m, S_IWGRP, 'w');
3283         *p++ = rwx_to_str(m, S_IXGRP, 'x');
3284         *p++ = rwx_to_str(m, S_IROTH, 'r');
3285         *p++ = rwx_to_str(m, S_IWOTH, 'w');
3286         *p++ = rwx_to_str(m, S_IXOTH, 'x');
3287         *p++ = '\0';
3288         return s;
3289 }
3290
3291 /****************************************************************************
3292  Utility function for UNIX getfacl.
3293 ****************************************************************************/
3294
3295 static char *perms_to_string(fstring permstr, unsigned char perms)
3296 {
3297         fstrcpy(permstr, "---");
3298         if (perms & SMB_POSIX_ACL_READ) {
3299                 permstr[0] = 'r';
3300         }
3301         if (perms & SMB_POSIX_ACL_WRITE) {
3302                 permstr[1] = 'w';
3303         }
3304         if (perms & SMB_POSIX_ACL_EXECUTE) {
3305                 permstr[2] = 'x';
3306         }
3307         return permstr;
3308 }
3309
3310 /****************************************************************************
3311  UNIX getfacl.
3312 ****************************************************************************/
3313
3314 static int cmd_getfacl(void)
3315 {
3316         TALLOC_CTX *ctx = talloc_tos();
3317         char *src = NULL;
3318         char *name = NULL;
3319         char *targetname = NULL;
3320         struct cli_state *targetcli;
3321         uint16 major, minor;
3322         uint32 caplow, caphigh;
3323         char *retbuf = NULL;
3324         size_t rb_size = 0;
3325         SMB_STRUCT_STAT sbuf;
3326         uint16 num_file_acls = 0;
3327         uint16 num_dir_acls = 0;
3328         uint16 i;
3329         NTSTATUS status;
3330
3331         if (!next_token_talloc(ctx, &cmd_ptr,&name,NULL)) {
3332                 d_printf("getfacl filename\n");
3333                 return 1;
3334         }
3335         src = talloc_asprintf(ctx,
3336                         "%s%s",
3337                         client_get_cur_dir(),
3338                         name);
3339         if (!src) {
3340                 return 1;
3341         }
3342
3343         status = cli_resolve_path(ctx, "", auth_info, cli, src, &targetcli,
3344                                   &targetname);
3345         if (!NT_STATUS_IS_OK(status)) {
3346                 d_printf("stat %s: %s\n", src, nt_errstr(status));
3347                 return 1;
3348         }
3349
3350         if (!SERVER_HAS_UNIX_CIFS(targetcli)) {
3351                 d_printf("Server doesn't support UNIX CIFS calls.\n");
3352                 return 1;
3353         }
3354
3355         status = cli_unix_extensions_version(targetcli, &major, &minor,
3356                                              &caplow, &caphigh);
3357         if (!NT_STATUS_IS_OK(status)) {
3358                 d_printf("Can't get UNIX CIFS version from server: %s.\n",
3359                          nt_errstr(status));
3360                 return 1;
3361         }
3362
3363         if (!(caplow & CIFS_UNIX_POSIX_ACLS_CAP)) {
3364                 d_printf("This server supports UNIX extensions "
3365                         "but doesn't support POSIX ACLs.\n");
3366                 return 1;
3367         }
3368
3369         status = cli_posix_stat(targetcli, targetname, &sbuf);
3370         if (!NT_STATUS_IS_OK(cli_posix_stat(targetcli, targetname, &sbuf))) {
3371                 d_printf("%s getfacl doing a stat on file %s\n",
3372                          nt_errstr(status), src);
3373                 return 1;
3374         }
3375
3376         status = cli_posix_getfacl(targetcli, targetname, ctx, &rb_size, &retbuf);
3377         if (!NT_STATUS_IS_OK(status)) {
3378                 d_printf("%s getfacl file %s\n",
3379                          nt_errstr(status), src);
3380                 return 1;
3381         }
3382
3383         /* ToDo : Print out the ACL values. */
3384         if (rb_size < 6 || SVAL(retbuf,0) != SMB_POSIX_ACL_VERSION) {
3385                 d_printf("getfacl file %s, unknown POSIX acl version %u.\n",
3386                         src, (unsigned int)CVAL(retbuf,0) );
3387                 return 1;
3388         }
3389
3390         num_file_acls = SVAL(retbuf,2);
3391         num_dir_acls = SVAL(retbuf,4);
3392         if (rb_size != SMB_POSIX_ACL_HEADER_SIZE + SMB_POSIX_ACL_ENTRY_SIZE*(num_file_acls+num_dir_acls)) {
3393                 d_printf("getfacl file %s, incorrect POSIX acl buffer size (should be %u, was %u).\n",
3394                         src,
3395                         (unsigned int)(SMB_POSIX_ACL_HEADER_SIZE + SMB_POSIX_ACL_ENTRY_SIZE*(num_file_acls+num_dir_acls)),
3396                         (unsigned int)rb_size);
3397                 return 1;
3398         }
3399
3400         d_printf("# file: %s\n", src);
3401         d_printf("# owner: %u\n# group: %u\n", (unsigned int)sbuf.st_ex_uid, (unsigned int)sbuf.st_ex_gid);
3402
3403         if (num_file_acls == 0 && num_dir_acls == 0) {
3404                 d_printf("No acls found.\n");
3405         }
3406
3407         for (i = 0; i < num_file_acls; i++) {
3408                 uint32 uorg;
3409                 fstring permstring;
3410                 unsigned char tagtype = CVAL(retbuf, SMB_POSIX_ACL_HEADER_SIZE+(i*SMB_POSIX_ACL_ENTRY_SIZE));
3411                 unsigned char perms = CVAL(retbuf, SMB_POSIX_ACL_HEADER_SIZE+(i*SMB_POSIX_ACL_ENTRY_SIZE)+1);
3412
3413                 switch(tagtype) {
3414                         case SMB_POSIX_ACL_USER_OBJ:
3415                                 d_printf("user::");
3416                                 break;
3417                         case SMB_POSIX_ACL_USER:
3418                                 uorg = IVAL(retbuf,SMB_POSIX_ACL_HEADER_SIZE+(i*SMB_POSIX_ACL_ENTRY_SIZE)+2);
3419                                 d_printf("user:%u:", uorg);
3420                                 break;
3421                         case SMB_POSIX_ACL_GROUP_OBJ:
3422                                 d_printf("group::");
3423                                 break;
3424                         case SMB_POSIX_ACL_GROUP:
3425                                 uorg = IVAL(retbuf,SMB_POSIX_ACL_HEADER_SIZE+(i*SMB_POSIX_ACL_ENTRY_SIZE)+2);
3426                                 d_printf("group:%u:", uorg);
3427                                 break;
3428                         case SMB_POSIX_ACL_MASK:
3429                                 d_printf("mask::");
3430                                 break;
3431                         case SMB_POSIX_ACL_OTHER:
3432                                 d_printf("other::");
3433                                 break;
3434                         default:
3435                                 d_printf("getfacl file %s, incorrect POSIX acl tagtype (%u).\n",
3436                                         src, (unsigned int)tagtype );
3437                                 SAFE_FREE(retbuf);
3438                                 return 1;
3439                 }
3440
3441                 d_printf("%s\n", perms_to_string(permstring, perms));
3442         }
3443
3444         for (i = 0; i < num_dir_acls; i++) {
3445                 uint32 uorg;
3446                 fstring permstring;
3447                 unsigned char tagtype = CVAL(retbuf, SMB_POSIX_ACL_HEADER_SIZE+((i+num_file_acls)*SMB_POSIX_ACL_ENTRY_SIZE));
3448                 unsigned char perms = CVAL(retbuf, SMB_POSIX_ACL_HEADER_SIZE+((i+num_file_acls)*SMB_POSIX_ACL_ENTRY_SIZE)+1);
3449
3450                 switch(tagtype) {
3451                         case SMB_POSIX_ACL_USER_OBJ:
3452                                 d_printf("default:user::");
3453                                 break;
3454                         case SMB_POSIX_ACL_USER:
3455                                 uorg = IVAL(retbuf,SMB_POSIX_ACL_HEADER_SIZE+((i+num_file_acls)*SMB_POSIX_ACL_ENTRY_SIZE)+2);
3456                                 d_printf("default:user:%u:", uorg);
3457                                 break;
3458                         case SMB_POSIX_ACL_GROUP_OBJ:
3459                                 d_printf("default:group::");
3460                                 break;
3461                         case SMB_POSIX_ACL_GROUP:
3462                                 uorg = IVAL(retbuf,SMB_POSIX_ACL_HEADER_SIZE+((i+num_file_acls)*SMB_POSIX_ACL_ENTRY_SIZE)+2);
3463                                 d_printf("default:group:%u:", uorg);
3464                                 break;
3465                         case SMB_POSIX_ACL_MASK:
3466                                 d_printf("default:mask::");
3467                                 break;
3468                         case SMB_POSIX_ACL_OTHER:
3469                                 d_printf("default:other::");
3470                                 break;
3471                         default:
3472                                 d_printf("getfacl file %s, incorrect POSIX acl tagtype (%u).\n",
3473                                         src, (unsigned int)tagtype );
3474                                 SAFE_FREE(retbuf);
3475                                 return 1;
3476                 }
3477
3478                 d_printf("%s\n", perms_to_string(permstring, perms));
3479         }
3480
3481         return 0;
3482 }
3483
3484 /****************************************************************************
3485  Get the EA list of a file
3486 ****************************************************************************/
3487
3488 static int cmd_geteas(void)
3489 {
3490         TALLOC_CTX *ctx = talloc_tos();
3491         char *src = NULL;
3492         char *name = NULL;
3493         char *targetname = NULL;
3494         struct cli_state *targetcli;
3495         NTSTATUS status;
3496         size_t i, num_eas;
3497         struct ea_struct *eas;
3498
3499         if (!next_token_talloc(ctx, &cmd_ptr,&name,NULL)) {
3500                 d_printf("geteas filename\n");
3501                 return 1;
3502         }
3503         src = talloc_asprintf(ctx,
3504                         "%s%s",
3505                         client_get_cur_dir(),
3506                         name);
3507         if (!src) {
3508                 return 1;
3509         }
3510
3511         status = cli_resolve_path(ctx, "", auth_info, cli, src, &targetcli,
3512                                   &targetname);
3513         if (!NT_STATUS_IS_OK(status)) {
3514                 d_printf("stat %s: %s\n", src, nt_errstr(status));
3515                 return 1;
3516         }
3517
3518         status = cli_get_ea_list_path(targetcli, targetname, talloc_tos(),
3519                                       &num_eas, &eas);
3520         if (!NT_STATUS_IS_OK(status)) {
3521                 d_printf("cli_get_ea_list_path: %s\n", nt_errstr(status));
3522                 return 1;
3523         }
3524
3525         for (i=0; i<num_eas; i++) {
3526                 d_printf("%s (%d) =\n", eas[i].name, (int)eas[i].flags);
3527                 dump_data_file(eas[i].value.data, eas[i].value.length, false,
3528                                stdout);
3529                 d_printf("\n");
3530         }
3531
3532         TALLOC_FREE(eas);
3533
3534         return 0;
3535 }
3536
3537 /****************************************************************************
3538  Set an EA of a file
3539 ****************************************************************************/
3540
3541 static int cmd_setea(void)
3542 {
3543         TALLOC_CTX *ctx = talloc_tos();
3544         char *src = NULL;
3545         char *name = NULL;
3546         char *eaname = NULL;
3547         char *eavalue = NULL;
3548         char *targetname = NULL;
3549         struct cli_state *targetcli;
3550         NTSTATUS status;
3551
3552         if (!next_token_talloc(ctx, &cmd_ptr, &name, NULL)
3553             || !next_token_talloc(ctx, &cmd_ptr, &eaname, NULL)) {
3554                 d_printf("setea filename eaname value\n");
3555                 return 1;
3556         }
3557         if (!next_token_talloc(ctx, &cmd_ptr, &eavalue, NULL)) {
3558                 eavalue = talloc_strdup(ctx, "");
3559         }
3560         src = talloc_asprintf(ctx,
3561                         "%s%s",
3562                         client_get_cur_dir(),
3563                         name);
3564         if (!src) {
3565                 return 1;
3566         }
3567
3568         status = cli_resolve_path(ctx, "", auth_info, cli, src, &targetcli,
3569                                   &targetname);
3570         if (!NT_STATUS_IS_OK(status)) {
3571                 d_printf("stat %s: %s\n", src, nt_errstr(status));
3572                 return 1;
3573         }
3574
3575         status =  cli_set_ea_path(targetcli, targetname, eaname, eavalue,
3576                                   strlen(eavalue));
3577         if (!NT_STATUS_IS_OK(status)) {
3578                 d_printf("set_ea %s: %s\n", src, nt_errstr(status));
3579                 return 1;
3580         }
3581
3582         return 0;
3583 }
3584
3585 /****************************************************************************
3586  UNIX stat.
3587 ****************************************************************************/
3588
3589 static int cmd_stat(void)
3590 {
3591         TALLOC_CTX *ctx = talloc_tos();
3592         char *src = NULL;
3593         char *name = NULL;
3594         char *targetname = NULL;
3595         struct cli_state *targetcli;
3596         fstring mode_str;
3597         SMB_STRUCT_STAT sbuf;
3598         struct tm *lt;
3599         time_t tmp_time;
3600         NTSTATUS status;
3601
3602         if (!next_token_talloc(ctx, &cmd_ptr,&name,NULL)) {
3603                 d_printf("stat file\n");
3604                 return 1;
3605         }
3606         src = talloc_asprintf(ctx,
3607                         "%s%s",
3608                         client_get_cur_dir(),
3609                         name);
3610         if (!src) {
3611                 return 1;
3612         }
3613
3614         status = cli_resolve_path(ctx, "", auth_info, cli, src, &targetcli,
3615                                   &targetname);
3616         if (!NT_STATUS_IS_OK(status)) {
3617                 d_printf("stat %s: %s\n", src, nt_errstr(status));
3618                 return 1;
3619         }
3620
3621         if (!SERVER_HAS_UNIX_CIFS(targetcli)) {
3622                 d_printf("Server doesn't support UNIX CIFS calls.\n");
3623                 return 1;
3624         }
3625
3626         status = cli_posix_stat(targetcli, targetname, &sbuf);
3627         if (!NT_STATUS_IS_OK(status)) {
3628                 d_printf("%s stat file %s\n",
3629                          nt_errstr(status), src);
3630                 return 1;
3631         }
3632
3633         /* Print out the stat values. */
3634         d_printf("File: %s\n", src);
3635         d_printf("Size: %-12.0f\tBlocks: %u\t%s\n",
3636                 (double)sbuf.st_ex_size,
3637                 (unsigned int)sbuf.st_ex_blocks,
3638                 filetype_to_str(sbuf.st_ex_mode));
3639
3640 #if defined(S_ISCHR) && defined(S_ISBLK)
3641         if (S_ISCHR(sbuf.st_ex_mode) || S_ISBLK(sbuf.st_ex_mode)) {
3642                 d_printf("Inode: %.0f\tLinks: %u\tDevice type: %u,%u\n",
3643                         (double)sbuf.st_ex_ino,
3644                         (unsigned int)sbuf.st_ex_nlink,
3645                         unix_dev_major(sbuf.st_ex_rdev),
3646                         unix_dev_minor(sbuf.st_ex_rdev));
3647         } else
3648 #endif
3649                 d_printf("Inode: %.0f\tLinks: %u\n",
3650                         (double)sbuf.st_ex_ino,
3651                         (unsigned int)sbuf.st_ex_nlink);
3652
3653         d_printf("Access: (0%03o/%s)\tUid: %u\tGid: %u\n",
3654                 ((int)sbuf.st_ex_mode & 0777),
3655                 unix_mode_to_str(mode_str, sbuf.st_ex_mode),
3656                 (unsigned int)sbuf.st_ex_uid,
3657                 (unsigned int)sbuf.st_ex_gid);
3658
3659         tmp_time = convert_timespec_to_time_t(sbuf.st_ex_atime);
3660         lt = localtime(&tmp_time);
3661         if (lt) {
3662                 strftime(mode_str, sizeof(mode_str), "%Y-%m-%d %T %z", lt);
3663         } else {
3664                 fstrcpy(mode_str, "unknown");
3665         }
3666         d_printf("Access: %s\n", mode_str);
3667
3668         tmp_time = convert_timespec_to_time_t(sbuf.st_ex_mtime);
3669         lt = localtime(&tmp_time);
3670         if (lt) {
3671                 strftime(mode_str, sizeof(mode_str), "%Y-%m-%d %T %z", lt);
3672         } else {
3673                 fstrcpy(mode_str, "unknown");
3674         }
3675         d_printf("Modify: %s\n", mode_str);
3676
3677         tmp_time = convert_timespec_to_time_t(sbuf.st_ex_ctime);
3678         lt = localtime(&tmp_time);
3679         if (lt) {
3680                 strftime(mode_str, sizeof(mode_str), "%Y-%m-%d %T %z", lt);
3681         } else {
3682                 fstrcpy(mode_str, "unknown");
3683         }
3684         d_printf("Change: %s\n", mode_str);
3685
3686         return 0;
3687 }
3688
3689
3690 /****************************************************************************
3691  UNIX chown.
3692 ****************************************************************************/
3693
3694 static int cmd_chown(void)
3695 {
3696         TALLOC_CTX *ctx = talloc_tos();
3697         char *src = NULL;
3698         uid_t uid;
3699         gid_t gid;
3700         char *buf, *buf2, *buf3;
3701         struct cli_state *targetcli;
3702         char *targetname = NULL;
3703         NTSTATUS status;
3704
3705         if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL) ||
3706             !next_token_talloc(ctx, &cmd_ptr,&buf2,NULL) ||
3707             !next_token_talloc(ctx, &cmd_ptr,&buf3,NULL)) {
3708                 d_printf("chown uid gid file\n");
3709                 return 1;
3710         }
3711
3712         uid = (uid_t)atoi(buf);
3713         gid = (gid_t)atoi(buf2);
3714
3715         src = talloc_asprintf(ctx,
3716                         "%s%s",
3717                         client_get_cur_dir(),
3718                         buf3);
3719         if (!src) {
3720                 return 1;
3721         }
3722         status = cli_resolve_path(ctx, "", auth_info, cli, src, &targetcli,
3723                                   &targetname);
3724         if (!NT_STATUS_IS_OK(status)) {
3725                 d_printf("chown %s: %s\n", src, nt_errstr(status));
3726                 return 1;
3727         }
3728
3729         if (!SERVER_HAS_UNIX_CIFS(targetcli)) {
3730                 d_printf("Server doesn't support UNIX CIFS calls.\n");
3731                 return 1;
3732         }
3733
3734         status = cli_posix_chown(targetcli, targetname, uid, gid);
3735         if (!NT_STATUS_IS_OK(status)) {
3736                 d_printf("%s chown file %s uid=%d, gid=%d\n",
3737                          nt_errstr(status), src, (int)uid, (int)gid);
3738                 return 1;
3739         }
3740
3741         return 0;
3742 }
3743
3744 /****************************************************************************
3745  Rename some file.
3746 ****************************************************************************/
3747
3748 static int cmd_rename(void)
3749 {
3750         TALLOC_CTX *ctx = talloc_tos();
3751         char *src, *dest;
3752         char *buf, *buf2;
3753         struct cli_state *targetcli;
3754         char *targetsrc;
3755         char *targetdest;
3756         NTSTATUS status;
3757
3758         if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL) ||
3759             !next_token_talloc(ctx, &cmd_ptr,&buf2,NULL)) {
3760                 d_printf("rename <src> <dest>\n");
3761                 return 1;
3762         }
3763
3764         src = talloc_asprintf(ctx,
3765                         "%s%s",
3766                         client_get_cur_dir(),
3767                         buf);
3768         if (!src) {
3769                 return 1;
3770         }
3771
3772         dest = talloc_asprintf(ctx,
3773                         "%s%s",
3774                         client_get_cur_dir(),
3775                         buf2);
3776         if (!dest) {
3777                 return 1;
3778         }
3779
3780         status = cli_resolve_path(ctx, "", auth_info, cli, src, &targetcli,
3781                                   &targetsrc);
3782         if (!NT_STATUS_IS_OK(status)) {
3783                 d_printf("rename %s: %s\n", src, nt_errstr(status));
3784                 return 1;
3785         }
3786
3787         status = cli_resolve_path(ctx, "", auth_info, cli, dest, &targetcli,
3788                                   &targetdest);
3789         if (!NT_STATUS_IS_OK(status)) {
3790                 d_printf("rename %s: %s\n", dest, nt_errstr(status));
3791                 return 1;
3792         }
3793
3794         status = cli_rename(targetcli, targetsrc, targetdest);
3795         if (!NT_STATUS_IS_OK(status)) {
3796                 d_printf("%s renaming files %s -> %s \n",
3797                         nt_errstr(status),
3798                         targetsrc,
3799                         targetdest);
3800                 return 1;
3801         }
3802
3803         return 0;
3804 }
3805
3806 /****************************************************************************
3807  Print the volume name.
3808 ****************************************************************************/
3809
3810 static int cmd_volume(void)
3811 {
3812         char *volname;
3813         uint32_t serial_num;
3814         time_t create_date;
3815         NTSTATUS status;
3816
3817         status = cli_get_fs_volume_info(cli, talloc_tos(),
3818                                         &volname, &serial_num,
3819                                         &create_date);
3820         if (!NT_STATUS_IS_OK(status)) {
3821                 d_printf("Error %s getting volume info\n", nt_errstr(status));
3822                 return 1;
3823         }
3824
3825         d_printf("Volume: |%s| serial number 0x%x\n",
3826                         volname, (unsigned int)serial_num);
3827         return 0;
3828 }
3829
3830 /****************************************************************************
3831  Hard link files using the NT call.
3832 ****************************************************************************/
3833
3834 static int cmd_hardlink(void)
3835 {
3836         TALLOC_CTX *ctx = talloc_tos();
3837         char *src, *dest;
3838         char *buf, *buf2;
3839         struct cli_state *targetcli;
3840         char *targetname;
3841         NTSTATUS status;
3842
3843         if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL) ||
3844             !next_token_talloc(ctx, &cmd_ptr,&buf2,NULL)) {
3845                 d_printf("hardlink <src> <dest>\n");
3846                 return 1;
3847         }
3848
3849         src = talloc_asprintf(ctx,
3850                         "%s%s",
3851                         client_get_cur_dir(),
3852                         buf);
3853         if (!src) {
3854                 return 1;
3855         }
3856
3857         dest = talloc_asprintf(ctx,
3858                         "%s%s",
3859                         client_get_cur_dir(),
3860                         buf2);
3861         if (!dest) {
3862                 return 1;
3863         }
3864
3865         status = cli_resolve_path(ctx, "", auth_info, cli, src, &targetcli,
3866                                   &targetname);
3867         if (!NT_STATUS_IS_OK(status)) {
3868                 d_printf("hardlink %s: %s\n", src, nt_errstr(status));
3869                 return 1;
3870         }
3871
3872         status = cli_nt_hardlink(targetcli, targetname, dest);
3873         if (!NT_STATUS_IS_OK(status)) {
3874                 d_printf("%s doing an NT hard link of files\n",
3875                          nt_errstr(status));
3876                 return 1;
3877         }
3878
3879         return 0;
3880 }
3881
3882 /****************************************************************************
3883  Toggle the prompt flag.
3884 ****************************************************************************/
3885
3886 static int cmd_prompt(void)
3887 {
3888         prompt = !prompt;
3889         DEBUG(2,("prompting is now %s\n",prompt?"on":"off"));
3890         return 1;
3891 }
3892
3893 /****************************************************************************
3894  Set the newer than time.
3895 ****************************************************************************/
3896
3897 static int cmd_newer(void)
3898 {
3899         TALLOC_CTX *ctx = talloc_tos();
3900         char *buf;
3901         bool ok;
3902         SMB_STRUCT_STAT sbuf;
3903
3904         ok = next_token_talloc(ctx, &cmd_ptr,&buf,NULL);
3905         if (ok && (sys_stat(buf, &sbuf, false) == 0)) {
3906                 newer_than = convert_timespec_to_time_t(sbuf.st_ex_mtime);
3907                 DEBUG(1,("Getting files newer than %s",
3908                          time_to_asc(newer_than)));
3909         } else {
3910                 newer_than = 0;
3911         }
3912
3913         if (ok && newer_than == 0) {
3914                 d_printf("Error setting newer-than time\n");
3915                 return 1;
3916         }
3917
3918         return 0;
3919 }
3920
3921 /****************************************************************************
3922  Watch directory changes
3923 ****************************************************************************/
3924
3925 static int cmd_notify(void)
3926 {
3927         TALLOC_CTX *frame = talloc_stackframe();
3928         char *name, *buf;
3929         NTSTATUS status;
3930         uint16_t fnum;
3931
3932         name = talloc_strdup(talloc_tos(), client_get_cur_dir());
3933         if (name == NULL) {
3934                 goto fail;
3935         }
3936         if (!next_token_talloc(talloc_tos(), &cmd_ptr, &buf, NULL)) {
3937                 goto usage;
3938         }
3939         name = talloc_asprintf_append(name, "%s", buf);
3940         if (name == NULL) {
3941                 goto fail;
3942         }
3943         status = cli_ntcreate(
3944                 cli, name, 0, FILE_READ_DATA, 0,
3945                 FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE,
3946                 FILE_OPEN, 0, 0, &fnum);
3947         if (!NT_STATUS_IS_OK(status)) {
3948                 d_printf("Could not open file: %s\n", nt_errstr(status));
3949                 goto fail;
3950         }
3951
3952         while (1) {
3953                 uint32_t i, num_changes;
3954                 struct notify_change *changes;
3955
3956                 status = cli_notify(cli, fnum, 1000, FILE_NOTIFY_CHANGE_ALL,
3957                                     true,
3958                                     talloc_tos(), &num_changes, &changes);
3959                 if (!NT_STATUS_IS_OK(status)) {
3960                         d_printf("notify returned %s\n",
3961                                  nt_errstr(status));
3962                         goto fail;
3963                 }
3964                 for (i=0; i<num_changes; i++) {
3965                         printf("%4.4x %s\n", changes[i].action,
3966                                changes[i].name);
3967                 }
3968                 TALLOC_FREE(changes);
3969         }
3970 usage:
3971         d_printf("notify <file>\n");
3972 fail:
3973         TALLOC_FREE(frame);
3974         return 1;
3975 }
3976
3977 /****************************************************************************
3978  Set the archive level.
3979 ****************************************************************************/
3980
3981 static int cmd_archive(void)
3982 {
3983         TALLOC_CTX *ctx = talloc_tos();
3984         char *buf;
3985
3986         if (next_token_talloc(ctx, &cmd_ptr,&buf,NULL)) {
3987                 archive_level = atoi(buf);
3988         } else {
3989                 d_printf("Archive level is %d\n",archive_level);
3990         }
3991
3992         return 0;
3993 }
3994
3995 /****************************************************************************
3996  Toggle the backup_intent state.
3997 ****************************************************************************/
3998
3999 static int cmd_backup(void)
4000 {
4001         backup_intent = !backup_intent;
4002         cli_set_backup_intent(cli, backup_intent);
4003         DEBUG(2,("backup intent is now %s\n",backup_intent?"on":"off"));
4004         return 1;
4005 }
4006
4007 /****************************************************************************
4008  Toggle the lowercaseflag.
4009 ****************************************************************************/
4010
4011 static int cmd_lowercase(void)
4012 {
4013         lowercase = !lowercase;
4014         DEBUG(2,("filename lowercasing is now %s\n",lowercase?"on":"off"));
4015         return 0;
4016 }
4017
4018 /****************************************************************************
4019  Toggle the case sensitive flag.
4020 ****************************************************************************/
4021
4022 static int cmd_setcase(void)
4023 {
4024         bool orig_case_sensitive = cli_set_case_sensitive(cli, false);
4025
4026         cli_set_case_sensitive(cli, !orig_case_sensitive);
4027         DEBUG(2,("filename case sensitivity is now %s\n",!orig_case_sensitive ?
4028                 "on":"off"));
4029         return 0;
4030 }
4031
4032 /****************************************************************************
4033  Toggle the showacls flag.
4034 ****************************************************************************/
4035
4036 static int cmd_showacls(void)
4037 {
4038         showacls = !showacls;
4039         DEBUG(2,("showacls is now %s\n",showacls?"on":"off"));
4040         return 0;
4041 }
4042
4043
4044 /****************************************************************************
4045  Toggle the recurse flag.
4046 ****************************************************************************/
4047
4048 static int cmd_recurse(void)
4049 {
4050         recurse = !recurse;
4051         DEBUG(2,("directory recursion is now %s\n",recurse?"on":"off"));
4052         return 0;
4053 }
4054
4055 /****************************************************************************
4056  Toggle the translate flag.
4057 ****************************************************************************/
4058
4059 static int cmd_translate(void)
4060 {
4061         translation = !translation;
4062         DEBUG(2,("CR/LF<->LF and print text translation now %s\n",
4063                  translation?"on":"off"));
4064         return 0;
4065 }
4066
4067 /****************************************************************************
4068  Do the lcd command.
4069  ****************************************************************************/
4070
4071 static int cmd_lcd(void)
4072 {
4073         TALLOC_CTX *ctx = talloc_tos();
4074         char *buf;
4075         char *d;
4076
4077         if (next_token_talloc(ctx, &cmd_ptr,&buf,NULL)) {
4078                 if (chdir(buf) == -1) {
4079                         d_printf("chdir to %s failed (%s)\n",
4080                                 buf, strerror(errno));
4081                 }
4082         }
4083         d = sys_getwd();
4084         if (!d) {
4085                 return 1;
4086         }
4087         DEBUG(2,("the local directory is now %s\n",d));
4088         SAFE_FREE(d);
4089         return 0;
4090 }
4091
4092 /****************************************************************************
4093  Get a file restarting at end of local file.
4094  ****************************************************************************/
4095
4096 static int cmd_reget(void)
4097 {
4098         TALLOC_CTX *ctx = talloc_tos();
4099         char *local_name = NULL;
4100         char *remote_name = NULL;
4101         char *fname = NULL;
4102         char *p = NULL;
4103
4104         remote_name = talloc_strdup(ctx, client_get_cur_dir());
4105         if (!remote_name) {
4106                 return 1;
4107         }
4108
4109         if (!next_token_talloc(ctx, &cmd_ptr, &fname, NULL)) {
4110                 d_printf("reget <filename>\n");
4111                 return 1;
4112         }
4113         remote_name = talloc_asprintf_append(remote_name, "%s", fname);
4114         if (!remote_name) {
4115                 return 1;
4116         }
4117         remote_name = clean_name(ctx,remote_name);
4118         if (!remote_name) {
4119                 return 1;
4120         }
4121
4122         local_name = fname;
4123         next_token_talloc(ctx, &cmd_ptr, &p, NULL);
4124         if (p) {
4125                 local_name = p;
4126         }
4127
4128         return do_get(remote_name, local_name, true);
4129 }
4130
4131 /****************************************************************************
4132  Put a file restarting at end of local file.
4133  ****************************************************************************/
4134
4135 static int cmd_reput(void)
4136 {
4137         TALLOC_CTX *ctx = talloc_tos();
4138         char *local_name = NULL;
4139         char *remote_name = NULL;
4140         char *buf;
4141         SMB_STRUCT_STAT st;
4142
4143         remote_name = talloc_strdup(ctx, client_get_cur_dir());
4144         if (!remote_name) {
4145                 return 1;
4146         }
4147
4148         if (!next_token_talloc(ctx, &cmd_ptr, &local_name, NULL)) {
4149                 d_printf("reput <filename>\n");
4150                 return 1;
4151         }
4152
4153         if (!file_exist_stat(local_name, &st, false)) {
4154                 d_printf("%s does not exist\n", local_name);
4155                 return 1;
4156         }
4157
4158         if (next_token_talloc(ctx, &cmd_ptr, &buf, NULL)) {
4159                 remote_name = talloc_asprintf_append(remote_name,
4160                                                 "%s", buf);
4161         } else {
4162                 remote_name = talloc_asprintf_append(remote_name,
4163                                                 "%s", local_name);
4164         }
4165         if (!remote_name) {
4166                 return 1;
4167         }
4168
4169         remote_name = clean_name(ctx, remote_name);
4170         if (!remote_name) {
4171                 return 1;
4172         }
4173
4174         return do_put(remote_name, local_name, true);
4175 }
4176
4177 /****************************************************************************
4178  List a share name.
4179  ****************************************************************************/
4180
4181 static void browse_fn(const char *name, uint32 m,
4182                       const char *comment, void *state)
4183 {
4184         const char *typestr = "";
4185
4186         switch (m & 7) {
4187         case STYPE_DISKTREE:
4188                 typestr = "Disk";
4189                 break;
4190         case STYPE_PRINTQ:
4191                 typestr = "Printer";
4192                 break;
4193         case STYPE_DEVICE:
4194                 typestr = "Device";
4195                 break;
4196         case STYPE_IPC:
4197                 typestr = "IPC";
4198                 break;
4199         }
4200         /* FIXME: If the remote machine returns non-ascii characters
4201            in any of these fields, they can corrupt the output.  We
4202            should remove them. */
4203         if (!grepable) {
4204                 d_printf("\t%-15s %-10.10s%s\n",
4205                         name,typestr,comment);
4206         } else {
4207                 d_printf ("%s|%s|%s\n",typestr,name,comment);
4208         }
4209 }
4210
4211 static bool browse_host_rpc(bool sort)
4212 {
4213         NTSTATUS status;
4214         struct rpc_pipe_client *pipe_hnd = NULL;
4215         TALLOC_CTX *frame = talloc_stackframe();
4216         WERROR werr;
4217         struct srvsvc_NetShareInfoCtr info_ctr;
4218         struct srvsvc_NetShareCtr1 ctr1;
4219         uint32_t resume_handle = 0;
4220         uint32_t total_entries = 0;
4221         int i;
4222         struct dcerpc_binding_handle *b;
4223
4224         status = cli_rpc_pipe_open_noauth(cli, &ndr_table_srvsvc,
4225                                           &pipe_hnd);
4226
4227         if (!NT_STATUS_IS_OK(status)) {
4228                 DEBUG(10, ("Could not connect to srvsvc pipe: %s\n",
4229                            nt_errstr(status)));
4230                 TALLOC_FREE(frame);
4231                 return false;
4232         }
4233
4234         b = pipe_hnd->binding_handle;
4235
4236         ZERO_STRUCT(info_ctr);
4237         ZERO_STRUCT(ctr1);
4238
4239         info_ctr.level = 1;
4240         info_ctr.ctr.ctr1 = &ctr1;
4241
4242         status = dcerpc_srvsvc_NetShareEnumAll(b, frame,
4243                                               pipe_hnd->desthost,
4244                                               &info_ctr,
4245                                               0xffffffff,
4246                                               &total_entries,
4247                                               &resume_handle,
4248                                               &werr);
4249
4250         if (!NT_STATUS_IS_OK(status) || !W_ERROR_IS_OK(werr)) {
4251                 TALLOC_FREE(pipe_hnd);
4252                 TALLOC_FREE(frame);
4253                 return false;
4254         }
4255
4256         for (i=0; i < info_ctr.ctr.ctr1->count; i++) {
4257                 struct srvsvc_NetShareInfo1 info = info_ctr.ctr.ctr1->array[i];
4258                 browse_fn(info.name, info.type, info.comment, NULL);
4259         }
4260
4261         TALLOC_FREE(pipe_hnd);
4262         TALLOC_FREE(frame);
4263         return true;
4264 }
4265
4266 /****************************************************************************
4267  Try and browse available connections on a host.
4268 ****************************************************************************/
4269
4270 static bool browse_host(bool sort)
4271 {
4272         int ret;
4273         if (!grepable) {
4274                 d_printf("\n\tSharename       Type      Comment\n");
4275                 d_printf("\t---------       ----      -------\n");
4276         }
4277
4278         if (browse_host_rpc(sort)) {
4279                 return true;
4280         }
4281
4282         if((ret = cli_RNetShareEnum(cli, browse_fn, NULL)) == -1) {
4283                 NTSTATUS status = cli_nt_error(cli);
4284                 d_printf("Error returning browse list: %s\n",
4285                          nt_errstr(status));
4286         }
4287
4288         return (ret != -1);
4289 }
4290
4291 /****************************************************************************
4292  List a server name.
4293 ****************************************************************************/
4294
4295 static void server_fn(const char *name, uint32 m,
4296                       const char *comment, void *state)
4297 {
4298
4299         if (!grepable){
4300                 d_printf("\t%-16s     %s\n", name, comment);
4301         } else {
4302                 d_printf("%s|%s|%s\n",(char *)state, name, comment);
4303         }
4304 }
4305
4306 /****************************************************************************
4307  Try and browse available connections on a host.
4308 ****************************************************************************/
4309
4310 static bool list_servers(const char *wk_grp)
4311 {
4312         fstring state;
4313
4314         if (!cli->server_domain)
4315                 return false;
4316
4317         if (!grepable) {
4318                 d_printf("\n\tServer               Comment\n");
4319                 d_printf("\t---------            -------\n");
4320         };
4321         fstrcpy( state, "Server" );
4322         cli_NetServerEnum(cli, cli->server_domain, SV_TYPE_ALL, server_fn,
4323                           state);
4324
4325         if (!grepable) {
4326                 d_printf("\n\tWorkgroup            Master\n");
4327                 d_printf("\t---------            -------\n");
4328         };
4329
4330         fstrcpy( state, "Workgroup" );
4331         cli_NetServerEnum(cli, cli->server_domain, SV_TYPE_DOMAIN_ENUM,
4332                           server_fn, state);
4333         return true;
4334 }
4335
4336 /****************************************************************************
4337  Print or set current VUID
4338 ****************************************************************************/
4339
4340 static int cmd_vuid(void)
4341 {
4342         TALLOC_CTX *ctx = talloc_tos();
4343         char *buf;
4344
4345         if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL)) {
4346                 d_printf("Current VUID is %d\n",
4347                          cli_state_get_uid(cli));
4348                 return 0;
4349         }
4350
4351         cli_state_set_uid(cli, atoi(buf));
4352         return 0;
4353 }
4354
4355 /****************************************************************************
4356  Setup a new VUID, by issuing a session setup
4357 ****************************************************************************/
4358
4359 static int cmd_logon(void)
4360 {
4361         TALLOC_CTX *ctx = talloc_tos();
4362         char *l_username, *l_password;
4363         NTSTATUS nt_status;
4364
4365         if (!next_token_talloc(ctx, &cmd_ptr,&l_username,NULL)) {
4366                 d_printf("logon <username> [<password>]\n");
4367                 return 0;
4368         }
4369
4370         if (!next_token_talloc(ctx, &cmd_ptr,&l_password,NULL)) {
4371                 char pwd[256] = {0};
4372                 int rc;
4373
4374                 rc = samba_getpass("Password: ", pwd, sizeof(pwd), false, false);
4375                 if (rc == 0) {
4376                         l_password = talloc_strdup(ctx, pwd);
4377                 }
4378         }
4379         if (!l_password) {
4380                 return 1;
4381         }
4382
4383         nt_status = cli_session_setup(cli, l_username,
4384                                       l_password, strlen(l_password),
4385                                       l_password, strlen(l_password),
4386                                       lp_workgroup());
4387         if (!NT_STATUS_IS_OK(nt_status)) {
4388                 d_printf("session setup failed: %s\n", nt_errstr(nt_status));
4389                 return -1;
4390         }
4391
4392         d_printf("Current VUID is %d\n", cli_state_get_uid(cli));
4393         return 0;
4394 }
4395
4396 /**
4397  * close the session
4398  */
4399
4400 static int cmd_logoff(void)
4401 {
4402         NTSTATUS status;
4403
4404         status = cli_ulogoff(cli);
4405         if (!NT_STATUS_IS_OK(status)) {
4406                 d_printf("logoff failed: %s\n", nt_errstr(status));
4407                 return -1;
4408         }
4409
4410         d_printf("logoff successful\n");
4411         return 0;
4412 }
4413
4414
4415 /**
4416  * tree connect (connect to a share)
4417  */
4418
4419 static int cmd_tcon(void)
4420 {
4421         TALLOC_CTX *ctx = talloc_tos();
4422         char *sharename;
4423         NTSTATUS status;
4424
4425         if (!next_token_talloc(ctx, &cmd_ptr, &sharename, NULL)) {
4426                 d_printf("tcon <sharename>\n");
4427                 return 0;
4428         }
4429
4430         if (!sharename) {
4431                 return 1;
4432         }
4433
4434         status = cli_tree_connect(cli, sharename, "?????", "", 0);
4435         if (!NT_STATUS_IS_OK(status)) {
4436                 d_printf("tcon failed: %s\n", nt_errstr(status));
4437                 return -1;
4438         }
4439
4440         talloc_free(sharename);
4441
4442         d_printf("tcon to %s successful, tid: %u\n", sharename,
4443                  cli_state_get_tid(cli));
4444         return 0;
4445 }
4446
4447 /**
4448  * tree disconnect (disconnect from a share)
4449  */
4450
4451 static int cmd_tdis(void)
4452 {
4453         NTSTATUS status;
4454
4455         status = cli_tdis(cli);
4456         if (!NT_STATUS_IS_OK(status)) {
4457                 d_printf("tdis failed: %s\n", nt_errstr(status));
4458                 return -1;
4459         }
4460
4461         d_printf("tdis successful\n");
4462         return 0;
4463 }
4464
4465
4466 /**
4467  * get or set tid
4468  */
4469
4470 static int cmd_tid(void)
4471 {
4472         TALLOC_CTX *ctx = talloc_tos();
4473         char *tid_str;
4474
4475         if (!next_token_talloc(ctx, &cmd_ptr, &tid_str, NULL)) {
4476                 if (cli_state_has_tcon(cli)) {
4477                         d_printf("current tid is %d\n", cli_state_get_tid(cli));
4478                 } else {
4479                         d_printf("no tcon currently\n");
4480                 }
4481         } else {
4482                 uint16_t tid = atoi(tid_str);
4483                 cli_state_set_tid(cli, tid);
4484         }
4485
4486         return 0;
4487 }
4488
4489
4490 /****************************************************************************
4491  list active connections
4492 ****************************************************************************/
4493
4494 static int cmd_list_connect(void)
4495 {
4496         cli_cm_display(cli);
4497         return 0;
4498 }
4499
4500 /****************************************************************************
4501  display the current active client connection
4502 ****************************************************************************/
4503
4504 static int cmd_show_connect( void )
4505 {
4506         TALLOC_CTX *ctx = talloc_tos();
4507         struct cli_state *targetcli;
4508         char *targetpath;
4509         NTSTATUS status;
4510
4511         status = cli_resolve_path(ctx, "", auth_info, cli,
4512                                   client_get_cur_dir(), &targetcli,
4513                                   &targetpath);
4514         if (!NT_STATUS_IS_OK(status)) {
4515                 d_printf("showconnect %s: %s\n", cur_dir, nt_errstr(status));
4516                 return 1;
4517         }
4518
4519         d_printf("//%s/%s\n", smbXcli_conn_remote_name(targetcli->conn), targetcli->share);
4520         return 0;
4521 }
4522
4523 /****************************************************************************
4524  iosize command
4525 ***************************************************************************/
4526
4527 int cmd_iosize(void)
4528 {
4529         TALLOC_CTX *ctx = talloc_tos();
4530         char *buf;
4531         int iosize;
4532
4533         if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL)) {
4534                 if (smbXcli_conn_protocol(cli->conn) < PROTOCOL_SMB2_02) {
4535                         if (!smb_encrypt) {
4536                                 d_printf("iosize <n> or iosize 0x<n>. "
4537                                         "Minimum is 0 (default), "
4538                                         "max is 16776960 (0xFFFF00)\n");
4539                         } else {
4540                                 d_printf("iosize <n> or iosize 0x<n>. "
4541                                         "(Encrypted connection) ,"
4542                                         "Minimum is 0 (default), "
4543                                         "max is 130048 (0x1FC00)\n");
4544                         }
4545                 } else {
4546                         d_printf("iosize <n> or iosize 0x<n>.\n");
4547                 }
4548                 return 1;
4549         }
4550
4551         iosize = strtol(buf,NULL,0);
4552         if (smbXcli_conn_protocol(cli->conn) < PROTOCOL_SMB2_02) {
4553                 if (smb_encrypt && (iosize < 0 || iosize > 0xFC00)) {
4554                         d_printf("iosize out of range for encrypted "
4555                                 "connection (min = 0 (default), "
4556                                 "max = 130048 (0x1FC00)\n");
4557                         return 1;
4558                 } else if (!smb_encrypt && (iosize < 0 || iosize > 0xFFFF00)) {
4559                         d_printf("iosize out of range (min = 0 (default), "
4560                                 "max = 16776960 (0xFFFF00)\n");
4561                         return 1;
4562                 }
4563         }
4564
4565         io_bufsize = iosize;
4566         d_printf("iosize is now %d\n", io_bufsize);
4567         return 0;
4568 }
4569
4570 /****************************************************************************
4571  timeout command
4572 ***************************************************************************/
4573
4574 static int cmd_timeout(void)
4575 {
4576         TALLOC_CTX *ctx = talloc_tos();
4577         char *buf;
4578
4579         if (!next_token_talloc(ctx, &cmd_ptr,&buf,NULL)) {
4580                 unsigned int old_timeout = cli_set_timeout(cli, 0);
4581                 cli_set_timeout(cli, old_timeout);
4582                 d_printf("timeout <n> (per-operation timeout "
4583                         "in seconds - currently %u).\n",
4584                         old_timeout/1000);
4585                 return 1;
4586         }
4587
4588         io_timeout = strtol(buf,NULL,0);
4589         cli_set_timeout(cli, io_timeout*1000);
4590         d_printf("io_timeout per operation is now %d\n", io_timeout);
4591         return 0;
4592 }
4593
4594
4595 /****************************************************************************
4596 history
4597 ****************************************************************************/
4598 static int cmd_history(void)
4599 {
4600 #if defined(HAVE_LIBREADLINE) && defined(HAVE_HISTORY_LIST)
4601         HIST_ENTRY **hlist;
4602         int i;
4603
4604         hlist = history_list();
4605
4606         for (i = 0; hlist && hlist[i]; i++) {
4607                 DEBUG(0, ("%d: %s\n", i, hlist[i]->line));
4608         }
4609 #else
4610         DEBUG(0,("no history without readline support\n"));
4611 #endif
4612
4613         return 0;
4614 }
4615
4616 /* Some constants for completing filename arguments */
4617
4618 #define COMPL_NONE        0          /* No completions */
4619 #define COMPL_REMOTE      1          /* Complete remote filename */
4620 #define COMPL_LOCAL       2          /* Complete local filename */
4621
4622 /* This defines the commands supported by this client.
4623  * NOTE: The "!" must be the last one in the list because it's fn pointer
4624  *       field is NULL, and NULL in that field is used in process_tok()
4625  *       (below) to indicate the end of the list.  crh
4626  */
4627 static struct {
4628         const char *name;
4629         int (*fn)(void);
4630         const char *description;
4631         char compl_args[2];      /* Completion argument info */
4632 } commands[] = {
4633   {"?",cmd_help,"[command] give help on a command",{COMPL_NONE,COMPL_NONE}},
4634   {"allinfo",cmd_allinfo,"<file> show all available info",
4635    {COMPL_NONE,COMPL_NONE}},
4636   {"altname",cmd_altname,"<file> show alt name",{COMPL_NONE,COMPL_NONE}},
4637   {"archive",cmd_archive,"<level>\n0=ignore archive bit\n1=only get archive files\n2=only get archive files and reset archive bit\n3=get all files and reset archive bit",{COMPL_NONE,COMPL_NONE}},
4638   {"backup",cmd_backup,"toggle backup intent state",{COMPL_NONE,COMPL_NONE}},
4639   {"blocksize",cmd_block,"blocksize <number> (default 20)",{COMPL_NONE,COMPL_NONE}},
4640   {"cancel",cmd_cancel,"<jobid> cancel a print queue entry",{COMPL_NONE,COMPL_NONE}},
4641   {"case_sensitive",cmd_setcase,"toggle the case sensitive flag to server",{COMPL_NONE,COMPL_NONE}},
4642   {"cd",cmd_cd,"[directory] change/report the remote directory",{COMPL_REMOTE,COMPL_NONE}},
4643   {"chmod",cmd_chmod,"<src> <mode> chmod a file using UNIX permission",{COMPL_REMOTE,COMPL_NONE}},
4644   {"chown",cmd_chown,"<src> <uid> <gid> chown a file using UNIX uids and gids",{COMPL_REMOTE,COMPL_NONE}},
4645   {"close",cmd_close,"<fid> close a file given a fid",{COMPL_REMOTE,COMPL_NONE}},
4646   {"del",cmd_del,"<mask> delete all matching files",{COMPL_REMOTE,COMPL_NONE}},
4647   {"dir",cmd_dir,"<mask> list the contents of the current directory",{COMPL_REMOTE,COMPL_NONE}},
4648   {"du",cmd_du,"<mask> computes the total size of the current directory",{COMPL_REMOTE,COMPL_NONE}},
4649   {"echo",cmd_echo,"ping the server",{COMPL_NONE,COMPL_NONE}},
4650   {"exit",cmd_quit,"logoff the server",{COMPL_NONE,COMPL_NONE}},
4651   {"get",cmd_get,"<remote name> [local name] get a file",{COMPL_REMOTE,COMPL_LOCAL}},
4652   {"getfacl",cmd_getfacl,"<file name> get the POSIX ACL on a file (UNIX extensions only)",{COMPL_REMOTE,COMPL_NONE}},
4653   {"geteas", cmd_geteas, "<file name> get the EA list of a file",
4654    {COMPL_REMOTE, COMPL_NONE}},
4655   {"hardlink",cmd_hardlink,"<src> <dest> create a Windows hard link",{COMPL_REMOTE,COMPL_REMOTE}},
4656   {"help",cmd_help,"[command] give help on a command",{COMPL_NONE,COMPL_NONE}},
4657   {"history",cmd_history,"displays the command history",{COMPL_NONE,COMPL_NONE}},
4658   {"iosize",cmd_iosize,"iosize <number> (default 64512)",{COMPL_NONE,COMPL_NONE}},
4659   {"lcd",cmd_lcd,"[directory] change/report the local current working directory",{COMPL_LOCAL,COMPL_NONE}},
4660   {"link",cmd_link,"<oldname> <newname> create a UNIX hard link",{COMPL_REMOTE,COMPL_REMOTE}},
4661   {"lock",cmd_lock,"lock <fnum> [r|w] <hex-start> <hex-len> : set a POSIX lock",{COMPL_REMOTE,COMPL_REMOTE}},
4662   {"lowercase",cmd_lowercase,"toggle lowercasing of filenames for get",{COMPL_NONE,COMPL_NONE}},
4663   {"ls",cmd_dir,"<mask> list the contents of the current directory",{COMPL_REMOTE,COMPL_NONE}},
4664   {"l",cmd_dir,"<mask> list the contents of the current directory",{COMPL_REMOTE,COMPL_NONE}},
4665   {"mask",cmd_select,"<mask> mask all filenames against this",{COMPL_REMOTE,COMPL_NONE}},
4666   {"md",cmd_mkdir,"<directory> make a directory",{COMPL_NONE,COMPL_NONE}},
4667   {"mget",cmd_mget,"<mask> get all the matching files",{COMPL_REMOTE,COMPL_NONE}},
4668   {"mkdir",cmd_mkdir,"<directory> make a directory",{COMPL_NONE,COMPL_NONE}},
4669   {"more",cmd_more,"<remote name> view a remote file with your pager",{COMPL_REMOTE,COMPL_NONE}},
4670   {"mput",cmd_mput,"<mask> put all matching files",{COMPL_REMOTE,COMPL_NONE}},
4671   {"newer",cmd_newer,"<file> only mget files newer than the specified local file",{COMPL_LOCAL,COMPL_NONE}},
4672   {"notify",cmd_notify,"<file>Get notified of dir changes",{COMPL_REMOTE,COMPL_NONE}},
4673   {"open",cmd_open,"<mask> open a file",{COMPL_REMOTE,COMPL_NONE}},
4674   {"posix", cmd_posix, "turn on all POSIX capabilities", {COMPL_REMOTE,COMPL_NONE}},
4675   {"posix_encrypt",cmd_posix_encrypt,"<domain> <user> <password> start up transport encryption",{COMPL_REMOTE,COMPL_NONE}},
4676   {"posix_open",cmd_posix_open,"<name> 0<mode> open_flags mode open a file using POSIX interface",{COMPL_REMOTE,COMPL_NONE}},
4677   {"posix_mkdir",cmd_posix_mkdir,"<name> 0<mode> creates a directory using POSIX interface",{COMPL_REMOTE,COMPL_NONE}},
4678   {"posix_rmdir",cmd_posix_rmdir,"<name> removes a directory using POSIX interface",{COMPL_REMOTE,COMPL_NONE}},
4679   {"posix_unlink",cmd_posix_unlink,"<name> removes a file using POSIX interface",{COMPL_REMOTE,COMPL_NONE}},
4680   {"print",cmd_print,"<file name> print a file",{COMPL_NONE,COMPL_NONE}},
4681   {"prompt",cmd_prompt,"toggle prompting for filenames for mget and mput",{COMPL_NONE,COMPL_NONE}},
4682   {"put",cmd_put,"<local name> [remote name] put a file",{COMPL_LOCAL,COMPL_REMOTE}},
4683   {"pwd",cmd_pwd,"show current remote directory (same as 'cd' with no args)",{COMPL_NONE,COMPL_NONE}},
4684   {"q",cmd_quit,"logoff the server",{COMPL_NONE,COMPL_NONE}},
4685   {"queue",cmd_queue,"show the print queue",{COMPL_NONE,COMPL_NONE}},
4686   {"quit",cmd_quit,"logoff the server",{COMPL_NONE,COMPL_NONE}},
4687   {"readlink",cmd_readlink,"filename Do a UNIX extensions readlink call on a symlink",{COMPL_REMOTE,COMPL_REMOTE}},
4688   {"rd",cmd_rmdir,"<directory> remove a directory",{COMPL_NONE,COMPL_NONE}},
4689   {"recurse",cmd_recurse,"toggle directory recursion for mget and mput",{COMPL_NONE,COMPL_NONE}},
4690   {"reget",cmd_reget,"<remote name> [local name] get a file restarting at end of local file",{COMPL_REMOTE,COMPL_LOCAL}},
4691   {"rename",cmd_rename,"<src> <dest> rename some files",{COMPL_REMOTE,COMPL_REMOTE}},
4692   {"reput",cmd_reput,"<local name> [remote name] put a file restarting at end of remote file",{COMPL_LOCAL,COMPL_REMOTE}},
4693   {"rm",cmd_del,"<mask> delete all matching files",{COMPL_REMOTE,COMPL_NONE}},
4694   {"rmdir",cmd_rmdir,"<directory> remove a directory",{COMPL_REMOTE,COMPL_NONE}},
4695   {"showacls",cmd_showacls,"toggle if ACLs are shown or not",{COMPL_NONE,COMPL_NONE}},
4696   {"setea", cmd_setea, "<file name> <eaname> <eaval> Set an EA of a file",
4697    {COMPL_REMOTE, COMPL_LOCAL}},
4698   {"setmode",cmd_setmode,"<file name> <setmode string> change modes of file",{COMPL_REMOTE,COMPL_NONE}},
4699   {"stat",cmd_stat,"<file name> Do a UNIX extensions stat call on a file",{COMPL_REMOTE,COMPL_NONE}},
4700   {"symlink",cmd_symlink,"<oldname> <newname> create a UNIX symlink",{COMPL_REMOTE,COMPL_REMOTE}},
4701   {"tar",cmd_tar,"tar <c|x>[IXFqbgNan] current directory to/from <file name>",{COMPL_NONE,COMPL_NONE}},
4702   {"tarmode",cmd_tarmode,"<full|inc|reset|noreset> tar's behaviour towards archive bits",{COMPL_NONE,COMPL_NONE}},
4703   {"timeout",cmd_timeout,"timeout <number> - set the per-operation timeout in seconds (default 20)",{COMPL_NONE,COMPL_NONE}},
4704   {"translate",cmd_translate,"toggle text translation for printing",{COMPL_NONE,COMPL_NONE}},
4705   {"unlock",cmd_unlock,"unlock <fnum> <hex-start> <hex-len> : remove a POSIX lock",{COMPL_REMOTE,COMPL_REMOTE}},
4706   {"volume",cmd_volume,"print the volume name",{COMPL_NONE,COMPL_NONE}},
4707   {"vuid",cmd_vuid,"change current vuid",{COMPL_NONE,COMPL_NONE}},
4708   {"wdel",cmd_wdel,"<attrib> <mask> wildcard delete all matching files",{COMPL_REMOTE,COMPL_NONE}},
4709   {"logon",cmd_logon,"establish new logon",{COMPL_NONE,COMPL_NONE}},
4710   {"listconnect",cmd_list_connect,"list open connections",{COMPL_NONE,COMPL_NONE}},
4711   {"showconnect",cmd_show_connect,"display the current active connection",{COMPL_NONE,COMPL_NONE}},
4712   {"tcon",cmd_tcon,"connect to a share" ,{COMPL_NONE,COMPL_NONE}},
4713   {"tdis",cmd_tdis,"disconnect from a share",{COMPL_NONE,COMPL_NONE}},
4714   {"tid",cmd_tid,"show or set the current tid (tree-id)",{COMPL_NONE,COMPL_NONE}},
4715   {"logoff",cmd_logoff,"log off (close the session)",{COMPL_NONE,COMPL_NONE}},
4716   {"..",cmd_cd_oneup,"change the remote directory (up one level)",{COMPL_REMOTE,COMPL_NONE}},
4717
4718   /* Yes, this must be here, see crh's comment above. */
4719   {"!",NULL,"run a shell command on the local system",{COMPL_NONE,COMPL_NONE}},
4720   {NULL,NULL,NULL,{COMPL_NONE,COMPL_NONE}}
4721 };
4722
4723 /*******************************************************************
4724  Lookup a command string in the list of commands, including
4725  abbreviations.
4726 ******************************************************************/
4727
4728 static int process_tok(char *tok)
4729 {
4730         int i = 0, matches = 0;
4731         int cmd=0;
4732         int tok_len = strlen(tok);
4733
4734         while (commands[i].fn != NULL) {
4735                 if (strequal(commands[i].name,tok)) {
4736                         matches = 1;
4737                         cmd = i;
4738                         break;
4739                 } else if (strnequal(commands[i].name, tok, tok_len)) {
4740                         matches++;
4741                         cmd = i;
4742                 }
4743                 i++;
4744         }
4745
4746         if (matches == 0)
4747                 return(-1);
4748         else if (matches == 1)
4749                 return(cmd);
4750         else
4751                 return(-2);
4752 }
4753
4754 /****************************************************************************
4755  Help.
4756 ****************************************************************************/
4757
4758 static int cmd_help(void)
4759 {
4760         TALLOC_CTX *ctx = talloc_tos();
4761         int i=0,j;
4762         char *buf;
4763
4764         if (next_token_talloc(ctx, &cmd_ptr,&buf,NULL)) {
4765                 if ((i = process_tok(buf)) >= 0)
4766                         d_printf("HELP %s:\n\t%s\n\n",
4767                                 commands[i].name,commands[i].description);
4768         } else {
4769                 while (commands[i].description) {
4770                         for (j=0; commands[i].description && (j<5); j++) {
4771                                 d_printf("%-15s",commands[i].name);
4772                                 i++;
4773                         }
4774                         d_printf("\n");
4775                 }
4776         }
4777         return 0;
4778 }
4779
4780 /****************************************************************************
4781  Process a -c command string.
4782 ****************************************************************************/
4783
4784 static int process_command_string(const char *cmd_in)
4785 {
4786         TALLOC_CTX *ctx = talloc_tos();
4787         char *cmd = talloc_strdup(ctx, cmd_in);
4788         int rc = 0;
4789
4790         if (!cmd) {
4791                 return 1;
4792         }
4793         /* establish the connection if not already */
4794
4795         if (!cli) {
4796                 NTSTATUS status;
4797
4798                 status = cli_cm_open(talloc_tos(), NULL,
4799                                      have_ip ? dest_ss_str : desthost,
4800                                      service, auth_info,
4801                                      true, smb_encrypt,
4802                                      max_protocol, port, name_type,
4803                                      &cli);
4804                 if (!NT_STATUS_IS_OK(status)) {
4805                         return 1;
4806                 }
4807                 cli_set_timeout(cli, io_timeout*1000);
4808         }
4809
4810         while (cmd[0] != '\0')    {
4811                 char *line;
4812                 char *p;
4813                 char *tok;
4814                 int i;
4815
4816                 if ((p = strchr_m(cmd, ';')) == 0) {
4817                         line = cmd;
4818                         cmd += strlen(cmd);
4819                 } else {
4820                         *p = '\0';
4821                         line = cmd;
4822                         cmd = p + 1;
4823                 }
4824
4825                 /* and get the first part of the command */
4826                 cmd_ptr = line;
4827                 if (!next_token_talloc(ctx, &cmd_ptr,&tok,NULL)) {
4828                         continue;
4829                 }
4830
4831                 if ((i = process_tok(tok)) >= 0) {
4832                         rc = commands[i].fn();
4833                 } else if (i == -2) {
4834                         d_printf("%s: command abbreviation ambiguous\n",tok);
4835                 } else {
4836                         d_printf("%s: command not found\n",tok);
4837                 }
4838         }
4839
4840         return rc;
4841 }
4842
4843 #define MAX_COMPLETIONS 100
4844
4845 struct completion_remote {
4846         char *dirmask;
4847         char **matches;
4848         int count, samelen;
4849         const char *text;
4850         int len;
4851 };
4852
4853 static NTSTATUS completion_remote_filter(const char *mnt,
4854                                 struct file_info *f,
4855                                 const char *mask,
4856                                 void *state)
4857 {
4858         struct completion_remote *info = (struct completion_remote *)state;
4859
4860         if (info->count >= MAX_COMPLETIONS - 1) {
4861                 return NT_STATUS_OK;
4862         }
4863         if (strncmp(info->text, f->name, info->len) != 0) {
4864                 return NT_STATUS_OK;
4865         }
4866         if (ISDOT(f->name) || ISDOTDOT(f->name)) {
4867                 return NT_STATUS_OK;
4868         }
4869
4870         if ((info->dirmask[0] == 0) && !(f->mode & FILE_ATTRIBUTE_DIRECTORY))
4871                 info->matches[info->count] = SMB_STRDUP(f->name);
4872         else {
4873                 TALLOC_CTX *ctx = talloc_stackframe();
4874                 char *tmp;
4875
4876                 tmp = talloc_strdup(ctx,info->dirmask);
4877                 if (!tmp) {
4878                         TALLOC_FREE(ctx);
4879                         return NT_STATUS_NO_MEMORY;
4880                 }
4881                 tmp = talloc_asprintf_append(tmp, "%s", f->name);
4882                 if (!tmp) {
4883                         TALLOC_FREE(ctx);
4884                         return NT_STATUS_NO_MEMORY;
4885                 }
4886                 if (f->mode & FILE_ATTRIBUTE_DIRECTORY) {
4887                         tmp = talloc_asprintf_append(tmp, "%s",
4888                                                      CLI_DIRSEP_STR);
4889                 }
4890                 if (!tmp) {
4891                         TALLOC_FREE(ctx);
4892                         return NT_STATUS_NO_MEMORY;
4893                 }
4894                 info->matches[info->count] = SMB_STRDUP(tmp);
4895                 TALLOC_FREE(ctx);
4896         }
4897         if (info->matches[info->count] == NULL) {
4898                 return NT_STATUS_OK;
4899         }
4900         if (f->mode & FILE_ATTRIBUTE_DIRECTORY) {
4901                 smb_readline_ca_char(0);
4902         }
4903         if (info->count == 1) {
4904                 info->samelen = strlen(info->matches[info->count]);
4905         } else {
4906                 while (strncmp(info->matches[info->count],
4907                                info->matches[info->count-1],
4908                                info->samelen) != 0) {
4909                         info->samelen--;
4910                 }
4911         }
4912         info->count++;
4913         return NT_STATUS_OK;
4914 }
4915
4916 static char **remote_completion(const char *text, int len)
4917 {
4918         TALLOC_CTX *ctx = talloc_stackframe();
4919         char *dirmask = NULL;
4920         char *targetpath = NULL;
4921         struct cli_state *targetcli = NULL;
4922         int i;
4923         struct completion_remote info = { NULL, NULL, 1, 0, NULL, 0 };
4924         NTSTATUS status;
4925
4926         /* can't have non-static initialisation on Sun CC, so do it
4927            at run time here */
4928         info.samelen = len;
4929         info.text = text;
4930         info.len = len;
4931
4932         info.matches = SMB_MALLOC_ARRAY(char *,MAX_COMPLETIONS);
4933         if (!info.matches) {
4934                 TALLOC_FREE(ctx);
4935                 return NULL;
4936         }
4937
4938         /*
4939          * We're leaving matches[0] free to fill it later with the text to
4940          * display: Either the one single match or the longest common subset
4941          * of the matches.
4942          */
4943         info.matches[0] = NULL;
4944         info.count = 1;
4945
4946         for (i = len-1; i >= 0; i--) {
4947                 if ((text[i] == '/') || (text[i] == CLI_DIRSEP_CHAR)) {
4948                         break;
4949                 }
4950         }
4951
4952         info.text = text+i+1;
4953         info.samelen = info.len = len-i-1;
4954
4955         if (i > 0) {
4956                 info.dirmask = SMB_MALLOC_ARRAY(char, i+2);
4957                 if (!info.dirmask) {
4958                         goto cleanup;
4959                 }
4960                 strncpy(info.dirmask, text, i+1);
4961                 info.dirmask[i+1] = 0;
4962                 dirmask = talloc_asprintf(ctx,
4963                                         "%s%*s*",
4964                                         client_get_cur_dir(),
4965                                         i-1,
4966                                         text);
4967         } else {
4968                 info.dirmask = SMB_STRDUP("");
4969                 if (!info.dirmask) {
4970                         goto cleanup;
4971                 }
4972                 dirmask = talloc_asprintf(ctx,
4973                                         "%s*",
4974                                         client_get_cur_dir());
4975         }
4976         if (!dirmask) {
4977                 goto cleanup;
4978         }
4979
4980         status = cli_resolve_path(ctx, "", auth_info, cli, dirmask, &targetcli,
4981                                   &targetpath);
4982         if (!NT_STATUS_IS_OK(status)) {
4983                 goto cleanup;
4984         }
4985         status = cli_list(targetcli, targetpath, FILE_ATTRIBUTE_DIRECTORY | FILE_ATTRIBUTE_SYSTEM | FILE_ATTRIBUTE_HIDDEN,
4986                           completion_remote_filter, (void *)&info);
4987         if (!NT_STATUS_IS_OK(status)) {
4988                 goto cleanup;
4989         }
4990
4991         if (info.count == 1) {
4992                 /*
4993                  * No matches at all, NULL indicates there is nothing
4994                  */
4995                 SAFE_FREE(info.matches[0]);
4996                 SAFE_FREE(info.matches);
4997                 TALLOC_FREE(ctx);
4998                 return NULL;
4999         }
5000
5001         if (info.count == 2) {
5002                 /*
5003                  * Exactly one match in matches[1], indicate this is the one
5004                  * in matches[0].
5005                  */
5006                 info.matches[0] = info.matches[1];
5007                 info.matches[1] = NULL;
5008                 info.count -= 1;
5009                 TALLOC_FREE(ctx);
5010                 return info.matches;
5011         }
5012
5013         /*
5014          * We got more than one possible match, set the result to the maximum
5015          * common subset
5016          */
5017
5018         info.matches[0] = SMB_STRNDUP(info.matches[1], info.samelen);
5019         info.matches[info.count] = NULL;
5020         TALLOC_FREE(ctx);
5021         return info.matches;
5022
5023 cleanup:
5024         for (i = 0; i < info.count; i++) {
5025                 SAFE_FREE(info.matches[i]);
5026         }
5027         SAFE_FREE(info.matches);
5028         SAFE_FREE(info.dirmask);
5029         TALLOC_FREE(ctx);
5030         return NULL;
5031 }
5032
5033 static char **completion_fn(const char *text, int start, int end)
5034 {
5035         smb_readline_ca_char(' ');
5036
5037         if (start) {
5038                 const char *buf, *sp;
5039                 int i;
5040                 char compl_type;
5041
5042                 buf = smb_readline_get_line_buffer();
5043                 if (buf == NULL)
5044                         return NULL;
5045
5046                 sp = strchr(buf, ' ');
5047                 if (sp == NULL)
5048                         return NULL;
5049
5050                 for (i = 0; commands[i].name; i++) {
5051                         if ((strncmp(commands[i].name, buf, sp - buf) == 0) &&
5052                             (commands[i].name[sp - buf] == 0)) {
5053                                 break;
5054                         }
5055                 }
5056                 if (commands[i].name == NULL)
5057                         return NULL;
5058
5059                 while (*sp == ' ')
5060                         sp++;
5061
5062                 if (sp == (buf + start))
5063                         compl_type = commands[i].compl_args[0];
5064                 else
5065                         compl_type = commands[i].compl_args[1];
5066
5067                 if (compl_type == COMPL_REMOTE)
5068                         return remote_completion(text, end - start);
5069                 else /* fall back to local filename completion */
5070                         return NULL;
5071         } else {
5072                 char **matches;
5073                 int i, len, samelen = 0, count=1;
5074
5075                 matches = SMB_MALLOC_ARRAY(char *, MAX_COMPLETIONS);
5076                 if (!matches) {
5077                         return NULL;
5078                 }
5079                 matches[0] = NULL;
5080
5081                 len = strlen(text);
5082                 for (i=0;commands[i].fn && count < MAX_COMPLETIONS-1;i++) {
5083                         if (strncmp(text, commands[i].name, len) == 0) {
5084                                 matches[count] = SMB_STRDUP(commands[i].name);
5085                                 if (!matches[count])
5086                                         goto cleanup;
5087                                 if (count == 1)
5088                                         samelen = strlen(matches[count]);
5089                                 else
5090                                         while (strncmp(matches[count], matches[count-1], samelen) != 0)
5091                                                 samelen--;
5092                                 count++;
5093                         }
5094                 }
5095
5096                 switch (count) {
5097                 case 0: /* should never happen */
5098                 case 1:
5099                         goto cleanup;
5100                 case 2:
5101                         matches[0] = SMB_STRDUP(matches[1]);
5102                         break;
5103                 default:
5104                         matches[0] = (char *)SMB_MALLOC(samelen+1);
5105                         if (!matches[0])
5106                                 goto cleanup;
5107                         strncpy(matches[0], matches[1], samelen);
5108                         matches[0][samelen] = 0;
5109                 }
5110                 matches[count] = NULL;
5111                 return matches;
5112
5113 cleanup:
5114                 for (i = 0; i < count; i++)
5115                         free(matches[i]);
5116
5117                 free(matches);
5118                 return NULL;
5119         }
5120 }
5121
5122 static bool finished;
5123
5124 /****************************************************************************
5125  Make sure we swallow keepalives during idle time.
5126 ****************************************************************************/
5127
5128 static void readline_callback(void)
5129 {
5130         static time_t last_t;
5131         struct timespec now;
5132         time_t t;
5133         NTSTATUS status;
5134         unsigned char garbage[16];
5135
5136         clock_gettime_mono(&now);
5137         t = now.tv_sec;
5138
5139         if (t - last_t < 5)
5140                 return;
5141
5142         last_t = t;
5143
5144         /* Ping the server to keep the connection alive using SMBecho. */
5145         memset(garbage, 0xf0, sizeof(garbage));
5146         status = cli_echo(cli, 1, data_blob_const(garbage, sizeof(garbage)));
5147         if (NT_STATUS_IS_OK(status)) {
5148                 return;
5149         }
5150
5151         if (!cli_state_is_connected(cli)) {
5152                 DEBUG(0,("SMBecho failed (%s). The connection is "
5153                          "disconnected now\n", nt_errstr(status)));
5154                 finished = true;
5155                 smb_readline_done();
5156         }
5157 }
5158
5159 /****************************************************************************
5160  Process commands on stdin.
5161 ****************************************************************************/
5162
5163 static int process_stdin(void)
5164 {
5165         int rc = 0;
5166
5167         while (!finished) {
5168                 TALLOC_CTX *frame = talloc_stackframe();
5169                 char *tok = NULL;
5170                 char *the_prompt = NULL;
5171                 char *line = NULL;
5172                 int i;
5173
5174                 /* display a prompt */
5175                 if (asprintf(&the_prompt, "smb: %s> ", client_get_cur_dir()) < 0) {
5176                         TALLOC_FREE(frame);
5177                         break;
5178                 }
5179                 line = smb_readline(the_prompt, readline_callback, completion_fn);
5180                 SAFE_FREE(the_prompt);
5181                 if (!line) {
5182                         TALLOC_FREE(frame);
5183                         break;
5184                 }
5185
5186                 /* special case - first char is ! */
5187                 if (*line == '!') {
5188                         if (system(line + 1) == -1) {
5189                                 d_printf("system() command %s failed.\n",
5190                                         line+1);
5191                         }
5192                         SAFE_FREE(line);
5193                         TALLOC_FREE(frame);
5194                         continue;
5195                 }
5196
5197                 /* and get the first part of the command */
5198                 cmd_ptr = line;
5199                 if (!next_token_talloc(frame, &cmd_ptr,&tok,NULL)) {
5200                         TALLOC_FREE(frame);
5201                         SAFE_FREE(line);
5202                         continue;
5203                 }
5204
5205                 if ((i = process_tok(tok)) >= 0) {
5206                         rc = commands[i].fn();
5207                 } else if (i == -2) {
5208                         d_printf("%s: command abbreviation ambiguous\n",tok);
5209                 } else {
5210                         d_printf("%s: command not found\n",tok);
5211                 }
5212                 SAFE_FREE(line);
5213                 TALLOC_FREE(frame);
5214         }
5215         return rc;
5216 }
5217
5218 /****************************************************************************
5219  Process commands from the client.
5220 ****************************************************************************/
5221
5222 static int process(const char *base_directory)
5223 {
5224         int rc = 0;
5225         NTSTATUS status;
5226
5227         status = cli_cm_open(talloc_tos(), NULL,
5228                              have_ip ? dest_ss_str : desthost,
5229                              service, auth_info, true, smb_encrypt,
5230                              max_protocol, port, name_type, &cli);
5231         if (!NT_STATUS_IS_OK(status)) {
5232                 return 1;
5233         }
5234
5235         cli_set_timeout(cli, io_timeout*1000);
5236
5237         if (base_directory && *base_directory) {
5238                 rc = do_cd(base_directory);
5239                 if (rc) {
5240                         cli_shutdown(cli);
5241                         return rc;
5242                 }
5243         }
5244
5245         if (cmdstr) {
5246                 rc = process_command_string(cmdstr);
5247         } else {
5248                 process_stdin();
5249         }
5250
5251         cli_shutdown(cli);
5252         return rc;
5253 }
5254
5255 /****************************************************************************
5256  Handle a -L query.
5257 ****************************************************************************/
5258
5259 static int do_host_query(const char *query_host)
5260 {
5261         NTSTATUS status;
5262
5263         status = cli_cm_open(talloc_tos(), NULL,
5264                              have_ip ? dest_ss_str : query_host,
5265                              "IPC$", auth_info, true, smb_encrypt,
5266                              max_protocol, port, name_type, &cli);
5267         if (!NT_STATUS_IS_OK(status)) {
5268                 return 1;
5269         }
5270
5271         cli_set_timeout(cli, io_timeout*1000);
5272         browse_host(true);
5273
5274         /* Ensure that the host can do IPv4 */
5275
5276         if (!interpret_addr(query_host)) {
5277                 struct sockaddr_storage ss;
5278                 if (interpret_string_addr(&ss, query_host, 0) &&
5279                                 (ss.ss_family != AF_INET)) {
5280                         d_printf("%s is an IPv6 address -- no workgroup available\n",
5281                                 query_host);
5282                         return 1;
5283                 }
5284         }
5285
5286         if (port != NBT_SMB_PORT) {
5287
5288                 /* Workgroups simply don't make sense over anything
5289                    else but port 139... */
5290
5291                 cli_shutdown(cli);
5292                 status = cli_cm_open(talloc_tos(), NULL,
5293                                      have_ip ? dest_ss_str : query_host,
5294                                      "IPC$", auth_info, true, smb_encrypt,
5295                                      max_protocol, NBT_SMB_PORT, name_type,
5296                                      &cli);
5297                 if (!NT_STATUS_IS_OK(status)) {
5298                         cli = NULL;
5299                 }
5300         }
5301
5302         if (cli == NULL) {
5303                 d_printf("NetBIOS over TCP disabled -- no workgroup available\n");
5304                 return 1;
5305         }
5306
5307         cli_set_timeout(cli, io_timeout*1000);
5308         list_servers(lp_workgroup());
5309
5310         cli_shutdown(cli);
5311
5312         return(0);
5313 }
5314
5315 /****************************************************************************
5316  Handle a tar operation.
5317 ****************************************************************************/
5318
5319 static int do_tar_op(const char *base_directory)
5320 {
5321         extern struct tar tar_ctx;
5322         int ret;
5323
5324         /* do we already have a connection? */
5325         if (!cli) {
5326                 NTSTATUS status;
5327
5328                 status = cli_cm_open(talloc_tos(), NULL,
5329                                      have_ip ? dest_ss_str : desthost,
5330                                      service, auth_info, true, smb_encrypt,
5331                                      max_protocol, port, name_type, &cli);
5332                 if (!NT_STATUS_IS_OK(status)) {
5333                         return 1;
5334                 }
5335                 cli_set_timeout(cli, io_timeout*1000);
5336         }
5337
5338         recurse=true;
5339
5340         if (base_directory && *base_directory)  {
5341                 ret = do_cd(base_directory);
5342                 if (ret) {
5343                         cli_shutdown(cli);
5344                         return ret;
5345                 }
5346         }
5347
5348         ret = tar_process(&tar_ctx);
5349
5350         cli_shutdown(cli);
5351
5352         return(ret);
5353 }
5354
5355 /****************************************************************************
5356  Handle a message operation.
5357 ****************************************************************************/
5358
5359 static int do_message_op(struct user_auth_info *a_info)
5360 {
5361         NTSTATUS status;
5362
5363         status = cli_connect_nb(desthost, have_ip ? &dest_ss : NULL,
5364                                 port ? port : NBT_SMB_PORT, name_type,
5365                                 lp_netbios_name(), SMB_SIGNING_DEFAULT, 0, &cli);
5366         if (!NT_STATUS_IS_OK(status)) {
5367                 d_printf("Connection to %s failed. Error %s\n", desthost, nt_errstr(status));
5368                 return 1;
5369         }
5370
5371         cli_set_timeout(cli, io_timeout*1000);
5372         send_message(get_cmdline_auth_info_username(a_info));
5373         cli_shutdown(cli);
5374
5375         return 0;
5376 }
5377
5378 /****************************************************************************
5379   main program
5380 ****************************************************************************/
5381
5382 int main(int argc,char *argv[])
5383 {
5384         const char **const_argv = discard_const_p(const char *, argv);
5385         char *base_directory = NULL;
5386         int opt;
5387         char *query_host = NULL;
5388         bool message = false;
5389         static const char *new_name_resolve_order = NULL;
5390         poptContext pc;
5391         char *p;
5392         int rc = 0;
5393         bool tar_opt = false;
5394         bool service_opt = false;
5395     extern struct tar tar_ctx;
5396
5397         struct poptOption long_options[] = {
5398                 POPT_AUTOHELP
5399
5400                 { "name-resolve", 'R', POPT_ARG_STRING, &new_name_resolve_order, 'R', "Use these name resolution services only", "NAME-RESOLVE-ORDER" },
5401                 { "message", 'M', POPT_ARG_STRING, NULL, 'M', "Send message", "HOST" },
5402                 { "ip-address", 'I', POPT_ARG_STRING, NULL, 'I', "Use this IP to connect to", "IP" },
5403                 { "stderr", 'E', POPT_ARG_NONE, NULL, 'E', "Write messages to stderr instead of stdout" },
5404                 { "list", 'L', POPT_ARG_STRING, NULL, 'L', "Get a list of shares available on a host", "HOST" },
5405                 { "max-protocol", 'm', POPT_ARG_STRING, NULL, 'm', "Set the max protocol level", "LEVEL" },
5406                 { "tar", 'T', POPT_ARG_STRING, NULL, 'T', "Command line tar", "<c|x>IXFqgbNan" },
5407                 { "directory", 'D', POPT_ARG_STRING, NULL, 'D', "Start from directory", "DIR" },
5408                 { "command", 'c', POPT_ARG_STRING, &cmdstr, 'c', "Execute semicolon separated commands" },
5409                 { "send-buffer", 'b', POPT_ARG_INT, &io_bufsize, 'b', "Changes the transmit/send buffer", "BYTES" },
5410                 { "timeout", 't', POPT_ARG_INT, &io_timeout, 'b', "Changes the per-operation timeout", "SECONDS" },
5411                 { "port", 'p', POPT_ARG_INT, &port, 'p', "Port to connect to", "PORT" },
5412                 { "grepable", 'g', POPT_ARG_NONE, NULL, 'g', "Produce grepable output" },
5413                 { "browse", 'B', POPT_ARG_NONE, NULL, 'B', "Browse SMB servers using DNS" },
5414                 POPT_COMMON_SAMBA
5415                 POPT_COMMON_CONNECTION
5416                 POPT_COMMON_CREDENTIALS
5417                 POPT_TABLEEND
5418         };
5419         TALLOC_CTX *frame = talloc_stackframe();
5420
5421         if (!client_set_cur_dir("\\")) {
5422                 exit(ENOMEM);
5423         }
5424
5425         /* set default debug level to 1 regardless of what smb.conf sets */
5426         setup_logging( "smbclient", DEBUG_DEFAULT_STDERR );
5427         load_case_tables();
5428
5429         lp_set_cmdline("log level", "1");
5430
5431         auth_info = user_auth_info_init(frame);
5432         if (auth_info == NULL) {
5433                 exit(1);
5434         }
5435         popt_common_set_auth_info(auth_info);
5436
5437         /* skip argv(0) */
5438         pc = poptGetContext("smbclient", argc, const_argv, long_options, 0);
5439         poptSetOtherOptionHelp(pc, "service <password>");
5440
5441         while ((opt = poptGetNextOpt(pc)) != -1) {
5442
5443                 /* if the tar option has been called previouslt, now we need to eat out the leftovers */
5444                 /* I see no other way to keep things sane --SSS */
5445                 if (tar_opt == true) {
5446                         while (poptPeekArg(pc)) {
5447                                 poptGetArg(pc);
5448                         }
5449                         tar_opt = false;
5450                 }
5451
5452                 /* if the service has not yet been specified lets see if it is available in the popt stack */
5453                 if (!service_opt && poptPeekArg(pc)) {
5454                         service = talloc_strdup(frame, poptGetArg(pc));
5455                         if (!service) {
5456                                 exit(ENOMEM);
5457                         }
5458                         service_opt = true;
5459                 }
5460
5461                 /* if the service has already been retrieved then check if we have also a password */
5462                 if (service_opt
5463                     && (!get_cmdline_auth_info_got_pass(auth_info))
5464                     && poptPeekArg(pc)) {
5465                         set_cmdline_auth_info_password(auth_info,
5466                                                        poptGetArg(pc));
5467                 }
5468
5469
5470                 switch (opt) {
5471                 case 'M':
5472                         /* Messages are sent to NetBIOS name type 0x3
5473                          * (Messenger Service).  Make sure we default
5474                          * to port 139 instead of port 445. srl,crh
5475                          */
5476                         name_type = 0x03;
5477                         desthost = talloc_strdup(frame,poptGetOptArg(pc));
5478                         if (!desthost) {
5479                                 exit(ENOMEM);
5480                         }
5481                         if( !port )
5482                                 port = NBT_SMB_PORT;
5483                         message = true;
5484                         break;
5485                 case 'I':
5486                         {
5487                                 if (!interpret_string_addr(&dest_ss, poptGetOptArg(pc), 0)) {
5488                                         exit(1);
5489                                 }
5490                                 have_ip = true;
5491                                 print_sockaddr(dest_ss_str, sizeof(dest_ss_str), &dest_ss);
5492                         }
5493                         break;
5494                 case 'E':
5495                         setup_logging("smbclient", DEBUG_STDERR );
5496                         display_set_stderr();
5497                         break;
5498
5499                 case 'L':
5500                         query_host = talloc_strdup(frame, poptGetOptArg(pc));
5501                         if (!query_host) {
5502                                 exit(ENOMEM);
5503                         }
5504                         break;
5505                 case 'm':
5506                         lp_set_cmdline("client max protocol", poptGetOptArg(pc));
5507                         break;
5508                 case 'T':
5509                         /* We must use old option processing for this. Find the
5510                          * position of the -T option in the raw argv[]. */
5511                         {
5512                                 int i;
5513
5514                                 for (i = 1; i < argc; i++) {
5515                                         if (strncmp("-T", argv[i],2)==0)
5516                                                 break;
5517                                 }
5518                                 i++;
5519                                 if (!tar_parse_args(&tar_ctx, poptGetOptArg(pc), argv + i, argc - i)) {
5520                                         poptPrintUsage(pc, stderr, 0);
5521                                         exit(1);
5522                                 }
5523                         }
5524                         /* this must be the last option, mark we have parsed it so that we know we have */
5525                         tar_opt = true;
5526                         break;
5527                 case 'D':
5528                         base_directory = talloc_strdup(frame, poptGetOptArg(pc));
5529                         if (!base_directory) {
5530                                 exit(ENOMEM);
5531                         }
5532                         break;
5533                 case 'g':
5534                         grepable=true;
5535                         break;
5536                 case 'e':
5537                         smb_encrypt=true;
5538                         break;
5539                 case 'B':
5540                         return(do_smb_browse());
5541
5542                 }
5543         }
5544
5545         /* We may still have some leftovers after the last popt option has been called */
5546         if (tar_opt == true) {
5547                 while (poptPeekArg(pc)) {
5548                         poptGetArg(pc);
5549                 }
5550                 tar_opt = false;
5551         }
5552
5553         /* if the service has not yet been specified lets see if it is available in the popt stack */
5554         if (!service_opt && poptPeekArg(pc)) {
5555                 service = talloc_strdup(frame,poptGetArg(pc));
5556                 if (!service) {
5557                         exit(ENOMEM);
5558                 }
5559                 service_opt = true;
5560         }
5561
5562         /* if the service has already been retrieved then check if we have also a password */
5563         if (service_opt
5564             && !get_cmdline_auth_info_got_pass(auth_info)
5565             && poptPeekArg(pc)) {
5566                 set_cmdline_auth_info_password(auth_info,
5567                                                poptGetArg(pc));
5568         }
5569
5570         if ( override_logfile )
5571                 setup_logging( lp_logfile(talloc_tos()), DEBUG_FILE );
5572
5573         if (!lp_load_client(get_dyn_CONFIGFILE())) {
5574                 fprintf(stderr, "%s: Can't load %s - run testparm to debug it\n",
5575                         argv[0], get_dyn_CONFIGFILE());
5576         }
5577
5578         if (get_cmdline_auth_info_use_machine_account(auth_info) &&
5579             !set_cmdline_auth_info_machine_account_creds(auth_info)) {
5580                 exit(-1);
5581         }
5582
5583         load_interfaces();
5584
5585         if (service_opt && service) {
5586                 size_t len;
5587
5588                 /* Convert any '/' characters in the service name to '\' characters */
5589                 string_replace(service, '/','\\');
5590                 if (count_chars(service,'\\') < 3) {
5591                         d_printf("\n%s: Not enough '\\' characters in service\n",service);
5592                         poptPrintUsage(pc, stderr, 0);
5593                         exit(1);
5594                 }
5595                 /* Remove trailing slashes */
5596                 len = strlen(service);
5597                 while(len > 0 && service[len - 1] == '\\') {
5598                         --len;
5599                         service[len] = '\0';
5600                 }
5601         }
5602
5603         smb_encrypt = get_cmdline_auth_info_smb_encrypt(auth_info);
5604         if (!init_names()) {
5605                 fprintf(stderr, "init_names() failed\n");
5606                 exit(1);
5607         }
5608
5609         if(new_name_resolve_order)
5610                 lp_set_cmdline("name resolve order", new_name_resolve_order);
5611
5612         if (!tar_to_process(&tar_ctx) && !query_host && !service && !message) {
5613                 poptPrintUsage(pc, stderr, 0);
5614                 exit(1);
5615         }
5616
5617         poptFreeContext(pc);
5618         popt_burn_cmdline_password(argc, argv);
5619
5620         DEBUG(3,("Client started (version %s).\n", samba_version_string()));
5621
5622         /* Ensure we have a password (or equivalent). */
5623         set_cmdline_auth_info_getpass(auth_info);
5624
5625         max_protocol = lp_client_max_protocol();
5626
5627         if (!tar_to_process(&tar_ctx)) {
5628                 if (cmdstr)
5629                         process_command_string(cmdstr);
5630                 rc = do_tar_op(base_directory);
5631         } else if (query_host && *query_host) {
5632                 char *qhost = query_host;
5633                 char *slash;
5634
5635                 while (*qhost == '\\' || *qhost == '/')
5636                         qhost++;
5637
5638                 if ((slash = strchr_m(qhost, '/'))
5639                     || (slash = strchr_m(qhost, '\\'))) {
5640                         *slash = 0;
5641                 }
5642
5643                 if ((p=strchr_m(qhost, '#'))) {
5644                         *p = 0;
5645                         p++;
5646                         sscanf(p, "%x", &name_type);
5647                 }
5648
5649                 rc = do_host_query(qhost);
5650         } else if (message) {
5651                 rc = do_message_op(auth_info);
5652         } else if (process(base_directory)) {
5653                 rc = 1;
5654         }
5655
5656         TALLOC_FREE(frame);
5657         return rc;
5658 }