static int match_hostname(char *host, char *tok)
{
if (!host || !*host) return 0;
- return (fnmatch(tok, host, 0) == 0);
+ return wildmatch(tok, host);
}
static int match_binary(char *b1, char *b2, char *mask, int addrlen)
if (!users) return NULL;
for (tok=strtok(users," ,\t"); tok; tok = strtok(NULL," ,\t")) {
- if (fnmatch(tok, user, 0) == 0) break;
+ if (wildmatch(tok, user)) break;
}
free(users);
if (strpbrk(pattern, "*[?")) {
ret->match_flags |= MATCHFLG_WILD;
if (strstr(pattern, "**")) {
- static int tested;
- if (!tested) {
- tested = 1;
- if (fnmatch("a/b/*","a/b/c/d",FNM_PATHNAME)==0)
- rprintf(FERROR,"WARNING: fnmatch FNM_PATHNAME is broken on your system\n");
- }
ret->match_flags |= MATCHFLG_WILD2;
/* If the pattern starts with **, note that. */
if (*pattern == '*' && pattern[1] == '*')
}
if (ex->match_flags & MATCHFLG_WILD) {
- int fnmatch_flags = (ex->match_flags & MATCHFLG_WILD2)?
- 0 : FNM_PATHNAME;
/* A non-anchored match with an infix slash and no "**"
* needs to match the last slash_cnt+1 name elements. */
if (!match_start && ex->slash_cnt &&
}
name = p+1;
}
- if (fnmatch(pattern, name, fnmatch_flags) == 0)
+ if (wildmatch(pattern, name))
return 1;
if (ex->match_flags & MATCHFLG_WILD2_PREFIX) {
/* If the **-prefixed pattern has a '/' as the next
* character, then try to match the rest of the
* pattern at the root. */
- if (pattern[2] == '/' &&
- fnmatch(pattern+3, name, fnmatch_flags) == 0)
+ if (pattern[2] == '/' && wildmatch(pattern+3, name))
return 1;
}
else if (!match_start && ex->match_flags & MATCHFLG_WILD2) {
* after every slash. */
while ((name = strchr(name, '/')) != NULL) {
name++;
- if (fnmatch(pattern, name, fnmatch_flags) == 0)
+ if (wildmatch(pattern, name))
return 1;
}
}