mirror of
https://git.FreeBSD.org/src.git
synced 2024-12-11 09:50:12 +00:00
6b462d2762
Since YP protocol definition uses the constant to declare variable-size opaque byte strings, the change should be binary compatible with existing installations which do not expose keys or values larger than 1024 bytes. All uses of local variables with YPMAXRECORD sizes were removed to avoid insane stack use. On the other hand, variables with static lifetime should be fine and only result in increased VA use. Glibc made same change, increasing the allowed length for keys and values in YP to 16M, in 2013. Reviewed by: markj Discussed with: ian Sponsored by: Mellanox Technologies MFC after: 3 weeks Differential revision: https://reviews.freebsd.org/D20900
681 lines
16 KiB
C
681 lines
16 KiB
C
/* $OpenBSD: yp.c,v 1.14 2015/02/11 01:26:00 pelikan Exp $ */
|
|
/* $FreeBSD$ */
|
|
/*
|
|
* Copyright (c) 2008 Pierre-Yves Ritschard <pyr@openbsd.org>
|
|
*
|
|
* Permission to use, copy, modify, and distribute this software for any
|
|
* purpose with or without fee is hereby granted, provided that the above
|
|
* copyright notice and this permission notice appear in all copies.
|
|
*
|
|
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
|
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
|
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
|
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
|
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
|
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
|
|
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
|
*/
|
|
|
|
#include <sys/types.h>
|
|
#include <sys/param.h>
|
|
#include <sys/queue.h>
|
|
#include <sys/socket.h>
|
|
#include <sys/select.h>
|
|
#include <sys/tree.h>
|
|
|
|
#include <netinet/in.h>
|
|
#include <arpa/inet.h>
|
|
|
|
#include <errno.h>
|
|
#include <event.h>
|
|
#include <fcntl.h>
|
|
#include <unistd.h>
|
|
#include <pwd.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <limits.h>
|
|
|
|
#include <rpc/rpc.h>
|
|
#include <rpc/xdr.h>
|
|
#include <rpc/pmap_clnt.h>
|
|
#include <rpc/pmap_prot.h>
|
|
#include <rpc/pmap_rmt.h>
|
|
#include <rpcsvc/yp.h>
|
|
#include <rpcsvc/ypclnt.h>
|
|
|
|
#include "ypldap.h"
|
|
|
|
void yp_dispatch(struct svc_req *, SVCXPRT *);
|
|
void yp_disable_events(void);
|
|
void yp_fd_event(int, short, void *);
|
|
int yp_check(struct svc_req *);
|
|
int yp_valid_domain(char *, struct ypresp_val *);
|
|
void yp_make_val(struct ypresp_val *, char *, int);
|
|
void yp_make_keyval(struct ypresp_key_val *, char *, char *);
|
|
|
|
static struct env *env;
|
|
|
|
struct yp_event {
|
|
TAILQ_ENTRY(yp_event) ye_entry;
|
|
struct event ye_event;
|
|
};
|
|
|
|
struct yp_data {
|
|
SVCXPRT *yp_trans_udp;
|
|
SVCXPRT *yp_trans_tcp;
|
|
TAILQ_HEAD(, yp_event) yd_events;
|
|
};
|
|
|
|
void
|
|
yp_disable_events(void)
|
|
{
|
|
struct yp_event *ye;
|
|
|
|
while ((ye = TAILQ_FIRST(&env->sc_yp->yd_events)) != NULL) {
|
|
TAILQ_REMOVE(&env->sc_yp->yd_events, ye, ye_entry);
|
|
event_del(&ye->ye_event);
|
|
free(ye);
|
|
}
|
|
}
|
|
|
|
void
|
|
yp_enable_events(void)
|
|
{
|
|
int i;
|
|
struct yp_event *ye;
|
|
|
|
for (i = 0; i < getdtablesize(); i++) {
|
|
if ((ye = calloc(1, sizeof(*ye))) == NULL)
|
|
fatal(NULL);
|
|
event_set(&ye->ye_event, i, EV_READ, yp_fd_event, NULL);
|
|
event_add(&ye->ye_event, NULL);
|
|
TAILQ_INSERT_TAIL(&env->sc_yp->yd_events, ye, ye_entry);
|
|
}
|
|
}
|
|
|
|
void
|
|
yp_fd_event(int fd, short event, void *p)
|
|
{
|
|
svc_getreq_common(fd);
|
|
yp_disable_events();
|
|
yp_enable_events();
|
|
}
|
|
|
|
void
|
|
yp_init(struct env *x_env)
|
|
{
|
|
struct yp_data *yp;
|
|
|
|
if ((yp = calloc(1, sizeof(*yp))) == NULL)
|
|
fatal(NULL);
|
|
TAILQ_INIT(&yp->yd_events);
|
|
|
|
env = x_env;
|
|
env->sc_yp = yp;
|
|
|
|
(void)pmap_unset(YPPROG, YPVERS);
|
|
|
|
if ((yp->yp_trans_udp = svcudp_create(RPC_ANYSOCK)) == NULL)
|
|
fatal("cannot create udp service");
|
|
if ((yp->yp_trans_tcp = svctcp_create(RPC_ANYSOCK, 0, 0)) == NULL)
|
|
fatal("cannot create tcp service");
|
|
|
|
if (!svc_register(yp->yp_trans_udp, YPPROG, YPVERS,
|
|
yp_dispatch, IPPROTO_UDP)) {
|
|
fatal("unable to register (YPPROG, YPVERS, udp)");
|
|
}
|
|
if (!svc_register(yp->yp_trans_tcp, YPPROG, YPVERS,
|
|
yp_dispatch, IPPROTO_TCP)) {
|
|
fatal("unable to register (YPPROG, YPVERS, tcp)");
|
|
}
|
|
}
|
|
|
|
/*
|
|
* lots of inspiration from ypserv by Mats O Jansson
|
|
*/
|
|
void
|
|
yp_dispatch(struct svc_req *req, SVCXPRT *trans)
|
|
{
|
|
xdrproc_t xdr_argument;
|
|
xdrproc_t xdr_result;
|
|
char *result;
|
|
char *(*cb)(char *, struct svc_req *);
|
|
union {
|
|
domainname ypproc_domain_2_arg;
|
|
domainname ypproc_domain_nonack_2_arg;
|
|
ypreq_key ypproc_match_2_arg;
|
|
ypreq_nokey ypproc_first_2_arg;
|
|
ypreq_key ypproc_next_2_arg;
|
|
ypreq_xfr ypproc_xfr_2_arg;
|
|
ypreq_nokey ypproc_all_2_arg;
|
|
ypreq_nokey ypproc_master_2_arg;
|
|
ypreq_nokey ypproc_order_2_arg;
|
|
domainname ypproc_maplist_2_arg;
|
|
} argument;
|
|
|
|
xdr_argument = (xdrproc_t) xdr_void;
|
|
xdr_result = (xdrproc_t) xdr_void;
|
|
cb = NULL;
|
|
switch (req->rq_proc) {
|
|
case YPPROC_NULL:
|
|
xdr_argument = (xdrproc_t) xdr_void;
|
|
xdr_result = (xdrproc_t) xdr_void;
|
|
if (yp_check(req) == -1)
|
|
return;
|
|
result = NULL;
|
|
if (!svc_sendreply(trans, (xdrproc_t) xdr_void,
|
|
(void *)&result))
|
|
svcerr_systemerr(trans);
|
|
return;
|
|
case YPPROC_DOMAIN:
|
|
xdr_argument = (xdrproc_t) xdr_domainname;
|
|
xdr_result = (xdrproc_t) xdr_bool;
|
|
if (yp_check(req) == -1)
|
|
return;
|
|
cb = (void *)ypproc_domain_2_svc;
|
|
break;
|
|
case YPPROC_DOMAIN_NONACK:
|
|
xdr_argument = (xdrproc_t) xdr_domainname;
|
|
xdr_result = (xdrproc_t) xdr_bool;
|
|
if (yp_check(req) == -1)
|
|
return;
|
|
cb = (void *)ypproc_domain_nonack_2_svc;
|
|
break;
|
|
case YPPROC_MATCH:
|
|
xdr_argument = (xdrproc_t) xdr_ypreq_key;
|
|
xdr_result = (xdrproc_t) xdr_ypresp_val;
|
|
if (yp_check(req) == -1)
|
|
return;
|
|
cb = (void *)ypproc_match_2_svc;
|
|
break;
|
|
case YPPROC_FIRST:
|
|
xdr_argument = (xdrproc_t) xdr_ypreq_nokey;
|
|
xdr_result = (xdrproc_t) xdr_ypresp_key_val;
|
|
if (yp_check(req) == -1)
|
|
return;
|
|
cb = (void *)ypproc_first_2_svc;
|
|
break;
|
|
case YPPROC_NEXT:
|
|
xdr_argument = (xdrproc_t) xdr_ypreq_key;
|
|
xdr_result = (xdrproc_t) xdr_ypresp_key_val;
|
|
if (yp_check(req) == -1)
|
|
return;
|
|
cb = (void *)ypproc_next_2_svc;
|
|
break;
|
|
case YPPROC_XFR:
|
|
if (yp_check(req) == -1)
|
|
return;
|
|
svcerr_noproc(trans);
|
|
return;
|
|
case YPPROC_CLEAR:
|
|
log_debug("ypproc_clear");
|
|
if (yp_check(req) == -1)
|
|
return;
|
|
svcerr_noproc(trans);
|
|
return;
|
|
case YPPROC_ALL:
|
|
log_debug("ypproc_all");
|
|
xdr_argument = (xdrproc_t) xdr_ypreq_nokey;
|
|
xdr_result = (xdrproc_t) xdr_ypresp_all;
|
|
if (yp_check(req) == -1)
|
|
return;
|
|
cb = (void *)ypproc_all_2_svc;
|
|
break;
|
|
case YPPROC_MASTER:
|
|
log_debug("ypproc_master");
|
|
xdr_argument = (xdrproc_t) xdr_ypreq_nokey;
|
|
xdr_result = (xdrproc_t) xdr_ypresp_master;
|
|
if (yp_check(req) == -1)
|
|
return;
|
|
cb = (void *)ypproc_master_2_svc;
|
|
break;
|
|
case YPPROC_ORDER:
|
|
log_debug("ypproc_order");
|
|
if (yp_check(req) == -1)
|
|
return;
|
|
svcerr_noproc(trans);
|
|
return;
|
|
case YPPROC_MAPLIST:
|
|
log_debug("ypproc_maplist");
|
|
xdr_argument = (xdrproc_t) xdr_domainname;
|
|
xdr_result = (xdrproc_t) xdr_ypresp_maplist;
|
|
if (yp_check(req) == -1)
|
|
return;
|
|
cb = (void *)ypproc_maplist_2_svc;
|
|
break;
|
|
default:
|
|
svcerr_noproc(trans);
|
|
return;
|
|
}
|
|
(void)memset(&argument, 0, sizeof(argument));
|
|
|
|
if (!svc_getargs(trans, xdr_argument, (caddr_t)&argument)) {
|
|
svcerr_decode(trans);
|
|
return;
|
|
}
|
|
result = (*cb)((char *)&argument, req);
|
|
if (result != NULL && !svc_sendreply(trans, xdr_result, result))
|
|
svcerr_systemerr(trans);
|
|
if (!svc_freeargs(trans, xdr_argument, (caddr_t)&argument)) {
|
|
/*
|
|
* ypserv does it too.
|
|
*/
|
|
fatal("unable to free arguments");
|
|
}
|
|
}
|
|
|
|
int
|
|
yp_check(struct svc_req *req)
|
|
{
|
|
struct sockaddr_in *caller;
|
|
|
|
caller = svc_getcaller(req->rq_xprt);
|
|
/*
|
|
* We might want to know who we allow here.
|
|
*/
|
|
return (0);
|
|
}
|
|
|
|
int
|
|
yp_valid_domain(char *domain, struct ypresp_val *res)
|
|
{
|
|
if (domain == NULL) {
|
|
log_debug("NULL domain !");
|
|
return (-1);
|
|
}
|
|
if (strcmp(domain, env->sc_domainname) != 0) {
|
|
res->stat = YP_NODOM;
|
|
return (-1);
|
|
}
|
|
return (0);
|
|
}
|
|
|
|
bool_t *
|
|
ypproc_domain_2_svc(domainname *arg, struct svc_req *req)
|
|
{
|
|
static bool_t res;
|
|
|
|
res = (bool_t)1;
|
|
if (strcmp(*arg, env->sc_domainname) != 0)
|
|
res = (bool_t)0;
|
|
return (&res);
|
|
}
|
|
|
|
bool_t *
|
|
ypproc_domain_nonack_2_svc(domainname *arg, struct svc_req *req)
|
|
{
|
|
static bool_t res;
|
|
|
|
if (strcmp(*arg, env->sc_domainname) != 0)
|
|
return NULL;
|
|
res = (bool_t)1;
|
|
return (&res);
|
|
}
|
|
|
|
ypresp_val *
|
|
ypproc_match_2_svc(ypreq_key *arg, struct svc_req *req)
|
|
{
|
|
struct userent ukey;
|
|
struct userent *ue;
|
|
struct groupent gkey;
|
|
struct groupent *ge;
|
|
static struct ypresp_val res;
|
|
const char *estr;
|
|
char *bp, *cp;
|
|
char *key;
|
|
|
|
log_debug("matching '%.*s' in map %s", arg->key.keydat_len,
|
|
arg->key.keydat_val, arg->map);
|
|
|
|
if (yp_valid_domain(arg->domain, (struct ypresp_val *)&res) == -1)
|
|
return (&res);
|
|
|
|
if (env->sc_user_names == NULL) {
|
|
/*
|
|
* tree not ready.
|
|
*/
|
|
return (NULL);
|
|
}
|
|
|
|
if (arg->key.keydat_len > YPMAXRECORD) {
|
|
log_debug("argument too long");
|
|
return (NULL);
|
|
}
|
|
key = calloc(arg->key.keydat_len + 1, 1);
|
|
if (key == NULL)
|
|
return (NULL);
|
|
(void)strncpy(key, arg->key.keydat_val, arg->key.keydat_len);
|
|
|
|
if (strcmp(arg->map, "passwd.byname") == 0 ||
|
|
strcmp(arg->map, "master.passwd.byname") == 0) {
|
|
ukey.ue_line = key;
|
|
if ((ue = RB_FIND(user_name_tree, env->sc_user_names,
|
|
&ukey)) == NULL) {
|
|
res.stat = YP_NOKEY;
|
|
goto out;
|
|
}
|
|
|
|
yp_make_val(&res, ue->ue_line, 1);
|
|
goto out;
|
|
} else if (strcmp(arg->map, "passwd.byuid") == 0 ||
|
|
strcmp(arg->map, "master.passwd.byuid") == 0) {
|
|
ukey.ue_uid = strtonum(key, 0, UID_MAX, &estr);
|
|
if (estr) {
|
|
res.stat = YP_BADARGS;
|
|
goto out;
|
|
}
|
|
|
|
if ((ue = RB_FIND(user_uid_tree, &env->sc_user_uids,
|
|
&ukey)) == NULL) {
|
|
res.stat = YP_NOKEY;
|
|
goto out;
|
|
}
|
|
|
|
yp_make_val(&res, ue->ue_line, 1);
|
|
return (&res);
|
|
} else if (strcmp(arg->map, "group.bygid") == 0) {
|
|
gkey.ge_gid = strtonum(key, 0, GID_MAX, &estr);
|
|
if (estr) {
|
|
res.stat = YP_BADARGS;
|
|
goto out;
|
|
}
|
|
if ((ge = RB_FIND(group_gid_tree, &env->sc_group_gids,
|
|
&gkey)) == NULL) {
|
|
res.stat = YP_NOKEY;
|
|
goto out;
|
|
}
|
|
|
|
yp_make_val(&res, ge->ge_line, 1);
|
|
return (&res);
|
|
} else if (strcmp(arg->map, "group.byname") == 0) {
|
|
gkey.ge_line = key;
|
|
if ((ge = RB_FIND(group_name_tree, env->sc_group_names,
|
|
&gkey)) == NULL) {
|
|
res.stat = YP_NOKEY;
|
|
goto out;
|
|
}
|
|
|
|
yp_make_val(&res, ge->ge_line, 1);
|
|
return (&res);
|
|
} else if (strcmp(arg->map, "netid.byname") == 0) {
|
|
bp = cp = key;
|
|
|
|
if (strncmp(bp, "unix.", strlen("unix.")) != 0) {
|
|
res.stat = YP_BADARGS;
|
|
goto out;
|
|
}
|
|
|
|
bp += strlen("unix.");
|
|
|
|
if (*bp == '\0') {
|
|
res.stat = YP_BADARGS;
|
|
goto out;
|
|
}
|
|
|
|
if (!(cp = strsep(&bp, "@"))) {
|
|
res.stat = YP_BADARGS;
|
|
goto out;
|
|
}
|
|
|
|
if (strcmp(bp, arg->domain) != 0) {
|
|
res.stat = YP_BADARGS;
|
|
goto out;
|
|
}
|
|
|
|
ukey.ue_uid = strtonum(cp, 0, UID_MAX, &estr);
|
|
if (estr) {
|
|
res.stat = YP_BADARGS;
|
|
goto out;
|
|
}
|
|
|
|
if ((ue = RB_FIND(user_uid_tree, &env->sc_user_uids,
|
|
&ukey)) == NULL) {
|
|
res.stat = YP_NOKEY;
|
|
goto out;
|
|
}
|
|
|
|
yp_make_val(&res, ue->ue_netid_line, 0);
|
|
goto out;
|
|
|
|
} else {
|
|
log_debug("unknown map %s", arg->map);
|
|
res.stat = YP_NOMAP;
|
|
goto out;
|
|
}
|
|
out:
|
|
free(key);
|
|
return (&res);
|
|
}
|
|
|
|
ypresp_key_val *
|
|
ypproc_first_2_svc(ypreq_nokey *arg, struct svc_req *req)
|
|
{
|
|
static struct ypresp_key_val res;
|
|
|
|
if (yp_valid_domain(arg->domain, (struct ypresp_val *)&res) == -1)
|
|
return (&res);
|
|
|
|
if (strcmp(arg->map, "passwd.byname") == 0 ||
|
|
strcmp(arg->map, "master.passwd.byname") == 0) {
|
|
if (env->sc_user_lines == NULL)
|
|
return (NULL);
|
|
|
|
yp_make_keyval(&res, env->sc_user_lines, env->sc_user_lines);
|
|
} else if (strcmp(arg->map, "group.byname") == 0) {
|
|
if (env->sc_group_lines == NULL)
|
|
return (NULL);
|
|
|
|
yp_make_keyval(&res, env->sc_group_lines, env->sc_group_lines);
|
|
} else {
|
|
log_debug("unknown map %s", arg->map);
|
|
res.stat = YP_NOMAP;
|
|
}
|
|
|
|
return (&res);
|
|
}
|
|
|
|
ypresp_key_val *
|
|
ypproc_next_2_svc(ypreq_key *arg, struct svc_req *req)
|
|
{
|
|
struct userent ukey;
|
|
struct userent *ue;
|
|
struct groupent gkey;
|
|
struct groupent *ge;
|
|
char *line;
|
|
static struct ypresp_key_val res;
|
|
char *key;
|
|
|
|
if (yp_valid_domain(arg->domain, (struct ypresp_val *)&res) == -1)
|
|
return (&res);
|
|
|
|
key = NULL;
|
|
if (strcmp(arg->map, "passwd.byname") == 0 ||
|
|
strcmp(arg->map, "master.passwd.byname") == 0) {
|
|
key = calloc(arg->key.keydat_len + 1, 1);
|
|
if (key == NULL) {
|
|
res.stat = YP_YPERR;
|
|
return (&res);
|
|
}
|
|
(void)strncpy(key, arg->key.keydat_val,
|
|
arg->key.keydat_len);
|
|
ukey.ue_line = key;
|
|
if ((ue = RB_FIND(user_name_tree, env->sc_user_names,
|
|
&ukey)) == NULL) {
|
|
/*
|
|
* canacar's trick:
|
|
* the user might have been deleted in between calls
|
|
* to next since the tree may be modified by a reload.
|
|
* next should still return the next user in
|
|
* lexicographical order, hence insert the search key
|
|
* and look up the next field, then remove it again.
|
|
*/
|
|
RB_INSERT(user_name_tree, env->sc_user_names, &ukey);
|
|
if ((ue = RB_NEXT(user_name_tree, &env->sc_user_names,
|
|
&ukey)) == NULL) {
|
|
RB_REMOVE(user_name_tree, env->sc_user_names,
|
|
&ukey);
|
|
res.stat = YP_NOKEY;
|
|
free(key);
|
|
return (&res);
|
|
}
|
|
RB_REMOVE(user_name_tree, env->sc_user_names, &ukey);
|
|
}
|
|
line = ue->ue_line + (strlen(ue->ue_line) + 1);
|
|
line = line + (strlen(line) + 1);
|
|
yp_make_keyval(&res, line, line);
|
|
free(key);
|
|
return (&res);
|
|
|
|
|
|
} else if (strcmp(arg->map, "group.byname") == 0) {
|
|
key = calloc(arg->key.keydat_len + 1, 1);
|
|
if (key == NULL) {
|
|
res.stat = YP_YPERR;
|
|
return (&res);
|
|
}
|
|
(void)strncpy(key, arg->key.keydat_val,
|
|
arg->key.keydat_len);
|
|
|
|
gkey.ge_line = key;
|
|
if ((ge = RB_FIND(group_name_tree, env->sc_group_names,
|
|
&gkey)) == NULL) {
|
|
/*
|
|
* canacar's trick reloaded.
|
|
*/
|
|
RB_INSERT(group_name_tree, env->sc_group_names, &gkey);
|
|
if ((ge = RB_NEXT(group_name_tree, &env->sc_group_names,
|
|
&gkey)) == NULL) {
|
|
RB_REMOVE(group_name_tree, env->sc_group_names,
|
|
&gkey);
|
|
res.stat = YP_NOKEY;
|
|
free(key);
|
|
return (&res);
|
|
}
|
|
RB_REMOVE(group_name_tree, env->sc_group_names, &gkey);
|
|
}
|
|
|
|
line = ge->ge_line + (strlen(ge->ge_line) + 1);
|
|
line = line + (strlen(line) + 1);
|
|
yp_make_keyval(&res, line, line);
|
|
free(key);
|
|
return (&res);
|
|
} else {
|
|
log_debug("unknown map %s", arg->map);
|
|
res.stat = YP_NOMAP;
|
|
return (&res);
|
|
}
|
|
}
|
|
|
|
ypresp_all *
|
|
ypproc_all_2_svc(ypreq_nokey *arg, struct svc_req *req)
|
|
{
|
|
static struct ypresp_all res;
|
|
|
|
if (yp_valid_domain(arg->domain, (struct ypresp_val *)&res) == -1)
|
|
return (&res);
|
|
|
|
svcerr_auth(req->rq_xprt, AUTH_FAILED);
|
|
return (NULL);
|
|
}
|
|
|
|
ypresp_master *
|
|
ypproc_master_2_svc(ypreq_nokey *arg, struct svc_req *req)
|
|
{
|
|
static struct ypresp_master res;
|
|
static char master[YPMAXPEER + 1];
|
|
|
|
memset(&res, 0, sizeof(res));
|
|
if (yp_valid_domain(arg->domain, (struct ypresp_val *)&res) == -1)
|
|
return (&res);
|
|
|
|
if (gethostname(master, sizeof(master)) == 0) {
|
|
res.peer = (peername)master;
|
|
res.stat = YP_TRUE;
|
|
} else
|
|
res.stat = YP_NOKEY;
|
|
|
|
return (&res);
|
|
}
|
|
|
|
ypresp_maplist *
|
|
ypproc_maplist_2_svc(domainname *arg, struct svc_req *req)
|
|
{
|
|
size_t i;
|
|
static struct {
|
|
char *name;
|
|
int cond;
|
|
} mapnames[] = {
|
|
{ "passwd.byname", YPMAP_PASSWD_BYNAME },
|
|
{ "passwd.byuid", YPMAP_PASSWD_BYUID },
|
|
{ "master.passwd.byname", YPMAP_MASTER_PASSWD_BYNAME },
|
|
{ "master.passwd.byuid", YPMAP_MASTER_PASSWD_BYUID },
|
|
{ "group.byname", YPMAP_GROUP_BYNAME },
|
|
{ "group.bygid", YPMAP_GROUP_BYGID },
|
|
{ "netid.byname", YPMAP_NETID_BYNAME },
|
|
};
|
|
static ypresp_maplist res;
|
|
static struct ypmaplist maps[nitems(mapnames)];
|
|
|
|
if (yp_valid_domain(*arg, (struct ypresp_val *)&res) == -1)
|
|
return (&res);
|
|
|
|
res.stat = YP_TRUE;
|
|
res.maps = NULL;
|
|
for (i = 0; i < nitems(mapnames); i++) {
|
|
if (!(env->sc_flags & mapnames[i].cond))
|
|
continue;
|
|
maps[i].map = mapnames[i].name;
|
|
maps[i].next = res.maps;
|
|
res.maps = &maps[i];
|
|
}
|
|
|
|
return (&res);
|
|
}
|
|
|
|
void
|
|
yp_make_val(struct ypresp_val *res, char *line, int replacecolon)
|
|
{
|
|
static char buf[LINE_WIDTH];
|
|
|
|
memset(buf, 0, sizeof(buf));
|
|
|
|
if (replacecolon)
|
|
line[strlen(line)] = ':';
|
|
(void)strlcpy(buf, line, sizeof(buf));
|
|
if (replacecolon)
|
|
line[strcspn(line, ":")] = '\0';
|
|
log_debug("sending out %s", buf);
|
|
|
|
res->stat = YP_TRUE;
|
|
res->val.valdat_len = strlen(buf);
|
|
res->val.valdat_val = buf;
|
|
}
|
|
|
|
void
|
|
yp_make_keyval(struct ypresp_key_val *res, char *key, char *line)
|
|
{
|
|
static char keybuf[YPMAXRECORD+1];
|
|
static char buf[LINE_WIDTH];
|
|
|
|
memset(keybuf, 0, sizeof(keybuf));
|
|
memset(buf, 0, sizeof(buf));
|
|
|
|
(void)strlcpy(keybuf, key, sizeof(keybuf));
|
|
res->key.keydat_len = strlen(keybuf);
|
|
res->key.keydat_val = keybuf;
|
|
|
|
if (*line == '\0') {
|
|
res->stat = YP_NOMORE;
|
|
return;
|
|
}
|
|
res->stat = YP_TRUE;
|
|
line[strlen(line)] = ':';
|
|
(void)strlcpy(buf, line, sizeof(buf));
|
|
line[strcspn(line, ":")] = '\0';
|
|
log_debug("sending out %s => %s", keybuf, buf);
|
|
|
|
res->val.valdat_len = strlen(buf);
|
|
res->val.valdat_val = buf;
|
|
}
|