summaryrefslogtreecommitdiffstats
path: root/src/sss_client/nss_services.c
diff options
context:
space:
mode:
authorStephen Gallagher <sgallagh@redhat.com>2012-01-06 13:57:30 -0500
committerStephen Gallagher <sgallagh@redhat.com>2012-01-27 09:02:01 -0500
commitcc7ee57f3adada83ac657e69636ca995d5b6948e (patch)
tree6d030166c6251e1813900ccd762b26eec1771f83 /src/sss_client/nss_services.c
parentff907ba7a9b5e429de086515642f97a0447e546a (diff)
downloadsssd_unused-cc7ee57f3adada83ac657e69636ca995d5b6948e.tar.gz
sssd_unused-cc7ee57f3adada83ac657e69636ca995d5b6948e.tar.xz
sssd_unused-cc7ee57f3adada83ac657e69636ca995d5b6948e.zip
NSS: Add client support for services (non-enumeration)
Diffstat (limited to 'src/sss_client/nss_services.c')
-rw-r--r--src/sss_client/nss_services.c361
1 files changed, 361 insertions, 0 deletions
diff --git a/src/sss_client/nss_services.c b/src/sss_client/nss_services.c
new file mode 100644
index 00000000..e6aea58b
--- /dev/null
+++ b/src/sss_client/nss_services.c
@@ -0,0 +1,361 @@
+/*
+ SSSD
+
+ Authors:
+ Stephen Gallagher <sgallagh@redhat.com>
+
+ Copyright (C) 2012 Red Hat
+
+ This program is free software; you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published by
+ the Free Software Foundation; either version 3 of the License, or
+ (at your option) any later version.
+
+ This program is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ GNU General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with this program. If not, see <http://www.gnu.org/licenses/>.
+*/
+
+#include <nss.h>
+#include <netdb.h>
+#include <errno.h>
+#include <sys/types.h>
+#include <unistd.h>
+#include <stdlib.h>
+#include <stdint.h>
+#include <stdio.h>
+#include <string.h>
+#include "sss_cli.h"
+
+
+/* GETSERVBYNAME Request
+ *
+ * 0-X: Sequence of two, zero-terminated strings (name, protocol).
+ * Protocol may be zero-length to imply "any"
+ *
+ * GETSERVBYPORT Request:
+ * 0-3: 16-bit port number in network byte order
+ * 4-7: Reserved/padding
+ * 8-X: Zero-terminated string (protocol)
+ * Protocol may be zero-length to imply "any"
+ *
+ * Replies:
+ * 0-3: 32-bit unsigned number of results
+ * 4-7: 32-bit unsigned (reserved/padding)
+ * 7-X: Result data (blocks equal to number of results)
+ *
+ * Result data:
+ * 0-3: 32-bit unsigned port number in network byte order
+ * 4-7: 32-bit unsigned number of aliases
+ * 8-X: sequence of zero-terminated strings
+ * (name, protocol, zero or more aliases)
+ */
+struct sss_nss_svc_rep {
+ struct servent *result;
+ char *buffer;
+ size_t buflen;
+};
+
+#define SVC_METADATA_COUNT 8
+
+static errno_t
+sss_nss_getsvc_readrep(struct sss_nss_svc_rep *sr,
+ uint8_t *buf, size_t *len)
+{
+ errno_t ret;
+ uint32_t c;
+ uint32_t num_aliases;
+ size_t i, l, slen, dlen, pad, ptaliases, alen;
+ char *sbuf;
+
+ /* Buffer must contain two 32-bit integers,
+ * at least one character and null-terminator
+ * for the name, and at least a null-
+ * terminator for the protocol.
+ */
+ if (*len < 11) {
+ /* not enough space for data, bad packet */
+ return EBADMSG;
+ }
+
+ /* Get the port */
+ SAFEALIGN_COPY_UINT32(&c, buf, NULL);
+ sr->result->s_port = (uint16_t)c;
+
+ /* Get the number of aliases */
+ SAFEALIGN_COPY_UINT32(&num_aliases, buf + sizeof(uint32_t), NULL);
+
+ sbuf = (char *)&buf[2 * sizeof(uint32_t)];
+ slen = *len - (2 * sizeof(uint32_t));
+ dlen = sr->buflen;
+
+ /* Copy in the name */
+ i = 0;
+ sr->result->s_name = &(sr->buffer[i]);
+
+ ret = sss_readrep_copy_string(sbuf, &i,
+ &slen, &dlen,
+ &sr->result->s_name,
+ NULL);
+ if (ret != EOK) return ret;
+
+ /* Copy in the protocol */
+ sr->result->s_proto = &(sr->buffer[i]);
+
+ ret = sss_readrep_copy_string(sbuf, &i,
+ &slen, &dlen,
+ &sr->result->s_proto,
+ NULL);
+ if (ret != EOK) return ret;
+
+ /* Make sure sr->buffer[i+pad] is 32-bit aligned */
+ pad = 0;
+ while((i + pad) % 4) {
+ pad++;
+ }
+
+ /* Copy in the aliases */
+ sr->result->s_aliases = (char **) &(sr->buffer[i+pad]);
+
+ ptaliases = (sizeof(char *) * (num_aliases + 1)) + pad;
+ if (ptaliases > dlen) {
+ return ERANGE; /* not ENOMEM, ERANGE is what glibc looks for */
+ }
+
+ dlen -= ptaliases;
+ ptaliases += i;
+ sr->result->s_aliases[num_aliases] = NULL; /* terminate array */
+
+ for (l = 0; l < num_aliases; l++) {
+ sr->result->s_aliases[l] = &(sr->buffer[ptaliases]);
+ ret = sss_readrep_copy_string(sbuf, &i,
+ &slen, &dlen,
+ &sr->result->s_aliases[l],
+ &alen);
+ if (ret != EOK) return ret;
+
+ ptaliases += alen + 1;
+ }
+
+ *len = slen - i;
+
+ return EOK;
+}
+
+enum nss_status
+_nss_sss_getservbyname_r(const char *name,
+ const char *protocol,
+ struct servent *result,
+ char *buffer, size_t buflen,
+ int *errnop)
+{
+ struct sss_cli_req_data rd;
+ struct sss_nss_svc_rep svcrep;
+ size_t name_len;
+ size_t proto_len = 0;
+ uint8_t *repbuf;
+ uint8_t *data;
+ size_t replen, len;
+ enum nss_status nret;
+ int ret;
+
+ /* Caught once glibc passing in buffer == 0x0 */
+ if (!buffer || !buflen) return ERANGE;
+
+ ret = sss_strnlen(name, SSS_NAME_MAX, &name_len);
+ if (ret != 0) {
+ *errnop = EINVAL;
+ return NSS_STATUS_NOTFOUND;
+ }
+
+ if (protocol) {
+ ret = sss_strnlen(protocol, SSS_NAME_MAX, &proto_len);
+ if (ret != 0) {
+ *errnop = EINVAL;
+ return NSS_STATUS_NOTFOUND;
+ }
+ }
+
+ rd.len = name_len + proto_len + 2;
+ data = malloc(sizeof(uint8_t)*rd.len);
+ if (data == NULL) {
+ nret = NSS_STATUS_TRYAGAIN;
+ goto out;
+ }
+
+ memcpy(data, name, name_len + 1);
+
+ if (protocol) {
+ memcpy(data + name_len + 1, protocol, proto_len + 1);
+ } else {
+ /* No protocol specified, pass empty string */
+ data[name_len + 1] = '\0';
+ }
+ rd.data = data;
+
+ sss_nss_lock();
+
+ nret = sss_nss_make_request(SSS_NSS_GETSERVBYNAME, &rd,
+ &repbuf, &replen, errnop);
+ free(data);
+ if (nret != NSS_STATUS_SUCCESS) {
+ goto out;
+ }
+
+ svcrep.result = result;
+ svcrep.buffer = buffer;
+ svcrep.buflen = buflen;
+
+ /* no results if not found */
+ if (((uint32_t *)repbuf)[0] == 0) {
+ free(repbuf);
+ nret = NSS_STATUS_NOTFOUND;
+ goto out;
+ }
+
+ /* only 1 result is accepted for this function */
+ if (((uint32_t *)repbuf)[0] != 1) {
+ *errnop = EBADMSG;
+ free(repbuf);
+ nret = NSS_STATUS_TRYAGAIN;
+ goto out;
+ }
+
+ len = replen - SVC_METADATA_COUNT;
+ ret = sss_nss_getsvc_readrep(&svcrep,
+ repbuf + SVC_METADATA_COUNT,
+ &len);
+ free(repbuf);
+ if (ret) {
+ *errnop = ret;
+ nret = NSS_STATUS_TRYAGAIN;
+ goto out;
+ }
+
+ nret = NSS_STATUS_SUCCESS;
+
+out:
+ sss_nss_unlock();
+ return nret;
+}
+
+
+enum nss_status
+_nss_sss_getservbyport_r(int port, const char *protocol,
+ struct servent *result,
+ char *buffer, size_t buflen,
+ int *errnop)
+{
+ struct sss_cli_req_data rd;
+ struct sss_nss_svc_rep svcrep;
+ size_t proto_len = 0;
+ uint8_t *repbuf;
+ uint8_t *data;
+ size_t replen, len;
+ enum nss_status nret;
+ int ret;
+
+ /* Caught once glibc passing in buffer == 0x0 */
+ if (!buffer || !buflen) return ERANGE;
+
+ if (protocol) {
+ ret = sss_strnlen(protocol, SSS_NAME_MAX, &proto_len);
+ if (ret != 0) {
+ *errnop = EINVAL;
+ return NSS_STATUS_NOTFOUND;
+ }
+ }
+
+ rd.len = sizeof(uint32_t)*2 + proto_len + 1;
+ data = malloc(sizeof(char)*rd.len);
+ if (data == NULL) {
+ nret = NSS_STATUS_TRYAGAIN;
+ goto out;
+ }
+
+ SAFEALIGN_SET_UINT32(data, port, NULL);
+
+ /* Padding */
+ memset(data + sizeof(uint32_t), 0, 4);
+
+ if (protocol) {
+ memcpy(data + sizeof(uint32_t)*2, protocol, proto_len + 1);
+ } else {
+ /* No protocol specified, pass empty string */
+ data[sizeof(uint32_t)*2] = '\0';
+ }
+ rd.data = data;
+
+ sss_nss_lock();
+
+ nret = sss_nss_make_request(SSS_NSS_GETSERVBYPORT, &rd,
+ &repbuf, &replen, errnop);
+ free(data);
+ if (nret != NSS_STATUS_SUCCESS) {
+ goto out;
+ }
+
+ svcrep.result = result;
+ svcrep.buffer = buffer;
+ svcrep.buflen = buflen;
+
+ /* no results if not found */
+ if (((uint32_t *)repbuf)[0] == 0) {
+ free(repbuf);
+ nret = NSS_STATUS_NOTFOUND;
+ goto out;
+ }
+
+ /* only 1 result is accepted for this function */
+ if (((uint32_t *)repbuf)[0] != 1) {
+ *errnop = EBADMSG;
+ free(repbuf);
+ nret = NSS_STATUS_TRYAGAIN;
+ goto out;
+ }
+
+ len = replen - SVC_METADATA_COUNT;
+ ret = sss_nss_getsvc_readrep(&svcrep,
+ repbuf + SVC_METADATA_COUNT,
+ &len);
+ free(repbuf);
+ if (ret) {
+ *errnop = ret;
+ nret = NSS_STATUS_TRYAGAIN;
+ goto out;
+ }
+
+ nret = NSS_STATUS_SUCCESS;
+
+out:
+ sss_nss_unlock();
+ return nret;
+}
+
+
+enum nss_status
+_nss_sss_setservent(void)
+{
+ return NSS_STATUS_UNAVAIL;
+}
+
+
+enum nss_status
+_nss_sss_getservent_r(struct servent *result,
+ char *buffer, size_t buflen,
+ int *errnop)
+{
+ fprintf(stderr, "getservent [%s]\n", buffer);
+ return NSS_STATUS_UNAVAIL;
+}
+
+
+enum nss_status
+_nss_sss_endservent(void)
+{
+ return NSS_STATUS_UNAVAIL;
+}