#include <stdlib.h>
#include <dirent.h>
#include <string.h>
#include <malloc.h>
#include "ypsym.h"
#include "ypdefs.h"
#include "shim_hooks.h"
USE_YP_MASTER_NAME
USE_YP_LAST_MODIFIED
USE_YPDBPATH
USE_YP_SECURE
USE_DBM
#include <ctype.h>
static DBM *cur_fdb;
static enum { UNKNOWN, SECURE, PUBLIC } current_map_access = UNKNOWN;
static char map_owner[MAX_MASTER_NAME + 1];
extern unsigned int ypcheck_domain();
int check_secure_net_ti(struct netbuf *caller, char *ypname);
bool
ypget_map_order(char *map, char *domain, uint_t *order)
{
datum key;
datum val;
char toconvert[MAX_ASCII_ORDER_NUMBER_LENGTH + 1];
uint_t error;
DBM *fdb;
if ((fdb = ypset_current_map(map, domain, &error)) != NULL) {
key.dptr = yp_last_modified;
key.dsize = yp_last_modified_sz;
val = dbm_fetch(fdb, key);
if (val.dptr != (char *)NULL) {
if (val.dsize > MAX_ASCII_ORDER_NUMBER_LENGTH) {
return (FALSE);
}
memcpy(toconvert, val.dptr, val.dsize);
toconvert[val.dsize] = '\0';
*order = (unsigned long) atol(toconvert);
return (TRUE);
} else {
return (FALSE);
}
} else {
return (FALSE);
}
}
bool
ypget_map_master(char **owner, DBM *fdb)
{
datum key;
datum val;
key.dptr = yp_master_name;
key.dsize = yp_master_name_sz;
val = dbm_fetch(fdb, key);
if (val.dptr != (char *)NULL) {
if (val.dsize > MAX_MASTER_NAME) {
return (FALSE);
}
memcpy(map_owner, val.dptr, val.dsize);
map_owner[val.dsize] = '\0';
*owner = map_owner;
return (TRUE);
} else {
return (FALSE);
}
}
DBM *
ypset_current_map(char *map, char *domain, uint_t *error)
{
char mapname[MAXNAMLEN + 1];
int lenm, lend;
if (!map || ((lenm = (int)strlen(map)) == 0) || (lenm > YPMAXMAP) ||
!domain || ((lend = (int)strlen(domain)) == 0) ||
(lend > YPMAXDOMAIN) || (strchr(map, '/') != NULL) ||
(strchr(domain, '/') != NULL)) {
*error = YP_BADARGS;
return (FALSE);
}
if (FALSE == ypmkfilename(domain, map, mapname))
return (FALSE);
if ((cur_fdb) && (strcmp(mapname, get_map_name(cur_fdb)) == 0)) {
return (cur_fdb);
}
if (NULL != cur_fdb)
dbm_close(cur_fdb);
current_map_access = UNKNOWN;
if ((cur_fdb = dbm_open(mapname, O_RDWR, 0644)) != NULL) {
return (cur_fdb);
}
if (ypcheck_domain(domain)) {
if (ypcheck_map_existence(mapname)) {
*error = YP_BADDB;
} else {
*error = YP_NOMAP;
}
} else {
*error = YP_NODOM;
}
return (NULL);
}
void
ypclr_current_map(void)
{
if (cur_fdb != NULL) {
(void) dbm_close(cur_fdb);
cur_fdb = NULL;
}
current_map_access = UNKNOWN;
}
bool
yp_map_access(SVCXPRT *transp, uint_t *error, DBM *fdb)
{
char *ypname = "ypserv";
struct netbuf *nbuf;
sa_family_t af;
in_port_t port;
nbuf = svc_getrpccaller(transp);
af = ((struct sockaddr_storage *)nbuf->buf)->ss_family;
if (af != AF_INET && af != AF_INET6)
return (FALSE);
if (!(check_secure_net_ti(nbuf, ypname))) {
*error = YP_NOMAP;
return (FALSE);
}
if (current_map_access == PUBLIC) {
return (TRUE);
}
if (af == AF_INET6) {
port = ntohs(((struct sockaddr_in6 *)nbuf->buf)->sin6_port);
} else {
port = ntohs(((struct sockaddr_in *)nbuf->buf)->sin_port);
}
if (port < IPPORT_RESERVED) {
return (TRUE);
}
if (current_map_access == UNKNOWN) {
datum key;
datum val;
key.dptr = yp_secure;
key.dsize = yp_secure_sz;
val = dbm_fetch(fdb, key);
if (val.dptr == (char *)NULL) {
current_map_access = PUBLIC;
return (TRUE);
}
current_map_access = SECURE;
}
*error = YP_NOMAP;
return (FALSE);
}