18360efbdSAlfred Perlstein /* $NetBSD: getnetpath.c,v 1.3 2000/07/06 03:10:34 christos Exp $ */ 28360efbdSAlfred Perlstein 32e322d37SHiroki Sato /*- 42e322d37SHiroki Sato * Copyright (c) 2009, Sun Microsystems, Inc. 52e322d37SHiroki Sato * All rights reserved. 68360efbdSAlfred Perlstein * 72e322d37SHiroki Sato * Redistribution and use in source and binary forms, with or without 82e322d37SHiroki Sato * modification, are permitted provided that the following conditions are met: 92e322d37SHiroki Sato * - Redistributions of source code must retain the above copyright notice, 102e322d37SHiroki Sato * this list of conditions and the following disclaimer. 112e322d37SHiroki Sato * - Redistributions in binary form must reproduce the above copyright notice, 122e322d37SHiroki Sato * this list of conditions and the following disclaimer in the documentation 132e322d37SHiroki Sato * and/or other materials provided with the distribution. 142e322d37SHiroki Sato * - Neither the name of Sun Microsystems, Inc. nor the names of its 152e322d37SHiroki Sato * contributors may be used to endorse or promote products derived 162e322d37SHiroki Sato * from this software without specific prior written permission. 178360efbdSAlfred Perlstein * 182e322d37SHiroki Sato * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" 192e322d37SHiroki Sato * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 202e322d37SHiroki Sato * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 212e322d37SHiroki Sato * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE 222e322d37SHiroki Sato * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 232e322d37SHiroki Sato * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 242e322d37SHiroki Sato * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 252e322d37SHiroki Sato * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 262e322d37SHiroki Sato * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 272e322d37SHiroki Sato * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 282e322d37SHiroki Sato * POSSIBILITY OF SUCH DAMAGE. 298360efbdSAlfred Perlstein */ 30a986ef57SDavid E. O'Brien 31a986ef57SDavid E. O'Brien #if defined(LIBC_SCCS) && !defined(lint) 328360efbdSAlfred Perlstein static char sccsid[] = "@(#)getnetpath.c 1.11 91/12/19 SMI"; 338360efbdSAlfred Perlstein #endif 34d3d20c82SDavid E. O'Brien #include <sys/cdefs.h> 35d3d20c82SDavid E. O'Brien __FBSDID("$FreeBSD$"); 368360efbdSAlfred Perlstein 378360efbdSAlfred Perlstein /* 388360efbdSAlfred Perlstein * Copyright (c) 1989 by Sun Microsystems, Inc. 398360efbdSAlfred Perlstein */ 408360efbdSAlfred Perlstein 418360efbdSAlfred Perlstein #include "namespace.h" 428360efbdSAlfred Perlstein #include <stdio.h> 438360efbdSAlfred Perlstein #include <errno.h> 448360efbdSAlfred Perlstein #include <netconfig.h> 458360efbdSAlfred Perlstein #include <stdlib.h> 468360efbdSAlfred Perlstein #include <string.h> 478360efbdSAlfred Perlstein #include <syslog.h> 488360efbdSAlfred Perlstein #include "un-namespace.h" 498360efbdSAlfred Perlstein 508360efbdSAlfred Perlstein /* 518360efbdSAlfred Perlstein * internal structure to keep track of a netpath "session" 528360efbdSAlfred Perlstein */ 538360efbdSAlfred Perlstein struct netpath_chain { 548360efbdSAlfred Perlstein struct netconfig *ncp; /* an nconf entry */ 558360efbdSAlfred Perlstein struct netpath_chain *nchain_next; /* next nconf entry allocated */ 568360efbdSAlfred Perlstein }; 578360efbdSAlfred Perlstein 588360efbdSAlfred Perlstein 598360efbdSAlfred Perlstein struct netpath_vars { 608360efbdSAlfred Perlstein int valid; /* token that indicates a valid netpath_vars */ 618360efbdSAlfred Perlstein void *nc_handlep; /* handle for current netconfig "session" */ 628360efbdSAlfred Perlstein char *netpath; /* pointer to current view-point in NETPATH */ 638360efbdSAlfred Perlstein char *netpath_start; /* pointer to start of our copy of NETPATH */ 648360efbdSAlfred Perlstein struct netpath_chain *ncp_list; /* list of nconfs allocated this session*/ 658360efbdSAlfred Perlstein }; 668360efbdSAlfred Perlstein 678360efbdSAlfred Perlstein #define NP_VALID 0xf00d 688360efbdSAlfred Perlstein #define NP_INVALID 0 698360efbdSAlfred Perlstein 70c05ac53bSDavid E. O'Brien char *_get_next_token(char *, int); 718360efbdSAlfred Perlstein 728360efbdSAlfred Perlstein 738360efbdSAlfred Perlstein /* 748360efbdSAlfred Perlstein * A call to setnetpath() establishes a NETPATH "session". setnetpath() 758360efbdSAlfred Perlstein * must be called before the first call to getnetpath(). A "handle" is 768360efbdSAlfred Perlstein * returned to distinguish the session; this handle should be passed 778360efbdSAlfred Perlstein * subsequently to getnetpath(). (Handles are used to allow for nested calls 788360efbdSAlfred Perlstein * to setnetpath()). 798360efbdSAlfred Perlstein * If setnetpath() is unable to establish a session (due to lack of memory 808360efbdSAlfred Perlstein * resources, or the absence of the /etc/netconfig file), a NULL pointer is 818360efbdSAlfred Perlstein * returned. 828360efbdSAlfred Perlstein */ 838360efbdSAlfred Perlstein 848360efbdSAlfred Perlstein void * 858360efbdSAlfred Perlstein setnetpath() 868360efbdSAlfred Perlstein { 878360efbdSAlfred Perlstein 888360efbdSAlfred Perlstein struct netpath_vars *np_sessionp; /* this session's variables */ 898360efbdSAlfred Perlstein char *npp; /* NETPATH env variable */ 908360efbdSAlfred Perlstein 918360efbdSAlfred Perlstein #ifdef MEM_CHK 928360efbdSAlfred Perlstein malloc_debug(1); 938360efbdSAlfred Perlstein #endif 948360efbdSAlfred Perlstein 958360efbdSAlfred Perlstein if ((np_sessionp = 968360efbdSAlfred Perlstein (struct netpath_vars *)malloc(sizeof (struct netpath_vars))) == NULL) { 978360efbdSAlfred Perlstein return (NULL); 988360efbdSAlfred Perlstein } 998360efbdSAlfred Perlstein if ((np_sessionp->nc_handlep = setnetconfig()) == NULL) { 1008360efbdSAlfred Perlstein syslog (LOG_ERR, "rpc: failed to open " NETCONFIG); 10142c9e355SChristian Brueffer goto failed; 1028360efbdSAlfred Perlstein } 1038360efbdSAlfred Perlstein np_sessionp->valid = NP_VALID; 1048360efbdSAlfred Perlstein np_sessionp->ncp_list = NULL; 1058360efbdSAlfred Perlstein if ((npp = getenv(NETPATH)) == NULL) { 1068360efbdSAlfred Perlstein np_sessionp->netpath = NULL; 1078360efbdSAlfred Perlstein } else { 1088360efbdSAlfred Perlstein (void) endnetconfig(np_sessionp->nc_handlep);/* won't need nc session*/ 1098360efbdSAlfred Perlstein np_sessionp->nc_handlep = NULL; 110330e445cSMatteo Riondato if ((np_sessionp->netpath = malloc(strlen(npp)+1)) == NULL) 111330e445cSMatteo Riondato goto failed; 112330e445cSMatteo Riondato else { 1138360efbdSAlfred Perlstein (void) strcpy(np_sessionp->netpath, npp); 1148360efbdSAlfred Perlstein } 1158360efbdSAlfred Perlstein } 1168360efbdSAlfred Perlstein np_sessionp->netpath_start = np_sessionp->netpath; 1178360efbdSAlfred Perlstein return ((void *)np_sessionp); 118330e445cSMatteo Riondato 119330e445cSMatteo Riondato failed: 120330e445cSMatteo Riondato free(np_sessionp); 121330e445cSMatteo Riondato return (NULL); 1228360efbdSAlfred Perlstein } 1238360efbdSAlfred Perlstein 1248360efbdSAlfred Perlstein /* 1258360efbdSAlfred Perlstein * When first called, getnetpath() returns a pointer to the netconfig 1268360efbdSAlfred Perlstein * database entry corresponding to the first valid NETPATH component. The 1278360efbdSAlfred Perlstein * netconfig entry is formatted as a struct netconfig. 1288360efbdSAlfred Perlstein * On each subsequent call, getnetpath returns a pointer to the netconfig 1298360efbdSAlfred Perlstein * entry that corresponds to the next valid NETPATH component. getnetpath 1308360efbdSAlfred Perlstein * can thus be used to search the netconfig database for all networks 1318360efbdSAlfred Perlstein * included in the NETPATH variable. 1328360efbdSAlfred Perlstein * When NETPATH has been exhausted, getnetpath() returns NULL. It returns 1338360efbdSAlfred Perlstein * NULL and sets errno in case of an error (e.g., setnetpath was not called 1348360efbdSAlfred Perlstein * previously). 1358360efbdSAlfred Perlstein * getnetpath() silently ignores invalid NETPATH components. A NETPATH 1368360efbdSAlfred Perlstein * compnent is invalid if there is no corresponding entry in the netconfig 1378360efbdSAlfred Perlstein * database. 1388360efbdSAlfred Perlstein * If the NETPATH variable is unset, getnetpath() behaves as if NETPATH 1398360efbdSAlfred Perlstein * were set to the sequence of default or visible networks in the netconfig 1408360efbdSAlfred Perlstein * database, in the order in which they are listed. 1418360efbdSAlfred Perlstein */ 1428360efbdSAlfred Perlstein 1438360efbdSAlfred Perlstein struct netconfig * 1448360efbdSAlfred Perlstein getnetpath(handlep) 1458360efbdSAlfred Perlstein void *handlep; 1468360efbdSAlfred Perlstein { 1478360efbdSAlfred Perlstein struct netpath_vars *np_sessionp = (struct netpath_vars *)handlep; 1488360efbdSAlfred Perlstein struct netconfig *ncp = NULL; /* temp. holds a netconfig session */ 1498360efbdSAlfred Perlstein struct netpath_chain *chainp; /* holds chain of ncp's we alloc */ 1508360efbdSAlfred Perlstein char *npp; /* holds current NETPATH */ 1518360efbdSAlfred Perlstein 1528360efbdSAlfred Perlstein if (np_sessionp == NULL || np_sessionp->valid != NP_VALID) { 1538360efbdSAlfred Perlstein errno = EINVAL; 1548360efbdSAlfred Perlstein return (NULL); 1558360efbdSAlfred Perlstein } 1568360efbdSAlfred Perlstein if (np_sessionp->netpath_start == NULL) { /* NETPATH was not set */ 1578360efbdSAlfred Perlstein do { /* select next visible network */ 1588360efbdSAlfred Perlstein if (np_sessionp->nc_handlep == NULL) { 1598360efbdSAlfred Perlstein np_sessionp->nc_handlep = setnetconfig(); 1608360efbdSAlfred Perlstein if (np_sessionp->nc_handlep == NULL) 1618360efbdSAlfred Perlstein syslog (LOG_ERR, "rpc: failed to open " NETCONFIG); 1628360efbdSAlfred Perlstein } 1638360efbdSAlfred Perlstein if ((ncp = getnetconfig(np_sessionp->nc_handlep)) == NULL) { 1648360efbdSAlfred Perlstein return(NULL); 1658360efbdSAlfred Perlstein } 1668360efbdSAlfred Perlstein } while ((ncp->nc_flag & NC_VISIBLE) == 0); 1678360efbdSAlfred Perlstein return (ncp); 1688360efbdSAlfred Perlstein } 1698360efbdSAlfred Perlstein /* 1708360efbdSAlfred Perlstein * Find first valid network ID in netpath. 1718360efbdSAlfred Perlstein */ 1728360efbdSAlfred Perlstein while ((npp = np_sessionp->netpath) != NULL && strlen(npp) != 0) { 1738360efbdSAlfred Perlstein np_sessionp->netpath = _get_next_token(npp, ':'); 1748360efbdSAlfred Perlstein /* 1758360efbdSAlfred Perlstein * npp is a network identifier. 1768360efbdSAlfred Perlstein */ 1778360efbdSAlfred Perlstein if ((ncp = getnetconfigent(npp)) != NULL) { 1788360efbdSAlfred Perlstein chainp = (struct netpath_chain *) /* cobble alloc chain entry */ 1798360efbdSAlfred Perlstein malloc(sizeof (struct netpath_chain)); 1808360efbdSAlfred Perlstein chainp->ncp = ncp; 1818360efbdSAlfred Perlstein chainp->nchain_next = NULL; 1828360efbdSAlfred Perlstein if (np_sessionp->ncp_list == NULL) { 1838360efbdSAlfred Perlstein np_sessionp->ncp_list = chainp; 1848360efbdSAlfred Perlstein } else { 1858360efbdSAlfred Perlstein np_sessionp->ncp_list->nchain_next = chainp; 1868360efbdSAlfred Perlstein } 1878360efbdSAlfred Perlstein return (ncp); 1888360efbdSAlfred Perlstein } 1898360efbdSAlfred Perlstein /* couldn't find this token in the database; go to next one. */ 1908360efbdSAlfred Perlstein } 1918360efbdSAlfred Perlstein return (NULL); 1928360efbdSAlfred Perlstein } 1938360efbdSAlfred Perlstein 1948360efbdSAlfred Perlstein /* 1958360efbdSAlfred Perlstein * endnetpath() may be called to unbind NETPATH when processing is complete, 1968360efbdSAlfred Perlstein * releasing resources for reuse. It returns 0 on success and -1 on failure 1978360efbdSAlfred Perlstein * (e.g. if setnetpath() was not called previously. 1988360efbdSAlfred Perlstein */ 1998360efbdSAlfred Perlstein int 2008360efbdSAlfred Perlstein endnetpath(handlep) 2018360efbdSAlfred Perlstein void *handlep; 2028360efbdSAlfred Perlstein { 2038360efbdSAlfred Perlstein struct netpath_vars *np_sessionp = (struct netpath_vars *)handlep; 2048360efbdSAlfred Perlstein struct netpath_chain *chainp, *lastp; 2058360efbdSAlfred Perlstein 2068360efbdSAlfred Perlstein if (np_sessionp == NULL || np_sessionp->valid != NP_VALID) { 2078360efbdSAlfred Perlstein errno = EINVAL; 2088360efbdSAlfred Perlstein return (-1); 2098360efbdSAlfred Perlstein } 2108360efbdSAlfred Perlstein if (np_sessionp->nc_handlep != NULL) 2118360efbdSAlfred Perlstein endnetconfig(np_sessionp->nc_handlep); 2128360efbdSAlfred Perlstein if (np_sessionp->netpath_start != NULL) 2138360efbdSAlfred Perlstein free(np_sessionp->netpath_start); 2148360efbdSAlfred Perlstein for (chainp = np_sessionp->ncp_list; chainp != NULL; 2158360efbdSAlfred Perlstein lastp=chainp, chainp=chainp->nchain_next, free(lastp)) { 2168360efbdSAlfred Perlstein freenetconfigent(chainp->ncp); 2178360efbdSAlfred Perlstein } 2188360efbdSAlfred Perlstein free(np_sessionp); 2198360efbdSAlfred Perlstein #ifdef MEM_CHK 2208360efbdSAlfred Perlstein if (malloc_verify() == 0) { 2218360efbdSAlfred Perlstein fprintf(stderr, "memory heap corrupted in endnetpath\n"); 2228360efbdSAlfred Perlstein exit(1); 2238360efbdSAlfred Perlstein } 2248360efbdSAlfred Perlstein #endif 2258360efbdSAlfred Perlstein return (0); 2268360efbdSAlfred Perlstein } 2278360efbdSAlfred Perlstein 2288360efbdSAlfred Perlstein 2298360efbdSAlfred Perlstein 2308360efbdSAlfred Perlstein /* 2318360efbdSAlfred Perlstein * Returns pointer to the rest-of-the-string after the current token. 2328360efbdSAlfred Perlstein * The token itself starts at arg, and we null terminate it. We return NULL 2338360efbdSAlfred Perlstein * if either the arg is empty, or if this is the last token. 2348360efbdSAlfred Perlstein */ 2358360efbdSAlfred Perlstein 2368360efbdSAlfred Perlstein char * 2378360efbdSAlfred Perlstein _get_next_token(npp, token) 2388360efbdSAlfred Perlstein char *npp; /* string */ 2398360efbdSAlfred Perlstein int token; /* char to parse string for */ 2408360efbdSAlfred Perlstein { 2418360efbdSAlfred Perlstein char *cp; /* char pointer */ 2428360efbdSAlfred Perlstein char *np; /* netpath pointer */ 2438360efbdSAlfred Perlstein char *ep; /* escape pointer */ 2448360efbdSAlfred Perlstein 2458360efbdSAlfred Perlstein if ((cp = strchr(npp, token)) == NULL) { 2468360efbdSAlfred Perlstein return (NULL); 2478360efbdSAlfred Perlstein } 2488360efbdSAlfred Perlstein /* 2498360efbdSAlfred Perlstein * did find a token, but it might be escaped. 2508360efbdSAlfred Perlstein */ 251555f4cffSMartin Blapp if ((cp > npp) && (cp[-1] == '\\')) { 2528360efbdSAlfred Perlstein /* if slash was also escaped, carry on, otherwise find next token */ 253555f4cffSMartin Blapp if ((cp > npp + 1) && (cp[-2] != '\\')) { 2548360efbdSAlfred Perlstein /* shift r-o-s onto the escaped token */ 2558360efbdSAlfred Perlstein strcpy(&cp[-1], cp); /* XXX: overlapping string copy */ 2568360efbdSAlfred Perlstein /* 2578360efbdSAlfred Perlstein * Do a recursive call. 2588360efbdSAlfred Perlstein * We don't know how many escaped tokens there might be. 2598360efbdSAlfred Perlstein */ 2608360efbdSAlfred Perlstein return (_get_next_token(cp, token)); 2618360efbdSAlfred Perlstein } 2628360efbdSAlfred Perlstein } 2638360efbdSAlfred Perlstein 2648360efbdSAlfred Perlstein *cp++ = '\0'; /* null-terminate token */ 2658360efbdSAlfred Perlstein /* get rid of any backslash escapes */ 2668360efbdSAlfred Perlstein ep = npp; 2678360efbdSAlfred Perlstein while ((np = strchr(ep, '\\')) != 0) { 2688360efbdSAlfred Perlstein if (np[1] == '\\') 2698360efbdSAlfred Perlstein np++; 2708360efbdSAlfred Perlstein strcpy(np, (ep = &np[1])); /* XXX: overlapping string copy */ 2718360efbdSAlfred Perlstein } 2728360efbdSAlfred Perlstein return (cp); /* return ptr to r-o-s */ 2738360efbdSAlfred Perlstein } 274