tcp: Cache align ACK queue header.
[dragonfly.git] / usr.sbin / ypserv / yp_server.c
blob68b0618302592f5f6700ce9e08a582714ce93d90
1 /*
2 * Copyright (c) 1995
3 * Bill Paul <wpaul@ctr.columbia.edu>. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by Bill Paul.
16 * 4. Neither the name of the author nor the names of any co-contributors
17 * may be used to endorse or promote products derived from this software
18 * without specific prior written permission.
20 * THIS SOFTWARE IS PROVIDED BY Bill Paul AND CONTRIBUTORS ``AS IS'' AND
21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL Bill Paul OR CONTRIBUTORS BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 * SUCH DAMAGE.
32 * $FreeBSD: src/usr.sbin/ypserv/yp_server.c,v 1.40 2006/06/09 14:01:07 maxim Exp $
33 * $DragonFly: src/usr.sbin/ypserv/yp_server.c,v 1.4 2005/11/24 22:23:02 swildner Exp $
36 #include "yp.h"
37 #include "yp_extern.h"
38 #include <dirent.h>
39 #include <errno.h>
40 #include <stdlib.h>
41 #include <sys/stat.h>
42 #include <sys/param.h>
43 #include <sys/types.h>
44 #include <sys/socket.h>
45 #include <netinet/in.h>
46 #include <arpa/inet.h>
47 #include <rpc/rpc.h>
49 int children = 0;
51 #define MASTER_STRING "YP_MASTER_NAME"
52 #define MASTER_SZ sizeof(MASTER_STRING) - 1
53 #define ORDER_STRING "YP_LAST_MODIFIED"
54 #define ORDER_SZ sizeof(ORDER_STRING) - 1
56 static pid_t
57 yp_fork(void)
59 if (yp_pid != getpid()) {
60 yp_error("child %d trying to fork!", getpid());
61 errno = EEXIST;
62 return(-1);
65 return(fork());
69 * NIS v2 support. This is where most of the action happens.
72 void *
73 ypproc_null_2_svc(void *argp, struct svc_req *rqstp)
75 static char * result;
76 static char rval = 0;
78 #ifdef DB_CACHE
79 if (yp_access(NULL, NULL, (struct svc_req *)rqstp))
80 #else
81 if (yp_access(NULL, (struct svc_req *)rqstp))
82 #endif
83 return(NULL);
85 result = &rval;
87 return((void *) &result);
90 bool_t *
91 ypproc_domain_2_svc(domainname *argp, struct svc_req *rqstp)
93 static bool_t result;
95 #ifdef DB_CACHE
96 if (yp_access(NULL, NULL, (struct svc_req *)rqstp)) {
97 #else
98 if (yp_access(NULL, (struct svc_req *)rqstp)) {
99 #endif
100 result = FALSE;
101 return (&result);
104 if (argp == NULL || yp_validdomain(*argp))
105 result = FALSE;
106 else
107 result = TRUE;
109 return (&result);
112 bool_t *
113 ypproc_domain_nonack_2_svc(domainname *argp, struct svc_req *rqstp)
115 static bool_t result;
117 #ifdef DB_CACHE
118 if (yp_access(NULL, NULL, (struct svc_req *)rqstp))
119 #else
120 if (yp_access(NULL, (struct svc_req *)rqstp))
121 #endif
122 return (NULL);
124 if (argp == NULL || yp_validdomain(*argp))
125 return (NULL);
126 else
127 result = TRUE;
129 return (&result);
132 ypresp_val *
133 ypproc_match_2_svc(ypreq_key *argp, struct svc_req *rqstp)
135 static ypresp_val result;
137 result.val.valdat_val = "";
138 result.val.valdat_len = 0;
140 #ifdef DB_CACHE
141 if (yp_access(argp->map, argp->domain, (struct svc_req *)rqstp)) {
142 #else
143 if (yp_access(argp->map, (struct svc_req *)rqstp)) {
144 #endif
145 result.stat = YP_YPERR;
146 return (&result);
149 if (argp->domain == NULL || argp->map == NULL) {
150 result.stat = YP_BADARGS;
151 return (&result);
154 if (yp_select_map(argp->map, argp->domain, NULL, 1) != YP_TRUE) {
155 result.stat = yp_errno;
156 return(&result);
159 result.stat = yp_getbykey(&argp->key, &result.val);
162 * Do DNS lookups for hosts maps if database lookup failed.
165 #ifdef DB_CACHE
166 if (do_dns && result.stat != YP_TRUE &&
167 (yp_testflag(argp->map, argp->domain, YP_INTERDOMAIN) ||
168 (strstr(argp->map, "hosts") || strstr(argp->map, "ipnodes")))) {
169 #else
170 if (do_dns && result.stat != YP_TRUE &&
171 (strstr(argp->map, "hosts") || strstr(argp->map, "ipnodes"))) {
172 #endif
173 char nbuf[YPMAXRECORD];
175 /* NUL terminate! NUL terminate!! NUL TERMINATE!!! */
176 bcopy(argp->key.keydat_val, nbuf, argp->key.keydat_len);
177 nbuf[argp->key.keydat_len] = '\0';
179 if (debug)
180 yp_error("doing DNS lookup of %s", nbuf);
182 if (!strcmp(argp->map, "hosts.byname"))
183 result.stat = yp_async_lookup_name(rqstp, nbuf,
184 AF_INET);
185 else if (!strcmp(argp->map, "hosts.byaddr"))
186 result.stat = yp_async_lookup_addr(rqstp, nbuf,
187 AF_INET);
188 else if (!strcmp(argp->map, "ipnodes.byname"))
189 result.stat = yp_async_lookup_name(rqstp, nbuf,
190 AF_INET6);
191 else if (!strcmp(argp->map, "ipnodes.byaddr"))
192 result.stat = yp_async_lookup_addr(rqstp, nbuf,
193 AF_INET6);
195 if (result.stat == YP_TRUE)
196 return(NULL);
199 return (&result);
202 ypresp_key_val *
203 ypproc_first_2_svc(ypreq_nokey *argp, struct svc_req *rqstp)
205 static ypresp_key_val result;
207 result.val.valdat_val = result.key.keydat_val = "";
208 result.val.valdat_len = result.key.keydat_len = 0;
210 #ifdef DB_CACHE
211 if (yp_access(argp->map, argp->domain, (struct svc_req *)rqstp)) {
212 #else
213 if (yp_access(argp->map, (struct svc_req *)rqstp)) {
214 #endif
215 result.stat = YP_YPERR;
216 return (&result);
219 if (argp->domain == NULL) {
220 result.stat = YP_BADARGS;
221 return (&result);
224 if (yp_select_map(argp->map, argp->domain, NULL, 0) != YP_TRUE) {
225 result.stat = yp_errno;
226 return(&result);
229 result.stat = yp_firstbykey(&result.key, &result.val);
231 return (&result);
234 ypresp_key_val *
235 ypproc_next_2_svc(ypreq_key *argp, struct svc_req *rqstp)
237 static ypresp_key_val result;
239 result.val.valdat_val = result.key.keydat_val = "";
240 result.val.valdat_len = result.key.keydat_len = 0;
242 #ifdef DB_CACHE
243 if (yp_access(argp->map, argp->domain, (struct svc_req *)rqstp)) {
244 #else
245 if (yp_access(argp->map, (struct svc_req *)rqstp)) {
246 #endif
247 result.stat = YP_YPERR;
248 return (&result);
251 if (argp->domain == NULL || argp->map == NULL) {
252 result.stat = YP_BADARGS;
253 return (&result);
256 if (yp_select_map(argp->map, argp->domain, &argp->key, 0) != YP_TRUE) {
257 result.stat = yp_errno;
258 return(&result);
261 result.key.keydat_len = argp->key.keydat_len;
262 result.key.keydat_val = argp->key.keydat_val;
264 result.stat = yp_nextbykey(&result.key, &result.val);
266 return (&result);
269 static void
270 ypxfr_callback(ypxfrstat rval, struct sockaddr_in *addr, unsigned int transid,
271 unsigned int prognum, unsigned long port)
273 CLIENT *clnt;
274 int sock = RPC_ANYSOCK;
275 struct timeval timeout;
276 yppushresp_xfr ypxfr_resp;
277 struct rpc_err err;
279 timeout.tv_sec = 5;
280 timeout.tv_usec = 0;
281 addr->sin_port = htons(port);
283 if ((clnt = clntudp_create(addr,prognum,1,timeout,&sock)) == NULL) {
284 yp_error("%s: %s", inet_ntoa(addr->sin_addr),
285 clnt_spcreateerror("failed to establish callback handle"));
286 return;
289 ypxfr_resp.status = rval;
290 ypxfr_resp.transid = transid;
292 /* Turn the timeout off -- we don't want to block. */
293 timeout.tv_sec = 0;
294 if (clnt_control(clnt, CLSET_TIMEOUT, &timeout) == FALSE)
295 yp_error("failed to set timeout on ypproc_xfr callback");
297 if (yppushproc_xfrresp_1(&ypxfr_resp, clnt) == NULL) {
298 clnt_geterr(clnt, &err);
299 if (err.re_status != RPC_SUCCESS &&
300 err.re_status != RPC_TIMEDOUT)
301 yp_error("%s", clnt_sperror(clnt,
302 "ypxfr callback failed"));
305 clnt_destroy(clnt);
306 return;
309 #define YPXFR_RETURN(CODE) \
310 /* Order is important: send regular RPC reply, then callback */ \
311 result.xfrstat = CODE; \
312 svc_sendreply(rqstp->rq_xprt, (xdrproc_t)xdr_ypresp_xfr, &result); \
313 ypxfr_callback(CODE,rqhost,argp->transid, \
314 argp->prog,argp->port); \
315 return(NULL);
317 ypresp_xfr *
318 ypproc_xfr_2_svc(ypreq_xfr *argp, struct svc_req *rqstp)
320 static ypresp_xfr result;
321 struct sockaddr_in *rqhost;
322 ypresp_master *mres;
323 ypreq_nokey mreq;
325 result.transid = argp->transid;
326 rqhost = svc_getcaller(rqstp->rq_xprt);
328 #ifdef DB_CACHE
329 if (yp_access(argp->map_parms.map,
330 argp->map_parms.domain, (struct svc_req *)rqstp)) {
331 #else
332 if (yp_access(argp->map_parms.map, (struct svc_req *)rqstp)) {
333 #endif
334 YPXFR_RETURN(YPXFR_REFUSED)
338 if (argp->map_parms.domain == NULL) {
339 YPXFR_RETURN(YPXFR_BADARGS)
342 if (yp_validdomain(argp->map_parms.domain)) {
343 YPXFR_RETURN(YPXFR_NODOM)
347 * Determine the master host ourselves. The caller may
348 * be up to no good. This has the side effect of verifying
349 * that the requested map and domain actually exist.
352 mreq.domain = argp->map_parms.domain;
353 mreq.map = argp->map_parms.map;
355 mres = ypproc_master_2_svc(&mreq, rqstp);
357 if (mres->stat != YP_TRUE) {
358 yp_error("couldn't find master for map %s@%s",
359 argp->map_parms.map,
360 argp->map_parms.domain);
361 yp_error("host at %s (%s) may be pulling my leg",
362 argp->map_parms.peer,
363 inet_ntoa(rqhost->sin_addr));
364 YPXFR_RETURN(YPXFR_REFUSED)
367 switch (yp_fork()) {
368 case 0:
370 char g[11], t[11], p[11];
371 char ypxfr_command[MAXPATHLEN + 2];
373 snprintf (ypxfr_command, sizeof(ypxfr_command), "%sypxfr", _PATH_LIBEXEC);
374 snprintf (t, sizeof(t), "%u", argp->transid);
375 snprintf (g, sizeof(g), "%u", argp->prog);
376 snprintf (p, sizeof(p), "%u", argp->port);
377 if (debug) {
378 close(0); close(1); close(2);
380 if (strcmp(yp_dir, _PATH_YP)) {
381 execl(ypxfr_command, "ypxfr",
382 "-d", argp->map_parms.domain,
383 "-h", mres->peer,
384 "-p", yp_dir, "-C", t,
385 g, inet_ntoa(rqhost->sin_addr),
386 p, argp->map_parms.map,
387 NULL);
388 } else {
389 execl(ypxfr_command, "ypxfr",
390 "-d", argp->map_parms.domain,
391 "-h", mres->peer,
392 "-C", t,
393 g, inet_ntoa(rqhost->sin_addr),
394 p, argp->map_parms.map,
395 NULL);
397 yp_error("ypxfr execl(%s): %s", ypxfr_command, strerror(errno));
398 YPXFR_RETURN(YPXFR_XFRERR)
400 * Just to safe, prevent PR #10970 from biting us in
401 * the unlikely case that execing ypxfr fails. We don't
402 * want to have any child processes spawned from this
403 * child process.
405 _exit(0);
406 break;
408 case -1:
409 yp_error("ypxfr fork(): %s", strerror(errno));
410 YPXFR_RETURN(YPXFR_XFRERR)
411 break;
412 default:
413 result.xfrstat = YPXFR_SUCC;
414 children++;
415 break;
418 return (&result);
420 #undef YPXFR_RETURN
422 void *
423 ypproc_clear_2_svc(void *argp, struct svc_req *rqstp)
425 static char * result;
426 static char rval = 0;
428 #ifdef DB_CACHE
429 if (yp_access(NULL, NULL, (struct svc_req *)rqstp))
430 #else
431 if (yp_access(NULL, (struct svc_req *)rqstp))
432 #endif
433 return (NULL);
434 #ifdef DB_CACHE
435 /* clear out the database cache */
436 yp_flush_all();
437 #endif
438 /* Re-read the securenets database for the hell of it. */
439 load_securenets();
441 result = &rval;
442 return((void *) &result);
446 * For ypproc_all, we have to send a stream of ypresp_all structures
447 * via TCP, but the XDR filter generated from the yp.x protocol
448 * definition file only serializes one such structure. This means that
449 * to send the whole stream, you need a wrapper which feeds all the
450 * records into the underlying XDR routine until it hits an 'EOF.'
451 * But to use the wrapper, you have to violate the boundaries between
452 * RPC layers by calling svc_sendreply() directly from the ypproc_all
453 * service routine instead of letting the RPC dispatcher do it.
455 * Bleah.
459 * Custom XDR routine for serialzing results of ypproc_all: keep
460 * reading from the database and spew until we run out of records
461 * or encounter an error.
463 static bool_t
464 xdr_my_ypresp_all(XDR *xdrs, ypresp_all *objp)
466 while (1) {
467 /* Get a record. */
468 if ((objp->ypresp_all_u.val.stat =
469 yp_nextbykey(&objp->ypresp_all_u.val.key,
470 &objp->ypresp_all_u.val.val)) == YP_TRUE) {
471 objp->more = TRUE;
472 } else {
473 objp->more = FALSE;
476 /* Serialize. */
477 if (!xdr_ypresp_all(xdrs, objp))
478 return(FALSE);
479 if (objp->more == FALSE)
480 return(TRUE);
484 ypresp_all *
485 ypproc_all_2_svc(ypreq_nokey *argp, struct svc_req *rqstp)
487 static ypresp_all result;
490 * Set this here so that the client will be forced to make
491 * at least one attempt to read from us even if all we're
492 * doing is returning an error.
494 result.more = TRUE;
495 result.ypresp_all_u.val.key.keydat_len = 0;
496 result.ypresp_all_u.val.key.keydat_val = "";
498 #ifdef DB_CACHE
499 if (yp_access(argp->map, argp->domain, (struct svc_req *)rqstp)) {
500 #else
501 if (yp_access(argp->map, (struct svc_req *)rqstp)) {
502 #endif
503 result.ypresp_all_u.val.stat = YP_YPERR;
504 return (&result);
507 if (argp->domain == NULL || argp->map == NULL) {
508 result.ypresp_all_u.val.stat = YP_BADARGS;
509 return (&result);
513 * XXX If we hit the child limit, fail the request.
514 * If we don't, and the map is large, we could block for
515 * a long time in the parent.
517 if (children >= MAX_CHILDREN) {
518 result.ypresp_all_u.val.stat = YP_YPERR;
519 return(&result);
523 * The ypproc_all procedure can take a while to complete.
524 * Best to handle it in a subprocess so the parent doesn't
525 * block. (Is there a better way to do this? Maybe with
526 * async socket I/O?)
528 if (!debug) {
529 switch (yp_fork()) {
530 case 0:
531 break;
532 case -1:
533 yp_error("ypall fork(): %s", strerror(errno));
534 result.ypresp_all_u.val.stat = YP_YPERR;
535 return(&result);
536 break;
537 default:
538 children++;
539 return (NULL);
540 break;
545 * Fix for PR #10971: don't let the child ypserv share
546 * DB handles with the parent process.
548 #ifdef DB_CACHE
549 yp_flush_all();
550 #endif
552 if (yp_select_map(argp->map, argp->domain,
553 &result.ypresp_all_u.val.key, 0) != YP_TRUE) {
554 result.ypresp_all_u.val.stat = yp_errno;
555 return(&result);
558 /* Kick off the actual data transfer. */
559 svc_sendreply(rqstp->rq_xprt, (xdrproc_t)xdr_my_ypresp_all, &result);
562 * Proper fix for PR #10970: exit here so that we don't risk
563 * having a child spawned from this sub-process.
565 _exit(0);
568 ypresp_master *
569 ypproc_master_2_svc(ypreq_nokey *argp, struct svc_req *rqstp)
571 static ypresp_master result;
572 static char ypvalbuf[YPMAXRECORD];
573 keydat key = { MASTER_SZ, MASTER_STRING };
574 valdat val;
576 result.peer = "";
578 #ifdef DB_CACHE
579 if (yp_access(argp->map, argp->domain, (struct svc_req *)rqstp)) {
580 #else
581 if (yp_access(argp->map, (struct svc_req *)rqstp)) {
582 #endif
583 result.stat = YP_YPERR;
584 return(&result);
587 if (argp->domain == NULL) {
588 result.stat = YP_BADARGS;
589 return (&result);
592 if (yp_select_map(argp->map, argp->domain, &key, 1) != YP_TRUE) {
593 result.stat = yp_errno;
594 return(&result);
598 * Note that we copy the data retrieved from the database to
599 * a private buffer and NUL terminate the buffer rather than
600 * terminating the data in place. We do this because by stuffing
601 * a '\0' into data.data, we will actually be corrupting memory
602 * allocated by the DB package. This is a bad thing now that we
603 * cache DB handles rather than closing the database immediately.
605 result.stat = yp_getbykey(&key, &val);
606 if (result.stat == YP_TRUE) {
607 bcopy(val.valdat_val, &ypvalbuf, val.valdat_len);
608 ypvalbuf[val.valdat_len] = '\0';
609 result.peer = ypvalbuf;
610 } else
611 result.peer = "";
613 return (&result);
616 ypresp_order *
617 ypproc_order_2_svc(ypreq_nokey *argp, struct svc_req *rqstp)
619 static ypresp_order result;
620 keydat key = { ORDER_SZ, ORDER_STRING };
621 valdat val;
623 result.ordernum = 0;
625 #ifdef DB_CACHE
626 if (yp_access(argp->map, argp->domain, (struct svc_req *)rqstp)) {
627 #else
628 if (yp_access(argp->map, (struct svc_req *)rqstp)) {
629 #endif
630 result.stat = YP_YPERR;
631 return(&result);
634 if (argp->domain == NULL) {
635 result.stat = YP_BADARGS;
636 return (&result);
640 * We could just check the timestamp on the map file,
641 * but that's a hack: we'll only know the last time the file
642 * was touched, not the last time the database contents were
643 * updated.
646 if (yp_select_map(argp->map, argp->domain, &key, 1) != YP_TRUE) {
647 result.stat = yp_errno;
648 return(&result);
651 result.stat = yp_getbykey(&key, &val);
653 if (result.stat == YP_TRUE)
654 result.ordernum = atoi(val.valdat_val);
655 else
656 result.ordernum = 0;
658 return (&result);
661 static void
662 yp_maplist_free(struct ypmaplist *yp_maplist)
664 struct ypmaplist *next;
666 while (yp_maplist) {
667 next = yp_maplist->next;
668 free(yp_maplist->map);
669 free(yp_maplist);
670 yp_maplist = next;
672 return;
675 static struct ypmaplist *
676 yp_maplist_create(const char *domain)
678 char yp_mapdir[MAXPATHLEN + 2];
679 char yp_mapname[MAXPATHLEN + 2];
680 struct ypmaplist *cur = NULL;
681 struct ypmaplist *yp_maplist = NULL;
682 DIR *dird;
683 struct dirent *dirp;
684 struct stat statbuf;
686 snprintf(yp_mapdir, sizeof(yp_mapdir), "%s/%s", yp_dir, domain);
688 if ((dird = opendir(yp_mapdir)) == NULL) {
689 yp_error("opendir(%s) failed: %s", yp_mapdir, strerror(errno));
690 return(NULL);
693 while ((dirp = readdir(dird)) != NULL) {
694 if (strcmp(dirp->d_name, ".") && strcmp(dirp->d_name, "..")) {
695 snprintf(yp_mapname, sizeof(yp_mapname), "%s/%s",
696 yp_mapdir,dirp->d_name);
697 if (stat(yp_mapname, &statbuf) < 0 ||
698 !S_ISREG(statbuf.st_mode))
699 continue;
700 if ((cur = (struct ypmaplist *)
701 malloc(sizeof(struct ypmaplist))) == NULL) {
702 yp_error("malloc() failed");
703 closedir(dird);
704 yp_maplist_free(yp_maplist);
705 return(NULL);
707 if ((cur->map = strdup(dirp->d_name)) == NULL) {
708 yp_error("strdup() failed: %s",strerror(errno));
709 closedir(dird);
710 yp_maplist_free(yp_maplist);
711 return(NULL);
713 cur->next = yp_maplist;
714 yp_maplist = cur;
715 if (debug)
716 yp_error("map: %s", yp_maplist->map);
720 closedir(dird);
721 return(yp_maplist);
724 ypresp_maplist *
725 ypproc_maplist_2_svc(domainname *argp, struct svc_req *rqstp)
727 static ypresp_maplist result = { 0, NULL };
729 #ifdef DB_CACHE
730 if (yp_access(NULL, NULL, (struct svc_req *)rqstp)) {
731 #else
732 if (yp_access(NULL, (struct svc_req *)rqstp)) {
733 #endif
734 result.stat = YP_YPERR;
735 return(&result);
738 if (argp == NULL) {
739 result.stat = YP_BADARGS;
740 return (&result);
743 if (yp_validdomain(*argp)) {
744 result.stat = YP_NODOM;
745 return (&result);
749 * We have to construct a linked list for the ypproc_maplist
750 * procedure using dynamically allocated memory. Since the XDR
751 * layer won't free this list for us, we have to deal with it
752 * ourselves. We call yp_maplist_free() first to free any
753 * previously allocated data we may have accumulated to insure
754 * that we have only one linked list in memory at any given
755 * time.
758 yp_maplist_free(result.maps);
760 if ((result.maps = yp_maplist_create(*argp)) == NULL) {
761 yp_error("yp_maplist_create failed");
762 result.stat = YP_YPERR;
763 return(&result);
764 } else
765 result.stat = YP_TRUE;
767 return (&result);
771 * NIS v1 support. The nullproc, domain and domain_nonack
772 * functions from v1 are identical to those in v2, so all
773 * we have to do is hand off to them.
775 * The other functions are mostly just wrappers around their v2
776 * counterparts. For example, for the v1 'match' procedure, we
777 * crack open the argument structure, make a request to the v2
778 * 'match' function, repackage the data into a v1 response and
779 * then send it on its way.
781 * Note that we don't support the pull, push and get procedures.
782 * There's little documentation available to show what they
783 * do, and I suspect they're meant largely for map transfers
784 * between master and slave servers.
787 void *
788 ypoldproc_null_1_svc(void *argp, struct svc_req *rqstp)
790 return(ypproc_null_2_svc(argp, rqstp));
793 bool_t *
794 ypoldproc_domain_1_svc(domainname *argp, struct svc_req *rqstp)
796 return(ypproc_domain_2_svc(argp, rqstp));
799 bool_t *
800 ypoldproc_domain_nonack_1_svc(domainname *argp, struct svc_req *rqstp)
802 return (ypproc_domain_nonack_2_svc(argp, rqstp));
806 * the 'match' procedure sends a response of type YPRESP_VAL
808 ypresponse *
809 ypoldproc_match_1_svc(yprequest *argp, struct svc_req *rqstp)
811 static ypresponse result;
812 ypresp_val *v2_result;
814 result.yp_resptype = YPRESP_VAL;
815 result.ypresponse_u.yp_resp_valtype.val.valdat_val = "";
816 result.ypresponse_u.yp_resp_valtype.val.valdat_len = 0;
818 if (argp->yp_reqtype != YPREQ_KEY) {
819 result.ypresponse_u.yp_resp_valtype.stat = YP_BADARGS;
820 return(&result);
823 v2_result = ypproc_match_2_svc(&argp->yprequest_u.yp_req_keytype,rqstp);
824 if (v2_result == NULL)
825 return(NULL);
827 bcopy(v2_result, &result.ypresponse_u.yp_resp_valtype,
828 sizeof(ypresp_val));
830 return (&result);
834 * the 'first' procedure sends a response of type YPRESP_KEY_VAL
836 ypresponse *
837 ypoldproc_first_1_svc(yprequest *argp, struct svc_req *rqstp)
839 static ypresponse result;
840 ypresp_key_val *v2_result;
842 result.yp_resptype = YPRESP_KEY_VAL;
843 result.ypresponse_u.yp_resp_key_valtype.val.valdat_val =
844 result.ypresponse_u.yp_resp_key_valtype.key.keydat_val = "";
845 result.ypresponse_u.yp_resp_key_valtype.val.valdat_len =
846 result.ypresponse_u.yp_resp_key_valtype.key.keydat_len = 0;
848 if (argp->yp_reqtype != YPREQ_NOKEY) {
849 result.ypresponse_u.yp_resp_key_valtype.stat = YP_BADARGS;
850 return(&result);
853 v2_result = ypproc_first_2_svc(&argp->yprequest_u.yp_req_nokeytype,
854 rqstp);
855 if (v2_result == NULL)
856 return(NULL);
858 bcopy(v2_result, &result.ypresponse_u.yp_resp_key_valtype,
859 sizeof(ypresp_key_val));
861 return (&result);
865 * the 'next' procedure sends a response of type YPRESP_KEY_VAL
867 ypresponse *
868 ypoldproc_next_1_svc(yprequest *argp, struct svc_req *rqstp)
870 static ypresponse result;
871 ypresp_key_val *v2_result;
873 result.yp_resptype = YPRESP_KEY_VAL;
874 result.ypresponse_u.yp_resp_key_valtype.val.valdat_val =
875 result.ypresponse_u.yp_resp_key_valtype.key.keydat_val = "";
876 result.ypresponse_u.yp_resp_key_valtype.val.valdat_len =
877 result.ypresponse_u.yp_resp_key_valtype.key.keydat_len = 0;
879 if (argp->yp_reqtype != YPREQ_KEY) {
880 result.ypresponse_u.yp_resp_key_valtype.stat = YP_BADARGS;
881 return(&result);
884 v2_result = ypproc_next_2_svc(&argp->yprequest_u.yp_req_keytype,rqstp);
885 if (v2_result == NULL)
886 return(NULL);
888 bcopy(v2_result, &result.ypresponse_u.yp_resp_key_valtype,
889 sizeof(ypresp_key_val));
891 return (&result);
895 * the 'poll' procedure sends a response of type YPRESP_MAP_PARMS
897 ypresponse *
898 ypoldproc_poll_1_svc(yprequest *argp, struct svc_req *rqstp)
900 static ypresponse result;
901 ypresp_master *v2_result1;
902 ypresp_order *v2_result2;
904 result.yp_resptype = YPRESP_MAP_PARMS;
905 result.ypresponse_u.yp_resp_map_parmstype.domain =
906 argp->yprequest_u.yp_req_nokeytype.domain;
907 result.ypresponse_u.yp_resp_map_parmstype.map =
908 argp->yprequest_u.yp_req_nokeytype.map;
910 * Hmm... there is no 'status' value in the
911 * yp_resp_map_parmstype structure, so I have to
912 * guess at what to do to indicate a failure.
913 * I hope this is right.
915 result.ypresponse_u.yp_resp_map_parmstype.ordernum = 0;
916 result.ypresponse_u.yp_resp_map_parmstype.peer = "";
918 if (argp->yp_reqtype != YPREQ_MAP_PARMS) {
919 return(&result);
922 v2_result1 = ypproc_master_2_svc(&argp->yprequest_u.yp_req_nokeytype,
923 rqstp);
924 if (v2_result1 == NULL)
925 return(NULL);
927 if (v2_result1->stat != YP_TRUE) {
928 return(&result);
931 v2_result2 = ypproc_order_2_svc(&argp->yprequest_u.yp_req_nokeytype,
932 rqstp);
933 if (v2_result2 == NULL)
934 return(NULL);
936 if (v2_result2->stat != YP_TRUE) {
937 return(&result);
940 result.ypresponse_u.yp_resp_map_parmstype.peer =
941 v2_result1->peer;
942 result.ypresponse_u.yp_resp_map_parmstype.ordernum =
943 v2_result2->ordernum;
945 return (&result);
948 ypresponse *
949 ypoldproc_push_1_svc(yprequest *argp, struct svc_req *rqstp)
951 static ypresponse result;
954 * Not implemented.
957 return (&result);
960 ypresponse *
961 ypoldproc_pull_1_svc(yprequest *argp, struct svc_req *rqstp)
963 static ypresponse result;
966 * Not implemented.
969 return (&result);
972 ypresponse *
973 ypoldproc_get_1_svc(yprequest *argp, struct svc_req *rqstp)
975 static ypresponse result;
978 * Not implemented.
981 return (&result);