2 Unix SMB/CIFS implementation.
4 Copyright (C) Andrew Tridgell 1999
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program. If not, see <http://www.gnu.org/licenses/>.
25 #include <ns_daemon.h>
33 static pthread_mutex_t wins_nss_mutex
= PTHREAD_MUTEX_INITIALIZER
;
40 static int initialised
;
42 extern bool AllowDebugChange
;
44 NSS_STATUS
_nss_wins_gethostbyname_r(const char *hostname
, struct hostent
*he
,
45 char *buffer
, size_t buflen
, int *h_errnop
);
46 NSS_STATUS
_nss_wins_gethostbyname2_r(const char *name
, int af
, struct hostent
*he
,
47 char *buffer
, size_t buflen
, int *h_errnop
);
49 /* Use our own create socket code so we don't recurse.... */
51 static int wins_lookup_open_socket_in(void)
53 struct sockaddr_in sock
;
57 memset((char *)&sock
,'\0',sizeof(sock
));
59 #ifdef HAVE_SOCK_SIN_LEN
60 sock
.sin_len
= sizeof(sock
);
63 sock
.sin_family
= AF_INET
;
64 sock
.sin_addr
.s_addr
= interpret_addr("0.0.0.0");
65 res
= socket(AF_INET
, SOCK_DGRAM
, 0);
69 if (setsockopt(res
,SOL_SOCKET
,SO_REUSEADDR
,(char *)&val
,sizeof(val
)) != 0) {
74 if (setsockopt(res
,SOL_SOCKET
,SO_REUSEPORT
,(char *)&val
,sizeof(val
)) != 0) {
78 #endif /* SO_REUSEPORT */
80 /* now we've got a socket - we need to bind it */
82 if (bind(res
, (struct sockaddr
* ) &sock
,sizeof(sock
)) < 0) {
87 set_socket_options(res
,"SO_BROADCAST");
93 static void nss_wins_init(void)
97 AllowDebugChange
= False
;
100 setup_logging("nss_wins",False
);
102 lp_load(get_dyn_CONFIGFILE(),True
,False
,False
,True
);
106 static struct in_addr
*lookup_byname_backend(const char *name
, int *count
)
109 struct ip_service
*address
= NULL
;
110 struct in_addr
*ret
= NULL
;
119 /* always try with wins first */
120 if (NT_STATUS_IS_OK(resolve_wins(name
,0x00,&address
,count
))) {
121 if ( (ret
= SMB_MALLOC_P(struct in_addr
)) == NULL
) {
125 if (address
[0].ss
.ss_family
!= AF_INET
) {
130 *ret
= ((struct sockaddr_in
*)&address
[0].ss
)->sin_addr
;
135 fd
= wins_lookup_open_socket_in();
140 /* uggh, we have to broadcast to each interface in turn */
141 for (j
=iface_count() - 1;j
>= 0;j
--) {
142 const struct in_addr
*bcast
= iface_n_bcast_v4(j
);
143 struct sockaddr_storage ss
;
144 struct sockaddr_storage
*pss
;
148 in_addr_to_sockaddr_storage(&ss
, *bcast
);
149 pss
= name_query(fd
,name
,0x00,True
,True
,&ss
,count
, &flags
, NULL
);
151 if ((ret
= SMB_MALLOC_P(struct in_addr
)) == NULL
) {
154 *ret
= ((struct sockaddr_in
*)pss
)->sin_addr
;
165 static NODE_STATUS_STRUCT
*lookup_byaddr_backend(char *addr
, int *count
)
168 struct sockaddr_storage ss
;
169 struct nmb_name nname
;
170 NODE_STATUS_STRUCT
*status
;
176 fd
= wins_lookup_open_socket_in();
180 make_nmb_name(&nname
, "*", 0);
181 if (!interpret_string_addr(&ss
, addr
, AI_NUMERICHOST
)) {
184 status
= node_status_query(fd
, &nname
, &ss
, count
, NULL
);
194 nsd_logprintf(NSD_LOG_MIN
, "entering init (wins)\n");
199 int lookup(nsd_file_t
*rq
)
204 struct in_addr
*ip_list
;
205 NODE_STATUS_STRUCT
*status
;
206 int i
, count
, len
, size
;
210 nsd_logprintf(NSD_LOG_MIN
, "entering lookup (wins)\n");
214 map
= nsd_attr_fetch_string(rq
->f_attrs
, "table", (char*)0);
216 rq
->f_status
= NS_FATAL
;
220 key
= nsd_attr_fetch_string(rq
->f_attrs
, "key", (char*)0);
221 if (! key
|| ! *key
) {
222 rq
->f_status
= NS_FATAL
;
227 len
= sizeof(response
) - 2;
230 * response needs to be a string of the following format
231 * ip_address[ ip_address]*\tname[ alias]*
233 if (StrCaseCmp(map
,"hosts.byaddr") == 0) {
234 if ( status
= lookup_byaddr_backend(key
, &count
)) {
235 size
= strlen(key
) + 1;
241 strncat(response
,key
,size
);
242 strncat(response
,"\t",1);
243 for (i
= 0; i
< count
; i
++) {
244 /* ignore group names */
245 if (status
[i
].flags
& 0x80) continue;
246 if (status
[i
].type
== 0x20) {
247 size
= sizeof(status
[i
].name
) + 1;
253 strncat(response
, status
[i
].name
, size
);
254 strncat(response
, " ", 1);
258 response
[strlen(response
)-1] = '\n';
261 } else if (StrCaseCmp(map
,"hosts.byname") == 0) {
262 if (ip_list
= lookup_byname_backend(key
, &count
)) {
263 for (i
= count
; i
; i
--) {
264 addr
= inet_ntoa(ip_list
[i
-1]);
265 size
= strlen(addr
) + 1;
272 response
[strlen(response
)-1] = ' ';
273 strncat(response
,addr
,size
);
274 strncat(response
,"\t",1);
276 size
= strlen(key
) + 1;
281 strncat(response
,key
,size
);
282 strncat(response
,"\n",1);
289 nsd_logprintf(NSD_LOG_LOW
, "lookup (wins %s) %s\n",map
,response
);
290 nsd_set_result(rq
,NS_SUCCESS
,response
,strlen(response
),VOLATILE
);
293 nsd_logprintf(NSD_LOG_LOW
, "lookup (wins) not found\n");
294 rq
->f_status
= NS_NOTFOUND
;
300 /* Allocate some space from the nss static buffer. The buffer and buflen
301 are the pointers passed in by the C library to the _nss_*_*
304 static char *get_static(char **buffer
, size_t *buflen
, int len
)
308 /* Error check. We return false if things aren't set up right, or
309 there isn't enough buffer space left. */
311 if ((buffer
== NULL
) || (buflen
== NULL
) || (*buflen
< len
)) {
315 /* Return an index into the static buffer */
324 /****************************************************************************
325 gethostbyname() - we ignore any domain portion of the name and only
326 handle names that are at most 15 characters long
327 **************************************************************************/
329 _nss_wins_gethostbyname_r(const char *hostname
, struct hostent
*he
,
330 char *buffer
, size_t buflen
, int *h_errnop
)
332 NSS_STATUS nss_status
= NSS_STATUS_SUCCESS
;
333 struct in_addr
*ip_list
;
339 pthread_mutex_lock(&wins_nss_mutex
);
342 memset(he
, '\0', sizeof(*he
));
343 fstrcpy(name
, hostname
);
347 ip_list
= lookup_byname_backend(name
, &count
);
350 nss_status
= NSS_STATUS_NOTFOUND
;
356 namelen
= strlen(name
) + 1;
358 if ((he
->h_name
= get_static(&buffer
, &buflen
, namelen
)) == NULL
) {
360 nss_status
= NSS_STATUS_TRYAGAIN
;
364 memcpy(he
->h_name
, name
, namelen
);
366 /* Copy h_addr_list, align to pointer boundary first */
368 if ((i
= (unsigned long)(buffer
) % sizeof(char*)) != 0)
369 i
= sizeof(char*) - i
;
371 if (get_static(&buffer
, &buflen
, i
) == NULL
) {
373 nss_status
= NSS_STATUS_TRYAGAIN
;
377 if ((he
->h_addr_list
= (char **)get_static(
378 &buffer
, &buflen
, (count
+ 1) * sizeof(char *))) == NULL
) {
380 nss_status
= NSS_STATUS_TRYAGAIN
;
384 for (i
= 0; i
< count
; i
++) {
385 if ((he
->h_addr_list
[i
] = get_static(&buffer
, &buflen
,
386 INADDRSZ
)) == NULL
) {
388 nss_status
= NSS_STATUS_TRYAGAIN
;
391 memcpy(he
->h_addr_list
[i
], &ip_list
[i
], INADDRSZ
);
394 he
->h_addr_list
[count
] = NULL
;
398 /* Set h_addr_type and h_length */
400 he
->h_addrtype
= AF_INET
;
401 he
->h_length
= INADDRSZ
;
405 if ((i
= (unsigned long)(buffer
) % sizeof(char*)) != 0)
406 i
= sizeof(char*) - i
;
408 if (get_static(&buffer
, &buflen
, i
) == NULL
) {
409 nss_status
= NSS_STATUS_TRYAGAIN
;
413 if ((he
->h_aliases
= (char **)get_static(
414 &buffer
, &buflen
, sizeof(char *))) == NULL
) {
415 nss_status
= NSS_STATUS_TRYAGAIN
;
419 he
->h_aliases
[0] = NULL
;
421 nss_status
= NSS_STATUS_SUCCESS
;
426 pthread_mutex_unlock(&wins_nss_mutex
);
433 _nss_wins_gethostbyname2_r(const char *name
, int af
, struct hostent
*he
,
434 char *buffer
, size_t buflen
, int *h_errnop
)
436 NSS_STATUS nss_status
;
440 nss_status
= NSS_STATUS_UNAVAIL
;
442 nss_status
= _nss_wins_gethostbyname_r(
443 name
, he
, buffer
, buflen
, h_errnop
);