Remove a trailing `\' in make-syscalls.sh
[glibc.git] / nis / nss_nis / nis-initgroups.c
blobed5c26b20d43b54c333febc1cc2707080fc8aed6
1 /* Copyright (C) 1998-2015 Free Software Foundation, Inc.
2 This file is part of the GNU C Library.
3 Contributed by Thorsten Kukuk <kukuk@suse.de>, 1998.
5 The GNU C Library is free software; you can redistribute it and/or
6 modify it under the terms of the GNU Lesser General Public
7 License as published by the Free Software Foundation; either
8 version 2.1 of the License, or (at your option) any later version.
10 The GNU C Library is distributed in the hope that it will be useful,
11 but WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 Lesser General Public License for more details.
15 You should have received a copy of the GNU Lesser General Public
16 License along with the GNU C Library; if not, see
17 <http://www.gnu.org/licenses/>. */
19 #include <alloca.h>
20 #include <ctype.h>
21 #include <errno.h>
22 #include <grp.h>
23 #include <nss.h>
24 #include <pwd.h>
25 #include <string.h>
26 #include <unistd.h>
27 #include <rpcsvc/yp.h>
28 #include <rpcsvc/ypclnt.h>
29 #include <sys/param.h>
31 #include "nss-nis.h"
32 #include <libnsl.h>
34 /* Get the declaration of the parser function. */
35 #define ENTNAME grent
36 #define STRUCTURE group
37 #define EXTERN_PARSER
38 #include <nss/nss_files/files-parse.c>
41 static enum nss_status
42 internal_setgrent (char *domainname, intern_t *intern)
44 struct ypall_callback ypcb;
45 enum nss_status status;
47 ypcb.foreach = _nis_saveit;
48 ypcb.data = (char *) intern;
49 status = yperr2nss (yp_all (domainname, "group.byname", &ypcb));
51 /* Mark the last buffer as full. */
52 if (intern->next != NULL)
53 intern->next->size = intern->offset;
55 intern->next = intern->start;
56 intern->offset = 0;
58 return status;
62 static enum nss_status
63 internal_getgrent_r (struct group *grp, char *buffer, size_t buflen,
64 int *errnop, intern_t *intern)
66 if (intern->start == NULL)
67 return NSS_STATUS_NOTFOUND;
69 /* Get the next entry until we found a correct one. */
70 int parse_res;
73 struct response_t *bucket = intern->next;
75 if (__glibc_unlikely (intern->offset >= bucket->size))
77 if (bucket->next == NULL)
78 return NSS_STATUS_NOTFOUND;
80 /* We look at all the content in the current bucket. Go on
81 to the next. */
82 bucket = intern->next = bucket->next;
83 intern->offset = 0;
86 char *p;
87 for (p = &bucket->mem[intern->offset]; isspace (*p); ++p)
88 ++intern->offset;
90 size_t len = strlen (p) + 1;
91 if (__glibc_unlikely (len > buflen))
93 *errnop = ERANGE;
94 return NSS_STATUS_TRYAGAIN;
97 /* We unfortunately have to copy the data in the user-provided
98 buffer because that buffer might be around for a very long
99 time and the servent structure must remain valid. If we would
100 rely on the BUCKET memory the next 'setservent' or 'endservent'
101 call would destroy it.
103 The important thing is that it is a single NUL-terminated
104 string. This is what the parsing routine expects. */
105 p = memcpy (buffer, &bucket->mem[intern->offset], len);
107 parse_res = _nss_files_parse_grent (p, grp, (void *) buffer, buflen,
108 errnop);
109 if (__glibc_unlikely (parse_res == -1))
110 return NSS_STATUS_TRYAGAIN;
112 intern->offset += len;
114 while (!parse_res);
116 return NSS_STATUS_SUCCESS;
120 static int
121 get_uid (const char *user, uid_t *uidp)
123 size_t buflen = sysconf (_SC_GETPW_R_SIZE_MAX);
124 char *buf = (char *) alloca (buflen);
126 while (1)
128 struct passwd result;
129 struct passwd *resp;
131 int r = getpwnam_r (user, &result, buf, buflen, &resp);
132 if (r == 0 && resp != NULL)
134 *uidp = resp->pw_uid;
135 return 0;
138 if (r != ERANGE)
139 break;
141 buf = extend_alloca (buf, buflen, 2 * buflen);
144 return 1;
148 static enum nss_status
149 initgroups_netid (uid_t uid, gid_t group, long int *start, long int *size,
150 gid_t **groupsp, long int limit, int *errnop,
151 const char *domainname)
153 /* Limit domainname length to the maximum size of an RPC packet. */
154 if (strlen (domainname) > UDPMSGSIZE)
156 *errnop = ERANGE;
157 return NSS_STATUS_UNAVAIL;
160 /* Prepare the key. The form is "unix.UID@DOMAIN" with the UID and
161 DOMAIN field filled in appropriately. */
162 char key[sizeof ("unix.@") + sizeof (uid_t) * 3 + strlen (domainname)];
163 ssize_t keylen = snprintf (key, sizeof (key), "unix.%lu@%s",
164 (unsigned long int) uid, domainname);
166 char *result;
167 int reslen;
168 int yperr = yp_match (domainname, "netid.byname", key, keylen, &result,
169 &reslen);
170 if (__glibc_unlikely (yperr != YPERR_SUCCESS))
171 return yperr2nss (yperr);
173 /* Parse the result: following the colon is a comma separated list of
174 group IDs. */
175 char *cp = strchr (result, ':');
176 if (cp == NULL)
178 errout:
179 free (result);
180 return NSS_STATUS_NOTFOUND;
182 /* Skip the colon. */
183 ++cp;
185 gid_t *groups = *groupsp;
186 while (*cp != '\0')
188 char *endp;
189 unsigned long int gid = strtoul (cp, &endp, 0);
190 if (cp == endp)
191 goto errout;
192 if (*endp == ',')
193 ++endp;
194 else if (*endp != '\0')
195 goto errout;
196 cp = endp;
198 if (gid == group)
199 /* We do not need this group again. */
200 continue;
202 /* Insert this group. */
203 if (*start == *size)
205 /* Need a bigger buffer. */
206 long int newsize;
208 if (limit > 0 && *size == limit)
209 /* We reached the maximum. */
210 break;
212 if (limit <= 0)
213 newsize = 2 * *size;
214 else
215 newsize = MIN (limit, 2 * *size);
217 gid_t *newgroups = realloc (groups, newsize * sizeof (*groups));
218 if (newgroups == NULL)
219 goto errout;
220 *groupsp = groups = newgroups;
221 *size = newsize;
224 groups[*start] = gid;
225 *start += 1;
228 free (result);
230 return NSS_STATUS_SUCCESS;
234 enum nss_status
235 _nss_nis_initgroups_dyn (const char *user, gid_t group, long int *start,
236 long int *size, gid_t **groupsp, long int limit,
237 int *errnop)
239 /* We always need the domain name. */
240 char *domainname;
241 if (yp_get_default_domain (&domainname))
242 return NSS_STATUS_UNAVAIL;
244 /* Check whether we are supposed to use the netid.byname map. */
245 if (_nsl_default_nss () & NSS_FLAG_NETID_AUTHORITATIVE)
247 /* We need the user ID. */
248 uid_t uid;
250 if (get_uid (user, &uid) == 0
251 && initgroups_netid (uid, group, start, size, groupsp, limit,
252 errnop, domainname) == NSS_STATUS_SUCCESS)
253 return NSS_STATUS_SUCCESS;
256 struct group grpbuf, *g;
257 size_t buflen = sysconf (_SC_GETPW_R_SIZE_MAX);
258 char *tmpbuf;
259 enum nss_status status;
260 intern_t intern = { NULL, NULL, 0 };
261 gid_t *groups = *groupsp;
263 status = internal_setgrent (domainname, &intern);
264 if (status != NSS_STATUS_SUCCESS)
265 return status;
267 tmpbuf = __alloca (buflen);
271 while ((status =
272 internal_getgrent_r (&grpbuf, tmpbuf, buflen, errnop,
273 &intern)) == NSS_STATUS_TRYAGAIN
274 && *errnop == ERANGE)
275 tmpbuf = extend_alloca (tmpbuf, buflen, 2 * buflen);
277 if (status != NSS_STATUS_SUCCESS)
278 goto done;
281 g = &grpbuf;
282 if (g->gr_gid != group)
284 char **m;
286 for (m = g->gr_mem; *m != NULL; ++m)
287 if (strcmp (*m, user) == 0)
289 /* Matches user. Insert this group. */
290 if (*start == *size)
292 /* Need a bigger buffer. */
293 gid_t *newgroups;
294 long int newsize;
296 if (limit > 0 && *size == limit)
297 /* We reached the maximum. */
298 goto done;
300 if (limit <= 0)
301 newsize = 2 * *size;
302 else
303 newsize = MIN (limit, 2 * *size);
305 newgroups = realloc (groups, newsize * sizeof (*groups));
306 if (newgroups == NULL)
307 goto done;
308 *groupsp = groups = newgroups;
309 *size = newsize;
312 groups[*start] = g->gr_gid;
313 *start += 1;
315 break;
319 while (status == NSS_STATUS_SUCCESS);
321 done:
322 while (intern.start != NULL)
324 intern.next = intern.start;
325 intern.start = intern.start->next;
326 free (intern.next);
329 return status;