]> CyberLeo.Net >> Repos - FreeBSD/FreeBSD.git/blob - lib/libc/yp/yplib.c
powerpc64: Rewrite strcmp in asm to take advantage of word size
[FreeBSD/FreeBSD.git] / lib / libc / yp / yplib.c
1 /*-
2  * SPDX-License-Identifier: BSD-3-Clause
3  *
4  * Copyright (c) 1992/3 Theo de Raadt <deraadt@fsa.ca>
5  * Copyright (c) 1998 Bill Paul <wpaul@ctr.columbia.edu>
6  * All rights reserved.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  * 1. Redistributions of source code must retain the above copyright
12  *    notice, this list of conditions and the following disclaimer.
13  * 2. Redistributions in binary form must reproduce the above copyright
14  *    notice, this list of conditions and the following disclaimer in the
15  *    documentation and/or other materials provided with the distribution.
16  * 3. The name of the author may not be used to endorse or promote
17  *    products derived from this software without specific prior written
18  *    permission.
19  *
20  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS
21  * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
22  * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
24  * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30  * SUCH DAMAGE.
31  */
32
33 #include <sys/cdefs.h>
34 __FBSDID("$FreeBSD$");
35
36 #include "namespace.h"
37 #include "reentrant.h"
38 #include <sys/param.h>
39 #include <sys/socket.h>
40 #include <sys/file.h>
41 #include <sys/uio.h>
42 #include <arpa/inet.h>
43 #include <errno.h>
44 #include <stdio.h>
45 #include <string.h>
46 #include <stdlib.h>
47 #include <unistd.h>
48 #include <rpc/rpc.h>
49 #include <rpc/xdr.h>
50 #include <rpcsvc/yp.h>
51 #include "un-namespace.h"
52 #include "libc_private.h"
53
54 /*
55  * We have to define these here due to clashes between yp_prot.h and
56  * yp.h.
57  */
58
59 #define YPMATCHCACHE
60
61 #ifdef YPMATCHCACHE
62 struct ypmatch_ent {
63         char                    *ypc_map;
64         keydat                  ypc_key;
65         valdat                  ypc_val;
66         time_t                  ypc_expire_t;
67         struct ypmatch_ent      *ypc_next;
68 };
69 #define YPLIB_MAXCACHE  5       /* At most 5 entries */
70 #define YPLIB_EXPIRE    5       /* Expire after 5 seconds */
71 #endif
72
73 struct dom_binding {
74         struct dom_binding *dom_pnext;
75         char dom_domain[YPMAXDOMAIN + 1];
76         struct sockaddr_in dom_server_addr;
77         u_short dom_server_port;
78         int dom_socket;
79         CLIENT *dom_client;
80         u_short dom_local_port; /* now I finally know what this is for. */
81         long dom_vers;
82 #ifdef YPMATCHCACHE
83         struct ypmatch_ent *cache;
84         int ypmatch_cachecnt;
85 #endif
86 };
87
88 #include <rpcsvc/ypclnt.h>
89
90 #ifndef BINDINGDIR
91 #define BINDINGDIR "/var/yp/binding"
92 #endif
93 #define MAX_RETRIES 20
94
95 extern bool_t xdr_domainname(), xdr_ypbind_resp();
96 extern bool_t xdr_ypreq_key(), xdr_ypresp_val();
97 extern bool_t xdr_ypreq_nokey(), xdr_ypresp_key_val();
98 extern bool_t xdr_ypresp_all(), xdr_ypresp_all_seq();
99 extern bool_t xdr_ypresp_master();
100
101 int (*ypresp_allfn)();
102 void *ypresp_data;
103
104 static void _yp_unbind(struct dom_binding *);
105 struct dom_binding *_ypbindlist;
106 static char _yp_domain[MAXHOSTNAMELEN];
107 int _yplib_timeout = 20;
108
109 static mutex_t _ypmutex = MUTEX_INITIALIZER;
110 #define YPLOCK()        mutex_lock(&_ypmutex);
111 #define YPUNLOCK()      mutex_unlock(&_ypmutex);
112
113 #ifdef YPMATCHCACHE
114 static void
115 ypmatch_cache_delete(struct dom_binding *ypdb, struct ypmatch_ent *prev,
116     struct ypmatch_ent *cur)
117 {
118         if (prev == NULL)
119                 ypdb->cache = cur->ypc_next;
120         else
121                 prev->ypc_next = cur->ypc_next;
122
123         free(cur->ypc_map);
124         free(cur->ypc_key.keydat_val);
125         free(cur->ypc_val.valdat_val);
126         free(cur);
127
128         ypdb->ypmatch_cachecnt--;
129
130         return;
131 }
132
133 static void
134 ypmatch_cache_flush(struct dom_binding *ypdb)
135 {
136         struct ypmatch_ent      *n, *c = ypdb->cache;
137
138         while (c != NULL) {
139                 n = c->ypc_next;
140                 ypmatch_cache_delete(ypdb, NULL, c);
141                 c = n;
142         }
143
144         return;
145 }
146
147 static void
148 ypmatch_cache_expire(struct dom_binding *ypdb)
149 {
150         struct ypmatch_ent      *c = ypdb->cache;
151         struct ypmatch_ent      *n, *p = NULL;
152         time_t                  t;
153
154         time(&t);
155
156         while (c != NULL) {
157                 if (t >= c->ypc_expire_t) {
158                         n = c->ypc_next;
159                         ypmatch_cache_delete(ypdb, p, c);
160                         c = n;
161                 } else {
162                         p = c;
163                         c = c->ypc_next;
164                 }
165         }
166
167         return;
168 }
169
170 static void
171 ypmatch_cache_insert(struct dom_binding *ypdb, char *map, keydat *key,
172     valdat *val)
173 {
174         struct ypmatch_ent      *new;
175
176         /* Do an expire run to maybe open up a slot. */
177         if (ypdb->ypmatch_cachecnt)
178                 ypmatch_cache_expire(ypdb);
179
180         /*
181          * If there are no slots free, then force an expire of
182          * the least recently used entry.
183          */
184         if (ypdb->ypmatch_cachecnt >= YPLIB_MAXCACHE) {
185                 struct ypmatch_ent      *o = NULL, *c = ypdb->cache;
186                 time_t                  oldest = 0;
187
188                 oldest = ~oldest;
189
190                 while (c != NULL) {
191                         if (c->ypc_expire_t < oldest) {
192                                 oldest = c->ypc_expire_t;
193                                 o = c;
194                         }
195                         c = c->ypc_next;
196                 }
197
198                 if (o == NULL)
199                         return;
200                 o->ypc_expire_t = 0;
201                 ypmatch_cache_expire(ypdb);
202         }
203
204         new = malloc(sizeof(struct ypmatch_ent));
205         if (new == NULL)
206                 return;
207
208         new->ypc_map = strdup(map);
209         if (new->ypc_map == NULL) {
210                 free(new);
211                 return;
212         }
213         new->ypc_key.keydat_val = malloc(key->keydat_len);
214         if (new->ypc_key.keydat_val == NULL) {
215                 free(new->ypc_map);
216                 free(new);
217                 return;
218         }
219         new->ypc_val.valdat_val = malloc(val->valdat_len);
220         if (new->ypc_val.valdat_val == NULL) {
221                 free(new->ypc_val.valdat_val);
222                 free(new->ypc_map);
223                 free(new);
224                 return;
225         }
226
227         new->ypc_expire_t = time(NULL) + YPLIB_EXPIRE;
228         new->ypc_key.keydat_len = key->keydat_len;
229         new->ypc_val.valdat_len = val->valdat_len;
230         bcopy(key->keydat_val, new->ypc_key.keydat_val, key->keydat_len);
231         bcopy(val->valdat_val, new->ypc_val.valdat_val, val->valdat_len);
232
233         new->ypc_next = ypdb->cache;
234         ypdb->cache = new;
235
236         ypdb->ypmatch_cachecnt++;
237
238         return;
239 }
240
241 static bool_t
242 ypmatch_cache_lookup(struct dom_binding *ypdb, char *map, keydat *key,
243     valdat *val)
244 {
245         struct ypmatch_ent      *c;
246
247         ypmatch_cache_expire(ypdb);
248
249         for (c = ypdb->cache; c != NULL; c = c->ypc_next) {
250                 if (strcmp(map, c->ypc_map))
251                         continue;
252                 if (key->keydat_len != c->ypc_key.keydat_len)
253                         continue;
254                 if (bcmp(key->keydat_val, c->ypc_key.keydat_val,
255                                 key->keydat_len))
256                         continue;
257         }
258
259         if (c == NULL)
260                 return(FALSE);
261
262         val->valdat_len = c->ypc_val.valdat_len;
263         val->valdat_val = c->ypc_val.valdat_val;
264
265         return(TRUE);
266 }
267 #endif
268
269 const char *
270 ypbinderr_string(int incode)
271 {
272         static char err[80];
273         switch (incode) {
274         case 0:
275                 return ("Success");
276         case YPBIND_ERR_ERR:
277                 return ("Internal ypbind error");
278         case YPBIND_ERR_NOSERV:
279                 return ("Domain not bound");
280         case YPBIND_ERR_RESC:
281                 return ("System resource allocation failure");
282         }
283         sprintf(err, "Unknown ypbind error: #%d\n", incode);
284         return (err);
285 }
286
287 int
288 _yp_dobind(char *dom, struct dom_binding **ypdb)
289 {
290         static pid_t pid = -1;
291         char path[MAXPATHLEN];
292         struct dom_binding *ysd, *ysd2;
293         struct ypbind_resp ypbr;
294         struct timeval tv;
295         struct sockaddr_in clnt_sin;
296         int clnt_sock, fd;
297         pid_t gpid;
298         CLIENT *client;
299         int new = 0, r;
300         int retries = 0;
301         struct sockaddr_in check;
302         socklen_t checklen = sizeof(struct sockaddr_in);
303
304         /* Not allowed; bad doggie. Bad. */
305         if (strchr(dom, '/') != NULL)
306                 return(YPERR_BADARGS);
307
308         gpid = getpid();
309         if (!(pid == -1 || pid == gpid)) {
310                 ysd = _ypbindlist;
311                 while (ysd) {
312                         if (ysd->dom_client != NULL)
313                                 _yp_unbind(ysd);
314                         ysd2 = ysd->dom_pnext;
315                         free(ysd);
316                         ysd = ysd2;
317                 }
318                 _ypbindlist = NULL;
319         }
320         pid = gpid;
321
322         if (ypdb != NULL)
323                 *ypdb = NULL;
324
325         if (dom == NULL || strlen(dom) == 0)
326                 return (YPERR_BADARGS);
327
328         for (ysd = _ypbindlist; ysd; ysd = ysd->dom_pnext)
329                 if (strcmp(dom, ysd->dom_domain) == 0)
330                         break;
331
332
333         if (ysd == NULL) {
334                 ysd = (struct dom_binding *)malloc(sizeof *ysd);
335                 if (ysd == NULL)
336                         return (YPERR_RESRC);
337                 bzero((char *)ysd, sizeof *ysd);
338                 ysd->dom_socket = -1;
339                 ysd->dom_vers = 0;
340                 new = 1;
341         } else {
342         /* Check the socket -- may have been hosed by the caller. */
343                 if (_getsockname(ysd->dom_socket, (struct sockaddr *)&check,
344                     &checklen) == -1 || check.sin_family != AF_INET ||
345                     check.sin_port != ysd->dom_local_port) {
346                 /* Socket became bogus somehow... need to rebind. */
347                         int save, sock;
348
349                         sock = ysd->dom_socket;
350                         save = _dup(ysd->dom_socket);
351                         if (ysd->dom_client != NULL)
352                                 clnt_destroy(ysd->dom_client);
353                         ysd->dom_vers = 0;
354                         ysd->dom_client = NULL;
355                         sock = _dup2(save, sock);
356                         _close(save);
357                 }
358         }
359
360 again:
361         retries++;
362         if (retries > MAX_RETRIES) {
363                 if (new)
364                         free(ysd);
365                 return(YPERR_YPBIND);
366         }
367 #ifdef BINDINGDIR
368         if (ysd->dom_vers == 0) {
369                 /*
370                  * We're trying to make a new binding: zorch the
371                  * existing handle now (if any).
372                  */
373                 if (ysd->dom_client != NULL) {
374                         clnt_destroy(ysd->dom_client);
375                         ysd->dom_client = NULL;
376                         ysd->dom_socket = -1;
377                 }
378                 snprintf(path, sizeof(path), "%s/%s.%d", BINDINGDIR, dom, 2);
379                 if ((fd = _open(path, O_RDONLY | O_CLOEXEC)) == -1) {
380                         /* no binding file, YP is dead. */
381                         /* Try to bring it back to life. */
382                         _close(fd);
383                         goto skipit;
384                 }
385                 if (_flock(fd, LOCK_EX|LOCK_NB) == -1 && errno == EWOULDBLOCK) {
386                         struct iovec iov[2];
387                         struct ypbind_resp ybr;
388                         u_short ypb_port;
389
390                         iov[0].iov_base = (caddr_t)&ypb_port;
391                         iov[0].iov_len = sizeof ypb_port;
392                         iov[1].iov_base = (caddr_t)&ybr;
393                         iov[1].iov_len = sizeof ybr;
394
395                         r = _readv(fd, iov, 2);
396                         if (r != iov[0].iov_len + iov[1].iov_len) {
397                                 _close(fd);
398                                 ysd->dom_vers = -1;
399                                 goto again;
400                         }
401
402                         bzero(&ysd->dom_server_addr, sizeof ysd->dom_server_addr);
403                         ysd->dom_server_addr.sin_family = AF_INET;
404                         ysd->dom_server_addr.sin_len = sizeof(struct sockaddr_in);
405                         bcopy(&ybr.ypbind_resp_u.ypbind_bindinfo.ypbind_binding_addr,
406                             &ysd->dom_server_addr.sin_addr.s_addr,
407                             sizeof(ysd->dom_server_addr.sin_addr.s_addr));
408                         bcopy(&ybr.ypbind_resp_u.ypbind_bindinfo.ypbind_binding_port,
409                             &ysd->dom_server_addr.sin_port,
410                             sizeof(ysd->dom_server_addr.sin_port));
411
412                         ysd->dom_server_port = ysd->dom_server_addr.sin_port;
413                         _close(fd);
414                         goto gotit;
415                 } else {
416                         /* no lock on binding file, YP is dead. */
417                         /* Try to bring it back to life. */
418                         _close(fd);
419                         goto skipit;
420                 }
421         }
422 skipit:
423 #endif
424         if (ysd->dom_vers == -1 || ysd->dom_vers == 0) {
425                 /*
426                  * We're trying to make a new binding: zorch the
427                  * existing handle now (if any).
428                  */
429                 if (ysd->dom_client != NULL) {
430                         clnt_destroy(ysd->dom_client);
431                         ysd->dom_client = NULL;
432                         ysd->dom_socket = -1;
433                 }
434                 bzero((char *)&clnt_sin, sizeof clnt_sin);
435                 clnt_sin.sin_family = AF_INET;
436                 clnt_sin.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
437
438                 clnt_sock = RPC_ANYSOCK;
439                 client = clnttcp_create(&clnt_sin, YPBINDPROG, YPBINDVERS, &clnt_sock,
440                         0, 0);
441                 if (client == NULL) {
442                         /*
443                          * These conditions indicate ypbind just isn't
444                          * alive -- we probably don't want to shoot our
445                          * mouth off in this case; instead generate error
446                          * messages only for really exotic problems.
447                          */
448                         if (rpc_createerr.cf_stat != RPC_PROGNOTREGISTERED &&
449                            (rpc_createerr.cf_stat != RPC_SYSTEMERROR &&
450                            rpc_createerr.cf_error.re_errno == ECONNREFUSED))
451                                 clnt_pcreateerror("clnttcp_create");
452                         if (new)
453                                 free(ysd);
454                         return (YPERR_YPBIND);
455                 }
456
457                 /*
458                  * Check the port number -- should be < IPPORT_RESERVED.
459                  * If not, it's possible someone has registered a bogus
460                  * ypbind with the portmapper and is trying to trick us.
461                  */
462                 if (ntohs(clnt_sin.sin_port) >= IPPORT_RESERVED) {
463                         if (client != NULL)
464                                 clnt_destroy(client);
465                         if (new)
466                                 free(ysd);
467                         return(YPERR_YPBIND);
468                 }
469                 tv.tv_sec = _yplib_timeout/2;
470                 tv.tv_usec = 0;
471                 r = clnt_call(client, YPBINDPROC_DOMAIN,
472                         (xdrproc_t)xdr_domainname, &dom,
473                         (xdrproc_t)xdr_ypbind_resp, &ypbr, tv);
474                 if (r != RPC_SUCCESS) {
475                         clnt_destroy(client);
476                         ysd->dom_vers = -1;
477                         if (r == RPC_PROGUNAVAIL || r == RPC_PROCUNAVAIL) {
478                                 if (new)
479                                         free(ysd);
480                                 return(YPERR_YPBIND);
481                         }
482                         fprintf(stderr,
483                         "YP: server for domain %s not responding, retrying\n", dom);
484                         goto again;
485                 } else {
486                         if (ypbr.ypbind_status != YPBIND_SUCC_VAL) {
487                                 struct timespec time_to_sleep, time_remaining;
488
489                                 clnt_destroy(client);
490                                 ysd->dom_vers = -1;
491
492                                 time_to_sleep.tv_sec = _yplib_timeout/2;
493                                 time_to_sleep.tv_nsec = 0;
494                                 _nanosleep(&time_to_sleep,
495                                     &time_remaining);
496                                 goto again;
497                         }
498                 }
499                 clnt_destroy(client);
500
501                 bzero((char *)&ysd->dom_server_addr, sizeof ysd->dom_server_addr);
502                 ysd->dom_server_addr.sin_family = AF_INET;
503                 bcopy(&ypbr.ypbind_resp_u.ypbind_bindinfo.ypbind_binding_port,
504                     &ysd->dom_server_addr.sin_port,
505                     sizeof(ysd->dom_server_addr.sin_port));
506                 bcopy(&ypbr.ypbind_resp_u.ypbind_bindinfo.ypbind_binding_addr,
507                     &ysd->dom_server_addr.sin_addr.s_addr,
508                     sizeof(ysd->dom_server_addr.sin_addr.s_addr));
509
510                 /*
511                  * We could do a reserved port check here too, but this
512                  * could pose compatibility problems. The local ypbind is
513                  * supposed to decide whether or not to trust yp servers
514                  * on insecure ports. For now, we trust its judgement.
515                  */
516                 ysd->dom_server_port =
517                         *(u_short *)&ypbr.ypbind_resp_u.ypbind_bindinfo.ypbind_binding_port;
518 gotit:
519                 ysd->dom_vers = YPVERS;
520                 strlcpy(ysd->dom_domain, dom, sizeof(ysd->dom_domain));
521         }
522
523         /* Don't rebuild the connection to the server unless we have to. */
524         if (ysd->dom_client == NULL) {
525                 tv.tv_sec = _yplib_timeout/2;
526                 tv.tv_usec = 0;
527                 ysd->dom_socket = RPC_ANYSOCK;
528                 ysd->dom_client = clntudp_bufcreate(&ysd->dom_server_addr,
529                         YPPROG, YPVERS, tv, &ysd->dom_socket, 1280, 2304);
530                 if (ysd->dom_client == NULL) {
531                         clnt_pcreateerror("clntudp_create");
532                         ysd->dom_vers = -1;
533                         goto again;
534                 }
535                 if (_fcntl(ysd->dom_socket, F_SETFD, 1) == -1)
536                         perror("fcntl: F_SETFD");
537                 /*
538                  * We want a port number associated with this socket
539                  * so that we can check its authenticity later.
540                  */
541                 checklen = sizeof(struct sockaddr_in);
542                 bzero((char *)&check, checklen);
543                 _bind(ysd->dom_socket, (struct sockaddr *)&check, checklen);
544                 check.sin_family = AF_INET;
545                 if (!_getsockname(ysd->dom_socket,
546                     (struct sockaddr *)&check, &checklen)) {
547                         ysd->dom_local_port = check.sin_port;
548                 } else {
549                         clnt_destroy(ysd->dom_client);
550                         if (new)
551                                 free(ysd);
552                         return(YPERR_YPBIND);
553                 }
554         }
555
556         if (new) {
557                 ysd->dom_pnext = _ypbindlist;
558                 _ypbindlist = ysd;
559         }
560
561         /*
562          * Set low retry timeout to realistically handle UDP packet
563          * loss for YP packet bursts.
564          */
565         tv.tv_sec = 1;
566         tv.tv_usec = 0;
567         clnt_control(ysd->dom_client, CLSET_RETRY_TIMEOUT, (char*)&tv);
568
569         if (ypdb != NULL)
570                 *ypdb = ysd;
571         return (0);
572 }
573
574 static void
575 _yp_unbind(struct dom_binding *ypb)
576 {
577         struct sockaddr_in check;
578         socklen_t checklen = sizeof(struct sockaddr_in);
579
580         if (ypb->dom_client != NULL) {
581                 /* Check the socket -- may have been hosed by the caller. */
582                 if (_getsockname(ypb->dom_socket, (struct sockaddr *)&check,
583                 &checklen) == -1 || check.sin_family != AF_INET ||
584                 check.sin_port != ypb->dom_local_port) {
585                         int save, sock;
586
587                         sock = ypb->dom_socket;
588                         save = _dup(ypb->dom_socket);
589                         clnt_destroy(ypb->dom_client);
590                         sock = _dup2(save, sock);
591                         _close(save);
592                 } else
593                         clnt_destroy(ypb->dom_client);
594         }
595
596         ypb->dom_client = NULL;
597         ypb->dom_socket = -1;
598         ypb->dom_vers = -1;
599 #ifdef YPMATCHCACHE
600         ypmatch_cache_flush(ypb);
601 #endif
602 }
603
604 static int
605 yp_bind_locked(char *dom)
606 {
607         return (_yp_dobind(dom, NULL));
608 }
609
610 int
611 yp_bind(char *dom)
612 {
613         int r;
614
615         YPLOCK();
616         r = yp_bind_locked(dom);
617         YPUNLOCK();
618         return (r);
619 }
620
621 static void
622 yp_unbind_locked(char *dom)
623 {
624         struct dom_binding *ypb, *ypbp;
625
626         ypbp = NULL;
627         for (ypb = _ypbindlist; ypb; ypb = ypb->dom_pnext) {
628                 if (strcmp(dom, ypb->dom_domain) == 0) {
629                         _yp_unbind(ypb);
630                         if (ypbp)
631                                 ypbp->dom_pnext = ypb->dom_pnext;
632                         else
633                                 _ypbindlist = ypb->dom_pnext;
634                         free(ypb);
635                         return;
636                 }
637                 ypbp = ypb;
638         }
639         return;
640 }
641
642 void
643 yp_unbind(char *dom)
644 {
645         YPLOCK();
646         yp_unbind_locked(dom);
647         YPUNLOCK();
648 }
649
650 int
651 yp_match(char *indomain, char *inmap, const char *inkey, int inkeylen,
652     char **outval, int *outvallen)
653 {
654         struct dom_binding *ysd;
655         struct ypresp_val yprv;
656         struct timeval tv;
657         struct ypreq_key yprk;
658         int r;
659         int retries = 0;
660         *outval = NULL;
661         *outvallen = 0;
662
663         /* Sanity check */
664
665         if (inkey == NULL || !strlen(inkey) || inkeylen <= 0 ||
666             inmap == NULL || !strlen(inmap) ||
667             indomain == NULL || !strlen(indomain))
668                 return (YPERR_BADARGS);
669
670         YPLOCK();
671         if (_yp_dobind(indomain, &ysd) != 0) {
672                 YPUNLOCK();
673                 return(YPERR_DOMAIN);
674         }
675
676         yprk.domain = indomain;
677         yprk.map = inmap;
678         yprk.key.keydat_val = (char *)inkey;
679         yprk.key.keydat_len = inkeylen;
680
681 #ifdef YPMATCHCACHE
682         if (ypmatch_cache_lookup(ysd, yprk.map, &yprk.key, &yprv.val) == TRUE) {
683 /*
684         if (!strcmp(_yp_domain, indomain) && ypmatch_find(inmap, inkey,
685             inkeylen, &yprv.val.valdat_val, &yprv.val.valdat_len)) {
686 */
687                 *outvallen = yprv.val.valdat_len;
688                 *outval = (char *)malloc(*outvallen+1);
689                 if (*outval == NULL) {
690                         _yp_unbind(ysd);
691                         *outvallen = 0;
692                         YPUNLOCK();
693                         return (YPERR_RESRC);
694                 }
695                 bcopy(yprv.val.valdat_val, *outval, *outvallen);
696                 (*outval)[*outvallen] = '\0';
697                 YPUNLOCK();
698                 return (0);
699         }
700         _yp_unbind(ysd);
701 #endif
702
703 again:
704         if (retries > MAX_RETRIES) {
705                 YPUNLOCK();
706                 return (YPERR_RPC);
707         }
708
709         if (_yp_dobind(indomain, &ysd) != 0) {
710                 YPUNLOCK();
711                 return (YPERR_DOMAIN);
712         }
713
714         tv.tv_sec = _yplib_timeout;
715         tv.tv_usec = 0;
716
717         bzero((char *)&yprv, sizeof yprv);
718
719         r = clnt_call(ysd->dom_client, YPPROC_MATCH,
720                 (xdrproc_t)xdr_ypreq_key, &yprk,
721                 (xdrproc_t)xdr_ypresp_val, &yprv, tv);
722         if (r != RPC_SUCCESS) {
723                 clnt_perror(ysd->dom_client, "yp_match: clnt_call");
724                 _yp_unbind(ysd);
725                 retries++;
726                 goto again;
727         }
728
729         if (!(r = ypprot_err(yprv.stat))) {
730                 *outvallen = yprv.val.valdat_len;
731                 *outval = (char *)malloc(*outvallen+1);
732                 if (*outval == NULL) {
733                         _yp_unbind(ysd);
734                         *outvallen = 0;
735                         xdr_free((xdrproc_t)xdr_ypresp_val, &yprv);
736                         YPUNLOCK();
737                         return (YPERR_RESRC);
738                 }
739                 bcopy(yprv.val.valdat_val, *outval, *outvallen);
740                 (*outval)[*outvallen] = '\0';
741 #ifdef YPMATCHCACHE
742                 ypmatch_cache_insert(ysd, yprk.map, &yprk.key, &yprv.val);
743 #endif
744         }
745
746         xdr_free((xdrproc_t)xdr_ypresp_val, &yprv);
747         YPUNLOCK();
748         return (r);
749 }
750
751 static int
752 yp_get_default_domain_locked(char **domp)
753 {
754         *domp = NULL;
755         if (_yp_domain[0] == '\0')
756                 if (getdomainname(_yp_domain, sizeof _yp_domain))
757                         return (YPERR_NODOM);
758         *domp = _yp_domain;
759         return (0);
760 }
761
762 int
763 yp_get_default_domain(char **domp)
764 {
765         int r;
766
767         YPLOCK();
768         r = yp_get_default_domain_locked(domp);
769         YPUNLOCK();
770         return (r);
771 }
772
773 int
774 yp_first(char *indomain, char *inmap, char **outkey, int *outkeylen,
775     char **outval, int *outvallen)
776 {
777         struct ypresp_key_val yprkv;
778         struct ypreq_nokey yprnk;
779         struct dom_binding *ysd;
780         struct timeval tv;
781         int r;
782         int retries = 0;
783         /* Sanity check */
784
785         if (indomain == NULL || !strlen(indomain) ||
786             inmap == NULL || !strlen(inmap))
787                 return (YPERR_BADARGS);
788
789         *outkey = *outval = NULL;
790         *outkeylen = *outvallen = 0;
791
792         YPLOCK();
793 again:
794         if (retries > MAX_RETRIES) {
795                 YPUNLOCK();
796                 return (YPERR_RPC);
797         }
798
799         if (_yp_dobind(indomain, &ysd) != 0) {
800                 YPUNLOCK();
801                 return (YPERR_DOMAIN);
802         }
803
804         tv.tv_sec = _yplib_timeout;
805         tv.tv_usec = 0;
806
807         yprnk.domain = indomain;
808         yprnk.map = inmap;
809         bzero((char *)&yprkv, sizeof yprkv);
810
811         r = clnt_call(ysd->dom_client, YPPROC_FIRST,
812                 (xdrproc_t)xdr_ypreq_nokey, &yprnk,
813                 (xdrproc_t)xdr_ypresp_key_val, &yprkv, tv);
814         if (r != RPC_SUCCESS) {
815                 clnt_perror(ysd->dom_client, "yp_first: clnt_call");
816                 _yp_unbind(ysd);
817                 retries++;
818                 goto again;
819         }
820         if (!(r = ypprot_err(yprkv.stat))) {
821                 *outkeylen = yprkv.key.keydat_len;
822                 *outkey = (char *)malloc(*outkeylen+1);
823                 if (*outkey == NULL) {
824                         _yp_unbind(ysd);
825                         *outkeylen = 0;
826                         xdr_free((xdrproc_t)xdr_ypresp_key_val, &yprkv);
827                         YPUNLOCK();
828                         return (YPERR_RESRC);
829                 }
830                 bcopy(yprkv.key.keydat_val, *outkey, *outkeylen);
831                 (*outkey)[*outkeylen] = '\0';
832                 *outvallen = yprkv.val.valdat_len;
833                 *outval = (char *)malloc(*outvallen+1);
834                 if (*outval == NULL) {
835                         free(*outkey);
836                         _yp_unbind(ysd);
837                         *outkeylen = *outvallen = 0;
838                         xdr_free((xdrproc_t)xdr_ypresp_key_val, &yprkv);
839                         YPUNLOCK();
840                         return (YPERR_RESRC);
841                 }
842                 bcopy(yprkv.val.valdat_val, *outval, *outvallen);
843                 (*outval)[*outvallen] = '\0';
844         }
845
846         xdr_free((xdrproc_t)xdr_ypresp_key_val, &yprkv);
847         YPUNLOCK();
848         return (r);
849 }
850
851 int
852 yp_next(char *indomain, char *inmap, char *inkey, int inkeylen,
853     char **outkey, int *outkeylen, char **outval, int *outvallen)
854 {
855         struct ypresp_key_val yprkv;
856         struct ypreq_key yprk;
857         struct dom_binding *ysd;
858         struct timeval tv;
859         int r;
860         int retries = 0;
861         /* Sanity check */
862
863         if (inkey == NULL || !strlen(inkey) || inkeylen <= 0 ||
864             inmap == NULL || !strlen(inmap) ||
865             indomain == NULL || !strlen(indomain))
866                 return (YPERR_BADARGS);
867
868         *outkey = *outval = NULL;
869         *outkeylen = *outvallen = 0;
870
871         YPLOCK();
872 again:
873         if (retries > MAX_RETRIES) {
874                 YPUNLOCK();
875                 return (YPERR_RPC);
876         }
877
878         if (_yp_dobind(indomain, &ysd) != 0) {
879                 YPUNLOCK();
880                 return (YPERR_DOMAIN);
881         }
882
883         tv.tv_sec = _yplib_timeout;
884         tv.tv_usec = 0;
885
886         yprk.domain = indomain;
887         yprk.map = inmap;
888         yprk.key.keydat_val = inkey;
889         yprk.key.keydat_len = inkeylen;
890         bzero((char *)&yprkv, sizeof yprkv);
891
892         r = clnt_call(ysd->dom_client, YPPROC_NEXT,
893                 (xdrproc_t)xdr_ypreq_key, &yprk,
894                 (xdrproc_t)xdr_ypresp_key_val, &yprkv, tv);
895         if (r != RPC_SUCCESS) {
896                 clnt_perror(ysd->dom_client, "yp_next: clnt_call");
897                 _yp_unbind(ysd);
898                 retries++;
899                 goto again;
900         }
901         if (!(r = ypprot_err(yprkv.stat))) {
902                 *outkeylen = yprkv.key.keydat_len;
903                 *outkey = (char *)malloc(*outkeylen+1);
904                 if (*outkey == NULL) {
905                         _yp_unbind(ysd);
906                         *outkeylen = 0;
907                         xdr_free((xdrproc_t)xdr_ypresp_key_val, &yprkv);
908                         YPUNLOCK();
909                         return (YPERR_RESRC);
910                 }
911                 bcopy(yprkv.key.keydat_val, *outkey, *outkeylen);
912                 (*outkey)[*outkeylen] = '\0';
913                 *outvallen = yprkv.val.valdat_len;
914                 *outval = (char *)malloc(*outvallen+1);
915                 if (*outval == NULL) {
916                         free(*outkey);
917                         _yp_unbind(ysd);
918                         *outkeylen = *outvallen = 0;
919                         xdr_free((xdrproc_t)xdr_ypresp_key_val, &yprkv);
920                         YPUNLOCK();
921                         return (YPERR_RESRC);
922                 }
923                 bcopy(yprkv.val.valdat_val, *outval, *outvallen);
924                 (*outval)[*outvallen] = '\0';
925         }
926
927         xdr_free((xdrproc_t)xdr_ypresp_key_val, &yprkv);
928         YPUNLOCK();
929         return (r);
930 }
931
932 int
933 yp_all(char *indomain, char *inmap, struct ypall_callback *incallback)
934 {
935         struct ypreq_nokey yprnk;
936         struct dom_binding *ysd;
937         struct timeval tv;
938         struct sockaddr_in clnt_sin;
939         CLIENT *clnt;
940         u_long status, savstat;
941         int clnt_sock;
942         int retries = 0;
943         /* Sanity check */
944
945         if (indomain == NULL || !strlen(indomain) ||
946             inmap == NULL || !strlen(inmap))
947                 return (YPERR_BADARGS);
948
949         YPLOCK();
950 again:
951         if (retries > MAX_RETRIES) {
952                 YPUNLOCK();
953                 return (YPERR_RPC);
954         }
955
956         if (_yp_dobind(indomain, &ysd) != 0) {
957                 YPUNLOCK();
958                 return (YPERR_DOMAIN);
959         }
960
961         tv.tv_sec = _yplib_timeout;
962         tv.tv_usec = 0;
963
964         /* YPPROC_ALL manufactures its own channel to ypserv using TCP */
965
966         clnt_sock = RPC_ANYSOCK;
967         clnt_sin = ysd->dom_server_addr;
968         clnt_sin.sin_port = 0;
969         clnt = clnttcp_create(&clnt_sin, YPPROG, YPVERS, &clnt_sock, 0, 0);
970         if (clnt == NULL) {
971                 YPUNLOCK();
972                 printf("clnttcp_create failed\n");
973                 return (YPERR_PMAP);
974         }
975
976         yprnk.domain = indomain;
977         yprnk.map = inmap;
978         ypresp_allfn = incallback->foreach;
979         ypresp_data = (void *)incallback->data;
980
981         if (clnt_call(clnt, YPPROC_ALL,
982                 (xdrproc_t)xdr_ypreq_nokey, &yprnk,
983                 (xdrproc_t)xdr_ypresp_all_seq, &status, tv) != RPC_SUCCESS) {
984                         clnt_perror(clnt, "yp_all: clnt_call");
985                         clnt_destroy(clnt);
986                         _yp_unbind(ysd);
987                         retries++;
988                         goto again;
989         }
990
991         clnt_destroy(clnt);
992         savstat = status;
993         xdr_free((xdrproc_t)xdr_ypresp_all_seq, &status);       /* not really needed... */
994         YPUNLOCK();
995         if (savstat != YP_NOMORE)
996                 return (ypprot_err(savstat));
997         return (0);
998 }
999
1000 int
1001 yp_order(char *indomain, char *inmap, int *outorder)
1002 {
1003         struct dom_binding *ysd;
1004         struct ypresp_order ypro;
1005         struct ypreq_nokey yprnk;
1006         struct timeval tv;
1007         int r;
1008
1009         /* Sanity check */
1010
1011         if (indomain == NULL || !strlen(indomain) ||
1012             inmap == NULL || !strlen(inmap))
1013                 return (YPERR_BADARGS);
1014
1015         YPLOCK();
1016 again:
1017         if (_yp_dobind(indomain, &ysd) != 0) {
1018                 YPUNLOCK();
1019                 return (YPERR_DOMAIN);
1020         }
1021
1022         tv.tv_sec = _yplib_timeout;
1023         tv.tv_usec = 0;
1024
1025         yprnk.domain = indomain;
1026         yprnk.map = inmap;
1027
1028         bzero((char *)(char *)&ypro, sizeof ypro);
1029
1030         r = clnt_call(ysd->dom_client, YPPROC_ORDER,
1031                 (xdrproc_t)xdr_ypreq_nokey, &yprnk,
1032                 (xdrproc_t)xdr_ypresp_order, &ypro, tv);
1033
1034         /*
1035          * NIS+ in YP compat mode doesn't support the YPPROC_ORDER
1036          * procedure.
1037          */
1038         if (r == RPC_PROCUNAVAIL) {
1039                 YPUNLOCK();
1040                 return(YPERR_YPERR);
1041         }
1042
1043         if (r != RPC_SUCCESS) {
1044                 clnt_perror(ysd->dom_client, "yp_order: clnt_call");
1045                 _yp_unbind(ysd);
1046                 goto again;
1047         }
1048
1049         if (!(r = ypprot_err(ypro.stat))) {
1050                 *outorder = ypro.ordernum;
1051         }
1052
1053         xdr_free((xdrproc_t)xdr_ypresp_order, &ypro);
1054         YPUNLOCK();
1055         return (r);
1056 }
1057
1058 int
1059 yp_master(char *indomain, char *inmap, char **outname)
1060 {
1061         struct dom_binding *ysd;
1062         struct ypresp_master yprm;
1063         struct ypreq_nokey yprnk;
1064         struct timeval tv;
1065         int r;
1066
1067         /* Sanity check */
1068
1069         if (indomain == NULL || !strlen(indomain) ||
1070             inmap == NULL || !strlen(inmap))
1071                 return (YPERR_BADARGS);
1072         YPLOCK();
1073 again:
1074         if (_yp_dobind(indomain, &ysd) != 0) {
1075                 YPUNLOCK();
1076                 return (YPERR_DOMAIN);
1077         }
1078
1079         tv.tv_sec = _yplib_timeout;
1080         tv.tv_usec = 0;
1081
1082         yprnk.domain = indomain;
1083         yprnk.map = inmap;
1084
1085         bzero((char *)&yprm, sizeof yprm);
1086
1087         r = clnt_call(ysd->dom_client, YPPROC_MASTER,
1088                 (xdrproc_t)xdr_ypreq_nokey, &yprnk,
1089                 (xdrproc_t)xdr_ypresp_master, &yprm, tv);
1090         if (r != RPC_SUCCESS) {
1091                 clnt_perror(ysd->dom_client, "yp_master: clnt_call");
1092                 _yp_unbind(ysd);
1093                 goto again;
1094         }
1095
1096         if (!(r = ypprot_err(yprm.stat))) {
1097                 *outname = (char *)strdup(yprm.peer);
1098         }
1099
1100         xdr_free((xdrproc_t)xdr_ypresp_master, &yprm);
1101         YPUNLOCK();
1102         return (r);
1103 }
1104
1105 int
1106 yp_maplist(char *indomain, struct ypmaplist **outmaplist)
1107 {
1108         struct dom_binding *ysd;
1109         struct ypresp_maplist ypml;
1110         struct timeval tv;
1111         int r;
1112
1113         /* Sanity check */
1114
1115         if (indomain == NULL || !strlen(indomain))
1116                 return (YPERR_BADARGS);
1117
1118         YPLOCK();
1119 again:
1120         if (_yp_dobind(indomain, &ysd) != 0) {
1121                 YPUNLOCK();
1122                 return (YPERR_DOMAIN);
1123         }
1124
1125         tv.tv_sec = _yplib_timeout;
1126         tv.tv_usec = 0;
1127
1128         bzero((char *)&ypml, sizeof ypml);
1129
1130         r = clnt_call(ysd->dom_client, YPPROC_MAPLIST,
1131                 (xdrproc_t)xdr_domainname, &indomain,
1132                 (xdrproc_t)xdr_ypresp_maplist, &ypml,tv);
1133         if (r != RPC_SUCCESS) {
1134                 clnt_perror(ysd->dom_client, "yp_maplist: clnt_call");
1135                 _yp_unbind(ysd);
1136                 goto again;
1137         }
1138         if (!(r = ypprot_err(ypml.stat))) {
1139                 *outmaplist = ypml.maps;
1140         }
1141
1142         /* NO: xdr_free((xdrproc_t)xdr_ypresp_maplist, &ypml);*/
1143         YPUNLOCK();
1144         return (r);
1145 }
1146
1147 const char *
1148 yperr_string(int incode)
1149 {
1150         static char err[80];
1151
1152         switch (incode) {
1153         case 0:
1154                 return ("Success");
1155         case YPERR_BADARGS:
1156                 return ("Request arguments bad");
1157         case YPERR_RPC:
1158                 return ("RPC failure");
1159         case YPERR_DOMAIN:
1160                 return ("Can't bind to server which serves this domain");
1161         case YPERR_MAP:
1162                 return ("No such map in server's domain");
1163         case YPERR_KEY:
1164                 return ("No such key in map");
1165         case YPERR_YPERR:
1166                 return ("YP server error");
1167         case YPERR_RESRC:
1168                 return ("Local resource allocation failure");
1169         case YPERR_NOMORE:
1170                 return ("No more records in map database");
1171         case YPERR_PMAP:
1172                 return ("Can't communicate with portmapper");
1173         case YPERR_YPBIND:
1174                 return ("Can't communicate with ypbind");
1175         case YPERR_YPSERV:
1176                 return ("Can't communicate with ypserv");
1177         case YPERR_NODOM:
1178                 return ("Local domain name not set");
1179         case YPERR_BADDB:
1180                 return ("Server data base is bad");
1181         case YPERR_VERS:
1182                 return ("YP server version mismatch - server can't supply service.");
1183         case YPERR_ACCESS:
1184                 return ("Access violation");
1185         case YPERR_BUSY:
1186                 return ("Database is busy");
1187         }
1188         sprintf(err, "YP unknown error %d\n", incode);
1189         return (err);
1190 }
1191
1192 int
1193 ypprot_err(unsigned int incode)
1194 {
1195         switch (incode) {
1196         case YP_TRUE:
1197                 return (0);
1198         case YP_FALSE:
1199                 return (YPERR_YPBIND);
1200         case YP_NOMORE:
1201                 return (YPERR_NOMORE);
1202         case YP_NOMAP:
1203                 return (YPERR_MAP);
1204         case YP_NODOM:
1205                 return (YPERR_DOMAIN);
1206         case YP_NOKEY:
1207                 return (YPERR_KEY);
1208         case YP_BADOP:
1209                 return (YPERR_YPERR);
1210         case YP_BADDB:
1211                 return (YPERR_BADDB);
1212         case YP_YPERR:
1213                 return (YPERR_YPERR);
1214         case YP_BADARGS:
1215                 return (YPERR_BADARGS);
1216         case YP_VERS:
1217                 return (YPERR_VERS);
1218         }
1219         return (YPERR_YPERR);
1220 }
1221
1222 int
1223 _yp_check(char **dom)
1224 {
1225         char *unused;
1226
1227         YPLOCK();
1228         if (_yp_domain[0]=='\0')
1229                 if (yp_get_default_domain_locked(&unused)) {
1230                         YPUNLOCK();
1231                         return (0);
1232                 }
1233
1234         if (dom)
1235                 *dom = _yp_domain;
1236
1237         if (yp_bind_locked(_yp_domain) == 0) {
1238                 yp_unbind_locked(_yp_domain);
1239                 YPUNLOCK();
1240                 return (1);
1241         }
1242         YPUNLOCK();
1243         return (0);
1244 }