2 * Copyright (c) 1992, 1993
3 * The Regents of the University of California. All rights reserved.
6 * This code is derived from software donated to Berkeley by
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
17 * 3. All advertising materials mentioning features or use of this software
18 * must display the following acknowledgement:
19 * This product includes software developed by the University of
20 * California, Berkeley and its contributors.
21 * 4. Neither the name of the University nor the names of its contributors
22 * may be used to endorse or promote products derived from this software
23 * without specific prior written permission.
25 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
26 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
27 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
28 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
29 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
30 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
31 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
32 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
33 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
34 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
37 * @(#)activate.c 8.2 (Berkeley) 3/27/94
39 * $Id: activate.c,v 1.2 1992/05/27 07:09:27 jsp Exp jsp $
48 #include <sys/types.h>
49 #include <sys/param.h>
50 #include <sys/socket.h>
52 #include <sys/syslog.h>
58 * Scan the providers list and call the
59 * appropriate function.
61 static int activate_argv(pcr, key, v, so, fdp)
62 struct portal_cred *pcr;
70 for (pr = providers; pr->pr_match; pr++)
71 if (strcmp(v[0], pr->pr_match) == 0)
72 return ((*pr->pr_func)(pcr, key, v, so, fdp));
77 static int get_request(so, pcr, key, klen)
79 struct portal_cred *pcr;
87 iov[0].iov_base = (caddr_t) pcr;
88 iov[0].iov_len = sizeof(*pcr);
89 iov[1].iov_base = key;
90 iov[1].iov_len = klen;
92 bzero((char *) &msg, sizeof(msg));
96 n = recvmsg(so, &msg, 0);
100 if (n <= sizeof(*pcr))
109 static void send_reply(so, fd, error)
123 * Line up error code. Don't worry about byte ordering
124 * because we must be sending to the local machine.
126 iov.iov_base = (caddr_t) &error;
127 iov.iov_len = sizeof(error);
132 bzero((char *) &msg, sizeof(msg));
137 * If there is a file descriptor to send then
138 * construct a suitable rights control message.
142 ctl.cmsg.cmsg_len = sizeof(ctl);
143 ctl.cmsg.cmsg_level = SOL_SOCKET;
144 ctl.cmsg.cmsg_type = SCM_RIGHTS;
145 msg.msg_control = (caddr_t) &ctl;
146 msg.msg_controllen = ctl.cmsg.cmsg_len;
152 if ((n = sendmsg(so, &msg, MSG_EOR)) < 0)
153 syslog(LOG_ERR, "send: %s", strerror(errno));
155 fprintf(stderr, "sent %d bytes\n", n);
159 if (shutdown(so, 2) < 0)
160 syslog(LOG_ERR, "shutdown: %s", strerror(errno));
163 * Throw away the open file descriptor
172 struct portal_cred pcred;
173 char key[MAXPATHLEN+1];
179 * Read the key from the socket
181 error = get_request(so, &pcred, key, sizeof(key));
183 syslog(LOG_ERR, "activate: recvmsg: %s", strerror(error));
188 fprintf(stderr, "lookup key %s\n", key);
192 * Find a match in the configuration file
194 v = conf_match(q, key);
197 * If a match existed, then find an appropriate portal
198 * otherwise simply return ENOENT.
201 error = activate_argv(&pcred, key, v, so, &fd);
211 send_reply(so, fd, error);