diff options
author | amw <none@none> | 2007-10-25 16:34:29 -0700 |
---|---|---|
committer | amw <none@none> | 2007-10-25 16:34:29 -0700 |
commit | da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0 (patch) | |
tree | 65be91fb78a6a66183197595333f2e8aafb4640a /usr/src/lib/smbsrv/libsmb/common/smb_wins.c | |
parent | e845e33dd0d1aea22db7edaa8c7d43955d24609b (diff) | |
download | illumos-gate-da6c28aaf62fa55f0fdb8004aa40f88f23bf53f0.tar.gz |
PSARC/2007/218 caller_context_t in all VOPs
PSARC/2007/227 VFS Feature Registration and ACL on Create
PSARC/2007/244 ZFS Case-insensitive support
PSARC/2007/315 Extensible Attribute Interfaces
PSARC/2007/394 ls(1) new command line options '-/' and '-%': CIFS system attributes support
PSARC/2007/403 Modified Access Checks for CIFS
PSARC/2007/410 Add system attribute support to chmod(1)
PSARC/2007/432 CIFS system attributes support for cp(1), pack(1), unpack(1), compress(1) and uncompress(1)
PSARC/2007/444 Rescind SETTABLE Attribute
PSARC/2007/459 CIFS system attributes support for cpio(1), pax(1), tar(1)
PSARC/2007/546 Update utilities to match CIFS system attributes changes.
PSARC/2007/560 ZFS sharesmb property
4890717 want append-only files
6417428 Case-insensitive file system name lookup to support CIFS
6417435 DOS attributes and additional timestamps to support for CIFS
6417442 File system quarantined and modified attributes to support an integrated Anti-Virus service
6417453 FS boolean property for rejecting/allowing invalid UTF-8 sequences in file names
6473733 RFE: Need support for open-deny modes
6473755 RFE: Need ability to reconcile oplock and delegation conflicts
6494624 sharemgr needs to support CIFS shares better
6546705 All vnode operations need to pass caller_context_t
6546706 Need VOP_SETATTR/VOP_GETATTR to support new, optional attributes
6546893 Solaris system attribute support
6550962 ZFS ACL inheritance needs to be enhanced to support Automatic Inheritance
6553589 RFE: VFS Feature Registration facility
6553770 RFE: ZFS support for ACL-on-CREATE (PSARC 2007/227)
6565581 ls(1) should support file system attributes proposed in PSARC/2007/315
6566784 NTFS streams are not copied along with the files.
6576205 cp(1), pack(1) and compress(1) should support file system attributes proposed in PSARC/2007/315
6578875 RFE: kernel interfaces for nbmand need improvement
6578883 RFE: VOP_SHRLOCK needs additional access types
6578885 chmod(1) should support file system attributes proposed in PSARC/2007/315
6578886 RFE: disallow nbmand state to change on remount
6583349 ACL parser needs to support audit/alarm ACE types
6590347 tar(1) should support filesystem attributes proposed in PSARC/2007/315
6597357 *tar* xv@ doesn't show the hidden directory even though it is restored
6597360 *tar* should re-init xattr info if openat() fails during extraction of and extended attribute
6597368 *tar* cannot restore hard linked extended attributes
6597374 *tar* doesn't display "x " when hard linked attributes are restored
6597375 *tar* extended attribute header off by one
6614861 *cpio* incorrectly archives extended system attributes with -@
6614896 *pax* incorrectly archives extended system attributes with -@
6615225 *tar* incorrectly archives extended system attributes with -@
6617183 CIFS Service - PSARC 2006/715
Diffstat (limited to 'usr/src/lib/smbsrv/libsmb/common/smb_wins.c')
-rw-r--r-- | usr/src/lib/smbsrv/libsmb/common/smb_wins.c | 210 |
1 files changed, 210 insertions, 0 deletions
diff --git a/usr/src/lib/smbsrv/libsmb/common/smb_wins.c b/usr/src/lib/smbsrv/libsmb/common/smb_wins.c new file mode 100644 index 0000000000..09498abfca --- /dev/null +++ b/usr/src/lib/smbsrv/libsmb/common/smb_wins.c @@ -0,0 +1,210 @@ +/* + * CDDL HEADER START + * + * The contents of this file are subject to the terms of the + * Common Development and Distribution License (the "License"). + * You may not use this file except in compliance with the License. + * + * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE + * or http://www.opensolaris.org/os/licensing. + * See the License for the specific language governing permissions + * and limitations under the License. + * + * When distributing Covered Code, include this CDDL HEADER in each + * file and include the License file at usr/src/OPENSOLARIS.LICENSE. + * If applicable, add the following below this CDDL HEADER, with the + * fields enclosed by brackets "[]" replaced with your own identifying + * information: Portions Copyright [yyyy] [name of copyright owner] + * + * CDDL HEADER END + */ +/* + * Copyright 2007 Sun Microsystems, Inc. All rights reserved. + * Use is subject to license terms. + */ + +#pragma ident "%Z%%M% %I% %E% SMI" + +/* + * SMB WINS support functions + */ + +#include <strings.h> +#include <stdlib.h> + +#include <sys/types.h> +#include <sys/socket.h> +#include <netinet/in.h> +#include <arpa/inet.h> + +#include <smbsrv/smbinfo.h> + +#include <smbsrv/libsmb.h> + +/* + * smb_wins_iplist + * + * Get a string containing a list of comma separated IP addresses + * and return an array containing numeric equivalent for string IPs. + * + * Returns the number of parsed IPs. + * Return -1 if list is badly formatted. + * This routine need fix for IPv6 + */ +int +smb_wins_iplist(char *list, uint32_t iplist[], int max_naddr) +{ + char *ip, *ctx; + char *tmp; + int n = 0; + + if ((list == NULL) || (*list == '\0')) + return (0); + + if ((tmp = strdup(list)) == NULL) + return (0); + + ip = strtok_r(tmp, ",", &ctx); + while (ip && (n < max_naddr)) { + ip = trim_whitespace(ip); + if (*ip != 0) { + if (inet_pton(AF_INET, ip, &iplist[n]) == 1) { + n++; + } else { + return (-1); + } + } + ip = strtok_r(0, ",", &ctx); + } + + free(tmp); + return (n); +} + +/* + * smb_wins_is_excluded + * + * Check to see if the given IP addr shouldn't be registered in WINS. + * + * Returns 1 if it's excluded, 0 if it's not. + */ +boolean_t +smb_wins_is_excluded(in_addr_t ipaddr, + unsigned long *exclude_list, int nexclude) +{ + int i; + + if (nexclude == 0) + return (B_FALSE); + + for (i = 0; i < nexclude; i++) + if (ipaddr == exclude_list[i]) { + return (B_TRUE); + } + + return (B_FALSE); +} + +/* + * Build a CSV list of ips to be excluded. + * This function needs fix for IPv6 + */ +void +smb_wins_build_list(char *buf, uint32_t iplist[], int max_naddr) +{ + char ipstr[16]; + int i; + + if (!buf) + return; + + buf[0] = '\0'; + for (i = 0; i < max_naddr; i++) { + /* XXX these will be removed */ + /*LINTED*/ + if (iplist[i] == -1) + continue; + + if (inet_ntop(AF_INET, (const void *)(&iplist[i]), ipstr, + sizeof (ipstr)) == 0) + continue; + (void) strcat(buf, ipstr); + (void) strcat(buf, ","); + } + buf[strlen(buf)-1] = '\0'; +} + +/* + * This function build the new WINS exclude list from + * configured list + new additions to exclude list + * It also assumes that the buffers are of enough space. + */ +int +smb_wins_exclude_list(char *config_list, char *exclude_list) +{ + int ccnt, ecnt, already_there; + int i, j; + uint32_t ncur_list[SMB_PI_MAX_NETWORKS]; + uint32_t ecur_list[SMB_PI_MAX_NETWORKS]; + + ccnt = smb_wins_iplist(config_list, ncur_list, SMB_PI_MAX_NETWORKS); + if (ccnt < 0) + return (-1); + + ecnt = smb_wins_iplist(exclude_list, ecur_list, SMB_PI_MAX_NETWORKS); + if (ecnt < 0) + return (-1); + + if ((ccnt + ecnt) > SMB_PI_MAX_NETWORKS) + return (-1); + + for (i = 0; i < ecnt; i++) { + already_there = 0; + for (j = 0; j < ccnt; j++) { + if (ncur_list[j] == ecur_list[i]) { + already_there = 1; + } + } + if (already_there) + continue; + + ncur_list[ccnt++] = ecur_list[i]; + } + + smb_wins_build_list(config_list, ncur_list, ccnt); + return (0); +} + +/* + * This function build the new WINS allow list from + * configured list - new allowed list + * It also assumes that the buffers are of enough space. + */ +int +smb_wins_allow_list(char *config_list, char *allow_list) +{ + int ccnt, acnt; + int i, j; + uint32_t ncur_list[SMB_PI_MAX_NETWORKS]; + uint32_t acur_list[SMB_PI_MAX_NETWORKS]; + + ccnt = smb_wins_iplist(config_list, ncur_list, SMB_PI_MAX_NETWORKS); + if (ccnt < 0) + return (-1); + + acnt = smb_wins_iplist(allow_list, acur_list, SMB_PI_MAX_NETWORKS); + if (acnt < 0) + return (0); + + for (i = 0; i < acnt; i++) { + for (j = 0; j < ccnt; j++) { + if (ncur_list[j] == (in_addr_t)(-1)) + continue; + if (ncur_list[j] == acur_list[i]) { + ncur_list[j] = (in_addr_t)(-1); + } + } + } + smb_wins_build_list(config_list, ncur_list, ccnt); + return (0); +} |