198184Sgordon/*-
298184Sgordon * Copyright (c) 2005 Michael Bushkov <bushman@rsu.ru>
398184Sgordon * All rights reserved.
498184Sgordon *
598184Sgordon * Redistribution and use in source and binary forms, with or without
698184Sgordon * modification, are permitted provided that the following conditions
7195026Sdougb * are met:
8136224Smtm * 1. Redistributions of source code must retain the above copyright
998184Sgordon *    notice, this list of conditions and the following disclaimer.
1098184Sgordon * 2. Redistributions in binary form must reproduce the above copyright
11118099Smbr *    notice, this list of conditions and the following disclaimer in the
1298184Sgordon *    documentation and/or other materials provided with the distribution.
1398184Sgordon *
1498184Sgordon * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
1598184Sgordon * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16175722Smtm * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17203676Semax * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18112849Smtm * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19165683Syar * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
2098184Sgordon * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21200028Sume * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22200028Sume * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23175722Smtm * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24175722Smtm * SUCH DAMAGE.
25175722Smtm *
26175722Smtm */
27175722Smtm
28190575Semax#include <sys/cdefs.h>
29190575Semax__FBSDID("$FreeBSD$");
30190575Semax
31190575Semax#include <sys/types.h>
32190575Semax
33208060Sdougb#include <sys/event.h>
34175722Smtm#include <sys/socket.h>
35175722Smtm#include <sys/uio.h>
3698184Sgordon#include <sys/un.h>
3798184Sgordon
38190575Semax#include <assert.h>
39190575Semax#include <errno.h>
40208060Sdougb#include <fcntl.h>
41190575Semax#include <stdlib.h>
4298184Sgordon#include <string.h>
4398184Sgordon#include <unistd.h>
4498184Sgordon
4598184Sgordon#include "debug.h"
46190575Semax#include "nscdcli.h"
47160672Syar#include "protocol.h"
48156030Swkoszek
4998184Sgordon#define DEFAULT_NSCD_IO_TIMEOUT	4
5098184Sgordon
5198184Sgordonstatic int safe_write(struct nscd_connection_ *, const void *, size_t);
5298184Sgordonstatic int safe_read(struct nscd_connection_ *, void *, size_t);
5398184Sgordonstatic int send_credentials(struct nscd_connection_ *, int);
5498184Sgordon
5598184Sgordonstatic int
56112849Smtmsafe_write(struct nscd_connection_ *connection, const void *data,
57160672Syar	size_t data_size)
58112849Smtm{
59112849Smtm	struct kevent eventlist;
60203676Semax	int	nevents;
6198184Sgordon	size_t result;
62203676Semax	ssize_t s_result;
63203676Semax	struct timespec	timeout;
64203676Semax
65203676Semax	if (data_size == 0)
66203676Semax		return (0);
67203676Semax
68203676Semax	timeout.tv_sec = DEFAULT_NSCD_IO_TIMEOUT;
69203676Semax	timeout.tv_nsec = 0;
70203676Semax	result = 0;
71203676Semax	do {
72203676Semax		nevents = kevent(connection->write_queue, NULL, 0, &eventlist,
73203676Semax	    		1, &timeout);
74112849Smtm		if ((nevents == 1) && (eventlist.filter == EVFILT_WRITE)) {
75112849Smtm			s_result = write(connection->sockfd,
76220153Semaste				(char *)data + result,
77200028Sume				(size_t)eventlist.data < data_size - result ?
78180296Smtm		    		(size_t)eventlist.data : data_size - result);
79200028Sume			if (s_result == -1)
80220153Semaste				return (-1);
81200028Sume			else
82200028Sume				result += s_result;
83200028Sume
84200028Sume			if (eventlist.flags & EV_EOF)
8598184Sgordon				return (result < data_size ? -1 : 0);
8698184Sgordon		} else
87112849Smtm			return (-1);
88112849Smtm	} while (result < data_size);
89203676Semax
90203676Semax	return (0);
91112849Smtm}
92112849Smtm
93220153Semastestatic int
94200028Sumesafe_read(struct nscd_connection_ *connection, void *data, size_t data_size)
95220153Semaste{
96200028Sume	struct kevent eventlist;
97203676Semax	size_t result;
98203676Semax	ssize_t s_result;
99203676Semax	struct timespec timeout;
100203676Semax	int nevents;
101203676Semax
102203676Semax	if (data_size == 0)
103203676Semax		return (0);
104203676Semax
105112849Smtm	timeout.tv_sec = DEFAULT_NSCD_IO_TIMEOUT;
106112849Smtm	timeout.tv_nsec = 0;
10798184Sgordon	result = 0;
108203676Semax	do {
109203676Semax		nevents = kevent(connection->read_queue, NULL, 0, &eventlist, 1,
110190575Semax			&timeout);
111		if ((nevents == 1) && (eventlist.filter == EVFILT_READ)) {
112			s_result = read(connection->sockfd,
113				(char *)data + result,
114				(size_t)eventlist.data <= data_size - result ?
115				(size_t)eventlist.data : data_size - result);
116			if (s_result == -1)
117				return (-1);
118			else
119				result += s_result;
120
121			if (eventlist.flags & EV_EOF)
122				return (result < data_size ? -1 : 0);
123		} else
124			return (-1);
125	} while (result < data_size);
126
127	return (0);
128}
129
130static int
131send_credentials(struct nscd_connection_ *connection, int type)
132{
133	struct kevent eventlist;
134	int nevents;
135	ssize_t result;
136	int res;
137
138	struct msghdr	cred_hdr;
139	struct iovec	iov;
140
141	struct {
142		struct cmsghdr	hdr;
143		struct cmsgcred	creds;
144	} cmsg;
145
146	TRACE_IN(send_credentials);
147	memset(&cmsg, 0, sizeof(cmsg));
148	cmsg.hdr.cmsg_len = sizeof(cmsg);
149	cmsg.hdr.cmsg_level = SOL_SOCKET;
150	cmsg.hdr.cmsg_type = SCM_CREDS;
151
152	memset(&cred_hdr, 0, sizeof(struct msghdr));
153	cred_hdr.msg_iov = &iov;
154	cred_hdr.msg_iovlen = 1;
155	cred_hdr.msg_control = &cmsg;
156	cred_hdr.msg_controllen = sizeof(cmsg);
157
158	iov.iov_base = &type;
159	iov.iov_len = sizeof(int);
160
161	EV_SET(&eventlist, connection->sockfd, EVFILT_WRITE, EV_ADD,
162		NOTE_LOWAT, sizeof(int), NULL);
163	res = kevent(connection->write_queue, &eventlist, 1, NULL, 0, NULL);
164
165	nevents = kevent(connection->write_queue, NULL, 0, &eventlist, 1, NULL);
166	if ((nevents == 1) && (eventlist.filter == EVFILT_WRITE)) {
167		result = (sendmsg(connection->sockfd, &cred_hdr, 0) == -1) ? -1
168	    		: 0;
169		EV_SET(&eventlist, connection->sockfd, EVFILT_WRITE, EV_ADD,
170			0, 0, NULL);
171		kevent(connection->write_queue, &eventlist, 1, NULL, 0, NULL);
172		TRACE_OUT(send_credentials);
173		return (result);
174	} else {
175		TRACE_OUT(send_credentials);
176		return (-1);
177	}
178}
179
180struct nscd_connection_ *
181open_nscd_connection__(struct nscd_connection_params const *params)
182{
183	struct nscd_connection_ *retval;
184	struct kevent eventlist;
185	struct sockaddr_un	client_address;
186	int client_address_len, client_socket;
187	int res;
188
189	TRACE_IN(open_nscd_connection);
190	assert(params != NULL);
191
192	client_socket = socket(PF_LOCAL, SOCK_STREAM, 0);
193	client_address.sun_family = PF_LOCAL;
194	strlcpy(client_address.sun_path, params->socket_path,
195		sizeof(client_address.sun_path));
196	client_address_len = sizeof(client_address.sun_family) +
197		strlen(client_address.sun_path) + 1;
198
199	res = connect(client_socket, (struct sockaddr *)&client_address,
200		client_address_len);
201	if (res == -1) {
202		close(client_socket);
203		TRACE_OUT(open_nscd_connection);
204		return (NULL);
205	}
206	fcntl(client_socket, F_SETFL, O_NONBLOCK);
207
208	retval = calloc(1, sizeof(*retval));
209	assert(retval != NULL);
210
211	retval->sockfd = client_socket;
212
213	retval->write_queue = kqueue();
214	assert(retval->write_queue != -1);
215
216	EV_SET(&eventlist, retval->sockfd, EVFILT_WRITE, EV_ADD,
217		0, 0, NULL);
218	res = kevent(retval->write_queue, &eventlist, 1, NULL, 0, NULL);
219
220	retval->read_queue = kqueue();
221	assert(retval->read_queue != -1);
222
223	EV_SET(&eventlist, retval->sockfd, EVFILT_READ, EV_ADD,
224		0, 0, NULL);
225	res = kevent(retval->read_queue, &eventlist, 1, NULL, 0, NULL);
226
227	TRACE_OUT(open_nscd_connection);
228	return (retval);
229}
230
231void
232close_nscd_connection__(struct nscd_connection_ *connection)
233{
234
235	TRACE_IN(close_nscd_connection);
236	assert(connection != NULL);
237
238	close(connection->sockfd);
239	close(connection->read_queue);
240	close(connection->write_queue);
241	free(connection);
242	TRACE_OUT(close_nscd_connection);
243}
244
245int
246nscd_transform__(struct nscd_connection_ *connection,
247	const char *entry_name, int transformation_type)
248{
249	size_t name_size;
250	int error_code;
251	int result;
252
253	TRACE_IN(nscd_transform);
254
255	error_code = -1;
256	result = 0;
257	result = send_credentials(connection, CET_TRANSFORM_REQUEST);
258	if (result != 0)
259		goto fin;
260
261	if (entry_name != NULL)
262		name_size = strlen(entry_name);
263	else
264		name_size = 0;
265
266	result = safe_write(connection, &name_size, sizeof(size_t));
267	if (result != 0)
268		goto fin;
269
270	result = safe_write(connection, &transformation_type, sizeof(int));
271	if (result != 0)
272		goto fin;
273
274	if (entry_name != NULL) {
275		result = safe_write(connection, entry_name, name_size);
276		if (result != 0)
277			goto fin;
278	}
279
280	result = safe_read(connection, &error_code, sizeof(int));
281	if (result != 0)
282		error_code = -1;
283
284fin:
285	TRACE_OUT(nscd_transform);
286	return (error_code);
287}
288