/*
* CDDL HEADER START
*
* The contents of this file are subject to the terms of the
* Common Development and Distribution License (the "License").
* You may not use this file except in compliance with the License.
*
* You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
* See the License for the specific language governing permissions
* and limitations under the License.
*
* When distributing Covered Code, include this CDDL HEADER in each
* file and include the License file at usr/src/OPENSOLARIS.LICENSE.
* If applicable, add the following below this CDDL HEADER, with the
* fields enclosed by brackets "[]" replaced with your own identifying
* information: Portions Copyright [yyyy] [name of copyright owner]
*
* CDDL HEADER END
*/
/*
* Copyright 2006 Sun Microsystems, Inc. All rights reserved.
* Use is subject to license terms.
*/
/* Copyright (c) 1984, 1986, 1987, 1988, 1989 AT&T */
/* All Rights Reserved */
#include <stdio.h>
#include <limits.h>
#include <stdlib.h>
#include <unistd.h>
#include <string.h>
#include <errno.h>
#include <pkglocs.h>
#include <locale.h>
#include <libintl.h>
#include <pkglib.h>
#include <pkgerr.h>
#include <pkgweb.h>
#include <install.h>
#include <libinst.h>
#include <libadm.h>
#include <messages.h>
extern int warnflag; /* != 0 non-fatal error occurred 2 */
static struct {
char **memloc;
char *tag;
} admlist[] = {
/* MUST BE LAST ENTRY IN LIST */
};
/*
* Name: setadminSetting
* Description: set one administration parameter setting
* Arguments: a_paramName - pointer to string representing the name of
* the administration parameter to set
* a_paramValue - pointer to string representing the value
* to set the specified administration parameter to
* Returns: char *
* - old value the parameter had before being set
* == NULL - the old paramter was not set
*/
char *
{
int i;
/* locate and update the specified admin setting */
break;
}
}
}
return (oldValue);
}
/*
* Name: setadminFile
* Description: read and remember settings from administration file
* Arguments: file - pointer to string representing the path to the
* administration file to read - if this is NULL
* then the name "default" is used - if this is
* the string "none" then the admin "basedir"
* setting is set to "ask" so that the location
* of the administration file will be interactively
* asked at the appropriate time
* Returns: void
*/
void
{
int i;
char *value;
int mail = 0;
file = "default";
return;
}
if (file[0] == '/')
else {
get_PKGADM(), file);
}
}
quit(99);
}
param[0] = '\0';
mail = 1;
}
if (value[0] == '\0') {
param[0] = '\0';
continue; /* same as not being set at all */
}
break;
}
}
}
param[0] = '\0';
}
if (!mail) {
}
}
/*
* Function: web_ck_retries
* Description: Reads admin file setting for networkretries, or uses default
* Parameters: None
* Returns: admin file setting for networkretries, or the default if no
* admin file setting exists or if it is outside the
* allowable range.
*/
int
web_ck_retries(void)
{
if (ADMSET(networkretries)) {
/* Make sure value is within valid range */
return (NET_RETRIES_DEFAULT);
} else if (retries <= NET_RETRIES_MIN ||
retries > NET_RETRIES_MAX) {
return (NET_RETRIES_DEFAULT);
}
}
return (retries);
}
/*
* Function: web_ck_authentication
* Description: Retrieves admin file setting for authentication
* Parameters: None
* Returns: admin file policy for authentication - AUTH_QUIT
* or AUTH_NOCHECK.
* non-zero failure
*/
int
web_ck_authentication(void)
{
return (AUTH_NOCHECK);
return (AUTH_QUIT);
}
/*
* Function: web_ck_timeout
* Description: Retrieves admin file policy for networktimeout's
* Parameters: NONE
* Returns: Admin file setting for networktimeout, or default
* timeout value if admin file does not specify one,
* or specifies one that is out of the allowable range.
*/
int
web_ck_timeout(void)
{
if (ADMSET(networktimeout)) {
/* Make sure value is within valid range */
return (NET_TIMEOUT_DEFAULT);
} else if (timeout <= NET_TIMEOUT_MIN ||
timeout > NET_TIMEOUT_MAX) {
return (NET_TIMEOUT_DEFAULT);
}
}
return (timeout);
}
/*
* Function: check_keystore_admin
* Description: Retrieves security keystore setting from admin file,
* or validates user-supplied keystore policy.
* Parameters: keystore - Where to store resulting keystore policy
* Returns: B_TRUE - admin file contained valid keystore, or
* user-supplied keystore passed in "keystore" was
* valid. Resulting keystore stored in "keystore"
*
* B_FALSE - No location supplied to store result,
* or user-supplied keystore was not valid.
*/
{
if (!keystore) {
/* no location to store keystore */
return (B_FALSE);
}
if (!path_valid(*keystore)) {
/* the given keystore is invalid */
return (B_FALSE);
}
/* the user-supplied keystore was valid */
return (B_TRUE);
}
/* no user-supplied, so use default */
}
return (B_TRUE);
}
/*
* Function: get_proxy_port_admin
* Description: Retrieves proxy setting from admin file
* Parameters: proxy - where to store resulting proxy (host:port or URL)
* port - Where to store resulting proxy port
* Returns: B_TRUE - admin file had a valid proxy setting,
* and it is stored in "proxy".
* B_FALSE - no proxy setting in admin file, or
* invalid setting in admin file.
*/
{
/* admin file has bad keystore */
return (B_FALSE);
}
return (B_TRUE);
}
/*
* Function: set_keystore_admin
* Description: Retrieves security keystore setting from admin file,
* Parameters: NONE
* Returns: Keystore file policy from admin file, if set
* and valid. NULL otherwise.
*/
char *
set_keystore_admin(void)
{
return (NULL);
}
return (NULL);
}
}