2N/A/*
2N/A * CDDL HEADER START
2N/A *
2N/A * The contents of this file are subject to the terms of the
2N/A * Common Development and Distribution License (the "License").
2N/A * You may not use this file except in compliance with the License.
2N/A *
2N/A * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
2N/A * or http://www.opensolaris.org/os/licensing.
2N/A * See the License for the specific language governing permissions
2N/A * and limitations under the License.
2N/A *
2N/A * When distributing Covered Code, include this CDDL HEADER in each
2N/A * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
2N/A * If applicable, add the following below this CDDL HEADER, with the
2N/A * fields enclosed by brackets "[]" replaced with your own identifying
2N/A * information: Portions Copyright [yyyy] [name of copyright owner]
2N/A *
2N/A * CDDL HEADER END
2N/A */
2N/A/*
2N/A * Copyright (c) 2007, 2012, Oracle and/or its affiliates. All rights reserved.
2N/A */
2N/A
2N/A/*
2N/A * Configuration management library
2N/A */
2N/A
2N/A#include <stdio.h>
2N/A#include <stdlib.h>
2N/A#include <unistd.h>
2N/A#include <synch.h>
2N/A#include <string.h>
2N/A#include <strings.h>
2N/A#include <syslog.h>
2N/A#include <netdb.h>
2N/A#include <ctype.h>
2N/A#include <sys/types.h>
2N/A#include <sys/idmap.h>
2N/A#include <sys/stat.h>
2N/A#include <errno.h>
2N/A#include <fcntl.h>
2N/A#include <libscf.h>
2N/A#include <assert.h>
2N/A#include <libdlpi.h>
2N/A#include <uuid/uuid.h>
2N/A#include <smbsrv/libsmb.h>
2N/A#include <smb/ntdsutil.h>
2N/A
2N/Atypedef struct smb_cfg_param {
2N/A smb_cfg_id_t sc_id;
2N/A char *sc_name;
2N/A int sc_type;
2N/A int32_t sc_minval;
2N/A int32_t sc_maxval;
2N/A uint32_t sc_flags;
2N/A boolean_t sc_refresh;
2N/A boolean_t (*sc_chk)(struct smb_cfg_param *, const char *);
2N/A} smb_cfg_param_t;
2N/A
2N/Atypedef struct smb_hostifs_walker {
2N/A const char *hiw_ifname;
2N/A boolean_t hiw_matchfound;
2N/A} smb_hostifs_walker_t;
2N/A
2N/A/*
2N/A * config parameter flags
2N/A */
2N/A#define SMB_CF_PROTECTED 0x01
2N/A#define SMB_CF_EXEC 0x02
2N/A
2N/A/* idmap SMF fmri and Property Group */
2N/A#define MACHINE_SID "machine_sid"
2N/A#define IDMAP_DOMAIN "domain_name"
2N/A
2N/A#define SMB_SECMODE_WORKGRP_STR "workgroup"
2N/A#define SMB_SECMODE_DOMAIN_STR "domain"
2N/A
2N/A#define SMB_ENC_LEN 1024
2N/A#define SMB_DEC_LEN 256
2N/A
2N/A#define SMB_VALID_SUB_CHRS "UDhMLmIiSPu" /* substitution characters */
2N/A
2N/Astatic char *b64_data =
2N/A "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/";
2N/A
2N/Astatic boolean_t smb_config_chk_string(smb_cfg_param_t *, const char *);
2N/Astatic boolean_t smb_config_chk_range(smb_cfg_param_t *, const char *);
2N/Astatic boolean_t smb_config_chk_hostname(smb_cfg_param_t *, const char *);
2N/Astatic boolean_t smb_config_chk_interface(smb_cfg_param_t *, const char *);
2N/Astatic boolean_t smb_config_chk_boolean(smb_cfg_param_t *, const char *);
2N/Astatic boolean_t smb_config_chk_path(smb_cfg_param_t *, const char *);
2N/Astatic boolean_t smb_config_chk_cmd(smb_cfg_param_t *, const char *);
2N/Astatic boolean_t smb_config_chk_disposition(smb_cfg_param_t *, const char *);
2N/A
2N/Astatic smb_cfg_param_t smb_cfg_table[] =
2N/A{
2N/A { SMB_CI_VERSION, "sv_version", SCF_TYPE_ASTRING,
2N/A 0, 0, 0, B_FALSE, NULL },
2N/A
2N/A /* Oplock configuration, Kernel Only */
2N/A { SMB_CI_OPLOCK_ENABLE, "oplock_enable", SCF_TYPE_BOOLEAN,
2N/A 0, 0, 0, B_FALSE, smb_config_chk_boolean },
2N/A
2N/A /* Autohome configuration */
2N/A { SMB_CI_AUTOHOME_MAP, "autohome_map", SCF_TYPE_ASTRING,
2N/A 0, 0, 0, B_FALSE, smb_config_chk_path },
2N/A
2N/A /* Domain/PDC configuration */
2N/A { SMB_CI_DOMAIN_SID, "domain_sid", SCF_TYPE_ASTRING,
2N/A 0, 0, 0, B_FALSE, NULL },
2N/A
2N/A { SMB_CI_DOMAIN_NB, "nb_domain", SCF_TYPE_ASTRING,
2N/A 0, NETBIOS_NAME_SZ, 0, B_FALSE, smb_config_chk_string },
2N/A { SMB_CI_DOMAIN_AD, "ad_domain", SCF_TYPE_ASTRING,
2N/A 0, MAXHOSTNAMELEN, 0, B_FALSE, smb_config_chk_string },
2N/A { SMB_CI_DOMAIN_FOREST, "forest", SCF_TYPE_ASTRING,
2N/A 0, MAXHOSTNAMELEN, 0, B_FALSE, smb_config_chk_string },
2N/A { SMB_CI_DOMAIN_GUID, "domain_guid", SCF_TYPE_ASTRING,
2N/A 0, UUID_PRINTABLE_STRING_LENGTH, 0, B_FALSE,
2N/A smb_config_chk_string },
2N/A { SMB_CI_DOMAIN_SRV, "pdc", SCF_TYPE_ASTRING,
2N/A 0, 0, 0, B_TRUE, smb_config_chk_hostname },
2N/A { SMB_CI_DC_SELECTED, "selected_dc", SCF_TYPE_ASTRING,
2N/A 0, 0, 0, B_TRUE, smb_config_chk_hostname },
2N/A { SMB_CI_DC_LEVEL, "dc_level", SCF_TYPE_INTEGER,
2N/A 0, 0, 0, B_FALSE, NULL },
2N/A { SMB_CI_DOMAIN_LEVEL, "domain_level", SCF_TYPE_INTEGER,
2N/A 0, 0, 0, B_FALSE, NULL },
2N/A { SMB_CI_FOREST_LEVEL, "forest_level", SCF_TYPE_INTEGER,
2N/A 0, 0, 0, B_FALSE, NULL },
2N/A
2N/A /* WINS configuration */
2N/A { SMB_CI_WINS_SRV1, "wins_server_1", SCF_TYPE_ASTRING,
2N/A 0, 0, 0, B_TRUE, smb_config_chk_hostname },
2N/A { SMB_CI_WINS_SRV2, "wins_server_2", SCF_TYPE_ASTRING,
2N/A 0, 0, 0, B_TRUE, smb_config_chk_hostname },
2N/A { SMB_CI_WINS_EXCL, "wins_exclude", SCF_TYPE_ASTRING,
2N/A 0, 0, 0, B_TRUE, smb_config_chk_interface },
2N/A
2N/A /* Kmod specific configuration */
2N/A { SMB_CI_MAX_WORKERS, "max_workers", SCF_TYPE_INTEGER,
2N/A SMB_PI_MAX_WORKERS_MIN, SMB_PI_MAX_WORKERS_MAX,
2N/A 0, B_TRUE, smb_config_chk_range },
2N/A { SMB_CI_MAX_CONNECTIONS, "max_connections", SCF_TYPE_INTEGER,
2N/A 0, SMB_PI_MAX_CONNECTIONS_MAX, 0, B_TRUE,
2N/A smb_config_chk_range },
2N/A { SMB_CI_KEEPALIVE, "keep_alive", SCF_TYPE_INTEGER,
2N/A SMB_PI_MIN_KEEPALIVE, SMB_PI_MAX_KEEPALIVE, 0, B_TRUE,
2N/A smb_config_chk_range },
2N/A { SMB_CI_RESTRICT_ANON, "restrict_anonymous", SCF_TYPE_BOOLEAN,
2N/A 0, 0, 0, B_TRUE, smb_config_chk_boolean },
2N/A { SMB_CI_ENFORCE_VCZERO, "enforce_vczero", SCF_TYPE_BOOLEAN,
2N/A 0, 0, 0, B_TRUE, smb_config_chk_boolean },
2N/A
2N/A {SMB_CI_CLNT_SIGNING_REQD, "client_signing_required", SCF_TYPE_BOOLEAN,
2N/A 0, 0, 0, B_TRUE, smb_config_chk_boolean },
2N/A {SMB_CI_SVR_SIGNING_ENABLE, "server_signing_enabled", SCF_TYPE_BOOLEAN,
2N/A 0, 0, 0, B_TRUE, smb_config_chk_boolean },
2N/A {SMB_CI_SVR_SIGNING_REQD, "server_signing_required", SCF_TYPE_BOOLEAN,
2N/A 0, 0, 0, B_TRUE, smb_config_chk_boolean },
2N/A
2N/A /* Kmod tuning configuration */
2N/A { SMB_CI_SYNC_ENABLE, "sync_enable", SCF_TYPE_BOOLEAN,
2N/A 0, 0, 0, B_FALSE, smb_config_chk_boolean },
2N/A
2N/A /* SMBd configuration */
2N/A { SMB_CI_SECURITY, "security", SCF_TYPE_ASTRING,
2N/A 0, 0, 0, B_FALSE, NULL },
2N/A { SMB_CI_NBSCOPE, "netbios_scope", SCF_TYPE_ASTRING,
2N/A 0, MAX_VALUE_BUFLEN, 0, B_FALSE, NULL },
2N/A { SMB_CI_SYS_CMNT, "system_comment", SCF_TYPE_ASTRING,
2N/A 0, MAX_VALUE_BUFLEN, 0, B_TRUE, NULL },
2N/A { SMB_CI_CLNT_LM_LEVEL, "client_lmauth_level", SCF_TYPE_INTEGER,
2N/A 1, 5, 0, B_FALSE, smb_config_chk_range },
2N/A { SMB_CI_SVR_LM_LEVEL, "server_lmauth_level", SCF_TYPE_INTEGER,
2N/A 2, 5, 0, B_FALSE, smb_config_chk_range },
2N/A { SMB_CI_CLNT_EXTSEC, "client_extsec", SCF_TYPE_BOOLEAN,
2N/A 0, 0, 0, B_FALSE, smb_config_chk_boolean },
2N/A { SMB_CI_SVR_EXTSEC, "server_extsec", SCF_TYPE_BOOLEAN,
2N/A 0, 0, 0, B_FALSE, smb_config_chk_boolean },
2N/A { SMB_CI_CLNT_REV, "client_rev", SCF_TYPE_ASTRING,
2N/A 0, 0, 0, B_FALSE, NULL },
2N/A { SMB_CI_SVR_REV, "server_rev", SCF_TYPE_ASTRING,
2N/A 0, 0, 0, B_FALSE, NULL },
2N/A { SMB_CI_DISCOVERY_INTERVAL, "discovery_interval", SCF_TYPE_COUNT,
2N/A 0, 0, 0, B_FALSE, NULL },
2N/A { SMB_CI_MONITOR_INTERVAL, "monitor_interval", SCF_TYPE_COUNT,
2N/A 0, 0, 0, B_FALSE, NULL },
2N/A { SMB_CI_ENCRYPT_LDAP, "encrypt_ldap", SCF_TYPE_BOOLEAN,
2N/A 0, 0, 0, B_FALSE, smb_config_chk_boolean },
2N/A
2N/A /* ADS Configuration */
2N/A { SMB_CI_ADS_SITE, "ads_site", SCF_TYPE_ASTRING,
2N/A 0, MAX_VALUE_BUFLEN, 0, B_TRUE, NULL },
2N/A
2N/A /* Dynamic DNS */
2N/A { SMB_CI_DYNDNS_ENABLE, "ddns_enable", SCF_TYPE_BOOLEAN,
2N/A 0, 0, 0, B_FALSE, smb_config_chk_boolean },
2N/A
2N/A /*
2N/A * Primary DNS suffix of the local system is used in name resolution
2N/A * and name registration. This should be set only when the primary DNS
2N/A * domain name of the local system doesn't match with the fully
2N/A * qualified name of the AD domain.
2N/A */
2N/A { SMB_CI_DNS_SUFFIX, "dns_suffix", SCF_TYPE_ASTRING,
2N/A 0, MAXHOSTNAMELEN, 0, B_FALSE, smb_config_chk_string },
2N/A
2N/A { SMB_CI_MACHINE_PASSWD, "machine_passwd", SCF_TYPE_ASTRING,
2N/A 0, MAX_VALUE_BUFLEN, SMB_CF_PROTECTED, B_FALSE, NULL },
2N/A { SMB_CI_KPASSWD_SRV, "kpasswd_server", SCF_TYPE_ASTRING,
2N/A 0, MAX_VALUE_BUFLEN, 0, B_FALSE, NULL },
2N/A { SMB_CI_KPASSWD_DOMAIN, "kpasswd_domain", SCF_TYPE_ASTRING,
2N/A 0, MAX_VALUE_BUFLEN, 0, B_FALSE, NULL },
2N/A { SMB_CI_KPASSWD_SEQNUM, "kpasswd_seqnum", SCF_TYPE_INTEGER,
2N/A 0, 0, 0, B_FALSE, NULL },
2N/A { SMB_CI_NETLOGON_SEQNUM, "netlogon_seqnum", SCF_TYPE_INTEGER,
2N/A 0, 0, 0, B_FALSE, NULL },
2N/A { SMB_CI_IPV6_ENABLE, "ipv6_enable", SCF_TYPE_BOOLEAN,
2N/A 0, 0, 0, B_TRUE, smb_config_chk_boolean },
2N/A { SMB_CI_PRINT_ENABLE, "print_enable", SCF_TYPE_BOOLEAN,
2N/A 0, 0, 0, B_TRUE, smb_config_chk_boolean },
2N/A { SMB_CI_MAP, "map", SCF_TYPE_ASTRING,
2N/A 0, 0, SMB_CF_EXEC, B_TRUE, smb_config_chk_cmd },
2N/A { SMB_CI_UNMAP, "unmap", SCF_TYPE_ASTRING,
2N/A 0, MAX_VALUE_BUFLEN, SMB_CF_EXEC, B_TRUE, smb_config_chk_cmd },
2N/A { SMB_CI_DISPOSITION, "disposition", SCF_TYPE_ASTRING,
2N/A 0, 0, SMB_CF_EXEC, B_TRUE, smb_config_chk_disposition },
2N/A
2N/A { SMB_CI_DFS_STDROOT_NUM, "dfs_stdroot_num", SCF_TYPE_INTEGER,
2N/A 0, 0, 0, B_FALSE, NULL },
2N/A { SMB_CI_MACHINE_GUID, "machine_guid", SCF_TYPE_ASTRING,
2N/A 0, UUID_PRINTABLE_STRING_LENGTH, 0, B_FALSE,
2N/A smb_config_chk_string },
2N/A { SMB_CI_NBNS_BCAST_MAX, "nbns_bcast_max", SCF_TYPE_INTEGER,
2N/A 0, 0, 0, B_FALSE, NULL },
2N/A
2N/A /* obsolete */
2N/A { SMB_CI_DOMAIN_NAME, "domain_name", SCF_TYPE_ASTRING,
2N/A 0, MAXHOSTNAMELEN, 0, B_FALSE, smb_config_chk_string },
2N/A { SMB_CI_DOMAIN_FQDN, "fqdn", SCF_TYPE_ASTRING,
2N/A 0, MAXHOSTNAMELEN, 0, B_FALSE, smb_config_chk_string },
2N/A { SMB_CI_SIGNING_ENABLE, "signing_enabled", SCF_TYPE_BOOLEAN,
2N/A 0, 0, 0, B_TRUE, smb_config_chk_boolean },
2N/A { SMB_CI_SIGNING_REQD, "signing_required", SCF_TYPE_BOOLEAN,
2N/A 0, 0, 0, B_TRUE, smb_config_chk_boolean },
2N/A { SMB_CI_LM_LEVEL, "lmauth_level", SCF_TYPE_INTEGER,
2N/A 2, 5, 0, B_FALSE, smb_config_chk_range }
2N/A
2N/A /* SMB_CI_MAX */
2N/A};
2N/A
2N/Astatic struct {
2N/A smb_cfg_id_t id;
2N/A const char *attr;
2N/A} smb_cfg_dsattr[] = {
2N/A { SMB_CI_DC_LEVEL, DS_ATTR_DCLEVEL },
2N/A { SMB_CI_DOMAIN_LEVEL, DS_ATTR_DOMAINLEVEL },
2N/A { SMB_CI_FOREST_LEVEL, DS_ATTR_FORESTLEVEL }
2N/A};
2N/A
2N/A#define SMB_CFG_DSATTRNUM (sizeof (smb_cfg_dsattr)/sizeof (smb_cfg_dsattr[0]))
2N/A
2N/Astatic smb_cfg_param_t *smb_config_getent(smb_cfg_id_t);
2N/A
2N/Astatic boolean_t smb_is_base64(unsigned char c);
2N/Astatic char *smb_base64_encode(char *str_to_encode);
2N/Astatic char *smb_base64_decode(char *encoded_str);
2N/A
2N/Achar *
2N/Asmb_config_getname(smb_cfg_id_t id)
2N/A{
2N/A smb_cfg_param_t *cfg;
2N/A cfg = smb_config_getent(id);
2N/A return (cfg->sc_name);
2N/A}
2N/A
2N/Astatic boolean_t
2N/Asmb_is_base64(unsigned char c)
2N/A{
2N/A return (isalnum(c) || (c == '+') || (c == '/'));
2N/A}
2N/A
2N/A/*
2N/A * smb_base64_encode
2N/A *
2N/A * Encode a string using base64 algorithm.
2N/A * Caller should free the returned buffer when done.
2N/A */
2N/Astatic char *
2N/Asmb_base64_encode(char *str_to_encode)
2N/A{
2N/A int ret_cnt = 0;
2N/A int i = 0, j = 0;
2N/A char arr_3[3], arr_4[4];
2N/A int len = strlen(str_to_encode);
2N/A char *ret = malloc(SMB_ENC_LEN);
2N/A
2N/A if (ret == NULL) {
2N/A return (NULL);
2N/A }
2N/A
2N/A while (len--) {
2N/A arr_3[i++] = *(str_to_encode++);
2N/A if (i == 3) {
2N/A arr_4[0] = (arr_3[0] & 0xfc) >> 2;
2N/A arr_4[1] = ((arr_3[0] & 0x03) << 4) +
2N/A ((arr_3[1] & 0xf0) >> 4);
2N/A arr_4[2] = ((arr_3[1] & 0x0f) << 2) +
2N/A ((arr_3[2] & 0xc0) >> 6);
2N/A arr_4[3] = arr_3[2] & 0x3f;
2N/A
2N/A for (i = 0; i < 4; i++)
2N/A ret[ret_cnt++] = b64_data[arr_4[i]];
2N/A i = 0;
2N/A }
2N/A }
2N/A
2N/A if (i) {
2N/A for (j = i; j < 3; j++)
2N/A arr_3[j] = '\0';
2N/A
2N/A arr_4[0] = (arr_3[0] & 0xfc) >> 2;
2N/A arr_4[1] = ((arr_3[0] & 0x03) << 4) +
2N/A ((arr_3[1] & 0xf0) >> 4);
2N/A arr_4[2] = ((arr_3[1] & 0x0f) << 2) +
2N/A ((arr_3[2] & 0xc0) >> 6);
2N/A arr_4[3] = arr_3[2] & 0x3f;
2N/A
2N/A for (j = 0; j < (i + 1); j++)
2N/A ret[ret_cnt++] = b64_data[arr_4[j]];
2N/A
2N/A while (i++ < 3)
2N/A ret[ret_cnt++] = '=';
2N/A }
2N/A
2N/A ret[ret_cnt++] = '\0';
2N/A return (ret);
2N/A}
2N/A
2N/A/*
2N/A * smb_base64_decode
2N/A *
2N/A * Decode using base64 algorithm.
2N/A * Caller should free the returned buffer when done.
2N/A */
2N/Astatic char *
2N/Asmb_base64_decode(char *encoded_str)
2N/A{
2N/A int len = strlen(encoded_str);
2N/A int i = 0, j = 0;
2N/A int en_ind = 0;
2N/A char arr_4[4], arr_3[3];
2N/A int ret_cnt = 0;
2N/A char *ret;
2N/A char *p;
2N/A
2N/A if ((ret = calloc(1, SMB_DEC_LEN)) == NULL)
2N/A return (NULL);
2N/A
2N/A while (len-- && (encoded_str[en_ind] != '=') &&
2N/A smb_is_base64(encoded_str[en_ind])) {
2N/A arr_4[i++] = encoded_str[en_ind];
2N/A en_ind++;
2N/A if (i == 4) {
2N/A for (i = 0; i < 4; i++) {
2N/A if ((p = strchr(b64_data, arr_4[i])) == NULL) {
2N/A free(ret);
2N/A return (NULL);
2N/A }
2N/A
2N/A arr_4[i] = (int)(p - b64_data);
2N/A }
2N/A
2N/A arr_3[0] = (arr_4[0] << 2) +
2N/A ((arr_4[1] & 0x30) >> 4);
2N/A arr_3[1] = ((arr_4[1] & 0xf) << 4) +
2N/A ((arr_4[2] & 0x3c) >> 2);
2N/A arr_3[2] = ((arr_4[2] & 0x3) << 6) +
2N/A arr_4[3];
2N/A
2N/A for (i = 0; i < 3; i++)
2N/A ret[ret_cnt++] = arr_3[i];
2N/A
2N/A i = 0;
2N/A }
2N/A }
2N/A
2N/A if (i) {
2N/A for (j = i; j < 4; j++)
2N/A arr_4[j] = 0;
2N/A
2N/A for (j = 0; j < 4; j++) {
2N/A if ((p = strchr(b64_data, arr_4[j])) == NULL) {
2N/A free(ret);
2N/A return (NULL);
2N/A }
2N/A
2N/A arr_4[j] = (int)(p - b64_data);
2N/A }
2N/A arr_3[0] = (arr_4[0] << 2) +
2N/A ((arr_4[1] & 0x30) >> 4);
2N/A arr_3[1] = ((arr_4[1] & 0xf) << 4) +
2N/A ((arr_4[2] & 0x3c) >> 2);
2N/A arr_3[2] = ((arr_4[2] & 0x3) << 6) +
2N/A arr_4[3];
2N/A for (j = 0; j < (i - 1); j++)
2N/A ret[ret_cnt++] = arr_3[j];
2N/A }
2N/A
2N/A ret[ret_cnt++] = '\0';
2N/A return (ret);
2N/A}
2N/A
2N/Astatic char *
2N/Asmb_config_getenv_generic(char *name, char *svc_fmri_prefix, char *svc_propgrp)
2N/A{
2N/A smb_scfhandle_t *handle;
2N/A char *value;
2N/A
2N/A if ((value = malloc(MAX_VALUE_BUFLEN * sizeof (char))) == NULL)
2N/A return (NULL);
2N/A
2N/A handle = smb_smf_scf_init(svc_fmri_prefix);
2N/A if (handle == NULL) {
2N/A free(value);
2N/A return (NULL);
2N/A }
2N/A
2N/A (void) smb_smf_create_service_pgroup(handle, svc_propgrp);
2N/A
2N/A if (smb_smf_get_string_property(handle, name, value,
2N/A sizeof (char) * MAX_VALUE_BUFLEN) != 0) {
2N/A smb_smf_scf_fini(handle);
2N/A free(value);
2N/A return (NULL);
2N/A }
2N/A
2N/A smb_smf_scf_fini(handle);
2N/A return (value);
2N/A
2N/A}
2N/A
2N/Astatic int
2N/Asmb_config_setenv_generic(char *svc_fmri_prefix, char *svc_propgrp,
2N/A char *name, char *value)
2N/A{
2N/A smb_scfhandle_t *handle = NULL;
2N/A int rc = 0;
2N/A
2N/A
2N/A handle = smb_smf_scf_init(svc_fmri_prefix);
2N/A if (handle == NULL) {
2N/A return (1);
2N/A }
2N/A
2N/A (void) smb_smf_create_service_pgroup(handle, svc_propgrp);
2N/A
2N/A if (smb_smf_start_transaction(handle) != SMBD_SMF_OK) {
2N/A smb_smf_scf_fini(handle);
2N/A return (1);
2N/A }
2N/A
2N/A if (smb_smf_set_string_property(handle, name, value) != SMBD_SMF_OK)
2N/A rc = 1;
2N/A
2N/A if (smb_smf_end_transaction(handle) != SMBD_SMF_OK)
2N/A rc = 1;
2N/A
2N/A smb_smf_scf_fini(handle);
2N/A return (rc);
2N/A}
2N/A
2N/A/*
2N/A * smb_config_getstr
2N/A *
2N/A * Fetch the specified string configuration item from SMF
2N/A */
2N/Aint
2N/Asmb_config_getstr(smb_cfg_id_t id, char *cbuf, int bufsz)
2N/A{
2N/A smb_scfhandle_t *handle;
2N/A smb_cfg_param_t *cfg;
2N/A int rc = SMBD_SMF_OK;
2N/A char *pg;
2N/A char protbuf[SMB_ENC_LEN];
2N/A char *tmp;
2N/A
2N/A *cbuf = '\0';
2N/A cfg = smb_config_getent(id);
2N/A assert(cfg->sc_type == SCF_TYPE_ASTRING);
2N/A
2N/A if (cfg->sc_flags & SMB_CF_PROTECTED) {
2N/A handle = smb_smf_scf_init(SMBD_FMRI_PREFIX);
2N/A if (handle == NULL)
2N/A return (SMBD_SMF_SYSTEM_ERR);
2N/A
2N/A if ((rc = smb_smf_create_service_pgroup(handle,
2N/A SMBD_PROTECTED_PG_NAME)) != SMBD_SMF_OK)
2N/A goto error;
2N/A
2N/A if ((rc = smb_smf_get_string_property(handle, cfg->sc_name,
2N/A protbuf, sizeof (protbuf))) != SMBD_SMF_OK)
2N/A goto error;
2N/A
2N/A if (*protbuf != '\0') {
2N/A tmp = smb_base64_decode(protbuf);
2N/A (void) strlcpy(cbuf, tmp, bufsz);
2N/A free(tmp);
2N/A }
2N/A } else {
2N/A handle = smb_smf_scf_init(SMB_FMRI_PREFIX);
2N/A if (handle == NULL)
2N/A return (SMBD_SMF_SYSTEM_ERR);
2N/A
2N/A pg = (cfg->sc_flags & SMB_CF_EXEC) ? SMBD_EXEC_PG_NAME :
2N/A SMB_PG_NAME;
2N/A rc = smb_smf_create_service_pgroup(handle, pg);
2N/A if (rc == SMBD_SMF_OK)
2N/A rc = smb_smf_get_string_property(handle, cfg->sc_name,
2N/A cbuf, bufsz);
2N/A }
2N/A
2N/Aerror:
2N/A smb_smf_scf_fini(handle);
2N/A return (rc);
2N/A}
2N/A
2N/A/*
2N/A * Translate the value of an astring SMF property into a binary
2N/A * IP address. If the value is neither a valid IPv4 nor IPv6
2N/A * address, attempt to look it up as a hostname using the
2N/A * configured address type.
2N/A */
2N/Aint
2N/Asmb_config_getip(smb_cfg_id_t sc_id, smb_inaddr_t *ipaddr)
2N/A{
2N/A int rc, error;
2N/A int a_family;
2N/A char ipstr[MAXHOSTNAMELEN];
2N/A struct hostent *h;
2N/A smb_cfg_param_t *cfg;
2N/A
2N/A if (ipaddr == NULL)
2N/A return (SMBD_SMF_INVALID_ARG);
2N/A
2N/A bzero(ipaddr, sizeof (smb_inaddr_t));
2N/A rc = smb_config_getstr(sc_id, ipstr, sizeof (ipstr));
2N/A if (rc == SMBD_SMF_OK) {
2N/A if (*ipstr == '\0')
2N/A return (SMBD_SMF_INVALID_ARG);
2N/A
2N/A if (inet_pton(AF_INET, ipstr, &ipaddr->a_ipv4) == 1) {
2N/A ipaddr->a_family = AF_INET;
2N/A return (SMBD_SMF_OK);
2N/A }
2N/A
2N/A if (inet_pton(AF_INET6, ipstr, &ipaddr->a_ipv6) == 1) {
2N/A ipaddr->a_family = AF_INET6;
2N/A return (SMBD_SMF_OK);
2N/A }
2N/A
2N/A /*
2N/A * The value is neither an IPv4 nor IPv6 address;
2N/A * so check if it's a hostname.
2N/A */
2N/A a_family = smb_config_getbool(SMB_CI_IPV6_ENABLE) ?
2N/A AF_INET6 : AF_INET;
2N/A h = getipnodebyname(ipstr, a_family, AI_DEFAULT,
2N/A &error);
2N/A if (h != NULL) {
2N/A bcopy(*(h->h_addr_list), &ipaddr->a_ip,
2N/A h->h_length);
2N/A ipaddr->a_family = a_family;
2N/A freehostent(h);
2N/A rc = SMBD_SMF_OK;
2N/A } else {
2N/A cfg = smb_config_getent(sc_id);
2N/A syslog(LOG_ERR, "smbd/%s: %s unable to get %s "
2N/A "address: %d", cfg->sc_name, ipstr,
2N/A a_family == AF_INET ? "IPv4" : "IPv6", error);
2N/A rc = SMBD_SMF_INVALID_ARG;
2N/A }
2N/A }
2N/A
2N/A return (rc);
2N/A}
2N/A
2N/A/*
2N/A * smb_config_getcount
2N/A *
2N/A * Returns the value of a config param of type count (unsigned integer).
2N/A */
2N/Aint
2N/Asmb_config_getcount(smb_cfg_id_t id, uint64_t *count)
2N/A{
2N/A smb_scfhandle_t *handle;
2N/A smb_cfg_param_t *cfg;
2N/A int rc = SMBD_SMF_OK;
2N/A uint64_t val = 0;
2N/A
2N/A *count = 0;
2N/A cfg = smb_config_getent(id);
2N/A assert(cfg->sc_type == SCF_TYPE_COUNT);
2N/A
2N/A handle = smb_smf_scf_init(SMB_FMRI_PREFIX);
2N/A if (handle == NULL)
2N/A return (SMBD_SMF_SYSTEM_ERR);
2N/A
2N/A rc = smb_smf_create_service_pgroup(handle, SMB_PG_NAME);
2N/A if (rc == SMBD_SMF_OK)
2N/A rc = smb_smf_get_count_property(handle, cfg->sc_name, &val);
2N/A smb_smf_scf_fini(handle);
2N/A
2N/A if (rc == SMBD_SMF_OK)
2N/A *count = val;
2N/A
2N/A return (rc);
2N/A}
2N/A
2N/A/*
2N/A * smb_config_getnum
2N/A *
2N/A * Returns the value of a numeric config param.
2N/A */
2N/Aint
2N/Asmb_config_getnum(smb_cfg_id_t id, int64_t *cint)
2N/A{
2N/A smb_scfhandle_t *handle;
2N/A smb_cfg_param_t *cfg;
2N/A int rc = SMBD_SMF_OK;
2N/A int64_t val = 0;
2N/A
2N/A *cint = 0;
2N/A cfg = smb_config_getent(id);
2N/A assert(cfg->sc_type == SCF_TYPE_INTEGER);
2N/A
2N/A handle = smb_smf_scf_init(SMB_FMRI_PREFIX);
2N/A if (handle == NULL)
2N/A return (SMBD_SMF_SYSTEM_ERR);
2N/A
2N/A rc = smb_smf_create_service_pgroup(handle, SMB_PG_NAME);
2N/A if (rc == SMBD_SMF_OK)
2N/A rc = smb_smf_get_integer_property(handle, cfg->sc_name, &val);
2N/A smb_smf_scf_fini(handle);
2N/A
2N/A if (rc == SMBD_SMF_OK)
2N/A *cint = val;
2N/A
2N/A return (rc);
2N/A}
2N/A
2N/A/*
2N/A * smb_config_getbool
2N/A *
2N/A * Returns the value of a boolean config param.
2N/A */
2N/Aboolean_t
2N/Asmb_config_getbool(smb_cfg_id_t id)
2N/A{
2N/A smb_scfhandle_t *handle;
2N/A smb_cfg_param_t *cfg;
2N/A int rc = SMBD_SMF_OK;
2N/A uint8_t vbool;
2N/A
2N/A cfg = smb_config_getent(id);
2N/A assert(cfg->sc_type == SCF_TYPE_BOOLEAN);
2N/A
2N/A handle = smb_smf_scf_init(SMB_FMRI_PREFIX);
2N/A if (handle == NULL)
2N/A return (B_FALSE);
2N/A
2N/A rc = smb_smf_create_service_pgroup(handle, SMB_PG_NAME);
2N/A if (rc == SMBD_SMF_OK)
2N/A rc = smb_smf_get_boolean_property(handle, cfg->sc_name, &vbool);
2N/A smb_smf_scf_fini(handle);
2N/A
2N/A return ((rc == SMBD_SMF_OK) ? (vbool == 1) : B_FALSE);
2N/A}
2N/A
2N/A/*
2N/A * smb_config_get
2N/A *
2N/A * This function returns the value of the requested config
2N/A * item regardless of its type in string format. This should
2N/A * be used when the config item type is not known by the caller.
2N/A */
2N/Aint
2N/Asmb_config_get(smb_cfg_id_t id, char *cbuf, int bufsz)
2N/A{
2N/A smb_cfg_param_t *cfg;
2N/A int64_t cint;
2N/A int rc;
2N/A
2N/A cfg = smb_config_getent(id);
2N/A switch (cfg->sc_type) {
2N/A case SCF_TYPE_ASTRING:
2N/A return (smb_config_getstr(id, cbuf, bufsz));
2N/A
2N/A case SCF_TYPE_INTEGER:
2N/A rc = smb_config_getnum(id, &cint);
2N/A if (rc == SMBD_SMF_OK)
2N/A (void) snprintf(cbuf, bufsz, "%lld", cint);
2N/A return (rc);
2N/A
2N/A case SCF_TYPE_BOOLEAN:
2N/A if (smb_config_getbool(id))
2N/A (void) strlcpy(cbuf, "true", bufsz);
2N/A else
2N/A (void) strlcpy(cbuf, "false", bufsz);
2N/A return (SMBD_SMF_OK);
2N/A }
2N/A
2N/A return (SMBD_SMF_INVALID_ARG);
2N/A}
2N/A
2N/A/*
2N/A * smb_config_setstr
2N/A *
2N/A * Set the specified config param with the given
2N/A * value.
2N/A */
2N/Aint
2N/Asmb_config_setstr(smb_cfg_id_t id, char *value)
2N/A{
2N/A smb_scfhandle_t *handle;
2N/A smb_cfg_param_t *cfg;
2N/A int rc = SMBD_SMF_OK;
2N/A boolean_t protected;
2N/A char *tmp = NULL;
2N/A char *pg;
2N/A
2N/A cfg = smb_config_getent(id);
2N/A assert(cfg->sc_type == SCF_TYPE_ASTRING);
2N/A
2N/A protected = B_FALSE;
2N/A
2N/A switch (cfg->sc_flags) {
2N/A case SMB_CF_PROTECTED:
2N/A handle = smb_smf_scf_init(SMBD_FMRI_PREFIX);
2N/A protected = B_TRUE;
2N/A pg = SMBD_PROTECTED_PG_NAME;
2N/A break;
2N/A case SMB_CF_EXEC:
2N/A handle = smb_smf_scf_init(SMB_FMRI_PREFIX);
2N/A pg = SMBD_EXEC_PG_NAME;
2N/A break;
2N/A default:
2N/A handle = smb_smf_scf_init(SMB_FMRI_PREFIX);
2N/A pg = SMB_PG_NAME;
2N/A break;
2N/A }
2N/A
2N/A if (handle == NULL)
2N/A return (SMBD_SMF_SYSTEM_ERR);
2N/A
2N/A rc = smb_smf_create_service_pgroup(handle, pg);
2N/A if (rc == SMBD_SMF_OK)
2N/A rc = smb_smf_start_transaction(handle);
2N/A
2N/A if (rc != SMBD_SMF_OK) {
2N/A smb_smf_scf_fini(handle);
2N/A return (rc);
2N/A }
2N/A
2N/A if (protected && value && (*value != '\0')) {
2N/A if ((tmp = smb_base64_encode(value)) == NULL) {
2N/A (void) smb_smf_end_transaction(handle);
2N/A smb_smf_scf_fini(handle);
2N/A return (SMBD_SMF_NO_MEMORY);
2N/A }
2N/A
2N/A value = tmp;
2N/A }
2N/A
2N/A rc = smb_smf_set_string_property(handle, cfg->sc_name, value);
2N/A
2N/A free(tmp);
2N/A (void) smb_smf_end_transaction(handle);
2N/A smb_smf_scf_fini(handle);
2N/A return (rc);
2N/A}
2N/A
2N/A/*
2N/A *
2N/A * smb_config_setcount
2N/A *
2N/A * Sets a configuration item of type count (unsigned integer).
2N/A */
2N/Aint
2N/Asmb_config_setcount(smb_cfg_id_t id, uint64_t value)
2N/A{
2N/A smb_scfhandle_t *handle;
2N/A smb_cfg_param_t *cfg;
2N/A int rc = SMBD_SMF_OK;
2N/A
2N/A cfg = smb_config_getent(id);
2N/A assert(cfg->sc_type == SCF_TYPE_COUNT);
2N/A
2N/A handle = smb_smf_scf_init(SMB_FMRI_PREFIX);
2N/A if (handle == NULL)
2N/A return (SMBD_SMF_SYSTEM_ERR);
2N/A
2N/A rc = smb_smf_create_service_pgroup(handle, SMB_PG_NAME);
2N/A if (rc == SMBD_SMF_OK)
2N/A rc = smb_smf_start_transaction(handle);
2N/A
2N/A if (rc != SMBD_SMF_OK) {
2N/A smb_smf_scf_fini(handle);
2N/A return (rc);
2N/A }
2N/A
2N/A rc = smb_smf_set_count_property(handle, cfg->sc_name, value);
2N/A
2N/A (void) smb_smf_end_transaction(handle);
2N/A smb_smf_scf_fini(handle);
2N/A return (rc);
2N/A}
2N/A
2N/A/*
2N/A * smb_config_setnum
2N/A *
2N/A * Sets a numeric configuration item
2N/A */
2N/Aint
2N/Asmb_config_setnum(smb_cfg_id_t id, int64_t value)
2N/A{
2N/A smb_scfhandle_t *handle;
2N/A smb_cfg_param_t *cfg;
2N/A int rc = SMBD_SMF_OK;
2N/A
2N/A cfg = smb_config_getent(id);
2N/A assert(cfg->sc_type == SCF_TYPE_INTEGER);
2N/A
2N/A handle = smb_smf_scf_init(SMB_FMRI_PREFIX);
2N/A if (handle == NULL)
2N/A return (SMBD_SMF_SYSTEM_ERR);
2N/A
2N/A rc = smb_smf_create_service_pgroup(handle, SMB_PG_NAME);
2N/A if (rc == SMBD_SMF_OK)
2N/A rc = smb_smf_start_transaction(handle);
2N/A
2N/A if (rc != SMBD_SMF_OK) {
2N/A smb_smf_scf_fini(handle);
2N/A return (rc);
2N/A }
2N/A
2N/A rc = smb_smf_set_integer_property(handle, cfg->sc_name, value);
2N/A
2N/A (void) smb_smf_end_transaction(handle);
2N/A smb_smf_scf_fini(handle);
2N/A return (rc);
2N/A}
2N/A
2N/A/*
2N/A * smb_config_setbool
2N/A *
2N/A * Sets a boolean configuration item
2N/A */
2N/Aint
2N/Asmb_config_setbool(smb_cfg_id_t id, boolean_t value)
2N/A{
2N/A smb_scfhandle_t *handle;
2N/A smb_cfg_param_t *cfg;
2N/A int rc = SMBD_SMF_OK;
2N/A
2N/A cfg = smb_config_getent(id);
2N/A assert(cfg->sc_type == SCF_TYPE_BOOLEAN);
2N/A
2N/A handle = smb_smf_scf_init(SMB_FMRI_PREFIX);
2N/A if (handle == NULL)
2N/A return (SMBD_SMF_SYSTEM_ERR);
2N/A
2N/A rc = smb_smf_create_service_pgroup(handle, SMB_PG_NAME);
2N/A if (rc == SMBD_SMF_OK)
2N/A rc = smb_smf_start_transaction(handle);
2N/A
2N/A if (rc != SMBD_SMF_OK) {
2N/A smb_smf_scf_fini(handle);
2N/A return (rc);
2N/A }
2N/A
2N/A rc = smb_smf_set_boolean_property(handle, cfg->sc_name, value);
2N/A
2N/A (void) smb_smf_end_transaction(handle);
2N/A smb_smf_scf_fini(handle);
2N/A return (rc);
2N/A}
2N/A
2N/A/*
2N/A * smb_config_set
2N/A *
2N/A * Sets the given value for the specified configuration item.
2N/A * The property is specified by its name and the value is in
2N/A * string format regardless of the property type.
2N/A *
2N/A * The value of property is validated before setting and an
2N/A * error will be returned if it is not valid.
2N/A *
2N/A * If setting the value is successful smb/server maybe refreshed
2N/A * depends on the property settings in smb_cfg_table[] above.
2N/A */
2N/Aint
2N/Asmb_config_set(const char *propname, const char *propval)
2N/A{
2N/A smb_cfg_param_t *cfg = NULL;
2N/A int64_t cint;
2N/A int rc, i;
2N/A
2N/A if ((propname == NULL) || (*propname == '\0'))
2N/A return (SMBD_SMF_INVALID_ARG);
2N/A
2N/A if (propval == NULL)
2N/A return (SMBD_SMF_INVALID_VALUE);
2N/A
2N/A for (i = 0; i < SMB_CI_MAX; i++) {
2N/A if (strcasecmp(propname, smb_cfg_table[i].sc_name) == 0) {
2N/A cfg = &smb_cfg_table[i];
2N/A break;
2N/A }
2N/A }
2N/A
2N/A if (cfg == NULL)
2N/A return (SMBD_SMF_INVALID_ARG);
2N/A
2N/A if ((cfg->sc_chk != NULL) && !cfg->sc_chk(cfg, propval))
2N/A return (SMBD_SMF_INVALID_VALUE);
2N/A
2N/A switch (cfg->sc_type) {
2N/A case SCF_TYPE_ASTRING:
2N/A rc = smb_config_setstr(cfg->sc_id, (char *)propval);
2N/A break;
2N/A
2N/A case SCF_TYPE_INTEGER:
2N/A cint = atoi(propval);
2N/A rc = smb_config_setnum(cfg->sc_id, cint);
2N/A break;
2N/A
2N/A case SCF_TYPE_BOOLEAN:
2N/A rc = smb_config_setbool(cfg->sc_id,
2N/A strcasecmp(propval, "true") == 0);
2N/A break;
2N/A
2N/A default:
2N/A rc = SMBD_SMF_INVALID_ARG;
2N/A break;
2N/A }
2N/A
2N/A if ((rc == SMBD_SMF_OK) && cfg->sc_refresh)
2N/A (void) smf_refresh_instance(SMBD_DEFAULT_INSTANCE_FMRI);
2N/A
2N/A return (rc);
2N/A}
2N/A
2N/A/*
2N/A * smb_config_get_localsid
2N/A *
2N/A * Returns value of the "config/machine_sid" parameter
2N/A * from the IDMAP SMF configuration repository.
2N/A *
2N/A */
2N/Achar *
2N/Asmb_config_get_localsid(void)
2N/A{
2N/A return (smb_config_getenv_generic(MACHINE_SID, IDMAP_FMRI_PREFIX,
2N/A IDMAP_CONFIG_PG));
2N/A}
2N/A
2N/A/*
2N/A * smb_config_set_idmap_domain
2N/A *
2N/A * Set the "config/domain_name" parameter from IDMAP SMF repository.
2N/A */
2N/Aint
2N/Asmb_config_set_idmap_domain(char *value)
2N/A{
2N/A return (smb_config_setenv_generic(IDMAP_FMRI_PREFIX, IDMAP_CONFIG_PG,
2N/A IDMAP_DOMAIN, value));
2N/A}
2N/A
2N/Aint
2N/Asmb_config_secmode_fromstr(char *secmode)
2N/A{
2N/A if (secmode == NULL)
2N/A return (SMB_SECMODE_WORKGRP);
2N/A
2N/A if (strcasecmp(secmode, SMB_SECMODE_DOMAIN_STR) == 0)
2N/A return (SMB_SECMODE_DOMAIN);
2N/A
2N/A return (SMB_SECMODE_WORKGRP);
2N/A}
2N/A
2N/Achar *
2N/Asmb_config_secmode_tostr(int secmode)
2N/A{
2N/A if (secmode == SMB_SECMODE_DOMAIN)
2N/A return (SMB_SECMODE_DOMAIN_STR);
2N/A
2N/A return (SMB_SECMODE_WORKGRP_STR);
2N/A}
2N/A
2N/Aint
2N/Asmb_config_get_secmode()
2N/A{
2N/A char p[16];
2N/A
2N/A (void) smb_config_getstr(SMB_CI_SECURITY, p, sizeof (p));
2N/A return (smb_config_secmode_fromstr(p));
2N/A}
2N/A
2N/Aint
2N/Asmb_config_set_secmode(int secmode)
2N/A{
2N/A char *p;
2N/A
2N/A p = smb_config_secmode_tostr(secmode);
2N/A return (smb_config_setstr(SMB_CI_SECURITY, p));
2N/A}
2N/A
2N/Avoid
2N/Asmb_config_getdomaininfo(char *nb_domain, char *ad_domain, char *sid,
2N/A char *forest, char *guid)
2N/A{
2N/A if (nb_domain)
2N/A (void) smb_config_getstr(SMB_CI_DOMAIN_NB, nb_domain,
2N/A NETBIOS_NAME_SZ);
2N/A
2N/A if (ad_domain)
2N/A (void) smb_config_getstr(SMB_CI_DOMAIN_AD, ad_domain,
2N/A MAXHOSTNAMELEN);
2N/A
2N/A if (sid)
2N/A (void) smb_config_getstr(SMB_CI_DOMAIN_SID, sid,
2N/A SMB_SID_STRSZ);
2N/A
2N/A if (forest)
2N/A (void) smb_config_getstr(SMB_CI_DOMAIN_FOREST, forest,
2N/A MAXHOSTNAMELEN);
2N/A
2N/A if (guid)
2N/A (void) smb_config_getstr(SMB_CI_DOMAIN_GUID, guid,
2N/A UUID_PRINTABLE_STRING_LENGTH);
2N/A}
2N/A
2N/Avoid
2N/Asmb_config_setdomaininfo(char *nb_domain, char *ad_domain, char *sid,
2N/A char *forest, char *guid)
2N/A{
2N/A if (nb_domain)
2N/A (void) smb_config_setstr(SMB_CI_DOMAIN_NB, nb_domain);
2N/A
2N/A if (ad_domain)
2N/A (void) smb_config_setstr(SMB_CI_DOMAIN_AD, ad_domain);
2N/A
2N/A if (sid)
2N/A (void) smb_config_setstr(SMB_CI_DOMAIN_SID, sid);
2N/A if (forest)
2N/A (void) smb_config_setstr(SMB_CI_DOMAIN_FOREST, forest);
2N/A if (guid)
2N/A (void) smb_config_setstr(SMB_CI_DOMAIN_GUID, guid);
2N/A}
2N/A
2N/Aint
2N/Asmb_config_getdc(char *buf, size_t buflen)
2N/A{
2N/A return (smb_config_getstr(SMB_CI_DC_SELECTED, buf, buflen));
2N/A}
2N/A
2N/Aint
2N/Asmb_config_setdc(char *selected_dc)
2N/A{
2N/A return (smb_config_setstr(SMB_CI_DC_SELECTED, selected_dc));
2N/A}
2N/A
2N/Aint
2N/Asmb_config_getdsattr(const char *ds_attr, int64_t *level)
2N/A{
2N/A int i;
2N/A
2N/A for (i = 0; i < SMB_CFG_DSATTRNUM; ++i) {
2N/A if (strcmp(ds_attr, smb_cfg_dsattr[i].attr) == 0)
2N/A return (smb_config_getnum(smb_cfg_dsattr[i].id, level));
2N/A }
2N/A
2N/A return (SMBD_SMF_SYSTEM_ERR);
2N/A}
2N/A
2N/Avoid
2N/Asmb_config_setdsattr(const char *ds_attr, int64_t level)
2N/A{
2N/A int i;
2N/A int rc;
2N/A
2N/A for (i = 0; i < SMB_CFG_DSATTRNUM; ++i) {
2N/A if (strcmp(ds_attr, smb_cfg_dsattr[i].attr) == 0) {
2N/A rc = smb_config_setnum(smb_cfg_dsattr[i].id, level);
2N/A if (rc != 0)
2N/A syslog(LOG_DEBUG, "smb_config_setdsattr %s: %d",
2N/A ds_attr, rc);
2N/A return;
2N/A }
2N/A }
2N/A}
2N/A
2N/A/*
2N/A * The version stored in SMF in string format as N.N where
2N/A * N is a number defined by Microsoft. The first number represents
2N/A * the major version and the second number is the minor version.
2N/A * Current defined values can be found here in 'ver_table'.
2N/A *
2N/A * This function reads the SMF string value and converts it to
2N/A * two numbers returned in the given 'version' structure.
2N/A * Current default version number is 5.0 which is for Windows 2000.
2N/A */
2N/Avoid
2N/Asmb_config_get_version(smb_version_t *version)
2N/A{
2N/A smb_version_t tmpver;
2N/A char verstr[SMB_VERSTR_LEN];
2N/A char *p;
2N/A int rc, i;
2N/A static smb_version_t ver_table [] = {
2N/A { 0, SMB_MAJOR_NT, SMB_MINOR_NT, 1381, 0 },
2N/A { 0, SMB_MAJOR_2000, SMB_MINOR_2000, 2195, 0 },
2N/A { 0, SMB_MAJOR_XP, SMB_MINOR_XP, 2196, 0 },
2N/A { 0, SMB_MAJOR_2003, SMB_MINOR_2003, 2196, 0 },
2N/A { 0, SMB_MAJOR_VISTA, SMB_MINOR_VISTA, 6000, 0 },
2N/A { 0, SMB_MAJOR_2008, SMB_MINOR_2008, 6000, 0 },
2N/A { 0, SMB_MAJOR_2008R2, SMB_MINOR_2008R2, 7007, 0 },
2N/A { 0, SMB_MAJOR_7, SMB_MINOR_7, 7007, 0 }
2N/A };
2N/A
2N/A *version = ver_table[1];
2N/A version->sv_size = sizeof (smb_version_t);
2N/A
2N/A rc = smb_config_getstr(SMB_CI_VERSION, verstr, sizeof (verstr));
2N/A if (rc != SMBD_SMF_OK)
2N/A return;
2N/A
2N/A if ((p = strchr(verstr, '.')) == NULL)
2N/A return;
2N/A
2N/A *p = '\0';
2N/A tmpver.sv_major = (uint8_t)atoi(verstr);
2N/A tmpver.sv_minor = (uint8_t)atoi(p + 1);
2N/A
2N/A for (i = 0; i < sizeof (ver_table)/sizeof (ver_table[0]); ++i) {
2N/A if ((tmpver.sv_major == ver_table[i].sv_major) &&
2N/A (tmpver.sv_minor == ver_table[i].sv_minor)) {
2N/A *version = ver_table[i];
2N/A version->sv_size = sizeof (smb_version_t);
2N/A break;
2N/A }
2N/A }
2N/A}
2N/A
2N/A/*
2N/A * Reads share exec script properties
2N/A */
2N/Auint32_t
2N/Asmb_config_get_execinfo(char *map, char *unmap, size_t bufsz)
2N/A{
2N/A char buf[MAXPATHLEN];
2N/A uint32_t flags = 0;
2N/A
2N/A if (map == NULL) {
2N/A map = buf;
2N/A bufsz = MAXPATHLEN;
2N/A }
2N/A
2N/A *map = '\0';
2N/A (void) smb_config_getstr(SMB_CI_MAP, map, bufsz);
2N/A if (*map != '\0')
2N/A flags |= SMB_EXEC_MAP;
2N/A
2N/A if (unmap == NULL) {
2N/A unmap = buf;
2N/A bufsz = MAXPATHLEN;
2N/A }
2N/A
2N/A *unmap = '\0';
2N/A (void) smb_config_getstr(SMB_CI_UNMAP, unmap, bufsz);
2N/A if (*unmap != '\0')
2N/A flags |= SMB_EXEC_UNMAP;
2N/A
2N/A *buf = '\0';
2N/A (void) smb_config_getstr(SMB_CI_DISPOSITION, buf, sizeof (buf));
2N/A if (*buf != '\0')
2N/A if (strcasecmp(buf, SMB_EXEC_DISP_TERMINATE) == 0)
2N/A flags |= SMB_EXEC_TERM;
2N/A
2N/A return (flags);
2N/A}
2N/A
2N/Aboolean_t
2N/Asmb_config_isexec(smb_cfg_id_t id)
2N/A{
2N/A smb_cfg_param_t *cfg;
2N/A cfg = smb_config_getent(id);
2N/A return ((cfg->sc_flags & SMB_CF_EXEC) == SMB_CF_EXEC);
2N/A}
2N/A
2N/Astatic smb_cfg_param_t *
2N/Asmb_config_getent(smb_cfg_id_t id)
2N/A{
2N/A int i;
2N/A
2N/A for (i = 0; i < SMB_CI_MAX; i++)
2N/A if (smb_cfg_table[i].sc_id == id)
2N/A return (&smb_cfg_table[id]);
2N/A
2N/A assert(0);
2N/A return (NULL);
2N/A}
2N/A
2N/A/*
2N/A * Check the length of the string
2N/A */
2N/Astatic boolean_t
2N/Asmb_config_chk_string(smb_cfg_param_t *cfg, const char *value)
2N/A{
2N/A if (value == NULL)
2N/A return (B_FALSE);
2N/A
2N/A if (strlen(value) > cfg->sc_maxval)
2N/A return (B_FALSE);
2N/A
2N/A return (B_TRUE);
2N/A}
2N/A
2N/A/*
2N/A * Check the numerical range of given value
2N/A */
2N/Astatic boolean_t
2N/Asmb_config_chk_range(smb_cfg_param_t *cfg, const char *value)
2N/A{
2N/A int val;
2N/A
2N/A errno = 0;
2N/A val = strtoul(value, NULL, 0);
2N/A if (errno != 0)
2N/A return (B_FALSE);
2N/A
2N/A return ((val >= cfg->sc_minval) && (val <= cfg->sc_maxval));
2N/A}
2N/A
2N/A/*
2N/A * Check that the specified name is an IP address (v4 or v6) or a hostname.
2N/A * Per RFC 1035 and 1123, names may contain alphanumeric characters, hyphens
2N/A * and dots. The first and last character of a label must be alphanumeric.
2N/A * Interior characters may be alphanumeric or hypens.
2N/A *
2N/A * Domain names should not contain underscores but we allow them because
2N/A * Windows names are often in non-compliance with this rule.
2N/A */
2N/A/*ARGSUSED*/
2N/Astatic boolean_t
2N/Asmb_config_chk_hostname(smb_cfg_param_t *cfg, const char *value)
2N/A{
2N/A char sbytes[INET6_ADDRSTRLEN];
2N/A boolean_t new_label = B_TRUE;
2N/A char *p;
2N/A char label_terminator;
2N/A int len;
2N/A
2N/A if (value == NULL)
2N/A return (B_TRUE);
2N/A
2N/A if ((len = strlen(value)) == 0)
2N/A return (B_TRUE);
2N/A
2N/A if (inet_pton(AF_INET, value, (void *)sbytes) == 1)
2N/A return (B_TRUE);
2N/A
2N/A if (inet_pton(AF_INET6, value, (void *)sbytes) == 1)
2N/A return (B_TRUE);
2N/A
2N/A if (len >= MAXHOSTNAMELEN)
2N/A return (B_FALSE);
2N/A
2N/A if (strspn(value, "0123456789.") == len)
2N/A return (B_FALSE);
2N/A
2N/A label_terminator = *value;
2N/A
2N/A for (p = (char *)value; *p != '\0'; ++p) {
2N/A if (new_label) {
2N/A if (!isalnum(*p))
2N/A return (B_FALSE);
2N/A new_label = B_FALSE;
2N/A label_terminator = *p;
2N/A continue;
2N/A }
2N/A
2N/A if (*p == '.') {
2N/A if (!isalnum(label_terminator))
2N/A return (B_FALSE);
2N/A new_label = B_TRUE;
2N/A label_terminator = *p;
2N/A continue;
2N/A }
2N/A
2N/A label_terminator = *p;
2N/A
2N/A if (isalnum(*p) || *p == '-' || *p == '_')
2N/A continue;
2N/A
2N/A return (B_FALSE);
2N/A }
2N/A
2N/A if (!isalnum(label_terminator))
2N/A return (B_FALSE);
2N/A
2N/A return (B_TRUE);
2N/A}
2N/A
2N/A/*
2N/A * Call back function for dlpi_walk.
2N/A * Returns TRUE if interface name exists on the host.
2N/A */
2N/Astatic boolean_t
2N/Asmb_config_ifcmp(const char *ifname, void *arg)
2N/A{
2N/A smb_hostifs_walker_t *iterp = arg;
2N/A
2N/A iterp->hiw_matchfound = (strcmp(ifname, iterp->hiw_ifname) == 0);
2N/A
2N/A return (iterp->hiw_matchfound);
2N/A}
2N/A
2N/A/*
2N/A * Checks to see if the input interface exists on the host.
2N/A * Returns B_TRUE if the match is found, B_FALSE otherwise.
2N/A */
2N/Astatic boolean_t
2N/Asmb_config_ifexists(const char *ifname)
2N/A{
2N/A smb_hostifs_walker_t iter;
2N/A
2N/A if ((ifname == NULL) || (*ifname == '\0'))
2N/A return (B_FALSE);
2N/A
2N/A iter.hiw_ifname = ifname;
2N/A iter.hiw_matchfound = B_FALSE;
2N/A dlpi_walk(smb_config_ifcmp, &iter, 0);
2N/A
2N/A return (iter.hiw_matchfound);
2N/A}
2N/A
2N/A/*
2N/A * Check valid interfaces. Interface names value can be NULL or empty.
2N/A * Returns B_FALSE if interface cannot be found on the host.
2N/A */
2N/A/*ARGSUSED*/
2N/Astatic boolean_t
2N/Asmb_config_chk_interface(smb_cfg_param_t *cfg, const char *value)
2N/A{
2N/A char buf[16];
2N/A int valid = B_TRUE;
2N/A char *ifname, *tmp, *p;
2N/A
2N/A if (value == NULL || *value == '\0')
2N/A return (valid);
2N/A
2N/A if (strlen(value) > MAX_VALUE_BUFLEN)
2N/A return (B_FALSE);
2N/A
2N/A if ((p = strdup(value)) == NULL)
2N/A return (B_FALSE);
2N/A
2N/A tmp = p;
2N/A while ((ifname = strsep(&tmp, ",")) != NULL) {
2N/A if (*ifname == '\0') {
2N/A valid = B_FALSE;
2N/A break;
2N/A }
2N/A
2N/A if (!smb_config_ifexists(ifname)) {
2N/A if (inet_pton(AF_INET, ifname, (void *)buf) == 0) {
2N/A valid = B_FALSE;
2N/A break;
2N/A }
2N/A }
2N/A }
2N/A
2N/A free(p);
2N/A return (valid);
2N/A}
2N/A
2N/A/*
2N/A * Check true/false
2N/A */
2N/A/*ARGSUSED*/
2N/Astatic boolean_t
2N/Asmb_config_chk_boolean(smb_cfg_param_t *cfg, const char *value)
2N/A{
2N/A if (value == NULL)
2N/A return (B_FALSE);
2N/A
2N/A return ((strcasecmp(value, "true") == 0) ||
2N/A (strcasecmp(value, "false") == 0));
2N/A}
2N/A
2N/A/*
2N/A * Check path
2N/A */
2N/A/*ARGSUSED*/
2N/Astatic boolean_t
2N/Asmb_config_chk_path(smb_cfg_param_t *cfg, const char *path)
2N/A{
2N/A struct stat buffer;
2N/A int fd, status;
2N/A
2N/A if (path == NULL)
2N/A return (B_FALSE);
2N/A
2N/A fd = open(path, O_RDONLY);
2N/A if (fd < 0)
2N/A return (B_FALSE);
2N/A
2N/A status = fstat(fd, &buffer);
2N/A (void) close(fd);
2N/A
2N/A if (status < 0)
2N/A return (B_FALSE);
2N/A
2N/A return ((buffer.st_mode & S_IFDIR) == S_IFDIR);
2N/A}
2N/A
2N/A/*
2N/A * Checks to see if the command args are the supported substitution specifier.
2N/A * i.e. <cmd> %U %S
2N/A */
2N/A/*ARGSUSED*/
2N/Astatic boolean_t
2N/Asmb_config_chk_cmd(smb_cfg_param_t *cfg, const char *value)
2N/A{
2N/A char cmd[MAXPATHLEN];
2N/A char *ptr, *v;
2N/A boolean_t skip_cmdname;
2N/A
2N/A if (*value == '\0')
2N/A return (B_TRUE);
2N/A
2N/A (void) strlcpy(cmd, value, sizeof (cmd));
2N/A
2N/A ptr = cmd;
2N/A skip_cmdname = B_TRUE;
2N/A do {
2N/A if ((v = strsep(&ptr, " ")) == NULL)
2N/A break;
2N/A
2N/A if (*v != '\0') {
2N/A
2N/A if (skip_cmdname) {
2N/A skip_cmdname = B_FALSE;
2N/A continue;
2N/A }
2N/A
2N/A if ((strlen(v) != 2) || *v != '%')
2N/A return (B_FALSE);
2N/A
2N/A if (strpbrk(v, SMB_VALID_SUB_CHRS) == NULL)
2N/A return (B_FALSE);
2N/A }
2N/A
2N/A } while (v != NULL);
2N/A
2N/A /*
2N/A * If skip_cmdname is still true then the string contains
2N/A * only spaces. Don't allow such a string.
2N/A */
2N/A if (skip_cmdname)
2N/A return (B_FALSE);
2N/A
2N/A return (B_TRUE);
2N/A}
2N/A
2N/A/*ARGSUSED*/
2N/Astatic boolean_t
2N/Asmb_config_chk_disposition(smb_cfg_param_t *cfg, const char *value)
2N/A{
2N/A if (value == NULL)
2N/A return (B_FALSE);
2N/A
2N/A if (*value == '\0')
2N/A return (B_TRUE);
2N/A
2N/A return ((strcasecmp(value, SMB_EXEC_DISP_CONTINUE) == 0) ||
2N/A (strcasecmp(value, SMB_EXEC_DISP_TERMINATE) == 0));
2N/A}