4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License (the "License").
6 * You may not use this file except in compliance with the License.
8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9 * or http://www.opensolaris.org/os/licensing.
10 * See the License for the specific language governing permissions
11 * and limitations under the License.
13 * When distributing Covered Code, include this CDDL HEADER in each
14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15 * If applicable, add the following below this CDDL HEADER, with the
16 * fields enclosed by brackets "[]" replaced with your own identifying
17 * information: Portions Copyright [yyyy] [name of copyright owner]
22 * Copyright 2009 Sun Microsystems, Inc. All rights reserved.
23 * Use is subject to license terms.
28 #include "ldap_common.h"
30 /* shadow attributes filters */
32 #define _S_USERPASSWORD "userpassword"
33 #define _S_LASTCHANGE "shadowlastchange"
34 #define _S_MIN "shadowmin"
35 #define _S_MAX "shadowmax"
36 #define _S_WARNING "shadowwarning"
37 #define _S_INACTIVE "shadowinactive"
38 #define _S_EXPIRE "shadowexpire"
39 #define _S_FLAG "shadowflag"
41 #define _F_GETSPNAM "(&(objectClass=shadowAccount)(uid=%s))"
42 #define _F_GETSPNAM_SSD "(&(%%s)(uid=%s))"
44 static const char *sp_attrs
[] = {
58 * _nss_ldap_shadow2str is the data marshaling method for the shadow getXbyY
59 * (e.g., getspnam(), getspent()) backend processes. This method is called after
60 * a successful ldap search has been performed. This method will parse the
61 * ldap search values into the file format.
64 * myname:gaBXNJuz4JDmA:6445::::::
69 _nss_ldap_shadow2str(ldap_backend_ptr be
, nss_XbyY_args_t
*argp
)
73 int shadow_update_enabled
;
74 unsigned long len
= 0L;
75 char *tmp
, *buffer
= NULL
;
76 char *pw_passwd
= NULL
;
77 ns_ldap_result_t
*result
= be
->result
;
78 char **uid
, **passwd
, **last
, **smin
, **smax
;
79 char **warning
, **inactive
, **expire
, **flag
;
80 char *last_str
, *min_str
, *max_str
, *warning_str
;
81 char *inactive_str
, *expire_str
, *flag_str
;
84 return (NSS_STR_PARSE_PARSE
);
85 buflen
= argp
->buf
.buflen
;
87 nss_result
= NSS_STR_PARSE_SUCCESS
;
88 (void) memset(argp
->buf
.buffer
, 0, buflen
);
90 uid
= __ns_ldap_getAttr(result
->entry
, _S_UID
);
91 if (uid
== NULL
|| uid
[0] == NULL
|| (strlen(uid
[0]) < 1)) {
92 nss_result
= NSS_STR_PARSE_PARSE
;
95 len
+= strlen(uid
[0]);
97 passwd
= __ns_ldap_getAttr(result
->entry
, _S_USERPASSWORD
);
98 if (passwd
== NULL
|| passwd
[0] == NULL
) {
100 * ACL does not allow userpassword to return or
101 * userpassword is not defined
103 pw_passwd
= NOPWDRTR
;
104 } else if (strcmp(passwd
[0], "") == 0) {
106 * An empty password is not supported
108 nss_result
= NSS_STR_PARSE_PARSE
;
111 if ((tmp
= strstr(passwd
[0], "{crypt}")) != NULL
||
112 (tmp
= strstr(passwd
[0], "{CRYPT}")) != NULL
) {
113 if (tmp
!= passwd
[0])
114 pw_passwd
= NOPWDRTR
;
116 pw_passwd
= tmp
+ strlen("{crypt}");
117 if (strcmp(pw_passwd
,
118 NS_LDAP_NO_UNIX_PASSWORD
) == 0)
122 /* mark password as not retrievable */
123 pw_passwd
= NOPWDRTR
;
126 len
+= strlen(pw_passwd
);
129 * If shadow update is not enabled, ignore the following
130 * password aging related attributes:
131 * -- shadowlastchange
137 * When shadow update is not enabled, the LDAP naming
138 * service does not support the password aging fields
139 * defined in the shadow structure. These fields, sp_lstchg,
140 * sp_min, sp_max, sp_warn, sp_inact, and sp_expire,
141 * will be set to -1 by the front end marshaller.
144 shadow_update_enabled
= __ns_ldap_is_shadow_update_enabled();
145 if (shadow_update_enabled
) {
146 last
= __ns_ldap_getAttr(result
->entry
, _S_LASTCHANGE
);
147 if (last
== NULL
|| last
[0] == NULL
)
148 last_str
= _NO_VALUE
;
151 len
+= strlen(last_str
);
153 smin
= __ns_ldap_getAttr(result
->entry
, _S_MIN
);
154 if (smin
== NULL
|| smin
[0] == NULL
)
158 len
+= strlen(min_str
);
160 smax
= __ns_ldap_getAttr(result
->entry
, _S_MAX
);
161 if (smax
== NULL
|| smax
[0] == NULL
)
165 len
+= strlen(max_str
);
167 warning
= __ns_ldap_getAttr(result
->entry
, _S_WARNING
);
168 if (warning
== NULL
|| warning
[0] == NULL
)
169 warning_str
= _NO_VALUE
;
171 warning_str
= warning
[0];
172 len
+= strlen(warning_str
);
174 inactive
= __ns_ldap_getAttr(result
->entry
, _S_INACTIVE
);
175 if (inactive
== NULL
|| inactive
[0] == NULL
)
176 inactive_str
= _NO_VALUE
;
178 inactive_str
= inactive
[0];
179 len
+= strlen(inactive_str
);
181 expire
= __ns_ldap_getAttr(result
->entry
, _S_EXPIRE
);
182 if (expire
== NULL
|| expire
[0] == NULL
)
183 expire_str
= _NO_VALUE
;
185 expire_str
= expire
[0];
186 len
+= strlen(expire_str
);
189 flag
= __ns_ldap_getAttr(result
->entry
, _S_FLAG
);
190 if (flag
== NULL
|| flag
[0] == NULL
)
191 flag_str
= _NO_VALUE
;
195 /* 9 = 8 ':' + 1 '\0' */
196 len
+= strlen(flag_str
) + 9;
199 nss_result
= NSS_STR_PARSE_ERANGE
;
203 if (argp
->buf
.result
!= NULL
) {
204 be
->buffer
= calloc(1, len
);
205 if (be
->buffer
== NULL
) {
206 nss_result
= NSS_STR_PARSE_PARSE
;
211 buffer
= argp
->buf
.buffer
;
213 if (shadow_update_enabled
) {
214 (void) snprintf(buffer
, len
, "%s:%s:%s:%s:%s:%s:%s:%s:%s",
215 uid
[0], pw_passwd
, last_str
, min_str
, max_str
, warning_str
,
216 inactive_str
, expire_str
, flag_str
);
218 (void) snprintf(buffer
, len
, "%s:%s:::::::%s",
219 uid
[0], pw_passwd
, flag_str
);
222 /* The front end marhsaller doesn't need the trailing null */
223 if (argp
->buf
.result
!= NULL
)
224 be
->buflen
= strlen(be
->buffer
);
227 (void) __ns_ldap_freeResult(&be
->result
);
228 return ((int)nss_result
);
232 * getbynam gets a passwd entry by uid name. This function constructs an ldap
233 * search filter using the name invocation parameter and the getspnam search
234 * filter defined. Once the filter is constructed we search for a matching
235 * entry and marshal the data results into struct shadow for the frontend
236 * process. The function _nss_ldap_shadow2ent performs the data marshaling.
240 getbynam(ldap_backend_ptr be
, void *a
)
242 nss_XbyY_args_t
*argp
= (nss_XbyY_args_t
*)a
;
243 char searchfilter
[SEARCHFILTERLEN
];
244 char userdata
[SEARCHFILTERLEN
];
245 char name
[SEARCHFILTERLEN
+ 1];
248 if (_ldap_filter_name(name
, argp
->key
.name
, sizeof (name
)) != 0)
249 return ((nss_status_t
)NSS_NOTFOUND
);
251 ret
= snprintf(searchfilter
, sizeof (searchfilter
), _F_GETSPNAM
, name
);
252 if (ret
>= sizeof (searchfilter
) || ret
< 0)
253 return ((nss_status_t
)NSS_NOTFOUND
);
255 ret
= snprintf(userdata
, sizeof (userdata
), _F_GETSPNAM_SSD
, name
);
256 if (ret
>= sizeof (userdata
) || ret
< 0)
257 return ((nss_status_t
)NSS_NOTFOUND
);
259 return (_nss_ldap_lookup(be
, argp
, _SHADOW
, searchfilter
, NULL
,
260 _merge_SSD_filter
, userdata
));
263 static ldap_backend_op_t sp_ops
[] = {
273 * _nss_ldap_passwd_constr is where life begins. This function calls the
274 * generic ldap constructor function to define and build the abstract
275 * data types required to support ldap operations.
280 _nss_ldap_shadow_constr(const char *dummy1
, const char *dummy2
,
284 return ((nss_backend_t
*)_nss_ldap_constr(sp_ops
,
285 sizeof (sp_ops
)/sizeof (sp_ops
[0]),
286 _SHADOW
, sp_attrs
, _nss_ldap_shadow2str
));