nis_object.x 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328
  1. /*
  2. * nis_object.x
  3. *
  4. * Copyright (c) 2010, Oracle America, Inc.
  5. *
  6. * Redistribution and use in source and binary forms, with or without
  7. * modification, are permitted provided that the following conditions are
  8. * met:
  9. *
  10. * * Redistributions of source code must retain the above copyright
  11. * notice, this list of conditions and the following disclaimer.
  12. * * Redistributions in binary form must reproduce the above
  13. * copyright notice, this list of conditions and the following
  14. * disclaimer in the documentation and/or other materials
  15. * provided with the distribution.
  16. * * Neither the name of the "Oracle America, Inc." nor the names of its
  17. * contributors may be used to endorse or promote products derived
  18. * from this software without specific prior written permission.
  19. *
  20. * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
  21. * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
  22. * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
  23. * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
  24. * COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
  25. * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  26. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
  27. * GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
  28. * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
  29. * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
  30. * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
  31. * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  32. */
  33. %#pragma ident "@(#)nis_object.x 1.12 97/11/19"
  34. #if RPC_HDR
  35. %
  36. %#ifndef __nis_object_h
  37. %#define __nis_object_h
  38. %
  39. #endif
  40. /*
  41. * This file defines the format for a NIS object in RPC language.
  42. * It is included by the main .x file and the database access protocol
  43. * file. It is common because both of them need to deal with the same
  44. * type of object. Generating the actual code though is a bit messy because
  45. * the nis.x file and the nis_dba.x file will generate xdr routines to
  46. * encode/decode objects when only one set is needed. Such is life when
  47. * one is using rpcgen.
  48. *
  49. * Note, the protocol doesn't specify any limits on such things as
  50. * maximum name length, number of attributes, etc. These are enforced
  51. * by the database backend. When you hit them you will no. Also see
  52. * the db_getlimits() function for fetching the limit values.
  53. *
  54. */
  55. /* Some manifest constants, chosen to maximize flexibility without
  56. * plugging the wire full of data.
  57. */
  58. const NIS_MAXSTRINGLEN = 255;
  59. const NIS_MAXNAMELEN = 1024;
  60. const NIS_MAXATTRNAME = 32;
  61. const NIS_MAXATTRVAL = 2048;
  62. const NIS_MAXCOLUMNS = 64;
  63. const NIS_MAXATTR = 16;
  64. const NIS_MAXPATH = 1024;
  65. const NIS_MAXREPLICAS = 128;
  66. const NIS_MAXLINKS = 16;
  67. const NIS_PK_NONE = 0; /* no public key (unix/sys auth) */
  68. const NIS_PK_DH = 1; /* Public key is Diffie-Hellman type */
  69. const NIS_PK_RSA = 2; /* Public key if RSA type */
  70. const NIS_PK_KERB = 3; /* Use kerberos style authentication */
  71. const NIS_PK_DHEXT = 4; /* Extended Diffie-Hellman for RPC-GSS */
  72. /*
  73. * The fundamental name type of NIS. The name may consist of two parts,
  74. * the first being the fully qualified name, and the second being an
  75. * optional set of attribute/value pairs.
  76. */
  77. struct nis_attr {
  78. string zattr_ndx<>; /* name of the index */
  79. opaque zattr_val<>; /* Value for the attribute. */
  80. };
  81. typedef string nis_name<>; /* The NIS name itself. */
  82. /* NIS object types are defined by the following enumeration. The numbers
  83. * they use are based on the following scheme :
  84. * 0 - 1023 are reserved for Sun,
  85. * 1024 - 2047 are defined to be private to a particular tree.
  86. * 2048 - 4095 are defined to be user defined.
  87. * 4096 - ... are reserved for future use.
  88. *
  89. * EOL Alert - The non-prefixed names are present for backward
  90. * compatability only, and will not exist in future releases. Use
  91. * the NIS_* names for future compatability.
  92. */
  93. enum zotypes {
  94. BOGUS_OBJ = 0, /* Uninitialized object structure */
  95. NO_OBJ = 1, /* NULL object (no data) */
  96. DIRECTORY_OBJ = 2, /* Directory object describing domain */
  97. GROUP_OBJ = 3, /* Group object (a list of names) */
  98. TABLE_OBJ = 4, /* Table object (a database schema) */
  99. ENTRY_OBJ = 5, /* Entry object (a database record) */
  100. LINK_OBJ = 6, /* A name link. */
  101. PRIVATE_OBJ = 7, /* Private object (all opaque data) */
  102. NIS_BOGUS_OBJ = 0, /* Uninitialized object structure */
  103. NIS_NO_OBJ = 1, /* NULL object (no data) */
  104. NIS_DIRECTORY_OBJ = 2, /* Directory object describing domain */
  105. NIS_GROUP_OBJ = 3, /* Group object (a list of names) */
  106. NIS_TABLE_OBJ = 4, /* Table object (a database schema) */
  107. NIS_ENTRY_OBJ = 5, /* Entry object (a database record) */
  108. NIS_LINK_OBJ = 6, /* A name link. */
  109. NIS_PRIVATE_OBJ = 7 /* Private object (all opaque data) */
  110. };
  111. /*
  112. * The types of Name services NIS knows about. They are enumerated
  113. * here. The Binder code will use this type to determine if it has
  114. * a set of library routines that will access the indicated name service.
  115. */
  116. enum nstype {
  117. UNKNOWN = 0,
  118. NIS = 1, /* Nis Plus Service */
  119. SUNYP = 2, /* Old NIS Service */
  120. IVY = 3, /* Nis Plus Plus Service */
  121. DNS = 4, /* Domain Name Service */
  122. X500 = 5, /* ISO/CCCIT X.500 Service */
  123. DNANS = 6, /* Digital DECNet Name Service */
  124. XCHS = 7, /* Xerox ClearingHouse Service */
  125. CDS= 8
  126. };
  127. /*
  128. * DIRECTORY - The name service object. These objects identify other name
  129. * servers that are serving some portion of the name space. Each has a
  130. * type associated with it. The resolver library will note whether or not
  131. * is has the needed routines to access that type of service.
  132. * The oarmask structure defines an access rights mask on a per object
  133. * type basis for the name spaces. The only bits currently used are
  134. * create and destroy. By enabling or disabling these access rights for
  135. * a specific object type for a one of the accessor entities (owner,
  136. * group, world) the administrator can control what types of objects
  137. * may be freely added to the name space and which require the
  138. * administrator's approval.
  139. */
  140. struct oar_mask {
  141. uint32_t oa_rights; /* Access rights mask */
  142. zotypes oa_otype; /* Object type */
  143. };
  144. struct endpoint {
  145. string uaddr<>;
  146. string family<>; /* Transport family (INET, OSI, etc) */
  147. string proto<>; /* Protocol (TCP, UDP, CLNP, etc) */
  148. };
  149. /*
  150. * Note: pkey is a netobj which is limited to 1024 bytes which limits the
  151. * keysize to 8192 bits. This is consider to be a reasonable limit for
  152. * the expected lifetime of this service.
  153. */
  154. struct nis_server {
  155. nis_name name; /* Principal name of the server */
  156. endpoint ep<>; /* Universal addr(s) for server */
  157. uint32_t key_type; /* Public key type */
  158. netobj pkey; /* server's public key */
  159. };
  160. struct directory_obj {
  161. nis_name do_name; /* Name of the directory being served */
  162. nstype do_type; /* one of NIS, DNS, IVY, YP, or X.500 */
  163. nis_server do_servers<>; /* <0> == Primary name server */
  164. uint32_t do_ttl; /* Time To Live (for caches) */
  165. oar_mask do_armask<>; /* Create/Destroy rights by object type */
  166. };
  167. /*
  168. * ENTRY - This is one row of data from an information base.
  169. * The type value is used by the client library to convert the entry to
  170. * it's internal structure representation. The Table name is a back pointer
  171. * to the table where the entry is stored. This allows the client library
  172. * to determine where to send a request if the client wishes to change this
  173. * entry but got to it through a LINK rather than directly.
  174. * If the entry is a "standalone" entry then this field is void.
  175. */
  176. const EN_BINARY = 1; /* Indicates value is binary data */
  177. const EN_CRYPT = 2; /* Indicates the value is encrypted */
  178. const EN_XDR = 4; /* Indicates the value is XDR encoded */
  179. const EN_MODIFIED = 8; /* Indicates entry is modified. */
  180. const EN_ASN1 = 64; /* Means contents use ASN.1 encoding */
  181. struct entry_col {
  182. uint32_t ec_flags; /* Flags for this value */
  183. opaque ec_value<>; /* It's textual value */
  184. };
  185. struct entry_obj {
  186. string en_type<>; /* Type of entry such as "passwd" */
  187. entry_col en_cols<>; /* Value for the entry */
  188. };
  189. /*
  190. * GROUP - The group object contains a list of NIS principal names. Groups
  191. * are used to authorize principals. Each object has a set of access rights
  192. * for members of its group. Principal names in groups are in the form
  193. * name.directory and recursive groups are expressed as @groupname.directory
  194. */
  195. struct group_obj {
  196. uint32_t gr_flags; /* Flags controlling group */
  197. nis_name gr_members<>; /* List of names in group */
  198. };
  199. /*
  200. * LINK - This is the LINK object. It is quite similar to a symbolic link
  201. * in the UNIX filesystem. The attributes in the main object structure are
  202. * relative to the LINK data and not what it points to (like the file system)
  203. * "modify" privleges here indicate the right to modify what the link points
  204. * at and not to modify that actual object pointed to by the link.
  205. */
  206. struct link_obj {
  207. zotypes li_rtype; /* Real type of the object */
  208. nis_attr li_attrs<>; /* Attribute/Values for tables */
  209. nis_name li_name; /* The object's real NIS name */
  210. };
  211. /*
  212. * TABLE - This is the table object. It implements a simple
  213. * data base that applications and use for configuration or
  214. * administration purposes. The role of the table is to group together
  215. * a set of related entries. Tables are the simple database component
  216. * of NIS. Like many databases, tables are logically divided into columns
  217. * and rows. The columns are labeled with indexes and each ENTRY makes
  218. * up a row. Rows may be addressed within the table by selecting one
  219. * or more indexes, and values for those indexes. Each row which has
  220. * a value for the given index that matches the desired value is returned.
  221. * Within the definition of each column there is a flags variable, this
  222. * variable contains flags which determine whether or not the column is
  223. * searchable, contains binary data, and access rights for the entry objects
  224. * column value.
  225. */
  226. const TA_BINARY = 1; /* Means table data is binary */
  227. const TA_CRYPT = 2; /* Means value should be encrypted */
  228. const TA_XDR = 4; /* Means value is XDR encoded */
  229. const TA_SEARCHABLE = 8; /* Means this column is searchable */
  230. const TA_CASE = 16; /* Means this column is Case Sensitive */
  231. const TA_MODIFIED = 32; /* Means this columns attrs are modified*/
  232. const TA_ASN1 = 64; /* Means contents use ASN.1 encoding */
  233. struct table_col {
  234. string tc_name<64>; /* Column Name */
  235. uint32_t tc_flags; /* control flags */
  236. uint32_t tc_rights; /* Access rights mask */
  237. };
  238. struct table_obj {
  239. string ta_type<64>; /* Table type such as "passwd" */
  240. int ta_maxcol; /* Total number of columns */
  241. u_char ta_sep; /* Separator character */
  242. table_col ta_cols<>; /* The number of table indexes */
  243. string ta_path<>; /* A search path for this table */
  244. };
  245. /*
  246. * This union joins together all of the currently known objects.
  247. */
  248. union objdata switch (zotypes zo_type) {
  249. case NIS_DIRECTORY_OBJ :
  250. struct directory_obj di_data;
  251. case NIS_GROUP_OBJ :
  252. struct group_obj gr_data;
  253. case NIS_TABLE_OBJ :
  254. struct table_obj ta_data;
  255. case NIS_ENTRY_OBJ:
  256. struct entry_obj en_data;
  257. case NIS_LINK_OBJ :
  258. struct link_obj li_data;
  259. case NIS_PRIVATE_OBJ :
  260. opaque po_data<>;
  261. case NIS_NO_OBJ :
  262. void;
  263. case NIS_BOGUS_OBJ :
  264. void;
  265. default :
  266. void;
  267. };
  268. /*
  269. * This is the basic NIS object data type. It consists of a generic part
  270. * which all objects contain, and a specialized part which varies depending
  271. * on the type of the object. All of the specialized sections have been
  272. * described above. You might have wondered why they all start with an
  273. * integer size, followed by the useful data. The answer is, when the
  274. * server doesn't recognize the type returned it treats it as opaque data.
  275. * And the definition for opaque data is {int size; char *data;}. In this
  276. * way, servers and utility routines that do not understand a given type
  277. * may still pass it around. One has to be careful in setting
  278. * this variable accurately, it must take into account such things as
  279. * XDR padding of structures etc. The best way to set it is to note one's
  280. * position in the XDR encoding stream, encode the structure, look at the
  281. * new position and calculate the size.
  282. */
  283. struct nis_oid {
  284. uint32_t ctime; /* Time of objects creation */
  285. uint32_t mtime; /* Time of objects modification */
  286. };
  287. struct nis_object {
  288. nis_oid zo_oid; /* object identity verifier. */
  289. nis_name zo_name; /* The NIS name for this object */
  290. nis_name zo_owner; /* NIS name of object owner. */
  291. nis_name zo_group; /* NIS name of access group. */
  292. nis_name zo_domain; /* The administrator for the object */
  293. uint32_t zo_access; /* Access rights (owner, group, world) */
  294. uint32_t zo_ttl; /* Object's time to live in seconds. */
  295. objdata zo_data; /* Data structure for this type */
  296. };
  297. #if RPC_HDR
  298. %
  299. %#endif /* if __nis_object_h */
  300. %
  301. #endif