]> git.ipfire.org Git - thirdparty/systemd.git/blame - tdb/tdbutil.c
[PATCH] remove compiler warning from udevd.c
[thirdparty/systemd.git] / tdb / tdbutil.c
CommitLineData
5ac4a56b
GKH
1/*
2 Unix SMB/CIFS implementation.
3 tdb utility functions
4 Copyright (C) Andrew Tridgell 1992-1998
5
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 2 of the License, or
9 (at your option) any later version.
10
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
15
16 You should have received a copy of the GNU General Public License
17 along with this program; if not, write to the Free Software
18 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
19*/
20
21#include "includes.h"
22#include <fnmatch.h>
23
24/* these are little tdb utility functions that are meant to make
25 dealing with a tdb database a little less cumbersome in Samba */
26
27static SIG_ATOMIC_T gotalarm;
28
29/***************************************************************
30 Signal function to tell us we timed out.
31****************************************************************/
32
33static void gotalarm_sig(void)
34{
35 gotalarm = 1;
36}
37
38/***************************************************************
39 Make a TDB_DATA and keep the const warning in one place
40****************************************************************/
41
42static TDB_DATA make_tdb_data(const char *dptr, size_t dsize)
43{
44 TDB_DATA ret;
45 ret.dptr = dptr;
46 ret.dsize = dsize;
47 return ret;
48}
49
50/****************************************************************************
51 Lock a chain with timeout (in seconds).
52****************************************************************************/
53
54static int tdb_chainlock_with_timeout_internal( TDB_CONTEXT *tdb, TDB_DATA key, unsigned int timeout, int rw_type)
55{
56 /* Allow tdb_chainlock to be interrupted by an alarm. */
57 int ret;
58 gotalarm = 0;
59 tdb_set_lock_alarm(&gotalarm);
60
61 if (timeout) {
62 CatchSignal(SIGALRM, SIGNAL_CAST gotalarm_sig);
63 alarm(timeout);
64 }
65
66 if (rw_type == F_RDLCK)
67 ret = tdb_chainlock_read(tdb, key);
68 else
69 ret = tdb_chainlock(tdb, key);
70
71 if (timeout) {
72 alarm(0);
73 CatchSignal(SIGALRM, SIGNAL_CAST SIG_IGN);
74 if (gotalarm) {
75 DEBUG(0,("tdb_chainlock_with_timeout_internal: alarm (%u) timed out for key %s in tdb %s\n",
76 timeout, key.dptr, tdb->name ));
77 /* TODO: If we time out waiting for a lock, it might
78 * be nice to use F_GETLK to get the pid of the
79 * process currently holding the lock and print that
80 * as part of the debugging message. -- mbp */
81 return -1;
82 }
83 }
84
85 return ret;
86}
87
88/****************************************************************************
89 Write lock a chain. Return -1 if timeout or lock failed.
90****************************************************************************/
91
92int tdb_chainlock_with_timeout( TDB_CONTEXT *tdb, TDB_DATA key, unsigned int timeout)
93{
94 return tdb_chainlock_with_timeout_internal(tdb, key, timeout, F_WRLCK);
95}
96
97/****************************************************************************
98 Lock a chain by string. Return -1 if timeout or lock failed.
99****************************************************************************/
100
101int tdb_lock_bystring(TDB_CONTEXT *tdb, const char *keyval, unsigned int timeout)
102{
103 TDB_DATA key = make_tdb_data(keyval, strlen(keyval)+1);
104
105 return tdb_chainlock_with_timeout_internal(tdb, key, timeout, F_WRLCK);
106}
107
108/****************************************************************************
109 Unlock a chain by string.
110****************************************************************************/
111
112void tdb_unlock_bystring(TDB_CONTEXT *tdb, const char *keyval)
113{
114 TDB_DATA key = make_tdb_data(keyval, strlen(keyval)+1);
115
116 tdb_chainunlock(tdb, key);
117}
118
119/****************************************************************************
120 Read lock a chain by string. Return -1 if timeout or lock failed.
121****************************************************************************/
122
123int tdb_read_lock_bystring(TDB_CONTEXT *tdb, const char *keyval, unsigned int timeout)
124{
125 TDB_DATA key = make_tdb_data(keyval, strlen(keyval)+1);
126
127 return tdb_chainlock_with_timeout_internal(tdb, key, timeout, F_RDLCK);
128}
129
130/****************************************************************************
131 Read unlock a chain by string.
132****************************************************************************/
133
134void tdb_read_unlock_bystring(TDB_CONTEXT *tdb, const char *keyval)
135{
136 TDB_DATA key = make_tdb_data(keyval, strlen(keyval)+1);
137
138 tdb_chainunlock_read(tdb, key);
139}
140
141
142/****************************************************************************
143 Fetch a int32 value by a arbitrary blob key, return -1 if not found.
144 Output is int32 in native byte order.
145****************************************************************************/
146
147int32 tdb_fetch_int32_byblob(TDB_CONTEXT *tdb, const char *keyval, size_t len)
148{
149 TDB_DATA key = make_tdb_data(keyval, len);
150 TDB_DATA data;
151 int32 ret;
152
153 data = tdb_fetch(tdb, key);
154 if (!data.dptr || data.dsize != sizeof(int32)) {
155 SAFE_FREE(data.dptr);
156 return -1;
157 }
158
159 ret = IVAL(data.dptr,0);
160 SAFE_FREE(data.dptr);
161 return ret;
162}
163
164/****************************************************************************
165 Fetch a int32 value by string key, return -1 if not found.
166 Output is int32 in native byte order.
167****************************************************************************/
168
169int32 tdb_fetch_int32(TDB_CONTEXT *tdb, const char *keystr)
170{
171 return tdb_fetch_int32_byblob(tdb, keystr, strlen(keystr) + 1);
172}
173
174/****************************************************************************
175 Store a int32 value by an arbitary blob key, return 0 on success, -1 on failure.
176 Input is int32 in native byte order. Output in tdb is in little-endian.
177****************************************************************************/
178
179int tdb_store_int32_byblob(TDB_CONTEXT *tdb, const char *keystr, size_t len, int32 v)
180{
181 TDB_DATA key = make_tdb_data(keystr, len);
182 TDB_DATA data;
183 int32 v_store;
184
185 SIVAL(&v_store,0,v);
186 data.dptr = (void *)&v_store;
187 data.dsize = sizeof(int32);
188
189 return tdb_store(tdb, key, data, TDB_REPLACE);
190}
191
192/****************************************************************************
193 Store a int32 value by string key, return 0 on success, -1 on failure.
194 Input is int32 in native byte order. Output in tdb is in little-endian.
195****************************************************************************/
196
197int tdb_store_int32(TDB_CONTEXT *tdb, const char *keystr, int32 v)
198{
199 return tdb_store_int32_byblob(tdb, keystr, strlen(keystr) + 1, v);
200}
201
202/****************************************************************************
203 Fetch a uint32 value by a arbitrary blob key, return -1 if not found.
204 Output is uint32 in native byte order.
205****************************************************************************/
206
207BOOL tdb_fetch_uint32_byblob(TDB_CONTEXT *tdb, const char *keyval, size_t len, uint32 *value)
208{
209 TDB_DATA key = make_tdb_data(keyval, len);
210 TDB_DATA data;
211
212 data = tdb_fetch(tdb, key);
213 if (!data.dptr || data.dsize != sizeof(uint32)) {
214 SAFE_FREE(data.dptr);
215 return False;
216 }
217
218 *value = IVAL(data.dptr,0);
219 SAFE_FREE(data.dptr);
220 return True;
221}
222
223/****************************************************************************
224 Fetch a uint32 value by string key, return -1 if not found.
225 Output is uint32 in native byte order.
226****************************************************************************/
227
228BOOL tdb_fetch_uint32(TDB_CONTEXT *tdb, const char *keystr, uint32 *value)
229{
230 return tdb_fetch_uint32_byblob(tdb, keystr, strlen(keystr) + 1, value);
231}
232
233/****************************************************************************
234 Store a uint32 value by an arbitary blob key, return 0 on success, -1 on failure.
235 Input is uint32 in native byte order. Output in tdb is in little-endian.
236****************************************************************************/
237
238BOOL tdb_store_uint32_byblob(TDB_CONTEXT *tdb, const char *keystr, size_t len, uint32 value)
239{
240 TDB_DATA key = make_tdb_data(keystr, len);
241 TDB_DATA data;
242 uint32 v_store;
243 BOOL ret = True;
244
245 SIVAL(&v_store, 0, value);
246 data.dptr = (void *)&v_store;
247 data.dsize = sizeof(uint32);
248
249 if (tdb_store(tdb, key, data, TDB_REPLACE) == -1)
250 ret = False;
251
252 return ret;
253}
254
255/****************************************************************************
256 Store a uint32 value by string key, return 0 on success, -1 on failure.
257 Input is uint32 in native byte order. Output in tdb is in little-endian.
258****************************************************************************/
259
260BOOL tdb_store_uint32(TDB_CONTEXT *tdb, const char *keystr, uint32 value)
261{
262 return tdb_store_uint32_byblob(tdb, keystr, strlen(keystr) + 1, value);
263}
264/****************************************************************************
265 Store a buffer by a null terminated string key. Return 0 on success, -1
266 on failure.
267****************************************************************************/
268
269int tdb_store_bystring(TDB_CONTEXT *tdb, const char *keystr, TDB_DATA data, int flags)
270{
271 TDB_DATA key = make_tdb_data(keystr, strlen(keystr)+1);
272
273 return tdb_store(tdb, key, data, flags);
274}
275
276/****************************************************************************
277 Fetch a buffer using a null terminated string key. Don't forget to call
278 free() on the result dptr.
279****************************************************************************/
280
281TDB_DATA tdb_fetch_bystring(TDB_CONTEXT *tdb, const char *keystr)
282{
283 TDB_DATA key = make_tdb_data(keystr, strlen(keystr)+1);
284
285 return tdb_fetch(tdb, key);
286}
287
288/****************************************************************************
289 Delete an entry using a null terminated string key.
290****************************************************************************/
291
292int tdb_delete_bystring(TDB_CONTEXT *tdb, const char *keystr)
293{
294 TDB_DATA key = make_tdb_data(keystr, strlen(keystr)+1);
295
296 return tdb_delete(tdb, key);
297}
298
299/****************************************************************************
300 Atomic integer change. Returns old value. To create, set initial value in *oldval.
301****************************************************************************/
302
303int32 tdb_change_int32_atomic(TDB_CONTEXT *tdb, const char *keystr, int32 *oldval, int32 change_val)
304{
305 int32 val;
306 int32 ret = -1;
307
308 if (tdb_lock_bystring(tdb, keystr,0) == -1)
309 return -1;
310
311 if ((val = tdb_fetch_int32(tdb, keystr)) == -1) {
312 /* The lookup failed */
313 if (tdb_error(tdb) != TDB_ERR_NOEXIST) {
314 /* but not because it didn't exist */
315 goto err_out;
316 }
317
318 /* Start with 'old' value */
319 val = *oldval;
320
321 } else {
322 /* It worked, set return value (oldval) to tdb data */
323 *oldval = val;
324 }
325
326 /* Increment value for storage and return next time */
327 val += change_val;
328
329 if (tdb_store_int32(tdb, keystr, val) == -1)
330 goto err_out;
331
332 ret = 0;
333
334 err_out:
335
336 tdb_unlock_bystring(tdb, keystr);
337 return ret;
338}
339
340/****************************************************************************
341 Atomic unsigned integer change. Returns old value. To create, set initial value in *oldval.
342****************************************************************************/
343
344BOOL tdb_change_uint32_atomic(TDB_CONTEXT *tdb, const char *keystr, uint32 *oldval, uint32 change_val)
345{
346 uint32 val;
347 BOOL ret = False;
348
349 if (tdb_lock_bystring(tdb, keystr,0) == -1)
350 return False;
351
352 if (!tdb_fetch_uint32(tdb, keystr, &val)) {
353 /* It failed */
354 if (tdb_error(tdb) != TDB_ERR_NOEXIST) {
355 /* and not because it didn't exist */
356 goto err_out;
357 }
358
359 /* Start with 'old' value */
360 val = *oldval;
361
362 } else {
363 /* it worked, set return value (oldval) to tdb data */
364 *oldval = val;
365
366 }
367
368 /* get a new value to store */
369 val += change_val;
370
371 if (!tdb_store_uint32(tdb, keystr, val))
372 goto err_out;
373
374 ret = True;
375
376 err_out:
377
378 tdb_unlock_bystring(tdb, keystr);
379 return ret;
380}
381
382/****************************************************************************
383 Useful pair of routines for packing/unpacking data consisting of
384 integers and strings.
385****************************************************************************/
386
387size_t tdb_pack(char *buf, int bufsize, const char *fmt, ...)
388{
389 va_list ap;
390 uint8 bt;
391 uint16 w;
392 uint32 d;
393 int i;
394 void *p;
395 int len;
396 char *s;
397 char c;
398 char *buf0 = buf;
399 const char *fmt0 = fmt;
400 int bufsize0 = bufsize;
401
402 va_start(ap, fmt);
403
404 while (*fmt) {
405 switch ((c = *fmt++)) {
406 case 'b': /* unsigned 8-bit integer */
407 len = 1;
408 bt = (uint8)va_arg(ap, int);
409 if (bufsize && bufsize >= len)
410 SSVAL(buf, 0, bt);
411 break;
412 case 'w': /* unsigned 16-bit integer */
413 len = 2;
414 w = (uint16)va_arg(ap, int);
415 if (bufsize && bufsize >= len)
416 SSVAL(buf, 0, w);
417 break;
418 case 'd': /* signed 32-bit integer (standard int in most systems) */
419 len = 4;
420 d = va_arg(ap, uint32);
421 if (bufsize && bufsize >= len)
422 SIVAL(buf, 0, d);
423 break;
424 case 'p': /* pointer */
425 len = 4;
426 p = va_arg(ap, void *);
427 d = p?1:0;
428 if (bufsize && bufsize >= len)
429 SIVAL(buf, 0, d);
430 break;
431 case 'P': /* null-terminated string */
432 s = va_arg(ap,char *);
433 w = strlen(s);
434 len = w + 1;
435 if (bufsize && bufsize >= len)
436 memcpy(buf, s, len);
437 break;
438 case 'f': /* null-terminated string */
439 s = va_arg(ap,char *);
440 w = strlen(s);
441 len = w + 1;
442 if (bufsize && bufsize >= len)
443 memcpy(buf, s, len);
444 break;
445 case 'B': /* fixed-length string */
446 i = va_arg(ap, int);
447 s = va_arg(ap, char *);
448 len = 4+i;
449 if (bufsize && bufsize >= len) {
450 SIVAL(buf, 0, i);
451 memcpy(buf+4, s, i);
452 }
453 break;
454 default:
455 DEBUG(0,("Unknown tdb_pack format %c in %s\n",
456 c, fmt));
457 len = 0;
458 break;
459 }
460
461 buf += len;
462 if (bufsize)
463 bufsize -= len;
464 if (bufsize < 0)
465 bufsize = 0;
466 }
467
468 va_end(ap);
469
470 DEBUG(18,("tdb_pack(%s, %d) -> %d\n",
471 fmt0, bufsize0, (int)PTR_DIFF(buf, buf0)));
472
473 return PTR_DIFF(buf, buf0);
474}
475
476/****************************************************************************
477 Useful pair of routines for packing/unpacking data consisting of
478 integers and strings.
479****************************************************************************/
480
481int tdb_unpack(char *buf, int bufsize, const char *fmt, ...)
482{
483 va_list ap;
484 uint8 *bt;
485 uint16 *w;
486 uint32 *d;
487 int len;
488 int *i;
489 void **p;
490 char *s, **b;
491 char c;
492 char *buf0 = buf;
493 const char *fmt0 = fmt;
494 int bufsize0 = bufsize;
495
496 va_start(ap, fmt);
497
498 while (*fmt) {
499 switch ((c=*fmt++)) {
500 case 'b':
501 len = 1;
502 bt = va_arg(ap, uint8 *);
503 if (bufsize < len)
504 goto no_space;
505 *bt = SVAL(buf, 0);
506 break;
507 case 'w':
508 len = 2;
509 w = va_arg(ap, uint16 *);
510 if (bufsize < len)
511 goto no_space;
512 *w = SVAL(buf, 0);
513 break;
514 case 'd':
515 len = 4;
516 d = va_arg(ap, uint32 *);
517 if (bufsize < len)
518 goto no_space;
519 *d = IVAL(buf, 0);
520 break;
521 case 'p':
522 len = 4;
523 p = va_arg(ap, void **);
524 if (bufsize < len)
525 goto no_space;
526 *p = (void *)IVAL(buf, 0);
527 break;
528 case 'P':
529 s = va_arg(ap,char *);
530 len = strlen(buf) + 1;
531 if (bufsize < len || len > sizeof(pstring))
532 goto no_space;
533 memcpy(s, buf, len);
534 break;
535 case 'f':
536 s = va_arg(ap,char *);
537 len = strlen(buf) + 1;
538 if (bufsize < len || len > sizeof(fstring))
539 goto no_space;
540 memcpy(s, buf, len);
541 break;
542 case 'B':
543 i = va_arg(ap, int *);
544 b = va_arg(ap, char **);
545 len = 4;
546 if (bufsize < len)
547 goto no_space;
548 *i = IVAL(buf, 0);
549 if (! *i) {
550 *b = NULL;
551 break;
552 }
553 len += *i;
554 if (bufsize < len)
555 goto no_space;
556 *b = (char *)malloc(*i);
557 if (! *b)
558 goto no_space;
559 memcpy(*b, buf+4, *i);
560 break;
561 default:
562 DEBUG(0,("Unknown tdb_unpack format %c in %s\n",
563 c, fmt));
564
565 len = 0;
566 break;
567 }
568
569 buf += len;
570 bufsize -= len;
571 }
572
573 va_end(ap);
574
575 DEBUG(18,("tdb_unpack(%s, %d) -> %d\n",
576 fmt0, bufsize0, (int)PTR_DIFF(buf, buf0)));
577
578 return PTR_DIFF(buf, buf0);
579
580 no_space:
581 return -1;
582}
583
584
585/**
586 * Pack SID passed by pointer
587 *
588 * @param pack_buf pointer to buffer which is to be filled with packed data
589 * @param bufsize size of packing buffer
590 * @param sid pointer to sid to be packed
591 *
592 * @return length of the packed representation of the whole structure
593 **/
594size_t tdb_sid_pack(char* pack_buf, int bufsize, DOM_SID* sid)
595{
596 int idx;
597 size_t len = 0;
598
599 if (!sid || !pack_buf) return -1;
600
601 len += tdb_pack(pack_buf + len, bufsize - len, "bb", sid->sid_rev_num,
602 sid->num_auths);
603
604 for (idx = 0; idx < 6; idx++) {
605 len += tdb_pack(pack_buf + len, bufsize - len, "b", sid->id_auth[idx]);
606 }
607
608 for (idx = 0; idx < MAXSUBAUTHS; idx++) {
609 len += tdb_pack(pack_buf + len, bufsize - len, "d", sid->sub_auths[idx]);
610 }
611
612 return len;
613}
614
615
616/**
617 * Unpack SID into a pointer
618 *
619 * @param pack_buf pointer to buffer with packed representation
620 * @param bufsize size of the buffer
621 * @param sid pointer to sid structure to be filled with unpacked data
622 *
623 * @return size of structure unpacked from buffer
624 **/
625size_t tdb_sid_unpack(char* pack_buf, int bufsize, DOM_SID* sid)
626{
627 int idx, len = 0;
628
629 if (!sid || !pack_buf) return -1;
630
631 len += tdb_unpack(pack_buf + len, bufsize - len, "bb",
632 &sid->sid_rev_num, &sid->num_auths);
633
634 for (idx = 0; idx < 6; idx++) {
635 len += tdb_unpack(pack_buf + len, bufsize - len, "b", &sid->id_auth[idx]);
636 }
637
638 for (idx = 0; idx < MAXSUBAUTHS; idx++) {
639 len += tdb_unpack(pack_buf + len, bufsize - len, "d", &sid->sub_auths[idx]);
640 }
641
642 return len;
643}
644
645
646/**
647 * Pack TRUSTED_DOM_PASS passed by pointer
648 *
649 * @param pack_buf pointer to buffer which is to be filled with packed data
650 * @param bufsize size of the buffer
651 * @param pass pointer to trusted domain password to be packed
652 *
653 * @return length of the packed representation of the whole structure
654 **/
655size_t tdb_trusted_dom_pass_pack(char* pack_buf, int bufsize, TRUSTED_DOM_PASS* pass)
656{
657 int idx, len = 0;
658
659 if (!pack_buf || !pass) return -1;
660
661 /* packing unicode domain name and password */
662 len += tdb_pack(pack_buf + len, bufsize - len, "d", pass->uni_name_len);
663
664 for (idx = 0; idx < 32; idx++)
665 len += tdb_pack(pack_buf + len, bufsize - len, "w", pass->uni_name[idx]);
666
667 len += tdb_pack(pack_buf + len, bufsize - len, "dPd", pass->pass_len,
668 pass->pass, pass->mod_time);
669
670 /* packing SID structure */
671 len += tdb_sid_pack(pack_buf + len, bufsize - len, &pass->domain_sid);
672
673 return len;
674}
675
676
677/**
678 * Unpack TRUSTED_DOM_PASS passed by pointer
679 *
680 * @param pack_buf pointer to buffer with packed representation
681 * @param bufsize size of the buffer
682 * @param pass pointer to trusted domain password to be filled with unpacked data
683 *
684 * @return size of structure unpacked from buffer
685 **/
686size_t tdb_trusted_dom_pass_unpack(char* pack_buf, int bufsize, TRUSTED_DOM_PASS* pass)
687{
688 int idx, len = 0;
689
690 if (!pack_buf || !pass) return -1;
691
692 /* unpack unicode domain name and plaintext password */
693 len += tdb_unpack(pack_buf, bufsize - len, "d", &pass->uni_name_len);
694
695 for (idx = 0; idx < 32; idx++)
696 len += tdb_unpack(pack_buf + len, bufsize - len, "w", &pass->uni_name[idx]);
697
698 len += tdb_unpack(pack_buf + len, bufsize - len, "dPd", &pass->pass_len, &pass->pass,
699 &pass->mod_time);
700
701 /* unpack domain sid */
702 len += tdb_sid_unpack(pack_buf + len, bufsize - len, &pass->domain_sid);
703
704 return len;
705}
706
707
708/****************************************************************************
709 Log tdb messages via DEBUG().
710****************************************************************************/
711
712static void tdb_log(TDB_CONTEXT *tdb, int level, const char *format, ...)
713{
714 va_list ap;
715 char *ptr = NULL;
716
717 va_start(ap, format);
718 vasprintf(&ptr, format, ap);
719 va_end(ap);
720
721 if (!ptr || !*ptr)
722 return;
723
724 DEBUG(level, ("tdb(%s): %s", tdb->name ? tdb->name : "unnamed", ptr));
725 SAFE_FREE(ptr);
726}
727
728/****************************************************************************
729 Like tdb_open() but also setup a logging function that redirects to
730 the samba DEBUG() system.
731****************************************************************************/
732
733TDB_CONTEXT *tdb_open_log(const char *name, int hash_size, int tdb_flags,
734 int open_flags, mode_t mode)
735{
736 TDB_CONTEXT *tdb;
737
738 if (!lp_use_mmap())
739 tdb_flags |= TDB_NOMMAP;
740
741 tdb = tdb_open_ex(name, hash_size, tdb_flags,
742 open_flags, mode, tdb_log);
743 if (!tdb)
744 return NULL;
745
746 return tdb;
747}
748
749
750/****************************************************************************
751 Allow tdb_delete to be used as a tdb_traversal_fn.
752****************************************************************************/
753
754int tdb_traverse_delete_fn(TDB_CONTEXT *the_tdb, TDB_DATA key, TDB_DATA dbuf,
755 void *state)
756{
757 return tdb_delete(the_tdb, key);
758}
759
760
761
762/**
763 * Search across the whole tdb for keys that match the given pattern
764 * return the result as a list of keys
765 *
766 * @param tdb pointer to opened tdb file context
767 * @param pattern searching pattern used by fnmatch(3) functions
768 *
769 * @return list of keys found by looking up with given pattern
770 **/
771TDB_LIST_NODE *tdb_search_keys(TDB_CONTEXT *tdb, const char* pattern)
772{
773 TDB_DATA key, next;
774 TDB_LIST_NODE *list = NULL;
775 TDB_LIST_NODE *rec = NULL;
776 TDB_LIST_NODE *tmp = NULL;
777
778 for (key = tdb_firstkey(tdb); key.dptr; key = next) {
779 /* duplicate key string to ensure null-termination */
780 char *key_str = (char*) strndup(key.dptr, key.dsize);
781 if (!key_str) {
782 DEBUG(0, ("tdb_search_keys: strndup() failed!\n"));
783 smb_panic("strndup failed!\n");
784 }
785
786 DEBUG(18, ("checking %s for match to pattern %s\n", key_str, pattern));
787
788 next = tdb_nextkey(tdb, key);
789
790 /* do the pattern checking */
791 if (fnmatch(pattern, key_str, 0) == 0) {
792 rec = (TDB_LIST_NODE*) malloc(sizeof(*rec));
793 ZERO_STRUCTP(rec);
794
795 rec->node_key = key;
796
797 DLIST_ADD_END(list, rec, tmp);
798
799 DEBUG(18, ("checking %s matched pattern %s\n", key_str, pattern));
800 } else {
801 free(key.dptr);
802 }
803
804 /* free duplicated key string */
805 free(key_str);
806 }
807
808 return list;
809
810};
811
812
813/**
814 * Free the list returned by tdb_search_keys
815 *
816 * @param node list of results found by tdb_search_keys
817 **/
818void tdb_search_list_free(TDB_LIST_NODE* node)
819{
820 TDB_LIST_NODE *next_node;
821
822 while (node) {
823 next_node = node->next;
824 SAFE_FREE(node->node_key.dptr);
825 SAFE_FREE(node);
826 node = next_node;
827 };
828};
829
830