ns_writes.c revision 2277:e39bb16fd109
1/*
2 * CDDL HEADER START
3 *
4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License (the "License").
6 * You may not use this file except in compliance with the License.
7 *
8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9 * or http://www.opensolaris.org/os/licensing.
10 * See the License for the specific language governing permissions
11 * and limitations under the License.
12 *
13 * When distributing Covered Code, include this CDDL HEADER in each
14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15 * If applicable, add the following below this CDDL HEADER, with the
16 * fields enclosed by brackets "[]" replaced with your own identifying
17 * information: Portions Copyright [yyyy] [name of copyright owner]
18 *
19 * CDDL HEADER END
20 */
21/*
22 * Copyright 2006 Sun Microsystems, Inc.  All rights reserved.
23 * Use is subject to license terms.
24 */
25
26#pragma ident	"%Z%%M%	%I%	%E% SMI"
27
28#include <stdio.h>
29#include <sys/types.h>
30#include <stdlib.h>
31#include <libintl.h>
32
33#include <sys/stat.h>
34#include <fcntl.h>
35#include <unistd.h>
36#include <string.h>
37#include <strings.h>
38#include <lber.h>
39#include <ldap.h>
40#include <syslog.h>
41
42#include "ns_sldap.h"
43#include "ns_internal.h"
44
45/* Additional headers for addTypedEntry Conversion routines */
46#include <pwd.h>
47#include <shadow.h>
48#include <grp.h>
49#include <netinet/in.h>
50#include <arpa/inet.h>
51#include <netdb.h>
52#include <rpc/rpcent.h>
53#include <auth_attr.h>
54#include <exec_attr.h>
55#include <prof_attr.h>
56#include <user_attr.h>
57#include <bsm/libbsm.h>
58#include <sys/tsol/tndb.h>
59#include <tsol/label.h>
60
61
62/*
63 * If the rdn is a mapped attr:
64 * 	return NS_LDAP_SUCCESS and a new_dn.
65 * If no mapped attr is found in the rdn:
66 * 	return NS_LDAP_SUCCESS and *new_dn == NULL
67 * For example:
68 *  service = abc
69 *  dn =  cn=foo,dc=bar,dc=com
70 *  attributeMapping: abc:cn=sn
71 * Then:
72 *  new_dn = sn=foo,dc=bar,dc=com
73 *
74 */
75static int
76replace_mapped_attr_in_dn(
77	const char *service, const char *dn, char **new_dn)
78{
79	char	**mappedattr;
80	char	**dnArray = NULL;
81	char	*rservice;
82	char	*cur = NULL;
83	int	len = 0, orig_len = 0, mapped_len = 0;
84	int	dn_len = 0;
85
86	*new_dn = NULL;
87
88	/*
89	 * seperate dn into individual componets
90	 * e.g.
91	 * "automountKey=user_01" , "automountMapName_test=auto_home", ...
92	 */
93	dnArray = ldap_explode_dn(dn, 0);
94	if (!dnArray || !*dnArray)
95		return (NS_LDAP_INVALID_PARAM);
96
97	cur = strchr(dnArray[0], '=');
98	if (!cur) {
99		__s_api_free2dArray(dnArray);
100		return (NS_LDAP_INVALID_PARAM);
101	}
102	*cur = '\0';
103
104	/* we only check schema mapping for automount, not for auto_* */
105	if (strncasecmp(service, NS_LDAP_TYPE_AUTOMOUNT,
106	    sizeof (NS_LDAP_TYPE_AUTOMOUNT) - 1) == 0)
107		rservice = "automount";
108	else
109		rservice = (char *)service;
110
111	mappedattr = __ns_ldap_getMappedAttributes(rservice, dnArray[0]);
112	if (!mappedattr || !mappedattr[0]) {
113		__s_api_free2dArray(dnArray);
114		if (mappedattr)
115			__s_api_free2dArray(mappedattr);
116		return (NS_LDAP_SUCCESS);
117	}
118	orig_len = strlen(dnArray[0]);
119
120	/*
121	 * The new length is *dn length + (difference between
122	 * orig attr and mapped attr) + 1 ;
123	 * e.g.
124	 * automountKey=aa,automountMapName=auto_home,dc=foo,dc=com
125	 * ==>
126	 * cn=aa,automountMapName=auto_home,dc=foo,dc=com
127	 */
128	mapped_len = strlen(mappedattr[0]);
129	dn_len = strlen(dn);
130	len = dn_len - orig_len + mapped_len + 1;
131	*new_dn = (char *)calloc(1, len);
132	if (*new_dn == NULL) {
133		__s_api_free2dArray(dnArray);
134		__s_api_free2dArray(mappedattr);
135		return (NS_LDAP_MEMORY);
136	}
137
138	(void) snprintf(*new_dn, len, "%s=%s", mappedattr[0], dn + orig_len +1);
139	__s_api_free2dArray(dnArray);
140	__s_api_free2dArray(mappedattr);
141
142	return (NS_LDAP_SUCCESS);
143}
144
145
146/*
147 * The following function is only used by the
148 * "gecos" 1 to N attribute mapping code. It expects
149 * and handle only one data/length pair.
150 */
151static int
152init_bval_mod(
153	LDAPMod *mod,
154	int	mop,
155	char	*mtype,
156	char	*mvptr,
157	int 	mvlen)
158{
159
160	struct berval	**bmodval;
161
162	/* dup attribute name */
163	mod->mod_type = strdup(mtype);
164	if (mod->mod_type == NULL)
165		return (-1);
166
167	/*
168	 * assume single value,
169	 * since only one value/length pair passed in
170	 */
171	bmodval = (struct berval **)calloc(2,
172			sizeof (struct berval *));
173	if (bmodval == NULL) {
174		free(mod->mod_type);
175		mod->mod_type = NULL;
176		return	(-1);
177	}
178	bmodval[0] = (struct berval *)calloc(1,
179			sizeof (struct berval));
180	if (bmodval[0] == NULL) {
181		free(mod->mod_type);
182		mod->mod_type = NULL;
183		free(bmodval);
184		return	(-1);
185	}
186
187	/* set pointer to data */
188	bmodval[0]->bv_val = mvptr;
189
190	/* set length */
191	bmodval[0]->bv_len = mvlen;
192
193	/*
194	 * turn on the BVALUE bit to indicate
195	 * that the length of data is supplied
196	 */
197	mod->mod_op = mop | LDAP_MOD_BVALUES;
198
199	mod->mod_bvalues = bmodval;
200
201	return	(0);
202}
203
204static void
205freeModList(LDAPMod **mods)
206{
207	int i, j;
208	int name_is_oc;
209
210	if (mods == NULL)
211		return;
212
213	for (i = 0; mods[i]; i++) {
214
215		/* free attribute name */
216		name_is_oc = FALSE;
217		if (mods[i]->mod_type) {
218			if (strcasecmp(mods[i]->mod_type,
219				"objectclass") == 0)
220				name_is_oc = TRUE;
221			free(mods[i]->mod_type);
222		}
223
224		if (mods[i]->mod_bvalues == NULL)
225			continue;
226		/*
227		 * LDAP_MOD_BVALUES is only set by
228		 * the "gecos" 1 to N attribute mapping
229		 * code, and the attribute is single valued.
230		 */
231		if (mods[i]->mod_op & LDAP_MOD_BVALUES) {
232			if (mods[i]->mod_bvalues[0])
233				free(mods[i]->mod_bvalues[0]);
234		} else {
235			if (name_is_oc) {
236				/*
237				 * only values for the "objectclass"
238				 * were dupped using strdup.
239				 * other attribute values were
240				 * not dupped, but via pointer
241				 * assignment. So here the
242				 * values for "objectclass"
243				 * is freed one by one,
244				 * but the values for other
245				 * attributes need not be freed.
246				 */
247				for (j = 0; mods[i]->mod_values[j]; j++)
248					free(mods[i]->mod_values[j]);
249			}
250
251		}
252		free(mods[i]->mod_bvalues);
253	}
254
255	/* modlist */
256	free((char *)(mods[0]));
257	free(mods);
258}
259
260static LDAPMod **
261__s_api_makeModListCount(
262	const char *service,
263	const ns_ldap_attr_t * const *attr,
264	const int mod_op,
265	const int count,
266	const int flags)
267{
268	LDAPMod		**mods, *modlist;
269	char		**modval;
270	char		**mapping;
271	int		i;
272	int		j;
273	int		k, rc, vlen;
274	char		*c, *comma1 = NULL, *comma2 = NULL;
275	int		schema_mapping_existed = FALSE;
276	int		auto_service = FALSE;
277
278
279	/*
280	 * add 2 for "gecos" 1 to up to 3 attribute mapping
281	 */
282	mods = (LDAPMod **)calloc((count + 3), sizeof (LDAPMod *));
283	if (mods == NULL) {
284		return (NULL);
285	}
286	/*
287	 * add 2 for "gecos" 1 to up to 3 attribute mapping
288	 */
289	modlist = (LDAPMod *)calloc(count + 2, sizeof (LDAPMod));
290	if (modlist == NULL) {
291		free(mods);
292		return (NULL);
293	}
294
295	if (service != NULL && strncasecmp(service, NS_LDAP_TYPE_AUTOMOUNT,
296	    sizeof (NS_LDAP_TYPE_AUTOMOUNT) - 1) == 0)
297		auto_service = TRUE;
298
299	/*
300	 * see if schema mapping existed for the given service
301	 */
302	mapping = __ns_ldap_getOrigAttribute(service,
303	    NS_HASH_SCHEMA_MAPPING_EXISTED);
304	if (mapping) {
305		schema_mapping_existed = TRUE;
306		__s_api_free2dArray(mapping);
307		mapping = NULL;
308	}
309
310	for (i = 0, k = 0; k < count && attr[k] != NULL; i++, k++) {
311		mods[i] = &modlist[i];
312		mods[i]->mod_op = mod_op;
313		/*
314		 * Perform attribute mapping if necessary.
315		 */
316		if (schema_mapping_existed &&
317			(flags & NS_LDAP_NOMAP) == 0) {
318			mapping = __ns_ldap_getMappedAttributes(service,
319			    attr[k]->attrname);
320		} else
321			mapping = NULL;
322
323		if (mapping == NULL && auto_service &&
324		    (flags & NS_LDAP_NOMAP) == 0) {
325			/*
326			 * if service == auto_xxx and
327			 * no mapped attribute is found
328			 * and NS_LDAP_NOMAP is not set
329			 * then try automount's mapped attribute
330			 */
331			mapping = __ns_ldap_getMappedAttributes("automount",
332			    attr[k]->attrname);
333		}
334
335		if (mapping == NULL) {
336		    mods[i]->mod_type = strdup(attr[k]->attrname);
337		    if (mods[i]->mod_type == NULL) {
338			goto free_memory;
339		    }
340		} else {
341			/*
342			 * 1 to N attribute mapping is only done for "gecos",
343			 * and only 1 to 3 mapping.
344			 * nine cases here:
345			 *
346			 * A. attrMap=passwd:gecos=a
347			 *    1. gecos="xx,yy,zz" -> a="xx,yy,zz"
348			 *    2. gecos="xx,yy" -> a="xx,yy"
349			 *    3. gecos="xx" -> a="xx"
350			 *
351			 * B. attrMap=passwd:gecos=a b
352			 *    4. gecos="xx,yy,zz" -> a="xx" b="yy,zz"
353			 *    5. gecos="xx,yy" -> a="xx" b="yy"
354			 *    6. gecos="xx" -> a="xx"
355			 *
356			 * C. attrMap=passwd:gecos=a b c
357			 *    7. gecos="xx,yy,zz" -> a="xx" b="yy" c="zz"
358			 *    8. gecos="xx,yy" -> a="xx" b="yy"
359			 *    9. gecos="xx" -> a="xx"
360			 *
361			 * This can be grouped as:
362			 *
363			 * c1 cases: 1,2,3,6,9
364			 *    if ((attrMap=passwd:gecos=a) ||
365			 *		(no "," in gecos value))
366			 *	same as other no-mapping attributes,
367			 *	no special processing needed
368			 *    else
369			 *
370			 * c2 cases: 4,5,8
371			 *    if ((attrMap=passwd:gecos=a b) ||
372			 *	(only one "," in gecos value))
373			 *	a=xx b=yy[,...]
374			 *    else
375			 *
376			 * c3 case: 7
377			 *    a=xx b=yy c=...
378			 *
379			 * notes: in case c2 and c3, ... could still contain ","
380			 */
381		    if (strcasecmp(service, "passwd") == 0 &&
382			strcasecmp(attr[k]->attrname, "gecos") == 0 &&
383			mapping[1] && attr[k]->attrvalue[0] &&
384			(comma1 = strchr(attr[k]->attrvalue[0],
385			COMMATOK)) != NULL) {
386
387			/* is there a second comma? */
388			if (*(comma1 + 1) != '\0')
389				comma2 = strchr(comma1 + 1, COMMATOK);
390
391			/*
392			 * Process case c2 or c3.
393			 * case c2: mapped to two attributes or just
394			 * one comma
395			 */
396			if (mapping[2] == NULL ||
397				comma2 == NULL) {
398				/* case c2 */
399
400				/*
401				 * int mod structure for the first attribute
402				 */
403				vlen = comma1 - attr[k]->attrvalue[0];
404				c = attr[k]->attrvalue[0];
405
406				if (vlen > 0 && c) {
407					rc = init_bval_mod(mods[i], mod_op,
408						mapping[0], c, vlen);
409					if (rc != 0)
410						goto free_memory;
411				} else {
412					/* don't leave a hole in mods array */
413					mods[i] = NULL;
414					i--;
415				}
416
417
418				/*
419				 * init mod structure for the 2nd attribute
420				 */
421				if (*(comma1 + 1) == '\0') {
422					__s_api_free2dArray(mapping);
423					mapping = NULL;
424					continue;
425				}
426
427				i++;
428				mods[i] = &modlist[i];
429
430				/*
431				 * get pointer to data.
432				 * Skip leading spaces.
433				 */
434				for (c = comma1 + 1; *c == SPACETOK; c++);
435
436				/* get data length */
437				vlen = strlen(attr[k]->attrvalue[0]) -
438					(c - attr[k]->attrvalue[0]);
439
440				if (vlen > 0 && c) {
441					rc = init_bval_mod(mods[i], mod_op,
442						mapping[1], c, vlen);
443					if (rc != 0)
444						goto free_memory;
445				} else {
446					/* don't leave a hole in mods array */
447					mods[i] = NULL;
448					i--;
449				}
450
451				/* done with the mapping array */
452				__s_api_free2dArray(mapping);
453				mapping = NULL;
454
455				continue;
456			} else {
457				/* case c3 */
458
459				/*
460				 * int mod structure for the first attribute
461				 */
462				vlen = comma1 - attr[k]->attrvalue[0];
463				c = attr[k]->attrvalue[0];
464
465				if (vlen > 0 && c) {
466					rc = init_bval_mod(mods[i], mod_op,
467						mapping[0], c, vlen);
468					if (rc != 0)
469						goto free_memory;
470				} else {
471					/* don't leave a hole in mods array */
472					mods[i] = NULL;
473					i--;
474				}
475
476				/*
477				 * init mod structure for the 2nd attribute
478				 */
479				i++;
480				mods[i] = &modlist[i];
481
482				/*
483				 * get pointer to data.
484				 * Skip leading spaces.
485				 */
486				for (c = comma1 + 1; *c == SPACETOK; c++);
487
488				/* get data length */
489				vlen = comma2 - c;
490
491				if (vlen > 0 && c) {
492					rc = init_bval_mod(mods[i], mod_op,
493						mapping[1], c, vlen);
494					if (rc != 0)
495						goto free_memory;
496				} else {
497					/* don't leave a hole in mods array */
498					mods[i] = NULL;
499					i--;
500				}
501
502				/*
503				 * init mod structure for the 3rd attribute
504				 */
505				if (*(comma2 + 1) == '\0') {
506					__s_api_free2dArray(mapping);
507					mapping = NULL;
508					continue;
509				}
510
511				i++;
512				mods[i] = &modlist[i];
513				/*
514				 * get pointer to data.
515				 * Skip leading spaces.
516				 */
517				for (c = comma2 + 1; *c == SPACETOK; c++);
518
519				/* get data length */
520				vlen = strlen(attr[k]->attrvalue[0]) -
521					(c - attr[k]->attrvalue[0]);
522
523				if (vlen > 0 && c) {
524					rc = init_bval_mod(mods[i], mod_op,
525						mapping[2], c, vlen);
526					if (rc != 0)
527						goto free_memory;
528				} else {
529					/* don't leave a hole in mods array */
530					mods[i] = NULL;
531					i--;
532				}
533
534				/* done with the mapping array */
535				__s_api_free2dArray(mapping);
536				mapping = NULL;
537
538				continue;
539			}
540		    }
541
542		    /* case c1 */
543		    mods[i]->mod_type = strdup(mapping[0]);
544		    if (mods[i]->mod_type == NULL) {
545				goto free_memory;
546		    }
547		    __s_api_free2dArray(mapping);
548		    mapping = NULL;
549		}
550
551		modval = (char **)calloc(attr[k]->value_count+1,
552				sizeof (char *));
553		if (modval == NULL)
554			goto free_memory;
555		/*
556		 * Perform objectclass mapping.
557		 * Note that the values for the "objectclass" attribute
558		 * will be dupped using strdup. Values for other
559		 * attributes will be referenced via pointer
560		 * assignments.
561		 */
562		if (strcasecmp(mods[i]->mod_type, "objectclass") == 0) {
563			for (j = 0; j < attr[k]->value_count; j++) {
564				if (schema_mapping_existed &&
565					(flags & NS_LDAP_NOMAP) == 0)
566					mapping =
567					__ns_ldap_getMappedObjectClass(
568					service, attr[k]->attrvalue[j]);
569				else
570					mapping = NULL;
571
572				if (mapping == NULL && auto_service &&
573					(flags & NS_LDAP_NOMAP) == 0)
574					/*
575					 * if service == auto_xxx and
576					 * no mapped objectclass is found
577					 * then try automount
578					 */
579					mapping =
580					__ns_ldap_getMappedObjectClass(
581					"automount", attr[k]->attrvalue[j]);
582
583				if (mapping && mapping[0]) {
584					/* assume single mapping */
585					modval[j] = strdup(mapping[0]);
586				} else {
587					modval[j] = strdup(attr[k]->
588							attrvalue[j]);
589				}
590				if (modval[j] == NULL)
591					goto free_memory;
592			}
593		} else {
594			for (j = 0; j < attr[k]->value_count; j++) {
595				/* ASSIGN NOT COPY */
596				modval[j] = attr[k]->attrvalue[j];
597			}
598		}
599		mods[i]->mod_values = modval;
600	}
601
602	return (mods);
603
604free_memory:
605	freeModList(mods);
606	if (mapping)
607	__s_api_free2dArray(mapping);
608
609	return (NULL);
610
611}
612
613static LDAPMod **
614__s_api_makeModList(
615	const char *service,
616	const ns_ldap_attr_t * const *attr,
617	const int mod_op,
618	const int flags)
619{
620	ns_ldap_attr_t	**aptr = (ns_ldap_attr_t **)attr;
621	int		count = 0;
622
623	if (aptr == NULL)
624		return (NULL);
625
626	/* count number of attributes */
627	while (*aptr++)
628		count++;
629
630	return (__s_api_makeModListCount(service, attr, mod_op, count, flags));
631}
632
633static void
634__s_cvt_freeEntryRdn(ns_ldap_entry_t **entry, char **rdn)
635{
636	if (*entry != NULL) {
637		__ns_ldap_freeEntry(*entry);
638		*entry = NULL;
639	}
640	if (*rdn != NULL) {
641		free(*rdn);
642		*rdn = NULL;
643	}
644}
645
646/*
647 * This state machine performs one or more LDAP add/delete/modify
648 * operations to configured LDAP servers.
649 */
650static int
651write_state_machine(
652	int 		ldap_op,
653	char 		*dn,
654	LDAPMod		**mods,
655	const ns_cred_t *cred,
656	const int 	flags,
657	ns_ldap_error_t ** errorp)
658{
659	ConnectionID    connectionId = -1;
660	Connection	*conp = NULL;
661	LDAPMessage 	*res;
662	char		*target_dn = NULL;
663	char		errstr[MAXERROR];
664	int		rc = NS_LDAP_SUCCESS;
665	int		return_rc = NS_LDAP_SUCCESS;
666	int		followRef = FALSE;
667	int		target_dn_allocated = FALSE;
668	int		len;
669	int		msgid;
670	int		Errno;
671	int		always = 1;
672	char		*err, *errmsg = NULL;
673	/* referrals returned by the LDAP operation */
674	char		**referrals = NULL;
675	/*
676	 * list of referrals used by the state machine, built from
677	 * the referrals variable above
678	 */
679	ns_referral_info_t *ref_list = NULL;
680	/* current referral */
681	ns_referral_info_t *current_ref = NULL;
682	ns_write_state_t state = W_INIT, new_state, err_state = W_INIT;
683	int		do_not_fail_if_new_pwd_reqd = 0;
684	ns_ldap_passwd_status_t	pwd_status = NS_PASSWD_GOOD;
685	int		passwd_mgmt = 0;
686	int		i = 0;
687	int		ldap_error;
688	int		nopasswd_acct_mgmt = 0;
689
690	while (always) {
691		switch (state) {
692		case W_EXIT:
693			if (connectionId > -1)
694				DropConnection(connectionId, 0);
695			if (ref_list)
696				__s_api_deleteRefInfo(ref_list);
697			if (target_dn && target_dn_allocated)
698				free(target_dn);
699			return (return_rc);
700		case W_INIT:
701			/* see if need to follow referrals */
702			rc = __s_api_toFollowReferrals(flags,
703				&followRef, errorp);
704			if (rc != NS_LDAP_SUCCESS) {
705				return_rc = rc;
706				new_state = W_ERROR;
707				break;
708			}
709			len = strlen(dn);
710			if (dn[len-1] == COMMATOK)
711				rc = __s_api_append_default_basedn(
712					dn, &target_dn,
713					&target_dn_allocated,
714					errorp);
715			else
716				target_dn = dn;
717			if (rc != NS_LDAP_SUCCESS) {
718				return_rc = rc;
719				new_state = W_ERROR;
720			}
721			else
722				new_state = GET_CONNECTION;
723			break;
724		case GET_CONNECTION:
725			rc = __s_api_getConnection(NULL,
726				flags,
727				cred,
728				&connectionId,
729				&conp,
730				errorp,
731				do_not_fail_if_new_pwd_reqd,
732				nopasswd_acct_mgmt);
733
734			/*
735			 * If password control attached
736			 * in *errorp,
737			 * e.g. rc == NS_LDAP_SUCCESS_WITH_INFO,
738			 * free the error structure (we do not need
739			 * the password management info).
740			 * Reset rc to NS_LDAP_SUCCESS.
741			 */
742			if (rc == NS_LDAP_SUCCESS_WITH_INFO) {
743				(void) __ns_ldap_freeError(
744					errorp);
745				*errorp = NULL;
746				rc = NS_LDAP_SUCCESS;
747			}
748
749			if (rc != NS_LDAP_SUCCESS) {
750				return_rc = rc;
751				new_state = W_ERROR;
752				break;
753			}
754			if (followRef)
755				new_state = SELECT_OPERATION_ASYNC;
756			else
757				new_state = SELECT_OPERATION_SYNC;
758			break;
759		case SELECT_OPERATION_SYNC:
760			if (ldap_op == LDAP_REQ_ADD)
761				new_state = DO_ADD_SYNC;
762			else if (ldap_op == LDAP_REQ_DELETE)
763				new_state = DO_DELETE_SYNC;
764			else if (ldap_op == LDAP_REQ_MODIFY)
765				new_state = DO_MODIFY_SYNC;
766			break;
767		case SELECT_OPERATION_ASYNC:
768			if (ldap_op == LDAP_REQ_ADD)
769				new_state = DO_ADD_ASYNC;
770			else if (ldap_op == LDAP_REQ_DELETE)
771				new_state = DO_DELETE_ASYNC;
772			else if (ldap_op == LDAP_REQ_MODIFY)
773				new_state = DO_MODIFY_ASYNC;
774			break;
775		case DO_ADD_SYNC:
776			rc = ldap_add_ext_s(conp->ld, target_dn,
777				mods, NULL, NULL);
778			new_state = GET_RESULT_SYNC;
779			break;
780		case DO_DELETE_SYNC:
781			rc = ldap_delete_ext_s(conp->ld, target_dn,
782				NULL, NULL);
783			new_state = GET_RESULT_SYNC;
784			break;
785		case DO_MODIFY_SYNC:
786			rc = ldap_modify_ext_s(conp->ld, target_dn,
787				mods, NULL, NULL);
788			new_state = GET_RESULT_SYNC;
789			break;
790		case DO_ADD_ASYNC:
791			rc = ldap_add_ext(conp->ld, target_dn,
792				mods, NULL, NULL, &msgid);
793			new_state = GET_RESULT_ASYNC;
794			break;
795		case DO_DELETE_ASYNC:
796			rc = ldap_delete_ext(conp->ld, target_dn,
797				NULL, NULL, &msgid);
798			new_state = GET_RESULT_ASYNC;
799			break;
800		case DO_MODIFY_ASYNC:
801			rc = ldap_modify_ext(conp->ld, target_dn,
802				mods, NULL, NULL, &msgid);
803			new_state = GET_RESULT_ASYNC;
804			break;
805		case GET_RESULT_SYNC:
806			if (rc != LDAP_SUCCESS) {
807				Errno = rc;
808				(void) ldap_get_lderrno(conp->ld,
809					NULL, &errmsg);
810				/*
811				 * free errmsg if it is an empty string
812				 */
813				if (errmsg && *errmsg == '\0') {
814					ldap_memfree(errmsg);
815					errmsg = NULL;
816				}
817				new_state = W_LDAP_ERROR;
818			} else {
819				return_rc = NS_LDAP_SUCCESS;
820				new_state = W_EXIT;
821			}
822			break;
823		case GET_RESULT_ASYNC:
824			rc = ldap_result(conp->ld, msgid, 1,
825				(struct timeval *)NULL, &res);
826			/* if no server response, set Errno */
827			if (rc == -1) {
828				(void) ldap_get_option(conp->ld,
829				    LDAP_OPT_ERROR_NUMBER, &Errno);
830				new_state = W_LDAP_ERROR;
831				break;
832			}
833			if (rc == LDAP_RES_ADD ||
834				rc == LDAP_RES_MODIFY ||
835				rc == LDAP_RES_DELETE) {
836				new_state = PARSE_RESULT;
837				break;
838			} else {
839				return_rc = rc;
840				new_state = W_ERROR;
841			}
842			break;
843		case PARSE_RESULT:
844			/*
845			 * need Errno, referrals, error msg,
846			 * and the last "1" is to free
847			 * the result (res)
848			 */
849			rc = ldap_parse_result(conp->ld,
850				res, &Errno,
851				NULL, &errmsg,
852				&referrals, NULL, 1);
853			/*
854			 * free errmsg if it is an empty string
855			 */
856			if (errmsg && *errmsg == '\0') {
857				ldap_memfree(errmsg);
858				errmsg = NULL;
859			}
860			/*
861			 * If we received referral data, process
862			 * it if:
863			 * - we are configured to follow referrals
864			 * - and not already in referral mode (to keep
865			 *   consistency with search_state_machine()
866			 *   which follows 1 level of referrals only;
867			 *   see proc_result_referrals() and
868			 *   proc_search_references().
869			 */
870			if (Errno == LDAP_REFERRAL && followRef && !ref_list) {
871				for (i = 0; referrals[i] != NULL; i++) {
872					/* add to referral list */
873					rc = __s_api_addRefInfo(&ref_list,
874						referrals[i],
875						NULL, NULL, NULL,
876						conp->ld);
877					if (rc != NS_LDAP_SUCCESS) {
878						__s_api_deleteRefInfo(ref_list);
879						ref_list = NULL;
880						break;
881					}
882				}
883				ldap_value_free(referrals);
884				if (ref_list == NULL) {
885					if (rc != NS_LDAP_MEMORY)
886						rc = NS_LDAP_INTERNAL;
887					return_rc = rc;
888					new_state = W_ERROR;
889				} else {
890					new_state = GET_REFERRAL_CONNECTION;
891					current_ref = ref_list;
892				}
893				if (errmsg) {
894					ldap_memfree(errmsg);
895					errmsg = NULL;
896				}
897				break;
898			}
899			if (Errno != LDAP_SUCCESS) {
900				new_state = W_LDAP_ERROR;
901			} else {
902				return_rc = NS_LDAP_SUCCESS;
903				new_state = W_EXIT;
904			}
905			break;
906		case GET_REFERRAL_CONNECTION:
907			/*
908			 * since we are starting over,
909			 * discard the old error info
910			 */
911			return_rc = NS_LDAP_SUCCESS;
912			if (*errorp)
913				(void) __ns_ldap_freeError(errorp);
914			if (connectionId > -1)
915				DropConnection(connectionId, 0);
916			rc = __s_api_getConnection(current_ref->refHost,
917				0,
918				cred,
919				&connectionId,
920				&conp,
921				errorp,
922				do_not_fail_if_new_pwd_reqd,
923				nopasswd_acct_mgmt);
924
925			/*
926			 * If password control attached
927			 * in errorp,
928			 * e.g. rc == NS_LDAP_SUCCESS_WITH_INFO,
929			 * free the error structure (we do not need
930			 * the password management info).
931			 * Reset rc to NS_LDAP_SUCCESS.
932			 */
933			if (rc == NS_LDAP_SUCCESS_WITH_INFO) {
934				(void) __ns_ldap_freeError(
935					errorp);
936				*errorp = NULL;
937				rc = NS_LDAP_SUCCESS;
938			}
939
940			if (rc != NS_LDAP_SUCCESS) {
941				return_rc = rc;
942				/*
943				 * If current referral is not
944				 * available for some reason,
945				 * try next referral in the list.
946				 * Get LDAP error code from errorp.
947				 */
948				if (*errorp != NULL) {
949					ldap_error = (*errorp)->status;
950					if (ldap_error == LDAP_BUSY ||
951					    ldap_error == LDAP_UNAVAILABLE ||
952					    ldap_error ==
953						LDAP_UNWILLING_TO_PERFORM ||
954					    ldap_error == LDAP_CONNECT_ERROR ||
955					    ldap_error == LDAP_SERVER_DOWN) {
956						current_ref = current_ref->next;
957						if (current_ref == NULL) {
958						    /* no more referral */
959						    /* to follow */
960						    new_state = W_ERROR;
961						} else {
962						    new_state =
963							GET_REFERRAL_CONNECTION;
964						}
965						/*
966						 * free errorp before going to
967						 * next referral
968						 */
969						(void) __ns_ldap_freeError(
970							errorp);
971						*errorp = NULL;
972						break;
973					}
974					/*
975					 * free errorp before going to W_ERROR
976					 */
977					(void) __ns_ldap_freeError(errorp);
978					*errorp = NULL;
979				}
980				/* else, exit */
981				__s_api_deleteRefInfo(ref_list);
982				ref_list = NULL;
983				new_state = W_ERROR;
984				break;
985			}
986			/* target DN may changed due to referrals */
987			if (current_ref->refDN) {
988				if (target_dn && target_dn_allocated) {
989					free(target_dn);
990					target_dn = NULL;
991					target_dn_allocated = FALSE;
992				}
993				target_dn = current_ref->refDN;
994			}
995			new_state = SELECT_OPERATION_SYNC;
996			break;
997		case W_LDAP_ERROR:
998			/*
999			 * map error code and error message
1000			 * to password status if necessary.
1001			 * This is to see if password updates
1002			 * failed due to password policy or
1003			 * password syntax checking.
1004			 */
1005			if (errmsg) {
1006				/*
1007				 * check if server supports
1008				 * password management
1009				 */
1010				passwd_mgmt =
1011					__s_api_contain_passwd_control_oid(
1012						conp->controls);
1013					if (passwd_mgmt)
1014						pwd_status =
1015						__s_api_set_passwd_status(
1016						Errno, errmsg);
1017				ldap_memfree(errmsg);
1018				errmsg = NULL;
1019			}
1020
1021			(void) sprintf(errstr,
1022				gettext(ldap_err2string(Errno)));
1023			err = strdup(errstr);
1024			if (pwd_status != NS_PASSWD_GOOD) {
1025				MKERROR_PWD_MGMT(*errorp, Errno, err,
1026					pwd_status, 0, NULL);
1027			} else {
1028				MKERROR(LOG_INFO, *errorp, Errno, err, NULL);
1029			}
1030			return_rc = NS_LDAP_INTERNAL;
1031			new_state = W_EXIT;
1032			break;
1033		case W_ERROR:
1034		default:
1035			(void) sprintf(errstr,
1036				gettext("Internal write State machine exit"
1037					" (state = %d, rc = %d)."),
1038					err_state, return_rc);
1039			err = strdup(errstr);
1040			MKERROR(LOG_WARNING, *errorp, return_rc, err, NULL);
1041			new_state = W_EXIT;
1042			break;
1043		}
1044
1045		if (new_state == W_ERROR)
1046			err_state = state;
1047		state = new_state;
1048	}
1049
1050	/*
1051	 * should never be here, the next line is to eliminating
1052	 * lint message
1053	 */
1054	return (NS_LDAP_INTERNAL);
1055}
1056
1057
1058/*ARGSUSED*/
1059int
1060__ns_ldap_addAttr(
1061	const char *service,
1062	const char *dn,
1063	const ns_ldap_attr_t * const *attr,
1064	const ns_cred_t *cred,
1065	const int flags,
1066	ns_ldap_error_t ** errorp)
1067{
1068	LDAPMod		**mods;
1069	int		rc = 0;
1070
1071#ifdef DEBUG
1072	(void) fprintf(stderr, "__ns_ldap_addAttr START\n");
1073#endif
1074	*errorp = NULL;
1075
1076	/* Sanity check */
1077	if ((attr == NULL) || (*attr == NULL) ||
1078	    (dn == NULL) || (cred == NULL))
1079		return (NS_LDAP_INVALID_PARAM);
1080
1081	mods = __s_api_makeModList(service, attr, LDAP_MOD_ADD, flags);
1082	if (mods == NULL) {
1083		return (NS_LDAP_MEMORY);
1084	}
1085
1086	rc = write_state_machine(LDAP_REQ_MODIFY,
1087	    (char *)dn, mods, cred, flags, errorp);
1088	freeModList(mods);
1089
1090	return (rc);
1091}
1092
1093
1094/*ARGSUSED*/
1095int
1096__ns_ldap_delAttr(
1097	const char *service,
1098	const char *dn,
1099	const ns_ldap_attr_t * const *attr,
1100	const ns_cred_t *cred,
1101	const int flags,
1102	ns_ldap_error_t ** errorp)
1103{
1104	LDAPMod		**mods;
1105	int		rc = 0;
1106
1107#ifdef DEBUG
1108	(void) fprintf(stderr, "__ns_ldap_delAttr START\n");
1109#endif
1110	*errorp = NULL;
1111
1112	/* Sanity check */
1113	if ((attr == NULL) || (*attr == NULL) ||
1114	    (dn == NULL) || (cred == NULL))
1115		return (NS_LDAP_INVALID_PARAM);
1116
1117	mods = __s_api_makeModList(service, attr, LDAP_MOD_DELETE, flags);
1118	if (mods == NULL) {
1119		return (NS_LDAP_MEMORY);
1120	}
1121
1122	rc = write_state_machine(LDAP_REQ_MODIFY,
1123	    (char *)dn, mods, cred, flags, errorp);
1124
1125	freeModList(mods);
1126	return (rc);
1127}
1128
1129/*ARGSUSED*/
1130int
1131__ns_ldap_repAttr(
1132	const char *service,
1133	const char *dn,
1134	const ns_ldap_attr_t * const *attr,
1135	const ns_cred_t *cred,
1136	const int flags,
1137	ns_ldap_error_t ** errorp)
1138{
1139	LDAPMod		**mods;
1140	int		rc = 0;
1141
1142#ifdef DEBUG
1143	(void) fprintf(stderr, "__ns_ldap_repAttr START\n");
1144#endif
1145	*errorp = NULL;
1146
1147	/* Sanity check */
1148	if ((attr == NULL) || (*attr == NULL) ||
1149	    (dn == NULL) || (cred == NULL))
1150		return (NS_LDAP_INVALID_PARAM);
1151	mods = __s_api_makeModList(service, attr, LDAP_MOD_REPLACE, flags);
1152	if (mods == NULL) {
1153		return (NS_LDAP_MEMORY);
1154	}
1155
1156	rc = write_state_machine(LDAP_REQ_MODIFY,
1157	    (char *)dn, mods, cred, flags, errorp);
1158
1159	freeModList(mods);
1160	return (rc);
1161}
1162
1163
1164/*ARGSUSED*/
1165int
1166__ns_ldap_addEntry(
1167	const char *service,
1168	const char *dn,
1169	const ns_ldap_entry_t *entry,
1170	const ns_cred_t *cred,
1171	const int flags,
1172	ns_ldap_error_t ** errorp)
1173{
1174	char		*new_dn = NULL;
1175	LDAPMod		**mods = NULL;
1176	const ns_ldap_attr_t	* const *attr;
1177	int		nAttr = 0;
1178	int		rc = 0;
1179
1180#ifdef DEBUG
1181	(void) fprintf(stderr, "__ns_ldap_addEntry START\n");
1182#endif
1183
1184	if ((entry == NULL) || (dn == NULL) || (cred == NULL))
1185		return (NS_LDAP_INVALID_PARAM);
1186	*errorp = NULL;
1187
1188	/* Construct array of LDAPMod representing attributes of new entry. */
1189
1190	nAttr = entry->attr_count;
1191	attr = (const ns_ldap_attr_t * const *)(entry->attr_pair);
1192	mods = __s_api_makeModListCount(service, attr, LDAP_MOD_ADD,
1193	    nAttr, flags);
1194	if (mods == NULL) {
1195		return (NS_LDAP_MEMORY);
1196	}
1197
1198	rc = replace_mapped_attr_in_dn(service, dn, &new_dn);
1199	if (rc != NS_LDAP_SUCCESS) {
1200		freeModList(mods);
1201		return (rc);
1202	}
1203
1204	rc = write_state_machine(LDAP_REQ_ADD,
1205	    new_dn ? new_dn : (char *)dn, mods, cred, flags, errorp);
1206
1207	if (new_dn)
1208		free(new_dn);
1209	freeModList(mods);
1210	return (rc);
1211}
1212
1213
1214/*ARGSUSED*/
1215int
1216__ns_ldap_delEntry(
1217	const char *service,
1218	const char *dn,
1219	const ns_cred_t *cred,
1220	const int flags,
1221	ns_ldap_error_t ** errorp)
1222{
1223	int		rc;
1224
1225#ifdef DEBUG
1226	(void) fprintf(stderr, "__ns_ldap_delEntry START\n");
1227#endif
1228	if ((dn == NULL) || (cred == NULL))
1229		return (NS_LDAP_INVALID_PARAM);
1230
1231	*errorp = NULL;
1232
1233	rc = write_state_machine(LDAP_REQ_DELETE,
1234	    (char *)dn, NULL, cred, flags, errorp);
1235
1236	return (rc);
1237}
1238
1239/*
1240 * Add Typed Entry Helper routines
1241 */
1242
1243/*
1244 * Add Typed Entry Conversion routines
1245 */
1246
1247static int
1248__s_add_attr(ns_ldap_entry_t *e, char *attrname, char *value)
1249{
1250	ns_ldap_attr_t	*a;
1251	char		*v;
1252
1253	a = (ns_ldap_attr_t *)calloc(1, sizeof (ns_ldap_attr_t));
1254	if (a == NULL)
1255		return (NS_LDAP_MEMORY);
1256	a->attrname = strdup(attrname);
1257	if (a->attrname == NULL)
1258		return (NS_LDAP_MEMORY);
1259	a->attrvalue = (char **)calloc(1, sizeof (char **));
1260	if (a->attrvalue == NULL)
1261		return (NS_LDAP_MEMORY);
1262	a->value_count = 1;
1263	a->attrvalue[0] = NULL;
1264	v = strdup(value);
1265	if (v == NULL)
1266		return (NS_LDAP_MEMORY);
1267	a->attrvalue[0] = v;
1268	e->attr_pair[e->attr_count] = a;
1269	e->attr_count++;
1270	return (NS_LDAP_SUCCESS);
1271}
1272
1273static int
1274__s_add_attrlist(ns_ldap_entry_t *e, char *attrname, char **argv)
1275{
1276	ns_ldap_attr_t	*a;
1277	char		*v;
1278	char		**av;
1279	int		i, j;
1280
1281	a = (ns_ldap_attr_t *)calloc(1, sizeof (ns_ldap_attr_t));
1282	if (a == NULL)
1283		return (NS_LDAP_MEMORY);
1284	a->attrname = strdup(attrname);
1285	if (a->attrname == NULL)
1286		return (NS_LDAP_MEMORY);
1287
1288	for (i = 0, av = argv; *av != NULL; av++, i++)
1289		;
1290
1291	a->attrvalue = (char **)calloc(i, sizeof (char *));
1292
1293	if (a->attrvalue == NULL)
1294		return (NS_LDAP_MEMORY);
1295
1296	a->value_count = i;
1297	for (j = 0; j < i; j++) {
1298		v = strdup(argv[j]);
1299		if (v == NULL)
1300			return (NS_LDAP_MEMORY);
1301		a->attrvalue[j] = v;
1302	}
1303	e->attr_pair[e->attr_count] = a;
1304	e->attr_count++;
1305	return (NS_LDAP_SUCCESS);
1306}
1307
1308static ns_ldap_entry_t *
1309__s_mk_entry(char **objclass, int max_attr)
1310{
1311	ns_ldap_entry_t *e;
1312	e = (ns_ldap_entry_t *)calloc(1, sizeof (ns_ldap_entry_t));
1313	if (e == NULL)
1314		return (NULL);
1315	/* allocate attributes, +1 for objectclass, +1 for NULL terminator */
1316	e->attr_pair = (ns_ldap_attr_t **)
1317	    calloc(max_attr + 2, sizeof (ns_ldap_attr_t *));
1318	if (e->attr_pair == NULL) {
1319		free(e);
1320		return (NULL);
1321	}
1322	e->attr_count = 0;
1323	if (__s_add_attrlist(e, "objectClass", objclass) != NS_LDAP_SUCCESS) {
1324		free(e->attr_pair);
1325		free(e);
1326		return (NULL);
1327	}
1328	return (e);
1329}
1330
1331
1332/*
1333 * Conversion:			passwd
1334 * Input format:		struct passwd
1335 * Exported objectclass:	posixAccount
1336 */
1337static int
1338__s_cvt_passwd(const void *data, char **rdn,
1339	ns_ldap_entry_t **entry, ns_ldap_error_t **errorp)
1340{
1341	ns_ldap_entry_t	*e;
1342	int		rc;
1343	char		trdn[RDNSIZE];
1344	/* routine specific */
1345	struct passwd	*ptr;
1346	int		max_attr = 9;
1347	char		ibuf[10];
1348	static		char *oclist[] = {
1349			"posixAccount",
1350			"shadowAccount",
1351			"account",
1352			"top",
1353			NULL
1354			};
1355
1356	if (data == NULL || rdn == NULL || entry == NULL || errorp == NULL)
1357		return (NS_LDAP_OP_FAILED);
1358	*entry = e = __s_mk_entry(oclist, max_attr);
1359	if (e == NULL)
1360		return (NS_LDAP_MEMORY);
1361
1362	/* Convert the structure */
1363	ptr = (struct passwd *)data;
1364
1365	if (ptr->pw_name == NULL || ptr->pw_uid < 0 ||
1366	    ptr->pw_gid < 0 || ptr->pw_dir == NULL) {
1367		__ns_ldap_freeEntry(e);
1368		*entry = NULL;
1369		return (NS_LDAP_INVALID_PARAM);
1370	}
1371
1372	/* Create an appropriate rdn */
1373	(void) snprintf(trdn, RDNSIZE, "uid=%s", ptr->pw_name);
1374	*rdn = strdup(trdn);
1375	if (*rdn == NULL) {
1376		__ns_ldap_freeEntry(e);
1377		*entry = NULL;
1378		return (NS_LDAP_MEMORY);
1379	}
1380
1381	/* Error check the data and add the attributes */
1382	rc = __s_add_attr(e, "uid", ptr->pw_name);
1383	if (rc != NS_LDAP_SUCCESS) {
1384		__s_cvt_freeEntryRdn(entry, rdn);
1385		return (rc);
1386	}
1387	rc = __s_add_attr(e, "cn", ptr->pw_name);
1388	if (rc != NS_LDAP_SUCCESS) {
1389		__s_cvt_freeEntryRdn(entry, rdn);
1390		return (rc);
1391	}
1392
1393	if (ptr->pw_passwd != NULL &&
1394		ptr->pw_passwd[0] != '\0') {
1395		rc = __s_add_attr(e, "userPassword", ptr->pw_passwd);
1396		if (rc != NS_LDAP_SUCCESS) {
1397			__s_cvt_freeEntryRdn(entry, rdn);
1398			return (rc);
1399		}
1400	}
1401
1402#ifdef _LP64
1403	(void) sprintf(ibuf, "%d", ptr->pw_uid);
1404#else
1405	(void) sprintf(ibuf, "%ld", ptr->pw_uid);
1406#endif
1407	rc = __s_add_attr(e, "uidNumber", ibuf);
1408	if (rc != NS_LDAP_SUCCESS) {
1409		__s_cvt_freeEntryRdn(entry, rdn);
1410		return (rc);
1411	}
1412
1413#ifdef _LP64
1414	(void) sprintf(ibuf, "%d", ptr->pw_gid);
1415#else
1416	(void) sprintf(ibuf, "%ld", ptr->pw_gid);
1417#endif
1418	rc = __s_add_attr(e, "gidNumber", ibuf);
1419	if (rc != NS_LDAP_SUCCESS) {
1420		__s_cvt_freeEntryRdn(entry, rdn);
1421		return (rc);
1422	}
1423	if (ptr->pw_gecos != NULL &&
1424		ptr->pw_gecos[0] != '\0') {
1425		rc = __s_add_attr(e, "gecos", ptr->pw_gecos);
1426		if (rc != NS_LDAP_SUCCESS) {
1427			__s_cvt_freeEntryRdn(entry, rdn);
1428			return (rc);
1429		}
1430	}
1431
1432	rc = __s_add_attr(e, "homeDirectory", ptr->pw_dir);
1433	if (rc != NS_LDAP_SUCCESS) {
1434		__s_cvt_freeEntryRdn(entry, rdn);
1435		return (rc);
1436	}
1437	if (ptr->pw_shell != NULL &&
1438		ptr->pw_shell[0] != '\0') {
1439		rc = __s_add_attr(e, "loginShell", ptr->pw_shell);
1440		if (rc != NS_LDAP_SUCCESS) {
1441			__s_cvt_freeEntryRdn(entry, rdn);
1442			return (rc);
1443		}
1444	}
1445
1446	return (NS_LDAP_SUCCESS);
1447}
1448
1449/*
1450 * Conversion:			shadow
1451 * Input format:		struct shadow
1452 * Exported objectclass:	shadowAccount
1453 */
1454static int
1455__s_cvt_shadow(const void *data, char **rdn,
1456	ns_ldap_entry_t **entry, ns_ldap_error_t **errorp)
1457{
1458	ns_ldap_entry_t	*e;
1459	int		rc;
1460	char		trdn[RDNSIZE];
1461	/* routine specific */
1462	struct spwd	*ptr;
1463	int		max_attr = 10;
1464	char		ibuf[10];
1465	static		char *oclist[] = {
1466			"posixAccount",
1467			"shadowAccount",
1468			"account",
1469			"top",
1470			NULL
1471			};
1472
1473	if (data == NULL || rdn == NULL || entry == NULL || errorp == NULL)
1474		return (NS_LDAP_OP_FAILED);
1475	*entry = e = __s_mk_entry(oclist, max_attr);
1476	if (e == NULL)
1477		return (NS_LDAP_MEMORY);
1478
1479	/* Convert the structure */
1480	ptr = (struct spwd *)data;
1481
1482	if (ptr->sp_namp == NULL) {
1483		__ns_ldap_freeEntry(e);
1484		*entry = NULL;
1485		return (NS_LDAP_INVALID_PARAM);
1486	}
1487
1488	/* Create an appropriate rdn */
1489	(void) snprintf(trdn, RDNSIZE, "uid=%s", ptr->sp_namp);
1490	*rdn = strdup(trdn);
1491	if (*rdn == NULL) {
1492		__ns_ldap_freeEntry(e);
1493		*entry = NULL;
1494		return (NS_LDAP_MEMORY);
1495	}
1496
1497	/* Error check the data and add the attributes */
1498	rc = __s_add_attr(e, "uid", ptr->sp_namp);
1499	if (rc != NS_LDAP_SUCCESS) {
1500		__s_cvt_freeEntryRdn(entry, rdn);
1501		return (rc);
1502	}
1503
1504	if (ptr->sp_pwdp == NULL) {
1505		__s_cvt_freeEntryRdn(entry, rdn);
1506		return (NS_LDAP_INVALID_PARAM);
1507	} else {
1508		rc = __s_add_attr(e, "userPassword", ptr->sp_pwdp);
1509		if (rc != NS_LDAP_SUCCESS) {
1510			__s_cvt_freeEntryRdn(entry, rdn);
1511			return (rc);
1512		}
1513	}
1514	if (ptr->sp_lstchg >= 0) {
1515		(void) sprintf(ibuf, "%d", ptr->sp_lstchg);
1516		rc = __s_add_attr(e, "shadowLastChange", ibuf);
1517		if (rc != NS_LDAP_SUCCESS) {
1518			__s_cvt_freeEntryRdn(entry, rdn);
1519			return (rc);
1520		}
1521	}
1522	if (ptr->sp_min >= 0) {
1523		(void) sprintf(ibuf, "%d", ptr->sp_min);
1524		rc = __s_add_attr(e, "shadowMin", ibuf);
1525		if (rc != NS_LDAP_SUCCESS) {
1526			__s_cvt_freeEntryRdn(entry, rdn);
1527			return (rc);
1528		}
1529	}
1530	if (ptr->sp_max >= 0) {
1531		(void) sprintf(ibuf, "%d", ptr->sp_max);
1532		rc = __s_add_attr(e, "shadowMax", ibuf);
1533		if (rc != NS_LDAP_SUCCESS) {
1534			__s_cvt_freeEntryRdn(entry, rdn);
1535			return (rc);
1536		}
1537	}
1538	if (ptr->sp_warn >= 0) {
1539		(void) sprintf(ibuf, "%d", ptr->sp_warn);
1540		rc = __s_add_attr(e, "shadowWarning", ibuf);
1541		if (rc != NS_LDAP_SUCCESS) {
1542			__s_cvt_freeEntryRdn(entry, rdn);
1543			return (rc);
1544		}
1545	}
1546	if (ptr->sp_inact >= 0) {
1547		(void) sprintf(ibuf, "%d", ptr->sp_inact);
1548		rc = __s_add_attr(e, "shadowInactive", ibuf);
1549		if (rc != NS_LDAP_SUCCESS) {
1550			__s_cvt_freeEntryRdn(entry, rdn);
1551			return (rc);
1552		}
1553	}
1554	if (ptr->sp_expire >= 0) {
1555		(void) sprintf(ibuf, "%d", ptr->sp_expire);
1556		rc = __s_add_attr(e, "shadowExpire", ibuf);
1557		if (rc != NS_LDAP_SUCCESS) {
1558			__s_cvt_freeEntryRdn(entry, rdn);
1559			return (rc);
1560		}
1561	}
1562	(void) sprintf(ibuf, "%d", ptr->sp_flag);
1563	rc = __s_add_attr(e, "shadowFlag", ibuf);
1564	if (rc != NS_LDAP_SUCCESS) {
1565		__s_cvt_freeEntryRdn(entry, rdn);
1566		return (rc);
1567	}
1568
1569	return (NS_LDAP_SUCCESS);
1570}
1571
1572
1573/*
1574 * Conversion:			group
1575 * Input format:		struct group
1576 * Exported objectclass:	posixGroup
1577 */
1578static int
1579__s_cvt_group(const void *data, char **rdn,
1580	ns_ldap_entry_t **entry, ns_ldap_error_t **errorp)
1581{
1582	ns_ldap_entry_t	*e;
1583	int		rc;
1584	char		trdn[RDNSIZE];
1585	/* routine specific */
1586	struct group	*ptr;
1587	int		i, j, k;
1588	char		**nm, **lm;
1589	int		max_attr = 4;
1590	char		ibuf[10];
1591	static		char *oclist[] = {
1592			"posixGroup",
1593			"top",
1594			NULL
1595			};
1596
1597	if (data == NULL || rdn == NULL || entry == NULL || errorp == NULL)
1598		return (NS_LDAP_OP_FAILED);
1599	*entry = e = __s_mk_entry(oclist, max_attr);
1600	if (e == NULL)
1601		return (NS_LDAP_MEMORY);
1602
1603	/* Convert the structure */
1604	ptr = (struct group *)data;
1605
1606	if (ptr->gr_name == NULL || ptr->gr_gid < 0) {
1607		__ns_ldap_freeEntry(e);
1608		*entry = NULL;
1609		return (NS_LDAP_INVALID_PARAM);
1610	}
1611
1612	/* Create an appropriate rdn */
1613	(void) snprintf(trdn, RDNSIZE, "cn=%s", ptr->gr_name);
1614	*rdn = strdup(trdn);
1615	if (*rdn == NULL) {
1616		__ns_ldap_freeEntry(e);
1617		*entry = NULL;
1618		return (NS_LDAP_MEMORY);
1619	}
1620
1621	/* Error check the data and add the attributes */
1622	rc = __s_add_attr(e, "cn", ptr->gr_name);
1623	if (rc != NS_LDAP_SUCCESS) {
1624		__s_cvt_freeEntryRdn(entry, rdn);
1625		return (rc);
1626	}
1627
1628#ifdef _LP64
1629	(void) sprintf(ibuf, "%d", ptr->gr_gid);
1630#else
1631	(void) sprintf(ibuf, "%ld", ptr->gr_gid);
1632#endif
1633	rc = __s_add_attr(e, "gidNumber", ibuf);
1634	if (rc != NS_LDAP_SUCCESS) {
1635		__s_cvt_freeEntryRdn(entry, rdn);
1636		return (rc);
1637	}
1638	if (ptr->gr_passwd && ptr->gr_passwd[0] != '\0') {
1639		rc = __s_add_attr(e, "userPassword", ptr->gr_passwd);
1640		if (rc != NS_LDAP_SUCCESS) {
1641			__s_cvt_freeEntryRdn(entry, rdn);
1642			return (rc);
1643		}
1644	}
1645
1646	if (ptr->gr_mem && ptr->gr_mem[0]) {
1647		lm = ptr->gr_mem;
1648		for (i = 0; *lm; i++, lm++)
1649			;
1650		lm = ptr->gr_mem;
1651		nm = (char **)calloc(i+2, sizeof (char *));
1652		if (nm == NULL) {
1653			__s_cvt_freeEntryRdn(entry, rdn);
1654			return (NS_LDAP_MEMORY);
1655		}
1656		for (j = 0; j < i; j++) {
1657			nm[j] = strdup(lm[j]);
1658			if (nm[j] == NULL) {
1659				for (k = 0; k < j; k++)
1660					free(nm[k]);
1661				free(nm);
1662				__s_cvt_freeEntryRdn(entry, rdn);
1663				return (NS_LDAP_MEMORY);
1664			}
1665		}
1666		rc = __s_add_attrlist(e, "memberUid", nm);
1667		for (j = 0; j < i; j++) {
1668			free(nm[j]);
1669		}
1670		free(nm);
1671		nm = NULL;
1672		if (rc != NS_LDAP_SUCCESS) {
1673			__s_cvt_freeEntryRdn(entry, rdn);
1674			return (rc);
1675		}
1676	}
1677
1678	return (NS_LDAP_SUCCESS);
1679}
1680
1681/*
1682 * Conversion:			hosts
1683 * Input format:		struct hostent
1684 * Exported objectclass:	ipHost
1685 */
1686static int
1687__s_cvt_hosts(const void *data, char **rdn,
1688	ns_ldap_entry_t **entry, ns_ldap_error_t **errorp)
1689{
1690	ns_ldap_entry_t	*e;
1691	int		rc;
1692	char		trdn[RDNSIZE];
1693	/* routine specific */
1694	struct hostent	*ptr;
1695	int		max_attr = 6;
1696	int		i, j, k;
1697	char		**nm, **lm;
1698	static		char *oclist[] = {
1699			"ipHost",
1700			"device",
1701			"top",
1702			NULL
1703			};
1704
1705	if (data == NULL || rdn == NULL || entry == NULL || errorp == NULL)
1706		return (NS_LDAP_OP_FAILED);
1707	*entry = e = __s_mk_entry(oclist, max_attr);
1708	if (e == NULL)
1709		return (NS_LDAP_MEMORY);
1710
1711	/* Convert the structure */
1712	ptr = (struct hostent *)data;
1713
1714	if (ptr->h_name == NULL ||
1715	    ptr->h_addr_list == NULL || ptr->h_addr_list[0] == '\0') {
1716		__ns_ldap_freeEntry(e);
1717		*entry = NULL;
1718		return (NS_LDAP_INVALID_PARAM);
1719	}
1720
1721	/* Create an appropriate rdn */
1722	(void) snprintf(trdn, RDNSIZE, "cn=%s+ipHostNumber=%s",
1723	    ptr->h_name, ptr->h_addr_list[0]);
1724	*rdn = strdup(trdn);
1725	if (*rdn == NULL) {
1726		__ns_ldap_freeEntry(e);
1727		*entry = NULL;
1728		return (NS_LDAP_MEMORY);
1729	}
1730
1731	/* Error check the data and add the attributes */
1732	if (ptr->h_aliases && ptr->h_aliases[0]) {
1733		lm = ptr->h_aliases;
1734		for (i = 0; *lm; i++, lm++)
1735			;
1736		lm = ptr->h_aliases;
1737		nm = (char **)calloc(i+2, sizeof (char *));
1738		if (nm == NULL) {
1739			__s_cvt_freeEntryRdn(entry, rdn);
1740			return (NS_LDAP_MEMORY);
1741		}
1742		nm[0] = ptr->h_name;
1743		for (j = 0; j < i; j++)
1744			nm[j+1] = ptr->h_aliases[j];
1745
1746		rc = __s_add_attrlist(e, "cn", nm);
1747		free(nm);
1748		nm = NULL;
1749		if (rc != NS_LDAP_SUCCESS) {
1750			__s_cvt_freeEntryRdn(entry, rdn);
1751			return (rc);
1752		}
1753	} else {
1754		rc = __s_add_attr(e, "cn", ptr->h_name);
1755		if (rc != NS_LDAP_SUCCESS) {
1756			__s_cvt_freeEntryRdn(entry, rdn);
1757			return (rc);
1758		}
1759	}
1760
1761	if (ptr->h_addr_list && ptr->h_addr_list[0]) {
1762		lm = ptr->h_addr_list;
1763		for (i = 0; *lm; i++, lm++)
1764			;
1765		lm = ptr->h_addr_list;
1766		nm = (char **)calloc(i+2, sizeof (char *));
1767		if (nm == NULL) {
1768			__s_cvt_freeEntryRdn(entry, rdn);
1769			return (NS_LDAP_MEMORY);
1770		}
1771		for (j = 0; j < i; j++) {
1772			nm[j] = strdup(lm[j]);
1773			if (nm[j] == NULL) {
1774				for (k = 0; k < j; k++)
1775					free(nm[k]);
1776				free(nm);
1777				__s_cvt_freeEntryRdn(entry, rdn);
1778				return (NS_LDAP_MEMORY);
1779			}
1780		}
1781		rc = __s_add_attrlist(e, "ipHostNumber", nm);
1782		for (j = 0; j < i; j++) {
1783			free(nm[j]);
1784		}
1785		free(nm);
1786		nm = NULL;
1787		if (rc != NS_LDAP_SUCCESS) {
1788			__s_cvt_freeEntryRdn(entry, rdn);
1789			return (rc);
1790		}
1791	} else {
1792		__s_cvt_freeEntryRdn(entry, rdn);
1793		return (NS_LDAP_INVALID_PARAM);
1794	}
1795
1796	return (NS_LDAP_SUCCESS);
1797}
1798
1799/*
1800 * Conversion:			rpc
1801 * Input format:		struct rpcent
1802 * Exported objectclass:	oncRpc
1803 */
1804static int
1805__s_cvt_rpc(const void *data, char **rdn,
1806	ns_ldap_entry_t **entry, ns_ldap_error_t **errorp)
1807{
1808	ns_ldap_entry_t	*e;
1809	int		rc;
1810	char		trdn[RDNSIZE];
1811	/* routine specific */
1812	struct rpcent	*ptr;
1813	int		max_attr = 3;
1814	int		i, j;
1815	char		**nm;
1816	char		ibuf[10];
1817	static		char *oclist[] = {
1818			"oncRpc",
1819			"top",
1820			NULL
1821			};
1822
1823	if (data == NULL || rdn == NULL || entry == NULL || errorp == NULL)
1824		return (NS_LDAP_OP_FAILED);
1825	*entry = e = __s_mk_entry(oclist, max_attr);
1826	if (e == NULL)
1827		return (NS_LDAP_MEMORY);
1828
1829	/* Convert the structure */
1830	ptr = (struct rpcent *)data;
1831
1832	if (ptr->r_name == NULL || ptr->r_number < 0) {
1833		__ns_ldap_freeEntry(e);
1834		*entry = NULL;
1835		return (NS_LDAP_INVALID_PARAM);
1836	}
1837
1838	/* Create an appropriate rdn */
1839	(void) snprintf(trdn, RDNSIZE, "cn=%s", ptr->r_name);
1840	*rdn = strdup(trdn);
1841	if (*rdn == NULL) {
1842		__ns_ldap_freeEntry(e);
1843		*entry = NULL;
1844		return (NS_LDAP_MEMORY);
1845	}
1846
1847	/* Error check the data and add the attributes */
1848	if (ptr->r_aliases && ptr->r_aliases[0]) {
1849		nm = ptr->r_aliases;
1850		for (i = 0; *nm; i++, nm++)
1851			;
1852		nm = (char **)calloc(i+2, sizeof (char *));
1853		if (nm == NULL) {
1854			__s_cvt_freeEntryRdn(entry, rdn);
1855			return (NS_LDAP_MEMORY);
1856		}
1857		nm[0] = ptr->r_name;
1858		for (j = 0; j < i; j++)
1859			nm[j+1] = ptr->r_aliases[j];
1860
1861		rc = __s_add_attrlist(e, "cn", nm);
1862		free(nm);
1863		nm = NULL;
1864		if (rc != NS_LDAP_SUCCESS) {
1865			__s_cvt_freeEntryRdn(entry, rdn);
1866			return (rc);
1867		}
1868	} else {
1869		rc = __s_add_attr(e, "cn", ptr->r_name);
1870		if (rc != NS_LDAP_SUCCESS) {
1871			__s_cvt_freeEntryRdn(entry, rdn);
1872			return (rc);
1873		}
1874	}
1875
1876	if (ptr->r_number >= 0) {
1877		(void) sprintf(ibuf, "%d", ptr->r_number);
1878		rc = __s_add_attr(e, "oncRpcNumber", ibuf);
1879		if (rc != NS_LDAP_SUCCESS) {
1880			__s_cvt_freeEntryRdn(entry, rdn);
1881			return (rc);
1882		}
1883	}
1884
1885	return (NS_LDAP_SUCCESS);
1886
1887}
1888
1889/*
1890 * Conversion:			protocols
1891 * Input format:		struct protoent
1892 * Exported objectclass:	ipProtocol
1893 */
1894static int
1895__s_cvt_protocols(const void *data, char **rdn,
1896	ns_ldap_entry_t **entry, ns_ldap_error_t **errorp)
1897{
1898	ns_ldap_entry_t	*e;
1899	int		rc;
1900	char		trdn[RDNSIZE];
1901	/* routine specific */
1902	struct protoent	*ptr;
1903	int		max_attr = 3;
1904	int		i, j;
1905	char		ibuf[10];
1906	char		**nm;
1907	static		char *oclist[] = {
1908			"ipProtocol",
1909			"top",
1910			NULL
1911			};
1912
1913	if (data == NULL || rdn == NULL || entry == NULL || errorp == NULL)
1914		return (NS_LDAP_OP_FAILED);
1915	*entry = e = __s_mk_entry(oclist, max_attr);
1916	if (e == NULL)
1917		return (NS_LDAP_MEMORY);
1918
1919	/* Convert the structure */
1920	ptr = (struct protoent *)data;
1921
1922	if (ptr->p_name == NULL || ptr->p_proto < 0) {
1923		__ns_ldap_freeEntry(e);
1924		*entry = NULL;
1925		return (NS_LDAP_INVALID_PARAM);
1926	}
1927
1928	/* Create an appropriate rdn */
1929	(void) snprintf(trdn, RDNSIZE, "cn=%s", ptr->p_name);
1930	*rdn = strdup(trdn);
1931	if (*rdn == NULL) {
1932		__ns_ldap_freeEntry(e);
1933		*entry = NULL;
1934		return (NS_LDAP_MEMORY);
1935	}
1936
1937	/* Error check the data and add the attributes */
1938	if (ptr->p_aliases && ptr->p_aliases[0]) {
1939		nm = ptr->p_aliases;
1940		for (i = 0; *nm; i++, nm++)
1941			;
1942		nm = (char **)calloc(i+2, sizeof (char *));
1943		if (nm == NULL) {
1944			__s_cvt_freeEntryRdn(entry, rdn);
1945			return (NS_LDAP_MEMORY);
1946		}
1947		nm[0] = ptr->p_name;
1948		for (j = 0; j < i; j++)
1949			nm[j+1] = ptr->p_aliases[j];
1950
1951		rc = __s_add_attrlist(e, "cn", nm);
1952		free(nm);
1953		nm = NULL;
1954		if (rc != NS_LDAP_SUCCESS) {
1955			__s_cvt_freeEntryRdn(entry, rdn);
1956			return (rc);
1957		}
1958	} else {
1959		rc = __s_add_attr(e, "cn", ptr->p_name);
1960		if (rc != NS_LDAP_SUCCESS) {
1961			__s_cvt_freeEntryRdn(entry, rdn);
1962			return (rc);
1963		}
1964	}
1965
1966	(void) sprintf(ibuf, "%d", ptr->p_proto);
1967	rc = __s_add_attr(e, "ipProtocolNumber", ibuf);
1968	if (rc != NS_LDAP_SUCCESS) {
1969		__s_cvt_freeEntryRdn(entry, rdn);
1970		return (rc);
1971	}
1972
1973	return (NS_LDAP_SUCCESS);
1974
1975}
1976
1977/*
1978 * Conversion:			services
1979 * Input format:		struct servent
1980 * Exported objectclass:	ipService
1981 */
1982static int
1983__s_cvt_services(const void *data, char **rdn,
1984	ns_ldap_entry_t **entry, ns_ldap_error_t **errorp)
1985{
1986	ns_ldap_entry_t	*e;
1987	int		rc;
1988	char		trdn[RDNSIZE];
1989	/* routine specific */
1990	struct servent	*ptr;
1991	int		max_attr = 4;
1992	int		i, j;
1993	char		ibuf[10];
1994	char		**nm;
1995	static		char *oclist[] = {
1996			"ipService",
1997			"top",
1998			NULL
1999			};
2000
2001	if (data == NULL || rdn == NULL || entry == NULL || errorp == NULL)
2002		return (NS_LDAP_OP_FAILED);
2003	*entry = e = __s_mk_entry(oclist, max_attr);
2004	if (e == NULL)
2005		return (NS_LDAP_MEMORY);
2006
2007	/* Convert the structure */
2008	ptr = (struct servent *)data;
2009
2010	if (ptr->s_name == NULL || ptr->s_port < 0 || ptr->s_proto == '\0') {
2011		__ns_ldap_freeEntry(e);
2012		*entry = NULL;
2013		return (NS_LDAP_INVALID_PARAM);
2014	}
2015
2016	/* Create an appropriate rdn */
2017	(void) snprintf(trdn, RDNSIZE, "cn=%s+ipServiceProtocol=%s",
2018				ptr->s_name, ptr->s_proto);
2019	*rdn = strdup(trdn);
2020	if (*rdn == NULL) {
2021		__ns_ldap_freeEntry(e);
2022		*entry = NULL;
2023		return (NS_LDAP_MEMORY);
2024	}
2025
2026	/* Error check the data and add the attributes */
2027	if (ptr->s_aliases && ptr->s_aliases[0]) {
2028		nm = ptr->s_aliases;
2029		for (i = 0; *nm; i++, nm++)
2030			;
2031		nm = (char **)calloc(i+2, sizeof (char *));
2032		if (nm == NULL) {
2033			__s_cvt_freeEntryRdn(entry, rdn);
2034			return (NS_LDAP_MEMORY);
2035		}
2036		nm[0] = ptr->s_name;
2037		for (j = 0; j < i; j++)
2038			nm[j+1] = ptr->s_aliases[j];
2039
2040		rc = __s_add_attrlist(e, "cn", nm);
2041		free(nm);
2042		nm = NULL;
2043		if (rc != NS_LDAP_SUCCESS) {
2044			__s_cvt_freeEntryRdn(entry, rdn);
2045			return (rc);
2046		}
2047	} else {
2048		rc = __s_add_attr(e, "cn", ptr->s_name);
2049		if (rc != NS_LDAP_SUCCESS) {
2050			__s_cvt_freeEntryRdn(entry, rdn);
2051			return (rc);
2052		}
2053	}
2054
2055	(void) sprintf(ibuf, "%d", ptr->s_port);
2056	rc = __s_add_attr(e, "ipServicePort", ibuf);
2057	if (rc != NS_LDAP_SUCCESS) {
2058		__s_cvt_freeEntryRdn(entry, rdn);
2059		return (rc);
2060	}
2061	rc = __s_add_attr(e, "ipServiceProtocol", ptr->s_proto);
2062	if (rc != NS_LDAP_SUCCESS) {
2063		__s_cvt_freeEntryRdn(entry, rdn);
2064		return (rc);
2065	}
2066
2067	return (NS_LDAP_SUCCESS);
2068}
2069
2070/*
2071 * Conversion:			networks
2072 * Input format:		struct netent
2073 * Exported objectclass:	ipNetwork
2074 */
2075static int
2076__s_cvt_networks(const void *data, char **rdn,
2077	ns_ldap_entry_t **entry, ns_ldap_error_t **errorp)
2078{
2079	ns_ldap_entry_t	*e;
2080	int		rc;
2081	char		trdn[RDNSIZE];
2082	/* routine specific */
2083	struct netent	*ptr;
2084	int		max_attr = 4;
2085	int		i, j;
2086	char		cp[64];
2087	char		**nm;
2088	static		char *oclist[] = {
2089			"ipNetwork",
2090			"top",
2091			NULL
2092			};
2093
2094	if (data == NULL || rdn == NULL || entry == NULL || errorp == NULL)
2095		return (NS_LDAP_OP_FAILED);
2096	*entry = e = __s_mk_entry(oclist, max_attr);
2097	if (e == NULL)
2098		return (NS_LDAP_MEMORY);
2099
2100	/* Convert the structure */
2101	ptr = (struct netent *)data;
2102
2103	if (ptr->n_name == NULL || ptr->n_net == 0) {
2104		__ns_ldap_freeEntry(e);
2105		*entry = NULL;
2106		return (NS_LDAP_INVALID_PARAM);
2107	}
2108
2109	(void) snprintf(cp, sizeof (cp), "%d.%d.%d.%d",
2110			(ptr->n_net & 0xFF000000) >> 24,
2111			(ptr->n_net & 0x00FF0000) >> 16,
2112			(ptr->n_net & 0x0000FF00) >> 8,
2113			(ptr->n_net & 0x000000FF));
2114
2115	/* Create an appropriate rdn */
2116	(void) snprintf(trdn, RDNSIZE, "ipNetworkNumber=%s", cp);
2117	*rdn = strdup(trdn);
2118	if (*rdn == NULL) {
2119		__ns_ldap_freeEntry(e);
2120		*entry = NULL;
2121		return (NS_LDAP_MEMORY);
2122	}
2123
2124	/* Error check the data and add the attributes */
2125	if (ptr->n_aliases && ptr->n_aliases[0]) {
2126		nm = ptr->n_aliases;
2127		for (i = 0; *nm; i++, nm++)
2128			;
2129		nm = (char **)calloc(i+2, sizeof (char *));
2130		if (nm == NULL) {
2131			__s_cvt_freeEntryRdn(entry, rdn);
2132			return (NS_LDAP_MEMORY);
2133		}
2134		nm[0] = ptr->n_name;
2135		for (j = 0; j < i; j++)
2136			nm[j+1] = ptr->n_aliases[j];
2137
2138		rc = __s_add_attrlist(e, "cn", nm);
2139		free(nm);
2140		nm = NULL;
2141		if (rc != NS_LDAP_SUCCESS) {
2142			__s_cvt_freeEntryRdn(entry, rdn);
2143			return (rc);
2144		}
2145	} else {
2146		rc = __s_add_attr(e, "cn", ptr->n_name);
2147		if (rc != NS_LDAP_SUCCESS) {
2148			__s_cvt_freeEntryRdn(entry, rdn);
2149			return (rc);
2150		}
2151	}
2152
2153	rc = __s_add_attr(e, "ipNetworkNumber", cp);
2154	if (rc != NS_LDAP_SUCCESS) {
2155		__s_cvt_freeEntryRdn(entry, rdn);
2156		return (rc);
2157	}
2158
2159	return (NS_LDAP_SUCCESS);
2160
2161}
2162/*
2163 * Conversion:			netmasks
2164 * Input format:		struct _ns_netmasks
2165 * Exported objectclass:	ipNetwork
2166 */
2167static int
2168__s_cvt_netmasks(const void *data, char **rdn,
2169	ns_ldap_entry_t **entry, ns_ldap_error_t **errorp)
2170{
2171	ns_ldap_entry_t	*e;
2172	int		rc;
2173	char		trdn[RDNSIZE];
2174	/* routine specific */
2175	struct _ns_netmasks *ptr;
2176	int		max_attr = 4;
2177	static		char *oclist[] = {
2178			"ipNetwork",
2179			"top",
2180			NULL
2181			};
2182
2183	if (data == NULL || rdn == NULL || entry == NULL || errorp == NULL)
2184		return (NS_LDAP_OP_FAILED);
2185	*entry = e = __s_mk_entry(oclist, max_attr);
2186	if (e == NULL)
2187		return (NS_LDAP_MEMORY);
2188
2189	/* Convert the structure */
2190	ptr = (struct _ns_netmasks *)data;
2191
2192	if (ptr->netnumber == NULL) {
2193		__ns_ldap_freeEntry(e);
2194		*entry = NULL;
2195		return (NS_LDAP_INVALID_PARAM);
2196	}
2197
2198	/* Create an appropriate rdn */
2199	(void) snprintf(trdn, RDNSIZE, "ipNetworkNumber=%s", ptr->netnumber);
2200	*rdn = strdup(trdn);
2201	if (*rdn == NULL) {
2202		__ns_ldap_freeEntry(e);
2203		*entry = NULL;
2204		return (NS_LDAP_MEMORY);
2205	}
2206
2207	/* Error check the data and add the attributes */
2208		rc = __s_add_attr(e, "ipNetworkNumber", ptr->netnumber);
2209		if (rc != NS_LDAP_SUCCESS) {
2210			__s_cvt_freeEntryRdn(entry, rdn);
2211			return (rc);
2212		}
2213
2214	if (ptr->netmask != '\0') {
2215		rc = __s_add_attr(e, "ipNetmaskNumber", ptr->netmask);
2216		if (rc != NS_LDAP_SUCCESS) {
2217			__s_cvt_freeEntryRdn(entry, rdn);
2218			return (rc);
2219		}
2220	}
2221
2222	return (NS_LDAP_SUCCESS);
2223
2224}
2225/*
2226 * Conversion:			netgroups
2227 * Input format:		struct _ns_netgroups
2228 * Exported objectclass:	nisNetgroup
2229 */
2230static int
2231__s_cvt_netgroups(const void *data, char **rdn,
2232	ns_ldap_entry_t **entry, ns_ldap_error_t **errorp)
2233{
2234	ns_ldap_entry_t	*e;
2235	int		rc;
2236	char		trdn[RDNSIZE];
2237	/* routine specific */
2238	struct _ns_netgroups *ptr;
2239	int		max_attr = 6;
2240	int		i, j;
2241	char		**nm;
2242	static		char *oclist[] = {
2243			"nisNetgroup",
2244			"top",
2245			NULL
2246			};
2247
2248	if (data == NULL || rdn == NULL || entry == NULL || errorp == NULL)
2249		return (NS_LDAP_OP_FAILED);
2250	*entry = e = __s_mk_entry(oclist, max_attr);
2251	if (e == NULL)
2252		return (NS_LDAP_MEMORY);
2253
2254	/* Convert the structure */
2255	ptr = (struct _ns_netgroups *)data;
2256
2257	if (ptr->name == NULL) {
2258		__ns_ldap_freeEntry(e);
2259		*entry = NULL;
2260		return (NS_LDAP_INVALID_PARAM);
2261	}
2262
2263	/* Create an appropriate rdn */
2264	(void) snprintf(trdn, RDNSIZE, "cn=%s", ptr->name);
2265	*rdn = strdup(trdn);
2266	if (*rdn == NULL) {
2267		__ns_ldap_freeEntry(e);
2268		*entry = NULL;
2269		return (NS_LDAP_MEMORY);
2270	}
2271
2272	if (ptr->name != '\0') {
2273		rc = __s_add_attr(e, "cn", ptr->name);
2274		if (rc != NS_LDAP_SUCCESS) {
2275			__s_cvt_freeEntryRdn(entry, rdn);
2276			return (rc);
2277		}
2278	}
2279
2280	/* Error check the data and add the attributes */
2281	if (ptr->triplet && ptr->triplet[0]) {
2282		nm = ptr->triplet;
2283		for (i = 0; *nm; i++, nm++)
2284			;
2285		nm = (char **)calloc(i+2, sizeof (char *));
2286		if (nm == NULL) {
2287			__s_cvt_freeEntryRdn(entry, rdn);
2288			return (NS_LDAP_MEMORY);
2289		}
2290		for (j = 0; j < i; j++)
2291			nm[j] = ptr->triplet[j];
2292
2293		rc = __s_add_attrlist(e, "nisNetgroupTriple", nm);
2294		free(nm);
2295		nm = NULL;
2296		if (rc != NS_LDAP_SUCCESS) {
2297			__s_cvt_freeEntryRdn(entry, rdn);
2298			return (rc);
2299		}
2300	}
2301	if (ptr->netgroup && ptr->netgroup[0]) {
2302		nm = ptr->netgroup;
2303		for (i = 0; *nm; i++, nm++)
2304			;
2305		nm = (char **)calloc(i+2, sizeof (char *));
2306		if (nm == NULL) {
2307			__s_cvt_freeEntryRdn(entry, rdn);
2308			return (NS_LDAP_MEMORY);
2309		}
2310		for (j = 0; j < i; j++)
2311			nm[j] = ptr->netgroup[j];
2312
2313		rc = __s_add_attrlist(e, "memberNisNetgroup", nm);
2314		free(nm);
2315		nm = NULL;
2316		if (rc != NS_LDAP_SUCCESS) {
2317			__s_cvt_freeEntryRdn(entry, rdn);
2318			return (rc);
2319		}
2320	}
2321	return (NS_LDAP_SUCCESS);
2322}
2323/*
2324 * Conversion:			bootparams
2325 * Input format:		struct _ns_bootp
2326 * Exported objectclass:	bootableDevice, device
2327 */
2328static int
2329__s_cvt_bootparams(const void *data, char **rdn,
2330	ns_ldap_entry_t **entry, ns_ldap_error_t **errorp)
2331{
2332	ns_ldap_entry_t	*e;
2333	int		rc;
2334	char		trdn[RDNSIZE];
2335	/* routine specific */
2336	struct _ns_bootp *ptr;
2337	int		max_attr = 4;
2338	int		i, j;
2339	char		**nm;
2340	static		char *oclist[] = {
2341			"bootableDevice",
2342			"device",
2343			"top",
2344			NULL
2345			};
2346
2347	if (data == NULL || rdn == NULL || entry == NULL || errorp == NULL)
2348		return (NS_LDAP_OP_FAILED);
2349	*entry = e = __s_mk_entry(oclist, max_attr);
2350	if (e == NULL)
2351		return (NS_LDAP_MEMORY);
2352
2353	/* Convert the structure */
2354	ptr = (struct _ns_bootp *)data;
2355
2356	if (ptr->name == NULL) {
2357		__ns_ldap_freeEntry(e);
2358		*entry = NULL;
2359		return (NS_LDAP_INVALID_PARAM);
2360	}
2361
2362	/* Create an appropriate rdn */
2363	(void) snprintf(trdn, RDNSIZE, "cn=%s", ptr->name);
2364	*rdn = strdup(trdn);
2365	if (*rdn == NULL) {
2366		__ns_ldap_freeEntry(e);
2367		*entry = NULL;
2368		return (NS_LDAP_MEMORY);
2369	}
2370
2371	if (ptr->name != '\0') {
2372		rc = __s_add_attr(e, "cn", ptr->name);
2373		if (rc != NS_LDAP_SUCCESS) {
2374			__s_cvt_freeEntryRdn(entry, rdn);
2375			return (rc);
2376		}
2377	}
2378
2379	/* Error check the data and add the attributes */
2380	if (ptr->param && ptr->param[0]) {
2381		nm = ptr->param;
2382		for (i = 0; *nm; i++, nm++)
2383			;
2384		nm = (char **)calloc(i+2, sizeof (char *));
2385		if (nm == NULL) {
2386			__s_cvt_freeEntryRdn(entry, rdn);
2387			return (NS_LDAP_MEMORY);
2388		}
2389		for (j = 0; j < i; j++)
2390			nm[j] = ptr->param[j];
2391
2392		rc = __s_add_attrlist(e, "bootParameter", nm);
2393		free(nm);
2394		nm = NULL;
2395		if (rc != NS_LDAP_SUCCESS) {
2396			__s_cvt_freeEntryRdn(entry, rdn);
2397			return (rc);
2398		}
2399	}
2400
2401	return (NS_LDAP_SUCCESS);
2402
2403}
2404/*
2405 * Conversion:			ethers
2406 * Input format:		struct _ns_ethers
2407 * Exported objectclass:	ieee802Device, device
2408 */
2409static int
2410__s_cvt_ethers(const void *data, char **rdn,
2411	ns_ldap_entry_t **entry, ns_ldap_error_t **errorp)
2412{
2413	ns_ldap_entry_t	*e;
2414	int		rc;
2415	char		trdn[RDNSIZE];
2416	/* routine specific */
2417	struct _ns_ethers	*ptr;
2418	int		max_attr = 4;
2419	static		char *oclist[] = {
2420			"ieee802Device",
2421			"device",
2422			"top",
2423			NULL
2424			};
2425
2426	if (data == NULL || rdn == NULL || entry == NULL || errorp == NULL)
2427		return (NS_LDAP_OP_FAILED);
2428	*entry = e = __s_mk_entry(oclist, max_attr);
2429	if (e == NULL)
2430		return (NS_LDAP_MEMORY);
2431
2432	/* Convert the structure */
2433	ptr = (struct _ns_ethers *)data;
2434
2435	if (ptr->name == NULL || ptr->ether == '\0') {
2436		__ns_ldap_freeEntry(e);
2437		*entry = NULL;
2438		return (NS_LDAP_INVALID_PARAM);
2439	}
2440
2441	/* Create an appropriate rdn */
2442	(void) snprintf(trdn, RDNSIZE, "cn=%s", ptr->name);
2443	*rdn = strdup(trdn);
2444	if (*rdn == NULL) {
2445		__ns_ldap_freeEntry(e);
2446		*entry = NULL;
2447		return (NS_LDAP_MEMORY);
2448	}
2449
2450	/* Error check the data and add the attributes */
2451	rc = __s_add_attr(e, "cn", ptr->name);
2452	if (rc != NS_LDAP_SUCCESS) {
2453		__s_cvt_freeEntryRdn(entry, rdn);
2454		return (rc);
2455	}
2456
2457	rc = __s_add_attr(e, "macAddress", ptr->ether);
2458	if (rc != NS_LDAP_SUCCESS) {
2459		__s_cvt_freeEntryRdn(entry, rdn);
2460		return (rc);
2461	}
2462
2463	return (NS_LDAP_SUCCESS);
2464}
2465/*
2466 * This function is used when processing an ethers (objectclass: ieee802Device)
2467 * or a bootparams (objectclass: bootableDevice) entry, and the entry is
2468 * already found in LDAP. Since both ethers and bootparams share the same
2469 * LDAP container, we want to check that the entry found in LDAP is:
2470 * - either the same entry (same cn, same objectclass): we don't do anything
2471 *   in this case
2472 * - or an entry which does not have the objectclass we are interesting in:
2473 *   in this case, we modify the existing entry by adding the relevant
2474 *   objectclass (ieee802Device or bootableDevice) and the relevant attribute(s)
2475 *   from the attribute list previously computing by the relevant conversion
2476 *   function.
2477 *   Note: from conversion functions __s_cvt_ethers() and  __s_cvt_bootparams()
2478 *   we know that there is only 1 more attribute today to add (macAddress
2479 *   or bootParameter)
2480 */
2481#define	_MAX_ATTR_ETHBOOTP	2
2482static int
2483modify_ethers_bootp(
2484	const char *service,
2485	const char *rdn,
2486	const char *fulldn,
2487	const ns_ldap_attr_t * const *attrlist,
2488	const ns_cred_t *cred,
2489	const int flags,
2490	ns_ldap_error_t	 **errorp)
2491{
2492	char	filter[BUFSIZ];
2493	ns_ldap_result_t *resultp;
2494	int rc = 0;
2495	int i;
2496	ns_ldap_attr_t *new_attrlist[_MAX_ATTR_ETHBOOTP+1];
2497	ns_ldap_attr_t new_attrlist0;
2498	char *new_attrvalue0[1];
2499	const ns_ldap_attr_t	* const *aptr = attrlist;
2500	ns_ldap_attr_t *aptr2;
2501	ns_ldap_error_t	 *new_errorp = NULL;
2502
2503	if (rdn == NULL || fulldn == NULL || attrlist == NULL ||
2504		errorp == NULL || service == NULL)
2505		return (NS_LDAP_OP_FAILED);
2506
2507	bzero(&new_attrlist, sizeof (new_attrlist));
2508	bzero(&new_attrlist0, sizeof (new_attrlist0));
2509	new_attrlist[0] = &new_attrlist0;
2510	new_attrlist[0]->attrvalue = new_attrvalue0;
2511
2512	new_attrlist[0]->attrname = "objectclass";
2513	new_attrlist[0]->value_count = 1;
2514	if (strcasecmp(service, "ethers") == NULL) {
2515		(void) snprintf(&filter[0], sizeof (filter),
2516			"(&(objectClass=ieee802Device)(%s))",
2517			rdn);
2518		new_attrlist[0]->attrvalue[0] = "ieee802Device";
2519	} else {
2520		(void) snprintf(&filter[0], sizeof (filter),
2521			"(&(objectClass=bootableDevice)(%s))",
2522			rdn);
2523		new_attrlist[0]->attrvalue[0] = "bootableDevice";
2524	}
2525
2526	rc =  __ns_ldap_list(service, filter, NULL, (const char **)NULL,
2527		NULL, NS_LDAP_SCOPE_SUBTREE, &resultp, &new_errorp,
2528		NULL, NULL);
2529
2530	switch (rc) {
2531	case NS_LDAP_SUCCESS:
2532		/*
2533		 * entry already exists for this service
2534		 * return NS_LDAP_INTERNAL and do not modify the incoming errorp
2535		 */
2536		rc = NS_LDAP_INTERNAL;
2537		break;
2538	case NS_LDAP_NOTFOUND:
2539		/*
2540		 * entry not found with the given objectclasss but entry exists
2541		 * hence add the relevant attribute (macAddress or bootparams).
2542		 */
2543		i = 1;
2544		while (*aptr && (i < _MAX_ATTR_ETHBOOTP)) {
2545			/* aptr2 needed here to avoid lint warning */
2546			aptr2 = (ns_ldap_attr_t *)*aptr++;
2547			if ((strcasecmp(aptr2->attrname, "cn") != 0) &&
2548				(strcasecmp(aptr2->attrname,
2549					"objectclass") != 0)) {
2550				    new_attrlist[i++] =	(ns_ldap_attr_t *)aptr2;
2551			}
2552		}
2553
2554		if (i != _MAX_ATTR_ETHBOOTP) {
2555			/* we haven't found all expected attributes */
2556			rc = NS_LDAP_OP_FAILED;
2557			break;
2558		}
2559
2560		aptr = (const ns_ldap_attr_t	* const *) new_attrlist;
2561		/* clean errorp first */
2562		(void) __ns_ldap_freeError(errorp);
2563		rc =  __ns_ldap_addAttr(service, fulldn, aptr, cred, flags,
2564			errorp);
2565		break;
2566	default:
2567		/*
2568		 * unexpected error happenned
2569		 * returning relevant error
2570		 */
2571		(void) __ns_ldap_freeError(errorp);
2572		*errorp = new_errorp;
2573		break;
2574	}
2575
2576	return (rc);
2577}
2578
2579/*
2580 * Conversion:			publickey
2581 * Input format:		struct _ns_pubkey
2582 * Exported objectclass:	NisKeyObject
2583 */
2584static int
2585__s_cvt_publickey(const void *data, char **rdn,
2586	ns_ldap_entry_t **entry, ns_ldap_error_t **errorp)
2587{
2588	ns_ldap_entry_t	*e;
2589	int		rc;
2590	char		trdn[RDNSIZE];
2591	/* routine specific */
2592	struct _ns_pubkey	*ptr;
2593	int		max_attr = 3;
2594	static		char *oclist[] = {
2595			"NisKeyObject",
2596			NULL
2597			};
2598
2599	if (data == NULL || rdn == NULL || entry == NULL || errorp == NULL)
2600		return (NS_LDAP_OP_FAILED);
2601	*entry = e = __s_mk_entry(oclist, max_attr);
2602	if (e == NULL)
2603		return (NS_LDAP_MEMORY);
2604
2605	/* Convert the structure */
2606	ptr = (struct _ns_pubkey *)data;
2607
2608	if (ptr->name == NULL || ptr->pubkey == '\0' || ptr->privkey == '\0') {
2609		__ns_ldap_freeEntry(e);
2610		*entry = NULL;
2611		return (NS_LDAP_INVALID_PARAM);
2612	}
2613
2614	/* Create an appropriate rdn */
2615	if (ptr->hostcred == NS_HOSTCRED_FALSE)
2616		(void) snprintf(trdn, RDNSIZE, "uid=%s", ptr->name);
2617	else
2618		(void) snprintf(trdn, RDNSIZE, "cn=%s", ptr->name);
2619	*rdn = strdup(trdn);
2620	if (*rdn == NULL) {
2621		__ns_ldap_freeEntry(e);
2622		*entry = NULL;
2623		return (NS_LDAP_MEMORY);
2624	}
2625
2626	/* Error check the data and add the attributes */
2627
2628	rc = __s_add_attr(e, "nisPublickey", ptr->pubkey);
2629	if (rc != NS_LDAP_SUCCESS) {
2630		__s_cvt_freeEntryRdn(entry, rdn);
2631		return (rc);
2632	}
2633
2634	rc = __s_add_attr(e, "nisSecretkey", ptr->privkey);
2635	if (rc != NS_LDAP_SUCCESS) {
2636		__s_cvt_freeEntryRdn(entry, rdn);
2637		return (rc);
2638	}
2639
2640	return (NS_LDAP_SUCCESS);
2641}
2642/*
2643 * Conversion:			aliases
2644 * Input format:		struct _ns_alias
2645 * Exported objectclass:	mailGroup
2646 */
2647static int
2648__s_cvt_aliases(const void *data, char **rdn,
2649	ns_ldap_entry_t **entry, ns_ldap_error_t **errorp)
2650{
2651	ns_ldap_entry_t	*e;
2652	int		rc;
2653	char		trdn[RDNSIZE];
2654	/* routine specific */
2655	struct _ns_alias *ptr;
2656	int		max_attr = 4;
2657	int		i, j;
2658	char		**nm;
2659	static		char *oclist[] = {
2660			"mailGroup",
2661			"top",
2662			NULL
2663			};
2664
2665	if (data == NULL || rdn == NULL || entry == NULL || errorp == NULL)
2666		return (NS_LDAP_OP_FAILED);
2667	*entry = e = __s_mk_entry(oclist, max_attr);
2668	if (e == NULL)
2669		return (NS_LDAP_MEMORY);
2670
2671	/* Convert the structure */
2672	ptr = (struct _ns_alias *)data;
2673
2674	if (ptr->alias == NULL) {
2675		__ns_ldap_freeEntry(e);
2676		*entry = NULL;
2677		return (NS_LDAP_INVALID_PARAM);
2678	}
2679
2680	/* Create an appropriate rdn */
2681	(void) snprintf(trdn, RDNSIZE, "cn=%s", ptr->alias);
2682	*rdn = strdup(trdn);
2683	if (*rdn == NULL) {
2684		__ns_ldap_freeEntry(e);
2685		*entry = NULL;
2686		return (NS_LDAP_MEMORY);
2687	}
2688
2689	if (ptr->alias != '\0') {
2690		rc = __s_add_attr(e, "mail", (char *)ptr->alias);
2691		if (rc != NS_LDAP_SUCCESS) {
2692			__s_cvt_freeEntryRdn(entry, rdn);
2693			return (rc);
2694		}
2695	}
2696
2697	/* Error check the data and add the attributes */
2698	if (ptr->member && ptr->member[0]) {
2699		nm = ptr->member;
2700		for (i = 0; *nm; i++, nm++)
2701			;
2702		nm = (char **)calloc(i+2, sizeof (char *));
2703		if (nm == NULL) {
2704			__s_cvt_freeEntryRdn(entry, rdn);
2705			return (NS_LDAP_MEMORY);
2706		}
2707		for (j = 0; j < i; j++)
2708			nm[j] = ptr->member[j];
2709
2710		rc = __s_add_attrlist(e, "mgrpRFC822MailMember", nm);
2711		free(nm);
2712		nm = NULL;
2713		if (rc != NS_LDAP_SUCCESS) {
2714			__s_cvt_freeEntryRdn(entry, rdn);
2715			return (rc);
2716		}
2717	}
2718
2719	return (NS_LDAP_SUCCESS);
2720
2721}
2722/*
2723 * Conversion:			automount
2724 * Input format:		struct _ns_automount
2725 * Exported objectclass:	automount
2726 */
2727static int
2728__s_cvt_auto_mount(const void *data, char **rdn,
2729	ns_ldap_entry_t **entry, ns_ldap_error_t **errorp)
2730{
2731	ns_ldap_entry_t	*e;
2732	int		rc;
2733	char		trdn[RDNSIZE];
2734	/* routine specific */
2735	struct _ns_automount *ptr;
2736	int		max_attr = 6;
2737	void		**paramVal = NULL;
2738	char		**mappedschema = NULL;
2739	int		version1 = 0;
2740	static		char *oclist[] = {
2741			NULL,
2742			"top",
2743			NULL
2744			};
2745
2746	if (data == NULL || rdn == NULL || entry == NULL || errorp == NULL)
2747		return (NS_LDAP_OP_FAILED);
2748
2749	/* determine profile version number */
2750	rc = __ns_ldap_getParam(NS_LDAP_FILE_VERSION_P, &paramVal, errorp);
2751	if (paramVal && *paramVal &&
2752		strcasecmp(*paramVal, NS_LDAP_VERSION_1) == 0)
2753		version1 = 1;
2754	if (paramVal)
2755		(void) __ns_ldap_freeParam(&paramVal);
2756	if (rc && errorp)
2757		(void) __ns_ldap_freeError(errorp);
2758
2759	/* use old schema for version 1 profiles */
2760	if (version1)
2761		oclist[0] = "nisObject";
2762	else
2763		oclist[0] = "automount";
2764
2765	*entry = e = __s_mk_entry(oclist, max_attr);
2766	if (e == NULL)
2767		return (NS_LDAP_MEMORY);
2768
2769	/* Convert the structure */
2770	ptr = (struct _ns_automount *)data;
2771
2772	if (ptr->key == NULL || ptr->value == '\0' || ptr->mapname == '\0') {
2773		__ns_ldap_freeEntry(e);
2774		*entry = NULL;
2775		return (NS_LDAP_INVALID_PARAM);
2776	}
2777
2778	/* Create an appropriate rdn */
2779	(void) snprintf(trdn, RDNSIZE, version1 ? "cn=%s" : "automountKey=%s",
2780		ptr->key);
2781	*rdn = strdup(trdn);
2782	if (*rdn == NULL) {
2783		__ns_ldap_freeEntry(e);
2784		*entry = NULL;
2785		return (NS_LDAP_MEMORY);
2786	}
2787
2788	if (ptr->key != '\0') {
2789		rc = __s_add_attr(e, version1 ? "cn" : "automountKey",
2790		(char *)ptr->key);
2791		if (rc != NS_LDAP_SUCCESS) {
2792			__s_cvt_freeEntryRdn(entry, rdn);
2793			return (rc);
2794		}
2795	}
2796
2797	rc = __s_add_attr(e, version1 ? "nisMapEntry" : "automountInformation",
2798		(char *)ptr->value);
2799	if (rc != NS_LDAP_SUCCESS) {
2800		__s_cvt_freeEntryRdn(entry, rdn);
2801		return (rc);
2802	}
2803
2804	/*
2805	 * even for version 2, if automount is mapped to nisObject we
2806	 * still need 'nisMapName' attribute
2807	 */
2808	mappedschema = __ns_ldap_getMappedObjectClass("automount", "automount");
2809	if (mappedschema && mappedschema[0] &&
2810		strcasecmp(mappedschema[0], "nisObject") == 0)
2811		version1 = 1;
2812	if (mappedschema)
2813		__s_api_free2dArray(mappedschema);
2814
2815	if (version1) {
2816		rc = __s_add_attr(e, "nisMapName", (char *)ptr->mapname);
2817		if (rc != NS_LDAP_SUCCESS) {
2818			__s_cvt_freeEntryRdn(entry, rdn);
2819			return (rc);
2820		}
2821	}
2822
2823	return (NS_LDAP_SUCCESS);
2824}
2825/*
2826 * Conversion:			auth_attr
2827 * Input format:		authstr_t
2828 * Exported objectclass:	SolarisAuthAttr
2829 */
2830static int
2831__s_cvt_authattr(const void *data, char **rdn,
2832	ns_ldap_entry_t **entry, ns_ldap_error_t **errorp)
2833{
2834	ns_ldap_entry_t	*e;
2835	int		rc;
2836	char		trdn[RDNSIZE];
2837	/* routine specific */
2838	authstr_t	*ptr;
2839	int		max_attr = 6;
2840	static		char *oclist[] = {
2841			"SolarisAuthAttr",
2842			"top",
2843			NULL
2844			};
2845
2846	if (data == NULL || rdn == NULL || entry == NULL || errorp == NULL)
2847		return (NS_LDAP_OP_FAILED);
2848
2849	*entry = e = __s_mk_entry(oclist, max_attr);
2850	if (e == NULL)
2851		return (NS_LDAP_MEMORY);
2852
2853	/* Convert the structure */
2854	ptr = (authstr_t *)data;
2855
2856	if (ptr->name == NULL || ptr->name[0] == '\0' || ptr->attr == NULL) {
2857		__ns_ldap_freeEntry(e);
2858		*entry = NULL;
2859		return (NS_LDAP_INVALID_PARAM);
2860	}
2861
2862	/* Create an appropriate rdn */
2863	(void) snprintf(trdn, RDNSIZE, "cn=%s", ptr->name);
2864	*rdn = strdup(trdn);
2865	if (*rdn == NULL) {
2866		__ns_ldap_freeEntry(e);
2867		*entry = NULL;
2868		return (NS_LDAP_MEMORY);
2869	}
2870
2871	rc = __s_add_attr(e, "cn", ptr->name);
2872	if (rc != NS_LDAP_SUCCESS) {
2873		__s_cvt_freeEntryRdn(entry, rdn);
2874		return (rc);
2875	}
2876
2877	rc = __s_add_attr(e, "SolarisAttrKeyValue", ptr->attr);
2878	if (rc != NS_LDAP_SUCCESS) {
2879		__s_cvt_freeEntryRdn(entry, rdn);
2880		return (rc);
2881	}
2882
2883	if (ptr->res1 != NULL) {
2884		rc = __s_add_attr(e, "SolarisAttrReserved1", ptr->res1);
2885		if (rc != NS_LDAP_SUCCESS) {
2886			__s_cvt_freeEntryRdn(entry, rdn);
2887			return (rc);
2888		}
2889	}
2890
2891	if (ptr->res2 != NULL) {
2892		rc = __s_add_attr(e, "SolarisAttrReserved2", ptr->res2);
2893		if (rc != NS_LDAP_SUCCESS) {
2894			__s_cvt_freeEntryRdn(entry, rdn);
2895			return (rc);
2896		}
2897	}
2898
2899	if (ptr->short_desc != NULL) {
2900		rc = __s_add_attr(e, "SolarisAttrShortDesc", ptr->short_desc);
2901		if (rc != NS_LDAP_SUCCESS) {
2902			__s_cvt_freeEntryRdn(entry, rdn);
2903			return (rc);
2904		}
2905	}
2906
2907	if (ptr->long_desc != NULL) {
2908		rc = __s_add_attr(e, "SolarisAttrLongDesc", ptr->long_desc);
2909		if (rc != NS_LDAP_SUCCESS) {
2910			__s_cvt_freeEntryRdn(entry, rdn);
2911			return (rc);
2912		}
2913	}
2914
2915	return (NS_LDAP_SUCCESS);
2916}
2917/*
2918 * Conversion:			exec_attr
2919 * Input format:		execstr_t
2920 * Exported objectclass:	SolarisExecAttr
2921 */
2922static int
2923__s_cvt_execattr(const void *data, char **rdn,
2924	ns_ldap_entry_t **entry, ns_ldap_error_t **errorp)
2925{
2926	ns_ldap_entry_t	*e;
2927	int		rc;
2928	char		trdn[RDNSIZE];
2929	/* routine specific */
2930	execstr_t	*ptr;
2931	int		max_attr = 7;
2932	static		char *oclist[] = {
2933			"SolarisExecAttr",
2934			"SolarisProfAttr",
2935			"top",
2936			NULL
2937			};
2938
2939	if (data == NULL || rdn == NULL || entry == NULL || errorp == NULL)
2940		return (NS_LDAP_OP_FAILED);
2941
2942	*entry = e = __s_mk_entry(oclist, max_attr);
2943	if (e == NULL)
2944		return (NS_LDAP_MEMORY);
2945
2946	/* Convert the structure */
2947	ptr = (execstr_t *)data;
2948
2949	if (ptr->name == NULL || ptr->name[0] == '\0' ||
2950	    ptr->policy == NULL || ptr->policy[0] == '\0' ||
2951	    ptr->type == NULL || ptr->type[0] == '\0' ||
2952	    ptr->id == NULL || ptr->id[0] == '\0') {
2953		__ns_ldap_freeEntry(e);
2954		*entry = NULL;
2955		return (NS_LDAP_INVALID_PARAM);
2956	}
2957
2958	/* Create an appropriate rdn */
2959	(void) snprintf(trdn, RDNSIZE, "cn=%s+SolarisKernelSecurityPolicy=%s"
2960	    "+SolarisProfileType=%s+SolarisProfileId=%s",
2961	    ptr->name, ptr->policy, ptr->type, ptr->id);
2962	*rdn = strdup(trdn);
2963	if (*rdn == NULL) {
2964		__ns_ldap_freeEntry(e);
2965		*entry = NULL;
2966		return (NS_LDAP_MEMORY);
2967	}
2968
2969	rc = __s_add_attr(e, "cn", ptr->name);
2970	if (rc != NS_LDAP_SUCCESS) {
2971		__s_cvt_freeEntryRdn(entry, rdn);
2972		return (rc);
2973	}
2974
2975	rc = __s_add_attr(e, "SolarisKernelSecurityPolicy", ptr->policy);
2976	if (rc != NS_LDAP_SUCCESS) {
2977		__s_cvt_freeEntryRdn(entry, rdn);
2978		return (rc);
2979	}
2980
2981	rc = __s_add_attr(e, "SolarisProfileType", ptr->type);
2982	if (rc != NS_LDAP_SUCCESS) {
2983		__s_cvt_freeEntryRdn(entry, rdn);
2984		return (rc);
2985	}
2986
2987	rc = __s_add_attr(e, "SolarisProfileId", ptr->id);
2988	if (rc != NS_LDAP_SUCCESS) {
2989		__s_cvt_freeEntryRdn(entry, rdn);
2990		return (rc);
2991	}
2992
2993	rc = __s_add_attr(e, "SolarisAttrKeyValue", ptr->attr);
2994	if (rc != NS_LDAP_SUCCESS) {
2995		__s_cvt_freeEntryRdn(entry, rdn);
2996		return (rc);
2997	}
2998
2999	if (ptr->res1 != NULL) {
3000		rc = __s_add_attr(e, "SolarisAttrRes1", ptr->res1);
3001		if (rc != NS_LDAP_SUCCESS) {
3002			__s_cvt_freeEntryRdn(entry, rdn);
3003			return (rc);
3004		}
3005	}
3006
3007	if (ptr->res2 != NULL) {
3008		rc = __s_add_attr(e, "SolarisAttrRes2", ptr->res2);
3009		if (rc != NS_LDAP_SUCCESS) {
3010			__s_cvt_freeEntryRdn(entry, rdn);
3011			return (rc);
3012		}
3013	}
3014
3015	return (NS_LDAP_SUCCESS);
3016}
3017/*
3018 * Conversion:			prof_attr
3019 * Input format:		profstr_t
3020 * Exported objectclass:	SolarisProfAttr
3021 */
3022static int
3023__s_cvt_profattr(const void *data, char **rdn,
3024	ns_ldap_entry_t **entry, ns_ldap_error_t **errorp)
3025{
3026	ns_ldap_entry_t	*e;
3027	int		rc;
3028	char		trdn[RDNSIZE];
3029	/* routine specific */
3030	profstr_t	*ptr;
3031	int		max_attr = 5;
3032	static		char *oclist[] = {
3033			"SolarisProfAttr",
3034			"top",
3035			NULL
3036			};
3037
3038	if (data == NULL || rdn == NULL || entry == NULL || errorp == NULL)
3039		return (NS_LDAP_OP_FAILED);
3040
3041	*entry = e = __s_mk_entry(oclist, max_attr);
3042	if (e == NULL)
3043		return (NS_LDAP_MEMORY);
3044
3045	/* Convert the structure */
3046	ptr = (profstr_t *)data;
3047
3048	if (ptr->name == NULL || ptr->name[0] == '\0' || ptr->attr == NULL) {
3049		__ns_ldap_freeEntry(e);
3050		*entry = NULL;
3051		return (NS_LDAP_INVALID_PARAM);
3052	}
3053
3054	/* Create an appropriate rdn */
3055	(void) snprintf(trdn, RDNSIZE, "cn=%s", ptr->name);
3056	*rdn = strdup(trdn);
3057	if (*rdn == NULL) {
3058		__ns_ldap_freeEntry(e);
3059		*entry = NULL;
3060		return (NS_LDAP_MEMORY);
3061	}
3062
3063	rc = __s_add_attr(e, "cn", ptr->name);
3064	if (rc != NS_LDAP_SUCCESS) {
3065		__s_cvt_freeEntryRdn(entry, rdn);
3066		return (rc);
3067	}
3068
3069	rc = __s_add_attr(e, "SolarisAttrKeyValue", ptr->attr);
3070	if (rc != NS_LDAP_SUCCESS) {
3071		__s_cvt_freeEntryRdn(entry, rdn);
3072		return (rc);
3073	}
3074
3075	if (ptr->res1 != NULL) {
3076		rc = __s_add_attr(e, "SolarisAttrReserved1", ptr->res1);
3077		if (rc != NS_LDAP_SUCCESS) {
3078			__s_cvt_freeEntryRdn(entry, rdn);
3079			return (rc);
3080		}
3081	}
3082
3083	if (ptr->res2 != NULL) {
3084		rc = __s_add_attr(e, "SolarisAttrReserved2", ptr->res2);
3085		if (rc != NS_LDAP_SUCCESS) {
3086			__s_cvt_freeEntryRdn(entry, rdn);
3087			return (rc);
3088		}
3089	}
3090
3091	if (ptr->desc != NULL) {
3092		rc = __s_add_attr(e, "SolarisAttrLongDesc", ptr->desc);
3093		if (rc != NS_LDAP_SUCCESS) {
3094			__s_cvt_freeEntryRdn(entry, rdn);
3095			return (rc);
3096		}
3097	}
3098
3099	return (NS_LDAP_SUCCESS);
3100}
3101/*
3102 * Conversion:			user_attr
3103 * Input format:		userstr_t
3104 * Exported objectclass:	SolarisUserAttr
3105 */
3106static int
3107__s_cvt_userattr(const void *data, char **rdn,
3108	ns_ldap_entry_t **entry, ns_ldap_error_t **errorp)
3109{
3110	ns_ldap_entry_t	*e;
3111	int		rc;
3112	char		trdn[RDNSIZE];
3113	/* routine specific */
3114	userstr_t	*ptr;
3115	int		max_attr = 5;
3116	static		char *oclist[] = {
3117			"SolarisUserAttr",
3118			NULL
3119			};
3120
3121	if (data == NULL || rdn == NULL || entry == NULL || errorp == NULL)
3122		return (NS_LDAP_OP_FAILED);
3123
3124	*entry = e = __s_mk_entry(oclist, max_attr);
3125	if (e == NULL)
3126		return (NS_LDAP_MEMORY);
3127
3128	/* Convert the structure */
3129	ptr = (userstr_t *)data;
3130
3131	if (ptr->name == NULL || ptr->name[0] == '\0' ||
3132	    ptr->attr == NULL) {
3133		__ns_ldap_freeEntry(e);
3134		*entry = NULL;
3135		return (NS_LDAP_INVALID_PARAM);
3136	}
3137
3138	/* Create an appropriate rdn */
3139	(void) snprintf(trdn, RDNSIZE, "uid=%s", ptr->name);
3140	*rdn = strdup(trdn);
3141	if (*rdn == NULL) {
3142		__ns_ldap_freeEntry(e);
3143		*entry = NULL;
3144		return (NS_LDAP_MEMORY);
3145	}
3146
3147	/*
3148	 * SolarisUserAttr has no uid attribute
3149	 */
3150
3151	rc = __s_add_attr(e, "SolarisAttrKeyValue", ptr->attr);
3152	if (rc != NS_LDAP_SUCCESS) {
3153		__s_cvt_freeEntryRdn(entry, rdn);
3154		return (rc);
3155	}
3156
3157	if (ptr->qualifier != NULL) {
3158		rc = __s_add_attr(e, "SolarisUserQualifier", ptr->qualifier);
3159		if (rc != NS_LDAP_SUCCESS) {
3160			__s_cvt_freeEntryRdn(entry, rdn);
3161			return (rc);
3162		}
3163	}
3164
3165	if (ptr->res1 != NULL) {
3166		rc = __s_add_attr(e, "SolarisAttrReserved1", ptr->res1);
3167		if (rc != NS_LDAP_SUCCESS) {
3168			__s_cvt_freeEntryRdn(entry, rdn);
3169			return (rc);
3170		}
3171	}
3172
3173	if (ptr->res2 != NULL) {
3174		rc = __s_add_attr(e, "SolarisAttrReserved2", ptr->res2);
3175		if (rc != NS_LDAP_SUCCESS) {
3176			__s_cvt_freeEntryRdn(entry, rdn);
3177			return (rc);
3178		}
3179	}
3180
3181	return (NS_LDAP_SUCCESS);
3182}
3183/*
3184 * Conversion:			audit_user
3185 * Input format:		au_user_str_t
3186 * Exported objectclass:	SolarisAuditUser
3187 */
3188static int
3189__s_cvt_audituser(const void *data, char **rdn,
3190	ns_ldap_entry_t **entry, ns_ldap_error_t **errorp)
3191{
3192	ns_ldap_entry_t	*e;
3193	int		rc;
3194	char		trdn[RDNSIZE];
3195	/* routine specific */
3196	au_user_str_t	*ptr;
3197	int		max_attr = 3;
3198	static		char *oclist[] = {
3199			"SolarisAuditUser",
3200			NULL
3201			};
3202
3203	if (data == NULL || rdn == NULL || entry == NULL || errorp == NULL)
3204		return (NS_LDAP_OP_FAILED);
3205
3206	*entry = e = __s_mk_entry(oclist, max_attr);
3207	if (e == NULL)
3208		return (NS_LDAP_MEMORY);
3209
3210	/* Convert the structure */
3211	ptr = (au_user_str_t *)data;
3212
3213	if (ptr->au_name == NULL || ptr->au_name[0] == '\0') {
3214		__ns_ldap_freeEntry(e);
3215		*entry = NULL;
3216		return (NS_LDAP_INVALID_PARAM);
3217	}
3218
3219	/* Create an appropriate rdn */
3220	(void) snprintf(trdn, RDNSIZE, "uid=%s", ptr->au_name);
3221	*rdn = strdup(trdn);
3222	if (*rdn == NULL) {
3223		__ns_ldap_freeEntry(e);
3224		*entry = NULL;
3225		return (NS_LDAP_MEMORY);
3226	}
3227
3228	/*
3229	 * Solaris AuditUser has no uid attribute
3230	 */
3231
3232	if (ptr->au_always != NULL) {
3233		rc = __s_add_attr(e, "SolarisAuditAlways", ptr->au_always);
3234		if (rc != NS_LDAP_SUCCESS) {
3235			__s_cvt_freeEntryRdn(entry, rdn);
3236			return (rc);
3237		}
3238	}
3239
3240	if (ptr->au_never != NULL) {
3241		rc = __s_add_attr(e, "SolarisAuditNever", ptr->au_never);
3242		if (rc != NS_LDAP_SUCCESS) {
3243			__s_cvt_freeEntryRdn(entry, rdn);
3244			return (rc);
3245		}
3246	}
3247
3248	return (NS_LDAP_SUCCESS);
3249}
3250/*
3251 * Conversion:			tnrhtp
3252 * Input format:		tsol_tpstr_t
3253 * Exported objectclass:	ipTnetTemplate
3254 */
3255static int
3256__s_cvt_tnrhtp(const void *data, char **rdn,
3257	ns_ldap_entry_t **entry, ns_ldap_error_t **errorp)
3258{
3259	ns_ldap_entry_t	*e;
3260	int		rc;
3261	char		trdn[RDNSIZE];
3262	/* routine specific */
3263	int		max_attr = 2;
3264	tsol_tpstr_t	*ptr;
3265	static		char *oclist[] = {
3266			"ipTnetTemplate",
3267			"top",
3268			NULL
3269			};
3270
3271	if (data == NULL || rdn == NULL || entry == NULL || errorp == NULL)
3272		return (NS_LDAP_OP_FAILED);
3273
3274	*entry = e = __s_mk_entry(oclist, max_attr);
3275	if (e == NULL)
3276		return (NS_LDAP_MEMORY);
3277
3278	/* Convert the structure */
3279	ptr = (tsol_tpstr_t *)data;
3280
3281	if ((ptr->template == NULL) || (strlen(ptr->template) <= 1)) {
3282		__ns_ldap_freeEntry(e);
3283		*entry = NULL;
3284		return (NS_LDAP_INVALID_PARAM);
3285	}
3286
3287	/* Create an appropriate rdn */
3288	(void) snprintf(trdn, RDNSIZE, "ipTnetTemplateName=%s", ptr->template);
3289	*rdn = strdup(trdn);
3290	if (*rdn == NULL) {
3291		__ns_ldap_freeEntry(e);
3292		*entry = NULL;
3293		return (NS_LDAP_MEMORY);
3294	}
3295
3296	rc = __s_add_attr(e, "ipTnetTemplateName", ptr->template);
3297	if (rc != NS_LDAP_SUCCESS) {
3298		__s_cvt_freeEntryRdn(entry, rdn);
3299		return (rc);
3300	}
3301
3302	rc = __s_add_attr(e, "SolarisAttrKeyValue", ptr->attrs);
3303	if (rc != NS_LDAP_SUCCESS) {
3304		__s_cvt_freeEntryRdn(entry, rdn);
3305		return (rc);
3306	}
3307
3308	return (NS_LDAP_SUCCESS);
3309}
3310/*
3311 * Conversion:			tnrhdb
3312 * Input format:		tsol_rhstr_t
3313 * Exported objectclass:	ipTnetHost
3314 */
3315static int
3316__s_cvt_tnrhdb(const void *data, char **rdn,
3317	ns_ldap_entry_t **entry, ns_ldap_error_t **errorp)
3318{
3319	ns_ldap_entry_t	*e;
3320	int		rc;
3321	char		trdn[RDNSIZE];
3322	/* routine specific */
3323	tsol_rhstr_t	*ptr;
3324	int		max_attr = 2;
3325	static		char *oclist[] = {
3326			"ipTnetHost",
3327			"ipTnetTemplate",
3328			"top",
3329			NULL
3330			};
3331
3332	if (data == NULL || rdn == NULL || entry == NULL || errorp == NULL)
3333		return (NS_LDAP_OP_FAILED);
3334
3335	*entry = e = __s_mk_entry(oclist, max_attr);
3336	if (e == NULL)
3337		return (NS_LDAP_MEMORY);
3338
3339	/* Convert the structure */
3340	ptr = (tsol_rhstr_t *)data;
3341
3342	if ((ptr->address == NULL) || (strlen(ptr->address) <= 1) ||
3343	    (ptr->template == NULL) || (strlen(ptr->template) <= 1)) {
3344		__ns_ldap_freeEntry(e);
3345		*entry = NULL;
3346		return (NS_LDAP_INVALID_PARAM);
3347	}
3348
3349	/* Create an appropriate rdn */
3350	(void) snprintf(trdn, RDNSIZE, "ipTnetNumber=%s", ptr->address);
3351	*rdn = strdup(trdn);
3352	if (*rdn == NULL) {
3353		__ns_ldap_freeEntry(e);
3354		*entry = NULL;
3355		return (NS_LDAP_MEMORY);
3356	}
3357
3358	rc = __s_add_attr(e, "ipTnetNumber", ptr->address);
3359	if (rc != NS_LDAP_SUCCESS) {
3360		__s_cvt_freeEntryRdn(entry, rdn);
3361		return (rc);
3362	}
3363
3364	rc = __s_add_attr(e, "ipTnetTemplateName", ptr->template);
3365	if (rc != NS_LDAP_SUCCESS) {
3366		__s_cvt_freeEntryRdn(entry, rdn);
3367		return (rc);
3368	}
3369
3370	return (NS_LDAP_SUCCESS);
3371}
3372/*
3373 * Add Typed Entry Conversion data structures
3374 */
3375
3376typedef struct	__ns_cvt_type {
3377	const char	*service;
3378	int		flags;
3379#define	AE		1	/* alway add entries */
3380	int		(*cvt_rtn)(const void *data,
3381				char		**rdn,
3382				ns_ldap_entry_t	**entry,
3383				ns_ldap_error_t	**errorp);
3384} __ns_cvt_type_t;
3385
3386static __ns_cvt_type_t __s_cvtlist[] = {
3387	{ NS_LDAP_TYPE_PASSWD,		0, __s_cvt_passwd },
3388	{ NS_LDAP_TYPE_GROUP,		0, __s_cvt_group },
3389	{ NS_LDAP_TYPE_HOSTS,		0, __s_cvt_hosts },
3390	{ NS_LDAP_TYPE_IPNODES,		0, __s_cvt_hosts },
3391	{ NS_LDAP_TYPE_RPC,		0, __s_cvt_rpc },
3392	{ NS_LDAP_TYPE_PROTOCOLS,	0, __s_cvt_protocols },
3393	{ NS_LDAP_TYPE_NETWORKS,	0, __s_cvt_networks },
3394	{ NS_LDAP_TYPE_NETGROUP,	0, __s_cvt_netgroups },
3395	{ NS_LDAP_TYPE_ALIASES,		0, __s_cvt_aliases },
3396	{ NS_LDAP_TYPE_SERVICES,	0, __s_cvt_services },
3397	{ NS_LDAP_TYPE_ETHERS,		0, __s_cvt_ethers },
3398	{ NS_LDAP_TYPE_SHADOW,		0, __s_cvt_shadow },
3399	{ NS_LDAP_TYPE_NETMASKS,	0, __s_cvt_netmasks },
3400	{ NS_LDAP_TYPE_BOOTPARAMS,	0, __s_cvt_bootparams },
3401	{ NS_LDAP_TYPE_AUTHATTR,	0, __s_cvt_authattr },
3402	{ NS_LDAP_TYPE_EXECATTR,	0, __s_cvt_execattr },
3403	{ NS_LDAP_TYPE_PROFILE,		0, __s_cvt_profattr },
3404	{ NS_LDAP_TYPE_USERATTR,	AE, __s_cvt_userattr },
3405	{ NS_LDAP_TYPE_AUTOMOUNT,	0, __s_cvt_auto_mount },
3406	{ NS_LDAP_TYPE_PUBLICKEY,	AE, __s_cvt_publickey },
3407	{ NS_LDAP_TYPE_AUUSER,		AE, __s_cvt_audituser },
3408	{ NS_LDAP_TYPE_TNRHTP,		0,  __s_cvt_tnrhtp },
3409	{ NS_LDAP_TYPE_TNRHDB,		0,  __s_cvt_tnrhdb },
3410	{ NULL,				0, NULL },
3411};
3412
3413/*
3414 * Add Typed Entry Routine
3415 */
3416
3417/*ARGSUSED*/
3418int  __ns_ldap_addTypedEntry(
3419	const char *servicetype,
3420	const char *basedn,
3421	const void *data,
3422	const int  create,
3423	const ns_cred_t *cred,
3424	const int flags,
3425	ns_ldap_error_t **errorp)
3426{
3427	char			*rdn = NULL, *fulldn = NULL;
3428	void			**paramVal = NULL;
3429	ns_ldap_entry_t 	*entry = NULL;
3430	const ns_ldap_attr_t	*const *modattrlist;
3431	ns_ldap_search_desc_t	**sdlist;
3432	char			**dns = NULL;
3433	char			trdn[RDNSIZE];
3434	char			service[BUFSIZE];
3435	int			rc = 0;
3436	int			automount = 0;
3437	int			i, s;
3438
3439	rc = NS_LDAP_OP_FAILED;
3440	for (s = 0; __s_cvtlist[s].service != NULL; s++) {
3441		if (__s_cvtlist[s].cvt_rtn == NULL)
3442			continue;
3443		if (strcasecmp(__s_cvtlist[s].service, servicetype) == 0)
3444			break;
3445		/* Or, check if the servicetype is  auto_ */
3446		if (strcmp(__s_cvtlist[s].service,
3447		    NS_LDAP_TYPE_AUTOMOUNT) == 0 &&
3448		    strncasecmp(servicetype, NS_LDAP_TYPE_AUTOMOUNT,
3449		    sizeof (NS_LDAP_TYPE_AUTOMOUNT) - 1) == 0) {
3450			automount++;
3451			break;
3452		}
3453	}
3454	if (__s_cvtlist[s].service == NULL)
3455		return (rc);
3456
3457	/* Convert the data */
3458	rc = (*__s_cvtlist[s].cvt_rtn)(data, &rdn, &entry, errorp);
3459	if (rc != NS_LDAP_SUCCESS) {
3460		__s_cvt_freeEntryRdn(&entry, &rdn);
3461		return (rc);
3462	}
3463	if (rdn == NULL) {
3464		__ns_ldap_freeEntry(entry);
3465		return (NS_LDAP_OP_FAILED);
3466	}
3467
3468	if (strcmp(servicetype, "publickey") == 0) {
3469		struct _ns_pubkey *ptr;
3470		ptr = (struct _ns_pubkey *)data;
3471		if (ptr->hostcred == NS_HOSTCRED_TRUE)
3472			(void) strcpy(service, "hosts");
3473		else
3474			(void) strcpy(service, "passwd");
3475	} else
3476		(void) strcpy(service, servicetype);
3477
3478	/* Create the Full DN */
3479	if (basedn == NULL) {
3480		rc = __s_api_get_SSD_from_SSDtoUse_service(service,
3481		    &sdlist, errorp);
3482		if (rc != NS_LDAP_SUCCESS) {
3483			__s_cvt_freeEntryRdn(&entry, &rdn);
3484			return (rc);
3485		}
3486
3487		if (sdlist == NULL) {
3488			rc = __s_api_getDNs(&dns, service, errorp);
3489			if (rc != NS_LDAP_SUCCESS) {
3490				if (dns) {
3491					__s_api_free2dArray(dns);
3492					dns = NULL;
3493				}
3494				__s_cvt_freeEntryRdn(&entry, &rdn);
3495				return (rc);
3496			}
3497			(void) snprintf(trdn, RDNSIZE, "%s,%s", rdn, dns[0]);
3498			__s_api_free2dArray(dns);
3499		} else {
3500			if (sdlist[0]->basedn) {
3501				(void) snprintf(trdn, RDNSIZE, "%s,%s",
3502				    rdn, sdlist[0]->basedn);
3503			} else {
3504				__s_cvt_freeEntryRdn(&entry, &rdn);
3505				return (NS_LDAP_OP_FAILED);
3506			}
3507		}
3508		i = strlen(trdn) - 1;
3509		if (trdn[i] == COMMATOK) {
3510			rc = __ns_ldap_getParam(NS_LDAP_SEARCH_BASEDN_P,
3511			    &paramVal, errorp);
3512			if (rc != NS_LDAP_SUCCESS) {
3513				__s_cvt_freeEntryRdn(&entry, &rdn);
3514				return (rc);
3515			}
3516			i = strlen(trdn) + strlen((char *)(paramVal[0])) + 1;
3517			fulldn = (char *)calloc(i, 1);
3518			if (fulldn == NULL) {
3519				(void) __ns_ldap_freeParam(&paramVal);
3520				__s_cvt_freeEntryRdn(&entry, &rdn);
3521				return (NS_LDAP_MEMORY);
3522			}
3523			(void) snprintf(fulldn, i, "%s%s", trdn,
3524			    (char *)(paramVal[0]));
3525			(void) __ns_ldap_freeParam(&paramVal);
3526		} else {
3527			fulldn = strdup(trdn);
3528			if (fulldn == NULL) {
3529				__s_cvt_freeEntryRdn(&entry, &rdn);
3530				return (NS_LDAP_MEMORY);
3531			}
3532		}
3533	} else {
3534		i = strlen(rdn) + strlen(basedn) + 2;
3535		fulldn = (char *)calloc(i, 1);
3536		if (fulldn == NULL) {
3537			__s_cvt_freeEntryRdn(&entry, &rdn);
3538			return (NS_LDAP_MEMORY);
3539		}
3540		(void) snprintf(fulldn, i, "%s,%s", rdn, basedn);
3541	}
3542
3543	modattrlist = (const ns_ldap_attr_t * const *)entry->attr_pair;
3544	/* Check to see if the entry exists already */
3545	/* May need to delete or update first */
3546
3547	if (create != 1) {
3548		/* Modify the entry */
3549		/*
3550		 * To add a shadow-like entry, the addTypedEntry function
3551		 * would call __ns_ldap_repAttr first, and if server says
3552		 * LDAP_NO_SUCH_OBJECT, then it tries __ns_ldap_addEntry.
3553		 * This is to allow a netmask entry to be added even if the
3554		 * base network entry is not in the directory. It would work
3555		 * because the difference between the schema for the network
3556		 * and netmask data contains only MAY attributes.
3557		 *
3558		 * But for shadow data, the attributes do not have MUST
3559		 * attributes the base entry needs, so if the __ns_ldap_addEntry
3560		 * is executed, it would fail. The real reason, however, is that
3561		 * the base entry did not exist. So returning
3562		 * LDAP_OBJECT_CLASS_VIOLATION would just confused.
3563		 */
3564		if ((__s_cvtlist[s].flags & AE) != 0)
3565			rc = __ns_ldap_addAttr(service, fulldn, modattrlist,
3566			    cred, flags, errorp);
3567		else {
3568			rc = __ns_ldap_repAttr(service, fulldn, modattrlist,
3569					cred, flags, errorp);
3570			if (rc == NS_LDAP_INTERNAL && *errorp &&
3571			    (*errorp)->status == LDAP_NO_SUCH_OBJECT) {
3572				(void) __ns_ldap_freeError(errorp);
3573				rc = __ns_ldap_addEntry(service, fulldn,
3574				    entry, cred, flags, errorp);
3575				if (rc == NS_LDAP_INTERNAL && *errorp &&
3576				(*errorp)->status ==
3577					LDAP_OBJECT_CLASS_VIOLATION)
3578					(*errorp)->status = LDAP_NO_SUCH_OBJECT;
3579			}
3580		}
3581	} else {
3582		/* Add the entry */
3583		rc = __ns_ldap_addEntry(service, fulldn, entry,
3584		    cred, flags, errorp);
3585		if (rc == NS_LDAP_INTERNAL && *errorp &&
3586		    (*errorp)->status == LDAP_ALREADY_EXISTS &&
3587		    ((strcmp(service, "ethers") == 0) ||
3588		    (strcmp(service, "bootparams") == 0))) {
3589			rc = modify_ethers_bootp(service, rdn, fulldn,
3590			    modattrlist, cred, flags, errorp);
3591		}
3592	}
3593
3594	/* Free up entry created by conversion routine */
3595	if (fulldn != NULL)
3596		free(fulldn);
3597	__s_cvt_freeEntryRdn(&entry, &rdn);
3598	return (rc);
3599}
3600
3601
3602/*
3603 * Append the default base dn to the dn
3604 * when it ends with ','.
3605 * e.g.
3606 * SSD = service:ou=foo,
3607 */
3608int
3609__s_api_append_default_basedn(
3610	const char *dn,
3611	char **new_dn,
3612	int *allocated,
3613	ns_ldap_error_t **errp) {
3614
3615	int		rc = NS_LDAP_SUCCESS, len = 0;
3616	void		**param = NULL;
3617	char		*str = NULL;
3618
3619	*allocated = FALSE;
3620	*new_dn = NULL;
3621
3622	if (dn == NULL)
3623		return (NS_LDAP_INVALID_PARAM);
3624
3625	rc = __ns_ldap_getParam(NS_LDAP_SEARCH_BASEDN_P,
3626		(void ***)&param, errp);
3627
3628	if (rc != NS_LDAP_SUCCESS) {
3629		if (param)
3630			(void) __ns_ldap_freeParam(&param);
3631		return (rc);
3632	}
3633
3634	len = strlen(dn);
3635	str = ((char **)param)[0];
3636	len = len + strlen(str) +1;
3637	*new_dn = (char *)malloc(len);
3638	if (*new_dn == NULL) {
3639		(void) __ns_ldap_freeParam(&param);
3640		return (NS_LDAP_MEMORY);
3641	}
3642	*allocated = TRUE;
3643
3644	(void) strcpy(*new_dn, dn);
3645	(void) strcat(*new_dn, str);
3646
3647	(void) __ns_ldap_freeParam(&param);
3648	return (NS_LDAP_SUCCESS);
3649}
3650