fromfilter is a electronic mail filter using the libmilter API from sendmail. Its purpose is to prevent misrepresentation and impersonation from happening inside an organisation.
fromfilter uses the following API's: the libmilter API, the POSIX threadslibrary, the OpenLDAPAPI, the iconv library, a rfc822 header parser and some other functions unshamefully lifted from the mutt [ a free email client available at http://www.mutt.org ] source code.
Copyright © Konstantinos Koukopoulos k.koukopoulos@di.uoa.gr
Permission is granted to copy, distribute and/or modify this document
under the terms of the GNU Free Documentation License, Version 1.1
or any later version published by the Free Software Foundation;
with no Invariant Sections.
A copy of the license is included in the section entitled "GNU
Free Documentation License".
Fromfilter, apart from beeing free documentation, is also free software. Each file produced contains the following notice:
<copyright notice>= (U-> U-> U-> U-> U-> U-> U-> U-> U->) /* This file is part of Fromfilter. Copyright (c) 2002 Konstantinos Koukopoulos <k.koukopoulos@di.uoa.gr> Fromfilter is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. Fromfilter is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with Fromfilter; if not, write to the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA */
The code specific to the libmilter API is in the files filter.c and filter.h.
<filter.c>=
<copyright notice>
<filter.c includes>
<cleanup
function>
<libmilter callbacks>
<filter description>
<filter.h>=
<copyright notice>
#ifndef FF_FILTER_H
#define FF_FILTER_H
<filter.h includes>
<struct PrivData
declaration>;
<libmilter callback decls>
#endif
DefinesFF_FILTER_H
(links are to index).
These two files are full of libmilter API code, so we naturally include the libmilter header file.
<filter.h includes>= (<-U) [D->] #include <libmilter/mfapi.h>
<filter.c includes>= (<-U) [D->] #include <libmilter/mfapi.h>
The envelope
callback is called with a null-terminated array argv
which
is guaranteed to contain the envelope from
address in argv[0]. The rest
are the ESMTP arguments.
<envelope
declaration>= (U-> U->)
sfsistat
envelope(SMFICTX *ctx, char *argv[])
The header
callback is called for every header in the message body.
headerf
will be the header field name, headerv
will be the field value.
<header
declaration>= (U-> U->)
sfsistat
header(SMFICTX *ctx, char* headerf, char * headerv)
The endofmessage
callback is called after the message has been completely
submitted. Any modifications to the message must be done here.
<endofmessage
declaration>= (U-> U->)
sfsistat
endofmessage(SMFICTX *ctx)
This filter is a message-oriented filter, so the callbacks we will be using are:
<libmilter callback decls>= (<-U) <envelope
declaration>; <header
declaration>; <endofmessage
declaration>;
<libmilter callbacks>= (<-U) <envelope
function> <header
function> <endofmessage
function>
envelope
The envelope
callback function is called by libmilter whenever a client
issues a mail from command to sendmail . It first allocates and
initializes the space that is private to this context [because this is a
message oriented filter, the context is the message] . It then retrieves
some symbol values from sendmail (like the auth_authen
variable which
contains the username of the authenticated user). Last, it queries the
LDAP server for the necessary information.
<envelope
function>= (<-U) <envelope
declaration> { struct PrivData *priv; char *str; char *filter; int len; <allocate and initialize private memory> <get sendmail symbol values> <create filter and query LDAP server> return SMFIS_CONTINUE; }
We call smfi_getsymval
to retrieve the values of the daemon_name
,
auth_authen
and auth_author
sendmail variables.
daemon_name
is the value of the "DaemonPortOptions Name=" suboption, in
the sendmail configuration file. The DAEMON_NAME
macro should be defined
in the config.h
header, to be the name of the daemon whose messages we
should filter. If the daemon_name
value is different from what we
expected then we let the message pass.
auth_authen
is the authentication entity of the client and
auth_author
is the entity the client has been authorized as.
<get sendmail symbol values>= (<-U) if (!((str = smfi_getsymval(ctx, "{daemon_name}"))!=NULL && !strcmp(str, DAEMON_NAME))) return cleanup(ctx, SMFIS_ACCEPT); if ((str = smfi_getsymval(ctx, "{auth_author}"))!=NULL) priv->auth_author = strdup( str ); if ((str = smfi_getsymval(ctx, "{auth_authen}"))!=NULL) priv->auth_authen = strdup( str );
<filter.c includes>+= (<-U) [<-D->] #include <config.h>
The smfi_setpriv
libmilter call, sets the private memory for this context,
so that the other callbacks for this message can use the same memory (using
smfi_getpriv
).
<allocate and initialize private memory>= (<-U) if ((priv = (struct PrivData *)calloc(1, sizeof(*priv))) == NULL) return SMFIS_TEMPFAIL; smfi_setpriv(ctx, priv);
The filter
string is of the form "uid = username".
query_uid
will use this to do an ldap search, filling priv
with the
necessary information from the search results.
<create filter and query LDAP server>= (<-U) if (priv->auth_authen != NULL) { len = 5 + strlen(priv->auth_authen); if ((filter = (char *)malloc(len))==NULL){ syslog(LOG, "query_id: malloc: %s\n",strerror(errno)); return cleanup(ctx, SMFIS_TEMPFAIL); } (void)strlcpy(filter, "uid=", len); (void)strlcat(filter, priv->auth_authen, len); if (query_uid(filter, priv) <0) return SMFIS_TEMPFAIL; } else return cleanup(ctx, SMFIS_TEMPFAIL); if (priv->auth_author != NULL && !strcmp(priv->auth_author, priv->auth_authen)){ /* TODO query_uid the author too */ }else safe_free(priv->auth_author);
<filter.c includes>+= (<-U) [<-D->] #include <directory.h>
header
The header
callback function is called by libmilter for each header in the
message body. For now, the only headers we are interested in are From
and Sender
or, if this message has been forwarded and the sender has
retained the original headers, the Resent-From
and Resent-Sender
.
<header
function>= (<-U) [D->] <header
declaration> { struct PrivData *priv; char *hdr; priv = smfi_getpriv(ctx); if (priv == NULL) return SMFIS_TEMPFAIL; hdr = headerf;
If we encounter a "Resent:" header it means that this message has been forwarded. Thus we are interested
in the "Resent-*" headers (like "Resent-From", "Resent-Sender" etc.). Any ADDRESS
structures allocated
by previous invocations of header
must be freed.
<header
function>+= (<-U) [<-D->]
if (!strncmp(hdr, "Resent-", 6)){
priv->resent = 1;
if (priv->from)
rfc822_free_address(&(priv->from));
priv->froms = 0;
if (priv->sender)
rfc822_free_address(&(priv->from));
priv->senders = 0;
}
If priv->resent
is set then we advance the pointer to the header value by 7
places (if it has that many characters) and then check its value as if it is
a normal header.
<header
function>+= (<-U) [<-D->]
if (priv->resent) {
if (strlen(hdr) <=7)
hdr += 7;
else
hdr += strlen(hdr);
}
Next we check to see if this header is of interest to us. If it's the first header of the sort that we've found, we parse it using the mutt rfc822 and rfc2047 parsing routines.
<header
function>+= (<-U) [<-D->]
if (!strncmp(hdr, "From", 4)){
if (!(priv->froms++)){
priv->from = rfc822_parse_adrlist(NULL, headerv);
rfc2047_decode_adrlist(priv->from);
}
}else if (!strncmp(hdr, "Sender", 6)){
if (!(priv->senders++)){
priv->sender = rfc822_parse_adrlist(NULL, headerv);
rfc2047_decode_adrlist(priv->sender);
}
}
<filter.c includes>+= (<-U) [<-D->] #include <rfc822.h> #include <rfc2047.h>
Finally we tell sendmail to continue giving us headers.
<header
function>+= (<-U) [<-D]
return SMFIS_CONTINUE;
}
endofmessage
The message has been submitted and now we must make any changes necessary. Any
information from the headers that we need has been put in the private space so
we can freely delete all the headers and add our own after. If the sender is
sending as himself we only need to add a From
header. We call
validate_addr
to check and sanitize the priv->from
address and then
write this address in a From
header TODO there is the question if someone
sending via an address like Postmaster should be mentioned in a Sender
header..
If all goes well we cleanup after ourselves and the message has been filtered
succesfully.
<endofmessage
function>= (<-U) <endofmessage
declaration> { struct PrivData *priv = smfi_getpriv(ctx); ADDRESS *cur; char buf[256]; <delete headers> if (priv->auth_author){ /* TODO: <validate Sender/From headers> <write new Sender/From headers> */ }else{ cur = validate_addr(&(priv->from), priv); <write new From header> } return cleanup(ctx, SMFIS_CONTINUE); }
<filter.c includes>+= (<-U) [<-D->] #include <valid.h> /* for validate_addr */
The number of "From" headers is priv->froms
. We use the libmilter smfi_chgheader
function with a last argument of NULL, which effectively
deletes the requested header. The header to delete is specified by the second
and third argument. The second argument is the name of the header field. The
third argument is the index number of the header, i.e. if it is 1 then the
first occurence of the header is deleted, if it is 2 the second and so on.
Because we allow only one From header (which we add in
<write new From header>
) we must succeed in deleting all the headers.
<delete headers>= (<-U) [D->] #ifdef DEBUG syslog(LOG, "deleting %d %s headers\n", priv->froms, (priv->resent)?"Resent-From":"From"); syslog(LOG, "deleting %d %s headers\n", priv->senders, (priv->resent)?"Resent-Sender":"Sender"); #endif if (priv->resent){ while (priv->froms--) if (smfi_chgheader(ctx, "Resent-From", priv->froms+1, NULL) == MI_FAILURE) {; syslog(LOG, "endofmessage: smfi_chgheader returned MI_FAILURE\n"); return cleanup(ctx, SMFIS_TEMPFAIL); } }else { while (priv->froms--) if (smfi_chgheader(ctx, "From", priv->froms+1, NULL) == MI_FAILURE) {; syslog(LOG, "endofmessage: smfi_chgheader returned MI_FAILURE\n"); return cleanup(ctx, SMFIS_TEMPFAIL); } }
The same goes for the Sender header:
<delete headers>+= (<-U) [<-D] if (priv->resent){ while (priv->senders--) if (smfi_chgheader(ctx, "Resent-Sender", priv->senders+1, NULL) == MI_FAILURE) {; syslog(LOG, "endofmessage: smfi_chgheader returned MI_FAILURE\n"); return cleanup(ctx, SMFIS_TEMPFAIL); } }else { while (priv->senders--) if (smfi_chgheader(ctx, "Sender", priv->senders+1, NULL) == MI_FAILURE) {; syslog(LOG, "endofmessage: smfi_chgheader returned MI_FAILURE\n"); return cleanup(ctx, SMFIS_TEMPFAIL); } }
This is pretty self-explanatory [Many thanks go to the mutt coders for these nice functions :-)]
<write new From header>= (<-U) buf[0]='\0'; rfc822_write_address(buf, sizeof(buf), cur); #ifdef DEBUG syslog(LOG,"Adding header From: %s\n", buf); #endif if (priv->resent) smfi_addheader(ctx, "Resent-From", buf); else smfi_addheader(ctx, "From", buf);
<write new Sender header>= buf[0]='\0'; rfc822_write_address(buf, sizeof(buf), cur); #ifdef DEBUG syslog(LOG,"Adding header From: %s\n", buf); #endif if (priv->resent) smfi_addheader(ctx, "Resent-Sender", buf); else smfi_addheader(ctx, "Sender", buf);
struct smfiDesc
)
We store our filter description in the filter
global variable. Our
filter will modify and add headers to the message so we must set the flags
member to SMFIF_CHGHDRS|SMFIF_ADDHDRS
. For documentation on the rest of
the callbacks check the libmilter documentation
[http://sendmail.com/partner/resources/development/milter_api/] .
<filter description>= (<-U) struct smfiDesc filter = { "test filter", /* name */ SMFI_VERSION, /* version */ SMFIF_CHGHDRS|SMFIF_ADDHDRS, /* flags */ /* callbacks */ NULL, /* connect */ NULL, /* helo */ envelope, /* envfrom */ NULL, /* envrcpt */ header, /* header */ NULL, /* eoh */ NULL, /* body */ endofmessage, /* eom */ NULL, /* abort */ NULL /* close */ };
Definesfilter
(links are to index).
struct PrivData
declarationPrivData
that will be contained in some
thread-private memory we will allocate in <envelope
function>
. This
structure must preserve, between callbacks, some values that pertain to the
specific message. These are:
mail
from the entry that
was given by auth_authen
.
cn
from the entry that
was given by auth_authen
. This roughly corresponds to the Real Name of an
address.
mailAlternateAddress
. These are the
username/host combinations that the user specified by auth_authen
is
allowed to use in outgoing mail.
mailAuthorizedAddress
. These are the
username/host combinations that the user specified by auth_authen
is
allowed to send as.
from
and sender
.
rfc822_parse
routines, and contain a parsed form of the values of the From
and Sender headers (or the Resent-From and Resent-Sender headers if
resent=1
.
<struct PrivData
declaration>= (<-U)
struct PrivData {
char *mail;
char *cn;
char *cn_el;
char *auth_authen;
char *auth_author;
char **alternates;
char **authorized;
char resent;
ADDRESS *from;
ADDRESS *sender;
int froms;
int senders;
};
<filter.h includes>+= (<-U) [<-D] #include <rfc822.h>
cleanup
cleanup
frees anything that can be freed in the private structure returning
the status value in 'rc'.
<cleanup
function>= (<-U)
sfsistat
cleanup(SMFICTX *ctx, sfsistat rc)
{
struct PrivData *priv = smfi_getpriv(ctx);
int i;
if (priv) {
if (priv->mail) safe_free(priv->mail);
if (priv->cn) safe_free(priv->cn);
if (priv->auth_author) safe_free(priv->auth_author);
if (priv->authorized){
for(i=0 ; priv->authorized[i] ; i++)
safe_free(priv->authorized[i]);
safe_free(priv->authorized);
}
if (priv->alternates){
for(i=0 ; priv->alternates[i] ; i++)
safe_free(priv->alternates[i]);
safe_free(priv->alternates);
}
if (priv->from) rfc822_free_address(&(priv->from));
if (priv->sender) rfc822_free_address(&(priv->from));
safe_free(priv);
smfi_setpriv(ctx, NULL);
}
return rc;
}
<filter.c includes>+= (<-U) [<-D] #include <stdlib.h> #include <syslog.h> #include <errno.h> #include <string.h> /* for strlcat, strlcpy etc.. */ #include <aux.h> /* for safe_free */
<directory.c>= <copyright notice> <ldap includes> <ldap globals> <attribute handlers> <ldap types> <init_ldap
function> <query_uid
function>
<directory.h>= <copyright notice> #ifndef FF_LDAP_H #define FF_LDAP_H #include <filter.h> <init_ldap
declaration>; <query_uid
declaration>; #endif
DefinesFF_LDAP_H
(links are to index).
<ldap includes>= (<-U) #include <ldap.h> #include <pthread.h> #include <stdlib.h> #include <malloc.h> #include <string.h> #include <syslog.h> #include <stdio.h> #include <errno.h> #include <config.h> #include <filter.h> #include <aux.h>
<ldap types>= (<-U) typedef struct _attr_pair { char *name; int (*action)(struct PrivData *priv, LDAPMessage *p, char *attr); } attrib_pair; char * attribute_names[6] = { "cn;lang-el", "cn", "mailAlternateAddress", "mailAuthorizedAddress", "mail", NULL }; attrib_pair attributes[6] = { { "cn;lang-el", handleCn }, { "cn", handleCn }, { "mailAlternateAddress", handleAlternates }, { "mailAuthorizedAddress", handleAuthorized }, { "mail", handleMail }, { NULL, NULL } };
Definesattrib_pair
,attribute_names
(links are to index).
This filter only makes one connection to the LDAP server, thus there is only
one handle. The LDAP handle ld
is protected from concurrent accesses by
the mutex variable ld_mutex
.
<ldap globals>= (<-U) <global ldap handle> char *search_dn; char *bind_dn; char *pass; int szlimit; struct timeval timeout; char *server;
Definesbind_dn
,pass
,search_dn
,server
,szlimit
,timeout
(links are to index).
<global ldap handle>= (<-U) pthread_mutex_t ld_mutex; LDAP *ld;
Definesld
(links are to index).
init_ldap
<init_ldap
declaration>= (<-U U->)
int
init_ldap( char *srv, char *binddn, char *searchdn, char *password, int sizelimit)
<init_ldap
function>= (<-U) <init_ldap
declaration> { int r; bind_dn = BIND_DN; search_dn = SEARCH_DN; server = srv; szlimit = sizelimit; timeout.tv_sec = 10; timeout.tv_usec = 0; if (password) pass = strdup(password); else return -1; if (searchdn) search_dn = searchdn; if (binddn) bind_dn = binddn; if (pthread_mutex_init(&ld_mutex, NULL)){ fprintf(stderr, "pthread_mutex_init returned 0!\n"); return -1; } ld = ldap_init(srv, LDAP_PORT); if (!ld){ perror("ldap_init"); return -1; } ldap_set_option(ld, LDAP_OPT_SIZELIMIT, (void *)&sizelimit); ldap_set_option(ld, LDAP_OPT_NETWORK_TIMEOUT, (void *)&timeout); r = ldap_bind_s(ld, bind_dn, password, LDAP_AUTH_SIMPLE); if (r != LDAP_SUCCESS){ ldap_perror(ld, "ldap_bind_s"); return -1; } pthread_mutex_unlock(&ld_mutex); return 0; }
query_uid
<query_uid
declaration>= (<-U U->)
int
query_uid(char *filter, struct PrivData *priv)
<query_uid
function>= (<-U) <query_uid
declaration> { char *attr; int ret=0; int r; LDAPMessage *p; LDAPMessage *res=NULL; attrib_pair *cur=NULL; BerElement *berptr=NULL; pthread_mutex_lock(&ld_mutex); <do ldap search> <handle ldap results> <free allocated memory> done: pthread_mutex_unlock(&ld_mutex); return ret; }
The basic search functionality is performed by calling ldap_search_s
. The
scope
argument is set to LDAP_SCOPE_ONELEVEL
; this means that we wish
to search only the immediate children of the base object ( search_dn
in our
case ). If the server is down, we try to reconnect.
<do ldap search>= (<-U) r=!(LDAP_SUCCESS); while (r != LDAP_SUCCESS){ r = ldap_search_s(ld, search_dn, LDAP_SCOPE_ONELEVEL, filter, (char **)attribute_names, 0, &res); if (r == LDAP_SERVER_DOWN) { ldap_unbind_s(ld); ld = ldap_init(server, LDAP_PORT); if (!ld){ syslog(LOG, "query_uid: ldap_init: %s\n", strerror(errno)); ret = -1; goto done; } ldap_set_option(ld, LDAP_OPT_SIZELIMIT, (void *)&szlimit); ldap_set_option(ld, LDAP_OPT_NETWORK_TIMEOUT, (void *)&timeout); ret = ldap_bind_s(ld, bind_dn, pass, LDAP_AUTH_SIMPLE); if (ret != LDAP_SUCCESS){ syslog(LOG, "query_uid: ldap_bind_s: %s\n", ldap_err2string(ret)); ret = -1; goto done; } }else if (r != LDAP_SUCCESS){ syslog(LOG, "query_id: ldap_search_s: %s\n", ldap_result2error(ld, res, 1)); safe_free(filter); ret = -1; goto done; } }
In <
we have set the result number to one because we
know that each user is unique. Thus we only check the first entries attributes
by calling main
function>ldap_first_entry
and then looping over the attributes.
<handle ldap results>= (<-U) if ((p = ldap_first_entry(ld, res)) == NULL){ syslog(LOG, "query_id: ldap_first_entry failed!\n"); if (res) ldap_msgfree(res); safe_free(filter); ret = -1; goto done; } attr = ldap_first_attribute(ld, p, &berptr); if (attr) do { cur = attributes; while (cur->name) { if (!strcmp(attr, cur->name)) break; cur++; } if (!cur) { syslog(LOG, "query_id: didn't ask for this attribute: %s\n", attr); }else cur->action(priv, p, attr); }while ((attr = ldap_next_attribute(ld, p, berptr)) != NULL);
<free allocated memory>= (<-U) if (!berptr) ber_free(berptr, 0); if (!res) ldap_msgfree(res); if (!p) ldap_msgfree(p); safe_free(filter);
<attribute handlers>= (<-U) int handleAuthorized(struct PrivData *priv, LDAPMessage *p, char *attr) { char **values; int num,i; values = ldap_get_values(ld, p, attr); if (values){ num = ldap_count_values(values); /* mailAuthorizedAddress is a multivalue attribute, so we * allocate some memory for the array of values */ if ((priv->authorized = (char **)malloc(num+1))!=NULL){ /* <copy [[num]] values from [[values]] to [[priv->authorized]]>> */ COPYMULTIVAL(values, priv->authorized); }else syslog(LOG, "query_id: malloc: %s\n", strerror(errno)); ldap_value_free(values); return 0; }else { syslog(LOG, "query_id: ldap_get_values returned null for %s: %s\n", attr, ldap_err2string(ldap_result2error(ld, p, 0))); return -1; } } int handleAlternates(struct PrivData *priv, LDAPMessage *p, char *attr) { int num,i; char **values; values = ldap_get_values(ld, p, attr); if (values){ num = ldap_count_values(values); /* mailAlternateAddress is a multivalue attribute, so we * allocate some memory for the array of values */ if ((priv->alternates = (char **)malloc((num+1)*sizeof(char *)))!=NULL){ /* <copy [[num]] values from [[values]] to [[priv->alternates]] test>> */ COPYMULTIVAL(values, priv->alternates); }else syslog(LOG, "query_id: malloc: %s\n", strerror(errno)); ldap_value_free(values); values = NULL; return 0; }else { syslog(LOG, "query_id: ldap_get_values returned null for %s: %s\n", attr, ldap_err2string(ldap_result2error(ld, p, 0))); return -1; } } int handleMail(struct PrivData *priv, LDAPMessage *p, char *attr) { char **values; values = ldap_get_values(ld, p, attr); if (values){ /* mail is not multivalue so we just copy it */ if (*values) if ((priv->mail = strdup(*values)) == NULL) syslog(LOG, "query_id: strdup: %s\n", strerror(errno)); ldap_value_free(values); values = NULL; return 0; }else { syslog(LOG, "query_id: ldap_get_values returned null for %s: %s\n", attr, ldap_err2string(ldap_result2error(ld, p, 0))); return -1; } } int handleCn(struct PrivData *priv, LDAPMessage *p, char *attr) { char **values; #ifdef DEBUG syslog(LOG, "ldap_get_values(ld, p, %s)\n", attr); syslog(LOG, "is %d\n", ldap_get_values(ld, p, attr)); #endif values = ldap_get_values(ld, p, attr); if (values){ if (*values) { if (strlen(attr) >2) { if ((priv->cn_el = strdup(*values)) == NULL) syslog(LOG, "query_id: strdup: %s\n", strerror(errno)); }else{ if ((priv->cn = strdup(*values)) == NULL) syslog(LOG, "query_id: strdup: %s\n", strerror(errno)); } #ifdef DEBUG syslog(LOG, "got %s = %s\n", attr, *values); #endif } ldap_value_free(values); values = NULL; return 0; }else { syslog(LOG, "query_id: ldap_get_values returned null for %s: %s\n", attr, ldap_err2string(ldap_result2error(ld, p, 0))); return -1; } }
mailAuthorizedAddress
is a multivalue attribute that contains email
addresses that the user can use in his body headers. We store them in
priv->authorized
.
<handlemailAuthorizedAddress
attribute>= values = ldap_get_values(ld, p, attr); if (values){ num = ldap_count_values(values); /* mailAuthorizedAddress is a multivalue attribute, so we * allocate some memory for the array of values */ if ((priv->authorized = (char **)malloc(num+1))!=NULL){ <copynum
values fromvalues
topriv->authorized
> }else syslog(LOG, "query_id: malloc: %s\n", strerror(errno)); ldap_value_free(values); }else syslog(LOG, "query_id: ldap_get_values returned null for %s: %s\n", attr, ldap_err2string(ldap_result2error(ld, p, 0)));
mailAlternateAddress
is only conceptually different from mailAuthorizedAddress
.
It contains addresses that correspond to the user in some way, while mailAthorizedAddress
contains addresses that correspond to functions that user may perform (like "Postmaster", "webmaster" etc..).
<handle mailAlternateAddress
attribute>=
values = ldap_get_values(ld, p, attr);
if (values){
num = ldap_count_values(values);
/* mailAlternateAddress is a multivalue attribute, so we
* allocate some memory for the array of values */
if ((priv->alternates = (char **)malloc((num+1)*sizeof(char *)))!=NULL){
/* <copy [[num]] values from [[values]] to [[priv->alternates]] test>> */
COPYMULTIVAL(values, priv->alternates);
}else syslog(LOG, "query_id: malloc: %s\n", strerror(errno));
ldap_value_free(values);
values = NULL;
}else syslog(LOG, "query_id: ldap_get_values returned null for %s: %s\n",
attr, ldap_err2string(ldap_result2error(ld, p, 0)));
<copynum
values fromvalues
topriv->authorized
>= (<-U) #ifdef DEBUG syslog(LOG, "printing %s values:\n", attr); for (i=0; i<num; i++) syslog(LOG, "%s\n", values[i]); #endif COPYMULTIVAL(values, priv->authorized);
<copynum
values fromvalues
topriv->alternates
test>= #ifdef DEBUG syslog(LOG, "printing %s values:\n", attr); for (i=0; i<num; i++) syslog(LOG, "%s\n", values[i]); #endif COPYMULTIVAL(values, priv->alternates);
<defines>= #define COPYMULTIVAL(A,B) \ {for (i=0; i<num; i++)\ if ((B[i] = strdup(A[i])) == NULL){\ syslog(LOG, "query_id: strdup: %s\n", strerror(errno));\ break;\ }\ B[i]=NULL;}
DefinesCOPYMULTIVAL
(links are to index).
<copynum
values fromvalues
topriv->alternates
>= #ifdef DEBUG syslog(LOG, "printing %s values:\n", attr); for (i=0; i<num; i++) syslog(LOG, "%s\n", values[i]); #endif for (i=0; i<num; i++) if ((priv->alternates[i] = strdup(values[i])) == NULL){ syslog(LOG, "query_id: strdup: %s\n", strerror(errno)); break; } priv->alternates[i]=NULL;
cn
isn't multivalue so things are simpler
<handle cn
attribute>=
#ifdef DEBUG
syslog(LOG, "ldap_get_values(ld, p, %s)\n", attr);
syslog(LOG, "is %d\n", ldap_get_values(ld, p, attr));
#endif
values = ldap_get_values(ld, p, attr);
if (values){
if (*values) {
if (strlen(attr) >2) {
if ((priv->cn_el = strdup(*values)) == NULL)
syslog(LOG, "query_id: strdup: %s\n", strerror(errno));
}else{
if ((priv->cn = strdup(*values)) == NULL)
syslog(LOG, "query_id: strdup: %s\n", strerror(errno));
}
#ifdef DEBUG
syslog(LOG, "got %s = %s\n", attr, *values);
#endif
}
ldap_value_free(values);
values = NULL;
}else syslog(LOG, "query_id: ldap_get_values returned null for %s: %s\n",
attr, ldap_err2string(ldap_result2error(ld, p, 0)));
<handle mail
attribute>=
values = ldap_get_values(ld, p, attr);
if (values){
/* mail is not multivalue so we just copy it */
if (*values)
if ((priv->mail = strdup(*values)) == NULL)
syslog(LOG, "query_id: strdup: %s\n", strerror(errno));
ldap_value_free(values);
values = NULL;
}else syslog(LOG, "query_id: ldap_get_values returned null for %s: %s\n",
attr, ldap_err2string(ldap_result2error(ld, p, 0)));
<valid.c>= <copyright notice> <validate includes> <is_acceptable
function> <validate_addr
function>
<valid.h>=
<copyright notice>
#include <filter.h> /* for struct PrivData structure */
<validate_addr
declaration>;
<validate includes>= (<-U) #include <stdio.h> #include <stdlib.h> #include <string.h> #include <ctype.h> #include <syslog.h> #include <config.h> #include <filter.h> #include <rfc822.h> #include <iconv.h> #include <aux.h>
is_acceptable
is_acceptable
checks str
against one
and the members of alters
,
returning 1 if the match was succesfull.
<is_acceptable
function>= (<-U)
int
is_acceptable(char *one, char** alters, char *str)
{
int i;
#ifdef DEBUG
syslog(LOG, "Checking if \"%s\" is acceptable\n", str);
#endif
if (one && !strcmp(one, str)) return 1;
if (alters ) {
for (i = 0; alters[i] ; i++) {
if (!strcmp(alters[i], str)) return 1;
}
}
return 0;
}
validate_addr
The priv->from
variable contains an ADDRESS
structure. This
structure is a linked list of all the addr
objects from the addrlst
object contained in priv->from
. We must call is_acceptable
(see
<
) at least once for every is_acceptable
function>addr
object that
has a mailbox. If the mailbox isn't acceptable with priv->alternates
then it must
be acceptable with priv->authorized
.
If one of the addr
objects is a group
object then from that object on a
sublist exists (terminated by a null object).
If no valid mailbox
is found, then we create our own ADDRESS
structure with
the mailbox
member set to the LDAP attribute priv->mail
.
Also we decide if the personal
member will be priv->cn
or priv->cn;lang-el
(unimplemented - currently we set personal
to priv->cn
in a very fascist way :-)
<validate_addr
declaration>= (<-U U->)
ADDRESS*
validate_addr(ADDRESS **addr, struct PrivData* priv)
<validate_addr
function>= (<-U) <validate_addr
declaration> { ADDRESS *cur; int authorized=0; iconv_t cd; char buf[BUFSIZ]; char *tobuf; char *frombuf; char *from_code; int len, fleft, tleft; for (cur = *addr; cur != NULL; cur=cur->next){ <if*cur
valid break> } if (cur == NULL) { <make newADDRESS
> } <check cur->personal> if (!cur->personal){ cur->personal = (char *)strdup(priv->cn); } return cur; }
We use the is_acceptable
function to check cur->mailbox
against priv->mail
,
priv->alternates
and priv->authorized
. If cur
is a group item then we advance to
the first item in the group.
<if *cur
valid break>= (<-U)
if (cur->group && cur->next)
cur=cur->next;
if (cur->mailbox && is_acceptable(priv->mail, priv->alternates, cur->mailbox)) break;
if (cur->mailbox && is_acceptable(NULL, priv->authorized, cur->mailbox)) {
authorized=1;
break;
}
<make new ADDRESS
>= (<-U)
cur = (ADDRESS*) calloc(sizeof(ADDRESS), 1);
if (priv->mail) cur->mailbox = strdup(priv->mail);
rfc822_free_address(addr);
*addr = cur;
<check cur->personal>= (<-U) if (cur->personal && !strncmp(cur->personal, "=?", 2)){ len = strpbrk(cur->personal+2, "?") - cur->personal - 1; from_code = (char *)malloc(len); (void)strlcpy(from_code, cur->personal+2, len); frombuf = from_code; while (*(frombuf)!='\0') { *frombuf = toupper(*(frombuf)); frombuf++; } cd = iconv_open("UTF-8", (const char *)from_code); if (cd != (iconv_t)-1) { fleft = strlen(cur->personal_decoded); frombuf = cur->personal_decoded; tleft = BUFSIZ; tobuf = buf; len = iconv(cd, (const char **) &frombuf, &fleft, &tobuf, &tleft); if (fleft == 0 && len != -1) { if (memcmp(priv->cn_el, buf, strlen(priv->cn_el))){ safe_free(cur->personal); } }else{ syslog(LOG, "iconv: %s\n", strerror(errno)); safe_free(cur->personal); } (void)iconv_close(cd); }else{ syslog(LOG, "iconv_open(UTF-8, %s) failed: %s\n", from_code, strerror(errno)); safe_free(cur->personal); } }else{ safe_free(cur->personal); } /* #ifdef DEBUG syslog(LOG, "encoding is %s, length %d chars\n", cur->personal+2, strpbrk(cur->personal+3, "?") - cur->personal -2); #endif if (!strncmp(cur->personal+2, "utf-8", strpbrk(cur->personal+2, "?") - cur->personal - 2)){ if (priv->cn_el){ #ifdef DEBUG syslog(LOG, "1: %s\n", cur->personal_decoded); syslog(LOG, "2: %s\n", priv->cn_el); #endif if (memcmp(cur->personal_decoded, priv->cn_el, strlen(priv->cn_el))){ safe_free(cur->personal); }; }else{ TODO convert priv->cn to unicode so we can compare with cur->personal_decoded } #if 0 }else if (..) { do this for every encoding we support #endif }else{ safe_free(cur->personal); } */
<aux.c>= <copyright notice> <aux includes> <xmalloc
function> <closeall
function> <daemon
function> <sighandler
function>
<aux.h>= <copyright notice> #ifndef FF_AUX_H #define FF_AUX_H #define safe_free(A) {free(A); (A)=NULL;} #define COPYMULTIVAL(A,B) \ {for (i=0; i<num; i++)\ if ((B[i] = strdup(A[i])) == NULL){\ syslog(LOG, "query_id: strdup: %s\n", strerror(errno));\ break;\ }B[i]=NULL;} <xmalloc
declaration>; <daemon
declaration>; <sighandler
declaration>; #endif
DefinesCOPYMULTIVAL
,FF_AUX_H
,safe_free
(links are to index).
<aux includes>= (<-U) #include <stdio.h> #include <stdlib.h> #include <string.h> #include <unistd.h> #include <syslog.h> #include <errno.h> #include <signal.h> #include <ctype.h> #include <sys/types.h> #include <sys/stat.h> #include <fcntl.h> #include <config.h>
xmalloc
The common safe malloc
replacement:
<xmalloc
declaration>= (<-U U->)
void *
xmalloc(int sz)
<xmalloc
function>= (<-U) <xmalloc
declaration> { void *ptr = NULL; ptr = malloc(sz); if (ptr == NULL) { syslog(LOG, "xmalloc: %s", strerror(errno)); exit(EXIT_FAILURE); } return ptr; }
closeall
function
<closeall
function>= (<-U)
void
closeall(int fd)
{
int fdlimit = sysconf(_SC_OPEN_MAX);
while (fd < fdlimit)
close(fd++);
}
daemon
<daemon
declaration>= (<-U U->)
int
daemon(int nochdir, int noclose)
<daemon
function>= (<-U) <daemon
declaration> { switch (fork()) { case 0: break; case -1: return -1; default: _exit(0); /* exit the original process */ } if (setsid() < 0) /* shoudn't fail */ return -1; /* dyke out this switch if you want to acquire a control tty in */ /* the future -- not normally advisable for daemons */ switch (fork()) { case 0: break; case -1: return -1; default: _exit(0); } if (!nochdir) chdir("/"); if (!noclose) { closeall(0); open("/dev/null",O_RDWR); dup(0); dup(0); } return 0; }
sighandler
function
<sighandler
declaration>= (<-U U->)
void
sighandler(int signum)
<sighandler
function>= (<-U) <sighandler
declaration> { syslog(LOG, "Got signal %d..\n", signum); }
<main.c>=
<copyright notice>
<main includes>
<main
function>
<main includes>= (<-U) #include <stdio.h> #include <stdlib.h> #include <string.h> #include <unistd.h> #include <syslog.h> #include <errno.h> #include <signal.h> #include <ctype.h> #include <config.h> #include <filter.h> #include <directory.h> #include <aux.h>
<main
function>= (<-U) [D->]
extern struct smfiDesc filter;
void
usage(void)
{
printf("Usage: filter [options] -p sock\n");
printf(" options are:\n");
printf(" \t -p <file> \t\t unix socket to rendevouz with sendmail.\n");
printf(" \t -b <bind_dn> \t\t DN to bind on the LDAP server\n");
printf(" \t -s <search_dn> \t\t base DN to use for searches \n");
printf(" \t -H <host> \t\t what host the LDAP server is running on. \n");
printf(" \t -P <password> \t\t simple authentication password for LDAP
\t\t\t\t server (will prompt if missing).\n");
printf(" \t -h \t\t this message.\n");
}
<main
function>+= (<-U) [<-D] int main(int argc, char *argv[]) { <local vars and initialization> while ((c = getopt(argc, argv, "db:p:H:h:s:f:P:p:")) != (char)EOF) { <handle flags:switch(c)
> } <set defaults> if (init_ldap(server, bind_dn, search_dn, password, sizelimit) <0) exit(EXIT_FAILURE); act.sa_handler = sighandler; sigaction(SIGSEGV, &act, NULL); if (is_daemon) daemon(1,0); <register filter and callsmfi_main
> }
Definesmain
(links are to index).
After declaring the local variables, we must initialize some of them so that
they have sane values. server
is the hostname the user chose, bind_dn
and search_dn
are the LDAP DNs, password is the LDAP simple auth password
and sizelimit
is the limit on LDAP entries returned from a search.
<local vars and initialization>= (<-U) char c, *password, *server, *bind_dn; char *search_dn; int sizelimit; int is_daemon; struct sigaction act; server = NULL; bind_dn = NULL; search_dn =NULL; password = NULL; sizelimit = 1; is_daemon = 0;
Definesact
,bind_dn
,c
,is_daemon
,password
,search_dn
,server
,sizelimit
(links are to index).
getopt
returns in c
the character of each flag it encounters in the
command line arguments. We do a switch
on c
to handle each flag. Most
of these are self-explanatory, but for an explanation check
<
. Of interest is the usage
function>'p'
option, where the
connection with sendmail is set up. We only support local/unix sockets for
now. The user specifies them like "unix:/var/run/f1.sock" so we must discard
the leading "unix:".
<handle flags: switch(c)
>= (<-U)
switch (c)
{
case 'd':
is_daemon = 1;
break;
case 'h':
usage();
exit(EXIT_SUCCESS);
case 'H':
if (optarg == NULL) {
fprintf(stderr,"missing arg\n");
exit(EXIT_FAILURE);
}
server = (char *)strdup(optarg);
break;
case 's':
if (optarg == NULL ){
fprintf(stderr, "missing arg\n");
exit(EXIT_FAILURE);
}
search_dn = (char *)strdup(optarg);
break;
case 'b':
if (optarg == NULL ){
fprintf(stderr, "missing arg\n");
exit(EXIT_FAILURE);
}
bind_dn = (char *)strdup(optarg);
break;
case 'P':
if (optarg == NULL ){
fprintf(stderr, "missing arg\n");
exit(EXIT_FAILURE);
}
password = (char *)strdup(optarg);
break;
case 'p':
if (!(optarg && *optarg)){
fprintf(stderr, "Bad port\n");
exit(EXIT_FAILURE);
}
if (smfi_setconn(optarg) == MI_FAILURE)
{
(void) fputs("smfi_setconn failed\n", stderr);
exit(EXIT_FAILURE);
}
if (!strncmp(optarg, "unix:", 5))
unlink(optarg + 5);
else if (!strncmp(optarg, "local:", 6))
unlink(optarg + 6);
break;
case '?':
default:
usage();
exit(EXIT_FAILURE);
}
If, after parsing command line options, some values are left unset we
set the default values. password
is a special case were we must query
the user for the password.
<set defaults>= (<-U) if (!server) { server = (char *)strdup(HOST); if (!server) { perror("strdup"); exit(EXIT_FAILURE); } } if (!password) { password = getpassphrase("password for ldap server:"); if (!password) { perror("getpass"); exit(EXIT_FAILURE); } }
Finaly we register our filter with the libmilter subsystem and enter
the smfi_main
. If smfi_main
ever returns then surely an error
has occured so we return the error code as our exit status.
<register filter and call smfi_main
>= (<-U)
if (smfi_register(filter) == MI_FAILURE)
{
fputs("smfi_register failed\n", stderr);
exit(EXIT_FAILURE);
}
return smfi_main();
Version 1.1, March 2000
Copyright © 2000 Free Software Foundation, Inc.
59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
Everyone is permitted to copy and distribute verbatim copies
of this license document, but changing it is not allowed.
The purpose of this License is to make a manual, textbook, or other written document ``free'' in the sense of freedom: to assure everyone the effective freedom to copy and redistribute it, with or without modifying it, either commercially or noncommercially. Secondarily, this License preserves for the author and publisher a way to get credit for their work, while not being considered responsible for modifications made by others.
This License is a kind of ``copyleft'', which means that derivative works of the document must themselves be free in the same sense. It complements the GNU General Public License, which is a copyleft license designed for free software.
We have designed this License in order to use it for manuals for free software, because free software needs free documentation: a free program should come with manuals providing the same freedoms that the software does. But this License is not limited to software manuals; it can be used for any textual work, regardless of subject matter or whether it is published as a printed book. We recommend this License principally for works whose purpose is instruction or reference.
This License applies to any manual or other work that contains a notice placed by the copyright holder saying it can be distributed under the terms of this License. The ``Document'', below, refers to any such manual or work. Any member of the public is a licensee, and is addressed as ``you''.
A ``Modified Version'' of the Document means any work containing the Document or a portion of it, either copied verbatim, or with modifications and/or translated into another language.
A ``Secondary Section'' is a named appendix or a front-matter section of the Document that deals exclusively with the relationship of the publishers or authors of the Document to the Document's overall subject (or to related matters) and contains nothing that could fall directly within that overall subject. (For example, if the Document is in part a textbook of mathematics, a Secondary Section may not explain any mathematics.) The relationship could be a matter of historical connection with the subject or with related matters, or of legal, commercial, philosophical, ethical or political position regarding them.
The ``Invariant Sections'' are certain Secondary Sections whose titles are designated, as being those of Invariant Sections, in the notice that says that the Document is released under this License.
The ``Cover Texts'' are certain short passages of text that are listed, as Front-Cover Texts or Back-Cover Texts, in the notice that says that the Document is released under this License.
A ``Transparent'' copy of the Document means a machine-readable copy, represented in a format whose specification is available to the general public, whose contents can be viewed and edited directly and straightforwardly with generic text editors or (for images composed of pixels) generic paint programs or (for drawings) some widely available drawing editor, and that is suitable for input to text formatters or for automatic translation to a variety of formats suitable for input to text formatters. A copy made in an otherwise Transparent file format whose markup has been designed to thwart or discourage subsequent modification by readers is not Transparent. A copy that is not ``Transparent'' is called ``Opaque''.
Examples of suitable formats for Transparent copies include plain ASCII without markup, Texinfo input format, LaTeX input format, SGML or XML using a publicly available DTD, and standard-conforming simple HTML designed for human modification. Opaque formats include PostScript, PDF, proprietary formats that can be read and edited only by proprietary word processors, SGML or XML for which the DTD and/or processing tools are not generally available, and the machine-generated HTML produced by some word processors for output purposes only.
The ``Title Page'' means, for a printed book, the title page itself, plus such following pages as are needed to hold, legibly, the material this License requires to appear in the title page. For works in formats which do not have any title page as such, ``Title Page'' means the text near the most prominent appearance of the work's title, preceding the beginning of the body of the text.
You may copy and distribute the Document in any medium, either commercially or noncommercially, provided that this License, the copyright notices, and the license notice saying this License applies to the Document are reproduced in all copies, and that you add no other conditions whatsoever to those of this License. You may not use technical measures to obstruct or control the reading or further copying of the copies you make or distribute. However, you may accept compensation in exchange for copies. If you distribute a large enough number of copies you must also follow the conditions in section 3.
You may also lend copies, under the same conditions stated above, and you may publicly display copies.
If you publish printed copies of the Document numbering more than 100, and the Document's license notice requires Cover Texts, you must enclose the copies in covers that carry, clearly and legibly, all these Cover Texts: Front-Cover Texts on the front cover, and Back-Cover Texts on the back cover. Both covers must also clearly and legibly identify you as the publisher of these copies. The front cover must present the full title with all words of the title equally prominent and visible. You may add other material on the covers in addition. Copying with changes limited to the covers, as long as they preserve the title of the Document and satisfy these conditions, can be treated as verbatim copying in other respects.
If the required texts for either cover are too voluminous to fit legibly, you should put the first ones listed (as many as fit reasonably) on the actual cover, and continue the rest onto adjacent pages.
If you publish or distribute Opaque copies of the Document numbering more than 100, you must either include a machine-readable Transparent copy along with each Opaque copy, or state in or with each Opaque copy a publicly-accessible computer-network location containing a complete Transparent copy of the Document, free of added material, which the general network-using public has access to download anonymously at no charge using public-standard network protocols. If you use the latter option, you must take reasonably prudent steps, when you begin distribution of Opaque copies in quantity, to ensure that this Transparent copy will remain thus accessible at the stated location until at least one year after the last time you distribute an Opaque copy (directly or through your agents or retailers) of that edition to the public.
It is requested, but not required, that you contact the authors of the Document well before redistributing any large number of copies, to give them a chance to provide you with an updated version of the Document.
You may copy and distribute a Modified Version of the Document under the conditions of sections 2 and 3 above, provided that you release the Modified Version under precisely this License, with the Modified Version filling the role of the Document, thus licensing distribution and modification of the Modified Version to whoever possesses a copy of it. In addition, you must do these things in the Modified Version:
You may add a section entitled ``Endorsements'', provided it contains nothing but endorsements of your Modified Version by various parties -- for example, statements of peer review or that the text has been approved by an organization as the authoritative definition of a standard.
You may add a passage of up to five words as a Front-Cover Text, and a passage of up to 25 words as a Back-Cover Text, to the end of the list of Cover Texts in the Modified Version. Only one passage of Front-Cover Text and one of Back-Cover Text may be added by (or through arrangements made by) any one entity. If the Document already includes a cover text for the same cover, previously added by you or by arrangement made by the same entity you are acting on behalf of, you may not add another; but you may replace the old one, on explicit permission from the previous publisher that added the old one.
The author(s) and publisher(s) of the Document do not by this License give permission to use their names for publicity for or to assert or imply endorsement of any Modified Version.
You may combine the Document with other documents released under this License, under the terms defined in section 4 above for modified versions, provided that you include in the combination all of the Invariant Sections of all of the original documents, unmodified, and list them all as Invariant Sections of your combined work in its license notice.
The combined work need only contain one copy of this License, and multiple identical Invariant Sections may be replaced with a single copy. If there are multiple Invariant Sections with the same name but different contents, make the title of each such section unique by adding at the end of it, in parentheses, the name of the original author or publisher of that section if known, or else a unique number. Make the same adjustment to the section titles in the list of Invariant Sections in the license notice of the combined work.
In the combination, you must combine any sections entitled ``History'' in the various original documents, forming one section entitled ``History''; likewise combine any sections entitled ``Acknowledgements'', and any sections entitled ``Dedications''. You must delete all sections entitled ``Endorsements.''
You may make a collection consisting of the Document and other documents released under this License, and replace the individual copies of this License in the various documents with a single copy that is included in the collection, provided that you follow the rules of this License for verbatim copying of each of the documents in all other respects.
You may extract a single document from such a collection, and distribute it individually under this License, provided you insert a copy of this License into the extracted document, and follow this License in all other respects regarding verbatim copying of that document.
A compilation of the Document or its derivatives with other separate and independent documents or works, in or on a volume of a storage or distribution medium, does not as a whole count as a Modified Version of the Document, provided no compilation copyright is claimed for the compilation. Such a compilation is called an ``aggregate'', and this License does not apply to the other self-contained works thus compiled with the Document, on account of their being thus compiled, if they are not themselves derivative works of the Document.
If the Cover Text requirement of section 3 is applicable to these copies of the Document, then if the Document is less than one quarter of the entire aggregate, the Document's Cover Texts may be placed on covers that surround only the Document within the aggregate. Otherwise they must appear on covers around the whole aggregate.
Translation is considered a kind of modification, so you may distribute translations of the Document under the terms of section 4. Replacing Invariant Sections with translations requires special permission from their copyright holders, but you may include translations of some or all Invariant Sections in addition to the original versions of these Invariant Sections. You may include a translation of this License provided that you also include the original English version of this License. In case of a disagreement between the translation and the original English version of this License, the original English version will prevail.
You may not copy, modify, sublicense, or distribute the Document except as expressly provided for under this License. Any other attempt to copy, modify, sublicense or distribute the Document is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance.
The Free Software Foundation may publish new, revised versions of the GNU Free Documentation License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. See http://www.gnu.org/copyleft/.
Each version of the License is given a distinguishing version number. If the Document specifies that a particular numbered version of this License "or any later version" applies to it, you have the option of following the terms and conditions either of that specified version or of any later version that has been published (not as a draft) by the Free Software Foundation. If the Document does not specify a version number of this License, you may choose any version ever published (not as a draft) by the Free Software Foundation.
To use this License in a document you have written, include a copy of the License in the document and put the following copyright and license notices just after the title page:
Copyright © YEAR YOUR NAME. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.1 or any later version published by the Free Software Foundation; with the Invariant Sections being LIST THEIR TITLES, with the Front-Cover Texts being LIST, and with the Back-Cover Texts being LIST. A copy of the license is included in the section entitled ``GNU Free Documentation License''.If you have no Invariant Sections, write ``with no Invariant Sections'' instead of saying which ones are invariant. If you have no Front-Cover Texts, write ``no Front-Cover Texts'' instead of ``Front-Cover Texts being LIST''; likewise for Back-Cover Texts.
If your document contains nontrivial examples of program code, we recommend releasing these examples in parallel under your choice of free software license, such as the GNU General Public License, to permit their use in free software.
cleanup
function>: U1, D2
closeall
function>: U1, D2
daemon
declaration>: U1, D2, U3
daemon
function>: U1, D2
endofmessage
declaration>: D1, U2, U3
endofmessage
function>: U1, D2
envelope
declaration>: D1, U2, U3
envelope
function>: U1, D2
header
declaration>: D1, U2, U3
header
function>: U1, D2, D3, D4, D5, D6
init_ldap
declaration>: U1, D2, U3
init_ldap
function>: U1, D2
is_acceptable
function>: U1, D2
main
function>: U1, D2, D3
query_uid
declaration>: U1, D2, U3
query_uid
function>: U1, D2
sighandler
declaration>: U1, D2, U3
sighandler
function>: U1, D2
struct PrivData
declaration>: U1, D2
validate_addr
declaration>: U1, D2, U3
validate_addr
function>: U1, D2
xmalloc
declaration>: U1, D2, U3
xmalloc
function>: U1, D2
num
values from values
to priv->alternates
>: D1
num
values from values
to priv->alternates
test>: D1
num
values from values
to priv->authorized
>: U1, D2
cn
attribute>: D1
mail
attribute>: D1
mailAlternateAddress
attribute>: D1
mailAuthorizedAddress
attribute>: D1
switch(c)
>: U1, D2
*cur
valid break>: U1, D2
ADDRESS
>: U1, D2
smfi_main
>: U1, D2