Lines Matching refs:pat
367 static void check_daemon(char *pat)
369 if (pat[0] == '@') {
370 tcpd_warn("%s: daemon name begins with \"@\"", pat);
371 } else if (pat[0] == '.') {
372 tcpd_warn("%s: daemon name begins with dot", pat);
373 } else if (pat[strlen(pat) - 1] == '.') {
374 tcpd_warn("%s: daemon name ends in dot", pat);
375 } else if (STR_EQ(pat, "ALL") || STR_EQ(pat, unknown)) {
377 } else if (STR_EQ(pat, "FAIL")) { /* obsolete */
380 } else if (reserved_name(pat)) {
381 tcpd_warn("%s: daemon name may be reserved word", pat);
383 switch (inet_get(pat)) {
385 tcpd_warn("%s: no such process name in %s", pat, inetcf);
386 inet_set(pat, WR_YES); /* shut up next time */
389 tcpd_warn("%s: service possibly not wrapped", pat);
390 inet_set(pat, WR_YES);
398 static void check_user(char *pat)
400 if (pat[0] == '@') { /* @netgroup */
401 tcpd_warn("%s: user name begins with \"@\"", pat);
402 } else if (pat[0] == '.') {
403 tcpd_warn("%s: user name begins with dot", pat);
404 } else if (pat[strlen(pat) - 1] == '.') {
405 tcpd_warn("%s: user name ends in dot", pat);
406 } else if (STR_EQ(pat, "ALL") || STR_EQ(pat, unknown)
407 || STR_EQ(pat, "KNOWN")) {
409 } else if (STR_EQ(pat, "FAIL")) { /* obsolete */
412 } else if (reserved_name(pat)) {
413 tcpd_warn("%s: user name may be reserved word", pat);
418 static int check_inet_addr(char *pat)
422 res = find_inet_addr(pat, AI_NUMERICHOST);
432 static int check_host(char *pat)
437 if (pat[0] == '@') { /* @netgroup */
446 setnetgrent(pat + 1);
448 tcpd_warn("%s: unknown or empty netgroup", pat + 1);
454 } else if ((mask = split_at(pat, '/')) != NULL) { /* network/netmask */
458 if (dot_quad_addr(pat, NULL) != INADDR_NONE
462 else if (check_inet_addr(pat) && check_inet_addr(mask))
464 else if (check_inet_addr(pat) &&
469 tcpd_warn("%s/%s: bad net/mask pattern", pat, mask);
470 } else if (STR_EQ(pat, "FAIL")) { /* obsolete */
473 } else if (reserved_name(pat)) { /* other reserved */
475 } else if (NOT_INADDR(pat)) { /* internet name */
476 if (pat[strlen(pat) - 1] == '.') {
477 tcpd_warn("%s: domain or host name ends in dot", pat);
478 } else if (pat[0] != '.') {
479 addr_count = check_dns(pat);
482 if (STR_EQ(pat, "0.0.0.0") || STR_EQ(pat, "255.255.255.255")) {
484 } else if (pat[0] == '.') {
485 tcpd_warn("%s: network number begins with dot", pat);
486 } else if (pat[strlen(pat) - 1] != '.') {
487 check_dns(pat);
495 static int reserved_name(char *pat)
497 return (STR_EQ(pat, unknown)
498 || STR_EQ(pat, "KNOWN")
499 || STR_EQ(pat, paranoid)
500 || STR_EQ(pat, "ALL")
501 || STR_EQ(pat, "LOCAL"));