xref: /onnv-gate/usr/src/cmd/idmap/idmapd/idmapd.h (revision 12914:e95332bf1454)
14520Snw141292 /*
24520Snw141292  * CDDL HEADER START
34520Snw141292  *
44520Snw141292  * The contents of this file are subject to the terms of the
54520Snw141292  * Common Development and Distribution License (the "License").
64520Snw141292  * You may not use this file except in compliance with the License.
74520Snw141292  *
84520Snw141292  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
94520Snw141292  * or http://www.opensolaris.org/os/licensing.
104520Snw141292  * See the License for the specific language governing permissions
114520Snw141292  * and limitations under the License.
124520Snw141292  *
134520Snw141292  * When distributing Covered Code, include this CDDL HEADER in each
144520Snw141292  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
154520Snw141292  * If applicable, add the following below this CDDL HEADER, with the
164520Snw141292  * fields enclosed by brackets "[]" replaced with your own identifying
174520Snw141292  * information: Portions Copyright [yyyy] [name of copyright owner]
184520Snw141292  *
194520Snw141292  * CDDL HEADER END
204520Snw141292  */
214520Snw141292 /*
2212508Samw@Sun.COM  * Copyright (c) 2007, 2010, Oracle and/or its affiliates. All rights reserved.
234520Snw141292  */
244520Snw141292 
254520Snw141292 #ifndef _IDMAPD_H
264520Snw141292 #define	_IDMAPD_H
274520Snw141292 
284520Snw141292 #include <stdio.h>
294520Snw141292 #include <stdlib.h>
304520Snw141292 #include <stdarg.h>
314520Snw141292 #include <rpc/rpc.h>
324520Snw141292 #include <synch.h>
334520Snw141292 #include <thread.h>
344520Snw141292 #include <libintl.h>
354520Snw141292 #include <strings.h>
364520Snw141292 #include <sqlite/sqlite.h>
378671SJulian.Pullen@Sun.COM #include <syslog.h>
384520Snw141292 #include <inttypes.h>
399565SJordan.Brown@Sun.COM #include <rpcsvc/idmap_prot.h>
404520Snw141292 #include "adutils.h"
418671SJulian.Pullen@Sun.COM #include "idmap_priv.h"
424520Snw141292 #include "idmap_config.h"
438040SBaban.Kenkre@Sun.COM #include "libadutils.h"
444520Snw141292 
454520Snw141292 #ifdef __cplusplus
464520Snw141292 extern "C" {
474520Snw141292 #endif
484520Snw141292 
496616Sdm199847 #define	CHECK_NULL(s)	(s != NULL ? s : "null")
504520Snw141292 
514520Snw141292 extern mutex_t _svcstate_lock;	/* lock for _rpcsvcstate, _rpcsvccount */
524520Snw141292 
535731Sbaban typedef enum idmap_namemap_mode {
545731Sbaban 	IDMAP_NM_NONE = 0,
555731Sbaban 	IDMAP_NM_AD,
565731Sbaban 	IDMAP_NM_NLDAP,
575731Sbaban 	IDMAP_NM_MIXED
585731Sbaban } idmap_namemap_mode_t;
595731Sbaban 
604520Snw141292 /*
6112508Samw@Sun.COM  * Debugging output.
6212508Samw@Sun.COM  *
6312508Samw@Sun.COM  * There are some number of areas - configuration, mapping, discovery, et
6412508Samw@Sun.COM  * cetera - and for each area there is a verbosity level controlled through
6512508Samw@Sun.COM  * an SMF property.  The default is zero, and "debug/all" provides a master
6612508Samw@Sun.COM  * control allowing you to turn on all debugging output with one setting.
6712508Samw@Sun.COM  *
6812508Samw@Sun.COM  * A typical debugging output sequence would look like
6912508Samw@Sun.COM  *
7012508Samw@Sun.COM  * 	if (DBG(CONFIG, 2)) {
7112508Samw@Sun.COM  *		idmapdlog(LOG_DEBUG,
7212508Samw@Sun.COM  *		    "some message about config at verbosity 2");
7312508Samw@Sun.COM  *	}
7412508Samw@Sun.COM  */
7512508Samw@Sun.COM enum idmapd_debug {
7612508Samw@Sun.COM 	IDMAPD_DEBUG_ALL = 0,
7712508Samw@Sun.COM 	IDMAPD_DEBUG_CONFIG = 1,
7812508Samw@Sun.COM 	IDMAPD_DEBUG_MAPPING = 2,
7912508Samw@Sun.COM 	IDMAPD_DEBUG_DISC = 3,
8012508Samw@Sun.COM 	IDMAPD_DEBUG_DNS = 4,
8112508Samw@Sun.COM 	IDMAPD_DEBUG_LDAP = 5,
8212508Samw@Sun.COM 	IDMAPD_DEBUG_MAX = 5
8312508Samw@Sun.COM };
8412508Samw@Sun.COM 
8512508Samw@Sun.COM #define	DBG(type, lev)	\
8612508Samw@Sun.COM 	(_idmapdstate.debug[IDMAPD_DEBUG_##type] >= (lev) || \
8712508Samw@Sun.COM 	    _idmapdstate.debug[IDMAPD_DEBUG_ALL] >= (lev))
8812508Samw@Sun.COM 
8912508Samw@Sun.COM /*
904520Snw141292  * Global state of idmapd daemon.
914520Snw141292  */
924520Snw141292 typedef struct idmapd_state {
934520Snw141292 	rwlock_t	rwlk_cfg;		/* config lock */
944520Snw141292 	idmap_cfg_t	*cfg;			/* config */
956017Snw141292 	bool_t		daemon_mode;
964520Snw141292 	char		hostname[MAX_NAME_LEN];	/* my hostname */
974520Snw141292 	uid_t		next_uid;
984520Snw141292 	gid_t		next_gid;
994520Snw141292 	uid_t		limit_uid;
1004520Snw141292 	gid_t		limit_gid;
1014520Snw141292 	int		new_eph_db;	/* was the ephem ID db [re-]created? */
10210504SKeyur.Desai@Sun.COM 	int		num_gcs;
10310504SKeyur.Desai@Sun.COM 	adutils_ad_t	**gcs;
10410504SKeyur.Desai@Sun.COM 	int		num_dcs;
10510504SKeyur.Desai@Sun.COM 	adutils_ad_t	**dcs;
10612508Samw@Sun.COM 	int		debug[IDMAPD_DEBUG_MAX+1];
1074520Snw141292 } idmapd_state_t;
1084520Snw141292 extern idmapd_state_t	_idmapdstate;
1094520Snw141292 
1104520Snw141292 #define	RDLOCK_CONFIG() \
1114520Snw141292 	(void) rw_rdlock(&_idmapdstate.rwlk_cfg);
1124520Snw141292 #define	WRLOCK_CONFIG() \
1134520Snw141292 	(void) rw_wrlock(&_idmapdstate.rwlk_cfg);
1144520Snw141292 #define	UNLOCK_CONFIG() \
1154520Snw141292 	(void) rw_unlock(&_idmapdstate.rwlk_cfg);
1164520Snw141292 
1174864Sbaban typedef struct hashentry {
1184864Sbaban 	uint_t	key;
1194864Sbaban 	uint_t	next;
1204864Sbaban } hashentry_t;
1214864Sbaban 
1224520Snw141292 typedef struct lookup_state {
1234520Snw141292 	bool_t			sid2pid_done;
1244520Snw141292 	bool_t			pid2sid_done;
1254520Snw141292 	int			ad_nqueries;
1265731Sbaban 	int			nldap_nqueries;
1277031Snw141292 	bool_t			eph_map_unres_sids;
12810504SKeyur.Desai@Sun.COM 	int			directory_based_mapping;	/* enum */
1294864Sbaban 	uint_t			curpos;
1304864Sbaban 	hashentry_t		*sid_history;
1314864Sbaban 	uint_t			sid_history_size;
1324864Sbaban 	idmap_mapping_batch	*batch;
1334864Sbaban 	idmap_ids_res		*result;
1345731Sbaban 	idmap_namemap_mode_t	nm_siduid;
1355731Sbaban 	idmap_namemap_mode_t	nm_sidgid;
1365731Sbaban 	char			*ad_unixuser_attr;
1375731Sbaban 	char			*ad_unixgroup_attr;
1386616Sdm199847 	char			*nldap_winname_attr;
1396616Sdm199847 	char			*defdom;
1406616Sdm199847 	sqlite			*cache;
1416616Sdm199847 	sqlite			*db;
1424520Snw141292 } lookup_state_t;
1434520Snw141292 
1445731Sbaban #define	NLDAP_OR_MIXED(nm) \
145*12914SJoyce.McIntosh@Sun.COM 	((nm) == IDMAP_NM_NLDAP || (nm) == IDMAP_NM_MIXED)
1465731Sbaban #define	AD_OR_MIXED(nm) \
147*12914SJoyce.McIntosh@Sun.COM 	((nm) == IDMAP_NM_AD || (nm) == IDMAP_NM_MIXED)
148*12914SJoyce.McIntosh@Sun.COM 
149*12914SJoyce.McIntosh@Sun.COM #define	PID_UID_OR_UNKNOWN(pidtype) \
150*12914SJoyce.McIntosh@Sun.COM 	((pidtype) == IDMAP_UID || (pidtype) == IDMAP_POSIXID)
151*12914SJoyce.McIntosh@Sun.COM #define	PID_GID_OR_UNKNOWN(pidtype) \
152*12914SJoyce.McIntosh@Sun.COM 	((pidtype) == IDMAP_GID || (pidtype) == IDMAP_POSIXID)
1535731Sbaban 
1545731Sbaban #define	NLDAP_OR_MIXED_MODE(pidtype, ls) \
155*12914SJoyce.McIntosh@Sun.COM 	(NLDAP_MODE(pidtype, ls) || MIXED_MODE(pidtype, ls))
1565731Sbaban #define	AD_OR_MIXED_MODE(pidtype, ls)\
157*12914SJoyce.McIntosh@Sun.COM 	(AD_MODE(pidtype, ls) || MIXED_MODE(pidtype, ls))
1585731Sbaban #define	NLDAP_MODE(pidtype, ls) \
159*12914SJoyce.McIntosh@Sun.COM 	((PID_UID_OR_UNKNOWN(pidtype) && (ls)->nm_siduid == IDMAP_NM_NLDAP) || \
160*12914SJoyce.McIntosh@Sun.COM 	(PID_GID_OR_UNKNOWN(pidtype) && (ls)->nm_sidgid == IDMAP_NM_NLDAP))
1615731Sbaban #define	AD_MODE(pidtype, ls) \
162*12914SJoyce.McIntosh@Sun.COM 	((PID_UID_OR_UNKNOWN(pidtype) && (ls)->nm_siduid == IDMAP_NM_AD) || \
163*12914SJoyce.McIntosh@Sun.COM 	(PID_GID_OR_UNKNOWN(pidtype) && (ls)->nm_sidgid == IDMAP_NM_AD))
1645731Sbaban #define	MIXED_MODE(pidtype, ls) \
165*12914SJoyce.McIntosh@Sun.COM 	((PID_UID_OR_UNKNOWN(pidtype) && (ls)->nm_siduid == IDMAP_NM_MIXED) || \
166*12914SJoyce.McIntosh@Sun.COM 	(PID_GID_OR_UNKNOWN(pidtype) && (ls)->nm_sidgid == IDMAP_NM_MIXED))
1675731Sbaban 
1685731Sbaban 
1694520Snw141292 typedef struct list_cb_data {
1704520Snw141292 	void		*result;
1714520Snw141292 	uint64_t	next;
1724520Snw141292 	uint64_t	len;
1734520Snw141292 	uint64_t	limit;
1746386Sjp151216 	int		flag;
1754520Snw141292 } list_cb_data_t;
1764520Snw141292 
1774520Snw141292 typedef struct msg_table {
1784520Snw141292 	idmap_retcode	retcode;
1794520Snw141292 	const char	*msg;
1804520Snw141292 } msg_table_t;
1814520Snw141292 
18210122SJordan.Brown@Sun.COM /*
18310122SJordan.Brown@Sun.COM  * Data structure to store well-known SIDs and
18410122SJordan.Brown@Sun.COM  * associated mappings (if any)
18510122SJordan.Brown@Sun.COM  */
18610122SJordan.Brown@Sun.COM typedef struct wksids_table {
18710122SJordan.Brown@Sun.COM 	const char	*sidprefix;
18810122SJordan.Brown@Sun.COM 	uint32_t	rid;
18910122SJordan.Brown@Sun.COM 	const char	*domain;
19010122SJordan.Brown@Sun.COM 	const char	*winname;
19110122SJordan.Brown@Sun.COM 	int		is_wuser;
19210504SKeyur.Desai@Sun.COM 	posix_id_t	pid;
19310122SJordan.Brown@Sun.COM 	int		is_user;
19410122SJordan.Brown@Sun.COM 	int		direction;
19510122SJordan.Brown@Sun.COM } wksids_table_t;
19610122SJordan.Brown@Sun.COM 
1975968Snw141292 #define	IDMAPD_SEARCH_TIMEOUT		3   /* seconds */
1985968Snw141292 #define	IDMAPD_LDAP_OPEN_TIMEOUT	1   /* secs; initial, w/ exp backoff */
1995968Snw141292 
2004864Sbaban /*
2015731Sbaban  * The following flags are used by idmapd while processing a
2025731Sbaban  * given mapping request. Note that idmapd uses multiple passes to
2035731Sbaban  * process the request and the flags are used to pass information
2045731Sbaban  * about the state of the request between these passes.
2054864Sbaban  */
2064520Snw141292 
2075731Sbaban /* Initial state. Done. Reset all flags. Remaining passes can be skipped */
2085731Sbaban #define	_IDMAP_F_DONE			0x00000000
2095731Sbaban /* Set when subsequent passes are required */
2105731Sbaban #define	_IDMAP_F_NOTDONE		0x00000001
2115731Sbaban /* Don't update name_cache. (e.g. set when winname,SID found in name_cache) */
2125731Sbaban #define	_IDMAP_F_DONT_UPDATE_NAMECACHE	0x00000002
2135731Sbaban /* Batch this request for AD lookup */
2145731Sbaban #define	_IDMAP_F_LOOKUP_AD		0x00000004
2155731Sbaban /* Batch this request for nldap directory lookup */
2165731Sbaban #define	_IDMAP_F_LOOKUP_NLDAP		0x00000008
2175731Sbaban /*
2185731Sbaban  * Expired ephemeral mapping found in cache when processing sid2uid request.
2195731Sbaban  * Use it if the given SID cannot be mapped by name
2205731Sbaban  */
2215731Sbaban #define	_IDMAP_F_EXP_EPH_UID		0x00000010
2225731Sbaban /* Same as above. Used for sid2gid request */
2235731Sbaban #define	_IDMAP_F_EXP_EPH_GID		0x00000020
2248361SJulian.Pullen@Sun.COM /* This request is not valid for the current forest */
2258361SJulian.Pullen@Sun.COM #define	_IDMAP_F_LOOKUP_OTHER_AD	0x00000040
2268361SJulian.Pullen@Sun.COM 
2274520Snw141292 
2285731Sbaban /*
2295731Sbaban  * Check if we are done. If so, subsequent passes can be skipped
2305731Sbaban  * when processing a given mapping request.
2315731Sbaban  */
2325731Sbaban #define	ARE_WE_DONE(f)	((f & _IDMAP_F_NOTDONE) == 0)
2334520Snw141292 
2344520Snw141292 #define	SIZE_INCR	5
2354520Snw141292 #define	MAX_TRIES	5
2364520Snw141292 #define	IDMAP_DBDIR	"/var/idmap"
2374520Snw141292 #define	IDMAP_CACHEDIR	"/var/run/idmap"
2384520Snw141292 #define	IDMAP_DBNAME	IDMAP_DBDIR "/idmap.db"
2394520Snw141292 #define	IDMAP_CACHENAME	IDMAP_CACHEDIR "/idmap.db"
2405064Sdm199847 
24112508Samw@Sun.COM #define	IS_ID_NONE(id)	\
24212508Samw@Sun.COM 	((id).idtype == IDMAP_NONE)
2435696Snw141292 
24411337SWilliam.Krier@Sun.COM #define	IS_ID_SID(id)	\
24511337SWilliam.Krier@Sun.COM 	((id).idtype == IDMAP_SID ||	\
24611337SWilliam.Krier@Sun.COM 	(id).idtype == IDMAP_USID ||	\
24711337SWilliam.Krier@Sun.COM 	(id).idtype == IDMAP_GSID)	\
24811337SWilliam.Krier@Sun.COM 
24912508Samw@Sun.COM #define	IS_ID_UID(id)	\
25012508Samw@Sun.COM 	((id).idtype == IDMAP_UID)
2515696Snw141292 
25212508Samw@Sun.COM #define	IS_ID_GID(id)	\
25312508Samw@Sun.COM 	((id).idtype == IDMAP_GID)
2545696Snw141292 
25512508Samw@Sun.COM #define	IS_ID_POSIX(id)	\
25612508Samw@Sun.COM 	((id).idtype == IDMAP_UID ||	\
25712508Samw@Sun.COM 	(id).idtype == IDMAP_GID ||	\
25812508Samw@Sun.COM 	(id).idtype == IDMAP_POSIXID)	\
2595696Snw141292 
26010122SJordan.Brown@Sun.COM /*
26110122SJordan.Brown@Sun.COM  * Local RID ranges
26210122SJordan.Brown@Sun.COM  */
26310122SJordan.Brown@Sun.COM #define	LOCALRID_UID_MIN	1000U
26410122SJordan.Brown@Sun.COM #define	LOCALRID_UID_MAX	((uint32_t)INT32_MAX)
26510122SJordan.Brown@Sun.COM #define	LOCALRID_GID_MIN	(((uint32_t)INT32_MAX) + 1)
26610122SJordan.Brown@Sun.COM #define	LOCALRID_GID_MAX	UINT32_MAX
26710122SJordan.Brown@Sun.COM 
26812508Samw@Sun.COM /*
26912508Samw@Sun.COM  * Tracing.
27012508Samw@Sun.COM  *
27112508Samw@Sun.COM  * The tracing mechanism is intended to help the administrator understand
27212508Samw@Sun.COM  * why their mapping configuration is doing what it is.  Each interesting
27312508Samw@Sun.COM  * decision point during the mapping process calls TRACE() with the current
27412508Samw@Sun.COM  * request and response and a printf-style message.  The message, plus
27512508Samw@Sun.COM  * data from the request and the response, is logged to the service log
27612508Samw@Sun.COM  * (if debug/mapping is greater than zero) or reported to the caller
27712508Samw@Sun.COM  * (if IDMAP_REQ_FLG_TRACE was set in the request.  The primary consumer
27812508Samw@Sun.COM  * is the "-V" option to "idmap show".
27912508Samw@Sun.COM  *
28012508Samw@Sun.COM  * TRACING(req) says whether tracing is appropriate for the request, and
28112508Samw@Sun.COM  * is used to determine and record whether any request in a batch requested
28212508Samw@Sun.COM  * tracing, to control whether later code loops over the batch to do tracing
28312508Samw@Sun.COM  * for any of the requests.
28412508Samw@Sun.COM  *
28512508Samw@Sun.COM  * TRACE(req, res, fmt, ...) generates a trace entry if appropriate.
28612508Samw@Sun.COM  */
28712508Samw@Sun.COM #define	TRACING(req)	\
28812508Samw@Sun.COM 	(DBG(MAPPING, 1) ||	\
28912508Samw@Sun.COM 	((req)->flag & IDMAP_REQ_FLG_TRACE) != 0)
29012508Samw@Sun.COM #define	TRACE(req, res, ...)			\
29112508Samw@Sun.COM 	((void)(TRACING(req) && trace(req, res, __VA_ARGS__)))
29212508Samw@Sun.COM extern int	trace(idmap_mapping *req, idmap_id_res *res, char *fmt, ...);
29312508Samw@Sun.COM 
2944520Snw141292 typedef idmap_retcode (*update_list_res_cb)(void *, const char **, uint64_t);
2954520Snw141292 typedef int (*list_svc_cb)(void *, int, char **, char **);
2964520Snw141292 
2974520Snw141292 extern void	idmap_prog_1(struct svc_req *, register SVCXPRT *);
2984520Snw141292 extern void	idmapdlog(int, const char *, ...);
2994520Snw141292 extern int	init_mapping_system();
3004520Snw141292 extern void	fini_mapping_system();
3014520Snw141292 extern void	print_idmapdstate();
3024520Snw141292 extern int	create_directory(const char *, uid_t, gid_t);
3034520Snw141292 extern int	load_config();
3046097Snw141292 extern void	reload_ad();
30512508Samw@Sun.COM extern void	idmap_init_tsd_key(void);
3066097Snw141292 extern void	degrade_svc(int, const char *);
3075317Sjp151216 extern void	restore_svc(void);
3084520Snw141292 
3094520Snw141292 
3104520Snw141292 extern int		init_dbs();
3114520Snw141292 extern void		fini_dbs();
3124520Snw141292 extern idmap_retcode	get_db_handle(sqlite **);
3134520Snw141292 extern idmap_retcode	get_cache_handle(sqlite **);
3146017Snw141292 extern idmap_retcode	sql_exec_no_cb(sqlite *, const char *, char *);
3154520Snw141292 extern idmap_retcode	add_namerule(sqlite *, idmap_namerule *);
3164520Snw141292 extern idmap_retcode	rm_namerule(sqlite *, idmap_namerule *);
3175696Snw141292 extern idmap_retcode	flush_namerules(sqlite *);
3184520Snw141292 
3195696Snw141292 extern char 		*tolower_u8(const char *);
3205696Snw141292 
3215696Snw141292 extern idmap_retcode	gen_sql_expr_from_rule(idmap_namerule *, char **);
3224520Snw141292 extern idmap_retcode	validate_list_cb_data(list_cb_data_t *, int,
3234520Snw141292 				char **, int, uchar_t **, size_t);
3246017Snw141292 extern idmap_retcode	process_list_svc_sql(sqlite *, const char *, char *,
3256386Sjp151216 				uint64_t, int, list_svc_cb, void *);
3266616Sdm199847 extern idmap_retcode	sid2pid_first_pass(lookup_state_t *,
3274520Snw141292 				idmap_mapping *, idmap_id_res *);
3286616Sdm199847 extern idmap_retcode	sid2pid_second_pass(lookup_state_t *,
3296616Sdm199847 				idmap_mapping *, idmap_id_res *);
3306616Sdm199847 extern idmap_retcode	pid2sid_first_pass(lookup_state_t *,
33111337SWilliam.Krier@Sun.COM 				idmap_mapping *, idmap_id_res *, int);
3326616Sdm199847 extern idmap_retcode	pid2sid_second_pass(lookup_state_t *,
3336616Sdm199847 				idmap_mapping *, idmap_id_res *, int);
3346616Sdm199847 extern idmap_retcode	update_cache_sid2pid(lookup_state_t *,
3354520Snw141292 				idmap_mapping *, idmap_id_res *);
3366616Sdm199847 extern idmap_retcode	update_cache_pid2sid(lookup_state_t *,
3374520Snw141292 				idmap_mapping *, idmap_id_res *);
3384520Snw141292 extern idmap_retcode	get_u2w_mapping(sqlite *, sqlite *, idmap_mapping *,
3394520Snw141292 				idmap_mapping *, int);
3404520Snw141292 extern idmap_retcode	get_w2u_mapping(sqlite *, sqlite *, idmap_mapping *,
3414520Snw141292 				idmap_mapping *);
3426616Sdm199847 extern idmap_retcode	load_cfg_in_state(lookup_state_t *);
3435731Sbaban extern void		cleanup_lookup_state(lookup_state_t *);
3444520Snw141292 
3455731Sbaban extern idmap_retcode	ad_lookup_batch(lookup_state_t *,
3464520Snw141292 				idmap_mapping_batch *, idmap_ids_res *);
3476616Sdm199847 extern idmap_retcode	lookup_name2sid(sqlite *, const char *, const char *,
34812508Samw@Sun.COM 				int, char **, char **, char **,
34912508Samw@Sun.COM 				idmap_rid_t *, idmap_id_type *,
35012508Samw@Sun.COM 				idmap_mapping *, int);
3519422SAfshin.Ardakani@Sun.COM extern idmap_retcode	lookup_wksids_name2sid(const char *, const char *,
3529422SAfshin.Ardakani@Sun.COM 				char **, char **, char **, idmap_rid_t *,
35312508Samw@Sun.COM 				idmap_id_type *);
35411963SAfshin.Ardakani@Sun.COM extern idmap_retcode	idmap_cache_flush(idmap_flush_op);
3558671SJulian.Pullen@Sun.COM 
35610504SKeyur.Desai@Sun.COM extern const wksids_table_t *find_wksid_by_pid(posix_id_t pid, int is_user);
35710122SJordan.Brown@Sun.COM extern const wksids_table_t *find_wksid_by_sid(const char *sid, int rid,
35812508Samw@Sun.COM     idmap_id_type type);
35910122SJordan.Brown@Sun.COM extern const wksids_table_t *find_wksid_by_name(const char *name,
36012508Samw@Sun.COM     const char *domain, idmap_id_type type);
36110122SJordan.Brown@Sun.COM extern const wksids_table_t *find_wk_by_sid(char *sid);
36210122SJordan.Brown@Sun.COM 
3634520Snw141292 #ifdef __cplusplus
3644520Snw141292 }
3654520Snw141292 #endif
3664520Snw141292 
3674520Snw141292 #endif /* _IDMAPD_H */
368