Lines Matching refs:pat
348 static void check_daemon(pat) in check_daemon() argument
349 char *pat; in check_daemon()
351 if (pat[0] == '@') {
352 tcpd_warn("%s: daemon name begins with \"@\"", pat);
353 } else if (pat[0] == '.') {
354 tcpd_warn("%s: daemon name begins with dot", pat);
355 } else if (pat[strlen(pat) - 1] == '.') {
356 tcpd_warn("%s: daemon name ends in dot", pat);
357 } else if (STR_EQ(pat, "ALL") || STR_EQ(pat, unknown)) {
359 } else if (STR_EQ(pat, "FAIL")) { /* obsolete */
362 } else if (reserved_name(pat)) {
363 tcpd_warn("%s: daemon name may be reserved word", pat);
365 switch (inet_get(pat)) {
367 tcpd_warn("%s: no such process name in %s", pat, inetcf);
368 inet_set(pat, WR_YES); /* shut up next time */
371 tcpd_warn("%s: service possibly not wrapped", pat);
372 inet_set(pat, WR_YES);
380 static void check_user(pat) in check_user() argument
381 char *pat; in check_user()
383 if (pat[0] == '@') { /* @netgroup */
384 tcpd_warn("%s: user name begins with \"@\"", pat);
385 } else if (pat[0] == '.') {
386 tcpd_warn("%s: user name begins with dot", pat);
387 } else if (pat[strlen(pat) - 1] == '.') {
388 tcpd_warn("%s: user name ends in dot", pat);
389 } else if (STR_EQ(pat, "ALL") || STR_EQ(pat, unknown)
390 || STR_EQ(pat, "KNOWN")) {
392 } else if (STR_EQ(pat, "FAIL")) { /* obsolete */
395 } else if (reserved_name(pat)) {
396 tcpd_warn("%s: user name may be reserved word", pat);
402 static int check_host(pat) in check_host() argument
403 char *pat; in check_host()
408 if (pat[0] == '@') { /* @netgroup */
417 setnetgrent(pat + 1);
419 tcpd_warn("%s: unknown or empty netgroup", pat + 1);
426 } else if (pat[0] == '[') {
428 char *cbr = strchr(pat, ']');
429 char *slash = strchr(pat, '/');
442 err += inet_pton(AF_INET6, pat+1, &in6) != 1;
447 tcpd_warn("bad IP6 address specification: %s", pat);
449 } else if (mask = split_at(pat, '/')) { /* network/netmask */
450 if (dot_quad_addr(pat) == INADDR_NONE
452 tcpd_warn("%s/%s: bad net/mask pattern", pat, mask);
453 } else if (STR_EQ(pat, "FAIL")) { /* obsolete */
456 } else if (reserved_name(pat)) { /* other reserved */
458 } else if (NOT_INADDR(pat)) { /* internet name */
459 if (pat[strlen(pat) - 1] == '.') {
460 tcpd_warn("%s: domain or host name ends in dot", pat);
461 } else if (pat[0] != '.') {
462 addr_count = check_dns(pat);
465 if (STR_EQ(pat, "0.0.0.0") || STR_EQ(pat, "255.255.255.255")) {
467 } else if (pat[0] == '.') {
468 tcpd_warn("%s: network number begins with dot", pat);
469 } else if (pat[strlen(pat) - 1] != '.') {
470 check_dns(pat);
478 static int reserved_name(pat) in reserved_name() argument
479 char *pat; in reserved_name()
481 return (STR_EQ(pat, unknown)
482 || STR_EQ(pat, "KNOWN")
483 || STR_EQ(pat, paranoid)
484 || STR_EQ(pat, "ALL")
485 || STR_EQ(pat, "LOCAL"));