Wrap hdb_entry with hdb_entry_ex, patch originally from Andrew Bartlet
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@16378 ec53bebd-3082-4978-b11e-865c3cabbd6b
This commit is contained in:
@@ -79,22 +79,22 @@ hdb_value2entry(krb5_context context, krb5_data *value, hdb_entry *ent)
|
||||
}
|
||||
|
||||
krb5_error_code
|
||||
_hdb_fetch(krb5_context context, HDB *db, unsigned flags, hdb_entry *entry)
|
||||
_hdb_fetch(krb5_context context, HDB *db, unsigned flags, hdb_entry_ex *entry)
|
||||
{
|
||||
krb5_data key, value;
|
||||
int code;
|
||||
|
||||
hdb_principal2key(context, entry->principal, &key);
|
||||
hdb_principal2key(context, entry->entry.principal, &key);
|
||||
code = db->hdb__get(context, db, key, &value);
|
||||
krb5_data_free(&key);
|
||||
if(code)
|
||||
return code;
|
||||
code = hdb_value2entry(context, &value, entry);
|
||||
code = hdb_value2entry(context, &value, &entry->entry);
|
||||
krb5_data_free(&value);
|
||||
if (code)
|
||||
return code;
|
||||
if (db->hdb_master_key_set && (flags & HDB_F_DECRYPT)) {
|
||||
code = hdb_unseal_keys (context, db, entry);
|
||||
code = hdb_unseal_keys (context, db, &entry->entry);
|
||||
if (code)
|
||||
hdb_free_entry(context, entry);
|
||||
}
|
||||
@@ -102,31 +102,31 @@ _hdb_fetch(krb5_context context, HDB *db, unsigned flags, hdb_entry *entry)
|
||||
}
|
||||
|
||||
krb5_error_code
|
||||
_hdb_store(krb5_context context, HDB *db, unsigned flags, hdb_entry *entry)
|
||||
_hdb_store(krb5_context context, HDB *db, unsigned flags, hdb_entry_ex *entry)
|
||||
{
|
||||
krb5_data key, value;
|
||||
int code;
|
||||
|
||||
if(entry->generation == NULL) {
|
||||
if(entry->entry.generation == NULL) {
|
||||
struct timeval t;
|
||||
entry->generation = malloc(sizeof(*entry->generation));
|
||||
if(entry->generation == NULL) {
|
||||
entry->entry.generation = malloc(sizeof(*entry->entry.generation));
|
||||
if(entry->entry.generation == NULL) {
|
||||
krb5_set_error_string(context, "malloc: out of memory");
|
||||
return ENOMEM;
|
||||
}
|
||||
gettimeofday(&t, NULL);
|
||||
entry->generation->time = t.tv_sec;
|
||||
entry->generation->usec = t.tv_usec;
|
||||
entry->generation->gen = 0;
|
||||
entry->entry.generation->time = t.tv_sec;
|
||||
entry->entry.generation->usec = t.tv_usec;
|
||||
entry->entry.generation->gen = 0;
|
||||
} else
|
||||
entry->generation->gen++;
|
||||
hdb_principal2key(context, entry->principal, &key);
|
||||
code = hdb_seal_keys(context, db, entry);
|
||||
entry->entry.generation->gen++;
|
||||
hdb_principal2key(context, entry->entry.principal, &key);
|
||||
code = hdb_seal_keys(context, db, &entry->entry);
|
||||
if (code) {
|
||||
krb5_data_free(&key);
|
||||
return code;
|
||||
}
|
||||
hdb_entry2value(context, entry, &value);
|
||||
hdb_entry2value(context, &entry->entry, &value);
|
||||
code = db->hdb__put(context, db, flags & HDB_F_REPLACE, key, value);
|
||||
krb5_data_free(&value);
|
||||
krb5_data_free(&key);
|
||||
@@ -134,12 +134,12 @@ _hdb_store(krb5_context context, HDB *db, unsigned flags, hdb_entry *entry)
|
||||
}
|
||||
|
||||
krb5_error_code
|
||||
_hdb_remove(krb5_context context, HDB *db, hdb_entry *entry)
|
||||
_hdb_remove(krb5_context context, HDB *db, hdb_entry_ex *entry)
|
||||
{
|
||||
krb5_data key;
|
||||
int code;
|
||||
|
||||
hdb_principal2key(context, entry->principal, &key);
|
||||
hdb_principal2key(context, entry->entry.principal, &key);
|
||||
code = db->hdb__del(context, db, key);
|
||||
krb5_data_free(&key);
|
||||
return code;
|
||||
|
18
lib/hdb/db.c
18
lib/hdb/db.c
@@ -85,7 +85,7 @@ DB_unlock(krb5_context context, HDB *db)
|
||||
|
||||
static krb5_error_code
|
||||
DB_seq(krb5_context context, HDB *db,
|
||||
unsigned flags, hdb_entry *entry, int flag)
|
||||
unsigned flags, hdb_entry_ex *entry, int flag)
|
||||
{
|
||||
DB *d = (DB*)db->hdb_db;
|
||||
DBT key, value;
|
||||
@@ -106,21 +106,21 @@ DB_seq(krb5_context context, HDB *db,
|
||||
key_data.length = key.size;
|
||||
data.data = value.data;
|
||||
data.length = value.size;
|
||||
if (hdb_value2entry(context, &data, entry))
|
||||
if (hdb_value2entry(context, &data, &entry->entry))
|
||||
return DB_seq(context, db, flags, entry, R_NEXT);
|
||||
if (db->hdb_master_key_set && (flags & HDB_F_DECRYPT)) {
|
||||
code = hdb_unseal_keys (context, db, entry);
|
||||
code = hdb_unseal_keys (context, db, &entry->entry);
|
||||
if (code)
|
||||
hdb_free_entry (context, entry);
|
||||
}
|
||||
if (code == 0 && entry->principal == NULL) {
|
||||
entry->principal = malloc(sizeof(*entry->principal));
|
||||
if (entry->principal == NULL) {
|
||||
if (code == 0 && entry->entry.principal == NULL) {
|
||||
entry->entry.principal = malloc(sizeof(*entry->entry.principal));
|
||||
if (entry->entry.principal == NULL) {
|
||||
krb5_set_error_string(context, "malloc: out of memory");
|
||||
code = ENOMEM;
|
||||
hdb_free_entry (context, entry);
|
||||
} else {
|
||||
hdb_key2principal(context, &key_data, entry->principal);
|
||||
hdb_key2principal(context, &key_data, entry->entry.principal);
|
||||
}
|
||||
}
|
||||
return code;
|
||||
@@ -128,14 +128,14 @@ DB_seq(krb5_context context, HDB *db,
|
||||
|
||||
|
||||
static krb5_error_code
|
||||
DB_firstkey(krb5_context context, HDB *db, unsigned flags, hdb_entry *entry)
|
||||
DB_firstkey(krb5_context context, HDB *db, unsigned flags, hdb_entry_ex *entry)
|
||||
{
|
||||
return DB_seq(context, db, flags, entry, R_FIRST);
|
||||
}
|
||||
|
||||
|
||||
static krb5_error_code
|
||||
DB_nextkey(krb5_context context, HDB *db, unsigned flags, hdb_entry *entry)
|
||||
DB_nextkey(krb5_context context, HDB *db, unsigned flags, hdb_entry_ex *entry)
|
||||
{
|
||||
return DB_seq(context, db, flags, entry, R_NEXT);
|
||||
}
|
||||
|
@@ -91,7 +91,7 @@ DB_unlock(krb5_context context, HDB *db)
|
||||
|
||||
static krb5_error_code
|
||||
DB_seq(krb5_context context, HDB *db,
|
||||
unsigned flags, hdb_entry *entry, int flag)
|
||||
unsigned flags, hdb_entry_ex *entry, int flag)
|
||||
{
|
||||
DBT key, value;
|
||||
DBC *dbcp = db->hdb_dbc;
|
||||
@@ -113,21 +113,21 @@ DB_seq(krb5_context context, HDB *db,
|
||||
key_data.length = key.size;
|
||||
data.data = value.data;
|
||||
data.length = value.size;
|
||||
if (hdb_value2entry(context, &data, entry))
|
||||
if (hdb_value2entry(context, &data, &entry->entry))
|
||||
return DB_seq(context, db, flags, entry, DB_NEXT);
|
||||
if (db->hdb_master_key_set && (flags & HDB_F_DECRYPT)) {
|
||||
code = hdb_unseal_keys (context, db, entry);
|
||||
code = hdb_unseal_keys (context, db, &entry->entry);
|
||||
if (code)
|
||||
hdb_free_entry (context, entry);
|
||||
}
|
||||
if (entry->principal == NULL) {
|
||||
entry->principal = malloc(sizeof(*entry->principal));
|
||||
if (entry->principal == NULL) {
|
||||
if (entry->entry.principal == NULL) {
|
||||
entry->entry.principal = malloc(sizeof(*entry->entry.principal));
|
||||
if (entry->entry.principal == NULL) {
|
||||
hdb_free_entry (context, entry);
|
||||
krb5_set_error_string(context, "malloc: out of memory");
|
||||
return ENOMEM;
|
||||
} else {
|
||||
hdb_key2principal(context, &key_data, entry->principal);
|
||||
hdb_key2principal(context, &key_data, entry->entry.principal);
|
||||
}
|
||||
}
|
||||
return 0;
|
||||
@@ -135,14 +135,14 @@ DB_seq(krb5_context context, HDB *db,
|
||||
|
||||
|
||||
static krb5_error_code
|
||||
DB_firstkey(krb5_context context, HDB *db, unsigned flags, hdb_entry *entry)
|
||||
DB_firstkey(krb5_context context, HDB *db, unsigned flags, hdb_entry_ex *entry)
|
||||
{
|
||||
return DB_seq(context, db, flags, entry, DB_FIRST);
|
||||
}
|
||||
|
||||
|
||||
static krb5_error_code
|
||||
DB_nextkey(krb5_context context, HDB *db, unsigned flags, hdb_entry *entry)
|
||||
DB_nextkey(krb5_context context, HDB *db, unsigned flags, hdb_entry_ex *entry)
|
||||
{
|
||||
return DB_seq(context, db, flags, entry, DB_NEXT);
|
||||
}
|
||||
|
@@ -133,16 +133,19 @@ hdb_unlock(int fd)
|
||||
}
|
||||
|
||||
void
|
||||
hdb_free_entry(krb5_context context, hdb_entry *ent)
|
||||
hdb_free_entry(krb5_context context, hdb_entry_ex *ent)
|
||||
{
|
||||
int i;
|
||||
|
||||
for(i = 0; i < ent->keys.len; ++i) {
|
||||
Key *k = &ent->keys.val[i];
|
||||
if (ent->free_entry)
|
||||
(*ent->free_entry)(context, ent);
|
||||
|
||||
for(i = 0; i < ent->entry.keys.len; ++i) {
|
||||
Key *k = &ent->entry.keys.val[i];
|
||||
|
||||
memset (k->key.keyvalue.data, 0, k->key.keyvalue.length);
|
||||
}
|
||||
free_hdb_entry(ent);
|
||||
free_hdb_entry(&ent->entry);
|
||||
}
|
||||
|
||||
krb5_error_code
|
||||
@@ -153,7 +156,7 @@ hdb_foreach(krb5_context context,
|
||||
void *data)
|
||||
{
|
||||
krb5_error_code ret;
|
||||
hdb_entry entry;
|
||||
hdb_entry_ex entry;
|
||||
ret = db->hdb_firstkey(context, db, flags, &entry);
|
||||
while(ret == 0){
|
||||
ret = (*func)(context, db, &entry, data);
|
||||
|
@@ -52,6 +52,13 @@ enum hdb_lockop{ HDB_RLOCK, HDB_WLOCK };
|
||||
|
||||
typedef struct hdb_master_key_data *hdb_master_key;
|
||||
|
||||
typedef struct hdb_entry_ex {
|
||||
void *ctx;
|
||||
hdb_entry entry;
|
||||
void (*free_entry)(krb5_context, struct hdb_entry_ex *);
|
||||
} hdb_entry_ex;
|
||||
|
||||
|
||||
typedef struct HDB{
|
||||
void *hdb_db;
|
||||
void *hdb_dbc;
|
||||
@@ -62,13 +69,16 @@ typedef struct HDB{
|
||||
|
||||
krb5_error_code (*hdb_open)(krb5_context, struct HDB*, int, mode_t);
|
||||
krb5_error_code (*hdb_close)(krb5_context, struct HDB*);
|
||||
krb5_error_code (*hdb_fetch)(krb5_context,struct HDB*,unsigned,hdb_entry*);
|
||||
krb5_error_code (*hdb_store)(krb5_context,struct HDB*,unsigned,hdb_entry*);
|
||||
krb5_error_code (*hdb_remove)(krb5_context, struct HDB*, hdb_entry*);
|
||||
krb5_error_code (*hdb_firstkey)(krb5_context, struct HDB*,
|
||||
unsigned, hdb_entry*);
|
||||
krb5_error_code (*hdb_nextkey)(krb5_context, struct HDB*,
|
||||
unsigned, hdb_entry*);
|
||||
void (*hdb_free)(krb5_context,struct HDB*,hdb_entry_ex*);
|
||||
krb5_error_code (*hdb_fetch)(krb5_context,struct HDB*,
|
||||
unsigned,hdb_entry_ex*);
|
||||
krb5_error_code (*hdb_store)(krb5_context,struct HDB*,
|
||||
unsigned,hdb_entry_ex*);
|
||||
krb5_error_code (*hdb_remove)(krb5_context, struct HDB*, hdb_entry_ex*);
|
||||
krb5_error_code (*hdb_firstkey)(krb5_context, struct HDB*,
|
||||
unsigned, hdb_entry_ex*);
|
||||
krb5_error_code (*hdb_nextkey)(krb5_context, struct HDB*,
|
||||
unsigned, hdb_entry_ex*);
|
||||
krb5_error_code (*hdb_lock)(krb5_context, struct HDB*, int operation);
|
||||
krb5_error_code (*hdb_unlock)(krb5_context, struct HDB*);
|
||||
krb5_error_code (*hdb_rename)(krb5_context, struct HDB*, const char*);
|
||||
@@ -79,7 +89,7 @@ typedef struct HDB{
|
||||
krb5_error_code (*hdb_destroy)(krb5_context, struct HDB*);
|
||||
}HDB;
|
||||
|
||||
#define HDB_INTERFACE_VERSION 2
|
||||
#define HDB_INTERFACE_VERSION 3
|
||||
|
||||
struct hdb_so_method {
|
||||
int version;
|
||||
@@ -92,7 +102,7 @@ struct hdb_so_method {
|
||||
#define HDB_DB_FORMAT_ENTRY "hdb/db-format"
|
||||
|
||||
typedef krb5_error_code (*hdb_foreach_func_t)(krb5_context, HDB*,
|
||||
hdb_entry*, void*);
|
||||
hdb_entry_ex*, void*);
|
||||
extern krb5_kt_ops hdb_kt_ops;
|
||||
|
||||
#include <hdb-protos.h>
|
||||
|
@@ -193,7 +193,7 @@ hdb_get_entry(krb5_context context,
|
||||
krb5_enctype enctype,
|
||||
krb5_keytab_entry *entry)
|
||||
{
|
||||
hdb_entry ent;
|
||||
hdb_entry_ex ent;
|
||||
krb5_error_code ret;
|
||||
struct hdb_data *d = id->data;
|
||||
int i;
|
||||
@@ -218,7 +218,7 @@ hdb_get_entry(krb5_context context,
|
||||
(*db->hdb_destroy)(context, db);
|
||||
return ret;
|
||||
}
|
||||
ent.principal = rk_UNCONST(principal);
|
||||
ent.entry.principal = rk_UNCONST(principal);
|
||||
ret = (*db->hdb_fetch)(context, db, HDB_F_DECRYPT, &ent);
|
||||
(*db->hdb_close)(context, db);
|
||||
(*db->hdb_destroy)(context, db);
|
||||
@@ -227,20 +227,20 @@ hdb_get_entry(krb5_context context,
|
||||
return KRB5_KT_NOTFOUND;
|
||||
else if(ret)
|
||||
return ret;
|
||||
if(kvno && ent.kvno != kvno) {
|
||||
if(kvno && ent.entry.kvno != kvno) {
|
||||
hdb_free_entry(context, &ent);
|
||||
return KRB5_KT_NOTFOUND;
|
||||
}
|
||||
if(enctype == 0)
|
||||
if(ent.keys.len > 0)
|
||||
enctype = ent.keys.val[0].key.keytype;
|
||||
if(ent.entry.keys.len > 0)
|
||||
enctype = ent.entry.keys.val[0].key.keytype;
|
||||
ret = KRB5_KT_NOTFOUND;
|
||||
for(i = 0; i < ent.keys.len; i++) {
|
||||
if(ent.keys.val[i].key.keytype == enctype) {
|
||||
for(i = 0; i < ent.entry.keys.len; i++) {
|
||||
if(ent.entry.keys.val[i].key.keytype == enctype) {
|
||||
krb5_copy_principal(context, principal, &entry->principal);
|
||||
entry->vno = ent.kvno;
|
||||
entry->vno = ent.entry.kvno;
|
||||
krb5_copy_keyblock_contents(context,
|
||||
&ent.keys.val[i].key,
|
||||
&ent.entry.keys.val[i].key,
|
||||
&entry->keyblock);
|
||||
ret = 0;
|
||||
break;
|
||||
|
@@ -77,7 +77,7 @@ NDBM_unlock(krb5_context context, HDB *db)
|
||||
|
||||
static krb5_error_code
|
||||
NDBM_seq(krb5_context context, HDB *db,
|
||||
unsigned flags, hdb_entry *entry, int first)
|
||||
unsigned flags, hdb_entry_ex *entry, int first)
|
||||
|
||||
{
|
||||
struct ndbm_db *d = (struct ndbm_db *)db->hdb_db;
|
||||
@@ -99,21 +99,21 @@ NDBM_seq(krb5_context context, HDB *db,
|
||||
db->hdb_unlock(context, db);
|
||||
data.data = value.dptr;
|
||||
data.length = value.dsize;
|
||||
if(hdb_value2entry(context, &data, entry))
|
||||
if(hdb_value2entry(context, &data, &entry->entry))
|
||||
return NDBM_seq(context, db, flags, entry, 0);
|
||||
if (db->hdb_master_key_set && (flags & HDB_F_DECRYPT)) {
|
||||
ret = hdb_unseal_keys (context, db, entry);
|
||||
ret = hdb_unseal_keys (context, db, &entry->entry);
|
||||
if (ret)
|
||||
hdb_free_entry (context, entry);
|
||||
}
|
||||
if (entry->principal == NULL) {
|
||||
entry->principal = malloc (sizeof(*entry->principal));
|
||||
if (entry->principal == NULL) {
|
||||
if (ret == 0 && entry->entry.principal == NULL) {
|
||||
entry->entry.principal = malloc (sizeof(*entry->entry.principal));
|
||||
if (entry->entry.principal == NULL) {
|
||||
ret = ENOMEM;
|
||||
hdb_free_entry (context, entry);
|
||||
krb5_set_error_string(context, "malloc: out of memory");
|
||||
} else {
|
||||
hdb_key2principal (context, &key_data, entry->principal);
|
||||
hdb_key2principal (context, &key_data, entry->entry.principal);
|
||||
}
|
||||
}
|
||||
return ret;
|
||||
@@ -121,14 +121,14 @@ NDBM_seq(krb5_context context, HDB *db,
|
||||
|
||||
|
||||
static krb5_error_code
|
||||
NDBM_firstkey(krb5_context context, HDB *db, unsigned flags, hdb_entry *entry)
|
||||
NDBM_firstkey(krb5_context context, HDB *db,unsigned flags,hdb_entry_ex *entry)
|
||||
{
|
||||
return NDBM_seq(context, db, flags, entry, 1);
|
||||
}
|
||||
|
||||
|
||||
static krb5_error_code
|
||||
NDBM_nextkey(krb5_context context, HDB *db, unsigned flags, hdb_entry *entry)
|
||||
NDBM_nextkey(krb5_context context, HDB *db, unsigned flags,hdb_entry_ex *entry)
|
||||
{
|
||||
return NDBM_seq(context, db, flags, entry, 0);
|
||||
}
|
||||
|
@@ -268,7 +268,7 @@ hdb_entry2string (krb5_context context, hdb_entry *ent, char **str)
|
||||
/* print a hdb_entry to (FILE*)data; suitable for hdb_foreach */
|
||||
|
||||
krb5_error_code
|
||||
hdb_print_entry(krb5_context context, HDB *db, hdb_entry *entry, void *data)
|
||||
hdb_print_entry(krb5_context context, HDB *db, hdb_entry_ex *entry, void *data)
|
||||
{
|
||||
krb5_error_code ret;
|
||||
krb5_storage *sp;
|
||||
@@ -282,7 +282,7 @@ hdb_print_entry(krb5_context context, HDB *db, hdb_entry *entry, void *data)
|
||||
return ENOMEM;
|
||||
}
|
||||
|
||||
ret = entry2string_int(context, sp, entry);
|
||||
ret = entry2string_int(context, sp, &entry->entry);
|
||||
if(ret) {
|
||||
krb5_storage_free(sp);
|
||||
return ret;
|
||||
|
Reference in New Issue
Block a user