/*
* Copyright 2008 Sun Microsystems, Inc. All rights reserved.
* Use is subject to license terms.
*/
/*
* lib/krb5/rcache/rc_base.c
*
* This file of the Kerberos V5 software is derived from public-domain code
* contributed by Daniel J. Bernstein, <brnstnd@acf10.nyu.edu>.
*
*/
/*
* Base "glue" functions for the replay cache.
*/
#include "rc_base.h"
#include "rc_common.h"
#include "rc_mem.h"
#include "rc_file.h"
#include "k5-thread.h"
/* Solaris Kerberos */
#define FREE_RC(x) ((void) free((char *) (x)))
struct krb5_rc_typelist {
const krb5_rc_ops *ops;
struct krb5_rc_typelist *next;
};
static struct krb5_rc_typelist none = { &krb5_rc_none_ops, 0 };
static struct krb5_rc_typelist rc_mem_type = { &krb5_rc_mem_ops, &none };
static struct krb5_rc_typelist krb5_rc_typelist_dfl = { &krb5_rc_file_ops, &rc_mem_type };
static struct krb5_rc_typelist *typehead = &krb5_rc_typelist_dfl;
static k5_mutex_t rc_typelist_lock = K5_MUTEX_PARTIAL_INITIALIZER;
int krb5int_rc_finish_init(void)
{
/* Solaris Kerberos */
int retval;
retval = k5_mutex_finish_init(&grcache.lock);
if (retval)
return (retval);
return k5_mutex_finish_init(&rc_typelist_lock);
}
void krb5int_rc_terminate(void)
{
struct krb5_rc_typelist *t, *t_next;
/* Solaris Kerberos */
struct mem_data *tgr = (struct mem_data *)grcache.data;
struct authlist *q, *qt;
int i;
k5_mutex_destroy(&grcache.lock);
if (tgr != NULL) {
if (tgr->name)
free(tgr->name);
for (i = 0; i < tgr->hsize; i++)
for (q = tgr->h[i]; q; q = qt) {
qt = q->nh;
free(q->rep.server);
free(q->rep.client);
free(q);
}
if (tgr->h)
free(tgr->h);
free(tgr);
}
k5_mutex_destroy(&rc_typelist_lock);
for (t = typehead; t != &krb5_rc_typelist_dfl; t = t_next) {
t_next = t->next;
free(t);
}
}
/*ARGSUSED*/
krb5_error_code krb5_rc_register_type(krb5_context context,
const krb5_rc_ops *ops)
{
struct krb5_rc_typelist *t;
krb5_error_code err;
err = k5_mutex_lock(&rc_typelist_lock);
if (err)
return err;
for (t = typehead;t && strcmp(t->ops->type,ops->type);t = t->next)
;
if (t) {
k5_mutex_unlock(&rc_typelist_lock);
return KRB5_RC_TYPE_EXISTS;
}
t = (struct krb5_rc_typelist *) malloc(sizeof(struct krb5_rc_typelist));
if (t == NULL) {
k5_mutex_unlock(&rc_typelist_lock);
return KRB5_RC_MALLOC;
}
t->next = typehead;
t->ops = ops;
typehead = t;
k5_mutex_unlock(&rc_typelist_lock);
return 0;
}
/*ARGSUSED*/
krb5_error_code krb5_rc_resolve_type(krb5_context context, krb5_rcache *id,
char *type)
{
struct krb5_rc_typelist *t;
krb5_error_code err;
err = k5_mutex_lock(&rc_typelist_lock);
if (err)
return err;
for (t = typehead;t && strcmp(t->ops->type,type);t = t->next)
;
if (!t) {
k5_mutex_unlock(&rc_typelist_lock);
return KRB5_RC_TYPE_NOTFOUND;
}
/* allocate *id? nah */
(*id)->ops = t->ops;
k5_mutex_unlock(&rc_typelist_lock);
return k5_mutex_init(&(*id)->lock);
}
/*ARGSUSED*/
char * krb5_rc_get_type(krb5_context context, krb5_rcache id)
{
return id->ops->type;
}
char * krb5_rc_default_type(krb5_context context)
{
/*
* Solaris Kerberos/SUNW14resync
* MIT's is "dfl" but we now have FILE and MEMORY instead.
* And we only support the KRB5RCNAME env var.
*/
return ("FILE");
}
/*ARGSUSED*/
char * krb5_rc_default_name(krb5_context context)
{
char *s;
if ((s = getenv("KRB5RCNAME")))
return s;
else
return (char *) 0;
}
krb5_error_code
krb5_rc_default(krb5_context context, krb5_rcache *id)
{
krb5_error_code retval;
if (!(*id = (krb5_rcache )malloc(sizeof(**id))))
return KRB5_RC_MALLOC;
if ((retval = krb5_rc_resolve_type(context, id,
krb5_rc_default_type(context)))) {
FREE_RC(*id);
return retval;
}
if ((retval = krb5_rc_resolve(context, *id,
krb5_rc_default_name(context)))) {
k5_mutex_destroy(&(*id)->lock);
FREE_RC(*id);
return retval;
}
(*id)->magic = KV5M_RCACHE;
return retval;
}
krb5_error_code krb5_rc_resolve_full(krb5_context context, krb5_rcache *id, char *string_name)
{
char *type;
char *residual;
krb5_error_code retval;
unsigned int diff;
if (!(residual = strchr(string_name,':')))
return KRB5_RC_PARSE;
diff = residual - string_name;
if (!(type = malloc(diff + 1)))
return KRB5_RC_MALLOC;
(void) strncpy(type, string_name, diff);
type[residual - string_name] = '\0';
if (!(*id = (krb5_rcache) malloc(sizeof(**id)))) {
FREE_RC(type);
return KRB5_RC_MALLOC;
}
if ((retval = krb5_rc_resolve_type(context, id,type))) {
FREE_RC(type);
FREE_RC(*id);
return retval;
}
FREE_RC(type);
if ((retval = krb5_rc_resolve(context, *id,residual + 1))) {
k5_mutex_destroy(&(*id)->lock);
FREE_RC(*id);
return retval;
}
(*id)->magic = KV5M_RCACHE;
return retval;
}