2N/A/*
2N/A * CDDL HEADER START
2N/A *
2N/A * The contents of this file are subject to the terms of the
2N/A * Common Development and Distribution License (the "License").
2N/A * You may not use this file except in compliance with the License.
2N/A *
2N/A * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
2N/A * or http://www.opensolaris.org/os/licensing.
2N/A * See the License for the specific language governing permissions
2N/A * and limitations under the License.
2N/A *
2N/A * When distributing Covered Code, include this CDDL HEADER in each
2N/A * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
2N/A * If applicable, add the following below this CDDL HEADER, with the
2N/A * fields enclosed by brackets "[]" replaced with your own identifying
2N/A * information: Portions Copyright [yyyy] [name of copyright owner]
2N/A *
2N/A * CDDL HEADER END
2N/A */
2N/A
2N/A/*
2N/A * Copyright (c) 2010, Oracle and/or its affiliates. All rights reserved.
2N/A */
2N/A
2N/A#ifndef KERBEROS_DTRACE_H
2N/A#define KERBEROS_DTRACE_H
2N/A
2N/A#include "krb5.h"
2N/A#include "kerberos_dtrace_impl.h"
2N/A
2N/Ak5_krbinfo_t *k5_krbinfo_build(const krb5_data *);
2N/Avoid k5_krbinfo_free(k5_krbinfo_t *);
2N/A
2N/Ak5_kerrorinfo_t *k5_kerrorinfo_build(const krb5_error *);
2N/Avoid k5_kerrorinfo_free(k5_kerrorinfo_t *);
2N/A
2N/Ak5_kdcreqinfo_t *k5_kdcreqinfo_build(const krb5_kdc_req *);
2N/Avoid k5_kdcreqinfo_free(k5_kdcreqinfo_t *);
2N/A
2N/Ak5_kdcrepinfo_t *k5_kdcrepinfo_build(const krb5_kdc_rep *,
2N/A const krb5_enc_kdc_rep_part *);
2N/Avoid k5_kdcrepinfo_free(k5_kdcrepinfo_t *);
2N/A
2N/Ak5_kticketinfo_t *k5_kticketinfo_build(const krb5_ticket *);
2N/Avoid k5_kticketinfo_free(k5_kticketinfo_t *);
2N/A
2N/Ak5_kaprepinfo_t *k5_kaprepinfo_build(const krb5_ap_rep *,
2N/A const krb5_ap_rep_enc_part *);
2N/Avoid k5_kaprepinfo_free(k5_kaprepinfo_t *);
2N/A
2N/Ak5_kapreqinfo_t *k5_kapreqinfo_build(const krb5_ap_req *);
2N/Avoid k5_kapreqinfo_free(k5_kapreqinfo_t *);
2N/A
2N/Ak5_kauthenticatorinfo_t *k5_kauthenticatorinfo_build(
2N/A const krb5_authenticator *);
2N/Avoid k5_kauthenticatorinfo_free(k5_kauthenticatorinfo_t *);
2N/A
2N/Ak5_ksafeinfo_t *k5_ksafeinfo_build(const krb5_safe *);
2N/Avoid k5_ksafeinfo_free(k5_ksafeinfo_t *);
2N/A
2N/Ak5_kprivinfo_t *k5_kprivinfo_build(const krb5_priv *,
2N/A const krb5_priv_enc_part *);
2N/Avoid k5_kprivinfo_free(k5_kprivinfo_t *);
2N/A
2N/Ak5_kcredinfo_t *k5_kcredinfo_build(const krb5_cred *,
2N/A const krb5_cred_enc_part *);
2N/Avoid k5_kcredinfo_free(k5_kcredinfo_t *);
2N/A
2N/Ak5_kconninfo_t *k5_kconninfo_build(const int);
2N/Avoid k5_kconninfo_free(k5_kconninfo_t *);
2N/A
2N/Avoid k5_trace_kdc_rep_read(const krb5_data *, const krb5_kdc_rep *);
2N/Avoid k5_trace_kdc_req_read(const krb5_data *, const krb5_kdc_req *);
2N/A
2N/Avoid k5_trace_message_send(const int, char *, const unsigned int);
2N/Avoid k5_trace_message_recv(const int, char *, const unsigned int);
2N/A
2N/A/*
2N/A * Macros for DTrace probe points for the kerberos provider. Each probe point
2N/A * has a corresponding macro here. Each macro follows a similar pattern:
2N/A * 1. Check for enabled probe point.
2N/A * 2. Setup probe arguments allocating memory as required.
2N/A * 3. Fire probe.
2N/A * 4. Cleanup.
2N/A *
2N/A * The *_ENABLED macros are provided by DTrace and allow the code to avoid
2N/A * unnecessary argument setup and cleanup when the probes are not enabled. The
2N/A * actual cost of an individual *_ENABLED probe is minimal.
2N/A */
2N/A
2N/A#define KERBEROS_PROBE_KRB_ERROR(type, asn1msg, error) \
2N/A if (KERBEROS_KRB_ERROR_##type##_ENABLED()) { \
2N/A k5_trace_t ktrace; \
2N/A memset(&ktrace, 0, sizeof (k5_trace_t)); \
2N/A \
2N/A ktrace.info = k5_krbinfo_build((asn1msg)); \
2N/A ktrace.arg = k5_kerrorinfo_build((error)); \
2N/A KERBEROS_KRB_ERROR_##type(&ktrace); \
2N/A k5_kerrorinfo_free(ktrace.arg); \
2N/A k5_krbinfo_free(ktrace.info); \
2N/A }
2N/A
2N/A#define KERBEROS_PROBE_KRB_KDC_REQ(type, asn1msg, kdcreq) \
2N/A if (KERBEROS_KRB_KDC_REQ_##type##_ENABLED()) { \
2N/A k5_trace_t ktrace; \
2N/A memset(&ktrace, 0, sizeof (k5_trace_t)); \
2N/A \
2N/A ktrace.info = k5_krbinfo_build((asn1msg)); \
2N/A ktrace.arg = k5_kdcreqinfo_build((kdcreq)); \
2N/A KERBEROS_KRB_KDC_REQ_##type(&ktrace); \
2N/A k5_kdcreqinfo_free(ktrace.arg); \
2N/A k5_krbinfo_free(ktrace.info); \
2N/A }
2N/A
2N/A#define KERBEROS_PROBE_KRB_KDC_REP(type, asn1msg, kdcrep, encp, ticket) \
2N/A if (KERBEROS_KRB_KDC_REP_##type##_ENABLED()) { \
2N/A k5_trace_t ktrace; \
2N/A memset(&ktrace, 0, sizeof (k5_trace_t)); \
2N/A \
2N/A ktrace.info = k5_krbinfo_build((asn1msg)); \
2N/A ktrace.arg = k5_kdcrepinfo_build((kdcrep), (encp)); \
2N/A ktrace.tkt = k5_kticketinfo_build(ticket); \
2N/A KERBEROS_KRB_KDC_REP_##type(&ktrace); \
2N/A k5_kticketinfo_free(ktrace.tkt); \
2N/A k5_kdcrepinfo_free(ktrace.arg); \
2N/A k5_krbinfo_free(ktrace.info); \
2N/A }
2N/A
2N/A#define KERBEROS_PROBE_KRB_AP_REP(type, asn1msg, aprep, encp) \
2N/A if (KERBEROS_KRB_AP_REP_##type##_ENABLED()) { \
2N/A k5_trace_t ktrace; \
2N/A memset(&ktrace, 0, sizeof (k5_trace_t)); \
2N/A \
2N/A ktrace.info = k5_krbinfo_build((asn1msg)); \
2N/A ktrace.arg = k5_kaprepinfo_build((aprep), (encp)); \
2N/A KERBEROS_KRB_AP_REP_##type(&ktrace); \
2N/A k5_kaprepinfo_free(ktrace.arg); \
2N/A k5_krbinfo_free(ktrace.info); \
2N/A }
2N/A
2N/A#define KERBEROS_PROBE_KRB_AP_REQ(type, asn1msg, apreq, authen, ticket) \
2N/A if (KERBEROS_KRB_AP_REQ_##type##_ENABLED()) { \
2N/A k5_trace_t ktrace; \
2N/A memset(&ktrace, 0, sizeof (k5_trace_t)); \
2N/A \
2N/A ktrace.info = k5_krbinfo_build((asn1msg)); \
2N/A ktrace.arg = k5_kapreqinfo_build((apreq)); \
2N/A ktrace.tkt = k5_kticketinfo_build((ticket)); \
2N/A ktrace.auth = k5_kauthenticatorinfo_build((authen)); \
2N/A KERBEROS_KRB_AP_REQ_##type(&ktrace); \
2N/A k5_kauthenticatorinfo_free(ktrace.auth); \
2N/A k5_kticketinfo_free(ktrace.tkt); \
2N/A k5_kapreqinfo_free(ktrace.arg); \
2N/A k5_krbinfo_free(ktrace.info); \
2N/A }
2N/A
2N/A#define KERBEROS_PROBE_KRB_SAFE(type, asn1msg, safe) \
2N/A if (KERBEROS_KRB_SAFE_##type##_ENABLED()) { \
2N/A k5_trace_t ktrace; \
2N/A memset(&ktrace, 0, sizeof (k5_trace_t)); \
2N/A \
2N/A ktrace.info = k5_krbinfo_build((asn1msg)); \
2N/A ktrace.arg = k5_ksafeinfo_build((safe)); \
2N/A KERBEROS_KRB_SAFE_##type(&ktrace); \
2N/A k5_ksafeinfo_free(ktrace.arg); \
2N/A k5_krbinfo_free(ktrace.info); \
2N/A }
2N/A
2N/A#define KERBEROS_PROBE_KRB_PRIV(type, asn1msg, priv, encp) \
2N/A if (KERBEROS_KRB_PRIV_##type##_ENABLED()) { \
2N/A k5_trace_t ktrace; \
2N/A memset(&ktrace, 0, sizeof (k5_trace_t)); \
2N/A \
2N/A ktrace.info = k5_krbinfo_build((asn1msg)); \
2N/A ktrace.arg = k5_kprivinfo_build((priv), (encp)); \
2N/A KERBEROS_KRB_PRIV_##type(&ktrace); \
2N/A k5_kprivinfo_free(ktrace.arg); \
2N/A k5_krbinfo_free(ktrace.info); \
2N/A }
2N/A
2N/A#define KERBEROS_PROBE_KRB_CRED(type, asn1msg, cred, encp) \
2N/A if (KERBEROS_KRB_CRED_##type##_ENABLED()) { \
2N/A k5_trace_t ktrace; \
2N/A memset(&ktrace, 0, sizeof (k5_trace_t)); \
2N/A \
2N/A ktrace.info = k5_krbinfo_build((asn1msg)); \
2N/A ktrace.arg = k5_kcredinfo_build((cred), (encp)); \
2N/A KERBEROS_KRB_CRED_##type(&ktrace); \
2N/A k5_kcredinfo_free(ktrace.arg); \
2N/A k5_krbinfo_free(ktrace.info); \
2N/A }
2N/A
2N/A#define KERBEROS_PROBE_KRB_MESSAGE(type, fd, data, length) \
2N/A if (KERBEROS_KRB_MESSAGE_##type##_ENABLED()) { \
2N/A k5_trace_t ktrace; \
2N/A krb5_data d; \
2N/A \
2N/A memset(&ktrace, 0, sizeof (k5_trace_t)); \
2N/A d.data = data; \
2N/A d.length = length; \
2N/A ktrace.info = k5_krbinfo_build(&d); \
2N/A ktrace.arg = k5_kconninfo_build((fd)); \
2N/A KERBEROS_KRB_MESSAGE_##type(&ktrace); \
2N/A k5_kconninfo_free(ktrace.arg); \
2N/A k5_krbinfo_free(ktrace.info); \
2N/A }
2N/A
2N/A#include "kerberos_provider.h"
2N/A
2N/A#endif /* KERBEROS_DTRACE_H */