diff options
| author | Igor Sysoev <igor@sysoev.ru> | 2005-03-22 16:02:46 +0000 |
|---|---|---|
| committer | Igor Sysoev <igor@sysoev.ru> | 2005-03-22 16:02:46 +0000 |
| commit | 4d656dcd0bd6309b0ec76fc444198ed6c2948a8e (patch) | |
| tree | 67ce201b7d515273fa2a6a617542cece4fa16898 /src/os/unix | |
| parent | 3599a1b885533d929315494258fb407765243a95 (diff) | |
| download | nginx-4d656dcd0bd6309b0ec76fc444198ed6c2948a8e.tar.gz nginx-4d656dcd0bd6309b0ec76fc444198ed6c2948a8e.tar.bz2 | |
nginx-0.1.26-RELEASE importrelease-0.1.26
*) Change: the invalid client header lines are now ignored and logged
at the info level.
*) Change: the server name is also logged in error log.
*) Feature: the ngx_http_auth_basic_module module and the auth_basic
and auth_basic_user_file directives.
Diffstat (limited to 'src/os/unix')
| -rw-r--r-- | src/os/unix/ngx_linux_config.h | 1 | ||||
| -rw-r--r-- | src/os/unix/ngx_solaris_config.h | 1 | ||||
| -rw-r--r-- | src/os/unix/ngx_user.c | 89 | ||||
| -rw-r--r-- | src/os/unix/ngx_user.h | 5 |
4 files changed, 96 insertions, 0 deletions
diff --git a/src/os/unix/ngx_linux_config.h b/src/os/unix/ngx_linux_config.h index 35e3b8b73..29d8aae1b 100644 --- a/src/os/unix/ngx_linux_config.h +++ b/src/os/unix/ngx_linux_config.h @@ -48,6 +48,7 @@ #include <malloc.h> /* memalign() */ #include <sys/ioctl.h> #include <sys/sysctl.h> +#include <crypt.h> #include <ngx_auto_config.h> diff --git a/src/os/unix/ngx_solaris_config.h b/src/os/unix/ngx_solaris_config.h index d629e046b..088fbd023 100644 --- a/src/os/unix/ngx_solaris_config.h +++ b/src/os/unix/ngx_solaris_config.h @@ -46,6 +46,7 @@ #include <sys/systeminfo.h> #include <limits.h> /* IOV_MAX */ #include <inttypes.h> +#include <crypt.h> #include <ngx_auto_config.h> diff --git a/src/os/unix/ngx_user.c b/src/os/unix/ngx_user.c new file mode 100644 index 000000000..fe2f79489 --- /dev/null +++ b/src/os/unix/ngx_user.c @@ -0,0 +1,89 @@ + +/* + * Copyright (C) Igor Sysoev + */ + + +#include <ngx_config.h> +#include <ngx_core.h> + + +/* + * Solaris has thread-safe crypt() + * Linux has crypt_r(); "struct crypt_data" is more than 128K + * FreeBSD needs the mutex to protect crypt() + * + * TODO: + * ngx_crypt_init() to init mutex + */ + + +#if (NGX_CRYPT) + +#if (NGX_LINUX) + +ngx_int_t +ngx_crypt(ngx_pool_t *pool, u_char *key, u_char *salt, u_char **encrypted) +{ + char *value; + size_t len; + struct crypt_data cd; + + value = crypt_r((char *) key, (char *) salt, &cd); + + if (value) { + len = ngx_strlen(value); + + *encrypted = ngx_palloc(pool, len); + if (*encrypted) { + ngx_memcpy(*encrypted, value, len + 1); + return NGX_OK; + } + } + + return NGX_ERROR; +} + +#else + +ngx_int_t +ngx_crypt(ngx_pool_t *pool, u_char *key, u_char *salt, u_char **encrypted) +{ + char *value; + size_t len; + ngx_int_t rc; + +#if (NGX_THREADS && NGX_NONREENTRANT_CRYPT) + + /* crypt() is a time consuming funtion, so we only try to lock */ + + if (ngx_mutex_trylock(ngx_crypt_mutex) != NGX_OK) { + return NGX_AGAIN; + } + +#endif + + rc = NGX_ERROR; + + value = crypt((char *) key, (char *) salt); + + if (value) { + len = ngx_strlen(value); + + *encrypted = ngx_palloc(pool, len); + if (*encrypted) { + ngx_memcpy(*encrypted, value, len + 1); + rc = NGX_OK; + } + } + +#if (NGX_THREADS && NGX_NONREENTRANT_CRYPT) + ngx_mutex_unlock(ngx_crypt_mutex); +#endif + + return rc; +} + +#endif + +#endif /* NGX_CRYPT */ diff --git a/src/os/unix/ngx_user.h b/src/os/unix/ngx_user.h index f939b84b4..a24a66bf3 100644 --- a/src/os/unix/ngx_user.h +++ b/src/os/unix/ngx_user.h @@ -16,4 +16,9 @@ typedef uid_t ngx_uid_t; typedef gid_t ngx_gid_t; +ngx_int_t ngx_crypt(ngx_pool_t *pool, u_char *key, u_char *salt, + u_char **encrypted); + + + #endif /* _NGX_USER_H_INCLUDED_ */ |
