target
int64 0
1
| func
stringlengths 0
484k
| idx
int64 1
378k
|
---|---|---|
0 | void auth_request_log_info(struct auth_request *auth_request,
const char *subsystem,
const char *format, ...)
{
struct event *event = get_request_event(auth_request, subsystem);
va_list va;
va_start(va, format);
T_BEGIN {
string_t *str = t_str_new(128);
str_vprintfa(str, format, va);
e_info(event, "%s", str_c(str));
} T_END;
va_end(va);
} | 377,507 |
0 | struct auth_request *auth_request_new_dummy(struct event *parent_event)
{
struct auth_request *request;
pool_t pool;
pool = pool_alloconly_create(MEMPOOL_GROWING"auth_request", 1024);
request = p_new(pool, struct auth_request, 1);
request->pool = pool;
auth_request_post_alloc_init(request, parent_event);
return request;
} | 377,509 |
0 | void auth_request_passdb_lookup_end(struct auth_request *request,
enum passdb_result result)
{
i_assert(array_count(&request->authdb_event) > 0);
struct event *event = authdb_event(request);
struct event_passthrough *e =
event_create_passthrough(event)->
set_name("auth_passdb_request_finished")->
add_str("result", passdb_result_to_string(result));
if (request->passdb_cache_result != AUTH_REQUEST_CACHE_NONE &&
request->set->cache_ttl != 0 && request->set->cache_size != 0)
e->add_str("cache", auth_request_cache_result_to_str(request->passdb_cache_result));
e_debug(e->event(), "Finished passdb lookup");
event_unref(&event);
array_pop_back(&request->authdb_event);
} | 377,510 |
0 | enum passdb_result auth_request_password_missing(struct auth_request *request)
{
if (request->fields.skip_password_check) {
/* This passdb wasn't used for authentication */
return PASSDB_RESULT_OK;
}
e_info(authdb_event(request),
"No password returned (and no nopassword)");
return PASSDB_RESULT_PASSWORD_MISMATCH;
} | 377,512 |
0 | void passdb_unregister_module(struct passdb_module_interface *iface)
{
struct passdb_module_interface *const *ifaces;
unsigned int idx;
array_foreach(&passdb_interfaces, ifaces) {
if (*ifaces == iface) {
idx = array_foreach_idx(&passdb_interfaces, ifaces);
array_delete(&passdb_interfaces, idx, 1);
return;
}
}
i_panic("passdb_unregister_module(%s): Not registered", iface->name);
} | 377,513 |
0 | auth_request_want_skip_userdb(struct auth_request *request,
struct auth_userdb *userdb)
{
switch (userdb->skip) {
case AUTH_USERDB_SKIP_NEVER:
return FALSE;
case AUTH_USERDB_SKIP_FOUND:
return request->userdb_success;
case AUTH_USERDB_SKIP_NOTFOUND:
return !request->userdb_success;
}
i_unreached();
} | 377,514 |
0 | void auth_request_refresh_last_access(struct auth_request *request)
{
request->last_access = ioloop_time;
if (request->to_abort != NULL)
timeout_reset(request->to_abort);
} | 377,515 |
0 | void auth_request_set_field_keyvalue(struct auth_request *request,
const char *field,
const char *default_scheme)
{
const char *key, *value;
value = strchr(field, '=');
if (value == NULL) {
key = field;
value = "";
} else {
key = t_strdup_until(field, value);
value++;
}
auth_request_set_field(request, key, value, default_scheme);
} | 377,516 |
0 | auth_request_handle_passdb_callback(enum passdb_result *result,
struct auth_request *request)
{
struct auth_passdb *next_passdb;
enum auth_db_rule result_rule;
bool passdb_continue = FALSE;
if (request->passdb_password != NULL) {
safe_memset(request->passdb_password, 0,
strlen(request->passdb_password));
}
auth_request_passdb_lookup_end(request, *result);
if (request->passdb->set->deny &&
*result != PASSDB_RESULT_USER_UNKNOWN) {
/* deny passdb. we can get through this step only if the
lookup returned that user doesn't exist in it. internal
errors are fatal here. */
if (*result != PASSDB_RESULT_INTERNAL_FAILURE) {
e_info(authdb_event(request),
"User found from deny passdb");
*result = PASSDB_RESULT_USER_DISABLED;
}
return TRUE;
}
if (request->failed) {
/* The passdb didn't fail, but something inside it failed
(e.g. allow_nets mismatch). Make sure we'll fail this
lookup, but reset the failure so the next passdb can
succeed. */
if (*result == PASSDB_RESULT_OK)
*result = PASSDB_RESULT_USER_UNKNOWN;
request->failed = FALSE;
}
/* users that exist but can't log in are special. we don't try to match
any of the success/failure rules to them. they'll always fail. */
switch (*result) {
case PASSDB_RESULT_USER_DISABLED:
return TRUE;
case PASSDB_RESULT_PASS_EXPIRED:
auth_request_set_field(request, "reason",
"Password expired", NULL);
return TRUE;
case PASSDB_RESULT_OK:
result_rule = request->passdb->result_success;
break;
case PASSDB_RESULT_INTERNAL_FAILURE:
result_rule = request->passdb->result_internalfail;
break;
case PASSDB_RESULT_NEXT:
e_debug(authdb_event(request),
"Not performing authentication (noauthenticate set)");
result_rule = AUTH_DB_RULE_CONTINUE;
break;
case PASSDB_RESULT_SCHEME_NOT_AVAILABLE:
case PASSDB_RESULT_USER_UNKNOWN:
case PASSDB_RESULT_PASSWORD_MISMATCH:
default:
result_rule = request->passdb->result_failure;
break;
}
switch (result_rule) {
case AUTH_DB_RULE_RETURN:
break;
case AUTH_DB_RULE_RETURN_OK:
request->passdb_success = TRUE;
break;
case AUTH_DB_RULE_RETURN_FAIL:
request->passdb_success = FALSE;
break;
case AUTH_DB_RULE_CONTINUE:
passdb_continue = TRUE;
if (*result == PASSDB_RESULT_OK) {
/* password was successfully verified. don't bother
checking it again. */
auth_request_set_password_verified(request);
}
break;
case AUTH_DB_RULE_CONTINUE_OK:
passdb_continue = TRUE;
request->passdb_success = TRUE;
/* password was successfully verified. don't bother
checking it again. */
auth_request_set_password_verified(request);
break;
case AUTH_DB_RULE_CONTINUE_FAIL:
passdb_continue = TRUE;
request->passdb_success = FALSE;
break;
}
/* nopassword check is specific to a single passdb and shouldn't leak
to the next one. we already added it to cache. */
auth_fields_remove(request->fields.extra_fields, "nopassword");
auth_fields_remove(request->fields.extra_fields, "noauthenticate");
if (request->fields.requested_login_user != NULL &&
*result == PASSDB_RESULT_OK) {
auth_request_master_user_login_finish(request);
/* if the passdb lookup continues, it continues with non-master
passdbs for the requested_login_user. */
next_passdb = auth_request_get_auth(request)->passdbs;
} else {
next_passdb = request->passdb->next;
}
while (next_passdb != NULL &&
auth_request_want_skip_passdb(request, next_passdb))
next_passdb = next_passdb->next;
if (*result == PASSDB_RESULT_OK || *result == PASSDB_RESULT_NEXT) {
/* this passdb lookup succeeded, preserve its extra fields */
auth_fields_snapshot(request->fields.extra_fields);
request->snapshot_have_userdb_prefetch_set =
request->userdb_prefetch_set;
if (request->fields.userdb_reply != NULL)
auth_fields_snapshot(request->fields.userdb_reply);
} else {
/* this passdb lookup failed, remove any extra fields it set */
auth_fields_rollback(request->fields.extra_fields);
if (request->fields.userdb_reply != NULL) {
auth_fields_rollback(request->fields.userdb_reply);
request->userdb_prefetch_set =
request->snapshot_have_userdb_prefetch_set;
}
}
if (passdb_continue && next_passdb != NULL) {
/* try next passdb. */
request->passdb = next_passdb;
request->passdb_password = NULL;
if (*result == PASSDB_RESULT_USER_UNKNOWN) {
/* remember that we did at least one successful
passdb lookup */
request->passdbs_seen_user_unknown = TRUE;
} else if (*result == PASSDB_RESULT_INTERNAL_FAILURE) {
/* remember that we have had an internal failure. at
the end return internal failure if we couldn't
successfully login. */
request->passdbs_seen_internal_failure = TRUE;
}
return FALSE;
} else if (*result == PASSDB_RESULT_NEXT) {
/* admin forgot to put proper passdb last */
e_error(request->event,
"%sLast passdb had noauthenticate field, cannot authenticate user",
auth_request_get_log_prefix_db(request));
*result = PASSDB_RESULT_INTERNAL_FAILURE;
} else if (request->passdb_success) {
/* either this or a previous passdb lookup succeeded. */
*result = PASSDB_RESULT_OK;
} else if (request->passdbs_seen_internal_failure) {
/* last passdb lookup returned internal failure. it may have
had the correct password, so return internal failure
instead of plain failure. */
*result = PASSDB_RESULT_INTERNAL_FAILURE;
}
return TRUE;
} | 377,517 |
0 | void auths_free(void)
{
struct auth **auth;
unsigned int i, count;
/* deinit in reverse order, because modules have been allocated by
the first auth pool that used them */
auth = array_get_modifiable(&auths, &count);
for (i = count; i > 0; i--)
pool_unref(&auth[i-1]->pool);
array_free(&auths);
} | 377,519 |
0 | static struct event *get_request_event(struct auth_request *request,
const char *subsystem)
{
if (subsystem == AUTH_SUBSYS_DB)
return authdb_event(request);
else if (subsystem == AUTH_SUBSYS_MECH)
return request->mech_event;
else
return request->event;
} | 377,520 |
0 | auth_request_proxy_dns_callback(const struct dns_lookup_result *result,
struct auth_request_proxy_dns_lookup_ctx *ctx)
{
struct auth_request *request = ctx->request;
const char *host;
unsigned int i;
bool proxy_host_is_self;
request->dns_lookup_ctx = NULL;
ctx->dns_lookup = NULL;
host = auth_fields_find(request->fields.extra_fields, "host");
i_assert(host != NULL);
if (result->ret != 0) {
auth_request_log_error(request, AUTH_SUBSYS_PROXY,
"DNS lookup for %s failed: %s", host, result->error);
request->internal_failure = TRUE;
auth_request_proxy_finish_failure(request);
} else {
if (result->msecs > AUTH_DNS_WARN_MSECS) {
auth_request_log_warning(request, AUTH_SUBSYS_PROXY,
"DNS lookup for %s took %u.%03u s",
host, result->msecs/1000, result->msecs % 1000);
}
auth_fields_add(request->fields.extra_fields, "hostip",
net_ip2addr(&result->ips[0]), 0);
proxy_host_is_self = FALSE;
for (i = 0; i < result->ips_count; i++) {
if (auth_request_proxy_ip_is_self(request,
&result->ips[i])) {
proxy_host_is_self = TRUE;
break;
}
}
auth_request_proxy_finish_ip(request, proxy_host_is_self);
}
if (ctx->callback != NULL)
ctx->callback(result->ret == 0, request);
auth_request_unref(&request);
} | 377,521 |
0 | void auth_request_userdb_callback(enum userdb_result result,
struct auth_request *request)
{
struct auth_userdb *userdb = request->userdb;
struct auth_userdb *next_userdb;
enum auth_db_rule result_rule;
const char *error;
bool userdb_continue = FALSE;
switch (result) {
case USERDB_RESULT_OK:
result_rule = userdb->result_success;
break;
case USERDB_RESULT_INTERNAL_FAILURE:
result_rule = userdb->result_internalfail;
break;
case USERDB_RESULT_USER_UNKNOWN:
default:
result_rule = userdb->result_failure;
break;
}
switch (result_rule) {
case AUTH_DB_RULE_RETURN:
break;
case AUTH_DB_RULE_RETURN_OK:
request->userdb_success = TRUE;
break;
case AUTH_DB_RULE_RETURN_FAIL:
request->userdb_success = FALSE;
break;
case AUTH_DB_RULE_CONTINUE:
userdb_continue = TRUE;
break;
case AUTH_DB_RULE_CONTINUE_OK:
userdb_continue = TRUE;
request->userdb_success = TRUE;
break;
case AUTH_DB_RULE_CONTINUE_FAIL:
userdb_continue = TRUE;
request->userdb_success = FALSE;
break;
}
auth_request_userdb_lookup_end(request, result);
next_userdb = userdb->next;
while (next_userdb != NULL &&
auth_request_want_skip_userdb(request, next_userdb))
next_userdb = next_userdb->next;
if (userdb_continue && next_userdb != NULL) {
/* try next userdb. */
if (result == USERDB_RESULT_INTERNAL_FAILURE)
request->userdbs_seen_internal_failure = TRUE;
if (result == USERDB_RESULT_OK) {
/* this userdb lookup succeeded, preserve its extra
fields */
if (userdb_template_export(userdb->override_fields_tmpl,
request, &error) < 0) {
e_error(request->event,
"%sFailed to expand override_fields: %s",
auth_request_get_log_prefix_db(request), error);
request->private_callback.userdb(
USERDB_RESULT_INTERNAL_FAILURE, request);
return;
}
auth_fields_snapshot(request->fields.userdb_reply);
} else {
/* this userdb lookup failed, remove any extra fields
it set */
auth_fields_rollback(request->fields.userdb_reply);
}
request->user_changed_by_lookup = FALSE;
request->userdb = next_userdb;
auth_request_lookup_user(request,
request->private_callback.userdb);
return;
}
if (request->userdb_success) {
if (userdb_template_export(userdb->override_fields_tmpl,
request, &error) < 0) {
e_error(request->event,
"%sFailed to expand override_fields: %s",
auth_request_get_log_prefix_db(request), error);
result = USERDB_RESULT_INTERNAL_FAILURE;
} else {
result = USERDB_RESULT_OK;
}
} else if (request->userdbs_seen_internal_failure ||
result == USERDB_RESULT_INTERNAL_FAILURE) {
/* one of the userdb lookups failed. the user might have been
in there, so this is an internal failure */
result = USERDB_RESULT_INTERNAL_FAILURE;
} else if (request->client_pid != 0) {
/* this was an actual login attempt, the user should
have been found. */
if (auth_request_get_auth(request)->userdbs->next == NULL) {
e_error(request->event,
"%suser not found from userdb",
auth_request_get_log_prefix_db(request));
} else {
e_error(request->mech_event,
"user not found from any userdbs");
}
result = USERDB_RESULT_USER_UNKNOWN;
} else {
result = USERDB_RESULT_USER_UNKNOWN;
}
if (request->userdb_lookup_tempfailed) {
/* no caching */
} else if (result != USERDB_RESULT_INTERNAL_FAILURE) {
if (request->userdb_cache_result != AUTH_REQUEST_CACHE_HIT)
auth_request_userdb_save_cache(request, result);
} else if (passdb_cache != NULL && userdb->cache_key != NULL) {
/* lookup failed. if we're looking here only because the
request was expired in cache, fallback to using cached
expired record. */
const char *cache_key = userdb->cache_key;
if (auth_request_lookup_user_cache(request, cache_key,
&result, TRUE)) {
e_info(request->event,
"%sFalling back to expired data from cache",
auth_request_get_log_prefix_db(request));
}
}
request->private_callback.userdb(result, request);
} | 377,522 |
0 | int auth_request_password_verify_log(struct auth_request *request,
const char *plain_password,
const char *crypted_password,
const char *scheme, const char *subsystem,
bool log_password_mismatch)
{
const unsigned char *raw_password;
size_t raw_password_size;
const char *error;
int ret;
struct password_generate_params gen_params = {
.user = request->fields.original_username,
.rounds = 0
};
if (request->fields.skip_password_check) {
/* passdb continue* rule after a successful authentication */
return 1;
}
if (request->passdb->set->deny) {
/* this is a deny database, we don't care about the password */
return 0;
}
if (auth_fields_exists(request->fields.extra_fields, "nopassword")) {
auth_request_log_debug(request, subsystem,
"Allowing any password");
return 1;
}
ret = password_decode(crypted_password, scheme,
&raw_password, &raw_password_size, &error);
if (ret <= 0) {
if (ret < 0) {
auth_request_log_error(request, subsystem,
"Password data is not valid for scheme %s: %s",
scheme, error);
} else {
auth_request_log_error(request, subsystem,
"Unknown scheme %s", scheme);
}
return -1;
}
/* Use original_username since it may be important for some
password schemes (eg. digest-md5). Otherwise the username is used
only for logging purposes. */
ret = password_verify(plain_password, &gen_params,
scheme, raw_password, raw_password_size, &error);
if (ret < 0) {
const char *password_str = request->set->debug_passwords ?
t_strdup_printf(" '%s'", crypted_password) : "";
auth_request_log_error(request, subsystem,
"Invalid password%s in passdb: %s",
password_str, error);
} else if (ret == 0) {
if (log_password_mismatch)
auth_request_log_password_mismatch(request, subsystem);
}
if (ret <= 0 && request->set->debug_passwords) T_BEGIN {
log_password_failure(request, plain_password,
crypted_password, scheme,
&gen_params,
subsystem);
} T_END;
return ret;
} | 377,523 |
0 | static bool auth_request_lookup_user_cache(struct auth_request *request,
const char *key,
enum userdb_result *result_r,
bool use_expired)
{
const char *value;
struct auth_cache_node *node;
bool expired, neg_expired;
value = auth_cache_lookup(passdb_cache, request, key, &node,
&expired, &neg_expired);
if (value == NULL || (expired && !use_expired)) {
request->userdb_cache_result = AUTH_REQUEST_CACHE_MISS;
e_debug(request->event,
value == NULL ? "%suserdb cache miss" :
"%suserdb cache expired",
auth_request_get_log_prefix_db(request));
return FALSE;
}
request->userdb_cache_result = AUTH_REQUEST_CACHE_HIT;
e_debug(request->event,
"%suserdb cache hit: %s",
auth_request_get_log_prefix_db(request), value);
if (*value == '\0') {
/* negative cache entry */
*result_r = USERDB_RESULT_USER_UNKNOWN;
auth_request_init_userdb_reply(request, FALSE);
return TRUE;
}
/* We want to preserve any userdb fields set by the earlier passdb
lookup, so initialize userdb_reply only if it doesn't exist.
Don't add userdb's default_fields, because the entire userdb part of
the result comes from the cache. */
if (request->fields.userdb_reply == NULL)
auth_request_init_userdb_reply(request, FALSE);
auth_request_userdb_import(request, value);
*result_r = USERDB_RESULT_OK;
return TRUE;
} | 377,525 |
0 | auth_mech_verify_passdb(const struct auth *auth, const struct mech_module_list *list)
{
switch (list->module.passdb_need) {
case MECH_PASSDB_NEED_NOTHING:
break;
case MECH_PASSDB_NEED_VERIFY_PLAIN:
if (!auth_passdb_list_have_verify_plain(auth))
return FALSE;
break;
case MECH_PASSDB_NEED_VERIFY_RESPONSE:
case MECH_PASSDB_NEED_LOOKUP_CREDENTIALS:
if (!auth_passdb_list_have_lookup_credentials(auth))
return FALSE;
break;
case MECH_PASSDB_NEED_SET_CREDENTIALS:
if (!auth_passdb_list_have_lookup_credentials(auth))
return FALSE;
if (!auth_passdb_list_have_set_credentials(auth))
return FALSE;
break;
}
return TRUE;
} | 377,526 |
0 | static int auth_request_proxy_host_lookup(struct auth_request *request,
const char *host,
auth_request_proxy_cb_t *callback)
{
struct auth *auth = auth_default_service();
struct auth_request_proxy_dns_lookup_ctx *ctx;
const char *value;
unsigned int secs;
/* need to do dns lookup for the host */
value = auth_fields_find(request->fields.extra_fields, "proxy_timeout");
if (value != NULL) {
if (str_to_uint(value, &secs) < 0) {
auth_request_log_error(request, AUTH_SUBSYS_PROXY,
"Invalid proxy_timeout value: %s", value);
}
}
ctx = p_new(request->pool, struct auth_request_proxy_dns_lookup_ctx, 1);
ctx->request = request;
auth_request_ref(request);
request->dns_lookup_ctx = ctx;
if (dns_client_lookup(auth->dns_client, host, request->event,
auth_request_proxy_dns_callback, ctx,
&ctx->dns_lookup) < 0) {
/* failed early */
return -1;
}
ctx->callback = callback;
return 0;
} | 377,527 |
0 | void auths_init(void)
{
struct auth *auth;
/* sanity checks */
i_assert(auth_request_var_expand_static_tab[AUTH_REQUEST_VAR_TAB_USER_IDX].key == 'u');
i_assert(auth_request_var_expand_static_tab[AUTH_REQUEST_VAR_TAB_USERNAME_IDX].key == 'n');
i_assert(auth_request_var_expand_static_tab[AUTH_REQUEST_VAR_TAB_DOMAIN_IDX].key == 'd');
i_assert(auth_request_var_expand_static_tab[AUTH_REQUEST_VAR_TAB_COUNT].key == '\0' &&
auth_request_var_expand_static_tab[AUTH_REQUEST_VAR_TAB_COUNT].long_key == NULL);
i_assert(auth_request_var_expand_static_tab[AUTH_REQUEST_VAR_TAB_COUNT-1].key != '\0' ||
auth_request_var_expand_static_tab[AUTH_REQUEST_VAR_TAB_COUNT-1].long_key != NULL);
array_foreach_elem(&auths, auth)
auth_init(auth);
} | 377,528 |
0 | void passdbs_init(void)
{
i_array_init(&passdb_interfaces, 16);
i_array_init(&passdb_modules, 16);
passdb_register_module(&passdb_passwd);
passdb_register_module(&passdb_bsdauth);
passdb_register_module(&passdb_dict);
#ifdef HAVE_LUA
passdb_register_module(&passdb_lua);
#endif
passdb_register_module(&passdb_passwd_file);
passdb_register_module(&passdb_pam);
passdb_register_module(&passdb_ldap);
passdb_register_module(&passdb_sql);
passdb_register_module(&passdb_static);
passdb_register_module(&passdb_oauth2);
} | 377,529 |
0 | void auths_preinit(const struct auth_settings *set, pool_t pool,
const struct mechanisms_register *reg,
const char *const *services)
{
struct master_service_settings_output set_output;
const struct auth_settings *service_set;
struct auth *auth;
unsigned int i;
const char *not_service = NULL;
bool check_default = TRUE;
auth_event = event_create(NULL);
event_set_forced_debug(auth_event, set->debug);
event_add_category(auth_event, &event_category_auth);
i_array_init(&auths, 8);
auth = auth_preinit(set, NULL, pool, reg);
array_push_back(&auths, &auth);
for (i = 0; services[i] != NULL; i++) {
if (services[i][0] == '!') {
if (not_service != NULL) {
i_fatal("Can't have multiple protocol "
"!services (seen %s and %s)",
not_service, services[i]);
}
not_service = services[i];
}
service_set = auth_settings_read(services[i], pool,
&set_output);
auth = auth_preinit(service_set, services[i], pool, reg);
array_push_back(&auths, &auth);
}
if (not_service != NULL && str_array_find(services, not_service+1))
check_default = FALSE;
array_foreach_elem(&auths, auth) {
if (auth->service != NULL || check_default)
auth_mech_list_verify_passdb(auth);
}
} | 377,530 |
0 | auth_request_append_password(struct auth_request *request, string_t *str)
{
const char *p, *log_type = request->set->verbose_passwords;
unsigned int max_len = 1024;
if (request->mech_password == NULL)
return;
p = strchr(log_type, ':');
if (p != NULL) {
if (str_to_uint(p+1, &max_len) < 0)
i_unreached();
log_type = t_strdup_until(log_type, p);
}
if (strcmp(log_type, "plain") == 0) {
str_printfa(str, "(given password: %s)",
t_strndup(request->mech_password, max_len));
} else if (strcmp(log_type, "sha1") == 0) {
unsigned char sha1[SHA1_RESULTLEN];
sha1_get_digest(request->mech_password,
strlen(request->mech_password), sha1);
str_printfa(str, "(SHA1 of given password: %s)",
t_strndup(binary_to_hex(sha1, sizeof(sha1)),
max_len));
} else {
i_unreached();
}
} | 377,531 |
0 | void auth_request_set_credentials(struct auth_request *request,
const char *scheme, const char *data,
set_credentials_callback_t *callback)
{
struct auth_passdb *passdb = request->passdb;
const char *cache_key, *new_credentials;
cache_key = passdb_cache == NULL ? NULL : passdb->cache_key;
if (cache_key != NULL)
auth_cache_remove(passdb_cache, request, cache_key);
request->private_callback.set_credentials = callback;
new_credentials = t_strdup_printf("{%s}%s", scheme, data);
if (passdb->passdb->blocking)
passdb_blocking_set_credentials(request, new_credentials);
else if (passdb->passdb->iface.set_credentials != NULL) {
passdb->passdb->iface.set_credentials(request, new_credentials,
callback);
} else {
/* this passdb doesn't support credentials update */
callback(FALSE, request);
}
} | 377,532 |
0 | void auth_request_fail(struct auth_request *request)
{
i_assert(request->state == AUTH_REQUEST_STATE_MECH_CONTINUE);
auth_request_set_state(request, AUTH_REQUEST_STATE_FINISHED);
auth_request_refresh_last_access(request);
auth_request_log_finished(request);
auth_request_handler_reply(request, AUTH_CLIENT_RESULT_FAILURE, "", 0);
} | 377,533 |
0 | auth_request_proxy_finish_ip(struct auth_request *request,
bool proxy_host_is_self)
{
const struct auth_request_fields *fields = &request->fields;
if (!auth_fields_exists(fields->extra_fields, "proxy_maybe")) {
/* proxying */
} else if (!proxy_host_is_self ||
!auth_request_proxy_is_self(request)) {
/* proxy destination isn't ourself - proxy */
auth_fields_remove(fields->extra_fields, "proxy_maybe");
auth_fields_add(fields->extra_fields, "proxy", NULL, 0);
} else {
/* proxying to ourself - log in without proxying by dropping
all the proxying fields. */
bool proxy_always = auth_fields_exists(fields->extra_fields,
"proxy_always");
auth_request_proxy_finish_failure(request);
if (proxy_always) {
/* setup where "self" refers to the local director
cluster, while "non-self" refers to remote clusters.
we've matched self here, so add proxy field and
let director fill the host. */
auth_fields_add(request->fields.extra_fields,
"proxy", NULL, 0);
}
}
} | 377,535 |
0 | static bool auth_passdb_list_have_set_credentials(const struct auth *auth)
{
const struct auth_passdb *passdb;
for (passdb = auth->masterdbs; passdb != NULL; passdb = passdb->next) {
if (passdb->passdb->iface.set_credentials != NULL)
return TRUE;
}
for (passdb = auth->passdbs; passdb != NULL; passdb = passdb->next) {
if (passdb->passdb->iface.set_credentials != NULL)
return TRUE;
}
return FALSE;
} | 377,536 |
0 | struct auth *auth_find_service(const char *name)
{
struct auth *const *a;
unsigned int i, count;
a = array_get(&auths, &count);
if (name != NULL) {
for (i = 1; i < count; i++) {
if (strcmp(a[i]->service, name) == 0)
return a[i];
}
/* not found. maybe we can instead find a !service */
for (i = 1; i < count; i++) {
if (a[i]->service[0] == '!' &&
strcmp(a[i]->service + 1, name) != 0)
return a[i];
}
}
return a[0];
} | 377,537 |
0 | static void auth_deinit(struct auth *auth)
{
struct auth_passdb *passdb;
struct auth_userdb *userdb;
for (passdb = auth->masterdbs; passdb != NULL; passdb = passdb->next)
passdb_deinit(passdb->passdb);
for (passdb = auth->passdbs; passdb != NULL; passdb = passdb->next)
passdb_deinit(passdb->passdb);
for (userdb = auth->userdbs; userdb != NULL; userdb = userdb->next)
userdb_deinit(userdb->userdb);
dns_client_deinit(&auth->dns_client);
} | 377,538 |
0 | auth_userdb_preinit(struct auth *auth, const struct auth_userdb_settings *set)
{
struct auth_userdb *auth_userdb, **dest;
auth_userdb = p_new(auth->pool, struct auth_userdb, 1);
auth_userdb->set = set;
auth_userdb->skip = auth_userdb_skip_parse(set->skip);
auth_userdb->result_success =
auth_db_rule_parse(set->result_success);
auth_userdb->result_failure =
auth_db_rule_parse(set->result_failure);
auth_userdb->result_internalfail =
auth_db_rule_parse(set->result_internalfail);
auth_userdb->default_fields_tmpl =
userdb_template_build(auth->pool, set->driver,
set->default_fields);
auth_userdb->override_fields_tmpl =
userdb_template_build(auth->pool, set->driver,
set->override_fields);
for (dest = &auth->userdbs; *dest != NULL; dest = &(*dest)->next) ;
*dest = auth_userdb;
auth_userdb->userdb = userdb_preinit(auth->pool, set);
/* make sure any %variables in default_fields exist in cache_key */
if (auth_userdb->userdb->default_cache_key != NULL) {
auth_userdb->cache_key =
p_strconcat(auth->pool, auth_userdb->userdb->default_cache_key,
set->default_fields, NULL);
}
else {
auth_userdb->cache_key = NULL;
}
} | 377,539 |
0 | static bool auth_passdb_list_have_lookup_credentials(const struct auth *auth)
{
const struct auth_passdb *passdb;
for (passdb = auth->passdbs; passdb != NULL; passdb = passdb->next) {
if (passdb->passdb->iface.lookup_credentials != NULL)
return TRUE;
}
return FALSE;
} | 377,540 |
0 | void auth_request_set_state(struct auth_request *request,
enum auth_request_state state)
{
if (request->state == state)
return;
i_assert(request->to_penalty == NULL);
i_assert(auth_request_state_count[request->state] > 0);
auth_request_state_count[request->state]--;
auth_request_state_count[state]++;
request->state = state;
auth_refresh_proctitle();
} | 377,541 |
0 | void auth_request_success(struct auth_request *request,
const void *data, size_t data_size)
{
i_assert(request->state == AUTH_REQUEST_STATE_MECH_CONTINUE);
if (!request->set->policy_check_after_auth) {
struct auth_policy_check_ctx *ctx =
p_new(request->pool, struct auth_policy_check_ctx, 1);
ctx->success_data = buffer_create_dynamic(request->pool, 1);
ctx->request = request;
ctx->type = AUTH_POLICY_CHECK_TYPE_SUCCESS;
auth_request_policy_check_callback(0, ctx);
return;
}
/* perform second policy lookup here */
struct auth_policy_check_ctx *ctx = p_new(request->pool, struct auth_policy_check_ctx, 1);
ctx->request = request;
ctx->success_data = buffer_create_dynamic(request->pool, data_size);
buffer_append(ctx->success_data, data, data_size);
ctx->type = AUTH_POLICY_CHECK_TYPE_SUCCESS;
auth_policy_check(request, request->mech_password, auth_request_policy_check_callback, ctx);
} | 377,542 |
0 | void auth_request_verify_plain_callback(enum passdb_result result,
struct auth_request *request)
{
struct auth_passdb *passdb = request->passdb;
i_assert(request->state == AUTH_REQUEST_STATE_PASSDB);
auth_request_set_state(request, AUTH_REQUEST_STATE_MECH_CONTINUE);
if (result == PASSDB_RESULT_OK &&
auth_fields_exists(request->fields.extra_fields, "noauthenticate"))
result = PASSDB_RESULT_NEXT;
if (result != PASSDB_RESULT_INTERNAL_FAILURE)
auth_request_save_cache(request, result);
else {
/* lookup failed. if we're looking here only because the
request was expired in cache, fallback to using cached
expired record. */
const char *cache_key = passdb->cache_key;
if (passdb_cache_verify_plain(request, cache_key,
request->mech_password,
&result, TRUE)) {
e_info(authdb_event(request),
"Falling back to expired data from cache");
return;
}
}
auth_request_verify_plain_callback_finish(result, request);
} | 377,543 |
0 | void auth_request_initial(struct auth_request *request)
{
i_assert(request->state == AUTH_REQUEST_STATE_NEW);
auth_request_set_state(request, AUTH_REQUEST_STATE_MECH_CONTINUE);
if (auth_request_fail_on_nuls(request, request->initial_response,
request->initial_response_len))
return;
request->mech->auth_initial(request, request->initial_response,
request->initial_response_len);
} | 377,544 |
0 | static enum auth_userdb_skip auth_userdb_skip_parse(const char *str)
{
if (strcmp(str, "never") == 0)
return AUTH_USERDB_SKIP_NEVER;
if (strcmp(str, "found") == 0)
return AUTH_USERDB_SKIP_FOUND;
if (strcmp(str, "notfound") == 0)
return AUTH_USERDB_SKIP_NOTFOUND;
i_unreached();
} | 377,546 |
0 | auth_request_validate_networks(struct auth_request *request,
const char *name, const char *networks,
const struct ip_addr *remote_ip)
{
const char *const *net;
struct ip_addr net_ip;
unsigned int bits;
bool found = FALSE;
for (net = t_strsplit_spaces(networks, ", "); *net != NULL; net++) {
e_debug(authdb_event(request),
"%s: Matching for network %s", name, *net);
if (strcmp(*net, "local") == 0) {
if (remote_ip->family == 0) {
found = TRUE;
break;
}
} else if (net_parse_range(*net, &net_ip, &bits) < 0) {
e_info(authdb_event(request),
"%s: Invalid network '%s'", name, *net);
} else if (remote_ip->family != 0 &&
net_is_in_network(remote_ip, &net_ip, bits)) {
found = TRUE;
break;
}
}
if (found)
;
else if (remote_ip->family == 0) {
e_info(authdb_event(request),
"%s check failed: Remote IP not known and 'local' missing", name);
} else {
e_info(authdb_event(request),
"%s check failed: IP %s not in allowed networks",
name, net_ip2addr(remote_ip));
}
if (!found)
request->failed = TRUE;
} | 377,549 |
0 | static void auth_request_set_uidgid_file(struct auth_request *request,
const char *path_template)
{
string_t *path;
struct stat st;
const char *error;
path = t_str_new(256);
if (auth_request_var_expand(path, path_template, request,
NULL, &error) <= 0) {
e_error(authdb_event(request),
"Failed to expand uidgid_file=%s: %s", path_template, error);
request->userdb_lookup_tempfailed = TRUE;
} else if (stat(str_c(path), &st) < 0) {
e_error(authdb_event(request),
"stat(%s) failed: %m", str_c(path));
request->userdb_lookup_tempfailed = TRUE;
} else {
auth_fields_add(request->fields.userdb_reply,
"uid", dec2str(st.st_uid), 0);
auth_fields_add(request->fields.userdb_reply,
"gid", dec2str(st.st_gid), 0);
}
} | 377,550 |
0 | struct auth *auth_default_service(void)
{
struct auth *const *a;
unsigned int count;
a = array_get(&auths, &count);
return a[0];
} | 377,552 |
0 | auth_request_want_skip_passdb(struct auth_request *request,
struct auth_passdb *passdb)
{
/* if mechanism is not supported, skip */
const char *const *mechs = passdb->mechanisms;
const char *const *username_filter = passdb->username_filter;
const char *username;
username = request->fields.user;
if (!auth_request_mechanism_accepted(mechs, request->mech)) {
auth_request_log_debug(request,
request->mech != NULL ? AUTH_SUBSYS_MECH
: "none",
"skipping passdb: mechanism filtered");
return TRUE;
}
if (passdb->username_filter != NULL &&
!auth_request_username_accepted(username_filter, username)) {
auth_request_log_debug(request,
request->mech != NULL ? AUTH_SUBSYS_MECH
: "none",
"skipping passdb: username filtered");
return TRUE;
}
/* skip_password_check basically specifies if authentication is
finished */
bool authenticated = request->fields.skip_password_check;
switch (passdb->skip) {
case AUTH_PASSDB_SKIP_NEVER:
return FALSE;
case AUTH_PASSDB_SKIP_AUTHENTICATED:
return authenticated;
case AUTH_PASSDB_SKIP_UNAUTHENTICATED:
return !authenticated;
}
i_unreached();
} | 377,553 |
0 | bool passdb_get_credentials(struct auth_request *auth_request,
const char *input, const char *input_scheme,
const unsigned char **credentials_r, size_t *size_r)
{
const char *wanted_scheme = auth_request->wanted_credentials_scheme;
const char *plaintext, *error;
int ret;
struct password_generate_params pwd_gen_params;
if (auth_request->prefer_plain_credentials &&
password_scheme_is_alias(input_scheme, "PLAIN")) {
/* we've a plaintext scheme and we prefer to get it instead
of converting it to the fallback scheme */
wanted_scheme = "";
}
ret = password_decode(input, input_scheme,
credentials_r, size_r, &error);
if (ret <= 0) {
if (ret < 0) {
e_error(authdb_event(auth_request),
"Password data is not valid for scheme %s: %s",
input_scheme, error);
} else {
e_error(authdb_event(auth_request),
"Unknown scheme %s", input_scheme);
}
return FALSE;
}
if (*wanted_scheme == '\0') {
/* anything goes. change the wanted_credentials_scheme to what
we actually got, so blocking passdbs work. */
auth_request->wanted_credentials_scheme =
p_strdup(auth_request->pool, t_strcut(input_scheme, '.'));
return TRUE;
}
if (!password_scheme_is_alias(input_scheme, wanted_scheme)) {
if (!password_scheme_is_alias(input_scheme, "PLAIN")) {
const char *error = t_strdup_printf(
"Requested %s scheme, but we have only %s",
wanted_scheme, input_scheme);
if (auth_request->set->debug_passwords) {
error = t_strdup_printf("%s (input: %s)",
error, input);
}
e_info(authdb_event(auth_request),
"%s", error);
return FALSE;
}
/* we can generate anything out of plaintext passwords */
plaintext = t_strndup(*credentials_r, *size_r);
i_zero(&pwd_gen_params);
pwd_gen_params.user = auth_request->fields.original_username;
if (!auth_request->domain_is_realm &&
strchr(pwd_gen_params.user, '@') != NULL) {
/* domain must not be used as realm. add the @realm. */
pwd_gen_params.user = t_strconcat(pwd_gen_params.user, "@",
auth_request->fields.realm, NULL);
}
if (auth_request->set->debug_passwords) {
e_debug(authdb_event(auth_request),
"Generating %s from user '%s', password '%s'",
wanted_scheme, pwd_gen_params.user, plaintext);
}
if (!password_generate(plaintext, &pwd_gen_params,
wanted_scheme, credentials_r, size_r)) {
e_error(authdb_event(auth_request),
"Requested unknown scheme %s", wanted_scheme);
return FALSE;
}
}
return TRUE;
} | 377,554 |
0 | auth_preinit(const struct auth_settings *set, const char *service, pool_t pool,
const struct mechanisms_register *reg)
{
struct auth_passdb_settings *const *passdbs;
struct auth_userdb_settings *const *userdbs;
struct auth *auth;
unsigned int i, count, db_count, passdb_count, last_passdb = 0;
auth = p_new(pool, struct auth, 1);
auth->pool = pool;
auth->service = p_strdup(pool, service);
auth->set = set;
auth->reg = reg;
if (array_is_created(&set->passdbs))
passdbs = array_get(&set->passdbs, &db_count);
else {
passdbs = NULL;
db_count = 0;
}
/* initialize passdbs first and count them */
for (passdb_count = 0, i = 0; i < db_count; i++) {
if (passdbs[i]->master)
continue;
/* passdb { skip=unauthenticated } as the first passdb doesn't
make sense, since user is never authenticated at that point.
skip over them silently. */
if (auth->passdbs == NULL &&
auth_passdb_skip_parse(passdbs[i]->skip) == AUTH_PASSDB_SKIP_UNAUTHENTICATED)
continue;
auth_passdb_preinit(auth, passdbs[i], &auth->passdbs);
passdb_count++;
last_passdb = i;
}
if (passdb_count != 0 && passdbs[last_passdb]->pass)
i_fatal("Last passdb can't have pass=yes");
for (i = 0; i < db_count; i++) {
if (!passdbs[i]->master)
continue;
/* skip skip=unauthenticated, as explained above */
if (auth->masterdbs == NULL &&
auth_passdb_skip_parse(passdbs[i]->skip) == AUTH_PASSDB_SKIP_UNAUTHENTICATED)
continue;
if (passdbs[i]->deny)
i_fatal("Master passdb can't have deny=yes");
if (passdbs[i]->pass && passdb_count == 0) {
i_fatal("Master passdb can't have pass=yes "
"if there are no passdbs");
}
auth_passdb_preinit(auth, passdbs[i], &auth->masterdbs);
}
if (array_is_created(&set->userdbs)) {
userdbs = array_get(&set->userdbs, &count);
for (i = 0; i < count; i++)
auth_userdb_preinit(auth, userdbs[i]);
}
if (auth->userdbs == NULL) {
/* use a dummy userdb static. */
auth_userdb_preinit(auth, &userdb_dummy_set);
}
return auth;
} | 377,555 |
0 | auth_request_lookup_credentials_finish(enum passdb_result result,
const unsigned char *credentials,
size_t size,
struct auth_request *request)
{
const char *error;
if (passdb_template_export(request->passdb->override_fields_tmpl,
request, &error) < 0) {
e_error(authdb_event(request),
"Failed to expand override_fields: %s", error);
result = PASSDB_RESULT_INTERNAL_FAILURE;
}
if (!auth_request_handle_passdb_callback(&result, request)) {
/* try next passdb */
if (request->fields.skip_password_check &&
request->fields.delayed_credentials == NULL && size > 0) {
/* passdb continue* rule after a successful lookup.
remember these credentials and use them later on. */
auth_request_set_delayed_credentials(request,
credentials, size);
}
auth_request_lookup_credentials(request,
request->wanted_credentials_scheme,
request->private_callback.lookup_credentials);
} else {
if (request->fields.delayed_credentials != NULL && size == 0) {
/* we did multiple passdb lookups, but the last one
didn't provide any credentials (e.g. just wanted to
add some extra fields). so use the first passdb's
credentials instead. */
credentials = request->fields.delayed_credentials;
size = request->fields.delayed_credentials_size;
}
if (request->set->debug_passwords &&
result == PASSDB_RESULT_OK) {
e_debug(authdb_event(request),
"Credentials: %s",
binary_to_hex(credentials, size));
}
if (result == PASSDB_RESULT_SCHEME_NOT_AVAILABLE &&
request->passdbs_seen_user_unknown) {
/* one of the passdbs accepted the scheme,
but the user was unknown there */
result = PASSDB_RESULT_USER_UNKNOWN;
}
request->passdb_result = result;
request->private_callback.
lookup_credentials(result, credentials, size, request);
}
} | 377,556 |
0 | static void get_log_identifier(string_t *str, struct auth_request *auth_request)
{
const char *ip;
if (auth_request->fields.user == NULL)
str_append(str, "?");
else
str_sanitize_append(str, auth_request->fields.user,
MAX_LOG_USERNAME_LEN);
ip = net_ip2addr(&auth_request->fields.remote_ip);
if (ip[0] != '\0') {
str_append_c(str, ',');
str_append(str, ip);
}
if (auth_request->fields.requested_login_user != NULL)
str_append(str, ",master");
if (auth_request->fields.session_id != NULL)
str_printfa(str, ",<%s>", auth_request->fields.session_id);
} | 377,557 |
0 | void passdb_handle_credentials(enum passdb_result result,
const char *password, const char *scheme,
lookup_credentials_callback_t *callback,
struct auth_request *auth_request)
{
const unsigned char *credentials = NULL;
size_t size = 0;
if (result != PASSDB_RESULT_OK) {
callback(result, NULL, 0, auth_request);
return;
} else if (auth_fields_exists(auth_request->fields.extra_fields,
"noauthenticate")) {
callback(PASSDB_RESULT_NEXT, NULL, 0, auth_request);
return;
}
if (password != NULL) {
if (!passdb_get_credentials(auth_request, password, scheme,
&credentials, &size))
result = PASSDB_RESULT_SCHEME_NOT_AVAILABLE;
} else if (*auth_request->wanted_credentials_scheme == '\0') {
/* We're doing a passdb lookup (not authenticating).
Pass through a NULL password without an error. */
} else if (auth_request->fields.delayed_credentials != NULL) {
/* We already have valid credentials from an earlier
passdb lookup. auth_request_lookup_credentials_finish()
will use them. */
} else {
e_info(authdb_event(auth_request),
"Requested %s scheme, but we have a NULL password",
auth_request->wanted_credentials_scheme);
result = PASSDB_RESULT_SCHEME_NOT_AVAILABLE;
}
callback(result, credentials, size, auth_request);
} | 377,558 |
0 | void auth_request_get_log_prefix(string_t *str, struct auth_request *auth_request,
const char *subsystem)
{
const char *name;
if (subsystem == AUTH_SUBSYS_DB) {
if (!auth_request->userdb_lookup) {
i_assert(auth_request->passdb != NULL);
name = auth_request->passdb->set->name[0] != '\0' ?
auth_request->passdb->set->name :
auth_request->passdb->passdb->iface.name;
} else {
i_assert(auth_request->userdb != NULL);
name = auth_request->userdb->set->name[0] != '\0' ?
auth_request->userdb->set->name :
auth_request->userdb->userdb->iface->name;
}
} else if (subsystem == AUTH_SUBSYS_MECH) {
i_assert(auth_request->mech != NULL);
name = t_str_lcase(auth_request->mech->mech_name);
} else {
name = subsystem;
}
str_append(str, name);
str_append_c(str, '(');
get_log_identifier(str, auth_request);
str_append(str, "): ");
} | 377,559 |
0 | static void auth_request_userdb_save_cache(struct auth_request *request,
enum userdb_result result)
{
struct auth_userdb *userdb = request->userdb;
string_t *str;
const char *cache_value;
if (passdb_cache == NULL || userdb->cache_key == NULL)
return;
if (result == USERDB_RESULT_USER_UNKNOWN)
cache_value = "";
else {
str = t_str_new(128);
auth_fields_append(request->fields.userdb_reply, str,
AUTH_FIELD_FLAG_CHANGED,
AUTH_FIELD_FLAG_CHANGED);
if (request->user_changed_by_lookup) {
/* username was changed by passdb or userdb */
if (str_len(str) > 0)
str_append_c(str, '\t');
str_append(str, "user=");
str_append_tabescaped(str, request->fields.user);
}
if (str_len(str) == 0) {
/* no userdb fields. but we can't save an empty string,
since that means "user unknown". */
str_append(str, AUTH_REQUEST_USER_KEY_IGNORE);
}
cache_value = str_c(str);
}
/* last_success has no meaning with userdb */
auth_cache_insert(passdb_cache, request, userdb->cache_key,
cache_value, FALSE);
} | 377,561 |
0 | static const char *get_log_prefix_mech(struct auth_request *auth_request)
{
string_t *str = t_str_new(64);
auth_request_get_log_prefix(str, auth_request, AUTH_SUBSYS_MECH);
return str_c(str);
} | 377,562 |
0 | void passdbs_deinit(void)
{
array_free(&passdb_modules);
array_free(&passdb_interfaces);
} | 377,563 |
0 | passdb_find(const char *driver, const char *args, unsigned int *idx_r)
{
struct passdb_module *const *passdbs;
unsigned int i, count;
passdbs = array_get(&passdb_modules, &count);
for (i = 0; i < count; i++) {
if (strcmp(passdbs[i]->iface.name, driver) == 0 &&
strcmp(passdbs[i]->args, args) == 0) {
*idx_r = i;
return passdbs[i];
}
}
return NULL;
} | 377,564 |
0 | void auth_request_init(struct auth_request *request)
{
struct auth *auth;
auth = auth_request_get_auth(request);
request->set = auth->set;
request->passdb = auth->passdbs;
request->userdb = auth->userdbs;
} | 377,565 |
0 | static void auth_request_save_cache(struct auth_request *request,
enum passdb_result result)
{
struct auth_passdb *passdb = request->passdb;
const char *encoded_password;
string_t *str;
struct password_generate_params gen_params = {
.user = request->fields.user,
.rounds = 0
};
switch (result) {
case PASSDB_RESULT_USER_UNKNOWN:
case PASSDB_RESULT_PASSWORD_MISMATCH:
case PASSDB_RESULT_OK:
case PASSDB_RESULT_SCHEME_NOT_AVAILABLE:
/* can be cached */
break;
case PASSDB_RESULT_NEXT:
case PASSDB_RESULT_USER_DISABLED:
case PASSDB_RESULT_PASS_EXPIRED:
/* FIXME: we can't cache this now, or cache lookup would
return success. */
return;
case PASSDB_RESULT_INTERNAL_FAILURE:
i_unreached();
}
if (passdb_cache == NULL || passdb->cache_key == NULL)
return;
if (result < 0) {
/* lookup failed. */
if (result == PASSDB_RESULT_USER_UNKNOWN) {
auth_cache_insert(passdb_cache, request,
passdb->cache_key, "", FALSE);
}
return;
}
if (request->passdb_password == NULL &&
!auth_fields_exists(request->fields.extra_fields, "nopassword")) {
/* passdb didn't provide the correct password */
if (result != PASSDB_RESULT_OK ||
request->mech_password == NULL)
return;
/* we can still cache valid password lookups though.
strdup() it so that mech_password doesn't get
cleared too early. */
if (!password_generate_encoded(request->mech_password,
&gen_params,
CACHED_PASSWORD_SCHEME,
&encoded_password))
i_unreached();
request->passdb_password =
p_strconcat(request->pool, "{"CACHED_PASSWORD_SCHEME"}",
encoded_password, NULL);
}
/* save all except the currently given password in cache */
str = t_str_new(256);
if (request->passdb_password != NULL) {
if (*request->passdb_password != '{') {
/* cached passwords must have a known scheme */
str_append_c(str, '{');
str_append(str, passdb->passdb->default_pass_scheme);
str_append_c(str, '}');
}
str_append_tabescaped(str, request->passdb_password);
}
if (!auth_fields_is_empty(request->fields.extra_fields)) {
str_append_c(str, '\t');
/* add only those extra fields to cache that were set by this
passdb lookup. the CHANGED flag does this, because we
snapshotted the extra_fields before the current passdb
lookup. */
auth_fields_append(request->fields.extra_fields, str,
AUTH_FIELD_FLAG_CHANGED,
AUTH_FIELD_FLAG_CHANGED);
}
auth_cache_insert(passdb_cache, request, passdb->cache_key, str_c(str),
result == PASSDB_RESULT_OK);
} | 377,566 |
0 | void auth_request_proxy_finish_failure(struct auth_request *request)
{
/* drop all proxying fields */
auth_fields_remove(request->fields.extra_fields, "proxy");
auth_fields_remove(request->fields.extra_fields, "proxy_maybe");
auth_fields_remove(request->fields.extra_fields, "proxy_always");
auth_fields_remove(request->fields.extra_fields, "host");
auth_fields_remove(request->fields.extra_fields, "port");
auth_fields_remove(request->fields.extra_fields, "destuser");
} | 377,567 |
0 | void auth_request_userdb_lookup_begin(struct auth_request *request)
{
struct event *event;
const char *name;
i_assert(request->userdb != NULL);
i_assert(request->userdb_lookup);
request->userdb_cache_result = AUTH_REQUEST_CACHE_NONE;
name = (request->userdb->set->name[0] != '\0' ?
request->userdb->set->name :
request->userdb->userdb->iface->name);
event = event_create(request->event);
event_add_str(event, "userdb_id", dec2str(request->userdb->userdb->id));
event_add_str(event, "userdb_name", name);
event_add_str(event, "userdb", request->userdb->userdb->iface->name);
event_set_log_prefix_callback(event, FALSE,
auth_request_get_log_prefix_db, request);
/* check if we should enable verbose logging here*/
if (*request->userdb->set->auth_verbose == 'y')
event_set_min_log_level(event, LOG_TYPE_INFO);
else if (*request->userdb->set->auth_verbose == 'n')
event_set_min_log_level(event, LOG_TYPE_WARNING);
e_debug(event_create_passthrough(event)->
set_name("auth_userdb_request_started")->
event(),
"Performing userdb lookup");
array_push_back(&request->authdb_event, &event);
} | 377,568 |
0 | static bool password_has_illegal_chars(const char *password)
{
for (; *password != '\0'; password++) {
switch (*password) {
case '\001':
case '\t':
case '\r':
case '\n':
/* these characters have a special meaning in internal
protocols, make sure the password doesn't
accidentally get there unescaped. */
return TRUE;
}
}
return FALSE;
} | 377,569 |
0 | void auth_request_set_null_field(struct auth_request *request, const char *name)
{
if (str_begins_with(name, "userdb_")) {
/* make sure userdb prefetch is used even if all the fields
were returned as NULL. */
request->userdb_prefetch_set = TRUE;
}
} | 377,570 |
0 | static bool auth_passdb_list_have_verify_plain(const struct auth *auth)
{
const struct auth_passdb *passdb;
for (passdb = auth->passdbs; passdb != NULL; passdb = passdb->next) {
if (passdb->passdb->iface.verify_plain != NULL)
return TRUE;
}
return FALSE;
} | 377,571 |
0 | auth_request_set_password(struct auth_request *request, const char *value,
const char *default_scheme, bool noscheme)
{
if (request->passdb_password != NULL) {
e_error(authdb_event(request),
"Multiple password values not supported");
return;
}
/* if the password starts with '{' it most likely contains
also '}'. check it anyway to make sure, because we
assert-crash later if it doesn't exist. this could happen
if plaintext passwords are used. */
if (*value == '{' && !noscheme && strchr(value, '}') != NULL)
request->passdb_password = p_strdup(request->pool, value);
else {
i_assert(default_scheme != NULL);
request->passdb_password =
p_strdup_printf(request->pool, "{%s}%s",
default_scheme, value);
}
} | 377,572 |
0 | void auth_request_set_userdb_field(struct auth_request *request,
const char *name, const char *value)
{
size_t name_len = strlen(name);
uid_t uid;
gid_t gid;
i_assert(value != NULL);
if (name_len > 10 && strcmp(name+name_len-10, ":protected") == 0) {
/* set this field only if it hasn't been set before */
name = t_strndup(name, name_len-10);
if (auth_fields_exists(request->fields.userdb_reply, name))
return;
} else if (name_len > 7 && strcmp(name+name_len-7, ":remove") == 0) {
/* remove this field entirely */
name = t_strndup(name, name_len-7);
auth_fields_remove(request->fields.userdb_reply, name);
return;
}
if (strcmp(name, "uid") == 0) {
uid = userdb_parse_uid(request, value);
if (uid == (uid_t)-1) {
request->userdb_lookup_tempfailed = TRUE;
return;
}
value = dec2str(uid);
} else if (strcmp(name, "gid") == 0) {
gid = userdb_parse_gid(request, value);
if (gid == (gid_t)-1) {
request->userdb_lookup_tempfailed = TRUE;
return;
}
value = dec2str(gid);
} else if (strcmp(name, "tempfail") == 0) {
request->userdb_lookup_tempfailed = TRUE;
return;
} else if (auth_request_try_update_username(request, name, value)) {
return;
} else if (strcmp(name, "uidgid_file") == 0) {
auth_request_set_uidgid_file(request, value);
return;
} else if (strcmp(name, "userdb_import") == 0) {
auth_request_userdb_import(request, value);
return;
} else if (strcmp(name, "system_user") == 0) {
/* FIXME: the system_user is for backwards compatibility */
static bool warned = FALSE;
if (!warned) {
e_warning(authdb_event(request),
"Replace system_user with system_groups_user");
warned = TRUE;
}
name = "system_groups_user";
} else if (strcmp(name, AUTH_REQUEST_USER_KEY_IGNORE) == 0) {
return;
}
auth_fields_add(request->fields.userdb_reply, name, value, 0);
} | 377,573 |
0 | void passdbs_generate_md5(unsigned char md5[STATIC_ARRAY MD5_RESULTLEN])
{
struct md5_context ctx;
struct passdb_module *const *passdbs;
unsigned int i, count;
md5_init(&ctx);
passdbs = array_get(&passdb_modules, &count);
for (i = 0; i < count; i++) {
md5_update(&ctx, &passdbs[i]->id, sizeof(passdbs[i]->id));
md5_update(&ctx, passdbs[i]->iface.name,
strlen(passdbs[i]->iface.name));
md5_update(&ctx, passdbs[i]->args, strlen(passdbs[i]->args));
}
md5_final(&ctx, md5);
} | 377,574 |
0 | auth_request_cache_result_to_str(enum auth_request_cache_result result)
{
switch(result) {
case AUTH_REQUEST_CACHE_NONE:
return "none";
case AUTH_REQUEST_CACHE_HIT:
return "hit";
case AUTH_REQUEST_CACHE_MISS:
return "miss";
default:
i_unreached();
}
} | 377,575 |
0 | auth_request_mechanism_accepted(const char *const *mechs,
const struct mech_module *mech)
{
/* no filter specified, anything goes */
if (mechs == NULL) return TRUE;
/* request has no mechanism, see if none is accepted */
if (mech == NULL)
return str_array_icase_find(mechs, "none");
/* check if request mechanism is accepted */
return str_array_icase_find(mechs, mech->mech_name);
} | 377,576 |
0 | auth_request_userdb_import(struct auth_request *request, const char *args)
{
const char *key, *value, *const *arg;
for (arg = t_strsplit(args, "\t"); *arg != NULL; arg++) {
value = strchr(*arg, '=');
if (value == NULL) {
key = *arg;
value = "";
} else {
key = t_strdup_until(*arg, value);
value++;
}
auth_request_set_userdb_field(request, key, value);
}
} | 377,577 |
0 | void auth_request_policy_check_callback(int result, void *context)
{
struct auth_policy_check_ctx *ctx = context;
ctx->request->policy_processed = TRUE;
/* It's possible that multiple policy lookups return a penalty.
Sum them all up to the event. */
ctx->request->policy_penalty += result < 0 ? 0 : result;
if (ctx->request->set->policy_log_only && result != 0) {
auth_request_policy_penalty_finish(context);
return;
}
if (result < 0) {
/* fail it right here and now */
auth_request_fail(ctx->request);
} else if (ctx->type != AUTH_POLICY_CHECK_TYPE_SUCCESS && result > 0 &&
!ctx->request->fields.no_penalty) {
ctx->request->to_penalty = timeout_add(result * 1000,
auth_request_policy_penalty_finish,
context);
} else {
auth_request_policy_penalty_finish(context);
}
} | 377,578 |
0 | void auth_request_passdb_lookup_begin(struct auth_request *request)
{
struct event *event;
const char *name;
i_assert(request->passdb != NULL);
i_assert(!request->userdb_lookup);
request->passdb_cache_result = AUTH_REQUEST_CACHE_NONE;
name = (request->passdb->set->name[0] != '\0' ?
request->passdb->set->name :
request->passdb->passdb->iface.name);
event = event_create(request->event);
event_add_str(event, "passdb_id", dec2str(request->passdb->passdb->id));
event_add_str(event, "passdb_name", name);
event_add_str(event, "passdb", request->passdb->passdb->iface.name);
event_set_log_prefix_callback(event, FALSE,
auth_request_get_log_prefix_db, request);
/* check if we should enable verbose logging here */
if (*request->passdb->set->auth_verbose == 'y')
event_set_min_log_level(event, LOG_TYPE_INFO);
else if (*request->passdb->set->auth_verbose == 'n')
event_set_min_log_level(event, LOG_TYPE_WARNING);
e_debug(event_create_passthrough(event)->
set_name("auth_passdb_request_started")->
event(),
"Performing passdb lookup");
array_push_back(&request->authdb_event, &event);
} | 377,579 |
0 | void auths_deinit(void)
{
struct auth *auth;
array_foreach_elem(&auths, auth)
auth_deinit(auth);
event_unref(&auth_event);
} | 377,580 |
0 | bool auth_request_import_master(struct auth_request *request,
const char *key, const char *value)
{
pid_t pid;
i_assert(value != NULL);
/* master request lookups may set these */
if (strcmp(key, "session_pid") == 0) {
if (str_to_pid(value, &pid) == 0)
request->session_pid = pid;
} else if (strcmp(key, "request_auth_token") == 0)
request->request_auth_token = TRUE;
else
return FALSE;
return TRUE;
} | 377,581 |
0 | static void auth_mech_list_verify_passdb(const struct auth *auth)
{
const struct mech_module_list *list;
for (list = auth->reg->modules; list != NULL; list = list->next) {
if (!auth_mech_verify_passdb(auth, list))
break;
}
if (list != NULL) {
if (auth->passdbs == NULL) {
i_fatal("No passdbs specified in configuration file. "
"%s mechanism needs one",
list->module.mech_name);
}
i_fatal("%s mechanism can't be supported with given passdbs",
list->module.mech_name);
}
} | 377,585 |
0 | int CMS_data(CMS_ContentInfo *cms, BIO *out, unsigned int flags)
{
BIO *cont;
int r;
if (OBJ_obj2nid(CMS_get0_type(cms)) != NID_pkcs7_data)
{
CMSerr(CMS_F_CMS_DATA, CMS_R_TYPE_NOT_DATA);
return 0;
}
cont = CMS_dataInit(cms, NULL);
if (!cont)
return 0;
r = cms_copy_content(out, cont, flags);
BIO_free_all(cont);
return r;
} | 377,586 |
0 | CMS_ContentInfo *CMS_digest_create(BIO *in, const EVP_MD *md,
unsigned int flags)
{
CMS_ContentInfo *cms;
if (!md)
md = EVP_sha1();
cms = cms_DigestedData_create(md);
if (!cms)
return NULL;
if(!(flags & CMS_DETACHED))
CMS_set_detached(cms, 0);
if ((flags & CMS_STREAM) || CMS_final(cms, in, NULL, flags))
return cms;
CMS_ContentInfo_free(cms);
return NULL;
} | 377,587 |
0 | static BIO *cms_get_text_bio(BIO *out, unsigned int flags)
{
BIO *rbio;
if (out == NULL)
rbio = BIO_new(BIO_s_null());
else if (flags & CMS_TEXT)
{
rbio = BIO_new(BIO_s_mem());
BIO_set_mem_eof_return(rbio, 0);
}
else
rbio = out;
return rbio;
} | 377,588 |
0 | int CMS_decrypt_set1_password(CMS_ContentInfo *cms,
unsigned char *pass, ossl_ssize_t passlen)
{
STACK_OF(CMS_RecipientInfo) *ris;
CMS_RecipientInfo *ri;
int i, r;
ris = CMS_get0_RecipientInfos(cms);
for (i = 0; i < sk_CMS_RecipientInfo_num(ris); i++)
{
ri = sk_CMS_RecipientInfo_value(ris, i);
if (CMS_RecipientInfo_type(ri) != CMS_RECIPINFO_PASS)
continue;
CMS_RecipientInfo_set0_password(ri, pass, passlen);
r = CMS_RecipientInfo_decrypt(cms, ri);
CMS_RecipientInfo_set0_password(ri, NULL, 0);
if (r > 0)
return 1;
}
CMSerr(CMS_F_CMS_DECRYPT_SET1_PASSWORD, CMS_R_NO_MATCHING_RECIPIENT);
return 0;
} | 377,590 |
0 | CMS_ContentInfo *CMS_data_create(BIO *in, unsigned int flags)
{
CMS_ContentInfo *cms;
cms = cms_Data_create();
if (!cms)
return NULL;
if ((flags & CMS_STREAM) || CMS_final(cms, in, NULL, flags))
return cms;
CMS_ContentInfo_free(cms);
return NULL;
} | 377,591 |
0 | int CMS_uncompress(CMS_ContentInfo *cms, BIO *dcont, BIO *out,
unsigned int flags)
{
BIO *cont;
int r;
if (OBJ_obj2nid(CMS_get0_type(cms)) != NID_id_smime_ct_compressedData)
{
CMSerr(CMS_F_CMS_UNCOMPRESS,
CMS_R_TYPE_NOT_COMPRESSED_DATA);
return 0;
}
if (!dcont && !check_content(cms))
return 0;
cont = CMS_dataInit(cms, dcont);
if (!cont)
return 0;
r = cms_copy_content(out, cont, flags);
do_free_upto(cont, dcont);
return r;
} | 377,592 |
0 | static int check_content(CMS_ContentInfo *cms)
{
ASN1_OCTET_STRING **pos = CMS_get0_content(cms);
if (!pos || !*pos)
{
CMSerr(CMS_F_CHECK_CONTENT, CMS_R_NO_CONTENT);
return 0;
}
return 1;
} | 377,593 |
0 | int CMS_decrypt_set1_pkey(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert)
{
STACK_OF(CMS_RecipientInfo) *ris;
CMS_RecipientInfo *ri;
int i, r, ri_type;
int debug = 0;
ris = CMS_get0_RecipientInfos(cms);
if (ris)
debug = cms->d.envelopedData->encryptedContentInfo->debug;
ri_type = cms_pkey_get_ri_type(pk);
if (ri_type == CMS_RECIPINFO_NONE)
{
CMSerr(CMS_F_CMS_DECRYPT_SET1_PKEY,
CMS_R_NOT_SUPPORTED_FOR_THIS_KEY_TYPE);
return 0;
}
for (i = 0; i < sk_CMS_RecipientInfo_num(ris); i++)
{
ri = sk_CMS_RecipientInfo_value(ris, i);
if (CMS_RecipientInfo_type(ri) != ri_type)
continue;
if (ri_type == CMS_RECIPINFO_AGREE)
{
r = cms_kari_set1_pkey(cms, ri, pk, cert);
if (r > 0)
return 1;
if (r < 0)
return 0;
}
/* If we have a cert try matching RecipientInfo
* otherwise try them all.
*/
else if (!cert || !CMS_RecipientInfo_ktri_cert_cmp(ri, cert))
{
CMS_RecipientInfo_set0_pkey(ri, pk);
r = CMS_RecipientInfo_decrypt(cms, ri);
CMS_RecipientInfo_set0_pkey(ri, NULL);
if (cert)
{
/* If not debugging clear any error and
* return success to avoid leaking of
* information useful to MMA
*/
if (!debug)
{
ERR_clear_error();
return 1;
}
if (r > 0)
return 1;
CMSerr(CMS_F_CMS_DECRYPT_SET1_PKEY,
CMS_R_DECRYPT_ERROR);
return 0;
}
/* If no cert and not debugging don't leave loop
* after first successful decrypt. Always attempt
* to decrypt all recipients to avoid leaking timing
* of a successful decrypt.
*/
else if (r > 0 && debug)
return 1;
}
}
/* If no cert and not debugging always return success */
if (!cert && !debug)
{
ERR_clear_error();
return 1;
}
CMSerr(CMS_F_CMS_DECRYPT_SET1_PKEY, CMS_R_NO_MATCHING_RECIPIENT);
return 0;
} | 377,594 |
0 | int CMS_decrypt(CMS_ContentInfo *cms, EVP_PKEY *pk, X509 *cert,
BIO *dcont, BIO *out,
unsigned int flags)
{
int r;
BIO *cont;
if (OBJ_obj2nid(CMS_get0_type(cms)) != NID_pkcs7_enveloped)
{
CMSerr(CMS_F_CMS_DECRYPT, CMS_R_TYPE_NOT_ENVELOPED_DATA);
return 0;
}
if (!dcont && !check_content(cms))
return 0;
if (flags & CMS_DEBUG_DECRYPT)
cms->d.envelopedData->encryptedContentInfo->debug = 1;
else
cms->d.envelopedData->encryptedContentInfo->debug = 0;
if (!pk && !cert && !dcont && !out)
return 1;
if (pk && !CMS_decrypt_set1_pkey(cms, pk, cert))
return 0;
cont = CMS_dataInit(cms, dcont);
if (!cont)
return 0;
r = cms_copy_content(out, cont, flags);
do_free_upto(cont, dcont);
return r;
} | 377,595 |
0 | int CMS_uncompress(CMS_ContentInfo *cms, BIO *dcont, BIO *out,
unsigned int flags)
{
CMSerr(CMS_F_CMS_UNCOMPRESS, CMS_R_UNSUPPORTED_COMPRESSION_ALGORITHM);
return 0;
} | 377,597 |
0 | CMS_ContentInfo *CMS_compress(BIO *in, int comp_nid, unsigned int flags)
{
CMSerr(CMS_F_CMS_COMPRESS, CMS_R_UNSUPPORTED_COMPRESSION_ALGORITHM);
return NULL;
} | 377,598 |
0 | static int cms_kari_set1_pkey(CMS_ContentInfo *cms, CMS_RecipientInfo *ri,
EVP_PKEY *pk, X509 *cert)
{
int i;
STACK_OF(CMS_RecipientEncryptedKey) *reks;
CMS_RecipientEncryptedKey *rek;
reks = CMS_RecipientInfo_kari_get0_reks(ri);
if (!cert)
return 0;
for (i = 0; i < sk_CMS_RecipientEncryptedKey_num(reks); i++)
{
int rv;
rek = sk_CMS_RecipientEncryptedKey_value(reks, i);
if (CMS_RecipientEncryptedKey_cert_cmp(rek, cert))
continue;
CMS_RecipientInfo_kari_set0_pkey(ri, pk);
rv = CMS_RecipientInfo_kari_decrypt(cms, ri, rek);
CMS_RecipientInfo_kari_set0_pkey(ri, NULL);
if (rv > 0)
return 1;
return -1;
}
return 0;
} | 377,599 |
0 | int CMS_EncryptedData_decrypt(CMS_ContentInfo *cms,
const unsigned char *key, size_t keylen,
BIO *dcont, BIO *out, unsigned int flags)
{
BIO *cont;
int r;
if (OBJ_obj2nid(CMS_get0_type(cms)) != NID_pkcs7_encrypted)
{
CMSerr(CMS_F_CMS_ENCRYPTEDDATA_DECRYPT,
CMS_R_TYPE_NOT_ENCRYPTED_DATA);
return 0;
}
if (!dcont && !check_content(cms))
return 0;
if (CMS_EncryptedData_set1_key(cms, NULL, key, keylen) <= 0)
return 0;
cont = CMS_dataInit(cms, dcont);
if (!cont)
return 0;
r = cms_copy_content(out, cont, flags);
do_free_upto(cont, dcont);
return r;
} | 377,600 |
0 | static int cms_signerinfo_verify_cert(CMS_SignerInfo *si,
X509_STORE *store,
STACK_OF(X509) *certs,
STACK_OF(X509_CRL) *crls,
unsigned int flags)
{
X509_STORE_CTX ctx;
X509 *signer;
int i, j, r = 0;
CMS_SignerInfo_get0_algs(si, NULL, &signer, NULL, NULL);
if (!X509_STORE_CTX_init(&ctx, store, signer, certs))
{
CMSerr(CMS_F_CMS_SIGNERINFO_VERIFY_CERT,
CMS_R_STORE_INIT_ERROR);
goto err;
}
X509_STORE_CTX_set_default(&ctx, "smime_sign");
if (crls)
X509_STORE_CTX_set0_crls(&ctx, crls);
i = X509_verify_cert(&ctx);
if (i <= 0)
{
j = X509_STORE_CTX_get_error(&ctx);
CMSerr(CMS_F_CMS_SIGNERINFO_VERIFY_CERT,
CMS_R_CERTIFICATE_VERIFY_ERROR);
ERR_add_error_data(2, "Verify error:",
X509_verify_cert_error_string(j));
goto err;
}
r = 1;
err:
X509_STORE_CTX_cleanup(&ctx);
return r;
} | 377,601 |
0 | int CMS_final(CMS_ContentInfo *cms, BIO *data, BIO *dcont, unsigned int flags)
{
BIO *cmsbio;
int ret = 0;
if (!(cmsbio = CMS_dataInit(cms, dcont)))
{
CMSerr(CMS_F_CMS_FINAL,ERR_R_MALLOC_FAILURE);
return 0;
}
SMIME_crlf_copy(data, cmsbio, flags);
(void)BIO_flush(cmsbio);
if (!CMS_dataFinal(cms, cmsbio))
{
CMSerr(CMS_F_CMS_FINAL,CMS_R_CMS_DATAFINAL_ERROR);
goto err;
}
ret = 1;
err:
do_free_upto(cmsbio, dcont);
return ret;
} | 377,604 |
0 | CMS_ContentInfo *CMS_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs,
BIO *data, unsigned int flags)
{
CMS_ContentInfo *cms;
int i;
cms = CMS_ContentInfo_new();
if (!cms || !CMS_SignedData_init(cms))
goto merr;
if (pkey && !CMS_add1_signer(cms, signcert, pkey, NULL, flags))
{
CMSerr(CMS_F_CMS_SIGN, CMS_R_ADD_SIGNER_ERROR);
goto err;
}
for (i = 0; i < sk_X509_num(certs); i++)
{
X509 *x = sk_X509_value(certs, i);
if (!CMS_add1_cert(cms, x))
goto merr;
}
if(!(flags & CMS_DETACHED))
CMS_set_detached(cms, 0);
if ((flags & (CMS_STREAM|CMS_PARTIAL))
|| CMS_final(cms, data, NULL, flags))
return cms;
else
goto err;
merr:
CMSerr(CMS_F_CMS_SIGN, ERR_R_MALLOC_FAILURE);
err:
if (cms)
CMS_ContentInfo_free(cms);
return NULL;
} | 377,605 |
0 | CMS_ContentInfo *CMS_sign_receipt(CMS_SignerInfo *si,
X509 *signcert, EVP_PKEY *pkey,
STACK_OF(X509) *certs,
unsigned int flags)
{
CMS_SignerInfo *rct_si;
CMS_ContentInfo *cms = NULL;
ASN1_OCTET_STRING **pos, *os;
BIO *rct_cont = NULL;
int r = 0;
flags &= ~(CMS_STREAM|CMS_TEXT);
/* Not really detached but avoids content being allocated */
flags |= CMS_PARTIAL|CMS_BINARY|CMS_DETACHED;
if (!pkey || !signcert)
{
CMSerr(CMS_F_CMS_SIGN_RECEIPT, CMS_R_NO_KEY_OR_CERT);
return NULL;
}
/* Initialize signed data */
cms = CMS_sign(NULL, NULL, certs, NULL, flags);
if (!cms)
goto err;
/* Set inner content type to signed receipt */
if (!CMS_set1_eContentType(cms, OBJ_nid2obj(NID_id_smime_ct_receipt)))
goto err;
rct_si = CMS_add1_signer(cms, signcert, pkey, NULL, flags);
if (!rct_si)
{
CMSerr(CMS_F_CMS_SIGN_RECEIPT, CMS_R_ADD_SIGNER_ERROR);
goto err;
}
os = cms_encode_Receipt(si);
if (!os)
goto err;
/* Set content to digest */
rct_cont = BIO_new_mem_buf(os->data, os->length);
if (!rct_cont)
goto err;
/* Add msgSigDigest attribute */
if (!cms_msgSigDigest_add1(rct_si, si))
goto err;
/* Finalize structure */
if (!CMS_final(cms, rct_cont, NULL, flags))
goto err;
/* Set embedded content */
pos = CMS_get0_content(cms);
*pos = os;
r = 1;
err:
if (rct_cont)
BIO_free(rct_cont);
if (r)
return cms;
CMS_ContentInfo_free(cms);
return NULL;
} | 377,606 |
0 | CMS_ContentInfo *CMS_encrypt(STACK_OF(X509) *certs, BIO *data,
const EVP_CIPHER *cipher, unsigned int flags)
{
CMS_ContentInfo *cms;
int i;
X509 *recip;
cms = CMS_EnvelopedData_create(cipher);
if (!cms)
goto merr;
for (i = 0; i < sk_X509_num(certs); i++)
{
recip = sk_X509_value(certs, i);
if (!CMS_add1_recipient_cert(cms, recip, flags))
{
CMSerr(CMS_F_CMS_ENCRYPT, CMS_R_RECIPIENT_ERROR);
goto err;
}
}
if(!(flags & CMS_DETACHED))
CMS_set_detached(cms, 0);
if ((flags & (CMS_STREAM|CMS_PARTIAL))
|| CMS_final(cms, data, NULL, flags))
return cms;
else
goto err;
merr:
CMSerr(CMS_F_CMS_ENCRYPT, ERR_R_MALLOC_FAILURE);
err:
if (cms)
CMS_ContentInfo_free(cms);
return NULL;
} | 377,607 |
0 | int CMS_digest_verify(CMS_ContentInfo *cms, BIO *dcont, BIO *out,
unsigned int flags)
{
BIO *cont;
int r;
if (OBJ_obj2nid(CMS_get0_type(cms)) != NID_pkcs7_digest)
{
CMSerr(CMS_F_CMS_DIGEST_VERIFY, CMS_R_TYPE_NOT_DIGESTED_DATA);
return 0;
}
if (!dcont && !check_content(cms))
return 0;
cont = CMS_dataInit(cms, dcont);
if (!cont)
return 0;
r = cms_copy_content(out, cont, flags);
if (r)
r = cms_DigestedData_do_final(cms, cont, 1);
do_free_upto(cont, dcont);
return r;
} | 377,608 |
0 | int CMS_verify_receipt(CMS_ContentInfo *rcms, CMS_ContentInfo *ocms,
STACK_OF(X509) *certs,
X509_STORE *store, unsigned int flags)
{
int r;
flags &= ~(CMS_DETACHED|CMS_TEXT);
r = CMS_verify(rcms, certs, store, NULL, NULL, flags);
if (r <= 0)
return r;
return cms_Receipt_verify(rcms, ocms);
} | 377,609 |
0 | int CMS_decrypt_set1_key(CMS_ContentInfo *cms,
unsigned char *key, size_t keylen,
unsigned char *id, size_t idlen)
{
STACK_OF(CMS_RecipientInfo) *ris;
CMS_RecipientInfo *ri;
int i, r;
ris = CMS_get0_RecipientInfos(cms);
for (i = 0; i < sk_CMS_RecipientInfo_num(ris); i++)
{
ri = sk_CMS_RecipientInfo_value(ris, i);
if (CMS_RecipientInfo_type(ri) != CMS_RECIPINFO_KEK)
continue;
/* If we have an id try matching RecipientInfo
* otherwise try them all.
*/
if (!id || (CMS_RecipientInfo_kekri_id_cmp(ri, id, idlen) == 0))
{
CMS_RecipientInfo_set0_key(ri, key, keylen);
r = CMS_RecipientInfo_decrypt(cms, ri);
CMS_RecipientInfo_set0_key(ri, NULL, 0);
if (r > 0)
return 1;
if (id)
{
CMSerr(CMS_F_CMS_DECRYPT_SET1_KEY,
CMS_R_DECRYPT_ERROR);
return 0;
}
ERR_clear_error();
}
}
CMSerr(CMS_F_CMS_DECRYPT_SET1_KEY, CMS_R_NO_MATCHING_RECIPIENT);
return 0;
} | 377,611 |
0 | BIGNUM *BN_mod_sqrt(BIGNUM *in, const BIGNUM *a, const BIGNUM *p, BN_CTX *ctx)
/*
* Returns 'ret' such that ret^2 == a (mod p), using the Tonelli/Shanks
* algorithm (cf. Henri Cohen, "A Course in Algebraic Computational Number
* Theory", algorithm 1.5.1). 'p' must be prime, otherwise an error or
* an incorrect "result" will be returned.
*/
{
BIGNUM *ret = in;
int err = 1;
int r;
BIGNUM *A, *b, *q, *t, *x, *y;
int e, i, j;
int used_ctx = 0;
if (!BN_is_odd(p) || BN_abs_is_word(p, 1)) {
if (BN_abs_is_word(p, 2)) {
if (ret == NULL)
ret = BN_new();
if (ret == NULL)
goto end;
if (!BN_set_word(ret, BN_is_bit_set(a, 0))) {
if (ret != in)
BN_free(ret);
return NULL;
}
bn_check_top(ret);
return ret;
}
ERR_raise(ERR_LIB_BN, BN_R_P_IS_NOT_PRIME);
return NULL;
}
if (BN_is_zero(a) || BN_is_one(a)) {
if (ret == NULL)
ret = BN_new();
if (ret == NULL)
goto end;
if (!BN_set_word(ret, BN_is_one(a))) {
if (ret != in)
BN_free(ret);
return NULL;
}
bn_check_top(ret);
return ret;
}
BN_CTX_start(ctx);
used_ctx = 1;
A = BN_CTX_get(ctx);
b = BN_CTX_get(ctx);
q = BN_CTX_get(ctx);
t = BN_CTX_get(ctx);
x = BN_CTX_get(ctx);
y = BN_CTX_get(ctx);
if (y == NULL)
goto end;
if (ret == NULL)
ret = BN_new();
if (ret == NULL)
goto end;
/* A = a mod p */
if (!BN_nnmod(A, a, p, ctx))
goto end;
/* now write |p| - 1 as 2^e*q where q is odd */
e = 1;
while (!BN_is_bit_set(p, e))
e++;
/* we'll set q later (if needed) */
if (e == 1) {
/*-
* The easy case: (|p|-1)/2 is odd, so 2 has an inverse
* modulo (|p|-1)/2, and square roots can be computed
* directly by modular exponentiation.
* We have
* 2 * (|p|+1)/4 == 1 (mod (|p|-1)/2),
* so we can use exponent (|p|+1)/4, i.e. (|p|-3)/4 + 1.
*/
if (!BN_rshift(q, p, 2))
goto end;
q->neg = 0;
if (!BN_add_word(q, 1))
goto end;
if (!BN_mod_exp(ret, A, q, p, ctx))
goto end;
err = 0;
goto vrfy;
}
if (e == 2) {
/*-
* |p| == 5 (mod 8)
*
* In this case 2 is always a non-square since
* Legendre(2,p) = (-1)^((p^2-1)/8) for any odd prime.
* So if a really is a square, then 2*a is a non-square.
* Thus for
* b := (2*a)^((|p|-5)/8),
* i := (2*a)*b^2
* we have
* i^2 = (2*a)^((1 + (|p|-5)/4)*2)
* = (2*a)^((p-1)/2)
* = -1;
* so if we set
* x := a*b*(i-1),
* then
* x^2 = a^2 * b^2 * (i^2 - 2*i + 1)
* = a^2 * b^2 * (-2*i)
* = a*(-i)*(2*a*b^2)
* = a*(-i)*i
* = a.
*
* (This is due to A.O.L. Atkin,
* Subject: Square Roots and Cognate Matters modulo p=8n+5.
* URL: https://listserv.nodak.edu/cgi-bin/wa.exe?A2=ind9211&L=NMBRTHRY&P=4026
* November 1992.)
*/
/* t := 2*a */
if (!BN_mod_lshift1_quick(t, A, p))
goto end;
/* b := (2*a)^((|p|-5)/8) */
if (!BN_rshift(q, p, 3))
goto end;
q->neg = 0;
if (!BN_mod_exp(b, t, q, p, ctx))
goto end;
/* y := b^2 */
if (!BN_mod_sqr(y, b, p, ctx))
goto end;
/* t := (2*a)*b^2 - 1 */
if (!BN_mod_mul(t, t, y, p, ctx))
goto end;
if (!BN_sub_word(t, 1))
goto end;
/* x = a*b*t */
if (!BN_mod_mul(x, A, b, p, ctx))
goto end;
if (!BN_mod_mul(x, x, t, p, ctx))
goto end;
if (!BN_copy(ret, x))
goto end;
err = 0;
goto vrfy;
}
/*
* e > 2, so we really have to use the Tonelli/Shanks algorithm. First,
* find some y that is not a square.
*/
if (!BN_copy(q, p))
goto end; /* use 'q' as temp */
q->neg = 0;
i = 2;
do {
/*
* For efficiency, try small numbers first; if this fails, try random
* numbers.
*/
if (i < 22) {
if (!BN_set_word(y, i))
goto end;
} else {
if (!BN_priv_rand_ex(y, BN_num_bits(p), 0, 0, 0, ctx))
goto end;
if (BN_ucmp(y, p) >= 0) {
if (!(p->neg ? BN_add : BN_sub) (y, y, p))
goto end;
}
/* now 0 <= y < |p| */
if (BN_is_zero(y))
if (!BN_set_word(y, i))
goto end;
}
r = BN_kronecker(y, q, ctx); /* here 'q' is |p| */
if (r < -1)
goto end;
if (r == 0) {
/* m divides p */
ERR_raise(ERR_LIB_BN, BN_R_P_IS_NOT_PRIME);
goto end;
}
}
while (r == 1 && ++i < 82);
if (r != -1) {
/*
* Many rounds and still no non-square -- this is more likely a bug
* than just bad luck. Even if p is not prime, we should have found
* some y such that r == -1.
*/
ERR_raise(ERR_LIB_BN, BN_R_TOO_MANY_ITERATIONS);
goto end;
}
/* Here's our actual 'q': */
if (!BN_rshift(q, q, e))
goto end;
/*
* Now that we have some non-square, we can find an element of order 2^e
* by computing its q'th power.
*/
if (!BN_mod_exp(y, y, q, p, ctx))
goto end;
if (BN_is_one(y)) {
ERR_raise(ERR_LIB_BN, BN_R_P_IS_NOT_PRIME);
goto end;
}
/*-
* Now we know that (if p is indeed prime) there is an integer
* k, 0 <= k < 2^e, such that
*
* a^q * y^k == 1 (mod p).
*
* As a^q is a square and y is not, k must be even.
* q+1 is even, too, so there is an element
*
* X := a^((q+1)/2) * y^(k/2),
*
* and it satisfies
*
* X^2 = a^q * a * y^k
* = a,
*
* so it is the square root that we are looking for.
*/
/* t := (q-1)/2 (note that q is odd) */
if (!BN_rshift1(t, q))
goto end;
/* x := a^((q-1)/2) */
if (BN_is_zero(t)) { /* special case: p = 2^e + 1 */
if (!BN_nnmod(t, A, p, ctx))
goto end;
if (BN_is_zero(t)) {
/* special case: a == 0 (mod p) */
BN_zero(ret);
err = 0;
goto end;
} else if (!BN_one(x))
goto end;
} else {
if (!BN_mod_exp(x, A, t, p, ctx))
goto end;
if (BN_is_zero(x)) {
/* special case: a == 0 (mod p) */
BN_zero(ret);
err = 0;
goto end;
}
}
/* b := a*x^2 (= a^q) */
if (!BN_mod_sqr(b, x, p, ctx))
goto end;
if (!BN_mod_mul(b, b, A, p, ctx))
goto end;
/* x := a*x (= a^((q+1)/2)) */
if (!BN_mod_mul(x, x, A, p, ctx))
goto end;
while (1) {
/*-
* Now b is a^q * y^k for some even k (0 <= k < 2^E
* where E refers to the original value of e, which we
* don't keep in a variable), and x is a^((q+1)/2) * y^(k/2).
*
* We have a*b = x^2,
* y^2^(e-1) = -1,
* b^2^(e-1) = 1.
*/
if (BN_is_one(b)) {
if (!BN_copy(ret, x))
goto end;
err = 0;
goto vrfy;
}
/* Find the smallest i, 0 < i < e, such that b^(2^i) = 1. */
for (i = 1; i < e; i++) {
if (i == 1) {
if (!BN_mod_sqr(t, b, p, ctx))
goto end;
} else {
if (!BN_mod_mul(t, t, t, p, ctx))
goto end;
}
if (BN_is_one(t))
break;
}
/* If not found, a is not a square or p is not prime. */
if (i >= e) {
ERR_raise(ERR_LIB_BN, BN_R_NOT_A_SQUARE);
goto end;
}
/* t := y^2^(e - i - 1) */
if (!BN_copy(t, y))
goto end;
for (j = e - i - 1; j > 0; j--) {
if (!BN_mod_sqr(t, t, p, ctx))
goto end;
}
if (!BN_mod_mul(y, t, t, p, ctx))
goto end;
if (!BN_mod_mul(x, x, t, p, ctx))
goto end;
if (!BN_mod_mul(b, b, y, p, ctx))
goto end;
e = i;
}
vrfy:
if (!err) {
/*
* verify the result -- the input might have been not a square (test
* added in 0.9.8)
*/
if (!BN_mod_sqr(x, ret, p, ctx))
err = 1;
if (!err && 0 != BN_cmp(x, A)) {
ERR_raise(ERR_LIB_BN, BN_R_NOT_A_SQUARE);
err = 1;
}
}
end:
if (err) {
if (ret != in)
BN_clear_free(ret);
ret = NULL;
}
if (used_ctx)
BN_CTX_end(ctx);
bn_check_top(ret);
return ret;
} | 377,612 |
0 | void loongarch_cpu_dump_state(CPUState *cs, FILE *f, int flags)
{
LoongArchCPU *cpu = LOONGARCH_CPU(cs);
CPULoongArchState *env = &cpu->env;
int i;
qemu_fprintf(f, " PC=%016" PRIx64 " ", env->pc);
qemu_fprintf(f, " FCSR0 0x%08x fp_status 0x%02x\n", env->fcsr0,
get_float_exception_flags(&env->fp_status));
/* gpr */
for (i = 0; i < 32; i++) {
if ((i & 3) == 0) {
qemu_fprintf(f, " GPR%02d:", i);
}
qemu_fprintf(f, " %s %016" PRIx64, regnames[i], env->gpr[i]);
if ((i & 3) == 3) {
qemu_fprintf(f, "\n");
}
}
qemu_fprintf(f, "CRMD=%016" PRIx64 "\n", env->CSR_CRMD);
qemu_fprintf(f, "PRMD=%016" PRIx64 "\n", env->CSR_PRMD);
qemu_fprintf(f, "EUEN=%016" PRIx64 "\n", env->CSR_EUEN);
qemu_fprintf(f, "ESTAT=%016" PRIx64 "\n", env->CSR_ESTAT);
qemu_fprintf(f, "ERA=%016" PRIx64 "\n", env->CSR_ERA);
qemu_fprintf(f, "BADV=%016" PRIx64 "\n", env->CSR_BADV);
qemu_fprintf(f, "BADI=%016" PRIx64 "\n", env->CSR_BADI);
qemu_fprintf(f, "EENTRY=%016" PRIx64 "\n", env->CSR_EENTRY);
qemu_fprintf(f, "PRCFG1=%016" PRIx64 ", PRCFG2=%016" PRIx64 ","
" PRCFG3=%016" PRIx64 "\n",
env->CSR_PRCFG1, env->CSR_PRCFG3, env->CSR_PRCFG3);
qemu_fprintf(f, "TLBRENTRY=%016" PRIx64 "\n", env->CSR_TLBRENTRY);
qemu_fprintf(f, "TLBRBADV=%016" PRIx64 "\n", env->CSR_TLBRBADV);
qemu_fprintf(f, "TLBRERA=%016" PRIx64 "\n", env->CSR_TLBRERA);
/* fpr */
if (flags & CPU_DUMP_FPU) {
for (i = 0; i < 32; i++) {
qemu_fprintf(f, " %s %016" PRIx64, fregnames[i], env->fpr[i]);
if ((i & 3) == 3) {
qemu_fprintf(f, "\n");
}
}
}
} | 377,613 |
0 | static void loongarch_cpu_do_interrupt(CPUState *cs)
{
LoongArchCPU *cpu = LOONGARCH_CPU(cs);
CPULoongArchState *env = &cpu->env;
bool update_badinstr = 1;
int cause = -1;
const char *name;
bool tlbfill = FIELD_EX64(env->CSR_TLBRERA, CSR_TLBRERA, ISTLBR);
uint32_t vec_size = FIELD_EX64(env->CSR_ECFG, CSR_ECFG, VS);
if (cs->exception_index != EXCCODE_INT) {
if (cs->exception_index < 0 ||
cs->exception_index > ARRAY_SIZE(excp_names)) {
name = "unknown";
} else {
name = excp_names[cs->exception_index];
}
qemu_log_mask(CPU_LOG_INT,
"%s enter: pc " TARGET_FMT_lx " ERA " TARGET_FMT_lx
" TLBRERA " TARGET_FMT_lx " %s exception\n", __func__,
env->pc, env->CSR_ERA, env->CSR_TLBRERA, name);
}
switch (cs->exception_index) {
case EXCCODE_DBP:
env->CSR_DBG = FIELD_DP64(env->CSR_DBG, CSR_DBG, DCL, 1);
env->CSR_DBG = FIELD_DP64(env->CSR_DBG, CSR_DBG, ECODE, 0xC);
goto set_DERA;
set_DERA:
env->CSR_DERA = env->pc;
env->CSR_DBG = FIELD_DP64(env->CSR_DBG, CSR_DBG, DST, 1);
env->pc = env->CSR_EENTRY + 0x480;
break;
case EXCCODE_INT:
if (FIELD_EX64(env->CSR_DBG, CSR_DBG, DST)) {
env->CSR_DBG = FIELD_DP64(env->CSR_DBG, CSR_DBG, DEI, 1);
goto set_DERA;
}
QEMU_FALLTHROUGH;
case EXCCODE_PIF:
cause = cs->exception_index;
update_badinstr = 0;
break;
case EXCCODE_SYS:
case EXCCODE_BRK:
case EXCCODE_INE:
case EXCCODE_IPE:
case EXCCODE_FPE:
case EXCCODE_BCE:
env->CSR_BADV = env->pc;
QEMU_FALLTHROUGH;
case EXCCODE_ADEM:
case EXCCODE_PIL:
case EXCCODE_PIS:
case EXCCODE_PME:
case EXCCODE_PNR:
case EXCCODE_PNX:
case EXCCODE_PPI:
cause = cs->exception_index;
break;
default:
qemu_log("Error: exception(%d) '%s' has not been supported\n",
cs->exception_index, excp_names[cs->exception_index]);
abort();
}
if (update_badinstr) {
env->CSR_BADI = cpu_ldl_code(env, env->pc);
}
/* Save PLV and IE */
if (tlbfill) {
env->CSR_TLBRPRMD = FIELD_DP64(env->CSR_TLBRPRMD, CSR_TLBRPRMD, PPLV,
FIELD_EX64(env->CSR_CRMD,
CSR_CRMD, PLV));
env->CSR_TLBRPRMD = FIELD_DP64(env->CSR_TLBRPRMD, CSR_TLBRPRMD, PIE,
FIELD_EX64(env->CSR_CRMD, CSR_CRMD, IE));
/* set the DA mode */
env->CSR_CRMD = FIELD_DP64(env->CSR_CRMD, CSR_CRMD, DA, 1);
env->CSR_CRMD = FIELD_DP64(env->CSR_CRMD, CSR_CRMD, PG, 0);
env->CSR_TLBRERA = FIELD_DP64(env->CSR_TLBRERA, CSR_TLBRERA,
PC, (env->pc >> 2));
} else {
env->CSR_ESTAT = FIELD_DP64(env->CSR_ESTAT, CSR_ESTAT, ECODE, cause);
env->CSR_PRMD = FIELD_DP64(env->CSR_PRMD, CSR_PRMD, PPLV,
FIELD_EX64(env->CSR_CRMD, CSR_CRMD, PLV));
env->CSR_PRMD = FIELD_DP64(env->CSR_PRMD, CSR_PRMD, PIE,
FIELD_EX64(env->CSR_CRMD, CSR_CRMD, IE));
env->CSR_ERA = env->pc;
}
env->CSR_CRMD = FIELD_DP64(env->CSR_CRMD, CSR_CRMD, PLV, 0);
env->CSR_CRMD = FIELD_DP64(env->CSR_CRMD, CSR_CRMD, IE, 0);
if (vec_size) {
vec_size = (1 << vec_size) * 4;
}
if (cs->exception_index == EXCCODE_INT) {
/* Interrupt */
uint32_t vector = 0;
uint32_t pending = FIELD_EX64(env->CSR_ESTAT, CSR_ESTAT, IS);
pending &= FIELD_EX64(env->CSR_ECFG, CSR_ECFG, LIE);
/* Find the highest-priority interrupt. */
vector = 31 - clz32(pending);
env->pc = env->CSR_EENTRY + (EXCCODE_EXTERNAL_INT + vector) * vec_size;
qemu_log_mask(CPU_LOG_INT,
"%s: PC " TARGET_FMT_lx " ERA " TARGET_FMT_lx
" cause %d\n" " A " TARGET_FMT_lx " D "
TARGET_FMT_lx " vector = %d ExC " TARGET_FMT_lx "ExS"
TARGET_FMT_lx "\n",
__func__, env->pc, env->CSR_ERA,
cause, env->CSR_BADV, env->CSR_DERA, vector,
env->CSR_ECFG, env->CSR_ESTAT);
} else {
if (tlbfill) {
env->pc = env->CSR_TLBRENTRY;
} else {
env->pc = env->CSR_EENTRY;
env->pc += cause * vec_size;
}
qemu_log_mask(CPU_LOG_INT,
"%s: PC " TARGET_FMT_lx " ERA " TARGET_FMT_lx
" cause %d%s\n, ESTAT " TARGET_FMT_lx
" EXCFG " TARGET_FMT_lx " BADVA " TARGET_FMT_lx
"BADI " TARGET_FMT_lx " SYS_NUM " TARGET_FMT_lu
" cpu %d asid " TARGET_FMT_lx "\n", __func__, env->pc,
tlbfill ? env->CSR_TLBRERA : env->CSR_ERA,
cause, tlbfill ? "(refill)" : "", env->CSR_ESTAT,
env->CSR_ECFG,
tlbfill ? env->CSR_TLBRBADV : env->CSR_BADV,
env->CSR_BADI, env->gpr[11], cs->cpu_index,
env->CSR_ASID);
}
cs->exception_index = -1;
} | 377,614 |
0 | static void loongarch_cpu_class_init(ObjectClass *c, void *data)
{
LoongArchCPUClass *lacc = LOONGARCH_CPU_CLASS(c);
CPUClass *cc = CPU_CLASS(c);
DeviceClass *dc = DEVICE_CLASS(c);
device_class_set_parent_realize(dc, loongarch_cpu_realizefn,
&lacc->parent_realize);
device_class_set_parent_reset(dc, loongarch_cpu_reset, &lacc->parent_reset);
cc->class_by_name = loongarch_cpu_class_by_name;
cc->has_work = loongarch_cpu_has_work;
cc->dump_state = loongarch_cpu_dump_state;
cc->set_pc = loongarch_cpu_set_pc;
#ifndef CONFIG_USER_ONLY
dc->vmsd = &vmstate_loongarch_cpu;
cc->sysemu_ops = &loongarch_sysemu_ops;
#endif
cc->disas_set_info = loongarch_cpu_disas_set_info;
cc->gdb_read_register = loongarch_cpu_gdb_read_register;
cc->gdb_write_register = loongarch_cpu_gdb_write_register;
cc->disas_set_info = loongarch_cpu_disas_set_info;
cc->gdb_num_core_regs = 34;
cc->gdb_core_xml_file = "loongarch-base64.xml";
cc->gdb_stop_before_watchpoint = true;
#ifdef CONFIG_TCG
cc->tcg_ops = &loongarch_tcg_ops;
#endif
} | 377,616 |
0 | void G_NORETURN do_raise_exception(CPULoongArchState *env,
uint32_t exception,
uintptr_t pc)
{
CPUState *cs = env_cpu(env);
qemu_log_mask(CPU_LOG_INT, "%s: %d (%s)\n",
__func__,
exception,
loongarch_exception_name(exception));
cs->exception_index = exception;
cpu_loop_exit_restore(cs, pc);
} | 377,617 |
0 | static void loongarch_cpu_list_entry(gpointer data, gpointer user_data)
{
const char *typename = object_class_get_name(OBJECT_CLASS(data));
qemu_printf("%s\n", typename);
} | 377,618 |
0 | const char *loongarch_exception_name(int32_t exception)
{
assert(excp_names[exception]);
return excp_names[exception];
} | 377,619 |
0 | static void loongarch_cpu_disas_set_info(CPUState *s, disassemble_info *info)
{
info->print_insn = print_insn_loongarch;
} | 377,620 |
0 | void loongarch_cpu_set_irq(void *opaque, int irq, int level)
{
LoongArchCPU *cpu = opaque;
CPULoongArchState *env = &cpu->env;
CPUState *cs = CPU(cpu);
if (irq < 0 || irq >= N_IRQS) {
return;
}
env->CSR_ESTAT = deposit64(env->CSR_ESTAT, irq, 1, level != 0);
if (FIELD_EX64(env->CSR_ESTAT, CSR_ESTAT, IS)) {
cpu_interrupt(cs, CPU_INTERRUPT_HARD);
} else {
cpu_reset_interrupt(cs, CPU_INTERRUPT_HARD);
}
} | 377,621 |
0 | static void loongarch_cpu_reset(DeviceState *dev)
{
CPUState *cs = CPU(dev);
LoongArchCPU *cpu = LOONGARCH_CPU(cs);
LoongArchCPUClass *lacc = LOONGARCH_CPU_GET_CLASS(cpu);
CPULoongArchState *env = &cpu->env;
lacc->parent_reset(dev);
env->fcsr0_mask = FCSR0_M1 | FCSR0_M2 | FCSR0_M3;
env->fcsr0 = 0x0;
int n;
/* Set csr registers value after reset */
env->CSR_CRMD = FIELD_DP64(env->CSR_CRMD, CSR_CRMD, PLV, 0);
env->CSR_CRMD = FIELD_DP64(env->CSR_CRMD, CSR_CRMD, IE, 0);
env->CSR_CRMD = FIELD_DP64(env->CSR_CRMD, CSR_CRMD, DA, 1);
env->CSR_CRMD = FIELD_DP64(env->CSR_CRMD, CSR_CRMD, PG, 0);
env->CSR_CRMD = FIELD_DP64(env->CSR_CRMD, CSR_CRMD, DATF, 1);
env->CSR_CRMD = FIELD_DP64(env->CSR_CRMD, CSR_CRMD, DATM, 1);
env->CSR_EUEN = FIELD_DP64(env->CSR_EUEN, CSR_EUEN, FPE, 0);
env->CSR_EUEN = FIELD_DP64(env->CSR_EUEN, CSR_EUEN, SXE, 0);
env->CSR_EUEN = FIELD_DP64(env->CSR_EUEN, CSR_EUEN, ASXE, 0);
env->CSR_EUEN = FIELD_DP64(env->CSR_EUEN, CSR_EUEN, BTE, 0);
env->CSR_MISC = 0;
env->CSR_ECFG = FIELD_DP64(env->CSR_ECFG, CSR_ECFG, VS, 0);
env->CSR_ECFG = FIELD_DP64(env->CSR_ECFG, CSR_ECFG, LIE, 0);
env->CSR_ESTAT = env->CSR_ESTAT & (~MAKE_64BIT_MASK(0, 2));
env->CSR_RVACFG = FIELD_DP64(env->CSR_RVACFG, CSR_RVACFG, RBITS, 0);
env->CSR_TCFG = FIELD_DP64(env->CSR_TCFG, CSR_TCFG, EN, 0);
env->CSR_LLBCTL = FIELD_DP64(env->CSR_LLBCTL, CSR_LLBCTL, KLO, 0);
env->CSR_TLBRERA = FIELD_DP64(env->CSR_TLBRERA, CSR_TLBRERA, ISTLBR, 0);
env->CSR_MERRCTL = FIELD_DP64(env->CSR_MERRCTL, CSR_MERRCTL, ISMERR, 0);
env->CSR_PRCFG3 = FIELD_DP64(env->CSR_PRCFG3, CSR_PRCFG3, TLB_TYPE, 2);
env->CSR_PRCFG3 = FIELD_DP64(env->CSR_PRCFG3, CSR_PRCFG3, MTLB_ENTRY, 63);
env->CSR_PRCFG3 = FIELD_DP64(env->CSR_PRCFG3, CSR_PRCFG3, STLB_WAYS, 7);
env->CSR_PRCFG3 = FIELD_DP64(env->CSR_PRCFG3, CSR_PRCFG3, STLB_SETS, 8);
for (n = 0; n < 4; n++) {
env->CSR_DMW[n] = FIELD_DP64(env->CSR_DMW[n], CSR_DMW, PLV0, 0);
env->CSR_DMW[n] = FIELD_DP64(env->CSR_DMW[n], CSR_DMW, PLV1, 0);
env->CSR_DMW[n] = FIELD_DP64(env->CSR_DMW[n], CSR_DMW, PLV2, 0);
env->CSR_DMW[n] = FIELD_DP64(env->CSR_DMW[n], CSR_DMW, PLV3, 0);
}
#ifndef CONFIG_USER_ONLY
env->pc = 0x1c000000;
memset(env->tlb, 0, sizeof(env->tlb));
#endif
restore_fp_status(env);
cs->exception_index = -1;
} | 377,622 |
0 | static void loongarch_cpu_set_pc(CPUState *cs, vaddr value)
{
LoongArchCPU *cpu = LOONGARCH_CPU(cs);
CPULoongArchState *env = &cpu->env;
env->pc = value;
} | 377,623 |
0 | static void loongarch_cpu_do_transaction_failed(CPUState *cs, hwaddr physaddr,
vaddr addr, unsigned size,
MMUAccessType access_type,
int mmu_idx, MemTxAttrs attrs,
MemTxResult response,
uintptr_t retaddr)
{
LoongArchCPU *cpu = LOONGARCH_CPU(cs);
CPULoongArchState *env = &cpu->env;
if (access_type == MMU_INST_FETCH) {
do_raise_exception(env, EXCCODE_ADEF, retaddr);
} else {
do_raise_exception(env, EXCCODE_ADEM, retaddr);
}
} | 377,624 |
0 | static inline bool cpu_loongarch_hw_interrupts_enabled(CPULoongArchState *env)
{
bool ret = 0;
ret = (FIELD_EX64(env->CSR_CRMD, CSR_CRMD, IE) &&
!(FIELD_EX64(env->CSR_DBG, CSR_DBG, DST)));
return ret;
} | 377,625 |