diff options
author | Stefan Metzmacher <metze@samba.org> | 2010-03-17 15:07:07 +0100 |
---|---|---|
committer | Stefan Metzmacher <metze@samba.org> | 2010-03-22 17:15:10 +0100 |
commit | 048c919dc0b7bc038becad34c2861c43c72c43c9 (patch) | |
tree | b19ec8ba65c02bcf8f7d1ad4b8d88348a65ff873 /source3/libsmb | |
parent | 01f2c023f7d2a4b0e016676638a062a5ba29ec0b (diff) | |
download | samba-048c919dc0b7bc038becad34c2861c43c72c43c9.tar.gz samba-048c919dc0b7bc038becad34c2861c43c72c43c9.tar.bz2 samba-048c919dc0b7bc038becad34c2861c43c72c43c9.zip |
s3:libsmb: add a smb_signing_init_ex() function
Make it possible to overload memory handling functions.
metze
Diffstat (limited to 'source3/libsmb')
-rw-r--r-- | source3/libsmb/smb_signing.c | 59 |
1 files changed, 51 insertions, 8 deletions
diff --git a/source3/libsmb/smb_signing.c b/source3/libsmb/smb_signing.c index 32d2883965..104cf76160 100644 --- a/source3/libsmb/smb_signing.c +++ b/source3/libsmb/smb_signing.c @@ -43,25 +43,50 @@ struct smb_signing_state { /* the next expected seqnum */ uint32_t seqnum; + + TALLOC_CTX *mem_ctx; + void *(*alloc_fn)(TALLOC_CTX *mem_ctx, size_t len); + void (*free_fn)(TALLOC_CTX *mem_ctx, void *ptr); }; static void smb_signing_reset_info(struct smb_signing_state *si) { si->active = false; si->bsrspyl = false; - data_blob_free(&si->mac_key); si->seqnum = 0; + + if (si->free_fn) { + si->free_fn(si->mem_ctx, si->mac_key.data); + } else { + talloc_free(si->mac_key.data); + } + si->mac_key.data = NULL; + si->mac_key.length = 0; } -struct smb_signing_state *smb_signing_init(TALLOC_CTX *mem_ctx, - bool allowed, - bool mandatory) +struct smb_signing_state *smb_signing_init_ex(TALLOC_CTX *mem_ctx, + bool allowed, + bool mandatory, + void *(*alloc_fn)(TALLOC_CTX *, size_t), + void (*free_fn)(TALLOC_CTX *, void *)) { struct smb_signing_state *si; - si = talloc_zero(mem_ctx, struct smb_signing_state); - if (si == NULL) { - return NULL; + if (alloc_fn) { + void *p = alloc_fn(mem_ctx, sizeof(struct smb_signing_state)); + if (p == NULL) { + return NULL; + } + memset(p, 0, sizeof(struct smb_signing_state)); + si = (struct smb_signing_state *)p; + si->mem_ctx = mem_ctx; + si->alloc_fn = alloc_fn; + si->free_fn = free_fn; + } else { + si = talloc_zero(mem_ctx, struct smb_signing_state); + if (si == NULL) { + return NULL; + } } if (mandatory) { @@ -74,6 +99,13 @@ struct smb_signing_state *smb_signing_init(TALLOC_CTX *mem_ctx, return si; } +struct smb_signing_state *smb_signing_init(TALLOC_CTX *mem_ctx, + bool allowed, + bool mandatory) +{ + return smb_signing_init_ex(mem_ctx, allowed, mandatory, NULL, NULL); +} + static bool smb_signing_good(struct smb_signing_state *si, bool good, uint32_t seq) { @@ -312,7 +344,18 @@ bool smb_signing_activate(struct smb_signing_state *si, smb_signing_reset_info(si); len = response.length + user_session_key.length; - si->mac_key = data_blob_talloc(si, NULL, len); + if (si->alloc_fn) { + si->mac_key.data = (uint8_t *)si->alloc_fn(si->mem_ctx, len); + if (si->mac_key.data == NULL) { + return false; + } + } else { + si->mac_key.data = (uint8_t *)talloc_size(si, len); + if (si->mac_key.data == NULL) { + return false; + } + } + si->mac_key.length = len; ofs = 0; memcpy(&si->mac_key.data[ofs], user_session_key.data, user_session_key.length); |