add heim_ipc_async.defs
[heimdal.git] / lib / hdb / db3.c
blob8cb6866787a69c4f0abf89bcd6965bd9bdbbd156
1 /*
2 * Copyright (c) 1997 - 2006 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
4 * All rights reserved.
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
17 * 3. Neither the name of the Institute nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
34 #include "hdb_locl.h"
36 #if HAVE_DB3
38 #ifdef HAVE_DBHEADER
39 #include <db.h>
40 #elif HAVE_DB5_DB_H
41 #include <db5/db.h>
42 #elif HAVE_DB4_DB_H
43 #include <db4/db.h>
44 #elif HAVE_DB3_DB_H
45 #include <db3/db.h>
46 #else
47 #include <db.h>
48 #endif
50 static krb5_error_code
51 DB_close(krb5_context context, HDB *db)
53 DB *d = (DB*)db->hdb_db;
54 DBC *dbcp = (DBC*)db->hdb_dbc;
56 (*dbcp->c_close)(dbcp);
57 db->hdb_dbc = 0;
58 (*d->close)(d, 0);
59 return 0;
62 static krb5_error_code
63 DB_destroy(krb5_context context, HDB *db)
65 krb5_error_code ret;
67 ret = hdb_clear_master_key (context, db);
68 free(db->hdb_name);
69 free(db);
70 return ret;
73 static krb5_error_code
74 DB_lock(krb5_context context, HDB *db, int operation)
76 DB *d = (DB*)db->hdb_db;
77 int fd;
78 if ((*d->fd)(d, &fd))
79 return HDB_ERR_CANT_LOCK_DB;
80 return hdb_lock(fd, operation);
83 static krb5_error_code
84 DB_unlock(krb5_context context, HDB *db)
86 DB *d = (DB*)db->hdb_db;
87 int fd;
88 if ((*d->fd)(d, &fd))
89 return HDB_ERR_CANT_LOCK_DB;
90 return hdb_unlock(fd);
94 static krb5_error_code
95 DB_seq(krb5_context context, HDB *db,
96 unsigned flags, hdb_entry_ex *entry, int flag)
98 DBT key, value;
99 DBC *dbcp = db->hdb_dbc;
100 krb5_data key_data, data;
101 int code;
103 memset(&key, 0, sizeof(DBT));
104 memset(&value, 0, sizeof(DBT));
105 if ((*db->hdb_lock)(context, db, HDB_RLOCK))
106 return HDB_ERR_DB_INUSE;
107 code = (*dbcp->c_get)(dbcp, &key, &value, flag);
108 (*db->hdb_unlock)(context, db); /* XXX check value */
109 if (code == DB_NOTFOUND)
110 return HDB_ERR_NOENTRY;
111 if (code)
112 return code;
114 key_data.data = key.data;
115 key_data.length = key.size;
116 data.data = value.data;
117 data.length = value.size;
118 memset(entry, 0, sizeof(*entry));
119 if (hdb_value2entry(context, &data, &entry->entry))
120 return DB_seq(context, db, flags, entry, DB_NEXT);
121 if (db->hdb_master_key_set && (flags & HDB_F_DECRYPT)) {
122 code = hdb_unseal_keys (context, db, &entry->entry);
123 if (code)
124 hdb_free_entry (context, entry);
126 if (entry->entry.principal == NULL) {
127 entry->entry.principal = malloc(sizeof(*entry->entry.principal));
128 if (entry->entry.principal == NULL) {
129 hdb_free_entry (context, entry);
130 krb5_set_error_message(context, ENOMEM, "malloc: out of memory");
131 return ENOMEM;
132 } else {
133 hdb_key2principal(context, &key_data, entry->entry.principal);
136 return 0;
140 static krb5_error_code
141 DB_firstkey(krb5_context context, HDB *db, unsigned flags, hdb_entry_ex *entry)
143 return DB_seq(context, db, flags, entry, DB_FIRST);
147 static krb5_error_code
148 DB_nextkey(krb5_context context, HDB *db, unsigned flags, hdb_entry_ex *entry)
150 return DB_seq(context, db, flags, entry, DB_NEXT);
153 static krb5_error_code
154 DB_rename(krb5_context context, HDB *db, const char *new_name)
156 int ret;
157 char *old, *new;
159 asprintf(&old, "%s.db", db->hdb_name);
160 asprintf(&new, "%s.db", new_name);
161 ret = rename(old, new);
162 free(old);
163 free(new);
164 if(ret)
165 return errno;
167 free(db->hdb_name);
168 db->hdb_name = strdup(new_name);
169 return 0;
172 static krb5_error_code
173 DB__get(krb5_context context, HDB *db, krb5_data key, krb5_data *reply)
175 DB *d = (DB*)db->hdb_db;
176 DBT k, v;
177 int code;
179 memset(&k, 0, sizeof(DBT));
180 memset(&v, 0, sizeof(DBT));
181 k.data = key.data;
182 k.size = key.length;
183 k.flags = 0;
184 if ((code = (*db->hdb_lock)(context, db, HDB_RLOCK)))
185 return code;
186 code = (*d->get)(d, NULL, &k, &v, 0);
187 (*db->hdb_unlock)(context, db);
188 if(code == DB_NOTFOUND)
189 return HDB_ERR_NOENTRY;
190 if(code)
191 return code;
193 krb5_data_copy(reply, v.data, v.size);
194 return 0;
197 static krb5_error_code
198 DB__put(krb5_context context, HDB *db, int replace,
199 krb5_data key, krb5_data value)
201 DB *d = (DB*)db->hdb_db;
202 DBT k, v;
203 int code;
205 memset(&k, 0, sizeof(DBT));
206 memset(&v, 0, sizeof(DBT));
207 k.data = key.data;
208 k.size = key.length;
209 k.flags = 0;
210 v.data = value.data;
211 v.size = value.length;
212 v.flags = 0;
213 if ((code = (*db->hdb_lock)(context, db, HDB_WLOCK)))
214 return code;
215 code = (*d->put)(d, NULL, &k, &v, replace ? 0 : DB_NOOVERWRITE);
216 (*db->hdb_unlock)(context, db);
217 if(code == DB_KEYEXIST)
218 return HDB_ERR_EXISTS;
219 if(code)
220 return errno;
221 return 0;
224 static krb5_error_code
225 DB__del(krb5_context context, HDB *db, krb5_data key)
227 DB *d = (DB*)db->hdb_db;
228 DBT k;
229 krb5_error_code code;
230 memset(&k, 0, sizeof(DBT));
231 k.data = key.data;
232 k.size = key.length;
233 k.flags = 0;
234 code = (*db->hdb_lock)(context, db, HDB_WLOCK);
235 if(code)
236 return code;
237 code = (*d->del)(d, NULL, &k, 0);
238 (*db->hdb_unlock)(context, db);
239 if(code == DB_NOTFOUND)
240 return HDB_ERR_NOENTRY;
241 if(code)
242 return code;
243 return 0;
246 static krb5_error_code
247 DB_open(krb5_context context, HDB *db, int flags, mode_t mode)
249 DBC *dbc = NULL;
250 char *fn;
251 krb5_error_code ret;
252 DB *d;
253 int myflags = 0;
255 if (flags & O_CREAT)
256 myflags |= DB_CREATE;
258 if (flags & O_EXCL)
259 myflags |= DB_EXCL;
261 if((flags & O_ACCMODE) == O_RDONLY)
262 myflags |= DB_RDONLY;
264 if (flags & O_TRUNC)
265 myflags |= DB_TRUNCATE;
267 asprintf(&fn, "%s.db", db->hdb_name);
268 if (fn == NULL) {
269 krb5_set_error_message(context, ENOMEM, "malloc: out of memory");
270 return ENOMEM;
272 db_create(&d, NULL, 0);
273 db->hdb_db = d;
275 #if (DB_VERSION_MAJOR >= 4) && (DB_VERSION_MINOR >= 1)
276 ret = (*d->open)(db->hdb_db, NULL, fn, NULL, DB_BTREE, myflags, mode);
277 #else
278 ret = (*d->open)(db->hdb_db, fn, NULL, DB_BTREE, myflags, mode);
279 #endif
281 if (ret == ENOENT) {
282 /* try to open without .db extension */
283 #if (DB_VERSION_MAJOR >= 4) && (DB_VERSION_MINOR >= 1)
284 ret = (*d->open)(db->hdb_db, NULL, db->hdb_name, NULL, DB_BTREE,
285 myflags, mode);
286 #else
287 ret = (*d->open)(db->hdb_db, db->hdb_name, NULL, DB_BTREE,
288 myflags, mode);
289 #endif
292 if (ret) {
293 free(fn);
294 krb5_set_error_message(context, ret, "opening %s: %s",
295 db->hdb_name, strerror(ret));
296 return ret;
298 free(fn);
300 ret = (*d->cursor)(d, NULL, &dbc, 0);
301 if (ret) {
302 krb5_set_error_message(context, ret, "d->cursor: %s", strerror(ret));
303 return ret;
305 db->hdb_dbc = dbc;
307 if((flags & O_ACCMODE) == O_RDONLY)
308 ret = hdb_check_db_format(context, db);
309 else
310 ret = hdb_init_db(context, db);
311 if(ret == HDB_ERR_NOENTRY)
312 return 0;
313 if (ret) {
314 DB_close(context, db);
315 krb5_set_error_message(context, ret, "hdb_open: failed %s database %s",
316 (flags & O_ACCMODE) == O_RDONLY ?
317 "checking format of" : "initialize",
318 db->hdb_name);
321 return ret;
324 krb5_error_code
325 hdb_db_create(krb5_context context, HDB **db,
326 const char *filename)
328 *db = calloc(1, sizeof(**db));
329 if (*db == NULL) {
330 krb5_set_error_message(context, ENOMEM, "malloc: out of memory");
331 return ENOMEM;
334 (*db)->hdb_db = NULL;
335 (*db)->hdb_name = strdup(filename);
336 if ((*db)->hdb_name == NULL) {
337 free(*db);
338 *db = NULL;
339 krb5_set_error_message(context, ENOMEM, "malloc: out of memory");
340 return ENOMEM;
342 (*db)->hdb_master_key_set = 0;
343 (*db)->hdb_openp = 0;
344 (*db)->hdb_capability_flags = HDB_CAP_F_HANDLE_ENTERPRISE_PRINCIPAL;
345 (*db)->hdb_open = DB_open;
346 (*db)->hdb_close = DB_close;
347 (*db)->hdb_fetch = _hdb_fetch;
348 (*db)->hdb_store = _hdb_store;
349 (*db)->hdb_remove = _hdb_remove;
350 (*db)->hdb_firstkey = DB_firstkey;
351 (*db)->hdb_nextkey= DB_nextkey;
352 (*db)->hdb_lock = DB_lock;
353 (*db)->hdb_unlock = DB_unlock;
354 (*db)->hdb_rename = DB_rename;
355 (*db)->hdb__get = DB__get;
356 (*db)->hdb__put = DB__put;
357 (*db)->hdb__del = DB__del;
358 (*db)->hdb_destroy = DB_destroy;
359 return 0;
361 #endif /* HAVE_DB3 */