isc_result_t omapi_auth_key_enter (omapi_auth_key_t *a) { omapi_auth_key_t *tk; if (a -> type != omapi_type_auth_key) return ISC_R_INVALIDARG; tk = (omapi_auth_key_t *)0; if (auth_key_hash) { omapi_auth_key_hash_lookup (&tk, auth_key_hash, a -> name, 0, MDL); if (tk == a) { omapi_auth_key_dereference (&tk, MDL); return ISC_R_SUCCESS; } if (tk) { omapi_auth_key_hash_delete (auth_key_hash, tk -> name, 0, MDL); omapi_auth_key_dereference (&tk, MDL); } } else { if (!omapi_auth_key_new_hash(&auth_key_hash, KEY_HASH_SIZE, MDL)) return ISC_R_NOMEMORY; } omapi_auth_key_hash_add (auth_key_hash, a -> name, 0, a, MDL); return ISC_R_SUCCESS; }
isc_result_t omapi_auth_key_lookup (omapi_object_t **h, omapi_object_t *id, omapi_object_t *ref) { isc_result_t status; omapi_value_t *name = (omapi_value_t *)0; omapi_value_t *algorithm = (omapi_value_t *)0; if (!auth_key_hash) return ISC_R_NOTFOUND; if (!ref) return ISC_R_NOKEYS; status = omapi_get_value_str (ref, id, "name", &name); if (status != ISC_R_SUCCESS) return status; if ((name -> value -> type != omapi_datatype_string) && (name -> value -> type != omapi_datatype_data)) { omapi_value_dereference (&name, MDL); return ISC_R_NOTFOUND; } status = omapi_get_value_str (ref, id, "algorithm", &algorithm); if (status != ISC_R_SUCCESS) { omapi_value_dereference (&name, MDL); return status; } if ((algorithm -> value -> type != omapi_datatype_string) && (algorithm -> value -> type != omapi_datatype_data)) { omapi_value_dereference (&name, MDL); omapi_value_dereference (&algorithm, MDL); return ISC_R_NOTFOUND; } if (!omapi_auth_key_hash_lookup ((omapi_auth_key_t **)h, auth_key_hash, (const char *) name -> value -> u.buffer.value, name -> value -> u.buffer.len, MDL)) { omapi_value_dereference (&name, MDL); omapi_value_dereference (&algorithm, MDL); return ISC_R_NOTFOUND; } if (omapi_td_strcasecmp (algorithm -> value, ((omapi_auth_key_t *)*h) -> algorithm) != 0) { omapi_value_dereference (&name, MDL); omapi_value_dereference (&algorithm, MDL); omapi_object_dereference (h, MDL); return ISC_R_NOTFOUND; } omapi_value_dereference (&name, MDL); omapi_value_dereference (&algorithm, MDL); return ISC_R_SUCCESS; }
isc_result_t omapi_auth_key_lookup_name (omapi_auth_key_t **a, const char *name) { if (!auth_key_hash) return ISC_R_NOTFOUND; if (!omapi_auth_key_hash_lookup (a, auth_key_hash, name, 0, MDL)) return ISC_R_NOTFOUND; return ISC_R_SUCCESS; }
isc_result_t omapi_auth_key_enter (omapi_auth_key_t *a) { omapi_auth_key_t *tk; isc_result_t status; dst_key_t *dstkey; if (a -> type != omapi_type_auth_key) return DHCP_R_INVALIDARG; tk = (omapi_auth_key_t *)0; if (auth_key_hash) { omapi_auth_key_hash_lookup (&tk, auth_key_hash, a -> name, 0, MDL); if (tk == a) { omapi_auth_key_dereference (&tk, MDL); return ISC_R_SUCCESS; } if (tk) { omapi_auth_key_hash_delete (auth_key_hash, tk -> name, 0, MDL); omapi_auth_key_dereference (&tk, MDL); } } else { if (!omapi_auth_key_new_hash(&auth_key_hash, KEY_HASH_SIZE, MDL)) return ISC_R_NOMEMORY; } /* * If possible create a tsec structure for this key, * if we can't create the structure we put out a warning * and continue. */ status = isclib_make_dst_key(a->name, a->algorithm, a->key->value, a->key->len, &dstkey); if (status == ISC_R_SUCCESS) { status = dns_tsec_create(dhcp_gbl_ctx.mctx, dns_tsectype_tsig, dstkey, &a->tsec_key); dst_key_free(&dstkey); } if (status != ISC_R_SUCCESS) log_error("Unable to create tsec structure for %s", a->name); omapi_auth_key_hash_add (auth_key_hash, a -> name, 0, a, MDL); return ISC_R_SUCCESS; }