diff options
author | Igor Sysoev <igor@sysoev.ru> | 2005-03-22 16:02:46 +0000 |
---|---|---|
committer | Igor Sysoev <igor@sysoev.ru> | 2005-03-22 16:02:46 +0000 |
commit | 4d656dcd0bd6309b0ec76fc444198ed6c2948a8e (patch) | |
tree | 67ce201b7d515273fa2a6a617542cece4fa16898 /src/os/unix/ngx_user.c | |
parent | 3599a1b885533d929315494258fb407765243a95 (diff) | |
download | nginx-4d656dcd0bd6309b0ec76fc444198ed6c2948a8e.tar.gz nginx-4d656dcd0bd6309b0ec76fc444198ed6c2948a8e.zip |
nginx-0.1.26-RELEASE importrelease-0.1.26
*) Change: the invalid client header lines are now ignored and logged
at the info level.
*) Change: the server name is also logged in error log.
*) Feature: the ngx_http_auth_basic_module module and the auth_basic
and auth_basic_user_file directives.
Diffstat (limited to 'src/os/unix/ngx_user.c')
-rw-r--r-- | src/os/unix/ngx_user.c | 89 |
1 files changed, 89 insertions, 0 deletions
diff --git a/src/os/unix/ngx_user.c b/src/os/unix/ngx_user.c new file mode 100644 index 000000000..fe2f79489 --- /dev/null +++ b/src/os/unix/ngx_user.c @@ -0,0 +1,89 @@ + +/* + * Copyright (C) Igor Sysoev + */ + + +#include <ngx_config.h> +#include <ngx_core.h> + + +/* + * Solaris has thread-safe crypt() + * Linux has crypt_r(); "struct crypt_data" is more than 128K + * FreeBSD needs the mutex to protect crypt() + * + * TODO: + * ngx_crypt_init() to init mutex + */ + + +#if (NGX_CRYPT) + +#if (NGX_LINUX) + +ngx_int_t +ngx_crypt(ngx_pool_t *pool, u_char *key, u_char *salt, u_char **encrypted) +{ + char *value; + size_t len; + struct crypt_data cd; + + value = crypt_r((char *) key, (char *) salt, &cd); + + if (value) { + len = ngx_strlen(value); + + *encrypted = ngx_palloc(pool, len); + if (*encrypted) { + ngx_memcpy(*encrypted, value, len + 1); + return NGX_OK; + } + } + + return NGX_ERROR; +} + +#else + +ngx_int_t +ngx_crypt(ngx_pool_t *pool, u_char *key, u_char *salt, u_char **encrypted) +{ + char *value; + size_t len; + ngx_int_t rc; + +#if (NGX_THREADS && NGX_NONREENTRANT_CRYPT) + + /* crypt() is a time consuming funtion, so we only try to lock */ + + if (ngx_mutex_trylock(ngx_crypt_mutex) != NGX_OK) { + return NGX_AGAIN; + } + +#endif + + rc = NGX_ERROR; + + value = crypt((char *) key, (char *) salt); + + if (value) { + len = ngx_strlen(value); + + *encrypted = ngx_palloc(pool, len); + if (*encrypted) { + ngx_memcpy(*encrypted, value, len + 1); + rc = NGX_OK; + } + } + +#if (NGX_THREADS && NGX_NONREENTRANT_CRYPT) + ngx_mutex_unlock(ngx_crypt_mutex); +#endif + + return rc; +} + +#endif + +#endif /* NGX_CRYPT */ |