aboutsummaryrefslogtreecommitdiff
path: root/src/os/unix/ngx_user.c
diff options
context:
space:
mode:
authorIgor Sysoev <igor@sysoev.ru>2005-03-22 16:02:46 +0000
committerIgor Sysoev <igor@sysoev.ru>2005-03-22 16:02:46 +0000
commit4d656dcd0bd6309b0ec76fc444198ed6c2948a8e (patch)
tree67ce201b7d515273fa2a6a617542cece4fa16898 /src/os/unix/ngx_user.c
parent3599a1b885533d929315494258fb407765243a95 (diff)
downloadnginx-4d656dcd0bd6309b0ec76fc444198ed6c2948a8e.tar.gz
nginx-4d656dcd0bd6309b0ec76fc444198ed6c2948a8e.zip
nginx-0.1.26-RELEASE importrelease-0.1.26
*) Change: the invalid client header lines are now ignored and logged at the info level. *) Change: the server name is also logged in error log. *) Feature: the ngx_http_auth_basic_module module and the auth_basic and auth_basic_user_file directives.
Diffstat (limited to 'src/os/unix/ngx_user.c')
-rw-r--r--src/os/unix/ngx_user.c89
1 files changed, 89 insertions, 0 deletions
diff --git a/src/os/unix/ngx_user.c b/src/os/unix/ngx_user.c
new file mode 100644
index 000000000..fe2f79489
--- /dev/null
+++ b/src/os/unix/ngx_user.c
@@ -0,0 +1,89 @@
+
+/*
+ * Copyright (C) Igor Sysoev
+ */
+
+
+#include <ngx_config.h>
+#include <ngx_core.h>
+
+
+/*
+ * Solaris has thread-safe crypt()
+ * Linux has crypt_r(); "struct crypt_data" is more than 128K
+ * FreeBSD needs the mutex to protect crypt()
+ *
+ * TODO:
+ * ngx_crypt_init() to init mutex
+ */
+
+
+#if (NGX_CRYPT)
+
+#if (NGX_LINUX)
+
+ngx_int_t
+ngx_crypt(ngx_pool_t *pool, u_char *key, u_char *salt, u_char **encrypted)
+{
+ char *value;
+ size_t len;
+ struct crypt_data cd;
+
+ value = crypt_r((char *) key, (char *) salt, &cd);
+
+ if (value) {
+ len = ngx_strlen(value);
+
+ *encrypted = ngx_palloc(pool, len);
+ if (*encrypted) {
+ ngx_memcpy(*encrypted, value, len + 1);
+ return NGX_OK;
+ }
+ }
+
+ return NGX_ERROR;
+}
+
+#else
+
+ngx_int_t
+ngx_crypt(ngx_pool_t *pool, u_char *key, u_char *salt, u_char **encrypted)
+{
+ char *value;
+ size_t len;
+ ngx_int_t rc;
+
+#if (NGX_THREADS && NGX_NONREENTRANT_CRYPT)
+
+ /* crypt() is a time consuming funtion, so we only try to lock */
+
+ if (ngx_mutex_trylock(ngx_crypt_mutex) != NGX_OK) {
+ return NGX_AGAIN;
+ }
+
+#endif
+
+ rc = NGX_ERROR;
+
+ value = crypt((char *) key, (char *) salt);
+
+ if (value) {
+ len = ngx_strlen(value);
+
+ *encrypted = ngx_palloc(pool, len);
+ if (*encrypted) {
+ ngx_memcpy(*encrypted, value, len + 1);
+ rc = NGX_OK;
+ }
+ }
+
+#if (NGX_THREADS && NGX_NONREENTRANT_CRYPT)
+ ngx_mutex_unlock(ngx_crypt_mutex);
+#endif
+
+ return rc;
+}
+
+#endif
+
+#endif /* NGX_CRYPT */