s4-kerberos: raise the general kerberos debug level to 3
[ira/wip.git] / source4 / auth / kerberos / krb5_init_context.c
index 82e42a4560853a5d7f7ee3eacb605efcd6240484..2ca364032b5443ce2cb0c5ad9a1ac0a9543883b4 100644 (file)
 
 #include "includes.h"
 #include "system/kerberos.h"
+#include <tevent.h>
 #include "auth/kerberos/kerberos.h"
 #include "lib/socket/socket.h"
 #include "lib/stream/packet.h"
 #include "system/network.h"
-#include "lib/events/events.h"
 #include "param/param.h"
 #include "libcli/resolve/resolve.h"
 
@@ -37,7 +37,7 @@ struct smb_krb5_socket {
        struct socket_context *sock;
 
        /* the fd event */
-       struct fd_event *fde;
+       struct tevent_fd *fde;
 
        NTSTATUS status;
        DATA_BLOB request, reply;
@@ -49,13 +49,13 @@ struct smb_krb5_socket {
        krb5_krbhst_info *hi;
 };
 
-static int smb_krb5_context_destroy_1(struct smb_krb5_context *ctx)
+static krb5_error_code smb_krb5_context_destroy_1(struct smb_krb5_context *ctx)
 {
        krb5_free_context(ctx->krb5_context); 
        return 0;
 }
 
-static int smb_krb5_context_destroy_2(struct smb_krb5_context *ctx)
+static krb5_error_code smb_krb5_context_destroy_2(struct smb_krb5_context *ctx)
 {
        /* Otherwise krb5_free_context will try and close what we have already free()ed */
        krb5_set_warn_dest(ctx->krb5_context, NULL);
@@ -65,13 +65,13 @@ static int smb_krb5_context_destroy_2(struct smb_krb5_context *ctx)
 }
 
 /* We never close down the DEBUG system, and no need to unreference the use */
-static void smb_krb5_debug_close(void *private) {
+static void smb_krb5_debug_close(void *private_data) {
        return;
 }
 
-static void smb_krb5_debug_wrapper(const char *timestr, const char *msg, void *private
+static void smb_krb5_debug_wrapper(const char *timestr, const char *msg, void *private_data)
 {
-       DEBUG(2, ("Kerberos: %s\n", msg));
+       DEBUG(3, ("Kerberos: %s\n", msg));
 }
 
 /*
@@ -117,9 +117,9 @@ static void smb_krb5_socket_recv(struct smb_krb5_socket *smb_krb5)
        talloc_free(tmp_ctx);
 }
 
-static NTSTATUS smb_krb5_full_packet(void *private, DATA_BLOB data) 
+static NTSTATUS smb_krb5_full_packet(void *private_data, DATA_BLOB data)
 {
-       struct smb_krb5_socket *smb_krb5 = talloc_get_type(private, struct smb_krb5_socket);
+       struct smb_krb5_socket *smb_krb5 = talloc_get_type(private_data, struct smb_krb5_socket);
        talloc_steal(smb_krb5, data.data);
        smb_krb5->reply = data;
        smb_krb5->reply.length -= 4;
@@ -130,18 +130,18 @@ static NTSTATUS smb_krb5_full_packet(void *private, DATA_BLOB data)
 /*
   handle request timeouts
 */
-static void smb_krb5_request_timeout(struct event_context *event_ctx, 
-                                 struct timed_event *te, struct timeval t,
-                                 void *private)
+static void smb_krb5_request_timeout(struct tevent_context *event_ctx, 
+                                 struct tevent_timer *te, struct timeval t,
+                                 void *private_data)
 {
-       struct smb_krb5_socket *smb_krb5 = talloc_get_type(private, struct smb_krb5_socket);
+       struct smb_krb5_socket *smb_krb5 = talloc_get_type(private_data, struct smb_krb5_socket);
        DEBUG(5,("Timed out smb_krb5 packet\n"));
        smb_krb5->status = NT_STATUS_IO_TIMEOUT;
 }
 
-static void smb_krb5_error_handler(void *private, NTSTATUS status) 
+static void smb_krb5_error_handler(void *private_data, NTSTATUS status)
 {
-       struct smb_krb5_socket *smb_krb5 = talloc_get_type(private, struct smb_krb5_socket);
+       struct smb_krb5_socket *smb_krb5 = talloc_get_type(private_data, struct smb_krb5_socket);
        smb_krb5->status = status;
 }
 
@@ -159,9 +159,9 @@ static void smb_krb5_socket_send(struct smb_krb5_socket *smb_krb5)
 
        if (!NT_STATUS_IS_OK(status)) return;
        
-       EVENT_FD_READABLE(smb_krb5->fde);
+       TEVENT_FD_READABLE(smb_krb5->fde);
 
-       EVENT_FD_NOT_WRITEABLE(smb_krb5->fde);
+       TEVENT_FD_NOT_WRITEABLE(smb_krb5->fde);
        return;
 }
 
@@ -169,28 +169,28 @@ static void smb_krb5_socket_send(struct smb_krb5_socket *smb_krb5)
 /*
   handle fd events on a smb_krb5_socket
 */
-static void smb_krb5_socket_handler(struct event_context *ev, struct fd_event *fde,
-                                uint16_t flags, void *private)
+static void smb_krb5_socket_handler(struct tevent_context *ev, struct tevent_fd *fde,
+                                uint16_t flags, void *private_data)
 {
-       struct smb_krb5_socket *smb_krb5 = talloc_get_type(private, struct smb_krb5_socket);
+       struct smb_krb5_socket *smb_krb5 = talloc_get_type(private_data, struct smb_krb5_socket);
        switch (smb_krb5->hi->proto) {
        case KRB5_KRBHST_UDP:
-               if (flags & EVENT_FD_READ) {
+               if (flags & TEVENT_FD_READ) {
                        smb_krb5_socket_recv(smb_krb5);
                        return;
                }
-               if (flags & EVENT_FD_WRITE) {
+               if (flags & TEVENT_FD_WRITE) {
                        smb_krb5_socket_send(smb_krb5);
                        return;
                }
                /* not reached */
                return;
        case KRB5_KRBHST_TCP:
-               if (flags & EVENT_FD_READ) {
+               if (flags & TEVENT_FD_READ) {
                        packet_recv(smb_krb5->packet);
                        return;
                }
-               if (flags & EVENT_FD_WRITE) {
+               if (flags & TEVENT_FD_WRITE) {
                        packet_queue_run(smb_krb5->packet);
                        return;
                }
@@ -217,7 +217,7 @@ krb5_error_code smb_krb5_send_and_recv_func(krb5_context context,
        struct addrinfo *ai, *a;
        struct smb_krb5_socket *smb_krb5;
 
-       struct event_context *ev = talloc_get_type(data, struct event_context);
+       struct tevent_context *ev = talloc_get_type(data, struct tevent_context);
 
        DATA_BLOB send_blob = data_blob_const(send_buf->data, send_buf->length);
 
@@ -250,14 +250,10 @@ krb5_error_code smb_krb5_send_and_recv_func(krb5_context context,
                status = NT_STATUS_INVALID_PARAMETER;
                switch (hi->proto) {
                case KRB5_KRBHST_UDP:
-                       if (lp_parm_bool(global_loadparm, NULL, "krb5", "udp", true)) {
-                               status = socket_create(name, SOCKET_TYPE_DGRAM, &smb_krb5->sock, 0);
-                       }
+                       status = socket_create(name, SOCKET_TYPE_DGRAM, &smb_krb5->sock, 0);
                        break;
                case KRB5_KRBHST_TCP:
-                       if (lp_parm_bool(global_loadparm, NULL, "krb5", "tcp", true)) {
-                               status = socket_create(name, SOCKET_TYPE_STREAM, &smb_krb5->sock, 0);
-                       }
+                       status = socket_create(name, SOCKET_TYPE_STREAM, &smb_krb5->sock, 0);
                        break;
                case KRB5_KRBHST_HTTP:
                        talloc_free(smb_krb5);
@@ -276,8 +272,7 @@ krb5_error_code smb_krb5_send_and_recv_func(krb5_context context,
                        continue;
                }
 
-               status = socket_connect_ev(smb_krb5->sock, NULL, remote_addr, 0, 
-                                          NULL, ev); 
+               status = socket_connect_ev(smb_krb5->sock, NULL, remote_addr, 0, ev);
                if (!NT_STATUS_IS_OK(status)) {
                        talloc_free(smb_krb5);
                        continue;
@@ -289,24 +284,24 @@ krb5_error_code smb_krb5_send_and_recv_func(krb5_context context,
                 * drop) and mark as AUTOCLOSE along with the fde */
 
                /* Ths is equivilant to EVENT_FD_READABLE(smb_krb5->fde) */
-               smb_krb5->fde = event_add_fd(ev, smb_krb5->sock, 
-                                            socket_get_fd(smb_krb5->sock), 
-                                            EVENT_FD_READ|EVENT_FD_AUTOCLOSE,
-                                            smb_krb5_socket_handler, smb_krb5);
+               smb_krb5->fde = tevent_add_fd(ev, smb_krb5->sock,
+                                             socket_get_fd(smb_krb5->sock),
+                                             TEVENT_FD_READ,
+                                             smb_krb5_socket_handler, smb_krb5);
                /* its now the job of the event layer to close the socket */
+               tevent_fd_set_close_fn(smb_krb5->fde, socket_tevent_fd_close_fn);
                socket_set_flags(smb_krb5->sock, SOCKET_FLAG_NOCLOSE);
 
-               event_add_timed(ev, smb_krb5, 
-                               timeval_current_ofs(timeout, 0),
-                               smb_krb5_request_timeout, smb_krb5);
+               tevent_add_timer(ev, smb_krb5,
+                                timeval_current_ofs(timeout, 0),
+                                smb_krb5_request_timeout, smb_krb5);
 
-               
                smb_krb5->status = NT_STATUS_OK;
                smb_krb5->reply = data_blob(NULL, 0);
 
                switch (hi->proto) {
                case KRB5_KRBHST_UDP:
-                       EVENT_FD_WRITEABLE(smb_krb5->fde);
+                       TEVENT_FD_WRITEABLE(smb_krb5->fde);
                        smb_krb5->request = send_blob;
                        break;
                case KRB5_KRBHST_TCP:
@@ -334,7 +329,7 @@ krb5_error_code smb_krb5_send_and_recv_func(krb5_context context,
                        return EINVAL;
                }
                while ((NT_STATUS_IS_OK(smb_krb5->status)) && !smb_krb5->reply.length) {
-                       if (event_loop_once(ev) != 0) {
+                       if (tevent_loop_once(ev) != 0) {
                                talloc_free(smb_krb5);
                                return EINVAL;
                        }
@@ -366,14 +361,14 @@ krb5_error_code smb_krb5_send_and_recv_func(krb5_context context,
 }
 
 krb5_error_code smb_krb5_init_context(void *parent_ctx, 
-                                     struct event_context *ev,
+                                     struct tevent_context *ev,
                                      struct loadparm_context *lp_ctx,
                                       struct smb_krb5_context **smb_krb5_context) 
 {
        krb5_error_code ret;
        TALLOC_CTX *tmp_ctx;
        char **config_files;
-       const char *config_file;
+       const char *config_file, *realm;
        
        initialize_krb5_error_table();
        
@@ -420,14 +415,9 @@ krb5_error_code smb_krb5_init_context(void *parent_ctx,
                return ret;
        }
                                                
-       if (lp_realm(lp_ctx) && *lp_realm(lp_ctx)) {
-               char *upper_realm = strupper_talloc(tmp_ctx, lp_realm(lp_ctx));
-               if (!upper_realm) {
-                       DEBUG(1,("gensec_krb5_start: could not uppercase realm: %s\n", lp_realm(lp_ctx)));
-                       talloc_free(tmp_ctx);
-                       return ENOMEM;
-               }
-               ret = krb5_set_default_realm((*smb_krb5_context)->krb5_context, upper_realm);
+       realm = lp_realm(lp_ctx);
+       if (realm != NULL) {
+               ret = krb5_set_default_realm((*smb_krb5_context)->krb5_context, realm);
                if (ret) {
                        DEBUG(1,("krb5_set_default_realm failed (%s)\n", 
                                 smb_get_krb5_error_message((*smb_krb5_context)->krb5_context, ret, tmp_ctx)));