X-Git-Url: https://git.m6w6.name/?a=blobdiff_plain;f=libmemcached%2Fsasl.c;h=0dedb52db45fb3cc8e593ad602d927ccd44d18b3;hb=3c11b74c0aa013a6afd492d46a8e9c911e12b350;hp=9b4533b38fb6a1b53c0271bc4bdac96537b6da2a;hpb=475f477dab6dfc5e4f018d1ecfb128c37e2c44a0;p=m6w6%2Flibmemcached diff --git a/libmemcached/sasl.c b/libmemcached/sasl.c index 9b4533b3..0dedb52d 100644 --- a/libmemcached/sasl.c +++ b/libmemcached/sasl.c @@ -30,7 +30,7 @@ const sasl_callback_t *memcached_get_sasl_callbacks(memcached_st *ptr) * @param raddr remote address (out) * @return true on success false otherwise (errno contains more info) */ -static bool resolve_names(int fd, char *laddr, char *raddr) +static bool resolve_names(int fd, char *laddr, size_t laddr_length, char *raddr, size_t raddr_length) { char host[NI_MAXHOST]; char port[NI_MAXSERV]; @@ -44,7 +44,7 @@ static bool resolve_names(int fd, char *laddr, char *raddr) return false; } - (void)sprintf(laddr, "%s;%s", host, port); + (void)snprintf(laddr, laddr_length, "%s;%s", host, port); salen= sizeof(saddr); if ((getpeername(fd, (struct sockaddr *)&saddr, &salen) < 0) || @@ -54,7 +54,7 @@ static bool resolve_names(int fd, char *laddr, char *raddr) return false; } - (void)sprintf(raddr, "%s;%s", host, port); + (void)snprintf(raddr, raddr_length, "%s;%s", host, port); return true; } @@ -108,7 +108,7 @@ memcached_return_t memcached_sasl_authenticate_connection(memcached_server_st *s char laddr[NI_MAXHOST + NI_MAXSERV]; char raddr[NI_MAXHOST + NI_MAXSERV]; - unlikely (!resolve_names(server->fd, laddr, raddr)) + unlikely (!resolve_names(server->fd, laddr, sizeof(laddr), raddr, sizeof(raddr))) { server->cached_errno= errno; return MEMCACHED_ERRNO; @@ -140,10 +140,15 @@ memcached_return_t memcached_sasl_authenticate_connection(memcached_server_st *s do { /* send the packet */ - if (memcached_io_write(server, request.bytes, - sizeof(request.bytes), 0) != sizeof(request.bytes) || - memcached_io_write(server, chosenmech, keylen, 0) != keylen || - memcached_io_write(server, data, len, 1) != (ssize_t)len) + + struct libmemcached_io_vector_st vector[]= + { + { .length= sizeof(request.bytes), .buffer= request.bytes }, + { .length= keylen, .buffer= chosenmech }, + { .length= len, .buffer= data } + }; + + if (memcached_io_writev(server, vector, 3, true) == -1) { rc= MEMCACHED_WRITE_FAILURE; goto end; @@ -272,6 +277,12 @@ memcached_return_t memcached_destroy_sasl_auth_data(memcached_st *ptr) memcached_return_t memcached_clone_sasl(memcached_st *clone, const memcached_st *source) { + + if (source->sasl.callbacks == NULL) + { + return MEMCACHED_SUCCESS; + } + /* Hopefully we are using our own callback mechanisms.. */ if (source->sasl.callbacks[0].id == SASL_CB_USER && source->sasl.callbacks[0].proc == get_username && @@ -294,7 +305,8 @@ memcached_return_t memcached_clone_sasl(memcached_st *clone, const memcached_st */ size_t total= 0; - while (source->sasl.callbacks[total].id != SASL_CB_LIST_END) { + while (source->sasl.callbacks[total].id != SASL_CB_LIST_END) + { switch (source->sasl.callbacks[total].id) { case SASL_CB_USER: @@ -309,8 +321,7 @@ memcached_return_t memcached_clone_sasl(memcached_st *clone, const memcached_st ++total; } - sasl_callback_t *cb= libmemcached_calloc(clone, total + 1, - sizeof(sasl_callback_t)); + sasl_callback_t *cb= libmemcached_calloc(clone, total + 1, sizeof(sasl_callback_t)); if (cb == NULL) { return MEMCACHED_MEMORY_ALLOCATION_FAILURE; @@ -323,6 +334,7 @@ memcached_return_t memcached_clone_sasl(memcached_st *clone, const memcached_st if (cb[x].id == SASL_CB_USER || cb[x].id == SASL_CB_AUTHNAME) { cb[x].context= libmemcached_malloc(clone, strlen(source->sasl.callbacks[x].context)); + if (cb[x].context == NULL) { /* Failed to allocate memory, clean up previously allocated memory */