mirror of
https://gitlab.com/libvirt/libvirt.git
synced 2024-12-28 16:45:26 +00:00
f7d7825d06
Apple have annotated all SASL functions as deprecated for unknown reasons. Since they still work, lets just ignore the warnings. If Apple finally delete the SASL functions our configure check should already catch that Signed-off-by: Daniel P. Berrange <berrange@redhat.com>
701 lines
19 KiB
C
701 lines
19 KiB
C
/*
|
|
* virnetsaslcontext.c: SASL encryption/auth handling
|
|
*
|
|
* Copyright (C) 2010-2012 Red Hat, Inc.
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library. If not, see
|
|
* <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include <config.h>
|
|
|
|
#include <fnmatch.h>
|
|
|
|
#include "virnetsaslcontext.h"
|
|
#include "virnetmessage.h"
|
|
|
|
#include "virerror.h"
|
|
#include "viralloc.h"
|
|
#include "virthread.h"
|
|
#include "virlog.h"
|
|
#include "virstring.h"
|
|
|
|
#define VIR_FROM_THIS VIR_FROM_RPC
|
|
|
|
VIR_LOG_INIT("rpc.netsaslcontext");
|
|
|
|
struct _virNetSASLContext {
|
|
virObjectLockable parent;
|
|
|
|
const char *const*usernameWhitelist;
|
|
};
|
|
|
|
struct _virNetSASLSession {
|
|
virObjectLockable parent;
|
|
|
|
sasl_conn_t *conn;
|
|
size_t maxbufsize;
|
|
sasl_callback_t *callbacks;
|
|
};
|
|
|
|
|
|
static virClassPtr virNetSASLContextClass;
|
|
static virClassPtr virNetSASLSessionClass;
|
|
static void virNetSASLSessionDispose(void *obj);
|
|
|
|
static int virNetSASLContextOnceInit(void)
|
|
{
|
|
if (!(virNetSASLContextClass = virClassNew(virClassForObjectLockable(),
|
|
"virNetSASLContext",
|
|
sizeof(virNetSASLContext),
|
|
NULL)))
|
|
return -1;
|
|
|
|
if (!(virNetSASLSessionClass = virClassNew(virClassForObjectLockable(),
|
|
"virNetSASLSession",
|
|
sizeof(virNetSASLSession),
|
|
virNetSASLSessionDispose)))
|
|
return -1;
|
|
|
|
return 0;
|
|
}
|
|
|
|
VIR_ONCE_GLOBAL_INIT(virNetSASLContext)
|
|
|
|
/* Apple have annotated all SASL functions as deprecated for
|
|
* unknown reasons. Since they still work, lets just ignore
|
|
* the warnings. If Apple finally delete the SASL functions
|
|
* our configure check should already catch that
|
|
*/
|
|
#ifdef __APPLE__
|
|
VIR_WARNINGS_NO_DEPRECATED
|
|
#endif
|
|
|
|
virNetSASLContextPtr virNetSASLContextNewClient(void)
|
|
{
|
|
virNetSASLContextPtr ctxt;
|
|
int err;
|
|
|
|
if (virNetSASLContextInitialize() < 0)
|
|
return NULL;
|
|
|
|
err = sasl_client_init(NULL);
|
|
if (err != SASL_OK) {
|
|
virReportError(VIR_ERR_AUTH_FAILED,
|
|
_("failed to initialize SASL library: %d (%s)"),
|
|
err, sasl_errstring(err, NULL, NULL));
|
|
return NULL;
|
|
}
|
|
|
|
if (!(ctxt = virObjectLockableNew(virNetSASLContextClass)))
|
|
return NULL;
|
|
|
|
return ctxt;
|
|
}
|
|
|
|
virNetSASLContextPtr virNetSASLContextNewServer(const char *const*usernameWhitelist)
|
|
{
|
|
virNetSASLContextPtr ctxt;
|
|
int err;
|
|
|
|
if (virNetSASLContextInitialize() < 0)
|
|
return NULL;
|
|
|
|
err = sasl_server_init(NULL, "libvirt");
|
|
if (err != SASL_OK) {
|
|
virReportError(VIR_ERR_AUTH_FAILED,
|
|
_("failed to initialize SASL library: %d (%s)"),
|
|
err, sasl_errstring(err, NULL, NULL));
|
|
return NULL;
|
|
}
|
|
|
|
if (!(ctxt = virObjectLockableNew(virNetSASLContextClass)))
|
|
return NULL;
|
|
|
|
ctxt->usernameWhitelist = usernameWhitelist;
|
|
|
|
return ctxt;
|
|
}
|
|
|
|
int virNetSASLContextCheckIdentity(virNetSASLContextPtr ctxt,
|
|
const char *identity)
|
|
{
|
|
const char *const*wildcards;
|
|
int ret = -1;
|
|
|
|
virObjectLock(ctxt);
|
|
|
|
/* If the list is not set, allow any DN. */
|
|
wildcards = ctxt->usernameWhitelist;
|
|
if (!wildcards) {
|
|
ret = 1; /* No ACL, allow all */
|
|
goto cleanup;
|
|
}
|
|
|
|
while (*wildcards) {
|
|
int rv = fnmatch(*wildcards, identity, 0);
|
|
if (rv == 0) {
|
|
ret = 1;
|
|
goto cleanup; /* Successful match */
|
|
}
|
|
if (rv != FNM_NOMATCH) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("Malformed TLS whitelist regular expression '%s'"),
|
|
*wildcards);
|
|
goto cleanup;
|
|
}
|
|
|
|
wildcards++;
|
|
}
|
|
|
|
/* Denied */
|
|
VIR_ERROR(_("SASL client identity '%s' not allowed in whitelist"), identity);
|
|
|
|
/* This is the most common error: make it informative. */
|
|
virReportError(VIR_ERR_SYSTEM_ERROR, "%s",
|
|
_("Client's username is not on the list of allowed clients"));
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
virObjectUnlock(ctxt);
|
|
return ret;
|
|
}
|
|
|
|
|
|
virNetSASLSessionPtr virNetSASLSessionNewClient(virNetSASLContextPtr ctxt ATTRIBUTE_UNUSED,
|
|
const char *service,
|
|
const char *hostname,
|
|
const char *localAddr,
|
|
const char *remoteAddr,
|
|
sasl_callback_t *cbs)
|
|
{
|
|
virNetSASLSessionPtr sasl = NULL;
|
|
int err;
|
|
|
|
if (!(sasl = virObjectLockableNew(virNetSASLSessionClass)))
|
|
return NULL;
|
|
|
|
/* Arbitrary size for amount of data we can encode in a single block */
|
|
sasl->maxbufsize = 1 << 16;
|
|
|
|
err = sasl_client_new(service,
|
|
hostname,
|
|
localAddr,
|
|
remoteAddr,
|
|
cbs,
|
|
SASL_SUCCESS_DATA,
|
|
&sasl->conn);
|
|
if (err != SASL_OK) {
|
|
virReportError(VIR_ERR_AUTH_FAILED,
|
|
_("Failed to create SASL client context: %d (%s)"),
|
|
err, sasl_errstring(err, NULL, NULL));
|
|
goto cleanup;
|
|
}
|
|
sasl->callbacks = cbs;
|
|
|
|
return sasl;
|
|
|
|
cleanup:
|
|
virObjectUnref(sasl);
|
|
return NULL;
|
|
}
|
|
|
|
virNetSASLSessionPtr virNetSASLSessionNewServer(virNetSASLContextPtr ctxt ATTRIBUTE_UNUSED,
|
|
const char *service,
|
|
const char *localAddr,
|
|
const char *remoteAddr)
|
|
{
|
|
virNetSASLSessionPtr sasl = NULL;
|
|
int err;
|
|
|
|
if (!(sasl = virObjectLockableNew(virNetSASLSessionClass)))
|
|
return NULL;
|
|
|
|
/* Arbitrary size for amount of data we can encode in a single block */
|
|
sasl->maxbufsize = 1 << 16;
|
|
|
|
err = sasl_server_new(service,
|
|
NULL,
|
|
NULL,
|
|
localAddr,
|
|
remoteAddr,
|
|
NULL,
|
|
SASL_SUCCESS_DATA,
|
|
&sasl->conn);
|
|
if (err != SASL_OK) {
|
|
virReportError(VIR_ERR_AUTH_FAILED,
|
|
_("Failed to create SASL client context: %d (%s)"),
|
|
err, sasl_errstring(err, NULL, NULL));
|
|
goto cleanup;
|
|
}
|
|
|
|
return sasl;
|
|
|
|
cleanup:
|
|
virObjectUnref(sasl);
|
|
return NULL;
|
|
}
|
|
|
|
int virNetSASLSessionExtKeySize(virNetSASLSessionPtr sasl,
|
|
int ssf)
|
|
{
|
|
int err;
|
|
int ret = -1;
|
|
virObjectLock(sasl);
|
|
|
|
err = sasl_setprop(sasl->conn, SASL_SSF_EXTERNAL, &ssf);
|
|
if (err != SASL_OK) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("cannot set external SSF %d (%s)"),
|
|
err, sasl_errstring(err, NULL, NULL));
|
|
goto cleanup;
|
|
}
|
|
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
virObjectUnlock(sasl);
|
|
return ret;
|
|
}
|
|
|
|
const char *virNetSASLSessionGetIdentity(virNetSASLSessionPtr sasl)
|
|
{
|
|
const void *val = NULL;
|
|
int err;
|
|
virObjectLock(sasl);
|
|
|
|
err = sasl_getprop(sasl->conn, SASL_USERNAME, &val);
|
|
if (err != SASL_OK) {
|
|
virReportError(VIR_ERR_AUTH_FAILED,
|
|
_("cannot query SASL username on connection %d (%s)"),
|
|
err, sasl_errstring(err, NULL, NULL));
|
|
val = NULL;
|
|
goto cleanup;
|
|
}
|
|
if (val == NULL) {
|
|
virReportError(VIR_ERR_AUTH_FAILED, "%s",
|
|
_("no client username was found"));
|
|
goto cleanup;
|
|
}
|
|
VIR_DEBUG("SASL client username %s", (const char *)val);
|
|
|
|
cleanup:
|
|
virObjectUnlock(sasl);
|
|
return (const char*)val;
|
|
}
|
|
|
|
|
|
int virNetSASLSessionGetKeySize(virNetSASLSessionPtr sasl)
|
|
{
|
|
int err;
|
|
int ssf;
|
|
const void *val;
|
|
|
|
virObjectLock(sasl);
|
|
err = sasl_getprop(sasl->conn, SASL_SSF, &val);
|
|
if (err != SASL_OK) {
|
|
virReportError(VIR_ERR_AUTH_FAILED,
|
|
_("cannot query SASL ssf on connection %d (%s)"),
|
|
err, sasl_errstring(err, NULL, NULL));
|
|
ssf = -1;
|
|
goto cleanup;
|
|
}
|
|
ssf = *(const int *)val;
|
|
|
|
cleanup:
|
|
virObjectUnlock(sasl);
|
|
return ssf;
|
|
}
|
|
|
|
int virNetSASLSessionSecProps(virNetSASLSessionPtr sasl,
|
|
int minSSF,
|
|
int maxSSF,
|
|
bool allowAnonymous)
|
|
{
|
|
sasl_security_properties_t secprops;
|
|
int err;
|
|
int ret = -1;
|
|
|
|
VIR_DEBUG("minSSF=%d maxSSF=%d allowAnonymous=%d maxbufsize=%zu",
|
|
minSSF, maxSSF, allowAnonymous, sasl->maxbufsize);
|
|
|
|
virObjectLock(sasl);
|
|
memset(&secprops, 0, sizeof(secprops));
|
|
|
|
secprops.min_ssf = minSSF;
|
|
secprops.max_ssf = maxSSF;
|
|
secprops.maxbufsize = sasl->maxbufsize;
|
|
secprops.security_flags = allowAnonymous ? 0 :
|
|
SASL_SEC_NOANONYMOUS | SASL_SEC_NOPLAINTEXT;
|
|
|
|
err = sasl_setprop(sasl->conn, SASL_SEC_PROPS, &secprops);
|
|
if (err != SASL_OK) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("cannot set security props %d (%s)"),
|
|
err, sasl_errstring(err, NULL, NULL));
|
|
goto cleanup;
|
|
}
|
|
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
virObjectUnlock(sasl);
|
|
return ret;
|
|
}
|
|
|
|
|
|
static int virNetSASLSessionUpdateBufSize(virNetSASLSessionPtr sasl)
|
|
{
|
|
union {
|
|
unsigned *maxbufsize;
|
|
const void *ptr;
|
|
} u;
|
|
int err;
|
|
|
|
err = sasl_getprop(sasl->conn, SASL_MAXOUTBUF, &u.ptr);
|
|
if (err != SASL_OK) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("cannot get security props %d (%s)"),
|
|
err, sasl_errstring(err, NULL, NULL));
|
|
return -1;
|
|
}
|
|
|
|
VIR_DEBUG("Negotiated bufsize is %u vs requested size %zu",
|
|
*u.maxbufsize, sasl->maxbufsize);
|
|
sasl->maxbufsize = *u.maxbufsize;
|
|
return 0;
|
|
}
|
|
|
|
char *virNetSASLSessionListMechanisms(virNetSASLSessionPtr sasl)
|
|
{
|
|
const char *mechlist;
|
|
char *ret = NULL;
|
|
int err;
|
|
|
|
virObjectLock(sasl);
|
|
err = sasl_listmech(sasl->conn,
|
|
NULL, /* Don't need to set user */
|
|
"", /* Prefix */
|
|
",", /* Separator */
|
|
"", /* Suffix */
|
|
&mechlist,
|
|
NULL,
|
|
NULL);
|
|
if (err != SASL_OK) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("cannot list SASL mechanisms %d (%s)"),
|
|
err, sasl_errdetail(sasl->conn));
|
|
goto cleanup;
|
|
}
|
|
VIR_DEBUG("SASL mechanism list is '%s'", mechlist);
|
|
if (STREQ(mechlist, "")) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("no SASL mechanisms are available"));
|
|
goto cleanup;
|
|
}
|
|
ignore_value(VIR_STRDUP(ret, mechlist));
|
|
|
|
cleanup:
|
|
virObjectUnlock(sasl);
|
|
return ret;
|
|
}
|
|
|
|
|
|
int virNetSASLSessionClientStart(virNetSASLSessionPtr sasl,
|
|
const char *mechlist,
|
|
sasl_interact_t **prompt_need,
|
|
const char **clientout,
|
|
size_t *clientoutlen,
|
|
const char **mech)
|
|
{
|
|
unsigned outlen = 0;
|
|
int err;
|
|
int ret = -1;
|
|
|
|
VIR_DEBUG("sasl=%p mechlist=%s prompt_need=%p clientout=%p clientoutlen=%p mech=%p",
|
|
sasl, mechlist, prompt_need, clientout, clientoutlen, mech);
|
|
|
|
virObjectLock(sasl);
|
|
err = sasl_client_start(sasl->conn,
|
|
mechlist,
|
|
prompt_need,
|
|
clientout,
|
|
&outlen,
|
|
mech);
|
|
|
|
*clientoutlen = outlen;
|
|
|
|
switch (err) {
|
|
case SASL_OK:
|
|
if (virNetSASLSessionUpdateBufSize(sasl) < 0)
|
|
goto cleanup;
|
|
ret = VIR_NET_SASL_COMPLETE;
|
|
break;
|
|
case SASL_CONTINUE:
|
|
ret = VIR_NET_SASL_CONTINUE;
|
|
break;
|
|
case SASL_INTERACT:
|
|
ret = VIR_NET_SASL_INTERACT;
|
|
break;
|
|
default:
|
|
virReportError(VIR_ERR_AUTH_FAILED,
|
|
_("Failed to start SASL negotiation: %d (%s)"),
|
|
err, sasl_errdetail(sasl->conn));
|
|
break;
|
|
}
|
|
|
|
cleanup:
|
|
virObjectUnlock(sasl);
|
|
return ret;
|
|
}
|
|
|
|
|
|
int virNetSASLSessionClientStep(virNetSASLSessionPtr sasl,
|
|
const char *serverin,
|
|
size_t serverinlen,
|
|
sasl_interact_t **prompt_need,
|
|
const char **clientout,
|
|
size_t *clientoutlen)
|
|
{
|
|
unsigned inlen = serverinlen;
|
|
unsigned outlen = 0;
|
|
int err;
|
|
int ret = -1;
|
|
|
|
VIR_DEBUG("sasl=%p serverin=%p serverinlen=%zu prompt_need=%p clientout=%p clientoutlen=%p",
|
|
sasl, serverin, serverinlen, prompt_need, clientout, clientoutlen);
|
|
|
|
virObjectLock(sasl);
|
|
err = sasl_client_step(sasl->conn,
|
|
serverin,
|
|
inlen,
|
|
prompt_need,
|
|
clientout,
|
|
&outlen);
|
|
*clientoutlen = outlen;
|
|
|
|
switch (err) {
|
|
case SASL_OK:
|
|
if (virNetSASLSessionUpdateBufSize(sasl) < 0)
|
|
goto cleanup;
|
|
ret = VIR_NET_SASL_COMPLETE;
|
|
break;
|
|
case SASL_CONTINUE:
|
|
ret = VIR_NET_SASL_CONTINUE;
|
|
break;
|
|
case SASL_INTERACT:
|
|
ret = VIR_NET_SASL_INTERACT;
|
|
break;
|
|
default:
|
|
virReportError(VIR_ERR_AUTH_FAILED,
|
|
_("Failed to step SASL negotiation: %d (%s)"),
|
|
err, sasl_errdetail(sasl->conn));
|
|
break;
|
|
}
|
|
|
|
cleanup:
|
|
virObjectUnlock(sasl);
|
|
return ret;
|
|
}
|
|
|
|
int virNetSASLSessionServerStart(virNetSASLSessionPtr sasl,
|
|
const char *mechname,
|
|
const char *clientin,
|
|
size_t clientinlen,
|
|
const char **serverout,
|
|
size_t *serveroutlen)
|
|
{
|
|
unsigned inlen = clientinlen;
|
|
unsigned outlen = 0;
|
|
int err;
|
|
int ret = -1;
|
|
|
|
virObjectLock(sasl);
|
|
err = sasl_server_start(sasl->conn,
|
|
mechname,
|
|
clientin,
|
|
inlen,
|
|
serverout,
|
|
&outlen);
|
|
|
|
*serveroutlen = outlen;
|
|
|
|
switch (err) {
|
|
case SASL_OK:
|
|
if (virNetSASLSessionUpdateBufSize(sasl) < 0)
|
|
goto cleanup;
|
|
ret = VIR_NET_SASL_COMPLETE;
|
|
break;
|
|
case SASL_CONTINUE:
|
|
ret = VIR_NET_SASL_CONTINUE;
|
|
break;
|
|
case SASL_INTERACT:
|
|
ret = VIR_NET_SASL_INTERACT;
|
|
break;
|
|
default:
|
|
virReportError(VIR_ERR_AUTH_FAILED,
|
|
_("Failed to start SASL negotiation: %d (%s)"),
|
|
err, sasl_errdetail(sasl->conn));
|
|
break;
|
|
}
|
|
|
|
cleanup:
|
|
virObjectUnlock(sasl);
|
|
return ret;
|
|
}
|
|
|
|
|
|
int virNetSASLSessionServerStep(virNetSASLSessionPtr sasl,
|
|
const char *clientin,
|
|
size_t clientinlen,
|
|
const char **serverout,
|
|
size_t *serveroutlen)
|
|
{
|
|
unsigned inlen = clientinlen;
|
|
unsigned outlen = 0;
|
|
int err;
|
|
int ret = -1;
|
|
|
|
virObjectLock(sasl);
|
|
err = sasl_server_step(sasl->conn,
|
|
clientin,
|
|
inlen,
|
|
serverout,
|
|
&outlen);
|
|
|
|
*serveroutlen = outlen;
|
|
|
|
switch (err) {
|
|
case SASL_OK:
|
|
if (virNetSASLSessionUpdateBufSize(sasl) < 0)
|
|
goto cleanup;
|
|
ret = VIR_NET_SASL_COMPLETE;
|
|
break;
|
|
case SASL_CONTINUE:
|
|
ret = VIR_NET_SASL_CONTINUE;
|
|
break;
|
|
case SASL_INTERACT:
|
|
ret = VIR_NET_SASL_INTERACT;
|
|
break;
|
|
default:
|
|
virReportError(VIR_ERR_AUTH_FAILED,
|
|
_("Failed to start SASL negotiation: %d (%s)"),
|
|
err, sasl_errdetail(sasl->conn));
|
|
break;
|
|
}
|
|
|
|
cleanup:
|
|
virObjectUnlock(sasl);
|
|
return ret;
|
|
}
|
|
|
|
size_t virNetSASLSessionGetMaxBufSize(virNetSASLSessionPtr sasl)
|
|
{
|
|
size_t ret;
|
|
virObjectLock(sasl);
|
|
ret = sasl->maxbufsize;
|
|
virObjectUnlock(sasl);
|
|
return ret;
|
|
}
|
|
|
|
ssize_t virNetSASLSessionEncode(virNetSASLSessionPtr sasl,
|
|
const char *input,
|
|
size_t inputLen,
|
|
const char **output,
|
|
size_t *outputlen)
|
|
{
|
|
unsigned inlen = inputLen;
|
|
unsigned outlen = 0;
|
|
int err;
|
|
ssize_t ret = -1;
|
|
|
|
virObjectLock(sasl);
|
|
if (inputLen > sasl->maxbufsize) {
|
|
virReportSystemError(EINVAL,
|
|
_("SASL data length %zu too long, max %zu"),
|
|
inputLen, sasl->maxbufsize);
|
|
goto cleanup;
|
|
}
|
|
|
|
err = sasl_encode(sasl->conn,
|
|
input,
|
|
inlen,
|
|
output,
|
|
&outlen);
|
|
*outputlen = outlen;
|
|
|
|
if (err != SASL_OK) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("failed to encode SASL data: %d (%s)"),
|
|
err, sasl_errstring(err, NULL, NULL));
|
|
goto cleanup;
|
|
}
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
virObjectUnlock(sasl);
|
|
return ret;
|
|
}
|
|
|
|
ssize_t virNetSASLSessionDecode(virNetSASLSessionPtr sasl,
|
|
const char *input,
|
|
size_t inputLen,
|
|
const char **output,
|
|
size_t *outputlen)
|
|
{
|
|
unsigned inlen = inputLen;
|
|
unsigned outlen = 0;
|
|
int err;
|
|
ssize_t ret = -1;
|
|
|
|
virObjectLock(sasl);
|
|
if (inputLen > sasl->maxbufsize) {
|
|
virReportSystemError(EINVAL,
|
|
_("SASL data length %zu too long, max %zu"),
|
|
inputLen, sasl->maxbufsize);
|
|
goto cleanup;
|
|
}
|
|
|
|
err = sasl_decode(sasl->conn,
|
|
input,
|
|
inlen,
|
|
output,
|
|
&outlen);
|
|
*outputlen = outlen;
|
|
if (err != SASL_OK) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("failed to decode SASL data: %d (%s)"),
|
|
err, sasl_errstring(err, NULL, NULL));
|
|
goto cleanup;
|
|
}
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
virObjectUnlock(sasl);
|
|
return ret;
|
|
}
|
|
|
|
void virNetSASLSessionDispose(void *obj)
|
|
{
|
|
virNetSASLSessionPtr sasl = obj;
|
|
|
|
if (sasl->conn)
|
|
sasl_dispose(&sasl->conn);
|
|
VIR_FREE(sasl->callbacks);
|
|
}
|
|
|
|
#ifdef __APPLE__
|
|
VIR_WARNINGS_RESET
|
|
#endif
|