mirror of
https://gitlab.com/libvirt/libvirt.git
synced 2024-10-31 18:33:11 +00:00
5f75ec90fe
The term "access control list" better describes the concept involved. Reviewed-by: Peter Krempa <pkrempa@redhat.com> Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
708 lines
19 KiB
C
708 lines
19 KiB
C
/*
|
|
* virnetsaslcontext.c: SASL encryption/auth handling
|
|
*
|
|
* Copyright (C) 2010-2012 Red Hat, Inc.
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library. If not, see
|
|
* <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include <config.h>
|
|
|
|
#include "virnetsaslcontext.h"
|
|
#include "virnetmessage.h"
|
|
|
|
#include "virerror.h"
|
|
#include "viralloc.h"
|
|
#include "virthread.h"
|
|
#include "virlog.h"
|
|
#include "virstring.h"
|
|
|
|
#define VIR_FROM_THIS VIR_FROM_RPC
|
|
|
|
VIR_LOG_INIT("rpc.netsaslcontext");
|
|
|
|
struct _virNetSASLContext {
|
|
virObjectLockable parent;
|
|
|
|
const char *const *usernameACL;
|
|
};
|
|
|
|
struct _virNetSASLSession {
|
|
virObjectLockable parent;
|
|
|
|
sasl_conn_t *conn;
|
|
size_t maxbufsize;
|
|
sasl_callback_t *callbacks;
|
|
};
|
|
|
|
|
|
static virClassPtr virNetSASLContextClass;
|
|
static virClassPtr virNetSASLSessionClass;
|
|
static void virNetSASLContextDispose(void *obj);
|
|
static void virNetSASLSessionDispose(void *obj);
|
|
|
|
static int virNetSASLContextOnceInit(void)
|
|
{
|
|
if (!VIR_CLASS_NEW(virNetSASLContext, virClassForObjectLockable()))
|
|
return -1;
|
|
|
|
if (!VIR_CLASS_NEW(virNetSASLSession, virClassForObjectLockable()))
|
|
return -1;
|
|
|
|
return 0;
|
|
}
|
|
|
|
VIR_ONCE_GLOBAL_INIT(virNetSASLContext);
|
|
|
|
/* Apple have annotated all SASL functions as deprecated for
|
|
* unknown reasons. Since they still work, lets just ignore
|
|
* the warnings. If Apple finally delete the SASL functions
|
|
* our configure check should already catch that
|
|
*/
|
|
#ifdef __APPLE__
|
|
VIR_WARNINGS_NO_DEPRECATED
|
|
#endif
|
|
|
|
static int virNetSASLContextClientOnceInit(void)
|
|
{
|
|
int err = sasl_client_init(NULL);
|
|
if (err != SASL_OK) {
|
|
virReportError(VIR_ERR_AUTH_FAILED,
|
|
_("failed to initialize SASL library: %d (%s)"),
|
|
err, sasl_errstring(err, NULL, NULL));
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
VIR_ONCE_GLOBAL_INIT(virNetSASLContextClient);
|
|
|
|
|
|
static int virNetSASLContextServerOnceInit(void)
|
|
{
|
|
int err = sasl_server_init(NULL, "libvirt");
|
|
if (err != SASL_OK) {
|
|
virReportError(VIR_ERR_AUTH_FAILED,
|
|
_("failed to initialize SASL library: %d (%s)"),
|
|
err, sasl_errstring(err, NULL, NULL));
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
VIR_ONCE_GLOBAL_INIT(virNetSASLContextServer);
|
|
|
|
|
|
virNetSASLContextPtr virNetSASLContextNewClient(void)
|
|
{
|
|
virNetSASLContextPtr ctxt;
|
|
|
|
if (virNetSASLContextInitialize() < 0 ||
|
|
virNetSASLContextClientInitialize() < 0)
|
|
return NULL;
|
|
|
|
if (!(ctxt = virObjectLockableNew(virNetSASLContextClass)))
|
|
return NULL;
|
|
|
|
return ctxt;
|
|
}
|
|
|
|
virNetSASLContextPtr virNetSASLContextNewServer(const char *const *usernameACL)
|
|
{
|
|
virNetSASLContextPtr ctxt;
|
|
|
|
if (virNetSASLContextInitialize() < 0 ||
|
|
virNetSASLContextServerInitialize() < 0)
|
|
return NULL;
|
|
|
|
if (!(ctxt = virObjectLockableNew(virNetSASLContextClass)))
|
|
return NULL;
|
|
|
|
ctxt->usernameACL = usernameACL;
|
|
|
|
return ctxt;
|
|
}
|
|
|
|
int virNetSASLContextCheckIdentity(virNetSASLContextPtr ctxt,
|
|
const char *identity)
|
|
{
|
|
const char *const*wildcards;
|
|
int ret = -1;
|
|
|
|
virObjectLock(ctxt);
|
|
|
|
/* If the list is not set, allow any DN. */
|
|
wildcards = ctxt->usernameACL;
|
|
if (!wildcards) {
|
|
ret = 1; /* No ACL, allow all */
|
|
goto cleanup;
|
|
}
|
|
|
|
while (*wildcards) {
|
|
if (g_pattern_match_simple(*wildcards, identity)) {
|
|
ret = 1;
|
|
goto cleanup; /* Successful match */
|
|
}
|
|
|
|
wildcards++;
|
|
}
|
|
|
|
/* Denied */
|
|
VIR_ERROR(_("SASL client identity '%s' not allowed by ACL"), identity);
|
|
|
|
/* This is the most common error: make it informative. */
|
|
virReportError(VIR_ERR_SYSTEM_ERROR, "%s",
|
|
_("Client's username is not on the list of allowed clients"));
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
virObjectUnlock(ctxt);
|
|
return ret;
|
|
}
|
|
|
|
|
|
virNetSASLSessionPtr virNetSASLSessionNewClient(virNetSASLContextPtr ctxt G_GNUC_UNUSED,
|
|
const char *service,
|
|
const char *hostname,
|
|
const char *localAddr,
|
|
const char *remoteAddr,
|
|
sasl_callback_t *cbs)
|
|
{
|
|
virNetSASLSessionPtr sasl = NULL;
|
|
int err;
|
|
|
|
if (!(sasl = virObjectLockableNew(virNetSASLSessionClass)))
|
|
return NULL;
|
|
|
|
/* Arbitrary size for amount of data we can encode in a single block */
|
|
sasl->maxbufsize = 1 << 16;
|
|
|
|
err = sasl_client_new(service,
|
|
hostname,
|
|
localAddr,
|
|
remoteAddr,
|
|
cbs,
|
|
SASL_SUCCESS_DATA,
|
|
&sasl->conn);
|
|
if (err != SASL_OK) {
|
|
virReportError(VIR_ERR_AUTH_FAILED,
|
|
_("Failed to create SASL client context: %d (%s)"),
|
|
err, sasl_errstring(err, NULL, NULL));
|
|
goto cleanup;
|
|
}
|
|
sasl->callbacks = cbs;
|
|
|
|
return sasl;
|
|
|
|
cleanup:
|
|
virObjectUnref(sasl);
|
|
return NULL;
|
|
}
|
|
|
|
virNetSASLSessionPtr virNetSASLSessionNewServer(virNetSASLContextPtr ctxt G_GNUC_UNUSED,
|
|
const char *service,
|
|
const char *localAddr,
|
|
const char *remoteAddr)
|
|
{
|
|
virNetSASLSessionPtr sasl = NULL;
|
|
int err;
|
|
|
|
if (!(sasl = virObjectLockableNew(virNetSASLSessionClass)))
|
|
return NULL;
|
|
|
|
/* Arbitrary size for amount of data we can encode in a single block */
|
|
sasl->maxbufsize = 1 << 16;
|
|
|
|
err = sasl_server_new(service,
|
|
NULL,
|
|
NULL,
|
|
localAddr,
|
|
remoteAddr,
|
|
NULL,
|
|
SASL_SUCCESS_DATA,
|
|
&sasl->conn);
|
|
if (err != SASL_OK) {
|
|
virReportError(VIR_ERR_AUTH_FAILED,
|
|
_("Failed to create SASL client context: %d (%s)"),
|
|
err, sasl_errstring(err, NULL, NULL));
|
|
goto cleanup;
|
|
}
|
|
|
|
return sasl;
|
|
|
|
cleanup:
|
|
virObjectUnref(sasl);
|
|
return NULL;
|
|
}
|
|
|
|
int virNetSASLSessionExtKeySize(virNetSASLSessionPtr sasl,
|
|
int ssf)
|
|
{
|
|
int err;
|
|
int ret = -1;
|
|
virObjectLock(sasl);
|
|
|
|
err = sasl_setprop(sasl->conn, SASL_SSF_EXTERNAL, &ssf);
|
|
if (err != SASL_OK) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("cannot set external SSF %d (%s)"),
|
|
err, sasl_errstring(err, NULL, NULL));
|
|
goto cleanup;
|
|
}
|
|
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
virObjectUnlock(sasl);
|
|
return ret;
|
|
}
|
|
|
|
const char *virNetSASLSessionGetIdentity(virNetSASLSessionPtr sasl)
|
|
{
|
|
const void *val = NULL;
|
|
int err;
|
|
virObjectLock(sasl);
|
|
|
|
err = sasl_getprop(sasl->conn, SASL_USERNAME, &val);
|
|
if (err != SASL_OK) {
|
|
virReportError(VIR_ERR_AUTH_FAILED,
|
|
_("cannot query SASL username on connection %d (%s)"),
|
|
err, sasl_errstring(err, NULL, NULL));
|
|
val = NULL;
|
|
goto cleanup;
|
|
}
|
|
if (val == NULL) {
|
|
virReportError(VIR_ERR_AUTH_FAILED, "%s",
|
|
_("no client username was found"));
|
|
goto cleanup;
|
|
}
|
|
VIR_DEBUG("SASL client username %s", (const char *)val);
|
|
|
|
cleanup:
|
|
virObjectUnlock(sasl);
|
|
return (const char*)val;
|
|
}
|
|
|
|
|
|
int virNetSASLSessionGetKeySize(virNetSASLSessionPtr sasl)
|
|
{
|
|
int err;
|
|
int ssf;
|
|
const void *val;
|
|
|
|
virObjectLock(sasl);
|
|
err = sasl_getprop(sasl->conn, SASL_SSF, &val);
|
|
if (err != SASL_OK) {
|
|
virReportError(VIR_ERR_AUTH_FAILED,
|
|
_("cannot query SASL ssf on connection %d (%s)"),
|
|
err, sasl_errstring(err, NULL, NULL));
|
|
ssf = -1;
|
|
goto cleanup;
|
|
}
|
|
ssf = *(const int *)val;
|
|
|
|
cleanup:
|
|
virObjectUnlock(sasl);
|
|
return ssf;
|
|
}
|
|
|
|
int virNetSASLSessionSecProps(virNetSASLSessionPtr sasl,
|
|
int minSSF,
|
|
int maxSSF,
|
|
bool allowAnonymous)
|
|
{
|
|
sasl_security_properties_t secprops;
|
|
int err;
|
|
int ret = -1;
|
|
|
|
VIR_DEBUG("minSSF=%d maxSSF=%d allowAnonymous=%d maxbufsize=%zu",
|
|
minSSF, maxSSF, allowAnonymous, sasl->maxbufsize);
|
|
|
|
virObjectLock(sasl);
|
|
memset(&secprops, 0, sizeof(secprops));
|
|
|
|
secprops.min_ssf = minSSF;
|
|
secprops.max_ssf = maxSSF;
|
|
secprops.maxbufsize = sasl->maxbufsize;
|
|
secprops.security_flags = allowAnonymous ? 0 :
|
|
SASL_SEC_NOANONYMOUS | SASL_SEC_NOPLAINTEXT;
|
|
|
|
err = sasl_setprop(sasl->conn, SASL_SEC_PROPS, &secprops);
|
|
if (err != SASL_OK) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("cannot set security props %d (%s)"),
|
|
err, sasl_errstring(err, NULL, NULL));
|
|
goto cleanup;
|
|
}
|
|
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
virObjectUnlock(sasl);
|
|
return ret;
|
|
}
|
|
|
|
|
|
static int virNetSASLSessionUpdateBufSize(virNetSASLSessionPtr sasl)
|
|
{
|
|
union {
|
|
unsigned *maxbufsize;
|
|
const void *ptr;
|
|
} u;
|
|
int err;
|
|
|
|
err = sasl_getprop(sasl->conn, SASL_MAXOUTBUF, &u.ptr);
|
|
if (err != SASL_OK) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("cannot get security props %d (%s)"),
|
|
err, sasl_errstring(err, NULL, NULL));
|
|
return -1;
|
|
}
|
|
|
|
VIR_DEBUG("Negotiated bufsize is %u vs requested size %zu",
|
|
*u.maxbufsize, sasl->maxbufsize);
|
|
sasl->maxbufsize = *u.maxbufsize;
|
|
return 0;
|
|
}
|
|
|
|
char *virNetSASLSessionListMechanisms(virNetSASLSessionPtr sasl)
|
|
{
|
|
const char *mechlist;
|
|
char *ret = NULL;
|
|
int err;
|
|
|
|
virObjectLock(sasl);
|
|
err = sasl_listmech(sasl->conn,
|
|
NULL, /* Don't need to set user */
|
|
"", /* Prefix */
|
|
",", /* Separator */
|
|
"", /* Suffix */
|
|
&mechlist,
|
|
NULL,
|
|
NULL);
|
|
if (err != SASL_OK) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("cannot list SASL mechanisms %d (%s)"),
|
|
err, sasl_errdetail(sasl->conn));
|
|
goto cleanup;
|
|
}
|
|
VIR_DEBUG("SASL mechanism list is '%s'", mechlist);
|
|
if (STREQ(mechlist, "")) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
|
|
_("no SASL mechanisms are available"));
|
|
goto cleanup;
|
|
}
|
|
ret = g_strdup(mechlist);
|
|
|
|
cleanup:
|
|
virObjectUnlock(sasl);
|
|
return ret;
|
|
}
|
|
|
|
|
|
int virNetSASLSessionClientStart(virNetSASLSessionPtr sasl,
|
|
const char *mechlist,
|
|
sasl_interact_t **prompt_need,
|
|
const char **clientout,
|
|
size_t *clientoutlen,
|
|
const char **mech)
|
|
{
|
|
unsigned outlen = 0;
|
|
int err;
|
|
int ret = -1;
|
|
|
|
VIR_DEBUG("sasl=%p mechlist=%s prompt_need=%p clientout=%p clientoutlen=%p mech=%p",
|
|
sasl, mechlist, prompt_need, clientout, clientoutlen, mech);
|
|
|
|
virObjectLock(sasl);
|
|
err = sasl_client_start(sasl->conn,
|
|
mechlist,
|
|
prompt_need,
|
|
clientout,
|
|
&outlen,
|
|
mech);
|
|
|
|
*clientoutlen = outlen;
|
|
|
|
switch (err) {
|
|
case SASL_OK:
|
|
if (virNetSASLSessionUpdateBufSize(sasl) < 0)
|
|
goto cleanup;
|
|
ret = VIR_NET_SASL_COMPLETE;
|
|
break;
|
|
case SASL_CONTINUE:
|
|
ret = VIR_NET_SASL_CONTINUE;
|
|
break;
|
|
case SASL_INTERACT:
|
|
ret = VIR_NET_SASL_INTERACT;
|
|
break;
|
|
default:
|
|
virReportError(VIR_ERR_AUTH_FAILED,
|
|
_("Failed to start SASL negotiation: %d (%s)"),
|
|
err, sasl_errdetail(sasl->conn));
|
|
break;
|
|
}
|
|
|
|
cleanup:
|
|
virObjectUnlock(sasl);
|
|
return ret;
|
|
}
|
|
|
|
|
|
int virNetSASLSessionClientStep(virNetSASLSessionPtr sasl,
|
|
const char *serverin,
|
|
size_t serverinlen,
|
|
sasl_interact_t **prompt_need,
|
|
const char **clientout,
|
|
size_t *clientoutlen)
|
|
{
|
|
unsigned inlen = serverinlen;
|
|
unsigned outlen = 0;
|
|
int err;
|
|
int ret = -1;
|
|
|
|
VIR_DEBUG("sasl=%p serverin=%p serverinlen=%zu prompt_need=%p clientout=%p clientoutlen=%p",
|
|
sasl, serverin, serverinlen, prompt_need, clientout, clientoutlen);
|
|
|
|
virObjectLock(sasl);
|
|
err = sasl_client_step(sasl->conn,
|
|
serverin,
|
|
inlen,
|
|
prompt_need,
|
|
clientout,
|
|
&outlen);
|
|
*clientoutlen = outlen;
|
|
|
|
switch (err) {
|
|
case SASL_OK:
|
|
if (virNetSASLSessionUpdateBufSize(sasl) < 0)
|
|
goto cleanup;
|
|
ret = VIR_NET_SASL_COMPLETE;
|
|
break;
|
|
case SASL_CONTINUE:
|
|
ret = VIR_NET_SASL_CONTINUE;
|
|
break;
|
|
case SASL_INTERACT:
|
|
ret = VIR_NET_SASL_INTERACT;
|
|
break;
|
|
default:
|
|
virReportError(VIR_ERR_AUTH_FAILED,
|
|
_("Failed to step SASL negotiation: %d (%s)"),
|
|
err, sasl_errdetail(sasl->conn));
|
|
break;
|
|
}
|
|
|
|
cleanup:
|
|
virObjectUnlock(sasl);
|
|
return ret;
|
|
}
|
|
|
|
int virNetSASLSessionServerStart(virNetSASLSessionPtr sasl,
|
|
const char *mechname,
|
|
const char *clientin,
|
|
size_t clientinlen,
|
|
const char **serverout,
|
|
size_t *serveroutlen)
|
|
{
|
|
unsigned inlen = clientinlen;
|
|
unsigned outlen = 0;
|
|
int err;
|
|
int ret = -1;
|
|
|
|
virObjectLock(sasl);
|
|
err = sasl_server_start(sasl->conn,
|
|
mechname,
|
|
clientin,
|
|
inlen,
|
|
serverout,
|
|
&outlen);
|
|
|
|
*serveroutlen = outlen;
|
|
|
|
switch (err) {
|
|
case SASL_OK:
|
|
if (virNetSASLSessionUpdateBufSize(sasl) < 0)
|
|
goto cleanup;
|
|
ret = VIR_NET_SASL_COMPLETE;
|
|
break;
|
|
case SASL_CONTINUE:
|
|
ret = VIR_NET_SASL_CONTINUE;
|
|
break;
|
|
case SASL_INTERACT:
|
|
ret = VIR_NET_SASL_INTERACT;
|
|
break;
|
|
default:
|
|
virReportError(VIR_ERR_AUTH_FAILED,
|
|
_("Failed to start SASL negotiation: %d (%s)"),
|
|
err, sasl_errdetail(sasl->conn));
|
|
break;
|
|
}
|
|
|
|
cleanup:
|
|
virObjectUnlock(sasl);
|
|
return ret;
|
|
}
|
|
|
|
|
|
int virNetSASLSessionServerStep(virNetSASLSessionPtr sasl,
|
|
const char *clientin,
|
|
size_t clientinlen,
|
|
const char **serverout,
|
|
size_t *serveroutlen)
|
|
{
|
|
unsigned inlen = clientinlen;
|
|
unsigned outlen = 0;
|
|
int err;
|
|
int ret = -1;
|
|
|
|
virObjectLock(sasl);
|
|
err = sasl_server_step(sasl->conn,
|
|
clientin,
|
|
inlen,
|
|
serverout,
|
|
&outlen);
|
|
|
|
*serveroutlen = outlen;
|
|
|
|
switch (err) {
|
|
case SASL_OK:
|
|
if (virNetSASLSessionUpdateBufSize(sasl) < 0)
|
|
goto cleanup;
|
|
ret = VIR_NET_SASL_COMPLETE;
|
|
break;
|
|
case SASL_CONTINUE:
|
|
ret = VIR_NET_SASL_CONTINUE;
|
|
break;
|
|
case SASL_INTERACT:
|
|
ret = VIR_NET_SASL_INTERACT;
|
|
break;
|
|
default:
|
|
virReportError(VIR_ERR_AUTH_FAILED,
|
|
_("Failed to start SASL negotiation: %d (%s)"),
|
|
err, sasl_errdetail(sasl->conn));
|
|
break;
|
|
}
|
|
|
|
cleanup:
|
|
virObjectUnlock(sasl);
|
|
return ret;
|
|
}
|
|
|
|
size_t virNetSASLSessionGetMaxBufSize(virNetSASLSessionPtr sasl)
|
|
{
|
|
size_t ret;
|
|
virObjectLock(sasl);
|
|
ret = sasl->maxbufsize;
|
|
virObjectUnlock(sasl);
|
|
return ret;
|
|
}
|
|
|
|
ssize_t virNetSASLSessionEncode(virNetSASLSessionPtr sasl,
|
|
const char *input,
|
|
size_t inputLen,
|
|
const char **output,
|
|
size_t *outputlen)
|
|
{
|
|
unsigned inlen = inputLen;
|
|
unsigned outlen = 0;
|
|
int err;
|
|
ssize_t ret = -1;
|
|
|
|
virObjectLock(sasl);
|
|
if (inputLen > sasl->maxbufsize) {
|
|
virReportSystemError(EINVAL,
|
|
_("SASL data length %zu too long, max %zu"),
|
|
inputLen, sasl->maxbufsize);
|
|
goto cleanup;
|
|
}
|
|
|
|
err = sasl_encode(sasl->conn,
|
|
input,
|
|
inlen,
|
|
output,
|
|
&outlen);
|
|
*outputlen = outlen;
|
|
|
|
if (err != SASL_OK) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("failed to encode SASL data: %d (%s)"),
|
|
err, sasl_errstring(err, NULL, NULL));
|
|
goto cleanup;
|
|
}
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
virObjectUnlock(sasl);
|
|
return ret;
|
|
}
|
|
|
|
ssize_t virNetSASLSessionDecode(virNetSASLSessionPtr sasl,
|
|
const char *input,
|
|
size_t inputLen,
|
|
const char **output,
|
|
size_t *outputlen)
|
|
{
|
|
unsigned inlen = inputLen;
|
|
unsigned outlen = 0;
|
|
int err;
|
|
ssize_t ret = -1;
|
|
|
|
virObjectLock(sasl);
|
|
if (inputLen > sasl->maxbufsize) {
|
|
virReportSystemError(EINVAL,
|
|
_("SASL data length %zu too long, max %zu"),
|
|
inputLen, sasl->maxbufsize);
|
|
goto cleanup;
|
|
}
|
|
|
|
err = sasl_decode(sasl->conn,
|
|
input,
|
|
inlen,
|
|
output,
|
|
&outlen);
|
|
*outputlen = outlen;
|
|
if (err != SASL_OK) {
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
_("failed to decode SASL data: %d (%s)"),
|
|
err, sasl_errstring(err, NULL, NULL));
|
|
goto cleanup;
|
|
}
|
|
ret = 0;
|
|
|
|
cleanup:
|
|
virObjectUnlock(sasl);
|
|
return ret;
|
|
}
|
|
|
|
void virNetSASLContextDispose(void *obj G_GNUC_UNUSED)
|
|
{
|
|
return;
|
|
}
|
|
|
|
void virNetSASLSessionDispose(void *obj)
|
|
{
|
|
virNetSASLSessionPtr sasl = obj;
|
|
|
|
if (sasl->conn)
|
|
sasl_dispose(&sasl->conn);
|
|
VIR_FREE(sasl->callbacks);
|
|
}
|
|
|
|
#ifdef __APPLE__
|
|
VIR_WARNINGS_RESET
|
|
#endif
|