X-Git-Url: https://git.octo.it/?p=collectd.git;a=blobdiff_plain;f=src%2Flibcollectdclient%2Fnetwork_parse.c;h=a8f6bd61c8b541a20451c122a9b8b0195448730b;hp=02e14b9b502b628ea190a13b09a9288b908576df;hb=d486225f89ea52d8ed2b4242eba2ad94c409f837;hpb=6e006e93c5c34d0022c2a46e111eeb843a793677 diff --git a/src/libcollectdclient/network_parse.c b/src/libcollectdclient/network_parse.c index 02e14b9b..a8f6bd61 100644 --- a/src/libcollectdclient/network_parse.c +++ b/src/libcollectdclient/network_parse.c @@ -23,9 +23,7 @@ * Florian octo Forster **/ -#if HAVE_CONFIG_H #include "config.h" -#endif #if !defined(__GNUC__) || !__GNUC__ #define __attribute__(x) /**/ @@ -33,34 +31,45 @@ #include "collectd/lcc_features.h" #include "collectd/network_parse.h" +#include "globals.h" #include #include #include +#include +#include +#include /* for be{16,64}toh */ #if HAVE_ENDIAN_H #include #elif HAVE_SYS_ENDIAN_H #include +#else /* fallback */ +#include "collectd/stdendian.h" #endif +#if HAVE_GCRYPT_H #define GCRYPT_NO_DEPRECATED #include +#endif #include #define DEBUG(...) printf(__VA_ARGS__) +#if HAVE_GCRYPT_H #if GCRYPT_VERSION_NUMBER < 0x010600 GCRY_THREAD_OPTION_PTHREAD_IMPL; #endif +#endif /* forward declaration because parse_sign_sha256()/parse_encrypt_aes256() and * network_parse() need to call each other. */ static int network_parse(void *data, size_t data_size, lcc_security_level_t sl, lcc_network_parse_options_t const *opts); -static int init_gcrypt() { +#if HAVE_GCRYPT_H +static int init_gcrypt(void) { /* http://lists.gnupg.org/pipermail/gcrypt-devel/2003-August/000458.html * Because you can't know in a library whether another library has * already initialized the library */ @@ -89,6 +98,7 @@ static int init_gcrypt() { gcry_control(GCRYCTL_INITIALIZATION_FINISHED); return 0; } +#endif typedef struct { uint8_t *data; @@ -211,7 +221,7 @@ static int parse_time(uint16_t type, void *payload, size_t payload_size, static double ntohd(double val) /* {{{ */ { - static int config = 0; + static int config; union { uint8_t byte[8]; @@ -296,8 +306,6 @@ static int parse_values(void *payload, size_t payload_size, state->values = calloc(sizeof(*state->values), state->values_len); state->values_types = calloc(sizeof(*state->values_types), state->values_len); if ((state->values == NULL) || (state->values_types == NULL)) { - free(state->values); - free(state->values_types); return ENOMEM; } @@ -341,6 +349,7 @@ static int parse_values(void *payload, size_t payload_size, return 0; } +#if HAVE_GCRYPT_H static int verify_sha256(void *payload, size_t payload_size, char const *username, char const *password, uint8_t hash_provided[32]) { @@ -373,6 +382,13 @@ static int verify_sha256(void *payload, size_t payload_size, return !!ret; } +#else /* !HAVE_GCRYPT_H */ +static int verify_sha256(void *payload, size_t payload_size, + char const *username, char const *password, + uint8_t hash_provided[32]) { + return ENOTSUP; +} +#endif static int parse_sign_sha256(void *signature, size_t signature_len, void *payload, size_t payload_size, @@ -408,6 +424,7 @@ static int parse_sign_sha256(void *signature, size_t signature_len, return network_parse(payload, payload_size, SIGN, opts); } +#if HAVE_GCRYPT_H static int decrypt_aes256(buffer_t *b, void *iv, size_t iv_size, char const *password) { gcry_cipher_hd_t cipher = NULL; @@ -419,7 +436,7 @@ static int decrypt_aes256(buffer_t *b, void *iv, size_t iv_size, uint8_t pwhash[32] = {0}; gcry_md_hash_buffer(GCRY_MD_SHA256, pwhash, password, strlen(password)); - fprintf(stderr, "sizeof(iv) = %zu\n", sizeof(iv)); + fprintf(stderr, "sizeof(iv) = %" PRIsz "\n", sizeof(iv)); if (gcry_cipher_setkey(cipher, pwhash, sizeof(pwhash)) || gcry_cipher_setiv(cipher, iv, iv_size) || gcry_cipher_decrypt(cipher, b->data, b->len, /* in = */ NULL, @@ -480,6 +497,12 @@ static int parse_encrypt_aes256(void *data, size_t data_size, return network_parse(b->data, b->len, ENCRYPT, opts); } +#else /* !HAVE_GCRYPT_H */ +static int parse_encrypt_aes256(void *data, size_t data_size, + lcc_network_parse_options_t const *opts) { + return ENOTSUP; +} +#endif static int network_parse(void *data, size_t data_size, lcc_security_level_t sl, lcc_network_parse_options_t const *opts) { @@ -498,7 +521,7 @@ static int network_parse(void *data, size_t data_size, lcc_security_level_t sl, if ((sz < 5) || (((size_t)sz - 4) > b->len)) { DEBUG("lcc_network_parse(): invalid 'sz' field: sz = %" PRIu16 - ", b->len = %zu\n", + ", b->len = %" PRIsz "\n", sz, b->len); return EINVAL; } @@ -535,6 +558,8 @@ static int network_parse(void *data, size_t data_size, lcc_security_level_t sl, case TYPE_VALUES: { lcc_value_list_t vl = state; if (parse_values(payload, sizeof(payload), &vl)) { + free(vl.values); + free(vl.values_types); DEBUG("lcc_network_parse(): parse_values failed.\n"); return EINVAL; } @@ -588,10 +613,14 @@ static int network_parse(void *data, size_t data_size, lcc_security_level_t sl, int lcc_network_parse(void *data, size_t data_size, lcc_network_parse_options_t opts) { if (opts.password_lookup) { +#if HAVE_GCRYPT_H int status; if ((status = init_gcrypt())) { return status; } +#else + return ENOTSUP; +#endif } return network_parse(data, data_size, NONE, &opts);