73 lines
2.8 KiB
C
73 lines
2.8 KiB
C
/* auth.c
|
|
|
|
Subroutines having to do with authentication. */
|
|
|
|
/*
|
|
* Copyright (c) 1998-2000 Internet Software Consortium.
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
*
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* 3. Neither the name of The Internet Software Consortium nor the names
|
|
* of its contributors may be used to endorse or promote products derived
|
|
* from this software without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE INTERNET SOFTWARE CONSORTIUM AND
|
|
* CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
|
|
* INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
* MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
|
* DISCLAIMED. IN NO EVENT SHALL THE INTERNET SOFTWARE CONSORTIUM OR
|
|
* CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
|
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
|
|
* USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
|
|
* ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
|
|
* OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
|
|
* OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*
|
|
* This software has been written for the Internet Software Consortium
|
|
* by Ted Lemon in cooperation with Vixie Enterprises and Nominum, Inc.
|
|
* To learn more about the Internet Software Consortium, see
|
|
* ``http://www.isc.org/''. To learn more about Vixie Enterprises,
|
|
* see ``http://www.vix.com''. To learn more about Nominum, Inc., see
|
|
* ``http://www.nominum.com''.
|
|
*/
|
|
|
|
#ifndef lint
|
|
static char ocopyright[] =
|
|
"$Id: auth.c,v 1.1.1.1 2001/08/03 11:35:31 drochner Exp $ Copyright 1998-2000 The Internet Software Consortium.";
|
|
#endif
|
|
|
|
#include "dhcpd.h"
|
|
|
|
static struct hash_table *auth_key_hash;
|
|
|
|
void enter_auth_key (key_id, key)
|
|
struct data_string *key_id;
|
|
struct auth_key *key;
|
|
{
|
|
if (!auth_key_hash)
|
|
auth_key_hash = new_hash (0, 0, 0);
|
|
if (!auth_key_hash)
|
|
log_fatal ("Can't allocate authentication key hash.");
|
|
add_hash (auth_key_hash, key_id -> data, key_id -> len,
|
|
(unsigned char *)key);
|
|
}
|
|
|
|
const struct auth_key *auth_key_lookup (key_id)
|
|
struct data_string *key_id;
|
|
{
|
|
return (const struct auth_key *)hash_lookup (auth_key_hash,
|
|
key_id -> data,
|
|
key_id -> len);
|
|
}
|
|
|