|
|
@@ -106,7 +106,7 @@ static Myconninfo *MyconninfoParse(char *userdb, char **errmsg) {
|
|
|
Myconninfo *co = (Myconninfo*)malloc(sizeof(Myconninfo));
|
|
|
ns_bzero(co,sizeof(Myconninfo));
|
|
|
if(userdb) {
|
|
|
- char *s0=turn_strdup(userdb);
|
|
|
+ char *s0=strdup(userdb);
|
|
|
char *s = s0;
|
|
|
|
|
|
while(s && *s) {
|
|
|
@@ -123,44 +123,44 @@ static Myconninfo *MyconninfoParse(char *userdb, char **errmsg) {
|
|
|
MyconninfoFree(co);
|
|
|
co = NULL;
|
|
|
if(errmsg) {
|
|
|
- *errmsg = turn_strdup(s);
|
|
|
+ *errmsg = strdup(s);
|
|
|
}
|
|
|
break;
|
|
|
}
|
|
|
|
|
|
*seq = 0;
|
|
|
if(!strcmp(s,"host"))
|
|
|
- co->host = turn_strdup(seq+1);
|
|
|
+ co->host = strdup(seq+1);
|
|
|
else if(!strcmp(s,"ip"))
|
|
|
- co->host = turn_strdup(seq+1);
|
|
|
+ co->host = strdup(seq+1);
|
|
|
else if(!strcmp(s,"addr"))
|
|
|
- co->host = turn_strdup(seq+1);
|
|
|
+ co->host = strdup(seq+1);
|
|
|
else if(!strcmp(s,"ipaddr"))
|
|
|
- co->host = turn_strdup(seq+1);
|
|
|
+ co->host = strdup(seq+1);
|
|
|
else if(!strcmp(s,"hostaddr"))
|
|
|
- co->host = turn_strdup(seq+1);
|
|
|
+ co->host = strdup(seq+1);
|
|
|
else if(!strcmp(s,"dbname"))
|
|
|
- co->dbname = turn_strdup(seq+1);
|
|
|
+ co->dbname = strdup(seq+1);
|
|
|
else if(!strcmp(s,"db"))
|
|
|
- co->dbname = turn_strdup(seq+1);
|
|
|
+ co->dbname = strdup(seq+1);
|
|
|
else if(!strcmp(s,"database"))
|
|
|
- co->dbname = turn_strdup(seq+1);
|
|
|
+ co->dbname = strdup(seq+1);
|
|
|
else if(!strcmp(s,"user"))
|
|
|
- co->user = turn_strdup(seq+1);
|
|
|
+ co->user = strdup(seq+1);
|
|
|
else if(!strcmp(s,"uname"))
|
|
|
- co->user = turn_strdup(seq+1);
|
|
|
+ co->user = strdup(seq+1);
|
|
|
else if(!strcmp(s,"name"))
|
|
|
- co->user = turn_strdup(seq+1);
|
|
|
+ co->user = strdup(seq+1);
|
|
|
else if(!strcmp(s,"username"))
|
|
|
- co->user = turn_strdup(seq+1);
|
|
|
+ co->user = strdup(seq+1);
|
|
|
else if(!strcmp(s,"password"))
|
|
|
- co->password = turn_strdup(seq+1);
|
|
|
+ co->password = strdup(seq+1);
|
|
|
else if(!strcmp(s,"pwd"))
|
|
|
- co->password = turn_strdup(seq+1);
|
|
|
+ co->password = strdup(seq+1);
|
|
|
else if(!strcmp(s,"passwd"))
|
|
|
- co->password = turn_strdup(seq+1);
|
|
|
+ co->password = strdup(seq+1);
|
|
|
else if(!strcmp(s,"secret"))
|
|
|
- co->password = turn_strdup(seq+1);
|
|
|
+ co->password = strdup(seq+1);
|
|
|
else if(!strcmp(s,"port"))
|
|
|
co->port = (unsigned int)atoi(seq+1);
|
|
|
else if(!strcmp(s,"p"))
|
|
|
@@ -172,30 +172,30 @@ static Myconninfo *MyconninfoParse(char *userdb, char **errmsg) {
|
|
|
else if(!strcmp(s,"read_timeout"))
|
|
|
co->read_timeout = (unsigned int)atoi(seq+1);
|
|
|
else if(!strcmp(s,"key"))
|
|
|
- co->key = turn_strdup(seq+1);
|
|
|
+ co->key = strdup(seq+1);
|
|
|
else if(!strcmp(s,"ssl-key"))
|
|
|
- co->key = turn_strdup(seq+1);
|
|
|
+ co->key = strdup(seq+1);
|
|
|
else if(!strcmp(s,"ca"))
|
|
|
- co->ca = turn_strdup(seq+1);
|
|
|
+ co->ca = strdup(seq+1);
|
|
|
else if(!strcmp(s,"ssl-ca"))
|
|
|
- co->ca = turn_strdup(seq+1);
|
|
|
+ co->ca = strdup(seq+1);
|
|
|
else if(!strcmp(s,"capath"))
|
|
|
- co->capath = turn_strdup(seq+1);
|
|
|
+ co->capath = strdup(seq+1);
|
|
|
else if(!strcmp(s,"ssl-capath"))
|
|
|
- co->capath = turn_strdup(seq+1);
|
|
|
+ co->capath = strdup(seq+1);
|
|
|
else if(!strcmp(s,"cert"))
|
|
|
- co->cert = turn_strdup(seq+1);
|
|
|
+ co->cert = strdup(seq+1);
|
|
|
else if(!strcmp(s,"ssl-cert"))
|
|
|
- co->cert = turn_strdup(seq+1);
|
|
|
+ co->cert = strdup(seq+1);
|
|
|
else if(!strcmp(s,"cipher"))
|
|
|
- co->cipher = turn_strdup(seq+1);
|
|
|
+ co->cipher = strdup(seq+1);
|
|
|
else if(!strcmp(s,"ssl-cipher"))
|
|
|
- co->cipher = turn_strdup(seq+1);
|
|
|
+ co->cipher = strdup(seq+1);
|
|
|
else {
|
|
|
MyconninfoFree(co);
|
|
|
co = NULL;
|
|
|
if(errmsg) {
|
|
|
- *errmsg = turn_strdup(s);
|
|
|
+ *errmsg = strdup(s);
|
|
|
}
|
|
|
break;
|
|
|
}
|
|
|
@@ -208,13 +208,13 @@ static Myconninfo *MyconninfoParse(char *userdb, char **errmsg) {
|
|
|
|
|
|
if(co) {
|
|
|
if(!(co->dbname))
|
|
|
- co->dbname=turn_strdup("0");
|
|
|
+ co->dbname=strdup("0");
|
|
|
if(!(co->host))
|
|
|
- co->host=turn_strdup("127.0.0.1");
|
|
|
+ co->host=strdup("127.0.0.1");
|
|
|
if(!(co->user))
|
|
|
- co->user=turn_strdup("");
|
|
|
+ co->user=strdup("");
|
|
|
if(!(co->password))
|
|
|
- co->password=turn_strdup("");
|
|
|
+ co->password=strdup("");
|
|
|
}
|
|
|
|
|
|
return co;
|
|
|
@@ -1045,7 +1045,7 @@ static void mysql_reread_realms(secrets_list_t * realms_list) {
|
|
|
char oval[513];
|
|
|
ns_bcopy(row[0],oval,sz);
|
|
|
oval[sz]=0;
|
|
|
- char *rval=turn_strdup(row[1]);
|
|
|
+ char *rval=strdup(row[1]);
|
|
|
get_realm(rval);
|
|
|
ur_string_map_value_type value = (ur_string_map_value_type)rval;
|
|
|
ur_string_map_put(o_to_realm_new, (const ur_string_map_key_type) oval, value);
|