#include "k5-int.h"
#include "int-proto.h"
static krb5_error_code krb5_authenticator_size
(krb5_context, krb5_pointer, size_t *);
static krb5_error_code krb5_authenticator_externalize
(krb5_context, krb5_pointer, krb5_octet **, size_t *);
static krb5_error_code krb5_authenticator_internalize
(krb5_context,krb5_pointer *, krb5_octet **, size_t *);
static const krb5_ser_entry krb5_authenticator_ser_entry = {
KV5M_AUTHENTICATOR,
krb5_authenticator_size,
krb5_authenticator_externalize,
krb5_authenticator_internalize
};
static krb5_error_code
krb5_authenticator_size(krb5_context kcontext, krb5_pointer arg, size_t *sizep)
{
krb5_error_code kret;
krb5_authenticator *authenticator;
size_t required;
kret = EINVAL;
if ((authenticator = (krb5_authenticator *) arg)) {
required = sizeof(krb5_int32)*6;
if (authenticator->client)
kret = krb5_size_opaque(kcontext,
KV5M_PRINCIPAL,
(krb5_pointer) authenticator->client,
&required);
else
kret = 0;
if (!kret && authenticator->checksum)
kret = krb5_size_opaque(kcontext,
KV5M_CHECKSUM,
(krb5_pointer) authenticator->checksum,
&required);
if (!kret && authenticator->subkey)
kret = krb5_size_opaque(kcontext,
KV5M_KEYBLOCK,
(krb5_pointer) authenticator->subkey,
&required);
if (!kret && authenticator->authorization_data) {
int i;
for (i=0; !kret && authenticator->authorization_data[i]; i++) {
kret = krb5_size_opaque(kcontext,
KV5M_AUTHDATA,
(krb5_pointer) authenticator->
authorization_data[i],
&required);
}
}
}
if (!kret)
*sizep += required;
return(kret);
}
static krb5_error_code
krb5_authenticator_externalize(krb5_context kcontext, krb5_pointer arg, krb5_octet **buffer, size_t *lenremain)
{
krb5_error_code kret;
krb5_authenticator *authenticator;
size_t required;
krb5_octet *bp;
size_t remain;
int i;
required = 0;
bp = *buffer;
remain = *lenremain;
kret = EINVAL;
if ((authenticator = (krb5_authenticator *) arg)) {
kret = ENOMEM;
if (!krb5_authenticator_size(kcontext, arg, &required) &&
(required <= remain)) {
(void) krb5_ser_pack_int32(KV5M_AUTHENTICATOR, &bp, &remain);
(void) krb5_ser_pack_int32((krb5_int32) authenticator->ctime,
&bp, &remain);
(void) krb5_ser_pack_int32((krb5_int32) authenticator->cusec,
&bp, &remain);
(void) krb5_ser_pack_int32(authenticator->seq_number,
&bp, &remain);
if (authenticator->client)
kret = krb5_externalize_opaque(kcontext,
KV5M_PRINCIPAL,
(krb5_pointer)
authenticator->client,
&bp,
&remain);
else
kret = 0;
if (!kret && authenticator->checksum)
kret = krb5_externalize_opaque(kcontext,
KV5M_CHECKSUM,
(krb5_pointer)
authenticator->checksum,
&bp,
&remain);
if (!kret && authenticator->subkey)
kret = krb5_externalize_opaque(kcontext,
KV5M_KEYBLOCK,
(krb5_pointer)
authenticator->subkey,
&bp,
&remain);
if (!kret) {
if (authenticator->authorization_data)
for (i=0; authenticator->authorization_data[i]; i++);
else
i = 0;
(void) krb5_ser_pack_int32((krb5_int32) i, &bp, &remain);
if (authenticator->authorization_data) {
for (i=0; !kret && authenticator->authorization_data[i];
i++)
kret = krb5_externalize_opaque(kcontext,
KV5M_AUTHDATA,
(krb5_pointer)
authenticator->
authorization_data[i],
&bp,
&remain);
}
}
if (!kret) {
(void) krb5_ser_pack_int32(KV5M_AUTHENTICATOR, &bp, &remain);
*buffer = bp;
*lenremain = remain;
}
}
}
return(kret);
}
static krb5_error_code
krb5_authenticator_internalize(krb5_context kcontext, krb5_pointer *argp, krb5_octet **buffer, size_t *lenremain)
{
krb5_error_code kret;
krb5_authenticator *authenticator;
krb5_int32 ibuf;
krb5_octet *bp;
size_t remain;
int i;
krb5_int32 nadata;
size_t len;
bp = *buffer;
remain = *lenremain;
kret = EINVAL;
if (krb5_ser_unpack_int32(&ibuf, &bp, &remain))
ibuf = 0;
if (ibuf == KV5M_AUTHENTICATOR) {
kret = ENOMEM;
if ((remain >= (3*sizeof(krb5_int32))) &&
(authenticator = (krb5_authenticator *)
malloc(sizeof(krb5_authenticator)))) {
memset(authenticator, 0, sizeof(krb5_authenticator));
(void) krb5_ser_unpack_int32(&ibuf, &bp, &remain);
authenticator->ctime = (krb5_timestamp) ibuf;
(void) krb5_ser_unpack_int32(&ibuf, &bp, &remain);
authenticator->cusec = ibuf;
(void) krb5_ser_unpack_int32(&ibuf, &bp, &remain);
authenticator->seq_number = ibuf;
kret = 0;
kret = krb5_internalize_opaque(kcontext,
KV5M_PRINCIPAL,
(krb5_pointer *)
&authenticator->client,
&bp,
&remain);
if (kret == EINVAL)
kret = 0;
if (!kret) {
kret = krb5_internalize_opaque(kcontext,
KV5M_CHECKSUM,
(krb5_pointer *)
&authenticator->checksum,
&bp,
&remain);
if (kret == EINVAL)
kret = 0;
}
if (!kret) {
kret = krb5_internalize_opaque(kcontext,
KV5M_KEYBLOCK,
(krb5_pointer *)
&authenticator->subkey,
&bp,
&remain);
if (kret == EINVAL)
kret = 0;
}
if (!(kret = krb5_ser_unpack_int32(&ibuf, &bp, &remain))) {
nadata = ibuf;
len = (size_t) (nadata + 1);
if ((authenticator->authorization_data = (krb5_authdata **)
malloc(sizeof(krb5_authdata *) * len))) {
memset(authenticator->authorization_data, 0,
sizeof(krb5_authdata *) * len);
for (i=0; !kret && (i<nadata); i++) {
kret = krb5_internalize_opaque(kcontext,
KV5M_AUTHDATA,
(krb5_pointer *)
&authenticator->
authorization_data[i],
&bp,
&remain);
}
if (!kret) {
kret = krb5_ser_unpack_int32(&ibuf, &bp, &remain);
if (!kret && (ibuf == KV5M_AUTHENTICATOR))
authenticator->magic = KV5M_AUTHENTICATOR;
else
kret = EINVAL;
}
}
}
if (!kret) {
*buffer = bp;
*lenremain = remain;
*argp = (krb5_pointer) authenticator;
}
else
krb5_free_authenticator(kcontext, authenticator);
}
}
return(kret);
}
krb5_error_code
krb5_ser_authenticator_init(krb5_context kcontext)
{
return(krb5_register_serializer(kcontext, &krb5_authenticator_ser_entry));
}