#include "k5-int.h"
#include "int-proto.h"
static krb5_error_code krb5_checksum_esize
(krb5_context, krb5_pointer, size_t *);
static krb5_error_code krb5_checksum_externalize
(krb5_context, krb5_pointer, krb5_octet **, size_t *);
static krb5_error_code krb5_checksum_internalize
(krb5_context,krb5_pointer *, krb5_octet **, size_t *);
static const krb5_ser_entry krb5_checksum_ser_entry = {
KV5M_CHECKSUM,
krb5_checksum_esize,
krb5_checksum_externalize,
krb5_checksum_internalize
};
static krb5_error_code
krb5_checksum_esize(krb5_context kcontext, krb5_pointer arg, size_t *sizep)
{
krb5_error_code kret;
krb5_checksum *checksum;
kret = EINVAL;
if ((checksum = (krb5_checksum *) arg)) {
*sizep += (sizeof(krb5_int32) +
sizeof(krb5_int32) +
sizeof(krb5_int32) +
sizeof(krb5_int32) +
(size_t) checksum->length);
kret = 0;
}
return(kret);
}
static krb5_error_code
krb5_checksum_externalize(krb5_context kcontext, krb5_pointer arg, krb5_octet **buffer, size_t *lenremain)
{
krb5_error_code kret;
krb5_checksum *checksum;
size_t required;
krb5_octet *bp;
size_t remain;
required = 0;
bp = *buffer;
remain = *lenremain;
kret = EINVAL;
if ((checksum = (krb5_checksum *) arg)) {
kret = ENOMEM;
if (!krb5_checksum_esize(kcontext, arg, &required) &&
(required <= remain)) {
(void) krb5_ser_pack_int32(KV5M_CHECKSUM, &bp, &remain);
(void) krb5_ser_pack_int32((krb5_int32) checksum->checksum_type,
&bp, &remain);
(void) krb5_ser_pack_int32((krb5_int32) checksum->length,
&bp, &remain);
(void) krb5_ser_pack_bytes(checksum->contents,
(size_t) checksum->length,
&bp, &remain);
(void) krb5_ser_pack_int32(KV5M_CHECKSUM, &bp, &remain);
kret = 0;
*buffer = bp;
*lenremain = remain;
}
}
return(kret);
}
static krb5_error_code
krb5_checksum_internalize(krb5_context kcontext, krb5_pointer *argp, krb5_octet **buffer, size_t *lenremain)
{
krb5_error_code kret;
krb5_checksum *checksum;
krb5_int32 ibuf;
krb5_octet *bp;
size_t remain;
bp = *buffer;
remain = *lenremain;
kret = EINVAL;
if (krb5_ser_unpack_int32(&ibuf, &bp, &remain))
ibuf = 0;
if (ibuf == KV5M_CHECKSUM) {
kret = ENOMEM;
if ((remain >= (2*sizeof(krb5_int32))) &&
(checksum = (krb5_checksum *) malloc(sizeof(krb5_checksum)))) {
memset(checksum, 0, sizeof(krb5_checksum));
(void) krb5_ser_unpack_int32(&ibuf, &bp, &remain);
checksum->checksum_type = (krb5_cksumtype) ibuf;
(void) krb5_ser_unpack_int32(&ibuf, &bp, &remain);
checksum->length = (int) ibuf;
if (!ibuf ||
((checksum->contents = (krb5_octet *)
malloc((size_t) (ibuf))) &&
!(kret = krb5_ser_unpack_bytes(checksum->contents,
(size_t) ibuf,
&bp, &remain)))) {
kret = krb5_ser_unpack_int32(&ibuf, &bp, &remain);
if (!kret && (ibuf == KV5M_CHECKSUM)) {
checksum->magic = KV5M_CHECKSUM;
*buffer = bp;
*lenremain = remain;
*argp = (krb5_pointer) checksum;
}
else
kret = EINVAL;
}
if (kret) {
if (checksum->contents)
free(checksum->contents);
free(checksum);
}
}
}
return(kret);
}
krb5_error_code
krb5_ser_checksum_init(krb5_context kcontext)
{
return(krb5_register_serializer(kcontext, &krb5_checksum_ser_entry));
}