#include "k5-int.h"
static krb5_error_code krb5_context_size
(krb5_context, krb5_pointer, size_t *);
static krb5_error_code krb5_context_externalize
(krb5_context, krb5_pointer, krb5_octet **, size_t *);
static krb5_error_code krb5_context_internalize
(krb5_context,krb5_pointer *, krb5_octet **, size_t *);
static krb5_error_code krb5_oscontext_size
(krb5_context, krb5_pointer, size_t *);
static krb5_error_code krb5_oscontext_externalize
(krb5_context, krb5_pointer, krb5_octet **, size_t *);
static krb5_error_code krb5_oscontext_internalize
(krb5_context,krb5_pointer *, krb5_octet **, size_t *);
krb5_error_code profile_ser_size
(krb5_context, krb5_pointer, size_t *);
krb5_error_code profile_ser_externalize
(krb5_context, krb5_pointer, krb5_octet **, size_t *);
krb5_error_code profile_ser_internalize
(krb5_context,krb5_pointer *, krb5_octet **, size_t *);
static const krb5_ser_entry krb5_context_ser_entry = {
KV5M_CONTEXT,
krb5_context_size,
krb5_context_externalize,
krb5_context_internalize
};
static const krb5_ser_entry krb5_oscontext_ser_entry = {
KV5M_OS_CONTEXT,
krb5_oscontext_size,
krb5_oscontext_externalize,
krb5_oscontext_internalize
};
static const krb5_ser_entry krb5_profile_ser_entry = {
PROF_MAGIC_PROFILE,
profile_ser_size,
profile_ser_externalize,
profile_ser_internalize
};
static krb5_error_code
krb5_context_size(krb5_context kcontext, krb5_pointer arg, size_t *sizep)
{
krb5_error_code kret;
size_t required;
krb5_context context;
kret = EINVAL;
if ((context = (krb5_context) arg)) {
required = (14 * sizeof(krb5_int32) +
(context->in_tkt_ktype_count * sizeof(krb5_int32)) +
(context->tgs_ktype_count * sizeof(krb5_int32)));
if (context->default_realm)
required += strlen(context->default_realm);
if (context->os_context)
kret = krb5_size_opaque(kcontext,
KV5M_OS_CONTEXT,
(krb5_pointer) context->os_context,
&required);
if (!kret && context->db_context)
kret = krb5_size_opaque(kcontext,
KV5M_DB_CONTEXT,
(krb5_pointer) context->db_context,
&required);
if (!kret && context->profile)
kret = krb5_size_opaque(kcontext,
PROF_MAGIC_PROFILE,
(krb5_pointer) context->profile,
&required);
}
if (!kret)
*sizep += required;
return(kret);
}
static krb5_error_code
krb5_context_externalize(krb5_context kcontext, krb5_pointer arg, krb5_octet **buffer, size_t *lenremain)
{
krb5_error_code kret;
krb5_context context;
size_t required;
krb5_octet *bp;
size_t remain;
int i;
required = 0;
bp = *buffer;
remain = *lenremain;
context = (krb5_context) arg;
if (!context)
return (EINVAL);
KRB5_VERIFY_MAGIC(context, KV5M_CONTEXT);
if ((kret = krb5_context_size(kcontext, arg, &required)))
return (kret);
if (required > remain)
return (ENOMEM);
kret = krb5_ser_pack_int32(KV5M_CONTEXT, &bp, &remain);
if (kret)
return (kret);
kret = krb5_ser_pack_int32((context->default_realm) ?
(krb5_int32) strlen(context->default_realm) : 0,
&bp, &remain);
if (kret)
return (kret);
if (context->default_realm) {
kret = krb5_ser_pack_bytes((krb5_octet *) context->default_realm,
strlen(context->default_realm),
&bp, &remain);
if (kret)
return (kret);
}
kret = krb5_ser_pack_int32((krb5_int32) context->in_tkt_ktype_count,
&bp, &remain);
if (kret)
return (kret);
for (i=0; i<context->in_tkt_ktype_count; i++) {
kret = krb5_ser_pack_int32((krb5_int32) context->in_tkt_ktypes[i],
&bp, &remain);
if (kret)
return (kret);
}
kret = krb5_ser_pack_int32((krb5_int32) context->tgs_ktype_count,
&bp, &remain);
if (kret)
return (kret);
for (i=0; i<context->tgs_ktype_count; i++) {
kret = krb5_ser_pack_int32((krb5_int32) context->tgs_ktypes[i],
&bp, &remain);
if (kret)
return (kret);
}
kret = krb5_ser_pack_int32((krb5_int32) context->clockskew,
&bp, &remain);
if (kret)
return (kret);
kret = krb5_ser_pack_int32((krb5_int32) context->kdc_req_sumtype,
&bp, &remain);
if (kret)
return (kret);
kret = krb5_ser_pack_int32((krb5_int32) context->default_ap_req_sumtype,
&bp, &remain);
if (kret)
return (kret);
kret = krb5_ser_pack_int32((krb5_int32) context->default_safe_sumtype,
&bp, &remain);
if (kret)
return (kret);
kret = krb5_ser_pack_int32((krb5_int32) context->kdc_default_options,
&bp, &remain);
if (kret)
return (kret);
kret = krb5_ser_pack_int32((krb5_int32) context->library_options,
&bp, &remain);
if (kret)
return (kret);
kret = krb5_ser_pack_int32((krb5_int32) context->profile_secure,
&bp, &remain);
if (kret)
return (kret);
kret = krb5_ser_pack_int32((krb5_int32) context->fcc_default_format,
&bp, &remain);
if (kret)
return (kret);
kret = krb5_ser_pack_int32((krb5_int32) context->scc_default_format,
&bp, &remain);
if (kret)
return (kret);
if (context->os_context) {
kret = krb5_externalize_opaque(kcontext, KV5M_OS_CONTEXT,
(krb5_pointer) context->os_context,
&bp, &remain);
if (kret)
return (kret);
}
if (context->db_context) {
kret = krb5_externalize_opaque(kcontext, KV5M_DB_CONTEXT,
(krb5_pointer) context->db_context,
&bp, &remain);
if (kret)
return (kret);
}
if (context->profile) {
kret = krb5_externalize_opaque(kcontext, PROF_MAGIC_PROFILE,
(krb5_pointer) context->profile,
&bp, &remain);
if (kret)
return (kret);
}
kret = krb5_ser_pack_int32(KV5M_CONTEXT, &bp, &remain);
if (kret)
return (kret);
*buffer = bp;
*lenremain = remain;
return (0);
}
static krb5_error_code
krb5_context_internalize(krb5_context kcontext, krb5_pointer *argp, krb5_octet **buffer, size_t *lenremain)
{
krb5_error_code kret;
krb5_context context;
krb5_int32 ibuf;
krb5_octet *bp;
size_t remain;
int i;
bp = *buffer;
remain = *lenremain;
if ((kret = krb5_ser_unpack_int32(&ibuf, &bp, &remain)))
return (EINVAL);
if (ibuf != KV5M_CONTEXT)
return (EINVAL);
context = (krb5_context) malloc(sizeof(struct _krb5_context));
if (!context)
return (ENOMEM);
memset(context, 0, sizeof(struct _krb5_context));
if ((kret = krb5_ser_unpack_int32(&ibuf, &bp, &remain)))
goto cleanup;
if (ibuf) {
context->default_realm = (char *) malloc((size_t) ibuf+1);
if (!context->default_realm) {
kret = ENOMEM;
goto cleanup;
}
kret = krb5_ser_unpack_bytes((krb5_octet *) context->default_realm,
(size_t) ibuf, &bp, &remain);
if (kret)
goto cleanup;
context->default_realm[ibuf] = '\0';
}
if ((kret = krb5_ser_unpack_int32(&ibuf, &bp, &remain)))
goto cleanup;
context->in_tkt_ktype_count = (int) ibuf;
context->in_tkt_ktypes = (krb5_enctype *) malloc(sizeof(krb5_enctype) *
(context->in_tkt_ktype_count+1));
if (!context->in_tkt_ktypes) {
kret = ENOMEM;
goto cleanup;
}
memset(context->in_tkt_ktypes, 0, (sizeof(krb5_enctype) *
(context->in_tkt_ktype_count + 1)));
for (i=0; i<context->in_tkt_ktype_count; i++) {
if ((kret = krb5_ser_unpack_int32(&ibuf, &bp, &remain)))
goto cleanup;
context->in_tkt_ktypes[i] = (krb5_enctype) ibuf;
}
if ((kret = krb5_ser_unpack_int32(&ibuf, &bp, &remain)))
goto cleanup;
context->tgs_ktype_count = (int) ibuf;
context->tgs_ktypes = (krb5_enctype *) malloc(sizeof(krb5_enctype) *
(context->tgs_ktype_count+1));
if (!context->tgs_ktypes) {
kret = ENOMEM;
goto cleanup;
}
memset(context->tgs_ktypes, 0, (sizeof(krb5_enctype) *
(context->tgs_ktype_count + 1)));
for (i=0; i<context->tgs_ktype_count; i++) {
if ((kret = krb5_ser_unpack_int32(&ibuf, &bp, &remain)))
goto cleanup;
context->tgs_ktypes[i] = (krb5_enctype) ibuf;
}
if ((kret = krb5_ser_unpack_int32(&ibuf, &bp, &remain)))
goto cleanup;
context->clockskew = (krb5_deltat) ibuf;
if ((kret = krb5_ser_unpack_int32(&ibuf, &bp, &remain)))
goto cleanup;
context->kdc_req_sumtype = (krb5_cksumtype) ibuf;
if ((kret = krb5_ser_unpack_int32(&ibuf, &bp, &remain)))
goto cleanup;
context->default_ap_req_sumtype = (krb5_cksumtype) ibuf;
if ((kret = krb5_ser_unpack_int32(&ibuf, &bp, &remain)))
goto cleanup;
context->default_safe_sumtype = (krb5_cksumtype) ibuf;
if ((kret = krb5_ser_unpack_int32(&ibuf, &bp, &remain)))
goto cleanup;
context->kdc_default_options = (krb5_flags) ibuf;
if ((kret = krb5_ser_unpack_int32(&ibuf, &bp, &remain)))
goto cleanup;
context->library_options = (krb5_flags) ibuf;
if ((kret = krb5_ser_unpack_int32(&ibuf, &bp, &remain)))
goto cleanup;
context->profile_secure = (krb5_boolean) ibuf;
if ((kret = krb5_ser_unpack_int32(&ibuf, &bp, &remain)))
goto cleanup;
context->fcc_default_format = (int) ibuf;
if ((kret = krb5_ser_unpack_int32(&ibuf, &bp, &remain)))
goto cleanup;
context->scc_default_format = (int) ibuf;
kret = krb5_internalize_opaque(kcontext, KV5M_OS_CONTEXT,
(krb5_pointer *) &context->os_context,
&bp, &remain);
if (kret && (kret != EINVAL) && (kret != ENOENT))
goto cleanup;
kret = krb5_internalize_opaque(kcontext, KV5M_DB_CONTEXT,
(krb5_pointer *) &context->db_context,
&bp, &remain);
if (kret && (kret != EINVAL) && (kret != ENOENT))
goto cleanup;
kret = krb5_internalize_opaque(kcontext, PROF_MAGIC_PROFILE,
(krb5_pointer *) &context->profile,
&bp, &remain);
if (kret && (kret != EINVAL) && (kret != ENOENT))
goto cleanup;
if ((kret = krb5_ser_unpack_int32(&ibuf, &bp, &remain)))
goto cleanup;
if (ibuf != KV5M_CONTEXT) {
kret = EINVAL;
goto cleanup;
}
context->magic = KV5M_CONTEXT;
*buffer = bp;
*lenremain = remain;
*argp = (krb5_pointer) context;
return 0;
cleanup:
if (context)
krb5_free_context(context);
return(kret);
}
static krb5_error_code
krb5_oscontext_size(krb5_context kcontext, krb5_pointer arg, size_t *sizep)
{
*sizep += (5*sizeof(krb5_int32));
return(0);
}
static krb5_error_code
krb5_oscontext_externalize(krb5_context kcontext, krb5_pointer arg, krb5_octet **buffer, size_t *lenremain)
{
krb5_error_code kret;
krb5_os_context os_ctx;
size_t required;
krb5_octet *bp;
size_t remain;
required = 0;
bp = *buffer;
remain = *lenremain;
kret = EINVAL;
if ((os_ctx = (krb5_os_context) arg)) {
kret = ENOMEM;
if (!krb5_oscontext_size(kcontext, arg, &required) &&
(required <= remain)) {
(void) krb5_ser_pack_int32(KV5M_OS_CONTEXT, &bp, &remain);
(void) krb5_ser_pack_int32(os_ctx->time_offset, &bp, &remain);
(void) krb5_ser_pack_int32(os_ctx->usec_offset, &bp, &remain);
(void) krb5_ser_pack_int32(os_ctx->os_flags, &bp, &remain);
(void) krb5_ser_pack_int32(KV5M_OS_CONTEXT, &bp, &remain);
kret = 0;
if (!kret) {
*buffer = bp;
*lenremain = remain;
}
}
}
return(kret);
}
static krb5_error_code
krb5_oscontext_internalize(krb5_context kcontext, krb5_pointer *argp, krb5_octet **buffer, size_t *lenremain)
{
krb5_error_code kret;
krb5_os_context os_ctx;
krb5_int32 ibuf;
krb5_octet *bp;
size_t remain;
bp = *buffer;
remain = *lenremain;
kret = EINVAL;
os_ctx = (krb5_os_context) NULL;
if (krb5_ser_unpack_int32(&ibuf, &bp, &remain))
ibuf = 0;
if (ibuf == KV5M_OS_CONTEXT) {
kret = ENOMEM;
if ((os_ctx = (krb5_os_context)
malloc(sizeof(struct _krb5_os_context))) &&
(remain >= 4*sizeof(krb5_int32))) {
memset(os_ctx, 0, sizeof(struct _krb5_os_context));
os_ctx->magic = KV5M_OS_CONTEXT;
(void) krb5_ser_unpack_int32(&os_ctx->time_offset, &bp, &remain);
(void) krb5_ser_unpack_int32(&os_ctx->usec_offset, &bp, &remain);
(void) krb5_ser_unpack_int32(&os_ctx->os_flags, &bp, &remain);
(void) krb5_ser_unpack_int32(&ibuf, &bp, &remain);
if (ibuf == KV5M_OS_CONTEXT) {
os_ctx->magic = KV5M_OS_CONTEXT;
kret = 0;
*buffer = bp;
*lenremain = remain;
} else
kret = EINVAL;
}
}
if (!kret) {
*argp = (krb5_pointer) os_ctx;
}
else {
if (os_ctx)
free(os_ctx);
}
return(kret);
}
krb5_error_code KRB5_CALLCONV
krb5_ser_context_init(krb5_context kcontext)
{
krb5_error_code kret;
kret = krb5_register_serializer(kcontext, &krb5_context_ser_entry);
if (!kret)
kret = krb5_register_serializer(kcontext, &krb5_oscontext_ser_entry);
if (!kret)
kret = krb5_register_serializer(kcontext, &krb5_profile_ser_entry);
return(kret);
}