#include "k5-int.h"
#include "int-proto.h"
static krb5_error_code krb5_keyblock_size
(krb5_context, krb5_pointer, size_t *);
static krb5_error_code krb5_keyblock_externalize
(krb5_context, krb5_pointer, krb5_octet **, size_t *);
static krb5_error_code krb5_keyblock_internalize
(krb5_context,krb5_pointer *, krb5_octet **, size_t *);
static const krb5_ser_entry krb5_keyblock_ser_entry = {
KV5M_KEYBLOCK,
krb5_keyblock_size,
krb5_keyblock_externalize,
krb5_keyblock_internalize
};
static krb5_error_code
krb5_keyblock_size(krb5_context kcontext, krb5_pointer arg, size_t *sizep)
{
krb5_error_code kret;
krb5_keyblock *keyblock;
kret = EINVAL;
if ((keyblock = (krb5_keyblock *) arg)) {
*sizep += (sizeof(krb5_int32) +
sizeof(krb5_int32) +
sizeof(krb5_int32) +
sizeof(krb5_int32) +
sizeof(krb5_int32) +
(size_t) keyblock->length);
kret = 0;
}
return(kret);
}
static krb5_error_code
krb5_keyblock_externalize(krb5_context kcontext, krb5_pointer arg, krb5_octet **buffer, size_t *lenremain)
{
krb5_error_code kret;
krb5_keyblock *keyblock;
size_t required;
krb5_octet *bp;
size_t remain;
required = 0;
bp = *buffer;
remain = *lenremain;
kret = EINVAL;
if ((keyblock = (krb5_keyblock *) arg)) {
kret = ENOMEM;
if (!krb5_keyblock_size(kcontext, arg, &required) &&
(required <= remain)) {
(void) krb5_ser_pack_int32(KV5M_KEYBLOCK, &bp, &remain);
(void) krb5_ser_pack_int32((krb5_int32) keyblock->enctype,
&bp, &remain);
(void) krb5_ser_pack_int32((krb5_int32) keyblock->length,
&bp, &remain);
(void) krb5_ser_pack_bytes(keyblock->contents,
(size_t) keyblock->length,
&bp, &remain);
(void) krb5_ser_pack_int32(KV5M_KEYBLOCK, &bp, &remain);
kret = 0;
*buffer = bp;
*lenremain = remain;
}
}
return(kret);
}
static krb5_error_code
krb5_keyblock_internalize(krb5_context kcontext, krb5_pointer *argp, krb5_octet **buffer, size_t *lenremain)
{
krb5_error_code kret;
krb5_keyblock *keyblock;
krb5_int32 ibuf;
krb5_octet *bp;
size_t remain;
bp = *buffer;
remain = *lenremain;
kret = EINVAL;
if (krb5_ser_unpack_int32(&ibuf, &bp, &remain))
ibuf = 0;
if (ibuf == KV5M_KEYBLOCK) {
kret = ENOMEM;
if ((remain >= (3*sizeof(krb5_int32))) &&
(keyblock = (krb5_keyblock *) malloc(sizeof(krb5_keyblock)))) {
memset(keyblock, 0, sizeof(krb5_keyblock));
(void) krb5_ser_unpack_int32(&ibuf, &bp, &remain);
keyblock->enctype = (krb5_enctype) ibuf;
(void) krb5_ser_unpack_int32(&ibuf, &bp, &remain);
keyblock->length = (int) ibuf;
if ((keyblock->contents = (krb5_octet *) malloc((size_t) (ibuf)))&&
!(kret = krb5_ser_unpack_bytes(keyblock->contents,
(size_t) ibuf,
&bp, &remain))) {
kret = krb5_ser_unpack_int32(&ibuf, &bp, &remain);
if (!kret && (ibuf == KV5M_KEYBLOCK)) {
kret = 0;
*buffer = bp;
*lenremain = remain;
keyblock->magic = KV5M_KEYBLOCK;
*argp = (krb5_pointer) keyblock;
}
else
kret = EINVAL;
}
if (kret) {
if (keyblock->contents)
free(keyblock->contents);
free(keyblock);
}
}
}
return(kret);
}
krb5_error_code
krb5_ser_keyblock_init(krb5_context kcontext)
{
return(krb5_register_serializer(kcontext, &krb5_keyblock_ser_entry));
}