/*
* lib/krb5/krb/ser_cksum.c
*
* Copyright 1995 by the Massachusetts Institute of Technology.
* All Rights Reserved.
*
* Export of this software from the United States of America may
* require a specific license from the United States Government.
* It is the responsibility of any person or organization contemplating
* export to obtain such a license before exporting.
*
* WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
* distribute this software and its documentation for any purpose and
* without fee is hereby granted, provided that the above copyright
* notice appear in all copies and that both that copyright notice and
* this permission notice appear in supporting documentation, and that
* the name of M.I.T. not be used in advertising or publicity pertaining
* to distribution of the software without specific, written prior
* permission. Furthermore if you modify this software you must label
* your software as modified software and not distribute it in such a
* fashion that it might be confused with the original M.I.T. software.
* M.I.T. makes no representations about the suitability of
* this software for any purpose. It is provided "as is" without express
* or implied warranty.
*
*/
/*
* ser_cksum.c - Serialize a krb5_checksum structure.
*/
#include "k5-int.h"
#include "int-proto.h"
/*
* Routines to deal with externalizing the krb5_checksum:
* krb5_checksum_esize();
* krb5_checksum_externalize();
* krb5_checksum_internalize();
*/
static krb5_error_code krb5_checksum_esize
(krb5_context, krb5_pointer, size_t *);
static krb5_error_code krb5_checksum_externalize
(krb5_context, krb5_pointer, krb5_octet **, size_t *);
static krb5_error_code krb5_checksum_internalize
(krb5_context,krb5_pointer *, krb5_octet **, size_t *);
/* Local data */
static const krb5_ser_entry krb5_checksum_ser_entry = {
KV5M_CHECKSUM, /* Type */
krb5_checksum_esize, /* Sizer routine */
krb5_checksum_externalize, /* Externalize routine */
krb5_checksum_internalize /* Internalize routine */
};
/*
* krb5_checksum_esize() - Determine the size required to externalize
* the krb5_checksum.
*/
/*ARGSUSED*/
static krb5_error_code
krb5_checksum_esize(krb5_context kcontext, krb5_pointer arg, size_t *sizep)
{
krb5_error_code kret;
krb5_checksum *checksum;
/*
* krb5_checksum requires:
* krb5_int32 for KV5M_CHECKSUM
* krb5_int32 for checksum_type
* krb5_int32 for length
* krb5_int32 for KV5M_CHECKSUM
* checksum->length for contents
*/
kret = EINVAL;
/* Solaris Kerberos */
checksum = (krb5_checksum *) arg;
if (checksum) {
*sizep += (sizeof(krb5_int32) +
sizeof(krb5_int32) +
sizeof(krb5_int32) +
sizeof(krb5_int32) +
(size_t) checksum->length);
kret = 0;
}
return(kret);
}
/*
* krb5_checksum_externalize() - Externalize the krb5_checksum.
*/
static krb5_error_code
krb5_checksum_externalize(krb5_context kcontext, krb5_pointer arg, krb5_octet **buffer, size_t *lenremain)
{
krb5_error_code kret;
krb5_checksum *checksum;
size_t required;
krb5_octet *bp;
size_t remain;
required = 0;
bp = *buffer;
remain = *lenremain;
kret = EINVAL;
/* Solaris Kerberos */
checksum = (krb5_checksum *) arg;
if (checksum) {
kret = ENOMEM;
if (!krb5_checksum_esize(kcontext, arg, &required) &&
(required <= remain)) {
/* Our identifier */
(void) krb5_ser_pack_int32(KV5M_CHECKSUM, &bp, &remain);
/* Our checksum_type */
(void) krb5_ser_pack_int32((krb5_int32) checksum->checksum_type,
&bp, &remain);
/* Our length */
(void) krb5_ser_pack_int32((krb5_int32) checksum->length,
&bp, &remain);
/* Our contents */
(void) krb5_ser_pack_bytes(checksum->contents,
(size_t) checksum->length,
&bp, &remain);
/* Finally, our trailer */
(void) krb5_ser_pack_int32(KV5M_CHECKSUM, &bp, &remain);
kret = 0;
*buffer = bp;
*lenremain = remain;
}
}
return(kret);
}
/*
* krb5_checksum_internalize() - Internalize the krb5_checksum.
*/
/*ARGSUSED*/
static krb5_error_code
krb5_checksum_internalize(krb5_context kcontext, krb5_pointer *argp, krb5_octet **buffer, size_t *lenremain)
{
krb5_error_code kret;
krb5_checksum *checksum;
krb5_int32 ibuf;
krb5_octet *bp;
size_t remain;
bp = *buffer;
remain = *lenremain;
kret = EINVAL;
/* Read our magic number */
if (krb5_ser_unpack_int32(&ibuf, &bp, &remain))
ibuf = 0;
if (ibuf == KV5M_CHECKSUM) {
kret = ENOMEM;
/* Get a checksum */
if ((remain >= (2*sizeof(krb5_int32))) &&
(checksum = (krb5_checksum *) MALLOC(sizeof(krb5_checksum)))) {
(void) memset(checksum, 0, sizeof(krb5_checksum));
/* Get the checksum_type */
(void) krb5_ser_unpack_int32(&ibuf, &bp, &remain);
checksum->checksum_type = (krb5_cksumtype) ibuf;
/* Get the length */
(void) krb5_ser_unpack_int32(&ibuf, &bp, &remain);
checksum->length = (int) ibuf;
/* Get the string */
/* Solaris Kerberos */
if (ibuf)
checksum->contents = (krb5_octet *)
MALLOC((size_t) (ibuf));
if (!ibuf ||
((checksum->contents) &&
!(kret = krb5_ser_unpack_bytes(checksum->contents,
(size_t) ibuf,
&bp, &remain)))) {
/* Get the trailer */
kret = krb5_ser_unpack_int32(&ibuf, &bp, &remain);
if (!kret && (ibuf == KV5M_CHECKSUM)) {
checksum->magic = KV5M_CHECKSUM;
*buffer = bp;
*lenremain = remain;
*argp = (krb5_pointer) checksum;
}
else
kret = EINVAL;
}
if (kret) {
if (checksum->contents)
FREE(checksum->contents, checksum->length);
FREE(checksum, sizeof (krb5_checksum));
}
}
}
return(kret);
}
/*
* Register the checksum serializer.
*/
krb5_error_code
krb5_ser_checksum_init(krb5_context kcontext)
{
return(krb5_register_serializer(kcontext, &krb5_checksum_ser_entry));
}