root/usr/src/lib/gss_mechs/mech_krb5/krb5/rcache/ser_rc.c
/*
 * Copyright 2008 Sun Microsystems, Inc.  All rights reserved.
 * Use is subject to license terms.
 */


/*
 * lib/krb5/rcache/ser_rc.c
 *
 * Copyright 1995 by the Massachusetts Institute of Technology.
 * All Rights Reserved.
 *
 * Export of this software from the United States of America may
 *   require a specific license from the United States Government.
 *   It is the responsibility of any person or organization contemplating
 *   export to obtain such a license before exporting.
 *
 * WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
 * distribute this software and its documentation for any purpose and
 * without fee is hereby granted, provided that the above copyright
 * notice appear in all copies and that both that copyright notice and
 * this permission notice appear in supporting documentation, and that
 * the name of M.I.T. not be used in advertising or publicity pertaining
 * to distribution of the software without specific, written prior
 * permission.  Furthermore if you modify this software you must label
 * your software as modified software and not distribute it in such a
 * fashion that it might be confused with the original M.I.T. software.
 * M.I.T. makes no representations about the suitability of
 * this software for any purpose.  It is provided "as is" without express
 * or implied warranty.
 *
 */

/*
 * ser_rcdfl.c - Serialize replay cache context.
 */
#include "k5-int.h"
#include "rc-int.h"

/*
 * Routines to deal with externalizing krb5_rcache.
 *      krb5_rcache_size();
 *      krb5_rcache_externalize();
 *      krb5_rcache_internalize();
 */
static krb5_error_code krb5_rcache_size
        (krb5_context, krb5_pointer, size_t *);
static krb5_error_code krb5_rcache_externalize
        (krb5_context, krb5_pointer, krb5_octet **, size_t *);
static krb5_error_code krb5_rcache_internalize
        (krb5_context,krb5_pointer *, krb5_octet **, size_t *);

/*
 * Serialization entry for this type.
 */
static const krb5_ser_entry krb5_rcache_ser_entry = {
    KV5M_RCACHE,                        /* Type                 */
    krb5_rcache_size,                   /* Sizer routine        */
    krb5_rcache_externalize,            /* Externalize routine  */
    krb5_rcache_internalize             /* Internalize routine  */
};

/*
 * krb5_rcache_size()   - Determine the size required to externalize
 *                                this krb5_rcache variant.
 */
static krb5_error_code
krb5_rcache_size(krb5_context kcontext, krb5_pointer arg, size_t *sizep)
{
    krb5_error_code     kret;
    krb5_rcache         rcache;
    size_t              required;

    kret = EINVAL;
    /* Solaris Kerberos */
    if ((rcache = (krb5_rcache) arg) != NULL) {
        /*
         * Saving FILE: variants of krb5_rcache requires at minimum:
         *      krb5_int32      for KV5M_RCACHE
         *      krb5_int32      for length of rcache name.
         *      krb5_int32      for KV5M_RCACHE
         */
        required = sizeof(krb5_int32) * 3;
        if (rcache->ops && rcache->ops->type)
            required += (strlen(rcache->ops->type)+1);

        /*
         * The rcache name is formed as follows:
         *      <type>:<name>
         */
        required += strlen(krb5_rc_get_name(kcontext, rcache));

        kret = 0;
        *sizep += required;
    }
    return(kret);
}

/*
 * krb5_rcache_externalize()    - Externalize the krb5_rcache.
 */
static krb5_error_code
krb5_rcache_externalize(krb5_context kcontext, krb5_pointer arg, krb5_octet **buffer, size_t *lenremain)
{
    krb5_error_code     kret;
    krb5_rcache         rcache;
    size_t              required;
    krb5_octet          *bp;
    size_t              remain;
    char                *rcname;
    size_t              namelen;
    char                *fnamep;

    required = 0;
    bp = *buffer;
    remain = *lenremain;
    kret = EINVAL;
    /* Solaris Kerberos */
    if ((rcache = (krb5_rcache) arg) != NULL) {
        kret = ENOMEM;
        if (!krb5_rcache_size(kcontext, arg, &required) &&
            (required <= remain)) {
            /* Our identifier */
            (void) krb5_ser_pack_int32(KV5M_RCACHE, &bp, &remain);

            /* Calculate the length of the name */
            namelen = (rcache->ops && rcache->ops->type) ?
                strlen(rcache->ops->type)+1 : 0;
            fnamep = krb5_rc_get_name(kcontext, rcache);
            namelen += (strlen(fnamep)+1);

            if ((rcname = (char *) malloc(namelen))) {
                /* Format the rcache name. */
                if (rcache->ops && rcache->ops->type)
                    sprintf(rcname, "%s:%s", rcache->ops->type, fnamep);
                else
                    strcpy(rcname, fnamep);

                /* Put the length of the file name */
                (void) krb5_ser_pack_int32((krb5_int32) strlen(rcname),
                                           &bp, &remain);

                /* Put the name */
                (void) krb5_ser_pack_bytes((krb5_octet *) rcname,
                                           strlen(rcname),
                                           &bp, &remain);

                /* Put the trailer */
                (void) krb5_ser_pack_int32(KV5M_RCACHE, &bp, &remain);
                kret = 0;
                *buffer = bp;
                *lenremain = remain;
                free(rcname);
            }
        }
    }
    return(kret);
}

/*
 * krb5_rcache_internalize()    - Internalize the krb5_rcache.
 */
static krb5_error_code
krb5_rcache_internalize(krb5_context kcontext, krb5_pointer *argp, krb5_octet **buffer, size_t *lenremain)
{
    krb5_error_code     kret;
    krb5_rcache         rcache;
    krb5_int32          ibuf;
    krb5_octet          *bp;
    size_t              remain;
    char                *rcname;

    bp = *buffer;
    remain = *lenremain;
    kret = EINVAL;
    /* Read our magic number */
    if (krb5_ser_unpack_int32(&ibuf, &bp, &remain))
        ibuf = 0;
    if (ibuf == KV5M_RCACHE) {
        kret = ENOMEM;

        /* Get the length of the rcache name */
        kret = krb5_ser_unpack_int32(&ibuf, &bp, &remain);

        if (!kret &&
            (rcname = (char *) malloc((size_t) (ibuf+1))) &&
            !(kret = krb5_ser_unpack_bytes((krb5_octet *) rcname,
                                           (size_t) ibuf,
                                           &bp, &remain))) {
            rcname[ibuf] = '\0';
            if (!(kret = krb5_rc_resolve_full(kcontext, &rcache, rcname))) {
                (void) krb5_rc_recover(kcontext, rcache);
                if (!kret &&
                    !(kret = krb5_ser_unpack_int32(&ibuf, &bp, &remain)) &&
                    (ibuf == KV5M_RCACHE)) {
                    *buffer = bp;
                    *lenremain = remain;
                    *argp = (krb5_pointer) rcache;
                }
                else /* Solaris Kerberos */
                    (void)krb5_rc_close(kcontext, rcache);
            }
            free(rcname);
        }
    }
    return(kret);
}

/*
 * Register the rcache serializer.
 */
krb5_error_code KRB5_CALLCONV
krb5_ser_rcache_init(krb5_context kcontext)
{
    return(krb5_register_serializer(kcontext, &krb5_rcache_ser_entry));
}