2 * Copyright (c) 1997-2006 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
17 * 3. Neither the name of the Institute nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34 #include "krb5_locl.h"
35 #include "store-int.h"
37 RCSID("$Id: store.c,v 1.59 2006/08/18 08:39:13 lha Exp $");
39 #define BYTEORDER_IS(SP, V) (((SP)->flags & KRB5_STORAGE_BYTEORDER_MASK) == (V))
40 #define BYTEORDER_IS_LE(SP) BYTEORDER_IS((SP), KRB5_STORAGE_BYTEORDER_LE)
41 #define BYTEORDER_IS_BE(SP) BYTEORDER_IS((SP), KRB5_STORAGE_BYTEORDER_BE)
42 #define BYTEORDER_IS_HOST(SP) (BYTEORDER_IS((SP), KRB5_STORAGE_BYTEORDER_HOST) || \
43 krb5_storage_is_flags((SP), KRB5_STORAGE_HOST_BYTEORDER))
45 void KRB5_LIB_FUNCTION
46 krb5_storage_set_flags(krb5_storage *sp, krb5_flags flags)
51 void KRB5_LIB_FUNCTION
52 krb5_storage_clear_flags(krb5_storage *sp, krb5_flags flags)
57 krb5_boolean KRB5_LIB_FUNCTION
58 krb5_storage_is_flags(krb5_storage *sp, krb5_flags flags)
60 return (sp->flags & flags) == flags;
63 void KRB5_LIB_FUNCTION
64 krb5_storage_set_byteorder(krb5_storage *sp, krb5_flags byteorder)
66 sp->flags &= ~KRB5_STORAGE_BYTEORDER_MASK;
67 sp->flags |= byteorder;
70 krb5_flags KRB5_LIB_FUNCTION
71 krb5_storage_get_byteorder(krb5_storage *sp, krb5_flags byteorder)
73 return sp->flags & KRB5_STORAGE_BYTEORDER_MASK;
76 off_t KRB5_LIB_FUNCTION
77 krb5_storage_seek(krb5_storage *sp, off_t offset, int whence)
79 return (*sp->seek)(sp, offset, whence);
82 krb5_ssize_t KRB5_LIB_FUNCTION
83 krb5_storage_read(krb5_storage *sp, void *buf, size_t len)
85 return sp->fetch(sp, buf, len);
88 krb5_ssize_t KRB5_LIB_FUNCTION
89 krb5_storage_write(krb5_storage *sp, const void *buf, size_t len)
91 return sp->store(sp, buf, len);
94 void KRB5_LIB_FUNCTION
95 krb5_storage_set_eof_code(krb5_storage *sp, int code)
100 krb5_ssize_t KRB5_LIB_FUNCTION
101 _krb5_put_int(void *buffer, unsigned long value, size_t size)
103 unsigned char *p = buffer;
105 for (i = size - 1; i >= 0; i--) {
112 krb5_ssize_t KRB5_LIB_FUNCTION
113 _krb5_get_int(void *buffer, unsigned long *value, size_t size)
115 unsigned char *p = buffer;
118 for (i = 0; i < size; i++)
124 krb5_error_code KRB5_LIB_FUNCTION
125 krb5_storage_free(krb5_storage *sp)
134 krb5_error_code KRB5_LIB_FUNCTION
135 krb5_storage_to_data(krb5_storage *sp, krb5_data *data)
141 pos = sp->seek(sp, 0, SEEK_CUR);
142 size = (size_t)sp->seek(sp, 0, SEEK_END);
143 ret = krb5_data_alloc (data, size);
145 sp->seek(sp, pos, SEEK_SET);
149 sp->seek(sp, 0, SEEK_SET);
150 sp->fetch(sp, data->data, data->length);
151 sp->seek(sp, pos, SEEK_SET);
156 static krb5_error_code
157 krb5_store_int(krb5_storage *sp,
166 _krb5_put_int(v, value, len);
167 ret = sp->store(sp, v, len);
169 return (ret<0)?errno:sp->eof_code;
173 krb5_error_code KRB5_LIB_FUNCTION
174 krb5_store_int32(krb5_storage *sp,
177 if(BYTEORDER_IS_HOST(sp))
178 value = htonl(value);
179 else if(BYTEORDER_IS_LE(sp))
180 value = bswap32(value);
181 return krb5_store_int(sp, value, 4);
184 krb5_error_code KRB5_LIB_FUNCTION
185 krb5_store_uint32(krb5_storage *sp,
188 return krb5_store_int32(sp, (int32_t)value);
191 static krb5_error_code
192 krb5_ret_int(krb5_storage *sp,
199 ret = sp->fetch(sp, v, len);
201 return (ret<0)?errno:sp->eof_code;
202 _krb5_get_int(v, &w, len);
207 krb5_error_code KRB5_LIB_FUNCTION
208 krb5_ret_int32(krb5_storage *sp,
211 krb5_error_code ret = krb5_ret_int(sp, value, 4);
214 if(BYTEORDER_IS_HOST(sp))
215 *value = htonl(*value);
216 else if(BYTEORDER_IS_LE(sp))
217 *value = bswap32(*value);
221 krb5_error_code KRB5_LIB_FUNCTION
222 krb5_ret_uint32(krb5_storage *sp,
228 ret = krb5_ret_int32(sp, &v);
230 *value = (uint32_t)v;
235 krb5_error_code KRB5_LIB_FUNCTION
236 krb5_store_int16(krb5_storage *sp,
239 if(BYTEORDER_IS_HOST(sp))
240 value = htons(value);
241 else if(BYTEORDER_IS_LE(sp))
242 value = bswap16(value);
243 return krb5_store_int(sp, value, 2);
246 krb5_error_code KRB5_LIB_FUNCTION
247 krb5_store_uint16(krb5_storage *sp,
250 return krb5_store_int16(sp, (int16_t)value);
253 krb5_error_code KRB5_LIB_FUNCTION
254 krb5_ret_int16(krb5_storage *sp,
259 ret = krb5_ret_int(sp, &v, 2);
263 if(BYTEORDER_IS_HOST(sp))
264 *value = htons(*value);
265 else if(BYTEORDER_IS_LE(sp))
266 *value = bswap16(*value);
270 krb5_error_code KRB5_LIB_FUNCTION
271 krb5_ret_uint16(krb5_storage *sp,
277 ret = krb5_ret_int16(sp, &v);
279 *value = (uint16_t)v;
284 krb5_error_code KRB5_LIB_FUNCTION
285 krb5_store_int8(krb5_storage *sp,
290 ret = sp->store(sp, &value, sizeof(value));
291 if (ret != sizeof(value))
292 return (ret<0)?errno:sp->eof_code;
296 krb5_error_code KRB5_LIB_FUNCTION
297 krb5_store_uint8(krb5_storage *sp,
300 return krb5_store_int8(sp, (int8_t)value);
303 krb5_error_code KRB5_LIB_FUNCTION
304 krb5_ret_int8(krb5_storage *sp,
309 ret = sp->fetch(sp, value, sizeof(*value));
310 if (ret != sizeof(*value))
311 return (ret<0)?errno:sp->eof_code;
315 krb5_error_code KRB5_LIB_FUNCTION
316 krb5_ret_uint8(krb5_storage *sp,
322 ret = krb5_ret_int8(sp, &v);
329 krb5_error_code KRB5_LIB_FUNCTION
330 krb5_store_data(krb5_storage *sp,
334 ret = krb5_store_int32(sp, data.length);
337 ret = sp->store(sp, data.data, data.length);
338 if(ret != data.length){
346 krb5_error_code KRB5_LIB_FUNCTION
347 krb5_ret_data(krb5_storage *sp,
353 ret = krb5_ret_int32(sp, &size);
356 ret = krb5_data_alloc (data, size);
360 ret = sp->fetch(sp, data->data, size);
362 return (ret < 0)? errno : sp->eof_code;
367 krb5_error_code KRB5_LIB_FUNCTION
368 krb5_store_string(krb5_storage *sp, const char *s)
371 data.length = strlen(s);
372 data.data = rk_UNCONST(s);
373 return krb5_store_data(sp, data);
376 krb5_error_code KRB5_LIB_FUNCTION
377 krb5_ret_string(krb5_storage *sp,
382 ret = krb5_ret_data(sp, &data);
385 *string = realloc(data.data, data.length + 1);
390 (*string)[data.length] = 0;
394 krb5_error_code KRB5_LIB_FUNCTION
395 krb5_store_stringz(krb5_storage *sp, const char *s)
397 size_t len = strlen(s) + 1;
400 ret = sp->store(sp, s, len);
410 krb5_error_code KRB5_LIB_FUNCTION
411 krb5_ret_stringz(krb5_storage *sp,
419 while((ret = sp->fetch(sp, &c, 1)) == 1){
423 tmp = realloc (s, len);
443 krb5_error_code KRB5_LIB_FUNCTION
444 krb5_store_stringnl(krb5_storage *sp, const char *s)
446 size_t len = strlen(s);
449 ret = sp->store(sp, s, len);
456 ret = sp->store(sp, "\n", 1);
468 krb5_error_code KRB5_LIB_FUNCTION
469 krb5_ret_stringnl(krb5_storage *sp,
478 while((ret = sp->fetch(sp, &c, 1)) == 1){
485 if (expect_nl && c != '\n') {
487 return KRB5_BADMSGTYPE;
491 tmp = realloc (s, len);
514 krb5_error_code KRB5_LIB_FUNCTION
515 krb5_store_principal(krb5_storage *sp,
516 krb5_const_principal p)
521 if(!krb5_storage_is_flags(sp, KRB5_STORAGE_PRINCIPAL_NO_NAME_TYPE)) {
522 ret = krb5_store_int32(sp, p->name.name_type);
525 if(krb5_storage_is_flags(sp, KRB5_STORAGE_PRINCIPAL_WRONG_NUM_COMPONENTS))
526 ret = krb5_store_int32(sp, p->name.name_string.len + 1);
528 ret = krb5_store_int32(sp, p->name.name_string.len);
531 ret = krb5_store_string(sp, p->realm);
533 for(i = 0; i < p->name.name_string.len; i++){
534 ret = krb5_store_string(sp, p->name.name_string.val[i]);
540 krb5_error_code KRB5_LIB_FUNCTION
541 krb5_ret_principal(krb5_storage *sp,
542 krb5_principal *princ)
550 p = calloc(1, sizeof(*p));
554 if(krb5_storage_is_flags(sp, KRB5_STORAGE_PRINCIPAL_NO_NAME_TYPE))
555 type = KRB5_NT_UNKNOWN;
556 else if((ret = krb5_ret_int32(sp, &type))){
560 if((ret = krb5_ret_int32(sp, &ncomp))){
564 if(krb5_storage_is_flags(sp, KRB5_STORAGE_PRINCIPAL_WRONG_NUM_COMPONENTS))
570 p->name.name_type = type;
571 p->name.name_string.len = ncomp;
572 ret = krb5_ret_string(sp, &p->realm);
577 p->name.name_string.val = calloc(ncomp, sizeof(*p->name.name_string.val));
578 if(p->name.name_string.val == NULL && ncomp != 0){
582 for(i = 0; i < ncomp; i++){
583 ret = krb5_ret_string(sp, &p->name.name_string.val[i]);
586 free(p->name.name_string.val[i--]);
596 krb5_error_code KRB5_LIB_FUNCTION
597 krb5_store_keyblock(krb5_storage *sp, krb5_keyblock p)
600 ret = krb5_store_int16(sp, p.keytype);
603 if(krb5_storage_is_flags(sp, KRB5_STORAGE_KEYBLOCK_KEYTYPE_TWICE)){
604 /* this should really be enctype, but it is the same as
606 ret = krb5_store_int16(sp, p.keytype);
610 ret = krb5_store_data(sp, p.keyvalue);
614 krb5_error_code KRB5_LIB_FUNCTION
615 krb5_ret_keyblock(krb5_storage *sp, krb5_keyblock *p)
620 ret = krb5_ret_int16(sp, &tmp);
624 if(krb5_storage_is_flags(sp, KRB5_STORAGE_KEYBLOCK_KEYTYPE_TWICE)){
625 ret = krb5_ret_int16(sp, &tmp);
629 ret = krb5_ret_data(sp, &p->keyvalue);
633 krb5_error_code KRB5_LIB_FUNCTION
634 krb5_store_times(krb5_storage *sp, krb5_times times)
637 ret = krb5_store_int32(sp, times.authtime);
639 ret = krb5_store_int32(sp, times.starttime);
641 ret = krb5_store_int32(sp, times.endtime);
643 ret = krb5_store_int32(sp, times.renew_till);
647 krb5_error_code KRB5_LIB_FUNCTION
648 krb5_ret_times(krb5_storage *sp, krb5_times *times)
652 ret = krb5_ret_int32(sp, &tmp);
653 times->authtime = tmp;
655 ret = krb5_ret_int32(sp, &tmp);
656 times->starttime = tmp;
658 ret = krb5_ret_int32(sp, &tmp);
659 times->endtime = tmp;
661 ret = krb5_ret_int32(sp, &tmp);
662 times->renew_till = tmp;
666 krb5_error_code KRB5_LIB_FUNCTION
667 krb5_store_address(krb5_storage *sp, krb5_address p)
670 ret = krb5_store_int16(sp, p.addr_type);
672 ret = krb5_store_data(sp, p.address);
676 krb5_error_code KRB5_LIB_FUNCTION
677 krb5_ret_address(krb5_storage *sp, krb5_address *adr)
681 ret = krb5_ret_int16(sp, &t);
684 ret = krb5_ret_data(sp, &adr->address);
688 krb5_error_code KRB5_LIB_FUNCTION
689 krb5_store_addrs(krb5_storage *sp, krb5_addresses p)
693 ret = krb5_store_int32(sp, p.len);
695 for(i = 0; i<p.len; i++){
696 ret = krb5_store_address(sp, p.val[i]);
702 krb5_error_code KRB5_LIB_FUNCTION
703 krb5_ret_addrs(krb5_storage *sp, krb5_addresses *adr)
709 ret = krb5_ret_int32(sp, &tmp);
712 ALLOC(adr->val, adr->len);
713 if (adr->val == NULL && adr->len != 0)
715 for(i = 0; i < adr->len; i++){
716 ret = krb5_ret_address(sp, &adr->val[i]);
722 krb5_error_code KRB5_LIB_FUNCTION
723 krb5_store_authdata(krb5_storage *sp, krb5_authdata auth)
727 ret = krb5_store_int32(sp, auth.len);
729 for(i = 0; i < auth.len; i++){
730 ret = krb5_store_int16(sp, auth.val[i].ad_type);
732 ret = krb5_store_data(sp, auth.val[i].ad_data);
738 krb5_error_code KRB5_LIB_FUNCTION
739 krb5_ret_authdata(krb5_storage *sp, krb5_authdata *auth)
745 ret = krb5_ret_int32(sp, &tmp);
747 ALLOC_SEQ(auth, tmp);
748 if (auth->val == NULL && tmp != 0)
750 for(i = 0; i < tmp; i++){
751 ret = krb5_ret_int16(sp, &tmp2);
753 auth->val[i].ad_type = tmp2;
754 ret = krb5_ret_data(sp, &auth->val[i].ad_data);
765 for (i = 0; i < 32; i++) {
766 r = r << 1 | (b & 1);
777 krb5_error_code KRB5_LIB_FUNCTION
778 krb5_store_creds(krb5_storage *sp, krb5_creds *creds)
782 ret = krb5_store_principal(sp, creds->client);
785 ret = krb5_store_principal(sp, creds->server);
788 ret = krb5_store_keyblock(sp, creds->session);
791 ret = krb5_store_times(sp, creds->times);
794 ret = krb5_store_int8(sp, creds->second_ticket.length != 0); /* is_skey */
798 if(krb5_storage_is_flags(sp, KRB5_STORAGE_CREDS_FLAGS_WRONG_BITORDER))
799 ret = krb5_store_int32(sp, creds->flags.i);
801 ret = krb5_store_int32(sp, bitswap32(TicketFlags2int(creds->flags.b)));
805 ret = krb5_store_addrs(sp, creds->addresses);
808 ret = krb5_store_authdata(sp, creds->authdata);
811 ret = krb5_store_data(sp, creds->ticket);
814 ret = krb5_store_data(sp, creds->second_ticket);
818 krb5_error_code KRB5_LIB_FUNCTION
819 krb5_ret_creds(krb5_storage *sp, krb5_creds *creds)
825 memset(creds, 0, sizeof(*creds));
826 ret = krb5_ret_principal (sp, &creds->client);
827 if(ret) goto cleanup;
828 ret = krb5_ret_principal (sp, &creds->server);
829 if(ret) goto cleanup;
830 ret = krb5_ret_keyblock (sp, &creds->session);
831 if(ret) goto cleanup;
832 ret = krb5_ret_times (sp, &creds->times);
833 if(ret) goto cleanup;
834 ret = krb5_ret_int8 (sp, &dummy8);
835 if(ret) goto cleanup;
836 ret = krb5_ret_int32 (sp, &dummy32);
837 if(ret) goto cleanup;
839 * Runtime detect the what is the higher bits of the bitfield. If
840 * any of the higher bits are set in the input data, its either a
841 * new ticket flag (and this code need to be removed), or its a
842 * MIT cache (or new Heimdal cache), lets change it to our current
846 uint32_t mask = 0xffff0000;
848 creds->flags.b.anonymous = 1;
849 if (creds->flags.i & mask)
852 dummy32 = bitswap32(dummy32);
854 creds->flags.i = dummy32;
855 ret = krb5_ret_addrs (sp, &creds->addresses);
856 if(ret) goto cleanup;
857 ret = krb5_ret_authdata (sp, &creds->authdata);
858 if(ret) goto cleanup;
859 ret = krb5_ret_data (sp, &creds->ticket);
860 if(ret) goto cleanup;
861 ret = krb5_ret_data (sp, &creds->second_ticket);
865 krb5_free_cred_contents(context, creds); /* XXX */
871 #define SC_CLIENT_PRINCIPAL 0x0001
872 #define SC_SERVER_PRINCIPAL 0x0002
873 #define SC_SESSION_KEY 0x0004
874 #define SC_TICKET 0x0008
875 #define SC_SECOND_TICKET 0x0010
876 #define SC_AUTHDATA 0x0020
877 #define SC_ADDRESSES 0x0040
883 krb5_error_code KRB5_LIB_FUNCTION
884 krb5_store_creds_tag(krb5_storage *sp, krb5_creds *creds)
890 header |= SC_CLIENT_PRINCIPAL;
892 header |= SC_SERVER_PRINCIPAL;
893 if (creds->session.keyvalue.data)
894 header |= SC_SESSION_KEY;
895 if (creds->ticket.data)
897 if (creds->second_ticket.length)
898 header |= SC_SECOND_TICKET;
899 if (creds->authdata.len)
900 header |= SC_AUTHDATA;
901 if (creds->addresses.len)
902 header |= SC_ADDRESSES;
904 ret = krb5_store_int32(sp, header);
907 ret = krb5_store_principal(sp, creds->client);
913 ret = krb5_store_principal(sp, creds->server);
918 if (creds->session.keyvalue.data) {
919 ret = krb5_store_keyblock(sp, creds->session);
924 ret = krb5_store_times(sp, creds->times);
927 ret = krb5_store_int8(sp, creds->second_ticket.length != 0); /* is_skey */
931 ret = krb5_store_int32(sp, bitswap32(TicketFlags2int(creds->flags.b)));
935 if (creds->addresses.len) {
936 ret = krb5_store_addrs(sp, creds->addresses);
941 if (creds->authdata.len) {
942 ret = krb5_store_authdata(sp, creds->authdata);
947 if (creds->ticket.data) {
948 ret = krb5_store_data(sp, creds->ticket);
953 if (creds->second_ticket.data) {
954 ret = krb5_store_data(sp, creds->second_ticket);
962 krb5_error_code KRB5_LIB_FUNCTION
963 krb5_ret_creds_tag(krb5_storage *sp,
968 int32_t dummy32, header;
970 memset(creds, 0, sizeof(*creds));
972 ret = krb5_ret_int32 (sp, &header);
973 if (ret) goto cleanup;
975 if (header & SC_CLIENT_PRINCIPAL) {
976 ret = krb5_ret_principal (sp, &creds->client);
977 if(ret) goto cleanup;
979 if (header & SC_SERVER_PRINCIPAL) {
980 ret = krb5_ret_principal (sp, &creds->server);
981 if(ret) goto cleanup;
983 if (header & SC_SESSION_KEY) {
984 ret = krb5_ret_keyblock (sp, &creds->session);
985 if(ret) goto cleanup;
987 ret = krb5_ret_times (sp, &creds->times);
988 if(ret) goto cleanup;
989 ret = krb5_ret_int8 (sp, &dummy8);
990 if(ret) goto cleanup;
991 ret = krb5_ret_int32 (sp, &dummy32);
992 if(ret) goto cleanup;
994 * Runtime detect the what is the higher bits of the bitfield. If
995 * any of the higher bits are set in the input data, its either a
996 * new ticket flag (and this code need to be removed), or its a
997 * MIT cache (or new Heimdal cache), lets change it to our current
1001 uint32_t mask = 0xffff0000;
1003 creds->flags.b.anonymous = 1;
1004 if (creds->flags.i & mask)
1007 dummy32 = bitswap32(dummy32);
1009 creds->flags.i = dummy32;
1010 if (header & SC_ADDRESSES) {
1011 ret = krb5_ret_addrs (sp, &creds->addresses);
1012 if(ret) goto cleanup;
1014 if (header & SC_AUTHDATA) {
1015 ret = krb5_ret_authdata (sp, &creds->authdata);
1016 if(ret) goto cleanup;
1018 if (header & SC_TICKET) {
1019 ret = krb5_ret_data (sp, &creds->ticket);
1020 if(ret) goto cleanup;
1022 if (header & SC_SECOND_TICKET) {
1023 ret = krb5_ret_data (sp, &creds->second_ticket);
1024 if(ret) goto cleanup;
1030 krb5_free_cred_contents(context, creds); /* XXX */