Path: blob/main/crypto/heimdal/lib/kadm5/marshall.c
34907 views
/*1* Copyright (c) 1997 - 1999 Kungliga Tekniska Högskolan2* (Royal Institute of Technology, Stockholm, Sweden).3* All rights reserved.4*5* Redistribution and use in source and binary forms, with or without6* modification, are permitted provided that the following conditions7* are met:8*9* 1. Redistributions of source code must retain the above copyright10* notice, this list of conditions and the following disclaimer.11*12* 2. Redistributions in binary form must reproduce the above copyright13* notice, this list of conditions and the following disclaimer in the14* documentation and/or other materials provided with the distribution.15*16* 3. Neither the name of the Institute nor the names of its contributors17* may be used to endorse or promote products derived from this software18* without specific prior written permission.19*20* THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND21* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE22* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE23* ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE24* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL25* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS26* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)27* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT28* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY29* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF30* SUCH DAMAGE.31*/3233#include "kadm5_locl.h"3435RCSID("$Id$");36#define CHECK(e) do { if (e) return EINVAL; } while (0)3738kadm5_ret_t39kadm5_store_key_data(krb5_storage *sp,40krb5_key_data *key)41{42krb5_data c;43CHECK(krb5_store_int32(sp, key->key_data_ver));44CHECK(krb5_store_int32(sp, key->key_data_kvno));45CHECK(krb5_store_int32(sp, key->key_data_type[0]));46c.length = key->key_data_length[0];47c.data = key->key_data_contents[0];48CHECK(krb5_store_data(sp, c));49CHECK(krb5_store_int32(sp, key->key_data_type[1]));50c.length = key->key_data_length[1];51c.data = key->key_data_contents[1];52CHECK(krb5_store_data(sp, c));53return 0;54}5556kadm5_ret_t57kadm5_ret_key_data(krb5_storage *sp,58krb5_key_data *key)59{60kadm5_ret_t ret;61krb5_data c;62int32_t tmp;63ret = krb5_ret_int32(sp, &tmp);64if (ret == 0) {65key->key_data_ver = tmp;66ret = krb5_ret_int32(sp, &tmp);67}68if (ret == 0) {69key->key_data_kvno = tmp;70ret = krb5_ret_int32(sp, &tmp);71}72if (ret == 0) {73key->key_data_type[0] = tmp;74ret = krb5_ret_data(sp, &c);75}76if (ret == 0) {77key->key_data_length[0] = c.length;78key->key_data_contents[0] = c.data;79ret = krb5_ret_int32(sp, &tmp);80}81if (ret == 0) {82key->key_data_type[1] = tmp;83ret = krb5_ret_data(sp, &c);84}85if (ret == 0) {86key->key_data_length[1] = c.length;87key->key_data_contents[1] = c.data;88return 0;89}90return KADM5_FAILURE;91}9293kadm5_ret_t94kadm5_store_tl_data(krb5_storage *sp,95krb5_tl_data *tl)96{97krb5_data c;98CHECK(krb5_store_int32(sp, tl->tl_data_type));99c.length = tl->tl_data_length;100c.data = tl->tl_data_contents;101CHECK(krb5_store_data(sp, c));102return 0;103}104105kadm5_ret_t106kadm5_ret_tl_data(krb5_storage *sp,107krb5_tl_data *tl)108{109krb5_data c;110int32_t tmp;111krb5_ret_int32(sp, &tmp);112tl->tl_data_type = tmp;113CHECK(krb5_ret_data(sp, &c));114tl->tl_data_length = c.length;115tl->tl_data_contents = c.data;116return 0;117}118119static kadm5_ret_t120store_principal_ent(krb5_storage *sp,121kadm5_principal_ent_t princ,122uint32_t mask)123{124int i;125126if (mask & KADM5_PRINCIPAL)127CHECK(krb5_store_principal(sp, princ->principal));128if (mask & KADM5_PRINC_EXPIRE_TIME)129CHECK(krb5_store_int32(sp, princ->princ_expire_time));130if (mask & KADM5_PW_EXPIRATION)131CHECK(krb5_store_int32(sp, princ->pw_expiration));132if (mask & KADM5_LAST_PWD_CHANGE)133CHECK(krb5_store_int32(sp, princ->last_pwd_change));134if (mask & KADM5_MAX_LIFE)135CHECK(krb5_store_int32(sp, princ->max_life));136if (mask & KADM5_MOD_NAME) {137CHECK(krb5_store_int32(sp, princ->mod_name != NULL));138if(princ->mod_name)139CHECK(krb5_store_principal(sp, princ->mod_name));140}141if (mask & KADM5_MOD_TIME)142CHECK(krb5_store_int32(sp, princ->mod_date));143if (mask & KADM5_ATTRIBUTES)144CHECK(krb5_store_int32(sp, princ->attributes));145if (mask & KADM5_KVNO)146CHECK(krb5_store_int32(sp, princ->kvno));147if (mask & KADM5_MKVNO)148CHECK(krb5_store_int32(sp, princ->mkvno));149if (mask & KADM5_POLICY) {150CHECK(krb5_store_int32(sp, princ->policy != NULL));151if(princ->policy)152CHECK(krb5_store_string(sp, princ->policy));153}154if (mask & KADM5_AUX_ATTRIBUTES)155CHECK(krb5_store_int32(sp, princ->aux_attributes));156if (mask & KADM5_MAX_RLIFE)157CHECK(krb5_store_int32(sp, princ->max_renewable_life));158if (mask & KADM5_LAST_SUCCESS)159CHECK(krb5_store_int32(sp, princ->last_success));160if (mask & KADM5_LAST_FAILED)161CHECK(krb5_store_int32(sp, princ->last_failed));162if (mask & KADM5_FAIL_AUTH_COUNT)163CHECK(krb5_store_int32(sp, princ->fail_auth_count));164if (mask & KADM5_KEY_DATA) {165CHECK(krb5_store_int32(sp, princ->n_key_data));166for(i = 0; i < princ->n_key_data; i++)167CHECK(kadm5_store_key_data(sp, &princ->key_data[i]));168}169if (mask & KADM5_TL_DATA) {170krb5_tl_data *tp;171172CHECK(krb5_store_int32(sp, princ->n_tl_data));173for(tp = princ->tl_data; tp; tp = tp->tl_data_next)174CHECK(kadm5_store_tl_data(sp, tp));175}176return 0;177}178179180kadm5_ret_t181kadm5_store_principal_ent(krb5_storage *sp,182kadm5_principal_ent_t princ)183{184return store_principal_ent (sp, princ, ~0);185}186187kadm5_ret_t188kadm5_store_principal_ent_mask(krb5_storage *sp,189kadm5_principal_ent_t princ,190uint32_t mask)191{192kadm5_ret_t ret;193194ret = krb5_store_int32(sp, mask);195if (ret == 0)196ret = store_principal_ent (sp, princ, mask);197return (ret);198}199200static kadm5_ret_t201ret_principal_ent(krb5_storage *sp,202kadm5_principal_ent_t princ,203uint32_t mask)204{205int i;206int32_t tmp;207208if (mask & KADM5_PRINCIPAL)209CHECK(krb5_ret_principal(sp, &princ->principal));210if (mask & KADM5_PRINC_EXPIRE_TIME) {211CHECK(krb5_ret_int32(sp, &tmp));212princ->princ_expire_time = tmp;213}214if (mask & KADM5_PW_EXPIRATION) {215CHECK(krb5_ret_int32(sp, &tmp));216princ->pw_expiration = tmp;217}218if (mask & KADM5_LAST_PWD_CHANGE) {219CHECK(krb5_ret_int32(sp, &tmp));220princ->last_pwd_change = tmp;221}222if (mask & KADM5_MAX_LIFE) {223CHECK(krb5_ret_int32(sp, &tmp));224princ->max_life = tmp;225}226if (mask & KADM5_MOD_NAME) {227CHECK(krb5_ret_int32(sp, &tmp));228if(tmp)229CHECK(krb5_ret_principal(sp, &princ->mod_name));230else231princ->mod_name = NULL;232}233if (mask & KADM5_MOD_TIME) {234CHECK(krb5_ret_int32(sp, &tmp));235princ->mod_date = tmp;236}237if (mask & KADM5_ATTRIBUTES) {238CHECK(krb5_ret_int32(sp, &tmp));239princ->attributes = tmp;240}241if (mask & KADM5_KVNO) {242CHECK(krb5_ret_int32(sp, &tmp));243princ->kvno = tmp;244}245if (mask & KADM5_MKVNO) {246CHECK(krb5_ret_int32(sp, &tmp));247princ->mkvno = tmp;248}249if (mask & KADM5_POLICY) {250CHECK(krb5_ret_int32(sp, &tmp));251if(tmp)252CHECK(krb5_ret_string(sp, &princ->policy));253else254princ->policy = NULL;255}256if (mask & KADM5_AUX_ATTRIBUTES) {257CHECK(krb5_ret_int32(sp, &tmp));258princ->aux_attributes = tmp;259}260if (mask & KADM5_MAX_RLIFE) {261CHECK(krb5_ret_int32(sp, &tmp));262princ->max_renewable_life = tmp;263}264if (mask & KADM5_LAST_SUCCESS) {265CHECK(krb5_ret_int32(sp, &tmp));266princ->last_success = tmp;267}268if (mask & KADM5_LAST_FAILED) {269CHECK(krb5_ret_int32(sp, &tmp));270princ->last_failed = tmp;271}272if (mask & KADM5_FAIL_AUTH_COUNT) {273CHECK(krb5_ret_int32(sp, &tmp));274princ->fail_auth_count = tmp;275}276if (mask & KADM5_KEY_DATA) {277CHECK(krb5_ret_int32(sp, &tmp));278princ->n_key_data = tmp;279princ->key_data = malloc(princ->n_key_data * sizeof(*princ->key_data));280if (princ->key_data == NULL && princ->n_key_data != 0)281return ENOMEM;282for(i = 0; i < princ->n_key_data; i++)283CHECK(kadm5_ret_key_data(sp, &princ->key_data[i]));284}285if (mask & KADM5_TL_DATA) {286CHECK(krb5_ret_int32(sp, &tmp));287princ->n_tl_data = tmp;288princ->tl_data = NULL;289for(i = 0; i < princ->n_tl_data; i++){290krb5_tl_data *tp = malloc(sizeof(*tp));291if (tp == NULL)292return ENOMEM;293CHECK(kadm5_ret_tl_data(sp, tp));294tp->tl_data_next = princ->tl_data;295princ->tl_data = tp;296}297}298return 0;299}300301kadm5_ret_t302kadm5_ret_principal_ent(krb5_storage *sp,303kadm5_principal_ent_t princ)304{305return ret_principal_ent (sp, princ, ~0);306}307308kadm5_ret_t309kadm5_ret_principal_ent_mask(krb5_storage *sp,310kadm5_principal_ent_t princ,311uint32_t *mask)312{313kadm5_ret_t ret;314int32_t tmp;315316ret = krb5_ret_int32 (sp, &tmp);317if (ret) {318*mask = 0;319return (ret);320}321*mask = tmp;322return ret_principal_ent (sp, princ, *mask);323}324325kadm5_ret_t326_kadm5_marshal_params(krb5_context context,327kadm5_config_params *params,328krb5_data *out)329{330kadm5_ret_t ret;331332krb5_storage *sp = krb5_storage_emem();333334ret = krb5_store_int32(sp, params->mask & (KADM5_CONFIG_REALM));335336if (ret == 0 && params->mask & KADM5_CONFIG_REALM)337ret = krb5_store_string(sp, params->realm);338if (ret == 0)339krb5_storage_to_data(sp, out);340krb5_storage_free(sp);341342return (ret);343}344345kadm5_ret_t346_kadm5_unmarshal_params(krb5_context context,347krb5_data *in,348kadm5_config_params *params)349{350krb5_error_code ret;351krb5_storage *sp;352int32_t mask;353354sp = krb5_storage_from_data(in);355if (sp == NULL)356return ENOMEM;357358ret = krb5_ret_int32(sp, &mask);359if (ret)360goto out;361if (mask & KADM5_CONFIG_REALM & KADM5_CONFIG_DBNAME362& KADM5_CONFIG_ACL_FILE & KADM5_CONFIG_STASH_FILE) {363ret = EINVAL;364goto out;365}366params->mask = mask;367368if (params->mask & KADM5_CONFIG_REALM) {369ret = krb5_ret_string(sp, ¶ms->realm);370if (params->realm == NULL) {371ret = EINVAL;372goto out;373}374}375if (params->mask & KADM5_CONFIG_DBNAME) {376ret = krb5_ret_string(sp, ¶ms->dbname);377if (params->dbname == NULL) {378ret = EINVAL;379goto out;380}381}382if (params->mask & KADM5_CONFIG_ACL_FILE) {383ret = krb5_ret_string(sp, ¶ms->acl_file);384if (params->acl_file == NULL) {385ret = EINVAL;386goto out;387}388}389if (params->mask & KADM5_CONFIG_STASH_FILE) {390ret = krb5_ret_string(sp, ¶ms->stash_file);391if (params->stash_file == NULL) {392ret = EINVAL;393}394}395out:396krb5_storage_free(sp);397398return ret;399}400401402