1423 lines
38 KiB
C
1423 lines
38 KiB
C
/* This file is part of the Project Athena Zephyr Notification System.
|
|
* It contains source for the internal Zephyr routines.
|
|
*
|
|
* Created by: Robert French
|
|
*
|
|
* $Id$
|
|
*
|
|
* Copyright (c) 1987,1988,1991 by the Massachusetts Institute of
|
|
* Technology.
|
|
* For copying and distribution information, see the file
|
|
* "mit-copyright.h".
|
|
*/
|
|
|
|
#include <internal.h>
|
|
#include <arpa/inet.h>
|
|
#include <sys/socket.h>
|
|
|
|
#ifndef lint
|
|
static const char rcsid_Zinternal_c[] =
|
|
"$Id$";
|
|
static const char copyright[] =
|
|
"Copyright (c) 1987,1988,1991 by the Massachusetts Institute of Technology.";
|
|
#endif
|
|
|
|
int __Zephyr_fd = -1;
|
|
int __Zephyr_open;
|
|
int __Zephyr_port = -1;
|
|
struct in_addr __My_addr;
|
|
int __Q_CompleteLength;
|
|
int __Q_Size;
|
|
struct _Z_InputQ *__Q_Head, *__Q_Tail;
|
|
struct sockaddr_in __HM_addr;
|
|
struct sockaddr_in __HM_addr_real;
|
|
int __HM_set;
|
|
int __Zephyr_server;
|
|
ZLocations_t *__locate_list;
|
|
int __locate_num;
|
|
int __locate_next;
|
|
ZSubscription_t *__subscriptions_list;
|
|
int __subscriptions_num;
|
|
int __subscriptions_next;
|
|
int Z_discarded_packets = 0;
|
|
|
|
#ifdef HAVE_KRB5
|
|
/* This context is used throughout */
|
|
krb5_context Z_krb5_ctx;
|
|
/* A queue of all the currently active session keys. */
|
|
struct _Z_SessionKey *Z_keys_head, *Z_keys_tail;
|
|
|
|
static const struct cksum_map_s {
|
|
krb5_enctype e;
|
|
krb5_cksumtype c;
|
|
} cksum_map[] = {
|
|
/* per RFC1510 and draft-ietf-krb-wg-crypto-02.txt */
|
|
{ ENCTYPE_NULL, CKSUMTYPE_RSA_MD5 },
|
|
{ ENCTYPE_DES_CBC_CRC, CKSUMTYPE_RSA_MD5_DES },
|
|
{ ENCTYPE_DES_CBC_MD4, CKSUMTYPE_RSA_MD4_DES },
|
|
{ ENCTYPE_DES_CBC_MD5, CKSUMTYPE_RSA_MD5_DES },
|
|
|
|
/*
|
|
* The implementors hate us, and are inconsistent with names for
|
|
* most things defined after RFC1510. Note that des3-cbc-sha1
|
|
* and des3-cbc-sha1-kd are listed by number to avoid confusion
|
|
* caused by inconsistency between the names used in the specs
|
|
* and those used by implementations.
|
|
* -- jhutz, 30-Nov-2002
|
|
*/
|
|
|
|
/* source lost in history (an expired internet-draft) */
|
|
{ 5 /* des3-cbc-md5 */, 9 /* rsa-md5-des3 */ },
|
|
{ 7 /* des3-cbc-sha1 */, 13 /* hmac-sha1-des3 */ },
|
|
|
|
/* per draft-ietf-krb-wg-crypto-02.txt */
|
|
{ 16 /* des3-cbc-sha1-kd */, 12 /* hmac-sha1-des3-kd */ },
|
|
|
|
/* per draft-raeburn-krb-rijndael-krb-02.txt */
|
|
{ 17 /* aes128-cts-hmac-sha1-96 */, 15 /* hmac-sha1-96-aes128 */ },
|
|
{ 18 /* aes256-cts-hmac-sha1-96 */, 16 /* hmac-sha1-96-aes256 */ },
|
|
|
|
/* per draft-brezak-win2k-krb-rc4-hmac-04.txt */
|
|
{ 23 /* rc4-hmac */, -138 /* hmac-md5 */ },
|
|
{ 24 /* rc4-hmac-exp */, -138 /* hmac-md5 */ },
|
|
{ 25 /* camellia128-cts-cmac */, 17 /* cmac-camellia128 */ },
|
|
{ 26 /* camellia256-cts-cmac */, 18 /* cmac-camellia256 */ },
|
|
};
|
|
#define N_CKSUM_MAP (sizeof(cksum_map) / sizeof(struct cksum_map_s))
|
|
|
|
Code_t
|
|
Z_krb5_lookup_cksumtype(krb5_enctype e,
|
|
krb5_cksumtype *c)
|
|
{
|
|
unsigned int i;
|
|
|
|
for (i = 0; i < N_CKSUM_MAP; i++) {
|
|
if (cksum_map[i].e == e) {
|
|
*c = cksum_map[i].c;
|
|
return ZERR_NONE;
|
|
}
|
|
}
|
|
return KRB5_PROG_ETYPE_NOSUPP;
|
|
}
|
|
#endif /* HAVE_KRB5 */
|
|
|
|
char __Zephyr_realm[REALM_SZ];
|
|
|
|
#ifdef Z_DEBUG
|
|
void (*__Z_debug_print)(const char *fmt, va_list args, void *closure);
|
|
void *__Z_debug_print_closure;
|
|
#endif
|
|
|
|
#define min(a,b) ((a)<(b)?(a):(b))
|
|
|
|
static int Z_AddField(char **ptr, char *field, char *end);
|
|
static int find_or_insert_uid(ZUnique_Id_t *uid, ZNotice_Kind_t kind);
|
|
static Code_t Z_ZcodeFormatRawHeader(ZNotice_t *, char *, int, int *, char **,
|
|
int *, char **, char **, int cksumstyle,
|
|
int addrstyle);
|
|
|
|
/* Find or insert uid in the old uids buffer. The buffer is a sorted
|
|
* circular queue. We make the assumption that most packets arrive in
|
|
* order, so we can usually search for a uid or just tack it onto the end.
|
|
* The first entry at at buffer[start], the last is at
|
|
* buffer[(start + num - 1) % size] */
|
|
static int
|
|
find_or_insert_uid(ZUnique_Id_t *uid,
|
|
ZNotice_Kind_t kind)
|
|
{
|
|
static struct _filter {
|
|
ZUnique_Id_t uid;
|
|
ZNotice_Kind_t kind;
|
|
time_t t;
|
|
} *buffer;
|
|
static long size;
|
|
static long start;
|
|
static long num;
|
|
|
|
time_t now;
|
|
struct _filter *new;
|
|
long i, j, new_size;
|
|
int result, found = 0;
|
|
|
|
/* Initialize the uid buffer if it hasn't been done already. */
|
|
if (!buffer) {
|
|
size = Z_INITFILTERSIZE;
|
|
buffer = (struct _filter *) malloc(size * sizeof(*buffer));
|
|
if (!buffer)
|
|
return 0;
|
|
}
|
|
|
|
/* Age the uid buffer, discarding any uids older than the time limit. */
|
|
time(&now);
|
|
while (num && (now - buffer[start % size].t) > Z_FILTERTIMELIMIT)
|
|
start++, num--;
|
|
start %= size;
|
|
|
|
/* Make room for a new uid, since we'll probably have to insert one. */
|
|
if (num == size) {
|
|
new_size = size * 2 + 2;
|
|
new = (struct _filter *) malloc(new_size * sizeof(*new));
|
|
if (!new)
|
|
return 0;
|
|
for (i = 0; i < num; i++)
|
|
new[i] = buffer[(start + i) % size];
|
|
free(buffer);
|
|
buffer = new;
|
|
size = new_size;
|
|
start = 0;
|
|
}
|
|
|
|
/* Search for this uid in the buffer, starting from the end. */
|
|
for (i = start + num - 1; i >= start; i--) {
|
|
result = memcmp(uid, &buffer[i % size].uid, sizeof(*uid));
|
|
if (result == 0 && buffer[i % size].kind == kind) {
|
|
/* Remove it from the buffer. We'll re-add it at the end. */
|
|
for (j = i; j < start + num - 1; j++) {
|
|
buffer[j % size] = buffer[(j + 1) % size];
|
|
}
|
|
num--;
|
|
found = 1;
|
|
break;
|
|
}
|
|
}
|
|
|
|
/* Whether or not we found it, stick it at the end. */
|
|
i = start + num;
|
|
buffer[i % size].uid = *uid;
|
|
buffer[i % size].kind = kind;
|
|
buffer[i % size].t = now;
|
|
num++;
|
|
|
|
return found;
|
|
}
|
|
|
|
|
|
/* Return 1 if there is a packet waiting, 0 otherwise */
|
|
|
|
int
|
|
Z_PacketWaiting(void)
|
|
{
|
|
struct timeval tv;
|
|
fd_set readfds;
|
|
|
|
tv.tv_sec = tv.tv_usec = 0;
|
|
FD_ZERO(&readfds);
|
|
FD_SET(ZGetFD(), &readfds);
|
|
return (select(ZGetFD() + 1, &readfds, NULL, NULL, &tv));
|
|
}
|
|
|
|
|
|
/* Wait for a complete notice to become available */
|
|
|
|
Code_t
|
|
Z_WaitForComplete(void)
|
|
{
|
|
Code_t retval;
|
|
|
|
if (__Q_CompleteLength)
|
|
return (Z_ReadEnqueue());
|
|
|
|
while (!__Q_CompleteLength)
|
|
if ((retval = Z_ReadWait()) != ZERR_NONE)
|
|
return (retval);
|
|
|
|
return (ZERR_NONE);
|
|
}
|
|
|
|
|
|
/* Read any available packets and enqueue them */
|
|
|
|
Code_t
|
|
Z_ReadEnqueue(void)
|
|
{
|
|
Code_t retval;
|
|
|
|
if (ZGetFD() < 0)
|
|
return (ZERR_NOPORT);
|
|
|
|
while (Z_PacketWaiting())
|
|
if ((retval = Z_ReadWait()) != ZERR_NONE)
|
|
return (retval);
|
|
|
|
return (ZERR_NONE);
|
|
}
|
|
|
|
|
|
/*
|
|
* Search the queue for a notice with the proper multiuid - remove any
|
|
* notices that haven't been touched in a while
|
|
*/
|
|
|
|
struct _Z_InputQ *
|
|
Z_SearchQueue(ZUnique_Id_t *uid,
|
|
ZNotice_Kind_t kind)
|
|
{
|
|
register struct _Z_InputQ *qptr;
|
|
struct _Z_InputQ *next;
|
|
struct timeval tv;
|
|
|
|
(void) gettimeofday(&tv, (struct timezone *)0);
|
|
|
|
qptr = __Q_Head;
|
|
|
|
while (qptr) {
|
|
if (ZCompareUID(uid, &qptr->uid) && qptr->kind == kind)
|
|
return (qptr);
|
|
next = qptr->next;
|
|
if (qptr->timep &&
|
|
(qptr->timep+Z_NOTICETIMELIMIT < (unsigned long)tv.tv_sec))
|
|
Z_RemQueue(qptr);
|
|
qptr = next;
|
|
}
|
|
return (NULL);
|
|
}
|
|
|
|
/*
|
|
* Now we delve into really convoluted queue handling and
|
|
* fragmentation reassembly algorithms and other stuff you probably
|
|
* don't want to look at...
|
|
*
|
|
* This routine does NOT guarantee a complete packet will be ready when it
|
|
* returns.
|
|
*/
|
|
|
|
Code_t
|
|
Z_ReadWait(void)
|
|
{
|
|
register struct _Z_InputQ *qptr;
|
|
ZNotice_t notice;
|
|
ZPacket_t packet;
|
|
struct sockaddr_in olddest, from;
|
|
unsigned int from_len;
|
|
int packet_len, zvlen, part, partof;
|
|
char *slash;
|
|
Code_t retval;
|
|
fd_set fds;
|
|
struct timeval tv;
|
|
ZUnique_Id_t *multiuid;
|
|
|
|
if (ZGetFD() < 0)
|
|
return (ZERR_NOPORT);
|
|
|
|
FD_ZERO(&fds);
|
|
FD_SET(ZGetFD(), &fds);
|
|
tv.tv_sec = 60;
|
|
tv.tv_usec = 0;
|
|
|
|
if (select(ZGetFD() + 1, &fds, NULL, NULL, &tv) < 0)
|
|
return (errno);
|
|
if (!FD_ISSET(ZGetFD(), &fds))
|
|
return ETIMEDOUT;
|
|
|
|
from_len = sizeof(struct sockaddr_in);
|
|
|
|
packet_len = recvfrom(ZGetFD(), packet, sizeof(packet), 0,
|
|
(struct sockaddr *)&from, &from_len);
|
|
|
|
if (packet_len < 0)
|
|
return (errno);
|
|
|
|
if (!packet_len)
|
|
return (ZERR_EOF);
|
|
|
|
/* Ignore obviously non-Zephyr packets. */
|
|
zvlen = sizeof(ZVERSIONHDR) - 1;
|
|
if (packet_len < zvlen || memcmp(packet, ZVERSIONHDR, zvlen) != 0) {
|
|
Z_discarded_packets++;
|
|
return (ZERR_BADPKT);
|
|
}
|
|
|
|
/* Parse the notice */
|
|
if ((retval = ZParseNotice(packet, packet_len, ¬ice)) != ZERR_NONE)
|
|
return (retval);
|
|
|
|
/*
|
|
* If we're not a server and the notice is of an appropriate kind,
|
|
* send back a CLIENTACK to whoever sent it to say we got it.
|
|
*/
|
|
if (!__Zephyr_server) {
|
|
if (notice.z_kind != HMACK && notice.z_kind != SERVACK &&
|
|
notice.z_kind != SERVNAK && notice.z_kind != CLIENTACK) {
|
|
ZNotice_t tmpnotice;
|
|
ZPacket_t pkt;
|
|
int len;
|
|
|
|
tmpnotice = notice;
|
|
tmpnotice.z_kind = CLIENTACK;
|
|
tmpnotice.z_message_len = 0;
|
|
olddest = __HM_addr;
|
|
__HM_addr = from;
|
|
retval = ZFormatSmallRawNotice(&tmpnotice, pkt, &len);
|
|
if (retval == ZERR_NONE)
|
|
retval = ZSendPacket(pkt, len, 0);
|
|
__HM_addr = olddest;
|
|
if (retval != ZERR_NONE)
|
|
return retval;
|
|
}
|
|
if (find_or_insert_uid(¬ice.z_uid, notice.z_kind))
|
|
return(ZERR_NONE);
|
|
|
|
/* Check authentication on the notice. */
|
|
notice.z_checked_auth = ZCheckAuthentication(¬ice, &from);
|
|
}
|
|
|
|
|
|
/*
|
|
* Parse apart the z_multinotice field - if the field is blank for
|
|
* some reason, assume this packet stands by itself.
|
|
*/
|
|
slash = strchr(notice.z_multinotice, '/');
|
|
if (slash) {
|
|
part = atoi(notice.z_multinotice);
|
|
partof = atoi(slash+1);
|
|
if (part < 0 || part > partof || partof <= 0) {
|
|
part = 0;
|
|
partof = notice.z_message_len;
|
|
}
|
|
} else {
|
|
part = 0;
|
|
partof = notice.z_message_len;
|
|
}
|
|
|
|
/* Too big a packet...just ignore it! */
|
|
if (partof > Z_MAXNOTICESIZE)
|
|
return (ZERR_NONE);
|
|
|
|
/* The packet has garbage at the end. This likely came from a cross-realm
|
|
* zephyrd without f276622ace757977fec43633e43577350e0cf6fe, which means
|
|
* it's retransmitting blindly anyway. Drop it on the floor.
|
|
*/
|
|
if (notice.z_message_len > partof - part)
|
|
return (ZERR_NONE);
|
|
|
|
/* Pick the appropriate key to reassemble with. */
|
|
switch (notice.z_kind) {
|
|
case SERVACK:
|
|
case SERVNAK:
|
|
/* For SERVACK and SERNACK replies, hold on to the reply
|
|
ONLY if it's the first part of a fragmented message, i.e.
|
|
multi_uid == uid. This allows programs to wait for the uid
|
|
of the first packet, and get a response when that notice
|
|
arrives. Acknowledgements of the other fragments are discarded
|
|
(XXX we assume here that they all carry the same information
|
|
regarding failure/success)
|
|
*/
|
|
if (!__Zephyr_server &&
|
|
!ZCompareUID(¬ice.z_multiuid, ¬ice.z_uid))
|
|
/* they're not the same... throw away this packet. */
|
|
return(ZERR_NONE);
|
|
/* fall thru to general ACK case. */
|
|
case HMACK:
|
|
/* The HMACK, SERVACK, and SERVNAK replies shouldn't be
|
|
reassembled (they have no parts). */
|
|
multiuid = ¬ice.z_uid;
|
|
break;
|
|
default:
|
|
multiuid = ¬ice.z_multiuid;
|
|
}
|
|
/*
|
|
* If we aren't a server and we can find a notice in the queue
|
|
* with the same multiuid field, insert the current fragment as
|
|
* appropriate.
|
|
*/
|
|
if (!__Zephyr_server && (qptr = Z_SearchQueue(multiuid, notice.z_kind))) {
|
|
/*
|
|
* If this is the first fragment, and we haven't already
|
|
* gotten a first fragment, grab the header from it.
|
|
*/
|
|
if (part == 0 && !qptr->header) {
|
|
qptr->header_len = packet_len-notice.z_message_len;
|
|
qptr->header = (char *) malloc((unsigned) qptr->header_len);
|
|
if (!qptr->header)
|
|
return (ENOMEM);
|
|
(void) memcpy(qptr->header, packet, qptr->header_len);
|
|
}
|
|
return (Z_AddNoticeToEntry(qptr, ¬ice, part));
|
|
}
|
|
|
|
/*
|
|
* We'll have to create a new entry...make sure the queue isn't
|
|
* going to get too big.
|
|
*/
|
|
if (__Q_Size+(__Zephyr_server ? notice.z_message_len : partof) > Z_MAXQUEUESIZE)
|
|
return (ZERR_NONE);
|
|
|
|
/*
|
|
* This is a notice we haven't heard of, so create a new queue
|
|
* entry for it and zero it out.
|
|
*/
|
|
qptr = (struct _Z_InputQ *)malloc(sizeof(struct _Z_InputQ));
|
|
if (!qptr)
|
|
return (ENOMEM);
|
|
(void) memset((char *)qptr, 0, sizeof(struct _Z_InputQ));
|
|
|
|
/* Insert the entry at the end of the queue */
|
|
qptr->next = NULL;
|
|
qptr->prev = __Q_Tail;
|
|
if (__Q_Tail)
|
|
__Q_Tail->next = qptr;
|
|
__Q_Tail = qptr;
|
|
|
|
if (!__Q_Head)
|
|
__Q_Head = qptr;
|
|
|
|
|
|
/* Copy the from field, multiuid, kind, and checked authentication. */
|
|
qptr->from = from;
|
|
qptr->uid = *multiuid;
|
|
qptr->kind = notice.z_kind;
|
|
qptr->auth = notice.z_checked_auth;
|
|
|
|
/*
|
|
* If this is the first part of the notice, we take the header
|
|
* from it. We only take it if this is the first fragment so that
|
|
* the Unique ID's will be predictable.
|
|
*
|
|
* If a Zephyr Server, we always take the header.
|
|
*/
|
|
if (__Zephyr_server || part == 0) {
|
|
qptr->header_len = packet_len-notice.z_message_len;
|
|
qptr->header = (char *) malloc((unsigned) qptr->header_len);
|
|
if (!qptr->header)
|
|
return ENOMEM;
|
|
(void) memcpy(qptr->header, packet, qptr->header_len);
|
|
}
|
|
|
|
/*
|
|
* If this is not a fragmented notice, then don't bother with a
|
|
* hole list.
|
|
* If we are a Zephyr server, all notices are treated as complete.
|
|
*/
|
|
if (__Zephyr_server || (part == 0 && notice.z_message_len == partof)) {
|
|
__Q_CompleteLength++;
|
|
qptr->holelist = (struct _Z_Hole *) 0;
|
|
qptr->complete = 1;
|
|
/* allocate a msg buf for this piece */
|
|
if (notice.z_message_len == 0)
|
|
qptr->msg = 0;
|
|
else if (!(qptr->msg = (char *) malloc((unsigned) notice.z_message_len)))
|
|
return(ENOMEM);
|
|
else
|
|
(void) memcpy(qptr->msg, notice.z_message, notice.z_message_len);
|
|
qptr->msg_len = notice.z_message_len;
|
|
__Q_Size += notice.z_message_len;
|
|
qptr->packet_len = qptr->header_len+qptr->msg_len;
|
|
if (!(qptr->packet = (char *) malloc((unsigned) qptr->packet_len)))
|
|
return (ENOMEM);
|
|
(void) memcpy(qptr->packet, qptr->header, qptr->header_len);
|
|
if(qptr->msg)
|
|
(void) memcpy(qptr->packet+qptr->header_len, qptr->msg,
|
|
qptr->msg_len);
|
|
return (ZERR_NONE);
|
|
}
|
|
|
|
/*
|
|
* We know how long the message is going to be (this is better
|
|
* than IP fragmentation...), so go ahead and allocate it all.
|
|
*/
|
|
if (!(qptr->msg = (char *) malloc((unsigned) partof)) && partof)
|
|
return (ENOMEM);
|
|
qptr->msg_len = partof;
|
|
__Q_Size += partof;
|
|
|
|
/*
|
|
* Well, it's a fragmented notice...allocate a hole list and
|
|
* initialize it to the full packet size. Then insert the
|
|
* current fragment.
|
|
*/
|
|
if (!(qptr->holelist = (struct _Z_Hole *)
|
|
malloc(sizeof(struct _Z_Hole))))
|
|
return (ENOMEM);
|
|
qptr->holelist->next = (struct _Z_Hole *) 0;
|
|
qptr->holelist->first = 0;
|
|
qptr->holelist->last = partof-1;
|
|
return (Z_AddNoticeToEntry(qptr, ¬ice, part));
|
|
}
|
|
|
|
|
|
/* Fragment management routines - compliments, more or less, of RFC815 */
|
|
|
|
Code_t
|
|
Z_AddNoticeToEntry(struct _Z_InputQ *qptr,
|
|
ZNotice_t *notice,
|
|
int part)
|
|
{
|
|
int last, oldfirst, oldlast;
|
|
struct _Z_Hole *hole, *lasthole;
|
|
struct timeval tv;
|
|
|
|
/* Make sure this notice is expirable */
|
|
(void) gettimeofday(&tv, (struct timezone *)0);
|
|
qptr->timep = tv.tv_sec;
|
|
|
|
/* Bounds check. */
|
|
if (part < 0 || notice->z_message_len < 0 || part > qptr->msg_len
|
|
|| notice->z_message_len > qptr->msg_len - part)
|
|
return (ZERR_NONE);
|
|
|
|
/* Incorporate this notice's checked authentication. */
|
|
if (notice->z_checked_auth == ZAUTH_FAILED)
|
|
qptr->auth = ZAUTH_FAILED;
|
|
else if (notice->z_checked_auth == ZAUTH_NO && qptr->auth != ZAUTH_FAILED)
|
|
qptr->auth = ZAUTH_NO;
|
|
|
|
last = part+notice->z_message_len-1;
|
|
|
|
hole = qptr->holelist;
|
|
lasthole = (struct _Z_Hole *) 0;
|
|
|
|
/* copy in the message body */
|
|
(void) memcpy(qptr->msg+part, notice->z_message, notice->z_message_len);
|
|
|
|
/* Search for a hole that overlaps with the current fragment */
|
|
while (hole) {
|
|
if (part <= hole->last && last >= hole->first)
|
|
break;
|
|
lasthole = hole;
|
|
hole = hole->next;
|
|
}
|
|
|
|
/* If we found one, delete it and reconstruct a new hole */
|
|
if (hole) {
|
|
oldfirst = hole->first;
|
|
oldlast = hole->last;
|
|
if (lasthole)
|
|
lasthole->next = hole->next;
|
|
else
|
|
qptr->holelist = hole->next;
|
|
free((char *)hole);
|
|
/*
|
|
* Now create new hole(s) that are the original hole without
|
|
* the current fragment.
|
|
*/
|
|
if (part > oldfirst) {
|
|
hole = (struct _Z_Hole *)malloc(sizeof(struct _Z_Hole));
|
|
if (hole == NULL)
|
|
return ENOMEM;
|
|
hole->first = oldfirst;
|
|
hole->last = part-1;
|
|
/* Prepend to the list; holelist is unordered. */
|
|
hole->next = qptr->holelist;
|
|
qptr->holelist = hole;
|
|
}
|
|
if (last < oldlast) {
|
|
hole = (struct _Z_Hole *)malloc(sizeof(struct _Z_Hole));
|
|
if (hole == NULL)
|
|
return ENOMEM;
|
|
hole->first = last+1;
|
|
hole->last = oldlast;
|
|
/* Prepend to the list; holelist is unordered. */
|
|
hole->next = qptr->holelist;
|
|
qptr->holelist = hole;
|
|
}
|
|
}
|
|
|
|
if (!qptr->holelist) {
|
|
if (!qptr->complete)
|
|
__Q_CompleteLength++;
|
|
qptr->complete = 1;
|
|
qptr->timep = 0; /* don't time out anymore */
|
|
qptr->packet_len = qptr->header_len+qptr->msg_len;
|
|
if (!(qptr->packet = (char *) malloc((unsigned) qptr->packet_len)))
|
|
return (ENOMEM);
|
|
(void) memcpy(qptr->packet, qptr->header, qptr->header_len);
|
|
(void) memcpy(qptr->packet+qptr->header_len, qptr->msg,
|
|
qptr->msg_len);
|
|
}
|
|
|
|
return (ZERR_NONE);
|
|
}
|
|
|
|
void
|
|
Z_gettimeofday(struct _ZTimeval *ztv,
|
|
struct timezone *tz)
|
|
{
|
|
struct timeval tv;
|
|
(void) gettimeofday(&tv, tz); /* yeah, yeah, I know */
|
|
ztv->tv_sec=tv.tv_sec;
|
|
ztv->tv_usec=tv.tv_usec;
|
|
}
|
|
|
|
Code_t
|
|
Z_FormatHeader(ZNotice_t *notice,
|
|
char *buffer,
|
|
int buffer_len,
|
|
int *len,
|
|
Z_AuthProc cert_routine)
|
|
{
|
|
Code_t retval;
|
|
static char version[BUFSIZ]; /* default init should be all \0 */
|
|
|
|
if (!notice->z_sender)
|
|
notice->z_sender = ZGetSender();
|
|
|
|
if (notice->z_port == 0) {
|
|
if (ZGetFD() < 0) {
|
|
retval = ZOpenPort((u_short *)0);
|
|
if (retval != ZERR_NONE)
|
|
return (retval);
|
|
}
|
|
notice->z_port = __Zephyr_port;
|
|
}
|
|
|
|
notice->z_multinotice = "";
|
|
|
|
(void) Z_gettimeofday(¬ice->z_uid.tv, (struct timezone *)0);
|
|
notice->z_uid.tv.tv_sec = htonl((u_long) notice->z_uid.tv.tv_sec);
|
|
notice->z_uid.tv.tv_usec = htonl((u_long) notice->z_uid.tv.tv_usec);
|
|
|
|
(void) memcpy(¬ice->z_uid.zuid_addr, &__My_addr, sizeof(__My_addr));
|
|
|
|
if (notice->z_sender_sockaddr.ip4.sin_family == 0) {
|
|
(void) memset(¬ice->z_sender_sockaddr, 0, sizeof(notice->z_sender_sockaddr));
|
|
notice->z_sender_sockaddr.ip4.sin_family = AF_INET; /*XXX*/
|
|
notice->z_sender_sockaddr.ip4.sin_port = notice->z_port;
|
|
(void) memcpy(¬ice->z_sender_sockaddr.ip4.sin_addr, &__My_addr, sizeof(__My_addr));
|
|
#ifdef HAVE_SOCKADDR_IN_SIN_LEN
|
|
notice->z_sender_sockaddr.ip4.sin_len = sizeof(notice->z_sender_sockaddr.ip4);
|
|
#endif
|
|
}
|
|
|
|
notice->z_multiuid = notice->z_uid;
|
|
|
|
if (!version[0])
|
|
(void) sprintf(version, "%s%d.%d", ZVERSIONHDR, ZVERSIONMAJOR,
|
|
ZVERSIONMINOR);
|
|
notice->z_version = version;
|
|
|
|
return Z_FormatAuthHeader(notice, buffer, buffer_len, len, cert_routine);
|
|
}
|
|
|
|
Code_t
|
|
Z_NewFormatHeader(ZNotice_t *notice,
|
|
char *buffer,
|
|
int buffer_len,
|
|
int *len,
|
|
Z_AuthProc cert_routine)
|
|
{
|
|
Code_t retval;
|
|
static char version[BUFSIZ]; /* default init should be all \0 */
|
|
struct timeval tv;
|
|
|
|
if (!notice->z_sender)
|
|
notice->z_sender = ZGetSender();
|
|
|
|
if (notice->z_port == 0) {
|
|
if (ZGetFD() < 0) {
|
|
retval = ZOpenPort((u_short *)0);
|
|
if (retval != ZERR_NONE)
|
|
return (retval);
|
|
}
|
|
notice->z_port = __Zephyr_port;
|
|
}
|
|
|
|
notice->z_multinotice = "";
|
|
|
|
(void) gettimeofday(&tv, (struct timezone *)0);
|
|
notice->z_uid.tv.tv_sec = htonl((u_long) tv.tv_sec);
|
|
notice->z_uid.tv.tv_usec = htonl((u_long) tv.tv_usec);
|
|
|
|
(void) memcpy(¬ice->z_uid.zuid_addr, &__My_addr, sizeof(__My_addr));
|
|
|
|
(void) memset(¬ice->z_sender_sockaddr, 0, sizeof(notice->z_sender_sockaddr));
|
|
notice->z_sender_sockaddr.ip4.sin_family = AF_INET; /*XXX*/
|
|
notice->z_sender_sockaddr.ip4.sin_port = notice->z_port;
|
|
(void) memcpy(¬ice->z_sender_sockaddr.ip4.sin_addr, &__My_addr, sizeof(__My_addr));
|
|
#ifdef HAVE_SOCKADDR_IN_SIN_LEN
|
|
notice->z_sender_sockaddr.ip4.sin_len = sizeof(notice->z_sender_sockaddr.ip4);
|
|
#endif
|
|
|
|
notice->z_multiuid = notice->z_uid;
|
|
|
|
if (!version[0])
|
|
(void) sprintf(version, "%s%d.%d", ZVERSIONHDR, ZVERSIONMAJOR,
|
|
ZVERSIONMINOR);
|
|
notice->z_version = version;
|
|
|
|
return Z_NewFormatAuthHeader(notice, buffer, buffer_len, len, cert_routine);
|
|
}
|
|
|
|
Code_t
|
|
Z_FormatAuthHeaderWithASCIIAddress(ZNotice_t *notice,
|
|
char *buffer,
|
|
int buffer_len,
|
|
int *len)
|
|
{
|
|
notice->z_auth = 0;
|
|
notice->z_authent_len = 0;
|
|
notice->z_ascii_authent = "";
|
|
notice->z_checksum = 0;
|
|
if (!(notice->z_sender_sockaddr.sa.sa_family == AF_INET ||
|
|
notice->z_sender_sockaddr.sa.sa_family == AF_INET6))
|
|
notice->z_sender_sockaddr.sa.sa_family = AF_INET; /* \/\/hatever *//*XXX*/
|
|
|
|
return Z_ZcodeFormatRawHeader(notice, buffer, buffer_len, len,
|
|
NULL, NULL, NULL, NULL, 0, 1);
|
|
}
|
|
|
|
Code_t
|
|
Z_FormatAuthHeader(ZNotice_t *notice,
|
|
char *buffer,
|
|
int buffer_len,
|
|
int *len,
|
|
Z_AuthProc cert_routine)
|
|
{
|
|
if (!cert_routine) {
|
|
notice->z_auth = 0;
|
|
notice->z_authent_len = 0;
|
|
notice->z_ascii_authent = "";
|
|
notice->z_checksum = 0;
|
|
return (Z_FormatRawHeader(notice, buffer, buffer_len,
|
|
len, NULL, NULL));
|
|
}
|
|
|
|
return ((*cert_routine)(notice, buffer, buffer_len, len));
|
|
}
|
|
|
|
Code_t
|
|
Z_NewFormatAuthHeader(ZNotice_t *notice,
|
|
char *buffer,
|
|
int buffer_len,
|
|
int *len,
|
|
Z_AuthProc cert_routine)
|
|
{
|
|
if (!cert_routine) {
|
|
notice->z_auth = 0;
|
|
notice->z_authent_len = 0;
|
|
notice->z_ascii_authent = "";
|
|
notice->z_checksum = 0;
|
|
return (Z_FormatRawHeader(notice, buffer, buffer_len,
|
|
len, NULL, NULL));
|
|
}
|
|
|
|
return ((*cert_routine)(notice, buffer, buffer_len, len));
|
|
}
|
|
|
|
Code_t
|
|
Z_NewFormatRawHeader(ZNotice_t *notice,
|
|
char *buffer,
|
|
int buffer_len,
|
|
int *hdr_len,
|
|
char **cksum_start,
|
|
int *cksum_len,
|
|
char **cstart,
|
|
char **cend)
|
|
{
|
|
return(Z_ZcodeFormatRawHeader(notice, buffer, buffer_len, hdr_len,
|
|
cksum_start, cksum_len, cstart, cend, 0, 0));
|
|
}
|
|
|
|
Code_t
|
|
Z_AsciiFormatRawHeader(ZNotice_t *notice,
|
|
char *buffer,
|
|
int buffer_len,
|
|
int *hdr_len,
|
|
char **cksum_start,
|
|
int *cksum_len,
|
|
char **cstart,
|
|
char **cend)
|
|
{
|
|
return(Z_ZcodeFormatRawHeader(notice, buffer, buffer_len, hdr_len,
|
|
cksum_start, cksum_len, cstart, cend, 1, 0));
|
|
}
|
|
|
|
static Code_t
|
|
Z_ZcodeFormatRawHeader(ZNotice_t *notice,
|
|
char *buffer,
|
|
int buffer_len,
|
|
int *hdr_len,
|
|
char **cksum_start,
|
|
int *cksum_len,
|
|
char **cstart,
|
|
char **cend,
|
|
int cksumstyle,
|
|
int addrstyle)
|
|
{
|
|
static char version_nogalaxy[BUFSIZ]; /* default init should be all \0 */
|
|
char newrecip[BUFSIZ];
|
|
char *ptr, *end;
|
|
int i;
|
|
int addrlen = 0;
|
|
unsigned char *addraddr = NULL;
|
|
|
|
if (!(notice->z_sender_sockaddr.sa.sa_family == AF_INET ||
|
|
notice->z_sender_sockaddr.sa.sa_family == AF_INET6))
|
|
return ZERR_ILLVAL;
|
|
|
|
if (!notice->z_class)
|
|
notice->z_class = "";
|
|
|
|
if (!notice->z_class_inst)
|
|
notice->z_class_inst = "";
|
|
|
|
if (!notice->z_opcode)
|
|
notice->z_opcode = "";
|
|
|
|
if (!notice->z_recipient)
|
|
notice->z_recipient = "";
|
|
|
|
if (!notice->z_default_format)
|
|
notice->z_default_format = "";
|
|
|
|
ptr = buffer;
|
|
end = buffer+buffer_len;
|
|
|
|
if (cksum_start)
|
|
*cksum_start = ptr;
|
|
|
|
(void) sprintf(version_nogalaxy, "%s%d.%d", ZVERSIONHDR,
|
|
ZVERSIONMAJOR, ZVERSIONMINOR);
|
|
|
|
notice->z_version = version_nogalaxy;
|
|
|
|
if (Z_AddField(&ptr, version_nogalaxy, end))
|
|
return (ZERR_HEADERLEN);
|
|
|
|
if (ZMakeAscii32(ptr, end-ptr,
|
|
(notice->z_num_hdr_fields ? (notice->z_num_hdr_fields - notice->z_num_other_fields) : Z_NUMFIELDS) + notice->z_num_other_fields)
|
|
== ZERR_FIELDLEN)
|
|
return (ZERR_HEADERLEN);
|
|
ptr += strlen(ptr)+1;
|
|
|
|
if (ZMakeAscii32(ptr, end-ptr, notice->z_kind) == ZERR_FIELDLEN)
|
|
return (ZERR_HEADERLEN);
|
|
ptr += strlen(ptr)+1;
|
|
|
|
if (ZMakeAscii(ptr, end-ptr, (unsigned char *)¬ice->z_uid,
|
|
sizeof(ZUnique_Id_t)) == ZERR_FIELDLEN)
|
|
return (ZERR_HEADERLEN);
|
|
ptr += strlen(ptr)+1;
|
|
|
|
if (ZMakeAscii16(ptr, end-ptr, ntohs(notice->z_port)) == ZERR_FIELDLEN)
|
|
return (ZERR_HEADERLEN);
|
|
ptr += strlen(ptr)+1;
|
|
|
|
if (ZMakeAscii32(ptr, end-ptr, notice->z_auth) == ZERR_FIELDLEN)
|
|
return (ZERR_HEADERLEN);
|
|
ptr += strlen(ptr)+1;
|
|
|
|
if (ZMakeAscii32(ptr, end-ptr, notice->z_authent_len) == ZERR_FIELDLEN)
|
|
return (ZERR_HEADERLEN);
|
|
ptr += strlen(ptr)+1;
|
|
|
|
if (Z_AddField(&ptr, notice->z_ascii_authent, end))
|
|
return (ZERR_HEADERLEN);
|
|
if (Z_AddField(&ptr, notice->z_class, end))
|
|
return (ZERR_HEADERLEN);
|
|
if (Z_AddField(&ptr, notice->z_class_inst, end))
|
|
return (ZERR_HEADERLEN);
|
|
if (Z_AddField(&ptr, notice->z_opcode, end))
|
|
return (ZERR_HEADERLEN);
|
|
if (Z_AddField(&ptr, notice->z_sender, end))
|
|
return (ZERR_HEADERLEN);
|
|
if (strchr(notice->z_recipient, '@') || !*notice->z_recipient) {
|
|
if (Z_AddField(&ptr, notice->z_recipient, end))
|
|
return (ZERR_HEADERLEN);
|
|
}
|
|
else {
|
|
if (strlen(notice->z_recipient) + strlen(__Zephyr_realm) + 2 >
|
|
sizeof(newrecip))
|
|
return (ZERR_HEADERLEN);
|
|
(void) sprintf(newrecip, "%s@%s", notice->z_recipient, __Zephyr_realm);
|
|
if (Z_AddField(&ptr, newrecip, end))
|
|
return (ZERR_HEADERLEN);
|
|
}
|
|
if (Z_AddField(&ptr, notice->z_default_format, end))
|
|
return (ZERR_HEADERLEN);
|
|
|
|
/* copy back the end pointer location for crypto checksum */
|
|
if (cstart)
|
|
*cstart = ptr;
|
|
if (cksumstyle == 1) {
|
|
if (Z_AddField(&ptr, notice->z_ascii_checksum, end))
|
|
return (ZERR_HEADERLEN);
|
|
} else {
|
|
#ifdef xZCODE_K4SUM
|
|
if (ZMakeZcode32(ptr, end-ptr, notice->z_checksum) == ZERR_FIELDLEN)
|
|
return ZERR_HEADERLEN;
|
|
#else
|
|
if (ZMakeAscii32(ptr, end-ptr, notice->z_checksum) == ZERR_FIELDLEN)
|
|
return (ZERR_HEADERLEN);
|
|
#endif
|
|
ptr += strlen(ptr)+1;
|
|
}
|
|
if (cend)
|
|
*cend = ptr;
|
|
|
|
if (Z_AddField(&ptr, notice->z_multinotice, end))
|
|
return (ZERR_HEADERLEN);
|
|
|
|
if (ZMakeAscii(ptr, end-ptr, (unsigned char *)¬ice->z_multiuid,
|
|
sizeof(ZUnique_Id_t)) == ZERR_FIELDLEN)
|
|
return (ZERR_HEADERLEN);
|
|
ptr += strlen(ptr)+1;
|
|
|
|
if (!notice->z_num_hdr_fields || notice->z_num_hdr_fields > 17) {
|
|
if (notice->z_sender_sockaddr.sa.sa_family == AF_INET) {
|
|
addrlen = sizeof(notice->z_sender_sockaddr.ip4.sin_addr);
|
|
addraddr = (unsigned char *)¬ice->z_sender_sockaddr.ip4.sin_addr;
|
|
} else if (notice->z_sender_sockaddr.sa.sa_family == AF_INET6) {
|
|
addrlen = sizeof(notice->z_sender_sockaddr.ip6.sin6_addr);
|
|
addraddr = (unsigned char *)¬ice->z_sender_sockaddr.ip6.sin6_addr;
|
|
}
|
|
|
|
if (notice->z_sender_sockaddr.sa.sa_family == AF_INET && addrstyle) {
|
|
if (ZMakeAscii(ptr, end-ptr, addraddr, addrlen) == ZERR_FIELDLEN)
|
|
return ZERR_HEADERLEN;
|
|
} else {
|
|
if (ZMakeZcode(ptr, end-ptr, addraddr, addrlen) == ZERR_FIELDLEN)
|
|
return ZERR_HEADERLEN;
|
|
}
|
|
ptr += strlen(ptr) + 1;
|
|
}
|
|
|
|
if (!notice->z_num_hdr_fields || notice->z_num_hdr_fields > 18) {
|
|
if (ZMakeAscii16(ptr, end-ptr, ntohs(notice->z_charset)) == ZERR_FIELDLEN)
|
|
return ZERR_HEADERLEN;
|
|
ptr += strlen(ptr) + 1;
|
|
}
|
|
|
|
for (i=0;i<notice->z_num_other_fields;i++)
|
|
if (Z_AddField(&ptr, notice->z_other_fields[i], end))
|
|
return (ZERR_HEADERLEN);
|
|
|
|
if (cksum_len)
|
|
*cksum_len = ptr-*cksum_start;
|
|
|
|
*hdr_len = ptr-buffer;
|
|
|
|
return (ZERR_NONE);
|
|
}
|
|
|
|
Code_t
|
|
Z_FormatRawHeader(ZNotice_t *notice,
|
|
char *buffer,
|
|
int buffer_len,
|
|
int *len,
|
|
char **cstart,
|
|
char **cend)
|
|
{
|
|
|
|
if (!(notice->z_sender_sockaddr.sa.sa_family == AF_INET ||
|
|
notice->z_sender_sockaddr.sa.sa_family == AF_INET6))
|
|
notice->z_sender_sockaddr.sa.sa_family = AF_INET; /* \/\/hatever *//*XXX*/
|
|
|
|
return Z_ZcodeFormatRawHeader(notice, buffer, buffer_len, len,
|
|
NULL, NULL, cstart, cend, 0, 0);
|
|
}
|
|
|
|
static int
|
|
Z_AddField(char **ptr,
|
|
char *field,
|
|
char *end)
|
|
{
|
|
register int len;
|
|
|
|
len = field ? strlen (field) + 1 : 1;
|
|
|
|
if (*ptr+len > end)
|
|
return 1;
|
|
if (field)
|
|
(void) strcpy(*ptr, field);
|
|
else
|
|
**ptr = '\0';
|
|
*ptr += len;
|
|
|
|
return 0;
|
|
}
|
|
|
|
struct _Z_InputQ *
|
|
Z_GetFirstComplete(void)
|
|
{
|
|
struct _Z_InputQ *qptr;
|
|
|
|
qptr = __Q_Head;
|
|
|
|
while (qptr) {
|
|
if (qptr->complete)
|
|
return (qptr);
|
|
qptr = qptr->next;
|
|
}
|
|
|
|
return ((struct _Z_InputQ *)0);
|
|
}
|
|
|
|
struct _Z_InputQ *
|
|
Z_GetNextComplete(struct _Z_InputQ *qptr)
|
|
{
|
|
qptr = qptr->next;
|
|
while (qptr) {
|
|
if (qptr->complete)
|
|
return (qptr);
|
|
qptr = qptr->next;
|
|
}
|
|
|
|
return ((struct _Z_InputQ *)0);
|
|
}
|
|
|
|
void
|
|
Z_RemQueue(struct _Z_InputQ *qptr)
|
|
{
|
|
struct _Z_Hole *hole, *nexthole;
|
|
|
|
if (qptr->complete)
|
|
__Q_CompleteLength--;
|
|
|
|
__Q_Size -= qptr->msg_len;
|
|
|
|
if (qptr->header)
|
|
free(qptr->header);
|
|
if (qptr->msg)
|
|
free(qptr->msg);
|
|
if (qptr->packet)
|
|
free(qptr->packet);
|
|
|
|
hole = qptr->holelist;
|
|
while (hole) {
|
|
nexthole = hole->next;
|
|
free((char *)hole);
|
|
hole = nexthole;
|
|
}
|
|
|
|
if (qptr == __Q_Head && __Q_Head == __Q_Tail) {
|
|
free ((char *)qptr);
|
|
__Q_Head = (struct _Z_InputQ *)0;
|
|
__Q_Tail = (struct _Z_InputQ *)0;
|
|
return;
|
|
}
|
|
|
|
if (qptr == __Q_Head) {
|
|
__Q_Head = qptr->next;
|
|
__Q_Head->prev = (struct _Z_InputQ *)0;
|
|
free ((char *)qptr);
|
|
return;
|
|
}
|
|
if (qptr == __Q_Tail) {
|
|
__Q_Tail = qptr->prev;
|
|
__Q_Tail->next = (struct _Z_InputQ *)0;
|
|
free ((char *)qptr);
|
|
return;
|
|
}
|
|
qptr->prev->next = qptr->next;
|
|
qptr->next->prev = qptr->prev;
|
|
free ((char *)qptr);
|
|
return;
|
|
}
|
|
|
|
Code_t
|
|
Z_SendFragmentedNotice(ZNotice_t *notice,
|
|
int len,
|
|
Z_AuthProc cert_func,
|
|
Z_SendProc send_func)
|
|
{
|
|
ZNotice_t partnotice;
|
|
ZPacket_t buffer;
|
|
char multi[64];
|
|
int offset, hdrsize, fragsize, ret_len, message_len, waitforack;
|
|
Code_t retval;
|
|
|
|
hdrsize = len-notice->z_message_len;
|
|
fragsize = Z_MAXPKTLEN-hdrsize-Z_FRAGFUDGE;
|
|
|
|
offset = 0;
|
|
|
|
waitforack = ((notice->z_kind == UNACKED || notice->z_kind == ACKED)
|
|
&& !__Zephyr_server);
|
|
|
|
partnotice = *notice;
|
|
|
|
while (offset < notice->z_message_len || !notice->z_message_len) {
|
|
(void) sprintf(multi, "%d/%d", offset, notice->z_message_len);
|
|
partnotice.z_multinotice = multi;
|
|
if (offset > 0) {
|
|
(void) Z_gettimeofday(&partnotice.z_uid.tv,
|
|
(struct timezone *)0);
|
|
partnotice.z_uid.tv.tv_sec =
|
|
htonl((u_long) partnotice.z_uid.tv.tv_sec);
|
|
partnotice.z_uid.tv.tv_usec =
|
|
htonl((u_long) partnotice.z_uid.tv.tv_usec);
|
|
(void) memcpy((char *)&partnotice.z_uid.zuid_addr, &__My_addr,
|
|
sizeof(__My_addr));
|
|
(void) memset(¬ice->z_sender_sockaddr, 0, sizeof(notice->z_sender_sockaddr));
|
|
notice->z_sender_sockaddr.ip4.sin_family = AF_INET; /*XXX*/
|
|
notice->z_sender_sockaddr.ip4.sin_port = notice->z_port;
|
|
(void) memcpy(¬ice->z_sender_sockaddr.ip4.sin_addr, &__My_addr, sizeof(__My_addr));
|
|
#ifdef HAVE_SOCKADDR_IN_SIN_LEN
|
|
notice->z_sender_sockaddr.ip4.sin_len = sizeof(notice->z_sender_sockaddr.ip4);
|
|
#endif
|
|
}
|
|
message_len = min(notice->z_message_len-offset, fragsize);
|
|
partnotice.z_message = notice->z_message+offset;
|
|
partnotice.z_message_len = message_len;
|
|
if ((retval = Z_FormatAuthHeader(&partnotice, buffer, Z_MAXHEADERLEN,
|
|
&ret_len, cert_func)) != ZERR_NONE) {
|
|
return (retval);
|
|
}
|
|
memcpy(buffer + ret_len, partnotice.z_message, message_len);
|
|
if ((retval = (*send_func)(&partnotice, buffer, ret_len+message_len,
|
|
waitforack)) != ZERR_NONE) {
|
|
return (retval);
|
|
}
|
|
offset += fragsize;
|
|
if (!notice->z_message_len)
|
|
break;
|
|
}
|
|
|
|
return (ZERR_NONE);
|
|
}
|
|
|
|
/*ARGSUSED*/
|
|
Code_t Z_XmitFragment(ZNotice_t *notice,
|
|
char *buf,
|
|
int len,
|
|
int waitforack)
|
|
{
|
|
return(ZSendPacket(buf, len, waitforack));
|
|
}
|
|
|
|
/* For debugging printing */
|
|
const char *const ZNoticeKinds[] = {
|
|
"UNSAFE", "UNACKED", "ACKED", "HMACK", "HMCTL", "SERVACK", "SERVNAK",
|
|
"CLIENTACK", "STAT"
|
|
};
|
|
|
|
#ifdef Z_DEBUG
|
|
|
|
#undef Z_debug
|
|
void
|
|
Z_debug(const char *format, ...)
|
|
{
|
|
va_list pvar;
|
|
if (!__Z_debug_print)
|
|
return;
|
|
va_start (pvar, format);
|
|
(*__Z_debug_print) (format, pvar, __Z_debug_print_closure);
|
|
va_end (pvar);
|
|
}
|
|
|
|
void
|
|
Z_debug_stderr(const char *format,
|
|
va_list args,
|
|
void *closure)
|
|
{
|
|
#ifdef HAVE_VPRINTF
|
|
vfprintf (stderr, format, args);
|
|
#else
|
|
_doprnt (format, args, stderr);
|
|
#endif
|
|
putc ('\n', stderr);
|
|
}
|
|
|
|
#undef ZSetDebug
|
|
void
|
|
ZSetDebug(void (*proc)(const char *, va_list, void *),
|
|
char *arg)
|
|
{
|
|
__Z_debug_print = proc;
|
|
__Z_debug_print_closure = arg;
|
|
}
|
|
#endif /* Z_DEBUG */
|
|
|
|
#ifdef HAVE_KRB5
|
|
Code_t
|
|
Z_Checksum(krb5_data *cksumbuf,
|
|
krb5_keyblock *keyblock,
|
|
krb5_cksumtype cksumtype,
|
|
krb5_keyusage cksumusage,
|
|
char **asn1_data,
|
|
unsigned int *asn1_len)
|
|
{
|
|
krb5_error_code result;
|
|
unsigned char *data;
|
|
int len;
|
|
#ifndef HAVE_KRB5_CRYPTO_INIT
|
|
krb5_checksum checksum;
|
|
#else
|
|
Checksum checksum;
|
|
krb5_crypto cryptctx;
|
|
#endif
|
|
|
|
#ifndef HAVE_KRB5_CRYPTO_INIT
|
|
/* Create the checksum -- MIT crypto API */
|
|
result = krb5_c_make_checksum(Z_krb5_ctx, cksumtype,
|
|
keyblock, cksumusage,
|
|
cksumbuf, &checksum);
|
|
if (result)
|
|
return result;
|
|
/* HOLDING: checksum */
|
|
|
|
data = checksum.contents;
|
|
len = checksum.length;
|
|
#else
|
|
/* Create the checksum -- heimdal crypto API */
|
|
result = krb5_crypto_init(Z_krb5_ctx, keyblock, keyblock->keytype,
|
|
&cryptctx);
|
|
if (result)
|
|
return result;
|
|
|
|
/* HOLDING: cryptctx */
|
|
result = krb5_create_checksum(Z_krb5_ctx, cryptctx,
|
|
cksumusage, cksumtype,
|
|
cksumbuf->data, cksumbuf->length,
|
|
&checksum);
|
|
krb5_crypto_destroy(Z_krb5_ctx, cryptctx);
|
|
if (result)
|
|
return result;
|
|
|
|
len = checksum.checksum.length;
|
|
data = checksum.checksum.data;
|
|
/* HOLDING: checksum */
|
|
#endif
|
|
|
|
*asn1_data = malloc(len);
|
|
if (*asn1_data == NULL)
|
|
return errno;
|
|
memcpy(*asn1_data, data, len);
|
|
*asn1_len = len;
|
|
|
|
#ifndef HAVE_KRB5_CRYPTO_INIT
|
|
krb5_free_checksum_contents(Z_krb5_ctx, &checksum);
|
|
#else
|
|
free_Checksum(&checksum);
|
|
#endif
|
|
|
|
return 0;
|
|
}
|
|
|
|
Code_t
|
|
Z_InsertZcodeChecksum(krb5_keyblock *keyblock,
|
|
ZNotice_t *notice,
|
|
char *buffer,
|
|
char *cksum_start,
|
|
int cksum_len,
|
|
char *cstart,
|
|
char *cend,
|
|
int buffer_len,
|
|
int *length_adjust,
|
|
int from_server)
|
|
{
|
|
int plain_len; /* length of part not to be checksummed */
|
|
int cksum0_len; /* length of part before checksum */
|
|
int cksum1_len; /* length of part after checksum */
|
|
krb5_data cksumbuf;
|
|
krb5_data cksum;
|
|
unsigned char *cksum_data;
|
|
unsigned int cksum_data_len;
|
|
char *cksum_out_data;
|
|
krb5_enctype enctype;
|
|
krb5_cksumtype cksumtype;
|
|
Code_t result;
|
|
|
|
result = Z_ExtractEncCksum(keyblock, &enctype, &cksumtype);
|
|
if (result)
|
|
return (ZAUTH_FAILED);
|
|
|
|
/* Assemble the things to be checksummed */
|
|
plain_len = cksum_start - buffer;
|
|
cksum0_len = cstart - cksum_start;
|
|
cksum1_len = (cksum_start + cksum_len) - cend;
|
|
memset(&cksumbuf, 0, sizeof(cksumbuf));
|
|
cksumbuf.length = cksum0_len + cksum1_len + notice->z_message_len;
|
|
cksumbuf.data = malloc(cksumbuf.length);
|
|
if (!cksumbuf.data)
|
|
return ENOMEM;
|
|
cksum_data = (unsigned char *)cksumbuf.data;
|
|
memcpy(cksum_data, cksum_start, cksum0_len);
|
|
memcpy(cksum_data + cksum0_len, cend, cksum1_len);
|
|
memcpy(cksum_data + cksum0_len + cksum1_len,
|
|
notice->z_message, notice->z_message_len);
|
|
/* compute the checksum */
|
|
result = Z_Checksum(&cksumbuf, keyblock, cksumtype,
|
|
from_server ? Z_KEYUSAGE_SRV_CKSUM
|
|
: Z_KEYUSAGE_CLT_CKSUM,
|
|
&cksum_out_data, &cksum_data_len);
|
|
if (result) {
|
|
free(cksumbuf.data);
|
|
return result;
|
|
}
|
|
cksum.data = cksum_out_data;
|
|
cksum.length = cksum_data_len;
|
|
|
|
/*
|
|
* OK.... we can zcode to a space starting at 'cstart',
|
|
* with a length of buffer_len - (plain_len + cksum_len).
|
|
* Then we tack on the end part, which is located at
|
|
* cksumbuf.data + cksum0_len and has length cksum1_len
|
|
*/
|
|
|
|
result = ZMakeZcode(cstart, buffer_len - (plain_len + cksum_len),
|
|
(unsigned char *)cksum.data, cksum.length);
|
|
free(cksum.data);
|
|
if (!result) {
|
|
int zcode_len = strlen(cstart) + 1;
|
|
memcpy(cstart + zcode_len, cksum_data + cksum0_len, cksum1_len);
|
|
*length_adjust = zcode_len - cksum_len + (cksum0_len + cksum1_len);
|
|
}
|
|
free(cksumbuf.data);
|
|
return result;
|
|
}
|
|
|
|
Code_t
|
|
Z_ExtractEncCksum(krb5_keyblock *keyblock,
|
|
krb5_enctype *enctype,
|
|
krb5_cksumtype *cksumtype)
|
|
{
|
|
*enctype = Z_enctype(keyblock);
|
|
return Z_krb5_lookup_cksumtype(*enctype, cksumtype);
|
|
}
|
|
#endif
|
|
|
|
#ifdef HAVE_KRB5
|
|
/* returns 0 if invalid or losing, 1 if valid, *sigh* */
|
|
int
|
|
Z_krb5_verify_cksum(krb5_keyblock *keyblock,
|
|
krb5_data *cksumbuf,
|
|
krb5_cksumtype cksumtype,
|
|
krb5_keyusage cksumusage,
|
|
unsigned char *asn1_data,
|
|
int asn1_len)
|
|
{
|
|
krb5_error_code result;
|
|
#ifndef HAVE_KRB5_CRYPTO_INIT
|
|
krb5_checksum checksum;
|
|
krb5_boolean valid;
|
|
#else
|
|
krb5_crypto cryptctx;
|
|
Checksum checksum;
|
|
#endif
|
|
|
|
memset(&checksum, 0, sizeof(checksum));
|
|
#ifndef HAVE_KRB5_CRYPTO_INIT
|
|
/* Verify the checksum -- MIT crypto API */
|
|
checksum.length = asn1_len;
|
|
checksum.contents = asn1_data;
|
|
checksum.checksum_type = cksumtype;
|
|
result = krb5_c_verify_checksum(Z_krb5_ctx,
|
|
keyblock, cksumusage,
|
|
cksumbuf, &checksum, &valid);
|
|
if (!result && valid)
|
|
return 1;
|
|
else
|
|
return 0;
|
|
#else
|
|
checksum.checksum.length = asn1_len;
|
|
checksum.checksum.data = asn1_data;
|
|
checksum.cksumtype = cksumtype;
|
|
|
|
result = krb5_crypto_init(Z_krb5_ctx, keyblock, keyblock->keytype, &cryptctx);
|
|
if (result)
|
|
return 0;
|
|
|
|
/* HOLDING: cryptctx */
|
|
result = krb5_verify_checksum(Z_krb5_ctx, cryptctx, cksumusage,
|
|
cksumbuf->data, cksumbuf->length,
|
|
&checksum);
|
|
krb5_crypto_destroy(Z_krb5_ctx, cryptctx);
|
|
if (result)
|
|
return 0;
|
|
else
|
|
return 1;
|
|
#endif
|
|
}
|
|
#endif
|