* scc_gennew.c, scc_maybe.c : New version saves a length after
version for whatever we want to put into the ccache before
the first credential (like a time skew)
* scc_read.c, scc_write.c : Remove krb5_enctype references, and
replace with krb5_keytype where appropriate
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@6684
dc483132-0cff-0310-8789-
dd5450dbe970
+Tue Sep 05 22:58:52 1995
+
+ * scc.h : Add another KRB5_SCC_FVNO but don't up the default.
+ * scc_gennew.c, scc_maybe.c : New version saves a length after
+ version for whatever we want to put into the ccache before
+ the first credential (like a time skew)
+ * scc_read.c, scc_write.c : Remove krb5_enctype references, and
+ replace with krb5_keytype where appropriate
+
Tue Aug 29 13:36:39 EDT 1995 Paul Park (pjpark@mit.edu)
* scc_reslv.c - Set magic number in successfully resolved ccache.
* some overriding compatibility reasons not to do so.
*/
-#define KRB5_SCC_FVNO_1 0x0501 /* krb v5, scc v1 */
+#define KRB5_SCC_FVNO_1 0x0501 /* krb v5, scc v1 */
#define KRB5_SCC_FVNO_2 0x0502 /* krb v5, scc v2 */
-#define KRB5_SCC_FVNO_3 0x0503 /* krb v5, scc v2 */
+#define KRB5_SCC_FVNO_3 0x0503 /* krb v5, scc v3 */
+#define KRB5_SCC_FVNO_4 0x0504 /* krb v5, scc v4 */
#define KRB5_SCC_DEFAULT_FVNO KRB5_SCC_FVNO_3
(void) remove(((krb5_scc_data *) lid->data)->filename);
goto err_out;
}
+ /* For version 4 we save a length for the rest of the header */
+ if (KRB5_SCC_DEFAULT_FVNO == KRB5_SCC_FVNO_4) {
+ unsigned char scc_flen[2] = { 0, 0 };
+ if (!fwrite((char *)scc_flen, sizeof(scc_flen), 1, f)) {
+ retcode = krb5_scc_interpret(context, errno);
+ (void) fclose(f);
+ (void) remove(((krb5_scc_data *) lid->data)->filename);
+ goto err_out;
+ }
+ }
if (fclose(f) == EOF) {
retcode = krb5_scc_interpret(context, errno);
(void) remove(((krb5_scc_data *) lid->data)->filename);
data->version = (fvno_bytes[0] << 8) + fvno_bytes[1];
if ((data->version != KRB5_SCC_FVNO_1) &&
(data->version != KRB5_SCC_FVNO_2) &&
- (data->version != KRB5_SCC_FVNO_3)) {
+ (data->version != KRB5_SCC_FVNO_3) &&
+ (data->version != KRB5_SCC_FVNO_4)) {
(void) krb5_unlock_file(context, fileno(f));
(void) fclose(f);
return KRB5_CCACHE_BADVNO;
}
- }
- data->file = f;
- return 0;
+ if (data->version == KRB5_SCC_FVNO_4) {
+ char buf[1024];
+ int len;
+
+ if (!fread((char *)fvno_bytes, sizeof(fvno_bytes), 1, f)) {
+ (void) krb5_unlock_file(context, fileno(f));
+ (void) fclose(f);
+ return KRB5_CCACHE_BADVNO;
+ }
+ if (len = (fvno_bytes[0] << 8) + fvno_bytes[1]) {
+ if (!fread(buf, len, 1, f)) {
+ (void) krb5_unlock_file(context, fileno(f));
+ (void) fclose(f);
+ return KRB5_CCACHE_BADVNO;
+ }
+ }
+ }
+ }
+ data->file = f;
+ return 0;
}
kret = krb5_scc_read_ui_2(context, id, &ui2);
keyblock->keytype = ui2;
CHECK(kret);
- if ((data->version == KRB5_SCC_FVNO_1) ||
- (data->version == KRB5_SCC_FVNO_2))
- keyblock->etype = ETYPE_UNKNOWN;
- else {
+ if (data->version == KRB5_SCC_FVNO_3) {
+ /* This works because the old etype is the same as the new keytype. */
kret = krb5_scc_read_ui_2(context, id, &ui2);
- keyblock->etype = ui2;
+ keyblock->keytype = ui2;
CHECK(kret);
}
ret = krb5_scc_store_ui_2(context, id, keyblock->keytype);
CHECK(ret);
- if ((data->version != KRB5_SCC_FVNO_1) &&
- (data->version != KRB5_SCC_FVNO_2)) {
- ret = krb5_scc_store_ui_2(context, id, keyblock->etype);
+ if (data->version == KRB5_SCC_FVNO_3) {
+ ret = krb5_scc_store_ui_2(context, id, keyblock->keytype);
CHECK(ret);
}
ret = krb5_scc_store_int32(context, id, keyblock->length);