aboutsummaryrefslogtreecommitdiff
path: root/src/plugins
diff options
context:
space:
mode:
authorGreg Hudson <ghudson@mit.edu>2019-11-13 00:53:56 -0500
committerGreg Hudson <ghudson@mit.edu>2019-11-13 17:56:12 -0500
commit4d106256cc5c4765be0d1d844af0b18cdcf1404c (patch)
treed286e6924d87f4d300f70ef59aa801e038a65d3e /src/plugins
parentc3e08616316aff2314feb9358c5c02f9a61a67b9 (diff)
downloadkrb5-4d106256cc5c4765be0d1d844af0b18cdcf1404c.zip
krb5-4d106256cc5c4765be0d1d844af0b18cdcf1404c.tar.gz
krb5-4d106256cc5c4765be0d1d844af0b18cdcf1404c.tar.bz2
Use k5-buf.h integer helpers where appropriate
Diffstat (limited to 'src/plugins')
-rw-r--r--src/plugins/kdb/lmdb/marshal.c72
-rw-r--r--src/plugins/preauth/spake/spake_kdc.c15
2 files changed, 31 insertions, 56 deletions
diff --git a/src/plugins/kdb/lmdb/marshal.c b/src/plugins/kdb/lmdb/marshal.c
index f49a2cb..433bb81 100644
--- a/src/plugins/kdb/lmdb/marshal.c
+++ b/src/plugins/kdb/lmdb/marshal.c
@@ -36,29 +36,11 @@
#include "klmdb-int.h"
static void
-put16(struct k5buf *buf, uint16_t num)
-{
- uint8_t n[2];
-
- store_16_le(num, n);
- k5_buf_add_len(buf, n, 2);
-}
-
-static void
-put32(struct k5buf *buf, uint32_t num)
-{
- uint8_t n[4];
-
- store_32_le(num, n);
- k5_buf_add_len(buf, n, 4);
-}
-
-static void
put_tl_data(struct k5buf *buf, const krb5_tl_data *tl)
{
for (; tl != NULL; tl = tl->tl_data_next) {
- put16(buf, tl->tl_data_type);
- put16(buf, tl->tl_data_length);
+ k5_buf_add_uint16_le(buf, tl->tl_data_type);
+ k5_buf_add_uint16_le(buf, tl->tl_data_length);
k5_buf_add_len(buf, tl->tl_data_contents, tl->tl_data_length);
}
}
@@ -76,21 +58,21 @@ klmdb_encode_princ(krb5_context context, const krb5_db_entry *entry,
k5_buf_init_dynamic(&buf);
- put32(&buf, entry->attributes);
- put32(&buf, entry->max_life);
- put32(&buf, entry->max_renewable_life);
- put32(&buf, entry->expiration);
- put32(&buf, entry->pw_expiration);
- put16(&buf, entry->n_tl_data);
- put16(&buf, entry->n_key_data);
+ k5_buf_add_uint32_le(&buf, entry->attributes);
+ k5_buf_add_uint32_le(&buf, entry->max_life);
+ k5_buf_add_uint32_le(&buf, entry->max_renewable_life);
+ k5_buf_add_uint32_le(&buf, entry->expiration);
+ k5_buf_add_uint32_le(&buf, entry->pw_expiration);
+ k5_buf_add_uint16_le(&buf, entry->n_tl_data);
+ k5_buf_add_uint16_le(&buf, entry->n_key_data);
put_tl_data(&buf, entry->tl_data);
for (i = 0; i < entry->n_key_data; i++) {
kd = &entry->key_data[i];
- put16(&buf, kd->key_data_ver);
- put16(&buf, kd->key_data_kvno);
+ k5_buf_add_uint16_le(&buf, kd->key_data_ver);
+ k5_buf_add_uint16_le(&buf, kd->key_data_kvno);
for (j = 0; j < kd->key_data_ver; j++) {
- put16(&buf, kd->key_data_type[j]);
- put16(&buf, kd->key_data_length[j]);
+ k5_buf_add_uint16_le(&buf, kd->key_data_type[j]);
+ k5_buf_add_uint16_le(&buf, kd->key_data_length[j]);
if (kd->key_data_length[j] > 0) {
k5_buf_add_len(&buf, kd->key_data_contents[j],
kd->key_data_length[j]);
@@ -125,26 +107,26 @@ klmdb_encode_policy(krb5_context context, const osa_policy_ent_rec *pol,
*len_out = 0;
k5_buf_init_dynamic(&buf);
- put32(&buf, pol->pw_min_life);
- put32(&buf, pol->pw_max_life);
- put32(&buf, pol->pw_min_length);
- put32(&buf, pol->pw_min_classes);
- put32(&buf, pol->pw_history_num);
- put32(&buf, pol->pw_max_fail);
- put32(&buf, pol->pw_failcnt_interval);
- put32(&buf, pol->pw_lockout_duration);
- put32(&buf, pol->attributes);
- put32(&buf, pol->max_life);
- put32(&buf, pol->max_renewable_life);
+ k5_buf_add_uint32_le(&buf, pol->pw_min_life);
+ k5_buf_add_uint32_le(&buf, pol->pw_max_life);
+ k5_buf_add_uint32_le(&buf, pol->pw_min_length);
+ k5_buf_add_uint32_le(&buf, pol->pw_min_classes);
+ k5_buf_add_uint32_le(&buf, pol->pw_history_num);
+ k5_buf_add_uint32_le(&buf, pol->pw_max_fail);
+ k5_buf_add_uint32_le(&buf, pol->pw_failcnt_interval);
+ k5_buf_add_uint32_le(&buf, pol->pw_lockout_duration);
+ k5_buf_add_uint32_le(&buf, pol->attributes);
+ k5_buf_add_uint32_le(&buf, pol->max_life);
+ k5_buf_add_uint32_le(&buf, pol->max_renewable_life);
if (pol->allowed_keysalts == NULL) {
- put32(&buf, 0);
+ k5_buf_add_uint32_le(&buf, 0);
} else {
- put32(&buf, strlen(pol->allowed_keysalts));
+ k5_buf_add_uint32_le(&buf, strlen(pol->allowed_keysalts));
k5_buf_add(&buf, pol->allowed_keysalts);
}
- put16(&buf, pol->n_tl_data);
+ k5_buf_add_uint16_le(&buf, pol->n_tl_data);
put_tl_data(&buf, pol->tl_data);
if (k5_buf_status(&buf) != 0)
diff --git a/src/plugins/preauth/spake/spake_kdc.c b/src/plugins/preauth/spake/spake_kdc.c
index 59e8840..88c964c 100644
--- a/src/plugins/preauth/spake/spake_kdc.c
+++ b/src/plugins/preauth/spake/spake_kdc.c
@@ -120,10 +120,7 @@ parse_cookie(const krb5_data *cookie, int *stage_out, int32_t *group_out,
static void
marshal_data(struct k5buf *buf, const krb5_data *data)
{
- uint8_t lenbuf[4];
-
- store_32_be(data->length, lenbuf);
- k5_buf_add_len(buf, lenbuf, 4);
+ k5_buf_add_uint32_be(buf, data->length);
k5_buf_add_len(buf, data->data, data->length);
}
@@ -133,18 +130,14 @@ make_cookie(int stage, int32_t group, const krb5_data *spake,
const krb5_data *thash, krb5_data *cookie_out)
{
struct k5buf buf;
- uint8_t intbuf[4];
*cookie_out = empty_data();
k5_buf_init_dynamic_zap(&buf);
/* Marshal the version, stage, and group. */
- store_16_be(1, intbuf);
- k5_buf_add_len(&buf, intbuf, 2);
- store_16_be(stage, intbuf);
- k5_buf_add_len(&buf, intbuf, 2);
- store_32_be(group, intbuf);
- k5_buf_add_len(&buf, intbuf, 4);
+ k5_buf_add_uint16_be(&buf, 1);
+ k5_buf_add_uint16_be(&buf, stage);
+ k5_buf_add_uint32_be(&buf, group);
/* Marshal the data fields. */
marshal_data(&buf, spake);