/* * lib/krb5/ccache/stdio/scc_nseq.c * * Copyright 1990,1991 by the Massachusetts Institute of Technology. * All Rights Reserved. * * Export of this software from the United States of America may * require a specific license from the United States Government. * It is the responsibility of any person or organization contemplating * export to obtain such a license before exporting. * * WITHIN THAT CONSTRAINT, permission to use, copy, modify, and * distribute this software and its documentation for any purpose and * without fee is hereby granted, provided that the above copyright * notice appear in all copies and that both that copyright notice and * this permission notice appear in supporting documentation, and that * the name of M.I.T. not be used in advertising or publicity pertaining * to distribution of the software without specific, written prior * permission. M.I.T. makes no representations about the suitability of * this software for any purpose. It is provided "as is" without express * or implied warranty. * * * This file contains the source code for krb5_scc_next_cred. */ #include "scc.h" /* * Requires: * cursor is a krb5_cc_cursor originally obtained from * krb5_scc_start_seq_get. * * Modifes: * cursor, creds * * Effects: * Fills in creds with the "next" credentals structure from the cache * id. The actual order the creds are returned in is arbitrary. * Space is allocated for the variable length fields in the * credentials structure, so the object returned must be passed to * krb5_destroy_credential. * * The cursor is updated for the next call to krb5_scc_next_cred. * * Errors: * system errors */ krb5_error_code krb5_scc_next_cred(context, id, cursor, creds) krb5_context context; krb5_ccache id; krb5_cc_cursor *cursor; krb5_creds *creds; { #define TCHECK(ret) if (ret != KRB5_OK) goto lose; int ret; krb5_error_code kret; krb5_scc_cursor *fcursor; krb5_int32 int32; krb5_octet octet; #define Z(field) creds->field = 0 Z (client); Z (server); Z (keyblock.contents); Z (authdata); Z (ticket.data); Z (second_ticket.data); Z (addresses); #undef Z MAYBE_OPEN (context, id, SCC_OPEN_RDONLY); fcursor = (krb5_scc_cursor *) *cursor; ret = fseek(((krb5_scc_data *) id->data)->file, fcursor->pos, 0); if (ret < 0) { ret = krb5_scc_interpret(context, errno); MAYBE_CLOSE (context, id, ret); return ret; } kret = krb5_scc_read_principal(context, id, &creds->client); TCHECK(kret); kret = krb5_scc_read_principal(context, id, &creds->server); TCHECK(kret); kret = krb5_scc_read_keyblock(context, id, &creds->keyblock); TCHECK(kret); kret = krb5_scc_read_times(context, id, &creds->times); TCHECK(kret); kret = krb5_scc_read_octet(context, id, &octet); TCHECK(kret); creds->is_skey = octet; kret = krb5_scc_read_int32(context, id, &int32); TCHECK(kret); creds->ticket_flags = int32; kret = krb5_scc_read_addrs(context, id, &creds->addresses); TCHECK(kret); kret = krb5_scc_read_authdata (context, id, &creds->authdata); TCHECK (kret); kret = krb5_scc_read_data(context, id, &creds->ticket); TCHECK(kret); kret = krb5_scc_read_data(context, id, &creds->second_ticket); TCHECK(kret); fcursor->pos = ftell(((krb5_scc_data *) id->data)->file); cursor = (krb5_cc_cursor *) fcursor; lose: if (kret != KRB5_OK) { krb5_free_cred_contents(context, creds); } MAYBE_CLOSE (context, id, kret); return kret; }