summaryrefslogtreecommitdiffstats
path: root/src/windows/wintel/k5stream.c
blob: f39daa8615e78002b920ec2eed5a1a844693ee83 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
/*
 *
 * K5stream
 *
 * Emulates the kstream package in Kerberos 4
 *
 */

#include <stdio.h>
#include <io.h>
#include <malloc.h>
#include "telnet.h"
#include "k5stream.h"
#include "auth.h"

int
kstream_destroy(kstream ks)
{
  if (ks != NULL) {
    auth_destroy(ks);                       /* Destroy authorizing */

    closesocket(ks->fd);                    /* Close the socket??? */
    free(ks);
  }
  return 0;
}

void
kstream_set_buffer_mode(kstream ks, int mode)
{
}


kstream
kstream_create_from_fd(int fd,
		       const struct kstream_crypt_ctl_block *ctl,
		       kstream_ptr data)
{
  kstream ks;
  int n;
  BOOL on = 1;

  ks = malloc(sizeof(struct kstream_int));
  if (ks == NULL)
    return NULL;

  ks->fd = fd;

  setsockopt(ks->fd, SOL_SOCKET, SO_OOBINLINE, (const char *)&on, sizeof(on));

  n = auth_init(ks, data);                   /* Initialize authorizing */
  if (n) {
    free(ks);
    return NULL;
  }

  ks->encrypt = NULL;
  ks->decrypt = NULL;

  return ks;
}

int
kstream_write(kstream ks, void *p_data, size_t p_len)
{
  int n;
  struct kstream_data_block i;

#ifdef DEBUG
  hexdump("plaintext:", p_data, p_len);
#endif

  if (ks->encrypt) {
    i.ptr = p_data;
    i.length = p_len;
    ks->encrypt(&i, NULL, NULL);
#ifdef DEBUG
    hexdump("cyphertext:", p_data, p_len);
#endif
  }

  n = send(ks->fd, p_data, p_len, 0);        /* Write the data */

  return n;                                   /* higher layer does retries */
}


int
kstream_read(kstream ks, void *p_data, size_t p_len)
{
  int n;
  struct kstream_data_block i;

  n = recv(ks->fd, p_data, p_len, 0);        /* read the data */

  if (n < 0)
    return n;

#ifdef DEBUG
  hexdump("input data:", p_data, n);
#endif

  if (ks->decrypt) {
    extern int encrypt_flag;

    if (encrypt_flag == 2)
      encrypt_flag = 1;

    i.ptr = p_data;
    i.length = n;
    ks->decrypt(&i, NULL, NULL);
#ifdef DEBUG
    hexdump("decrypted data:", p_data, n);
#endif
  }

  return n;                                   /* higher layer does retries */
}