gss_ctx_id_t ctx,
gss_buffer_t token)
{
- token->length = 0;
- token->value = NULL;
-
- /*
- * The format of this token awaits definition by libradsec.
- */
- return GSS_S_COMPLETE;
+ /* XXX we also need to serialise the current server name */
+ return duplicateBuffer(minor, &ctx->acceptorCtx.state, token);
}
static OM_uint32
key.value = KRB_KEY_DATA(&ctx->rfc3961Key);
if (ctx->initiatorName != GSS_C_NO_NAME) {
- major = gssEapExportName(minor, ctx->initiatorName, &initiatorName, TRUE);
+ major = gssEapExportNameInternal(minor, ctx->initiatorName,
+ &initiatorName,
+ EXPORT_NAME_FLAG_COMPOSITE);
if (GSS_ERROR(major))
goto cleanup;
}
if (ctx->acceptorName != GSS_C_NO_NAME) {
- major = gssEapExportName(minor, ctx->acceptorName, &acceptorName, TRUE);
+ major = gssEapExportNameInternal(minor, ctx->acceptorName,
+ &acceptorName,
+ EXPORT_NAME_FLAG_COMPOSITE);
if (GSS_ERROR(major))
goto cleanup;
}
* contexts.
*/
if (!CTX_IS_INITIATOR(ctx) && !CTX_IS_ESTABLISHED(ctx)) {
+ assert((ctx->flags & CTX_FLAG_KRB_REAUTH_GSS) == 0);
+
major = gssEapExportPartialContext(minor, ctx, &partialCtx);
if (GSS_ERROR(major))
goto cleanup;
}
- length = 16; /* version, state, flags, etc */
+ length = 16; /* version, state, flags, */
length += 4 + ctx->mechanismUsed->length; /* mechanismUsed */
length += 12 + key.length; /* rfc3961Key.value */
length += 4 + initiatorName.length; /* initiatorName.value */
OM_uint32 major, tmpMinor;
gss_ctx_id_t ctx = *context_handle;
+ interprocess_token->length = 0;
+ interprocess_token->value = NULL;
+
if (ctx == GSS_C_NO_CONTEXT)
return GSS_S_NO_CONTEXT;