#include "gssapiP_eap.h"
+#define UPDATE_REMAIN(n) do { \
+ p += (n); \
+ remain -= (n); \
+ } while (0)
+
+#define CHECK_REMAIN(n) do { \
+ if (remain < (n)) { \
+ *minor = ERANGE; \
+ return GSS_S_DEFECTIVE_TOKEN; \
+ } \
+ } while (0)
+
static OM_uint32
gssEapImportPartialContext(OM_uint32 *minor,
unsigned char **pBuf,
size_t *pRemain,
gss_ctx_id_t ctx)
{
+ OM_uint32 major;
unsigned char *p = *pBuf;
size_t remain = *pRemain;
gss_buffer_desc buf;
+ size_t serverLen;
- if (remain < 4) {
- *minor = ERANGE;
- return GSS_S_DEFECTIVE_TOKEN;
+ /* Selected RADIUS server */
+ CHECK_REMAIN(4);
+ serverLen = load_uint32_be(p);
+ UPDATE_REMAIN(4);
+
+ if (serverLen != 0) {
+ CHECK_REMAIN(serverLen);
+
+ ctx->acceptorCtx.radServer = GSSEAP_MALLOC(serverLen + 1);
+ if (ctx->acceptorCtx.radServer == NULL) {
+ *minor = ENOMEM;
+ return GSS_S_FAILURE;
+ }
+ memcpy(ctx->acceptorCtx.radServer, p, serverLen);
+ ctx->acceptorCtx.radServer[serverLen] = '\0';
+
+ UPDATE_REMAIN(serverLen);
}
+ /* RADIUS state blob */
+ CHECK_REMAIN(4);
buf.length = load_uint32_be(p);
+ UPDATE_REMAIN(4);
if (buf.length != 0) {
- *minor = EINVAL;
- return GSS_S_DEFECTIVE_TOKEN;
+ CHECK_REMAIN(buf.length);
+
+ buf.value = p;
+
+ major = duplicateBuffer(minor, &buf, &ctx->acceptorCtx.state);
+ if (GSS_ERROR(major))
+ return major;
+
+ UPDATE_REMAIN(buf.length);
}
- *minor = 0;
+ *pBuf = p;
+ *pRemain = remain;
+
return GSS_S_COMPLETE;
}
* acceptor contexts.
*/
if (!CTX_IS_INITIATOR(ctx) && !CTX_IS_ESTABLISHED(ctx)) {
+ assert((ctx->flags & CTX_FLAG_KRB_REAUTH_GSS) == 0);
+
major = gssEapImportPartialContext(minor, &p, &remain, ctx);
if (GSS_ERROR(major))
return major;
OM_uint32 major, tmpMinor;
gss_ctx_id_t ctx = GSS_C_NO_CONTEXT;
+ *minor = 0;
*context_handle = GSS_C_NO_CONTEXT;
if (interprocess_token == GSS_C_NO_BUFFER ||