* or implied warranty.
*/
-#include "gssapiP_eap.h"
+/*
+ * PRF
+ */
-#ifndef MIN /* Usually found in <sys/param.h>. */
-#define MIN(_a,_b) ((_a)<(_b)?(_a):(_b))
-#endif
+#include "gssapiP_eap.h"
OM_uint32
gss_pseudo_random(OM_uint32 *minor,
prf_out->length = 0;
prf_out->value = NULL;
- if (!CTX_IS_ESTABLISHED(ctx))
+ if (ctx == GSS_C_NO_CONTEXT) {
+ *minor = EINVAL;
+ return GSS_S_CALL_INACCESSIBLE_READ | GSS_S_NO_CONTEXT;
+ }
+
+ *minor = 0;
+
+ GSSEAP_MUTEX_LOCK(&ctx->mutex);
+
+ if (!CTX_IS_ESTABLISHED(ctx)) {
+ GSSEAP_MUTEX_UNLOCK(&ctx->mutex);
+ *minor = GSSEAP_CONTEXT_INCOMPLETE;
return GSS_S_NO_CONTEXT;
+ }
GSSEAP_KRB_INIT(&krbContext);
ns.length = 0;
ns.data = NULL;
- if (prf_key != GSS_C_PRF_KEY_FULL &&
+ if (prf_key != GSS_C_PRF_KEY_PARTIAL &&
prf_key != GSS_C_PRF_KEY_FULL) {
- code = EINVAL;
+ code = GSSEAP_BAD_PRF_KEY;
goto cleanup;
}
}
cleanup:
+ GSSEAP_MUTEX_UNLOCK(&ctx->mutex);
+
if (code != 0)
gss_release_buffer(&tmpMinor, prf_out);
krb5_free_data_contents(krbContext, &ns);
krb5_free_data_contents(krbContext, &t);
*minor = code;
+
return (code == 0) ? GSS_S_COMPLETE : GSS_S_FAILURE;
}
-