krb5_error_code code;
krb5_keytab keytab = NULL;
krb5_keytab_entry ktent = { 0 };
-#ifdef HAVE_HEIMDAL_VERSION
- krb5_kt_cursor cursor = { 0 };
-#else
- krb5_kt_cursor cursor = NULL;
-#endif
+ krb5_kt_cursor cursor;
*princ = NULL;
memset(key, 0, sizeof(*key));
+ memset(&cursor, 0, sizeof(cursor));
code = krb5_kt_default(krbContext, &keytab);
if (code != 0)
while ((code = krb5_kt_next_entry(krbContext, keytab,
&ktent, &cursor)) == 0) {
-#ifdef HAVE_HEIMDAL_VERSION
- if (ktent.keyblock.keytype == ctx->encryptionType)
+ if (KRB_KEY_TYPE(KRB_KT_ENT_KEYBLOCK(&ktent)) == ctx->encryptionType)
break;
else
- krb5_kt_free_entry(krbContext, &ktent);
-#else
- if (ktent.key.enctype == ctx->encryptionType)
- break;
- else
- krb5_free_keytab_entry_contents(krbContext, &ktent);
-#endif
+ KRB_KT_ENT_FREE(krbContext, &ktent);
}
}
if (code == 0) {
*princ = ktent.principal;
-#ifdef HAVE_HEIMDAL_VERSION
- *key = ktent.keyblock;
-#else
- *key = ktent.key;
-#endif
+ *key = *KRB_KT_ENT_KEYBLOCK(&ktent);
}
cleanup:
if (cred == GSS_C_NO_CREDENTIAL || cred->name == GSS_C_NO_NAME)
krb5_kt_end_seq_get(krbContext, keytab, &cursor);
krb5_kt_close(krbContext, keytab);
-
if (code != 0)
-#ifdef HAVE_HEIMDAL_VERSION
- krb5_kt_free_entry(krbContext, &ktent);
-#else
- krb5_free_keytab_entry_contents(krbContext, &ktent);
-#endif
+ KRB_KT_ENT_FREE(krbContext, &ktent);
return code;
}
krb5_const_principal acceptorPrinc,
krb5_keyblock *session,
#ifdef HAVE_HEIMDAL_VERSION
- krb5_authdata *authdata
+ krb5_authdata *kdcIssuedAuthData
#else
- krb5_authdata ***authdata
+ krb5_authdata ***kdcIssuedAuthData
#endif
)
{
OM_uint32 major, tmpMinor;
krb5_error_code code;
+ krb5_context krbContext;
gss_buffer_desc attrBuf = GSS_C_EMPTY_BUFFER;
#ifdef HAVE_HEIMDAL_VERSION
- AuthorizationData authDataBuf, *authData = &authDataBuf;
+ krb5_authdata authDataBuf, *authData = &authDataBuf;
AuthorizationDataElement authDatum = { 0 };
#else
krb5_authdata *authData[2], authDatum = { 0 };
#endif
- krb5_context krbContext;
+
+ memset(kdcIssuedAuthData, 0, sizeof(*kdcIssuedAuthData));
GSSEAP_KRB_INIT(&krbContext);
#endif
code = krbMakeAuthDataKdcIssued(krbContext, session, acceptorPrinc,
- authData, authdata);
+ authData, kdcIssuedAuthData);
if (code != 0) {
major = GSS_S_FAILURE;
*minor = code;
krb5_ticket ticket;
krb5_enc_tkt_part enc_part;
#endif
- krb5_data *ticketData = NULL, *credsData = NULL;
+ krb5_data *ticketData = NULL, credsData = { 0 };
krb5_creds creds = { 0 };
krb5_auth_context authContext = NULL;
if (code != 0)
goto cleanup;
- code = krb5_mk_1cred(krbContext, authContext, &creds, &credsData, NULL);
+ code = krbMakeCred(krbContext, authContext, &creds, &credsData);
if (code != 0)
goto cleanup;
- krbDataToGssBuffer(credsData, credBuf);
+ krbDataToGssBuffer(&credsData, credBuf);
cleanup:
#ifdef HAVE_HEIMDAL_VERSION
krb5_free_keyblock_contents(krbContext, &acceptorKey);
krb5_free_data(krbContext, ticketData);
krb5_auth_con_free(krbContext, authContext);
- if (credsData != NULL)
- GSSEAP_FREE(credsData);
if (major == GSS_S_COMPLETE) {
*minor = code;
return major;
}
+#ifndef HAVE_HEIMDAL_VERSION
static gss_buffer_desc radiusAvpKrbAttr = {
sizeof("urn:authdata-radius-avp") - 1, "urn:authdata-radius-avp"
};
+#endif
/*
* Unfortunately extracting an AD-KDCIssued authorization data element
*/
static OM_uint32
defrostAttrContext(OM_uint32 *minor,
+ gss_ctx_id_t glueContext,
gss_name_t glueName,
gss_name_t mechName)
{
OM_uint32 major, tmpMinor;
+#ifdef HAVE_HEIMDAL_VERSION
+ gss_OID_desc oid = { 0 };
+ gss_buffer_set_t authData = GSS_C_NO_BUFFER_SET;
+#else
gss_buffer_desc authData = GSS_C_EMPTY_BUFFER;
gss_buffer_desc authDataDisplay = GSS_C_EMPTY_BUFFER;
int more = -1;
int authenticated, complete;
+#endif
+
+#ifdef HAVE_HEIMDAL_VERSION
+ major = composeOid(minor,
+ GSS_KRB5_EXTRACT_AUTHZ_DATA_FROM_SEC_CONTEXT_X->elements,
+ GSS_KRB5_EXTRACT_AUTHZ_DATA_FROM_SEC_CONTEXT_X->length,
+ KRB5_AUTHDATA_RADIUS_AVP, &oid);
+ if (GSS_ERROR(major))
+ return major;
+ /* XXX we are assuming that this verifies AD-KDCIssued signature */
+ major = gssInquireSecContextByOid(minor, glueContext,
+ &oid, &authData);
+ if (major == GSS_S_COMPLETE) {
+ if (authData == GSS_C_NO_BUFFER_SET || authData->count != 1)
+ major = GSS_S_FAILURE;
+ else
+ major = gssEapImportAttrContext(minor, authData->elements, mechName);
+ } else if (major == GSS_S_FAILURE && *minor == ENOENT) {
+ /* This is the equivalent of GSS_S_UNAVAILABLE for MIT attr APIs */
+ *minor = 0;
+ major = GSS_S_COMPLETE;
+ }
+
+ gss_release_buffer_set(&tmpMinor, &authData);
+ GSSEAP_FREE(oid.elements);
+#else
major = gssGetNameAttribute(minor, glueName, &radiusAvpKrbAttr,
&authenticated, &complete,
&authData, &authDataDisplay, &more);
gss_release_buffer(&tmpMinor, &authData);
gss_release_buffer(&tmpMinor, &authDataDisplay);
+#endif /* HAVE_HEIMDAL_VERSION */
return major;
}
*/
OM_uint32
gssEapGlueToMechName(OM_uint32 *minor,
+ gss_ctx_id_t glueContext,
gss_name_t glueName,
gss_name_t *pMechName)
{
if (GSS_ERROR(major))
goto cleanup;
- major = defrostAttrContext(minor, glueName, *pMechName);
+ major = defrostAttrContext(minor, glueContext, glueName, *pMechName);
if (GSS_ERROR(major))
goto cleanup;