GSSEAP_FREE(cred->radiusConfigFile);
#ifdef GSSEAP_ENABLE_REAUTH
- if (cred->krbCredCache != NULL)
- krb5_cc_destroy(krbContext, cred->krbCredCache);
+ if (cred->krbCredCache != NULL) {
+ if (cred->flags & CRED_FLAG_DEFAULT_CCACHE)
+ krb5_cc_close(krbContext, cred->krbCredCache);
+ else
+ krb5_cc_destroy(krbContext, cred->krbCredCache);
+ }
if (cred->krbCred != GSS_C_NO_CREDENTIAL)
gssReleaseCred(&tmpMinor, &cred->krbCred);
#endif
if (GSS_ERROR(major))
goto cleanup;
+ if (desiredName != GSS_C_NO_NAME) {
+ major = gssEapDuplicateName(minor, desiredName, &cred->name);
+ if (GSS_ERROR(major))
+ goto cleanup;
+ } else {
+ if (cred->flags & CRED_FLAG_INITIATE) {
+ gss_buffer_desc buf;
+
+ buf.value = getlogin(); /* XXX */
+ buf.length = strlen((char *)buf.value);
+
+ major = gssEapImportName(minor, &buf,
+ GSS_C_NT_USER_NAME, &cred->name);
+ if (GSS_ERROR(major))
+ goto cleanup;
+ }
+
+ cred->flags |= CRED_FLAG_DEFAULT_IDENTITY;
+ }
+
if (password != GSS_C_NO_BUFFER) {
major = duplicateBuffer(minor, password, &cred->password);
if (GSS_ERROR(major))
* will acquire them, so GS2 can know whether to prompt for a
* password or not.
*/
+#if 0
+ && !gssEapCanReauthP(cred, GSS_C_NO_NAME, timeReq)
+#endif
major = GSS_S_CRED_UNAVAIL;
goto cleanup;
}
break;
}
- if (desiredName != GSS_C_NO_NAME) {
- major = gssEapDuplicateName(minor, desiredName, &cred->name);
- if (GSS_ERROR(major))
- goto cleanup;
- } else {
- if (cred->flags & CRED_FLAG_INITIATE) {
- gss_buffer_desc buf;
-
- buf.value = getlogin(); /* XXX */
- buf.length = strlen((char *)buf.value);
-
- major = gssEapImportName(minor, &buf,
- GSS_C_NT_USER_NAME, &cred->name);
- if (GSS_ERROR(major))
- goto cleanup;
- }
-
- cred->flags |= CRED_FLAG_DEFAULT_IDENTITY;
- }
-
major = gssEapValidateMechs(minor, desiredMechs);
if (GSS_ERROR(major))
goto cleanup;
return major;
}
+/*
+ * Return TRUE if cred available for mechanism. Caller need no acquire
+ * lock because mechanisms list is immutable.
+ */
int
gssEapCredAvailable(gss_cred_id_t cred, gss_OID mech)
{