4add1fea9dcb909228bf258507c2b72af5a0d463
[mech_eap.orig] / util_name.c
1 /*
2  * Copyright (c) 2011, JANET(UK)
3  * All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  *
9  * 1. Redistributions of source code must retain the above copyright
10  *    notice, this list of conditions and the following disclaimer.
11  *
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  *
16  * 3. Neither the name of JANET(UK) nor the names of its contributors
17  *    may be used to endorse or promote products derived from this software
18  *    without specific prior written permission.
19  *
20  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
21  * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23  * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
24  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30  * SUCH DAMAGE.
31  */
32 /*
33  * Portions Copyright 2009 by the Massachusetts Institute of Technology.
34  * All Rights Reserved.
35  *
36  * Export of this software from the United States of America may
37  *   require a specific license from the United States Government.
38  *   It is the responsibility of any person or organization contemplating
39  *   export to obtain such a license before exporting.
40  *
41  * WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
42  * distribute this software and its documentation for any purpose and
43  * without fee is hereby granted, provided that the above copyright
44  * notice appear in all copies and that both that copyright notice and
45  * this permission notice appear in supporting documentation, and that
46  * the name of M.I.T. not be used in advertising or publicity pertaining
47  * to distribution of the software without specific, written prior
48  * permission.  Furthermore if you modify this software you must label
49  * your software as modified software and not distribute it in such a
50  * fashion that it might be confused with the original M.I.T. software.
51  * M.I.T. makes no representations about the suitability of
52  * this software for any purpose.  It is provided "as is" without express
53  * or implied warranty.
54  */
55
56 /*
57  * Name utility routines.
58  */
59
60 #include "gssapiP_eap.h"
61
62 static gss_OID_desc gssEapNtEapName = {
63     /* 1.3.6.1.4.1.5322.22.2.1  */
64     10, "\x2B\x06\x01\x04\x01\xA9\x4A\x16\x02\x01"
65 };
66
67 gss_OID GSS_EAP_NT_EAP_NAME = &gssEapNtEapName;
68
69 OM_uint32
70 gssEapAllocName(OM_uint32 *minor, gss_name_t *pName)
71 {
72     OM_uint32 tmpMinor;
73     gss_name_t name;
74
75     *pName = GSS_C_NO_NAME;
76
77     name = (gss_name_t)GSSEAP_CALLOC(1, sizeof(*name));
78     if (name == NULL) {
79         *minor = ENOMEM;
80         return GSS_S_FAILURE;
81     }
82
83     if (GSSEAP_MUTEX_INIT(&name->mutex) != 0) {
84         *minor = errno;
85         gssEapReleaseName(&tmpMinor, &name);
86         return GSS_S_FAILURE;
87     }
88
89     *pName = name;
90
91     return GSS_S_COMPLETE;
92 }
93
94 OM_uint32
95 gssEapReleaseName(OM_uint32 *minor, gss_name_t *pName)
96 {
97     gss_name_t name;
98     krb5_context krbContext = NULL;
99     OM_uint32 tmpMinor;
100
101     *minor = 0;
102
103     if (pName == NULL) {
104         return GSS_S_COMPLETE;
105     }
106
107     name = *pName;
108     if (name == GSS_C_NO_NAME) {
109         return GSS_S_COMPLETE;
110     }
111
112     GSSEAP_KRB_INIT(&krbContext);
113     krb5_free_principal(krbContext, name->krbPrincipal);
114     gssEapReleaseOid(&tmpMinor, &name->mechanismUsed);
115
116     gssEapReleaseAttrContext(&tmpMinor, name);
117
118     GSSEAP_MUTEX_DESTROY(&name->mutex);
119     GSSEAP_FREE(name);
120     *pName = NULL;
121
122     return GSS_S_COMPLETE;
123 }
124
125 static OM_uint32
126 krbPrincipalToName(OM_uint32 *minor,
127                    krb5_principal *principal,
128                    gss_name_t *pName)
129 {
130     OM_uint32 major;
131     gss_name_t name;
132
133     major = gssEapAllocName(minor, &name);
134     if (GSS_ERROR(major))
135         return major;
136
137     name->krbPrincipal = *principal;
138     *principal = NULL;
139
140     if (KRB_PRINC_LENGTH(name->krbPrincipal) > 1) {
141         name->flags |= NAME_FLAG_SERVICE;
142     } else {
143         name->flags |= NAME_FLAG_NAI;
144     }
145
146     *pName = name;
147     *minor = 0;
148
149     return GSS_S_COMPLETE;
150 }
151
152 static krb5_error_code
153 gssEapGetDefaultRealm(krb5_context krbContext, char **defaultRealm)
154 {
155     *defaultRealm = NULL;
156
157     krb5_appdefault_string(krbContext, "eap_gss",
158                            NULL, "default_realm", "", defaultRealm);
159
160     return (*defaultRealm != NULL) ? 0 : KRB5_CONFIG_NODEFREALM;
161 }
162
163 static OM_uint32
164 importServiceName(OM_uint32 *minor,
165                   const gss_buffer_t nameBuffer,
166                   gss_name_t *pName)
167 {
168     OM_uint32 major;
169     krb5_error_code code;
170     krb5_context krbContext;
171     krb5_principal krbPrinc;
172     char *service, *host, *realm = NULL;
173
174     GSSEAP_KRB_INIT(&krbContext);
175
176     major = bufferToString(minor, nameBuffer, &service);
177     if (GSS_ERROR(major))
178         return major;
179
180     host = strchr(service, '@');
181     if (host != NULL) {
182         *host = '\0';
183         host++;
184     }
185
186     gssEapGetDefaultRealm(krbContext, &realm);
187
188     code = krb5_build_principal(krbContext,
189                                 &krbPrinc,
190                                 realm != NULL ? strlen(realm) : 0,
191                                 realm != NULL ? realm : "",
192                                 service,
193                                 host,
194                                 NULL);
195
196     if (code == 0) {
197         KRB_PRINC_TYPE(krbPrinc) = KRB5_NT_SRV_HST;
198
199         major = krbPrincipalToName(minor, &krbPrinc, pName);
200         if (GSS_ERROR(major))
201             krb5_free_principal(krbContext, krbPrinc);
202     } else {
203         major = GSS_S_FAILURE;
204         *minor = GSSEAP_BAD_SERVICE_NAME;
205     }
206
207     if (realm != NULL)
208         GSSEAP_FREE(realm);
209     GSSEAP_FREE(service);
210
211     return major;
212 }
213
214 static OM_uint32
215 importUserName(OM_uint32 *minor,
216                const gss_buffer_t nameBuffer,
217                gss_name_t *pName)
218 {
219     OM_uint32 major;
220     krb5_context krbContext;
221     krb5_principal krbPrinc = NULL;
222     krb5_error_code code;
223
224     GSSEAP_KRB_INIT(&krbContext);
225
226     if (nameBuffer == GSS_C_NO_BUFFER) {
227         code = krb5_copy_principal(krbContext,
228                                    krbAnonymousPrincipal(), &krbPrinc);
229         if (code != 0) {
230             *minor = code;
231             return GSS_S_FAILURE;
232         }
233     } else {
234         char *nameString;
235
236         major = bufferToString(minor, nameBuffer, &nameString);
237         if (GSS_ERROR(major))
238             return major;
239
240         /*
241          * First, attempt to parse the name on the assumption that it includes
242          * a qualifying realm.
243          */
244         code = krb5_parse_name_flags(krbContext, nameString,
245                                      KRB5_PRINCIPAL_PARSE_REQUIRE_REALM, &krbPrinc);
246         if (code == KRB5_PARSE_MALFORMED) {
247             char *defaultRealm = NULL;
248             int flags = 0;
249
250             /*
251              * We need an explicit appdefaults check because, at least with MIT
252              * Kerberos, setting the context realm to NULL will reset it to the
253              * default Kerberos realm after the second call to get_default_realm.
254              * We want to make sure that the default Kerberos realm does not end
255              * up accidentally appended to an unqualified name.
256              */
257             gssEapGetDefaultRealm(krbContext, &defaultRealm);
258
259             if (defaultRealm == NULL || defaultRealm[0] == '\0')
260                 flags |= KRB5_PRINCIPAL_PARSE_NO_REALM;
261
262             code = krb5_parse_name_flags(krbContext, nameString, flags, &krbPrinc);
263
264             if (defaultRealm != NULL)
265                 GSSEAP_FREE(defaultRealm);
266         }
267
268         GSSEAP_FREE(nameString);
269
270         if (code != 0) {
271             *minor = code;
272             return GSS_S_FAILURE;
273         }
274     }
275
276     assert(krbPrinc != NULL);
277
278     major = krbPrincipalToName(minor, &krbPrinc, pName);
279     if (GSS_ERROR(major))
280         krb5_free_principal(krbContext, krbPrinc);
281
282     return major;
283 }
284
285 static OM_uint32
286 importAnonymousName(OM_uint32 *minor,
287                     const gss_buffer_t nameBuffer GSSEAP_UNUSED,
288                     gss_name_t *pName)
289 {
290     OM_uint32 major;
291     krb5_context krbContext;
292     krb5_principal krbPrinc;
293
294     GSSEAP_KRB_INIT(&krbContext);
295
296     *minor = krb5_copy_principal(krbContext, krbAnonymousPrincipal(),
297                                  &krbPrinc);
298     if (*minor != 0)
299         return GSS_S_FAILURE;
300
301     major = krbPrincipalToName(minor, &krbPrinc, pName);
302     if (GSS_ERROR(major)) {
303         krb5_free_principal(krbContext, krbPrinc);
304     }
305
306     return major;
307 }
308
309 #define UPDATE_REMAIN(n)    do {            \
310         p += (n);                           \
311         remain -= (n);                      \
312     } while (0)
313
314 #define CHECK_REMAIN(n)     do {        \
315         if (remain < (n)) {             \
316             major = GSS_S_BAD_NAME;     \
317             *minor = GSSEAP_TOK_TRUNC;  \
318             goto cleanup;               \
319         }                               \
320     } while (0)
321
322 OM_uint32
323 gssEapImportNameInternal(OM_uint32 *minor,
324                          const gss_buffer_t nameBuffer,
325                          gss_name_t *pName,
326                          unsigned int flags)
327 {
328     OM_uint32 major, tmpMinor;
329     krb5_context krbContext;
330     unsigned char *p;
331     size_t len, remain;
332     gss_buffer_desc buf;
333     enum gss_eap_token_type tokType;
334     gss_name_t name = GSS_C_NO_NAME;
335     gss_OID mechanismUsed = GSS_C_NO_OID;
336
337     GSSEAP_KRB_INIT(&krbContext);
338
339     p = (unsigned char *)nameBuffer->value;
340     remain = nameBuffer->length;
341
342     if (flags & EXPORT_NAME_FLAG_OID) {
343         gss_OID_desc mech;
344
345         /* TOK_ID || MECH_OID_LEN || MECH_OID */
346         if (remain < 6)
347             return GSS_S_BAD_NAME;
348
349         if (flags & EXPORT_NAME_FLAG_COMPOSITE)
350             tokType = TOK_TYPE_EXPORT_NAME_COMPOSITE;
351         else
352             tokType = TOK_TYPE_EXPORT_NAME;
353
354         /* TOK_ID */
355         if (load_uint16_be(p) != tokType)
356             return GSS_S_BAD_NAME;
357         UPDATE_REMAIN(2);
358
359         /* MECH_OID_LEN */
360         len = load_uint16_be(p);
361         if (len < 2)
362             return GSS_S_BAD_NAME;
363         UPDATE_REMAIN(2);
364
365         /* MECH_OID */
366         if (p[0] != 0x06)
367             return GSS_S_BAD_NAME;
368
369         mech.length = p[1];
370         mech.elements = &p[2];
371
372         CHECK_REMAIN(mech.length);
373
374         major = gssEapCanonicalizeOid(minor,
375                                       &mech,
376                                       OID_FLAG_FAMILY_MECH_VALID |
377                                         OID_FLAG_MAP_FAMILY_MECH_TO_NULL,
378                                       &mechanismUsed);
379         if (GSS_ERROR(major))
380             goto cleanup;
381
382         UPDATE_REMAIN(2 + mech.length);
383     }
384
385     /* NAME_LEN */
386     CHECK_REMAIN(4);
387     len = load_uint32_be(p);
388     UPDATE_REMAIN(4);
389
390     /* NAME */
391     CHECK_REMAIN(len);
392     buf.length = len;
393     buf.value = p;
394     UPDATE_REMAIN(len);
395
396     major = importUserName(minor, &buf, &name);
397     if (GSS_ERROR(major))
398         goto cleanup;
399
400     name->mechanismUsed = mechanismUsed;
401     mechanismUsed = GSS_C_NO_OID;
402
403     if (flags & EXPORT_NAME_FLAG_COMPOSITE) {
404         gss_buffer_desc buf;
405
406         buf.length = remain;
407         buf.value = p;
408
409         major = gssEapImportAttrContext(minor, &buf, name);
410         if (GSS_ERROR(major))
411             goto cleanup;
412     }
413
414     major = GSS_S_COMPLETE;
415     *minor = 0;
416
417 cleanup:
418     if (GSS_ERROR(major)) {
419         gssEapReleaseOid(&tmpMinor, &mechanismUsed);
420         gssEapReleaseName(&tmpMinor, &name);
421     } else {
422         *pName = name;
423     }
424
425     return major;
426 }
427
428 static OM_uint32
429 importExportName(OM_uint32 *minor,
430                  const gss_buffer_t nameBuffer,
431                  gss_name_t *name)
432 {
433     return gssEapImportNameInternal(minor, nameBuffer, name,
434                                     EXPORT_NAME_FLAG_OID);
435 }
436
437 #ifdef HAVE_GSS_C_NT_COMPOSITE_EXPORT
438 static OM_uint32
439 importCompositeExportName(OM_uint32 *minor,
440                           const gss_buffer_t nameBuffer,
441                           gss_name_t *name)
442 {
443     return gssEapImportNameInternal(minor, nameBuffer, name,
444                                     EXPORT_NAME_FLAG_OID |
445                                     EXPORT_NAME_FLAG_COMPOSITE);
446 }
447 #endif
448
449 struct gss_eap_name_import_provider {
450     gss_const_OID oid;
451     OM_uint32 (*import)(OM_uint32 *, const gss_buffer_t, gss_name_t *);
452 };
453
454 OM_uint32
455 gssEapImportName(OM_uint32 *minor,
456                  const gss_buffer_t nameBuffer,
457                  const gss_OID nameType,
458                  const gss_OID mechType,
459                  gss_name_t *pName)
460 {
461     struct gss_eap_name_import_provider nameTypes[] = {
462         { GSS_EAP_NT_EAP_NAME,              importUserName              },
463         { GSS_C_NT_USER_NAME,               importUserName              },
464         { GSS_C_NT_HOSTBASED_SERVICE,       importServiceName           },
465         { GSS_C_NT_HOSTBASED_SERVICE_X,     importServiceName           },
466         { GSS_C_NT_ANONYMOUS,               importAnonymousName         },
467         { GSS_C_NT_EXPORT_NAME,             importExportName            },
468         { GSS_KRB5_NT_PRINCIPAL_NAME,       importUserName              },
469 #ifdef HAVE_GSS_C_NT_COMPOSITE_EXPORT
470         { GSS_C_NT_COMPOSITE_EXPORT,        importCompositeExportName   },
471 #endif
472     };
473     size_t i;
474     OM_uint32 major = GSS_S_BAD_NAMETYPE;
475     OM_uint32 tmpMinor;
476     gss_name_t name = GSS_C_NO_NAME;
477
478     for (i = 0; i < sizeof(nameTypes) / sizeof(nameTypes[0]); i++) {
479         if (oidEqual(nameTypes[i].oid,
480                      nameType == GSS_C_NO_OID ? GSS_EAP_NT_EAP_NAME : nameType)) {
481             major = nameTypes[i].import(minor, nameBuffer, &name);
482             break;
483         }
484     }
485
486     if (major == GSS_S_COMPLETE &&
487         mechType != GSS_C_NO_OID) {
488         assert(gssEapIsConcreteMechanismOid(mechType));
489         assert(name->mechanismUsed == GSS_C_NO_OID);
490
491         major = gssEapCanonicalizeOid(minor, mechType, 0, &name->mechanismUsed);
492     }
493
494     if (GSS_ERROR(major))
495         gssEapReleaseName(&tmpMinor, &name);
496     else
497         *pName = name;
498
499     return major;
500 }
501
502 OM_uint32
503 gssEapExportName(OM_uint32 *minor,
504                  const gss_name_t name,
505                  gss_buffer_t exportedName)
506 {
507     return gssEapExportNameInternal(minor, name, exportedName,
508                                     EXPORT_NAME_FLAG_OID);
509 }
510
511 OM_uint32
512 gssEapExportNameInternal(OM_uint32 *minor,
513                          const gss_name_t name,
514                          gss_buffer_t exportedName,
515                          unsigned int flags)
516 {
517     OM_uint32 major = GSS_S_FAILURE, tmpMinor;
518     krb5_context krbContext;
519     char *krbName = NULL;
520     size_t krbNameLen, exportedNameLen;
521     unsigned char *p;
522     gss_buffer_desc attrs = GSS_C_EMPTY_BUFFER;
523     gss_OID mech;
524
525     exportedName->length = 0;
526     exportedName->value = NULL;
527
528     if (name->mechanismUsed != GSS_C_NO_OID)
529         mech = name->mechanismUsed;
530     else
531         mech = GSS_EAP_MECHANISM;
532
533     GSSEAP_KRB_INIT(&krbContext);
534
535     *minor = krb5_unparse_name(krbContext, name->krbPrincipal, &krbName);
536     if (*minor != 0) {
537         major = GSS_S_FAILURE;
538         goto cleanup;
539     }
540     krbNameLen = strlen(krbName);
541
542     exportedNameLen = 0;
543     if (flags & EXPORT_NAME_FLAG_OID) {
544         exportedNameLen += 6 + mech->length;
545     }
546     exportedNameLen += 4 + krbNameLen;
547     if (flags & EXPORT_NAME_FLAG_COMPOSITE) {
548         major = gssEapExportAttrContext(minor, name, &attrs);
549         if (GSS_ERROR(major))
550             goto cleanup;
551         exportedNameLen += attrs.length;
552     }
553
554     exportedName->value = GSSEAP_MALLOC(exportedNameLen);
555     if (exportedName->value == NULL) {
556         major = GSS_S_FAILURE;
557         *minor = ENOMEM;
558         goto cleanup;
559     }
560     exportedName->length = exportedNameLen;
561
562     p = (unsigned char *)exportedName->value;
563
564     if (flags & EXPORT_NAME_FLAG_OID) {
565         /* TOK | MECH_OID_LEN */
566         store_uint16_be((flags & EXPORT_NAME_FLAG_COMPOSITE)
567                         ? TOK_TYPE_EXPORT_NAME_COMPOSITE
568                         : TOK_TYPE_EXPORT_NAME,
569                         p);
570         p += 2;
571         store_uint16_be(mech->length + 2, p);
572         p += 2;
573
574         /* MECH_OID */
575         *p++ = 0x06;
576         *p++ = mech->length & 0xff;
577         memcpy(p, mech->elements, mech->length);
578         p += mech->length;
579     }
580
581     /* NAME_LEN */
582     store_uint32_be(krbNameLen, p);
583     p += 4;
584
585     /* NAME */
586     memcpy(p, krbName, krbNameLen);
587     p += krbNameLen;
588
589     if (flags & EXPORT_NAME_FLAG_COMPOSITE) {
590         memcpy(p, attrs.value, attrs.length);
591         p += attrs.length;
592     }
593
594     assert(p == (unsigned char *)exportedName->value + exportedNameLen);
595
596     major = GSS_S_COMPLETE;
597     *minor = 0;
598
599 cleanup:
600     gss_release_buffer(&tmpMinor, &attrs);
601     if (GSS_ERROR(major))
602         gss_release_buffer(&tmpMinor, exportedName);
603     krb5_free_unparsed_name(krbContext, krbName);
604
605     return major;
606 }
607
608 OM_uint32
609 gssEapCanonicalizeName(OM_uint32 *minor,
610                        const gss_name_t input_name,
611                        const gss_OID mech_type,
612                        gss_name_t *dest_name)
613 {
614     OM_uint32 major, tmpMinor;
615     krb5_context krbContext;
616     gss_name_t name;
617     gss_OID mech_used;
618
619     if (input_name == GSS_C_NO_NAME) {
620         *minor = EINVAL;
621         return GSS_S_CALL_INACCESSIBLE_READ | GSS_S_BAD_NAME;
622     }
623
624     GSSEAP_KRB_INIT(&krbContext);
625
626     major = gssEapAllocName(minor, &name);
627     if (GSS_ERROR(major)) {
628         return major;
629     }
630
631     if (mech_type != GSS_C_NO_OID)
632         mech_used = mech_type;
633     else
634         mech_used = input_name->mechanismUsed;
635
636     major = gssEapCanonicalizeOid(minor,
637                                   mech_used,
638                                   OID_FLAG_NULL_VALID,
639                                   &name->mechanismUsed);
640     if (GSS_ERROR(major))
641         goto cleanup;
642
643     name->flags = input_name->flags;
644
645     *minor = krb5_copy_principal(krbContext, input_name->krbPrincipal,
646                                  &name->krbPrincipal);
647     if (*minor != 0) {
648         major = GSS_S_FAILURE;
649         goto cleanup;
650     }
651
652     if (input_name->attrCtx != NULL) {
653         major = gssEapDuplicateAttrContext(minor, input_name, name);
654         if (GSS_ERROR(major))
655             goto cleanup;
656     }
657
658     *dest_name = name;
659
660 cleanup:
661     if (GSS_ERROR(major)) {
662         gssEapReleaseName(&tmpMinor, &name);
663     }
664
665     return major;
666 }
667
668 OM_uint32
669 gssEapDuplicateName(OM_uint32 *minor,
670                     const gss_name_t input_name,
671                     gss_name_t *dest_name)
672 {
673     return gssEapCanonicalizeName(minor, input_name,
674                                   GSS_C_NO_OID, dest_name);
675 }
676
677 OM_uint32
678 gssEapDisplayName(OM_uint32 *minor,
679                   gss_name_t name,
680                   gss_buffer_t output_name_buffer,
681                   gss_OID *output_name_type)
682 {
683     OM_uint32 major;
684     krb5_context krbContext;
685     char *krbName;
686     gss_OID name_type;
687
688     GSSEAP_KRB_INIT(&krbContext);
689
690     output_name_buffer->length = 0;
691     output_name_buffer->value = NULL;
692
693     if (name == GSS_C_NO_NAME) {
694         *minor = EINVAL;
695         return GSS_S_CALL_INACCESSIBLE_READ | GSS_S_BAD_NAME;
696     }
697
698     *minor = krb5_unparse_name(krbContext, name->krbPrincipal, &krbName);
699     if (*minor != 0) {
700         return GSS_S_FAILURE;
701     }
702
703     major = makeStringBuffer(minor, krbName, output_name_buffer);
704     if (GSS_ERROR(major)) {
705         krb5_free_unparsed_name(krbContext, krbName);
706         return major;
707     }
708
709     krb5_free_unparsed_name(krbContext, krbName);
710
711     if (KRB_PRINC_TYPE(name->krbPrincipal) == KRB5_NT_WELLKNOWN &&
712         krb5_principal_compare(krbContext,
713                                name->krbPrincipal, krbAnonymousPrincipal())) {
714         name_type = GSS_C_NT_ANONYMOUS;
715     } else {
716         name_type = GSS_EAP_NT_EAP_NAME;
717     }
718
719     if (output_name_type != NULL)
720         *output_name_type = name_type;
721
722     return GSS_S_COMPLETE;
723 }