fix an incorrect assertion in unknown RADIUS attribute handling
[mech_eap.orig] / util_name.c
1 /*
2  * Copyright (c) 2011, JANET(UK)
3  * All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  *
9  * 1. Redistributions of source code must retain the above copyright
10  *    notice, this list of conditions and the following disclaimer.
11  *
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  *
16  * 3. Neither the name of JANET(UK) nor the names of its contributors
17  *    may be used to endorse or promote products derived from this software
18  *    without specific prior written permission.
19  *
20  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
21  * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23  * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
24  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30  * SUCH DAMAGE.
31  */
32 /*
33  * Portions Copyright 2009 by the Massachusetts Institute of Technology.
34  * All Rights Reserved.
35  *
36  * Export of this software from the United States of America may
37  *   require a specific license from the United States Government.
38  *   It is the responsibility of any person or organization contemplating
39  *   export to obtain such a license before exporting.
40  *
41  * WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
42  * distribute this software and its documentation for any purpose and
43  * without fee is hereby granted, provided that the above copyright
44  * notice appear in all copies and that both that copyright notice and
45  * this permission notice appear in supporting documentation, and that
46  * the name of M.I.T. not be used in advertising or publicity pertaining
47  * to distribution of the software without specific, written prior
48  * permission.  Furthermore if you modify this software you must label
49  * your software as modified software and not distribute it in such a
50  * fashion that it might be confused with the original M.I.T. software.
51  * M.I.T. makes no representations about the suitability of
52  * this software for any purpose.  It is provided "as is" without express
53  * or implied warranty.
54  */
55
56 /*
57  * Name utility routines.
58  */
59
60 #include "gssapiP_eap.h"
61
62 static gss_OID_desc gssEapNtEapName = {
63     /* 1.3.6.1.4.1.5322.22.2.1  */
64     10, "\x2B\x06\x01\x04\x01\xA9\x4A\x16\x02\x01"
65 };
66
67 gss_OID GSS_EAP_NT_EAP_NAME = &gssEapNtEapName;
68
69 OM_uint32
70 gssEapAllocName(OM_uint32 *minor, gss_name_t *pName)
71 {
72     OM_uint32 tmpMinor;
73     gss_name_t name;
74
75     *pName = GSS_C_NO_NAME;
76
77     name = (gss_name_t)GSSEAP_CALLOC(1, sizeof(*name));
78     if (name == NULL) {
79         *minor = ENOMEM;
80         return GSS_S_FAILURE;
81     }
82
83     if (GSSEAP_MUTEX_INIT(&name->mutex) != 0) {
84         *minor = errno;
85         gssEapReleaseName(&tmpMinor, &name);
86         return GSS_S_FAILURE;
87     }
88
89     *pName = name;
90
91     return GSS_S_COMPLETE;
92 }
93
94 OM_uint32
95 gssEapReleaseName(OM_uint32 *minor, gss_name_t *pName)
96 {
97     gss_name_t name;
98     krb5_context krbContext = NULL;
99     OM_uint32 tmpMinor;
100
101     *minor = 0;
102
103     if (pName == NULL) {
104         return GSS_S_COMPLETE;
105     }
106
107     name = *pName;
108     if (name == GSS_C_NO_NAME) {
109         return GSS_S_COMPLETE;
110     }
111
112     GSSEAP_KRB_INIT(&krbContext);
113     krb5_free_principal(krbContext, name->krbPrincipal);
114     gssEapReleaseOid(&tmpMinor, &name->mechanismUsed);
115
116     gssEapReleaseAttrContext(&tmpMinor, name);
117
118     GSSEAP_MUTEX_DESTROY(&name->mutex);
119     GSSEAP_FREE(name);
120     *pName = NULL;
121
122     return GSS_S_COMPLETE;
123 }
124
125 static OM_uint32
126 krbPrincipalToName(OM_uint32 *minor,
127                    krb5_principal *principal,
128                    gss_name_t *pName)
129 {
130     OM_uint32 major;
131     gss_name_t name;
132
133     major = gssEapAllocName(minor, &name);
134     if (GSS_ERROR(major))
135         return major;
136
137     name->krbPrincipal = *principal;
138     *principal = NULL;
139
140     if (KRB_PRINC_LENGTH(name->krbPrincipal) > 1) {
141         name->flags |= NAME_FLAG_SERVICE;
142     } else {
143         name->flags |= NAME_FLAG_NAI;
144     }
145
146     *pName = name;
147     *minor = 0;
148
149     return GSS_S_COMPLETE;
150 }
151
152 static char *
153 gssEapGetDefaultRealm(krb5_context krbContext)
154 {
155     char *defaultRealm = NULL;
156
157     krb5_appdefault_string(krbContext, "eap_gss",
158                            NULL, "default_realm", "", &defaultRealm);
159
160     return defaultRealm;
161 }
162
163 static OM_uint32
164 importServiceName(OM_uint32 *minor,
165                   const gss_buffer_t nameBuffer,
166                   gss_name_t *pName)
167 {
168     OM_uint32 major;
169     krb5_error_code code;
170     krb5_context krbContext;
171     krb5_principal krbPrinc;
172     char *service, *host, *realm = NULL;
173
174     GSSEAP_KRB_INIT(&krbContext);
175
176     major = bufferToString(minor, nameBuffer, &service);
177     if (GSS_ERROR(major))
178         return major;
179
180     host = strchr(service, '@');
181     if (host != NULL) {
182         *host = '\0';
183         host++;
184     }
185
186     realm = gssEapGetDefaultRealm(krbContext);
187
188     code = krb5_build_principal(krbContext,
189                                 &krbPrinc,
190                                 realm != NULL ? strlen(realm) : 0,
191                                 realm != NULL ? realm : "",
192                                 service,
193                                 host,
194                                 NULL);
195
196     if (code == 0) {
197         KRB_PRINC_TYPE(krbPrinc) = KRB5_NT_SRV_HST;
198
199         major = krbPrincipalToName(minor, &krbPrinc, pName);
200         if (GSS_ERROR(major))
201             krb5_free_principal(krbContext, krbPrinc);
202     } else {
203         major = GSS_S_FAILURE;
204         *minor = GSSEAP_BAD_SERVICE_NAME;
205     }
206
207     if (realm != NULL)
208         GSSEAP_FREE(realm);
209     GSSEAP_FREE(service);
210
211     return major;
212 }
213
214 #define IMPORT_FLAG_DEFAULT_REALM           0x1
215
216 /*
217  * Import an EAP name, possibly appending the default GSS EAP realm,
218  */
219 static OM_uint32
220 importEapNameFlags(OM_uint32 *minor,
221                    const gss_buffer_t nameBuffer,
222                    OM_uint32 importFlags,
223                    gss_name_t *pName)
224 {
225     OM_uint32 major;
226     krb5_context krbContext;
227     krb5_principal krbPrinc = NULL;
228     krb5_error_code code;
229
230     GSSEAP_KRB_INIT(&krbContext);
231
232     if (nameBuffer == GSS_C_NO_BUFFER) {
233         code = krb5_copy_principal(krbContext,
234                                    krbAnonymousPrincipal(), &krbPrinc);
235         if (code != 0) {
236             *minor = code;
237             return GSS_S_FAILURE;
238         }
239     } else {
240         char *nameString;
241
242         major = bufferToString(minor, nameBuffer, &nameString);
243         if (GSS_ERROR(major))
244             return major;
245
246         /*
247          * First, attempt to parse the name on the assumption that it includes
248          * a qualifying realm. This allows us to avoid accidentally appending
249          * the default Kerberos realm to an unqualified name. (A bug in MIT
250          * Kerberos prevents the default realm being set to an empty value.)
251          */
252         code = krb5_parse_name_flags(krbContext, nameString,
253                                      KRB5_PRINCIPAL_PARSE_REQUIRE_REALM, &krbPrinc);
254         if (code == KRB5_PARSE_MALFORMED) {
255             char *defaultRealm = NULL;
256             int parseFlags = 0;
257
258             /* Possibly append the default EAP realm if required */
259             if (importFlags & IMPORT_FLAG_DEFAULT_REALM)
260                 defaultRealm = gssEapGetDefaultRealm(krbContext);
261
262             /* If no default realm, leave the realm empty in the parsed name */
263             if (defaultRealm == NULL || defaultRealm[0] == '\0')
264                 parseFlags |= KRB5_PRINCIPAL_PARSE_NO_REALM;
265
266             code = krb5_parse_name_flags(krbContext, nameString, parseFlags, &krbPrinc);
267
268 #ifdef HAVE_HEIMDAL_VERSION
269             if (code == 0 && KRB_PRINC_REALM(krbPrinc) == NULL) {
270                 KRB_PRINC_REALM(krbPrinc) = GSSEAP_CALLOC(1, sizeof(char));
271                 if (KRB_PRINC_REALM(krbPrinc) == NULL)
272                     code = ENOMEM;
273             }
274 #endif
275
276             if (defaultRealm != NULL)
277                 GSSEAP_FREE(defaultRealm);
278         }
279
280         GSSEAP_FREE(nameString);
281
282         if (code != 0) {
283             *minor = code;
284             return GSS_S_FAILURE;
285         }
286     }
287
288     assert(krbPrinc != NULL);
289
290     major = krbPrincipalToName(minor, &krbPrinc, pName);
291     if (GSS_ERROR(major))
292         krb5_free_principal(krbContext, krbPrinc);
293
294     return major;
295 }
296
297 static OM_uint32
298 importEapName(OM_uint32 *minor,
299               const gss_buffer_t nameBuffer,
300               gss_name_t *pName)
301 {
302     return importEapNameFlags(minor, nameBuffer, 0, pName);
303 }
304
305 static OM_uint32
306 importUserName(OM_uint32 *minor,
307                const gss_buffer_t nameBuffer,
308                gss_name_t *pName)
309 {
310     return importEapNameFlags(minor, nameBuffer, IMPORT_FLAG_DEFAULT_REALM, pName);
311 }
312
313 static OM_uint32
314 importAnonymousName(OM_uint32 *minor,
315                     const gss_buffer_t nameBuffer GSSEAP_UNUSED,
316                     gss_name_t *pName)
317 {
318     return importEapNameFlags(minor, GSS_C_NO_BUFFER, 0, pName);
319 }
320
321 #define UPDATE_REMAIN(n)    do {            \
322         p += (n);                           \
323         remain -= (n);                      \
324     } while (0)
325
326 #define CHECK_REMAIN(n)     do {        \
327         if (remain < (n)) {             \
328             major = GSS_S_BAD_NAME;     \
329             *minor = GSSEAP_TOK_TRUNC;  \
330             goto cleanup;               \
331         }                               \
332     } while (0)
333
334 OM_uint32
335 gssEapImportNameInternal(OM_uint32 *minor,
336                          const gss_buffer_t nameBuffer,
337                          gss_name_t *pName,
338                          OM_uint32 flags)
339 {
340     OM_uint32 major, tmpMinor;
341     krb5_context krbContext;
342     unsigned char *p;
343     size_t len, remain;
344     gss_buffer_desc buf;
345     enum gss_eap_token_type tokType;
346     gss_name_t name = GSS_C_NO_NAME;
347     gss_OID mechanismUsed = GSS_C_NO_OID;
348
349     GSSEAP_KRB_INIT(&krbContext);
350
351     p = (unsigned char *)nameBuffer->value;
352     remain = nameBuffer->length;
353
354     if (flags & EXPORT_NAME_FLAG_OID) {
355         gss_OID_desc mech;
356
357         /* TOK_ID || MECH_OID_LEN || MECH_OID */
358         if (remain < 6) {
359             *minor = GSSEAP_BAD_NAME_TOKEN;
360             return GSS_S_BAD_NAME;
361         }
362
363         if (flags & EXPORT_NAME_FLAG_COMPOSITE)
364             tokType = TOK_TYPE_EXPORT_NAME_COMPOSITE;
365         else
366             tokType = TOK_TYPE_EXPORT_NAME;
367
368         /* TOK_ID */
369         if (load_uint16_be(p) != tokType) {
370             *minor = GSSEAP_WRONG_TOK_ID;
371             return GSS_S_BAD_NAME;
372         }
373         UPDATE_REMAIN(2);
374
375         /* MECH_OID_LEN */
376         len = load_uint16_be(p);
377         if (len < 2) {
378             *minor = GSSEAP_BAD_NAME_TOKEN;
379             return GSS_S_BAD_NAME;
380         }
381         UPDATE_REMAIN(2);
382
383         /* MECH_OID */
384         if (p[0] != 0x06) {
385             *minor = GSSEAP_BAD_NAME_TOKEN;
386             return GSS_S_BAD_NAME;
387         }
388
389         mech.length = p[1];
390         mech.elements = &p[2];
391
392         CHECK_REMAIN(mech.length);
393
394         major = gssEapCanonicalizeOid(minor,
395                                       &mech,
396                                       OID_FLAG_FAMILY_MECH_VALID |
397                                         OID_FLAG_MAP_FAMILY_MECH_TO_NULL,
398                                       &mechanismUsed);
399         if (GSS_ERROR(major))
400             goto cleanup;
401
402         UPDATE_REMAIN(2 + mech.length);
403     }
404
405     /* NAME_LEN */
406     CHECK_REMAIN(4);
407     len = load_uint32_be(p);
408     UPDATE_REMAIN(4);
409
410     /* NAME */
411     CHECK_REMAIN(len);
412     buf.length = len;
413     buf.value = p;
414     UPDATE_REMAIN(len);
415
416     major = importEapNameFlags(minor, &buf, 0, &name);
417     if (GSS_ERROR(major))
418         goto cleanup;
419
420     name->mechanismUsed = mechanismUsed;
421     mechanismUsed = GSS_C_NO_OID;
422
423     if (flags & EXPORT_NAME_FLAG_COMPOSITE) {
424         gss_buffer_desc buf;
425
426         buf.length = remain;
427         buf.value = p;
428
429         major = gssEapImportAttrContext(minor, &buf, name);
430         if (GSS_ERROR(major))
431             goto cleanup;
432     }
433
434     major = GSS_S_COMPLETE;
435     *minor = 0;
436
437 cleanup:
438     if (GSS_ERROR(major)) {
439         gssEapReleaseOid(&tmpMinor, &mechanismUsed);
440         gssEapReleaseName(&tmpMinor, &name);
441     } else {
442         *pName = name;
443     }
444
445     return major;
446 }
447
448 static OM_uint32
449 importExportName(OM_uint32 *minor,
450                  const gss_buffer_t nameBuffer,
451                  gss_name_t *name)
452 {
453     return gssEapImportNameInternal(minor, nameBuffer, name,
454                                     EXPORT_NAME_FLAG_OID);
455 }
456
457 #ifdef HAVE_GSS_C_NT_COMPOSITE_EXPORT
458 static OM_uint32
459 importCompositeExportName(OM_uint32 *minor,
460                           const gss_buffer_t nameBuffer,
461                           gss_name_t *name)
462 {
463     return gssEapImportNameInternal(minor, nameBuffer, name,
464                                     EXPORT_NAME_FLAG_OID |
465                                     EXPORT_NAME_FLAG_COMPOSITE);
466 }
467 #endif
468
469 struct gss_eap_name_import_provider {
470     gss_const_OID oid;
471     OM_uint32 (*import)(OM_uint32 *, const gss_buffer_t, gss_name_t *);
472 };
473
474 OM_uint32
475 gssEapImportName(OM_uint32 *minor,
476                  const gss_buffer_t nameBuffer,
477                  const gss_OID nameType,
478                  const gss_OID mechType,
479                  gss_name_t *pName)
480 {
481     struct gss_eap_name_import_provider nameTypes[] = {
482         { GSS_EAP_NT_EAP_NAME,              importEapName               },
483         { GSS_C_NT_USER_NAME,               importUserName              },
484         { GSS_C_NT_HOSTBASED_SERVICE,       importServiceName           },
485         { GSS_C_NT_HOSTBASED_SERVICE_X,     importServiceName           },
486         { GSS_C_NT_ANONYMOUS,               importAnonymousName         },
487         { GSS_C_NT_EXPORT_NAME,             importExportName            },
488         { GSS_KRB5_NT_PRINCIPAL_NAME,       importUserName              },
489 #ifdef HAVE_GSS_C_NT_COMPOSITE_EXPORT
490         { GSS_C_NT_COMPOSITE_EXPORT,        importCompositeExportName   },
491 #endif
492     };
493     size_t i;
494     OM_uint32 major = GSS_S_BAD_NAMETYPE;
495     OM_uint32 tmpMinor;
496     gss_name_t name = GSS_C_NO_NAME;
497
498     for (i = 0; i < sizeof(nameTypes) / sizeof(nameTypes[0]); i++) {
499         if (oidEqual(nameTypes[i].oid,
500                      nameType == GSS_C_NO_OID ? GSS_EAP_NT_EAP_NAME : nameType)) {
501             major = nameTypes[i].import(minor, nameBuffer, &name);
502             break;
503         }
504     }
505
506     if (major == GSS_S_COMPLETE &&
507         mechType != GSS_C_NO_OID) {
508         assert(gssEapIsConcreteMechanismOid(mechType));
509         assert(name->mechanismUsed == GSS_C_NO_OID);
510
511         major = gssEapCanonicalizeOid(minor, mechType, 0, &name->mechanismUsed);
512     }
513
514     if (GSS_ERROR(major))
515         gssEapReleaseName(&tmpMinor, &name);
516     else
517         *pName = name;
518
519     return major;
520 }
521
522 OM_uint32
523 gssEapExportName(OM_uint32 *minor,
524                  const gss_name_t name,
525                  gss_buffer_t exportedName)
526 {
527     return gssEapExportNameInternal(minor, name, exportedName,
528                                     EXPORT_NAME_FLAG_OID);
529 }
530
531 OM_uint32
532 gssEapExportNameInternal(OM_uint32 *minor,
533                          const gss_name_t name,
534                          gss_buffer_t exportedName,
535                          OM_uint32 flags)
536 {
537     OM_uint32 major = GSS_S_FAILURE, tmpMinor;
538     gss_buffer_desc nameBuf = GSS_C_EMPTY_BUFFER;
539     size_t exportedNameLen;
540     unsigned char *p;
541     gss_buffer_desc attrs = GSS_C_EMPTY_BUFFER;
542     gss_OID mech;
543
544     exportedName->length = 0;
545     exportedName->value = NULL;
546
547     if (name->mechanismUsed != GSS_C_NO_OID)
548         mech = name->mechanismUsed;
549     else
550         mech = GSS_EAP_MECHANISM;
551
552     major = gssEapDisplayName(minor, name, &nameBuf, NULL);
553     if (GSS_ERROR(major))
554         goto cleanup;
555
556     exportedNameLen = 0;
557     if (flags & EXPORT_NAME_FLAG_OID) {
558         exportedNameLen += 6 + mech->length;
559     }
560     exportedNameLen += 4 + nameBuf.length;
561     if (flags & EXPORT_NAME_FLAG_COMPOSITE) {
562         major = gssEapExportAttrContext(minor, name, &attrs);
563         if (GSS_ERROR(major))
564             goto cleanup;
565         exportedNameLen += attrs.length;
566     }
567
568     exportedName->value = GSSEAP_MALLOC(exportedNameLen);
569     if (exportedName->value == NULL) {
570         major = GSS_S_FAILURE;
571         *minor = ENOMEM;
572         goto cleanup;
573     }
574     exportedName->length = exportedNameLen;
575
576     p = (unsigned char *)exportedName->value;
577
578     if (flags & EXPORT_NAME_FLAG_OID) {
579         /* TOK | MECH_OID_LEN */
580         store_uint16_be((flags & EXPORT_NAME_FLAG_COMPOSITE)
581                         ? TOK_TYPE_EXPORT_NAME_COMPOSITE
582                         : TOK_TYPE_EXPORT_NAME,
583                         p);
584         p += 2;
585         store_uint16_be(mech->length + 2, p);
586         p += 2;
587
588         /* MECH_OID */
589         *p++ = 0x06;
590         *p++ = mech->length & 0xff;
591         memcpy(p, mech->elements, mech->length);
592         p += mech->length;
593     }
594
595     /* NAME_LEN */
596     store_uint32_be(nameBuf.length, p);
597     p += 4;
598
599     /* NAME */
600     memcpy(p, nameBuf.value, nameBuf.length);
601     p += nameBuf.length;
602
603     if (flags & EXPORT_NAME_FLAG_COMPOSITE) {
604         memcpy(p, attrs.value, attrs.length);
605         p += attrs.length;
606     }
607
608     assert(p == (unsigned char *)exportedName->value + exportedNameLen);
609
610     major = GSS_S_COMPLETE;
611     *minor = 0;
612
613 cleanup:
614     gss_release_buffer(&tmpMinor, &attrs);
615     gss_release_buffer(&tmpMinor, &nameBuf);
616     if (GSS_ERROR(major))
617         gss_release_buffer(&tmpMinor, exportedName);
618
619     return major;
620 }
621
622 OM_uint32
623 gssEapCanonicalizeName(OM_uint32 *minor,
624                        const gss_name_t input_name,
625                        const gss_OID mech_type,
626                        gss_name_t *dest_name)
627 {
628     OM_uint32 major, tmpMinor;
629     krb5_context krbContext;
630     gss_name_t name;
631     gss_OID mech_used;
632
633     if (input_name == GSS_C_NO_NAME) {
634         *minor = EINVAL;
635         return GSS_S_CALL_INACCESSIBLE_READ | GSS_S_BAD_NAME;
636     }
637
638     GSSEAP_KRB_INIT(&krbContext);
639
640     major = gssEapAllocName(minor, &name);
641     if (GSS_ERROR(major)) {
642         return major;
643     }
644
645     if (mech_type != GSS_C_NO_OID)
646         mech_used = mech_type;
647     else
648         mech_used = input_name->mechanismUsed;
649
650     major = gssEapCanonicalizeOid(minor,
651                                   mech_used,
652                                   OID_FLAG_NULL_VALID,
653                                   &name->mechanismUsed);
654     if (GSS_ERROR(major))
655         goto cleanup;
656
657     name->flags = input_name->flags;
658
659     *minor = krb5_copy_principal(krbContext, input_name->krbPrincipal,
660                                  &name->krbPrincipal);
661     if (*minor != 0) {
662         major = GSS_S_FAILURE;
663         goto cleanup;
664     }
665
666     if (input_name->attrCtx != NULL) {
667         major = gssEapDuplicateAttrContext(minor, input_name, name);
668         if (GSS_ERROR(major))
669             goto cleanup;
670     }
671
672     *dest_name = name;
673
674 cleanup:
675     if (GSS_ERROR(major)) {
676         gssEapReleaseName(&tmpMinor, &name);
677     }
678
679     return major;
680 }
681
682 OM_uint32
683 gssEapDuplicateName(OM_uint32 *minor,
684                     const gss_name_t input_name,
685                     gss_name_t *dest_name)
686 {
687     return gssEapCanonicalizeName(minor, input_name,
688                                   GSS_C_NO_OID, dest_name);
689 }
690
691 OM_uint32
692 gssEapDisplayName(OM_uint32 *minor,
693                   gss_name_t name,
694                   gss_buffer_t output_name_buffer,
695                   gss_OID *output_name_type)
696 {
697     OM_uint32 major;
698     krb5_context krbContext;
699     char *krbName;
700     gss_OID name_type;
701     int flags = 0;
702
703     GSSEAP_KRB_INIT(&krbContext);
704
705     output_name_buffer->length = 0;
706     output_name_buffer->value = NULL;
707
708     if (name == GSS_C_NO_NAME) {
709         *minor = EINVAL;
710         return GSS_S_CALL_INACCESSIBLE_READ | GSS_S_BAD_NAME;
711     }
712
713     /*
714      * According to draft-ietf-abfab-gss-eap-01, when the realm is
715      * absent the trailing '@' is not included.
716      */
717 #ifdef HAVE_HEIMDAL_VERSION
718     if (KRB_PRINC_REALM(name->krbPrincipal) == NULL ||
719         KRB_PRINC_REALM(name->krbPrincipal)[0] == '\0')
720 #else
721     if (KRB_PRINC_REALM(name->krbPrincipal)->length == 0)
722 #endif
723         flags |= KRB5_PRINCIPAL_UNPARSE_NO_REALM;
724
725     *minor = krb5_unparse_name_flags(krbContext, name->krbPrincipal,
726                                      flags, &krbName);
727     if (*minor != 0) {
728         return GSS_S_FAILURE;
729     }
730
731     major = makeStringBuffer(minor, krbName, output_name_buffer);
732     if (GSS_ERROR(major)) {
733         krb5_free_unparsed_name(krbContext, krbName);
734         return major;
735     }
736
737     krb5_free_unparsed_name(krbContext, krbName);
738
739     if (KRB_PRINC_TYPE(name->krbPrincipal) == KRB5_NT_WELLKNOWN &&
740         krb5_principal_compare(krbContext,
741                                name->krbPrincipal, krbAnonymousPrincipal())) {
742         name_type = GSS_C_NT_ANONYMOUS;
743     } else {
744         name_type = GSS_EAP_NT_EAP_NAME;
745     }
746
747     if (output_name_type != NULL)
748         *output_name_type = name_type;
749
750     return GSS_S_COMPLETE;
751 }
752
753 OM_uint32
754 gssEapCompareName(OM_uint32 *minor,
755                   gss_name_t name1,
756                   gss_name_t name2,
757                   int *name_equal)
758 {
759     krb5_context krbContext;
760
761     *minor = 0;
762
763     if (name1 == GSS_C_NO_NAME && name2 == GSS_C_NO_NAME) {
764         *name_equal = 1;
765     } else if (name1 != GSS_C_NO_NAME && name2 != GSS_C_NO_NAME) {
766         GSSEAP_KRB_INIT(&krbContext);
767
768         /* krbPrincipal is immutable, so lock not required */
769         *name_equal = krb5_principal_compare(krbContext,
770                                              name1->krbPrincipal,
771                                              name2->krbPrincipal);
772     }
773
774     return GSS_S_COMPLETE;
775 }