Revert "Don't include @ symbol in realmless names, to conform with draft-ietf-abfab...
[mech_eap.orig] / util_name.c
1 /*
2  * Copyright (c) 2011, JANET(UK)
3  * All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  *
9  * 1. Redistributions of source code must retain the above copyright
10  *    notice, this list of conditions and the following disclaimer.
11  *
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  *
16  * 3. Neither the name of JANET(UK) nor the names of its contributors
17  *    may be used to endorse or promote products derived from this software
18  *    without specific prior written permission.
19  *
20  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
21  * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23  * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
24  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30  * SUCH DAMAGE.
31  */
32 /*
33  * Portions Copyright 2009 by the Massachusetts Institute of Technology.
34  * All Rights Reserved.
35  *
36  * Export of this software from the United States of America may
37  *   require a specific license from the United States Government.
38  *   It is the responsibility of any person or organization contemplating
39  *   export to obtain such a license before exporting.
40  *
41  * WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
42  * distribute this software and its documentation for any purpose and
43  * without fee is hereby granted, provided that the above copyright
44  * notice appear in all copies and that both that copyright notice and
45  * this permission notice appear in supporting documentation, and that
46  * the name of M.I.T. not be used in advertising or publicity pertaining
47  * to distribution of the software without specific, written prior
48  * permission.  Furthermore if you modify this software you must label
49  * your software as modified software and not distribute it in such a
50  * fashion that it might be confused with the original M.I.T. software.
51  * M.I.T. makes no representations about the suitability of
52  * this software for any purpose.  It is provided "as is" without express
53  * or implied warranty.
54  */
55
56 /*
57  * Name utility routines.
58  */
59
60 #include "gssapiP_eap.h"
61
62 static gss_OID_desc gssEapNtEapName = {
63     /* 1.3.6.1.4.1.5322.22.2.1  */
64     10, "\x2B\x06\x01\x04\x01\xA9\x4A\x16\x02\x01"
65 };
66
67 gss_OID GSS_EAP_NT_EAP_NAME = &gssEapNtEapName;
68
69 OM_uint32
70 gssEapAllocName(OM_uint32 *minor, gss_name_t *pName)
71 {
72     OM_uint32 tmpMinor;
73     gss_name_t name;
74
75     *pName = GSS_C_NO_NAME;
76
77     name = (gss_name_t)GSSEAP_CALLOC(1, sizeof(*name));
78     if (name == NULL) {
79         *minor = ENOMEM;
80         return GSS_S_FAILURE;
81     }
82
83     if (GSSEAP_MUTEX_INIT(&name->mutex) != 0) {
84         *minor = errno;
85         gssEapReleaseName(&tmpMinor, &name);
86         return GSS_S_FAILURE;
87     }
88
89     *pName = name;
90
91     return GSS_S_COMPLETE;
92 }
93
94 OM_uint32
95 gssEapReleaseName(OM_uint32 *minor, gss_name_t *pName)
96 {
97     gss_name_t name;
98     krb5_context krbContext = NULL;
99     OM_uint32 tmpMinor;
100
101     *minor = 0;
102
103     if (pName == NULL) {
104         return GSS_S_COMPLETE;
105     }
106
107     name = *pName;
108     if (name == GSS_C_NO_NAME) {
109         return GSS_S_COMPLETE;
110     }
111
112     GSSEAP_KRB_INIT(&krbContext);
113     krb5_free_principal(krbContext, name->krbPrincipal);
114     gssEapReleaseOid(&tmpMinor, &name->mechanismUsed);
115
116     gssEapReleaseAttrContext(&tmpMinor, name);
117
118     GSSEAP_MUTEX_DESTROY(&name->mutex);
119     GSSEAP_FREE(name);
120     *pName = NULL;
121
122     return GSS_S_COMPLETE;
123 }
124
125 static OM_uint32
126 krbPrincipalToName(OM_uint32 *minor,
127                    krb5_principal *principal,
128                    gss_name_t *pName)
129 {
130     OM_uint32 major;
131     gss_name_t name;
132
133     major = gssEapAllocName(minor, &name);
134     if (GSS_ERROR(major))
135         return major;
136
137     name->krbPrincipal = *principal;
138     *principal = NULL;
139
140     if (KRB_PRINC_LENGTH(name->krbPrincipal) > 1) {
141         name->flags |= NAME_FLAG_SERVICE;
142     } else {
143         name->flags |= NAME_FLAG_NAI;
144     }
145
146     *pName = name;
147     *minor = 0;
148
149     return GSS_S_COMPLETE;
150 }
151
152 static krb5_error_code
153 gssEapGetDefaultRealm(krb5_context krbContext, char **defaultRealm)
154 {
155     *defaultRealm = NULL;
156
157     krb5_appdefault_string(krbContext, "eap_gss",
158                            NULL, "default_realm", "", defaultRealm);
159
160     if (*defaultRealm != NULL && (*defaultRealm)[0] == '\0') {
161         GSSEAP_FREE(*defaultRealm);
162         *defaultRealm = NULL;
163     }
164
165     return (*defaultRealm != NULL) ? 0 : KRB5_CONFIG_NODEFREALM;
166 }
167
168 static OM_uint32
169 importServiceName(OM_uint32 *minor,
170                   const gss_buffer_t nameBuffer,
171                   gss_name_t *pName)
172 {
173     OM_uint32 major;
174     krb5_error_code code;
175     krb5_context krbContext;
176     krb5_principal krbPrinc;
177     char *service, *host, *realm = NULL;
178
179     GSSEAP_KRB_INIT(&krbContext);
180
181     major = bufferToString(minor, nameBuffer, &service);
182     if (GSS_ERROR(major))
183         return major;
184
185     host = strchr(service, '@');
186     if (host != NULL) {
187         *host = '\0';
188         host++;
189     }
190
191     gssEapGetDefaultRealm(krbContext, &realm);
192
193     code = krb5_build_principal(krbContext,
194                                 &krbPrinc,
195                                 realm != NULL ? strlen(realm) : 0,
196                                 realm != NULL ? realm : "",
197                                 service,
198                                 host,
199                                 NULL);
200
201     if (code == 0) {
202         KRB_PRINC_TYPE(krbPrinc) = KRB5_NT_SRV_HST;
203
204         major = krbPrincipalToName(minor, &krbPrinc, pName);
205         if (GSS_ERROR(major))
206             krb5_free_principal(krbContext, krbPrinc);
207     } else {
208         major = GSS_S_FAILURE;
209         *minor = GSSEAP_BAD_SERVICE_NAME;
210     }
211
212     if (realm != NULL)
213         GSSEAP_FREE(realm);
214     GSSEAP_FREE(service);
215
216     return major;
217 }
218
219 static OM_uint32
220 importUserName(OM_uint32 *minor,
221                const gss_buffer_t nameBuffer,
222                gss_name_t *pName)
223 {
224     OM_uint32 major;
225     krb5_context krbContext;
226     krb5_principal krbPrinc = NULL;
227     krb5_error_code code;
228
229     GSSEAP_KRB_INIT(&krbContext);
230
231     if (nameBuffer == GSS_C_NO_BUFFER) {
232         code = krb5_copy_principal(krbContext,
233                                    krbAnonymousPrincipal(), &krbPrinc);
234         if (code != 0) {
235             *minor = code;
236             return GSS_S_FAILURE;
237         }
238     } else {
239         char *nameString;
240
241         major = bufferToString(minor, nameBuffer, &nameString);
242         if (GSS_ERROR(major))
243             return major;
244
245         /*
246          * First, attempt to parse the name on the assumption that it includes
247          * a qualifying realm.
248          */
249         code = krb5_parse_name_flags(krbContext, nameString,
250                                      KRB5_PRINCIPAL_PARSE_REQUIRE_REALM, &krbPrinc);
251         if (code == KRB5_PARSE_MALFORMED) {
252             char *defaultRealm = NULL;
253             int flags = 0;
254
255             /*
256              * We need an explicit appdefaults check because, at least with MIT
257              * Kerberos, setting the context realm to NULL will reset it to the
258              * default Kerberos realm after the second call to get_default_realm.
259              * We want to make sure that the default Kerberos realm does not end
260              * up accidentally appended to an unqualified name.
261              */
262             gssEapGetDefaultRealm(krbContext, &defaultRealm);
263
264             if (defaultRealm == NULL)
265                 flags |= KRB5_PRINCIPAL_PARSE_NO_REALM;
266
267             code = krb5_parse_name_flags(krbContext, nameString, flags, &krbPrinc);
268
269             if (defaultRealm != NULL)
270                 GSSEAP_FREE(defaultRealm);
271         }
272
273         GSSEAP_FREE(nameString);
274
275         if (code != 0) {
276             *minor = code;
277             return GSS_S_FAILURE;
278         }
279     }
280
281     assert(krbPrinc != NULL);
282
283     major = krbPrincipalToName(minor, &krbPrinc, pName);
284     if (GSS_ERROR(major))
285         krb5_free_principal(krbContext, krbPrinc);
286
287     return major;
288 }
289
290 static OM_uint32
291 importAnonymousName(OM_uint32 *minor,
292                     const gss_buffer_t nameBuffer GSSEAP_UNUSED,
293                     gss_name_t *pName)
294 {
295     OM_uint32 major;
296     krb5_context krbContext;
297     krb5_principal krbPrinc;
298
299     GSSEAP_KRB_INIT(&krbContext);
300
301     *minor = krb5_copy_principal(krbContext, krbAnonymousPrincipal(),
302                                  &krbPrinc);
303     if (*minor != 0)
304         return GSS_S_FAILURE;
305
306     major = krbPrincipalToName(minor, &krbPrinc, pName);
307     if (GSS_ERROR(major)) {
308         krb5_free_principal(krbContext, krbPrinc);
309     }
310
311     return major;
312 }
313
314 #define UPDATE_REMAIN(n)    do {            \
315         p += (n);                           \
316         remain -= (n);                      \
317     } while (0)
318
319 #define CHECK_REMAIN(n)     do {        \
320         if (remain < (n)) {             \
321             major = GSS_S_BAD_NAME;     \
322             *minor = GSSEAP_TOK_TRUNC;  \
323             goto cleanup;               \
324         }                               \
325     } while (0)
326
327 OM_uint32
328 gssEapImportNameInternal(OM_uint32 *minor,
329                          const gss_buffer_t nameBuffer,
330                          gss_name_t *pName,
331                          unsigned int flags)
332 {
333     OM_uint32 major, tmpMinor;
334     krb5_context krbContext;
335     unsigned char *p;
336     size_t len, remain;
337     gss_buffer_desc buf;
338     enum gss_eap_token_type tokType;
339     gss_name_t name = GSS_C_NO_NAME;
340     gss_OID mechanismUsed = GSS_C_NO_OID;
341
342     GSSEAP_KRB_INIT(&krbContext);
343
344     p = (unsigned char *)nameBuffer->value;
345     remain = nameBuffer->length;
346
347     if (flags & EXPORT_NAME_FLAG_OID) {
348         gss_OID_desc mech;
349
350         /* TOK_ID || MECH_OID_LEN || MECH_OID */
351         if (remain < 6)
352             return GSS_S_BAD_NAME;
353
354         if (flags & EXPORT_NAME_FLAG_COMPOSITE)
355             tokType = TOK_TYPE_EXPORT_NAME_COMPOSITE;
356         else
357             tokType = TOK_TYPE_EXPORT_NAME;
358
359         /* TOK_ID */
360         if (load_uint16_be(p) != tokType)
361             return GSS_S_BAD_NAME;
362         UPDATE_REMAIN(2);
363
364         /* MECH_OID_LEN */
365         len = load_uint16_be(p);
366         if (len < 2)
367             return GSS_S_BAD_NAME;
368         UPDATE_REMAIN(2);
369
370         /* MECH_OID */
371         if (p[0] != 0x06)
372             return GSS_S_BAD_NAME;
373
374         mech.length = p[1];
375         mech.elements = &p[2];
376
377         CHECK_REMAIN(mech.length);
378
379         major = gssEapCanonicalizeOid(minor,
380                                       &mech,
381                                       OID_FLAG_FAMILY_MECH_VALID |
382                                         OID_FLAG_MAP_FAMILY_MECH_TO_NULL,
383                                       &mechanismUsed);
384         if (GSS_ERROR(major))
385             goto cleanup;
386
387         UPDATE_REMAIN(2 + mech.length);
388     }
389
390     /* NAME_LEN */
391     CHECK_REMAIN(4);
392     len = load_uint32_be(p);
393     UPDATE_REMAIN(4);
394
395     /* NAME */
396     CHECK_REMAIN(len);
397     buf.length = len;
398     buf.value = p;
399     UPDATE_REMAIN(len);
400
401     major = importUserName(minor, &buf, &name);
402     if (GSS_ERROR(major))
403         goto cleanup;
404
405     name->mechanismUsed = mechanismUsed;
406     mechanismUsed = GSS_C_NO_OID;
407
408     if (flags & EXPORT_NAME_FLAG_COMPOSITE) {
409         gss_buffer_desc buf;
410
411         buf.length = remain;
412         buf.value = p;
413
414         major = gssEapImportAttrContext(minor, &buf, name);
415         if (GSS_ERROR(major))
416             goto cleanup;
417     }
418
419     major = GSS_S_COMPLETE;
420     *minor = 0;
421
422 cleanup:
423     if (GSS_ERROR(major)) {
424         gssEapReleaseOid(&tmpMinor, &mechanismUsed);
425         gssEapReleaseName(&tmpMinor, &name);
426     } else {
427         *pName = name;
428     }
429
430     return major;
431 }
432
433 static OM_uint32
434 importExportName(OM_uint32 *minor,
435                  const gss_buffer_t nameBuffer,
436                  gss_name_t *name)
437 {
438     return gssEapImportNameInternal(minor, nameBuffer, name,
439                                     EXPORT_NAME_FLAG_OID);
440 }
441
442 #ifdef HAVE_GSS_C_NT_COMPOSITE_EXPORT
443 static OM_uint32
444 importCompositeExportName(OM_uint32 *minor,
445                           const gss_buffer_t nameBuffer,
446                           gss_name_t *name)
447 {
448     return gssEapImportNameInternal(minor, nameBuffer, name,
449                                     EXPORT_NAME_FLAG_OID |
450                                     EXPORT_NAME_FLAG_COMPOSITE);
451 }
452 #endif
453
454 struct gss_eap_name_import_provider {
455     gss_const_OID oid;
456     OM_uint32 (*import)(OM_uint32 *, const gss_buffer_t, gss_name_t *);
457 };
458
459 OM_uint32
460 gssEapImportName(OM_uint32 *minor,
461                  const gss_buffer_t nameBuffer,
462                  const gss_OID nameType,
463                  const gss_OID mechType,
464                  gss_name_t *pName)
465 {
466     struct gss_eap_name_import_provider nameTypes[] = {
467         { GSS_EAP_NT_EAP_NAME,              importUserName              },
468         { GSS_C_NT_USER_NAME,               importUserName              },
469         { GSS_C_NT_HOSTBASED_SERVICE,       importServiceName           },
470         { GSS_C_NT_HOSTBASED_SERVICE_X,     importServiceName           },
471         { GSS_C_NT_ANONYMOUS,               importAnonymousName         },
472         { GSS_C_NT_EXPORT_NAME,             importExportName            },
473         { GSS_KRB5_NT_PRINCIPAL_NAME,       importUserName              },
474 #ifdef HAVE_GSS_C_NT_COMPOSITE_EXPORT
475         { GSS_C_NT_COMPOSITE_EXPORT,        importCompositeExportName   },
476 #endif
477     };
478     size_t i;
479     OM_uint32 major = GSS_S_BAD_NAMETYPE;
480     OM_uint32 tmpMinor;
481     gss_name_t name = GSS_C_NO_NAME;
482
483     for (i = 0; i < sizeof(nameTypes) / sizeof(nameTypes[0]); i++) {
484         if (oidEqual(nameTypes[i].oid,
485                      nameType == GSS_C_NO_OID ? GSS_EAP_NT_EAP_NAME : nameType)) {
486             major = nameTypes[i].import(minor, nameBuffer, &name);
487             break;
488         }
489     }
490
491     if (major == GSS_S_COMPLETE &&
492         mechType != GSS_C_NO_OID) {
493         assert(gssEapIsConcreteMechanismOid(mechType));
494         assert(name->mechanismUsed == GSS_C_NO_OID);
495
496         major = gssEapCanonicalizeOid(minor, mechType, 0, &name->mechanismUsed);
497     }
498
499     if (GSS_ERROR(major))
500         gssEapReleaseName(&tmpMinor, &name);
501     else
502         *pName = name;
503
504     return major;
505 }
506
507 OM_uint32
508 gssEapExportName(OM_uint32 *minor,
509                  const gss_name_t name,
510                  gss_buffer_t exportedName)
511 {
512     return gssEapExportNameInternal(minor, name, exportedName,
513                                     EXPORT_NAME_FLAG_OID);
514 }
515
516 OM_uint32
517 gssEapExportNameInternal(OM_uint32 *minor,
518                          const gss_name_t name,
519                          gss_buffer_t exportedName,
520                          unsigned int flags)
521 {
522     OM_uint32 major = GSS_S_FAILURE, tmpMinor;
523     krb5_context krbContext;
524     char *krbName = NULL;
525     size_t krbNameLen, exportedNameLen;
526     unsigned char *p;
527     gss_buffer_desc attrs = GSS_C_EMPTY_BUFFER;
528     gss_OID mech;
529
530     exportedName->length = 0;
531     exportedName->value = NULL;
532
533     if (name->mechanismUsed != GSS_C_NO_OID)
534         mech = name->mechanismUsed;
535     else
536         mech = GSS_EAP_MECHANISM;
537
538     GSSEAP_KRB_INIT(&krbContext);
539
540     *minor = krb5_unparse_name(krbContext, name->krbPrincipal, &krbName);
541     if (*minor != 0) {
542         major = GSS_S_FAILURE;
543         goto cleanup;
544     }
545     krbNameLen = strlen(krbName);
546
547     exportedNameLen = 0;
548     if (flags & EXPORT_NAME_FLAG_OID) {
549         exportedNameLen += 6 + mech->length;
550     }
551     exportedNameLen += 4 + krbNameLen;
552     if (flags & EXPORT_NAME_FLAG_COMPOSITE) {
553         major = gssEapExportAttrContext(minor, name, &attrs);
554         if (GSS_ERROR(major))
555             goto cleanup;
556         exportedNameLen += attrs.length;
557     }
558
559     exportedName->value = GSSEAP_MALLOC(exportedNameLen);
560     if (exportedName->value == NULL) {
561         major = GSS_S_FAILURE;
562         *minor = ENOMEM;
563         goto cleanup;
564     }
565     exportedName->length = exportedNameLen;
566
567     p = (unsigned char *)exportedName->value;
568
569     if (flags & EXPORT_NAME_FLAG_OID) {
570         /* TOK | MECH_OID_LEN */
571         store_uint16_be((flags & EXPORT_NAME_FLAG_COMPOSITE)
572                         ? TOK_TYPE_EXPORT_NAME_COMPOSITE
573                         : TOK_TYPE_EXPORT_NAME,
574                         p);
575         p += 2;
576         store_uint16_be(mech->length + 2, p);
577         p += 2;
578
579         /* MECH_OID */
580         *p++ = 0x06;
581         *p++ = mech->length & 0xff;
582         memcpy(p, mech->elements, mech->length);
583         p += mech->length;
584     }
585
586     /* NAME_LEN */
587     store_uint32_be(krbNameLen, p);
588     p += 4;
589
590     /* NAME */
591     memcpy(p, krbName, krbNameLen);
592     p += krbNameLen;
593
594     if (flags & EXPORT_NAME_FLAG_COMPOSITE) {
595         memcpy(p, attrs.value, attrs.length);
596         p += attrs.length;
597     }
598
599     assert(p == (unsigned char *)exportedName->value + exportedNameLen);
600
601     major = GSS_S_COMPLETE;
602     *minor = 0;
603
604 cleanup:
605     gss_release_buffer(&tmpMinor, &attrs);
606     if (GSS_ERROR(major))
607         gss_release_buffer(&tmpMinor, exportedName);
608     krb5_free_unparsed_name(krbContext, krbName);
609
610     return major;
611 }
612
613 OM_uint32
614 gssEapCanonicalizeName(OM_uint32 *minor,
615                        const gss_name_t input_name,
616                        const gss_OID mech_type,
617                        gss_name_t *dest_name)
618 {
619     OM_uint32 major, tmpMinor;
620     krb5_context krbContext;
621     gss_name_t name;
622     gss_OID mech_used;
623
624     if (input_name == GSS_C_NO_NAME) {
625         *minor = EINVAL;
626         return GSS_S_CALL_INACCESSIBLE_READ | GSS_S_BAD_NAME;
627     }
628
629     GSSEAP_KRB_INIT(&krbContext);
630
631     major = gssEapAllocName(minor, &name);
632     if (GSS_ERROR(major)) {
633         return major;
634     }
635
636     if (mech_type != GSS_C_NO_OID)
637         mech_used = mech_type;
638     else
639         mech_used = input_name->mechanismUsed;
640
641     major = gssEapCanonicalizeOid(minor,
642                                   mech_used,
643                                   OID_FLAG_NULL_VALID,
644                                   &name->mechanismUsed);
645     if (GSS_ERROR(major))
646         goto cleanup;
647
648     name->flags = input_name->flags;
649
650     *minor = krb5_copy_principal(krbContext, input_name->krbPrincipal,
651                                  &name->krbPrincipal);
652     if (*minor != 0) {
653         major = GSS_S_FAILURE;
654         goto cleanup;
655     }
656
657     if (input_name->attrCtx != NULL) {
658         major = gssEapDuplicateAttrContext(minor, input_name, name);
659         if (GSS_ERROR(major))
660             goto cleanup;
661     }
662
663     *dest_name = name;
664
665 cleanup:
666     if (GSS_ERROR(major)) {
667         gssEapReleaseName(&tmpMinor, &name);
668     }
669
670     return major;
671 }
672
673 OM_uint32
674 gssEapDuplicateName(OM_uint32 *minor,
675                     const gss_name_t input_name,
676                     gss_name_t *dest_name)
677 {
678     return gssEapCanonicalizeName(minor, input_name,
679                                   GSS_C_NO_OID, dest_name);
680 }
681
682 OM_uint32
683 gssEapDisplayName(OM_uint32 *minor,
684                   gss_name_t name,
685                   gss_buffer_t output_name_buffer,
686                   gss_OID *output_name_type)
687 {
688     OM_uint32 major;
689     krb5_context krbContext;
690     char *krbName;
691     gss_OID name_type;
692
693     GSSEAP_KRB_INIT(&krbContext);
694
695     output_name_buffer->length = 0;
696     output_name_buffer->value = NULL;
697
698     if (name == GSS_C_NO_NAME) {
699         *minor = EINVAL;
700         return GSS_S_CALL_INACCESSIBLE_READ | GSS_S_BAD_NAME;
701     }
702
703     *minor = krb5_unparse_name(krbContext, name->krbPrincipal, &krbName);
704     if (*minor != 0) {
705         return GSS_S_FAILURE;
706     }
707
708     major = makeStringBuffer(minor, krbName, output_name_buffer);
709     if (GSS_ERROR(major)) {
710         krb5_free_unparsed_name(krbContext, krbName);
711         return major;
712     }
713
714     krb5_free_unparsed_name(krbContext, krbName);
715
716     if (KRB_PRINC_TYPE(name->krbPrincipal) == KRB5_NT_WELLKNOWN &&
717         krb5_principal_compare(krbContext,
718                                name->krbPrincipal, krbAnonymousPrincipal())) {
719         name_type = GSS_C_NT_ANONYMOUS;
720     } else {
721         name_type = GSS_EAP_NT_EAP_NAME;
722     }
723
724     if (output_name_type != NULL)
725         *output_name_type = name_type;
726
727     return GSS_S_COMPLETE;
728 }