OM_uint32 tmpMinor;
gss_cred_id_t cred;
- assert(*pCred == GSS_C_NO_CREDENTIAL);
+ *pCred = GSS_C_NO_CREDENTIAL;
cred = (gss_cred_id_t)GSSEAP_CALLOC(1, sizeof(*cred));
if (cred == NULL) {
return GSS_S_FAILURE;
}
- cred->expiryTime = ~0;
-
*pCred = cred;
*minor = 0;
{
OM_uint32 tmpMinor;
gss_cred_id_t cred = *pCred;
+ krb5_context krbContext = NULL;
if (cred == GSS_C_NO_CREDENTIAL) {
return GSS_S_COMPLETE;
}
+ GSSEAP_KRB_INIT(&krbContext);
+
gssEapReleaseName(&tmpMinor, &cred->name);
if (cred->password.value != NULL) {
GSSEAP_FREE(cred->password.value);
}
+ if (cred->radiusConfigFile != NULL)
+ GSSEAP_FREE(cred->radiusConfigFile);
+
+ if (cred->krbCredCache != NULL)
+ krb5_cc_destroy(krbContext, cred->krbCredCache);
+
GSSEAP_MUTEX_DESTROY(&cred->mutex);
memset(cred, 0, sizeof(*cred));
GSSEAP_FREE(cred);
OM_uint32 major, tmpMinor;
gss_cred_id_t cred;
+ /* XXX TODO validate with changed set_cred_option API */
*pCred = GSS_C_NO_CREDENTIAL;
major = gssEapAllocCred(minor, &cred);
if (GSS_ERROR(major))
goto cleanup;
+ switch (credUsage) {
+ case GSS_C_BOTH:
+ cred->flags |= CRED_FLAG_INITIATE | CRED_FLAG_ACCEPT;
+ break;
+ case GSS_C_INITIATE:
+ cred->flags |= CRED_FLAG_INITIATE;
+ break;
+ case GSS_C_ACCEPT:
+ cred->flags |= CRED_FLAG_ACCEPT;
+ break;
+ default:
+ major = GSS_S_FAILURE;
+ goto cleanup;
+ break;
+ }
+
if (desiredName != GSS_C_NO_NAME) {
- major = gss_duplicate_name(minor, desiredName, &cred->name);
+ major = gssEapDuplicateName(minor, desiredName, &cred->name);
if (GSS_ERROR(major))
goto cleanup;
} else {
+ if (cred->flags & CRED_FLAG_INITIATE) {
+ gss_buffer_desc buf;
+
+ buf.value = getlogin(); /* XXX */
+ buf.length = strlen((char *)buf.value);
+
+ major = gssEapImportName(minor, &buf,
+ GSS_C_NT_USER_NAME, &cred->name);
+ if (GSS_ERROR(major))
+ goto cleanup;
+ }
+
cred->flags |= CRED_FLAG_DEFAULT_IDENTITY;
}
if (GSS_ERROR(major))
goto cleanup;
- switch (credUsage) {
- case GSS_C_BOTH:
- cred->flags |= CRED_FLAG_INITIATE | CRED_FLAG_ACCEPT;
- break;
- case GSS_C_INITIATE:
- cred->flags |= CRED_FLAG_INITIATE;
- break;
- case GSS_C_ACCEPT:
- cred->flags |= CRED_FLAG_ACCEPT;
- break;
- default:
- major = GSS_S_FAILURE;
- goto cleanup;
- break;
- }
-
if (pActualMechs != NULL) {
major = duplicateOidSet(minor, cred->mechanisms, pActualMechs);
if (GSS_ERROR(major))
return major;
}
+
+int
+gssEapCredAvailable(gss_cred_id_t cred, gss_OID mech)
+{
+ OM_uint32 minor;
+ int present = 0;
+
+ assert(mech != GSS_C_NO_OID);
+
+ if (cred == GSS_C_NO_CREDENTIAL || cred->mechanisms == GSS_C_NO_OID_SET)
+ return TRUE;
+
+ gss_test_oid_set_member(&minor, mech, cred->mechanisms, &present);
+
+ return present;
+}