Conditionalized Acceptor codepaths and modules.
[moonshot.git] / moonshot / mech_eap / util_name.c
1 /*
2  * Copyright (c) 2011, JANET(UK)
3  * All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  *
9  * 1. Redistributions of source code must retain the above copyright
10  *    notice, this list of conditions and the following disclaimer.
11  *
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  *
16  * 3. Neither the name of JANET(UK) nor the names of its contributors
17  *    may be used to endorse or promote products derived from this software
18  *    without specific prior written permission.
19  *
20  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
21  * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23  * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
24  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30  * SUCH DAMAGE.
31  */
32 /*
33  * Portions Copyright 2009 by the Massachusetts Institute of Technology.
34  * All Rights Reserved.
35  *
36  * Export of this software from the United States of America may
37  *   require a specific license from the United States Government.
38  *   It is the responsibility of any person or organization contemplating
39  *   export to obtain such a license before exporting.
40  *
41  * WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
42  * distribute this software and its documentation for any purpose and
43  * without fee is hereby granted, provided that the above copyright
44  * notice appear in all copies and that both that copyright notice and
45  * this permission notice appear in supporting documentation, and that
46  * the name of M.I.T. not be used in advertising or publicity pertaining
47  * to distribution of the software without specific, written prior
48  * permission.  Furthermore if you modify this software you must label
49  * your software as modified software and not distribute it in such a
50  * fashion that it might be confused with the original M.I.T. software.
51  * M.I.T. makes no representations about the suitability of
52  * this software for any purpose.  It is provided "as is" without express
53  * or implied warranty.
54  */
55
56 /*
57  * Name utility routines.
58  */
59
60 #include "gssapiP_eap.h"
61
62 static gss_OID_desc gssEapNtEapName = {
63     /* 1.3.6.1.4.1.5322.22.2.1  */
64     10, "\x2B\x06\x01\x04\x01\xA9\x4A\x16\x02\x01"
65 };
66
67 gss_OID GSS_EAP_NT_EAP_NAME = &gssEapNtEapName;
68
69 OM_uint32
70 gssEapAllocName(OM_uint32 *minor, gss_name_t *pName)
71 {
72     OM_uint32 tmpMinor;
73     gss_name_t name;
74
75     *pName = GSS_C_NO_NAME;
76
77     name = (gss_name_t)GSSEAP_CALLOC(1, sizeof(*name));
78     if (name == NULL) {
79         *minor = ENOMEM;
80         return GSS_S_FAILURE;
81     }
82
83     if (GSSEAP_MUTEX_INIT(&name->mutex) != 0) {
84         *minor = errno;
85         gssEapReleaseName(&tmpMinor, &name);
86         return GSS_S_FAILURE;
87     }
88
89     *pName = name;
90
91     return GSS_S_COMPLETE;
92 }
93
94 OM_uint32
95 gssEapReleaseName(OM_uint32 *minor, gss_name_t *pName)
96 {
97     gss_name_t name;
98     krb5_context krbContext = NULL;
99     OM_uint32 tmpMinor;
100
101     *minor = 0;
102
103     if (pName == NULL) {
104         return GSS_S_COMPLETE;
105     }
106
107     name = *pName;
108     if (name == GSS_C_NO_NAME) {
109         return GSS_S_COMPLETE;
110     }
111
112     GSSEAP_KRB_INIT(&krbContext);
113     krb5_free_principal(krbContext, name->krbPrincipal);
114     gssEapReleaseOid(&tmpMinor, &name->mechanismUsed);
115 #ifdef GSSEAP_ENABLE_ACCEPTOR
116     gssEapReleaseAttrContext(&tmpMinor, name);
117 #endif
118
119     GSSEAP_MUTEX_DESTROY(&name->mutex);
120     GSSEAP_FREE(name);
121     *pName = NULL;
122
123     return GSS_S_COMPLETE;
124 }
125
126 static OM_uint32
127 krbPrincipalToName(OM_uint32 *minor,
128                    krb5_principal *principal,
129                    gss_name_t *pName)
130 {
131     OM_uint32 major;
132     gss_name_t name;
133
134     major = gssEapAllocName(minor, &name);
135     if (GSS_ERROR(major))
136         return major;
137
138     name->krbPrincipal = *principal;
139     *principal = NULL;
140
141     if (KRB_PRINC_LENGTH(name->krbPrincipal) > 1) {
142         name->flags |= NAME_FLAG_SERVICE;
143     } else {
144         name->flags |= NAME_FLAG_NAI;
145     }
146
147     *pName = name;
148     *minor = 0;
149
150     return GSS_S_COMPLETE;
151 }
152
153 static char *
154 gssEapGetDefaultRealm(krb5_context krbContext)
155 {
156     char *defaultRealm = NULL;
157
158     krb5_appdefault_string(krbContext, "eap_gss",
159                            NULL, "default_realm", "", &defaultRealm);
160
161     return defaultRealm;
162 }
163
164 static OM_uint32
165 importServiceName(OM_uint32 *minor,
166                   const gss_buffer_t nameBuffer,
167                   gss_name_t *pName)
168 {
169     OM_uint32 major;
170     krb5_error_code code;
171     krb5_context krbContext;
172     krb5_principal krbPrinc;
173     char *service, *host, *realm = NULL;
174
175     GSSEAP_KRB_INIT(&krbContext);
176
177     major = bufferToString(minor, nameBuffer, &service);
178     if (GSS_ERROR(major))
179         return major;
180
181     host = strchr(service, '@');
182     if (host != NULL) {
183         *host = '\0';
184         host++;
185     }
186
187     realm = gssEapGetDefaultRealm(krbContext);
188
189     code = krb5_build_principal(krbContext,
190                                 &krbPrinc,
191                                 realm != NULL ? strlen(realm) : 0,
192                                 realm != NULL ? realm : "",
193                                 service,
194                                 host,
195                                 NULL);
196
197     if (code == 0) {
198         KRB_PRINC_TYPE(krbPrinc) = KRB5_NT_SRV_HST;
199
200         major = krbPrincipalToName(minor, &krbPrinc, pName);
201         if (GSS_ERROR(major))
202             krb5_free_principal(krbContext, krbPrinc);
203     } else {
204         major = GSS_S_FAILURE;
205         *minor = GSSEAP_BAD_SERVICE_NAME;
206     }
207
208     if (realm != NULL)
209         GSSEAP_FREE(realm);
210     GSSEAP_FREE(service);
211
212     return major;
213 }
214
215 #define IMPORT_FLAG_DEFAULT_REALM           0x1
216
217 /*
218  * Import an EAP name, possibly appending the default GSS EAP realm,
219  */
220 static OM_uint32
221 importEapNameFlags(OM_uint32 *minor,
222                    const gss_buffer_t nameBuffer,
223                    OM_uint32 importFlags,
224                    gss_name_t *pName)
225 {
226     OM_uint32 major;
227     krb5_context krbContext;
228     krb5_principal krbPrinc = NULL;
229     krb5_error_code code;
230     char *nameString;
231
232     GSSEAP_KRB_INIT(&krbContext);
233
234     if (nameBuffer == GSS_C_NO_BUFFER) {
235         nameString = "";
236         code = KRB5_PARSE_MALFORMED;
237     } else {
238         major = bufferToString(minor, nameBuffer, &nameString);
239         if (GSS_ERROR(major))
240             return major;
241
242         /*
243          * First, attempt to parse the name on the assumption that it includes
244          * a qualifying realm. This allows us to avoid accidentally appending
245          * the default Kerberos realm to an unqualified name. (A bug in MIT
246          * Kerberos prevents the default realm being set to an empty value.)
247          */
248         code = krb5_parse_name_flags(krbContext, nameString,
249                                      KRB5_PRINCIPAL_PARSE_REQUIRE_REALM, &krbPrinc);
250     }
251
252     if (code == KRB5_PARSE_MALFORMED) {
253         char *defaultRealm = NULL;
254         int parseFlags = 0;
255
256         /* Possibly append the default EAP realm if required */
257         if (importFlags & IMPORT_FLAG_DEFAULT_REALM)
258             defaultRealm = gssEapGetDefaultRealm(krbContext);
259
260         /* If no default realm, leave the realm empty in the parsed name */
261         if (defaultRealm == NULL || defaultRealm[0] == '\0')
262             parseFlags |= KRB5_PRINCIPAL_PARSE_NO_REALM;
263
264         code = krb5_parse_name_flags(krbContext, nameString, parseFlags, &krbPrinc);
265
266 #ifdef HAVE_HEIMDAL_VERSION
267         if (code == 0 && KRB_PRINC_REALM(krbPrinc) == NULL) {
268             KRB_PRINC_REALM(krbPrinc) = GSSEAP_CALLOC(1, sizeof(char));
269             if (KRB_PRINC_REALM(krbPrinc) == NULL)
270                 code = ENOMEM;
271         }
272 #endif
273
274         if (defaultRealm != NULL)
275             GSSEAP_FREE(defaultRealm);
276     }
277
278     if (nameBuffer != GSS_C_NO_BUFFER)
279         GSSEAP_FREE(nameString);
280
281     if (code != 0) {
282         *minor = code;
283         return GSS_S_FAILURE;
284     }
285
286     assert(krbPrinc != NULL);
287
288     major = krbPrincipalToName(minor, &krbPrinc, pName);
289     if (GSS_ERROR(major))
290         krb5_free_principal(krbContext, krbPrinc);
291
292     return major;
293 }
294
295 static OM_uint32
296 importEapName(OM_uint32 *minor,
297               const gss_buffer_t nameBuffer,
298               gss_name_t *pName)
299 {
300     return importEapNameFlags(minor, nameBuffer, 0, pName);
301 }
302
303 static OM_uint32
304 importUserName(OM_uint32 *minor,
305                const gss_buffer_t nameBuffer,
306                gss_name_t *pName)
307 {
308     return importEapNameFlags(minor, nameBuffer, IMPORT_FLAG_DEFAULT_REALM, pName);
309 }
310
311 static OM_uint32
312 importAnonymousName(OM_uint32 *minor,
313                     const gss_buffer_t nameBuffer GSSEAP_UNUSED,
314                     gss_name_t *pName)
315 {
316     return importEapNameFlags(minor, GSS_C_NO_BUFFER, 0, pName);
317 }
318
319 #define UPDATE_REMAIN(n)    do {            \
320         p += (n);                           \
321         remain -= (n);                      \
322     } while (0)
323
324 #define CHECK_REMAIN(n)     do {        \
325         if (remain < (n)) {             \
326             major = GSS_S_BAD_NAME;     \
327             *minor = GSSEAP_TOK_TRUNC;  \
328             goto cleanup;               \
329         }                               \
330     } while (0)
331
332 OM_uint32
333 gssEapImportNameInternal(OM_uint32 *minor,
334                          const gss_buffer_t nameBuffer,
335                          gss_name_t *pName,
336                          OM_uint32 flags)
337 {
338     OM_uint32 major, tmpMinor;
339     krb5_context krbContext;
340     unsigned char *p;
341     size_t len, remain;
342     gss_buffer_desc buf;
343     gss_name_t name = GSS_C_NO_NAME;
344     gss_OID mechanismUsed = GSS_C_NO_OID;
345
346     GSSEAP_KRB_INIT(&krbContext);
347
348     p = (unsigned char *)nameBuffer->value;
349     remain = nameBuffer->length;
350
351     if (flags & EXPORT_NAME_FLAG_OID) {
352         gss_OID_desc mech;
353         enum gss_eap_token_type tokType;
354         uint16_t wireTokType;
355
356         /* TOK_ID || MECH_OID_LEN || MECH_OID */
357         if (remain < 6) {
358             *minor = GSSEAP_BAD_NAME_TOKEN;
359             return GSS_S_BAD_NAME;
360         }
361
362         if (flags & EXPORT_NAME_FLAG_COMPOSITE)
363             tokType = TOK_TYPE_EXPORT_NAME_COMPOSITE;
364         else
365             tokType = TOK_TYPE_EXPORT_NAME;
366
367         /* TOK_ID */
368         wireTokType = load_uint16_be(p);
369
370         if ((flags & EXPORT_NAME_FLAG_ALLOW_COMPOSITE) &&
371             wireTokType == TOK_TYPE_EXPORT_NAME_COMPOSITE) {
372             tokType = TOK_TYPE_EXPORT_NAME_COMPOSITE;
373             flags |= EXPORT_NAME_FLAG_COMPOSITE;
374         }
375
376         if (wireTokType != tokType) {
377             *minor = GSSEAP_WRONG_TOK_ID;
378             return GSS_S_BAD_NAME;
379         }
380         UPDATE_REMAIN(2);
381
382         /* MECH_OID_LEN */
383         len = load_uint16_be(p);
384         if (len < 2) {
385             *minor = GSSEAP_BAD_NAME_TOKEN;
386             return GSS_S_BAD_NAME;
387         }
388         UPDATE_REMAIN(2);
389
390         /* MECH_OID */
391         if (p[0] != 0x06) {
392             *minor = GSSEAP_BAD_NAME_TOKEN;
393             return GSS_S_BAD_NAME;
394         }
395
396         mech.length = p[1];
397         mech.elements = &p[2];
398
399         CHECK_REMAIN(mech.length);
400
401         major = gssEapCanonicalizeOid(minor,
402                                       &mech,
403                                       OID_FLAG_FAMILY_MECH_VALID |
404                                         OID_FLAG_MAP_FAMILY_MECH_TO_NULL,
405                                       &mechanismUsed);
406         if (GSS_ERROR(major))
407             goto cleanup;
408
409         UPDATE_REMAIN(2 + mech.length);
410     }
411
412     /* NAME_LEN */
413     CHECK_REMAIN(4);
414     len = load_uint32_be(p);
415     UPDATE_REMAIN(4);
416
417     /* NAME */
418     CHECK_REMAIN(len);
419     buf.length = len;
420     buf.value = p;
421     UPDATE_REMAIN(len);
422
423     major = importEapNameFlags(minor, &buf, 0, &name);
424     if (GSS_ERROR(major))
425         goto cleanup;
426
427     name->mechanismUsed = mechanismUsed;
428     mechanismUsed = GSS_C_NO_OID;
429
430     if (flags & EXPORT_NAME_FLAG_COMPOSITE) {
431         gss_buffer_desc buf;
432
433         buf.length = remain;
434         buf.value = p;
435 #ifdef GSSEAP_ENABLE_ACCEPTOR
436         major = gssEapImportAttrContext(minor, &buf, name);
437 #else
438                 major = GSS_S_UNAVAILABLE;
439 #endif
440         if (GSS_ERROR(major))
441             goto cleanup;
442     }
443
444     major = GSS_S_COMPLETE;
445     *minor = 0;
446
447 cleanup:
448     if (GSS_ERROR(major)) {
449         gssEapReleaseOid(&tmpMinor, &mechanismUsed);
450         gssEapReleaseName(&tmpMinor, &name);
451     } else {
452         *pName = name;
453     }
454
455     return major;
456 }
457
458 static OM_uint32
459 importExportName(OM_uint32 *minor,
460                  const gss_buffer_t nameBuffer,
461                  gss_name_t *name)
462 {
463     return gssEapImportNameInternal(minor, nameBuffer, name,
464                                     EXPORT_NAME_FLAG_OID |
465                                     EXPORT_NAME_FLAG_ALLOW_COMPOSITE);
466 }
467
468 #ifdef HAVE_GSS_C_NT_COMPOSITE_EXPORT
469 static OM_uint32
470 importCompositeExportName(OM_uint32 *minor,
471                           const gss_buffer_t nameBuffer,
472                           gss_name_t *name)
473 {
474     return gssEapImportNameInternal(minor, nameBuffer, name,
475                                     EXPORT_NAME_FLAG_OID |
476                                     EXPORT_NAME_FLAG_COMPOSITE);
477 }
478 #endif
479
480 struct gss_eap_name_import_provider {
481     gss_const_OID oid;
482     OM_uint32 (*import)(OM_uint32 *, const gss_buffer_t, gss_name_t *);
483 };
484
485 OM_uint32
486 gssEapImportName(OM_uint32 *minor,
487                  const gss_buffer_t nameBuffer,
488                  const gss_OID nameType,
489                  const gss_OID mechType,
490                  gss_name_t *pName)
491 {
492     struct gss_eap_name_import_provider nameTypes[] = {
493         { GSS_EAP_NT_EAP_NAME,              importEapName               },
494         { GSS_C_NT_USER_NAME,               importUserName              },
495         { GSS_C_NT_HOSTBASED_SERVICE,       importServiceName           },
496         { GSS_C_NT_HOSTBASED_SERVICE_X,     importServiceName           },
497         { GSS_C_NT_ANONYMOUS,               importAnonymousName         },
498         { GSS_C_NT_EXPORT_NAME,             importExportName            },
499         { GSS_KRB5_NT_PRINCIPAL_NAME,       importUserName              },
500 #ifdef HAVE_GSS_C_NT_COMPOSITE_EXPORT
501         { GSS_C_NT_COMPOSITE_EXPORT,        importCompositeExportName   },
502 #endif
503     };
504     size_t i;
505     OM_uint32 major = GSS_S_BAD_NAMETYPE;
506     OM_uint32 tmpMinor;
507     gss_name_t name = GSS_C_NO_NAME;
508
509     for (i = 0; i < sizeof(nameTypes) / sizeof(nameTypes[0]); i++) {
510         if (oidEqual(nameTypes[i].oid,
511                      nameType == GSS_C_NO_OID ? GSS_EAP_NT_EAP_NAME : nameType)) {
512             major = nameTypes[i].import(minor, nameBuffer, &name);
513             break;
514         }
515     }
516
517     if (major == GSS_S_COMPLETE &&
518         mechType != GSS_C_NO_OID) {
519         assert(gssEapIsConcreteMechanismOid(mechType));
520         assert(name->mechanismUsed == GSS_C_NO_OID);
521
522         major = gssEapCanonicalizeOid(minor, mechType, 0, &name->mechanismUsed);
523     }
524
525     if (GSS_ERROR(major))
526         gssEapReleaseName(&tmpMinor, &name);
527     else
528         *pName = name;
529
530     return major;
531 }
532
533 OM_uint32
534 gssEapExportName(OM_uint32 *minor,
535                  const gss_name_t name,
536                  gss_buffer_t exportedName)
537 {
538     return gssEapExportNameInternal(minor, name, exportedName,
539                                     EXPORT_NAME_FLAG_OID);
540 }
541
542 OM_uint32
543 gssEapExportNameInternal(OM_uint32 *minor,
544                          const gss_name_t name,
545                          gss_buffer_t exportedName,
546                          OM_uint32 flags)
547 {
548     OM_uint32 major = GSS_S_FAILURE, tmpMinor;
549     gss_buffer_desc nameBuf = GSS_C_EMPTY_BUFFER;
550     size_t exportedNameLen;
551     unsigned char *p;
552     gss_buffer_desc attrs = GSS_C_EMPTY_BUFFER;
553     gss_OID mech;
554
555     exportedName->length = 0;
556     exportedName->value = NULL;
557
558     if (name->mechanismUsed != GSS_C_NO_OID)
559         mech = name->mechanismUsed;
560     else
561         mech = GSS_EAP_MECHANISM;
562
563     major = gssEapDisplayName(minor, name, &nameBuf, NULL);
564     if (GSS_ERROR(major))
565         goto cleanup;
566
567     exportedNameLen = 0;
568     if (flags & EXPORT_NAME_FLAG_OID) {
569         exportedNameLen += 6 + mech->length;
570     }
571     exportedNameLen += 4 + nameBuf.length;
572     if (flags & EXPORT_NAME_FLAG_COMPOSITE) {
573 #ifdef GSSEAP_ENABLE_ACCEPTOR
574         major = gssEapExportAttrContext(minor, name, &attrs);
575 #else
576                 major = GSS_S_UNAVAILABLE;
577 #endif
578         if (GSS_ERROR(major))
579             goto cleanup;
580         exportedNameLen += attrs.length;
581     }
582
583     exportedName->value = GSSEAP_MALLOC(exportedNameLen);
584     if (exportedName->value == NULL) {
585         major = GSS_S_FAILURE;
586         *minor = ENOMEM;
587         goto cleanup;
588     }
589     exportedName->length = exportedNameLen;
590
591     p = (unsigned char *)exportedName->value;
592
593     if (flags & EXPORT_NAME_FLAG_OID) {
594         /* TOK | MECH_OID_LEN */
595         store_uint16_be((flags & EXPORT_NAME_FLAG_COMPOSITE)
596                         ? TOK_TYPE_EXPORT_NAME_COMPOSITE
597                         : TOK_TYPE_EXPORT_NAME,
598                         p);
599         p += 2;
600         store_uint16_be(mech->length + 2, p);
601         p += 2;
602
603         /* MECH_OID */
604         *p++ = 0x06;
605         *p++ = mech->length & 0xff;
606         memcpy(p, mech->elements, mech->length);
607         p += mech->length;
608     }
609
610     /* NAME_LEN */
611     store_uint32_be(nameBuf.length, p);
612     p += 4;
613
614     /* NAME */
615     memcpy(p, nameBuf.value, nameBuf.length);
616     p += nameBuf.length;
617
618     if (flags & EXPORT_NAME_FLAG_COMPOSITE) {
619         memcpy(p, attrs.value, attrs.length);
620         p += attrs.length;
621     }
622
623     assert(p == (unsigned char *)exportedName->value + exportedNameLen);
624
625     major = GSS_S_COMPLETE;
626     *minor = 0;
627
628 cleanup:
629     gss_release_buffer(&tmpMinor, &attrs);
630     gss_release_buffer(&tmpMinor, &nameBuf);
631     if (GSS_ERROR(major))
632         gss_release_buffer(&tmpMinor, exportedName);
633
634     return major;
635 }
636
637 OM_uint32
638 gssEapCanonicalizeName(OM_uint32 *minor,
639                        const gss_name_t input_name,
640                        const gss_OID mech_type,
641                        gss_name_t *dest_name)
642 {
643     OM_uint32 major, tmpMinor;
644     krb5_context krbContext;
645     gss_name_t name;
646     gss_OID mech_used;
647
648     if (input_name == GSS_C_NO_NAME) {
649         *minor = EINVAL;
650         return GSS_S_CALL_INACCESSIBLE_READ | GSS_S_BAD_NAME;
651     }
652
653     GSSEAP_KRB_INIT(&krbContext);
654
655     major = gssEapAllocName(minor, &name);
656     if (GSS_ERROR(major)) {
657         return major;
658     }
659
660     if (mech_type != GSS_C_NO_OID)
661         mech_used = mech_type;
662     else
663         mech_used = input_name->mechanismUsed;
664
665     major = gssEapCanonicalizeOid(minor,
666                                   mech_used,
667                                   OID_FLAG_NULL_VALID,
668                                   &name->mechanismUsed);
669     if (GSS_ERROR(major))
670         goto cleanup;
671
672     name->flags = input_name->flags;
673
674     *minor = krb5_copy_principal(krbContext, input_name->krbPrincipal,
675                                  &name->krbPrincipal);
676     if (*minor != 0) {
677         major = GSS_S_FAILURE;
678         goto cleanup;
679     }
680
681     if (input_name->attrCtx != NULL) {
682 #ifdef GSSEAP_ENABLE_ACCEPTOR
683         major = gssEapDuplicateAttrContext(minor, input_name, name);
684 #else
685                 major = GSS_S_UNAVAILABLE;
686 #endif
687         if (GSS_ERROR(major))
688             goto cleanup;
689     }
690
691     *dest_name = name;
692
693 cleanup:
694     if (GSS_ERROR(major)) {
695         gssEapReleaseName(&tmpMinor, &name);
696     }
697
698     return major;
699 }
700
701 OM_uint32
702 gssEapDuplicateName(OM_uint32 *minor,
703                     const gss_name_t input_name,
704                     gss_name_t *dest_name)
705 {
706     return gssEapCanonicalizeName(minor, input_name,
707                                   GSS_C_NO_OID, dest_name);
708 }
709
710 OM_uint32
711 gssEapDisplayName(OM_uint32 *minor,
712                   gss_name_t name,
713                   gss_buffer_t output_name_buffer,
714                   gss_OID *output_name_type)
715 {
716     OM_uint32 major;
717     krb5_context krbContext;
718     char *krbName;
719     gss_OID name_type;
720     int flags = 0;
721
722     GSSEAP_KRB_INIT(&krbContext);
723
724     output_name_buffer->length = 0;
725     output_name_buffer->value = NULL;
726
727     if (name == GSS_C_NO_NAME) {
728         *minor = EINVAL;
729         return GSS_S_CALL_INACCESSIBLE_READ | GSS_S_BAD_NAME;
730     }
731
732     /*
733      * According to draft-ietf-abfab-gss-eap-01, when the realm is
734      * absent the trailing '@' is not included.
735      */
736 #ifdef HAVE_HEIMDAL_VERSION
737     if (KRB_PRINC_REALM(name->krbPrincipal) == NULL ||
738         KRB_PRINC_REALM(name->krbPrincipal)[0] == '\0')
739 #else
740     if (KRB_PRINC_REALM(name->krbPrincipal)->length == 0)
741 #endif
742         flags |= KRB5_PRINCIPAL_UNPARSE_NO_REALM;
743
744     *minor = krb5_unparse_name_flags(krbContext, name->krbPrincipal,
745                                      flags, &krbName);
746     if (*minor != 0) {
747         return GSS_S_FAILURE;
748     }
749
750     major = makeStringBuffer(minor, krbName, output_name_buffer);
751     if (GSS_ERROR(major)) {
752         krb5_free_unparsed_name(krbContext, krbName);
753         return major;
754     }
755
756     krb5_free_unparsed_name(krbContext, krbName);
757
758     if (output_name_buffer->length == 0) {
759         name_type = GSS_C_NT_ANONYMOUS;
760     } else if (name->flags & NAME_FLAG_NAI) {
761         name_type = GSS_C_NT_USER_NAME;
762     } else {
763         name_type = GSS_EAP_NT_EAP_NAME;
764     }
765
766     if (output_name_type != NULL)
767         *output_name_type = name_type;
768
769     return GSS_S_COMPLETE;
770 }
771
772 OM_uint32
773 gssEapCompareName(OM_uint32 *minor,
774                   gss_name_t name1,
775                   gss_name_t name2,
776                   int *name_equal)
777 {
778     krb5_context krbContext;
779
780     *minor = 0;
781
782     if (name1 == GSS_C_NO_NAME && name2 == GSS_C_NO_NAME) {
783         *name_equal = 1;
784     } else if (name1 != GSS_C_NO_NAME && name2 != GSS_C_NO_NAME) {
785         GSSEAP_KRB_INIT(&krbContext);
786
787         /* krbPrincipal is immutable, so lock not required */
788         *name_equal = krb5_principal_compare(krbContext,
789                                              name1->krbPrincipal,
790                                              name2->krbPrincipal);
791     }
792
793     return GSS_S_COMPLETE;
794 }