#define g_verify_token_header gssint_g_verify_token_header
#define g_display_major_status gssint_g_display_major_status
#define g_display_com_err_status gssint_g_display_com_err_status
-#define g_order_init gssint_g_order_init
-#define g_order_check gssint_g_order_check
-#define g_order_free gssint_g_order_free
-#define g_queue_size gssint_g_queue_size
-#define g_queue_externalize gssint_g_queue_externalize
-#define g_queue_internalize gssint_g_queue_internalize
+#define g_seqstate_init gssint_g_seqstate_init
+#define g_seqstate_check gssint_g_seqstate_check
+#define g_seqstate_free gssint_g_seqstate_free
+#define g_seqstate_size gssint_g_seqstate_size
+#define g_seqstate_externalize gssint_g_seqstate_externalize
+#define g_seqstate_internalize gssint_g_seqstate_internalize
#define g_canonicalize_host gssint_g_canonicalize_host
#define g_local_host_name gssint_g_local_host_name
#define g_strdup gssint_g_strdup
} g_set;
#define G_SET_INIT { K5_MUTEX_PARTIAL_INITIALIZER, 0 }
+typedef struct g_seqnum_state_st *g_seqnum_state;
+
int g_set_init (g_set_elt *s);
int g_set_destroy (g_set_elt *s);
int g_set_entry_add (g_set_elt *s, void *key, void *value);
OM_uint32 status_value,
gss_buffer_t status_string);
-gss_int32 g_order_init (void **queue, uint64_t seqnum,
- int do_replay, int do_sequence, int wide);
-
-gss_int32 g_order_check (void **queue, uint64_t seqnum);
-
-void g_order_free (void **queue);
-
-gss_uint32 g_queue_size(void *vqueue, size_t *sizep);
-gss_uint32 g_queue_externalize(void *vqueue, unsigned char **buf,
- size_t *lenremain);
-gss_uint32 g_queue_internalize(void **vqueue, unsigned char **buf,
- size_t *lenremain);
+long g_seqstate_init(g_seqnum_state *state_out, uint64_t seqnum,
+ int do_replay, int do_sequence, int wide);
+OM_uint32 g_seqstate_check(g_seqnum_state state, uint64_t seqnum);
+void g_seqstate_free(g_seqnum_state state);
+void g_seqstate_size(g_seqnum_state state, size_t *sizep);
+long g_seqstate_externalize(g_seqnum_state state, unsigned char **buf,
+ size_t *lenremain);
+long g_seqstate_internalize(g_seqnum_state *state_out, unsigned char **buf,
+ size_t *lenremain);
char *g_strdup (char *str);
size_t i, j;
enum width w;
struct test *t;
- void *seqstate;
+ g_seqnum_state seqstate;
OM_uint32 status;
for (i = 0; i < sizeof(tests) / sizeof(*tests); i++) {
for (w = NARROW; w <= WIDE; w++) {
if (t->wide_seqnums != BOTH && t->wide_seqnums != w)
continue;
- if (g_order_init(&seqstate, t->initial, t->do_replay,
- t->do_sequence, w))
+ if (g_seqstate_init(&seqstate, t->initial, t->do_replay,
+ t->do_sequence, w))
abort();
for (j = 0; j < t->nseqs; j++) {
- status = g_order_check(&seqstate, t->seqs[j].seqnum);
+ status = g_seqstate_check(seqstate, t->seqs[j].seqnum);
if (status != t->seqs[j].result) {
fprintf(stderr, "Test %d seq %d failed: %d != %d\n",
(int)i, (int)j, status, t->seqs[j].result);
return 1;
}
}
- g_order_free(&seqstate);
+ g_seqstate_free(seqstate);
}
}
#define QUEUE_LENGTH 20
-typedef struct _queue {
+typedef struct g_seqnum_state_st {
int do_replay;
int do_sequence;
int start;
}
}
-gss_int32
-g_order_init(void **vqueue, uint64_t seqnum,
- int do_replay, int do_sequence, int wide_nums)
+long
+g_seqstate_init(g_seqnum_state *state_out, uint64_t seqnum,
+ int do_replay, int do_sequence, int wide_nums)
{
queue *q;
q->firstnum = seqnum;
q->elem[q->start] = ((uint64_t)0 - 1) & q->mask;
- *vqueue = (void *) q;
+ *state_out = q;
return(0);
}
-gss_int32
-g_order_check(void **vqueue, uint64_t seqnum)
+OM_uint32
+g_seqstate_check(g_seqnum_state q, uint64_t seqnum)
{
- queue *q;
int i;
uint64_t expected;
- q = (queue *) (*vqueue);
-
if (!q->do_replay && !q->do_sequence)
return(GSS_S_COMPLETE);
}
void
-g_order_free(void **vqueue)
+g_seqstate_free(g_seqnum_state q)
{
- queue *q;
-
- q = (queue *) (*vqueue);
-
free(q);
-
- *vqueue = NULL;
}
/*
* These support functions are for the serialization routines
*/
-gss_uint32
-g_queue_size(void *vqueue, size_t *sizep)
+void
+g_seqstate_size(g_seqnum_state q, size_t *sizep)
{
- *sizep += sizeof(queue);
- return 0;
+ *sizep += sizeof(*q);
}
-gss_uint32
-g_queue_externalize(void *vqueue, unsigned char **buf, size_t *lenremain)
+long
+g_seqstate_externalize(g_seqnum_state q, unsigned char **buf,
+ size_t *lenremain)
{
- if (*lenremain < sizeof(queue))
+ if (*lenremain < sizeof(*q))
return ENOMEM;
- memcpy(*buf, vqueue, sizeof(queue));
- *buf += sizeof(queue);
- *lenremain -= sizeof(queue);
+ memcpy(*buf, q, sizeof(*q));
+ *buf += sizeof(*q);
+ *lenremain -= sizeof(*q);
return 0;
}
-gss_uint32
-g_queue_internalize(void **vqueue, unsigned char **buf, size_t *lenremain)
+long
+g_seqstate_internalize(g_seqnum_state *state_out, unsigned char **buf,
+ size_t *lenremain)
{
- void *q;
+ queue *q;
- if (*lenremain < sizeof(queue))
+ if (*lenremain < sizeof(*q))
return EINVAL;
- if ((q = malloc(sizeof(queue))) == 0)
+ if ((q = malloc(sizeof(*q))) == 0)
return ENOMEM;
- memcpy(q, *buf, sizeof(queue));
- *buf += sizeof(queue);
- *lenremain -= sizeof(queue);
- *vqueue = q;
+ memcpy(q, *buf, sizeof(*q));
+ *buf += sizeof(*q);
+ *lenremain -= sizeof(*q);
+ *state_out = q;
return 0;
}
goto fail;
}
- g_order_init(&(ctx->seqstate), ctx->seq_recv,
- (ctx->gss_flags & GSS_C_REPLAY_FLAG) != 0,
- (ctx->gss_flags & GSS_C_SEQUENCE_FLAG) != 0, ctx->proto);
+ code = g_seqstate_init(&ctx->seqstate, ctx->seq_recv,
+ (ctx->gss_flags & GSS_C_REPLAY_FLAG) != 0,
+ (ctx->gss_flags & GSS_C_SEQUENCE_FLAG) != 0,
+ ctx->proto);
+ if (code) {
+ major_status = GSS_S_FAILURE;
+ goto fail;
+ }
/* DCE_STYLE implies mutual authentication */
if (ctx->gss_flags & GSS_C_DCE_STYLE)
/* free all the context state */
if (ctx->seqstate)
- g_order_free(&(ctx->seqstate));
+ g_seqstate_free(ctx->seqstate);
if (ctx->enc)
krb5_k_free_key(context, ctx->enc);
affects the wire encoding. */
uint64_t seq_send;
uint64_t seq_recv;
- void *seqstate;
+ g_seqnum_state seqstate;
krb5_context k5_context;
krb5_auth_context auth_context;
gss_OID_desc *mech_used;
if (code != 0)
goto cleanup;
+ if (!(ctx->gss_flags & GSS_C_MUTUAL_FLAG)) {
+ /* There will be no AP-REP, so set up sequence state now. */
+ ctx->seq_recv = ctx->seq_send;
+ code = g_seqstate_init(&ctx->seqstate, ctx->seq_recv,
+ (ctx->gss_flags & GSS_C_REPLAY_FLAG) != 0,
+ (ctx->gss_flags & GSS_C_SEQUENCE_FLAG) != 0,
+ ctx->proto);
+ if (code != 0)
+ goto cleanup;
+ }
+
/* compute time_rec */
if (time_rec) {
if ((code = krb5_timeofday(context, &now)))
ctx->established = 0;
major_status = GSS_S_CONTINUE_NEEDED;
} else {
- ctx->seq_recv = ctx->seq_send;
- g_order_init(&(ctx->seqstate), ctx->seq_recv,
- (ctx->gss_flags & GSS_C_REPLAY_FLAG) != 0,
- (ctx->gss_flags & GSS_C_SEQUENCE_FLAG) != 0, ctx->proto);
ctx->gss_flags |= GSS_C_PROT_READY_FLAG;
ctx->established = 1;
major_status = GSS_S_COMPLETE;
/* store away the sequence number */
ctx->seq_recv = ap_rep_data->seq_number;
- g_order_init(&(ctx->seqstate), ctx->seq_recv,
- (ctx->gss_flags & GSS_C_REPLAY_FLAG) != 0,
- (ctx->gss_flags & GSS_C_SEQUENCE_FLAG) !=0, ctx->proto);
+ code = g_seqstate_init(&ctx->seqstate, ctx->seq_recv,
+ (ctx->gss_flags & GSS_C_REPLAY_FLAG) != 0,
+ (ctx->gss_flags & GSS_C_SEQUENCE_FLAG) != 0,
+ ctx->proto);
+ if (code) {
+ krb5_free_ap_rep_enc_part(context, ap_rep_data);
+ goto fail;
+ }
if (ap_rep_data->subkey != NULL &&
(ctx->proto == 1 || (ctx->gss_flags & GSS_C_DCE_STYLE) ||
goto no_mem;
memcpy(message_buffer->value, plain.data, message_buffer->length);
}
- err = g_order_check(&ctx->seqstate, seqnum);
+ err = g_seqstate_check(ctx->seqstate, seqnum);
*minor_status = 0;
return err;
} else if (toktype == KG_TOK_MIC_MSG) {
*minor_status = 0;
return GSS_S_BAD_SIG;
}
- err = g_order_check(&ctx->seqstate, seqnum);
+ err = g_seqstate_check(ctx->seqstate, seqnum);
*minor_status = 0;
return err;
} else if (toktype == KG_TOK_DEL_CTX) {
}
}
- code = g_order_check(&ctx->seqstate, seqnum);
+ code = g_seqstate_check(ctx->seqstate, seqnum);
} else if (toktype == KG_TOK_MIC_MSG) {
if (load_16_be(ptr) != KG2_TOK_MIC_MSG)
goto defective;
*minor_status = code;
return GSS_S_BAD_SIG;
}
- code = g_order_check(&ctx->seqstate, seqnum);
+ code = g_seqstate_check(ctx->seqstate, seqnum);
} else if (toktype == KG_TOK_DEL_CTX) {
if (load_16_be(ptr) != KG2_TOK_DEL_CTX)
goto defective;
return(GSS_S_BAD_SIG);
}
- retval = g_order_check(&(ctx->seqstate), (uint64_t)seqnum);
+ retval = g_seqstate_check(ctx->seqstate, (uint64_t)seqnum);
/* success or ordering violation */
}
code = 0;
- retval = g_order_check(&ctx->seqstate, (uint64_t)seqnum);
+ retval = g_seqstate_check(ctx->seqstate, (uint64_t)seqnum);
cleanup:
krb5_free_checksum_contents(context, &md5cksum);
}
static krb5_error_code
-kg_queue_externalize(kcontext, arg, buffer, lenremain)
+kg_seqstate_externalize(kcontext, arg, buffer, lenremain)
krb5_context kcontext;
- krb5_pointer arg;
+ g_seqnum_state arg;
krb5_octet **buffer;
size_t *lenremain;
{
krb5_error_code err;
err = krb5_ser_pack_int32(KV5M_GSS_QUEUE, buffer, lenremain);
if (err == 0)
- err = g_queue_externalize(arg, buffer, lenremain);
+ err = g_seqstate_externalize(arg, buffer, lenremain);
if (err == 0)
err = krb5_ser_pack_int32(KV5M_GSS_QUEUE, buffer, lenremain);
return err;
}
static krb5_error_code
-kg_queue_internalize(kcontext, argp, buffer, lenremain)
+kg_seqstate_internalize(kcontext, argp, buffer, lenremain)
krb5_context kcontext;
- krb5_pointer *argp;
+ g_seqnum_state *argp;
krb5_octet **buffer;
size_t *lenremain;
{
if (ibuf != KV5M_GSS_QUEUE)
return (EINVAL);
- err = g_queue_internalize(argp, &bp, &remain);
+ err = g_seqstate_internalize(argp, &bp, &remain);
if (err)
return err;
/* Read in and check our trailing magic number */
if (krb5_ser_unpack_int32(&ibuf, &bp, &remain)) {
- g_order_free(argp);
+ g_seqstate_free(*argp);
return (EINVAL);
}
if (ibuf != KV5M_GSS_QUEUE) {
- g_order_free(argp);
+ g_seqstate_free(*argp);
return (EINVAL);
}
}
static krb5_error_code
-kg_queue_size(kcontext, arg, sizep)
+kg_seqstate_size(kcontext, arg, sizep)
krb5_context kcontext;
- krb5_pointer arg;
+ g_seqnum_state arg;
size_t *sizep;
{
krb5_error_code kret;
kret = EINVAL;
if (arg) {
required = 2*sizeof(krb5_int32); /* For the header and trailer */
- g_queue_size(arg, &required);
+ g_seqstate_size(arg, &required);
kret = 0;
*sizep += required;
&required);
if (!kret && ctx->seqstate)
- kret = kg_queue_size(kcontext, ctx->seqstate, &required);
+ kret = kg_seqstate_size(kcontext, ctx->seqstate, &required);
if (!kret)
kret = krb5_size_opaque(kcontext,
&bp, &remain);
if (!kret && ctx->seqstate)
- kret = kg_queue_externalize(kcontext,
- ctx->seqstate, &bp, &remain);
+ kret = kg_seqstate_externalize(kcontext,
+ ctx->seqstate, &bp, &remain);
if (!kret)
kret = krb5_externalize_opaque(kcontext,
}
if (!kret) {
- kret = kg_queue_internalize(kcontext, &ctx->seqstate,
- &bp, &remain);
+ kret = kg_seqstate_internalize(kcontext, &ctx->seqstate,
+ &bp, &remain);
if (kret == EINVAL)
kret = 0;
}
* the protocol needs replay or sequence protection. Assume we don't
* (because RPCSEC_GSS doesn't).
*/
- g_order_init(&gctx->seqstate, gctx->seq_recv, 0, 0, gctx->proto);
+ g_seqstate_init(&gctx->seqstate, gctx->seq_recv, 0, 0, gctx->proto);
*context_handle_out = (gss_ctx_id_t)gctx;
gctx = NULL;
return GSS_S_COMPLETE;
ctx = (krb5_gss_ctx_id_t)*context_handle;
- g_order_free(&ctx->seqstate);
+ g_seqstate_free(ctx->seqstate);
krb5_k_free_key(NULL, ctx->enc);
krb5_k_free_key(NULL, ctx->seq);
krb5_k_free_key(NULL, ctx->subkey);