-/* $OpenBSD: gss-serv.c,v 1.2 2003/08/31 13:30:18 markus Exp $ */
+/* $OpenBSD: gss-serv.c,v 1.5 2003/11/17 11:06:07 markus Exp $ */
/*
* Copyright (c) 2001-2003 Simon Wilkinson. All rights reserved.
char *tok;
OM_uint32 offset;
OM_uint32 oidl;
-
+
tok=ename->value;
-
- /*
- * Check that ename is long enough for all of the fixed length
+
+ /*
+ * Check that ename is long enough for all of the fixed length
* header, and that the initial ID bytes are correct
*/
- if (ename->length<6 || memcmp(tok,"\x04\x01", 2)!=0)
+ if (ename->length<6 || memcmp(tok,"\x04\x01", 2)!=0)
return GSS_S_FAILURE;
/*
* string is long enough and that the OID matches that in our context
*/
if (tok[4] != 0x06 || tok[5] != oidl ||
- ename->length < oidl+6 ||
+ ename->length < oidl+6 ||
!ssh_gssapi_check_oid(ctx,tok+6,oidl))
return GSS_S_FAILURE;
offset = oidl+6;
-
+
if (ename->length < offset+4)
return GSS_S_FAILURE;
-
+
name->length = GET_32BIT(tok+offset);
offset += 4;
-
+
if (ename->length < offset+name->length)
- return GSS_S_FAILURE;
-
+ return GSS_S_FAILURE;
+
name->value = xmalloc(name->length+1);
memcpy(name->value,tok+offset,name->length);
((char *)name->value)[name->length] = 0;
return GSS_S_COMPLETE;
-}
+}
/* Extract the client details from a given context. This can only reliably
* be called once for a context */
int i = 0;
gss_buffer_desc ename;
-
+
client->mech = NULL;
while (supported_mechs[i]->name != NULL) {
i++;
}
- if (client->mech == NULL)
+ if (client->mech == NULL)
return GSS_S_FAILURE;
-
- if ((ctx->major = gss_display_name(&ctx->minor, ctx->client,
+
+ if ((ctx->major = gss_display_name(&ctx->minor, ctx->client,
&client->displayname, NULL))) {
- ssh_gssapi_error(ctx);
- return (ctx->major);
+ ssh_gssapi_error(ctx);
+ return (ctx->major);
}
-
- if ((ctx->major = gss_export_name(&ctx->minor, ctx->client,
+
+ if ((ctx->major = gss_export_name(&ctx->minor, ctx->client,
&ename))) {
ssh_gssapi_error(ctx);
return (ctx->major);
}
-
+
if ((ctx->major = ssh_gssapi_parse_ename(ctx,&ename,
&client->exportedname))) {
return (ctx->major);
return (ctx->major);
}
-/* As user - called through fatal cleanup hook */
+/* As user - called on fatal/exit */
void
-ssh_gssapi_cleanup_creds(void *ignored)
+ssh_gssapi_cleanup_creds(void)
{
if (gssapi_client.store.filename != NULL) {
/* Unlink probably isn't sufficient */
{
if (gssapi_client.mech && gssapi_client.mech->storecreds) {
(*gssapi_client.mech->storecreds)(&gssapi_client);
- if (options.gss_cleanup_creds)
- fatal_add_cleanup(ssh_gssapi_cleanup_creds, NULL);
} else
debug("ssh_gssapi_storecreds: Not a GSSAPI mechanism");
}
return (0);
}
+/* Priviledged */
+OM_uint32
+ssh_gssapi_checkmic(Gssctxt *ctx, gss_buffer_t gssbuf, gss_buffer_t gssmic)
+{
+ ctx->major = gss_verify_mic(&ctx->minor, ctx->context,
+ gssbuf, gssmic, NULL);
+
+ return (ctx->major);
+}
+
#endif