#include "context.h"
int
-serialize_context_for_kernel(gss_ctx_id_t ctx,
+serialize_context_for_kernel(gss_ctx_id_t *ctx,
gss_buffer_desc *buf,
gss_OID mech)
{
const krb5_data *in_constant);
#endif
-int serialize_context_for_kernel(gss_ctx_id_t ctx, gss_buffer_desc *buf,
+int serialize_context_for_kernel(gss_ctx_id_t *ctx, gss_buffer_desc *buf,
gss_OID mech);
-int serialize_spkm3_ctx(gss_ctx_id_t ctx, gss_buffer_desc *buf);
-int serialize_krb5_ctx(gss_ctx_id_t ctx, gss_buffer_desc *buf);
+int serialize_spkm3_ctx(gss_ctx_id_t *ctx, gss_buffer_desc *buf);
+int serialize_krb5_ctx(gss_ctx_id_t *ctx, gss_buffer_desc *buf);
#endif /* _CONTEXT_H_ */
*/
int
-serialize_krb5_ctx(gss_ctx_id_t ctx, gss_buffer_desc *buf)
+serialize_krb5_ctx(gss_ctx_id_t *ctx, gss_buffer_desc *buf)
{
char *p, *end;
/* initiate: 1 => initiating 0 => accepting */
- if (ctx->more_flags & LOCAL) {
+ if ((*ctx)->more_flags & LOCAL) {
if (WRITE_BYTES(&p, end, constant_one)) goto out_err;
}
else {
if (WRITE_BYTES(&p, end, algorithm)) goto out_err;
/* endtime */
- if (WRITE_BYTES(&p, end, ctx->lifetime)) goto out_err;
+ if (WRITE_BYTES(&p, end, (*ctx)->lifetime)) goto out_err;
/* seq_send */
- if (WRITE_BYTES(&p, end, ctx->auth_context->local_seqnumber))
+ if (WRITE_BYTES(&p, end, (*ctx)->auth_context->local_seqnumber))
goto out_err;
/* mech_used */
if (write_buffer(&p, end, (gss_buffer_desc*)&krb5oid)) goto out_err;
/* enc: derive the encryption key and copy it into buffer */
- if (write_heimdal_enc_key(&p, end, ctx)) goto out_err;
+ if (write_heimdal_enc_key(&p, end, *ctx)) goto out_err;
/* seq: get the sequence number key and copy it into buffer */
- if (write_heimdal_seq_key(&p, end, ctx)) goto out_err;
+ if (write_heimdal_seq_key(&p, end, *ctx)) goto out_err;
buf->length = p - (char *)buf->value;
printerr(2, "serialize_krb5_ctx: returning buffer "
return -1;
}
int
-serialize_krb5_ctx(gss_ctx_id_t ctx, gss_buffer_desc *buf)
+serialize_krb5_ctx(gss_ctx_id_t *ctx, gss_buffer_desc *buf)
{
OM_uint32 maj_stat, min_stat;
void *return_ctx = 0;
int retcode = 0;
printerr(3, "lucid version!\n");
- maj_stat = gss_krb5_export_lucid_sec_context(&min_stat, &ctx,
+ maj_stat = gss_krb5_export_lucid_sec_context(&min_stat, ctx,
1, &return_ctx);
if (maj_stat != GSS_S_COMPLETE) {
pgsserr("gss_krb5_export_lucid_sec_context",
} gss_union_ctx_id_desc, *gss_union_ctx_id_t;
int
-serialize_krb5_ctx(gss_ctx_id_t ctx, gss_buffer_desc *buf)
+serialize_krb5_ctx(gss_ctx_id_t *ctx, gss_buffer_desc *buf)
{
- krb5_gss_ctx_id_t kctx = ((gss_union_ctx_id_t)ctx)->internal_ctx_id;
+ krb5_gss_ctx_id_t kctx = ((gss_union_ctx_id_t)*ctx)->internal_ctx_id;
char *p, *end;
static int constant_zero = 0;
static int constant_one = 1;
* and only export those fields to the kernel.
*/
int
-serialize_spkm3_ctx(gss_ctx_id_t ctx, gss_buffer_desc *buf)
+serialize_spkm3_ctx(gss_ctx_id_t *ctx, gss_buffer_desc *buf)
{
OM_uint32 vers, ret, maj_stat, min_stat;
void *ret_ctx = 0;
printerr(1, "serialize_spkm3_ctx called\n");
printerr(2, "DEBUG: serialize_spkm3_ctx: lucid version!\n");
- maj_stat = gss_export_lucid_sec_context(&min_stat, &ctx, 1, &ret_ctx);
+ maj_stat = gss_export_lucid_sec_context(&min_stat, ctx, 1, &ret_ctx);
if (maj_stat != GSS_S_COMPLETE)
goto out_err;
}
ret = prepare_spkm3_ctx_buffer(lctx, buf);
- maj_stat = gss_free_lucid_sec_context(&min_stat, ctx, ret_ctx);
+ maj_stat = gss_free_lucid_sec_context(&min_stat, *ctx, ret_ctx);
if (maj_stat != GSS_S_COMPLETE)
printerr(0, "WARN: failed to free lucid sec context\n");
goto out;
}
- rc = serialize_context_for_kernel(lnd.lnd_ctx, &lnd.lnd_ctx_token,
+ rc = serialize_context_for_kernel(&lnd.lnd_ctx, &lnd.lnd_ctx_token,
lnd.lnd_mech);
if (rc) {
logmsg(LL_ERR, "key %08x: failed to export context\n", keyid);
/* kernel needs ctx to calculate verifier on null response, so
* must give it context before doing null call: */
- if (serialize_context_for_kernel(snd->ctx, &snd->ctx_token, mech)) {
+ if (serialize_context_for_kernel(&snd->ctx, &snd->ctx_token, mech)) {
printerr(LL_ERR,
"ERROR: %s: serialize_context_for_kernel failed\n",
__func__);
snd->maj_stat = GSS_S_FAILURE;
goto out_err;
}
- /* We no longer need the gss context */
- gss_delete_sec_context(&ignore_min_stat, &snd->ctx, &ignore_out_tok);
+
+ /* heimdal/MIT implementations do not delete context at all */
+ if (snd->ctx != GSS_C_NO_CONTEXT)
+ gss_delete_sec_context(&ignore_min_stat, &snd->ctx,
+ &ignore_out_tok);
+
do_svc_downcall(&snd->out_handle, &cred, mech, &snd->ctx_token);
/* We no longer need the context token */
if (snd->ctx_token.value) {