#include "gssapiP_krb5.h"
#include "gssapi_krb5.h"
static void
free_external_lucid_ctx_v1(
gss_krb5_lucid_context_v1_t *ctx);
static void
free_lucid_key_data(
gss_krb5_lucid_key_t *key);
static krb5_error_code
copy_keyblock_to_lucid_key(
krb5_keyblock *k5key,
gss_krb5_lucid_key_t *lkey);
static krb5_error_code
make_external_lucid_ctx_v1(
krb5_gss_ctx_id_rec * gctx,
unsigned int version,
void **out_ptr);
static krb5_error_code
apple_make_external_authdata_if_relevant(
krb5_gss_ctx_id_rec * gctx,
unsigned int version,
void **out_ptr);
static krb5_error_code
apple_copy_authdata_if_relevant_to_authdata_if_relevant_key(
krb5_authdata *k5data,
apple_gss_krb5_authdata_if_relevant **ldata);
static void
apple_gss_free_authdata_if_relevant(apple_gss_krb5_authdata_if_relevant *key);
OM_uint32 KRB5_CALLCONV
gss_krb5int_export_lucid_sec_context(
OM_uint32 *minor_status,
gss_ctx_id_t *context_handle,
OM_uint32 version,
void **kctx)
{
krb5_error_code kret = 0;
OM_uint32 retval;
krb5_gss_ctx_id_t ctx;
void *lctx = NULL;
retval = GSS_S_FAILURE;
*minor_status = 0;
if (kctx)
*kctx = NULL;
else {
kret = EINVAL;
goto error_out;
}
if (!kg_validate_ctx_id(*context_handle)) {
kret = (OM_uint32) G_VALIDATE_FAILED;
retval = GSS_S_NO_CONTEXT;
goto error_out;
}
ctx = (krb5_gss_ctx_id_t) *context_handle;
switch (version) {
case 1:
kret = make_external_lucid_ctx_v1((krb5_pointer)ctx,
version, &lctx);
break;
default:
kret = (OM_uint32) KG_LUCID_VERSION;
break;
}
if (kret)
goto error_out;
if (! kg_save_lucidctx_id((void *)lctx)) {
kret = G_VALIDATE_FAILED;
goto error_out;
}
*kctx = lctx;
*minor_status = 0;
retval = GSS_S_COMPLETE;
(void)krb5_gss_delete_sec_context(minor_status, context_handle, NULL);
*context_handle = GSS_C_NO_CONTEXT;
return (retval);
error_out:
if (*minor_status == 0)
*minor_status = (OM_uint32) kret;
return(retval);
}
OM_uint32 KRB5_CALLCONV
apple_gss_krb5int_export_authdata_if_relevant_context(
OM_uint32 *minor_status,
gss_ctx_id_t *context_handle,
OM_uint32 version,
void **kctx)
{
krb5_error_code kret = 0;
OM_uint32 retval;
krb5_gss_ctx_id_t ctx;
void *lctx = NULL;
retval = GSS_S_FAILURE;
*minor_status = 0;
if (kctx)
*kctx = NULL;
else {
kret = EINVAL;
goto error_out;
}
if (!kg_validate_ctx_id(*context_handle)) {
kret = (OM_uint32) G_VALIDATE_FAILED;
retval = GSS_S_NO_CONTEXT;
goto error_out;
}
ctx = (krb5_gss_ctx_id_t) *context_handle;
if (kret)
goto error_out;
switch (version) {
case 1:
kret = apple_make_external_authdata_if_relevant((krb5_pointer)ctx,
version, &lctx);
break;
default:
kret = (OM_uint32) APPLE_KG_AUTHDATA_VERSION;
break;
}
if (kret)
goto error_out;
if (! kg_save_lucidctx_id((void *)lctx)) {
kret = G_VALIDATE_FAILED;
goto error_out;
}
*kctx = lctx;
*minor_status = 0;
retval = GSS_S_COMPLETE;
return (retval);
error_out:
if (*minor_status == 0)
*minor_status = (OM_uint32) kret;
if(kret == ENODATA)
retval = GSS_S_COMPLETE;
return(retval);
}
OM_uint32 KRB5_CALLCONV
apple_gss_krb5_free_authdata_if_relevant(
OM_uint32 *minor_status,
void *kctx)
{
OM_uint32 retval;
krb5_error_code kret = 0;
retval = GSS_S_FAILURE;
*minor_status = 0;
if (!kctx) {
kret = EINVAL;
goto error_out;
}
if (! kg_validate_lucidctx_id(kctx)) {
kret = G_VALIDATE_FAILED;
goto error_out;
}
apple_gss_free_authdata_if_relevant((apple_gss_krb5_authdata_if_relevant*)kctx);
(void)kg_delete_lucidctx_id(kctx);
*minor_status = 0;
retval = GSS_S_COMPLETE;
return (retval);
error_out:
if (*minor_status == 0)
*minor_status = (OM_uint32) kret;
return(retval);
}
OM_uint32 KRB5_CALLCONV
gss_krb5_free_lucid_sec_context(
OM_uint32 *minor_status,
void *kctx)
{
OM_uint32 retval;
krb5_error_code kret = 0;
int version;
retval = GSS_S_FAILURE;
*minor_status = 0;
if (!kctx) {
kret = EINVAL;
goto error_out;
}
if (! kg_validate_lucidctx_id(kctx)) {
kret = G_VALIDATE_FAILED;
goto error_out;
}
version = ((gss_krb5_lucid_context_version_t *)kctx)->version;
switch (version) {
case 1:
(void)kg_delete_lucidctx_id(kctx);
free_external_lucid_ctx_v1((gss_krb5_lucid_context_v1_t*) kctx);
break;
default:
kret = EINVAL;
break;
}
if (kret)
goto error_out;
*minor_status = 0;
retval = GSS_S_COMPLETE;
return (retval);
error_out:
if (*minor_status == 0)
*minor_status = (OM_uint32) kret;
return(retval);
}
static krb5_error_code
make_external_lucid_ctx_v1(
krb5_gss_ctx_id_rec * gctx,
unsigned int version,
void **out_ptr)
{
gss_krb5_lucid_context_v1_t *lctx = NULL;
unsigned int bufsize = sizeof(gss_krb5_lucid_context_v1_t);
krb5_error_code retval;
if ((lctx = xmalloc(bufsize)) == NULL) {
retval = ENOMEM;
goto error_out;
}
memset(lctx, 0, bufsize);
lctx->version = 1;
lctx->initiate = gctx->initiate ? 1 : 0;
lctx->endtime = gctx->endtime;
lctx->send_seq = gctx->seq_send;
lctx->recv_seq = gctx->seq_recv;
lctx->protocol = gctx->proto;
if (gctx->proto == 0) {
lctx->rfc1964_kd.sign_alg = gctx->signalg;
lctx->rfc1964_kd.seal_alg = gctx->sealalg;
if ((retval = copy_keyblock_to_lucid_key(gctx->subkey,
&lctx->rfc1964_kd.ctx_key)))
goto error_out;
}
else if (gctx->proto == 1) {
if ((retval = copy_keyblock_to_lucid_key(gctx->subkey,
&lctx->cfx_kd.ctx_key)))
goto error_out;
if (gctx->have_acceptor_subkey) {
if ((retval = copy_keyblock_to_lucid_key(gctx->acceptor_subkey,
&lctx->cfx_kd.acceptor_subkey)))
goto error_out;
lctx->cfx_kd.have_acceptor_subkey = 1;
}
}
else {
return EINVAL;
}
*out_ptr = lctx;
return 0;
error_out:
if (lctx) {
free_external_lucid_ctx_v1(lctx);
}
return retval;
}
static krb5_error_code
apple_make_external_authdata_if_relevant(
krb5_gss_ctx_id_rec * gctx,
unsigned int version,
void **out_ptr)
{
apple_gss_krb5_authdata_if_relevant *lctx = NULL;
krb5_error_code retval;
if((gctx->apple_authdata_if_relevant != NULL) && (*(gctx->apple_authdata_if_relevant) != NULL)) {
if((retval = apple_copy_authdata_if_relevant_to_authdata_if_relevant_key(*(gctx->apple_authdata_if_relevant),&lctx)))
goto error_out;
}
else {
retval = ENODATA;
goto error_out;
}
*out_ptr = lctx;
return 0;
error_out:
if (lctx != NULL) {
apple_gss_free_authdata_if_relevant(lctx);
}
return retval;
}
static krb5_error_code
apple_copy_authdata_if_relevant_to_authdata_if_relevant_key(
krb5_authdata *k5data,
apple_gss_krb5_authdata_if_relevant **ldata)
{
if(*ldata != NULL) {
apple_gss_free_authdata_if_relevant(*ldata);
*ldata = NULL;
}
if (!k5data || !k5data->contents || k5data->length == 0)
return ENODATA;
unsigned int bufsize = sizeof(apple_gss_krb5_authdata_if_relevant);
apple_gss_krb5_authdata_if_relevant *authdataptr = NULL;
if ((authdataptr = xmalloc(bufsize)) == NULL) {
return ENOMEM;
}
memset(authdataptr, 0, sizeof(apple_gss_krb5_authdata_if_relevant));
if ((authdataptr->data = xmalloc(k5data->length)) == NULL) {
return ENOMEM;
}
memcpy(authdataptr->data,k5data->contents,k5data->length);
authdataptr->type = k5data->ad_type;
authdataptr->length = k5data->length;
*ldata = authdataptr;
return 0;
}
static krb5_error_code
copy_keyblock_to_lucid_key(
krb5_keyblock *k5key,
gss_krb5_lucid_key_t *lkey)
{
if (!k5key || !k5key->contents || k5key->length == 0)
return EINVAL;
memset(lkey, 0, sizeof(gss_krb5_lucid_key_t));
if ((lkey->data = xmalloc(k5key->length)) == NULL) {
return ENOMEM;
}
memcpy(lkey->data, k5key->contents, k5key->length);
lkey->length = k5key->length;
lkey->type = k5key->enctype;
return 0;
}
static void
free_lucid_key_data(
gss_krb5_lucid_key_t *key)
{
if (key) {
if (key->data && key->length) {
memset(key->data, 0, key->length);
xfree(key->data);
memset(key, 0, sizeof(gss_krb5_lucid_key_t));
}
}
}
static void
free_external_lucid_ctx_v1(
gss_krb5_lucid_context_v1_t *ctx)
{
if (ctx) {
if (ctx->protocol == 0) {
free_lucid_key_data(&ctx->rfc1964_kd.ctx_key);
}
if (ctx->protocol == 1) {
free_lucid_key_data(&ctx->cfx_kd.ctx_key);
if (ctx->cfx_kd.have_acceptor_subkey)
free_lucid_key_data(&ctx->cfx_kd.acceptor_subkey);
}
xfree(ctx);
ctx = NULL;
}
}
static void
apple_gss_free_authdata_if_relevant(apple_gss_krb5_authdata_if_relevant *key)
{
if (key!= NULL) {
if ((key->data!= NULL) && (key->length > 0)) {
memset(key->data, 0, key->length);
memset(key, 0, sizeof(apple_gss_krb5_authdata_if_relevant));
}
if(key->data != NULL)
xfree(key->data);
}
}