003 File Manager
Current Path:
/usr/src/crypto/heimdal/lib/gssapi/mech
usr
/
src
/
crypto
/
heimdal
/
lib
/
gssapi
/
mech
/
📁
..
📄
compat.h
(4.07 KB)
📄
context.c
(3.66 KB)
📄
context.h
(1.66 KB)
📄
cred.h
(2.24 KB)
📄
doxygen.c
(4.18 KB)
📄
gss_accept_sec_context.c
(8.26 KB)
📄
gss_acquire_cred.c
(4.57 KB)
📄
gss_acquire_cred_ext.c
(5.34 KB)
📄
gss_acquire_cred_with_password.c
(3.69 KB)
📄
gss_add_cred.c
(5.45 KB)
📄
gss_add_cred_with_password.c
(4.7 KB)
📄
gss_add_oid_set_member.c
(2.89 KB)
📄
gss_aeap.c
(5.54 KB)
📄
gss_authorize_localname.c
(5.97 KB)
📄
gss_buffer_set.c
(3.48 KB)
📄
gss_canonicalize_name.c
(3.66 KB)
📄
gss_compare_name.c
(2.68 KB)
📄
gss_context_time.c
(1.76 KB)
📄
gss_create_empty_oid_set.c
(1.82 KB)
📄
gss_cred.c
(5.37 KB)
📄
gss_decapsulate_token.c
(2.49 KB)
📄
gss_delete_name_attribute.c
(2.47 KB)
📄
gss_delete_sec_context.c
(2.07 KB)
📄
gss_display_name.c
(2.8 KB)
📄
gss_display_name_ext.c
(2.58 KB)
📄
gss_display_status.c
(6.7 KB)
📄
gss_duplicate_name.c
(3.14 KB)
📄
gss_duplicate_oid.c
(2.37 KB)
📄
gss_encapsulate_token.c
(2.39 KB)
📄
gss_export_name.c
(2.04 KB)
📄
gss_export_name_composite.c
(2.53 KB)
📄
gss_export_sec_context.c
(2.82 KB)
📄
gss_get_mic.c
(1.96 KB)
📄
gss_get_name_attribute.c
(3.04 KB)
📄
gss_import_name.c
(6.92 KB)
📄
gss_import_sec_context.c
(2.68 KB)
📄
gss_indicate_mechs.c
(2.28 KB)
📄
gss_init_sec_context.c
(6.55 KB)
📄
gss_inquire_context.c
(3.14 KB)
📄
gss_inquire_cred.c
(5.18 KB)
📄
gss_inquire_cred_by_mech.c
(2.94 KB)
📄
gss_inquire_cred_by_oid.c
(2.83 KB)
📄
gss_inquire_mechs_for_name.c
(2.68 KB)
📄
gss_inquire_name.c
(2.89 KB)
📄
gss_inquire_names_for_mech.c
(2.55 KB)
📄
gss_inquire_sec_context_by_oid.c
(2.5 KB)
📄
gss_krb5.c
(21.41 KB)
📄
gss_mech_switch.c
(10.37 KB)
📄
gss_mo.c
(17.84 KB)
📄
gss_names.c
(3.09 KB)
📄
gss_oid.c
(14.92 KB)
📄
gss_oid_equal.c
(2.2 KB)
📄
gss_oid_to_str.c
(2.97 KB)
📄
gss_pname_to_uid.c
(5.65 KB)
📄
gss_process_context_token.c
(1.81 KB)
📄
gss_pseudo_random.c
(2.43 KB)
📄
gss_release_buffer.c
(1.67 KB)
📄
gss_release_cred.c
(2.51 KB)
📄
gss_release_name.c
(2.54 KB)
📄
gss_release_oid.c
(2.01 KB)
📄
gss_release_oid_set.c
(1.71 KB)
📄
gss_seal.c
(1.82 KB)
📄
gss_set_cred_option.c
(3.37 KB)
📄
gss_set_name_attribute.c
(2.61 KB)
📄
gss_set_sec_context_option.c
(2.36 KB)
📄
gss_sign.c
(1.71 KB)
📄
gss_store_cred.c
(3.12 KB)
📄
gss_test_oid_set_member.c
(1.77 KB)
📄
gss_unseal.c
(1.8 KB)
📄
gss_unwrap.c
(1.91 KB)
📄
gss_utils.c
(2.39 KB)
📄
gss_verify.c
(1.75 KB)
📄
gss_verify_mic.c
(1.98 KB)
📄
gss_wrap.c
(2.68 KB)
📄
gss_wrap_size_limit.c
(2 KB)
📄
gssapi.asn1
(199 B)
📄
mech.5
(3.19 KB)
📄
mech.cat5
(2.34 KB)
📄
mech_locl.h
(2.36 KB)
📄
mech_switch.h
(1.79 KB)
📄
mechqueue.h
(3.41 KB)
📄
name.h
(2.05 KB)
📄
utils.h
(1.62 KB)
Editing: gss_authorize_localname.c
/* * Copyright (c) 2011, PADL Software Pty Ltd. * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * * 3. Neither the name of PADL Software nor the names of its contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY PADL SOFTWARE AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL PADL SOFTWARE OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */ #include "mech_locl.h" gss_buffer_desc GSSAPI_LIB_VARIABLE __gss_c_attr_local_login_user = { sizeof("local-login-user") - 1, "local-login-user" }; static OM_uint32 mech_authorize_localname(OM_uint32 *minor_status, const struct _gss_name *name, const struct _gss_name *user) { OM_uint32 major_status = GSS_S_NAME_NOT_MN; struct _gss_mechanism_name *mn; HEIM_SLIST_FOREACH(mn, &name->gn_mn, gmn_link) { gssapi_mech_interface m = mn->gmn_mech; if (m->gm_authorize_localname == NULL) { major_status = GSS_S_UNAVAILABLE; continue; } major_status = m->gm_authorize_localname(minor_status, mn->gmn_name, &user->gn_value, &user->gn_type); if (major_status != GSS_S_UNAUTHORIZED) break; } return major_status; } /* * Naming extensions based local login authorization. */ static OM_uint32 attr_authorize_localname(OM_uint32 *minor_status, const struct _gss_name *name, const struct _gss_name *user) { OM_uint32 major_status = GSS_S_UNAVAILABLE; int more = -1; if (!gss_oid_equal(&user->gn_type, GSS_C_NT_USER_NAME)) return GSS_S_BAD_NAMETYPE; while (more != 0 && major_status != GSS_S_COMPLETE) { OM_uint32 tmpMajor, tmpMinor; gss_buffer_desc value; gss_buffer_desc display_value; int authenticated = 0, complete = 0; tmpMajor = gss_get_name_attribute(minor_status, (gss_name_t)name, GSS_C_ATTR_LOCAL_LOGIN_USER, &authenticated, &complete, &value, &display_value, &more); if (GSS_ERROR(tmpMajor)) { major_status = tmpMajor; break; } /* If attribute is present, return an authoritative error code. */ if (authenticated && value.length == user->gn_value.length && memcmp(value.value, user->gn_value.value, user->gn_value.length) == 0) major_status = GSS_S_COMPLETE; else major_status = GSS_S_UNAUTHORIZED; gss_release_buffer(&tmpMinor, &value); gss_release_buffer(&tmpMinor, &display_value); } return major_status; } GSSAPI_LIB_FUNCTION OM_uint32 GSSAPI_LIB_CALL gss_authorize_localname(OM_uint32 *minor_status, const gss_name_t gss_name, const gss_name_t gss_user) { OM_uint32 major_status; const struct _gss_name *name = (const struct _gss_name *) gss_name; const struct _gss_name *user = (const struct _gss_name *) gss_user; int mechAvailable = 0; *minor_status = 0; if (gss_name == GSS_C_NO_NAME || gss_user == GSS_C_NO_NAME) return GSS_S_CALL_INACCESSIBLE_READ; /* * We should check that the user name is not a mechanism name, but * as Heimdal always calls the mechanism's gss_import_name(), it's * not possible to make this check. */ #if 0 if (HEIM_SLIST_FIRST(&user->gn_mn) != NULL) return GSS_S_BAD_NAME; #endif /* If mech returns yes, we return yes */ major_status = mech_authorize_localname(minor_status, name, user); if (major_status == GSS_S_COMPLETE) return GSS_S_COMPLETE; else if (major_status != GSS_S_UNAVAILABLE) mechAvailable = 1; /* If attribute exists, it is authoritative */ major_status = attr_authorize_localname(minor_status, name, user); if (major_status == GSS_S_COMPLETE || major_status == GSS_S_UNAUTHORIZED) return major_status; /* If mechanism did not implement SPI, compare the local name */ if (mechAvailable == 0) { int match = 0; major_status = gss_compare_name(minor_status, gss_name, gss_user, &match); if (major_status == GSS_S_COMPLETE && match == 0) major_status = GSS_S_UNAUTHORIZED; } return major_status; } GSSAPI_LIB_FUNCTION int GSSAPI_LIB_CALL gss_userok(const gss_name_t name, const char *user) { OM_uint32 major_status, minor_status; gss_buffer_desc userBuf; gss_name_t userName; userBuf.value = (void *)user; userBuf.length = strlen(user); major_status = gss_import_name(&minor_status, &userBuf, GSS_C_NT_USER_NAME, &userName); if (GSS_ERROR(major_status)) return 0; major_status = gss_authorize_localname(&minor_status, name, userName); gss_release_name(&minor_status, &userName); return (major_status == GSS_S_COMPLETE); }
Upload File
Create Folder