003 File Manager
Current Path:
/usr/src/crypto/heimdal/lib/gssapi/krb5
usr
/
src
/
crypto
/
heimdal
/
lib
/
gssapi
/
krb5
/
📁
..
📄
8003.c
(6.95 KB)
📄
accept_sec_context.c
(22.47 KB)
📄
acquire_cred.c
(11.82 KB)
📄
add_cred.c
(6.41 KB)
📄
address_to_krb5addr.c
(2.66 KB)
📄
aeap.c
(3.22 KB)
📄
arcfour.c
(19.75 KB)
📄
authorize_localname.c
(2.43 KB)
📄
canonicalize_name.c
(2.14 KB)
📄
ccache_name.c
(2.38 KB)
📄
cfx.c
(44.56 KB)
📄
cfx.h
(2.25 KB)
📄
compare_name.c
(2.13 KB)
📄
compat.c
(3.48 KB)
📄
context_time.c
(2.89 KB)
📄
copy_ccache.c
(4.89 KB)
📄
creds.c
(6.13 KB)
📄
decapsulate.c
(4.99 KB)
📄
delete_sec_context.c
(2.93 KB)
📄
display_name.c
(2.66 KB)
📄
display_status.c
(5.5 KB)
📄
duplicate_name.c
(2.19 KB)
📄
encapsulate.c
(4.05 KB)
📄
export_name.c
(3.06 KB)
📄
export_sec_context.c
(6.14 KB)
📄
external.c
(9.96 KB)
📄
get_mic.c
(9.22 KB)
📄
gkrb5_err.et
(1.2 KB)
📄
gsskrb5-private.h
(18.57 KB)
📄
gsskrb5_locl.h
(3.83 KB)
📄
import_name.c
(6.97 KB)
📄
import_sec_context.c
(6.3 KB)
📄
indicate_mechs.c
(2.08 KB)
📄
init.c
(2.53 KB)
📄
init_sec_context.c
(24.16 KB)
📄
inquire_context.c
(3.18 KB)
📄
inquire_cred.c
(5.15 KB)
📄
inquire_cred_by_mech.c
(2.5 KB)
📄
inquire_cred_by_oid.c
(2.65 KB)
📄
inquire_mechs_for_name.c
(2.08 KB)
📄
inquire_names_for_mech.c
(2.57 KB)
📄
inquire_sec_context_by_oid.c
(15.54 KB)
📄
pname_to_uid.c
(2.75 KB)
📄
prf.c
(4.4 KB)
📄
process_context_token.c
(2.39 KB)
📄
release_buffer.c
(1.87 KB)
📄
release_cred.c
(2.69 KB)
📄
release_name.c
(2.01 KB)
📄
sequence.c
(6.91 KB)
📄
set_cred_option.c
(6 KB)
📄
set_sec_context_option.c
(6.75 KB)
📄
store_cred.c
(3.64 KB)
📄
test_cfx.c
(4.6 KB)
📄
ticket_flags.c
(2.15 KB)
📄
unwrap.c
(12.17 KB)
📄
verify_mic.c
(9.66 KB)
📄
wrap.c
(16.08 KB)
Editing: set_sec_context_option.c
/* * Copyright (c) 2004, PADL Software Pty Ltd. * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * * 3. Neither the name of PADL Software nor the names of its contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY PADL SOFTWARE AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL PADL SOFTWARE OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */ /* * glue routine for _gsskrb5_inquire_sec_context_by_oid */ #include "gsskrb5_locl.h" static OM_uint32 get_bool(OM_uint32 *minor_status, const gss_buffer_t value, int *flag) { if (value->value == NULL || value->length != 1) { *minor_status = EINVAL; return GSS_S_FAILURE; } *flag = *((const char *)value->value) != 0; return GSS_S_COMPLETE; } static OM_uint32 get_string(OM_uint32 *minor_status, const gss_buffer_t value, char **str) { if (value == NULL || value->length == 0) { *str = NULL; } else { *str = malloc(value->length + 1); if (*str == NULL) { *minor_status = 0; return GSS_S_UNAVAILABLE; } memcpy(*str, value->value, value->length); (*str)[value->length] = '\0'; } return GSS_S_COMPLETE; } static OM_uint32 get_int32(OM_uint32 *minor_status, const gss_buffer_t value, OM_uint32 *ret) { *minor_status = 0; if (value == NULL || value->length == 0) *ret = 0; else if (value->length == sizeof(*ret)) memcpy(ret, value->value, sizeof(*ret)); else return GSS_S_UNAVAILABLE; return GSS_S_COMPLETE; } static OM_uint32 set_int32(OM_uint32 *minor_status, const gss_buffer_t value, OM_uint32 set) { *minor_status = 0; if (value->length == sizeof(set)) memcpy(value->value, &set, sizeof(set)); else return GSS_S_UNAVAILABLE; return GSS_S_COMPLETE; } OM_uint32 GSSAPI_CALLCONV _gsskrb5_set_sec_context_option (OM_uint32 *minor_status, gss_ctx_id_t *context_handle, const gss_OID desired_object, const gss_buffer_t value) { krb5_context context; OM_uint32 maj_stat; GSSAPI_KRB5_INIT (&context); if (value == GSS_C_NO_BUFFER) { *minor_status = EINVAL; return GSS_S_FAILURE; } if (gss_oid_equal(desired_object, GSS_KRB5_COMPAT_DES3_MIC_X)) { gsskrb5_ctx ctx; int flag; if (*context_handle == GSS_C_NO_CONTEXT) { *minor_status = EINVAL; return GSS_S_NO_CONTEXT; } maj_stat = get_bool(minor_status, value, &flag); if (maj_stat != GSS_S_COMPLETE) return maj_stat; ctx = (gsskrb5_ctx)*context_handle; HEIMDAL_MUTEX_lock(&ctx->ctx_id_mutex); if (flag) ctx->more_flags |= COMPAT_OLD_DES3; else ctx->more_flags &= ~COMPAT_OLD_DES3; ctx->more_flags |= COMPAT_OLD_DES3_SELECTED; HEIMDAL_MUTEX_unlock(&ctx->ctx_id_mutex); return GSS_S_COMPLETE; } else if (gss_oid_equal(desired_object, GSS_KRB5_SET_DNS_CANONICALIZE_X)) { int flag; maj_stat = get_bool(minor_status, value, &flag); if (maj_stat != GSS_S_COMPLETE) return maj_stat; krb5_set_dns_canonicalize_hostname(context, flag); return GSS_S_COMPLETE; } else if (gss_oid_equal(desired_object, GSS_KRB5_REGISTER_ACCEPTOR_IDENTITY_X)) { char *str; maj_stat = get_string(minor_status, value, &str); if (maj_stat != GSS_S_COMPLETE) return maj_stat; maj_stat = _gsskrb5_register_acceptor_identity(minor_status, str); free(str); return maj_stat; } else if (gss_oid_equal(desired_object, GSS_KRB5_SET_DEFAULT_REALM_X)) { char *str; maj_stat = get_string(minor_status, value, &str); if (maj_stat != GSS_S_COMPLETE) return maj_stat; if (str == NULL) { *minor_status = 0; return GSS_S_CALL_INACCESSIBLE_READ; } krb5_set_default_realm(context, str); free(str); *minor_status = 0; return GSS_S_COMPLETE; } else if (gss_oid_equal(desired_object, GSS_KRB5_SEND_TO_KDC_X)) { if (value == NULL || value->length == 0) { krb5_set_send_to_kdc_func(context, NULL, NULL); } else { struct gsskrb5_send_to_kdc c; if (value->length != sizeof(c)) { *minor_status = EINVAL; return GSS_S_FAILURE; } memcpy(&c, value->value, sizeof(c)); krb5_set_send_to_kdc_func(context, (krb5_send_to_kdc_func)c.func, c.ptr); } *minor_status = 0; return GSS_S_COMPLETE; } else if (gss_oid_equal(desired_object, GSS_KRB5_CCACHE_NAME_X)) { char *str; maj_stat = get_string(minor_status, value, &str); if (maj_stat != GSS_S_COMPLETE) return maj_stat; if (str == NULL) { *minor_status = 0; return GSS_S_CALL_INACCESSIBLE_READ; } *minor_status = krb5_cc_set_default_name(context, str); free(str); if (*minor_status) return GSS_S_FAILURE; return GSS_S_COMPLETE; } else if (gss_oid_equal(desired_object, GSS_KRB5_SET_TIME_OFFSET_X)) { OM_uint32 offset; time_t t; maj_stat = get_int32(minor_status, value, &offset); if (maj_stat != GSS_S_COMPLETE) return maj_stat; t = time(NULL) + offset; krb5_set_real_time(context, t, 0); *minor_status = 0; return GSS_S_COMPLETE; } else if (gss_oid_equal(desired_object, GSS_KRB5_GET_TIME_OFFSET_X)) { krb5_timestamp sec; int32_t usec; time_t t; t = time(NULL); krb5_us_timeofday (context, &sec, &usec); maj_stat = set_int32(minor_status, value, sec - t); if (maj_stat != GSS_S_COMPLETE) return maj_stat; *minor_status = 0; return GSS_S_COMPLETE; } else if (gss_oid_equal(desired_object, GSS_KRB5_PLUGIN_REGISTER_X)) { struct gsskrb5_krb5_plugin c; if (value->length != sizeof(c)) { *minor_status = EINVAL; return GSS_S_FAILURE; } memcpy(&c, value->value, sizeof(c)); krb5_plugin_register(context, c.type, c.name, c.symbol); *minor_status = 0; return GSS_S_COMPLETE; } *minor_status = EINVAL; return GSS_S_FAILURE; }
Upload File
Create Folder