#include "gssapiP_krb5.h"
#include "mglueP.h"
#ifdef _KERNEL
OM_uint32
krb5_gss_internal_release_oid(minor_status, oid)
OM_uint32 *minor_status;
gss_OID *oid;
{
if ((*oid != gss_mech_krb5) &&
(*oid != gss_mech_krb5_old) &&
(*oid != gss_mech_krb5_wrong) &&
(*oid != gss_nt_krb5_name) &&
(*oid != gss_nt_krb5_principal)) {
return(GSS_S_CONTINUE_NEEDED);
}
else {
*oid = GSS_C_NO_OID;
*minor_status = 0;
return(GSS_S_COMPLETE);
}
}
OM_uint32
generic_gss_release_oid(minor_status, oid)
OM_uint32 *minor_status;
gss_OID *oid;
{
if (minor_status)
*minor_status = 0;
if (*oid == GSS_C_NO_OID)
return(GSS_S_COMPLETE);
if ((*oid != GSS_C_NT_USER_NAME) &&
(*oid != GSS_C_NT_MACHINE_UID_NAME) &&
(*oid != GSS_C_NT_STRING_UID_NAME) &&
(*oid != GSS_C_NT_HOSTBASED_SERVICE) &&
(*oid != GSS_C_NT_ANONYMOUS) &&
(*oid != GSS_C_NT_EXPORT_NAME) &&
(*oid != gss_nt_service_name)) {
FREE((*oid)->elements, (*oid)->length);
FREE(*oid, sizeof(gss_OID_desc));
}
*oid = GSS_C_NO_OID;
return(GSS_S_COMPLETE);
}
OM_uint32
krb5_gss_release_oid(minor_status, oid)
OM_uint32 *minor_status;
gss_OID *oid;
{
if (krb5_gss_internal_release_oid(minor_status, oid) != GSS_S_COMPLETE) {
return(generic_gss_release_oid(minor_status, oid));
}
else {
*oid = GSS_C_NO_OID;
*minor_status = 0;
return(GSS_S_COMPLETE);
}
}
#endif
OM_uint32
krb5_gss_delete_sec_context(minor_status,
context_handle,
output_token
#ifdef _KERNEL
, gssd_ctx_verifier
#endif
)
OM_uint32 *minor_status;
gss_ctx_id_t *context_handle;
gss_buffer_t output_token;
#ifdef _KERNEL
OM_uint32 gssd_ctx_verifier;
#endif
{
krb5_context context;
krb5_gss_ctx_id_rec *ctx;
if (output_token) {
output_token->length = 0;
output_token->value = NULL;
}
if (*context_handle == GSS_C_NO_CONTEXT) {
*minor_status = 0;
return(GSS_S_COMPLETE);
}
if (! kg_validate_ctx_id(*context_handle)) {
*minor_status = (OM_uint32) G_VALIDATE_FAILED;
return(GSS_S_NO_CONTEXT);
}
ctx = (krb5_gss_ctx_id_t) *context_handle;
context = ctx->k5_context;
if (output_token) {
OM_uint32 major;
gss_buffer_desc empty;
empty.length = 0; empty.value = NULL;
if ((major = kg_seal(minor_status, *context_handle, 0,
GSS_C_QOP_DEFAULT,
&empty, NULL, output_token, KG_TOK_DEL_CTX))) {
save_error_info(*minor_status, context);
return(major);
}
}
(void)kg_delete_ctx_id(*context_handle);
if (ctx->seqstate)
g_order_free(&(ctx->seqstate));
if (ctx->enc)
krb5_free_keyblock(context, ctx->enc);
if (ctx->seq)
krb5_free_keyblock(context, ctx->seq);
if (ctx->here)
krb5_free_principal(context, ctx->here);
if (ctx->there)
krb5_free_principal(context, ctx->there);
if (ctx->subkey)
krb5_free_keyblock(context, ctx->subkey);
if (ctx->acceptor_subkey)
krb5_free_keyblock(context, ctx->acceptor_subkey);
#ifndef _KERNEL
if (ctx->auth_context) {
if (ctx->cred_rcache)
(void)krb5_auth_con_setrcache(context, ctx->auth_context, NULL);
krb5_auth_con_free(context, ctx->auth_context);
}
#endif
if (ctx->mech_used)
(void) KGSS_RELEASE_OID(minor_status, &ctx->mech_used);
if (ctx->authdata)
krb5_free_authdata(context, ctx->authdata);
if (ctx->k5_context)
krb5_free_context(ctx->k5_context);
(void) memset(ctx, 0, sizeof(*ctx));
xfree_wrap(ctx, sizeof (krb5_gss_ctx_id_rec));
*context_handle = GSS_C_NO_CONTEXT;
*minor_status = 0;
return(GSS_S_COMPLETE);
}