gss: fix import/export of accumulating contexts
gss_{import,export}_sec_context did not work with partially accumulating contexts, where the initial context token had not been completely accumulated, Further, in gss_import_sec_context(), ctx->gc_input.value was not allocated to a buffer sufficiently large to accumulate the target length.
This commit is contained in:
@@ -33,13 +33,13 @@ gss_export_sec_context(OM_uint32 *minor_status,
|
||||
gss_ctx_id_t *context_handle,
|
||||
gss_buffer_t interprocess_token)
|
||||
{
|
||||
OM_uint32 major_status = GSS_S_FAILURE;
|
||||
OM_uint32 major_status = GSS_S_FAILURE, tmp_minor;
|
||||
krb5_storage *sp;
|
||||
krb5_data data;
|
||||
krb5_error_code kret;
|
||||
struct _gss_context *ctx;
|
||||
gssapi_mech_interface m;
|
||||
gss_buffer_desc buf;
|
||||
gss_buffer_desc buf = GSS_C_EMPTY_BUFFER;
|
||||
unsigned char verflags;
|
||||
|
||||
*minor_status = 0;
|
||||
@@ -56,16 +56,10 @@ gss_export_sec_context(OM_uint32 *minor_status,
|
||||
if (ctx == NULL)
|
||||
return GSS_S_NO_CONTEXT;
|
||||
|
||||
if (!ctx->gc_ctx && ctx->gc_target_len) {
|
||||
free(ctx);
|
||||
*context_handle = GSS_C_NO_CONTEXT;
|
||||
return GSS_S_NO_CONTEXT;
|
||||
}
|
||||
|
||||
sp = krb5_storage_emem();
|
||||
if (sp == NULL) {
|
||||
*minor_status = ENOMEM;
|
||||
return GSS_S_FAILURE;
|
||||
goto failure;
|
||||
}
|
||||
krb5_storage_set_byteorder(sp, KRB5_STORAGE_BYTEORDER_PACKED);
|
||||
|
||||
@@ -98,37 +92,36 @@ gss_export_sec_context(OM_uint32 *minor_status,
|
||||
*minor_status = kret;
|
||||
goto failure;
|
||||
}
|
||||
} else if (ctx->gc_ctx == GSS_C_NO_CONTEXT) {
|
||||
gss_delete_sec_context(&tmp_minor, context_handle,
|
||||
GSS_C_NO_BUFFER);
|
||||
return GSS_S_NO_CONTEXT;
|
||||
}
|
||||
|
||||
if (!ctx->gc_ctx) {
|
||||
free(ctx);
|
||||
*context_handle = GSS_C_NO_CONTEXT;
|
||||
return GSS_S_COMPLETE;
|
||||
}
|
||||
if (ctx->gc_ctx) {
|
||||
m = ctx->gc_mech;
|
||||
|
||||
m = ctx->gc_mech;
|
||||
major_status = m->gm_export_sec_context(minor_status,
|
||||
&ctx->gc_ctx, &buf);
|
||||
|
||||
major_status = m->gm_export_sec_context(minor_status,
|
||||
&ctx->gc_ctx, &buf);
|
||||
if (major_status != GSS_S_COMPLETE) {
|
||||
_gss_mg_error(m, *minor_status);
|
||||
goto failure;
|
||||
}
|
||||
|
||||
if (major_status != GSS_S_COMPLETE) {
|
||||
_gss_mg_error(m, *minor_status);
|
||||
goto failure;
|
||||
}
|
||||
kret = krb5_store_datalen(sp, m->gm_mech_oid.elements,
|
||||
m->gm_mech_oid.length);
|
||||
if (kret) {
|
||||
*minor_status = kret;
|
||||
goto failure;
|
||||
}
|
||||
|
||||
kret = krb5_store_datalen(sp, m->gm_mech_oid.elements,
|
||||
m->gm_mech_oid.length);
|
||||
if (kret) {
|
||||
*minor_status = kret;
|
||||
goto failure;
|
||||
}
|
||||
|
||||
kret = krb5_store_datalen(sp, buf.value, buf.length);
|
||||
if (kret) {
|
||||
*minor_status = kret;
|
||||
goto failure;
|
||||
}
|
||||
_gss_secure_release_buffer(minor_status, &buf);
|
||||
kret = krb5_store_datalen(sp, buf.value, buf.length);
|
||||
if (kret) {
|
||||
*minor_status = kret;
|
||||
goto failure;
|
||||
}
|
||||
}
|
||||
|
||||
kret = krb5_storage_to_data(sp, &data);
|
||||
if (kret) {
|
||||
@@ -139,34 +132,18 @@ gss_export_sec_context(OM_uint32 *minor_status,
|
||||
interprocess_token->length = data.length;
|
||||
interprocess_token->value = data.data;
|
||||
|
||||
major_status = GSS_S_COMPLETE;
|
||||
|
||||
_gss_mg_log(1, "gss-esc: token length %zu", data.length);
|
||||
|
||||
free(ctx);
|
||||
*context_handle = GSS_C_NO_CONTEXT;
|
||||
|
||||
#if 0
|
||||
if (!interprocess_token->value) {
|
||||
/*
|
||||
* We are in trouble here - the context is
|
||||
* already gone. This is allowed as long as we
|
||||
* set the caller's context_handle to
|
||||
* GSS_C_NO_CONTEXT, which we did above.
|
||||
* Return GSS_S_FAILURE.
|
||||
*/
|
||||
_mg_buffer_zero(interprocess_token);
|
||||
*minor_status = ENOMEM;
|
||||
return (GSS_S_FAILURE);
|
||||
}
|
||||
p = interprocess_token->value;
|
||||
p[0] = m->gm_mech_oid.length >> 8;
|
||||
p[1] = m->gm_mech_oid.length;
|
||||
memcpy(p + 2, m->gm_mech_oid.elements, m->gm_mech_oid.length);
|
||||
memcpy(p + 2 + m->gm_mech_oid.length, buf.value, buf.length);
|
||||
} else {
|
||||
}
|
||||
#endif
|
||||
|
||||
failure:
|
||||
if (major_status == GSS_S_COMPLETE && *minor_status == 0)
|
||||
gss_delete_sec_context(&tmp_minor, context_handle,
|
||||
GSS_C_NO_BUFFER);
|
||||
else if (*minor_status)
|
||||
major_status = GSS_S_FAILURE;
|
||||
|
||||
_gss_secure_release_buffer(minor_status, &buf);
|
||||
krb5_storage_free(sp);
|
||||
return major_status;
|
||||
}
|
||||
|
@@ -33,7 +33,7 @@ gss_import_sec_context(OM_uint32 *minor_status,
|
||||
const gss_buffer_t interprocess_token,
|
||||
gss_ctx_id_t *context_handle)
|
||||
{
|
||||
OM_uint32 ret = GSS_S_FAILURE;
|
||||
OM_uint32 ret = GSS_S_FAILURE, tmp_minor;
|
||||
krb5_storage *sp;
|
||||
krb5_data data;
|
||||
gssapi_mech_interface m;
|
||||
@@ -88,10 +88,15 @@ gss_import_sec_context(OM_uint32 *minor_status,
|
||||
if (krb5_ret_data(sp, &data))
|
||||
goto failure;
|
||||
|
||||
ctx->gc_input.value = calloc(target_len, 1);
|
||||
if (ctx->gc_input.value == NULL)
|
||||
goto failure;
|
||||
|
||||
ctx->gc_target_len = target_len;
|
||||
ctx->gc_input.value = data.data;
|
||||
ctx->gc_input.length = data.length;
|
||||
/* Don't need to free data because we gave it to gc_input */
|
||||
memcpy(ctx->gc_input.value, data.data, data.length);
|
||||
|
||||
krb5_data_free(&data);
|
||||
}
|
||||
|
||||
if (verflags & EXPORT_CONTEXT_FLAG_MECH_CTX) {
|
||||
@@ -102,8 +107,10 @@ gss_import_sec_context(OM_uint32 *minor_status,
|
||||
mech_oid.elements = data.data;
|
||||
m = __gss_get_mechanism(&mech_oid);
|
||||
krb5_data_free(&data);
|
||||
if (!m)
|
||||
return GSS_S_DEFECTIVE_TOKEN;
|
||||
if (m == NULL) {
|
||||
ret = GSS_S_DEFECTIVE_TOKEN;
|
||||
goto failure;
|
||||
}
|
||||
ctx->gc_mech = m;
|
||||
|
||||
if (krb5_ret_data(sp, &data))
|
||||
@@ -113,16 +120,17 @@ gss_import_sec_context(OM_uint32 *minor_status,
|
||||
buf.value = data.data;
|
||||
|
||||
ret = m->gm_import_sec_context(minor_status, &buf, &ctx->gc_ctx);
|
||||
_gss_secure_release_buffer(&tmp_minor, &buf);
|
||||
if (ret != GSS_S_COMPLETE) {
|
||||
_gss_mg_error(m, *minor_status);
|
||||
free(ctx);
|
||||
} else {
|
||||
*context_handle = (gss_ctx_id_t) ctx;
|
||||
}
|
||||
goto failure;
|
||||
}
|
||||
}
|
||||
|
||||
krb5_storage_free(sp);
|
||||
return (ret);
|
||||
*context_handle = (gss_ctx_id_t) ctx;
|
||||
ctx = NULL;
|
||||
|
||||
ret = GSS_S_COMPLETE;
|
||||
|
||||
failure:
|
||||
free(ctx);
|
||||
|
@@ -279,10 +279,13 @@ loop(gss_OID mechoid,
|
||||
gsskrb5_get_time_offset(&client_time_offset);
|
||||
gsskrb5_set_time_offset(server_time_offset);
|
||||
|
||||
tmp.length = output_token.length - offset;
|
||||
if (token_split && tmp.length > token_split)
|
||||
tmp.length = token_split;
|
||||
tmp.value = (char *)output_token.value + offset;
|
||||
if (output_token.length && ((uint8_t *)output_token.value)[0] == 0x60) {
|
||||
tmp.length = output_token.length - offset;
|
||||
if (token_split && tmp.length > token_split)
|
||||
tmp.length = token_split;
|
||||
tmp.value = (char *)output_token.value + offset;
|
||||
} else
|
||||
tmp = output_token;
|
||||
|
||||
if (verbose_flag)
|
||||
printf("loop #%d: accept offset=%zu len=%zu\n", num_loops,
|
||||
|
Reference in New Issue
Block a user