reorder code so sequence numbers can can be used

git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@12371 ec53bebd-3082-4978-b11e-865c3cabbd6b
This commit is contained in:
Love Hörnquist Åstrand
2003-06-17 04:08:20 +00:00
parent d4114c6097
commit 5b4a741593
4 changed files with 172 additions and 134 deletions

View File

@@ -71,10 +71,10 @@ unwrap_des
krb5_keyblock *key krb5_keyblock *key
) )
{ {
u_char *p, *pad; u_char *p, *pad, *seq;
size_t len; size_t len;
MD5_CTX md5; MD5_CTX md5;
u_char hash[16], seq_data[8]; u_char hash[16];
des_key_schedule schedule; des_key_schedule schedule;
des_cblock deskey; des_cblock deskey;
des_cblock zero; des_cblock zero;
@@ -83,6 +83,7 @@ unwrap_des
size_t padlength; size_t padlength;
OM_uint32 ret; OM_uint32 ret;
int cstate; int cstate;
int cmp;
p = input_message_buffer->value; p = input_message_buffer->value;
ret = gssapi_krb5_verify_header (&p, ret = gssapi_krb5_verify_header (&p,
@@ -154,16 +155,6 @@ unwrap_des
/* verify sequence number */ /* verify sequence number */
HEIMDAL_MUTEX_lock(&context_handle->ctx_id_mutex); HEIMDAL_MUTEX_lock(&context_handle->ctx_id_mutex);
krb5_auth_getremoteseqnumber (gssapi_krb5_context,
context_handle->auth_context,
&seq_number);
seq_data[0] = (seq_number >> 0) & 0xFF;
seq_data[1] = (seq_number >> 8) & 0xFF;
seq_data[2] = (seq_number >> 16) & 0xFF;
seq_data[3] = (seq_number >> 24) & 0xFF;
memset (seq_data + 4,
(context_handle->more_flags & LOCAL) ? 0xFF : 0,
4);
p -= 16; p -= 16;
des_set_key (&deskey, schedule); des_set_key (&deskey, schedule);
@@ -173,13 +164,25 @@ unwrap_des
memset (deskey, 0, sizeof(deskey)); memset (deskey, 0, sizeof(deskey));
memset (schedule, 0, sizeof(schedule)); memset (schedule, 0, sizeof(schedule));
if (memcmp (p, seq_data, 8) != 0) { seq = p;
gssapi_decode_om_uint32(seq, &seq_number);
if (context_handle->more_flags & LOCAL)
cmp = memcmp(&seq[4], "\xff\xff\xff\xff", 4);
else
cmp = memcmp(&seq[4], "\x00\x00\x00\x00", 4);
if (cmp != 0) {
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
return GSS_S_BAD_MIC; return GSS_S_BAD_MIC;
} }
krb5_auth_con_setremoteseqnumber (gssapi_krb5_context, ret = gssapi_msg_order_check(context_handle->order, seq_number);
context_handle->auth_context, if (ret) {
++seq_number); HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
return ret;
}
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex); HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
/* copy out data */ /* copy out data */
@@ -208,7 +211,7 @@ unwrap_des3
{ {
u_char *p, *pad; u_char *p, *pad;
size_t len; size_t len;
u_char seq[8]; u_char *seq;
krb5_data seq_data; krb5_data seq_data;
u_char cksum[20]; u_char cksum[20];
int i; int i;
@@ -283,16 +286,6 @@ unwrap_des3
/* verify sequence number */ /* verify sequence number */
HEIMDAL_MUTEX_lock(&context_handle->ctx_id_mutex); HEIMDAL_MUTEX_lock(&context_handle->ctx_id_mutex);
krb5_auth_getremoteseqnumber (gssapi_krb5_context,
context_handle->auth_context,
&seq_number);
seq[0] = (seq_number >> 0) & 0xFF;
seq[1] = (seq_number >> 8) & 0xFF;
seq[2] = (seq_number >> 16) & 0xFF;
seq[3] = (seq_number >> 24) & 0xFF;
memset (seq + 4,
(context_handle->more_flags & LOCAL) ? 0xFF : 0,
4);
p -= 28; p -= 28;
@@ -301,6 +294,7 @@ unwrap_des3
if (ret) { if (ret) {
gssapi_krb5_set_error_string (); gssapi_krb5_set_error_string ();
*minor_status = ret; *minor_status = ret;
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
return GSS_S_FAILURE; return GSS_S_FAILURE;
} }
{ {
@@ -317,22 +311,38 @@ unwrap_des3
if (ret) { if (ret) {
gssapi_krb5_set_error_string (); gssapi_krb5_set_error_string ();
*minor_status = ret; *minor_status = ret;
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
return GSS_S_FAILURE; return GSS_S_FAILURE;
} }
if (seq_data.length != 8) { if (seq_data.length != 8) {
krb5_data_free (&seq_data); krb5_data_free (&seq_data);
*minor_status = 0;
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
return GSS_S_BAD_MIC; return GSS_S_BAD_MIC;
} }
cmp = memcmp (seq, seq_data.data, seq_data.length); seq = seq_data.data;
gssapi_decode_om_uint32(seq, &seq_number);
if (context_handle->more_flags & LOCAL)
cmp = memcmp(&seq[4], "\xff\xff\xff\xff", 4);
else
cmp = memcmp(&seq[4], "\x00\x00\x00\x00", 4);
krb5_data_free (&seq_data); krb5_data_free (&seq_data);
if (cmp != 0) { if (cmp != 0) {
*minor_status = 0;
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
return GSS_S_BAD_MIC; return GSS_S_BAD_MIC;
} }
krb5_auth_con_setremoteseqnumber (gssapi_krb5_context, ret = gssapi_msg_order_check(context_handle->order, seq_number);
context_handle->auth_context, if (ret) {
++seq_number); *minor_status = 0;
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
return ret;
}
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex); HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
/* verify checksum */ /* verify checksum */
@@ -390,6 +400,9 @@ OM_uint32 gss_unwrap
OM_uint32 ret; OM_uint32 ret;
krb5_keytype keytype; krb5_keytype keytype;
output_message_buffer->value = NULL;
output_message_buffer->length = 0;
if (qop_state != NULL) if (qop_state != NULL)
*qop_state = GSS_C_QOP_DEFAULT; *qop_state = GSS_C_QOP_DEFAULT;
ret = gss_krb5_get_remotekey(context_handle, &key); ret = gss_krb5_get_remotekey(context_handle, &key);

View File

@@ -48,12 +48,13 @@ verify_mic_des
{ {
u_char *p; u_char *p;
MD5_CTX md5; MD5_CTX md5;
u_char hash[16], seq_data[8]; u_char hash[16], *seq;
des_key_schedule schedule; des_key_schedule schedule;
des_cblock zero; des_cblock zero;
des_cblock deskey; des_cblock deskey;
int32_t seq_number; int32_t seq_number;
OM_uint32 ret; OM_uint32 ret;
int cmp;
p = token_buffer->value; p = token_buffer->value;
ret = gssapi_krb5_verify_header (&p, ret = gssapi_krb5_verify_header (&p,
@@ -92,16 +93,6 @@ verify_mic_des
/* verify sequence number */ /* verify sequence number */
HEIMDAL_MUTEX_lock(&context_handle->ctx_id_mutex); HEIMDAL_MUTEX_lock(&context_handle->ctx_id_mutex);
krb5_auth_getremoteseqnumber (gssapi_krb5_context,
context_handle->auth_context,
&seq_number);
seq_data[0] = (seq_number >> 0) & 0xFF;
seq_data[1] = (seq_number >> 8) & 0xFF;
seq_data[2] = (seq_number >> 16) & 0xFF;
seq_data[3] = (seq_number >> 24) & 0xFF;
memset (seq_data + 4,
(context_handle->more_flags & LOCAL) ? 0xFF : 0,
4);
p -= 16; p -= 16;
des_set_key (&deskey, schedule); des_set_key (&deskey, schedule);
@@ -111,13 +102,25 @@ verify_mic_des
memset (deskey, 0, sizeof(deskey)); memset (deskey, 0, sizeof(deskey));
memset (schedule, 0, sizeof(schedule)); memset (schedule, 0, sizeof(schedule));
if (memcmp (p, seq_data, 8) != 0) { seq = p;
gssapi_decode_om_uint32(seq, &seq_number);
if (context_handle->more_flags & LOCAL)
cmp = memcmp(&seq[4], "\xff\xff\xff\xff", 4);
else
cmp = memcmp(&seq[4], "\x00\x00\x00\x00", 4);
if (cmp != 0) {
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
return GSS_S_BAD_MIC; return GSS_S_BAD_MIC;
} }
krb5_auth_con_setremoteseqnumber (gssapi_krb5_context, ret = gssapi_msg_order_check(context_handle->order, seq_number);
context_handle->auth_context, if (ret) {
++seq_number); HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
return ret;
}
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex); HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
return GSS_S_COMPLETE; return GSS_S_COMPLETE;
@@ -135,7 +138,7 @@ verify_mic_des3
) )
{ {
u_char *p; u_char *p;
u_char seq[8]; u_char *seq;
int32_t seq_number; int32_t seq_number;
OM_uint32 ret; OM_uint32 ret;
krb5_crypto crypto; krb5_crypto crypto;
@@ -199,24 +202,29 @@ retry:
} }
HEIMDAL_MUTEX_lock(&context_handle->ctx_id_mutex); HEIMDAL_MUTEX_lock(&context_handle->ctx_id_mutex);
krb5_auth_getremoteseqnumber (gssapi_krb5_context,
context_handle->auth_context, seq = seq_data.data;
&seq_number); gssapi_decode_om_uint32(seq, &seq_number);
seq[0] = (seq_number >> 0) & 0xFF;
seq[1] = (seq_number >> 8) & 0xFF; if (context_handle->more_flags & LOCAL)
seq[2] = (seq_number >> 16) & 0xFF; cmp = memcmp(&seq[4], "\xff\xff\xff\xff", 4);
seq[3] = (seq_number >> 24) & 0xFF; else
memset (seq + 4, cmp = memcmp(&seq[4], "\x00\x00\x00\x00", 4);
(context_handle->more_flags & LOCAL) ? 0xFF : 0,
4);
cmp = memcmp (seq, seq_data.data, seq_data.length);
krb5_data_free (&seq_data); krb5_data_free (&seq_data);
if (cmp != 0) { if (cmp != 0) {
if (docompat++) { krb5_crypto_destroy (gssapi_krb5_context, crypto);
krb5_crypto_destroy (gssapi_krb5_context, crypto); *minor_status = 0;
return GSS_S_BAD_MIC; HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
} else return GSS_S_BAD_MIC;
goto retry; }
ret = gssapi_msg_order_check(context_handle->order, seq_number);
if (ret) {
krb5_crypto_destroy (gssapi_krb5_context, crypto);
*minor_status = 0;
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
return ret;
} }
/* verify checksum */ /* verify checksum */
@@ -224,6 +232,7 @@ retry:
tmp = malloc (message_buffer->length + 8); tmp = malloc (message_buffer->length + 8);
if (tmp == NULL) { if (tmp == NULL) {
krb5_crypto_destroy (gssapi_krb5_context, crypto); krb5_crypto_destroy (gssapi_krb5_context, crypto);
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
*minor_status = ENOMEM; *minor_status = ENOMEM;
return GSS_S_FAILURE; return GSS_S_FAILURE;
} }
@@ -244,12 +253,9 @@ retry:
gssapi_krb5_set_error_string (); gssapi_krb5_set_error_string ();
krb5_crypto_destroy (gssapi_krb5_context, crypto); krb5_crypto_destroy (gssapi_krb5_context, crypto);
*minor_status = ret; *minor_status = ret;
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
return GSS_S_BAD_MIC; return GSS_S_BAD_MIC;
} }
krb5_auth_con_setremoteseqnumber (gssapi_krb5_context,
context_handle->auth_context,
++seq_number);
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex); HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
krb5_crypto_destroy (gssapi_krb5_context, crypto); krb5_crypto_destroy (gssapi_krb5_context, crypto);

View File

@@ -71,10 +71,10 @@ unwrap_des
krb5_keyblock *key krb5_keyblock *key
) )
{ {
u_char *p, *pad; u_char *p, *pad, *seq;
size_t len; size_t len;
MD5_CTX md5; MD5_CTX md5;
u_char hash[16], seq_data[8]; u_char hash[16];
des_key_schedule schedule; des_key_schedule schedule;
des_cblock deskey; des_cblock deskey;
des_cblock zero; des_cblock zero;
@@ -83,6 +83,7 @@ unwrap_des
size_t padlength; size_t padlength;
OM_uint32 ret; OM_uint32 ret;
int cstate; int cstate;
int cmp;
p = input_message_buffer->value; p = input_message_buffer->value;
ret = gssapi_krb5_verify_header (&p, ret = gssapi_krb5_verify_header (&p,
@@ -154,16 +155,6 @@ unwrap_des
/* verify sequence number */ /* verify sequence number */
HEIMDAL_MUTEX_lock(&context_handle->ctx_id_mutex); HEIMDAL_MUTEX_lock(&context_handle->ctx_id_mutex);
krb5_auth_getremoteseqnumber (gssapi_krb5_context,
context_handle->auth_context,
&seq_number);
seq_data[0] = (seq_number >> 0) & 0xFF;
seq_data[1] = (seq_number >> 8) & 0xFF;
seq_data[2] = (seq_number >> 16) & 0xFF;
seq_data[3] = (seq_number >> 24) & 0xFF;
memset (seq_data + 4,
(context_handle->more_flags & LOCAL) ? 0xFF : 0,
4);
p -= 16; p -= 16;
des_set_key (&deskey, schedule); des_set_key (&deskey, schedule);
@@ -173,13 +164,25 @@ unwrap_des
memset (deskey, 0, sizeof(deskey)); memset (deskey, 0, sizeof(deskey));
memset (schedule, 0, sizeof(schedule)); memset (schedule, 0, sizeof(schedule));
if (memcmp (p, seq_data, 8) != 0) { seq = p;
gssapi_decode_om_uint32(seq, &seq_number);
if (context_handle->more_flags & LOCAL)
cmp = memcmp(&seq[4], "\xff\xff\xff\xff", 4);
else
cmp = memcmp(&seq[4], "\x00\x00\x00\x00", 4);
if (cmp != 0) {
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
return GSS_S_BAD_MIC; return GSS_S_BAD_MIC;
} }
krb5_auth_con_setremoteseqnumber (gssapi_krb5_context, ret = gssapi_msg_order_check(context_handle->order, seq_number);
context_handle->auth_context, if (ret) {
++seq_number); HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
return ret;
}
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex); HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
/* copy out data */ /* copy out data */
@@ -208,7 +211,7 @@ unwrap_des3
{ {
u_char *p, *pad; u_char *p, *pad;
size_t len; size_t len;
u_char seq[8]; u_char *seq;
krb5_data seq_data; krb5_data seq_data;
u_char cksum[20]; u_char cksum[20];
int i; int i;
@@ -283,16 +286,6 @@ unwrap_des3
/* verify sequence number */ /* verify sequence number */
HEIMDAL_MUTEX_lock(&context_handle->ctx_id_mutex); HEIMDAL_MUTEX_lock(&context_handle->ctx_id_mutex);
krb5_auth_getremoteseqnumber (gssapi_krb5_context,
context_handle->auth_context,
&seq_number);
seq[0] = (seq_number >> 0) & 0xFF;
seq[1] = (seq_number >> 8) & 0xFF;
seq[2] = (seq_number >> 16) & 0xFF;
seq[3] = (seq_number >> 24) & 0xFF;
memset (seq + 4,
(context_handle->more_flags & LOCAL) ? 0xFF : 0,
4);
p -= 28; p -= 28;
@@ -301,6 +294,7 @@ unwrap_des3
if (ret) { if (ret) {
gssapi_krb5_set_error_string (); gssapi_krb5_set_error_string ();
*minor_status = ret; *minor_status = ret;
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
return GSS_S_FAILURE; return GSS_S_FAILURE;
} }
{ {
@@ -317,22 +311,38 @@ unwrap_des3
if (ret) { if (ret) {
gssapi_krb5_set_error_string (); gssapi_krb5_set_error_string ();
*minor_status = ret; *minor_status = ret;
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
return GSS_S_FAILURE; return GSS_S_FAILURE;
} }
if (seq_data.length != 8) { if (seq_data.length != 8) {
krb5_data_free (&seq_data); krb5_data_free (&seq_data);
*minor_status = 0;
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
return GSS_S_BAD_MIC; return GSS_S_BAD_MIC;
} }
cmp = memcmp (seq, seq_data.data, seq_data.length); seq = seq_data.data;
gssapi_decode_om_uint32(seq, &seq_number);
if (context_handle->more_flags & LOCAL)
cmp = memcmp(&seq[4], "\xff\xff\xff\xff", 4);
else
cmp = memcmp(&seq[4], "\x00\x00\x00\x00", 4);
krb5_data_free (&seq_data); krb5_data_free (&seq_data);
if (cmp != 0) { if (cmp != 0) {
*minor_status = 0;
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
return GSS_S_BAD_MIC; return GSS_S_BAD_MIC;
} }
krb5_auth_con_setremoteseqnumber (gssapi_krb5_context, ret = gssapi_msg_order_check(context_handle->order, seq_number);
context_handle->auth_context, if (ret) {
++seq_number); *minor_status = 0;
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
return ret;
}
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex); HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
/* verify checksum */ /* verify checksum */
@@ -390,6 +400,9 @@ OM_uint32 gss_unwrap
OM_uint32 ret; OM_uint32 ret;
krb5_keytype keytype; krb5_keytype keytype;
output_message_buffer->value = NULL;
output_message_buffer->length = 0;
if (qop_state != NULL) if (qop_state != NULL)
*qop_state = GSS_C_QOP_DEFAULT; *qop_state = GSS_C_QOP_DEFAULT;
ret = gss_krb5_get_remotekey(context_handle, &key); ret = gss_krb5_get_remotekey(context_handle, &key);

View File

@@ -48,12 +48,13 @@ verify_mic_des
{ {
u_char *p; u_char *p;
MD5_CTX md5; MD5_CTX md5;
u_char hash[16], seq_data[8]; u_char hash[16], *seq;
des_key_schedule schedule; des_key_schedule schedule;
des_cblock zero; des_cblock zero;
des_cblock deskey; des_cblock deskey;
int32_t seq_number; int32_t seq_number;
OM_uint32 ret; OM_uint32 ret;
int cmp;
p = token_buffer->value; p = token_buffer->value;
ret = gssapi_krb5_verify_header (&p, ret = gssapi_krb5_verify_header (&p,
@@ -92,16 +93,6 @@ verify_mic_des
/* verify sequence number */ /* verify sequence number */
HEIMDAL_MUTEX_lock(&context_handle->ctx_id_mutex); HEIMDAL_MUTEX_lock(&context_handle->ctx_id_mutex);
krb5_auth_getremoteseqnumber (gssapi_krb5_context,
context_handle->auth_context,
&seq_number);
seq_data[0] = (seq_number >> 0) & 0xFF;
seq_data[1] = (seq_number >> 8) & 0xFF;
seq_data[2] = (seq_number >> 16) & 0xFF;
seq_data[3] = (seq_number >> 24) & 0xFF;
memset (seq_data + 4,
(context_handle->more_flags & LOCAL) ? 0xFF : 0,
4);
p -= 16; p -= 16;
des_set_key (&deskey, schedule); des_set_key (&deskey, schedule);
@@ -111,13 +102,25 @@ verify_mic_des
memset (deskey, 0, sizeof(deskey)); memset (deskey, 0, sizeof(deskey));
memset (schedule, 0, sizeof(schedule)); memset (schedule, 0, sizeof(schedule));
if (memcmp (p, seq_data, 8) != 0) { seq = p;
gssapi_decode_om_uint32(seq, &seq_number);
if (context_handle->more_flags & LOCAL)
cmp = memcmp(&seq[4], "\xff\xff\xff\xff", 4);
else
cmp = memcmp(&seq[4], "\x00\x00\x00\x00", 4);
if (cmp != 0) {
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
return GSS_S_BAD_MIC; return GSS_S_BAD_MIC;
} }
krb5_auth_con_setremoteseqnumber (gssapi_krb5_context, ret = gssapi_msg_order_check(context_handle->order, seq_number);
context_handle->auth_context, if (ret) {
++seq_number); HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
return ret;
}
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex); HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
return GSS_S_COMPLETE; return GSS_S_COMPLETE;
@@ -135,7 +138,7 @@ verify_mic_des3
) )
{ {
u_char *p; u_char *p;
u_char seq[8]; u_char *seq;
int32_t seq_number; int32_t seq_number;
OM_uint32 ret; OM_uint32 ret;
krb5_crypto crypto; krb5_crypto crypto;
@@ -199,24 +202,29 @@ retry:
} }
HEIMDAL_MUTEX_lock(&context_handle->ctx_id_mutex); HEIMDAL_MUTEX_lock(&context_handle->ctx_id_mutex);
krb5_auth_getremoteseqnumber (gssapi_krb5_context,
context_handle->auth_context, seq = seq_data.data;
&seq_number); gssapi_decode_om_uint32(seq, &seq_number);
seq[0] = (seq_number >> 0) & 0xFF;
seq[1] = (seq_number >> 8) & 0xFF; if (context_handle->more_flags & LOCAL)
seq[2] = (seq_number >> 16) & 0xFF; cmp = memcmp(&seq[4], "\xff\xff\xff\xff", 4);
seq[3] = (seq_number >> 24) & 0xFF; else
memset (seq + 4, cmp = memcmp(&seq[4], "\x00\x00\x00\x00", 4);
(context_handle->more_flags & LOCAL) ? 0xFF : 0,
4);
cmp = memcmp (seq, seq_data.data, seq_data.length);
krb5_data_free (&seq_data); krb5_data_free (&seq_data);
if (cmp != 0) { if (cmp != 0) {
if (docompat++) { krb5_crypto_destroy (gssapi_krb5_context, crypto);
krb5_crypto_destroy (gssapi_krb5_context, crypto); *minor_status = 0;
return GSS_S_BAD_MIC; HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
} else return GSS_S_BAD_MIC;
goto retry; }
ret = gssapi_msg_order_check(context_handle->order, seq_number);
if (ret) {
krb5_crypto_destroy (gssapi_krb5_context, crypto);
*minor_status = 0;
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
return ret;
} }
/* verify checksum */ /* verify checksum */
@@ -224,6 +232,7 @@ retry:
tmp = malloc (message_buffer->length + 8); tmp = malloc (message_buffer->length + 8);
if (tmp == NULL) { if (tmp == NULL) {
krb5_crypto_destroy (gssapi_krb5_context, crypto); krb5_crypto_destroy (gssapi_krb5_context, crypto);
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
*minor_status = ENOMEM; *minor_status = ENOMEM;
return GSS_S_FAILURE; return GSS_S_FAILURE;
} }
@@ -244,12 +253,9 @@ retry:
gssapi_krb5_set_error_string (); gssapi_krb5_set_error_string ();
krb5_crypto_destroy (gssapi_krb5_context, crypto); krb5_crypto_destroy (gssapi_krb5_context, crypto);
*minor_status = ret; *minor_status = ret;
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
return GSS_S_BAD_MIC; return GSS_S_BAD_MIC;
} }
krb5_auth_con_setremoteseqnumber (gssapi_krb5_context,
context_handle->auth_context,
++seq_number);
HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex); HEIMDAL_MUTEX_unlock(&context_handle->ctx_id_mutex);
krb5_crypto_destroy (gssapi_krb5_context, crypto); krb5_crypto_destroy (gssapi_krb5_context, crypto);