/*
*/
/*
* Copyright 1993 by OpenVision Technologies, Inc.
*
* Permission to use, copy, modify, distribute, and sell this software
* and its documentation for any purpose is hereby granted without fee,
* provided that the above copyright notice appears in all copies and
* that both that copyright notice and this permission notice appear in
* supporting documentation, and that the name of OpenVision not be used
* in advertising or publicity pertaining to distribution of the software
* without specific, written prior permission. OpenVision makes no
* representations about the suitability of this software for any
* purpose. It is provided "as is" without express or implied warranty.
*
* OPENVISION DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE,
* INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO
* EVENT SHALL OPENVISION BE LIABLE FOR ANY SPECIAL, INDIRECT OR
* CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF
* USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR
* OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
* PERFORMANCE OF THIS SOFTWARE.
*/
#include "gssapiP_krb5.h"
#include "mglueP.h" /* SUNW15resync - for KGSS_ macros */
/*
* $Id: delete_sec_context.c 18396 2006-07-25 20:29:43Z lxs $
*/
#ifdef _KERNEL
/* SUNW15resync - todo - unify these kernel rel oid funcs with user spc ones */
{
/*
* This function only knows how to release internal OIDs. It will
* return GSS_S_CONTINUE_NEEDED for any OIDs it does not recognize.
*/
if ((*oid != gss_mech_krb5) &&
(*oid != gss_mech_krb5_old) &&
(*oid != gss_mech_krb5_wrong) &&
(*oid != gss_nt_krb5_name) &&
(*oid != gss_nt_krb5_principal)) {
/* We don't know about this OID */
return(GSS_S_CONTINUE_NEEDED);
}
else {
*oid = GSS_C_NO_OID;
*minor_status = 0;
return(GSS_S_COMPLETE);
}
}
{
if (minor_status)
*minor_status = 0;
if (*oid == GSS_C_NO_OID)
return(GSS_S_COMPLETE);
if ((*oid != GSS_C_NT_USER_NAME) &&
(*oid != GSS_C_NT_MACHINE_UID_NAME) &&
(*oid != GSS_C_NT_STRING_UID_NAME) &&
(*oid != GSS_C_NT_HOSTBASED_SERVICE) &&
(*oid != GSS_C_NT_ANONYMOUS) &&
(*oid != GSS_C_NT_EXPORT_NAME) &&
(*oid != gss_nt_service_name)) {
}
*oid = GSS_C_NO_OID;
return(GSS_S_COMPLETE);
}
{
/* Pawn it off on the generic routine */
}
else {
*oid = GSS_C_NO_OID;
*minor_status = 0;
return(GSS_S_COMPLETE);
}
}
#endif
/*ARGSUSED*/
#ifdef _KERNEL
#endif
)
#ifdef _KERNEL
#endif
{
if (output_token) {
output_token->length = 0;
}
/*SUPPRESS 29*/
if (*context_handle == GSS_C_NO_CONTEXT) {
*minor_status = 0;
return(GSS_S_COMPLETE);
}
/*SUPPRESS 29*/
/* validate the context handle */
if (! kg_validate_ctx_id(*context_handle)) {
return(GSS_S_NO_CONTEXT);
}
/* construct a delete context token if necessary */
if (output_token) {
return(major);
}
}
/* invalidate the context handle */
(void)kg_delete_ctx_id(*context_handle);
/* free all the context state */
if (ctx->acceptor_subkey)
/* We never import the auth_context into the kernel */
#ifndef _KERNEL
if (ctx->auth_context) {
if (ctx->cred_rcache)
}
#endif
if (ctx->k5_context)
/* Zero out context */
/* zero the handle itself */
*minor_status = 0;
return(GSS_S_COMPLETE);
}