delete_sec_context.c revision 7c478bd95313f5f23a4c958a745db2134aa03244
/*
* Copyright 2004 Sun Microsystems, Inc. All rights reserved.
* Use is subject to license terms.
*/
#pragma ident "%Z%%M% %I% %E% SMI"
/*
* Copyright 1993 by OpenVision Technologies, Inc.
*
* Permission to use, copy, modify, distribute, and sell this software
* and its documentation for any purpose is hereby granted without fee,
* provided that the above copyright notice appears in all copies and
* that both that copyright notice and this permission notice appear in
* supporting documentation, and that the name of OpenVision not be used
* in advertising or publicity pertaining to distribution of the software
* without specific, written prior permission. OpenVision makes no
* representations about the suitability of this software for any
* purpose. It is provided "as is" without express or implied warranty.
*
* OPENVISION DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE,
* INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO
* EVENT SHALL OPENVISION BE LIABLE FOR ANY SPECIAL, INDIRECT OR
* CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF
* USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR
* OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
* PERFORMANCE OF THIS SOFTWARE.
*/
#include <gssapiP_krb5.h>
/*
* $Id: delete_sec_context.c,v 1.15 1998/10/30 02:54:17 marc Exp $
*/
OM_uint32
krb5_gss_delete_sec_context(ct,
minor_status,
context_handle,
output_token
#ifdef _KERNEL
, gssd_ctx_verifier
#endif
)
void *ct;
OM_uint32 *minor_status;
gss_ctx_id_t *context_handle;
gss_buffer_t output_token;
#ifdef _KERNEL
OM_uint32 gssd_ctx_verifier;
#endif
{
OM_uint32 major_status = GSS_S_FAILURE;
mutex_lock(&krb5_mutex);
major_status = krb5_gss_delete_sec_context_no_lock(ct, minor_status,
context_handle, output_token
#ifdef _KERNEL
, gssd_ctx_verifier
#endif
);
mutex_unlock(&krb5_mutex);
return(major_status);
}
/*ARGSUSED*/
OM_uint32
krb5_gss_delete_sec_context_no_lock(ct,
minor_status,
context_handle,
output_token
#ifdef _KERNEL
, gssd_ctx_verifier
#endif
)
void *ct;
OM_uint32 *minor_status;
gss_ctx_id_t *context_handle;
gss_buffer_t output_token;
#ifdef _KERNEL
OM_uint32 gssd_ctx_verifier;
#endif
{
krb5_context context = ct;
krb5_gss_ctx_id_rec *ctx;
OM_uint32 major_status = GSS_S_FAILURE;
/* Solaris Kerberos: we use the global kg_context for MT safe */
#if 0
if (GSS_ERROR(kg_get_context(minor_status, &context)))
return(GSS_S_FAILURE);
#endif
if (output_token) {
output_token->length = 0;
output_token->value = NULL;
}
/*SUPPRESS 29*/
if (*context_handle == GSS_C_NO_CONTEXT) {
*minor_status = 0;
major_status = GSS_S_COMPLETE;
goto out;
}
/*SUPPRESS 29*/
/* validate the context handle */
if (! kg_validate_ctx_id(*context_handle)) {
*minor_status = (OM_uint32) G_VALIDATE_FAILED;
major_status = GSS_S_NO_CONTEXT;
goto out;
}
/* construct a delete context token if necessary */
if (output_token) {
gss_buffer_desc empty;
empty.length = 0; empty.value = NULL;
if ((major_status = kg_seal(context, minor_status, *context_handle, 0,
GSS_C_QOP_DEFAULT,
&empty, NULL, output_token, KG_TOK_DEL_CTX)))
goto out;
}
/* invalidate the context handle */
(void)kg_delete_ctx_id(*context_handle);
/* free all the context state */
ctx = (krb5_gss_ctx_id_rec *) *context_handle;
if (ctx->seqstate)
g_order_free(&(ctx->seqstate));
if (ctx->enc)
krb5_free_keyblock(context, ctx->enc);
if (ctx->seq)
krb5_free_keyblock(context, ctx->seq);
if (ctx->here)
krb5_free_principal(context, ctx->here);
if (ctx->there)
krb5_free_principal(context, ctx->there);
if (ctx->subkey)
krb5_free_keyblock(context, ctx->subkey);
if (ctx->acceptor_subkey)
krb5_free_keyblock(context, ctx->acceptor_subkey);
/* We never import the auth_context into the kernel */
#ifndef _KERNEL
if (ctx->auth_context) {
(void)krb5_auth_con_setrcache(context, ctx->auth_context, NULL);
krb5_auth_con_free(context, ctx->auth_context);
}
#endif
/* Solaris Kerberos: the mech_used element of this structure
* is the actual gss_OID_desc type in gssapiP_krb5.h, and not
* a gss_OID_desc * type, in particular, the gss_release_oid
* is not needed, as the oid is memset to zero below, then freed.
*/
if (ctx->mech_used.length) {
xfree_wrap(ctx->mech_used.elements, ctx->mech_used.length);
/* gss_release_oid(minor_status, &(ctx->mech_used)); */
}
/* Zero out context */
(void) memset(ctx, 0, sizeof(*ctx));
xfree_wrap(ctx, sizeof (krb5_gss_ctx_id_rec));
/* zero the handle itself */
*context_handle = GSS_C_NO_CONTEXT;
*minor_status = 0;
major_status = GSS_S_COMPLETE;
out:
return(major_status);
}