asn1_NegTokenInit.x \
asn1_NegTokenInit2.x \
asn1_NegTokenResp.x \
- asn1_NegResultEnum.x
+ asn1_NegStateEnum.x
BUILTHEADERS = \
$(srcdir)/krb5/gsskrb5-private.h \
nt.element = choice_NegotiationToken_negTokenResp;
- ALLOC(nt.u.negTokenResp.negResult, 1);
- if (nt.u.negTokenResp.negResult == NULL) {
+ ALLOC(nt.u.negTokenResp.negState, 1);
+ if (nt.u.negTokenResp.negState == NULL) {
*minor_status = ENOMEM;
return GSS_S_FAILURE;
}
- *(nt.u.negTokenResp.negResult) = reject;
+ *(nt.u.negTokenResp.negState) = reject;
nt.u.negTokenResp.supportedMech = NULL;
nt.u.negTokenResp.responseToken = NULL;
nt.u.negTokenResp.mechListMIC = NULL;
nt.element = choice_NegotiationToken_negTokenResp;
- ALLOC(nt.u.negTokenResp.negResult, 1);
- if (nt.u.negTokenResp.negResult == NULL) {
+ ALLOC(nt.u.negTokenResp.negState, 1);
+ if (nt.u.negTokenResp.negState == NULL) {
*minor_status = ENOMEM;
return GSS_S_FAILURE;
}
if (mech_token != GSS_C_NO_BUFFER
&& mech_token->length != 0
&& mech_buf != GSS_C_NO_BUFFER)
- *(nt.u.negTokenResp.negResult) = accept_incomplete;
+ *(nt.u.negTokenResp.negState) = accept_incomplete;
else
- *(nt.u.negTokenResp.negResult) = accept_completed;
+ *(nt.u.negTokenResp.negState) = accept_completed;
} else {
if (initial_response && !optimistic_mech_ok)
- *(nt.u.negTokenResp.negResult) = request_mic;
+ *(nt.u.negTokenResp.negState) = request_mic;
else
- *(nt.u.negTokenResp.negResult) = accept_incomplete;
+ *(nt.u.negTokenResp.negState) = accept_incomplete;
}
if (initial_response) {
* specifies encapsulation for all _Kerberos_ tokens).
*/
- if (*(nt.u.negTokenResp.negResult) == accept_completed)
+ if (*(nt.u.negTokenResp.negState) == accept_completed)
ret = GSS_S_COMPLETE;
else
ret = GSS_S_CONTINUE_NEEDED;
NegotiationToken nt;
size_t nt_len;
NegTokenResp *na;
- unsigned int negResult = accept_incomplete;
+ unsigned int negState = accept_incomplete;
gss_buffer_t mech_input_token = GSS_C_NO_BUFFER;
gss_buffer_t mech_output_token = GSS_C_NO_BUFFER;
gssspnego_ctx ctx;
}
na = &nt.u.negTokenResp;
- if (na->negResult != NULL) {
- negResult = *(na->negResult);
+ if (na->negState != NULL) {
+ negState = *(na->negState);
}
HEIMDAL_MUTEX_lock(&ctx->ctx_id_mutex);
output_token);
if (ctx->mech_flags & GSS_C_DCE_STYLE)
- require_response = (negResult != accept_completed);
+ require_response = (negState != accept_completed);
else
require_response = 0;
*/
if ((mech_output_token != GSS_C_NO_BUFFER &&
mech_output_token->length != 0)
- || (ctx->flags.open && negResult == accept_incomplete)
+ || (ctx->flags.open && negState == accept_incomplete)
|| require_response
|| get_mic) {
ret2 = send_accept (minor_status,
gss_buffer_desc mic_buf;
OM_uint32 ret, minor;
size_t size;
- NegResultEnum result;
+ NegStateEnum state;
memset(&nt, 0, sizeof(nt));
nt.element = choice_NegotiationToken_negTokenResp;
- nt.u.negTokenResp.negResult = NULL;
+ nt.u.negTokenResp.negState = NULL;
nt.u.negTokenResp.supportedMech = NULL;
output_token->length = 0;
if (ctx->flags.open) {
if (ctx->flags.verified_mic == 1 || ctx->flags.require_mic == 0)
- result = accept_completed;
+ state = accept_completed;
else
- result = accept_incomplete;
+ state = accept_incomplete;
} else {
- result = accept_incomplete;
+ state = accept_incomplete;
}
if (mech_token->length == 0) {
nt.u.negTokenResp.mechListMIC = NULL;
}
- ALLOC(nt.u.negTokenResp.negResult, 1);
- if (nt.u.negTokenResp.negResult == NULL) {
+ ALLOC(nt.u.negTokenResp.negState, 1);
+ if (nt.u.negTokenResp.negState == NULL) {
free_NegotiationToken(&nt);
*minor_status = ENOMEM;
return GSS_S_FAILURE;
}
- *nt.u.negTokenResp.negResult = result;
+ *nt.u.negTokenResp.negState = state;
ASN1_MALLOC_ENCODE(NegotiationToken,
output_token->value, output_token->length,
return GSS_S_FAILURE;
}
- if (result != accept_completed)
+ if (state != accept_completed)
return GSS_S_CONTINUE_NEEDED;
return GSS_S_COMPLETE;
return GSS_S_BAD_MECH;
}
- if (resp.u.negTokenResp.negResult == NULL
- || *(resp.u.negTokenResp.negResult) == reject)
+ if (resp.u.negTokenResp.negState == NULL
+ || *(resp.u.negTokenResp.negState) == reject)
{
free_NegotiationToken(&resp);
return GSS_S_BAD_MECH;
if (ret == GSS_S_COMPLETE) {
ctx->flags.open = 1;
}
- } else if (*resp.u.negTokenResp.negResult == accept_completed) {
+ } else if (*resp.u.negTokenResp.negState == accept_completed) {
if (ctx->flags.maybe_open)
ctx->flags.open = 1;
}
}
- if (*resp.u.negTokenResp.negResult == request_mic) {
+ if (*resp.u.negTokenResp.negState == request_mic) {
ctx->flags.peer_require_mic = 1;
}
if (ctx->flags.open) {
- if (*resp.u.negTokenResp.negResult == accept_completed && ctx->flags.safe_omit) {
+ if (*resp.u.negTokenResp.negState == accept_completed && ctx->flags.safe_omit) {
ctx->initiator_state = step_completed;
ret = GSS_S_COMPLETE;
} else if (ctx->flags.require_mic != 0 && ctx->flags.verified_mic == 0) {
}
}
- if (*resp.u.negTokenResp.negResult != accept_completed ||
+ if (*resp.u.negTokenResp.negState != accept_completed ||
ctx->initiator_state != step_completed ||
mech_output_token.length)
{
"Failed to decode NegotiationToken");
if (resp.element != choice_NegotiationToken_negTokenResp
- || resp.u.negTokenResp.negResult == NULL
- || *resp.u.negTokenResp.negResult != accept_completed)
+ || resp.u.negTokenResp.negState == NULL
+ || *resp.u.negTokenResp.negState != accept_completed)
{
free_NegotiationToken(&resp);
return gss_mg_set_error_string(GSS_SPNEGO_MECHANISM,
...
}
-NegResultEnum ::= ENUMERATED {
- accept_completed(0),
- accept_incomplete(1),
+NegStateEnum ::= ENUMERATED {
+ accept-completed(0),
+ accept-incomplete(1),
reject(2),
request-mic(3)
}
--- NB: negResult is not OPTIONAL in the new SPNEGO spec but
+-- NB: negState is not OPTIONAL in the new SPNEGO spec but
-- Windows clients do not always send it
NegTokenResp ::= SEQUENCE {
- negResult [0] NegResultEnum OPTIONAL,
+ negState [0] NegStateEnum OPTIONAL,
supportedMech [1] MechType OPTIONAL,
responseToken [2] OCTET STRING OPTIONAL,
mechListMIC [3] OCTET STRING OPTIONAL,