xref: /freebsd/crypto/krb5/src/lib/gssapi/mechglue/g_encapsulate_token.c (revision 7f2fe78b9dd5f51c821d771b63d2e096f6fd49e9)
1 /*
2  * Copyright (c) 2011, PADL Software Pty Ltd.
3  * All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  *
9  * 1. Redistributions of source code must retain the above copyright
10  *    notice, this list of conditions and the following disclaimer.
11  *
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  *
16  * 3. Neither the name of PADL Software nor the names of its contributors
17  *    may be used to endorse or promote products derived from this software
18  *    without specific prior written permission.
19  *
20  * THIS SOFTWARE IS PROVIDED BY PADL SOFTWARE AND CONTRIBUTORS ``AS IS'' AND
21  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23  * ARE DISCLAIMED.  IN NO EVENT SHALL PADL SOFTWARE OR CONTRIBUTORS BE LIABLE
24  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30  * SUCH DAMAGE.
31  */
32 
33 #include "mglueP.h"
34 
35 OM_uint32 KRB5_CALLCONV
gss_encapsulate_token(gss_const_buffer_t input_token,gss_const_OID token_oid,gss_buffer_t output_token)36 gss_encapsulate_token(gss_const_buffer_t input_token,
37                       gss_const_OID token_oid,
38                       gss_buffer_t output_token)
39 {
40     unsigned int tokenSize;
41     struct k5buf buf;
42 
43     if (input_token == GSS_C_NO_BUFFER || token_oid == GSS_C_NO_OID)
44         return GSS_S_CALL_INACCESSIBLE_READ;
45 
46     if (output_token == GSS_C_NO_BUFFER)
47         return GSS_S_CALL_INACCESSIBLE_WRITE;
48 
49     tokenSize = g_token_size(token_oid, input_token->length);
50 
51     assert(tokenSize > 2);
52     tokenSize -= 2; /* TOK_ID */
53 
54     output_token->value = gssalloc_malloc(tokenSize);
55     if (output_token->value == NULL)
56         return GSS_S_FAILURE;
57 
58     k5_buf_init_fixed(&buf, output_token->value, tokenSize);
59     g_make_token_header(&buf, token_oid, input_token->length, -1);
60     k5_buf_add_len(&buf, input_token->value, input_token->length);
61     assert(buf.len == tokenSize);
62     output_token->length = tokenSize;
63 
64     return GSS_S_COMPLETE;
65 }
66