| [760] | 1 | # OpenSSH multihomed patch | 
|---|
 | 2 | # | 
|---|
 | 3 | # Anders Kaseorg <andersk@mit.edu> | 
|---|
 | 4 | # ported from 4.5 to 5.0 by Joe Presbrey <presbrey@mit.edu> | 
|---|
 | 5 | diff -ur openssh-5.0p1.orig/gss-serv.c openssh-5.0p1/gss-serv.c | 
|---|
 | 6 | --- openssh-5.0p1.orig/gss-serv.c       2008-05-20 00:00:00.000000000 -0400 | 
|---|
 | 7 | +++ openssh-5.0p1/gss-serv.c    2008-05-20 00:00:00.000000000 -0400 | 
|---|
 | 8 | @@ -77,22 +77,11 @@ | 
|---|
 | 9 |  ssh_gssapi_acquire_cred(Gssctxt *ctx) | 
|---|
 | 10 |  { | 
|---|
 | 11 |         OM_uint32 status; | 
|---|
 | 12 | -       char lname[MAXHOSTNAMELEN]; | 
|---|
 | 13 |         gss_OID_set oidset; | 
|---|
 | 14 |   | 
|---|
 | 15 |         gss_create_empty_oid_set(&status, &oidset); | 
|---|
 | 16 |         gss_add_oid_set_member(&status, ctx->oid, &oidset); | 
|---|
 | 17 |   | 
|---|
 | 18 | -       if (gethostname(lname, MAXHOSTNAMELEN)) { | 
|---|
 | 19 | -               gss_release_oid_set(&status, &oidset); | 
|---|
 | 20 | -               return (-1); | 
|---|
 | 21 | -       } | 
|---|
 | 22 | - | 
|---|
 | 23 | -       if (GSS_ERROR(ssh_gssapi_import_name(ctx, lname))) { | 
|---|
 | 24 | -               gss_release_oid_set(&status, &oidset); | 
|---|
 | 25 | -               return (ctx->major); | 
|---|
 | 26 | -       } | 
|---|
 | 27 | - | 
|---|
 | 28 |         if ((ctx->major = gss_acquire_cred(&ctx->minor, | 
|---|
 | 29 |             ctx->name, 0, oidset, GSS_C_ACCEPT, &ctx->creds, NULL, NULL))) | 
|---|
 | 30 |                 ssh_gssapi_error(ctx); | 
|---|
 | 31 | @@ -102,6 +102,8 @@ | 
|---|
 | 32 |  { | 
|---|
 | 33 |         OM_uint32 status; | 
|---|
 | 34 |         gss_OID mech; | 
|---|
 | 35 | +       gss_name_t acceptor_name = GSS_C_NO_NAME; | 
|---|
 | 36 | +       gss_buffer_desc acceptor_name_buffer = GSS_C_EMPTY_BUFFER; | 
|---|
 | 37 |   | 
|---|
 | 38 |         ctx->major = gss_accept_sec_context(&ctx->minor, | 
|---|
 | 39 |             &ctx->context, ctx->creds, recv_tok, | 
|---|
 | 40 | @@ -116,6 +118,22 @@ | 
|---|
 | 41 |         else | 
|---|
 | 42 |                 debug("Got no client credentials"); | 
|---|
 | 43 |   | 
|---|
 | 44 | +       ctx->major = gss_inquire_context(&ctx->minor, ctx->context, NULL, &acceptor_name, NULL, NULL, NULL, NULL, NULL); | 
|---|
 | 45 | + | 
|---|
 | 46 | +       if (GSS_ERROR(ctx->major)) { | 
|---|
 | 47 | +               ssh_gssapi_error(ctx); | 
|---|
 | 48 | +       } else { | 
|---|
 | 49 | +               ctx->major = gss_display_name(&ctx->minor, acceptor_name, &acceptor_name_buffer, NULL); | 
|---|
 | 50 | + | 
|---|
 | 51 | +               if (GSS_ERROR(ctx->major)) { | 
|---|
 | 52 | +                       ssh_gssapi_error(ctx); | 
|---|
 | 53 | +               } else if (acceptor_name_buffer.length < 5 || strncmp(acceptor_name_buffer.value, "host@", 5) != 0 && strncmp(acceptor_name_buffer.value, "host/", 5) != 0) { | 
|---|
 | 54 | +                       debug("Accepting credential '%s' was not for the host service.", acceptor_name_buffer.value); | 
|---|
 | 55 | +                       ctx->major = GSS_S_BAD_NAME; | 
|---|
 | 56 | +               }  | 
|---|
 | 57 | +       } | 
|---|
 | 58 | +       gss_release_buffer(&status, &acceptor_name_buffer); | 
|---|
 | 59 | +       gss_release_name(&status, &acceptor_name); | 
|---|
 | 60 |         status = ctx->major; | 
|---|
 | 61 |   | 
|---|
 | 62 |         /* Now, if we're complete and we have the right flags, then | 
|---|