|
|
6611fc |
From 70a144cc53d09b56aa088fa1f6d433acea31afa7 Mon Sep 17 00:00:00 2001
|
|
|
6611fc |
From: Alexander Bokovoy <abokovoy@redhat.com>
|
|
|
6611fc |
Date: Tue, 15 Sep 2015 12:21:22 +0300
|
|
|
6611fc |
Subject: [PATCH] gssapi: use per-connection mutex where possible
|
|
|
6611fc |
|
|
|
6611fc |
If the same application uses SASL GSSAPI for both client and server operations,
|
|
|
6611fc |
it may be possible to deadlock in plugins/gssapi.c due to use of a
|
|
|
6611fc |
global mutex by both client and server code. Multiple outstanding connections should
|
|
|
6611fc |
be possible, thus introduce per-context locking and use it where it
|
|
|
6611fc |
makes sense. Note that there are still multiple places where context is
|
|
|
6611fc |
not available and where a global lock should be in use.
|
|
|
6611fc |
|
|
|
6611fc |
Fixes https://bugzilla.redhat.com/show_bug.cgi?id=1263017
|
|
|
6611fc |
---
|
|
|
6611fc |
plugins/gssapi.c | 225 +++++++++++++++++++++++++++++++------------------------
|
|
|
6611fc |
1 file changed, 126 insertions(+), 99 deletions(-)
|
|
|
6611fc |
|
|
|
6611fc |
diff --git a/plugins/gssapi.c b/plugins/gssapi.c
|
|
|
6611fc |
index 2fd1b3b..f5d3354 100644
|
|
|
6611fc |
--- a/plugins/gssapi.c
|
|
|
6611fc |
+++ b/plugins/gssapi.c
|
|
|
6611fc |
@@ -126,20 +126,29 @@ extern gss_OID gss_nt_service_name;
|
|
|
6611fc |
*/
|
|
|
6611fc |
|
|
|
6611fc |
#ifdef GSS_USE_MUTEXES
|
|
|
6611fc |
-#define GSS_LOCK_MUTEX(utils) \
|
|
|
6611fc |
- if(((sasl_utils_t *)(utils))->mutex_lock(gss_mutex) != 0) { \
|
|
|
6611fc |
+#define GSS_LOCK_MUTEX_EXT(utils, mutex) \
|
|
|
6611fc |
+ if(((sasl_utils_t *)(utils))->mutex_lock(mutex) != 0) { \
|
|
|
6611fc |
return SASL_FAIL; \
|
|
|
6611fc |
}
|
|
|
6611fc |
|
|
|
6611fc |
-#define GSS_UNLOCK_MUTEX(utils) \
|
|
|
6611fc |
- if(((sasl_utils_t *)(utils))->mutex_unlock(gss_mutex) != 0) { \
|
|
|
6611fc |
+#define GSS_UNLOCK_MUTEX_EXT(utils, mutex) \
|
|
|
6611fc |
+ if(((sasl_utils_t *)(utils))->mutex_unlock(mutex) != 0) { \
|
|
|
6611fc |
return SASL_FAIL; \
|
|
|
6611fc |
}
|
|
|
6611fc |
|
|
|
6611fc |
+#define GSS_LOCK_MUTEX(utils) GSS_LOCK_MUTEX_EXT(utils, gss_mutex)
|
|
|
6611fc |
+#define GSS_UNLOCK_MUTEX(utils) GSS_UNLOCK_MUTEX_EXT(utils, gss_mutex)
|
|
|
6611fc |
+
|
|
|
6611fc |
+#define GSS_LOCK_MUTEX_CTX(utils, ctx) GSS_LOCK_MUTEX_EXT(utils, (ctx)->ctx_mutex)
|
|
|
6611fc |
+#define GSS_UNLOCK_MUTEX_CTX(utils, ctx) GSS_UNLOCK_MUTEX_EXT(utils, (ctx)->ctx_mutex)
|
|
|
6611fc |
+
|
|
|
6611fc |
+
|
|
|
6611fc |
static void *gss_mutex = NULL;
|
|
|
6611fc |
#else
|
|
|
6611fc |
#define GSS_LOCK_MUTEX(utils)
|
|
|
6611fc |
#define GSS_UNLOCK_MUTEX(utils)
|
|
|
6611fc |
+#define GSS_LOCK_MUTEX_CTX(utils, ctx)
|
|
|
6611fc |
+#define GSS_UNLOCK_MUTEX_CTX(utils, ctx)
|
|
|
6611fc |
#endif
|
|
|
6611fc |
|
|
|
6611fc |
typedef struct context {
|
|
|
6611fc |
@@ -176,6 +185,7 @@ typedef struct context {
|
|
|
6611fc |
|
|
|
6611fc |
char *authid; /* hold the authid between steps - server */
|
|
|
6611fc |
const char *user; /* hold the userid between steps - client */
|
|
|
6611fc |
+ void *ctx_mutex; /* A per-context mutex */
|
|
|
6611fc |
} context_t;
|
|
|
6611fc |
|
|
|
6611fc |
enum {
|
|
|
6611fc |
@@ -355,7 +365,7 @@ sasl_gss_encode(void *context, const struct iovec *invec, unsigned numiov,
|
|
|
6611fc |
output_token->value = NULL;
|
|
|
6611fc |
output_token->length = 0;
|
|
|
6611fc |
|
|
|
6611fc |
- GSS_LOCK_MUTEX(text->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(text->utils, text);
|
|
|
6611fc |
maj_stat = gss_wrap (&min_stat,
|
|
|
6611fc |
text->gss_ctx,
|
|
|
6611fc |
privacy,
|
|
|
6611fc |
@@ -363,14 +373,14 @@ sasl_gss_encode(void *context, const struct iovec *invec, unsigned numiov,
|
|
|
6611fc |
input_token,
|
|
|
6611fc |
NULL,
|
|
|
6611fc |
output_token);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(text->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(text->utils, text);
|
|
|
6611fc |
|
|
|
6611fc |
if (GSS_ERROR(maj_stat)) {
|
|
|
6611fc |
sasl_gss_seterror(text->utils, maj_stat, min_stat);
|
|
|
6611fc |
if (output_token->value) {
|
|
|
6611fc |
- GSS_LOCK_MUTEX(text->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(text->utils, text);
|
|
|
6611fc |
gss_release_buffer(&min_stat, output_token);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(text->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(text->utils, text);
|
|
|
6611fc |
}
|
|
|
6611fc |
return SASL_FAIL;
|
|
|
6611fc |
}
|
|
|
6611fc |
@@ -384,9 +394,9 @@ sasl_gss_encode(void *context, const struct iovec *invec, unsigned numiov,
|
|
|
6611fc |
output_token->length + 4);
|
|
|
6611fc |
|
|
|
6611fc |
if (ret != SASL_OK) {
|
|
|
6611fc |
- GSS_LOCK_MUTEX(text->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(text->utils, text);
|
|
|
6611fc |
gss_release_buffer(&min_stat, output_token);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(text->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(text->utils, text);
|
|
|
6611fc |
return ret;
|
|
|
6611fc |
}
|
|
|
6611fc |
|
|
|
6611fc |
@@ -407,9 +417,9 @@ sasl_gss_encode(void *context, const struct iovec *invec, unsigned numiov,
|
|
|
6611fc |
*output = text->encode_buf;
|
|
|
6611fc |
|
|
|
6611fc |
if (output_token->value) {
|
|
|
6611fc |
- GSS_LOCK_MUTEX(text->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(text->utils, text);
|
|
|
6611fc |
gss_release_buffer(&min_stat, output_token);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(text->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(text->utils, text);
|
|
|
6611fc |
}
|
|
|
6611fc |
|
|
|
6611fc |
return SASL_OK;
|
|
|
6611fc |
@@ -455,21 +465,21 @@ gssapi_decode_packet(void *context,
|
|
|
6611fc |
output_token->value = NULL;
|
|
|
6611fc |
output_token->length = 0;
|
|
|
6611fc |
|
|
|
6611fc |
- GSS_LOCK_MUTEX(text->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(text->utils, text);
|
|
|
6611fc |
maj_stat = gss_unwrap (&min_stat,
|
|
|
6611fc |
text->gss_ctx,
|
|
|
6611fc |
input_token,
|
|
|
6611fc |
output_token,
|
|
|
6611fc |
NULL,
|
|
|
6611fc |
NULL);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(text->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(text->utils, text);
|
|
|
6611fc |
|
|
|
6611fc |
if (GSS_ERROR(maj_stat)) {
|
|
|
6611fc |
sasl_gss_seterror(text->utils,maj_stat,min_stat);
|
|
|
6611fc |
if (output_token->value) {
|
|
|
6611fc |
- GSS_LOCK_MUTEX(text->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(text->utils, text);
|
|
|
6611fc |
gss_release_buffer(&min_stat, output_token);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(text->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(text->utils, text);
|
|
|
6611fc |
}
|
|
|
6611fc |
return SASL_FAIL;
|
|
|
6611fc |
}
|
|
|
6611fc |
@@ -484,17 +494,17 @@ gssapi_decode_packet(void *context,
|
|
|
6611fc |
&text->decode_once_buf_len,
|
|
|
6611fc |
*outputlen);
|
|
|
6611fc |
if (result != SASL_OK) {
|
|
|
6611fc |
- GSS_LOCK_MUTEX(text->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(text->utils, text);
|
|
|
6611fc |
gss_release_buffer(&min_stat, output_token);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(text->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(text->utils, text);
|
|
|
6611fc |
return result;
|
|
|
6611fc |
}
|
|
|
6611fc |
*output = text->decode_once_buf;
|
|
|
6611fc |
memcpy(*output, output_token->value, *outputlen);
|
|
|
6611fc |
}
|
|
|
6611fc |
- GSS_LOCK_MUTEX(text->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(text->utils, text);
|
|
|
6611fc |
gss_release_buffer(&min_stat, output_token);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(text->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(text->utils, text);
|
|
|
6611fc |
}
|
|
|
6611fc |
|
|
|
6611fc |
return SASL_OK;
|
|
|
6611fc |
@@ -525,7 +535,14 @@ static context_t *sasl_gss_new_context(const sasl_utils_t *utils)
|
|
|
6611fc |
|
|
|
6611fc |
memset(ret,0,sizeof(context_t));
|
|
|
6611fc |
ret->utils = utils;
|
|
|
6611fc |
-
|
|
|
6611fc |
+#ifdef GSS_USE_MUTEXES
|
|
|
6611fc |
+ ret->ctx_mutex = utils->mutex_alloc();
|
|
|
6611fc |
+ if (!ret->ctx_mutex) {
|
|
|
6611fc |
+ utils->free(ret);
|
|
|
6611fc |
+ return NULL;
|
|
|
6611fc |
+ }
|
|
|
6611fc |
+#endif
|
|
|
6611fc |
+
|
|
|
6611fc |
return ret;
|
|
|
6611fc |
}
|
|
|
6611fc |
|
|
|
6611fc |
@@ -535,7 +552,11 @@ static int sasl_gss_free_context_contents(context_t *text)
|
|
|
6611fc |
|
|
|
6611fc |
if (!text) return SASL_OK;
|
|
|
6611fc |
|
|
|
6611fc |
- GSS_LOCK_MUTEX(text->utils);
|
|
|
6611fc |
+#ifdef GSS_USE_MUTEXES
|
|
|
6611fc |
+ if (text->ctx_mutex) {
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(text->utils, text);
|
|
|
6611fc |
+ }
|
|
|
6611fc |
+#endif
|
|
|
6611fc |
|
|
|
6611fc |
if (text->gss_ctx != GSS_C_NO_CONTEXT) {
|
|
|
6611fc |
maj_stat = gss_delete_sec_context(&min_stat,&text->gss_ctx,
|
|
|
6611fc |
@@ -563,8 +584,6 @@ static int sasl_gss_free_context_contents(context_t *text)
|
|
|
6611fc |
text->client_creds = GSS_C_NO_CREDENTIAL;
|
|
|
6611fc |
}
|
|
|
6611fc |
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(text->utils);
|
|
|
6611fc |
-
|
|
|
6611fc |
if (text->out_buf) {
|
|
|
6611fc |
text->utils->free(text->out_buf);
|
|
|
6611fc |
text->out_buf = NULL;
|
|
|
6611fc |
@@ -598,6 +617,14 @@ static int sasl_gss_free_context_contents(context_t *text)
|
|
|
6611fc |
text->authid = NULL;
|
|
|
6611fc |
}
|
|
|
6611fc |
|
|
|
6611fc |
+#ifdef GSS_USE_MUTEXES
|
|
|
6611fc |
+ if (text->ctx_mutex) {
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(text->utils, text);
|
|
|
6611fc |
+ text->utils->mutex_free(text->ctx_mutex);
|
|
|
6611fc |
+ text->ctx_mutex = NULL;
|
|
|
6611fc |
+ }
|
|
|
6611fc |
+#endif
|
|
|
6611fc |
+
|
|
|
6611fc |
return SASL_OK;
|
|
|
6611fc |
|
|
|
6611fc |
}
|
|
|
6611fc |
@@ -692,12 +719,12 @@ gssapi_server_mech_authneg(context_t *text,
|
|
|
6611fc |
}
|
|
|
6611fc |
sprintf(name_token.value,"%s@%s", params->service, params->serverFQDN);
|
|
|
6611fc |
|
|
|
6611fc |
- GSS_LOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
maj_stat = gss_import_name (&min_stat,
|
|
|
6611fc |
&name_token,
|
|
|
6611fc |
GSS_C_NT_HOSTBASED_SERVICE,
|
|
|
6611fc |
&text->server_name);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
|
|
|
6611fc |
params->utils->free(name_token.value);
|
|
|
6611fc |
name_token.value = NULL;
|
|
|
6611fc |
@@ -709,15 +736,15 @@ gssapi_server_mech_authneg(context_t *text,
|
|
|
6611fc |
}
|
|
|
6611fc |
|
|
|
6611fc |
if ( text->server_creds != GSS_C_NO_CREDENTIAL) {
|
|
|
6611fc |
- GSS_LOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
maj_stat = gss_release_cred(&min_stat, &text->server_creds);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
text->server_creds = GSS_C_NO_CREDENTIAL;
|
|
|
6611fc |
}
|
|
|
6611fc |
|
|
|
6611fc |
/* If caller didn't provide creds already */
|
|
|
6611fc |
if ( server_creds == GSS_C_NO_CREDENTIAL) {
|
|
|
6611fc |
- GSS_LOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
maj_stat = gss_acquire_cred(&min_stat,
|
|
|
6611fc |
text->server_name,
|
|
|
6611fc |
GSS_C_INDEFINITE,
|
|
|
6611fc |
@@ -726,7 +753,7 @@ gssapi_server_mech_authneg(context_t *text,
|
|
|
6611fc |
&text->server_creds,
|
|
|
6611fc |
NULL,
|
|
|
6611fc |
NULL);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
|
|
|
6611fc |
if (GSS_ERROR(maj_stat)) {
|
|
|
6611fc |
sasl_gss_seterror(text->utils, maj_stat, min_stat);
|
|
|
6611fc |
@@ -743,7 +770,7 @@ gssapi_server_mech_authneg(context_t *text,
|
|
|
6611fc |
}
|
|
|
6611fc |
|
|
|
6611fc |
|
|
|
6611fc |
- GSS_LOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
maj_stat =
|
|
|
6611fc |
gss_accept_sec_context(&min_stat,
|
|
|
6611fc |
&(text->gss_ctx),
|
|
|
6611fc |
@@ -756,15 +783,15 @@ gssapi_server_mech_authneg(context_t *text,
|
|
|
6611fc |
&out_flags,
|
|
|
6611fc |
NULL, /* context validity period */
|
|
|
6611fc |
&(text->client_creds));
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
|
|
|
6611fc |
if (GSS_ERROR(maj_stat)) {
|
|
|
6611fc |
sasl_gss_log(text->utils, maj_stat, min_stat);
|
|
|
6611fc |
text->utils->seterror(text->utils->conn, SASL_NOLOG, "GSSAPI Failure: gss_accept_sec_context");
|
|
|
6611fc |
if (output_token->value) {
|
|
|
6611fc |
- GSS_LOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
gss_release_buffer(&min_stat, output_token);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
}
|
|
|
6611fc |
sasl_gss_free_context_contents(text);
|
|
|
6611fc |
return SASL_BADAUTH;
|
|
|
6611fc |
@@ -778,18 +805,18 @@ gssapi_server_mech_authneg(context_t *text,
|
|
|
6611fc |
ret = _plug_buf_alloc(text->utils, &(text->out_buf),
|
|
|
6611fc |
&(text->out_buf_len), *serveroutlen);
|
|
|
6611fc |
if(ret != SASL_OK) {
|
|
|
6611fc |
- GSS_LOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
gss_release_buffer(&min_stat, output_token);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
return ret;
|
|
|
6611fc |
}
|
|
|
6611fc |
memcpy(text->out_buf, output_token->value, *serveroutlen);
|
|
|
6611fc |
*serverout = text->out_buf;
|
|
|
6611fc |
}
|
|
|
6611fc |
|
|
|
6611fc |
- GSS_LOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
gss_release_buffer(&min_stat, output_token);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
} else {
|
|
|
6611fc |
/* No output token, send an empty string */
|
|
|
6611fc |
*serverout = GSSAPI_BLANK_STRING;
|
|
|
6611fc |
@@ -832,12 +859,12 @@ gssapi_server_mech_authneg(context_t *text,
|
|
|
6611fc |
/* continue with authentication */
|
|
|
6611fc |
}
|
|
|
6611fc |
|
|
|
6611fc |
- GSS_LOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
maj_stat = gss_canonicalize_name(&min_stat,
|
|
|
6611fc |
text->client_name,
|
|
|
6611fc |
mech_type,
|
|
|
6611fc |
&client_name_MN);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
|
|
|
6611fc |
if (GSS_ERROR(maj_stat)) {
|
|
|
6611fc |
SETERROR(text->utils, "GSSAPI Failure: gss_canonicalize_name");
|
|
|
6611fc |
@@ -848,12 +875,12 @@ gssapi_server_mech_authneg(context_t *text,
|
|
|
6611fc |
name_token.value = NULL;
|
|
|
6611fc |
name_without_realm.value = NULL;
|
|
|
6611fc |
|
|
|
6611fc |
- GSS_LOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
maj_stat = gss_display_name (&min_stat,
|
|
|
6611fc |
client_name_MN,
|
|
|
6611fc |
&name_token,
|
|
|
6611fc |
NULL);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
|
|
|
6611fc |
if (GSS_ERROR(maj_stat)) {
|
|
|
6611fc |
SETERROR(text->utils, "GSSAPI Failure: gss_display_name");
|
|
|
6611fc |
@@ -883,7 +910,7 @@ gssapi_server_mech_authneg(context_t *text,
|
|
|
6611fc |
|
|
|
6611fc |
name_without_realm.length = strlen( (char *) name_without_realm.value );
|
|
|
6611fc |
|
|
|
6611fc |
- GSS_LOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
maj_stat = gss_import_name (&min_stat,
|
|
|
6611fc |
&name_without_realm,
|
|
|
6611fc |
/* Solaris 8/9 gss_import_name doesn't accept GSS_C_NULL_OID here,
|
|
|
6611fc |
@@ -894,7 +921,7 @@ gssapi_server_mech_authneg(context_t *text,
|
|
|
6611fc |
GSS_C_NULL_OID,
|
|
|
6611fc |
#endif
|
|
|
6611fc |
&without);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
|
|
|
6611fc |
if (GSS_ERROR(maj_stat)) {
|
|
|
6611fc |
SETERROR(text->utils, "GSSAPI Failure: gss_import_name");
|
|
|
6611fc |
@@ -903,12 +930,12 @@ gssapi_server_mech_authneg(context_t *text,
|
|
|
6611fc |
goto cleanup;
|
|
|
6611fc |
}
|
|
|
6611fc |
|
|
|
6611fc |
- GSS_LOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
maj_stat = gss_compare_name(&min_stat,
|
|
|
6611fc |
client_name_MN,
|
|
|
6611fc |
without,
|
|
|
6611fc |
&equal);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
|
|
|
6611fc |
if (GSS_ERROR(maj_stat)) {
|
|
|
6611fc |
SETERROR(text->utils, "GSSAPI Failure: gss_compare_name");
|
|
|
6611fc |
@@ -1053,7 +1080,7 @@ gssapi_server_mech_ssfcap(context_t *text,
|
|
|
6611fc |
real_input_token.value = (void *)sasldata;
|
|
|
6611fc |
real_input_token.length = 4;
|
|
|
6611fc |
|
|
|
6611fc |
- GSS_LOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
maj_stat = gss_wrap(&min_stat,
|
|
|
6611fc |
text->gss_ctx,
|
|
|
6611fc |
0, /* Just integrity checking here */
|
|
|
6611fc |
@@ -1061,14 +1088,14 @@ gssapi_server_mech_ssfcap(context_t *text,
|
|
|
6611fc |
input_token,
|
|
|
6611fc |
NULL,
|
|
|
6611fc |
output_token);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
|
|
|
6611fc |
if (GSS_ERROR(maj_stat)) {
|
|
|
6611fc |
sasl_gss_seterror(text->utils, maj_stat, min_stat);
|
|
|
6611fc |
if (output_token->value) {
|
|
|
6611fc |
- GSS_LOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
gss_release_buffer(&min_stat, output_token);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
}
|
|
|
6611fc |
sasl_gss_free_context_contents(text);
|
|
|
6611fc |
return SASL_FAIL;
|
|
|
6611fc |
@@ -1082,18 +1109,18 @@ gssapi_server_mech_ssfcap(context_t *text,
|
|
|
6611fc |
ret = _plug_buf_alloc(text->utils, &(text->out_buf),
|
|
|
6611fc |
&(text->out_buf_len), *serveroutlen);
|
|
|
6611fc |
if(ret != SASL_OK) {
|
|
|
6611fc |
- GSS_LOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
gss_release_buffer(&min_stat, output_token);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
return ret;
|
|
|
6611fc |
}
|
|
|
6611fc |
memcpy(text->out_buf, output_token->value, *serveroutlen);
|
|
|
6611fc |
*serverout = text->out_buf;
|
|
|
6611fc |
}
|
|
|
6611fc |
|
|
|
6611fc |
- GSS_LOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
gss_release_buffer(&min_stat, output_token);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
}
|
|
|
6611fc |
|
|
|
6611fc |
/* Wait for ssf request and authid */
|
|
|
6611fc |
@@ -1124,14 +1151,14 @@ gssapi_server_mech_ssfreq(context_t *text,
|
|
|
6611fc |
real_input_token.value = (void *)clientin;
|
|
|
6611fc |
real_input_token.length = clientinlen;
|
|
|
6611fc |
|
|
|
6611fc |
- GSS_LOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
maj_stat = gss_unwrap(&min_stat,
|
|
|
6611fc |
text->gss_ctx,
|
|
|
6611fc |
input_token,
|
|
|
6611fc |
output_token,
|
|
|
6611fc |
NULL,
|
|
|
6611fc |
NULL);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
|
|
|
6611fc |
if (GSS_ERROR(maj_stat)) {
|
|
|
6611fc |
sasl_gss_seterror(text->utils, maj_stat, min_stat);
|
|
|
6611fc |
@@ -1142,9 +1169,9 @@ gssapi_server_mech_ssfreq(context_t *text,
|
|
|
6611fc |
if (output_token->length < 4) {
|
|
|
6611fc |
SETERROR(text->utils,
|
|
|
6611fc |
"token too short");
|
|
|
6611fc |
- GSS_LOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
gss_release_buffer(&min_stat, output_token);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
sasl_gss_free_context_contents(text);
|
|
|
6611fc |
return SASL_FAIL;
|
|
|
6611fc |
}
|
|
|
6611fc |
@@ -1175,9 +1202,9 @@ gssapi_server_mech_ssfreq(context_t *text,
|
|
|
6611fc |
/* Mark that we attempted negotiation */
|
|
|
6611fc |
oparams->mech_ssf = 2;
|
|
|
6611fc |
if (output_token->value) {
|
|
|
6611fc |
- GSS_LOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
gss_release_buffer(&min_stat, output_token);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
}
|
|
|
6611fc |
sasl_gss_free_context_contents(text);
|
|
|
6611fc |
return SASL_FAIL;
|
|
|
6611fc |
@@ -1221,9 +1248,9 @@ gssapi_server_mech_ssfreq(context_t *text,
|
|
|
6611fc |
}
|
|
|
6611fc |
}
|
|
|
6611fc |
|
|
|
6611fc |
- GSS_LOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
gss_release_buffer(&min_stat, output_token);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
|
|
|
6611fc |
text->state = SASL_GSSAPI_STATE_AUTHENTICATED;
|
|
|
6611fc |
|
|
|
6611fc |
@@ -1547,12 +1574,12 @@ static int gssapi_client_mech_step(void *conn_context,
|
|
|
6611fc |
|
|
|
6611fc |
sprintf(name_token.value,"%s@%s", params->service, params->serverFQDN);
|
|
|
6611fc |
|
|
|
6611fc |
- GSS_LOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
maj_stat = gss_import_name (&min_stat,
|
|
|
6611fc |
&name_token,
|
|
|
6611fc |
GSS_C_NT_HOSTBASED_SERVICE,
|
|
|
6611fc |
&text->server_name);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
|
|
|
6611fc |
params->utils->free(name_token.value);
|
|
|
6611fc |
name_token.value = NULL;
|
|
|
6611fc |
@@ -1576,9 +1603,9 @@ static int gssapi_client_mech_step(void *conn_context,
|
|
|
6611fc |
* and no input from the server. However, thanks to Imap,
|
|
|
6611fc |
* which discards our first output, this happens all the time.
|
|
|
6611fc |
* Throw away the context and try again. */
|
|
|
6611fc |
- GSS_LOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
maj_stat = gss_delete_sec_context (&min_stat,&text->gss_ctx,GSS_C_NO_BUFFER);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
text->gss_ctx = GSS_C_NO_CONTEXT;
|
|
|
6611fc |
}
|
|
|
6611fc |
|
|
|
6611fc |
@@ -1600,7 +1627,7 @@ static int gssapi_client_mech_step(void *conn_context,
|
|
|
6611fc |
req_flags = req_flags | GSS_C_DELEG_FLAG;
|
|
|
6611fc |
}
|
|
|
6611fc |
|
|
|
6611fc |
- GSS_LOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
maj_stat = gss_init_sec_context(&min_stat,
|
|
|
6611fc |
client_creds, /* GSS_C_NO_CREDENTIAL */
|
|
|
6611fc |
&text->gss_ctx,
|
|
|
6611fc |
@@ -1614,14 +1641,14 @@ static int gssapi_client_mech_step(void *conn_context,
|
|
|
6611fc |
output_token,
|
|
|
6611fc |
&out_req_flags,
|
|
|
6611fc |
NULL);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
|
|
|
6611fc |
if (GSS_ERROR(maj_stat)) {
|
|
|
6611fc |
sasl_gss_seterror(text->utils, maj_stat, min_stat);
|
|
|
6611fc |
if (output_token->value) {
|
|
|
6611fc |
- GSS_LOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
gss_release_buffer(&min_stat, output_token);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
}
|
|
|
6611fc |
sasl_gss_free_context_contents(text);
|
|
|
6611fc |
return SASL_FAIL;
|
|
|
6611fc |
@@ -1652,22 +1679,22 @@ static int gssapi_client_mech_step(void *conn_context,
|
|
|
6611fc |
ret = _plug_buf_alloc(text->utils, &(text->out_buf),
|
|
|
6611fc |
&(text->out_buf_len), *clientoutlen);
|
|
|
6611fc |
if(ret != SASL_OK) {
|
|
|
6611fc |
- GSS_LOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
gss_release_buffer(&min_stat, output_token);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
return ret;
|
|
|
6611fc |
}
|
|
|
6611fc |
memcpy(text->out_buf, output_token->value, *clientoutlen);
|
|
|
6611fc |
*clientout = text->out_buf;
|
|
|
6611fc |
}
|
|
|
6611fc |
|
|
|
6611fc |
- GSS_LOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
gss_release_buffer(&min_stat, output_token);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
}
|
|
|
6611fc |
|
|
|
6611fc |
if (maj_stat == GSS_S_COMPLETE) {
|
|
|
6611fc |
- GSS_LOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
maj_stat = gss_inquire_context(&min_stat,
|
|
|
6611fc |
text->gss_ctx,
|
|
|
6611fc |
&text->client_name,
|
|
|
6611fc |
@@ -1678,7 +1705,7 @@ static int gssapi_client_mech_step(void *conn_context,
|
|
|
6611fc |
NULL, /* flags */
|
|
|
6611fc |
NULL, /* local init */
|
|
|
6611fc |
NULL); /* open */
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
|
|
|
6611fc |
if (GSS_ERROR(maj_stat)) {
|
|
|
6611fc |
sasl_gss_seterror(text->utils, maj_stat, min_stat);
|
|
|
6611fc |
@@ -1687,18 +1714,18 @@ static int gssapi_client_mech_step(void *conn_context,
|
|
|
6611fc |
}
|
|
|
6611fc |
|
|
|
6611fc |
name_token.length = 0;
|
|
|
6611fc |
- GSS_LOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
maj_stat = gss_display_name(&min_stat,
|
|
|
6611fc |
text->client_name,
|
|
|
6611fc |
&name_token,
|
|
|
6611fc |
NULL);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
|
|
|
6611fc |
if (GSS_ERROR(maj_stat)) {
|
|
|
6611fc |
if (name_token.value) {
|
|
|
6611fc |
- GSS_LOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
gss_release_buffer(&min_stat, &name_token);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
}
|
|
|
6611fc |
SETERROR(text->utils, "GSSAPI Failure");
|
|
|
6611fc |
sasl_gss_free_context_contents(text);
|
|
|
6611fc |
@@ -1719,9 +1746,9 @@ static int gssapi_client_mech_step(void *conn_context,
|
|
|
6611fc |
SASL_CU_AUTHID | SASL_CU_AUTHZID,
|
|
|
6611fc |
oparams);
|
|
|
6611fc |
}
|
|
|
6611fc |
- GSS_LOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
gss_release_buffer(&min_stat, &name_token);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
|
|
|
6611fc |
if (ret != SASL_OK) return ret;
|
|
|
6611fc |
|
|
|
6611fc |
@@ -1747,32 +1774,32 @@ static int gssapi_client_mech_step(void *conn_context,
|
|
|
6611fc |
real_input_token.value = (void *) serverin;
|
|
|
6611fc |
real_input_token.length = serverinlen;
|
|
|
6611fc |
|
|
|
6611fc |
- GSS_LOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
maj_stat = gss_unwrap(&min_stat,
|
|
|
6611fc |
text->gss_ctx,
|
|
|
6611fc |
input_token,
|
|
|
6611fc |
output_token,
|
|
|
6611fc |
NULL,
|
|
|
6611fc |
NULL);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
|
|
|
6611fc |
if (GSS_ERROR(maj_stat)) {
|
|
|
6611fc |
sasl_gss_seterror(text->utils, maj_stat, min_stat);
|
|
|
6611fc |
- sasl_gss_free_context_contents(text);
|
|
|
6611fc |
if (output_token->value) {
|
|
|
6611fc |
- GSS_LOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
gss_release_buffer(&min_stat, output_token);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
}
|
|
|
6611fc |
+ sasl_gss_free_context_contents(text);
|
|
|
6611fc |
return SASL_FAIL;
|
|
|
6611fc |
}
|
|
|
6611fc |
|
|
|
6611fc |
if (output_token->length != 4) {
|
|
|
6611fc |
SETERROR(text->utils,
|
|
|
6611fc |
(output_token->length < 4) ? "token too short" : "token too long");
|
|
|
6611fc |
- GSS_LOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
gss_release_buffer(&min_stat, output_token);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
sasl_gss_free_context_contents(text);
|
|
|
6611fc |
return SASL_FAIL;
|
|
|
6611fc |
}
|
|
|
6611fc |
@@ -1873,9 +1900,9 @@ static int gssapi_client_mech_step(void *conn_context,
|
|
|
6611fc |
}
|
|
|
6611fc |
}
|
|
|
6611fc |
|
|
|
6611fc |
- GSS_LOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
gss_release_buffer(&min_stat, output_token);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
|
|
|
6611fc |
/* oparams->user is always set, due to canon_user requirements.
|
|
|
6611fc |
* Make sure the client actually requested it though, by checking
|
|
|
6611fc |
@@ -1921,7 +1948,7 @@ static int gssapi_client_mech_step(void *conn_context,
|
|
|
6611fc |
}
|
|
|
6611fc |
((unsigned char *)input_token->value)[0] = mychoice;
|
|
|
6611fc |
|
|
|
6611fc |
- GSS_LOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
maj_stat = gss_wrap (&min_stat,
|
|
|
6611fc |
text->gss_ctx,
|
|
|
6611fc |
0, /* Just integrity checking here */
|
|
|
6611fc |
@@ -1929,7 +1956,7 @@ static int gssapi_client_mech_step(void *conn_context,
|
|
|
6611fc |
input_token,
|
|
|
6611fc |
NULL,
|
|
|
6611fc |
output_token);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
|
|
|
6611fc |
params->utils->free(input_token->value);
|
|
|
6611fc |
input_token->value = NULL;
|
|
|
6611fc |
@@ -1937,9 +1964,9 @@ static int gssapi_client_mech_step(void *conn_context,
|
|
|
6611fc |
if (GSS_ERROR(maj_stat)) {
|
|
|
6611fc |
sasl_gss_seterror(text->utils, maj_stat, min_stat);
|
|
|
6611fc |
if (output_token->value) {
|
|
|
6611fc |
- GSS_LOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
gss_release_buffer(&min_stat, output_token);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
}
|
|
|
6611fc |
sasl_gss_free_context_contents(text);
|
|
|
6611fc |
return SASL_FAIL;
|
|
|
6611fc |
@@ -1955,18 +1982,18 @@ static int gssapi_client_mech_step(void *conn_context,
|
|
|
6611fc |
&(text->out_buf_len),
|
|
|
6611fc |
*clientoutlen);
|
|
|
6611fc |
if (ret != SASL_OK) {
|
|
|
6611fc |
- GSS_LOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
gss_release_buffer(&min_stat, output_token);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
return ret;
|
|
|
6611fc |
}
|
|
|
6611fc |
memcpy(text->out_buf, output_token->value, *clientoutlen);
|
|
|
6611fc |
*clientout = text->out_buf;
|
|
|
6611fc |
}
|
|
|
6611fc |
|
|
|
6611fc |
- GSS_LOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_LOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
gss_release_buffer(&min_stat, output_token);
|
|
|
6611fc |
- GSS_UNLOCK_MUTEX(params->utils);
|
|
|
6611fc |
+ GSS_UNLOCK_MUTEX_CTX(params->utils, text);
|
|
|
6611fc |
|
|
|
6611fc |
}
|
|
|
6611fc |
|
|
|
6611fc |
--
|
|
|
6611fc |
2.4.3
|
|
|
6611fc |
|
|
|
6611fc |
|