summaryrefslogtreecommitdiffstats
path: root/src
diff options
context:
space:
mode:
authorNathaniel McCallum <npmccallum@redhat.com>2012-10-16 12:40:15 -0400
committerGreg Hudson <ghudson@mit.edu>2012-10-16 12:54:21 -0400
commitaac9c2a047467dd18f53b0ae940aa30f1c0ae216 (patch)
tree5684de526790c30d838a6859e7f2c28e6105a681 /src
parent432c3e624e942d55252d3b0b7e5277d6fdd1e5b4 (diff)
downloadkrb5-aac9c2a047467dd18f53b0ae940aa30f1c0ae216.tar.gz
krb5-aac9c2a047467dd18f53b0ae940aa30f1c0ae216.tar.xz
krb5-aac9c2a047467dd18f53b0ae940aa30f1c0ae216.zip
Handle concat OTP responder case
Diffstat (limited to 'src')
-rw-r--r--src/include/krb5/krb5.hin9
-rw-r--r--src/lib/krb5/krb/preauth_otp.c19
2 files changed, 20 insertions, 8 deletions
diff --git a/src/include/krb5/krb5.hin b/src/include/krb5/krb5.hin
index f338689f6..13ada8f78 100644
--- a/src/include/krb5/krb5.hin
+++ b/src/include/krb5/krb5.hin
@@ -6427,6 +6427,15 @@ krb5_prompter_posix(krb5_context context, void *data, const char *name,
*/
#define KRB5_RESPONDER_OTP_FLAGS_NEXTOTP (1 << 2)
+/**
+ * This flag indicates that the PIN MUST be returned as a separate item. This
+ * flag only takes effect if KRB5_RESPONDER_OTP_FLAGS_COLLECT_PIN is set. If
+ * this flag is not set, the responder may either concatenate PIN + token value
+ * and store it as "value" in the answer or it may return them separately. If
+ * they are returned separately, they will be concatenated internally.
+ */
+#define KRB5_RESPONDER_OTP_FLAGS_SEPARATE_PIN (1 << 3)
+
typedef struct krb5_responder_context_st *krb5_responder_context;
/**
diff --git a/src/lib/krb5/krb/preauth_otp.c b/src/lib/krb5/krb/preauth_otp.c
index 9a550e8e3..83c30c7ab 100644
--- a/src/lib/krb5/krb/preauth_otp.c
+++ b/src/lib/krb5/krb/preauth_otp.c
@@ -157,8 +157,11 @@ codec_encode_tokeninfo(krb5_otp_tokeninfo *ti, k5_json_object *out)
goto error;
flags = KRB5_RESPONDER_OTP_FLAGS_COLLECT_TOKEN;
- if (ti->flags & KRB5_OTP_FLAG_COLLECT_PIN)
+ if (ti->flags & KRB5_OTP_FLAG_COLLECT_PIN) {
flags |= KRB5_RESPONDER_OTP_FLAGS_COLLECT_PIN;
+ if (ti->flags & KRB5_OTP_FLAG_SEPARATE_PIN)
+ flags |= KRB5_RESPONDER_OTP_FLAGS_NEXTOTP;
+ }
if (ti->flags & KRB5_OTP_FLAG_NEXTOTP)
flags |= KRB5_RESPONDER_OTP_FLAGS_NEXTOTP;
@@ -642,16 +645,16 @@ make_request(krb5_context ctx, krb5_otp_tokeninfo *ti, const krb5_data *value,
goto error;
if (ti->flags & KRB5_OTP_FLAG_COLLECT_PIN) {
- if (pin == NULL || pin->data == NULL) {
- retval = EINVAL; /* No pin found! */
- goto error;
- }
-
if (ti->flags & KRB5_OTP_FLAG_SEPARATE_PIN) {
+ if (pin == NULL || pin->data == NULL) {
+ retval = EINVAL; /* No pin found! */
+ goto error;
+ }
+
retval = krb5int_copy_data_contents(ctx, pin, &req->pin);
if (retval != 0)
goto error;
- } else {
+ } else if (pin != NULL && pin->data != NULL) {
krb5_free_data_contents(ctx, &req->otp_value);
retval = asprintf(&req->otp_value.data, "%.*s%.*s",
pin->length, pin->data,
@@ -662,7 +665,7 @@ make_request(krb5_context ctx, krb5_otp_tokeninfo *ti, const krb5_data *value,
goto error;
}
req->otp_value.length = req->pin.length + req->otp_value.length;
- }
+ } /* Otherwise, the responder has already combined them. */
}
*out_req = req;