xref: /freebsd/crypto/heimdal/lib/krb5/ticket.c (revision 61e21613)
1 /*
2  * Copyright (c) 1997 - 2001 Kungliga Tekniska Högskolan
3  * (Royal Institute of Technology, Stockholm, Sweden).
4  * All rights reserved.
5  *
6  * Portions Copyright (c) 2009 Apple Inc. All rights reserved.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  *
12  * 1. Redistributions of source code must retain the above copyright
13  *    notice, this list of conditions and the following disclaimer.
14  *
15  * 2. Redistributions in binary form must reproduce the above copyright
16  *    notice, this list of conditions and the following disclaimer in the
17  *    documentation and/or other materials provided with the distribution.
18  *
19  * 3. Neither the name of the Institute nor the names of its contributors
20  *    may be used to endorse or promote products derived from this software
21  *    without specific prior written permission.
22  *
23  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
24  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
27  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33  * SUCH DAMAGE.
34  */
35 
36 #include "krb5_locl.h"
37 
38 /**
39  * Free ticket and content
40  *
41  * @param context a Kerberos 5 context
42  * @param ticket ticket to free
43  *
44  * @return Returns 0 to indicate success.  Otherwise an kerberos et
45  * error code is returned, see krb5_get_error_message().
46  *
47  * @ingroup krb5
48  */
49 
50 KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
51 krb5_free_ticket(krb5_context context,
52 		 krb5_ticket *ticket)
53 {
54     free_EncTicketPart(&ticket->ticket);
55     krb5_free_principal(context, ticket->client);
56     krb5_free_principal(context, ticket->server);
57     free(ticket);
58     return 0;
59 }
60 
61 /**
62  * Copy ticket and content
63  *
64  * @param context a Kerberos 5 context
65  * @param from ticket to copy
66  * @param to new copy of ticket, free with krb5_free_ticket()
67  *
68  * @return Returns 0 to indicate success.  Otherwise an kerberos et
69  * error code is returned, see krb5_get_error_message().
70  *
71  * @ingroup krb5
72  */
73 
74 KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
75 krb5_copy_ticket(krb5_context context,
76 		 const krb5_ticket *from,
77 		 krb5_ticket **to)
78 {
79     krb5_error_code ret;
80     krb5_ticket *tmp;
81 
82     *to = NULL;
83     tmp = malloc(sizeof(*tmp));
84     if(tmp == NULL) {
85 	krb5_set_error_message(context, ENOMEM,
86 			       N_("malloc: out of memory", ""));
87 	return ENOMEM;
88     }
89     if((ret = copy_EncTicketPart(&from->ticket, &tmp->ticket))){
90 	free(tmp);
91 	return ret;
92     }
93     ret = krb5_copy_principal(context, from->client, &tmp->client);
94     if(ret){
95 	free_EncTicketPart(&tmp->ticket);
96 	free(tmp);
97 	return ret;
98     }
99     ret = krb5_copy_principal(context, from->server, &tmp->server);
100     if(ret){
101 	krb5_free_principal(context, tmp->client);
102 	free_EncTicketPart(&tmp->ticket);
103 	free(tmp);
104 	return ret;
105     }
106     *to = tmp;
107     return 0;
108 }
109 
110 /**
111  * Return client principal in ticket
112  *
113  * @param context a Kerberos 5 context
114  * @param ticket ticket to copy
115  * @param client client principal, free with krb5_free_principal()
116  *
117  * @return Returns 0 to indicate success.  Otherwise an kerberos et
118  * error code is returned, see krb5_get_error_message().
119  *
120  * @ingroup krb5
121  */
122 
123 KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
124 krb5_ticket_get_client(krb5_context context,
125 		       const krb5_ticket *ticket,
126 		       krb5_principal *client)
127 {
128     return krb5_copy_principal(context, ticket->client, client);
129 }
130 
131 /**
132  * Return server principal in ticket
133  *
134  * @param context a Kerberos 5 context
135  * @param ticket ticket to copy
136  * @param server server principal, free with krb5_free_principal()
137  *
138  * @return Returns 0 to indicate success.  Otherwise an kerberos et
139  * error code is returned, see krb5_get_error_message().
140  *
141  * @ingroup krb5
142  */
143 
144 KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
145 krb5_ticket_get_server(krb5_context context,
146 		       const krb5_ticket *ticket,
147 		       krb5_principal *server)
148 {
149     return krb5_copy_principal(context, ticket->server, server);
150 }
151 
152 /**
153  * Return end time of ticket
154  *
155  * @param context a Kerberos 5 context
156  * @param ticket ticket to copy
157  *
158  * @return end time of ticket
159  *
160  * @ingroup krb5
161  */
162 
163 KRB5_LIB_FUNCTION time_t KRB5_LIB_CALL
164 krb5_ticket_get_endtime(krb5_context context,
165 			const krb5_ticket *ticket)
166 {
167     return ticket->ticket.endtime;
168 }
169 
170 /**
171  * Get the flags from the Kerberos ticket
172  *
173  * @param context Kerberos context
174  * @param ticket Kerberos ticket
175  *
176  * @return ticket flags
177  *
178  * @ingroup krb5_ticket
179  */
180 KRB5_LIB_FUNCTION unsigned long KRB5_LIB_CALL
181 krb5_ticket_get_flags(krb5_context context,
182 		      const krb5_ticket *ticket)
183 {
184     return TicketFlags2int(ticket->ticket.flags);
185 }
186 
187 static int
188 find_type_in_ad(krb5_context context,
189 		int type,
190 		krb5_data *data,
191 		krb5_boolean *found,
192 		krb5_boolean failp,
193 		krb5_keyblock *sessionkey,
194 		const AuthorizationData *ad,
195 		int level)
196 {
197     krb5_error_code ret = 0;
198     size_t i;
199 
200     if (level > 9) {
201 	ret = ENOENT; /* XXX */
202 	krb5_set_error_message(context, ret,
203 			       N_("Authorization data nested deeper "
204 				  "then %d levels, stop searching", ""),
205 			       level);
206 	goto out;
207     }
208 
209     /*
210      * Only copy out the element the first time we get to it, we need
211      * to run over the whole authorization data fields to check if
212      * there are any container clases we need to care about.
213      */
214     for (i = 0; i < ad->len; i++) {
215 	if (!*found && ad->val[i].ad_type == type) {
216 	    ret = der_copy_octet_string(&ad->val[i].ad_data, data);
217 	    if (ret) {
218 		krb5_set_error_message(context, ret,
219 				       N_("malloc: out of memory", ""));
220 		goto out;
221 	    }
222 	    *found = TRUE;
223 	    continue;
224 	}
225 	switch (ad->val[i].ad_type) {
226 	case KRB5_AUTHDATA_IF_RELEVANT: {
227 	    AuthorizationData child;
228 	    ret = decode_AuthorizationData(ad->val[i].ad_data.data,
229 					   ad->val[i].ad_data.length,
230 					   &child,
231 					   NULL);
232 	    if (ret) {
233 		krb5_set_error_message(context, ret,
234 				       N_("Failed to decode "
235 					  "IF_RELEVANT with %d", ""),
236 				       (int)ret);
237 		goto out;
238 	    }
239 	    ret = find_type_in_ad(context, type, data, found, FALSE,
240 				  sessionkey, &child, level + 1);
241 	    free_AuthorizationData(&child);
242 	    if (ret)
243 		goto out;
244 	    break;
245 	}
246 #if 0 /* XXX test */
247 	case KRB5_AUTHDATA_KDC_ISSUED: {
248 	    AD_KDCIssued child;
249 
250 	    ret = decode_AD_KDCIssued(ad->val[i].ad_data.data,
251 				      ad->val[i].ad_data.length,
252 				      &child,
253 				      NULL);
254 	    if (ret) {
255 		krb5_set_error_message(context, ret,
256 				       N_("Failed to decode "
257 					  "AD_KDCIssued with %d", ""),
258 				       ret);
259 		goto out;
260 	    }
261 	    if (failp) {
262 		krb5_boolean valid;
263 		krb5_data buf;
264 		size_t len;
265 
266 		ASN1_MALLOC_ENCODE(AuthorizationData, buf.data, buf.length,
267 				   &child.elements, &len, ret);
268 		if (ret) {
269 		    free_AD_KDCIssued(&child);
270 		    krb5_clear_error_message(context);
271 		    goto out;
272 		}
273 		if(buf.length != len)
274 		    krb5_abortx(context, "internal error in ASN.1 encoder");
275 
276 		ret = krb5_c_verify_checksum(context, sessionkey, 19, &buf,
277 					     &child.ad_checksum, &valid);
278 		krb5_data_free(&buf);
279 		if (ret) {
280 		    free_AD_KDCIssued(&child);
281 		    goto out;
282 		}
283 		if (!valid) {
284 		    krb5_clear_error_message(context);
285 		    ret = ENOENT;
286 		    free_AD_KDCIssued(&child);
287 		    goto out;
288 		}
289 	    }
290 	    ret = find_type_in_ad(context, type, data, found, failp, sessionkey,
291 				  &child.elements, level + 1);
292 	    free_AD_KDCIssued(&child);
293 	    if (ret)
294 		goto out;
295 	    break;
296 	}
297 #endif
298 	case KRB5_AUTHDATA_AND_OR:
299 	    if (!failp)
300 		break;
301 	    ret = ENOENT; /* XXX */
302 	    krb5_set_error_message(context, ret,
303 				   N_("Authorization data contains "
304 				      "AND-OR element that is unknown to the "
305 				      "application", ""));
306 	    goto out;
307 	default:
308 	    if (!failp)
309 		break;
310 	    ret = ENOENT; /* XXX */
311 	    krb5_set_error_message(context, ret,
312 				   N_("Authorization data contains "
313 				      "unknown type (%d) ", ""),
314 				   ad->val[i].ad_type);
315 	    goto out;
316 	}
317     }
318 out:
319     if (ret) {
320 	if (*found) {
321 	    krb5_data_free(data);
322 	    *found = 0;
323 	}
324     }
325     return ret;
326 }
327 
328 /**
329  * Extract the authorization data type of type from the ticket. Store
330  * the field in data. This function is to use for kerberos
331  * applications.
332  *
333  * @param context a Kerberos 5 context
334  * @param ticket Kerberos ticket
335  * @param type type to fetch
336  * @param data returned data, free with krb5_data_free()
337  *
338  * @ingroup krb5
339  */
340 
341 KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
342 krb5_ticket_get_authorization_data_type(krb5_context context,
343 					krb5_ticket *ticket,
344 					int type,
345 					krb5_data *data)
346 {
347     AuthorizationData *ad;
348     krb5_error_code ret;
349     krb5_boolean found = FALSE;
350 
351     krb5_data_zero(data);
352 
353     ad = ticket->ticket.authorization_data;
354     if (ticket->ticket.authorization_data == NULL) {
355 	krb5_set_error_message(context, ENOENT,
356 			       N_("Ticket have not authorization data", ""));
357 	return ENOENT; /* XXX */
358     }
359 
360     ret = find_type_in_ad(context, type, data, &found, TRUE,
361 			  &ticket->ticket.key, ad, 0);
362     if (ret)
363 	return ret;
364     if (!found) {
365 	krb5_set_error_message(context, ENOENT,
366 			       N_("Ticket have not "
367 				  "authorization data of type %d", ""),
368 			       type);
369 	return ENOENT; /* XXX */
370     }
371     return 0;
372 }
373 
374 static krb5_error_code
375 check_server_referral(krb5_context context,
376 		      krb5_kdc_rep *rep,
377 		      unsigned flags,
378 		      krb5_const_principal requested,
379 		      krb5_const_principal returned,
380 		      krb5_keyblock * key)
381 {
382     krb5_error_code ret;
383     PA_ServerReferralData ref;
384     krb5_crypto session;
385     EncryptedData ed;
386     size_t len;
387     krb5_data data;
388     PA_DATA *pa;
389     int i = 0, cmp;
390 
391     if (rep->kdc_rep.padata == NULL)
392 	goto noreferral;
393 
394     pa = krb5_find_padata(rep->kdc_rep.padata->val,
395 			  rep->kdc_rep.padata->len,
396 			  KRB5_PADATA_SERVER_REFERRAL, &i);
397     if (pa == NULL)
398 	goto noreferral;
399 
400     memset(&ed, 0, sizeof(ed));
401     memset(&ref, 0, sizeof(ref));
402 
403     ret = decode_EncryptedData(pa->padata_value.data,
404 			       pa->padata_value.length,
405 			       &ed, &len);
406     if (ret)
407 	return ret;
408     if (len != pa->padata_value.length) {
409 	free_EncryptedData(&ed);
410 	krb5_set_error_message(context, KRB5KRB_AP_ERR_MODIFIED,
411 			       N_("Referral EncryptedData wrong for realm %s",
412 				  "realm"), requested->realm);
413 	return KRB5KRB_AP_ERR_MODIFIED;
414     }
415 
416     ret = krb5_crypto_init(context, key, 0, &session);
417     if (ret) {
418 	free_EncryptedData(&ed);
419 	return ret;
420     }
421 
422     ret = krb5_decrypt_EncryptedData(context, session,
423 				     KRB5_KU_PA_SERVER_REFERRAL,
424 				     &ed, &data);
425     free_EncryptedData(&ed);
426     krb5_crypto_destroy(context, session);
427     if (ret)
428 	return ret;
429 
430     ret = decode_PA_ServerReferralData(data.data, data.length, &ref, &len);
431     if (ret) {
432 	krb5_data_free(&data);
433 	return ret;
434     }
435     krb5_data_free(&data);
436 
437     if (strcmp(requested->realm, returned->realm) != 0) {
438 	free_PA_ServerReferralData(&ref);
439 	krb5_set_error_message(context, KRB5KRB_AP_ERR_MODIFIED,
440 			       N_("server ref realm mismatch, "
441 				  "requested realm %s got back %s", ""),
442 			       requested->realm, returned->realm);
443 	return KRB5KRB_AP_ERR_MODIFIED;
444     }
445 
446     if (krb5_principal_is_krbtgt(context, returned)) {
447 	const char *realm = returned->name.name_string.val[1];
448 
449 	if (ref.referred_realm == NULL
450 	    || strcmp(*ref.referred_realm, realm) != 0)
451 	{
452 	    free_PA_ServerReferralData(&ref);
453 	    krb5_set_error_message(context, KRB5KRB_AP_ERR_MODIFIED,
454 				   N_("tgt returned with wrong ref", ""));
455 	    return KRB5KRB_AP_ERR_MODIFIED;
456 	}
457     } else if (krb5_principal_compare(context, returned, requested) == 0) {
458 	free_PA_ServerReferralData(&ref);
459 	krb5_set_error_message(context, KRB5KRB_AP_ERR_MODIFIED,
460 			       N_("req princ no same as returned", ""));
461 	return KRB5KRB_AP_ERR_MODIFIED;
462     }
463 
464     if (ref.requested_principal_name) {
465 	cmp = _krb5_principal_compare_PrincipalName(context,
466 						    requested,
467 						    ref.requested_principal_name);
468 	if (!cmp) {
469 	    free_PA_ServerReferralData(&ref);
470 	    krb5_set_error_message(context, KRB5KRB_AP_ERR_MODIFIED,
471 				   N_("referred principal not same "
472 				      "as requested", ""));
473 	    return KRB5KRB_AP_ERR_MODIFIED;
474 	}
475     } else if (flags & EXTRACT_TICKET_AS_REQ) {
476 	free_PA_ServerReferralData(&ref);
477 	krb5_set_error_message(context, KRB5KRB_AP_ERR_MODIFIED,
478 			       N_("Requested principal missing on AS-REQ", ""));
479 	return KRB5KRB_AP_ERR_MODIFIED;
480     }
481 
482     free_PA_ServerReferralData(&ref);
483 
484     return ret;
485 noreferral:
486     /*
487      * Expect excact match or that we got a krbtgt
488      */
489     if (krb5_principal_compare(context, requested, returned) != TRUE &&
490 	(krb5_realm_compare(context, requested, returned) != TRUE &&
491 	 krb5_principal_is_krbtgt(context, returned) != TRUE))
492     {
493 	krb5_set_error_message(context, KRB5KRB_AP_ERR_MODIFIED,
494 			       N_("Not same server principal returned "
495 				  "as requested", ""));
496 	return KRB5KRB_AP_ERR_MODIFIED;
497     }
498     return 0;
499 }
500 
501 
502 /*
503  * Verify referral data
504  */
505 
506 
507 static krb5_error_code
508 check_client_referral(krb5_context context,
509 		      krb5_kdc_rep *rep,
510 		      krb5_const_principal requested,
511 		      krb5_const_principal mapped,
512 		      krb5_keyblock const * key)
513 {
514     krb5_error_code ret;
515     PA_ClientCanonicalized canon;
516     krb5_crypto crypto;
517     krb5_data data;
518     PA_DATA *pa;
519     size_t len;
520     int i = 0;
521 
522     if (rep->kdc_rep.padata == NULL)
523 	goto noreferral;
524 
525     pa = krb5_find_padata(rep->kdc_rep.padata->val,
526 			  rep->kdc_rep.padata->len,
527 			  KRB5_PADATA_CLIENT_CANONICALIZED, &i);
528     if (pa == NULL)
529 	goto noreferral;
530 
531     ret = decode_PA_ClientCanonicalized(pa->padata_value.data,
532 					pa->padata_value.length,
533 					&canon, &len);
534     if (ret) {
535 	krb5_set_error_message(context, ret,
536 			       N_("Failed to decode ClientCanonicalized "
537 				  "from realm %s", ""), requested->realm);
538 	return ret;
539     }
540 
541     ASN1_MALLOC_ENCODE(PA_ClientCanonicalizedNames, data.data, data.length,
542 		       &canon.names, &len, ret);
543     if (ret) {
544 	free_PA_ClientCanonicalized(&canon);
545 	return ret;
546     }
547     if (data.length != len)
548 	krb5_abortx(context, "internal asn.1 error");
549 
550     ret = krb5_crypto_init(context, key, 0, &crypto);
551     if (ret) {
552 	free(data.data);
553 	free_PA_ClientCanonicalized(&canon);
554 	return ret;
555     }
556 
557     ret = krb5_verify_checksum(context, crypto, KRB5_KU_CANONICALIZED_NAMES,
558 			       data.data, data.length,
559 			       &canon.canon_checksum);
560     krb5_crypto_destroy(context, crypto);
561     free(data.data);
562     if (ret) {
563 	krb5_set_error_message(context, ret,
564 			       N_("Failed to verify client canonicalized "
565 				  "data from realm %s", ""),
566 			       requested->realm);
567 	free_PA_ClientCanonicalized(&canon);
568 	return ret;
569     }
570 
571     if (!_krb5_principal_compare_PrincipalName(context,
572 					       requested,
573 					       &canon.names.requested_name))
574     {
575 	free_PA_ClientCanonicalized(&canon);
576 	krb5_set_error_message(context, KRB5_PRINC_NOMATCH,
577 			       N_("Requested name doesn't match"
578 				  " in client referral", ""));
579 	return KRB5_PRINC_NOMATCH;
580     }
581     if (!_krb5_principal_compare_PrincipalName(context,
582 					       mapped,
583 					       &canon.names.mapped_name))
584     {
585 	free_PA_ClientCanonicalized(&canon);
586 	krb5_set_error_message(context, KRB5_PRINC_NOMATCH,
587 			       N_("Mapped name doesn't match"
588 				  " in client referral", ""));
589 	return KRB5_PRINC_NOMATCH;
590     }
591 
592     return 0;
593 
594 noreferral:
595     if (krb5_principal_compare(context, requested, mapped) == FALSE) {
596 	krb5_set_error_message(context, KRB5KRB_AP_ERR_MODIFIED,
597 			       N_("Not same client principal returned "
598 				  "as requested", ""));
599 	return KRB5KRB_AP_ERR_MODIFIED;
600     }
601     return 0;
602 }
603 
604 
605 static krb5_error_code KRB5_CALLCONV
606 decrypt_tkt (krb5_context context,
607 	     krb5_keyblock *key,
608 	     krb5_key_usage usage,
609 	     krb5_const_pointer decrypt_arg,
610 	     krb5_kdc_rep *dec_rep)
611 {
612     krb5_error_code ret;
613     krb5_data data;
614     size_t size;
615     krb5_crypto crypto;
616 
617     ret = krb5_crypto_init(context, key, 0, &crypto);
618     if (ret)
619 	return ret;
620 
621     ret = krb5_decrypt_EncryptedData (context,
622 				      crypto,
623 				      usage,
624 				      &dec_rep->kdc_rep.enc_part,
625 				      &data);
626     krb5_crypto_destroy(context, crypto);
627 
628     if (ret)
629 	return ret;
630 
631     ret = decode_EncASRepPart(data.data,
632 			      data.length,
633 			      &dec_rep->enc_part,
634 			      &size);
635     if (ret)
636 	ret = decode_EncTGSRepPart(data.data,
637 				   data.length,
638 				   &dec_rep->enc_part,
639 				   &size);
640     krb5_data_free (&data);
641     if (ret) {
642         krb5_set_error_message(context, ret,
643 			       N_("Failed to decode encpart in ticket", ""));
644 	return ret;
645     }
646     return 0;
647 }
648 
649 int
650 _krb5_extract_ticket(krb5_context context,
651 		     krb5_kdc_rep *rep,
652 		     krb5_creds *creds,
653 		     krb5_keyblock *key,
654 		     krb5_const_pointer keyseed,
655 		     krb5_key_usage key_usage,
656 		     krb5_addresses *addrs,
657 		     unsigned nonce,
658 		     unsigned flags,
659 		     krb5_decrypt_proc decrypt_proc,
660 		     krb5_const_pointer decryptarg)
661 {
662     krb5_error_code ret;
663     krb5_principal tmp_principal;
664     size_t len = 0;
665     time_t tmp_time;
666     krb5_timestamp sec_now;
667 
668     /* decrypt */
669 
670     if (decrypt_proc == NULL)
671 	decrypt_proc = decrypt_tkt;
672 
673     ret = (*decrypt_proc)(context, key, key_usage, decryptarg, rep);
674     if (ret)
675 	goto out;
676 
677     /* save session key */
678 
679     creds->session.keyvalue.length = 0;
680     creds->session.keyvalue.data   = NULL;
681     creds->session.keytype = rep->enc_part.key.keytype;
682     ret = krb5_data_copy (&creds->session.keyvalue,
683 			  rep->enc_part.key.keyvalue.data,
684 			  rep->enc_part.key.keyvalue.length);
685     if (ret) {
686 	krb5_clear_error_message(context);
687 	goto out;
688     }
689 
690     /* compare client and save */
691     ret = _krb5_principalname2krb5_principal (context,
692 					      &tmp_principal,
693 					      rep->kdc_rep.cname,
694 					      rep->kdc_rep.crealm);
695     if (ret)
696 	goto out;
697 
698     /* check client referral and save principal */
699     /* anonymous here ? */
700     if((flags & EXTRACT_TICKET_ALLOW_CNAME_MISMATCH) == 0) {
701 	ret = check_client_referral(context, rep,
702 				    creds->client,
703 				    tmp_principal,
704 				    &creds->session);
705 	if (ret) {
706 	    krb5_free_principal (context, tmp_principal);
707 	    goto out;
708 	}
709     }
710     krb5_free_principal (context, creds->client);
711     creds->client = tmp_principal;
712 
713     /* check server referral and save principal */
714     ret = _krb5_principalname2krb5_principal (context,
715 					      &tmp_principal,
716 					      rep->enc_part.sname,
717 					      rep->enc_part.srealm);
718     if (ret)
719 	goto out;
720     if((flags & EXTRACT_TICKET_ALLOW_SERVER_MISMATCH) == 0){
721 	ret = check_server_referral(context,
722 				    rep,
723 				    flags,
724 				    creds->server,
725 				    tmp_principal,
726 				    &creds->session);
727 	if (ret) {
728 	    krb5_free_principal (context, tmp_principal);
729 	    goto out;
730 	}
731     }
732     krb5_free_principal(context, creds->server);
733     creds->server = tmp_principal;
734 
735     /* verify names */
736     if(flags & EXTRACT_TICKET_MATCH_REALM){
737 	const char *srealm = krb5_principal_get_realm(context, creds->server);
738 	const char *crealm = krb5_principal_get_realm(context, creds->client);
739 
740 	if (strcmp(rep->enc_part.srealm, srealm) != 0 ||
741 	    strcmp(rep->enc_part.srealm, crealm) != 0)
742 	{
743 	    ret = KRB5KRB_AP_ERR_MODIFIED;
744 	    krb5_clear_error_message(context);
745 	    goto out;
746 	}
747     }
748 
749     /* compare nonces */
750 
751     if (nonce != (unsigned)rep->enc_part.nonce) {
752 	ret = KRB5KRB_AP_ERR_MODIFIED;
753 	krb5_set_error_message(context, ret, N_("malloc: out of memory", ""));
754 	goto out;
755     }
756 
757     /* set kdc-offset */
758 
759     krb5_timeofday (context, &sec_now);
760     if (rep->enc_part.flags.initial
761 	&& (flags & EXTRACT_TICKET_TIMESYNC)
762 	&& context->kdc_sec_offset == 0
763 	&& krb5_config_get_bool (context, NULL,
764 				 "libdefaults",
765 				 "kdc_timesync",
766 				 NULL)) {
767 	context->kdc_sec_offset = rep->enc_part.authtime - sec_now;
768 	krb5_timeofday (context, &sec_now);
769     }
770 
771     /* check all times */
772 
773     if (rep->enc_part.starttime) {
774 	tmp_time = *rep->enc_part.starttime;
775     } else
776 	tmp_time = rep->enc_part.authtime;
777 
778     if (creds->times.starttime == 0
779 	&& abs(tmp_time - sec_now) > context->max_skew) {
780 	ret = KRB5KRB_AP_ERR_SKEW;
781 	krb5_set_error_message (context, ret,
782 				N_("time skew (%d) larger than max (%d)", ""),
783 			       abs(tmp_time - sec_now),
784 			       (int)context->max_skew);
785 	goto out;
786     }
787 
788     if (creds->times.starttime != 0
789 	&& tmp_time != creds->times.starttime) {
790 	krb5_clear_error_message (context);
791 	ret = KRB5KRB_AP_ERR_MODIFIED;
792 	goto out;
793     }
794 
795     creds->times.starttime = tmp_time;
796 
797     if (rep->enc_part.renew_till) {
798 	tmp_time = *rep->enc_part.renew_till;
799     } else
800 	tmp_time = 0;
801 
802     if (creds->times.renew_till != 0
803 	&& tmp_time > creds->times.renew_till) {
804 	krb5_clear_error_message (context);
805 	ret = KRB5KRB_AP_ERR_MODIFIED;
806 	goto out;
807     }
808 
809     creds->times.renew_till = tmp_time;
810 
811     creds->times.authtime = rep->enc_part.authtime;
812 
813     if (creds->times.endtime != 0
814 	&& rep->enc_part.endtime > creds->times.endtime) {
815 	krb5_clear_error_message (context);
816 	ret = KRB5KRB_AP_ERR_MODIFIED;
817 	goto out;
818     }
819 
820     creds->times.endtime  = rep->enc_part.endtime;
821 
822     if(rep->enc_part.caddr)
823 	krb5_copy_addresses (context, rep->enc_part.caddr, &creds->addresses);
824     else if(addrs)
825 	krb5_copy_addresses (context, addrs, &creds->addresses);
826     else {
827 	creds->addresses.len = 0;
828 	creds->addresses.val = NULL;
829     }
830     creds->flags.b = rep->enc_part.flags;
831 
832     creds->authdata.len = 0;
833     creds->authdata.val = NULL;
834 
835     /* extract ticket */
836     ASN1_MALLOC_ENCODE(Ticket, creds->ticket.data, creds->ticket.length,
837 		       &rep->kdc_rep.ticket, &len, ret);
838     if(ret)
839 	goto out;
840     if (creds->ticket.length != len)
841 	krb5_abortx(context, "internal error in ASN.1 encoder");
842     creds->second_ticket.length = 0;
843     creds->second_ticket.data   = NULL;
844 
845 
846 out:
847     memset (rep->enc_part.key.keyvalue.data, 0,
848 	    rep->enc_part.key.keyvalue.length);
849     return ret;
850 }
851