xref: /netbsd-src/crypto/external/bsd/heimdal/dist/lib/krb5/ticket.c (revision bdc22b2e01993381dcefeff2bc9b56ca75a4235c)
1 /*	$NetBSD: ticket.c,v 1.4 2017/07/11 21:52:54 christos Exp $	*/
2 
3 /*
4  * Copyright (c) 1997 - 2001 Kungliga Tekniska Högskolan
5  * (Royal Institute of Technology, Stockholm, Sweden).
6  * All rights reserved.
7  *
8  * Portions Copyright (c) 2009 Apple Inc. All rights reserved.
9  *
10  * Redistribution and use in source and binary forms, with or without
11  * modification, are permitted provided that the following conditions
12  * are met:
13  *
14  * 1. Redistributions of source code must retain the above copyright
15  *    notice, this list of conditions and the following disclaimer.
16  *
17  * 2. Redistributions in binary form must reproduce the above copyright
18  *    notice, this list of conditions and the following disclaimer in the
19  *    documentation and/or other materials provided with the distribution.
20  *
21  * 3. Neither the name of the Institute nor the names of its contributors
22  *    may be used to endorse or promote products derived from this software
23  *    without specific prior written permission.
24  *
25  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
26  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
27  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
28  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
29  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
30  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
31  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
32  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
33  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
34  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
35  * SUCH DAMAGE.
36  */
37 
38 #include "krb5_locl.h"
39 
40 /**
41  * Free ticket and content
42  *
43  * @param context a Kerberos 5 context
44  * @param ticket ticket to free
45  *
46  * @return Returns 0 to indicate success.  Otherwise an kerberos et
47  * error code is returned, see krb5_get_error_message().
48  *
49  * @ingroup krb5
50  */
51 
52 KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
53 krb5_free_ticket(krb5_context context,
54 		 krb5_ticket *ticket)
55 {
56     free_EncTicketPart(&ticket->ticket);
57     krb5_free_principal(context, ticket->client);
58     krb5_free_principal(context, ticket->server);
59     free(ticket);
60     return 0;
61 }
62 
63 /**
64  * Copy ticket and content
65  *
66  * @param context a Kerberos 5 context
67  * @param from ticket to copy
68  * @param to new copy of ticket, free with krb5_free_ticket()
69  *
70  * @return Returns 0 to indicate success.  Otherwise an kerberos et
71  * error code is returned, see krb5_get_error_message().
72  *
73  * @ingroup krb5
74  */
75 
76 KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
77 krb5_copy_ticket(krb5_context context,
78 		 const krb5_ticket *from,
79 		 krb5_ticket **to)
80 {
81     krb5_error_code ret;
82     krb5_ticket *tmp;
83 
84     *to = NULL;
85     tmp = malloc(sizeof(*tmp));
86     if (tmp == NULL)
87 	return krb5_enomem(context);
88     if((ret = copy_EncTicketPart(&from->ticket, &tmp->ticket))){
89 	free(tmp);
90 	return ret;
91     }
92     ret = krb5_copy_principal(context, from->client, &tmp->client);
93     if(ret){
94 	free_EncTicketPart(&tmp->ticket);
95 	free(tmp);
96 	return ret;
97     }
98     ret = krb5_copy_principal(context, from->server, &tmp->server);
99     if(ret){
100 	krb5_free_principal(context, tmp->client);
101 	free_EncTicketPart(&tmp->ticket);
102 	free(tmp);
103 	return ret;
104     }
105     *to = tmp;
106     return 0;
107 }
108 
109 /**
110  * Return client principal in ticket
111  *
112  * @param context a Kerberos 5 context
113  * @param ticket ticket to copy
114  * @param client client principal, free with krb5_free_principal()
115  *
116  * @return Returns 0 to indicate success.  Otherwise an kerberos et
117  * error code is returned, see krb5_get_error_message().
118  *
119  * @ingroup krb5
120  */
121 
122 KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
123 krb5_ticket_get_client(krb5_context context,
124 		       const krb5_ticket *ticket,
125 		       krb5_principal *client)
126 {
127     return krb5_copy_principal(context, ticket->client, client);
128 }
129 
130 /**
131  * Return server principal in ticket
132  *
133  * @param context a Kerberos 5 context
134  * @param ticket ticket to copy
135  * @param server server principal, free with krb5_free_principal()
136  *
137  * @return Returns 0 to indicate success.  Otherwise an kerberos et
138  * error code is returned, see krb5_get_error_message().
139  *
140  * @ingroup krb5
141  */
142 
143 KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
144 krb5_ticket_get_server(krb5_context context,
145 		       const krb5_ticket *ticket,
146 		       krb5_principal *server)
147 {
148     return krb5_copy_principal(context, ticket->server, server);
149 }
150 
151 /**
152  * Return end time of ticket
153  *
154  * @param context a Kerberos 5 context
155  * @param ticket ticket to copy
156  *
157  * @return end time of ticket
158  *
159  * @ingroup krb5
160  */
161 
162 KRB5_LIB_FUNCTION time_t KRB5_LIB_CALL
163 krb5_ticket_get_endtime(krb5_context context,
164 			const krb5_ticket *ticket)
165 {
166     return ticket->ticket.endtime;
167 }
168 
169 /**
170  * Get the flags from the Kerberos ticket
171  *
172  * @param context Kerberos context
173  * @param ticket Kerberos ticket
174  *
175  * @return ticket flags
176  *
177  * @ingroup krb5_ticket
178  */
179 KRB5_LIB_FUNCTION unsigned long KRB5_LIB_CALL
180 krb5_ticket_get_flags(krb5_context context,
181 		      const krb5_ticket *ticket)
182 {
183     return TicketFlags2int(ticket->ticket.flags);
184 }
185 
186 static int
187 find_type_in_ad(krb5_context context,
188 		int type,
189 		krb5_data *data,
190 		krb5_boolean *found,
191 		krb5_boolean failp,
192 		krb5_keyblock *sessionkey,
193 		const AuthorizationData *ad,
194 		int level)
195 {
196     krb5_error_code ret = 0;
197     size_t i;
198 
199     if (level > 9) {
200 	ret = ENOENT; /* XXX */
201 	krb5_set_error_message(context, ret,
202 			       N_("Authorization data nested deeper "
203 				  "then %d levels, stop searching", ""),
204 			       level);
205 	goto out;
206     }
207 
208     /*
209      * Only copy out the element the first time we get to it, we need
210      * to run over the whole authorization data fields to check if
211      * there are any container clases we need to care about.
212      */
213     for (i = 0; i < ad->len; i++) {
214 	if (!*found && ad->val[i].ad_type == type) {
215 	    ret = der_copy_octet_string(&ad->val[i].ad_data, data);
216 	    if (ret) {
217 		krb5_set_error_message(context, ret,
218 				       N_("malloc: out of memory", ""));
219 		goto out;
220 	    }
221 	    *found = TRUE;
222 	    continue;
223 	}
224 	switch (ad->val[i].ad_type) {
225 	case KRB5_AUTHDATA_IF_RELEVANT: {
226 	    AuthorizationData child;
227 	    ret = decode_AuthorizationData(ad->val[i].ad_data.data,
228 					   ad->val[i].ad_data.length,
229 					   &child,
230 					   NULL);
231 	    if (ret) {
232 		krb5_set_error_message(context, ret,
233 				       N_("Failed to decode "
234 					  "IF_RELEVANT with %d", ""),
235 				       (int)ret);
236 		goto out;
237 	    }
238 	    ret = find_type_in_ad(context, type, data, found, FALSE,
239 				  sessionkey, &child, level + 1);
240 	    free_AuthorizationData(&child);
241 	    if (ret)
242 		goto out;
243 	    break;
244 	}
245 #if 0 /* XXX test */
246 	case KRB5_AUTHDATA_KDC_ISSUED: {
247 	    AD_KDCIssued child;
248 
249 	    ret = decode_AD_KDCIssued(ad->val[i].ad_data.data,
250 				      ad->val[i].ad_data.length,
251 				      &child,
252 				      NULL);
253 	    if (ret) {
254 		krb5_set_error_message(context, ret,
255 				       N_("Failed to decode "
256 					  "AD_KDCIssued with %d", ""),
257 				       ret);
258 		goto out;
259 	    }
260 	    if (failp) {
261 		krb5_boolean valid;
262 		krb5_data buf;
263 		size_t len;
264 
265 		ASN1_MALLOC_ENCODE(AuthorizationData, buf.data, buf.length,
266 				   &child.elements, &len, ret);
267 		if (ret) {
268 		    free_AD_KDCIssued(&child);
269 		    krb5_clear_error_message(context);
270 		    goto out;
271 		}
272 		if(buf.length != len)
273 		    krb5_abortx(context, "internal error in ASN.1 encoder");
274 
275 		ret = krb5_c_verify_checksum(context, sessionkey, 19, &buf,
276 					     &child.ad_checksum, &valid);
277 		krb5_data_free(&buf);
278 		if (ret) {
279 		    free_AD_KDCIssued(&child);
280 		    goto out;
281 		}
282 		if (!valid) {
283 		    krb5_clear_error_message(context);
284 		    ret = ENOENT;
285 		    free_AD_KDCIssued(&child);
286 		    goto out;
287 		}
288 	    }
289 	    ret = find_type_in_ad(context, type, data, found, failp, sessionkey,
290 				  &child.elements, level + 1);
291 	    free_AD_KDCIssued(&child);
292 	    if (ret)
293 		goto out;
294 	    break;
295 	}
296 #endif
297 	case KRB5_AUTHDATA_AND_OR:
298 	    if (!failp)
299 		break;
300 	    ret = ENOENT; /* XXX */
301 	    krb5_set_error_message(context, ret,
302 				   N_("Authorization data contains "
303 				      "AND-OR element that is unknown to the "
304 				      "application", ""));
305 	    goto out;
306 	default:
307 	    if (!failp)
308 		break;
309 	    ret = ENOENT; /* XXX */
310 	    krb5_set_error_message(context, ret,
311 				   N_("Authorization data contains "
312 				      "unknown type (%d) ", ""),
313 				   ad->val[i].ad_type);
314 	    goto out;
315 	}
316     }
317 out:
318     if (ret) {
319 	if (*found) {
320 	    krb5_data_free(data);
321 	    *found = 0;
322 	}
323     }
324     return ret;
325 }
326 
327 KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
328 _krb5_get_ad(krb5_context context,
329 	     const AuthorizationData *ad,
330 	     krb5_keyblock *sessionkey,
331 	     int type,
332 	     krb5_data *data)
333 {
334     krb5_boolean found = FALSE;
335     krb5_error_code ret;
336 
337     krb5_data_zero(data);
338 
339     if (ad == NULL) {
340 	krb5_set_error_message(context, ENOENT,
341 			       N_("No authorization data", ""));
342 	return ENOENT; /* XXX */
343     }
344 
345     ret = find_type_in_ad(context, type, data, &found, TRUE, sessionkey, ad, 0);
346     if (ret)
347 	return ret;
348     if (!found) {
349 	krb5_set_error_message(context, ENOENT,
350 			       N_("Have no authorization data of type %d", ""),
351 			       type);
352 	return ENOENT; /* XXX */
353     }
354     return 0;
355 }
356 
357 
358 /**
359  * Extract the authorization data type of type from the ticket. Store
360  * the field in data. This function is to use for kerberos
361  * applications.
362  *
363  * @param context a Kerberos 5 context
364  * @param ticket Kerberos ticket
365  * @param type type to fetch
366  * @param data returned data, free with krb5_data_free()
367  *
368  * @ingroup krb5
369  */
370 
371 KRB5_LIB_FUNCTION krb5_error_code KRB5_LIB_CALL
372 krb5_ticket_get_authorization_data_type(krb5_context context,
373 					krb5_ticket *ticket,
374 					int type,
375 					krb5_data *data)
376 {
377     AuthorizationData *ad;
378     krb5_error_code ret;
379     krb5_boolean found = FALSE;
380 
381     krb5_data_zero(data);
382 
383     ad = ticket->ticket.authorization_data;
384     if (ticket->ticket.authorization_data == NULL) {
385 	krb5_set_error_message(context, ENOENT,
386 			       N_("Ticket have not authorization data", ""));
387 	return ENOENT; /* XXX */
388     }
389 
390     ret = find_type_in_ad(context, type, data, &found, TRUE,
391 			  &ticket->ticket.key, ad, 0);
392     if (ret)
393 	return ret;
394     if (!found) {
395 	krb5_set_error_message(context, ENOENT,
396 			       N_("Ticket have not "
397 				  "authorization data of type %d", ""),
398 			       type);
399 	return ENOENT; /* XXX */
400     }
401     return 0;
402 }
403 
404 static krb5_error_code
405 check_server_referral(krb5_context context,
406 		      krb5_kdc_rep *rep,
407 		      unsigned flags,
408 		      krb5_const_principal requested,
409 		      krb5_const_principal returned,
410 		      krb5_keyblock * key)
411 {
412     krb5_error_code ret;
413     PA_ServerReferralData ref;
414     krb5_crypto session;
415     EncryptedData ed;
416     size_t len;
417     krb5_data data;
418     PA_DATA *pa;
419     int i = 0, cmp;
420 
421     if (rep->kdc_rep.padata == NULL)
422 	goto noreferral;
423 
424     pa = krb5_find_padata(rep->kdc_rep.padata->val,
425 			  rep->kdc_rep.padata->len,
426 			  KRB5_PADATA_SERVER_REFERRAL, &i);
427     if (pa == NULL)
428 	goto noreferral;
429 
430     memset(&ed, 0, sizeof(ed));
431     memset(&ref, 0, sizeof(ref));
432 
433     ret = decode_EncryptedData(pa->padata_value.data,
434 			       pa->padata_value.length,
435 			       &ed, &len);
436     if (ret)
437 	return ret;
438     if (len != pa->padata_value.length) {
439 	free_EncryptedData(&ed);
440 	krb5_set_error_message(context, KRB5KRB_AP_ERR_MODIFIED,
441 			       N_("Referral EncryptedData wrong for realm %s",
442 				  "realm"), requested->realm);
443 	return KRB5KRB_AP_ERR_MODIFIED;
444     }
445 
446     ret = krb5_crypto_init(context, key, 0, &session);
447     if (ret) {
448 	free_EncryptedData(&ed);
449 	return ret;
450     }
451 
452     ret = krb5_decrypt_EncryptedData(context, session,
453 				     KRB5_KU_PA_SERVER_REFERRAL,
454 				     &ed, &data);
455     free_EncryptedData(&ed);
456     krb5_crypto_destroy(context, session);
457     if (ret)
458 	return ret;
459 
460     ret = decode_PA_ServerReferralData(data.data, data.length, &ref, &len);
461     if (ret) {
462 	krb5_data_free(&data);
463 	return ret;
464     }
465     krb5_data_free(&data);
466 
467     if (strcmp(requested->realm, returned->realm) != 0) {
468 	free_PA_ServerReferralData(&ref);
469 	krb5_set_error_message(context, KRB5KRB_AP_ERR_MODIFIED,
470 			       N_("server ref realm mismatch, "
471 				  "requested realm %s got back %s", ""),
472 			       requested->realm, returned->realm);
473 	return KRB5KRB_AP_ERR_MODIFIED;
474     }
475 
476     if (krb5_principal_is_krbtgt(context, returned)) {
477 	const char *realm = returned->name.name_string.val[1];
478 
479 	if (ref.referred_realm == NULL
480 	    || strcmp(*ref.referred_realm, realm) != 0)
481 	{
482 	    free_PA_ServerReferralData(&ref);
483 	    krb5_set_error_message(context, KRB5KRB_AP_ERR_MODIFIED,
484 				   N_("tgt returned with wrong ref", ""));
485 	    return KRB5KRB_AP_ERR_MODIFIED;
486 	}
487     } else if (krb5_principal_compare(context, returned, requested) == 0) {
488 	free_PA_ServerReferralData(&ref);
489 	krb5_set_error_message(context, KRB5KRB_AP_ERR_MODIFIED,
490 			       N_("req princ no same as returned", ""));
491 	return KRB5KRB_AP_ERR_MODIFIED;
492     }
493 
494     if (ref.requested_principal_name) {
495 	cmp = _krb5_principal_compare_PrincipalName(context,
496 						    requested,
497 						    ref.requested_principal_name);
498 	if (!cmp) {
499 	    free_PA_ServerReferralData(&ref);
500 	    krb5_set_error_message(context, KRB5KRB_AP_ERR_MODIFIED,
501 				   N_("referred principal not same "
502 				      "as requested", ""));
503 	    return KRB5KRB_AP_ERR_MODIFIED;
504 	}
505     } else if (flags & EXTRACT_TICKET_AS_REQ) {
506 	free_PA_ServerReferralData(&ref);
507 	krb5_set_error_message(context, KRB5KRB_AP_ERR_MODIFIED,
508 			       N_("Requested principal missing on AS-REQ", ""));
509 	return KRB5KRB_AP_ERR_MODIFIED;
510     }
511 
512     free_PA_ServerReferralData(&ref);
513 
514     return ret;
515 noreferral:
516     /*
517      * Expect excact match or that we got a krbtgt
518      */
519     if (krb5_principal_compare(context, requested, returned) != TRUE &&
520 	(krb5_realm_compare(context, requested, returned) != TRUE &&
521 	 krb5_principal_is_krbtgt(context, returned) != TRUE))
522     {
523 	krb5_set_error_message(context, KRB5KRB_AP_ERR_MODIFIED,
524 			       N_("Not same server principal returned "
525 				  "as requested", ""));
526 	return KRB5KRB_AP_ERR_MODIFIED;
527     }
528     return 0;
529 }
530 
531 
532 /*
533  * Verify referral data
534  */
535 
536 
537 static krb5_error_code
538 check_client_referral(krb5_context context,
539 		      krb5_kdc_rep *rep,
540 		      krb5_const_principal requested,
541 		      krb5_const_principal mapped,
542 		      krb5_keyblock const * key)
543 {
544     if (krb5_principal_compare(context, requested, mapped) == FALSE &&
545 	!rep->enc_part.flags.enc_pa_rep)
546     {
547 	krb5_set_error_message(context, KRB5KRB_AP_ERR_MODIFIED,
548 			       N_("Not same client principal returned "
549 				  "as requested", ""));
550 	return KRB5KRB_AP_ERR_MODIFIED;
551     }
552     return 0;
553 }
554 
555 
556 static krb5_error_code KRB5_CALLCONV
557 decrypt_tkt (krb5_context context,
558 	     krb5_keyblock *key,
559 	     krb5_key_usage usage,
560 	     krb5_const_pointer decrypt_arg,
561 	     krb5_kdc_rep *dec_rep)
562 {
563     krb5_error_code ret;
564     krb5_data data;
565     size_t size;
566     krb5_crypto crypto;
567 
568     ret = krb5_crypto_init(context, key, 0, &crypto);
569     if (ret)
570 	return ret;
571 
572     ret = krb5_decrypt_EncryptedData (context,
573 				      crypto,
574 				      usage,
575 				      &dec_rep->kdc_rep.enc_part,
576 				      &data);
577     krb5_crypto_destroy(context, crypto);
578 
579     if (ret)
580 	return ret;
581 
582     ret = decode_EncASRepPart(data.data,
583 			      data.length,
584 			      &dec_rep->enc_part,
585 			      &size);
586     if (ret)
587 	ret = decode_EncTGSRepPart(data.data,
588 				   data.length,
589 				   &dec_rep->enc_part,
590 				   &size);
591     krb5_data_free (&data);
592     if (ret) {
593         krb5_set_error_message(context, ret,
594 			       N_("Failed to decode encpart in ticket", ""));
595 	return ret;
596     }
597     return 0;
598 }
599 
600 KRB5_LIB_FUNCTION int KRB5_LIB_CALL
601 _krb5_extract_ticket(krb5_context context,
602 		     krb5_kdc_rep *rep,
603 		     krb5_creds *creds,
604 		     krb5_keyblock *key,
605 		     krb5_const_pointer keyseed,
606 		     krb5_key_usage key_usage,
607 		     krb5_addresses *addrs,
608 		     unsigned nonce,
609 		     unsigned flags,
610 		     krb5_data *request,
611 		     krb5_decrypt_proc decrypt_proc,
612 		     krb5_const_pointer decryptarg)
613 {
614     krb5_error_code ret;
615     krb5_principal tmp_principal;
616     size_t len = 0;
617     time_t tmp_time;
618     krb5_timestamp sec_now;
619 
620     /* decrypt */
621 
622     if (decrypt_proc == NULL)
623 	decrypt_proc = decrypt_tkt;
624 
625     ret = (*decrypt_proc)(context, key, key_usage, decryptarg, rep);
626     if (ret)
627 	goto out;
628 
629     if (rep->enc_part.flags.enc_pa_rep && request) {
630 	krb5_crypto crypto = NULL;
631 	Checksum cksum;
632 	PA_DATA *pa = NULL;
633 	int idx = 0;
634 
635 	_krb5_debug(context, 5, "processing enc-ap-rep");
636 
637 	if (rep->enc_part.encrypted_pa_data == NULL ||
638 	    (pa = krb5_find_padata(rep->enc_part.encrypted_pa_data->val,
639 				   rep->enc_part.encrypted_pa_data->len,
640 				   KRB5_PADATA_REQ_ENC_PA_REP,
641 				   &idx)) == NULL)
642 	{
643 	    _krb5_debug(context, 5, "KRB5_PADATA_REQ_ENC_PA_REP missing");
644 	    ret = KRB5KRB_AP_ERR_MODIFIED;
645 	    goto out;
646 	}
647 
648 	ret = krb5_crypto_init(context, key, 0, &crypto);
649 	if (ret)
650 	    goto out;
651 
652 	ret = decode_Checksum(pa->padata_value.data,
653 			      pa->padata_value.length,
654 			      &cksum, NULL);
655 	if (ret) {
656 	    krb5_crypto_destroy(context, crypto);
657 	    goto out;
658 	}
659 
660 	ret = krb5_verify_checksum(context, crypto,
661 				   KRB5_KU_AS_REQ,
662 				   request->data, request->length,
663 				   &cksum);
664 	krb5_crypto_destroy(context, crypto);
665 	free_Checksum(&cksum);
666 	_krb5_debug(context, 5, "enc-ap-rep: %svalid", (ret == 0) ? "" : "in");
667 	if (ret)
668 	    goto out;
669     }
670 
671     /* save session key */
672 
673     creds->session.keyvalue.length = 0;
674     creds->session.keyvalue.data   = NULL;
675     creds->session.keytype = rep->enc_part.key.keytype;
676     ret = krb5_data_copy (&creds->session.keyvalue,
677 			  rep->enc_part.key.keyvalue.data,
678 			  rep->enc_part.key.keyvalue.length);
679     if (ret) {
680 	krb5_clear_error_message(context);
681 	goto out;
682     }
683 
684     /* compare client and save */
685     ret = _krb5_principalname2krb5_principal(context,
686 					     &tmp_principal,
687 					     rep->kdc_rep.cname,
688 					     rep->kdc_rep.crealm);
689     if (ret)
690 	goto out;
691 
692     /* check client referral and save principal */
693     /* anonymous here ? */
694     if((flags & EXTRACT_TICKET_ALLOW_CNAME_MISMATCH) == 0) {
695 	ret = check_client_referral(context, rep,
696 				    creds->client,
697 				    tmp_principal,
698 				    &creds->session);
699 	if (ret) {
700 	    krb5_free_principal (context, tmp_principal);
701 	    goto out;
702 	}
703     }
704     krb5_free_principal (context, creds->client);
705     creds->client = tmp_principal;
706 
707     /* check server referral and save principal */
708     ret = _krb5_principalname2krb5_principal (context,
709 					      &tmp_principal,
710 					      rep->enc_part.sname,
711 					      rep->enc_part.srealm);
712     if (ret)
713 	goto out;
714     if((flags & EXTRACT_TICKET_ALLOW_SERVER_MISMATCH) == 0){
715 	ret = check_server_referral(context,
716 				    rep,
717 				    flags,
718 				    creds->server,
719 				    tmp_principal,
720 				    &creds->session);
721 	if (ret) {
722 	    krb5_free_principal (context, tmp_principal);
723 	    goto out;
724 	}
725     }
726     krb5_free_principal(context, creds->server);
727     creds->server = tmp_principal;
728 
729     /* verify names */
730     if(flags & EXTRACT_TICKET_MATCH_REALM){
731 	const char *srealm = krb5_principal_get_realm(context, creds->server);
732 	const char *crealm = krb5_principal_get_realm(context, creds->client);
733 
734 	if (strcmp(rep->enc_part.srealm, srealm) != 0 ||
735 	    strcmp(rep->enc_part.srealm, crealm) != 0)
736 	{
737 	    ret = KRB5KRB_AP_ERR_MODIFIED;
738 	    krb5_clear_error_message(context);
739 	    goto out;
740 	}
741     }
742 
743     /* compare nonces */
744 
745     if (nonce != (unsigned)rep->enc_part.nonce) {
746 	ret = KRB5KRB_AP_ERR_MODIFIED;
747 	krb5_set_error_message(context, ret, N_("malloc: out of memory", ""));
748 	goto out;
749     }
750 
751     /* set kdc-offset */
752 
753     krb5_timeofday (context, &sec_now);
754     if (rep->enc_part.flags.initial
755 	&& (flags & EXTRACT_TICKET_TIMESYNC)
756 	&& context->kdc_sec_offset == 0
757 	&& krb5_config_get_bool (context, NULL,
758 				 "libdefaults",
759 				 "kdc_timesync",
760 				 NULL)) {
761 	context->kdc_sec_offset = rep->enc_part.authtime - sec_now;
762 	krb5_timeofday (context, &sec_now);
763     }
764 
765     /* check all times */
766 
767     if (rep->enc_part.starttime) {
768 	tmp_time = *rep->enc_part.starttime;
769     } else
770 	tmp_time = rep->enc_part.authtime;
771 
772     if (creds->times.starttime == 0
773 	&& labs(tmp_time - sec_now) > context->max_skew) {
774 	ret = KRB5KRB_AP_ERR_SKEW;
775 	krb5_set_error_message (context, ret,
776 				N_("time skew (%ld) larger than max (%ld)", ""),
777 			       labs(tmp_time - sec_now),
778 			       (long)context->max_skew);
779 	goto out;
780     }
781 
782     if (creds->times.starttime != 0
783 	&& tmp_time != creds->times.starttime) {
784 	krb5_clear_error_message (context);
785 	ret = KRB5KRB_AP_ERR_MODIFIED;
786 	goto out;
787     }
788 
789     creds->times.starttime = tmp_time;
790 
791     if (rep->enc_part.renew_till) {
792 	tmp_time = *rep->enc_part.renew_till;
793     } else
794 	tmp_time = 0;
795 
796     if (creds->times.renew_till != 0
797 	&& tmp_time > creds->times.renew_till) {
798 	krb5_clear_error_message (context);
799 	ret = KRB5KRB_AP_ERR_MODIFIED;
800 	goto out;
801     }
802 
803     creds->times.renew_till = tmp_time;
804 
805     creds->times.authtime = rep->enc_part.authtime;
806 
807     if (creds->times.endtime != 0
808 	&& rep->enc_part.endtime > creds->times.endtime) {
809 	krb5_clear_error_message (context);
810 	ret = KRB5KRB_AP_ERR_MODIFIED;
811 	goto out;
812     }
813 
814     creds->times.endtime  = rep->enc_part.endtime;
815 
816     if(rep->enc_part.caddr)
817 	krb5_copy_addresses (context, rep->enc_part.caddr, &creds->addresses);
818     else if(addrs)
819 	krb5_copy_addresses (context, addrs, &creds->addresses);
820     else {
821 	creds->addresses.len = 0;
822 	creds->addresses.val = NULL;
823     }
824     creds->flags.b = rep->enc_part.flags;
825 
826     creds->authdata.len = 0;
827     creds->authdata.val = NULL;
828 
829     /* extract ticket */
830     ASN1_MALLOC_ENCODE(Ticket, creds->ticket.data, creds->ticket.length,
831 		       &rep->kdc_rep.ticket, &len, ret);
832     if(ret)
833 	goto out;
834     if (creds->ticket.length != len)
835 	krb5_abortx(context, "internal error in ASN.1 encoder");
836     creds->second_ticket.length = 0;
837     creds->second_ticket.data   = NULL;
838 
839 
840 out:
841     memset (rep->enc_part.key.keyvalue.data, 0,
842 	    rep->enc_part.key.keyvalue.length);
843     return ret;
844 }
845