xref: /freebsd/crypto/heimdal/kdc/krb5tgs.c (revision 911f0260390e18cf85f3dbf2c719b593efdc1e3c)
1 /*
2  * Copyright (c) 1997-2008 Kungliga Tekniska Högskolan
3  * (Royal Institute of Technology, Stockholm, Sweden).
4  * All rights reserved.
5  *
6  * Redistribution and use in source and binary forms, with or without
7  * modification, are permitted provided that the following conditions
8  * are met:
9  *
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  *
13  * 2. Redistributions in binary form must reproduce the above copyright
14  *    notice, this list of conditions and the following disclaimer in the
15  *    documentation and/or other materials provided with the distribution.
16  *
17  * 3. Neither the name of the Institute nor the names of its contributors
18  *    may be used to endorse or promote products derived from this software
19  *    without specific prior written permission.
20  *
21  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31  * SUCH DAMAGE.
32  */
33 
34 #include "kdc_locl.h"
35 
36 /*
37  * return the realm of a krbtgt-ticket or NULL
38  */
39 
40 static Realm
41 get_krbtgt_realm(const PrincipalName *p)
42 {
43     if(p->name_string.len == 2
44        && strcmp(p->name_string.val[0], KRB5_TGS_NAME) == 0)
45 	return p->name_string.val[1];
46     else
47 	return NULL;
48 }
49 
50 /*
51  * The KDC might add a signed path to the ticket authorization data
52  * field. This is to avoid server impersonating clients and the
53  * request constrained delegation.
54  *
55  * This is done by storing a KRB5_AUTHDATA_IF_RELEVANT with a single
56  * entry of type KRB5SignedPath.
57  */
58 
59 static krb5_error_code
60 find_KRB5SignedPath(krb5_context context,
61 		    const AuthorizationData *ad,
62 		    krb5_data *data)
63 {
64     AuthorizationData child;
65     krb5_error_code ret;
66     int pos;
67 
68     if (ad == NULL || ad->len == 0)
69 	return KRB5KDC_ERR_PADATA_TYPE_NOSUPP;
70 
71     pos = ad->len - 1;
72 
73     if (ad->val[pos].ad_type != KRB5_AUTHDATA_IF_RELEVANT)
74 	return KRB5KDC_ERR_PADATA_TYPE_NOSUPP;
75 
76     ret = decode_AuthorizationData(ad->val[pos].ad_data.data,
77 				   ad->val[pos].ad_data.length,
78 				   &child,
79 				   NULL);
80     if (ret) {
81 	krb5_set_error_message(context, ret, "Failed to decode "
82 			       "IF_RELEVANT with %d", ret);
83 	return ret;
84     }
85 
86     if (child.len != 1) {
87 	free_AuthorizationData(&child);
88 	return KRB5KDC_ERR_PADATA_TYPE_NOSUPP;
89     }
90 
91     if (child.val[0].ad_type != KRB5_AUTHDATA_SIGNTICKET) {
92 	free_AuthorizationData(&child);
93 	return KRB5KDC_ERR_PADATA_TYPE_NOSUPP;
94     }
95 
96     if (data)
97 	ret = der_copy_octet_string(&child.val[0].ad_data, data);
98     free_AuthorizationData(&child);
99     return ret;
100 }
101 
102 krb5_error_code
103 _kdc_add_KRB5SignedPath(krb5_context context,
104 			krb5_kdc_configuration *config,
105 			hdb_entry_ex *krbtgt,
106 			krb5_enctype enctype,
107 			krb5_principal client,
108 			krb5_const_principal server,
109 			krb5_principals principals,
110 			EncTicketPart *tkt)
111 {
112     krb5_error_code ret;
113     KRB5SignedPath sp;
114     krb5_data data;
115     krb5_crypto crypto = NULL;
116     size_t size = 0;
117 
118     if (server && principals) {
119 	ret = add_Principals(principals, server);
120 	if (ret)
121 	    return ret;
122     }
123 
124     {
125 	KRB5SignedPathData spd;
126 
127 	spd.client = client;
128 	spd.authtime = tkt->authtime;
129 	spd.delegated = principals;
130 	spd.method_data = NULL;
131 
132 	ASN1_MALLOC_ENCODE(KRB5SignedPathData, data.data, data.length,
133 			   &spd, &size, ret);
134 	if (ret)
135 	    return ret;
136 	if (data.length != size)
137 	    krb5_abortx(context, "internal asn.1 encoder error");
138     }
139 
140     {
141 	Key *key;
142 	ret = hdb_enctype2key(context, &krbtgt->entry, enctype, &key);
143 	if (ret == 0)
144 	    ret = krb5_crypto_init(context, &key->key, 0, &crypto);
145 	if (ret) {
146 	    free(data.data);
147 	    return ret;
148 	}
149     }
150 
151     /*
152      * Fill in KRB5SignedPath
153      */
154 
155     sp.etype = enctype;
156     sp.delegated = principals;
157     sp.method_data = NULL;
158 
159     ret = krb5_create_checksum(context, crypto, KRB5_KU_KRB5SIGNEDPATH, 0,
160 			       data.data, data.length, &sp.cksum);
161     krb5_crypto_destroy(context, crypto);
162     free(data.data);
163     if (ret)
164 	return ret;
165 
166     ASN1_MALLOC_ENCODE(KRB5SignedPath, data.data, data.length, &sp, &size, ret);
167     free_Checksum(&sp.cksum);
168     if (ret)
169 	return ret;
170     if (data.length != size)
171 	krb5_abortx(context, "internal asn.1 encoder error");
172 
173 
174     /*
175      * Add IF-RELEVANT(KRB5SignedPath) to the last slot in
176      * authorization data field.
177      */
178 
179     ret = _kdc_tkt_add_if_relevant_ad(context, tkt,
180 				      KRB5_AUTHDATA_SIGNTICKET, &data);
181     krb5_data_free(&data);
182 
183     return ret;
184 }
185 
186 static krb5_error_code
187 check_KRB5SignedPath(krb5_context context,
188 		     krb5_kdc_configuration *config,
189 		     hdb_entry_ex *krbtgt,
190 		     krb5_principal cp,
191 		     EncTicketPart *tkt,
192 		     krb5_principals *delegated,
193 		     int *signedpath)
194 {
195     krb5_error_code ret;
196     krb5_data data;
197     krb5_crypto crypto = NULL;
198 
199     if (delegated)
200 	*delegated = NULL;
201 
202     ret = find_KRB5SignedPath(context, tkt->authorization_data, &data);
203     if (ret == 0) {
204 	KRB5SignedPathData spd;
205 	KRB5SignedPath sp;
206 	size_t size = 0;
207 
208 	ret = decode_KRB5SignedPath(data.data, data.length, &sp, NULL);
209 	krb5_data_free(&data);
210 	if (ret)
211 	    return ret;
212 
213 	spd.client = cp;
214 	spd.authtime = tkt->authtime;
215 	spd.delegated = sp.delegated;
216 	spd.method_data = sp.method_data;
217 
218 	ASN1_MALLOC_ENCODE(KRB5SignedPathData, data.data, data.length,
219 			   &spd, &size, ret);
220 	if (ret) {
221 	    free_KRB5SignedPath(&sp);
222 	    return ret;
223 	}
224 	if (data.length != size)
225 	    krb5_abortx(context, "internal asn.1 encoder error");
226 
227 	{
228 	    Key *key;
229 	    ret = hdb_enctype2key(context, &krbtgt->entry, sp.etype, &key);
230 	    if (ret == 0)
231 		ret = krb5_crypto_init(context, &key->key, 0, &crypto);
232 	    if (ret) {
233 		free(data.data);
234 		free_KRB5SignedPath(&sp);
235 		return ret;
236 	    }
237 	}
238 	ret = krb5_verify_checksum(context, crypto, KRB5_KU_KRB5SIGNEDPATH,
239 				   data.data, data.length,
240 				   &sp.cksum);
241 	krb5_crypto_destroy(context, crypto);
242 	free(data.data);
243 	if (ret) {
244 	    free_KRB5SignedPath(&sp);
245 	    kdc_log(context, config, 5,
246 		    "KRB5SignedPath not signed correctly, not marking as signed");
247 	    return 0;
248 	}
249 
250 	if (delegated && sp.delegated) {
251 
252 	    *delegated = malloc(sizeof(*sp.delegated));
253 	    if (*delegated == NULL) {
254 		free_KRB5SignedPath(&sp);
255 		return ENOMEM;
256 	    }
257 
258 	    ret = copy_Principals(*delegated, sp.delegated);
259 	    if (ret) {
260 		free_KRB5SignedPath(&sp);
261 		free(*delegated);
262 		*delegated = NULL;
263 		return ret;
264 	    }
265 	}
266 	free_KRB5SignedPath(&sp);
267 
268 	*signedpath = 1;
269     }
270 
271     return 0;
272 }
273 
274 /*
275  *
276  */
277 
278 static krb5_error_code
279 check_PAC(krb5_context context,
280 	  krb5_kdc_configuration *config,
281 	  const krb5_principal client_principal,
282 	  const krb5_principal delegated_proxy_principal,
283 	  hdb_entry_ex *client,
284 	  hdb_entry_ex *server,
285 	  hdb_entry_ex *krbtgt,
286 	  const EncryptionKey *server_check_key,
287 	  const EncryptionKey *krbtgt_check_key,
288 	  const EncryptionKey *server_sign_key,
289 	  const EncryptionKey *krbtgt_sign_key,
290 	  EncTicketPart *tkt,
291 	  krb5_data *rspac,
292 	  int *signedpath)
293 {
294     AuthorizationData *ad = tkt->authorization_data;
295     unsigned i, j;
296     krb5_error_code ret;
297 
298     if (ad == NULL || ad->len == 0)
299 	return 0;
300 
301     for (i = 0; i < ad->len; i++) {
302 	AuthorizationData child;
303 
304 	if (ad->val[i].ad_type != KRB5_AUTHDATA_IF_RELEVANT)
305 	    continue;
306 
307 	ret = decode_AuthorizationData(ad->val[i].ad_data.data,
308 				       ad->val[i].ad_data.length,
309 				       &child,
310 				       NULL);
311 	if (ret) {
312 	    krb5_set_error_message(context, ret, "Failed to decode "
313 				   "IF_RELEVANT with %d", ret);
314 	    return ret;
315 	}
316 	for (j = 0; j < child.len; j++) {
317 
318 	    if (child.val[j].ad_type == KRB5_AUTHDATA_WIN2K_PAC) {
319 		int signed_pac = 0;
320 		krb5_pac pac;
321 
322 		/* Found PAC */
323 		ret = krb5_pac_parse(context,
324 				     child.val[j].ad_data.data,
325 				     child.val[j].ad_data.length,
326 				     &pac);
327 		free_AuthorizationData(&child);
328 		if (ret)
329 		    return ret;
330 
331 		ret = krb5_pac_verify(context, pac, tkt->authtime,
332 				      client_principal,
333 				      server_check_key, krbtgt_check_key);
334 		if (ret) {
335 		    krb5_pac_free(context, pac);
336 		    return ret;
337 		}
338 
339 		ret = _kdc_pac_verify(context, client_principal,
340 				      delegated_proxy_principal,
341 				      client, server, krbtgt, &pac, &signed_pac);
342 		if (ret) {
343 		    krb5_pac_free(context, pac);
344 		    return ret;
345 		}
346 
347 		/*
348 		 * Only re-sign PAC if we could verify it with the PAC
349 		 * function. The no-verify case happens when we get in
350 		 * a PAC from cross realm from a Windows domain and
351 		 * that there is no PAC verification function.
352 		 */
353 		if (signed_pac) {
354 		    *signedpath = 1;
355 		    ret = _krb5_pac_sign(context, pac, tkt->authtime,
356 					 client_principal,
357 					 server_sign_key, krbtgt_sign_key, rspac);
358 		}
359 		krb5_pac_free(context, pac);
360 
361 		return ret;
362 	    }
363 	}
364 	free_AuthorizationData(&child);
365     }
366     return 0;
367 }
368 
369 /*
370  *
371  */
372 
373 static krb5_error_code
374 check_tgs_flags(krb5_context context,
375 		krb5_kdc_configuration *config,
376 		KDC_REQ_BODY *b, const EncTicketPart *tgt, EncTicketPart *et)
377 {
378     KDCOptions f = b->kdc_options;
379 
380     if(f.validate){
381 	if(!tgt->flags.invalid || tgt->starttime == NULL){
382 	    kdc_log(context, config, 0,
383 		    "Bad request to validate ticket");
384 	    return KRB5KDC_ERR_BADOPTION;
385 	}
386 	if(*tgt->starttime > kdc_time){
387 	    kdc_log(context, config, 0,
388 		    "Early request to validate ticket");
389 	    return KRB5KRB_AP_ERR_TKT_NYV;
390 	}
391 	/* XXX  tkt = tgt */
392 	et->flags.invalid = 0;
393     }else if(tgt->flags.invalid){
394 	kdc_log(context, config, 0,
395 		"Ticket-granting ticket has INVALID flag set");
396 	return KRB5KRB_AP_ERR_TKT_INVALID;
397     }
398 
399     if(f.forwardable){
400 	if(!tgt->flags.forwardable){
401 	    kdc_log(context, config, 0,
402 		    "Bad request for forwardable ticket");
403 	    return KRB5KDC_ERR_BADOPTION;
404 	}
405 	et->flags.forwardable = 1;
406     }
407     if(f.forwarded){
408 	if(!tgt->flags.forwardable){
409 	    kdc_log(context, config, 0,
410 		    "Request to forward non-forwardable ticket");
411 	    return KRB5KDC_ERR_BADOPTION;
412 	}
413 	et->flags.forwarded = 1;
414 	et->caddr = b->addresses;
415     }
416     if(tgt->flags.forwarded)
417 	et->flags.forwarded = 1;
418 
419     if(f.proxiable){
420 	if(!tgt->flags.proxiable){
421 	    kdc_log(context, config, 0,
422 		    "Bad request for proxiable ticket");
423 	    return KRB5KDC_ERR_BADOPTION;
424 	}
425 	et->flags.proxiable = 1;
426     }
427     if(f.proxy){
428 	if(!tgt->flags.proxiable){
429 	    kdc_log(context, config, 0,
430 		    "Request to proxy non-proxiable ticket");
431 	    return KRB5KDC_ERR_BADOPTION;
432 	}
433 	et->flags.proxy = 1;
434 	et->caddr = b->addresses;
435     }
436     if(tgt->flags.proxy)
437 	et->flags.proxy = 1;
438 
439     if(f.allow_postdate){
440 	if(!tgt->flags.may_postdate){
441 	    kdc_log(context, config, 0,
442 		    "Bad request for post-datable ticket");
443 	    return KRB5KDC_ERR_BADOPTION;
444 	}
445 	et->flags.may_postdate = 1;
446     }
447     if(f.postdated){
448 	if(!tgt->flags.may_postdate){
449 	    kdc_log(context, config, 0,
450 		    "Bad request for postdated ticket");
451 	    return KRB5KDC_ERR_BADOPTION;
452 	}
453 	if(b->from)
454 	    *et->starttime = *b->from;
455 	et->flags.postdated = 1;
456 	et->flags.invalid = 1;
457     }else if(b->from && *b->from > kdc_time + context->max_skew){
458 	kdc_log(context, config, 0, "Ticket cannot be postdated");
459 	return KRB5KDC_ERR_CANNOT_POSTDATE;
460     }
461 
462     if(f.renewable){
463 	if(!tgt->flags.renewable || tgt->renew_till == NULL){
464 	    kdc_log(context, config, 0,
465 		    "Bad request for renewable ticket");
466 	    return KRB5KDC_ERR_BADOPTION;
467 	}
468 	et->flags.renewable = 1;
469 	ALLOC(et->renew_till);
470 	_kdc_fix_time(&b->rtime);
471 	*et->renew_till = *b->rtime;
472     }
473     if(f.renew){
474 	time_t old_life;
475 	if(!tgt->flags.renewable || tgt->renew_till == NULL){
476 	    kdc_log(context, config, 0,
477 		    "Request to renew non-renewable ticket");
478 	    return KRB5KDC_ERR_BADOPTION;
479 	}
480 	old_life = tgt->endtime;
481 	if(tgt->starttime)
482 	    old_life -= *tgt->starttime;
483 	else
484 	    old_life -= tgt->authtime;
485 	et->endtime = *et->starttime + old_life;
486 	if (et->renew_till != NULL)
487 	    et->endtime = min(*et->renew_till, et->endtime);
488     }
489 
490 #if 0
491     /* checks for excess flags */
492     if(f.request_anonymous && !config->allow_anonymous){
493 	kdc_log(context, config, 0,
494 		"Request for anonymous ticket");
495 	return KRB5KDC_ERR_BADOPTION;
496     }
497 #endif
498     return 0;
499 }
500 
501 /*
502  * Determine if constrained delegation is allowed from this client to this server
503  */
504 
505 static krb5_error_code
506 check_constrained_delegation(krb5_context context,
507 			     krb5_kdc_configuration *config,
508 			     HDB *clientdb,
509 			     hdb_entry_ex *client,
510 			     hdb_entry_ex *server,
511 			     krb5_const_principal target)
512 {
513     const HDB_Ext_Constrained_delegation_acl *acl;
514     krb5_error_code ret;
515     size_t i;
516 
517     /*
518      * constrained_delegation (S4U2Proxy) only works within
519      * the same realm. We use the already canonicalized version
520      * of the principals here, while "target" is the principal
521      * provided by the client.
522      */
523     if(!krb5_realm_compare(context, client->entry.principal, server->entry.principal)) {
524 	ret = KRB5KDC_ERR_BADOPTION;
525 	kdc_log(context, config, 0,
526 	    "Bad request for constrained delegation");
527 	return ret;
528     }
529 
530     if (clientdb->hdb_check_constrained_delegation) {
531 	ret = clientdb->hdb_check_constrained_delegation(context, clientdb, client, target);
532 	if (ret == 0)
533 	    return 0;
534     } else {
535 	/* if client delegates to itself, that ok */
536 	if (krb5_principal_compare(context, client->entry.principal, server->entry.principal) == TRUE)
537 	    return 0;
538 
539 	ret = hdb_entry_get_ConstrainedDelegACL(&client->entry, &acl);
540 	if (ret) {
541 	    krb5_clear_error_message(context);
542 	    return ret;
543 	}
544 
545 	if (acl) {
546 	    for (i = 0; i < acl->len; i++) {
547 		if (krb5_principal_compare(context, target, &acl->val[i]) == TRUE)
548 		    return 0;
549 	    }
550 	}
551 	ret = KRB5KDC_ERR_BADOPTION;
552     }
553     kdc_log(context, config, 0,
554 	    "Bad request for constrained delegation");
555     return ret;
556 }
557 
558 /*
559  * Determine if s4u2self is allowed from this client to this server
560  *
561  * For example, regardless of the principal being impersonated, if the
562  * 'client' and 'server' are the same, then it's safe.
563  */
564 
565 static krb5_error_code
566 check_s4u2self(krb5_context context,
567 	       krb5_kdc_configuration *config,
568 	       HDB *clientdb,
569 	       hdb_entry_ex *client,
570 	       krb5_const_principal server)
571 {
572     krb5_error_code ret;
573 
574     /* if client does a s4u2self to itself, that ok */
575     if (krb5_principal_compare(context, client->entry.principal, server) == TRUE)
576 	return 0;
577 
578     if (clientdb->hdb_check_s4u2self) {
579 	ret = clientdb->hdb_check_s4u2self(context, clientdb, client, server);
580 	if (ret == 0)
581 	    return 0;
582     } else {
583 	ret = KRB5KDC_ERR_BADOPTION;
584     }
585     return ret;
586 }
587 
588 /*
589  *
590  */
591 
592 static krb5_error_code
593 verify_flags (krb5_context context,
594 	      krb5_kdc_configuration *config,
595 	      const EncTicketPart *et,
596 	      const char *pstr)
597 {
598     if(et->endtime < kdc_time){
599 	kdc_log(context, config, 0, "Ticket expired (%s)", pstr);
600 	return KRB5KRB_AP_ERR_TKT_EXPIRED;
601     }
602     if(et->flags.invalid){
603 	kdc_log(context, config, 0, "Ticket not valid (%s)", pstr);
604 	return KRB5KRB_AP_ERR_TKT_NYV;
605     }
606     return 0;
607 }
608 
609 /*
610  *
611  */
612 
613 static krb5_error_code
614 fix_transited_encoding(krb5_context context,
615 		       krb5_kdc_configuration *config,
616 		       krb5_boolean check_policy,
617 		       const TransitedEncoding *tr,
618 		       EncTicketPart *et,
619 		       const char *client_realm,
620 		       const char *server_realm,
621 		       const char *tgt_realm)
622 {
623     krb5_error_code ret = 0;
624     char **realms, **tmp;
625     unsigned int num_realms;
626     size_t i;
627 
628     switch (tr->tr_type) {
629     case DOMAIN_X500_COMPRESS:
630 	break;
631     case 0:
632 	/*
633 	 * Allow empty content of type 0 because that is was Microsoft
634 	 * generates in their TGT.
635 	 */
636 	if (tr->contents.length == 0)
637 	    break;
638 	kdc_log(context, config, 0,
639 		"Transited type 0 with non empty content");
640 	return KRB5KDC_ERR_TRTYPE_NOSUPP;
641     default:
642 	kdc_log(context, config, 0,
643 		"Unknown transited type: %u", tr->tr_type);
644 	return KRB5KDC_ERR_TRTYPE_NOSUPP;
645     }
646 
647     ret = krb5_domain_x500_decode(context,
648 				  tr->contents,
649 				  &realms,
650 				  &num_realms,
651 				  client_realm,
652 				  server_realm);
653     if(ret){
654 	krb5_warn(context, ret,
655 		  "Decoding transited encoding");
656 	return ret;
657     }
658     if(strcmp(client_realm, tgt_realm) && strcmp(server_realm, tgt_realm)) {
659 	/* not us, so add the previous realm to transited set */
660 	if (num_realms + 1 > UINT_MAX/sizeof(*realms)) {
661 	    ret = ERANGE;
662 	    goto free_realms;
663 	}
664 	tmp = realloc(realms, (num_realms + 1) * sizeof(*realms));
665 	if(tmp == NULL){
666 	    ret = ENOMEM;
667 	    goto free_realms;
668 	}
669 	realms = tmp;
670 	realms[num_realms] = strdup(tgt_realm);
671 	if(realms[num_realms] == NULL){
672 	    ret = ENOMEM;
673 	    goto free_realms;
674 	}
675 	num_realms++;
676     }
677     if(num_realms == 0) {
678 	if(strcmp(client_realm, server_realm))
679 	    kdc_log(context, config, 0,
680 		    "cross-realm %s -> %s", client_realm, server_realm);
681     } else {
682 	size_t l = 0;
683 	char *rs;
684 	for(i = 0; i < num_realms; i++)
685 	    l += strlen(realms[i]) + 2;
686 	rs = malloc(l);
687 	if(rs != NULL) {
688 	    *rs = '\0';
689 	    for(i = 0; i < num_realms; i++) {
690 		if(i > 0)
691 		    strlcat(rs, ", ", l);
692 		strlcat(rs, realms[i], l);
693 	    }
694 	    kdc_log(context, config, 0,
695 		    "cross-realm %s -> %s via [%s]",
696 		    client_realm, server_realm, rs);
697 	    free(rs);
698 	}
699     }
700     if(check_policy) {
701 	ret = krb5_check_transited(context, client_realm,
702 				   server_realm,
703 				   realms, num_realms, NULL);
704 	if(ret) {
705 	    krb5_warn(context, ret, "cross-realm %s -> %s",
706 		      client_realm, server_realm);
707 	    goto free_realms;
708 	}
709 	et->flags.transited_policy_checked = 1;
710     }
711     et->transited.tr_type = DOMAIN_X500_COMPRESS;
712     ret = krb5_domain_x500_encode(realms, num_realms, &et->transited.contents);
713     if(ret)
714 	krb5_warn(context, ret, "Encoding transited encoding");
715   free_realms:
716     for(i = 0; i < num_realms; i++)
717 	free(realms[i]);
718     free(realms);
719     return ret;
720 }
721 
722 
723 static krb5_error_code
724 tgs_make_reply(krb5_context context,
725 	       krb5_kdc_configuration *config,
726 	       KDC_REQ_BODY *b,
727 	       krb5_const_principal tgt_name,
728 	       const EncTicketPart *tgt,
729 	       const krb5_keyblock *replykey,
730 	       int rk_is_subkey,
731 	       const EncryptionKey *serverkey,
732 	       const krb5_keyblock *sessionkey,
733 	       krb5_kvno kvno,
734 	       AuthorizationData *auth_data,
735 	       hdb_entry_ex *server,
736 	       krb5_principal server_principal,
737 	       const char *server_name,
738 	       hdb_entry_ex *client,
739 	       krb5_principal client_principal,
740 	       hdb_entry_ex *krbtgt,
741 	       krb5_enctype krbtgt_etype,
742 	       krb5_principals spp,
743 	       const krb5_data *rspac,
744 	       const METHOD_DATA *enc_pa_data,
745 	       const char **e_text,
746 	       krb5_data *reply)
747 {
748     KDC_REP rep;
749     EncKDCRepPart ek;
750     EncTicketPart et;
751     KDCOptions f = b->kdc_options;
752     krb5_error_code ret;
753     int is_weak = 0;
754 
755     memset(&rep, 0, sizeof(rep));
756     memset(&et, 0, sizeof(et));
757     memset(&ek, 0, sizeof(ek));
758 
759     rep.pvno = 5;
760     rep.msg_type = krb_tgs_rep;
761 
762     et.authtime = tgt->authtime;
763     _kdc_fix_time(&b->till);
764     et.endtime = min(tgt->endtime, *b->till);
765     ALLOC(et.starttime);
766     *et.starttime = kdc_time;
767 
768     ret = check_tgs_flags(context, config, b, tgt, &et);
769     if(ret)
770 	goto out;
771 
772     /* We should check the transited encoding if:
773        1) the request doesn't ask not to be checked
774        2) globally enforcing a check
775        3) principal requires checking
776        4) we allow non-check per-principal, but principal isn't marked as allowing this
777        5) we don't globally allow this
778     */
779 
780 #define GLOBAL_FORCE_TRANSITED_CHECK		\
781     (config->trpolicy == TRPOLICY_ALWAYS_CHECK)
782 #define GLOBAL_ALLOW_PER_PRINCIPAL			\
783     (config->trpolicy == TRPOLICY_ALLOW_PER_PRINCIPAL)
784 #define GLOBAL_ALLOW_DISABLE_TRANSITED_CHECK			\
785     (config->trpolicy == TRPOLICY_ALWAYS_HONOUR_REQUEST)
786 
787 /* these will consult the database in future release */
788 #define PRINCIPAL_FORCE_TRANSITED_CHECK(P)		0
789 #define PRINCIPAL_ALLOW_DISABLE_TRANSITED_CHECK(P)	0
790 
791     ret = fix_transited_encoding(context, config,
792 				 !f.disable_transited_check ||
793 				 GLOBAL_FORCE_TRANSITED_CHECK ||
794 				 PRINCIPAL_FORCE_TRANSITED_CHECK(server) ||
795 				 !((GLOBAL_ALLOW_PER_PRINCIPAL &&
796 				    PRINCIPAL_ALLOW_DISABLE_TRANSITED_CHECK(server)) ||
797 				   GLOBAL_ALLOW_DISABLE_TRANSITED_CHECK),
798 				 &tgt->transited, &et,
799 				 krb5_principal_get_realm(context, client_principal),
800 				 krb5_principal_get_realm(context, server->entry.principal),
801 				 krb5_principal_get_realm(context, krbtgt->entry.principal));
802     if(ret)
803 	goto out;
804 
805     copy_Realm(&server_principal->realm, &rep.ticket.realm);
806     _krb5_principal2principalname(&rep.ticket.sname, server_principal);
807     copy_Realm(&tgt_name->realm, &rep.crealm);
808 /*
809     if (f.request_anonymous)
810 	_kdc_make_anonymous_principalname (&rep.cname);
811     else */
812 
813     copy_PrincipalName(&tgt_name->name, &rep.cname);
814     rep.ticket.tkt_vno = 5;
815 
816     ek.caddr = et.caddr;
817     if(et.caddr == NULL)
818 	et.caddr = tgt->caddr;
819 
820     {
821 	time_t life;
822 	life = et.endtime - *et.starttime;
823 	if(client && client->entry.max_life)
824 	    life = min(life, *client->entry.max_life);
825 	if(server->entry.max_life)
826 	    life = min(life, *server->entry.max_life);
827 	et.endtime = *et.starttime + life;
828     }
829     if(f.renewable_ok && tgt->flags.renewable &&
830        et.renew_till == NULL && et.endtime < *b->till &&
831        tgt->renew_till != NULL)
832     {
833 	et.flags.renewable = 1;
834 	ALLOC(et.renew_till);
835 	*et.renew_till = *b->till;
836     }
837     if(et.renew_till){
838 	time_t renew;
839 	renew = *et.renew_till - et.authtime;
840 	if(client && client->entry.max_renew)
841 	    renew = min(renew, *client->entry.max_renew);
842 	if(server->entry.max_renew)
843 	    renew = min(renew, *server->entry.max_renew);
844 	*et.renew_till = et.authtime + renew;
845     }
846 
847     if(et.renew_till){
848 	*et.renew_till = min(*et.renew_till, *tgt->renew_till);
849 	*et.starttime = min(*et.starttime, *et.renew_till);
850 	et.endtime = min(et.endtime, *et.renew_till);
851     }
852 
853     *et.starttime = min(*et.starttime, et.endtime);
854 
855     if(*et.starttime == et.endtime){
856 	ret = KRB5KDC_ERR_NEVER_VALID;
857 	goto out;
858     }
859     if(et.renew_till && et.endtime == *et.renew_till){
860 	free(et.renew_till);
861 	et.renew_till = NULL;
862 	et.flags.renewable = 0;
863     }
864 
865     et.flags.pre_authent = tgt->flags.pre_authent;
866     et.flags.hw_authent  = tgt->flags.hw_authent;
867     et.flags.anonymous   = tgt->flags.anonymous;
868     et.flags.ok_as_delegate = server->entry.flags.ok_as_delegate;
869 
870     if(rspac->length) {
871 	/*
872 	 * No not need to filter out the any PAC from the
873 	 * auth_data since it's signed by the KDC.
874 	 */
875 	ret = _kdc_tkt_add_if_relevant_ad(context, &et,
876 					  KRB5_AUTHDATA_WIN2K_PAC, rspac);
877 	if (ret)
878 	    goto out;
879     }
880 
881     if (auth_data) {
882 	unsigned int i = 0;
883 
884 	/* XXX check authdata */
885 
886 	if (et.authorization_data == NULL) {
887 	    et.authorization_data = calloc(1, sizeof(*et.authorization_data));
888 	    if (et.authorization_data == NULL) {
889 		ret = ENOMEM;
890 		krb5_set_error_message(context, ret, "malloc: out of memory");
891 		goto out;
892 	    }
893 	}
894 	for(i = 0; i < auth_data->len ; i++) {
895 	    ret = add_AuthorizationData(et.authorization_data, &auth_data->val[i]);
896 	    if (ret) {
897 		krb5_set_error_message(context, ret, "malloc: out of memory");
898 		goto out;
899 	    }
900 	}
901 
902 	/* Filter out type KRB5SignedPath */
903 	ret = find_KRB5SignedPath(context, et.authorization_data, NULL);
904 	if (ret == 0) {
905 	    if (et.authorization_data->len == 1) {
906 		free_AuthorizationData(et.authorization_data);
907 		free(et.authorization_data);
908 		et.authorization_data = NULL;
909 	    } else {
910 		AuthorizationData *ad = et.authorization_data;
911 		free_AuthorizationDataElement(&ad->val[ad->len - 1]);
912 		ad->len--;
913 	    }
914 	}
915     }
916 
917     ret = krb5_copy_keyblock_contents(context, sessionkey, &et.key);
918     if (ret)
919 	goto out;
920     et.crealm = tgt_name->realm;
921     et.cname = tgt_name->name;
922 
923     ek.key = et.key;
924     /* MIT must have at least one last_req */
925     ek.last_req.len = 1;
926     ek.last_req.val = calloc(1, sizeof(*ek.last_req.val));
927     if (ek.last_req.val == NULL) {
928 	ret = ENOMEM;
929 	goto out;
930     }
931     ek.nonce = b->nonce;
932     ek.flags = et.flags;
933     ek.authtime = et.authtime;
934     ek.starttime = et.starttime;
935     ek.endtime = et.endtime;
936     ek.renew_till = et.renew_till;
937     ek.srealm = rep.ticket.realm;
938     ek.sname = rep.ticket.sname;
939 
940     _kdc_log_timestamp(context, config, "TGS-REQ", et.authtime, et.starttime,
941 		       et.endtime, et.renew_till);
942 
943     /* Don't sign cross realm tickets, they can't be checked anyway */
944     {
945 	char *r = get_krbtgt_realm(&ek.sname);
946 
947 	if (r == NULL || strcmp(r, ek.srealm) == 0) {
948 	    ret = _kdc_add_KRB5SignedPath(context,
949 					  config,
950 					  krbtgt,
951 					  krbtgt_etype,
952 					  client_principal,
953 					  NULL,
954 					  spp,
955 					  &et);
956 	    if (ret)
957 		goto out;
958 	}
959     }
960 
961     if (enc_pa_data->len) {
962 	rep.padata = calloc(1, sizeof(*rep.padata));
963 	if (rep.padata == NULL) {
964 	    ret = ENOMEM;
965 	    goto out;
966 	}
967 	ret = copy_METHOD_DATA(enc_pa_data, rep.padata);
968 	if (ret)
969 	    goto out;
970     }
971 
972     if (krb5_enctype_valid(context, et.key.keytype) != 0
973 	&& _kdc_is_weak_exception(server->entry.principal, et.key.keytype))
974     {
975 	krb5_enctype_enable(context, et.key.keytype);
976 	is_weak = 1;
977     }
978 
979 
980     /* It is somewhat unclear where the etype in the following
981        encryption should come from. What we have is a session
982        key in the passed tgt, and a list of preferred etypes
983        *for the new ticket*. Should we pick the best possible
984        etype, given the keytype in the tgt, or should we look
985        at the etype list here as well?  What if the tgt
986        session key is DES3 and we want a ticket with a (say)
987        CAST session key. Should the DES3 etype be added to the
988        etype list, even if we don't want a session key with
989        DES3? */
990     ret = _kdc_encode_reply(context, config,
991 			    &rep, &et, &ek, et.key.keytype,
992 			    kvno,
993 			    serverkey, 0, replykey, rk_is_subkey,
994 			    e_text, reply);
995     if (is_weak)
996 	krb5_enctype_disable(context, et.key.keytype);
997 
998 out:
999     free_TGS_REP(&rep);
1000     free_TransitedEncoding(&et.transited);
1001     if(et.starttime)
1002 	free(et.starttime);
1003     if(et.renew_till)
1004 	free(et.renew_till);
1005     if(et.authorization_data) {
1006 	free_AuthorizationData(et.authorization_data);
1007 	free(et.authorization_data);
1008     }
1009     free_LastReq(&ek.last_req);
1010     memset(et.key.keyvalue.data, 0, et.key.keyvalue.length);
1011     free_EncryptionKey(&et.key);
1012     return ret;
1013 }
1014 
1015 static krb5_error_code
1016 tgs_check_authenticator(krb5_context context,
1017 			krb5_kdc_configuration *config,
1018 	                krb5_auth_context ac,
1019 			KDC_REQ_BODY *b,
1020 			const char **e_text,
1021 			krb5_keyblock *key)
1022 {
1023     krb5_authenticator auth;
1024     size_t len = 0;
1025     unsigned char *buf;
1026     size_t buf_size;
1027     krb5_error_code ret;
1028     krb5_crypto crypto;
1029 
1030     krb5_auth_con_getauthenticator(context, ac, &auth);
1031     if(auth->cksum == NULL){
1032 	kdc_log(context, config, 0, "No authenticator in request");
1033 	ret = KRB5KRB_AP_ERR_INAPP_CKSUM;
1034 	goto out;
1035     }
1036     /*
1037      * according to RFC1510 it doesn't need to be keyed,
1038      * but according to the latest draft it needs to.
1039      */
1040     if (
1041 #if 0
1042 !krb5_checksum_is_keyed(context, auth->cksum->cksumtype)
1043 	||
1044 #endif
1045  !krb5_checksum_is_collision_proof(context, auth->cksum->cksumtype)) {
1046 	kdc_log(context, config, 0, "Bad checksum type in authenticator: %d",
1047 		auth->cksum->cksumtype);
1048 	ret =  KRB5KRB_AP_ERR_INAPP_CKSUM;
1049 	goto out;
1050     }
1051 
1052     /* XXX should not re-encode this */
1053     ASN1_MALLOC_ENCODE(KDC_REQ_BODY, buf, buf_size, b, &len, ret);
1054     if(ret){
1055 	const char *msg = krb5_get_error_message(context, ret);
1056 	kdc_log(context, config, 0, "Failed to encode KDC-REQ-BODY: %s", msg);
1057 	krb5_free_error_message(context, msg);
1058 	goto out;
1059     }
1060     if(buf_size != len) {
1061 	free(buf);
1062 	kdc_log(context, config, 0, "Internal error in ASN.1 encoder");
1063 	*e_text = "KDC internal error";
1064 	ret = KRB5KRB_ERR_GENERIC;
1065 	goto out;
1066     }
1067     ret = krb5_crypto_init(context, key, 0, &crypto);
1068     if (ret) {
1069 	const char *msg = krb5_get_error_message(context, ret);
1070 	free(buf);
1071 	kdc_log(context, config, 0, "krb5_crypto_init failed: %s", msg);
1072 	krb5_free_error_message(context, msg);
1073 	goto out;
1074     }
1075     ret = krb5_verify_checksum(context,
1076 			       crypto,
1077 			       KRB5_KU_TGS_REQ_AUTH_CKSUM,
1078 			       buf,
1079 			       len,
1080 			       auth->cksum);
1081     free(buf);
1082     krb5_crypto_destroy(context, crypto);
1083     if(ret){
1084 	const char *msg = krb5_get_error_message(context, ret);
1085 	kdc_log(context, config, 0,
1086 		"Failed to verify authenticator checksum: %s", msg);
1087 	krb5_free_error_message(context, msg);
1088     }
1089 out:
1090     free_Authenticator(auth);
1091     free(auth);
1092     return ret;
1093 }
1094 
1095 /*
1096  *
1097  */
1098 
1099 static const char *
1100 find_rpath(krb5_context context, Realm crealm, Realm srealm)
1101 {
1102     const char *new_realm = krb5_config_get_string(context,
1103 						   NULL,
1104 						   "capaths",
1105 						   crealm,
1106 						   srealm,
1107 						   NULL);
1108     return new_realm;
1109 }
1110 
1111 
1112 static krb5_boolean
1113 need_referral(krb5_context context, krb5_kdc_configuration *config,
1114 	      const KDCOptions * const options, krb5_principal server,
1115 	      krb5_realm **realms)
1116 {
1117     const char *name;
1118 
1119     if(!options->canonicalize && server->name.name_type != KRB5_NT_SRV_INST)
1120 	return FALSE;
1121 
1122     if (server->name.name_string.len == 1)
1123 	name = server->name.name_string.val[0];
1124     else if (server->name.name_string.len > 1)
1125 	name = server->name.name_string.val[1];
1126     else
1127 	return FALSE;
1128 
1129     kdc_log(context, config, 0, "Searching referral for %s", name);
1130 
1131     return _krb5_get_host_realm_int(context, name, FALSE, realms) == 0;
1132 }
1133 
1134 static krb5_error_code
1135 tgs_parse_request(krb5_context context,
1136 		  krb5_kdc_configuration *config,
1137 		  KDC_REQ_BODY *b,
1138 		  const PA_DATA *tgs_req,
1139 		  hdb_entry_ex **krbtgt,
1140 		  krb5_enctype *krbtgt_etype,
1141 		  krb5_ticket **ticket,
1142 		  const char **e_text,
1143 		  const char *from,
1144 		  const struct sockaddr *from_addr,
1145 		  time_t **csec,
1146 		  int **cusec,
1147 		  AuthorizationData **auth_data,
1148 		  krb5_keyblock **replykey,
1149 		  int *rk_is_subkey)
1150 {
1151     static char failed[] = "<unparse_name failed>";
1152     krb5_ap_req ap_req;
1153     krb5_error_code ret;
1154     krb5_principal princ;
1155     krb5_auth_context ac = NULL;
1156     krb5_flags ap_req_options;
1157     krb5_flags verify_ap_req_flags;
1158     krb5_crypto crypto;
1159     Key *tkey;
1160     krb5_keyblock *subkey = NULL;
1161     unsigned usage;
1162 
1163     *auth_data = NULL;
1164     *csec  = NULL;
1165     *cusec = NULL;
1166     *replykey = NULL;
1167 
1168     memset(&ap_req, 0, sizeof(ap_req));
1169     ret = krb5_decode_ap_req(context, &tgs_req->padata_value, &ap_req);
1170     if(ret){
1171 	const char *msg = krb5_get_error_message(context, ret);
1172 	kdc_log(context, config, 0, "Failed to decode AP-REQ: %s", msg);
1173 	krb5_free_error_message(context, msg);
1174 	goto out;
1175     }
1176 
1177     if(!get_krbtgt_realm(&ap_req.ticket.sname)){
1178 	/* XXX check for ticket.sname == req.sname */
1179 	kdc_log(context, config, 0, "PA-DATA is not a ticket-granting ticket");
1180 	ret = KRB5KDC_ERR_POLICY; /* ? */
1181 	goto out;
1182     }
1183 
1184     _krb5_principalname2krb5_principal(context,
1185 				       &princ,
1186 				       ap_req.ticket.sname,
1187 				       ap_req.ticket.realm);
1188 
1189     ret = _kdc_db_fetch(context, config, princ, HDB_F_GET_KRBTGT, ap_req.ticket.enc_part.kvno, NULL, krbtgt);
1190 
1191     if(ret == HDB_ERR_NOT_FOUND_HERE) {
1192 	char *p;
1193 	ret = krb5_unparse_name(context, princ, &p);
1194 	if (ret != 0)
1195 	    p = failed;
1196 	krb5_free_principal(context, princ);
1197 	kdc_log(context, config, 5, "Ticket-granting ticket account %s does not have secrets at this KDC, need to proxy", p);
1198 	if (ret == 0)
1199 	    free(p);
1200 	ret = HDB_ERR_NOT_FOUND_HERE;
1201 	goto out;
1202     } else if(ret){
1203 	const char *msg = krb5_get_error_message(context, ret);
1204 	char *p;
1205 	ret = krb5_unparse_name(context, princ, &p);
1206 	if (ret != 0)
1207 	    p = failed;
1208 	krb5_free_principal(context, princ);
1209 	kdc_log(context, config, 0,
1210 		"Ticket-granting ticket not found in database: %s", msg);
1211 	krb5_free_error_message(context, msg);
1212 	if (ret == 0)
1213 	    free(p);
1214 	ret = KRB5KRB_AP_ERR_NOT_US;
1215 	goto out;
1216     }
1217 
1218     if(ap_req.ticket.enc_part.kvno &&
1219        *ap_req.ticket.enc_part.kvno != (*krbtgt)->entry.kvno){
1220 	char *p;
1221 
1222 	ret = krb5_unparse_name (context, princ, &p);
1223 	krb5_free_principal(context, princ);
1224 	if (ret != 0)
1225 	    p = failed;
1226 	kdc_log(context, config, 0,
1227 		"Ticket kvno = %d, DB kvno = %d (%s)",
1228 		*ap_req.ticket.enc_part.kvno,
1229 		(*krbtgt)->entry.kvno,
1230 		p);
1231 	if (ret == 0)
1232 	    free (p);
1233 	ret = KRB5KRB_AP_ERR_BADKEYVER;
1234 	goto out;
1235     }
1236 
1237     *krbtgt_etype = ap_req.ticket.enc_part.etype;
1238 
1239     ret = hdb_enctype2key(context, &(*krbtgt)->entry,
1240 			  ap_req.ticket.enc_part.etype, &tkey);
1241     if(ret){
1242 	char *str = NULL, *p = NULL;
1243 
1244 	krb5_enctype_to_string(context, ap_req.ticket.enc_part.etype, &str);
1245 	krb5_unparse_name(context, princ, &p);
1246  	kdc_log(context, config, 0,
1247 		"No server key with enctype %s found for %s",
1248 		str ? str : "<unknown enctype>",
1249 		p ? p : "<unparse_name failed>");
1250 	free(str);
1251 	free(p);
1252 	ret = KRB5KRB_AP_ERR_BADKEYVER;
1253 	goto out;
1254     }
1255 
1256     if (b->kdc_options.validate)
1257 	verify_ap_req_flags = KRB5_VERIFY_AP_REQ_IGNORE_INVALID;
1258     else
1259 	verify_ap_req_flags = 0;
1260 
1261     ret = krb5_verify_ap_req2(context,
1262 			      &ac,
1263 			      &ap_req,
1264 			      princ,
1265 			      &tkey->key,
1266 			      verify_ap_req_flags,
1267 			      &ap_req_options,
1268 			      ticket,
1269 			      KRB5_KU_TGS_REQ_AUTH);
1270 
1271     krb5_free_principal(context, princ);
1272     if(ret) {
1273 	const char *msg = krb5_get_error_message(context, ret);
1274 	kdc_log(context, config, 0, "Failed to verify AP-REQ: %s", msg);
1275 	krb5_free_error_message(context, msg);
1276 	goto out;
1277     }
1278 
1279     {
1280 	krb5_authenticator auth;
1281 
1282 	ret = krb5_auth_con_getauthenticator(context, ac, &auth);
1283 	if (ret == 0) {
1284 	    *csec   = malloc(sizeof(**csec));
1285 	    if (*csec == NULL) {
1286 		krb5_free_authenticator(context, &auth);
1287 		kdc_log(context, config, 0, "malloc failed");
1288 		goto out;
1289 	    }
1290 	    **csec  = auth->ctime;
1291 	    *cusec  = malloc(sizeof(**cusec));
1292 	    if (*cusec == NULL) {
1293 		krb5_free_authenticator(context, &auth);
1294 		kdc_log(context, config, 0, "malloc failed");
1295 		goto out;
1296 	    }
1297 	    **cusec  = auth->cusec;
1298 	    krb5_free_authenticator(context, &auth);
1299 	}
1300     }
1301 
1302     ret = tgs_check_authenticator(context, config,
1303 				  ac, b, e_text, &(*ticket)->ticket.key);
1304     if (ret) {
1305 	krb5_auth_con_free(context, ac);
1306 	goto out;
1307     }
1308 
1309     usage = KRB5_KU_TGS_REQ_AUTH_DAT_SUBKEY;
1310     *rk_is_subkey = 1;
1311 
1312     ret = krb5_auth_con_getremotesubkey(context, ac, &subkey);
1313     if(ret){
1314 	const char *msg = krb5_get_error_message(context, ret);
1315 	krb5_auth_con_free(context, ac);
1316 	kdc_log(context, config, 0, "Failed to get remote subkey: %s", msg);
1317 	krb5_free_error_message(context, msg);
1318 	goto out;
1319     }
1320     if(subkey == NULL){
1321 	usage = KRB5_KU_TGS_REQ_AUTH_DAT_SESSION;
1322 	*rk_is_subkey = 0;
1323 
1324 	ret = krb5_auth_con_getkey(context, ac, &subkey);
1325 	if(ret) {
1326 	    const char *msg = krb5_get_error_message(context, ret);
1327 	    krb5_auth_con_free(context, ac);
1328 	    kdc_log(context, config, 0, "Failed to get session key: %s", msg);
1329 	    krb5_free_error_message(context, msg);
1330 	    goto out;
1331 	}
1332     }
1333     if(subkey == NULL){
1334 	krb5_auth_con_free(context, ac);
1335 	kdc_log(context, config, 0,
1336 		"Failed to get key for enc-authorization-data");
1337 	ret = KRB5KRB_AP_ERR_BAD_INTEGRITY; /* ? */
1338 	goto out;
1339     }
1340 
1341     *replykey = subkey;
1342 
1343     if (b->enc_authorization_data) {
1344 	krb5_data ad;
1345 
1346 	ret = krb5_crypto_init(context, subkey, 0, &crypto);
1347 	if (ret) {
1348 	    const char *msg = krb5_get_error_message(context, ret);
1349 	    krb5_auth_con_free(context, ac);
1350 	    kdc_log(context, config, 0, "krb5_crypto_init failed: %s", msg);
1351 	    krb5_free_error_message(context, msg);
1352 	    goto out;
1353 	}
1354 	ret = krb5_decrypt_EncryptedData (context,
1355 					  crypto,
1356 					  usage,
1357 					  b->enc_authorization_data,
1358 					  &ad);
1359 	krb5_crypto_destroy(context, crypto);
1360 	if(ret){
1361 	    krb5_auth_con_free(context, ac);
1362 	    kdc_log(context, config, 0,
1363 		    "Failed to decrypt enc-authorization-data");
1364 	    ret = KRB5KRB_AP_ERR_BAD_INTEGRITY; /* ? */
1365 	    goto out;
1366 	}
1367 	ALLOC(*auth_data);
1368 	if (*auth_data == NULL) {
1369 	    krb5_auth_con_free(context, ac);
1370 	    ret = KRB5KRB_AP_ERR_BAD_INTEGRITY; /* ? */
1371 	    goto out;
1372 	}
1373 	ret = decode_AuthorizationData(ad.data, ad.length, *auth_data, NULL);
1374 	if(ret){
1375 	    krb5_auth_con_free(context, ac);
1376 	    free(*auth_data);
1377 	    *auth_data = NULL;
1378 	    kdc_log(context, config, 0, "Failed to decode authorization data");
1379 	    ret = KRB5KRB_AP_ERR_BAD_INTEGRITY; /* ? */
1380 	    goto out;
1381 	}
1382     }
1383 
1384     krb5_auth_con_free(context, ac);
1385 
1386 out:
1387     free_AP_REQ(&ap_req);
1388 
1389     return ret;
1390 }
1391 
1392 static krb5_error_code
1393 build_server_referral(krb5_context context,
1394 		      krb5_kdc_configuration *config,
1395 		      krb5_crypto session,
1396 		      krb5_const_realm referred_realm,
1397 		      const PrincipalName *true_principal_name,
1398 		      const PrincipalName *requested_principal,
1399 		      krb5_data *outdata)
1400 {
1401     PA_ServerReferralData ref;
1402     krb5_error_code ret;
1403     EncryptedData ed;
1404     krb5_data data;
1405     size_t size = 0;
1406 
1407     memset(&ref, 0, sizeof(ref));
1408 
1409     if (referred_realm) {
1410 	ALLOC(ref.referred_realm);
1411 	if (ref.referred_realm == NULL)
1412 	    goto eout;
1413 	*ref.referred_realm = strdup(referred_realm);
1414 	if (*ref.referred_realm == NULL)
1415 	    goto eout;
1416     }
1417     if (true_principal_name) {
1418 	ALLOC(ref.true_principal_name);
1419 	if (ref.true_principal_name == NULL)
1420 	    goto eout;
1421 	ret = copy_PrincipalName(true_principal_name, ref.true_principal_name);
1422 	if (ret)
1423 	    goto eout;
1424     }
1425     if (requested_principal) {
1426 	ALLOC(ref.requested_principal_name);
1427 	if (ref.requested_principal_name == NULL)
1428 	    goto eout;
1429 	ret = copy_PrincipalName(requested_principal,
1430 				 ref.requested_principal_name);
1431 	if (ret)
1432 	    goto eout;
1433     }
1434 
1435     ASN1_MALLOC_ENCODE(PA_ServerReferralData,
1436 		       data.data, data.length,
1437 		       &ref, &size, ret);
1438     free_PA_ServerReferralData(&ref);
1439     if (ret)
1440 	return ret;
1441     if (data.length != size)
1442 	krb5_abortx(context, "internal asn.1 encoder error");
1443 
1444     ret = krb5_encrypt_EncryptedData(context, session,
1445 				     KRB5_KU_PA_SERVER_REFERRAL,
1446 				     data.data, data.length,
1447 				     0 /* kvno */, &ed);
1448     free(data.data);
1449     if (ret)
1450 	return ret;
1451 
1452     ASN1_MALLOC_ENCODE(EncryptedData,
1453 		       outdata->data, outdata->length,
1454 		       &ed, &size, ret);
1455     free_EncryptedData(&ed);
1456     if (ret)
1457 	return ret;
1458     if (outdata->length != size)
1459 	krb5_abortx(context, "internal asn.1 encoder error");
1460 
1461     return 0;
1462 eout:
1463     free_PA_ServerReferralData(&ref);
1464     krb5_set_error_message(context, ENOMEM, "malloc: out of memory");
1465     return ENOMEM;
1466 }
1467 
1468 static krb5_error_code
1469 tgs_build_reply(krb5_context context,
1470 		krb5_kdc_configuration *config,
1471 		KDC_REQ *req,
1472 		KDC_REQ_BODY *b,
1473 		hdb_entry_ex *krbtgt,
1474 		krb5_enctype krbtgt_etype,
1475 		const krb5_keyblock *replykey,
1476 		int rk_is_subkey,
1477 		krb5_ticket *ticket,
1478 		krb5_data *reply,
1479 		const char *from,
1480 		const char **e_text,
1481 		AuthorizationData **auth_data,
1482 		const struct sockaddr *from_addr)
1483 {
1484     krb5_error_code ret;
1485     krb5_principal cp = NULL, sp = NULL, rsp = NULL, tp = NULL, dp = NULL;
1486     krb5_principal krbtgt_principal = NULL;
1487     char *spn = NULL, *cpn = NULL, *tpn = NULL, *dpn = NULL;
1488     hdb_entry_ex *server = NULL, *client = NULL, *s4u2self_impersonated_client = NULL;
1489     HDB *clientdb, *s4u2self_impersonated_clientdb;
1490     krb5_realm ref_realm = NULL;
1491     EncTicketPart *tgt = &ticket->ticket;
1492     krb5_principals spp = NULL;
1493     const EncryptionKey *ekey;
1494     krb5_keyblock sessionkey;
1495     krb5_kvno kvno;
1496     krb5_data rspac;
1497 
1498     hdb_entry_ex *krbtgt_out = NULL;
1499 
1500     METHOD_DATA enc_pa_data;
1501 
1502     PrincipalName *s;
1503     Realm r;
1504     int nloop = 0;
1505     EncTicketPart adtkt;
1506     char opt_str[128];
1507     int signedpath = 0;
1508 
1509     Key *tkey_check;
1510     Key *tkey_sign;
1511     int flags = HDB_F_FOR_TGS_REQ;
1512 
1513     memset(&sessionkey, 0, sizeof(sessionkey));
1514     memset(&adtkt, 0, sizeof(adtkt));
1515     krb5_data_zero(&rspac);
1516     memset(&enc_pa_data, 0, sizeof(enc_pa_data));
1517 
1518     s = b->sname;
1519     r = b->realm;
1520 
1521     /*
1522      * Always to do CANON, see comment below about returned server principal (rsp).
1523      */
1524     flags |= HDB_F_CANON;
1525 
1526     if(b->kdc_options.enc_tkt_in_skey){
1527 	Ticket *t;
1528 	hdb_entry_ex *uu;
1529 	krb5_principal p;
1530 	Key *uukey;
1531 
1532 	if(b->additional_tickets == NULL ||
1533 	   b->additional_tickets->len == 0){
1534 	    ret = KRB5KDC_ERR_BADOPTION; /* ? */
1535 	    kdc_log(context, config, 0,
1536 		    "No second ticket present in request");
1537 	    goto out;
1538 	}
1539 	t = &b->additional_tickets->val[0];
1540 	if(!get_krbtgt_realm(&t->sname)){
1541 	    kdc_log(context, config, 0,
1542 		    "Additional ticket is not a ticket-granting ticket");
1543 	    ret = KRB5KDC_ERR_POLICY;
1544 	    goto out;
1545 	}
1546 	_krb5_principalname2krb5_principal(context, &p, t->sname, t->realm);
1547 	ret = _kdc_db_fetch(context, config, p,
1548 			    HDB_F_GET_KRBTGT, t->enc_part.kvno,
1549 			    NULL, &uu);
1550 	krb5_free_principal(context, p);
1551 	if(ret){
1552 	    if (ret == HDB_ERR_NOENTRY)
1553 		ret = KRB5KDC_ERR_S_PRINCIPAL_UNKNOWN;
1554 	    goto out;
1555 	}
1556 	ret = hdb_enctype2key(context, &uu->entry,
1557 			      t->enc_part.etype, &uukey);
1558 	if(ret){
1559 	    _kdc_free_ent(context, uu);
1560 	    ret = KRB5KDC_ERR_ETYPE_NOSUPP; /* XXX */
1561 	    goto out;
1562 	}
1563 	ret = krb5_decrypt_ticket(context, t, &uukey->key, &adtkt, 0);
1564 	_kdc_free_ent(context, uu);
1565 	if(ret)
1566 	    goto out;
1567 
1568 	ret = verify_flags(context, config, &adtkt, spn);
1569 	if (ret)
1570 	    goto out;
1571 
1572 	s = &adtkt.cname;
1573 	r = adtkt.crealm;
1574     }
1575 
1576     _krb5_principalname2krb5_principal(context, &sp, *s, r);
1577     ret = krb5_unparse_name(context, sp, &spn);
1578     if (ret)
1579 	goto out;
1580     _krb5_principalname2krb5_principal(context, &cp, tgt->cname, tgt->crealm);
1581     ret = krb5_unparse_name(context, cp, &cpn);
1582     if (ret)
1583 	goto out;
1584     unparse_flags (KDCOptions2int(b->kdc_options),
1585 		   asn1_KDCOptions_units(),
1586 		   opt_str, sizeof(opt_str));
1587     if(*opt_str)
1588 	kdc_log(context, config, 0,
1589 		"TGS-REQ %s from %s for %s [%s]",
1590 		cpn, from, spn, opt_str);
1591     else
1592 	kdc_log(context, config, 0,
1593 		"TGS-REQ %s from %s for %s", cpn, from, spn);
1594 
1595     /*
1596      * Fetch server
1597      */
1598 
1599 server_lookup:
1600     ret = _kdc_db_fetch(context, config, sp, HDB_F_GET_SERVER | flags,
1601 			NULL, NULL, &server);
1602 
1603     if(ret == HDB_ERR_NOT_FOUND_HERE) {
1604 	kdc_log(context, config, 5, "target %s does not have secrets at this KDC, need to proxy", sp);
1605 	goto out;
1606     } else if(ret){
1607 	const char *new_rlm, *msg;
1608 	Realm req_rlm;
1609 	krb5_realm *realms;
1610 
1611 	if ((req_rlm = get_krbtgt_realm(&sp->name)) != NULL) {
1612 	    if(nloop++ < 2) {
1613 		new_rlm = find_rpath(context, tgt->crealm, req_rlm);
1614 		if(new_rlm) {
1615 		    kdc_log(context, config, 5, "krbtgt for realm %s "
1616 			    "not found, trying %s",
1617 			    req_rlm, new_rlm);
1618 		    krb5_free_principal(context, sp);
1619 		    free(spn);
1620 		    krb5_make_principal(context, &sp, r,
1621 					KRB5_TGS_NAME, new_rlm, NULL);
1622 		    ret = krb5_unparse_name(context, sp, &spn);
1623 		    if (ret)
1624 			goto out;
1625 
1626 		    if (ref_realm)
1627 			free(ref_realm);
1628 		    ref_realm = strdup(new_rlm);
1629 		    goto server_lookup;
1630 		}
1631 	    }
1632 	} else if(need_referral(context, config, &b->kdc_options, sp, &realms)) {
1633 	    if (strcmp(realms[0], sp->realm) != 0) {
1634 		kdc_log(context, config, 5,
1635 			"Returning a referral to realm %s for "
1636 			"server %s that was not found",
1637 			realms[0], spn);
1638 		krb5_free_principal(context, sp);
1639 		free(spn);
1640 		krb5_make_principal(context, &sp, r, KRB5_TGS_NAME,
1641 				    realms[0], NULL);
1642 		ret = krb5_unparse_name(context, sp, &spn);
1643 		if (ret)
1644 		    goto out;
1645 
1646 		if (ref_realm)
1647 		    free(ref_realm);
1648 		ref_realm = strdup(realms[0]);
1649 
1650 		krb5_free_host_realm(context, realms);
1651 		goto server_lookup;
1652 	    }
1653 	    krb5_free_host_realm(context, realms);
1654 	}
1655 	msg = krb5_get_error_message(context, ret);
1656 	kdc_log(context, config, 0,
1657 		"Server not found in database: %s: %s", spn, msg);
1658 	krb5_free_error_message(context, msg);
1659 	if (ret == HDB_ERR_NOENTRY)
1660 	    ret = KRB5KDC_ERR_S_PRINCIPAL_UNKNOWN;
1661 	goto out;
1662     }
1663 
1664     /* the name returned to the client depend on what was asked for,
1665      * return canonical name if kdc_options.canonicalize was set, the
1666      * client wants the true name of the principal, if not it just
1667      * wants the name its asked for.
1668      */
1669 
1670     if (b->kdc_options.canonicalize)
1671 	rsp = server->entry.principal;
1672     else
1673 	rsp = sp;
1674 
1675 
1676     /*
1677      * Select enctype, return key and kvno.
1678      */
1679 
1680     {
1681 	krb5_enctype etype;
1682 
1683 	if(b->kdc_options.enc_tkt_in_skey) {
1684 	    size_t i;
1685 	    ekey = &adtkt.key;
1686 	    for(i = 0; i < b->etype.len; i++)
1687 		if (b->etype.val[i] == adtkt.key.keytype)
1688 		    break;
1689 	    if(i == b->etype.len) {
1690 		kdc_log(context, config, 0,
1691 			"Addition ticket have not matching etypes");
1692 		krb5_clear_error_message(context);
1693 		ret = KRB5KDC_ERR_ETYPE_NOSUPP;
1694 		goto out;
1695 	    }
1696 	    etype = b->etype.val[i];
1697 	    kvno = 0;
1698 	} else {
1699 	    Key *skey;
1700 
1701 	    ret = _kdc_find_etype(context,
1702 				  krb5_principal_is_krbtgt(context, sp) ?
1703 				  config->tgt_use_strongest_session_key :
1704 				  config->svc_use_strongest_session_key, FALSE,
1705 				  server, b->etype.val, b->etype.len, NULL,
1706 				  &skey);
1707 	    if(ret) {
1708 		kdc_log(context, config, 0,
1709 			"Server (%s) has no support for etypes", spn);
1710 		goto out;
1711 	    }
1712 	    ekey = &skey->key;
1713 	    etype = skey->key.keytype;
1714 	    kvno = server->entry.kvno;
1715 	}
1716 
1717 	ret = krb5_generate_random_keyblock(context, etype, &sessionkey);
1718 	if (ret)
1719 	    goto out;
1720     }
1721 
1722     /*
1723      * Check that service is in the same realm as the krbtgt. If it's
1724      * not the same, it's someone that is using a uni-directional trust
1725      * backward.
1726      */
1727 
1728     /*
1729      * Validate authoriation data
1730      */
1731 
1732     ret = hdb_enctype2key(context, &krbtgt->entry,
1733 			  krbtgt_etype, &tkey_check);
1734     if(ret) {
1735 	kdc_log(context, config, 0,
1736 		    "Failed to find key for krbtgt PAC check");
1737 	goto out;
1738     }
1739 
1740     /* Now refetch the primary krbtgt, and get the current kvno (the
1741      * sign check may have been on an old kvno, and the server may
1742      * have been an incoming trust) */
1743     ret = krb5_make_principal(context, &krbtgt_principal,
1744 			      krb5_principal_get_comp_string(context,
1745 							     krbtgt->entry.principal,
1746 							     1),
1747 			      KRB5_TGS_NAME,
1748 			      krb5_principal_get_comp_string(context,
1749 							     krbtgt->entry.principal,
1750 							     1), NULL);
1751     if(ret) {
1752 	kdc_log(context, config, 0,
1753 		    "Failed to generate krbtgt principal");
1754 	goto out;
1755     }
1756 
1757     ret = _kdc_db_fetch(context, config, krbtgt_principal, HDB_F_GET_KRBTGT, NULL, NULL, &krbtgt_out);
1758     krb5_free_principal(context, krbtgt_principal);
1759     if (ret) {
1760 	krb5_error_code ret2;
1761 	char *ktpn, *ktpn2;
1762 	ret = krb5_unparse_name(context, krbtgt->entry.principal, &ktpn);
1763 	ret2 = krb5_unparse_name(context, krbtgt_principal, &ktpn2);
1764 	kdc_log(context, config, 0,
1765 		"Request with wrong krbtgt: %s, %s not found in our database",
1766 		(ret == 0) ? ktpn : "<unknown>", (ret2 == 0) ? ktpn2 : "<unknown>");
1767 	if(ret == 0)
1768 	    free(ktpn);
1769 	if(ret2 == 0)
1770 	    free(ktpn2);
1771 	ret = KRB5KRB_AP_ERR_NOT_US;
1772 	goto out;
1773     }
1774 
1775     /* The first realm is the realm of the service, the second is
1776      * krbtgt/<this>/@REALM component of the krbtgt DN the request was
1777      * encrypted to.  The redirection via the krbtgt_out entry allows
1778      * the DB to possibly correct the case of the realm (Samba4 does
1779      * this) before the strcmp() */
1780     if (strcmp(krb5_principal_get_realm(context, server->entry.principal),
1781 	       krb5_principal_get_realm(context, krbtgt_out->entry.principal)) != 0) {
1782 	char *ktpn;
1783 	ret = krb5_unparse_name(context, krbtgt_out->entry.principal, &ktpn);
1784 	kdc_log(context, config, 0,
1785 		"Request with wrong krbtgt: %s",
1786 		(ret == 0) ? ktpn : "<unknown>");
1787 	if(ret == 0)
1788 	    free(ktpn);
1789 	ret = KRB5KRB_AP_ERR_NOT_US;
1790     }
1791 
1792     ret = hdb_enctype2key(context, &krbtgt_out->entry,
1793 			  krbtgt_etype, &tkey_sign);
1794     if(ret) {
1795 	kdc_log(context, config, 0,
1796 		    "Failed to find key for krbtgt PAC signature");
1797 	goto out;
1798     }
1799 
1800     ret = _kdc_db_fetch(context, config, cp, HDB_F_GET_CLIENT | flags,
1801 			NULL, &clientdb, &client);
1802     if(ret == HDB_ERR_NOT_FOUND_HERE) {
1803 	/* This is OK, we are just trying to find out if they have
1804 	 * been disabled or deleted in the meantime, missing secrets
1805 	 * is OK */
1806     } else if(ret){
1807 	const char *krbtgt_realm, *msg;
1808 
1809 	/*
1810 	 * If the client belongs to the same realm as our krbtgt, it
1811 	 * should exist in the local database.
1812 	 *
1813 	 */
1814 
1815 	krbtgt_realm = krb5_principal_get_realm(context, krbtgt_out->entry.principal);
1816 
1817 	if(strcmp(krb5_principal_get_realm(context, cp), krbtgt_realm) == 0) {
1818 	    if (ret == HDB_ERR_NOENTRY)
1819 		ret = KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN;
1820 	    kdc_log(context, config, 1, "Client no longer in database: %s",
1821 		    cpn);
1822 	    goto out;
1823 	}
1824 
1825 	msg = krb5_get_error_message(context, ret);
1826 	kdc_log(context, config, 1, "Client not found in database: %s", msg);
1827 	krb5_free_error_message(context, msg);
1828     }
1829 
1830     ret = check_PAC(context, config, cp, NULL,
1831 		    client, server, krbtgt,
1832 		    &tkey_check->key, &tkey_check->key,
1833 		    ekey, &tkey_sign->key,
1834 		    tgt, &rspac, &signedpath);
1835     if (ret) {
1836 	const char *msg = krb5_get_error_message(context, ret);
1837 	kdc_log(context, config, 0,
1838 		"Verify PAC failed for %s (%s) from %s with %s",
1839 		spn, cpn, from, msg);
1840 	krb5_free_error_message(context, msg);
1841 	goto out;
1842     }
1843 
1844     /* also check the krbtgt for signature */
1845     ret = check_KRB5SignedPath(context,
1846 			       config,
1847 			       krbtgt,
1848 			       cp,
1849 			       tgt,
1850 			       &spp,
1851 			       &signedpath);
1852     if (ret) {
1853 	const char *msg = krb5_get_error_message(context, ret);
1854 	kdc_log(context, config, 0,
1855 		"KRB5SignedPath check failed for %s (%s) from %s with %s",
1856 		spn, cpn, from, msg);
1857 	krb5_free_error_message(context, msg);
1858 	goto out;
1859     }
1860 
1861     /*
1862      * Process request
1863      */
1864 
1865     /* by default the tgt principal matches the client principal */
1866     tp = cp;
1867     tpn = cpn;
1868 
1869     if (client) {
1870 	const PA_DATA *sdata;
1871 	int i = 0;
1872 
1873 	sdata = _kdc_find_padata(req, &i, KRB5_PADATA_FOR_USER);
1874 	if (sdata) {
1875 	    krb5_crypto crypto;
1876 	    krb5_data datack;
1877 	    PA_S4U2Self self;
1878 	    const char *str;
1879 
1880 	    ret = decode_PA_S4U2Self(sdata->padata_value.data,
1881 				     sdata->padata_value.length,
1882 				     &self, NULL);
1883 	    if (ret) {
1884 		kdc_log(context, config, 0, "Failed to decode PA-S4U2Self");
1885 		goto out;
1886 	    }
1887 
1888 	    ret = _krb5_s4u2self_to_checksumdata(context, &self, &datack);
1889 	    if (ret)
1890 		goto out;
1891 
1892 	    ret = krb5_crypto_init(context, &tgt->key, 0, &crypto);
1893 	    if (ret) {
1894 		const char *msg = krb5_get_error_message(context, ret);
1895 		free_PA_S4U2Self(&self);
1896 		krb5_data_free(&datack);
1897 		kdc_log(context, config, 0, "krb5_crypto_init failed: %s", msg);
1898 		krb5_free_error_message(context, msg);
1899 		goto out;
1900 	    }
1901 
1902 	    ret = krb5_verify_checksum(context,
1903 				       crypto,
1904 				       KRB5_KU_OTHER_CKSUM,
1905 				       datack.data,
1906 				       datack.length,
1907 				       &self.cksum);
1908 	    krb5_data_free(&datack);
1909 	    krb5_crypto_destroy(context, crypto);
1910 	    if (ret) {
1911 		const char *msg = krb5_get_error_message(context, ret);
1912 		free_PA_S4U2Self(&self);
1913 		kdc_log(context, config, 0,
1914 			"krb5_verify_checksum failed for S4U2Self: %s", msg);
1915 		krb5_free_error_message(context, msg);
1916 		goto out;
1917 	    }
1918 
1919 	    ret = _krb5_principalname2krb5_principal(context,
1920 						     &tp,
1921 						     self.name,
1922 						     self.realm);
1923 	    free_PA_S4U2Self(&self);
1924 	    if (ret)
1925 		goto out;
1926 
1927 	    ret = krb5_unparse_name(context, tp, &tpn);
1928 	    if (ret)
1929 		goto out;
1930 
1931 	    ret = _kdc_db_fetch(context, config, tp, HDB_F_GET_CLIENT | flags,
1932 				NULL, &s4u2self_impersonated_clientdb,
1933 				&s4u2self_impersonated_client);
1934 	    if (ret) {
1935 		const char *msg;
1936 
1937 		/*
1938 		 * If the client belongs to the same realm as our krbtgt, it
1939 		 * should exist in the local database.
1940 		 *
1941 		 */
1942 
1943 		if (ret == HDB_ERR_NOENTRY)
1944 		    ret = KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN;
1945 		msg = krb5_get_error_message(context, ret);
1946 		kdc_log(context, config, 2,
1947 			"S4U2Self principal to impersonate %s not found in database: %s",
1948 			tpn, msg);
1949 		krb5_free_error_message(context, msg);
1950 		goto out;
1951 	    }
1952 
1953 	    free(s4u2self_impersonated_client->entry.pw_end);
1954 	    s4u2self_impersonated_client->entry.pw_end = NULL;
1955 
1956 	    ret = kdc_check_flags(context, config, s4u2self_impersonated_client, tpn,
1957 				  NULL, NULL, FALSE);
1958 	    if (ret)
1959 		goto out;
1960 
1961 	    /* If we were about to put a PAC into the ticket, we better fix it to be the right PAC */
1962 	    if(rspac.data) {
1963 		krb5_pac p = NULL;
1964 		krb5_data_free(&rspac);
1965 		ret = _kdc_pac_generate(context, s4u2self_impersonated_client, &p);
1966 		if (ret) {
1967 		    kdc_log(context, config, 0, "PAC generation failed for -- %s",
1968 			    tpn);
1969 		    goto out;
1970 		}
1971 		if (p != NULL) {
1972 		    ret = _krb5_pac_sign(context, p, ticket->ticket.authtime,
1973 					 s4u2self_impersonated_client->entry.principal,
1974 					 ekey, &tkey_sign->key,
1975 					 &rspac);
1976 		    krb5_pac_free(context, p);
1977 		    if (ret) {
1978 			kdc_log(context, config, 0, "PAC signing failed for -- %s",
1979 				tpn);
1980 			goto out;
1981 		    }
1982 		}
1983 	    }
1984 
1985 	    /*
1986 	     * Check that service doing the impersonating is
1987 	     * requesting a ticket to it-self.
1988 	     */
1989 	    ret = check_s4u2self(context, config, clientdb, client, sp);
1990 	    if (ret) {
1991 		kdc_log(context, config, 0, "S4U2Self: %s is not allowed "
1992 			"to impersonate to service "
1993 			"(tried for user %s to service %s)",
1994 			cpn, tpn, spn);
1995 		goto out;
1996 	    }
1997 
1998 	    /*
1999 	     * If the service isn't trusted for authentication to
2000 	     * delegation or if the impersonate client is disallowed
2001 	     * forwardable, remove the forwardable flag.
2002 	     */
2003 
2004 	    if (client->entry.flags.trusted_for_delegation &&
2005 		s4u2self_impersonated_client->entry.flags.forwardable) {
2006 		str = "[forwardable]";
2007 	    } else {
2008 		b->kdc_options.forwardable = 0;
2009 		str = "";
2010 	    }
2011 	    kdc_log(context, config, 0, "s4u2self %s impersonating %s to "
2012 		    "service %s %s", cpn, tpn, spn, str);
2013 	}
2014     }
2015 
2016     /*
2017      * Constrained delegation
2018      */
2019 
2020     if (client != NULL
2021 	&& b->additional_tickets != NULL
2022 	&& b->additional_tickets->len != 0
2023 	&& b->kdc_options.enc_tkt_in_skey == 0)
2024     {
2025 	int ad_signedpath = 0;
2026 	Key *clientkey;
2027 	Ticket *t;
2028 
2029 	/*
2030 	 * Require that the KDC have issued the service's krbtgt (not
2031 	 * self-issued ticket with kimpersonate(1).
2032 	 */
2033 	if (!signedpath) {
2034 	    ret = KRB5KDC_ERR_BADOPTION;
2035 	    kdc_log(context, config, 0,
2036 		    "Constrained delegation done on service ticket %s/%s",
2037 		    cpn, spn);
2038 	    goto out;
2039 	}
2040 
2041 	t = &b->additional_tickets->val[0];
2042 
2043 	ret = hdb_enctype2key(context, &client->entry,
2044 			      t->enc_part.etype, &clientkey);
2045 	if(ret){
2046 	    ret = KRB5KDC_ERR_ETYPE_NOSUPP; /* XXX */
2047 	    goto out;
2048 	}
2049 
2050 	ret = krb5_decrypt_ticket(context, t, &clientkey->key, &adtkt, 0);
2051 	if (ret) {
2052 	    kdc_log(context, config, 0,
2053 		    "failed to decrypt ticket for "
2054 		    "constrained delegation from %s to %s ", cpn, spn);
2055 	    goto out;
2056 	}
2057 
2058 	ret = _krb5_principalname2krb5_principal(context,
2059 						 &tp,
2060 						 adtkt.cname,
2061 						 adtkt.crealm);
2062 	if (ret)
2063 	    goto out;
2064 
2065 	ret = krb5_unparse_name(context, tp, &tpn);
2066 	if (ret)
2067 	    goto out;
2068 
2069 	ret = _krb5_principalname2krb5_principal(context,
2070 						 &dp,
2071 						 t->sname,
2072 						 t->realm);
2073 	if (ret)
2074 	    goto out;
2075 
2076 	ret = krb5_unparse_name(context, dp, &dpn);
2077 	if (ret)
2078 	    goto out;
2079 
2080 	/* check that ticket is valid */
2081 	if (adtkt.flags.forwardable == 0) {
2082 	    kdc_log(context, config, 0,
2083 		    "Missing forwardable flag on ticket for "
2084 		    "constrained delegation from %s (%s) as %s to %s ",
2085 		    cpn, dpn, tpn, spn);
2086 	    ret = KRB5KDC_ERR_BADOPTION;
2087 	    goto out;
2088 	}
2089 
2090 	ret = check_constrained_delegation(context, config, clientdb,
2091 					   client, server, sp);
2092 	if (ret) {
2093 	    kdc_log(context, config, 0,
2094 		    "constrained delegation from %s (%s) as %s to %s not allowed",
2095 		    cpn, dpn, tpn, spn);
2096 	    goto out;
2097 	}
2098 
2099 	ret = verify_flags(context, config, &adtkt, tpn);
2100 	if (ret) {
2101 	    goto out;
2102 	}
2103 
2104 	krb5_data_free(&rspac);
2105 
2106 	/*
2107 	 * generate the PAC for the user.
2108 	 *
2109 	 * TODO: pass in t->sname and t->realm and build
2110 	 * a S4U_DELEGATION_INFO blob to the PAC.
2111 	 */
2112 	ret = check_PAC(context, config, tp, dp,
2113 			client, server, krbtgt,
2114 			&clientkey->key, &tkey_check->key,
2115 			ekey, &tkey_sign->key,
2116 			&adtkt, &rspac, &ad_signedpath);
2117 	if (ret) {
2118 	    const char *msg = krb5_get_error_message(context, ret);
2119 	    kdc_log(context, config, 0,
2120 		    "Verify delegated PAC failed to %s for client"
2121 		    "%s (%s) as %s from %s with %s",
2122 		    spn, cpn, dpn, tpn, from, msg);
2123 	    krb5_free_error_message(context, msg);
2124 	    goto out;
2125 	}
2126 
2127 	/*
2128 	 * Check that the KDC issued the user's ticket.
2129 	 */
2130 	ret = check_KRB5SignedPath(context,
2131 				   config,
2132 				   krbtgt,
2133 				   cp,
2134 				   &adtkt,
2135 				   NULL,
2136 				   &ad_signedpath);
2137 	if (ret) {
2138 	    const char *msg = krb5_get_error_message(context, ret);
2139 	    kdc_log(context, config, 0,
2140 		    "KRB5SignedPath check from service %s failed "
2141 		    "for delegation to %s for client %s (%s)"
2142 		    "from %s failed with %s",
2143 		    spn, tpn, dpn, cpn, from, msg);
2144 	    krb5_free_error_message(context, msg);
2145 	    goto out;
2146 	}
2147 
2148 	if (!ad_signedpath) {
2149 	    ret = KRB5KDC_ERR_BADOPTION;
2150 	    kdc_log(context, config, 0,
2151 		    "Ticket not signed with PAC nor SignedPath service %s failed "
2152 		    "for delegation to %s for client %s (%s)"
2153 		    "from %s",
2154 		    spn, tpn, dpn, cpn, from);
2155 	    goto out;
2156 	}
2157 
2158 	kdc_log(context, config, 0, "constrained delegation for %s "
2159 		"from %s (%s) to %s", tpn, cpn, dpn, spn);
2160     }
2161 
2162     /*
2163      * Check flags
2164      */
2165 
2166     ret = kdc_check_flags(context, config,
2167 			  client, cpn,
2168 			  server, spn,
2169 			  FALSE);
2170     if(ret)
2171 	goto out;
2172 
2173     if((b->kdc_options.validate || b->kdc_options.renew) &&
2174        !krb5_principal_compare(context,
2175 			       krbtgt->entry.principal,
2176 			       server->entry.principal)){
2177 	kdc_log(context, config, 0, "Inconsistent request.");
2178 	ret = KRB5KDC_ERR_SERVER_NOMATCH;
2179 	goto out;
2180     }
2181 
2182     /* check for valid set of addresses */
2183     if(!_kdc_check_addresses(context, config, tgt->caddr, from_addr)) {
2184 	ret = KRB5KRB_AP_ERR_BADADDR;
2185 	kdc_log(context, config, 0, "Request from wrong address");
2186 	goto out;
2187     }
2188 
2189     /*
2190      * If this is an referral, add server referral data to the
2191      * auth_data reply .
2192      */
2193     if (ref_realm) {
2194 	PA_DATA pa;
2195 	krb5_crypto crypto;
2196 
2197 	kdc_log(context, config, 0,
2198 		"Adding server referral to %s", ref_realm);
2199 
2200 	ret = krb5_crypto_init(context, &sessionkey, 0, &crypto);
2201 	if (ret)
2202 	    goto out;
2203 
2204 	ret = build_server_referral(context, config, crypto, ref_realm,
2205 				    NULL, s, &pa.padata_value);
2206 	krb5_crypto_destroy(context, crypto);
2207 	if (ret) {
2208 	    kdc_log(context, config, 0,
2209 		    "Failed building server referral");
2210 	    goto out;
2211 	}
2212 	pa.padata_type = KRB5_PADATA_SERVER_REFERRAL;
2213 
2214 	ret = add_METHOD_DATA(&enc_pa_data, &pa);
2215 	krb5_data_free(&pa.padata_value);
2216 	if (ret) {
2217 	    kdc_log(context, config, 0,
2218 		    "Add server referral METHOD-DATA failed");
2219 	    goto out;
2220 	}
2221     }
2222 
2223     /*
2224      *
2225      */
2226 
2227     ret = tgs_make_reply(context,
2228 			 config,
2229 			 b,
2230 			 tp,
2231 			 tgt,
2232 			 replykey,
2233 			 rk_is_subkey,
2234 			 ekey,
2235 			 &sessionkey,
2236 			 kvno,
2237 			 *auth_data,
2238 			 server,
2239 			 rsp,
2240 			 spn,
2241 			 client,
2242 			 cp,
2243 			 krbtgt_out,
2244 			 krbtgt_etype,
2245 			 spp,
2246 			 &rspac,
2247 			 &enc_pa_data,
2248 			 e_text,
2249 			 reply);
2250 
2251 out:
2252     if (tpn != cpn)
2253 	    free(tpn);
2254     free(spn);
2255     free(cpn);
2256     if (dpn)
2257 	free(dpn);
2258 
2259     krb5_data_free(&rspac);
2260     krb5_free_keyblock_contents(context, &sessionkey);
2261     if(krbtgt_out)
2262 	_kdc_free_ent(context, krbtgt_out);
2263     if(server)
2264 	_kdc_free_ent(context, server);
2265     if(client)
2266 	_kdc_free_ent(context, client);
2267     if(s4u2self_impersonated_client)
2268 	_kdc_free_ent(context, s4u2self_impersonated_client);
2269 
2270     if (tp && tp != cp)
2271 	krb5_free_principal(context, tp);
2272     if (cp)
2273 	krb5_free_principal(context, cp);
2274     if (dp)
2275 	krb5_free_principal(context, dp);
2276     if (sp)
2277 	krb5_free_principal(context, sp);
2278     if (ref_realm)
2279 	free(ref_realm);
2280     free_METHOD_DATA(&enc_pa_data);
2281 
2282     free_EncTicketPart(&adtkt);
2283 
2284     return ret;
2285 }
2286 
2287 /*
2288  *
2289  */
2290 
2291 krb5_error_code
2292 _kdc_tgs_rep(krb5_context context,
2293 	     krb5_kdc_configuration *config,
2294 	     KDC_REQ *req,
2295 	     krb5_data *data,
2296 	     const char *from,
2297 	     struct sockaddr *from_addr,
2298 	     int datagram_reply)
2299 {
2300     AuthorizationData *auth_data = NULL;
2301     krb5_error_code ret;
2302     int i = 0;
2303     const PA_DATA *tgs_req;
2304 
2305     hdb_entry_ex *krbtgt = NULL;
2306     krb5_ticket *ticket = NULL;
2307     const char *e_text = NULL;
2308     krb5_enctype krbtgt_etype = ETYPE_NULL;
2309 
2310     krb5_keyblock *replykey = NULL;
2311     int rk_is_subkey = 0;
2312     time_t *csec = NULL;
2313     int *cusec = NULL;
2314 
2315     if(req->padata == NULL){
2316 	ret = KRB5KDC_ERR_PREAUTH_REQUIRED; /* XXX ??? */
2317 	kdc_log(context, config, 0,
2318 		"TGS-REQ from %s without PA-DATA", from);
2319 	goto out;
2320     }
2321 
2322     tgs_req = _kdc_find_padata(req, &i, KRB5_PADATA_TGS_REQ);
2323 
2324     if(tgs_req == NULL){
2325 	ret = KRB5KDC_ERR_PADATA_TYPE_NOSUPP;
2326 
2327 	kdc_log(context, config, 0,
2328 		"TGS-REQ from %s without PA-TGS-REQ", from);
2329 	goto out;
2330     }
2331     ret = tgs_parse_request(context, config,
2332 			    &req->req_body, tgs_req,
2333 			    &krbtgt,
2334 			    &krbtgt_etype,
2335 			    &ticket,
2336 			    &e_text,
2337 			    from, from_addr,
2338 			    &csec, &cusec,
2339 			    &auth_data,
2340 			    &replykey,
2341 			    &rk_is_subkey);
2342     if (ret == HDB_ERR_NOT_FOUND_HERE) {
2343 	/* kdc_log() is called in tgs_parse_request() */
2344 	goto out;
2345     }
2346     if (ret) {
2347 	kdc_log(context, config, 0,
2348 		"Failed parsing TGS-REQ from %s", from);
2349 	goto out;
2350     }
2351 
2352     ret = tgs_build_reply(context,
2353 			  config,
2354 			  req,
2355 			  &req->req_body,
2356 			  krbtgt,
2357 			  krbtgt_etype,
2358 			  replykey,
2359 			  rk_is_subkey,
2360 			  ticket,
2361 			  data,
2362 			  from,
2363 			  &e_text,
2364 			  &auth_data,
2365 			  from_addr);
2366     if (ret) {
2367 	kdc_log(context, config, 0,
2368 		"Failed building TGS-REP to %s", from);
2369 	goto out;
2370     }
2371 
2372     /* */
2373     if (datagram_reply && data->length > config->max_datagram_reply_length) {
2374 	krb5_data_free(data);
2375 	ret = KRB5KRB_ERR_RESPONSE_TOO_BIG;
2376 	e_text = "Reply packet too large";
2377     }
2378 
2379 out:
2380     if (replykey)
2381 	krb5_free_keyblock(context, replykey);
2382     if(ret && ret != HDB_ERR_NOT_FOUND_HERE && data->data == NULL){
2383 	krb5_mk_error(context,
2384 		      ret,
2385 		      NULL,
2386 		      NULL,
2387 		      NULL,
2388 		      NULL,
2389 		      csec,
2390 		      cusec,
2391 		      data);
2392 	ret = 0;
2393     }
2394     free(csec);
2395     free(cusec);
2396     if (ticket)
2397 	krb5_free_ticket(context, ticket);
2398     if(krbtgt)
2399 	_kdc_free_ent(context, krbtgt);
2400 
2401     if (auth_data) {
2402 	free_AuthorizationData(auth_data);
2403 	free(auth_data);
2404     }
2405 
2406     return ret;
2407 }
2408