xref: /freebsd/crypto/heimdal/lib/krb5/ticket.c (revision 884a2a699669ec61e2366e3e358342dbc94be24a)
1 /*
2  * Copyright (c) 1997 - 2001 Kungliga Tekniska H�gskolan
3  * (Royal Institute of Technology, Stockholm, Sweden).
4  * All rights reserved.
5  *
6  * Redistribution and use in source and binary forms, with or without
7  * modification, are permitted provided that the following conditions
8  * are met:
9  *
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  *
13  * 2. Redistributions in binary form must reproduce the above copyright
14  *    notice, this list of conditions and the following disclaimer in the
15  *    documentation and/or other materials provided with the distribution.
16  *
17  * 3. Neither the name of the Institute nor the names of its contributors
18  *    may be used to endorse or promote products derived from this software
19  *    without specific prior written permission.
20  *
21  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31  * SUCH DAMAGE.
32  */
33 
34 #include "krb5_locl.h"
35 
36 RCSID("$Id: ticket.c 19544 2006-12-28 20:49:18Z lha $");
37 
38 krb5_error_code KRB5_LIB_FUNCTION
39 krb5_free_ticket(krb5_context context,
40 		 krb5_ticket *ticket)
41 {
42     free_EncTicketPart(&ticket->ticket);
43     krb5_free_principal(context, ticket->client);
44     krb5_free_principal(context, ticket->server);
45     free(ticket);
46     return 0;
47 }
48 
49 krb5_error_code KRB5_LIB_FUNCTION
50 krb5_copy_ticket(krb5_context context,
51 		 const krb5_ticket *from,
52 		 krb5_ticket **to)
53 {
54     krb5_error_code ret;
55     krb5_ticket *tmp;
56 
57     *to = NULL;
58     tmp = malloc(sizeof(*tmp));
59     if(tmp == NULL) {
60 	krb5_set_error_string (context, "malloc: out of memory");
61 	return ENOMEM;
62     }
63     if((ret = copy_EncTicketPart(&from->ticket, &tmp->ticket))){
64 	free(tmp);
65 	return ret;
66     }
67     ret = krb5_copy_principal(context, from->client, &tmp->client);
68     if(ret){
69 	free_EncTicketPart(&tmp->ticket);
70 	free(tmp);
71 	return ret;
72     }
73     ret = krb5_copy_principal(context, from->server, &tmp->server);
74     if(ret){
75 	krb5_free_principal(context, tmp->client);
76 	free_EncTicketPart(&tmp->ticket);
77 	free(tmp);
78 	return ret;
79     }
80     *to = tmp;
81     return 0;
82 }
83 
84 krb5_error_code KRB5_LIB_FUNCTION
85 krb5_ticket_get_client(krb5_context context,
86 		       const krb5_ticket *ticket,
87 		       krb5_principal *client)
88 {
89     return krb5_copy_principal(context, ticket->client, client);
90 }
91 
92 krb5_error_code KRB5_LIB_FUNCTION
93 krb5_ticket_get_server(krb5_context context,
94 		       const krb5_ticket *ticket,
95 		       krb5_principal *server)
96 {
97     return krb5_copy_principal(context, ticket->server, server);
98 }
99 
100 time_t KRB5_LIB_FUNCTION
101 krb5_ticket_get_endtime(krb5_context context,
102 			const krb5_ticket *ticket)
103 {
104     return ticket->ticket.endtime;
105 }
106 
107 static int
108 find_type_in_ad(krb5_context context,
109 		int type,
110 		krb5_data *data,
111 		krb5_boolean *found,
112 		krb5_boolean failp,
113 		krb5_keyblock *sessionkey,
114 		const AuthorizationData *ad,
115 		int level)
116 {
117     krb5_error_code ret = 0;
118     int i;
119 
120     if (level > 9) {
121 	krb5_set_error_string(context, "Authorization data nested deeper "
122 			      "then %d levels, stop searching", level);
123 	ret = ENOENT; /* XXX */
124 	goto out;
125     }
126 
127     /*
128      * Only copy out the element the first time we get to it, we need
129      * to run over the whole authorization data fields to check if
130      * there are any container clases we need to care about.
131      */
132     for (i = 0; i < ad->len; i++) {
133 	if (!*found && ad->val[i].ad_type == type) {
134 	    ret = der_copy_octet_string(&ad->val[i].ad_data, data);
135 	    if (ret) {
136 		krb5_set_error_string(context, "malloc - out of memory");
137 		goto out;
138 	    }
139 	    *found = TRUE;
140 	    continue;
141 	}
142 	switch (ad->val[i].ad_type) {
143 	case KRB5_AUTHDATA_IF_RELEVANT: {
144 	    AuthorizationData child;
145 	    ret = decode_AuthorizationData(ad->val[i].ad_data.data,
146 					   ad->val[i].ad_data.length,
147 					   &child,
148 					   NULL);
149 	    if (ret) {
150 		krb5_set_error_string(context, "Failed to decode "
151 				      "IF_RELEVANT with %d", ret);
152 		goto out;
153 	    }
154 	    ret = find_type_in_ad(context, type, data, found, FALSE,
155 				  sessionkey, &child, level + 1);
156 	    free_AuthorizationData(&child);
157 	    if (ret)
158 		goto out;
159 	    break;
160 	}
161 #if 0 /* XXX test */
162 	case KRB5_AUTHDATA_KDC_ISSUED: {
163 	    AD_KDCIssued child;
164 
165 	    ret = decode_AD_KDCIssued(ad->val[i].ad_data.data,
166 				      ad->val[i].ad_data.length,
167 				      &child,
168 				      NULL);
169 	    if (ret) {
170 		krb5_set_error_string(context, "Failed to decode "
171 				      "AD_KDCIssued with %d", ret);
172 		goto out;
173 	    }
174 	    if (failp) {
175 		krb5_boolean valid;
176 		krb5_data buf;
177 		size_t len;
178 
179 		ASN1_MALLOC_ENCODE(AuthorizationData, buf.data, buf.length,
180 				   &child.elements, &len, ret);
181 		if (ret) {
182 		    free_AD_KDCIssued(&child);
183 		    krb5_clear_error_string(context);
184 		    goto out;
185 		}
186 		if(buf.length != len)
187 		    krb5_abortx(context, "internal error in ASN.1 encoder");
188 
189 		ret = krb5_c_verify_checksum(context, sessionkey, 19, &buf,
190 					     &child.ad_checksum, &valid);
191 		krb5_data_free(&buf);
192 		if (ret) {
193 		    free_AD_KDCIssued(&child);
194 		    goto out;
195 		}
196 		if (!valid) {
197 		    krb5_clear_error_string(context);
198 		    ret = ENOENT;
199 		    free_AD_KDCIssued(&child);
200 		    goto out;
201 		}
202 	    }
203 	    ret = find_type_in_ad(context, type, data, found, failp, sessionkey,
204 				  &child.elements, level + 1);
205 	    free_AD_KDCIssued(&child);
206 	    if (ret)
207 		goto out;
208 	    break;
209 	}
210 #endif
211 	case KRB5_AUTHDATA_AND_OR:
212 	    if (!failp)
213 		break;
214 	    krb5_set_error_string(context, "Authorization data contains "
215 				  "AND-OR element that is unknown to the "
216 				  "application");
217 	    ret = ENOENT; /* XXX */
218 	    goto out;
219 	default:
220 	    if (!failp)
221 		break;
222 	    krb5_set_error_string(context, "Authorization data contains "
223 				  "unknown type (%d) ", ad->val[i].ad_type);
224 	    ret = ENOENT; /* XXX */
225 	    goto out;
226 	}
227     }
228 out:
229     if (ret) {
230 	if (*found) {
231 	    krb5_data_free(data);
232 	    *found = 0;
233 	}
234     }
235     return ret;
236 }
237 
238 /*
239  * Extract the authorization data type of `type' from the
240  * 'ticket'. Store the field in `data'. This function is to use for
241  * kerberos applications.
242  */
243 
244 krb5_error_code KRB5_LIB_FUNCTION
245 krb5_ticket_get_authorization_data_type(krb5_context context,
246 					krb5_ticket *ticket,
247 					int type,
248 					krb5_data *data)
249 {
250     AuthorizationData *ad;
251     krb5_error_code ret;
252     krb5_boolean found = FALSE;
253 
254     krb5_data_zero(data);
255 
256     ad = ticket->ticket.authorization_data;
257     if (ticket->ticket.authorization_data == NULL) {
258 	krb5_set_error_string(context, "Ticket have not authorization data");
259 	return ENOENT; /* XXX */
260     }
261 
262     ret = find_type_in_ad(context, type, data, &found, TRUE,
263 			  &ticket->ticket.key, ad, 0);
264     if (ret)
265 	return ret;
266     if (!found) {
267 	krb5_set_error_string(context, "Ticket have not authorization "
268 			  "data of type %d", type);
269 	return ENOENT; /* XXX */
270     }
271     return 0;
272 }
273