void free_KrbCredInfo(KrbCredInfo *data) { free_EncryptionKey(&(data)->key); if((data)->prealm) { free_Realm((data)->prealm); free((data)->prealm); (data)->prealm = NULL; } if((data)->pname) { free_PrincipalName((data)->pname); free((data)->pname); (data)->pname = NULL; } if((data)->flags) { free_TicketFlags((data)->flags); free((data)->flags); (data)->flags = NULL; } if((data)->authtime) { free_KerberosTime((data)->authtime); free((data)->authtime); (data)->authtime = NULL; } if((data)->starttime) { free_KerberosTime((data)->starttime); free((data)->starttime); (data)->starttime = NULL; } if((data)->endtime) { free_KerberosTime((data)->endtime); free((data)->endtime); (data)->endtime = NULL; } if((data)->renew_till) { free_KerberosTime((data)->renew_till); free((data)->renew_till); (data)->renew_till = NULL; } if((data)->srealm) { free_Realm((data)->srealm); free((data)->srealm); (data)->srealm = NULL; } if((data)->sname) { free_PrincipalName((data)->sname); free((data)->sname); (data)->sname = NULL; } if((data)->caddr) { free_HostAddresses((data)->caddr); free((data)->caddr); (data)->caddr = NULL; } }
krb5_error_code KRB5_LIB_FUNCTION _krb5_principalname2krb5_principal (krb5_context context, krb5_principal *principal, const PrincipalName from, const Realm realm) { krb5_error_code ret; krb5_principal p; p = malloc(sizeof(*p)); if (p == NULL) return ENOMEM; ret = copy_PrincipalName(&from, &p->name); if (ret) { free(p); return ret; } p->realm = strdup(realm); if (p->realm == NULL) { free_PrincipalName(&p->name); free(p); return ENOMEM; } *principal = p; return 0; }
int decode_PrincipalName(const unsigned char *p, size_t len, PrincipalName *data, size_t *size) { size_t ret = 0, reallen; size_t l; int e; memset(data, 0, sizeof(*data)); reallen = 0; e = der_match_tag_and_length (p, len, ASN1_C_UNIV, CONS, UT_Sequence,&reallen, &l); FORW; { int dce_fix; if((dce_fix = fix_dce(reallen, &len)) < 0) return ASN1_BAD_FORMAT; { size_t newlen, oldlen; e = der_match_tag (p, len, ASN1_C_CONTEXT, CONS, 0, &l); if (e) return e; else { p += l; len -= l; ret += l; e = der_get_length (p, len, &newlen, &l); FORW; { int dce_fix; oldlen = len; if((dce_fix = fix_dce(newlen, &len)) < 0)return ASN1_BAD_FORMAT; e = decode_NAME_TYPE(p, len, &(data)->name_type, &l); FORW; if(dce_fix){ e = der_match_tag_and_length (p, len, (Der_class)0, (Der_type)0, 0, &reallen, &l); FORW; }else len = oldlen - newlen; } } } { size_t newlen, oldlen; e = der_match_tag (p, len, ASN1_C_CONTEXT, CONS, 1, &l); if (e) return e; else { p += l; len -= l; ret += l; e = der_get_length (p, len, &newlen, &l); FORW; { int dce_fix; oldlen = len; if((dce_fix = fix_dce(newlen, &len)) < 0)return ASN1_BAD_FORMAT; e = der_match_tag_and_length (p, len, ASN1_C_UNIV, CONS, UT_Sequence,&reallen, &l); FORW; if(len < reallen) return ASN1_OVERRUN; len = reallen; { size_t origlen = len; int oldret = ret; ret = 0; (&(data)->name_string)->len = 0; (&(data)->name_string)->val = NULL; while(ret < origlen) { (&(data)->name_string)->len++; (&(data)->name_string)->val = realloc((&(data)->name_string)->val, sizeof(*((&(data)->name_string)->val)) * (&(data)->name_string)->len); e = decode_general_string(p, len, &(&(data)->name_string)->val[(&(data)->name_string)->len-1], &l); FORW; len = origlen - ret; } ret += oldret; } if(dce_fix){ e = der_match_tag_and_length (p, len, (Der_class)0, (Der_type)0, 0, &reallen, &l); FORW; }else len = oldlen - newlen; } } } if(dce_fix){ e = der_match_tag_and_length (p, len, (Der_class)0, (Der_type)0, 0, &reallen, &l); FORW; } } if(size) *size = ret; return 0; fail: free_PrincipalName(data); return e; }