diff --git a/kdc/krb5tgs.c b/kdc/krb5tgs.c index baa03309f..a158502f6 100644 --- a/kdc/krb5tgs.c +++ b/kdc/krb5tgs.c @@ -285,7 +285,6 @@ check_PAC(krb5_context context, hdb_entry_ex *server, hdb_entry_ex *krbtgt, const EncryptionKey *server_check_key, - const EncryptionKey *krbtgt_check_key, const EncryptionKey *server_sign_key, const EncryptionKey *krbtgt_sign_key, EncTicketPart *tkt, @@ -331,7 +330,7 @@ check_PAC(krb5_context context, ret = krb5_pac_verify(context, pac, tkt->authtime, client_principal, - server_check_key, krbtgt_check_key); + server_check_key, NULL); if (ret) { krb5_pac_free(context, pac); return ret; @@ -1554,7 +1553,6 @@ tgs_build_reply(krb5_context context, Key *tkey_check; Key *tkey_sign; - Key *tkey_krbtgt_check = NULL; int flags = HDB_F_FOR_TGS_REQ; memset(&sessionkey, 0, sizeof(sessionkey)); @@ -1870,16 +1868,6 @@ server_lookup: goto out; } - /* - * Check if we would know the krbtgt key for the PAC. We would - * only know this if the krbtgt principal was the same (ie, in our - * realm, regardless of KVNO) - */ - - if (krb5_principal_compare(context, krbtgt_out->entry.principal, krbtgt->entry.principal)) - tkey_krbtgt_check = tkey_check; - - ret = _kdc_db_fetch(context, config, cp, HDB_F_GET_CLIENT | flags, NULL, &clientdb, &client); if(ret == HDB_ERR_NOT_FOUND_HERE) { @@ -1913,7 +1901,6 @@ server_lookup: ret = check_PAC(context, config, cp, NULL, client, server, krbtgt, &tkey_check->key, - tkey_krbtgt_check ? &tkey_krbtgt_check->key : NULL, ekey, &tkey_sign->key, tgt, &rspac, &signedpath); if (ret) { @@ -2185,7 +2172,7 @@ server_lookup: */ ret = check_PAC(context, config, tp, dp, client, server, krbtgt, - &clientkey->key, &tkey_check->key, + &clientkey->key, ekey, &tkey_sign->key, &adtkt, &rspac, &ad_signedpath); if (ret) {