]>
Commit | Line | Data |
---|---|---|
f74665dc | 1 | diff -ur sssd-1.6.1-o/src/providers/krb5/krb5_child.c sssd-1.6.1/src/providers/krb5/krb5_child.c |
2 | --- sssd-1.6.1-o/src/providers/krb5/krb5_child.c 2011-08-29 09:39:05.000000000 -0600 | |
3 | +++ sssd-1.6.1/src/providers/krb5/krb5_child.c 2011-10-16 00:46:34.000000000 -0600 | |
4 | @@ -527,7 +527,7 @@ | |
5 | break; | |
6 | } | |
7 | ||
8 | - kerr = krb5_free_keytab_entry_contents(kr->ctx, &entry); | |
9 | + kerr = krb5_kt_free_entry(kr->ctx, &entry); | |
10 | if (kerr != 0) { | |
11 | DEBUG(1, ("Failed to free keytab entry.\n")); | |
12 | } | |
13 | @@ -575,7 +575,7 @@ | |
14 | if (krb5_kt_close(kr->ctx, keytab) != 0) { | |
15 | DEBUG(1, ("krb5_kt_close failed")); | |
16 | } | |
17 | - if (krb5_free_keytab_entry_contents(kr->ctx, &entry) != 0) { | |
18 | + if (krb5_kt_free_entry(kr->ctx, &entry) != 0) { | |
19 | DEBUG(1, ("Failed to free keytab entry.\n")); | |
20 | } | |
21 | if (principal != NULL) { | |
22 | @@ -1178,7 +1178,7 @@ | |
23 | static krb5_error_code get_tgt_times(krb5_context ctx, const char *ccname, | |
24 | krb5_principal server_principal, | |
25 | krb5_principal client_principal, | |
26 | - krb5_ticket_times *tgtt) | |
27 | + krb5_times *tgtt) | |
28 | { | |
29 | krb5_error_code krberr; | |
30 | krb5_ccache ccache = NULL; | |
31 | @@ -1231,7 +1231,7 @@ | |
32 | krb5_error_code kerr; | |
33 | char *ccname; | |
34 | char *server_name; | |
35 | - krb5_ticket_times tgtt; | |
36 | + krb5_times tgtt; | |
37 | krb5_keytab keytab = NULL; | |
38 | krb5_principal client_princ = NULL; | |
39 | krb5_principal server_princ = NULL; | |
40 | @@ -1407,11 +1407,11 @@ | |
41 | /* A prompter is used to catch messages about when a password will | |
42 | * expired. The library shall not use the prompter to ask for a new password | |
43 | * but shall return KRB5KDC_ERR_KEY_EXP. */ | |
44 | - krb5_get_init_creds_opt_set_change_password_prompt(kr->options, 0); | |
45 | + /*krb5_get_init_creds_opt_set_change_password_prompt(kr->options, 0); | |
46 | if (kerr != 0) { | |
47 | KRB5_DEBUG(1, kerr); | |
48 | goto failed; | |
49 | - } | |
50 | + }*/ | |
51 | ||
52 | lifetime_str = getenv(SSSD_KRB5_RENEWABLE_LIFETIME); | |
53 | if (lifetime_str == NULL) { | |
54 | diff -ur sssd-1.6.1-o/src/providers/krb5/krb5_utils.c sssd-1.6.1/src/providers/krb5/krb5_utils.c | |
55 | --- sssd-1.6.1-o/src/providers/krb5/krb5_utils.c 2011-08-29 09:39:05.000000000 -0600 | |
56 | +++ sssd-1.6.1/src/providers/krb5/krb5_utils.c 2011-10-16 00:47:16.000000000 -0600 | |
57 | @@ -435,10 +435,10 @@ | |
58 | } | |
59 | ||
60 | server_name = talloc_asprintf(NULL, "krbtgt/%.*s@%.*s", | |
61 | - krb5_princ_realm(ctx, client_princ)->length, | |
62 | - krb5_princ_realm(ctx, client_princ)->data, | |
63 | - krb5_princ_realm(ctx, client_princ)->length, | |
64 | - krb5_princ_realm(ctx, client_princ)->data); | |
65 | + strlen(krb5_princ_realm(ctx, client_princ)), | |
66 | + krb5_princ_realm(ctx, client_princ), | |
67 | + strlen(krb5_princ_realm(ctx, client_princ)), | |
68 | + krb5_princ_realm(ctx, client_princ)); | |
69 | if (server_name == NULL) { | |
70 | kerr = KRB5_CC_NOMEM; | |
71 | DEBUG(1, ("talloc_asprintf failed.\n")); | |
72 | diff -ur sssd-1.6.1-o/src/providers/ldap/ldap_child.c sssd-1.6.1/src/providers/ldap/ldap_child.c | |
73 | --- sssd-1.6.1-o/src/providers/ldap/ldap_child.c 2011-08-29 09:39:05.000000000 -0600 | |
74 | +++ sssd-1.6.1/src/providers/ldap/ldap_child.c 2011-10-16 00:46:34.000000000 -0600 | |
75 | @@ -279,16 +279,7 @@ | |
76 | goto done; | |
77 | } | |
78 | ||
79 | - krberr = krb5_get_time_offsets(context, &kdc_time_offset, &kdc_time_offset_usec); | |
80 | - if (krberr) { | |
81 | - DEBUG(2, ("Failed to get KDC time offset: %s\n", | |
82 | - sss_krb5_get_error_message(context, krberr))); | |
83 | - kdc_time_offset = 0; | |
84 | - } else { | |
85 | - if (kdc_time_offset_usec > 0) { | |
86 | - kdc_time_offset++; | |
87 | - } | |
88 | - } | |
89 | + kdc_time_offset = 0; | |
90 | ||
91 | krberr = 0; | |
92 | *ccname_out = ccname; | |
93 | diff -ur sssd-1.6.1-o/src/util/sss_krb5.c sssd-1.6.1/src/util/sss_krb5.c | |
94 | --- sssd-1.6.1-o/src/util/sss_krb5.c 2011-08-29 09:39:05.000000000 -0600 | |
95 | +++ sssd-1.6.1/src/util/sss_krb5.c 2011-10-16 00:46:34.000000000 -0600 | |
96 | @@ -164,9 +164,8 @@ | |
97 | } | |
98 | ||
99 | if (_realm) { | |
100 | - *_realm = talloc_asprintf(mem_ctx, "%.*s", | |
101 | - krb5_princ_realm(ctx, client_princ)->length, | |
102 | - krb5_princ_realm(ctx, client_princ)->data); | |
103 | + char * princ = krb5_principal_get_realm(krb_ctx, client_princ); | |
104 | + *_realm = talloc_asprintf(mem_ctx, "%.*s", strlen(princ), princ); | |
105 | if (!*_realm) { | |
106 | DEBUG(1, ("talloc_asprintf failed")); | |
107 | if (_principal) talloc_zfree(*_principal); | |
108 | @@ -322,7 +321,7 @@ | |
109 | found = true; | |
110 | } | |
111 | free(kt_principal); | |
112 | - krberr = krb5_free_keytab_entry_contents(context, &entry); | |
113 | + krberr = krb5_kt_free_entry(context, &entry); | |
114 | if (krberr) { | |
115 | /* This should never happen. The API docs for this function | |
116 | * specify only success for this function | |
117 | @@ -466,7 +465,7 @@ | |
118 | break; | |
119 | } | |
120 | ||
121 | - kerr = krb5_free_keytab_entry_contents(ctx, &entry); | |
122 | + kerr = krb5_kt_free_entry(ctx, &entry); | |
123 | if (kerr != 0) { | |
124 | DEBUG(1, ("Failed to free keytab entry.\n")); | |
125 | } | |
126 | @@ -504,7 +503,7 @@ | |
127 | kerr = 0; | |
128 | ||
129 | done: | |
130 | - kerr_d = krb5_free_keytab_entry_contents(ctx, &entry); | |
131 | + kerr_d = krb5_kt_free_entry(ctx, &entry); | |
132 | if (kerr_d != 0) { | |
133 | DEBUG(1, ("Failed to free keytab entry.\n")); | |
134 | } |