]> git.pld-linux.org Git - packages/sssd.git/blame - sssd-heimdal.patch
Add patch
[packages/sssd.git] / sssd-heimdal.patch
CommitLineData
f74665dc 1diff -ur sssd-1.6.1-o/src/providers/krb5/krb5_child.c sssd-1.6.1/src/providers/krb5/krb5_child.c
2--- sssd-1.6.1-o/src/providers/krb5/krb5_child.c 2011-08-29 09:39:05.000000000 -0600
3+++ sssd-1.6.1/src/providers/krb5/krb5_child.c 2011-10-16 00:46:34.000000000 -0600
4@@ -527,7 +527,7 @@
5 break;
6 }
7
8- kerr = krb5_free_keytab_entry_contents(kr->ctx, &entry);
9+ kerr = krb5_kt_free_entry(kr->ctx, &entry);
10 if (kerr != 0) {
11 DEBUG(1, ("Failed to free keytab entry.\n"));
12 }
13@@ -575,7 +575,7 @@
14 if (krb5_kt_close(kr->ctx, keytab) != 0) {
15 DEBUG(1, ("krb5_kt_close failed"));
16 }
17- if (krb5_free_keytab_entry_contents(kr->ctx, &entry) != 0) {
18+ if (krb5_kt_free_entry(kr->ctx, &entry) != 0) {
19 DEBUG(1, ("Failed to free keytab entry.\n"));
20 }
21 if (principal != NULL) {
22@@ -1178,7 +1178,7 @@
23 static krb5_error_code get_tgt_times(krb5_context ctx, const char *ccname,
24 krb5_principal server_principal,
25 krb5_principal client_principal,
26- krb5_ticket_times *tgtt)
27+ krb5_times *tgtt)
28 {
29 krb5_error_code krberr;
30 krb5_ccache ccache = NULL;
31@@ -1231,7 +1231,7 @@
32 krb5_error_code kerr;
33 char *ccname;
34 char *server_name;
35- krb5_ticket_times tgtt;
36+ krb5_times tgtt;
37 krb5_keytab keytab = NULL;
38 krb5_principal client_princ = NULL;
39 krb5_principal server_princ = NULL;
40@@ -1407,11 +1407,11 @@
41 /* A prompter is used to catch messages about when a password will
42 * expired. The library shall not use the prompter to ask for a new password
43 * but shall return KRB5KDC_ERR_KEY_EXP. */
44- krb5_get_init_creds_opt_set_change_password_prompt(kr->options, 0);
45+ /*krb5_get_init_creds_opt_set_change_password_prompt(kr->options, 0);
46 if (kerr != 0) {
47 KRB5_DEBUG(1, kerr);
48 goto failed;
49- }
50+ }*/
51
52 lifetime_str = getenv(SSSD_KRB5_RENEWABLE_LIFETIME);
53 if (lifetime_str == NULL) {
54diff -ur sssd-1.6.1-o/src/providers/krb5/krb5_utils.c sssd-1.6.1/src/providers/krb5/krb5_utils.c
55--- sssd-1.6.1-o/src/providers/krb5/krb5_utils.c 2011-08-29 09:39:05.000000000 -0600
56+++ sssd-1.6.1/src/providers/krb5/krb5_utils.c 2011-10-16 00:47:16.000000000 -0600
57@@ -435,10 +435,10 @@
58 }
59
60 server_name = talloc_asprintf(NULL, "krbtgt/%.*s@%.*s",
61- krb5_princ_realm(ctx, client_princ)->length,
62- krb5_princ_realm(ctx, client_princ)->data,
63- krb5_princ_realm(ctx, client_princ)->length,
64- krb5_princ_realm(ctx, client_princ)->data);
65+ strlen(krb5_princ_realm(ctx, client_princ)),
66+ krb5_princ_realm(ctx, client_princ),
67+ strlen(krb5_princ_realm(ctx, client_princ)),
68+ krb5_princ_realm(ctx, client_princ));
69 if (server_name == NULL) {
70 kerr = KRB5_CC_NOMEM;
71 DEBUG(1, ("talloc_asprintf failed.\n"));
72diff -ur sssd-1.6.1-o/src/providers/ldap/ldap_child.c sssd-1.6.1/src/providers/ldap/ldap_child.c
73--- sssd-1.6.1-o/src/providers/ldap/ldap_child.c 2011-08-29 09:39:05.000000000 -0600
74+++ sssd-1.6.1/src/providers/ldap/ldap_child.c 2011-10-16 00:46:34.000000000 -0600
75@@ -279,16 +279,7 @@
76 goto done;
77 }
78
79- krberr = krb5_get_time_offsets(context, &kdc_time_offset, &kdc_time_offset_usec);
80- if (krberr) {
81- DEBUG(2, ("Failed to get KDC time offset: %s\n",
82- sss_krb5_get_error_message(context, krberr)));
83- kdc_time_offset = 0;
84- } else {
85- if (kdc_time_offset_usec > 0) {
86- kdc_time_offset++;
87- }
88- }
89+ kdc_time_offset = 0;
90
91 krberr = 0;
92 *ccname_out = ccname;
93diff -ur sssd-1.6.1-o/src/util/sss_krb5.c sssd-1.6.1/src/util/sss_krb5.c
94--- sssd-1.6.1-o/src/util/sss_krb5.c 2011-08-29 09:39:05.000000000 -0600
95+++ sssd-1.6.1/src/util/sss_krb5.c 2011-10-16 00:46:34.000000000 -0600
96@@ -164,9 +164,8 @@
97 }
98
99 if (_realm) {
100- *_realm = talloc_asprintf(mem_ctx, "%.*s",
101- krb5_princ_realm(ctx, client_princ)->length,
102- krb5_princ_realm(ctx, client_princ)->data);
103+ char * princ = krb5_principal_get_realm(krb_ctx, client_princ);
104+ *_realm = talloc_asprintf(mem_ctx, "%.*s", strlen(princ), princ);
105 if (!*_realm) {
106 DEBUG(1, ("talloc_asprintf failed"));
107 if (_principal) talloc_zfree(*_principal);
108@@ -322,7 +321,7 @@
109 found = true;
110 }
111 free(kt_principal);
112- krberr = krb5_free_keytab_entry_contents(context, &entry);
113+ krberr = krb5_kt_free_entry(context, &entry);
114 if (krberr) {
115 /* This should never happen. The API docs for this function
116 * specify only success for this function
117@@ -466,7 +465,7 @@
118 break;
119 }
120
121- kerr = krb5_free_keytab_entry_contents(ctx, &entry);
122+ kerr = krb5_kt_free_entry(ctx, &entry);
123 if (kerr != 0) {
124 DEBUG(1, ("Failed to free keytab entry.\n"));
125 }
126@@ -504,7 +503,7 @@
127 kerr = 0;
128
129 done:
130- kerr_d = krb5_free_keytab_entry_contents(ctx, &entry);
131+ kerr_d = krb5_kt_free_entry(ctx, &entry);
132 if (kerr_d != 0) {
133 DEBUG(1, ("Failed to free keytab entry.\n"));
134 }
This page took 0.0514559999999999 seconds and 4 git commands to generate.