hdb: add no-auth-data-reqd flag to HDB entry
Add a new flag, no-auth-data-reqd, to the HDB entry which indicates that a PAC should not be included on issued service tickets.
This commit is contained in:
@@ -77,6 +77,7 @@
|
||||
#define KRB5_KDB_VIRTUAL_KEYS 0x00200000 /* MIT doesn't have this */
|
||||
#define KRB5_KDB_VIRTUAL 0x00400000 /* MIT doesn't have this */
|
||||
#define KRB5_KDB_DISALLOW_CLIENT 0x00800000 /* MIT doesn't have this */
|
||||
#define KRB5_KDB_NO_AUTH_DATA_REQUIRED 0x01000000 /* 0x00400000 in MIT */
|
||||
|
||||
/*
|
||||
* MIT has:
|
||||
|
@@ -63,6 +63,7 @@ attr_to_flags(unsigned attr, HDBFlags *flags)
|
||||
flags->materialize = !!(attr & KRB5_KDB_MATERIALIZE);
|
||||
flags->virtual_keys = !!(attr & KRB5_KDB_VIRTUAL_KEYS);
|
||||
flags->virtual = !!(attr & KRB5_KDB_VIRTUAL);
|
||||
flags->no_auth_data_reqd = !!(attr & KRB5_KDB_NO_AUTH_DATA_REQUIRED);
|
||||
}
|
||||
|
||||
/*
|
||||
|
@@ -185,6 +185,7 @@ kadm5_s_get_principal(void *server_handle,
|
||||
out->attributes |= ent.entry.flags.allow_digest ? KRB5_KDB_ALLOW_DIGEST : 0;
|
||||
out->attributes |= ent.entry.flags.virtual_keys ? KRB5_KDB_VIRTUAL_KEYS : 0;
|
||||
out->attributes |= ent.entry.flags.virtual ? KRB5_KDB_VIRTUAL : 0;
|
||||
out->attributes |= ent.entry.flags.no_auth_data_reqd ? KRB5_KDB_NO_AUTH_DATA_REQUIRED : 0;
|
||||
}
|
||||
if(mask & KADM5_MAX_LIFE) {
|
||||
if(ent.entry.max_life)
|
||||
|
Reference in New Issue
Block a user