From 04c7a2f78d3fd5c4002b1498700e1f1166254dd0 Mon Sep 17 00:00:00 2001 From: Johan Danielsson Date: Fri, 17 Aug 2001 07:49:01 +0000 Subject: [PATCH] fix call to get_des_key git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@10498 ec53bebd-3082-4978-b11e-865c3cabbd6b --- kdc/524.c | 4 ++-- kdc/kaserver.c | 16 ++++++++-------- 2 files changed, 10 insertions(+), 10 deletions(-) diff --git a/kdc/524.c b/kdc/524.c index 2c3372c84..3ec33c989 100644 --- a/kdc/524.c +++ b/kdc/524.c @@ -258,9 +258,9 @@ do_524(const Ticket *t, krb5_data *reply, kdc_log(0, "Failed to encode v4 ticket (%s)", spn); goto out; } - ret = get_des_key(server, FALSE, &skey); + ret = get_des_key(server, TRUE, FALSE, &skey); if(ret){ - kdc_log(0, "No DES key for server (%s)", spn); + kdc_log(0, "no suitable DES key for server (%s)", spn); goto out; } ret = encrypt_v4_ticket(buf + sizeof(buf) - len, len, diff --git a/kdc/kaserver.c b/kdc/kaserver.c index bc26d0939..aaa1a159d 100644 --- a/kdc/kaserver.c +++ b/kdc/kaserver.c @@ -432,17 +432,17 @@ do_authenticate (struct rx_header *hdr, } /* find a DES key */ - ret = get_des_key(client_entry, TRUE, &ckey); + ret = get_des_key(client_entry, FALSE, TRUE, &ckey); if(ret){ - kdc_log(0, "%s", krb5_get_err_text(context, ret)); + kdc_log(0, "no suitable DES key for client"); make_error_reply (hdr, KANOKEYS, reply); goto out; } /* find a DES key */ - ret = get_des_key(server_entry, TRUE, &skey); + ret = get_des_key(server_entry, TRUE, TRUE, &skey); if(ret){ - kdc_log(0, "%s", krb5_get_err_text(context, ret)); + kdc_log(0, "no suitable DES key for server"); make_error_reply (hdr, KANOKEYS, reply); goto out; } @@ -623,17 +623,17 @@ do_getticket (struct rx_header *hdr, } /* find a DES key */ - ret = get_des_key(krbtgt_entry, TRUE, &kkey); + ret = get_des_key(krbtgt_entry, TRUE, TRUE, &kkey); if(ret){ - kdc_log(0, "%s", krb5_get_err_text(context, ret)); + kdc_log(0, "no suitable DES key for krbtgt"); make_error_reply (hdr, KANOKEYS, reply); goto out; } /* find a DES key */ - ret = get_des_key(server_entry, TRUE, &skey); + ret = get_des_key(server_entry, TRUE, TRUE, &skey); if(ret){ - kdc_log(0, "%s", krb5_get_err_text(context, ret)); + kdc_log(0, "no suitable DES key for server"); make_error_reply (hdr, KANOKEYS, reply); goto out; }