From 0e5d5e7f5e2626b476b0a2713a8abf9832c05aa9 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Love=20H=C3=B6rnquist=20=C3=85strand?= Date: Thu, 24 Aug 2006 10:49:46 +0000 Subject: [PATCH] Add KRB5_KDB_ALLOW_DIGEST git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@17926 ec53bebd-3082-4978-b11e-865c3cabbd6b --- kadmin/util.c | 1 + lib/kadm5/admin.h | 1 + lib/kadm5/ent_setup.c | 1 + lib/kadm5/get_s.c | 1 + 4 files changed, 4 insertions(+) diff --git a/kadmin/util.c b/kadmin/util.c index c798702a9..630ba6053 100644 --- a/kadmin/util.c +++ b/kadmin/util.c @@ -49,6 +49,7 @@ get_response(const char *prompt, const char *def, char *buf, size_t len); */ struct units kdb_attrs[] = { + { "allow-digest", KRB5_KDB_ALLOW_DIGEST }, { "allow-kerberos4", KRB5_KDB_ALLOW_KERBEROS4 }, { "trusted-for-delegation", KRB5_KDB_TRUSTED_FOR_DELEGATION }, { "ok-as-delegate", KRB5_KDB_OK_AS_DELEGATE }, diff --git a/lib/kadm5/admin.h b/lib/kadm5/admin.h index 1540f393c..c2c2cb54e 100644 --- a/lib/kadm5/admin.h +++ b/lib/kadm5/admin.h @@ -67,6 +67,7 @@ #define KRB5_KDB_OK_AS_DELEGATE 0x00010000 #define KRB5_KDB_TRUSTED_FOR_DELEGATION 0x00020000 #define KRB5_KDB_ALLOW_KERBEROS4 0x00040000 +#define KRB5_KDB_ALLOW_DIGEST 0x00080000 #define KADM5_PRINCIPAL 0x000001 #define KADM5_PRINC_EXPIRE_TIME 0x000002 diff --git a/lib/kadm5/ent_setup.c b/lib/kadm5/ent_setup.c index e36f9cb01..0a5c91f8d 100644 --- a/lib/kadm5/ent_setup.c +++ b/lib/kadm5/ent_setup.c @@ -56,6 +56,7 @@ attr_to_flags(unsigned attr, HDBFlags *flags) flags->ok_as_delegate = !!(attr & KRB5_KDB_OK_AS_DELEGATE); flags->trusted_for_delegation = !!(attr & KRB5_KDB_TRUSTED_FOR_DELEGATION); flags->allow_kerberos4 = !!(attr & KRB5_KDB_ALLOW_KERBEROS4); + flags->allow_digest = !!(attr & KRB5_KDB_ALLOW_DIGEST); } /* diff --git a/lib/kadm5/get_s.c b/lib/kadm5/get_s.c index b82ad1fa7..0e3773243 100644 --- a/lib/kadm5/get_s.c +++ b/lib/kadm5/get_s.c @@ -109,6 +109,7 @@ kadm5_s_get_principal(void *server_handle, out->attributes |= ent.entry.flags.ok_as_delegate ? KRB5_KDB_OK_AS_DELEGATE : 0; out->attributes |= ent.entry.flags.trusted_for_delegation ? KRB5_KDB_TRUSTED_FOR_DELEGATION : 0; out->attributes |= ent.entry.flags.allow_kerberos4 ? KRB5_KDB_ALLOW_KERBEROS4 : 0; + out->attributes |= ent.entry.flags.allow_digest ? KRB5_KDB_ALLOW_DIGEST : 0; } if(mask & KADM5_MAX_LIFE) { if(ent.entry.max_life)