Provide server side kadm5_chpass_principal_3() with ks_tuple implementation.
We enable kadm5_chpass_principal_3() in the server side of the library. The client kadm5 library calls will still return the error KAMD5_KS_TUPLE_NO_SUPP. Signed-off-by: Nicolas Williams <nico@cryptonector.com>
This commit is contained in:

committed by
Nicolas Williams

parent
00bea41dcb
commit
af011f57fc
@@ -39,6 +39,8 @@ kadm5_ret_t
|
||||
kadm5_c_chpass_principal(void *server_handle,
|
||||
krb5_principal princ,
|
||||
int keepold,
|
||||
int n_ks_tuple,
|
||||
krb5_key_salt_tuple *ks_tuple,
|
||||
const char *password)
|
||||
{
|
||||
kadm5_client_context *context = server_handle;
|
||||
@@ -48,6 +50,14 @@ kadm5_c_chpass_principal(void *server_handle,
|
||||
int32_t tmp;
|
||||
krb5_data reply;
|
||||
|
||||
/*
|
||||
* We should get around to implementing this... At the moment, the
|
||||
* the server side API is implemented but the wire protocol has not
|
||||
* been updated.
|
||||
*/
|
||||
if (n_ks_tuple > 0)
|
||||
return KADM5_KS_TUPLE_NOSUPP;
|
||||
|
||||
ret = _kadm5_connect(server_handle);
|
||||
if(ret)
|
||||
return ret;
|
||||
|
Reference in New Issue
Block a user