]> asedeno.scripts.mit.edu Git - 1ts-debian.git/commitdiff
#ifdef KRB4 the des_quad_cksum for DES keys hack. Needs reexamination.
authorkcr <kcr@cbed1d16-5ef5-0310-b6a1-d4a37b08ba1f>
Sun, 21 Dec 2008 08:45:17 +0000 (08:45 +0000)
committerkcr <kcr@cbed1d16-5ef5-0310-b6a1-d4a37b08ba1f>
Sun, 21 Dec 2008 08:45:17 +0000 (08:45 +0000)
git-svn-id: svn://svn.1ts.org/debian/branches/zephyr-reloaded@366 cbed1d16-5ef5-0310-b6a1-d4a37b08ba1f

zephyr/lib/ZCkZAut.c

index 7411bd63413f9d227f2cfaf858ba7f68a4eb8b11..b957474fe5bfc060bc5cd5552eb6af6473bc498b 100644 (file)
@@ -111,6 +111,8 @@ Code_t ZCheckZcodeAuthentication(ZNotice_t *notice,
         cksum2_base = notice->z_message;
         cksum2_len  = notice->z_message_len;
 
+#ifdef HAVE_KRB4 /* XXX this is probably a mistake for krb5 clients in mixed
+                   realms? */
         if ((!notice->z_ascii_checksum || *notice->z_ascii_checksum != 'Z') &&
             key_len == 8 &&
             (enctype == ENCTYPE_DES_CBC_CRC ||
@@ -128,6 +130,7 @@ Code_t ZCheckZcodeAuthentication(ZNotice_t *notice,
             }
         }
         /* HOLDING: creds */
+#endif
 
         cksumbuf.length = cksum0_len + cksum1_len + cksum2_len;
         cksumbuf.data = malloc(cksumbuf.length);