[28527] in CVS-changelog-for-Kerberos-V5

home help back first fref pref prev next nref lref last post

krb5 commit: Copy config entries to the ksu target ccache

daemon@ATHENA.MIT.EDU (Greg Hudson)
Fri Aug 8 13:09:17 2014

Date: Fri, 8 Aug 2014 13:06:52 -0400
From: Greg Hudson <ghudson@mit.edu>
Message-Id: <201408081706.s78H6qQ3002551@drugstore.mit.edu>
To: cvs-krb5@mit.edu
Reply-To: krbdev@mit.edu
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: cvs-krb5-bounces@mit.edu

https://github.com/krb5/krb5/commit/297496f0938955ba4aaf0ebecf4e393e527b8cbf
commit 297496f0938955ba4aaf0ebecf4e393e527b8cbf
Author: Nalin Dahyabhai <nalin@dahyabhai.net>
Date:   Tue Oct 29 16:27:20 2013 -0400

    Copy config entries to the ksu target ccache
    
    When we try to screen out expired creds while reading them from one
    ccache to eventually store in another, also keep configuration entries.
    
    ticket: 7986 (new)

 src/clients/ksu/ccache.c |    3 ++-
 1 files changed, 2 insertions(+), 1 deletions(-)

diff --git a/src/clients/ksu/ccache.c b/src/clients/ksu/ccache.c
index 4693bd4..0f9e042 100644
--- a/src/clients/ksu/ccache.c
+++ b/src/clients/ksu/ccache.c
@@ -219,7 +219,8 @@ krb5_error_code krb5_get_nonexp_tkts(context, cc, creds_array)
 
     while (!(retval = krb5_cc_next_cred(context, cc, &cur, &creds))){
 
-        if ((retval = krb5_check_exp(context, creds.times))){
+        if (!krb5_is_config_principal(context, creds.server) &&
+            (retval = krb5_check_exp(context, creds.times))){
             if (retval != KRB5KRB_AP_ERR_TKT_EXPIRED){
                 return retval;
             }
_______________________________________________
cvs-krb5 mailing list
cvs-krb5@mit.edu
https://mailman.mit.edu/mailman/listinfo/cvs-krb5

home help back first fref pref prev next nref lref last post