[28527] in CVS-changelog-for-Kerberos-V5
krb5 commit: Copy config entries to the ksu target ccache
daemon@ATHENA.MIT.EDU (Greg Hudson)
Fri Aug  8 13:09:17 2014
Date: Fri, 8 Aug 2014 13:06:52 -0400
From: Greg Hudson <ghudson@mit.edu>
Message-Id: <201408081706.s78H6qQ3002551@drugstore.mit.edu>
To: cvs-krb5@mit.edu
Reply-To: krbdev@mit.edu
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: cvs-krb5-bounces@mit.edu
https://github.com/krb5/krb5/commit/297496f0938955ba4aaf0ebecf4e393e527b8cbf
commit 297496f0938955ba4aaf0ebecf4e393e527b8cbf
Author: Nalin Dahyabhai <nalin@dahyabhai.net>
Date:   Tue Oct 29 16:27:20 2013 -0400
    Copy config entries to the ksu target ccache
    
    When we try to screen out expired creds while reading them from one
    ccache to eventually store in another, also keep configuration entries.
    
    ticket: 7986 (new)
 src/clients/ksu/ccache.c |    3 ++-
 1 files changed, 2 insertions(+), 1 deletions(-)
diff --git a/src/clients/ksu/ccache.c b/src/clients/ksu/ccache.c
index 4693bd4..0f9e042 100644
--- a/src/clients/ksu/ccache.c
+++ b/src/clients/ksu/ccache.c
@@ -219,7 +219,8 @@ krb5_error_code krb5_get_nonexp_tkts(context, cc, creds_array)
 
     while (!(retval = krb5_cc_next_cred(context, cc, &cur, &creds))){
 
-        if ((retval = krb5_check_exp(context, creds.times))){
+        if (!krb5_is_config_principal(context, creds.server) &&
+            (retval = krb5_check_exp(context, creds.times))){
             if (retval != KRB5KRB_AP_ERR_TKT_EXPIRED){
                 return retval;
             }
_______________________________________________
cvs-krb5 mailing list
cvs-krb5@mit.edu
https://mailman.mit.edu/mailman/listinfo/cvs-krb5