[31404] in CVS-changelog-for-Kerberos-V5

home help back first fref pref prev next nref lref last post

krb5 commit: Allow only one salt type per enctype in key data

daemon@ATHENA.MIT.EDU (ghudson@mit.edu)
Thu Feb 6 18:02:26 2025

From: ghudson@mit.edu
To: cvs-krb5@mit.edu
Message-Id: <20250206230218.D1684101CA3@krbdev.mit.edu>
Date: Thu,  6 Feb 2025 18:02:18 -0500 (EST)
MIME-Version: 1.0
Reply-To: krbdev@mit.edu
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: cvs-krb5-bounces@mit.edu

https://github.com/krb5/krb5/commit/367ccd2fcf8b4adb82bfc7ef9b5f04ff94f80326
commit 367ccd2fcf8b4adb82bfc7ef9b5f04ff94f80326
Author: Greg Hudson <ghudson@mit.edu>
Date:   Wed Jan 29 00:22:57 2025 -0500

    Allow only one salt type per enctype in key data
    
    In the default libkdb5 password change method, omit requested key/salt
    combinations that duplicate an earlier encryption type, even if they
    have a different salt type.  Any use cases for multiple salts for the
    same enctype disappeared with single-DES support.  (We already have
    this behavior for chrand requests.)
    
    ticket: 9160 (new)

 src/lib/kdb/kdb_cpw.c | 3 +--
 1 file changed, 1 insertion(+), 2 deletions(-)

diff --git a/src/lib/kdb/kdb_cpw.c b/src/lib/kdb/kdb_cpw.c
index c33c7cf8d..8b012e19e 100644
--- a/src/lib/kdb/kdb_cpw.c
+++ b/src/lib/kdb/kdb_cpw.c
@@ -264,8 +264,7 @@ add_key_pwd(krb5_context context, krb5_keyblock *master_key,
                                                  &similar)))
                 return(retval);
 
-            if (similar &&
-                (ks_tuple[j].ks_salttype == ks_tuple[i].ks_salttype))
+            if (similar)
                 break;
         }
 
_______________________________________________
cvs-krb5 mailing list
cvs-krb5@mit.edu
https://mailman.mit.edu/mailman/listinfo/cvs-krb5

home help back first fref pref prev next nref lref last post