[11329] in Kerberos-V5-bugs
[krbdev.mit.edu #5668] SVN Commit
daemon@ATHENA.MIT.EDU (Tom Yu via RT)
Mon Jan 11 23:44:38 2010
Mail-followup-to: rt@krbdev.mit.edu
mail-copies-to: never
From: "Tom Yu via RT" <rt-comment@krbdev.MIT.EDU>
In-Reply-To: <rt-5668@krbdev.mit.edu>
Message-ID: <rt-5668-32218.3.60389570782239@krbdev.mit.edu>
To: "'AdminCc of krbdev.mit.edu Ticket #5668'":;"'AdminCc of krbdev.mit.edu Ticket #5668'":;@MIT.EDU
Date: Mon, 11 Jan 2010 23:44:35 -0500 (EST)
Reply-To: rt-comment@krbdev.MIT.EDU
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: krb5-bugs-bounces@mit.edu
pull up r22518 from trunk
------------------------------------------------------------------------
r22518 | raeburn | 2009-08-12 13:58:24 -0400 (Wed, 12 Aug 2009) | 19 lines
r22529@squish: raeburn | 2009-08-12 13:49:45 -0400
.
r22530@squish: raeburn | 2009-08-12 13:55:57 -0400
Change KRBCONF_KDC_MODIFIES_KDB to a mostly run-time option.
Change all code conditionals to test a new global variable, the
initial value of which is based on KRBCONF_KDC_MODIFIES_KDB. There is
currently no way to alter the value from the command line; that will
presumably be desired later.
Change initialize_realms to store db_args in a global variable. In
process_as_req, call db_open instead of the old set_name + init.
Don't reopen if an error is reported by krb5_db_fini.
Add a test of running kinit with an incorrect password, to trigger a
kdb update if enabled.
r22531@squish: raeburn | 2009-08-12 13:58:13 -0400
Fix trailing whitespace.
http://src.mit.edu/fisheye/changelog/krb5/?cs=23647
Commit By: tlyu
Revision: 23647
Changed Files:
U branches/krb5-1-7/src/kdc/do_as_req.c
U branches/krb5-1-7/src/kdc/extern.c
U branches/krb5-1-7/src/kdc/extern.h
U branches/krb5-1-7/src/kdc/main.c
U branches/krb5-1-7/src/tests/dejagnu/krb-standalone/standalone.exp
_______________________________________________
krb5-bugs mailing list
krb5-bugs@mit.edu
https://mailman.mit.edu/mailman/listinfo/krb5-bugs