[390] in Kerberos-V5-bugs
kdb5_edit increments version numbers by 2
daemon@ATHENA.MIT.EDU (Steve Lunt)
Thu Nov 18 17:26:27 1993
Date: Thu, 18 Nov 1993 17:18:51 -0500
From: Steve Lunt <lunt@ctt.bellcore.com>
To: krb5-bugs@MIT.EDU
Cc: kerberos@MIT.EDU
Errors-To: postmaster@ctt.bellcore.com
kdb5_edit increments the key version number by two when changing a
principal's password via change_pwd_key or change_v4_key
(change_rnd_key works OK). Below is the fix.
-- Steve
Steven J. Lunt lunt@bellcore.com
Information Technology Security RRC 1L-213
Bellcore 444 Hoes Lane
(908) 699-4244 Piscataway, NJ 08854
*** kdb5_edit.c.old Fri Feb 26 01:09:27 1993
--- kdb5_edit.c.new Thu Nov 18 17:04:42 1993
***************
*** 1104,1110 ****
krb5_free_principal(newprinc);
return;
}
! enter_pwd_key(cmdname, argv[1], newprinc, newprinc, vno+1, salttype);
krb5_free_principal(newprinc);
return;
}
--- 1104,1110 ----
krb5_free_principal(newprinc);
return;
}
! enter_pwd_key(cmdname, argv[1], newprinc, newprinc, vno, salttype);
krb5_free_principal(newprinc);
return;
}
***************
*** 1140,1146 ****
krb5_free_principal(newprinc);
return;
}
! enter_pwd_key(argv[0], argv[1], newprinc, newprinc, vno+1,
KRB5_KDB_SALTTYPE_V4);
krb5_free_principal(newprinc);
return;
--- 1140,1146 ----
krb5_free_principal(newprinc);
return;
}
! enter_pwd_key(argv[0], argv[1], newprinc, newprinc, vno,
KRB5_KDB_SALTTYPE_V4);
krb5_free_principal(newprinc);
return;