* krlogind.c (recvauth): Don't complain about a subkey sent for KCMDV0.1 if
HEIMDAL_FRIENDLY is defined, just quietly ignore it.
* krshd.c (recvauth): Likewise.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12646
dc483132-0cff-0310-8789-
dd5450dbe970
+2000-09-08 Ken Raeburn <raeburn@mit.edu>
+
+ * Makefile.in (DEFINES): Define HEIMDAL_FRIENDLY.
+ * krlogind.c (recvauth): Don't complain about a subkey sent for
+ KCMDV0.1 if HEIMDAL_FRIENDLY is defined, just quietly ignore it.
+ * krshd.c (recvauth): Likewise.
+
Tue Aug 8 13:38:22 2000 Ezra Peisach <epeisach@mit.edu>
* krlogin.c (read_wrapper): Copy from the current point and not
-DUCB_RSH=\"$(UCB_RSH)\" -DUCB_RCP=\"$(UCB_RCP)\"
DEFINES = $(RSH) $(BSD) $(RPROGS) \
- -DLOGIN_PROGRAM=\"$(SERVER_BINDIR)/login.krb5\" -DKPROGDIR=\"$(CLIENT_BINDIR)\"
+ -DLOGIN_PROGRAM=\"$(SERVER_BINDIR)/login.krb5\" -DKPROGDIR=\"$(CLIENT_BINDIR)\" \
+ -DHEIMDAL_FRIENDLY
all:: rsh rcp rlogin kshd klogind login.krb5 $(V4RCP)
fatal (netf, "Server can't get session subkey");
if (!key && do_encrypt && kcmd_proto == KCMD_NEW_PROTOCOL)
fatal (netf, "No session subkey sent");
- if (key && kcmd_proto == KCMD_OLD_PROTOCOL)
+ if (key && kcmd_proto == KCMD_OLD_PROTOCOL) {
+#ifdef HEIMDAL_FRIENDLY
+ key = 0;
+#else
fatal (netf, "Session subkey not permitted under old kcmd protocol");
+#endif
+ }
if (key == 0)
key = ticket->enc_part2->session;
fatal (netf, "Server can't get session subkey");
if (!key && do_encrypt && kcmd_proto == KCMD_NEW_PROTOCOL)
fatal (netf, "No session subkey sent");
- if (key && kcmd_proto == KCMD_OLD_PROTOCOL)
+ if (key && kcmd_proto == KCMD_OLD_PROTOCOL) {
+#ifdef HEIMDAL_FRIENDLY
+ key = 0;
+#else
fatal (netf, "Session subkey not allowed in old kcmd protocol");
+#endif
+ }
if (key == 0)
key = ticket->enc_part2->session;
rcmd_stream_init_krb5 (key, do_encrypt, 0, 0, kcmd_proto);