decode_krb5_authenticator,
krb5_auth_con_getauthenticator,
krb5_copy_authenticator,
krb5_ser_authenticator_init
Take them out for the Lite CLient.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@21129
dc483132-0cff-0310-8789-
dd5450dbe970
#define free_field(rep,f) free((rep)->f)
#define clear_field(rep,f) (*(rep))->f = 0
+#ifndef LEAN_CLIENT
krb5_error_code decode_krb5_authenticator(const krb5_data *code, krb5_authenticator **rep)
{
setup();
}
return retval;
}
+#endif
krb5_error_code
KRB5_CALLCONV
*seqnumber = auth_context->local_seq_number;
return 0;
}
-
+#ifndef LEAN_CLIENT
krb5_error_code KRB5_CALLCONV
krb5_auth_con_getauthenticator(krb5_context context, krb5_auth_context auth_context, krb5_authenticator **authenticator)
{
return (krb5_copy_authenticator(context, auth_context->authentp,
authenticator));
}
+#endif
krb5_error_code KRB5_CALLCONV
krb5_auth_con_getremoteseqnumber(krb5_context context, krb5_auth_context auth_context, krb5_int32 *seqnumber)
*/
#include "k5-int.h"
-
+#ifndef LEAN_CLIENT
krb5_error_code KRB5_CALLCONV
krb5_copy_authenticator(krb5_context context, const krb5_authenticator *authfrom, krb5_authenticator **authto)
{
*authto = tempto;
return 0;
}
+#endif
+
/* XXX this is an evil hack. check_valid_flag is set iff the call
is not from inside the kdc. we can use this to determine which
key usage to use */
+#ifndef LEAN_CLIENT
if ((retval = decrypt_authenticator(context, req,
&((*auth_context)->authentp),
check_valid_flag)))
goto cleanup;
+#endif
if (!krb5_principal_compare(context, (*auth_context)->authentp->client,
req->ticket->enc_part2->client)) {
retval = KRB5KRB_AP_ERR_BADMATCH;
0); /* don't check_valid_flag */
return retval;
}
+
+#ifndef LEAN_CLIENT
static krb5_error_code
decrypt_authenticator(krb5_context context, const krb5_ap_req *request,
krb5_authenticator **authpp, int is_ap_req)
clean_scratch();
return retval;
}
-
+#endif
kret = krb5_ser_authdata_init(kcontext);
if (!kret)
kret = krb5_ser_address_init(kcontext);
+#ifndef LEAN_CLIENT
if (!kret)
kret = krb5_ser_authenticator_init(kcontext);
+#endif
if (!kret)
kret = krb5_ser_checksum_init(kcontext);
if (!kret)
/*
* ser_auth.c - Serialize krb5_authenticator structure.
*/
+
+#ifndef LEAN_CLIENT
+
#include "k5-int.h"
#include "int-proto.h"
}
return(kret);
}
-\f
/*
* Register the authenticator serializer.
*/
{
return(krb5_register_serializer(kcontext, &krb5_authenticator_ser_entry));
}
+#endif