always cleared.
* do_tgs_req.c (process_tgs_req): Treat SUPPORT_DESMD5 as if it
were always cleared.
* kdc_util.c (select_session_keytype): Don't issue session key
enctype that is not in permitted_enctypes.
(dbentry_supports_enctype): For now, always treat SUPPORT_DESMD5
as if it were cleared.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@13857
dc483132-0cff-0310-8789-
dd5450dbe970
+2001-10-25 Tom Yu <tlyu@mit.edu>
+
+ * do_as_req.c (process_as_req: Treat SUPPORT_DESMD5 as if it were
+ always cleared.
+
+ * do_tgs_req.c (process_tgs_req): Treat SUPPORT_DESMD5 as if it
+ were always cleared.
+
+2001-10-24 Tom Yu <tlyu@mit.edu>
+
+ * kdc_util.c (select_session_keytype): Don't issue session key
+ enctype that is not in permitted_enctypes.
+ (dbentry_supports_enctype): For now, always treat SUPPORT_DESMD5
+ as if it were cleared.
+
2001-10-12 Tom Yu <tlyu@mit.edu>
* kdc_util.c (ktypes2str, rep_etypes2str): Clean up somewhat.
status = "DECRYPT_SERVER_KEY";
goto errout;
}
- if ((encrypting_key.enctype == ENCTYPE_DES_CBC_CRC) &&
- (isflagset(server.attributes, KRB5_KDB_SUPPORT_DESMD5)))
- encrypting_key.enctype = ENCTYPE_DES_CBC_MD5;
errcode = krb5_encrypt_tkt_part(kdc_context, &encrypting_key, &ticket_reply);
krb5_free_keyblock_contents(kdc_context, &encrypting_key);
status = "DECRYPT_SERVER_KEY";
goto cleanup;
}
- if ((encrypting_key.enctype == ENCTYPE_DES_CBC_CRC) &&
- (isflagset(server.attributes, KRB5_KDB_SUPPORT_DESMD5)))
- encrypting_key.enctype = ENCTYPE_DES_CBC_MD5;
errcode = krb5_encrypt_tkt_part(kdc_context, &encrypting_key,
&ticket_reply);
krb5_free_keyblock_contents(kdc_context, &encrypting_key);
{
/*
* If it's DES_CBC_MD5, there's a bit in the attribute mask which
- * checks to see if we support it.
+ * checks to see if we support it. For now, treat it as always
+ * clear.
*
* In theory everything's supposed to support DES_CBC_MD5, but
* that's not the reality....
*/
if (enctype == ENCTYPE_DES_CBC_MD5)
- return isflagset(client->attributes, KRB5_KDB_SUPPORT_DESMD5);
+ return 0;
/*
* XXX we assume everything can understand DES_CBC_CRC
if (!valid_enctype(ktype[i]))
continue;
+ if (!krb5_is_permitted_enctype(context, ktype[i]))
+ continue;
+
if (dbentry_supports_enctype(context, server, ktype[i]))
return ktype[i];
}