0; also, if a krb5 client passes in a checksum, check it
regardless of whether checksum_required is true. [krb5-appl/500]
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@10286
dc483132-0cff-0310-8789-
dd5450dbe970
+Mon Nov 17 20:55:31 1997 Tom Yu <tlyu@mit.edu>
+
+ * krshd.c: Don't set checksum_ignored to 1 if checksum_required is
+ 0; also, if a krb5 client passes in a checksum, check it
+ regardless of whether checksum_required is true. [krb5-appl/500]
+
Wed Nov 12 19:03:02 1997 Tom Yu <tlyu@mit.edu>
* forward.c (rd_and_store_for_creds): Don't do the chown. Avoids
syslog(LOG_WARNING , "setsockopt (SO_LINGER): %m");
#endif
- if (!checksum_required && !checksum_ignored)
- checksum_ignored = 1;
-
if (checksum_required&&checksum_ignored) {
syslog(LOG_CRIT, "Checksums are required and ignored; these options are mutually exclusive--check the documentation.");
fatal(fd, "Configuration error: mutually exclusive options specified");
&authenticator)))
return status;
- if (authenticator->checksum && checksum_required) {
+ if (authenticator->checksum && !checksum_ignored) {
struct sockaddr_in adr;
int adr_length = sizeof(adr);
char * chksumbuf = (char *) malloc(strlen(cmdbuf)+strlen(locuser)+32);