unsigned int *nad_types,
krb5_authdatatype **ad_types);
-krb5_error_code krb5int_parse_enctype_list(krb5_context context, char *profstr,
+krb5_error_code krb5int_parse_enctype_list(krb5_context context,
+ const char *profkey, char *profstr,
krb5_enctype *default_list,
krb5_enctype **result);
#define TRACE_GIC_PWD_MASTER(c) \
TRACE(c, (c, "Retrying AS request with master KDC"))
+#define TRACE_ENCTYPE_LIST_UNKNOWN(c, profvar, name) \
+ TRACE(c, (c, "Unrecognized enctype name in {str}: {str}", profvar, name))
+
#define TRACE_INIT_CREDS(c, princ) \
TRACE(c, (c, "Getting initial credentials for {princ}", princ))
#define TRACE_INIT_CREDS_AS_KEY_GAK(c, keyblock) \
* parsing profstr. profstr may be modified during parsing.
*/
krb5_error_code
-krb5int_parse_enctype_list(krb5_context context, char *profstr,
- krb5_enctype *default_list, krb5_enctype **result)
+krb5int_parse_enctype_list(krb5_context context, const char *profkey,
+ char *profstr, krb5_enctype *default_list,
+ krb5_enctype **result)
{
char *token, *delim = " \t\r\n,", *save = NULL;
krb5_boolean sel, weak = context->allow_weak_crypto;
} else if (krb5_string_to_enctype(token, &etype) == 0) {
/* Set a specific enctype. */
mod_list(etype, sel, weak, &list);
+ } else {
+ TRACE_ENCTYPE_LIST_UNKNOWN(context, profkey, token);
}
}
profkey, NULL, "DEFAULT", &profstr);
if (code)
return code;
- code = krb5int_parse_enctype_list(context, profstr, default_list,
- &etypes);
+ code = krb5int_parse_enctype_list(context, profkey, profstr,
+ default_list, &etypes);
profile_release_string(profstr);
if (code)
return code;
if (tests[i].str != NULL) {
copy = strdup(tests[i].str);
- ret = krb5int_parse_enctype_list(ctx, copy, tests[i].defaults,
- &list);
+ ret = krb5int_parse_enctype_list(ctx, "", copy,
+ tests[i].defaults, &list);
if (ret != expected_err) {
com_err("krb5int_parse_enctype_list", ret, "");
return 2;