From 014b4b955c995b5e854cdd31b01879a2d0cb3596 Mon Sep 17 00:00:00 2001 From: Theodore Tso Date: Thu, 3 Jun 1993 12:15:18 +0000 Subject: [PATCH] Changed so that kerberos5.c would compile with the ENCRYPTION option turned off. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@2599 dc483132-0cff-0310-8789-dd5450dbe970 --- src/appl/telnet/libtelnet/kerberos5.c | 11 ++++++++--- 1 file changed, 8 insertions(+), 3 deletions(-) diff --git a/src/appl/telnet/libtelnet/kerberos5.c b/src/appl/telnet/libtelnet/kerberos5.c index 4b227a575..5f89b987b 100644 --- a/src/appl/telnet/libtelnet/kerberos5.c +++ b/src/appl/telnet/libtelnet/kerberos5.c @@ -117,14 +117,15 @@ static krb5_tkt_authent *authdat = NULL; /* telnet matches the AP_REQ and AP_REP with this */ static krb5_authenticator authenticator; +void kerberos5_forward(); + /* some compilers can't hack void *, so we use the Kerberos krb5_pointer, which is either void * or char *, depending on the compiler. */ #define Voidptr krb5_pointer -#if defined(ENCRYPTION) Block session_key; -#endif + static int Data(ap, type, d, c) Authenticator *ap; @@ -346,7 +347,9 @@ kerberos5_is(ap, data, cnt) krb5_principal server; krb5_ap_rep_enc_part reply; krb5_data outbuf; +#ifdef ENCRYPTION Session_Key skey; +#endif char *name; char *getenv(); krb5_data inbuf; @@ -454,11 +457,13 @@ kerberos5_is(ap, data, cnt) (Voidptr )session_key, sizeof(Block)); } else break; - + +#ifdef ENCRYPTION skey.type = SK_DES; skey.length = 8; skey.data = session_key; encrypt_session_key(&skey, 1); +#endif break; case KRB_FORWARD: inbuf.data = (char *)data; -- 2.26.2