From 59db8ef27f073f1a39ccb8b71b592ce7969e580c Mon Sep 17 00:00:00 2001 From: Sam Hartman Date: Sat, 3 Jan 2009 23:20:26 +0000 Subject: [PATCH] Remove flags that do not correspond to behavior we support non_ms_principal would need to be phrased in terms of what behavior is being changed, not client OS. The pkinit flag would need to be better documented git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@21692 dc483132-0cff-0310-8789-dd5450dbe970 --- src/include/kdb_ext.h | 4 ---- 1 file changed, 4 deletions(-) diff --git a/src/include/kdb_ext.h b/src/include/kdb_ext.h index 5ee234657..d7f00fbcb 100644 --- a/src/include/kdb_ext.h +++ b/src/include/kdb_ext.h @@ -37,8 +37,6 @@ #define KRB5_KDB_OK_TO_AUTH_AS_DELEGATE 0x00200000 /* Service does not require authorization data */ #define KRB5_KDB_NO_AUTH_DATA_REQUIRED 0x00400000 -/* Used to indicate non-Windows client behaviour */ -#define KRB5_KDB_NON_MS_PRINCIPAL 0x00800000 /* Private flag used to indicate principal is local TGS */ #define KRB5_KDB_TICKET_GRANTING_SERVICE 0x01000000 /* Private flag used to indicate trust is non-transitive */ @@ -57,8 +55,6 @@ #define KRB5_KDB_FLAG_PROTOCOL_TRANSITION 0x00000100 /* Constrained delegation */ #define KRB5_KDB_FLAG_CONSTRAINED_DELEGATION 0x00000200 -/* PKINIT */ -#define KRB5_KDB_FLAG_PKINIT 0x00000400 /* User-to-user */ #define KRB5_KDB_FLAG_USER_TO_USER 0x00000800 /* Cross-realm */ -- 2.26.2