aboutsummaryrefslogtreecommitdiff
path: root/security/krb5-appl/files/patch-kadmin-server-kadm_rpc_svc.c
diff options
context:
space:
mode:
Diffstat (limited to 'security/krb5-appl/files/patch-kadmin-server-kadm_rpc_svc.c')
-rw-r--r--security/krb5-appl/files/patch-kadmin-server-kadm_rpc_svc.c31
1 files changed, 0 insertions, 31 deletions
diff --git a/security/krb5-appl/files/patch-kadmin-server-kadm_rpc_svc.c b/security/krb5-appl/files/patch-kadmin-server-kadm_rpc_svc.c
deleted file mode 100644
index 40cc158e5fe3..000000000000
--- a/security/krb5-appl/files/patch-kadmin-server-kadm_rpc_svc.c
+++ /dev/null
@@ -1,31 +0,0 @@
---- kadmin/server/kadm_rpc_svc.c.orig Fri Mar 31 19:08:17 2006
-+++ kadmin/server/kadm_rpc_svc.c Wed Apr 4 13:53:04 2007
-@@ -250,6 +250,8 @@
- krb5_data *c1, *c2, *realm;
- gss_buffer_desc gss_str;
- kadm5_server_handle_t handle;
-+ size_t slen;
-+ char *sdots;
-
- success = 0;
- handle = (kadm5_server_handle_t)global_server_handle;
-@@ -274,6 +276,8 @@
- if (ret == 0)
- goto fail_name;
-
-+ slen = gss_str.length;
-+ trunc_name(&slen, &sdots);
- /*
- * Since we accept with GSS_C_NO_NAME, the client can authenticate
- * against the entire kdb. Therefore, ensure that the service
-@@ -296,8 +300,8 @@
-
- fail_princ:
- if (!success) {
-- krb5_klog_syslog(LOG_ERR, "bad service principal %.*s",
-- gss_str.length, gss_str.value);
-+ krb5_klog_syslog(LOG_ERR, "bad service principal %.*s%s",
-+ slen, gss_str.value, sdots);
- }
- gss_release_buffer(&min_stat, &gss_str);
- krb5_free_principal(kctx, princ);