diff options
Diffstat (limited to 'security/krb5-appl/files/patch-kadmin-server-kadm_rpc_svc.c')
-rw-r--r-- | security/krb5-appl/files/patch-kadmin-server-kadm_rpc_svc.c | 31 |
1 files changed, 0 insertions, 31 deletions
diff --git a/security/krb5-appl/files/patch-kadmin-server-kadm_rpc_svc.c b/security/krb5-appl/files/patch-kadmin-server-kadm_rpc_svc.c deleted file mode 100644 index 40cc158e5fe3..000000000000 --- a/security/krb5-appl/files/patch-kadmin-server-kadm_rpc_svc.c +++ /dev/null @@ -1,31 +0,0 @@ ---- kadmin/server/kadm_rpc_svc.c.orig Fri Mar 31 19:08:17 2006 -+++ kadmin/server/kadm_rpc_svc.c Wed Apr 4 13:53:04 2007 -@@ -250,6 +250,8 @@ - krb5_data *c1, *c2, *realm; - gss_buffer_desc gss_str; - kadm5_server_handle_t handle; -+ size_t slen; -+ char *sdots; - - success = 0; - handle = (kadm5_server_handle_t)global_server_handle; -@@ -274,6 +276,8 @@ - if (ret == 0) - goto fail_name; - -+ slen = gss_str.length; -+ trunc_name(&slen, &sdots); - /* - * Since we accept with GSS_C_NO_NAME, the client can authenticate - * against the entire kdb. Therefore, ensure that the service -@@ -296,8 +300,8 @@ - - fail_princ: - if (!success) { -- krb5_klog_syslog(LOG_ERR, "bad service principal %.*s", -- gss_str.length, gss_str.value); -+ krb5_klog_syslog(LOG_ERR, "bad service principal %.*s%s", -+ slen, gss_str.value, sdots); - } - gss_release_buffer(&min_stat, &gss_str); - krb5_free_principal(kctx, princ); |