summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorBenjamin Franzke <benjaminfranzke@googlemail.com>2013-10-15 12:52:27 +0200
committerBenjamin Franzke <benjaminfranzke@googlemail.com>2013-10-17 13:17:26 +0200
commit51fa7df2e7ace828251a3ba73311d47c15840f2b (patch)
tree9aac97877ac3c5a0e85a8db3c32369793183ac14
parent20234cda39d14ffec28932d4759eff80486d8b0d (diff)
downloadsssd-51fa7df2e7ace828251a3ba73311d47c15840f2b.tar.gz
sssd-51fa7df2e7ace828251a3ba73311d47c15840f2b.tar.bz2
sssd-51fa7df2e7ace828251a3ba73311d47c15840f2b.zip
krb5: Add additional HAVE_PAC_RESONDER checks
This is since krb5_authdata_free and krb5_authdata:contents may not be available if HAVE_PAC_RESPONDER is disabled.
-rw-r--r--src/providers/krb5/krb5_child.c6
1 files changed, 6 insertions, 0 deletions
diff --git a/src/providers/krb5/krb5_child.c b/src/providers/krb5/krb5_child.c
index 24a1fe1b..06e1654c 100644
--- a/src/providers/krb5/krb5_child.c
+++ b/src/providers/krb5/krb5_child.c
@@ -88,6 +88,7 @@ static krb5_error_code get_changepw_options(krb5_context ctx,
return 0;
}
+#ifdef HAVE_PAC_RESPONDER
static errno_t sss_send_pac(krb5_authdata **pac_authdata)
{
struct sss_cli_req_data sss_data;
@@ -107,6 +108,7 @@ static errno_t sss_send_pac(krb5_authdata **pac_authdata)
return EOK;
}
+#endif /* HAVE_PAC_RESPONDER */
static void sss_krb5_expire_callback_func(krb5_context context, void *data,
krb5_timestamp password_expiration,
@@ -700,7 +702,9 @@ static krb5_error_code validate_tgt(struct krb5_req *kr)
krb5_principal validation_princ = NULL;
bool realm_entry_found = false;
krb5_ccache validation_ccache = NULL;
+#ifdef HAVE_PAC_RESPONDER
krb5_authdata **pac_authdata = NULL;
+#endif
memset(&keytab, 0, sizeof(keytab));
kerr = krb5_kt_resolve(kr->ctx, kr->keytab, &keytab);
@@ -794,6 +798,7 @@ static krb5_error_code validate_tgt(struct krb5_req *kr)
goto done;
}
+#ifdef HAVE_PAC_RESPONDER
/* Try to find and send the PAC to the PAC responder.
* Failures are not critical. */
if (kr->send_pac) {
@@ -816,6 +821,7 @@ static krb5_error_code validate_tgt(struct krb5_req *kr)
kerr = 0;
}
}
+#endif /* HAVE_PAC_RESPONDER */
done:
if (validation_ccache != NULL) {