diff options
author | Benjamin Franzke <benjaminfranzke@googlemail.com> | 2013-10-15 12:52:27 +0200 |
---|---|---|
committer | Benjamin Franzke <benjaminfranzke@googlemail.com> | 2013-10-17 13:17:26 +0200 |
commit | 51fa7df2e7ace828251a3ba73311d47c15840f2b (patch) | |
tree | 9aac97877ac3c5a0e85a8db3c32369793183ac14 | |
parent | 20234cda39d14ffec28932d4759eff80486d8b0d (diff) | |
download | sssd-51fa7df2e7ace828251a3ba73311d47c15840f2b.tar.gz sssd-51fa7df2e7ace828251a3ba73311d47c15840f2b.tar.bz2 sssd-51fa7df2e7ace828251a3ba73311d47c15840f2b.zip |
krb5: Add additional HAVE_PAC_RESONDER checks
This is since krb5_authdata_free and krb5_authdata:contents may not be
available if HAVE_PAC_RESPONDER is disabled.
-rw-r--r-- | src/providers/krb5/krb5_child.c | 6 |
1 files changed, 6 insertions, 0 deletions
diff --git a/src/providers/krb5/krb5_child.c b/src/providers/krb5/krb5_child.c index 24a1fe1b..06e1654c 100644 --- a/src/providers/krb5/krb5_child.c +++ b/src/providers/krb5/krb5_child.c @@ -88,6 +88,7 @@ static krb5_error_code get_changepw_options(krb5_context ctx, return 0; } +#ifdef HAVE_PAC_RESPONDER static errno_t sss_send_pac(krb5_authdata **pac_authdata) { struct sss_cli_req_data sss_data; @@ -107,6 +108,7 @@ static errno_t sss_send_pac(krb5_authdata **pac_authdata) return EOK; } +#endif /* HAVE_PAC_RESPONDER */ static void sss_krb5_expire_callback_func(krb5_context context, void *data, krb5_timestamp password_expiration, @@ -700,7 +702,9 @@ static krb5_error_code validate_tgt(struct krb5_req *kr) krb5_principal validation_princ = NULL; bool realm_entry_found = false; krb5_ccache validation_ccache = NULL; +#ifdef HAVE_PAC_RESPONDER krb5_authdata **pac_authdata = NULL; +#endif memset(&keytab, 0, sizeof(keytab)); kerr = krb5_kt_resolve(kr->ctx, kr->keytab, &keytab); @@ -794,6 +798,7 @@ static krb5_error_code validate_tgt(struct krb5_req *kr) goto done; } +#ifdef HAVE_PAC_RESPONDER /* Try to find and send the PAC to the PAC responder. * Failures are not critical. */ if (kr->send_pac) { @@ -816,6 +821,7 @@ static krb5_error_code validate_tgt(struct krb5_req *kr) kerr = 0; } } +#endif /* HAVE_PAC_RESPONDER */ done: if (validation_ccache != NULL) { |