aports/main/apache-mod-auth-kerb/krb5-1.18-fix.patch

35 lines
1.3 KiB
Diff

--- ./src/mod_auth_kerb.c.org 2020-08-10 17:36:11.563228638 +0200
+++ ./src/mod_auth_kerb.c 2020-08-10 17:53:14.641734908 +0200
@@ -2070,12 +2070,11 @@
ret = krb5_init_context(&context);
if (ret)
return 0;
-
- ret = krb5_rc_resolve_full(context, &id, "none:");
+extern krb5_error_code
+ k5_rc_resolve(krb5_context context, const char *name, krb5_rcache *rc_out);
+ ret = k5_rc_resolve(context, "none:", &id);
found = (ret == 0);
- if (ret == 0)
- krb5_rc_destroy(context, id);
krb5_free_context(context);
return found;
diff -ruN mod_auth_kerb-5.4.orig/src/mod_auth_kerb.c mod_auth_kerb-5.4/src/mod_auth_kerb.c
--- mod_auth_kerb-5.4.orig/src/mod_auth_kerb.c 2018-12-12 16:59:43.762013269 +0100
+++ mod_auth_kerb-5.4/src/mod_auth_kerb.c 2018-12-12 16:59:59.151945123 +0100
@@ -799,11 +799,9 @@
"failed to verify krb5 credentials: %s",
krb5_get_err_text(context, ret));
krb5_kt_end_seq_get(context, keytab, &cursor);
- krb5_kt_close(context, keytab);
goto end;
}
krb5_kt_end_seq_get(context, keytab, &cursor);
- krb5_kt_close(context, keytab);
}
else {
if ((ret = verify_krb5_init_creds(r, context, &creds, server, keytab))) {