There are some problems with the changes made to /coda/coda-src/auth2/krb5.c from revision 4.10 to 4.11 (the latest).
The attached patch fixes these problems. With the patch, coda compiles properly with both heimdal and mit-krb5. Regards, Maurice. -- Maurice van der Pot Gentoo Linux Developer [EMAIL PROTECTED] http://www.gentoo.org Creator of BiteMe! [EMAIL PROTECTED] http://www.kfk4ever.com
diff -ruN coda-6.0.15/coda-src/auth2/krb5.c
coda-6.0.15-fixed/coda-src/auth2/krb5.c
--- coda-6.0.15/coda-src/auth2/krb5.c 2005-04-13 16:27:00.000000000 +0200
+++ coda-6.0.15-fixed/coda-src/auth2/krb5.c 2006-06-08 14:11:17.287528250
+0200
@@ -54,14 +54,14 @@
#define tkt_realm(t) ((t)->client->realm)
#define tkt_realmlen(t) (strlen((t)->client->realm))
#define tkt_client(t) ((t)->client)
-#define tkt_key(t) ((t)->ticket.key)
+#define tkt_key(t) (&(t)->ticket.key)
#define key_data(k) ((k)->keyvalue.data)
#define key_length(k) ((k)->keyvalue.length)
#else
#define tkt_realm(t) ((t)->enc_part2->client->realm.data)
#define tkt_realmlen(t) ((t)->enc_part2->client->realm.length)
#define tkt_client(t) ((t)->enc_part2->client)
-#define tkt_key(t) ((t)->session)
+#define tkt_key(t) ((t)->enc_part2->session)
#define key_data(k) ((k)->contents)
#define key_length(k) ((k)->length)
#endif
@@ -334,7 +334,7 @@
/* now prepare the keys */
/* hKey is the md5 hash of the kerberos session secret */
- HashSecret(key_data(&tkt_key(ticket)), key_length(&tkt_key(ticket)), hKey);
+ HashSecret(key_data(tkt_key(ticket)), key_length(tkt_key(ticket)), hKey);
/* sKey is a random sequence of bytes */
GenerateSecret(sKey);
pgpeqDmhEwBZp.pgp
Description: PGP signature
