aboutsummaryrefslogtreecommitdiff
path: root/debian/patches
diff options
context:
space:
mode:
authorGuido Günther <agx@sigxcpu.org>2009-01-19 22:18:35 +0100
committerGuido Günther <agx@sigxcpu.org>2009-01-19 22:18:35 +0100
commitdc19dd3d34d1d340102e7e8e5c104a695f4e5a22 (patch)
treed63ecd5f28230d4ed09090d85bd99c1030d2f98d /debian/patches
parentadd Vcs-{Git,Browser} fields (diff)
downloadkrb5-auth-dialog-dc19dd3d34d1d340102e7e8e5c104a695f4e5a22.tar.gz
krb5-auth-dialog-dc19dd3d34d1d340102e7e8e5c104a695f4e5a22.tar.bz2
krb5-auth-dialog-dc19dd3d34d1d340102e7e8e5c104a695f4e5a22.zip
don't try pkinit if pk_userid is non-null but empty
Diffstat (limited to 'debian/patches')
-rw-r--r--debian/patches/0002-don-t-try-pkinit-if-pk_userid-is-non-null-but-empty.patch55
-rw-r--r--debian/patches/series1
2 files changed, 56 insertions, 0 deletions
diff --git a/debian/patches/0002-don-t-try-pkinit-if-pk_userid-is-non-null-but-empty.patch b/debian/patches/0002-don-t-try-pkinit-if-pk_userid-is-non-null-but-empty.patch
new file mode 100644
index 0000000..79dfb62
--- /dev/null
+++ b/debian/patches/0002-don-t-try-pkinit-if-pk_userid-is-non-null-but-empty.patch
@@ -0,0 +1,55 @@
+From: guidog <guidog@517b70f8-ed25-0410-8bf6-f5db08f7b76e>
+Date: Mon, 19 Jan 2009 21:13:19 +0000
+Subject: [PATCH] don't try pkinit if pk_userid is non-null but empty
+
+git-svn-id: svn+ssh://svn.gnome.org/svn/krb5-auth-dialog/trunk@124 517b70f8-ed25-0410-8bf6-f5db08f7b76e
+---
+ src/krb5-auth-dialog.c | 4 ++--
+ src/krb5-auth-gconf.c | 4 ++--
+ 2 files changed, 4 insertions(+), 4 deletions(-)
+
+diff --git a/src/krb5-auth-dialog.c b/src/krb5-auth-dialog.c
+index c8fc27c..d6de3d7 100644
+--- a/src/krb5-auth-dialog.c
++++ b/src/krb5-auth-dialog.c
+@@ -513,7 +513,7 @@ ka_auth_pkinit(Krb5AuthApplet* applet, krb5_creds* creds)
+ krb5_get_init_creds_opt *opts = NULL;
+ krb5_error_code retval;
+
+- KA_DEBUG("pkinit with %s", applet->pk_userid);
++ KA_DEBUG("pkinit with '%s'", applet->pk_userid);
+
+ if (!applet->pk_userid)
+ return 0;
+@@ -573,7 +573,7 @@ grab_credentials (Krb5AuthApplet* applet)
+ return retval;
+
+ #if ENABLE_PKINIT
+- if (applet->pk_userid) { /* try pkinit */
++ if (applet->pk_userid && strlen(applet->pk_userid)) { /* try pkinit */
+ #else
+ if (0) {
+ #endif
+diff --git a/src/krb5-auth-gconf.c b/src/krb5-auth-gconf.c
+index a11370c..7353471 100644
+--- a/src/krb5-auth-gconf.c
++++ b/src/krb5-auth-gconf.c
+@@ -118,7 +118,7 @@ ka_gconf_set_principal (GConfClient* client, Krb5AuthApplet* applet)
+ if(!ka_gconf_get_string (client, KA_GCONF_KEY_PRINCIPAL, &applet->principal)) {
+ applet->principal = g_strdup (g_get_user_name());
+ }
+- KA_DEBUG("Setting principal to %s", applet->principal);
++ KA_DEBUG("Setting principal to '%s'", applet->principal);
+ // FIXME: need to send set-principal signal
+ return TRUE;
+ }
+@@ -131,7 +131,7 @@ ka_gconf_set_pk_userid (GConfClient* client, Krb5AuthApplet* applet)
+ if(!ka_gconf_get_string (client, KA_GCONF_KEY_PK_USERID, &applet->pk_userid)) {
+ applet->pk_userid = NULL;
+ }
+- KA_DEBUG("Setting pk_userid to %s", applet->pk_userid ? applet->pk_userid : "<disabled>");
++ KA_DEBUG("Setting pk_userid to '%s'", applet->pk_userid ? applet->pk_userid : "<disabled>");
+ return TRUE;
+ }
+
+--
diff --git a/debian/patches/series b/debian/patches/series
index ecea154..89903b9 100644
--- a/debian/patches/series
+++ b/debian/patches/series
@@ -1 +1,2 @@
0001-set-a-more-gnomeisch-invisible-char.patch
+0002-don-t-try-pkinit-if-pk_userid-is-non-null-but-empty.patch
bgstack15