#define TRACE_TKT_CREDS_WRONG_ENCTYPE(c) \
TRACE(c, "Retrying TGS request with desired service ticket enctypes")
+#define TRACE_TXT_LOOKUP_NOTFOUND(c, host) \
+ TRACE(c, "TXT record {str} not found", host)
+#define TRACE_TXT_LOOKUP_SUCCESS(c, host, realm) \
+ TRACE(c, "TXT record {str} found: {str}", host, realm)
+
#define TRACE_GET_HOST_REALM_RETURN(c, host, realm) \
TRACE(c, "Got realm {str} for host {str}", realm, host)
krb5_timeofday
krb5_timestamp_to_sfstring
krb5_timestamp_to_string
-krb5_try_realm_txt_rr
krb5_unlock_file
krb5_unpack_full_ipaddr
krb5_unparse_name
if ( localhost[0] ) {
p = localhost;
do {
- retval = krb5_try_realm_txt_rr("_kerberos", p,
- &context->default_realm);
+ retval = k5_try_realm_txt_rr(context, "_kerberos", p,
+ &context->default_realm);
p = strchr(p,'.');
if (p)
p++;
} while (retval && p && p[0]);
if (retval)
- retval = krb5_try_realm_txt_rr("_kerberos", "",
- &context->default_realm);
+ retval = k5_try_realm_txt_rr(context, "_kerberos", "",
+ &context->default_realm);
} else {
- retval = krb5_try_realm_txt_rr("_kerberos", "",
- &context->default_realm);
+ retval = k5_try_realm_txt_rr(context, "_kerberos", "",
+ &context->default_realm);
}
if (retval) {
return(KRB5_CONFIG_NODEFREALM);
*/
krb5_error_code
-krb5_try_realm_txt_rr(const char *prefix, const char *name, char **realm)
+k5_try_realm_txt_rr(krb5_context context, const char *prefix, const char *name,
+ char **realm)
{
krb5_error_code retval = KRB5_ERR_HOST_REALM_UNKNOWN;
const unsigned char *p, *base;
if (k5_buf_data(&buf) == NULL)
return KRB5_ERR_HOST_REALM_UNKNOWN;
ret = krb5int_dns_init(&ds, host, C_IN, T_TXT);
- if (ret < 0)
+ if (ret < 0) {
+ TRACE_TXT_LOOKUP_NOTFOUND(context, host);
goto errout;
+ }
ret = krb5int_dns_nextans(ds, &base, &rdlen);
if (ret < 0 || base == NULL)
if ( (*realm)[len-1] == '.' )
(*realm)[len-1] = '\0';
retval = 0;
+ TRACE_TXT_LOOKUP_SUCCESS(context, host, *realm);
errout:
if (ds != NULL) {
if (_krb5_use_dns_realm(context) && !is_numeric) {
p = cleanname;
do {
- ret = krb5_try_realm_txt_rr("_kerberos", p, &realm);
+ ret = k5_try_realm_txt_rr(context, "_kerberos", p, &realm);
p = strchr(p, '.');
if (p != NULL)
p++;
#endif /* HAVE_NETINET_IN_H */
-krb5_error_code krb5_try_realm_txt_rr(const char *, const char *,
- char **realm);
+krb5_error_code k5_try_realm_txt_rr(krb5_context context, const char *prefix,
+ const char *name, char **realm);
int _krb5_use_dns_realm (krb5_context);
int _krb5_use_dns_kdc (krb5_context);