return PA_REAL;
}
+static krb5_error_code
+ec_prep_questions(krb5_context context, krb5_clpreauth_moddata moddata,
+ krb5_clpreauth_modreq modreq, krb5_get_init_creds_opt *opt,
+ krb5_clpreauth_callbacks cb, krb5_clpreauth_rock rock,
+ krb5_kdc_req *request, krb5_data *encoded_request_body,
+ krb5_data *encoded_previous_request, krb5_pa_data *pa_data)
+{
+ cb->need_as_key(context, rock);
+ return 0;
+}
+
static krb5_error_code
ec_process(krb5_context context, krb5_clpreauth_moddata moddata,
krb5_clpreauth_modreq modreq, krb5_get_init_creds_opt *opt,
vt->name = "encrypted_challenge";
vt->pa_type_list = ec_types;
vt->flags = ec_flags;
+ vt->prep_questions = ec_prep_questions;
vt->process = ec_process;
return 0;
}
return PA_REAL;
}
+static krb5_error_code
+encts_prep_questions(krb5_context context, krb5_clpreauth_moddata moddata,
+ krb5_clpreauth_modreq modreq,
+ krb5_get_init_creds_opt *opt, krb5_clpreauth_callbacks cb,
+ krb5_clpreauth_rock rock, krb5_kdc_req *request,
+ krb5_data *encoded_request_body,
+ krb5_data *encoded_previous_request,
+ krb5_pa_data *pa_data)
+{
+ cb->need_as_key(context, rock);
+ return 0;
+}
+
static krb5_error_code
encts_process(krb5_context context, krb5_clpreauth_moddata moddata,
krb5_clpreauth_modreq modreq, krb5_get_init_creds_opt *opt,
vt->name = "encrypted_timestamp";
vt->pa_type_list = encts_pa_types;
vt->flags = encts_flags;
+ vt->prep_questions = encts_prep_questions;
vt->process = encts_process;
return 0;
}