]> git.ipfire.org Git - thirdparty/krb5.git/commitdiff
Fix KDC choice to send encrypted S4U_X509_USER 1089/head
authorGreg Hudson <ghudson@mit.edu>
Tue, 23 Jun 2020 17:30:59 +0000 (13:30 -0400)
committerGreg Hudson <ghudson@mit.edu>
Mon, 29 Jun 2020 16:22:01 +0000 (12:22 -0400)
The KDC's decision to send a PA_S4U_X509_USER entry in encrypted
padata has no connection to the client USE_REPLY_KEY_USAGE flag.  Only
conditionalize on the enctype.

ticket: 8920 (new)

src/kdc/kdc_util.c

index b3bca52b1266082bd4e3e9dd55a552971e0b74b6..3f4ba32a634d97b7275b361cdb282816a7b8c88f 100644 (file)
@@ -1400,8 +1400,7 @@ kdc_make_s4u2self_rep(krb5_context context,
      * enctypes, including rc4-hmac. A forthcoming workaround for this
      * includes the checksum bytes in the encrypted padata.
      */
-    if ((req_s4u_user->user_id.options & KRB5_S4U_OPTS_USE_REPLY_KEY_USAGE) &&
-        enctype_requires_etype_info_2(enctype) == FALSE) {
+    if (enctype_requires_etype_info_2(enctype) == FALSE) {
         code = k5_alloc_pa_data(KRB5_PADATA_S4U_X509_USER,
                                 req_s4u_user->cksum.length +
                                 rep_s4u_user.cksum.length, &pa);