]> git.ipfire.org Git - thirdparty/krb5.git/commitdiff
Set missing mask flags for kdb5_util operations 1364/head
authorJulien Rische <jrische@redhat.com>
Thu, 1 Aug 2024 08:56:07 +0000 (10:56 +0200)
committerGreg Hudson <ghudson@mit.edu>
Wed, 8 Jan 2025 23:46:27 +0000 (18:46 -0500)
Set KADM5_TL_DATA for the use_mkey and update_princ_encryption
commands.  (Commit c877f13c8985d820583b0d7ac1bb4c5dc36e677e did this
for the add_new_mkey and purge_mkeys commands.)  Set appropriate flags
for the add_random_key command.

[ghudson@mit.edu: combined two commits; pruned out proposed mask flag
additions for values represented within key data or tl-data (like
KADM5_MKVNO), as those flags are currently only used in the kadm5
protocol, not to communicate with the KDB module]

ticket: 9158 (new)

src/kadmin/dbutil/kdb5_mkey.c
src/kadmin/dbutil/kdb5_util.c

index 0088c8eafbc437a9ed3aba55c24eac3460be9bf5..3e213123f42059907c342da940d9d3c1ab05e2f4 100644 (file)
@@ -510,6 +510,8 @@ kdb5_use_mkey(int argc, char *argv[])
         goto cleanup_return;
     }
 
+    master_entry->mask |= KADM5_TL_DATA;
+
     if ((retval = krb5_db_put_principal(util_context, master_entry))) {
         com_err(progname, retval,
                 _("while adding master key entry to the database"));
@@ -780,7 +782,7 @@ update_princ_encryption_1(void *cb, krb5_db_entry *ent)
         goto fail;
     }
 
-    ent->mask |= KADM5_KEY_DATA;
+    ent->mask |= KADM5_KEY_DATA | KADM5_TL_DATA;
 
     if ((retval = krb5_db_put_principal(util_context, ent))) {
         com_err(progname, retval, _("while updating principal '%s' key data "
index fd3cc1f96a7d409f9c70056a7f203a8366562698..88218dba740abd188cd7ef63d2f48a1e173cc14f 100644 (file)
@@ -600,6 +600,9 @@ add_random_key(int argc, char **argv)
         exit_status++;
         return;
     }
+
+    dbent->mask |= KADM5_ATTRIBUTES | KADM5_KEY_DATA | KADM5_TL_DATA;
+
     ret = krb5_db_put_principal(util_context, dbent);
     krb5_db_free_principal(util_context, dbent);
     if (ret) {