summaryrefslogtreecommitdiffstats
path: root/src
diff options
context:
space:
mode:
authorKen Raeburn <raeburn@mit.edu>2002-05-25 02:33:52 +0000
committerKen Raeburn <raeburn@mit.edu>2002-05-25 02:33:52 +0000
commit19719df3b5e421192de3ba1577bddca3cc396453 (patch)
treefdafc2660329ace19cdf24a0a21937d3d52c5a66 /src
parentbfc376060ac4525495d2edc8a08b922a9176418b (diff)
downloadkrb5-19719df3b5e421192de3ba1577bddca3cc396453.tar.gz
krb5-19719df3b5e421192de3ba1577bddca3cc396453.tar.xz
krb5-19719df3b5e421192de3ba1577bddca3cc396453.zip
reformat comment
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@14452 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src')
-rw-r--r--src/lib/gssapi/krb5/accept_sec_context.c40
1 files changed, 21 insertions, 19 deletions
diff --git a/src/lib/gssapi/krb5/accept_sec_context.c b/src/lib/gssapi/krb5/accept_sec_context.c
index f4d5391225..08f90e8e17 100644
--- a/src/lib/gssapi/krb5/accept_sec_context.c
+++ b/src/lib/gssapi/krb5/accept_sec_context.c
@@ -98,25 +98,27 @@ rd_and_store_for_creds(context, auth_context, inbuf, out_cred)
krb5_auth_con_setflags(context, auth_context,
KRB5_AUTH_CONTEXT_DO_SEQUENCE);
- /* By the time krb5_rd_cred is called here (after krb5_rd_req has been */
- /* called in krb5_gss_accept_sec_context), the "keyblock" field of */
- /* auth_context contains a pointer to the session key, and the */
- /* "remote_subkey" field might contain a session subkey. Either of */
- /* these (the "remote_subkey" if it isn't NULL, otherwise the */
- /* "keyblock") might have been used to encrypt the encrypted part of */
- /* the KRB_CRED message that contains the forwarded credentials. (The */
- /* Java Crypto and Security Implementation from the DSTC in Australia */
- /* always uses the session key. But apparently it never negotiates a */
- /* subkey, so this code works fine against a JCSI client.) Up to the */
- /* present, though, GSSAPI clients linked against the MIT code (which */
- /* is almost all GSSAPI clients) don't encrypt the KRB_CRED message at */
- /* all -- at this level. So if the first call to krb5_rd_cred fails, */
- /* we should call it a second time with another auth context freshly */
- /* created by krb5_auth_con_init. All of its keyblock fields will be */
- /* NULL, so krb5_rd_cred will assume that the KRB_CRED message is */
- /* unencrypted. (The MIT code doesn't actually send the KRB_CRED */
- /* message in the clear -- the "authenticator" whose "checksum" ends up */
- /* containing the KRB_CRED message does get encrypted.) */
+ /*
+ * By the time krb5_rd_cred is called here (after krb5_rd_req has been
+ * called in krb5_gss_accept_sec_context), the "keyblock" field of
+ * auth_context contains a pointer to the session key, and the
+ * "remote_subkey" field might contain a session subkey. Either of
+ * these (the "remote_subkey" if it isn't NULL, otherwise the
+ * "keyblock") might have been used to encrypt the encrypted part of
+ * the KRB_CRED message that contains the forwarded credentials. (The
+ * Java Crypto and Security Implementation from the DSTC in Australia
+ * always uses the session key. But apparently it never negotiates a
+ * subkey, so this code works fine against a JCSI client.) Up to the
+ * present, though, GSSAPI clients linked against the MIT code (which
+ * is almost all GSSAPI clients) don't encrypt the KRB_CRED message at
+ * all -- at this level. So if the first call to krb5_rd_cred fails,
+ * we should call it a second time with another auth context freshly
+ * created by krb5_auth_con_init. All of its keyblock fields will be
+ * NULL, so krb5_rd_cred will assume that the KRB_CRED message is
+ * unencrypted. (The MIT code doesn't actually send the KRB_CRED
+ * message in the clear -- the "authenticator" whose "checksum" ends up
+ * containing the KRB_CRED message does get encrypted.)
+ */
if (krb5_rd_cred(context, auth_context, inbuf, &creds, NULL)) {
if (retval = krb5_auth_con_init(context, &new_auth_ctx))
goto cleanup;