summaryrefslogtreecommitdiffstats
path: root/src/kdc
diff options
context:
space:
mode:
Diffstat (limited to 'src/kdc')
-rw-r--r--src/kdc/fast_util.c40
-rw-r--r--src/kdc/kdc_preauth_ec.c10
-rw-r--r--src/kdc/kdc_util.c4
3 files changed, 24 insertions, 30 deletions
diff --git a/src/kdc/fast_util.c b/src/kdc/fast_util.c
index 14d833fa5..20b7fef85 100644
--- a/src/kdc/fast_util.c
+++ b/src/kdc/fast_util.c
@@ -59,26 +59,25 @@ static krb5_error_code armor_ap_request
kdc_active_realm->realm_keytab, NULL, &ticket);
if (retval != 0) {
const char * errmsg = krb5_get_error_message(kdc_context, retval);
- krb5_set_error_message(kdc_context, retval,
- _("%s while handling ap-request armor"),
- errmsg);
+ k5_setmsg(kdc_context, retval, _("%s while handling ap-request armor"),
+ errmsg);
krb5_free_error_message(kdc_context, errmsg);
}
if (retval == 0) {
if (!krb5_principal_compare_any_realm(kdc_context,
tgs_server,
ticket->server)) {
- krb5_set_error_message(kdc_context, KRB5KDC_ERR_SERVER_NOMATCH,
- _("ap-request armor for something other "
- "than the local TGS"));
+ k5_setmsg(kdc_context, KRB5KDC_ERR_SERVER_NOMATCH,
+ _("ap-request armor for something other than the local "
+ "TGS"));
retval = KRB5KDC_ERR_SERVER_NOMATCH;
}
}
if (retval == 0) {
retval = krb5_auth_con_getrecvsubkey(kdc_context, authcontext, &subkey);
if (retval != 0 || subkey == NULL) {
- krb5_set_error_message(kdc_context, KRB5KDC_ERR_POLICY,
- _("ap-request armor without subkey"));
+ k5_setmsg(kdc_context, KRB5KDC_ERR_POLICY,
+ _("ap-request armor without subkey"));
retval = KRB5KDC_ERR_POLICY;
}
}
@@ -159,17 +158,16 @@ kdc_find_fast(krb5_kdc_req **requestptr,
case KRB5_FAST_ARMOR_AP_REQUEST:
if (tgs_subkey) {
retval = KRB5KDC_ERR_PREAUTH_FAILED;
- krb5_set_error_message(kdc_context, retval,
- _("Ap-request armor not permitted "
- "with TGS"));
+ k5_setmsg(kdc_context, retval,
+ _("Ap-request armor not permitted with TGS"));
break;
}
retval = armor_ap_request(state, fast_armored_req->armor);
break;
default:
- krb5_set_error_message(kdc_context, KRB5KDC_ERR_PREAUTH_FAILED,
- _("Unknown FAST armor type %d"),
- fast_armored_req->armor->armor_type);
+ k5_setmsg(kdc_context, KRB5KDC_ERR_PREAUTH_FAILED,
+ _("Unknown FAST armor type %d"),
+ fast_armored_req->armor->armor_type);
retval = KRB5KDC_ERR_PREAUTH_FAILED;
}
}
@@ -181,9 +179,8 @@ kdc_find_fast(krb5_kdc_req **requestptr,
&state->armor_key);
else {
retval = KRB5KDC_ERR_PREAUTH_FAILED;
- krb5_set_error_message(kdc_context, retval,
- _("No armor key but FAST armored "
- "request present"));
+ k5_setmsg(kdc_context, retval,
+ _("No armor key but FAST armored request present"));
}
}
if (retval == 0) {
@@ -218,15 +215,14 @@ kdc_find_fast(krb5_kdc_req **requestptr,
&cksum_valid);
if (retval == 0 && !cksum_valid) {
retval = KRB5KRB_AP_ERR_MODIFIED;
- krb5_set_error_message(kdc_context, retval,
- _("FAST req_checksum invalid; request "
- "modified"));
+ k5_setmsg(kdc_context, retval,
+ _("FAST req_checksum invalid; request modified"));
}
if (retval == 0) {
if (!krb5_c_is_keyed_cksum(cksum->checksum_type)) {
retval = KRB5KDC_ERR_POLICY;
- krb5_set_error_message(kdc_context, retval,
- _("Unkeyed checksum used in fast_req"));
+ k5_setmsg(kdc_context, retval,
+ _("Unkeyed checksum used in fast_req"));
}
}
if (retval == 0) {
diff --git a/src/kdc/kdc_preauth_ec.c b/src/kdc/kdc_preauth_ec.c
index 720fefa43..feef36831 100644
--- a/src/kdc/kdc_preauth_ec.c
+++ b/src/kdc/kdc_preauth_ec.c
@@ -71,9 +71,8 @@ ec_verify(krb5_context context, krb5_data *req_pkt, krb5_kdc_req *request,
if (armor_key == NULL) {
retval = ENOENT;
- krb5_set_error_message(context, ENOENT,
- _("Encrypted Challenge used outside of FAST "
- "tunnel"));
+ k5_setmsg(context, ENOENT,
+ _("Encrypted Challenge used outside of FAST tunnel"));
}
scratch.data = (char *) data->contents;
scratch.length = data->length;
@@ -107,9 +106,8 @@ ec_verify(krb5_context context, krb5_data *req_pkt, krb5_kdc_req *request,
}
if (client_keys[i].enctype == 0) {
retval = KRB5KDC_ERR_PREAUTH_FAILED;
- krb5_set_error_message(context, retval,
- _("Incorrect password in encrypted "
- "challenge"));
+ k5_setmsg(context, retval,
+ _("Incorrect password in encrypted challenge"));
}
}
if (retval == 0)
diff --git a/src/kdc/kdc_util.c b/src/kdc/kdc_util.c
index 93a51d50a..98e19375a 100644
--- a/src/kdc/kdc_util.c
+++ b/src/kdc/kdc_util.c
@@ -286,8 +286,8 @@ kdc_process_tgs_req(kdc_realm_t *kdc_active_realm,
if (retval != 0)
goto cleanup_authenticator;
if (authdata&& authdata[0]) {
- krb5_set_error_message(kdc_context, KRB5KDC_ERR_POLICY,
- "ticket valid only as FAST armor");
+ k5_setmsg(kdc_context, KRB5KDC_ERR_POLICY,
+ "ticket valid only as FAST armor");
retval = KRB5KDC_ERR_POLICY;
krb5_free_authdata(kdc_context, authdata);
goto cleanup_authenticator;