char *principal;
char *OIDs[ASN1_MAX_OIDS];
int i;
-#ifdef HAVE_KRB5
BOOL got_kerberos_mechanism = False;
-#endif
DATA_BLOB blob;
DEBUG(3,("Doing spnego session setup (blob length=%lu)\n", (unsigned long)cli->secblob.length));
/* make sure the server understands kerberos */
for (i=0;OIDs[i];i++) {
DEBUG(3,("got OID=%s\n", OIDs[i]));
-#ifdef HAVE_KRB5
if (strcmp(OIDs[i], OID_KERBEROS5_OLD) == 0 ||
strcmp(OIDs[i], OID_KERBEROS5) == 0) {
got_kerberos_mechanism = True;
}
-#endif
free(OIDs[i]);
}
DEBUG(3,("got principal=%s\n", principal ? principal : "<null>"));
-#ifdef HAVE_KRB5
if (got_kerberos_mechanism && (principal == NULL)) {
/*
* It is WRONG to depend on the principal sent in the negprot
* segfault later) disable Kerberos when no principal was
* sent. -- VL
*/
- DEBUG(1, ("Kerberos mech was offered, but no principal was sent\n"));
- DEBUGADD(1, ("Disabling Kerberos\n"));
+ DEBUG(1, ("Kerberos mech was offered, but no principal was "
+ "sent, disabling Kerberos\n"));
cli->use_kerberos = False;
}
-#endif
fstrcpy(cli->user_name, user);