svn commit: samba r11350 - in branches/SAMBA_4_0/source/auth/kerberos: .

abartlet at samba.org abartlet at samba.org
Fri Oct 28 02:29:33 GMT 2005


Author: abartlet
Date: 2005-10-28 02:29:32 +0000 (Fri, 28 Oct 2005)
New Revision: 11350

WebSVN: http://websvn.samba.org/cgi-bin/viewcvs.cgi?view=rev&root=samba&rev=11350

Log:
Add some debugs to assist tracking down kerberos issues in future.
(Make it easy to see what was put into the keytab, so we can tell when
gssapi screams that it can't pull it out).

Andrew Bartlett

Modified:
   branches/SAMBA_4_0/source/auth/kerberos/kerberos_util.c


Changeset:
Modified: branches/SAMBA_4_0/source/auth/kerberos/kerberos_util.c
===================================================================
--- branches/SAMBA_4_0/source/auth/kerberos/kerberos_util.c	2005-10-28 02:13:14 UTC (rev 11349)
+++ branches/SAMBA_4_0/source/auth/kerberos/kerberos_util.c	2005-10-28 02:29:32 UTC (rev 11350)
@@ -232,6 +232,7 @@
 	krb5_principal salt_princ;
 	krb5_principal princ;
 	krb5_keytab keytab;
+	char *enctype_string = NULL;
 
 	TALLOC_CTX *mem_ctx = talloc_new(parent_ctx);
 	if (!mem_ctx) {
@@ -257,7 +258,7 @@
 					      smb_krb5_context, 
 					      &salt_princ);
 	if (ret) {
-		DEBUG(1,("create_memory_keytab: maksing salt principal failed (%s)\n",
+		DEBUG(1,("create_memory_keytab: makeing salt principal failed (%s)\n",
 			 smb_get_krb5_error_message(smb_krb5_context->krb5_context, 
 						    ret, mem_ctx)));
 		talloc_free(mem_ctx);
@@ -266,7 +267,7 @@
 
 	ret = principal_from_credentials(mem_ctx, machine_account, smb_krb5_context, &princ);
 	if (ret) {
-		DEBUG(1,("create_memory_keytab: maksing krb5 principal failed (%s)\n",
+		DEBUG(1,("create_memory_keytab: makeing krb5 principal failed (%s)\n",
 			 smb_get_krb5_error_message(smb_krb5_context->krb5_context, 
 						    ret, mem_ctx)));
 		talloc_free(mem_ctx);
@@ -311,6 +312,13 @@
 			return ret;
 		}
 		
+		krb5_keytype_to_string(smb_krb5_context->krb5_context, ENCTYPE_ARCFOUR_HMAC, &enctype_string);
+		DEBUG(5, ("Added %s(kvno %d) to keytab (%s)\n", 
+			  cli_credentials_get_principal(machine_account, mem_ctx),
+			  cli_credentials_get_kvno(machine_account),
+			  enctype_string));
+		free(enctype_string);		
+
 		krb5_free_keyblock_contents(smb_krb5_context->krb5_context, &entry.keyblock);
 
 		talloc_steal(parent_ctx, *keytab_container);
@@ -354,6 +362,14 @@
 			krb5_free_keyblock_contents(smb_krb5_context->krb5_context, &entry.keyblock);
 			return ret;
 		}
+
+		enctype_string = NULL;
+		krb5_keytype_to_string(smb_krb5_context->krb5_context, enctypes[i], &enctype_string);
+		DEBUG(5, ("Added %s(kvno %d) to keytab (%s)\n", 
+			  cli_credentials_get_principal(machine_account, mem_ctx),
+			  cli_credentials_get_kvno(machine_account),
+			  enctype_string));
+		free(enctype_string);		
 		
 		krb5_free_keyblock_contents(smb_krb5_context->krb5_context, &entry.keyblock);
 	}
@@ -385,6 +401,14 @@
 				return ret;
 			}
 			
+			enctype_string = NULL;
+			krb5_keytype_to_string(smb_krb5_context->krb5_context, enctypes[i], &enctype_string);
+			DEBUG(5, ("Added %s(kvno %d) to keytab (%s)\n", 
+				  cli_credentials_get_principal(machine_account, mem_ctx),
+				  cli_credentials_get_kvno(machine_account),
+			  enctype_string));
+			free(enctype_string);		
+
 			krb5_free_keyblock_contents(smb_krb5_context->krb5_context, &entry.keyblock);
 		}
 	}



More information about the samba-cvs mailing list