aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorLuke Howard <lukeh@padl.com>2009-08-18 21:41:09 +0000
committerLuke Howard <lukeh@padl.com>2009-08-18 21:41:09 +0000
commitc4a1f838be55bafb9b72cb500dfc06c692d6433f (patch)
tree33d26caaee10aa1ff291067785d4cc58b35ccf5f
parente252c94f3763bef2b720c1e398f4bd2c905fcbfd (diff)
downloadkrb5-c4a1f838be55bafb9b72cb500dfc06c692d6433f.zip
krb5-c4a1f838be55bafb9b72cb500dfc06c692d6433f.tar.gz
krb5-c4a1f838be55bafb9b72cb500dfc06c692d6433f.tar.bz2
remove tabs
git-svn-id: svn://anonsvn.mit.edu/krb5/users/lhoward/s4u@22546 dc483132-0cff-0310-8789-dd5450dbe970
-rw-r--r--src/kdc/do_tgs_req.c20
1 files changed, 10 insertions, 10 deletions
diff --git a/src/kdc/do_tgs_req.c b/src/kdc/do_tgs_req.c
index ad17a8c..c9d0a2e 100644
--- a/src/kdc/do_tgs_req.c
+++ b/src/kdc/do_tgs_req.c
@@ -446,8 +446,8 @@ tgt_again:
* If S4U2Self principal is not forwardable, then mark ticket as
* unforwardable. This behaviour matches Windows rather than MIT
* (which returns KDC_ERR_BADOPTION in the AS-REQ code path).
- *
- * Consider this block the S4U2Self validate_forwardable().
+ *
+ * Consider this block the S4U2Self validate_forwardable().
*/
if (c_nprincs &&
isflagset(client.attributes, KRB5_KDB_DISALLOW_FORWARDABLE))
@@ -857,13 +857,13 @@ tgt_again:
reply.msg_type = KRB5_TGS_REP;
reply.padata = 0;/* always */
if (isflagset(c_flags, KRB5_KDB_FLAG_PROTOCOL_TRANSITION) &&
- find_pa_data(request->padata, KRB5_PADATA_S4U_X509_USER) != NULL) {
- errcode = kdc_process_s4u2self_rep(kdc_context,
- subkey,
- header_ticket->enc_part2->session,
- s4u_x509_user,
- &reply,
- &reply_encpart);
+ find_pa_data(request->padata, KRB5_PADATA_S4U_X509_USER) != NULL) {
+ errcode = kdc_process_s4u2self_rep(kdc_context,
+ subkey,
+ header_ticket->enc_part2->session,
+ s4u_x509_user,
+ &reply,
+ &reply_encpart);
if (errcode) {
status = "KDC_RETURN_S4U2SELF_PADATA";
goto cleanup;
@@ -984,7 +984,7 @@ cleanup:
if (c_nprincs)
krb5_db_free_principal(kdc_context, &client, c_nprincs);
if (s4u_x509_user != NULL)
- krb5_free_pa_s4u_x509_user(kdc_context, s4u_x509_user);
+ krb5_free_pa_s4u_x509_user(kdc_context, s4u_x509_user);
if (kdc_issued_auth_data != NULL)
krb5_free_authdata(kdc_context, kdc_issued_auth_data);
if (s4u_name != NULL)