dnl Checks for header files.
AC_CHECK_HEADERS([kerberosIV/krb.h])
+dnl Checks for variable declarations.
+AC_CHECK_DECLS([krb_ignore_ip_address], , ,
+[#ifdef HAVE_KERBEROSIV_KRB_H
+# include <kerberosIV/krb.h>
+#else
+# include <krb.h>
+#endif])
+
dnl Checks for functions.
AC_TYPE_SIGNAL
AC_REPLACE_FUNCS([unsetenv])
{
enum kftgt_error status = SUCCESS;
+#ifdef HAVE_DECL_KRB_IGNORE_IP_ADDRESS
+ krb_ignore_ip_address = 1;
+#endif
+
argv = read_options(argc, argv);
while(*argv) {
char *ruser = l_val, *server;
/* read encrypted response */
+ m_data.app_data[0] = '\0';
len = receive_encrypted_chunk(&m_data, buffer, sizeof(buffer), sock,
&cred.session, sched, &saddr, &caddr);
if (strncmp((char *) m_data.app_data,"ok",2)!=0) {
- warn("%s",m_data.app_data);
+ if (m_data.app_data[0] != '\0')
+ warn("%s",m_data.app_data);
+ else
+ warn("error receiving encrypted chunk");
close(sock);
return ERROR_SEND;
}
return ERROR_SEND;
}
+ m_data.app_data[0] = '\0';
len = receive_encrypted_chunk(&m_data,buffer,sizeof(buffer), sock,
&cred.session, sched, &saddr, &caddr);
if (strncmp((char *) m_data.app_data,"ok",2)!=0) {
- warn("%s",m_data.app_data);
+ if (m_data.app_data[0] != '\0')
+ warn("%s",m_data.app_data);
+ else
+ warn("error receiving encrypted chunk");
close(sock);
return ERROR_SEND;
}