0
};
+/* krb5_kvno may be narrow */
+#include <krb5/widen.h>
void add_key PROTOTYPE((char * const *, krb5_const_principal,
const krb5_keyblock *, krb5_kvno));
void enter_rnd_key PROTOTYPE((char **, const krb5_principal, krb5_kvno));
void enter_pwd_key PROTOTYPE((char **, krb5_const_principal,
krb5_const_principal, krb5_kvno));
-
int set_dbname_help PROTOTYPE((char *, char *));
+#include <krb5/narrow.h>
+
static void
usage(who, status)
char *who;
struct type_KRB5_EncTicketPart *krb5_enc_tkt_part2KRB5_EncTicketPart
PROTOTYPE((const krb5_enc_tkt_part *, int *));
-/* kkdcr2kdcr.c */
-struct type_KRB5_TGS__REP *krb5_kdc_rep2KRB5_KDC__REP
- PROTOTYPE((const krb5_kdc_rep *,
- const krb5_msgtype,
- int *));
-
/* kkey2enck.c */
struct type_KRB5_EncryptionKey *krb5_keyblock2KRB5_EncryptionKey
PROTOTYPE((const krb5_keyblock *, int *));
krb5_flags KRB5_TicketFlags2krb5_flags
PROTOTYPE((const struct type_KRB5_TicketFlags *,int *));
+#include <krb5/widen.h>
+
+/* Only put things which don't have pointers to the narrow types in this
+ section */
+
+/* kkdcr2kdcr.c */
+struct type_KRB5_TGS__REP *krb5_kdc_rep2KRB5_KDC__REP
+ PROTOTYPE((const krb5_kdc_rep *,
+ const krb5_msgtype,
+ int *));
+
+#include <krb5/narrow.h>
+
#endif /* KRB5_ASN1DEFS__ */
#endif /*BITS32*/
+/* widen prototypes, if needed */
+#include <krb5/widen.h>
+
/* cbc_cksum.c */
extern krb5_error_code mit_des_cbc_checksum
PROTOTYPE((krb5_pointer, size_t,krb5_pointer,size_t, krb5_checksum * ));
extern void test_set PROTOTYPE((FILE *, const char *, int, const char *, int));
#endif
-#undef P
+/* and back to normal... */
+#include <krb5/narrow.h>
+
#endif /*DES_INTERNAL_DEFS*/
}
krb5_boolean
-krb5_dbm_db_set_lockmode(mode)
- krb5_boolean mode;
+krb5_dbm_db_set_lockmode(DECLARG(krb5_boolean,mode))
+OLDDECLARG(krb5_boolean,mode)
{
krb5_boolean old = non_blocking;
non_blocking = mode;
extern struct _krb5_kt_ops krb5_ktf_ops;
extern struct _krb5_kt_ops krb5_ktf_writable_ops;
+
+/* widen prototypes, if needed */
+#include <krb5/widen.h>
+
krb5_error_code krb5_ktfile_resolve PROTOTYPE((char *,
krb5_keytab *));
krb5_error_code krb5_ktfile_wresolve PROTOTYPE((char *,
krb5_keytab_entry **));
krb5_error_code krb5_ktfileint_write_entry PROTOTYPE((krb5_keytab,
krb5_keytab_entry *));
+/* and back to normal... */
+#include <krb5/narrow.h>
#endif /* KRB5_KTFILE__ */
returns system errors, encryption errors, replay errors
*/
+/* widen prototypes, if needed */
+#include <krb5/widen.h>
+typedef krb5_error_code (*rdreq_key_proc) PROTOTYPE((krb5_pointer,
+ krb5_principal,
+ krb5_kvno,
+ krb5_keyblock **));
+/* and back to normal... */
+#include <krb5/narrow.h>
+
krb5_error_code
krb5_rd_req(inbuf, server, sender_addr, fetchfrom, keyproc, keyprocarg,
rcache, authdat)
krb5_const_principal server;
const krb5_address *sender_addr;
krb5_const_pointer fetchfrom;
-krb5_error_code (*keyproc) PROTOTYPE((krb5_pointer,
- krb5_principal,
- krb5_kvno,
- krb5_keyblock **));
+rdreq_key_proc keyproc;
krb5_pointer keyprocarg;
krb5_rcache rcache;
krb5_tkt_authent *authdat;
returns system errors, encryption errors, replay errors
*/
+/* widen prototypes, if needed */
+#include <krb5/widen.h>
+
static krb5_error_code decrypt_authenticator PROTOTYPE((const krb5_ap_req *,
krb5_authenticator **));
+typedef krb5_error_code (*rdreq_key_proc) PROTOTYPE((krb5_pointer,
+ krb5_principal,
+ krb5_kvno,
+ krb5_keyblock **));
+/* and back to normal... */
+#include <krb5/narrow.h>
+
extern krb5_deltat krb5_clockskew;
#define in_clock_skew(date) (abs((date)-currenttime) < krb5_clockskew)
krb5_const_principal server;
const krb5_address *sender_addr;
krb5_const_pointer fetchfrom;
-krb5_error_code (*keyproc) PROTOTYPE((krb5_pointer,
- krb5_principal,
- krb5_kvno,
- krb5_keyblock **));
+rdreq_key_proc keyproc;
krb5_pointer keyprocarg;
krb5_rcache rcache;
krb5_tkt_authent *tktauthent;