+2003-02-10 Tom Yu <tlyu@mit.edu>
+
+ * Makefile.in (lib/krb4/krb_err_txt.c): Replace $(S) with "/" to
+ avoid breakage on Windows.
+
2003-02-07 Tom Yu <tlyu@mit.edu>
* Makefile.in: Add rules for generating lib/krb4/krb_err_txt.c for
$(GK)gssapi_err_krb5.c: $(AC) $(GK)gssapi_err_krb5.et
$(AWK) -f $(AC) outfile=$@ $(GK)gssapi_err_krb5.et
-lib$(S)krb4$(S)krb_err_txt.c: lib$(S)krb4$(S)krb_err.et
- $(AWK) -f lib$(S)krb4$(S)et_errtxt.awk outfile=$@ \
- lib$(S)krb4$(S)krb_err.et
+lib/krb4/krb_err_txt.c: lib/krb4/krb_err.et
+ $(AWK) -f lib/krb4/et_errtxt.awk outfile=$@ \
+ lib/krb4/krb_err.et
KRBHDEP = $(INC)krb5.hin $(INC)krb5_err.h $(INC)kdb5_err.h \
$(INC)kv5m_err.h $(INC)asn1_err.h
+2003-02-10 Tom Yu <tlyu@mit.edu>
+
+ * Makefile.in (K4LIBS): Add des425.lib.
+
2003-01-17 Ken Raeburn <raeburn@mit.edu>
* krb5_32.def: Export krb5_rc_close, krb5_free_enc_tkt_part, and
$(BUILDTOP)\util\profile\$(OUTPRE)profile.lib \
des425\$(OUTPRE)des425.lib
GLIBS = gssapi\$(OUTPRE)gssapi.lib
-K4LIBS = krb4\$(OUTPRE)krb4.lib
+K4LIBS = krb4\$(OUTPRE)krb4.lib des425\$(OUTPRE)des425.lib
CDEF = comerr32.def
PDEF = xpprof32.def
2003-02-10 Tom Yu <tlyu@mit.edu>
+ * password_to_key.c (mit_passwd_to_key, krb5_passwd_to_key)
+ (afs_passwd_to_key): Fix to have KRB5_CALLCONV.
+
+ * krb4int.h (mit_passwd_to_key, krb5_passwd_to_key):
+ (afs_passwd_to_key): Fix prototypes to have KRB5_CALLCONV.
+
* CCache-glue.c (krb4int_save_credentials_addr): Renamed from
krb_save_credentials().
(krb_save_credentials): Implement in terms of
/* password_to_key.c */
key_proc_type *krb_get_keyprocs (key_proc_type keyproc);
-int mit_passwd_to_key(char *user, char *instance, char *realm,
- char *passwd, C_Block key);
-int krb5_passwd_to_key(char *user, char *instance, char *realm,
- char *passwd, C_Block key);
-int afs_passwd_to_key(char *user, char *instance, char *realm,
- char *passwd, C_Block key);
+int KRB5_CALLCONV mit_passwd_to_key(char *user, char *instance, char *realm,
+ char *passwd, C_Block key);
+int KRB5_CALLCONV krb5_passwd_to_key(char *user, char *instance, char *realm,
+ char *passwd, C_Block key);
+int KRB5_CALLCONV afs_passwd_to_key(char *user, char *instance, char *realm,
+ char *passwd, C_Block key);
/* rd_preauth.c */
#ifdef KRB_DB_DEFS
}
}
-int mit_passwd_to_key(char *user, char *instance, char *realm,
- char *passwd, C_Block key)
+int KRB5_CALLCONV
+mit_passwd_to_key(
+ char *user,
+ char *instance,
+ char *realm,
+ char *passwd,
+ C_Block key)
{
#pragma unused(user)
#pragma unused(instance)
}
/* So we can use a v4 kinit against a v5 kdc with no krb4 salted key */
-int krb5_passwd_to_key(char *user, char *instance, char *realm,
- char *passwd, C_Block key)
+int KRB5_CALLCONV
+krb5_passwd_to_key(
+ char *user,
+ char *instance,
+ char *realm,
+ char *passwd,
+ C_Block key)
{
if (user && instance && realm && passwd) {
unsigned int len = MAX_K_NAME_SZ + strlen(passwd) + 1;
return -1;
}
-int afs_passwd_to_key(char *user, char *instance, char *realm,
- char *passwd, C_Block key)
+int KRB5_CALLCONV
+afs_passwd_to_key(
+ char *user,
+ char *instance,
+ char *realm,
+ char *passwd,
+ C_Block key)
{
#pragma unused(user)
#pragma unused(instance)