}
#else /* KRB5_KRB4_COMPAT */
-#include <stdio.h>
void
load_v4db(argc, argv)
int argc;
krb5_error_code retval;
krb5_kt_list lp;
int show_time = 0, show_keys = 0, show_enctype = 0;
- int i;
- unsigned j;
+ int i, j;
char *pname;
for (i = 1; i < argc; i++) {
krb5_xfree(pname);
}
}
+
+
+
+
+
+
+
+
+
+
gss_OID gss_type;
char *a;
rpcproc_t proc;
- size_t i;
+ int i;
const char *procname;
client.length = 0;
server_info = ldap_context->server_info_list[cnt];
if (server_info->server_status == NOTSET) {
- krb5_ui_4 conns=0;
+ int conns=0;
/*
* Check if the server has to perform certificate-based authentication
{
krb5_error_code st=0;
unsigned int mask=0, omask=0;
- unsigned int tkt_mask=(KDB_MAX_LIFE_ATTR | KDB_MAX_RLIFE_ATTR | KDB_TKT_FLAGS_ATTR);
+ int tkt_mask=(KDB_MAX_LIFE_ATTR | KDB_MAX_RLIFE_ATTR | KDB_TKT_FLAGS_ATTR);
krb5_ldap_policy_params *tktpoldnparam=NULL;
if ((st=krb5_get_attributes_mask(context, entries, &mask)) != 0)
krb5_data in;
krb5_data *ret;
{
- unsigned i=0;
- int err = 0;
+ int i=0, err = 0;
ret->length = 0;
ret->data = NULL;
krb5_data *confmsg;
{
krb5_ui_4 database_size; /* This must be 4 bytes */
- krb5_ui_4 received_size;
- int n;
+ int received_size, n;
char buf[1024];
krb5_data inbuf, outbuf;
krb5_error_code retval;