The norealm_salt macro, which is defined in
src/kdc/kdc_util.h, src/admin/edit/kdb5_edit.c, and
Fixed krb5-bugs [0437]:
The norealm_salt macro, which is defined in
src/kdc/kdc_util.h, src/admin/edit/kdb5_edit.c, and
src/kadmin/server/adm_funcs.c, is wrong and needs to be fixed. It
will cause a coredump if it's ever actually invoked.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@3451
dc483132-0cff-0310-8789-
dd5450dbe970
#include "./kdb5_edit.h"
-#define norealm_salt(princ, retdata) krb5_principal2salt(&(princ)[1], retdata)
-
struct mblock mblock = { /* XXX */
KRB5_KDB_MAX_LIFE,
KRB5_KDB_MAX_RLIFE,
salt.saltdata.length = 0;
break;
case KRB5_KDB_SALTTYPE_NOREALM:
- if (retval = norealm_salt(string_princ, &salt.saltdata)) {
+ if (retval = krb5_principal2salt_norealm(string_princ,
+ &salt.saltdata)) {
com_err(cmdname, retval,
"while converting principal to salt for '%s'", newprinc);
return;
extern krb5_encrypt_block master_encblock;
extern krb5_keyblock master_keyblock;
-#define norealm_salt(princ, retdata) krb5_principal2salt(&(princ)[1], retdata)
-
struct mblock {
krb5_deltat max_life;
krb5_deltat max_rlife;
break;
case KRB5_KDB_SALTTYPE_NOREALM:
- if (retval = norealm_salt(string_princ, &salt.saltdata)) {
+ if (retval = krb5_principal2salt_norealm(string_princ,
+ &salt.saltdata)) {
com_err("adm_enter_pwd_key", retval,
"while converting principal to salt for '%s'", newprinc);
return(KRB_ERR_GENERIC);
padat_tmp[0]->length = 0;
break;
case KRB5_KDB_SALTTYPE_NOREALM:
- if (retval = norealm_salt(request->client, &data_bar)) {
+ if (retval = krb5_principal2salt_norealm(request->client,
+ &data_bar)) {
cleanup();
return retval;
}