More missing contexts
authorEzra Peisach <epeisach@mit.edu>
Tue, 9 May 1995 21:41:21 +0000 (21:41 +0000)
committerEzra Peisach <epeisach@mit.edu>
Tue, 9 May 1995 21:41:21 +0000 (21:41 +0000)
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@5788 dc483132-0cff-0310-8789-dd5450dbe970

src/clients/ksu/ChangeLog
src/clients/ksu/ccache.c
src/clients/ksu/krb_auth_su.c

index 9559c6dc8a8f1d70d84e13910e37b61f8f3d4476..be24cb81ed79c9c2294e6f13e615eda3abd2ec0c 100644 (file)
@@ -1,5 +1,11 @@
 Tue May  9 15:52:15 1995  Ezra Peisach  <epeisach@kangaroo.mit.edu>
 
+       * krb_auth_su.c (krb5_auth_check): Add missing context
+               (wolfgang@wsrcc.com) 
+
+       * ccache.c (krb5_get_nonexp_tkts): Add missing context
+               (wolfgang@wsrcc.com) 
+
        * heuristic.c (get_best_princ_for_target): Missing context cuased
                coredump. 
                (get_best_princ_for_target): Missing contexts in call to
index 20bcbb2417b0f73fdd6bd3d7f911a517e0bd27a8..f3dd5e4838ae8e12fe66e23b206453b3acf36267 100644 (file)
@@ -236,7 +236,7 @@ int chunk_count = 1;
                if (auth_debug){ 
                        fprintf(stderr,"krb5_ccache_copy: CREDS EXPIRED:\n");  
                        fputs("  Valid starting         Expires         Service principal\n",stdout);
-                       show_credential(&creds, cc); 
+                       show_credential(context, &creds, cc); 
                        fprintf(stderr,"\n");  
                }
        }
index cc413bec8438d840bd932c9cdbd5570199c65acf..1b924a965ff0796af44ccd9e35019421dc3fccd4 100644 (file)
@@ -82,7 +82,7 @@ krb5_boolean zero_password;
        }
 
        if (auth_debug)
-       { dump_principal("krb5_auth_check: Client principal name", client); }   
+       { dump_principal(context, "krb5_auth_check: Client principal name", client); }  
 
        if ( retval = krb5_sname_to_principal(context, hostname, NULL,
                                              KRB5_NT_SRV_HST, &server)){
@@ -93,7 +93,7 @@ krb5_boolean zero_password;
        }
 
        if (auth_debug)
-       { dump_principal("krb5_auth_check: Server principal name", server); } 
+       { dump_principal(context, "krb5_auth_check: Server principal name", server); } 
 
 
 
@@ -123,7 +123,7 @@ krb5_boolean zero_password;
                return (FALSE) ;        
        }       
 
-       if (auth_debug){ dump_principal("local tgt principal name", tgtq.server ); }    
+       if (auth_debug){ dump_principal(context, "local tgt principal name", tgtq.server ); }   
        retval = krb5_cc_retrieve_cred(context, cc, KRB5_TC_MATCH_SRV_NAMEONLY,
                                        &tgtq, &tgt); 
 
@@ -181,7 +181,7 @@ krb5_boolean zero_password;
 
        if (auth_debug){ 
                fprintf(stderr,"krb5_auth_check: got ticket for end server \n"); 
-               dump_principal("out_creds->server", out_creds->server ); 
+               dump_principal(context, "out_creds->server", out_creds->server ); 
        }       
 
 
@@ -293,8 +293,8 @@ krb5_keyblock *     tkt_ses_key;
 
        if (auth_debug){ 
            fprintf(stderr,"krb5_verify_tkt_def: verified target server\n");
-           dump_principal("server", server); 
-           dump_principal("tkt->server", tkt->server); 
+           dump_principal(context, "server", server); 
+           dump_principal(context, "tkt->server", tkt->server); 
        }       
 
        /* get the default keytab */
@@ -340,8 +340,8 @@ krb5_keyblock *     tkt_ses_key;
        if (auth_debug){ 
                fprintf(stderr,
                       "krb5_verify_tkt_def: verified client's identity\n");
-               dump_principal("client", client);
-               dump_principal("tkt->enc_part2->client",tkt->enc_part2->client);
+               dump_principal(context, "client", client);
+               dump_principal(context, "tkt->enc_part2->client",tkt->enc_part2->client);
        }       
 
        tkt_ses_key = tkt->enc_part2->session;