#include <kdb5.h>
#include <kadm5/admin.h>
+#if defined(NEED_ISBLANK_PROTO) && !defined(isblank)
+extern int isblank();
+#endif
+
krb5_error_code
krb5_ldap_get_db_opt(char *input, char **opt, char **val)
{
int
has_sasl_external_mech(krb5_context, char *);
+krb5_error_code
+krb5_ldap_free_server_context_params(krb5_ldap_context *ldap_context);
+
+
/* DAL functions */
server_info = ldap_context->server_info_list[cnt];
if (server_info->server_status == NOTSET) {
- int conns=0;
+ unsigned int conns=0;
/*
* Check if the server has to perform certificate-based authentication
krb5_const_principal princ,
krb5_db_entry *entry);
+int kldap_ensure_initialized (void);
+
#endif
}
krb5int_access accessor;
-extern int kldap_ensure_initialized (void);
static krb5_error_code
asn1_encode_sequence_of_keys (krb5_key_data *key_data, krb5_int16 n_key_data,
return(st);
}
-krb5_error_code
+static krb5_error_code
populate_policy(krb5_context context,
LDAP *ld,
LDAPMessage *ent,
return st;
}
-krb5_error_code
+static krb5_error_code
krb5_ldap_get_password_policy_from_dn (krb5_context context,
char *pol_name,
char *pol_dn,
goto cleanup;
}
- *realms = calloc(count+1, sizeof (char *));
+ *realms = calloc((unsigned int) count+1, sizeof (char *));
CHECK_NULL(*realms);
for (ent = ldap_first_entry(ld, result), count = 0; ent != NULL;
if ((st=krb5_get_subtree_info(&lcontext, &subtrees, &ntree)) != 0)
goto cleanup;
- result_arr = (LDAPMessage **) calloc(ntree+1, sizeof(LDAPMessage *));
+ result_arr = (LDAPMessage **) calloc((unsigned int)ntree+1,
+ sizeof(LDAPMessage *));
if (result_arr == NULL) {
st = ENOMEM;
goto cleanup;