const char **status,
krb5_data *e_data);
-krb5_error_code krb5_db_audit_as_req(krb5_context kcontext,
- krb5_kdc_req *request,
- krb5_db_entry *client,
- krb5_db_entry *server,
- krb5_timestamp authtime,
- krb5_error_code error_code);
+void krb5_db_audit_as_req(krb5_context kcontext, krb5_kdc_req *request,
+ krb5_db_entry *client, krb5_db_entry *server,
+ krb5_timestamp authtime, krb5_error_code error_code);
krb5_error_code krb5_db_invoke ( krb5_context kcontext,
unsigned int method,
/*
* Optional: This method informs the module of a successful or unsuccessful
- * AS request. The resulting error code is currently ignored by the KDC.
+ * AS request.
*/
- krb5_error_code (*audit_as_req)(krb5_context kcontext,
- krb5_kdc_req *request,
- krb5_db_entry *client,
- krb5_db_entry *server,
- krb5_timestamp authtime,
- krb5_error_code error_code);
+ void (*audit_as_req)(krb5_context kcontext, krb5_kdc_req *request,
+ krb5_db_entry *client, krb5_db_entry *server,
+ krb5_timestamp authtime, krb5_error_code error_code);
/* Note: there is currently no method for auditing TGS requests. */
ktypestr, fromstring, status,
cname2, sname2, emsg ? ", " : "", emsg ? emsg : "");
}
- (void) krb5_db_audit_as_req(kdc_context, request, client, server,
- authtime, errcode);
+ krb5_db_audit_as_req(kdc_context, request, client, server, authtime,
+ errcode);
#if 0
/* Sun (OpenSolaris) version would probably something like this.
The client and server names passed can be null, unlike in the
e_data);
}
-krb5_error_code
+void
krb5_db_audit_as_req(krb5_context kcontext, krb5_kdc_req *request,
krb5_db_entry *client, krb5_db_entry *server,
krb5_timestamp authtime, krb5_error_code error_code)
kdb_vftabl *v;
status = get_vftabl(kcontext, &v);
- if (status)
- return status;
- if (v->audit_as_req == NULL)
- return KRB5_PLUGIN_OP_NOTSUPP;
- return v->audit_as_req(kcontext, request, client, server, authtime,
- error_code);
+ if (status || v->audit_as_req == NULL)
+ return;
+ v->audit_as_req(kcontext, request, client, server, authtime, error_code);
}
krb5_error_code
krb5_data *e_data),
(kcontext, request, client, server, kdc_time, status, e_data));
-WRAP_K (krb5_db2_audit_as_req,
- (krb5_context kcontext, krb5_kdc_req *request, krb5_db_entry *client,
- krb5_db_entry *server, krb5_timestamp authtime,
- krb5_error_code error_code),
- (kcontext, request, client, server, authtime, error_code));
+WRAP_VOID (krb5_db2_audit_as_req,
+ (krb5_context kcontext, krb5_kdc_req *request,
+ krb5_db_entry *client, krb5_db_entry *server,
+ krb5_timestamp authtime, krb5_error_code error_code),
+ (kcontext, request, client, server, authtime, error_code));
WRAP_K (krb5_db2_invoke,
(krb5_context kcontext,
return retval;
}
-krb5_error_code
+void
krb5_db2_audit_as_req(krb5_context kcontext, krb5_kdc_req *request,
krb5_db_entry *client, krb5_db_entry *server,
krb5_timestamp authtime, krb5_error_code error_code)
{
- return krb5_db2_lockout_audit(kcontext, client, authtime, error_code);
+ (void) krb5_db2_lockout_audit(kcontext, client, authtime, error_code);
}
krb5_timestamp kdc_time, const char **status,
krb5_data *e_data);
-krb5_error_code
+void
krb5_db2_audit_as_req(krb5_context kcontext, krb5_kdc_req *request,
krb5_db_entry *client, krb5_db_entry *server,
krb5_timestamp authtime, krb5_error_code error_code);
return retval;
}
-krb5_error_code
+void
krb5_ldap_audit_as_req(krb5_context kcontext, krb5_kdc_req *request,
krb5_db_entry *client, krb5_db_entry *server,
krb5_timestamp authtime, krb5_error_code error_code)
{
- return krb5_ldap_lockout_audit(kcontext, client, authtime, error_code);
+ (void) krb5_ldap_lockout_audit(kcontext, client, authtime, error_code);
}
krb5_timestamp kdc_time, const char **status,
krb5_data *e_data);
-krb5_error_code
+void
krb5_ldap_audit_as_req(krb5_context kcontext, krb5_kdc_req *request,
krb5_db_entry *client, krb5_db_entry *server,
krb5_timestamp authtime, krb5_error_code error_code);