kerberos_v4.c: Add prototypes for compat_decrypt_key,
authorEzra Peisach <epeisach@mit.edu>
Mon, 10 Jul 1995 21:54:29 +0000 (21:54 +0000)
committerEzra Peisach <epeisach@mit.edu>
Mon, 10 Jul 1995 21:54:29 +0000 (21:54 +0000)
kerb_get_principal, check_princ, v4_klog

network.c (process_packet): Make prog a const char *

main.c: Add prototypes for find_realm_data, setup_server_realm, usage,
request_exit, setup_signal_handlers, initialize_realms, finish_realms.

kdc_util.h: Add prototypes for against_local_policy_as,
against_local_policy_tgs, validate_as_request, validate_tgs_request,
fetch_asn1_field, kdc_initialize_rcache, process_packet.

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@6274 dc483132-0cff-0310-8789-dd5450dbe970

src/kdc/ChangeLog
src/kdc/kdc_util.h
src/kdc/kerberos_v4.c
src/kdc/main.c
src/kdc/network.c

index 76edd429457b1a8cbbd09cc50ccd0b95a3c782c0..3fc59555750662839b3cd1214953dcd08da2972e 100644 (file)
@@ -1,3 +1,19 @@
+Mon Jul 10 17:01:15 1995  Ezra Peisach  <epeisach@kangaroo.mit.edu>
+
+       * kerberos_v4.c: Add prototypes for compat_decrypt_key,
+               kerb_get_principal, check_princ, v4_klog
+
+       * network.c (process_packet): Make prog a const char *. 
+
+       * main.c: Add prototypes for find_realm_data, setup_server_realm,
+               usage, request_exit, setup_signal_handlers, initialize_realms,
+                       finish_realms. 
+
+       * kdc_util.h: Add prototypes for against_local_policy_as,
+               against_local_policy_tgs, validate_as_request,
+               validate_tgs_request, fetch_asn1_field,
+               kdc_initialize_rcache, process_packet.
+
 Sat Jul  8 17:40:10 1995  Theodore Y. Ts'o  (tytso@dcl)
 
        * kerberos_v4.c (v4_klog): Also log L_KRB_PERR error messages, so
index 05886cd32b6c278c936412de1e0ceb68bfdcdf42..605380f4ca29a082489c1a1ff93c81544f686cff 100644 (file)
@@ -61,6 +61,18 @@ krb5_error_code kdc_process_tgs_req
 krb5_error_code kdc_get_server_key PROTOTYPE((krb5_ticket *,
                                              krb5_keyblock **,
                                              krb5_kvno *));
+
+int validate_as_request PROTOTYPE((krb5_kdc_req *, krb5_db_entry, 
+                                         krb5_db_entry, krb5_timestamp,
+                                         char **));
+
+int validate_tgs_request PROTOTYPE((krb5_kdc_req *, krb5_db_entry, 
+                                         krb5_ticket *, krb5_timestamp,
+                                         char **));
+
+int fetch_asn1_field PROTOTYPE((unsigned char *, unsigned int, unsigned int,
+                                krb5_data *));
+
 /* do_as_req.c */
 krb5_error_code process_as_req PROTOTYPE((krb5_kdc_req *,
                                          const krb5_fulladdr *,
@@ -78,10 +90,22 @@ krb5_error_code dispatch PROTOTYPE((krb5_data *,
                                    int,
                                    krb5_data **));
 
+/* main.c */
+krb5_error_code kdc_initialize_rcache PROTOTYPE((krb5_context, char *));
+
 /* network.c */
 krb5_error_code listen_and_process PROTOTYPE((const char *));
 krb5_error_code setup_network PROTOTYPE((const char *));
 krb5_error_code closedown_network PROTOTYPE((const char *));
+void process_packet PROTOTYPE((int, const char *, int));
+
+/* policy.c */
+int against_local_policy_as PROTOTYPE((krb5_kdc_req *, krb5_db_entry,
+                                       krb5_db_entry, krb5_timestamp,
+                                       char **));
+
+int against_local_policy_tgs PROTOTYPE((krb5_kdc_req *, krb5_db_entry,
+                                       krb5_ticket *, char **));
 
 
 /* replay.c */
index cec949ec908cb1fb9e61bbca0d7b6ebdbb667756..6cf0e2c822134e6bbf2b7b9c4156f8092d2c257f 100644 (file)
 
 extern int errno;
 
+int compat_decrypt_key PROTOTYPE((krb5_encrypted_keyblock *, C_Block));
+int kerb_get_principal PROTOTYPE((char *, char *, Principal *, unsigned int,
+                                 int *));
+int check_princ PROTOTYPE((char *, char *, unsigned, Principal *));
+
+#ifdef HAVE_STDARG_H
+char * v4_klog PROTOTYPE((int, const char *, ...));
+#else
+char * v4_klog PROTOTYPE((int, char *, va_dcl));
+#endif
+
 /* take this out when we don't need it anymore */
 int krbONE = 1;
 
@@ -140,7 +151,8 @@ static void hang();
 static krb5_error_code retval; 
 static krb5_data *response;
 
-void kerberos_v4(), kerb_err_reply();
+void kerberos_v4 PROTOTYPE((struct sockaddr_in *, KTEXT));
+void kerb_err_reply PROTOTYPE((struct sockaddr_in *, KTEXT, long, char *));
  
 krb5_error_code
 process_v4( pkt, client_fulladdr, is_secondary, resp)
index 917b6ff31848f6b0b7ae95899034ba0bfc018f9b..676d73852543ae6bc0521ebb02f9c77d65694e29 100644 (file)
 #include "kdc5_err.h"
 #include "adm_proto.h"
 
+kdc_realm_t *find_realm_data PROTOTYPE((char *, krb5_ui_4));
+
+krb5_error_code setup_server_realm PROTOTYPE((krb5_principal));
+
+void usage PROTOTYPE((char *));
+
+krb5_sigtype request_exit PROTOTYPE((int));
+
+void setup_signal_handlers PROTOTYPE((void));
+
+void initialize_realms PROTOTYPE((krb5_context, krb5_pointer, int, char **));
+
+void finish_realms PROTOTYPE((char *));
+
 static int nofork = 0;
 static char *kdc_current_rcname = (char *) NULL;
 static int rkey_init_done = 0;
index 848a6b92b7328cf04779b8996a6e4e26906abad0..b7eb556e6ed5d2101eba3828d57f5e699c8ff470 100644 (file)
@@ -137,7 +137,7 @@ const char *prog;
 
 void process_packet(port_fd, prog, is_secondary)
     int        port_fd;
-    char       *prog;
+    const char *prog;
     int                is_secondary;
 {
     int cc, saddr_len;