kerb_get_principal, check_princ, v4_klog
network.c (process_packet): Make prog a const char *
main.c: Add prototypes for find_realm_data, setup_server_realm, usage,
request_exit, setup_signal_handlers, initialize_realms, finish_realms.
kdc_util.h: Add prototypes for against_local_policy_as,
against_local_policy_tgs, validate_as_request, validate_tgs_request,
fetch_asn1_field, kdc_initialize_rcache, process_packet.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@6274
dc483132-0cff-0310-8789-
dd5450dbe970
+Mon Jul 10 17:01:15 1995 Ezra Peisach <epeisach@kangaroo.mit.edu>
+
+ * kerberos_v4.c: Add prototypes for compat_decrypt_key,
+ kerb_get_principal, check_princ, v4_klog
+
+ * network.c (process_packet): Make prog a const char *.
+
+ * main.c: Add prototypes for find_realm_data, setup_server_realm,
+ usage, request_exit, setup_signal_handlers, initialize_realms,
+ finish_realms.
+
+ * kdc_util.h: Add prototypes for against_local_policy_as,
+ against_local_policy_tgs, validate_as_request,
+ validate_tgs_request, fetch_asn1_field,
+ kdc_initialize_rcache, process_packet.
+
Sat Jul 8 17:40:10 1995 Theodore Y. Ts'o (tytso@dcl)
* kerberos_v4.c (v4_klog): Also log L_KRB_PERR error messages, so
krb5_error_code kdc_get_server_key PROTOTYPE((krb5_ticket *,
krb5_keyblock **,
krb5_kvno *));
+
+int validate_as_request PROTOTYPE((krb5_kdc_req *, krb5_db_entry,
+ krb5_db_entry, krb5_timestamp,
+ char **));
+
+int validate_tgs_request PROTOTYPE((krb5_kdc_req *, krb5_db_entry,
+ krb5_ticket *, krb5_timestamp,
+ char **));
+
+int fetch_asn1_field PROTOTYPE((unsigned char *, unsigned int, unsigned int,
+ krb5_data *));
+
/* do_as_req.c */
krb5_error_code process_as_req PROTOTYPE((krb5_kdc_req *,
const krb5_fulladdr *,
int,
krb5_data **));
+/* main.c */
+krb5_error_code kdc_initialize_rcache PROTOTYPE((krb5_context, char *));
+
/* network.c */
krb5_error_code listen_and_process PROTOTYPE((const char *));
krb5_error_code setup_network PROTOTYPE((const char *));
krb5_error_code closedown_network PROTOTYPE((const char *));
+void process_packet PROTOTYPE((int, const char *, int));
+
+/* policy.c */
+int against_local_policy_as PROTOTYPE((krb5_kdc_req *, krb5_db_entry,
+ krb5_db_entry, krb5_timestamp,
+ char **));
+
+int against_local_policy_tgs PROTOTYPE((krb5_kdc_req *, krb5_db_entry,
+ krb5_ticket *, char **));
/* replay.c */
extern int errno;
+int compat_decrypt_key PROTOTYPE((krb5_encrypted_keyblock *, C_Block));
+int kerb_get_principal PROTOTYPE((char *, char *, Principal *, unsigned int,
+ int *));
+int check_princ PROTOTYPE((char *, char *, unsigned, Principal *));
+
+#ifdef HAVE_STDARG_H
+char * v4_klog PROTOTYPE((int, const char *, ...));
+#else
+char * v4_klog PROTOTYPE((int, char *, va_dcl));
+#endif
+
/* take this out when we don't need it anymore */
int krbONE = 1;
static krb5_error_code retval;
static krb5_data *response;
-void kerberos_v4(), kerb_err_reply();
+void kerberos_v4 PROTOTYPE((struct sockaddr_in *, KTEXT));
+void kerb_err_reply PROTOTYPE((struct sockaddr_in *, KTEXT, long, char *));
krb5_error_code
process_v4( pkt, client_fulladdr, is_secondary, resp)
#include "kdc5_err.h"
#include "adm_proto.h"
+kdc_realm_t *find_realm_data PROTOTYPE((char *, krb5_ui_4));
+
+krb5_error_code setup_server_realm PROTOTYPE((krb5_principal));
+
+void usage PROTOTYPE((char *));
+
+krb5_sigtype request_exit PROTOTYPE((int));
+
+void setup_signal_handlers PROTOTYPE((void));
+
+void initialize_realms PROTOTYPE((krb5_context, krb5_pointer, int, char **));
+
+void finish_realms PROTOTYPE((char *));
+
static int nofork = 0;
static char *kdc_current_rcname = (char *) NULL;
static int rkey_init_done = 0;
void process_packet(port_fd, prog, is_secondary)
int port_fd;
- char *prog;
+ const char *prog;
int is_secondary;
{
int cc, saddr_len;