/* Add the end-of-list marker. */
preauth_systems[k].name = "[end]";
preauth_systems[k].type = -1;
+ return 0;
}
krb5_error_code
unload_preauth_plugins(krb5_context context)
{
int i;
- struct errinfo err;
if (preauth_systems != NULL) {
for (i = 0; i < n_preauth_systems; i++) {
if (preauth_systems[i].fini != NULL) {
krb5_data **result)
{
int i, k;
- krb5_tl_data *tl;
krb5_data *ret;
krb5_deltat *delta;
krb5_keyblock *keys;
struct request_pa_context *context,
void ***pa_context)
{
- krb5_preauth_systems *preauth_system;
int i;
*pa_context = 0;
get_entry_data, pa_sys->pa_sys_context,
pa_context);
if (retval) {
- char * emsg = krb5_get_error_message (context, retval);
+ const char * emsg = krb5_get_error_message (context, retval);
krb5_klog_syslog (LOG_INFO, "preauth (%s) verify failure: %s",
pa_sys->name, emsg);
krb5_free_error_message (context, emsg);
/* pa system was not found, but principal doesn't require preauth */
if (!pa_found &&
- !isflagset(client->attributes, KRB5_KDB_REQUIRES_PRE_AUTH) &&
- !isflagset(client->attributes, KRB5_KDB_REQUIRES_HW_AUTH))
+ !isflagset(client->attributes, KRB5_KDB_REQUIRES_PRE_AUTH) &&
+ !isflagset(client->attributes, KRB5_KDB_REQUIRES_HW_AUTH))
return 0;
if (!pa_found) {
- char *emsg = krb5_get_error_message(context, retval);
+ const char *emsg = krb5_get_error_message(context, retval);
krb5_klog_syslog (LOG_INFO, "no valid preauth type found: %s", emsg);
krb5_free_error_message(context, emsg);
}