+Sat Jun 10 22:56:10 1995 Tom Yu (tlyu@dragons-lair)
+
+ * forward.c, kcmd.c, krcp.c, krlogind.c, krshd.c:
+ krb5_auth_context redefinitions
+
Fri Jun 9 18:26:30 1995 <tytso@rsx-11.mit.edu>
* configure.in: Remove standardized set of autoconf macros, which
krb5_error_code
rd_and_store_for_creds(context, auth_context, inbuf, ticket, lusername)
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
krb5_data *inbuf;
krb5_ticket *ticket;
char *lusername;
krb5_error_code
get_for_creds(context, auth_context, rhost, client, forwardable, out_buf)
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
char *rhost;
krb5_principal client;
int forwardable; /* Should forwarded TGT also be forwardable? */
krb5_ccache cc;
krb5_data outbuf;
krb5_flags options = authopts;
- krb5_auth_context * auth_context = NULL;
+ krb5_auth_context auth_context = NULL;
pid = getpid();
hp = gethostbyname(*ahost);
krb5_error_code status;
krb5_address faddr;
krb5_ticket * ticket = NULL;
- krb5_auth_context * auth_context = NULL;
+ krb5_auth_context auth_context = NULL;
if (status = krb5_cc_default(bsd_context, &cc)){
krb5_creds creds, *new_creds;
krb5_ccache cc;
krb5_error_code status;
- krb5_auth_context *auth_context = NULL;
+ krb5_auth_context auth_context = NULL;
if (config_file) {
const char * filenames[2];
krb5_error_code
recvauth()
{
- krb5_auth_context * auth_context = NULL;
+ krb5_auth_context auth_context = NULL;
krb5_error_code status;
struct sockaddr_in peersin, laddr;
char krb_vers[KRB_SENDAUTH_VLEN + 1];
int netf;
struct sockaddr_in peersin;
{
- krb5_auth_context *auth_context = NULL;
+ krb5_auth_context auth_context = NULL;
krb5_error_code status;
struct sockaddr_in laddr;
char krb_vers[KRB_SENDAUTH_VLEN + 1];
+Sat Jun 10 22:57:11 1995 Tom Yu (tlyu@dragons-lair)
+
+ * poplib.c: krb5_auth_context redefinitions
+
Fri Jun 9 18:27:03 1995 <tytso@rsx-11.mit.edu>
* configure.in: Remove standardized set of autoconf macros, which
krb5_principal client = NULL, server = NULL;
krb5_error *err_ret = NULL;
register char *cp;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
#endif
#endif
+Sat Jun 10 22:57:39 1995 Tom Yu (tlyu@dragons-lair)
+
+ * movemail.c: krb5_auth_context redefinitions
+
Fri Jun 9 18:27:12 1995 <tytso@rsx-11.mit.edu>
* configure.in: Remove standardized set of autoconf macros, which
krb5_context context;
krb5_principal client, server;
krb5_error *err_ret = NULL;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
char *hostname;
#endif /* KRB5 */
#endif /* KERBEROS */
+Sat Jun 10 22:57:55 1995 Tom Yu (tlyu@dragons-lair)
+
+ * pop_init.c: krb5_auth_context redefinitions
+
Fri Jun 9 18:27:22 1995 <tytso@rsx-11.mit.edu>
* configure.in: Remove standardized set of autoconf macros, which
#endif
#ifdef KRB5
- krb5_auth_context * auth_context = NULL;
+ krb5_auth_context auth_context = NULL;
krb5_error_code retval;
krb5_principal server;
int sock = 0;
+Sat Jun 10 22:58:15 1995 Tom Yu (tlyu@dragons-lair)
+
+ * sclient.c: krb5_auth_context redefinitions
+
Fri Jun 9 18:27:44 1995 <tytso@rsx-11.mit.edu>
* configure.in: Remove standardized set of autoconf macros, which
krb5_principal client, server;
krb5_error *err_ret;
krb5_ap_rep_enc_part *rep_ret;
- krb5_auth_context * auth_context = 0;
+ krb5_auth_context auth_context = 0;
short xmitlen;
if (argc != 2 && argc != 3) {
+Sat Jun 10 22:58:40 1995 Tom Yu (tlyu@dragons-lair)
+
+ * sserver.c: krb5_auth_context redefinitions
+
Fri Jun 9 18:28:33 1995 <tytso@rsx-11.mit.edu>
* configure.in: Remove standardized set of autoconf macros, which
char *argv[];
{
krb5_context context;
- krb5_auth_context * auth_context = NULL;
+ krb5_auth_context auth_context = NULL;
krb5_ticket * ticket;
krb5_address peeraddr;
struct sockaddr_in peername;
+Sat Jun 10 22:58:57 1995 Tom Yu (tlyu@dragons-lair)
+
+ * sim_client.c: krb5_auth_context redefinitions
+
Fri Jun 9 18:29:09 1995 <tytso@rsx-11.mit.edu>
* configure.in: Remove standardized set of autoconf macros, which
extern krb5_deltat krb5_clockskew;
krb5_context context;
- krb5_auth_context * auth_context = NULL;
+ krb5_auth_context auth_context = NULL;
krb5_replay_data replaydata;
if (argc != 2 && argc != 3) {
+Sat Jun 10 22:59:20 1995 Tom Yu (tlyu@dragons-lair)
+
+ * sim_server.c: krb5_auth_context redefinitions
+
Fri Jun 9 18:23:58 1995 <tytso@rsx-11.mit.edu>
* sim_server.c: #include krb5.h first, to reduce size of debugging
unsigned char pktbuf[BUFSIZ];
krb5_principal sprinc;
krb5_context context;
- krb5_auth_context *auth_context = NULL;
+ krb5_auth_context auth_context = NULL;
krb5_address addr;
krb5_ticket *ticket = NULL;
+Sat Jun 10 22:59:42 1995 Tom Yu (tlyu@dragons-lair)
+
+ * forward.c, kerberos5.c: krb5_auth_context redefinitions
+
Fri Jun 9 18:30:02 1995 <tytso@rsx-11.mit.edu>
* configure.in: Remove standardized set of autoconf macros, which
krb5_error_code
rd_and_store_for_creds(context, auth_context, inbuf, ticket, lusername)
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
krb5_data *inbuf;
krb5_ticket *ticket;
char *lusername;
krb5_error_code INTERFACE
get_for_creds(context, auth_context, rhost, client, forwardable, outbuf)
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
char *rhost;
krb5_principal client;
int forwardable; /* Should forwarded TGT also be forwardable? */
#define KRB_FORWARD_REJECT 6 /* Forwarded credentials rejected */
#endif /* FORWARD */
-krb5_auth_context * auth_context;
+krb5_auth_context auth_context;
static krb5_data auth;
/* telnetd gets session key from here */
+Sat Jun 10 23:00:05 1995 Tom Yu (tlyu@dragons-lair)
+
+ * client.c, server.c: krb5_auth_context redefinitions
+
Fri Jun 9 18:30:36 1995 <tytso@rsx-11.mit.edu>
* configure.in: Remove standardized set of autoconf macros, which
krb5_ccache cc;
krb5_creds creds, *new_creds;
krb5_data reply, msg, princ_data;
- krb5_auth_context * auth_context = NULL;
+ krb5_auth_context auth_context = NULL;
krb5_ticket * ticket = NULL;
krb5_context context;
unsigned short port;
krb5_ccache cc;
krb5_data msgtext, msg;
krb5_context context;
- krb5_auth_context * auth_context = NULL;
+ krb5_auth_context auth_context = NULL;
#ifndef DEBUG
freopen("/tmp/uu-server.log", "w", stderr);
+Sat Jun 10 22:10:46 1995 Tom Yu (tlyu@dragons-lair)
+
+ * krb5.hin: declare krb5_auth_context as
+ struct _krb5_auth_context FAR *
+
Fri Jun 9 18:43:20 1995 <tytso@rsx-11.mit.edu>
* krb5.hin: Remove definition of the krb5_fulladdr structure, and
typedef struct _krb5_context FAR * krb5_context;
struct _krb5_auth_context;
-typedef struct _krb5_auth_context krb5_auth_context;
+typedef struct _krb5_auth_context FAR * krb5_auth_context;
/*
* begin "encryption.h"
krb5_creds **));
krb5_error_code krb5_mk_req
PROTOTYPE((krb5_context,
- krb5_auth_context **,
+ krb5_auth_context *,
const krb5_flags,
char *,
char *,
krb5_data * ));
krb5_error_code INTERFACE krb5_mk_req_extended
PROTOTYPE((krb5_context,
- krb5_auth_context FAR * FAR *,
+ krb5_auth_context FAR *,
const krb5_flags,
krb5_data FAR *,
krb5_creds FAR *,
krb5_data FAR * ));
krb5_error_code krb5_mk_rep
PROTOTYPE((krb5_context,
- krb5_auth_context *,
+ krb5_auth_context,
krb5_data *));
krb5_error_code INTERFACE krb5_rd_rep
PROTOTYPE((krb5_context,
- krb5_auth_context FAR *,
+ krb5_auth_context,
const krb5_data FAR *,
krb5_ap_rep_enc_part FAR * FAR *));
krb5_error_code krb5_mk_error
krb5_error ** ));
krb5_error_code krb5_rd_safe
PROTOTYPE((krb5_context,
- krb5_auth_context *,
+ krb5_auth_context,
const krb5_data *,
krb5_data *,
krb5_replay_data *));
krb5_error_code krb5_rd_priv
PROTOTYPE((krb5_context,
- krb5_auth_context *,
+ krb5_auth_context,
const krb5_data *,
krb5_data *,
krb5_replay_data *));
krb5_error_code krb5_rd_req
PROTOTYPE((krb5_context,
- krb5_auth_context **,
+ krb5_auth_context *,
const krb5_data *,
krb5_const_principal,
krb5_keytab,
krb5_error_code krb5_rd_req_decoded
PROTOTYPE((krb5_context,
- krb5_auth_context **,
+ krb5_auth_context *,
const krb5_ap_req *,
krb5_const_principal,
krb5_keytab,
krb5_keyblock **));
krb5_error_code krb5_mk_safe
PROTOTYPE((krb5_context,
- krb5_auth_context *,
+ krb5_auth_context,
const krb5_data *,
krb5_data *,
krb5_replay_data *));
krb5_error_code krb5_mk_priv
PROTOTYPE((krb5_context,
- krb5_auth_context *,
+ krb5_auth_context,
const krb5_data *,
krb5_data *,
krb5_replay_data *));
krb5_error_code krb5_sendauth
PROTOTYPE((krb5_context,
- krb5_auth_context **,
+ krb5_auth_context *,
krb5_pointer,
char *,
krb5_principal,
krb5_creds **));
krb5_error_code krb5_recvauth PROTOTYPE((krb5_context,
- krb5_auth_context **,
+ krb5_auth_context *,
krb5_pointer,
char *,
krb5_principal,
krb5_error_code INTERFACE krb5_mk_ncred
PROTOTYPE((krb5_context,
- krb5_auth_context *,
+ krb5_auth_context,
krb5_creds **,
krb5_data **,
krb5_replay_data *));
krb5_error_code INTERFACE krb5_mk_1cred
PROTOTYPE((krb5_context,
- krb5_auth_context *,
+ krb5_auth_context,
krb5_creds *,
krb5_data **,
krb5_replay_data *));
krb5_error_code krb5_auth_con_init
PROTOTYPE((krb5_context,
- krb5_auth_context **));
+ krb5_auth_context *));
krb5_error_code krb5_auth_con_free
PROTOTYPE((krb5_context,
- krb5_auth_context *));
+ krb5_auth_context));
krb5_error_code krb5_auth_con_setflags
PROTOTYPE((krb5_context,
- krb5_auth_context *,
+ krb5_auth_context,
krb5_int32));
krb5_error_code krb5_auth_con_getflags
PROTOTYPE((krb5_context,
- krb5_auth_context *,
+ krb5_auth_context,
krb5_int32 *));
krb5_error_code krb5_auth_con_setaddrs
PROTOTYPE((krb5_context,
- krb5_auth_context *,
+ krb5_auth_context,
krb5_address *,
krb5_address *));
krb5_error_code krb5_auth_con_getaddrs
PROTOTYPE((krb5_context,
- krb5_auth_context *,
+ krb5_auth_context,
krb5_address **,
krb5_address **));
krb5_error_code krb5_auth_con_setports
PROTOTYPE((krb5_context,
- krb5_auth_context *,
+ krb5_auth_context,
krb5_address *,
krb5_address *));
krb5_error_code krb5_auth_con_setuseruserkey
PROTOTYPE((krb5_context,
- krb5_auth_context *,
+ krb5_auth_context,
krb5_keyblock *));
krb5_error_code krb5_auth_con_getkey
PROTOTYPE((krb5_context,
- krb5_auth_context *,
+ krb5_auth_context,
krb5_keyblock **));
krb5_error_code krb5_auth_con_getlocalsubkey
PROTOTYPE((krb5_context,
- krb5_auth_context *,
+ krb5_auth_context,
krb5_keyblock **));
krb5_error_code krb5_auth_con_setcksumtype
PROTOTYPE((krb5_context,
- krb5_auth_context *,
+ krb5_auth_context,
krb5_cksumtype));
krb5_error_code krb5_auth_con_getcksumtype
PROTOTYPE((krb5_context,
- krb5_auth_context *,
+ krb5_auth_context,
krb5_cksumtype *));
krb5_error_code krb5_auth_con_getlocalseqnumber
PROTOTYPE((krb5_context,
- krb5_auth_context *,
+ krb5_auth_context,
krb5_int32 *));
krb5_error_code krb5_auth_con_getremoteseqnumber
PROTOTYPE((krb5_context,
- krb5_auth_context *,
+ krb5_auth_context,
krb5_int32 *));
krb5_error_code krb5_auth_con_setivector
PROTOTYPE((krb5_context,
- krb5_auth_context *,
+ krb5_auth_context,
krb5_pointer));
krb5_error_code krb5_auth_con_getivector
PROTOTYPE((krb5_context,
- krb5_auth_context *,
+ krb5_auth_context,
krb5_pointer *));
krb5_error_code krb5_auth_con_setrcache
PROTOTYPE((krb5_context,
- krb5_auth_context *,
+ krb5_auth_context,
krb5_rcache));
krb5_error_code krb5_auth_con_getrcache
PROTOTYPE((krb5_context,
- krb5_auth_context *,
+ krb5_auth_context,
krb5_rcache *));
krb5_error_code krb5_auth_con_getauthenticator
PROTOTYPE((krb5_context,
- krb5_auth_context *,
+ krb5_auth_context,
krb5_authenticator **));
krb5_error_code krb5_auth_con_getremotesubkey
PROTOTYPE((krb5_context,
- krb5_auth_context *,
+ krb5_auth_context,
krb5_keyblock **));
#define KRB5_REALM_BRANCH_CHAR '.'
+Sat Jun 10 22:11:45 1995 Tom Yu (tlyu@dragons-lair)
+
+ * adm_proto.h: update krb5_auth_context stuff
+
Fri Jun 9 18:42:30 1995 <tytso@rsx-11.mit.edu>
* configure.in: Remove standardized set of autoconf macros, which
char *,
char *,
int *,
- krb5_auth_context **,
+ krb5_auth_context *,
krb5_ccache *,
char *,
krb5_timestamp));
void INTERFACE krb5_adm_disconnect
PROTOTYPE((krb5_context,
int *,
- krb5_auth_context *,
+ krb5_auth_context,
krb5_ccache));
#if ! defined(_WINDOWS)
krb5_error_code INTERFACE krb5_send_adm_cmd
PROTOTYPE((krb5_context,
krb5_pointer,
- krb5_auth_context *,
+ krb5_auth_context,
krb5_int32,
krb5_data *));
krb5_error_code krb5_send_adm_reply
PROTOTYPE((krb5_context,
krb5_pointer,
- krb5_auth_context *,
+ krb5_auth_context,
krb5_int32,
krb5_int32,
krb5_data *));
krb5_error_code krb5_read_adm_cmd
PROTOTYPE((krb5_context,
krb5_pointer,
- krb5_auth_context *,
+ krb5_auth_context,
krb5_int32 *,
krb5_data **));
krb5_error_code INTERFACE krb5_read_adm_reply
PROTOTYPE((krb5_context,
krb5_pointer,
- krb5_auth_context *,
+ krb5_auth_context,
krb5_int32 *,
krb5_int32 *,
krb5_data **));
+Sat Jun 10 23:00:53 1995 Tom Yu (tlyu@dragons-lair)
+
+ * kadmin.c, kadmin_add.c, kadmin_apr.c, kadmin_cpr.c,
+ kadmin_cpw.c, kadmin_del.c, kadmin_done.c, kadmin_inq.c,
+ kadmin_mod.c, kadmin_msnd.c: krb5_auth_context redefinitions
+
Fri Jun 9 19:06:41 1995 <tytso@rsx-11.mit.edu>
* configure.in: Remove standardized set of autoconf macros, which
int nflag = 0;
int port = 0;
- krb5_auth_context * new_auth_context;
+ krb5_auth_context new_auth_context;
krb5_replay_data replaydata;
krb5_init_context(&context);
kadm_add_user(context, auth_context, my_creds, local_socket,
oper_type, principal)
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
krb5_creds * my_creds;
int * local_socket;
int oper_type;
kadm_add_user_rnd(context, auth_context, my_creds,
local_socket, principal)
krb5_context context;
- krb5_auth_context *auth_context;
+ krb5_auth_context auth_context;
int *local_socket;
char *principal;
{
kadm_cpw_user_rnd(context, auth_context, my_creds,
local_socket, principal)
krb5_context context;
- krb5_auth_context *auth_context;
+ krb5_auth_context auth_context;
int *local_socket;
char *principal;
{
kadm_cpw_user(context, auth_context, my_creds,
local_socket, oper_type, principal)
krb5_context context;
- krb5_auth_context *auth_context;
+ krb5_auth_context auth_context;
int *local_socket;
int oper_type;
char *principal;
krb5_error_code
kadm_del_user(context, auth_context, my_creds, local_socket, principal)
krb5_context context;
- krb5_auth_context *auth_context;
+ krb5_auth_context auth_context;
int *local_socket;
char *principal;
{
krb5_error_code
kadm_done(context, auth_context, my_creds, local_socket)
krb5_context context;
- krb5_auth_context *auth_context;
+ krb5_auth_context auth_context;
int *local_socket;
{
krb5_replay_data replaydata;
krb5_error_code
kadm_inq_user(context, auth_context, my_creds, local_socket, principal)
krb5_context context;
- krb5_auth_context *auth_context;
+ krb5_auth_context auth_context;
int *local_socket;
char *principal;
{
krb5_error_code
kadm_mod_user(context, auth_context, my_creds, local_socket, principal)
krb5_context context;
- krb5_auth_context *auth_context;
+ krb5_auth_context auth_context;
krb5_creds *my_creds;
int *local_socket;
char *principal;
krb5_error_code
kadm_snd_mod(context, auth_context, my_creds, local_socket)
krb5_context context;
- krb5_auth_context *auth_context;
+ krb5_auth_context auth_context;
krb5_creds *my_creds;
int *local_socket;
{
+Sat Jun 10 23:02:12 1995 Tom Yu (tlyu@dragons-lair)
+
+ * kpasswd.c: krb5_auth_context redefinitions
+
Fri Jun 9 19:06:53 1995 <tytso@rsx-11.mit.edu>
* configure.in: Remove standardized set of autoconf macros, which
char *new_password;
int new_pwsize;
- krb5_auth_context * new_auth_context;
+ krb5_auth_context new_auth_context;
krb5_replay_data replaydata;
#ifdef SANDIA
+Sat Jun 10 23:02:30 1995 Tom Yu (tlyu@dragons-lair)
+
+ * adm_adm_func.c, adm_extern.h, adm_funcs.c, adm_kadmin.c,
+ adm_kpasswd.c, adm_nego.c, adm_process.c: krb5_auth_context
+ redefinitions
+
Fri Jun 9 19:06:45 1995 <tytso@rsx-11.mit.edu>
* configure.in: Remove standardized set of autoconf macros, which
krb5_error_code
adm_build_key (context, auth_context, new_passwd, oper_type, entry)
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
char *new_passwd;
int oper_type;
krb5_db_entry entry;
krb5_error_code
adm_change_pwd(context, auth_context, prog, customer_name, salttype)
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
char *prog;
char *customer_name;
int salttype;
krb5_error_code
adm_add_new_key(context, auth_context, cmdname, customer_name, salttype)
krb5_context context;
- krb5_auth_context *auth_context;
+ krb5_auth_context auth_context;
char *cmdname;
char *customer_name;
int salttype;
krb5_error_code
adm_mod_old_key(context, auth_context, cmdname, customer_name)
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
char *cmdname;
char *customer_name;
{
krb5_error_code
adm_inq_old_key(context, auth_context, cmdname, customer_name)
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
char *cmdname;
char *customer_name;
{
krb5_error_code adm_build_key
PROTOTYPE((krb5_context,
- krb5_auth_context *,
+ krb5_auth_context,
char *,
int,
krb5_db_entry));
krb5_error_code adm_change_pwd
PROTOTYPE((krb5_context,
- krb5_auth_context *,
+ krb5_auth_context,
char *,
char *,
int));
krb5_error_code adm_add_new_key
PROTOTYPE((krb5_context,
- krb5_auth_context *,
+ krb5_auth_context,
char *,
char *,
int));
krb5_error_code adm_mod_old_key
PROTOTYPE((krb5_context,
- krb5_auth_context *,
+ krb5_auth_context,
char *,
char *));
krb5_error_code adm_inq_old_key
PROTOTYPE((krb5_context,
- krb5_auth_context *,
+ krb5_auth_context,
char *,
char *));
krb5_error_code adm5_kadmin
PROTOTYPE((krb5_context,
- krb5_auth_context *,
+ krb5_auth_context,
char *,
char *,
int *));
krb5_error_code adm_negotiate_key
PROTOTYPE((krb5_context,
- krb5_auth_context *,
+ krb5_auth_context,
char const *,
char *));
krb5_error_code adm5_change
PROTOTYPE((krb5_context,
- krb5_auth_context *,
+ krb5_auth_context,
char *,
krb5_principal));
krb5_error_code adm5_kpasswd
PROTOTYPE((krb5_context,
- krb5_auth_context *,
+ krb5_auth_context,
char *,
kadmin_requests *,
char *,
krb5_error_code
adm5_change(context, auth_context, prog, newprinc)
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
char *prog;
krb5_principal newprinc;
{
krb5_error_code
adm5_kadmin(context, auth_context, prog, retbuf, otype)
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
char *prog;
char *retbuf; /* Allocated in Calling Routine */
int *otype;
krb5_error_code
adm5_kpasswd(context, auth_context, prog, request_type, retbuf, otype)
krb5_context context;
- krb5_auth_context *auth_context;
+ krb5_auth_context auth_context;
char *prog;
kadmin_requests *request_type;
char *retbuf;
krb5_error_code
adm_negotiate_key(context, auth_context, prog, new_passwd)
krb5_context context;
- krb5_auth_context *auth_context;
+ krb5_auth_context auth_context;
char const * prog;
char * new_passwd;
{
krb5_data final_msg;
char completion_msg[520];
kadmin_requests request_type;
- krb5_auth_context *auth_context = NULL;
+ krb5_auth_context auth_context = NULL;
krb5_ticket * client_ticket = NULL;
krb5_replay_data replaydata;
+Sat Jun 10 23:03:25 1995 Tom Yu (tlyu@dragons-lair)
+
+ * kpasswd.c: krb5_auth_context redefinitions
+
Fri Jun 9 19:05:49 1995 <tytso@rsx-11.mit.edu>
* configure.in: Remove standardized set of autoconf macros, which
krb5_error_code kret;
krb5_context kcontext;
- krb5_auth_context *auth_context;
+ krb5_auth_context auth_context;
krb5_ccache ccache;
char *opassword;
char *npassword;
+Sat Jun 10 23:03:41 1995 Tom Yu (tlyu@dragons-lair)
+
+ * network.c: krb5_auth_context redefinitions
+
Fri Jun 9 23:04:56 1995 Theodore Y. Ts'o <tytso@dcl>
* kadmin5.c: Change the default kadmin instance to be "admin"
* Own storage.
*/
static int server_socket = -1;
-static krb5_auth_context *server_auth_context = (krb5_auth_context *) NULL;
+static krb5_auth_context server_auth_context = (krb5_auth_context) NULL;
static krb5_ccache server_ccache = (krb5_ccache) NULL;
static krb5_boolean server_active = 0;
static krb5_error_code server_stat = 0;
/* Clean up our state. */
server_socket = -1;
- server_auth_context = (krb5_auth_context *) NULL;
+ server_auth_context = (krb5_auth_context) NULL;
server_ccache = (krb5_ccache) NULL;
server_active = 0;
server_op_in_prog = 0;
+Sat Jun 10 23:04:00 1995 Tom Yu (tlyu@dragons-lair)
+
+ * kadm5_defs.h, passwd.c, proto_serv.c: krb5_auth_context
+ redefinitions
+
Fri Jun 9 19:06:04 1995 <tytso@rsx-11.mit.edu>
* configure.in: Remove standardized set of autoconf macros, which
krb5_int32 passwd_check
PROTOTYPE((krb5_context,
int,
- krb5_auth_context *,
+ krb5_auth_context,
krb5_ticket *,
krb5_data *,
krb5_int32 *));
krb5_int32 passwd_change
PROTOTYPE((krb5_context,
int,
- krb5_auth_context *,
+ krb5_auth_context,
krb5_ticket *,
krb5_data *,
krb5_data *,
passwd_check(kcontext, debug_level, auth_context, ticket, pwdata, supp)
krb5_context kcontext;
int debug_level;
- krb5_auth_context *auth_context;
+ krb5_auth_context auth_context;
krb5_ticket *ticket;
krb5_data *pwdata;
krb5_int32 *supp;
olddata, newdata, supp)
krb5_context kcontext;
int debug_level;
- krb5_auth_context *auth_context;
+ krb5_auth_context auth_context;
krb5_ticket *ticket;
krb5_data *olddata;
krb5_data *newdata;
krb5_data in_data;
krb5_data out_data;
krb5_rcache rcache;
- krb5_auth_context *auth_context;
+ krb5_auth_context auth_context;
krb5_flags ap_options;
krb5_ticket *ticket;
krb5_address *local;
+Sat Jun 10 23:04:31 1995 Tom Yu (tlyu@dragons-lair)
+
+ * kdc_util.c: krb5_auth_context redefinitions
+
Fri Jun 9 19:13:08 1995 <tytso@rsx-11.mit.edu>
* dispatch.c, kdc_util.h, kerberos_v4.c: Use KRB5_KRB4_COMPAT
krb5_data scratch1;
krb5_data * scratch = NULL;
krb5_boolean foreign_server = FALSE;
- krb5_auth_context * auth_context = NULL;
+ krb5_auth_context auth_context = NULL;
krb5_authenticator * authenticator = NULL;
krb5_checksum * his_cksum = NULL;
krb5_keyblock * key = NULL;
+Sat Jun 10 23:04:52 1995 Tom Yu (tlyu@dragons-lair)
+
+ * accept_sec_context.c, gssapiP_krb5.h, init_sec_context.c:
+ krb5_auth_context redefinitions
+
Fri Jun 9 19:25:55 1995 <tytso@rsx-11.mit.edu>
* configure.in: Remove standardized set of autoconf macros, which
krb5_gss_ctx_id_rec *ctx;
krb5_timestamp now;
gss_buffer_desc token;
- krb5_auth_context * auth_context = NULL;
+ krb5_auth_context auth_context = NULL;
krb5_ticket * ticket = NULL;
/* set up returns to be freeable */
int established;
int big_endian;
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
} krb5_gss_ctx_id_rec, krb5_gss_ctx_id_t;
extern void *kg_vdb;
make_ap_req(context, auth_context, cred, server, endtime, chan_bindings,
do_mutual, flags, token)
krb5_context context;
- krb5_auth_context ** auth_context;
+ krb5_auth_context * auth_context;
krb5_gss_cred_id_t cred;
krb5_principal server;
krb5_timestamp *endtime;
+Sat Jun 10 23:05:23 1995 Tom Yu (tlyu@dragons-lair)
+
+ * adm_conn.c, adm_rw.c: krb5_auth_context redefinitions
+
Fri Jun 9 19:26:44 1995 <tytso@rsx-11.mit.edu>
* configure.in: Remove standardized set of autoconf macros, which
krb5_address **));
static krb5_error_code kadm_get_auth
PROTOTYPE((krb5_context,
- krb5_auth_context * *,
+ krb5_auth_context *,
krb5_address *,
krb5_address *));
\f
static krb5_error_code
kadm_get_auth(kcontext, ctxp, local, remote)
krb5_context kcontext;
- krb5_auth_context **ctxp;
+ krb5_auth_context *ctxp;
krb5_address *local;
krb5_address *remote;
{
char *prompt; /* Old password prompt (In ) */
char *opassword; /* Old Password (I/O) */
int *sockp; /* Socket for conn. (Out) */
- krb5_auth_context **ctxp; /* Auth context (Out) */
+ krb5_auth_context *ctxp; /* Auth context (Out) */
krb5_ccache *ccachep; /* Credentials cache (I/O) */
char *ccname; /* Cred cache name (In ) */
krb5_timestamp tlife; /* Ticket lifetime (In ) */
*sockp = -1;
local_addr = remote_addr = (krb5_address *) NULL;
client = (krb5_principal) NULL;
- *ctxp = (krb5_auth_context *) NULL;
+ *ctxp = (krb5_auth_context) NULL;
ccache_supplied = (*ccachep != (krb5_ccache) NULL);
/*
if (kret) {
if (*ctxp) {
krb5_xfree(*ctxp);
- *ctxp = (krb5_auth_context *) NULL;
+ *ctxp = (krb5_auth_context) NULL;
}
if (*sockp >= 0) {
close(*sockp);
krb5_adm_disconnect(kcontext, socketp, auth_context, ccache)
krb5_context kcontext;
int *socketp;
- krb5_auth_context *auth_context;
+ krb5_auth_context auth_context;
krb5_ccache ccache;
{
if (ccache)
krb5_send_adm_cmd(kcontext, sock, ctx, nargs, arglist)
krb5_context kcontext; /* Context handle (In ) */
krb5_pointer sock; /* Socket to write to (In ) */
- krb5_auth_context *ctx; /* Auth context (In ) */
+ krb5_auth_context ctx; /* Auth context (In ) */
krb5_int32 nargs; /* Number of arguments (In ) */
krb5_data *arglist; /* Components to write (In ) */
{
krb5_send_adm_reply(kcontext, sock, ctx, cmd_stat, ncomps, complist)
krb5_context kcontext; /* Context handle (In ) */
krb5_pointer sock; /* Socket to write to (In ) */
- krb5_auth_context *ctx; /* Auth context (In ) */
+ krb5_auth_context ctx; /* Auth context (In ) */
krb5_int32 cmd_stat; /* Command status (In ) */
krb5_int32 ncomps; /* Number of arguments (In ) */
krb5_data *complist; /* Components to write (In ) */
krb5_read_adm_cmd(kcontext, sock, ctx, nargs, arglist)
krb5_context kcontext; /* Context handle (In ) */
krb5_pointer sock; /* Socket to read from (In ) */
- krb5_auth_context *ctx; /* Auth context (In ) */
+ krb5_auth_context ctx; /* Auth context (In ) */
krb5_int32 *nargs; /* Number of arguments (Out) */
krb5_data **arglist; /* List of arguments (Out) */
{
krb5_read_adm_reply(kcontext, sock, ctx, cmd_stat, ncomps, complist)
krb5_context kcontext; /* Context handle (In ) */
krb5_pointer sock; /* Socket to read from (In ) */
- krb5_auth_context *ctx; /* Auth context (In ) */
+ krb5_auth_context ctx; /* Auth context (In ) */
krb5_int32 *cmd_stat; /* Command status (Out) */
krb5_int32 *ncomps; /* # of reply components(Out) */
krb5_data **complist; /* List of components (Out) */
+Sat Jun 10 23:05:51 1995 Tom Yu (tlyu@dragons-lair)
+
+ * auth_con.c, compat_recv.c, mk_cred.c, mk_priv.c, mk_rep.c,
+ mk_req.c, mk_req_ext.c, mk_safe.c, rd_cred.c, rd_priv.c,
+ rd_rep.c, rd_req.c rd_req_dec.c, rd_safe.c, recvauth.c,
+ sendauth.c: krb5_auth_context redefinitions
+
Fri Jun 9 18:48:43 1995 <tytso@rsx-11.mit.edu>
* rd_req_dec.c (krb5_rd_req_decoded): Fix -Wall nits
krb5_error_code
krb5_auth_con_init(context, auth_context)
krb5_context context;
- krb5_auth_context ** auth_context;
+ krb5_auth_context * auth_context;
{
- *auth_context = (krb5_auth_context *)malloc(sizeof(krb5_auth_context));
+ *auth_context =
+ (krb5_auth_context)malloc(sizeof(struct _krb5_auth_context));
if (!*auth_context)
return ENOMEM;
krb5_error_code
krb5_auth_con_free(context, auth_context)
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
{
if (auth_context->local_addr)
free(auth_context->local_addr);
krb5_error_code
krb5_auth_con_setaddrs(context, auth_context, local_addr, remote_addr)
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
krb5_address * local_addr;
krb5_address * remote_addr;
{
krb5_error_code
krb5_auth_con_getaddrs(context, auth_context, local_addr, remote_addr)
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
krb5_address ** local_addr;
krb5_address ** remote_addr;
{
krb5_error_code
krb5_auth_con_setports(context, auth_context, local_port, remote_port)
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
krb5_address * local_port;
krb5_address * remote_port;
{
krb5_error_code
krb5_auth_con_setuseruserkey(context, auth_context, keyblock)
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
krb5_keyblock * keyblock;
{
if (auth_context->keyblock)
krb5_error_code
krb5_auth_con_getkey(context, auth_context, keyblock)
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
krb5_keyblock ** keyblock;
{
if (auth_context->keyblock)
krb5_error_code
krb5_auth_con_getlocalsubkey(context, auth_context, keyblock)
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
krb5_keyblock ** keyblock;
{
if (auth_context->local_subkey)
krb5_error_code
krb5_auth_con_getremotesubkey(context, auth_context, keyblock)
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
krb5_keyblock ** keyblock;
{
if (auth_context->remote_subkey)
krb5_error_code
krb5_auth_con_setcksumtype(context, auth_context, cksumtype)
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
krb5_cksumtype cksumtype;
{
auth_context->cksumtype = cksumtype;
krb5_error_code
krb5_auth_con_getlocalseqnumber(context, auth_context, seqnumber)
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
krb5_int32 * seqnumber;
{
*seqnumber = auth_context->local_seq_number;
krb5_error_code
krb5_auth_con_getauthenticator(context, auth_context, authenticator)
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
krb5_authenticator ** authenticator;
{
return (krb5_copy_authenticator(context, auth_context->authentp,
krb5_error_code
krb5_auth_con_getremoteseqnumber(context, auth_context, seqnumber)
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
krb5_int32 * seqnumber;
{
*seqnumber = auth_context->remote_seq_number;
krb5_error_code
krb5_auth_con_initivector(context, auth_context)
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
{
if (auth_context->keyblock) {
int size = krb5_keytype_array[auth_context->keyblock->keytype]->
krb5_error_code
krb5_auth_con_setivector(context, auth_context, ivector)
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
krb5_pointer ivector;
{
auth_context->i_vector = ivector;
krb5_error_code
krb5_auth_con_getivector(context, auth_context, ivector)
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
krb5_pointer * ivector;
{
*ivector = auth_context->i_vector;
krb5_error_code
krb5_auth_con_setflags(context, auth_context, flags)
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
krb5_int32 flags;
{
auth_context->auth_context_flags = flags;
krb5_error_code
krb5_auth_con_getflags(context, auth_context, flags)
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
krb5_int32 * flags;
{
*flags = auth_context->auth_context_flags;
krb5_error_code
krb5_auth_con_setrcache(context, auth_context, rcache)
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
krb5_rcache rcache;
{
auth_context->rcache = rcache;
ticket,
auth_sys, v4_kdata, v4_schedule, v4_version)
krb5_context context;
- krb5_auth_context **auth_context;
+ krb5_auth_context *auth_context;
krb5_pointer fdp;
char *appl_version;
krb5_principal server;
krb5_mk_ncred(context, auth_context, ppcreds, ppdata, outdata)
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
krb5_creds ** ppcreds;
krb5_data ** ppdata;
krb5_replay_data * outdata;
krb5_error_code INTERFACE
krb5_mk_1cred(context, auth_context, pcreds, ppdata, outdata)
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
krb5_creds * pcreds;
krb5_data ** ppdata;
krb5_replay_data * outdata;
krb5_error_code
krb5_mk_priv(context, auth_context, userdata, outbuf, outdata)
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
const krb5_data * userdata;
krb5_data * outbuf;
krb5_replay_data * outdata;
krb5_error_code
krb5_mk_rep(context, auth_context, outbuf)
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
krb5_data * outbuf;
{
krb5_error_code retval;
krb5_mk_req(context, auth_context, ap_req_options, service, hostname, in_data,
ccache, outbuf)
krb5_context context;
- krb5_auth_context ** auth_context;
+ krb5_auth_context * auth_context;
const krb5_flags ap_req_options;
char * service;
char * hostname;
krb5_mk_req_extended(context, auth_context, ap_req_options, in_data, in_creds,
outbuf)
krb5_context context;
- krb5_auth_context **auth_context;
+ krb5_auth_context * auth_context;
const krb5_flags ap_req_options;
krb5_data * in_data;
krb5_creds * in_creds;
krb5_error_code retval;
krb5_checksum checksum;
krb5_checksum *checksump = 0;
- krb5_auth_context * new_auth_context;
+ krb5_auth_context new_auth_context;
krb5_ap_req request;
krb5_data *scratch = 0;
krb5_error_code
krb5_mk_safe(context, auth_context, userdata, outbuf, outdata)
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
const krb5_data * userdata;
krb5_data * outbuf;
krb5_replay_data * outdata;
krb5_error_code INTERFACE
krb5_rd_cred(context, auth_context, pcreddata, pppcreds, outdata)
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
krb5_data * pcreddata;
krb5_creds *** pppcreds;
krb5_replay_data * outdata;
krb5_error_code
krb5_rd_priv(context, auth_context, inbuf, outbuf, outdata)
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
const krb5_data * inbuf;
krb5_data * outbuf;
krb5_replay_data * outdata;
krb5_error_code INTERFACE
krb5_rd_rep(context, auth_context, inbuf, repl)
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
const krb5_data * inbuf;
krb5_ap_rep_enc_part **repl;
{
krb5_rd_req(context, auth_context, inbuf, server, keytab,
ap_req_options, ticket)
krb5_context context;
- krb5_auth_context ** auth_context;
+ krb5_auth_context * auth_context;
const krb5_data * inbuf;
krb5_const_principal server; /* XXX do we really need this */
krb5_keytab keytab;
{
krb5_error_code retval;
krb5_ap_req * request;
- krb5_auth_context * new_auth_context;
+ krb5_auth_context new_auth_context;
krb5_keytab new_keytab = NULL;
if (!krb5_is_ap_req(inbuf))
krb5_rd_req_decoded(context, auth_context, req, server, keytab,
ap_req_options, ticket)
krb5_context context;
- krb5_auth_context ** auth_context;
+ krb5_auth_context * auth_context;
const krb5_ap_req * req;
krb5_const_principal server;
krb5_keytab keytab;
krb5_error_code
krb5_rd_safe(context, auth_context, inbuf, outbuf, outdata)
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
const krb5_data * inbuf;
krb5_data * outbuf;
krb5_replay_data * outdata;
/* OUT */
ticket)
krb5_context context;
- krb5_auth_context ** auth_context;
+ krb5_auth_context * auth_context;
krb5_pointer fd;
char * appl_version;
krb5_principal server;
krb5_keytab keytab;
krb5_ticket ** ticket;
{
- krb5_auth_context * new_auth_context;
+ krb5_auth_context new_auth_context;
krb5_flags ap_option;
krb5_error_code retval, problem;
krb5_data inbuf;
/* OUT */
error, rep_result, out_creds)
krb5_context context;
- krb5_auth_context ** auth_context;
+ krb5_auth_context * auth_context;
krb5_pointer fd;
char * appl_version;
krb5_principal client;
+Sat Jun 10 23:07:27 1995 Tom Yu (tlyu@dragons-lair)
+
+ * genaddrs.c: krb5_auth_context redefinitions
+
Fri Jun 9 22:08:33 1995 Theodore Y. Ts'o <tytso@dcl>
* gmt_mktime.c (gmt_mktime): Change assertion to check to make
krb5_error_code INTERFACE
krb5_auth_con_genaddrs(context, auth_context, fd, flags)
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
int fd, flags;
{
krb5_error_code retval;
+Sat Jun 10 23:07:45 1995 Tom Yu (tlyu@dragons-lair)
+
+ * kprop.c, kpropd.c: krb5_auth_context redefinitions
+
Fri Jun 9 18:56:39 1995 <tytso@rsx-11.mit.edu>
* configure.in: Remove standardized set of autoconf macros, which
krb5_error_code open_connection
PROTOTYPE((char *, int *, char *));
void kerberos_authenticate
- PROTOTYPE((krb5_context, krb5_auth_context **,
+ PROTOTYPE((krb5_context, krb5_auth_context *,
int, krb5_principal, krb5_creds **));
int open_database
PROTOTYPE((krb5_context, char *, int *));
void close_database
PROTOTYPE((krb5_context, int));
void xmit_database
- PROTOTYPE((krb5_context, krb5_auth_context *, krb5_creds *,
+ PROTOTYPE((krb5_context, krb5_auth_context, krb5_creds *,
int, int, int));
void send_error
PROTOTYPE((krb5_context, krb5_creds *, int, char *, krb5_error_code));
krb5_error_code retval;
krb5_context context;
krb5_creds *my_creds;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
char Errmsg[256];
PRS(context, argv);
void kerberos_authenticate(context, auth_context, fd, me, new_creds)
krb5_context context;
- krb5_auth_context **auth_context;
+ krb5_auth_context *auth_context;
int fd;
krb5_principal me;
krb5_creds ** new_creds;
void
xmit_database(context, auth_context, my_creds, fd, database_fd, database_size)
krb5_context context;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
krb5_creds *my_creds;
int fd;
int database_fd;
krb5_principal server; /* This is our server principal name */
krb5_principal client; /* This is who we're talking to */
krb5_context kpropd_context;
-krb5_auth_context * auth_context;
+krb5_auth_context auth_context;
char *realm = NULL; /* Our realm */
char *file = KPROPD_DEFAULT_FILE;
char *temp_file_name;
+Sat Jun 10 23:08:04 1995 Tom Yu (tlyu@dragons-lair)
+
+ * kdc5_hammer.c: krb5_auth_context redefinitions
+
Fri Jun 9 18:58:36 1995 <tytso@rsx-11.mit.edu>
* configure.in: Remove standardized set of autoconf macros, which
krb5_creds * credsp;
krb5_ticket * ticket = NULL;
krb5_keyblock * keyblock = NULL;
- krb5_auth_context * auth_context = NULL;
+ krb5_auth_context auth_context = NULL;
krb5_data request_data;
if (brief)
+Sat Jun 10 23:08:57 1995 Tom Yu (tlyu@dragons-lair)
+
+ * kpasswd.c: krb5_auth_context redefinitions
+
Mon Jun 5 14:19:51 EDT 1995 Paul Park (pjpark@mit.edu)
* kpasswd.c : Use new krb5_adm_connect() calling sequence.
keyadmin_send_receive (
krb5_context k5context,
int * conn_socket,
- krb5_auth_context * auth_context,
+ krb5_auth_context auth_context,
krb5_int32 nargs,
krb5_data * arglist,
krb5_int32 * cmd_stat,
char **text)
{
krb5_error_code kret, kret2;
- krb5_auth_context * auth_context;
+ krb5_auth_context auth_context;
krb5_ccache ccache;
int conn_socket; /* Socket for talking over */
krb5_int32 nreplies;
#ifdef KRB5
static krb5_data auth;
static int auth_how;
- static krb5_auth_context *auth_context;
+ static krb5_auth_context auth_context;
#define KRB_SERVICE_NAME "host"
#define KERBEROS_VERSION KERBEROS_V5
+Sat Jun 10 23:09:20 1995 Tom Yu (tlyu@dragons-lair)
+
+ * auth.c: krb5_auth_context redefinitions
+
Fri Jun 2 10:51:31 1995 Keith Vetter (keithv@fusion.com)
Added cursor keys (in two modes) and ctrl-space: the arrow