-/* -*- mode: c; indent-tabs-mode: nil -*- */
+/* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */
/*
* Copyright 1993 by OpenVision Technologies, Inc.
*
#include "gssapiP_krb5.h"
OM_uint32 KRB5_CALLCONV
-gss_krb5_get_tkt_flags(
- OM_uint32 *minor_status,
- gss_ctx_id_t context_handle,
- krb5_flags *ticket_flags)
+gss_krb5_get_tkt_flags(OM_uint32 *minor_status,
+ gss_ctx_id_t context_handle,
+ krb5_flags *ticket_flags)
{
static const gss_OID_desc req_oid = {
GSS_KRB5_GET_TKT_FLAGS_OID_LENGTH,
}
OM_uint32 KRB5_CALLCONV
-gss_krb5_copy_ccache(
- OM_uint32 *minor_status,
- gss_cred_id_t cred_handle,
- krb5_ccache out_ccache)
+gss_krb5_copy_ccache(OM_uint32 *minor_status,
+ gss_cred_id_t cred_handle,
+ krb5_ccache out_ccache)
{
static const gss_OID_desc req_oid = {
GSS_KRB5_COPY_CCACHE_OID_LENGTH,
}
OM_uint32 KRB5_CALLCONV
-gss_krb5_export_lucid_sec_context(
- OM_uint32 *minor_status,
- gss_ctx_id_t *context_handle,
- OM_uint32 version,
- void **kctx)
+gss_krb5_export_lucid_sec_context(OM_uint32 *minor_status,
+ gss_ctx_id_t *context_handle,
+ OM_uint32 version,
+ void **kctx)
{
unsigned char oid_buf[GSS_KRB5_EXPORT_LUCID_SEC_CONTEXT_OID_LENGTH + 6];
gss_OID_desc req_oid;
}
OM_uint32 KRB5_CALLCONV
-gss_krb5_set_allowable_enctypes(
- OM_uint32 *minor_status,
- gss_cred_id_t cred,
- OM_uint32 num_ktypes,
- krb5_enctype *ktypes)
+gss_krb5_set_allowable_enctypes(OM_uint32 *minor_status,
+ gss_cred_id_t cred,
+ OM_uint32 num_ktypes,
+ krb5_enctype *ktypes)
{
static const gss_OID_desc req_oid = {
GSS_KRB5_SET_ALLOWABLE_ENCTYPES_OID_LENGTH,
}
OM_uint32 KRB5_CALLCONV
-gss_krb5_ccache_name(
- OM_uint32 *minor_status,
- const char *name,
- const char **out_name)
+gss_krb5_ccache_name(OM_uint32 *minor_status,
+ const char *name,
+ const char **out_name)
{
static const gss_OID_desc req_oid = {
GSS_KRB5_CCACHE_NAME_OID_LENGTH,
}
OM_uint32 KRB5_CALLCONV
-gss_krb5_free_lucid_sec_context(
- OM_uint32 *minor_status,
- void *kctx)
+gss_krb5_free_lucid_sec_context(OM_uint32 *minor_status, void *kctx)
{
static const gss_OID_desc req_oid = {
GSS_KRB5_FREE_LUCID_SEC_CONTEXT_OID_LENGTH,
* into a gss_name_t.
*/
OM_uint32 KRB5_CALLCONV
-gsskrb5_extract_authz_data_from_sec_context(
- OM_uint32 *minor_status,
- gss_ctx_id_t context_handle,
- int ad_type,
- gss_buffer_t ad_data)
+gsskrb5_extract_authz_data_from_sec_context(OM_uint32 *minor_status,
+ gss_ctx_id_t context_handle,
+ int ad_type,
+ gss_buffer_t ad_data)
{
gss_OID_desc req_oid;
unsigned char oid_buf[GSS_KRB5_EXTRACT_AUTHZ_DATA_FROM_SEC_CONTEXT_OID_LENGTH + 6];
}
OM_uint32 KRB5_CALLCONV
-gss_krb5_set_cred_rcache(
- OM_uint32 *minor_status,
- gss_cred_id_t cred,
- krb5_rcache rcache)
+gss_krb5_set_cred_rcache(OM_uint32 *minor_status,
+ gss_cred_id_t cred,
+ krb5_rcache rcache)
{
static const gss_OID_desc req_oid = {
GSS_KRB5_SET_CRED_RCACHE_OID_LENGTH,
* prefix string.
*/
static krb5_error_code
-krb5int_cc_getops(
- krb5_context context,
- const char *pfx,
- const krb5_cc_ops **ops)
+krb5int_cc_getops(krb5_context context,
+ const char *pfx,
+ const krb5_cc_ops **ops)
{
krb5_error_code err;
struct krb5_cc_typelist *tlist;
}
krb5_error_code
-krb5int_cc_typecursor_next(
- krb5_context context,
- krb5_cc_typecursor t,
- const krb5_cc_ops **ops)
+krb5int_cc_typecursor_next(krb5_context context,
+ krb5_cc_typecursor t,
+ const krb5_cc_ops **ops)
{
krb5_error_code err = 0;
}
krb5_error_code KRB5_CALLCONV
-krb5_cc_move (krb5_context context, krb5_ccache src, krb5_ccache dst)
+krb5_cc_move(krb5_context context, krb5_ccache src, krb5_ccache dst)
{
krb5_error_code ret = 0;
krb5_principal princ = NULL;
cccol_pertype_next(krb5_context, krb5_cccol_cursor, krb5_ccache *);
krb5_error_code KRB5_CALLCONV
-krb5_cccol_cursor_new(
- krb5_context context,
- krb5_cccol_cursor *cursor)
+krb5_cccol_cursor_new(krb5_context context,
+ krb5_cccol_cursor *cursor)
{
krb5_error_code ret = 0;
krb5_cccol_cursor n = NULL;
}
krb5_error_code KRB5_CALLCONV
-krb5_cccol_cursor_next(
- krb5_context context,
- krb5_cccol_cursor cursor,
- krb5_ccache *ccache)
+krb5_cccol_cursor_next(krb5_context context,
+ krb5_cccol_cursor cursor,
+ krb5_ccache *ccache)
{
krb5_error_code ret = 0;
char *name;
}
krb5_error_code KRB5_CALLCONV
-krb5_cccol_cursor_free(
- krb5_context context,
- krb5_cccol_cursor *cursor)
+krb5_cccol_cursor_free(krb5_context context,
+ krb5_cccol_cursor *cursor)
{
krb5_cccol_cursor c = *cursor;
int i;
}
krb5_error_code KRB5_CALLCONV
-krb5_cccol_last_change_time(
- krb5_context context,
- krb5_timestamp *change_time)
+krb5_cccol_last_change_time(krb5_context context,
+ krb5_timestamp *change_time)
{
krb5_error_code ret = 0;
krb5_cccol_cursor c = NULL;
* higher-priority defaults.
*/
static int
-cccol_already(
- krb5_context context,
- krb5_cccol_cursor c,
- krb5_ccache *ccache)
+cccol_already(krb5_context context,
+ krb5_cccol_cursor c,
+ krb5_ccache *ccache)
{
const char *name = NULL, *prefix = NULL;
int i;
* Compare {prefix, name} against a cc_fullname.
*/
static int
-cccol_cmpname(
- const char *prefix,
- const char *name,
- struct cc_fullname *fullname)
+cccol_cmpname(const char *prefix,
+ const char *name,
+ struct cc_fullname *fullname)
{
if (fullname->pfx == NULL || fullname->res == NULL)
return 0;
* name we're given.
*/
static krb5_error_code
-cccol_do_resolve(
- krb5_context context,
- krb5_cccol_cursor cursor,
- const char *name,
- krb5_ccache *ccache)
+cccol_do_resolve(krb5_context context,
+ krb5_cccol_cursor cursor,
+ const char *name,
+ krb5_ccache *ccache)
{
krb5_error_code ret = 0;
struct cc_fullname *fullname;
* ccache list of the current backend is exhausted.
*/
static krb5_error_code
-cccol_pertype_next(
- krb5_context context,
- krb5_cccol_cursor cursor,
- krb5_ccache *ccache)
+cccol_pertype_next(krb5_context context,
+ krb5_cccol_cursor cursor,
+ krb5_ccache *ccache)
{
krb5_error_code ret = 0;