return(GSS_S_FAILURE);
}
- code = krb5_init_context(&context);
+ code = krb5_gss_init_context(&context);
if (code) {
*minor_status = code;
return GSS_S_FAILURE;
return GSS_S_FAILURE;
}
- code = krb5_init_context(&context);
+ code = krb5_gss_init_context(&context);
if (code) {
*minor_status = code;
return GSS_S_FAILURE;
return(GSS_S_DUPLICATE_ELEMENT);
}
- code = krb5_init_context(&context);
+ code = krb5_gss_init_context(&context);
if (code) {
*minor_status = code;
return GSS_S_FAILURE;
return(GSS_S_CALL_BAD_STRUCTURE|GSS_S_BAD_NAME);
}
- code = krb5_init_context(&context);
+ code = krb5_gss_init_context(&context);
if (code) {
*minor_status = code;
return GSS_S_FAILURE;
return(GSS_S_FAILURE);
}
- code = krb5_init_context(&context);
+ code = krb5_gss_init_context(&context);
if (code) {
k5_mutex_unlock(&k5creds->lock);
*minor_status = code;
krb5_error_code code;
char *str;
- code = krb5_init_context(&context);
+ code = krb5_gss_init_context(&context);
if (code) {
*minor_status = code;
return GSS_S_FAILURE;
if (minor_status)
*minor_status = 0;
- code = krb5_init_context(&context);
+ code = krb5_gss_init_context(&context);
if (code) {
if (minor_status)
*minor_status = code;
if (minor_status)
*minor_status = 0;
- code = krb5_init_context(&context);
+ code = krb5_gss_init_context(&context);
if (code) {
if (minor_status)
*minor_status = code;
extern k5_mutex_t kg_kdc_flag_mutex;
krb5_error_code krb5_gss_init_context (krb5_context *ctxp);
-#define krb5_init_context(C) krb5_gss_init_context(C)
krb5_error_code krb5_gss_use_kdc_context(void);
/* Reset the context default ccache (see text above), and then
retrieve it. */
- err = krb5_init_context(&context);
+ err = krb5_gss_init_context(&context);
if (!err)
err = krb5_cc_set_default_name (context, NULL);
if (!err) {
struct passwd *pw;
#endif
- code = krb5_init_context(&context);
+ code = krb5_gss_init_context(&context);
if (code) {
*minor_status = code;
return GSS_S_FAILURE;
one when calling the serialization code. However, one of the
objects we're unpacking is a krb5 context, so when we finish,
we can throw this one away. */
- kret = krb5_init_context(&context);
+ kret = krb5_gss_init_context(&context);
if (kret) {
*minor_status = kret;
return GSS_S_FAILURE;
OM_uint32 tmp_min_stat;
if (*context_handle == GSS_C_NO_CONTEXT) {
- kerr = krb5_init_context(&context);
+ kerr = krb5_gss_init_context(&context);
if (kerr) {
*minor_status = kerr;
return GSS_S_FAILURE;
if (is_kdc)
return krb5int_init_context_kdc(ctxp);
else
-#undef krb5_init_context
return krb5_init_context(ctxp);
}
ret = GSS_S_FAILURE;
ret_name = NULL;
- code = krb5_init_context(&context);
+ code = krb5_gss_init_context(&context);
if (code) {
*minor_status = code;
return GSS_S_FAILURE;
krb5_gss_cred_id_t cred;
krb5_error_code code1, code2, code3;
- code1 = krb5_init_context(&context);
+ code1 = krb5_gss_init_context(&context);
if (code1) {
*minor_status = code1;
return GSS_S_FAILURE;
krb5_context context;
krb5_error_code code;
- code = krb5_init_context(&context);
+ code = krb5_gss_init_context(&context);
if (code) {
*minor_status = code;
return GSS_S_FAILURE;
krb5_error_code code;
OM_uint32 maj;
- code = krb5_init_context(&context);
+ code = krb5_gss_init_context(&context);
if (code) {
*minor_status = code;
return GSS_S_FAILURE;