From 24d78185a60d516c1b8cbc41dfdad38a39d01988 Mon Sep 17 00:00:00 2001 From: Ezra Peisach Date: Tue, 9 May 1995 21:41:21 +0000 Subject: [PATCH] More missing contexts git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@5788 dc483132-0cff-0310-8789-dd5450dbe970 --- src/clients/ksu/ChangeLog | 6 ++++++ src/clients/ksu/ccache.c | 2 +- src/clients/ksu/krb_auth_su.c | 16 ++++++++-------- 3 files changed, 15 insertions(+), 9 deletions(-) diff --git a/src/clients/ksu/ChangeLog b/src/clients/ksu/ChangeLog index 9559c6dc8..be24cb81e 100644 --- a/src/clients/ksu/ChangeLog +++ b/src/clients/ksu/ChangeLog @@ -1,5 +1,11 @@ Tue May 9 15:52:15 1995 Ezra Peisach + * krb_auth_su.c (krb5_auth_check): Add missing context + (wolfgang@wsrcc.com) + + * ccache.c (krb5_get_nonexp_tkts): Add missing context + (wolfgang@wsrcc.com) + * heuristic.c (get_best_princ_for_target): Missing context cuased coredump. (get_best_princ_for_target): Missing contexts in call to diff --git a/src/clients/ksu/ccache.c b/src/clients/ksu/ccache.c index 20bcbb241..f3dd5e483 100644 --- a/src/clients/ksu/ccache.c +++ b/src/clients/ksu/ccache.c @@ -236,7 +236,7 @@ int chunk_count = 1; if (auth_debug){ fprintf(stderr,"krb5_ccache_copy: CREDS EXPIRED:\n"); fputs(" Valid starting Expires Service principal\n",stdout); - show_credential(&creds, cc); + show_credential(context, &creds, cc); fprintf(stderr,"\n"); } } diff --git a/src/clients/ksu/krb_auth_su.c b/src/clients/ksu/krb_auth_su.c index cc413bec8..1b924a965 100644 --- a/src/clients/ksu/krb_auth_su.c +++ b/src/clients/ksu/krb_auth_su.c @@ -82,7 +82,7 @@ krb5_boolean zero_password; } if (auth_debug) - { dump_principal("krb5_auth_check: Client principal name", client); } + { dump_principal(context, "krb5_auth_check: Client principal name", client); } if ( retval = krb5_sname_to_principal(context, hostname, NULL, KRB5_NT_SRV_HST, &server)){ @@ -93,7 +93,7 @@ krb5_boolean zero_password; } if (auth_debug) - { dump_principal("krb5_auth_check: Server principal name", server); } + { dump_principal(context, "krb5_auth_check: Server principal name", server); } @@ -123,7 +123,7 @@ krb5_boolean zero_password; return (FALSE) ; } - if (auth_debug){ dump_principal("local tgt principal name", tgtq.server ); } + if (auth_debug){ dump_principal(context, "local tgt principal name", tgtq.server ); } retval = krb5_cc_retrieve_cred(context, cc, KRB5_TC_MATCH_SRV_NAMEONLY, &tgtq, &tgt); @@ -181,7 +181,7 @@ krb5_boolean zero_password; if (auth_debug){ fprintf(stderr,"krb5_auth_check: got ticket for end server \n"); - dump_principal("out_creds->server", out_creds->server ); + dump_principal(context, "out_creds->server", out_creds->server ); } @@ -293,8 +293,8 @@ krb5_keyblock * tkt_ses_key; if (auth_debug){ fprintf(stderr,"krb5_verify_tkt_def: verified target server\n"); - dump_principal("server", server); - dump_principal("tkt->server", tkt->server); + dump_principal(context, "server", server); + dump_principal(context, "tkt->server", tkt->server); } /* get the default keytab */ @@ -340,8 +340,8 @@ krb5_keyblock * tkt_ses_key; if (auth_debug){ fprintf(stderr, "krb5_verify_tkt_def: verified client's identity\n"); - dump_principal("client", client); - dump_principal("tkt->enc_part2->client",tkt->enc_part2->client); + dump_principal(context, "client", client); + dump_principal(context, "tkt->enc_part2->client",tkt->enc_part2->client); } tkt_ses_key = tkt->enc_part2->session; -- 2.26.2