diff options
author | Ezra Peisach <epeisach@mit.edu> | 1995-05-09 21:41:21 +0000 |
---|---|---|
committer | Ezra Peisach <epeisach@mit.edu> | 1995-05-09 21:41:21 +0000 |
commit | 24d78185a60d516c1b8cbc41dfdad38a39d01988 (patch) | |
tree | f771d0a7e792edf60042abca65e98b19cddca3c1 /src/clients/ksu | |
parent | bdbf25c6f59544b8c7b10ac61abecf8556fd69c1 (diff) | |
download | krb5-24d78185a60d516c1b8cbc41dfdad38a39d01988.tar.gz krb5-24d78185a60d516c1b8cbc41dfdad38a39d01988.tar.xz krb5-24d78185a60d516c1b8cbc41dfdad38a39d01988.zip |
More missing contexts
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@5788 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/clients/ksu')
-rw-r--r-- | src/clients/ksu/ChangeLog | 6 | ||||
-rw-r--r-- | src/clients/ksu/ccache.c | 2 | ||||
-rw-r--r-- | src/clients/ksu/krb_auth_su.c | 16 |
3 files changed, 15 insertions, 9 deletions
diff --git a/src/clients/ksu/ChangeLog b/src/clients/ksu/ChangeLog index 9559c6dc8a..be24cb81ed 100644 --- a/src/clients/ksu/ChangeLog +++ b/src/clients/ksu/ChangeLog @@ -1,5 +1,11 @@ Tue May 9 15:52:15 1995 Ezra Peisach <epeisach@kangaroo.mit.edu> + * krb_auth_su.c (krb5_auth_check): Add missing context + (wolfgang@wsrcc.com) + + * ccache.c (krb5_get_nonexp_tkts): Add missing context + (wolfgang@wsrcc.com) + * heuristic.c (get_best_princ_for_target): Missing context cuased coredump. (get_best_princ_for_target): Missing contexts in call to diff --git a/src/clients/ksu/ccache.c b/src/clients/ksu/ccache.c index 20bcbb2417..f3dd5e4838 100644 --- a/src/clients/ksu/ccache.c +++ b/src/clients/ksu/ccache.c @@ -236,7 +236,7 @@ int chunk_count = 1; if (auth_debug){ fprintf(stderr,"krb5_ccache_copy: CREDS EXPIRED:\n"); fputs(" Valid starting Expires Service principal\n",stdout); - show_credential(&creds, cc); + show_credential(context, &creds, cc); fprintf(stderr,"\n"); } } diff --git a/src/clients/ksu/krb_auth_su.c b/src/clients/ksu/krb_auth_su.c index cc413bec84..1b924a965f 100644 --- a/src/clients/ksu/krb_auth_su.c +++ b/src/clients/ksu/krb_auth_su.c @@ -82,7 +82,7 @@ krb5_boolean zero_password; } if (auth_debug) - { dump_principal("krb5_auth_check: Client principal name", client); } + { dump_principal(context, "krb5_auth_check: Client principal name", client); } if ( retval = krb5_sname_to_principal(context, hostname, NULL, KRB5_NT_SRV_HST, &server)){ @@ -93,7 +93,7 @@ krb5_boolean zero_password; } if (auth_debug) - { dump_principal("krb5_auth_check: Server principal name", server); } + { dump_principal(context, "krb5_auth_check: Server principal name", server); } @@ -123,7 +123,7 @@ krb5_boolean zero_password; return (FALSE) ; } - if (auth_debug){ dump_principal("local tgt principal name", tgtq.server ); } + if (auth_debug){ dump_principal(context, "local tgt principal name", tgtq.server ); } retval = krb5_cc_retrieve_cred(context, cc, KRB5_TC_MATCH_SRV_NAMEONLY, &tgtq, &tgt); @@ -181,7 +181,7 @@ krb5_boolean zero_password; if (auth_debug){ fprintf(stderr,"krb5_auth_check: got ticket for end server \n"); - dump_principal("out_creds->server", out_creds->server ); + dump_principal(context, "out_creds->server", out_creds->server ); } @@ -293,8 +293,8 @@ krb5_keyblock * tkt_ses_key; if (auth_debug){ fprintf(stderr,"krb5_verify_tkt_def: verified target server\n"); - dump_principal("server", server); - dump_principal("tkt->server", tkt->server); + dump_principal(context, "server", server); + dump_principal(context, "tkt->server", tkt->server); } /* get the default keytab */ @@ -340,8 +340,8 @@ krb5_keyblock * tkt_ses_key; if (auth_debug){ fprintf(stderr, "krb5_verify_tkt_def: verified client's identity\n"); - dump_principal("client", client); - dump_principal("tkt->enc_part2->client",tkt->enc_part2->client); + dump_principal(context, "client", client); + dump_principal(context, "tkt->enc_part2->client",tkt->enc_part2->client); } tkt_ses_key = tkt->enc_part2->session; |