summaryrefslogtreecommitdiffstats
path: root/src/clients/ksu
diff options
context:
space:
mode:
authorEzra Peisach <epeisach@mit.edu>1995-05-09 21:41:21 +0000
committerEzra Peisach <epeisach@mit.edu>1995-05-09 21:41:21 +0000
commit24d78185a60d516c1b8cbc41dfdad38a39d01988 (patch)
treef771d0a7e792edf60042abca65e98b19cddca3c1 /src/clients/ksu
parentbdbf25c6f59544b8c7b10ac61abecf8556fd69c1 (diff)
downloadkrb5-24d78185a60d516c1b8cbc41dfdad38a39d01988.tar.gz
krb5-24d78185a60d516c1b8cbc41dfdad38a39d01988.tar.xz
krb5-24d78185a60d516c1b8cbc41dfdad38a39d01988.zip
More missing contexts
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@5788 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/clients/ksu')
-rw-r--r--src/clients/ksu/ChangeLog6
-rw-r--r--src/clients/ksu/ccache.c2
-rw-r--r--src/clients/ksu/krb_auth_su.c16
3 files changed, 15 insertions, 9 deletions
diff --git a/src/clients/ksu/ChangeLog b/src/clients/ksu/ChangeLog
index 9559c6dc8a..be24cb81ed 100644
--- a/src/clients/ksu/ChangeLog
+++ b/src/clients/ksu/ChangeLog
@@ -1,5 +1,11 @@
Tue May 9 15:52:15 1995 Ezra Peisach <epeisach@kangaroo.mit.edu>
+ * krb_auth_su.c (krb5_auth_check): Add missing context
+ (wolfgang@wsrcc.com)
+
+ * ccache.c (krb5_get_nonexp_tkts): Add missing context
+ (wolfgang@wsrcc.com)
+
* heuristic.c (get_best_princ_for_target): Missing context cuased
coredump.
(get_best_princ_for_target): Missing contexts in call to
diff --git a/src/clients/ksu/ccache.c b/src/clients/ksu/ccache.c
index 20bcbb2417..f3dd5e4838 100644
--- a/src/clients/ksu/ccache.c
+++ b/src/clients/ksu/ccache.c
@@ -236,7 +236,7 @@ int chunk_count = 1;
if (auth_debug){
fprintf(stderr,"krb5_ccache_copy: CREDS EXPIRED:\n");
fputs(" Valid starting Expires Service principal\n",stdout);
- show_credential(&creds, cc);
+ show_credential(context, &creds, cc);
fprintf(stderr,"\n");
}
}
diff --git a/src/clients/ksu/krb_auth_su.c b/src/clients/ksu/krb_auth_su.c
index cc413bec84..1b924a965f 100644
--- a/src/clients/ksu/krb_auth_su.c
+++ b/src/clients/ksu/krb_auth_su.c
@@ -82,7 +82,7 @@ krb5_boolean zero_password;
}
if (auth_debug)
- { dump_principal("krb5_auth_check: Client principal name", client); }
+ { dump_principal(context, "krb5_auth_check: Client principal name", client); }
if ( retval = krb5_sname_to_principal(context, hostname, NULL,
KRB5_NT_SRV_HST, &server)){
@@ -93,7 +93,7 @@ krb5_boolean zero_password;
}
if (auth_debug)
- { dump_principal("krb5_auth_check: Server principal name", server); }
+ { dump_principal(context, "krb5_auth_check: Server principal name", server); }
@@ -123,7 +123,7 @@ krb5_boolean zero_password;
return (FALSE) ;
}
- if (auth_debug){ dump_principal("local tgt principal name", tgtq.server ); }
+ if (auth_debug){ dump_principal(context, "local tgt principal name", tgtq.server ); }
retval = krb5_cc_retrieve_cred(context, cc, KRB5_TC_MATCH_SRV_NAMEONLY,
&tgtq, &tgt);
@@ -181,7 +181,7 @@ krb5_boolean zero_password;
if (auth_debug){
fprintf(stderr,"krb5_auth_check: got ticket for end server \n");
- dump_principal("out_creds->server", out_creds->server );
+ dump_principal(context, "out_creds->server", out_creds->server );
}
@@ -293,8 +293,8 @@ krb5_keyblock * tkt_ses_key;
if (auth_debug){
fprintf(stderr,"krb5_verify_tkt_def: verified target server\n");
- dump_principal("server", server);
- dump_principal("tkt->server", tkt->server);
+ dump_principal(context, "server", server);
+ dump_principal(context, "tkt->server", tkt->server);
}
/* get the default keytab */
@@ -340,8 +340,8 @@ krb5_keyblock * tkt_ses_key;
if (auth_debug){
fprintf(stderr,
"krb5_verify_tkt_def: verified client's identity\n");
- dump_principal("client", client);
- dump_principal("tkt->enc_part2->client",tkt->enc_part2->client);
+ dump_principal(context, "client", client);
+ dump_principal(context, "tkt->enc_part2->client",tkt->enc_part2->client);
}
tkt_ses_key = tkt->enc_part2->session;