summaryrefslogtreecommitdiffstats
path: root/src/kadmin
diff options
context:
space:
mode:
authorPaul Park <pjpark@mit.edu>1995-08-04 20:35:33 +0000
committerPaul Park <pjpark@mit.edu>1995-08-04 20:35:33 +0000
commit976321dd16134dd23eeb3f1d7ebd6b2b72937440 (patch)
tree4efdd78c2d27053903711d94860cd9a4cd9d5420 /src/kadmin
parentc1406c5a1fd18a055e4e98bb4c52716dbd4b8be5 (diff)
downloadkrb5-976321dd16134dd23eeb3f1d7ebd6b2b72937440.tar.gz
krb5-976321dd16134dd23eeb3f1d7ebd6b2b72937440.tar.xz
krb5-976321dd16134dd23eeb3f1d7ebd6b2b72937440.zip
Make passwd_check_opass_ok() available
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@6417 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/kadmin')
-rw-r--r--src/kadmin/v5server/passwd.c13
1 files changed, 7 insertions, 6 deletions
diff --git a/src/kadmin/v5server/passwd.c b/src/kadmin/v5server/passwd.c
index 43ab083d84..63453547d5 100644
--- a/src/kadmin/v5server/passwd.c
+++ b/src/kadmin/v5server/passwd.c
@@ -105,7 +105,7 @@ passwd_check_princ(kcontext, debug_level, ticket,
/*
* passwd_check_opass_ok() - Check of specified old password is good.
*/
-static krb5_boolean
+krb5_boolean
passwd_check_opass_ok(kcontext, debug_level, princ, dbentp, pwdata)
krb5_context kcontext;
int debug_level;
@@ -131,6 +131,8 @@ passwd_check_opass_ok(kcontext, debug_level, princ, dbentp, pwdata)
kret = key_string_to_keys(kcontext,
dbentp,
pwdata,
+ 0,
+ (krb5_key_salt_tuple *) NULL,
&num_keys,
&key_list);
@@ -207,6 +209,8 @@ passwd_set_npass(kcontext, debug_level, princ, dbentp, pwdata)
if (kret = key_string_to_keys(kcontext,
dbentp,
pwdata,
+ 0,
+ (krb5_key_salt_tuple *) NULL,
&num_keys,
&key_list))
goto cleanup;
@@ -246,10 +250,7 @@ passwd_set_npass(kcontext, debug_level, princ, dbentp, pwdata)
/* Set the time for last successful password change */
if (kret = krb5_timeofday(kcontext, &now))
goto cleanup;
- pwchg->tl_data_contents[0] = (unsigned char) ((now >> 24) & 0xff);
- pwchg->tl_data_contents[1] = (unsigned char) ((now >> 16) & 0xff);
- pwchg->tl_data_contents[2] = (unsigned char) ((now >> 8) & 0xff);
- pwchg->tl_data_contents[3] = (unsigned char) (now & 0xff);
+ krb5_kdb_encode_int32(now, pwchg->tl_data_contents);
}
else {
kret = ENOMEM;
@@ -272,7 +273,7 @@ passwd_set_npass(kcontext, debug_level, princ, dbentp, pwdata)
goto cleanup;
if (nwrite != 1)
- kret = KRB_ERR_GENERIC;
+ kret = KRB5KRB_ERR_GENERIC;
(void) krb5_db_free_principal(kcontext, &entry2write, 1);