summaryrefslogtreecommitdiffstats
path: root/source3/libsmb/clikrb5.c
Commit message (Expand)AuthorAgeFilesLines
* r19416: Fix some c++ warnings.Günther Deschner2007-10-101-2/+2
* r19374: fix the build with heimdalStefan Metzmacher2007-10-101-1/+1
* r19291: this should fix the build on heimdal systemsStefan Metzmacher2007-10-101-1/+0
* r19270: Stop depending on internal MIT symbols. These are private on MacOSJames Peach2007-10-101-47/+56
* r19237: fix typoStefan Metzmacher2007-10-101-1/+1
* r17162: Fix typo small typos noticed by Paul Green.Gerald Carter2007-10-101-1/+1
* r16960: Some warnings from host "opi"Volker Lendecke2007-10-101-1/+1
* r16945: Sync trunk -> 3.0 for 3.0.24 code. Still needJeremy Allison2007-10-101-1/+1
* r16269: Fix the build.Günther Deschner2007-10-101-3/+3
* r16268: Add TCP fallback for our implementation of the CHANGEPW kpasswd calls.Günther Deschner2007-10-101-1/+58
* r15243: Sorry for the breakage:Günther Deschner2007-10-101-0/+9
* r15240: Correctly disallow unauthorized access when logging on with theGünther Deschner2007-10-101-0/+98
* r15216: Fix the build for machines without krb5. Oops, sorry.Jeremy Allison2007-10-101-2/+2
* r15210: Add wrapper functions smb_krb5_parse_name, smb_krb5_unparse_name,Jeremy Allison2007-10-101-10/+83
* r14506: Remove remaining references to a KCM credential cache type.Günther Deschner2007-10-101-1/+1
* r14218: Fix Coverity Bug # 2Volker Lendecke2007-10-101-5/+0
* r13316: Let the carnage begin....Gerald Carter2007-10-101-12/+159
* r13020: Prevent cli_krb5_get_ticket of getting into an infite loop. This wholeGünther Deschner2007-10-101-1/+4
* r13012: Fix #3421 - it turns out krb5_kt_get_entry() on MITJeremy Allison2007-10-101-12/+12
* r11551: Add a few more initialize_krb5_error_tableVolker Lendecke2007-10-101-0/+1
* r10907: Handle the case when we can't verify the PAC signature because theGünther Deschner2007-10-101-0/+6
* r10671: Attempt to fix the build on machines without kerberos headers.Volker Lendecke2007-10-101-9/+9
* r10656: BIG merge from trunk. Features not copied overGerald Carter2007-10-101-10/+441
* r10210: Fix memleak.Günther Deschner2007-10-101-2/+4
* r6586: get rid of a few more compiler warningsHerb Lewis2007-10-101-1/+3
* r6392: - Fixes bug 2564: when smbc_opendir() was called with a file rather thanDerrell Lipman2007-10-101-2/+2
* r6149: Fixes bugs #2498 and 2484.Derrell Lipman2007-10-101-0/+3
* r4291: More *alloc fixes inspired by Albert Chin (china@thewrittenword.com).Jeremy Allison2007-10-101-3/+2
* r4020: Fix for crash reported by Bård Kalbakk <baard@inett.biz>.Jeremy Allison2007-10-101-1/+1
* r3538: Fix the build with the latest Heimdal code.Jeremy Allison2007-10-101-1/+1
* r3535: Tidy up error reporting. Memory leak with MIT krb5 1.3.5 turnsJeremy Allison2007-10-101-11/+13
* r3439: Finally fix build for platforms without kerberos.Günther Deschner2007-10-101-4/+4
* r3407: Fix the buildVolker Lendecke2007-10-101-1/+1
* r3379: More merging of kerberos keytab and salting fixes from Nalin Dahyabhai...Jeremy Allison2007-10-101-2/+2
* r3377: Merge in first part of modified patch from Nalin Dahyabhai <nalin@redh...Jeremy Allison2007-10-101-9/+38
* r3345: More MIT/Heimdal tests for comparing enctypes now.Jeremy Allison2007-10-101-0/+14
* r3342: More MIT/Heimdal fixes to allow an enctype to be explicitly set in a k...Jeremy Allison2007-10-101-0/+11
* r2474: (re-)fix memleak (initially found by jra).Günther Deschner2007-10-101-6/+0
* r2472: Fixed krb5_krbhost_get_addrinfo()-parameters and make failureGünther Deschner2007-10-101-3/+3
* r2057: Although rarely used, prevent "net lookup kdc" from segfaulting whenGünther Deschner2007-10-101-1/+11
* r1428: Remove *completly bogus* memset. (No doubt my bug, too...).Andrew Bartlett2007-10-101-2/+0
* r1407: revert change that broke the build on systems w/o krb5 filesGerald Carter2007-10-101-1/+1
* r1399: applying heimdal krb5 fixes from Guenther and fixing compile warnings ...Gerald Carter2007-10-101-1/+3
* r1287: Attempt to fix the build for systems without kerberos headers.Volker Lendecke2007-10-101-3/+3
* r1236: Heimdal fixes from Guenther Deschner <gd@sernet.de>, more to come beforeJeremy Allison2007-10-101-0/+11
* r1222: Valgrind memory leak fixes. Still tracking down a strange one...Jeremy Allison2007-10-101-3/+4
* r1194: Definition of krb5_free_unparsed_name() if we do't have it.Jeremy Allison2007-10-101-0/+7
* r541: fixing segfault in winbindd caused -r527 -- looks like a bug in heimdal...Gerald Carter2007-10-101-1/+4
* r527: More memory leak fixes in error paths from kawasa_r@itg.hitachi.co.jp.Jeremy Allison2007-10-101-2/+8
* r221: Remainder of bug 1208. We do not remove creds from _any_ FILE ccache,Jim McDonough2007-10-101-17/+40
values, but store them * in signed int. Therefore we need this one: * dies if input is not in [0, INT_MAX] range. Also will reject '-0' etc. * It should really be named xatoi_nonnegative (since it allows 0), * but that would be too long. */ #define xatoi_positive abrt_xatoi_positive int xatoi_positive(const char *numstr); //unused for now //unsigned long long monotonic_ns(void); //unsigned long long monotonic_us(void); //unsigned monotonic_sec(void); enum { /* on return, pipefds[1] is fd to which parent may write * and deliver data to child's stdin: */ EXECFLG_INPUT = 1 << 0, /* on return, pipefds[0] is fd from which parent may read * child's stdout: */ EXECFLG_OUTPUT = 1 << 1, /* open child's stdin to /dev/null: */ EXECFLG_INPUT_NUL = 1 << 2, /* open child's stdout to /dev/null: */ EXECFLG_OUTPUT_NUL = 1 << 3, /* redirect child's stderr to stdout: */ EXECFLG_ERR2OUT = 1 << 4, /* open child's stderr to /dev/null: */ EXECFLG_ERR_NUL = 1 << 5, /* suppress perror_msg("Can't execute 'foo'") if exec fails */ EXECFLG_QUIET = 1 << 6, EXECFLG_SETGUID = 1 << 7, EXECFLG_SETSID = 1 << 8, }; /* * env_vec: list of variables to set in environment (if string has * "VAR=VAL" form) or unset in environment (if string has no '=' char). * * Returns pid. */ #define fork_execv_on_steroids abrt_fork_execv_on_steroids pid_t fork_execv_on_steroids(int flags, char **argv, int *pipefds, char **env_vec, const char *dir, uid_t uid); /* Returns malloc'ed string. NULs are retained, and extra one is appended * after the last byte (this NUL is not accounted for in *size_p) */ #define run_in_shell_and_save_output abrt_run_in_shell_and_save_output char *run_in_shell_and_save_output(int flags, const char *cmd, const char *dir, size_t *size_p); /* Random utility functions */ /* Frees every element'd data using free(), * then frees list itself using g_list_free(list): */ #define list_free_with_free abrt_list_free_with_free void list_free_with_free(GList *list); #define get_dirsize abrt_get_dirsize double get_dirsize(const char *pPath); #define get_dirsize_find_largest_dir abrt_get_dirsize_find_largest_dir double get_dirsize_find_largest_dir( const char *pPath, char **worst_dir, /* can be NULL */ const char *excluded /* can be NULL */ ); /* Emit a string of hex representation of bytes */ #define bin2hex abrt_bin2hex char* bin2hex(char *dst, const char *str, int count); /* Convert "xxxxxxxx" hex string to binary, no more than COUNT bytes */ #define hex2bin abrt_hex2bin char* hex2bin(char *dst, const char *str, int count); /* Returns command line of running program. * Caller is responsible to free() the returned value. * If the pid is not valid or command line can not be obtained, * empty string is returned. */ #define get_cmdline abrt_get_cmdline char* get_cmdline(pid_t pid); /* Returns 1 if abrtd daemon is running, 0 otherwise. */ #define daemon_is_ok abrt_daemon_is_ok int daemon_is_ok(); /* Takes ptr to time_t, or NULL if you want to use current time. * Returns "YYYY-MM-DD-hh:mm:ss" string. */ #define iso_date_string abrt_iso_date_string char *iso_date_string(time_t *pt); #define make_description_bz abrt_make_description_bz char* make_description_bz(crash_data_t *crash_data); #define make_description_comment abrt_make_description_comment char* make_description_comment(crash_data_t *crash_data); #define make_description_logger abrt_make_description_logger char* make_description_logger(crash_data_t *crash_data); #define make_description_mailx abrt_make_description_mailx char* make_description_mailx(crash_data_t *crash_data); #define parse_release_for_bz abrt_parse_release_for_bz void parse_release_for_bz(const char *pRelease, char **product, char **version); #define parse_release_for_rhts abrt_parse_release_for_rhts void parse_release_for_rhts(const char *pRelease, char **product, char **version); /** * Loads settings and stores it in second parameter. On success it * returns true, otherwise returns false. * * @param path A path of config file. * Config file consists of "key=value" lines. * @param settings A read plugin's settings. * @param skipKeysWithoutValue * If true, lines in format "key=" (without value) are skipped. * Otherwise empty value "" is inserted into pSettings. * @return if it success it returns true, otherwise it returns false. */ #define load_conf_file abrt_load_conf_file bool load_conf_file(const char *pPath, map_string_h *settings, bool skipKeysWithoutValue); /* Tries to create a copy of dump_dir_name in base_dir, with same or similar basename. * Returns NULL if copying failed. In this case, logs a message before returning. */ #define steal_directory abrt_steal_directory struct dump_dir *steal_directory(const char *base_dir, const char *dump_dir_name); #ifdef __cplusplus } #endif #endif