diff options
author | Jim McDonough <jmcd@samba.org> | 2003-05-30 20:11:34 +0000 |
---|---|---|
committer | Jim McDonough <jmcd@samba.org> | 2003-05-30 20:11:34 +0000 |
commit | 10f1da3f4a9680a039a2aa26301b97e31c06c38d (patch) | |
tree | 406aeefdfaa28de50f44b3298719b47100523e1c | |
parent | 4169de6d8fb1b13de3892ec787886cc1543736a1 (diff) | |
download | samba-10f1da3f4a9680a039a2aa26301b97e31c06c38d.tar.gz samba-10f1da3f4a9680a039a2aa26301b97e31c06c38d.tar.xz samba-10f1da3f4a9680a039a2aa26301b97e31c06c38d.zip |
More on bug 137: rename more of krb5_xxx functions to not start with krb5_
-rw-r--r-- | source/include/includes.h | 2 | ||||
-rw-r--r-- | source/libads/kerberos_verify.c | 2 | ||||
-rw-r--r-- | source/libsmb/clikrb5.c | 28 | ||||
-rw-r--r-- | source/libsmb/clispnego.c | 2 |
4 files changed, 17 insertions, 17 deletions
diff --git a/source/include/includes.h b/source/include/includes.h index 2548db015da..4de81c46d28 100644 --- a/source/include/includes.h +++ b/source/include/includes.h @@ -1276,7 +1276,7 @@ krb5_const_principal get_principal_from_tkt(krb5_ticket *tkt); krb5_error_code krb5_locate_kdc(krb5_context ctx, const krb5_data *realm, struct sockaddr **addr_pp, int *naddrs, int get_masters); krb5_error_code get_kerberos_allowed_etypes(krb5_context context, krb5_enctype **enctypes); void free_kerberos_etypes(krb5_context context, krb5_enctype *enctypes); -BOOL krb5_get_smb_session_key(krb5_context context, krb5_auth_context auth_context, uint8 session_key[16]); +BOOL get_krb5_smb_session_key(krb5_context context, krb5_auth_context auth_context, uint8 session_key[16]); #endif /* HAVE_KRB5 */ /* TRUE and FALSE are part of the C99 standard and gcc, but diff --git a/source/libads/kerberos_verify.c b/source/libads/kerberos_verify.c index 35d429ca2ab..a262e27526a 100644 --- a/source/libads/kerberos_verify.c +++ b/source/libads/kerberos_verify.c @@ -138,7 +138,7 @@ NTSTATUS ads_verify_ticket(ADS_STRUCT *ads, const DATA_BLOB *ticket, *ap_rep = data_blob(packet.data, packet.length); free(packet.data); - krb5_get_smb_session_key(context, auth_context, session_key); + get_krb5_smb_session_key(context, auth_context, session_key); DEBUG(0,("SMB session key (from ticket) follows:\n")); dump_data(0, session_key, 16); diff --git a/source/libsmb/clikrb5.c b/source/libsmb/clikrb5.c index 5edc56daa9b..df6043a618b 100644 --- a/source/libsmb/clikrb5.c +++ b/source/libsmb/clikrb5.c @@ -235,12 +235,12 @@ krb5_error_code get_kerberos_allowed_etypes(krb5_context context, /* we can't use krb5_mk_req because w2k wants the service to be in a particular format */ -static krb5_error_code krb5_mk_req2(krb5_context context, - krb5_auth_context *auth_context, - const krb5_flags ap_req_options, - const char *principal, - krb5_ccache ccache, - krb5_data *outbuf) +static krb5_error_code ads_krb5_mk_req(krb5_context context, + krb5_auth_context *auth_context, + const krb5_flags ap_req_options, + const char *principal, + krb5_ccache ccache, + krb5_data *outbuf) { krb5_error_code retval; krb5_principal server; @@ -305,7 +305,7 @@ cleanup_princ: /* get a kerberos5 ticket for the given service */ -DATA_BLOB krb5_get_ticket(const char *principal, time_t time_offset) +DATA_BLOB cli_krb5_get_ticket(const char *principal, time_t time_offset) { krb5_error_code retval; krb5_data packet; @@ -344,11 +344,11 @@ DATA_BLOB krb5_get_ticket(const char *principal, time_t time_offset) goto failed; } - if ((retval = krb5_mk_req2(context, - &auth_context, - 0, - principal, - ccdef, &packet))) { + if ((retval = ads_krb5_mk_req(context, + &auth_context, + 0, + principal, + ccdef, &packet))) { goto failed; } @@ -365,7 +365,7 @@ failed: return data_blob(NULL, 0); } - BOOL krb5_get_smb_session_key(krb5_context context, krb5_auth_context auth_context, uint8 session_key[16]) + BOOL get_krb5_smb_session_key(krb5_context context, krb5_auth_context auth_context, uint8 session_key[16]) { #ifdef ENCTYPE_ARCFOUR_HMAC krb5_keyblock *skey; @@ -390,7 +390,7 @@ failed: } #else /* HAVE_KRB5 */ /* this saves a few linking headaches */ -DATA_BLOB krb5_get_ticket(const char *principal, time_t time_offset) +DATA_BLOB cli_krb5_get_ticket(const char *principal, time_t time_offset) { DEBUG(0,("NO KERBEROS SUPPORT\n")); return data_blob(NULL, 0); diff --git a/source/libsmb/clispnego.c b/source/libsmb/clispnego.c index 53f7eb6e7d9..bb48f579151 100644 --- a/source/libsmb/clispnego.c +++ b/source/libsmb/clispnego.c @@ -329,7 +329,7 @@ DATA_BLOB spnego_gen_negTokenTarg(const char *principal, int time_offset) const char *krb_mechs[] = {OID_KERBEROS5_OLD, OID_NTLMSSP, NULL}; /* get a kerberos ticket for the service */ - tkt = krb5_get_ticket(principal, time_offset); + tkt = cli_krb5_get_ticket(principal, time_offset); /* wrap that up in a nice GSS-API wrapping */ tkt_wrapped = spnego_gen_krb5_wrap(tkt, TOK_ID_KRB_AP_REQ); |