diff options
author | Günther Deschner <gd@samba.org> | 2004-11-01 19:35:55 +0000 |
---|---|---|
committer | Günther Deschner <gd@samba.org> | 2004-11-01 19:35:55 +0000 |
commit | 7d56b59a421dfacae72c36da30595da23a3e7b8f (patch) | |
tree | d3b1a66c3ec7ba814ed6a569e8bdb0f57b8df371 /source | |
parent | f9731dbcbed5d417a41d4df59a63b9192f4a37e7 (diff) | |
download | samba-7d56b59a421dfacae72c36da30595da23a3e7b8f.tar.gz samba-7d56b59a421dfacae72c36da30595da23a3e7b8f.tar.xz samba-7d56b59a421dfacae72c36da30595da23a3e7b8f.zip |
r3439: Finally fix build for platforms without kerberos.
Guenther
Diffstat (limited to 'source')
-rw-r--r-- | source/libads/kerberos.c | 4 | ||||
-rw-r--r-- | source/libsmb/clikrb5.c | 8 |
2 files changed, 6 insertions, 6 deletions
diff --git a/source/libads/kerberos.c b/source/libads/kerberos.c index dc1edb3cde5..6004bc8098b 100644 --- a/source/libads/kerberos.c +++ b/source/libads/kerberos.c @@ -247,7 +247,7 @@ krb5_principal kerberos_fetch_salt_princ_for_host_princ(krb5_context context, Setting principal to NULL deletes this entry. ************************************************************************/ -BOOL kerberos_secrets_store_salting_principal(const char *service, + BOOL kerberos_secrets_store_salting_principal(const char *service, int enctype, const char *principal) { @@ -602,7 +602,7 @@ static void kerberos_derive_salting_principal_for_enctype(const char *service_pr Go through all the possible enctypes for this principal. ************************************************************************/ -void kerberos_derive_salting_principal(krb5_context context, + void kerberos_derive_salting_principal(krb5_context context, krb5_ccache ccache, krb5_enctype *enctypes, char *service_principal) diff --git a/source/libsmb/clikrb5.c b/source/libsmb/clikrb5.c index af0273853f8..5c5584763c4 100644 --- a/source/libsmb/clikrb5.c +++ b/source/libsmb/clikrb5.c @@ -123,7 +123,7 @@ #error UNKNOWN_CREATE_KEY_FUNCTIONS #endif -int create_kerberos_key_from_string(krb5_context context, + int create_kerberos_key_from_string(krb5_context context, krb5_principal host_princ, krb5_data *password, krb5_keyblock *key, @@ -272,7 +272,7 @@ int create_kerberos_key_from_string(krb5_context context, } #endif -void kerberos_free_data_contents(krb5_context context, krb5_data *pdata) + void kerberos_free_data_contents(krb5_context context, krb5_data *pdata) { #if defined(HAVE_KRB5_FREE_DATA_CONTENTS) if (pdata->data) { @@ -283,7 +283,7 @@ void kerberos_free_data_contents(krb5_context context, krb5_data *pdata) #endif } -void kerberos_set_creds_enctype(krb5_creds *pcreds, int enctype) + void kerberos_set_creds_enctype(krb5_creds *pcreds, int enctype) { #if defined(HAVE_KRB5_KEYBLOCK_IN_CREDS) KRB5_KEY_TYPE((&pcreds->keyblock)) = enctype; @@ -294,7 +294,7 @@ void kerberos_set_creds_enctype(krb5_creds *pcreds, int enctype) #endif } -BOOL kerberos_compatible_enctypes(krb5_context context, + BOOL kerberos_compatible_enctypes(krb5_context context, krb5_enctype enctype1, krb5_enctype enctype2) { |