diff options
| author | Greg Hudson <ghudson@mit.edu> | 2014-05-24 12:15:32 -0400 |
|---|---|---|
| committer | Greg Hudson <ghudson@mit.edu> | 2014-06-05 11:22:50 -0400 |
| commit | a7b5808b5df9e54ef8a8a7ac24e5faad458ddbce (patch) | |
| tree | b98160b39c648d8b1d967fa3b1b885b9232f74d1 /src/lib/kadm5/srv | |
| parent | 06b91d1e2341601e5bdc70a15737187545d68196 (diff) | |
Use k5_setmsg
Replace most calls to krb5_set_error_message with k5_setmsg for
brevity. Leave alone plugin sources where we don't include k5-int.h
(mostly PKINIT).
Diffstat (limited to 'src/lib/kadm5/srv')
| -rw-r--r-- | src/lib/kadm5/srv/pwqual_empty.c | 6 | ||||
| -rw-r--r-- | src/lib/kadm5/srv/pwqual_hesiod.c | 7 | ||||
| -rw-r--r-- | src/lib/kadm5/srv/pwqual_princ.c | 6 | ||||
| -rw-r--r-- | src/lib/kadm5/srv/server_kdb.c | 4 |
4 files changed, 11 insertions, 12 deletions
diff --git a/src/lib/kadm5/srv/pwqual_empty.c b/src/lib/kadm5/srv/pwqual_empty.c index 67118db01..1fc9b7bc3 100644 --- a/src/lib/kadm5/srv/pwqual_empty.c +++ b/src/lib/kadm5/srv/pwqual_empty.c @@ -26,7 +26,7 @@ /* Password quality module to reject empty passwords */ -#include "k5-platform.h" +#include "k5-int.h" #include <krb5/pwqual_plugin.h> #include "server_internal.h" @@ -38,8 +38,8 @@ empty_check(krb5_context context, krb5_pwqual_moddata data, /* Unlike other built-in modules, this one operates even for principals * with no password policy. */ if (*password == '\0') { - krb5_set_error_message(context, KADM5_PASS_Q_TOOSHORT, - _("Empty passwords are not allowed")); + k5_setmsg(context, KADM5_PASS_Q_TOOSHORT, + _("Empty passwords are not allowed")); return KADM5_PASS_Q_TOOSHORT; } return 0; diff --git a/src/lib/kadm5/srv/pwqual_hesiod.c b/src/lib/kadm5/srv/pwqual_hesiod.c index 28959d76e..7c82bba90 100644 --- a/src/lib/kadm5/srv/pwqual_hesiod.c +++ b/src/lib/kadm5/srv/pwqual_hesiod.c @@ -29,7 +29,7 @@ * passwd information, if the tree is compiled with Hesiod support. */ -#include "k5-platform.h" +#include "k5-int.h" #include <krb5/pwqual_plugin.h> #include "server_internal.h" #include <ctype.h> @@ -110,9 +110,8 @@ hesiod_check(krb5_context context, krb5_pwqual_moddata data, for (i = 0; i < n; i++) { ent = hes_getpwnam(cp); if (ent && ent->pw_gecos && str_check_gecos(ent->pw_gecos, password)) { - krb5_set_error_message(context, KADM5_PASS_Q_DICT, - _("Password may not match user " - "information.")); + k5_setmsg(context, KADM5_PASS_Q_DICT, + _("Password may not match user information.")); return KADM5_PASS_Q_DICT; } } diff --git a/src/lib/kadm5/srv/pwqual_princ.c b/src/lib/kadm5/srv/pwqual_princ.c index cbf2d7205..14012e59c 100644 --- a/src/lib/kadm5/srv/pwqual_princ.c +++ b/src/lib/kadm5/srv/pwqual_princ.c @@ -26,7 +26,7 @@ /* Password quality module to check passwords against principal components */ -#include "k5-platform.h" +#include "k5-int.h" #include <krb5/pwqual_plugin.h> #include "server_internal.h" @@ -50,8 +50,8 @@ princ_check(krb5_context context, krb5_pwqual_moddata data, for (i = 0; i < n; i++) { cp = krb5_princ_component(handle->context, princ, i)->data; if (strcasecmp(cp, password) == 0) { - krb5_set_error_message(context, KADM5_PASS_Q_DICT, - _("Password may not match principal name")); + k5_setmsg(context, KADM5_PASS_Q_DICT, + _("Password may not match principal name")); return KADM5_PASS_Q_DICT; } } diff --git a/src/lib/kadm5/srv/server_kdb.c b/src/lib/kadm5/srv/server_kdb.c index 20a8db7b4..6db5229e3 100644 --- a/src/lib/kadm5/srv/server_kdb.c +++ b/src/lib/kadm5/srv/server_kdb.c @@ -190,8 +190,8 @@ kdb_get_hist_key(kadm5_server_handle_t handle, krb5_keyblock **keyblocks_out, if (kdb->n_key_data <= 0) { ret = KRB5_KDB_NO_MATCHING_KEY; - krb5_set_error_message(handle->context, ret, - _("History entry contains no key data")); + k5_setmsg(handle->context, ret, + _("History entry contains no key data")); goto done; } |
