summaryrefslogtreecommitdiffstats
path: root/src/lib/gssapi/krb5
diff options
context:
space:
mode:
Diffstat (limited to 'src/lib/gssapi/krb5')
-rw-r--r--src/lib/gssapi/krb5/accept_sec_context.c12
-rw-r--r--src/lib/gssapi/krb5/acquire_cred.c4
-rw-r--r--src/lib/gssapi/krb5/init_sec_context.c4
-rw-r--r--src/lib/gssapi/krb5/inq_cred.c4
-rw-r--r--src/lib/gssapi/krb5/inq_names.c48
-rw-r--r--src/lib/gssapi/krb5/k5seal.c2
-rw-r--r--src/lib/gssapi/krb5/k5unseal.c2
-rw-r--r--src/lib/gssapi/krb5/wrap_size_limit.c2
8 files changed, 39 insertions, 39 deletions
diff --git a/src/lib/gssapi/krb5/accept_sec_context.c b/src/lib/gssapi/krb5/accept_sec_context.c
index 219d9da06..657176b86 100644
--- a/src/lib/gssapi/krb5/accept_sec_context.c
+++ b/src/lib/gssapi/krb5/accept_sec_context.c
@@ -336,13 +336,13 @@ krb5_gss_accept_sec_context(minor_status, context_handle,
ptr = (unsigned char *) input_token->value;
- if (!(code = g_verify_token_header((gss_OID) gss_mech_krb5,
+ if (!(code = g_verify_token_header(gss_mech_krb5,
&(ap_req.length),
&ptr, KG_TOK_CTX_AP_REQ,
input_token->length, 1))) {
mech_used = gss_mech_krb5;
} else if ((code == G_WRONG_MECH) &&
- !(code = g_verify_token_header((gss_OID) gss_mech_krb5_old,
+ !(code = g_verify_token_header(gss_mech_krb5_old,
&(ap_req.length),
&ptr, KG_TOK_CTX_AP_REQ,
input_token->length, 1))) {
@@ -814,7 +814,7 @@ krb5_gss_accept_sec_context(minor_status, context_handle,
ctx->gss_flags |= GSS_C_PROT_READY_FLAG;
ctx->established = 1;
- token.length = g_token_size((gss_OID) mech_used, ap_rep.length);
+ token.length = g_token_size(mech_used, ap_rep.length);
if ((token.value = (unsigned char *) xmalloc(token.length))
== NULL) {
@@ -823,7 +823,7 @@ krb5_gss_accept_sec_context(minor_status, context_handle,
goto fail;
}
ptr3 = token.value;
- g_make_token_header((gss_OID) mech_used, ap_rep.length,
+ g_make_token_header(mech_used, ap_rep.length,
&ptr3, KG_TOK_CTX_AP_REP);
TWRITE_STR(ptr3, ap_rep.data, ap_rep.length);
@@ -972,7 +972,7 @@ krb5_gss_accept_sec_context(minor_status, context_handle,
tmsglen = scratch.length;
toktype = KG_TOK_CTX_ERROR;
- token.length = g_token_size((gss_OID) mech_used, tmsglen);
+ token.length = g_token_size(mech_used, tmsglen);
token.value = (unsigned char *) xmalloc(token.length);
if (!token.value) {
krb5_free_context(context);
@@ -980,7 +980,7 @@ krb5_gss_accept_sec_context(minor_status, context_handle,
}
ptr = token.value;
- g_make_token_header((gss_OID) mech_used, tmsglen, &ptr, toktype);
+ g_make_token_header(mech_used, tmsglen, &ptr, toktype);
TWRITE_STR(ptr, scratch.data, scratch.length);
krb5_free_data_contents(context, &scratch);
diff --git a/src/lib/gssapi/krb5/acquire_cred.c b/src/lib/gssapi/krb5/acquire_cred.c
index a321505fd..58d3bdcab 100644
--- a/src/lib/gssapi/krb5/acquire_cred.c
+++ b/src/lib/gssapi/krb5/acquire_cred.c
@@ -609,11 +609,11 @@ krb5_gss_acquire_cred(minor_status, desired_name, time_req,
&ret_mechs)) ||
(cred->prerfc_mech &&
GSS_ERROR(ret = generic_gss_add_oid_set_member(minor_status,
- (gss_OID) gss_mech_krb5_old,
+ gss_mech_krb5_old,
&ret_mechs))) ||
(cred->rfc_mech &&
GSS_ERROR(ret = generic_gss_add_oid_set_member(minor_status,
- (gss_OID) gss_mech_krb5,
+ gss_mech_krb5,
&ret_mechs)))) {
if (cred->ccache)
(void)krb5_cc_close(context, cred->ccache);
diff --git a/src/lib/gssapi/krb5/init_sec_context.c b/src/lib/gssapi/krb5/init_sec_context.c
index 9f70da032..91d81fb44 100644
--- a/src/lib/gssapi/krb5/init_sec_context.c
+++ b/src/lib/gssapi/krb5/init_sec_context.c
@@ -325,7 +325,7 @@ make_ap_req_v1(context, ctx, cred, k_cred, chan_bindings, mech_type, token)
ptr = t;
- g_make_token_header((gss_OID) mech_type, ap_req.length,
+ g_make_token_header(mech_type, ap_req.length,
&ptr, KG_TOK_CTX_AP_REQ);
TWRITE_STR(ptr, (unsigned char *) ap_req.data, ap_req.length);
@@ -720,7 +720,7 @@ mutual_auth(
ptr = (unsigned char *) input_token->value;
- if (g_verify_token_header((gss_OID) ctx->mech_used,
+ if (g_verify_token_header(ctx->mech_used,
&(ap_rep.length),
&ptr, KG_TOK_CTX_AP_REP,
input_token->length, 1)) {
diff --git a/src/lib/gssapi/krb5/inq_cred.c b/src/lib/gssapi/krb5/inq_cred.c
index 780e79870..591a655c8 100644
--- a/src/lib/gssapi/krb5/inq_cred.c
+++ b/src/lib/gssapi/krb5/inq_cred.c
@@ -158,11 +158,11 @@ krb5_gss_inquire_cred(minor_status, cred_handle, name, lifetime_ret,
&mechs)) ||
(cred->prerfc_mech &&
GSS_ERROR(ret = generic_gss_add_oid_set_member(minor_status,
- (gss_OID) gss_mech_krb5_old,
+ gss_mech_krb5_old,
&mechs))) ||
(cred->rfc_mech &&
GSS_ERROR(ret = generic_gss_add_oid_set_member(minor_status,
- (gss_OID) gss_mech_krb5,
+ gss_mech_krb5,
&mechs)))) {
k5_mutex_unlock(&cred->lock);
if (ret_name)
diff --git a/src/lib/gssapi/krb5/inq_names.c b/src/lib/gssapi/krb5/inq_names.c
index 430132d74..c9e3dc9ad 100644
--- a/src/lib/gssapi/krb5/inq_names.c
+++ b/src/lib/gssapi/krb5/inq_names.c
@@ -53,38 +53,38 @@ krb5_gss_inquire_names_for_mech(minor_status, mechanism, name_types)
if (major == GSS_S_COMPLETE) {
/* Now add our members. */
if (
- ((major = gss_add_oid_set_member(minor_status,
- (gss_OID) gss_nt_user_name,
- name_types)
+ ((major = generic_gss_add_oid_set_member(minor_status,
+ gss_nt_user_name,
+ name_types)
) == GSS_S_COMPLETE) &&
- ((major = gss_add_oid_set_member(minor_status,
- (gss_OID) gss_nt_machine_uid_name,
- name_types)
+ ((major = generic_gss_add_oid_set_member(minor_status,
+ gss_nt_machine_uid_name,
+ name_types)
) == GSS_S_COMPLETE) &&
- ((major = gss_add_oid_set_member(minor_status,
- (gss_OID) gss_nt_string_uid_name,
- name_types)
+ ((major = generic_gss_add_oid_set_member(minor_status,
+ gss_nt_string_uid_name,
+ name_types)
) == GSS_S_COMPLETE) &&
- ((major = gss_add_oid_set_member(minor_status,
- (gss_OID) gss_nt_service_name,
- name_types)
+ ((major = generic_gss_add_oid_set_member(minor_status,
+ gss_nt_service_name,
+ name_types)
) == GSS_S_COMPLETE) &&
- ((major = gss_add_oid_set_member(minor_status,
- (gss_OID) gss_nt_service_name_v2,
- name_types)
+ ((major = generic_gss_add_oid_set_member(minor_status,
+ gss_nt_service_name_v2,
+ name_types)
) == GSS_S_COMPLETE) &&
- ((major = gss_add_oid_set_member(minor_status,
- (gss_OID) gss_nt_exported_name,
- name_types)
+ ((major = generic_gss_add_oid_set_member(minor_status,
+ gss_nt_exported_name,
+ name_types)
) == GSS_S_COMPLETE) &&
- ((major = gss_add_oid_set_member(minor_status,
- (gss_OID) gss_nt_krb5_name,
- name_types)
+ ((major = generic_gss_add_oid_set_member(minor_status,
+ gss_nt_krb5_name,
+ name_types)
) == GSS_S_COMPLETE)
) {
- major = gss_add_oid_set_member(minor_status,
- (gss_OID) gss_nt_krb5_principal,
- name_types);
+ major = generic_gss_add_oid_set_member(minor_status,
+ gss_nt_krb5_principal,
+ name_types);
}
/*
diff --git a/src/lib/gssapi/krb5/k5seal.c b/src/lib/gssapi/krb5/k5seal.c
index 68aa6696c..7a904d065 100644
--- a/src/lib/gssapi/krb5/k5seal.c
+++ b/src/lib/gssapi/krb5/k5seal.c
@@ -117,7 +117,7 @@ make_seal_token_v1 (krb5_context context,
/*** fill in the token */
ptr = t;
- g_make_token_header((gss_OID) oid, 14+cksum_size+tmsglen, &ptr, toktype);
+ g_make_token_header(oid, 14+cksum_size+tmsglen, &ptr, toktype);
/* 0..1 SIGN_ALG */
ptr[0] = signalg & 0xff;
diff --git a/src/lib/gssapi/krb5/k5unseal.c b/src/lib/gssapi/krb5/k5unseal.c
index 553f18b5e..30845bd85 100644
--- a/src/lib/gssapi/krb5/k5unseal.c
+++ b/src/lib/gssapi/krb5/k5unseal.c
@@ -527,7 +527,7 @@ kg_unseal(minor_status, context_handle, input_token_buffer,
}
else
toktype2 = toktype;
- err = g_verify_token_header((gss_OID) ctx->mech_used,
+ err = g_verify_token_header(ctx->mech_used,
&bodysize, &ptr, toktype2,
input_token_buffer->length,
!ctx->proto);
diff --git a/src/lib/gssapi/krb5/wrap_size_limit.c b/src/lib/gssapi/krb5/wrap_size_limit.c
index 460070637..b875a965a 100644
--- a/src/lib/gssapi/krb5/wrap_size_limit.c
+++ b/src/lib/gssapi/krb5/wrap_size_limit.c
@@ -145,7 +145,7 @@ krb5_gss_wrap_size_limit(minor_status, context_handle, conf_req_flag,
data_size = req_output_size;
conflen = kg_confounder_size(ctx->k5_context, ctx->enc);
data_size = (conflen + data_size + 8) & (~(OM_uint32)7);
- ohlen = g_token_size((gss_OID) ctx->mech_used,
+ ohlen = g_token_size(ctx->mech_used,
(unsigned int) (data_size + ctx->cksum_size + 14))
- req_output_size;