From 76c1659e90ee0e9c6e0a44bdef5a82cae00ef69a Mon Sep 17 00:00:00 2001 From: Ezra Peisach Date: Tue, 25 Apr 1995 00:55:52 +0000 Subject: * parse.c (krb5_parse_name): Add magic number to new structure * get_creds.c: Fix comments describing operation * gc_frm_kdc.c: Fix comments describing operation * copy_cksum.c (krb5_copy_checksum): Fix comment in file * copy_addrs.c (krb5_append_addresses): ifdef out unused krb5_append_addresses function. (no API or prototype existed). * copy_data.c (krb5_copy_data): Initialize magic number git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@5464 dc483132-0cff-0310-8789-dd5450dbe970 --- src/lib/krb5/krb/get_creds.c | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) (limited to 'src/lib/krb5/krb/get_creds.c') diff --git a/src/lib/krb5/krb/get_creds.c b/src/lib/krb5/krb/get_creds.c index 58ecd0035..2f6f0bc75 100644 --- a/src/lib/krb5/krb/get_creds.c +++ b/src/lib/krb5/krb/get_creds.c @@ -29,10 +29,10 @@ /* Attempts to use the credentials cache or TGS exchange to get an additional ticket for the - client identified by creds->client, the server identified by - creds->server, with options options, expiration date specified in - creds->times.endtime (0 means as long as possible), session key type - specified in creds->keyblock.keytype (if non-zero) + client identified by in_creds->client, the server identified by + in_creds->server, with options options, expiration date specified in + in_creds->times.endtime (0 means as long as possible), session key type + specified in in_creds->keyblock.keytype (if non-zero) Any returned ticket and intermediate ticket-granting tickets are stored in ccache. @@ -60,6 +60,7 @@ krb5_get_credentials(context, options, ccache, in_creds, out_creds) return -EINVAL; memset((char *)&mcreds, 0, sizeof(krb5_creds)); + mcreds.magic = KV5M_CREDS; mcreds.times.endtime = in_creds->times.endtime; #ifdef HAVE_C_STRUCTURE_ASSIGNMENT mcreds.keyblock = in_creds->keyblock; @@ -87,6 +88,7 @@ krb5_get_credentials(context, options, ccache, in_creds, out_creds) return -ENOMEM; memset((char *)ncreds, 0, sizeof(krb5_creds)); + ncreds->magic = KV5M_CREDS; /* The caller is now responsible for cleaning up in_creds */ if (retval = krb5_cc_retrieve_cred(context,ccache,fields,&mcreds,ncreds)) { -- cgit