io_bufsize = MAX(1, atoi(optarg));
break;
case 'k':
-#if HAVE_KRB5
+#ifdef HAVE_KRB5
use_kerberos = True;
got_pass = True;
#else
{
size_t i_len, o_len;
size_t retval;
- const char* inbuf = (char*)src;
+ const char* inbuf = (const char*)src;
char* outbuf = (char*)dest;
smb_iconv_t descriptor;
{
size_t i_len, o_len, destlen;
size_t retval;
- const char *inbuf = (char *)src;
+ const char *inbuf = (const char *)src;
char *outbuf, *ob;
smb_iconv_t descriptor;
#include "includes.h"
-#if HAVE_KRB5
+#ifdef HAVE_KRB5
#define DEFAULT_KPASSWD_PORT 464
#define KRB5_KPASSWD_VERS_CHANGEPW 1
}
-#if HAVE_KRB5
+#ifdef HAVE_KRB5
/****************************************************************************
do a spnego/kerberos encrypted session setup
****************************************************************************/
fstrcpy(cli->user_name, user);
-#if HAVE_KRB5
+#ifdef HAVE_KRB5
if (got_kerberos_mechanism && cli->use_kerberos) {
return cli_session_setup_kerberos(cli, principal, workgroup);
}
#include "includes.h"
-#if HAVE_KRB5
+#ifdef HAVE_KRB5
/*
we can't use krb5_mk_req because w2k wants the service to be in a particular format
*/
}
-#if HAVE_KRB5
+#ifdef HAVE_KRB5
/****************************************************************************
reply to a session setup spnego negotiate packet for kerberos
****************************************************************************/
}
DEBUG(3,("Got secblob of size %d\n", secblob.length));
-#if HAVE_KRB5
+#ifdef HAVE_KRB5
if (got_kerberos) {
int ret = reply_spnego_kerberos(conn, inbuf, outbuf,
length, bufsize, &secblob);
#include "includes.h"
-#if HAVE_ADS
+#ifdef HAVE_ADS
/* a lame random number generator - used /dev/urandom if possible */
static unsigned one_random(void)