Cosmetic corrections for the KERBEROS library
authorMatthias Dieter Wallnöfer <mwallnoefer@yahoo.de>
Tue, 9 Sep 2008 15:37:33 +0000 (17:37 +0200)
committerJelmer Vernooij <jelmer@samba.org>
Wed, 24 Sep 2008 17:40:03 +0000 (19:40 +0200)
This commit applies some cosmetic corrections for the KERBEROS library.

source4/auth/gensec/cyrus_sasl.c
source4/auth/kerberos/kerberos.c
source4/auth/kerberos/kerberos_util.c
source4/auth/kerberos/krb5_init_context.c
source4/kdc/hdb-ldb.c

index 06a7b8a38222b9a0f6dd6819db79b6f1c0fa0846..6f82de82fcd0a9ecfa082af4815b839b17fc298f 100644 (file)
@@ -110,7 +110,7 @@ static int gensec_sasl_get_password(sasl_conn_t *conn, void *context, int id,
 static int gensec_sasl_dispose(struct gensec_sasl_state *gensec_sasl_state)
 {
        sasl_dispose(&gensec_sasl_state->conn);
-       return 0;
+       return SASL_OK;
 }
 
 static NTSTATUS gensec_sasl_client_start(struct gensec_security *gensec_security)
index 2579ab20cc4660ce588e19dbcc8a18bd868e2ffa..d54664fe66dfbd5bfd6e7a160a97357e23a5d1aa 100644 (file)
@@ -33,7 +33,7 @@
   This version is built to use a keyblock, rather than needing the
   original password.
 */
int kerberos_kinit_keyblock_cc(krb5_context ctx, krb5_ccache cc, 
krb5_error_code kerberos_kinit_keyblock_cc(krb5_context ctx, krb5_ccache cc, 
                                krb5_principal principal, krb5_keyblock *keyblock,
                                time_t *expire_time, time_t *kdc_time)
 {
@@ -77,7 +77,7 @@
   simulate a kinit, putting the tgt in the given credentials cache. 
   Orignally by remus@snapserver.com
 */
int kerberos_kinit_password_cc(krb5_context ctx, krb5_ccache cc, 
krb5_error_code kerberos_kinit_password_cc(krb5_context ctx, krb5_ccache cc, 
                                krb5_principal principal, const char *password, 
                                time_t *expire_time, time_t *kdc_time)
 {
index 9002715065aa23a809b9f5c706a321fda27dc91e..0567565d33987962bc84a0d119d0c3ab0c28cf35 100644 (file)
@@ -32,7 +32,7 @@ struct principal_container {
        krb5_principal principal;
 };
 
-static int free_principal(struct principal_container *pc)
+static krb5_error_code free_principal(struct principal_container *pc)
 {
        /* current heimdal - 0.6.3, which we need anyway, fixes segfaults here */
        krb5_free_principal(pc->smb_krb5_context->krb5_context, pc->principal);
@@ -241,19 +241,17 @@ static krb5_error_code salt_principal_from_credentials(TALLOC_CTX *parent_ctx,
        return 0;
 }
 
-static int free_keytab(struct keytab_container *ktc)
+static krb5_error_code free_keytab(struct keytab_container *ktc)
 {
-       krb5_kt_close(ktc->smb_krb5_context->krb5_context, ktc->keytab);
-
-       return 0;
+       return krb5_kt_close(ktc->smb_krb5_context->krb5_context, ktc->keytab);
 }
 
-int smb_krb5_open_keytab(TALLOC_CTX *mem_ctx,
+krb5_error_code smb_krb5_open_keytab(TALLOC_CTX *mem_ctx,
                         struct smb_krb5_context *smb_krb5_context, 
                         const char *keytab_name, struct keytab_container **ktc) 
 {
        krb5_keytab keytab;
-       int ret;
+       krb5_error_code ret;
        ret = krb5_kt_resolve(smb_krb5_context->krb5_context, keytab_name, &keytab);
        if (ret) {
                DEBUG(1,("failed to open krb5 keytab: %s\n", 
@@ -339,7 +337,7 @@ static krb5_error_code keytab_add_keys(TALLOC_CTX *parent_ctx,
        return 0;
 }
 
-static int create_keytab(TALLOC_CTX *parent_ctx,
+static krb5_error_code create_keytab(TALLOC_CTX *parent_ctx,
                         struct cli_credentials *machine_account,
                         struct smb_krb5_context *smb_krb5_context,
                         const char **enctype_strings,
@@ -603,7 +601,7 @@ static krb5_error_code remove_old_entries(TALLOC_CTX *parent_ctx,
        return ret;
 }
 
-int smb_krb5_update_keytab(TALLOC_CTX *parent_ctx,
+krb5_error_code smb_krb5_update_keytab(TALLOC_CTX *parent_ctx,
                           struct cli_credentials *machine_account,
                           struct smb_krb5_context *smb_krb5_context,
                           const char **enctype_strings,
@@ -635,7 +633,7 @@ int smb_krb5_update_keytab(TALLOC_CTX *parent_ctx,
        return ret;
 }
 
-int smb_krb5_create_memory_keytab(TALLOC_CTX *parent_ctx,
+krb5_error_code smb_krb5_create_memory_keytab(TALLOC_CTX *parent_ctx,
                                           struct cli_credentials *machine_account,
                                           struct smb_krb5_context *smb_krb5_context,
                                           const char **enctype_strings,
index 82e42a4560853a5d7f7ee3eacb605efcd6240484..90b542c4c46553c8a0d19b7791c6099ae50bc8d8 100644 (file)
@@ -49,13 +49,13 @@ struct smb_krb5_socket {
        krb5_krbhst_info *hi;
 };
 
-static int smb_krb5_context_destroy_1(struct smb_krb5_context *ctx)
+static krb5_error_code smb_krb5_context_destroy_1(struct smb_krb5_context *ctx)
 {
        krb5_free_context(ctx->krb5_context); 
        return 0;
 }
 
-static int smb_krb5_context_destroy_2(struct smb_krb5_context *ctx)
+static krb5_error_code smb_krb5_context_destroy_2(struct smb_krb5_context *ctx)
 {
        /* Otherwise krb5_free_context will try and close what we have already free()ed */
        krb5_set_warn_dest(ctx->krb5_context, NULL);
index c5466f1acd3e2a9aa49cae26b60ca9a41135a3af..4fde75cf707ca6775cc258af8db78611c52761a1 100644 (file)
@@ -186,7 +186,7 @@ static HDBFlags uf2HDBFlags(krb5_context context, int userAccountControl, enum h
        return flags;
 }
 
-static int hdb_ldb_destrutor(struct hdb_ldb_private *private)
+static int hdb_ldb_destructor(struct hdb_ldb_private *private)
 {
     hdb_entry_ex *entry_ex = private->entry_ex;
     free_hdb_entry(&entry_ex->entry);
@@ -542,7 +542,7 @@ static krb5_error_code LDB_message2entry(krb5_context context, HDB *db,
        private->iconv_convenience = lp_iconv_convenience(lp_ctx);
        private->netbios_name = lp_netbios_name(lp_ctx);
 
-       talloc_set_destructor(private, hdb_ldb_destrutor);
+       talloc_set_destructor(private, hdb_ldb_destructor);
 
        entry_ex->ctx = private;
        entry_ex->free_entry = hdb_ldb_free_entry;
@@ -728,7 +728,7 @@ static krb5_error_code LDB_trust_message2entry(krb5_context context, HDB *db,
        private->iconv_convenience = lp_iconv_convenience(lp_ctx);
        private->netbios_name = lp_netbios_name(lp_ctx);
 
-       talloc_set_destructor(private, hdb_ldb_destrutor);
+       talloc_set_destructor(private, hdb_ldb_destructor);
 
        entry_ex->ctx = private;
        entry_ex->free_entry = hdb_ldb_free_entry;