hdb: eliminate hdb_entry_ex
Remove hdb_entry_ex and revert to the original design of hdb_entry (except with an additional context member in hdb_entry which is managed by the free_entry method in HDB).
This commit is contained in:
24
kdc/digest.c
24
kdc/digest.c
@@ -57,7 +57,7 @@ const struct units _kdc_digestunits[] = {
|
||||
static krb5_error_code
|
||||
get_digest_key(krb5_context context,
|
||||
krb5_kdc_configuration *config,
|
||||
hdb_entry_ex *server,
|
||||
hdb_entry *server,
|
||||
krb5_crypto *crypto)
|
||||
{
|
||||
krb5_error_code ret;
|
||||
@@ -81,12 +81,12 @@ get_digest_key(krb5_context context,
|
||||
|
||||
static char *
|
||||
get_ntlm_targetname(krb5_context context,
|
||||
hdb_entry_ex *client)
|
||||
hdb_entry *client)
|
||||
{
|
||||
char *targetname, *p;
|
||||
|
||||
targetname = strdup(krb5_principal_get_realm(context,
|
||||
client->entry.principal));
|
||||
client->principal));
|
||||
if (targetname == NULL)
|
||||
return NULL;
|
||||
|
||||
@@ -101,7 +101,7 @@ get_ntlm_targetname(krb5_context context,
|
||||
static krb5_error_code
|
||||
fill_targetinfo(krb5_context context,
|
||||
char *targetname,
|
||||
hdb_entry_ex *client,
|
||||
hdb_entry *client,
|
||||
krb5_data *data)
|
||||
{
|
||||
struct ntlm_targetinfo ti;
|
||||
@@ -113,7 +113,7 @@ fill_targetinfo(krb5_context context,
|
||||
memset(&ti, 0, sizeof(ti));
|
||||
|
||||
ti.domainname = targetname;
|
||||
p = client->entry.principal;
|
||||
p = client->principal;
|
||||
str = krb5_principal_get_comp_string(context, p, 0);
|
||||
if (str != NULL &&
|
||||
(strcmp("host", str) == 0 ||
|
||||
@@ -168,7 +168,7 @@ get_password_entry(krb5_context context,
|
||||
{
|
||||
krb5_principal clientprincipal;
|
||||
krb5_error_code ret;
|
||||
hdb_entry_ex *user;
|
||||
hdb_entry *user;
|
||||
HDB *db;
|
||||
|
||||
/* get username */
|
||||
@@ -182,7 +182,7 @@ get_password_entry(krb5_context context,
|
||||
if (ret)
|
||||
return ret;
|
||||
|
||||
ret = hdb_entry_get_password(context, db, &user->entry, password);
|
||||
ret = hdb_entry_get_password(context, db, user, password);
|
||||
if (ret || password == NULL) {
|
||||
if (ret == 0) {
|
||||
ret = EINVAL;
|
||||
@@ -218,9 +218,9 @@ _kdc_do_digest(krb5_context context,
|
||||
krb5_storage *sp = NULL;
|
||||
Checksum res;
|
||||
HDB *serverdb, *userdb;
|
||||
hdb_entry_ex *server = NULL, *user = NULL;
|
||||
hdb_entry *server = NULL, *user = NULL;
|
||||
HDB *clientdb;
|
||||
hdb_entry_ex *client = NULL;
|
||||
hdb_entry *client = NULL;
|
||||
char *client_name = NULL, *password = NULL;
|
||||
krb5_data serverNonce;
|
||||
|
||||
@@ -321,7 +321,7 @@ _kdc_do_digest(krb5_context context,
|
||||
if (ret)
|
||||
goto out;
|
||||
|
||||
if (client->entry.flags.allow_digest == 0) {
|
||||
if (client->flags.allow_digest == 0) {
|
||||
kdc_log(context, config, 2,
|
||||
"Client %s tried to use digest "
|
||||
"but is not allowed to",
|
||||
@@ -888,7 +888,7 @@ _kdc_do_digest(krb5_context context,
|
||||
goto failed;
|
||||
}
|
||||
|
||||
ret = hdb_enctype2key(context, &user->entry, NULL,
|
||||
ret = hdb_enctype2key(context, user, NULL,
|
||||
ETYPE_ARCFOUR_HMAC_MD5, &key);
|
||||
if (ret) {
|
||||
krb5_set_error_message(context, ret,
|
||||
@@ -1216,7 +1216,7 @@ _kdc_do_digest(krb5_context context,
|
||||
goto out;
|
||||
}
|
||||
|
||||
ret = hdb_enctype2key(context, &user->entry, NULL,
|
||||
ret = hdb_enctype2key(context, user, NULL,
|
||||
ETYPE_ARCFOUR_HMAC_MD5, &key);
|
||||
if (ret) {
|
||||
krb5_set_error_message(context, ret, "NTLM missing arcfour key");
|
||||
|
Reference in New Issue
Block a user