new signature for krb_verify_user

git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@4205 ec53bebd-3082-4978-b11e-865c3cabbd6b
This commit is contained in:
Assar Westerlund
1997-12-15 17:11:26 +00:00
parent 416712be66
commit 3ba57e454e
6 changed files with 7 additions and 6 deletions

View File

@@ -891,7 +891,7 @@ pass(char *passwd)
char realm[REALM_SZ];
if((rval = krb_get_lrealm(realm, 1)) == KSUCCESS)
rval = krb_verify_user(pw->pw_name, "", realm,
passwd, 1, NULL);
passwd, 1, NULL, "");
if (rval == KSUCCESS ) {
chown (tkt_string(), pw->pw_uid, pw->pw_gid);
if(k_hasafs())

View File

@@ -26,7 +26,8 @@ krb4_verify_password (POP *p)
TKT_ROOT "_popper.%u", (unsigned)getpid());
krb_set_tkt_string (tkt);
status = krb_verify_user(p->user, "", lrealm, p->pop_parm[1], 1, "pop");
status = krb_verify_user(p->user, "", lrealm, p->pop_parm[1], 1, "pop",
"");
dest_tkt(); /* no point in keeping the tickets */
return status;
}

View File

@@ -627,7 +627,7 @@ verify(char *password)
/*
* Try to verify as user with kerberos 4.
*/
ret = krb_verify_user(name, inst, realm, password, 0, NULL);
ret = krb_verify_user(name, inst, realm, password, 0, NULL, "");
if (ret == KSUCCESS){
if (k_hasafs())
krb_afslog(NULL, NULL);

View File

@@ -68,7 +68,7 @@ afs_verify(char *name,
"%s%d_%d", TKT_ROOT,
(unsigned)pwd->pw_uid, (unsigned)getpid());
krb_set_tkt_string (tkt_string);
ret = krb_verify_user (name, "", lrealm, password, 1, NULL);
ret = krb_verify_user (name, "", lrealm, password, 1, NULL, "");
if (ret == KSUCCESS) {
if (k_hasafs()) {
k_setpag ();

View File

@@ -80,7 +80,7 @@ doit(pam_handle_t *pamh, char *name, char *inst, char *pwd, char *tkt)
krb_set_tkt_string(tkt);
krb_get_lrealm(realm, 1);
ret = krb_verify_user(name, inst, realm, pwd, 1, NULL);
ret = krb_verify_user(name, inst, realm, pwd, 1, NULL, "");
memset(pwd, 0, strlen(pwd));
switch(ret){
case KSUCCESS:

View File

@@ -238,7 +238,7 @@ common_auth(sia_collect_func_t *collect,
if(krb_kuserok(toname, toinst, realm, entity->name))
return SIADFAIL;
ret = krb_verify_user(toname, toinst, realm,
entity->password, 1, NULL);
entity->password, 1, NULL, "");
if(ret){
if(ret != KDC_PR_UNKNOWN)
/* since this is most likely a local user (such as