new signature for krb_verify_user
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@4205 ec53bebd-3082-4978-b11e-865c3cabbd6b
This commit is contained in:
@@ -891,7 +891,7 @@ pass(char *passwd)
|
|||||||
char realm[REALM_SZ];
|
char realm[REALM_SZ];
|
||||||
if((rval = krb_get_lrealm(realm, 1)) == KSUCCESS)
|
if((rval = krb_get_lrealm(realm, 1)) == KSUCCESS)
|
||||||
rval = krb_verify_user(pw->pw_name, "", realm,
|
rval = krb_verify_user(pw->pw_name, "", realm,
|
||||||
passwd, 1, NULL);
|
passwd, 1, NULL, "");
|
||||||
if (rval == KSUCCESS ) {
|
if (rval == KSUCCESS ) {
|
||||||
chown (tkt_string(), pw->pw_uid, pw->pw_gid);
|
chown (tkt_string(), pw->pw_uid, pw->pw_gid);
|
||||||
if(k_hasafs())
|
if(k_hasafs())
|
||||||
|
@@ -26,7 +26,8 @@ krb4_verify_password (POP *p)
|
|||||||
TKT_ROOT "_popper.%u", (unsigned)getpid());
|
TKT_ROOT "_popper.%u", (unsigned)getpid());
|
||||||
krb_set_tkt_string (tkt);
|
krb_set_tkt_string (tkt);
|
||||||
|
|
||||||
status = krb_verify_user(p->user, "", lrealm, p->pop_parm[1], 1, "pop");
|
status = krb_verify_user(p->user, "", lrealm, p->pop_parm[1], 1, "pop",
|
||||||
|
"");
|
||||||
dest_tkt(); /* no point in keeping the tickets */
|
dest_tkt(); /* no point in keeping the tickets */
|
||||||
return status;
|
return status;
|
||||||
}
|
}
|
||||||
|
@@ -627,7 +627,7 @@ verify(char *password)
|
|||||||
/*
|
/*
|
||||||
* Try to verify as user with kerberos 4.
|
* Try to verify as user with kerberos 4.
|
||||||
*/
|
*/
|
||||||
ret = krb_verify_user(name, inst, realm, password, 0, NULL);
|
ret = krb_verify_user(name, inst, realm, password, 0, NULL, "");
|
||||||
if (ret == KSUCCESS){
|
if (ret == KSUCCESS){
|
||||||
if (k_hasafs())
|
if (k_hasafs())
|
||||||
krb_afslog(NULL, NULL);
|
krb_afslog(NULL, NULL);
|
||||||
|
@@ -68,7 +68,7 @@ afs_verify(char *name,
|
|||||||
"%s%d_%d", TKT_ROOT,
|
"%s%d_%d", TKT_ROOT,
|
||||||
(unsigned)pwd->pw_uid, (unsigned)getpid());
|
(unsigned)pwd->pw_uid, (unsigned)getpid());
|
||||||
krb_set_tkt_string (tkt_string);
|
krb_set_tkt_string (tkt_string);
|
||||||
ret = krb_verify_user (name, "", lrealm, password, 1, NULL);
|
ret = krb_verify_user (name, "", lrealm, password, 1, NULL, "");
|
||||||
if (ret == KSUCCESS) {
|
if (ret == KSUCCESS) {
|
||||||
if (k_hasafs()) {
|
if (k_hasafs()) {
|
||||||
k_setpag ();
|
k_setpag ();
|
||||||
|
@@ -80,7 +80,7 @@ doit(pam_handle_t *pamh, char *name, char *inst, char *pwd, char *tkt)
|
|||||||
krb_set_tkt_string(tkt);
|
krb_set_tkt_string(tkt);
|
||||||
|
|
||||||
krb_get_lrealm(realm, 1);
|
krb_get_lrealm(realm, 1);
|
||||||
ret = krb_verify_user(name, inst, realm, pwd, 1, NULL);
|
ret = krb_verify_user(name, inst, realm, pwd, 1, NULL, "");
|
||||||
memset(pwd, 0, strlen(pwd));
|
memset(pwd, 0, strlen(pwd));
|
||||||
switch(ret){
|
switch(ret){
|
||||||
case KSUCCESS:
|
case KSUCCESS:
|
||||||
|
@@ -238,7 +238,7 @@ common_auth(sia_collect_func_t *collect,
|
|||||||
if(krb_kuserok(toname, toinst, realm, entity->name))
|
if(krb_kuserok(toname, toinst, realm, entity->name))
|
||||||
return SIADFAIL;
|
return SIADFAIL;
|
||||||
ret = krb_verify_user(toname, toinst, realm,
|
ret = krb_verify_user(toname, toinst, realm,
|
||||||
entity->password, 1, NULL);
|
entity->password, 1, NULL, "");
|
||||||
if(ret){
|
if(ret){
|
||||||
if(ret != KDC_PR_UNKNOWN)
|
if(ret != KDC_PR_UNKNOWN)
|
||||||
/* since this is most likely a local user (such as
|
/* since this is most likely a local user (such as
|
||||||
|
Reference in New Issue
Block a user