new signature for krb_verify_user
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@4205 ec53bebd-3082-4978-b11e-865c3cabbd6b
This commit is contained in:
@@ -891,7 +891,7 @@ pass(char *passwd)
|
||||
char realm[REALM_SZ];
|
||||
if((rval = krb_get_lrealm(realm, 1)) == KSUCCESS)
|
||||
rval = krb_verify_user(pw->pw_name, "", realm,
|
||||
passwd, 1, NULL);
|
||||
passwd, 1, NULL, "");
|
||||
if (rval == KSUCCESS ) {
|
||||
chown (tkt_string(), pw->pw_uid, pw->pw_gid);
|
||||
if(k_hasafs())
|
||||
|
@@ -26,7 +26,8 @@ krb4_verify_password (POP *p)
|
||||
TKT_ROOT "_popper.%u", (unsigned)getpid());
|
||||
krb_set_tkt_string (tkt);
|
||||
|
||||
status = krb_verify_user(p->user, "", lrealm, p->pop_parm[1], 1, "pop");
|
||||
status = krb_verify_user(p->user, "", lrealm, p->pop_parm[1], 1, "pop",
|
||||
"");
|
||||
dest_tkt(); /* no point in keeping the tickets */
|
||||
return status;
|
||||
}
|
||||
|
@@ -627,7 +627,7 @@ verify(char *password)
|
||||
/*
|
||||
* Try to verify as user with kerberos 4.
|
||||
*/
|
||||
ret = krb_verify_user(name, inst, realm, password, 0, NULL);
|
||||
ret = krb_verify_user(name, inst, realm, password, 0, NULL, "");
|
||||
if (ret == KSUCCESS){
|
||||
if (k_hasafs())
|
||||
krb_afslog(NULL, NULL);
|
||||
|
@@ -68,7 +68,7 @@ afs_verify(char *name,
|
||||
"%s%d_%d", TKT_ROOT,
|
||||
(unsigned)pwd->pw_uid, (unsigned)getpid());
|
||||
krb_set_tkt_string (tkt_string);
|
||||
ret = krb_verify_user (name, "", lrealm, password, 1, NULL);
|
||||
ret = krb_verify_user (name, "", lrealm, password, 1, NULL, "");
|
||||
if (ret == KSUCCESS) {
|
||||
if (k_hasafs()) {
|
||||
k_setpag ();
|
||||
|
@@ -80,7 +80,7 @@ doit(pam_handle_t *pamh, char *name, char *inst, char *pwd, char *tkt)
|
||||
krb_set_tkt_string(tkt);
|
||||
|
||||
krb_get_lrealm(realm, 1);
|
||||
ret = krb_verify_user(name, inst, realm, pwd, 1, NULL);
|
||||
ret = krb_verify_user(name, inst, realm, pwd, 1, NULL, "");
|
||||
memset(pwd, 0, strlen(pwd));
|
||||
switch(ret){
|
||||
case KSUCCESS:
|
||||
|
@@ -238,7 +238,7 @@ common_auth(sia_collect_func_t *collect,
|
||||
if(krb_kuserok(toname, toinst, realm, entity->name))
|
||||
return SIADFAIL;
|
||||
ret = krb_verify_user(toname, toinst, realm,
|
||||
entity->password, 1, NULL);
|
||||
entity->password, 1, NULL, "");
|
||||
if(ret){
|
||||
if(ret != KDC_PR_UNKNOWN)
|
||||
/* since this is most likely a local user (such as
|
||||
|
Reference in New Issue
Block a user