diff options
author | Alexandra Ellwood <lxs@mit.edu> | 2006-07-25 20:29:43 +0000 |
---|---|---|
committer | Alexandra Ellwood <lxs@mit.edu> | 2006-07-25 20:29:43 +0000 |
commit | 078693c52680be26ded33c7734cd1fdc47896480 (patch) | |
tree | 531c2cf32ef9bbfae916afdb174f4707e6d06421 /src/lib/gssapi/krb5/init_sec_context.c | |
parent | 99475a3c9fdaf9da4d363aa7fd3c9477150dbe95 (diff) | |
download | krb5-078693c52680be26ded33c7734cd1fdc47896480.zip krb5-078693c52680be26ded33c7734cd1fdc47896480.tar.gz krb5-078693c52680be26ded33c7734cd1fdc47896480.tar.bz2 |
Changed GSSAPI opaque types (gss_name_t, gss_cred_id_t, gss_ctx_id_t) from
void* to pointers to opaque structs. This change removed some casts and
introduced or changed a bunch of other casts to suppress warnings.
krb5_gss_accept_sec_context(): Fixed a bug found by the above changes
where krb5_gss_release_cred() was being called with the wrong argument 2
(gss_cred_id_t instead of gss_cred_id_t*).
ticket: 4057
status: open
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18396 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/lib/gssapi/krb5/init_sec_context.c')
-rw-r--r-- | src/lib/gssapi/krb5/init_sec_context.c | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/src/lib/gssapi/krb5/init_sec_context.c b/src/lib/gssapi/krb5/init_sec_context.c index 81b49f2..dff4774 100644 --- a/src/lib/gssapi/krb5/init_sec_context.c +++ b/src/lib/gssapi/krb5/init_sec_context.c @@ -688,7 +688,7 @@ mutual_auth( return(GSS_S_NO_CONTEXT); } - ctx = (gss_ctx_id_t) *context_handle; + ctx = (krb5_gss_ctx_id_t) *context_handle; /* make sure the context is non-established, and that certain arguments are unchanged */ @@ -878,7 +878,7 @@ krb5_gss_init_sec_context(minor_status, claimant_cred_handle, /* verify the credential, or use the default */ /*SUPPRESS 29*/ if (claimant_cred_handle == GSS_C_NO_CREDENTIAL) { - major_status = kg_get_defcred(minor_status, &cred); + major_status = kg_get_defcred(minor_status, (gss_cred_id_t *)&cred); if (major_status && GSS_ERROR(major_status)) { if (*context_handle == GSS_C_NO_CONTEXT) krb5_free_context(context); @@ -928,7 +928,7 @@ krb5_gss_init_sec_context(minor_status, claimant_cred_handle, if (err) { k5_mutex_unlock(&cred->lock); if (claimant_cred_handle == GSS_C_NO_CREDENTIAL) - krb5_gss_release_cred(minor_status, (gss_cred_id_t)&cred); + krb5_gss_release_cred(minor_status, (gss_cred_id_t *)&cred); *minor_status = 0; if (*context_handle == GSS_C_NO_CONTEXT) krb5_free_context(context); @@ -965,7 +965,7 @@ krb5_gss_init_sec_context(minor_status, claimant_cred_handle, } if (claimant_cred_handle == GSS_C_NO_CREDENTIAL) - krb5_gss_release_cred(&tmp_min_stat, (gss_cred_id_t)&cred); + krb5_gss_release_cred(&tmp_min_stat, (gss_cred_id_t *)&cred); return(major_status); } |