aboutsummaryrefslogtreecommitdiff
path: root/src/lib/gssapi/krb5/init_sec_context.c
diff options
context:
space:
mode:
authorAlexandra Ellwood <lxs@mit.edu>2006-07-25 20:29:43 +0000
committerAlexandra Ellwood <lxs@mit.edu>2006-07-25 20:29:43 +0000
commit078693c52680be26ded33c7734cd1fdc47896480 (patch)
tree531c2cf32ef9bbfae916afdb174f4707e6d06421 /src/lib/gssapi/krb5/init_sec_context.c
parent99475a3c9fdaf9da4d363aa7fd3c9477150dbe95 (diff)
downloadkrb5-078693c52680be26ded33c7734cd1fdc47896480.zip
krb5-078693c52680be26ded33c7734cd1fdc47896480.tar.gz
krb5-078693c52680be26ded33c7734cd1fdc47896480.tar.bz2
Changed GSSAPI opaque types (gss_name_t, gss_cred_id_t, gss_ctx_id_t) from
void* to pointers to opaque structs. This change removed some casts and introduced or changed a bunch of other casts to suppress warnings. krb5_gss_accept_sec_context(): Fixed a bug found by the above changes where krb5_gss_release_cred() was being called with the wrong argument 2 (gss_cred_id_t instead of gss_cred_id_t*). ticket: 4057 status: open git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@18396 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/lib/gssapi/krb5/init_sec_context.c')
-rw-r--r--src/lib/gssapi/krb5/init_sec_context.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/src/lib/gssapi/krb5/init_sec_context.c b/src/lib/gssapi/krb5/init_sec_context.c
index 81b49f2..dff4774 100644
--- a/src/lib/gssapi/krb5/init_sec_context.c
+++ b/src/lib/gssapi/krb5/init_sec_context.c
@@ -688,7 +688,7 @@ mutual_auth(
return(GSS_S_NO_CONTEXT);
}
- ctx = (gss_ctx_id_t) *context_handle;
+ ctx = (krb5_gss_ctx_id_t) *context_handle;
/* make sure the context is non-established, and that certain
arguments are unchanged */
@@ -878,7 +878,7 @@ krb5_gss_init_sec_context(minor_status, claimant_cred_handle,
/* verify the credential, or use the default */
/*SUPPRESS 29*/
if (claimant_cred_handle == GSS_C_NO_CREDENTIAL) {
- major_status = kg_get_defcred(minor_status, &cred);
+ major_status = kg_get_defcred(minor_status, (gss_cred_id_t *)&cred);
if (major_status && GSS_ERROR(major_status)) {
if (*context_handle == GSS_C_NO_CONTEXT)
krb5_free_context(context);
@@ -928,7 +928,7 @@ krb5_gss_init_sec_context(minor_status, claimant_cred_handle,
if (err) {
k5_mutex_unlock(&cred->lock);
if (claimant_cred_handle == GSS_C_NO_CREDENTIAL)
- krb5_gss_release_cred(minor_status, (gss_cred_id_t)&cred);
+ krb5_gss_release_cred(minor_status, (gss_cred_id_t *)&cred);
*minor_status = 0;
if (*context_handle == GSS_C_NO_CONTEXT)
krb5_free_context(context);
@@ -965,7 +965,7 @@ krb5_gss_init_sec_context(minor_status, claimant_cred_handle,
}
if (claimant_cred_handle == GSS_C_NO_CREDENTIAL)
- krb5_gss_release_cred(&tmp_min_stat, (gss_cred_id_t)&cred);
+ krb5_gss_release_cred(&tmp_min_stat, (gss_cred_id_t *)&cred);
return(major_status);
}