mirror of
https://github.com/samba-team/samba.git
synced 2025-02-25 17:57:42 +03:00
krb5_wrap: Rename get_kerberos_allowed_etypes()
Use consistent naming. Signed-off-by: Andreas Schneider <asn@samba.org> Reviewed-by: Andrew Bartlett <abartlet@samba.org>
This commit is contained in:
parent
81917a1162
commit
2622e16d76
@ -611,7 +611,7 @@ _PUBLIC_ int cli_credentials_get_client_gss_creds(struct cli_credentials *cred,
|
||||
* and used for the AS-REQ, so it wasn't possible to disable the usage
|
||||
* of AES keys.
|
||||
*/
|
||||
min_stat = get_kerberos_allowed_etypes(ccache->smb_krb5_context->krb5_context,
|
||||
min_stat = smb_krb5_get_allowed_etypes(ccache->smb_krb5_context->krb5_context,
|
||||
&etypes);
|
||||
if (min_stat == 0) {
|
||||
OM_uint32 num_ktypes;
|
||||
|
@ -312,13 +312,27 @@ int smb_krb5_get_pw_salt(krb5_context context,
|
||||
#endif
|
||||
|
||||
#if defined(HAVE_KRB5_GET_PERMITTED_ENCTYPES)
|
||||
krb5_error_code get_kerberos_allowed_etypes(krb5_context context,
|
||||
/**
|
||||
* @brief Get a list of encryption types allowed for session keys
|
||||
*
|
||||
* @param[in] context The library context
|
||||
*
|
||||
* @param[in] enctypes An allocated, zero-terminated list of encryption types
|
||||
*
|
||||
* This function returns an allocated list of encryption types allowed for
|
||||
* session keys.
|
||||
*
|
||||
* Use free() to free the enctypes when it is no longer needed.
|
||||
*
|
||||
* @retval 0 Success; otherwise - Kerberos error codes
|
||||
*/
|
||||
krb5_error_code smb_krb5_get_allowed_etypes(krb5_context context,
|
||||
krb5_enctype **enctypes)
|
||||
{
|
||||
return krb5_get_permitted_enctypes(context, enctypes);
|
||||
}
|
||||
#elif defined(HAVE_KRB5_GET_DEFAULT_IN_TKT_ETYPES)
|
||||
krb5_error_code get_kerberos_allowed_etypes(krb5_context context,
|
||||
krb5_error_code smb_krb5_get_allowed_etypes(krb5_context context,
|
||||
krb5_enctype **enctypes)
|
||||
{
|
||||
#ifdef HAVE_KRB5_PDU_NONE_DECL
|
||||
|
@ -171,7 +171,9 @@ krb5_error_code smb_krb5_mk_error(krb5_context context,
|
||||
krb5_data *e_data,
|
||||
krb5_data *enc_err);
|
||||
|
||||
krb5_error_code get_kerberos_allowed_etypes(krb5_context context, krb5_enctype **enctypes);
|
||||
krb5_error_code smb_krb5_get_allowed_etypes(krb5_context context,
|
||||
krb5_enctype **enctypes);
|
||||
|
||||
bool get_krb5_smb_session_key(TALLOC_CTX *mem_ctx,
|
||||
krb5_context context,
|
||||
krb5_auth_context auth_context,
|
||||
|
@ -123,7 +123,7 @@ static krb5_error_code fill_keytab_from_password(krb5_context krbctx,
|
||||
krb5_keytab_entry kt_entry;
|
||||
unsigned int i;
|
||||
|
||||
ret = get_kerberos_allowed_etypes(krbctx, &enctypes);
|
||||
ret = smb_krb5_get_allowed_etypes(krbctx, &enctypes);
|
||||
if (ret) {
|
||||
DEBUG(1, (__location__
|
||||
": Can't determine permitted enctypes!\n"));
|
||||
|
Loading…
x
Reference in New Issue
Block a user