/*
- * $Id: uams_krb4.c,v 1.7 2005-04-28 20:49:50 bfernhomberg Exp $
+ * $Id: uams_krb4.c,v 1.10 2009-10-15 11:39:48 didg Exp $
*
* Copyright (c) 1990,1993 Regents of The University of Michigan.
* All Rights Reserved. See COPYRIGHT.
#ifdef KRB
-static __inline__ void lcase( p )
+static void lcase( p )
char *p;
{
for (; *p; p++ ) {
return;
}
-static __inline__ void ucase( p )
+static void ucase( p )
char *p;
{
for (; *p; p++ ) {
#define KRB4CMD_SKIP 11
static int krb4_login(void *obj, struct passwd **uam_pwd,
- char *ibuf, int ibuflen,
- char *rbuf, int *rbuflen )
+ char *ibuf, size_t ibuflen,
+ char *rbuf, size_t *rbuflen )
{
char *p;
char *username;
u_int16_t len;
KTEXT_ST tkt;
static AUTH_DAT ad;
- int rc, ulen, proto;
+ int rc, proto;
+ size_t ulen;
char inst[ 40 ], princ[ 40 ];
if (uam_afpserver_option(obj, UAM_OPTION_USERNAME, &username, &ulen) < 0)
#ifdef AFS
if ( setpag() < 0 ) {
*rbuflen = 0;
- LOG(log_error, logtype_default, "krb_login: setpag: %m" );
+ LOG(log_error, logtype_default, "krb_login: setpag: %s", strerror(errno) );
return( AFPERR_BADUAM );
}
#endif /*AFS*/
with non-16bit short's and non-32bit int's
*/
static int krb4_logincont(void *obj, struct passwd **uam_pwd,
- char *ibuf, int ibuflen,
- char *rbuf, int *rbuflen)
+ char *ibuf, size_t ibuflen,
+ char *rbuf, size_t *rbuflen)
{
static struct passwd *pwd;
KTEXT_ST tkt;
vi.out_size = sizeof( buf );
if ( pioctl( 0, VIOCSETTOK, &vi, 0 ) < 0 ) {
- LOG(log_error, logtype_default, "krb4_logincont: pioctl: %m" );
+ LOG(log_error, logtype_default, "krb4_logincont: pioctl: %s", strerror(errno) );
*rbuflen = 0;
return( AFPERR_BADUAM );
}
vi.out = buf;
vi.out_size = sizeof( buf );
if ( pioctl( 0, VIOCSETTOK, &vi, 0 ) < 0 ) {
- LOG(log_error, logtype_default, "krb4_logincont: pioctl: %m" );
+ LOG(log_error, logtype_default, "krb4_logincont: pioctl: %s", strerror(errno) );
return( AFPERR_BADUAM );
}
/* FALL THROUGH */
#if defined( UAM_AFSKRB ) && defined( AFS )
static int afskrb_login(void *obj, struct passwd *uam_pwd,
- char *ibuf, int ibuflen,
- char *rbuf, int *rbuflen )
+ char *ibuf, size_t ibuflen,
+ char *rbuf, size_t *rbuflen )
{
KTEXT_ST authent, rpkt;
CREDENTIALS cr;
p = rbuf;
if ( validseskey == 0 ) {
if ( setpag() < 0 ) {
- LOG(log_error, logtype_default, "krb_login: setpag: %m" );
+ LOG(log_error, logtype_default, "krb_login: setpag: %s", strerror(errno) );
return AFPERR_BADUAM;
}
krb_set_tkt_string(( tktfile = mktemp( _PATH_AFPTKT )));
}
if ( unlink( tktfile ) < 0 ) {
- LOG(log_error, logtype_default, "krb_login: unlink %s: %m", tktfile );
+ LOG(log_error, logtype_default, "krb_login: unlink %s: %s", tktfile, strerror(errno) );
return ( AFPERR_BADUAM );
}
}
static int afskrb_logincont(void *obj, struct passwd *uam_pwd,
- char *ibuf, int ibuflen,
- char *rbuf, int *rbuflen )
+ char *ibuf, size_t ibuflen,
+ char *rbuf, size_t *rbuflen )
{
CREDENTIALS cr;
struct ViceIoctl vi;
vi.out = buf;
vi.out_size = sizeof( buf );
if ( pioctl( 0, VIOCSETTOK, &vi, 0 ) < 0 ) {
- LOG(log_error, logtype_default, "krb_logincont: pioctl: %m" );
+ LOG(log_error, logtype_default, "krb_logincont: pioctl: %s", strerror(errno) );
return ( AFPERR_BADUAM );
}
if ( unlink( tktfile ) < 0 ) {
- LOG(log_error, logtype_default, "krb_logincont: %s: %m", tktfile );
+ LOG(log_error, logtype_default, "krb_logincont: %s: %s", tktfile, strerror(errno) );
return ( AFPERR_BADUAM );
}