svn commit: samba r21557 - in branches: SAMBA_3_0/source/libads SAMBA_3_0_25/source/libads

gd at samba.org gd at samba.org
Tue Feb 27 13:27:31 GMT 2007


Author: gd
Date: 2007-02-27 13:27:31 +0000 (Tue, 27 Feb 2007)
New Revision: 21557

WebSVN: http://websvn.samba.org/cgi-bin/viewcvs.cgi?view=rev&root=samba&rev=21557

Log:
indent only fix. No code change.

Guenther

Modified:
   branches/SAMBA_3_0/source/libads/kerberos_verify.c
   branches/SAMBA_3_0_25/source/libads/kerberos_verify.c


Changeset:
Modified: branches/SAMBA_3_0/source/libads/kerberos_verify.c
===================================================================
--- branches/SAMBA_3_0/source/libads/kerberos_verify.c	2007-02-27 13:25:42 UTC (rev 21556)
+++ branches/SAMBA_3_0/source/libads/kerberos_verify.c	2007-02-27 13:27:31 UTC (rev 21557)
@@ -88,63 +88,63 @@
 		goto out;
 	}
   
-		while (!auth_ok && (krb5_kt_next_entry(context, keytab, &kt_entry, &kt_cursor) == 0)) {
-			ret = smb_krb5_unparse_name(context, kt_entry.principal, &entry_princ_s);
-			if (ret) {
-				DEBUG(1, ("ads_keytab_verify_ticket: smb_krb5_unparse_name failed (%s)\n",
-					error_message(ret)));
-				goto out;
-			}
+	while (!auth_ok && (krb5_kt_next_entry(context, keytab, &kt_entry, &kt_cursor) == 0)) {
+		ret = smb_krb5_unparse_name(context, kt_entry.principal, &entry_princ_s);
+		if (ret) {
+			DEBUG(1, ("ads_keytab_verify_ticket: smb_krb5_unparse_name failed (%s)\n",
+				error_message(ret)));
+			goto out;
+		}
 
-			for (i = 0; i < sizeof(valid_princ_formats) / sizeof(valid_princ_formats[0]); i++) {
-				if (strequal(entry_princ_s, valid_princ_formats[i])) {
-					number_matched_principals++;
-					p_packet->length = ticket->length;
-					p_packet->data = (char *)ticket->data;
-					*pp_tkt = NULL;
+		for (i = 0; i < sizeof(valid_princ_formats) / sizeof(valid_princ_formats[0]); i++) {
+			if (strequal(entry_princ_s, valid_princ_formats[i])) {
+				number_matched_principals++;
+				p_packet->length = ticket->length;
+				p_packet->data = (char *)ticket->data;
+				*pp_tkt = NULL;
 
-					ret = krb5_rd_req_return_keyblock_from_keytab(context, &auth_context, p_packet,
-									  	      kt_entry.principal, keytab,
-										      NULL, pp_tkt, keyblock);
+				ret = krb5_rd_req_return_keyblock_from_keytab(context, &auth_context, p_packet,
+								  	      kt_entry.principal, keytab,
+									      NULL, pp_tkt, keyblock);
 
-					if (ret) {
-						DEBUG(10,("ads_keytab_verify_ticket: "
-							"krb5_rd_req_return_keyblock_from_keytab(%s) failed: %s\n",
-							entry_princ_s, error_message(ret)));
+				if (ret) {
+					DEBUG(10,("ads_keytab_verify_ticket: "
+						"krb5_rd_req_return_keyblock_from_keytab(%s) failed: %s\n",
+						entry_princ_s, error_message(ret)));
 
-						/* workaround for MIT: 
-						 * as krb5_ktfile_get_entry will
-						 * explicitly close the
-						 * krb5_keytab as soon as
-						 * krb5_rd_req has sucessfully
-						 * decrypted the ticket but the
-						 * ticket is not valid yet (due
-						 * to clockskew) there is no
-						 * point in querying more
-						 * keytab entries - Guenther */
+					/* workaround for MIT: 
+					 * as krb5_ktfile_get_entry will
+					 * explicitly close the
+					 * krb5_keytab as soon as
+					 * krb5_rd_req has sucessfully
+					 * decrypted the ticket but the
+					 * ticket is not valid yet (due
+					 * to clockskew) there is no
+					 * point in querying more
+					 * keytab entries - Guenther */
 						
-						if (ret == KRB5KRB_AP_ERR_TKT_NYV || 
-						    ret == KRB5KRB_AP_ERR_TKT_EXPIRED) {
-							break;
-						}
-					} else {
-						DEBUG(3,("ads_keytab_verify_ticket: "
-							"krb5_rd_req_return_keyblock_from_keytab succeeded for principal %s\n",
-							entry_princ_s));
-						auth_ok = True;
+					if (ret == KRB5KRB_AP_ERR_TKT_NYV || 
+					    ret == KRB5KRB_AP_ERR_TKT_EXPIRED) {
 						break;
 					}
+				} else {
+					DEBUG(3,("ads_keytab_verify_ticket: "
+						"krb5_rd_req_return_keyblock_from_keytab succeeded for principal %s\n",
+						entry_princ_s));
+					auth_ok = True;
+					break;
 				}
 			}
+		}
 
-			/* Free the name we parsed. */
-			SAFE_FREE(entry_princ_s);
+		/* Free the name we parsed. */
+		SAFE_FREE(entry_princ_s);
 
-			/* Free the entry we just read. */
-			smb_krb5_kt_free_entry(context, &kt_entry);
-			ZERO_STRUCT(kt_entry);
-		}
-		krb5_kt_end_seq_get(context, keytab, &kt_cursor);
+		/* Free the entry we just read. */
+		smb_krb5_kt_free_entry(context, &kt_entry);
+		ZERO_STRUCT(kt_entry);
+	}
+	krb5_kt_end_seq_get(context, keytab, &kt_cursor);
 
 	ZERO_STRUCT(kt_cursor);
 

Modified: branches/SAMBA_3_0_25/source/libads/kerberos_verify.c
===================================================================
--- branches/SAMBA_3_0_25/source/libads/kerberos_verify.c	2007-02-27 13:25:42 UTC (rev 21556)
+++ branches/SAMBA_3_0_25/source/libads/kerberos_verify.c	2007-02-27 13:27:31 UTC (rev 21557)
@@ -88,63 +88,63 @@
 		goto out;
 	}
   
-		while (!auth_ok && (krb5_kt_next_entry(context, keytab, &kt_entry, &kt_cursor) == 0)) {
-			ret = smb_krb5_unparse_name(context, kt_entry.principal, &entry_princ_s);
-			if (ret) {
-				DEBUG(1, ("ads_keytab_verify_ticket: smb_krb5_unparse_name failed (%s)\n",
-					error_message(ret)));
-				goto out;
-			}
+	while (!auth_ok && (krb5_kt_next_entry(context, keytab, &kt_entry, &kt_cursor) == 0)) {
+		ret = smb_krb5_unparse_name(context, kt_entry.principal, &entry_princ_s);
+		if (ret) {
+			DEBUG(1, ("ads_keytab_verify_ticket: smb_krb5_unparse_name failed (%s)\n",
+				error_message(ret)));
+			goto out;
+		}
 
-			for (i = 0; i < sizeof(valid_princ_formats) / sizeof(valid_princ_formats[0]); i++) {
-				if (strequal(entry_princ_s, valid_princ_formats[i])) {
-					number_matched_principals++;
-					p_packet->length = ticket->length;
-					p_packet->data = (char *)ticket->data;
-					*pp_tkt = NULL;
+		for (i = 0; i < sizeof(valid_princ_formats) / sizeof(valid_princ_formats[0]); i++) {
+			if (strequal(entry_princ_s, valid_princ_formats[i])) {
+				number_matched_principals++;
+				p_packet->length = ticket->length;
+				p_packet->data = (char *)ticket->data;
+				*pp_tkt = NULL;
 
-					ret = krb5_rd_req_return_keyblock_from_keytab(context, &auth_context, p_packet,
-									  	      kt_entry.principal, keytab,
-										      NULL, pp_tkt, keyblock);
+				ret = krb5_rd_req_return_keyblock_from_keytab(context, &auth_context, p_packet,
+								  	      kt_entry.principal, keytab,
+									      NULL, pp_tkt, keyblock);
 
-					if (ret) {
-						DEBUG(10,("ads_keytab_verify_ticket: "
-							"krb5_rd_req_return_keyblock_from_keytab(%s) failed: %s\n",
-							entry_princ_s, error_message(ret)));
+				if (ret) {
+					DEBUG(10,("ads_keytab_verify_ticket: "
+						"krb5_rd_req_return_keyblock_from_keytab(%s) failed: %s\n",
+						entry_princ_s, error_message(ret)));
 
-						/* workaround for MIT: 
-						 * as krb5_ktfile_get_entry will
-						 * explicitly close the
-						 * krb5_keytab as soon as
-						 * krb5_rd_req has sucessfully
-						 * decrypted the ticket but the
-						 * ticket is not valid yet (due
-						 * to clockskew) there is no
-						 * point in querying more
-						 * keytab entries - Guenther */
+					/* workaround for MIT: 
+					 * as krb5_ktfile_get_entry will
+					 * explicitly close the
+					 * krb5_keytab as soon as
+					 * krb5_rd_req has sucessfully
+					 * decrypted the ticket but the
+					 * ticket is not valid yet (due
+					 * to clockskew) there is no
+					 * point in querying more
+					 * keytab entries - Guenther */
 						
-						if (ret == KRB5KRB_AP_ERR_TKT_NYV || 
-						    ret == KRB5KRB_AP_ERR_TKT_EXPIRED) {
-							break;
-						}
-					} else {
-						DEBUG(3,("ads_keytab_verify_ticket: "
-							"krb5_rd_req_return_keyblock_from_keytab succeeded for principal %s\n",
-							entry_princ_s));
-						auth_ok = True;
+					if (ret == KRB5KRB_AP_ERR_TKT_NYV || 
+					    ret == KRB5KRB_AP_ERR_TKT_EXPIRED) {
 						break;
 					}
+				} else {
+					DEBUG(3,("ads_keytab_verify_ticket: "
+						"krb5_rd_req_return_keyblock_from_keytab succeeded for principal %s\n",
+						entry_princ_s));
+					auth_ok = True;
+					break;
 				}
 			}
+		}
 
-			/* Free the name we parsed. */
-			SAFE_FREE(entry_princ_s);
+		/* Free the name we parsed. */
+		SAFE_FREE(entry_princ_s);
 
-			/* Free the entry we just read. */
-			smb_krb5_kt_free_entry(context, &kt_entry);
-			ZERO_STRUCT(kt_entry);
-		}
-		krb5_kt_end_seq_get(context, keytab, &kt_cursor);
+		/* Free the entry we just read. */
+		smb_krb5_kt_free_entry(context, &kt_entry);
+		ZERO_STRUCT(kt_entry);
+	}
+	krb5_kt_end_seq_get(context, keytab, &kt_cursor);
 
 	ZERO_STRUCT(kt_cursor);
 



More information about the samba-cvs mailing list