CVS commit: src/crypto/external/bsd/heimdal/dist/kadmin
Module Name:src Committed By: christos Date: Mon May 12 15:34:23 UTC 2014 Modified Files: src/crypto/external/bsd/heimdal/dist/kadmin: rpc.c Log Message: CID 1011266: Unchecked returns To generate a diff of this commit: cvs rdiff -u -r1.1.1.2 -r1.2 \ src/crypto/external/bsd/heimdal/dist/kadmin/rpc.c Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files. Modified files: Index: src/crypto/external/bsd/heimdal/dist/kadmin/rpc.c diff -u src/crypto/external/bsd/heimdal/dist/kadmin/rpc.c:1.1.1.2 src/crypto/external/bsd/heimdal/dist/kadmin/rpc.c:1.2 --- src/crypto/external/bsd/heimdal/dist/kadmin/rpc.c:1.1.1.2 Thu Apr 24 08:45:27 2014 +++ src/crypto/external/bsd/heimdal/dist/kadmin/rpc.c Mon May 12 11:34:23 2014 @@ -1,4 +1,4 @@ -/* $NetBSD: rpc.c,v 1.1.1.2 2014/04/24 12:45:27 pettai Exp $ */ +/* $NetBSD: rpc.c,v 1.2 2014/05/12 15:34:23 christos Exp $ */ /* * Copyright (c) 2008 Kungliga Tekniska Högskolan @@ -465,7 +465,7 @@ ret_principal_ent(krb5_context contextp, ent->max_life = flag; CHECK(krb5_ret_uint32(sp, &flag)); if (flag == 0) - ret_principal_xdr(contextp, sp, &ent->mod_name); + CHECK(ret_principal_xdr(contextp, sp, &ent->mod_name)); CHECK(krb5_ret_uint32(sp, &flag)); ent->mod_date = flag; CHECK(krb5_ret_uint32(sp, &flag));
CVS commit: src/crypto/external/bsd/heimdal/dist/kadmin
Module Name:src Committed By: wiz Date: Thu Apr 28 14:15:53 UTC 2011 Modified Files: src/crypto/external/bsd/heimdal/dist/kadmin: kadmind.8 Log Message: Punctuation fix. To generate a diff of this commit: cvs rdiff -u -r1.2 -r1.3 \ src/crypto/external/bsd/heimdal/dist/kadmin/kadmind.8 Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files. Modified files: Index: src/crypto/external/bsd/heimdal/dist/kadmin/kadmind.8 diff -u src/crypto/external/bsd/heimdal/dist/kadmin/kadmind.8:1.2 src/crypto/external/bsd/heimdal/dist/kadmin/kadmind.8:1.3 --- src/crypto/external/bsd/heimdal/dist/kadmin/kadmind.8:1.2 Thu Apr 14 19:19:19 2011 +++ src/crypto/external/bsd/heimdal/dist/kadmin/kadmind.8 Thu Apr 28 14:15:53 2011 @@ -1,4 +1,4 @@ -.\" $NetBSD: kadmind.8,v 1.2 2011/04/14 19:19:19 elric Exp $ +.\" $NetBSD: kadmind.8,v 1.3 2011/04/28 14:15:53 wiz Exp $ .\" .\" Copyright (c) 2002 - 2004 Kungliga Tekniska Högskolan .\" (Royal Institute of Technology, Stockholm, Sweden). @@ -78,8 +78,7 @@ .Xr kpasswdd 8 daemon is responsible for the Kerberos 5 password changing protocol (used by -.Xr kpasswd 1 ) -. +.Xr kpasswd 1 ) . .Pp This daemon should only be run on the master server, and not on any slaves.
CVS commit: src/crypto/external/bsd/heimdal/dist/kadmin
Module Name:src Committed By: christos Date: Thu Apr 21 17:58:56 UTC 2011 Modified Files: src/crypto/external/bsd/heimdal/dist/kadmin: get.c Log Message: Fix signed/unsigned warnings. Discover bug where < 0 case cannot happen, and change it to >= 0 as intended. To generate a diff of this commit: cvs rdiff -u -r1.1.1.1 -r1.2 \ src/crypto/external/bsd/heimdal/dist/kadmin/get.c Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files. Modified files: Index: src/crypto/external/bsd/heimdal/dist/kadmin/get.c diff -u src/crypto/external/bsd/heimdal/dist/kadmin/get.c:1.1.1.1 src/crypto/external/bsd/heimdal/dist/kadmin/get.c:1.2 --- src/crypto/external/bsd/heimdal/dist/kadmin/get.c:1.1.1.1 Wed Apr 13 14:14:35 2011 +++ src/crypto/external/bsd/heimdal/dist/kadmin/get.c Thu Apr 21 13:58:56 2011 @@ -1,4 +1,4 @@ -/* $NetBSD: get.c,v 1.1.1.1 2011/04/13 18:14:35 elric Exp $ */ +/* $NetBSD: get.c,v 1.2 2011/04/21 17:58:56 christos Exp $ */ /* * Copyright (c) 1997-2006 Kungliga Tekniska Högskolan @@ -66,7 +66,7 @@ { "password", KADM5_TL_DATA, KRB5_TL_PASSWORD, KADM5_KEY_DATA, "Password", "Password", 0 }, { "pkinit-acl", KADM5_TL_DATA, KRB5_TL_PKINIT_ACL, 0, "PK-INIT ACL", "PK-INIT ACL", 0 }, { "aliases", KADM5_TL_DATA, KRB5_TL_ALIASES, 0, "Aliases", "Aliases", 0 }, -{ NULL } +{ .fieldname = NULL } }; struct field_info { @@ -112,9 +112,9 @@ static int cmp_salt (const krb5_salt *salt, const krb5_key_data *k) { -if (salt->salttype != k->key_data_type[1]) +if (salt->salttype != (size_t)k->key_data_type[1]) return 1; -if (salt->saltvalue.length != k->key_data_length[1]) +if (salt->saltvalue.length != (size_t)k->key_data_length[1]) return 1; return memcmp (salt->saltvalue.data, k->key_data_contents[1], salt->saltvalue.length); @@ -247,7 +247,7 @@ krb5_tl_data *tl; for (tl = princ->tl_data; tl != NULL; tl = tl->tl_data_next) - if (tl->tl_data_type == subfield) + if ((unsigned)tl->tl_data_type == subfield) break; if (tl == NULL) { strlcpy(buf, "", buf_len); @@ -263,7 +263,8 @@ case KRB5_TL_PKINIT_ACL: { HDB_Ext_PKINIT_acl acl; size_t size; - int i, ret; + int ret; + size_t i; ret = decode_HDB_Ext_PKINIT_acl(tl->tl_data_contents, tl->tl_data_length, @@ -295,7 +296,8 @@ case KRB5_TL_ALIASES: { HDB_Ext_Aliases alias; size_t size; - int i, ret; + int ret; + size_t i; ret = decode_HDB_Ext_Aliases(tl->tl_data_contents, tl->tl_data_length, @@ -311,7 +313,7 @@ ret = krb5_unparse_name(context, &alias.aliases.val[i], &p); if (ret) break; - if (i < 0) + if (i > 0) strlcat(buf, " ", buf_len); strlcat(buf, p, buf_len); free(p);
CVS commit: src/crypto/external/bsd/heimdal/dist/kadmin
Module Name:src Committed By: christos Date: Thu Apr 21 17:56:24 UTC 2011 Modified Files: src/crypto/external/bsd/heimdal/dist/kadmin: util.c Log Message: Don't compare a pointer < 0; this is obviously a missed * here. While here, remove shadow variable warnings. To generate a diff of this commit: cvs rdiff -u -r1.1.1.1 -r1.2 \ src/crypto/external/bsd/heimdal/dist/kadmin/util.c Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files. Modified files: Index: src/crypto/external/bsd/heimdal/dist/kadmin/util.c diff -u src/crypto/external/bsd/heimdal/dist/kadmin/util.c:1.1.1.1 src/crypto/external/bsd/heimdal/dist/kadmin/util.c:1.2 --- src/crypto/external/bsd/heimdal/dist/kadmin/util.c:1.1.1.1 Wed Apr 13 14:14:35 2011 +++ src/crypto/external/bsd/heimdal/dist/kadmin/util.c Thu Apr 21 13:56:24 2011 @@ -1,4 +1,4 @@ -/* $NetBSD: util.c,v 1.1.1.1 2011/04/13 18:14:35 elric Exp $ */ +/* $NetBSD: util.c,v 1.2 2011/04/21 17:56:24 christos Exp $ */ /* * Copyright (c) 1997 - 2006 Kungliga Tekniska Högskolan @@ -67,7 +67,7 @@ { "disallow-tgt-based", KRB5_KDB_DISALLOW_TGT_BASED }, { "disallow-forwardable", KRB5_KDB_DISALLOW_FORWARDABLE }, { "disallow-postdated", KRB5_KDB_DISALLOW_POSTDATED }, -{ NULL } +{ NULL, 0 } }; /* @@ -190,7 +190,7 @@ if (str[0] == '+') { str++; *t = parse_time(str, "month"); - if (t < 0) + if (*t < 0) return -1; *t += time(NULL); return 0; @@ -432,7 +432,7 @@ */ int -set_entry(krb5_context context, +set_entry(krb5_context contextp, kadm5_principal_ent_t ent, int *mask, const char *max_ticket_life, @@ -444,14 +444,14 @@ if (max_ticket_life != NULL) { if (parse_deltat (max_ticket_life, &ent->max_life, mask, KADM5_MAX_LIFE)) { - krb5_warnx (context, "unable to parse `%s'", max_ticket_life); + krb5_warnx (contextp, "unable to parse `%s'", max_ticket_life); return 1; } } if (max_renewable_life != NULL) { if (parse_deltat (max_renewable_life, &ent->max_renewable_life, mask, KADM5_MAX_RLIFE)) { - krb5_warnx (context, "unable to parse `%s'", max_renewable_life); + krb5_warnx (contextp, "unable to parse `%s'", max_renewable_life); return 1; } } @@ -459,21 +459,21 @@ if (expiration) { if (parse_timet (expiration, &ent->princ_expire_time, mask, KADM5_PRINC_EXPIRE_TIME)) { - krb5_warnx (context, "unable to parse `%s'", expiration); + krb5_warnx (contextp, "unable to parse `%s'", expiration); return 1; } } if (pw_expiration) { if (parse_timet (pw_expiration, &ent->pw_expiration, mask, KADM5_PW_EXPIRATION)) { - krb5_warnx (context, "unable to parse `%s'", pw_expiration); + krb5_warnx (contextp, "unable to parse `%s'", pw_expiration); return 1; } } if (attributes != NULL) { if (parse_attributes (attributes, &ent->attributes, mask, KADM5_ATTRIBUTES)) { - krb5_warnx (context, "unable to parse `%s'", attributes); + krb5_warnx (contextp, "unable to parse `%s'", attributes); return 1; } }