des_key_schedule key_schedule;
if (!secrets_init())
- return False;
+ return false;
if (!secrets_fetch_afs_key(cell, &key)) {
DEBUG(1, ("Could not fetch AFS service key\n"));
- return False;
+ return false;
}
ct->AuthHandle = key.kvno;
*ticket = data_blob(clear_ticket, len);
- return True;
+ return true;
}
char *afs_createtoken_str(const char *username, const char *cell)
afs_username, cell));
if (!afs_createtoken(afs_username, cell, &ticket, &ct))
- return False;
+ return false;
/* For which Unix-UID do we want to set the token? */
ct.ViceId = getuid();
bool afs_login(connection_struct *conn)
{
- return True;
+ return true;
}
char *afs_createtoken_str(const char *username, const char *cell)
if ((t = strtok_r(s, "\n", &saveptr)) == NULL) {
DEBUG(10, ("strtok_r failed\n"));
- return False;
+ return false;
}
*cell = SMB_STRDUP(t);
if ((t = strtok_r(NULL, "\n", &saveptr)) == NULL) {
DEBUG(10, ("strtok_r failed\n"));
- return False;
+ return false;
}
if (sscanf(t, "%u", &result_ct.AuthHandle) != 1) {
DEBUG(10, ("sscanf AuthHandle failed\n"));
- return False;
+ return false;
}
if ((t = strtok_r(NULL, "\n", &saveptr)) == NULL) {
DEBUG(10, ("strtok_r failed\n"));
- return False;
+ return false;
}
blob = base64_decode_data_blob(t);
(blob.length != sizeof(result_ct.HandShakeKey) )) {
DEBUG(10, ("invalid key: %x/%lu\n", (uint8_t)*blob.data,
(unsigned long) blob.length));
- return False;
+ return false;
}
memcpy(result_ct.HandShakeKey, blob.data, blob.length);
if ((t = strtok_r(NULL, "\n", &saveptr)) == NULL) {
DEBUG(10, ("strtok_r failed\n"));
- return False;
+ return false;
}
if (sscanf(t, "%u", &result_ct.ViceId) != 1) {
DEBUG(10, ("sscanf ViceId failed\n"));
- return False;
+ return false;
}
if ((t = strtok_r(NULL, "\n", &saveptr)) == NULL) {
DEBUG(10, ("strtok_r failed\n"));
- return False;
+ return false;
}
if (sscanf(t, "%u", &result_ct.BeginTimestamp) != 1) {
DEBUG(10, ("sscanf BeginTimestamp failed\n"));
- return False;
+ return false;
}
if ((t = strtok_r(NULL, "\n", &saveptr)) == NULL) {
DEBUG(10, ("strtok_r failed\n"));
- return False;
+ return false;
}
if (sscanf(t, "%u", &result_ct.EndTimestamp) != 1) {
DEBUG(10, ("sscanf EndTimestamp failed\n"));
- return False;
+ return false;
}
if ((t = strtok_r(NULL, "\n", &saveptr)) == NULL) {
DEBUG(10, ("strtok_r failed\n"));
- return False;
+ return false;
}
blob = base64_decode_data_blob(t);
if (blob.data == NULL) {
DEBUG(10, ("Could not get ticket\n"));
- return False;
+ return false;
}
*ticket = blob;
*ct = result_ct;
- return True;
+ return true;
}
/*
tmp = strlen(cell);
if (tmp >= MAXKTCREALMLEN) {
DEBUG(1, ("Realm too long\n"));
- return False;
+ return false;
}
strncpy(p, cell, tmp);
char *cell;
if (!afs_decode_token(token_string, &cell, &ticket, &ct))
- return False;
+ return false;
if (geteuid() != sec_initial_uid())
ct.ViceId = getuid();
bool afs_settoken_str(const char *token_string)
{
- return False;
+ return false;
}
#endif