gss_buffer_t,
OM_uint32, gss_buffer_t, send_token_flag,
gss_buffer_t);
-static OM_uint32
+static int
make_spnego_tokenTarg_msg(uint8_t, gss_OID, gss_buffer_t,
gss_buffer_t, send_token_flag,
gss_buffer_t);
* gss_accept_sec_context and eventually up to the application program
* and over to the client.
*/
-static OM_uint32
+static int
make_spnego_tokenTarg_msg(uint8_t status, gss_OID mech_wanted,
gss_buffer_t token, gss_buffer_t mic,
send_token_flag sendtoken,
struct k5buf buf;
if (outbuf == GSS_C_NO_BUFFER)
- return (GSS_S_DEFECTIVE_TOKEN);
+ return (-1);
if (sendtoken == INIT_TOKEN_SEND && mech_wanted == GSS_C_NO_OID)
- return (GSS_S_DEFECTIVE_TOKEN);
+ return (-1);
outbuf->length = 0;
outbuf->value = NULL;
/* Allocate space and prepare a buffer. */
t = gssalloc_malloc(choice_len);
if (t == NULL)
- return (GSS_S_DEFECTIVE_TOKEN);
+ return (-1);
k5_buf_init_fixed(&buf, t, choice_len);
/* Add the choice tag and begin the sequence. */
/* Now handle local_port, if appropriate */
if (!kret && auth_context->local_port) {
(void) krb5_ser_pack_int32(TOKEN_LPORT, &bp, &remain);
- kret = k5_externalize_address(auth_context->local_addr,
+ kret = k5_externalize_address(auth_context->local_port,
&bp, &remain);
}