}
}
if (code) {
- major = GSS_S_CRED_UNAVAIL;
+ major = GSS_S_NO_CRED;
goto cleanup;
}
k5_change_error_message_code(context, code, KG_KEYTAB_NOMATCH);
code = KG_KEYTAB_NOMATCH;
}
- major = GSS_S_CRED_UNAVAIL;
+ major = GSS_S_NO_CRED;
goto cleanup;
}
/* Make sure we have a keytab with keys in it. */
code = krb5_kt_have_content(context, kt);
if (code) {
- major = GSS_S_CRED_UNAVAIL;
+ major = GSS_S_NO_CRED;
goto cleanup;
}
}
error:
*minor_status = code;
- return GSS_S_CRED_UNAVAIL;
+ return GSS_S_NO_CRED;
}
static OM_uint32
k5_mutex_unlock(&cred->lock);
save_error_info(code, context);
*minor_status = code;
- return GSS_S_CRED_UNAVAIL;
+ return GSS_S_NO_CRED;
}
OM_uint32
code = krb5_cc_resolve(context, value, &ccache);
if (code != 0) {
*minor_status = code;
- ret = GSS_S_CRED_UNAVAIL;
+ ret = GSS_S_NO_CRED;
goto out;
}
}
code = krb5_kt_resolve(context, value, &client_keytab);
if (code != 0) {
*minor_status = code;
- ret = GSS_S_CRED_UNAVAIL;
+ ret = GSS_S_NO_CRED;
goto out;
}
}
code = krb5_kt_resolve(context, value, &keytab);
if (code != 0) {
*minor_status = code;
- ret = GSS_S_CRED_UNAVAIL;
+ ret = GSS_S_NO_CRED;
goto out;
}
}
code = krb5_cc_resolve(context, ccache_name, &ccache);
if (code != 0) {
*minor_status = code;
- major_status = GSS_S_CRED_UNAVAIL;
+ major_status = GSS_S_FAILURE;
goto cleanup;
}
code = krb5_cc_initialize(context, ccache,
kcred->name->princ);
if (code != 0) {
*minor_status = code;
- major_status = GSS_S_CRED_UNAVAIL;
+ major_status = GSS_S_FAILURE;
goto cleanup;
}
}
major = gss_add_cred(&minor, GSS_C_NO_CREDENTIAL, name, &mech_krb5,
GSS_C_INITIATE, GSS_C_INDEFINITE, GSS_C_INDEFINITE,
&cred1, NULL, NULL, NULL);
- assert(major == GSS_S_CRED_UNAVAIL);
+ assert(major == GSS_S_NO_CRED);
gss_release_name(&minor, &name);
/* Create cred1 with a krb5 initiator cred by passing an output handle but