]> git.ipfire.org Git - thirdparty/samba.git/commitdiff
s4:kdc: Make some functions static
authorJoseph Sutton <josephsutton@catalyst.net.nz>
Thu, 10 Aug 2023 22:07:55 +0000 (10:07 +1200)
committerAndrew Bartlett <abartlet@samba.org>
Mon, 14 Aug 2023 04:57:34 +0000 (04:57 +0000)
Signed-off-by: Joseph Sutton <josephsutton@catalyst.net.nz>
Reviewed-by: Andrew Bartlett <abartlet@samba.org>
source4/kdc/pac-glue.c
source4/kdc/pac-glue.h

index 839bc8d840bf292eeb9ce9ceb9b82ecf3f8b2ca2..368cd23844db7456ab0c608b6092dddff5c8edf4 100644 (file)
@@ -743,10 +743,10 @@ bool samba_princ_needs_pac(const struct samba_kdc_entry *skdc_entry)
        return true;
 }
 
-int samba_client_requested_pac(krb5_context context,
-                              const krb5_const_pac pac,
-                              TALLOC_CTX *mem_ctx,
-                              bool *requested_pac)
+static int samba_client_requested_pac(krb5_context context,
+                                     const krb5_const_pac pac,
+                                     TALLOC_CTX *mem_ctx,
+                                     bool *requested_pac)
 {
        enum ndr_err_code ndr_err;
        krb5_data k5pac_attrs_in;
@@ -1507,7 +1507,7 @@ static krb5_error_code samba_get_requester_sid(TALLOC_CTX *mem_ctx,
 }
 
 /* Does a parse and SID check, but no crypto. */
-krb5_error_code samba_kdc_validate_pac_blob(
+static krb5_error_code samba_kdc_validate_pac_blob(
                krb5_context context,
                const struct samba_kdc_entry *client_skdc_entry,
                const krb5_const_pac pac)
@@ -1579,10 +1579,10 @@ out:
  * In the RODC case, to confirm that the returned user is permitted to
  * be replicated to the KDC (krbgtgt_xxx user) represented by *rodc
  */
-WERROR samba_rodc_confirm_user_is_allowed(uint32_t num_object_sids,
-                                         const struct dom_sid *object_sids,
-                                         const struct samba_kdc_entry *rodc,
-                                         const struct samba_kdc_entry *object)
+static WERROR samba_rodc_confirm_user_is_allowed(uint32_t num_object_sids,
+                                                const struct dom_sid *object_sids,
+                                                const struct samba_kdc_entry *rodc,
+                                                const struct samba_kdc_entry *object)
 {
        int ret;
        WERROR werr;
index a3f7f8ce42148058d5863c1fa2f94fb999904292..06bf69433dab2d4023a02553a85019aac7602205 100644 (file)
@@ -78,11 +78,6 @@ krb5_error_code samba_make_krb5_pac(krb5_context context,
 
 bool samba_princ_needs_pac(const struct samba_kdc_entry *skdc_entry);
 
-int samba_client_requested_pac(krb5_context context,
-                              krb5_const_pac pac,
-                              TALLOC_CTX *mem_ctx,
-                              bool *requested_pac);
-
 int samba_krbtgt_is_in_db(struct samba_kdc_entry *skdc_entry,
                          bool *is_in_db,
                          bool *is_trusted);
@@ -105,21 +100,6 @@ NTSTATUS samba_kdc_check_client_access(struct samba_kdc_entry *kdc_entry,
                                       const char *workstation,
                                       bool password_change);
 
-krb5_error_code samba_kdc_validate_pac_blob(
-               krb5_context context,
-               const struct samba_kdc_entry *client_skdc_entry,
-               krb5_const_pac pac);
-
-/*
- * In the RODC case, to confirm that the returned user is permitted to
- * be replicated to the KDC (krbgtgt_xxx user) represented by *rodc
- */
-struct dom_sid;
-WERROR samba_rodc_confirm_user_is_allowed(uint32_t num_sids,
-                                         const struct dom_sid *object_sids,
-                                         const struct samba_kdc_entry *rodc,
-                                         const struct samba_kdc_entry *object);
-
 krb5_error_code samba_kdc_verify_pac(TALLOC_CTX *mem_ctx,
                                     krb5_context context,
                                     uint32_t flags,