diff options
author | Julien Chaffraix <julien.chaffraix@gmail.com> | 2010-11-13 12:01:33 -0800 |
---|---|---|
committer | Julien Chaffraix <julien.chaffraix@gmail.com> | 2010-11-13 14:12:43 -0800 |
commit | 8d59d69449c2a86c478699a50d920541aa106201 (patch) | |
tree | 15ef9751b2d92dbd511c95d22d70ca61bdeec674 /lib/krb4.h | |
parent | 465865c3cb316907ca1c1ea813cf426a2366dce4 (diff) |
security: tighten enum protection_level usage.
While changing Curl_sec_read_msg to accept an enum protection_level
instead of an int, I went ahead and fixed the usage of the associated
fields.
Some code was assuming that prot_clear == 0. Fixed those to use the
proper value. Added assertions prior to any code that would set the
protection level.
Diffstat (limited to 'lib/krb4.h')
-rw-r--r-- | lib/krb4.h | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/lib/krb4.h b/lib/krb4.h index 537a1e140..b3b5ea763 100644 --- a/lib/krb4.h +++ b/lib/krb4.h @@ -47,7 +47,7 @@ extern struct Curl_sec_client_mech Curl_krb5_client_mech; #endif CURLcode Curl_krb_kauth(struct connectdata *conn); -int Curl_sec_read_msg (struct connectdata *conn, char *, int); +int Curl_sec_read_msg (struct connectdata *conn, char *, enum protection_level); void Curl_sec_end (struct connectdata *); CURLcode Curl_sec_login (struct connectdata *); int Curl_sec_request_prot (struct connectdata *conn, const char *level); |