mirror of
https://salsa.debian.org/freeipa-team/freeipa.git
synced 2025-01-11 16:51:55 -06:00
Fix indentation levels
Reviewed-By: Alexander Bokovoy <abokovoy@redhat.com> Reviewed-By: Christian Heimes <cheimes@redhat.com>
This commit is contained in:
parent
e913fdc8aa
commit
38204856fd
@ -286,8 +286,8 @@ free_and_error:
|
|||||||
* slapi_pblock_destroy(pb)
|
* slapi_pblock_destroy(pb)
|
||||||
*/
|
*/
|
||||||
static int pwd_get_values(const Slapi_Entry *ent, const char *attrname,
|
static int pwd_get_values(const Slapi_Entry *ent, const char *attrname,
|
||||||
Slapi_ValueSet** results, char** actual_type_name,
|
Slapi_ValueSet** results, char** actual_type_name,
|
||||||
int *buffer_flags)
|
int *buffer_flags)
|
||||||
{
|
{
|
||||||
int flags=0;
|
int flags=0;
|
||||||
int type_name_disposition = 0;
|
int type_name_disposition = 0;
|
||||||
@ -560,7 +560,7 @@ int ipapwd_CheckPolicy(struct ipapwd_data *data)
|
|||||||
LOG_TRACE("No password policy, use defaults");
|
LOG_TRACE("No password policy, use defaults");
|
||||||
}
|
}
|
||||||
break;
|
break;
|
||||||
case IPA_CHANGETYPE_ADMIN:
|
case IPA_CHANGETYPE_ADMIN:
|
||||||
/* The expiration date needs to be older than the current time
|
/* The expiration date needs to be older than the current time
|
||||||
* otherwise the KDC may not immediately register the password
|
* otherwise the KDC may not immediately register the password
|
||||||
* as expired. The last password change needs to match the
|
* as expired. The last password change needs to match the
|
||||||
@ -636,7 +636,7 @@ int ipapwd_CheckPolicy(struct ipapwd_data *data)
|
|||||||
}
|
}
|
||||||
|
|
||||||
/* Searches the dn in directory,
|
/* Searches the dn in directory,
|
||||||
* If found : fills in slapi_entry structure and returns 0
|
* If found : fills in slapi_entry structure and returns 0
|
||||||
* If NOT found : returns the search result as LDAP_NO_SUCH_OBJECT
|
* If NOT found : returns the search result as LDAP_NO_SUCH_OBJECT
|
||||||
*/
|
*/
|
||||||
int ipapwd_getEntry(const char *dn, Slapi_Entry **e2, char **attrlist)
|
int ipapwd_getEntry(const char *dn, Slapi_Entry **e2, char **attrlist)
|
||||||
@ -795,22 +795,21 @@ int ipapwd_SetPassword(struct ipapwd_krbcfg *krbcfg,
|
|||||||
slapi_mods_add_mod_values(smods, LDAP_MOD_REPLACE,
|
slapi_mods_add_mod_values(smods, LDAP_MOD_REPLACE,
|
||||||
"krbPrincipalKey", svals);
|
"krbPrincipalKey", svals);
|
||||||
|
|
||||||
/* krbLastPwdChange is used to tell whether a host entry has a
|
/* krbLastPwdChange is used to tell whether a host entry has a
|
||||||
* keytab so don't set it on hosts.
|
* keytab so don't set it on hosts. */
|
||||||
*/
|
|
||||||
if (!is_host) {
|
if (!is_host) {
|
||||||
/* change Last Password Change field with the current date */
|
/* change Last Password Change field with the current date */
|
||||||
ret = ipapwd_setdate(data->target, smods, "krbLastPwdChange",
|
ret = ipapwd_setdate(data->target, smods, "krbLastPwdChange",
|
||||||
data->timeNow, false);
|
data->timeNow, false);
|
||||||
if (ret != LDAP_SUCCESS)
|
if (ret != LDAP_SUCCESS)
|
||||||
goto free_and_return;
|
goto free_and_return;
|
||||||
|
|
||||||
/* set Password Expiration date */
|
/* set Password Expiration date */
|
||||||
ret = ipapwd_setdate(data->target, smods, "krbPasswordExpiration",
|
ret = ipapwd_setdate(data->target, smods, "krbPasswordExpiration",
|
||||||
data->expireTime, (data->expireTime == 0));
|
data->expireTime, (data->expireTime == 0));
|
||||||
if (ret != LDAP_SUCCESS)
|
if (ret != LDAP_SUCCESS)
|
||||||
goto free_and_return;
|
goto free_and_return;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if (nt && is_smb) {
|
if (nt && is_smb) {
|
||||||
|
Loading…
Reference in New Issue
Block a user