diff options
author | David Howells <dhowells@redhat.com> | 2009-09-16 03:01:13 -0400 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2009-09-16 03:01:13 -0400 |
commit | 4e36a95e591e9c58dd10bb4103c00993917c27fd (patch) | |
tree | e97be725f4aca0084e148cb68bd99552a480b47e /include/keys | |
parent | 634354d753898f9d9d146bd47628a1ef27f7dc98 (diff) |
RxRPC: Use uX/sX rather than uintX_t/intX_t types
Use uX rather than uintX_t types for consistency.
Signed-off-by: David Howells <dhowells@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'include/keys')
-rw-r--r-- | include/keys/rxrpc-type.h | 20 |
1 files changed, 10 insertions, 10 deletions
diff --git a/include/keys/rxrpc-type.h b/include/keys/rxrpc-type.h index 5eb23571b425..5cb86c307f5d 100644 --- a/include/keys/rxrpc-type.h +++ b/include/keys/rxrpc-type.h | |||
@@ -53,8 +53,8 @@ struct krb5_tagged_data { | |||
53 | * - KRB5_AUTHDATA_* for auth data | 53 | * - KRB5_AUTHDATA_* for auth data |
54 | * - | 54 | * - |
55 | */ | 55 | */ |
56 | int32_t tag; | 56 | s32 tag; |
57 | uint32_t data_len; | 57 | u32 data_len; |
58 | u8 *data; | 58 | u8 *data; |
59 | }; | 59 | }; |
60 | 60 | ||
@@ -62,17 +62,17 @@ struct krb5_tagged_data { | |||
62 | * RxRPC key for Kerberos V (type-5 security) | 62 | * RxRPC key for Kerberos V (type-5 security) |
63 | */ | 63 | */ |
64 | struct rxk5_key { | 64 | struct rxk5_key { |
65 | uint64_t authtime; /* time at which auth token generated */ | 65 | u64 authtime; /* time at which auth token generated */ |
66 | uint64_t starttime; /* time at which auth token starts */ | 66 | u64 starttime; /* time at which auth token starts */ |
67 | uint64_t endtime; /* time at which auth token expired */ | 67 | u64 endtime; /* time at which auth token expired */ |
68 | uint64_t renew_till; /* time to which auth token can be renewed */ | 68 | u64 renew_till; /* time to which auth token can be renewed */ |
69 | int32_t is_skey; /* T if ticket is encrypted in another ticket's | 69 | s32 is_skey; /* T if ticket is encrypted in another ticket's |
70 | * skey */ | 70 | * skey */ |
71 | int32_t flags; /* mask of TKT_FLG_* bits (krb5/krb5.h) */ | 71 | s32 flags; /* mask of TKT_FLG_* bits (krb5/krb5.h) */ |
72 | struct krb5_principal client; /* client principal name */ | 72 | struct krb5_principal client; /* client principal name */ |
73 | struct krb5_principal server; /* server principal name */ | 73 | struct krb5_principal server; /* server principal name */ |
74 | uint16_t ticket_len; /* length of ticket */ | 74 | u16 ticket_len; /* length of ticket */ |
75 | uint16_t ticket2_len; /* length of second ticket */ | 75 | u16 ticket2_len; /* length of second ticket */ |
76 | u8 n_authdata; /* number of authorisation data elements */ | 76 | u8 n_authdata; /* number of authorisation data elements */ |
77 | u8 n_addresses; /* number of addresses */ | 77 | u8 n_addresses; /* number of addresses */ |
78 | struct krb5_tagged_data session; /* session data; tag is enctype */ | 78 | struct krb5_tagged_data session; /* session data; tag is enctype */ |