diff options
| author | David Howells <dhowells@redhat.com> | 2009-09-16 03:01:13 -0400 |
|---|---|---|
| committer | David S. Miller <davem@davemloft.net> | 2009-09-16 03:01:13 -0400 |
| commit | 4e36a95e591e9c58dd10bb4103c00993917c27fd (patch) | |
| tree | e97be725f4aca0084e148cb68bd99552a480b47e /include/keys | |
| parent | 634354d753898f9d9d146bd47628a1ef27f7dc98 (diff) | |
RxRPC: Use uX/sX rather than uintX_t/intX_t types
Use uX rather than uintX_t types for consistency.
Signed-off-by: David Howells <dhowells@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'include/keys')
| -rw-r--r-- | include/keys/rxrpc-type.h | 20 |
1 files changed, 10 insertions, 10 deletions
diff --git a/include/keys/rxrpc-type.h b/include/keys/rxrpc-type.h index 5eb23571b425..5cb86c307f5d 100644 --- a/include/keys/rxrpc-type.h +++ b/include/keys/rxrpc-type.h | |||
| @@ -53,8 +53,8 @@ struct krb5_tagged_data { | |||
| 53 | * - KRB5_AUTHDATA_* for auth data | 53 | * - KRB5_AUTHDATA_* for auth data |
| 54 | * - | 54 | * - |
| 55 | */ | 55 | */ |
| 56 | int32_t tag; | 56 | s32 tag; |
| 57 | uint32_t data_len; | 57 | u32 data_len; |
| 58 | u8 *data; | 58 | u8 *data; |
| 59 | }; | 59 | }; |
| 60 | 60 | ||
| @@ -62,17 +62,17 @@ struct krb5_tagged_data { | |||
| 62 | * RxRPC key for Kerberos V (type-5 security) | 62 | * RxRPC key for Kerberos V (type-5 security) |
| 63 | */ | 63 | */ |
| 64 | struct rxk5_key { | 64 | struct rxk5_key { |
| 65 | uint64_t authtime; /* time at which auth token generated */ | 65 | u64 authtime; /* time at which auth token generated */ |
| 66 | uint64_t starttime; /* time at which auth token starts */ | 66 | u64 starttime; /* time at which auth token starts */ |
| 67 | uint64_t endtime; /* time at which auth token expired */ | 67 | u64 endtime; /* time at which auth token expired */ |
| 68 | uint64_t renew_till; /* time to which auth token can be renewed */ | 68 | u64 renew_till; /* time to which auth token can be renewed */ |
| 69 | int32_t is_skey; /* T if ticket is encrypted in another ticket's | 69 | s32 is_skey; /* T if ticket is encrypted in another ticket's |
| 70 | * skey */ | 70 | * skey */ |
| 71 | int32_t flags; /* mask of TKT_FLG_* bits (krb5/krb5.h) */ | 71 | s32 flags; /* mask of TKT_FLG_* bits (krb5/krb5.h) */ |
| 72 | struct krb5_principal client; /* client principal name */ | 72 | struct krb5_principal client; /* client principal name */ |
| 73 | struct krb5_principal server; /* server principal name */ | 73 | struct krb5_principal server; /* server principal name */ |
| 74 | uint16_t ticket_len; /* length of ticket */ | 74 | u16 ticket_len; /* length of ticket */ |
| 75 | uint16_t ticket2_len; /* length of second ticket */ | 75 | u16 ticket2_len; /* length of second ticket */ |
| 76 | u8 n_authdata; /* number of authorisation data elements */ | 76 | u8 n_authdata; /* number of authorisation data elements */ |
| 77 | u8 n_addresses; /* number of addresses */ | 77 | u8 n_addresses; /* number of addresses */ |
| 78 | struct krb5_tagged_data session; /* session data; tag is enctype */ | 78 | struct krb5_tagged_data session; /* session data; tag is enctype */ |
