For Linux s390 (but not s390x), an additional argument was passed
to KAM_SetPassword between the kvno and the encryption key. This
doesn't seem to match the rest of the code and is now, with stricter
prototyping, preventing the code from compiling. Remove it and use
the same call sequence on s390 as everywhere else.
Change-Id: I750f64212e80d4bed4500e316ad7d354608866d7
Reviewed-on: http://gerrit.openafs.org/1790
Reviewed-by: Derrick Brashear <shadow@dementia.org>
Tested-by: Derrick Brashear <shadow@dementia.org>
if (as->parms[3].items)
sscanf(as->parms[3].items->data, "%d", &kvno);
-#if defined(AFS_S390_LINUX20_ENV) && !defined(AFS_S390X_LINUX20_ENV)
- code = ubik_Call(KAM_SetPassword, conn, 0, name, instance, kvno, 0, key);
-#else
code = ubik_Call(KAM_SetPassword, conn, 0, name, instance, kvno, key);
-#endif
if (code)
afs_com_err(whoami, code, "so can't set password for %s.%s", name,
instance);
afs_int32 code;
LOCK_GLOBAL_MUTEX;
-#if defined(AFS_S390_LINUX20_ENV) && !defined(AFS_S390X_LINUX20_ENV)
- code =
- ubik_KAM_SetPassword(conn, UBIK_CALL_NEW, name, instance, 0, 0, *(EncryptionKey *)newkey);
-#else
code =
ubik_KAM_SetPassword(conn, UBIK_CALL_NEW, name, instance, 0, *(EncryptionKey *)newkey);
-#endif
UNLOCK_GLOBAL_MUTEX;
return code;
}