+Tue Mar 7 20:48:03 1995 Keith Vetter (keithv@fusion.com)
+
+ * accept_s.c, acqire_s.c, compare_.c, context_.c, delete_s.c,
+ disp_nam.c, disp_sta.c, get_tkt_.c, init_sec.c, inq_cont.c,
+ inq_cred.c, k5seal.c, k5unseal.c, process_.c, rel_cred.c,
+ rel_name.c, util_cks.c, util_cry.c: added casts on signed ->
+ unsigned assignments.
+ * util_seq.c: added casts on bit extraction code.
+ * gssapip_.h: pulls in los-proto.h for prototypes.
+
Tue Feb 28 00:27:44 1995 John Gilmore (gnu at toad.com)
* gssapi_krb5.h, gssapiP_krb5.h: Avoid <krb5/...> includes.
return(GSS_S_NO_CRED);
} else {
if (! kg_validate_cred_id(verifier_cred_handle)) {
- *minor_status = G_VALIDATE_FAILED;
+ *minor_status = (OM_uint32) G_VALIDATE_FAILED;
return(GSS_S_CALL_BAD_STRUCTURE|GSS_S_DEFECTIVE_CREDENTIAL);
}
}
xfree(token.value);
(void)krb5_gss_delete_sec_context(context, minor_status,
(gss_ctx_id_t *) &ctx, NULL);
- *minor_status = G_VALIDATE_FAILED;
+ *minor_status = (OM_uint32) G_VALIDATE_FAILED;
return(GSS_S_FAILURE);
}
xfree(token.value);
(void)krb5_gss_delete_sec_context(context, minor_status,
(gss_ctx_id_t *) &ctx, NULL);
- *minor_status = G_VALIDATE_FAILED;
+ *minor_status = (OM_uint32) G_VALIDATE_FAILED;
return(GSS_S_FAILURE);
}
*/
#include "gssapiP_krb5.h"
+#ifdef USE_STRING_H
+#include <string.h>
+#else
+#include <strings.h>
+#endif
/* get credentials corresponding to a key in the krb5 keytab.
If the default name is requested, return the name in output_princ.
/*SUPPRESS 29*/
if ((desired_name != GSS_C_NO_NAME) &&
(! kg_validate_name(desired_name))) {
- *minor_status = G_VALIDATE_FAILED;
+ *minor_status = (OM_uint32) G_VALIDATE_FAILED;
return(GSS_S_CALL_BAD_STRUCTURE|GSS_S_BAD_NAME);
}
(cred_usage != GSS_C_ACCEPT) &&
(cred_usage != GSS_C_BOTH)) {
xfree(cred);
- *minor_status = G_BAD_USAGE;
+ *minor_status = (OM_uint32) G_BAD_USAGE;
return(GSS_S_FAILURE);
}
if (cred->princ)
krb5_free_principal(context, cred->princ);
xfree(cred);
- *minor_status = G_VALIDATE_FAILED;
+ *minor_status = (OM_uint32) G_VALIDATE_FAILED;
return(GSS_S_FAILURE);
}
int *name_equal;
{
if (! kg_validate_name(name1)) {
- *minor_status = G_VALIDATE_FAILED;
+ *minor_status = (OM_uint32) G_VALIDATE_FAILED;
return(GSS_S_CALL_BAD_STRUCTURE|GSS_S_BAD_NAME);
}
if (! kg_validate_name(name2)) {
- *minor_status = G_VALIDATE_FAILED;
+ *minor_status = (OM_uint32) G_VALIDATE_FAILED;
return(GSS_S_CALL_BAD_STRUCTURE|GSS_S_BAD_NAME);
}
/* validate the context handle */
if (! kg_validate_ctx_id(context_handle)) {
- *minor_status = G_VALIDATE_FAILED;
+ *minor_status = (OM_uint32) G_VALIDATE_FAILED;
return(GSS_S_NO_CONTEXT);
}
/*SUPPRESS 29*/
/* validate the context handle */
if (! kg_validate_ctx_id(*context_handle)) {
- *minor_status = G_VALIDATE_FAILED;
+ *minor_status = (OM_uint32) G_VALIDATE_FAILED;
return(GSS_S_NO_CONTEXT);
}
output_name_buffer->value = NULL;
if (! kg_validate_name(input_name)) {
- *minor_status = G_VALIDATE_FAILED;
+ *minor_status = (OM_uint32) G_VALIDATE_FAILED;
return(GSS_S_CALL_BAD_STRUCTURE|GSS_S_BAD_NAME);
}
if (! g_make_string_buffer(str, output_name_buffer)) {
xfree(str);
- *minor_status = G_BUFFER_ALLOC;
+ *minor_status = (OM_uint32) G_BUFFER_ALLOC;
return(GSS_S_FAILURE);
}
}
if (*message_context) {
- *minor_status = G_BAD_MSG_CTX;
+ *minor_status = (OM_uint32) G_BAD_MSG_CTX;
return(GSS_S_FAILURE);
}
/* validate the context handle */
if (! kg_validate_ctx_id(context_handle)) {
- *minor_status = G_VALIDATE_FAILED;
+ *minor_status = (OM_uint32) G_VALIDATE_FAILED;
return(GSS_S_NO_CONTEXT);
}
#define _GSSAPIP_KRB5_H_
#include "krb5.h"
+#include "los-proto.h"
#include <memory.h>
/* work around sunos braindamage */
krb5_creds in_creds, * out_creds;
krb5_authenticator authent;
krb5_data ap_req;
- long tmp;
unsigned char *ptr;
unsigned char ckbuf[24]; /* see the token formats doc */
unsigned char *t;
}
} else {
if (! kg_validate_cred_id(claimant_cred_handle)) {
- *minor_status = G_VALIDATE_FAILED;
+ *minor_status = (OM_uint32) G_VALIDATE_FAILED;
return(GSS_S_CALL_BAD_STRUCTURE|GSS_S_DEFECTIVE_CREDENTIAL);
}
}
/* verify that the target_name is valid and usable */
if (! kg_validate_name(target_name)) {
- *minor_status = G_VALIDATE_FAILED;
+ *minor_status = (OM_uint32) G_VALIDATE_FAILED;
return(GSS_S_CALL_BAD_STRUCTURE|GSS_S_BAD_NAME);
}
krb5_free_principal(context, ctx->there);
xfree(ctx);
- *minor_status = G_VALIDATE_FAILED;
+ *minor_status = (OM_uint32) G_VALIDATE_FAILED;
return(GSS_S_FAILURE);
}
/* validate the context handle */
/*SUPPRESS 29*/
if (! kg_validate_ctx_id(*context_handle)) {
- *minor_status = G_VALIDATE_FAILED;
+ *minor_status = (OM_uint32) G_VALIDATE_FAILED;
return(GSS_S_NO_CONTEXT);
}
/* validate the context handle */
if (! kg_validate_ctx_id(context_handle)) {
- *minor_status = G_VALIDATE_FAILED;
+ *minor_status = (OM_uint32) G_VALIDATE_FAILED;
return(GSS_S_NO_CONTEXT);
}
}
if (! kg_save_name((gss_name_t) init)) {
krb5_free_principal(context, init);
- *minor_status = G_VALIDATE_FAILED;
+ *minor_status = (OM_uint32) G_VALIDATE_FAILED;
return(GSS_S_FAILURE);
}
}
kg_delete_name((gss_name_t) accept);
krb5_free_principal(context, init);
}
- *minor_status = G_VALIDATE_FAILED;
+ *minor_status = (OM_uint32) G_VALIDATE_FAILED;
return(GSS_S_FAILURE);
}
}
}
} else {
if (! kg_validate_cred_id(cred_handle)) {
- *minor_status = G_VALIDATE_FAILED;
+ *minor_status = (OM_uint32) G_VALIDATE_FAILED;
return(GSS_S_CALL_BAD_STRUCTURE|GSS_S_NO_CRED);
}
}
if (! kg_save_name((gss_name_t) ret_name)) {
(void)gss_release_oid_set(minor_status, &mechs);
krb5_free_principal(context, ret_name);
- *minor_status = G_VALIDATE_FAILED;
+ *minor_status = (OM_uint32) G_VALIDATE_FAILED;
return(GSS_S_FAILURE);
}
*name = (gss_name_t) ret_name;
/* only default qop is allowed */
if (qop_req != GSS_C_QOP_DEFAULT) {
- *minor_status = G_UNKNOWN_QOP;
+ *minor_status = (OM_uint32) G_UNKNOWN_QOP;
return(GSS_S_FAILURE);
}
/* validate the context handle */
if (! kg_validate_ctx_id(context_handle)) {
- *minor_status = G_VALIDATE_FAILED;
+ *minor_status = (OM_uint32) G_VALIDATE_FAILED;
return(GSS_S_NO_CONTEXT);
}
/* validate the context handle */
if (! kg_validate_ctx_id(context_handle)) {
- *minor_status = G_VALIDATE_FAILED;
+ *minor_status = (OM_uint32) G_VALIDATE_FAILED;
return(GSS_S_NO_CONTEXT);
}
/* validate the context handle */
if (! kg_validate_ctx_id(context_handle)) {
- *minor_status = G_VALIDATE_FAILED;
+ *minor_status = (OM_uint32) G_VALIDATE_FAILED;
return(GSS_S_NO_CONTEXT);
}
/* validate the context handle */
if (! kg_validate_ctx_id(context_handle)) {
- *minor_status = G_VALIDATE_FAILED;
+ *minor_status = (OM_uint32) G_VALIDATE_FAILED;
return(GSS_S_NO_CONTEXT);
}
/* validate the context handle */
if (! kg_validate_ctx_id(context_handle)) {
- *minor_status = G_VALIDATE_FAILED;
+ *minor_status = (OM_uint32) G_VALIDATE_FAILED;
return(GSS_S_NO_CONTEXT);
}
/* validate the context handle */
if (! kg_validate_ctx_id(context_handle)) {
- *minor_status = G_VALIDATE_FAILED;
+ *minor_status = (OM_uint32) G_VALIDATE_FAILED;
return(GSS_S_NO_CONTEXT);
}
/* validate the context handle */
if (! kg_validate_ctx_id(context_handle)) {
- *minor_status = G_VALIDATE_FAILED;
+ *minor_status = (OM_uint32) G_VALIDATE_FAILED;
return(GSS_S_NO_CONTEXT);
}
/* validate the context handle */
if (! kg_validate_ctx_id(context_handle)) {
- *minor_status = G_VALIDATE_FAILED;
+ *minor_status = (OM_uint32) G_VALIDATE_FAILED;
return(GSS_S_NO_CONTEXT);
}
/* validate the context handle */
if (! kg_validate_ctx_id(context_handle)) {
- *minor_status = G_VALIDATE_FAILED;
+ *minor_status = (OM_uint32) G_VALIDATE_FAILED;
return(GSS_S_NO_CONTEXT);
}
/* validate the context handle */
if (! kg_validate_ctx_id(context_handle)) {
- *minor_status = G_VALIDATE_FAILED;
+ *minor_status = (OM_uint32) G_VALIDATE_FAILED;
return(GSS_S_NO_CONTEXT);
}
/* validate the context handle */
if (! kg_validate_ctx_id(context_handle)) {
- *minor_status = G_VALIDATE_FAILED;
+ *minor_status = (OM_uint32) G_VALIDATE_FAILED;
return(GSS_S_NO_CONTEXT);
}
/* validate the context handle */
if (! kg_validate_ctx_id(context_handle)) {
- *minor_status = G_VALIDATE_FAILED;
+ *minor_status = (OM_uint32) G_VALIDATE_FAILED;
return(GSS_S_NO_CONTEXT);
}
return(kg_release_defcred(minor_status));
if (! kg_delete_cred_id(*cred_handle)) {
- *minor_status = G_VALIDATE_FAILED;
+ *minor_status = (OM_uint32) G_VALIDATE_FAILED;
return(GSS_S_CALL_BAD_STRUCTURE|GSS_S_NO_CRED);
}
gss_name_t *input_name;
{
if (! kg_validate_name(*input_name)) {
- *minor_status = G_VALIDATE_FAILED;
+ *minor_status = (OM_uint32) G_VALIDATE_FAILED;
return(GSS_S_CALL_BAD_STRUCTURE|GSS_S_BAD_NAME);
}
{
int len;
char *buf, *ptr;
- long tmp;
krb5_error_code code;
if (!kg_context && (code=kg_get_context()))
/* create the buffer to checksum into */
- len = (sizeof(tmp)*5+
+ len = (sizeof(long)*5+
cb->initiator_address.length+
cb->acceptor_address.length+
cb->application_data.length);
krb5_gss_enc_desc *ed;
unsigned char *buf;
{
- krb5_error_code code;
-
return(krb5_random_confounder( ed->eblock.crypto_entry->block_length, buf));
}
{
unsigned char plain[8];
- plain[0] = seqnum&0xff;
- plain[1] = (seqnum>>8)&0xff;
- plain[2] = (seqnum>>16)&0xff;
- plain[3] = (seqnum>>24)&0xff;
+ plain[0] = (unsigned char) (seqnum&0xff);
+ plain[1] = (unsigned char) ((seqnum>>8)&0xff);
+ plain[2] = (unsigned char) ((seqnum>>16)&0xff);
+ plain[3] = (unsigned char) ((seqnum>>24)&0xff);
plain[4] = direction;
plain[5] = direction;