+2000-04-08 Tom Yu <tlyu@mit.edu>
+
+ * wrap_size_limit.c (krb5_gss_wrap_size_limit): Fix up
+ wrap_size_limit() to deal with integrity wrap tokens properly.
+ The rfc1964 mech always pads and confounds regardless of whether
+ confidentiality is requested.
+
2000-01-27 Ken Raeburn <raeburn@raeburn.org>
* init_sec_context.c (krb5_gss_init_sec_context): Default to
/* Calculate the token size and subtract that from the output size */
overhead = 7 + ctx->mech_used->length;
data_size = req_output_size;
- if (conf_req_flag) {
- conflen = kg_confounder_size(context, ctx->enc);
- data_size = (conflen + data_size + 8) & (~7);
- }
+ conflen = kg_confounder_size(context, ctx->enc);
+ data_size = (conflen + data_size + 8) & (~(OM_uint32)7);
ohlen = g_token_size((gss_OID) ctx->mech_used,
(unsigned int) (data_size + ctx->cksum_size + 14))
- req_output_size;
* Cannot have trailer length that will cause us to pad over
* our length
*/
- *max_input_size = (req_output_size - ohlen - overhead) & (~7);
+ *max_input_size = (req_output_size - ohlen - overhead)
+ & (~(OM_uint32)7);
else
*max_input_size = 0;
}