a cast of session key to C_Block *, since CNS is inconsistent in
this area as well.
* mk_priv.c (krb_mk_priv): Align with CNS by taking C_Block *.
* mk_safe.c (krb_mk_safe): Align with CNS by taking C_Block *.
* rd_priv.c (krb_rd_priv): Align with CNS by taking C_Block *.
* rd_safe.c (krb_rd_safe): Align with CNS by taking C_Block *.
* recvauth.c (krb_recvauth): Update call to mk_priv() to have the
correct type.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12805
dc483132-0cff-0310-8789-
dd5450dbe970
+2000-10-23 Tom Yu <tlyu@mit.edu>
+
+ * mk_auth.c (krb_check_auth): Modify call to rd_priv() by kludging
+ a cast of session key to C_Block *, since CNS is inconsistent in
+ this area as well.
+
+ * mk_priv.c (krb_mk_priv): Align with CNS by taking C_Block *.
+
+ * mk_safe.c (krb_mk_safe): Align with CNS by taking C_Block *.
+
+ * rd_priv.c (krb_rd_priv): Align with CNS by taking C_Block *.
+
+ * rd_safe.c (krb_rd_safe): Align with CNS by taking C_Block *.
+
+ * recvauth.c (krb_recvauth): Update call to mk_priv() to have the
+ correct type.
+
Tue Oct 10 05:03:50 2000 Ezra Peisach <epeisach@mit.edu>
* kparse.c: Provide prototype for static struol(). Do not define
key_sched(session, schedule);
#endif /* !NOENCRYPTION */
if (cc = krb_rd_priv(buf->dat, buf->length, schedule,
- session, faddr, laddr, msg_data))
+ (C_Block *)session, faddr, laddr, msg_data))
return(cc);
/* fetch the (incremented) checksum that we supplied in the request */
* (header stuff) overlap */
unsigned KRB4_32 length; /* of in data */
Key_schedule schedule; /* precomputed key schedule */
- C_Block key; /* encryption key for seed and ivec */
+ C_Block FAR *key; /* encryption key for seed and ivec */
struct sockaddr_in FAR *sender; /* sender address */
struct sockaddr_in FAR *receiver; /* receiver address */
{
#ifndef NOENCRYPTION
/* pcbc encrypt, pad as needed, use key as ivec */
pcbc_encrypt((C_Block *) q,(C_Block *) q, (long) (p-q), schedule,
- (C_Block *)key, ENCRYPT);
+ key, ENCRYPT);
#endif /* NOENCRYPTION */
return (q - out + c_length); /* resulting size */
* overlap
*/
unsigned KRB4_32 length; /* of in data */
- C_Block key; /* encryption key for seed and ivec */
+ C_Block FAR *key; /* encryption key for seed and ivec */
struct sockaddr_in *sender; /* sender address */
struct sockaddr_in *receiver; /* receiver address */
{
#else /* Do encryption */
/* calculate the checksum of length, timestamps, and input data */
cksum = quad_cksum(q, (unsigned KRB4_32 *)big_cksum,
- p-q, 2, (C_Block *)key);
+ p-q, 2, key);
#endif /* NOENCRYPTION */
DEB (("\ncksum = %u",cksum));
u_char *in; /* pointer to the msg received */
unsigned KRB4_32 in_length; /* length of "in" msg */
Key_schedule schedule; /* precomputed key schedule */
- C_Block key; /* encryption key for seed and ivec */
+ C_Block FAR *key; /* encryption key for seed and ivec */
struct sockaddr_in *sender;
struct sockaddr_in *receiver;
MSG_DAT *m_data; /*various input/output data from msg */
#ifndef NOENCRYPTION
/* pcbc decrypt, use key as ivec */
pcbc_encrypt((C_Block *)q, (C_Block *)q, (long)c_length,
- schedule, (C_Block *)key, DECRYPT);
+ schedule, key, DECRYPT);
#endif
/* safely get application data length */
krb_rd_safe(in,in_length,key,sender,receiver,m_data)
u_char FAR *in; /* pointer to the msg received */
unsigned KRB4_32 in_length; /* length of "in" msg */
- C_Block FAR key; /* encryption key for seed and ivec */
+ C_Block FAR *key; /* encryption key for seed and ivec */
struct sockaddr_in FAR *sender; /* sender's address */
struct sockaddr_in FAR *receiver; /* receiver's address -- me */
MSG_DAT FAR *m_data; /* where to put message information */
#else /* Do encryption */
/* calculate the checksum of the length, timestamps, and
* input data, on the sending byte order !! */
- quad_cksum(q,calc_cksum,p-q,2,(C_Block *)key);
+ quad_cksum(q,calc_cksum,p-q,2,key);
#endif /* NOENCRYPTION */
DEB (("\n0: calc %l big %lx\n1: calc %lx big %lx\n2: calc %lx big %lx\n3: calc %lx big %lx\n",
tmp_buf,
(unsigned KRB4_32) sizeof(cksum),
schedule,
- kdata->session,
+ &kdata->session,
laddr,
faddr);
if (priv_len < 0) {