+Wed Feb 14 10:44:27 1996 <tytso@rsts-11.mit.edu>
+
+ * fcc_read.c (krb5_fcc_read_keyblock, krb5_fcc_read_data,
+ krb5_fcc_read_authdatum, krb5_fcc_read_addr): For windows,
+ mask off low 16 bits because Gradient DCE does things
+ wrong.
+
Wed Mar 20 22:48:51 1996 Theodore Y. Ts'o <tytso@dcl>
* fcc-proto.h (krb5_fcc_skip_header): Added prototype (fix Windows
kret = krb5_fcc_read_int32(context, id, &int32);
CHECK(kret);
+#ifdef _WINDOWS
+ int32 &= VALID_INT_BITS; /* Gradient does not write correctly */
+#else
if ((int32 & VALID_INT_BITS) != int32) /* Overflow size_t??? */
return KRB5_CC_NOMEM;
+#endif
keyblock->length = (int) int32;
if ( keyblock->length == 0 )
return KRB5_OK;
kret = krb5_fcc_read_int32(context, id, &len);
CHECK(kret);
+#ifdef _WINDOWS
+ len &= VALID_INT_BITS;
+#else
if ((len & VALID_INT_BITS) != len)
return KRB5_CC_NOMEM;
+#endif
data->length = (int) len;
if (data->length == 0) {
kret = krb5_fcc_read_int32(context, id, &int32);
CHECK(kret);
+#ifdef _WINDOWS
+ int32 &= VALID_INT_BITS; /* Gradient DCE does this wrong */
+#else
if ((int32 & VALID_INT_BITS) != int32) /* Overflow int??? */
return KRB5_CC_NOMEM;
+#endif
addr->length = (int) int32;
if (addr->length == 0)
a->ad_type = (krb5_authdatatype)ui2;
kret = krb5_fcc_read_int32(context, id, &int32);
CHECK(kret);
+#ifdef _WINDOWS
+ int32 &= VALID_INT_BITS;
+#else
if ((int32 & VALID_INT_BITS) != int32) /* Overflow int??? */
return KRB5_CC_NOMEM;
+#endif
a->length = (int) int32;
if (a->length == 0 )
+Wed Feb 14 10:44:27 1996 <tytso@rsts-11.mit.edu>
+
+ * scc_read.c (krb5_scc_read_keyblock, krb5_scc_read_data,
+ krb5_scc_read_authdatum, krb5_scc_read_addr): For windows,
+ mask off low 16 bits because Gradient DCE does things
+ wrong.
+
Wed Mar 20 22:50:05 1996 Theodore Y. Ts'o <tytso@dcl>
* scc-proto.h (krb5_scc_skip_header): Added prototype (to fix lint
kret = krb5_scc_read_int32(context, id, &int32);
CHECK(kret);
+#ifdef _WINDOWS
+ int32 &= VALID_INT_BITS; /* Gradient does not write correctly */
+#else
+ if ((int32 & VALID_INT_BITS) != int32) /* Overflow size_t??? */
+ return KRB5_CC_NOMEM;
+#endif
keyblock->length = int32;
if ( keyblock->length == 0 )
return KRB5_OK;
krb5_data *data;
{
krb5_error_code kret;
+ krb5_int32 len;
data->magic = KV5M_DATA;
data->data = 0;
- kret = krb5_scc_read_int32(context, id, &data->length);
+ kret = krb5_scc_read_int32(context, id, &len);
CHECK(kret);
+#ifdef _WINDOWS
+ len &= VALID_INT_BITS;
+#else
+ if ((len & VALID_INT_BITS) != len)
+ return KRB5_CC_NOMEM;
+#endif
+ data->length = (int) len;
if (data->length == 0) {
data->data = 0;
kret = krb5_scc_read_int32(context, id, &int32);
CHECK(kret);
+#ifdef _WINDOWS
+ int32 &= VALID_INT_BITS; /* Gradient DCE does this wrong */
+#else
+ if ((int32 & VALID_INT_BITS) != int32) /* Overflow int??? */
+ return KRB5_CC_NOMEM;
+#endif
addr->length = int32;
if (addr->length == 0)
a->ad_type = (krb5_authdatatype)ui2;
kret = krb5_scc_read_int32(context, id, &int32);
CHECK(kret);
+#ifdef _WINDOWS
+ int32 &= VALID_INT_BITS;
+#else
+ if ((int32 & VALID_INT_BITS) != int32) /* Overflow int??? */
+ return KRB5_CC_NOMEM;
+#endif
a->length = int32;
if (a->length == 0 )