lengths for arguments to g_token_size and g_make_token_header.
* export_name.c (krb5_gss_export_name): Change local length
variable to unsigned.
* k5unseal.c (kg_unseal_v1): Seqnum variable changed from
krb5_int32 to krb5_ui_4.
* k5seal.c (make_seal_token_v1): Change seqnum argument to
krb5_ui_4 from krb5_int32 to match krb5_gss_ctx_id_rec struct.
* gssapiP_krb5.h, util_crypt.c, util_seqnum.c: kg_make_seq_num(),
kg_get_seq_num() changed to use krb5_ui_4 for sequence
numbers. kg_encrypt(), kg_decrypt() length argument now unsigned.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15007
dc483132-0cff-0310-8789-
dd5450dbe970
+2002-11-15 Ezra Peisach <epeisach@bu.edu>
+
+ * accept_sec_context.c (krb5_gss_accept_sec_context): Use unsigned
+ lengths for arguments to g_token_size and g_make_token_header.
+
+ * export_name.c (krb5_gss_export_name): Change local length
+ variable to unsigned.
+
+ * k5unseal.c (kg_unseal_v1): Seqnum variable changed from
+ krb5_int32 to krb5_ui_4.
+
+ * k5seal.c (make_seal_token_v1): Change seqnum argument to
+ krb5_ui_4 from krb5_int32 to match krb5_gss_ctx_id_rec struct.
+
+ * gssapiP_krb5.h, util_crypt.c, util_seqnum.c: kg_make_seq_num(),
+ kg_get_seq_num() changed to use krb5_ui_4 for sequence
+ numbers. kg_encrypt(), kg_decrypt() length argument now unsigned.
+
2002-10-07 Sam Hartman <hartmans@mit.edu>
* Makefile.in : Add install-headers support
}
if (cred && (gss_flags & GSS_C_MUTUAL_FLAG)) {
- int tmsglen, toktype;
+ unsigned int tmsglen;
+ int toktype;
/*
* The client is expecting a response, so we can send an
{
krb5_context context;
krb5_error_code code;
- int length;
+ size_t length;
char *str, *cp;
if (GSS_ERROR(kg_get_context(minor_status, &context)))
krb5_error_code kg_make_seq_num (krb5_context context,
krb5_keyblock *key,
- int direction, krb5_int32 seqnum, unsigned char *cksum,
+ int direction, krb5_ui_4 seqnum, unsigned char *cksum,
unsigned char *buf);
krb5_error_code kg_get_seq_num (krb5_context context,
krb5_keyblock *key,
unsigned char *cksum, unsigned char *buf, int *direction,
- krb5_int32 *seqnum);
+ krb5_ui_4 *seqnum);
krb5_error_code kg_make_seed (krb5_context context,
krb5_keyblock *key,
krb5_pointer iv,
krb5_pointer in,
krb5_pointer out,
- int length);
+ unsigned int length);
krb5_error_code
kg_arcfour_docrypt (const krb5_keyblock *longterm_key , int ms_usage,
const unsigned char *kd_data, size_t kd_data_len,
krb5_pointer iv,
krb5_pointer in,
krb5_pointer out,
- int length);
+ unsigned int length);
OM_uint32 kg_seal (krb5_context context,
OM_uint32 *minor_status,
make_seal_token_v1 (krb5_context context,
krb5_keyblock *enc,
krb5_keyblock *seq,
- krb5_int32 *seqnum,
+ krb5_ui_4 *seqnum,
int direction,
gss_buffer_t text,
gss_buffer_t token,
int cksum_len = 0;
int plainlen;
int direction;
- krb5_int32 seqnum;
+ krb5_ui_4 seqnum;
OM_uint32 retval;
size_t sumlen;
krb5_keyusage sign_usage = KG_USAGE_SIGN;
krb5_pointer iv;
krb5_pointer in;
krb5_pointer out;
- int length;
+ unsigned int length;
{
krb5_error_code code;
size_t blocksize;
krb5_pointer iv;
krb5_pointer in;
krb5_pointer out;
- int length;
+ unsigned int length;
{
krb5_error_code code;
size_t blocksize;
krb5_context context;
krb5_keyblock *key;
int direction;
- krb5_int32 seqnum;
+ krb5_ui_4 seqnum;
unsigned char *cksum;
unsigned char *buf;
{
unsigned char *cksum;
unsigned char *buf;
int *direction;
- krb5_int32 *seqnum;
+ krb5_ui_4 *seqnum;
{
krb5_error_code code;
unsigned char plain[8];