gssapip_.h: added prototype for kg_seal_size.
k5seal.c: 16/32 bit mismatch and removed unused variables.
seal.c: 16/32 bit mismatch.
sign.c: 16/32 bit mismatch.
ser_sctx.c: added prototypes for all functions since they get
assigned into a structure that has been prototyped.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@6833
dc483132-0cff-0310-8789-
dd5450dbe970
+Wed Sep 13 10:39:13 1995 Keith Vetter (keithv@fusion.com)
+
+ * acquire_.c: changed int to size_t.
+ * gssapip_.h: added prototype for kg_seal_size.
+ * k5seal.c: 16/32 bit mismatch and removed unused variables.
+ * seal.c: 16/32 bit mismatch.
+ * sign.c: 16/32 bit mismatch.
+ * ser_sctx.c: added prototypes for all functions since they get
+ assigned into a structure that has been prototyped.
+
Sat Sep 16 03:18:02 1995 Theodore Y. Ts'o <tytso@dcl>
* gssapiP_krb5.h: Remove context and cred from the gssapi security
gss_OID_set *actual_mechs;
OM_uint32 *time_rec;
{
- int i;
+ size_t i;
krb5_gss_cred_id_t cred;
gss_OID_set mechs;
OM_uint32 ret;
int *qop_state,
int toktype));
+OM_uint32 kg_seal_size PROTOTYPE((OM_uint32 *minor_status,
+ gss_ctx_id_t context_handle,
+ int conf_req_flag,
+ gss_qop_t qop_req,
+ OM_uint32 output_size,
+ OM_uint32 *input_size));
+
krb5_error_code
kg_ser_context_init PROTOTYPE((krb5_context));
OM_uint32 *input_size;
{
krb5_gss_ctx_id_rec *ctx;
- krb5_error_code code;
OM_uint32 cfsize;
OM_uint32 ohlen;
/* Calculate the token size and subtract that from the output size */
cfsize = (conf_req_flag) ? kg_confounder_size(&ctx->enc) : 0;
- ohlen = g_token_size((gss_OID) gss_mech_krb5, cfsize + 22);
+ ohlen = g_token_size((gss_OID) gss_mech_krb5, (unsigned int) cfsize + 22);
/* Cannot have trailer length that will cause us to pad over our length */
*input_size = (output_size - ohlen) & (~7);
gss_buffer_t output_message_buffer;
{
return(kg_seal(context, minor_status, context_handle, conf_req_flag,
- qop_req, input_message_buffer, conf_state,
+ (int) qop_req, input_message_buffer, conf_state,
output_message_buffer, KG_TOK_WRAP_MSG));
}
* krb5_gss_enc_desc and krb5_gss_ctx_id_t.
*/
\f
+
+/* Windows needs these prototypes since the structure they're assigned
+ * into is prototyped.
+ */
+static krb5_error_code kg_cred_size
+ PROTOTYPE((krb5_context kcontext,
+ krb5_pointer arg,
+ size_t *sizep));
+
+static krb5_error_code kg_cred_externalize
+ PROTOTYPE((krb5_context kcontext,
+ krb5_pointer arg,
+ krb5_octet **buffer,
+ size_t *lenremain));
+
+static krb5_error_code kg_cred_internalize
+ PROTOTYPE((krb5_context kcontext,
+ krb5_pointer *argp,
+ krb5_octet **buffer,
+ size_t *lenremain));
+
+static krb5_error_code kg_enc_desc_size
+ PROTOTYPE((krb5_context kcontext,
+ krb5_pointer arg,
+ size_t *sizep));
+
+static krb5_error_code kg_enc_desc_externalize
+ PROTOTYPE((krb5_context kcontext,
+ krb5_pointer arg,
+ krb5_octet **buffer,
+ size_t *lenremain));
+
+static krb5_error_code kg_enc_desc_internalize
+ PROTOTYPE((krb5_context kcontext,
+ krb5_pointer *argp,
+ krb5_octet **buffer,
+ size_t *lenremain));
+
+static krb5_error_code kg_ctx_size
+ PROTOTYPE((krb5_context kcontext,
+ krb5_pointer arg,
+ size_t *sizep));
+
+static krb5_error_code kg_ctx_externalize
+ PROTOTYPE((krb5_context kcontext,
+ krb5_pointer arg,
+ krb5_octet **buffer,
+ size_t *lenremain));
+
+static krb5_error_code kg_ctx_internalize
+ PROTOTYPE((krb5_context kcontext,
+ krb5_pointer *argp,
+ krb5_octet **buffer,
+ size_t *lenremain));
+
/*
* Determine the size required for this krb5_gss_cred_id_t.
*/
gss_buffer_t message_token;
{
return(kg_seal(context, minor_status, context_handle, 0,
- qop_req, message_buffer, NULL,
+ (int) qop_req, message_buffer, NULL,
message_token, KG_TOK_MIC_MSG));
}