summaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
...
* * admin.h (KADM5_PW_FIRST_PROMPT): Get rid of casts fromEzra Peisach2000-10-174-6/+19
| | | | | | | | | | | | | error_message to char * - leave them as const char *. (kadm5_chpass_principal_util): Argument msg_len is unsigned int. * admin_internal.h (_kadm5_chpass_principal_util): msg_len is unsigned int. * chpass_util.c (_kadm5_chpass_principal_util): Change msg_len to unsigned int. Arhument to krb5_read_password is unsigned int. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12784 dc483132-0cff-0310-8789-dd5450dbe970
* * changepw.c: Cast length argument to recvfrom/sendto to intEzra Peisach2000-10-1711-25/+51
| | | | | | | | | | | | | | | | | | | | | | | | | | | * os-proto.h: Moved extern definition of krb5_max_dgram_size, krb5_max_skdc_timeout, krb5_skdc_timeout_shift, krb5_skdc_timeout_1 here. * accessor.c: Definition for krb5_max_dgram_size, krb5_max_skdc_timeout, krb5_skdc_timeout_shift, krb5_skdc_timeout_1 moved to os-proto.h * osconfig.c: Changed definition for krb5_max_dgram_size, krb5_max_skdc_timeout, krb5_skdc_timeout_shift, krb5_skdc_timeout_1 to unsigned int. * get_krbhst.c, init_os_context.c, locate_kdc.c, prompter.c: Unsigned/signed int cleanup. * read_pwd.c (krb5_read_password): Change size_return to unsigned int *. * sendto_kdc.c: Remove definition for krb5_max_dgram_size, krb5_max_skdc_timeout, krb5_skdc_timeout_shift, krb5_skdc_timeout_1. (moved to os-proto.h). Cast arguments to int for send() and recv(). git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12783 dc483132-0cff-0310-8789-dd5450dbe970
* * bld_pr_ext.c, bld_princ.c (krb5_build_principal_ext,Ezra Peisach2000-10-1717-36/+84
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | krb5_build_principal_va, krb5_build_principal): Take an unsigned int realm length. * get_in_tkt.c (krb5_get_init_creds): Use SALT_TYPE_AFS_LENGTH instead of -1. * gic_pwd.c (krb5_get_as_key_password): Use SALT_TYPE_AFS_LENGTH instead of -1. * in_tkt_pwd.c (pwd_keyproc): Argument to krb5_read_password is unsigned int. * pr_to_salt.c (krb5_principal2salt_internal): Declare as static. Unsigned int fix. * preauth.c (krb5_obtain_padata): Use SALT_TYPE_AFS_LENGTH instead of -1. * preauth2.c (pa_salt): Use SALT_TYPE_AFS_LENGTH instead of -1. * conv_princ.c, copy_auth.c, copy_princ.c, gc_frm_kdc.c, parse.c, send_tgs.c, srv_rcache.c: Unsigned/signed int cleanup. * unparse.c (krb5_unparse_name_ext): size parameter changed to unsigned int *. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12782 dc483132-0cff-0310-8789-dd5450dbe970
* * ktbase.c (krb5_kt_resolve): Signed/unsigned intEzra Peisach2000-10-179-18/+44
| | | | | | cleanups. Maintain const char * attribute of incomming name. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12781 dc483132-0cff-0310-8789-dd5450dbe970
* * cc_stdio.c, cc_file.c: Unsigned/signed int cleanupEzra Peisach2000-10-173-32/+86
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12780 dc483132-0cff-0310-8789-dd5450dbe970
* * asn1buf.h: Lengths are now unsigned int forEzra Peisach2000-10-1716-190/+239
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | asn1buf_ensure_space(), asn1buf_expand(), asn1buf_imbed(), asn1buf_sync(), asn1buf_insert_octetstring(), asn1buf_insert_charstring(), asn1_remove_octetstring(), asn1buf_remove_charstring(), * krb5_decode.c, krb5_encode.c: Length fields are unsigned ints. * asn1_make.c, asn1_make.h: Prototypes changed to use an unsigned int * in_len and retlen for: asn1_make_etag(), asn1_make_tag(), asn1_make_sequence(), asn1_make_set(), asn1_make_string(), asn1_make_length(), asn1_make_id(). * asn1_k_encode.h, asn1_k_encode.c: Change length fields to unsigned ints for all functions. (asn1_encode_etype_info_entry): Test for KRB5_ETYPE_NO_SALT instead of -1. * asn1_k_decode.c (asn1_decode_etype_info_entry): Use a length of KRB5_ETYPE_NO_SALT to indicate the optional salt not being present. (instead of -1). (setup): Length is now unsigned int. * asn1_get.c, asn1_get.h: Change retlent to unsigned int * for asn1_get_tag(), asn1_get_tag_indef(), asn1_get_sequence, asn1_get_length(). * asn1_encode.c, asn1_encode.h: Change retlen to unsigned int * for asn1_encode_integer(), asn1_encode_unsigned_integer(), asn1_encode_octetstring(), asn1_encode_charstring(), asn1_encode_printable_string(), asn1_encode_ia5string(), asn1_encode_generaltime(), asn1_encode_generalstring() * asn1_decode.c, asn1_decode.h: Change retlen to unsigned int * for asn1_decode_octetstring(), asn1_decode_generalstring(), asn1_decode_charstring(), git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12779 dc483132-0cff-0310-8789-dd5450dbe970
* * fetch_mkey.c: Signed/unsigned int cleanupEzra Peisach2000-10-173-12/+17
| | | | | | | * kdb_cpw.c (add_key_pwd): Change salt data length of -1 to SALT_TYPE_AFS_LENGTH. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12778 dc483132-0cff-0310-8789-dd5450dbe970
* * cksum.c (des_cbc_cksum): Length is unsigned longEzra Peisach2000-10-173-2/+8
| | | | | | * enc_dec.c (des_cbc_encrypt): Length is unsigned long. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12777 dc483132-0cff-0310-8789-dd5450dbe970
* * nfold.c (krb5_nfold): inbots and outbits are now unsigned intEzra Peisach2000-10-173-3/+9
| | | | | | * prng.c: Local variable random_count is now unsigned int. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12776 dc483132-0cff-0310-8789-dd5450dbe970
* * hash_sha1.c (k5_sha1_hash): Cast length field in shsUpdate callEzra Peisach2000-10-172-1/+6
| | | | | | to int. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12775 dc483132-0cff-0310-8789-dd5450dbe970
* * des_int.h: Change prototypes for mit_des_cbc_encrypt(),Ezra Peisach2000-10-177-12/+32
| | | | | | | | | | | | | | | | | | | | mit_des_cbc_cksum(), and mit_des3_cbc_encrypt() to take unsigned long lengths. * d3_cbc.c (mit_des3_cbc_encrypt): Length argument now takes an unsigned long. * f_cbc.c (mit_des_cbc_encrypt): Length argument now takes an unsigned long. * f_cksum.c (mit_des_cbc_cksum): Length argument now takes an unsigned long. * string2key.c: Unsigned/signed int cleanup. Test for a salt-length of SALT_TYPE_AFS_LENGTH or -1 (for backwards compatibilty) for use of mit_afs_string_to_key(). git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12774 dc483132-0cff-0310-8789-dd5450dbe970
* * k5-int.h: krb5_alt_method, krb5_etype_info_entry length fieldsEzra Peisach2000-10-174-22/+56
| | | | | | | | | | | | | | | | | | changed to unsigned int. KRB5_ETYPE_NO_LENGTH defined. Change prototype decode_krb5_sam_key to decode_krb5_enc_sam_key which is what the code says. krb5int_access - change timeouts, shifts, etc to unsigned ints. * krb5.hin: krb5_data, krb5_address, krb5_keyblock, krb5_checksum, krb5_authdata, and krb5_pa_data length fields changed to unsigned int. krb5_kt_get_name(), krb5_unparse_name_ext(), krb5_build_principal(), krb5_build_principal_ext(), krb5_build_principal_va() and krb5_read_password() all take or return unsigned int lengths. * port-sockets.h (SOCKET): Under unix, a socket is of type int. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12773 dc483132-0cff-0310-8789-dd5450dbe970
* * krb5_libinit.c: Include krb5_libinit.h for prototypesEzra Peisach2000-10-172-0/+5
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12772 dc483132-0cff-0310-8789-dd5450dbe970
* * kparse.h: Add prototypes for fGetChar(), fGetParameterSet(),Ezra Peisach2000-10-172-0/+22
| | | | | | | ParmCompare(), FreeParameterSet(), fGetKeywordValue(), fGetToken(), fGetLiteral(), fUngetChar(). git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12771 dc483132-0cff-0310-8789-dd5450dbe970
* * sim_server.c: Cast to int strings width arguments in printfEzra Peisach2000-10-172-2/+7
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12770 dc483132-0cff-0310-8789-dd5450dbe970
* * kprop.c, kpropd.c: Use krb5_set_principal_realm() instead ofEzra Peisach2000-10-173-9/+23
| | | | | | freeing library generated memory using the internal krb5_xfree(). git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12769 dc483132-0cff-0310-8789-dd5450dbe970
* * kadmin.c (strdur): Print negative durations somewhat (!)Tom Yu2000-10-172-3/+23
| | | | | | | | sanely. (kadmin_startup): Call krb5_klog_init() to avoid coredumping if kadm5_init() logs something via krb5_klog_syslog(). git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12764 dc483132-0cff-0310-8789-dd5450dbe970
* * kdb5_util.M: Update manpageTom Yu2000-10-176-16/+68
| | | | | | | | | | | | | | | | * kdb5_util.c (usage): Update usage message. * dumpv4.c (dump_v4_iterator): Add logic to deal with long lifetimes, as well as optionally using short lifetimes. * loadv4.c (load_v4db): Add logic to deal with long lifetimes, as well as optionally using short lifetimes. * kadm5_create.c (kadm5_create_magic_princs): Add calls to krb5_klog_init() and krb5_klog_close() to avoid coredumping if kadm5_init() calls krb5_klog_syslog(). git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12763 dc483132-0cff-0310-8789-dd5450dbe970
* * krb5.tex (krb5_init_context): Parameter is output onlyEzra Peisach2000-10-172-25/+29
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12762 dc483132-0cff-0310-8789-dd5450dbe970
* * kpropd.c, kprop.c: Ensure size of database sent OTW as 4 bytesEzra Peisach2000-10-143-9/+20
| | | | | | | | | instead of sizeof(int). In the past we assumed that the client and server had the same concept on int size. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12757 dc483132-0cff-0310-8789-dd5450dbe970
* * lock-test.c (main): Cleanup assignments in conditionals. IfEzra Peisach2000-10-128-21/+44
| | | | | | | | | | | | | | USE_KADM5_API_VERSION is 1, set to 2. This program uses the V2 api (kadm5_get_config_params). * setkey-test.c: Declare main() as int. Enclose initialization of elements of arrays in '{', '}'. Use krb5_enctype type instead of unsigned int. Break out assignments in conditionals. * destroy-test.c, handle-test.c, init-test.c, iter-test.c, randkey-test.c: Declare main() as int. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12755 dc483132-0cff-0310-8789-dd5450dbe970
* * default.exp: Add dict_file entry (and create one) for kdc.confEzra Peisach2000-10-122-0/+12
| | | | | | | | | Since the warning message about missing dictionary is now going to the proper place (instead of simply syslogging), the logic to detect kadmind startup is getting confused by the warning message of a dictionary not being in place. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12754 dc483132-0cff-0310-8789-dd5450dbe970
* * kadm_funcs.c: Call life_to_time() and time_to_life() asTom Yu2000-10-102-3/+8
| | | | | | appropriate. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12753 dc483132-0cff-0310-8789-dd5450dbe970
* getifaddrs() supportKen Raeburn2000-10-101-0/+4
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12752 dc483132-0cff-0310-8789-dd5450dbe970
* getifaddrs() supportKen Raeburn2000-10-104-11/+217
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12751 dc483132-0cff-0310-8789-dd5450dbe970
* * kparse.c: Provide prototype for static struol(). Do not defineEzra Peisach2000-10-102-3/+8
| | | | | | void as int (autoconf can handle that). git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12750 dc483132-0cff-0310-8789-dd5450dbe970
* * ftp.c (do_auth): Remove debugging printf which I inadvertantlyEzra Peisach2000-10-102-1/+5
| | | | | | introduced. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12749 dc483132-0cff-0310-8789-dd5450dbe970
* * kcmd.c (kcmd): Use krb5_set_principal_realm() instead of freeing theEzra Peisach2000-10-102-5/+12
| | | | | | | | | | principals realm data and mucking with it ourselves. This way, we do not free memory allocated by the krb5 library with a possibly incorrect free, and we do not allocate memory for a krb5 structure which might be released by the krb5 library. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12748 dc483132-0cff-0310-8789-dd5450dbe970
* * server_dict.c (init_dict): Change syslog() to krb5_klog_syslog()Ezra Peisach2000-10-102-3/+9
| | | | | | so that errors go to the intended place as indicated by krb5.conf. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12747 dc483132-0cff-0310-8789-dd5450dbe970
* * klist.c (do_v4_ccache): Call life_to_time()Tom Yu2000-10-092-1/+5
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12746 dc483132-0cff-0310-8789-dd5450dbe970
* * kinit.c (k4_kinit): Call time_to_life()Tom Yu2000-10-092-5/+5
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12745 dc483132-0cff-0310-8789-dd5450dbe970
* * g_tkt_svc.c (CredIsExpired): Fix logic bugTom Yu2000-10-082-1/+6
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12734 dc483132-0cff-0310-8789-dd5450dbe970
* * kerberos_v4.c (kerb_get_principal): Modify to take a pointer toTom Yu2000-10-072-29/+79
| | | | | | | | | | | | | a krb5_deltat in order to return the life in seconds. Also, use time_to_life() to compute krb4 life. (check_princ): Modify to pass a pointer to a krb5_deltat to kerb_get_principal(). (set_tgtkey): Update for new kerb_get_principal() call signature. (kerberos_v4): Update for new check_princ() call signature. Modify lifetime computations to use lifetimes in seconds. Back-date issue time if necessary. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12729 dc483132-0cff-0310-8789-dd5450dbe970
* * conv_creds.c (krb524_convert_creds_plain): Use time_to_life()Tom Yu2000-10-073-41/+33
| | | | | | | | | | | and life_to_time() to do lifetime calculations, including the adjustment of start time, to match server-side calculations. * cnv_tkt_skey.c (krb524_convert_tkt_skey): Use time_to_life() and life_to_time() to do lifetime calculations. Adjust start time backwards to deal with roundup so ticket expires at correct time. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12728 dc483132-0cff-0310-8789-dd5450dbe970
* * rd_req.c (krb_rd_req): Call life_to_fime()Tom Yu2000-10-074-25/+67
| | | | | | | | | | * g_tkt_svc.c (CredIsExpired): Call life_to_time(). * lifetime.c: Add comments for lifetimes[]. Add provisions for compile-time switching of short lifetimes. Fix sign bug in time_to_life(). git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12727 dc483132-0cff-0310-8789-dd5450dbe970
* * krb524d.c (do_connection): Do not assume that sizeof(int) == 4Ezra Peisach2000-10-066-17/+38
| | | | | | | | | | | | | | | | | | * encode.c (encode_int32, decode_int32): Do not assume sizeof(int) == 4. * conv_creds.c (krb524_convert_creds_kdc): Do not assume sizeof(int) == 4 in network packet. * cnv_tkt_skey.c (krb524int_krb_cr_tkt_int): Ensure that OTW flags is one byte long. An error was introduced when prototypes were widened. * Makefile.in (includes): When testing to see if krb524_err.h exists in the include directory, compare against the build trees version. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12725 dc483132-0cff-0310-8789-dd5450dbe970
* My error - add test for mode_t (AC_TYPE_MODE_T) and use that as argumentEzra Peisach2000-10-053-3/+5
| | | | | | to umask. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12724 dc483132-0cff-0310-8789-dd5450dbe970
* * netread.c, netwrite.c: Include unistd.h if present on machineEzra Peisach2000-10-055-1/+19
| | | | | | | | | | for read/write prototypes. * in_tkt.c: Argument to umask should be of type uid_t. * configure.in: Test for uid_t (AC_TYPE_UID_T). git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12723 dc483132-0cff-0310-8789-dd5450dbe970
* Fix typo in last checkinEzra Peisach2000-10-041-1/+1
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12722 dc483132-0cff-0310-8789-dd5450dbe970
* * accept_sec_context.c (krb5_gss_accept_sec_context): If an errorEzra Peisach2000-10-042-0/+12
| | | | | | | | occurs after the auth_context is established, but before the krb5_gss_ctx_id_rec is established, release our pointer to the replay cache and invoke krb5_auth_con_free(). (krb5-libs/855) git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12721 dc483132-0cff-0310-8789-dd5450dbe970
* * rd_req_dec.c (krb5_rd_req_decrypt_tkt_part): Fix memory leak ifEzra Peisach2000-10-042-2/+7
| | | | | | krb5_decrypt_tkt_part() fails. (krb5-libs/855) git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12720 dc483132-0cff-0310-8789-dd5450dbe970
* * reconf: Look for autoconf 2.12 or later. Don't use "grep -q", it's notKen Raeburn2000-10-032-5/+11
| | | | | | portable enough. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12719 dc483132-0cff-0310-8789-dd5450dbe970
* * copy_addrs.c (krb5_copy_addresses): Cleanup unsigned vs signedEzra Peisach2000-10-032-2/+7
| | | | | | warnings as arguments to malloc(). git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12718 dc483132-0cff-0310-8789-dd5450dbe970
* * gssapiP_generic.h (g_OID_equal): Instead of casting argument toEzra Peisach2000-10-032-1/+6
| | | | | | memcmp as int, cast to unsigned int to match prototype. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12717 dc483132-0cff-0310-8789-dd5450dbe970
* * ftpd.c (login): Return of krb5_cc_get_name is now const char *Ezra Peisach2000-10-032-1/+5
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12716 dc483132-0cff-0310-8789-dd5450dbe970
* Checkin log for change to add_cred.c - assignment in conditional cleanupEzra Peisach2000-10-031-1/+2
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12715 dc483132-0cff-0310-8789-dd5450dbe970
* Clean up assignments in conditionals warnings by separating theEzra Peisach2000-10-031-7/+10
| | | | | | assignment from the test. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12714 dc483132-0cff-0310-8789-dd5450dbe970
* * kinit.c: Include krb524.h if suport desired. Clean upEzra Peisach2000-10-032-52/+82
| | | | | | addignements in conditionals and do not shadow global variables. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12713 dc483132-0cff-0310-8789-dd5450dbe970
* * Makefile.in: Install krb524.h and krb524_err.h header file soEzra Peisach2000-10-032-2/+30
| | | | | | applications can include for prototypes. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12712 dc483132-0cff-0310-8789-dd5450dbe970
* * ccache.c, heuristic.c, main.c: Return of krb5_cc_get_name() isEzra Peisach2000-10-034-13/+18
| | | | | | const char *. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12711 dc483132-0cff-0310-8789-dd5450dbe970