summaryrefslogtreecommitdiffstats
path: root/src/lib
Commit message (Collapse)AuthorAgeFilesLines
...
* * preauth.c (krb5_obtain_padata): Don't dereference a NULL pointerTom Yu2001-01-303-0/+19
| | | | | | | | | | | if we receive an empty ETYPE_INFO preauth. [krb5-libs/903 from craziboy77@hotmail.com] * preauth2.c (krb5_do_preauth): Don't dereference a NULL pointer if we receive an empty ETYPE_INFO preauth. [krb5-libs/903 from craziboy77@hotmail.com] git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12977 dc483132-0cff-0310-8789-dd5450dbe970
* * rd_req_dec.c (krb5_rd_req_decrypt_tkt_part): FreeEzra Peisach2001-01-302-2/+8
| | | | | | | | | krb5_keytab_entry if call to krb5_decrypt_tkt_part() fails. [krb5-libs/855 reported by guy@packeteer.com] Pullup from krb5-1-2 git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12975 dc483132-0cff-0310-8789-dd5450dbe970
* * make_checksum.c (krb5_c_make_checksum): Clear checksum contents pointer afterKen Raeburn2001-01-302-0/+6
| | | | | | freeing it in error case. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12968 dc483132-0cff-0310-8789-dd5450dbe970
* * lifetime.c: Remove support for "magic" lifetime value of 255Tom Yu2001-01-302-11/+7
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12965 dc483132-0cff-0310-8789-dd5450dbe970
* * dest_tkt.c: Clean up uid handling. Fix stat checksTom Yu2001-01-274-75/+266
| | | | | | | | * in_tkt.c: Clean up uid handling. Fix stat checks. * tf_util.c: Clean up uid handling. Fix stat checks. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12954 dc483132-0cff-0310-8789-dd5450dbe970
* * Makefile.in (OBJS, SRCS): Add prot_client.o, prot_client.cTom Yu2001-01-262-0/+4
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12950 dc483132-0cff-0310-8789-dd5450dbe970
* * prot_client.c: New file; client-side protocol supportTom Yu2001-01-263-0/+393
| | | | | | | * prot_common.c (krb4prot_decode_header): Decode the first two bytes of a krb4 packet. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12949 dc483132-0cff-0310-8789-dd5450dbe970
* more afsstring2key unterminated-input checks & fixesKen Raeburn2001-01-252-2/+25
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12945 dc483132-0cff-0310-8789-dd5450dbe970
* * t_afss2k.c: Extend test cases to cover situation where krb5_data refers toKen Raeburn2001-01-253-18/+49
| | | | | | | | | strings that are not nul-terminated. Reorder functions to avoid inlining, to keep debugging easier. * afsstring2key.c (mit_afs_string_to_key): Don't depend on nul-termination of input strings. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12944 dc483132-0cff-0310-8789-dd5450dbe970
* * prot_common.c: Fix up some error returnsTom Yu2001-01-243-37/+120
| | | | | | | * prot_kdc.c: Fix up some error returns. Add decode_kdc_request(). git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12941 dc483132-0cff-0310-8789-dd5450dbe970
* * stringtokey.c (kerberos): Now const.Ken Raeburn2001-01-242-2/+7
| | | | | | (krb5_dk_string_to_key): Cast it to non-const. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12939 dc483132-0cff-0310-8789-dd5450dbe970
* * rc_io.c (getdir): Subtract one from dirlen, since sizeofTom Yu2001-01-242-11/+20
| | | | | | | | | | includes the terminating NUL character. Avoid redundant path separators. (krb5_rc_io_move): When renaming OLD to NEW, don't copy the filename. This was causing temporary files to get leaked. (krb5_rc_io_close): Don't FREE if d->fn is NULL. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12935 dc483132-0cff-0310-8789-dd5450dbe970
* document recent large number of changesTom Yu2001-01-231-0/+48
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12934 dc483132-0cff-0310-8789-dd5450dbe970
* * cr_ciph.c: Include prot.h. KRB4_PUT32 -> KRB4_PUT32BE.Tom Yu2001-01-231-1/+2
| | | | | | [missed one] git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12933 dc483132-0cff-0310-8789-dd5450dbe970
* * prot_common.c: New file; contains functions to encode/decodeTom Yu2001-01-2318-67/+636
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | string triples for principals. * prot_kdc.c: New file; contains encoders and decoders (eventually) for the KDC's use. * Makefile.in (OBJS, SRCS): Add prot_common.o, prot_kdc.o. * cr_auth_repl.c: KRB4_PUT{16,32} -> KRB4_PUT{16,32}BE. * cr_ciph.c: Include prot.h. KRB4_PUT32 -> KRB4_PUT32BE. * cr_err_repl.c: KRB4_PUT32 -> KRB4_PUT32BE. * cr_tkt.c: KRB4_PUT32 -> KRB4_PUT32BE. * decomp_tkt.c: krb_strnlen -> krb4int_strnlen. * g_ad_tkt.c: krb_strnlen -> krb4int_strnlen. KRB4_PUT32 -> KRB4_PUT32BE. Properly skip date while parsing error. * g_in_tkt.c: krb_strnlen -> krb4int_strnlen. KRB4_PUT32 -> KRB4_PUT32BE. Properly skip date while parsing error. * g_phost.c: Changes from audit. Actually bail out instead of failing silently if h->h_name is too long. * kname_parse.c: Changes from audit. Check overrun per character processed. * mk_auth.c: krb_strnlen -> krb4int_strnlen. KRB4_PUT32 -> KRB4_PUT32BE. Include prot.h. * mk_err.c: KRB4_PUT32 -> KRB4_PUT32BE. * mk_priv.c: KRB4_PUT32 -> KRB4_PUT32BE. * mk_req.c: KRB4_PUT32 -> KRB4_PUT32BE. * mk_safe.c: KRB4_PUT32 -> KRB4_PUT32BE. * rd_req.c: krb_strnlen -> krb4int_strnlen. * strnlen.c: Rename to krb4int_strnlen. Also include prot.h, which is where strnlen is declared now. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12932 dc483132-0cff-0310-8789-dd5450dbe970
* * krb5_32.def: Add krb5_rc_close() so gssapi buildsDanilo Almeida2001-01-222-0/+5
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12930 dc483132-0cff-0310-8789-dd5450dbe970
* missed a variable that should've been made constKen Raeburn2001-01-212-2/+3
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12929 dc483132-0cff-0310-8789-dd5450dbe970
* add mit copyrightKen Raeburn2001-01-211-0/+24
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12928 dc483132-0cff-0310-8789-dd5450dbe970
* fix year for last changeKen Raeburn2001-01-211-1/+1
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12927 dc483132-0cff-0310-8789-dd5450dbe970
* make afs string2key thread-safeKen Raeburn2001-01-202-53/+63
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12926 dc483132-0cff-0310-8789-dd5450dbe970
* add some commentsKen Raeburn2001-01-201-0/+5
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12925 dc483132-0cff-0310-8789-dd5450dbe970
* new test case for afs string2keyKen Raeburn2001-01-203-2/+106
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12924 dc483132-0cff-0310-8789-dd5450dbe970
* * preauth.c: Don't use PROTOTYPE macro, just always use the prototypesKen Raeburn2001-01-202-10/+15
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12923 dc483132-0cff-0310-8789-dd5450dbe970
* * preauth.c: Remove uses of KRB5_NPROTOTYPE() macroTom Yu2001-01-202-44/+48
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12922 dc483132-0cff-0310-8789-dd5450dbe970
* * rcfns.c: New file, with fn versions of former dispatch macros from krb5.hKen Raeburn2001-01-203-3/+99
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12919 dc483132-0cff-0310-8789-dd5450dbe970
* * g_ad_tkt.c: Fix error packet parsingTom Yu2001-01-193-34/+49
| | | | | | | * g_in_tkt.c: Fix error packet parsing. Also, declare some internal functions as static and add prototypes. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12914 dc483132-0cff-0310-8789-dd5450dbe970
* * str_conv.c (krb5_keysalt_iterate): Always use the prototype forKen Raeburn2001-01-172-2/+6
| | | | | | function-pointer argument ITERATOR. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12907 dc483132-0cff-0310-8789-dd5450dbe970
* * configure.in: Look for socklen_t, define HAVE_SOCKLEN_T if foundKen Raeburn2000-12-182-0/+20
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12897 dc483132-0cff-0310-8789-dd5450dbe970
* localaddr.c: Add getnameinfo support. Annotate for lclint.Ken Raeburn2000-12-183-203/+304
| | | | | | Makefile.in: New target for running lclint on localaddr.c. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12896 dc483132-0cff-0310-8789-dd5450dbe970
* log msg for previous checkinsKen Raeburn2000-12-091-0/+11
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12889 dc483132-0cff-0310-8789-dd5450dbe970
* check in -01 draftKen Raeburn2000-12-081-184/+305
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12888 dc483132-0cff-0310-8789-dd5450dbe970
* * k5seal.c (make_seal_token_v1): Use ANSI-style definition, instead of K&R plusKen Raeburn2000-12-083-35/+21
| | | | | | | | | | | | prototype. Don't use too-big numbers even as placeholders. * accept_sec_context.c (rd_and_store_for_creds): After creating an auth context, set flags to require sequence numbers. (krb5_gss_accept_sec_context): Likewise. * init_sec_context.c (krb5_gss_init_sec_context): Likewise. (thanks to assar for noticing this) git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12887 dc483132-0cff-0310-8789-dd5450dbe970
* * strnlen.c (krb_strnlen): Put The return type before the callingDanilo Almeida2000-11-092-1/+6
| | | | | | convention. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12865 dc483132-0cff-0310-8789-dd5450dbe970
* * Makefile.in (OBJS, SRCS): Add strnlen.o, strnlen.cTom Yu2000-11-0823-1021/+1555
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * cr_auth_repl.c: Audit. Fix up copyright. Use new KRB4_PUT* macros for encoding so output is always big-endian. Precompute string lengths for better length-checking. * cr_ciph.c: Audit. Fix up copyright. Use new KRB4_PUT* macros for encoding so that output is always big-endian. Precompute string lengths for better length-checking. Zero out the key schedule after encrypting. * cr_death_pkt.c: Audit. Fix up copyright. Precompute string lengths for better length-checking. * cr_err_repl.c: Audit. Fix up copyright. Use moving pointer to do encoding. Precompute string lengths for better length-checking. Use KRB4_PUT* macros so that output is always big-endian. * cr_tkt.c: Audit. Fix up copyright. Use KRB4_PUT* macros for encoding so that output is always big-endian. Zero out the key schedule after encrypting. * decomp_tkt.c: Audit. Fix up copyright. Use krb_strnlen() for actually detecting string length errors. Use a struct in_addr to retrieve the IP address and assign it to paddress for return. Use KRB4_GET* macros for decoding to avoid byteswapping problems. Zero out session key and decrypted ticket on error. * g_ad_tkt.c: Audit. Fix up copyright. Break out parsing of decrypted KDC reply packet into a separate function to simplify error handling somewhat. Precompute string lengths for better length-checking. Use KRB4_PUT* macros for encoding so that output is always big-endian. Use KRB4_GET* macros for decoding to avoid byteswapping problems. Stomp on session key on error conditions. * g_in_tkt.c: Audit. Fix up copyright. Precompute string lengths for better length-checking. Use KRB4_PUT* macros for encoding so output is always big-endian. Use KRB4_GET* macros for decoding to avoid byteswapping problems. Use krb_strnlen() to actually detect string length errors. Zero out session key and decrypted KDC reply once they're no longer useful. * mk_auth.c: Audit. Fix up copyright. Use moving pointer for encoding. Use KRB4_PUT* macros for encoding to avoid alignment issues with using memcpy(). Use KRB4_GET* macros for decoding to avoid alignment issues with using memcpy(). * mk_err.c: Audit. Fix up copyright. Precompute string length. Use KRB4_PUT* macros to always encode as big-endian. * mk_preauth.c: Audit. Zero out key schedule after encryption. * mk_priv.c: Audit. Fix up copyright. Use KRB4_PUT* macros for encoding so output is always big-endian. * mk_req.c: Audit. Fix up copyright. Use moving pointer for encoding. Precompute string lengths for better length-checking. Use KRB4_PUT* macros for encoding so output is always big-endian. Zero out session key after encryption. * mk_safe.c: Audit. Fix up copyright. Use KRB4_PUT* macros for encoding so output is always big-endian. * rd_err.c: Audit. Fix up copyright. Use KRB4_GET* macros to avoid alignment issues. * rd_preauth.c: Audit. Zero key schedule after decrypting. * rd_priv.c: Audit. Fix up copyright. Use KRB4_GET* macros to avoid alignment issues. * rd_req.c: Audit. Fix up copyright. * send_to_kdc.c (send_recv): Actually set rpkt->length, since some callers actually use it now to do length-checking. * strnlen.c: New file; compute string length, bounded by a maximum. If the maximum number of characters has been read without encountering a NUL character, return -1. This makes overflow checking of strings in buffers much easier. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12859 dc483132-0cff-0310-8789-dd5450dbe970
* * configure.in: Use AC_TYPE_SIZE_T instead of AC_SIZE_TEzra Peisach2000-11-012-1/+5
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12836 dc483132-0cff-0310-8789-dd5450dbe970
* * configure.in: Use AC_CHECK_HEADERS instead of AC_HAVE_HEADERSEzra Peisach2000-11-012-1/+5
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12835 dc483132-0cff-0310-8789-dd5450dbe970
* * configure.in: Use AC_C_CONST and AC_CHECK_FUNCS instead ofEzra Peisach2000-11-012-2/+7
| | | | | | AC_CONST and AC_HAVE_FUNCS. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12834 dc483132-0cff-0310-8789-dd5450dbe970
* * configure.in: Use AC_C_CONST instead of AC_CONSTEzra Peisach2000-11-012-1/+5
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12833 dc483132-0cff-0310-8789-dd5450dbe970
* * cc_stdio.c: Add a "mode" field to krb5_scc_data to keep track ofTom Yu2000-10-312-0/+18
| | | | | | | | | | | what mode the file was opened in. (krb5_scc_close_file): Ignore EBADF from fflush() if the file was opened for readonly access. For some reason NetBSD's fflush() exhibits this behavior. (krb5_scc_open_file): Save the mode with which the file was opened in data->mode. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12825 dc483132-0cff-0310-8789-dd5450dbe970
* * asn1buf.c (asn1buf_sync): Add new arguments to include the fullTom Yu2000-10-266-71/+214
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | complement of data about a prefetched tag, as well as to indicate whether the prefetched tag or the surrounding sequence is of an indefinite length. (asn1buf_skiptail): Add new arguments to indicate whether the prefetched tag is indefinite, as well as its length. This facilitates proper skipping of trailing garbage. (asn1buf_remains): Add new argument to indicate whether the surrounding encoding is indefinite. Don't advance buf->next if an EOC encoding is detected; the caller will do that. * asn1buf.h: Update prototypes. * asn1_get.c (asn1_get_tag_indef): Don't treat EOC encoding as special anymore, since previous behavior was overloading the tag number in a bad way. Also, report a MISMATCH_INDEF error if the tag encoding is for the forbidden primitive constructed encoding. * asn1_k_decode.c (next_tag): Call get_tag_indef() in order to get information about whether the length is indefinite. Don't check the tag class and construction explicitly. (get_eoc): New macro to get a tag and check if it is an EOC encoding. (get_field, opt_field): Move the check for the tag class and construction to here. (get_field_body, get_lenfield_body): Call get_eoc() instead of next_tag() if we are decoding a constructed indefinite encoding. (begin_structure): Use a different variable to indicate whether the sequence is indefinite as opposed to whether an individual field is indefinite. (end_structure): Update to new calling convention of asn1buf_sync(). (sequence_of): Rewrite significantly. (sequence_of_common): Move the bulk of previous sequence_of() macro to here. Does not declare some variables that sequence_of() declares. (sequence_of_no_tagvars): Similar to sequence_of() macro but declares different variables for the purpose of prefetching the final tag. (end_sequence_of_no_tagvars): Similar to end_sequence_of() macro but uses variables declared by the sequence_of_no_tagvars() macro to prefetch the final tag. (asn1_decode_principal_name): Update for new asn1buf_remains() calling convention. Call sequence_of_no_tagvars(), etc. instead of sequence_of(), etc. in order to not declare shadowing block-local variables. (decode_array_body): Update for new asn1buf_remains() calling convention. (asn1_decode_sequence_of_enctype): Update for new asn1buf_remains() calling convention. * krb5_decode.c (next_tag): Call get_tag_indef() in order to get information about whether the length is indefinite. Don't check the tag class and construction explicitly. (get_eoc): New macro to get a tag and check if it is an EOC encoding. (get_field, opt_field): Move the check for the tag class and construction to here. (get_field_body, get_lenfield_body): Call get_eoc() instead of next_tag() if we are decoding a constructed indefinite encoding. (begin_structure): Use a different variable to indicate whether the sequence is indefinite as opposed to whether an individual field is indefinite. (end_structure): Update to new calling convention of asn1buf_sync(). git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12816 dc483132-0cff-0310-8789-dd5450dbe970
* * asn1_err.et: Add error codes MISMATCH_INDEF and MISSING_EOCTom Yu2000-10-262-0/+6
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12815 dc483132-0cff-0310-8789-dd5450dbe970
* * t_ser.c: Cast getpid() calls to int as arguments to sprintfEzra Peisach2000-10-2610-23/+48
| | | | | | | | | | | | | | | | | | * ser_actx.c: Move prototypes (listed below) to int-proto.h * int-proto.h: Add prototypes for krb5_ser_authdata_init, krb5_ser_address_init, krb5_ser_authenticator_init, krb5_ser_checksum_init, krb5_ser_keyblock_init, krb5_ser_principal_init. * ser_adata.c, ser_addr.c, ser_auth.c, ser_cksum.c, ser_key.c, ser_princ.c: Include int-proto.h for prototypes. By moving the prototypes to int-proto.h, it ndles the gcc warning on missing prototypes. These functions are intenal and all used by krb5_ser_auth_context_init() git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12814 dc483132-0cff-0310-8789-dd5450dbe970
* * compat_recv.c (krb_v4_recvauth): Update call to mk_priv()Tom Yu2000-10-242-1/+5
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12806 dc483132-0cff-0310-8789-dd5450dbe970
* * mk_auth.c (krb_check_auth): Modify call to rd_priv() by kludgingTom Yu2000-10-247-10/+27
| | | | | | | | | | | | | | | | | | a cast of session key to C_Block *, since CNS is inconsistent in this area as well. * mk_priv.c (krb_mk_priv): Align with CNS by taking C_Block *. * mk_safe.c (krb_mk_safe): Align with CNS by taking C_Block *. * rd_priv.c (krb_rd_priv): Align with CNS by taking C_Block *. * rd_safe.c (krb_rd_safe): Align with CNS by taking C_Block *. * recvauth.c (krb_recvauth): Update call to mk_priv() to have the correct type. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12805 dc483132-0cff-0310-8789-dd5450dbe970
* * clnt_chpass_util.c (kadm5_chpass_principal_util): Change msg_lenEzra Peisach2000-10-172-1/+6
| | | | | | to unsigned int. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12786 dc483132-0cff-0310-8789-dd5450dbe970
* * svr_chpass_util.c (kadm5_chpass_principal_util): Change msg_lenEzra Peisach2000-10-172-1/+6
| | | | | | to unsigned int. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12785 dc483132-0cff-0310-8789-dd5450dbe970
* * admin.h (KADM5_PW_FIRST_PROMPT): Get rid of casts fromEzra Peisach2000-10-174-6/+19
| | | | | | | | | | | | | error_message to char * - leave them as const char *. (kadm5_chpass_principal_util): Argument msg_len is unsigned int. * admin_internal.h (_kadm5_chpass_principal_util): msg_len is unsigned int. * chpass_util.c (_kadm5_chpass_principal_util): Change msg_len to unsigned int. Arhument to krb5_read_password is unsigned int. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12784 dc483132-0cff-0310-8789-dd5450dbe970
* * changepw.c: Cast length argument to recvfrom/sendto to intEzra Peisach2000-10-1711-25/+51
| | | | | | | | | | | | | | | | | | | | | | | | | | | * os-proto.h: Moved extern definition of krb5_max_dgram_size, krb5_max_skdc_timeout, krb5_skdc_timeout_shift, krb5_skdc_timeout_1 here. * accessor.c: Definition for krb5_max_dgram_size, krb5_max_skdc_timeout, krb5_skdc_timeout_shift, krb5_skdc_timeout_1 moved to os-proto.h * osconfig.c: Changed definition for krb5_max_dgram_size, krb5_max_skdc_timeout, krb5_skdc_timeout_shift, krb5_skdc_timeout_1 to unsigned int. * get_krbhst.c, init_os_context.c, locate_kdc.c, prompter.c: Unsigned/signed int cleanup. * read_pwd.c (krb5_read_password): Change size_return to unsigned int *. * sendto_kdc.c: Remove definition for krb5_max_dgram_size, krb5_max_skdc_timeout, krb5_skdc_timeout_shift, krb5_skdc_timeout_1. (moved to os-proto.h). Cast arguments to int for send() and recv(). git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12783 dc483132-0cff-0310-8789-dd5450dbe970
* * bld_pr_ext.c, bld_princ.c (krb5_build_principal_ext,Ezra Peisach2000-10-1717-36/+84
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | krb5_build_principal_va, krb5_build_principal): Take an unsigned int realm length. * get_in_tkt.c (krb5_get_init_creds): Use SALT_TYPE_AFS_LENGTH instead of -1. * gic_pwd.c (krb5_get_as_key_password): Use SALT_TYPE_AFS_LENGTH instead of -1. * in_tkt_pwd.c (pwd_keyproc): Argument to krb5_read_password is unsigned int. * pr_to_salt.c (krb5_principal2salt_internal): Declare as static. Unsigned int fix. * preauth.c (krb5_obtain_padata): Use SALT_TYPE_AFS_LENGTH instead of -1. * preauth2.c (pa_salt): Use SALT_TYPE_AFS_LENGTH instead of -1. * conv_princ.c, copy_auth.c, copy_princ.c, gc_frm_kdc.c, parse.c, send_tgs.c, srv_rcache.c: Unsigned/signed int cleanup. * unparse.c (krb5_unparse_name_ext): size parameter changed to unsigned int *. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12782 dc483132-0cff-0310-8789-dd5450dbe970
* * ktbase.c (krb5_kt_resolve): Signed/unsigned intEzra Peisach2000-10-179-18/+44
| | | | | | cleanups. Maintain const char * attribute of incomming name. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12781 dc483132-0cff-0310-8789-dd5450dbe970