summaryrefslogtreecommitdiffstats
path: root/src/lib
Commit message (Collapse)AuthorAgeFilesLines
...
* * rc_io.c (getdir): Subtract one from dirlen, since sizeofTom Yu2001-01-242-11/+20
| | | | | | | | | | includes the terminating NUL character. Avoid redundant path separators. (krb5_rc_io_move): When renaming OLD to NEW, don't copy the filename. This was causing temporary files to get leaked. (krb5_rc_io_close): Don't FREE if d->fn is NULL. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12935 dc483132-0cff-0310-8789-dd5450dbe970
* document recent large number of changesTom Yu2001-01-231-0/+48
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12934 dc483132-0cff-0310-8789-dd5450dbe970
* * cr_ciph.c: Include prot.h. KRB4_PUT32 -> KRB4_PUT32BE.Tom Yu2001-01-231-1/+2
| | | | | | [missed one] git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12933 dc483132-0cff-0310-8789-dd5450dbe970
* * prot_common.c: New file; contains functions to encode/decodeTom Yu2001-01-2318-67/+636
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | string triples for principals. * prot_kdc.c: New file; contains encoders and decoders (eventually) for the KDC's use. * Makefile.in (OBJS, SRCS): Add prot_common.o, prot_kdc.o. * cr_auth_repl.c: KRB4_PUT{16,32} -> KRB4_PUT{16,32}BE. * cr_ciph.c: Include prot.h. KRB4_PUT32 -> KRB4_PUT32BE. * cr_err_repl.c: KRB4_PUT32 -> KRB4_PUT32BE. * cr_tkt.c: KRB4_PUT32 -> KRB4_PUT32BE. * decomp_tkt.c: krb_strnlen -> krb4int_strnlen. * g_ad_tkt.c: krb_strnlen -> krb4int_strnlen. KRB4_PUT32 -> KRB4_PUT32BE. Properly skip date while parsing error. * g_in_tkt.c: krb_strnlen -> krb4int_strnlen. KRB4_PUT32 -> KRB4_PUT32BE. Properly skip date while parsing error. * g_phost.c: Changes from audit. Actually bail out instead of failing silently if h->h_name is too long. * kname_parse.c: Changes from audit. Check overrun per character processed. * mk_auth.c: krb_strnlen -> krb4int_strnlen. KRB4_PUT32 -> KRB4_PUT32BE. Include prot.h. * mk_err.c: KRB4_PUT32 -> KRB4_PUT32BE. * mk_priv.c: KRB4_PUT32 -> KRB4_PUT32BE. * mk_req.c: KRB4_PUT32 -> KRB4_PUT32BE. * mk_safe.c: KRB4_PUT32 -> KRB4_PUT32BE. * rd_req.c: krb_strnlen -> krb4int_strnlen. * strnlen.c: Rename to krb4int_strnlen. Also include prot.h, which is where strnlen is declared now. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12932 dc483132-0cff-0310-8789-dd5450dbe970
* * krb5_32.def: Add krb5_rc_close() so gssapi buildsDanilo Almeida2001-01-222-0/+5
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12930 dc483132-0cff-0310-8789-dd5450dbe970
* missed a variable that should've been made constKen Raeburn2001-01-212-2/+3
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12929 dc483132-0cff-0310-8789-dd5450dbe970
* add mit copyrightKen Raeburn2001-01-211-0/+24
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12928 dc483132-0cff-0310-8789-dd5450dbe970
* fix year for last changeKen Raeburn2001-01-211-1/+1
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12927 dc483132-0cff-0310-8789-dd5450dbe970
* make afs string2key thread-safeKen Raeburn2001-01-202-53/+63
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12926 dc483132-0cff-0310-8789-dd5450dbe970
* add some commentsKen Raeburn2001-01-201-0/+5
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12925 dc483132-0cff-0310-8789-dd5450dbe970
* new test case for afs string2keyKen Raeburn2001-01-203-2/+106
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12924 dc483132-0cff-0310-8789-dd5450dbe970
* * preauth.c: Don't use PROTOTYPE macro, just always use the prototypesKen Raeburn2001-01-202-10/+15
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12923 dc483132-0cff-0310-8789-dd5450dbe970
* * preauth.c: Remove uses of KRB5_NPROTOTYPE() macroTom Yu2001-01-202-44/+48
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12922 dc483132-0cff-0310-8789-dd5450dbe970
* * rcfns.c: New file, with fn versions of former dispatch macros from krb5.hKen Raeburn2001-01-203-3/+99
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12919 dc483132-0cff-0310-8789-dd5450dbe970
* * g_ad_tkt.c: Fix error packet parsingTom Yu2001-01-193-34/+49
| | | | | | | * g_in_tkt.c: Fix error packet parsing. Also, declare some internal functions as static and add prototypes. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12914 dc483132-0cff-0310-8789-dd5450dbe970
* * str_conv.c (krb5_keysalt_iterate): Always use the prototype forKen Raeburn2001-01-172-2/+6
| | | | | | function-pointer argument ITERATOR. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12907 dc483132-0cff-0310-8789-dd5450dbe970
* * configure.in: Look for socklen_t, define HAVE_SOCKLEN_T if foundKen Raeburn2000-12-182-0/+20
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12897 dc483132-0cff-0310-8789-dd5450dbe970
* localaddr.c: Add getnameinfo support. Annotate for lclint.Ken Raeburn2000-12-183-203/+304
| | | | | | Makefile.in: New target for running lclint on localaddr.c. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12896 dc483132-0cff-0310-8789-dd5450dbe970
* log msg for previous checkinsKen Raeburn2000-12-091-0/+11
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12889 dc483132-0cff-0310-8789-dd5450dbe970
* check in -01 draftKen Raeburn2000-12-081-184/+305
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12888 dc483132-0cff-0310-8789-dd5450dbe970
* * k5seal.c (make_seal_token_v1): Use ANSI-style definition, instead of K&R plusKen Raeburn2000-12-083-35/+21
| | | | | | | | | | | | prototype. Don't use too-big numbers even as placeholders. * accept_sec_context.c (rd_and_store_for_creds): After creating an auth context, set flags to require sequence numbers. (krb5_gss_accept_sec_context): Likewise. * init_sec_context.c (krb5_gss_init_sec_context): Likewise. (thanks to assar for noticing this) git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12887 dc483132-0cff-0310-8789-dd5450dbe970
* * strnlen.c (krb_strnlen): Put The return type before the callingDanilo Almeida2000-11-092-1/+6
| | | | | | convention. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12865 dc483132-0cff-0310-8789-dd5450dbe970
* * Makefile.in (OBJS, SRCS): Add strnlen.o, strnlen.cTom Yu2000-11-0823-1021/+1555
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * cr_auth_repl.c: Audit. Fix up copyright. Use new KRB4_PUT* macros for encoding so output is always big-endian. Precompute string lengths for better length-checking. * cr_ciph.c: Audit. Fix up copyright. Use new KRB4_PUT* macros for encoding so that output is always big-endian. Precompute string lengths for better length-checking. Zero out the key schedule after encrypting. * cr_death_pkt.c: Audit. Fix up copyright. Precompute string lengths for better length-checking. * cr_err_repl.c: Audit. Fix up copyright. Use moving pointer to do encoding. Precompute string lengths for better length-checking. Use KRB4_PUT* macros so that output is always big-endian. * cr_tkt.c: Audit. Fix up copyright. Use KRB4_PUT* macros for encoding so that output is always big-endian. Zero out the key schedule after encrypting. * decomp_tkt.c: Audit. Fix up copyright. Use krb_strnlen() for actually detecting string length errors. Use a struct in_addr to retrieve the IP address and assign it to paddress for return. Use KRB4_GET* macros for decoding to avoid byteswapping problems. Zero out session key and decrypted ticket on error. * g_ad_tkt.c: Audit. Fix up copyright. Break out parsing of decrypted KDC reply packet into a separate function to simplify error handling somewhat. Precompute string lengths for better length-checking. Use KRB4_PUT* macros for encoding so that output is always big-endian. Use KRB4_GET* macros for decoding to avoid byteswapping problems. Stomp on session key on error conditions. * g_in_tkt.c: Audit. Fix up copyright. Precompute string lengths for better length-checking. Use KRB4_PUT* macros for encoding so output is always big-endian. Use KRB4_GET* macros for decoding to avoid byteswapping problems. Use krb_strnlen() to actually detect string length errors. Zero out session key and decrypted KDC reply once they're no longer useful. * mk_auth.c: Audit. Fix up copyright. Use moving pointer for encoding. Use KRB4_PUT* macros for encoding to avoid alignment issues with using memcpy(). Use KRB4_GET* macros for decoding to avoid alignment issues with using memcpy(). * mk_err.c: Audit. Fix up copyright. Precompute string length. Use KRB4_PUT* macros to always encode as big-endian. * mk_preauth.c: Audit. Zero out key schedule after encryption. * mk_priv.c: Audit. Fix up copyright. Use KRB4_PUT* macros for encoding so output is always big-endian. * mk_req.c: Audit. Fix up copyright. Use moving pointer for encoding. Precompute string lengths for better length-checking. Use KRB4_PUT* macros for encoding so output is always big-endian. Zero out session key after encryption. * mk_safe.c: Audit. Fix up copyright. Use KRB4_PUT* macros for encoding so output is always big-endian. * rd_err.c: Audit. Fix up copyright. Use KRB4_GET* macros to avoid alignment issues. * rd_preauth.c: Audit. Zero key schedule after decrypting. * rd_priv.c: Audit. Fix up copyright. Use KRB4_GET* macros to avoid alignment issues. * rd_req.c: Audit. Fix up copyright. * send_to_kdc.c (send_recv): Actually set rpkt->length, since some callers actually use it now to do length-checking. * strnlen.c: New file; compute string length, bounded by a maximum. If the maximum number of characters has been read without encountering a NUL character, return -1. This makes overflow checking of strings in buffers much easier. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12859 dc483132-0cff-0310-8789-dd5450dbe970
* * configure.in: Use AC_TYPE_SIZE_T instead of AC_SIZE_TEzra Peisach2000-11-012-1/+5
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12836 dc483132-0cff-0310-8789-dd5450dbe970
* * configure.in: Use AC_CHECK_HEADERS instead of AC_HAVE_HEADERSEzra Peisach2000-11-012-1/+5
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12835 dc483132-0cff-0310-8789-dd5450dbe970
* * configure.in: Use AC_C_CONST and AC_CHECK_FUNCS instead ofEzra Peisach2000-11-012-2/+7
| | | | | | AC_CONST and AC_HAVE_FUNCS. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12834 dc483132-0cff-0310-8789-dd5450dbe970
* * configure.in: Use AC_C_CONST instead of AC_CONSTEzra Peisach2000-11-012-1/+5
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12833 dc483132-0cff-0310-8789-dd5450dbe970
* * cc_stdio.c: Add a "mode" field to krb5_scc_data to keep track ofTom Yu2000-10-312-0/+18
| | | | | | | | | | | what mode the file was opened in. (krb5_scc_close_file): Ignore EBADF from fflush() if the file was opened for readonly access. For some reason NetBSD's fflush() exhibits this behavior. (krb5_scc_open_file): Save the mode with which the file was opened in data->mode. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12825 dc483132-0cff-0310-8789-dd5450dbe970
* * asn1buf.c (asn1buf_sync): Add new arguments to include the fullTom Yu2000-10-266-71/+214
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | complement of data about a prefetched tag, as well as to indicate whether the prefetched tag or the surrounding sequence is of an indefinite length. (asn1buf_skiptail): Add new arguments to indicate whether the prefetched tag is indefinite, as well as its length. This facilitates proper skipping of trailing garbage. (asn1buf_remains): Add new argument to indicate whether the surrounding encoding is indefinite. Don't advance buf->next if an EOC encoding is detected; the caller will do that. * asn1buf.h: Update prototypes. * asn1_get.c (asn1_get_tag_indef): Don't treat EOC encoding as special anymore, since previous behavior was overloading the tag number in a bad way. Also, report a MISMATCH_INDEF error if the tag encoding is for the forbidden primitive constructed encoding. * asn1_k_decode.c (next_tag): Call get_tag_indef() in order to get information about whether the length is indefinite. Don't check the tag class and construction explicitly. (get_eoc): New macro to get a tag and check if it is an EOC encoding. (get_field, opt_field): Move the check for the tag class and construction to here. (get_field_body, get_lenfield_body): Call get_eoc() instead of next_tag() if we are decoding a constructed indefinite encoding. (begin_structure): Use a different variable to indicate whether the sequence is indefinite as opposed to whether an individual field is indefinite. (end_structure): Update to new calling convention of asn1buf_sync(). (sequence_of): Rewrite significantly. (sequence_of_common): Move the bulk of previous sequence_of() macro to here. Does not declare some variables that sequence_of() declares. (sequence_of_no_tagvars): Similar to sequence_of() macro but declares different variables for the purpose of prefetching the final tag. (end_sequence_of_no_tagvars): Similar to end_sequence_of() macro but uses variables declared by the sequence_of_no_tagvars() macro to prefetch the final tag. (asn1_decode_principal_name): Update for new asn1buf_remains() calling convention. Call sequence_of_no_tagvars(), etc. instead of sequence_of(), etc. in order to not declare shadowing block-local variables. (decode_array_body): Update for new asn1buf_remains() calling convention. (asn1_decode_sequence_of_enctype): Update for new asn1buf_remains() calling convention. * krb5_decode.c (next_tag): Call get_tag_indef() in order to get information about whether the length is indefinite. Don't check the tag class and construction explicitly. (get_eoc): New macro to get a tag and check if it is an EOC encoding. (get_field, opt_field): Move the check for the tag class and construction to here. (get_field_body, get_lenfield_body): Call get_eoc() instead of next_tag() if we are decoding a constructed indefinite encoding. (begin_structure): Use a different variable to indicate whether the sequence is indefinite as opposed to whether an individual field is indefinite. (end_structure): Update to new calling convention of asn1buf_sync(). git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12816 dc483132-0cff-0310-8789-dd5450dbe970
* * asn1_err.et: Add error codes MISMATCH_INDEF and MISSING_EOCTom Yu2000-10-262-0/+6
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12815 dc483132-0cff-0310-8789-dd5450dbe970
* * t_ser.c: Cast getpid() calls to int as arguments to sprintfEzra Peisach2000-10-2610-23/+48
| | | | | | | | | | | | | | | | | | * ser_actx.c: Move prototypes (listed below) to int-proto.h * int-proto.h: Add prototypes for krb5_ser_authdata_init, krb5_ser_address_init, krb5_ser_authenticator_init, krb5_ser_checksum_init, krb5_ser_keyblock_init, krb5_ser_principal_init. * ser_adata.c, ser_addr.c, ser_auth.c, ser_cksum.c, ser_key.c, ser_princ.c: Include int-proto.h for prototypes. By moving the prototypes to int-proto.h, it ndles the gcc warning on missing prototypes. These functions are intenal and all used by krb5_ser_auth_context_init() git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12814 dc483132-0cff-0310-8789-dd5450dbe970
* * compat_recv.c (krb_v4_recvauth): Update call to mk_priv()Tom Yu2000-10-242-1/+5
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12806 dc483132-0cff-0310-8789-dd5450dbe970
* * mk_auth.c (krb_check_auth): Modify call to rd_priv() by kludgingTom Yu2000-10-247-10/+27
| | | | | | | | | | | | | | | | | | a cast of session key to C_Block *, since CNS is inconsistent in this area as well. * mk_priv.c (krb_mk_priv): Align with CNS by taking C_Block *. * mk_safe.c (krb_mk_safe): Align with CNS by taking C_Block *. * rd_priv.c (krb_rd_priv): Align with CNS by taking C_Block *. * rd_safe.c (krb_rd_safe): Align with CNS by taking C_Block *. * recvauth.c (krb_recvauth): Update call to mk_priv() to have the correct type. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12805 dc483132-0cff-0310-8789-dd5450dbe970
* * clnt_chpass_util.c (kadm5_chpass_principal_util): Change msg_lenEzra Peisach2000-10-172-1/+6
| | | | | | to unsigned int. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12786 dc483132-0cff-0310-8789-dd5450dbe970
* * svr_chpass_util.c (kadm5_chpass_principal_util): Change msg_lenEzra Peisach2000-10-172-1/+6
| | | | | | to unsigned int. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12785 dc483132-0cff-0310-8789-dd5450dbe970
* * admin.h (KADM5_PW_FIRST_PROMPT): Get rid of casts fromEzra Peisach2000-10-174-6/+19
| | | | | | | | | | | | | error_message to char * - leave them as const char *. (kadm5_chpass_principal_util): Argument msg_len is unsigned int. * admin_internal.h (_kadm5_chpass_principal_util): msg_len is unsigned int. * chpass_util.c (_kadm5_chpass_principal_util): Change msg_len to unsigned int. Arhument to krb5_read_password is unsigned int. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12784 dc483132-0cff-0310-8789-dd5450dbe970
* * changepw.c: Cast length argument to recvfrom/sendto to intEzra Peisach2000-10-1711-25/+51
| | | | | | | | | | | | | | | | | | | | | | | | | | | * os-proto.h: Moved extern definition of krb5_max_dgram_size, krb5_max_skdc_timeout, krb5_skdc_timeout_shift, krb5_skdc_timeout_1 here. * accessor.c: Definition for krb5_max_dgram_size, krb5_max_skdc_timeout, krb5_skdc_timeout_shift, krb5_skdc_timeout_1 moved to os-proto.h * osconfig.c: Changed definition for krb5_max_dgram_size, krb5_max_skdc_timeout, krb5_skdc_timeout_shift, krb5_skdc_timeout_1 to unsigned int. * get_krbhst.c, init_os_context.c, locate_kdc.c, prompter.c: Unsigned/signed int cleanup. * read_pwd.c (krb5_read_password): Change size_return to unsigned int *. * sendto_kdc.c: Remove definition for krb5_max_dgram_size, krb5_max_skdc_timeout, krb5_skdc_timeout_shift, krb5_skdc_timeout_1. (moved to os-proto.h). Cast arguments to int for send() and recv(). git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12783 dc483132-0cff-0310-8789-dd5450dbe970
* * bld_pr_ext.c, bld_princ.c (krb5_build_principal_ext,Ezra Peisach2000-10-1717-36/+84
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | krb5_build_principal_va, krb5_build_principal): Take an unsigned int realm length. * get_in_tkt.c (krb5_get_init_creds): Use SALT_TYPE_AFS_LENGTH instead of -1. * gic_pwd.c (krb5_get_as_key_password): Use SALT_TYPE_AFS_LENGTH instead of -1. * in_tkt_pwd.c (pwd_keyproc): Argument to krb5_read_password is unsigned int. * pr_to_salt.c (krb5_principal2salt_internal): Declare as static. Unsigned int fix. * preauth.c (krb5_obtain_padata): Use SALT_TYPE_AFS_LENGTH instead of -1. * preauth2.c (pa_salt): Use SALT_TYPE_AFS_LENGTH instead of -1. * conv_princ.c, copy_auth.c, copy_princ.c, gc_frm_kdc.c, parse.c, send_tgs.c, srv_rcache.c: Unsigned/signed int cleanup. * unparse.c (krb5_unparse_name_ext): size parameter changed to unsigned int *. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12782 dc483132-0cff-0310-8789-dd5450dbe970
* * ktbase.c (krb5_kt_resolve): Signed/unsigned intEzra Peisach2000-10-179-18/+44
| | | | | | cleanups. Maintain const char * attribute of incomming name. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12781 dc483132-0cff-0310-8789-dd5450dbe970
* * cc_stdio.c, cc_file.c: Unsigned/signed int cleanupEzra Peisach2000-10-173-32/+86
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12780 dc483132-0cff-0310-8789-dd5450dbe970
* * asn1buf.h: Lengths are now unsigned int forEzra Peisach2000-10-1716-190/+239
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | asn1buf_ensure_space(), asn1buf_expand(), asn1buf_imbed(), asn1buf_sync(), asn1buf_insert_octetstring(), asn1buf_insert_charstring(), asn1_remove_octetstring(), asn1buf_remove_charstring(), * krb5_decode.c, krb5_encode.c: Length fields are unsigned ints. * asn1_make.c, asn1_make.h: Prototypes changed to use an unsigned int * in_len and retlen for: asn1_make_etag(), asn1_make_tag(), asn1_make_sequence(), asn1_make_set(), asn1_make_string(), asn1_make_length(), asn1_make_id(). * asn1_k_encode.h, asn1_k_encode.c: Change length fields to unsigned ints for all functions. (asn1_encode_etype_info_entry): Test for KRB5_ETYPE_NO_SALT instead of -1. * asn1_k_decode.c (asn1_decode_etype_info_entry): Use a length of KRB5_ETYPE_NO_SALT to indicate the optional salt not being present. (instead of -1). (setup): Length is now unsigned int. * asn1_get.c, asn1_get.h: Change retlent to unsigned int * for asn1_get_tag(), asn1_get_tag_indef(), asn1_get_sequence, asn1_get_length(). * asn1_encode.c, asn1_encode.h: Change retlen to unsigned int * for asn1_encode_integer(), asn1_encode_unsigned_integer(), asn1_encode_octetstring(), asn1_encode_charstring(), asn1_encode_printable_string(), asn1_encode_ia5string(), asn1_encode_generaltime(), asn1_encode_generalstring() * asn1_decode.c, asn1_decode.h: Change retlen to unsigned int * for asn1_decode_octetstring(), asn1_decode_generalstring(), asn1_decode_charstring(), git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12779 dc483132-0cff-0310-8789-dd5450dbe970
* * fetch_mkey.c: Signed/unsigned int cleanupEzra Peisach2000-10-173-12/+17
| | | | | | | * kdb_cpw.c (add_key_pwd): Change salt data length of -1 to SALT_TYPE_AFS_LENGTH. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12778 dc483132-0cff-0310-8789-dd5450dbe970
* * cksum.c (des_cbc_cksum): Length is unsigned longEzra Peisach2000-10-173-2/+8
| | | | | | * enc_dec.c (des_cbc_encrypt): Length is unsigned long. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12777 dc483132-0cff-0310-8789-dd5450dbe970
* * nfold.c (krb5_nfold): inbots and outbits are now unsigned intEzra Peisach2000-10-173-3/+9
| | | | | | * prng.c: Local variable random_count is now unsigned int. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12776 dc483132-0cff-0310-8789-dd5450dbe970
* * hash_sha1.c (k5_sha1_hash): Cast length field in shsUpdate callEzra Peisach2000-10-172-1/+6
| | | | | | to int. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12775 dc483132-0cff-0310-8789-dd5450dbe970
* * des_int.h: Change prototypes for mit_des_cbc_encrypt(),Ezra Peisach2000-10-177-12/+32
| | | | | | | | | | | | | | | | | | | | mit_des_cbc_cksum(), and mit_des3_cbc_encrypt() to take unsigned long lengths. * d3_cbc.c (mit_des3_cbc_encrypt): Length argument now takes an unsigned long. * f_cbc.c (mit_des_cbc_encrypt): Length argument now takes an unsigned long. * f_cksum.c (mit_des_cbc_cksum): Length argument now takes an unsigned long. * string2key.c: Unsigned/signed int cleanup. Test for a salt-length of SALT_TYPE_AFS_LENGTH or -1 (for backwards compatibilty) for use of mit_afs_string_to_key(). git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12774 dc483132-0cff-0310-8789-dd5450dbe970
* * krb5_libinit.c: Include krb5_libinit.h for prototypesEzra Peisach2000-10-172-0/+5
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12772 dc483132-0cff-0310-8789-dd5450dbe970
* * lock-test.c (main): Cleanup assignments in conditionals. IfEzra Peisach2000-10-128-21/+44
| | | | | | | | | | | | | | USE_KADM5_API_VERSION is 1, set to 2. This program uses the V2 api (kadm5_get_config_params). * setkey-test.c: Declare main() as int. Enclose initialization of elements of arrays in '{', '}'. Use krb5_enctype type instead of unsigned int. Break out assignments in conditionals. * destroy-test.c, handle-test.c, init-test.c, iter-test.c, randkey-test.c: Declare main() as int. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12755 dc483132-0cff-0310-8789-dd5450dbe970
* getifaddrs() supportKen Raeburn2000-10-101-0/+4
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12752 dc483132-0cff-0310-8789-dd5450dbe970
* getifaddrs() supportKen Raeburn2000-10-104-11/+217
| | | | git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12751 dc483132-0cff-0310-8789-dd5450dbe970