summaryrefslogtreecommitdiffstats
path: root/src/kadmin/server
diff options
context:
space:
mode:
authorGreg Hudson <ghudson@mit.edu>2012-02-21 18:57:44 +0000
committerGreg Hudson <ghudson@mit.edu>2012-02-21 18:57:44 +0000
commit7558fb3af9f9fdfb8195333c11a70ab7b354f82c (patch)
tree71074545dc7687d41c91e55d6a9ef6118e7992dc /src/kadmin/server
parent822d8b73fd19bd2647c8d0aaba21a2b961f3d40b (diff)
downloadkrb5-7558fb3af9f9fdfb8195333c11a70ab7b354f82c.tar.gz
krb5-7558fb3af9f9fdfb8195333c11a70ab7b354f82c.tar.xz
krb5-7558fb3af9f9fdfb8195333c11a70ab7b354f82c.zip
kvno ASN.1 encoding interop with Windows RODCs
RFC 4120 defines the EncryptedData kvno field as an integer in the range of unsigned 32-bit numbers. Windows encodes and decodes the field as a signed 32-bit integer. Historically we do the same in our encoder in 1.6 and prior, and in our decoder through 1.10. (Actually, our decoder through 1.10 decoded the value as a long and then cast the result to unsigned int, so it would accept positive values >= 2^31 on 64-bit platforms but not on 32-bit platforms.) kvno values that large (or negative) are only likely to appear in the context of Windows read-only domain controllers. So do what Windows does instead of what RFC 4120 says. ticket: 7092 git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@25703 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/kadmin/server')
0 files changed, 0 insertions, 0 deletions