diff options
| author | Greg Hudson <ghudson@mit.edu> | 2012-02-21 18:57:44 +0000 |
|---|---|---|
| committer | Greg Hudson <ghudson@mit.edu> | 2012-02-21 18:57:44 +0000 |
| commit | 7558fb3af9f9fdfb8195333c11a70ab7b354f82c (patch) | |
| tree | 71074545dc7687d41c91e55d6a9ef6118e7992dc /src/kadmin/server | |
| parent | 822d8b73fd19bd2647c8d0aaba21a2b961f3d40b (diff) | |
| download | krb5-7558fb3af9f9fdfb8195333c11a70ab7b354f82c.tar.gz krb5-7558fb3af9f9fdfb8195333c11a70ab7b354f82c.tar.xz krb5-7558fb3af9f9fdfb8195333c11a70ab7b354f82c.zip | |
kvno ASN.1 encoding interop with Windows RODCs
RFC 4120 defines the EncryptedData kvno field as an integer in the
range of unsigned 32-bit numbers. Windows encodes and decodes the
field as a signed 32-bit integer. Historically we do the same in our
encoder in 1.6 and prior, and in our decoder through 1.10. (Actually,
our decoder through 1.10 decoded the value as a long and then cast the
result to unsigned int, so it would accept positive values >= 2^31 on
64-bit platforms but not on 32-bit platforms.)
kvno values that large (or negative) are only likely to appear in the
context of Windows read-only domain controllers. So do what Windows
does instead of what RFC 4120 says.
ticket: 7092
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@25703 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/kadmin/server')
0 files changed, 0 insertions, 0 deletions
