summaryrefslogtreecommitdiffstats
path: root/src/lib/crypto/des/string2key.c
diff options
context:
space:
mode:
authorEzra Peisach <epeisach@mit.edu>2000-10-17 22:57:34 +0000
committerEzra Peisach <epeisach@mit.edu>2000-10-17 22:57:34 +0000
commita1453efdd2480cf6249795a41cd1a21579e2ada9 (patch)
tree0367ad41f61b7ffcbf7ca42be64a26dbb349d782 /src/lib/crypto/des/string2key.c
parent48e24f7ef133990af31e9554731a31b43c1d762c (diff)
downloadkrb5-a1453efdd2480cf6249795a41cd1a21579e2ada9.tar.gz
krb5-a1453efdd2480cf6249795a41cd1a21579e2ada9.tar.xz
krb5-a1453efdd2480cf6249795a41cd1a21579e2ada9.zip
* des_int.h: Change prototypes for mit_des_cbc_encrypt(),
mit_des_cbc_cksum(), and mit_des3_cbc_encrypt() to take unsigned long lengths. * d3_cbc.c (mit_des3_cbc_encrypt): Length argument now takes an unsigned long. * f_cbc.c (mit_des_cbc_encrypt): Length argument now takes an unsigned long. * f_cksum.c (mit_des_cbc_cksum): Length argument now takes an unsigned long. * string2key.c: Unsigned/signed int cleanup. Test for a salt-length of SALT_TYPE_AFS_LENGTH or -1 (for backwards compatibilty) for use of mit_afs_string_to_key(). git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@12774 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/lib/crypto/des/string2key.c')
-rw-r--r--src/lib/crypto/des/string2key.c8
1 files changed, 4 insertions, 4 deletions
diff --git a/src/lib/crypto/des/string2key.c b/src/lib/crypto/des/string2key.c
index 5381fdbc9..45a8500ec 100644
--- a/src/lib/crypto/des/string2key.c
+++ b/src/lib/crypto/des/string2key.c
@@ -75,13 +75,13 @@ krb5_keyblock FAR * keyblock;
const krb5_data FAR * data;
const krb5_data FAR * salt;
{
- register char *str, *copystr;
+ register krb5_octet *str, *copystr;
register krb5_octet *key;
register unsigned temp;
register long i;
register int j;
- register long length;
+ register unsigned long length;
unsigned char *k_p;
int forward;
register char *p_char;
@@ -97,7 +97,7 @@ const krb5_data FAR * salt;
key = keyblock->contents;
if (salt) {
- if (salt->length == -1) {
+ if (salt->length == SALT_TYPE_AFS_LENGTH || salt->length == (unsigned) -1) {
/* cheat and do AFS string2key instead */
return mit_afs_string_to_key (keyblock, data, salt);
} else
@@ -178,7 +178,7 @@ const krb5_data FAR * salt;
memset((char *)key_sked, 0, sizeof(key_sked));
/* clean & free the input string */
- memset(copystr, 0, (size_t) length);
+ memset(copystr, 0, length);
krb5_xfree(copystr);
/* now fix up key parity again */