diff options
author | Ezra Peisach <epeisach@mit.edu> | 2002-11-15 16:12:20 +0000 |
---|---|---|
committer | Ezra Peisach <epeisach@mit.edu> | 2002-11-15 16:12:20 +0000 |
commit | e2a5f90e6224a4ab7ebe993362d8d7595477908d (patch) | |
tree | 6b7372537a0b6886cedcdc47dddebbf8e1861166 /src/lib/gssapi/krb5/gssapiP_krb5.h | |
parent | 866703fab606a48b897eddeabeddf46823589756 (diff) | |
download | krb5-e2a5f90e6224a4ab7ebe993362d8d7595477908d.tar.gz krb5-e2a5f90e6224a4ab7ebe993362d8d7595477908d.tar.xz krb5-e2a5f90e6224a4ab7ebe993362d8d7595477908d.zip |
* accept_sec_context.c (krb5_gss_accept_sec_context): Use unsigned
lengths for arguments to g_token_size and g_make_token_header.
* export_name.c (krb5_gss_export_name): Change local length
variable to unsigned.
* k5unseal.c (kg_unseal_v1): Seqnum variable changed from
krb5_int32 to krb5_ui_4.
* k5seal.c (make_seal_token_v1): Change seqnum argument to
krb5_ui_4 from krb5_int32 to match krb5_gss_ctx_id_rec struct.
* gssapiP_krb5.h, util_crypt.c, util_seqnum.c: kg_make_seq_num(),
kg_get_seq_num() changed to use krb5_ui_4 for sequence
numbers. kg_encrypt(), kg_decrypt() length argument now unsigned.
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@15007 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/lib/gssapi/krb5/gssapiP_krb5.h')
-rw-r--r-- | src/lib/gssapi/krb5/gssapiP_krb5.h | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/src/lib/gssapi/krb5/gssapiP_krb5.h b/src/lib/gssapi/krb5/gssapiP_krb5.h index a51db06bb..3b5bf17e1 100644 --- a/src/lib/gssapi/krb5/gssapiP_krb5.h +++ b/src/lib/gssapi/krb5/gssapiP_krb5.h @@ -214,13 +214,13 @@ krb5_error_code kg_checksum_channel_bindings krb5_error_code kg_make_seq_num (krb5_context context, krb5_keyblock *key, - int direction, krb5_int32 seqnum, unsigned char *cksum, + int direction, krb5_ui_4 seqnum, unsigned char *cksum, unsigned char *buf); krb5_error_code kg_get_seq_num (krb5_context context, krb5_keyblock *key, unsigned char *cksum, unsigned char *buf, int *direction, - krb5_int32 *seqnum); + krb5_ui_4 *seqnum); krb5_error_code kg_make_seed (krb5_context context, krb5_keyblock *key, @@ -236,7 +236,7 @@ krb5_error_code kg_encrypt (krb5_context context, krb5_pointer iv, krb5_pointer in, krb5_pointer out, - int length); + unsigned int length); krb5_error_code kg_arcfour_docrypt (const krb5_keyblock *longterm_key , int ms_usage, const unsigned char *kd_data, size_t kd_data_len, @@ -248,7 +248,7 @@ krb5_error_code kg_decrypt (krb5_context context, krb5_pointer iv, krb5_pointer in, krb5_pointer out, - int length); + unsigned int length); OM_uint32 kg_seal (krb5_context context, OM_uint32 *minor_status, |