Skip to content
体验新版
项目
组织
正在加载...
登录
切换导航
打开侧边栏
OpenHarmony
Third Party Openssl
提交
fdc2bbca
T
Third Party Openssl
项目概览
OpenHarmony
/
Third Party Openssl
大约 1 年 前同步成功
通知
9
Star
18
Fork
1
代码
文件
提交
分支
Tags
贡献者
分支图
Diff
Issue
0
列表
看板
标记
里程碑
合并请求
0
Wiki
0
Wiki
分析
仓库
DevOps
项目成员
Pages
T
Third Party Openssl
项目概览
项目概览
详情
发布
仓库
仓库
文件
提交
分支
标签
贡献者
分支图
比较
Issue
0
Issue
0
列表
看板
标记
里程碑
合并请求
0
合并请求
0
Pages
分析
分析
仓库分析
DevOps
Wiki
0
Wiki
成员
成员
收起侧边栏
关闭侧边栏
动态
分支图
创建新Issue
提交
Issue看板
体验新版 GitCode,发现更多精彩内容 >>
提交
fdc2bbca
编写于
7月 31, 2001
作者:
R
Richard Levitte
浏览文件
操作
浏览文件
下载
电子邮件补丁
差异文件
Correct most of the unsigned vs. signed warnings (or int vs. size_t),
and rename some local variables to avoid name shadowing.
上级
c2a3358b
变更
1
隐藏空白更改
内联
并排
Showing
1 changed file
with
13 addition
and
12 deletion
+13
-12
ssl/kssl.c
ssl/kssl.c
+13
-12
未找到文件。
ssl/kssl.c
浏览文件 @
fdc2bbca
...
...
@@ -818,7 +818,7 @@ int kssl_test_confound(unsigned char *p)
** what the highest assigned CKSUMTYPE_ constant is. As of 1.2.2
** it is 0x000c (CKSUMTYPE_HMAC_SHA1_DES3). So we will use 0x0010.
*/
int
*
populate_cksumlens
(
void
)
size_t
*
populate_cksumlens
(
void
)
{
int
i
,
j
,
n
;
static
size_t
*
cklens
=
NULL
;
...
...
@@ -858,8 +858,9 @@ int *populate_cksumlens(void)
*/
unsigned
char
*
kssl_skip_confound
(
krb5_enctype
etype
,
unsigned
char
*
a
)
{
int
i
,
cklen
,
conlen
;
static
int
*
cksumlens
=
NULL
;
int
i
,
conlen
;
size_t
cklen
;
static
size_t
*
cksumlens
=
NULL
;
unsigned
char
*
test_auth
;
conlen
=
(
etype
)
?
8
:
0
;
...
...
@@ -1107,7 +1108,7 @@ kssl_cget_tkt( /* UPDATE */ KSSL_CTX *kssl_ctx,
}
arlen
=
krb5_app_req
.
length
;
p
=
krb5_app_req
.
data
;
p
=
(
unsigned
char
*
)
krb5_app_req
.
data
;
ap_req
=
(
KRB5_APREQBODY
*
)
d2i_KRB5_APREQ
(
NULL
,
&
p
,
arlen
);
if
(
ap_req
)
{
...
...
@@ -1116,9 +1117,9 @@ kssl_cget_tkt( /* UPDATE */ KSSL_CTX *kssl_ctx,
if
(
authenp
->
length
&&
(
authenp
->
data
=
malloc
(
authenp
->
length
)))
{
unsigned
char
*
p
=
authenp
->
data
;
unsigned
char
*
adp
=
(
unsigned
char
*
)
authenp
->
data
;
authenp
->
length
=
i2d_KRB5_ENCDATA
(
ap_req
->
authenticator
,
&
p
);
ap_req
->
authenticator
,
&
ad
p
);
}
}
...
...
@@ -1377,7 +1378,7 @@ kssl_sget_tkt( /* UPDATE */ KSSL_CTX *kssl_ctx,
** &ap_option, &krb5ticket)) != 0) { Error }
*/
p
=
indata
->
data
;
p
=
(
unsigned
char
*
)
indata
->
data
;
if
((
asn1ticket
=
(
KRB5_TKTBODY
*
)
d2i_KRB5_TICKET
(
NULL
,
&
p
,
(
long
)
indata
->
length
))
==
NULL
)
{
...
...
@@ -1825,15 +1826,15 @@ void kssl_krb5_free_data_contents(krb5_context context, krb5_data *data)
** Return pointer to the (partially) filled in struct tm on success,
** return NULL on failure.
*/
struct
tm
*
k_gmtime
(
ASN1_GENERALIZEDTIME
*
c
time
,
struct
tm
*
k_tm
)
struct
tm
*
k_gmtime
(
ASN1_GENERALIZEDTIME
*
g
time
,
struct
tm
*
k_tm
)
{
char
c
,
*
p
;
if
(
!
k_tm
)
return
NULL
;
if
(
ctime
==
NULL
||
c
time
->
length
<
14
)
return
NULL
;
if
(
c
time
->
data
==
NULL
)
return
NULL
;
if
(
gtime
==
NULL
||
g
time
->
length
<
14
)
return
NULL
;
if
(
g
time
->
data
==
NULL
)
return
NULL
;
p
=
&
c
time
->
data
[
14
];
p
=
(
char
*
)
&
g
time
->
data
[
14
];
c
=
*
p
;
*
p
=
'\0'
;
p
-=
2
;
k_tm
->
tm_sec
=
atoi
(
p
);
*
(
p
+
2
)
=
c
;
c
=
*
p
;
*
p
=
'\0'
;
p
-=
2
;
k_tm
->
tm_min
=
atoi
(
p
);
*
(
p
+
2
)
=
c
;
...
...
@@ -1963,7 +1964,7 @@ krb5_error_code kssl_check_authent(
goto
err
;
}
p
=
authentp
->
data
;
p
=
(
unsigned
char
*
)
authentp
->
data
;
if
((
dec_authent
=
d2i_KRB5_ENCDATA
(
NULL
,
&
p
,
(
long
)
authentp
->
length
))
==
NULL
)
{
...
...
编辑
预览
Markdown
is supported
0%
请重试
或
添加新附件
.
添加附件
取消
You are about to add
0
people
to the discussion. Proceed with caution.
先完成此消息的编辑!
取消
想要评论请
注册
或
登录