Index: openssl/ssl/kssl.c |
=================================================================== |
--- openssl/ssl/kssl.c (revision 105093) |
+++ openssl/ssl/kssl.c (working copy) |
@@ -76,6 +76,7 @@ |
#include <openssl/evp.h> |
#include <openssl/objects.h> |
#include <openssl/krb5_asn.h> |
+#include "kssl_lcl.h" |
#ifndef OPENSSL_NO_KRB5 |
@@ -131,7 +132,7 @@ |
#define krb5_principal_compare kssl_krb5_principal_compare |
#define krb5_decrypt_tkt_part kssl_krb5_decrypt_tkt_part |
#define krb5_timeofday kssl_krb5_timeofday |
-#define krb5_rc_default kssl_krb5_rc_default |
+#define krb5_rc_default kssl_krb5_rc_default |
#ifdef krb5_rc_initialize |
#undef krb5_rc_initialize |
@@ -839,7 +840,7 @@ |
** "62 xx 30 yy" (APPLICATION-2, SEQUENCE), where xx-yy =~ 2, and |
** xx and yy are possibly multi-byte length fields. |
*/ |
-int kssl_test_confound(unsigned char *p) |
+static int kssl_test_confound(unsigned char *p) |
{ |
int len = 2; |
int xx = 0, yy = 0; |
@@ -874,7 +875,7 @@ |
** what the highest assigned CKSUMTYPE_ constant is. As of 1.2.2 |
** it is 0x000c (CKSUMTYPE_HMAC_SHA1_DES3). So we will use 0x0010. |
*/ |
-size_t *populate_cksumlens(void) |
+static size_t *populate_cksumlens(void) |
{ |
int i, j, n; |
static size_t *cklens = NULL; |
@@ -1025,7 +1026,7 @@ |
/* Display contents of krb5_principal_data struct, for debugging |
** (krb5_principal is typedef'd == krb5_principal_data *) |
*/ |
-void |
+static void |
print_krb5_princ(char *label, krb5_principal_data *princ) |
{ |
int i, ui, uj; |
@@ -1224,7 +1225,7 @@ |
** code here. This tkt should alloc/free just |
** like the real thing. |
*/ |
-krb5_error_code |
+static krb5_error_code |
kssl_TKT2tkt( /* IN */ krb5_context krb5context, |
/* IN */ KRB5_TKTBODY *asn1ticket, |
/* OUT */ krb5_ticket **krb5ticket, |
@@ -1902,7 +1903,7 @@ |
** Return pointer to the (partially) filled in struct tm on success, |
** return NULL on failure. |
*/ |
-struct tm *k_gmtime(ASN1_GENERALIZEDTIME *gtime, struct tm *k_tm) |
+static struct tm *k_gmtime(ASN1_GENERALIZEDTIME *gtime, struct tm *k_tm) |
{ |
char c, *p; |
@@ -1928,7 +1929,7 @@ |
** So we try to sneek the clockskew out through the replay cache. |
** If that fails just return a likely default (300 seconds). |
*/ |
-krb5_deltat get_rc_clockskew(krb5_context context) |
+static krb5_deltat get_rc_clockskew(krb5_context context) |
{ |
krb5_rcache rc; |
krb5_deltat clockskew; |
@@ -2092,9 +2093,12 @@ |
EVP_CIPHER_CTX_cleanup(&ciph_ctx); |
#ifdef KSSL_DEBUG |
+ { |
+ int padl; |
printf("kssl_check_authent: decrypted authenticator[%d] =\n", outl); |
for (padl=0; padl < outl; padl++) printf("%02x ",unenc_authent[padl]); |
printf("\n"); |
+ } |
#endif /* KSSL_DEBUG */ |
if ((p = kssl_skip_confound(enctype, unenc_authent)) == NULL) |
@@ -2124,7 +2128,7 @@ |
tm_g = gmtime(&now); tg = mktime(tm_g); |
tz_offset = tg - tl; |
- *atimep = tr - tz_offset; |
+ *atimep = (krb5_timestamp)(tr - tz_offset); |
} |
#ifdef KSSL_DEBUG |