| Index: openssl/ssl/kssl.c
|
| ===================================================================
|
| --- openssl/ssl/kssl.c (revision 105093)
|
| +++ openssl/ssl/kssl.c (working copy)
|
| @@ -76,6 +76,7 @@
|
| #include <openssl/evp.h>
|
| #include <openssl/objects.h>
|
| #include <openssl/krb5_asn.h>
|
| +#include "kssl_lcl.h"
|
|
|
| #ifndef OPENSSL_NO_KRB5
|
|
|
| @@ -131,7 +132,7 @@
|
| #define krb5_principal_compare kssl_krb5_principal_compare
|
| #define krb5_decrypt_tkt_part kssl_krb5_decrypt_tkt_part
|
| #define krb5_timeofday kssl_krb5_timeofday
|
| -#define krb5_rc_default kssl_krb5_rc_default
|
| +#define krb5_rc_default kssl_krb5_rc_default
|
|
|
| #ifdef krb5_rc_initialize
|
| #undef krb5_rc_initialize
|
| @@ -839,7 +840,7 @@
|
| ** "62 xx 30 yy" (APPLICATION-2, SEQUENCE), where xx-yy =~ 2, and
|
| ** xx and yy are possibly multi-byte length fields.
|
| */
|
| -int kssl_test_confound(unsigned char *p)
|
| +static int kssl_test_confound(unsigned char *p)
|
| {
|
| int len = 2;
|
| int xx = 0, yy = 0;
|
| @@ -874,7 +875,7 @@
|
| ** what the highest assigned CKSUMTYPE_ constant is. As of 1.2.2
|
| ** it is 0x000c (CKSUMTYPE_HMAC_SHA1_DES3). So we will use 0x0010.
|
| */
|
| -size_t *populate_cksumlens(void)
|
| +static size_t *populate_cksumlens(void)
|
| {
|
| int i, j, n;
|
| static size_t *cklens = NULL;
|
| @@ -1025,7 +1026,7 @@
|
| /* Display contents of krb5_principal_data struct, for debugging
|
| ** (krb5_principal is typedef'd == krb5_principal_data *)
|
| */
|
| -void
|
| +static void
|
| print_krb5_princ(char *label, krb5_principal_data *princ)
|
| {
|
| int i, ui, uj;
|
| @@ -1224,7 +1225,7 @@
|
| ** code here. This tkt should alloc/free just
|
| ** like the real thing.
|
| */
|
| -krb5_error_code
|
| +static krb5_error_code
|
| kssl_TKT2tkt( /* IN */ krb5_context krb5context,
|
| /* IN */ KRB5_TKTBODY *asn1ticket,
|
| /* OUT */ krb5_ticket **krb5ticket,
|
| @@ -1902,7 +1903,7 @@
|
| ** Return pointer to the (partially) filled in struct tm on success,
|
| ** return NULL on failure.
|
| */
|
| -struct tm *k_gmtime(ASN1_GENERALIZEDTIME *gtime, struct tm *k_tm)
|
| +static struct tm *k_gmtime(ASN1_GENERALIZEDTIME *gtime, struct tm *k_tm)
|
| {
|
| char c, *p;
|
|
|
| @@ -1928,7 +1929,7 @@
|
| ** So we try to sneek the clockskew out through the replay cache.
|
| ** If that fails just return a likely default (300 seconds).
|
| */
|
| -krb5_deltat get_rc_clockskew(krb5_context context)
|
| +static krb5_deltat get_rc_clockskew(krb5_context context)
|
| {
|
| krb5_rcache rc;
|
| krb5_deltat clockskew;
|
| @@ -2092,9 +2093,12 @@
|
| EVP_CIPHER_CTX_cleanup(&ciph_ctx);
|
|
|
| #ifdef KSSL_DEBUG
|
| + {
|
| + int padl;
|
| printf("kssl_check_authent: decrypted authenticator[%d] =\n", outl);
|
| for (padl=0; padl < outl; padl++) printf("%02x ",unenc_authent[padl]);
|
| printf("\n");
|
| + }
|
| #endif /* KSSL_DEBUG */
|
|
|
| if ((p = kssl_skip_confound(enctype, unenc_authent)) == NULL)
|
| @@ -2124,7 +2128,7 @@
|
| tm_g = gmtime(&now); tg = mktime(tm_g);
|
| tz_offset = tg - tl;
|
|
|
| - *atimep = tr - tz_offset;
|
| + *atimep = (krb5_timestamp)(tr - tz_offset);
|
| }
|
|
|
| #ifdef KSSL_DEBUG
|
|
|