[2913] in Kerberos-V5-bugs
pending/581: PATCH: appl/bsd/login.c not 64-bit clean
daemon@ATHENA.MIT.EDU (Larry Schwimmer)
Fri Apr 17 20:59:34 1998
Resent-From: gnats@rt-11.MIT.EDU (GNATS Management)
Resent-To: gnats-admin@rt-11.MIT.EDU
Resent-Reply-To: krb5-bugs@MIT.EDU,
Larry Schwimmer <schwim@whatmore.Stanford.EDU>
Date: Fri, 17 Apr 1998 17:52:20 -0700 (PDT)
From: Larry Schwimmer <schwim@whatmore.Stanford.EDU>
To: krb5-bugs@MIT.EDU
>Number: 581
>Category: pending
>Synopsis: PATCH: appl/bsd/login.c not 64-bit clean
>Confidential: yes
>Severity: serious
>Priority: medium
>Responsible: gnats-admin
>State: open
>Class: sw-bug
>Submitter-Id: unknown
>Arrival-Date: Fri Apr 17 20:53:00 EDT 1998
>Last-Modified:
>Originator:
>Organization:
>Release:
>Environment:
>Description:
>How-To-Repeat:
>Fix:
>Audit-Trail:
>Unformatted:
Submitter-Id: net
Originator: Larry Schwimmer
Confidential: no
Synopsis: verify_krb_v4_tgt is not 64-bit clean
Severity: serious
Priority: medium
Category: krb5-clients
Class: sw-bug
Release: 1.0.5
Environment: 64 bit (includes DUNIX)
Description:
Addresses are four-bytes. long is 8 bytes on a 64 bit
machine, so the call fails. I guess you could use unsigned KRB4_32
instead of unsigned int.
yours,
Larry Schwimmer
schwim@leland.stanford.edu
Leland Systems Group
--- appl/bsd/login.c.orig Fri Feb 6 19:41:18 1998
+++ appl/bsd/login.c Fri Apr 17 17:47:46 1998
***************
*** 779,785 ****
struct hostent *hp;
KTEXT_ST ticket;
AUTH_DAT authdata;
- unsigned long addr;
static /*const*/ char rcmd[] = "rcmd";
char key[8];
int krbval, retval, have_keys;
--- 779,785 ----
struct hostent *hp;
KTEXT_ST ticket;
AUTH_DAT authdata;
+ unsigned int addr;
static /*const*/ char rcmd[] = "rcmd";
char key[8];
int krbval, retval, have_keys;