[2567] in Kerberos_V5_Development

home help back first fref pref prev next nref lref last post

Re: Prototype hell

daemon@ATHENA.MIT.EDU (Tom Yu)
Mon Oct 13 03:50:15 1997

Date: Mon, 13 Oct 1997 03:50:10 -0400
To: Ken Hornstein <kenh@cmf.nrl.navy.mil>
Cc: "Theodore Y. Ts'o" <tytso@MIT.EDU>, krbdev@MIT.EDU
From: Tom Yu <tlyu@MIT.EDU>
In-Reply-To: <199710102023.QAA16305@ginger.cmf.nrl.navy.mil>

>>>>> "kenh" == Ken Hornstein <kenh@cmf.nrl.navy.mil> writes:

kenh> It makes things easier when you depend on the mathematical
kenh> properties of 32-bit integers ... such as when you're shifting
kenh> bits around when doing DES calculations, for instance.  I'd
kenh> agree that's a bug too, but I was going for minimum work :-)

So where exactly is it failing?  A quick perusal of the Ferguson DES
implementation that we're using reveals a few points where bits beyond
the least significant 32 might get clobbered, but this shouldn't
matter because nothing tries to use them (everything that right-shifts
an unsigned KRB5_INT32 masks the result sanely as far as I can see).
Is it the actual DES verification test that is failing?  Or is it
something like the MD{4,5} or CRC32 or SHA tests that are failing?

---Tom

home help back first fref pref prev next nref lref last post