Fix krb5's gss_pseudo_random() (n is big-endian)
commitda38be62611d1e6f120f9e6e8e1fd11abd9760a3
authorNicolas Williams <nico@cryptonector.com>
Wed, 30 Oct 2013 19:26:15 +0000 (30 14:26 -0500)
committerNicolas Williams <nico@cryptonector.com>
Wed, 30 Oct 2013 19:29:40 +0000 (30 14:29 -0500)
treea1d728b0ffe2c0e83d4b069f896b317e86a34551
parent15e0fdef2fee5bc25bacac98d85e7c27ce40191d
Fix krb5's gss_pseudo_random() (n is big-endian)

The first enctype RFC3961 prf output length's bytes are correct because
the little- and big-endian representations of unsigned zero are the
same.  The second block of output was wrong because the counter was not
being encoded as big-endian.

This change could break applications.  But those applications would not
have been interoperating with other implementations anyways (in
particular: MIT's).
lib/gssapi/krb5/prf.c