[39560] in Kerberos
Re: Failing ASN.1 tests with PKINIT on HP-UX
daemon@ATHENA.MIT.EDU (Greg Hudson)
Sun Sep 28 01:23:25 2025
Message-ID: <7bb38cb7-0d12-4612-aff5-e455484bb9ef@mit.edu>
Date: Sun, 28 Sep 2025 01:21:53 -0400
MIME-Version: 1.0
To: "Osipov, Michael (IN IT IN)" <michael.osipov@innomotics.com>,
Kerberos@mit.edu
Content-Language: en-US
From: "Greg Hudson" <ghudson@mit.edu>
In-Reply-To: <090f2934-d321-400a-b21f-729bda1083ea@innomotics.com>
Content-Type: text/plain; charset="utf-8"; Format="flowed"
Errors-To: kerberos-bounces@mit.edu
Content-Transfer-Encoding: 8bit
On 9/27/25 06:17, Osipov, Michael (IN IT IN) via Kerberos wrote:
>> (gdb) where
>> #0 0x60000000c8a788d0:0 in get_tag () at asn1_encode.c:370
>> #1 0x60000000c8a79f70:0 in split_der () at asn1_encode.c:605
[...]
>> 777 encode_run(req, "pa_pk_as_req", "",
>> acc.encode_krb5_pa_pk_as_req);
I'd be interested in the stack trace going back to near this call
site--specifically, which encode_krb5_*() function is called.
The reason I ask is that encode_krb5_pa_pk_as_req() should not reach
split_der(). So I wonder if a different function is being executed
somehow, like encode_krb5_auth_pack().
If I'm right, then we'll have the mystery of why
acc_encode_krb5_pa_pk_as_req contains the wrong function pointer. The
structure is populated by krb5int_accessor().
________________________________________________
Kerberos mailing list Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos