This page represents a proposed policy of the MIT Kerberos project.
This is a partial list of portability assumptions made by the MIT krb5 source code. It currently duplicates some content from Supported platforms, which will be replaced with a pointer to this page in the future.
We assume a C compilation environment equivalent to a freestanding C89 (ISO/IEC 9899:1990) implementation. Freestanding language support for C99 (ISO/IEC 9899:1999) does not have to be complete, but we use some C99 features:
- The C99
inlinefeature should be supported.
- External identifiers of at least 31 significant initial characters should be supported.
long long inttype, or some reasonably equivalent means of declaring integers of at least 64 bits of precision, should be supported.
We require behavior that is formally unspecified by C89:
- Null pointers are represented as all bits zero. This means that a pointer members of a structure can be initialized to null pointer values by
We require behavior that is formally implementation-defined by C89:
- Characters are 8 bits wide.
- Integers are represented as two's-complement.
- Integers have no padding bits.
We require some behavior that is formally undefined by C89:
- Pointers to
voidcan be cast to pointers to functions.
C runtime libraries
We expect that substantially all of the C89 and SUSv3/POSIX.1 library interfaces are available.
We expect that the
snprintf() family of functions from C99 and SUSv3/POSIX.1 is available and either conforms to the standards or deviates from the standard behavior in one of a small number of ways:
- It may return -1 if the target buffer is not sufficiently large.
- It may treat
nof zero or a null target pointer as an error condition.
On Solaris, precision specifiers on string formats in
printf() family functions may count columns rather than bytes if the application is not compiled in a standard-conforming environment. We are investigating the security impact of this behavior.
inttypes.h capabilities should be available.