svn rev #22380: branches/krb5-1-7/src/lib/crypto/
tlyu@MIT.EDU
tlyu at MIT.EDU
Mon May 25 01:44:09 EDT 2009
http://src.mit.edu/fisheye/changelog/krb5/?cs=22380
Commit By: tlyu
Log Message:
ticket: 6500
target_version: 1.7
tags: pullup
version_fixed: 1.7
subject: use correct type for krb5_c_prf_length length arg
pull up r22364 from trunk
------------------------------------------------------------------------
r22364 | raeburn | 2009-05-22 19:20:15 +0200 (Fri, 22 May 2009) | 2 lines
Use correct type for krb5_c_prf_length length arg.
Changed Files:
U branches/krb5-1-7/src/lib/crypto/t_prf.c
Modified: branches/krb5-1-7/src/lib/crypto/t_prf.c
===================================================================
--- branches/krb5-1-7/src/lib/crypto/t_prf.c 2009-05-25 05:43:55 UTC (rev 22379)
+++ branches/krb5-1-7/src/lib/crypto/t_prf.c 2009-05-25 05:44:09 UTC (rev 22380)
@@ -23,13 +23,14 @@
* this software for any purpose. It is provided "as is" without express
* or implied warranty.
*
- * This file contains tests for the PRF code in Kerberos. IT reads
- *an input file, and writes an output file. It is assumed that the
- *output file will be diffed against expected output to see whether
- *regression tests pass. The input file is a very primitive format.
- *It includes an enctype and to be string2keyed followed by a number of bytes of input
- *length, followed by that many bytes of input. The program outputs
- *krb5_c_prf of that input and key as a hex string.
+ * This file contains tests for the PRF code in Kerberos. IT reads an
+ * input file, and writes an output file. It is assumed that the
+ * output file will be diffed against expected output to see whether
+ * regression tests pass. The input file is a very primitive format.
+ * It includes an enctype and password to be string2keyed followed by
+ * a number of bytes of input length, followed by that many bytes of
+ * input. The program outputs krb5_c_prf of that input and key as a
+ * hex string.
*/
#include "k5-int.h"
@@ -39,7 +40,7 @@
krb5_data input, output;
krb5_keyblock *key = NULL;
unsigned int in_length;
- unsigned int i;
+ size_t i;
while (1) {
krb5_enctype enctype;
char s[1025];
More information about the cvs-krb5
mailing list