krb5 commit: Use consistent types for overflow comparison

Benjamin Kaduk kaduk at MIT.EDU
Tue Jul 3 00:43:52 EDT 2012


https://github.com/krb5/krb5/commit/e7aa25d215a9d4baa95643f2d19e44036e57af72
commit e7aa25d215a9d4baa95643f2d19e44036e57af72
Author: Ben Kaduk <kaduk at mit.edu>
Date:   Wed Jun 27 16:00:16 2012 -0400

    Use consistent types for overflow comparison
    
    Unsigned long might not be 32-bits, in which case the overflow check
    fails for a 32-bit kdb_sno_t.  Cast from -1 explicitly as a more
    robust check.

 src/lib/kdb/kdb_log.c |    2 +-
 1 files changed, 1 insertions(+), 1 deletions(-)

diff --git a/src/lib/kdb/kdb_log.c b/src/lib/kdb/kdb_log.c
index 625c71a..0153375 100644
--- a/src/lib/kdb/kdb_log.c
+++ b/src/lib/kdb/kdb_log.c
@@ -204,7 +204,7 @@ ulog_add_update(krb5_context context, kdb_incr_update_t *upd)
      * We need to overflow our sno, replicas will do full
      * resyncs once they see their sno > than the masters.
      */
-    if (cur_sno == ULONG_MAX)
+    if (cur_sno == (kdb_sno_t)-1)
         cur_sno = 1;
     else
         cur_sno++;


More information about the cvs-krb5 mailing list