krb5 commit: Use consistent types for overflow comparison
Benjamin Kaduk
kaduk at MIT.EDU
Tue Jul 3 00:43:52 EDT 2012
https://github.com/krb5/krb5/commit/e7aa25d215a9d4baa95643f2d19e44036e57af72
commit e7aa25d215a9d4baa95643f2d19e44036e57af72
Author: Ben Kaduk <kaduk at mit.edu>
Date: Wed Jun 27 16:00:16 2012 -0400
Use consistent types for overflow comparison
Unsigned long might not be 32-bits, in which case the overflow check
fails for a 32-bit kdb_sno_t. Cast from -1 explicitly as a more
robust check.
src/lib/kdb/kdb_log.c | 2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/src/lib/kdb/kdb_log.c b/src/lib/kdb/kdb_log.c
index 625c71a..0153375 100644
--- a/src/lib/kdb/kdb_log.c
+++ b/src/lib/kdb/kdb_log.c
@@ -204,7 +204,7 @@ ulog_add_update(krb5_context context, kdb_incr_update_t *upd)
* We need to overflow our sno, replicas will do full
* resyncs once they see their sno > than the masters.
*/
- if (cur_sno == ULONG_MAX)
+ if (cur_sno == (kdb_sno_t)-1)
cur_sno = 1;
else
cur_sno++;
More information about the cvs-krb5
mailing list