diff options
author | Ken Raeburn <raeburn@mit.edu> | 2008-03-29 01:09:00 +0000 |
---|---|---|
committer | Ken Raeburn <raeburn@mit.edu> | 2008-03-29 01:09:00 +0000 |
commit | 85306a1255304169c251b540507e3828f6aa01c0 (patch) | |
tree | e60c0901b4d323f8c1bddc920c2da4f7c9e4822b /src | |
parent | 71ca378e4b7fb64f77bbf58ba15f4665072163bd (diff) | |
download | krb5-85306a1255304169c251b540507e3828f6aa01c0.tar.gz krb5-85306a1255304169c251b540507e3828f6aa01c0.tar.xz krb5-85306a1255304169c251b540507e3828f6aa01c0.zip |
Coverity CID 101: Fix minor bounds check error
Coverity CID 101: Fix minor bounds check error.
ticket: new
target_version: 1.6.4
tags: pullup
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@20296 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src')
-rw-r--r-- | src/kdc/kerberos_v4.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/src/kdc/kerberos_v4.c b/src/kdc/kerberos_v4.c index 1ac951360..b2bfa4b54 100644 --- a/src/kdc/kerberos_v4.c +++ b/src/kdc/kerberos_v4.c @@ -822,7 +822,7 @@ kerberos_v4(struct sockaddr_in *client, KTEXT pkt) auth->mbz = 0; /* pkt->mbz already zeroed */ auth->length = 4 + strlen((char *)pkt->dat + 3); - if (auth->length + 1 > MAX_KTXT_LEN) { + if (auth->length + 1 >= MAX_KTXT_LEN) { lt = klog(L_KRB_PERR, "APPL request with realm length too long from %s", inet_ntoa(client_host)); |