summaryrefslogtreecommitdiffstats
path: root/src
diff options
context:
space:
mode:
authorKen Raeburn <raeburn@mit.edu>2008-03-29 01:09:00 +0000
committerKen Raeburn <raeburn@mit.edu>2008-03-29 01:09:00 +0000
commit85306a1255304169c251b540507e3828f6aa01c0 (patch)
treee60c0901b4d323f8c1bddc920c2da4f7c9e4822b /src
parent71ca378e4b7fb64f77bbf58ba15f4665072163bd (diff)
downloadkrb5-85306a1255304169c251b540507e3828f6aa01c0.tar.gz
krb5-85306a1255304169c251b540507e3828f6aa01c0.tar.xz
krb5-85306a1255304169c251b540507e3828f6aa01c0.zip
Coverity CID 101: Fix minor bounds check error
Coverity CID 101: Fix minor bounds check error. ticket: new target_version: 1.6.4 tags: pullup git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@20296 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src')
-rw-r--r--src/kdc/kerberos_v4.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/src/kdc/kerberos_v4.c b/src/kdc/kerberos_v4.c
index 1ac951360..b2bfa4b54 100644
--- a/src/kdc/kerberos_v4.c
+++ b/src/kdc/kerberos_v4.c
@@ -822,7 +822,7 @@ kerberos_v4(struct sockaddr_in *client, KTEXT pkt)
auth->mbz = 0; /* pkt->mbz already zeroed */
auth->length = 4 + strlen((char *)pkt->dat + 3);
- if (auth->length + 1 > MAX_KTXT_LEN) {
+ if (auth->length + 1 >= MAX_KTXT_LEN) {
lt = klog(L_KRB_PERR,
"APPL request with realm length too long from %s",
inet_ntoa(client_host));