diff options
author | Assar Westerlund <assar@FreeBSD.org> | 2001-03-12 08:14:22 +0000 |
---|---|---|
committer | Assar Westerlund <assar@FreeBSD.org> | 2001-03-12 08:14:22 +0000 |
commit | a16a9b0f1ea04ab1e09cee177a8e2472cdb39f55 (patch) | |
tree | 1384ce54e93bdabf2bb1a3ddaa82ed374e9f2461 /crypto | |
parent | 5ca7924a9138c93a1c261e9adfa4d1f773bf4a35 (diff) | |
download | src-a16a9b0f1ea04ab1e09cee177a8e2472cdb39f55.tar.gz src-a16a9b0f1ea04ab1e09cee177a8e2472cdb39f55.zip |
Fix LP64 problem in Kerberos 5 TGT passing.
Obtained from: NetBSD (done by thorpej@netbsd.org)
Notes
Notes:
svn path=/head/; revision=74147
Diffstat (limited to 'crypto')
-rw-r--r-- | crypto/openssh/auth1.c | 4 |
1 files changed, 3 insertions, 1 deletions
diff --git a/crypto/openssh/auth1.c b/crypto/openssh/auth1.c index 3c0e2b6be6cf..b5d3bd8140c8 100644 --- a/crypto/openssh/auth1.c +++ b/crypto/openssh/auth1.c @@ -397,7 +397,9 @@ do_authloop(struct passwd * pw, char *luser) { krb5_data tgt; - tgt.data = packet_get_string(&tgt.length); + u_int tgtlen; + tgt.data = packet_get_string(&tgtlen); + tgt.length = tgtlen; if (!auth_krb5_tgt(luser, &tgt, tkt_client)) verbose ("Kerberos V5 TGT refused for %.100s", luser); |