diff options
Diffstat (limited to 'security/mit-krb5/patches/patch-bp')
-rw-r--r-- | security/mit-krb5/patches/patch-bp | 25 |
1 files changed, 25 insertions, 0 deletions
diff --git a/security/mit-krb5/patches/patch-bp b/security/mit-krb5/patches/patch-bp new file mode 100644 index 00000000000..3bc1fb177f0 --- /dev/null +++ b/security/mit-krb5/patches/patch-bp @@ -0,0 +1,25 @@ +--- tests/asn.1/krb5_decode_test.c.orig 2009-04-17 16:25:31.678326000 -0500 ++++ tests/asn.1/krb5_decode_test.c 2009-04-17 16:26:03.499429900 -0500 +@@ -485,6 +485,22 @@ + ktest_destroy_keyblock(&(ref.subkey)); + ref.seq_number = 0; + decode_run("ap_rep_enc_part","(optionals NULL)","7B 1C 30 1A A0 11 18 0F 31 39 39 34 30 36 31 30 30 36 30 33 31 37 5A A1 05 02 03 01 E2 40",decode_krb5_ap_rep_enc_part,ktest_equal_ap_rep_enc_part,krb5_free_ap_rep_enc_part); ++ ++ retval = krb5_data_hex_parse(&code, "7B 06 30 04 A0 11 18 0F 31 39 39 34 30 36 31 30 30 36 30 33 31 37 5A A1 05 02 03 01 E2 40"); ++ if (retval) { ++ com_err("krb5_decode_test", retval, "while parsing"); ++ exit(1); ++ } ++ retval = decode_krb5_ap_rep_enc_part(&code, &var); ++ if (retval != ASN1_OVERRUN) { ++ printf("ERROR: "); ++ } else { ++ printf("OK: "); ++ } ++ printf("ap_rep_enc_part(optionals NULL + expect ASN1_OVERRUN for inconsistent length of timestamp)\n"); ++ krb5_free_data_contents(test_context, &code); ++ krb5_free_ap_rep_enc_part(test_context, var); ++ + ktest_empty_ap_rep_enc_part(&ref); + } + |