[29709] in CVS-changelog-for-Kerberos-V5

home help back first fref pref prev next nref lref last post

krb5 commit: Fix typo in prng.c comment

daemon@ATHENA.MIT.EDU (Greg Hudson)
Thu Sep 22 23:13:32 2016

Date: Thu, 22 Sep 2016 23:13:28 -0400
From: Greg Hudson <ghudson@mit.edu>
Message-Id: <201609230313.u8N3DSFO013161@drugstore.mit.edu>
To: cvs-krb5@mit.edu
Reply-To: krbdev@mit.edu
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: cvs-krb5-bounces@mit.edu

https://github.com/krb5/krb5/commit/b9c5c7a6b65764f8303248582b2d1929fb656ab7
commit b9c5c7a6b65764f8303248582b2d1929fb656ab7
Author: Greg Hudson <ghudson@mit.edu>
Date:   Thu Sep 22 23:11:34 2016 -0400

    Fix typo in prng.c comment
    
    (The typo was mine, introduced during a final editing pass.)

 src/lib/crypto/krb/prng.c |    6 +++---
 1 files changed, 3 insertions(+), 3 deletions(-)

diff --git a/src/lib/crypto/krb/prng.c b/src/lib/crypto/krb/prng.c
index 22948a4..cb9ca9b 100644
--- a/src/lib/crypto/krb/prng.c
+++ b/src/lib/crypto/krb/prng.c
@@ -104,9 +104,9 @@ k5_get_os_entropy(unsigned char *buf, size_t len, int strong)
 
     while (len > 0) {
         /*
-         * Pull from the /dev/urandom pool, but it to have been seeded.  This
-         * ensures strong randomness while only blocking during first system
-         * boot.
+         * Pull from the /dev/urandom pool, but require it to have been seeded.
+         * This ensures strong randomness while only blocking during first
+         * system boot.
          *
          * glibc does not currently provide a binding for getrandom:
          * https://sourceware.org/bugzilla/show_bug.cgi?id=17252
_______________________________________________
cvs-krb5 mailing list
cvs-krb5@mit.edu
https://mailman.mit.edu/mailman/listinfo/cvs-krb5

home help back first fref pref prev next nref lref last post