[29709] in CVS-changelog-for-Kerberos-V5
krb5 commit: Fix typo in prng.c comment
daemon@ATHENA.MIT.EDU (Greg Hudson)
Thu Sep 22 23:13:32 2016
Date: Thu, 22 Sep 2016 23:13:28 -0400
From: Greg Hudson <ghudson@mit.edu>
Message-Id: <201609230313.u8N3DSFO013161@drugstore.mit.edu>
To: cvs-krb5@mit.edu
Reply-To: krbdev@mit.edu
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: cvs-krb5-bounces@mit.edu
https://github.com/krb5/krb5/commit/b9c5c7a6b65764f8303248582b2d1929fb656ab7
commit b9c5c7a6b65764f8303248582b2d1929fb656ab7
Author: Greg Hudson <ghudson@mit.edu>
Date: Thu Sep 22 23:11:34 2016 -0400
Fix typo in prng.c comment
(The typo was mine, introduced during a final editing pass.)
src/lib/crypto/krb/prng.c | 6 +++---
1 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/src/lib/crypto/krb/prng.c b/src/lib/crypto/krb/prng.c
index 22948a4..cb9ca9b 100644
--- a/src/lib/crypto/krb/prng.c
+++ b/src/lib/crypto/krb/prng.c
@@ -104,9 +104,9 @@ k5_get_os_entropy(unsigned char *buf, size_t len, int strong)
while (len > 0) {
/*
- * Pull from the /dev/urandom pool, but it to have been seeded. This
- * ensures strong randomness while only blocking during first system
- * boot.
+ * Pull from the /dev/urandom pool, but require it to have been seeded.
+ * This ensures strong randomness while only blocking during first
+ * system boot.
*
* glibc does not currently provide a binding for getrandom:
* https://sourceware.org/bugzilla/show_bug.cgi?id=17252
_______________________________________________
cvs-krb5 mailing list
cvs-krb5@mit.edu
https://mailman.mit.edu/mailman/listinfo/cvs-krb5