Received: from cathode-dark-space.mit.edu (CATHODE-DARK-SPACE.MIT.EDU [18.18.1.96]) by krbdev.mit.edu (8.9.3) with ESMTP id QAA29061; Thu, 6 Mar 2003 16:52:10 -0500 (EST) Received: (from tlyu@localhost) by cathode-dark-space.mit.edu (8.9.3) id QAA21740; Thu, 6 Mar 2003 16:52:10 -0500 (EST) To: rt-krb5@krbdev.mit.edu Subject: pointer target incompatibility with krb5_c_encrypt_length From: Tom Yu Date: Thu, 06 Mar 2003 16:52:10 -0500 Message-Id: Lines: 6 MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-RT-Original-Encoding: us-ascii Content-Length: 361 krb5_data has an unsigned int for length. krb5_c_encrypt_length takes a size_t* as an output argument. We should probably audit all uses of krb5_c_encrypt_length to ensure that intermediate variables are used where necessary, but we might just want to cause krb5_c_encrypt_length's output argument and krb5_data's length field to have properly matched types.