should be the hash's output size, not its block size. (The bug did
not show up in testing because it is harmless in practice; MD5 has a
larger block size than output size.)
ticket: 6869
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@24641
dc483132-0cff-0310-8789-
dd5450dbe970
return KRB5_BAD_ENCTYPE;
if (ctp->ctype == CKSUMTYPE_HMAC_MD5_ARCFOUR) {
/* Compute HMAC(key, "signaturekey\0") to get the signing key ks. */
- ret = alloc_data(&ds, ctp->hash->blocksize);
+ ret = alloc_data(&ds, ctp->hash->hashsize);
if (ret != 0)
goto cleanup;