X-Git-Url: https://git.gag.com/?a=blobdiff_plain;f=common-src%2Fkrb4-security.c;h=db6e702097f112c893714570c6ec007f01e2e1f7;hb=cb8e943df4defb25d0362567131dc31fc0ab238e;hp=d11d5c325c82a006e1d13c16c00e150ef9616126;hpb=33561aecfa34750b791fe958e7b1aba0b866d559;p=debian%2Famanda diff --git a/common-src/krb4-security.c b/common-src/krb4-security.c index d11d5c3..db6e702 100644 --- a/common-src/krb4-security.c +++ b/common-src/krb4-security.c @@ -25,7 +25,7 @@ */ /* - * $Id: krb4-security.c,v 1.9 2006/02/21 04:13:55 ktill Exp $ + * $Id: krb4-security.c,v 1.9.2.1 2006/04/11 11:11:16 martinea Exp $ * * krb4-security.c - helper functions for kerberos v4 security. */ @@ -763,7 +763,7 @@ krb4_stream_auth(s) * and useconds by one. Reencrypt, and present to the other side. * Timeout in 10 seconds. */ - if (net_read(fd, &enc, sizeof(enc), 10) < 0) { + if (net_read(fd, &enc, sizeof(enc), 60) < 0) { security_stream_seterror(&ks->secstr, "krb4 stream handshake read error: %s", strerror(errno)); return (-1); @@ -785,7 +785,7 @@ krb4_stream_auth(s) * If they incremented it properly, then succeed. * Timeout in 10 seconds. */ - if (net_read(fd, &enc, sizeof(enc), 10) < 0) { + if (net_read(fd, &enc, sizeof(enc), 60) < 0) { security_stream_seterror(&ks->secstr, "krb4 stream handshake read error: %s", strerror(errno)); return (-1);