Displaying 2 results from an estimated 2 matches for "x2_s_proof_len".
2012 Dec 21
0
File Attachments for previous bug report
..._write_wait();
- bzero(x4_s_proof, x4_s_proof_len);
+ memset(x4_s_proof, 0, x4_s_proof_len);
xfree(x4_s_proof);
/* Expect step 2 packet from peer */
@@ -509,7 +509,7 @@
&pctx->k,
&pctx->h_k_sid_sessid, &pctx->h_k_sid_sessid_len));
- bzero(x2_s_proof, x2_s_proof_len);
+ memset(x2_s_proof, 0, x2_s_proof_len);
xfree(x2_s_proof);
if (!use_privsep)
-------------- next part --------------
--- authfd.c.orig 2012-12-19 17:07:08.292534290 -0800
+++ authfd.c 2012-12-19 17:10:48.240556291 -0800
@@ -102,7 +102,7 @@
if (!authsocket)
return -1;
- bzero(&...
2012 Dec 20
4
Deprecated calls to bzero() and index() found in OpenSSH 6.1p1
..._proof, x4_s_proof_len);
+ memset(x4_s_proof, 0, x4_s_proof_len);
xfree(x4_s_proof);
/* Expect step 2 packet from peer */
@@ -509,7 +509,7 @@
&pctx->k,
&pctx->h_k_sid_sessid, &pctx->h_k_sid_sessid_len));
- bzero(x2_s_proof, x2_s_proof_len);
+ memset(x2_s_proof, 0, x2_s_proof_len);
xfree(x2_s_proof);
if (!use_privsep)
In file 'authfd.c', I've replaced the bzero() call with
the equivalent memset() call. The patch file is below in
(diff -u) format:
--- authfd.c.orig 2012-12-19 17:07:08.292534...