patch-jpake_c 1.2 KB

1234567891011121314151617181920212223242526272829303132333435363738
  1. --- openssh-5.2p1.orig/jpake.c 2008-11-05 06:20:46.000000000 +0100
  2. +++ openssh-5.2p1/jpake.c 2009-09-18 12:26:24.000000000 +0200
  3. @@ -160,7 +160,7 @@ hash_buffer(const u_char *buf, u_int len
  4. success = 0;
  5. out:
  6. EVP_MD_CTX_cleanup(&evp_md_ctx);
  7. - bzero(digest, sizeof(digest));
  8. + memset(digest, 0, sizeof(digest));
  9. digest_len = 0;
  10. return success;
  11. }
  12. @@ -259,7 +259,7 @@ jpake_free(struct jpake_ctx *pctx)
  13. #define JPAKE_BUF_CLEAR_FREE(v, l) \
  14. do { \
  15. if ((v) != NULL) { \
  16. - bzero((v), (l)); \
  17. + memset((v), 0, (l)); \
  18. xfree(v); \
  19. (v) = NULL; \
  20. (l) = 0; \
  21. @@ -287,7 +287,7 @@ jpake_free(struct jpake_ctx *pctx)
  22. #undef JPAKE_BN_CLEAR_FREE
  23. #undef JPAKE_BUF_CLEAR_FREE
  24. - bzero(pctx, sizeof(pctx));
  25. + memset(pctx, 0, sizeof(pctx));
  26. xfree(pctx);
  27. }
  28. @@ -592,7 +592,7 @@ jpake_check_confirm(const BIGNUM *k,
  29. else if (memcmp(peer_confirm_hash, expected_confirm_hash,
  30. expected_confirm_hash_len) == 0)
  31. success = 1;
  32. - bzero(expected_confirm_hash, expected_confirm_hash_len);
  33. + memset(expected_confirm_hash, 0, expected_confirm_hash_len);
  34. xfree(expected_confirm_hash);
  35. debug3("%s: success = %d", __func__, success);
  36. return success;