123456789101112131415161718192021222324252627282930313233343536373839404142 |
- $Id: update-patches 24 2008-08-31 14:56:13Z wbx $
- --- aircrack-ng-1.0-rc3.orig/src/aireplay-ng.c 2009-03-26 22:01:02.000000000 +0100
- +++ aircrack-ng-1.0-rc3/src/aireplay-ng.c 2009-05-01 15:52:04.000000000 +0200
- @@ -2908,7 +2908,7 @@ add_arp:
- return( 1 );
- }
-
- - bzero(flip, 4096);
- + memset(flip, 0, 4096);
-
- // flip[49-24-4] ^= ((rand() % 255)+1); //flip random bits in last byte of sender MAC
- // flip[53-24-4] ^= ((rand() % 255)+1); //flip random bits in last byte of sender IP
- @@ -3086,13 +3086,13 @@ read_packets:
- break;
- }
-
- - bzero(clear, 4096);
- - bzero(final, 4096);
- - bzero(flip, 4096);
- - bzero(frag1, 128);
- - bzero(frag2, 128);
- - bzero(frag3, 128);
- - bzero(keystream, 128);
- + memset(clear, 0, 4096);
- + memset(final, 0, 4096);
- + memset(flip, 0, 4096);
- + memset(frag1, 0, 128);
- + memset(frag2, 0, 128);
- + memset(frag3, 0, 128);
- + memset(keystream, 0, 128);
-
- /* check if it's a potential ARP request */
-
- @@ -3378,7 +3378,7 @@ int do_attack_chopchop( void )
- if( opt.r_smac_set == 1 )
- {
- //handle picky APs (send one valid packet before all the invalid ones)
- - bzero(packet, sizeof(packet));
- + memset(packet, 0, sizeof(packet));
-
- memcpy( packet, NULL_DATA, 24 );
- memcpy( packet + 4, "\xFF\xFF\xFF\xFF\xFF\xFF", 6 );
|