patch-src_aireplay-ng_c 1.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142
  1. $Id: update-patches 24 2008-08-31 14:56:13Z wbx $
  2. --- aircrack-ng-1.0-rc3.orig/src/aireplay-ng.c 2009-03-26 22:01:02.000000000 +0100
  3. +++ aircrack-ng-1.0-rc3/src/aireplay-ng.c 2009-05-01 15:52:04.000000000 +0200
  4. @@ -2908,7 +2908,7 @@ add_arp:
  5. return( 1 );
  6. }
  7. - bzero(flip, 4096);
  8. + memset(flip, 0, 4096);
  9. // flip[49-24-4] ^= ((rand() % 255)+1); //flip random bits in last byte of sender MAC
  10. // flip[53-24-4] ^= ((rand() % 255)+1); //flip random bits in last byte of sender IP
  11. @@ -3086,13 +3086,13 @@ read_packets:
  12. break;
  13. }
  14. - bzero(clear, 4096);
  15. - bzero(final, 4096);
  16. - bzero(flip, 4096);
  17. - bzero(frag1, 128);
  18. - bzero(frag2, 128);
  19. - bzero(frag3, 128);
  20. - bzero(keystream, 128);
  21. + memset(clear, 0, 4096);
  22. + memset(final, 0, 4096);
  23. + memset(flip, 0, 4096);
  24. + memset(frag1, 0, 128);
  25. + memset(frag2, 0, 128);
  26. + memset(frag3, 0, 128);
  27. + memset(keystream, 0, 128);
  28. /* check if it's a potential ARP request */
  29. @@ -3378,7 +3378,7 @@ int do_attack_chopchop( void )
  30. if( opt.r_smac_set == 1 )
  31. {
  32. //handle picky APs (send one valid packet before all the invalid ones)
  33. - bzero(packet, sizeof(packet));
  34. + memset(packet, 0, sizeof(packet));
  35. memcpy( packet, NULL_DATA, 24 );
  36. memcpy( packet + 4, "\xFF\xFF\xFF\xFF\xFF\xFF", 6 );